Top Banner
Bits, Bytes and Bugs Publication of the South County Older Residents Computer Club Volume 30 Issue 6 - June 2020 - Our 29th year of helping seniors with computers Saint Louis COUNTY HUMAN SERVICES In This Issue Board Members .................................................................................................. Page 1 Treasurer’s Report .............................................................................................. Page 1 June Meeting info................................................................................................ Page 1 May Meeting Minutes ........................................................................................ Page 17 Special Interest Group & Events Calendar ........................................................ Page 18 BITS, BYTES & BUGS Protecting users from potentially unwanted applications in Microsoft Edge ..... Page 2 & 3 The Making of a Microchip .................................................................................. Page 3 Keyboard Shortcuts Google Chrome/Chromium Users should know .................. Page 4 Can You Get a Virus on Your Smart TV? ............................................................ Page 5 How to Copy the Full Path of a File on Windows 10...........................................Page 5 & 6 ANDROID TIPS AND TRICKS ..................................................................... Page 6 & 7 Windows Task Manager Tricks You Probably Didn’t Know ............................................ ................................................................................................. Page 8, 9, 10, 11, 12, 13 & 14 Change What Windows Does When You Shut Your Laptop’s Lid .......Page 14, 15 & 16 Are You Worried About Smart Home Devices Listening to You? ...................... Page 17 A Senior’s Version of FACEBOOK .................................................................... Page 17 TREASURER’S REPORT Balance April 6, 2020 ......................... $3,203.05 Receipts.................................................. $30.00 Subtotal ............................................. $3,233.05 Disbursements ........................................ ($0.00) Balance April 29, 2020 ....................... $3,233.05 Notify Treasurer Mike Svoboda of any changes to your mailing or e-mail address. [email protected] Visit the SCORCC Website at http://www.scorcc.org On the site you will find a club history, pictures of the officers, SIG chairs, committee chairs and information about the Special Interest Groups (SIGs), and a calendar of upcoming events. The member list page with contact information for all active SCORCC members is accessible only by password for your protection. After joining the club, new members will receive an e-mail from the SCORCC Webmaster with the password. For questions about the Web site e-mail [email protected]. Virtual MeetingJune 9 th Meeting at 1pm Produced by Cathy Amen using Zoom Video Conferencing Watch for your Email invitation Moderated by Norman Miller followed by this month’s presentation “Windows 10 settings” Chris Sellmeyer - tweaks for security and changes to speed up your computer IN MEMORIAM Thelma Urich Passed Away On May 16. She joined SCORCC in Oct 1997 Thelma will be missed
19

Bits, Bytes and Bugs COUNTY Saint Louis · June 2020 Bits, Bytes and Bugs Page 2 Protecting users from potentially unwanted applications in Microsoft Edge By Microsoft Edge Team [from

Jul 21, 2020

Download

Documents

dariahiddleston
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Bits, Bytes and Bugs COUNTY Saint Louis · June 2020 Bits, Bytes and Bugs Page 2 Protecting users from potentially unwanted applications in Microsoft Edge By Microsoft Edge Team [from

Bits, Bytes and Bugs

Publication of the South County Older Residents Computer Club

Volume 30 Issue 6 - June 2020 - Our 29th year of helping seniors with computers

Saint Louis

COUNTY

HUMAN SERVICES

In This Issue

Board Members .................................................................................................. Page 1

Treasurer’s Report .............................................................................................. Page 1

June Meeting info................................................................................................ Page 1

May Meeting Minutes ........................................................................................ Page 17

Special Interest Group & Events Calendar ........................................................ Page 18

BITS, BYTES & BUGS

Protecting users from potentially unwanted applications in Microsoft Edge ..... Page 2 & 3

The Making of a Microchip .................................................................................. Page 3

Keyboard Shortcuts Google Chrome/Chromium Users should know .................. Page 4

Can You Get a Virus on Your Smart TV? ............................................................ Page 5

How to Copy the Full Path of a File on Windows 10 ........................................... Page 5 & 6

ANDROID TIPS AND TRICKS ..................................................................... Page 6 & 7

Windows Task Manager Tricks You Probably Didn’t Know ............................................

................................................................................................. Page 8, 9, 10, 11, 12, 13 & 14

Change What Windows Does When You Shut Your Laptop’s Lid .......Page 14, 15 & 16

Are You Worried About Smart Home Devices Listening to You? ...................... Page 17

A Senior’s Version of FACEBOOK .................................................................... Page 17

TREASURER’S REPORT

Balance April 6, 2020 ......................... $3,203.05

Receipts.................................................. $30.00

Subtotal ............................................. $3,233.05

Disbursements ........................................ ($0.00)

Balance April 29, 2020 ....................... $3,233.05

Notify Treasurer Mike Svoboda of any changes to your mailing or e-mail address.

