Automating with Batch Files

http://nfelica.blogspot.com

If you're familiar with MS-DOS at all, you'll recall that it's a command-driven operating system that performs functions issued at the C:> prompt. The only way to get an MS-DOS computer to do something was to type a command at this prompt and if you can imagine, it was a rather cumbersome way to use a computer.

As an example, to load up Microsoft's simple editing program, you had to type the name of the drive that the program was on, the directory that the program was in, and then the name of the program. So if Microsoft Edit was in a directory or folder named "Process," you could start the program by typing, "C:>process\edit.com" Then, and only then would the program load up for use.

This is a small command, but just imagine if you had a program that was deeply nested within a series of folder. You could end up typing a command as wide as your computer screen or worse, long enough that the entire command would have to wrap onto the next line! Now imagine having to type these long commands every time that you wanted to start a program. Yikes!

That's one of the reasons why batch files became so popular. Batch files are small text-based documents that contain a bunch of these commands on their own lines. When executed, they would process each command without the user having to type each and every one of them.

When Windows was developed, the need for typing commands was essentially eradicated thanks to the introduction of the point-and-click (mouse) interface. But this didn't stop the batch file fever that started under MS-DOS - and in some small circles, batch files are still as popular as they were in the beginning.

Even though you may use Windows XP or Vista, batch files can save you tons of time by automatically starting multiple programs and performing different tasks at the single click of a button. They don't require any extensive programming background and they don't need to be encrypted with some weird, expensive compiler. Batch files are plain text files, and you can build one for your own personal use with Windows' Notepad.

You could make a batch file that loads up your favorite websites at once for example, or you could make a batch file that fills your desktop with the most important applications for the day. To do so only requires a little knowledge about the locations of these applications.

Let's say that every day we need to load up the Yahoo web browser, Microsoft Word, and then the calculator that comes with Windows. Instead of doing this by hand, we could write a batch file to do it for us.

First, we'd load up Notepad and type in the following:

START "http://www.yahoo.com"
START "c:/program files/microsoft office/office/winword.exe"
START "c:/windows/calc.exe"

We would then save this data into a file named, "mytasks.bat" onto the Desktop for easy access. Each time we double-clicked on this file, the Yahoo website would load up, Microsoft Word would start, and the simple calculator would pop up.

Since we want these programs to load every day, we could create a shortcut to this file and then place the shortcut inside our computer's Start Up folder. That way, these three programs would load every time we turn on the computer. If you wanted these programs to start minimized, you could type the following into a batch file instead:

START http://www.yahoo.com /m
START "c:/program files/microsoft office/office/winword.exe" /m
START "c:/windows/calc.exe" /m

This will run all three programs as before, however the "/m" parameter will minimize them so that they don't clutter up the desktop.

Other people have found much more creative and effective ways to use batch files, but the important thing is that you know they're a resource you can use to save a few seconds or minutes in performing important tasks. We've come a long way from MS-DOS, but it's still a valuable source of automation that anyone can use with no programming knowledge at all.

Protecting Your Children


http://nfelica.blogspot.com

It's an unfortunate fact of reality, but children are the most victimized computer users on the Internet today. The good news is that there are some practical steps you can take to protect your children from sexual predators, hackers, and other seedy individuals who want to cause harm. This article will describe a few of them.

The first step in protecting your children at the computer is to prevent their access to  passwords. This will keep them from sharing passwords with others and inadvertently enabling hacking into your system. If you think about it, there's no reason why a five, seven, or even twelve year old needs to know the passwords to sensitive areas on the computer unless you've given them permission! In fact, children don't need to know the password used to access the Internet either. It may be a hassle to type it in each time they want to get online, but it's better to know the times that they connect than to have them sneak online without your permission and knowledge of their activities.

The second step towards protecting your children online is using the computer together. Siting next to your child while he or she peruses the Internet, you can guide him or her to make safe and intelligent decisions. You can approve websites and bookmark them together. You can monitor the conversations your children have with their friends and teach them appropriate online behavior at the same time. You can make recommendations and create a private time for quality time as well.

