Saturday, January 31, 2009
Friday, January 30, 2009
ISP Sellersburg radio moving to Versailles
ISP is closing 12 of their 18 radio dispatch centers across the state. Those operations will be moved to six regional dispatch centers. The Sellersburg radio operations will be moved about 75 miles away to the Versailles post.
Read the full article
Wednesday, January 28, 2009
Indiana Weather
Space Shuttle Challenger disaster January 28, 1986
The Space Shuttle Challenger disaster occurred on January 28, 1986 when Challenger, a Space Shuttle operated by NASA, consisting of the Challenger Orbiter, designated OV-099, an External Tank containing liquid hydrogen fuel and liquid oxygen oxidizer, and two Solid Rocket Boosters, broke apart 73 seconds into its flight leading to the deaths of its seven crew members. The spacecraft disintegrated over the Atlantic Ocean, off the coast of central Florida, United States at 11:39 a.m. EST. Disintegration of the shuttle stack began 73 seconds into its flight.
Read More
Saturday, January 24, 2009
1984 – January 24th
The first Apple Macintosh, today known as the Macintosh 128K, went on sale, becoming the first commercially successful personal computer to feature a mouse and a graphical user interface rather than a command line interface.
Below was my 1st computer in January 1981
The Sinclair ZX81 was a home computer released in 1981 by Sinclair Research. It was the follow-up to the Sinclair ZX80.
The machine's distinctive appearance was the work of industrial designer Rick Dickinson. Video output, as in the ZX80, was to a television set, and saving and loading programs was via an ordinary home audio tape recorder to audio cassette. Like its predecessor it used a membrane keyboard.
Timex Corporation manufactured kits as well as assembled machines for Sinclair Research. In the United States a version with double the RAM and an NTSC television standard was marketed as the Timex Sinclair 1000.
Below was my 1st computer in January 1981
The Sinclair ZX81 was a home computer released in 1981 by Sinclair Research. It was the follow-up to the Sinclair ZX80.
The machine's distinctive appearance was the work of industrial designer Rick Dickinson. Video output, as in the ZX80, was to a television set, and saving and loading programs was via an ordinary home audio tape recorder to audio cassette. Like its predecessor it used a membrane keyboard.
Timex Corporation manufactured kits as well as assembled machines for Sinclair Research. In the United States a version with double the RAM and an NTSC television standard was marketed as the Timex Sinclair 1000.
Wednesday, January 21, 2009
Joy of a new computer
After two years of use every day my notebook computer was getting old. You see although working perfect and as fast as ever it is no longer state of art. Computers age faster than dogs. A look at all the usual online stores revealed no bargains so off to Madison for some brick and mortar shopping. My first stop was Wal-Mart, then Staples. Several nice laptops were in stock and on display but no deals. I did see one that fit my needs but somewhat higher in price than what I had in mind. I was there and you know the feeling I'm sure, I bought it. After telling the sales people twenty times over and over, I do not want the extended warranty or the famous Norton internet security software I made it out the door. Arriving home the fun began transferring files from the old computer to the new one. But first I uninstalled all the pork software. This took about an hour. Why do they load all that garbage on them? When moving files in the past I have done it with CDs or DVDs but this time I used a two gigabite thumb drive. First was to export the address book, then the saved emails. The emails were just forwarded with the email programs in the two computers via the internet. This worked well but a large amount of time was used up to complete this process. Now the "My Documents" folder and wow, I had saved tons of stuff in this folder. All the sub-folders that contained the photos and videos also. I have also a "Keep Me" folder that I stick downloaded programs and other files In. All of this took approximately 16 hours. Now to wipe out the data on the old laptop. I made the restore DVDs when the computer was new (no one else does this) so I popped the first one in turned the computer off then back on. The restore process started as it should and continued for about two hours. When it told me it was finished I restarted the computer. The first screen displayed and it looked like all was well. Now don't do as I do - Do as I say. Don't turn it off. The reason I turned it off was I want to sell it, therefore I wanted the new owner to enter all of their information into it. Big mistake, It crashed on the restart. So two hours of another reload job. I put the user name ln as "user" set the time, and bypassed all the things I could. Now it is for sale to a good home. The moral of this story is allow many many hours to move all the things stored on the old and into the new....... good luck !
