Computer Universe Ezine Volume 2 Issue 6

This ezine has the support you need to fix that "Stubborn" computer.

02.25.2004
Subscribers: 1350
www.neocomputers.com

Archive | Forums

Editor's Note

<< Advertisement >>

Full Blown Offer $29.97 Extended! Start Your own Web Hosting
Business Today For Less Than $30. Host unlimited domains! No
Experience Necessary... Offer only today! The first 100 people
to act will get the $29.97 price, normally $97.00. Act now:
http://www.webhostingrevenue.com/FullBlownOffer4U.html

<< Advertisement >>

Hello!

Welcome to another edition of "Computer Universe". I hope everyone has had a great February. Sorry for the wait between issues. I was very busy and the ezine had to be put aside for a few months. But now I'm back on track making issues for your reading delight. This month I'm starting a new section about new technology in the workplace and at home. It's called, "Innovations for the future". I will be getting new information about new pieces of technology to you. And in the next week I will sending a survey out to you asking a few questions on how this ezine's future will be. The other sections will be there including a new mini section on the new patches that are available from Microsoft and Apple. I hope everyone likes the new sections.

I wish everyone a prosperous March, and happy reading!

Matthew Zator
Editor, Computer Universe



Contents:

1. Feature: Curing Computer Phobia: 10 Easy Steps
2. Comparing Tax Software(TaxCut & Turbotax)
3. Business Section: Scam of the Month (Paypal)
4. Innovations For The Future: The GM Hywire
5. Virus Prevention: 4 Steps to making your computer immortal online
6. Latest Patch From Microsoft
7. Classifieds & Advertising Info.
8. Next Issue...
9. Info & Credits



Feature Article

Curing Computer Phobia: 10 Easy Steps
By John R. Gontowicz

There are many people, especially older adults who fear computers. There are people who exhibit signs of anxiety, intimidation, or general discomfort. As my dad says, "I do not understand those damn things". My dad does not even use an ATM machine.

There are two major phases to overcoming computer phobia.

  • The first is the fear of the computer itself.
  • The second is that people are afraid of computer terminology.

Let's go into a little detail here. If you fear the computer that is because you are not comfortable using it, or familiar with how to use it. Some people fear that they'll "blow up" the PC just by touching the wrong key. But the computer is a lot tougher than you think, especially today where the operating system, applications and hardware are customer oriented, unlike the old days. Unless you spill beer or drinks on it, or use your CD-ROM player as a cup holder (true observation once), you are not going to cause any harm. As for losing important date, just learn the save command on your software application and save frequently. Even if you made a mistake right now, you still have a good copy on the PC.

Computer terminology makes many people afraid. Let's be honest here. Cars make me afraid. Yes, I know some of the "key" words, but when a mechanic starts with the car mechanic lingo, do I care? No, I have no idea what they are talking about. Do I need it, or can I live without it? I just want the car to take me from place to place with minimal inconvenience.

When a computer phobic hears someone say My HP Presario has a Pentium 4 with many gigabytes of RAM and is faster then Joe's PC, etc. they're likely to run screaming from the room. But the translation is fairly simple: My HP computer is fast and can store a lot of information. Furthermore, you don't have to know much terminology to use a computer, just like you don't have to know all the technical details of a car's engine to drive.

Here are the ten steps:

