Vol. 31, No. 3, March 2014 This Month: Password Managers: What They Are and How to Use One................................................................ 1 Meeting Previews.................................................... 3 How to Detect IP Address Conflicts in Linux... 10 Preserving Memories in a Digital Age............... 11 Photo Gallery......................................................... 13 Computer Tutor..................................................... 14 Tip of the Month................................................... 15 Calendar of Events................................................ 16 The Two Month Activities Calendar.................. 17 About Us About FRPCUG............................................... 18 Directions to the Meetings............................. 18 About k-Byte................................................... 19 FRPCUG Contacts........................................... 20 Users Helping Users Password Managers: What They Are and How to Use One by Mike Morris, Front Range PC Users Group, http://www.frpcug.org, Fort Collins, CO. Originally published in k-Byte, the newsletter of the Front Range PC Users Group. Introduction A password manager application is ". . . software that helps a user organize passwords. . . . The software typically has a local database or a file that holds the encrypted password data for secure logon onto computers, networks, web sites and application data files . . . ." (Wikipedia). Before you ask "why bother," think for a moment about how many web sites you connect to that require a password. Do you use the same (or very similar) password for most or all of those web sites? If you are like the overwhelming majority of computer users, the answer to that question is likely to be "yes." You should, very definitely, NOT do that! All of the computer security experts (and there are a lot of them these days) warn us not to use the same password for all accounts. For example: "The message of password reuse security is one that Hord Tipton, executive director of the International Information System Security Certification Consortium Continued on Page 2 (ISC2), echoes. Continued from Page 1 "Diversifying your passwords for each account is essential to protecting all of your online information," Tipton said. "Once a password has been stolen, hackers often attempt to access multiple accounts, compounding the potential damage."" Source: Yahoo Email Is Breached: Lessons Learned See also Password Security, Protection, and Management With respect to Mr. Tipton, "diversifying your passwords" is much easier said than done . . . unless you use a password manager. There are a number of these applications (for example, see this InfoWorld article), but one, KeePass, is a ". . . free, open source, cross-platform and light-weight password management utility for Microsoft Windows, with unofficial ports for Linux, Mac OS X, iOS and Android . . . ." (Wikipedia). In fact, if you need a lot of passwords (I counted over 70 web sites that I use that need a password), it is almost impossible to keep track of them. But even if you have just a few (10 or a dozen), a password manager can be extremely helpful, and provide an extra measure of security for you. How do password managers provide this extra security? With KeePass the extra security is provided through these features: 1. All your passwords are stored in one database. 2. The database is locked with one master key or a key file, so you only have to remember one single master password (OK, you also need to remember the password to your computer, so that's 2 passwords you have to remember). 3. The database(s) is (are) encrypted using (one of) the best and most secure encryption algorithms currently known (AES). 4. KeePass can generate strong random passwords for you. Source: KeePass Password Safe Since KeePass is open source, you get this extra security for free. If all of those features sound a little "techie," don't worry, KeePass is actually easy to use. Therefore, KeePass (v. 2.20) will be used to demonstrate how you use a password manager application. As with all good things, it takes a little effort to enter the data--at least, it does if you need as many passwords as I do. Installation You can download the current version (which, as of 02/04/2014, for Windows, is 2.25) from the KeePass web site, http://keepass.info/. The installation follows the usual Windows sequence. However there is one window in the sequence worth a comment: Continued on Page 4 Page 2 k-Byte March 2014 Meeting Previews This Month: All the computer security experts (and boy oh boy there are a lot of 'em these days) tell us not to use the same password for every account (e.g., see https://www.us-cert.gov/sites/default/files/publications/PasswordMgmt2012.pdf). That's easier said than done, since just about everything you connect to on the internet needs a password. The solution: Password Managers. Plan to attend the March meeting for tips on how to use these applications. Next Month: Are you prepared for a natural disaster (or any loss of your property)? The Insurance Information Institute (http://www2.iii.org/about-us.html) says that "having an up-to-date home inventory will help you: • Purchase enough insurance to replace the things you own. • Get your insurance claims settled faster. • Substantiate losses for your income tax return." There are many ways to create that inventory. We will examine several free software applications for this purpose at the April meeting. March 2014 k-Byte Page 3 Continued from Page 2 This step may not be necessary at this point, but establishing that file association at the beginning probably reduces the risk of future problems. Set Up Once the installation is complete, at the first launch you will see the KeePass main screen: At this point, you have two primary set up tasks: 1. Create a database 2. Enter data into the database You create a database with these steps: Click on File, then on New: Continued on Page 5 Page 4 k-Byte March 2014 Continued from Page 4 You will be asked (in the usual Windows format) to decide where you want to save the program. Here is an example of that window from my computer: The default Save location for Windows 7 is, of course, Documents. Remember, you can choose to save the database anywhere on your computer. I set up a separate folder called KeePass in the root directory of my hard drive and saved the database there (just my preference). Note also that a default "File name" is entered. I modified that name, in the expectation (as yet unproven), that I will eventually need multiple databases. I chose NewDatabase_1. With the location and file name selected, click on Save. You will see: You enter a Master Password into this window. It needs to be a "strong" password, but it also needs to be something you can remember. A “strong” password is: “A password that is hard to detect both by humans and by the computer. Two things make a password stronger: (1) a larger number of characters, and (2) mixing numeric digits, upper and lower case letters and special characters ($, #, etc.).” Source: PC Magazine This password you may want to write down (yes, using the old fashioned pencil and paper); and although this should be obvious, don’t identify it on that piece of paper. You may also want to keep it with you. Continued on Page 6 March 2014 k-Byte Page 5 Continued from Page 5 From the KeePass Help file (Composite Master Key): “If you forget this master password, all your other passwords in the database are lost, too. There isn't any backdoor or a key which can open all databases. There is no way of recovering your passwords.” A more detailed discussion of passwords vs. key files is available from the Composite Master Key section of the KeePass Help file. If creating a strong password that you can remember seems contradictory, enter: how to create strong passwords that you can remember into your favorite search engine. You will find many articles with suggestions. After you enter your password, click on the OK button at the bottom right of the Create Composite Master Key window. You will see something similar to this (I will talk about the Database Settings window that is part of the database creation process later—the default values are acceptable): You can add groups, and/or modify their order. However, you are, at this point, ready to enter data. You use the “Add Entry” window for this task. It is available from the Edit menu and from the Toolbar: Continued on Page 7 Page 6 k-Byte March 2014 Continued from Page 6 When the Add Entry window is displayed, it will already contain an automatically generated strong password: Your user name will also be included. The only field required, other than the password, is the URL of the web site for which you want to use this password. By the way, that Notes field is a handy place to record the answers to all those security questions you are asked when you register at any web site. You add as many entries as you need passwords. If you choose to organize them into groups, click on the group name in the left panel before you click on Add Entry. I want to depart momentarily from this sequence and return to the Create New Password Database steps. You will see a Database Settings window during this set up (you can also access Settings from the File menu after the database is created). All of those settings can be left at their default values. However, you may want to enter a description. For example: How to Use the Password Here are the steps for using the password: 1. Connect to the log in window of the web site of interest. You can also connect to the web site from KeePass. Right click on the entry for that web site and then click on URL. If you have more than one browser installed (as I do), you can choose which one to use from the list that is displayed: Continued on Page 8 March 2014 k-Byte Page 7 Continued from Page 7 2. Once you are connected to the web site’s log in window, in KeePass, right click on the entry for that web site and then click on “Copy User Name”: Return to web site log in screen and paste the user name into the appropriate field (you could, of course, just type that in). 