This Month: Password Managers: What

Vol. 31, No. 3, March 2014
This Month:
Password Managers: What They Are and How
to Use One................................................................ 1
Meeting Previews.................................................... 3
How to Detect IP Address Conflicts in Linux... 10
Preserving Memories in a Digital Age............... 11
Photo Gallery......................................................... 13
Computer Tutor..................................................... 14
Tip of the Month................................................... 15
Calendar of Events................................................ 16
The Two Month Activities Calendar.................. 17
About Us
About FRPCUG............................................... 18
Directions to the Meetings............................. 18
About k-Byte................................................... 19
FRPCUG Contacts........................................... 20
Users Helping Users
Password Managers: What
They Are and How to Use One
by Mike Morris, Front Range PC Users Group,
http://www.frpcug.org, Fort Collins, CO. Originally published in k-Byte, the newsletter of the Front
Range PC Users Group.
Introduction
A password manager application is ". . . software that helps a user organize passwords.
. . . The software typically has a local database
or a file that holds the encrypted password data
for secure logon onto computers, networks, web
sites and application data files . . . ." (Wikipedia).
Before you ask "why bother," think for a moment about how many web sites you connect to
that require a password. Do you use the same
(or very similar) password for most or all of
those web sites? If you are like the overwhelming majority of computer users, the answer to
that question is likely to be "yes."
You should, very definitely, NOT do that!
All of the computer security experts (and there
are a lot of them these days) warn us not to use
the same password for all accounts. For example:
"The message of password reuse security
is one that Hord Tipton, executive director of the International Information System Security Certification Consortium
Continued on Page 2
(ISC2), echoes.
Continued from Page 1
"Diversifying your passwords for each account is essential to protecting all of your
online information," Tipton said. "Once a password has been stolen, hackers often attempt to access multiple accounts, compounding the potential damage.""
Source: Yahoo Email Is Breached: Lessons Learned
See also Password Security, Protection, and Management
With respect to Mr. Tipton, "diversifying your passwords" is much easier said than done . . . unless
you use a password manager.
There are a number of these applications (for example, see this InfoWorld article), but one, KeePass,
is a ". . . free, open source, cross-platform and light-weight password management utility for Microsoft Windows, with unofficial ports for Linux, Mac OS X, iOS and Android . . . ." (Wikipedia).
In fact, if you need a lot of passwords (I counted over 70 web sites that I use that need a password),
it is almost impossible to keep track of them. But even if you have just a few (10 or a dozen), a password manager can be extremely helpful, and provide an extra measure of security for you.
How do password managers provide this extra security?
With KeePass the extra security is provided through these features:
1. All your passwords are stored in one database.
2. The database is locked with one master key or a key file, so you only have to remember one
single master password (OK, you also need to remember the password to your computer, so
that's 2 passwords you have to remember).
3. The database(s) is (are) encrypted using (one of) the best and most secure encryption algorithms currently known (AES).
4. KeePass can generate strong random passwords for you.
Source: KeePass Password Safe
Since KeePass is open source, you get this extra security for free.
If all of those features sound a little "techie," don't worry, KeePass is actually easy to use. Therefore, KeePass (v. 2.20) will be used to demonstrate how you use a password manager application.
As with all good things, it takes a little effort to enter the data--at least, it does if you need as many
passwords as I do.
Installation
You can download the current version (which, as of 02/04/2014, for Windows, is 2.25) from the
KeePass web site, http://keepass.info/. The installation follows the usual Windows sequence. However there is one window in the sequence worth a comment:
Continued on Page 4
Page 2
k-Byte
March
2014
Meeting Previews
This Month:
All the computer security experts (and boy oh boy there are a lot of 'em these days) tell us not to use
the same password for every account (e.g., see https://www.us-cert.gov/sites/default/files/publications/PasswordMgmt2012.pdf).
That's easier said than done, since just about everything you connect to on the internet needs a password.
The solution: Password Managers.
Plan to attend the March meeting for tips on how to use these applications.
