Free Monthly Newsletter...and much more!

5 Star Support - Free Computer Help and Technical Support


5 Star Support Home
Computer Help Forums
Computer Tutorials
Tips, Tricks & Tweaks
Troubleshooting FAQ

December 2003 Issue


Below, find our archived issue of the 5 Star Support Monthly Newsletter.


Donate a small amount to 5 Star Support and help  ensure our Internet survival.
Donate to 5 Star Support



August 2000 September 2000 October 2000 November 2000 December 2000 January 2001
February 2001 March 2001 April 2001 May 2001 June 2001 August 2001
September 2001 October 2001 November 2001 December 2001 January 2002 February 2002
March 2002 July 2002 August 2002 September 2002 December 2002 February 2003
April 2003 June 2003 December 2003 January 2004 March 2004 April 2005
May 2005 July 2005        

5 Star Support Monthly Newsletter

December 2003 Issue

Inside this issue:

1) Notes from the Editor
2) Tablet PC software gives kids boost in learning computer basics 
3) Helpful Web Sites
4) Tips and Tricks
5) Is Someone Stealing Your Source Code?
6) Identity Theft
7) Problems and Solutions
8) Contact Information/Unsubscribe

[1] Notes from the Editor:
by Vince Underwood

Welcome to all new 5 Star Support subscribers and welcome back to all loyal 5 Star Supporters!

It is nice to finally be back at the helm of this computer system bringing you all a new issue! I have taken a long needed vacation from the web site to spend the time with my family. I have down-sized the operation greatly due to monetary constraints. The money that it was costing to keep the forum and the live support software online was eating up my back account as the donations have become almost non-existant. That is fine though, the way 5 Star Support is right now, I can afford to keep it on the web without any donations.

I couldn't see closing the site altogether because it has become such an important vehicle for computer learning to so many people. So, after nearly 4 years into this operation, we're still afloat. Thank you to everyone who has contributed to 5 Star Support!

As always, I need to introduce to you all the heat beat of the operation here: The volunteer technicians! These are some of the nicest people I have ever had the pleasure of coming in contact with. So, take a moment to view their profiles here:

Well, I have a lot of work to do here so I had better quit rambling on! I hope that you all will find this issue of the 5 Star Support newsletter both informative and helpful! 

Kindest regards,

Vince Underwood
President, 5 Star Support


[2] Industry News:

Tablet PC software gives kids a boost in learning computer basics 
Posted by: on Wednesday, December 03, 2003 - 10:16 AM

Each year, many of our children fall further behind in learning the basic skills that will allow them to compete in the increasingly global and technological economy. Introducing children to technology at a younger age is one important step toward helping them succeed in school and in life. New consumer technologies have emerged that promise to make the power of computers more accessible to young children. The “Tablet PC” platform is now widely available and comes in many affordable forms. Tablets allow children to write directly on the screen using a familiar, pencil like writing tool. This allows learning to take place more quickly and effectively.

A company called believes that the Tablet PC, coupled with powerful educational software, is the key to increasing the speed and quality of children’s education. To that end, today announced the general availability of VT Coloring Book 1.0, an innovative educational application for the new Tablet PC platform. VT Coloring Book 1.0 is a teaching tool for preschool and elementary aged children. It helps them to learn the skills they will need to successfully use a Tablet PC in an e-enabled learning environment, while entertaining them with familiar cartoon images and challenging them to complete the coloring pages. Children will spend hours coloring a variety of cartoon pages on their Tablet PCs. They can also save and print the images for gift giving and crafts. Parents will also like the fact that they can add an almost infinite number of cartoon coloring pages to the VT Coloring Book collection for free.

Walt Smith, the creator of VT Coloring Book, says that, "VT Coloring Book is the first step toward making the Tablet PC an integral part of your child's learning experience. It opens the door to a world of learning opportunities that are made possible by the intuitive writing and drawing platform within the Tablet PC. The Tablet PC market is expected to grow rapidly in the coming years, and we believe that the Tablet PC represents the best prospect for major innovation in automated learning aids. Vectiva is out to prove that a Tablet PC equipped with the right software can significantly increase the speed and effectiveness of learning for young children, especially those with challenges related to attention deficits.”

VT Coloring Book 1.0 builds on the success of the Tablet Fun Paint application that Vectiva launched earlier this year. It is the next logical step in a series of planned software applications from Vectiva that will place the Tablet PC at the forefront of e-enabled learning. VT Coloring Book 1.0 is available for free download from the Vectiva web site at Vectiva is a privately held company that builds educational and business software for the Tablet PC.


