Poll Results: Keeping It to Yourself -- Last issue's article on how people view their privacy (see "Thread Models and Domination Systems" in TidBITS-532) inspired our poll question of "Do you use any of the following strategies to protect your privacy online?" Your threat models must not devote much space to online privacy, since only 732 people responded at all. Among respondents, roughly two-thirds said that they used strong passwords, didn't give personal information to Web sites, and blocked or audited cookies. The other options received significantly lower usage rates, with between 7 and 22 percent of the respondents saying that they used anonymous email or Web proxies, or encrypted email, files, or disks. The topic also spawned several interesting discussions on TidBITS Talk, including one on whether or not PGP was in fact too much of a pain to use on a regular basis. [ACE]
Data Tables in Microsoft Excel 2008
Data Tables let you see how the results of a formula change as its underlying variables change. After entering data, select the entire table and choose Data > Table. Then tell Excel which row input cell and column input cells you want the table to use. Finally, click OK. Excel will crunch the numbers and present a new Data Table.
Visit Microsoft Mac Mojo blog
- Threat Models and Domination Systems (22 May 00)
Published in TidBITS 533.
Subscribe to our weekly email edition.
Poll Results: Keeping It to Yourself
Set up short abbreviations which expand to larger bits of text,
such as "Tx" for "TextExpander". With the new custom keyboard,
you can expand abbreviations in any app, including Safari and