13.11.2017 Views

ce magazine november issue

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Michigan City Indiana<br />

Vol. 3<br />

Hackers compromised<br />

free CCleaner<br />

How to set up and<br />

use ES File Explore<br />

on your <strong>ce</strong>ll phone<br />

1


Thanks to all who contributed to CE<br />

Magazine. Have an article you would like<br />

contribute? You can mail it to:<br />

CE, P.O. Box 8619<br />

Michigan City In 46360<br />

Or E-Mail it to<br />

computerease@juno.com<br />

CE Magazine is part of OtherSide Ministries © all rights<br />

reserved<br />

Founder & Chief Editor<br />

Peter Nadal<br />

Editor<br />

Pamela Kennoy<br />

Art & Design<br />

Peter Nadal<br />

In our November Issue Vol. 3<br />

5 Hey Pete! On this <strong>issue</strong> “How to set up<br />

and use ES File Explore on your <strong>ce</strong>ll<br />

phone.”<br />

12 Scam Alert by Rodrigo Esperanza<br />

15 Biz Cards board!! Hey its free<br />

16 Secret Scroll Tip<br />

17 Protecting Seniors online from scams,<br />

Hacks and tax fraud by NewsUSA<br />

19 Cheap vs. Frugal by Nomar Shaw<br />

24 Hackers compromised free CCleaner<br />

article by Joseph Menn<br />

28 Come a Long Way Baby!<br />

Our Writers<br />

Rodrigo Esperanza<br />

Nomar Shaw<br />

Diane G<br />

Outside Sour<strong>ce</strong>s On This Month <strong>issue</strong><br />

NewsUSA<br />

Cyber Risk<br />

Front Cover<br />

River bridge autumn reflection park<br />

Additional artwork and fonts by<br />

Peter Nadal<br />

Original Computer-Ease logo ©<br />

2


We had a lot of fun with the Halloween Special Edition and it was a great hit with you folks<br />

and I thank you. The November <strong>issue</strong> front cover sets the tone and mood of this <strong>issue</strong> and if you<br />

want to know where we got it, go to Google and search for “River Bridge Autumn Reflection<br />

Park” then click on images. VuNature.com is the site that has it and some more you may like<br />

and if you noti<strong>ce</strong>d we flipped the picture around your right, we did it for better effect on the<br />

front cover.<br />

As a vet I do give thanks for their servi<strong>ce</strong>, I do it especially when I go to the VA Clinic. If you<br />

know a vet in your neighborhood, invite him or her over for Thanksgiving and let‟s <strong>ce</strong>lebrate<br />

Thanksgiving the American Way by watching and caring for those who served and keeps<br />

freedom ringing and don‟t forget our boys and girls in blue!<br />

Now for those who have loved ones in the servi<strong>ce</strong> and want to share Thanksgiving with them,<br />

here is a novel approach: Pack a box with all the trimmings and send it out including a letter<br />

with some instructions; “When you get this Thanksgiving in a box call me via video phone<br />

when you are ready and will have Thanksgiving together!” for iPhone use Fa<strong>ce</strong>time.<br />

From my home and staff to your family, have great<br />

Thanksgiving and May Pea<strong>ce</strong> duel in your home.<br />

From:<br />

Peter Nadal, Pam Kennoy, Rodrigo Esperanza, Nomar Shaw<br />

and Diane G<br />

3


Simper Fi!<br />

To all veterans we thank you for your servi<strong>ce</strong><br />

4


How do you do that!<br />

If you are always on the move and going from your home computer to offi<strong>ce</strong><br />

computer and have no time to carry cables to plug in to transfer documents, picture<br />

etc, then I got a great hint for you. Whether its iPhone or Android phone there is a<br />

app called ES File Explore and not only does it allow you to go into your files on<br />

your phone, but, it also lets you hook up to your computer to swap files without<br />

cables. Now you can get this lil jewel on Play Store for android or APP Store for<br />

iPhone and here is the app logo;<br />

It will work from Windows xp pro to Windows 10, now, this „how do‟ is about<br />

Windows 10 and how to set it up to work and share with ES File Explore as<br />

Windows 10 is to say the least is stubborn.<br />

Step One<br />

Go to the bottom left side and press windows logo and when to menu pops up<br />

press the settings gear wheel (red circle). The windows stetting<br />

window will open up, from there you will select ACCOUNTS<br />

(red circle) see picture 2 on next page, go ahead and select it.<br />

5


Picture 2<br />

Step two<br />

If you see this then exit out this window as your good and you can go to step three.<br />

