Tuesday, August 12, 2008

The Modding

By Expert Author: Sabeteaev Leonid

The computer design could be discussed for hours - it is almost the same as talking about art. Throughout history, the mankind has sought for a diversity of the surroundings. It is a commendable zeal, I hasten to say. So, with the advent of home and office computers, a new problem appeared. Your may not believe but it concerns the design of computer case. In the late 20th century, the computer case represented a uniform gray box with a monitor over it like some leader bust. This can not go on forever… and modding appears to help those who are unsatisfied. Modding is a vocation of home masters who can keep an instrument in the hands and who got tired of beloved computer serial design. Modders, this is what modding-lovers are called, are actively introducing new self-designed and homemade computer cases, invent new technologies and approaches to make their unique home computers so that they will stand out from the crowd and enjoy possessing an exclusive computer with heretofore unseen features, forms, etc., i.e. a real modding thing. Any modding computer consists of main serial units and components, whose appearance and features are developed and upgraded. Modding concerns not only the outer parameters of computer hardware, but also the complex technical modernizations, such as an increased processor speed, RAM starting, etc. Great success is a silent computer, i.e. the noiseless computer that has removed headache of many PC owners and allowed them sleeping at night. No modding project goes without backlighting, whose halogen illumination makes mysterious any project, emphasizes the dignity of excellent design and hides minor shortcomings and constructive lacks. An excellent contribution to any modding makes Airbrush. This is a specific trend, a way to draw with acrylic nitroenamel paints on the computer hardware using a miniature sprayer - aerograph. The computer decorated by the master will look so wonderful that people can not forget it. So, if you get interested in modding or want to do something by yourselves, visit our site.

Read More......

Accurate Time on your Computer

By Expert Author: Magdalena Sperber

An accurate time reference is very important for the use of computer software applications. Athough every Computer includes an internal clock, it pays to check time and date settings are correct on your PC every time you turn it on. For important applications, the time base should be synchronised with a highly accurate external time source. Personal Computers are not designed to be perfect clocks. Their design has been optimised for mass production and low-cost rather than maintaining accurate time. Where time is crucial to the application, there are a number of precise external references available that enable computers to maintain accurate system time. This article looks at the various sources of time references to show how they can be utilised to maintain synchronised time on your computer. Working to a synchronised time base is essential in computer networks. Without any external reference, individual computers will start to drift, anything from a few seconds to a few minutes each day. Clearly such a situation would not be acceptable when processing transactions or performing time critical tasks. On the Internet this problem has been solved by introducing the Network Time Protocol (NTP). The NTP protocol supports the distribution of accurate time from a highly precise time server to network time clients. Most modern operating systems have the ability to synchronise time with an NTP server. Generally all that is required is the IP address or domain name of Stratum 1 or Stratum 2 NTP servers. UNIX and LINUX operating Plattform is able to download the complete NTP application from the NTP website.ntp.org NTP is freely available, open source software, available under the GNU public license. Mirosoft Windows XP/2000/2003 and Vista system software use a standart SNTP client for Simple Network Time Protocol. This is based on a sub-set of the Network Time Protocol, using a simplified NTP algorithm with many of the more complex high precision routines removed. The Windows operating systems provide facilities for an IP address or domain name of an Internet or Intranet NTP server to be entered in the time properties tab. The SNTP client will then contact the NTP server periodically in order to update and synchronise system time. Alternative methods will be required for standalone computers and systems which do not have access to the Internet. These can be provided with a local access to national radio time references which are transmitted free-to-air. All that is required is a small RS232 serial or USB radio receiver, and the PC can obtain continuous accurate time. The PC system time can then be synchronised to the received time and frequency radio source. Radio broadcasts are identified by their 'call sign' The UK time transmitter call sign, MSF, is located at Anthorn, Cumbria. Similar arrangements exist in Noth America - call sign WWVB from Colarado. Germany is covered by DCF broadcast from Mineflingen, near Frankfurt. National broadcasts are also available in France, Switzerland, Japan and Canada. The only shortcoming with national radio time and frequency solutions is that they have a finite transmission range. In general they are limited to geographic boundaries also. Such issues do not apply to the Global Position System (GPS) a satellite based universal navigation system. Each GPS satellite carries a highly accurate synchronised atomic clock. This enables GPS to provide precise timing information anywhere on the face of the planet. All that is required to receive the transmission is a low cost-cost GPS receiver and antenna with a clear view of the sky. PC connections are similar to the radio transmissions configuration, using a serial or USB port, enabling accurate timing information to be available continuously. Copyright (c) 2007 Galleon Systems
About the Author/Author BioMagdalena Sperber provides authoring services about computer time synchronisation. Click here for information on Windows 2003 Radio and GPS time Server systems.

Read More......

Computer Training Course

By Expert Author: Javier Salces

There are several types of computer training course available to the person seeking to learn about computers today. In fact, the whole arena of computer training can be so intimidating that it is good to take your time in selecting what courses you are wanting to take. In this article, we will examine the outline of a computer training course that would appeal to the computer newbie. This course outline is not meant to be all inclusive, nor is it meant to be professional advice for someone looking to enter into the computer technology field. It is simply a broad outline of which subjects are suggested, and in what order, for someone to learn about computers. That being said, let's take a look at our suggested computer training course. To start, it would be a good course of action to look at classes teaching the basics of how to operate a computer. Information for this computer training course should include things like the basics of using an operating system, how to save information on a hard drive, floppy drives (although they are quickly becoming obsolete), and CD / DVD ROM drives. It is a good idea in the computer training course to also learn some basics about the internal operation of the computer (i.e., what makes it tick, how it works). It may seem like it is best to leave information on how the memory works and what RAM actually stands for to the professionals ... however, this would be a mistake. It is important even for the average home computer user to understand some of these basics, as it will impact how they use the computer and their expectations of performance under certain work loads and software compatibilities, among other things. Moving on from the basics, a computer training course should teach more advanced concepts as well. Some of these concepts would include back-up procedures, file maintenance, and data recovery. Security issues are also on the rise, with the increased usage of the Internet, and safeguarding your computer against viruses and other attacks should also be covered in a computer training course. All of these are items that the average computer user should be aware of how to operate. Just knowing this information can save you in the long run from calling that professional for a service call that could literally cost you as much as the computer did in the first place! Last, but certainly not least, every personal computer user should learn how to install and replace the basic plug-and-play circuit boards or cards that are in every personal computer. A computer training course would simply not be complete without this information. There are many parts that are truly user-replaceable, but unless you know how, you will end up paying that tech big bucks for a simple part swap. Things like that newest video card, an upgraded modem card, installing a firewire card, network card or extra USB port card are very simple. Unfortunately, unless you are selective in your outline of courses, many basic computer training courses will fail to train you in these aspects of computer maintenance.
About the Author/Author BioJavier Salces is an experienced online marketer and list building expert. To find out more on how you can profit from affiliate internet marketing visit www.listbuilding.ws/go/go.php/art

Read More......

