SlideShare une entreprise Scribd logo
1  sur  23
Télécharger pour lire hors ligne
Useful Shareware for
Technical Communicators
2015 STC New England
Interchange
Ed Marshall
Copyright 2015 Marshall Documentation Consulting
Agenda
• Tools to “Let the computer do the working”
• Advanced utilities
• Keeping your computer safe with
shareware tools
• Other useful tools
• Sources of information about shareware
• Q & A
2
Tools to “Let the Computer Do the
Working”
• Comparing sets of files, versions of files to
see what files changed and what the
differences are
• Searching and replacing text
• Using advanced text editors to edit content
outside of a mainstream authoring tool for
a variety of reasons
• Copying large or many files from your
location to another location
3
File / Folder Level Comparison
(Differencing Tools)
• Beyond Compare—Does folder and file-level comparison for both
ASCII and binary files. Can detect that ASCII or binary files are
different but can only show the differences in ASCII files, not binary
files. Highlights the specific characters different between two ASCII
files. Has a 30-day free fully functional trial.
Retail price = $30
www.scootersoftware.com/
• Araxis Merge—Does folder and file level comparisons for both ASCII
and binary files.
Retail price = $129
www.araxis.com/merge/index.html
4
Search and Replace Tools
• Funduc—Searches and replaces both folders and zip
files. Will search and replace ASCII files. Will search
binary files but cannot replace by itself. Has plug-ins for
Word, Excel, and PowerPoint. http://www.funduc.com
Cost = $25
Many other tools here also.
• FAR (Find and Replace)—Provides a search and
replace tool and help decompiler/comparison tool. Has a
two-month free trial.
http://www.helpwaregroup.com/products/FAR
Cost = buyer’s choice
5
Advanced Text Editors
NoteTab Pro and EditPad Pro:
• Both tools have spell checking. A big plus if you work in a mixed OS
environment is that neither tool inserts Windows-style line feed characters in
Unix files. They provide auto-save capabilities. You can use them to strip
leading/trailing white space and search and replace for information such as
pathnames for image files in HTML files.
• NoteTab Pro has a wizard for inserting html tags.
$30, Light ($5) and Standard ($20) versions available. Many other tools
here. www.notetab.com
• EditPad Pro has color-coding for custom html tags
$50. 30-day free trial, free Lite version available.
JG Soft has other tools such as a PowerGrep tool, Registry editor, and
others. www.jgsoft.com
6
Uses for EditPad Pro
• Auto indent / tab
• Spell-checking
• Color-coding for custom html tags
• Auto-sorting—Allows you to spot and remove
duplicates
• Specifying line length per file type
• Statistics
• Very good for adding / revising text in source
code files (C, Java, and C#)
7
Uses for NoteTab Pro
• Very good for adding HTML / XML tags to text
copied to source code files from other file
formats
• Powerful HTML wizard—Auto-creates tags for
you
• Apply HTML / XML coding to text using the built-
in easy to use HTML wizard
• Spell-checking
• Statistics
8
Transferring Files Via ftp
Filezilla—Open source software to transfer
files from one computer to another
• Easy to use—intuitive GUI
• Powerful Site Manager and transfer queue
• Cross-platform
• Available in many languages
• Can specify bookmarks
• Supports transfer of large files >4GB
• Supports drag and drop
• Supports FTP, FTP over SSL/TLS (FTPS) and SSH File Transfer
Protocol (SFTP)
Free from http://filezilla-project.org/
9
Tools of the Evil-doers
• Spyware—Uses your computer for another’s benefit.
• Spam—“junk e-mail”, Bigger problem: Infecting your computer to
use it as a proxy computer to send out spam messages.
• Key loggers—Captures your keystrokes (passwords or account
numbers).
• Ad-ware—Displays advertisements, usually without your consent.
• Phishing—Attempts to acquire your sensitive information.
• Extortionware—Runs a free test to detect infections. Then, it either
infects your computer or falsely reports problems and offers to
remove them if you buy their product. But, they often only remove
the “false positives” after you “pay the ransom”.
• Root kits—Controls the operating system at a low level. Can install
key loggers and backdoor programs silently to allow spying on your
computer activities and take remote control of your computer (also
known as “zombie computers”).
10
Best Practices for Keeping Your
Computer Safe
• Firewalls: Use only one as they can clash.
• Anti-virus: Use only one as they can clash. Need
to keep whatever anti-virus software you use
updated.
• Spyware tools: Most experts running several
tools as not all tools will catch everything.
11
Recommended Tool Suite
• Windows Update = $0
• Trend Micro Internet Security (www.trendmicro.com) is
an excellent set of tools that provides a firewall, anti-
virus, and spyware protection. You can buy a single-user
license for $29 or a 3-user license for $40.
• F-Secure Blacklight = $0 Combines thorough system
scanning with the familiar interface reminiscent of a
standard antivirus program. www.f-secure.com
Total Cost = $29!
12
Keeping Your Software Updated
Secunia Personal Security Inspector:
• Monitors the software installed on your computer
and alerts you when patches/updates are
available. Helps secure your computer from
software vulnerabilities. Detects all programs on
your system that are not updated / patched.
• Highly regarded by experts.
• Easy to use.
Free from https://psi.secunia.com/
13
Securing Wireless Networks
1. Log into your router.
2. Use encryption: WPA2 (Wi-Fi Protected
Access) is best. (Usually, seen as WPA-
PSK (pre-shared key).
3. Change your computer’s settings to use
the encryption set in step 2.
14
Desktop Indexing / Search Utility
Copernic Desktop Search:
• Searches files, e-mails, videos, pictures,
etc.
• Works in background to index
continuously
Free from www.copernic.com
15
Backup Utilities
• Acronis True Image = $50
www.acronis.com
• Backup4All = $20—$45
(3 editions: Lite $20, Standard $30, or Pro
$45)
Easy to use.
www.backup4all.com
16
Improving System Performance
/ Reliability
• Backup regularly to multiple copies
• Backup data, browser favorites, and e-mail
files
• Automated backup utilities
• Use daily backup directories
• Reduce the number of shortcuts on your
desktop to those you frequently use
17
CD Burning Utilities
• Roxio Creator 2009 = $80
www.roxio.com
• Nero 9 Ultra Edition = $80
www.nero.com
• Ashampoo Burning Studio = $40
www.ashampoo.com
18
Advanced Maintenance Utilities
• CrapCleaner = $20
(Everyone who donates $20 / £15 / €20 or more will be
emailed all new releases before they're available to
download on the site)
www.piriform.com/ccleaner
• Disk defragmenter: Defraggler = $0
www.piriform.com/defraggler
19
Web Site Tool
Yahoo Site Builder—
• Easy to use
• Free
• Easy to update
• Not restricted to Yahoo for hosting
• My start to finish time—3 hours!
• http://webhosting.yahoo.com/ps/sb/index.p
hp
20
Recommended Listservers /
Newsletters
• Kim Komando—www.Komando.com
• Brian Livingston—
www.WindowsSecrets.com
• Tourbus—www.InternetTourbus.com
• Infopackets—www.infopackets.com
21
Other Sources of Information
• Professional Magazines: PC World,
Consumer Reports, SC Magazine
• Spyware Guide—
www.spywareguide.com/index.php
• CNet—
reviews.cnet.com/software/?tag=ont.sw
22
Q & A
ed.marshall@verizon.net
www.MarshallDocumentationServices.com
Twitter: EdMarshall
LinkedIn: Ed Marshall
+1 978-339-3095
23

