Category Archives: Computers

Save/Rename Proxy Pictures



Sometimes when we save a complete web page, as suggested in a previous post, we get a series of proxy files instead of .jpg files. Sure, we can right click each picture and save it individually but if there are fifty photos on the page, that takes a lot of time. Here’s an example of a page that I would normally save, just to get the photos: http://www.howtobearetronaut.com/2011/09/polaroids-1970s-by-anthony-perkins/

 

This is from one of my favorite sites, full of interesting photos of very unique parts of our history. If you look at the page, you’ll see a string of family photos from Anthony Perkins, maybe ten or so. I could right click and save these in a short time but this is an example, just to show you what can be done if there are thirty, fifty or a hundred photos on a page.

Instead of linking each photo to a .jpg file in a folder on the server, this page uses proxy files to feed the images. This is a more secure way to link pictures and their source on a website. Once you have downloaded this page, this is what you will see in the site folder on your computer:

A String of Proxy Files
Instead of .jpg files, you will see these proxy files.

Where you usually see .jpg files, in this case you will see proxy files. Actually, at this point, they aren’t even files since they don’t have any extension. Again, we could rename each one and add the .jpg file extension to it but you can see how long that would take. How can we rename and add a file extension more easily than that?

Yesterday, I wrote about adding a command window to our right click menu. That post is here.  These are the  steps that will make renaming and adding a file extension to all of these files a very simple job.

1. First, you need to separate the proxy files from the rest of the files in the folder. Create a new folder anywhere on your computer. Put one right on your desktop, if you want. Highlight all of the proxy files, right click them and choose copy. Paste them into the new folder that you created.

2. You will notice that there are far more proxy files in the folder than there were full size photos in the page. Don’t worry about that now.

3. This will be a two step process, only one of which uses the command prompt. Open the new folder, if it isn’t already, and highlight all the proxy files. We’re going to rename all the files at once, changing the ‘proxy(x)’ to something like ‘Polaroidx’. Highlight all of the files using Control/A (select all). Right click the blue selection and choose ‘Rename’. One of the files will show a flashing menu where you can type Poloroid  like this:

Type Poloroid in the Box
This is the first step, type Polaroid in the box.

Hit enter and every file in the folder will be renamed Polaroid, Polaroid1, Polaroid2, etc. That was quick, right? You can do this with any folder that you have, renaming your DSC files to something that sounds friendlier, for example. OK, the files are now renamed but they are still useless to use since we can’t open them, right? Back out of this folder but keep it in front of you on the desktop.

3. Holding down the Shift key, right click the  folder and choose ‘open command window here’.

Right Click Command Window Choice
Hold the shift key, right click and this is what you see.

4. A black background window with some white type on it will pop up. This is your command window, a very powerful (and fast) tool, if you know what you’re doing. Here’s the menu you should be seeing:

Command Window Open
This is the command window (used to be DOS prompt)

5. Here is where you can perform actions on the folder or everything in the folder. Click anywhere in the window to activate it, then type this:

ren * *.jpg       (like this: )

This is Where We Rename All of the Files
Type exactly what you see here.

OK, the ‘ren’ means ‘rename’. The ‘*’ means everything or all. The *.jpg means to rename everything that has a name before the period to the same name but add .jpg after the period. You can use ‘rename’ too but why bother?

5. Once you have typed EXACTLY what you see here, hit enter. The command window flashes and then sits quietly, waiting for more commands. Since we don’t need it anymore, close the window.

6. Open the folder and you’ll see this:

Renamed Files with File Extensions
Here is what we set out to do. Files are renamed and the .jpg extension has been added.

The next steps depend on what you’ve saved in the first place. In this case, some of the files are full-size, some are tiny. You’ll have to figure out which ones are the ones you want. Go up to the top right and change ‘details’ to ‘large icon’, then click each photo you want to save while holding the Control key. Once you’ve got them all selected, move them to another folder and delete the current folder.

TIP: If you know something about DOS, it would be easy to both rename the files and add the files extension in one step but I thought this would be less confusing. The simple ‘ren * *.jpg’ statement is far less confusing, in my opinion.

Thanks for reading!



Hidden Right Click Menu



The right click menu allows you to do many things in Windows; rename files, send files somewhere else, copy, delete, cut, etc. Did you know that there is a hidden right click menu? Let’s take a look at what it does. Here’s what I see when I right click a menu normally on my computer. Yours should look the same:

Normal Right Click Menu in Windows
This is what I see normally when I right click a folder.

Your menu should look much like this, except for Take Ownership and some of the program affiliations. You’ll see that I have a couple of Chinese programs on my computer. QQ Music is a lot of fun, don’t know a similar one in English. It’s cool for karaoke!

Here is the hidden right click menu. In order to get this menu, hold down the SHIFT key when you right click.

Windows Hidden Right Click Menu
Holding the shift key brings up this menu when you right click.

You’ll see that there are two different choices in the hidden menu, one of which adds enormous functionality which I will discuss tomorrow. ‘Open in new process’ and ‘Open command window here’ are the two additional choices.

