Upload
others
View
0
Download
0
Embed Size (px)
Citation preview
wwwbigbearccorg 1
Hello Everyone
Fall is upon us and we are starting to think of winter being around the corner No-
vember 14 2017 will be our last Big Bear Computer Club meeting of the year we go
dark during December and January due to winter weather in the mountains We
start up next year February 7 2018
Next year our Membership meetings are going to be held on a different week of the
month The meetings will then be held on 1st Tuesday of the month Our meetings
were being held on the 2nd Tuesday of the month You will get a reminder of this
change next year
Donrsquot forget to click on all the bears in the October newsletter until you find the one that
requests your name to receive a prize at the general meeting
CONTENTS
Presidentrsquos Message amp Next General Meeting 1
2017 Big Bear Computer Workshops 2
Equifax Hacked 2
5 Benefits of Next Genereation Firewalls 3
Bluetooth Vulnerabilities 5
Warning CCleaner Hacked 6
The Roots of Computer Code 8
Club News 9
Recycling Printer Ink with the Computer Club 9
AmazonSmile 9
How to Destroy Your Computer in Just Minutes 10
Bits amp BytesmdashLast Club Meeting 12
Club Relations and Calendar 13
Word Excel amp Apple 14
Helpline amp Officers 15
Information amp Membership Application 16
Presidentrsquos Message - Yomar Cleary
NEXT CLUB MEETING
November 14 2017
130 - 300 pm
Folding Home Presented by Marc Busch
Big Bear Computer Club November 2017 Volume 17 Issue 9
Bearly Bytes
Newsletter
Learn about how Stanford Universitiesrsquo distributed
computing project for disease research that simulates
protein folding computational drug design and other
types of molecular dynamics And you can join the
project toomdashfree at not cost
To be held at the
Big Bear Senior Center
42651 Big Bear Blvd
Big Bear Lake
wwwbigbearccorg 2
2017 BIG BEAR
COMPUTER CLUB
ONE REMAINING
WORKSHOP
FOR THIS YEAR
October 30th Microsoft Publisher 2013
This Workshop Publisher is especially helpful for folks that do newsletters It completely creates a template including headings titles small text boxes for sidebars ads etc Learn what options it presents when working on computer projects that require more manipulating than Word or Excel offers again it is really applicable to Newsletters Ads Professional stationery set-ups side bar ads for existing documents Registration contact Sandi Ybarra at 909 585-8313
2017 Big Bear Computer Workshops
EQUIFAX HACKED
Equifax has been hacked and millions of peoplersquos personal private financial information has been stolen
How to see if you are affected by the recent EQUIFAX DATA BREACH and what to do if you are Click HERE
MalwareBytes a respected security firm released an article on how to protect against identity theft Click HERE
wwwbigbearccorg 3
Resource Networkcomputingcom
A look at the advantages NGFWs have over traditional network firewalls
The complexity of modern cyber attacks and advanced hacking methodologies are driving enterprises to look to next generation firewalls for better security New web-based malware and intrusion attempts bypass perimeter protections to exploit
applications Users are susceptible to malicious emails or phishing schemes as these threats are
concealed within the content itself and are delivered over the network undetected
Initially traditional firewalls just followed web protocols and werenrsquot intelligent enough to distinguish different kinds of web traffic Their inability to inspect network-packet data and identify legitimate business applications and attacks forced them to either accept or reject all the traffic
This meant that protection based on ports protocols IP addresses was no longer feasible Businesses needed a more robust form of security that wasnt just tied to the IP addresses They also needed newer rules for controlling website and application usage within a network That led to the evolution of next-generation firewalls (NGFWs) with advanced technologies that promised deeper inspection capabilities and better control over individual applications in a network
Here are the top five advantages next-generation firewalls have over traditional firewalls that every network professional should know
1 Multi-functional
Traditional firewalls provide basic packet filtering network and port address translations stateful inspections and can even support
virtual private networks However they are only limited to the Data Link Layer and Transport Layer of the OSI model
In addition to all the functionalities of traditional firewalls next generation firewalls also include integrated intrusion detection systems (IDS) and intrusion protection systems (IPS) that detect attacks based on traffic behavioral analysis threat signatures or anomalous activity This functionality helps perform deeper inspection and improve packet content filtering of network traffic up to the application layer
2 Application awareness
Traditional firewalls typically block common application ports or services on a network to control application access and monitor
specific threats However with network connectivity becoming more complex several applications use multiple or various ports making it extremely difficult for traditional firewalls to identify the targeted port
Moreover these ports are being used in various other ways such as tunneling in which a network protocol is enclosed within the packets carried by the second network and is de-encapsulated at the destination
To counter this next-generation firewall devices monitor traffic from layer 2 through layer 7 and are intelligent enough to determine what exactly is being sent or received If the content is within policy it is sent further or else its blocked
Application awareness also enables companies to set policies depending on the user and the application For instance allowing users to access Facebook but blocking Facebook Chats
Continued hellip page 4
5 Benefits of Next-Generation Firewalls
wwwbigbearccorg 4
ContinuedNew security
3 Streamlined infrastructure
Traditional firewalls require a separate security appliance for every new threat which leads to additional costs and efforts for maintaining and updating each of those devices
With dynamic IP addresses it becomes a complicated mess of configuring thousands of rules that are needed to identify and manage the traffic Also these devices donrsquot even provide the much needed controls and security to the content applications or even users
NGFWs provide integrated antivirus spam filtering deep-packet inspection and application control using only one device or console No extra devices are required thus reducing infrastructural
complexities
4 Threat protection
Unlike traditional firewalls NGFWs include antivirus and malware protection thats continuously upgraded automatically whenever new threats are discovered The NGFW device also minimizes the avenues of attack by limiting the applications that run on it
It then scans all the approved applications for any hidden vulnerabilities or confidential data leaks as well as mitigates risks from any unknown applications This also helps in reducing bandwidth usage from any useless traffic which isnt possible with traditional firewalls
5 Network speed
Though many vendors of traditional firewalls claim to offer a specific throughput (usually a gigabyte) from every port the reality is entirely different
The increased number of protection devices and services when turned on tend to choke the network speed By the time the traffic reaches the end user the speed is chopped by almost one-third of the actual promised speed
In contrast next-gen firewall
throughput remains exactly the same
irrespective of the number of
protection services
wwwbigbearccorg 5
Bluetooth Vulnerabilities
More in-depth details can be read
on this website
httpswwwarmiscomblueborne
Resource by Bruce Schneier
A bunch of Bluetooth vulnerabilities are being reported some pretty nasty
BlueBorne concerns us because of the medium by which it operates Unlike the majority of attacks today which rely on the internet a BlueBorne attack spreads through the air This works similarly to the two less extensive vulnerabilities discovered recently in a Broadcom Wi-Fi chip by Project Zero and Exodus The vulnerabilities found in Wi-Fi chips affect only the peripherals of the device and require another step to take control of the device With BlueBorne attackers can gain full control right from the start Moreover Bluetooth offers a wider attacker surface than WiFi almost entirely unexplored by the research community and hence contains far more vulnerabilities
Airborne attacks unfortunately provide a number of opportunities for the attacker First spreading through the air renders the attack much more contagious and allows it to spread with minimum effort Second it allows the attack to bypass current security measures and remain undetected as traditional methods do not protect from airborne threats Airborne attacks can also allow hackers to penetrate secure internal networks which are air gapped meaning they are disconnected from any other network for protection This can endanger industrial systems government agencies and critical infrastructure
Finally unlike traditional malware or attacks the user does not have to click on a link or download a
questionable file No action by the user is necessary to enable the attack
wwwbigbearccorg 6
Warning CCleaner Hacked to Distribute Malware
Resource by Swati Khandelwal September 18 2017
Over 23 Million Users Infected
If you have downloaded or updated CCleaner application on your computer between August 15 and September 12 of this year from its official website then pay attentionmdashyour computer has been compromised CCleaner is a popular application with over 2 billion downloads created by Piriform and recently acquired by Avast that allows users to clean up their system to optimize and enhance performance Security researchers from Cisco Talos discovered that the download servers used by Avast to let users download the appli-cation were compromised by some unknown hackers who replaced the original version of the software with the malicious one and distributed it to millions of users for around a month This incident is yet another example of supply chain attack Earlier this year update servers of a Ukrainian company called MeDoc were also compromised in the same way to distribute the Petya ransomware which
wreaked havoc worldwide Avast and Piriform have both confirmed that the Windows 32 bit version of CCleaner v5336162 and CCleaner Cloud v1073191 were affected by the malware
Detected on 13 September the malicious version of CCleaner contains a multi-stage malware payload that steals data from infected computers and sends it to attackers remote command-and-control servers Moreover the unknown hackers signed the malicious installation executable (v533) using a valid digital signature issued to Piriform by Symantec and used Domain Generation Algorithm (DGA) so that if attackers server went down the DGA could generate new domains to receive and send stolen information
All of the collected information was encrypted and encoded by base64 with a custom alphabet saysPaul Yung VP of Products at Piriform The encoded information was subsequently submitted to an external IP
address 216126xx (this address was hardcoded in the payload and we have intentionally masked its last two octets here) via a HTTPS POST request The malicious software was programmed to collect a large number of user data including Computer name List of installed software
including Windows up-dates
List of all running process-es
IP and MAC addresses Continued Page 7
wwwbigbearccorg 7
Continued CCleaner
Additional information like whether the process is running with admin privileges and whether it is a 64-bit system
How to Remove Malware From Your PC
According to the Talos researchers around 5 million people download CCleaner (or Crap Cleaner) each week which indicates that more than 20 Million people could have been infected with the malicious version the app The impact of this attack could be severe given the extremely high number of systems possibly
affected CCleaner claims to have over 2 billion downloads worldwide as of November 2016 and is reportedly adding new users at a rate of 5 million a week Talos said However Piriform estimated that up to 3 percent of its users (up to 227 million people) were affected by the malicious installation Affected users are strongly recommended to update their CCleaner software to version 534 or higher in order to protect their computers from being compromised
The latest
version is
available for
download
here
wwwbigbearccorg 8
Resource smithsoniancom
By Kat Eschner
Famously the first long-distance message Samuel Morse sent on the telegraph was ldquoWhat hath God wroughtrdquo When it comes to digital progress itrsquos a question thatrsquos still being answered The telegraph was a revolutionary means of communication in itself but itrsquos also connected to the development of modern computer languages Like any new technology its creation had a ripple effect provoking a wide range of other innovations Engineer Jean-Maurice-Eacutemile Baudot born on this day in 1845 was an important telegraph innovator whose telegraph system helped lay the groundwork for modern computers
Baudot had been a telegraph operator since 1869 write Fritz E Froehlich and Allen Kent in The FroehlichKent Encyclopedia of Telecommunications When he was training he learned how to operate Samuel Morsersquos original telegraph but he also learned to use other
telegraph models He practiced on the Hughes telegraph an early printing telegraph that had a keyboard like a piano and the Meyer telegraph which was the first to use paper tape with holes in it to record telegraph sig-nals according to author Anton A Huurdeman Baudot built on these innovations adding his own touch
Baudot Code Baudot Codes biggest advantage over Morse Code which was first used in the 1840s and other earli-er codes was its speed Earlier systems sent characters of infor-mation by using different lengths of character distinguished by a short gap (the ldquoditsrdquo and ldquodasrdquo of the Morse code system) ldquoBaudotrsquos code sent characters in a synchronized streamrdquo writes author Robin Boast ldquoas each character code was exactly the same length and had exactly the same number of elementsrdquo Alt-hough some of the ideas he used had been pioneered before Baudot was the first to connect them all in a system Boast writes He goes on to explain ldquomost sig-nificant for us is that Baudot was the first to recognize the im-portance of a simple five-bit binary codendasha digital coderdquo Baudotrsquos fixed-length binary code is a direct predecessor of some of the digital codes used today
ASCII the most widely accepted code for translating computer information into the words you see on your screen is based on Baudot code which itself went through several permutations after Bau-dots original innovation But more importantly Baudots code itself laid the first brick in the road to our digital universe writes James Draney for Review 31 Baudots Printing Telegraph was an encoding system that ran off five-bit binary
code It was not the first binary code of course but it was the first to be properly considered digital and its essence still exits in our computers tablets and mobiles today
Printing on paper tape
Having already patented his printing telegraph in France England and Germany Baudot se-cured an American patent for his printing telegraph on August 21 1888 The inventor wasnrsquot the first to use a paper-punch system to record telegraph signals but be-cause Baudot Code and his custom-built telegraph machines were widely embraced being much faster than previous telegraphs they helped keep the system alive His printing telegraph was a prede-cessor to computers because it ran without human intervention once the data (codes) were input presenting the information to the receiver in a readable formndashpaper tape with coded holes in it
Baudotrsquos teletype machine also called a teletypewriter used a five-key keyboard write Froehlich and Kent ldquoBorrowing from Meyer Baudot developed a distributor that allowed five instruments to share the same wirerdquo they write His prototype was tested in the later 1870s and widely adopted in France ldquoby 1892rdquo the pair write ldquoFrance had 101 Baudot-printing multiple telegraphs in operationrdquo
Digital printing using perforated paper was still used in the twentieth century Boast writes and it was ldquoone of the first recording media used for electronic computers in the 1940s and lsquo50srdquo Think punch cards and ticker tape
The Roots of Computer Code Lie in Telegraph Code
wwwbigbearccorg 9
Your Computer Club donation is tax deductible
Donations are accepted
though Paypal
You do not need a Paypal account to donate through Paypal
The Computer Club can recycle you old printer cartridges and cell phones Bring them to a club meeting and we will take them off your hands A simple way for the club to raise some funds
Big Bear Computer Club News
You Can Support the
Big Bear
Computer Club
at
NO COST TO YOU
By using AmazonSmile
For each Amazon purchase you
complete Amazon will donate
05 of the purchase price to
the Big Bear Computer Club
Below is the link from Amazon
Smile that will take you directly
to the Big Bear Computer Club
Amazon support page
httpssmileamazoncomch74
-3131147
You can consider sharing this
link with your family and friends
so they too can support the Big
Bear Computer Club
Big Bear Computer Club Board News
We have started a Facebook page (thank you Bill Flanagan) for the computer club Are any of you readers interested in doing the clubrsquos Facebook page Also we have an opening for Name TagsHospitality chairperson for our monthly club meetings You would meet and greet folks coming to the clubrsquos monthly meetings
Please contact Yomar Cleary yclearycharternet
Big Bear Computer Club Forum
The Big Bear Computer Club has a Discussion Computer Forum on a local Big Bear internet information site Herersquos a link to the directly take you into the forum
wwwsocalmountainscom
Big Bear Computer Club
Website Links
Club Bylaws
Standing Rules amp Policies
Board Meeting Minutes
BBC Cash Flow Statements
wwwbigbearccorg 10
How to Destroy Your Computer in Just Minutes
By David Kretchmar
Sun City Summerlin
Computer Club NV
Why You Should Avoid Installing
PUPS (Potentially Unwanted
Programs)
There are plenty of new computers
being used that are performing
much more slowly than they
should One of the quickest ways to
turn a fast new computer into a
slow system crippled by malware is
to start downloading software from
the wrong sites Or by downloading
the wrong software from what
appears to be the right site
Newer computers being slowed by
unwanted programs is a bother but
the damage done by PUPs can be
much more serious PUPs can be
responsible for programs that make
it impossible to access any of your
files or otherwise ruin your system
Every time you download anything
from the Internet you first issue
permissions that enable the opening
of a conduit or vector between the
Internet and your computer The
series of complex events is mostly
invisible to you except for your
clicking on that virtual button that
starts the whole process
Bing and Google searches often can
take you where you donrsquot want to
go When searching for popular
software sponsored search results
(which result in unwanted pro-
grams) often appear at the top of
the search results page along with
links from the actual software
source sites Often those ad links
try to install software on your
computer that you do not want It
could be anything it could be a
fake driver update program or a
scam system cleaning program
Note that my Bing search for VLC
media player first showed 4 sites
NOT associated with VLC ndash bad
sites
Testing Misleading
Advertisement links
How bad is it To find out I in-
stalled a fresh Windows 10 plus all
Windows updates on a freshly for-
matted hard drive I downloaded
and installed the free version of
Avast Antivirus software that
brought a hitchhiker of its own -
Google Chrome OK I wanted
Chrome but not every user would
so I considered this an invasive act
by a program I downloaded for pro-
tection
I used Edge Firefox and Google
Chrome and started using Google
and Bing search engines to start
searching for popular free pro-
grams The programs I sought are
often the first programs that get
installed on a PC Firefox Google
Chrome OpenOffice iTunes
Adobe Flash Java Adobe Acrobat
VLC and WinZip
Then I carelessly clicked on ad
results which appeared above or on
the same first page as ldquorealrdquo search
results These paid ads were
identified by notes and highlighted
in a very pale color to differentiate
them (slightly) from the actual
search links that appeared nearby
The ads didnrsquot appear after every
search and the ones that appeared
varied among searches and were
different for different browsers
Sometimes the first paid ad link
actually took me to the softwarersquos
true source site (ie searching for
Google offered wwwgooglecom
first) Often Avast would block a
download it recognized as harmful
but Avast did not catch many prob-
lems
For all of the searched for
programs I was able to bring up
more questionable sponsored search
results within seconds of repeated
searching Misleading results
showed up in all search engines and
I could not determine that any
browser offered better or worse
protection than others
For each ad link I clicked through
and installed the respective pro-
grams via the link or button
provided Instead of delivering just
the application I was looking for
all of the paid links attempted to
tack on unwanted programs In
some cases if I was careful to read
all of the fine print and uncheck
boxes I could get the files I was
Continued hellip page 11
wwwbigbearccorg 11
Continued hellip Destroy computer
looking for without a bunch of extra
ldquoadded valuerdquo software but it was
very difficult
For the purposes of this article I
acted as an inexperienced user (or
an experienced user whorsquos not
paying attention) and clicked my
way through ads and dialogue box-
es that looked like the End User
License Agreement (EULA) wersquore
used to seeing through when in-
stalling software
And hellip They Got Me
After installing just a few programs
this way I started accumulating
browser toolbars (Bing Yahoo and
Google) and noticed my
search engine and home page had
been hijacked to something unwant-
ed As I continued the process
Windows started slowing down to a
crawl
After installing all of the programs
on my list I opened Windows 10rsquos
Programs and Features and each
browserrsquos extensions and add-ons
and counted 39 items that had been
installed in addition to the programs
I intended to get On rebooting
three new programs launched
popup windows at startup
including two that started running
virusregistry scans as soon as they
launched and a couple that flashed
warnings windows and offered fix-
es if I registered andor upgraded to
the full paid version
Remember this was originally a
clean install of Windows 10 that
needed nothing
Within a few minutes my computer
became noticeably slower plagued
by numerous popups and was
becoming essentially unusable
Remember this was originally a
clean install of Windows 10 that
needed nothing
Within a few minutes my computer
became noticeably slower plagued
by numerous popups and was
becoming essentially unusable
All of these were nasty but if even
a small fraction of them were I
would be in real trouble
Conclusions and Recommenda-
tions
Most of us will have to download
some third-party (non-Microsoft)
software from the Internet This
does not have to be dangerous if
you pay attention that the software
is being offered from the true home
site of that product NEVER down-
load software from any sponsored
link unless the desired software
creator is the sponsor
Do not depend on your
anti-malware program to protect
you It will catch some issues but
not all
wwwbigbearccorg 12
About Bearly Bytes
Bearly Bytes Newsletter past winner of SWUGC amp APCUG Newsletter contests is the official publication of the Big Bear Computer Club Views expressed in Bearly Bytes are those of the authors and do not necessarily reflect the opinions of Big Bear Computer Club Other computer user groups are welcome to reprint our articles as long as they give credit to the author and Bearly Bytes Big Bear Computer Club Submissions All BBCC members are encouraged to send letters articles questions and comments to Bearly Bytes for inclusion in future issues Submit as plain text in the body of an email and attach any graphics as JPEG or GIF format and send to treadwellbigbearccorg
Bits amp Bytes
The Opportunity Drawing Winners
left to right Kimberlee Kid First aid kit Linda Sharman Green backpack Angie Pezina helliphelliphelliphellipFirst aid kit Paul Palmquist helliphelliphellipTape measure key chain Mary Lou helliphelliphelliphelliphelliphellipFirst aid kit
Enter Find the Bear
contest to win a cool prize
1 Locate this BEAR 2 Click on it 3 Fill in the form 4 and then Send
At the next general meeting following this newsletter a drawing will be held for all who found the bear The
selected winner will receive a surprise gift
You will need to attend the meeting in order to receive the prize
August 2017 Club Meeting
The presentation by Bob Gostischa from Avast Software cov-
ered Computers
(Windows and Mac)
tablets and Smart Phones
He addressed three im-
portant areas (1) the im-
portance to use the right
tools once you get to the
Internet (2) he will show
how to exercise caution
when visiting the internet
and (3) the
importance to avoid the
dangers found on the in-
ternet For those who
could not make it to the
meeting You really need to
click on the httpsgoogl5v4sIQ (launches Google Docs)to
see his presentation on Tips for Staying Safe Online amp Pre-
venting Identity Theft
Bob Gostischa receiving a thank you
from our Club President
wwwbigbearccorg 13
Upcoming Calendar Events
Group Newsletter Sites
wwwbigbearccorg 14
Word Tips By Rosemary Lloyd
Excel Tips By Yomar Cleary
Apple News
The stories you really care about
The more you read the better
News gets at understanding your
interests And now itrsquos even more
personalized Top Stories choos-
es the stories that are relevant to
you and delivers them to your
screen while the Today widget
keeps you up to date throughout
the day News stays on top of the
stories yoursquore interested in So
you can too
All the news you want All in one place
News collects all the stories you want to read mdash so you no longer need to move from app to app to stay informed And with the For You tab itrsquos easier than ever to find the stories that matter most to you News also features breaking news notifications and subscriptions to some of your favorite publications
To Show or Hide the Ruler Applies To Word 2013
Click the View tab Click the check box
next to Ruler
to show or hide
the ruler
httpswwwgcflearnfreeorgword2013getting-to-know-word1
Cropping Graphics in Excel
Once you place a graphic in your workbook you may decide to crop it Cropping means to cut off part of the graphic so it doesnt show in your workbook To crop a graphic follow these steps
Make sure that the Format tab of
the ribbon is displayed (This
tab is only visible if you first
click on a graphic)
Click on the Crop tool in the Size
group
Click on one of the graphics corner
or side handles with the mouse
pointer
Drag the handle towards the center
of the graphic stopping when
you have cropped the desired
amount
You can turn off cropping by
clicking on the Crop tool again
or by pressing Esc
You should understand that while cropping a graphic makes it look smaller none of the original graphic is actually lost it is only hidden Cropping a graphic will not decrease the amount of storage space re-quired by that graphic in your workbook
wwwbigbearccorg 15
The following members have generously offered to help you with your PC
problems by phone or by email
Windows Beginners Yomar Cleary 9092146990 yclearycharternet
Microsoft Windows Rosemary Lloyd
9095477257 Rosemarybigbearccorg
MS Outlook Rosemary Lloyd
9095477257 Rosemarybigbearccorg
MS Excel Yomar Cleary 9098785622 yclearycharternet
MS Publisher Yomar Cleary 9092146990 yclearycharternet
CD Burning Rosemary Lloyd 9095477257 rosemarybigbearccorg
Computer Upgrades Marc Busch
9496099266 bigbearjedicharternet
The Computer Club provides training at the monthly meetings when there is no
presenter
Persons with all levels of computer knowledge are welcome to attend the
clubrsquos open meetings
Your First 2 visits are free Bring a friend
Annual Membership is $25 and spouse $5 All recurring membership dues are due in
January
Helpline Officers and Key Leaders
President Yomar Cleary 9092146990 yclearycharternet
Vice Presidenthellip helliphelliphelliphellip Marc Busch
9496099266 helliphelliphellipbigbearjedicharternet
Treasurer Tom Brandau 2134461315 tombran44gmailcom
Secretary Sandi Ybarra 9095858318 sandiscabingmailcom
Director at Large helliphelliphelliphelliphellip Jerry Merino 9095858714 gmerinocharternet
Director at Large helliphelliphellip Del Johnson
9095849017helliphellipdeljohnson_Isyahoocom
Director at Large helliphelliphellip Bill Treadwell
9097304625 treadwellbigbearccorg
Webmaster Rosemary Lloyd
9095477257 Rosemarybigbearccorg
Assistant Webmaster helliphelliphelliphellipBill Flanagan
9098669379 billbigbearccorg
Newsletter Editor Bill Treadwell
9097304625 treadwellbigbearccorg
Publicity Yomar Cleary
9092146990 yclearycharternet
Equipment Chair Marc Busch
9496099266 helliphelliphellipbigbearjedicharternet
Technical Advisor hellip Jim Lloyd
9095849358 inquiriessugarloafpccom
Refreshments Chair helliphelliphelliphellip Sharon Teeter
9095852026 sharonteeter1verizonnet
Historian Sandi Ybarra
9095858318 sandiscabingmailcom
Sunshine Chair Angie Pezina
9098662314 apezinagmailcom
Hospitality Chairhelliphelliphelliphelliphelliphellipvacant
THE BEAR WANTS YOU TO SHARE A TIP
Send tips to treadwellbigbearccorg
wwwbigbearccorg 16
Mailing Address
Big Bear Computer Club
PO Box 645
Big Bear City CA 92314
Monthly Meeting presen-
tation and demonstration
of popular hardware and
software
RAM (QampA) sessions
Tech News and Virus
Alerts
Door prize drawings
Bearly Bytes our award-
winning monthly news-
letter emailed
Website bigbearccorg
Free Software Review
Member Help Line
Member E-mail Notifica-tions
Member-only Discounts
Training workshops
All this for only $25 per year
Membership Benefits
New Renewal Update my Information
Full Name ___________________________________________________________________
Mailing Address _______________________________________________________________
City State Zip ________________________________________________________________
Home Phone _(______)___________________ Cell Phone_(_____)__________________
E-mail address ________________________________________________________________
Adding Associates
For each Family Member (s) add $5year towards your dues
Mail your application and check for dues to
BCC Treasurer
PO Box 645
Big Bear City CA 92314
Or bring your application and dues to a monthly general meeting
General Information and Membership Application
I agree that Big Bear Computer Club may use such photographs of me with or without my name and for any lawful purpose including for example such
purposes as publicity newsletter advertising and web content
Yes No Your initials _________
BIG BEAR COMPUTER CLUB INC P O BOX 645 ndash BIG BEAR CITY CA 92314
Membership Applicationmdash$2500 ndash Associate $5 You can pay your dues at the monthly meeting by mail -- make checks to Big Bear Computer
Club or by Pay Pal (Go into our website wwwbigbearccorg and go to ldquoDonaterdquo)
Computer Club meetings are held
in the Big Bear Senior Center
wwwbigbearccorg 2
2017 BIG BEAR
COMPUTER CLUB
ONE REMAINING
WORKSHOP
FOR THIS YEAR
October 30th Microsoft Publisher 2013
This Workshop Publisher is especially helpful for folks that do newsletters It completely creates a template including headings titles small text boxes for sidebars ads etc Learn what options it presents when working on computer projects that require more manipulating than Word or Excel offers again it is really applicable to Newsletters Ads Professional stationery set-ups side bar ads for existing documents Registration contact Sandi Ybarra at 909 585-8313
2017 Big Bear Computer Workshops
EQUIFAX HACKED
Equifax has been hacked and millions of peoplersquos personal private financial information has been stolen
How to see if you are affected by the recent EQUIFAX DATA BREACH and what to do if you are Click HERE
MalwareBytes a respected security firm released an article on how to protect against identity theft Click HERE
wwwbigbearccorg 3
Resource Networkcomputingcom
A look at the advantages NGFWs have over traditional network firewalls
The complexity of modern cyber attacks and advanced hacking methodologies are driving enterprises to look to next generation firewalls for better security New web-based malware and intrusion attempts bypass perimeter protections to exploit
applications Users are susceptible to malicious emails or phishing schemes as these threats are
concealed within the content itself and are delivered over the network undetected
