Home Page
This Week's Edition
Archives
Search the Archives
Subscribe
Upcoming Classes
Contact Info
Legal

Like Us on Facebook

Take one of our computer classes at a library or community center. Click here for a list of upcoming classes

Hands-On Computer Classes right at your location. We can present any of our basic, intermediate, advanced or customized hands-on computer training classes for your business, group or organization, right at your location. Click here for more information.

 

To subscribe, enter your email address in the box below and click the Join Now button

Click here to print this page

Welcome to this week's edition of the Computer Kindergarten Newsletter.
Today is Sunday, January 17, 2016

In this Issue:
Special Feature: Identity Theft Protection - Signs Your Identity Has Been Stolen
Special Feature: Top 25 Most Popular Anti-Spam Tips, Tricks and Secrets: Ignore Delivery Failures of Messages You Did Not Send
Special Feature: Apple iPad and iPhone iOS 9 – Changes and Hidden Features – Siri and Spotlight
Today's Topic: Speed Up a Slow Computer - Uninstall Unused Programs
Websites of Interest: Martin Luther King, Jr.

**********************************

Special Feature: Identity Theft Protection - Signs Your Identity Has Been Stolen

From scamguard.com

#1.
Unusual Charges on Your Credit or Debit Card Statements
When you receive your credit card bill or bank statement, you should review it with a fine-toothed comb. This is where the earliest signs of identity theft often show up - in the form of unauthorized charges to your account. Sometimes these bogus charges are tiny, just a dollar or two. Those small charges are often used to test the validity of the card, but they will soon be followed by larger ones. If you notice any charges you did not authorize, you should notify your bank or credit card company immediately.

#2.
An Unexplained Rise in Your Car Insurance Rates
You can expect your car insurance premium to go up if you have been involved in an accident or racked up a few speeding tickets, but if you have been a good driver and still see a steep increase you could be looking at identity theft. Many car insurers factor your credit score into the equation when determining your rate, so a steep decline in your credit score could mean an equally steep rise in your premiums. If someone has stolen your identity and used it to borrow a bunch of money, your credit score will likely suffer as a result.

#3.
Strange Entries on Your Credit Report
If you notice either unusual charges on your credit and debit card statements or an unexplained increase in your car insurance rates, it is time to pull a copy of your credit report and get to the bottom of things. Look closely at the new inquiries and accounts sections. If you see anything you do not recognize, chances are you have already become a victim of identity theft. There is no need to pay for your credit report or even enter a credit card number. Just head over to annualcreditreport.gov to get a free copy of your report and see where you stand. It is a good idea to check your credit report anyway, even if you do not suspect identity theft.

#4.
New Catalogs in Your Mailbox
An influx of new junk mail is also a red flag for identity theft. Watch your mailbox closely, especially the names on all those catalogs. If you start getting mail with your address but some else's name, an identity thief could be using your address to obtain credit and take out loans. If you do start receiving strange mail, you should pull a copy of your credit report right away. You should also notify the credit reporting agency and local police that your identity may have been compromised.

#5.
Missing Credit Card Statements
Sometimes it is what you are not getting that tips you off to identity theft. If you budget properly, you should have a pretty good idea when your credit card and bank statements arrive each month. If that date passes and they still have not arrived, it could be because an identity thief has redirected your mail. If you are missing any credit card or bank statements, contact the issuer at once and make sure they still have your address on file. If not, it is time to get some help. Contact your local police department to report the identity theft, and let the credit reporting agency know as well.

Recovering from identity theft can take years of hard work and hundreds or even thousands of dollars in out-of-pocket costs. Prevention is a much better strategy than recovery, and monitoring your credit report every three or four months is a good start. Even if you have already become a victim, the sooner you find out the easier it will be to mitigate the damage and recover your good name.

**********************************

Special Feature: Top 25 Most Popular Anti-Spam Tips, Tricks and Secrets: Ignore Delivery Failures of Messages You Did Not Send

Spam, spam and spam. How to avoid spam, how to filter spam, and how to complain about spam are the items on this menu of junk mail fighting tips. With the help of Heinz Tschabitscher of about.com, we are presenting an ongoing series of tips and tricks that you can use to minimize the amount of junk mail that you will receive in your email inbox.

