Wednesday, April 27, 2011

Early Christmas shopping ideas.

Upgrade Your Life: Gadgets under $25

We love our gadgets, and they can be outrageously expensive. But this week on Upgrade Your Life, Yahoo! News' Becky Worley shows off some surprisingly useful tech gear ... for under $25. Bottle Cap Tripod $9.75
Don't you just hate when your shaking hand makes your photos turn out all fuzzy? Or that the photographer never gets to be in the pictures? The Bottle Cap Tripod is the perfect fix. It's a rubber cap that you screw into the tripod mount built into almost all cameras, then you push it onto the top of a full half-liter water bottle, and you've got a portable platform for picture-taking! It's also tiny and easy to throw into a small camera bag.
iWatchz Q Collection Wrist Strap for iPod Nano $24.95
Ever wanted to wear your 6th-generation (square) iPod Nano as a wristwatch? Just slide it onto the iWatchz Wrist Strap, and it snaps into place using the iPod's own clip. The iWatchz' flexible silicone wristband comes in eight different colors, to match the iPod Nano's shades. And it lets you get to your iPod's control buttons, earphone jack and charging connector even while it's plugged in. Can you say Dick Tracy watch? This is a great gift for any gadget-hound who already has a Nano.

Aerobie Aero Press $21.72
The Aero Press makes great espresso-strength coffee in under a minute! Just pour in hot water and coffee grounds, mix, then press it all through the filter you can vary the strength of your coffee by mixing or pressing it longer. It creates a vacuum seal to really pressure the water through the coffee, so it's a much stronger taste than the traditional French press coffee. Cleanup is also really easy, since the grounds and the filter are compacted into a cookie-like wad, and the Press' parts are all made of dishwasher-safe plastic. A pack of 350 replacement filters sells for just $5.
Oster Electric Wine Bottle Opener $17
Opening a wine bottle is hard work, but the Oster electric wine opener makes it dead simple no twisting required. Place it onto the top of the wine bottle, press a button, and in 10 seconds the cork is extracted; absolutely no human effort required. The Oster Electric Wine Bottle Opener can open 30 bottles on a single charge, and it has a rechargeable battery.
Car Power Inverter $19.99
This simple, plug-in adapter is one of the cheapest ways to turn your car's cigarette lighter into an AC outlet, the same as you'd find in your house. And for a few dollars more you can get ...
The PowerCup $26.91
It's a little over $25, but the PowerCup Mobile Inverter has two AC outlets, plus a USB port for recharging gadgets that you'd normally plug into your computer. So you can charge your laptop, your phone, and your Bluetooth headset ... all from your car's cigarette lighter, using the same plugs you use in the wall outlets in your house. Plus, the PowerCup's quirky design (it looks just like a white coffee cup) fits in a generously-sized cupholder. Just don't accidentally try to take a sip from it.
WAGAN Tech Easy Quick Jumper $19.99
Staying with the car's cigarette lighter, remember when jumping your car's battery meant popping the hood and attaching those cables to it? With the Easy Quick Jumper, you don't need to open the hood; you don't even need to know what your car's battery looks like. Just plug each end into the cigarette lighters in the car with the dead battery and the car belonging to the person who's helping out, and wait 5 to 10 minutes. It's especially handy for newer cars, that don't have accessible battery connections.
Grill Daddy BBQ Brush Cleaner $14.98
As Seen On TV! It may be an infomercial product, but it does what it says on the label. Just heat your barbecue grill up and add water to the Grill Daddy, and it steam-cleans your grill with two sets of stainless steel bristles; a row of smaller, narrower bristles on top help the Grill Daddy reach hard-to-clean areas. You can even clean your grill before cooking on it, to get rid of black char marks on food.
Original article by Jared Spurbeck, published on Apr 12, 2011.

Tuesday, April 26, 2011

Public Service Announcement

For those of you that know me, you understand that my motto is "No Pain, No Pain!"  So, clearly the following information is for the benefit of you workout warriors, because I care.

______________________________________________________________

Warm Up With Cardio, Then Go To Weights. Right? Wrong.


