23.10.2017 Views

halloween edition 10122017

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Vol. 2

IT LIVES! To 98 or not 98

1


Front Cover

Halloween scene by Peter Nadal.

Some were in cover is Computer-Ease

logo ©

Thanks to all who contributed to

CE Magazine. Have an article

you would like contribute? You

can mail it to:

CE, P.O. Box 8619

Michigan City In 46360

Or E-Mail it to

computerease@juno.com

CE Magazine is part of

OtherSide Ministries © all

rights reserved

Founder & Chief Editor

Peter Nadal

Editor

Pamela Kennoy

In this issue

5 Hey Pete! On this issue

Make your own scary mask!!

9 Five signs your computer is

Infected

12 Biz Cards board!!

Hey its free

13 More virus and worms

14 Secret Scroll

15 Head in a bottle

20 Windows Shortcuts and

Hidden Applications

22 It Lives 98se Or To

Not Windows 98se

26 High Tech Halloween

Art & Design

Peter Nadal

2


Welcome to CE’s 2 nd edition. In this edition, besides the articles we have

put together, we went way out for our Halloween edition and hope you

will enjoy it and maybe get some ideas. Our 1 st edition was a success and

we give thanks to you our readers and we hope you enjoy this special

edition.

All graphics and photo shop pictures were done with Corel 12 Photo-Paint

& Windows 7 paint. Some of the background pictures were found by

doing Google search, like Halloween ghouls, Halloween Haunted

Cemeteries. When I work with photographs and do overlays, I always save

in a special folder the picture I am working on, example “Pichall1,

Pichall2” and so forth. This way if I mess up I can bring up the last picture I

saved before the screw up. Once I’m done I will save it with the word final

in the file name example Pichallfinal. Take your time, my picture above is

two overlays with some brush adjustments and it took me 3 hrs to do.

Fonts used in this special edition are Fiendish fonts and Gypsy-curse fonts

and they are free on the internet.

Now, go have fun and don’t worry on mistakes, there are some mistakes

in the graphics that were done and I left them there. A good tip for your

Halloween party is to drop a piece of dry ice in your witches brew!!

Peter!!

3


Celebrate Halloween with a Vet!

Semper Fi!

To all veterans we thank you for your service

4


Halloween is coming and it’s time to

greate your own morbid and scary

mask. here is a list of online sites you

can go to get creative and we include

sample pictures. So, go and make your

scary mask and be the scariest ghoul

in your neighborhood!! HAHAHAHAHAHA!

Picture by http://www.loverofdarkness.net/pictures/picture/194

5


https://www.pinterest.com/explore/halloween-masks/

6


http://www.instructables.com/id/Masks/

7


Pinterest https://www.pinterest.com/explore/scary-halloween-costumes/

8


Five signs your computer is infected

By Kim Komando

Published on USA TODAY on May 31, 2013

Story Highlights




Anti-spyware programs can get rid of unwanted pop-up ads

'Ransomware' is a virus that appears to be a message from law enforcement

Task Manager can help you see what programs are running on your computer

32 CONNECTTWEET 30 LINKEDINCOMMENTEMAILMORE

Oh, the not-so-humble computer virus. For decades, it's been making computer users miserable.

It's like the common cold. You'd think someone would have cured both by now. Unfortunately, it looks like

computer viruses are just getting stronger and smarter.

In the early days, a virus would delete your files and spread to other computers. It was annoying, but the effects

were easy to detect and contain.

Today, in addition to traditional viruses, there are Trojans, worms, ransomware, spyware, adware and plenty of

other "wares." The computer industry term for all this is "malware."

Even state-of-the-art computer security can't always keep up with new threats. Of course, everyone should still be

running up-to-date security programs. Fortunately, there are excellent free anti-virus, spyware and firewall

programs.

Every type of malware does something a little differently. You might not even recognize that your computer is

infected. To help you out, here are five signs you can look for.

