Wednesday, May 6, 2009

Rue Longue - Arch beneath an Arch




Throughout the Old Town you find signs giving historical information on where you are. Very helpful it is too.On the left you see part of one of these signs, showing an old arched doorway under an archway that stretches across the street to the other side. In the main photograph, you see the same viewpoint. Not much in the way of a change here..thank goodness.The sign, by the way, was dirty from all the rain we had last month - next I'll walk around with a bucket.Notice the beautiful old cobbles in the drawing and compare to the new road surface which really doesn't enhance the beauty of this ancient street.

The Wadey/Snow Family


First of all I wanted to say Thank you to Nancy for sending me these beautiful flowers for Mothers Day. I love getting flowers and tulips are my favorite!Secondly Zeland had his appointment with the Ear, nose and throat Doc on Tuesday and it went really well. We didn't have to wait long and they had a little play area so Zeland was able to play while we waited to be taken back. Dr. Simms was very nice and answered all my questions. We agreed that the best thing for Zeland is to have tubes put in. As it stands right now he is not hearing as well as he should be. Dr Simms said it was like walking around all day and plugging your ears. Not really a good thing when your learning how to talk. He said that the procedure takes like ten minuets and the kids are fine after. The tubes will last anywhere from 8-12 months. We are confidant that this will help our baby boy not have anymore ear infections and he will be able to hear clearly. I will hear from the surgery scheduler this week or early next week and get everything set up and see what our insurance will pay. I am so ready to get this done and over with. I pretty nervous but I know things will be fine and if this is the worst we are very blessed. Just keep my little munchkin in your thoughts and prayers.

Photography as Transcendence


A philosophically minded friend of mine dropped by the Lorton Photography Workhouse while I was performing my "gallery sitting" chores this Saturday. After exchanging some pleasantries, and mutual musings - as is our custom - on the nature of life, art, and meaning, his attention soon focused on a series of masterful nude portraits by a fellow member of the coop I belong to (E. E. McCollum).
My friend was particularly impressed by how "utterly and completely absorbing" Eric's portraits are; but he was not - as he immediately explained - referrring only to the model's obvious beauty. My astute friend - who also happens to be a gifted artist - was using one of Eric's portraits to make a deeper point about what distinguishes the "best" photography from that which is merely "good." My friend opined that the best photograph - or, more generally, the best artwork of any kind - is the one that induces in the viewer the broadest possible inner experience. That is, that what the viewer experiences, transcends in some way - and in the very best art, transcends in multiple ways - the dimensions that the artist is physically constrained to using in order to express his artwork.Superficially, of course, this is always true, even of "not terribly good" photographs. All (conventional) photographs are by their nature two dimensional, yet evoke - with varying degrees of success - a "three dimensional" experience (mostly because we "expect" to see the "world as revealed by a photograph" as we see the world with our eyes). But what my friend was thinking about was a deeper level of experiential transcendence. When he looked at one of Eric's nude portraits - which is, as are all of Eric's photographs, beautifully lit, elegantly composed, and expertly printed with a wonderful palette of tones (see Eric's on-line gallery for samples of his work) - my friend's immediate reality was temporarily replaced by one in which only my friend and Eric's model existed, and in which the model was very real. From my friend's point of view, while he was looking at the portrait, the model was as palpably real to him as any physically real person can be.His experience of her far transcended the ink and paper on which her two dimensional form is physically expressed, and assumed multiple dimensions including touch, taste, smell, even (hints of imagined) emotion. To be sure, all of these "transcendent" dimensions are supplied by the viewer, and will be different from viewer to viewer. It is more correct to say that they are all induced in the viewer by the photograph. But that is the whole point. The photograph - as a physical cipher designed to convey a certain experience of reality - is so well executed, that the viewer experiences the full range of emotion while interacting with it. The shades of grey ink that depict a part of the model's neck, for example, are transformed in the viewer's mind into real skin, with its own unique aroma, its distinct tactile feel and texture, and so on. As tempting as it might be to think that this is true of all photographs, the truth is that it is not so. Indeed, had Eric's portrait been taken instead by a less seasoned photographer with no eye for light, let us say, but of the same model in exactly the same pose in exactly the same surroundings and background, the perceptive viewer would in all likelihood still "experience" a beautiful model in a beautiful pose, but nothing more. No extra, or transcendent, dimensions would reveal themselves; and certainly not as readily, and not all for indiscriminate viewers. Eric's fine-art "touch" reveals profoundly more. In a sense, Eric's portrait provides the raw "aesthetic" material that the interested viewer transforms into a transcendent, personally meaningful experiential reality.So the idea on the table, as proposed by my artist friend after viewing Eric's portrait is this: that art is at its finest when the artist somehow manages to induce in the viewer dimensions of inner experience that transcend those that define the artwork itself. Just as "fine-art" music (say, by Beethoven) may be distinguished from "musak" by the fact that listening to it makes you feel alive (whereas "musak" merely makes you think that you want your elevator ride to end soon); the finest photography makes you forget you are looking at a photograph and makes you experience it as if it were real; as if you were a part of it.Put another way, and assuming our traditional store of five senses (though we may have as many as eleven, and possibly more if we include "extra"-sensory ones), the finest art is a process whereby a single sensory dimension - and at most a few - is used to evoke in the viewer the experiential equivalent of all five. The very best art makes the viewer forget she is even looking at any art at all, the artwork having evoked an experience of transcendence itself (in which the viewer "sees" herself in the art, and cosmos in self). But that's another blog entry... ;-)

Hey Fella, Would you Mind...?


