Wednesday, June 29, 2005

Hooked on CROCS

Originally designed to be a boat shoe, Crocs are the latest must have shoe.


Ever had a pair of really comfy, ratty ole' slippers that you just couldn't give up? Remember that feeling as you slipped your foot into that nicely aged, buttery soft shoe? Did you wonder if you'd ever find another pair of shoes that would be soooo soft and comfortable again?

Well, torture your feet no more. The latest and greatest footwear phenomenon has arrived. They're called CROCS. And while their makers claim they have ergonomic Italian styling, they're really, really fugly. That is, they're funky and ugly looking. They're so ugly, they could be a fashion statement... But you'll get over it once you slip them on you feet.

Originally designed as a light, waterproof, slip resistant boat shoe, Crocs are cool, super comfortable and weigh almost nothing. They're made of a foam-like material that is anti-microbial and odor resistant. If they get dirty, you can wash them with a little bleach and water, and you can even use some Armor All(tm) protectant to shine 'em up.

They're great for people who are on their feet all day, like chefs, nurses, or boaters, because the shoe softens and molds to your feet for a really custom fit. They make you feel like you're walking on marshmallows.

You can buy them online through their website Crocs.com, and other online stores like Amazon.com, or buy them at your local shoe store. The original Crocs Beach model is full of ventilation holes, and they've spawned several other variations like the Cayman and Metro since then.

More walk, Less talk.

These CROCS are made for walking, and that's what I'm gonna do. There's almost a cult-like following for these things, and after trying on a pair, I must admit that I'm pretty smitten with them as well. I'm actually starting to think that they even look okay. I'm tempted to get a pair just for the house and wear them like slippers, and another pair for going to the pool, beach or just hanging around.

They come in all kinds of wacky colors, and I'm thinking it would be pretty amusing to wear a different color on each foot. Well maybe not. Depends on how nutty I'm feeling. But these things are really, really comfortable. You should give them a try. Just close your eyes until you've got your feet in 'em.

Happy Croc-ing :)

Tuesday, June 28, 2005

Mmmmmm, tasty food for less...

If you're up for trying out new restaurants or like getting a bargain at your favorite eating hangout, then you should try out Restaurant.com. They sell gift certificates for various restaurants in your area at up to 60% off the face value. You buy them online and then print them out on your computer right away. No fuss, no muss, no waiting.

I just purchased a $25 gift certificate from Restaurant.com for a local Italian restaurant. The cost for the $25 certificate would have been $10, but I had a 60% off coupon code, so I only paid $4. for it (I used code 51325 but that expires June 30,2005; check Fatwallet.com forums for newer coupon codes).

There are several restrictions so read the fine print. Typically, you can only use one gift certificate per visit, there has to be at least two people eating, and you have to spend a minimun of $35. But even if your total bill came to $40 before taxes (make sure you tip on the total), you would have only spent $19 ($40 - 25 = $15, plus the $4 for the gift certificate). Not too shabby.

You could also use those coupon books that are available like the Entertainment book, but you have to buy those and, unless you eat out a lot, you may not get your money's worth. But those coupon books can be a good deal if you buy them near the end of the year, where typically you'll pay about $10 for a book. Right now they're free if you buy next year's book which is not too bad if you split it with a friend.

So, don't forget to use a coupon to buy a Restaurant.com Gift Certificate, and enjoy good eats, cheap ;)

Sunday, June 26, 2005

Find books fast. Find books cheap. Save Money :)

A Book Search and Price Comparison Website

Many of you already use Google to search for stuff, right? Well there's something like that for finding books on sale and finding out the who's got the cheapest price for books. It's a book search and price comparison website called AddALL.com

Like the magazine search engine I mentioned in an earlier blog (here), AddAll.com lets you search for any book from across a whole bunch of websites to help you find the best and lowest price. It's not the most comprehensive search engine out there, but it's still a pretty good place to start.

While it does search books listed on Half.com, it may not always find the most current listings. I always do a search on Half.com and Amazon.com in addition to searching with AddALL.com when you're looking to buy a book.

No need paying more for something when you can get it for less. More stuff, less money.

Happy reading :)

Thursday, June 23, 2005

Be frugal like Paul :) Part V - Books, CDs & DVDs

Cheap Books, Textbooks, Videogames, CDs and DVDs for Frugal People.