POP-UP ADS

Running into pop-up ads while surfing the Web used to be par for the course. Thanks to pop-up blocking now

standard in modern browsers, these annoyances aren't common.

Still seeing pop-ups online from multiple sites? It could be a badly-configured browser.

Seeing pop-ups when your browser isn't even open? It's usually adware, spyware or scareware.

You can usually tell it's the last one if the pop up says "a virus was detected." It will offer you a paid program to

remove the virus. Of course, you'll just be downloading even more malware.

Your regular anti-virus might not seem to stop this. In that case, run a scan with a separate anti-spyware program.

SpyBot Search & Destroy or Ad-Aware are two you could try. These can help you get to the root of the problem.

PHANTOM MESSAGES

A dangerous feature of most malware is that it spreads. With always-on Internet, email, instant messaging and

social media available, modern viruses have it easy.

9


Once they're on your computer, they have plenty of options. You might see friends replying to email messages

you didn't send. Perhaps you notice a post on your Facebook profile you didn't write.

In most cases, these will have a tempting link. If your friends and family click the link, they're infected and the

virus spreads even further.

Keep an eye on your email "sent" folder and on your social network posts. If you see items you didn't send or

post, change your account passwords immediately. This will lock out a virus that's stolen your passwords.

Then go to work with your security software. After you've removed the virus, I'd change your passwords again,

just in case.

Be sure to let your friends and family know you were hacked. That way they can take precautions for their

accounts as well.

LOCKED COMPUTER

Having trouble taking back your account from a virus or hacker?

You're surfing the Web minding your own business. Suddenly a scary message appears. It says law enforcement

has detected illegal material on your computer. You've been locked out until you pay a fine!

Of course it's a lie. A virus has taken over and is holding your computer ransom. That's why it's commonly called

"ransomware."

Some ransomware doesn't even try to be sneaky. It tells you up front that hackers took over your system. You

have to pay to get it back.

I don't recommend paying. You won't get your computer back.

Unfortunately, you probably won't be able to run your normal anti-virus program. You'll need a rescue CD. AVG

Rescue CD or Windows Defender Online are two that could take care of the problem.

In some cases, the ransomware actually encrypts your files. If that happens, you better have a recent backup. Even

if you get rid of the virus, your files might be lost.

ESSENTIAL TOOLS AND PROGRAMS STOP WORKING

If a computer is misbehaving, most computer users hit Ctrl + Alt + Del. The "three-finger salute" lets you open up

Task Manager. This can show you what programs are causing trouble.

Sometimes, you'll hit this keyboard shortcut and nothing happens. Your Start Menu won't open. Nothing happens

when you right-click on the desktop. Your security software won't run.

This is often a clue that a virus is messing with your computer. It's doing what it can to keep you from identifying

it and removing it.

This is where deep-cleaning anti-malware software like MalwareBytes will shine. If that fails, you'll need to use a

rescue CD like I mentioned earlier.

If nothing you do works, it could also be a hardware problem. Most likely it's bad RAM or a failing power

supply.

10


EVERYTHING IS RUNNING FINE

I run into many people who don't install security software. The excuse is always the same: "But my computer

runs just fine without it. If I had a virus, I'd know."

The simple fact is that you don't know. Modern malware can hide deep in your computer without raising red

flags. It will just quietly go about its business.

There are some sneaky viruses that will remove other viruses so you don't get suspicious!

Just because a virus isn't disruptive doesn't mean it isn't dangerous. It could be snagging your passwords, sensitive

files or other vital information. The virus could be using your computer to send spam. It could even attack banks

and other organizations.

You won't know until your identity is stolen and your bank account is drained. Maybe your Internet slows to a

crawl or your service provider shuts down your connection.

Some people never figure it out. There are computers out there that have been sending spam for years. Their

owners have no clue.

That's why every computer user, even Mac users, needs up-to-date security software installed. Keep it updated

and set it to run regular, automatic scans.

