Friday, January 21, 2005

A Possible Alternative To Cable / DSL Internet Access

Wireless broadband might break the monopoly stranglehold that the cable and telephone companies have on Internet access. The new competition could lead to lower prices.


Internet and Phone Companies
Plot Wireless-Broadband Push

By JESSE DRUCKER and ALMAR LATOUR
Staff Reporters of THE WALL STREET JOURNAL
January 20, 2005

Several big Internet and phone companies are moving to provide wireless high-speed access to the Internet -- without phone lines or cable -- challenging the dominance of those traditional connections to millions of U.S. homes and offices.

EarthLink Inc. hopes to be selling this kind of Internet access, known as wireless broadband, in multiple markets across the country by the second half of this year, according to a company executive. Sprint Corp. and MCI Inc. are actively testing the technology, while AT&T Corp. plans to begin deploying it in 2006.

The city of Philadelphia is moving ahead with the nation's largest citywide deployment of the technology know as Wi-Fi and next month will announce details for its plan to blanket the city with cheap wireless Internet access. The reason, city officials have said, is that parts of some neighborhoods haven't been wired for high-speed Internet access via phone or cable lines, and others can't afford it.

These various wireless moves have the potential to yet again shift the balance of power in the rapidly changing U.S. telecommunications industry, giving consumers a potentially cheaper and more flexible alternative to phone and cable lines for Internet access and many other services.

One of the technologies drawing the most attention is WiMAX, which is similar to the popular Wi-Fi standard that millions of people have used to set up wireless networks in their homes but is slated to have a range of several miles. Since WiMAX has yet to be certified, companies are using precursors to the technology.

If the technology takes off, millions of phone and cable customers could cut the wires that tether them to the regulated telecom world. That means being able to surf the Internet and send e-mail at high speeds -- maybe eventually make calls over the Internet -- with a wireless-enabled computer in any room in a house or any outside space covered by the technology. The advantages of portability should be obvious to anyone who remembers when there were no cellphones.

Besides lopping off some wires, wireless broadband could open the door to more competitors. It is expected to become relatively cheap to deploy over time, which could mean lower prices and more options for consumers and businesses.

One disadvantage: The spectrum that Wi-Fi uses is unlicensed and more prone to interference. These plans are different from the so-called 3G cellular networks that wireless companies like Verizon Wireless are rolling out to zap e-mail and video via cellphones.

Before anyone can cut their old cords, however, the technology must clear a number of hurdles. And no one expects to see the telephone companies and cable operators, with their dominance of the Internet-access market, to cede much of that turf easily or soon.

In fact, the Bell companies also are actively testing various wireless services as they rush to dominate an array of emerging technologies like Internet calling. Qwest Communications International Inc. has tested wireless broadband in several markets and plans to roll it out to consumers and businesses in 18 months. Verizon Communications Inc. and BellSouth Corp. have also run advanced trials.

Sprint, for example, has been doing trials of wireless broadband using equipment from Motorola Inc. called "Canopy," in rural markets in North Carolina and Kansas. There, customers receive high-speed Web access wirelessly. Once the wireless broadband services are standardized, "that would allow us to truly compete with a broadband type of application that would compete with cable and DSL providers," says Oliver Valente, Sprint's vice president of technology development. DSL is the most common high-speed technology for Internet access via telephone lines.

Sprint is also looking at offering national WiMAX services, combining its valuable radio-wave spectrum with that of Nextel Communications Inc. The two companies last month announced plans to merge.


Thursday, January 20, 2005

Adaware / Spybot Tip

To save time, you can actually run Adaware and Spybot together.

Saturday, January 15, 2005

AOL Can Save The Internet

It's fashionable to bash AOL. Anyone who has progressed beyond the newbie stage is expected to move on to other providers. But lately so many people have had their internet experience crippled by spyware, viruses, popups, browser hijacks, and spam, that the "nanny" approach of AOL may be seen as useful again.
AOL offers it's subscribers anti-virus protection, it blocks a lot of spam, employs an effective popup blocker, and restricts spyware. All of this is basically transparent to the AOL user who just wants to use the web wih as little effort as possible. Without the user's knowledge or permission, AOL installs protective software and even disables potentially problematic tools such as the MSN Messenger. The result is a better expereince for the average user who would not be able to manage his PC for himself.
Other ISP's such as Earthlink and MSN are also following this approach.
Of course it's not for everybody. Advanced users are perfectly able to defensively configure their PC's for themselves. But for the average user, having an ISP as a nanny, is not a bad idea.

Friday, January 14, 2005

Many Users Are Giving Up On Computers

No More Internet for Them

Fed up over problems stemming from viruses and spyware, some computer users are giving up or curbing their use of the Web.

By Joseph Menn
Los Angeles Times Staff Writer

January 14, 2005

Stephen Seemayer had the first Pong video game system on his block. A decade later, the Echo Park artist was the first in his neighborhood to get a personal computer. And in 1996, he was so inspired by the World Wide Web that he created a series of small paintings for viewing over the Internet.