Looking to buy books for your kids' summer reading lists? Do you love to read books? Do you like owning your own copy of DVD's? Would you rather have your own copy of a music CD instead of just a downloaded file?

Well there's a place where you can get gently used books, videogames, CD's and DVD/videos for typically less than half the retail price (new items are now also available).

Half.com

Before I plunk down my hard earned cash-ola on a new item, I always first check for cheap books, CD's (yes, I sometimes still buy a CD) videogames and movies on a website called Half.com. As its name implies, Half.com was started as a website where people could buy used books, CD's and movies for at least 50% off the retail price from another individual.

It's a marketplace where buyers and sellers come together in a way similar to eBay, but with one big difference - Half.com acts as an intermediary between the buyer and seller.

That intermediary role is a major selling point for buyers that are weary of purchasing something from someone they don't know if they can trust. By acting as a go-between, Half.com protects the buyer from unscrupulous sellers who may try to cheat the buyer.

It works like this:

  • People with something to sell lists the item on Half.com and specify the condition of the item and a price they are asking.


  • The item remains on the website until it sells.


  • There is no auction, bidding or waiting. The price is firm, and the buyer decides if they want to buy the item in the stated condition.


  • Shipping is set by Half.com and added to your order.


  • The buyer pays Half.com who in turn instructs the seller to send the item to the buyer.


  • Once the buyer receives the item, Half.com pays the seller the purchase price minus a commission.



Everybody wins. The seller is able to get rid of their item, and a frugal buyer gets to buy their item at a discounted price.

The website has since been bought by eBay, but it still runs as a separate business. Sellers are now allowed to sell items for more than half of the retail price, and new items can be bought in addition to used items. They've also increased the product selection to include electronics and toys.

But the sweet spot is still for books, CD's, DVD's and video games. These items are typically in great supply, and are typically fine when purchased as a used item. I'm leery of purchasing other items on Half.com since there is a much greater possibility for variation in the quality of the item if it's something other than books and CD's.

A Caveat. There are still scumbags out there who try to cheat users. Always look at their feedback ratings which help you see if the seller has many unsatisfied customers. Keep in mind that their rating is no guarantee of reliability. Watch out for counterfeit or bootleg copies of movies.

I purchased a DVD from a seller who swore that he only sold originals and not fake copies - wrong. I received an obviously poor quality fake DVD. Fortunately, I notified Half.com that I was not happy with my order, and my money was promptly refunded.

With books, getting a gently used copy and paying $2 + shipping (roughly $2.80) for a hardcover is a great deal. When I'm done reading it, I can sell it for about the same price on Half.com or just keep it.

So remember, before you buy a book, CD, videogame or DVD, check out Half.com. You could end up with a much better deal and have some extra change in your pocket as well.

Happy reading :)

Sunday, June 19, 2005

Aaaaggh! I'm being buried in Pictures!

By now, just about everyone and their mother has a digital camera or camera phone. And even if you don't, you still take pictures with that old camera on that brown plastic stuff, what do they call it, film?

Well, it takes no fancy brainwork to realize that, with each passing day, more and more pictures are being taken and there's fewer and fewer places where you can stash 'em. Digital cameras, with their incredible ease of taking pictures on a cheap memory card, fill up quicker than you can shake a stick and poke me in the eye.

But what makes it soooo versatile, is that I can take virually unlimited pictures with my digital camera, then just download and empty out that memory card onto my computer, which, by the way can hold a gazillion pictures of my kids, their friends, their pet sea monkeys and whatever happens to cross my camera lens.

I've got the freedom to take unlimited crappy pictures, 'cause I don't care, it's free! All I gotta do is download them to my computer, and voila! More room for more pictures. Yay!

Well golly day, before you know it, you're running out of storage space on your computer hard drive. Not only that, but what if your computer hard drive were to crash and you lose all those pictures? So what to do? Where are you going to put all those pictures?

All those pictures and no where to go.

So put 'em on the web. Not only can you stick them on a website and share the pictures with the rest of the world (or not), there are websites out there where you can just easily store all of your precious pictures. There are so many competing websites out there that want your pictures and business, many of them virtually free.

