100 Percent Campaign™ - Support

100 Percent Campaign™ graphic of your tax money on fire, representing the waste from welfare fraud and abuse.

Verify 100 Percent of Welfare Applications with Home Visits to Prevent Fraud and Abuse!




Support:

The support section of the website provides information to help you make best use of the website and the resources made available here. Some of this information is for those who are relatively new to using the internet, while other information is useful to beginners and advanced users alike. This section is under development and information will be provided on an ongoing basis and as the need arises.




How do I download a file from the Internet?

To download a file from the Internet using a link to the file in a web page, right-click on the link, and then select the "Save Link As...", "Save Target As...", or similar option on the context menu that pops up. Then select the location where you want to save the file.




What is a "PDF" file and how do I view or print it?

A PDF file is a "Portable Document File" that can be created, viewed, and printed using freely available commercial and free open source software. It has a file type extension of ".pdf". PDF has become a de facto standard for electronic documents and forms storage and exchange. A PDF file cannot be edited without special software, and even then the ability to edit it may be limited. More often, the original word processing, spread sheet, viewgraph, or other file is edited or re-generated, and then a new PDF file is created from the new version of the original file. The PDF file format supports various document security features that can limit the user's ability to select, copy, or print the document's content.

Some PDF files are forms that allow the user to fill in data in specified fields and then print the filled in form, but the data entered by the user cannot be saved without special software. One way to save the completed form for future viewing or printing with the user-supplied data is to install free or commercial software that allows you to create a new PDF file by printing it and selecting the PDF file creator as your printer. See the section below on creating PDF files.

Many web browsers allow you to view and print these files either as is or after installing plug-in piece of software. These files can be saved to your hard disk drive or other storage media, and viewed and printed using a web browser or a free dedicated PDF file reader program, whether or not you are connected to the internet. The PDF file format was invented by Adobe Systems and has become a standard file format for saving, sharing, distributing, viewing, and printing documents in a format that looks similar to or the same as the document would appear if it was viewed or printed in the original application program that created it.

Download Adobe Reader, a free commercial program to display and print PDF files, for the operating system running on the PC you are now using:
http://www.adobe.com/products/acrobat/readstep2.html

Download Adobe Reader, a free commercial program to display and print PDF files, for any of a variety of operating systems:
http://www.adobe.com/products/acrobat/readstep2_allversions.html




How can I create PDF files from downloaded and taylored leaflets, brochures, and letters from the Resource Center?

After you have downloaded and taylored leaflets, brochures, and letters for your local community, organization, legislators representing your election district, and/or your contact information, you may want to create PDF files the put on your web site or to distribute in emails. There are excellent free programs available for PCs running the Windows and Linux operating systems. Below is a list with descriptions and download links for PDF writer/creator software.

IMPORTANT:   After you have created PDF files from your taylored original files, remember to KEEP COPIES OF YOUR ORIGINAL FILES, so you easily make corrections or changes to the original files and re-generate the PDF files. Otherwise, you will have to recreate the taylored files which wastes valuable time that is better spent supporting the campaign in other ways.


CutePDF™ Writer (Windows)

CutePDF Writer is an excellent free commercial program for creating PDF files from PCs running the Microsoft Windows operating systems from Windows 98 through Vista. CutePDF Writer installs itself as a "printer subsystem". This enables almost any Windows application that can print documents created with the application to create professional quality PDF documents by printing the document to the printer device created when you install the CutePDF Writer software. CutePDF Writer is FREE for personal and commercial use. There are no watermarks or popup web ads.

Download Page:
http://www.cutepdf.com/Products/CutePDF/writer.asp

CutePDF FAQ:
http://www.cutepdf.com/Support/faq.asp#Writer

Download Files
(you will need both files unless you have a Postscript to PDF converter installed)

Latest version of CutePDF Writer - Ver. 2.7 or later; 1.54 MB for ver. 2.7.
http://www.cutepdf.com/download/CuteWriter.exe

Ghostscript version 8.15 (GPLGS8.15) or later, 5.01 MB vor ver. 8.15:
http://download.cutepdf.com/download/converter.exe

Installation Requirements:



OpenOffice (Windows - 93 MB, Linux - 120 MB, Mac OS X - 135 MB)

OpenOffice from OpenOffice.org is an excellent free open source office suite that supports the Windows, Linux, and Mac OS X operating systems. It allows the user to save files in PDF format. It is often included in Linux distributions, including the Knoppix live boot CD/DVD versions of the Debian Linux distribution, available from Knoppix.com. Knoppix can be downloaded for free as a very large CD or DVD sized ISO disk image file, and then burned onto a blank CD-R or DVD-R/DVD+R disk. For Windows, you can download the somewhat large OpenOffice installation file.