Audacious, brash, brazen, daring, disrespectful, forward, impertinent, impudent, presumptuous, rash, rude, shameless, ...One of my pet peeves, in and out of photography, is what I call the "in your face" approach some people take to get my attention (I am sure I am not alone is despising this phenomenon to the "beyond measurable category" level). I am emphatically not referring to people who are quiet and polite; (which most are, of course); and certainly not those who patiently wait for me to finish whatever it is I am doing - usually hovering over my tripod, bending up and down and sideways, while gesticulating wildly with my elbows trying to find a reasonable composition (my wife refers to my picture-taking process as akin to the wild thrashings of a stark raving mad broken-pretzel) - before introducing themselves.
No, the class of people I am referring to are of a distinct "Hey Fella, Would you mind...?" bent of mind. The kind who - regardless of how busy they must surely see you are (it is hard to be "gesticulating wildly" without at least appearing to be busy doing something ;-) - nonetheless suddenly, brazenly, and anything-but-quietly approach you - often tapping you on the shoulder for good measure, presumably trying to increase their chances of getting your attention - to demand (yes demand!) that you stop what you are doing in order to take their picture. As preposterous as this may sound - come now, people don't really do that, do they? (yes they do!) - this has happened to me for so long, so consistently, in so many different places, that I never go on any of my photo-safaris without expecting (and bracing for) at least one such encounter.Here is a typical "Hey Fella, Would you mind...?" encounter I had recently on a trip my wife and I took to Grand Cayman island (to get away from it all during Spring break). My wife and I are on the beach in front of our hotel. The sun is setting (with precious few moments left before it disappears below the horizon). I have my tripod set up a few feet from shore, and am attempting to get a few Hiroshi Sugimoto-like (i.e., looooong exposure) shots. I have my trusty Singh-Ray vari-ND neutral density filter screwed on. And I am very much "in the moment"; ticking off the seconds of a shot and anticipating only a few compositional opportunities left before the light disappears for the night.Behind me, I faintly hear some whispers (though with an obvious urgency). "There are only a few moments left! Get someone!" A family. A man, a woman, and two teenage kids. I hear feet shuffling on the sand, ice sloshing in a glass (a rum punch?); voices getting closer. "He's busy." "So what, the lights going!" Two pairs of feet shuffling now; I also hear a few giggles from the kids. "I can't bother him now!" (A faint glimmer of hope that at least one member of this party has some decency!...but alas...) "He can take his pictures later...ask him, go ask him!" I hear: "Ah, fella, would you mind...?" (I'm not kidding you!) Keep in mind, I'm huddled over my camera, and in the middle of a minute-long exposure. I keep my posture, and say (without lifting my head) - loudly enough for him to hear, but with an even tone - "I'm in the middle of a shot right now; this is not a good time." "But I just heard the shutter; you've taken your shot already!" I can't believe this comment (I sigh, inwardly, but keep my eye at the camera - 45s, 46s, 47s, ... - and remain silent.I feel a light tap on my shoulder (I am not making this up!) "Hey fella, didn't you hear me? My wife and I would like you to take a picture of our family before the sun goes down." I still - somehow (!) - manage to keep my composure. I remain glued to my camera, but say, firmly this time, "Sir, I am busy right now. Perhaps you can find someone else to take your picture?" I should point out that the beach was filled with people, many of whom had their own cameras; and at least one other person had a tripod (which he was not even using, and was content simply enjoying the sunset view).The man persists: "Fella, there are only a few minutes left!" An assertion that finally grabs my full attention. I stand upright, look his way, and say - rather angrily I admit - "Yes, I know! I'd very much like to use this time to do my work, if you don't mind!" He doesn't let go: "Hey man, it's just one shot, come on..." Now, I know there must be some Emily Post etiquette behavior guide for situations such as this (there ought to be, if not). I grit my teeth - outwardly trying to smile - take his camera, move in front of the man, his wife, and two giggling teenagers, and tale a quick shot with their camera. "Thanks man," is all I get for my efforts (as I run back to my tripod)...almost. As I prepare to hit the shutter one last time (to capture the shot you see reproduced above), I feel another tap - I can;t make this stuff up! - "Hey fella, can you do one more, please, without the kids this time?" At least he said please!I have dozens of stories very similar to this one. An unforgettable "encounter" happened in Santorini, Greece last year, and involved a German couple who spoke not one word of English (nor I German). That made it both better and worse (and in hindsight - but only in hindsight - hilarious), but I'll leave the details to your imagination :-) There are no deep lessons or morals here, save for the obvious ones: (1) people will be people (on both sides of the camera); (2) always plan for one or two rude people (that way you won't be surprised); and (3) it pays to not lose your cool (had I lost mine, I would not have gotten the one "keeper" of the night, the shot at top).Postscript. For those kind readers who have, over time, picked up on my penchant for Borgesian/Godelian recursive mysteries, be assured that I did toy with the idea of weaving my tale around an infinite regress induced by my having thrown the "audacious, brash, brazen, daring, disrespectful, forward, impertinent, impudent, presumptuous, rash, rude, shameless,.." man's words right back at him: "Hey fella, would you mind...?" (Which would have made as much sense for me to use on him, as he clearly believed there was in using them on me.) In some unknown universe in the limitless multiverse we occupy an infinitesimally small point in, there is a world, much like our own, where an "encounter" between a photographer and a man wishing the photographer to take a picture of his family never ever ends: Hey fella, would you mind...?, Hey fella, would you mind...?, Hey fella, would you mind...?, ...

Hopeful cricket-related slogan


Back in January I posted some cricket-related photos from my last trip to India. Here is one I'd forgotten about. No cricket action, but a reasonably sensible (albeit slightly cheesy) slogan to think about in these days of the IPL. This was taken at a coffee shop in Candolim, Goa. I've forgotten the name of the chain. The coffee (a double-shot latte) was very good.