Next Month:
Are you prepared for a natural disaster (or any loss of your property)? The Insurance Information
Institute (http://www2.iii.org/about-us.html) says that "having an up-to-date home inventory will
help you:
• Purchase enough insurance to replace the things you own.
• Get your insurance claims settled faster.
• Substantiate losses for your income tax return."
There are many ways to create that inventory. We will examine several free software applications
for this purpose at the April meeting.
March
2014
k-Byte
Page 3
Continued from Page 2
This step may not be necessary at this point, but establishing that file association at the beginning
probably reduces the risk of future problems.
Set Up
Once the installation is complete, at the first launch you will see the KeePass main screen:
At this point, you have two primary set up tasks:
1. Create a database
2. Enter data into the database
You create a database with these steps:
Click on File, then on New:
Continued on Page 5
Page 4
k-Byte
March
2014
Continued from Page 4
You will be asked (in the usual Windows format) to decide where you want to save the program.
Here is an example of that window from my computer:
The default Save location for Windows 7 is, of course, Documents. Remember, you can choose to
save the database anywhere on your computer. I set up a separate folder called KeePass in the root
directory of my hard drive and saved the database there (just my preference).
Note also that a default "File name" is entered. I modified that name, in the expectation (as yet unproven), that I will eventually need multiple databases. I chose NewDatabase_1.
With the location and file name selected, click on Save. You will see:
You enter a Master Password into this window. It needs to be a "strong" password, but it also needs
to be something you can remember. A “strong” password is:
“A password that is hard to detect both by humans and by the computer. Two things
make a password stronger: (1) a larger number of characters, and (2) mixing numeric
digits, upper and lower case letters and special characters ($, #, etc.).”
Source: PC Magazine
This password you may want to write down (yes, using the old fashioned pencil and paper); and
although this should be obvious, don’t identify it on that piece of paper. You may also want to keep
it with you.
Continued on Page 6
March
2014
k-Byte
Page 5
Continued from Page 5
From the KeePass Help file (Composite Master Key):
“If you forget this master password, all your other passwords in the database are lost,
too. There isn't any backdoor or a key which can open all databases. There is no way
of recovering your passwords.”
A more detailed discussion of passwords vs. key files is available from the Composite Master Key
section of the KeePass Help file.
If creating a strong password that you can remember seems contradictory, enter:
how to create strong passwords that you can remember
into your favorite search engine. You will find many articles with suggestions.
After you enter your password, click on the OK button at the bottom right of the Create Composite
Master Key window. You will see something similar to this (I will talk about the Database Settings
window that is part of the database creation process later—the default values are acceptable):
You can add groups, and/or modify their order. However, you are, at this point, ready to enter
data. You use the “Add Entry” window for this task. It is available from the Edit menu and from
the Toolbar:
Continued on Page 7
Page 6
k-Byte
March
2014
Continued from Page 6
When the Add Entry window is displayed, it will already contain an automatically generated strong
password:
Your user name will also be included. The only field required, other than the password, is the URL
of the web site for which you want to use this password.
By the way, that Notes field is a handy place to record the answers to all those security questions
you are asked when you register at any web site. You add as many entries as you need passwords.
If you choose to organize them into groups, click on the group name in the left panel before you
click on Add Entry.
I want to depart momentarily from this sequence and return to the Create New Password Database
steps. You will see a Database Settings window during this set up (you can also access Settings
from the File menu after the database is created). All of those settings can be left at their default
values. However, you may want to enter a description. For example:
How to Use the Password
Here are the steps for using the password:
1. Connect to the log in window of the web site of interest. You can also connect to the web site
from KeePass. Right click on the entry for that web site and then click on URL. If you have
more than one browser installed (as I do), you can choose which one to use from the list that
is displayed:
Continued on Page 8
March
2014
k-Byte
Page 7
Continued from Page 7
2. Once you are connected to the web site’s log in window, in KeePass, right click on the entry
for that web site and then click on “Copy User Name”:
Return to web site log in screen and paste the user name into the appropriate field (you
could, of course, just type that in).