[4] Tips and Tricks:
by Vince Underwood

<> Windows XP: Disable Windows Messenger:

If you would like to disable Windows messenger, here's how: 
Select "Start" 
Choose "Control Panel" 
Choose "Administrative Tools" 
Note: In Windows XP Home edition, Administrative Tools is in Performance and Maintenance

Choose "Services" 
Right-click on "Messenger" 
Select "Stop" 
To permanently disable Messenger:

Right click "Messenger" 
Select "Properties" 
Change "Startup Type" to "Disabled" and click "OK" 


<> Windows XP: Rename IE's Title Bar

If you would like to see a new name for Internet Explorer in its title bar, here's how: 
Go to: Start >> Run 
Type in: REGEDIT 
Navigate to: HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main 
Single click on "Main" to view its contents in the right pane. Scroll down and check to see if an entry "Window Title" exists. If it does not exist, then go up to Edit >> New>> String Value. 
Right click on your new String Value entry and select "Modify" in the resulting menu. 
In the "Value data" text box, type in whatever you would like the title bar to read, select OK when done. I have mine named "5 Star Support Explorer". 
If you have done this correctly, the next time you open up Internet Explorer, you should see your new name at the title bar.

Note: Be sure to back up your registry prior to making any changes.


<> Windows 98: Reposition Your Taskbar

Click a blank area of the Taskbar and hold the click. Move your mouse pointer to the top, left, right or bottom of your screen and let go of the click. Your Taskbar will snap right into place.


<> All Windows Flavors: Missing DLL Files

If you are missing DLL files that are necessary to run certain programs, it is possible that 5 Star Support has that needed file. Currently, there are over 300 files for free download. Please visit:


<> Term Definitions:

This is one of the most comprehensive computer glossary's on the net. If you can't find a certain word or term, then just type it into the supplied text box and submit it to me. I'll then get that added in short order!


[5] Is Someone Stealing Your Source Code?

That's a question that worries many people on the Internet. And some people go to great lengths to hide their source code.

There are several reasons you might want to conceal the source code of your web pages:

*if you have web pages that rank highly in the search engines, you don't want people to see your meta tags
*you don't want people copying your web page design or java scripts
*you want to protect your website from email harvesters and other spam utilities

But can you hide your source code?

The short answer is no - to display a web page, the browser has to be able to read the source, and if the browser can read it, so can your visitors.

But there are ways to make it more difficult for your visitors to read your source code. Here are some of them:

(1) Adding dozens of carriage returns at the top of your HTML page

This one has fooled me a couple of times. All you see is a lot of blank space - but just keep scrolling down and you'll find the source code.

(2) Using frames

When you try to view the source code of a page using this technique, all you see is the first ten or fifteen lines of HTML. But just save the page to a folder on your hard disk and then look for a sub-folder where the images in that page were saved to.

In the sub-folder you'll find an HTML file that contains the source code you were looking for. Again, this won't fool experienced users, but it's worth a shot. Here is the code:

(3) Disabling Right Click

This is an old trick and experienced surfers know how to get around it. Here it is anyway - a script that disables Right Click:

(4) Disabling View Source

I searched high and low for a script that disables 'View Source' in the browser menu bar, and couldn't find one.

Here is a script that is supposed to disable 'View Source' - I tried it out in my browser (IE 6.0) and it didn't work, so perhaps it only works in older versions of IE:

(5) Encryption plus frames

This is a technique that will work on all but the most experienced web surfers. Here is the code for doing it:

I've created a copy of my index page using the above technique - if you click on View Source, all you see is a jumble of characters:

Well, that's it! All you need to know about hiding your source code.


[6] Identity Theft: 

What Are Identity Theft and Identity Fraud? 

The short answer is that identity theft is a crime. Identity theft and identity fraud are terms used to refer to all types of crime in which someone wrongfully obtains and uses another person's personal data in some way that involves fraud or deception, typically for economic gain. These Web pages are intended to explain why you need to take precautions to protect yourself from identity theft. 
Unlike your fingerprints, which are unique to you and cannot be given to someone else for their use, your personal data ­ especially your Social Security number, your bank account or credit card number, your telephone calling card number, and other valuable identifying data ­ can be used, if they fall into the wrong hands, to personally profit at your expense. In the United States and Canada, for example, many people have reported that unauthorized persons have taken funds out of their bank or financial accounts, or, in the worst cases, taken over their identities altogether, running up vast debts and committing crimes while using the victims's names. In many cases, a victim's losses may include not only out-of-pocket financial losses, but substantial additional financial costs associated with trying to restore his reputation in the community and correcting erroneous information for which the criminal is responsible. 

In one notorious case of identity theft, the criminal, a convicted felon, not only incurred more than $100,000 of credit card debt, obtained a federal home loan, and bought homes, motorcycles, and handguns in the victim's name, but called his victim to taunt him -- saying that he could continue to pose as the victim for as long as he wanted because identity theft was not a federal crime at that time -- before filing for bankruptcy, also in the victim's name. While the victim and his wife spent more than four years and more than $15,000 of their own money to restore their credit and reputation, the criminal served a brief sentence for making a false statement to procure a firearm, but made no restitution to his victim for any of the harm he had caused. This case, and others like it, prompted Congress in 1998 to create a new federal offense of identity theft. 

...for more in formation such as:

What Are The Most Common Ways To Commit Identity Theft Or Fraud?
What's The Department Of Justice Doing About Identity Theft And Fraud?
What Can I Do About Identity Theft And Fraud?
What Should I Do To Avoid Becoming A Victim Of Identity Theft?
What Should I Do If I've Become A Victim Of Identity Theft?
Where Can I Find Out More About Identity Theft And Fraud?

