Impressive Internet Speed – Mozilla Firefox (FREE)
~James Dunn
Looks like this was a temporary benefit. My access speeds are still faster than with IE, but they have dropped off some since I first installed Mozilla.

Recently, I loaded Mozilla Firefox (internet browser); much improved internet access speed!

I’ve been patient regarding Yahoo 360 and the extraordinary wait times. Guess what, they were non-existent in Mozilla. The problem with Y360 wait times had something to do with Internet Explorer.

This was a temporary benefit that I enjoyed; it was nice while it lasted.

Sending messages was still delayed (apparently a Yahoo problem), but browsing blogs was soooo much more enjoyable.

Mozilla Firefox flew through my Y360 blog pages with no apparent wait times!!!!!!

Mozilla operates pretty much the same as IE, there is some variation. Like when you do a Ctrl-F to find a keyword on a webpage; the search menu is at the bottom of the page, instead of an IE pop-up, and an add-on allows your links to follow you regardless of what computer you are using. But regardless of the small differences, I could browse through Y360 blogs 20+ times faster! Tabs are still present, and even my Google toolbar.

You can get Mozilla Firefox for FREE at:

Let me know if you had similar performance improvements. I don’t know what slowed Firefox down with time and use.

Creating a Compass for Cell Phones
~James Dunn

Inspired by eFontana


[Google Android is an open architecture software that allows home grown software developers to create applications for cell phones. Anyone (you, me, anyone) can create applications to do whatever your imagination allows.

A software developer asked about having a digital compass chip included in cell phones for developers to use in their applications. The following was my input to provide them with a workable solution that doesn’t require cooperation with manufacturers to achieve his goals.]


A MEMS chip can be a collection of sensors (temperature, accelerometer (x,y,z), atmospheric pressure, Hall effect sensor (compass), …) all built into the same chip. In mass production the chip could be relatively inexpensive.….

However, an Android shortcut would be to use the GPS sensor and your relative direction of travel to produce a compass bearing over 100 feet of uniform travel. For each model of cell phone the antenna sensitivity changes as you rotate the cell phone about a point. This could potentially be tied in with relative position movement to estimate a compass bearing about a point.

But as I said, the lookup table would be different for each model of cell phone (i.e. the user would have to complete a calibration mode and then spin themselves 360 degrees around where they are standing; this would need to be done for each location to load the data sensativity into a lookup table).

This type of engineering where you take two sensors with low resolution to combine their results to provide greater resolution is called “Sensor Fusion”.

Basically a cell phone antenna signal does NOT have the same signal profile when you rotate left versus rotate right. This can be capitalized upon to determine the relative bearing of which the compass is facing. Coupled with the cell phone GPS the relative bearing can be referenced to the true bearing. A lookup table can provide a correction factor and thereby produce Magnetic Bearing; vis vi Compass.


By using the variable signal profile, it is useful for when a dedicated compass sensor is not available in the cell phone. The variability due to a persons body, phone orientation, obstructions, transponder location relative to cell phone, … all have to be taken into consideration to make a useful product.

One potentially useful scenario might be:

Instructions for using compass.

“Walk in a straight line in the direction the top of the cell phone is pointing; choose a target to walk toward and hold the cell phone flat like you would any mechanical compass. The cell phone will beep when you arrive at the calibration position.”

“After hearing the beep, rotate about your position smoothly and slowly (4 seconds, 1 second and 1 beep for each 90 degrees), until you return to face your starting position. The display will automatically display the compass bearing around this position.”

“If you move more than 15 feet from this position, the compass bearing will be removed from the display until Calibration is done for a new position. This prevents the user from using old data.”

This would be done every time a person wanted a compass bearing.

At this one position, they could rotate back and forth and get compass bearing information. When the GPS sensed any new position, the Compass would replace the compass readout with “Perform Calibration”.

They would have to repeat calibration every time they wanted a compass bearing unless higher level algorithms are running in the background while the user is walking. Updating lookup table(s) with information to derive similar data from moment to moment.

Again, this scenario is only useful if a compass sensor is not available in the cell phone. Which is almost all cell phones made today.

But I agree, if a compound MEMS chip (with Mag sensor) were incorporated in cell phones then this sensor fusion option would be unnecessary.

Free Productivity Software – Similar to MicroSoft Office
~James Dunn

I came across an initiative by some very talented software programmers where they created their own version of Word Processor, Spreadsheet, Database, and Publisher programs; and they are giving them away for FREE.

They appear to be MicroSoft Office document compatible, in addition to being compatible with many other companies that produce these types of software.

Additionally, it caught on to where other software programmers are continuously adding new features to those packages.

I’ve got MicroSoft productivity software, so I haven’t a personal need for such software. But I thought a number of you might have an unmet need like:

  • School environment needs productivity software
    • teachers can give students software to take home for Free.
  • Productivity software for your kids computers.
  • Productivity software for old computers that are collecting dust.
  • Downloading productivity software while traveling after your computer crashes.
  • Quoting a competitive bid related to some project you are bidding on.
  • Never used such software, and you want to play with it for your own interests.
  • An inexpensive gift for someone you know that has a need.
FREE Services for Protecting your Computer
~James Dunn

I like MicroSoft OneCare for a commercial product that takes care of virtually everything associated with the security of your computer; you get 3 licenses for about $50 a year (about $17 a computer). I use it myself on 3 of my computers and have had zero issues on those 3 computers.

I like it mostly for two of its features: it keeps the registry clean so my computer doesn’t slow down, and the Backup program allows each computer to automatically back itself up on one of the other computers; so if one computer dies, the backup is always up to date on one of the other computers.

But on my 4th computer I didn’t want to purchase another license so I optioned to use free security protection software offered on the Internet. These are well established programs that have had a good history of working well.

As always, backup your system and data before you attempt to do anything which might arbitrarily affect computer operation.

Windows XP “System Restore”

This built-in XP program will return your computer to a known condition. If you get into something unexpected, you can potentially use System Restore to get rid of a new glitch or other problem. Basically, it returns your system to what existed on a particular date.


<All Programs>


<System Tools>

<System Restore>

Check <Create a Restore Point> This will save your current system before you do anything else.

Come back here if you want to Restore your computer to a previous known condition.

Check <Restore my Computer to an Earlier Time> To a date Before a problem existed.

If you go back far enough, you will breeze past where you may have installed a program and unload it. System Restore in-general does not affect data storage.

System Restore uses a fixed amount of memory, so eventually the oldest saved system settings will be overwritten by new settings during the creation of the current Restore Point. So you can not arbitrarily go back to the settings of two years ago. So watch carefully for glitches and get rid of the glitches as soon as possible (like a pop-up disables your firewall).

Reboot your computer manually after using System Restore. This helps to stabilize your computer.

After using System Restore, remember to get the Updates from Microsoft so your computer has the current security patches.

Again, reboot your computer manually after installing the security patches.


Scanning Your Computer for Problems Before Loading Security Software

You can run a free security check software from Microsoft before you attempt to download security programs. This will help ensure a hacker hasn’t put something on your computer to keep security software from loading properly.

Make sure you backup and save any volitile programs and all your data before running this program. As you should do before running any new program!



Yahoo Default Email client and Pop-up Protection

If you do Not want Yahoo Messenger, but you still want pop-up protection and Yahoo Mail to open automatically.

You can just download the Yahoo Toolbar here:

The Yahoo Toolbar provides free Pop-up protection, and provides the utility to allow IE to open the Yahoo email Compose page with the email link you clicked on in a web page.

Be sure to browse the available buttons for the Yahoo Toolbar, many of them are quite useful.