Monday, January 19, 2009
Tokyo Rose
1977 – Iva Toguri, allegedly a Tokyo Rose, a generic name given by Allied forces during World War II to approximately twenty English-speaking female broadcasters of Japanese propaganda, was granted a full pardon by U.S. President Gerald Ford. Read more
Sunday, January 18, 2009
Skype
I just finished using a program called Skype to talk to an old friend that now lives in Japan. The call was free because he was using Skype on his computer also. It is a great way to save money on your regular phone or cell phone. You can call cell phones or regular land line phones at a very low rate. You will need a microphone and earphone to use Skype, so visit about any computer or electronic store to pick these up if you don't have them. You do need a fast connection. I don't think dial up would cut it. Read more and download Skype from here:
http://www.skype.com/download/skype/windows/
http://www.skype.com/download/skype/windows/
Thursday, January 15, 2009
Antivirus 2009 - Malware
I have Norton Internet security, yet my computer has been infected with the Antivirus 2009 program. How can this happen and how do I get rid of it? – Glenn
Your question underscores an often mistaken mindset of many computer users: “If I have security software in place, I shouldn’t get any infections.” Nothing could be further from reality.
Anti-virus/anti-spyware programs as well as firewalls are of no protection if the user of the computer decides to click on links that generate malicious code or download and run questionable files.
The user’s interactions can easily override the installed protection and in some cases, actually disable your protection programs, but make it look like they are still running.
The fake anti-virus program scams actually started last year as “Antivirus 2008? and it was so successful that it lives on as many variations including “Antivirus 2009.” A clever author of malware discovered a sneaky way to fool folks into installing malicious software into their computers, THEN extract money from them by posing as a legitimate program for removing the malicious software.
The reason that this approach has been so successful is that they very closely mimic Windows warning screens and legitimate antivirus programs. Virtually every legitimate antivirus company has a product called Antivirus 2009, which further confuses the uninitiated.
The most common ways to come in contact with this infection include maliciously coded Web sites that popup a warning message that you are infected, e-mail messages that trick folks into clicking on a link, Web sites that claim you need to download software in order to see a posted video and links or downloads that are spread through social networking sites such as MySpace and Facebook as well as all of the Instant Messaging systems.
At this point in time, any form of popup or error message that refers to Antivirus 2008 or 2009 (including System Antivirus, Ultimate Antivirus, Vista Antivirus, Pro Antivirus or XP Antivirus followed by a number) should be considered extremely suspicious.
If you ever see any reference to a virus that is not specifically from the product that you have installed in your computer for protection, you should consider it to be a fake (Windows, itself won’t ever alert you of a virus infection).
In the same token, any Web site that claims that you need to download a new video program or “codec” in order to view a video should be considered a threat.
Users of file sharing networks are at a high risk of contracting malicious software as it’s often hidden within what appears to be a legitimate program (referred to as a Trojan).
The writers of malicious code count on users that are not really paying attention and at this point, they are fooling people by the millions around the Internet. This type of infection is amongst the worst that I have seen in my 20 years of servicing computers.
Getting rid of the code once it has infected your system can be very involved and is different for the various versions of the infections, so don’t attempt this without help if you are a novice.
Start by identifying the exact version of the malware that you have and placing it in quotation marks followed by the words ‘removal instructions’ in Google (Ex: “Antivirus 2009? removal instructions).
WARNING: There are so many people infected with this family of malware that many new scam programs that claim to specifically clean the code have popped up. Some appear to be free programs that will only scan your system for free, but charge you to remove the code and often they don’t even do that properly.
Since there are so many different variations of this infection, the exact steps are going to be based on the exact version of the malware that you have.
In our service business, we use a combination of several manual detection and removal processes (again, based on the exact version of the infection) along with multiple scanning programs to ensure that all potential re-infection avenues (temp files, restore points, modified dll files, etc.) have been removed or restored.