Cleaning up the blogroll

Subash pointed out that my blogroll linked to a few dead blogs. I've known about that for a while, but hadn't done anything about it. Today I have. Eight blogs are gone. My criteria for deletion was simple: if you hadn't blogged in 2009, I removed you. If you want to come back, please start blogging!

80th Birthday Cake

One of my favourite things about being a cake designer is being able to personalize that cake for a special person. I was asked to design an 80th birthday cake for a man who golfed, used to be a photographer for the London Free Press and also sailed a Lark.We discussed some cake ideas like a golf bag, a boat and even the Rolleiflex camera he used to use - but then it came to me - what about what his desk would look like.


So, here's the final design with all handmade items - A desktop with The London Free Press Newspaper with an article about the Rolleiflex camera as the top news story, his current Canon Powershot A430 Camera, a golf ball and tees, a pen with his name on it and also a photo in a frame of his Lark. I loved doing this cake - its such a thoughtful, unique and special centerpiece for their event.I just got an email from my client "The cake was a big hit! He was so funny – from a distance he thought we had bought him a camera and had it displayed – he couldn’t figure out why we would do that when he had a camera just like the one displayed – It was only when he got closer that he realized it was a cake with all kinds of stuff on it"btw - The cake was Sour Cream Chocolate Cake with Swiss Meringue Buttercream. The camera was also cake and the rest of the items were handmade of sugarpaste and the details were painted on with edible color.

Tea Anyone?


Well, there actually isn't any tea.... this is a Teapot Cake with a sugarpaste teacup and saucer. It is a 3-layer lemon butter cake with swiss meringue buttercream. Isn't it sweet?When I got the call for this order, I was so excited! The teapot cake was to celebrate an 80th birthday - I think that is such a thoughtful gift.


I knew that this was going to be challenging, but I'm always up for a new cake design. Then I was very lucky because one of my favourite cake blogs had just posted a tutorial on this a few weeks ago. So, that really helped. So, who wants tea?
First Birthday or was it?




This past weekend, I made this wonderfully cute birthday cake for a little boy. The mother sent me a photo of her son so I could make a sugarpaste model of him for the top. This cake was chocolate velvet on the bottom tier and vanilla butter cake on the top tier. I was so happy with this cake, loved how the little boy turned out, the colours, the train and the clothesline. I can't take credit for the clothesline design - the client had found this on another website, I just added in my own flair with the rest of the cake.

Tuesday, May 5, 2009

NW (Nordic Walking) in NW (Northwestern) Colorado


Routt County program to introduce Nordic Walking to the state's northwestern region

I cheer (hooray!) whenever I learn of new Nordic Walking classes, and I cheer more loudly (HOORAY!!) whenever I learn of another here in Colorado. My cheers for a Routt County healthy-aging and wellness program's enthusiasm for walking in general might have loud enough to be heard in northwestern Colorado. The county's Aging Well program is planning to offer beginning and advanced-level walking classes in Steamboat Springs, and possibly Hayden and South Routt County, including Nordic Walking.


Marti Irish, a physical therapist, avid cross-country skier and Nordic Walker, is expected to facilitate a Nordic Walking class as part of Steamboat Springs' Aging Well program. The class will include warm ups, stretches and other exercises, and will be aimed at physically fit individuals. Irish plans to utilize trails in the Sanctuary and lower Howelsen Hill Ski Area. Details about classes in Routt County still are being finalized. For more information about or helping as a volunteer, call 970-871-7606.

Nordic Walking Classes in Two M-States

A slew of intros in the Land of Lakes -- and at least one class series
in Massachusetts

Minnesota
I think of Minnesota as a Nordic Walking hotbed. Two women -- Linda Lemke and Rhea Kontos -- each offer an impressive schedule of classes, and Nordic Walking is available in other contexts too.

Linda Lemke, who calls herself the "Nordic Walking Queen," has scheduled the following classes (click on the links or call the numbers she provided to check on times and costs):

Wednesdays, April 15, 22, 29 - Wayzata Community Education class #nordwk-400-00-001-09, 763-745-5200
Thursdays, April 16, 23 - Edina Community Education, Nordic Walking for Better Health 952-848-3950
Saturdays, May 2, 9, 16 - Nordic Walking Classes at Hoigaards, all 3 sessions for $25, Email Lemke for details
Wednesdays, May 13, 20, 27 - Minnetonka Community Ed, Nordic Walking for Better Health, 952-401-6800
Thursdays, May 7, 14, 21 and Saturdays, May 30, June 6, 13 - Plymouth Parks and Recreation Classes #30919 and 30920, 763-509-5200
Rhea Kontos of Nordic Walk This Way has not, as far as I know, given herself a title, but here's her schedule of upcoming one-session intro classes at $19 each, including use of demo poles. For times or to register, call the phone numbers that Kontos provided or register online when the community is shown below in blue -- and for the sharp-eyed among you, I have been trying to bullet and single-space Kontos's classes too, but this occasionally frustrating program
won't let me:
Thursday, April 16 or Tuesday, May 19 - at Jefferson High School, Bloomington, 952-681-6132
Tuesday, April 21; Thursday; May 14, Tuesday, June 2 - at Grainwood Middle School, Prior Lake, 952-226-0800
Thursday, April 30, or Tuesday, June 16, at Nicollet Junior High, Burnsville, 952-707-4110
Tuesday, April 28 - at North High School Lakeville, 952-232-2150; register online with Park & Rec or call 952-985-4600
Tuesday, May 5 or Thursday, June 4 - at Falcon Ridge Middle School Eagan/A.V., 651-423-7920
Wednesday, May 6; Thursday, June 11, or Tuesday, August 18 - Shakopee, Community Center, (if registering online, at "Activity Type" drop-down box, select "Programs-Adult"), 952-233-9500
Thursday, May 7 - at Bridgewater Elementary, Northfield, 507-664-3648
Tuesday, May 12 - at Jonathan Elementary, Chaska, 952-556-6200
Wednesday, May 13 - River Bend Nature Center, Faribault, 507-384-0516 (or get mail-in form)
a wellness center in Minnetonka is offering a low-cost Nordic walking class on this Saturday, April 18, from 11:30 a.m. to 1:00 p.m., including use or poles. Call 952-935-2202. Midwest Mountaineering has classes May 4 and 16. And Midwest Mountaineering's next Nordic Walking demo is on Monday, May 4, at 6:30 p.m. The store is at 309 Cedar Avenue, Minneapolis; 612-339-3433.