Picture 3<br />

6


But, if you see this;<br />

Then sign into your local account instead of being logged into Microsoft<br />

account. Windows 10 will guide you if you don‟t have a password to sign in to<br />

create one then Windows will log off. Re log in and now Microsoft won‟t have their<br />

grubby fingers in your computer, you have control now.<br />

Step three<br />

Go to the bottom right side of the screen and you will see your wifi bars or a lil<br />

screen for network cable.<br />

Left click on it then a small menu appears like the picture above, click on „Open<br />

Network and Sharing Center‟ as seen in picture 5.<br />

7


Picture 5<br />

Now, go up to the left side and select „Change advan<strong>ce</strong>d sharing settings‟ (red<br />

circle).<br />

Picture 6<br />

Click on „Guest or Public (current profile)‟ (red arrow) button and if it matches<br />

picture 6 then move on to „All Network‟ see picture 7<br />

8


Picture 7<br />

In All Networks (red arrow) do the same thing, match your settings as seen in<br />

picture 7, if no changes were done then close the window by clicking the x at the<br />

top right hand side, but, if have done changes the „Save changes‟ will be lit, so, go<br />

ahead and click on it and now Windows 10 is ready to share with ES File Explorer,<br />

go to step four.<br />

Step Four<br />

Now the last few settings we need to do on ES File Explore, tap in the ES app on<br />

your <strong>ce</strong>ll to bring up Es File Explore. In ES File Explorer tap the 3 lines icon in the<br />

upper-left hand corner, see picture 8<br />

9


Picture 8<br />

Picture 9<br />

Then navigate to network and<br />

tap on it then tap on Network.<br />

Then tap on search to find<br />

your computer on your<br />

network as seen on the right<br />

picture. When you see your<br />

computer you can can<strong>ce</strong>l the<br />

search or let it finish the<br />

search.<br />

Picture 10<br />

10


Step Five<br />

On<strong>ce</strong> the search is done go ahead and tap on your<br />

computer. As seen in the picture on the left log in<br />

and check „Remember password‟ click ok. Now<br />

you have ac<strong>ce</strong>ss to your computer files, your<br />

main file will say „Users” tap on it and you will<br />

see your personal file along with Public,<br />

Administrator, Default, Default User and All<br />

Users.<br />

Now, I know what you‟re going to say, “I got<br />

cables!” yes you do, however, this beats carrying<br />

cables around all the time. You can now tap in to<br />

your offi<strong>ce</strong> computer, kids‟ computers, or your<br />

laptop as long they are connected to a router.<br />

11


By Rodrigo Esperanza<br />

In today's world when it comes to Computers & Smartphone‟s one has to be very<br />

careful. "Why?" You ask! There is a scammer in every turn of the corner. You<br />

might get the following in your E-Mail which I did!<br />

"Dear Sir/Madam,<br />

I am Joseph, Business Development Manager.<br />

We are an India based Website designing/application development company with our primary<br />

focus on making websites that are easy to update and manage, such as Shopping carts and<br />

Content Management Systems.<br />

We have our competency in CMS (Joomla, Modx, Mambo and other quality Content<br />

Management System) and e-commer<strong>ce</strong> website.<br />

We offer dedicated developers for as low cost. The developers would assist you to get desired<br />

web solutions with impeccable standards of work. You can hire developer from us Web<br />

Development, AJAX Development, XML Development, Wordpress Development, Joomla<br />

Development, CMS Development, eCommer<strong>ce</strong> Development, Magento Development, X-Cart<br />

Development and Mambo Development, PSD To HTML/XHTML/HTML5 Designing, Template<br />

Design, Landing Page, Jquery, Emailer Design and Flash Logo Design.<br />

As many as 90% websites do not bring business to their potential because they do not appeal to<br />

the target audien<strong>ce</strong>. And the reason most visitors leave a website is because of a complex<br />

design and navigation<br />

12


With an experien<strong>ce</strong> of developing more than 2500 websites suc<strong>ce</strong>ssfully, we can help you earn<br />

more business from your website if you are ready to redesign your website. Most of our clients<br />

have benefited from our expertise. Most firms from UK, USA, Canada and Australia overseas<br />

have achieved a significant amount of savings by outsourcing either complete or part of their<br />

work to us in India.<br />

With more than 50 developers working for us, we offer:<br />

- Redu<strong>ce</strong>d cost<br />

- Flexibility<br />

- Freedom<br />

- Assured deliverability<br />

- Ease of communication<br />

- Greater control over time management.<br />

We wish you the best of luck and looking forward to a long and healthy business relationship<br />

with you.<br />

Contact us today to know more about our Web design, re-design, development and CMS<br />

