-
Posts
7,282 -
Joined
-
Last visited
-
Days Won
2,416
Content Type
Forums
Blogs
Events
Resources
Downloads
Gallery
Store
Everything posted by allheart55 Cindy E
-
I know, right? I'm going to ask my little sister. She is an elementary school teacher. It's been a long time since my kidlings were in school.
-
If they are indeed no longer teaching cursive script in the elementary school, how are children supposed to know how to sign their names to any type of legal documents? Are they going to have to print their signature? :eek: Makes no sense to me....
-
-
You know, Lina, I don't think that penmanship classes exist any more. They do teach cursive in the public schools, at least in this area anyway. I didn't send my children to parochial school.
-
Yeah. Penmanship. I remember.
-
Book
-
Feast
-
That always good to know. You don't find that will a lot of companies today.
-
Starvation :D
-
Grammar and punctuation was hammered into me in Catholic School. :real_anger: English was always my favorite subject anyway. :D
-
I just ordered one of these. If I really like it once I get it, I'll probably order another one.
-
-
Directly after the July 29 launch of the Windows 10 upgrade, much to-do was made about Microsoft automatically delivering upgrade bits to Windows 7 and Windows 8 computers. It was pretty much a non-issue then as it is now, though some news outlets have picked it up as new based on a just recently released article from a web site called the Inquisitor on the matter. The real news at the time was when those computers that weren't supposed to be getting the upgrade bits were getting them. Or, at least it seemed like it. That led to some research that concluded with an article entitled Reasons Why Windows 10 Might be Downloading on Domain-Joined Computers. In essence, IT folks were finding the upgrade bits were also showing up on Pro and Enterprise computers that were supposedly properly managed. In every instance, this wasn't the case. Either end users had local admin rights (a no-no), the blocking tools hadn't been deployed, updates were being delivered through Automatic Updates instead of a centrally managed system, or the PC was being used in multiple environments that were differently managed. Here's some specifics on the upgrade files: The size of the downloaded files are 3GB. The files can be removed using the Windows 10 Disk Cleanup utility. Those who remove the Windows 10 upgrade files can still upgrade later. Microsoft's official statement on this is the same now as it was then (yes, I re-requested this): "For those who have chosen to receive automatic updates through Windows Update, we help customers prepare their devices for Windows 10 by downloading the files necessary for future installation. This results in a better upgrade experience and ensures the customer’s device has the latest software. This is an industry practice that reduces time for installation and ensures device readiness." – a Microsoft spokesperson So, as you can see, this is an old issue and nothing has really changed. If you choose automatic updates through Windows Update, 3GB of preparatory files are downloaded to the computer. Why the issue is being raised again now, almost 2 months after the public launch, really makes you question the source. If anything new comes from this, I'll be the first to write it up. If Microsoft needs a kick in the pants, my pointy boots are always polished and ready. Just consider this a reminder. Source : winsupersite
-
-
Measurements
-
One summer, my mother made my sisters and I take a typing and shorthand class that she taught. The typing has come in handy, the shorthand, not so much. :big_grin:
-
-
I like it too. I've been thinking about getting one myself. A couple of my customers have the same one and they both love it.
-
I'm really glad that you like it, Lina. There is a key that turns the back light off and on. I don't remember which key it is but the manual should be able to tell you. The keyboard would probably be best plugged in to the tower.
-
Every supported version of Windows should get an update, fixing two issues: one in Internet Explorer 7 and later, and the other in Windows Journal. You can count this month's most critical patches on one hand. That's the good news. The bad news is that almost every major Microsoft product requires a patch to fix ongoing security vulnerabilities, including two patches that affect all versions of Windows. For this month's so-called Patch Tuesday, the company has issued 12 bulletins fixing 56 separate vulnerabilities in some versions of Windows, Microsoft Office, and even the new Microsoft Edge browser But there are two patches that float to the top. MS15-094 is the biggest patch of the monthly batch, affecting all supported versions of Windows, including the company's server and tablet operating system lineup. A number of memory corruption flaws in Internet Explorer could allow an attacker to gain access to an affected system, running at the same user privilege level. An attacker would have to trick a user into visiting a carefully-crafted web page in order to exploit the flaw. Although Windows 10 is listed as a vulnerable system, the Edge browser is not affected by the bug. MS15-098 is another major flaw, affecting all supported versions of Windows. A denial-of-service issue with how Windows Journal handles some carefully-crafted documents could allow an attacker to cause data loss on an affected system. The good news is that it can't allow an attacker to take over the machine. The other three critical flaws to note include a flaw in Microsoft's new Edge browser. MS14-095 covers a separate memory corruption vulnerability in the new Windows 10-based browser, which could allow an attacker to gain access to an affected machine at the same user privilege level. MS15-097 is a critical elevation of privilege vulnerability affecting some versions of Windows and some versions of Microsoft Office. The patch fixes an issue that could allow an attacker to exploit a flaw in how affected products handle specially-crafted OpenType fonts. An attacker can gain access to a system through a crafted document or untrusted webpage. Last but most certainly not least, MS15-099 affects all supported versions of Microsoft Office, specifically because of a flaw in how SharePoint handles links. The cross-site scripting (XSS) vulnerability could allow an attacker to run remote code and scripts on a targeted machine, as well as allowing them to steal sensitive data, like authentication cookies. (Even Mac users running Excel for Mac 2011 and 2016 are affected, and are advised to check for updates.) Other patches, including MS15-096 and MS15-100 through MS15-105, are all rated "important," affecting Windows, Skype and Lync, and Exchange Server. The software company acknowledged researchers from Google's Project Zero, Trend Micro, Fortinet, FireEye, Intel Security and HP's Zero Day Initiative among others, for their security work and research. September's patches will be available through the usual update channels, like Windows Update. Source : zdnet
-
- internet explorer
- microsoft
-
(and 3 more)
Tagged with:
-
-
:rotf: That's for the Microsoft Office SP 3.