Now the 50-year-old Seemayer is once again on the cutting edge: Sick of spam clogging his in-box and spyware and viruses crashing his system, Seemayer yanked out his high-speed connection.

"I'm not going to pay for something that I can't use," he said.

A small but growing number of frustrated computer owners are coming to the same conclusion. They're giving up or cutting back their use of the Internet, especially at home, where no corporate tech support team will ride to their rescue.

Instead of making life easier — the essential promise of technologies since the steam engine — the home PC of late has made some users feel stupid, endangered or just hassled beyond reason.

Seemayer's machine, for instance, got so jammed with spam that he stopped checking e-mail. When he surfed the Web, pop-up ads from a piece of spyware he couldn't wipe out spewed sexually explicit images and used so much computing power that the PC would just stop.

"I could be sitting here in the living room reading a book," Seemayer said, "and I'd hear my son scream: 'It froze up on me again!' "

So when his son left for college in September, Seemayer finally unplugged.

Now when he uses his computer, it's to compose letters or organize photos — anything that doesn't require interaction with any other system.

Seemayer is still in the minority. Overall Internet use continues to grow.

But 2004 "was a real turning point in a bad direction," said technology analyst Ted Schadler of Forrester Research. "People are getting really angry. They're angry at Dell and Microsoft and their cable providers, and that's appropriate. They should be."

In a recent survey, 31% of online shoppers said they were buying less than before because of security issues. And though more people are signing up for high-speed, commerce-friendly connections, the proportion of U.S. Internet users paying for things online barely budged in 2004 from a year earlier. It rose to 27% from 26% in 2003 after jumping from 20% the previous year, according to Harris Interactive.

For many, spyware was the last straw. During the last 18 months, the sneaky programs have soared to the top of the list of tech woes, triggering the most tech support calls to Dell Inc., the nation's top PC maker. Spyware lurks on as many as 80% of computers nationwide, according to the National Cyber Security Alliance, a trade group.

Spyware generally transmits information to third parties and sometimes takes control of a PC, usually to display ads. The most pernicious varieties have instructed millions of computers to make expensive toll calls or logged every keystroke on affected machines and sent account numbers and passwords to identity thieves.

No one is immune. Microsoft Corp. Chairman Bill Gates discovered spyware on his personal machine not long ago.

The aggravation level has reached the point that some in the computer industry believe it threatens to undermine advances of the last decade, during which the Internet has grown from a virtually empty domain to a global community of 800 million souls. They say they need to act before the same early adopters who led mainstream Americans online lead them off.

"If, as an industry, we're not able to provide a safe, reliable computing environment, we do think consumers will get increasingly frustrated," said Michael George, general manager of Dell's U.S. consumer business. "We're concerned, and we want to get to a position where we play an instrumental role in fixing the problem."

It may well be up to private enterprise. Congress and the Federal Trade Commission are exploring a crackdown on spyware, but government efforts to stop another online scourge, spam, have had limited results, as many with an e-mail account will attest.

The root cause of the problems is the open architecture of the Internet, initially inhabited and managed by a collaborative community from government and universities.

"The Internet … grew out of a shielded, nice-guy environment in academia," Web usability expert Jakob Nielsen said. Back then, "the worst abuse might have been sending a prank message. Nowadays, the Net reaches everyone in the industrialized world, including large amounts of people with no shame and large numbers of criminals."

Microsoft's dominant Windows operating system also makes it possible for malicious code to spread, in part because it was designed to allow so many functions. Once a weakness in Windows is discovered by hackers, a virus can wreak havoc on millions of computers before Microsoft can offer a patch — which typical users may not take the initiative to download.

And consumer advocates claim that state and federal laws against spam don't help. Courts have protected software vendors from most consumer lawsuits, and some have held that the companies are all but immunized by warnings buried in lengthy user agreements, those boxes with massive amounts of text with the "I agree" button at the bottom.

Whatever the reasons, the threats have evolved from minor annoyances to serious computer risks.

Gerald Stark, 52, trained on computers in school and in the Navy before starting a small cleaning business in Lisbon Falls, Maine. He figured he could use the Internet to find equipment at a good price, track his sales and organize his volunteer activities with the Boy Scouts.

"I thought that the computer was the way to go because it was so much faster," he said. "It turned out to be a nightmare."

A virus killed one machine. Then spyware infested the next one, wiping out a year's worth of receipt records.

Stark read five years' worth of computer magazines just to keep up with how to defend himself.

Even with two firewalls and antivirus and anti-spyware programs running, Stark stopped looking for new business deals online. He said he would buy only from places he had dealt with before, preferably in the physical world rather than the virtual one.

"I'm not letting my guard down again," Stark said. "Never."

Henry Stiegel didn't think he needed his guard up in the first place. Pressed by his stockbroker and friends, Stiegel got his first home computer in 2003.

"I thought it was going to be like a television set — I'm going to sit right in front of it all day and have some control and learn things, scan for airfare and travel," the former Grumman Aerospace Corp. engineer said from Homosassa, Fla.