  1. Relax! You've nearly finished step one by reading this article.
  2. Pick up a copy of the e-book "Computers 101: Questions You Were Afraid to Ask". It explains basic computer terms and concepts for beginners and also tells you where you can buy a new PC and where to go for help.
  3. If you've never used a computer before, find a friend or your kid to show you. Have them show you the basics of turning on the PC, writing a short note, printing it and saving it. Doing this will increase your PC knowledge by 40%, because what you do for one program applies to the other programs.
  4. There are many places to get CD tutorials. These are self paced CDs that enable you to learn how to use a PC. One of the better places is at http://action4u.juvio.com
  5. Sign up for an adult night class at a local school or college. These classes are pretty good to further understand the PC.
  6. Try learning something new every time that you use the PC. For example if you were using Microsoft Word, try creating columns. When you are on a blank page press the F1 key. This is the help key. A blank box will appear with the word search above it. Type in the word columns. There will be topics listed as well as step by step on how to do it.
  7. Experiment with the PC. You will not break it. Go through the software applications menus. See what they do.
  8. Maybe your fear is with the mouse. Over 80% of the functionality of a software application can be done using the keyboard. In my e-book called "Computers 101: The Questions You Were Afraid to Ask!", there is a whole section on how to use the keyboard to do tasks, thus eliminating the mouse. The only real time that I use a mouse is to play games. Keyboards are a lot faster and easier to most people.
  9. Do not be afraid to ask questions. If you do not understand something, ask your kid, or someone else's kid. Send an e-mail with your questions to phobia@yourpcguide.com All questions will be answered within seven days.
  10. The more experience you have with the computer, the more you will know, thus eliminating your computer phobia. Congratulations on taking the first step to becoming confident with your PC by reading this article.



About the Author:
John R. Gontowicz Author, "Computers 101: The Questions You Were Afraid to Ask!" www.yourpcguide.com Free Weekly Ezine called "Your Computer Connection". Each issue is filled with computer tips and tutorials. Subscribe by emailing computers101@aweber.com



Back to the Contents


Comparing....

Tax Software (TaxCut & TurboTax)
By Matthew Zator


iconicon
TaxCut Premium 2003 icon
iconicon icon
TurboTax Deluxe 2003 icon

C-NET Editor Rating
7.7/10 (Good)
8.3/10 (Very good)
Price
$39.97 (Office Depot)
$39.97 (Office Depot)
Review TaxCut Premium 2003 eases the tax-prep burden, but if you want superior depth and ease of use, try TurboTax instead. TurboTax Deluxe 2003 is a do-it-yourself filer's best friend, thanks to its superior, more thorough tax interview.
Specifications
  • Product Info Support
  • Complete Package
  • Distribution Media: CD-ROM
  • Min Requirements: Pentium 200MHz, 85MB Hard Drive Space, 32MB Memory, Sound card, Mouse or compatible device, SVGA monitor, 2x CD-ROM
  • Supported OS: Microsoft Windows 95, Microsoft Windows NT 4.0, Microsoft Windows 98/ME/2000/XP
  • Standard
  • Product Info Support
  • Complete Package
  • Retail
  • Min Requirements: Pentium, 170 MB Hard drive space, 64MB Memory, SVGA monitor, 2x CD-ROM
  • Supported OS: Microsoft Windows 95, Microsoft Windows NT 4.0 SP3 or later, Microsoft Windows 98/ME/2000, Microsoft Windows XP
  • Standard
My Choice
X
Purchase Information
Buy Now! icon
Buy Now! icon icon



Some information is © Copyright 2004 C-Net.com


Back to the Contents

Business Section

Scam Of The Month: Paypal Email Scam
By Matthew Zator

This month there is a scam that involves paypal, although it doesn't really involve them directly. Let me walk you through the scam:

You get an e-mail that has in the from field: (something)@paypal.com. All of this looks legit all the way down to the graphics and forms. But it's all a scam. The e-mail asks you to give "paypal" your account information including user name and password. They claim they are doing account clean-up and they want to know your info so they can see if your account is still active. When you signed up for paypal they told you that they would never ask for your account information by e-mail, and they never will.

The technical stuff of this scam is, when you press send on the form, it doesn't send your information to paypal. It sends it to the scammer's e-mail address so that he/she can grab your funds from your account by sending the money from it to their account. Paypal doesn't think this is suspicious because all it looks like is a routine "send money" transaction.

So please be aware that this scam is out there and if you get an e-mail like this asking for your account information, delete it and don't enter any information into the fields. And please be aware that the real paypal would never ask for your account information through e-mail.



Back to the Contents


Innovations For the Future

The GM Hywire: The First Hydrogen Powered Car

General Motors has revealed a first look at Hy-wire, the first drivable vehicle that combines a hydrogen fuel cell with by-wire technology.

