Choosing the Ideal Laptop For Your Work!

Laptop computers are basically an alternative to desktop computers. They have larger screens, are more powerful, have faster processors and are portable. The best thing about any laptop is this portability element. You can carry it anywhere; it is just like a walking desktop computer. Smaller versions of laptops are the notebooks and they are easier to carry around. Today there are many laptops available in the market and you will have to be precise in exactly what you want.

If you can do without the newest cutting edge techies then do away with them. They are an added jargon if you are not going to use them. But one thing that you need to keep in mind is that you will not have a choice of getting the parts you want. Unlike a desktop computer, laptops are compact and have only those things which the manufacturer is willing to supply you. Therefore it is a rule that when you buy a laptop, get one from a branded company. This will ensure that the parts inside are not fake or of poor quality. Usually every brand has different laptops depending on the combination of the processor speed and RAM. It is best to select you processor size and then see which other options you want. Intel processors are the best in this regard and you must get Intel for your laptop.

1. Pricing for this will be around and above of twelve hundred dollars and be ready to spend more. Moving on to the screen size, you will have to choose that for yourself. It depends on how much strain your eyes can take; anything lower than a fifteen inch screen is not recommended. Get a 1GB memory as it will be the best to run everything from Windows Vista to Windows XP. You can go for a RAM of lower size but your laptop will become incredibly slow and these basics will help make it work faster. The hard drive is another issue that you should look at. If your work requires you to store a lot of data then a big hard drive is a necessity.

However, if your work is mostly internet based with not much physical storing of data involved then a lower hard disk will be fine. But make sure that it is a minimum of 40GB to start with. Other than this DVD's will do all the other storage.

2. Another must have is a DVD writer. Your work may not involve writing much stuff but you might require writing at some point and then not having a writer will cost you much pain. So get a writer, even if additional cost is involved, and say thanks to you. Other accessories like a Bluetooth port or a wireless port is worth having. If you need them for your work then get them otherwise keep them, you can use them at any time. But, your laptop will surely cost a minimum of thousand dollars if you want a decent one. Laptops are available for six hundred dollars also but they will not be so great and so efficient. However it is entirely dependant on the type of work you are going to do in it. So, keeping these considerations in mind get the laptop which suits your work and purpose.

Special things at laptops

Laptops have the same components as desktop computers, we only need to look after some components:

- Battery

If you go on the road where is no electricity you need a good battery so that your laptop will work without it.

- Modem, PC-CARD, web card

You need at least one of this components so your computer can be connected to the internet.

- Weight

If you are planning to carry your laptop around in a backpack you should look after the weight of the laptop.

All other components you can find on our website in the menu at left side.

Guide to Buying computer
Laptop buying guide

Article Source: http://EzineArticles.com/?expert=Jan_Kdo


read more...

Top 10 Tips for Internationalization

There are two kinds of software internationalization you can refer to - built in to the product from the start, and performed on existing code. The kind of internationalization (i18n) this article invokes isn’t the sort that’s designed into a product right from conception. That is less common, though the pull of global markets is changing that tide. Few application development teams have historically had the opportunity to incorporate world market foresight. They had to produce a product to market for the most immediate business requirements. So then most internationalization happens on existing code because someone sells something, a global company buys another company, or a strategic initiative has taken form. Suddenly there is a new requirement for software to work in any number of new languages and locales. Business requirements drive technical schedules first, rather than involving a creative path of inventing new cool functionality or products from the ground up.

I’m tempted to just write Don’t Panic, carry a towel and avoid Vogon poetry - and while you’re at it, Unicode’s pretty good stuff. I’m being flippant because internationalization efforts tend to each have their own unique challenges when you get into the details. I’ll instead provide this article as a series of i18n process tips that apply across the board. In general Internationalization (i18n) is messy, full of exceptions, and generally not considered optimally from a development perspective. Maybe that should be tip one.

Tip One: Internationalization is ugly. Expect that from the start. You are reverse engineering basic logic of how your software inputs, stores, retrieves, transforms and displays data. You are adding user interaction functionality that your product wasn’t originally designed to do. It’s rarely just about embedded strings. There are a lot of things that can go wrong. It’s a lot of work. In some cases you can run into weird stuff from areas such as compilers, middleware, database connectivity, and even low level operating system issues.

Tip Two: Get the big picture questions handled quickly. That is, what are the high level requirements, how much time do you have, how much time do you need and how much budget can you get? Be prepared to ask for what you need in the CFO’s or CEO’s language.

Tip Three: Remember what’s driving this - Revenue. Internationalizing a complex application is a big new requirement. Don’t underestimate. Being late will cause delays in revenue, stall marketing and sales investments and make you very unpopular. Do it poorly and rushed, and your product will be shabby for the very new customers you seek.

Tip Four: Do some good research or get help identifying requirements. For instance, consider language only as one aspect of a locale. English is a language. Yet England is a different locale, with different expected behavior than the States. Consider numerical formats, dates, times, postal addresses, phone numbers, paper size, currencies and more. Then add the specifics that your application may need, like any possible customizations of workflow, locale selection and more. Consider what the optimal character encoding implementation strategy is for your computer platforms, application tiers, programming languages, database requirements, etc.

Tip Five: Get some good code intelligence. Tools like our Globalyzer software let you comb through your source and identify all kinds of internationalization issues right up front. It’s way better to get a good inventory of what you need to inspect and change, rather than hunting through your myriad lines of code trying to anticipate all kinds of variable conditions using grep, and then trial and error your way through the boatloads of issues you’ll miss.