Contenu connexe

Similaire à Useful Shareware for Technical Communicators - STC New England Interchange conference presentation

COM 311 L -2.pptx
COM 311 L -2.pptxCOM 311 L -2.pptx
COM 311 L -2.pptxHarinianu2
 
Вячеслав Кабак "Microsoft Sysinternals-Useful Utilities"
Вячеслав Кабак "Microsoft Sysinternals-Useful Utilities"Вячеслав Кабак "Microsoft Sysinternals-Useful Utilities"
Вячеслав Кабак "Microsoft Sysinternals-Useful Utilities"EPAM Systems
 
01 Metasploit kung fu introduction
01 Metasploit kung fu introduction01 Metasploit kung fu introduction
01 Metasploit kung fu introductionMostafa Abdel-sallam
 
Cerebro general overiew eng
Cerebro general overiew engCerebro general overiew eng
Cerebro general overiew engCineSoft
 
Information Computer Technology Handouts (Part I)
Information Computer Technology Handouts (Part I)Information Computer Technology Handouts (Part I)
Information Computer Technology Handouts (Part I)ella dimaiwat
 
PowerShell - Be A Cool Blue Kid
PowerShell - Be A Cool Blue KidPowerShell - Be A Cool Blue Kid
PowerShell - Be A Cool Blue KidMatthew Johnson
 
System software and its types
System software and its typesSystem software and its types
System software and its typessamina khan
 