The third step involves blocking access to inappropriate areas altogether. You and your children may not always agree about what's appropriate, but as a guardian, you're in control and you're ultimately responsible for their safety. Take the time to investigate software tools that put you in control and allow you to block access to certain websites. If you use an online service like AOL (America Online), you can use its internal Parental Control settings to block access to various chatrooms and websites. You could even block instant messaging and email from anyone who isn't a fellow AOL user.

Other tools available online operate similar to the way that AOL's Parental Control settings work, however no collection of tools could replace the reinforcement of mom and dad. Never let your children speak with strangers and never leave them alone at the computer unattended. Children just don't have the experience that adults have and they don't have the skills required to handle inappropriate conversations, emails, or images found online.

NOTE: Some of these tools include kid-specific web browsers that will visit pre-approved websites. Others include browser plug-ins that won't allow access to online areas that contain forbidden keywords.

Another step requires teaching your children to never ever volunteer personal information. Under no circumstances, should children give their personal names, home addresses, phone numbers, or school information to anyone over the Internet regardless of the situation.  In the even this information is required to enter a contest of some sort, be sure that you're the one who makes the decision to supply it and that you're the one who does it.

Performing all of these steps won't be easy. However you can help minimize resistance to your monitoring efforts by explaining why you're taking these precautions. Smaller children will probably enjoy the time you spend together at the computer, but older children and pre-teens may resent it. To help build a case for your concern, you might want to show your older children a few news stories that exemplify the dangers that unsupervised children are exposed to. The newspaper is unfortunately full of examples but with your help, we can reduce them world-wide.

Cell phones, do you really want to be available all the time?

http://nfelica.blogspot.com


Do you really want to be available for anyone and everyone on a 24/7 basis?  What do I mean?  A famous person once said that the more available you make yourself, the more available everyone will expect you to be. People will actually be annoyed if you are not instantly and constantly available rather than being pleased when you do call. People expecting you to be available all the time may be annoying.  Cell phone calls follow you everywhere you are including your bathroom.  Even during nighttime when you want to rest, cell phones continue to ring and annoy you.  If it is important, no problem but if it is very menial, why you need to be bothered so late.

Today in this modern society, we live in and the proliferation of cell phones we see people talking anywhere and everywhere.  If used for business, this may prove to be very effective and worthy.  However, for very menial issues being bothered in your sleep and even during your bathroom time may be quite annoying if not outright disgusting.  However, if you make yourself available all the time, you created your own nightmare.

Cell phone etiquette is getting to be a forgotten concept.  You will see people talking on the phone loudly and disturbs people nearby in restaurants and even in offices.  I am sure by now, once or twice in a meeting you will notice that when a cell phone rings, almost everyone around will immediately look for their cell phones.  If you were the one talking, and then the person in front of you talks on his phone, how would you feel?  I am sure you will feel belittled and ignored.  Rude practice, and should be changed.

It may help people who use cell phones to follow certain degree of etiquette with respect to the use of cell phones specially in places where you may seem rude if you use or even when your cell phone rings.

When you are in a place of worship, it may be necessary to leave your cell phone in the house or at least turn it off if you do not want to be away with it.  This is because ringing cell phone will not just disturb you while you pray it will also disturb others.  You do not need to show off your expensive gadget in a place of worship. 

During meetings, please turn off your cell phone; it is rude to have your phone ringing while somebody speaks.  Disruption may cause problems especially when the meeting tackles extremely important issues.  However, if you are waiting for terribly important call, you may use the vibrate mode of your cell phone to alert you when a call is in-coming and leave the meeting if you need to answer the call.  You may also inform the possible caller that you are in a meeting and that you cannot be disturbed.

When traveling and if you are on-board an aircraft, you will be required to turn off your phone.  This is because electronics devices may interfere with the aircraft’s avionics.  Thus, it is a requirement to turn of your phone for safety reasons.  However, for extremely long flights, airline companies allow cell phone usage at a certain time, if you really need to make a phone call, use this time allotted if necessary.