Servi<strong>ce</strong>s and about our past work details, Client Testimonials, Packages?<br />

Getting started is easy. Just mail us at Joseph@creative-webmarketing.info and we will<br />

definitely help you to achieve your business goals and objectives.<br />

Please share your Skype id and contact number to make the communication easily assessable.<br />

I look forward to your reply.<br />

Best regards<br />

Joseph<br />

Designing & Development Department<br />

Email: Joseph@creative-webmarketing.info"<br />

If you do get something like this, then look for the disclaimer below the email.<br />

If you see one most likely then it is a scam, even thou it may look legit. These<br />

email disclaimers are tagged on by your email provider like the example 1.<br />

13


Example 1;<br />

Disclaimer:<br />

The CAN-SPAM Act of 2003 (Controlling the Assault of Non-Solicited Pornography and<br />

Marketing Act) establishes requirements for those, who send commercial email, spells out<br />

penalties for spammers, and companies whose products are advertised in spam if they violate<br />

the guidelines, and gives consumers the right to ask emailers to control it. The above mail<br />

Joseph@creative-webmarketing.info and we ensure you will not re<strong>ce</strong>ive any such mails.<br />

In an average month I get around 15 every two or three days, I try to educate a lot<br />

of my friends about these email scams and also phone scams. If you need a web<br />

site, blog site or some sort of computer repair then 'PLEASE' contact your local<br />

computer tech.<br />

For any questions; email us at computerease@juno.com<br />

14


end your biz card in pdf to computerease@juno.com or mail to Computer-Ease, Po BOX 8619<br />

Michigan City In 46360<br />

15


Secret Tip Scroll<br />

This time of the year hacking computers or <strong>ce</strong>ll<br />

phones, scams, frauds, and any other despicable acts<br />

are high, so here are some tips to keep you safe.<br />

1. When you go Christmas shopping turn off your<br />

Wifi and your Bluetooth. This is done through the<br />

settings app of your <strong>ce</strong>ll phone.<br />

2. If you go to Chicago the potential of being<br />

hacked on your <strong>ce</strong>ll phone on a scale of 1-10 it’s<br />

going to be 100 that you will get hacked. The<br />

best solutions turn your phone off.<br />

3. Keep your <strong>ce</strong>ll phone, not in your purse but invest<br />

in a pocket for a bra, if you’re a man take it off<br />

the clip and keep it in your front pocket.<br />

Be Safe, do not shop alone especially at night time.<br />

Don’t believe every notification about your<br />

computer, Call your computer tech<br />

16


Protecting Seniors Online from<br />

Scams, Hacks and Tax Fraud<br />

Share |<br />

NewsUSA - The vast majority of seniors today are using the<br />

Internet at least on<strong>ce</strong> a week to check email, pay bills online and<br />

keep in touch via social media. But all that time online puts<br />

them at risk for scams and hacks, such as tax fraud.<br />

In fact, a new survey by Home Instead, Inc., franchisor of the<br />

Home Instead Senior Care network, found that 67 per<strong>ce</strong>nt of<br />

surveyed older adults have been the victim of an online scam or<br />

hack.<br />

Encouraging seniors to practi<strong>ce</strong> cyber security can go a long way toward protecting<br />

their identity and sensitive financial information. Home Instead collaborated with<br />

the National Cyber Security Allian<strong>ce</strong> to create Protect Seniors Online, available at<br />

www.ProtectSeniorsOnline.com, a free resour<strong>ce</strong> that educates older adults about<br />

cybersecurity. Here, seniors can test their cybersecurity skills with the "Can You<br />

Spot an Online Scam?" quiz.<br />

Older adults can take the following steps now to protect themselves online:<br />

*Password protect and secure devi<strong>ce</strong>s, accounts. Lock all devi<strong>ce</strong>s (including<br />

computers, tablets and smartphones) with secure passwords in case devi<strong>ce</strong>s are lost<br />

or stolen.<br />

*Think before clicking. When fa<strong>ce</strong>d with an urgent request -- like emails asking for<br />

money -- think before clicking or get a second opinion. Clicking on links is often<br />

how scammers get personal information. When in doubt, trash an unusual message.<br />