Initially traditional firewalls just followed web protocols and werenrsquot intelligent enough to distinguish different kinds of web traffic Their inability to inspect network-packet data and identify legitimate business applications and attacks forced them to either accept or reject all the traffic
This meant that protection based on ports protocols IP addresses was no longer feasible Businesses needed a more robust form of security that wasnt just tied to the IP addresses They also needed newer rules for controlling website and application usage within a network That led to the evolution of next-generation firewalls (NGFWs) with advanced technologies that promised deeper inspection capabilities and better control over individual applications in a network
Here are the top five advantages next-generation firewalls have over traditional firewalls that every network professional should know
1 Multi-functional
Traditional firewalls provide basic packet filtering network and port address translations stateful inspections and can even support
virtual private networks However they are only limited to the Data Link Layer and Transport Layer of the OSI model
In addition to all the functionalities of traditional firewalls next generation firewalls also include integrated intrusion detection systems (IDS) and intrusion protection systems (IPS) that detect attacks based on traffic behavioral analysis threat signatures or anomalous activity This functionality helps perform deeper inspection and improve packet content filtering of network traffic up to the application layer
2 Application awareness
Traditional firewalls typically block common application ports or services on a network to control application access and monitor
specific threats However with network connectivity becoming more complex several applications use multiple or various ports making it extremely difficult for traditional firewalls to identify the targeted port
Moreover these ports are being used in various other ways such as tunneling in which a network protocol is enclosed within the packets carried by the second network and is de-encapsulated at the destination
To counter this next-generation firewall devices monitor traffic from layer 2 through layer 7 and are intelligent enough to determine what exactly is being sent or received If the content is within policy it is sent further or else its blocked
Application awareness also enables companies to set policies depending on the user and the application For instance allowing users to access Facebook but blocking Facebook Chats
Continued hellip page 4
5 Benefits of Next-Generation Firewalls
wwwbigbearccorg 4
ContinuedNew security
3 Streamlined infrastructure
Traditional firewalls require a separate security appliance for every new threat which leads to additional costs and efforts for maintaining and updating each of those devices
With dynamic IP addresses it becomes a complicated mess of configuring thousands of rules that are needed to identify and manage the traffic Also these devices donrsquot even provide the much needed controls and security to the content applications or even users
NGFWs provide integrated antivirus spam filtering deep-packet inspection and application control using only one device or console No extra devices are required thus reducing infrastructural
complexities
4 Threat protection
Unlike traditional firewalls NGFWs include antivirus and malware protection thats continuously upgraded automatically whenever new threats are discovered The NGFW device also minimizes the avenues of attack by limiting the applications that run on it
It then scans all the approved applications for any hidden vulnerabilities or confidential data leaks as well as mitigates risks from any unknown applications This also helps in reducing bandwidth usage from any useless traffic which isnt possible with traditional firewalls
5 Network speed
Though many vendors of traditional firewalls claim to offer a specific throughput (usually a gigabyte) from every port the reality is entirely different
The increased number of protection devices and services when turned on tend to choke the network speed By the time the traffic reaches the end user the speed is chopped by almost one-third of the actual promised speed
In contrast next-gen firewall
throughput remains exactly the same
irrespective of the number of
protection services
wwwbigbearccorg 5
Bluetooth Vulnerabilities
More in-depth details can be read
on this website
httpswwwarmiscomblueborne
Resource by Bruce Schneier
A bunch of Bluetooth vulnerabilities are being reported some pretty nasty
BlueBorne concerns us because of the medium by which it operates Unlike the majority of attacks today which rely on the internet a BlueBorne attack spreads through the air This works similarly to the two less extensive vulnerabilities discovered recently in a Broadcom Wi-Fi chip by Project Zero and Exodus The vulnerabilities found in Wi-Fi chips affect only the peripherals of the device and require another step to take control of the device With BlueBorne attackers can gain full control right from the start Moreover Bluetooth offers a wider attacker surface than WiFi almost entirely unexplored by the research community and hence contains far more vulnerabilities
Airborne attacks unfortunately provide a number of opportunities for the attacker First spreading through the air renders the attack much more contagious and allows it to spread with minimum effort Second it allows the attack to bypass current security measures and remain undetected as traditional methods do not protect from airborne threats Airborne attacks can also allow hackers to penetrate secure internal networks which are air gapped meaning they are disconnected from any other network for protection This can endanger industrial systems government agencies and critical infrastructure
Finally unlike traditional malware or attacks the user does not have to click on a link or download a
questionable file No action by the user is necessary to enable the attack
wwwbigbearccorg 6
Warning CCleaner Hacked to Distribute Malware
Resource by Swati Khandelwal September 18 2017
Over 23 Million Users Infected
If you have downloaded or updated CCleaner application on your computer between August 15 and September 12 of this year from its official website then pay attentionmdashyour computer has been compromised CCleaner is a popular application with over 2 billion downloads created by Piriform and recently acquired by Avast that allows users to clean up their system to optimize and enhance performance Security researchers from Cisco Talos discovered that the download servers used by Avast to let users download the appli-cation were compromised by some unknown hackers who replaced the original version of the software with the malicious one and distributed it to millions of users for around a month This incident is yet another example of supply chain attack Earlier this year update servers of a Ukrainian company called MeDoc were also compromised in the same way to distribute the Petya ransomware which
wreaked havoc worldwide Avast and Piriform have both confirmed that the Windows 32 bit version of CCleaner v5336162 and CCleaner Cloud v1073191 were affected by the malware
Detected on 13 September the malicious version of CCleaner contains a multi-stage malware payload that steals data from infected computers and sends it to attackers remote command-and-control servers Moreover the unknown hackers signed the malicious installation executable (v533) using a valid digital signature issued to Piriform by Symantec and used Domain Generation Algorithm (DGA) so that if attackers server went down the DGA could generate new domains to receive and send stolen information
All of the collected information was encrypted and encoded by base64 with a custom alphabet saysPaul Yung VP of Products at Piriform The encoded information was subsequently submitted to an external IP
address 216126xx (this address was hardcoded in the payload and we have intentionally masked its last two octets here) via a HTTPS POST request The malicious software was programmed to collect a large number of user data including Computer name List of installed software
including Windows up-dates
List of all running process-es
IP and MAC addresses Continued Page 7
wwwbigbearccorg 7
Continued CCleaner
Additional information like whether the process is running with admin privileges and whether it is a 64-bit system
How to Remove Malware From Your PC
According to the Talos researchers around 5 million people download CCleaner (or Crap Cleaner) each week which indicates that more than 20 Million people could have been infected with the malicious version the app The impact of this attack could be severe given the extremely high number of systems possibly
affected CCleaner claims to have over 2 billion downloads worldwide as of November 2016 and is reportedly adding new users at a rate of 5 million a week Talos said However Piriform estimated that up to 3 percent of its users (up to 227 million people) were affected by the malicious installation Affected users are strongly recommended to update their CCleaner software to version 534 or higher in order to protect their computers from being compromised
The latest
version is
available for
download
here
wwwbigbearccorg 8
Resource smithsoniancom
By Kat Eschner
Famously the first long-distance message Samuel Morse sent on the telegraph was ldquoWhat hath God wroughtrdquo When it comes to digital progress itrsquos a question thatrsquos still being answered The telegraph was a revolutionary means of communication in itself but itrsquos also connected to the development of modern computer languages Like any new technology its creation had a ripple effect provoking a wide range of other innovations Engineer Jean-Maurice-Eacutemile Baudot born on this day in 1845 was an important telegraph innovator whose telegraph system helped lay the groundwork for modern computers
Baudot had been a telegraph operator since 1869 write Fritz E Froehlich and Allen Kent in The FroehlichKent Encyclopedia of Telecommunications When he was training he learned how to operate Samuel Morsersquos original telegraph but he also learned to use other
telegraph models He practiced on the Hughes telegraph an early printing telegraph that had a keyboard like a piano and the Meyer telegraph which was the first to use paper tape with holes in it to record telegraph sig-nals according to author Anton A Huurdeman Baudot built on these innovations adding his own touch
Baudot Code Baudot Codes biggest advantage over Morse Code which was first used in the 1840s and other earli-er codes was its speed Earlier systems sent characters of infor-mation by using different lengths of character distinguished by a short gap (the ldquoditsrdquo and ldquodasrdquo of the Morse code system) ldquoBaudotrsquos code sent characters in a synchronized streamrdquo writes author Robin Boast ldquoas each character code was exactly the same length and had exactly the same number of elementsrdquo Alt-hough some of the ideas he used had been pioneered before Baudot was the first to connect them all in a system Boast writes He goes on to explain ldquomost sig-nificant for us is that Baudot was the first to recognize the im-portance of a simple five-bit binary codendasha digital coderdquo Baudotrsquos fixed-length binary code is a direct predecessor of some of the digital codes used today
ASCII the most widely accepted code for translating computer information into the words you see on your screen is based on Baudot code which itself went through several permutations after Bau-dots original innovation But more importantly Baudots code itself laid the first brick in the road to our digital universe writes James Draney for Review 31 Baudots Printing Telegraph was an encoding system that ran off five-bit binary
code It was not the first binary code of course but it was the first to be properly considered digital and its essence still exits in our computers tablets and mobiles today
Printing on paper tape
Having already patented his printing telegraph in France England and Germany Baudot se-cured an American patent for his printing telegraph on August 21 1888 The inventor wasnrsquot the first to use a paper-punch system to record telegraph signals but be-cause Baudot Code and his custom-built telegraph machines were widely embraced being much faster than previous telegraphs they helped keep the system alive His printing telegraph was a prede-cessor to computers because it ran without human intervention once the data (codes) were input presenting the information to the receiver in a readable formndashpaper tape with coded holes in it
Baudotrsquos teletype machine also called a teletypewriter used a five-key keyboard write Froehlich and Kent ldquoBorrowing from Meyer Baudot developed a distributor that allowed five instruments to share the same wirerdquo they write His prototype was tested in the later 1870s and widely adopted in France ldquoby 1892rdquo the pair write ldquoFrance had 101 Baudot-printing multiple telegraphs in operationrdquo
Digital printing using perforated paper was still used in the twentieth century Boast writes and it was ldquoone of the first recording media used for electronic computers in the 1940s and lsquo50srdquo Think punch cards and ticker tape
The Roots of Computer Code Lie in Telegraph Code
wwwbigbearccorg 9
Your Computer Club donation is tax deductible
Donations are accepted
though Paypal
You do not need a Paypal account to donate through Paypal
The Computer Club can recycle you old printer cartridges and cell phones Bring them to a club meeting and we will take them off your hands A simple way for the club to raise some funds
Big Bear Computer Club News
You Can Support the
Big Bear
Computer Club
at
NO COST TO YOU
By using AmazonSmile
For each Amazon purchase you
complete Amazon will donate
05 of the purchase price to
the Big Bear Computer Club
Below is the link from Amazon
Smile that will take you directly
to the Big Bear Computer Club
Amazon support page
httpssmileamazoncomch74
-3131147
You can consider sharing this
link with your family and friends
so they too can support the Big
Bear Computer Club
Big Bear Computer Club Board News
We have started a Facebook page (thank you Bill Flanagan) for the computer club Are any of you readers interested in doing the clubrsquos Facebook page Also we have an opening for Name TagsHospitality chairperson for our monthly club meetings You would meet and greet folks coming to the clubrsquos monthly meetings
Please contact Yomar Cleary yclearycharternet
Big Bear Computer Club Forum
The Big Bear Computer Club has a Discussion Computer Forum on a local Big Bear internet information site Herersquos a link to the directly take you into the forum
wwwsocalmountainscom
Big Bear Computer Club
Website Links
Club Bylaws
Standing Rules amp Policies
Board Meeting Minutes
BBC Cash Flow Statements
wwwbigbearccorg 10
How to Destroy Your Computer in Just Minutes
By David Kretchmar
Sun City Summerlin
Computer Club NV
Why You Should Avoid Installing
PUPS (Potentially Unwanted
Programs)
There are plenty of new computers
being used that are performing
much more slowly than they
should One of the quickest ways to
turn a fast new computer into a
slow system crippled by malware is
to start downloading software from
the wrong sites Or by downloading
the wrong software from what
appears to be the right site
Newer computers being slowed by
unwanted programs is a bother but
the damage done by PUPs can be
much more serious PUPs can be
responsible for programs that make
it impossible to access any of your
files or otherwise ruin your system
Every time you download anything
from the Internet you first issue
permissions that enable the opening
of a conduit or vector between the
Internet and your computer The
series of complex events is mostly
invisible to you except for your
clicking on that virtual button that
starts the whole process
Bing and Google searches often can
take you where you donrsquot want to
go When searching for popular
software sponsored search results
(which result in unwanted pro-
grams) often appear at the top of
the search results page along with
links from the actual software
source sites Often those ad links
try to install software on your
computer that you do not want It
could be anything it could be a
fake driver update program or a
scam system cleaning program
Note that my Bing search for VLC
media player first showed 4 sites
NOT associated with VLC ndash bad
sites
Testing Misleading
Advertisement links
How bad is it To find out I in-
stalled a fresh Windows 10 plus all
Windows updates on a freshly for-
matted hard drive I downloaded
and installed the free version of
Avast Antivirus software that
brought a hitchhiker of its own -
Google Chrome OK I wanted
Chrome but not every user would
so I considered this an invasive act
by a program I downloaded for pro-
tection
I used Edge Firefox and Google
Chrome and started using Google
and Bing search engines to start
searching for popular free pro-
grams The programs I sought are
often the first programs that get
installed on a PC Firefox Google
Chrome OpenOffice iTunes
Adobe Flash Java Adobe Acrobat
VLC and WinZip
Then I carelessly clicked on ad
results which appeared above or on
the same first page as ldquorealrdquo search
results These paid ads were
identified by notes and highlighted
in a very pale color to differentiate
them (slightly) from the actual
search links that appeared nearby
The ads didnrsquot appear after every
search and the ones that appeared
varied among searches and were
different for different browsers
Sometimes the first paid ad link
actually took me to the softwarersquos
true source site (ie searching for
Google offered wwwgooglecom
first) Often Avast would block a
download it recognized as harmful
but Avast did not catch many prob-
lems
For all of the searched for
programs I was able to bring up
more questionable sponsored search
results within seconds of repeated
searching Misleading results
showed up in all search engines and
I could not determine that any
browser offered better or worse
protection than others
For each ad link I clicked through
and installed the respective pro-
grams via the link or button
provided Instead of delivering just
the application I was looking for
all of the paid links attempted to
tack on unwanted programs In
some cases if I was careful to read
all of the fine print and uncheck
boxes I could get the files I was
Continued hellip page 11
wwwbigbearccorg 11
Continued hellip Destroy computer
looking for without a bunch of extra
ldquoadded valuerdquo software but it was
very difficult
For the purposes of this article I
acted as an inexperienced user (or
an experienced user whorsquos not
paying attention) and clicked my
way through ads and dialogue box-
es that looked like the End User
License Agreement (EULA) wersquore
used to seeing through when in-
stalling software
And hellip They Got Me
After installing just a few programs
this way I started accumulating
browser toolbars (Bing Yahoo and
Google) and noticed my
search engine and home page had
been hijacked to something unwant-
ed As I continued the process
Windows started slowing down to a
crawl
After installing all of the programs
on my list I opened Windows 10rsquos
Programs and Features and each
browserrsquos extensions and add-ons
and counted 39 items that had been
installed in addition to the programs
I intended to get On rebooting
three new programs launched
popup windows at startup
including two that started running
virusregistry scans as soon as they
launched and a couple that flashed
warnings windows and offered fix-
es if I registered andor upgraded to
the full paid version
Remember this was originally a
clean install of Windows 10 that
needed nothing
Within a few minutes my computer
became noticeably slower plagued
by numerous popups and was
becoming essentially unusable
Remember this was originally a
clean install of Windows 10 that
needed nothing
Within a few minutes my computer
became noticeably slower plagued
by numerous popups and was
becoming essentially unusable
All of these were nasty but if even
a small fraction of them were I
would be in real trouble
Conclusions and Recommenda-
tions
Most of us will have to download
some third-party (non-Microsoft)
software from the Internet This
does not have to be dangerous if
you pay attention that the software
is being offered from the true home
site of that product NEVER down-
load software from any sponsored
link unless the desired software
creator is the sponsor
Do not depend on your
anti-malware program to protect
you It will catch some issues but
not all
wwwbigbearccorg 12
About Bearly Bytes
Bearly Bytes Newsletter past winner of SWUGC amp APCUG Newsletter contests is the official publication of the Big Bear Computer Club Views expressed in Bearly Bytes are those of the authors and do not necessarily reflect the opinions of Big Bear Computer Club Other computer user groups are welcome to reprint our articles as long as they give credit to the author and Bearly Bytes Big Bear Computer Club Submissions All BBCC members are encouraged to send letters articles questions and comments to Bearly Bytes for inclusion in future issues Submit as plain text in the body of an email and attach any graphics as JPEG or GIF format and send to treadwellbigbearccorg
Bits amp Bytes
The Opportunity Drawing Winners
left to right Kimberlee Kid First aid kit Linda Sharman Green backpack Angie Pezina helliphelliphelliphellipFirst aid kit Paul Palmquist helliphelliphellipTape measure key chain Mary Lou helliphelliphelliphelliphelliphellipFirst aid kit
Enter Find the Bear
contest to win a cool prize
1 Locate this BEAR 2 Click on it 3 Fill in the form 4 and then Send
At the next general meeting following this newsletter a drawing will be held for all who found the bear The
selected winner will receive a surprise gift
You will need to attend the meeting in order to receive the prize
August 2017 Club Meeting
The presentation by Bob Gostischa from Avast Software cov-
ered Computers
(Windows and Mac)
tablets and Smart Phones
He addressed three im-
portant areas (1) the im-
portance to use the right
tools once you get to the
Internet (2) he will show
how to exercise caution
when visiting the internet
and (3) the
importance to avoid the
dangers found on the in-
ternet For those who
could not make it to the
meeting You really need to
click on the httpsgoogl5v4sIQ (launches Google Docs)to
see his presentation on Tips for Staying Safe Online amp Pre-
venting Identity Theft
Bob Gostischa receiving a thank you
from our Club President
wwwbigbearccorg 13
Upcoming Calendar Events
Group Newsletter Sites
wwwbigbearccorg 14
Word Tips By Rosemary Lloyd
Excel Tips By Yomar Cleary
Apple News
The stories you really care about
The more you read the better
News gets at understanding your
interests And now itrsquos even more
personalized Top Stories choos-
es the stories that are relevant to
you and delivers them to your
screen while the Today widget
keeps you up to date throughout
the day News stays on top of the
stories yoursquore interested in So
you can too
All the news you want All in one place
News collects all the stories you want to read mdash so you no longer need to move from app to app to stay informed And with the For You tab itrsquos easier than ever to find the stories that matter most to you News also features breaking news notifications and subscriptions to some of your favorite publications
To Show or Hide the Ruler Applies To Word 2013
Click the View tab Click the check box
next to Ruler
to show or hide
the ruler
httpswwwgcflearnfreeorgword2013getting-to-know-word1
Cropping Graphics in Excel
Once you place a graphic in your workbook you may decide to crop it Cropping means to cut off part of the graphic so it doesnt show in your workbook To crop a graphic follow these steps
Make sure that the Format tab of
the ribbon is displayed (This
tab is only visible if you first
click on a graphic)
Click on the Crop tool in the Size
group
Click on one of the graphics corner
or side handles with the mouse
pointer
Drag the handle towards the center
of the graphic stopping when
you have cropped the desired
amount
You can turn off cropping by
clicking on the Crop tool again
or by pressing Esc
You should understand that while cropping a graphic makes it look smaller none of the original graphic is actually lost it is only hidden Cropping a graphic will not decrease the amount of storage space re-quired by that graphic in your workbook
wwwbigbearccorg 15
The following members have generously offered to help you with your PC
problems by phone or by email
Windows Beginners Yomar Cleary 9092146990 yclearycharternet
Microsoft Windows Rosemary Lloyd
9095477257 Rosemarybigbearccorg
MS Outlook Rosemary Lloyd
9095477257 Rosemarybigbearccorg
MS Excel Yomar Cleary 9098785622 yclearycharternet
MS Publisher Yomar Cleary 9092146990 yclearycharternet
CD Burning Rosemary Lloyd 9095477257 rosemarybigbearccorg
Computer Upgrades Marc Busch
9496099266 bigbearjedicharternet
The Computer Club provides training at the monthly meetings when there is no
presenter
Persons with all levels of computer knowledge are welcome to attend the
clubrsquos open meetings
Your First 2 visits are free Bring a friend
Annual Membership is $25 and spouse $5 All recurring membership dues are due in
January
Helpline Officers and Key Leaders
President Yomar Cleary 9092146990 yclearycharternet
Vice Presidenthellip helliphelliphelliphellip Marc Busch
9496099266 helliphelliphellipbigbearjedicharternet
Treasurer Tom Brandau 2134461315 tombran44gmailcom
Secretary Sandi Ybarra 9095858318 sandiscabingmailcom
Director at Large helliphelliphelliphelliphellip Jerry Merino 9095858714 gmerinocharternet
Director at Large helliphelliphellip Del Johnson
9095849017helliphellipdeljohnson_Isyahoocom
Director at Large helliphelliphellip Bill Treadwell
9097304625 treadwellbigbearccorg
Webmaster Rosemary Lloyd
9095477257 Rosemarybigbearccorg
Assistant Webmaster helliphelliphelliphellipBill Flanagan
9098669379 billbigbearccorg
Newsletter Editor Bill Treadwell
9097304625 treadwellbigbearccorg
Publicity Yomar Cleary
9092146990 yclearycharternet
Equipment Chair Marc Busch
9496099266 helliphelliphellipbigbearjedicharternet
Technical Advisor hellip Jim Lloyd
9095849358 inquiriessugarloafpccom
Refreshments Chair helliphelliphelliphellip Sharon Teeter
9095852026 sharonteeter1verizonnet
Historian Sandi Ybarra
9095858318 sandiscabingmailcom
Sunshine Chair Angie Pezina
9098662314 apezinagmailcom
Hospitality Chairhelliphelliphelliphelliphelliphellipvacant
THE BEAR WANTS YOU TO SHARE A TIP
Send tips to treadwellbigbearccorg
wwwbigbearccorg 16
Mailing Address
Big Bear Computer Club
PO Box 645
Big Bear City CA 92314
Monthly Meeting presen-
tation and demonstration
of popular hardware and
software
RAM (QampA) sessions
Tech News and Virus
Alerts
Door prize drawings
Bearly Bytes our award-
winning monthly news-
letter emailed
Website bigbearccorg
Free Software Review
Member Help Line
Member E-mail Notifica-tions
Member-only Discounts
Training workshops
All this for only $25 per year
Membership Benefits
New Renewal Update my Information
Full Name ___________________________________________________________________
Mailing Address _______________________________________________________________
City State Zip ________________________________________________________________
Home Phone _(______)___________________ Cell Phone_(_____)__________________
E-mail address ________________________________________________________________
Adding Associates
For each Family Member (s) add $5year towards your dues
Mail your application and check for dues to
BCC Treasurer
PO Box 645
Big Bear City CA 92314
Or bring your application and dues to a monthly general meeting
General Information and Membership Application
I agree that Big Bear Computer Club may use such photographs of me with or without my name and for any lawful purpose including for example such
purposes as publicity newsletter advertising and web content
Yes No Your initials _________
BIG BEAR COMPUTER CLUB INC P O BOX 645 ndash BIG BEAR CITY CA 92314
Membership Applicationmdash$2500 ndash Associate $5 You can pay your dues at the monthly meeting by mail -- make checks to Big Bear Computer
Club or by Pay Pal (Go into our website wwwbigbearccorg and go to ldquoDonaterdquo)
Computer Club meetings are held
in the Big Bear Senior Center
wwwbigbearccorg 3
Resource Networkcomputingcom
A look at the advantages NGFWs have over traditional network firewalls
The complexity of modern cyber attacks and advanced hacking methodologies are driving enterprises to look to next generation firewalls for better security New web-based malware and intrusion attempts bypass perimeter protections to exploit
applications Users are susceptible to malicious emails or phishing schemes as these threats are
concealed within the content itself and are delivered over the network undetected
Initially traditional firewalls just followed web protocols and werenrsquot intelligent enough to distinguish different kinds of web traffic Their inability to inspect network-packet data and identify legitimate business applications and attacks forced them to either accept or reject all the traffic
This meant that protection based on ports protocols IP addresses was no longer feasible Businesses needed a more robust form of security that wasnt just tied to the IP addresses They also needed newer rules for controlling website and application usage within a network That led to the evolution of next-generation firewalls (NGFWs) with advanced technologies that promised deeper inspection capabilities and better control over individual applications in a network
Here are the top five advantages next-generation firewalls have over traditional firewalls that every network professional should know
1 Multi-functional
Traditional firewalls provide basic packet filtering network and port address translations stateful inspections and can even support
virtual private networks However they are only limited to the Data Link Layer and Transport Layer of the OSI model
In addition to all the functionalities of traditional firewalls next generation firewalls also include integrated intrusion detection systems (IDS) and intrusion protection systems (IPS) that detect attacks based on traffic behavioral analysis threat signatures or anomalous activity This functionality helps perform deeper inspection and improve packet content filtering of network traffic up to the application layer
2 Application awareness
Traditional firewalls typically block common application ports or services on a network to control application access and monitor
specific threats However with network connectivity becoming more complex several applications use multiple or various ports making it extremely difficult for traditional firewalls to identify the targeted port
Moreover these ports are being used in various other ways such as tunneling in which a network protocol is enclosed within the packets carried by the second network and is de-encapsulated at the destination
To counter this next-generation firewall devices monitor traffic from layer 2 through layer 7 and are intelligent enough to determine what exactly is being sent or received If the content is within policy it is sent further or else its blocked
Application awareness also enables companies to set policies depending on the user and the application For instance allowing users to access Facebook but blocking Facebook Chats
Continued hellip page 4
5 Benefits of Next-Generation Firewalls
wwwbigbearccorg 4
ContinuedNew security
3 Streamlined infrastructure
Traditional firewalls require a separate security appliance for every new threat which leads to additional costs and efforts for maintaining and updating each of those devices
With dynamic IP addresses it becomes a complicated mess of configuring thousands of rules that are needed to identify and manage the traffic Also these devices donrsquot even provide the much needed controls and security to the content applications or even users
NGFWs provide integrated antivirus spam filtering deep-packet inspection and application control using only one device or console No extra devices are required thus reducing infrastructural
complexities
4 Threat protection
Unlike traditional firewalls NGFWs include antivirus and malware protection thats continuously upgraded automatically whenever new threats are discovered The NGFW device also minimizes the avenues of attack by limiting the applications that run on it
It then scans all the approved applications for any hidden vulnerabilities or confidential data leaks as well as mitigates risks from any unknown applications This also helps in reducing bandwidth usage from any useless traffic which isnt possible with traditional firewalls
5 Network speed
Though many vendors of traditional firewalls claim to offer a specific throughput (usually a gigabyte) from every port the reality is entirely different
The increased number of protection devices and services when turned on tend to choke the network speed By the time the traffic reaches the end user the speed is chopped by almost one-third of the actual promised speed
