Tech Tips

Move over OpenOffice.org, Kingsoft Office Suite has arrived

One of the most expensive pieces of software that I have on my laptop is Microsoft Office. I consider it invaluable…but I use it – intensely – each and every day. Many people don’t. Many people view/manage their email through webmail or on their smartphone. Others don’t work with Spreadsheets or Word documents very often, if at all. Some only make an occasional presentation. In other words, for many people the cost up to $499 for the Professional version (which includes Outlook and Access) is too steep of a price to pay…yet most people need SOME word processing, spreadsheet and/or presentation software at some point in time. Are you going to invest a minimum of $150 for the pleasure? Probably not.

For many people, the OpenOffice.org (www.openoffice.org) suite of software has been the ‘go to’ software for their occasional foray into desktop productivity for quite a while. OpenOffice is a true ‘suite’ of applications…containing modules named Writer, Calc, Impress, Draw, Base and Math. While I’ve always considered OpenOffice a great alternative to Microsoft Office, I feel like it doesn’t run terribly efficiently. It can take quite a while to open up OpenOffice and makes my computer sluggish. In fact, to my untrained eye, it appears that it actually opens ALL of the apps, even if you’re only trying to work in one of them.

For years, it was really the only viable alternative to Office…but now there is a new player in the F-R-E-E software arena – Kingsoft Office Suite (www.kingsoftstore.com).

Kingsoft has three modules: Writer, Presentation and Spreadsheets. Unlike OpenOffice.org, there is no database component or image editing. Kingsoft is the basics in terms of offering, but not in terms of features. When you open one of the programs up, unless you’re paying close attention, you’d think that you were in Microsoft-land (click on any of the images to see a larger image):

WRITER

SPREADSHEET

PRESENTATION

Kingsoft seems to open/save documents with standard Microsoft extensions flawlessly. The installation is fast and easy. The system resources consumed by the products seem minimal. All-in-all, a FABULOUS alternative to Microsoft Office for people who don’t want to invest the money or don’t use Office frequently enough to justify the expense. Now, when your high school friend sends you a spreadsheet of all your classmates for the upcoming reunion, you won’t have to say ‘sorry, I can’t open that’!

Can’t wait to download and install it? Here’s the link: www.kingsoftstore.com/kingsoft-office-freeware.html

Create Your Own PDF Forms – you know…fill in the blanks

PDF documents are pretty ubiquitous. Many of us who work in offices see them every day. Most times, they are just text, or text and images. Someone saved a Word document into a PDF format, so it can’t be edited, but can be read by everyone (well, everyone who has a PDF reader – and that’s most of us).

Sometimes, a PDF document is really a form that the user can complete/return. Some of them are just a form to print out (you can’t fill out the information on the computer). Some of them are interactive – that is, you can fill in the information right on the computer screen, then print/email the document. That’s kind of cool if you’re asking someone for information in a specified format. Making someone print out a ‘static’ PDF (one where you can’t fill in the blanks) requires them to fill in the entries by hand, scan the document back in so they can email it to you, or send you the printed out copy. If you send them a regular Word document (so they can fill it out on the computer), they can change things up – leaving the original formatting useless. If it’s a contract or other ‘official’ document, they could change the terms and return it to you and you might not even notice!

So, I would LOVE to have an inexpensive tool where I could create ‘interactive’ PDF documents, but it wouldn’t cost me a fortune. I don’t spend my life doing things like that…I only do it once in a great while.

I always thought that the only way to create these ‘form’ PDF’s was to have the full-blown Adobe Acrobat product (cost at time of this writing – $449.00 on Adobe’s site). I don’t know about you, but that’s NOT a price that I can stomach. I need to create PDF forms occasionally. When I’ve had the need, I’ve tended to just created Word documents and hope for the best. Now, I’ve found a new program that allows me to create Form PDFs for FREE – YEAH!! The promised land!

