Posted on 1 Comment

Like Productivity Tools?

As an independent contractor it is important to me to track all my time. That means if I am working for someone either at an hourly rate or a fixed price I track my time. If I am marketing myself (which would be working for me) I track my time. I have even tracked time when I was away from work. This time tracking lets me know if I am charging correctly and whether or not I am performing efficiently.

I have used a variety of time tracking solutions including Quicken’s. I have tried several online versions only to have them move from free to charging as soon as their app was stable. Allnetic’s Working Time Tracker has done the best job for my circumstances. A new player is SlimTimer. SlimTimer looks free for the moment. But, the first one is always free, right?

Ps. I haven’t done anything with SlimTimer yet so no review at the moment.

Posted on 1 Comment

User interfaces of the future

Windows and even the Mac OS are products the 80s. The user interface you use to operate your computer is over two decades old. Is this as good as it gets? John Kheit says change is coming and offers descriptions and links to what could be the computer user interface you use tomorrow.

Look at pictures of desktops (user interfaces) from 1984 to the present.

Posted on 4 Comments

What is up Google’s sleeve? Photo searches?

Google, which just launched its free Wifi wireless Internet service in Mountain View but denies plans to create a national free Wifi network, has purchased a photo recognition company.

We’ve been working to make Picasa (Google’s free photo-organizing software) even better when it comes to searching for your own photos—to make finding them be as easy as finding stuff on the web. Luckily we’ve found some people who share this goal, and are excited that the Neven Vision team is now part of Google. [Source]

This means that in the future Picasa will not only search your harddrive for pictures but will classify them for you. Perhaps it will recognize all the pictures with granny in them and automatically label them "grandmother" and so forth.

In other Google news, they have released to beta the first major revamp of Blogger since its aquisition from Pyra Labs in 2003. (oops. That article is from May 10, 2004 Thank you Jonathan Hickman for point it out.) I still hate blogger and advise against using their service due to poor business practices. I was burned by Blogger and lost much writing and advise that you blog using WordPress on a hosted solution. I will happily help anyone setup their very own WordPress blog.

India has begun blocking Blogger and others such as Typepad. India following in China’s footsteps?

Update: The striked reference above may have been a typo in the date. C|Net has the same information with an August 15, 2006 publishing date. So, strike the strike. See also Update aims for friendlier Blogger (which they won’t achieve unless they have fixed their customer service issues). From the horse’s mouth at Blogger Buzz with an August 14, 2006 publishing date.

Posted on 4 Comments

Subscribe to comments

Have you ever posted a comment somewhere and thought, "I need to come back and see the followup comments" only to never return or return too late in the discussion? Comment subscriptions help you stay abreast of dialogs that interest you.

I have added Tempus Fugit’s Subscribe to Comments plugin for WordPress to Reality Me. Now you can subscribe to comments for specific posts that interest you. Enjoy!

Posted on 4 Comments

Get rid of viruses, spyware, malware and other nasties

One of the things I do that often helps with cash flow is cleaning PCs. That doesn’t mean dusting (although I do that) but means removing viruses, trojans, worms, spyware, malware, popups, and other things that slow down your machine and generally cause you to curse a lot. Busy Mom has found herself in a position to have to clean a machine. It usually takes me 5 hours and I charge $95 but am going to start charging $135 per machine. That is comparable price to BestBuy’s Geek Squad which gives the machine a couple of hours then declares it needing a reformat (which turns their job into a non-labor intensive automated process) removing all your photos, data, banking information, document and other things you probably have not backed up ever and will never see again. I also do not do upsales since that is not my business but I do love your referrals for web applications (web pages, business automation processes, and such).

This was my comment to BusyMom:

More and more of late I have had people ask me to clean their machines. It usually takes me 5 hours to make the machine presentable enough that I feel confident the viruses/malware/spyware and other garbage won’t return in a week.

