fyi... http://shops.ancestry.com South Carolina: Records and Reference Item #1554 includes South Carolina Magazine of Ancestral Research (SCMAR) Volumes 1-20... The South Carolina Magazine of Ancestral Research is a quarterly magazine devoted entirely to So. Carolina Genealogy. Founded in 1973, it has become a vital resource for genealogists.
Any info on the ancestry of Miles C. Puckett b. c. 1813 SC would be appreciated. He may have been born in Union Co., SC. 1 Miles C. Puckett 1813 - 1903 . +Martha June Scott 1828 - 1845 ........ 2 Fletcher Gamewell Puckett 1845 - 1870 ............ +Sarah Snow Johnson 1844 - 1927 *2nd Wife of Miles C. Puckett: . +Nancy Caroline Scott 1833 - 1880 ........ 2 Martha J. B. Puckett 1848 - ............ +Childress ........ 2 Watson Clark Puckett 1850 - 1862 ........ 2 Miles M. Puckett 1856 - ............ +Margaret L. 1858 - ........ 2 Mary Gilley C. Puckett 1858 - ........ 2 Thomas Carlyle Puckett 1858 - 1922 ............ +Cynthia Shockley 1854 - ........ *2nd Wife of Thomas Carlyle Puckett: ............ +Luella F. Cameron - 1922 ........ 2 Samuel S. Puckett 1862 - ........ 2 Augusta Katherine Puckett 1866 - 1918 ............ +Robert Edward Lee Bower 1862 - 1941 ........ 2 John Edward Puckett 1870 - 1908 ............ +Florence Josephine Elder 1871 - 1913
Mary and Bonnie, I have the Cross book and checked it yesterday for Ouldfields - none shown. Dee For details on the reference sources used for lookups, refer to this link: http://www.rootsweb.com/~ncbladen/lookups.htm ----- Original Message ----- From: "Bonnie Baggett" <[email protected]> To: <[email protected]> Sent: Thursday, May 06, 2004 9:18 AM Subject: Re: [SC] Re: Bladen_County_lookup/OULDFIELD Morning Dee & Mary, There is a section of St. Stephen, SC known as the "Oldfield" section, hwy 52 north of the town, and there is info in Russell Cross' book on Berkeley County. This might be a good lead for you. You can get the book thru the Berkeley County Historical Society, % Anne Propst, ??? Propst Ln, Moncks Corner, SC 29461 or the Berkeley County Museum, Stoney Landing, Moncks Corner, SC 29461. Good luck, Bonnie ----- Original Message ----- From: "Dee Thompson" <[email protected]> To: <[email protected]> Sent: Wednesday, May 05, 2004 8:59 PM Subject: [SC] Re: Bladen_County_lookup/OULDFIELD > Hi Mary Frances, > > Perhaps this will help you track him? > > >From # 195 > OULDFIELD, JOHN I.D. 919 > Spouse: ELIZABETH LEWIS (MCKEOWN) > Children: JOHN > Date in Pee Dee: 1730 Last Date: 1742 DIED > Origin: Chester, England > Location: PRINCE GEORGE PARISH > Source(s): COOK, REMBERT, SMITH, H. . > Notes: DIED IN 1742 > > OULDFIELD, JOHN JR. I.D. 918 > Spouse: ANN LAROCHE > Children: MARY (POLLY) > Date in Pee Dee: 1730 Last Date: 1751 DIED > Location: HURRICANE CREEK (N. of CASHAWAY) > Source(s): COOK, TEMBERT, ROGERS, MOORE. > Notes: ANN WAS DAUGHTER OF JOHN AND MARY HORRY LAROCHE > For details on the reference sources used for lookups, refer to this link: > http://www.rootsweb.com/~ncbladen/lookups.htm > ----- Original Message ----- > From: jwcoker > To: Dee Thompson > Sent: Sunday, May 02, 2004 8:45 PM > Subject: Bladen_County_lookup > > > Do you have any information on John Ouldfield who was in S.C. at least by 1703 when he married Elizabeth Lewis McKeown, widow of Robert McKeown. He is the father of John Ouldfield Jr. who married Ann LaRoche, my ancestor. I cannot find any information on how he got to Goose Creek, S. C. , but I know (or think I know) that his sister, Mary came to Goose Creek, S. C. from Salem, Essex, Ma and married William Norman. I can find lots of information on him and his family in Salem, Ma., but no Ouldfield. That is my brick wall and has been for many generations. Mary Frances > > > ==== SCROOTS Mailing List ==== > Subscription instructions are at > http://lists.rootsweb.com/index/usa/SC/misc.html#SCROOTS > > ============================== > Gain access to over two billion names including the new Immigration > Collection with an Ancestry.com free trial. Click to learn more. > http://www.ancestry.com/rd/redir.asp?targetid=4930&sourceid=1237 > > ==== SCROOTS Mailing List ==== Subscription instructions are at http://lists.rootsweb.com/index/usa/SC/misc.html#SCROOTS ============================== Gain access to over two billion names including the new Immigration Collection with an Ancestry.com free trial. Click to learn more. http://www.ancestry.com/rd/redir.asp?targetid=4930&sourceid=1237
