tag:blogger.com,1999:blog-11673736674084065632024-02-20T01:49:56.601-08:00Best Home SoftwareWhere does it come from?
Typically, spyware originates in three ways. The first and most common way is when the user installs it. In this scenario, spyware is embedded, attached, or bundled with a freeware or shareware program without the user’s knowledge. The user downloads the program to their computer. Once downloaded, the spyware program goes to work collecting data for the spyware author’s personal use or to sell to a third-party.Home Softwarehttp://www.blogger.com/profile/13009986779170289005noreply@blogger.comBlogger6125tag:blogger.com,1999:blog-1167373667408406563.post-64361040118230715132010-02-14T18:48:00.001-08:002010-02-14T18:48:52.202-08:00Fighting SpywareWhy Do I Feel Like Somebody’s Watching Me?<br /><br />Spyware is one of the fastest-growing internet threats. According to the National Cyber Security Alliance, spyware infects more than 90% of all PCs today. These unobtrusive, malicious programs are designed to silently bypass firewalls and anti-virus software without the user’s knowledge. Once embedded in a computer, it can wreak havoc on the system’s performance while gathering your personal information. Fortunately, unlike viruses and worms, spyware programs do not usually self-replicate. <br /><br />Where does it come from?<br />Typically, spyware originates in three ways. The first and most common way is when the user installs it. In this scenario, spyware is embedded, attached, or bundled with a freeware or shareware program without the user’s knowledge. The user downloads the program to their computer. Once downloaded, the spyware program goes to work collecting data for the spyware author’s personal use or to sell to a third-party. Beware of many P2P file-sharing programs. They are notorious for downloads that posses spyware programs.<br /><br />The user of a downloadable program should pay extra attention to the accompanying licensing agreement. Often the software publisher will warn the user that a spyware program will be installed along with the requested program. Unfortunately, we do not always take the time to read the fine print. Some agreements may provide special “opt-out” boxes that the user can click to stop the spyware from being included in the download. Be sure to review the document before signing off on the download.<br /><br />Another way that spyware can access your computer is by tricking you into manipulating the security features designed to prevent any unwanted installations. The Internet Explorer Web browser was designed not to allow websites to start any unwanted downloads. That is why the user has to initiate a download by clicking on a link. These links can prove deceptive. For example, a pop-up modeled after a standard Windows dialog box, may appear on your screen. The message may ask you if you would like to optimize your internet access. It provides yes or no answer buttons, but, no matter which button you push, a download containing the spyware program will commence. Newer versions of Internet Explorer are now making this spyware pathway a little more difficult.<br /><br />Finally, some spyware applications infect a system by attacking security holes in the Web browser or other software. When the user navigates a webpage controlled by a spyware author, the page contains code designed to attack the browser, and force the installation of the spyware program.<br /><br />What can spyware programs do?<br /><br />Spyware programs can accomplish a multitude of malicious tasks. Some of their deeds are simply annoying for the user; others can become downright aggressive in nature.<br /><br />Spyware can:<br />1. Monitor your keystrokes for reporting purposes.<br />2. Scan files located on your hard drive.<br />3. Snoop through applications on our desktop.<br />4. Install other spyware programs into your computer.<br />5. Read your cookies.<br />6. Steal credit card numbers, passwords, and other personal information.<br />7. Change the default settings on your home page web browser.<br />8. Mutate into a second generation of spyware thus making it more difficult to eradicate.<br />9. Cause your computer to run slower.<br />10. Deliver annoying pop up advertisements.<br />11. Add advertising links to web pages for which the author does not get paid. Instead, payment is directed to the spyware programmer that changed the original affiliate’s settings.