What business? Well, after taking your pictures, you'll want to share them with your family and friends. No more sending out your pictures and clogging up everyone's email accounts with megapixels of photos. Just send everyone an email with a link to your pictures, and they can check out your pictures themselves. They can even order prints online. But not just prints. They can order pictures on a Postage Stamp, mug, cards, calendars, t-shirts, and tons of other gifts with your pictures on them. That's a billion dollar business out there.

Snapfish to the Rescue!

While I've had limited experience with other websites like Ofoto (now Kodak Gallery), Shutterfly, and the like, I've had a lot of good experience with Snapfish.com. Not only do they store your digital pictures, they also develop your good 'ole film camera pictures too.

Snapfish is for lovers of 35mm film cameras too.

Just go online, and Snapfish will send you free postage-paid envelopes. Drop your film in the envelope and give it to the mailman. In a few days, not only will your prints and negatives be mailed to you, Snapfish will scan your pictures and make them available for you to view online. Then you can share them with whomever you wish.

You can even get your first roll developed for FREE, or if you don't have film to develop and only want to upload your pictures, you can get 20 FREE prints with your first order by clicking on this link: Snapfish

Share your Photos

It's really easy to share your photos with your friends and families. After copying your pictures from your digital camera to your computer, you just upload your pictures to Snapfish.com. You create virtual albums of photos and then send out emails from Snapfish to all the people that you want to share your photos with.

Once they receive your invitation, your friends sign up for a free account with Snapfish (this ensures only those people you have invited can view your private photos) and then view your pictures. You or anyone you invite can then order prints of any picture for only 12 cents a print (plus postage). That's much cheaper than printing them yourself with a color printer.

The one other bonus of uploading your pictures to a website like Snapfish, is that if for some reason you lose all your pictures, you'll always be able to get a copy of the pictures from the website you uploaded them to. It's like a backup storage facility for your pictures.

With Snapfish, all of this storage is virtually free. All that they ask is that you purchase at least ONE item each year to keep your account active. That one item can be a single print. That's pretty cheap insurance against losing your pictures.

The only caveat to keep in mind is that if you want to get the original high resolution file of your pictures back, you'll have to pay for them. There are three options: 1) you can pay about $20 for a CD with 200 pictures plus $10 for each additional 150 pictures, 2) you can pay 29 cents per picture file, or 3) just get prints for 10 cents each. That's not so bad if this is your last resort for getting your picture files back after losing them elsewhere. If you really just want an online storage facility for your digital prints, there is another option from a website called Flickr that charges $25 per year. I'll discuss it in another blog.

But for now, you can't beat Snapfish for sharing your digital pictures with your friends and family, and getting hard copy prints for only 12 cents a copy. Now that's a way to unload your picture burden on someone else.

Happy snapping :)

It's Tuesday, Do You Know Where Your Update Is?

Well I know Tuesday has come and gone, but the need for updating your computer is still just as critical. Actually, it's not your computer you update, it's your operating system. Windows to be exact.

What's the big deal about updates?

Well, the second Tuesday of every month is when Microsoft releases the latest batch of security and windows patches. While a critical patch isn't necessarily released every month, it's extremely important for you to check the Windows Update website (http://www.microsoft.com/updates) on a regular basis just in case there is a patch available.

Why? Well, because if there is a security hole in Windows or Internet Explorer, then your computer is vulnerable to the nasties (trojans, viruses, etc) out there. It's not a matter of if, it's a matter of when your computer will get infected. Each day that you surf without the security patch, you're compromising your personal data.

What's a Security Hole?

Windows is made up of a gazillion lines of computer code. Somewhere along the way, there's bound to be a bug, error, or sloppy programming by the developers who put it all together. It's only a matter of time before some hacker is able to probe and discover that bug and exploit it. That's a security hole.

What's a Security Patch?

Once a hole or vulnerability is found, Microsoft must find a way to re-write the code to close the hole while ensuring the rest of the operating system continues to function. That's a patch. Sometimes the patch creates other problems or holes, but lately it's better to patch first then fix later.

Why bother patching if the solution creates more problems?

The problem is that, once a flaw or hole is discovered, scumbag hackers will try to exploit it quickly before the "gateway" or open door to your computer is closed. It's a game of cat and mouse, where unfortunately the mouse's prize is your personal data. It's not worth the risk of going unpatched.