Even after studying in computing classes, the 77-year-old Stiegel was swamped by hundreds of viruses, other malicious programs and pop-ups.

"I still have windows I can't delete when I want to get rid of them. When I send an e-mail, I get interrupted and have to start all over," Stiegel said. "I have actually pulled the plug out of the wall so I could reboot."

Stiegel now turns the computer on only two or three times a week, mostly to read his e-mail.

In Grand Rapids, Mich., homemaker Peggy Kasul sits halfway between the anxious newcomers like Stiegel and the jaded old pros like Seemayer.

A computer owner for seven years, Kasul did a little shopping online. Her husband used the machine to help manage some rental property, and her 16-year-old daughter wrote term papers for school.

Then her daughter went on the Internet to research a paper on the issue of breast-feeding in public. As if she had typed in a magic word, spyware ads for porn sites popped up and wouldn't go away.

Soon the computer was unusable. It took more than three weeks and $300 to get the thing working again, by which time all the family's data had been wiped out.

Now Kasul sends her daughter to use the computers at school or the library.

"I don't do much shopping online anymore because that scares me," Kasul said. "I go to the store."

The biggest factor behind the rapid increase in spyware is the amount of money at stake. Ads for such blue-chip companies as Motorola Inc., Verizon Communications Inc. and JP Morgan Chase & Co. appear in spyware programs.

The businesses most often accused of distributing spyware, including privately held Claria Corp., WhenU Inc. and 180Solutions Inc., say they are providing legitimate "adware" services to customers who approved the installation. But their disclosures are often misleading or buried: A recent Claria license ran for more than 60 electronic pages, first mentioning the phrase "pop-up" on page 18.

Much spyware arrives bundled with programs such as screensavers and file-sharing software.

"The part that worries me most is the tremendous amount of money that can be made by tricking people into installing junk on their computers," said Ben Edelman, a Harvard graduate student who has testified against spyware companies. "It's a great business."

The defenses remain scattered. Windows PCs often don't come with antivirus software installed. Firewalls and spam blockers are usually separate too, and there are dozens of small companies offering what they describe as anti-spyware products — some of which are actually fronts that install spyware.

"Staying safe online has gotten too complicated for the average user to do by buying individual products and making them work together," America Online spokesman Andrew Weinstein said.

Realizing that such fragmentation is making matters worse, some companies are rounding up the pieces of a more complete resistance.

Microsoft recently bought both an antivirus company and an anti-spyware software maker. Time Warner's latest version of AOL checks for spyware and offers to delete it. And where Dell's online guide for configuring a PC used to suggest a combined antivirus and firewall program without saying why, it now explicitly warns buyers to protect themselves or face potentially costly problems in the future.

Legislation that would have required more direct warnings by spyware companies to consumers and ensured that users could delete the programs made headway in the last session of Congress, despite objections from top computer-security company Symantec Corp. and other software providers. Ari Schwartz, an anti-spyware lobbyist with the Washington-based Center for Democracy and Technology, put the odds of some legislation passing in 2005 at better than 80%.

The FTC last fall filed its first case against spyware companies accused of using a security flaw in Internet Explorer to cram system-glutting programs into the machines of website visitors. The companies named were Seismic Entertainment Productions Inc. and SmartBot.net Inc. But current fraud laws allow regulators only to recover ill-gotten gains — no matter how much damage the bad guys have inflicted.

Enacting new federal bills "would be helpful," said Lydia Parnes, acting director of the FTC's Bureau of Consumer Protection. Spyware "needs to be understandable to consumers, and it needs to be presented in a way that's kind of visible to them."

Even if a strong law passes, Parnes said she didn't know whether the average computer user would be any better off in three years.

If it's worse, Seemayer probably won't be the only one on his block with a PC cut off from the Internet.

"It's great for anything you can do on your own," he said. "It seems to me an incredible typewriter — and that's it."

Thursday, January 13, 2005

Buying A New PC

Most people buy "too much PC". In other words, they load up on features and functionality that they will never use. Before buying a PC one should carefully think about what you are going to use the PC for. Most people are only going to surf the web, do email, and maybe burn the occasional CD. For most buyers there is no need to get the "latest and greatest". There is only one exception to this rule: buy as much memory as you can afford. Memory drives the PC's performance and it's relatively cheap now. I recommend a minimum of 512 MB of memory. In the following article the author gives some excellent suggetions for PC buying.

Be not dismayed; good buys are out there for PC shoppers

Mike Himowitz



There are plenty of good, inexpensive computers on the market, and buying one doesn't have to be an exercise in frustration. For as little as $600, you can get a perfectly good system to handle the basics - word processing, Web browsing, e-mail and financial record-keeping. For a few hundred dollars more, you'll get a system that's fine for digital photography, music and other forms of entertainment.

Just remember that PCs are a lot like cars - they start off with basic equipment and add options. And just like a car, a PC has a sticker - on the shelf or the side of the box - that tells you exactly what's under the hood. If you order online, you can often build your own sticker.

