Albury Local Internet Newsletters
Previous Issue Selection Link


Special Edition Selection Link


Article Search Link
Looking for a
particular article
in one of our
previous
Newsletters?
Type your keywords
in the box below
select your
options and then
click on click here
to Go!
below:

Keywords:

Boolean:

Case:


... You Wrote ...
SEPTEMBER, 1998
spacer rule
...

We've received a lot of responses since last issue. While we will try to answer them all, we appologise in advance if we missed "your" question - send it in again with a reminder!! Some questions have been answered directly to the subscriber concerned. Many comments, questions and responses were considered potentially helpful to other subscribers thus it was decided to reproduce them here for your information.

email the editor
Submit Contributions
spacer rule

Subscriber's Questions

YOU WROTE:
Prior to my joining up with ALI. I had IBM as my internet server. My reason for the change over is another story.
However, I frequently spent time on different chat channels and had some ICQ chat times. I got my ICQ number from a Miribilus download.
But unfortunately I cannot use it or chat to people in any of the chat rooms that I previously used and had bookmarked.

Subscriber

RESPONSE:
Unfortunately this writer did not include an email address, and we need more information to diagnose the problem accurately.
As an interim measure (and taking a few wild guesses) ICQ for Windows 95/98 NEEDS a 32 bit dialler (vis Windows-95/98 Dial-Up Networking). If you're using Trumpet it probably won't work. IF this is your problem, then configuring Windows-95/98 Dial-Up Networking OR downloading the 16 bit (Windows 3.1 version) of ICQ should fix your problem.
If this does not give you a working solution please contact us directly with more information.
Next Article
YOU WROTE:
Dear Ed, Recently I obtained the instruction sheet from ALI titled "Windows-95/98 Dial-Up Networking Instructions" to enable use of Windows 98. Every thing worked OK with the exception that after verifying password a long time elapsed before completion of the connection as per the last sentence of the ALI instructions.
This long wait can be eliminated by adding another step to the ALI instructions. In step 1c, add the following. Under "Advanced options:" Remove the tick from the "Log on to network" box. (Default setting).

Subscriber

RESPONSE:
Thank you for your tip. While it certainly speeds up the log-on process, it **may** cause problems or instability with some network operations or applications. Please keep this in mind.
Next Article
YOU WROTE:
I am having troble accessing a site I was able to access two days ago. The screen reads 'This site requires a frames enabled browser'. What can I do to fix the problem?

Subscriber

RESPONSE:
Download and install a later version of your browser.
Please bear in mind the copy of Netscape on your distribution disks (1.1N/1.2) IS an early copy. Incidentally, all later versions are too large to fit on a floppy disk. It is intended as a "bootstrap" mechanism to allow you to get basic access to the net from which you can then download and install later versions of your choice.
We do remind ALL subscribers that current versions of most browsers support features that can unfortunately be exploited by web sites you visit to do anything from steal files off your hard disk to shutting down and in worst cases destroy your computer.
Unfortunately these "features" are now so widely used on legitimate sites it is difficult to surf the net without them. We were advising subscribers wanting to run later browsers to turn off Java, Java-script, Active-X, which is only a partial solution, but some of the latest browsers won't work properly without them enabled.
The risk of damage or theft of data is small BUT IT IS THERE and the only advice we can give is keep regular back-ups, use caution when surfing, and do NOT keep any sensitive information on ANY computer that has access to the internet.
Next Article
YOU WROTE:
[reproduced from our home page splash message for Netscape 1.1 users]
>Want to update from Netscape 1.1N? Help is here
>I TRIED BUT FAILED!! I DESPERATELY NEED HELP [in more ways than one ]

Subscriber

RESPONSE:
We would like to remind subscribers that in order to help them more efficiently we REALLY need more detail of what steps they have attempted and where they have experienced difficulties, including if possible the EXACT wording of any error message. Otherwise we can only guess at what your problem might be.We guessed for the above message that the subscriber would find the help they needed if they clicked on the "Help is here" link. Did we guess right?
Next Article
YOU WROTE:
why is it that every time I go to your home page it tells me I should be using your proxy server? The amount of times I have done as it says and I still come back and it tells me I should be using it is ridiculous. How do I fix this?