Visit here:


[7] Problems and Solutions:
generated from 5 Star Support


5 Star Support Q#W2-12454 System Locks Up: 
I had a problem with an online game locking up my system.


There was a hidden file in one of the windows files not letting me uninstall the game. I deleted the file uninstalled the game and reinstalled game, patched and I am able to play the game now.


This is a great service! The techs that assisted me were very prompt with a response and their instructions were very clear. I will recommend this site to friends and family or anyone that is in need of help but just cant find the support they need. Thanks guys keep up the good work! =)



Q#W3-12469 Poor Performance:
i have a dvd rom (hitachi gd7500) and a cd writer.
before i install the cd writer(new msi 24x10x40 cdrw) ,the dvd rom worked great but when i installed the cd writer i got poor performance from both of them.i cant install a game without having an error!
what could be wrong?


I assume you installed the CDRW yourself? On most PC's devices like
harddisks, tapestreamers, DVD-ROM players, Zipdrives, CD-ROM players, CDRW'ers, etc. get installed by attaching them to a (E)IDE-cable. The IDE-cable is the long gray ribbon in your machine. On every PC there are two slots on the motherboard where you can connect a IDE-cable to, these slots are also known as IDE-slots and are usually marked on the motherboard as "slot-0" and "slot-1" or "IDE-0" and "IDE-1" or something similar.

On every IDE cable you can attach no more than 2 devices which means you can attach 4 devices in total. If you attach the cable to your motherboard you will see that there are 2 connectors left. You have to tell you computer the order in which you have attached the devices. The first device on the cable (when going up from the motherboard) is known as the "Master" and the second is called the "Slave". The computer needs to know which device is the master and which device is the slave. You will have to set this up yourself. If you make errors here the computer can't communicate properly with the devices.

First of all you have to examine the backsides of both the DVD-ROM player and the CDRW you will find a jumper here which will allow you to set the drive to be either master or slave. Remember that the first device on the cable has to be set to master and the other to slave. And don't forget to power down you computer before attempting to do this.

If you have three IDE devices in your computer I would set them in this way:

master: harddrive - slave: none

master: DVD-ROM - slave: CDRW
After that you will have to check your computer's BIOS to see if it detects
the the drives properly. If it doesn't you might have to make the necessary
adjustments in the BIOS yourself.

After that reboot your computer and log into Windows XP to see if your
problem is solved. If its solved please let me know, okay?

One more thing I would like to tell you. Next to master and slave there is a
third option known as "Cable Select". On most modern devices this option is available. With this option set it doesn't matter where you put the device on
the cable, the computer will find out where the devices are located and will
make the adjustments to the BIOS automatically. However, cable select isn't a water-proof solution and on some machines it will screw up badly. This is why I would like to advise you to stick to the master/slave scheme.



For a Compaq Presario 4546 running WIN 95, would freeze after the BIOs check and before loading Windows. Problem stated after the user remove the floppy after closing a word document or closing Word. 


Ok you will need to boot into the bios and tell it not look for floppy. By default the settings on most bios is to stop on anything not found its looking for. The floppy is definitely one of them. To get into your bios for most boards you would hit the DEL button while the bios is booting up it not then it’s the F10 button. Go into advanced options and tell it not to look for a floppy or at least not to halt on that search.


The service is excellent. However, to improve this service. When replying this form, should have the original problem already filled in.

**Response from the editor: Sorry, this web site is not on a database, so it would be impossible to automatically insert this information into the solution center form. All of the mail is routed the old fashion hand.



Q#W3-12872 Unauthorized Data Exchange:
After I start IE, the modem indicator shows constant activity. This is verified by pulling up the status page for the modem which shows a steady stream of data going both ways. This continues even after I shut down all running programs but leave the connection active. The only way to stop it is disconnecting. 


Symantec/Norton A/V found the Welchia Worm after several tries, but was unable to fix it. There was a link to info on how to disable it manually, which I did. After disabling the worm, Norton was able to update and run normally and all seems to be well.



Outlook Express sent items list doesn't load, ~_file appearing on desktop


remove Outlook Express Update Q330994 or, alternatively, chose another location for the ~ file (I chose the former)


I am really grateful for your immediate help. Why doesn't Microsoft give a similar service to their clients ???


[8] Contact Information:

This Newsletter is brought to you by 5 Star Support - Free Technical Support.

If you find this newsletter helpful, please help support it by making a small one time donation.

Thank you!

If you have any questions regarding this Newsletter, please contact:

If you would like to become a 5 Star Support Newsletter volunteer, 
please contact:

I would love to hear from you!

I hope that you found my newsletter interesting and informative!

To Unsubscribe, write to and simply type "Remove" into the subject line. But, I hope that you'll be sticking around.


Newsletter Staff


   Site Map  | About 5 Star Support  | Links | Comments
    Privacy Policy  | Terms of Use  | Newsletter Archive  | Awards
Usage of this site constitutes acceptance of our Terms of Use
Copyright © 2000-2014  5 Star Support All rights reserved.