3. In KeePass, right click (again) on the entry for that web site and this time click on “Copy
Password.”
Return to web site log in screen and paste the password into the appropriate field.
4. Click on the log in or sign in button for the web site.
There is one important note regarding these steps. You have only a limited (but adjustable) time
to paste the user name or password after you copy it. KeePass will clear the Clipboard after some
number of seconds for security reasons. That time is set in the Security tab of the Tools/Options
menu item:
Note that in the image above, that time is set to 12 seconds.
Continued on Page 9
Page 8
k-Byte
March
2014
Continued from Page 8
Extras
So far, these instructions cover just the basics. There are many extras, three of which are worth
mentioning, although not discussed here in detail (see the KeePass Help file).
1. Generate your own passwords: If you are not satisfied with the automatically generated
passwords (or, if the website to which you want to connect only accepts a smaller number of
characters), you can create your own. Click on the icon under the 3 dots and you will see:
2. Mobility: There is a “portable” version (http://keepass.info/download.html) that you can
install on a flash drive that will allow you to use KeePass on any other computer (with
some restrictions—see the KeePass Help file) “without creating any new registry keys and it
doesn't create any configuration files in your Windows or application data directory of your
user profile.”
3. Plugins: There are a large number of plugins available (http://keepass.info/plugins.html),
including one called KeeForm that will "(open) websites and fill in the login data automatically, for Internet Explorer and Firefox." Before you install any plugin, be sure to read the
Plugins for KeePass 2.x information.
Acknowledgements
Thanks to Front Range PC Users Group member Bert Broekstra for his help with learning this program.
Thanks to Front Range PC Users Group member Herb Cantor for finding the “Yahoo Email is
Breached . . .” article and for sending the link to me.
It's the world's largest . . . what?
March
2014
k-Byte
Page 9
How to Detect IP Address Conflicts in Linux
by Dan Nanni, http://xmodulo.com/2012/03/how-to-detect-ip-address-conflicts-in.html.
Licensed under a Creative Commons Attribution-ShareAlike 3.0 Unported License.
I P addresses are a scarce resource that is shared by different users and devices. Having an IP address conflict means that there are more than one network device or computer that claims the
same IP address. IP address conflict may occur when a DHCP server has assigned an IP address to
one computer, and the same IP address happens to be statically assigned to another network device
by someone.
IP address conflict can also happen when there are more than one DHCP server (typically built in a
router) hooked up to the local network, autonomously giving out IP addresses from the same subnet. If you are having flaky network connectivity, and suspect it is due to IP address conflicts, you
can use a tool called arp-scan to detect IP address conflicts in Linux.
arp-scan sends out ARP packets on local network to collect (IP address, Ethernet MAC address). If
there is more than one Ethernet MAC address claiming the same IP address, it means there is an IP
conflict.
To install arp-scan on Ubuntu or Debian:
$ sudo apt-get install arp-scan
To install arp-scan on CentOS, Fedora or Redhat:
$ sudo yum install arp-scan
To detect IP address conflicts with arp-scan, run the following:
$ sudo arp-scan -I eth0 -l
192.168.1.10
192.168.1.30
192.168.1.33
192.168.1.37
192.168.1.38
192.168.1.39
192.168.1.39
192.168.1.40
00:1b:a9:63:a2:4c
00:1e:8f:58:ec:49
00:25:4b:1b:10:20
10:9a:dd:55:d7:95
20:c9:d0:27:8d:56
d4:85:64:4d:35:be
00:0b:46:e4:8e:6d
90:2b:34:18:59:c0
BROTHER INDUSTRIES, LTD.
CANON INC.
Apple, Inc
Apple Inc
(Unknown)
Hewlett Packard
Cisco (DUP: 2)
(Unknown)
According to the example output shown above, IP address 192.168.1.39 is in conflict, where two different MAC addresses are claiming the same IP address.
Page 10
k-Byte
March
2014
Preserving Memories in a Digital Age
by Mike Hancock, Golden Gate Computer Society, CA, http://www.ggcs.org, editor (at) ggcs.org. Originally
published in the GGCS Newsletter.
