Posts

Finally Updated to iTunes 7

You may recall that September 20th of this year, I suggested that you should not be the first to take new software updates -- let others see if there are problems. In this case, I was speaking of iTunes 7, as many people were having problems (and on Apple's Discussions forum ) with the popular software. About a month ago, I finally installed iTunes 7 on the PC that I did not sync with. The new software seemed to work well, but I had no reason to update my PC used to sync my 3rd generation iPod. Yesterday, I finally took the plunge -- 3 months after my warning. Everything seemed fine, the software loaded fine, my iPod seemed to sync okay too. This morning though, I found a problem -- I no longer had Podcasts listed as an option in the playlist. Fortunately I could scroll through recently added songs and find my podcasts. Tonight I reconnected my iPod, found the Podcast tab on the iTunes sync screen, and specifically synced all podcasts. Now I do not know whether it was coincidenta

Restrict Third-Party Cookies in Firefox

Image
With the change to Firefox 2, restricting third-party cookies is no longer available through the Options dialog. The only option within the Options dialog is to either allow all cookies or no cookies. Fortunately you can still do this through About:Config. (If you are unfamiliar with About:Config, see my blog post on November 5, 2006 .) I recommend you disable third-party cookies to avoid companies, such as DoubleClick, from tracking your behavior across sites. Open About:Config, and use the Filter dialog box and type network.cookie.cookieBehavior (it will be the second item once you have entered network.c). Double-click on network.cookie.cookieBehavior and change the value to 1. This will now permit only cookies from the same domain you are visiting to save cookies on your computer. Here are all possible values: 0 (default): Enable all cookies 1 : Allow cookies from originating server only 2 : Disable all cookies 3 : Use P3P policy to decide (see MozillaZine Knowledge Base , network

Net Neutrality Explained

StopBadware.org

I ran across a site, StopBadware.org , led by Harvard Law School and Oxford University, with sponsorship from Google, Sun, and Lenovo, that is trying "to become a focal point for developing collaborative, community-minded approaches to stopping badware." StopBadware.org "...shares information with the public in the form of reports, including in-depth and short form reports. The in-depth reports highlight particularly prominent or particularly bad applications, and shorter quick reports describe websites that host or distribute badware." StopBadware.org has a complete set of guidelines on what constitutes badware. Software and/or websites can be categorized as either badware or caution . From the guidelines, an application is badware in one of two cases: If the application acts deceptively or irreversibly. If the application engages in potentially objectionable behavior without: First, prominently disclosing to the user that it will engage in such behavio

Safe Computing While Traveling

In speaking with an old friend today, I was reminded of how unsafe it can be to use an unprotected wireless connection, or even worse, an Internet cafe' PC. So when I got home, I researched some of the services and solutions that I have read and heard about. First of all, you should always take caution when using an open network. This includes both wireless and wired (such as a hotel). The best way to do this is by setting up a Virtual Private Network (VPN) before doing anything else. If you are a business person, you may already have that capability through your company. If so, check with your IT department to find out what happens when you connect to non-work addresses. Typically it will skip the VPN and go directly to the site, saving company bandwidth, but putting you at risk. Note that there may be a way to change this setting. Assuming you cannot get protected through your company network (or you do not want to), there are a couple other options. One option is to set up a VP

Security Flaw in Windows Media Player

As reported by IntelliAdmin.com and ComputerWorld , another security hole has been found in a Microsoft product -- this time it is Windows Media Player Versions 9 and 10. Specifically, the problem is with media files that have the .asx extension. By default when you click on this file type, Windows Media Player will launch -- a compromised file would allow hackers to gain control of your PC. IntelliAdmin.com recommends that you remove the association for Windows Media Player to play .asx files. Microsoft recommend that you upgrade to Windows Media Player 11 . Microsoft says Windows Media Player 11 will work on all versions of Windows XP that have Service Pack 2. I did find one mention of possible problems if you have Windows XP Media Center 2005. If you are looking for a fix to versions 9 or 10, it does not look like Microsoft will have something by this Tuesday, the monthly patch release from Microsoft. So just as I indicated you will likely need to wait for January's patch re

Excel Quick Sum

Image
I found an old trick in Excel the other day... if you highlight cells, the sum will appear in the status bar below. This works whether the cells are horizontal, vertical, or in a block. You can also select cells to sum from various parts of your spreadsheet by holding the Ctrl key down as you select each.

New Hole in Word

As reported by eWeek and ZDNet , there is a new problem with Word that could allow attackers to take control of your PC. Since there is no fix available yet, you should avoid opening any unknown Word files. I would expect that Microsoft would release a fix as soon as possible, but if they stick to their patch-Tuesday schedule, this may come to late to make the December release, forcing users to wait until January.

Reduce the Size of an Excel File

I have been working with an Excel file for about 18 months -- each month I link to a monthly Excel data file. This gives me data in one file that I can use to trend many different segments. I am not sure when, but this file had ballooned to over 3 MBs. Finally this month when I tried to upload it to our intranet, I received a file size limit exceeded message. I searched and searched, and could not find any thing that would compress or clean up the file. Finally I went to Google and found a solution. The credit goes to OzGrid Business Applications . Here is a link to the entire article , and below is what I had done to reduce the file size. The first thing of course is to make a backup... just in case I then performed the following on each worksheet (only 2 in my case): Select a cell and press F5 Click the Special... button Click the Blanks radio button Click OK Select Edit | Clear | All Manually go to the last row in the worksheet (do not use Edit menu shortcut) Select the entire r

Better Security May Not Be Better

There is an excellent article posted by the Electronic Frontier Foundation that describes how poorly implemented security is not better security. Trusted Computing: Promise and Risk by Seth Schoen reminds me a lot of DRM. The direction of two organizations, Microsoft Next-Generation Secure Computing Base or NGSCB and Trusted Computing Platform Alliance or TCPA, want to put restrictions in place that could force you to use certain software by certain manufacturers. Of the fours security areas: (1) memory curtaining; (2) secure input and output; (3) sealed storage; and (4) remote attestation, remote attestation could be a problem. Developers could force you to use certain software in order to use their system. The author recommends adding an owner override to prevent problems. Read the article yourself to learn more.