3D Computer Graphics

By Expert Author: Dean Barnard

Powerful computers and computing capability have enabled realism in computer generated imagery. The animated films made today are realistic to a fault. For instance, Shrek 3.0 has been wildly popular because of the life like characters which inhabit the movie. 3D animation basically consists of generating depth in 2D objects by various means. Lighting and shading is a powerful way to provide depth to objects and characters. At first the model of the object is created using a number of polygons. The density of polygons or the number of polygons for a given area defines the smoothness of an object. In applications like 3D video games where real time response is more important than faithful reproduction, the polygon density is obviously less. In applications such as a animated movie, realism of scenes take primary importance. The complexity of the objects requires a high polygon density. Once the objects have been modeled, they have to be imparted motion or they have to be animated. Finally the animated objects which are essentially 3D in nature have to be converted to 2D. This process is called rendering. More the polygon density, more time it takes to render an object. It is often required to combine video and 3D images. This process is called compositing. Rendering process is one of the most important in generating a 3D image. A small bit of a movie lasting just a few seconds can take days to be rendered. Render farms and piping are phrases associated with 3D animation. Mental Ray is a renderer provided as a part of Softimage and Maya 3D packages. It is also gaining in popularity among other 3D developers. Renderman is a renderer used by Pixar and some large film production companies, for development of feature films. A number of operations are involved in creating 3D animations. The three most popular software commercially available for 3D modeling , lighting and shading are Maya, 3ds Max and Softimage .Each of the software has its strength and tools to address various requirements of 3D design and development . Maya was originally developed by Alias which has now merged with Autodesk. The developers of Maya claim its tools have superior capabilities for production of 3D animated movies. 3ds Max is also a Autodesk product, originally from Discreet. Due to its high availability and competitive cost, 3ds Max claims to be the most popular 3D software. It has an excellent game engine and is extensively used for video game development. Softimage 3D software is a part of Avid. The developers of this software claim mixed pipeline management leading to more efficiency, less time for development and uniquely suited for game development. 3D computer generated imagery has caught the imagination of the public. US based movie moguls are spending hundreds of millions of dollars to create realistic feature films. These in turn are grossing many millions of sales. The 3D computer graphics industry is therefore growing in leaps and bounds. Features like natural hair, skin and human expressions are being refined and polished, to give life like appearance to animated objects. Copyright (c) 2007 Dean Barnard.

Read More......

Computer Forensics vs. Electronic Discovery

By Expert Author: Karen Unger

Computer Forensics The field of computer forensics was developed primarily by law enforcement personnel for investigating drug and financial crimes. It employs strict protocols to gather information contained on a wide variety of electronic devices, using forensic procedures to locate deleted files and hidden information. Computer forensics tasks include capturing all the information contained on a specific electronic device by using either a forensic copy technique or by making an image of all or a portion of the device. A forensic copy provides an exact duplicate of the hard drive or storage device. None of the metadata, including the าlast accessed date,ำis changed from the original. However, the copy is a าliveำversion, so accessing the data on the copy,even only to าsee what is there,ำcan change this sensitive metadata. By contrast, making a forensic image of the required information puts a protective electronic wrapper around the entire collection. The collection can be viewed with special software, and the documents can be opened, extracted from the collection, and examined without changing the files or their metadata. Other forensic tasks include locating and accessing deleted files, finding partial files, tracking Internet history, cracking passwords, and detecting information located in the slack or unallocated space. Slack space is the area at the end of a specific cluster on a hard drive that contains no data; unallocated space contains the remnants of files that have been าdeletedำ but not erased from the device, as าdeletingำ simply removes the pointer to the location of a specific file on a hard drive, not the file itself. Electronic Discovery Electronic discovery has its roots in the field of civil litigation support and deals with organizing electronic files using their attached metadata. Because of the large volume encountered, these files are usually incorporated into a litigation retrieval system to allow review and production in an easy methodology. Legal data management principles are used, including redaction rules and production methodologies. Electronic discovery tasks usually begin after the files are captured. File metadata is used to organize and cull the collections. Documents can be examined in their native file format or converted to TIF or PDF images to allow for redaction and easy production. Common Capabilities, Different Philosophies Computer forensics and electronic discovery methodologies share some common capabilities. One is the ability to produce an inventory of the collection, allowing reviewers to quickly see what is present. Another is the ability to determine a common time zone to standardize date and time stamps across a collection. Without this standardization, an e-mail response may appear to have been created before the original e-mail.
About the Author/Author BioKaren Unger founded American Document Management. in 1989. She is an expert on of computer forensics and Electronic discovery.

Read More......

Databases and Maintaining Their Uptime

By Expert Author: Stephen J Richards

Databases provide a convenient means of storing vast amounts of information, allowing the information to be sorted, searched, viewed, and manipulated according to the business needs and goals. A computer database relies upon software to organize the storage of data. The software models the database structure in what are known as database models. The model in most common use today is the relational model. Other models such as the hierarchical model and the network model use a more explicit representation of relationships (see below for explanation of the various database models). The first database management systems were developed in the 1960s. A pioneer in the field was Charles Bachman. Bachman's early papers show that his aim was to make more effective use of the new direct access storage devices becoming available: until then, data processing had been based on punched cards and magnetic tape, so that serial processing was the dominant activity. While storing data is a great feature of databases, for many database users the most important feature is quick and simple retrieval of information. In a relational database, it is extremely easy to pull up information regarding an employee, but relational databases also add the power of running queries. Queries are requests to pull specific types of information and either show them in their natural state or create a report using the data. For instance, if you had a database of employees and it included tables such as salary and job description, you can easily run a query of which jobs pay over a certain amount. No matter what kind of information you store on your database, queries can be created using SQL to help answer important questions. Databases can be very small (less than 1 MB) or extremely large and complicated (terabytes as in many government databases). However, all databases are usually stored and located on hard disk or other types of storage devices and are accessed via computer. Large databases may require separate servers and locations, but many small databases can fit easily as files located on your computer's hard drive. Obviously, many databases store confidential and important information that should not be easily accessed by just anyone. Many databases require passwords and other security features in order to access the information. While some databases can be accessed via the internet through a network, other databases are closed systems and can only be accessed on site. The need for database maintenance is unavoidable, so enterprise data availability software solutions have been created to help businesses reduce downtime from hours or days to mere minutes or even seconds. Effective database management applications can reduce or eliminate downtime that renders a database unavailable, giving business owners and developers a flexible and powerful tool to protect the performance of their valuable business operations. Companies which provide enterprise data availability software and services help businesses manage their databases by offering services such as backup and recovery, automation of maintenance tasks, and fine tuning performance efficiency, among others. With an assessment of current database maintenance practices, enterprise data availability companies can recommend the appropriate system to implement that can solve the database management shortfalls of most organizations, playing a valuable role in the protection and longevity of their clients.
About the Author/Author BioStephen J. Richards has 25 years experience in Data Management and Information Technology. This information is provided as a public service by Neon Enterprise Software, a leading provider of IMS outsourcing. For more information, please visit http://www.neonesoft.com/

Read More......