And don't rely on just one program, but run a scan with several security programs at least once a month. What one

program misses other programs might find.

Kim Komando hosts the nation's largest talk radio show about consumer electronics, computers and the Internet.

To get the podcast, watch the show or find the station nearest you, visit: http://www.komando.com/listen. Email

her at techcomments@usatoday.com.

11


Send your biz card in pdf to computerease@juno.com or mail to Computer-Ease, Po BOX 8619

Michigan City In 46360

12


y Skaife, Kurtis J

Computer Viruses

A computer virus finds its way on to your computer hidden in a seemingly innocuous program. The virus is

harmless until one opens the file or runs the program containing the virus. The virus's effects can range from

simply annoying to malicious, damaging your hardware, software or files. The virus can easily spread to other

computers when one unknowingly sends infected attachments.

Computer Worms

A worm is similar to a virus but unlike a virus, a worm can replicate and spread without the computer's operator

opening the infected file. Once on a computer, a worm can make and send out hundreds of thousands of copies of

itself. One way the worm can infect others is by sending itself to every address in your email, the process will

then repeat itself from those computers. Worms often eat up a lot of a computer's memory or a network's

bandwidth. A worm can also allow others to control your computer from afar.

Trojan Horse

A Trojan Horse will appear to be useful software but once installed, it will begin infecting a computer. The

Trojan Horse may simply be annoying such as changing the computer's icons, but it may be more harmful by

deleting files and information from the computer. A Trojan Horse often opens a backdoor in the computer

allowing unauthorized access to the computer including sensitive information that can be found.

Prevention

To protect a computer one should frequently update the operating system and have anti-virus software

installed. The software should be updated frequently as well so that it can protect the computer from the latest

versions of viruses and worms. Using a firewall is also a good idea, this can be in the form of hardware or

software. The firewall is another line of defense from viruses and can prevent an unauthorized user from gaining

access to a computer.

13


Secret Tip Scroll

Windows 7, though, lets you bring up the

desktop without taking your hand off your

mouse or pointing device—but it’s not obvious

how until you stumble upon it. In the extreme

lower right portion of the screen, at the farright

edge of the taskbar, you’ll see a little

vertical rectangle with a “glossy” finish.

Hover the mouse pointer over it, and the

Windows Desktop appears, letting you inspect

it. (You’ll still see ghostly outlines of the

windows you have open.) Move the mouse off

the rectangle, and your windows reappear.

You can also activate this via a keyboard

shortcut: Windows key + spacebar.

14


By Rodrigo Esperanza

Rodrigo Esperanza is one of our writers/reporters at large

Normally I’m not a morbid Halloween guy, but, my boss, Peter is

and it rubs off on you. So my sweets here is bone chiller scream

of a Halloween décor for your Halloween bash, from the screams

archives of DYI !!

Sweet dreams!

Head in a Jar Prank: 11 Steps

Introduction: Head in a Jar

15


Prank

Hungry? Scare those fridge-bound famished food foragers with a head in a jar!

Using a photo editor, two pictures are blended together to create flat image of a head, which is then laminated and

submerged in a jar. When the flattened image in inserted into the curved jar, along with the distortion from the

water, gives the illusion of a decapitated head in a jar of preserving fluid.

Here's what you need to make your own:






Photo editing software

Large jar

food colouring

computer printer

paper lamination (also available at local print/copy store)

Making your own head in a jar is easy, but requires some photo editing skills. I've included a tutorial on how I

made mine, and took me about 30 minutes to compose. Personalizing this prank will make it more effective. But,

if you're not a pro with photo editing, you can download my flattened head image below.


wadeface.pdf

Step 1: Take Photos + Import

To make the head printout you'll need 2 pictures of a head, a profile and a portrait. With the camera at eye-level,

take a picture straight on and one from the side. Ensure your subject is well lit. Also, ask them to make a face.