Reversing Engineering: Dissecting a "Client Side" Vulnerability in the APT era
Reversing Engineering: Dissecting a "Client Side" Vulnerability in the APT eraReversing Engineering: Dissecting a "Client Side" Vulnerability in the APT era
Reversing Engineering: Dissecting a "Client Side" Vulnerability in the APT eraNelson Brito
 
ch4-Software is Everywhere
ch4-Software is Everywherech4-Software is Everywhere
ch4-Software is Everywheressuser06ea42
 
A presentation on system software
A presentation on system software A presentation on system software
A presentation on system software Ankit Sangwan
 
Shawn's Top 5 Favorite Utilites
Shawn's Top 5 Favorite UtilitesShawn's Top 5 Favorite Utilites
Shawn's Top 5 Favorite UtilitesShawn Keller
 
Super Easy Memory Forensics
Super Easy Memory ForensicsSuper Easy Memory Forensics
Super Easy Memory ForensicsIIJ
 
Introduction to Malware Analysis
Introduction to Malware AnalysisIntroduction to Malware Analysis
Introduction to Malware AnalysisAndrew McNicol
 
Introduction to Python Programming
Introduction to Python ProgrammingIntroduction to Python Programming
Introduction to Python ProgrammingAkhil Kaushik
 
Finalppt metasploit
Finalppt metasploitFinalppt metasploit
Finalppt metasploitdevilback
 
COMP-111 Past Paper 2022 complete Solution PU BS 4 Year Program
COMP-111 Past Paper 2022 complete Solution PU BS 4 Year ProgramCOMP-111 Past Paper 2022 complete Solution PU BS 4 Year Program
COMP-111 Past Paper 2022 complete Solution PU BS 4 Year Programhaiderali8455
 
Vista Presentation
Vista PresentationVista Presentation
Vista Presentationsdrayin
 

Similaire à Useful Shareware for Technical Communicators - STC New England Interchange conference presentation (20)

Open Source Software
Open Source SoftwareOpen Source Software
Open Source Software
 
COM 311 L -2.pptx
COM 311 L -2.pptxCOM 311 L -2.pptx
COM 311 L -2.pptx
 
Вячеслав Кабак "Microsoft Sysinternals-Useful Utilities"
Вячеслав Кабак "Microsoft Sysinternals-Useful Utilities"Вячеслав Кабак "Microsoft Sysinternals-Useful Utilities"
Вячеслав Кабак "Microsoft Sysinternals-Useful Utilities"
 
01 Metasploit kung fu introduction
01 Metasploit kung fu introduction01 Metasploit kung fu introduction
01 Metasploit kung fu introduction
 
Cerebro general overiew eng
Cerebro general overiew engCerebro general overiew eng
Cerebro general overiew eng
 
Information Computer Technology Handouts (Part I)
Information Computer Technology Handouts (Part I)Information Computer Technology Handouts (Part I)
Information Computer Technology Handouts (Part I)
 
PowerShell - Be A Cool Blue Kid
PowerShell - Be A Cool Blue KidPowerShell - Be A Cool Blue Kid
PowerShell - Be A Cool Blue Kid
 
System software and its types
System software and its typesSystem software and its types
System software and its types
 
Reversing Engineering: Dissecting a "Client Side" Vulnerability in the APT era
Reversing Engineering: Dissecting a "Client Side" Vulnerability in the APT eraReversing Engineering: Dissecting a "Client Side" Vulnerability in the APT era
Reversing Engineering: Dissecting a "Client Side" Vulnerability in the APT era
 
ch4-Software is Everywhere
ch4-Software is Everywherech4-Software is Everywhere
ch4-Software is Everywhere
 
A presentation on system software
A presentation on system software A presentation on system software
A presentation on system software
 
Shawn's Top 5 Favorite Utilites
Shawn's Top 5 Favorite UtilitesShawn's Top 5 Favorite Utilites
Shawn's Top 5 Favorite Utilites
 
Super Easy Memory Forensics
Super Easy Memory ForensicsSuper Easy Memory Forensics
Super Easy Memory Forensics
 
Software
SoftwareSoftware
Software
 
Introduction to Malware Analysis
Introduction to Malware AnalysisIntroduction to Malware Analysis
Introduction to Malware Analysis
 
Introduction to Python Programming
Introduction to Python ProgrammingIntroduction to Python Programming
Introduction to Python Programming
 
Finalppt metasploit
Finalppt metasploitFinalppt metasploit
Finalppt metasploit
 
COMP-111 Past Paper 2022 complete Solution PU BS 4 Year Program
COMP-111 Past Paper 2022 complete Solution PU BS 4 Year ProgramCOMP-111 Past Paper 2022 complete Solution PU BS 4 Year Program
COMP-111 Past Paper 2022 complete Solution PU BS 4 Year Program
 