<br />12. Provide the user with no uninstall option and places itself in unexpected or hidden places within your computer making it difficult to remove.<br /><br />Spyware Examples<br />Here are a few examples of commonly seen spyware programs. Please note that while researchers will often give names to spyware programs, they may not match the names the spyware-writers use. <br /><br />CoolWebSearch, a group of programs, that install through “holes” found in Internet Explorer. These programs direct traffic to advertisements on Web sites including coolwebsearch.com. This spyware nuisance displays pop-up ads, rewrites search engine results, and alters the computer host file to direct the Domain Name System (DNS) to lookup preselected sites. <br />Internet Optimizer (a/k/a DyFuCa), likes to redirect Internet Explorer error pages to advertisements. When the user follows the broken link or enters an erroneous URL, a page of advertisements pop up.<br />180 Solutions reports extensive information to advertisers about the Web sites which you visit. It also alters HTTP requests for affiliate advertisements linked from a Web site. Therefore the 180 Solutions Company makes an unearned profit off of the click through advertisements they’ve altered.<br />HuntBar (a/k/a WinTools) or Adware.Websearch, is distributed by Traffic Syndicate and is installed by ActiveX drive-by downloading at affiliate websites or by advertisements displayed by other spyware programs. It’s a prime example of how spyware can install more spyware. These programs will add toolbars to Internet Explorer, track Web browsing behavior, and display advertisements.<br /><br />How can I prevent spyware?<br />There are a couple things you can do to prevent spyware from infecting your computer system. First, invest in a reliable commercial anti-spyware program. There are several currently on the market including stand alone software packages such as Lavasoft’s Ad-Aware or Windows Antispyware. Other options provide the anti-spyware software as part of an anti-virus package. This type of option is offered by companies such as Sophos, Symantec, and McAfee. Anti-spyware programs can combat spyware by providing real-time protection, scanning, and removal of any found spyware software. As with most programs, update your anti virus software frequently. <br /><br />As discussed, the Internet Explorer (IE) is often a contributor to the spyware problem because spyware programs like to attach themselves to its functionality. Spyware enjoys penetrating the IE’s weaknesses. Because of this, many users have switched to non-IE browsers. However, if you prefer to stick with Internet Explorer, be sure to update the security patches regularly, and only download programs from reputable sources. This will help reduce your chances of a spyware infiltration.<br />. <br />And, when all else fails?<br />Finally, if your computer has been infected with a large number of spyware programs, the only solution you may have is backing up your data, and performing a complete reinstall of the operating system.Home Softwarehttp://www.blogger.com/profile/13009986779170289005noreply@blogger.com0tag:blogger.com,1999:blog-1167373667408406563.post-48675521570169974702010-02-14T18:45:00.000-08:002010-02-14T18:46:32.772-08:00Surfing the Web AnonymouslyWhen you surf the web it is possible to learn information about you even when you don't want to advertise who you are. This is true even if your system contains no virus or malware software. Specifically information that is easily available online includes your IP address, your country (and often more location information based on IP address), what computer system you are on, what browser you use, your browser history, and other information. It gets worse. People can get your computer's name and even find out your name if your machine supports programs like finger or identd. Also, cookies can track your habits as you move from machine to machine.<br /><br />How do people get this basic information about you?<br /><br />When you visit another web site, information about you can be retrieved. Basically, information is intercepted and used by others to track your Internet activities. <br /><br />How do you stop this from happening?