Hy-wire incorporates the features first envisioned in the AUTOnomy concept vehicle at the 2002 North American International Auto Show in Detroit and the Geneva Motor Show. Hy-wire will be introduced to the public at the Paris Motor Show September 26.

"The fact that we developed Hy-wire as a drivable concept vehicle in just eight months (from its introduction in Detroit) shows our commitment to this technology and the speed at which we are progressing," said Rick Wagoner, GM's president and CEO. "With AUTOnomy, GM shared a vision. Hy-wire accelerates our progress with a functional proof of concept which strengthens our confidence in our ability to gain marketplace acceptance of production fuel cell vehicles."

Larry Burns, GM's vice president of research and development and planning, said, "We are driving to have compelling and affordable fuel cell vehicles on the road by the end of the decade. With Hy-wire, we have taken the technology as it exists today and packaged it into an innovative drivable vehicle comparable in size and weight to today's luxury automobiles.

"All of the touring sedan's propulsion and control systems are contained within an 11-inch-thick skateboard-like chassis, maximizing the interior space for five occupants and their cargo. There is no engine to see over, no pedals to operate - merely a single unit called X-drive that is easily set to either a left or right driving position."

GM designers and engineers in the United States developed the vehicle chassis and body design, as well as the engineering and electrical system integration. Engineers at GM's research facility in Mainz-Kastel, Germany, integrated the fuel-cell propulsion system, which is the same system used in the HydroGen3 concept, based on an Opel Zafira and shown at the 2001 Frankfurt Motor Show.

American designers also worked closely with Italian design house Stile Bertone in Turin, where the body was built. The SKF Group, headquartered in Sweden, developed the by-wire technology in the Netherlands and in Italy.

"By combining fuel cell and by-wire technology, we've packaged this vehicle in a new way, opening up a new world of chassis architectures and customized bodies for individualized expression," said Chris Borroni-Bird, director of GM's Design and Technology Fusion Group and program director of the Hy-wire concept.

According to Wayne Cherry, GM's vice president of Design, the chassis architecture provides designers the freedom to create a number of different body styles. "Until now, fuel cells and by-wire have been demonstrated as if they were an end in themselves," said Cherry. "But we look at this technology as enabling us to create a number of exciting new body styles for consumers to choose from. This is just the second interpretation of many to come."

"Hy-wire is a luxury vehicle in the sense that it is a luxury to have the kind of space and visibility this car provides," said Ed Welburn, executive director of GM Design for Body-on-Frame Architectures. "The design is built around the fact that there is no engine compartment; the vehicle is very open from front to rear. This is intentional to highlight the openness in the interior and the range of possibilities."

To show off this radically new architecture, the front and rear panels are made of transparent glass. Onlookers can see through the car from front to rear; the liberal use of glass and the absence of a hood also provide a greater visual command of the road for the driver. To reinforce this effect even the seat backs are open. There is no B-pillar between the front and rear doors. Drivers and passengers have greatly enhanced legroom.

"The most dramatic view of this car may be from the driver's seat," Welburn said. "Imagine having no engine, instrument panel or foot pedals in front of you - an open, yet secure cockpit with a floor to ceiling view."

The X-drive, which allows steering, braking and other vehicle systems to be controlled electronically rather than mechanically, provides greater freedom for the driver. Drivers now have the option to brake and accelerate with either the right or left hand. The driver accelerates by gently twisting either the right or left handgrip, and brakes by squeezing the brake actuator also located on the handgrips. The handgrips glide up and down for steering.

The X-drive, which also incorporates an electronic monitor for vital car functions, shuttles easily from side-to-side on a horizontal bar that stretches across the full width of the vehicle. It provides another example of the extreme flexibility of the car's architecture.

A single docking port provides the electrical connection between the all-aluminum chassis and the fiberglass body. Mechanically, there are 10 body attachment linkages.