So let's get down to details and discuss what you'll see on that sticker - so you can decide exactly how much PC to buy.

  • MICROPROCESSOR: Also known as the Central Processing Unit or CPU, the microprocessor is the heart of a computer - the chip that does the computing. The faster and more sophisticated the processor, the better a PC will run - within limits.

    If your PC usage is limited to the basics, the fastest processor on the market won't do it much better than the slowest. On the other hand, if you're shopping for a serious gamer or budding video producer, a fast CPU is definitely worth the expense.

    Processors are labeled by manufacturer, model and speed - measured in gigahertz, or billions of cycles per second.

    Intel has the lion's share of the Windows CPU market. Its flagship processor is the Pentium 4, but many entry-level PCs use the lower-end Celeron.

    To confuse things in time for Christmas, Intel has relabeled its Pentium line with three-digit model numbers that take into account factors other than pure clock speed. These include the chip's architecture, the size of the on-board memory cache, and the speed of the front-side "bus," which carries data between the CPU and other key components.

    This has made life harder for shoppers, especially when Intel's Web site says that "processor numbers are ... not a measurement of performance." Luckily, most manufacturers still mention processor speed in advertising and on stickers.

    Intel's main competitors are AMD Athlon 64 and Athlon XP chips, which are roughly equivalent to higher and lower levels of the P4. Athlons are compatible with Intel chips, so it doesn't matter which manufacturer's CPU you buy if they're within the same performance range.

    P4 chips run faster than Athlons, but Athlons get more work done with each clock cycle, so you can't compare that directly. Athlon uses chip numbers, which are roughly multiples of the equivalent Intel clock speed. So an Intel P4 running at 3.2 GHz and an Athlon XP 3200 will provide similar performance.

    For basic PC use, even a Celeron in the 2-GHz range will do fine. If you're interested in multimedia, games, or digital video, go with a P4 in the 2.8- to 3.2-GHz range or equivalent Athlon. You'll pay a stiff premium for faster chips, so unless you're a crazed gamer or you're willing to pay for bragging rights, stay away from the fastest CPUs.

  • MEMORY: Often referred to collectively as RAM (random access memory), these chips store programs and data when the PC is running. Their capacity is measured in megabytes (MB), or millions of bytes. With more memory, your PC can run multiple programs with less effort and a smaller chance of crashing. Get a minimum of 256 megabytes and 512 MB if you can afford it. Serious digital photographers and video buffs may want more.

    Most computers use a type of RAM known as DDR (double data rate). More advanced machines use something called dual channel memory, known as DDR2. You might notice the difference if you're a power freak.

  • HARD DISK STORAGE: Often confused with RAM, your computer's hard drive stores programs and data permanently - and constantly feeds and retrieves data from the CPU when the machine is turned on. Hard drive capacity is measured in gigabytes, or billions of bytes. You want a drive that's big enough to hold all your stuff and fast enough to move around without slowing down the machine's operation.

    Luckily, hard disk storage is dirt cheap. For general-purpose computing, 40 gigabytes is fine, while an 80-gig drive will store plenty of music and photos. But if you're into video, look for at least 160 gigabytes. For the best multimedia performance, look for a drive labeled Ultra-ATA 133, or even better, one that uses the new Serial ATA standard (you'll pay for it).

  • VIDEO: Your computer's video circuitry produces the image on the monitor. For basic computing, whatever comes with the PC is likely to be fine. Lower-end machines generally use Intel video circuitry built into the main circuit board. This setup usually "shares" part of the computer's main memory, which might degrade performance. Avoid it if you're interested in serious digital photography, video or gaming.

    For better performance, look for video circuitry from nVidia, ATI or another major manufacturer, with at least 128 megabytes of dedicated video RAM. If it's inside, the sticker will say so. A good video card with decoding software built in can also give you smoother playback with DVD movies.

  • CD/DVD: All computers have some variety of a compact disk-based drive, or two. They're used universally to install new software, and increasingly to back up data and create music or video disks.

    At the very least, make sure your computer has a CD/RW drive, which can read data disks, play audio CDs, and create both types of media. A DVD-ROM can play CDs and commercial movie DVDs, which use much higher capacity disks. If you or your favorite student wants to watch movies on a PC (very big in college dorm rooms), look for a PC with both types of drives, or a combination drive known as a DVD-CD/RW, which can play DVD movies as well as read and write standard CDs.

    To create movies on DVD, you'll need a DVD writer, which will add $100 to $150 to the cost of a system. They're easier to use and more reliable than last year's, but DVD writers are still troubled by competing industry standards and buggy software. But they'll handle reading and writing to CDs and DVDs. For maximum compatibility with external DVD players, look for a drive that can handle DVD+RW and DVD-RW formats.

  • SOUND: Since PCs have become entertainment centers, most arrive with decent audio circuitry for playing audio CDs or digital music files stored on the PC. But if you're an audiophile, a music producer or a gamer who wants the latest Dolby 5.1, surround-sound home theater reproduction, look for a computer with Creative Sound Blaster or Turtle Beach sound technology.

