Thanks to all who contributed to CE
Magazine. Have an article you would like
contribute? You can mail it to:
CE, P.O. Box 8619
Michigan City In 46360
Or E-Mail it to
Founder & Chief Editor
Art & Design
Rodrigo Esperanza : Nomar Shaw
Diane G : Big Poppa
Outside Sources On This Month issue
In our Vol 4 April 2022 Issue 4
6 Hey Pete some fun in space
10 CE MAGAZINE LINKS TABLET
11 Biz Cards Board
12 Who Say’s Your too old for a
13 How to connect a wireless
printer to your laptop
15 The 5 most popular online scams
To be aware of in 2020
21 Think Spring
CE Magazine® is part of OtherSide Ministries © all rights reserved
Michigan City Indiana Vol 4 April 2022 issue 4
Front Cover… Aprill picture capture my back looking at
the cloud wishing me and you Happy Biirthday!
Original Computer-Ease logo ©
Welcome from space and we thank you for reading CE magazine;
It was time for a new picture and an outer space photo shoot sounded like a great
idea, so, I did some calling for a couple of days and thanks to Shoowaa^1
commander (the name is fictitious for security reason) letting us to use his ship for
a photo shoot while he piloted over Earth, what a trip…AGAIN!
Now, we have some great story tellers here at CE Magazine, so, before you think
that it‟s only a make believe story or is the story real, do go to HEY PETE page to
find out if it‟s real or not and how it was accomplished!
HAPPY BIRTHDAY from 1 to 100 for the month of April, the celebrations are off
the hook, so, have fun especially with the little ones
Got a business card, post it on our Biz Card Board, it‟s free and if you have it on
your computer send a copy to firstname.lastname@example.org . If you had it made by an
outside source put it in an envelope and send it to Computer-Ease, Po Box 8619,
Michigan City In 46360, we will scan it and put it on the board.
Any comments or questions we will gladly answer them and will put it on our next
issue for our readers, if they should have the same question.
Support your local DAV
Poster link click on Digital Collections
Poster from Kittleson World War II Collection - https://www.dav.org/
Courtesy of CE Magazine
How do you do that!
Well, I have to confess we here at the office did April Fool‟s day pranks
(April 1 st ) on each other AND to our readers, so, if you guessed the scroll
and the picture is made up, THEN YOU ARE RIGHT! So, let‟s start from
the beginning …
Step 1: The Beginning!
2 TV Tables as the rear deck of the
cockpit standing behind the pilot.
No special effects … yet
Step 2: The illusion
The remote for my Fugetek Camera
After draping a curtain my remote is
behind my left hand and the right
except for the pinky showing the rest is
hiding with the remote
Step 3: Cropping!
Cropping the picture then
eliminate the background.
Step 4: Copy
Highlight the pilot control
panel and copy it
step 5: Paste control panel at bottom of picture and adjust length and
The last is me pasted, adjustment and feather were the cut lines of me was
using Corel paint 12, I added 4 windows braces and some instruments to
complete the illusion.
So, as you can see it is not hard to create a fantastic picture that will leave
your family and friend scratching their heads wondering … REAL or
CE MAGAZINE LINKS TABLET
By Nomar Shaw
Old computer themed birthday
Virtual birthday party for kids
Virtual birthday party ideas for kids
For more birthday computers click on
WHO SAY’S YOU’RE TOO OLD TO SAY HAPPY BIRTHDAY TOO!
Prokop Vejdělek, 22
Years Old (Oath of
26 Years Old
For more wonderful photos click on the link
How to Connect a Wireless Printer to
A wireless printer connects to your laptop either through a technology
called Bluetooth, which requires devices to be next to each other or, if you
have access to a wireless network, using Wi-Fi (available to devices within
50 to 100 feet or so). Here‟s a rundown of things you should be aware of
when setting up your laptop to connect to a wireless printer:
Bluetooth and Wi-Fi are short-range wireless connections (meaning
you have to be near the printer to connect to it).
To use a Bluetooth-based wireless printer, you may have to connect a
Bluetooth transmitter to a USB port on your laptop. This transmitter
is a small device about the size of a stick of gum that transmits a
signal to your printer. If you have a Wi-Fi–enabled laptop, you can
skip this step.
You should run through the procedure in the previous task to set up
the printer in Windows Control Panel and install any required drivers.
After you click Advanced Printer Setup in the Hardware and Sound
window, click the Printer That I Want Isn‟t Listed link, and then
choose add a Bluetooth, Wireless, or Network Printer in the first
dialog box that appears and follow the instructions.
The Add a Printer wizard walks you through the process of pairing
your laptop and printer; you may need a passcode (provided with
your printer) for this.
After you‟ve installed the printer, you should be able to print just as
you would with any other kind of printer, but without the hassle of
extra wires littering your desk.
If you run into a problem, check your wireless printer‟s instructions for
If you own a printer with Air-Print capability, you can
print directly from your iPhone, iPad, or iPod touch
device. See your printer‟s user manual to find out
whether your model has this capability and how to use it.
For more on this dummies page click HERE
The 5 most popular online scams
to be aware of in 2020
Written by a NortonLifeLock employee
When the world wide web first launched, a common piece of advice was
to avoid giving your information out and talking to strangers. Now, apps
like Uber lead strangers to our doorsteps so that we can go for a spin in
We‟ve grown so comfortable using the internet that it‟s easy to forget
there are people out there who are up to no good. Cybercriminals like to
create scam websites and online scams so that they can trick users into
willingly handing over information or money.
