20.04.2022 Views

ce magazine april 2022

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

1


Thanks to all who contributed to CE

Magazine. Have an article you would like

contribute? You can mail it to:

CE, P.O. Box 8619

Michigan City In 46360

Or E-Mail it to

computerease@juno.com

Founder & Chief Editor

Peter Nadal

Editor

Pamela Kennoy

Art & Design

Peter Nadal

Our Writers

Rodrigo Esperanza : Nomar Shaw

Diane G : Big Poppa

Outside Sources On This Month issue

NortonLifeLock employee

In our Vol 4 April 2022 Issue 4

6 Hey Pete some fun in space

10 CE MAGAZINE LINKS TABLET

11 Biz Cards Board

12 Who Say’s Your too old for a

Happy Birthday!

13 How to connect a wireless

printer to your laptop

15 The 5 most popular online scams

To be aware of in 2020

21 Think Spring

CE Magazine® is part of OtherSide Ministries © all rights reserved

Michigan City Indiana Vol 4 April 2022 issue 4

Front Cover… Aprill picture capture my back looking at

the cloud wishing me and you Happy Biirthday!

2

Original Computer-Ease logo ©


3


Welcome from space and we thank you for reading CE magazine;

It was time for a new picture and an outer space photo shoot sounded like a great

idea, so, I did some calling for a couple of days and thanks to Shoowaa^1

commander (the name is fictitious for security reason) letting us to use his ship for

a photo shoot while he piloted over Earth, what a trip…AGAIN!

Now, we have some great story tellers here at CE Magazine, so, before you think

that it‟s only a make believe story or is the story real, do go to HEY PETE page to

find out if it‟s real or not and how it was accomplished!

HAPPY BIRTHDAY from 1 to 100 for the month of April, the celebrations are off

the hook, so, have fun especially with the little ones

Got a business card, post it on our Biz Card Board, it‟s free and if you have it on

your computer send a copy to computerease@juno.com . If you had it made by an

outside source put it in an envelope and send it to Computer-Ease, Po Box 8619,

Michigan City In 46360, we will scan it and put it on the board.

Any comments or questions we will gladly answer them and will put it on our next

issue for our readers, if they should have the same question.

Peter Nadal

Support your local DAV

4


Poster link click on Digital Collections

Poster from Kittleson World War II Collection - https://www.dav.org/

Courtesy of CE Magazine

5


How do you do that!

Well, I have to confess we here at the office did April Fool‟s day pranks

(April 1 st ) on each other AND to our readers, so, if you guessed the scroll

and the picture is made up, THEN YOU ARE RIGHT! So, let‟s start from

the beginning …

Step 1: The Beginning!

2 TV Tables as the rear deck of the

cockpit standing behind the pilot.

No special effects … yet

6


Step 2: The illusion

Pic A:

The remote for my Fugetek Camera

Stand FT-569

Pic B:

After draping a curtain my remote is

behind my left hand and the right

except for the pinky showing the rest is

hiding with the remote

7


Step 3: Cropping!

Cropping the picture then

eliminate the background.

Step 4: Copy

Highlight the pilot control

panel and copy it

step 5: Paste control panel at bottom of picture and adjust length and

height

8


The last is me pasted, adjustment and feather were the cut lines of me was

using Corel paint 12, I added 4 windows braces and some instruments to

complete the illusion.

So, as you can see it is not hard to create a fantastic picture that will leave

your family and friend scratching their heads wondering … REAL or

NOT REAL…..Enjoy!

9


CE MAGAZINE LINKS TABLET

By Nomar Shaw

Your-birthday-quarantine-style

Old computer themed birthday

Virtual birthday party for kids

Virtual birthday party ideas for kids

For more birthday computers click on

BIRTHDAY

10


11


WHO SAY’S YOU’RE TOO OLD TO SAY HAPPY BIRTHDAY TOO!