Depending upon how long and which version of the malware you have, you may also need to run a Windows repair after you remove the code as certain Windows files can become corrupted as a side effect.
If you know how to work with the Windows registry, operate in Safe Mode and have a current backup of your critical files, you should be able to find instructions online for removing the exact version of the infection that you have.
If not, consult a tech savvy friend or a professional as removing this infection properly (so that you don’t re-infect) is not for the novice.
Ken Colburn
President of Data Doctors Computer Services, Host of the award-winning Computer Corner radio show, and Author of Computer Q&A in the East Valley Tribune newspapers.
http://www.lockergnome.com/windows/2009/01/14/how-did-i-get-infected-with-antivirus-2009/
Read this post also
Your question underscores an often mistaken mindset of many computer users: “If I have security software in place, I shouldn’t get any infections.” Nothing could be further from reality.
Anti-virus/anti-spyware programs as well as firewalls are of no protection if the user of the computer decides to click on links that generate malicious code or download and run questionable files.
The user’s interactions can easily override the installed protection and in some cases, actually disable your protection programs, but make it look like they are still running.
The fake anti-virus program scams actually started last year as “Antivirus 2008? and it was so successful that it lives on as many variations including “Antivirus 2009.” A clever author of malware discovered a sneaky way to fool folks into installing malicious software into their computers, THEN extract money from them by posing as a legitimate program for removing the malicious software.
The reason that this approach has been so successful is that they very closely mimic Windows warning screens and legitimate antivirus programs. Virtually every legitimate antivirus company has a product called Antivirus 2009, which further confuses the uninitiated.
The most common ways to come in contact with this infection include maliciously coded Web sites that popup a warning message that you are infected, e-mail messages that trick folks into clicking on a link, Web sites that claim you need to download software in order to see a posted video and links or downloads that are spread through social networking sites such as MySpace and Facebook as well as all of the Instant Messaging systems.
At this point in time, any form of popup or error message that refers to Antivirus 2008 or 2009 (including System Antivirus, Ultimate Antivirus, Vista Antivirus, Pro Antivirus or XP Antivirus followed by a number) should be considered extremely suspicious.
If you ever see any reference to a virus that is not specifically from the product that you have installed in your computer for protection, you should consider it to be a fake (Windows, itself won’t ever alert you of a virus infection).
In the same token, any Web site that claims that you need to download a new video program or “codec” in order to view a video should be considered a threat.
Users of file sharing networks are at a high risk of contracting malicious software as it’s often hidden within what appears to be a legitimate program (referred to as a Trojan).
The writers of malicious code count on users that are not really paying attention and at this point, they are fooling people by the millions around the Internet. This type of infection is amongst the worst that I have seen in my 20 years of servicing computers.
Getting rid of the code once it has infected your system can be very involved and is different for the various versions of the infections, so don’t attempt this without help if you are a novice.
Start by identifying the exact version of the malware that you have and placing it in quotation marks followed by the words ‘removal instructions’ in Google (Ex: “Antivirus 2009? removal instructions).
WARNING: There are so many people infected with this family of malware that many new scam programs that claim to specifically clean the code have popped up. Some appear to be free programs that will only scan your system for free, but charge you to remove the code and often they don’t even do that properly.
Since there are so many different variations of this infection, the exact steps are going to be based on the exact version of the malware that you have.
In our service business, we use a combination of several manual detection and removal processes (again, based on the exact version of the infection) along with multiple scanning programs to ensure that all potential re-infection avenues (temp files, restore points, modified dll files, etc.) have been removed or restored.
Depending upon how long and which version of the malware you have, you may also need to run a Windows repair after you remove the code as certain Windows files can become corrupted as a side effect.
If you know how to work with the Windows registry, operate in Safe Mode and have a current backup of your critical files, you should be able to find instructions online for removing the exact version of the infection that you have.
If not, consult a tech savvy friend or a professional as removing this infection properly (so that you don’t re-infect) is not for the novice.