    Low-end machines, and even those with higher price tags, often come with tiny, two-speaker systems. If you're serious about audio, consider buying a three-speaker setup with a subwoofer for music or a five-speaker system for games and home theater sound.

    Oh, yes. If you buy a teenager a speaker system, don't forget headphones with an extension cord. Then you can tell him to turn the speakers off when the house starts trembling.

  • PORTS: The back of a computer can be a confusing place, because that's where most manufacturers put the "ports," or receptacles for gadgets that plug into the PC, including the keyboard, mouse, printers, scanners, cable modem and so forth.

    Most peripherals, including digital cameras and music players, hook up to the PC through Universal Serial Bus (USB) ports. More USB ports are better - some PCs come with as many as eight. But look for one that has USB, headphone and other multimedia ports on the front panel - it's much more convenient than crawling behind the PC to plug stuff in.

    One item that's not standard equipment on all PCs is the IEEE 1394 port, also known as FireWire. This is the port that digital camcorders require - so if you're going to edit digital videos, make sure the PC has at least one.

  • CARD READERS: The hot built-in this year is a multicard reader that accepts the flash memory cards used by digital cameras and music players, making it easy to copy photos and other material to your computer without special software. While it's convenient, a card reader, or lack of one, shouldn't be a deal breaker. You can buy a card reader that plugs into a USB port for as little as $20.

  • MONITOR: Flat panel, liquid crystal displays (LCDs) have taken over the monitor market everywhere but the low end. Using the same technology as laptop screens, they're only a couple of inches thick, so they occupy a fraction of the front-to-back room of a monitor based on a cathode ray tube (CRT). Flat panels also use a lot less electricity than CRTs and look much cooler.

    An LCD screen will add from $100 to $500 to the price of a system, depending on the size - larger LCDs are far more expensive than smaller models. Bargain systems with LCDs usually offer 15-inch screens, which might be a bit small for older eyes. So it might be worth upgrading to a 17-inch screen, or a 19-inch monitor if you're feeling flush.

    Flat panels vary greatly in quality. Look for one that has good brightness and contrast controls that work - and make sure the brightness doesn't drop off a cliff when you view the screen from an angle.

  • Copyright © 2005, The Baltimore Sun




    Wednesday, January 05, 2005

    Borrow Your Neighbor's WiFi

    If you don't abuse it, your neighbor won't even notice that you dipped into his stream of WiFi data.

    How To Steal Wi-Fi
    And how to keep the neighbors from stealing yours.
    By Paul Boutin

    When I moved into a new neighborhood last week, I expected the usual hassles. Then I found out I'd have to wait more than a month for a DSL line. I started convulsing. If I don't have Net access for even one day, I can't do my job. So, what was I supposed to do? There's an Internet cafĂ© on the next block, but they close early. I had no choice—it was time to start sneaking on to my neighbors' home networks.

    Every techie I know says that you shouldn't use other people's networks without permission. Every techie I know does it anyway. If you're going to steal—no, let's say borrow—your neighbor's Wi-Fi access, you might as well do it right. Step one: Lose the guilt. The FCC told me that they don't know of any federal or state laws that make it illegal to log on to an open network. Using someone's connection to check your e-mail isn't like hacking into their bank account. It's more like you're borrowing a cup of sugar. (Unless you hog their bandwidth by watching lots of streaming video—that's like hijacking a sugar truck.)

    In the end, it's your neighbor's Internet service provider—not your neighbor—who will pay for the added traffic, and the ISP has already factored a small amount of line-sharing into their price plan. It is true that your surfing could cause the folks next door to break their service contract—many broadband providers do specifically forbid home customers from sharing a connection. But let's deal with those abstract ethical issues later—you have important mail to answer!

    If you want to find a Wi-Fi network, don't start by looking on the sidewalk for chalk marks. "Warchalking," a technique for writing symbols in public places to alert neighbors to nearby wireless access points, is a cool concept that's been undermined by the fact that no one has ever used it. The best method to find some free wireless is to treat your laptop like a cell phone. Since Wi-Fi and cell phone signals travel on a similar radio frequency, the same tricks you use for getting a better phone connection might work on your computer. Sit near a window, since Wi-Fi signals travel better through glass than through solid walls. Stay away from metal objects. Pay close attention to your laptop's orientation—rotating your machine just a few degrees could help you pick up a network that you couldn't see before. Raise your laptop over your head, put it flat on the floor, tilt it sideways while leaning halfway out the window—get out the divining rod if you have to. You might get a reputation for being some sick laptop yoga freak, but isn't free Internet worth it?

    If you live downtown or in a suburb where the houses are close together, a few minutes of laptop gymnastics will probably reveal several Wi-Fi networks. Certain names are a giveaway that a network probably won't be password-protected. Look for "linksys," "default," "Wireless," "NETGEAR," "belkin54g," and "Apple Network 0273df." These are the default network names for the most popular wireless routers. If a network owner hasn't taken the time to change the default name, that's a good clue that they probably won't have a password either. You should also look for signs of hacker culture. Since hackers love giving away Net access, an all-lowercase name like "hackdojo" is most likely an invitation to log on. On the other hand, a name in all caps is typically a network under corporate lockdown.