M ore than 30 years ago—in 1982—videotapes came to the market. By now, though, many are
degenerating. Alan Kolsky, of Digital Video Dimensions, startled attendees of a GGCS General Meeting by enumerating the probable life spans of various media:
•
•
•
•
•
•
•
•
•
CDs: 5—100 years
Newspapers: 10—20
Data-grade VHS videotape: 10—30
Digital linear tape: 10—300
Other magnetic tape: 10—30
Microfilm: 10—500
Photographic slides: 100
Archival grade acid-free paper: 10—500
Egyptian stone tablet: 2,000!
But people often want to digitize home movies, slides, videotapes, audio recordings, documents,
and photos for storage and ease of presentation. Some authorities argue that because of rapid advances in technology enhanced media longevity is questionable.
Future trends that will affect archiving include higher resolution and solid-state storage. “4K”
resolution video format (4,000 pixels in horizontal direction) is coming and is needed for the huge
monitors, which tend to have much softer resolution than smaller monitors.
“Ultra HD” is on its way, too. 64GB thumb drives are readily available, and solid-state drives are
being introduced to computers and will displace mechanical drives and players. DVDs are ubiquitous today, but Alan warned us that improper handling can rapidly degrade them. Hold DVDs at
their edges, across their diameter; do not handle them on their recording face, and do not handle
them roughly. Also, avoid using paper stick on labels because they cause wobbling and thus poorer
recording.
These factors affect the life of any media:
•
•
•
•
•
Quality of the original media. Kodachrome slides from the ’50s are still beautiful.
The number of times the media are accessed.
Storage temperature and humidity; store in a cool, dry place.
Cleanliness of the storage environment.
Quality of the device used to read/write the media.
To help keep your media in good condition:
• Keep media in its storage case.
• Avoid flexing or twisting any media.
Continued on Page 12
March
2014
k-Byte
Page 11
Continued from Page 11
• Do not touch exposed media.
• Do not expose magnetic media such as videotapes to magnetic fields (speakers, for example).
Alan recommends making backup copies of all digital media—two backups minimum for optical
discs and hard drives. And re-copy them every two years or so. “High-8” tapes, especially from
Sony, have a 20% failure rate, therefore they should be copied digitally and archived.
Tips for digitizing media
Alan suggests if you are digitizing home movie films to remember that film deteriorates and becomes brittle, and old projectors can accelerate damage.
With slides, look for at least 2,400-dpi scanners with no glass between the scanner and the film, otherwise you may have distortion from Newton rings, an interference pattern created by the reflection
of light between two surfaces.
Canon is the best scanner brand for prosumers, or try to find an old Microtek 1800F on eBay. A
4,000dpi scan is the best, with 7,200 dpi being overkill, Alan says.
Document scanners are affordable at $500 to $600. Alan’s advice for scanning photos is to scan at
600 dpi for photos 5x7 inches or smaller, and at 300 dpi for greater than 5x7 inches.
Scanning services usually charge by the hour: $15 to $25. Be careful about cheap scanning services;
they work as fast as possible and not necessarily with consistent quality. Also, pick out only the best
of your photos to scan to reduce cost.
With videotape, “repack” the tape before copying by using fast-forward and fast-rewind before
playback and capture. It helps, too, if tapes sit in the machine for a couple of hours before repacking
because the heat of the machine makes them more flexible.
The best DVDs for general purposes are Verbatim and JVC at the Gold level. Ritek is another good
general purpose DVD. Meritline.com and Rima.com are good online resources if you buy at least
50.
Go to eBay to obtain a Sony VHS Adaptor for the High-8 reader and capture the output
of a VCR.
Alan showed us a couple of examples of advanced mixed media montages with voiceover, comprising slides, videos, and music. An external service would
charge about $6,000 for a 35-minute professional mixed media show.
Video editing software include Adobe Premiere Pro, Sony Vega, ProShow Gold, and Photodex. Be
careful, though, of copyright laws when using, for example, Youtube video clips or music. Alan
recommends paying for royalty-free music or looking for government newsreels.