Prokop Vejdělek, 22

Years Old (Oath of

Enlistment), 101

Years Old

Bedřiška Köhlerová,

26 Years Old

(Wedding), 103

Years Old

For more wonderful photos click on the link

https://doyouremember.com/35352/now-people-photographed-young-adults-100-

year-olds/4

12


How to Connect a Wireless Printer to

Your Laptop

Updated: 06-23-2017

A wireless printer connects to your laptop either through a technology

called Bluetooth, which requires devices to be next to each other or, if you

have access to a wireless network, using Wi-Fi (available to devices within

50 to 100 feet or so). Here‟s a rundown of things you should be aware of

when setting up your laptop to connect to a wireless printer:






Bluetooth and Wi-Fi are short-range wireless connections (meaning

you have to be near the printer to connect to it).

To use a Bluetooth-based wireless printer, you may have to connect a

Bluetooth transmitter to a USB port on your laptop. This transmitter

is a small device about the size of a stick of gum that transmits a

signal to your printer. If you have a Wi-Fi–enabled laptop, you can

skip this step.

You should run through the procedure in the previous task to set up

the printer in Windows Control Panel and install any required drivers.

After you click Advanced Printer Setup in the Hardware and Sound

window, click the Printer That I Want Isn‟t Listed link, and then

choose add a Bluetooth, Wireless, or Network Printer in the first

dialog box that appears and follow the instructions.

The Add a Printer wizard walks you through the process of pairing

your laptop and printer; you may need a passcode (provided with

your printer) for this.

After you‟ve installed the printer, you should be able to print just as

you would with any other kind of printer, but without the hassle of

extra wires littering your desk.

13


If you run into a problem, check your wireless printer‟s instructions for

help.

If you own a printer with Air-Print capability, you can

print directly from your iPhone, iPad, or iPod touch

device. See your printer‟s user manual to find out

whether your model has this capability and how to use it.

For more on this dummies page click HERE

14


The 5 most popular online scams

to be aware of in 2020

Written by a NortonLifeLock employee

When the world wide web first launched, a common piece of advice was

to avoid giving your information out and talking to strangers. Now, apps

like Uber lead strangers to our doorsteps so that we can go for a spin in

their car.

We‟ve grown so comfortable using the internet that it‟s easy to forget

there are people out there who are up to no good. Cybercriminals like to

create scam websites and online scams so that they can trick users into

willingly handing over information or money.

Not much is changing at the turn of the decade, with many of the most

popular online scams for 2020 looking like familiar foes. By learning

about the most common tactics and pairing that information with security

solutions like Norton 360, you can be better prepared to face these

cyberthreats in the new year.

15


1. Phishing

What it is: Phishing is one of the most common cyberthreats around, yet

it continues to be equally as effective. Phishers take on the persona of

someone trustworthy – a friend, neighbour or colleague – in an attempt to

get you to hand over information or click a malicious link via email, social

media or other messaging apps like WhatsApp.

Phishing attempts take place worldwide every single month and while they

often take place through email, cybercriminals are expanding their

approach to cover wherever you might talk with someone one-on-one on

the internet.

How to spot it: The most important step in spotting a phishing attempt is

to take your time reviewing the email or message. This will help you spot

inconsistencies, like misspelled names, poor grammar in the text and links

that don‟t lead to the place they should.

For the last one, hover over a link with your mouse cursor, if you‟re

unsure of it. In the bottom left-hand corner, you‟ll see the full URL – and

know if they‟re sending you to a real or scam website.

2. Fake antivirus software

What it is: If you‟re browsing the web and all of a sudden you get a pop

up saying that your computer is now infected, chances are it‟s an online

scam.

In reality, these fake antivirus software ads and pop ups want you to

download their free software, which will only give you a virus, malware or

ransomware, among other cyberthreats.

How to spot it: Only trust virus information from your antivirus – and if

you don‟t have one, make sure to get one now.

16


Be wary of any pop ups with flashy lights or that urge you to take action

immediately by downloading an application. A real antivirus solution, like

Norton AntiVirus Plus, will take care of your issues in the background and

while it may ask you to take an action, it‟ll likely only notify you once the

cyberthreat has been resolved.

3. Make money easy and fast scam

What it is: We‟d all like to make easy money quickly, and cybercriminals

use that to prey on unsuspecting users.