Morning Dee & Mary, There is a section of St. Stephen, SC known as the "Oldfield" section, hwy 52 north of the town, and there is info in Russell Cross' book on Berkeley County. This might be a good lead for you. You can get the book thru the Berkeley County Historical Society, % Anne Propst, ??? Propst Ln, Moncks Corner, SC 29461 or the Berkeley County Museum, Stoney Landing, Moncks Corner, SC 29461. Good luck, Bonnie ----- Original Message ----- From: "Dee Thompson" <[email protected]> To: <[email protected]> Sent: Wednesday, May 05, 2004 8:59 PM Subject: [SC] Re: Bladen_County_lookup/OULDFIELD > Hi Mary Frances, > > Perhaps this will help you track him? > > >From # 195 > OULDFIELD, JOHN I.D. 919 > Spouse: ELIZABETH LEWIS (MCKEOWN) > Children: JOHN > Date in Pee Dee: 1730 Last Date: 1742 DIED > Origin: Chester, England > Location: PRINCE GEORGE PARISH > Source(s): COOK, REMBERT, SMITH, H. . > Notes: DIED IN 1742 > > OULDFIELD, JOHN JR. I.D. 918 > Spouse: ANN LAROCHE > Children: MARY (POLLY) > Date in Pee Dee: 1730 Last Date: 1751 DIED > Location: HURRICANE CREEK (N. of CASHAWAY) > Source(s): COOK, TEMBERT, ROGERS, MOORE. > Notes: ANN WAS DAUGHTER OF JOHN AND MARY HORRY LAROCHE > For details on the reference sources used for lookups, refer to this link: > http://www.rootsweb.com/~ncbladen/lookups.htm > ----- Original Message ----- > From: jwcoker > To: Dee Thompson > Sent: Sunday, May 02, 2004 8:45 PM > Subject: Bladen_County_lookup > > > Do you have any information on John Ouldfield who was in S.C. at least by 1703 when he married Elizabeth Lewis McKeown, widow of Robert McKeown. He is the father of John Ouldfield Jr. who married Ann LaRoche, my ancestor. I cannot find any information on how he got to Goose Creek, S. C. , but I know (or think I know) that his sister, Mary came to Goose Creek, S. C. from Salem, Essex, Ma and married William Norman. I can find lots of information on him and his family in Salem, Ma., but no Ouldfield. That is my brick wall and has been for many generations. Mary Frances > > > ==== SCROOTS Mailing List ==== > Subscription instructions are at > http://lists.rootsweb.com/index/usa/SC/misc.html#SCROOTS > > ============================== > Gain access to over two billion names including the new Immigration > Collection with an Ancestry.com free trial. Click to learn more. > http://www.ancestry.com/rd/redir.asp?targetid=4930&sourceid=1237 > >
Hi Mary Frances, Perhaps this will help you track him? From # 195 OULDFIELD, JOHN I.D. 919 Spouse: ELIZABETH LEWIS (MCKEOWN) Children: JOHN Date in Pee Dee: 1730 Last Date: 1742 DIED Origin: Chester, England Location: PRINCE GEORGE PARISH Source(s): COOK, REMBERT, SMITH, H. . Notes: DIED IN 1742 OULDFIELD, JOHN JR. I.D. 918 Spouse: ANN LAROCHE Children: MARY (POLLY) Date in Pee Dee: 1730 Last Date: 1751 DIED Location: HURRICANE CREEK (N. of CASHAWAY) Source(s): COOK, TEMBERT, ROGERS, MOORE. Notes: ANN WAS DAUGHTER OF JOHN AND MARY HORRY LAROCHE For details on the reference sources used for lookups, refer to this link: http://www.rootsweb.com/~ncbladen/lookups.htm ----- Original Message ----- From: jwcoker To: Dee Thompson Sent: Sunday, May 02, 2004 8:45 PM Subject: Bladen_County_lookup Do you have any information on John Ouldfield who was in S.C. at least by 1703 when he married Elizabeth Lewis McKeown, widow of Robert McKeown. He is the father of John Ouldfield Jr. who married Ann LaRoche, my ancestor. I cannot find any information on how he got to Goose Creek, S. C. , but I know (or think I know) that his sister, Mary came to Goose Creek, S. C. from Salem, Essex, Ma and married William Norman. I can find lots of information on him and his family in Salem, Ma., but no Ouldfield. That is my brick wall and has been for many generations. Mary Frances
The program finds and deletes the viruses that sneak in. Thanks for your responses and your posting. MMiller ________________________________________________________________ The best thing to hit the Internet in years - Juno SpeedBand! Surf the Web up to FIVE TIMES FASTER! Only $14.95/ month - visit www.juno.com to sign up today!