Subscriber

RESPONSE:
You *may* still be pulling the home page out of your cache. Try hitting the "reload" icon. If that doesn't clear it, try clearing your cache directory and memory from within your browser. If it STILL persists, there must be something wrong with your proxy settings and we'll have to look further into it.
Browsers use cache directories on your hard disk to speed up loading of previously visited sites by saving the files used in a previous session and loading them off your local hard disk. While in theory they *should* update any newer files directly from the original site or server, they don't always do so.
Next Article
YOU WROTE:
I've just had a look at the under development online shopping page and I wondered if you could publish something in the newsletter about security risks and using cards on the net?
Another aside is Mount Beauty pop OK? Connections have been hard to get lately, usually two calls to get "verified" and slower connections (26400) when connected.

Subscriber

RESPONSE:
Thank you for your suggestion. We will endeavour to update our research on the current situation and publish an article in a later issue.
With regard the Mt Beauty service the POP itself seems to be operating normally with plenty of normal speed connects. However, some subscribers have reported phone line problems since the rains started, in fact some areas are reported to be in need of re-cabling. Unfortunately this is a Telstra problem with water getting into the consumers lines in the ground and we have no control over it. Difficulty connecting and slow or odd speed connects when you DO get on is certainly indicative of phone line problems.
Another Telstra "habit" (or "trick") to be on the lookout for is where Telstra have installed "Pairgain" devices on phone lines. This is happening particularly in rural areas where they (Telstra) don't have enough copper cable in the ground. Whilst this doesn't directly affect us, subscribers on those lines have gone from having good lines to poor but workable ones, or in some cases from a working (although substandard) line to one that simply is unusable for data - including faxes!
Next Article
YOU WROTE:
Dear Editor,
Please excuse my ignorance, but what are cookies? And what merit is there in allowing them to be sent? I've noticed that I have a few in a file called: c:\windows\cookies. Is it OK to keep these or should they be banished to the recycle bin? .

Subscriber

RESPONSE:
Cookies are largely a necessary "evil" - they can be harmless (eg keep tabs on your shopping cart purchases) or used by some unscrupulous web sites to analyse your internet usage pattern, surfing/buying preferences etc. However, from Netscape 4 onwards you can refuse to accept them unless a site you WANT to use insists you turn them on (options under "Edit ... Preferences ...Advanced").
A good description of what cookies are and the possible abuses of them can be found on the World Wide Web Security FAQ - "Q66: Do "Cookies" Pose any Security Risks?"
Briefly "A cookie is a small piece of information that the server sends to the browser when the browser connects for the first time. Thereafter, the browser returns a copy of the cookie to the server each time it connects."
You can turn cookies off completely by setting the cookies option to "Do not accept or send cookies". As a compromise between security and accessibility you can select "Only accept cookies originating from the same server as the page being viewed".
What you do with your cookies files depends on where they came from, and whether they are necessary for any site you may regularly use. To err on the safe side, you could delete them and turn cookies off ... but if you regularly access a site that once asked for a password, and since relied on a cookie on your machine, you may not be able to get back in (unless you can remember the original password).
Me? I sometimes delete them if I'm feeling paranoid or annoyed at a site, but other times don't really give a damn if some bored marketer is trying to create a "profile" on me. I've got better things to do with my time ;-) But, largely it's a very personal thing. It's up to you.
Next Article
YOU WROTE:
This email has been responded to privately but as it raises some important issues we have included edited portions of it here for the benefit of our subscribers, particularly those frequenting on-line chat rooms as this person does. Ed.
I was wondering if you could please help me or offer some advice on something. I have been receiving some abusive e-mail from a guy [deleted - Ed.]. I have no idea who he is or he he got my e-mail address. He has been disconnected from [deleted - Ed.], but he just keeps logging on with a slightly different name & sending me abusive e-mail. If you like i could forward you some of these e-mails. Could you please help me with this situation?

