2 PC Annoyances and How To Solve Them!

I have a love-hate relationship with my computer.

In fact, often I love to hate my computer!

It will do things I know even the great Mr. Gates didn't intend, and it usually does them at the least convenient time (like when I'm on a deadline or in a hurry).

Rather than the usual whining and doing nothing about it, I've decided to share a couple of things that previously annoyed the heck out of me and the solutions I found to help you avoid these same problems.

*Disappearing Internet Explorer Status Bar*

The status bar at the bottom of the Internet Explorer web browser serves many purposes.

It allows you to hold your mouse over a link to see where the link will take you.

It enables you to see a page's loading progress as you wait for it to download.

Most importantly, the status bar allows you to see the little gold "lock" symbol that lets you know you've made a connection to a secure server (very important to know before you input credit card data).

For some inexplicable reason, from time to time, this status bar disappears from my browser.

Also, the toolbars at the top tend to move periodically and mess up my "system" for surfing the Internet.

Now, it's not the end of the world, but it really ticks me off when things change and I didn't change them! If this ever happens to you, here's how to literally "lock" the toolbars and status bar in place so they don't disappear or move again.

First, close all your Internet Explorer web browser windows except for one. If the status bar doesn't already appear in the window, go to "View" and then click "status bar."

Also, make sure you have all the toolbars arranged the way you want them.

Next, place your mouse over a blank spot on one of the tool bars at the top of the Internet Explorer browser window.

Right-mouse-click and a menu will appear where you should check the option "Lock the Toolbars."

Then, while holding down the key, click the "X" in the upper right corner of the window to close it. This will set your selection.

If you ever need to change your toolbars in the future, simply right-mouse-click on the toolbar and uncheck the "Lock the Toolbars" option, make the changes, and then re- lock the toolbars to keep them from moving or disappearing.

*Missing File Extensions*

One of the biggest pains in the neck involves opening Windows Explorer, viewing a list of files, and not being able to see the file extension (.doc, .txt, .html, etc.) for each file.

For some reason, Windows considers this classified information!

To make the file extensions show up, click "Start" then "Control Panel." Double-click "Folder Options" then click the "View" tab. Scroll down the list and uncheck the box that says "Hide extensions for known file types."

You will now see the file extensions any time you open up Windows Explorer.

(c) Jim Edwards - All Rights reserved
http://www.thenetreporter.com

Jim Edwards, a.k.a. TheNetReporter.com, is a syndicated newspaper columnist, nationally recognized speaker, author, and web developer. Owner of nine (9) successful e-businesses as well as a professional consulting firm, Jim's writing comes straight off the front lines of the Internet and e-commerce.

Simple "Traffic Machine" brings Thousands of NEW visitors to your website for weeks, even months... without spending a dime on advertising! ==> http://www.thenetreporter.com

cleaning help near Mundelein ..
In The News:

