4
Volume: 18 Issue: 07 July. 2019 Contacts. Port Macquarie Seniors Computer Group Inc. P.O. Box 2135 Port Macquarie, NSW 2444. Email [email protected] Web Address: www.portseniorspc.org.au Commiee. Peggy McC. President & Web Administrator Barry D. Secretary. Graham C. Treasurer. Lorraine F. Membership Officer. Anne C. Commiee Member. Sel C. Newsleer Editor. Disclaimer: This Newsletter is provided As is.without warranty of any kind. Each Reader assumes complete risks as to the accuracy and subsequent use of its contents. President Peggys Comments. Welcome to our July Newsletter. Lets start with the good news. It looks very much as though Microsoft is moving towards one complete update of the operating system per year. Microsoft has announced the 19H2 update ( October 2019) for Windows 10 will arrive on devices as a cumulative update using the servicing technology. This means that its likely the new version will not require a full reinstallation, and itll feel more like those service packs we used to get with Windows 7. I am sure we will all welcome this, instead of having these disruptive changes twice a year. Whats coming up—the 2nd stage of our Gimp lessons. To attend these lessons, Students must have a paidSecurity Program such as Trend Micro or McAfee, or similar, OR the Telstra Bigpond free program, installed on their laptop if it is coming into class. The windows Security System is not suitable for the Gimp program. Students must also have attended at least two of the previous lessons this year, and have the full Gimp 2.10.6 installed. I am sure everyone attending will enjoy the new and exciting lessons. Many students have complained there is no Collages program included in the Microsoft Photos program. There will be a Collages lesson on the 26th Sept, using the program, Pic Collage. The program is available from the Microsoft Store. It is free. We need our Microsoft ID to download. We will also use Microsoft Power Point collages slides, which Microsoft has kindly supplied. We will require Microsoft Office for this part of the lesson, anyone requiring to switch to a Library computer for this part of the lesson will be able to do so as long as I know in advance. There are a number of members who are attending Meetings but not attending lessons, please let us know what it is you wish to learn in order we can cater for you in our lessons. Regards Peggy.

President Peggy s Comments. · 2019-07-25 · What [s coming up—the 2nd stage of our Gimp lessons. To attend these lessons, Students must have a ^paid Security Program such as Trend

  • Upload
    others

  • View
    0

  • Download
    0

Embed Size (px)

Citation preview

Page 1: President Peggy s Comments. · 2019-07-25 · What [s coming up—the 2nd stage of our Gimp lessons. To attend these lessons, Students must have a ^paid Security Program such as Trend

Volume: 18 Issue: 07 July. 2019

Contacts. Port Macquarie Seniors Computer Group Inc.

P.O. Box 2135 Port Macquarie, NSW 2444. Email [email protected]

Web Address: www.portseniorspc.org.au

Committee.

Peggy McC. President & Web Administrator

Barry D. Secretary. Graham C. Treasurer. Lorraine F. Membership Officer. Anne C. Committee Member. Sel C. Newsletter Editor.

Disclaimer: This Newsletter is provided “As is.” without warranty of any kind. Each Reader assumes complete risks as to the accuracy and subsequent use of its contents.

President Peggy’s Comments.

Welcome to our July Newsletter. Let’s start with the good news. It looks very much as though Microsoft is moving towards one complete update of the operating system per year. Microsoft has announced the 19H2 update ( October 2019) for Windows 10 will arrive on devices as a cumulative update using the servicing technology. This means that it’s likely the new version will not require a full reinstallation, and it’ll feel more like those service packs we used to get with Windows 7. I am sure we will all welcome this, instead of having these disruptive changes twice a year. What’s coming up—the 2nd stage of our Gimp lessons. To attend these lessons, Students must have a “paid” Security Program such as Trend Micro or McAfee, or similar, OR the Telstra Bigpond free program, installed on their laptop if it is coming into class. The windows Security System is not suitable for the Gimp program. Students must also have attended at least two of the previous lessons this year, and have the full Gimp 2.10.6 installed. I am sure everyone attending will enjoy the new and exciting lessons. Many students have complained there is no Collages program included in the Microsoft Photos program. There will be a Collages lesson on the 26th Sept, using the program, Pic Collage. The program is available from the Microsoft Store. It is free. We need our Microsoft ID to download. We will also use Microsoft Power Point collages slides, which Microsoft has kindly supplied. We will require Microsoft Office for this part of the lesson, anyone requiring to switch to a Library computer for this part of the lesson will be able to do so as long as I know in advance. There are a number of members who are attending Meetings but not attending lessons, please let us know what it is you wish to learn in order we can cater for you in our lessons.

