Poll Results: Keeping It to Yourself -- Last issue's article on how people view their privacy (see "Thread Models and Domination Systems" in TidBITS-532) inspired our poll question of "Do you use any of the following strategies to protect your privacy online?" Your threat models must not devote much space to online privacy, since only 732 people responded at all. Among respondents, roughly two-thirds said that they used strong passwords, didn't give personal information to Web sites, and blocked or audited cookies. The other options received significantly lower usage rates, with between 7 and 22 percent of the respondents saying that they used anonymous email or Web proxies, or encrypted email, files, or disks. The topic also spawned several interesting discussions on TidBITS Talk, including one on whether or not PGP was in fact too much of a pain to use on a regular basis. [ACE]
Export Word 2008's Audio Notes to Your iPod
You can use Word 2008's Notebook Layout View to take notes and record audio for lectures. Choose View > Notebook Layout View. Click the Audio icon in the Notebook Layout toolbar and then adjust the input volume and click the round recording button. Any notes you type while recording audio are coordinated with the audio. Sync your notes to your iPod for on-the-go studying. Choose Tools > Audio Notes > Export Audio. Save the file to your iTunes music folder.
Visit Mactopia - Word 2008
- Threat Models and Domination Systems (22 May 00)