  • Restart your computer
  • Open your Internet Explorer web browser
  • Select “Tools” from the menu bar
  • Select “Internet Options”
  • Select “Programs” tab
  • Drop down “Email:” list and select “Yahoo! Mail”
  • Select “OK”.If you would rather use Yahoo Messenger to automatically open your Yahoo email Compose window when you click on an email link:
    • Download the most current version of Yahoo Messenger and include ALL of the options
    • Restart your computer
    • Open your Internet Explorer web browser
    • Select “Tools” from the menu bar
    • Select “Internet Options”
    • Select “Programs” tab
    • Drop down “Email:” list and select “Yahoo! Mail”
    • Select “OK”

    This also provides you with a large number of useful tools on your desktop, including messaging, streaming music, Finance tools, your Yahoo Calender and Address book, news, games…

    Now whenever you click on an email link your Yahoo email program will start automatically.


    Registry Cleanup

    My laptop started running really slow.

    You can use a free registry cleaner from Microsoft for your PC, this helped immensely:

    MicroSoft OneCare Registry Cleaner

    Read the terms of use. There might be something specific to your machine.


    Anti-Virus for your computer and email:

    This is a free antivirus program that my father has been running for years, without any issues. It does not check for spyware, just viruses.

    Anti-Virus Group (AVG)


    Anti-Spyware Protection:

    This program protects your computer from hackers who place small programs in your computer to capture your account numbers, passwords, usernames, ….

    Nothing is hack-proof, but this program found over 60 occurrences of spyware on my computer the first time I used it; then it cleaned it off.

    Spybot Search & Destroy


    Firewall Protection:

    A Firewall creates a lockable door between you and the Internet/network. Programs must have a key to be able to interact with your computer. This is the most important tool to protect the security of your computer. Be careful who you give a key to.

    The best firewall I know of, is the Hardware Firewall provided by Routers. Many of us have wireless routers so that we have a Wi-Fi network in our home. This has saved my computer on a large number of occassions. Even if they get past my Windows Firewall (software), they are stopped by my hardware firewall.

    To enable your Windows Firewall

    • Click <Start>
    • Click <Control Panel>
    • Click <Windows Firewall>
    • Check <On (Recommended)>

    To Obtain a Free Software Firewall

    POP-UP Windows and their ability to Get Around Your Firewall

    The pop-up windows that ask you a question are attempting to get a “key” from you to gain access to your computer. All you have to do is click on one of their control buttons (yes or no for example) which tells your computer to give them access. Often the displayed pop-up has nothing to do with what the buttons are intended to do.

    Some of those pop-up applications are designed to permanently turn off your firewall and notify the hacker that your firewall is shut down. Allowing the hacker access to everything in your computer. Unless you have a hardware firewall, like in your wireless router.

    Unless I’m on a reputable website where I am intentionally trying to use one of their services, I won’t ever click on a pop-up control! Ever! Every time one of those controls is clicked, I’m taking a risk that its a hacker trying to mess with my machine.

    Usually it is benign stuff and companies want to look at your usage statistics that IE collects. However, sometimes it is hackers trying to get information or just to mess up your computer.

    No matter which button you push on a pop-up, whether it says yes or no, any button starts an “Active-X” control that loads a program through your firewall. You just gave them a key by pressing one of the buttons.

    Instead of clicking any of the buttons inside the pop-up Window, click on the little “x” in the top right corner of the system window frame. This usually will get rid of the pop-up without having to use any of their controls.

  • If the pop-up doesn’t have a frame, where they are trying to force you to use their controls.

    • Press together the buttons Ctrl, Alt, Delete
      • this will open your Task Manager
    • Select “Task Manager” if it is given as an option.
    • Click on the “Applications” tab.
    • Click on any program that doesn’t look like it belongs
      • usually an Internet Explorer icon with some wording that describes the pop-up will be visible
    • If nothing unusual is visible, then close down Internet Explorer and restart the Internet Explorer application and navigate back to where you were before the pop-up.

    Remember, any pop-up you click on is a risk. I only click on pop-ups when I’m on reputable sites and I’m specifically trying to do something that requires the pop-up.

    Low-cost Web Hosting

  • Table of Contents – a method of conserving bandwidth usage
    ~James Dunn

    Multiply support has been responsive to issues members have brought up. Yahoo has been unresponsive, so I will again request a simple tool for users to organize their blog pages; but this time from Multiply.

    Please include a “Table of Contents” module with a link labeled “Table of Contents” located at the top of every blog page.

    Member inspiration occurs randomly with time. Therefore blog entries are random both in content and type. The random nature of reading blog pages is annoying, and requires a great deal of Multiply available bandwidth.

    A simple blog tool that would automatically grab the blog page title and associate that pages’ URL

    [a href=”″%5DTable of Contents[/a]

    and open the Table of Contents to let the member drop that linked text under a member configurable heading is desparately needed. See

    for an example.

    The member would be allowed to copy and paste any linked text to more than one location; such as Activities and Location.
    Table of Contents

    Family Stuff

    * Whatever

    Things to Do

    * City
    o Phoenix
    + Activities (a title composed by Member)
    # Celebrations (a title composed by Member)
    * New Years (a link to Member blog page)
    * Fourth of July (a link to Member blog page)
    # Nightclubs
    # Restaurants
    o Tulsa
    + Activities (a title composed by Member)
    # Celebrations (a title composed by Member)
    * New Years (a link to a Member blog page)
    * Fourth of July (a link to a Member blog page)
    # Nightclubs
    # Restaurants

    Another natural feature is that the linked text is de-highlighted when guests click on that particular linked text (cookie associated with links). So each guest will independently know what pages they have already reviewed (conserving available Multiply bandwidth).

    This is easily scripted and provides a much needed tool in the blogging community. Web designers can use any number of methods to implement this tool. The best implementation being a module that allows drag and drop utility.

    This is so simple, I can’t believe it isn’t commonly available. But a Table of Contents tool is desparately needed in the blogging community.

    Obviously “Table of Contents” features can always be added (ask me and I’ll provide lots of options), but having a simple tool to begin with is vital for any Journal, especially one that is is informational, and 300 or more pages. Imagine having to cruise through blog pages looking for interesting content from a dial-up connection! Scanning links is much more efficient and uses far less bandwidth.

    A “Table of Contents” allows Multiply to conserve its’ overall bandwidth usage, and provides Members with an industry unique tool.

    James Dunn


    The above was sent to Nov 5, 2007 at 4:45 am, however, I had sent Yahoo a request for a Table of Contents tool earlier this year (on file) and it was documented in my 360 Tips and Tricks blog page.

    EMERGENCY Recovery of your Yahoo Account
    ~James Dunn

    Yahoo has a condition known as Syncing that allows it’s multiple services to talk to one another. I’ve had two Friends that have lost access to their email accounts and to any other account related information due to account corruption. Through no fault of their own! Even though they know their current username and password, Yahoo representatives will NOT re-sync the account unless the customer can provide the account:

    1. Username
    2. Date of Birth
    3. Postal code

    Your password apparently does not matter. Their software requires you to know the Date of Birth and Postal Code you used in your account. Did you use a ficticious Birth Date when you created your account?

    I just found out that Yahoo does not let the customer see their own date of birth! The postal code is published in the profile section of your account.

    Knowing the Date of Birth and Postal Code is EXTREMELY important to help protect access to your email, contact information, blog access, financial services, and all other Yahoo services associated with your account.

    Link to online Yahoo Help form:

    If you have lost access to your account, you can call Yahoo services at:

    press 2 for password and access help .

