Google Print lets you search inside books

I’ve been reading about this for a while, but it looks like Google Print has now gone into a somewhat wider beta. Here, for example, is what turns up under my name. Here is the much longer list you get if you search for “Windows XP.”

These pages have been scanned and OCR’d, which results in some odd typos. Interestingly, only one of my books is actually on this list of results. If you want to search through Special Edition Using Office XP, be my guest. I’m puzzled, though, as to why some of the books at the end of the list are “restricted” from viewing.

War games

This AP story appeared this morning:

The CIA is conducting a secretive war game, dubbed “Silent Horizon,” this week to practice defending against an electronic assault on the same scale as the Sept. 11 terrorism attacks.

The three-day exercise, ending Thursday, was meant to test the ability of government and industry to respond to escalating Internet disruptions over many months, according to participants. They spoke on condition of anonymity because the CIA asked them not to disclose details of the sensitive exercise taking place in Charlottesville, Va., about two hours southwest of Washington.

Yesterday, my broadband provider, Cox Communications, was responding erratically all day. At the end of the day, it went offline in my neighborhood for more than an hour. When I called support, a recorded message described similar outages throughout the greater Phoenix area.

Coincidence? You tell me. Given the reverse Midas touch that U.S. intelligence services have demonstrated in recent years, I’m inclined to think they could screw up the Internet more effectively than any group of cyber-terrorists.

Tip of the day: Enter international currency symbols in Office

Money makes the world go around, so why is there only one currency symbol (the dollar sign) on a standard U.S. keyboard?

To enter an international currency symbol in Word, Excel, or PowerPoint (or in Outlook’s message editor), you’ll need to memorize its four-digit ANSI character code and enter that code using the numeric keypad. Here are the codes for some common symbols:

Symbol Code
Euro ( € ) Alt+0128
Yen ( ¥ ) Alt+0165
Pound ( £ ) Alt+0163
Cent ( ¢ ) Alt+0162

To enter one of these symbols, first make sure that Num Lock is turned on. Then hold down the Alt key and enter the four-digit code using the numeric keypad. (If you use the numbers along the top of the keyboard, this won’t work.) When you release the Alt key, your symbol appears in the location you selected.

Want to see the codes for more symbols? From Word, Excel, or PowerPoint, choose Insert, Symbol. Select a symbol from the available list and look at the bottom of the dialog box to see its ANSI code.

(By the way, this technique works in any Windows program that supports ANSI characters. If you need to enter symbols in a non-Office program, try these codes and see if they work.)

Microsoft is getting RSS religion

Wow. Thanks to Scoble I just discovered that the Microsoft Knowledge Base now has RSS feeds, organized by category. This is huge news for people like me, who follow Microsoft products for a living and need fast access to new information.

There’s a good RSS tutorial, too, with a list of Windows-based stand-alone feed readers at the bottom. Suggestion to Microsoft: You should add Web-based aggregators to this list.

Netscape 8 breaks IE

This would be funny if it weren’t so ironic. OK, it’s funny.

We’ve just confirmed an issue that has started to be reported on newsgroups and forums that after installing Netscape 8 the XML rendering capabilities of Internet Explorer no longer work.

To paraphrase the old Microsoft-bashing line: “Netscape ain’t done till IE won’t run.”

The problem, apparently, is that the new Netscape actually writes a bunch of Registry entries under the Internet Explorer key.

This, of course, is the same browser that required a patch for three major security issues on the same day it was released. Nice work, AOL!

Worst. Software. Ever.

“Lies Verizon DSL support told me today”

If you have ever had to suffer through an encounter with a front-line support person for any broadband provider, you will appreciate these twin entries from Gizmodo:

Lies Verizon DSL Support Has Told Me Today: “Phone lines over 14 feet will, over time, fry your modem.”

Lies I Have Told Verizon DSL Support Today: “I have completed all your tests as you requested, including rewiring my house.”

Heh.

Tim loves his 20-inch widescreen monitor

Tim Coyle is ga-ga for his Dell 2005FPW monitor:

I got the monitor with a 14 Watt Sound Bar for $445 – including shipping. And let me tell you – this monitor is amazing. I am really digging wide screen – big time. I can see extra columns of data in Excel and my widescreen DVD’s are actually in widescreen now! It comes with an adjustable stand so you can easily raise or lower it, tilt or turn it. It has two usb slots on the side for easy access. You can see in the above image how it compare to my old 17” LCD display.

I’ve got one too, hooked up to my Media Center display. I like it so much, though, that I’m thinking of swapping it with one of the two 18-inch Dell Ultrasharps on my desktop. There is no better productivity-enhancing tool than a second monitor, in my opinion, and a 20-inch widescreen would still fit on my desk. Hmmm…

Update: Of course, then I see this review of the new 24-inch widescreen Dell Ultrasharp, with a native resolution of 1920 x 1200. What would one of these look like on the desktop? How about two of them?

Tip of the day: My three favorite Excel shortcuts

You don’t have to be an accountant to use Excel. It’s an ideal tool for managing any kind of data that falls into a neat rows-and-columns format, including everything from simple lists to complex budget reconciliations. These are my three favorite Excel shortcuts that most people don’t know about:

  1. Quick formatting Press Ctrl+1 to open the Format Cells dialog box, where you can change the way Excel displays text or numbers in a single cell or a range of cells. Even if you normally never use keyboard shortcuts, you should learn this one, which is universal and can save you a startling number of mouse clicks.
  2. Easy fractions Did you know you can enter a fraction in Excel? Normally, if you enter a numeric value that includes a forward slash, Excel converts it to a date or leaves it formatted as text. So, if you enter 3/8, Excel displays 8-Mar in the cell and stores the call’s value as the most recent occurrence of that date – in this case, 3/8/2005. If you enter 13/64, Excel just stores your entry as text, and you’re unable to use it in calculations. The secret for entering a fraction is to preface it with a zero. If you enter 0 3/8 in the cell, Excel drops the leading zero and displays the result in the cell as a fraction while storing its decimal equivalent, 0.375, as I’ve shown here.