Teelicht "Asphalt"




Ein kleines Stück Stadtromantik für dein zu Hause!Die neuen Teelichthalter aus der Serie "Asphalt" bestechen durch ihre schlichte Form und machen jeden Platz zu einem feierlichen Anlass!


Hier trifft weicher Designerfilz auf fliederfarbenen Asphalt.


Diese harten Kontraste in Materialmix und Farbe geben dem Teelicht seine besondere Optik und Ausstrahlung.Erhältlich im roterpanda Wohnaccessoires Shop und bei vier gezeiten.

Schlüsselbrett mit Vögelchen




Schlüsselbrett mit sitzendem Vögelchen.




Ein schönes Zuhause für deine Schlüssel!Zusätzliche bietet die Tafel genügend Platz für deine Nachrichten und Geistesblitze!Das mokkafarbene Schlüsselbrett wurde mit Tafellack

Magnetisches Schlüsselbrett




Dieses Schlüsselbrett ist mit oliv-farbenem Designerfilz bezogen und zusätzlich mit starken Magneten ausgestattet.Der Kork-Streifen bietet auf diese Weise unsichtbaren Halt für deine Schlüssel, Scheren, Heftklammern, Buttons, etc...eben für all deine magentischen Dinge!Die Materialkombination verleiht dem Schlüsselbrett eine schöne und klare Optik und findet in jeder Umgebung einen gegeigneten Platz.

Friday, May 1, 2009

10 things you can do to protect your data

Takeaway:

"Operating systems and applications can always be reinstalled, but your data is unique--making it the most important thing on your computer or network. Here's a look at 10 ways you can protect that data from loss and unauthorized access".


When you think about it, the most valuable thing on your computer or network is the data you create. After all, that data is the reason for having the computer and network in the first place and it's the bits and bytes that make up that data that are your first priority when putting protective strategies in place. Operating systems and applications can always be reinstalled, but user-created data is unique and if lost, may be irreplaceable.
Some data is also confidential; not only do you not want to lose it, you don't want others to even view it without authorization. Exposure of your social security number, credit card, and bank account information could subject you to identity theft. Company documents may contain trade secrets, personal information about employees or clients, or the organization's financial records.
Let's look at some ways to protect your all-important user data from loss and/or unauthorized access.



#1: Back up early and often

The single most important step in protecting your data from loss is to back it up regularly. How often should you back up? That depends--how much data can you afford to lose if your system crashes completely? A week's work? A day's work? An hour's work?
You can use the backup utility built into Windows (ntbackup.exe) to perform basic backups. You can use Wizard Mode to simplify the process of creating and restoring backups or you can configure the backup settings manually and you can schedule backup jobs to be performed automatically.
There are also numerous third-party backup programs that can offer more sophisticated options. Whatever program you use, it's important to store a copy of your backup offsite in case of fire, tornado, or other natural disaster that can destroy your backup tapes or discs along with the original data.

#2: Use file-level and share-level security

To keep others out of your data, the first step is to set permissions on the data files and folders. If you have data in network shares, you can set share permissions to control what user accounts can and cannot access the files across the network. With Windows 2000/XP, this is done by clicking the Permissions button on the Sharing tab of the file's or folder's properties sheet.
However, these share-level permissions won't apply to someone who is using the local computer on which the data is stored. If you share the computer with someone else, you'll have to use file-level permissions (also called NTFS permissions, because they're available only for files/folders stored on NTFS-formatted partitions). File-level permissions are set using the Security tab on the properties sheet and are much more granular than share-level permissions.
In both cases, you can set permissions for either user accounts or groups, and you can allow or deny various levels of access from read-only to full control.

#3: Password-protect documents

Many productivity applications, such as Microsoft Office applications and Adobe Acrobat, will allow you to set passwords on individual documents. To open the document, you must enter the password. To password-protect a document in Microsoft Word 2003, go to Tools Options and click the Security tab. You can require a password to open the file and/or to make changes to it. You can also set the type of encryption to be used.
Unfortunately, Microsoft's password protection is relatively easy to crack. There are programs on the market designed to recover Office passwords, such as Elcomsoft's Advanced Office Password Recovery (AOPR). This type of password protection, like a standard (non-deadbolt) lock on a door, will deter casual would-be intruders but can be fairly easily circumvented by a determined intruder with the right tools.
You can also use zipping software such as WinZip or PKZip to compress and encrypt documents.