Not much is changing at the turn of the decade, with many of the most
popular online scams for 2020 looking like familiar foes. By learning
about the most common tactics and pairing that information with security
solutions like Norton 360, you can be better prepared to face these
cyberthreats in the new year.
What it is: Phishing is one of the most common cyberthreats around, yet
it continues to be equally as effective. Phishers take on the persona of
someone trustworthy – a friend, neighbour or colleague – in an attempt to
get you to hand over information or click a malicious link via email, social
media or other messaging apps like WhatsApp.
Phishing attempts take place worldwide every single month and while they
often take place through email, cybercriminals are expanding their
approach to cover wherever you might talk with someone one-on-one on
How to spot it: The most important step in spotting a phishing attempt is
to take your time reviewing the email or message. This will help you spot
inconsistencies, like misspelled names, poor grammar in the text and links
that don‟t lead to the place they should.
For the last one, hover over a link with your mouse cursor, if you‟re
unsure of it. In the bottom left-hand corner, you‟ll see the full URL – and
know if they‟re sending you to a real or scam website.
2. Fake antivirus software
What it is: If you‟re browsing the web and all of a sudden you get a pop
up saying that your computer is now infected, chances are it‟s an online
In reality, these fake antivirus software ads and pop ups want you to
download their free software, which will only give you a virus, malware or
ransomware, among other cyberthreats.
How to spot it: Only trust virus information from your antivirus – and if
you don‟t have one, make sure to get one now.
Be wary of any pop ups with flashy lights or that urge you to take action
immediately by downloading an application. A real antivirus solution, like
Norton AntiVirus Plus, will take care of your issues in the background and
while it may ask you to take an action, it‟ll likely only notify you once the
cyberthreat has been resolved.
3. Make money easy and fast scam
What it is: We‟d all like to make easy money quickly, and cybercriminals
use that to prey on unsuspecting users.
These scam websites, which often say you can make a week‟s worth of
salary in just a few hours, lure you in with false promises. They then get
you to hand over personal and financial information, often sensitive by
How to spot it: A little bit of common sense goes a long way. While we
all dream of being paid large sums of money in exchange for doing nearly
nothing, the chances of that being real are slim.
If you‟re considering a make money easy and fast scam, be on the lookout
for advertisements that say it takes little to no skill to get involved, that
you can set your own hours or that you need to pay to get started. If the
method to earn easy and fast cash really existed, it‟s unlikely it‟d be
4. Fake shopping websites and formjacking
What it is: Here‟s a two-parter: there are thousands of websites out there
which try to make you believe they‟re the real deal and a part of your
favourite brands. These websites, which are mostly unknown, try to scam
you, even giving you “great deals” that are up to 75 percent off.
Similarly, groups of cybercriminals are now commonly using formjacking
– a new cyberthreat that steals credit card information. This can happen
when a legitimate e-commerce website is hacked (without the owners
knowing), allowing cybercriminals to redirect you to different URLs in the
payment process that look similar but actually steal your information.
How to spot it: E-commerce scam websites have a few commonalities.
They often have similar but not identical URLs to the brand they‟re trying
to imitate. They also likely have spelling errors and unbelievable prices
that you won‟t find anywhere else – because they‟re not real. Instead, they
either ship you fake items or take your money and don‟t give you anything
Keeping on the lookout for formjacking is more difficult. As you enter the
page to put in your credit card details, double check the URL to make sure
you‟re still on the exact same website that you came from. These
cybercriminals will often change the URL very slightly – like adding or
taking away a single letter – to avoid detection.
5. Tech support scam
What it is: Taking the form of either a phone call or an advertisement,
tech support impersonators contact a user to tell them that their computer
or device is infected – often without even seeing the device beforehand.
After prompting the user to download an application that lets them control
the computer remotely, these cybercriminals download actual viruses or
give the illusion that something is wrong with the device. Then, they ask
for money to fix the problem.
How to spot it: Know that Microsoft, Google, Apple – pick whichever
company you want – will never ever call you to tell you that something is
wrong with your computer. At the very most, they may send an email
saying that something is wrong with your device and that you should call
them. Always double check that these numbers are the real support
numbers via a Google search.
Similarly, be wary of any tech support that charges large sums of money
to fix your PC or Mac. These sums often total half or more of what the
actual device is worth. Scam websites can also pay for advertising on
Google to show up when someone searches for tech support, which means
your best bet for getting help for your device is often contacting the
Knowing about these five popular online scams is a great start. Pairing this
knowledge with a comprehensive single solution like Norton 360 can add
another layer of protection for when you‟re online banking, on social
media or browsing.
Copyright © 2021 NortonLifeLock Inc. All rights reserved.
NortonLifeLock, the NortonLifeLock Logo, the Checkmark Logo, Norton,
LifeLock, and the LockMan Logo are trademarks or registered trademarks
of NortonLifeLock Inc. or its affiliates in the United States and other
countries. Firefox is a trademark of Mozilla Foundation. Android, Google
Chrome, Google Play and the Google Play logo are trademarks of Google,
LLC. Mac, iPhone, iPad, Apple and the Apple logo are trademarks of
Apple Inc., registered in the U.S. and other countries. App Store is a
service mark of Apple Inc. Alexa and all related logos are trademarks of
Amazon.com, Inc. or its affiliates. Microsoft and the Window logo are
trademarks of Microsoft Corporation in the U.S. and other countries. The
Android robot is reproduced or modified from work created and shared by
Google and used according to terms described in the Creative Commons
3.0 Attribution License. Other names may be trademarks of their
For more on this website click HERE
Click on “BEWARE OF SCAMMERS” image
and it will take you to „Beware of scammers
Facebook site‟ (safe site) and lot of info from
folks on the subject!