3. In KeePass, right click (again) on the entry for that web site and this time click on “Copy Password.” Return to web site log in screen and paste the password into the appropriate field. 4. Click on the log in or sign in button for the web site. There is one important note regarding these steps. You have only a limited (but adjustable) time to paste the user name or password after you copy it. KeePass will clear the Clipboard after some number of seconds for security reasons. That time is set in the Security tab of the Tools/Options menu item: Note that in the image above, that time is set to 12 seconds. Continued on Page 9 Page 8 k-Byte March 2014 Continued from Page 8 Extras So far, these instructions cover just the basics. There are many extras, three of which are worth mentioning, although not discussed here in detail (see the KeePass Help file). 1. Generate your own passwords: If you are not satisfied with the automatically generated passwords (or, if the website to which you want to connect only accepts a smaller number of characters), you can create your own. Click on the icon under the 3 dots and you will see: 2. Mobility: There is a “portable” version (http://keepass.info/download.html) that you can install on a flash drive that will allow you to use KeePass on any other computer (with some restrictions—see the KeePass Help file) “without creating any new registry keys and it doesn't create any configuration files in your Windows or application data directory of your user profile.” 3. Plugins: There are a large number of plugins available (http://keepass.info/plugins.html), including one called KeeForm that will "(open) websites and fill in the login data automatically, for Internet Explorer and Firefox." Before you install any plugin, be sure to read the Plugins for KeePass 2.x information. Acknowledgements Thanks to Front Range PC Users Group member Bert Broekstra for his help with learning this program. Thanks to Front Range PC Users Group member Herb Cantor for finding the “Yahoo Email is Breached . . .” article and for sending the link to me. It's the world's largest . . . what? March 2014 k-Byte Page 9 How to Detect IP Address Conflicts in Linux by Dan Nanni, http://xmodulo.com/2012/03/how-to-detect-ip-address-conflicts-in.html. Licensed under a Creative Commons Attribution-ShareAlike 3.0 Unported License. I P addresses are a scarce resource that is shared by different users and devices. Having an IP address conflict means that there are more than one network device or computer that claims the same IP address. IP address conflict may occur when a DHCP server has assigned an IP address to one computer, and the same IP address happens to be statically assigned to another network device by someone. IP address conflict can also happen when there are more than one DHCP server (typically built in a router) hooked up to the local network, autonomously giving out IP addresses from the same subnet. If you are having flaky network connectivity, and suspect it is due to IP address conflicts, you can use a tool called arp-scan to detect IP address conflicts in Linux. arp-scan sends out ARP packets on local network to collect (IP address, Ethernet MAC address). If there is more than one Ethernet MAC address claiming the same IP address, it means there is an IP conflict. To install arp-scan on Ubuntu or Debian: $ sudo apt-get install arp-scan To install arp-scan on CentOS, Fedora or Redhat: $ sudo yum install arp-scan To detect IP address conflicts with arp-scan, run the following: $ sudo arp-scan -I eth0 -l 192.168.1.10 192.168.1.30 192.168.1.33 192.168.1.37 192.168.1.38 192.168.1.39 192.168.1.39 192.168.1.40 00:1b:a9:63:a2:4c 00:1e:8f:58:ec:49 00:25:4b:1b:10:20 10:9a:dd:55:d7:95 20:c9:d0:27:8d:56 d4:85:64:4d:35:be 00:0b:46:e4:8e:6d 90:2b:34:18:59:c0 BROTHER INDUSTRIES, LTD. CANON INC. Apple, Inc Apple Inc (Unknown) Hewlett Packard Cisco (DUP: 2) (Unknown) According to the example output shown above, IP address 192.168.1.39 is in conflict, where two different MAC addresses are claiming the same IP address. Page 10 k-Byte March 2014 Preserving Memories in a Digital Age by Mike Hancock, Golden Gate Computer Society, CA, http://www.ggcs.org, editor (at) ggcs.org. Originally published in the GGCS Newsletter. M ore than 30 years ago—in 1982—videotapes came to the market. By now, though, many are degenerating. Alan Kolsky, of Digital Video Dimensions, startled attendees of a GGCS General Meeting by enumerating the probable life spans of various media: • • • • • • • • • CDs: 5—100 years Newspapers: 10—20 Data-grade VHS videotape: 10—30 Digital linear tape: 10—300 Other magnetic tape: 10—30 Microfilm: 10—500 Photographic slides: 100 Archival grade acid-free paper: 10—500 Egyptian stone tablet: 2,000! But people often want to digitize home movies, slides, videotapes, audio recordings, documents, and photos for storage and ease of presentation. Some authorities argue that because of rapid advances in technology enhanced media longevity is questionable. Future trends that will affect archiving include higher resolution and solid-state storage. “4K” resolution video format (4,000 pixels in horizontal direction) is coming and is needed for