March 20, 2008

Tiny Spell

I'm telling you, it feels really good to hunt down downloads for our readers and bag a winner! This may be one of the most useful downloads I have ever found. I loved this little gem from the moment I misspelled my first file (which was about five seconds after the install!)

It's called Tiny Spell, but what it does isn't tiny at all. Tiny Spell can correct your spelling in any application within Windows. That's huge! So, if you're working in a program that doesn't support MS Word, you can still have confidence knowing you're spelling everything right. No more dumping a word into a Word document find viagra just to see if it is spelled correctly. With Tiny Spell's simple to use interface, you'll cruise through misspelled words easily and quickly.

Tiny Spell sits in your system tray and turns from white to yellow when it recognizes an incorrectly spelled word.

A quick click on the icon and a list of possible spelling choices pops up. Highlight the correct entry and you're on your way. I find it easier to use this "on the fly" in Word than the actual built in spellchecker. You can also add words to Tiny Spell's database that it may not be familiar with and it will then recognize them in the future.

This really is a great program and I'm sure that if you're like me, you'll get your money's worth out of it! But, of course, it's free, so you don't have to worry about that either. Now, go on and enjoy the safety net that Tiny Spell can provide for you!

You can download Tiny Spell for yourself right here. Enjoy!

Permalink • Print • Comment

March 18, 2008

Contact information does not appear in the address book in Outlook

View products that this article applies to.
Article ID : 287563
Last Review : May 7, 2007
Revision : 2.1
This article was previously published under Q287563
For a Microsoft Outlook 2000 version of this article, see 197907 (http://support.microsoft.com/kb/197907/).
For a Microsoft Outlook 98 version of this article, see 180830 (http://support.microsoft.com/kb/180830/).
For a Microsoft female viagra Outlook 97 version of this article, see 161349 (http://support.microsoft.com/kb/161349/).
On This Page

SYMPTOMS

CAUSE

RESOLUTION

Step 1: Install the Outlook Address Book service

Microsoft Outlook 2002 and Microsoft Office Outlook 2003

Microsoft Office Outlook 2007

Step 2: Mark your contact folder for use with your address book

Step 3: Look for an e-mail address or a fax number

MORE INFORMATION
SYMPTOMS
When you use your address book to select recipients for an e-mail message or a fax message in Microsoft Outlook, information from your Contacts folder does not appear in the list.
Back to the top

CAUSE
This behavior occurs because Outlook requires that you complete the following steps before your contact information is available for you to address messages by using your address book: • Install the Outlook Address Book service. 
• Mark your contact folder for use with your address book. 
• Specify either an e-mail address or a fax number for each item that you want to appear when you address messages.

Back to the top

RESOLUTION
To resolve this issue, follow these steps.
Back to the top

Step 1: Install the Outlook Address Book service
To do this, follow these steps, as appropriate for the version of Outlook that you are running.
Microsoft Outlook 2002 and Microsoft Office Outlook 2003
1. On the Tools menu, click E-mail Accounts.
2. Click to select View or change existing directories or address books, and then click Next.
3. If your Outlook Address Book is listed, click Cancel, and then go to the steps in the "How to Mark Your Contact Folder for Use with Your Address Book" section.
4. If your Outlook Address Book is not listed, click Add.
5. Click to select Additional Address Books, and then click Next.
6. Click to select Outlook Address Book, and then click Next.
7. Click OK when you receive the prompt that the address book you added will not start until you click Exit from the File menu.
8. Click Finish.
9. Click Exit from the File menu, and then restart Outlook.

Microsoft Office Outlook 2007
1. On the Tools menu, click Accout Settings .
2. Click the Adress Books tab. 
3. If your Outlook Address Book is listed, click Close, and then go to "Step 2: Mark your contact folder for use with your address book."

If your Outlook Address Book is not listed, click New.
4. Select Additional Address Books, and then click Next.
5. Select Outlook Address Book, and then click Next.
6. You receive a message that states that the address book that you added will not start until you click Exit on the File menu. Click OK.
7. Click Finish.
8. Click Close, and then restart Outlook.

Back to the top

Step 2: Mark your contact folder for use with your address book
1. On the File menu, point to Folder, and then click Properties for your folder name.
2. On the Outlook Address Book tab, click to select the Show this folder as an e-mail address book check box, type a descriptive name, and then click OK.