In contrast next-gen firewall
throughput remains exactly the same
irrespective of the number of
protection services
wwwbigbearccorg 5
Bluetooth Vulnerabilities
More in-depth details can be read
on this website
httpswwwarmiscomblueborne
Resource by Bruce Schneier
A bunch of Bluetooth vulnerabilities are being reported some pretty nasty
BlueBorne concerns us because of the medium by which it operates Unlike the majority of attacks today which rely on the internet a BlueBorne attack spreads through the air This works similarly to the two less extensive vulnerabilities discovered recently in a Broadcom Wi-Fi chip by Project Zero and Exodus The vulnerabilities found in Wi-Fi chips affect only the peripherals of the device and require another step to take control of the device With BlueBorne attackers can gain full control right from the start Moreover Bluetooth offers a wider attacker surface than WiFi almost entirely unexplored by the research community and hence contains far more vulnerabilities
Airborne attacks unfortunately provide a number of opportunities for the attacker First spreading through the air renders the attack much more contagious and allows it to spread with minimum effort Second it allows the attack to bypass current security measures and remain undetected as traditional methods do not protect from airborne threats Airborne attacks can also allow hackers to penetrate secure internal networks which are air gapped meaning they are disconnected from any other network for protection This can endanger industrial systems government agencies and critical infrastructure
Finally unlike traditional malware or attacks the user does not have to click on a link or download a
questionable file No action by the user is necessary to enable the attack
wwwbigbearccorg 6
Warning CCleaner Hacked to Distribute Malware
Resource by Swati Khandelwal September 18 2017
Over 23 Million Users Infected
If you have downloaded or updated CCleaner application on your computer between August 15 and September 12 of this year from its official website then pay attentionmdashyour computer has been compromised CCleaner is a popular application with over 2 billion downloads created by Piriform and recently acquired by Avast that allows users to clean up their system to optimize and enhance performance Security researchers from Cisco Talos discovered that the download servers used by Avast to let users download the appli-cation were compromised by some unknown hackers who replaced the original version of the software with the malicious one and distributed it to millions of users for around a month This incident is yet another example of supply chain attack Earlier this year update servers of a Ukrainian company called MeDoc were also compromised in the same way to distribute the Petya ransomware which
wreaked havoc worldwide Avast and Piriform have both confirmed that the Windows 32 bit version of CCleaner v5336162 and CCleaner Cloud v1073191 were affected by the malware
Detected on 13 September the malicious version of CCleaner contains a multi-stage malware payload that steals data from infected computers and sends it to attackers remote command-and-control servers Moreover the unknown hackers signed the malicious installation executable (v533) using a valid digital signature issued to Piriform by Symantec and used Domain Generation Algorithm (DGA) so that if attackers server went down the DGA could generate new domains to receive and send stolen information
All of the collected information was encrypted and encoded by base64 with a custom alphabet saysPaul Yung VP of Products at Piriform The encoded information was subsequently submitted to an external IP
address 216126xx (this address was hardcoded in the payload and we have intentionally masked its last two octets here) via a HTTPS POST request The malicious software was programmed to collect a large number of user data including Computer name List of installed software
including Windows up-dates
List of all running process-es
IP and MAC addresses Continued Page 7
wwwbigbearccorg 7
Continued CCleaner
Additional information like whether the process is running with admin privileges and whether it is a 64-bit system
How to Remove Malware From Your PC
According to the Talos researchers around 5 million people download CCleaner (or Crap Cleaner) each week which indicates that more than 20 Million people could have been infected with the malicious version the app The impact of this attack could be severe given the extremely high number of systems possibly
affected CCleaner claims to have over 2 billion downloads worldwide as of November 2016 and is reportedly adding new users at a rate of 5 million a week Talos said However Piriform estimated that up to 3 percent of its users (up to 227 million people) were affected by the malicious installation Affected users are strongly recommended to update their CCleaner software to version 534 or higher in order to protect their computers from being compromised
The latest
version is
available for
download
here
wwwbigbearccorg 8
Resource smithsoniancom
By Kat Eschner
Famously the first long-distance message Samuel Morse sent on the telegraph was ldquoWhat hath God wroughtrdquo When it comes to digital progress itrsquos a question thatrsquos still being answered The telegraph was a revolutionary means of communication in itself but itrsquos also connected to the development of modern computer languages Like any new technology its creation had a ripple effect provoking a wide range of other innovations Engineer Jean-Maurice-Eacutemile Baudot born on this day in 1845 was an important telegraph innovator whose telegraph system helped lay the groundwork for modern computers
Baudot had been a telegraph operator since 1869 write Fritz E Froehlich and Allen Kent in The FroehlichKent Encyclopedia of Telecommunications When he was training he learned how to operate Samuel Morsersquos original telegraph but he also learned to use other
telegraph models He practiced on the Hughes telegraph an early printing telegraph that had a keyboard like a piano and the Meyer telegraph which was the first to use paper tape with holes in it to record telegraph sig-nals according to author Anton A Huurdeman Baudot built on these innovations adding his own touch
Baudot Code Baudot Codes biggest advantage over Morse Code which was first used in the 1840s and other earli-er codes was its speed Earlier systems sent characters of infor-mation by using different lengths of character distinguished by a short gap (the ldquoditsrdquo and ldquodasrdquo of the Morse code system) ldquoBaudotrsquos code sent characters in a synchronized streamrdquo writes author Robin Boast ldquoas each character code was exactly the same length and had exactly the same number of elementsrdquo Alt-hough some of the ideas he used had been pioneered before Baudot was the first to connect them all in a system Boast writes He goes on to explain ldquomost sig-nificant for us is that Baudot was the first to recognize the im-portance of a simple five-bit binary codendasha digital coderdquo Baudotrsquos fixed-length binary code is a direct predecessor of some of the digital codes used today
ASCII the most widely accepted code for translating computer information into the words you see on your screen is based on Baudot code which itself went through several permutations after Bau-dots original innovation But more importantly Baudots code itself laid the first brick in the road to our digital universe writes James Draney for Review 31 Baudots Printing Telegraph was an encoding system that ran off five-bit binary
code It was not the first binary code of course but it was the first to be properly considered digital and its essence still exits in our computers tablets and mobiles today
Printing on paper tape
Having already patented his printing telegraph in France England and Germany Baudot se-cured an American patent for his printing telegraph on August 21 1888 The inventor wasnrsquot the first to use a paper-punch system to record telegraph signals but be-cause Baudot Code and his custom-built telegraph machines were widely embraced being much faster than previous telegraphs they helped keep the system alive His printing telegraph was a prede-cessor to computers because it ran without human intervention once the data (codes) were input presenting the information to the receiver in a readable formndashpaper tape with coded holes in it
Baudotrsquos teletype machine also called a teletypewriter used a five-key keyboard write Froehlich and Kent ldquoBorrowing from Meyer Baudot developed a distributor that allowed five instruments to share the same wirerdquo they write His prototype was tested in the later 1870s and widely adopted in France ldquoby 1892rdquo the pair write ldquoFrance had 101 Baudot-printing multiple telegraphs in operationrdquo
Digital printing using perforated paper was still used in the twentieth century Boast writes and it was ldquoone of the first recording media used for electronic computers in the 1940s and lsquo50srdquo Think punch cards and ticker tape
The Roots of Computer Code Lie in Telegraph Code
wwwbigbearccorg 9
Your Computer Club donation is tax deductible
Donations are accepted
though Paypal
You do not need a Paypal account to donate through Paypal
The Computer Club can recycle you old printer cartridges and cell phones Bring them to a club meeting and we will take them off your hands A simple way for the club to raise some funds
Big Bear Computer Club News
You Can Support the
Big Bear
Computer Club
at
NO COST TO YOU
By using AmazonSmile
For each Amazon purchase you
complete Amazon will donate
05 of the purchase price to
the Big Bear Computer Club
Below is the link from Amazon
Smile that will take you directly
to the Big Bear Computer Club
Amazon support page
httpssmileamazoncomch74
-3131147
You can consider sharing this
link with your family and friends
so they too can support the Big
Bear Computer Club
Big Bear Computer Club Board News
We have started a Facebook page (thank you Bill Flanagan) for the computer club Are any of you readers interested in doing the clubrsquos Facebook page Also we have an opening for Name TagsHospitality chairperson for our monthly club meetings You would meet and greet folks coming to the clubrsquos monthly meetings
Please contact Yomar Cleary yclearycharternet
Big Bear Computer Club Forum
The Big Bear Computer Club has a Discussion Computer Forum on a local Big Bear internet information site Herersquos a link to the directly take you into the forum
wwwsocalmountainscom
Big Bear Computer Club
Website Links
Club Bylaws
Standing Rules amp Policies
Board Meeting Minutes
BBC Cash Flow Statements
wwwbigbearccorg 10
How to Destroy Your Computer in Just Minutes
By David Kretchmar
Sun City Summerlin
Computer Club NV
Why You Should Avoid Installing
PUPS (Potentially Unwanted
Programs)
There are plenty of new computers
being used that are performing
much more slowly than they
should One of the quickest ways to
turn a fast new computer into a
slow system crippled by malware is
to start downloading software from
the wrong sites Or by downloading
the wrong software from what
appears to be the right site
Newer computers being slowed by
unwanted programs is a bother but
the damage done by PUPs can be
much more serious PUPs can be
responsible for programs that make
it impossible to access any of your
files or otherwise ruin your system
Every time you download anything
from the Internet you first issue
permissions that enable the opening
of a conduit or vector between the
Internet and your computer The
series of complex events is mostly
invisible to you except for your
clicking on that virtual button that
starts the whole process
Bing and Google searches often can
take you where you donrsquot want to
go When searching for popular
software sponsored search results
(which result in unwanted pro-
grams) often appear at the top of
the search results page along with
links from the actual software
source sites Often those ad links
try to install software on your
computer that you do not want It
could be anything it could be a
fake driver update program or a
scam system cleaning program
Note that my Bing search for VLC
media player first showed 4 sites
NOT associated with VLC ndash bad
sites
Testing Misleading
Advertisement links
How bad is it To find out I in-
stalled a fresh Windows 10 plus all
Windows updates on a freshly for-
matted hard drive I downloaded
and installed the free version of
Avast Antivirus software that
brought a hitchhiker of its own -
Google Chrome OK I wanted
Chrome but not every user would
so I considered this an invasive act
by a program I downloaded for pro-
tection
I used Edge Firefox and Google
Chrome and started using Google
and Bing search engines to start
searching for popular free pro-
grams The programs I sought are
often the first programs that get
installed on a PC Firefox Google
Chrome OpenOffice iTunes
Adobe Flash Java Adobe Acrobat
VLC and WinZip
Then I carelessly clicked on ad
results which appeared above or on
the same first page as ldquorealrdquo search
results These paid ads were
identified by notes and highlighted
in a very pale color to differentiate
them (slightly) from the actual
search links that appeared nearby
The ads didnrsquot appear after every
search and the ones that appeared
varied among searches and were
different for different browsers
Sometimes the first paid ad link
actually took me to the softwarersquos
true source site (ie searching for
Google offered wwwgooglecom
first) Often Avast would block a
download it recognized as harmful
but Avast did not catch many prob-
lems
For all of the searched for
programs I was able to bring up
more questionable sponsored search
results within seconds of repeated
searching Misleading results
showed up in all search engines and
I could not determine that any
browser offered better or worse
protection than others
For each ad link I clicked through
and installed the respective pro-
grams via the link or button
provided Instead of delivering just
the application I was looking for
all of the paid links attempted to
tack on unwanted programs In
some cases if I was careful to read
all of the fine print and uncheck
boxes I could get the files I was
Continued hellip page 11
wwwbigbearccorg 11
Continued hellip Destroy computer
looking for without a bunch of extra
ldquoadded valuerdquo software but it was
very difficult
For the purposes of this article I
acted as an inexperienced user (or
an experienced user whorsquos not
paying attention) and clicked my
way through ads and dialogue box-
es that looked like the End User
License Agreement (EULA) wersquore
used to seeing through when in-
stalling software
And hellip They Got Me
After installing just a few programs
this way I started accumulating
browser toolbars (Bing Yahoo and
Google) and noticed my
search engine and home page had
been hijacked to something unwant-
ed As I continued the process
Windows started slowing down to a
crawl
After installing all of the programs
on my list I opened Windows 10rsquos
Programs and Features and each
browserrsquos extensions and add-ons
and counted 39 items that had been
installed in addition to the programs
I intended to get On rebooting
three new programs launched
popup windows at startup
including two that started running
virusregistry scans as soon as they
launched and a couple that flashed
warnings windows and offered fix-
es if I registered andor upgraded to
the full paid version
Remember this was originally a
clean install of Windows 10 that
needed nothing
Within a few minutes my computer
became noticeably slower plagued
by numerous popups and was
becoming essentially unusable
Remember this was originally a
clean install of Windows 10 that
needed nothing
Within a few minutes my computer
became noticeably slower plagued
by numerous popups and was
becoming essentially unusable
All of these were nasty but if even
a small fraction of them were I
would be in real trouble
Conclusions and Recommenda-
tions
Most of us will have to download
some third-party (non-Microsoft)
software from the Internet This
does not have to be dangerous if
you pay attention that the software
is being offered from the true home
site of that product NEVER down-
load software from any sponsored
link unless the desired software
creator is the sponsor
Do not depend on your
anti-malware program to protect
you It will catch some issues but
not all
wwwbigbearccorg 12
About Bearly Bytes
Bearly Bytes Newsletter past winner of SWUGC amp APCUG Newsletter contests is the official publication of the Big Bear Computer Club Views expressed in Bearly Bytes are those of the authors and do not necessarily reflect the opinions of Big Bear Computer Club Other computer user groups are welcome to reprint our articles as long as they give credit to the author and Bearly Bytes Big Bear Computer Club Submissions All BBCC members are encouraged to send letters articles questions and comments to Bearly Bytes for inclusion in future issues Submit as plain text in the body of an email and attach any graphics as JPEG or GIF format and send to treadwellbigbearccorg
Bits amp Bytes
The Opportunity Drawing Winners
left to right Kimberlee Kid First aid kit Linda Sharman Green backpack Angie Pezina helliphelliphelliphellipFirst aid kit Paul Palmquist helliphelliphellipTape measure key chain Mary Lou helliphelliphelliphelliphelliphellipFirst aid kit
Enter Find the Bear
contest to win a cool prize
1 Locate this BEAR 2 Click on it 3 Fill in the form 4 and then Send
At the next general meeting following this newsletter a drawing will be held for all who found the bear The
selected winner will receive a surprise gift
You will need to attend the meeting in order to receive the prize
August 2017 Club Meeting
The presentation by Bob Gostischa from Avast Software cov-
ered Computers
(Windows and Mac)
tablets and Smart Phones
He addressed three im-
portant areas (1) the im-
portance to use the right
tools once you get to the
Internet (2) he will show
how to exercise caution
when visiting the internet
and (3) the
importance to avoid the
dangers found on the in-
ternet For those who
could not make it to the
meeting You really need to
click on the httpsgoogl5v4sIQ (launches Google Docs)to
see his presentation on Tips for Staying Safe Online amp Pre-
venting Identity Theft
Bob Gostischa receiving a thank you
from our Club President
wwwbigbearccorg 13
Upcoming Calendar Events
Group Newsletter Sites
wwwbigbearccorg 14
Word Tips By Rosemary Lloyd
Excel Tips By Yomar Cleary
Apple News
The stories you really care about
The more you read the better
News gets at understanding your
interests And now itrsquos even more
personalized Top Stories choos-
es the stories that are relevant to
you and delivers them to your
screen while the Today widget
keeps you up to date throughout
the day News stays on top of the
stories yoursquore interested in So
you can too
All the news you want All in one place
News collects all the stories you want to read mdash so you no longer need to move from app to app to stay informed And with the For You tab itrsquos easier than ever to find the stories that matter most to you News also features breaking news notifications and subscriptions to some of your favorite publications
To Show or Hide the Ruler Applies To Word 2013
Click the View tab Click the check box
next to Ruler
to show or hide
the ruler
httpswwwgcflearnfreeorgword2013getting-to-know-word1
Cropping Graphics in Excel
Once you place a graphic in your workbook you may decide to crop it Cropping means to cut off part of the graphic so it doesnt show in your workbook To crop a graphic follow these steps
Make sure that the Format tab of
the ribbon is displayed (This
tab is only visible if you first
click on a graphic)
Click on the Crop tool in the Size
group
Click on one of the graphics corner
or side handles with the mouse
pointer
Drag the handle towards the center
of the graphic stopping when
you have cropped the desired
amount
You can turn off cropping by
clicking on the Crop tool again
or by pressing Esc
You should understand that while cropping a graphic makes it look smaller none of the original graphic is actually lost it is only hidden Cropping a graphic will not decrease the amount of storage space re-quired by that graphic in your workbook
wwwbigbearccorg 15
The following members have generously offered to help you with your PC
problems by phone or by email
Windows Beginners Yomar Cleary 9092146990 yclearycharternet
Microsoft Windows Rosemary Lloyd
9095477257 Rosemarybigbearccorg
MS Outlook Rosemary Lloyd
9095477257 Rosemarybigbearccorg
MS Excel Yomar Cleary 9098785622 yclearycharternet
MS Publisher Yomar Cleary 9092146990 yclearycharternet
CD Burning Rosemary Lloyd 9095477257 rosemarybigbearccorg
Computer Upgrades Marc Busch
9496099266 bigbearjedicharternet
The Computer Club provides training at the monthly meetings when there is no
presenter
Persons with all levels of computer knowledge are welcome to attend the
clubrsquos open meetings
Your First 2 visits are free Bring a friend
Annual Membership is $25 and spouse $5 All recurring membership dues are due in
January
Helpline Officers and Key Leaders
President Yomar Cleary 9092146990 yclearycharternet
Vice Presidenthellip helliphelliphelliphellip Marc Busch
9496099266 helliphelliphellipbigbearjedicharternet
Treasurer Tom Brandau 2134461315 tombran44gmailcom
Secretary Sandi Ybarra 9095858318 sandiscabingmailcom
Director at Large helliphelliphelliphelliphellip Jerry Merino 9095858714 gmerinocharternet
Director at Large helliphelliphellip Del Johnson
9095849017helliphellipdeljohnson_Isyahoocom
Director at Large helliphelliphellip Bill Treadwell
9097304625 treadwellbigbearccorg
Webmaster Rosemary Lloyd
9095477257 Rosemarybigbearccorg
Assistant Webmaster helliphelliphelliphellipBill Flanagan
9098669379 billbigbearccorg
Newsletter Editor Bill Treadwell
9097304625 treadwellbigbearccorg
Publicity Yomar Cleary
9092146990 yclearycharternet
Equipment Chair Marc Busch
9496099266 helliphelliphellipbigbearjedicharternet
Technical Advisor hellip Jim Lloyd
9095849358 inquiriessugarloafpccom
Refreshments Chair helliphelliphelliphellip Sharon Teeter
9095852026 sharonteeter1verizonnet
Historian Sandi Ybarra
9095858318 sandiscabingmailcom
Sunshine Chair Angie Pezina
9098662314 apezinagmailcom
Hospitality Chairhelliphelliphelliphelliphelliphellipvacant
THE BEAR WANTS YOU TO SHARE A TIP
Send tips to treadwellbigbearccorg
wwwbigbearccorg 16
Mailing Address
Big Bear Computer Club
PO Box 645
Big Bear City CA 92314
Monthly Meeting presen-
tation and demonstration
of popular hardware and
software
RAM (QampA) sessions
Tech News and Virus
Alerts
Door prize drawings
Bearly Bytes our award-
winning monthly news-
letter emailed
Website bigbearccorg
Free Software Review
Member Help Line
Member E-mail Notifica-tions
Member-only Discounts
Training workshops
All this for only $25 per year
Membership Benefits
New Renewal Update my Information
Full Name ___________________________________________________________________
Mailing Address _______________________________________________________________
City State Zip ________________________________________________________________
Home Phone _(______)___________________ Cell Phone_(_____)__________________
E-mail address ________________________________________________________________
Adding Associates
For each Family Member (s) add $5year towards your dues
Mail your application and check for dues to
BCC Treasurer
PO Box 645
Big Bear City CA 92314
Or bring your application and dues to a monthly general meeting
General Information and Membership Application
I agree that Big Bear Computer Club may use such photographs of me with or without my name and for any lawful purpose including for example such
purposes as publicity newsletter advertising and web content
Yes No Your initials _________
BIG BEAR COMPUTER CLUB INC P O BOX 645 ndash BIG BEAR CITY CA 92314
Membership Applicationmdash$2500 ndash Associate $5 You can pay your dues at the monthly meeting by mail -- make checks to Big Bear Computer
Club or by Pay Pal (Go into our website wwwbigbearccorg and go to ldquoDonaterdquo)
Computer Club meetings are held
in the Big Bear Senior Center
wwwbigbearccorg 4
ContinuedNew security
3 Streamlined infrastructure
Traditional firewalls require a separate security appliance for every new threat which leads to additional costs and efforts for maintaining and updating each of those devices
With dynamic IP addresses it becomes a complicated mess of configuring thousands of rules that are needed to identify and manage the traffic Also these devices donrsquot even provide the much needed controls and security to the content applications or even users
NGFWs provide integrated antivirus spam filtering deep-packet inspection and application control using only one device or console No extra devices are required thus reducing infrastructural
complexities
4 Threat protection
Unlike traditional firewalls NGFWs include antivirus and malware protection thats continuously upgraded automatically whenever new threats are discovered The NGFW device also minimizes the avenues of attack by limiting the applications that run on it
It then scans all the approved applications for any hidden vulnerabilities or confidential data leaks as well as mitigates risks from any unknown applications This also helps in reducing bandwidth usage from any useless traffic which isnt possible with traditional firewalls
5 Network speed
Though many vendors of traditional firewalls claim to offer a specific throughput (usually a gigabyte) from every port the reality is entirely different
The increased number of protection devices and services when turned on tend to choke the network speed By the time the traffic reaches the end user the speed is chopped by almost one-third of the actual promised speed
In contrast next-gen firewall
throughput remains exactly the same
irrespective of the number of
protection services
wwwbigbearccorg 5
Bluetooth Vulnerabilities
More in-depth details can be read
on this website
httpswwwarmiscomblueborne
Resource by Bruce Schneier
A bunch of Bluetooth vulnerabilities are being reported some pretty nasty
BlueBorne concerns us because of the medium by which it operates Unlike the majority of attacks today which rely on the internet a BlueBorne attack spreads through the air This works similarly to the two less extensive vulnerabilities discovered recently in a Broadcom Wi-Fi chip by Project Zero and Exodus The vulnerabilities found in Wi-Fi chips affect only the peripherals of the device and require another step to take control of the device With BlueBorne attackers can gain full control right from the start Moreover Bluetooth offers a wider attacker surface than WiFi almost entirely unexplored by the research community and hence contains far more vulnerabilities
Airborne attacks unfortunately provide a number of opportunities for the attacker First spreading through the air renders the attack much more contagious and allows it to spread with minimum effort Second it allows the attack to bypass current security measures and remain undetected as traditional methods do not protect from airborne threats Airborne attacks can also allow hackers to penetrate secure internal networks which are air gapped meaning they are disconnected from any other network for protection This can endanger industrial systems government agencies and critical infrastructure
Finally unlike traditional malware or attacks the user does not have to click on a link or download a
questionable file No action by the user is necessary to enable the attack
wwwbigbearccorg 6
Warning CCleaner Hacked to Distribute Malware
Resource by Swati Khandelwal September 18 2017
Over 23 Million Users Infected
If you have downloaded or updated CCleaner application on your computer between August 15 and September 12 of this year from its official website then pay attentionmdashyour computer has been compromised CCleaner is a popular application with over 2 billion downloads created by Piriform and recently acquired by Avast that allows users to clean up their system to optimize and enhance performance Security researchers from Cisco Talos discovered that the download servers used by Avast to let users download the appli-cation were compromised by some unknown hackers who replaced the original version of the software with the malicious one and distributed it to millions of users for around a month This incident is yet another example of supply chain attack Earlier this year update servers of a Ukrainian company called MeDoc were also compromised in the same way to distribute the Petya ransomware which
wreaked havoc worldwide Avast and Piriform have both confirmed that the Windows 32 bit version of CCleaner v5336162 and CCleaner Cloud v1073191 were affected by the malware
Detected on 13 September the malicious version of CCleaner contains a multi-stage malware payload that steals data from infected computers and sends it to attackers remote command-and-control servers Moreover the unknown hackers signed the malicious installation executable (v533) using a valid digital signature issued to Piriform by Symantec and used Domain Generation Algorithm (DGA) so that if attackers server went down the DGA could generate new domains to receive and send stolen information
All of the collected information was encrypted and encoded by base64 with a custom alphabet saysPaul Yung VP of Products at Piriform The encoded information was subsequently submitted to an external IP
address 216126xx (this address was hardcoded in the payload and we have intentionally masked its last two octets here) via a HTTPS POST request The malicious software was programmed to collect a large number of user data including Computer name List of installed software
including Windows up-dates
List of all running process-es
IP and MAC addresses Continued Page 7
wwwbigbearccorg 7
Continued CCleaner
Additional information like whether the process is running with admin privileges and whether it is a 64-bit system
How to Remove Malware From Your PC
According to the Talos researchers around 5 million people download CCleaner (or Crap Cleaner) each week which indicates that more than 20 Million people could have been infected with the malicious version the app The impact of this attack could be severe given the extremely high number of systems possibly
affected CCleaner claims to have over 2 billion downloads worldwide as of November 2016 and is reportedly adding new users at a rate of 5 million a week Talos said However Piriform estimated that up to 3 percent of its users (up to 227 million people) were affected by the malicious installation Affected users are strongly recommended to update their CCleaner software to version 534 or higher in order to protect their computers from being compromised
The latest
version is
available for
download
here
wwwbigbearccorg 8
Resource smithsoniancom
By Kat Eschner
Famously the first long-distance message Samuel Morse sent on the telegraph was ldquoWhat hath God wroughtrdquo When it comes to digital progress itrsquos a question thatrsquos still being answered The telegraph was a revolutionary means of communication in itself but itrsquos also connected to the development of modern computer languages Like any new technology its creation had a ripple effect provoking a wide range of other innovations Engineer Jean-Maurice-Eacutemile Baudot born on this day in 1845 was an important telegraph innovator whose telegraph system helped lay the groundwork for modern computers
Baudot had been a telegraph operator since 1869 write Fritz E Froehlich and Allen Kent in The FroehlichKent Encyclopedia of Telecommunications When he was training he learned how to operate Samuel Morsersquos original telegraph but he also learned to use other
telegraph models He practiced on the Hughes telegraph an early printing telegraph that had a keyboard like a piano and the Meyer telegraph which was the first to use paper tape with holes in it to record telegraph sig-nals according to author Anton A Huurdeman Baudot built on these innovations adding his own touch
Baudot Code Baudot Codes biggest advantage over Morse Code which was first used in the 1840s and other earli-er codes was its speed Earlier systems sent characters of infor-mation by using different lengths of character distinguished by a short gap (the ldquoditsrdquo and ldquodasrdquo of the Morse code system) ldquoBaudotrsquos code sent characters in a synchronized streamrdquo writes author Robin Boast ldquoas each character code was exactly the same length and had exactly the same number of elementsrdquo Alt-hough some of the ideas he used had been pioneered before Baudot was the first to connect them all in a system Boast writes He goes on to explain ldquomost sig-nificant for us is that Baudot was the first to recognize the im-portance of a simple five-bit binary codendasha digital coderdquo Baudotrsquos fixed-length binary code is a direct predecessor of some of the digital codes used today
ASCII the most widely accepted code for translating computer information into the words you see on your screen is based on Baudot code which itself went through several permutations after Bau-dots original innovation But more importantly Baudots code itself laid the first brick in the road to our digital universe writes James Draney for Review 31 Baudots Printing Telegraph was an encoding system that ran off five-bit binary