the huge monitors, which tend to have much softer resolution than smaller monitors. “Ultra HD” is on its way, too. 64GB thumb drives are readily available, and solid-state drives are being introduced to computers and will displace mechanical drives and players. DVDs are ubiquitous today, but Alan warned us that improper handling can rapidly degrade them. Hold DVDs at their edges, across their diameter; do not handle them on their recording face, and do not handle them roughly. Also, avoid using paper stick on labels because they cause wobbling and thus poorer recording. These factors affect the life of any media: • • • • • Quality of the original media. Kodachrome slides from the ’50s are still beautiful. The number of times the media are accessed. Storage temperature and humidity; store in a cool, dry place. Cleanliness of the storage environment. Quality of the device used to read/write the media. To help keep your media in good condition: • Keep media in its storage case. • Avoid flexing or twisting any media. Continued on Page 12 March 2014 k-Byte Page 11 Continued from Page 11 • Do not touch exposed media. • Do not expose magnetic media such as videotapes to magnetic fields (speakers, for example). Alan recommends making backup copies of all digital media—two backups minimum for optical discs and hard drives. And re-copy them every two years or so. “High-8” tapes, especially from Sony, have a 20% failure rate, therefore they should be copied digitally and archived. Tips for digitizing media Alan suggests if you are digitizing home movie films to remember that film deteriorates and becomes brittle, and old projectors can accelerate damage. With slides, look for at least 2,400-dpi scanners with no glass between the scanner and the film, otherwise you may have distortion from Newton rings, an interference pattern created by the reflection of light between two surfaces. Canon is the best scanner brand for prosumers, or try to find an old Microtek 1800F on eBay. A 4,000dpi scan is the best, with 7,200 dpi being overkill, Alan says. Document scanners are affordable at $500 to $600. Alan’s advice for scanning photos is to scan at 600 dpi for photos 5x7 inches or smaller, and at 300 dpi for greater than 5x7 inches. Scanning services usually charge by the hour: $15 to $25. Be careful about cheap scanning services; they work as fast as possible and not necessarily with consistent quality. Also, pick out only the best of your photos to scan to reduce cost. With videotape, “repack” the tape before copying by using fast-forward and fast-rewind before playback and capture. It helps, too, if tapes sit in the machine for a couple of hours before repacking because the heat of the machine makes them more flexible. The best DVDs for general purposes are Verbatim and JVC at the Gold level. Ritek is another good general purpose DVD. Meritline.com and Rima.com are good online resources if you buy at least 50. Go to eBay to obtain a Sony VHS Adaptor for the High-8 reader and capture the output of a VCR. Alan showed us a couple of examples of advanced mixed media montages with voiceover, comprising slides, videos, and music. An external service would charge about $6,000 for a 35-minute professional mixed media show. Video editing software include Adobe Premiere Pro, Sony Vega, ProShow Gold, and Photodex. Be careful, though, of copyright laws when using, for example, Youtube video clips or music. Alan recommends paying for royalty-free music or looking for government newsreels. Continued on Page 14 Page 12 k-Byte March 2014 Photo Gallery This month’s featured photographer: Mike Morris using a Nikon D60 camera Poudre River in the Canyon Camera Settings: Mode = Auto, F Number = 4.20, Exposure time = 1/160 seconds, Focal Length = 60.00 mm., ISO = 200, White Balance = Auto, Scene Capture Type = Standard Copyright © 2011 by Mike Morris. All rights reserved. Send requests for copies/reprint permissions to kbyte(at)frpcug.org. March 2014 k-Byte Page 13 Computer Tutor by Pamela Tabak, http://www.computertutorinc.net, pamela(at)computertutorinc. net QUESTION: I have a flatbed scanner and I notice that when I copy or scan it cuts off about 1/4 of an inch at the top of the page; what is the reason? ANSWER: Check the icons displayed on the case of your scanner. They will show you where you should place your original and also if the printed side should be on the top or underneath. If the printed scan is being cut short each time you scan, it is probably because you are putting the paper to be scanned at the wrong end of the glass. QUESTION: I thought that my new HP printer was set as the default printer for all programs when it was installed but when I clicked 'print' it was silent. Then I realized that it wasn't set as default so I clicked on it in the print dropdown menu and it printed. Can you tell me how I can set my new printer as default so that it is selected each time I print? ANSWER: Go to your 'start menu' or 'Control Panel' and click on 'Printers.' Right Click on your new HP printer model number and choose 'Set as default' from the drop down list. Now every time you wish to print a