Download Pages:
http://download.openoffice.org/index.html
http://download.openoffice.org/2.2.1/index.html?focus=download

About OpenOffice.org:
http://about.openoffice.org/index.html

System Requirements:
http://www.openoffice.org/dev_docs/source/sys_reqs_20.html




 
   
GLOSSARY
   
Term or Acronym Definition
 
FAQ Frequently Asked Questions - A list of common questions and answers, usually on a specific topic or on related topics. Reading FAQs is an important part of "netiquette", or "Internet etiquette". Website users should read any available FAQs before posting or emailing questions to see if their questions has already been answered.

Posting or emailing a question that is already answered in a FAQ or that is easily answered by doing a simple search in one of the common search engines (such as Google or Yahoo) is considered rude and unprofessional in many internet communities. On the other hand, stating in a posted or emailed question that you read the FAQ(s) and used search engines and still could not find the answer to your question will usually get you quick, helpful, and friendly responses.

ISP Internet Service Provider - the business or organization that provides end users with the network connectivity between their PC and the Internet.
   
PC Personal Computer - usually in a desktop or laptop format, but can be in a much smaller form factor.
   
Phishing Phishing emails are fradulent SPAM emails that claim to be from a business, usually a large bank or business with many customers, where you may have an account, and try to convince you to click on a link to visit their web site. They attempt to trick you into providing personal identification and financial account information that is used to steal your identity, hijack and misuse your existing accounts, and open up new accounts using your stolen identity. They obtain cash and make purchases using your identity, ruining your credit rating and possibly getting you charged and prosecuted for fraud. Additional information is provided below, under Phishing.
   
SPAM Unsolicited, unwanted mass-distribution email, usually sent for commercial purposes, but sometimes sent for political or other purposes. Also known as "junk email" or "bulk email". SPAM is a serious nuissance and cost for the recipients of the SPAM and for their Internet Service Providers (ISPs).

SPAM is also used by "black hat" hackers to infect PCs with virsuses, worms, and trojan horses that may delete or compromise files on the hard disk, install dangerous or even illegal files or software, and take control of the infected PCs and use them to attack business or other web sites.

Never send SPAM, and never respond to any SPAM you receive no matter how attractive or sincere the offer or appeal for help appears. Never click on any links or images, or download, open, or run/execute any files contained in SPAM emails you receive, or you may infect your computer with a virus or worm.
   




What is "Phishing"?

Phishing involves phony and fraudulent SPAM emails that appear to come from your bank, phone company, or other business where you may have an account. They attempt to trick you into giving up your personal information so they can steal your identity and obtain cash and purchase products using your identity. This identity theft can ruin your credit rating and even get you charged and prosecuted for fraud that you did not commit, but that was committed against you and businesses. Phishing emails often have misspelled words, grammar errors, and strange use of the English language that is typical of someone in another country who has a limited knowledge of the American dialect of the English language.

The phishing email will usually create a false sense of urgency, by claiming that your account has been or may have been violated and you must provide your personal information to prevent the account from being closed or to change your PIN code or password to prevent a thief from accessing your account. The email will ask you to either directly provide the information, or more often, click on a link to take you to the phisher's web site to enter the information. Phishers often use hacked unsecured websites as part of their operation, making them more difficult to track down. They may even be in another country such as Russia, China, or Nigeria.

The information requested by phishers usually includes personal information such as your full name, account numbers and PIN codes or passwords, social security number, driver license number, birth date, mother's maiden name, address, and phone number. This is information that a legitimate bank or business where you do business would already have, or does not and should not have. This personal information is used to take money out of or charge purchases to your existing accounts, or open up new accounts in your name that are used to obtain cash and purchases in your name.

Often, the phishing email contains a link to a website that is a copy or simulation of a portion of the real business web site. Phishers often target customers of large banks and companies with many customers to increase the percentage of their SPAM emails that will reach actual customers of the businesses. Even if an email claims to be from a business where you have an account, you should treat it with suspicion. If you have any questions about an email you receive that may be phishing, do not click on any link in the email. Instead, call up the business using a hone number you already have, or look up the phone number using the usual methods. If you want to visit the web site for the business, type the known web address of the business into your web browser.




Copyright © 2007 Michael D. Robbins


            Download the award winning Mozilla Firefox web browser for free!             Valid XHTML 1.0 Strict             Valid CSS!