    If you do get prompted for a password, try "public"—that's the default on many of Apple's AirPort units. You can also try common passwords like "admin," "password," and "1234"—or just check out this exhaustive list of default passwords. You should also try using the name of the network in the password space. A generic password could mean that the network's owner didn't have the sense to pick something less obvious or that they've decided to welcome outsiders. But who cares? You're in. And again, there's no specific law barring you from guessing the password, as long as you don't crack an encrypted network and read other people's transmissions.

    You can tell that you've successfully joined a wireless network when your laptop's IP address changes as it's assigned a local number by the network's router. To watch it happen on a PC, keep the Network control panel in Windows open; if you have an Apple notebook, look at the Network section of the System Preferences program. (And if you're running Linux, I don't need to tell you where to look.) Once your laptop has an IP address, your next hurdle is getting DNS to work. DNS stands for Domain Name Service—it's what translates Internet domains like "slate.com" into IP addresses like 207.46.141.216. On most networks, DNS works automatically. But if you get a browser error like "Cannot find server," go back to your network menus and configure your laptop to use a public name server—144.162.120.230 in Dallas, for instance.

    Once DNS is working, you should be good to go. While you should be able to surf the Web with no problems, you may have trouble sending mail from Outlook or other desktop programs because of restrictions on e-mail routing that have been set up to stop spammers. If you have problems, just use a Web-based mail service like Hotmail or Gmail instead.

    Keep in mind that the neighbors may not be thrilled that you're sharing the line. One guy next door to my new building shut off his network the day after I moved in, probably because he got spooked by all those blinking LEDs on his router. Even neighbors who are happy to share may see you in a different light if they check their router's URL logs and find a few hundred hits on porn sites. While your browsing will show up under an anonymous address, the short range of Wi-Fi means that they'll at least be able to figure out that one of the laptop owners within 100 feet of their living room is a stuffed animal fetishist. (As a San Franciscan, I need to point out that a stuffed animal fetish is perfectly normal. It's your neighbors who have the problem.)

    Since everyone isn't as eager to share their network as I am, it's only fair to explain that there's an incredibly easy way to keep neighbors and drive-by geeks off your network. All you have to do is set a password that isn't as obvious as "1234." There's an eye-glazing list of Wi-Fi security measures you can implement to block overachieving Russian teens from monitoring your keystrokes, but in real life the only people sniffing your wireless signal are jerks like me who need a place to log on until the phone company wires the apartment. An unguessable password sends as clear a message as a shot of Mace: Go find a Starbucks, creep.

    Clarification, Nov. 22, 2004: There are some laws that could be used to charge you with unauthorized computer use, but my legal sources say that because there are so many networks left open to the public on purpose, it would be tough for an individual to make the legal case that their intent was to keep everyone off their network if it's not password-protected. If you stick to surfing the Web and not other people's PCs, you'll probably be safe from prosecution.


    Article URL: http://slate.msn.com/id/2109941/

    A Review Of Desktop Search Programs

    Now it's possible to find those lost files, tunes, emails etc. The reviewer gave the highest marks to Copernic.

    Keeper Finders
    Five new programs that let you search your hard drive without having a seizure.
    By Paul Boutin

    I can find anything online in under a minute, but it takes me days to find an e-mail address on my PC. Lucky for me, the leading Web search companies are falling all over themselves to create free programs that dig through your hard drive. Google, Ask Jeeves, HotBot, and MSN have all released desktop search programs in the past few months. (Slate and MSN are both owned by Microsoft.) AOL's application, which is based on software from a company called Copernic, is now in customer trials, and Yahoo will join the fray early in 2005.

    Desktop search applications work a lot like the search function that's already built into the Windows Start Menu, but they're much quicker. They're also smarter about sifting through your e-mail, music files, browser history, and other special data formats. You probably won't find all the Steely Dan songs in your iTunes library or every PDF with the phrase "owner's manual" using the Windows search. If you use the right desktop search application, it's a snap.

    How's it possible to make searching through files on your desktop as painless as finding results on the Web? Memorize the contents of the hard drive in advance. In simplest terms, a desktop search program works by pre-scanning files on your computer—e-mail messages, Web pages in your browser's cache, spreadsheets, etc.—and compiling a list of the words and phrases it finds. (Depending on the program, the initial indexing process can sideline your computer for anywhere from 10 minutes to a couple of hours.) This index of your hard disk's contents gets stored as a compact file or folder that's optimized for fast access. When you punch in a term like "invoice," you'll get results in a fraction of a second because the program already knows every file to look in.