<br /><br />First of all, it is possible to serf the web anonymously and thereby stop leaving a trail for others to find. Note that this is not fool-proof, but it makes it much harder for people to know who you are. There are products called anonymous proxy servers that help protect you. The anonymous proxy server replaces your Internet address for its own. This has the effect of hiding your IP address and making it much harder for people to track you.<br /><br /><br />How do I get an anonymous proxy server?<br /><br />There are many vendors who sell anonymous proxy servers. There are also free proxy servers available to you. Two such products are ShadowSurf and Guardster. Guardster (http://www.guardster.com/) offers various services for anonymous and secure access to the web, some paid as well as a free service. ShadowSurf (http://www.shadowsurf.com/) ShadowSurf provides anonymous surfing at their site for free. Go to it and you will find a box to enter a URL that you want no one to track. There are many others, but here are two that are frequently used.<br /><br />Another interesting product, given the recent news about the Google search engine filtering its findings for the Chinese government, is Anonymizer (http://www.anonymizer.com). This company, among others, recently (Feb 1st, 2006) pressed that it "is developing a new anti-censorship solution that will enable Chinese citizens to safely access the entire Internet filter-free" (http://www.anonymizer.com/consumer/media/press_releases/02012006.html). <br /><br />Does an anonymous proxy server make you 100% safe?<br /><br />No. Still, you are much better off if you use such technology.<br /><br />What other things should I be concerned about when trying to keep my private information private?<br /><br />Three other items come to mind when trying to keep your information private. First, you can use an encrypted connection to hide your surfing. This article does not go into detail on this, but search the web and you will find a lot of information on this. Secondly, delete cookies after each session. Third, you can configure your browser to remove JavaScript, Java, and active content. This actually leads to limitations, so you need to think about the cost/benefit of this course of action.<br /><br /><br />Anything else?<br /><br />Wishing you happy and safe surfing!Home Softwarehttp://www.blogger.com/profile/13009986779170289005noreply@blogger.com0tag:blogger.com,1999:blog-1167373667408406563.post-59767903691984682732010-02-14T18:43:00.000-08:002010-02-14T18:44:38.626-08:00Advancements in Antivirus Software SuitesProtecting your computer from a virus is getting harder and harder each day. While it may border on the paranoid, it goes without saying that you can’t leave your guard down for one second. Even corporate giant Microsoft has found its own systems compromised on more than one occasion. <br /><br />Remember the “good old days”, before the advent of the Internet and downloadable programs? Life was simple then in terms of computer viruses. With the primary way in which a virus could be transmitted being limited to floppy disks, the ability to catch and eradicate the virus was a lot easier. By today’s standards, it used to take quite a while before a virus was able to infect a computer and slow down the system. The antivirus software of that time was typically able to identify and eradicate viruses before they caused too much damage. Additionally, computer users were pretty savvy on how to protect themselves in terms of scanning all floppy disks before copying them to our desktop. <br /><br />The Internet helped change all that. The Internet provided a conduit by which viruses could move from host to host with lightening speed. No longer could a computer user just worry about floppy disks as points of entry, but they now had to worry about email, email attachments, peer-to-peer file sharing, instant messaging, and software downloads. Today’s viruses can attack through multiple entry points, spread without human intervention, and take full advantage of vulnerabilities within a system or program. With technology advancing everyday, and the convergence of computers with other mobile devices, the potential of new types of threats also increase. <br /><br />Protecting Your Computer<br />Luckily, the advancement of antivirus software has kept pace with current virus threats. Antivirus software is essential to a computer’s ability to fend off viruses and other malicious programs. These products are designed to protect against the ability of a virus to enter a computer through email, web browsers, file servers and desktops. Additionally, these programs offer a centralized control feature that handle deployment, configuration and updating.