code It was not the first binary code of course but it was the first to be properly considered digital and its essence still exits in our computers tablets and mobiles today
Printing on paper tape
Having already patented his printing telegraph in France England and Germany Baudot se-cured an American patent for his printing telegraph on August 21 1888 The inventor wasnrsquot the first to use a paper-punch system to record telegraph signals but be-cause Baudot Code and his custom-built telegraph machines were widely embraced being much faster than previous telegraphs they helped keep the system alive His printing telegraph was a prede-cessor to computers because it ran without human intervention once the data (codes) were input presenting the information to the receiver in a readable formndashpaper tape with coded holes in it
Baudotrsquos teletype machine also called a teletypewriter used a five-key keyboard write Froehlich and Kent ldquoBorrowing from Meyer Baudot developed a distributor that allowed five instruments to share the same wirerdquo they write His prototype was tested in the later 1870s and widely adopted in France ldquoby 1892rdquo the pair write ldquoFrance had 101 Baudot-printing multiple telegraphs in operationrdquo
Digital printing using perforated paper was still used in the twentieth century Boast writes and it was ldquoone of the first recording media used for electronic computers in the 1940s and lsquo50srdquo Think punch cards and ticker tape
The Roots of Computer Code Lie in Telegraph Code
wwwbigbearccorg 9
Your Computer Club donation is tax deductible
Donations are accepted
though Paypal
You do not need a Paypal account to donate through Paypal
The Computer Club can recycle you old printer cartridges and cell phones Bring them to a club meeting and we will take them off your hands A simple way for the club to raise some funds
Big Bear Computer Club News
You Can Support the
Big Bear
Computer Club
at
NO COST TO YOU
By using AmazonSmile
For each Amazon purchase you
complete Amazon will donate
05 of the purchase price to
the Big Bear Computer Club
Below is the link from Amazon
Smile that will take you directly
to the Big Bear Computer Club
Amazon support page
httpssmileamazoncomch74
-3131147
You can consider sharing this
link with your family and friends
so they too can support the Big
Bear Computer Club
Big Bear Computer Club Board News
We have started a Facebook page (thank you Bill Flanagan) for the computer club Are any of you readers interested in doing the clubrsquos Facebook page Also we have an opening for Name TagsHospitality chairperson for our monthly club meetings You would meet and greet folks coming to the clubrsquos monthly meetings
Please contact Yomar Cleary yclearycharternet
Big Bear Computer Club Forum
The Big Bear Computer Club has a Discussion Computer Forum on a local Big Bear internet information site Herersquos a link to the directly take you into the forum
wwwsocalmountainscom
Big Bear Computer Club
Website Links
Club Bylaws
Standing Rules amp Policies
Board Meeting Minutes
BBC Cash Flow Statements
wwwbigbearccorg 10
How to Destroy Your Computer in Just Minutes
By David Kretchmar
Sun City Summerlin
Computer Club NV
Why You Should Avoid Installing
PUPS (Potentially Unwanted
Programs)
There are plenty of new computers
being used that are performing
much more slowly than they
should One of the quickest ways to
turn a fast new computer into a
slow system crippled by malware is
to start downloading software from
the wrong sites Or by downloading
the wrong software from what
appears to be the right site
Newer computers being slowed by
unwanted programs is a bother but
the damage done by PUPs can be
much more serious PUPs can be
responsible for programs that make
it impossible to access any of your
files or otherwise ruin your system
Every time you download anything
from the Internet you first issue
permissions that enable the opening
of a conduit or vector between the
Internet and your computer The
series of complex events is mostly
invisible to you except for your
clicking on that virtual button that
starts the whole process
Bing and Google searches often can
take you where you donrsquot want to
go When searching for popular
software sponsored search results
(which result in unwanted pro-
grams) often appear at the top of
the search results page along with
links from the actual software
source sites Often those ad links
try to install software on your
computer that you do not want It
could be anything it could be a
fake driver update program or a
scam system cleaning program
Note that my Bing search for VLC
media player first showed 4 sites
NOT associated with VLC ndash bad
sites
Testing Misleading
Advertisement links
How bad is it To find out I in-
stalled a fresh Windows 10 plus all
Windows updates on a freshly for-
matted hard drive I downloaded
and installed the free version of
Avast Antivirus software that
brought a hitchhiker of its own -
Google Chrome OK I wanted
Chrome but not every user would
so I considered this an invasive act
by a program I downloaded for pro-
tection
I used Edge Firefox and Google
Chrome and started using Google
and Bing search engines to start
searching for popular free pro-
grams The programs I sought are
often the first programs that get
installed on a PC Firefox Google
Chrome OpenOffice iTunes
Adobe Flash Java Adobe Acrobat
VLC and WinZip
Then I carelessly clicked on ad
results which appeared above or on
the same first page as ldquorealrdquo search
results These paid ads were
identified by notes and highlighted
in a very pale color to differentiate
them (slightly) from the actual
search links that appeared nearby
The ads didnrsquot appear after every
search and the ones that appeared
varied among searches and were
different for different browsers
Sometimes the first paid ad link
actually took me to the softwarersquos
true source site (ie searching for
Google offered wwwgooglecom
first) Often Avast would block a
download it recognized as harmful
but Avast did not catch many prob-
lems
For all of the searched for
programs I was able to bring up
more questionable sponsored search
results within seconds of repeated
searching Misleading results
showed up in all search engines and
I could not determine that any
browser offered better or worse
protection than others
For each ad link I clicked through
and installed the respective pro-
grams via the link or button
provided Instead of delivering just
the application I was looking for
all of the paid links attempted to
tack on unwanted programs In
some cases if I was careful to read
all of the fine print and uncheck
boxes I could get the files I was
Continued hellip page 11
wwwbigbearccorg 11
Continued hellip Destroy computer
looking for without a bunch of extra
ldquoadded valuerdquo software but it was
very difficult
For the purposes of this article I
acted as an inexperienced user (or
an experienced user whorsquos not
paying attention) and clicked my
way through ads and dialogue box-
es that looked like the End User
License Agreement (EULA) wersquore
used to seeing through when in-
stalling software
And hellip They Got Me
After installing just a few programs
this way I started accumulating
browser toolbars (Bing Yahoo and
Google) and noticed my
search engine and home page had
been hijacked to something unwant-
ed As I continued the process
Windows started slowing down to a
crawl
After installing all of the programs
on my list I opened Windows 10rsquos
Programs and Features and each
browserrsquos extensions and add-ons
and counted 39 items that had been
installed in addition to the programs
I intended to get On rebooting
three new programs launched
popup windows at startup
including two that started running
virusregistry scans as soon as they
launched and a couple that flashed
warnings windows and offered fix-
es if I registered andor upgraded to
the full paid version
Remember this was originally a
clean install of Windows 10 that
needed nothing
Within a few minutes my computer
became noticeably slower plagued
by numerous popups and was
becoming essentially unusable
Remember this was originally a
clean install of Windows 10 that
needed nothing
Within a few minutes my computer
became noticeably slower plagued
by numerous popups and was
becoming essentially unusable
All of these were nasty but if even
a small fraction of them were I
would be in real trouble
Conclusions and Recommenda-
tions
Most of us will have to download
some third-party (non-Microsoft)
software from the Internet This
does not have to be dangerous if
you pay attention that the software
is being offered from the true home
site of that product NEVER down-
load software from any sponsored
link unless the desired software
creator is the sponsor
Do not depend on your
anti-malware program to protect
you It will catch some issues but
not all
wwwbigbearccorg 12
About Bearly Bytes
Bearly Bytes Newsletter past winner of SWUGC amp APCUG Newsletter contests is the official publication of the Big Bear Computer Club Views expressed in Bearly Bytes are those of the authors and do not necessarily reflect the opinions of Big Bear Computer Club Other computer user groups are welcome to reprint our articles as long as they give credit to the author and Bearly Bytes Big Bear Computer Club Submissions All BBCC members are encouraged to send letters articles questions and comments to Bearly Bytes for inclusion in future issues Submit as plain text in the body of an email and attach any graphics as JPEG or GIF format and send to treadwellbigbearccorg
Bits amp Bytes
The Opportunity Drawing Winners
left to right Kimberlee Kid First aid kit Linda Sharman Green backpack Angie Pezina helliphelliphelliphellipFirst aid kit Paul Palmquist helliphelliphellipTape measure key chain Mary Lou helliphelliphelliphelliphelliphellipFirst aid kit
Enter Find the Bear
contest to win a cool prize
1 Locate this BEAR 2 Click on it 3 Fill in the form 4 and then Send
At the next general meeting following this newsletter a drawing will be held for all who found the bear The
selected winner will receive a surprise gift
You will need to attend the meeting in order to receive the prize
August 2017 Club Meeting
The presentation by Bob Gostischa from Avast Software cov-
ered Computers
(Windows and Mac)
tablets and Smart Phones
He addressed three im-
portant areas (1) the im-
portance to use the right
tools once you get to the
Internet (2) he will show
how to exercise caution
when visiting the internet
and (3) the
importance to avoid the
dangers found on the in-
ternet For those who
could not make it to the
meeting You really need to
click on the httpsgoogl5v4sIQ (launches Google Docs)to
see his presentation on Tips for Staying Safe Online amp Pre-
venting Identity Theft
Bob Gostischa receiving a thank you
from our Club President
wwwbigbearccorg 13
Upcoming Calendar Events
Group Newsletter Sites
wwwbigbearccorg 14
Word Tips By Rosemary Lloyd
Excel Tips By Yomar Cleary
Apple News
The stories you really care about
The more you read the better
News gets at understanding your
interests And now itrsquos even more
personalized Top Stories choos-
es the stories that are relevant to
you and delivers them to your
screen while the Today widget
keeps you up to date throughout
the day News stays on top of the
stories yoursquore interested in So
you can too
All the news you want All in one place
News collects all the stories you want to read mdash so you no longer need to move from app to app to stay informed And with the For You tab itrsquos easier than ever to find the stories that matter most to you News also features breaking news notifications and subscriptions to some of your favorite publications
To Show or Hide the Ruler Applies To Word 2013
Click the View tab Click the check box
next to Ruler
to show or hide
the ruler
httpswwwgcflearnfreeorgword2013getting-to-know-word1
Cropping Graphics in Excel
Once you place a graphic in your workbook you may decide to crop it Cropping means to cut off part of the graphic so it doesnt show in your workbook To crop a graphic follow these steps
Make sure that the Format tab of
the ribbon is displayed (This
tab is only visible if you first
click on a graphic)
Click on the Crop tool in the Size
group
Click on one of the graphics corner
or side handles with the mouse
pointer
Drag the handle towards the center
of the graphic stopping when
you have cropped the desired
amount
You can turn off cropping by
clicking on the Crop tool again
or by pressing Esc
You should understand that while cropping a graphic makes it look smaller none of the original graphic is actually lost it is only hidden Cropping a graphic will not decrease the amount of storage space re-quired by that graphic in your workbook
wwwbigbearccorg 15
The following members have generously offered to help you with your PC
problems by phone or by email
Windows Beginners Yomar Cleary 9092146990 yclearycharternet
Microsoft Windows Rosemary Lloyd
9095477257 Rosemarybigbearccorg
MS Outlook Rosemary Lloyd
9095477257 Rosemarybigbearccorg
MS Excel Yomar Cleary 9098785622 yclearycharternet
MS Publisher Yomar Cleary 9092146990 yclearycharternet
CD Burning Rosemary Lloyd 9095477257 rosemarybigbearccorg
Computer Upgrades Marc Busch
9496099266 bigbearjedicharternet
The Computer Club provides training at the monthly meetings when there is no
presenter
Persons with all levels of computer knowledge are welcome to attend the
clubrsquos open meetings
Your First 2 visits are free Bring a friend
Annual Membership is $25 and spouse $5 All recurring membership dues are due in
January
Helpline Officers and Key Leaders
President Yomar Cleary 9092146990 yclearycharternet
Vice Presidenthellip helliphelliphelliphellip Marc Busch
9496099266 helliphelliphellipbigbearjedicharternet
Treasurer Tom Brandau 2134461315 tombran44gmailcom
Secretary Sandi Ybarra 9095858318 sandiscabingmailcom
Director at Large helliphelliphelliphelliphellip Jerry Merino 9095858714 gmerinocharternet
Director at Large helliphelliphellip Del Johnson
9095849017helliphellipdeljohnson_Isyahoocom
Director at Large helliphelliphellip Bill Treadwell
9097304625 treadwellbigbearccorg
Webmaster Rosemary Lloyd
9095477257 Rosemarybigbearccorg
Assistant Webmaster helliphelliphelliphellipBill Flanagan
9098669379 billbigbearccorg
Newsletter Editor Bill Treadwell
9097304625 treadwellbigbearccorg
Publicity Yomar Cleary
9092146990 yclearycharternet
Equipment Chair Marc Busch
9496099266 helliphelliphellipbigbearjedicharternet
Technical Advisor hellip Jim Lloyd
9095849358 inquiriessugarloafpccom
Refreshments Chair helliphelliphelliphellip Sharon Teeter
9095852026 sharonteeter1verizonnet
Historian Sandi Ybarra
9095858318 sandiscabingmailcom
Sunshine Chair Angie Pezina
9098662314 apezinagmailcom
Hospitality Chairhelliphelliphelliphelliphelliphellipvacant
THE BEAR WANTS YOU TO SHARE A TIP
Send tips to treadwellbigbearccorg
wwwbigbearccorg 16
Mailing Address
Big Bear Computer Club
PO Box 645
Big Bear City CA 92314
Monthly Meeting presen-
tation and demonstration
of popular hardware and
software
RAM (QampA) sessions
Tech News and Virus
Alerts
Door prize drawings
Bearly Bytes our award-
winning monthly news-
letter emailed
Website bigbearccorg
Free Software Review
Member Help Line
Member E-mail Notifica-tions
Member-only Discounts
Training workshops
All this for only $25 per year
Membership Benefits
New Renewal Update my Information
Full Name ___________________________________________________________________
Mailing Address _______________________________________________________________
City State Zip ________________________________________________________________
Home Phone _(______)___________________ Cell Phone_(_____)__________________
E-mail address ________________________________________________________________
Adding Associates
For each Family Member (s) add $5year towards your dues
Mail your application and check for dues to
BCC Treasurer
PO Box 645
Big Bear City CA 92314
Or bring your application and dues to a monthly general meeting
General Information and Membership Application
I agree that Big Bear Computer Club may use such photographs of me with or without my name and for any lawful purpose including for example such
purposes as publicity newsletter advertising and web content
Yes No Your initials _________
BIG BEAR COMPUTER CLUB INC P O BOX 645 ndash BIG BEAR CITY CA 92314
Membership Applicationmdash$2500 ndash Associate $5 You can pay your dues at the monthly meeting by mail -- make checks to Big Bear Computer
Club or by Pay Pal (Go into our website wwwbigbearccorg and go to ldquoDonaterdquo)
Computer Club meetings are held
in the Big Bear Senior Center
wwwbigbearccorg 5
Bluetooth Vulnerabilities
More in-depth details can be read
on this website
httpswwwarmiscomblueborne
Resource by Bruce Schneier
A bunch of Bluetooth vulnerabilities are being reported some pretty nasty
BlueBorne concerns us because of the medium by which it operates Unlike the majority of attacks today which rely on the internet a BlueBorne attack spreads through the air This works similarly to the two less extensive vulnerabilities discovered recently in a Broadcom Wi-Fi chip by Project Zero and Exodus The vulnerabilities found in Wi-Fi chips affect only the peripherals of the device and require another step to take control of the device With BlueBorne attackers can gain full control right from the start Moreover Bluetooth offers a wider attacker surface than WiFi almost entirely unexplored by the research community and hence contains far more vulnerabilities
Airborne attacks unfortunately provide a number of opportunities for the attacker First spreading through the air renders the attack much more contagious and allows it to spread with minimum effort Second it allows the attack to bypass current security measures and remain undetected as traditional methods do not protect from airborne threats Airborne attacks can also allow hackers to penetrate secure internal networks which are air gapped meaning they are disconnected from any other network for protection This can endanger industrial systems government agencies and critical infrastructure
Finally unlike traditional malware or attacks the user does not have to click on a link or download a
questionable file No action by the user is necessary to enable the attack
wwwbigbearccorg 6
Warning CCleaner Hacked to Distribute Malware
Resource by Swati Khandelwal September 18 2017
Over 23 Million Users Infected
If you have downloaded or updated CCleaner application on your computer between August 15 and September 12 of this year from its official website then pay attentionmdashyour computer has been compromised CCleaner is a popular application with over 2 billion downloads created by Piriform and recently acquired by Avast that allows users to clean up their system to optimize and enhance performance Security researchers from Cisco Talos discovered that the download servers used by Avast to let users download the appli-cation were compromised by some unknown hackers who replaced the original version of the software with the malicious one and distributed it to millions of users for around a month This incident is yet another example of supply chain attack Earlier this year update servers of a Ukrainian company called MeDoc were also compromised in the same way to distribute the Petya ransomware which
wreaked havoc worldwide Avast and Piriform have both confirmed that the Windows 32 bit version of CCleaner v5336162 and CCleaner Cloud v1073191 were affected by the malware
Detected on 13 September the malicious version of CCleaner contains a multi-stage malware payload that steals data from infected computers and sends it to attackers remote command-and-control servers Moreover the unknown hackers signed the malicious installation executable (v533) using a valid digital signature issued to Piriform by Symantec and used Domain Generation Algorithm (DGA) so that if attackers server went down the DGA could generate new domains to receive and send stolen information
All of the collected information was encrypted and encoded by base64 with a custom alphabet saysPaul Yung VP of Products at Piriform The encoded information was subsequently submitted to an external IP
address 216126xx (this address was hardcoded in the payload and we have intentionally masked its last two octets here) via a HTTPS POST request The malicious software was programmed to collect a large number of user data including Computer name List of installed software
including Windows up-dates
List of all running process-es
IP and MAC addresses Continued Page 7
wwwbigbearccorg 7
Continued CCleaner
Additional information like whether the process is running with admin privileges and whether it is a 64-bit system
How to Remove Malware From Your PC
According to the Talos researchers around 5 million people download CCleaner (or Crap Cleaner) each week which indicates that more than 20 Million people could have been infected with the malicious version the app The impact of this attack could be severe given the extremely high number of systems possibly
affected CCleaner claims to have over 2 billion downloads worldwide as of November 2016 and is reportedly adding new users at a rate of 5 million a week Talos said However Piriform estimated that up to 3 percent of its users (up to 227 million people) were affected by the malicious installation Affected users are strongly recommended to update their CCleaner software to version 534 or higher in order to protect their computers from being compromised
The latest
version is
available for
download
here
wwwbigbearccorg 8
Resource smithsoniancom
By Kat Eschner
Famously the first long-distance message Samuel Morse sent on the telegraph was ldquoWhat hath God wroughtrdquo When it comes to digital progress itrsquos a question thatrsquos still being answered The telegraph was a revolutionary means of communication in itself but itrsquos also connected to the development of modern computer languages Like any new technology its creation had a ripple effect provoking a wide range of other innovations Engineer Jean-Maurice-Eacutemile Baudot born on this day in 1845 was an important telegraph innovator whose telegraph system helped lay the groundwork for modern computers
Baudot had been a telegraph operator since 1869 write Fritz E Froehlich and Allen Kent in The FroehlichKent Encyclopedia of Telecommunications When he was training he learned how to operate Samuel Morsersquos original telegraph but he also learned to use other
telegraph models He practiced on the Hughes telegraph an early printing telegraph that had a keyboard like a piano and the Meyer telegraph which was the first to use paper tape with holes in it to record telegraph sig-nals according to author Anton A Huurdeman Baudot built on these innovations adding his own touch
Baudot Code Baudot Codes biggest advantage over Morse Code which was first used in the 1840s and other earli-er codes was its speed Earlier systems sent characters of infor-mation by using different lengths of character distinguished by a short gap (the ldquoditsrdquo and ldquodasrdquo of the Morse code system) ldquoBaudotrsquos code sent characters in a synchronized streamrdquo writes author Robin Boast ldquoas each character code was exactly the same length and had exactly the same number of elementsrdquo Alt-hough some of the ideas he used had been pioneered before Baudot was the first to connect them all in a system Boast writes He goes on to explain ldquomost sig-nificant for us is that Baudot was the first to recognize the im-portance of a simple five-bit binary codendasha digital coderdquo Baudotrsquos fixed-length binary code is a direct predecessor of some of the digital codes used today
ASCII the most widely accepted code for translating computer information into the words you see on your screen is based on Baudot code which itself went through several permutations after Bau-dots original innovation But more importantly Baudots code itself laid the first brick in the road to our digital universe writes James Draney for Review 31 Baudots Printing Telegraph was an encoding system that ran off five-bit binary
code It was not the first binary code of course but it was the first to be properly considered digital and its essence still exits in our computers tablets and mobiles today
Printing on paper tape
Having already patented his printing telegraph in France England and Germany Baudot se-cured an American patent for his printing telegraph on August 21 1888 The inventor wasnrsquot the first to use a paper-punch system to record telegraph signals but be-cause Baudot Code and his custom-built telegraph machines were widely embraced being much faster than previous telegraphs they helped keep the system alive His printing telegraph was a prede-cessor to computers because it ran without human intervention once the data (codes) were input presenting the information to the receiver in a readable formndashpaper tape with coded holes in it
Baudotrsquos teletype machine also called a teletypewriter used a five-key keyboard write Froehlich and Kent ldquoBorrowing from Meyer Baudot developed a distributor that allowed five instruments to share the same wirerdquo they write His prototype was tested in the later 1870s and widely adopted in France ldquoby 1892rdquo the pair write ldquoFrance had 101 Baudot-printing multiple telegraphs in operationrdquo
Digital printing using perforated paper was still used in the twentieth century Boast writes and it was ldquoone of the first recording media used for electronic computers in the 1940s and lsquo50srdquo Think punch cards and ticker tape
The Roots of Computer Code Lie in Telegraph Code
wwwbigbearccorg 9
Your Computer Club donation is tax deductible
Donations are accepted
though Paypal
You do not need a Paypal account to donate through Paypal
The Computer Club can recycle you old printer cartridges and cell phones Bring them to a club meeting and we will take them off your hands A simple way for the club to raise some funds
Big Bear Computer Club News
You Can Support the
Big Bear
Computer Club
at
NO COST TO YOU
By using AmazonSmile
For each Amazon purchase you
complete Amazon will donate
05 of the purchase price to
the Big Bear Computer Club
Below is the link from Amazon
Smile that will take you directly
to the Big Bear Computer Club
Amazon support page
httpssmileamazoncomch74
-3131147
You can consider sharing this
link with your family and friends
so they too can support the Big
Bear Computer Club
Big Bear Computer Club Board News
We have started a Facebook page (thank you Bill Flanagan) for the computer club Are any of you readers interested in doing the clubrsquos Facebook page Also we have an opening for Name TagsHospitality chairperson for our monthly club meetings You would meet and greet folks coming to the clubrsquos monthly meetings
Please contact Yomar Cleary yclearycharternet
Big Bear Computer Club Forum
The Big Bear Computer Club has a Discussion Computer Forum on a local Big Bear internet information site Herersquos a link to the directly take you into the forum
wwwsocalmountainscom
Big Bear Computer Club
Website Links
Club Bylaws
Standing Rules amp Policies
Board Meeting Minutes
BBC Cash Flow Statements
wwwbigbearccorg 10
How to Destroy Your Computer in Just Minutes
By David Kretchmar
Sun City Summerlin
Computer Club NV
Why You Should Avoid Installing
PUPS (Potentially Unwanted
Programs)
There are plenty of new computers
being used that are performing
much more slowly than they
should One of the quickest ways to
turn a fast new computer into a
slow system crippled by malware is
to start downloading software from
the wrong sites Or by downloading
the wrong software from what
appears to be the right site
Newer computers being slowed by
unwanted programs is a bother but
the damage done by PUPs can be
much more serious PUPs can be
responsible for programs that make
it impossible to access any of your
files or otherwise ruin your system
Every time you download anything
from the Internet you first issue
permissions that enable the opening
of a conduit or vector between the
Internet and your computer The
series of complex events is mostly
invisible to you except for your
clicking on that virtual button that
starts the whole process
Bing and Google searches often can
take you where you donrsquot want to
go When searching for popular
software sponsored search results
(which result in unwanted pro-
grams) often appear at the top of
the search results page along with
links from the actual software
source sites Often those ad links
try to install software on your
computer that you do not want It
could be anything it could be a
fake driver update program or a
scam system cleaning program
Note that my Bing search for VLC
media player first showed 4 sites
NOT associated with VLC ndash bad
sites
Testing Misleading
Advertisement links
How bad is it To find out I in-
stalled a fresh Windows 10 plus all
Windows updates on a freshly for-
matted hard drive I downloaded
and installed the free version of
Avast Antivirus software that
brought a hitchhiker of its own -
Google Chrome OK I wanted
Chrome but not every user would
so I considered this an invasive act
by a program I downloaded for pro-
tection
I used Edge Firefox and Google
Chrome and started using Google
and Bing search engines to start
searching for popular free pro-
grams The programs I sought are
often the first programs that get
installed on a PC Firefox Google
Chrome OpenOffice iTunes
Adobe Flash Java Adobe Acrobat
VLC and WinZip
Then I carelessly clicked on ad
results which appeared above or on
the same first page as ldquorealrdquo search
results These paid ads were
identified by notes and highlighted
in a very pale color to differentiate
them (slightly) from the actual
search links that appeared nearby
The ads didnrsquot appear after every
search and the ones that appeared
varied among searches and were
different for different browsers
Sometimes the first paid ad link
actually took me to the softwarersquos
true source site (ie searching for
Google offered wwwgooglecom
first) Often Avast would block a
download it recognized as harmful
but Avast did not catch many prob-
lems
For all of the searched for
programs I was able to bring up
more questionable sponsored search
results within seconds of repeated
searching Misleading results
showed up in all search engines and
I could not determine that any
browser offered better or worse
protection than others
For each ad link I clicked through
and installed the respective pro-
grams via the link or button
provided Instead of delivering just
the application I was looking for
all of the paid links attempted to
tack on unwanted programs In
some cases if I was careful to read
all of the fine print and uncheck
boxes I could get the files I was
Continued hellip page 11
wwwbigbearccorg 11
Continued hellip Destroy computer
looking for without a bunch of extra
ldquoadded valuerdquo software but it was
very difficult
For the purposes of this article I
acted as an inexperienced user (or
an experienced user whorsquos not
paying attention) and clicked my
way through ads and dialogue box-
es that looked like the End User
License Agreement (EULA) wersquore
used to seeing through when in-
stalling software
And hellip They Got Me
After installing just a few programs
this way I started accumulating
browser toolbars (Bing Yahoo and
Google) and noticed my
search engine and home page had
been hijacked to something unwant-
ed As I continued the process
Windows started slowing down to a
crawl
After installing all of the programs
on my list I opened Windows 10rsquos
Programs and Features and each
browserrsquos extensions and add-ons
and counted 39 items that had been
installed in addition to the programs
I intended to get On rebooting
three new programs launched
popup windows at startup
including two that started running
virusregistry scans as soon as they
launched and a couple that flashed
warnings windows and offered fix-
es if I registered andor upgraded to
the full paid version
Remember this was originally a
clean install of Windows 10 that
needed nothing
Within a few minutes my computer
became noticeably slower plagued
by numerous popups and was
becoming essentially unusable
Remember this was originally a
clean install of Windows 10 that
needed nothing
Within a few minutes my computer
became noticeably slower plagued
by numerous popups and was
becoming essentially unusable
All of these were nasty but if even
a small fraction of them were I
would be in real trouble
Conclusions and Recommenda-
tions
Most of us will have to download
some third-party (non-Microsoft)
software from the Internet This
does not have to be dangerous if
you pay attention that the software
is being offered from the true home
site of that product NEVER down-
load software from any sponsored
link unless the desired software
creator is the sponsor
Do not depend on your
anti-malware program to protect
you It will catch some issues but
not all
wwwbigbearccorg 12
About Bearly Bytes