    Since running more than one of these programs at once will slow your computer to a crawl, I installed each of the five applications separately and then went hunting for representative data: e-mail messages and attachments, phone numbers, instant messages, PowerPoint presentations, MP3s, photos, PDF and PostScript files, Web pages, and Word and Quark files. Speed and accuracy weren't an issue for any of these programs even on a minimally equipped PC, so I evaluated each program based on the following criteria:

    Interface: Is it a stand-alone application, a browser-based tool, or does it just add search bars to your screen? Since different users prefer different approaches, what matters most is how well the chosen interface works.

    What can it search? Every program I tested does full-text searches of Word, Excel, and PowerPoint files and e-mail. Most of them search music, image, and video files, as well as Web bookmarks. But if you want to look through e-mail attachments, instant messages, your browser history, and non-Microsoft-Office files—or if you use Firefox instead of Internet Explorer—the field narrows quickly.

    Best feature(s): What distinguishes the program from the rest of the pack?

    Worst feature(s): What's the most frustrating thing about the program?

    The results, from worst to best:

    Ask Jeeves

    Interface: A stand-alone application with a simple layout that doesn't flicker or reshuffle. Compared to its competitors, Jeeves is easy to understand and relaxing to use.

    What can it search? Not enough. Jeeves does full-text searches of Microsoft Office files, Outlook messages, and multimedia files but doesn't search browser cache, instant messages, Outlook Express e-mail, or Outlook mail attachments. Even worse, it doesn't let you work around its limitations by adding new file types or folders manually. Jeeves also thumbs its nose at customization, limiting users to two indexing options: You can scan either the My Documents and Desktop folders or the entire disk, nothing in between.

    Best features: Listing search results in tabbed categories like "Pictures," "Office Documents," and "Internet Bookmarks" makes it easy to eyeball what kind of files you've found. A preview pane also shows you the first few lines from Word files and a few other types, so you needn't waste time opening them.

    Worst feature: Can't add new file types.

    Grade: D. Although it's easy to use, Ask Jeeves won't let you search as many files as the competition. The best thing I can say about Jeeves is that adding file types is easier than what they've already accomplished—building a great user interface. Jeeves will become a front-runner if it adds more data types in the near future, but for now it misses too much stuff you'll want to search.

    HotBot

    Interface: An Internet Explorer add-in along the lines of the Google toolbar. When you type in a search term, the results are displayed in a sidebar that slides in from the left edge of the browser.

    What does it search? HotBot won't index image, music, and movie files or e-mail attachments. On the plus side, it does full-text searches of PDF files, RSS feeds, and the Internet Explorer history and joins MSN as the only program to index Outlook calendar entries, events, and notes. HotBot also lets you add oddball and custom file types—pretty much anything other than .JPG, .GIF, .MP3, or .MOV. You can also specify which folders on your disk to index or to ignore.

    Best feature: You can choose separate indexing schedules for e-mail, RSS feeds, Web history, and anything else to minimize the amount of time HotBot spends crawling over your hard disk.

    Worst feature: Too many important files—e-mail attachments, pictures, movies, music—aren't searchable, even by file name.

    Grade: C. The HotBot Desktop is the only entry other than Copernic that doesn't call itself an unfinished "beta" release, but it still feels like a work in progress. It gets a low grade because it doesn't index attachments or music files and is full of little annoyances like a restriction on scheduling the e-mail index to update more than once an hour. HotBot developers say these restrictions were necessary to minimize the program's processor and disk space usage. I would have preferred to make those decisions myself.

    Google

    Interface: Browser-based search and results pages that look like the Google Web site you know and love.

    What can it search? Google can index your AOL Instant Messenger sessions as you type, so you can search them later without having to save each one to a file manually. It also reads your browser cache (if you use Internet Explorer), Outlook attachments, and Outlook Express e-mail. It won't search Outlook Express attachments or contacts, PDF file contents, or, surprisingly, your Gmail account.

    Best features: Desktop search results can be included at the top of Google Web searches just like headlines from Google News. Browser history results include Web page thumbnails. Privacy lovers can exclude specific folders and remove individual results from the index. And unlike the competition, store and search Web history pages from the secure servers used for online banking and e-commerce transactions.

    Worst features: There's no way to manually add folders to be indexed. It appears that Google restricts searches to your personal folders.

    Grade: C+. Google's desktop program has been plagued by questions about security problems that could let remote hackers search your PC. But the real problem here is that you can't search your entire PC. The program not only restricts searches to a preset list of folders, but it also won't match partial filenames. Google's desktop search is perhaps the least geek-friendly of the bunch, save Ask Jeeves. It doesn't have any of the special search syntax ("paul NOT boutin") or smart results sorting that Google's Web search is known for. If your photos have names like paul001.jpg, paul023.jpg, searching for "paul" or "paul*" won't turn up anything. If you don't know a wayward file's exact name, or if it's hiding in some backwater of your disk, you're simply out of luck.

    MSN

    Interface: Adds search boxes to the Windows taskbar, Internet Explorer, and Outlook. Searches from the taskbar pop up a special window; searches from IE and Outlook show up inside the application window.

    What can it search? Outlook calendar, events, and notes, Microsoft OneNote files, MSN chats, and Hotmail accounts (via Outlook Express). Oddly, it won't search your Internet Explorer history.