We are just adding a new capability to Globalyzer called Diagnostics. It will give you summary information internationalization readiness and issues found in your code. It’s fully functional even with just a trial Globalyzer license. No excuses, it’s free to use all you want.

Tip Six: Prepare for nests of difficulties depending upon your programming language(s), database and third party products. Programming languages rate differently in terms of difficulty to internationalize. For instance C and C++ are harder, with many hundreds of potential issues, compared to Java and C#, which have quite a bit of internationalization baked in. But Java and C# don’t internationalize themselves. You have to use their frameworks, which are very capable. The good thing is that when a programming language has well designed internationalization capability, the work goes faster.

Tip Seven: Third party products can cause some challenges. They are not always built for your new internationalization needs. For instance, a couple of years ago we worked on a product that used a third party product for displaying animations in a kid’s game. At first glance, you wouldn’t think it would be an issue, as there was no text being processed or displayed. But when we looked at things more closely, user name and file path info was being passed into the animation tool, which in this case could very well involve wide characters (e.g. Chinese). But the particular version of the animation product, could not support this and so it would always crash. The fix took time and some inventiveness.

Another example involved a third party product that generated a spreadsheet view. While data within the cells was handling Kanji just fine, tabs were corrupting. The third party product provider had declared their product Unicode compliant, but in practice it wasn’t done all the way through. The choice became to find a better third party product to replace this one, or get the spreadsheet provider to fix their product -which they may or may not want to do on your schedule.

Tip Eight: Remember your i18n fundamentals. Don’t embed strings or concatenate them. Watch out for sorting. A and Z are not the beginning and end of all alphabets - some languages don’t use the concept of alphabets. Don’t hardcode fonts. Remember your interface Geometry will need to expand. Use functions, methods or classes that adapt to locale needs. Use Locale adapting sorting (i.e. java.text.Collator class in Java) or let your database perform sorting for you whenever possible.

You can automate aspects of repetitive like string externalization using Globalyzer. It makes that tedious job go much faster.

Tip Nine: Account for merging code with parallel feature developments. This can be tricky, as your new feature development cycles could be quite different from your internationalization milestones. In most cases, be prepared to branch the code for internationalization efforts.

Tip Ten: Use Pseudo Localization (PseudoJudo in Globalyzer) to perform many internationalization functional tests before your localize. That means you add pad characters from target locales to the beginning and end of strings, and stretch the whole string based on target requirements. You’ll then be able to see how those strings behave in your display and moving through application tiers, without your engineers needing to understand the target language.

Bonus Tip Eleven: Plan for QA to take longer than it did when your app was just monolingual. Remember, you have internationalization functional testing and bug fixing, with new testing cases, and then, should you be localizing, you have linguistic testing.

by: Adam Asnes read more...

How To Troubleshoot Your Computer Hardware

There could be many reasons why you’d want to troubleshoot your computer, well, one actually and that’s because something is not working right. The process of troubleshooting is something you learn after working for a long time with computers. Often enough when there’s a problem, nothing is going to explicitly tell you what is causing the problem and how you can fix it. By taking logical steps and walking through the process of troubleshooting you should be able to solve almost any computer problem, software or hardware related. It involves identifying the problem(s), finding the cause of that problem, determining the solution, executing that solution, and testing and checking that solution to see if it solves your problem.

As an example let’s say one day while using your computer the screen suddenly turns all black and you can’t see anything. We found a problem now what would be the first step to take to fix it? First check to see if the monitor is on and is receiving power, most monitors when they have power, but no connection or connection problems with the computer will display a message that says this monitor is working, but make sure you check your cables. So the next logical step to take would be to check the cable to make sure it is properly connected and secured to the VGA slot behind your computer case and to make sure the monitor cable is plugged into the monitor. Now, here’s where you have to decide what would be the next best course of action to take. you could either swap out your monitor with another monitor that you know is working to see if the problem is the monitor itself and nothing else or you can try to see if the problem is your graphics card. If your replacement monitor works, good, then you know your culprit is a bad monitor and you’ll most likely have to get a new one, because monitors are dangerous and too costly service. If the replacement monitor you used shows up a black screen as well, the next thing you’d do is check to make sure the graphics card is properly seated in the motherboard, if it is and the display is still not showing up, then swap out the graphics card to see if your problem is fixed.

Generally there are only so many steps you can take before you solve the problem and everything is back in order. Make sure that before you start testing and swapping out parts that the problem wasn’t caused by you changing a software setting in Windows or some ambiguous option in the motherboard’s BIOS that causes your problem.

Motherboard

The motherboard is the heart of the computer, every part of the computer relies on the motherboard to function correctly. It maintains connection between every PC component and ensures that things are operating smoothly between them. Many signs of motherboard failure is that the computer won't boot up, not reaching the POST test, erratic system behavior, different combinations of components not working. Because everything is connected to the motherboard certain parts may or may not work correctly if the motherboard is faulty so be sure to test those parts before thinking they're dead and getting new ones.

Be sure to do a visual inspection of the motherboard to make sure all cables are seated properly, the fans are spinning, and that the CMOS battery is in it's proper place.

Also check for any broken or leaking capacitors, those can immediately render a motherboard dead.

Make sure that all of the jumpers are set correctly as well, you should be able to find jumper information in your motherboard's manual, and if you don't have the manual you should be able to find the manual on the Internet at the motherboard manufacturer's website.