[email protected]

Visit the SCORCC Website at http://www.scorcc.org

On the site you will find a club history, pictures of the officers, SIG chairs, committee chairs and information about the Special Interest Groups (SIGs), and a calendar of upcoming events. The member list page with contact information for all active SCORCC members is accessible only by password for your protection. After joining the club, new members will receive an e-mail from the SCORCC Webmaster with the password. For questions about the Web site e-mail [email protected].

“Virtual Meeting” June 9

th Meeting at 1pm

Produced by Cathy Amen using

Zoom Video Conferencing Watch for your Email invitation

Moderated by Norman Miller followed by this month’s presentation

“Windows 10 settings” Chris Sellmeyer - tweaks for security

and changes to speed up your computer

IN MEMORIAM Thelma Urich

Passed Away On May 16. She joined SCORCC in Oct 1997

Thelma will be missed

Page 2: Bits, Bytes and Bugs COUNTY Saint Louis · June 2020 Bits, Bytes and Bugs Page 2 Protecting users from potentially unwanted applications in Microsoft Edge By Microsoft Edge Team [from

June 2020 Bits, Bytes and Bugs Page 2

Protecting users from potentially unwanted applications in Microsoft Edge By Microsoft Edge Team [from Norman Miller]

Our customer feedback tells us that when users search for free versions of software, they often find applications with a poor reputation being installed on the machine at the same time. This pattern indicates that the user has downloaded an application which shows offers (or bundles) for potentially unwanted applications (PUA).

Potentially unwanted applications can make the user less productive, make the user’s machine less performant, and lead to a degraded Windows experience. Examples of PUA include software that creates extra advertisements, applications that mine cryptocurrency, applications that show offers for other software and applications that the AV industry considers having a poor reputation.

In the new Microsoft Edge (beginning with 80.0.338.0), we’ve introduced a new feature to prevent downloads that may contain potentially unwanted apps (PUA), by blocking those apps from downloading. This feature is off by default, but can be turned on in three easy steps:

1. Tap … (Settings and more) > Settings. 2. Choose Privacy and services. 3. Scroll down to Services, and then turn on Block potentially unwanted apps.

Here is what users will see when a download is blocked by the feature (Note: PUA blocking requires Microsoft Defender SmartScreen to be enabled):

To learn more about what Microsoft defines as PUA, see the criteria in our documentation.

If an app has been mislabeled as PUA, users can choose to keep it by tapping … in the bottom bar,

choosing Keep, and then choosing Keep anyway in the dialog that appears.

BITS, BYTES & BUGS Different operating systems and different Original Equipment

Manufacturer releases react differently to certain commands.

[continued page 3]

Page 3: Bits, Bytes and Bugs COUNTY Saint Louis · June 2020 Bits, Bytes and Bugs Page 2 Protecting users from potentially unwanted applications in Microsoft Edge By Microsoft Edge Team [from

June 2020 Bits, Bytes and Bugs Page 3

Our goal is to assist users in getting the apps they want, while empowering them to maintain control over their devices and experiences.

You can learn more about how Microsoft identifies malware, unwanted software, and PUA in our security documentation.

We encourage users to always try to download software from a trusted location, such as the publisher’s website or a reputable app store, and to check reviews of the app and the reputation of the publisher before downloading.

If you are an admin or IT professional and are interested in enabling this feature on for your users, see our enterprise documentation here.

We hope you’ll try out this new feature in the new Microsoft Edge and let us know what you think! Give us your feedback by clicking the feedback link in the upper right corner of your browser or pressing Alt-Shift-I to send feedback.