Next we'll import these images into a photo editing suite. Since the final output will be on a standard A4 / 8.5" x

11" printer paper, start by opening your photo editing software and opening a new document set to your printer

16


paper size. Then, import the profile and portrait pictures of your subject onto new layers and resize them to fit

your workspace. We'll resize them again after merging the faces together.

Step 2: Adjust Levels + Align Images

Using your photo editor trim away any background so that you are left with just the face.

After trimming, if your two pictures have different lighting adjust the lighting levels (ctrl+L in most applications)

Using the eye as a level, align the two images so the features match up from the profile to the portrait (eyes,

mouth, nose all aligned). Almost all photo editors have a ruler function, these help keep things true.

Step 3: Crop Profile

To merge the two faces together you'll need to remove the face portion of the profile image. Make a selection to

eye on the profile (picture 1) and delete the face (picture 2). Then, move the profile picture to one side of the

portrait to match the location of the eyes (picture 3).

Step 4: Erase Profile Edge

Select the erase tool and set it to a soft brush. Erase the edge of the profile picture where the two faces meet.

Changing the opacity of the eraser you can work the brush to feather away some of the details and blend the two

images.

Step 5: Copy Profile

With one side completed, make a copy/duplicate of the profile and paste to a new layer. Flip the copy horizontally

and move over to the other side of the portrait picture.

You may need to adjust the levels of the duplicate layer to match the portrait, and use the eraser tool again to

feather away portions of the duplicate profile to blend into the portrait.

Don't worry too much about the chin and neck, these will be cropped out of the picture when we're ready to print.

You should have a reasonable version of a flattened head.

Step 6: Merge and Resize

When you are satisfied with the layer placement, blending, and lighting levels, merge your layers together. Next,

resize the image to fit your paper space. You can enlarge your image to crop out the neck and top of the head, or

you can work more brush magic in these areas; such as with the clone stamp tool, or prediction tool (depending

on your photo editor)

Step 7: Save File + Print

After saving my image I printed it out. There should be an option in your print dialogue box that enables you to

fill the page with your image, this will be "fit to media" or something to that effect.

When I printed mine it printed with a small white margin. Since I wanted just the image I used a paper cutter to

trim off the white border.

17


If you want to use it I've included a PDF of my flattened head image below.

Step 8: Laminate

Since this image will be submerged it needed to be laminated so it wouldn't disintegrate. Most people don't have a

lamination machine at home, but your local school, office supply store, library, or copy centre likely has one that

you can use. Lamination costs about $1 a sheet.

Step 9: Prepare Jar

You'll need a jar large enough to hold your picture. I got this 5 litre glass jar at my local hardware store for $15.

Filling the jar about halfway with water, I used a mix of yellow, orange, and green liquid food dye I tinted the

water to resemble a preserving solution. Just like in the vintage science fiction movies.

Step 10: Put Head in Jar

Curling the laminated printout to fit through the jar neck the sheet was inserted, the jar was then topped off with

water until full. The jar was then sealed. The head in a jar was now ready to be placed inside the fridge to prank

hungry foragers.

Step 11: Place in Fridge

Place jar into fridge. Maybe you hide it behind a few items so that a person has to be digging to find it, or maybe

you leave it right up top to scare people as they initially open the fridge.

18


Since the solution reminded me of brine solution I decided to add a few hard boiled eggs to my head jar for fun.

Have fun scaring your friends with a head in a jar!

My Final Thoughts

There you have it, your own head in a bottle I made mine lil redder,

it excite me! Happy Halloween, I’ll see you in your dreams!!!

Rodrigo Esperanza

19


Windows Shortcuts and Hidden Applications

Verified by Nomar Shaw

There are many Windows shortcuts that may help you save time and operate more

efficiently to get work done. Type the keys:

1. Windows Key+F=Start a Search

2. Windows Key+M=Minimize all currently

open windows.