Regards Peggy.

Page 2: President Peggy s Comments. · 2019-07-25 · What [s coming up—the 2nd stage of our Gimp lessons. To attend these lessons, Students must have a ^paid Security Program such as Trend

Social Secretary’s Report.

The Lucky Door Prize of a free Lesson was won by: Gwen G.

Regards, Anne C.

Robocall scams.

Whether the intrusion starts out as just an annoying robocall pitch, or succeeds in its ploy to pass you on to a live scammer, you’re likely to encounter a variety of typical robocall-initiated scams, such as:

Tech support scams. You pick up and immediately hear a distressing message, pressuring you to act fast: “Hello, we are calling from Windows and your computer looks like it is infected. Our Microsoft Certified Technician can fix it for you.” If you fall for it and get connected to a remote technician, he may sell you phony security software at a cost of hundreds of dollars in order to “clean up” your alleged problem. Or worse yet, he’ll persuade you to give him remote control of your computer, and he can plant malware to ferret out and steal any valuable data (social security number, credit card information, bank accounts, etc.). Among the bad news downloads that malware can plant on your computer are those that hold your Data hostage, spy on your computer activity, clog your screen with popup advertising, or take over your computer’s resources in order to mine for Cryptocurrency.

Charity requests. After all, who wouldn’t want to contribute to wipe out World Hunger? Cure Cancer? Save the Koalas? These prey on trusting souls, and count on them to take the bait and make a pledge by credit card.

Bogus Surveys. These scams can come at you as telephone, text-message, or even online surveys — They ask you to answer questions or give your opinion about the merchandise, service, or quality of your favourite store. They may even claim that there’s an incentive to participate, such as a gift card for your favourite retailer, or some similar prize. But more often than not, they end with pitches for dubious products or services. Questions may also focus on the bank or financial institution you use, whether you are happy with their service, and if you would consider changing banks. And as part of the survey, they might ask for your bank account number so that they can provide a “competitive comparison” with the fake bank they represent. They may even request your banking and credit card information, because it is “necessary” to claim your supposed reward.

Banks, Police, Taxation, and other Institutions of authority. This will be another call that seeks to alarm you with a sense of urgency to derail your common sense. The script usually centres on some alleged wrongdoing that you’re guilty of, with the threat of imminent fines or arrest. The call might even involve abusive threats, which are a sure sign of a scam.

Stranded grandchildren. This is a particularly cruel form of social engineering, which targets older folks. The caller claims to be a grandchild calling from jail, and seeks to first fluster the recipient, and then ask for bail money, to be sent via a cash transfer service.

One-ring scam. In this scenario, the scammers place calls to blocks of phone numbers (often using robocall devices), and then hang up the call after a single ring. If the owners of some of those numbers are curious enough to call back, they might connect to a pricey International call. And during this call, scammers may use social engineering or outright harassment to persuade the consumer to subscribe to a pay service or to provide credit card information. Printed with permission from: Malwarebytes.com

Page 3: President Peggy s Comments. · 2019-07-25 · What [s coming up—the 2nd stage of our Gimp lessons. To attend these lessons, Students must have a ^paid Security Program such as Trend