Continued on Page 14
Page 12
k-Byte
March
2014
Photo Gallery
This month’s featured photographer:
Mike Morris using a Nikon D60 camera
Poudre River in the Canyon
Camera Settings:
Mode = Auto, F Number = 4.20, Exposure time = 1/160 seconds, Focal Length = 60.00 mm., ISO = 200,
White Balance = Auto, Scene Capture Type = Standard
Copyright © 2011 by Mike Morris. All rights reserved. Send requests for copies/reprint permissions to kbyte(at)frpcug.org.
March
2014
k-Byte
Page 13
Computer Tutor
by Pamela Tabak, http://www.computertutorinc.net, pamela(at)computertutorinc.
net
QUESTION: I have a flatbed scanner and I notice that when I copy or scan it
cuts off about 1/4 of an inch at the top of the page; what is the reason?
ANSWER: Check the icons displayed on the case of your scanner. They will
show you where you should place your original and also if the printed side
should be on the top or underneath. If the printed scan is being cut short each
time you scan, it is probably because you are putting the paper to be scanned
at the wrong end of the glass.
QUESTION: I thought that my new HP printer was set as the default printer for all programs when
it was installed but when I clicked 'print' it was silent. Then I realized that it wasn't set as default so
I clicked on it in the print dropdown menu and it printed. Can you tell me how I can set my new
printer as default so that it is selected each time I print?
ANSWER: Go to your 'start menu' or 'Control Panel' and click on 'Printers.' Right Click on your
new HP printer model number and choose 'Set as default' from the drop down list. Now every time
you wish to print a document your chosen printer will be selected. It is quite safe to delete the old
printer from the list if it is no longer in use.
QUESTION: I have been using Adobe Reader for many years and now I am unable to open PDF
files when they are sent to me by email. Can you explain what has happened?
ANSWER: If you have not updated Adobe Reader recently you may not be able to open the PDFs
that are written in the latest version. In addition, if you are trying to open them on your mobile device, like an iPad, you will need to download the Adobe Reader APP that is available free from the
App Store. With these in place you will be able to open all PDF files that are sent to you.
Continued from Page 12
If you wish to digitize tape, look for a Grass Valley Digital Converter that runs output to a computer
(upward of $250), or an outside service will do it for $25/hour. Clean dirty or greasy DVDs and CDs
from the center out, radially, using a cleaner (Radio Shack has one).
Page 14
k-Byte
March
2014
Tip of the Month
Changing a Folder's Icon (http://windows.tips.net/T011724_Changing_a_Folders_Icon.html)
by Barry Dysert, Sharon Parq Associates, http://www.sharonparq.com/ and http://www.tips.net/
Windows can be customized to a great extent. One of the ways to customize it is by choosing your
own icons for things. For instance, you can change the icon that's used for a Windows folder. To do
that, launch Windows Explorer, navigate to the folder whose icon you wish to change, and rightclick the folder. When the Context menu pops up, select the Properties option. When Windows
displays the Properties dialog box for the folder, make sure the
Customize tab is displayed. (See Figure at right.)
Click the Change Icon button, and Windows displays the Change Icon dialog box. (See Figure at right.)
At this point, you can type the name of an .ico file to be used as the folder's
icon. Or you could type (or Browse to) the name of a .dll or .exe file that
contains icons. You could also select from the set of icons presented in the
list. Whatever method you use to choose a new icon, OK your way back to
Windows and your new icon will appear for the selected folder. If you later
want to revert back to the folder's default icon, go through the same procedure but click the Restore Defaults button before clicking OK.
There are a couple of points that should be mentioned about changing a folder's icon. One is that
when you change the folder from its default icon, it will no longer show a preview of the folder's
contents. Another point to be mentioned is that you can't change the icon of folders in a library. So if
what you're trying to do isn't working, be sure you're not in a library.
This tip (11724) applies to Windows 7.