If you have Windows XP, there is a feature where Windows will automatically check for, and download (if selected) the security patches automatically. But you have to turn this feature on. You can do this by clicking on Start, Control Panel, and clicking on the 'Automatic Updates' icon. Select the 'Automatic' item. As long as your computer is left on when the selected time is set, your computer will go out and check for security updates automatically.

If you have an earlier version of Windows, then you must manually go out and check for security updates. You can do this by opening up your Internet Explorer browser, clicking on the 'Tools' menu item, then clicking on 'Windows Update'. Then click on 'Express Install'. Make sure you install any updates labeled as "critical".

Don't go out there unprotected. It only takes a minute to ensure that you cover yourself. It's not only free to get the security patches, but it's common sense to surf safe.

Thursday, June 09, 2005

Knock Knock. Who's There?

It's the boogieman! Yes, your favorite childhood creepy 'ole boogieman is at it again. But rather than scare you in person, the boogieman is in your computer now...

Now how do you keep him out? Wouldn't it be nice to have your own personal doorman to monitor who to let into your home, and who to bounce?

Like the big burly guy who acts as a gatekeeper to your favorite hangout, you can have your very own personal doorman for your computer. Actually, it's not so much a can, as it is a must - having a personal doorman that acts as your computer's bouncer to the nasties that are out there is not an option, it's an absolute requirement.

Computer networks and the internet weren't designed with security in mind. The "net" was originally designed to allow you to share information with many people and with as little hassle as possible. Unfortunately, that ease of sharing information brings with it one of the many risks you face whenever you are connected to the internet - the risk of sharing your confidential and private information with all the criminals and scumbags out there.

To oversimplify things, your computer is like a house with 65,000 ports or access "doors" to the outside. To make it more scary, every one of these doors is unlocked and open to the world for anyone, or program to use.

Yiikes! That's like living in a glass house in grand central station. No privacy, no security. Back in the early days of computing, everyone made programs to do all kinds of things and programmers played fast and loose with no proper structure. Microsoft is not completely to blame either, since they're trying not to alienate users of older versions of software. But that doesn't absolve them of blame either.

So why don't I just close and lock every door on my computer? You could, but how would your computer talk to the world? How would you be able to access the internet? What you need is a personal doorman at every door to monitor who can come in and who can leave. That's where a "Firewall" comes in.

What's a Firewall?

A firewall is a either a piece of hardware (a box) that you connect to your computer, or more commonly, a software program that you install on your computer. The Firewall acts as a barrier or "wall" that surrounds and protects your computer from the outside world. It's the bouncer that watches every single one of your computer doors for you automatically. No one comes in or leaves without you knowing.

You should NEVER, EVER connect your computer to the internet without a firewall. Never go anywhere unprotected. It takes literally only minutes before a worm, virus or malicious program comes 'a knocking on your computer. There are thousands of nasties out there just waiting and searching for unprotected computers. As soon as they find an open door - they're in. It's as easy as 1,2,3.

Once a worm or nasty virus finds your computer's open door, they'll load anything from more worms, viruses, trojans or keyloggers on your computer and use your computer to do damage to other computers.

A "trojan" is a program that enters your computer either through an open door in your computer, or through email attachments disguised as a picture or screensaver. Once clicked on, the trojan installs it's secret payload onto your computer and starts to damage your computer and wipe out your files. It can also use your computer as a "zombie" to launch attacks against other computers on the internet.

A "zombie" computer is a computer that has been compromised and is under the secret remote control of some scumbag located someplace else.

Keylogger programs. If the virus or worm has loaded a "keylogger" program on your computer, EVERY keystroke that you type, combined with screenshots of your computer screen will be recorded and silently sent to a scumbag's computer. That means all of your personal information will be sent to the criminals lurking out there. Unless you enjoy having your identity stolen, be wary of "free" programs, phishing emails and email attachments.

Did I mention that you should never, ever click on a link or attachment in an email? Well, I'm gonna say it again - DON'T click on attachments or links in emails. Right click and save attachments to a folder on your harddrive, then use a virus scanning program to scan it first.

Again, research programs on techie websites like PCWorld, CNET, and PCMagazine. Then install a firewall. For most people, you can use the free personal version of a program called ZoneAlarm. It's very highly rated, relatively easy to use, and FREE. I know I mentioned earlier to be cautious of "free" programs, but in this case, you can be confident that this excellent free firewall program is legitimate. Power users may wish to purchase the Pro version.