In the past, we’ve covered creating a ‘normal’ PDF document with a free PDF writer (http://www.yourtechtamer.com/blog/2010/12/creating-pdfs-for-free/, however, this was just to turn a ‘normal’ document on your computer into a PDF – its not ‘interactive’.

Welcome PDFescape! I’m so glad that we found you!!! To quote from their website (www.pdfescape.com), “PDFescape is a free service. Users of PDFescape can upload files to view them, modify them, form fill them, and even create new forms. No logo, watermark, or other tag is added to your file. PDFescape is truly free.” Hip-hip-hooray!!!

Let’s see what it’s like (click image for larger view):

First, there is NO SIGNON required. If you want to save your documents to PDFEscape’s site, then you need to create a signon, but otherwise, it is an ‘open’ world!

This document took me under 5 minutes to create – and I had never looked at how to do this before now.

You simply click on one of the types of information you want to put on your PDF (I’ll click on ‘text’):

Then you click on your blank document and start typing. When you’re done, click the yellow bar to disable and move onto the next item. Click on images and you can upload images to your document. Form-fields are a snap:

There are five (count ’em FIVE) types of form-fields you can add: Text, Checkbox, Radio button, Drop-down, or Listbox. I added a text field and a drop-down. For the drop-down, I created several selections.

In order to make the choices for the drop-down field, I had to right-click on the field I had inserted and select ‘Properties’:

Then, I just typed in the values that I wanted the user to see (DE, NJ, PA, NY):

When I was done ‘creating’ my entire document, I simply hit this button:

and I was able to download/save the document to my local computer.

Remember, I never created a signon, so when I finished my ‘virtual’ work, I had to save it somewhere! (If I’d created an account, I could have saved the file online).

What were the results?

I could then send this document to anyone to complete…here’s what a completed form looks like:

Now, all that anyone needs to do is print it to a PDF and email it back to me! I have a lovely, consistent, legible form to work from. HOORAY!!!

Legitimate Internet Threat – July 9th – You COULD lose your internet connection…

There is so much misinformation on the internet and about the internet, that sometimes it is hard to tell truth from fiction. This time, rumors that you might lose your internet connection on July 9th, 2012 ARE LEGITIMATE!!!! The more technical description circulating about this malware is ‘DNS Changer’ (which means nothing to most non-technical people).

FEAR NOT, however, as there is a way to check and a way to correct, should your computer be infected.

Background: Back on November 8, 2011, the FBI arrested a group who was using a botnet (one type of method for computer infection) to ‘hijack’ users computers. This group was known as “Rove Digital” and was wrecking havoc in computers across the world. If you’re like me, you ask, “So, if the FBI arrested the bad guys back in November, what do I have to worry about on July 9th”. In laymen’s term, here is what happened:

Something called a ‘DNS’ takes part in every internet search you do, or every connection you make through the internet. The user friendly URL’s that you enter into your browser (e.g. www.google.com) or search results you click use a DNS to translate the user-friendly URL into techno-babble. An analogy is that a street address is translated by your GPS into longitude and lattitude coordinates. Similarly, the internet uses DNS to translate from a URL that you and I understand, to a computer server’s technical address, and delivers you to that site.

The bad guys injected half a million computers with malware that would redirect you from the destination you WANTED when you enter information in the URL to some other location giving you false results on your screen that LOOKED legitimate. In other words, they gave you an alternate view of the internet universe. WHY? To make money from advertising…illegitimately…among other things.

The FBI and others not only uncovered and arrested thieves, but went one step further in making sure that the ‘bad’ servers (the ones that infected machines are directed to) were replaced with ‘good’ servers (clean ones that the Internet Gods control). So, since November, any computers infected with the malicious code have been getting ‘good’ results. In other words, infected machines have been re-routed to the correct web sites according to their searches and URL’s clicked. Infected machines display no ‘symptoms’.