Having been an athlete for most of my life, I figured I knew my way around the gym. On a typical day, I'd hit the treadmill or elliptical machine for 30 minutes, then move to the weight machines. And that's what I started to do when I recently joined a gym. Then I got my assessment -- you know, the review of your habits a lot of gyms do. And the review told me I was doing something wrong.
Hit the weights hard, the assessment said. Then go to cardio.
What?
"The body needs to burn through its sugar source first before it taps into the fat," says Iman Nikzad, who runs the fitness program at my LA Fitness near Irvine, Ca. "You burn the sugar while doing the weights then burn the fat while doing the cardio."
I did some more research and, turns out, he's right and I was wrong. The optimal workout is a 10-minute warm-up on a low-impact cardio machine followed by 30 minutes of weights and then 30 minutes of intense cardio.
Yes, really.

"Efficiency is the key when structuring any workout, so long-duration cardio should not be done in the beginning of the session," says certified strength and conditioning specialist Jim Smith. "The most intensive training should be done first in the workout, when you are at your best."
By starting with weights, you alert your muscles to trigger the proteins that churn through calories while you train. So even though you're probably spent after 30 minutes of weights, your body is ready to eat fat faster than it would if you started by "telling" the body to attack sugar.
A lot of people get this wrong, thinking weight training diminishes the effect of the cardio work. It's the opposite. Just remember the phrase: "Muscle eats the fat." If you want to lose the flab -- and who doesn't? -- you want your muscles as active as possible. That means starting with weights.
And if you only have 30 minutes total, go for weights instead of cardio. That sounds counterintuitive, since we feel sweating is "proof" we're losing fat. But you will lose a lot more fat by pushing and pulling weights and then going on a brisk walk in your neighborhood (or even at the mall). The guy or gal who is dripping buckets on the Stairmaster is getting a good workout, but you're likely getting a better one by getting sore and not getting soaked.

Monday, April 25, 2011

Things We Need To Do In This Cyberworld

Secure Your Life in 12 Steps

Lock down your computer, your home network, your identity--even your phone.

By Nick Mediati

Apr 24, 2011 6:00 PM

Good security advice can be hard to find. Lots of security experts offer help, but not all of their tips are accurate or up-to-date, and many address PC security only. So even if you follow their advice, you may be more vulnerable than you think. That's where we come in. We've assembled a dozen simple but essential tips--a 12-step security program--to keep your PC, smartphone, gadgets, and identity safe. The steps are practical and fairly easy to perform, so you can strengthen your security without losing your mind in the process.

1. Use Virtual Credit Card Numbers to Shop Online

You have good reason to be nervous when using your credit card number to shop online. After all, you may know little or nothing about the company you're buying from, and your credit card information is at risk of being comprom­ised in a data breach. Using a virtual credit card number is one way to make your Internet shopping excursions more secure.
Essentially a wrapper for your regular credit card or debit card account, a virtual card number is good for one use only. When you use the virtual number, the bank that supplied it charges your purchase to your regular credit or debit card, but hackers never gain access to the underlying credit card information.
Various financial institutions maintain some sort of virtual credit card program. Bank of America, for instance, offers a ShopSafe service, and Discover has a similar service built around what it calls a Secure Online Account Number. Check with your bank or card issuer to see what options are available. Alternatively, consider Shop Shield, a virtual card number service that you can use with any credit card or checking account.

2. Secure Your Wi-Fi

Is your Wi-Fi network at home password-protected? If not, it should be. You might not care if your neighbors use your Wi-Fi connection to surf the Web, but someone with more sinister motives could take advantage of your generosity (and lack of protection) to gain access to data stored on your home PCs.
The easiest way to guard against Wi-Fi interlopers is to encrypt your Wi-Fi network. Afterward you'll have to enter a password whenever you connect to your Wi-Fi network, but that's a small price to pay for improved security. Most Wi-Fi routers support WEP, WPA, and WPA2 encryption standards. Be sure to use either the WPA or WPA2 encryption settings, which provide a much higher level of security than WEP encryption.
Another safeguard is to set your router not to broadcast the SSID (your network's name). With SSID broadcasting disabled, your wireless network won't be visible to computers nearby, and only people who specifically know your network's name will be able to find it. The procedure for locking down your Wi-Fi will vary depending on your router's model and manufacturer. Check the router's documentation for instructions.

