13.11.2017 Views

ce magazine november issue

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Michigan City Indiana<br />

Vol. 3<br />

Hackers compromised<br />

free CCleaner<br />

How to set up and<br />

use ES File Explore<br />

on your <strong>ce</strong>ll phone<br />

1


Thanks to all who contributed to CE<br />

Magazine. Have an article you would like<br />

contribute? You can mail it to:<br />

CE, P.O. Box 8619<br />

Michigan City In 46360<br />

Or E-Mail it to<br />

computerease@juno.com<br />

CE Magazine is part of OtherSide Ministries © all rights<br />

reserved<br />

Founder & Chief Editor<br />

Peter Nadal<br />

Editor<br />

Pamela Kennoy<br />

Art & Design<br />

Peter Nadal<br />

In our November Issue Vol. 3<br />

5 Hey Pete! On this <strong>issue</strong> “How to set up<br />

and use ES File Explore on your <strong>ce</strong>ll<br />

phone.”<br />

12 Scam Alert by Rodrigo Esperanza<br />

15 Biz Cards board!! Hey its free<br />

16 Secret Scroll Tip<br />

17 Protecting Seniors online from scams,<br />

Hacks and tax fraud by NewsUSA<br />

19 Cheap vs. Frugal by Nomar Shaw<br />

24 Hackers compromised free CCleaner<br />

article by Joseph Menn<br />

28 Come a Long Way Baby!<br />

Our Writers<br />

Rodrigo Esperanza<br />

Nomar Shaw<br />

Diane G<br />

Outside Sour<strong>ce</strong>s On This Month <strong>issue</strong><br />

NewsUSA<br />

Cyber Risk<br />

Front Cover<br />

River bridge autumn reflection park<br />

Additional artwork and fonts by<br />

Peter Nadal<br />

Original Computer-Ease logo ©<br />

2


We had a lot of fun with the Halloween Special Edition and it was a great hit with you folks<br />

and I thank you. The November <strong>issue</strong> front cover sets the tone and mood of this <strong>issue</strong> and if you<br />

want to know where we got it, go to Google and search for “River Bridge Autumn Reflection<br />

Park” then click on images. VuNature.com is the site that has it and some more you may like<br />

and if you noti<strong>ce</strong>d we flipped the picture around your right, we did it for better effect on the<br />

front cover.<br />

As a vet I do give thanks for their servi<strong>ce</strong>, I do it especially when I go to the VA Clinic. If you<br />

know a vet in your neighborhood, invite him or her over for Thanksgiving and let‟s <strong>ce</strong>lebrate<br />

Thanksgiving the American Way by watching and caring for those who served and keeps<br />

freedom ringing and don‟t forget our boys and girls in blue!<br />

Now for those who have loved ones in the servi<strong>ce</strong> and want to share Thanksgiving with them,<br />

here is a novel approach: Pack a box with all the trimmings and send it out including a letter<br />

with some instructions; “When you get this Thanksgiving in a box call me via video phone<br />

when you are ready and will have Thanksgiving together!” for iPhone use Fa<strong>ce</strong>time.<br />

From my home and staff to your family, have great<br />

Thanksgiving and May Pea<strong>ce</strong> duel in your home.<br />

From:<br />

Peter Nadal, Pam Kennoy, Rodrigo Esperanza, Nomar Shaw<br />

and Diane G<br />

3


Simper Fi!<br />

To all veterans we thank you for your servi<strong>ce</strong><br />

4


How do you do that!<br />

If you are always on the move and going from your home computer to offi<strong>ce</strong><br />

computer and have no time to carry cables to plug in to transfer documents, picture<br />

etc, then I got a great hint for you. Whether its iPhone or Android phone there is a<br />

app called ES File Explore and not only does it allow you to go into your files on<br />

your phone, but, it also lets you hook up to your computer to swap files without<br />

cables. Now you can get this lil jewel on Play Store for android or APP Store for<br />

iPhone and here is the app logo;<br />

It will work from Windows xp pro to Windows 10, now, this „how do‟ is about<br />

Windows 10 and how to set it up to work and share with ES File Explore as<br />

Windows 10 is to say the least is stubborn.<br />

Step One<br />

Go to the bottom left side and press windows logo and when to menu pops up<br />

press the settings gear wheel (red circle). The windows stetting<br />

window will open up, from there you will select ACCOUNTS<br />

(red circle) see picture 2 on next page, go ahead and select it.<br />

5


Picture 2<br />

Step two<br />

If you see this then exit out this window as your good and you can go to step three.<br />

