Q&A - 2020
PDF versions of the PowerPoint presentations, audio recordings of the associated discussions, and copies of the comments made in the Chat window, from the weekly Q&A sessions held in 2020, plus highlights from sessions held early in the year as part of the club’s monthly meetings, are available in the following listings. Note that the individual sessions are listed in reverse chronological order.
December 30, 2020Follow-up – Disk Alphabet SoupFollow-up – BrowserMetrics Eating Storage Share – Dictation in Windows 10 Ask – What’s the best video-conferencing device for an aged parent? Ask – Laptop camera not attached Ask – What’s the status of the Secunia PSI "clone"? Ask – How do I make CD/DVD’s play automatically? Share – How to get a refund from the Google Play Store Ask – Windows Backup Fails Ask – How do I reliably test Internet speed? Share – Android app as hearing aid |
20201230_PowerPoint.pdf (1.08 MB)
|
December 23, 2020Follow-up – Wi-Fi donglesFollow-up – SmartApp – Gboard Share – Escape Voicemail Hell Ask – Mixed-up screen display Ask – Grey Zones in Windows 10 Ask – Electronic signatures in Word Ask – What is Windows Core? Share – "No" Free Space on Android Ask – How do I kill an unwanted mail folder? Ask – Screen orientation shortcut |
20201223_PowerPoint.pdf (1.4 MB)
20201223_DiskPartitioning.pdf (1.1 MB)
|
December 16, 2020Follow-up – How to digitize filmShare – Microsoft class action settlement Share – Q&A Recordings Share – dafont.com Share – Gboard – The Google Keyboard Share – Voting software & blockchain Share – Updating software Ask – How do I use Gmail’s Labels? Ask – Video sound in video conferences Ask – Should I upgrade Windows 8.1 to 10? |
20201216_PowerPoint.pdf (2.94 MB)
20201216_Gmail_Labels.mp4 (3.6 MB)
|
December 9, 2020Follow-up – Microsoft Office AlternativesBroken wireless card SmartApp – KeePassDroid SmartApp – Cache Cleaner SmartApp – Opinion Rewards Tweaking Chrome – Clear Chrome’s Cache, Run Chrome Incognito Fix Your Microsoft Account |
20201209_PowerPoint.pdf (751 KB)
|
December 2, 2020SmartApp – Changing Icons on an Android SmartphoneKeeping a drive alive MS Office Alternative? Can you be attacked by opening an E-mail message? How safe is your digital doorbell? How do I use Messenger.com? |
20201202_PowerPoint.pdf (2.9 MB)
|
November 25, 2020Android vs. Linux: What’s the difference?SmartApps: To Do Reminder The Camelizer: Save money at Amazon Photo editing basics: How to easily get started with photo editing Google Play Store – Install button greyed out What is a reasonable speed and price for Internet access? |
20201125_PowerPoint.pdf (1.1 MB)
20201125_PhotoEditorFeatures.pdf (672 KB)
|
November 18, 2020Follow-up – Computers at WarIt's 10 pm – Do you know where your files are? Part 1: Backup and Indexing Creating E-cards Editing and organizing digital photos Bug Tracking – Gimp 2.10.22 |
20201118_PowerPoint.pdf (1.72 MB)
|
November 11, 2020The ultimate guide to saving disk space – Follow-upIt’s 10 pm – Do you know where your files are? Part 1: File and Folder Management Controlled Folder Access My computer did not update to Standard Time The "Power" icon disappeared from my Taskbar |
20201111_PowerPoint.pdf (1.9 MB)
|
November 4, 2020Problem with FTP connection to web serverThe ultimate guide to saving disk space Desperately Seeking Disk Space Even More Space-Saving Options Using a smartphone to call an elevator Complain using the Windows Feedback Hub! How do I choose security software? |
20201104_PowerPoint.pdf (1.2 MB)
20201104_DiskSpace.pdf (1,1 MB)
|
October 28, 2020Shares wantedExporting Android’s contact file is incomplete What can I do with a digital helper such as Amazon Alexa or Google Assistant? Ransomware protection in Windows Defender What charging protocol is best to preserve laptop battery life? Trouble taking pictures with a cell phone in bright sunlight Problem with Total Commander’s FTP client Chat/audio files – How to Install Hyper-V in Windows 10? Chat/audio files – Why is Cortana not available in the app store? Chat/audio files – Green shield with a checkmark in the Zoom window Windows 10 – Fall feature update |
