Origin of the word “Scuttlebutt”

2012 May 9
by Andy

Definition of SCUTTLEBUTT

 

a : a cask on shipboard to contain freshwater for a day’s use
b : a drinking fountain on a ship or at a naval or marine installation
 
I don’t know why I find this interesting or even mildly amusing, but I do.
 
This term derives from the butt, or cask, that held drinking water on sailing ships; it was scuttled, or provided with a hole in the top, so that water could be drawn. In the same way that office workers gather around a water cooler to share gossip, the scuttlebutt was the locale of idle talk among mariners. Hence, scuttlebutt came to refer to the gossip itself, and the usage was extended to civilian environments.
 
Thanks to DWT for this.
 
 

Add to Del.cio.us RSS Feed Add to Technorati Favorites Stumble It! Digg It!
    www.sajithmr.com

Happy New Year 2010!!

2010 January 1

Happy New Year all, let’s hope this year is better than last ;)

Add to Del.cio.us RSS Feed Add to Technorati Favorites Stumble It! Digg It!
    www.sajithmr.com

How do I boot into Safe Mode?

2009 December 1
by Andy

If you are fighting a virus/malware on your computer, it is best to boot in safe mode before you start removing things and running scans.  If you don’t, it is likely that the malware will likely just re-install itself.  I’m not going to go into a whole tutorial on virus fighting (maybe in a future post) but the basics are as follows:

1) As soon as you notice you are infected, unplug your internet connection or turn off your wireless.  This will prevent the infection from spreading, and will isolate the offending program from its source.

2) Boot into Safe Mode

3) Run your favorite antivirus/anti-malware program.

This post is really about Safe Mode – how do you get there?  There are a couple of ways depending on the operating system you are using.  Here’s the Microsoft Page on the topic.

Windows XP

If XP is the only operating system installed on your computer, boot into Safe Mode with these instructions.

  • If the computer is running, shut down Windows, and then turn off the power
  • Wait 30 seconds, and then turn the computer on.
  • Start tapping the F8 key. The Windows Advanced Options Menu appears. If you begin tapping the F8 key too soon, some computers display a “keyboard error” message.  If this happens, resstart the computer and try again.
  • Ensure that the Safe mode option is selected.  If you are trying to clean a machine that is virus laden, choose Safe Mode Without Networking.
  • Press Enter. The computer then begins to start in Safe mode.
  • When you are finished with all troubleshooting, close all programs and restart the computer as you normally would.

If you don’t want to bother with function keys, you can use the System Configuration Utility method.

  • Close all open programs.
  • Click Start, Run and type MSCONFIG in the box and click OK
  • The System Configuration Utility appears, On the BOOT.INI tab, Check the “/SAFEBOOT” option, and then click OK and Restart your computer when prompted.
  • The computer restarts in Safe mode.
  • Perform the troubleshooting steps for which you are using Safe Mode.
  • When you are finished with troubleshooting in Safe mode, open MSCONFIG again, on the BOOT.INI tab,  uncheck “/SAFEBOOT” and click OK to restart your computer.  THIS STEP IS CRITICAL.  If you don’t change this back, then the computer will continue to boot in Safe Mode until you do.

Windows 7

Safe Mode in Windows 7 is basically the same as XP – use F8 to get to the Safe Mode startup screen.  MSCONFIG is slightly different – Safe Mode is called Safe Boot, but otherwise the process is the same.

Add to Del.cio.us RSS Feed Add to Technorati Favorites Stumble It! Digg It!
    www.sajithmr.com

10 Facebook Privacy Settings You NEED to Know.

2009 September 2
by Andy

I will summarize here, but the full article by Nick O’Neill from www.allfacebook.com is a great read, and something I wish I had written.  Facebook is a great tool, but in a world where information and identity theft is rampant, you need to know how to protect yourself from, well, yourself.

1) Use Friends lists to group your friends into logical groups.  This allows you to grant different access rights to different groups of people.

2) Remove yourself from Facebook search results.  Like the author, my family is chock full of teachers.  For the most part, they don’t want their students to randomly find their personal information from a Facebook search, but still want to be on Facebook for family and friends.  The solution?  Remove yourself from Facebook search results.  You do this from the “search privacy settings” page.

3) Remove your Facebook self from Google search results.  As you know if you Google yourself (doesn’t everyone do this?) your Facebook profile will come up pretty quickly.  You can remove yourself from Google searches from the “search privacy settings” page – uncheck the “Create a Public Search Listing for me …” check box.