*Share with care. More than half (51 per<strong>ce</strong>nt) of seniors surveyed by Home Instead<br />

use social media to stay connected. Use care when sharing personal information,<br />

17


adjust privacy settings to limit who can see your information, and turn off location<br />

sharing.<br />

*Use security software: Install anti-virus and anti-spyware software and program it<br />

to run regularly. And be wary of pop-up ads or emails, many of which contain<br />

malware that can infect computers.<br />

*Log out: Log out of all apps and websites when you are finished. Leaving apps<br />

and websites open on computer screens could make you vulnerable to security and<br />

privacy risks.<br />

*Recommend support: Older adults who live alone may need help from a trusted<br />

sour<strong>ce</strong> -- such as a family member, tech-savvy friend or professional caregiver --to<br />

serve as a second set of eyes.<br />

To explore additional Protect Seniors Online resour<strong>ce</strong>s, including the interactive<br />

quiz, visit www.ProtectSeniorsOnline.com<br />

A Home Instead offi<strong>ce</strong> near you can be found by visiting<br />

www.homeinstead.com/state.<br />

18


The Frugal Way Part 1!<br />

A<strong>ce</strong>r Aspire R1600 & Windows 8.1, Marriage Made In Heaven?<br />

By Nomar Shaw, contributing writer/CE Magazine<br />

This article “A<strong>ce</strong>r Aspire R1600 & Windows 8.1, Marriage Made In Heaven?”<br />

originally was written by my boss, Peter Nadal. Having an A<strong>ce</strong>r Aspire R1600 I<br />

fallowed his upgrade and I could not been happier. Mounting an A<strong>ce</strong>r R1600 to a<br />

Monitor The Frugal Way Part 2! Is my contribution to this upgrade hack, so, if you<br />

have one collecting dust this article is for you!<br />

Part 1 is for an average knows how.<br />

As you can see below A<strong>ce</strong>r Aspire R1600 (1st generation) on its mount, figure 1 is<br />

what it looks in side. The Aspire R1600 intended for offi<strong>ce</strong> environment, but, it<br />

grew in popularity with all us computer nuts. It came with;<br />

1: Intel Atom 230 pro<strong>ce</strong>ssor (1.6<br />

GHz)<br />

2: 1 GB of RAM<br />

3: NVIDIA ION graphics<br />

motherboard<br />

4: 802.11 Wifi (this was optional)<br />

5: 160 Gig Hard Drive<br />

6: Windows XP Pro<br />

19


Mine as you can see in Figure 1 has 4 gig of ram and Wifi card added, by the way, it<br />

uses the same Wifi cards that most laptops have which makes it real easy to find.<br />

My R1600 came from a very good friend/customer whom I upgrade to a new<br />

Figure 1<br />

Laptop. The 1st thing that I did was to max out the memory and plug in a Wifi card<br />

(Wifi card is above the hard drive) from one of my parts laptop. Make sure you<br />

tape the antenna wires to the front lid and away from the fan intake as seen in<br />

figure 2 (note: I rewired the antenna in different way sin<strong>ce</strong> that picture).<br />

Figure 2<br />

20


Now as you can see there is no DVD Rom, but, no problem for me as all my<br />

Windows (ex<strong>ce</strong>pt XP & Windows 8 & 8.1) install disks are mounted on thumb<br />

drives. Windows 7 home premium got installed without a hitch and I used XP<br />

drivers on the ones the Win 7 could not find. It worked great especially Djing and<br />

Karaoking for private parties and at the house, BUT, on the slow side and an<br />

overheating problem. I ran it for a year till 8.1 showed up, so, by this time I had to<br />

migrate all music and karaoke files along the dj software to a medium size desktop<br />

that I build specifically for djing. So, the R1600 became the bar computer and what<br />

better time to find out how good is windows 8.1, will the old girl run smooth? Will<br />

it over heat?<br />

VERDICT!<br />

I have to eat my cynical words about 8.1, its way better then 8, Aspire R1600 and<br />

Win 8.1 is most definitely a marriage made in heaven. Win 8.1 has a small foot<br />

print compared to win 7 and because of the small foot print, small computers like<br />

the Aspire R1600 run smoothly with it. But, some tweaking to win 8.1 has to be<br />

done to get her to run ni<strong>ce</strong>. The driver’s for the NVIDIA ION graphic card is hard to<br />

find. Win 7 took the XP Driver without a fuss and this is because win 7 has most of<br />