Sounds good, right? Well, here’s the rub. On July 9th, 2012, these replacement servers are BEING TAKEN OUT OF SERVICE. What does this mean to you? If your computer is infected, then your computer will be unable to figure out which website you’re trying to get to when you open up your browser, and you will be in an internet blackout. The idea is that during the time between November 2011 and July 2012, people could carefully mitigate the evil infection without an unplanned outage. Unfortunately, if you don’t check, you might still find yourself with an ‘unplanned outage’.

FIND OUT NOW IF YOUR COMPUTER IS INFECTED!!! Go to http://www.dcwg.org/detect/ (it just takes a second) and find a link with which to conduct a test. If you’re clean, you will have no issue on July 9th. If, however, your computer returns infected, follow the directions on the trusted sites (you can get there through either of the links below) and clean it before July 9th.

(More info here or here or here)

Over time “Rove Digital” infected over 500,000 computers – INCLUDING APPLE COMPUTERS!!! Better safe than sorry!!!

Apple device owners beware…you may not be as safe as you think from malicious hackers

I finally have what I lovingly refer to as my first ‘iThing’. Yes, I was among those who got the latest iPad (mind you, NOT called the iPad 3, but still, it is the 3rd generation of the iPad). And technically, this isn’t my first iThing…it is my 3rd. I have owned two iPods (one currently still in service), and not newer than about the year 2003, so I think its safe to say that this is my first iThing of the modern era of iThings. My iPod is the ‘classic’ design (‘classic’ being a better term than ‘old’). So, it was with great anticipation that I waited for the UPS person to show up at my door on release day.

I thoroughly enjoy my iPad. Quite honestly, I haven’t explored all its capabilities, but I look forward to getting to know it, and its seemingly infinite array of apps. It certainly is handy! Love being able to slip it in a shoulder bag and hop on WiFi where I find it (I did NOT pay for the 4G version, though I may regret that down the road). Because I work on computers all day – and not just doing emails, etc., but coming up with technology solutions to business problems – I don’t have any interest in playing games, etc. I’m looking to use my iPad for office productivity solutions, so that will take some trial and error. Suggestions from you readers on ‘must have apps’ is welcome!

Anyway, I figured that if I am now in the world of (modern) Apple device owners, I should brush up on any protection software required for Apple products. I know that many people consider the Apple operating systems fairly bullet-proof and/or low on the radar, so that the ‘bad guys’ who spend their time writing malicious code just ignore it. In fact, in the Apple App Store, there are a couple of Apps out there which give INFORMATION on malware threats, but don’t actually provide protection to the iPad/iPhone. So, IT people might like them for alerting them to breaking threats which might be positioning for attack on their Microsoft based equipment, but the apps do NOT protect the ‘iThing’.

Hmmm…why, I ask? A little more searching found the explanations…all the apps install in their own ‘sandboxes’. In other words, each app is discreetly partitioned from the other apps. Therefore, an ‘iThing’ (either an iPod, iTouch or iPad) is inherently safer from attack than a traditional computer. As I understand it, data in one application is not accessible by other applications. In essence, each area is blockaded from other areas. Safari (the internet browser installed by default) or other browsers that you might install, would be the most susceptible to infiltration by ‘bad guys’ which might pick up (and steal) keystrokes, information, etc. as you type them. So, even on your ‘iThing’, use safe browsing techniques. Don’t surf the web carelessly when you’re on public WiFi.

What I found most interesting as I was reading up on Apple and susceptibility to infection was that the Mac platform is actually susceptible to infection by trojans (malicious software that gets installed without the computer owners knowledge). I found two recently published articles about the rise of vulnerability as the platform gains popularity – one in Forbes magazine and one in a technical site called CRN. Both say that there are over 600,000 infected Macs. The more people decide to leave the Microsoft world, the more the Mac system will get attacked.

Not to worry, however, as there is free software available to protect your Macintosh. Just head over to Sophos or ClamXav and download/install a free anti-malware tool. After all, while the threat of infection on a Mac is less than on a Windows machine, there is a chance – and that chance is increasing as the popularity of the Mac OS grows. Why not protect yourself?

Do not get fooled by fake anti-virus messages – and never, ever click unless you are sure!

