Month: November 2013

The 2013 tablet holiday guide

One of the benefits of the reorientation of IT toward the consumer is that hardware and services are now refreshed on an annual cycle, with major releases coming just in time for the holiday shopping season and right in the middle of budgeting for next year for companies on a calendar-based fiscal year. Here’s a quick review of what’s new in tablets and what I’m still waiting for.

Fresh Apples

The headliner on the tablet front is usually Apple’s iPad, and the company recently released an anticipated refresh to its iPad and iPad mini lines. The refresh follows the track record of a post-Jobs Apple, with most details leaking in advance of the announcement and incremental improvements to the hardware rather than major changes.

The detailed article

Adobe Password Security

I received a letter from Adobe letting me know that my email address and encrypted Adobe password were found in the list of stolen Adobe accounts.  Adobe sent an email to me with instructions on how to obtain my Adobe password as well as everyone else’s password hint who used the same password.  They strongly recommend

  1. Visit to change your Adobe password.
  2. Check if you have re-used your Adobe password or username on any other websites and if so, change those passwords as well.

The LastPass security challenge can assist you in doing so.

  1. Enter your Adobe account email address below to find out if your personal information was leaked.  If we find that your information was leaked, the we’ll show you your Adobe password hint.
  2. Check if your Adobe password hint lowers the strength of any passwords you have to any websites you use.  If so, change those passwords too.

My recommendation as well…always keep an eye on your banking statements, credit card charges, etc. Glenda Reed

Surface 2 design changes make it more difficult to crack open and repair

Microsoft Surface 2 teardown

On the outside, the Surface 2 may look like its predecessor, the Surface RT. But Microsoft dramatically changed the tablet’s internal design. And in doing so, made it a real pain to crack open and repair.

In this Cracking Open gallery, I walk you through the process of disassembling the Surface 2 and give you a tour of the redesigned internal hardware layout. For a detailed analysis of the teardown, check out my article and video, Surface 2 design changes make it more difficult to crack open and repair.

20 Excel tips for creating stylish spreadsheets

Formatting is an overlooked skill when it comes to Excel. It is essential for communicating results clearly and powerfully.

By Carlo Pandian



Most Excel users would probably agree that the program is a godsend when it comes to creating spreadsheets, yet the results can often be boring to look at. Thankfully, Excel also provides the tools to make your spreadsheets look polished, professional, and pleasing to the eye. Chris Littlewood is Strategy & Research Director at Filtered, an online learning platform for Excel, and he says that “formatting is an overlooked skill when it comes to Excel. This is a shame because it’s essential not only to communicating results clearly and powerfully, but also to reducing the risk of error. Consistent and meaningful formatting makes formulas more comprehensible and bugs more apparent


The Complete Article

Tuesday, Nov 26:Lunch Bunch at 11:30

Don’t forget Tuesday at 11:30 is Lunch Bunch.  We meet the 4th Tuesday every month at the El Sharape Mexican restaurant.  The address is 1200 Cooper Point Road.  Discussion is open to any subject.  It does not have to be computer related.  Just eat and talk.  See you there.

There will be no Lunch Bunch in December.

Don’t forget our Holiday Party on December 12.

 OMUG Annual Holiday Dinner

Save the Date !

OMUG Annual Holiday Dinner is December 12,

 5:30 pm.

The dinner will be at Izzy’s and Eileen McKenzie-Sullivan will be entertaining us again this year with music and songs.

This is a fun event you do not want to miss.

The sign up sheet is listed below:

Sign up here


CryptoLocker: The Worst Malware / Ransomware Ever?

CryptoLocker: The Worst Malware / Ransomware Ever? – Jim Evans, Greater Cleveland PCUG. User groups, are you educating your members about the CryptoLocker ransomware? This is malware that when it infects a computer, it starts encrypting every document, spreadsheet, PowerPoint, graphic and photo file it can find. Once everything is encrypted, the malware posts a ransom notice demanding money. Member group, The Greater Cleveland PC Users Group has created a special CryptoLocker page at and updates it regularly with articles, software, tips and video links.

APCUG: Virtual Technology Conference: Report

Virtual Technology Conference – Another successful Virtual Technology Conference (VTC) was held on 11/02. We had close to 50 attendees in every presentation.

Has your group used a VTC presentation at a meeting? Many groups are; they come in quite handy when you find, at the last minute, that your speaker can’t be there or even when you unexpectedly have a no show. You will find the latest VTC videos on APCUG’s YouTube channel

There are also links to the videos from plus a copy of the presentation PPT and/or handout. The videos can be played back in HD video (depending on your bandwidth) and full screen. Use the controls at the bottom right corner of the video when you play them.

We have been asked about how to download YouTube videos since some groups don’t have a fast Internet connection or any access at all. Jim Evans posted information for Firefox and Chrome on APCUG’s website at

SAVE THE DATES! 2014 Virtual Technology Conference Dates – February 22, May 3, August 16, November 1. We’ve heard from several groups who meet on the 1st Saturday of the month and they asked if we could have VTC’s on an alternate Saturday: February 22 is the 4th Saturday and August 16 is the 3rd Saturday.


Microsoft Customers Hit With New Wave of Fake Tech Support Calls

Beware of fake phone calls.


rjmarvin writes “A new surge of callers posing predominately as Microsoft technicians are attempting and sometimes succeeding in scamming customers, convincing them their PCs are infected and directing them to install malware-ridden software or give the callers remote access to the computer. The fraudsters also solicit payment for the fake services rendered. This comes only a year after the FTC cracked down on fake tech support calls, charging six scam operators last October.”

Read more of this story at Slashdot.

OMUG 2018