<br />A computer user should remain diligent and follow a few simple steps to protect against the threat of a virus:<br /><br />1. Evaluate your current computer security system.<br /> With the threat of a new generation of viruses able to attack in a multitude of ways, the approach of having just one antivirus software version has become outdated. You need to be confident that you have protected all aspects of your computer system from the desktop to the network, and from the gateway to the server. Consider a more comprehensive security system which includes several features including antivirus, firewall, content filtering, and intrusion detection. This type of system will make it more difficult for the virus to penetrate your system.<br />2. Only install antivirus software created by a well-known, reputable company. <br /> Because new viruses erupt daily, it is important that you regularly update your antivirus software. Become familiar with the software’s real-time scan feature and configure it to start automatically each time you boot your computer. This will protect your system by automatically checking your computer each time it is powered up. <br />3. Make it a habit to always scan all new programs or files no matter from where they originate.<br />4. Exercise caution when opening binary, Word, or Excel documents of unknown sources especially if they were received during an online chat or as an attachment to an email. <br />5. Perform regular backups in case your system is corrupted. It may be the only way to recover your data if infected.<br /><br />Recommended Antivirus Software<br />There are numerous applications available to consumers. With a little research, you can pick the program that is right for you. Many programs provide a trial version which allows you to download the program and test its abilities. However, be aware that some anti-virus programs can be difficult to uninstall. As a precaution make sure to set up a System Restore point before installing. <br /><br />Here are a few programs which typically receive high marks in terms of cost, effectiveness, ease of use, and customer service.<br /><br />The Shield Pro 2005™ provides virus protection and hacker security through ongoing support and updates. When a virus breaks out, The Shield Pro 2005™ promises to provide a patch within 2-3 hours and a fix for the virus within 5 hours. You can set your computer to update viruses weekly and run a complete virus scan.<br /><br />BitDefender 9 Standard provides antivirus protection, as well as Peer-2-Peer Applications protection, full email protection, and heuristics in a virtual environment. This provides a new security layer that keeps the operating system safe from unknown viruses by detecting malicious pieces of code for which signatures have not been released yet.<br /><br />Kaspersky Anti-Virus Personal 5.0 program is simple to install and use. The user only needs to choose from three levels of protection. It allows updates as frequently as every hour while promising not to disrupt your computer. The program also offers a two-tier email protection feature and round-the-clock technical support.<br /><br />PC-cillin Internet Security combines antivirus security and a personal firewall—for comprehensive protection against viruses, worms, Trojans, and hackers. It also detects and removes spyware and blocks spam. It even guards against identity theft by blocking phishing and pharming attacks.<br /><br />AVG Anti-Virus Free Edition is a free downloadable antivirus program that has received high marks for its reliability. In the past, free downloadable antivirus programs have been viewed skeptically because of issues relating to its reliability. However, AVG from Grisoft, remains one of the best-known free anti-virus programs available. While AVG can not be installed on a server operating system and there is no technical support, it still makes a good choice for many home computer users. The best part is that since it is free, you can try it with no further obligation necessary.Home Softwarehttp://www.blogger.com/profile/13009986779170289005noreply@blogger.com0tag:blogger.com,1999:blog-1167373667408406563.post-38150224366431695432010-02-14T18:41:00.000-08:002010-02-14T18:42:45.752-08:00Fighting SpamHow prevalent is Spam? According to Scott McAdams, OMA Public Affairs and Communications Department (www.oma.org):<br />“Studies show unsolicited or “junk” e-mail, known as spam, accounts for roughly half of all e-mail messages received. Although once regarded as little more than a nuisance, the prevalence of spam has increased to the point where many users have begun to express a general lack of confidence in the effectiveness of e-mail transmissions, and increased concern over the spread of computer viruses via unsolicited messages.”