The Making of a Microchip [from Norman Miller] Ever wonder what’s under the hood of your favorite electronic device? The transistor is the engine

that powers every Intel processor. To build a modern computer chip, our engineers place billions of these tiny switches into an area no larger than a fingernail. It’s one of mankind’s most complex feats, and it’s happening every day across Intel’s global network of chip manufacturing facilities. Check out this video to learn more about how we turn sand into the silicon chips that power the world

Link to video: The Making of a Microchip

More: Manufacturing at Intel

Page 4: Bits, Bytes and Bugs COUNTY Saint Louis · June 2020 Bits, Bytes and Bugs Page 2 Protecting users from potentially unwanted applications in Microsoft Edge By Microsoft Edge Team [from

June 2020 Bits, Bytes and Bugs Page 4

Keyboard Shortcuts Google Chrome/Chromium Users should know from Norman Miller 1. Open a new tab with Ctrl+T

Need to open a new tab? Just press Ctrl and T keys together and you’ll have a new tab opened. 2. Open a new window with Ctrl+N

Too many tabs opened already? Time to open a fresh new window. Use Ctrl and N keys to open a new browser window. 3. Go incognito with Ctrl+Shift+N

Checking flight or hotel prices online? Going incognito might help. Open an incognito window in Chrome with Ctrl+Shift+N. 4. Close a tab with Ctrl+W

Close the current tab with Ctrl and W key. No need to take the mouse to the top and look for the x button. 5. Accidentally closed a tab? Reopen it with Ctrl+Shift+T

This is my favorite Google Chrome shortcut. No more ‘oh crap’ when you close a tab you didn’t mean to. Use the Ctrl+Shift+T and it will open the last closed tab. Keep hitting this key combination and it will keep on bringing the closed tabs. 6. Close the entire browser window with Ctrl+Shift+W

Done with you work? Time to close the entire browser window with all the tabs. Use the keys Ctrl+Shift+W and the browser window will disappear like it never existed. 7. Switch between tabs with Ctrl+Tab

Too many tabs open? You can move to right tab with Ctrl+Tab. Want to move left? Use Ctrl+Shift+Tab. Press these keys repeatedly and you can move between all the open tabs in the current browser window.

You can also use Ctrl+0 till Ctrl+9 to go to one of the first 10 tabs. But this Chrome keyboard shortcut doesn’t work for the 11th tabs onward. 8. Go to the search/address bar with Ctrl+L

Want to type a new URL or search something quickly. You can use Ctrl+L and it will highlight the address bar on the top. 9. Bookmark the current website with Ctrl+D

Found something interesting? Save it in your bookmarks with Ctrl+D keys combination. 10. Go back in history with Ctrl+H

You can open up your browser history with Ctrl+H keys. Search through the history if you are looking for a page visited some time ago or delete something that you don’t want to be seen anymore. 11. See your downloads with Ctrl+J

Pressing the Ctrl+J keys in Chrome will take you to the Downloads page. This page will show you all the downloads action you performed. Bonus shortcut: Open Chrome task manager with Shift+Esc

Many people doesn’t even know that there is a task manager in Chrome browser. Chrome is infamous for eating up your system’s RAM. And when you have plenty of tabs opened, finding the culprit is not easy. With Chrome task manager, you can see all the open tabs and their system utilization stats. You can also see various hidden processes such as Chrome extensions and other services.

Google Chrome Task Manager I am going to this table here for a quick reference.

Page 5: Bits, Bytes and Bugs COUNTY Saint Louis · June 2020 Bits, Bytes and Bugs Page 2 Protecting users from potentially unwanted applications in Microsoft Edge By Microsoft Edge Team [from

June 2020 Bits, Bytes and Bugs Page 5

Can You Get a Virus on Your Smart TV? The short answer is yes, a smart TV can get a virus and malware.

Should I Be Worried? While getting a virus on your smart TV may seem like a cause for concern, it shouldn’t be. They’re

not common because it’s not easy to create viruses that work on TVs. Many TVs come with some native features that make it hard for developers to create malware and similar threats that can successfully infect a TV for several reasons.

Certain conditions must be met before a hacker can attack your TV. For example, if your TV’s ADB bugging feature is enabled, the hacker is on the same network as yours and can hijack your DNS resolution or access the network path.

One of these reasons is that the TV’s operating system is designed in a way that it can’t write code into the smart TV’s chip systems. The code is “read only,” meaning only your TV’s operating system can read it for the TV to work properly.

Consequently, the malware developer would have to rewrite that code in order to infect the TV so the malware can take root and replicate or consume resources.

Plus, for firmware updates to take place on your smart TV, they require a digital signature. For this reason, malware can’t take root in the TV even if it was placed in its memory. After a firmware update, the malware will simply be removed along with the code that the update has replaced. However, if your smart TV does get infected with malware or viruses, they will block access to the TV’s configuration settings or files. It could also trigger an overload on the TV’s voltage, but that’s probably as far as it would go, which is why malware writers don’t bother creating malware that can’t cause much damage.

How to Copy the Full Path of a File on Windows 10 Sometimes, it’s handy to copy the full path of a file or folder in Windows 10 to the clipboard. That

way, you can paste the path into an open or upload dialog quickly without having to browse for it the file. Luckily, there’s an easy way to do it. Here’s how.