The fuel cell stack, which produces a continuously available power of 94 kilowatts, is installed in the back of the chassis. Most of the chassis is 11-inches thick, tapering to 7 inches at the edges. The electrical motor drives the front wheels and is installed transversely between them. Three cylindrical storage tanks are located centrally in the chassis.

Hy-wire weighs 1,900 kilograms (4,180 pounds) with 20-inch tires in front and 22-inch tires in the rear. Putting all technical elements into the chassis provides a low center of gravity, giving the architecture both a high safety and driving dynamics potential. Passive safety requirements will be fulfilled using impact-absorbing elements, so-called crash boxes, at a later stage of development.

"Most of the powertrain load has been evenly distributed between the front and rear of the chassis so there is a lower center of gravity for the whole vehicle, without sacrificing ground clearance," Borroni-Bird said. "This contributes to the overall safety of the vehicle by enabling superior handling, while resisting rollover forces, with the tallest body attached."

GM has more than 30 patents in progress covering business models, technologies and manufacturing processes related to the Hy-wire concept.

Here are a few pictures of the new GM Hywire:

Reproduced with the permission of Car Design News, the leading online resource for automotive design, http://www.cardesignnews.com



Back to the Contents


Virus Prevention

4 Steps to Making Your Computer Immortal Online
By Ali Akhtar

Hi and welcome to this free report that tells you how you can download whatever you want online without getting the slightest danger of getting infected by a virus.This report simply offers 4 steps that tell you what to do that gives you rock hard protection against viruses.These four steps are: 1-Installing an Up-to-date Anti Virus Software 2-Installing a firewall. 3-Using File Extensions to your benefit. 4-Learning which websites and people to trust.

Getting started:

Step 1: Using an Anti-Virus Software:
Using an Anti Virus Software is the first thing you should do.An Anti Virus program is a computer program that works in the background and keeps an eye on all that's going on inside your computer.Whenever it finds a program that's performing a malicious activity or one that intends to perform one,or notices any activity that could harm your computer or anything virus-like,it stops that activity at once and tells you about that virus and gives you certain useful options,like repairing the virus,deleting or quarantining the virus,or to ignore the virus(of course not recommended at all).It can also scan any file or folder that you suspect is a carrier of viruses.For example,you downloaded a file that claims to be a game.But you don't want to take a risk and want to confirm that this file isn't a virus.So,you simply scan that file for viruses using your anti virus software.You can do so by simply right clicking on that file and clicking on "Scan your viruses" or "Scan using ____! ___" where _____ holds the name of your anti virus software.If this option is not available,you can scan that file using "Scan a file" option available inside your AVS(anti virus software).You can scan multiple files,or scan a whole folder in the same way.You can also scan your whole computer using "Scan my computer" option.This would take some time,probably one-two hours or more/less depending upon your computer's speed.This option would scan simply EVERY file and folder in your computer to see if it has a virus.If any virus is found,then you get the same bunch of useful options to repair the file,delete it,etc.You should scan your computer at least once a week to ensure maximum protection.

Keeping your Anti-Virus software up to date:
Normally,your AVS would come with protection against some thousand viruses.However,every month tens of new viruses are written and therefore,your AVS might not be able to detect the viruses that are written after your installing that AVS on your computer.For example,let us assume that you installed an AVS named X on your computer on 1st January,2003.On 15th January,a new virus named,say, ABC was written and started spreading around the internet.You download the ABC thinking its a game.However to ensure that its not a virus,you scan it using X.Now,since ABC was created after the installation of X on your computer,X wouldn't be able to detect that ABC is a virus because this virus wouldn't be in the virus database of X.So,you would run ABC on your computer thinking its harmless,which,infact,its not!

The solution:
The solution to this problem is quite simple.Update your anti virus software constantly.Whenever a new virus is detected,the company distributing Anti virus softwares provide updates for their produts so that they can protect the pcs they run on against the virus.Once you install an AVS,usually,whenever it detects an internet connection,it contacts its publisher's website to see if any updates are available.If it finds any updates,it asks you if you would like to receive the updates so that you can be protected against new viruses.In this way,whenever new viruses are detected,you simply update your AVS so it can protect you against them.It is highly recommended that you constantly keep your AVS updated,otherwise,it will protect you only against old viruses and you would be completely unprotected against new viruses.