4) Control who sees your tagged photos – You can do this from your profile privacy page.  The cool thing is if you’ve set up your friends groups right, you can allow access to tagged photos by group.  That way the photo of you that you don’t want your boss to see won’t get you fired.

5) Control who sees your photo albums – as with tagged photos, not all pictures are for all eyes.  Check out the Photo Privacy Page.  From there you can control who sees what.  Very handy.

6) Control how your relationship status is displayed in news feeds.  Everyone likes to tout their relationship, but do you really want everyone (boss, business contacts) to know?  Uncheck the “Change relationship status” box on the News Feed and Wall section of your Privacy settings.  This will prevent people from seeing changed to your relationship status in their news feeds.

7) Be sure that applications don’t publish embarrassing news feed posts.  Many applications you sign up for post items to your news feed that are potentially embarrassing.  Be sure that you scan your profile every time you install an application, or better yet, avoid applications completely.

8) Control who sees your contact information.  If you use Facebook for business and for personal contacts, you can control who sees what contact information from you using your Friends Groups.  You can add multiple email address and phone contact items, then edit the custom privacy settings for each to control who sees them.

9) Avoid embarrassing wall posts.   Facebook lets you control not only who posts to your wall, but also who can see those posts.  In the Profile section you can change who posts to your wall by choosing “custom” from the “Wall Posts” drop down.  From there you can use your Friends groups to control who posts and who sees what.

10) Like your hands, keep your friends to yourself.  I love seeing who is friends with my friends, but some people don’t want to share, and in some cases, it’s probably not a good idea to share.  Once again, you can customize who can see your friends list using your friends groups.

There are endless ways to control your privacy on Facebook, but you need to take the time to sort through the settings.  Friends Grouping is a great place to start and ensures that you have separation of your business and personal contacts.  Get to know your privacy settings!!

Add to Del.cio.us RSS Feed Add to Technorati Favorites Stumble It! Digg It!
    www.sajithmr.com

WEP vs WPA

2009 August 20
tags: , ,
by Andy

Another question I get asked a lot is on Wireless security.  People get very confused by the security options out there, and the industry doesn’t help by adding acronym after acronym.  So what do you do?  The answer is fairly simple – secure your network with WPA!!

There are lots of methods to use to secure your wireless network.  The most common is WEP, but that is being replaced by the newer (and better) WPA protocol.  You can also secure the network by allowing only specific computers on the network.  This is simple to do, and doesn’t require security keys and messy settings.  The problem with it is that the data you send wirelessly is not encrypted.  With WEP and WPA, the data is encrypted.

What are these things anyway?

WEP or Wired Equivalent Privacy (see the Wiki for more info) is an encryption protocol developed in the late 1990′s to secure wireless networks.  It offers 64bit and 128 bit encryption using a key generated by a passphrase you enter, but is easily cracked.  Despite this, there are a ton of people who still use WEP since it is the default protection on many routers.

WPA (WiFi Protected Access) is the next generation encryption algorithm that replaced WEP.  WPA uses 256bit encryption keys, and is far more secure than WEP.  It’s not the be-all-end-all, but is very good.  As with WEP, you have the option of generating a security key using a passphrase so that you don’t have to remember a string of random hex digits.  This is great, BUT you have to be careful about the passphrase you use.  DON’T use things like your pets name, your kid’s name, your street, or anything that can be guessed.

The clear answer is to secure your network with WPA.

BUT – do you have to secure your network at all?  The safe answer is yes.

What happens if you don’t secure your network?  That depends on where you live, how close your neighbors are, and how you secure your computers.  Most wireless routers have a range of 150 feet.  That means that if your neighbors are more than 150 feet away, they will not be able to get on your network unless they are standing outside your house with their laptop.

If you don’t change the default security settings on your computers, chances are that even if someone did get on your network, they wouldn’t be able to do much.  By default settings I mean:

  • No shared hard drive locations
  • Remote control disabled
  • Firewalls up and running on every computer
  • Anti-Virus up and running on every computer

Of course, this is not always realistic – I have lots of shared directories, and remote control enabled on my machines because I like to be able to work on any machine from anywhere if I need to.  For that reason, I like to secure the network so that if someone manages to get on they won’t get to my personal files.

The bottom line on security for wireless networks is best practice is to secure your network using WPA.  That said, if you live in a remote area where no one will likely be in range of your wireless, it’s not really necessary, just a good idea.