Many of the problems caused by a bad motherboard is also similar to problems caused by a faulty or dying power supply, so be sure to check if the power supply is faulty or swap it out for another to see if your problem is fixed. If you have a spare motherboard you can try swapping out the motherboard to see if that solves your problem, if that's the case then the motherboard is most likely faulty. If you think the motherboard is faulty and it is still in warranty you should be able to send it back to the manufacturer for a new one with no hassle, sometimes they might even pay for the shipping & handling if it is a big problem that is happening with a certain line of motherboards. Make sure that when you open a motherboard you keep all of the packaging and the box, and if there are any stickers that will void the warranty if removed make sure you do NOT remove them, so that way it is easier to send back.

Power Supply

If you suspect your power supply is giving you trouble, make sure you check it out fast, because power supplies can make trouble with the rest of your system as well. Irregular voltages sent from the power supply can short circuit and overheat your components thus frying them and making them unusable. Some faulty power supplies have even caught on fire, but if you’re lucky it might just smoke a little and start to smell. A few signals that your power supply is bad or is going bad would be erratic and seemingly random system behavior like system hangs and crashes, and burning smells along with smoke.

If you recently upgraded your system or added new hard drives, disk drives, a graphics card or anything for that matter, be sure to check if your power supply is being overloaded with hardware. A good way to check is to use a power supply calculator. One time when I upgraded my system with a new fancy PCI Express 16x Graphics card, well it was fancy back then, I had problems with the graphics card performing while in 3d games, it was all due to my power supply being unable give it enough juice on the 12v rails so it performed poorly and didn’t act as it should have, I even swapped out the graphics card for another one believing it was bad, after checking the manufacturer’s forums it seemed like a lot of people were having problems with faulty cards, so I figured mine must have been faulty too. After getting the new card it seemed like it performed better for a little bit longer, which could’ve just been some optimizations they did to circuit board. Seeing how they sent me an upgraded version of the same card, but it wasn’t until I checked my power supply wattages that I found the real culprit.

The first thing to do to diagnose your power supply is check the power supply connectors, make sure everything is plugged into the motherboard and the power cable is plugged into the power supply, you wouldn’t believe how many people forget to plug in their computer. Many power supplies also have a power switch on them so check to make sure that no one accidentally or purposefully switched it off maybe for a prank. Check the fan to see if it is spinning at the correct speed and if it’s dusty vacuum it out. Determine if the power supply cables are giving out the right amount of voltage, if you computer will let you boot you should be able to check them in the BIOS menu to see if the correct voltages are being given. Normal power supplies give +3.3 volts DC, +5 volts DC, -5 volts DC, +12 volts DC, and -12 volts DC.

Memory

Faulty RAM can have many adverse effects on your system. Constant lockups, computer rebooting, memory error message (duh), system crashes, and sometimes refusing to boot up are all signs of memory errors. Though, these are also signs for motherboard, hard drive, and power supply problems too. Luckily for you if you think your memory is subject to causing a disruption in your system there are programs that can check the memory for it's performance and to see if it is generating any errors.

Memtest86+ is an amazing memory diagnostic program. It is based off of the original Memtest86 that has been around since 1994 and is used by system-builders, average joes, and professionals in the IT world. It's a standalone memory check test which means it can be easily run without a bootable operating system, that's good if you can't just seem to get your PC started and want to rule out your memory as quickly as possible.

How To Use Memtest86 With Your Floppy Drive To Test Your Memory

First go their website at www.memtest.org and select the most appropriate version to download. You can download the bootable iso or the Pre-compiled floppy drive depending on whether you want burn a CD or use your floppy drive. We're going to go into details on floppy method.

Open up the .zip and extract the files to a folder, then click on install.bat, you will be asked to “Enter target diskette drive:”. Type A and hit enter then it will ask you to insert a formatted diskette into drive A: and press -Enter-: after you hit enter it will write some files to your floppy so you can boot your computer with the floppy to test for errors.

After the floppy has been formatted with Memtest86+, leave the floppy in your floppy drive and reboot your computer. Remember to set your floppy drive as the first boot device in your BIOS menu.

The program will automatically load and perform the memory diagnostic tests on your computer. During the testing if there any errors they will show up and at the end of the test it will tell you how many errors you've had.

After testing your memory if you receive any errors you should make sure that your memory is okay either by swapping it out and seeing the problems still occur or try your memory in another system. If the memory passes the tests then you proceed to troubleshoot something else with good faith that your memory is fine.

Hard Drive

The hard drive is that ultimate safe to everything important on your computer. It keeps all of your information, files and folders, music, videos, favorite websites, and programs. With a bad hard drive there's no reason to have a computer. In terms of fixing a computer if the hard drive isn't salvageable then most people don't even want to bother with the rest, because their computer is probably a piece of junk that has been handed down from time to time. Generally when a hard drive is about to fail it's usually years down the road from first acquiring the computer. So the next best option rather than replacing the drive is to just buy a new computer, or build a new one, because your old one sure is probably not running as fast as it used to.