I figure its rarely a good thing when the phone rings at 7am…particularly when it’s your cell phone (a number that most of your clients have for emergencies). Most people haven’t even had their coffee yet! Clients on the West Coast are still tucked in bed. Has to be an East-Coaster. Has to be a problem.

So began my Friday morning. I try to put on a chipper, pretend-post-caffeine voice as I answer. “Good morning, this is Sandy…(bright smile – well, trying for a bright smile – in my voice)”

The voice at the other end begins, “So I clicked on an email that LOOKED like it was from my friend, Joe, but when I opened it, the email was actually offering me prescription drugs via the internet. I don’t know why Joe sent it to me, but then a Microsoft message popped up from my toolbar telling me that my anti-virus is not operating, so I clicked on the ‘fix-it button’ and now I can’t open any icons on my desktop.”

My pre-caffeine brain was still waiting to hear ‘Hi’, but I realized that this was not going to be a relaxed conversation over a cup of coffee or cold-caffeine (Diet Pepsi being my caffeine of choice – even in the morning). This was a 911-type call because a machine was ‘down’. They needed help and they needed it NOW.

Quite truthfully, I’ll never know if a link in that email masquerading as coming from a friend was clicked, if a link on an infected website was clicked, or if the infection came via another route, but the FAKE anti-virus message was received and acted upon. The EVIL virus was launched and was trying to work its nefarious ways.

What does a fake Internet Security or Anti-virus message look like? Well, below are a couple of examples. Yes, these are FAKES!!!

So, why this message to all of you? To help you learn from others mistakes – how to recognize a fake Internet Security warning.

First, BEWARE OF ANTI-VIRUS/INTERNET SECURITY MESSAGES. Make sure that the message really comes from the anti-virus or internet security package you use. My client read the message to me, and it was a Windows message, but they use Norton. Giant warning flags. NEVER EVER follow a link/message from a software feature that you are NOT using. While this client uses a Windows platform, they do NOT use Window’s Internet Security. A neon DANGER, DANGER sign should have gone off in their heads.

Second, Google the message you’ve received to find out if that particular message has come up as a fake warning.

Third, close the questionable window and open up your Internet Security/Anti-Virus via that program’s interface (use the Start-Program menu). If your computer is really at risk, it will show up in that interface (e.g. the Norton or McAfee interface). If no ‘risk’ displays, then your computer is probably safe, but you still need to get rid of that errant warning. Keep on reading and follow the instructions below.

What happens if you mistakenly clicked somewhere and your computer is infected as my client’s was. Well, there are a couple of FREE tools which might help to solve your issues.

Download Malwarebytes (I use CNET.com or PCWorld.com for safe downloads).

Install, then launch Malwarebytes. Perform a scan.

Check “Perform Full Scan”, then “Scan”. Let it run. It could take several hours. Once it is done, if it found ‘cooties’ in your computer, Malwarebytes will offer to quarantine or fix the issues. Allow it to. Reboot your computer when it is all done. Click around…hopefully, all of your issues are solved.

Use this next tool in conjunction with Malwarebytes – in other words, run it after you’ve run Malwarebytes. CC Cleaner is another free computer fixing ‘friend’. Download and install this program.

Install, then launch CC Cleaner. You will need to run two different scans with this tool. Click on ‘Cleaner’, then ‘Run Cleaner’. When that completes, click on ‘Registry’, ‘Scan for Issues’, then allow CCCleaner to fix any registry related issues. Before allowing CCCleaner to fix issues, accept the offer to save a copy of your current registry (save it to your Desktop – you can delete it after a week or so, once you’re sure nothing ‘odd’ is happening).

These two programs, which contain a myriad of tools, are your BEST FRIEND when something goes awry on your computer. I always keep them installed on my machines, and use them as part of my normal housekeeping. Running them regularly will help you to catch issues that you may not even be aware exist on your computer.