Advantages of Notebook Computers over Desktop Computers

By Expert Author: Henery Cruz

In this era of technology almost every person are well aware of the importance of Computer. Nowadays Computer can be found in most of the houses; but considering the factors such as portability and mobility, the notebook computer is in great demand over the recent years. Notebooks or laptop computers are small, compact, portable computers. Depending on the size, Laptop computers weight between two to eighteen pounds. An externally connected adapter is used for running Laptops or they run on a single battery. Notebook battery packs need to recharge after which they may be used for power back up for few hours. Notebook computers have many advantages over personal computer. Notebook is an particularly lightweight as compare to personal computer. One major difference between the personal computer and notebook computer is the display. Different technologies and techniques is being used to produce display screens that are very lightweight. Normally Notebook computers come with a built in keyboard and a touchpad, for input. An external keyboard or mouse may also be used instead of the built in components. Notebook computers normally have a LCD and use a different memory module from that of a desktop computer. The features of the screens vary from notebook to notebook. Most display screens for notebook computers have a VGA resolution which is 640x480 pixels with 16 or 256 colors. Notebook computers or laptops are designed in such a way that they are capable of performing the same tasks as those of desktop computer. Generally notebook computers have the same components that are used in desktop computers, but components used in laptop are smaller and well optimized for mobility and efficient use of power. One of the drawbacks of laptop or notebook computers is that they are less powerful then desktop computers of the same price. Notebook computers with very powerful specifications may cost a lot.

Read More......

Inkjet Vs LaserJet Printers

By Expert Author: Monty Alexander

Printing needs have mounted over the years and the printing business has flourished. Printing solutions have been made out of the arising needs and thus came Inkjet and LaserJet variety of printing machines. Both the printers have their performance capacity and cater to different needs. Thus it is important to know your requirements before narrowing down on an option. An Inkjet printer costs cheaper than a Laser one but the needs matter in every selection. A cheaper Inkjet printer with more monochrome (black and white) usage would result in a much costlier affair than an expensive Laser purchased as an initial investment for the same usage. Thus the type of usage and the kind of requirements determine the need of a particular type of printer. If anyone prints couple of copies a day then an Inkjet printer is sufficient but if the usage is increased to a dozen copies a day then a laser printer is the option to opt. It is difficult to find an all in one printer which performs all the functions without any compromises. An inexpensive Inkjet printer will give out good quality copies but is very slow in its output. A Laser printer will give out commendable photo quality prints at a relatively faster speed but they are quite expensive. Thus choosing according to your priorities will help you narrow down on your printing needs accordingly. Inkjets produce goods quality print on black text but are very slow in their performance. The cartridges cost dearly and can really mount up on your cheap printer investment. A laser will produce quality prints at a faster rate for black text but are expensive purchases. Inkjets are more viable option for photo print quality. Inkjets have a multi-colour output. It is usually 4-colour but there are 6-colour and even 8-colour outputs available. The recently launched Inkjet printers have sizably reduced their cost of cartridges which are now in vogue again. Mostly Inkjet printers are given away when you buy a computer and they come in handy when the cost of the cartridges has been reduced. Laser printers are costly but can deliver more copies in one cartridge. Laser printers have an edge over its speedy performance and decent quality prints at a cheaper overhead. So the real comparison is not there as both the printers cater to different needs and different usages. home shop
About the Author/Author BioMonty Alexander is a well known writer. His articles cover many topics i.e. laserjet printer, online shopping, inkjet printers and many more.

Read More......

Wednesday, July 23, 2008

Computer Terminology Is An Alien Language

I have been working in and on computers for over 50 years, and yes, I am a Geek. When I lapse into computer terminology, my wife's eyes glaze over, and I hear "borrrrrrrrrrrring" from her. Suspecting she is not the only person that is illiterate when it comes to computers, I have developed a simple terminology to use when speaking to a non-geek.
First, an analogy: A computer is made of many components. They fall into 3 groups:
Memory or RAM:
Memory or RAM is your work bench. It is where the work gets done. The more memory you have, the more things you can do at the same time. Ram is measured in mega (mega= million) bytes.
CPU or Processor
Your CPU or Processor is your motor. The more powerful your motor, the faster you can get things done. Processor speed is measured in GHZ or giga (Giga= A million million) hertz.
Hard Drive
The Hard Drive is your file cabinet, the more data you can save for future use. Hard Drive space is measured in mb or mega (millions of) bytes.
See? Nothing mystical about those terms is there?
Now on to the Definitions.
Definitions
Adware Those unwanted ads that appear on your browser.
Bit A Single piece of data.
Byte A block of bits, usually 8 bits. An example of a byte would be a single letter as "A".
Browser The software that helps find what you are looking when you surf the internet.
Computer A high speed moron. It does exactly what it is told. This is not necessarily what you want it to do.
CPU Central Processing Unit. This is the heart, engine, motor of your computer.
DVD+R A format used to burn a DVD. Usually not compatible with a DVD-R drive.
DVD-R A format used to burn a DVD. Usually not compatible with a DVD+R drive.
Firewall A vital device that can be either software or hardware that hides your computer from the outside world. Windows has a built in firewall.
Firewire A type of connection to a computer. Used for connecting a device such as a camcorder to a PC. It is also known as IEEE1394. Sony calls their version "I-link".
Floppy disk A type of storage media. Floppies are no longer popular due to the limited capacity and slow speed.
Gamer A person that uses a PC primarily for playing video games. It requires a fast PC and a high level graphics card.
GHZ Giga hertz. Abbreviated as ghz. This is the speed of a processor. A hertz is a cycle.
Gigabyte A billion (thousand million) bytes of data.
Graphics Processor The component that processes and sends images to the monitor. Many demanding programs use the graphics processor as an additional processor to help the main CPU.
Hard Drive A storage unit. The hard drive is where data or applications are stored until needed again. It has non destructive readout meaning reading it does not destroy the data as in RAM.
Hi-Def High Definition as in TV. It is a very high resolution device and requires a lot of storage space.
IEEE1394 A type of connection to a computer. It is usually used by digital camcorders or external hard drives. Also known as "Firewire".
Internet The internet is a superhighway with information at waypoints scattered everywhere. In order to find where you are going, you need a browser, a url or a search engine such as Google or Yahoo.
LAN Local area network. The connection of several PCs together. They can also share an internet connection. An example of a LAN would be the 3 PCs in my house connected together. Data can be shared between the PCs.
Megabyte A million bytes of data.
Memory Also known as RAM. It is where data and programs are kept whle working or being worked upon. It is a destructive readout deivce, meaning that if you want to keep it, you must restore it. This is a concern only for programmers not users.
OS OS stands for operating system. Windows and Linux are examples of operating systems.
Processor The unit that does the work in a computer. Also known as CPU.
RAM Ram stands for random access memory. Random because you can pull data from any address, not wait flr sequential as in a hard drive.
Ram Drive A very fast retrieval device for storage. It uses memory as its media, where as a disk uses a metallic storage.
Router A device for connecting to the network. It allows several PCs to share a single network connection.
Scanner A peripheral device for reading a document, converting to a digital data stream and sending it to the computer.
Software A compilation of instructions to the processor telling it what to do in order to complete its taks. Remember, the high speed moron does only what it is told.
Spyware A snippet of instructions that is stored on your hardware without your knowledge. It then reports back to its originator what you are doing. Anti-spyware software can prevent this.
Switch A device used in a network. It usually has a router integrated into it. It also is an excellent firewall.
Terabyte Terabyte is a million million. That is a "1" followed by 12 "0"s.
Trojan Horse A snippet of software (usually malicious) that gets into your computer as a part of a legitimate message, such as email. Once activated, it can wreak havoc, even ruining a hard drive. Most anti-virus software also blocks trojans.
USB Universal Serial Bus (USB) is a type of connection to your PC. It is used to connect devices to your PC.
Virus A virus is a piece of malicious that enters your computer, usually against your knowledge that can corrupt your hard drive and thus your data.
Virus Checker Software that blocks viruses from entering your PC. Also known as anti-virus software.
Vista Vista is the latest operating system (OS) from Microsoft.
WAN Wide area network. Usually a connection of systems in several locations off the main premise or campus. For example, if you work at a company that has several locations in various cities that are connected via high speed lines, this is a WAN.
Web cam A small camera that is connected to your PC via USB or firewire can record what is going on within its view and send to your PC. From there, you can allow relatives in another location to view what is going on at your home.
Wireless In computerese, a method of connecting several PC's together. Each computer would require a wireless adapter. Routers and switches can offer a wireless connections. This eliminates the need to run cables between the various units.
Worm A snippet of programming language that is covertly slipped into your computer. When activated, it can corrupt your files, take over your browser, etc. Generally, anti virus software blocks worms.
WYSIWYG What you see is what you get. In other words, this is how your output will look.
XP Microsoft Windows operating system. XP is the predecessor to Vista.
computersprintersandmonitors.com is my computer website. Visit it for other articles on computers.
My name is Rick and I call myself The Elderly Geek. Elderly, because I am 74 years old. Geek, because I have worked with or on computers since July 15, 1957. I retired from IBM and one of my passions is computers. I really enjoy helping people with their computer problems. I have always been tech support for my family. Another is playing with video. I have just begun to become interested in internet marketing. My PC desktop is so crowded with icons, it amazes my family that I can find anything.