Picture 3<br />

6


But, if you see this;<br />

Then sign into your local account instead of being logged into Microsoft<br />

account. Windows 10 will guide you if you don‟t have a password to sign in to<br />

create one then Windows will log off. Re log in and now Microsoft won‟t have their<br />

grubby fingers in your computer, you have control now.<br />

Step three<br />

Go to the bottom right side of the screen and you will see your wifi bars or a lil<br />

screen for network cable.<br />

Left click on it then a small menu appears like the picture above, click on „Open<br />

Network and Sharing Center‟ as seen in picture 5.<br />

7


Picture 5<br />

Now, go up to the left side and select „Change advan<strong>ce</strong>d sharing settings‟ (red<br />

circle).<br />

Picture 6<br />

Click on „Guest or Public (current profile)‟ (red arrow) button and if it matches<br />

picture 6 then move on to „All Network‟ see picture 7<br />

8


Picture 7<br />

In All Networks (red arrow) do the same thing, match your settings as seen in<br />

picture 7, if no changes were done then close the window by clicking the x at the<br />

top right hand side, but, if have done changes the „Save changes‟ will be lit, so, go<br />

ahead and click on it and now Windows 10 is ready to share with ES File Explorer,<br />

go to step four.<br />

Step Four<br />

Now the last few settings we need to do on ES File Explore, tap in the ES app on<br />

your <strong>ce</strong>ll to bring up Es File Explore. In ES File Explorer tap the 3 lines icon in the<br />

upper-left hand corner, see picture 8<br />

9


Picture 8<br />

Picture 9<br />

Then navigate to network and<br />

tap on it then tap on Network.<br />

Then tap on search to find<br />

your computer on your<br />

network as seen on the right<br />

picture. When you see your<br />

computer you can can<strong>ce</strong>l the<br />

search or let it finish the<br />

search.<br />

Picture 10<br />

10


Step Five<br />

On<strong>ce</strong> the search is done go ahead and tap on your<br />

computer. As seen in the picture on the left log in<br />

and check „Remember password‟ click ok. Now<br />

you have ac<strong>ce</strong>ss to your computer files, your<br />

main file will say „Users” tap on it and you will<br />

see your personal file along with Public,<br />

Administrator, Default, Default User and All<br />

Users.<br />

Now, I know what you‟re going to say, “I got<br />

cables!” yes you do, however, this beats carrying<br />

cables around all the time. You can now tap in to<br />

your offi<strong>ce</strong> computer, kids‟ computers, or your<br />

laptop as long they are connected to a router.<br />

11


By Rodrigo Esperanza<br />

In today's world when it comes to Computers & Smartphone‟s one has to be very<br />

careful. "Why?" You ask! There is a scammer in every turn of the corner. You<br />

might get the following in your E-Mail which I did!<br />

"Dear Sir/Madam,<br />

I am Joseph, Business Development Manager.<br />

We are an India based Website designing/application development company with our primary<br />

focus on making websites that are easy to update and manage, such as Shopping carts and<br />

Content Management Systems.<br />

We have our competency in CMS (Joomla, Modx, Mambo and other quality Content<br />

Management System) and e-commer<strong>ce</strong> website.<br />

We offer dedicated developers for as low cost. The developers would assist you to get desired<br />

web solutions with impeccable standards of work. You can hire developer from us Web<br />

Development, AJAX Development, XML Development, Wordpress Development, Joomla<br />

Development, CMS Development, eCommer<strong>ce</strong> Development, Magento Development, X-Cart<br />

Development and Mambo Development, PSD To HTML/XHTML/HTML5 Designing, Template<br />

Design, Landing Page, Jquery, Emailer Design and Flash Logo Design.<br />

As many as 90% websites do not bring business to their potential because they do not appeal to<br />

the target audien<strong>ce</strong>. And the reason most visitors leave a website is because of a complex<br />

design and navigation<br />

12


With an experien<strong>ce</strong> of developing more than 2500 websites suc<strong>ce</strong>ssfully, we can help you earn<br />

more business from your website if you are ready to redesign your website. Most of our clients<br />

have benefited from our expertise. Most firms from UK, USA, Canada and Australia overseas<br />

have achieved a significant amount of savings by outsourcing either complete or part of their<br />

work to us in India.<br />

With more than 50 developers working for us, we offer:<br />

- Redu<strong>ce</strong>d cost<br />

- Flexibility<br />

- Freedom<br />

- Assured deliverability<br />

- Ease of communication<br />

- Greater control over time management.<br />

We wish you the best of luck and looking forward to a long and healthy business relationship<br />

with you.<br />

Contact us today to know more about our Web design, re-design, development and CMS<br />