Here are my trade secrets.
1) Go to http://www.ultimatebootcd.com/ and make a CD from the iso. (I prefer the windows version http://www.ubcd4win.com/ and often use both).
2) Make sure the bios is set to boot from the CD first.
3) Boot to the ultimate boot cd (I’ll assume you chose to use the windows version) and enable networking
4) Run all the virus scanners. When they prompt to update, do so! Not all will work. Skip the rootkit detector.
5) Run Adaware and Spybot.
6) Run EZPCFix, load the hives, delete temporary files, remove downloaded program files, update winsock/winsock2, and very important clear all pending file rename operations.
7) Reboot making sure to remove the UBCD from the cd drive.
8) Within Windows, go to http://housecall.trendmicro.com/ and start a virus scan from your browser.
9) Go to http://safer-networking.org/ and make sure you have the latest SpyBot Search N Destroy. Be wary of anything that is not SpyBot SND, Lavasoft’s Adaware, or Microsoft’s Defender (all 3 do similar things and overlap but one might catch something another missed).
10) Go to http://lavasoft.com/ and make sure you have the latest Adaware. Also get the VX2 cleaner from the addons.
11) Search google for “Microsoft antispy” and get the latest Defender (I hate this thing and often uninstall it when I’m done).
12) Get CWShredder http://www.trendmicro.com/cwshredder/ and run a scan.
13) Get HiJackThis http://www.spywareinfo.com/~merijn/downloads.html When you run it, simply google EVERYTHING that it returns and be certain you understand its purpose before removing something. When in doubt, probably best to leave it and rely on a detection and removal tool.
14) Start->Run->regedit Go to HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run and remove any suspicious items. Google and use caution. Do this also for RunOnce, RunOnceEx, RunServices, and RunServicesOnce.
15) Repeat 14 for HKEY_CURRENT_USER
16) Update the virus definitions for whatever virus software you use. Although Norton and McAfee used to be the top dogs, I no longer recommend them because they bog systems down too much with their “good intentions.” I advise people toward Grisoft’s AVG http://www.grisoft.com/ and AVAST http://avast.com/ (free). Run a full, intensive virus scan.
17) Run Windows Update and get all the latest security patches. It amazes me how many people have never run Windows Update or Microsoft Update.

I’m sure I have left some things out. Good luck!

An update was necessary after another user advised BusyMom to remove Adaware and Spybot and to reformat.

Sara’s comment “Oh and Adaware and Spy Bot add lag time as well as blocking certain sites.” is inaccurate.

There are two types of protection. Passive and Active. Active protection is a program that runs in the background all the time. Since it is running, active protection can cause performance issues. This would be akin to a doorman letting people (programs) into a night club. It would be faster if the doorman wasn’t there and just let everyone through but then you get the riff raff. Active protection checks everything as it goes.

Passive protection works only when you tell it to. With active protection you have no doorman at the club and people come and go. Perhaps some riff raff come in and vandalize a bit, steal some information, and when you start to notice the disturbances you run your passive protection. You turn off the music, make everyone stand still, and have the doorman and security sweep the place removing the riff raff.

Adaware and Spybot are passive protection. Adaware Plus (the paid version) has a wonderful piece of active protection called Ad-watch which I run all the time. Ad-watch does some blocking but mostly warns you if something is trying to make an unauthorized change to the registry.

Adaware and Spybot are not blocking applications. They do not block sites. They are scanners that look for and correct problems. They are the most valuable tools in your arsenal against malware. Ad-watch does some popup blocking but it is not a firewall and does not filter sites.

Reformatting to recover a computer is almost NEVER necessary. Sometimes it is easier and it is nice to start fresh but not required. I used to reformat and start a new every 6 months to a year but then again I had regular backups of my data.

Two other topics of consideration are virus protection and firewalls. Using our night club analogy, virus protection can also be active or passive. Software like McAfee, Norton Antivirus, AVG, and Avast are active. They reside in the computer’s memory and run all the time. They are the doormen that stick a tongue depresser into everyone’s mouth as they enter the club and make sure no sickness gets in. The online scanners at Trendmicro (http://housecall.trendmicro.com/) and Symantec (http://sarc.com/) and other are passive. They scan when you tell them to and it would be the equivalent of calling in the doctors after you notice your guests falling ill. I few Norton and McAfee as doctors that have gotten carried away and give everyone an anal exam even if they just came in for a splinter. Norton and McAfee both come with large staffs that consume a lot resources (ie. their Security Centers)

A firewall is like a guest list. That’s the big ugly bouncer who turns people away at the door. When a person tries to enter the club that isn’t on the approved list, the bouncer sends them packing. Some firewalls have VIP lists which are the programs that can run even if they appear on bad lists (this would be called your “exception” list). The firewall might trust most programs (depending on the instructions you’ve given it). These programs are called white listed. And might absolutely refuse some guests based on a blacklist typically maintained by not for profit organizations and the company from which you purchased your bouncer…er, firewall.

Btw, I see your header fine in Firefox.

And lastly:

One final tidbit, I forgot to meantion that you should go to the control panel->add/remove programs and confirm that each program is supposed to be there. There are some nasties out there that install themselves to your system and give names that sound appropriate. By searching google on each program name you will find out its purpose and may be surprised by some that should be removed.

Now you all know my secrets to cleaning a machine! Well, a lot of them.

Posted on Leave a comment

Things I do

Yesterday I had the pleasure of building a form on website A that used javascript to create an encoded url which was then sent along with the form data to website B which processed the data then landed the customer at website C to complete the product purchase.