3. Ctrl+C=Copy

4. Ctrl+X=Cut

5. Ctrl+V=Paste

6. Alt+Esc=Switch between applications.

7. Windows Key+D=Hide/display all windows.

8. Alt+F4=Exit the current window or

application.

9. Windows Key+F1 or just F1=Open

Windows help.

10. Shift+Delete=Permanently delete a file.

11. Alt+Enter=Display the properties of a file.

12. F5=Refresh a window.

13. Shift=Stops a CD from playing in

Windows Media Player when you put it into

the CD drive.

14. Open My Computer=Windows Key+E

15. Windows Key+U=Open Utility Manager

20


Hidden Applications In Windows

1. Press the Windows key and R. Type in and press enter for:

2. cmd-command prompt

3. devmgmt.msc-Device Manager

4. winword-Microsoft Word (if it is installed on your computer)

5. notepad

6. wordpad

7. calc-Windows calculator

8. wmplayer-Windows Media Player

9. control-Control Panel

10. cleanmgr-Disk Cleanup

11. dxdiag-Direct X Testing

12. iexpress-Create a self-installing package

13. mplay32-Old version of Windows Media Player

14. perfmon-System Performance Monitor

15. regedit-Registry Editor

16. sndvol32-Volume Control

17. telnet-Microsoft Telenet

18. msconfig-Computer Configuration Settings

21


To Windows 98se

Or

To Not Windows 98se

That is The Question!

By Peter Nadal, contributing writer/CE Magazine

I get all types of requests from

customers who want this put in, that

put in this, can you do this or that, I

know its old but, and the usual answers

are Nope, to old, no you can’t run that

in this, but, sometimes I will say I'm not

sure or yes it can. Well this built fell into

the "I'm not sure" answer.

My customer a long time friend request

me to build a Windows 95 and Windows

98 machines, why you ask, well I assume it’s for his little kids. Windows 95 was dead issue, but,

98se was very promising. The machine victim was an old Dell Dimension 2400 that was made for

XP Home edition, a good machine to start the reanimation of Windows 98se. If it’s starting to

sound like the 1930 Frankenstein movie script well let me say this…. IT WAS CLOSE!!

Now the Dell 2400 was in great shape and I was glad for less work, why you ask? Well a good

working machine means less time and will save the

customer money which means repeat business. Now

Windows 95 was made for isa slots, see picture to the

left, where Windows 98se was made for pci and isa, you

get the picture! Well,1 st problem solved now number 2

and gets to be THE GREAT DRIVER HUNT.

Now for you fine folks don’t understand what a driver

is, it’s a piece of software (program) that tells the

operating system, hence Windows 98se, how to

operate the hard drive, CD Rom, floppy drive, monitor and so on. The manufacturer makes

these drivers and includes them in CD or a floppy when you buy the computer, simple enough

eh, NOT!!! After x number of years all support disappears from their products so you can go out

and buy a new one! Getting the picture!

22


But, there are those out there that insist on us techs to play Dr Frankenstein and revive the

DEAD COMPUTERS, sorry got carried away for a bit. The reassembly is straight forward

with reusable CD rom, Hard Drive, floppy, memory sticks, key board and mouse all from my

salvage/reusable bin which all techs have. NOW! The fun begins THE GREAT HUNT FOR THAT

ELUSIVE DRIVER it’s somewhere on the planet earth, but, being Dr Frankenstein I will find a

similar driver and convince the Dell its one of its own, yessss, it will work!!!! Ah, sorry this whole

Halloween thing is getting a grip on me. Well, after a week of searching, all the drivers are

installed and working I broke out from my archive oldie but goodie programs and Mozilla Firefox

®, by the way, they still support Win 98se. The old computer came back to life along with surfing

internet capabilities!