Why Spammers and Virus-Generated Mail Use Fake From: Addresses

For totally understandable (and entirely unacceptable) reasons, spammers rarely send their unsolicited messages using their own email address in the From: field. Not only would this reveal their identity, it would also allow you and the millions of other recipients to write angry replies.

Authors of worms and viruses desire the opposite to what spammers want, but the result is similar. For worms to spread, social engineering is important, and a crucial point is that the malicious code appears to come from a friendly or even trusted source.

At the same time, the From: line should not contain the email address of the infected computer's owner. The reply from a virus filter notifying them that their computer was infested could alert them. That is why worms put real, but random addresses in the From: line. They usually pick them up from the email clients' address books.

For both spam and worms don't care who the recipients of their — hopefully millions — of replicas are, the messages often go to email addresses that are inactive, full or have never existed.

When, How and Why Delivery Failure Reports are Generated

Since email delivery usually works (or at least did before overzealous spam filters started blocking legitimate mail), success is not normally reported but failures are. If you have ever mistyped an email address I'm sure you know the often detailed, not always easy to parse but usually alarming "delivery failure" messages.

Ignore Delivery Failures of Messages You Did Not Send

Now, what happens if a spammer or a virus decides to put your email address in the From: line can be annoying, disturbing or disastrous. If the messages claiming delivery failures of messages you did not author (sometimes, these bounces of messages you did not send are called "backscatter") don't come in the thousands, it is usually best to ignore them.

Use your antivirus program to scan your computer for viruses and worms!!

In our next edition: How to Report Spam with SpamCop

**********************************

Special Feature: Apple iPad and iPhone iOS 9 – Changes and Hidden Features – Siri and Spotlight


Siri

Run Contextual Searches (Photo and Videos) – Siri gives context to your searches, understanding instructions like “Show me videos I took at Eva’s birthday party”. Searches will be done based on dates, location and album names.

Ask Siri to Remind You of Things – Siri wants to be your favorite to-do app apparently. Now, you can use Siri to set reminders for a task while we’re on an app, say, an email, or an errand while on Maps. Basically, reminders can now be set in-app.

Get Directions via Public Transport – Need directions to a specific spot via subways, trains and buses? Just ask Siri to pull up the routes you need. You will be getting your directions from Maps. This works on select major cities.

Get Help with Siri

Siri is a built-in "intelligent assistant" that enables users of Apple iPhone 4S and later and newer iPad and iPod Touch devices to speak natural language voice commands in order to operate the mobile device and its apps.

If "Hey Siri" isn't working, make sure that "Hey Siri" is turned on under Settings > General > Siri.

Siri might say, "Sorry, I'm having trouble connecting to the network," or "Try again in a little while." This is probably a network issue. Check your Internet connection and try again later.
If Siri still isn't available, or doesn't understand or respond to questions:

Restart your iPhone, iPad, or iPod touch.

On your iOS device, go to Settings > General > Siri and turn off Siri. Then turn it on again.

Make sure that the microphones on your device aren't blocked. For example, if your device has a protective case, remove it.

If you're using an iOS device, try to use Siri with a headset. If Siri works, get more help with the microphones on your device.

Spotlight

With iOS 9, Spotlight Search lets you look for content from the web, your contacts, apps, nearby places, and more. Powered by Siri, Search offers suggestions and updates results as you type.

There are two ways to use Spotlight Search on your iOS device.

Quick Search
Drag down from the middle of the Home screen and type what you're looking for.

Siri Suggestions
Drag right from the Home screen to show Spotlight Search and get Siri Suggestions.

Get Sports Scores and Schedules – Get the latest game results and stats by typing in your favorite team or club’s name in Spotlight Search.

Get Weather Forecast – Type "weather" and the city’s name into Spotlight to

Get Stock Prices – Just type in a company name or ticker symbol into Spotlight to get the latest stock prices.

Do Simple Math – Spotlight Search can now do simple math questions and conversions.

Call Someone from Spotlight – You can find contacts on Spotlight and initiate a call, message or facetime right from Spotlight.