Which Anti Virus Software to use?
There are many AVS's available.However its recommended that you use only one of the popular ones.Below is a list of the popular Avs's.Just visit the website address given at the end to find out more about them:

Norton Anti Virus:
http://www.symantec.com/
Pc Cillin:
http://www.trendmicro.com/
Mc Afee:
http://www.mcafee.com/
Sophos Anti Virus:
http://www.sophos.com/

You might have to click on the "Products and services" link on some of these websites to get to the actual thing.You can also search Google.com for Anti Virus Software to find out more.

Step 2: Firewalls
Have you ever heard of the terms "Hacking" and "hackers"?Most probably,you have.What hacking is,that,someone from another computer gains access to your computer and gets to view and access your files and stuff like that.A firewall is a kind of barrier that keeps such things away from your computer.A firewall is a software or a hardware device that filters the information coming through the internet.You can think of it,as,the information coming to your computer through the internet first passes through the firewall.If the firewall detects any suspicious data then it is not allowed through.The following figure explains how data transfers between your computer and the internet with a firewall installed: Data from the Internet---------->Firewall------->Home Computer

And that's how data would transfer if you do not have a firewall installed:

Data from the Internet---------->Home Computer

So obviously,its better to have a firewall installed.The advantage of having a firewall is,that hackers do not gain access to your computer.It also protects you from many other unwanted things.Although some firewalls protect you from viruses,still,its worth the investment to install an anti virus software.I won't get into more details about firewalls because it includes some extremely technical things which I don't want to get into because you might be a novice with computers.Go through your firewall's user manual to find out more or visit this page.

Which Firewalls to Buy:

Below is a list of some of the popular firewalls:

Zone Labs.
http://www.zonelabs.com/
CheckPoint.
http://www.checkpoint.com/
Trustix AS.
http://www.trustix.com
Doorstop.
http://www.opendoor.com/doorstop/
Sun Microsystems:
http://www.sun.com/security/

Once you have installed a firewall,you should test its working.You can do so by visiting http://www.grc.com/ and trying their free Sheilds Up! security test.

Step 3:Using File Extensions to your benefit:
File extensions are the tiny little suffixes at the end of every file in your computer.Let us suppose you created a file in Microsoft Word.You named that file "me" and wrote anything in it.Say,you wrote a few lines about yourself.You saved that file in the folder "C:\me".Now when you open the folder "C:\ME" you see a file named "me.doc" in it. OK..so you named the file "Me" but what's this ".doc" thing about?Well,this .doc is what's known as the file extension.Almost every file on your computer has file extensions.Just browse through your computer and almost every file you come across has an extension like ".exe,.bat,.jpeg,.gif,.txt" etc after the real file name. NOTE:If you can't see the file extensions,then follow these steps: 1-Open My computer. 2-Go to View-Options and click on the View Tab. 3-Uncheck the "hide file extensions for known file types" checkbox,and choose the "show all files" radio button.

If you cannot see the options menu under view,then may be you should try these steps:
1-Open My Computer.
2-Click on Tools-Folder Options
3-Click on View Tab.
4- Uncheck the "hide file extensions for known file types" checkbox, and choose the "show hidden files and folders" radio button.

If none of these steps work for you,then open My Computer,Press F1.This would show up the "Help" portion of your computer.Search for "viewing file extensions" or "changing folder options" and follow the steps.