<br />In 2003, President Bush signed the “Can Spam” bill, in December of 2003 which is the first national standards around bulk unsolicited commercial e-mail. The bill, approved by the Senate by a vote of 97 to 0, prohibits senders of unsolicited commercial e-mail from using false return addresses to disguise their identity (spoofing) and the use of dictionaries to generate such mailers. In addition, it prohibits the use of misleading subject lines and requires that emails include and opt-out mechanism. The legislation also prohibits senders from harvesting addresses off Web sites. Violations constitute a misdemeanor crime subject to up to one year in jail. <br />One major point that needs to be discussed about this: spam is now coming from other countries in ever-greater numbers. These emails are harder to fight, because they come from outside our country’s laws and regulations. Because the Internet opens borders and thinks globally, these laws are fine and good, but do not stop the problem.<br />So what do you do about this? Her are the top 5 Rules to do to protect from spam.<br />Number 1: Do what you can to avoid having your email address out on the net. <br />There are products called “spam spiders” that search the Internet for email addresses to send email to. If you are interested, do a search on “spam spider” and you will be amazed at what you get back. Interestingly, there is a site, WebPoison.org, which is an open source project geared to fight Internet "spambots" and "spam spiders", by giving them bogus HTML web pages, which contain bogus email addresses<br />A couple suggestions for you: a) use form emails, which can hide addresses or also b) use addresses like sales@company.com instead of your full address to help battle the problem. c) There are also programs that encode your email, like jsGuard, which encodes your email address on web pages so that while spam spiders find it difficult or impossible to read your email address.<br />Number 2: Get spam blocking software. There are many programs out there for this. (go to www.cloudmark.com or www.mailwasher.net for example). You may also buy a professional version. Whatever you do, get the software. It will save you time. The software is not foolproof, but they really do help. You usually have to do some manual set up to block certain types of email.<br />Number 3: Use the multiple email address approach.<br />There are a lot of free email addresses to be had. If you must subscribe to newsletters, then have a “back-up” email address. It would be like giving your sell phone number to your best friends and the business number to everyone else.<br />Number 4: Attachments from people you don’t know are BAD, BAD, BAD.<br />A common problem with spam is that they have attachments and attachments can have viruses. Corporations often have filters that don’t let such things pass to you. Personal email is far more “open country” for spamers. General rule of thumb: if you do not know who is sending you something, DO NOT OPEN THE ATTACHMENT. Secondly, look for services that offer filtering. Firewall vendors offer this type of service as well.