Join me at my Facebook group
Check me out at Pinterest
Join me at my Yahoo Group
View your cart.


January 29, 2007

Using a pair of pliers, have your husband add a pin on each end. It’s takes a hard squeeze to put them in securely. Afterall, you don’t want the pins falling out. Its easier to put them in if the frame is flexed open.

Viola’! You have a bag with a rigid top that will stay open or shut.

What’s New


Worms?? Yep, worms.

We thought about adding a wormy apple to the family tree of designs but was afraid it may offend someone so we left it out. However, I’ve been receiving communications from some of you this past couple of weeks that I left out that very special family member that seems to reside in all families.

 With that in mind I made a worm patch in 2 sizes that you can add to your apples. It will be up to you, the project maker, whether or not to add it to your family tree.

See a hex frame assembled in the open & closed position click here

This bag holds an 18” hex frame but I put a 16” frame into it so it would add a little gather.

Take Advantage of our Advance Sales Offer on our new book coming out next month

 This Book includes
Full Size Patterns for

    2 trees each in 2 sizes
    Apples & Leaves in 4 sizes
    Hearts in 2 sizes
    2 Variations of Dogs and Cats
    Worm in 2 sizes
    Miniature tree with apples for left chest

*4 Methods to personalize the apples, hearts, & animals
*Sew Method for making a sweat shirt into a jacket
*Sew Method for lining the jacket
*3 Quilt Layouts
*Quick Quilt method - Sew and No Sew
*3 Label Variations
*33 Machine Embroidery Designs on CD for the 4x4 hoop

You probably have a few bags about the house that could use a Hex frame.  I don’t know what I would do without them for my crochet projects - things don’t fall out when its shut either!

Albert’s Cubicle

SPAM and Email Caller-ID

     In recent weeks, I have noted a rise in both the quantity and quality of malicious SPAM. A lot more suspicious attachments with inducements to check out the attached “thank you card.” Some rather convincing phishing emails posing as large banking institutions advising me to contact them immediately, “with the link provided,” to avert an impending threat. Observing and dealing with this activity over the years, makes one a bit jaded and insensitive to these attacks. Like watching violence on television – both real and fictitious – it is no longer an attention grabber. Still, a big part of my job is understanding the latest trends in how hackers hack.

     One aspect of this activity that piques my curiosity is understanding from where and whom these attacks originate. When I understand from what part of the Internet community such activity originates, then I can effectively tell my computers that they are not allowed to play with other computers from that part of town.

     However, to understand who and where, I must understand how to look for the real address of the offending email. To do so, one must look at the IP (Internet Protocol) address. Every computer and every website has a unique IP. Even Laura's Sewing Studio has its own unique IP. is merely pseudonym created to make it easier for folks to find us. After all, we might change our IP address like we might change our mailing address, but we'll always be

     There is a relative long, boring, and esoteric set of rules for defining and assigning IP address, by which the Internet community follows. For our purpose, an IP is merely a set of four numbers ranging from to, separated by periods. Each number can go from 0 to 255, yielding just shy of 4.3 billion addresses.

     So now that we know what an IP is, how can we find the IP of a malicious email? The rules are little different to every email client. Many folks use Outlook Express (OE), so let's discuss how to peek at an IP from within OE. I warn you now that it is a little tedious in OE.

     If you find an email in your inbox that you suspect of being malicious spam and want to find out from where it came, do the following.

    • Place the mouse cursor over the offending email and click the right mouse key to bring up the pop up menu.
    • At the bottom of the pop up menu is Properties. Click on Properties.
    • A window appears showing the general properties of the email. Click on the Details tab found in the top left corner, next to the General tab.

     Under the Details tab is shown the header information of a the email.

