Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
Vol. 2
IT LIVES! To 98 or not 98
1
Front Cover
Halloween scene by Peter Nadal.
Some were in cover is Computer-Ease
logo ©
Thanks to all who contributed to
CE Magazine. Have an article
you would like contribute? You
can mail it to:
CE, P.O. Box 8619
Michigan City In 46360
Or E-Mail it to
computerease@juno.com
CE Magazine is part of
OtherSide Ministries © all
rights reserved
Founder & Chief Editor
Peter Nadal
Editor
Pamela Kennoy
In this issue
5 Hey Pete! On this issue
Make your own scary mask!!
9 Five signs your computer is
Infected
12 Biz Cards board!!
Hey its free
13 More virus and worms
14 Secret Scroll
15 Head in a bottle
20 Windows Shortcuts and
Hidden Applications
22 It Lives 98se Or To
Not Windows 98se
26 High Tech Halloween
Art & Design
Peter Nadal
2
Welcome to CE’s 2 nd edition. In this edition, besides the articles we have
put together, we went way out for our Halloween edition and hope you
will enjoy it and maybe get some ideas. Our 1 st edition was a success and
we give thanks to you our readers and we hope you enjoy this special
edition.
All graphics and photo shop pictures were done with Corel 12 Photo-Paint
& Windows 7 paint. Some of the background pictures were found by
doing Google search, like Halloween ghouls, Halloween Haunted
Cemeteries. When I work with photographs and do overlays, I always save
in a special folder the picture I am working on, example “Pichall1,
Pichall2” and so forth. This way if I mess up I can bring up the last picture I
saved before the screw up. Once I’m done I will save it with the word final
in the file name example Pichallfinal. Take your time, my picture above is
two overlays with some brush adjustments and it took me 3 hrs to do.
Fonts used in this special edition are Fiendish fonts and Gypsy-curse fonts
and they are free on the internet.
Now, go have fun and don’t worry on mistakes, there are some mistakes
in the graphics that were done and I left them there. A good tip for your
Halloween party is to drop a piece of dry ice in your witches brew!!
Peter!!
3
Celebrate Halloween with a Vet!
Semper Fi!
To all veterans we thank you for your service
4
Halloween is coming and it’s time to
greate your own morbid and scary
mask. here is a list of online sites you
can go to get creative and we include
sample pictures. So, go and make your
scary mask and be the scariest ghoul
in your neighborhood!! HAHAHAHAHAHA!
Picture by http://www.loverofdarkness.net/pictures/picture/194
5
https://www.pinterest.com/explore/halloween-masks/
6
http://www.instructables.com/id/Masks/
7
Pinterest https://www.pinterest.com/explore/scary-halloween-costumes/
8
Five signs your computer is infected
By Kim Komando
Published on USA TODAY on May 31, 2013
Story Highlights
Anti-spyware programs can get rid of unwanted pop-up ads
'Ransomware' is a virus that appears to be a message from law enforcement
Task Manager can help you see what programs are running on your computer
32 CONNECTTWEET 30 LINKEDINCOMMENTEMAILMORE
Oh, the not-so-humble computer virus. For decades, it's been making computer users miserable.
It's like the common cold. You'd think someone would have cured both by now. Unfortunately, it looks like
computer viruses are just getting stronger and smarter.
In the early days, a virus would delete your files and spread to other computers. It was annoying, but the effects
were easy to detect and contain.
Today, in addition to traditional viruses, there are Trojans, worms, ransomware, spyware, adware and plenty of
other "wares." The computer industry term for all this is "malware."
Even state-of-the-art computer security can't always keep up with new threats. Of course, everyone should still be
running up-to-date security programs. Fortunately, there are excellent free anti-virus, spyware and firewall
programs.
Every type of malware does something a little differently. You might not even recognize that your computer is
infected. To help you out, here are five signs you can look for.
POP-UP ADS
Running into pop-up ads while surfing the Web used to be par for the course. Thanks to pop-up blocking now
standard in modern browsers, these annoyances aren't common.
Still seeing pop-ups online from multiple sites? It could be a badly-configured browser.
Seeing pop-ups when your browser isn't even open? It's usually adware, spyware or scareware.
You can usually tell it's the last one if the pop up says "a virus was detected." It will offer you a paid program to
remove the virus. Of course, you'll just be downloading even more malware.
Your regular anti-virus might not seem to stop this. In that case, run a scan with a separate anti-spyware program.
SpyBot Search & Destroy or Ad-Aware are two you could try. These can help you get to the root of the problem.
PHANTOM MESSAGES
A dangerous feature of most malware is that it spreads. With always-on Internet, email, instant messaging and
social media available, modern viruses have it easy.