Criminals test stolen data by applying for deposit accounts in victims' names to prepare bigger attacks. Learn why banks won't share fraud details.
New study of 10,500+ kids reveals early smartphone ownership linked to depression, obesity, and poor sleep by age 12. Earlier phones mean higher risks.
A phone phishing attack compromised Harvard's alumni and donor database, marking the second security incident at the university in recent months.
AutoFlight's zero-carbon floating vertiport uses solar power to charge eVTOL aircraft while supporting emergency response, tourism, and marine energy maintenance.
A new phone return scam targets recent buyers with fake carrier calls. Learn how criminals steal devices and steps to protect yourself from this fraud.
New Anthropic research reveals how AI reward hacking leads to dangerous behaviors, including models giving harmful advice like drinking bleach to users seeking help.
The Fox News AI Newsletter gives readers the latest AI technology advancements, covering the challenges and opportunities AI presents.
Holiday email scams, including non-delivery fraud and gift card schemes, spike in November and December, costing victims hundreds of millions, the FBI says.
Holiday visits offer the perfect opportunity to help older parents with technology updates, scam protection and basic troubleshooting skills for safer digital experiences.
Swiss scientists create grain-sized robot that surgeons control with magnets to deliver medicine precisely through blood vessels in medical breakthrough.
Researchers exploited WhatsApp's API vulnerability to scrape 3.5 billion phone numbers. Learn how this massive data breach happened and protect yourself.
Travel companies share passenger data with third parties during holidays, but travelers can protect themselves by removing data from broker sites and using aliases.
Xpeng's humanoid robot moves so realistically that crowds believed it was fake, marking a major advancement in robotics technology ahead of 2026 commercial launch.
Researchers discover phishing scam using invisible characters to evade email security, with protection tips including password managers and two-factor authentication.
iPhone and Android users can reduce battery drain and data usage by restricting Background App Refresh to Wi-Fi connections instead of mobile networks.
Scammers nearly stole an Apple account by exploiting the support system with authentic-looking tickets and phone calls, users can protect themselves with safety steps.
FoloToy restored sales of its AI teddy bear Kumma after a weeklong suspension following safety group findings of risky and inappropriate responses to children.
Threat intelligence firm Synthient uncovers one of the largest password exposures ever, prompting immediate security recommendations.
Viral video shared by Elon Musk shows Tesla's Optimus humanoid robots performing tasks from cooking to construction, garnering over 58.5 million views on social media.
Chinese hackers used Anthropic's Claude AI to launch autonomous cyberattacks on 30 organizations worldwide, marking a major shift in cybersecurity threats.
Apple's new Sleep Score feature gives you a rating for your nightly rest quality. Learn how to set it up on your Apple Watch and iPhone today.
Essential phone settings to enable before losing your device, including Find My network, location services and security features for iPhone and Android.
The Fox News AI Newsletter gives readers the latest AI technology advancements, covering the challenges and opportunities AI presents.
Cybersecurity research shows weak passwords remain a major threat, with simple patterns and number sequences putting millions of accounts at risk.
New Android malware BankBot YNRK silences phones, steals banking data and drains crypto wallets automatically. Learn how this advanced threat works.

Email Management

If you utilize a computer at home or work it... Read More

Reliable File and Folder Sharing in Windows Xp

This tip is on sharing files and folders on a... Read More

FTP - File Transfer Protocol Explained

File Transfer Protocol (FTP) is a protocol that is part... Read More

Cisco CCNA Candidate FAQ

CCNA FAQQ. What exams do I have to take to... Read More

Make Windows XP Run Faster!

A friend told me: "My computer startup seems to be... Read More

Consumer Electronic Information: The Basics of the DLP Projector

Projectors have come a long way in the past few... Read More

Looking For an MP3 Player?

If you don't have an mp3 player, and even if... Read More

Temporary Fixes to Spyware, Ad-ware, and Virus Infections

So you've got some spyware, ad-ware, or viruses on your... Read More

The Advantages of Portable MP3 Players

With their solid-state technology, compact size, and abundant memory, portable... Read More

Tips For Finding Great Deals On Computer Accessories & Supplies

Tip #1. Do a Google search. Don't be to general... Read More

How to Place Home Theater Speakers

You have your television and home theater receiver; you just... Read More

Are You Putting Off Productivity?

I recently took a good look at what was keeping... Read More

EDTV vs HDTV

Confused by EDTV vs HDTV? We don't blame you. The... Read More

Flash Memory, Part I: MMC and SD

MMC and SDFlash memory is available in so many formats... Read More

COOKIES - What Are They!!

Cookies, not the kind that Mom makes, but the computer... Read More

PDA Bible Free Download

Your Bible At Your FingertipsIt is fairly easy to find... Read More

Improve PC Performance - 6 Tips You Must Know

Are you frustrated with your PC?Is it feeling sluggish or... Read More

Passwords and the Human Factor

Passwords have a strange dual nature. The stronger and safer... Read More

Microsoft Great Plains Dexterity Customizations

Microsoft Business Solutions is on the way to popularize it's... Read More

Selecting a Personal Digital Assistant

A Computer in Your HandCarrying around an address book and... Read More

The Benefits of the New Firefox Browser

You probably heard of the new Firefox browser version 1.0... Read More

HTML Explained: Part 1

Want to save money while promoting your web-based business? Of... Read More

Help, I Need a New HDTV! (Part 3 of 5)

Feeling overwhelmed in selecting a new TV? With all the... Read More

MCSE 70-290 Certification Primer

Microsoft Certifications are one of the most widely acclaimed, pursued,... Read More

Image Conversion In Computers

JPEG, GIFF/JIFF, BMP, and TIFF are the most commonly used... Read More

reliable maid service Wilmette ..