Servi<strong>ce</strong>s and about our past work details, Client Testimonials, Packages?<br />

Getting started is easy. Just mail us at Joseph@creative-webmarketing.info and we will<br />

definitely help you to achieve your business goals and objectives.<br />

Please share your Skype id and contact number to make the communication easily assessable.<br />

I look forward to your reply.<br />

Best regards<br />

Joseph<br />

Designing & Development Department<br />

Email: Joseph@creative-webmarketing.info"<br />

If you do get something like this, then look for the disclaimer below the email.<br />

If you see one most likely then it is a scam, even thou it may look legit. These<br />

email disclaimers are tagged on by your email provider like the example 1.<br />

13


Example 1;<br />

Disclaimer:<br />

The CAN-SPAM Act of 2003 (Controlling the Assault of Non-Solicited Pornography and<br />

Marketing Act) establishes requirements for those, who send commercial email, spells out<br />

penalties for spammers, and companies whose products are advertised in spam if they violate<br />

the guidelines, and gives consumers the right to ask emailers to control it. The above mail<br />

Joseph@creative-webmarketing.info and we ensure you will not re<strong>ce</strong>ive any such mails.<br />

In an average month I get around 15 every two or three days, I try to educate a lot<br />

of my friends about these email scams and also phone scams. If you need a web<br />

site, blog site or some sort of computer repair then 'PLEASE' contact your local<br />

computer tech.<br />

For any questions; email us at computerease@juno.com<br />

14


end your biz card in pdf to computerease@juno.com or mail to Computer-Ease, Po BOX 8619<br />

Michigan City In 46360<br />

15


Secret Tip Scroll<br />

This time of the year hacking computers or <strong>ce</strong>ll<br />

phones, scams, frauds, and any other despicable acts<br />

are high, so here are some tips to keep you safe.<br />

1. When you go Christmas shopping turn off your<br />

Wifi and your Bluetooth. This is done through the<br />

settings app of your <strong>ce</strong>ll phone.<br />

2. If you go to Chicago the potential of being<br />

hacked on your <strong>ce</strong>ll phone on a scale of 1-10 it’s<br />

going to be 100 that you will get hacked. The<br />

best solutions turn your phone off.<br />

3. Keep your <strong>ce</strong>ll phone, not in your purse but invest<br />

in a pocket for a bra, if you’re a man take it off<br />

the clip and keep it in your front pocket.<br />

Be Safe, do not shop alone especially at night time.<br />

Don’t believe every notification about your<br />

computer, Call your computer tech<br />

16


Protecting Seniors Online from<br />

Scams, Hacks and Tax Fraud<br />

Share |<br />

NewsUSA - The vast majority of seniors today are using the<br />

Internet at least on<strong>ce</strong> a week to check email, pay bills online and<br />

keep in touch via social media. But all that time online puts<br />

them at risk for scams and hacks, such as tax fraud.<br />

In fact, a new survey by Home Instead, Inc., franchisor of the<br />

Home Instead Senior Care network, found that 67 per<strong>ce</strong>nt of<br />

surveyed older adults have been the victim of an online scam or<br />

hack.<br />

Encouraging seniors to practi<strong>ce</strong> cyber security can go a long way toward protecting<br />

their identity and sensitive financial information. Home Instead collaborated with<br />

the National Cyber Security Allian<strong>ce</strong> to create Protect Seniors Online, available at<br />

www.ProtectSeniorsOnline.com, a free resour<strong>ce</strong> that educates older adults about<br />

cybersecurity. Here, seniors can test their cybersecurity skills with the "Can You<br />

Spot an Online Scam?" quiz.<br />

Older adults can take the following steps now to protect themselves online:<br />

*Password protect and secure devi<strong>ce</strong>s, accounts. Lock all devi<strong>ce</strong>s (including<br />

computers, tablets and smartphones) with secure passwords in case devi<strong>ce</strong>s are lost<br />

or stolen.<br />

*Think before clicking. When fa<strong>ce</strong>d with an urgent request -- like emails asking for<br />

money -- think before clicking or get a second opinion. Clicking on links is often<br />

how scammers get personal information. When in doubt, trash an unusual message.<br />