Cell phone have become to be a necessity nowadays, that is why most people use it and cell phone manufacturers have continuously develop different usage and functions for this very small gadget. Be globally competitive, but you should understand that being rude is not part of modernity.  Follow certain degree of etiquette; this will be very helpful to you and your business.

Accessorizing Computers

http://nfelica.blogspot.com/2014/10/accessorizing-computers.html


Yesterday, we spent about three hours trying to convince a client of ours that brand new computers just don't come equipped with the all things that most computers need in a PC. We tried to convince him that a fully functional computer is one that is personalized with specially selected hardware and software accessories - and that the computer purchased at the store doesn't come with these things. Unfortunately, all of our convincing was to our avail. Our client insisted that he should never need more than what came with his boxed product and that we were just trying "bilk" more money out of him.

As computer consultants, it's our job and mission to make sure our clients are 100% satisfied when they walk out our offices. But our job is unnecessarily made harder when people don't take the time to learn about computer accessories and familiarize themselves with the limitations of store-bought computers. Hopefully by the time you finish reading this article, you'll understand the lesson that we were trying to teach our client: "What comes out of the box is really just a starter kit."

The typical computer package comes with a CPU unit, keyboard, mouse, and speaker set. That may be just fine for some, but most people require more than that especially in today's "connected" society. Today's users require full multimedia capabilities, a wide range of graphics tools, and accommodations for the various portables we now enjoy. These extras aren't included with "what comes out of the box," and the only way to get them is to accessorize.

To illustrate the importance of accessorizing, we like to use the "plain dough" analogy. Let's say that a brand new computer is a batch of plain dough - waiting to be flavored and baked into something useful. If we want to use this dough to make a delicious batch of chocolate chip cookies, we would need to "accessorize" this dough with chocolate chips and a little brown sugar. If we want to use this dough into in a warm loaf of sesame seed bread on the other hand, we'd need to "accessorize" the dough with yeast and sesame seeds.

Like "plain dough," the brand new computer isn't very useful by itself. It needs accessorizing.

Depending on what's needed, accessorizing doesn't need to be expensive.  In fact, you can get away with paying a minimal amount for extra software and hardware if these accessories are for children. It's when these accessories are work requirements or when they're needed to produce works of quality for any other reason that they can become rather expensive. And this expense applies to microphones, digital cameras, PDAs, scanners, video cams, and more.

Regardless of cost, it's important to understand that accessories can become "necessities," and that the best time to get them is the moment you buy a new computer. Waiting too long to accessorize can cause more problems than necessary because while you wait, manufacturers continuously develop new technologies - technologies that your computer won't be able to accommodate in the future. Once you're ready to accessorize, the new products on the market are too advanced for your computer and they just won't work. This is a typical problem experienced by those who want to use hardware designed for Windows Vista on a Windows XP or Windows 2000 machine.

Viruses

What They Are And One Reason Why People Make Them

http://nfelica.blogspot.com/2014/10/viruses.html


Over recent years, computers have become synonymous with viruses and viruses don't show any signs of disappearing any time soon. In recent news, LiveScience.com reported that "Before the month is even done, April has set a record for virus e-mails."1 In the past, we would be comfortable in telling new computer users not to worry about viruses and that catching a computer virus is rare. Today, that would be some of the worst advice we could give anyone. As reported in countless news reports, computer viruses are rampant and they're extremely worrisome. This article will describe what viruses are and then point you in the direction of some rather unique protection and prevention.

In short, a computer virus is a software program designed to destroy or steal data. It attacks computers via distribution - often unknowingly - through email attachments, software downloads, and even some types of advanced web scripting. Viruses that destroy data are known as Trojan horses, viruses that explode their attacks are called bombs, and viruses that duplicate themselves are called worms. Some viruses are a combination of each, however they can be further identified according to where they're located on a computer.

A virus originating from the boot sector of a computer is a boot-sector virus and this nasty devil does its dirty work the moment a computer is turned on. A virus that attaches itself to (infects) other programs is a file virus and activates the moment that an infected program starts. File viruses may also be referred to as parasitic viruses, however should a virus work from both the boot-sector and from an infected program, the virus is then known as a multipartite virus.