And I beg of you…do NOT click on emails/links/websites of which you are unsure. Hover over links to see the REAL URL’s. Type in URL’s yourself into your web browser. Don’t open e-mails from friends that look ‘odd’. Instead, email your friend back (on a new email) and ask them if they had sent you an email with “Whatever” in the subject line…if they confirm, then its probably safe to open it.

I hope you don’t need to resort to these tools for more than maintenance.

How do I know if someone is talking about me on the web?

As “they” say, your reputation is everything. This includes your reputation among family, friends, colleagues, and now, what appears about you online. Yes, you need to make sure that you stay abreast of any information posted on the web about you.

Have you ever had the experience of having someone – maybe a casual friend or business acquaintance – call you out of the blue to congratulate you on the award that you just won, tell you ‘atta boy’ or ‘atta girl’ for a speaking engagement you just landed? As a former boss of mine used to say, “How do it know?” (please forgive the poor grammar, that’s a direct quote!). In this case you might be wondering, “How on earth did they find out already, I didn’t tell anyone/see anyone, etc.?”

Well, back-in-the-day, just a little after dinosaurs roamed the earth, there used to be services called ‘clipping services’. Companies paid handsomely for people to comb through various publications for mentions of the name of their company, mentions of the appearances of their top executives, etc. You paid by the number of periodicals you wanted reviewed, as well as, by the number of times those periodicals were published, plus the number of names/mentions you were searching.

I was always fascinated by this concept. Did one person read the same newspaper or magazine 100 times, each time with an eye out for a separate reference, or did they have an incredible memory and were able to scan the names/references that they needed to find, then read the publication once and picked up all the mentions – whether it was one or many? I still wonder. I could probably do a search and find out. If you want more information on “Clipping Services”, you can start with this Wikipedia link.

But I digress…Those services have sort of gone the way of buggy whips. They were indispensable at one point in time, but are used only by a select few today. Why? Because each and every one of us has access to our own “Clipping Service” – FOR FREE!

Google (yes, good ‘ole Google again) provides the free service called ‘Google Alerts’…and I strongly advise each and every one of you to at least set up a ‘vanity search’ for your own name…so you know what people are saying about you on the web.

It couldn’t be easier to set up. Simply go to www.google.com/alerts. The service DOES require a Google signon, but its a small price to pay for a VERY powerful service.

Use standard Google Search ‘rules’ (e.g. put a proper name in quotes to get results with the first and last name together) to get the results you are searching for, enter the search string in the ‘Search Query’ field. For example, if I want notifications for anything posted on the web about my company, I’d enter “Your Tech Tamer” (quotes INCLUDED). If you have a common name, you might want to tweak your search string to eliminate some errant notifications about the OTHER person/people with your name. We’ll use “Phil Collins”, but not THAT Phil Collins as an example. If you are A Phil Collins, but not THAT Phil Collins, you could enter a search string “Phil Collins” -Genesis -drummer -music. This will give you notifications of “Phil Collins” where the words “Genesis”, “drummer” and “music” are NOT mentioned. That helps to weed out some of the ‘other guys’. Additionally, if you go by a formal name and a nickname, you should set up BOTH alerts, the one above AND one for “Phillip Collins”.

If you want to limit the type of information you receive, you can select from the ‘Result Type’ drop-down and select ‘Everything’ or ‘Videos’ or ‘Blogs’, etc. to narrow down the amount of information. I’m not sure why you wouldn’t want everything for this ‘clipping service’ on your name, but you have the option.

‘How Often’ will determine how frequently results are sent to your e-mail. You can choose from ‘As it happens’, ‘Once a day’ or ‘Once a week’.

‘How Many’ is a quality filter…changing this from the default may create a deluge of e-mail.

‘Deliver To’ is the e-mail address to which the digest will be sent.

Hit ‘Create Alert’ and Google will begin trawling the web for any new posts that match your criteria. NOTE: It does NOT give you all the things ALREADY posted…you can run a normal Google search for those. It WILL give you any NEW posts on the web that meet the criteria.

Sit back and wait for Google to deliver your newly created ‘clippings’ to your Inbox.