Read More......

How to Spy with Your Computer

By Sasko Vasilevski


Do you remember the TV show I Spy? Maybe Get Smart was your favorite because you enjoyed your spying with a sense of humor. But someone doing things on your computer that you don't want done isn't a joking matter. If you remember these shows or not you may need to be a spy concerning your computer. If you like any spy show then playing the part of a computer spy is right up your alley. But more to the point-spying may be a necessity for the security of your computer or the safety of your child or teenager.
Today's world isn't safe whether in the real world or in cyberspace. You know one thing for sure there are a lot of nuts and predators lurking around the corner of either world. These are people you don't want your child or teenager to meet. You don't want them influencing your child or teenager. You realize that these people shouldn't be on the internet at sites where children or teens hang out, but you know that they do go to those sites.
You've seen reports on TV and you've read horror stories on the net about these predators talking someone else's child into meeting them at a park or hamburger joint. Sometimes these predators are lurking in the library. You can accompany your child to the library and you can warn your teenager to be careful when doing research there. But how do you protect them from the deviants that lurk online?
There is an excellent product that is several tools in one that will be your mother's or father's helper. It will detect all internet activity for you and your child or teen won't be able to realize it is there and working. It will do its job as an invisible secret agent that is employed by you. You can get all of the details at the link in my bio and you'll see that the Keylogger is indeed a friend you need.
You can get all of this and more done and in stealth mode. No has to know but you. It will be your secret that can put your mind at ease. Conversely, if any problems are recorded you can solve then quickly before more harm is done. Put your mind at ease make your company safer. Go to Keylogger.
Keylogger is THE BEST software for monitoring internet activities on your computer. Keylogger will protect your family or business.

Read More......

Computer virus

From Wikipedia, the free encyclopedia


A computer virus is a computer program that can copy itself and infect a computer without permission or knowledge of the user. The term "virus" is also commonly used, albeit erroneously, to refer to many different types of malware and adware programs. The original virus may modify the copies, or the copies may modify themselves, as occurs in a metamorphic virus. A virus can only spread from one computer to another when its host is taken to the uninfected computer, for instance by a user sending it over a network or the Internet, or by carrying it on a removable medium such as a floppy disk, CD, or USB drive. Meanwhile viruses can spread to other computers by infecting files on a network file system or a file system that is accessed by another computer. Viruses are sometimes confused with computer worms and Trojan horses. A worm can spread itself to other computers without needing to be transferred as part of a host, and a Trojan horse is a file that appears harmless. Worms and Trojans may cause harm to either a computer system's hosted data, functional performance, or networking throughput, when executed. In general, a worm does not actually harm either the system's hardware or software, while at least in theory, a Trojan's payload may be capable of almost any type of harm if executed. Some can't be seen when the program is not running, but as soon as the infected code is run, the Trojan horse kicks in. That is why it is so hard for people to find viruses and other malware themselves and why they have to use spyware programs and registry processors.
Most personal computers are now connected to the Internet and to local area networks, facilitating the spread of malicious code. Today's viruses may also take advantage of network services such as the World Wide Web, e-mail, Instant Messaging and file sharing systems to spread, blurring the line between viruses and worms. Furthermore, some sources use an alternative terminology in which a virus is any form of self-replicating malware.
Some malware is programmed to damage the computer by damaging programs, deleting files, or reformatting the hard disk. Other malware programs are not designed to do any damage, but simply replicate themselves and perhaps make their presence known by presenting text, video, or audio messages. Even these less sinister malware programs can create problems for the computer user. They typically take up computer memory used by legitimate programs. As a result, they often cause erratic behavior and can result in system crashes. In addition, much malware is bug-ridden, and these bugs may lead to system crashes and data loss. Many CiD programs are programs that have been downloaded by the user and pop up every so often. This results in slowing down of the computer, but it is also very difficult to find and stop the problem.

Read More......