23


Un mensaje de Víspera de Todos los Santos

En este Víspera de Todos los Santos, todos ustedes, padres, hermanos y hermanas

mayores, caminen con los pequeños, examinen todos los dulces y respeten las

propiedades de las personas. Si ves a un grupo preguntar, si puedes unirte recuerda la

seguridad en los números. ¡Disfrútense y tengan una maravillosa noche de Víspera

de Todos los Santos!

Del director de Forest Manner Neighborhood watch

24


A Halloween Message

On this Halloween, all you parents, big brothers and sisters please walk

with the little ones, examine all candies and respect people’s properties. If

you see a group ask them if you can join them, remember safety in

numbers. Enjoy yourselves and have a wonderful Halloween night!

From the Director of Forest Manner Neighborhood watch

A public message from FMNW and Computer-Ease

Art work done with Corel 12 Photo-Paint

25


By Diane G is one of our writers/reporters at large

The first few years you let your kids go trick-or-treating on their own,

you’ll probably be a little nervous. But with all the safety apps available

at your fingertips today, peace-of-mind is just a download or click away.

For example:

Download a free flashlight app so your child‟s device can be used for easy

navigation along dark streets.

Track your trick-or-treater with a location-based service, like AT&T

FamilyMap, which lets you track the location of your child‟s device on an

interactive map from your smartphone, PC or tablet.

The Spy Tec STI GL300 Mini Portable Real Time GPS Tracker will let you

keep tabs on their location in real-time, and you can even set up geofence

alerts so you'll know if the stray from the neighborhood. You can get it at

Amazon for $49.95!

Take your haunted house to the next level with some eerie tunes.

Google Home and Alexa work with Spotify, so you can tell it “play my

Halloween playlist” and it‟ll start blasting your favorite frightful tunes. If you

don‟t have time to make your own playlist, Spotify has plenty to choose from.

You can even hook up your Echo Dot to a few Sonos speakers to fill the

whole house with a nice ominous vibe.

Give Your Crib a Creepy Hue

Ditch your old school bulbs, and install a couple of Philips' color-changing

LED lights to give your house a creepy vibe for your poppin‟ Halloween party.

Using Philips Hue bulbs, you can paint any room in whatever spooky color

you choose and tell your voice assistant of choice to change the lighting

whenever you feel like scaring the neighbors. Plus, using apps like Sync My

Lights and Hue Disco, your lights can sync to whatever scary movie or tune

26


you're enjoying. If you use Hue bulbs outdoors, you can give your home an

ominous lighting scheme at the touch of a button.

Fog Me Up

Wanna impress your guests? Set up an automated fog machine to give your

house a more ghostly vibe. Just cop a Wemo Insight Switch or two, plug „em

in, and set up a voice trigger so your smart speaker can let some fog loose

when those trick-or-treaters show up.

Listener Beware, You’re in For a Scare

Once you‟ve got your decoration situation all sorted out, take a seat, kick

back, and have Alexa play your favorite horror audio book from Audible.

Might we suggest a bone-chilling collection of Edgar Allan Poe stories read

by none other than Vincent Price.

Be aware they are everywere!!!!

Have a ghostly Halloween!

27


Computer Magazine From The Past!

$1.65 in US dollars at today’s exchange rate!

28


This space reserved

for the Nanomites 128

project, stay tuned.

This may take a while!

29


Product: Amstrad PPC 512/640 Price: From £399 Released: 1988

Specifications

Processor: NEC V30 (8MHz)

Memory: 512Kb (at launch) or 640Kb

Size: 450 x 230 x 100mm (closed)

Weight: 6kg

Screen: 640 x 200-pixel greyscale LCD with CGA emulation

Storage: One or two 3.5in, 720Kb floppy disk drives

Other notables: Built-in modem (up to 2,400bps/V22bis)

This was a very sweet computer at the time, battery powered when on the go, the

boss still has some of the original software too.

Chow For Now

Thank for reading CE Magazine

Nanomites!

30

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!