Ken Colburn
President of Data Doctors Computer Services, Host of the award-winning Computer Corner radio show, and Author of Computer Q&A in the East Valley Tribune newspapers.
http://www.lockergnome.com/windows/2009/01/14/how-did-i-get-infected-with-antivirus-2009/
Read this post also
Wednesday, January 14, 2009
VHS 1925 photo
Roger Hyatt of Columbus, Oh. formerly of Versailles has sent a very high res photo of the 1925 senior class of VHS. This photo has the names of the people listed in easy to read print. If you are old enough you will recognize a face or two. See the photo at:
http://wb9otx.com/vhsclass1925.htm
See all the VHS photos at:
http://wb9otx.com/class.htm
Thank you Roger.
http://wb9otx.com/vhsclass1925.htm
See all the VHS photos at:
http://wb9otx.com/class.htm
Thank you Roger.
Wednesday, January 07, 2009
Happy Birthday Elvis Presley January 8th
Elvis Aaron Presley (January 8, 1935 – August 16, 1977; middle name sometimes written Aron)a was an American singer, actor and musician. A cultural icon, he is commonly known simply as "Elvis", and is also sometimes referred to as "The King of Rock 'n' Roll" or "The King".
In 1954, Presley began his career as one of the first performers of rockabilly, an uptempo fusion of country and rhythm and blues with a strong back beat. His novel versions of existing songs, mixing "black" and "white" sounds, made him popular—and controversial as did his uninhibited stage and television performances. He recorded songs in the rock and roll genre, with tracks like "Hound Dog" and "Jailhouse Rock" later embodying the style. Presley had a versatile voice and had unusually wide success encompassing other genres, including gospel, blues, ballads and pop. To date, he has been inducted into four music halls of fame.
In the 1960s, Presley made the majority of his thirty-one movies—mainly poorly reviewed, but financially successful, musicals. In 1968, he returned to live music in a television special, and performed across the U.S., notably in Las Vegas. Throughout his career, he set records for concert attendance, television ratings and recordings sales. He is one of the best-selling and most influential artists in the history of popular music. Health problems, drug dependency and other factors led to his death at age 42.
Read More
from: http://en.wikipedia.org
Monday, January 05, 2009
For Sale
Desktop
2.4 Ghz
512mb ram
cdrom
40gig hard drive
mouse and keyboard
17 inch CRT monitor
Windows XP pro
$200.00 Cash or PayPal
laptop
Dell 1.0 Ghz
512mb ram
20 gig HD
56k modem
ethernet NIC
Windows XP
$100 Cash or PayPal
2.4 Ghz
512mb ram
cdrom
40gig hard drive
mouse and keyboard
17 inch CRT monitor
Windows XP pro
$200.00 Cash or PayPal
laptop
Dell 1.0 Ghz
512mb ram
20 gig HD
56k modem
ethernet NIC
Windows XP
$100 Cash or PayPal
Jan. 5th, 1972 - Nixon orders space shuttle program
The shuttle is the first orbital spacecraft designed for partial reusability. It carries payloads to low Earth orbit, provides crew rotation for the International Space Station (ISS), and performs servicing missions. The orbiter can also recover satellites and other payloads from orbit and return them to Earth. Each Shuttle was designed for a projected lifespan of 100 launches or 10 years' operational life. The man responsible for the design of the STS was Maxime Faget, who had also overseen the Mercury, Gemini and Apollo spacecraft designs. The crucial factor in the size and shape of the Shuttle Orbiter was the requirement that it be able to accommodate the largest planned commercial and classified satellites, and have the cross-range recovery range to meet classified USAF missions requirement for a one-around abort for a polar launch. Factors involved in opting for 'reusable' solid rockets and an expendable fuel tank included the desire of the Pentagon to obtain a high-capacity payload vehicle for satellite deployment, and the desire of the Nixon administration to reduce the costs of space exploration by developing a spacecraft with reusable components.
Read More
from: http://wikipedia.org
Thursday, January 01, 2009
Send tags to our troops for their kids
Help send dog tags to soldiers in Iraq to send to their kids. From a Parent Overseas to a Child at Home. You can help by donating today.
Only $.50 and they accept PayPal.
Read More at:
http://dogtagsforkids.com/
Subscribe to:
Posts (Atom)