Why viruses exist remains a mystery, however we had privy access to the mind behind a virus programmer who explained his motivation behind his destructive inclinations. Apparently, this person had a deep grudge against a popular online service which shall remain unnamed. In this hacker's mind, the online service failed to do a quality job in protecting children from online smut and as retaliation, he created and distributed a virus to as many file libraries of this service as he could. His intentions were to disable the computers of the online service's users so much that they wouldn't be able to connect for days. In his mind, the loss of connection meant loss of revenue for the online service.

Although the malicious code that this person generated may have worked for a small percentage of users, sufficed to say, the online service continued on and still exists today. Despite his motivation or intention, his efforts were null.

We wouldn't be surprised to learn if other motivations behind spreading viruses were similar to this person's, but that doesn't justify the damage that viruses do. Innocent people become pawns for the evil plans of others who've convinced themselves they're doing the "right" thing.

To protect a computer from getting a virus, or clean a virus from a computer system once infected requires the use of an antivirus utility. But may be something else we can do. Perhaps we could make an effort to educate the people who want put viruses into the public about ways to display dissatisfaction with a service or product that don't involve harming innocent parties. In doing so, we just might reduce the number of virus news stories and protect our own investments at the same time.

Audiovox cellular phone accessory

http://nfelica.blogspot.com/2014/10/audiovox-cellular-phone-accessory.html


Cellular phones have become one of the most functional modern day gadgets. It has evolved from being a luxurious toy for young professional into a necessity for the multi dimensional life of these young professionals. However, cellular phones have different use for different people. Now, minors sport a cellular phone as a functional display, they consider it part of their wardrobe and flaunt having this modern day gadget in there complete get up. However, this is not the function of cellular phone to the business world. They are necessities and not for dressing up. Because of the varied usefulness of cellular phones and the increasing need and want for easy communication, manufacturers are quick to take advantage of this booming industry. Cellular phones and cellular phone accessories now flood the marketplace with different designs and different functionalities. Various cellular phone models and accessories including Audiovox cellular phone accessory comes in beautiful and functional designs.

Audiovox cellular phones and Audiovox cellular phone accessory can be such functional and comes with models that are lightweight and of beautiful designs. Audiovox cellular phone accessory such as premium power cord is a versatile power cord comes with cellular phone conditioning capacity. Audiovox cellular phone accessory also include a hip clip holder that can be functional even when your cellular phone is not Audiovox. In addition, Audiovox cellular phone accessory such as headsets and ear glove produce a hands-free cellular phone function that will help you keep your hands on the wheels. This will avoid accidents due to one hand driving and decreased attention on the road. Additionally, the over ear portable hands-free kit from the wide array of Audiovox cellular phone accessory line also functions to provide hands free telephony and had a built in feature that reduces background noise. You will hear clearly the person on the other line, even while driving or doing other stuff. There is also that Jabra model of Audiovox cellular phone accessory, which is a headset that provides hands-free telephoning. Jabra is small, lighter that other headsets and stylish; it also functions as a speakerphone and thus is a more functional gadget for your cellular phone.

All these prove that Audivox cellular phone and Audiovox cellular phone accessory line are functional and technologically advance. Audiovox cellular phone accessory is a multi-functional accessory, it can function well with Audiovox cellular phone but it can also perform its functionality with other cellular phone brands.

There is also that Audiovox cellular phone accessory like the multi-functional antennae, this is attached to your car while you travel, and it functions well when you talk to another person on the other line while the car is in motion. There are other antennas that limits their functions when you are mobile, not the antennae from the Audiovox cellular phone accessory line. This Audiovox cellular phone accessory design of antennae is very useful for travelers and corporate executives. If you are looking for functionality in your cellular phone, try to find an Audiovox cellular phone and the matching Audiovox cellular earphone accessory for your communication requirements. They are very good for young professional who endeavor doing many things are the same time. Your Audiovox cellular phone and Audiovox cellular phone accessory line can compliment your highly active lifestyle.