Steven, great info. One thing to add is that Windows XP has a built in Firewall. It's turned off by default, but can be turned on and works. Though if you have multiple computers on the same network and you share files it doesn't work so well. The new Service Pack for Windows XP coming out this year it will be turned on by default and doesn't cause problems with file sharing. Thanks, Mike ---------------------------- X-Message: #3 Date: Mon, 3 May 2004 21:12:32 -0400 From: "Steven Coker" <[email protected]> To: [email protected] Message-Id: <[email protected]> Subject: Safe Computing Guidelines Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit BASIC SAFE COMPUTING GUIDELINES by Steve Coker, Forum Manager May 2004 1. ALWAYS USE A FIREWALL. Last year I ignored this rule for 10-20 minutes and it burned me. I was setting up a new computer and didn't install the Firewall before connecting to the Internet to download program updates. In the short time I was online without Firewall protection, two malicious worm programs got into my computer. I had to wipe the computer clean and reinstall everything. NEVER NEVER NEVER connect to the internet without a Firewall. I recommend ZoneAlarm (http://www.zonelabs.com/). Configure it for High security. You can learn how to customize program and privacy settings if high security blocks certain programs or web sites you need to use. Your online safety is worth the minor hassle of figuring out how to "tweak" the Firewall settings. REGULARLY UPDATE FIREWALL SOFTWARE. Open ZoneAlarm, click on the OVERVIEW menu, then click on the PREFERENCES tab. Make sure that AUTOMATICALLY check for updates is turned on. Click on the "Check for Updates" button to confirm latest version is installed. _________________________________________________________________ Getting married? Find tips, tools and the latest trends at MSN Life Events. http://lifeevents.msn.com/category.aspx?cid=married
Linda, I hate to say it, but having older systems can be even worse. Most older OSes are very insecure as they were built before we had to worry about all the viruses, worms, etc. And old OSes don't get security updates as well since they are no longer supported. Take care, Mike ______________________________ X-Message: #7 Date: Tue, 4 May 2004 11:35:07 -0400 From: "Linda A" <[email protected]> To: [email protected] Message-ID: <[email protected]> Subject: Re: [SC] Safe Computing Guidelines Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: 7bit According to Norton's website the only systems affected by the Sasser Worm are Windows 2000 and XP. I still have Windows 98. I guess there are advantages to having an older computer! Linda A _________________________________________________________________ Check out the coupons and bargains on MSN Offers! http://youroffers.msn.com
Mike, this is what Norton's website says: WORM_SASSER.B [Trend], W32/Sasser.worm.b [McAfee], Worm.Win32.Sasser.b [Kaspersky], W32/Sasser-B [Sophos], Win32.Sasser.B [Computer Associates], Sasser.B [F-Secure], W32/Sasser.B.worm [Panda], Win32/Sasser.B.worm [RAV], W32/Sasser.B [F-Prot] Variants: W32.Sasser.Worm Type: Worm Infection Length: 15,872 bytes Systems Affected: Windows 2000, Windows XP Systems Not Affected: DOS, Linux, Macintosh, Novell Netware, OS/2, UNIX, Windows 3.x, Windows 95, Windows 98, Windows Me, Windows NT, Windows Server 2003 CVE References: CAN-2003-0533 ----- Original Message ----- From: "M E" <[email protected]> To: <[email protected]> Sent: Tuesday, May 04, 2004 11:53 PM Subject: Re: [SC] Safe Computing Guidelines > Linda, > > I hate to say it, but having older systems can be even worse. Most older > OSes are very insecure as they were built before we had to worry about all > the viruses, worms, etc. And old OSes don't get security updates as well > since they are no longer supported. > > Take care, > Mike > > ______________________________ > > X-Message: #7 > Date: Tue, 4 May 2004 11:35:07 -0400 > From: "Linda A" <[email protected]> > To: [email protected] > Message-ID: <[email protected]> > Subject: Re: [SC] Safe Computing Guidelines > Content-Type: text/plain; > charset="iso-8859-1" > Content-Transfer-Encoding: 7bit > > According to Norton's website the only systems affected by the Sasser Worm > are Windows 2000 and XP. I still have Windows 98. I guess there are > advantages to having an older computer! > Linda A > > _________________________________________________________________ > Check out the coupons and bargains on MSN Offers! http://youroffers.msn.com > > > ==== SCROOTS Mailing List ==== > SCRoots Message Archives > http://archiver.rootsweb.com/th/index/SCROOTS > > ============================== > Gain access to over two billion names including the new Immigration > Collection with an Ancestry.com free trial. Click to learn more. > http://www.ancestry.com/rd/redir.asp?targetid=4930&sourceid=1237 > >