    How to get Yahoo to Protect your Data:

    Contact Yahoo corporate and request that they change their Customer Service software to allow the username and current password to be used to re-sync your account and update your date of birth. Also have Yahoo provide a means of backing up your data on your computer.

    email them at:

    Copy and Paste the following, to the above email link:

    Yahoo has a security problem; users are losing vast amounts of data. I am requesting that Yahoo-Inc provide the following:

    A user wants to have their account services resynced. They should not have to provide ANY security identification. Yahoo should be required to maintain the sync on all accounts without user interaction. The user that contacts customer service with “just” their username should have sufficient authority to resync an account. No information is requested by the user. They just want their account services to be repaired.

    An automated script can be created by Yahoo to run a diagnostic sequentially on a list of Yahoo usernames. Customer Service would only have to pop the requested username into the username list and the script would automatically run a diagnostic and resync account services. If the user still has a problem, it’s not related to service syncing and a password or birthdate is required for further assistance.
    In the sign-up webpage, where entering the Birthdate is requested. Indicate the extreme importance of entering the birthdate “correctly”. “Incorrect entry may make it impossible for Users to recover access to their account.”
    In addition to the Birthdate and Postal Code, provide access to Customer Service and the user account through use of their Password (since this should provide access to the user account anyway). Presently the current password can NOT be used by Customer Service to gain entry to the user account.
    Create an automated script that allows users to securely BACKUP ALL of their Yahoo account settings and data to a CD/DVD. Also create a reverse application to allow the user to take the CD/DVD and upload that information into a new account or the present account. That way if the user account becomes corrupted, the user can upload their saved data and settings.

    To discourage abuse, a code sent along with the download to the CD would prevent the user from uploading the user data to more than two (2) accounts (husband and wife / significant other accounts). Also, through intent, the procedure would take 30 minutes to complete (download or upload), locking out any access to Yahoo services from that IP Address during that time; even though the total data transfer may take only 10 seconds or less.

    Yahoo presently has a similar and simplified tool for saving the user address book. However, a comprehensive cross-service backup is desired to include ALL settings and formatting: the blog pages (including friends, comments, messages, … from 360 and mash), financial information from Yahoo Finance, all information and settings associated with email (contact lists, messages, folders, …), and similarly with ALL Yahoo services linked by the user account name.

    If a third account is created and the data on the CD/DVD is attempted to be uploaded, warn the user that the original account which originated that CD/DVD will be made inactive, and then deleted. The account that originated the CD/DVD would be deleted after 1 month following the creation of the third new account; reception of email is still allowed during that month, sending email is disabled after 24 hours. Appropriate messages would be sent by Yahoo to both the Old and the New Account as appropriate. Email would NOT automatically forward to the new account so that SPAM is deterred. All other related Yahoo Services would recieve similar messages.

    The importance here is that all accounts are completely independent, so that any potential server problem does not propagate to the new accounts. This provides the user with a means to protect their Yahoo related data.

    The reasoning for these requests:

    The email account for two different Yahoo users located on different continents were corrupted, to the point that the users can not provide any information that would allow them to recover access to their account, or the data in those accounts. Based on probability and that I know only a few hundred Yahoo members, that would mean many thousands of Yahoo members have had similar problems.

    One used a ficticious birthdate to protect themselves from identity theft; they did not know the importance of the birthdate entry. While the other new the birthdate and postal code, but still could not gain entry into their account.

    How does the Birthdate protect user security? Without the user knowing the importance initially, Yahoo ensures that their account will eventually be corrupted.

    Yahoo has provided significant means by which people can interact with the internet. But as such, the time, effort, and trust users have entrusted Yahoo makes Yahoo “ethically” responsible for ensuring reasonable access to Yahoo user created information.

    Presently, Yahoo negligently destroys a large piece of user developed life. One of these people lost access to a blog she had been developing for 5 years; providing detailed information about life in Thailand as a public service. Additionally, she lost her contact list where she had made friends throughout the world.

    Destructive Hackers:
    Does Yahoo have a security problem where a hacker is intentionally corrupting Yahoo user accounts?

    Yahoo Customer Service: 866-562-7219

    * press 2 for Yahoo password and access help

    Chain Mail – Hacker Tool to Harvest email addresses for Spam
    ~James Dunn

    Apparently hackers use chain mail to harvest email addresses to sell to Spam companies.;

    Forward chain mail, incur more spam;

    for yourself, your friends, and family as well.

    Yahoo 360 – Future Features I would like to have
    ~James Dunn

    Yahoo 360 Features I would like to have:

    * A one-button Backup Tool that would save ALL of the users preferences, profile data, and blog pages, to the users home computer or to a CD/DVD
    o Ideally this should be in a format that conforms to a industry standard
    o The utility should capture and properly associate all guest comments
    o The utility should capture and properly associate all user code
    + uTube, music, cursor generators, css, frame modifications, …
    * Active blog web space (including comment areas) where HTML/Server Tools/Javascript controls work
    o this would allow linked partitioned graphics to work like maps
    o this would allow controls like counters to work
    o provides interactive access to tools like Excel
    * A 360 Tools link where advanced features and formatting can be obtained
    * Access to server tools
    o Server tools for specific applications in blogs
    + interactive updating of an Excel spreadsheet
    + Access database interactive update
    + polls that automatically enter responses in an Excel spreadsheet with the results posted back to the blog entry
    # the spreadsheet would automatically capture the username and prevent them from voting twice
    + interactive Word creation where the composed document can be sent to:
    # This would be use for writing form letters and allowing the user to modify the content.
    * the user’s printer
    * an email address
    o this feature would only allow 2 or 3 emails with the same content to prevent it being used for spamming
    * saved to a local file
    * A more robust WYSIWYG editing tool to include
    o a better implemented manual spacing control
    + both letter spacing and line spacing
    o tables
    o an Excel interface that updates from my computer when I log in
    + a feed tool that automatically fetches information from another website like the Wall Street Journal based on keywords found in the web page
    o counters (with option to make visible only to owner)
    + for individual blog articles
    + for individual links that have been clicked
    o a file storage area where Excel, PDF, Word, Powerpoint, Access dB, and text files can be stored and then pointed to within the blog
    + file space can be limited as with email
    + file permissions based upon Friend category
    o a text box where “Friends” can interactively modify content
    + For instance a short story can evolve where everyone contributes to the story line
    + Which Friends would have access would be controlled by the “Category” that they are placed in under the “My Friends” control
    o a toggle control on the main blog entry would show or hide a rich text box where the sub-page would describe the artwork, poem, concept, related links in detail
    + this allows readers to scan quickly through journal entries, artwork, poems, … and then click on the namable Concept link to toggle a verbose explaination by the writer/artist
    + this same tool could be used to:
    # compose tests and then toggle the answers
    # create flash cards and toggle the appropriate response
    # create recipes and toggle the procedure details

    an option in the blog setup would ask what type of blog entries you intend to make