Add to Del.cio.us RSS Feed Add to Technorati Favorites Stumble It! Digg It!
    www.sajithmr.com

Twitter is mostly useless drivel

2009 August 17
by Andy

A couple of recent studies on Twitter and people who tweet point out that over 40% of all tweets fall into the category of “pointless babble”.  Pear Analytics put out a report with these and other interesting findings.  I’m sure it comes as no surprise that 75% of all tweets come from just 5% of people who tweet. 

Sysomos also does research into twitter usage and in their blog report  that 24% of all tweets are bots and other programatic postings.  Not surprising since the top contributors are posting 150 tweets and more a day.  Interestingly, they also put together a list of the top posters who have 5000 or more followers, and less than 50 posts per day.  The assumption is that these are reall posters, not bots.  Chris Brogan tops that list.  Who is he?  He’s a guy that helps businesses use social media.  Practice what you preach I guess.

Lots of other interesting facts.  55% of tweeters are women, 78% are caucasian.  The number of African American twitter users is well above the average for African American internet users.  I have no idea what that says about African American internet users, but there it is. The demographic information on Twitter is from quantcast.  A very cool stat site for websites.

 

So what does this all mean?  Be careful who you follow, and don’t feel bad about dropping the people who post too much – they are likely just a bot anyway.

Add to Del.cio.us RSS Feed Add to Technorati Favorites Stumble It! Digg It!
    www.sajithmr.com

35 best iPhone apps of the year so far

2009 August 16
tags:
by Andy

AppVee (www.appvee.com) has released their list of the 35 best iPhone apps of the year so far. If you don’t know about AppVee, they are awesome. Basically, they look at every (well almost every, they do ignore the nonsense) iPhone app published and winow out the good from bad. They seemingly impossibly review more apps that I thought possible, and they do a really good job.

The list of apps they like so far is here.

Notable inclusions are TweetDeck, Skype and Kindle – three of my personal favs.

Thanks AppVee!!

Add to Del.cio.us RSS Feed Add to Technorati Favorites Stumble It! Digg It!
    www.sajithmr.com

Outlook 2007 tips

2009 August 13
by Andy

While I’m on the subject of tips, here are a few tips for Outlook 2007.

1) Stop Outlook from suggesting names in the TO field.

This is related to the .nk2 file I blogged about awhile ago.  If you don’t like that outlook suggests names for you, then you can turn this off.  Go to Tools, then Options.  From there choose the Preferences tab, then click the e-mail options button.  In the e-mail options dialog, click the Advanced E-mail Options button.  Uncheck the radio button for “Suggest names while completing To, Cc, and Bcc fields”.  Click “ok”.

2) Configure Outlook to NEVER send read receipts.

Personally, I think read receipts are annoying.  Some people love them, and who am I to judge, but I’d prefer to keep when I read your mail to myself, so I turn this “feature” off.  To do this, go to Tools, then Options.  From there choose the Preferences tab, then click the E-mail options button.  In the E-mail options window, choose the “Tracking Options” button.  Look for “Use this option to decide how to respond to requests for read receipts. Only applies to Internet Mail accounts.”   There are a couple of radio buttons – choose “never send a response”.  Click “ok”.

3) Remove the System Tray icon for new email

Another love it or hate it item.  I like this one, but when the system tray gets cluttered, out it goes.  To remove the icon, once again go to Tools, Options and from there choos the Preferences tab.  On the Preferences tab choose the E-mail Options button.  In the E-mail options dialog choose the Advanced E-mail Options button.  Under the “When new items arrive in My Inbox”, uncheck “Show an envelope icon in the notification area”.  Click “ok”.

4) Configure Outlook to empty the deleted items folder when you exit.

This is really helpful if you have limited mailbox space.  Deleted items count toward your mailbox space limits, so you either need to remember to empty your deleted items, or have outlook do it for you when you exit the application.

To configure Outlook to empty deleted items on exit, go to Tools, the Options, then choose the “Other” tab.  Under “General”, check “Empty the Deleted Items folder upon exiting”.  Click “ok”.  Your sysadmin will love you ;)

5) Add Holidays to your Calendar

Outlook support iCal, so there are thousands of calendars you can add to Outlook.  To add holidays from the default list, go to Tools then Options, then choose the Preferences tab.  In the Calendar section, click the Calendar Options button.  In the Calendar Options window, click the “Add Holidays” button.  Scroll through the resulting list, click the radio button next to the ones you want, then click “ok”.

Just a few things for now.  I’ll add more another time.

Add to Del.cio.us RSS Feed Add to Technorati Favorites Stumble It! Digg It!
    www.sajithmr.com

10 Windows 7 Tips

2009 August 13
by Andy

So far, Windows 7 is the bee’s knees.  The more I find out, the more I like, which is saying a lot – with operating systems, it’s usually the other way around!