Only your own imagination limits the amount of information you can have filtered into your inbox. After you set up alerts for your own name and company, create ones for friends, family, co-workers, clients, and competitors. Then YOU will be the first person saying ‘Hey, I just heard you won that coveted award…Congratulations!’

If you need help with creating accurate Google search strings, check out this post from last August.

Who Are Your Neighbors?

Let me begin by saying that I am absolutely HORRIBLE with names. I don’t know why, but I am awful. I try to remember, I try all the mnemonic devices and still, I forget names that I really should know. Most embarrassingly are the names of my neighbors.

I’ve lived in my current house for almost 20 years. I love my neighborhood. I love my neighbors. That lady down the street that I wave to when she picks up her mail. The people at the end of the street with the adorable little boy who is rapidly becoming a young man. The people with the “Harley” mailbox. Over the years I’ve learned to at least recognize most of my neighbors, but I’m embarrassed to say that I don’t know many of their names.

A reader of this blog (and a neighbor!) gave me a HUGE piece of assistance when he pointed out this website to me:

Who are your Neighbors?

Just click on the link (or the image above), enter your address, click the ‘Get Started’ button and your whole neighborhood (courtesy, I’m sure of Google Earth) appears with indicators over each neighbor’s house and their names/phone numbers. Now, I can figure out the missing names!!! YEAH!!!

How handy could this be?!?!

To ‘Unsubscribe’ or ‘Not Unsubscribe’, that is the question…

(With all due respect to Shakespeare and Hamlet)

We all get Spam. Its probably safe to say that we all get wayyyyyyyyyyy too much Spam. Spam, by definition, is e-mail that you do not choose or want to receive. It is junk.

On the other hand, there are newsletters and such that you really DO want to receive. So, how do you know when you can ‘make it go away’ and when you shouldn’t because it will just get you MORE junk in your inbox? When should you click ‘unsubscribe’? What are the ramifications if you do?

Normally, I don’t say ‘why’ I write particular posts…I just write them. Sometimes I am asked to write on a subject by a reader. Sometimes I get asked a question so many times that I figure it would make a good blog post. Sometimes an event in life causes me to write on a given subject…and so it is with this topic. Many of my ‘life’ blog posts have had their origins with my Uncle. This is another one of those posts!

Here’s the story…

December 31st of last year, I sent out a mail blast (using the free email service, MailChimp) to my entire email list. It wasn’t a newsletter, but rather a note that the name of my company was changing on January 1, 2012. Accordingly, rather than ‘SLC Consulting’, I wanted people to start using ‘Your Tech Tamer’ and to update their email addresses, etc. What better way to communicate important information to a wide-range of people? So far, so good. Off goes my e-mail. The next morning, I get an unsubscribe notice from, you guessed it, MY UNCLE!!!! What on earth?!?! Talk about dejected…if your own flesh-and-blood doesn’t want to read what you have to write, then why bother, right?

Fast-forward about five days. I’m visiting with him and he sheepishly tells me that he accidentally hit ‘unsubscribe’ when he was scrolling down the page and was there a way to ‘resubscribe’ because OBVIOUSLY, he didn’t want to unsubscribe from something that I had sent. Whew!!! He still loves me!!! While we laughed about the incident (and I showed him how to resubscribe), he was surprised to find out that I ALREADY KNEW that he had unsubscribed. How could that be?

So, to get to the ‘meat’ of this post, here are a few things to think about and know BEFORE you hit the ‘Unsubscribe’ button:

1. Only hit the ‘Unsubscribe’ button (or the ‘If you no longer wish to receive these emails…’ type of links) if the e-mail comes from a reputable e-mail blast service. ConstantContact, MailChimp, SendBlaster, iContact, etc. are all ‘reputable’ email services. You’ll know that an e-mail blast came from those services because you’ll see their ‘bug’ (logo) in the footer of the e-mails. The ‘bug’ identifies the e-mails as having been sent through these services. Clicking ‘Unsubscribe’ on an e-mail sent by one of these services will truly ‘unsubscribe’ you, and the owner of the e-mail list will NOT be able to resubscribe you…only you will be able to resubscribe yourself.