Board : Boards > Localities > North America > United States > States > South Carolina > Counties > Hampton Subject : Franklin Westberry Foster Date : 2 May 2004 3:55 AM GMT http://boards.ancestry.com/mbexec/msg/an/0cB.2ACE/52
According to Norton's website the only systems affected by the Sasser Worm are Windows 2000 and XP. I still have Windows 98. I guess there are advantages to having an older computer! Linda A ----- Original Message ----- From: "Margaret B. MILLER" <[email protected]> To: <[email protected]> Sent: Monday, May 03, 2004 10:31 PM Subject: Re: [SC] Safe Computing Guidelines > Steve, I read your suggestions with care. I do the things you suggest > such as using a firewall, anti-virus, updating daily, scanning for > potential viruses on a daily basis. Please tell me how these viruses get > into my computer when everything is scanned, both coming in and going > out. With the scan, they get deleted so I don't know what they are. What > is upsetting is that I have them at all. Thanks. Margaret Miller > > ________________________________________________________________ > The best thing to hit the Internet in years - Juno SpeedBand! > Surf the Web up to FIVE TIMES FASTER! > Only $14.95/ month - visit www.juno.com to sign up today! > > > ==== SCROOTS Mailing List ==== > SCRoots Message Archives > http://archiver.rootsweb.com/th/index/SCROOTS > > ============================== > Gain access to over two billion names including the new Immigration > Collection with an Ancestry.com free trial. Click to learn more. > http://www.ancestry.com/rd/redir.asp?targetid=4930&sourceid=1237 > >
I hope what you are saying is that your Antivirus program detects and deletes virus infected emails. Not that your computer actually gets infected. If that is the case, then you are protected and everything is working right. The Antivirus program is scanning all incoming email, detecting malicious code and deleting it. That is how it should work. But, If your computer is getting infected, then either the Antivirus or Firewall program isn't configured for the level of security you need, or it doesn't do the job you need done. Why do you get infected emails? Typically, when a computer gets infected, the malicious code reproduces itself and uses the infected computer's email program to spread the infection. It can do this, often without the owner noticing, by sending infected email to every email address in the computer's address book. Or to every address in every email stored on that computer. Or to every address in every incoming email the computer receives. Or all of the above. It can also forge the FROM header information so that the recipient may not know the true source of the infected message. So, if an infected computer has your address in an address book, or a stored email, or an incoming email, then that infected computer may send an infected email to you. It may do this every time a new incoming email from you is received. If one computer in an email group list is infected, it may send infected emails to each person who sends a message to the group list, every time they send an email to the group. Or, it could send infected email to every person who has ever sent a message to the group, if the infected computer has stored all the group email for a long time. Sending, or forwarding, chain emails is another sure way to get your email address into thousands of computers. Chain email increases the likelihood of getting both spam and infected emails. If you send messages to multiple email groups with hundreds of subscribers, it is highly probable that some of those subscribers will have infected computers that will send infected replies. One way to minimize this is to have a BLANK REPLY-TO address in your outgoing email. This technique only helps reduce the volume of infected emails. It won't eliminate them completely. And, it only works when the group list administrator has the Forum configured to insert the group address into emails with blank reply-to lines. This technique works with simple infections that use Reply-To addresses. It won't stop code that picks out the true From address buried in the email header. I have the Forums I manage configured to insert the Forum address