    chronological journal entries

    the current display and features would be implemented
    o topic based entries
    + a “Table of Contents” would be created
    # a permanent link over the picture to the left would allow anyone at anytime to access the Table of Contents
    * in parenthesis after Table of Contents the Index link would be found
    o Table of Contents (Index)
    # after creating a blog entry, the system would prompt you to select a heading under which you would put the current blog entry link
    * the heading of the blog entry would be used and the URL embedded in that heading
    + the current Calendar would be deleted
    + the Tag Cloud would be deleted
    + an Index link would open a separate window with the Index information
    # the Index page would have a much broader space where words that have any letter capitalized are headings and words in lower case are links to the related blog pages
    # the current tag words text box would be used to enter Index keywords
    # lower case words following any word with a capitalized letter in it, would be associated with that word/heading
    * multiple headings and associated index word sets can be listed for the same blog entry in the provided Index text box
    # Clicking on a link in the Index pulls up a “list” of all pages with the related headings and index words
    o art based entries
    + a free-form blog list where the artist can randomly move the order in which artwork is seen
    + an icon list like the “Friends” icon list would contain iconized artwork of the artist
    # clicking on the “See All Artwork” link would display a list of icons associated with all the artwork entered by the artist
    * The username be used everywhere instead of the computer created URL name provided at present.
    o Instead of
    o Use instead
    * A method of linking to a particular places in blog entry
    * Access to a header file to allow such entries as:
    o play music file when opened
    o refresh to URL address a number of seconds after page loading done
    o keywords for robot search of URL
    o name the page
    o describe the page
    * Provide a search text box on blog page to allow readers to search just that blog for related information
    * Provide a means for readers to enter related links associated with a blog entry
    o An optional “related links” page would appear that would allow the readers to enter links and a short description to allow a growing body of knowledge
    o Allow for active links in comments section of blog entry
    * Provide an easy means for the owner to change the sequential order of blog entries
    o a drag and drop text listing
    o “Move UP” / “Move Down” buttons
    o a drag and drop icon listing
    * Provide a means to search the Yahoo 360 blog space for graphics pointed at by an upload object
    o simple 10 point comparison based upon percentage of hieght and width
    * Provide a means of including “active feeds” on individual blog entries. This would be useful for:
    o discussing stock market trends
    o current events related to certain individuals
    o monitoring specific world events

    Image-based Search Utility

    November 27, 2008

    Image-based Search Utility
    ~James Dunn

    Yahoo and Google need to maintain a technological edge to maintain their user base, and advertisers.

    A picture can be loosely described by colors used, pixel positioning, and literally more than 1000 unique graphic qualities; most of which are NOT related to graphic media size, or orientation. Many of these identifiers can be calculated extremely quickly.

    For instance: Each picture has a number of pixels for its width and height, divide each number by 10 and sample the pixels at those positions. The color information at each of those positions is largely unique for complex pictures. You could take 100 million photographs and never repeat this combination. So any picture on the Internet with that information is strongly related.

    There are thousands of related processing techniques to identify shapes like circles and lines, shading, human features, animal features, … A select set of these techniques would allow for finding with strong confidence related pictures.

    Similar types of image processing is used in robotics.

    If a person had a picture, let’s say of a water wheel. They could upload their picture to the Search Engine and then the server could look for likely hits; similar to looking for text hits.

    Anytime someone would look at graphic media through Google or Yahoo, the graphic media would automatically be processed and a list of unique identifiers cataloged along with the graphic data. The person looking to find related graphic information could choose the level of similarity, and also include text that might be found on the same web page to increase the probability of getting a related hit.

    Also, whenever a picture is included in a web page, the Google or Yahoo toolbar could be configured to find related graphic media on the Internet just by clicking on a picture that you are looking at.

    Artists could find where their work was inappropriately copied. Pedophile content could be easily found and removed/blocked. People could find their long lost friends and relatives. Criminals might even be found.

    Someone breaks into your house and your security camera gets a picture of them. They have a profile on Yahoo. You search for a picture of the burglar and find the profile. You give the information to the police for them to investigate. It could be just someone that looks similar, or it could be the burglar.

    Using this method of searching would allow Google and Yahoo to help hold onto the technological edge for their search engines.

    How To Protect Against “Yahoo! Messenger” Booting and Spam
    ~James Dunn

    Booting relates to someone intentionally sending a series of commands, only in Yahoo Messenger, that causes Yahoo Messenger to freeze up and possibly reset your computer. This problem has nothing to do with your Yahoo account.

    The following was an automated response related to “Booting”, “Harassment”, & “Threats” on Yahoo Messenger. I have added information in brackets […]. To my knowledge, Yahoo makes no other action when reporting a violator.



    Thank you for contacting Yahoo! Customer Care.

    We are very sorry that you are feeling threatened in any way. However,
    there are a few things you can do to take some immediate action.

    [Ensure you are using the most current version of Yahoo! Messenger.

    The current version of Yahoo Messenger has been updated to help block users from causing a buffer over run; which causes Messenger to fail, and sometimes the PC to reboot. The following describes the security weakness and refers the user to update Yahoo Messenger with version 8.

    Somone on your “Friends” list in Yahoo Messenger is the one who is harrassing you. They have created an alternative profile in their account and is using this profile to send harrassing messages and send the booting sequence to shut down messenger and possibly your computer. If you get their full alternate user ID, you can go to;.

    to report their abuse to Yahoo.

    If this doesn’t work, you may be able to find out who the culprit is by adding half of your “Friends” to another account. Switch back and forth between your two accounts to stay in contact with your friends. You may have different Groups set up and you can move that entire group. Then watch for the boot sequence to start. If it happens on the new account, the booter is one of the “Friends” in the new account. If it is still in the old account, they are one of your Friends in the old account.

    Move half of the “Friends” from the offending account to the safe account. Wait for the booter to send a boot sequence. If it still happens on the new account, you have isolated the booter to be in that group.

    Continue to divide by half and move “Friends”, in a short time you will isolate the booter down to one user ID. You can then add them to your Ignore list, and then, delete them from your account. Then of course, after you verify that you no longer are being harrassed, report them on the Yahoo! Messenger Abuse form.;.

    The other abusive situation falls under the same circumstance, you get all these sex related spam messages, and when you hit Ignore, they just keep coming back. The problem is that one of the people on your Friends list has created an alternate profile under the same username that you see on your Friends list. This allows them to send you spam and harrassing messages because the Friends list has priority over the Ignore list. If you have someone spamming you, check your Friends list and delete anyone you think has the potential of spamming you. Likely suspects are the ones that never chat with you, they are just on your Friends list.]

    First, if you feel threatened by the person harassing you we suggest you
    contact your local law enforcement immediately and explain the situation
    to them. You should be able to find the phone number for your local law
    enforcement agency (be that a Police or Sheriff Department) in your
    local phone book or by using Yahoo! Directory Search located here:

    Second, we would recommend that you never accept blind invitations to
    add someone to your friends list, join in any type of photo sharing, or
    communicate with someone you don’t know personally.

    Third, we suggest putting the person who is conducting the harassment on
    your ignore list. To do this please follow the instructions listed

    For Windows Messenger
    In order to ignore a user, they cannot be on your friends list in
    Messenger. So if you have them there you must delete the contact from
    your Messenger List in order to ignore them. Your friends list will
    supersede your ignore list.

    When you ignore a contact, you always appear to be offline to the
    contact. They can never view your status or send you an IM.

    To ignore a contact:

    1. Click the “Messenger” menu in Yahoo! Messenger and select
    2. Click the “Ignore List” category.
    3. Select the option labeled “Ignore only the people below.”
    4. Click the “Add” button.
    5. Enter the yahoo_user_id of the contact you want to ignore.
    6. Click the “Ignore” button.
    7. Click “OK” at the bottom of the window.
    8. You can ignore up to 100 contacts.

    Please Note: You can remove a contact from your Ignore List by selecting
    the yahoo_user_id and clicking the “Remove” button.

    To ignore anyone who is not on your Messenger List:

    1. Click the “Messenger” menu in Yahoo! Messenger and select
    2. Click the “Ignore List” category.
    3. Select the option labeled “Ignore anyone who is not on my Messenger
    4. Click “OK” at the bottom of the window.

    For Mac Messenger

    To ignore a specific user:

    1. Click the “Friends” from the menu bar and then select the “Edit
    Ignore List” option.

    2. Please enter the Yahoo ID of the person you wish to ignore. Make sure
    that you type it exactly as it appears on your screen.