#4: Use EFS encryption

Windows 2000, XP Pro, and Server 2003 support the Encrypting File System (EFS). You can use this built-in certificate-based encryption method to protect individual files and folders stored on NTFS-formatted partitions. Encrypting a file or folder is as easy as selecting a check box; just click the Advanced button on the General tab of its properties sheet. Note that you can't use EFS encryption and NTFS compression at the same time.
EFS uses a combination of asymmetric and symmetric encryption, for both security and performance. To encrypt files with EFS, a user must have an EFS certificate, which can be issued by a Windows certification authority or self-signed if there is no CA on the network. EFS files can be opened by the user whose account encrypted them or by a designated recovery agent. With Windows XP/2003, but not Windows 2000, you can also designate other user accounts that are authorized to access your EFS-encrypted files.
Note that EFS is for protecting data on the disk. If you send an EFS file across the network and someone uses a sniffer to capture the data packets, they'll be able to read the data in the files.

#5: Use disk encryption

There are many third-party products available that will allow you to encrypt an entire disk. Whole disk encryption locks down the entire contents of a disk drive/partition and is transparent to the user. Data is automatically encrypted when it's written to the hard disk and automatically decrypted before being loaded into memory. Some of these programs can create invisible containers inside a partition that act like a hidden disk within a disk. Other users see only the data in the "outer" disk.
Disk encryption products can be used to encrypt removable USB drives, flash drives, etc. Some allow creation of a master password along with secondary passwords with lower rights you can give to other users. Examples include PGP Whole Disk Encryption and DriveCrypt, among many others.

#6: Make use of a public key infrastructure

A public key infrastructure (PKI) is a system for managing public/private key pairs and digital certificates. Because keys and certificates are issued by a trusted third party (a certification authority, either an internal one installed on a certificate server on your network or a public one, such as Verisign), certificate-based security is stronger.
You can protect data you want to share with someone else by encrypting it with the public key of its intended recipient, which is available to anyone. The only person who will be able to decrypt it is the holder of the private key that corresponds to that public key.

#7: Hide data with steganography

You can use a steganography program to hide data inside other data. For example, you could hide a text message within a .JPG graphics file or an MP3 music file, or even inside another text file (although the latter is difficult because text files don't contain much redundant data that can be replaced with the hidden message). Steganography does not encrypt the message, so it's often used in conjunction with encryption software. The data is encrypted first and then hidden inside another file with the steganography software.
Some steganographic techniques require the exchange of a secret key and others use public/private key cryptography. A popular example of steganography software is StegoMagic, a freeware download that will encrypt messages and hide them in .TXT, .WAV, or .BMP files.

#8: Protect data in transit with IP security

Your data can be captured while it's traveling over the network by a hacker with sniffer software (also called network monitoring or protocol analysis software). To protect your data when it's in transit, you can use Internet Protocol Security (IPsec)--but both the sending and receiving systems have to support it. Windows 2000 and later Microsoft operating systems have built-in support for IPsec. Applications don't have to be aware of IPsec because it operates at a lower level of the networking model.
Encapsulating Security Payload (ESP) is the protocol IPsec uses to encrypt data for confidentiality. It can operate in tunnel mode, for gateway-to-gateway protection, or in transport mode, for end-to-end protection. To use IPsec in Windows, you have to create an IPsec policy and choose the authentication method and IP filters it will use. IPsec settings are configured through the properties sheet for the TCP/IP protocol, on the Options tab of Advanced TCP/IP Settings.

#9: Secure wireless transmissions

Data that you send over a wireless network is even more subject to interception than that sent over an Ethernet network. Hackers don't need physical access to the network or its devices; anyone with a wireless-enabled portable computer and a high gain antenna can capture data and/or get into the network and access data stored there if the wireless access point isn't configured securely.
You should send or store data only on wireless networks that use encryption, preferably Wi-Fi Protected Access (WPA), which is stronger than Wired Equivalent Protocol (WEP).

#10: Use rights management to retain control

If you need to send data to others but are worried about protecting it once it leaves your own system, you can use Windows Rights Management Services (RMS) to control what the recipients are able to do with it. For instance, you can set rights so that the recipient can read the Word document you sent but can't change, copy, or save it. You can prevent recipients from forwarding e-mail messages you send them and you can even set documents or messages to expire on a certain date/time so that the recipient can no longer access them after that time.
To use RMS, you need a Windows Server 2003 server configured as an RMS server. Users need client software or an Internet Explorer add-in to access the RMS-protected documents. Users who are assigned rights also need to download a certificate from the RMS server.

10 dumb things users do that can mess up their computers

DUMB 1 >Plug into the wall without surge protection

Here’s one that actually can physically destroy your computer equipment, as well as the data it holds. You may think your systems are in danger only during an electrical storm, but anything that interrupts the electrical circuit and then starts the current back again can fry your components. Something as simple as someone turning on an appliance that’s plugged into the same circuit (especially a high voltage one such as a hair dryer, electric heater, or air conditioner) can cause a surge, or a surge may be caused by a tree limb touching a power line. If you have a power outage, you may experience a surge when the electricity comes back on.
You can protect your systems against damage from power surges by always using a surge protector, but it’s important to be aware that most cheap surge protectors will survive only a single surge and need to be replaced afterward. An Uninterruptible Power Supply (UPS) is better than a surge protector; it has a battery that keeps power flowing smoothly even when there’s an outage, to give you time to gracefully shut down.

DUMB 2 > Surf the Internet without a firewall


Many home users plug their computers right into their spiffy new cable or DSL modems and hop onto the Internet without realizing that they’re putting themselves at risk from viruses and attackers. Every Internet-connected computer should be protected by a firewall; this can be a firewall built into the broadband modem or router, a separate firewall appliance that sits between the modem/router and the computer, a server at the network’s edge running firewall software, or personal firewall software installed on the computer (such as ICF/Windows Firewall built into Windows XP or a third-party firewall program like Kerio or ZoneAlarm).
One advantage of personal firewalls on laptop computers is that they’re still with you when you take the computer on the road and plug into a hotel’s DSL or cable port or connect to a wireless hotspot. Just having a firewall isn’t enough, though. You must also be sure it’s turned on and configured properly to protect you.