Bearly Bytes Newsletter past winner of SWUGC amp APCUG Newsletter contests is the official publication of the Big Bear Computer Club Views expressed in Bearly Bytes are those of the authors and do not necessarily reflect the opinions of Big Bear Computer Club Other computer user groups are welcome to reprint our articles as long as they give credit to the author and Bearly Bytes Big Bear Computer Club Submissions All BBCC members are encouraged to send letters articles questions and comments to Bearly Bytes for inclusion in future issues Submit as plain text in the body of an email and attach any graphics as JPEG or GIF format and send to treadwellbigbearccorg
Bits amp Bytes
The Opportunity Drawing Winners
left to right Kimberlee Kid First aid kit Linda Sharman Green backpack Angie Pezina helliphelliphelliphellipFirst aid kit Paul Palmquist helliphelliphellipTape measure key chain Mary Lou helliphelliphelliphelliphelliphellipFirst aid kit
Enter Find the Bear
contest to win a cool prize
1 Locate this BEAR 2 Click on it 3 Fill in the form 4 and then Send
At the next general meeting following this newsletter a drawing will be held for all who found the bear The
selected winner will receive a surprise gift
You will need to attend the meeting in order to receive the prize
August 2017 Club Meeting
The presentation by Bob Gostischa from Avast Software cov-
ered Computers
(Windows and Mac)
tablets and Smart Phones
He addressed three im-
portant areas (1) the im-
portance to use the right
tools once you get to the
Internet (2) he will show
how to exercise caution
when visiting the internet
and (3) the
importance to avoid the
dangers found on the in-
ternet For those who
could not make it to the
meeting You really need to
click on the httpsgoogl5v4sIQ (launches Google Docs)to
see his presentation on Tips for Staying Safe Online amp Pre-
venting Identity Theft
Bob Gostischa receiving a thank you
from our Club President
wwwbigbearccorg 13
Upcoming Calendar Events
Group Newsletter Sites
wwwbigbearccorg 14
Word Tips By Rosemary Lloyd
Excel Tips By Yomar Cleary
Apple News
The stories you really care about
The more you read the better
News gets at understanding your
interests And now itrsquos even more
personalized Top Stories choos-
es the stories that are relevant to
you and delivers them to your
screen while the Today widget
keeps you up to date throughout
the day News stays on top of the
stories yoursquore interested in So
you can too
All the news you want All in one place
News collects all the stories you want to read mdash so you no longer need to move from app to app to stay informed And with the For You tab itrsquos easier than ever to find the stories that matter most to you News also features breaking news notifications and subscriptions to some of your favorite publications
To Show or Hide the Ruler Applies To Word 2013
Click the View tab Click the check box
next to Ruler
to show or hide
the ruler
httpswwwgcflearnfreeorgword2013getting-to-know-word1
Cropping Graphics in Excel
Once you place a graphic in your workbook you may decide to crop it Cropping means to cut off part of the graphic so it doesnt show in your workbook To crop a graphic follow these steps
Make sure that the Format tab of
the ribbon is displayed (This
tab is only visible if you first
click on a graphic)
Click on the Crop tool in the Size
group
Click on one of the graphics corner
or side handles with the mouse
pointer
Drag the handle towards the center
of the graphic stopping when
you have cropped the desired
amount
You can turn off cropping by
clicking on the Crop tool again
or by pressing Esc
You should understand that while cropping a graphic makes it look smaller none of the original graphic is actually lost it is only hidden Cropping a graphic will not decrease the amount of storage space re-quired by that graphic in your workbook
wwwbigbearccorg 15
The following members have generously offered to help you with your PC
problems by phone or by email
Windows Beginners Yomar Cleary 9092146990 yclearycharternet
Microsoft Windows Rosemary Lloyd
9095477257 Rosemarybigbearccorg
MS Outlook Rosemary Lloyd
9095477257 Rosemarybigbearccorg
MS Excel Yomar Cleary 9098785622 yclearycharternet
MS Publisher Yomar Cleary 9092146990 yclearycharternet
CD Burning Rosemary Lloyd 9095477257 rosemarybigbearccorg
Computer Upgrades Marc Busch
9496099266 bigbearjedicharternet
The Computer Club provides training at the monthly meetings when there is no
presenter
Persons with all levels of computer knowledge are welcome to attend the
clubrsquos open meetings
Your First 2 visits are free Bring a friend
Annual Membership is $25 and spouse $5 All recurring membership dues are due in
January
Helpline Officers and Key Leaders
President Yomar Cleary 9092146990 yclearycharternet
Vice Presidenthellip helliphelliphelliphellip Marc Busch
9496099266 helliphelliphellipbigbearjedicharternet
Treasurer Tom Brandau 2134461315 tombran44gmailcom
Secretary Sandi Ybarra 9095858318 sandiscabingmailcom
Director at Large helliphelliphelliphelliphellip Jerry Merino 9095858714 gmerinocharternet
Director at Large helliphelliphellip Del Johnson
9095849017helliphellipdeljohnson_Isyahoocom
Director at Large helliphelliphellip Bill Treadwell
9097304625 treadwellbigbearccorg
Webmaster Rosemary Lloyd
9095477257 Rosemarybigbearccorg
Assistant Webmaster helliphelliphelliphellipBill Flanagan
9098669379 billbigbearccorg
Newsletter Editor Bill Treadwell
9097304625 treadwellbigbearccorg
Publicity Yomar Cleary
9092146990 yclearycharternet
Equipment Chair Marc Busch
9496099266 helliphelliphellipbigbearjedicharternet
Technical Advisor hellip Jim Lloyd
9095849358 inquiriessugarloafpccom
Refreshments Chair helliphelliphelliphellip Sharon Teeter
9095852026 sharonteeter1verizonnet
Historian Sandi Ybarra
9095858318 sandiscabingmailcom
Sunshine Chair Angie Pezina
9098662314 apezinagmailcom
Hospitality Chairhelliphelliphelliphelliphelliphellipvacant
THE BEAR WANTS YOU TO SHARE A TIP
Send tips to treadwellbigbearccorg
wwwbigbearccorg 16
Mailing Address
Big Bear Computer Club
PO Box 645
Big Bear City CA 92314
Monthly Meeting presen-
tation and demonstration
of popular hardware and
software
RAM (QampA) sessions
Tech News and Virus
Alerts
Door prize drawings
Bearly Bytes our award-
winning monthly news-
letter emailed
Website bigbearccorg
Free Software Review
Member Help Line
Member E-mail Notifica-tions
Member-only Discounts
Training workshops
All this for only $25 per year
Membership Benefits
New Renewal Update my Information
Full Name ___________________________________________________________________
Mailing Address _______________________________________________________________
City State Zip ________________________________________________________________
Home Phone _(______)___________________ Cell Phone_(_____)__________________
E-mail address ________________________________________________________________
Adding Associates
For each Family Member (s) add $5year towards your dues
Mail your application and check for dues to
BCC Treasurer
PO Box 645
Big Bear City CA 92314
Or bring your application and dues to a monthly general meeting
General Information and Membership Application
I agree that Big Bear Computer Club may use such photographs of me with or without my name and for any lawful purpose including for example such
purposes as publicity newsletter advertising and web content
Yes No Your initials _________
BIG BEAR COMPUTER CLUB INC P O BOX 645 ndash BIG BEAR CITY CA 92314
Membership Applicationmdash$2500 ndash Associate $5 You can pay your dues at the monthly meeting by mail -- make checks to Big Bear Computer
Club or by Pay Pal (Go into our website wwwbigbearccorg and go to ldquoDonaterdquo)
Computer Club meetings are held
in the Big Bear Senior Center
wwwbigbearccorg 6
Warning CCleaner Hacked to Distribute Malware
Resource by Swati Khandelwal September 18 2017
Over 23 Million Users Infected
If you have downloaded or updated CCleaner application on your computer between August 15 and September 12 of this year from its official website then pay attentionmdashyour computer has been compromised CCleaner is a popular application with over 2 billion downloads created by Piriform and recently acquired by Avast that allows users to clean up their system to optimize and enhance performance Security researchers from Cisco Talos discovered that the download servers used by Avast to let users download the appli-cation were compromised by some unknown hackers who replaced the original version of the software with the malicious one and distributed it to millions of users for around a month This incident is yet another example of supply chain attack Earlier this year update servers of a Ukrainian company called MeDoc were also compromised in the same way to distribute the Petya ransomware which
wreaked havoc worldwide Avast and Piriform have both confirmed that the Windows 32 bit version of CCleaner v5336162 and CCleaner Cloud v1073191 were affected by the malware
Detected on 13 September the malicious version of CCleaner contains a multi-stage malware payload that steals data from infected computers and sends it to attackers remote command-and-control servers Moreover the unknown hackers signed the malicious installation executable (v533) using a valid digital signature issued to Piriform by Symantec and used Domain Generation Algorithm (DGA) so that if attackers server went down the DGA could generate new domains to receive and send stolen information
All of the collected information was encrypted and encoded by base64 with a custom alphabet saysPaul Yung VP of Products at Piriform The encoded information was subsequently submitted to an external IP
address 216126xx (this address was hardcoded in the payload and we have intentionally masked its last two octets here) via a HTTPS POST request The malicious software was programmed to collect a large number of user data including Computer name List of installed software
including Windows up-dates
List of all running process-es
IP and MAC addresses Continued Page 7
wwwbigbearccorg 7
Continued CCleaner
Additional information like whether the process is running with admin privileges and whether it is a 64-bit system
How to Remove Malware From Your PC
According to the Talos researchers around 5 million people download CCleaner (or Crap Cleaner) each week which indicates that more than 20 Million people could have been infected with the malicious version the app The impact of this attack could be severe given the extremely high number of systems possibly
affected CCleaner claims to have over 2 billion downloads worldwide as of November 2016 and is reportedly adding new users at a rate of 5 million a week Talos said However Piriform estimated that up to 3 percent of its users (up to 227 million people) were affected by the malicious installation Affected users are strongly recommended to update their CCleaner software to version 534 or higher in order to protect their computers from being compromised
The latest
version is
available for
download
here
wwwbigbearccorg 8
Resource smithsoniancom
By Kat Eschner
Famously the first long-distance message Samuel Morse sent on the telegraph was ldquoWhat hath God wroughtrdquo When it comes to digital progress itrsquos a question thatrsquos still being answered The telegraph was a revolutionary means of communication in itself but itrsquos also connected to the development of modern computer languages Like any new technology its creation had a ripple effect provoking a wide range of other innovations Engineer Jean-Maurice-Eacutemile Baudot born on this day in 1845 was an important telegraph innovator whose telegraph system helped lay the groundwork for modern computers
Baudot had been a telegraph operator since 1869 write Fritz E Froehlich and Allen Kent in The FroehlichKent Encyclopedia of Telecommunications When he was training he learned how to operate Samuel Morsersquos original telegraph but he also learned to use other
telegraph models He practiced on the Hughes telegraph an early printing telegraph that had a keyboard like a piano and the Meyer telegraph which was the first to use paper tape with holes in it to record telegraph sig-nals according to author Anton A Huurdeman Baudot built on these innovations adding his own touch
Baudot Code Baudot Codes biggest advantage over Morse Code which was first used in the 1840s and other earli-er codes was its speed Earlier systems sent characters of infor-mation by using different lengths of character distinguished by a short gap (the ldquoditsrdquo and ldquodasrdquo of the Morse code system) ldquoBaudotrsquos code sent characters in a synchronized streamrdquo writes author Robin Boast ldquoas each character code was exactly the same length and had exactly the same number of elementsrdquo Alt-hough some of the ideas he used had been pioneered before Baudot was the first to connect them all in a system Boast writes He goes on to explain ldquomost sig-nificant for us is that Baudot was the first to recognize the im-portance of a simple five-bit binary codendasha digital coderdquo Baudotrsquos fixed-length binary code is a direct predecessor of some of the digital codes used today
ASCII the most widely accepted code for translating computer information into the words you see on your screen is based on Baudot code which itself went through several permutations after Bau-dots original innovation But more importantly Baudots code itself laid the first brick in the road to our digital universe writes James Draney for Review 31 Baudots Printing Telegraph was an encoding system that ran off five-bit binary
code It was not the first binary code of course but it was the first to be properly considered digital and its essence still exits in our computers tablets and mobiles today
Printing on paper tape
Having already patented his printing telegraph in France England and Germany Baudot se-cured an American patent for his printing telegraph on August 21 1888 The inventor wasnrsquot the first to use a paper-punch system to record telegraph signals but be-cause Baudot Code and his custom-built telegraph machines were widely embraced being much faster than previous telegraphs they helped keep the system alive His printing telegraph was a prede-cessor to computers because it ran without human intervention once the data (codes) were input presenting the information to the receiver in a readable formndashpaper tape with coded holes in it
Baudotrsquos teletype machine also called a teletypewriter used a five-key keyboard write Froehlich and Kent ldquoBorrowing from Meyer Baudot developed a distributor that allowed five instruments to share the same wirerdquo they write His prototype was tested in the later 1870s and widely adopted in France ldquoby 1892rdquo the pair write ldquoFrance had 101 Baudot-printing multiple telegraphs in operationrdquo
Digital printing using perforated paper was still used in the twentieth century Boast writes and it was ldquoone of the first recording media used for electronic computers in the 1940s and lsquo50srdquo Think punch cards and ticker tape
The Roots of Computer Code Lie in Telegraph Code
wwwbigbearccorg 9
Your Computer Club donation is tax deductible
Donations are accepted
though Paypal
You do not need a Paypal account to donate through Paypal
The Computer Club can recycle you old printer cartridges and cell phones Bring them to a club meeting and we will take them off your hands A simple way for the club to raise some funds
Big Bear Computer Club News
You Can Support the
Big Bear
Computer Club
at
NO COST TO YOU
By using AmazonSmile
For each Amazon purchase you
complete Amazon will donate
05 of the purchase price to
the Big Bear Computer Club
Below is the link from Amazon
Smile that will take you directly
to the Big Bear Computer Club
Amazon support page
httpssmileamazoncomch74
-3131147
You can consider sharing this
link with your family and friends
so they too can support the Big
Bear Computer Club
Big Bear Computer Club Board News
We have started a Facebook page (thank you Bill Flanagan) for the computer club Are any of you readers interested in doing the clubrsquos Facebook page Also we have an opening for Name TagsHospitality chairperson for our monthly club meetings You would meet and greet folks coming to the clubrsquos monthly meetings
Please contact Yomar Cleary yclearycharternet
Big Bear Computer Club Forum
The Big Bear Computer Club has a Discussion Computer Forum on a local Big Bear internet information site Herersquos a link to the directly take you into the forum
wwwsocalmountainscom
Big Bear Computer Club
Website Links
Club Bylaws
Standing Rules amp Policies
Board Meeting Minutes
BBC Cash Flow Statements
wwwbigbearccorg 10
How to Destroy Your Computer in Just Minutes
By David Kretchmar
Sun City Summerlin
Computer Club NV
Why You Should Avoid Installing
PUPS (Potentially Unwanted
Programs)
There are plenty of new computers
being used that are performing
much more slowly than they
should One of the quickest ways to
turn a fast new computer into a
slow system crippled by malware is
to start downloading software from
the wrong sites Or by downloading
the wrong software from what
appears to be the right site
Newer computers being slowed by
unwanted programs is a bother but
the damage done by PUPs can be
much more serious PUPs can be
responsible for programs that make
it impossible to access any of your
files or otherwise ruin your system
Every time you download anything
from the Internet you first issue
permissions that enable the opening
of a conduit or vector between the
Internet and your computer The
series of complex events is mostly
invisible to you except for your
clicking on that virtual button that
starts the whole process
Bing and Google searches often can
take you where you donrsquot want to
go When searching for popular
software sponsored search results
(which result in unwanted pro-
grams) often appear at the top of
the search results page along with
links from the actual software
source sites Often those ad links
try to install software on your
computer that you do not want It
could be anything it could be a
fake driver update program or a
scam system cleaning program
Note that my Bing search for VLC
media player first showed 4 sites
NOT associated with VLC ndash bad
sites
Testing Misleading
Advertisement links
How bad is it To find out I in-
stalled a fresh Windows 10 plus all
Windows updates on a freshly for-
matted hard drive I downloaded
and installed the free version of
Avast Antivirus software that
brought a hitchhiker of its own -
Google Chrome OK I wanted
Chrome but not every user would
so I considered this an invasive act
by a program I downloaded for pro-
tection
I used Edge Firefox and Google
Chrome and started using Google
and Bing search engines to start
searching for popular free pro-
grams The programs I sought are
often the first programs that get
installed on a PC Firefox Google
Chrome OpenOffice iTunes
Adobe Flash Java Adobe Acrobat
VLC and WinZip
Then I carelessly clicked on ad
results which appeared above or on
the same first page as ldquorealrdquo search
results These paid ads were
identified by notes and highlighted
in a very pale color to differentiate
them (slightly) from the actual
search links that appeared nearby
The ads didnrsquot appear after every
search and the ones that appeared
varied among searches and were
different for different browsers
Sometimes the first paid ad link
actually took me to the softwarersquos
true source site (ie searching for
Google offered wwwgooglecom
first) Often Avast would block a
download it recognized as harmful
but Avast did not catch many prob-
lems
For all of the searched for
programs I was able to bring up
more questionable sponsored search
results within seconds of repeated
searching Misleading results
showed up in all search engines and
I could not determine that any
browser offered better or worse
protection than others
For each ad link I clicked through
and installed the respective pro-
grams via the link or button
provided Instead of delivering just
the application I was looking for
all of the paid links attempted to
tack on unwanted programs In
some cases if I was careful to read
all of the fine print and uncheck
boxes I could get the files I was
Continued hellip page 11
wwwbigbearccorg 11
Continued hellip Destroy computer
looking for without a bunch of extra
ldquoadded valuerdquo software but it was
very difficult
For the purposes of this article I
acted as an inexperienced user (or
an experienced user whorsquos not
paying attention) and clicked my
way through ads and dialogue box-
es that looked like the End User
License Agreement (EULA) wersquore
used to seeing through when in-
stalling software
And hellip They Got Me
After installing just a few programs
this way I started accumulating
browser toolbars (Bing Yahoo and
Google) and noticed my
search engine and home page had
been hijacked to something unwant-
ed As I continued the process
Windows started slowing down to a
crawl
After installing all of the programs
on my list I opened Windows 10rsquos
Programs and Features and each
browserrsquos extensions and add-ons
and counted 39 items that had been
installed in addition to the programs
I intended to get On rebooting
three new programs launched
popup windows at startup
including two that started running
virusregistry scans as soon as they
launched and a couple that flashed
warnings windows and offered fix-
es if I registered andor upgraded to
the full paid version
Remember this was originally a
clean install of Windows 10 that
needed nothing
Within a few minutes my computer
became noticeably slower plagued
by numerous popups and was
becoming essentially unusable
Remember this was originally a
clean install of Windows 10 that
needed nothing
Within a few minutes my computer
became noticeably slower plagued
by numerous popups and was
becoming essentially unusable
All of these were nasty but if even
a small fraction of them were I
would be in real trouble
Conclusions and Recommenda-
tions
Most of us will have to download
some third-party (non-Microsoft)
software from the Internet This
does not have to be dangerous if
you pay attention that the software
is being offered from the true home
site of that product NEVER down-
load software from any sponsored
link unless the desired software
creator is the sponsor
Do not depend on your
anti-malware program to protect
you It will catch some issues but
not all
wwwbigbearccorg 12
About Bearly Bytes
Bearly Bytes Newsletter past winner of SWUGC amp APCUG Newsletter contests is the official publication of the Big Bear Computer Club Views expressed in Bearly Bytes are those of the authors and do not necessarily reflect the opinions of Big Bear Computer Club Other computer user groups are welcome to reprint our articles as long as they give credit to the author and Bearly Bytes Big Bear Computer Club Submissions All BBCC members are encouraged to send letters articles questions and comments to Bearly Bytes for inclusion in future issues Submit as plain text in the body of an email and attach any graphics as JPEG or GIF format and send to treadwellbigbearccorg
Bits amp Bytes
The Opportunity Drawing Winners
left to right Kimberlee Kid First aid kit Linda Sharman Green backpack Angie Pezina helliphelliphelliphellipFirst aid kit Paul Palmquist helliphelliphellipTape measure key chain Mary Lou helliphelliphelliphelliphelliphellipFirst aid kit
Enter Find the Bear
contest to win a cool prize
1 Locate this BEAR 2 Click on it 3 Fill in the form 4 and then Send
At the next general meeting following this newsletter a drawing will be held for all who found the bear The
selected winner will receive a surprise gift
You will need to attend the meeting in order to receive the prize
August 2017 Club Meeting
The presentation by Bob Gostischa from Avast Software cov-
ered Computers
(Windows and Mac)
tablets and Smart Phones
He addressed three im-
portant areas (1) the im-
portance to use the right
tools once you get to the
Internet (2) he will show
how to exercise caution
when visiting the internet
and (3) the
importance to avoid the
dangers found on the in-
ternet For those who
could not make it to the
meeting You really need to
click on the httpsgoogl5v4sIQ (launches Google Docs)to
see his presentation on Tips for Staying Safe Online amp Pre-
venting Identity Theft
Bob Gostischa receiving a thank you
from our Club President
wwwbigbearccorg 13
Upcoming Calendar Events
Group Newsletter Sites
wwwbigbearccorg 14
Word Tips By Rosemary Lloyd
Excel Tips By Yomar Cleary
Apple News
The stories you really care about
The more you read the better
News gets at understanding your
interests And now itrsquos even more
personalized Top Stories choos-
es the stories that are relevant to
you and delivers them to your
screen while the Today widget
keeps you up to date throughout
the day News stays on top of the
stories yoursquore interested in So
you can too
All the news you want All in one place
News collects all the stories you want to read mdash so you no longer need to move from app to app to stay informed And with the For You tab itrsquos easier than ever to find the stories that matter most to you News also features breaking news notifications and subscriptions to some of your favorite publications
To Show or Hide the Ruler Applies To Word 2013
Click the View tab Click the check box
next to Ruler
to show or hide
the ruler
httpswwwgcflearnfreeorgword2013getting-to-know-word1
Cropping Graphics in Excel
Once you place a graphic in your workbook you may decide to crop it Cropping means to cut off part of the graphic so it doesnt show in your workbook To crop a graphic follow these steps
Make sure that the Format tab of
the ribbon is displayed (This
tab is only visible if you first
click on a graphic)
Click on the Crop tool in the Size
group
Click on one of the graphics corner
or side handles with the mouse
pointer
Drag the handle towards the center
of the graphic stopping when
you have cropped the desired
amount
You can turn off cropping by
clicking on the Crop tool again
or by pressing Esc
You should understand that while cropping a graphic makes it look smaller none of the original graphic is actually lost it is only hidden Cropping a graphic will not decrease the amount of storage space re-quired by that graphic in your workbook
wwwbigbearccorg 15
The following members have generously offered to help you with your PC
problems by phone or by email
Windows Beginners Yomar Cleary 9092146990 yclearycharternet
Microsoft Windows Rosemary Lloyd
9095477257 Rosemarybigbearccorg
MS Outlook Rosemary Lloyd
9095477257 Rosemarybigbearccorg
MS Excel Yomar Cleary 9098785622 yclearycharternet
MS Publisher Yomar Cleary 9092146990 yclearycharternet
CD Burning Rosemary Lloyd 9095477257 rosemarybigbearccorg
Computer Upgrades Marc Busch
9496099266 bigbearjedicharternet
The Computer Club provides training at the monthly meetings when there is no
presenter
Persons with all levels of computer knowledge are welcome to attend the
clubrsquos open meetings
Your First 2 visits are free Bring a friend
Annual Membership is $25 and spouse $5 All recurring membership dues are due in
January
Helpline Officers and Key Leaders
President Yomar Cleary 9092146990 yclearycharternet
Vice Presidenthellip helliphelliphelliphellip Marc Busch
9496099266 helliphelliphellipbigbearjedicharternet
Treasurer Tom Brandau 2134461315 tombran44gmailcom
Secretary Sandi Ybarra 9095858318 sandiscabingmailcom
Director at Large helliphelliphelliphelliphellip Jerry Merino 9095858714 gmerinocharternet
Director at Large helliphelliphellip Del Johnson
9095849017helliphellipdeljohnson_Isyahoocom
Director at Large helliphelliphellip Bill Treadwell
9097304625 treadwellbigbearccorg
Webmaster Rosemary Lloyd
9095477257 Rosemarybigbearccorg
Assistant Webmaster helliphelliphelliphellipBill Flanagan
9098669379 billbigbearccorg
Newsletter Editor Bill Treadwell
9097304625 treadwellbigbearccorg
Publicity Yomar Cleary
9092146990 yclearycharternet
Equipment Chair Marc Busch
9496099266 helliphelliphellipbigbearjedicharternet
Technical Advisor hellip Jim Lloyd
9095849358 inquiriessugarloafpccom
Refreshments Chair helliphelliphelliphellip Sharon Teeter
9095852026 sharonteeter1verizonnet
Historian Sandi Ybarra
9095858318 sandiscabingmailcom
Sunshine Chair Angie Pezina
9098662314 apezinagmailcom
Hospitality Chairhelliphelliphelliphelliphelliphellipvacant
THE BEAR WANTS YOU TO SHARE A TIP
Send tips to treadwellbigbearccorg
wwwbigbearccorg 16
Mailing Address
Big Bear Computer Club
PO Box 645
Big Bear City CA 92314
Monthly Meeting presen-
tation and demonstration
of popular hardware and
software
RAM (QampA) sessions
Tech News and Virus
Alerts
Door prize drawings
Bearly Bytes our award-
winning monthly news-
letter emailed
Website bigbearccorg
Free Software Review
Member Help Line
Member E-mail Notifica-tions
Member-only Discounts
Training workshops
All this for only $25 per year
Membership Benefits
New Renewal Update my Information
Full Name ___________________________________________________________________
Mailing Address _______________________________________________________________
City State Zip ________________________________________________________________
Home Phone _(______)___________________ Cell Phone_(_____)__________________
E-mail address ________________________________________________________________
Adding Associates
For each Family Member (s) add $5year towards your dues
Mail your application and check for dues to
BCC Treasurer
PO Box 645
Big Bear City CA 92314
Or bring your application and dues to a monthly general meeting
General Information and Membership Application
I agree that Big Bear Computer Club may use such photographs of me with or without my name and for any lawful purpose including for example such
purposes as publicity newsletter advertising and web content
Yes No Your initials _________
BIG BEAR COMPUTER CLUB INC P O BOX 645 ndash BIG BEAR CITY CA 92314
Membership Applicationmdash$2500 ndash Associate $5 You can pay your dues at the monthly meeting by mail -- make checks to Big Bear Computer
Club or by Pay Pal (Go into our website wwwbigbearccorg and go to ldquoDonaterdquo)
Computer Club meetings are held
in the Big Bear Senior Center
wwwbigbearccorg 7
Continued CCleaner
Additional information like whether the process is running with admin privileges and whether it is a 64-bit system
How to Remove Malware From Your PC
According to the Talos researchers around 5 million people download CCleaner (or Crap Cleaner) each week which indicates that more than 20 Million people could have been infected with the malicious version the app The impact of this attack could be severe given the extremely high number of systems possibly
affected CCleaner claims to have over 2 billion downloads worldwide as of November 2016 and is reportedly adding new users at a rate of 5 million a week Talos said However Piriform estimated that up to 3 percent of its users (up to 227 million people) were affected by the malicious installation Affected users are strongly recommended to update their CCleaner software to version 534 or higher in order to protect their computers from being compromised
The latest
version is
available for
download
here
wwwbigbearccorg 8
Resource smithsoniancom
By Kat Eschner
Famously the first long-distance message Samuel Morse sent on the telegraph was ldquoWhat hath God wroughtrdquo When it comes to digital progress itrsquos a question thatrsquos still being answered The telegraph was a revolutionary means of communication in itself but itrsquos also connected to the development of modern computer languages Like any new technology its creation had a ripple effect provoking a wide range of other innovations Engineer Jean-Maurice-Eacutemile Baudot born on this day in 1845 was an important telegraph innovator whose telegraph system helped lay the groundwork for modern computers
Baudot had been a telegraph operator since 1869 write Fritz E Froehlich and Allen Kent in The FroehlichKent Encyclopedia of Telecommunications When he was training he learned how to operate Samuel Morsersquos original telegraph but he also learned to use other
telegraph models He practiced on the Hughes telegraph an early printing telegraph that had a keyboard like a piano and the Meyer telegraph which was the first to use paper tape with holes in it to record telegraph sig-nals according to author Anton A Huurdeman Baudot built on these innovations adding his own touch
Baudot Code Baudot Codes biggest advantage over Morse Code which was first used in the 1840s and other earli-er codes was its speed Earlier systems sent characters of infor-mation by using different lengths of character distinguished by a short gap (the ldquoditsrdquo and ldquodasrdquo of the Morse code system) ldquoBaudotrsquos code sent characters in a synchronized streamrdquo writes author Robin Boast ldquoas each character code was exactly the same length and had exactly the same number of elementsrdquo Alt-hough some of the ideas he used had been pioneered before Baudot was the first to connect them all in a system Boast writes He goes on to explain ldquomost sig-nificant for us is that Baudot was the first to recognize the im-portance of a simple five-bit binary codendasha digital coderdquo Baudotrsquos fixed-length binary code is a direct predecessor of some of the digital codes used today