Thursday, July 17, 2008

Computer System

Maintaining your system
Adroit Data Recovery Centre Pte Ltd

Visit our homepage: http://www.adrc.net ---------------------------------------- Perhaps you have handpicked the finest computer from the I.T mall, selected the fastest processor and graphic card and slammed in few gigabytes of memory. So you thought to yourself that your machine is probably going to sustain you for the next 5 years. But little did you discover that some 6 months down the road, your computer is behaving like a Pentium 2 computer, perpetually flustering you with its choppy images, frustrating pop-ups and tremendous slow disk access.
Gradually, your computer crashes and all your data is lost on one fine afternoon. One thing you have probably missed out on is the need for system maintenance. The basic routine maintenance comprises of the 3 basic processes:
a. Data Backup
b. Malware Maintenance
c. Disk or File System Maintenance Let us address each of the processes in detail so that you can better understand how you can apply them in your system to extend its longevity. 1. What Is Data Backup?
Backing up basically means to create a redundant copy of a data so that in case anything should happen to the original data, you have a spare copy. This is typically a simple thing to do. Firstly, you must ask yourself why should you back up the data or system. If you feel that you should backup your valuable data, then you should decide and select what are the data to be backup. Depending on your needs, you may choose to backup your windows registry, or your Outlook Express mail data, or even your windows security keys.
Windows operating system's friendly interface allows you to drag and drop computer files from one storage device to another. And this can be as simple as copying a document file from your desktop into a floppy diskette or thumb drive.
But when these files gradually grow overtime, you may need to seek help from archiver utilities such as Winzip which enables you to compact your files into a single compressed file. You can then break up this large file into several pieces to be stored in several mediums such as a span of CD or DVD-Recordable.
Winzip also allows you to protect your file with encryption and a software password to prevent any unauthorized access. There are a number of backup methods you could use. 2. What Is Malware Maintenance?
Malware refers to any kind of malicious codes, objects or content that infiltrates your computer, resulting in damage and causing your system to act in an undesirable manner. Commonly, these include viruses, spyware, worms, trojan horses, spams and many more. When you're infected, you can lose your privacy, confidential data and access to your system when software and hardware are damaged. Fortunately, there're a couple of preventive measures you can take to protect yourself from malware.
Firstly, you absolutely require a working Anti-Virus scan running in your computer. This is the only one thing that you should never compromise if you frequent the Internet. Running a system without an Anti-Virus scan is practically risking your computer to 90% of all kinds of software attacks. In some cases, your hardware can fail due to a virus attack. Remember the CIH virus that attacks the computer flash BIOS that resulted in tremendous business damage during 2001?
Also, having a virus scan residing in your computer is as good as zilch if you do not take time to update the scan engine and virus pattern files. Every week, virus signature files are released for download to equip you with the latest protection. See more on how to remove virus and spyware.
Next, the choice of websites you visit plays a major factor. Certain websites contain malicious active content such as Javascript and VBscript that automatically infects your computer when they are downloaded into your computer without your knowledge and consent. (That's why they're known as spywares) If you have experienced new icons appearing in your system tray or desktop, this may be a sign that your computer has been infected.
Thankfully, those malicious active content usually lurks in pornographic and hacking websites. So if you can refrain from them, you generally safe. Nevertheless, if it is absolutely necessary to visit these sites, always disable ActiveX content running in your Internet options.
Lastly, avoid downloading, executing software or mail attachment that you are uncertain.As a rule of thumb, do not even consider opening an attachment unless the file is from someone you know and the message makes meaningful references to the file. Okay, say you have accidentally downloaded an executable file into your computer and you are pondering if you should run it because a reliable colleague has sent it to you. But you notice that the file has a weird file name such as meetingsxpzss.jpg.exe. But you are told that it is crucial that you read it now.
One thing you can do at this point in time is to scan the file for any virus infection before you attempt to open it. If the scan shows nothing, it's probably a safe file. But then again, it may be a new virus yet to be updated in your virus scan. You can either wait and apply the next virus signature update and perform a second scan or risk it all, cross your fingers and open the file.
If you ever decide to do this, you can take an extra step to protect your organization by disconnecting from your network during the process. If you suspect you have been infected, try to remove the spyware or virus immediately before they propagate to harm your entire system or network.
Always make it a point to update latest operating system or software patches to shield against any security issues.
3. Disk Maintenance
Did anyone tell you that your hard disk is a pretty tricky machine? When you first installed your operating system, you may be pleased to know how smooth and efficient your software applications are running. But gradually, it slows down and this bothers you. What truly causes the dip in performance? You may argue that your disk is just a couple of months old. This has much to do with the way you operate on your system.
Try to imagine a big tool bucket filled with gadgets. Initially, the bucket only contains a few spanners, a hammer and some screws. So every time you search for a particular item, it is relatively easy to find. But soon as you keep pilling the bucket with all sorts of items and especially when the amount of items grows, you'll discover that you may need more time just to search for a particular screw head. In such cases, uninstall any unnecessary software and defragment your disk. Typically, your system performance will dip when the amount of data in your hard disk starts to grow.
Next, would you be surprised if I were to tell you that 30% of your data in your computer may be junk files? Temporary files are stocked up in your computer each time you browse the internet or perform an installation. Most programs clear these files away after it exits but unfortunately, software that are poorly written do not. Thankfully, Microsoft Windows comes with a couple of useful utilities which helps to solve some of these problems.
The disk defragmenter packs your data neatly to facilitate quick accessibility. Disk Cleanup does the job of scanning and removing all redundant temporary files. Unnecessary startup files could also be cleaned up. And to cope with physical error such as bad sectors, ScanDisk helps to repair and recover any data lost due to mild data corruption.Your could also fix minor system file corruption or repair the corrupted system files essential for the system operation. If you suspect the installed software is giving you problems, try to repair the software corruption.
So now you see that there is more to just picking and plunging a speedy hard disk drive into your computer. Healthy and regular disk maintenance practice can greatly benefit your system and data.
http://www.adrc.net/ Adroit Data Recovery Centre Pte Ltd

Read More......

Is It Time To Buy A New Computer?

Piter Gursky

Is It Time To Buy A New Computer?
With the Internet and computer technology developing every single day, you might want to give your old computer a long break it badly needs.
Computer has gone a long way from being just a mere typing machine.
If you want to know whether you need to box-up your old computer or buy a new one, here's a quick checklist:
Operating system Run only in Windows 95/98 (or older operating systems!) Old operating systems won't allow you to add on scanners, printers, or dig cams. It also won't allow you to run newer programs.
Updated RAM If your computer takes forever to load up, chances you need to add more RAM. Some old RAM chips might not be available in the market anymore and they don't come cheap too.
Small hard disk space Isn't it frustrating when you come to the point that you have to delete older files to make space for your new ones? This clearly states that you badly need a new hard disk. The market now offers as much as 500 GB for personal computers.
Software doesn't run If new software doesn't work on your computer, then it is no longer compatible with new programs in the market, and you absolutely need to change your system.
Slow processors If you are doing some graphic works on your computer, then it suddenly bogs down, then you are in trouble. Older computers don't even come close to opening website with large graphics.
If you find yourself in the above situation, then it's high-time that you buy a new computer. Below are some quick tips that can do you a lot of help:
Tips in Buying Computers
The first thing you need to ask when buying a computer is "what would it be used for?" If you just need to type up writing assignments or do some office works, then a computer with a decent word processing program would go. If you were using the Internet often, then you would need a computer with 128 MB of memory and at least Pentium-2 processor.
If you do some graphics, edit pictures or create videos, aside from higher RAM and larger space, you need a good video card to view your work as actual as it can be. Also check the compatibility of other devices like scanners and printers to your computer. If you are decided to buy a new computer, then allot at least $500 of your budget. If you want a high-end computer then it definitely costs a lot more than that. Don't think that you get the best deals when you buy a computer on a cheap price. Always go for quality, it's a total headache if your computer acts up in the middle of your work.
When buying a new computer, think properly what you need before heading to a computer shop. It is also a good thing to have a chit-chat with a computer salesperson. Ask them all the things you want to know. With enough patience, the right computer for you is just one decision away. For more info you may want to visit htt://www.baytradecomputers.com
Piter Gursky is Internet marketing expert who writes for various companies including BayTradeComputers.com (discounted computers and networking). Find out low priced computers and networking at http://www.baytradecomputers.com/

Read More......