Luckily before your hard drive kicks the bucket there is usually a few warning signs:

Abnormally slow file transfers

Problems with booting, especially when Windows is being loaded

Corrupted files

Disappearing files or folders

Loud hard drive noise is a good sign that there is a mechanical problem going on inside

If your hard drive exhibits any of these signs be sure to transfer all of your files to another source immediately, and do not continue to do day-to-day activities with that hard drive. If it doesn't show any of these tell-tale signs, however you have a gut feeling that your hard drive is on the brink of destruction you can try using many different drive testing utilities available on the internet. The hard drive manufacturer usually has at least one qualified tool that you can download from their website and run. Other ways to check the health of your hard drive involves running the Windows Error Checking tool by right clicking on your hard drive in 'My Computer' then selecting 'Properties' and going to the 'Tool' and clicking on “Check Now”, or checking the SMART status located in your motherboard's BIOS. SMART stands for Self-Monitoring, Analysis and Reporting Technology. Most motherboards nowadays has this technology. It should be automatically enabled in your BIOS, if it's not then your hard drive won't get checked. What it does is on boot up it will perform quick tests on your hard drive to ensure it is running correctly and it will continue to monitor it for any errors or abnormal problems that may occur as long as the computer is turned on.

Monitor

Watching movies, videos, playing games, and looking at NSFW material are all amazing things we can do on our computers. Yet there may come a day where you just want to get on your computer and relax in your computer room looking at all that NSFW material you have bookmarked under the “Special Sites” category, but you can’t because your monitor won’t turn on. No, you don’t frump and punch holes in the walls to look for an outlet for your rage. You troubleshoot it, and hope to god that your monitor isn’t broken!

When diagnosing a screen problem, half the time it’s usually something very easy, like a cable coming loose, or the monitor getting unplugged accidentally; unfortunately the other half the time it’s probably a problem that’s related to your monitor being old, or a problem that’s related to your graphics card instead. So you may have to diagnose both items at the same time to see which solves your problem.

First, check all your cables, I know this is probably getting a little old with the checking connections and everything, but so many computer problems can be avoided if people just remember that their computer isn’t always going to stay the same way they left it. A foot could kick out a cable, a dog or a cat that got to curious, or almost anything can render half your hardware useless.

After checking all your cables, make sure your screen has power, if it has power and shows a message such as “This monitor is working correctly please check your cable” and shows bars of color on the screen, that means that your monitor is not getting a signal from your computer. Try swapping out the monitor for another one to see if it still says that message. If it does then that means the problem is most likely something to do with your graphics card not seated in the motherboard, or just isn’t working properly, you may want to try swapping out another graphics card to see if that solves your problem.

Generally monitors don’t have that many diagnosable problems. Either they work and they work well, or they don’t work and you have to replace them. When working on a monitor you should never open them, they aren’t meant to be serviced and contain high charged capacitors that hold lethal doses of electricity. We wouldn’t want to read about a computer guy in the obituaries now would we?

Graphics Card

The glorious graphics card, it’s an amazing thing really. It makes all those pretty HDR (High Dynamic Range) pictures look just that good, it keeps your games running smoothly, and your videos in HD. Yet these things can be pains when they’re just not working right, because if something is wrong there’s not a strict hardware or software solution, you have to analyze the current situation to see what’s up.

First and foremost if you’re having any problems with your graphics card, probably the best thing to try to do first is see if there an updated driver for it at the manufacturer’s website that may solve the problem, or if there isn’t an update try uninstalling your graphics drivers and reinstalling them this little action can solve so many problems.

If there’s little jaggies or weird colorful mishaps known as artifacts appearing on your screen you may want to check the temperature of your graphics and make sure is getting enough cooling, and that the fan is working properly. If the cooling checks out okay you may also want to check your power supply ratings to see if it is giving enough juice to your graphics card. Nowadays most graphics cards need a lot of power on the 12v rails, make sure your power supply can give you that power that the graphics card needs.

Sound Card

Some of the typical problems people have with sound cards is either A) no sound or B) no sound. Sounds card typically aren't very expensive so having to replace one if the current one isn't working is no big deal. However, if you're one of those audiophile types who expect 100% original recording quality with your $300 sound card replacing one of those is as expected a lot more harder to do.

Sound Card Troubleshooting

Check speaker cables make sure they're all connected and plugged into the right spot on your sound card. Also check the speaker's power cables.

Make sure windows volume is turned up and the volume is not muted, also make sure that you have all the wave and playback volume turned up and not muted. If you have 'Digital Output Only' checked in your Advanced Controls for Playback Controls, try unchecking it to see if that solves your non-sound problem. I found that if I have that checked my sound card won't give me any sound.

Try reinstalling your sound card drivers, also try checking on the internet at the manufacturer's website for any updated drivers that may be available. They increase your sound card's compatibility with your system.

If the previous tips didn't help, then you may just have to replace your sound card, or atleast swap it out for another one to see if it might be a problem related to your sound card's connection to the motherboard instead.

Processor

The processor is the actual thinking part of the brain of the computer. It does all the calculations needed to make a computer run, and does them all in split second timing. It determines how fast your computer generally runs, and most of the time is a bottle neck for systems that have had everything upgraded except the CPU.

If your processor’s not working, it’s not the end of the world, generally most processors that work correctly for a few weeks, should work correctly for the rest of it’s lifespan, which varies from 5-10 years or so. As long as you’re not overclocking the processor or letting it overheat too badly your processor should be fine, and it could just be a BIOS setting that’s messed up, or a jumper setting, but for kicks just check to make the processor is seated properly and the heat sink is attached to the processor and the motherboard. The heat sink should be attached tightly to the motherboard and not have room to move about, you should be able to pick up your motherboard by grabbing onto the heat sink without any problems. Check in your motherboard manual to make sure all the jumpers are set correctly for your type of processor. Any jumpers set incorrectly can cause the processor to not work, or function correctly or at it’s optimal speed. Also check the heat sink to see if it is cooling off the processor, if it’s not doing a very good job you may want to look into investing in a better one that gets the job done.


by: Steven Stoddard read more...