These scam websites, which often say you can make a week‟s worth of

salary in just a few hours, lure you in with false promises. They then get

you to hand over personal and financial information, often sensitive by

nature.

How to spot it: A little bit of common sense goes a long way. While we

all dream of being paid large sums of money in exchange for doing nearly

nothing, the chances of that being real are slim.

If you‟re considering a make money easy and fast scam, be on the lookout

for advertisements that say it takes little to no skill to get involved, that

you can set your own hours or that you need to pay to get started. If the

17


method to earn easy and fast cash really existed, it‟s unlikely it‟d be

widely shared.

4. Fake shopping websites and formjacking

What it is: Here‟s a two-parter: there are thousands of websites out there

which try to make you believe they‟re the real deal and a part of your

favourite brands. These websites, which are mostly unknown, try to scam

you, even giving you “great deals” that are up to 75 percent off.

Similarly, groups of cybercriminals are now commonly using formjacking

– a new cyberthreat that steals credit card information. This can happen

when a legitimate e-commerce website is hacked (without the owners

knowing), allowing cybercriminals to redirect you to different URLs in the

payment process that look similar but actually steal your information.

How to spot it: E-commerce scam websites have a few commonalities.

They often have similar but not identical URLs to the brand they‟re trying

to imitate. They also likely have spelling errors and unbelievable prices

that you won‟t find anywhere else – because they‟re not real. Instead, they

either ship you fake items or take your money and don‟t give you anything

in return.

Keeping on the lookout for formjacking is more difficult. As you enter the

page to put in your credit card details, double check the URL to make sure

you‟re still on the exact same website that you came from. These

cybercriminals will often change the URL very slightly – like adding or

taking away a single letter – to avoid detection.

5. Tech support scam

What it is: Taking the form of either a phone call or an advertisement,

tech support impersonators contact a user to tell them that their computer

or device is infected – often without even seeing the device beforehand.

18


After prompting the user to download an application that lets them control

the computer remotely, these cybercriminals download actual viruses or

give the illusion that something is wrong with the device. Then, they ask

for money to fix the problem.

How to spot it: Know that Microsoft, Google, Apple – pick whichever

company you want – will never ever call you to tell you that something is

wrong with your computer. At the very most, they may send an email

saying that something is wrong with your device and that you should call

them. Always double check that these numbers are the real support

numbers via a Google search.

Similarly, be wary of any tech support that charges large sums of money

to fix your PC or Mac. These sums often total half or more of what the

actual device is worth. Scam websites can also pay for advertising on

Google to show up when someone searches for tech support, which means

your best bet for getting help for your device is often contacting the

manufacturer itself.

Knowing about these five popular online scams is a great start. Pairing this

knowledge with a comprehensive single solution like Norton 360 can add

another layer of protection for when you‟re online banking, on social

media or browsing.

Copyright © 2021 NortonLifeLock Inc. All rights reserved.

NortonLifeLock, the NortonLifeLock Logo, the Checkmark Logo, Norton,

LifeLock, and the LockMan Logo are trademarks or registered trademarks

of NortonLifeLock Inc. or its affiliates in the United States and other

countries. Firefox is a trademark of Mozilla Foundation. Android, Google

Chrome, Google Play and the Google Play logo are trademarks of Google,

LLC. Mac, iPhone, iPad, Apple and the Apple logo are trademarks of

Apple Inc., registered in the U.S. and other countries. App Store is a

service mark of Apple Inc. Alexa and all related logos are trademarks of

Amazon.com, Inc. or its affiliates. Microsoft and the Window logo are

trademarks of Microsoft Corporation in the U.S. and other countries. The

19


Android robot is reproduced or modified from work created and shared by

Google and used according to terms described in the Creative Commons

3.0 Attribution License. Other names may be trademarks of their

respective owners.

For more on this website click HERE

Click on “BEWARE OF SCAMMERS” image

and it will take you to „Beware of scammers

Facebook site‟ (safe site) and lot of info from

folks on the subject!

20


21

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!