Link Load Balancing

highreplica highreplica

Load balancing is the even distribution of computer processing and communication activities so that a server is not overwhelmed. Load balancing is especially important for networks where it is difficult to predict the number of requests that will be issued to a server.
Link Load Balancing balances out critical resources on data networks with unpredictable requests issued to a server.
For example, a web site with heavy traffic may employ two, three or more servers in a link load balancing program. The link load balancing routines enable a network to “juggle” more traffic that otherwise possible If one server is overwhelmed, the link load balancing scheme forwards them to a different server with extra capacity.
Another aspect to link load balancing concerns the communications channels themselves. In this case the “juggling act” is meant to better distribute processing and communications demands more equitably across the network so that no single a computer is overwhelmed by the demand.
Link Load Balancing - Key Features & Benefits First and foremost is “availability” - 24/7 Application Availability for complete IP Application access. Local and Global Service providers rely on redundancy and link load balancing between servers, WSD units and distributed sites for complete server continuity across global networks
Performance Network Bottlenecks - Link Load Balancing Network managers are constantly seeking new solutions for eliminating bottlenecks and latencies for the fastest performance of all networked applications and web-enabled transactions. The idea link load balancing technology combines both unlimited application scalability with flexible traffic distribution management of data centers and server farms.
Network Security - Link Load Balancing Link load balancing is a key element in the overall network Intrusion Prevention effort. Expert Link Load Balancing guards the network against internal and external attacks such as viruses, worms, Trojans, anti-scanning and protocol anomalies. Above all hovers the ultimate link load balancing challenge and network threat – DOS - Denial of Service.
Remember the song, “Take a load off Annie” Just listening to it makes you feel nice and relaxed… For maximum performance and 100 percent uptime, networks use link load balancing to even out resource use throughout the network.
Radware is the global leader in link load balancing solutions delivering maximum performance and security of critical networked applications. For more information on link load balancing , visit RadWare.
highreplica is the author related to [Load Balancer, Dual Port Router, Multiple Gateways, Server Load Balancing] (link: http://www.xrio.com/xrionet/) Xrio provide solutions for bandwidth management, load balancing, link bonding, server load balancing, multiple gateways, global traffic management, wan optimization, wan performance, isp, adsl, sdsl, dual port router, high availability router, local director, multihoming router, vpn clustering.

Read More......

Flash Drives

Flash Drives Made Simple
Lucas Kent

Eventhough most of our lives are stored on computers, many people still neglect to have a back up for their files. In the past backing up files was time consuming and required individual to use numerous floppy disks and/or cds. Today the flash drive is making backing up and transferring files quick and efficient.
A flash drive is a small, portable data storage device that plugs into the USB port of a computer. Flash drives are popular because they can hold a considerable amount of data and are fast, reliable, and portable. Before you go out and purchase a flash drive here are a few things you should consider: 1) Choose one that suits your style and will stand up to daily wear and tear. 2) Flash drives can hold 32Mb to 4Gb of data find a drive or drives that suit both your current and future needs, as your requirements for more capacity may grow. In terms of budget, as a general rule price increases with capacity. 3) Make sure that the drive is compatible with your PC and that it comes with software and/or it is easily downloaded from the web. 4) Ensure that the drive has write protect to avoid accidental erasure and if privacy is a concern, make sure that the drive can be password protected. As an educator I have found that having a flash drive saves me time and in the long run saves money.
Mr. L. Kent is an experienced educator and president of MrKent.Net - Education Technology Made Simple.

Read More......

The Quick and Byte-Free Tips in Buying Computers

Erwin Dulog

Buying a PC? With hundreds of brands and models out there, the choice is just overwhelming. You don’t want to end up with something puny, but neither do you want something too loaded with features that you don’t need anyway.
How to start then?
When you’re buying a computer, the first thing to decide is whether you need a desktop or a laptop. With that out of the way, you need to know then which features you want in your computer, as well as which PC manufacturer you want.
The primary benefit of buying a Windows-based PC is the popularity of the Microsoft Windows operating system. These computers have been top-of-the-line in terms of software compatibility, claiming about 90% of the market share. Most software application developers think about Windows first, while Mac second.
However the Apple Mac computer does have some advantages with regards to speed and performance. The Macintosh performs extremely well in terms of graphical editing, video, and multimedia, making more efficient use of memory and processing power. Macintoshes might have quite a number of profound strengths, but because of their low market share they can sometimes be found wanting in regards to compatibility with mainstream business software.
Once you’ve decided on the PC, the next thing to consider is the price. Be aware that computer manufacturers have a price tag that represents the barest bones computer and most probably, you’ll end up paying hundreds more dollars than the initial price tag once you have included all the configurations you need. Don’t be fooled by believing you have great value because of all the software that is included. Often you don’t need half of it.
Finally, consider the tech support offered by the company after purchase of your PC. Remember, you may get a really great deal, but if the computer breaks down, will you get the after sales support you need?
Erwin Dulog recommends [IMReach] (link: ”http://www.myoptimind.com/”>Optimind) for a Customized Web Design Sevices.

Read More......

System Strategy and Motherboard

Zahir Shah

Motherboard is the subsequent most important component in your systems to the processor. It and its main components like chips, BIOS, cache etc are the main system that utilises to organize the rest of the computers, supposing the processor is the brain of a compute.
Motherboard and his contained components is almost certainly most critical part of knowing to how a PCs work usually.
Following are the some of important functions which a motherboard plays on your systems:
Organization: Every part of your PC is finally connected to the Motherboard and in the track of that actually it is intended and laid out dictates how the whole PC is going to be organized.
Manage: Chips and BIOS program which included in motherboard organize the most data flow within the computer and motherboard.
Communication: Approximately all communication between a computer and its components, other PCs, and you, the user goes through the motherboard.
Processor Support: U could not include your desired processor but motherboard will dictates to which tip of processor they have required. Actually u will need of this information while u have to buy computer with a custom built computers like http://www.arbico.co.uk, they will allow u to prefer your desired components for your motherboard. Peripheral Support: For building a custom built PC, motherboard resolves to which type of components can include in your computer. However you can use quality peripherals in your computer according to your motherboard.
Performance: For two important causes, motherboard is a main determining factor in your PC. The first and a leading one is that the motherboard determines to what kind of memory, hard disk, system buses and processor use in a system to make it speedier, and these peripheral provide directly your systems performance. The second one is the quality of the motherboard circuitry and chipset which have an influence on the motherboard performance.
Upgradeability: How to enable u for a system upgrade, the ability of your motherboard give u the accurate direction. For instance, there are some motherboards like http://www.arbico.co.uk/Motherboard-p-1-c-357.html that will accept regular Pentiums of up to 133 MHz speed only, while the others will go to 200 MHz.
http://www.arbico.co.uk/ seo@arbico.co.uk Zahir Shah

Read More......

How To Select The Best Student Laptops

A Laptop Buying Guide For Students
Tim Childree

Laptops are the perfect educational tool for students. They can handle an innumerable amount of tasks and serve many different functions that allow students to consolidate all of their class assignments and home studies into one convenient location, which simplifies workflow and increases productivity.

The two most important things to look for in a student laptop are portability and battery life. This laptop will likely be carried in a backpack or shoulder bag from class to class, so you will definitely want a system that is light and easy to transport. There is also no guarantee that you will have access to an auxiliary power supply in your classroom or on campus, so you will most likely want a battery that lasts up to several hours per charge. Desktop real estate can be limited in your class, so you want to make sure your laptop is compact and economical in size, preferably around 14" X 10" in general dimensions.
As far as individual specifications, you can get by with most base configurations. A 1.66GHz processor, 512MB of RAM, a 40GB hard drive, and a standard DVD/CDRW drive should suffice, but you may wish to upgrade certain components depending on whether or not you intend to use your notebook for any extra curricular activities, such as gaming or multimedia production. Unless you intend to do higher-level networking, or unless your school requires domain-based authentication to access the school network (check with your IT department), Windows XP Home Edition should more than meet your needs for an Operating System.
Laptop computers have become the single most resourceful device a student can use for school. From providing instant access to a cornucopia of information for researching purposes to being able to process, edit and store a lifetime of documents and papers, laptops enable students to keep up with the intense demands and deadlines of academic life by providing them with the tools they need to better organize and execute their daily tasks and assignments whether at home, in class, or on the go. Please, check out these recommendations for the best notebook computers for students.
This article may be republished freely as long as this copyright notice and box of resource links are included at the bottom.
Copyright © 2007 MALIBAL, lLc
MALIBAL is the Home of the World's Fastest [laptops] (link: http://www.malibal.com/products/laptops/index.shtml) and unrivaled 24-hour USA-based support.