But I have the Windows XP firewall, I don't need another one you say.

Well, you don't need another one if you only want to do half a job. You see, the firewall that comes with Windows XP (the SP2 version) only works as a doorman for programs trying to get IN to your computer. But it does nothing if a program has sneaked in, either via an email or if you accidentally visit a malicious website. While it's watching the front door, creepy nasty programs are stealing your valuables and walking out the back door, 'cause no one's watching what's going OUT of your computer.

So the firewall built into Windows XP is the absolute bare minimum (and that's a really bare minimum) that you should have.

Do a free computer Security Check at GRC.com.

What you really want, is to have your computer appear to be invisible to the outside world. A firewall helps to hide your computer. You should visit a great website called GRC to check if your computer is visible to the world, and to see if all of your computer "doors" are shut and locked. A guy named Steve Gibson runs this website.

There is a free test he offers called "Shield's UP". Click on the link for ShieldsUP and run the tests that "knock" on all your computer doors. Hopefully you'll find that your computer is "invisible" to the world.

A firewall is only one tool in your arsenal against the scumbags that prey on innocent people like you and me. You are always at risk against all the nasties out there unless you have several tools in your belt. You've got to make sure that you also have an Anti-Spyware, Anti-Virus, and an Anti-Foolishness program loaded on your computer.

OK, I made up the last one, but there really is something like an anti-foolish tool - it's called using your head. Common sense if free, buy only if you use it. Be aware and be safe :)

Saturday, June 04, 2005

Who's That Masked Man?

No, it's not Zorro. It's an evil scumbag with a fraudulent wireless access point masquerading as your favorite wireless connection. Sound far fetched? Not anymore. Just when you figured out how to wirelessly connect your computer to the internet, now you've got to worry about rogue (read: malicious) wireless hotspots, or Evil Twins.

What's an Evil Twin?

For those of you who finally got around to setting up your super convenient wireless router/access point that allows you to surf and roam about your house without wires, someone else has figured out how to setup an identically named access point that fraudulently "spoofs" your access point. By spoofing or copying the name of your access point, they've created an "evil twin".

Spoofing your wireless access point done by setting up another wireless access point that mimics your wireless access point and uses the same "SSID" or name. The SSID is the "name" of your wireless access point that your computer uses to identify who it is connecting to. The goal of this is to get your computer to connect to this evil twin instead of your intended wireless point.

Think of an evil twin like a fake delivery man. Normally you give your outgoing packages to the local delivery man, and receive your packages from the same guy. Now imagine that someone in a fake uniform came to your door to pick up your packages. You'd give him your letters and packages and he'd take them away. Now imagine that before he delivered the packages, he opened them up, copied any personal information, then delivered them or threw them away. You wouldn't know the difference until it was too late. That's sort of what an evil twin wireless access point it like.

By connecting to the evil twin, your computer will then be passing all of your information through this fraudulent access point. By monitoring this evil twin, the scumbag will be able to steal all your personal information such as your username and passwords.

While the likelihood of someone setting up an evil twin near your house is not as great, it's very possible and more common for dirtbags to setup evil twin wireless hotspots near internet cafes, businesses and on campus.

By setting up an evil twin at the local starmucks cafe, your computer could connect to this evil twin site and before you realized it, you would have typed in your username and password at the fake login screen. All information that you send and receive from this point would be available to the thief.

Wireless connections are typically very insecure. Manufacturers are loathe to make their products more secure by using encryption and other basic security measures for fear of making it too difficult for users to properly setup their wireless access points. So, by default, wireless products have all of their security settings off. So now you're vulnerable to phishing, spoofing, evil twins, and everything on your computer is open for the world to access.

So What To Do?

  • At the very least, turn on your basic wireless encryption protocol- WEP, WPA, etc. You'll need to look up how to do this in your router's manuals.
  • Avoid public wireless hotspots unless they utilize some sort of security protocol.
  • Use a VPN, or Virtual Private Network if your company offers it. There are also some services available on the web the offer VPN services for around $5 a month.
  • Be alert for strange or unusual login screens or activity at public hotspots.
  • Use a firewall such as ZoneAlarm that helps detect rogue networks and defaults to the most protective security setting when it detects new networks.

There are still many security products under development, so keep yourself up-to-date, read my blog, and...

Be aware and paranoid ;)