20201028_PowerPoint.pdf (2.33 MB)
|
October 21, 2020Index to Q&A TopicsLove Bug Virus Windows 10 Version 20H2 Effectiveness of AV software on Android OS at EOL Resolution, quality, and size of JPG image files What can I do with a Chromebook that is at EOL? Windows 10 – Account profile image Ontario’s Digital Identity Project (digital wallet) Windows 10 – Waking up dual monitors Chat/audio files – USB adapters for multiple monitors Chat/audio files – Stolen passwords Chat/audio files – Amazon Alexa / Google Assistant |
20201021_PowerPoint.pdf (1.82 MB)
|
October 14, 2020Hard Drive Speed UpHistory of Adobe Local repair shops Adobe Flash Player Blackberry Passport Clipart (favpng.com) Microsoft Outlook – Delete folders |
20201014_PowerPoint.pdf (1.45 MB)
|
October 7, 2020Microsoft Office blocked files"Rescue" account Windows 10 Installation The KGB, The Computer and Me (Clifford Stoll) If Microsoft Outlook is installed will that effect my Sympatico E-mail? Windows 10 – Choose default apps by file type EaseUS Todo Backup – Permission to make changes Send a folder of files with password protection Slow access on hard drive |
20201007_PowerPoint.pdf (1.5 MB)
|
September 30, 2020Naked Security (Sophos video)Windows 10 – Ancient Updates Control software for Microsoft LifeCam NX-6000 The Dark Web Ransomware Android phone – Free up memory Should I use a search engine other than Google to avoid being tracked? How do I sync my Android phone with my computer? Google Chrome pauses sync each time I start the program Windows 10 – Distinguish a Wi-Fi enabled computer as a desktop or a mobile device Draft photo book on my Android phone about to expire E-transfer frauds |
20200930_PowerPoint.pdf (2.5 MB)
|
September 23, 2020Email CleanupWindows Backup Drive Space Microsoft Office Problem Files Blocked Files Alternate Data Streams Difference between AMD and Intel CPU’s KeePass – Upgrade to new version What cable do I need to make an Ethernet connection to my router? Keynote Address at CIRA AGM Cyber-security Guru Bruce Schneier) How do I protect my new smart fridge? |
20200923_PowerPoint.pdf (1.63 MB)
|
September 16, 2020Gaming ComputerHow can I change a monitor’s colour balance? Switching ISP’s – A Progress Report Microsoft Outlook – Access through webmail and an E-mail client WordPerfect – Accessing old files Multiple backups – Best management practices Windows backup – Folder is empty Microsoft Office 2010 – Multiple languages for spelling and grammar checks Windows 10 – Do minor updates and bug fixes occur in the background or on startup? Adding a second SSD and mirroring an existing SSD |
20200916_PowerPoint.pdf (1.46 MB)
|
September 9, 2020PowerToys – New Feature – Video Conference Mute (Additional PDF file)Windows Calculator Windows 10 – Fix for defragging SSD’s Defragging and TRIM Disaster Recovery (Additional PDF file) Recommendation for an "All-in-One" printer compatible with Ubuntu Linux Recommendation for an Ottawa computer technician with experience with Ubuntu Linux Can a personal webspace be set up in Google Drive? |
20200909_PowerPoint.pdf (2.34 MB)
20200909_PowerToysVideoConfMute.pdf (877 KB)
20200909_DisasterReovery.pdf (1.2 MB)
|
September 2, 2020Asus Transformer T100 – USB Selection BiasWindows Clone – Linuxfx/Winfx 10 Windows 10 – Restore points JavaScript – Scanner for vulnerabilities Can malicious code be embedded in PNG files? Bitdefender Premium VPN Recommendation for a Linux distro |
20200902_PowerPoint.pdf (906 KB)
|
August 26, 2020Q&A RecordingsE-mail addresses in Gmail Immersive Reader in Edge Dell laptop – No video input Mutiple cores and hyperthreading Weather Network App – Error creating the configuration file Asus TUF A15 Gaming PC – Wacom Graphire2, USB-C dock, HDMI problems Asus Transformer T100 – Fails to recognize certain USB drives Logitech Spotlight (Additional PDF file) |
20200826_PowerPoint.pdf (1.27 MB)
20200826_LogitechSpotlight.pdf (786 KB)
|