Read More......

Difference Between Impact Printers And Nonimpact Printers

Computer Printers
Makabongwe Maseko

What are printers? A printer is an output device that prints characters, symbols, and perhaps graphics on paper. The printed output is generally referred to as hardcopy because it is in relatively permanent form. Softcopy refers to temporary images such as those displayed on a monitor.
Printers are categorized according to whether or not the image produced is formed by physical contact of the print mechanism with the paper. Impact printers have contact; nonimpact printers do not.
Impact printers
An impact printer has mechanisms resembling those of a typewriter. It forms characters or images by striking a mechanism such as a print hammer or wheel against an inked ribbon, leaving an image on paper. Impact printers are dying out; however, you may still come in contact with a dot-matrix printer. A dot-matrix printer contains a print head of small pins that strike an inked ribbon, forming characters or images. Print heads are available with 9, 18, or 24 pins; the 24-pin head offers the best print quality. Dot-matrix printers permit a choice between output of draft quality; a coarser-looking 72 dots per inch vertically, which may be acceptable for drafts of papers and reports, and near-letter-quality, a crisper-looking 144 dots per inch vertically, which is more suitable for a finished product to be shown to other people.
Dot-matrix printers print about 40-300 characters per second (cps) and can print some graphics, although the reproduction quality is poor. Color ribbons are available for limited use of color. Dot-matrix printers are noisy, inexpensive, and they can print through multipart forms, creating several copies of a page at the same time, which ninimpact printers cannot do.
Another type of impact printer is not used with microcomputers. Large computer installations use high-speed line printers, which print a whole line of characters at once rather a single character at a time. Some, called chain printers, contain characters on a rotating chain; others, called band printers, contain characters on a rotation band. Speeds of up to 3000 lines a minute may be possible with these machines.
Nonimpact Printers
Nonimpact printers, used almost everywhere now, are faster and quieter than impact printers because they have fewer moving parts. Nonimpact printers form characters and images without direct physical contact between the printing mechanism and the paper.
Two types of nonimpact printers often used with microcomputers are laser printers and ink-jet printers.
Laser Printer: Like a dot-matrix printer, a laser printer creates images with dots. However, as in a photocopying machine, these images are created on a drum, treated with a magnetically charged ink-like toner (powder), and then transferred from drum to paper. - There are good reasons why laser printers are so popular. They produce sharp, crisp images of both text and graphics, providing resolutions from 300 dpi up to 1200 dpi, which is near-typeset quality (NTQ). They are quiet and fast. They can print 4-32 text-only pages per minute for individual microcomputers, and more than 120 pages per minute for mainframes. (Pages with more graphics print more slowly.) They can print in many fonts (type styles and sizes). The more expensive models can print in different colors.
- Laser printers have built-in RAM chips to store documents output from the computer. If you are working in desktop publishing and printing complicated documents with color and many graphics, you will need a printer with a lot of RAM. Laser printers also have their own ROM chips to store fonts and their own small dedicated processor. To be able to manage graphics and complex page design, a laser printer works with a page description language, a type of software that has become a standard for printing graphics on laser printers. A PDL (page description language) is software that describes the shape and position of letters and graphics to the printer. PostScript, from Adobe Systems, is one common type of page description language; HPGL, Hewlett-Packard Graphic Language, is another.
Ink-jet printer: Like laser and dot-matrix printers, ink-jet printers also form images with little dots. Ink-jet printers spray small, electrically charged droplets of ink from four nozzles through holes in a matrix at high speed onto paper.
- Ink-jet printers can print in color and are quieter and much less expensive than a color laser printer. However, they are slower and print in a somewhat lower resolution (300-720 dpi) than laser printers. Some new, expensive ink-jet printers print up 1200 or 1400 dpi. High resolution output requires the use of special coated paper, which costs more regular paper. And, if you are printing color graphics at a high resolution on an ink-jet printer, it may take 10 minutes or more for a single page finish printing.
- A variation on ink-jet technology is the bubble-jet printer, which use miniature heating elements to force specially formulated inks through print heads with 128 tiny nozzles. The multiple nozzles print fine images at high speeds. This technology is commonly used in portable printers.
Things to take into account when buying a printer, is the printer easy to set up? Easy to operate? Do I need color? or black will do? Does the manufacturer offer a good warranty and good telephone technical support? Otherwise its wise to own your own personal printer and get to know the answer to these questions.
Makabongwe Maseko offers advice on computers and technology on his weblog "Computer Latest News Technology". For more information and tips on technology and computers visit: http://computer-latest-news-technology.new-technology-information.net/

Read More......

Quick Guide on Buying Personal Computers

Are you planning to buy your first PC or you would like to purchase a new one? There are hundreds of brands and models available online and on traditional PC stores which makes choosing a computer an overwhelming task.
Computers are definitely an investment so be careful on choosing because you don't want to spend your money to end up with something unreliable or those loaded with features that you wouldn't need anyway. Below are quick tips and guides on buying a Personal computer;
1. What is your alloted budget? You could dream of having the most high end personal computer but will your fund tally with it's price tag? Set a range for the amount that you are willing to spend, keep in mind that you will be buying an investment so don't be too frugal but at the same time do not overspend.
2. Decide whether you need a desktop or a laptop. Will you need it for computer works that can be done at home or do you need a portable laptop which you can bring at the office, school or almost everywhere.
3. Determine the features that you want in your computer. Will you need something with basic specs or do you need a customized PC that can cater to your gaming or multimedia needs. Do you want a PC with built-in web cam or would you want to buy it separately.
4. Have a short list of PC manufacturers that you want and trust your money on. You can research online for reviews and testimonials about PC lines.
5. Choose the Operating System(OS) for your computer. Most PCs are Windows-based because of the popularity of Microsoft's OS & most software are compatible with their OS. On the other hand their main rival is Mac, who boasts their speed and performance. It is highly recommended for multimedia creation which involves graphics or video editing. But the main disadvantage is most popular softwares do not support Mac's OS.
6. If possible, select the software that will be included and make sure that those that will be installed are the applications that really need because often times you would pay for additional costs for installed software that you don't even use.
7. Check out the technical support offered by the company. It will be handy to have a reliable and accessible sales support if your computer breaks down .
Before buying a PC and after reading these quick tips, you can browse online for product reviews, price comparison and more! As mentioned earlier, personal computers are investments so it won't hurt to research a thing or two before deciding what PC to buy.

Mei Galang recommends the Classifieds section of OzFreeOnline.com which have the best selection of computers and other gadgets. Visit OzFreeOnline today for [free ads posting] (link: http://classifieds.ozfreeonline.com/) or view listings and get the best deal in computers!

Read More......