2. **BEWARE**: The owners of the email list (me, in the example above) RECEIVE A NOTIFICATION that someone has unsubscribed and their name/e-mail address. In other words, if you unsubscribe from your best friend’s list, he/she WILL KNOW!! If you really don’t want to receive that mail, it might be preferable to mark it as ‘spam’ or ‘junk’ in your email service…your friend won’t know if you do that, so there will be no hard feelings.

3. If the email does not show an email ‘blast’ service in the footer, but appears to come from a company that you know, then double-check the ‘from’ address (the sender’s email address) – not the name that displays, but rather the actual e-mail address from which the e-mail was sent. If you recognize it as being legitimate (e.g. emailmarketing@coke.com), then hitting ‘unsubscribe’ is probably safe to do. Here’s an example of a legitimate e-mail address from which it would be ‘safe’ to hit the ‘unsubscribe’ button:

4. If the email has a sender’s name that your recognize, but the actual ‘from’ e-mail address is ‘odd’, then DO NOT hit ‘unsubscribe’ or otherwise ask to be removed from the e-mail list. If you hit this link, you will likely get EVEN MORE unwanted emails because you have only verified to spammers that your e-mail address is a ‘live’ one!

Bottom line: The rules are pretty simple.

If the e-mail comes from a legitimate e-mail blast service, it’s safe to unsubscribe, but the owner of the list will know that you unsubscribed, so decide if it’s better to send the e-mail to the junk bin, rather than unsubscribing and potentially hurting someone’s feelings.

If the e-mail comes from an apparently legitimate e-mail address, make sure by checking the exact address. Only hit ‘unsubscribe’ from e-mail addresses that are ‘real’. Otherwise, you may be bringing a deluge of further unwanted mail by clicking ‘remove’ or ‘unsubscribe’. Again, block the sender via the Junk Mail or Spam feature in your mail service, rather than unsubscribing.

Friendly word of advice: NEVER EVER unsubscribe from close family or friends e-mails :-)! It is far better to keep the peace!

Do you ever want to delay the delivery of an e-mail?

There are a fair number of times when I compose an e-mail, but it’s not the correct time to send it. Perhaps I don’t want someone to know that I was working on something over the weekend. Maybe I have a report to e-mail on Monday morning, but I’m not going to be in my office at that time. Whatever the case, there are times when I want an e-mail to be sent LATER…and I don’t want to have to try to remember to send it.

Outlook 2010 has a FABULOUS and easy way to allow you to send mail later – even if you’re not at your desk.

Compose your e-mail as you normally would:

Before hitting the ‘Send’ button, click on the ‘Options’ tab at the top of the screen. Now, select the ‘Delay Delivery’ button on the toolbar:

Set the date/time you want the e-mail sent:

Close this window. Finally, click ‘Send’ (just like you normally would).

Your email will go to your ‘Outbox’, but will not leave the Outbox until the specified date/time:

The email will be sent at the date/time you specified in the delay. Most of you will probably see the current date in the ‘Sent’ field. This is the date/time you pressed the ‘Send’ button and exiled your email to the Outbox. If you want to see what that date/time your e-mail is scheduled to go out, we need to add a field to the columns shown. Simply right-click on the bar with the column titles:

Select ‘Field Chooser’ from the list.

Select ‘All Mail Fields’ from the drop-down, then highlight ‘Defer Until’

Left-click and drag the ‘Defer Until’ field onto the column headings bar:

Voila! You see the date/time your email is scheduled to be sent.

Word of warning: If your email is NOT on an Exchange Server (and if you don’t know what that means, you’re probably not!), then you need to make sure that your Outlook is open and an internet connection exists at the date/time the email is to be sent. If Outlook is closed and/or there is no internet connection at the specified ‘send’ time, then the e-mail will be sent the next time that Outlook is open after that date/time.