How to Send Large Files Without Email

Sending large files using email can pose a problem. To send a file using email, the file will first have to be uploaded to the mail server. To do so, simply add the file as an attachment. This is the most convenient way to send a file to a friend, family member, or a co-worker, assuming that the file is a small one.

Any file with a file size of more than 500kb may be difficult to send as an attachment. You may still be able to send the file, but there are some inherent problems.

Firstly, since it takes a fair amount of time to upload the file, the uploading will horde your email client. You can't do anything else while the file is uploading. For large files, the process can take several minutes. In addition, the connection may be severed. If that happens, you may have to upload the file all over again. This problem is commonly encountered, especially in a congested network.

Secondly, whoever is at the other end will not enjoying having to download such a huge file. Usually, emails are downloaded in an orderly manner - emails that arrived first will be downloaded first. But if there is a large file in the queue, that email will have to be downloaded (which could take a long time) before all the other emails can be viewed. What happens if there is a very important email in the queue? Whoever is receiving the large email will probably not appreciate the huge download.

Lesson here? Always find an alternative way to transfer huge files. You can send the files via Instant Messengers, or you can use a web based application to do so. You may also upload the files to a web server, and allow the other party to download the files at any time - without jamming up the email queue and hording the email client.

Free file transfer - send file online quickly and easily.
Article Source: http://EzineArticles.com/?expert=Darren_W_Chow
read more...

Computer Networking For a Small Business Or at Home

If you have two or more computers in your home or business, it might be a good idea to network the computers together. This will allow both computers to be online at the same time. It will allow file sharing and printing capabilities, as well as other resources. What is networking, you may ask and how does it work? Computer networking is simply a network of computers that have one gateway and are liked by either wires or wireless procedures in order to have both computers up and running at the same time.

Computer networking can be done in at least two ways. There is connection by LAN cable and then there is a wireless connection. A LAN connection will allow you to physically connect two or more computers together to create a network. This network will allow you to have all computers sharing information and internet connection without having each one manually connected to a certain network. The only type of problem with this connection is that there are a lot of wires that will connect each computer to the network and it you are not careful, you can accidently unplug your network, if the wires are not out of the way.

A wireless network will include a wireless router and will also have a software program that will link the computers into a network. There are no wires going to a router with this one, as there would be with the previous one. No wires to trip over and you will still have the same capabilities as you would with a LAN network. So all your computers, whether or not they are home or business can be connected and allowed to share information and all computers online at the same time.

Article Source: http://EzineArticles.com/?expert=Sanjana_Antony
read more...

5 Powerful And Free Methods That I Use To Speed Up My PC

Many of my friends say that I am obsessed with techniques on how I can speed up my PC.


Whether I’m doing some work with Adobe Photoshop, Adobe Illustrator, and Adobe InDesign all running at the same time, or whether I’m playing Gears of War while World of Warcraft in windowed mode is minimized, I always want my PC to perform as fast as possible. Yes, I am a speed junkie. I easily get frustrated with the slightest hint of a load time.

Hence, I am always on the lookout for ways to speed up my PC.

Here are 5 such methods that I use to speed up my PC and to ensure that it will always run at optimum performance with very minimal hiccups.

Speed Up My PC, Technique No. 1: Download The Latest Drivers

The physical components of your PC stay the same, unless you remove and replace them. But the software they run? They constantly change. The programs sold today will fall pale in comparison with the programs that will be made available next week. The websites we visit will evolve based on the internet technology that will be introduced.

And how are our systems supposed to cope up?

When I want to speed up my PC, the first thing I do is to download the latest drivers for the physical components of my rig. Graphic card, motherboard, modem… you name it, I download it! I make sure that nothing but the latest driver is installed in my system.

Speed Up My PC, Technique No. 2: Keep Your Registry Squeaky Clean

Does it take forever to boot up your system? Chances are, your registry is bogged down by useless leftover files from the programs you have installed, even if you have already uninstalled them.

Whenever I want to speed up my PC, I open my favorite registry cleaner to scan my system for some redundant, and sometimes harmful, leftover files. Then I let it do its thing, deleting the non-essential files whenever it could.

Reg cleaners really help speed up my PC, and there is no reason why they can’t help you speed up yours.

Speed Up My PC, Technique No. 3: Your System May Have Been Infected By Spyware And/Or Adware

Sometimes, slow boot up time and slow processing speed are caused by the infestation of spyware and/or adware in your system. Spyware and adware are forms of malware that surreptitiously find their way into your PC, often through the websites you visit or the email attachments you open.

If I am infected by spyware and/or adware and I want to speed up my PC, I simply open my most trusted spyware remover – Search & Destroy – a free utility that is powerful enough to wipe out all the known spyware and adware variations today.

Speed Up My PC, Technique No. 4: Scan For Viruses And Kill Them

Slow PCs may also be caused by viruses, the most popular of which are Trojans – wicked programs that keep hammering our systems their evil deeds.

There is only one way to determine the existence of a virus in your system, that is, by running a complete diagnostic scan using an anti-virus software. The best anti-virus software I can recommend is AVG, a free, open source program that is regularly updated with the latest virus descriptions which allows the program to run a really comprehensive examination of your system.

Thereafter, the anti-virus program will eliminate the threat and I’d be able to speed up my PC with no hassle at all.

Speed Up My PC, Technique No. 5: Defragment Regularly

One of the really under-appreciated features of a Windows-based PC is the Disk Defragmenter. Basically, the Disk Defragmenter will eliminate useless and redundant files in your entire system, not just your registry.