    3. click the “Add” button and then click the “Done” button.

    To ignore anyone who is not on your friend list:

    1. Click the “Friends” from the menu bar and then select the “Edit
    Ignore List” option.

    2. Enable “Ignore anyone who is not in my Friend List” and then click
    the “Done” button. You will always appear offline to anyone who is not
    on your Friend List.

    Thank you again for contacting Yahoo! Customer Care.


    Yahoo! Customer Care

    For assistance with all Yahoo! services please visit:

    Computer Protection and making Yahoo your default email client
    James Dunn

    You can download and use several FREE programs that seem to work well for protecting your computer.

    Spybot Search & Destroy: protects against spyware, worms, trojans, adware, …

    AVG Antivirus: protects against viruses

    Zonealarm Firewall: protects against anyone trying to hack into your computer

    Again, these are all free and I’ve had zero problems since using them for the past 3 years.

    One caveat, if a window pops up and you press a button to get rid of it, the button might say “Close” but its’ function may be to begin download of a trojan or virus. Windows requires a button push to authorize downloading a program through a firewall, but Microsoft does not restrict how the button looks or is labeled.

    Close popup windows you don’t want by clicking on the window ‘X’ in the window frame.

    If the ‘X’ looks funny, like someone tried to duplicate the way it looks, or if the window does not have a frame:

    1) press Ctrl-Alt-Del
    2) select Task Manager (if it isn’t already open)
    3) select the “Applications” window
    4) click on the Internet Explorer applications and delete them (this just stops the program and resets Internet Explorer)

    This way, the hostile program that is trying to trick you into letting it get into your computer, won’t have so easy an access.

    FREE Services for Protecting your Computer


    Yahoo Default Email client and Pop-up Protection

    When you open a web page and you click on a link to email that person, do you want Yahoo email to open automatically in the Compose window?

    • Download the most current version of Yahoo Messenger and include all of the options
    • Restart your computer
    • Open your Internet Explorer web browser
    • Select “Tools” from the menu bar
    • Select “Internet Options”
    • Select “Programs” tab
    • Drop down “Email:” list and select “Yahoo! Mail”
    • Select “OK”

    Now whenever you click on an email link your Yahoo email program will start automatically.


    Registry Cleanup

    My laptop started running really slow.

    You can use a free registry cleaner from Microsoft for your PC, this helped emmensely:

    Read the terms of use. There might be something specific to your machine.


    Anti-Virus for your computer and email:

    This is a free antivirus program that my father has been running for years, without any issues. It does not check for spyware, just viruses.


    Anti-Spyware Protection:

    This program protects your computer from hackers who place small programs in your computer to capture your account numbers, passwords, usernames, ….

    Nothing is hack-proof, but this program found over 60 occurences of spyware on my computer the first time I used it; then it cleaned it off.

    A pay version that simplifies everything

    Windows Live OneCare

    Easy automated care for your computer related to viruses, adware, spyware, firewall, Windows updates, registry cleaning, and automated backups.

    This information does NOT apply to Macintosh, Apple, Linux, or other operating systems. This information most specifically applies to Windows XP, but may be applicable to other versions as well.

    If you select the 90 day free trial software, you will have to completely reload the subscription version after that 90 day trial expires. It’s not just entering a subscription code.

    One subscription allows for protecting three (3) computers simultaneously. So you and two other friends can share the $50 annual subscription cost.

    I’ve not had any problems with my computer being corrupted since installing OneCare 2 years ago.

    Technical Info:

    • Backup any and all data, settings, Favorite Links, and downloaded programs before attempting to load or update any software of any kind.
    • Setup Windows Live Update to automatically update your Windows OS. You must initially install ALL of the current Windows Updates before you attempt to use OneCare, or OneCare won’t synchronize the automatic updates.
      • Initially, you will have to go through a series of software security updates from MicroSoft to help keep hackers out of your computer.
        • This is supposed to be done by the user, but if someone doesn’t know, their system might have missed 20 updates and it could take a bit of time to download the updates; it is mostly automated. But be patient, some of the activities take some time.
          • If you have a dial-up connection, you can do it incrementally, start the next update before you go to work, and before you go to sleep.
        • After manually installing all of the updates, “Restart” your computer twice before doing anything else. This sets up some registry variables that help to make your system more stable.
      • OneCare will automatically update your operating system after you do it manually the first time.
      • Set the time for updates to occur when you are at work or are sleeping.
    • If you have a hacked computer, your operating system may be severely corrupted and the updates may cause your computer to crash. This is because the hacker corrupted the OS so much that things are not where they are supposed to be. You will need to clean off your hard drive and reload the operating system. This is no more of a risk with OneCare than with any anti-hack program. If the damage is done, it needs to be fixed.
    • To add an additional computer, go to the above website and use the identical login information.
    • If for any reason you need to reload OneCare, like changing computers, it will not update immediately. Let it have about 12 hours before you attempt to try to repair it.
    • Make sure your MicroSoft Firewall is ALWAYS turned on and don’t grant any program access to/from the internet unless you know what it is and you trust it.

    I’ve been very happy with OneCare and as of 18Aug07, I’ve not had one single problem related to hacks, adware, registry problems, viruses, or spyware and have been using OneCare for over one year.

    Before installing OneCare I used to use Norton Anti-virus, and other individual anti-hacker packages. Still, about 3 times a year I would have to reload my computer, which took about 8 hours each time. The $50 a year subscription is worth 24 hours of my time, plus I actually save money as compared to buying these products separately.

    Yahoo 360 – Tips & Tricks

    November 27, 2008

    Yahoo 360 – Tips & Tricks

    Backing up your Blog Pages

    Inspired by: San Souci

    As you have noticed, Yahoo 360 continues to be having increased amounts of glitches and delays. There is a real risk that at some point individual blogs may accidentally be damaged and/or deleted.

    You have no doubt spent a great deal of time and unique moments of inspiration in the building of your blog pages. All of it can be lost in less time than a blink of your eye.

    Currently, 360 does not provide a mechanism to backup your blog pages onto your computer or CD/DVD.

    The following provides a simple method to backup your blog pages:

    1. Open your blog in the first page of your Full Post View
    2. Open MicroSoft Word to a “new” document
    3. With your mouse, highlight all five of the blog pages showing in 360
    4. Press Ctrl-C
    5. Go to Word and click on a blank line
    6. Press Ctrl-V
    7. This will past those 5 blog pages into Word
    8. Go back to 360 and click “Next” to display the next 5 blog pages
    9. Go to Step 3 and repeat the process until all of your blog pages have been entered into your Word document.
    10. Save your Word document to a safe location.

    Don’t forget to backup the new pages you create in the future.

    This procedure may, or may not, save “other than text” items you have put in your blog pages.

    An alternative if you don’t have Microsoft Word:

    If you have trouble saving your blog pages in Word, you might alternatively save your pages using the Internet Explorer built in tool:

    1. Open your “My Blog” menu
    2. On Internet Explorer, click on “File” in the top menu bar
      1. If you don’t see the menu bar with File, Edit, View, … then right-click in any empty space of the tool bar area and select “Menu Bar”
    3. Then click on “File”
    4. Click on “Save As”
    5. Draw down the pulldown menu “Save as type” and select “Webpage, html only”
    6. Then enter a name for your file in “Filename”
    7. Then finish by clicking “Save”
    8. Repeat the above on the next set of blog pages.

    This will save your blog pages, but I’m not sure how editable will be. The page I saved as a test was visually identical when you open it with Internet Explorer, but it is graphically skew if you open this file with Microsoft Word.