Subscriber

RESPONSE:
As a security measure, we would strongly recommend you do not use your real email address in any correspondence or for any identification purposes in your chat rooms or programs. It is likely this person may have found your address there. Most chat services are very understanding in this matter as they (chat services) are often abused in this way. Most (if not all) will allow you to use an "alias", and most recommend you avoid giving others your real email address.
Additional
It is virtually impossible for ISP's to block abusive emails from sufficiently determined twisted individuals who keep changing their email addresses. Unfortunately this is all too easy to do with many on-line email services (eg hotmail) that require no real ID to establish email accounts. Your only protection is not to broadcast your email address outside your circle of friends and family, and choose your email contacts wisely.
Abusive emailers will only persist as long as they think they are upsetting you. You could look into getting and using an email program that supports "filters", and set up pattern matching filters to automatically delete mail containing abusive words and phrases so you never have to see them. Set your filters up carefully though, or you may delete mail you didn't mean to!
Next Article

Feedback

Canadians visit Creek Haven Country Cottages.
Recently two couples from Labrador in Canada stayed at our cottages and were thrilled with the facilities available. More importantly as a fairly new user of e-mail and the internet we are pleased to say this was all due to the assistance and links provided by ALBURY LOCAL INTERNET. It may not seem a big thing to some, but to be a new uses and to communicate to Labrador via e-mail and the net and then to actually meet the people makes the learning curve we have been going through all worthwhile. Thanks to the dedication of staff at ALI and the services they provide it is truly amazing.
Accolades to ALI!!!

Creek Haven Country Cottages

RESPONSE:
What can we say. Thank you.
Next Article
The MSFiles
Stumbled across the "MS Files" article in your September newsletter and I've just finished reading it.
It's refreshing to see a well reasoned and informative critique of Microsoft's questionable (yet rarely questioned) business practices. It makes a nice change from the usual reactionary "Microsoft sucks because I hate them" flames, which seem to overshadow thoughtful and articulate debate.
I too am waiting for the day when the wider computing community reaches some sort of collective enlightenment. Too many people credit Microsoft for inventing technologies in the '90s which actually have their roots in both production and R&D environments of the '70s and '80s. The only thing more depressing than Microsoft's marketplace strangle hold is the rampant spread of misinformation which provides them with additional market leverage.
Ah, lament...
Anyway, kudos for producing a fine read.

Non-Subscriber

RESPONSE:
Thank you for your comments on this important issue. There's more in this newsletter too! We're facing a very interesting possible turning point in the geography of Information Technology at the moment, and only time will determine the "winners" and "losers".
Next Article
Hello
My name is Sheldon Robb and I lived in Albury in February through June of 1968.
I loved the area and the people in Albury.
I live in Roosevelt, Utah in the USA. I teach 6th grade students here. They are ages 11-12.
If anyone would like to correspond with my students either through regular mail or the email they can respond at my email address.

I enjoyed reading your website.
thanks Sheldon Robb

Non-Subscriber

Editor's comment:
Any of our subscribers - teachers or students - who would like to take Sheldon up on his offer can contact the editor for Sheldon's email address.
Next Article

Survey Questions

We've had a positive response to our Readers Survey from last issue. Subscribers who have not yet filled in the survey are invited to do so at any time by clicking here to visit the September Issue Survey. Some readers posted questions we have attempted to answer here, others posted their thoughts on their computers ...

YOU WROTE:
I wish adding and removing software was easier and safer.

Subscriber

I find it relativly easy to install software but often hard to get it configured as I would like.
This includes net programs which tend to keep adding files but with no clear direction as to which can be deleted and which are part of the system.