Back to the top

Step 3: Look for an e-mail address or a fax number
1. In the Folder list, select the Contact folder.
2. Double-click the contact to open the item, and then look at the e-mail address field and the fax numbers field.
If there is no e-mail address or fax number, Outlook does not display this contact in your address book when you try to address an e-mail message or a fax message.
Back to the top

MORE INFORMATION
Outlook allows any contact folder to be used by the address book, not just the primary Contacts folder. For example, if you create a new folder of contacts called "Friends" (without the quotation marks), you can specify that the contacts in the Friends folder also appear in your address book. To do this, follow the steps that are described in the "Resolution" section.

The Contact folders appear in your address book as subcategories of an entry that is called Outlook Address Book. If you click Outlook Address Book instead of clicking one of the folder names, you do not see any contact information. To see the contact information, you must click the specific folder name that contains the contact.
Back to the top

——————————————————————————–

APPLIES TO
• Microsoft Office Outlook 2007
• Microsoft Office Outlook 2003
• Microsoft Outlook 2002 Standard Edition

 

Permalink • Print • Comment

Show Some Personality

To begin, I just want to say that portrait photography goes beyond photography! It’s all about judging a perfect stranger and coming to terms with what he or she best symbolizes. It could be haughtiness, confidence, innocence, etc. But the real question is: how do you capture those traits in a photograph? Well, keep reading and you might just find out!

Bring Out Their Personality

Simply put, watch your subjects. Watch their mannerisms, their body language, the way they speak and the way they express their emotions. Who knows, maybe it’s their perfect front teeth that could prompt you to take their smiling photo. Perhaps it’s their serious look that adds many more layers of wisdom to their persona. Or, maybe it’s their ability to make faces that take your portrait photography to a whole new level. But, no matter which way you look at it, capturing what makes them tick should be your goal. And here's how you can detect that!

Alone Time

This one works all the time! Give your subjects some alone time. Ask them to continue what they're doing, whether it be issuing orders to their co-workers or gardening at home. Just observe their movements and be ready to capture them at a moment’s notice and without the subject’s knowledge. That can be achieved by telling the subject you're doing some "test shots" to check the lighting, mood and so on. By saying that, you remove the subject’s anxiety toward the photo shoot and they will act more like themselves.

Be Patient

It’s important to get to know your subjects before you embark on capturing their personality on your memory card. That's why it’s best to set aside considerably more time for the shoot than what you had originally intended. The success of portrait photography lies within being patient and investigating the subject a lot more. Once you know what the subject’s traits are, the shoot is as good as done.

So, how do you investigate? It's simply done by asking questions and being straight forward. It also helps if you try to be genuinely interested in who they are. If you take the time to ask about their likes and dislikes, chances are, your subject will open up much more. You'll then be able to get a better feel for who they are as a person. Once you do that, your pictures will speak for themselves!

Know the Details

"God is in the details." That old saying works well with portrait photography as well. It’s important to observe the subject to be able to focus in on things they are good at. Does your subject sneeze female viagra sildenafil often? Do they photograph better on one side as opposed to the other? Do they twitch a lot? Do they have to keep adjusting their glasses? Do they hate sunlight? Are they more at home with nature or with gadgets? Those are just a few examples of the little tendencies you can see in your subject that will help you decide what best suits their persona.

Be Friendly

There's nothing like breaking the ice and getting to know your subject better. Observing them and asking them a few questions might get you answers, but you still may not be able to capture a Kodak moment. For that to happen, you need to gain your subject's respect. You need to guide them through the emotions you want to capture with your conversation by talking to them, making them laugh and essentially, making them be themselves. Once you establish that rapport, you will come away with tons of great pictures. It could be the wry smile, the casual glance, the contemplative profile, the creased forehead, the sparkling eyes, the terse lips, the animated face and so on. But, if the subject doesn’t know you, they will be stiff as a collar and you will end up with photographs that don't represent them at all.

Here's to letting a little personality shine through in your photos!

Permalink • Print • Comment

Turn off the CD AutoRun feature in Windows XP

Q:
How do you turn off the CD AutoRun feature in Windows XP? I see a tip on it for Windows 98 and ME, but what about XP? Please help!

A:
It's time to get back to the basics! You're right, we have done a tip on how to turn off the AutoRun feature in Windows 98 and ME and if you're interested in that, you can read female viagra does it work title=”http://www.worldstart.com/tips/tips.php/1347″>here. But, if you're an XP user, please keep reading!

In case I've already lost you, let me first explain what AutoRun really is. Basically, AutoRun works with your computer's CD ROM drive. When you insert a CD into the drive and you close the drive tray, your CD usually starts up on its own. Hence the name AutoRun! But what if you don't want it to do that? What if you just want the CD to sit there until you pick the program you want to open it up in? Does that sound like a better deal to you? Otherwise, the CD may open in a different program than you want and then you have to go through the process of stopping it, opening up the other program, starting it again, etc, etc. It's just not worth all of that sometimes! So, instead, you can turn off the AutoRun feature and do things the way you want them done. Let's see how!