Find the file or folder whose path you’d like to copy in File Explorer. Hold down Shift on your keyboard and right-click on it. In the context menu that pops up, select “Copy As Path.”

(The location of “Copy As Path” in the context menu list will vary, depending on your system setup and the type of file you are right-clicking on.)

This will copy the full path of the file’s location onto the Windows clipboard. For example, the path may look something like this: “C:\Users\redwolf\Desktop\Example Images\Picture.jpg.”

You can then paste the path wherever you like, such as a file upload dialog in a web browser. [continued page 6]

Page 6: Bits, Bytes and Bugs COUNTY Saint Louis · June 2020 Bits, Bytes and Bugs Page 2 Protecting users from potentially unwanted applications in Microsoft Edge By Microsoft Edge Team [from

June 2020 Bits, Bytes and Bugs Page 6

This tip also helps when you’re hacking the registry to add any application your desktop context menu, running commands in the Command Prompt or PowerShell, and doing anything else that requires the full path of a file. There’s no need to type it out.

ANDROID TIPS AND TRICKS

Change App Permissions Another big change that came with the new Android version

is the tightening of Android’s permission system. There is a dedicated section where one can see which apps have access to which permissions and make changes easily. To do this, you can find it in Settings > Privacy > Permission manager.

Location data is one of the most vital information that one can lend to an app. Google has provided a new permission level just for location data. This can be found if you navigate to Settings > Privacy > Permission manager > Location. There, you can find an app and set it to “Allow Only” while using the app to stop it from accessing your location in the background. Sharing Wi-Fi Details Using QR Codes

Sharing Wi-Fi passwords can be frustrating especially if you’ve misplaced the documentation containing the Wi-Fi details. As long as you’re connected to a Wi-Fi network, one can easily share their Wi-Fi connection with friends.

There’s a new Android tool that turns a Wi-Fi connection into a QR code, which is then scanned by a friend’s phone. One simply needs to scan the code and they will be able to connect to the Wi-Fi.

This tool can be found under Settings > Network and Internet > Wi-Fi. Here, you can select the Wi-Fi connection you want to share. Then tap the Share button, confirm access using your fingerprint, face scan, or password, and a unique QR code will pop up.

Page 7: Bits, Bytes and Bugs COUNTY Saint Louis · June 2020 Bits, Bytes and Bugs Page 2 Protecting users from potentially unwanted applications in Microsoft Edge By Microsoft Edge Team [from

June 2020 Bits, Bytes and Bugs Page 7

[continued page 7]

Track Your Android Device Losing your phone and not being able to find it because you

left it on silent can be quite frustrating. There’s no way to get it back except using Google’s Find My Phone app.

The best part is that any time you add a Google Account to your Android device, the “Find My Device” feature is automatically turned on. Whenever you lose your device, just head over to android.com/find on any browser and log in with the same Google account it had.

You’ll then be able to see the location of your device and be able to erase all the data remotely, lock it down with a message or make it ring loud (even when it’s on silent mode), as long as the lost device has access to the internet and location is on.

See Back the Notifications You Swiped Away If you’ve ever cleared all your notifications in a hurry

without reading them properly, you can now find an easy way to trace back what you didn’t see. All you have to do is long-press and hold on your home screen to show up the screen-adjusting mode. Then tap on widgets and look for the Settings shortcut widget which looks like a basic settings gear.

Then drag it somewhere on your home screen and follow it with a popup list that allows you to choose from essential shortcuts such as accessibility, app info, battery, devices, battery, memory, etc. Simply search for the option named “notification log” and select it.

You will then be able to view all your previous notifications from all the apps with the time of appearance using the shortcut.

Trigger Google Assistant Now that we know one can call up the Google Assistant

with the “OK, Google” or “Hey, Google” hot words, you can also trigger the Assistant non-verbally. You no longer need to long-press the home button to call up the A.I. assistant. Android 10’s new navigation system does away with that button completely. Simply drag your finger diagonally from a bottom corner of your screen to trigger the Assistant.

If you did it right, you’ll see Google’s colors rush from both bottom corners and meet in the middle. After a slight pause, the Google Assistant will pop up and you’ll be able to use all your favorite commands.

Deleting Apps There’s a more simplified way of deleting apps. All you

have to do is uninstall apps by heading into your app settings and deleting from there. Just go to the Settings app, then hit Apps and notifications > See all [number] apps. Then select your app from the list and tap the Uninstall button to remove it from your device.