I swear to God, defragmenting your disk is THE best way to speed up my PC. Defragmenting may take a couple of hours or more, but the end result is very much worth it.

To access the Disk Defragmenter, go to START, then ALL PROGRAMS, then ACCESSORIES, then SYSTEM TOOLS, and voila! You’d be able to speed up your PC as efficiently as I can speed up my PC!

by: Mehmet Onatli read more...

CCNA, CCENT, Network+, And Security+ Practice Questions: TCP, UDP, Smurf Attacks, And More!

Let’s test your knowledge of UDP, TCP, smurf attacks, EIGRP, and more with these questions designed to help you prepare for success on your CCENT, CCNA, CCNP, Network+, and Security+ certification exams!

CCENT Certification / Network+ Certification:

Which of the following protocols runs on both UDP and TCP?

A. DHCP

B. SNMP

C. DNS

D. ARP

E. Inverse ARP

Answer: C. DNS runs on port 53, both on TCP and UDP.

Security+ Certification:

Briefly define the term "smurf attack". (Not too briefly, though!)

Answer: Basically, a smurf attack involves sends ICMP Echo packets (pings) with the intended victim's IP address specified as the source of the Echo packets. This transmission takes the form of a directed broadcast, which means that quite a few hosts can receive it - and then respond with ICMP Echo Replies, which will all be sent to the intended victim.

CCNA Exam:

R1 and R3 are directly connected at their respective Serial1 interfaces via a DTE/DCE cable. What command will tell you whether the interface is connected to the DTE or DCE end of the cable?

Answer: Run show controller serial 1 on either router - the DTE / DCE information is near the top of the output.

CCNP Certification / BSCI Exam:

DUAL has discovered four possible paths to a remote network, with the following metrics: PathA, 1500. PathB, 1500. PathC, 2600. PathD, 3100. What command will allow EIGRP to use the first three paths without using the fourth?

Answer: variance 2 would do the job. Any path with a metric of 3000 or lower will be utilized; setting it to 3 would bring PathD into the equation.

CCNP Certification / BCMSN Exam:

What is the main purpose of IEEE 802.3ac?

Answer: The IEEE 802.3ac standard allows the maximum frame length to be extended to 1522 bytes, which means the dot1q 4-byte header doesn't cause problems in transmission.

CCNP Certification / ONT Exam:

Which queueing strategy gives priority to interactive, low-bandwidth communications by default?

Answer: Weighted Fair Queueing (WFQ) gives priority to interactive, low-bandwidth conversations, and then splits the remaining bandwidth fairly among the remaining conversations.

Look for a new set of Cisco and CompTIA certification exam questions soon!


by: Chris Bryant, CCIE #12933 read more...

Stop Blog Spammers

Blogs are now an extremely popular and important part of the internet. Millions of people blog every day. As blogs have evolved over the years, so has the commenting system. Now anyone can make comments on a particular blog posting. As blog commenting has grown more popular, so has spam commenting. In this newsletter, we’ll go over why comments are a great form of feedback for your blog, how they help the credibility of your content, what spam comments are and how to prevent them from happening.

Comments – A great form of feedback

When blogs first came around, they were simply online journals. No one could post comments on a blog posting. That all changed in 1998 with OpenDiary, a site which allowed people to comment on blog postings. Now every blog, whether it is remotely or self-hosted, includes this option to comment.

Commenting is great because it allows real people to tell you what they think about your form. It gives you feedback on what you are doing right and what you may need to improve. Comments can be encouraging to you and motivate you to post more quality blog messages. Or they can be constructive criticism to make you work harder to get better at writing content.

Whatever the style of comment is, it is still very useful to your blog. High numbers of comments have the ability to make a blog look credible because they show that the blog is being read by a lot of people. That’s something that every blog owner wants, and comments help to let them know just how many people enjoy their content.

Bad comments

Unfortunately, spammers have now started to use comments as a way to spam. How do you know what a spam comment is? Well, a spam comment is a comment that only advertises another site or product. If the comment seems bland/generic with a cheap link thrown in, then it’s definitely a spam comment.

Here is an example of a typical spam comment:

“Hey, this site is really cool. Check out my really cool site at spamsite.com.”

Of course not all spam comments will be this blatant, but you get the point.

Fortunately for bloggers, as spam comments have grown, so has the ways to prevent it. Here are a couple ways that you can prevent spam comments from even being posted on your blog.

#1: Close off commenting on older blog posts

There are options for you to stop comments from being posted on any particular blog post. Lots of times, spammers will post comments in weeks or months old posts. So take away this opportunity from them to keep it from happening. Most blog hosters now offer this as a standard option in the tool panel. If one of your posts has been up for a couple weeks, close it up.

#2: Take advantage of software offered to prevent comment spam

If you host your own blog using WordPress, you can use an option in that software to prevent spam. Even if you aren’t using WordPress, you can still use other Spam comment blocking software like Spam Karma, Akismet, and Bad Behavior. While these aren’t 100% effective, they have proven to be quite effective in preventing spam from happening.

#3: Take a look at your settings and see what can be tweaked to toughen your protection

Lots of blogs now have settings to help prevent spam. If you already have a spam blocker on in your blog and are still experiencing spam, take a closer look at the settings to see if there’s anything that can be tweaked to make your protection stronger. However, if you do this, you should closely monitor your posts to make sure legit comments aren’t being blocked out. If they are, you might have to lighten up a bit.