Identity theft

All scams have the potential for identity theft. Protecting yourself from scams also means keeping your personal information safe. Identify theft is a threat in every scam. Most people associate scams with attempts to trick you out of your money. However, your information is also valuable to scammers. Scammers steal your personal details to commit fraudulent activities like making unauthorised purchases on your credit card or using your identity to open bank or telephone accounts. They might take out loans or carry out other illegal business under your name. They may even sell your information to other scammers for further illegal use. Having your identity stolen can be both financially and emotionally devastating. It can take months to reclaim your identity and the impact of having it stolen can last for years. Phishing—a scammer contacts you out of the blue via email, phone, Facebook or text message pretending to be from a legitimate business such as a bank, phone or internet service provider. They direct you to a fake version of the business’s website asking for your personal details to verify customer records due to a technical error. They may call imitating a luxury goods retailer claiming that someone is trying use your credit card. They advise you to contact your bank, but they don’t hang up from their end and keep the line open. When you try to call the bank, you are still talking to the scammers who simulate a real call, imitate bank staff and ask for your account and security details. In either case, the scammer captures whatever information you give them and then uses it to access your accounts. Fake surveys Scammers offer prizes or rewards such as gift cards to well-known retailers in return for completing an online survey. The survey requires you to answer a range of questions including disclosure of important identification or banking details. As part of any scam—Scammers often ask for personal information In a lottery scam, scammers often ask for a driver’s licence or passport to ‘prove your identity before they can release the prize money’. In dating and romance scams they might ask for information ‘to sponsor their visa application to visit you in Australia’. Remember: Giving away personal information to a scammer can be just as bad as giving away money. Keep your personal details to yourself and keep them secure. Protect yourself. • Think twice about what you say and do in an online environment Be careful sharing information about yourself online, including social media, blogs and other online forums. Stop and think before filling in surveys, entering competitions, clicking on links or attachments or even ‘befriending’, ‘liking’ or ‘sharing’ something online. • Beware of any request for your details or money Scammers will try to trick you into handing over your data by using the names of well-known companies or government departments.

If you think it’s a scam, don’t respond. Use the phone book or an online search to check the organisation’s contact details. Never use the contact details provided in the original request. If you have provided personal identification information to scammers, contact IDCARE on 1300 432 273. Printed with permission from: www.accc.gov.au

Page 4: President Peggy s Comments. · 2019-07-25 · What [s coming up—the 2nd stage of our Gimp lessons. To attend these lessons, Students must have a ^paid Security Program such as Trend

Meeting Agenda. 9.30.am. Registration and Class Bookings. 10.00.am. Meeting Starts and Club Business. 10.45.am. Morning Tea and Class Bookings. 11.00.am. Presentation. “Digital Assets” by Peggy. 12.00.pm. Meeting Ends.

Entry and Fees. Members: $2.00

Visitors: $5.00

Tea/Coffee and Biscuit Provided Free.

Seats MUST be booked prior to

attendance.

Next Monthly Meeting at Port Macquarie Library Meeting Room on : 26th. August. 2019

August. 2019.Computer Classes.

15/8 Thur.9.30am - 12.00pm. M/S Word Basics- Fonts, Headers & Footers, etc. ….Lesson 1. Peggy 22/8 Thur.9.30am—12.00pm. M/S Word - Inserting Tables, & Pictures, etc. ….Lesson 2. Peggy 29/8 Thur.9.30am—12.00pm. M/S Word Creating Monograms, etc...Lesson 3. Peggy

September.2019. Computer Classes.

5/9 Thur.9.30am—12.00pm. GIMP Improving Images & creating Frames ….Lesson 4. Peggy 12/9 Thur.9.30am—12.00pm. GIMP Creating a Filmstrip ..Lesson 5. Peggy 19/9 Thur.9.30am—12.00pm. GIMP Hand Painting using Gmic. ....Lesson 6. Peggy 26/9 Thur.9.30am—12.00pm. Pic Collages Peggy

Class Venue. Classes will be held at : Port Macquarie Library

Tech. Room.

Class Information. Visit our Website at :

www.portseniorspc.org.au Click on “Classes”

Select a class of interest, then click on “Contact Us”

If you wish to enrol.

Class Fees. Individual Classes : $5.00.

Payable in Advance!

Refreshments. Tea/Coffee and Biscuit included in Class Fees.

REMEMBER! Wear your Current name tags

to all Classes and Monthly Meetings.

If you’re using a Group Laptop

or a Library Computer bring a USB. drive to class.

Here is a hint for the Gimpers. Did you know the Crop Tool can also be used to enlarge the size of a canvas as well as decrease. Let’s see how we do that. In Gimp 2.10.6 open an image. Open the Crop tool in tool options. Tick—Allow growing. Draw a rectangle around the image, obviously larger than the image. Press the Enter Button on the keyboard. Create a new Transparent Layer. (This will automatically be the same size as the drawing you have just made) Fill the New layer with colour. Move the new Layer below the original image. You now have a new Border without losing any of the original image/canvas. Regards Peggy.