You can also open your app drawer, long-press the app you want to delete, and then drag it across the screen. Your app list will close, and your home page will pop up. While still pressing on your screen, drag the app icon to the Uninstall icon in the top-right corner and release. The app will then be deleted.

Page 8: Bits, Bytes and Bugs COUNTY Saint Louis · June 2020 Bits, Bytes and Bugs Page 2 Protecting users from potentially unwanted applications in Microsoft Edge By Microsoft Edge Team [from

June 2020 Bits, Bytes and Bugs Page 8

10 Windows Task Manager Tricks You Probably Didn’t Know Most Windows users only pull up the Task Manager when a program is frozen and they need to kill

it. While it’s perfectly fine to use the Task Manager this way, you’re also overlooking some handy features if you never look deeper.

The Task Manager has seen some serious improvements since the days of Windows 7. 1. How to Bring Up the Task Manager Quickly Even if you know how to get to the Task Manager, you might not be aware of the different methods for doing so. While you can press Ctrl + Alt + Del to open the security screen and launch the Task Manager that’s the slow way..

Ctrl + Shift + Esc will instantly launch the app with no additional clicks. This will also you bring Task Manager to the front when it’s minimized. If you want to use the mouse instead, you can right-click on an empty spot of your Taskbar and choose Task Manager.

Finally, you’ll find a shortcut to the Task Manager on the Power User menu. Right-click on the Start button or hit Win + X to open this. It’s a handy Windows Task Manager shortcut because it works well whether your hands are on the mouse or keyboard.

Once you’ve opened the Task Manager, be sure to click More details to show the full interface, if it’s not already active. 2. Find Out Why Apps Are Frozen

[continued page 9]

Page 9: Bits, Bytes and Bugs COUNTY Saint Louis · June 2020 Bits, Bytes and Bugs Page 2 Protecting users from potentially unwanted applications in Microsoft Edge By Microsoft Edge Team [from

June 2020 Bits, Bytes and Bugs Page 9

As mentioned before, the most common reason to open the Task Manager is to kill a frozen program. But the next time you’re in that situation, you can do more analysis first. It’s possible that the program isn’t frozen, but just taking a while to process a task.

Prematurely killing an active application could result in lost data, so it makes sense to wait and see if a frozen process resolves itself. This is where the Analyze Wait Chain feature in the Task Manager comes in handy. It can tell you when a process is stuck waiting on another process, which can help you identify why an app isn’t responding.

To see which process is the real culprit, switch to the Details tab and find the process you want to look into. Right-click on it and choose Analyze wait chain to see the details. If that app is waiting on any other processes, you’ll see them in the resulting window. 3. Restart Windows Explorer

The Windows Explorer process is responsible for many of the UI elements of Windows, such as the Taskbar, File Explorer, Start menu, and similar. If you have an issue with these elements, your first thought may be to restart your PC. While this will solve the issue, it’s more convenient to restart Windows Explorer instead.

To do this, find Windows Explorer on the Processes tab of the Task Manager. Right-click it and choose Restart to kill the task and run it again. You’ll see your Taskbar and other elements disappear for a moment, which is normal. After they come back, everything should be back to normal. 4. Monitor Performance and Resources

[continued page 10]

Page 10: Bits, Bytes and Bugs COUNTY Saint Louis · June 2020 Bits, Bytes and Bugs Page 2 Protecting users from potentially unwanted applications in Microsoft Edge By Microsoft Edge Team [from

June 2020 Bits, Bytes and Bugs Page 10

While the Task Manager provides an overview of all running processes and apps, it also has several tools for effectively monitoring the performance of your system and resource allocation. Jump to the Performance tab to see these. Once you’re there, have a look at the following tips. Viewing Graphs

Along the left sidebar, you’ll see fields for CPU, Memory, Disk, and other resources in your computer. Click one to view a real-time graph of its usage.

If you want to keep an eye on this information without keeping the full Task Manager open, right-click anywhere in the left sidebar and choose Summary View to display only that sidebar. You can instead right-click anywhere in the right panel and select Graph Summary View to display just the current graph. Copy Diagnostic Info

[continued page 11]

Page 11: Bits, Bytes and Bugs COUNTY Saint Louis · June 2020 Bits, Bytes and Bugs Page 2 Protecting users from potentially unwanted applications in Microsoft Edge By Microsoft Edge Team [from

June 2020 Bits, Bytes and Bugs Page 11

With any resource type selected on the left, right-click anywhere and select Copy to place a

diagnostic snapshot on your clipboard. You can then paste this into Notepad to save as a baseline or share it on a forum online to get troubleshooting help. Access Useful Details

Each resource type has some interesting details that might come in handy. Under CPU, you’ll find Up time, which shows how long it’s been since the computer restarted.