XP coding, win 8.1 does not. A visit to Nvidia web site produ<strong>ce</strong>d the 32 bit driver, a<br />

word of warning, though the Aspire r1600 can run 64 bit with no problem, finding<br />

a 64 bit nvidia graphic driver for win 8.1 is a dead <strong>issue</strong>, stick to the 32 bit version<br />

of any windows you install.<br />

UPDATE! Sin<strong>ce</strong> this article from a few yrs ago Peter re-did the A<strong>ce</strong>r to Windows 10<br />

and his opinion is two thumbs up. As you can see wifi works great, picture below,<br />

21


Mounting an A<strong>ce</strong>r R1600 to a Monitor<br />

The Frugal Way Part 2!<br />

I have been told I'm cheap! Raised by a Jewish step Mom the proper word is FRUGAL!<br />

I have this A<strong>ce</strong>r R1600 that I up graded to windows 7 (I decided to not to go Windows<br />

10, but, to stay Win 7 home), bump up the memory to 4 gb and installed a laptop<br />

wireless card with a interior antenna. And wanted to mount it behind a LCD Monitor,<br />

but, the mounts made for A<strong>ce</strong>r R1600 series range from $19 to $45 (plus shipping) and<br />

frankly money is tight, so..... I went to the bench and let the mind jui<strong>ce</strong>s work.<br />

After a few "prototypes" came up with the easiest way to mount it...<br />

Blank PC Case Brackets!<br />

22


As you see by the pictures its straight forward, just pla<strong>ce</strong> the bend of the bracket in the<br />

fa<strong>ce</strong>plate grove and mark it. Bend it(see note), drill a hole (as seen in the picture 1 & 2)<br />

and screw it in. Angle it as seen in picture one & two then slide the A<strong>ce</strong>r in. As for the<br />

cables I round them then tied them up with twisty ties<br />

Note: Take the two brackets the part that is already bent and slide it in the front grove then mark<br />

where you need to bend it to create the pocket<br />

23


A CE MAGAZINE HEADS UP!!!<br />

THIS IS A MUST READ, IF YOU’RE NOT SURE HOW TO FIND OUT IF<br />

YOU GOT HACKED VIA CCLEANER THEN GET HOLD OF YOUR<br />

COMPUTER TECH!<br />

#Cyber Risk<br />

September 18, 2017 / 3:39 AM / 2 months ago<br />

Hackers compromised free CCleaner software,<br />

Avast's Piriform says<br />

Joseph Menn<br />

4 Min Read<br />

SAN FRANCISCO (Reuters) - Hackers broke into British company Piriform Ltd’s free<br />

software that optimizes computer performan<strong>ce</strong> last month, potentially allowing<br />

them to control the devi<strong>ce</strong>s of millions of users, the company and independent<br />

researchers said on Monday.<br />

FILE PHOTO: A man holds a laptop computer as cyber code is projected on him in<br />

this illustration picture taken on May 13, 2017. REUTERS/Kacper<br />

Pempel/Illustration/File Photo<br />

24


More than 2 million people downloaded tainted versions of Piriform’s program,<br />

which then directed the computers to get instructions from servers under the<br />

hacker’s control, Piriform said.<br />

Piriform said it worked with law enfor<strong>ce</strong>ment and cut off communication to the<br />

servers before any malicious commands were detected. This came after security<br />

researchers at Cisco Systems Inc (CSCO.O) and Morphisec Ltd alerted Piriform’s<br />

parent Avast Software of the hack last week.<br />

The malicious program was slipped into legitimate software called CCleaner, which<br />

cleans up junk programs and advertising cookies to speed up devi<strong>ce</strong>s.<br />

CCleaner is the main product made by London’s Piriform, which was bought in July<br />

by Prague-based Avast, one of the world’s largest computer security vendors. At<br />

the time of the acquisition, the company said 130 million people used CCleaner.<br />

A version of CCleaner downloaded in August and September included remote<br />

administration tools that tried to connect to several unregistered web pages,<br />

presumably to download additional unauthorized programs, security researchers<br />

at Cisco’s Talos unit said.<br />

Talos researcher Craig Williams said it was a sophisticated attack because it<br />

penetrated an established and trusted supplier in a manner similar to June’s<br />