August 19, 2020Windows 10 Version 2004Which E-mail provider is best and why? Which Internet Service Provider (ISP) do you use? Do you receive your TV signal over-the-air (OTA) and/or do you use a streaming service? Windows Spotlight – Disable random images Gmail and Windows Live Mail – Delete incorrect address What causes a message to go to the Drafts or Outbox folder on my phone? Windows 10 – Update & Shut down / Update & Restart Google Docs (Additional PDF file) |
20200819_PowerPoint.pdf (876 KB)
20200819_GoogleDocs.pdf (740 KB)
|
August 12, 2020Google – Privacy CheckupMicrosoft Teams COVID Alert App Caps Lock Key – Disable Headset/microphone for video-conferencing Changing ISP – Switching E-mail account Data cap – Warning message How do I turn off data on a Samsung phone? Microsoft Outlook – Can’t access my contact list Google Drive follow-up (Additional PDF file) |
20200812_PowerPoint.pdf (854 KB)
20200812_GoogleDrive.pdf (1.09 MB)
|
August 5, 2020Finding licence keys – Magic Jelly BeanPowerToys VPN’s – SANS Institute How do I uninstall a program that won’t uninstall? Replacement laptop battery Microsoft Office 2010 – End of support Microsoft OneDrive – Free up disk space Microsoft OneDrive – Deleting folders Daily Information Security Podcast (SANS StormCast) Microsoft Teams Windows 10 – Microsoft account problem PC Optimum card Google Account – Complete your privacy checkup Microsoft Outlook – Your Outlook settings are out of date |
20200805_PowerPoint.pdf (678 KB)
|
July 29, 2020E-Waste – Salvation ArmyPop-up Ad for McAfee How do you list installed apps? Microsoft Family Safety App Mozilla VPN Secondary administrator account What is needed for a gaming computer? Tech Café – Ottawa Public Library Webinars Old computer looking for a good home – Commodore 8032 GIMP – Simple & Complex (Additional PDF file) |
20200729_PowerPoint.pdf (692 KB)
|
July 22, 2020Copying image files – ROBOCOPYLocating folders with image files – ROBOCOPY, DIR, PowerShell PowerShell VPN’s and privacy Run program as Administrator Network Traffic Data usage – Properties – Wireless setting – Random Hardware Addresses TeamViewer alternative WordPerfect X5 Skype Archiving digital material Digital legacy – executors, trustees D Link Dir 859 Router EaseUS Todo Backup Home – Recovery drive |
20200722_PowerPoint.pdf (1.20 MB)
|
July 15, 2020Copying image files with xcopyUsing Internet Explorer BitLocker PowerToys – Image Resizer Handbrake – Video Converter Windows 10 – System resets, upgrades and tweaks Skype Recycling programme / E-waste |
20200715_PowerPoint.pdf (1.47 MB)
|
July 8, 2020Fancy ZonesFaxing with Windows 7 Windows Defender – Pop-up ads Microsoft Edge – Benefits Microsoft Edge – Continue running background apps Windows 10 – Forced shut down Restore points vs. sfc /scannow Windows 10 – BitLocker Copy all files – For-in-do command, Windows Explorer, Everything Avast Anti-Virus Software |
20200708_PowerPoint.pdf (1.24 MB)
|
Prior to July, 2020 Q&A sessions were held monthly as part of the club's regular meetings. The highlights of these sessions are posted below:
Always show file extensions
by Chris Taylor (03-Jun-2020)
Since Windows 95, file extensions for registered file types are hidden by default. This can affect hundreds of file types, such as Word documents (*.docx), PDF files (*.pdf) and programs (*.exe). This can be a security issue. For example, let’s say someone sends you a file, or you download a file, that is displayed in File Explorer as SecurityAlert.pdf.
Is this truly a PDF file? Well, probably not if you are using the default settings for File Explorer. The registered file type PDF should have been hidden and the file displayed as “SecurityAlert“, i.e. without the .PDF. And, don’t be fooled by the icon for Adobe Reader – it’s trivially easy to add any icon to an executable file.
The file may actually be named SecurityAlert.pdf.exe. This is an executable file, a computer program, that may well be malware intended to do some form of harm to your system.
The problem is that, by default, Windows 10 hides the true extension (.exe) of the file. The double extension, i.e. the inclusion of .pdf in addition to .exe, is being used to trick unwary users into believing that the file is of a different type than it actually is.