In Memory, you can check the number of Slots used to figure out if you have room to add more. The Read speed and Write speed under Disk give you an idea of how fast your storage media performs, too. Open Resource Monitor

If you want even more details that the Task Manager doesn’t show you, click Open Resource Monitor at the bottom of the window. This utility is an advanced way to view real-time data about your system, including threads used, disk response times, exact breakdowns of RAM used by processes, and more. 5. Search Online for Suspicious Processes

Sometimes, you might find suspicious-looking process names in Task Manager. Most of the time

they’re legitimate, but it’s always wise to double-check on ones you’ve never seen or heard of before. Windows can help with this: just right-click on any process and select the Search online action. This will launch a Bing search in your browser with the process and app names. The results should help you determine whether it’s safe or not. 6. Add Extra Columns for More Details

By default, the Task Manager only shows a few columns in the Processes tab. While these cover the most important details, you can actually add several more columns just by right-clicking the header area. These include: Type, which tells you if the process is an App, Background process, or Windows process. Publisher, which shows the developer of the program. Process name, which is often the executable file. These will look familiar if you’ve used the Task

Manager in Windows 7 or earlier.

[continued page 12]

Page 12: Bits, Bytes and Bugs COUNTY Saint Louis · June 2020 Bits, Bytes and Bugs Page 2 Protecting users from potentially unwanted applications in Microsoft Edge By Microsoft Edge Team [from

June 2020 Bits, Bytes and Bugs Page 12

While you may find some or all of them useful at times, Process Name is particularly handy. It’s

easier to spot suspicious applications by their process name than their application name, and they’re often easier to research too.

Note that you can also add extra columns on the Startup tab. Use these for troubleshooting purposes (like CPU at Startup to measure impact) or just to see which startup processes are still running (with the Running Now column). 7. Toggle Between Values and Percentages

When browsing the Processes list, the CPU column only shows in percentages. However, you can

change the other three default columns between absolute values and percentages. Percentages are better when you need a sense of how resource usage compares to the total amount

available. It’s nice to know an app is using 50MB of RAM, but seeing this is only two percent of all the RAM in your system puts it into perspective.

To toggle these, just right-click on any process, navigate to the Resource values submenu, pick the resource type you want to change, and select either Values or Percents.

8. Manage App Windows

[continued page 13]

Page 13: Bits, Bytes and Bugs COUNTY Saint Louis · June 2020 Bits, Bytes and Bugs Page 2 Protecting users from potentially unwanted applications in Microsoft Edge By Microsoft Edge Team [from

June 2020 Bits, Bytes and Bugs Page 13

Task Manager is far from the best window management tool available, but it does have a few actions that you might find useful. To access them, you must click the arrow next to an item you want to manage in order to show all its processes. This only works for items listed under the Apps section of the Processes tab, and it didn’t work for all apps in our testing.

Once you’ve expanded an item to show all processes, right-click the indented entry and you’ll see these window actions for that app: Switch to: Brings the app into focus and minimizes the Task Manager. Bring to front: Puts the app in focus, but doesn’t minimize the Task Manager. Minimize: Minimizes the program. Maximize: Maximizes the application. End Task: Kills the process.

9. Open App File Locations

[continued page 14]

Page 14: Bits, Bytes and Bugs COUNTY Saint Louis · June 2020 Bits, Bytes and Bugs Page 2 Protecting users from potentially unwanted applications in Microsoft Edge By Microsoft Edge Team [from

June 2020 Bits, Bytes and Bugs Page 14

Do you often find yourself needing to navigate to the installed location of a certain program? Maybe

you want to tweak some configuration files, or need to copy its file path for some reason. Crawling through File Explorer is one way to do that, but it requires a lot of clicking. If the program

is already running, Task Manager can help you get there a lot faster. Just right-click on any process and select Open File Location. This will take you directly to the folder that contains the process’s executable file. It’s quite convenient, especially since software can live all across your file system.

This works for Apps, Background Processes, and Windows Processes, allowing you to quickly access pretty much anything that shows up under the Processes tab. 10. Adjust Task Manager Options

The Task Manager has a few preferences you can adjust to make the experience smoother. Under Options, you can enable Always on top to keep the Task Manager above other windows unless you manually minimize it. Also on this menu, select Set default tab to choose what the Task Manager should show when you open it.