<br />Number 5: Email services now have “bulk-mail” baskets. If what you use currently does not support this, think about moving to a new vender. The concept is simple. If you know someone, they can send you emails. If you don’t know them, put them in the bulk email pile and then “choose” to allow them into your circle. Spam Blocking software has this concept as well, but having extra layers seems critical these days, so it is worth looking into.Home Softwarehttp://www.blogger.com/profile/13009986779170289005noreply@blogger.com0tag:blogger.com,1999:blog-1167373667408406563.post-45384613943637333332010-02-14T18:39:00.001-08:002010-02-14T18:39:33.897-08:00Family History Goes High TechFamily History Goes High Tech<br /><br />It is estimated that 50 million Americans are researching their roots. They come from various walks of life, economic levels, ages, religions, races, and from many professions. For some people, it is a hobby on which they spend a few hours a month. For others, it’s an obsession. Either way, they all share a common bond of seeking information about people who came before them. <br /><br />In the past few years, resources devoted to genealogy have exploded on the Internet and in the marketplace. One of the more notable products is Family Tree Legends 5.0 by Pearl Street. This commanding and highly-developed genealogy program is designed to make is easy for you to collect, display, and organize information about your family history. <br /><br />In addition to capturing your notes, medical facts, pictures, and multimedia files in one easy application, the new version also:<br /><br />• Lets you share CDs and DVDs of your data with friends and family. You can even distribute it with a free version of the Family Tree Legends software.<br />• Allows synching of GEDCOM files to your handheld device.<br />• Provides you with a Correspondence Tracker which can track all your correspondence with other researchers in one convenient linking manager.<br />• Utilizes Smart-Matching Technology which can compare the names in your files to those in a GenCircle Pedigree database. Some product reviewers boasted a 100% accuracy rating using the Smart-Matching feature.<br /><br />Family Tree Legend 5.0 provides free email based-technical support and has received the Family Tree Magazine’s Five Star Rating. If that still has you straddling the fence, consider the Full 30 Day Money Back Guarantee that Pearl Street Software provides with their products. <br /><br />Special offers provided from the manufacturer allow you the opportunity to purchase a standard version of the software for only $29.95. The “all-the-bells-and-whistles” premium version costs approximately $79.95. Seems like a bargain for a colorful, easy to use, well-designed program which can house your files and pictures in one convenient location.Home Softwarehttp://www.blogger.com/profile/13009986779170289005noreply@blogger.com0tag:blogger.com,1999:blog-1167373667408406563.post-9207791131751369492010-02-14T17:58:00.000-08:002010-02-14T18:01:01.413-08:00A Dream Home That’s No Longer a Dream<meta equiv="Content-Type" content="text/html; charset=utf-8"><meta name="ProgId" content="Word.Document"><meta name="Generator" content="Microsoft Word 11"><meta name="Originator" content="Microsoft Word 11"><link rel="File-List" href="file:///C:%5CDOCUME%7E1%5C2%5CLOCALS%7E1%5CTemp%5Cmsohtml1%5C03%5Cclip_filelist.xml"><!--[if gte mso 9]><xml> <w:worddocument> <w:view>Normal</w:View> <w:zoom>0</w:Zoom> <w:punctuationkerning/> <w:validateagainstschemas/> <w:saveifxmlinvalid>false</w:SaveIfXMLInvalid> <w:ignoremixedcontent>false</w:IgnoreMixedContent> <w:alwaysshowplaceholdertext>false</w:AlwaysShowPlaceholderText> <w:compatibility> <w:breakwrappedtables/> <w:snaptogridincell/> <w:wraptextwithpunct/> <w:useasianbreakrules/> <w:dontgrowautofit/> </w:Compatibility> <w:browserlevel>MicrosoftInternetExplorer4</w:BrowserLevel> </w:WordDocument> </xml><![endif]--><!--[if gte mso 9]><xml> <w:latentstyles deflockedstate="false" latentstylecount="156"> </w:LatentStyles> </xml><![endif]--><style> <!-- /* Style Definitions */ p.MsoNormal, li.MsoNormal, div.MsoNormal {mso-style-parent:""; margin:0cm; margin-bottom:.0001pt; mso-pagination:widow-orphan; font-size:10.0pt; font-family:"Times New Roman"; mso-fareast-font-family:"Times New Roman";} @page Section1 {size:612.0pt 792.0pt; margin:72.0pt 90.0pt 72.0pt 90.0pt; mso-header-margin:36.0pt; mso-footer-margin:36.0pt; mso-paper-source:0;} div.Section1 {page:Section1;} --> </style><!--[if gte mso 10]> <style> /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-parent:""; mso-padding-alt:0cm 5.4pt 0cm 5.4pt; mso-para-margin:0cm; mso-para-margin-bottom:.0001pt; mso-pagination:widow-orphan; font-size:10.0pt; font-family:"Times New Roman"; mso-ansi-language:#0400; mso-fareast-language:#0400; mso-bidi-language:#0400;} </style> <![endif]--> <p class="MsoNormal"><meta equiv="Content-Type" content="text/html; charset=utf-8"><meta name="ProgId" content="Word.Document"><meta name="Generator" content="Microsoft Word 11"><meta name="Originator" content="Microsoft Word 11"><link rel="File-List" href="file:///C:%5CDOCUME%7E1%5C2%5CLOCALS%7E1%5CTemp%5Cmsohtml1%5C04%5Cclip_filelist.xml"><!