“NotPetya” attack on companies that downloaded infected Ukrainian accounting<br />

software.<br />

“There is nothing a user could have noti<strong>ce</strong>d,” Williams said, noting that the<br />

optimization software had a proper digital <strong>ce</strong>rtificate, which means that other<br />

computers automatically trust the program.<br />

In a blog post, Piriform confirmed that two programs released in August were<br />

compromised. It advised users of CCleaner v5.33.6162 and CCleaner Cloud<br />

v1.07.3191 to download new versions. A spokeswoman said that 2.27 million users<br />

had downloaded the August version of CCleaner while only 5,000 users had<br />

installed the compromised version of CCleaner Cloud.<br />

25


Piriform said that Avast, its new parent company, had uncovered the attacks on<br />

Sept. 12. A new, uncompromised version of CCleaner was released the same day<br />

and a clean version of CCleaner Cloud was released on Sept. 15, it said.<br />

Only the cloud version could be updated automatically to remove the bad code.<br />

The nature of the attack code suggests that the hacker won ac<strong>ce</strong>ss to a machine<br />

used to create CCleaner, Williams said.<br />

CCleaner does not update automatically, so those who installed the problematic<br />

version will need to delete it and install a fresh version, he said.<br />

He also recommended running an antivirus scan.<br />

Williams said that Talos detected the <strong>issue</strong> at an early stage, when the hackers<br />

appeared to be collecting information from infected machines, rather than forcing<br />

them to install new programs.<br />

Piriform said in a news release that it had worked with U.S. law enfor<strong>ce</strong>ment to<br />

shut down a server located in the United States to which traffic was set to be<br />

directed.<br />

It said the server was closed down on Sept. 15 “before any known harm was<br />

done.”<br />

Avast said little about the breach, posting nothing on its Twitter account in the 12<br />

hours after the announ<strong>ce</strong>ment and displaying nothing on its main web page.<br />

Piriform’s news release and technical blog post did not mention Cisco or its<br />

partner Morphisec, instead crediting Avast with discovering the still-unexplained<br />

compromise.<br />

After the controlling web addresses were seized, Cisco saw 200,000 attempts to<br />

connect to them<br />

26


Computer Magazine From The Past!<br />

27


Come a Long Way Baby!<br />

Via Old Picture Of The Day, here's the Osborne 1, which was released in 1981.<br />

It weighed ~25 pounds, had a 5-inch screen, and cost $1,800.<br />

From this!<br />

Here's some history from Wikipedia:<br />

As the personal computer became feasible in the early 1970s, the idea of a<br />

portable personal computer followed. A "personal, portable information<br />

manipulator" was imagined by Alan Kay at Xerox PARC in 1968, [6] and described in<br />

his 1972 paper as the "Dynabook". [7]<br />

The IBM SCAMP project (Special Computer APL Machine Portable), was<br />

demonstrated in 1973. This prototype was based on the PALM pro<strong>ce</strong>ssor (Put All<br />

Logic In Microcode).<br />

28


The IBM 5100, the first commercially available portable computer, appeared in<br />

September 1975, and was based on the SCAMP prototype. [8]<br />

As 8-bit CPU machines became widely ac<strong>ce</strong>pted, the number of portables<br />

increased rapidly. The Osborne 1, released in 1981, used the Zilog Z80 and<br />

weighed 23.6 pounds (10.7 kg). It had no battery, a 5 in (13 cm) CRT screen, and<br />

dual 5.25 in (13.3 cm) single-density floppy drives.<br />

To This!<br />

29


The TRS-80 Model 100 is a portable computer introdu<strong>ce</strong>d in 1983. It is one of the<br />

first notebook-style computers, featuring a keyboard and liquid crystal display, in a<br />

battery-powered package roughly the size and shape of a notepad or large book.<br />

Display: 8 lines, 40 characters LCD<br />

Graphics: 240 by 64 pixel addressable graphics<br />

Units sold: 6,000,000<br />

Power: Four penlight (AA) <strong>ce</strong>lls, or external power adapter 6V (>180 mA)<br />

Memory: 8 KB - 32 KB (supported)<br />

Operating system: Custom dedicated runtime in firmware<br />

CPU: 2.4-MHz Intel 80C85<br />

Yep the boss has one of these too, minus the big floppy drive.<br />

Thank for reading CE Magazine<br />

Chow For Now<br />

Nanomites!<br />

30

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!