Look under the View menu to make the Update speed faster or slower. You can even pause it if you need to examine a snapshot in time. The Task Manager Is a Valuable Resource

For the average user, the Task Manager is more than enough to provide you with the system information you need to keep everything in check. Whether you want to keep an eye on resource usage or easily track down process locations, the Task Manager has you covered.

Change What Windows Does When You Shut Your Laptop’s Lid Are you tired of your laptop automatically going to sleep when you shut its lid? Here’s how you can

make your laptop do what you want it to do when you’re done with it.

By default, most laptops automatically go into sleep mode when you close the lid. This is usually great, as most of us shut our laptops, throw them into our bags, and then expect them to be running in an instant when we get them back out at the next stop. Sometimes, though, you might want to leave your laptop running while the lid is shut.

Warning: Do not put your laptop in its bag while it’s running! It will almost certainly overheat.

Windows 10: Choose Your Laptop’s Lid-Close Action

To change what your laptop does when you close it, you’ll need to visit the Power Options window in the classic Control Panel. You can access it in two different ways:

Head to Control Panel > Hardware and Sound > Power Options.

Head to Settings > System > Power & sleep > Additional power settings. The “Additional power settings” link appears below “Related settings” at the bottom of the pane. (You can press Windows+i to quickly open the Settings app.)

[continued page 15]

Page 15: Bits, Bytes and Bugs COUNTY Saint Louis · June 2020 Bits, Bytes and Bugs Page 2 Protecting users from potentially unwanted applications in Microsoft Edge By Microsoft Edge Team [from

June 2020 Bits, Bytes and Bugs Page 15

Click “Choose what closing the lid does” at the left side of the Power Options window.

Change the options to the right of “When I close the lid.” You can select “Do nothing,” “Sleep,” “Hibernate,” or “Shut down.” There are separate options for “On battery” and “Plugged in.”

In Sleep, the laptop will remain in a low-power state so it can quickly resume. In Hibernate, the laptop will save its state to disk. It won’t consume any power while hibernating, but turning it back on will take some extra time. (Note that hibernating itself takes some power—so, if you frequently close and reopen your laptop, setting it to hibernate each time might even use more power than setting it to sleep.)

[continued page 16]

Page 16: Bits, Bytes and Bugs COUNTY Saint Louis · June 2020 Bits, Bytes and Bugs Page 2 Protecting users from potentially unwanted applications in Microsoft Edge By Microsoft Edge Team [from

June 2020 Bits, Bytes and Bugs Page 16

For example, if you want your laptop to go to sleep when you close it on battery power, but to keep running when you close the lid while it’s plugged in, select “Do nothing” under “Plugged in” and “Sleep” under “On battery.” Click “Save changes” at the bottom of the window to save your changes when you’re done.

Even after you set your laptop to sleep when it’s closed, Windows will automatically hibernate the laptop after a period of time in Sleep mode. You can configure this from Windows 10’s advanced power settings

Page 17: Bits, Bytes and Bugs COUNTY Saint Louis · June 2020 Bits, Bytes and Bugs Page 2 Protecting users from potentially unwanted applications in Microsoft Edge By Microsoft Edge Team [from

June 2020 Bits, Bytes and Bugs Page 17

Are You Worried About Smart Home Devices Listening to You? Smart home devices offer a lot of benefits, but many consumers are concerned with one big potential

drawback: having an always-on device in your home that could be listening to everything you say. According to a recent report, Amazon employs thousands of people to listen what users say in the

recording proximity of an Alexa-enabled Echo device. The workers transcribe, annotate, and then feed back anything learned into Alexa's underlying software. But Amazon says this happens only with a small percentage of recordings to "improve the customer experience."

Smart assistants such as Alexa are supposed to listen only when triggered by a wake word or other voice command, but that's not always the case. To take extra steps to protect your privacy around a smart speaker or other connected device, you can disable active listening on Alexa, Cortana, Google Assistant, or Siri.