3. Encrypt Your Hard Drives

Hard drives and USB flash drives are treasure troves of personal data. They're also among the most common sources of data leaks. If you lose a flash drive, external hard drive, or laptop containing sensitive personal information, you will be at risk. Fortunately, en­­crypting your hard drive can give your data an extra layer of protection be­­yond setting up a system password. Encryption will conceal your drive's data and make accessing the files almost im­­possible for anyone who does not know your encryption password.
LaCie’s Rugged Safe hard drive has a fingerprint reader that you can use to unlock your data securely.
The Ultimate and Business editions of Windows 7 and Vista come with BitLocker, a tool that lets you encrypt your entire hard drive. If you don't have the Ultimate or Business version, another alternative is to use TrueCrypt, a free, open-source tool that can encrypt your entire disk, a portion of a disk, or an external drive. For its part, Mac OS X includes FileVault, a tool for encrypting your Mac's home folder; Lion, the next major Mac OS X release on the horizon, will be able to encrypt a whole hard drive. Another option is to buy external hard drives and flash drives equipped with en­­cryption tools. Some of these drives have built-in fingerprint readers for additional security. See "Secure Flash Drives Lock Down Your Data" for more about secure flash-drive options.

4. Keep Your Software Up-to-Date

One of the simplest but most important security precautions you should take is to keep your PC's software up-to-date. I'm not talking exclusively about Windows here: Adobe, Apple, Mozilla, and other software makers periodically release fixes for various bugs and security flaws. Cybercriminals commonly exploit known vulnerabilities, and Adobe Reader is a constant target of such assaults.
Installing software updates; click for full-size image.
Sure, regularly updating your computer’s software is a pain, but installing updates can go a long way toward keeping your PC safe.

Not infrequently, the latest version of a popular program introduces entirely new security features. For example, Adobe Reader X, the newest version of the company's PDF reader, uses something called Protected Mode to shut down malware attacks. If you still use an earlier version of Adobe Reader, you aren't benefiting from Reader X's security enhancements. Most major commercial software packages come with some sort of automatic updating feature that will inform you when a new update is available. Don't ignore these messages; install updates as soon as you can when you're prompted to do so. It's a little bit of a hassle, but it can prevent major headaches later on.

5. Upgrade to the Latest Antivirus Software

If you're running antivirus software from two or three years ago, you should up­­grade to the most recent version, even if you still receive up-to-date malware signature files for the older edition. The underlying technology for antivirus software has im­­proved significantly in recent years.
To detect threats, antivirus products today don't rely solely on the traditional signature files (regularly updated files that identify the latest malware). They also use heuristic techniques to de­­tect and block infections that no one has seen yet. Given how frequently new viruses crop up in the wild, the ability to protect against unknown malware is critical.
Not sure what to use? Consult our latest reviews of antivirus software and security suites. And you don't even have to spend money to protect yourself, thanks to various free antivirus options.

6. Lock Down Your Smartphone

If you use your smartphone the way I use mine, your handset probably contains lots of personal information--e-mail addresses, photos, phone contacts, Facebook and Twitter apps, and the like. That accumulation of valuable data makes smartphones a tempting target for thieves and cybercriminals, which is why the smartphone is shaping up as the next big security battleground.
Lookout Mobile Security; click for full-size image.
Apps like Lookout Mobile Security provide basic security tools for your smartphone.

Android phones are already being hit with Trojan horses and other types of malware, and security experts agree that mobile malware is still in its infancy. Worse, many users don't think of their phones as computers (though that's what the devices are), so they don't take the same security precautions they would with a PC. If you haven't downloaded a security app for your Android phone, you should. Most smartphone security apps are free, and it's far better to have one and never need it than to get caught off-guard and exposed without one. If you have an Android phone, the first app you should install on it is an antivirus program. Besides scanning for malware, mobile antivirus apps may support such features as a remote wipe (so you can securely remove all data stored on the phone if you lose it), GPS tracking (for locating your phone if you misplace it), and SMS spam blocking.
Our favorite freebie in this category is the Lookout Mobile Security app. Lookout scans your phone for existing malware threats and automatically scans any new applications you install on your handset. Other popular antivirus apps, available for a subscription fee, are Symantec's Norton Mobile Security (beta version), AVG's Antivirus Pro, and McAfee's Wave­Secure.
Because Apple's App Store takes a more restrictive approach to apps offered for sale there, iPhone owners generally don't have to worry as much about malware, though it's always possible for something to slip through the cracks. Apple hasn't allowed any proper antivirus applications into the App Store, either, but you do have some security options.
One is a device tracking and remote-wipe service from Apple called Find My iPhone. It comes as part of Apple's paid MobileMe service ($99 per year), but Apple also offers it to any iPhone, iPad, or iPod Touch owner, free of charge. With Find My iPhone, you can lock and remotely delete data stored on your iPhone, track the device via GPS, remotely set a passcode, and display an on-screen message with an alarm sound (so you can find it if you misplace it around your house or office).
One more tip: When choosing a mobile antivirus program, it's safest to stick with well-known brands. Otherwise, you risk getting infected by malware disguised as an antivirus app.