To prevent any confusion, the default settings for File Explorer should be changed so that the extension of each file is always displayed. To do this, open File Explorer, select the View tab (1 below), and check the box marked File name extensions (2 below). The full file name is then displayed as “SecurityAlert.pdf.exe” (3 below).
Note that in the second screenshot, the full file name is displayed as “SecurityAlert.pdf.exe”. This tells you two things at a glance:
(1) The file is a program, not a document.
(2) Someone is trying to trick you into believing their malicious program is a harmless Adobe Reader document. The fact that they went to the trouble to add the icon for Adobe Reader to their program gives further confirmation that they are trying to trick you.
I am in the process of looking for a new laptop. I have not been a fan of Apple products, nor am I a gamer. How shall I determine my requirements such as the type of hardware, screen size, processor speed, storage capacity, and sound quality? Do I look for an external camera and a DVD/CD player?
by Chris Taylor (27-May-2020)
There are almost as many answers as people wanting to buy laptops! However, some items to consider are:
- Start with your budget and see what you can get for that
- Decide the screen size you want
- If your budget allows, go for a Core-i5 7th gen or later, or an AMD Ryzen 5 or better
- A minimum of 8 GB RAM
- 1 TB storage (HDD) or, if your budget allows 512 GB SSD
- Keep in mind the number of USB ports you want (Type-A or Type-C)
- All laptops (should) have a webcam
- Do you really need a CD/DVD? That will limit choices severely. You can always get a portable unit for under $30.
- Shop the sales; two seemingly equal computers can differ by $500!
[Editor’s Note: And, when OPL restore their series of information sessions (https://opcug.ca/opl-presentations/), look for Chris’s comprehensive discussion on How to Buy a PC.]
[Don't] Pay As You Go!
by Alan German (29-Apr-2020)
WhatsApp provides free text, telephone calls, and video chats but only on a WhatsApp-to-WhatsApp connection (however, this includes international contacts). The app is smart enough to display only those in your list of contacts who are also subscribed to WhatsApp. Sending a text message provides the ability to attach photos, videos, documents, and even voice messages.
A quick look at VPNs
by Chris Taylor (29-Apr-2020)
At the 2020-04-29 Q&A session, I presented some quick thoughts on VPNs.
VPN stands for “Virtual Private Network”. When you enable a VPN service, all your network traffic is encrypted and sent directly to the VPN server, which can be located anywhere in the world. Most companies running VPN services have VPN servers dispersed around the world and you can choose which to use. Once your traffic hits the VPN server, it is decrypted and sent on to your intended destination. To the destination (your bank, Facebook, Netflix, etc.), your traffic appears to be coming from the VPN server. When traffic comes back from that destination, it comes into the VPN server, gets encrypted and forwarded on to your computer where it is decrypted by the VPN service running on your computer.
Without a VPN, if you are at a coffee shop, anyone on the WiFi at the same location can sniff the traffic if it is not already encrypted (such as when browsing using http:// rather than https://…) The destination servers see your traffic as originating wherever the WiFi router is, i.e. in Canada.
With a VPN, your traffic follows the green path. All network traffic is encrypted between your computer and the VPN server and travels in so-called “encrypted tunnels”. All destination servers see your traffic as originating in the location (i.e. the country) of the VPN server.
Good aspects of VPNs
- You can evade geoblocking, where a service is unavailable because of (for example) your country of origin. If you use a VPN server that is located in a different country, your traffic appears to originate there.
- While on a WiFi connection, your traffic cannot be sniffed by others on the same WiFi.
- If your ISP is blocking access to sites that they feel are objectionable, or if they are throttling certain types of traffic, a VPN can get around this because the ISP cannot determine the sites you are visiting, the type of traffic, or the protocols you are using.
Bad aspects of VPNs
- You could have a false sense of security if you think VPNs do anything more than they actually do.
- You have to trust your VPN provider. They have access to all the information that flows between you and all the destinations you connect to other than traffic that is encrypted separately (for example if you connect to an https:// web site). They do know all the sites you visit.
- Generally, a VPN service will cost money. There are some VPN services that will give you some VPN for free (TunnelBear – https://www.tunnelbear.com/ – will give you 500MB per month for free.) You can also use the Opera browser which will allow you to toggle free VPN-like services while browsing.
- A VPN might slow your access. All your traffic is being routed through the VPN server and if it is congested, everything could bog down.