Okay, now that we have that out of the way, here's how you can turn the AutoRun feature off in Windows XP. Please keep in mind that this tip works with your Registry Editor and you should only do this if you're 100 percent sure you can handle it. If not, please find some help. Here we go!

1.) Go to Start, Run and type in "regedit" (without the quotes). Click OK.

2.) Once you're there, double click on the entry that says HKEY_LOCAL_MACHINE.

3.) Next, double click on SYSTEM, then CurrentControlSet, then Services and finally Cdrom. That will bring up some text on your right hand side panel.

4.) Find the entry that says AutoRun and double click on it. You will then see the value data for the AutoRun. It will probably have the number 1 entered in, so go ahead and erase that and replace it with 0 (zero). Click OK.

5.) Now, just restart your computer and you'll be all set!

That wasn't too painful, was it?! So, from now on, when you use a CD in your computer, you can choose what you want it to do next. It all lies in your hands now!

Permalink • Print • Comment

March 17, 2008

Clarity Sought on Electronics Searches

U.S. Agents Seize Travelers' Devices  

By Ellen Nakashima
Washington Post Staff Writer
Thursday, February 7, 2008; A01

Nabila Mango, a therapist and a U.S. citizen who has lived in the country since 1965, had just flown in from Jordan last December when, she said, she was detained at customs and her cellphone was taken from her purse. Her daughter, waiting outside San Francisco International Airport, tried repeatedly to call her during the hour and a half she was questioned. But after her phone was returned, Mango saw that records of her daughter's calls had been erased.

A few months earlier in the same airport, a tech engineer returning from a business trip to London objected when a federal agent asked him to type his password into his laptop computer. "This laptop doesn't belong to me," he remembers protesting. "It belongs to my company." Eventually, he agreed to log on and stood by as the officer copied the Web sites he had visited, said the engineer, a U.S. citizen who spoke on the condition of anonymity for fear of calling attention to himself.

Maria Udy, a marketing executive with a global travel management firm in Bethesda, said her company laptop was seized by a federal agent as she was flying from Dulles International Airport to London in December 2006. Udy, a British citizen, said the agent told her he had "a security concern" with her. "I was basically given the option of handing over my laptop or not getting on that flight," she said.

The seizure of electronics at U.S. borders has prompted protests from travelers who say they now weigh the risk of traveling with sensitive or personal information on their laptops, cameras or cellphones. In some cases, companies have altered their policies to require employees to safeguard corporate secrets by clearing laptop hard drives before international travel.

Today, the Electronic Frontier Foundation and Asian Law Caucus, two civil liberties groups in San Francisco, plan to file a lawsuit to force the government to disclose its policies on border searches, including which rules govern the seizing and copying of the contents of electronic devices. They also want to know the boundaries for asking travelers about their political views, religious practices and other activities potentially protected by the First Amendment. The question of whether border agents have a right to search electronic devices at all without suspicion of a crime is already under review in the federal courts.

The lawsuit was inspired by two dozen cases, 15 of which involved searches of cellphones, laptops, MP3 players and other electronics. Almost all involved travelers of Muslim, Middle Eastern or South Asian background, many of whom, including Mango and the tech engineer, said they are concerned they were singled out because of racial or religious profiling.

A U.S. Customs and Border Protection spokeswoman, Lynn Hollinger, said officers do not engage in racial profiling "in any way, shape or form." She said that "it is not CBP's intent to subject travelers to unwarranted scrutiny" and that a laptop may be seized if it contains information possibly tied to terrorism, narcotics smuggling, child pornography or other criminal activity.

The reason for a search is not always made clear. The Association of Corporate Travel Executives, which represents 2,500 business executives in the United States and abroad, said it has tracked complaints from several members, including Udy, whose laptops have been seized and their contents copied before usually being returned days later, said Susan Gurley, executive director of ACTE. Gurley said none of the travelers who have complained to the ACTE raised concerns about racial or ethnic profiling. Gurley said none of the travelers were charged with a crime.

"I was assured that my laptop would be given back to me in 10 or 15 days," said Udy, who continues to fly into and out of the United States. She said the federal agent copied her log-on and password, and asked her to show him a recent document and how she gains access to Microsoft Word. She was asked to pull up her e-mail but could not because of lack of Internet access. With ACTE's help, she pressed for relief. More than a year later, Udy has received neither her laptop nor an explanation.