Run Deep Searches Into Apps – Spotlight can also run searches inside apps so long as the app supports it. Think of it as being able to find a document you need based on what is inside it.

 

In our next edition: Multitasking

**********************************

Today's Topic: Speed Up a Slow Computer - Uninstall Unused Programs

As your Windows computer ages, its speed can decrease. You will notice an increase in response time when you give commands to open programs, files or folders, use the Internet and other tasks. There are several things you can do to speed up your computer.

Over the next several editions of this newsletter, we will present articles discussing some of the steps you can take to speed up your slow computer.
Important: before making any changes to your system, always create a Restore Point. If anything goes wrong with the changes you make, this will allow you to revert back to a point when the computer was operating correctly. Please visit our Newsletter Archives to read our article, All About Restore Points:
http://computerkindergarten.com/restorepoints.html
Uninstall Unused Programs

When you install a program on your computer, a connection is created between the program and the operating system. Even if you never use the program, it can slow down the computer.

Your computer may have programs on it that you installed and no longer use or programs that came packaged with it that you never even opened. Instead of allowing them to slow things down, get rid of them.

Uninstalling a Program in Windows Vista / 7

The uninstall feature in Windows XP and Vista are somewhat similar. In Vista, click the Start Orb (bottom left) and open Control Panel. Click Control Panel Home on the left.

Under Programs, click on Uninstall a program. This will open the Uninstall or change a program window. It may take a few moments to completely populate the list.

Once all the programs are listed, scroll down and find the one you want to uninstall. Click on it to select it. Once you select it, you will see the word Uninstall appear on the blue bar above the list of programs. Click it. Windows will display a box asking for your permission to continue. Click the Continue button.

Another window should display asking you if you want to uninstall the program. Click Yes. The uninstall wizard will start up, and begin to uninstall. Depending on the program that you are uninstalling, the uninstall wizard may ask you to click OK at steps throughout the process. Just follow the instructions on the screen.

This will remove the program from your computer.

Uninstalling a Program in Windows XP

Click the Start button, choose Control Panel, and choose Add or Remove Programs.

Select the program to be removed; click the remove button. Depending on the program you select to be removed, you may be prompted to confirm the removal, or Windows Uninstaller Wizard may just start up to begin the uninstallation.

Uninstalling a Program in Windows 8/8.1

Go to the Desktop
Right click to open the Power User Tasks Menu (Windows logo, bottom left), and open Control Panel. Click Control Panel Home on the left.

Under Programs, click on Uninstall a program. This will open the Uninstall or change a program window. It may take a few moments to completely populate the list.

Once all the programs are listed, scroll down and find the one you want to uninstall. Click on it to select it. Once you select it, you will see the word Uninstall appear on the blue bar above the list of programs. Click it. Windows will display a box asking for your permission to continue. Click the Continue button.

Another window should display asking you if you want to uninstall the program. Click Yes. The uninstall wizard will start up, and begin to uninstall. Depending on the program that you are uninstalling, the uninstall wizard may ask you to click OK at steps throughout the process. Just follow the instructions on the screen.

This will remove the program from your computer.
Uninstalling a Program with the Program’s Uninstall Function

Many programs come with their own uninstall program that will quickly remove programs from your computer. Some installers do not put their program on the Add/Remove list, so your next place to look is in the Start menu.

Find the program in All Programs in the Start menu and see if there is an item called Uninstall. If so, click on it and the Uninstaller will run. Follow any prompts that appear on the screen.

 

In our next edition, learn how to speed up your computer by turning off programs that start up automatically.

**********************************

Websites of Interest:

Martin Luther King, Jr.

Take a look at the Seattle Times website for stories, photo, some audio clips and a very interesting Civil Rights timeline.
seattletimes.nwsource.com/mlk/

The Stanford University website provides a biography and some of his speeches and letters.
http://mlk-kpp01.stanford.edu/

From Time Magazine, profile, photo, and timeline of the civil rights leader.
www.time.com/time/time100/leaders/profile/king.html

Listen to King's I Have a Dream speech given on August 28, 1963.
http://tinyurl.com/yaqwfqx

For Kids:
familyeducation.com/topic/front/0,1156,1-4644,00.html
www.holidays.net/mlk/