document your chosen printer will be selected. It is quite safe to delete the old printer from the list if it is no longer in use. QUESTION: I have been using Adobe Reader for many years and now I am unable to open PDF files when they are sent to me by email. Can you explain what has happened? ANSWER: If you have not updated Adobe Reader recently you may not be able to open the PDFs that are written in the latest version. In addition, if you are trying to open them on your mobile device, like an iPad, you will need to download the Adobe Reader APP that is available free from the App Store. With these in place you will be able to open all PDF files that are sent to you. Continued from Page 12 If you wish to digitize tape, look for a Grass Valley Digital Converter that runs output to a computer (upward of $250), or an outside service will do it for $25/hour. Clean dirty or greasy DVDs and CDs from the center out, radially, using a cleaner (Radio Shack has one). Page 14 k-Byte March 2014 Tip of the Month Changing a Folder's Icon (http://windows.tips.net/T011724_Changing_a_Folders_Icon.html) by Barry Dysert, Sharon Parq Associates, http://www.sharonparq.com/ and http://www.tips.net/ Windows can be customized to a great extent. One of the ways to customize it is by choosing your own icons for things. For instance, you can change the icon that's used for a Windows folder. To do that, launch Windows Explorer, navigate to the folder whose icon you wish to change, and rightclick the folder. When the Context menu pops up, select the Properties option. When Windows displays the Properties dialog box for the folder, make sure the Customize tab is displayed. (See Figure at right.) Click the Change Icon button, and Windows displays the Change Icon dialog box. (See Figure at right.) At this point, you can type the name of an .ico file to be used as the folder's icon. Or you could type (or Browse to) the name of a .dll or .exe file that contains icons. You could also select from the set of icons presented in the list. Whatever method you use to choose a new icon, OK your way back to Windows and your new icon will appear for the selected folder. If you later want to revert back to the folder's default icon, go through the same procedure but click the Restore Defaults button before clicking OK. There are a couple of points that should be mentioned about changing a folder's icon. One is that when you change the folder from its default icon, it will no longer show a preview of the folder's contents. Another point to be mentioned is that you can't change the icon of folders in a library. So if what you're trying to do isn't working, be sure you're not in a library. This tip (11724) applies to Windows 7. March 2014 k-Byte Page 15 Calendar of Events This Month: Special Interest Group Meetings Tuesday, March 4th Digital Imaging SIG Agenda Time The Digital Imaging SIG is a forum for discussion of digital imaging hardware and software. The meetings are held every 2nd Tuesday of the month at 7:00 PM in Senior Center room AC1. For more information, connect to http://www. frpcug.org/sigactivities.html. Topic Announcements and raffles. Open Forum Break Password Managers 7:00 to 7:15 7:15 to 7:45 7:45 to 7:55 7:55 to 9:00 Shop Talk One-on-one assistance. Drop in to the Senior Center on any Saturday (holidays excepted) from 11:00 AM to 1:00 PM. For more information, connect to http://frpcug.org/shop_talk.html. Next Month: Tuesday, April 1st Technology SIG Agenda Time 7:00 to 7:15 7:15 to 7:45 7:45 to 7:55 7:55 to 9:00 Topic Announcements and raffles. Open Forum Break Home Inventory Software Check for other FRPCUG events in 2014 at the: Annual Events Calendar Learn what the full FRPCUG Membership Benefits offer you. Then download and complete a Membership Application. Mail the completed application and your payment to the address listed on page 17, or better yet, bring the application to the next meeting. Page 16 The Technology SIG provides advanced support for all PC related operating system and telecommunication issues. The meetings are held at 7:00 PM on the third Thursday of each month at Bluebird Manufacturing Inc., 1421 Webster Avenue, in Fort Collins. For more information, connect to http://www.frpcug.org/sigactivities.html. Board Meeting FRPCUG’s executive board meets on Wednesday of the week following the General Forum meeting. All members are welcome and are encouraged to attend. These meetings are held at 7:00 PM in the Staff Conference Room of the Fort Collins Senior Center. k-Byte March 2014 The Two Month Activities Calendar Sunday March 2014 Monday Tuesday Wednesday Thursday Friday Saturday 1 Shop Talk 11:00 AM to 1:00 PM 2 3 9 10 16 17 18 19 23 24 25 26 30 31 Sunday General Forum Meeting 7:00 PM Digital Imaging SIG Meeting 7:00 PM 11 FRPCUG Board Meeting 7:00 PM 5 6 7 12 13 14 20 21 27 28 Monday Tuesday Wednesday 1 4 9 10 11 17 18 24 25 14 15 16 20 21 22 23 27 28 29 30 k-Byte Tech SIG Meeting 7:00 PM 8 Shop Talk 11:00 AM to 1:00 PM 15 Shop Talk 11:00 AM to 1:00 PM 22 Shop Talk 11:00 AM to 1:00 PM 29 Shop Talk 11:00 AM to 1:00 PM Saturday 3 13 FRPCUG Board Meeting 7:00 PM Friday 2 