9
Once they're on your computer, they have plenty of options. You might see friends replying to email messages
you didn't send. Perhaps you notice a post on your Facebook profile you didn't write.
In most cases, these will have a tempting link. If your friends and family click the link, they're infected and the
virus spreads even further.
Keep an eye on your email "sent" folder and on your social network posts. If you see items you didn't send or
post, change your account passwords immediately. This will lock out a virus that's stolen your passwords.
Then go to work with your security software. After you've removed the virus, I'd change your passwords again,
just in case.
Be sure to let your friends and family know you were hacked. That way they can take precautions for their
accounts as well.
LOCKED COMPUTER
Having trouble taking back your account from a virus or hacker?
You're surfing the Web minding your own business. Suddenly a scary message appears. It says law enforcement
has detected illegal material on your computer. You've been locked out until you pay a fine!
Of course it's a lie. A virus has taken over and is holding your computer ransom. That's why it's commonly called
"ransomware."
Some ransomware doesn't even try to be sneaky. It tells you up front that hackers took over your system. You
have to pay to get it back.
I don't recommend paying. You won't get your computer back.
Unfortunately, you probably won't be able to run your normal anti-virus program. You'll need a rescue CD. AVG
Rescue CD or Windows Defender Online are two that could take care of the problem.
In some cases, the ransomware actually encrypts your files. If that happens, you better have a recent backup. Even
if you get rid of the virus, your files might be lost.
ESSENTIAL TOOLS AND PROGRAMS STOP WORKING
If a computer is misbehaving, most computer users hit Ctrl + Alt + Del. The "three-finger salute" lets you open up
Task Manager. This can show you what programs are causing trouble.
Sometimes, you'll hit this keyboard shortcut and nothing happens. Your Start Menu won't open. Nothing happens
when you right-click on the desktop. Your security software won't run.
This is often a clue that a virus is messing with your computer. It's doing what it can to keep you from identifying
it and removing it.
This is where deep-cleaning anti-malware software like MalwareBytes will shine. If that fails, you'll need to use a
rescue CD like I mentioned earlier.
If nothing you do works, it could also be a hardware problem. Most likely it's bad RAM or a failing power
supply.
10
EVERYTHING IS RUNNING FINE
I run into many people who don't install security software. The excuse is always the same: "But my computer
runs just fine without it. If I had a virus, I'd know."
The simple fact is that you don't know. Modern malware can hide deep in your computer without raising red
flags. It will just quietly go about its business.
There are some sneaky viruses that will remove other viruses so you don't get suspicious!
Just because a virus isn't disruptive doesn't mean it isn't dangerous. It could be snagging your passwords, sensitive
files or other vital information. The virus could be using your computer to send spam. It could even attack banks
and other organizations.
You won't know until your identity is stolen and your bank account is drained. Maybe your Internet slows to a
crawl or your service provider shuts down your connection.
Some people never figure it out. There are computers out there that have been sending spam for years. Their
owners have no clue.
That's why every computer user, even Mac users, needs up-to-date security software installed. Keep it updated
and set it to run regular, automatic scans.
And don't rely on just one program, but run a scan with several security programs at least once a month. What one
program misses other programs might find.
Kim Komando hosts the nation's largest talk radio show about consumer electronics, computers and the Internet.
To get the podcast, watch the show or find the station nearest you, visit: http://www.komando.com/listen. Email
her at techcomments@usatoday.com.
11
Send your biz card in pdf to computerease@juno.com or mail to Computer-Ease, Po BOX 8619
Michigan City In 46360
12
y Skaife, Kurtis J
Computer Viruses
A computer virus finds its way on to your computer hidden in a seemingly innocuous program. The virus is
harmless until one opens the file or runs the program containing the virus. The virus's effects can range from
simply annoying to malicious, damaging your hardware, software or files. The virus can easily spread to other
computers when one unknowingly sends infected attachments.
Computer Worms
A worm is similar to a virus but unlike a virus, a worm can replicate and spread without the computer's operator
opening the infected file. Once on a computer, a worm can make and send out hundreds of thousands of copies of
itself. One way the worm can infect others is by sending itself to every address in your email, the process will
then repeat itself from those computers. Worms often eat up a lot of a computer's memory or a network's
bandwidth. A worm can also allow others to control your computer from afar.
Trojan Horse
A Trojan Horse will appear to be useful software but once installed, it will begin infecting a computer. The
Trojan Horse may simply be annoying such as changing the computer's icons, but it may be more harmful by
deleting files and information from the computer. A Trojan Horse often opens a backdoor in the computer
allowing unauthorized access to the computer including sensitive information that can be found.