     Inside the header of an email is contained its entire history from start to finish. To find the IP address from which it originated, look for a line that starts with “Received:.” When looking at the headers of SPAM, several such lines will be found with a few extra inserted to confuse and misdirect. To find the real one with the originating IP, look at the last few “Received:” lines. In the example below, the very last “Received:” entry is worthless, because it has no accompanying email address in it. The one above it, that is changed to red text, has an IP of “” and the email address

    Return-path: <>
    delivery-date: Mon, 11 Dec 2006 21:10:37 -0500
    Received: from xxxx by with local-bsmtp (Exim 4.62 (FreeBSD))
    (envelope-from <>) id 1Gtx6G-000LR7-Pb
    for; Mon, 11 Dec 2006 21:10:36 -0500
    X-Spam-Checker-Version: SpamAssassin 3.1.7 (2006-10-05) on
    X-Spam-Status: No, score=0.8 required=5.0 tests=EXTRA_MPART_TYPE,HTML_MESSAGE autolearn=no version=3.1.7
    Received: from [] (port=2773 helo=dnffnlh) by with smtp (Exim 4.62 (FreeBSD)) (envelope-from <>) id 1Gtx6B-000LQR-Vw for; Mon, 11 Dec 2006 21:10:32 -0500
    Received: from tklqng ([]) by dnffnlh with Microsoft SMTPSVC(6.0.3790.0); Tue, 12 Dec 2006 10:10:17 +0800

     Yes, the above header came from a SPAM email.  More importantly, because the IP from which it originated is now known, an informed decision was made with how to deal with future SPAM originating from that same part of town.  No, The IP did not tell reveal the real name and address of the spammer, but the Internet neighborhood in which she lives was clearly identified.

     In the next installment, we will look at how to identified the Internet neighborhood and how to put Internet Security Software to work keeping them at bay.

Only $19.95 and includes bookrate shipping US Until Feb 14, 2007

What the heck is a HEX frame?

Simply stated, a Hex frame is a rigid metal frame that fits along the top edge of a bag which opens into a hexagon (6 side) shape and holds the bag open until you snap it shut.

This is our Family Tree Bag. It is a ready made denim bag 17 inches tall and 19 inches wide. The top edge of the bag is turned under and hemmed.

This is a hex frame unassembled. It has 2 identical long sides  with a loop on each end. It also has 2 pins. When the 2 sides are placed on top of one another the pins will fit into the loops holding the 2 sides together.

With a pair of sharp scissors cut 2 slits into the hem on the frontside near the side seams. Cut 2 slits into the hem on the backside near the side seams (4 cuts total). Use fray block on the cuts and let it dry.

Slip one side of the hex frame into the front hem. Slip the other side of the hex frame into the back hem.

Extra Extra

Backorders - All thread backorders have been shipped.

We have received a new shipment of  #60 weight Mettler Cotton Thread. It is available in large spools sold at a discount.  This cotton thread has a lovely sheen and doesn’t produce alot of lint in the bobbin area like other cotton threads. This is the thread you want to use for your lace.

We have plenty of VILENE.  This is precut and packaged in 2 yard lengths and is 72” wide (that’s 2 yards wide). Discount price includes free 1st class shipping within the US.

Terms for Re-use and Redistribution

If you would like to share these newsletters with your friends, please be fair and send them to this website to read it.

If you are a teacher or retailer and would like to use the information contained in these newsletters in your classes please distribute the contents in its entirety giving full credit to Lauras Sewing Studio and its authors.

Copyright Laura Waterfield 2006




Laura's Sewing Studio embroidery designs are for personal use. Designs and copyrighted images are intended for private, non-commercial use. Laura's Sewing Studio entitles the purchaser only to make projects for personal use. The embroidery designs are the copyrighted property of Laura M. Waterfield. No design, documentation, or associated graphic distributed as part of this collection may be shared, re-sold individually, re-packaged, or used in any commercial endeavor or instructional presentation without the written consent of Laura's Sewing Studio. Any modifications of these embroidery designs are for the personal non-commercial use of the purchaser only and may not be sold or distributed under this licensing agreement.

If your friends want these designs, please send them to this website. .Both your integrity and patronage allow us to continue with new product development, while keeping down cost and maintaining quality support.

Thank you for your patronage and happy sewing.

Laura Waterfield

Copyright Laura M. Waterfield 2002-2017


Click to join Lauras_Sewing_Studio

Join my Yahoo Group and  allow me to send you updates via email. In exchange I send out free designs with some of my updates.

In order to receive the free designs make sure you select “Individual Email” as your Yahoo group settings.

Once you join, check for more FREE Designs in the Files section of the Yahoo group.

View some of the Yahoo Group free designs here

View examples of the current email free designs here.

Paypal Verified
Join me at my Facebook group
Check me out at Pinterest
Join me at my Yahoo Group
All site content is copyright Laura Waterfield 2002-2017 All rights reserved