March
2014
k-Byte
Page 15
Calendar of Events
This Month:
Special Interest Group Meetings
Tuesday, March 4th
Digital Imaging SIG
Agenda
Time
The Digital Imaging SIG is a forum for discussion of digital imaging hardware and software.
The meetings are held every 2nd Tuesday of the
month at 7:00 PM in Senior Center room AC1.
For more information, connect to http://www.
frpcug.org/sigactivities.html.
Topic
Announcements and
raffles.
Open Forum
Break
Password Managers
7:00 to 7:15
7:15 to 7:45
7:45 to 7:55
7:55 to 9:00
Shop Talk
One-on-one assistance. Drop in to the Senior
Center on any Saturday (holidays excepted)
from 11:00 AM to 1:00 PM. For more information, connect to http://frpcug.org/shop_talk.html.
Next Month:
Tuesday, April 1st
Technology SIG
Agenda
Time
7:00 to 7:15
7:15 to 7:45
7:45 to 7:55
7:55 to 9:00
Topic
Announcements and
raffles.
Open Forum
Break
Home Inventory Software
Check for other FRPCUG events in 2014 at the:
Annual Events Calendar
Learn what the full FRPCUG Membership Benefits offer you. Then download and complete a
Membership Application. Mail the completed
application and your payment to the address
listed on page 17, or better yet, bring the application to the next meeting.
Page 16
The Technology SIG provides advanced support
for all PC related operating system and telecommunication issues. The meetings are held at 7:00
PM on the third Thursday of each month at Bluebird Manufacturing Inc., 1421 Webster Avenue,
in Fort Collins. For more information, connect to
http://www.frpcug.org/sigactivities.html.
Board Meeting
FRPCUG’s executive board meets on Wednesday
of the week following the General Forum meeting. All members are welcome and are encouraged to attend.
These meetings are held at 7:00 PM in the Staff
Conference Room of the Fort Collins Senior Center.
k-Byte
March
2014
The Two Month Activities Calendar
Sunday
March 2014
Monday
Tuesday
Wednesday
Thursday
Friday
Saturday
1
Shop Talk
11:00 AM to
1:00 PM
2
3
9
10
16
17
18
19
23
24
25
26
30
31
Sunday
General Forum
Meeting
7:00 PM
Digital Imaging
SIG Meeting
7:00 PM
11
FRPCUG Board
Meeting
7:00 PM
5
6
7
12
13
14
20
21
27
28
Monday
Tuesday
Wednesday
1
4
9
10
11
17
18
24
25
14
15
16
20
21
22
23
27
28
29
30
k-Byte
Tech SIG Meeting
7:00 PM
8
Shop Talk
11:00 AM to
1:00 PM
15
Shop Talk
11:00 AM to
1:00 PM
22
Shop Talk
11:00 AM to
1:00 PM
29
Shop Talk
11:00 AM to
1:00 PM
Saturday
3
13
FRPCUG Board
Meeting
7:00 PM
Friday
2
7
Digital Imaging
SIG Meeting
7:00 PM
8
Thursday
6
2014
Tech SIG Meeting
7:00 PM
April 2014
General Forum
Meeting
7:00 PM
March
4
Shop Talk
11:00 AM to
1:00 PM
Shop Talk
11:00 AM to
1:00 PM
Shop Talk
11:00 AM to
1:00 PM
Shop Talk
11:00 AM to
1:00 PM
5
12
19
26
Page 17
About FRPCUG
F RPCUG is an independent 501(c)3 nonprofit computer society, incorporated with the State of
Colorado and open to anyone interested in personal computers using any operating system
(Windows, Linux, MAC, Android); and digital hardware (such as tablets, music/video players,
smart phones, etc.). Its purpose is to provide an educational forum of mutual benefit for members
of the community regardless of knowledge level. FRPCUG holds a monthly meeting and conducts
various special interest groups (SIGs) and seminars. Members have voting privileges, subscription
to the k-Byte newsletter, and access to SIGs and selected seminars. Annual dues are $25 for individual/family membership ($20 for students) and $50 for corporate/group membership.