    Best features: The taskbar search box shows results while you're still typing, with impressive speed. Command-line fans can use advanced query syntax such as "author:Josh OR author:Mark" to refine searches.

    Worst feature: MSN doesn't let you add new file types like PostScript or Quark files.

    Grade: B. If Outlook is your life, this is your search tool. While the number and variety of windows almost sent me crying for Ask Jeeves, MSN's search finds much more data than most everyone else. The multiple search bars and results screens it adds to your desktop and applications can be annoying, but it's not that hard to turn off the ones you don't like. MSN would probably get an A if it searched more stuff.

    Copernic

    Interface: A standalone application that also adds a search box to the Windows taskbar. It looks similar to Ask Jeeves but doesn't have the handy tabbed results summary at the top of the screen, nor will it let you search every data type at once. The preview pane displays a wide range of file types and will automatically scroll to and highlight the location of your search terms within a file or message.

    What can it search? Any file type you add using its Advanced Options settings, in any folder you want. It's also the only program that will search Firefox browser histories and bookmarks, not just Internet Explorer.

    Best features: You can add extra file types and folders to the index without any of the other programs' restrictions. The search box supports Boolean phrases ("Slate NOT Webhead"), and its graphical interface has options to refine results, such as e-mail headers ("From: Josh, Subject: deadline") or date ranges ("from July 29 to November 2, 2004"). Much of the index can be updated in real time as files are changed and new messages arrive, rather than at scheduled intervals.

    Worst feature: You have to click through each category of results ("Emails," "Bookmarks," "History") separately, rather than being able to see all of them at once. If it only listed the number of results for each category, like Ask Jeeves and Google, you'd instantly know which categories to bother clicking on.

    Grade: A. Copernic has almost as many configuration options as the rest put together but lacks some of the best features of the lesser tools: Jeeves' all-categories-at-once search and tabbed results, Google's live AIM indexing and Web page thumbnails, MSN's advanced search syntax and index of Outlook info, and HotBot's RSS search. Still, Copernic finds more than any other desktop search and gives you control over how it indexes your computer. Search Engine Watch has confirmed that AOL's still-under-wraps desktop search is "powered by Copernic," but you can download Copernic for free right now without joining AOL. At the price, it's one heck of a deal.

    Paul Boutin is a Silicon Valley writer who spent 15 years as a software engineer and manager.

    Article URL: http://slate.msn.com/id/2111643/


    Links

    Copernic
    Google Desktop Search
    MSN Desktop Search
    HotBot Desktop Search
    Ask Jeeves Desktop Search



    Saturday, January 01, 2005

    Tools To Make Your Hard Drive Forget It's past

    Text of New York Times Article

    December 30, 2004

    Tools to Make Your Hard Drive Forget Its Past

    By RACHEL DODES

    You, too, can erase your hard drive. Here's what you will need:

    PAPER AND PEN Make a list of all hardware components, software registration codes, and tech support phone numbers for your Internet service provider and computer maker, just in case you encounter problems when you rebuild your system.

    SOFTWARE DISCS If you do not have the original discs for all of your software, make sure you burn copies for reinstallation later. If you do not have the Windows installation discs that came with your computer, you will have to buy them ($300 for the full Windows XP program; $80 for an update) or contact the computer maker to get new ones; sometimes there is a fee.

    STORAGE DISCS Writeable DVD's, CD's or any other form of storage media can be used to create a second backup of your files. If you are using DVD's, make sure that the format (DVD+R or DVD-R) is compatible with your own burner or the system on which you will be doing the burning.

    CD OR DVD BURNER Use this to back up everything onto a disc. Zip drives will also work, but because of Zip discs' smaller storage capacity (250 megabytes), it will take much longer to save an extensive music collection.

    EXTERNAL STORAGE UNIT If you will be using a second PC to burn backup discs of your files, an external storage unit can be an intermediary. Either a keychain drive or an MP3 player will do. (If you are on a network this is unnecessary - just save your files to a networked folder.) BACKUP PROGRAM After you rebuild your system, use a backup program. Norton Ghost ($70) features scheduled incremental hard-drive backups so you can restore to an earlier point if it gets re-infected. I.B.M. users have the luxury of Rapid Restore, which does the same thing. (If you have an older I.B.M. model, you can download this free at www.pc.ibm.com/us/think/thinkvantagetech.html).

    SECURITY SOFTWARE Lead a virtuous virtual life: make sure that when you get back online, you are operating with a firewall and updated anti-virus software, or this whole effort will be in vain. Personal security packages, which include anti-virus and a firewall, generally cost $70 to $100. Brands include Zone Alarm (www.zonelabs.com), Norton (www.symantec.com) and McAfee (www.mcafee.com). An external router is also recommended, especially if you are conducting any business transactions on your PC; good ones cost less than $100.

    A SHOULDER TO CRY ON A tech-savvy friend is an invaluable resource should anything go dreadfully awry. Rachel Dodes


    Copyright 2004 The New York Times Company