7. Install a Link-Checker Plug-In

McAfee SiteAdvisor icons; click for full-size image.
McAfee SiteAdvisor attaches a green (for safe), yellow (for dubious), or red (for unsafe) icon to each page listed in your browser's search results.

Security threats may lurk in seemingly innocuous Web pages. Le­­gitimate sites may get hacked, cybercriminals game search engines to make sure that their infected pages come up in searches for hot topics (a technique known as "search engine poisoning"), and seemingly safe sites may harbor malware. Although you have no way to guard against these attacks completely, using a link checker can help protect you from many of them. Link-checker tools typically show small badges next to links in search results and elsewhere to indicate whether a site is trustworthy, dangerous, or questionable. Many such tools also add a status indicator to your browser's toolbar to signal the presence of any problems with the site that you're currently visiting.
Various options are available: AVG LinkScanner, McAfee SiteAdvisor, Symantec Norton Safe Web Lite, and Web of Trust are all available for free. Many security suites come with a link scanner, too.

8. Don't Neglect Physical Security

Using a laptop lock is an uncomplicated way to avoid having your hardware stolen--and it can keep your data from falling into the wrong hands.
A thief can snatch an unattended laptop from a desk and walk away in a matter of seconds. And a thief who has your laptop may have access to your files and personal information. A notebook lock won't prevent someone from cutting the cable, but it can deter crimes of opportunity. Kensington is probably best-known for its notebook locks; it offers an array of locks for laptops and desktops. Targus is a second vendor that specializes in laptop security gear, including one lock that sounds an alarm when someone tries to pick up the attached laptop or cut the lock cable.
A simple laptop lock can suffice to discourage an opportunistic thief. But don't leave the keys next to the machine.
Prying eyes are a common security hazard. To prevent unauthorized viewing of your data when you step away from your desk, always lock your screen before leaving your PC unattended. To do this, simply hold down the Windows key and type the letter L. This will bring up the lock screen. To get back to work, press Ctrl-Alt-Delete, and enter your login password at the prompt. Another way to shield your screen is to install a privacy filter over the display. These filters fit directly on a monitor so other people can't peer over your shoulder and see what's on the screen. A privacy filter may be particularly useful if you work in an "open" office that lacks cubicle walls. Various companies sell these filters, including Targus, 3M, and Fellowes.

9. HTTPS Is Your Friend

When you're browsing the Web, protect yourself by using HTTPS (Hypertext Transfer Protocol Secure) whenever possible. HTTPS encrypts the connection between your PC and the Website you're visiting. Though HTTPS doesn't guarantee that a site is secure, it can help prevent other parties from hacking into the network and gaining access to your account.
Many sites use HTTPS by default: When you purchase an item online or log in to online banking, for instance, your browser will probably connect to the site via HTTPS automatically. But you can go one step further by enabling HTTPS on Facebook, Twitter, and Gmail.
To use Facebook's HTTPS feature, log in to Facebook and click Account in the upper-right corner. Select Account Settings from the drop-down menu, and look for ‘Account Security' on the resulting page. Under the Account Security heading, click Change, check the box next to Browse Facebook on a secure connection (https) whenever possible, and click Save.
Using HTTPS on Twitter; click for full-size image.
You can easily enable HTTPS on sites such as Twitter and Facebook and on services such as Gmail to introduce an extra level of security.

For Twitter, first log in to your account. If you're using the new Twitter interface, click your account name in the upper-right part of the screen, and select settings. (If you're still using the old Twitter interface, click the Settings link in the upper right of the window.) From there, scroll down to the bottom of the resulting page, check the box next to Always use HTTPS, and click Save. To enable HTTPS on Gmail, log in to your account, click the gear icon in the upper-right corner, and select Mail Settings from the drop-down menu. Next, under the Browser Connection heading, select the button labeled Always use https. When you're all set, scroll to the bottom of the page and click Save Changes. To learn more about Gmail security, visit Google's Gmail Security Checklist page.