DUMB 3 > Neglect to run or update antivirus and anti-spyware programs

Let’s face it: Antivirus programs can be a royal pain. They’re always blocking some application you want to use, you often have to disable them to install new software, and they have to be updated on a regular basis to do any good. Seems like the subscription is always expiring and prompting you to renew it--for a fee, in many cases. But in today’s environment, you can’t afford to go without virus protection. The malicious programs that AV software detects--viruses, Trojans, worms, etc.--can not only wreak havoc on your system but can spread via your computer to the rest of the network. In extreme cases, they can bring down the whole network.
Spyware is another growing threat; these are programs that install themselves on your computer (usually without your knowledge) and collect information from your system that is then sent back to the spyware program’s author or vendor. Antivirus programs often don’t address spyware so it’s important to run a dedicated spyware detection and removal program.

DUMB 4 >Install and uninstall lots of programs, especially betas

You like to be on the cutting edge, so you often install and try out new software. Beta programs are usually free and give you a chance to sample neat new features before most people. There are also many freeware and shareware programs made available as Internet downloads by their authors. We know you’d never do it, but some users even install pirated software or “warez.”
The more programs you install, the more likely you are to run across ones that either include malicious code or that are poorly written and cause your system to behave improperly or crash. The risk is greater with pirated programs.
Even if you install only licensed, final-release commercial software, too many installations and uninstallations can gunk up the registry. Not all uninstall routines completely remove program remnants and at the least, this practice can cause your system to slow down over time.
You should install only the programs that you really need, stick with legitimate software, and try to minimize the number you install and uninstall.

DUMB 5 > Keep disks full and fragmented

One of the results of installing and uninstalling lots of programs (or adding and deleting data of any kind) is that it fragments your disk. Disk fragmentation occurs because of the way information is stored on the disk: On a new, clean disk, when you save a file it’s stored in contiguous sections called clusters. If you delete a file that takes up, for example, five clusters, and then save a new file that takes eight clusters, the first five clusters’ worth of data will be saved in the empty space left by the deletion and the remaining three will be saved in the next empty spaces. That makes the file fragmented, or divided. To access that file, then, the disk’s read heads won’t find all the parts of the file together but must go to different locations on the disk to retrieve it all. That makes it slower to access. If the file is part of a program, the program will run more slowly. A badly fragmented disk will slow down to a crawl.
You can use the disk defragmenter built into Windows (Programs Accessories System Tools) or a third-party defrag program to rearrange these pieces of files so that they’re placed contiguously on the disk.
Another common cause of performance problems and application misbehavior is a disk that’s too full. Many programs create temporary files and need extra free space on the disk to operate. You can use Windows XP’s Disk Cleanup Tool or a third-party program to find and delete rarely used files, or you can manually delete files to clear space on your disk.

DUMB 6 >Open all attachments

Some folks just can’t help themselves: Getting an e-mail message with an attachment is like getting an unexpected gift. You just have to peek inside to see what it is. But just as that package left on your doorstep could contain a bomb, that file attached to your mail message could contain code that will delete your documents or system folder or send viruses to everyone in your address book.
The most blatantly dangerous attachments are executable files--those that run code--with extensions like .exe, .cmd, and many others (see http://antivirus.about.com/od/securitytips/a/fileextview.htm for a list of file extensions for different types of executables). Files that aren’t themselves executables, such as Word .doc files and Excel .xls files, can contain embedded macros. Scripts (Visual Basic, JavaScript, Flash, etc.) aren’t directly executed by the computer but are run by other programs.
It used to be that you could assume plain text (.txt) or graphics (.gif, .jpg, .bmp) files were safe, but not anymore. File extensions can be “spoofed”; attackers take advantage of the Windows default setting that doesn’t display common file extensions to name executables something like greatfile.jpg.exe. With the real extension hidden, it shows up as greatfile.jpg. So the recipient thinks it’s a graphic, but it’s actually a malicious program.

You should open attachments only when they’re from trusted sources and only when you’re expecting them. Even if the mail with the attachment appears to come from someone you trust, it’s possible that someone spoofed their address or that their computer is infected with a virus that sent the attachment to you without their knowledge.

DUMB 7 > Click on everything

Opening attachments isn’t the only type of mouse click that can get you in trouble. Clicking on hyperlinks in e-mail messages or on Web pages can take you to Web sites that have embedded ActiveX controls or scripts that can perform all sorts of malicious activities, from wiping your hard disk to installing a backdoor program on your computer that a hacker can use to get in and take control of it.
Clicking the wrong link can also take you to inappropriate Web sites that feature pornography, pirated music or software, or other content that can get you in trouble if you’re using a computer on the job or even get you in trouble with the law.
Don’t give in to “click mania.” Think before you click a link. Links can also be disguised in “phishing” messages or on Web sites to appear to take you to a different site from the ones they really point to. For example, the link might say www.safesite.com, but it actually takes you to www.gotcha.com. You can often find out the real URL by hovering over the link without clicking it.

DUMB 8 >Share and share alike

Your mother taught you that it’s nice to share, but when you’re on a network, sharing can expose you to dangers. If you have file and printer sharing enabled, others can remotely connect to your computer and access your data. Even if you haven’t created any shared folders, by default Windows systems have hidden “administrative” shares for the root of each drive. A savvy hacker may be able to use these shares to get in. One way to prevent that is to turn off file and printer sharing--if you don’t need to make any of the files on your computer accessible across the network. This is especially a good idea if you’re connecting your laptop to a public wireless hotspot. You can find instructions on how to do so at http://www.pcmag.com/article2/0,1895,1277222,00.asp.
If you do need to make shared folders accessible, it’s important that they be protected by both share-level permissions and file-level (NTFS) permissions. Also ensure that your account and the local administrative account have strong passwords.