ASCII the most widely accepted code for translating computer information into the words you see on your screen is based on Baudot code which itself went through several permutations after Bau-dots original innovation But more importantly Baudots code itself laid the first brick in the road to our digital universe writes James Draney for Review 31 Baudots Printing Telegraph was an encoding system that ran off five-bit binary
code It was not the first binary code of course but it was the first to be properly considered digital and its essence still exits in our computers tablets and mobiles today
Printing on paper tape
Having already patented his printing telegraph in France England and Germany Baudot se-cured an American patent for his printing telegraph on August 21 1888 The inventor wasnrsquot the first to use a paper-punch system to record telegraph signals but be-cause Baudot Code and his custom-built telegraph machines were widely embraced being much faster than previous telegraphs they helped keep the system alive His printing telegraph was a prede-cessor to computers because it ran without human intervention once the data (codes) were input presenting the information to the receiver in a readable formndashpaper tape with coded holes in it
Baudotrsquos teletype machine also called a teletypewriter used a five-key keyboard write Froehlich and Kent ldquoBorrowing from Meyer Baudot developed a distributor that allowed five instruments to share the same wirerdquo they write His prototype was tested in the later 1870s and widely adopted in France ldquoby 1892rdquo the pair write ldquoFrance had 101 Baudot-printing multiple telegraphs in operationrdquo
Digital printing using perforated paper was still used in the twentieth century Boast writes and it was ldquoone of the first recording media used for electronic computers in the 1940s and lsquo50srdquo Think punch cards and ticker tape
The Roots of Computer Code Lie in Telegraph Code
wwwbigbearccorg 9
Your Computer Club donation is tax deductible
Donations are accepted
though Paypal
You do not need a Paypal account to donate through Paypal
The Computer Club can recycle you old printer cartridges and cell phones Bring them to a club meeting and we will take them off your hands A simple way for the club to raise some funds
Big Bear Computer Club News
You Can Support the
Big Bear
Computer Club
at
NO COST TO YOU
By using AmazonSmile
For each Amazon purchase you
complete Amazon will donate
05 of the purchase price to
the Big Bear Computer Club
Below is the link from Amazon
Smile that will take you directly
to the Big Bear Computer Club
Amazon support page
httpssmileamazoncomch74
-3131147
You can consider sharing this
link with your family and friends
so they too can support the Big
Bear Computer Club
Big Bear Computer Club Board News
We have started a Facebook page (thank you Bill Flanagan) for the computer club Are any of you readers interested in doing the clubrsquos Facebook page Also we have an opening for Name TagsHospitality chairperson for our monthly club meetings You would meet and greet folks coming to the clubrsquos monthly meetings
Please contact Yomar Cleary yclearycharternet
Big Bear Computer Club Forum
The Big Bear Computer Club has a Discussion Computer Forum on a local Big Bear internet information site Herersquos a link to the directly take you into the forum
wwwsocalmountainscom
Big Bear Computer Club
Website Links
Club Bylaws
Standing Rules amp Policies
Board Meeting Minutes
BBC Cash Flow Statements
wwwbigbearccorg 10
How to Destroy Your Computer in Just Minutes
By David Kretchmar
Sun City Summerlin
Computer Club NV
Why You Should Avoid Installing
PUPS (Potentially Unwanted
Programs)
There are plenty of new computers
being used that are performing
much more slowly than they
should One of the quickest ways to
turn a fast new computer into a
slow system crippled by malware is
to start downloading software from
the wrong sites Or by downloading
the wrong software from what
appears to be the right site
Newer computers being slowed by
unwanted programs is a bother but
the damage done by PUPs can be
much more serious PUPs can be
responsible for programs that make
it impossible to access any of your
files or otherwise ruin your system
Every time you download anything
from the Internet you first issue
permissions that enable the opening
of a conduit or vector between the
Internet and your computer The
series of complex events is mostly
invisible to you except for your
clicking on that virtual button that
starts the whole process
Bing and Google searches often can
take you where you donrsquot want to
go When searching for popular
software sponsored search results
(which result in unwanted pro-
grams) often appear at the top of
the search results page along with
links from the actual software
source sites Often those ad links
try to install software on your
computer that you do not want It
could be anything it could be a
fake driver update program or a
scam system cleaning program
Note that my Bing search for VLC
media player first showed 4 sites
NOT associated with VLC ndash bad
sites
Testing Misleading
Advertisement links
How bad is it To find out I in-
stalled a fresh Windows 10 plus all
Windows updates on a freshly for-
matted hard drive I downloaded
and installed the free version of
Avast Antivirus software that
brought a hitchhiker of its own -
Google Chrome OK I wanted
Chrome but not every user would
so I considered this an invasive act
by a program I downloaded for pro-
tection
I used Edge Firefox and Google
Chrome and started using Google
and Bing search engines to start
searching for popular free pro-
grams The programs I sought are
often the first programs that get
installed on a PC Firefox Google
Chrome OpenOffice iTunes
Adobe Flash Java Adobe Acrobat
VLC and WinZip
Then I carelessly clicked on ad
results which appeared above or on
the same first page as ldquorealrdquo search
results These paid ads were
identified by notes and highlighted
in a very pale color to differentiate
them (slightly) from the actual
search links that appeared nearby
The ads didnrsquot appear after every
search and the ones that appeared
varied among searches and were
different for different browsers
Sometimes the first paid ad link
actually took me to the softwarersquos
true source site (ie searching for
Google offered wwwgooglecom
first) Often Avast would block a
download it recognized as harmful
but Avast did not catch many prob-
lems
For all of the searched for
programs I was able to bring up
more questionable sponsored search
results within seconds of repeated
searching Misleading results
showed up in all search engines and
I could not determine that any
browser offered better or worse
protection than others
For each ad link I clicked through
and installed the respective pro-
grams via the link or button
provided Instead of delivering just
the application I was looking for
all of the paid links attempted to
tack on unwanted programs In
some cases if I was careful to read
all of the fine print and uncheck
boxes I could get the files I was
Continued hellip page 11
wwwbigbearccorg 11
Continued hellip Destroy computer
looking for without a bunch of extra
ldquoadded valuerdquo software but it was
very difficult
For the purposes of this article I
acted as an inexperienced user (or
an experienced user whorsquos not
paying attention) and clicked my
way through ads and dialogue box-
es that looked like the End User
License Agreement (EULA) wersquore
used to seeing through when in-
stalling software
And hellip They Got Me
After installing just a few programs
this way I started accumulating
browser toolbars (Bing Yahoo and
Google) and noticed my
search engine and home page had
been hijacked to something unwant-
ed As I continued the process
Windows started slowing down to a
crawl
After installing all of the programs
on my list I opened Windows 10rsquos
Programs and Features and each
browserrsquos extensions and add-ons
and counted 39 items that had been
installed in addition to the programs
I intended to get On rebooting
three new programs launched
popup windows at startup
including two that started running
virusregistry scans as soon as they
launched and a couple that flashed
warnings windows and offered fix-
es if I registered andor upgraded to
the full paid version
Remember this was originally a
clean install of Windows 10 that
needed nothing
Within a few minutes my computer
became noticeably slower plagued
by numerous popups and was
becoming essentially unusable
Remember this was originally a
clean install of Windows 10 that
needed nothing
Within a few minutes my computer
became noticeably slower plagued
by numerous popups and was
becoming essentially unusable
All of these were nasty but if even
a small fraction of them were I
would be in real trouble
Conclusions and Recommenda-
tions
Most of us will have to download
some third-party (non-Microsoft)
software from the Internet This
does not have to be dangerous if
you pay attention that the software
is being offered from the true home
site of that product NEVER down-
load software from any sponsored
link unless the desired software
creator is the sponsor
Do not depend on your
anti-malware program to protect
you It will catch some issues but
not all
wwwbigbearccorg 12
About Bearly Bytes
Bearly Bytes Newsletter past winner of SWUGC amp APCUG Newsletter contests is the official publication of the Big Bear Computer Club Views expressed in Bearly Bytes are those of the authors and do not necessarily reflect the opinions of Big Bear Computer Club Other computer user groups are welcome to reprint our articles as long as they give credit to the author and Bearly Bytes Big Bear Computer Club Submissions All BBCC members are encouraged to send letters articles questions and comments to Bearly Bytes for inclusion in future issues Submit as plain text in the body of an email and attach any graphics as JPEG or GIF format and send to treadwellbigbearccorg
Bits amp Bytes
The Opportunity Drawing Winners
left to right Kimberlee Kid First aid kit Linda Sharman Green backpack Angie Pezina helliphelliphelliphellipFirst aid kit Paul Palmquist helliphelliphellipTape measure key chain Mary Lou helliphelliphelliphelliphelliphellipFirst aid kit
Enter Find the Bear
contest to win a cool prize
1 Locate this BEAR 2 Click on it 3 Fill in the form 4 and then Send
At the next general meeting following this newsletter a drawing will be held for all who found the bear The
selected winner will receive a surprise gift
You will need to attend the meeting in order to receive the prize
August 2017 Club Meeting
The presentation by Bob Gostischa from Avast Software cov-
ered Computers
(Windows and Mac)
tablets and Smart Phones
He addressed three im-
portant areas (1) the im-
portance to use the right
tools once you get to the
Internet (2) he will show
how to exercise caution
when visiting the internet
and (3) the
importance to avoid the
dangers found on the in-
ternet For those who
could not make it to the
meeting You really need to
click on the httpsgoogl5v4sIQ (launches Google Docs)to
see his presentation on Tips for Staying Safe Online amp Pre-
venting Identity Theft
Bob Gostischa receiving a thank you
from our Club President
wwwbigbearccorg 13
Upcoming Calendar Events
Group Newsletter Sites
wwwbigbearccorg 14
Word Tips By Rosemary Lloyd
Excel Tips By Yomar Cleary
Apple News
The stories you really care about
The more you read the better
News gets at understanding your
interests And now itrsquos even more
personalized Top Stories choos-
es the stories that are relevant to
you and delivers them to your
screen while the Today widget
keeps you up to date throughout
the day News stays on top of the
stories yoursquore interested in So
you can too
All the news you want All in one place
News collects all the stories you want to read mdash so you no longer need to move from app to app to stay informed And with the For You tab itrsquos easier than ever to find the stories that matter most to you News also features breaking news notifications and subscriptions to some of your favorite publications
To Show or Hide the Ruler Applies To Word 2013
Click the View tab Click the check box
next to Ruler
to show or hide
the ruler
httpswwwgcflearnfreeorgword2013getting-to-know-word1
Cropping Graphics in Excel
Once you place a graphic in your workbook you may decide to crop it Cropping means to cut off part of the graphic so it doesnt show in your workbook To crop a graphic follow these steps
Make sure that the Format tab of
the ribbon is displayed (This
tab is only visible if you first
click on a graphic)
Click on the Crop tool in the Size
group
Click on one of the graphics corner
or side handles with the mouse
pointer
Drag the handle towards the center
of the graphic stopping when
you have cropped the desired
amount
You can turn off cropping by
clicking on the Crop tool again
or by pressing Esc
You should understand that while cropping a graphic makes it look smaller none of the original graphic is actually lost it is only hidden Cropping a graphic will not decrease the amount of storage space re-quired by that graphic in your workbook
wwwbigbearccorg 15
The following members have generously offered to help you with your PC
problems by phone or by email
Windows Beginners Yomar Cleary 9092146990 yclearycharternet
Microsoft Windows Rosemary Lloyd
9095477257 Rosemarybigbearccorg
MS Outlook Rosemary Lloyd
9095477257 Rosemarybigbearccorg
MS Excel Yomar Cleary 9098785622 yclearycharternet
MS Publisher Yomar Cleary 9092146990 yclearycharternet
CD Burning Rosemary Lloyd 9095477257 rosemarybigbearccorg
Computer Upgrades Marc Busch
9496099266 bigbearjedicharternet
The Computer Club provides training at the monthly meetings when there is no
presenter
Persons with all levels of computer knowledge are welcome to attend the
clubrsquos open meetings
Your First 2 visits are free Bring a friend
Annual Membership is $25 and spouse $5 All recurring membership dues are due in
January
Helpline Officers and Key Leaders
President Yomar Cleary 9092146990 yclearycharternet
Vice Presidenthellip helliphelliphelliphellip Marc Busch
9496099266 helliphelliphellipbigbearjedicharternet
Treasurer Tom Brandau 2134461315 tombran44gmailcom
Secretary Sandi Ybarra 9095858318 sandiscabingmailcom
Director at Large helliphelliphelliphelliphellip Jerry Merino 9095858714 gmerinocharternet
Director at Large helliphelliphellip Del Johnson
9095849017helliphellipdeljohnson_Isyahoocom
Director at Large helliphelliphellip Bill Treadwell
9097304625 treadwellbigbearccorg
Webmaster Rosemary Lloyd
9095477257 Rosemarybigbearccorg
Assistant Webmaster helliphelliphelliphellipBill Flanagan
9098669379 billbigbearccorg
Newsletter Editor Bill Treadwell
9097304625 treadwellbigbearccorg
Publicity Yomar Cleary
9092146990 yclearycharternet
Equipment Chair Marc Busch
9496099266 helliphelliphellipbigbearjedicharternet
Technical Advisor hellip Jim Lloyd
9095849358 inquiriessugarloafpccom
Refreshments Chair helliphelliphelliphellip Sharon Teeter
9095852026 sharonteeter1verizonnet
Historian Sandi Ybarra
9095858318 sandiscabingmailcom
Sunshine Chair Angie Pezina
9098662314 apezinagmailcom
Hospitality Chairhelliphelliphelliphelliphelliphellipvacant
THE BEAR WANTS YOU TO SHARE A TIP
Send tips to treadwellbigbearccorg
wwwbigbearccorg 16
Mailing Address
Big Bear Computer Club
PO Box 645
Big Bear City CA 92314
Monthly Meeting presen-
tation and demonstration
of popular hardware and
software
RAM (QampA) sessions
Tech News and Virus
Alerts
Door prize drawings
Bearly Bytes our award-
winning monthly news-
letter emailed
Website bigbearccorg
Free Software Review
Member Help Line
Member E-mail Notifica-tions
Member-only Discounts
Training workshops
All this for only $25 per year
Membership Benefits
New Renewal Update my Information
Full Name ___________________________________________________________________
Mailing Address _______________________________________________________________
City State Zip ________________________________________________________________
Home Phone _(______)___________________ Cell Phone_(_____)__________________
E-mail address ________________________________________________________________
Adding Associates
For each Family Member (s) add $5year towards your dues
Mail your application and check for dues to
BCC Treasurer
PO Box 645
Big Bear City CA 92314
Or bring your application and dues to a monthly general meeting
General Information and Membership Application
I agree that Big Bear Computer Club may use such photographs of me with or without my name and for any lawful purpose including for example such
purposes as publicity newsletter advertising and web content
Yes No Your initials _________
BIG BEAR COMPUTER CLUB INC P O BOX 645 ndash BIG BEAR CITY CA 92314
Membership Applicationmdash$2500 ndash Associate $5 You can pay your dues at the monthly meeting by mail -- make checks to Big Bear Computer
Club or by Pay Pal (Go into our website wwwbigbearccorg and go to ldquoDonaterdquo)
Computer Club meetings are held
in the Big Bear Senior Center
wwwbigbearccorg 8
Resource smithsoniancom
By Kat Eschner
Famously the first long-distance message Samuel Morse sent on the telegraph was ldquoWhat hath God wroughtrdquo When it comes to digital progress itrsquos a question thatrsquos still being answered The telegraph was a revolutionary means of communication in itself but itrsquos also connected to the development of modern computer languages Like any new technology its creation had a ripple effect provoking a wide range of other innovations Engineer Jean-Maurice-Eacutemile Baudot born on this day in 1845 was an important telegraph innovator whose telegraph system helped lay the groundwork for modern computers
Baudot had been a telegraph operator since 1869 write Fritz E Froehlich and Allen Kent in The FroehlichKent Encyclopedia of Telecommunications When he was training he learned how to operate Samuel Morsersquos original telegraph but he also learned to use other
telegraph models He practiced on the Hughes telegraph an early printing telegraph that had a keyboard like a piano and the Meyer telegraph which was the first to use paper tape with holes in it to record telegraph sig-nals according to author Anton A Huurdeman Baudot built on these innovations adding his own touch
Baudot Code Baudot Codes biggest advantage over Morse Code which was first used in the 1840s and other earli-er codes was its speed Earlier systems sent characters of infor-mation by using different lengths of character distinguished by a short gap (the ldquoditsrdquo and ldquodasrdquo of the Morse code system) ldquoBaudotrsquos code sent characters in a synchronized streamrdquo writes author Robin Boast ldquoas each character code was exactly the same length and had exactly the same number of elementsrdquo Alt-hough some of the ideas he used had been pioneered before Baudot was the first to connect them all in a system Boast writes He goes on to explain ldquomost sig-nificant for us is that Baudot was the first to recognize the im-portance of a simple five-bit binary codendasha digital coderdquo Baudotrsquos fixed-length binary code is a direct predecessor of some of the digital codes used today
ASCII the most widely accepted code for translating computer information into the words you see on your screen is based on Baudot code which itself went through several permutations after Bau-dots original innovation But more importantly Baudots code itself laid the first brick in the road to our digital universe writes James Draney for Review 31 Baudots Printing Telegraph was an encoding system that ran off five-bit binary
code It was not the first binary code of course but it was the first to be properly considered digital and its essence still exits in our computers tablets and mobiles today
Printing on paper tape
Having already patented his printing telegraph in France England and Germany Baudot se-cured an American patent for his printing telegraph on August 21 1888 The inventor wasnrsquot the first to use a paper-punch system to record telegraph signals but be-cause Baudot Code and his custom-built telegraph machines were widely embraced being much faster than previous telegraphs they helped keep the system alive His printing telegraph was a prede-cessor to computers because it ran without human intervention once the data (codes) were input presenting the information to the receiver in a readable formndashpaper tape with coded holes in it
Baudotrsquos teletype machine also called a teletypewriter used a five-key keyboard write Froehlich and Kent ldquoBorrowing from Meyer Baudot developed a distributor that allowed five instruments to share the same wirerdquo they write His prototype was tested in the later 1870s and widely adopted in France ldquoby 1892rdquo the pair write ldquoFrance had 101 Baudot-printing multiple telegraphs in operationrdquo
Digital printing using perforated paper was still used in the twentieth century Boast writes and it was ldquoone of the first recording media used for electronic computers in the 1940s and lsquo50srdquo Think punch cards and ticker tape
The Roots of Computer Code Lie in Telegraph Code
wwwbigbearccorg 9
Your Computer Club donation is tax deductible
Donations are accepted
though Paypal
You do not need a Paypal account to donate through Paypal
The Computer Club can recycle you old printer cartridges and cell phones Bring them to a club meeting and we will take them off your hands A simple way for the club to raise some funds
Big Bear Computer Club News
You Can Support the
Big Bear
Computer Club
at
NO COST TO YOU
By using AmazonSmile
For each Amazon purchase you
complete Amazon will donate
05 of the purchase price to
the Big Bear Computer Club
Below is the link from Amazon
Smile that will take you directly
to the Big Bear Computer Club
Amazon support page
httpssmileamazoncomch74
-3131147
You can consider sharing this
link with your family and friends
so they too can support the Big
Bear Computer Club
Big Bear Computer Club Board News
We have started a Facebook page (thank you Bill Flanagan) for the computer club Are any of you readers interested in doing the clubrsquos Facebook page Also we have an opening for Name TagsHospitality chairperson for our monthly club meetings You would meet and greet folks coming to the clubrsquos monthly meetings
Please contact Yomar Cleary yclearycharternet
Big Bear Computer Club Forum
The Big Bear Computer Club has a Discussion Computer Forum on a local Big Bear internet information site Herersquos a link to the directly take you into the forum
wwwsocalmountainscom
Big Bear Computer Club
Website Links
Club Bylaws
Standing Rules amp Policies
Board Meeting Minutes
BBC Cash Flow Statements
wwwbigbearccorg 10
How to Destroy Your Computer in Just Minutes
By David Kretchmar
Sun City Summerlin
Computer Club NV
Why You Should Avoid Installing
PUPS (Potentially Unwanted
Programs)
There are plenty of new computers
being used that are performing
much more slowly than they
should One of the quickest ways to
turn a fast new computer into a
slow system crippled by malware is
to start downloading software from
the wrong sites Or by downloading
the wrong software from what
appears to be the right site
Newer computers being slowed by
unwanted programs is a bother but
the damage done by PUPs can be
much more serious PUPs can be
responsible for programs that make
it impossible to access any of your
files or otherwise ruin your system
Every time you download anything
from the Internet you first issue
permissions that enable the opening
of a conduit or vector between the
Internet and your computer The
series of complex events is mostly
invisible to you except for your
clicking on that virtual button that
starts the whole process
Bing and Google searches often can
take you where you donrsquot want to
go When searching for popular
software sponsored search results
(which result in unwanted pro-
grams) often appear at the top of
the search results page along with
links from the actual software
source sites Often those ad links
try to install software on your
computer that you do not want It
could be anything it could be a
fake driver update program or a
scam system cleaning program
Note that my Bing search for VLC
media player first showed 4 sites
NOT associated with VLC ndash bad
sites
Testing Misleading
Advertisement links
How bad is it To find out I in-
stalled a fresh Windows 10 plus all
Windows updates on a freshly for-
matted hard drive I downloaded
and installed the free version of
Avast Antivirus software that
brought a hitchhiker of its own -
Google Chrome OK I wanted
Chrome but not every user would
so I considered this an invasive act
by a program I downloaded for pro-
tection
I used Edge Firefox and Google
Chrome and started using Google
and Bing search engines to start
searching for popular free pro-
grams The programs I sought are
often the first programs that get
installed on a PC Firefox Google
Chrome OpenOffice iTunes
Adobe Flash Java Adobe Acrobat
VLC and WinZip
Then I carelessly clicked on ad
results which appeared above or on
the same first page as ldquorealrdquo search
results These paid ads were
identified by notes and highlighted
in a very pale color to differentiate
them (slightly) from the actual
search links that appeared nearby
The ads didnrsquot appear after every
search and the ones that appeared
varied among searches and were
different for different browsers
Sometimes the first paid ad link
actually took me to the softwarersquos
true source site (ie searching for
Google offered wwwgooglecom
first) Often Avast would block a
download it recognized as harmful
but Avast did not catch many prob-
lems
For all of the searched for
programs I was able to bring up
more questionable sponsored search
results within seconds of repeated
searching Misleading results
showed up in all search engines and
I could not determine that any
browser offered better or worse
protection than others
For each ad link I clicked through
and installed the respective pro-
grams via the link or button
provided Instead of delivering just
the application I was looking for
all of the paid links attempted to
tack on unwanted programs In
some cases if I was careful to read
all of the fine print and uncheck
boxes I could get the files I was
Continued hellip page 11
wwwbigbearccorg 11
Continued hellip Destroy computer
looking for without a bunch of extra
ldquoadded valuerdquo software but it was
very difficult
For the purposes of this article I
acted as an inexperienced user (or
an experienced user whorsquos not
paying attention) and clicked my
way through ads and dialogue box-
es that looked like the End User
License Agreement (EULA) wersquore
used to seeing through when in-
stalling software
And hellip They Got Me
After installing just a few programs
this way I started accumulating
browser toolbars (Bing Yahoo and
Google) and noticed my
search engine and home page had
been hijacked to something unwant-
ed As I continued the process
Windows started slowing down to a
crawl
After installing all of the programs
on my list I opened Windows 10rsquos
Programs and Features and each
browserrsquos extensions and add-ons
and counted 39 items that had been
installed in addition to the programs
I intended to get On rebooting
three new programs launched
popup windows at startup
including two that started running
virusregistry scans as soon as they
launched and a couple that flashed
warnings windows and offered fix-
es if I registered andor upgraded to
the full paid version
Remember this was originally a
clean install of Windows 10 that
needed nothing
Within a few minutes my computer
became noticeably slower plagued
by numerous popups and was
becoming essentially unusable
Remember this was originally a
clean install of Windows 10 that
needed nothing
Within a few minutes my computer
became noticeably slower plagued
by numerous popups and was
becoming essentially unusable
All of these were nasty but if even
a small fraction of them were I
would be in real trouble
Conclusions and Recommenda-
tions
Most of us will have to download
some third-party (non-Microsoft)
software from the Internet This
does not have to be dangerous if
you pay attention that the software
is being offered from the true home
site of that product NEVER down-
load software from any sponsored
link unless the desired software
creator is the sponsor
Do not depend on your
anti-malware program to protect
you It will catch some issues but
not all
wwwbigbearccorg 12
About Bearly Bytes
Bearly Bytes Newsletter past winner of SWUGC amp APCUG Newsletter contests is the official publication of the Big Bear Computer Club Views expressed in Bearly Bytes are those of the authors and do not necessarily reflect the opinions of Big Bear Computer Club Other computer user groups are welcome to reprint our articles as long as they give credit to the author and Bearly Bytes Big Bear Computer Club Submissions All BBCC members are encouraged to send letters articles questions and comments to Bearly Bytes for inclusion in future issues Submit as plain text in the body of an email and attach any graphics as JPEG or GIF format and send to treadwellbigbearccorg
Bits amp Bytes
The Opportunity Drawing Winners
left to right Kimberlee Kid First aid kit Linda Sharman Green backpack Angie Pezina helliphelliphelliphellipFirst aid kit Paul Palmquist helliphelliphellipTape measure key chain Mary Lou helliphelliphelliphelliphelliphellipFirst aid kit
Enter Find the Bear
contest to win a cool prize
1 Locate this BEAR 2 Click on it 3 Fill in the form 4 and then Send
At the next general meeting following this newsletter a drawing will be held for all who found the bear The
selected winner will receive a surprise gift
You will need to attend the meeting in order to receive the prize
August 2017 Club Meeting
The presentation by Bob Gostischa from Avast Software cov-
ered Computers
(Windows and Mac)
tablets and Smart Phones
He addressed three im-
portant areas (1) the im-
portance to use the right
tools once you get to the
Internet (2) he will show
how to exercise caution
when visiting the internet
and (3) the
importance to avoid the
dangers found on the in-
ternet For those who
could not make it to the
meeting You really need to
click on the httpsgoogl5v4sIQ (launches Google Docs)to
see his presentation on Tips for Staying Safe Online amp Pre-
venting Identity Theft
Bob Gostischa receiving a thank you
from our Club President
wwwbigbearccorg 13
Upcoming Calendar Events
Group Newsletter Sites
wwwbigbearccorg 14
Word Tips By Rosemary Lloyd
Excel Tips By Yomar Cleary
Apple News
The stories you really care about
The more you read the better
News gets at understanding your
interests And now itrsquos even more
personalized Top Stories choos-
es the stories that are relevant to
you and delivers them to your
screen while the Today widget
keeps you up to date throughout
the day News stays on top of the
stories yoursquore interested in So
you can too
All the news you want All in one place
News collects all the stories you want to read mdash so you no longer need to move from app to app to stay informed And with the For You tab itrsquos easier than ever to find the stories that matter most to you News also features breaking news notifications and subscriptions to some of your favorite publications
To Show or Hide the Ruler Applies To Word 2013
Click the View tab Click the check box
next to Ruler
to show or hide
the ruler
httpswwwgcflearnfreeorgword2013getting-to-know-word1
Cropping Graphics in Excel
Once you place a graphic in your workbook you may decide to crop it Cropping means to cut off part of the graphic so it doesnt show in your workbook To crop a graphic follow these steps
Make sure that the Format tab of
the ribbon is displayed (This
tab is only visible if you first
click on a graphic)
Click on the Crop tool in the Size
group
Click on one of the graphics corner
or side handles with the mouse
pointer
Drag the handle towards the center
of the graphic stopping when
you have cropped the desired
amount
You can turn off cropping by
clicking on the Crop tool again
or by pressing Esc
You should understand that while cropping a graphic makes it look smaller none of the original graphic is actually lost it is only hidden Cropping a graphic will not decrease the amount of storage space re-quired by that graphic in your workbook
wwwbigbearccorg 15
The following members have generously offered to help you with your PC
problems by phone or by email
Windows Beginners Yomar Cleary 9092146990 yclearycharternet
Microsoft Windows Rosemary Lloyd
9095477257 Rosemarybigbearccorg
MS Outlook Rosemary Lloyd
9095477257 Rosemarybigbearccorg
MS Excel Yomar Cleary 9098785622 yclearycharternet
MS Publisher Yomar Cleary 9092146990 yclearycharternet
CD Burning Rosemary Lloyd 9095477257 rosemarybigbearccorg
Computer Upgrades Marc Busch
9496099266 bigbearjedicharternet
The Computer Club provides training at the monthly meetings when there is no
presenter
Persons with all levels of computer knowledge are welcome to attend the
clubrsquos open meetings
Your First 2 visits are free Bring a friend
Annual Membership is $25 and spouse $5 All recurring membership dues are due in
January
Helpline Officers and Key Leaders
President Yomar Cleary 9092146990 yclearycharternet
Vice Presidenthellip helliphelliphelliphellip Marc Busch