*Share with care. More than half (51 per<strong>ce</strong>nt) of seniors surveyed by Home Instead<br />

use social media to stay connected. Use care when sharing personal information,<br />

17


adjust privacy settings to limit who can see your information, and turn off location<br />

sharing.<br />

*Use security software: Install anti-virus and anti-spyware software and program it<br />

to run regularly. And be wary of pop-up ads or emails, many of which contain<br />

malware that can infect computers.<br />

*Log out: Log out of all apps and websites when you are finished. Leaving apps<br />

and websites open on computer screens could make you vulnerable to security and<br />

privacy risks.<br />

*Recommend support: Older adults who live alone may need help from a trusted<br />

sour<strong>ce</strong> -- such as a family member, tech-savvy friend or professional caregiver --to<br />

serve as a second set of eyes.<br />

To explore additional Protect Seniors Online resour<strong>ce</strong>s, including the interactive<br />

quiz, visit www.ProtectSeniorsOnline.com<br />

A Home Instead offi<strong>ce</strong> near you can be found by visiting<br />

www.homeinstead.com/state.<br />

18


The Frugal Way Part 1!<br />

A<strong>ce</strong>r Aspire R1600 & Windows 8.1, Marriage Made In Heaven?<br />

By Nomar Shaw, contributing writer/CE Magazine<br />

This article “A<strong>ce</strong>r Aspire R1600 & Windows 8.1, Marriage Made In Heaven?”<br />

originally was written by my boss, Peter Nadal. Having an A<strong>ce</strong>r Aspire R1600 I<br />

fallowed his upgrade and I could not been happier. Mounting an A<strong>ce</strong>r R1600 to a<br />

Monitor The Frugal Way Part 2! Is my contribution to this upgrade hack, so, if you<br />

have one collecting dust this article is for you!<br />

Part 1 is for an average knows how.<br />

As you can see below A<strong>ce</strong>r Aspire R1600 (1st generation) on its mount, figure 1 is<br />

what it looks in side. The Aspire R1600 intended for offi<strong>ce</strong> environment, but, it<br />

grew in popularity with all us computer nuts. It came with;<br />

1: Intel Atom 230 pro<strong>ce</strong>ssor (1.6<br />

GHz)<br />

2: 1 GB of RAM<br />

3: NVIDIA ION graphics<br />

motherboard<br />

4: 802.11 Wifi (this was optional)<br />

5: 160 Gig Hard Drive<br />

6: Windows XP Pro<br />

19


Mine as you can see in Figure 1 has 4 gig of ram and Wifi card added, by the way, it<br />

uses the same Wifi cards that most laptops have which makes it real easy to find.<br />

My R1600 came from a very good friend/customer whom I upgrade to a new<br />

Figure 1<br />

Laptop. The 1st thing that I did was to max out the memory and plug in a Wifi card<br />

(Wifi card is above the hard drive) from one of my parts laptop. Make sure you<br />

tape the antenna wires to the front lid and away from the fan intake as seen in<br />

figure 2 (note: I rewired the antenna in different way sin<strong>ce</strong> that picture).<br />

Figure 2<br />

20


Now as you can see there is no DVD Rom, but, no problem for me as all my<br />

Windows (ex<strong>ce</strong>pt XP & Windows 8 & 8.1) install disks are mounted on thumb<br />

drives. Windows 7 home premium got installed without a hitch and I used XP<br />

drivers on the ones the Win 7 could not find. It worked great especially Djing and<br />

Karaoking for private parties and at the house, BUT, on the slow side and an<br />

overheating problem. I ran it for a year till 8.1 showed up, so, by this time I had to<br />

migrate all music and karaoke files along the dj software to a medium size desktop<br />

that I build specifically for djing. So, the R1600 became the bar computer and what<br />

better time to find out how good is windows 8.1, will the old girl run smooth? Will<br />

it over heat?<br />

VERDICT!<br />

I have to eat my cynical words about 8.1, its way better then 8, Aspire R1600 and<br />

Win 8.1 is most definitely a marriage made in heaven. Win 8.1 has a small foot<br />

print compared to win 7 and because of the small foot print, small computers like<br />

the Aspire R1600 run smoothly with it. But, some tweaking to win 8.1 has to be<br />

done to get her to run ni<strong>ce</strong>. The driver’s for the NVIDIA ION graphic card is hard to<br />

find. Win 7 took the XP Driver without a fuss and this is because win 7 has most of<br />