DUMB 9 > Pick the wrong passwords:


That brings us to another common mistake that can expose you to attacks: picking the wrong password. Even if you don’t belong to a network where the administrator forces you to select strong passwords and change them regularly, you should do so. Don’t pick passwords that are easy to guess, such as your birthdate, loved one’s name, social security number, etc. Longer passwords are harder to crack, so make your password at least eight characters long; 14 is even better. Popular password-cracking methods use "dictionary" attacks so don’t use words that are in the dictionary. Passwords should contain a combination of alpha, numeric, and symbol characters for best security.
A long string of nonsense characters may create a password that’s tough to crack, but if you can’t remember it, you’ll defeat the purpose by writing it down (where an intruder may be able to find it). Instead, create a phrase you can remember easily and use the first letters of each word, along with logical numbers and symbols. For example: “My cat ate a mouse on the 5th day of June” becomes “Mc8amot5doJ.”

DUMB 10 > Ignore the need for a backup and recovery plan:


Even if you follow all these suggestions, an attacker may crash your system or your data may be corrupted or get wiped out by a hardware problem. That’s why it’s essential that you always back up your important information and have a plan for recovering from a system failure.
Most computer users know they should back up, but many never get around to it. Or they make an initial backup but don’t update it regularly. Use the built-in Windows backup program (Ntbackup.exe in Windows NT, 2000, and XP) or a third-party backup program and schedule backups to occur automatically. Store backed up data on a network server or removable drive in a location away from the computer itself, in case of a natural disaster like flood, fire, or tornado.
Remember that the data is the most important thing on your computer। The operating system can be reinstalled and so can applications, but it may be difficult or impossible to recreate your original data. (See "10 ways to protect your data" for additional suggestions.)

10 dumb things users do that can mess up their computers

DUMB 1 >Plug into the wall without surge protection

Here’s one that actually can physically destroy your computer equipment, as well as the data it holds. You may think your systems are in danger only during an electrical storm, but anything that interrupts the electrical circuit and then starts the current back again can fry your components. Something as simple as someone turning on an appliance that’s plugged into the same circuit (especially a high voltage one such as a hair dryer, electric heater, or air conditioner) can cause a surge, or a surge may be caused by a tree limb touching a power line. If you have a power outage, you may experience a surge when the electricity comes back on.
You can protect your systems against damage from power surges by always using a surge protector, but it’s important to be aware that most cheap surge protectors will survive only a single surge and need to be replaced afterward. An Uninterruptible Power Supply (UPS) is better than a surge protector; it has a battery that keeps power flowing smoothly even when there’s an outage, to give you time to gracefully shut down.

DUMB 2 > Surf the Internet without a firewall


Many home users plug their computers right into their spiffy new cable or DSL modems and hop onto the Internet without realizing that they’re putting themselves at risk from viruses and attackers. Every Internet-connected computer should be protected by a firewall; this can be a firewall built into the broadband modem or router, a separate firewall appliance that sits between the modem/router and the computer, a server at the network’s edge running firewall software, or personal firewall software installed on the computer (such as ICF/Windows Firewall built into Windows XP or a third-party firewall program like Kerio or ZoneAlarm).
One advantage of personal firewalls on laptop computers is that they’re still with you when you take the computer on the road and plug into a hotel’s DSL or cable port or connect to a wireless hotspot. Just having a firewall isn’t enough, though. You must also be sure it’s turned on and configured properly to protect you.

DUMB 3 > Neglect to run or update antivirus and anti-spyware programs

Let’s face it: Antivirus programs can be a royal pain. They’re always blocking some application you want to use, you often have to disable them to install new software, and they have to be updated on a regular basis to do any good. Seems like the subscription is always expiring and prompting you to renew it--for a fee, in many cases. But in today’s environment, you can’t afford to go without virus protection. The malicious programs that AV software detects--viruses, Trojans, worms, etc.--can not only wreak havoc on your system but can spread via your computer to the rest of the network. In extreme cases, they can bring down the whole network.
Spyware is another growing threat; these are programs that install themselves on your computer (usually without your knowledge) and collect information from your system that is then sent back to the spyware program’s author or vendor. Antivirus programs often don’t address spyware so it’s important to run a dedicated spyware detection and removal program.

DUMB 4 >Install and uninstall lots of programs, especially betas

You like to be on the cutting edge, so you often install and try out new software. Beta programs are usually free and give you a chance to sample neat new features before most people. There are also many freeware and shareware programs made available as Internet downloads by their authors. We know you’d never do it, but some users even install pirated software or “warez.”
The more programs you install, the more likely you are to run across ones that either include malicious code or that are poorly written and cause your system to behave improperly or crash. The risk is greater with pirated programs.
Even if you install only licensed, final-release commercial software, too many installations and uninstallations can gunk up the registry. Not all uninstall routines completely remove program remnants and at the least, this practice can cause your system to slow down over time.
You should install only the programs that you really need, stick with legitimate software, and try to minimize the number you install and uninstall.