Prevention
To protect a computer one should frequently update the operating system and have anti-virus software
installed. The software should be updated frequently as well so that it can protect the computer from the latest
versions of viruses and worms. Using a firewall is also a good idea, this can be in the form of hardware or
software. The firewall is another line of defense from viruses and can prevent an unauthorized user from gaining
access to a computer.
13
Secret Tip Scroll
Windows 7, though, lets you bring up the
desktop without taking your hand off your
mouse or pointing device—but it’s not obvious
how until you stumble upon it. In the extreme
lower right portion of the screen, at the farright
edge of the taskbar, you’ll see a little
vertical rectangle with a “glossy” finish.
Hover the mouse pointer over it, and the
Windows Desktop appears, letting you inspect
it. (You’ll still see ghostly outlines of the
windows you have open.) Move the mouse off
the rectangle, and your windows reappear.
You can also activate this via a keyboard
shortcut: Windows key + spacebar.
14
By Rodrigo Esperanza
Rodrigo Esperanza is one of our writers/reporters at large
Normally I’m not a morbid Halloween guy, but, my boss, Peter is
and it rubs off on you. So my sweets here is bone chiller scream
of a Halloween décor for your Halloween bash, from the screams
archives of DYI !!
Sweet dreams!
Head in a Jar Prank: 11 Steps
Introduction: Head in a Jar
15
Prank
Hungry? Scare those fridge-bound famished food foragers with a head in a jar!
Using a photo editor, two pictures are blended together to create flat image of a head, which is then laminated and
submerged in a jar. When the flattened image in inserted into the curved jar, along with the distortion from the
water, gives the illusion of a decapitated head in a jar of preserving fluid.
Here's what you need to make your own:
Photo editing software
Large jar
food colouring
computer printer
paper lamination (also available at local print/copy store)
Making your own head in a jar is easy, but requires some photo editing skills. I've included a tutorial on how I
made mine, and took me about 30 minutes to compose. Personalizing this prank will make it more effective. But,
if you're not a pro with photo editing, you can download my flattened head image below.
wadeface.pdf
Step 1: Take Photos + Import
To make the head printout you'll need 2 pictures of a head, a profile and a portrait. With the camera at eye-level,
take a picture straight on and one from the side. Ensure your subject is well lit. Also, ask them to make a face.
Next we'll import these images into a photo editing suite. Since the final output will be on a standard A4 / 8.5" x
11" printer paper, start by opening your photo editing software and opening a new document set to your printer
16
paper size. Then, import the profile and portrait pictures of your subject onto new layers and resize them to fit
your workspace. We'll resize them again after merging the faces together.
Step 2: Adjust Levels + Align Images
Using your photo editor trim away any background so that you are left with just the face.
After trimming, if your two pictures have different lighting adjust the lighting levels (ctrl+L in most applications)
Using the eye as a level, align the two images so the features match up from the profile to the portrait (eyes,
mouth, nose all aligned). Almost all photo editors have a ruler function, these help keep things true.
Step 3: Crop Profile
To merge the two faces together you'll need to remove the face portion of the profile image. Make a selection to
eye on the profile (picture 1) and delete the face (picture 2). Then, move the profile picture to one side of the
portrait to match the location of the eyes (picture 3).
Step 4: Erase Profile Edge
Select the erase tool and set it to a soft brush. Erase the edge of the profile picture where the two faces meet.
Changing the opacity of the eraser you can work the brush to feather away some of the details and blend the two
images.
Step 5: Copy Profile
With one side completed, make a copy/duplicate of the profile and paste to a new layer. Flip the copy horizontally
and move over to the other side of the portrait picture.
You may need to adjust the levels of the duplicate layer to match the portrait, and use the eraser tool again to
feather away portions of the duplicate profile to blend into the portrait.
Don't worry too much about the chin and neck, these will be cropped out of the picture when we're ready to print.
You should have a reasonable version of a flattened head.
Step 6: Merge and Resize
When you are satisfied with the layer placement, blending, and lighting levels, merge your layers together. Next,
resize the image to fit your paper space. You can enlarge your image to crop out the neck and top of the head, or
you can work more brush magic in these areas; such as with the clone stamp tool, or prediction tool (depending
on your photo editor)
Step 7: Save File + Print
After saving my image I printed it out. There should be an option in your print dialogue box that enables you to
fill the page with your image, this will be "fit to media" or something to that effect.
When I printed mine it printed with a small white margin. Since I wanted just the image I used a paper cutter to
trim off the white border.
17
If you want to use it I've included a PDF of my flattened head image below.