    Blog Settings to Allow People to Leave You Comments

    People ignoring your Quick Comments – This may be Why

    Often times we leave Quick Comments (Sup?, Tag, Tickle, Smile, Wink,…) in interesting blogs in the hope they will send a message; only to find they don’t or won’t; actually it might be because they can’t. If people who are not in your “Friends” list are not responding, “Your” Blog setting is probably preventing “Everyone on 360” from leaving you a message.

    You may think they are being rude, but it is more likely because of the settings you have in your blog.

    1. Sign in to Yahoo and go to your blog “Top Page” Click “Settings”
    2. Click “Communications Settings”
    3. See the “Yahoo! 360 Messages” pull-down menu? Select “Everyone on 360”.
    4. Click “Save”

    This will allow people that you send a short comment (Sup?, Tag, Tickle, Smile, Wink,…) to respond to you; they can’t otherwise.


    Choosing Words for your Lists

    When you choose a word to enter into your lists, it is more than just a place to write something about your interests, books, music, etc. These are links to find other people with the same interests.

    So when a person, or yourself, is looking at your list entries, a click on that link will bring up other people who entered exactly the same thing; somewhere on their page as a list entry, quote, or anywhere else. So this is a powerful tool to search for others of like interests.

    If you enter a complicated sentence, most assuredly you will be the only person with that interest in 360. “Finding alien artifacts North of Kentucky and South of Michigan”, one hit, yourself, guaranteed!

    Enter an Interest like, “political reform” and you will find hundreds of people with the same interests, maybe thousands. If you change the word slightly, often many more people will pop up. This is important to you if you would like people to find your blog.

    So test the links you create after making your lists. You will make searching for you much easier.

    Also, consider putting your name, nickname, and other personal qualities in your lists. male, brown hair, blue eyes, 5′ 8″, 175#, …


    Code Generator

    The above website provide numerous tools for automatically generating code to put in your blog entries.

    Just generate the code using one of the tools.

    1. Click inside the code area
    2. Press Ctrl-a
    3. Press Ctrl-c

    Then go open your blog page and check the “View HTML Source.” in the upper right corner of your editing blog page.

    1. Click where you want the code to be put
    2. Press Ctrl-v
    3. Click Save to keep your changes

    You can go back and interactively make modifications to your liking.


    Comma for Formatting

    I just learned a little trick in the Interests section of the 360 Home Page. If you place a comma after each interest, even if your interests are on separate lines, the Yahoo 360 software will format your interests nicely with bulliting.

    • interest 1
    • interest 2


    Expanding your Friends list beyond the maximum of 300

    Yahoo 360 provides for a maximum of 300 friends for each blog. So when that number is attained, no one else can request to be added to your blog’s Friend list.

    Work around 1:

    You can create another blog with different usernames. (username, username2)

    Then use each blog’s Blast link to point to the other blog site.

    Now you can add up to 600 Friends.

    Work around 2:

    By creating a common “Table of Contents” link in the Blast of every blog you create, your Friends have transparent access to all of the information and blogs you maintain.

    You can have up to 300 Friends in each blog you maintain.

    So by creating multiple blogs with different usernames, you can provide an effective Yahoo 360 blog with more than 600 Friends.

    I suggest limiting the number to about 290 in each blog so that when new people want to be Added, there is enough space left to be temporarily in your Mailbox until you invite them to one of the other blogs you maintain, by logging into the other blogs account while leaving your new Friends’ page open. That way you can invite them into the blog site where you have room to Add new Friends.

    I have usernames of jamesbdunn, jamesbdunn2, jamesbdunn3, …

    So as my needs grow, so does my Friends list size.

    Currently I operate two active blogs. One is focused on Science & Technology, the other on my Perspectives. But for anyone that uses the Table of Contents I provided, they don’t know the difference.


    The automated Friends Update tool will only work for each site separately. So only the Friends on that blog site will see in Yahoo Messenger an abbreviated display of your newest blog entry.

    Friends may have an interest more in one blog site over another. The Table of Contents pointed to in the Blast must be used to allow them to see all content in all of your blogs. The automated tools 360 provides will not work across multiple blogs.


    Flow of Content

    There isn’t any set format for blogs. Some people just have an online presence here. Others restrict use just to their family and/or friends to stay in contact (you can set up more than one blog for this purpose).

    You have within you things that are of importance to you, it doesn’t matter what anyone else thinks! You express yourself openly and in so doing extend your emotional/creative self out beyond your present boundaries.

    Your present blog site may show you as the business person, gamer, …

    You can create another anonymous blog with a fictional personality that is another side of you, a side that you would otherwise fear the people you know might see. You can openly express yourself without fear of oppression.

    So Yahoo 360 is a tool for you to safely and interactively express yourself.

    You can make entries by date. This is useful for diary style entries. Using “Tags” allows a visitor to see all of the entries related to a common topic. Though the topic content flow is not easily controlled; and the reader may find it difficult to follow a logical sequence of your thoughts.

    Or you can create entries by topic (replace the date with a topic name). You can go back to a topic and edit it to reflect current sentiments, facts, related links, new material resulting from peoples comments, …. In this way a topic can grow in one place. The audience doesn’t need to search for related blog entries, everything is precisely laid out. But this will not show the reader the new information you are entering into a topic.

    A combination of both allows for greater control of information presented to the reader. Enter the new information into a dated Journal Entry and your specific Topic Page. Then after a week or two, delete the Journal Entry to prevent redundancy. You might even preface your notice with “This Notice will be deleted on February 18, 2007”.

    This way your readers see the new information you are putting into your blog and they can read your topics in well constructed and easily readable format. People on your Friends list can easily read your new entries. While new Friends can easily digest on-going topics.

    My preference as you can see is to use a Table of Contents. Create an outline of sorts, with headings that reflect the broad categories of your content. Then put links to your individual blog pages under those headings. In the Blast section, type “Table of Contents” and link the Blast to your Table of Contents blog entry. Then, whenever you have a new blog entry, figure out where it fits in your Table of Contents and edit that blog entry with the new information.


    An Introduction under your Top Page picture
    inspired by ஐღ♪♥ViVa♥♪ღஐ

    see an example under the pictures to the left

    Want to provide your readers with introductory instructions, some info about yourself, or provide a text logo as ஐღ♪♥ViVa♥♪ღஐ has done, this is how to do just that.

    • Login to 360
    • Select “Settings”
    • Select Basic Info
    • Scroll down to “Current Location”
    • Clear any entry in that first text box
    • Enter your desired information to up to any length in characters beyond the width of the text window
    • Continue this until all of your message is entered on a single line
    • When finished entering your message scroll down and hit Save

    There should be no more than 27 continuous characters on each line, or it will widen your picture area, and make your blog space more narrow. But if you just want to post a message, just type your message without any concern, 360 will format it as block text.

    Don’t use html control characters, the system tends to erase the text between control symbols. The monkey <b>jumped</b> mooned me. Would end up reading, The monkey mooned me.

    You can use the following for designing a text logo. Notice each number is consecutive and a space exists every 28th character. You can lay out your logo and then put the character for your logo in the exact position you want it to appear.


    Then after you have it all laid out, delete the end of line characters so that the message is a continuous string of characters on one line.

    123456789012345678901234567 123456789012345678901234567 123456789012345678901234567 123456789012345678901234567 123456789012345678901234567 123456789012345678901234567 123456789012345678901234567 123456789012345678901234567

    This is the text sequence for ஐღ♪♥ViVa♥♪ღஐ‘s page as an example.