Open in a new process – This opens the folder in a completely different part of Windows Explorer. If you have a folder open already, this will open it again in a new instance of Explorer, totally separate from the first, with a new place in your computer’s memory. If something happens in once instance, it won’t happen in the other since the two instances are completely separate. I would ignore this one for the time being. The next one is the important one here.

Open command window here – If any of you remember DOS or are used to using the command prompt for different purposes in Windows, Linux or OS X, you will know that this choice adds significantly more control. Consider this something like working on your computer’s brain or heart. There are many things that you can do in a command window that you can’t do normally in Windows.

Windows itself, as well as any other GUI or Graphical User Interface, always uses the command window, it just doesn’t show it to you while it’s working. Opening a command window here in the hidden menu is a kind of time travel. This is where Windows thinks you should start your journey when you open a command prompt normally :

Usual Command Window Menu
C:\Users\(you)> this is where you start normally.

When you open a command window using the hidden menu, you are whisked off to the folder that you are looking at, not some outland post where you would have to navigate your way through a DOS-looking set of instructions to get to the same spot. You’ll see something like this, depending on which folder you right click on :

Hidden Right Click Command Prompt
There you are, right at the folder's source.

See the difference? Sure, you could use a type of code to get to this folder but you’d have to go back to your root directory, C:/, then sort your way through endless directories to get to where you are now.  It can be done but who wants to go through that? Not me.

Tomorrow, I’ll show you a cool trick using the command window. The trick will eliminate several little bits of software that you have to install to do exactly the same thing that you can do in a command window. Check it out tomorrow.

Thanks for reading. Follow me on Twitter: @_BrianMahoney



Archive VHS Tapes



If you have old VHS tapes that you’d like to save, here’s a relatively cheap and easy way to do it, without the use of a TV or separate monitor.

1. Find a  Diamond One Touch Video Capture unit online or in a store near you. I paid about $40.00 for mine.

2. Hook it up to your VCR as described in the instructions and then to your computer using the supplied USB cable.

3. Follow the instructions to install the capture software.

TIP: Guard the program shortcut with your life! Once you install the software, it’s very hard to find the shortcut if you move it. I’m a geek and found it hard to find. Warning!

4. Start the capture software. You’ll see a screen like this:

Diamond capture screen and menu
This is the menu that you DON'T want to see.

What’s wrong with this image? The green line across the bottom, that’s what. Down on the lower left is an X. If you see this kind of screen, hit the X and reopen the program. Maybe this is just on my computer but I have to restart the program in order to get rid of the green lines on the bottom.

Your screen should look like this:

Proper capture screen
This is what you should see before you start playing a tape.

Once you can see this screen, you’re ready to go.

5. Pop a tape into your VCR (could be Beta or VHS or camcorder, it doesn’t matter what you use as a source). Start to play it and you’ll see this kind of screen:

Video showing on one touch screen
The video on the screen with no scan lines on the bottom.

6. Once you can see this kind of image in the window, you’re all set. Use the VCR to control the tape, then record the bits and pieces that you want to save using the One Touch controls. The red button records what’s in the window, including sound if you have the cables set up correctly, and the black button (which turns red after you start recording) stops the capture.

7. In the Settings menu, shown here:

Settings menu
Here's where you adjust the settings.

This is showing the Record tab where you can set the file type (I use DVD for small file size) and save the files in a folder on my desktop. Set your preferences according to your tastes.

8. Once you have the tapes sorted and have saved the files that you want, rename them to keep track of them and then you can archive them to DVDs, etc. I prefer to change the files to either FLV or DIVX in order to keep the files as small as possible. If the video if very important, leave it was a DVD file and write it to a disc.

That’s it! Simple and cheap, without the pain of having to have a TV monitor cluttering up your desk or work area. Not only does this method capture fine quality video (depending on the source, of course), it eliminates the need for a video monitor. Alternatively, you can feed your TV output into this unit and watch and record live TV on your computer.

Thanks for reading! If you have questions or comments, write them below or follow me on Twitter: @_BrianMahoney



Security – Strong Passwords



The biggest part of online and computer security is figuring out a strong password. Today’s post will be short, to the point and, I hope, fun. Here we go:

1. WordPress passwords are already quite secure, I mean the default ones. They are made up of letters (caps and small), numbers and symbols. When it comes times to add a new user, here’s a neat trick that I use with the help of Google Translate. I type in a phrase that is easy for me to remember, then I translate it into a foreign language. That foreign language has to use the same letters and symbols as English, Chinese doesn’t work, but if you choose something like Creole, this system will work well.

Example: I hate chickens translates in Creole to: M ‘rayi poul

That example is far too short to be really secure but I’m sure you know what I mean. The best part of this is that some of the symbols are already there. French uses different accents with some letters which would be very difficult to crack.

2. Mnemonic passwords are always fun, too. You can make up your own or try this website: Mnemonic Password Generator It will create a password for you which should be easy to remember with the use of sounds and the use of words for the five symbols in the generator.