DUMB 5 > Keep disks full and fragmented

One of the results of installing and uninstalling lots of programs (or adding and deleting data of any kind) is that it fragments your disk. Disk fragmentation occurs because of the way information is stored on the disk: On a new, clean disk, when you save a file it’s stored in contiguous sections called clusters. If you delete a file that takes up, for example, five clusters, and then save a new file that takes eight clusters, the first five clusters’ worth of data will be saved in the empty space left by the deletion and the remaining three will be saved in the next empty spaces. That makes the file fragmented, or divided. To access that file, then, the disk’s read heads won’t find all the parts of the file together but must go to different locations on the disk to retrieve it all. That makes it slower to access. If the file is part of a program, the program will run more slowly. A badly fragmented disk will slow down to a crawl.
You can use the disk defragmenter built into Windows (Programs Accessories System Tools) or a third-party defrag program to rearrange these pieces of files so that they’re placed contiguously on the disk.
Another common cause of performance problems and application misbehavior is a disk that’s too full. Many programs create temporary files and need extra free space on the disk to operate. You can use Windows XP’s Disk Cleanup Tool or a third-party program to find and delete rarely used files, or you can manually delete files to clear space on your disk.

DUMB 6 >Open all attachments

Some folks just can’t help themselves: Getting an e-mail message with an attachment is like getting an unexpected gift. You just have to peek inside to see what it is. But just as that package left on your doorstep could contain a bomb, that file attached to your mail message could contain code that will delete your documents or system folder or send viruses to everyone in your address book.
The most blatantly dangerous attachments are executable files--those that run code--with extensions like .exe, .cmd, and many others (see http://antivirus.about.com/od/securitytips/a/fileextview.htm for a list of file extensions for different types of executables). Files that aren’t themselves executables, such as Word .doc files and Excel .xls files, can contain embedded macros. Scripts (Visual Basic, JavaScript, Flash, etc.) aren’t directly executed by the computer but are run by other programs.
It used to be that you could assume plain text (.txt) or graphics (.gif, .jpg, .bmp) files were safe, but not anymore. File extensions can be “spoofed”; attackers take advantage of the Windows default setting that doesn’t display common file extensions to name executables something like greatfile.jpg.exe. With the real extension hidden, it shows up as greatfile.jpg. So the recipient thinks it’s a graphic, but it’s actually a malicious program.

You should open attachments only when they’re from trusted sources and only when you’re expecting them. Even if the mail with the attachment appears to come from someone you trust, it’s possible that someone spoofed their address or that their computer is infected with a virus that sent the attachment to you without their knowledge.

DUMB 7 > Click on everything

Opening attachments isn’t the only type of mouse click that can get you in trouble. Clicking on hyperlinks in e-mail messages or on Web pages can take you to Web sites that have embedded ActiveX controls or scripts that can perform all sorts of malicious activities, from wiping your hard disk to installing a backdoor program on your computer that a hacker can use to get in and take control of it.
Clicking the wrong link can also take you to inappropriate Web sites that feature pornography, pirated music or software, or other content that can get you in trouble if you’re using a computer on the job or even get you in trouble with the law.
Don’t give in to “click mania.” Think before you click a link. Links can also be disguised in “phishing” messages or on Web sites to appear to take you to a different site from the ones they really point to. For example, the link might say www.safesite.com, but it actually takes you to www.gotcha.com. You can often find out the real URL by hovering over the link without clicking it.

DUMB 8 >Share and share alike

Your mother taught you that it’s nice to share, but when you’re on a network, sharing can expose you to dangers. If you have file and printer sharing enabled, others can remotely connect to your computer and access your data. Even if you haven’t created any shared folders, by default Windows systems have hidden “administrative” shares for the root of each drive. A savvy hacker may be able to use these shares to get in. One way to prevent that is to turn off file and printer sharing--if you don’t need to make any of the files on your computer accessible across the network. This is especially a good idea if you’re connecting your laptop to a public wireless hotspot. You can find instructions on how to do so at http://www.pcmag.com/article2/0,1895,1277222,00.asp.
If you do need to make shared folders accessible, it’s important that they be protected by both share-level permissions and file-level (NTFS) permissions. Also ensure that your account and the local administrative account have strong passwords.

DUMB 9 > Pick the wrong passwords:


That brings us to another common mistake that can expose you to attacks: picking the wrong password. Even if you don’t belong to a network where the administrator forces you to select strong passwords and change them regularly, you should do so. Don’t pick passwords that are easy to guess, such as your birthdate, loved one’s name, social security number, etc. Longer passwords are harder to crack, so make your password at least eight characters long; 14 is even better. Popular password-cracking methods use "dictionary" attacks so don’t use words that are in the dictionary. Passwords should contain a combination of alpha, numeric, and symbol characters for best security.
A long string of nonsense characters may create a password that’s tough to crack, but if you can’t remember it, you’ll defeat the purpose by writing it down (where an intruder may be able to find it). Instead, create a phrase you can remember easily and use the first letters of each word, along with logical numbers and symbols. For example: “My cat ate a mouse on the 5th day of June” becomes “Mc8amot5doJ.”

DUMB 10 > Ignore the need for a backup and recovery plan:


Even if you follow all these suggestions, an attacker may crash your system or your data may be corrupted or get wiped out by a hardware problem. That’s why it’s essential that you always back up your important information and have a plan for recovering from a system failure.
Most computer users know they should back up, but many never get around to it. Or they make an initial backup but don’t update it regularly. Use the built-in Windows backup program (Ntbackup.exe in Windows NT, 2000, and XP) or a third-party backup program and schedule backups to occur automatically. Store backed up data on a network server or removable drive in a location away from the computer itself, in case of a natural disaster like flood, fire, or tornado.
Remember that the data is the most important thing on your computer। The operating system can be reinstalled and so can applications, but it may be difficult or impossible to recreate your original data. (See "10 ways to protect your data" for additional suggestions.)