Why Do Computer Users Need Backup

Computer Files Backup

Makabongwe Maseko

First whats the meaning of backup? Back up is the name given to diskettes, or disks that can store copies of programs and then stored elsewhere.
Even with the best of care, any disk can suddenly fail for reasons you cant understand. Many computer users have found themselves unable to retrieve data from disks that worked perfectly the day before, because some defect has damaged a single track or small sector.
Hard disks do crash. Any personal computer system can be hit by power overloads, water or misconducts.
Thus, users and big or small companies should always think about backup. The best protection if youre writing, designing, researching something is to make two copies of your data. One copy may be on your hard disk, certainly, but duplicates should be on tape, disks or removable hard disks cartridges, recordable CD-ROMs or flash drives.
If you are backing up less than 10MB, you can use diskettes since that is the most they can take, if you are backing up more than 10MB, then a tape, disks or flash drives can be more efficient. If you work with files daily, then you would be most secure if you backed up all your files every day. If you work with files only occasionally, you need to determine how often backup is needed. And remember to keep the backup media in a different place. If your computer system and your backup disks are in the some structure and the place burns down, your backup is obviously worthless. So consider moving them to a different place or location.
Some microcomputer software programs provide automatic backup. One program would be with Colorado scheduler. What you do is you insert your disk in the disk drive and with a single mouse click on the Colorado scheduler icon, the computer takes care of the backup.
Almost all large computer systems have scheduled automatic backup of either full backup or only those files that have changed since the last backup session.
You should note that some storage medias last longer than others. We have seen tapes deteriorate day by day. And will eventually deteriarate in the next 5 years. But this also depends on how its stored. Hard disks cartridges have shelf life of about 10 years, according to most hard disks manufactures. You can get MO drives but they are more expensive yet also more durable.
The life span of a CD-ROM disk is almost unlimited. Thus you need to archive your backup material before deciding on a storage medium.
Now, be sure to have a timed backup strategy. By this, if you add and change data every day, set your backup software (if you have one) to back up those files every night. And you could keep two storage cartridges: a working one and one stored in safe place. Then exchange the cartridges on weekly bases.
Backing up your information and research has to be a must in your life. If you have not lost any work due to computer crushes, disk damage, or viruses then you better backup you data before it happens. Dont wait for it to happen to you.
Makabongwe Maseko offers advice on computers and technology on his weblog "Computer Latest News Technology". For more information and tips on technology and computers visit: http://computer-latest-news-technology.new-technology-information.net/

Read More......

Wednesday, July 2, 2008

Search Computer

Finding that perfect computer can be a challenge when the standards are always changing and you have no idea what the best computer for your needs is. It seems that the “best” computers are from different manufacturers every computer season. So just how do you get your self the best deal on the computer that is perfect for you?One thing to remember is never forget about the basics - the hardware.

Notebook computers basically require three things to run. They need ample hard drive storage space to record great amounts of files without fear of using up all the storage space.They also need plenaty of RAM. This short-term memory is the process essentially runs open applications, so the more of it your Laptop Computer has, the faster and greater amount of multitasking it can get done. Notebook Computers need a super fast processor to juice up the online experience plus the speed of your applications.Dont forget to inspect the included options that a Laptop Computer offers. Depending on what you require your Laptop Computer for, you might need mobility such as wireless Wi Fi technology, USB and FireWire ports, and mobile chip technologies like Intel's new Centrino. Accessories should focus on a Notebook Computer's primary benefit over desktops, which is, of course, mobility.Don’t forget to compare the best of its class with the middle of the road model. Sometimes the best and fastest is not needed for your purposes and you will just be wasting money on power you will never use. This is a list to help you know which elements to look for that all top-breed computer laptops possess.Just as you would when buying your desktop computer, you need to consider your needs when you’re looking for laptops. No longer is their primary purpose their ability to be carried. Now there are laptops strictly made for playing video games. Others are packed with the high-tech graphics programs to design these video games. While other notebooks are loaded with business capabilities such as Bluetooth wireless access and FireWire ports. You need to decide what you want it for and buy accordingly.If you are looking for portability, then many laptops today are made in a mini size and this is being embraced by consumers worldwide. The world of technology is becoming less cumbersome. The ease with which people are able to conduct business, communicate and have fun using technology pushes the industry to create small versions of just about anything and laptops are no different.In the end, there are the other things that make a laptop great. If you are looking for one of the better computers, you need to take all the elements into consideration. Body weight, chassis style, screen size, battery life - these are the elements that some shoppers overlook.Lee Dobbins writes for The Technology Webzone where you can learn more about computers, cell phones, PDA's and other technology.Article Source: http://EzineArticles.com/?expert=Lee_Dobbins

Read More......

Computer's Data Security: Necessity and Myth

There is no 100 % protection for your computer. But this doesn't mean you cannot prevent you data to be unauthorized accessed.
Once I was chatting with my colleagues about the security issues and the ways the information can be protected. Our main goal was to understand if the Dekart family products can be used for assuring data access protection. We were talking about existing software, about the devices available for buyers and about the percentage of an assurance we can get from these tools available on the modern market so far.

We also touched the other side of protection: it's vulnerability. We came to the conclusion that it is not simple to get the information protected, as there are many well-established strategies and methods developers (to say nicely), whose target is to get to know what is valuable for you.
But anyway there are the directions we can work on in order to minimize the risks for unauthorized access to our data. Here are they.
1. If you want to protect your data it is important to assure the building (office, home), security access and protection. There are many security agencies available on the market, which can be of real help. They have different protection strategies and tools. But as this is not directly related to your computer we will let the specialists in the area to let us know about it and we will move forward.
2. Hardware protection. There are many tools available for computer protection, like physical computers locks, which may be locked through a hole in the desk/object, or can be locked to a mounting bracket affixed to the vertical surface. There are different kits, mostly consisting of security cables and locks. These anti-theft devices are designed for Notebook laptops and PCs, with special requirements adjusted for different models.
3. Computer data access limiting. There are tolls and software, which may be used for home and business computer access protection. The multifactor authentification (with password, pin code and biometric data) can be used with Dekart Logon software, which can be of real help for storing all passwords to Windows machines on one removable storage device and add the strong authentication and convenience to the standard Windows logon procedure.
4. Information encryption. While we were talking about these issues, we were able to note that there is a tool which can protect data, even if it is stolen, even if there will be the most brilliant software hackers working on getting to know it. It is amazing! We were surprised to get to know that any important data can be stored and encrypted with Dekart Private Disk, which an easy-to-use, reliable, user-friendly and smart program. It is of real help in creating encrypted disk partitions (drive letters) to keep private and confidential data secure. It uses 256-bit Advanced Encryption Standard. So, here is a no risk solution to protect data!
5. E-mail protection.
6. And the last important thing to note is don't forget to assure that you have the same plans for the part of the world, as God has in terms of earth cracks, tsunami, etc.
Together with our colleagues we came to conclusion that there is no perfect security environment, although it is not wise at all to stay unaware of the risks existed and to minimize the solutions to this issue available. At least we were satisfied with Dekart Products we were testing, so we decided to get Dekart Private Disk and Dekart Logon.
This is not so difficult topic to understand. We just wanted to encourage you to think of solutions existed. Just look for the information and act!
(More on Dekart Logon http://www.dekart.com/products/authentication_access/logon/) (More on Dekart Private Disk http://www.dekart.com/products/file_disk_encryption/private_disk/)
Ceban Liuba Born in 1974 in Ukraine (former USSR) Now lives in Moldova Since 1998 works on Internet Since 2004 works in the IT security Software Company as a Technical Writer

Read More......