#4: Regularly read your blog comments

Be sure to keep an eye on your comments. Even the best software or setting can’t prevent everything, so you will have to occasionally manually remove comments on your own.

By applying the above principles, you can ensure that your blog is full of only good, quality comments, which will help your credibility tremendously.

Comments are a great form of communication between yourself and your readers. They help the credibility of your blog!

author len hutton read more...

Web Development And The Big Time Out

One of the great debilitators in online business is simply the perceived (or real) lack of time. Business owners are used to moving forward. An online web presence can make them feel tied to an office chair learning skills they aren’t sure they want to know.

It’s not uncommon for those who deal in full time web design to have individuals contact them for a site design, but have absolutely no idea what they want. Furthermore when the designer questions them the response might be, “I don’t know, just make it look nice.”

Let’s not forget the core values or mission of the business. Many business owners have no idea how to answer those kinds of questions. They may stare blankly for a moment or two and there’s no more time for further deep thought so they go back to action – without answers.

In many cases it is possible to answer some of the questions needed, but it may require taking time away from a familiar setting. It may also require more time than you think you want to give.

If you can get to a place of concentrated contemplation you are likely to find yourself stripping ideas to their core to find out what your business is trying to accomplish and what your ultimate goals might be.

As with almost any project you can turn frustration around if you will just take the time to come to terms with your vision.

Sometimes we spend so much time ‘doing’ we never stop to ask the question, “Why?”

This process can be a bit like taking a bus that drives around the park. You keep looking at the flowers and the park bench and long to sit in the quiet shade of a tree and just absorb the calming atmosphere. You know they will have a positive effect on you, but for some reason you just can’t seem to find the energy to get off the bus.

It seems to me there are some sites that are misguided or rarely guided that could benefit from the process of self-evaluation. These sites may look nice, but there is a sense of disconnection that may not be easy to identify, but it’s fairly obvious to visitors.

Creative energy is at a minimum while business owners simply tackle what seem to be the most urgent details.

As more people gravitate to online business there needs to be a shift in the thinking of how one goes about doing business online. In many ways it can’t be approached in the same way a traditional business is developed, yet that is typically the way many new web commerce ventures choose to tackle the subject.

You may discover your business will be more successful if you take some time for rigorous reflection. The time set aside can be a bit like an architect that takes the time to develop plans for a new building. You wouldn’t expect the architect to simply tell a construction crew to, “Go out there and build – something.”

Work at ‘building’ your online business in a comprehensive way. Your effort can develop a firm foundation for long-term success.
by: Scott Lindsay
read more...

Can Data Breaches Be Expected From Bankrupt Mortgage Lenders?

The stock market is in a tumult. Actually, it has been for about a year, ever since the subprime fiasco (anyone take a look at Moody's performance over the past year?) Now that that particular issue has been beaten to death, other mortgage related issues are cropping up. Most of the stuff covered in the media is financial in nature, but some of those mortgage related issues do concern information security.

It's no secret that there are plenty of companies in the US that discard sensitive documents by dumping them unceremoniously: leave it by the curb, drive it to a dumpster, heave it over the walls of abandoned property, and other assorted mind boggling insecure practices. In fact, MSNBC has an article on this issue, and names numerous bankrupt mortgage companies whose borrowers' records were found in dumpsters and recycling centers. The information on those documents include credit card numbers and SSNs, as well as addresses, names, and other information needed to secure a mortgage.

Since the companies have filed for bankruptcy and are no more, the potential victims involved have no legal recourse, and are left to fend for themselves. In a way, it makes sense that companies that have filed for bankruptcy are behaving this way. (Not that I'm saying this is proper procedure.) For starters, if a company does wrong, one goes after the company; however, the company has filed for bankruptcy, it is no more, so there's no one to "go after." In light of the company status, this means that the actual person remaining behind to dispose of things, be they desks or credit applications, can opt to do whatever he feels like. He could shred the applications. He could dump them nearby. He could walk away and let the building's owner take care of them. What does he care? It's not as if he's gonna get fired.

Also, proper disposal requires either time, money, or both. A bankrupt company doesn't have money. It may have time, assuming people are going to stick around, but chances are their shredder has been seized by creditors. People are not going to stick around to shred things by hand, literally.

Aren't there any laws regulating this? Apparently, such issues are covered by FACTA, the Fair and Accurate Credit Transactions Act, and although its guidelines require that "businesses to dispose of sensitive financial documents in a way that protects against 'unauthorized access to or use of the information'" [msnbc.com], it stops short of requiring the physical destruction of data. I'm not a lawyer, but perhaps there's enough leeway in the language for one to go around dropping sensitive documents in dumpsters?

Like I mentioned before, inappropriate disposal of sensitive documents has been going on forever; I'm pretty sure this has been a problem since the very first mortgage was issued. My personal belief is that most companies would act responsibly and try to properly dispose of such information. But, this may prove to be a point of concern as well because of widespread misconceptions of what it means to protect data against unauthorized access.

What happens if a company that files for bankruptcy decides to sell their company computers to pay off creditors? Most people would delete the information found in the computer, and that's that-end of story. Except, it's not. When files are deleted, the actual data still resides in the hard disks; it's just that the computer's operating system doesn't have a way to find the information anymore. Indeed, this is how retail data restoration applications such as Norton are able to recover accidentally deleted files.

Some may be aware of this and decide to format the entire computer before sending it off to the new owners. The problem with this approach is the same as deleting files: data recovery is a cinch with the right software. Some of them retail for $30 or less-as in free. So, the sensitive data that's supposed to be deleted can be recovered, if not easily, at least cheaply-perhaps by people with criminal interests.