Keylogger
KeyloggerKeylogger
Keylogger
 
Vista Presentation
Vista PresentationVista Presentation
Vista Presentation
 

Dernier

9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding TeamAdam Moalla
 
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfJamie (Taka) Wang
 
Cybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxCybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxGDSC PJATK
 
Introduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptxIntroduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptxMatsuo Lab
 
AI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity WebinarAI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity WebinarPrecisely
 
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...Will Schroeder
 
How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?IES VE
 
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...UbiTrack UK
 
Building AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptxBuilding AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptxUdaiappa Ramachandran
 
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationUsing IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationIES VE
 
UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7DianaGray10
 
Comparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and IstioComparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and IstioChristian Posta
 
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfUiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfDianaGray10
 
Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )Brian Pichman
 
Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024SkyPlanner
 
Designing A Time bound resource download URL
Designing A Time bound resource download URLDesigning A Time bound resource download URL
Designing A Time bound resource download URLRuncy Oommen
 
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAAnypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAshyamraj55
 
Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)Commit University
 
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1DianaGray10
 
Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.YounusS2
 

Dernier (20)

9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team
 
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
 
Cybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxCybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptx
 
Introduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptxIntroduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptx
 
AI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity WebinarAI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity Webinar
 
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
 
How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?
 
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
 
Building AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptxBuilding AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptx
 
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationUsing IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
 
UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7
 
Comparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and IstioComparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and Istio
 
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfUiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
 
Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )
 
Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024
 
Designing A Time bound resource download URL
Designing A Time bound resource download URLDesigning A Time bound resource download URL
Designing A Time bound resource download URL
 
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAAnypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
 
Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)
 
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
 
Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.
 

Useful Shareware for Technical Communicators - STC New England Interchange conference presentation