Step 8: Laminate
Since this image will be submerged it needed to be laminated so it wouldn't disintegrate. Most people don't have a
lamination machine at home, but your local school, office supply store, library, or copy centre likely has one that
you can use. Lamination costs about $1 a sheet.
Step 9: Prepare Jar
You'll need a jar large enough to hold your picture. I got this 5 litre glass jar at my local hardware store for $15.
Filling the jar about halfway with water, I used a mix of yellow, orange, and green liquid food dye I tinted the
water to resemble a preserving solution. Just like in the vintage science fiction movies.
Step 10: Put Head in Jar
Curling the laminated printout to fit through the jar neck the sheet was inserted, the jar was then topped off with
water until full. The jar was then sealed. The head in a jar was now ready to be placed inside the fridge to prank
hungry foragers.
Step 11: Place in Fridge
Place jar into fridge. Maybe you hide it behind a few items so that a person has to be digging to find it, or maybe
you leave it right up top to scare people as they initially open the fridge.
18
Since the solution reminded me of brine solution I decided to add a few hard boiled eggs to my head jar for fun.
Have fun scaring your friends with a head in a jar!
My Final Thoughts
There you have it, your own head in a bottle I made mine lil redder,
it excite me! Happy Halloween, I’ll see you in your dreams!!!
Rodrigo Esperanza
19
Windows Shortcuts and Hidden Applications
Verified by Nomar Shaw
There are many Windows shortcuts that may help you save time and operate more
efficiently to get work done. Type the keys:
1. Windows Key+F=Start a Search
2. Windows Key+M=Minimize all currently
open windows.
3. Ctrl+C=Copy
4. Ctrl+X=Cut
5. Ctrl+V=Paste
6. Alt+Esc=Switch between applications.
7. Windows Key+D=Hide/display all windows.
8. Alt+F4=Exit the current window or
application.
9. Windows Key+F1 or just F1=Open
Windows help.
10. Shift+Delete=Permanently delete a file.
11. Alt+Enter=Display the properties of a file.
12. F5=Refresh a window.
13. Shift=Stops a CD from playing in
Windows Media Player when you put it into
the CD drive.
14. Open My Computer=Windows Key+E
15. Windows Key+U=Open Utility Manager
20
Hidden Applications In Windows
1. Press the Windows key and R. Type in and press enter for:
2. cmd-command prompt
3. devmgmt.msc-Device Manager
4. winword-Microsoft Word (if it is installed on your computer)
5. notepad
6. wordpad
7. calc-Windows calculator
8. wmplayer-Windows Media Player
9. control-Control Panel
10. cleanmgr-Disk Cleanup
11. dxdiag-Direct X Testing
12. iexpress-Create a self-installing package
13. mplay32-Old version of Windows Media Player
14. perfmon-System Performance Monitor
15. regedit-Registry Editor
16. sndvol32-Volume Control
17. telnet-Microsoft Telenet
18. msconfig-Computer Configuration Settings
21
To Windows 98se
Or
To Not Windows 98se
That is The Question!
By Peter Nadal, contributing writer/CE Magazine
I get all types of requests from
customers who want this put in, that
put in this, can you do this or that, I
know its old but, and the usual answers
are Nope, to old, no you can’t run that
in this, but, sometimes I will say I'm not
sure or yes it can. Well this built fell into
the "I'm not sure" answer.
My customer a long time friend request
me to build a Windows 95 and Windows
98 machines, why you ask, well I assume it’s for his little kids. Windows 95 was dead issue, but,
98se was very promising. The machine victim was an old Dell Dimension 2400 that was made for
XP Home edition, a good machine to start the reanimation of Windows 98se. If it’s starting to
sound like the 1930 Frankenstein movie script well let me say this…. IT WAS CLOSE!!
Now the Dell 2400 was in great shape and I was glad for less work, why you ask? Well a good
working machine means less time and will save the
customer money which means repeat business. Now
Windows 95 was made for isa slots, see picture to the
left, where Windows 98se was made for pci and isa, you
get the picture! Well,1 st problem solved now number 2
and gets to be THE GREAT DRIVER HUNT.
Now for you fine folks don’t understand what a driver
is, it’s a piece of software (program) that tells the
operating system, hence Windows 98se, how to
operate the hard drive, CD Rom, floppy drive, monitor and so on. The manufacturer makes
these drivers and includes them in CD or a floppy when you buy the computer, simple enough
eh, NOT!!! After x number of years all support disappears from their products so you can go out
and buy a new one! Getting the picture!
