|AÉÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍ»ÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÉÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍ» |Aº ^0First Things First |AºÍÍÍÍÍÍÍÍÍÍÍÍÍ ^1Diskovery |AÍÍÍÍÍÍÍÍÍÍÍͺ ^0First Things First |Aº |AÈÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍͼÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÈÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍͼ ^Cby ^CBob Napp ^1What price security?^0 Although I would like to believe we don't need to concern ourselves about a subject like this, daily I am reminded that this is not true. I'm old enough to remember the time when it was common to walk off and leave your car or your house unlocked, but today, it's a different story. Privacy is a thing of the past! How do you protect yourself? Well, for starters, you take the typical precautions of locking your car and home! I've become so used to doing this that I feel uncomfortable if I don't. That takes care of most of the material things, what else . . . ? Success or failure, in today's society, is based upon who gets what information and when they get it. Corporate mergers, bank transfers, and even credit card accounts can all be affected by accessibility to this type of knowledge. What do all these activities have in common? At one time or another critical information about each was stored in a computer. Now wait a minute! Computers are our friends . . . right? Actually, that is the problem. They are your friend, my friend, and a friend to anybody else that happens along. The point is that an unattended computer represents an open door to anyone with the ability and the desire to seek the information contained within. This information can be anything from your personal credit card numbers to a memo you write that is critical of your co-workers. Let this stuff get in the wrong hands and there will be heck to pay! It is not my intention to scare you, but to remind you that not everything you hold dear is material. You don't tell everything ^1you^0 know, why should your computer? Take every opportunity to keep your thoughts, credit card numbers, home inventory, and anything else you may have stored in your computer secure. The question isn't what price security, but what is the cost without! ^1News From Big Blue Disk^0 Many of you will notice that we are not using our menu on disk #2 of this issue of Big Blue Disk. Let me assure you that it was intentional and will not be a common occurrence. We had an opportunity to publish a piece of software we felt would hold a fairly wide appeal. The only problem with this program is that it is so large we are unable to include our menu system on the disk with it. We hope that you enjoy Moraff's Revenge and will understand that our desire to bring you the best in software will sometimes require us to do things we would rather not! I want to thank everyone for sending in the Report Cards. You have provided us with many helpful suggestions. I would like to strongly recommend that you do not include requests for the Video Utilities Disk or replacements for defective disks on a Report Card. Because of the manner in which we process this information, it may be several weeks before we are able to fill your request. Instead, if you will address those requests to me or our Circulation Department we will be able to fill them much more quickly!