when the Reply-To is blank. If an email sent to the Forum has a Reply-To address, then replies go to that address by default. If the Reply-To address is blank, then the mailing list gateway inserts the Forum email address as the Reply-To address. The gateway scans incoming emails and rejects attachments. So, the group members have a level of protection when the replies are routed through the gateway rather than directly back to individuals. It has the downside of people sending "chat" responses to the entire mailing list rather than directly. But, everything is a trade-off. Having a blank Reply-To line doesn't cause problems. By default, email programs send responses to the Reply-To address. If it is blank, then responses are sent to the FROM address. Steve Coker PS Antivirus programs I've used have the ability to log detections and actions. You could use a log to find out what the program has detected and done. But it isn't worth worrying about as long as the infected emails are always deleted and never executed. -----Original Message----- From: Margaret B. MILLER [mailto:[email protected]] Sent: Monday, May 03, 2004 10:32 PM To: [email protected] Subject: Re: [SC] Safe Computing Guidelines Steve, I read your suggestions with care. I do the things you suggest such as using a firewall, anti-virus, updating daily, scanning for potential viruses on a daily basis. Please tell me how these viruses get into my computer when everything is scanned, both coming in and going out. With the scan, they get deleted so I don't know what they are. What is upsetting is that I have them at all. Thanks. Margaret Miller
I hate to say it, but some websites have malicious scripts running on them. The sites can be for anything.. lyrics for music, reviews for movies.. anything. I actually had gone to a site searching for recipes and ended up with a browser hijack program. Needless to say, thank goodness I have restore points all over the place. I booted into safe mode and restored my system. Your best bet is to do what you are doing and also run "ad-aware" and "spybot, search and destroy". Both those programs will find and remove malicious items that the other did not catch. Both these programs also have updates that you have to check for as you use them. Also create restore points before you load any new software. This will allow you to roll back the computer should anything strange happen. Your computer should be setup to create restore points automatically throughout the month also. Also, if you can, get behind a router. That gives you a hardware firewall. You can use a router along with software firewalls if you want. With firewall software/hardware you can view log files and those files will show you when someone tries to enter into your computer via the internet. This is especially important if you are on all the time with an instant internet like cable. The log should give you information such as the ip number of the hacker. From there you can find out what ISP "owns" the ip number and send a complaint to that ISP's abuse department. I actually got a malicious program from software that came with a drawing pad I purchased for my computer. The software was one of those freebe's that was included on the CD. From that point forward my motto has been .. "If you don't need to use it, don't load it." Good luck. April Klein > Steve, I read your suggestions with care. I do the things you suggest > such as using a firewall, anti-virus, updating daily, scanning for > potential viruses on a daily basis. Please tell me how these viruses get > into my computer when everything is scanned, both coming in and going > out. With the scan, they get deleted so I don't know what they are. What > is upsetting is that I have them at all. Thanks. Margaret Miller
Steve, I read your suggestions with care. I do the things you suggest such as using a firewall, anti-virus, updating daily, scanning for potential viruses on a daily basis. Please tell me how these viruses get into my computer when everything is scanned, both coming in and going out. With the scan, they get deleted so I don't know what they are. What is upsetting is that I have them at all. Thanks. Margaret Miller ________________________________________________________________ The best thing to hit the Internet in years - Juno SpeedBand! Surf the Web up to FIVE TIMES FASTER! Only $14.95/ month - visit www.juno.com to sign up today!