9496099266 helliphelliphellipbigbearjedicharternet
Treasurer Tom Brandau 2134461315 tombran44gmailcom
Secretary Sandi Ybarra 9095858318 sandiscabingmailcom
Director at Large helliphelliphelliphelliphellip Jerry Merino 9095858714 gmerinocharternet
Director at Large helliphelliphellip Del Johnson
9095849017helliphellipdeljohnson_Isyahoocom
Director at Large helliphelliphellip Bill Treadwell
9097304625 treadwellbigbearccorg
Webmaster Rosemary Lloyd
9095477257 Rosemarybigbearccorg
Assistant Webmaster helliphelliphelliphellipBill Flanagan
9098669379 billbigbearccorg
Newsletter Editor Bill Treadwell
9097304625 treadwellbigbearccorg
Publicity Yomar Cleary
9092146990 yclearycharternet
Equipment Chair Marc Busch
9496099266 helliphelliphellipbigbearjedicharternet
Technical Advisor hellip Jim Lloyd
9095849358 inquiriessugarloafpccom
Refreshments Chair helliphelliphelliphellip Sharon Teeter
9095852026 sharonteeter1verizonnet
Historian Sandi Ybarra
9095858318 sandiscabingmailcom
Sunshine Chair Angie Pezina
9098662314 apezinagmailcom
Hospitality Chairhelliphelliphelliphelliphelliphellipvacant
THE BEAR WANTS YOU TO SHARE A TIP
Send tips to treadwellbigbearccorg
wwwbigbearccorg 16
Mailing Address
Big Bear Computer Club
PO Box 645
Big Bear City CA 92314
Monthly Meeting presen-
tation and demonstration
of popular hardware and
software
RAM (QampA) sessions
Tech News and Virus
Alerts
Door prize drawings
Bearly Bytes our award-
winning monthly news-
letter emailed
Website bigbearccorg
Free Software Review
Member Help Line
Member E-mail Notifica-tions
Member-only Discounts
Training workshops
All this for only $25 per year
Membership Benefits
New Renewal Update my Information
Full Name ___________________________________________________________________
Mailing Address _______________________________________________________________
City State Zip ________________________________________________________________
Home Phone _(______)___________________ Cell Phone_(_____)__________________
E-mail address ________________________________________________________________
Adding Associates
For each Family Member (s) add $5year towards your dues
Mail your application and check for dues to
BCC Treasurer
PO Box 645
Big Bear City CA 92314
Or bring your application and dues to a monthly general meeting
General Information and Membership Application
I agree that Big Bear Computer Club may use such photographs of me with or without my name and for any lawful purpose including for example such
purposes as publicity newsletter advertising and web content
Yes No Your initials _________
BIG BEAR COMPUTER CLUB INC P O BOX 645 ndash BIG BEAR CITY CA 92314
Membership Applicationmdash$2500 ndash Associate $5 You can pay your dues at the monthly meeting by mail -- make checks to Big Bear Computer
Club or by Pay Pal (Go into our website wwwbigbearccorg and go to ldquoDonaterdquo)
Computer Club meetings are held
in the Big Bear Senior Center
wwwbigbearccorg 9
Your Computer Club donation is tax deductible
Donations are accepted
though Paypal
You do not need a Paypal account to donate through Paypal
The Computer Club can recycle you old printer cartridges and cell phones Bring them to a club meeting and we will take them off your hands A simple way for the club to raise some funds
Big Bear Computer Club News
You Can Support the
Big Bear
Computer Club
at
NO COST TO YOU
By using AmazonSmile
For each Amazon purchase you
complete Amazon will donate
05 of the purchase price to
the Big Bear Computer Club
Below is the link from Amazon
Smile that will take you directly
to the Big Bear Computer Club
Amazon support page
httpssmileamazoncomch74
-3131147
You can consider sharing this
link with your family and friends
so they too can support the Big
Bear Computer Club
Big Bear Computer Club Board News
We have started a Facebook page (thank you Bill Flanagan) for the computer club Are any of you readers interested in doing the clubrsquos Facebook page Also we have an opening for Name TagsHospitality chairperson for our monthly club meetings You would meet and greet folks coming to the clubrsquos monthly meetings
Please contact Yomar Cleary yclearycharternet
Big Bear Computer Club Forum
The Big Bear Computer Club has a Discussion Computer Forum on a local Big Bear internet information site Herersquos a link to the directly take you into the forum
wwwsocalmountainscom
Big Bear Computer Club
Website Links
Club Bylaws
Standing Rules amp Policies
Board Meeting Minutes
BBC Cash Flow Statements
wwwbigbearccorg 10
How to Destroy Your Computer in Just Minutes
By David Kretchmar
Sun City Summerlin
Computer Club NV
Why You Should Avoid Installing
PUPS (Potentially Unwanted
Programs)
There are plenty of new computers
being used that are performing
much more slowly than they
should One of the quickest ways to
turn a fast new computer into a
slow system crippled by malware is
to start downloading software from
the wrong sites Or by downloading
the wrong software from what
appears to be the right site
Newer computers being slowed by
unwanted programs is a bother but
the damage done by PUPs can be
much more serious PUPs can be
responsible for programs that make
it impossible to access any of your
files or otherwise ruin your system
Every time you download anything
from the Internet you first issue
permissions that enable the opening
of a conduit or vector between the
Internet and your computer The
series of complex events is mostly
invisible to you except for your
clicking on that virtual button that
starts the whole process
Bing and Google searches often can
take you where you donrsquot want to
go When searching for popular
software sponsored search results
(which result in unwanted pro-
grams) often appear at the top of
the search results page along with
links from the actual software
source sites Often those ad links
try to install software on your
computer that you do not want It
could be anything it could be a
fake driver update program or a
scam system cleaning program
Note that my Bing search for VLC
media player first showed 4 sites
NOT associated with VLC ndash bad
sites
Testing Misleading
Advertisement links
How bad is it To find out I in-
stalled a fresh Windows 10 plus all
Windows updates on a freshly for-
matted hard drive I downloaded
and installed the free version of
Avast Antivirus software that
brought a hitchhiker of its own -
Google Chrome OK I wanted
Chrome but not every user would
so I considered this an invasive act
by a program I downloaded for pro-
tection
I used Edge Firefox and Google
Chrome and started using Google
and Bing search engines to start
searching for popular free pro-
grams The programs I sought are
often the first programs that get
installed on a PC Firefox Google
Chrome OpenOffice iTunes
Adobe Flash Java Adobe Acrobat
VLC and WinZip
Then I carelessly clicked on ad
results which appeared above or on
the same first page as ldquorealrdquo search
results These paid ads were
identified by notes and highlighted
in a very pale color to differentiate
them (slightly) from the actual
search links that appeared nearby
The ads didnrsquot appear after every
search and the ones that appeared
varied among searches and were
different for different browsers
Sometimes the first paid ad link
actually took me to the softwarersquos
true source site (ie searching for
Google offered wwwgooglecom
first) Often Avast would block a
download it recognized as harmful
but Avast did not catch many prob-
lems
For all of the searched for
programs I was able to bring up
more questionable sponsored search
results within seconds of repeated
searching Misleading results
showed up in all search engines and
I could not determine that any
browser offered better or worse
protection than others
For each ad link I clicked through
and installed the respective pro-
grams via the link or button
provided Instead of delivering just
the application I was looking for
all of the paid links attempted to
tack on unwanted programs In
some cases if I was careful to read
all of the fine print and uncheck
boxes I could get the files I was
Continued hellip page 11
wwwbigbearccorg 11
Continued hellip Destroy computer
looking for without a bunch of extra
ldquoadded valuerdquo software but it was
very difficult
For the purposes of this article I
acted as an inexperienced user (or
an experienced user whorsquos not
paying attention) and clicked my
way through ads and dialogue box-
es that looked like the End User
License Agreement (EULA) wersquore
used to seeing through when in-
stalling software
And hellip They Got Me
After installing just a few programs
this way I started accumulating
browser toolbars (Bing Yahoo and
Google) and noticed my
search engine and home page had
been hijacked to something unwant-
ed As I continued the process
Windows started slowing down to a
crawl
After installing all of the programs
on my list I opened Windows 10rsquos
Programs and Features and each
browserrsquos extensions and add-ons
and counted 39 items that had been
installed in addition to the programs
I intended to get On rebooting
three new programs launched
popup windows at startup
including two that started running
virusregistry scans as soon as they
launched and a couple that flashed
warnings windows and offered fix-
es if I registered andor upgraded to
the full paid version
Remember this was originally a
clean install of Windows 10 that
needed nothing
Within a few minutes my computer
became noticeably slower plagued
by numerous popups and was
becoming essentially unusable
Remember this was originally a
clean install of Windows 10 that
needed nothing
Within a few minutes my computer
became noticeably slower plagued
by numerous popups and was
becoming essentially unusable
All of these were nasty but if even
a small fraction of them were I
would be in real trouble
Conclusions and Recommenda-
tions
Most of us will have to download
some third-party (non-Microsoft)
software from the Internet This
does not have to be dangerous if
you pay attention that the software
is being offered from the true home
site of that product NEVER down-
load software from any sponsored
link unless the desired software
creator is the sponsor
Do not depend on your
anti-malware program to protect
you It will catch some issues but
not all
wwwbigbearccorg 12
About Bearly Bytes
Bearly Bytes Newsletter past winner of SWUGC amp APCUG Newsletter contests is the official publication of the Big Bear Computer Club Views expressed in Bearly Bytes are those of the authors and do not necessarily reflect the opinions of Big Bear Computer Club Other computer user groups are welcome to reprint our articles as long as they give credit to the author and Bearly Bytes Big Bear Computer Club Submissions All BBCC members are encouraged to send letters articles questions and comments to Bearly Bytes for inclusion in future issues Submit as plain text in the body of an email and attach any graphics as JPEG or GIF format and send to treadwellbigbearccorg
Bits amp Bytes
The Opportunity Drawing Winners
left to right Kimberlee Kid First aid kit Linda Sharman Green backpack Angie Pezina helliphelliphelliphellipFirst aid kit Paul Palmquist helliphelliphellipTape measure key chain Mary Lou helliphelliphelliphelliphelliphellipFirst aid kit
Enter Find the Bear
contest to win a cool prize
1 Locate this BEAR 2 Click on it 3 Fill in the form 4 and then Send
At the next general meeting following this newsletter a drawing will be held for all who found the bear The
selected winner will receive a surprise gift
You will need to attend the meeting in order to receive the prize
August 2017 Club Meeting
The presentation by Bob Gostischa from Avast Software cov-
ered Computers
(Windows and Mac)
tablets and Smart Phones
He addressed three im-
portant areas (1) the im-
portance to use the right
tools once you get to the
Internet (2) he will show
how to exercise caution
when visiting the internet
and (3) the
importance to avoid the
dangers found on the in-
ternet For those who
could not make it to the
meeting You really need to
click on the httpsgoogl5v4sIQ (launches Google Docs)to
see his presentation on Tips for Staying Safe Online amp Pre-
venting Identity Theft
Bob Gostischa receiving a thank you
from our Club President
wwwbigbearccorg 13
Upcoming Calendar Events
Group Newsletter Sites
wwwbigbearccorg 14
Word Tips By Rosemary Lloyd
Excel Tips By Yomar Cleary
Apple News
The stories you really care about
The more you read the better
News gets at understanding your
interests And now itrsquos even more
personalized Top Stories choos-
es the stories that are relevant to
you and delivers them to your
screen while the Today widget
keeps you up to date throughout
the day News stays on top of the
stories yoursquore interested in So
you can too
All the news you want All in one place
News collects all the stories you want to read mdash so you no longer need to move from app to app to stay informed And with the For You tab itrsquos easier than ever to find the stories that matter most to you News also features breaking news notifications and subscriptions to some of your favorite publications
To Show or Hide the Ruler Applies To Word 2013
Click the View tab Click the check box
next to Ruler
to show or hide
the ruler
httpswwwgcflearnfreeorgword2013getting-to-know-word1
Cropping Graphics in Excel
Once you place a graphic in your workbook you may decide to crop it Cropping means to cut off part of the graphic so it doesnt show in your workbook To crop a graphic follow these steps
Make sure that the Format tab of
the ribbon is displayed (This
tab is only visible if you first
click on a graphic)
Click on the Crop tool in the Size
group
Click on one of the graphics corner
or side handles with the mouse
pointer
Drag the handle towards the center
of the graphic stopping when
you have cropped the desired
amount
You can turn off cropping by
clicking on the Crop tool again
or by pressing Esc
You should understand that while cropping a graphic makes it look smaller none of the original graphic is actually lost it is only hidden Cropping a graphic will not decrease the amount of storage space re-quired by that graphic in your workbook
wwwbigbearccorg 15
The following members have generously offered to help you with your PC
problems by phone or by email
Windows Beginners Yomar Cleary 9092146990 yclearycharternet
Microsoft Windows Rosemary Lloyd
9095477257 Rosemarybigbearccorg
MS Outlook Rosemary Lloyd
9095477257 Rosemarybigbearccorg
MS Excel Yomar Cleary 9098785622 yclearycharternet
MS Publisher Yomar Cleary 9092146990 yclearycharternet
CD Burning Rosemary Lloyd 9095477257 rosemarybigbearccorg
Computer Upgrades Marc Busch
9496099266 bigbearjedicharternet
The Computer Club provides training at the monthly meetings when there is no
presenter
Persons with all levels of computer knowledge are welcome to attend the
clubrsquos open meetings
Your First 2 visits are free Bring a friend
Annual Membership is $25 and spouse $5 All recurring membership dues are due in
January
Helpline Officers and Key Leaders
President Yomar Cleary 9092146990 yclearycharternet
Vice Presidenthellip helliphelliphelliphellip Marc Busch
9496099266 helliphelliphellipbigbearjedicharternet
Treasurer Tom Brandau 2134461315 tombran44gmailcom
Secretary Sandi Ybarra 9095858318 sandiscabingmailcom
Director at Large helliphelliphelliphelliphellip Jerry Merino 9095858714 gmerinocharternet
Director at Large helliphelliphellip Del Johnson
9095849017helliphellipdeljohnson_Isyahoocom
Director at Large helliphelliphellip Bill Treadwell
9097304625 treadwellbigbearccorg
Webmaster Rosemary Lloyd
9095477257 Rosemarybigbearccorg
Assistant Webmaster helliphelliphelliphellipBill Flanagan
9098669379 billbigbearccorg
Newsletter Editor Bill Treadwell
9097304625 treadwellbigbearccorg
Publicity Yomar Cleary
9092146990 yclearycharternet
Equipment Chair Marc Busch
9496099266 helliphelliphellipbigbearjedicharternet
Technical Advisor hellip Jim Lloyd
9095849358 inquiriessugarloafpccom
Refreshments Chair helliphelliphelliphellip Sharon Teeter
9095852026 sharonteeter1verizonnet
Historian Sandi Ybarra
9095858318 sandiscabingmailcom
Sunshine Chair Angie Pezina
9098662314 apezinagmailcom
Hospitality Chairhelliphelliphelliphelliphelliphellipvacant
THE BEAR WANTS YOU TO SHARE A TIP
Send tips to treadwellbigbearccorg
wwwbigbearccorg 16
Mailing Address
Big Bear Computer Club
PO Box 645
Big Bear City CA 92314
Monthly Meeting presen-
tation and demonstration
of popular hardware and
software
RAM (QampA) sessions
Tech News and Virus
Alerts
Door prize drawings
Bearly Bytes our award-
winning monthly news-
letter emailed
Website bigbearccorg
Free Software Review
Member Help Line
Member E-mail Notifica-tions
Member-only Discounts
Training workshops
All this for only $25 per year
Membership Benefits
New Renewal Update my Information
Full Name ___________________________________________________________________
Mailing Address _______________________________________________________________
City State Zip ________________________________________________________________
Home Phone _(______)___________________ Cell Phone_(_____)__________________
E-mail address ________________________________________________________________
Adding Associates
For each Family Member (s) add $5year towards your dues
Mail your application and check for dues to
BCC Treasurer
PO Box 645
Big Bear City CA 92314
Or bring your application and dues to a monthly general meeting
General Information and Membership Application
I agree that Big Bear Computer Club may use such photographs of me with or without my name and for any lawful purpose including for example such
purposes as publicity newsletter advertising and web content
Yes No Your initials _________
BIG BEAR COMPUTER CLUB INC P O BOX 645 ndash BIG BEAR CITY CA 92314
Membership Applicationmdash$2500 ndash Associate $5 You can pay your dues at the monthly meeting by mail -- make checks to Big Bear Computer
Club or by Pay Pal (Go into our website wwwbigbearccorg and go to ldquoDonaterdquo)
Computer Club meetings are held
in the Big Bear Senior Center
wwwbigbearccorg 10
How to Destroy Your Computer in Just Minutes
By David Kretchmar
Sun City Summerlin
Computer Club NV
Why You Should Avoid Installing
PUPS (Potentially Unwanted
Programs)
There are plenty of new computers
being used that are performing
much more slowly than they
should One of the quickest ways to
turn a fast new computer into a
slow system crippled by malware is
to start downloading software from
the wrong sites Or by downloading
the wrong software from what
appears to be the right site
Newer computers being slowed by
unwanted programs is a bother but
the damage done by PUPs can be
much more serious PUPs can be
responsible for programs that make
it impossible to access any of your
files or otherwise ruin your system
Every time you download anything
from the Internet you first issue
permissions that enable the opening
of a conduit or vector between the
Internet and your computer The
series of complex events is mostly
invisible to you except for your
clicking on that virtual button that
starts the whole process
Bing and Google searches often can
take you where you donrsquot want to
go When searching for popular
software sponsored search results
(which result in unwanted pro-
grams) often appear at the top of
the search results page along with
links from the actual software
source sites Often those ad links
try to install software on your
computer that you do not want It
could be anything it could be a
fake driver update program or a
scam system cleaning program
Note that my Bing search for VLC
media player first showed 4 sites
NOT associated with VLC ndash bad
sites
Testing Misleading
Advertisement links
How bad is it To find out I in-
stalled a fresh Windows 10 plus all
Windows updates on a freshly for-
matted hard drive I downloaded
and installed the free version of
Avast Antivirus software that
brought a hitchhiker of its own -
Google Chrome OK I wanted
Chrome but not every user would
so I considered this an invasive act
by a program I downloaded for pro-
tection
I used Edge Firefox and Google
Chrome and started using Google
and Bing search engines to start
searching for popular free pro-
grams The programs I sought are
often the first programs that get
installed on a PC Firefox Google
Chrome OpenOffice iTunes
Adobe Flash Java Adobe Acrobat
VLC and WinZip
Then I carelessly clicked on ad
results which appeared above or on
the same first page as ldquorealrdquo search
results These paid ads were
identified by notes and highlighted
in a very pale color to differentiate
them (slightly) from the actual
search links that appeared nearby
The ads didnrsquot appear after every
search and the ones that appeared
varied among searches and were
different for different browsers
Sometimes the first paid ad link
actually took me to the softwarersquos
true source site (ie searching for
Google offered wwwgooglecom
first) Often Avast would block a
download it recognized as harmful
but Avast did not catch many prob-
lems
For all of the searched for
programs I was able to bring up
more questionable sponsored search
results within seconds of repeated
searching Misleading results
showed up in all search engines and
I could not determine that any
browser offered better or worse
protection than others
For each ad link I clicked through
and installed the respective pro-
grams via the link or button
provided Instead of delivering just
the application I was looking for
all of the paid links attempted to
tack on unwanted programs In
some cases if I was careful to read
all of the fine print and uncheck
boxes I could get the files I was
Continued hellip page 11
wwwbigbearccorg 11
Continued hellip Destroy computer
looking for without a bunch of extra
ldquoadded valuerdquo software but it was
very difficult
For the purposes of this article I
acted as an inexperienced user (or
an experienced user whorsquos not
paying attention) and clicked my
way through ads and dialogue box-
es that looked like the End User
License Agreement (EULA) wersquore
used to seeing through when in-
stalling software
And hellip They Got Me
After installing just a few programs
this way I started accumulating
browser toolbars (Bing Yahoo and
Google) and noticed my
search engine and home page had
been hijacked to something unwant-
ed As I continued the process
Windows started slowing down to a
crawl
After installing all of the programs
on my list I opened Windows 10rsquos
Programs and Features and each
browserrsquos extensions and add-ons
and counted 39 items that had been
installed in addition to the programs
I intended to get On rebooting
three new programs launched
popup windows at startup
including two that started running
virusregistry scans as soon as they
launched and a couple that flashed
warnings windows and offered fix-
es if I registered andor upgraded to
the full paid version
Remember this was originally a
clean install of Windows 10 that
needed nothing
Within a few minutes my computer
became noticeably slower plagued
by numerous popups and was
becoming essentially unusable
Remember this was originally a
clean install of Windows 10 that
needed nothing
Within a few minutes my computer
became noticeably slower plagued
by numerous popups and was
becoming essentially unusable
All of these were nasty but if even
a small fraction of them were I
would be in real trouble
Conclusions and Recommenda-
tions
Most of us will have to download
some third-party (non-Microsoft)
software from the Internet This
does not have to be dangerous if
you pay attention that the software
is being offered from the true home
site of that product NEVER down-
load software from any sponsored
link unless the desired software
creator is the sponsor
Do not depend on your
anti-malware program to protect
you It will catch some issues but
not all
wwwbigbearccorg 12
About Bearly Bytes
Bearly Bytes Newsletter past winner of SWUGC amp APCUG Newsletter contests is the official publication of the Big Bear Computer Club Views expressed in Bearly Bytes are those of the authors and do not necessarily reflect the opinions of Big Bear Computer Club Other computer user groups are welcome to reprint our articles as long as they give credit to the author and Bearly Bytes Big Bear Computer Club Submissions All BBCC members are encouraged to send letters articles questions and comments to Bearly Bytes for inclusion in future issues Submit as plain text in the body of an email and attach any graphics as JPEG or GIF format and send to treadwellbigbearccorg
Bits amp Bytes
The Opportunity Drawing Winners
left to right Kimberlee Kid First aid kit Linda Sharman Green backpack Angie Pezina helliphelliphelliphellipFirst aid kit Paul Palmquist helliphelliphellipTape measure key chain Mary Lou helliphelliphelliphelliphelliphellipFirst aid kit
Enter Find the Bear
contest to win a cool prize
1 Locate this BEAR 2 Click on it 3 Fill in the form 4 and then Send
At the next general meeting following this newsletter a drawing will be held for all who found the bear The
selected winner will receive a surprise gift
You will need to attend the meeting in order to receive the prize
August 2017 Club Meeting
The presentation by Bob Gostischa from Avast Software cov-
ered Computers
(Windows and Mac)
tablets and Smart Phones
He addressed three im-
portant areas (1) the im-
portance to use the right
tools once you get to the
Internet (2) he will show
how to exercise caution
when visiting the internet
and (3) the
importance to avoid the
dangers found on the in-
ternet For those who
could not make it to the
meeting You really need to
click on the httpsgoogl5v4sIQ (launches Google Docs)to
see his presentation on Tips for Staying Safe Online amp Pre-
venting Identity Theft
Bob Gostischa receiving a thank you
from our Club President
wwwbigbearccorg 13
Upcoming Calendar Events
Group Newsletter Sites
wwwbigbearccorg 14
Word Tips By Rosemary Lloyd
Excel Tips By Yomar Cleary
Apple News
The stories you really care about
The more you read the better
News gets at understanding your
interests And now itrsquos even more
personalized Top Stories choos-
es the stories that are relevant to
you and delivers them to your
screen while the Today widget
keeps you up to date throughout
the day News stays on top of the
stories yoursquore interested in So
you can too
All the news you want All in one place
News collects all the stories you want to read mdash so you no longer need to move from app to app to stay informed And with the For You tab itrsquos easier than ever to find the stories that matter most to you News also features breaking news notifications and subscriptions to some of your favorite publications
To Show or Hide the Ruler Applies To Word 2013
Click the View tab Click the check box
next to Ruler
to show or hide
the ruler
httpswwwgcflearnfreeorgword2013getting-to-know-word1
Cropping Graphics in Excel
Once you place a graphic in your workbook you may decide to crop it Cropping means to cut off part of the graphic so it doesnt show in your workbook To crop a graphic follow these steps
Make sure that the Format tab of
the ribbon is displayed (This
tab is only visible if you first
click on a graphic)
Click on the Crop tool in the Size
group
Click on one of the graphics corner
or side handles with the mouse
pointer
Drag the handle towards the center
of the graphic stopping when
you have cropped the desired
amount
You can turn off cropping by
clicking on the Crop tool again
or by pressing Esc
You should understand that while cropping a graphic makes it look smaller none of the original graphic is actually lost it is only hidden Cropping a graphic will not decrease the amount of storage space re-quired by that graphic in your workbook
wwwbigbearccorg 15
The following members have generously offered to help you with your PC
problems by phone or by email
Windows Beginners Yomar Cleary 9092146990 yclearycharternet
Microsoft Windows Rosemary Lloyd
9095477257 Rosemarybigbearccorg
MS Outlook Rosemary Lloyd
9095477257 Rosemarybigbearccorg
MS Excel Yomar Cleary 9098785622 yclearycharternet
MS Publisher Yomar Cleary 9092146990 yclearycharternet
CD Burning Rosemary Lloyd 9095477257 rosemarybigbearccorg
Computer Upgrades Marc Busch
9496099266 bigbearjedicharternet
The Computer Club provides training at the monthly meetings when there is no
presenter
Persons with all levels of computer knowledge are welcome to attend the
clubrsquos open meetings
Your First 2 visits are free Bring a friend
Annual Membership is $25 and spouse $5 All recurring membership dues are due in
January
Helpline Officers and Key Leaders
President Yomar Cleary 9092146990 yclearycharternet
Vice Presidenthellip helliphelliphelliphellip Marc Busch
9496099266 helliphelliphellipbigbearjedicharternet
Treasurer Tom Brandau 2134461315 tombran44gmailcom
Secretary Sandi Ybarra 9095858318 sandiscabingmailcom
Director at Large helliphelliphelliphelliphellip Jerry Merino 9095858714 gmerinocharternet
Director at Large helliphelliphellip Del Johnson
9095849017helliphellipdeljohnson_Isyahoocom
Director at Large helliphelliphellip Bill Treadwell
9097304625 treadwellbigbearccorg
Webmaster Rosemary Lloyd
9095477257 Rosemarybigbearccorg
Assistant Webmaster helliphelliphelliphellipBill Flanagan
9098669379 billbigbearccorg
Newsletter Editor Bill Treadwell
9097304625 treadwellbigbearccorg
Publicity Yomar Cleary
9092146990 yclearycharternet
Equipment Chair Marc Busch
9496099266 helliphelliphellipbigbearjedicharternet
Technical Advisor hellip Jim Lloyd
9095849358 inquiriessugarloafpccom
Refreshments Chair helliphelliphelliphellip Sharon Teeter
9095852026 sharonteeter1verizonnet
Historian Sandi Ybarra
9095858318 sandiscabingmailcom
Sunshine Chair Angie Pezina
9098662314 apezinagmailcom
Hospitality Chairhelliphelliphelliphelliphelliphellipvacant
THE BEAR WANTS YOU TO SHARE A TIP
Send tips to treadwellbigbearccorg
wwwbigbearccorg 16
Mailing Address
Big Bear Computer Club
PO Box 645
Big Bear City CA 92314
Monthly Meeting presen-
tation and demonstration
of popular hardware and
software
RAM (QampA) sessions
Tech News and Virus
Alerts
Door prize drawings
Bearly Bytes our award-
winning monthly news-
letter emailed
Website bigbearccorg
Free Software Review
Member Help Line
Member E-mail Notifica-tions
Member-only Discounts
Training workshops
All this for only $25 per year
Membership Benefits
New Renewal Update my Information
Full Name ___________________________________________________________________
Mailing Address _______________________________________________________________
City State Zip ________________________________________________________________
Home Phone _(______)___________________ Cell Phone_(_____)__________________
E-mail address ________________________________________________________________
Adding Associates
For each Family Member (s) add $5year towards your dues
Mail your application and check for dues to
BCC Treasurer
PO Box 645
Big Bear City CA 92314
Or bring your application and dues to a monthly general meeting
General Information and Membership Application
I agree that Big Bear Computer Club may use such photographs of me with or without my name and for any lawful purpose including for example such
purposes as publicity newsletter advertising and web content
Yes No Your initials _________
BIG BEAR COMPUTER CLUB INC P O BOX 645 ndash BIG BEAR CITY CA 92314
Membership Applicationmdash$2500 ndash Associate $5 You can pay your dues at the monthly meeting by mail -- make checks to Big Bear Computer
Club or by Pay Pal (Go into our website wwwbigbearccorg and go to ldquoDonaterdquo)
Computer Club meetings are held
in the Big Bear Senior Center
wwwbigbearccorg 11
Continued hellip Destroy computer
looking for without a bunch of extra
ldquoadded valuerdquo software but it was
very difficult
For the purposes of this article I
acted as an inexperienced user (or
an experienced user whorsquos not
paying attention) and clicked my
way through ads and dialogue box-
es that looked like the End User
License Agreement (EULA) wersquore
used to seeing through when in-
stalling software
And hellip They Got Me
After installing just a few programs
this way I started accumulating
browser toolbars (Bing Yahoo and
Google) and noticed my
search engine and home page had
been hijacked to something unwant-
ed As I continued the process
Windows started slowing down to a
crawl
After installing all of the programs
on my list I opened Windows 10rsquos
Programs and Features and each
browserrsquos extensions and add-ons
and counted 39 items that had been
installed in addition to the programs
I intended to get On rebooting
three new programs launched
popup windows at startup
including two that started running
virusregistry scans as soon as they
launched and a couple that flashed
warnings windows and offered fix-
es if I registered andor upgraded to
the full paid version
Remember this was originally a
clean install of Windows 10 that
needed nothing
Within a few minutes my computer
became noticeably slower plagued
by numerous popups and was
becoming essentially unusable
Remember this was originally a
clean install of Windows 10 that
needed nothing
Within a few minutes my computer
became noticeably slower plagued
by numerous popups and was
becoming essentially unusable
All of these were nasty but if even
a small fraction of them were I
would be in real trouble
Conclusions and Recommenda-