    _____________________________ *Love*…………………………………. *Love*…………………………………. *Love*…………………………………. *Love*…………………………………. *Love*…………………………………. *Love*…………………………………. *Love*Love*Love*…………………… *Love*Love*Love*…………………… …………………………………………. ….*Love**Love*…………………….. *Love*……..*Love*…………………. *Love*……..*Love*…………………. *Love*……..*Love*…………………. *Love*……..*Love*…………………. *Love*……..*Love*…………………. *Love*……..*Love*…………………. ….*Love**Love*…………………….. …………………………………………. *Love*…………*Love*……………… ..*Love*……..*Love*……………….. ….*Love*….*Love*…………………. ……*Love**Love*…………………… ………**Love**…………………….. ………..*Love*………………………. ……………………………………… *Love*Love*Love*…………………… *Love*Love*Love*…………………… *Love*…………………………………. *Love*…………………………………. *Love**Love*………………………….. *Love*…………………………………. *Love*…………………………………. *Love*Love*Love*…………………… *Love*Love*Love*………………….. _____________________________

    In-general, you can simply use your cursor to highlight someones Text Logo, the text above, or your own; press Ctrl-c, and then enter it into your “Current Location” text space directly by pressing Ctrl-v.


    Making Links Open Blog Pages at Specific Locations

    Note that this only works with URL addresses that end in “?p=”

    The following opens the page at the Top of the article

    The following opens the page at the top of the visitor Comments section of that page

    The following opens the page at the Comment entry section of that page

    Want to open your Blog as a list instead of a series of articles?

    You can also compound commands by using the & symbol between commands


    Music Added to your Blog Page

    Provided by Sans Souci

    To add music to your blog you must use a site that hosts your music; you will be taking music from your computer and uploading to a site. You will be issued a code to put on your page.

    Here are the possibilities and the steps to use.

    · If you want to put music in your blast, I recommend Snapdrive.

    You will need to set up an account. The setup is similar to the instructions below. (It’s nice because one click on the link in the blast will play the song, whereas some hosts bring you to a blank page with a player; then you are listening to a song without the blog and have to use the back button to return, a kind of inconvenience)

    · If you want to play music from your blog page, I recommend imeem.

    You will need to set up an account here as well. I have found imeem to be a reliable hosting service, and one of the perks is that there are so many subscribers, you might not have to upload your own music, you may find it has already been uploaded, so do a search by song title and/or artist. imeem will only allow mp3 format, so if your music is in any other format you will have to re-encode1 it.

    · You might want to explore enips as a backup.

    · It helps to use a tabbed browser so you can toggle back and forth between your compose blog page and your music hosting page.

    Assuming you are working with an mp3 file, go to your imeem account, sign in and click on upload.

    You are brought to a page that gives you choices, to start:

    1. Upload music

    2. Put it in my profile>continue

    3. New page>Browse for music on your computer

    4. You may upload 1 or more songs; you will have the opportunity to edit the info

    5. You can choose to be alerted by email once the son(s) is available

    6. You can find the song in your profile

    7. Click on it

    8. Look for the thin rectangular code box on the middle left: now decide whether you want the music to play automatically2 or if the reader of your blog should do it manually.

    Auto requires a box to be checked. I have some things to say about that choice later.

    9. Select, highlight and copy the code in the box; it will look something like this:

    <object width=”300″ height=”80″><param name=”movie” value=””></param><param name=”wmode” value=”transparent”></param><embed src=”; type=”application/x-shockwave-flash” width=”300″ height=”80″ wmode=”transparent”></embed></object>

    10. Now go to your blog page. You should have an open compose page. Make up a title and write “test” in the blog box or your page can’t be viewed. (Later, remove “test”)

    11. Now, the important part: check the “view html” box on the gray band on the middle right

    12. Paste the code. If you want the imeem player to be centered you can put the following html code before and after: <center>blah!blah!</center>

    13. Unclick the html box; you see the word test you wrote earlier

    14. Click Preview on the bottom of the page>you should see your player and the song

    15. You will have to write your blog above and below your “player”

    16. Now it’s a matter of writing and setting up the blog esthetically—you have to keep previewing , and going back to the html code for the player to make adjustments.

    Other options: a group of songs: playlist

    If you want to upload a “playlist” this is another imeem option. When in your imeem account, choose from several songs you have uploaded.

    1. Click on the first, the song comes up, click to option to “add to a playlist”

    2. At that point you can create a new playlist

    3. Click on the other songs you wish to include and add to that playlist

    4. Go back to the profile page and get the code

    5. Embed in your blog as outlined above

    1 Re-encoding

    If I own the disc, I use Xilisoft to convert files. If I purchase the music from a source on the internet, such as itunes or Music match, I use Tunebite. I purchased both of these, and they were a good investment. There is a learning curve, but both companies are supportive and helpful.

    2 Issues with autoplay: I have realized that although I may like the autoplay feature, it is not always practical. My new computer will play the song as soon as the blog page is hit. Other older computers

    may still be playing older songs on earlier pages as soon as the new page comes up and it presents a conflict that can be very annoying. The reader may have to turn off the music from elsewhere. If you are insistent on an auto play, observe the 5 space rule. No more than 1 auto play for 5 blogs, or you might have readers running screaming from your page. Also, it is an imposition; your taste in music may conflict with the reader’s.

    Similar considerations for music with video as a perk:

    YouTube is embedded into the blog in the fashion. You don’t have to be a member of YouTube to search for videos. Once you find what you like, copy the code as you did on the music hosting site, click the html box, embed the code, uncheck the html box, and preview.



    RSS Feed

    Use your blog home page as a template for getting to your RSS feed page.

    In the second “blog” above, replace it with “rss” as below.

    Readers of your blog can use this to see the most current entries made in your blog, without having to take the time to click through your blog. Special Note: you can not use your username, it must be the unreadable characters you are accustomed to seeing.


    Table of Contents

    • First write down in alphabetic order the categories you desire; leave space between category list headings.
    • Enter any sub-categories
    • Sequentially go through each page and determine which category its name and page number should go under.
    • When this is done you should have a Table of Contents on paper.
    • Then determine your URL address for each page, they will all be the same address except the page number.
      • For instance:
      • Substitute your blogs email username for the username in the link above.
      • p=1 refers to page one of your blog
        • you can see this on any of your blog pages, look at the end of the URL address
    • Copy the information in your paper “Table of Contents” to your blog page.
    • Change your Blast to read “Table of Contents”, and then point to where your Table of Contents blog page resides.
      • If you can not make your first or second page the Table of Contents, it is not important, it can be any page.
    • Now every time you compose a new blog page, make an entry in your Table of Contents with the new information.
    • To get started, you can copy and paste mine and then just change the content to your information.



    col 1 col 2 col 3

    • Open the blog page for editing
    • Check the box for “View HTML Source”
    • Position the cursor where you want the Table to fit
    • Copy and Paste the following code into that position:

    <table style=”BORDER-RIGHT: 10px double; FONT-SIZE: 10pt; BACKGROUND: none transparent scroll repeat 0% 0%; WIDTH: 325px; FONT-FAMILY: Arial; LIST-STYLE-TYPE: decimal; HEIGHT: 139px; TEXT-ALIGN: left” cellSpacing=4 cellPadding=4 align=left border=4>
    <td>col 1</td>
    <td>col 2</td>
    <td>col 3</td>

    • If you want to add or delete columns, just change the number of occurences of:
      • <td> userinfo4 </td>
    • Modify the features like border and border color
    • Uncheck the “View HTML Source” box
    • Click on the border and drag it to whatever size you want
    • Position your cursor in the table column and enter information


    URL address Simplification

    The following two URL addresses take you to the same page, notice the difference?

    Remove blog-YW18nxE7eqtd0CMJGCB94Xu4 and substitute your username. Now you can email someone a readable URL address.