Directions to the Meetings
T he Fort Collins Senior Center is located at
1200 Raintree Drive. This site is situated at
the northwest corner of the Shields and Raintree
Drive intersection. It is on the north side of the
Raintree Shopping Center, and just west of the
bank building at the corner of Shields and Raintree (see map at right).
Check the marquee at the main entrance for
directions to the specific meeting room (usually
Multi-Purpose Room 3 - MP3)
Page 18
k-Byte
March
2014
About k-Byte
P ublished monthly, k-Byte is the official newsletter of the Front Range Personal Computer Users
Group (FRPCUG). Our mailing address is PMB 152, 305 W. Magnolia, Fort Collins, Colorado
80521.
Opinions expressed in k-Byte are those of the authors and do not necessarily reflect those of the
group or its members. Publication of information in k-Byte constitutes no guarantee of accuracy.
Use of any information found in this publication is at the sole risk of the user. Neither k-Byte, nor
its officers, nor its editors or contributors assume any liability for damages resulting from use of
information in this publication.
Submissions
Articles, letters and short items of interest on computer-related topics are welcome and encouraged.
All items submitted for publication are subject to editing. Send your contribution to the editor via
e-mail attachment to the editor or submit on a CD. If you have questions about a submission, please
contact the editor for information.
Copyright and Trademark Information
k-Byte is copyrighted © 2014 by the Front Range Personal Computer Users Group. The k-Byte logo
and the Front Range PC Users Group logo are Trademarked by the Front Range PC Users Group.
Unless otherwise noted, other nonprofit users groups may reprint or quote from any articles appearing in k-Byte without prior permission, provided that: a) proper author and publication credits
are given; b) that a copy of the publication (or a link to the publication) in which the article appears
is emailed to contact(at)frpcug.org; and c) any additional instructions/restrictions contained in the
article are followed. User groups wishing to exchange newsletters with FRPCUG are invited to contact the editor with an exchange request.
Disclaimer
IBM PC, OS/2, Compaq, HP, Dell, UNIX, Windows, MAC, Apple Computer and other trademarks
occasionally mentioned in k-Byte are registered trademarks of International Business Machines,
Inc., Hewlett-Packard Corporation, Microsoft Corporation, Dell Inc., Apple Computer Inc. or their
owners respectively. Neither FRPCUG nor its newsletter k-Byte are connected with any manufacturer or seller. Acceptance by FRPCUG of donated products or services from suppliers, or inclusion
of a supplier in the FRPCUG Partner list does not imply that any continuing financial support is received from or expected by FRPCUG from such activities. Nor do such activities imply an endorsement of either the supplier or product or service. Such information is made available to members as
a service. Use of any product or supplier found in this publication, or any FRPCUG publication, is
at the sole risk of the user.
Masthead credits:
Photograph:
Drawing:
March
Summer Sunrise on Longs Peak, copyright © 2011 by Mike Morris
Jim Bragonier using GIMP, trademark ™ 2006 by Front Range PC Users Group
2014
k-Byte
Page 19
FRPCUG Contacts
Telephone Area Code 970
Title
Name
Work Phone
Home Phone
E-Mail
FRPCUG Officers
President
Mike Morris
461-2002
twriterext(at)gmail.com
Vice President
Mike Loughlin
416-5824
mlough(at)frii.com
Treasurer
Lee Worthington
686-5771
firedog3(at)gmail.com
Secretary
Open
461-2002
twriterext(at)gmail.com
663-2151
jack(at)frpcug.org
493-2987
cdmcjs(at)gmail.com
k-Byte Staff
Editor-in-Chief
Mike Morris
Features Editor
Mike Morris
Other Contacts
Membership
Coordinator
Jack Linder
Technology
SIG Leader
Chuck McJilton
Digital Imaging
SIG Leader
Mike Morris
Publicity
Mike Morris
FRPCUG Fax Line
491-1011
493-1408
FRPCUG Home Page
w/ E-Mail
http://www.frpcug.org
FRPCUG Officer EMail
board(at)frpcug.org
Library Request EMail
Page 20
library(at)frpcug.org
k-Byte
March
2014