tions
Most of us will have to download
some third-party (non-Microsoft)
software from the Internet This
does not have to be dangerous if
you pay attention that the software
is being offered from the true home
site of that product NEVER down-
load software from any sponsored
link unless the desired software
creator is the sponsor
Do not depend on your
anti-malware program to protect
you It will catch some issues but
not all
wwwbigbearccorg 12
About Bearly Bytes
Bearly Bytes Newsletter past winner of SWUGC amp APCUG Newsletter contests is the official publication of the Big Bear Computer Club Views expressed in Bearly Bytes are those of the authors and do not necessarily reflect the opinions of Big Bear Computer Club Other computer user groups are welcome to reprint our articles as long as they give credit to the author and Bearly Bytes Big Bear Computer Club Submissions All BBCC members are encouraged to send letters articles questions and comments to Bearly Bytes for inclusion in future issues Submit as plain text in the body of an email and attach any graphics as JPEG or GIF format and send to treadwellbigbearccorg
Bits amp Bytes
The Opportunity Drawing Winners
left to right Kimberlee Kid First aid kit Linda Sharman Green backpack Angie Pezina helliphelliphelliphellipFirst aid kit Paul Palmquist helliphelliphellipTape measure key chain Mary Lou helliphelliphelliphelliphelliphellipFirst aid kit
Enter Find the Bear
contest to win a cool prize
1 Locate this BEAR 2 Click on it 3 Fill in the form 4 and then Send
At the next general meeting following this newsletter a drawing will be held for all who found the bear The
selected winner will receive a surprise gift
You will need to attend the meeting in order to receive the prize
August 2017 Club Meeting
The presentation by Bob Gostischa from Avast Software cov-
ered Computers
(Windows and Mac)
tablets and Smart Phones
He addressed three im-
portant areas (1) the im-
portance to use the right
tools once you get to the
Internet (2) he will show
how to exercise caution
when visiting the internet
and (3) the
importance to avoid the
dangers found on the in-
ternet For those who
could not make it to the
meeting You really need to
click on the httpsgoogl5v4sIQ (launches Google Docs)to
see his presentation on Tips for Staying Safe Online amp Pre-
venting Identity Theft
Bob Gostischa receiving a thank you
from our Club President
wwwbigbearccorg 13
Upcoming Calendar Events
Group Newsletter Sites
wwwbigbearccorg 14
Word Tips By Rosemary Lloyd
Excel Tips By Yomar Cleary
Apple News
The stories you really care about
The more you read the better
News gets at understanding your
interests And now itrsquos even more
personalized Top Stories choos-
es the stories that are relevant to
you and delivers them to your
screen while the Today widget
keeps you up to date throughout
the day News stays on top of the
stories yoursquore interested in So
you can too
All the news you want All in one place
News collects all the stories you want to read mdash so you no longer need to move from app to app to stay informed And with the For You tab itrsquos easier than ever to find the stories that matter most to you News also features breaking news notifications and subscriptions to some of your favorite publications
To Show or Hide the Ruler Applies To Word 2013
Click the View tab Click the check box
next to Ruler
to show or hide
the ruler
httpswwwgcflearnfreeorgword2013getting-to-know-word1
Cropping Graphics in Excel
Once you place a graphic in your workbook you may decide to crop it Cropping means to cut off part of the graphic so it doesnt show in your workbook To crop a graphic follow these steps
Make sure that the Format tab of
the ribbon is displayed (This
tab is only visible if you first
click on a graphic)
Click on the Crop tool in the Size
group
Click on one of the graphics corner
or side handles with the mouse
pointer
Drag the handle towards the center
of the graphic stopping when
you have cropped the desired
amount
You can turn off cropping by
clicking on the Crop tool again
or by pressing Esc
You should understand that while cropping a graphic makes it look smaller none of the original graphic is actually lost it is only hidden Cropping a graphic will not decrease the amount of storage space re-quired by that graphic in your workbook
wwwbigbearccorg 15
The following members have generously offered to help you with your PC
problems by phone or by email
Windows Beginners Yomar Cleary 9092146990 yclearycharternet
Microsoft Windows Rosemary Lloyd
9095477257 Rosemarybigbearccorg
MS Outlook Rosemary Lloyd
9095477257 Rosemarybigbearccorg
MS Excel Yomar Cleary 9098785622 yclearycharternet
MS Publisher Yomar Cleary 9092146990 yclearycharternet
CD Burning Rosemary Lloyd 9095477257 rosemarybigbearccorg
Computer Upgrades Marc Busch
9496099266 bigbearjedicharternet
The Computer Club provides training at the monthly meetings when there is no
presenter
Persons with all levels of computer knowledge are welcome to attend the
clubrsquos open meetings
Your First 2 visits are free Bring a friend
Annual Membership is $25 and spouse $5 All recurring membership dues are due in
January
Helpline Officers and Key Leaders
President Yomar Cleary 9092146990 yclearycharternet
Vice Presidenthellip helliphelliphelliphellip Marc Busch
9496099266 helliphelliphellipbigbearjedicharternet
Treasurer Tom Brandau 2134461315 tombran44gmailcom
Secretary Sandi Ybarra 9095858318 sandiscabingmailcom
Director at Large helliphelliphelliphelliphellip Jerry Merino 9095858714 gmerinocharternet
Director at Large helliphelliphellip Del Johnson
9095849017helliphellipdeljohnson_Isyahoocom
Director at Large helliphelliphellip Bill Treadwell
9097304625 treadwellbigbearccorg
Webmaster Rosemary Lloyd
9095477257 Rosemarybigbearccorg
Assistant Webmaster helliphelliphelliphellipBill Flanagan
9098669379 billbigbearccorg
Newsletter Editor Bill Treadwell
9097304625 treadwellbigbearccorg
Publicity Yomar Cleary
9092146990 yclearycharternet
Equipment Chair Marc Busch
9496099266 helliphelliphellipbigbearjedicharternet
Technical Advisor hellip Jim Lloyd
9095849358 inquiriessugarloafpccom
Refreshments Chair helliphelliphelliphellip Sharon Teeter
9095852026 sharonteeter1verizonnet
Historian Sandi Ybarra
9095858318 sandiscabingmailcom
Sunshine Chair Angie Pezina
9098662314 apezinagmailcom
Hospitality Chairhelliphelliphelliphelliphelliphellipvacant
THE BEAR WANTS YOU TO SHARE A TIP
Send tips to treadwellbigbearccorg
wwwbigbearccorg 16
Mailing Address
Big Bear Computer Club
PO Box 645
Big Bear City CA 92314
Monthly Meeting presen-
tation and demonstration
of popular hardware and
software
RAM (QampA) sessions
Tech News and Virus
Alerts
Door prize drawings
Bearly Bytes our award-
winning monthly news-
letter emailed
Website bigbearccorg
Free Software Review
Member Help Line
Member E-mail Notifica-tions
Member-only Discounts
Training workshops
All this for only $25 per year
Membership Benefits
New Renewal Update my Information
Full Name ___________________________________________________________________
Mailing Address _______________________________________________________________
City State Zip ________________________________________________________________
Home Phone _(______)___________________ Cell Phone_(_____)__________________
E-mail address ________________________________________________________________
Adding Associates
For each Family Member (s) add $5year towards your dues
Mail your application and check for dues to
BCC Treasurer
PO Box 645
Big Bear City CA 92314
Or bring your application and dues to a monthly general meeting
General Information and Membership Application
I agree that Big Bear Computer Club may use such photographs of me with or without my name and for any lawful purpose including for example such
purposes as publicity newsletter advertising and web content
Yes No Your initials _________
BIG BEAR COMPUTER CLUB INC P O BOX 645 ndash BIG BEAR CITY CA 92314
Membership Applicationmdash$2500 ndash Associate $5 You can pay your dues at the monthly meeting by mail -- make checks to Big Bear Computer
Club or by Pay Pal (Go into our website wwwbigbearccorg and go to ldquoDonaterdquo)
Computer Club meetings are held
in the Big Bear Senior Center
wwwbigbearccorg 12
About Bearly Bytes
Bearly Bytes Newsletter past winner of SWUGC amp APCUG Newsletter contests is the official publication of the Big Bear Computer Club Views expressed in Bearly Bytes are those of the authors and do not necessarily reflect the opinions of Big Bear Computer Club Other computer user groups are welcome to reprint our articles as long as they give credit to the author and Bearly Bytes Big Bear Computer Club Submissions All BBCC members are encouraged to send letters articles questions and comments to Bearly Bytes for inclusion in future issues Submit as plain text in the body of an email and attach any graphics as JPEG or GIF format and send to treadwellbigbearccorg
Bits amp Bytes
The Opportunity Drawing Winners
left to right Kimberlee Kid First aid kit Linda Sharman Green backpack Angie Pezina helliphelliphelliphellipFirst aid kit Paul Palmquist helliphelliphellipTape measure key chain Mary Lou helliphelliphelliphelliphelliphellipFirst aid kit
Enter Find the Bear
contest to win a cool prize
1 Locate this BEAR 2 Click on it 3 Fill in the form 4 and then Send
At the next general meeting following this newsletter a drawing will be held for all who found the bear The
selected winner will receive a surprise gift
You will need to attend the meeting in order to receive the prize
August 2017 Club Meeting
The presentation by Bob Gostischa from Avast Software cov-
ered Computers
(Windows and Mac)
tablets and Smart Phones
He addressed three im-
portant areas (1) the im-
portance to use the right
tools once you get to the
Internet (2) he will show
how to exercise caution
when visiting the internet
and (3) the
importance to avoid the
dangers found on the in-
ternet For those who
could not make it to the
meeting You really need to
click on the httpsgoogl5v4sIQ (launches Google Docs)to
see his presentation on Tips for Staying Safe Online amp Pre-
venting Identity Theft
Bob Gostischa receiving a thank you
from our Club President
wwwbigbearccorg 13
Upcoming Calendar Events
Group Newsletter Sites
wwwbigbearccorg 14
Word Tips By Rosemary Lloyd
Excel Tips By Yomar Cleary
Apple News
The stories you really care about
The more you read the better
News gets at understanding your
interests And now itrsquos even more
personalized Top Stories choos-
es the stories that are relevant to
you and delivers them to your
screen while the Today widget
keeps you up to date throughout
the day News stays on top of the
stories yoursquore interested in So
you can too
All the news you want All in one place
News collects all the stories you want to read mdash so you no longer need to move from app to app to stay informed And with the For You tab itrsquos easier than ever to find the stories that matter most to you News also features breaking news notifications and subscriptions to some of your favorite publications
To Show or Hide the Ruler Applies To Word 2013
Click the View tab Click the check box
next to Ruler
to show or hide
the ruler
httpswwwgcflearnfreeorgword2013getting-to-know-word1
Cropping Graphics in Excel
Once you place a graphic in your workbook you may decide to crop it Cropping means to cut off part of the graphic so it doesnt show in your workbook To crop a graphic follow these steps
Make sure that the Format tab of
the ribbon is displayed (This
tab is only visible if you first
click on a graphic)
Click on the Crop tool in the Size
group
Click on one of the graphics corner
or side handles with the mouse
pointer
Drag the handle towards the center
of the graphic stopping when
you have cropped the desired
amount
You can turn off cropping by
clicking on the Crop tool again
or by pressing Esc
You should understand that while cropping a graphic makes it look smaller none of the original graphic is actually lost it is only hidden Cropping a graphic will not decrease the amount of storage space re-quired by that graphic in your workbook
wwwbigbearccorg 15
The following members have generously offered to help you with your PC
problems by phone or by email
Windows Beginners Yomar Cleary 9092146990 yclearycharternet
Microsoft Windows Rosemary Lloyd
9095477257 Rosemarybigbearccorg
MS Outlook Rosemary Lloyd
9095477257 Rosemarybigbearccorg
MS Excel Yomar Cleary 9098785622 yclearycharternet
MS Publisher Yomar Cleary 9092146990 yclearycharternet
CD Burning Rosemary Lloyd 9095477257 rosemarybigbearccorg
Computer Upgrades Marc Busch
9496099266 bigbearjedicharternet
The Computer Club provides training at the monthly meetings when there is no
presenter
Persons with all levels of computer knowledge are welcome to attend the
clubrsquos open meetings
Your First 2 visits are free Bring a friend
Annual Membership is $25 and spouse $5 All recurring membership dues are due in
January
Helpline Officers and Key Leaders
President Yomar Cleary 9092146990 yclearycharternet
Vice Presidenthellip helliphelliphelliphellip Marc Busch
9496099266 helliphelliphellipbigbearjedicharternet
Treasurer Tom Brandau 2134461315 tombran44gmailcom
Secretary Sandi Ybarra 9095858318 sandiscabingmailcom
Director at Large helliphelliphelliphelliphellip Jerry Merino 9095858714 gmerinocharternet
Director at Large helliphelliphellip Del Johnson
9095849017helliphellipdeljohnson_Isyahoocom
Director at Large helliphelliphellip Bill Treadwell
9097304625 treadwellbigbearccorg
Webmaster Rosemary Lloyd
9095477257 Rosemarybigbearccorg
Assistant Webmaster helliphelliphelliphellipBill Flanagan
9098669379 billbigbearccorg
Newsletter Editor Bill Treadwell
9097304625 treadwellbigbearccorg
Publicity Yomar Cleary
9092146990 yclearycharternet
Equipment Chair Marc Busch
9496099266 helliphelliphellipbigbearjedicharternet
Technical Advisor hellip Jim Lloyd
9095849358 inquiriessugarloafpccom
Refreshments Chair helliphelliphelliphellip Sharon Teeter
9095852026 sharonteeter1verizonnet
Historian Sandi Ybarra
9095858318 sandiscabingmailcom
Sunshine Chair Angie Pezina
9098662314 apezinagmailcom
Hospitality Chairhelliphelliphelliphelliphelliphellipvacant
THE BEAR WANTS YOU TO SHARE A TIP
Send tips to treadwellbigbearccorg
wwwbigbearccorg 16
Mailing Address
Big Bear Computer Club
PO Box 645
Big Bear City CA 92314
Monthly Meeting presen-
tation and demonstration
of popular hardware and
software
RAM (QampA) sessions
Tech News and Virus
Alerts
Door prize drawings
Bearly Bytes our award-
winning monthly news-
letter emailed
Website bigbearccorg
Free Software Review
Member Help Line
Member E-mail Notifica-tions
Member-only Discounts
Training workshops
All this for only $25 per year
Membership Benefits
New Renewal Update my Information
Full Name ___________________________________________________________________
Mailing Address _______________________________________________________________
City State Zip ________________________________________________________________
Home Phone _(______)___________________ Cell Phone_(_____)__________________
E-mail address ________________________________________________________________
Adding Associates
For each Family Member (s) add $5year towards your dues
Mail your application and check for dues to
BCC Treasurer
PO Box 645
Big Bear City CA 92314
Or bring your application and dues to a monthly general meeting
General Information and Membership Application
I agree that Big Bear Computer Club may use such photographs of me with or without my name and for any lawful purpose including for example such
purposes as publicity newsletter advertising and web content
Yes No Your initials _________
BIG BEAR COMPUTER CLUB INC P O BOX 645 ndash BIG BEAR CITY CA 92314
Membership Applicationmdash$2500 ndash Associate $5 You can pay your dues at the monthly meeting by mail -- make checks to Big Bear Computer
Club or by Pay Pal (Go into our website wwwbigbearccorg and go to ldquoDonaterdquo)
Computer Club meetings are held
in the Big Bear Senior Center
wwwbigbearccorg 13
Upcoming Calendar Events
Group Newsletter Sites
wwwbigbearccorg 14
Word Tips By Rosemary Lloyd
Excel Tips By Yomar Cleary
Apple News
The stories you really care about
The more you read the better
News gets at understanding your
interests And now itrsquos even more
personalized Top Stories choos-
es the stories that are relevant to
you and delivers them to your
screen while the Today widget
keeps you up to date throughout
the day News stays on top of the
stories yoursquore interested in So
you can too
All the news you want All in one place
News collects all the stories you want to read mdash so you no longer need to move from app to app to stay informed And with the For You tab itrsquos easier than ever to find the stories that matter most to you News also features breaking news notifications and subscriptions to some of your favorite publications
To Show or Hide the Ruler Applies To Word 2013
Click the View tab Click the check box
next to Ruler
to show or hide
the ruler
httpswwwgcflearnfreeorgword2013getting-to-know-word1
Cropping Graphics in Excel
Once you place a graphic in your workbook you may decide to crop it Cropping means to cut off part of the graphic so it doesnt show in your workbook To crop a graphic follow these steps
Make sure that the Format tab of
the ribbon is displayed (This
tab is only visible if you first
click on a graphic)
Click on the Crop tool in the Size
group
Click on one of the graphics corner
or side handles with the mouse
pointer
Drag the handle towards the center
of the graphic stopping when
you have cropped the desired
amount
You can turn off cropping by
clicking on the Crop tool again
or by pressing Esc
You should understand that while cropping a graphic makes it look smaller none of the original graphic is actually lost it is only hidden Cropping a graphic will not decrease the amount of storage space re-quired by that graphic in your workbook
wwwbigbearccorg 15
The following members have generously offered to help you with your PC
problems by phone or by email
Windows Beginners Yomar Cleary 9092146990 yclearycharternet
Microsoft Windows Rosemary Lloyd
9095477257 Rosemarybigbearccorg
MS Outlook Rosemary Lloyd
9095477257 Rosemarybigbearccorg
MS Excel Yomar Cleary 9098785622 yclearycharternet
MS Publisher Yomar Cleary 9092146990 yclearycharternet
CD Burning Rosemary Lloyd 9095477257 rosemarybigbearccorg
Computer Upgrades Marc Busch
9496099266 bigbearjedicharternet
The Computer Club provides training at the monthly meetings when there is no
presenter
Persons with all levels of computer knowledge are welcome to attend the
clubrsquos open meetings
Your First 2 visits are free Bring a friend
Annual Membership is $25 and spouse $5 All recurring membership dues are due in
January
Helpline Officers and Key Leaders
President Yomar Cleary 9092146990 yclearycharternet
Vice Presidenthellip helliphelliphelliphellip Marc Busch
9496099266 helliphelliphellipbigbearjedicharternet
Treasurer Tom Brandau 2134461315 tombran44gmailcom
Secretary Sandi Ybarra 9095858318 sandiscabingmailcom
Director at Large helliphelliphelliphelliphellip Jerry Merino 9095858714 gmerinocharternet
Director at Large helliphelliphellip Del Johnson
9095849017helliphellipdeljohnson_Isyahoocom
Director at Large helliphelliphellip Bill Treadwell
9097304625 treadwellbigbearccorg
Webmaster Rosemary Lloyd
9095477257 Rosemarybigbearccorg
Assistant Webmaster helliphelliphelliphellipBill Flanagan
9098669379 billbigbearccorg
Newsletter Editor Bill Treadwell
9097304625 treadwellbigbearccorg
Publicity Yomar Cleary
9092146990 yclearycharternet
Equipment Chair Marc Busch
9496099266 helliphelliphellipbigbearjedicharternet
Technical Advisor hellip Jim Lloyd
9095849358 inquiriessugarloafpccom
Refreshments Chair helliphelliphelliphellip Sharon Teeter
9095852026 sharonteeter1verizonnet
Historian Sandi Ybarra
9095858318 sandiscabingmailcom
Sunshine Chair Angie Pezina
9098662314 apezinagmailcom
Hospitality Chairhelliphelliphelliphelliphelliphellipvacant
THE BEAR WANTS YOU TO SHARE A TIP
Send tips to treadwellbigbearccorg
wwwbigbearccorg 16
Mailing Address
Big Bear Computer Club
PO Box 645
Big Bear City CA 92314
Monthly Meeting presen-
tation and demonstration
of popular hardware and
software
RAM (QampA) sessions
Tech News and Virus
Alerts
Door prize drawings
Bearly Bytes our award-
winning monthly news-
letter emailed
Website bigbearccorg
Free Software Review
Member Help Line
Member E-mail Notifica-tions
Member-only Discounts
Training workshops
All this for only $25 per year
Membership Benefits
New Renewal Update my Information
Full Name ___________________________________________________________________
Mailing Address _______________________________________________________________
City State Zip ________________________________________________________________
Home Phone _(______)___________________ Cell Phone_(_____)__________________
E-mail address ________________________________________________________________
Adding Associates
For each Family Member (s) add $5year towards your dues
Mail your application and check for dues to
BCC Treasurer
PO Box 645
Big Bear City CA 92314
Or bring your application and dues to a monthly general meeting
General Information and Membership Application
I agree that Big Bear Computer Club may use such photographs of me with or without my name and for any lawful purpose including for example such
purposes as publicity newsletter advertising and web content
Yes No Your initials _________
BIG BEAR COMPUTER CLUB INC P O BOX 645 ndash BIG BEAR CITY CA 92314
Membership Applicationmdash$2500 ndash Associate $5 You can pay your dues at the monthly meeting by mail -- make checks to Big Bear Computer
Club or by Pay Pal (Go into our website wwwbigbearccorg and go to ldquoDonaterdquo)
Computer Club meetings are held
in the Big Bear Senior Center
wwwbigbearccorg 14
Word Tips By Rosemary Lloyd
Excel Tips By Yomar Cleary
Apple News
The stories you really care about
The more you read the better
News gets at understanding your
interests And now itrsquos even more
personalized Top Stories choos-
es the stories that are relevant to
you and delivers them to your
screen while the Today widget
keeps you up to date throughout
the day News stays on top of the
stories yoursquore interested in So
you can too
All the news you want All in one place
News collects all the stories you want to read mdash so you no longer need to move from app to app to stay informed And with the For You tab itrsquos easier than ever to find the stories that matter most to you News also features breaking news notifications and subscriptions to some of your favorite publications
To Show or Hide the Ruler Applies To Word 2013
Click the View tab Click the check box
next to Ruler
to show or hide
the ruler
httpswwwgcflearnfreeorgword2013getting-to-know-word1
Cropping Graphics in Excel
Once you place a graphic in your workbook you may decide to crop it Cropping means to cut off part of the graphic so it doesnt show in your workbook To crop a graphic follow these steps
Make sure that the Format tab of
the ribbon is displayed (This
tab is only visible if you first
click on a graphic)
Click on the Crop tool in the Size
group
Click on one of the graphics corner
or side handles with the mouse
pointer
Drag the handle towards the center
of the graphic stopping when
you have cropped the desired
amount
You can turn off cropping by
clicking on the Crop tool again
or by pressing Esc
You should understand that while cropping a graphic makes it look smaller none of the original graphic is actually lost it is only hidden Cropping a graphic will not decrease the amount of storage space re-quired by that graphic in your workbook
wwwbigbearccorg 15
The following members have generously offered to help you with your PC
problems by phone or by email
Windows Beginners Yomar Cleary 9092146990 yclearycharternet
Microsoft Windows Rosemary Lloyd
9095477257 Rosemarybigbearccorg
MS Outlook Rosemary Lloyd
9095477257 Rosemarybigbearccorg
MS Excel Yomar Cleary 9098785622 yclearycharternet
MS Publisher Yomar Cleary 9092146990 yclearycharternet
CD Burning Rosemary Lloyd 9095477257 rosemarybigbearccorg
Computer Upgrades Marc Busch
9496099266 bigbearjedicharternet
The Computer Club provides training at the monthly meetings when there is no
presenter
Persons with all levels of computer knowledge are welcome to attend the
clubrsquos open meetings
Your First 2 visits are free Bring a friend
Annual Membership is $25 and spouse $5 All recurring membership dues are due in
January
Helpline Officers and Key Leaders
President Yomar Cleary 9092146990 yclearycharternet
Vice Presidenthellip helliphelliphelliphellip Marc Busch
9496099266 helliphelliphellipbigbearjedicharternet
Treasurer Tom Brandau 2134461315 tombran44gmailcom
Secretary Sandi Ybarra 9095858318 sandiscabingmailcom
Director at Large helliphelliphelliphelliphellip Jerry Merino 9095858714 gmerinocharternet
Director at Large helliphelliphellip Del Johnson
9095849017helliphellipdeljohnson_Isyahoocom
Director at Large helliphelliphellip Bill Treadwell
9097304625 treadwellbigbearccorg
Webmaster Rosemary Lloyd
9095477257 Rosemarybigbearccorg
Assistant Webmaster helliphelliphelliphellipBill Flanagan
9098669379 billbigbearccorg
Newsletter Editor Bill Treadwell
9097304625 treadwellbigbearccorg
Publicity Yomar Cleary
9092146990 yclearycharternet
Equipment Chair Marc Busch
9496099266 helliphelliphellipbigbearjedicharternet
Technical Advisor hellip Jim Lloyd
9095849358 inquiriessugarloafpccom
Refreshments Chair helliphelliphelliphellip Sharon Teeter
9095852026 sharonteeter1verizonnet
Historian Sandi Ybarra
9095858318 sandiscabingmailcom
Sunshine Chair Angie Pezina
9098662314 apezinagmailcom
Hospitality Chairhelliphelliphelliphelliphelliphellipvacant
THE BEAR WANTS YOU TO SHARE A TIP
Send tips to treadwellbigbearccorg
wwwbigbearccorg 16
Mailing Address
Big Bear Computer Club
PO Box 645
Big Bear City CA 92314
Monthly Meeting presen-
tation and demonstration
of popular hardware and
software
RAM (QampA) sessions
Tech News and Virus
Alerts
Door prize drawings
Bearly Bytes our award-
winning monthly news-
letter emailed
Website bigbearccorg
Free Software Review
Member Help Line
Member E-mail Notifica-tions
Member-only Discounts
Training workshops
All this for only $25 per year
Membership Benefits
New Renewal Update my Information
Full Name ___________________________________________________________________
Mailing Address _______________________________________________________________
City State Zip ________________________________________________________________
Home Phone _(______)___________________ Cell Phone_(_____)__________________
E-mail address ________________________________________________________________
Adding Associates
For each Family Member (s) add $5year towards your dues
Mail your application and check for dues to
BCC Treasurer
PO Box 645
Big Bear City CA 92314
Or bring your application and dues to a monthly general meeting
General Information and Membership Application
I agree that Big Bear Computer Club may use such photographs of me with or without my name and for any lawful purpose including for example such
purposes as publicity newsletter advertising and web content
Yes No Your initials _________
BIG BEAR COMPUTER CLUB INC P O BOX 645 ndash BIG BEAR CITY CA 92314
Membership Applicationmdash$2500 ndash Associate $5 You can pay your dues at the monthly meeting by mail -- make checks to Big Bear Computer
Club or by Pay Pal (Go into our website wwwbigbearccorg and go to ldquoDonaterdquo)
Computer Club meetings are held
in the Big Bear Senior Center
wwwbigbearccorg 15
The following members have generously offered to help you with your PC
problems by phone or by email
Windows Beginners Yomar Cleary 9092146990 yclearycharternet
Microsoft Windows Rosemary Lloyd
9095477257 Rosemarybigbearccorg
MS Outlook Rosemary Lloyd
9095477257 Rosemarybigbearccorg
MS Excel Yomar Cleary 9098785622 yclearycharternet
MS Publisher Yomar Cleary 9092146990 yclearycharternet
CD Burning Rosemary Lloyd 9095477257 rosemarybigbearccorg
Computer Upgrades Marc Busch
9496099266 bigbearjedicharternet
The Computer Club provides training at the monthly meetings when there is no
presenter
Persons with all levels of computer knowledge are welcome to attend the
clubrsquos open meetings
Your First 2 visits are free Bring a friend
Annual Membership is $25 and spouse $5 All recurring membership dues are due in
January
Helpline Officers and Key Leaders
President Yomar Cleary 9092146990 yclearycharternet
Vice Presidenthellip helliphelliphelliphellip Marc Busch
9496099266 helliphelliphellipbigbearjedicharternet
Treasurer Tom Brandau 2134461315 tombran44gmailcom
Secretary Sandi Ybarra 9095858318 sandiscabingmailcom
Director at Large helliphelliphelliphelliphellip Jerry Merino 9095858714 gmerinocharternet
Director at Large helliphelliphellip Del Johnson
9095849017helliphellipdeljohnson_Isyahoocom
Director at Large helliphelliphellip Bill Treadwell
9097304625 treadwellbigbearccorg
Webmaster Rosemary Lloyd
9095477257 Rosemarybigbearccorg
Assistant Webmaster helliphelliphelliphellipBill Flanagan
9098669379 billbigbearccorg
Newsletter Editor Bill Treadwell
9097304625 treadwellbigbearccorg
Publicity Yomar Cleary
9092146990 yclearycharternet
Equipment Chair Marc Busch
9496099266 helliphelliphellipbigbearjedicharternet
Technical Advisor hellip Jim Lloyd
9095849358 inquiriessugarloafpccom
Refreshments Chair helliphelliphelliphellip Sharon Teeter
9095852026 sharonteeter1verizonnet
Historian Sandi Ybarra
9095858318 sandiscabingmailcom
Sunshine Chair Angie Pezina
9098662314 apezinagmailcom
Hospitality Chairhelliphelliphelliphelliphelliphellipvacant
THE BEAR WANTS YOU TO SHARE A TIP
Send tips to treadwellbigbearccorg
wwwbigbearccorg 16
Mailing Address
Big Bear Computer Club
PO Box 645
Big Bear City CA 92314
Monthly Meeting presen-
tation and demonstration
of popular hardware and
software
RAM (QampA) sessions
Tech News and Virus
Alerts
Door prize drawings
Bearly Bytes our award-
winning monthly news-
letter emailed
Website bigbearccorg
Free Software Review
Member Help Line
Member E-mail Notifica-tions
Member-only Discounts
Training workshops
All this for only $25 per year
Membership Benefits
New Renewal Update my Information
Full Name ___________________________________________________________________
Mailing Address _______________________________________________________________
City State Zip ________________________________________________________________
Home Phone _(______)___________________ Cell Phone_(_____)__________________
E-mail address ________________________________________________________________
Adding Associates
For each Family Member (s) add $5year towards your dues
Mail your application and check for dues to
BCC Treasurer
PO Box 645
Big Bear City CA 92314
Or bring your application and dues to a monthly general meeting
General Information and Membership Application
I agree that Big Bear Computer Club may use such photographs of me with or without my name and for any lawful purpose including for example such
purposes as publicity newsletter advertising and web content
Yes No Your initials _________
BIG BEAR COMPUTER CLUB INC P O BOX 645 ndash BIG BEAR CITY CA 92314
Membership Applicationmdash$2500 ndash Associate $5 You can pay your dues at the monthly meeting by mail -- make checks to Big Bear Computer
Club or by Pay Pal (Go into our website wwwbigbearccorg and go to ldquoDonaterdquo)
Computer Club meetings are held
in the Big Bear Senior Center
wwwbigbearccorg 16
Mailing Address
Big Bear Computer Club
PO Box 645
Big Bear City CA 92314
Monthly Meeting presen-
tation and demonstration
of popular hardware and
software
RAM (QampA) sessions
Tech News and Virus
Alerts
Door prize drawings
Bearly Bytes our award-
winning monthly news-
letter emailed
Website bigbearccorg
Free Software Review
Member Help Line
Member E-mail Notifica-tions
Member-only Discounts
Training workshops
All this for only $25 per year
Membership Benefits
New Renewal Update my Information
Full Name ___________________________________________________________________
Mailing Address _______________________________________________________________
City State Zip ________________________________________________________________
Home Phone _(______)___________________ Cell Phone_(_____)__________________
E-mail address ________________________________________________________________
Adding Associates
For each Family Member (s) add $5year towards your dues
Mail your application and check for dues to
BCC Treasurer
PO Box 645
Big Bear City CA 92314
Or bring your application and dues to a monthly general meeting
General Information and Membership Application
I agree that Big Bear Computer Club may use such photographs of me with or without my name and for any lawful purpose including for example such
purposes as publicity newsletter advertising and web content
Yes No Your initials _________
BIG BEAR COMPUTER CLUB INC P O BOX 645 ndash BIG BEAR CITY CA 92314
Membership Applicationmdash$2500 ndash Associate $5 You can pay your dues at the monthly meeting by mail -- make checks to Big Bear Computer
Club or by Pay Pal (Go into our website wwwbigbearccorg and go to ldquoDonaterdquo)
Computer Club meetings are held
in the Big Bear Senior Center