  • 1. Useful Shareware for Technical Communicators 2015 STC New England Interchange Ed Marshall Copyright 2015 Marshall Documentation Consulting
  • 2. Agenda • Tools to “Let the computer do the working” • Advanced utilities • Keeping your computer safe with shareware tools • Other useful tools • Sources of information about shareware • Q & A 2
  • 3. Tools to “Let the Computer Do the Working” • Comparing sets of files, versions of files to see what files changed and what the differences are • Searching and replacing text • Using advanced text editors to edit content outside of a mainstream authoring tool for a variety of reasons • Copying large or many files from your location to another location 3
  • 4. File / Folder Level Comparison (Differencing Tools) • Beyond Compare—Does folder and file-level comparison for both ASCII and binary files. Can detect that ASCII or binary files are different but can only show the differences in ASCII files, not binary files. Highlights the specific characters different between two ASCII files. Has a 30-day free fully functional trial. Retail price = $30 www.scootersoftware.com/ • Araxis Merge—Does folder and file level comparisons for both ASCII and binary files. Retail price = $129 www.araxis.com/merge/index.html 4
  • 5. Search and Replace Tools • Funduc—Searches and replaces both folders and zip files. Will search and replace ASCII files. Will search binary files but cannot replace by itself. Has plug-ins for Word, Excel, and PowerPoint. http://www.funduc.com Cost = $25 Many other tools here also. • FAR (Find and Replace)—Provides a search and replace tool and help decompiler/comparison tool. Has a two-month free trial. http://www.helpwaregroup.com/products/FAR Cost = buyer’s choice 5
  • 6. Advanced Text Editors NoteTab Pro and EditPad Pro: • Both tools have spell checking. A big plus if you work in a mixed OS environment is that neither tool inserts Windows-style line feed characters in Unix files. They provide auto-save capabilities. You can use them to strip leading/trailing white space and search and replace for information such as pathnames for image files in HTML files. • NoteTab Pro has a wizard for inserting html tags. $30, Light ($5) and Standard ($20) versions available. Many other tools here. www.notetab.com • EditPad Pro has color-coding for custom html tags $50. 30-day free trial, free Lite version available. JG Soft has other tools such as a PowerGrep tool, Registry editor, and others. www.jgsoft.com 6
  • 7. Uses for EditPad Pro • Auto indent / tab • Spell-checking • Color-coding for custom html tags • Auto-sorting—Allows you to spot and remove duplicates • Specifying line length per file type • Statistics • Very good for adding / revising text in source code files (C, Java, and C#) 7
  • 8. Uses for NoteTab Pro • Very good for adding HTML / XML tags to text copied to source code files from other file formats • Powerful HTML wizard—Auto-creates tags for you • Apply HTML / XML coding to text using the built- in easy to use HTML wizard • Spell-checking • Statistics 8
  • 9. Transferring Files Via ftp Filezilla—Open source software to transfer files from one computer to another • Easy to use—intuitive GUI • Powerful Site Manager and transfer queue • Cross-platform • Available in many languages • Can specify bookmarks • Supports transfer of large files >4GB • Supports drag and drop • Supports FTP, FTP over SSL/TLS (FTPS) and SSH File Transfer Protocol (SFTP) Free from http://filezilla-project.org/ 9
  • 10. Tools of the Evil-doers • Spyware—Uses your computer for another’s benefit. • Spam—“junk e-mail”, Bigger problem: Infecting your computer to use it as a proxy computer to send out spam messages. • Key loggers—Captures your keystrokes (passwords or account numbers). • Ad-ware—Displays advertisements, usually without your consent. • Phishing—Attempts to acquire your sensitive information. • Extortionware—Runs a free test to detect infections. Then, it either infects your computer or falsely reports problems and offers to remove them if you buy their product. But, they often only remove the “false positives” after you “pay the ransom”. • Root kits—Controls the operating system at a low level. Can install key loggers and backdoor programs silently to allow spying on your computer activities and take remote control of your computer (also known as “zombie computers”). 10
  • 11. Best Practices for Keeping Your Computer Safe • Firewalls: Use only one as they can clash. • Anti-virus: Use only one as they can clash. Need to keep whatever anti-virus software you use updated. • Spyware tools: Most experts running several tools as not all tools will catch everything. 11
  • 12. Recommended Tool Suite • Windows Update = $0 • Trend Micro Internet Security (www.trendmicro.com) is an excellent set of tools that provides a firewall, anti- virus, and spyware protection. You can buy a single-user license for $29 or a 3-user license for $40. • F-Secure Blacklight = $0 Combines thorough system scanning with the familiar interface reminiscent of a standard antivirus program. www.f-secure.com Total Cost = $29! 12
  • 13. Keeping Your Software Updated Secunia Personal Security Inspector: • Monitors the software installed on your computer and alerts you when patches/updates are available. Helps secure your computer from software vulnerabilities. Detects all programs on your system that are not updated / patched. • Highly regarded by experts. • Easy to use. Free from https://psi.secunia.com/ 13
  • 14. Securing Wireless Networks 1. Log into your router. 2. Use encryption: WPA2 (Wi-Fi Protected Access) is best. (Usually, seen as WPA- PSK (pre-shared key). 3. Change your computer’s settings to use the encryption set in step 2. 14
  • 15. Desktop Indexing / Search Utility Copernic Desktop Search: • Searches files, e-mails, videos, pictures, etc. • Works in background to index continuously Free from www.copernic.com 15
  • 16. Backup Utilities • Acronis True Image = $50 www.acronis.com • Backup4All = $20—$45 (3 editions: Lite $20, Standard $30, or Pro $45) Easy to use. www.backup4all.com 16
  • 17. Improving System Performance / Reliability • Backup regularly to multiple copies • Backup data, browser favorites, and e-mail files • Automated backup utilities • Use daily backup directories • Reduce the number of shortcuts on your desktop to those you frequently use 17
  • 18. CD Burning Utilities • Roxio Creator 2009 = $80 www.roxio.com • Nero 9 Ultra Edition = $80 www.nero.com • Ashampoo Burning Studio = $40 www.ashampoo.com 18
  • 19. Advanced Maintenance Utilities • CrapCleaner = $20 (Everyone who donates $20 / £15 / €20 or more will be emailed all new releases before they're available to download on the site) www.piriform.com/ccleaner • Disk defragmenter: Defraggler = $0 www.piriform.com/defraggler 19
  • 20. Web Site Tool Yahoo Site Builder— • Easy to use • Free • Easy to update • Not restricted to Yahoo for hosting • My start to finish time—3 hours! • http://webhosting.yahoo.com/ps/sb/index.p hp 20
  • 21. Recommended Listservers / Newsletters • Kim Komando—www.Komando.com • Brian Livingston— www.WindowsSecrets.com • Tourbus—www.InternetTourbus.com • Infopackets—www.infopackets.com 21
  • 22. Other Sources of Information • Professional Magazines: PC World, Consumer Reports, SC Magazine • Spyware Guide— www.spywareguide.com/index.php • CNet— reviews.cnet.com/software/?tag=ont.sw 22
  • 23. Q & A ed.marshall@verizon.net www.MarshallDocumentationServices.com Twitter: EdMarshall LinkedIn: Ed Marshall +1 978-339-3095 23