SOUTH COUNTY OLDER RESIDENTS’ COMPUTER CLUB Minutes of May 19, 2020 General Meeting – Virtual Call via Zoom

Our moderator, Ted Kramper, opened today’s call at 1:10 p.m. with the Pledge of Allegiance to the flag. The minutes of the last meeting, March 3, 2020, was approved as submitted. Our Treasurer, Mike Svoboda, reported that we opened on April 6th with $3,203.05. Balance is now $3,233.04. Our current membership is 90, including 2 new members in the last day. Participation on today’s call was 25 members. The topic for our next General Meeting, on June 9 will be “Understanding Windows 10”, presented by Chris Sellmeyer. This will be another virtual call via Zoom. Ask-A-Techie is our next SIG (Special Interest Group) on June 12th. This will also be a virtual call via Zoom. Norm Miller reported on his activities regarding “Requests for Assistance” and helping members of SCORCC. Cathy Amen reported on the recent Zoom Virtual Genealogy SIG and the Zoom Virtual Pre-meeting. Cathy recorded a 15 minute video on Zoom controls which can be accessed through the SCORCC website for viewing. The next issue of BB&B is at the printer and will be sent out soon. Today’s meeting concluded at 1:30 p.m. Our program today was “No Dumb Questions” with Chris Sellmeyer and Norm Miller providing the answers to our questions. This entire meeting was recorded and will be placed on the SCORCC website for all members to view.

Respectfully submitted Cathy Amen

A Senior’s Version of FACEBOOK For those of my generation who do not, and cannot, comprehend why Facebook exists:

I am trying to make friends outside of Facebook while applying the same principles. Therefore, every day I walk down the street and tell passers-by what I have eaten, how

I feel at the moment, what I have done the night before, what I will do later and with whom. I give them pictures of my family, my dog and of me gardening, taking things apart in the garage, watering the lawn, standing in from of landmarks, driving around town, having lunch, and doing what anybody and everybody does every day. I also listen to their conversations, give them “thumbs up" and tell them I “like” them.

And it works just like Facebook. I already have 4 people following me: 2 police officers, a private investigator and a psychiatrist.

Page 18: Bits, Bytes and Bugs COUNTY Saint Louis · June 2020 Bits, Bytes and Bugs Page 2 Protecting users from potentially unwanted applications in Microsoft Edge By Microsoft Edge Team [from

June 2020 Bits, Bytes and Bugs Page 18

SCORCC Board Members Cathy Amen [email protected] Jim Bartlett [email protected] Toby Charles [email protected] Dan Diemert [email protected] Ted Kramper [email protected] Norman Miller [email protected]

Deanna Rickert [email protected] Ron Rohlfing [email protected] Dianne Roling [email protected] Chris Sellmeyer [email protected] Mike Svoboda [email protected]

Multi-Topic “Virtual Ask a Techie” SIG: On June128th Norman Miller will host a “Virtual Ask a Techie” SIG.

All St. Louis County Library locations are closed until further notice to help prevent the spread of COVID-19 For additional login assistance, visit there Virtual Branch for chat, text, or email assistance information.

June 2020 Events

SUN MON TUE WED THU FRI SAT

1

“Virtual” Board

Meeting 1 pm

2

3 4 5 6

7

8

9

“Virtual” General Meeting

1 pm

10

11

12

“Virtual” Ask-a-Techie

SIG 10 am

13

14 15

16

17

18

19

20

21 22

23

24

25

26

27

28 29 30

SPECIAL INTEREST GROUPS If you haven't attended a SIG meeting lately, you should. They are friendly places to learn.

Also, see events calendar or the SCORCC Website at http://www.scorcc.org for news.

Page 19: Bits, Bytes and Bugs COUNTY Saint Louis · June 2020 Bits, Bytes and Bugs Page 2 Protecting users from potentially unwanted applications in Microsoft Edge By Microsoft Edge Team [from

June 2020 Bits, Bytes and Bugs Page 19

Published by the Newsletter Committee South County Older Residents Computer Club

Editor Ted Kramper

Production Jim Bartlett

Address articles to:

E-mail:

[email protected]

Want to join? It's easy! Mail a check for $15 per person, or $22 per household,

payable to SCORCC with a completed membership information form to

Mike Svoboda, 10231 Kennerly Rd, St. Louis, MO 63128.

(The library does not allow cash exchange in the library)

You'll receive Bits Bytes & Bugs, the monthly newsletter.

For more information see the SCORCC Website at http://www.scorcc.org

CONTENT DISCLAIMER Due to the social nature of this newsletter information may contain

content copyrighted by another entity or person. SCORCC claims no copyright to said content. The editor cannot be held accountable for the copyrighted content. The editor is a messenger and

sharer of information and strives to verify, but cannot warrant the accuracy of copyrights or completeness of the information on this

newsletter.

If you have a complaint about something or find your content is being used incorrectly, PLEASE CONTACT THE EDITOR PRIOR TO MAKING

A COPYRIGHT CLAIM.

Any infringement was not done on purpose and will be rectified to all parties satisfaction.