    The same thing works with Tags.………………….

    The reason for the extra periods in the tag name are for formatting my Tag Cloud so there is only one entry per line. The periods are part of the name I gave the tag.


    Vertical Spacing of sentences

    Using “Enter” following a sentence or line item causes a large space between the previous sentence or line item and the next.

    As shown between this line and the lines previous and after.

    By holding the shift key and hitting “Enter”
    the spacing is reduced as shown between the previous line and this one.


    Video Added to your Blog Page

    Provided by: R.L.O.
    How to add video’s to your 360 blog!
    But let’s take this one step at a time. If you haven’t created and uploaded your own video to YouTube yet, not to worry. Start by visiting YouTube

    Look for the little window on the YouTube page labeled “Embed.” Here’s what it looks like below. Notice that there’s also a window with the direct URL for the video. That’s *not* what you want. The URL is what you use when you want to direct someone to the specific video on the YouTube page.URL can be added to your blast area in the URL box just copy the code and paste into URL box at you blast area…!!! have fun its a blast

    Grab the line of code in the Embed window (do a “select all” and then “copy). It starts with <object width=”425” height= …

    Step Three

    Now paste it into your blog in the HTML


    Step Four

    Click preview to make your blog entry live on the 360 blog. Below is what you’ll see on the public face of your blog. Click the arrow icon and the video plays. It’s magic!

    yfla.wrap(“This multimedia content requires Flash version 9 and above.”, “Upgrade Now.”, “http:\/\/\/shockwave\/download\/download.cgi?P1_Prod_Version=ShockwaveFlash”, “”); Function VBGetSwfVer(i) on error resume next Dim swControl, swVersion swVersion = 0 set swControl = CreateObject(“ShockwaveFlash.ShockwaveFlash.” + CStr(i)) if (IsObject(swControl)) then swVersion = swControl.GetVariable(“$version”) end if VBGetSwfVer = swVersion End Function

    yfla.wrap(“This multimedia content requires Flash version 9 and above.”, “Upgrade Now.”, “http:\/\/\/shockwave\/download\/download.cgi?P1_Prod_Version=ShockwaveFlash”, “<embed src=\”http:\/\/\/v\/ShWdOwoGj2Q\” width=\”425\” height=\”350\” type=\”application\/x-shockwave-flash\” wmode=\”transparent\” allowScriptAccess=\”none\”><\/embed>”);To view this multimedia content, please enable Javascript.

    get your videos here and get started! hope this infromation was useful!


    Viewing Blogs that are difficult to Read

    When trying to read some blogs where the lettering is very similar in color to the background, it’s very difficult to read. There is a simple fix.

    • Click your mouse pointer anywhere on the page
    • press Ctrl – a

    This will highlight the page and null out the background so you can easily read the text. Go ahead, try it here. It will work on most any page.

    • To turn off the highlight, click your mouse anywhere.


    Webring for your Multiple Blog Sites

    There are times when you want to focus on separate content in separate blogs. You can link all of your unique blog sites in a linked ring that allows your readers to click from one to the next.

    Create separate Yahoo accounts

    For example:

    • username1
    • username2
    • username3
    • username4

    Setup each with a Blog

    In the Blast of each, refer to the next Blog

    Blast of Blog 1

    Blast of Blog 2

    Blast of Blog 3

    Blast of Blog 4

    The reader of your blogs can then click at the top of any blog page to go to the next unique blog in your blog ring. Or if you have a group of closely related Friends, you can similarly link your blogs sites in a loop.


    Zooming In & Out to view Content more Easily

    If you have a mouse with a wheel to scroll up and down

    • Hold down the <ctrl> key and then slowly scroll the wheel up or down
      • This will cause the screen to zoom in or out to view content more easily

    Automated Failure Rate Analysis tools
    ~James Dunn

    Whenever an electronic circuit is designed for the military, an evaluation must be made to estimate how long the circuit is expected to survive in the environment it will be used.

    Each part produced has certain information provided by the manufacturer. Sometimes the Hardware Designer or the Failure Rate Analyst must contact the manufacturer and have them generate the information. Either way this information is available.

    Develop a subroutine within the CAD software (like Mentor Graphics) for making PCB’s to collect the part numbers used:

    • no need to count or sort them, this information is readily available
    • make an excel compatible list of part numbers, easily done
    • upload the excel list into an excel workbook where a Visual Basic program massages the data
      • lists a part number, counts the occurrence and list quantity, deletes duplicates
      • compares part numbers with previously stored data
        • the data would include the failure rate information previously collected for that part number
        • the part numbers without failure rate information would be flaged and a web interface would notify the Failure Rate Analyst by email of the deficiencies
      • The Failure Rate Analyst would research and enter the missing information into the excel program
        • This information becomes available for the next time the program is run
      • When finished the excel program would automatically correlate the data and provide the needed information for the entire PCB to the Failure Rate Analyst
      • Other information that is derived could be fed to or from the Excel program for generating the written reports needed for military hardware automatically

    The proposed system would save hundreds of labor hours per Hardware Assembly.

    A Failure Rate Analyst makes between $45 and $75 per hour company gross expenditure, that would be a savings of at least $9,000 per Hardware Assembly.

    Similar routines could be used for interface with other quality assurance programs. One such program groups parts together that form functional circuit sections. After grouping the parts together each circuit group is evaluated for failure relationships. The same excel spreadsheet program could automatically do the evaluations and save 40 hours per complex circuit board. Again this savings is significant per hardware assembly which may be as many as 10 boards. $40 per hour x 40 hours x 10 boards = $16, 000 per hardware assembly.

    Combined, the producer of each military project could reduce their costs by $25,000 per electronic hardware assembly.

    Simple automated analysis tools can make a military equipment manufacturer more competitive or realize greater profit margins. See ISO9001

    MicroSoft OS multiple file version Eliminator
    ~James Dunn

    I propose a software that monitors all files in the “Program Files” and “Documents and Settings” folders of XP based computers. The program would prevent multiple versions of the same document unless the user specifically instructed otherwise.
    1) If a person tried to save a different version of the same document, the software would automatically assign a version number to the document and link the two so the user and administrators can track, archive, and/or trash outdated versions of documents.

    2) Regardless of the filename, all files would have the data compared and notated in a list. Administrators could then either delete such duplication, coordinate a common name, and/or flag the document for revision control.

    3) For common documents that formally require revision control, the administrator would have the option to change a duplicate found on the system to a read-only property and co-locate a link to the currently approved version of the document.

    4) The software would provide statistics related to the amount of duplication in the system

    Between my wife and I we obtain, modify, and produce hundreds of documents a year. In the hectic day to day life we often will take one document that is somewhat close to what we are going to create and then use it as a template to build another document. Often times we will decide to go a different route but that partially revised document still exists on our computers.

    We have RAID and we use OneCare to backup our files. However, over the years we have many hundreds of files that just aren’t necessary anymore but they are mixed in with files we do want. So our file directories are broad and deep.

    What we want is to stop the duplication in our future efforts, and be able to wean out the duplication that has already occurred.

    The software would have to be configurable to allow for synchronization of backups. Either by other software, or resident within the proposed software. Certain directories for instance might be declared as protected or “off limits”.

    MicroSoft Word has a manual mechanism to compare 2 documents and allow merging individual differences in either direction. I suppose I could create a macro to automate doing more than one document using that function. But I guess would be more useful is to do a document compare automatically and just tell me by what percentage the 2 documents are the same and display only those pairs that have a certain percentage or higher of duplication (user selectable). That way I can cleanup the worst offenders first.

    What would be best is to avoid this problem in the first place. Having the operating system track data files and provide versioning information would be the most useful.