Am I being paranoid? I don't think so. I've been tracking fraud for years now, and I can't help but conclude that the criminal underworld has plenty of people looking to be niche operators, not to mention that there are infinitesimal ways of defrauding people (look up "salad oil" and "American Express," for an example). An identification theft ring looking to collect sensitive information from bankrupt mortgage dealers wouldn't surprise me, especially in an environment where such companies are dropping left and right.

The economics behind it make sense as well. A used computer will retail anywhere from $100 to $500. The information in it, if not wiped correctly, will average many times more even if you factor in the purchase of data recovery software. Criminals have different ways of capitalizing on personal data, ranging from selling the information outright to engaging in something with better returns.

Is there a better way to protect oneself? Whole disk encryption is a way to ensure that such problems do not occur: One can just reformat the encrypted drive itself to install a new OS; the original data remains encrypted, so there's no way to extract the data. Plus, the added benefit is that the data is protected in the event that a computer gets lost or stolen. However, commonsense dictates that encryption is something ongoing concerns sign up for, not businesses about to go bankrupt. My guess is that sooner or later we'll find instances of data breaches originating from equipment being traced back to bankrupt mortgage dealers.

The stock market is in a tumult. Actually, it has been for about a year, ever since the subprime fiasco (anyone take a look at Moody's performance over the past year?) Now that that particular issue has been beaten to death, other mortgagerelated issues are cropping up. Most of the stuff covered in the media is financial in nature, but some of those mortgagerelated issues do concern information security.

It's no secret that there are plenty of companies in the US that discard sensitive documents by dumping them unceremoniously: leave it by the curb, drive it to a dumpster, heave it over the walls of abandoned property, and other assorted mindboggling insecure practices. In fact, MSNBC has an article on this issue, and names numerous bankrupt mortgage companies whose borrowers' records were found in dumpsters and recycling centers. The information on those documents include credit card numbers and SSNs, as well as addresses, names, and other information needed to secure a mortgage.

Since the companies have filed for bankruptcy and are no more, the potential victims involved have no legal recourse, and are left to fend for themselves. In a way, it makes sense that companies that have filed for bankruptcy are behaving this way. (Not that I'm saying this is proper procedure.) For starters, if a company does wrong, one goes after the company; however, the company has filed for bankruptcy, it is no more, so there's no one to "go after." In light of the company status, this means that the actual person remaining behind to dispose of things, be they desks or credit applications, can opt to do whatever he feels like. He could shred the applications. He could dump them nearby. He could walk away and let the building's owner take care of them. What does he care? It's not as if he's gonna get fired.

Also, proper disposal requires either time, money, or both. A bankrupt company doesn't have money. It may have time, assuming people are going to stick around, but chances are their shredder has been seized by creditors. People are not going to stick around to shred things by hand, literally.

Aren't there any laws regulating this? Apparently, such issues are covered by FACTA, the Fair and Accurate Credit Transactions Act, and although its guidelines require that "businesses to dispose of sensitive financial documents in a way that protects against 'unauthorized access to or use of the information'" [msnbc.com], it stops short of requiring the physical destruction of data. I'm not a lawyer, but perhaps there's enough leeway in the language for one to go around dropping sensitive documents in dumpsters?

Like I mentioned before, inappropriate disposal of sensitive documents has been going on forever; I'm pretty sure this has been a problem since the very first mortgage was issued. My personal belief is that most companies would act responsibly and try to properly dispose of such information. But, this may prove to be a point of concern as well because of widespread misconceptions of what it means to protect data against unauthorized access.

What happens if a company that files for bankruptcy decides to sell their company computers to pay off creditors? Most people would delete the information found in the computer, and that's that-end of story. Except, it's not. When files are deleted, the actual data still resides in the hard disks; it's just that the computer's operating system doesn't have a way to find the information anymore. Indeed, this is how retail data restoration applications such as Norton are able to recover accidentally deleted files.

Some may be aware of this and decide to format the entire computer before sending it off to the new owners. The problem with this approach is the same as deleting files: data recovery is a cinch with the right software. Some of them retail for $30 or less-as in free. So, the sensitive data that's supposed to be deleted can be recovered, if not easily, at least cheaply-perhaps by people with criminal interests.

Am I being paranoid? I don't think so. I've been tracking fraud for years now, and I can't help but conclude that the criminal underworld has plenty of people looking to be niche operators, not to mention that there are infinitesimal ways of defrauding people (look up "salad oil" and "American Express," for an example). An identification theft ring looking to collect sensitive information from bankrupt mortgage dealers wouldn't surprise me, especially in an environment where such companies are dropping left and right.

The economics behind it make sense as well. A used computer will retail anywhere from $100 to $500. The information in it, if not wiped correctly, will average many times more even if you factor in the purchase of data recovery software. Criminals have different ways of capitalizing on personal data, ranging from selling the information outright to engaging in something with better returns.

Is there a better way to protect oneself? Whole disk encryption is a way to ensure that such problems do not occur: One can just reformat the encrypted drive itself to install a new OS; the original data remains encrypted, so there's no way to extract the data. Plus, the added benefit is that the data is protected in the event that a computer gets lost or stolen. However, commonsense dictates that encryption is something ongoing concerns sign up for, not businesses about to go bankrupt. My guess is that sooner or later we'll find instances of data breaches originating from equipment being traced back to bankrupt mortgage dealers.
read more...