- If you switch back and forth from the VPN being on and off, it can cause some services (Gmail is one of them) to think your account has been hacked, since you appear to be coming from Ottawa one minute and from Paris the next. They may lock your account.
- There are countries where using a VPN, other than one that is sanctioned by the state, is illegal. This includes countries such as China, Russia, Iran, UAE, and Iraq. If you take your laptop on a trip outside of Canada, check to make sure you won’t end up in jail and/or paying a hefty fine!
Take Control with Quick Assist
by Chris Taylor and Alan German (08-Apr-2020)
Does someone you know need help with their computer but is some distance away such that it’s not convenient to travel in order to physically access their machine? What you need is remote-control software. Fortunately, one such package is built into Windows 10. Meet Quick Assist – remote-control software that will let you see their screen, control their mouse and keyboard, and provide the ability for you to fix their problems, or show them how to accomplish tasks. All this without you needing to be at their location.
Both of you need to run the program. Navigate to Start – Windows Accessories – Quick Assist, or simply type Quick into the search box. Running the Quick Assist app will display a dialogue box (see screenshot). On your computer, press the blue Assist another person button. You will now need to sign in with a Microsoft account. For most people, the userid and password you use to login to Windows is a Microsoft Account. The person you are assisting does not need a Microsoft Account.
The system now displays a one-time, six-digit security code (which will expire in ten minutes). Provide this code to the person you are assisting, for example, by telephone or E-mail. They now enter this code into their Quick Assist box labeled Code from assistant and press the Share screen button.
A dialogue box now offers you the choice to Take full control or View screen. Full control is the default option. Press Continue. A new dialogue box is now displayed on the other person’s screen saying Select Allow to let view your screen during this session. The person you are assisting presses Allow.
The Quick Assist window on your computer now displays the other person’s desktop. Any mouse actions or keystrokes you make are replicated to the other computer. You can launch programs from the desktop icons, open the Start menu, change settings, install software, or do just about anything else on the remote computer. There is an option for annotation with which you can draw lines and circles to bring attention to the location of some feature on the desktop. Other options include selecting the screen if the other person has multiple monitors, screen scaling, and pausing screen sharing (if the person getting assistance needs to type or display something sensitive).
You, or the person you are assisting, can stop the remote session at any time by simply closing the Quick Assist window.
Freeing up More Disk Space
by Alan German and Chris Taylor (08-Jan-2020)
We have seen previously how to reclaim disk space by tweaking access to the Recycle Bin using the Disk Cleanup utility, and how to use a utility such as TreeSize Free to check what is hogging the available disk space.
The latter came in useful recently, when Windows was issuing a disk-full error. Running TreeSize Free, and selecting Drive C: to be scanned, allowed the identification of a number of large folders that were redundant. These included a 4.7 GB folder, plus a number of associated smaller folders, that were left over after uninstalling Android Studio.
Another oddball entry in the list of folders was found in the Users/toaster/AppData/Local/ directory (where “toaster” is my user name on the computer). Here, a folder named VirtualStore contained a sub-folder named XnView that was using almost a quarter of a gigabyte of disk space. This was yet another redundant folder left after uninstalling the XnView image manager.
Once identified, such redundant folders were easily removed by right-clicking on the folder name and selecting the Delete option in the context menu. It should be noted, however, that when running TreeSize Free as a regular user, the resulting disk space is not reclaimed until the computer is rebooted. To have files deleted immediately, use Shift-Delete.
Another utility that can be used to recover disk space is CCleaner. It can remove a lot of useless files. But be careful! It can also remove some really useful stuff such as saved passwords, browser history, and taskbar jump lists.
The safest way to use CCleaner is to click on Custom Clean in the left panel.
On the Windows tab, select only:
- Microsoft Edge: Internet cache
- Internet Explorer: Temporary Internet Files, and Index.dat files
- System: Memory Dumps, and Chkdsk File Fragments
On the Applications tab, select only:
- Internet Cache and Compact Databases for every browser listed
Review the list of all that CCleaner can remove and if you are sure you don’t need some category listed, select it.
Then click the Analyze button. Once the analysis completes, review what CCleaner says it will remove and, if you are happy with the list, click the Run Cleaner button.
Finally, we recommend that nobody use the CCleaner option for Registry Cleaner. If you don’t believe us, read: https://decentsecurity.com/registry-cleaners/