--[if gte mso 9]><xml> <w:worddocument> <w:view>Normal</w:View> <w:zoom>0</w:Zoom> <w:punctuationkerning/> <w:validateagainstschemas/> <w:saveifxmlinvalid>false</w:SaveIfXMLInvalid> <w:ignoremixedcontent>false</w:IgnoreMixedContent> <w:alwaysshowplaceholdertext>false</w:AlwaysShowPlaceholderText> <w:compatibility> <w:breakwrappedtables/> <w:snaptogridincell/> <w:wraptextwithpunct/> <w:useasianbreakrules/> <w:dontgrowautofit/> </w:Compatibility> <w:browserlevel>MicrosoftInternetExplorer4</w:BrowserLevel> </w:WordDocument> </xml><![endif]--><!--[if gte mso 9]><xml> <w:latentstyles deflockedstate="false" latentstylecount="156"> </w:LatentStyles> </xml><![endif]--><style> <!-- /* Font Definitions */ @font-face {font-family:Wingdings; panose-1:5 0 0 0 0 0 0 0 0 0; mso-font-charset:2; mso-generic-font-family:auto; mso-font-pitch:variable; mso-font-signature:0 268435456 0 0 -2147483648 0;} /* Style Definitions */ p.MsoNormal, li.MsoNormal, div.MsoNormal {mso-style-parent:""; margin:0cm; margin-bottom:.0001pt; mso-pagination:widow-orphan; font-size:10.0pt; font-family:"Times New Roman"; mso-fareast-font-family:"Times New Roman";} a:link, span.MsoHyperlink {color:blue; text-decoration:underline; text-underline:single;} a:visited, span.MsoHyperlinkFollowed {color:purple; text-decoration:underline; text-underline:single;} @page Section1 {size:612.0pt 792.0pt; margin:72.0pt 90.0pt 72.0pt 90.0pt; mso-header-margin:36.0pt; mso-footer-margin:36.0pt; mso-paper-source:0;} div.Section1 {page:Section1;} /* List Definitions */ @list l0 {mso-list-id:1580403612; mso-list-type:hybrid; mso-list-template-ids:846130034 451298220 67698691 67698693 67698689 67698691 67698693 67698689 67698691 67698693;} @list l0:level1 {mso-level-number-format:bullet; mso-level-text:; mso-level-tab-stop:108.0pt; mso-level-number-position:left; margin-left:108.0pt; text-indent:-18.0pt; mso-ansi-font-size:12.0pt; mso-bidi-font-size:12.0pt; font-family:Symbol; color:black;} ol {margin-bottom:0cm;} ul {margin-bottom:0cm;} --> </style><!--[if gte mso 10]> <style> /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-parent:""; mso-padding-alt:0cm 5.4pt 0cm 5.4pt; mso-para-margin:0cm; mso-para-margin-bottom:.0001pt; mso-pagination:widow-orphan; font-size:10.0pt; font-family:"Times New Roman"; mso-ansi-language:#0400; mso-fareast-language:#0400; mso-bidi-language:#0400;} </style> <![endif]--> </p><p class="MsoNormal"><b style=""><span style="font-size: 12pt;">A Dream Home That’s No Longer a Dream<o:p></o:p></span></b></p> <p class="MsoNormal"><span style="font-size: 12pt;"><o:p> </o:p></span></p> <p class="MsoNormal"><span style="font-size: 12pt;">Who hasn’t dreamed of redesigning their current home or building their dream home?<span style=""> </span>Unfortunately, for many of us, the cost of hiring an architect just isn’t in our budget.<span style=""> </span>Now with the help of Home Designer Pro 7.0, we can easily do it ourselves.<o:p></o:p></span></p> <p class="MsoNormal"><span style="font-size: 12pt;"><o:p> </o:p></span></p> <p class="MsoNormal"><span style="font-size: 12pt;">Chief Architect, Inc. is a leading developer of 3D architectural home design software for consumers, home enthusiasts, builders, designers, and architects. <span style=""> </span>In January 2006, they were recognized as the fastest growing publisher in the home design and gardening software category for 2005, making it the number one growing home design and gardening software publisher.<o:p></o:p></span></p> <p class="MsoNormal"><span style="font-size: 12pt;"><o:p> </o:p></span></p> <p class="MsoNormal"><span style="font-size: 12pt;">Better Homes and Gardens software product reviewers give it two thumbs up for ease of use.<span style=""> </span>You can quickly jump-in and begin by using their pre-designed room feature or start from scratch and define your own rooms.<span style=""> </span>When you are finished outside, take a quick spin outside and try your hand at either landscaping or deck design.<span style=""> </span><o:p></o:p></span></p> <p class="MsoNormal"><span style="font-size: 12pt;"><o:p> </o:p></span></p> <p class="MsoNormal"><span style="font-size: 12pt;">If you are thinking about designing your dream home from the ground up, the project-cost estimator budgeting tools provides you with a realistic idea of what you can expect to pay and the materials you will need to do the job.