3. Simply using 3 instead of e or 5 instead of f will create a strong password. Add to that some symbols, maybe enclosing everything in (brackets) works well, too. Typing symbols instead of your year of birth is another suggestion. !(%@ is 1952, right? Mix things up a bit and use things you know as well as mnemonics and you’ll be secure in everything you do online.

4. Passwords for online banking, email and blogs should be very secure. Keeping track of them on your computer doesn’t have to be as secure but you still want to prevent anyone from accessing them, just in case your computer is stolen. Using Locknote, as described in my last two posts is easy and fast. Send the Locknote to yourself in an email and keep a copy in your Dropbox.

5. Finally, change your passwords every few months. If you feel that something strange is happening in Facebook or your email account, change your password immediately. Don’t wait! If you’ve clicked on something and don’t feel comfortable about it, change your password immediately. Getting your account back after you’ve been locked out is time consuming and, frankly, embarrassing.

Thanks for reading! Follow me on Twitter: @_BrianMahoney



Email Encryption



This is my second security related post. In searching for an easy way to encrypt email messages, I discovered that every technique was far to difficult to gain wide acceptance. How many of us use anything but web-based email anyway? POP3/IMAP email is what your ISP offers you when you sign up for your Internet access and, to my mind anyway, it’s a thing of the past. When you change ISPs, do you really want to change your email too? With web-based email (think Hotmail or Gmail), your email address is permanent, more or less.

Besides the problem with changing ISPs and having to change your email address, POP3/IMAP systems require you to download your email to your computer in order to read it. If there is a virus or malware in your email, it’s pretty obvious that it’s on your computer now, too. With web-based email you would have to download an attachment or click on a link in order to get burned by malware or a virus. Sure, it can still be done but the email isn’t on your computer. It’s on your email company’s servers and those are usually protected by reasonably robust virus scanners.

Given all the above information, what is the easiest way to encrypt your email? Well, my best bet would be Locknote by Steganos. As described in my last post : Security and Encryption , Locknote is a free, self-contained encryption container, program and message all in one unit.  Every other method required the use of a fully installed program, keys and confusion. Locknote is as simple as the proverbial pie. Here’s how you use it to encrypt your email:

1. Download and unzip Locknote.

2. In the Locknote folder, copy the locknote.exe file and put it on your desktop. Leave the original locknote.exe in the original folder.

3. Double-click the .exe file and you’ll see this:

locknote opening message
This is all you get, a simple, self-contained app.

4. The text that you see is a description of what Locknote is. Highlight and delete that text and write your own note here. Sure, it looks like hell but it’s just an email message, nothing fancy anyway. When you are finished, close Locknote using the red X up on the top right. This is what you will see next:

Enter your password
Before you can save the note, enter a STRONG password

5. This is where you are in control of your own destiny as far as sending encrypted email. A strong password is made up of three things: letters, numbers AND symbols. Don’t use a phrase or a name, use a series of numbers, letters and symbols. Symbols are !@#$*&^%, things like that. Use more then eight, fourteen is a good number here. Once you have settled on a password, and there are lots of ways to remember a good one, type it into the space and then enter it again in the second space that pops up next. Click OK.

6. At this point your Locknote.exe file is encrypted. No one can open it without the password that you just entered. Even you can’t open it if you have forgotten your password. Locknote uses ‘AES 256bit encryption’ and it’s secure, believe me. You can open the file, change the text and close it. Locknote will use the same password each time you close the program after asking you if you want to save the changes. The note can be changed 100 times but the password will stay the same UNLESS you decide to change the password. (File, Change Password)

7. Once your ’email’ note is written, you have to do one of two things in order to email it to someone. Actually, three things because you have to somehow get the Locknote password to that other person. You can use a separate email, a text SMS message or a telephone call. Think of something creative but DON’T put the password in the same email as your Locknote attachment.

Here are the two things you can do. Choose one, whatever is simplest for  you and your recipient:

1. Since you can’t send an ‘.exe’ file in an email. Here is what you’ll see:

Hotmail refuses to send an .exe file
For obvious reasons you can't send an .exe file in an email.

In order to get around this, you’ll have to change the file type from ‘.exe’ to ‘.txt’. Right-click the file and choose rename. Move the cursor to the far right, backspace three spaces (to the period) and type txt. Then hit enter and you’re done. Now you have locknote.txt on your desktop. If you try to open this file, Notepad will open it, no problem, but it will show as gibberish.

Open Hotmail or Gmail and attach the file ‘locknote.txt’ to it. In the body of your message, tell the recipient to download the file and then change the last three letters to ‘.exe’ instead of .txt. At that point, Locknote will work again. Your friend just has to double-click it, enter the password and read your message. To reply, all they have to do it delete your text or add to it and reverse the process.

2. The other way to send Locknote through your web-based email is to make a zip file. Right click, choose ‘add to zip’, choose a name and that’s it. Send it off as an attachment and have the person on the other end unzip it. Fairly easy but I prefer the first option.

If all of this seems too technical or too difficult, then you have to trust that no one else will read your email. If you really want to keep your email private, this is by far the easiest way. If any part of this is confusing, comment or ask me on Twitter.

Thanks for reading! Follow me on Twitter: @_BrianMahoney