7 Digital Imaging SIG Meeting 7:00 PM 8 Thursday 6 2014 Tech SIG Meeting 7:00 PM April 2014 General Forum Meeting 7:00 PM March 4 Shop Talk 11:00 AM to 1:00 PM Shop Talk 11:00 AM to 1:00 PM Shop Talk 11:00 AM to 1:00 PM Shop Talk 11:00 AM to 1:00 PM 5 12 19 26 Page 17 About FRPCUG F RPCUG is an independent 501(c)3 nonprofit computer society, incorporated with the State of Colorado and open to anyone interested in personal computers using any operating system (Windows, Linux, MAC, Android); and digital hardware (such as tablets, music/video players, smart phones, etc.). Its purpose is to provide an educational forum of mutual benefit for members of the community regardless of knowledge level. FRPCUG holds a monthly meeting and conducts various special interest groups (SIGs) and seminars. Members have voting privileges, subscription to the k-Byte newsletter, and access to SIGs and selected seminars. Annual dues are $25 for individual/family membership ($20 for students) and $50 for corporate/group membership. Directions to the Meetings T he Fort Collins Senior Center is located at 1200 Raintree Drive. This site is situated at the northwest corner of the Shields and Raintree Drive intersection. It is on the north side of the Raintree Shopping Center, and just west of the bank building at the corner of Shields and Raintree (see map at right). Check the marquee at the main entrance for directions to the specific meeting room (usually Multi-Purpose Room 3 - MP3) Page 18 k-Byte March 2014 About k-Byte P ublished monthly, k-Byte is the official newsletter of the Front Range Personal Computer Users Group (FRPCUG). Our mailing address is PMB 152, 305 W. Magnolia, Fort Collins, Colorado 80521. Opinions expressed in k-Byte are those of the authors and do not necessarily reflect those of the group or its members. Publication of information in k-Byte constitutes no guarantee of accuracy. Use of any information found in this publication is at the sole risk of the user. Neither k-Byte, nor its officers, nor its editors or contributors assume any liability for damages resulting from use of information in this publication. Submissions Articles, letters and short items of interest on computer-related topics are welcome and encouraged. All items submitted for publication are subject to editing. Send your contribution to the editor via e-mail attachment to the editor or submit on a CD. If you have questions about a submission, please contact the editor for information. Copyright and Trademark Information k-Byte is copyrighted © 2014 by the Front Range Personal Computer Users Group. The k-Byte logo and the Front Range PC Users Group logo are Trademarked by the Front Range PC Users Group. Unless otherwise noted, other nonprofit users groups may reprint or quote from any articles appearing in k-Byte without prior permission, provided that: a) proper author and publication credits are given; b) that a copy of the publication (or a link to the publication) in which the article appears is emailed to contact(at)frpcug.org; and c) any additional instructions/restrictions contained in the article are followed. User groups wishing to exchange newsletters with FRPCUG are invited to contact the editor with an exchange request. Disclaimer IBM PC, OS/2, Compaq, HP, Dell, UNIX, Windows, MAC, Apple Computer and other trademarks occasionally mentioned in k-Byte are registered trademarks of International Business Machines, Inc., Hewlett-Packard Corporation, Microsoft Corporation, Dell Inc., Apple Computer Inc. or their owners respectively. Neither FRPCUG nor its newsletter k-Byte are connected with any manufacturer or seller. Acceptance by FRPCUG of donated products or services from suppliers, or inclusion of a supplier in the FRPCUG Partner list does not imply that any continuing financial support is received from or expected by FRPCUG from such activities. Nor do such activities imply an endorsement of either the supplier or product or service. Such information is made available to members as a service. Use of any product or supplier found in this publication, or any FRPCUG publication, is at the sole risk of the user. Masthead credits: Photograph: Drawing: March Summer Sunrise on Longs Peak, copyright © 2011 by Mike Morris Jim Bragonier using GIMP, trademark ™ 2006 by Front Range PC Users Group 2014 k-Byte Page 19 FRPCUG Contacts Telephone Area Code 970 Title Name Work Phone Home Phone E-Mail FRPCUG Officers President Mike Morris 461-2002 twriterext(at)gmail.com Vice President Mike Loughlin 416-5824 mlough(at)frii.com Treasurer Lee Worthington 686-5771 firedog3(at)gmail.com Secretary Open 461-2002 twriterext(at)gmail.com 663-2151 jack(at)frpcug.org 493-2987 cdmcjs(at)gmail.com k-Byte Staff Editor-in-Chief Mike Morris Features Editor Mike Morris Other Contacts Membership Coordinator Jack Linder Technology SIG Leader Chuck McJilton Digital Imaging SIG Leader Mike Morris Publicity Mike Morris FRPCUG Fax Line 491-1011 493-1408 FRPCUG Home Page w/ E-Mail http://www.frpcug.org FRPCUG Officer EMail board(at)frpcug.org Library Request EMail Page 20 library(at)frpcug.org k-Byte March 2014
© Copyright 2024