Today, unrelated to yesterday’s mail work, I had to get a Windows server using IIS’ SMTP to resend mail caught in the badmail folder. If you end up with mail in the badmail folder (typically c:\inetpub\mailroot\badmail\ ) follow these steps:

  1. Move the contents of your inetpub/mailroot/badmail folder to a temporary location (I chose c:\temp\reprocessmail\)
  2. Remove the .bad extension from all of the files (resulting in no extension for these files) (the other files *.bdp and *.bdr can be discarded. For good measure I put them into c:\temp\reprocessmail\brd\ The bdr files contain the reason the mail failed to process.)
  3. Move the contents of your temporary folder to the inetpub/mailroot/pickup folder
Posted on 4 Comments

Clean that machine!

One of the things I can do well is bring a PC back to life that has been so heavily attacked with viruses, malware, spyware, and adware that it can’t even boot. I charge $95 to clean the machine and ask that you let me bring it to my house since it usually takes 5 or more hours.

Right now I have one that is giving me a hard way to go because of something called Surf SideKick. Here’s a list of the baddies:

Continue reading Clean that machine!

Posted on Leave a comment

Enhance your website with Skype



My status

Are you a Skype user? Want to enhance your website by giving users the ability to call you from a link? Call Doug Or perhaps you want to give your users an easy way to add your Skype link to their contacts. Add Doug as a Skype contact

Those links will fail if you haven’t installed Skype on your computer. So some javascript can help changing the error message to a prompt to download Skype. Call Doug or if you don’t have skype get prompted to install

Instead of calling, perhaps you want to text chat with Doug. There are other links for conference calls, regular phone numbers, viewing profiles, and even sending files.

These techniques are described in Skypes Advanced Links. Also read How to show your Skype status on the web.

Posted on 3 Comments

Keep those posts coming! Some of my blogging tricks.

WordPress dashboard showing scheduled posts

I enjoy blogging. I enjoy both the writing side of blogging as well as the reading and interacting side of blogging. I personally think it is more pleasureable to read a blog that has a steady stream of information rather than bursts of quantity followed by silence. I believe that is one aspect of Instapundit that makes Glen Reynolds (and his rumored ghost writers) stand out. Like dead air on the radio, several days or weeks of no posts can cost your blog readership.

I collect links and tidbits as I work. When I’m researching and see something interesting I open a tab in Firefox and hold the link. My goal, of course, is to write something substantial and correlate to other sources and similar tidbits but rather than Pulitzer I often end up with a couple of sentences saying, "check this out!" I also have friends that instant message or email interesting links which go into the pool of possible publishings. And my browser homepage for Firefox is the Geek Crack site http://popurls.com/ while Internet Explorer retains the news portal iWon.

My trick to steady posting is to devote a bit of time each Sunday to making non-time sensitive posts into the future. This was a feature that Blogger lacked. On blogger, posting in the future made the information immediately available but with a future date. As you can see in the picture, WordPress handles future posts correctly! The screenshot shows my recent posts today but also reveals seven scheduled posts already written which will appear whether or not I’m frantically working, or even away from my computer. The next one arrives in 16 hours then another in 20 hours, three post in 2 days, and finally two posts 4 days from now. These non-time sensitive posts come from the links I’ve collected over the week. The scheduled posts may only be a couple of sentences but if time permits over the week, I can improve the information before their scheduled time (and being what a blog is, I can update them at any time but my style is typically to leave a post alone once it publishes).

By using scheduling features of your blog publishing software, you can have posts appear while you are at the office of a business that has a policy against blogging at work. You can keep your readers satisfied with a steady stream of good writing. By spreading your material out over time, you avoid turning your readers into skimmers because of information overload. Write steady!

Update: Swap Blog also offers bloggers some good advice.

Posted on 3 Comments

Reasons to hate Windows

I run a legal copy of Windows XP and still use service pack 1. I like service pack 2 and put it on all new machines but this machine is a little too critical to my life to risk going to through the nightmares I heard that can happen when installing service pack 2. Granted, nothing bad should happen, however, if it can go bad with me it probably will at the absolute worst moment.

What’s this got to do with hating Windows? Today I accepted an update from Microsoft and since then every two hours I’ve had a window popup to notify me that on Oct 10, 2006 support for service pack 1 will end. Does this mean that every two hours between now and October 10th I’m going to have to deal with this message?! Not a smart way to do business. If I don’t want to secure my machine and if I want to deal with not being supported I should have that option without the nuisance!

A linux development environment sounds awfully nice right now.

Posted on 2 Comments

Sync your browser settings

Do you leap between computers? A bookmark in Firefox one day at work and a bookmark the next day on the wife’s computer? Remember being at a website but don’t know which computer you were using? Google introduces another tool. Google’s Browser Sync ends your frustrations by keeping all browser information between multiple computers the same. It even claims to remember your open tabs!

Google Browser Sync for Firefox is an extension that continuously synchronizes your browser settings – including bookmarks, history, persistent cookies, and saved passwords – across your computers. It also allows you to restore open tabs and windows across different machines and browser sessions.

Give into Google. Resistence is futile!