XP coding, win 8.1 does not. A visit to Nvidia web site produ<strong>ce</strong>d the 32 bit driver, a<br />

word of warning, though the Aspire r1600 can run 64 bit with no problem, finding<br />

a 64 bit nvidia graphic driver for win 8.1 is a dead <strong>issue</strong>, stick to the 32 bit version<br />

of any windows you install.<br />

UPDATE! Sin<strong>ce</strong> this article from a few yrs ago Peter re-did the A<strong>ce</strong>r to Windows 10<br />

and his opinion is two thumbs up. As you can see wifi works great, picture below,<br />

21


Mounting an A<strong>ce</strong>r R1600 to a Monitor<br />

The Frugal Way Part 2!<br />

I have been told I'm cheap! Raised by a Jewish step Mom the proper word is FRUGAL!<br />

I have this A<strong>ce</strong>r R1600 that I up graded to windows 7 (I decided to not to go Windows<br />

10, but, to stay Win 7 home), bump up the memory to 4 gb and installed a laptop<br />

wireless card with a interior antenna. And wanted to mount it behind a LCD Monitor,<br />

but, the mounts made for A<strong>ce</strong>r R1600 series range from $19 to $45 (plus shipping) and<br />

frankly money is tight, so..... I went to the bench and let the mind jui<strong>ce</strong>s work.<br />

After a few "prototypes" came up with the easiest way to mount it...<br />

Blank PC Case Brackets!<br />

22


As you see by the pictures its straight forward, just pla<strong>ce</strong> the bend of the bracket in the<br />

fa<strong>ce</strong>plate grove and mark it. Bend it(see note), drill a hole (as seen in the picture 1 & 2)<br />

and screw it in. Angle it as seen in picture one & two then slide the A<strong>ce</strong>r in. As for the<br />

cables I round them then tied them up with twisty ties<br />

Note: Take the two brackets the part that is already bent and slide it in the front grove then mark<br />

where you need to bend it to create the pocket<br />

23


A CE MAGAZINE HEADS UP!!!<br />

THIS IS A MUST READ, IF YOU’RE NOT SURE HOW TO FIND OUT IF<br />

YOU GOT HACKED VIA CCLEANER THEN GET HOLD OF YOUR<br />

COMPUTER TECH!<br />

#Cyber Risk<br />

September 18, 2017 / 3:39 AM / 2 months ago<br />

Hackers compromised free CCleaner software,<br />

Avast's Piriform says<br />

Joseph Menn<br />

4 Min Read<br />

SAN FRANCISCO (Reuters) - Hackers broke into British company Piriform Ltd’s free<br />

software that optimizes computer performan<strong>ce</strong> last month, potentially allowing<br />

them to control the devi<strong>ce</strong>s of millions of users, the company and independent<br />

researchers said on Monday.<br />

FILE PHOTO: A man holds a laptop computer as cyber code is projected on him in<br />

this illustration picture taken on May 13, 2017. REUTERS/Kacper<br />

Pempel/Illustration/File Photo<br />

24


More than 2 million people downloaded tainted versions of Piriform’s program,<br />

which then directed the computers to get instructions from servers under the<br />

hacker’s control, Piriform said.<br />

Piriform said it worked with law enfor<strong>ce</strong>ment and cut off communication to the<br />

servers before any malicious commands were detected. This came after security<br />

researchers at Cisco Systems Inc (CSCO.O) and Morphisec Ltd alerted Piriform’s<br />

parent Avast Software of the hack last week.<br />

The malicious program was slipped into legitimate software called CCleaner, which<br />

cleans up junk programs and advertising cookies to speed up devi<strong>ce</strong>s.<br />

CCleaner is the main product made by London’s Piriform, which was bought in July<br />

by Prague-based Avast, one of the world’s largest computer security vendors. At<br />

the time of the acquisition, the company said 130 million people used CCleaner.<br />

A version of CCleaner downloaded in August and September included remote<br />

administration tools that tried to connect to several unregistered web pages,<br />

presumably to download additional unauthorized programs, security researchers<br />

at Cisco’s Talos unit said.<br />

Talos researcher Craig Williams said it was a sophisticated attack because it<br />

penetrated an established and trusted supplier in a manner similar to June’s<br />