ACTE last year filed a Freedom of Information Act request to press the government for information on what happens to data seized from laptops and other electronic devices. "Is it destroyed right then and there if the person is in fact just a regular business traveler?" Gurley asked. "People are quite concerned. They don't want proprietary business information floating, not knowing where it has landed or where it is going. It increases the anxiety level."

Udy has changed all her work passwords and no longer banks online. Her company, Radius, has tightened its data policies so that traveling employees must access company information remotely via an encrypted channel, and their laptops must contain no company information.

At least two major global corporations, one American and one Dutch, have told their executives not to carry confidential business material on laptops on overseas trips, Gurley said. In Canada, one law firm has instructed its lawyers to travel to the United States with "blank laptops" whose hard drives contain no data. "We just access our information through the Internet," said Lou Brzezinski, a partner at Blaney McMurtry, a major Toronto law firm. That approach also holds risks, but "those are hacking risks as opposed to search risks," he said.

The U.S. government has argued in a pending court case that its authority to protect the country's border extends to looking at information stored in electronic devices such as laptops without any suspicion of a crime. In border searches, it regards a laptop the same as a suitcase.

"It should not matter . . . whether documents and pictures are kept in 'hard copy' form in an executive's briefcase or stored digitally in a computer. The authority of customs officials to search the former should extend equally to searches of the latter," the government argued in the child pornography case being heard by a three-judge panel of the Court of Appeals for the 9th Circuit in San Francisco.

As more and more people travel with laptops, BlackBerrys and cellphones, the government's laptop-equals-suitcase position is raising red flags.

"It's one thing to say it's reasonable for government agents to open your luggage," said David D. Cole, a law professor at Georgetown University. "It's another thing to say it's reasonable for them to read your mind and everything you have thought over the last year. What a laptop records is as personal as a diary but much more extensive. It records every Web site you have searched. Every e-mail you have sent. It's as if you're crossing the border with your home in your suitcase."

If the government's position on searches of electronic files is upheld, new risks will confront anyone who crosses the border with a laptop or other device, said Mark Rasch, a technology security expert with FTI Consulting and a former federal prosecutor. "Your kid can be arrested because they can't prove the songs they downloaded to their iPod were legally downloaded," he said. "Lawyers run the risk of exposing sensitive information about their client. Trade secrets can be exposed to customs agents with no limit on what they can do with it. Journalists can expose sources, all because they have the audacity to cross an invisible line."

Hollinger said customs officers "are trained to protect confidential information."

Shirin Sinnar, a staff attorney with the Asian Law Caucus, said that by scrutinizing the Web sites people search and the phone numbers they've stored on their cellphones, "the government is going well beyond its traditional role of looking for contraband and really is looking into the content of people's thoughts and ideas and their lawful political activities."

If conducted inside the country, such searches would require a warrant and probable cause, legal experts said.

Customs sometimes singles out passengers for extensive questioning and searches based on "information from various systems and specific techniques for selecting passengers," including the Interagency Border Inspection System, according to female version of viagra a statement on the CBP Web site. "CBP officers may, unfortunately, inconvenience law-abiding citizens in order to detect those involved in illicit activities," the statement said. But the factors agents use to single out passengers are not transparent, and travelers generally have little access to the data to see whether there are errors.

Although Customs said it does not profile by race or ethnicity, an officers' training guide states that "it is permissible and indeed advisable to consider an individual's connections to countries that are associated with significant terrorist activity."

"What's the difference between that and targeting people because they are Arab or Muslim?" Cole said, noting that the countries the government focuses on are generally predominantly Arab or Muslim.

It is the lack of clarity about the rules that has confounded travelers and raised concerns from groups such as the Asian Law Caucus, which said that as a result, their lawyers cannot fully advise people how they may exercise their rights during a border search. The lawsuit says a Freedom of Information Act request was filed with Customs last fall but that no information has been received.

Kamran Habib, a software engineer with Cisco Systems, has had his laptop and cellphone searched three times in the past year. Once, in San Francisco, an officer "went through every number and text message on my cellphone and took out my SIM card in the back," said Habib, a permanent U.S. resident. "So now, every time I travel, I basically clean out my phone. It's better for me to keep my colleagues and friends safe than to get them on the list as well."

Udy's company, Radius, organizes business trips for 100,000 travelers a day, from companies around the world. She says her firm supports strong security measures. "Where we get angry is when we don't know what they're for."

Staff researcher Richard Drezen contributed to this report

Permalink • Print • Comment
« Previous PageNext Page »
Made with WordPress and a search engine optimized WordPress theme • Sky Gold skin by Denis de Bernardy