Anyways,file extensions describe what a file is and how the computer will handle the file.For example,a file with the extension ".jpeg" is supposed to be a photo or picture and the computer would use your favourite graphics editing software to view that file.Similarly,a file with the extension ".exe" is supposed to be a computer program and the computer would simply follow the instructions in that file. Now,file extensions play a very important role in detecting viruses.Below is a list of the file extensions that are most likely to be viruses:

.exe
.bat
.com
.scr
.pif
.vbs
.shs
.dll
.ocx

Any file with these extensions has 80% chances of being a virus.Therefore,whenever dealing with an untrusted person or website,never open files which have one of these extensions.You might receive emails that contain an attachment.Never download the attachment if it has one of the above mentioned extensions unless you have an up to date anti virus software and you can scan the file. Below is the list of file extensions that have the minimum chances of being a virus:

.txt
.gif
.jpeg
.bmp

You can download files with these extensions from the internet without really worrying about it.

A little problem:
Although you choose the option not to hide file extensions,there are still some file extensions that wouldn't be displayed.For example,a file with the extension ".txt.shs" would be displayed as a harmless text file and Windows would hide the extension ".shs". This allows a virus writer to write a virus,give it a name with the extension ".shs" and forward it to people.Suppose a virus writer names its virus "textfile.txt.shs".Now,if someone examines this file under Windows,it would be displayed as "textfile.txt" and would occur as a completely harmless text file.In fact,that's how many virus writers spread their viruses.

Solution:
The solution to this problem is by deleting a special entry from your Windows Registry.Carry out the following steps: Note:Be extremely careful when working with Windows Registry,because a smallest mistake can produce extremely harmful results.Do only what is instructed and DO NOT play around with it.Also,be extremely careful.

Before carrying out the following process,make sure you have already set Windows to show all files.Do this by carrying out the steps mentioned in the beginning of Step-3.

Follow these steps:

Close all open program.Then: 1-Click on Start.
2-Click on Run.
3- Type "Regedit" and click ok
4-This would open up the Windows Registry Editor.
5-Click on Edit and click on Find.
6-Uncheck the "Keys" and "Data" entries under "Look at"
7-Type "NeverShowExt"" in the Find what Box and click Find Next.(Make sure you type the words exactly as given here.You may also copy these words and paste them in the Find what box".
8-When a value is found,right click on it,and click delete.
9-Press F3 again.This would once again search the whole registry and bring up with the next value containing "NeverShowExt".
10-Repeat step 9 and 10 until all values of NeverShowExt have been deleted.

Congratulations!Ext have been deleted.

That's it.Whenever you come across a file that has the extension .exe, .bat, .com,etc always scan it for viruses before opening it.Check out the extensions given in Part 1 to know which extensions are dangerous and which ones are not. The following table gives you a list of the various file extensions you may come across when working with windows,what those extensions mean and their possibility of being a virus:

Extension name:
Meaning:
Can it be a virus
.exe Executable program Hell Yes
.Bat Dos batch File Yes
.Com Command file Yes
.Dll Application Extension Yes
.Ocx Active X control Yes
.swf Shockwave file Not really
.txt Text File Not really
.VBS Visual Basic Script Yes
.Bmp Bitmapped Image file Not really
.Gif Image File No
.Jpeg Image File No
.Html/.htm Html File Yes
.Scr Screensaver File Yes
.Pif Editable something Yes
.Ink Shortcut file Yes
.Log Log File Not really
.Shs Shell scrap or something Yes
.Zip Compressed Zip File Yes

*Please note that you should always be careful.Although I have tried my best to be as accurate as possible,still,we never know what might be the next thing that happens in the Virus industry.Therefore,do not blindly open a .Log file just because I told you in this table that it couldn't really be a virus.Always be careful.