<span style=""> </span>Then, you can easily add-in or change features with a simple click of the mouse.<o:p></o:p></span></p> <p class="MsoNormal"><span style="font-size: 12pt;"><o:p> </o:p></span></p> <p class="MsoNormal"><span style="font-size: 12pt;">The software suite is loaded with additional features including the ability:<o:p></o:p></span></p> <p class="MsoNormal" style="margin-left: 36pt; text-indent: -18pt;"><!--[if !supportLists]--><span style="font-size: 12pt; font-family: Symbol; color: black;"><span style="">·<span style="font-family: "Times New Roman"; font-style: normal; font-variant: normal; font-weight: normal; font-size: 7pt; line-height: normal; font-size-adjust: none; font-stretch: normal;"> </span></span></span><!--[endif]--><span style="font-size: 12pt;">to create a virtual walk-through of your house <o:p></o:p></span></p> <p class="MsoNormal" style="margin-left: 36pt; text-indent: -18pt;"><!--[if !supportLists]--><span style="font-size: 12pt; font-family: Symbol; color: black;"><span style="">·<span style="font-family: "Times New Roman"; font-style: normal; font-variant: normal; font-weight: normal; font-size: 7pt; line-height: normal; font-size-adjust: none; font-stretch: normal;"> </span></span></span><!--[endif]--><span style="font-size: 12pt;">to design and visualize using 3-D models <o:p></o:p></span></p> <p class="MsoNormal" style="margin-left: 36pt; text-indent: -18pt;"><!--[if !supportLists]--><span style="font-size: 12pt; font-family: Symbol; color: black;"><span style="">·<span style="font-family: "Times New Roman"; font-style: normal; font-variant: normal; font-weight: normal; font-size: 7pt; line-height: normal; font-size-adjust: none; font-stretch: normal;"> </span></span></span><!--[endif]--><span style="font-size: 12pt;">to use a complete set of CAD tools to detail your designs<o:p></o:p></span></p> <p class="MsoNormal" style="margin-left: 36pt; text-indent: -18pt;"><!--[if !supportLists]--><span style="font-size: 12pt; font-family: Symbol; color: black;"><span style="">·<span style="font-family: "Times New Roman"; font-style: normal; font-variant: normal; font-weight: normal; font-size: 7pt; line-height: normal; font-size-adjust: none; font-stretch: normal;"> </span></span></span><!--[endif]--><span style="font-size: 12pt;">to choose from a library of more than <span style=""> </span>4,300 design<span style=""> </span>items<o:p></o:p></span></p> <p class="MsoNormal" style="margin-left: 36pt; text-indent: -18pt;"><!--[if !supportLists]--><span style="font-size: 12pt; font-family: Symbol; color: black;"><span style="">·<span style="font-family: "Times New Roman"; font-style: normal; font-variant: normal; font-weight: normal; font-size: 7pt; line-height: normal; font-size-adjust: none; font-stretch: normal;"> </span></span></span><!--[endif]--><span style="font-size: 12pt;">to select 1,500 sample home plans <o:p></o:p></span></p> <p class="MsoNormal" style="margin-left: 36pt; text-indent: -18pt;"><!--[if !supportLists]--><span style="font-size: 12pt; font-family: Symbol; color: black;"><span style="">·<span style="font-family: "Times New Roman"; font-style: normal; font-variant: normal; font-weight: normal; font-size: 7pt; line-height: normal; font-size-adjust: none; font-stretch: normal;"> </span></span></span><!--[endif]--><span style="font-size: 12pt;">to review 30 training videos with "how to" information<o:p></o:p></span></p> <p class="MsoNormal"><span style="font-size: 12pt;"><o:p> </o:p></span></p> <p class="MsoNormal"><span style="font-size: 12pt;">Not sure which of the BHG products are right for your needs?<span style=""> </span>No problem.<span style=""> </span>BHG provides a comprehensive comparison matrix on their website at <a href="http://www.homedesignersoftware.com/pdf/Land-vs-Base-vs-Suite-vs-Deluxe-Pro.pdf">http://www.homedesignersoftware.com/pdf/Land-vs-Base-vs-Suite-vs-Deluxe-Pro.pdf</a>.<span style=""> </span>Now, you can easily locate which of their six home design products are right for you.<span style=""> </span>Depending on your needs, you can expect to pay between $59 and $149.<span style=""> </span><o:p></o:p></span></p> <p></p> Home Softwarehttp://www.blogger.com/profile/13009986779170289005noreply@blogger.com0