10. Avoid Public Computers and Wi-Fi

As convenient as free Wi-Fi and publicly available computers may be at, say, a public library or café, using them can leave you and your personal information exposed. Public computers might be infected with spyware and other types of malware designed to track your movements online and harvest your passwords.
The same is true of open Wi-Fi networks. Cyberthieves may set up rogue Wi-Fi networks that look legitimate (for instance, one may be named for the café that you're visiting) but enable the crooks to collect your personal information. Even legitimate open Wi-Fi networks may leave you vulnerable. For an example, look no further than the Firesheep plug-in for Firefox, which allows just about anyone to hijack log-in sessions for various social networks.
Sometimes, you may have no choice but to use a public computer or Wi-Fi network. When you do, don't use it to check your e-mail or social network accounts, conduct online banking, or perform any other action that entails logging in to a site. If you have access to a VPN, use it.

11. Be Password Smart

You probably know already that using obvious or easy-to-discover passwords like "password" or your pet's name is a bad idea. But how can you make your passwords significantly more secure?
1Password; click for full-size image.
The $40 1Password program creates secure passwords and manages them for you.

First, you need to use a different long, strong password for each account. Hackers often attempt to break into accounts by employing a "dictionary attack," which involves using words straight from the dictionary to guess your password. So don't use standard words as your passwords; instead, try creating them from a combination of letters, numbers, and symbols. And don't simply replace letters in a word with a symbol (for example, using the @ symbol in place of an A); it's too common a trick. You can also strengthen your passwords by using a mix of lowercase and capital letters. Basically, the more complex a password is, the better. But try to use something that you'll be able to remember--a mnemonic of some sort that incorporates various alphanumeric symbols--and that nobody but you would know.
Remembering multiple passwords can be a challenge, which is why many people find that a good password manager is indispensable. KeePass is a good, free password-management option that works on Windows and Mac OS X systems. Another possibility is 1Password ($40), which can generate and manage passwords for you.

12. Check Your Credit Report Each Year

Unfortunately, even if you do everything right, bad guys might still succeed in stealing your identity. After all, you can control who has access to your personal information, but you can't control how well a company that you do business with secures its personal-data records.
Nevertheless, you can limit the damage that would result from undetected identity theft by checking your credit report regularly. Periodically checking your credit report is a good way to make sure that no one has opened credit card or bank accounts under your name.
If you are a U.S. citizen, you're entitled to receive one free credit report every 12 months from each of the three major credit agencies--Equifax, Experian, and TransUnion--via AnnualCreditReport.com. The service will let you examine and print out your credit report for free, but if you want to obtain your actual credit score, you'll have to pay for it. Since your freebie credit report is just a once-a-year affair, it's a good idea to insert a reminder in your calendar to check in again with AnnualCreditReport.com in 12 months.

Webinar Tools (Even A Free Option)

5 Webinar Tools For Marketing Your Expertise
5 Webinar Tools For Marketing Your Expertise
33
Share
Apr 22, 2011 -
Speaking to groups is a great way to share your expertise and market your services. But it doesn’t scale, as the saying goes, unless you record the presentation. Plus, you can only do so many talks per year and still run your company.
You may have heard that producing a webinar is an effective method to reach lots of people. However, you are not sure you want to spend on one of the top three players: GoToMeeting, Webex or Adobe Connect.
Here are six free and low-cost webinar platforms that I’ve tried and are worth considering:
AnyMeeting
AnyMeeting is one of the most compelling webinar platforms online today. Not only are they completely free, but they also offer advanced features that compete with the big players. Some of those features include: up to 200 attendees, screensharing and recording, hosting of your webinar on their servers, and the ability to download it, custom branding, collect information from participants, the list could go on. The only downside is it is advertiser-supported, which means your audience will see a sponsor message. It seems a small price to pay, considering all the features.
Price: Free
GatherPlace
This webinar tool is easy-to-use and affordable. I used them for a webinar series last year and was pleased with the service and the customer support (they helped me solve audio issues with my computer). Additionally, they are Windows and Mac compatible, and you can record the event and then download the file for later use.
Price: Offers a free 14-day trial, then pricing begins at $29/mo for 5 attendees.
Fuze
Fuze is one of my favorites because of their pricing model: they offer a free 30-day trial and after, you can purchase by the day for $9.95, for up to 15 attendees. They also have mobile editions for iPad, iPhone, Blackberry and Android, and they offer many different ways to call in—via Skype, landline or if you provide the numbers of the attendees, Fuze will dial all your attendees for you and get them on the call.
Price: Free 30-day trial, $9.95 for the day
Yugma
Yugma is a powerful webinar tool with terrific incremental pricing that can work well for small meetings and webinars. They have a free version, but in order to record you need the P version which is based on the number of people you are going to have in a webinar.
Price: $24.95/yr for 2 people, plus host
Skype
Skype is a well-known brand, but mostly for its online voice-over phone offering. If you view Skype that way, then you’ll want to take a closer look—they continue to create and reinvent to stay ahead of their customers. You can conduct a video conference and share your screen now and it works smoothly, so there is no learning curve. The only downside is that there isn’t a way to record it yet. But if you only want to share a screen, on short notice even, this is ideal.
Price: Varies
Last year, I did this mega list at Small Business Trends, if you want to see even more webinar providers.