Step-4: Learning which websites and people to trust:
Well,as for the people,I can't really say anything.It just depends on your sense of judging people.I mean,you can always trust on someone whom you know in real life.I mean,why would your best friend send you a virus?However,there are some new viruses that send themselves in an email that pretends to be from your loved ones and asks you to download the attachment.Here I again want you to use the file extension tricks you have learnt in step 3.As for other people whom you meet online,well,someone might send you a file that claims to be his/her photo but is a virus in reality.Here again you will use the file extension tricks you learnt earlier to see if they are telling the truth.For example,if Tanya sends you a file named "myphoto.exe" and tells you that its her photo,then of course you could yell "Hey,its an executable program file,it can't be a photo.If it were a photo it would have used the extension .jpeg or .gif or .bmp." You should also use your sense of judging people.I! mean,try to judge if a person just wants to be your friend or is he/she trying to make you download a file or attachment.Here's a tip that always worked for me.Whenever someone starts begging you to download a file or accept a file transfer or open a file again and again,I mean,if he goes anxious trying to make you do something that has to do something with a file or with your computer or anything like that,then there's a 99% chance that he's trying to trick you into downloading a virus. Now to the websites.Well,if you visit a website that claims to provide free games or software downloads,then you should judge it by the site's appearence.A website with a professional look is less likely to be trying to spread viruses.However,a website with a black background and little description of the stuff it provides for download is more likely to be trying to spread a virus.If a website allows you to download a demo version of a game/software/anything and claims that you can buy the full version,then try checking out if they really can accept orders online by visiting their "Buy now" page.If they provide order accepting service,then the common sense says that they are rather trying to sell a virus free product than to spread viruses.I mean,they have to pay to get that credit card processing account.And most virus writers do not want to spend money to spread their creation.So..you can trust the websites that can accept orders the most.Also,if a website can identify who! they are,I mean,give their phone No. or contact information,and you are SURE that the information they provide isn't fake.Then they are also less likely to be virus spreading guys.

With that,I come to the end of this report.I hope that now you feel secure downloading anything you like from the internet. Happy Computing.

Resource Box:
By the way,wanna learn something about computer viruses that 90% of people never tell you?Then you've got to read this free 2 day report by me: 2 days to Learn all about NTFS ADS viruses. Catch it at: http://www.virustimes.cjb.net/tk/day1.html



Back to the Contents


Latest Patches From Microsoft & Apple (In February 2004)

Windows XP Home/Professional: Security Update for Windows XP

Windows ME: NONE

Windows 98SE: Distributed Component Object Model (DCOM) for Windows 98 v1.3

Windows 95: NONE

Windows 3.1: NONE

Windows 2000: Security Update for Windows 2000 (#1)
Security Update for Microsoft Windows 2000 (#2)

Mac OS X 10.3.2 Server: Security Update

Mac OS X 10.2.8 Client: Security Update



Back to the Contents


Classifieds

Full Blown Offer $29.97 Extended! Start Your own Web Hosting
Business Today For Less Than $30. Host unlimited domains! No
Experience Necessary... Offer only today! The first 100 people
to act will get the $29.97 price, normally $97.00. Act now:
http://www.webhostingrevenue.com/FullBlownOffer4U.html

Rebate offers on technology products at Computers4SURE

NEW! NETGEAR WGT624 802.11g 108Mbps Wireless Router


-----------------------------------------------------------------

If you would like to advertise in this section or if you like to get any other type of ad, here is the info,

Solo Ad

  • Price: $10/ad
  • Up to a full page (60 words or less)
  • Purchase here: Order

Top Sponsor (banner)

  • Price: $10/issue
  • 468 X 60 sized banner
  • Purchase here: Order

Classified

  • Price: $5/ad (limit 2 per advertiser)
  • 6 lines max, 65 characters per line
  • Purchase here: Order

NOTE: After purchase email me your ad. If it's a banner, attach the graphic to the email with your name in the body.



Back to the Contents


Next Issue...

  • Another Innovation....
  • Inside the Computer will return next month. Sorry for any inconvenience!
  • Q & A Section (notice will come by email) It will happen this time!
  • And more!

Back to the Contents


Information & Credits

The Computer Universe Ezine is published by Matthew Zator, Editor & Contributing Author. Every month, first week.

You can send your feedback to compuniversezine@yahoo.ca. Post licensing queries to compuniversezine@yahoo.ca.

Want to advertise in The Computer Universe Ezine? View our statistics and don't hesitate to post your offer now!

Subscription information

To Remove yourself from the list, Click Here
To add yourself to the list, Click Here
OR
go to: www.compuniverse.bizhosting.com



Copyright © 2004 Computer Universe Ezine. All Rights Reserved