BASIC SAFE COMPUTING GUIDELINES by Steve Coker, Forum Manager May 2004 1. ALWAYS USE A FIREWALL. Last year I ignored this rule for 10-20 minutes and it burned me. I was setting up a new computer and didn't install the Firewall before connecting to the Internet to download program updates. In the short time I was online without Firewall protection, two malicious worm programs got into my computer. I had to wipe the computer clean and reinstall everything. NEVER NEVER NEVER connect to the internet without a Firewall. I recommend ZoneAlarm (http://www.zonelabs.com/). Configure it for High security. You can learn how to customize program and privacy settings if high security blocks certain programs or web sites you need to use. Your online safety is worth the minor hassle of figuring out how to "tweak" the Firewall settings. REGULARLY UPDATE FIREWALL SOFTWARE. Open ZoneAlarm, click on the OVERVIEW menu, then click on the PREFERENCES tab. Make sure that AUTOMATICALLY check for updates is turned on. Click on the "Check for Updates" button to confirm latest version is installed. 2. UPDATE - UPDATE - UPDATE. Hackers are always finding ways to break into computers using flaws in software. Especially Windows, Internet Explorer, and Firewall software. When such flaws are discovered, the publishers issue updates to "patch" the security flaws. If you don't install the patch (i.e. update), then your computer is highly vulnerable to hackers. 3. UPDATE WINDOWS. You do this online using MS Internet Explorer (aka the internet browser). Open Internet Explorer, click on TOOLS, then click on Windows Update. Follow instructions to check for and install updates. 4. ALWAYS USE AN ANTIVIRUS PROGRAM. I recommend Norton Antivirus (http://www.symantec.com/avcenter/). Antivirus software has to be updated very frequently to be effective. Most programs have an update feature, use it often (e.g. Norton LiveUpdate). SCAN YOUR COMPUTER WITH THE ANTIVIRUS PROGRAM. I recommend at least once a week. If you think you have a virus on your computer, then you need to boot the computer from a clean CD with updated virus detection software. Run a full scan after booting from the CD. If the scan detects one or more infections, carefully note what was detected, then let the Antivirus program try to remove the infection. After doing this, go to the Symantec or McAfee (http://mcafee.com/) web site and read about the infection you found. If it was simple and you feel it was removed completely, then do nothing. But, if you have any doubt, backup all your data files, then wipe the computer and reinstall everything. WIPING AND REINSTALLING IS A LAST RESORT. It is VERY time-consuming and you will have to make sure you update every program after reinstalling. But is the surest way to get rid of an infection. 5. TURN OFF FILE SHARING. This is one way a hacker can get into your computer over the net. You can find out how to do this in Windows Help, or on the web (http://www.wellesley.edu/Computing/FileSharing/Windows/winxphome.html). Or just search for "Turn Off File Sharing" at http://www.microsoft.com or in any search engine. 6. NEVER OPEN ATTACHMENTS in email or instant messaging UNLESS YOU ARE ABSOLUTELY SURE that they are safe AND they have been scanned by your Antivirus program. Don't trust anyone. Even people you trust can give you an infection without meaning to do so. Always scan attachments. Your AntiVirus program should be configured to automatically scan email attachments. You may learn that some attachments are safe. For example you may routinely get safe "text only" files from certain mailing lists. But, the rule is if you aren't sure it is safe, assume it is not. A little paranoia is a good thing when it comes to attachments. 7. NEVER BOOT FROM AN UNKNOWN DISKETTE OR CD unless you scan it first using updated Antivirus software. 8. Regularly clean spyware and Adware off your computer. I recommend using AdAware for this. http://www.lavasoftusa.com/ 9. Be careful with Instant Messaging (IM) programs. Make sure you don't allow "Buddies" or "Guests" to have unrestricted access into your computer. Take time to learn about how infections get in through IM programs. 10. DON'T TRUST PEOPLE. Password protect your computer. Set a boot-up password and use a password protected screensaver. Every time the computer is turned on, the user should be required to enter a password. Don't let strangers, friends, or almost anyone know your passwords. If you aren't present, then people shouldn't be able to just turn on and use the computer. 