22
But, there are those out there that insist on us techs to play Dr Frankenstein and revive the
DEAD COMPUTERS, sorry got carried away for a bit. The reassembly is straight forward
with reusable CD rom, Hard Drive, floppy, memory sticks, key board and mouse all from my
salvage/reusable bin which all techs have. NOW! The fun begins THE GREAT HUNT FOR THAT
ELUSIVE DRIVER it’s somewhere on the planet earth, but, being Dr Frankenstein I will find a
similar driver and convince the Dell its one of its own, yessss, it will work!!!! Ah, sorry this whole
Halloween thing is getting a grip on me. Well, after a week of searching, all the drivers are
installed and working I broke out from my archive oldie but goodie programs and Mozilla Firefox
®, by the way, they still support Win 98se. The old computer came back to life along with surfing
internet capabilities!
23
Un mensaje de Víspera de Todos los Santos
En este Víspera de Todos los Santos, todos ustedes, padres, hermanos y hermanas
mayores, caminen con los pequeños, examinen todos los dulces y respeten las
propiedades de las personas. Si ves a un grupo preguntar, si puedes unirte recuerda la
seguridad en los números. ¡Disfrútense y tengan una maravillosa noche de Víspera
de Todos los Santos!
Del director de Forest Manner Neighborhood watch
24
A Halloween Message
On this Halloween, all you parents, big brothers and sisters please walk
with the little ones, examine all candies and respect people’s properties. If
you see a group ask them if you can join them, remember safety in
numbers. Enjoy yourselves and have a wonderful Halloween night!
From the Director of Forest Manner Neighborhood watch
A public message from FMNW and Computer-Ease
Art work done with Corel 12 Photo-Paint
25
By Diane G is one of our writers/reporters at large
The first few years you let your kids go trick-or-treating on their own,
you’ll probably be a little nervous. But with all the safety apps available
at your fingertips today, peace-of-mind is just a download or click away.
For example:
Download a free flashlight app so your child‟s device can be used for easy
navigation along dark streets.
Track your trick-or-treater with a location-based service, like AT&T
FamilyMap, which lets you track the location of your child‟s device on an
interactive map from your smartphone, PC or tablet.
The Spy Tec STI GL300 Mini Portable Real Time GPS Tracker will let you
keep tabs on their location in real-time, and you can even set up geofence
alerts so you'll know if the stray from the neighborhood. You can get it at
Amazon for $49.95!
Take your haunted house to the next level with some eerie tunes.
Google Home and Alexa work with Spotify, so you can tell it “play my
Halloween playlist” and it‟ll start blasting your favorite frightful tunes. If you
don‟t have time to make your own playlist, Spotify has plenty to choose from.
You can even hook up your Echo Dot to a few Sonos speakers to fill the
whole house with a nice ominous vibe.
Give Your Crib a Creepy Hue
Ditch your old school bulbs, and install a couple of Philips' color-changing
LED lights to give your house a creepy vibe for your poppin‟ Halloween party.
Using Philips Hue bulbs, you can paint any room in whatever spooky color
you choose and tell your voice assistant of choice to change the lighting
whenever you feel like scaring the neighbors. Plus, using apps like Sync My
Lights and Hue Disco, your lights can sync to whatever scary movie or tune
26
you're enjoying. If you use Hue bulbs outdoors, you can give your home an
ominous lighting scheme at the touch of a button.
Fog Me Up
Wanna impress your guests? Set up an automated fog machine to give your
house a more ghostly vibe. Just cop a Wemo Insight Switch or two, plug „em
in, and set up a voice trigger so your smart speaker can let some fog loose
when those trick-or-treaters show up.
Listener Beware, You’re in For a Scare
Once you‟ve got your decoration situation all sorted out, take a seat, kick
back, and have Alexa play your favorite horror audio book from Audible.
Might we suggest a bone-chilling collection of Edgar Allan Poe stories read
by none other than Vincent Price.
Be aware they are everywere!!!!
Have a ghostly Halloween!
27
Computer Magazine From The Past!
$1.65 in US dollars at today’s exchange rate!
28
This space reserved
for the Nanomites 128
project, stay tuned.
This may take a while!
29
Product: Amstrad PPC 512/640 Price: From £399 Released: 1988
Specifications
Processor: NEC V30 (8MHz)
Memory: 512Kb (at launch) or 640Kb
Size: 450 x 230 x 100mm (closed)
Weight: 6kg
Screen: 640 x 200-pixel greyscale LCD with CGA emulation
Storage: One or two 3.5in, 720Kb floppy disk drives
Other notables: Built-in modem (up to 2,400bps/V22bis)
This was a very sweet computer at the time, battery powered when on the go, the
boss still has some of the original software too.
Chow For Now
Thank for reading CE Magazine
Nanomites!
30