A guy calls a computer store...


 You  have to be old enough to remember Abbott and Costello, and  too old to REALLY understand computers, to fully  appreciate this.  
For those of us who sometimes get  flustered by our computers, please read  on...

 

If  Bud Abbott and Lou Costello were alive today, their  infamous sketch, 'Who's on First?' might have turned out  something like this:

COSTELLO  CALLS TO BUY A COMPUTER FROM ABBOTT
ABBOTT:  Super  Duper computer store. Can I help you?

COSTELLO:  Thanks  I'm setting up an office in my den and I'm thinking about  buying a computer.

ABBOTT:  Mac?

COSTELLO:  No,  the name's Lou.

ABBOTT:  Your  computer?

COSTELLO:  I don't own a computer. I want to buy one.

ABBOTT:  Mac?

COSTELLO:  I  told you, my name's Lou.

ABBOTT:  What  about Windows?

COSTELLO:  Why?  Will it get stuffy in here?

ABBOTT:  Do  you want a computer with Windows?

COSTELLO:  I  don't know. What will I see when I look at the  windows?

ABBOTT:  Wallpaper.

COSTELLO:  Never  mind the windows. I need a computer and  software.

ABBOTT:  Software  for Windows?
COSTELLO:  No.  On the computer! I need something I can use to write  proposals,
track  expenses and run my business. What do you  have?

ABBOTT:  Office.

COSTELLO:  Yeah,  for my office. Can you recommend  anything?

ABBOTT:  I  just did.

COSTELLO:  You  just did what?

ABBOTT:  Recommend  something.

COSTELLO:  You  recommended something?

ABBOTT:  Yes.

COSTELLO:  For  my office?

ABBOTT:  Yes.

COSTELLO:  OK,  what did you recommend for my office?

ABBOTT:  Office.

COSTELLO:  Yes,  for my office!

ABBOTT:  I  recommend Office with Windows.
COSTELLO:  I  already have an office with windows! OK, let's just say  I'm sitting 
 
at  my computer and I want to type a proposal. What do I need? 

ABBOTT:  Word.

COSTELLO:  What  word?

ABBOTT:  Word  in Office.

COSTELLO:  The  only word in office is office.

ABBOTT:  The  Word in Office for Windows.

COSTELLO:  Which  word in office for windows?

ABBOTT:  The  Word you get when you click the blue 'W'.
COSTELLO:  I'm  going to click your blue 'W' if you don't start with some  straight answers. 
 
What  about financial bookkeeping? You have anything I can track  my money with?

ABBOTT:  Money.

COSTELLO:  That's  right. What do you have?

ABBOTT:  Money.

COSTELLO:  I  need money to track my money?

ABBOTT:  It  comes bundled with your computer.

COSTELLO:  What's  bundled with my computer?

ABBOTT:  Money.

COSTELLO:  Money  comes with my computer?

ABBOTT:  Yes.  No extra charge.

COSTELLO:  I  get a bundle of money with my computer? How  much?

ABBOTT:  One  copy.

COSTELLO:  Isn't  it illegal to copy money?

ABBOTT:  Microsoft  gave us a license to copy Money.

COSTELLO:  They  can give you a license to copy money?

ABBOTT:  Why  not? THEY OWN IT!

(A  few days later)

ABBOTT:  Super  Duper computer store. Can I help  you?

COSTELLO:  How  do I turn my computer off?             
 ABBOTT:  Click  on 'START'...