11. BACKUP - BACKUP - BACKUP. Even if you do most things right, most of the time, the computer will still get "messed up" from time-to-time. You need to regularly backup your data files. JUST THE DATA FILES, nothing else. You can always wipe the hard drive clean and re-install all the programs. But your data files are unique and can't be re-installed. To make this periodic backup easy, store data files under one main folder, with sub-folders, on your computer (e.g. "Files" or "My Documents"). If the data files are "spread around" in lots of folders, it will be almost impossible to backup the data. Data files include anything you created, received, downloaded, etc. Examples are word processing documents (*.doc, *.txt, *.wri), Excel Spreadsheets or Workbooks (*.xls), PowerPoint presentations (*.ppt), database files, image files (*.jpg, *.gif, *.psp, *.bmp), favorites lists, etc. Remember to backup your email too. Your email is stored in data files. If you use Outlook for email, then a file named outlook.pst is probably where your email is stored. You can find the file name and location for your Outlook email by checking the PROPERTIES for the email "personal folder" on your computer. The exact location of the property setting depends on the version of Outlook you use. Study the menus or help files until you figure this out. Try right clicking on the Personal Folder and see if you get the properties option. You can also locate all *.PST files using the SEARCH option in Windows Explorer. 12. If you feel capable, and you are careful, AFTER DOING ALL THE ABOVE - you might want to run a security scanner to test your system for POSSIBLE security problems. One good security scanner is Retina (http://www.eeye.com/html/index.html). Be careful to make notes so you can undo any "fixes" you make based on such scans. If you don't feel confident that you understand what you are doing, then don't do it.
Hi I am looking for info on my family they were all from the Williamsburg or Sumter District S.C, John McElveen born abt 1700 wife Jane died 1738 Adam McElveen born abt 1737 wife Margaret McCrate William McElveen born 5-10-1757 died 4-8-1837 Adam McElveen born 5-10-1757 died 4-8-1837 wife Susan Emma Mcknight John Price McElveen born 9-17-1830 died 8-29-1906 wife Margaret Isobel Scurry thankyou Lynn Whitaker [email protected]
If you are interested in the Lawson family, please email me directly with as much info as you have and who you are interested [email protected]
In a message dated 5/1/04 12:54:12 PM Eastern Daylight Time, [email protected] writes: << In the 1860 census for St. James, Goose Creek in Charleston County, South Carolina, there is a William Dubose (age 35) with Mary (35), and the following children: Mary E. (18), Julean (15), Emma (12), Joanna (8), Mildred (3), and David (1). The next two enumerated households are also Dubose: John H. Dubose (45) and Absolom Dubose (50?). Drew Smith >> Thank you Drew , for the replie . Maybe someone might know what Mary's maiden name was . Thanks, CJK
In a message dated 5/1/2004 12:33:30 PM Eastern Standard Time, [email protected] writes: I am interested in finding out more information in regards to : Joanna Dubose born September 1854 SC died October 27, 1928 SC she married : Charles Edward BILTON Daughter of William E Dubose & ( Her mother would like to be known ) Also would like to know who William E Dubose , parents . Mary Elizabeth Dubose born abt 1843 SC died December 31, 1908 she married George W BILTON Daughter of William E DUBOSE * ? In the 1860 census for St. James, Goose Creek in Charleston County, South Carolina, there is a William Dubose (age 35) with Mary (35), and the following children: Mary E. (18), Julean (15), Emma (12), Joanna (8), Mildred (3), and David (1). The next two enumerated households are also Dubose: John H. Dubose (45) and Absolom Dubose (50?). Drew Smith
I am interested in finding out more information in regards to : Joanna Dubose born September 1854 SC died October 27, 1928 SC she married : Charles Edward BILTON Daughter of William E Dubose & ( Her mother would like to be known ) Also would like to know who William E Dubose , parents . Mary Elizabeth Dubose born abt 1843 SC died December 31, 1908 she married George W BILTON Daughter of William E DUBOSE * ? Any information on the above would be a great help Thank you in Advance for your time and your help