    Excel_fraction

    If you enter a compound fraction that includes a whole number followed by a space and a fraction, Excel does the same. So 12 3/8 displays in the cell exactly as you enter it but becomes 12.375 in your worksheet. In either case, you can now use the entered value as part of any mathematical calculation.

  3. Instant zoom Use your mouse wheel to zoom in and out of your worksheet. Hold down the Ctrl key and spin the wheel down to zoom out; spin the wheel up to zoom back in. This shortcut has the same effect as using the Zoom control on the Standard toolbar or on the View menu. You can shrink the worksheet to as small as 10% of its actual size (good for getting a bird’s-eye view of the structure of a very large sheet, but lousy for editing) or up to 400% of actual size.

If you like these tips, you’ll find more just like them in Special Edition Using Microsoft Office 2003 and Special Edition Using Microsoft Office XP.

200,000 visitors in one year…

If current trends hold, sometime early Thursday morning this site will get its 200,000th unique visitor since I started keeping track of these stats roughly a year ago. I’m honored that so many people have come to visit this place, and I’m especially grateful for all the comments, e-mail, and other feedback you’ve left.

Thanks!

Update: Visitor 200,000 arrived Wednesday, May 25, 2005, at 4:45pm, from somewhere in Canada. So thanks, eh?

AP tries to stir up security fears

Associated Press Technology Writer Ted Bridis tries to stir up panic with an alarming story headlined “Hackers Holding Computer Files ‘Hostage'”:

Computer users already anxious about viruses and identity theft have new reason to worry: Hackers have found a way to lock up the electronic documents on your computer and then demand $200 over the Internet to get them back.

Security researchers at San Diego-based Websense Inc. uncovered the unusual extortion plot when a corporate customer they would not identify fell victim to the infection, which encrypted files that included documents, photographs and spreadsheets.

A ransom note left behind included an e-mail address, and the attacker using the address later demanded $200 for the digital keys to unlock the files.

“This is equivalent to someone coming into your home, putting your valuables in a safe and not telling you the combination,” said Oliver Friedrichs, a security manager for Symantec Corp.

The FBI said the scheme, which appears isolated, was unlike other Internet extortion crimes. Leading security and antivirus firms this week were updating protective software for companies and consumers to guard against this type of attack, which experts dubbed “ransom-ware.”

This is just dumb. “Hackers have found a way to lock up the electronic documents on your computer…”? Viruses and other forms of hostile code capable of deleting, encrypting, scrambling, stealing, or corrupting files have been around for as long as I can remember. An ICSA report documents this significantly more widespread extortion attempt from 1989, for instance:

[T]he Aids Trojan … was concealed on diskettes labelled “Aids Introductory Information Diskette” offering information on the human AIDS virus. The diskettes were mailed worldwide from London in December 1989, and when installed displayed a licence agreement and printed invoices for $189 or $378. Users were instructed to send the money to a fictitious PC Cyborg Corporation at an actual PO Box number in Panama, otherwise their PC would cease to function. This was no empty threat; after a variable number of power-ups since its installation the Trojan rendered the PC inoperable. At the end of January 1990, Joseph Popp was arrested by the FBI in Ohio, extradited to London and charged with 11 counts of blackmail… [I]t was estimated that this Trojan was intended to extort at least … 6 million [pounds].

This AP story takes an incident that the reporter acknowledges is “isolated,” which was reported by a publicity-seeking security software firm, and tries to turn it into a trend story. He doesn’t bother talking to any independent security researchers and instead interviews spokespeople for three companies that clearly stand to benefit financially from security-based panic. And I just about lost it when I read that the evil hacker asked for … gasp! Two hundred dollars! Clearly, this is not Dr. Evil we’re dealing with.

The story ends with this paragraph that basically cuts off its own legs:

Experts said there were no widespread reports the new threat was spreading, and the Web site was already shut down where the infection originally spread. They also said the hacker’s demand for payment might be his weakness, since bank transactions can be traced easily.

Oh. I see. Never mind.

There’s no trend here, folks. It’s one of the most fundamental principles of security: If you let someone else install software on your computer, it’s not your computer anymore.

Bridis deserves extra demerits for this lame story.

Update: Add Brian Krebs of the Washington Post to the Dishonor Roll. In his usually trenchant Security Fix blog at washingtonpost.com, Krebs falls overboard for this one:

In what could be a harbinger of the next big fad in online crime, Internet scammers are now trying to extort money from Microsoft Windows users by scrambling text files on victims’ PCs and then requesting payment for a computer program needed to decode the documents.

“Harbinger of the next big fad in online crime”? I doubt it. And “scammers” (plural)? Nope. One isolated incident. He does note, correctly, that this example exploits a security flaw in Internet Explorer that was patched last July.

Yet another update: More uncritical sources continue to pick this story up and fling it around the Internets. Neowin reprints the story unquestioningly, and so does Ed Oswald at Betanews (although an alert commenter quickly provided Betanews readers with a link to this page – thanks, Zaine!). And alas, a scan of Google News reveals that the story has been picked up by more than 400 sources.