“NotPetya” attack on companies that downloaded infected Ukrainian accounting<br />

software.<br />

“There is nothing a user could have noti<strong>ce</strong>d,” Williams said, noting that the<br />

optimization software had a proper digital <strong>ce</strong>rtificate, which means that other<br />

computers automatically trust the program.<br />

In a blog post, Piriform confirmed that two programs released in August were<br />

compromised. It advised users of CCleaner v5.33.6162 and CCleaner Cloud<br />

v1.07.3191 to download new versions. A spokeswoman said that 2.27 million users<br />

had downloaded the August version of CCleaner while only 5,000 users had<br />

installed the compromised version of CCleaner Cloud.<br />

25


Piriform said that Avast, its new parent company, had uncovered the attacks on<br />

Sept. 12. A new, uncompromised version of CCleaner was released the same day<br />

and a clean version of CCleaner Cloud was released on Sept. 15, it said.<br />

Only the cloud version could be updated automatically to remove the bad code.<br />

The nature of the attack code suggests that the hacker won ac<strong>ce</strong>ss to a machine<br />

used to create CCleaner, Williams said.<br />

CCleaner does not update automatically, so those who installed the problematic<br />

version will need to delete it and install a fresh version, he said.<br />

He also recommended running an antivirus scan.<br />

Williams said that Talos detected the <strong>issue</strong> at an early stage, when the hackers<br />

appeared to be collecting information from infected machines, rather than forcing<br />

them to install new programs.<br />

Piriform said in a news release that it had worked with U.S. law enfor<strong>ce</strong>ment to<br />

shut down a server located in the United States to which traffic was set to be<br />

directed.<br />

It said the server was closed down on Sept. 15 “before any known harm was<br />

done.”<br />

Avast said little about the breach, posting nothing on its Twitter account in the 12<br />

hours after the announ<strong>ce</strong>ment and displaying nothing on its main web page.<br />

Piriform’s news release and technical blog post did not mention Cisco or its<br />

partner Morphisec, instead crediting Avast with discovering the still-unexplained<br />

compromise.<br />

After the controlling web addresses were seized, Cisco saw 200,000 attempts to<br />

connect to them<br />

26


Computer Magazine From The Past!<br />

27


Come a Long Way Baby!<br />

Via Old Picture Of The Day, here's the Osborne 1, which was released in 1981.<br />

It weighed ~25 pounds, had a 5-inch screen, and cost $1,800.<br />

From this!<br />

Here's some history from Wikipedia:<br />

As the personal computer became feasible in the early 1970s, the idea of a<br />

portable personal computer followed. A "personal, portable information<br />

manipulator" was imagined by Alan Kay at Xerox PARC in 1968, [6] and described in<br />

his 1972 paper as the "Dynabook". [7]<br />

The IBM SCAMP project (Special Computer APL Machine Portable), was<br />

demonstrated in 1973. This prototype was based on the PALM pro<strong>ce</strong>ssor (Put All<br />

Logic In Microcode).<br />

28


The IBM 5100, the first commercially available portable computer, appeared in<br />

September 1975, and was based on the SCAMP prototype. [8]<br />

As 8-bit CPU machines became widely ac<strong>ce</strong>pted, the number of portables<br />

increased rapidly. The Osborne 1, released in 1981, used the Zilog Z80 and<br />

weighed 23.6 pounds (10.7 kg). It had no battery, a 5 in (13 cm) CRT screen, and<br />

dual 5.25 in (13.3 cm) single-density floppy drives.<br />

To This!<br />

29


The TRS-80 Model 100 is a portable computer introdu<strong>ce</strong>d in 1983. It is one of the<br />

first notebook-style computers, featuring a keyboard and liquid crystal display, in a<br />

battery-powered package roughly the size and shape of a notepad or large book.<br />

Display: 8 lines, 40 characters LCD<br />

Graphics: 240 by 64 pixel addressable graphics<br />

Units sold: 6,000,000<br />

Power: Four penlight (AA) <strong>ce</strong>lls, or external power adapter 6V (>180 mA)<br />

Memory: 8 KB - 32 KB (supported)<br />

Operating system: Custom dedicated runtime in firmware<br />

CPU: 2.4-MHz Intel 80C85<br />

Yep the boss has one of these too, minus the big floppy drive.<br />

Thank for reading CE Magazine<br />

Chow For Now<br />

Nanomites!<br />

30

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!