Publications
Desktop News
NOLA NOTES
Member Resources
Book Discussion
Salary Survey
Vendor Discount
Experts on Call
CE Transcripts
NOLA Documents
Information
NOLA Calendar
Member Directory
Employee Directory
Desktop Search
NOLA Board
Directions to NOLA
NOLA Spotlights
Resource Sharing
AccessOhio
AskUsQuestions
Ellison Dies
RefLinks
More
|
|
Desktop News |
Issue 164 |
Wednesday, June 16, 1999 |
01:39:42 PM |
For a
bi-monthly wrap up of NOLA news and information, be sure to check out NOLA Notes!
To receive The Desktop News in your email, go
here.
(You must be using Netscape, Internet Explorer or an HTML-based email
program to use this service) |
The Director's Desk - Millie Fry |
Book Sale
NOLA is selling copies of book titles that were formerly in our Book Discussion
collection. They are located
in our Training Center and are $.25 per book. Below is a list of the titles and number of
copies we have as of
June 8, 1999. Individuals or Libraries can purchase as many as you want. The book sale
ends June 30th.
Ackerman, Diane |
Natural History of the Senses |
10 |
Ashton Warner, Sylvia |
Teacher |
12 |
Baker, Russell |
Growing Up |
11 |
Bloom, Allan |
Closing of the American Mind |
11 |
Brinkly, David |
Washington Goes to War |
12 |
Conway, Jill Ker |
True North |
12 |
Davies, Robertson |
What's Bread in the Bone |
12 |
Follett, Ken |
Pillars of Earth |
12 |
Gaines, Ernest |
Lesson Before Dying |
5 |
Gould, Stephen |
Panda's Thumb |
12 |
Guinness, Alec |
Blessings in Disguise |
11 |
Hanff, Helene |
84 Charing Cross Road |
10 |
Harris, Jean |
They Always Called Us Ladies |
12 |
Hassler, Jon |
Love Hunter |
11 |
Hersey, John |
Hiroshima |
7 |
Hillerman, Tony |
Sacred Clowns |
7 |
Hubbell, Sue r |
Country Yea |
9 |
Johnson, Haynes |
Sleepwalking Through History |
12 |
Kay, Susan |
Phantom |
7 |
Manchester, William |
World Lit Only by Fire |
12 |
Mayle, Peter |
Year in Provence |
7 |
McGinniss, Joe |
Going to Extremes |
11 |
McPhee, John |
La Place De La Concorde |
12 |
Miller, Arthur |
Timebends |
12 |
Mowat, Farley |
Never Cry Wolf |
12 |
Norris, Kathleen |
Dakota |
12 |
Ogden, Christopher |
Life of the Party |
11 |
Piercy, Marge |
He, She, and It |
9 |
Prejean, Helen |
Dead Man Walking |
12 |
Preston, Richard |
Hot Zone |
6 |
Reisner, Marc |
Cadillac Desert |
9 |
See, Carolyn |
Dreaming |
11 |
Shuler, Linda Lay |
She Who Remembers |
7 |
Siddons, Anne Rivers |
Downtown |
1 |
Styron, William |
Sophie's Choice |
12 |
Tan, Amy |
Joy Luck Club |
1 |
Wolff, Geoffrey |
Duke of Deception |
10 |
Items submitted by:
Millie Fry - Email
NOLA Regional Library System
From the Field - Brad Stephens |
Shell Extension City -
Always looking for those magical utilities to make your
computer more productive, usable, or just plain "cool", then check out Shell
Extension City. This site offers users one of the largest and most descriptive lists
of useful utilities that I have found. Almost any user can find something at this
site to improve the quality of their computing experience.
NOTE: Don't forget to scan ALL downloaded
programs for viruses - you can never be too careful
Want to know more?
All you need to know about Worm.ExploreZip -
There has been much talk about the latest wide-spread
security risk on the net - the Worm.ExploreZip worm. This worm is very similar to a
virus in the damage that it does and the manner in which it infects computers. The
worm first reaches a users computer system as an attachment to an email message that will
appear to be sent from someone that you have recently emailed. The email message
containing the worm will look like the following:
Hi Brad Stephens
I received your email and I shall send you a reply ASAP.
Till then, take a look at the attached zipped docs.
The message will have an attachment that when opened (double
clicked) will start the worm - until the attachment is opened the computer IS NOT
INFECTED OR DAMAGED. Once the worm has been activated it will destroy all .doc,
.xls, and .ppt files (along with a few other file types such as .h, .cpp, and .asm) on the
hard disk and any network accessible drives that the user can access with write
permission. In addition to deleting numerous files from the hard disk and network
shares Worm.ExploreZip will monitor the inbox of users running the Outlook or Exchange
email clients and attempt to send itself to those persons who have sent the user of the
infected computer email messages recently. All said this is a nasty critter but you
can keep yourself and your computer safe by following these simple steps:
1. Keep you antivirus software definitions up to date
2. Be very cautious about email attachments, configure your
antivirus software to scan all files before they are opened/executed
3. Properly backup your important files on a regular basis
Items submitted by:
Brad Stephens - Email
NOLA Regional Library System
|