Subscriber

RESPONSE:
Configuration problems may be a limitation of the program (it simply may not DO what you want), or the accompanying instructions. Sometimes terms used can confuse more than help, particularly if they are changed with each revision of a program! If a users mailing list or newsgroup exists you can often find valuable help there. Check the manufacturers web site.
Some programs these days include an option to "de-install" them (frequently an icon in the program folder), which should remove all files specific to that program. Some programs provide you with a list (either in the distribution archive or on their web site) of ALL files installed by the program in question. Removing ALL files that have been installed can be dangerous though. Where this can become risky is where you have a number of packages that use the same files (libraries, dlls, etc). Totally removing all a program's component files may break other programs. Totally removing Quicktime 3 for example can break other programs that also use some shared components.
There are some third party utilities that "claim" to tidy up your hard disk by removing unused files. I cannot vouch for their effectiveness - perhaps some other subscriber/reader can comment?
From time to time you may find it beneficial to re-build your computer - backup your hard disk (especially your data), audit your applications to determine which ones you want to keep (and make sure you either still have the archive files or original disks/CD's), re-format your hard drive, re-install your operating system and applications programs and restore your data.
NOTE: DO NOT ATTEMPT THIS LAST SUGGESTION ON YOUR OWN IF YOU ARE INEXPERIENCED, UNLESS YOU ARE PREPARED FOR THE WORST, AND DO NOT LET A MATE DO IT FOR YOU. Unless you are experienced or very keen you may be well advised to get it done for you by an experienced technician. Making your own backup though is essential - you can't be sure a third party will do it for you, or do it properly. Also make sure you give complete WRITTEN instructions to any third party as to what you want them to do for you, including a list of programs you want re-installed. And get a quote first if possible.
Next Article
YOU WROTE:
I would like to know more about using search engines, eg which are best, which will give the most accurate results, how to single out specific country sites, eg australia, england, canada, usa

Subscriber

I would like to see some information regarding the development of business on the net.
I would like more information on getting programs from the Internet as safely as possible (ie virus free), and configuration of browsers.

Subscriber

RESPONSE:
More good suggestions for feature articles in future issues. Ed.
Next Article
YOU WROTE:
I would like to learn how to use the ZIP drive and MS Backup to back up the nessesary files which cannot be replaced off CD as I am going to get the ZIP Drive in the future.

Subscriber

RESPONSE:
Check out our Back 2 Basics article in this issue. Zip drives are very handy little backup devices. Historically SCSI versions are much faster than their Parallel counterparts, but they require your computer to have SCSI support - default on the Macintosh but optional on PCs. IDE versions are also reported to perform quite well.
Next Article
YOU WROTE:
The more i play with the computer
the more you learn by your mistakes

Subscriber

I love my computer and everything to do with it.
Fascinating, intrigueing and interesting thing.
Wish I new more,or at least had the opportunity
to learn more about there operation and programming.

Subscriber

RESPONSE:
You're certainly in the right place to learn - the web would have to be the best source of information on things computer - mailing lists, newsgroups, user groups, advocacy groups, chat rooms, web sites - official and unofficial. Narrow down your area of interest if possible, and find a newsgroup of mailing list of like souls. Mailing lists in particular can be a wonderful source of basic and bleeding edge stuff. A good one can be difficult to find, but try DejaNews and Liszt, the mailing list directory for starters.

Note: As a general rule, contributors email addresses are with-held unless specifically requested to protect them from spammers email harvesting webbots. Contributions are also generally not altered - or even spell-checked - unless necessary to protect someone's privacy. Literals (spelling mistakes) are frequently the rule on the web, rather than the exception - especially when dealing with international correspondence. Learning to relax and live with it will make your surfing experience more pleasurable, and keep you out of trouble in the newsgroups and mailing lists (where correcting someone's spelling is a flamable offence ;-)


Back to main index
Albury Local Internet
Albury local interNet
Home Page
Next Article
Comments and questions to the editor:- editor@albury.net.au
Postal: Albury Local Internet Pty Ltd, PO Box 577, Lavington, NSW 2641;
Phone 02 6040 2692 Fax: 02 6025 7144

©1998 Albury Local Internet. May not be reproduced in whole or in part without express written permission.