Here are a few things that make Windows 7 neat.  Big thanks to Tim Sneath for most of these.

1) Windows Management – in XP, your choices on what you could do with arranging windows on your screen was somewhat limited.  You could maximize a window to take the whole screen, you could manually shrink it to the size you wanted and move it to the side, iconize it, etc.  In Windows 7, several “docking” features were introduced that make moving things around on your screen really easy.  If you press the Windows key, then the left arrow, the current window will dock to the left side of the screen.  WIN+right arrow will dock to the right, WIN+up arrow will maximize the window, WIN+down arrow will restore the window.  In addition to the WIN shortcuts, you can drag windows to the top to maximize it (double clicking the title bar still works too), or you can drag the window to the left or right to dock the window there.

On a related note, in a multi monitor setup, you can move windows from one screen to the other using WIN+SHIFT+right or left arrow.  Now were talking!

2) Get rid of the noise – Have you ever been working on a document and been annoyed that all of you other open windows are just in the way?  Press WIN-Home in Windows 7 and all windows but the current are minimized.  Press WIN-Home again to restore the windows.

3) Browser load times – This is really an IE8 tip, but I’ll include it here.  If IE is taking a long time to load, it may be because of the add-ons you are running.  Go to Tools/Manage Add Ons and you will see  a list of what IE loads at startup.  The neat thing is if you scroll to the right in the list, you can see the load times for the Add Ons.  This is a great way to see where the bottle necks are.

4) Quick start for taskbar apps – you can use WIN+1, 2, 3, 4 or 5 to quickly go to or start any of the first 5 apps in your taskbar.

5) Look at the desktop – Another helpful feature is WIN-space bar.  This combo lets you look at the desktop and see any icons or widgets you have.  You can also click on the rectangle all the way in the lower right hand corner – this is the old “show desktop” icon.

6) Additional instance of an open application – there are a couple of ways to do this, but by far the fastest is to hold the shift key while left clicking on the taskbar icon.  Way better than going through the start menu again, or right clicking and choosing to open the app.

7) Running with elevated rights.  If you hold CTL-Shift while clicking on a taskbar app, you will bring up a new instance with full administrator rights (assuming your account has permissions).  When Windows 7 is deployed in an enterprise, this will be GREAT.

8) Specialized Window switching – this one I love.  If you are like me, you have tons of windows open all the time.  In XP if you want to switch between windows you can ALT-Tab through them all, or you can click on the taskbar icon and guess which window is the one you want.  In Windows 7, you can essentially Alt-Tab through all of the open windows associated with a specific application without scrolling through every open window.  You do this by holding down the CTL key, then clicking on the taskbar icon for the application you want.  Windows will “scroll” through the open windows as you click the icon.  This is great if you want to scroll through all of your open Outlook windows, for example, but don’t want to run through everything you have open.

9) Move focus the taskbar – this is neat keyboard shortcut.  If you press WIN-T you will move focus to the taskbar.  You can then use the arrow keys to move through your taskbar apps to choose the one you want.  For keyboard shortcut junkies, this is great.

10) Open windows explorer keyboard shortcut – Press WIN+E.  This will open up and explorer window at the Computer Node.  Note that SHFT+click on the explorer icon opens at the Document Library Node.

More to come -

Add to Del.cio.us RSS Feed Add to Technorati Favorites Stumble It! Digg It!
    www.sajithmr.com

Send mail from another address without the “on behalf of” message in gmail

2009 August 2
by Andy

From the Gmail blog

One of the neat features of Gmail is that you can use it to aggregate all of your email addresses to one inbox.  You add the email addresses to your gmail account, and they connect via POP or IMAP to your other accounts and everything is in one place.  Until this past Thursday, when you replied to a mail that was not to your mail account, Gmail would put your main account in the “Sender” field so that your mail would not be kicked as spam.  What the recipient would see is a message that the mail was send “on behalf of” the intended address “from” your main account.  While this is ok in most instances, if you are trying to mask that Gmail is the tool you are using for all of your mail, then this can be annoying.

Thursday, Google introduced a way to route your mail through the SMTP server of your choice instead of their SMTP servers, so your mail will look like it is comming from the system you choose and the “on behalf of ” messages will go away.  Neat!  If your office allows POP/IMAP and you allows remote SMTP then you are golden.  If not, well then you have to live with the “on behalf of” messages.

Add to Del.cio.us RSS Feed Add to Technorati Favorites Stumble It! Digg It!
    www.sajithmr.com