Many of my friends say that I am obsessed with techniques on how I can speed up my PC.
Whether I’m doing some work with Adobe Photoshop, Adobe Illustrator, and Adobe InDesign all running at the same time, or whether I’m playing Gears of War while World of Warcraft in windowed mode is minimized, I always want my PC to perform as fast as possible. Yes, I am a speed junkie. I easily get frustrated with the slightest hint of a load time.
Hence, I am always on the lookout for ways to speed up my PC.
Here are 5 such methods that I use to speed up my PC and to ensure that it will always run at optimum performance with very minimal hiccups.
Speed Up My PC, Technique No. 1: Download The Latest Drivers
The physical components of your PC stay the same, unless you remove and replace them. But the software they run? They constantly change. The programs sold today will fall pale in comparison with the programs that will be made available next week. The websites we visit will evolve based on the internet technology that will be introduced.
And how are our systems supposed to cope up?
When I want to speed up my PC, the first thing I do is to download the latest drivers for the physical components of my rig. Graphic card, motherboard, modem… you name it, I download it! I make sure that nothing but the latest driver is installed in my system.
Speed Up My PC, Technique No. 2: Keep Your Registry Squeaky Clean
Does it take forever to boot up your system? Chances are, your registry is bogged down by useless leftover files from the programs you have installed, even if you have already uninstalled them.
Whenever I want to speed up my PC, I open my favorite registry cleaner to scan my system for some redundant, and sometimes harmful, leftover files. Then I let it do its thing, deleting the non-essential files whenever it could.
Reg cleaners really help speed up my PC, and there is no reason why they can’t help you speed up yours.
Speed Up My PC, Technique No. 3: Your System May Have Been Infected By Spyware And/Or Adware
Sometimes, slow boot up time and slow processing speed are caused by the infestation of spyware and/or adware in your system. Spyware and adware are forms of malware that surreptitiously find their way into your PC, often through the websites you visit or the email attachments you open.
If I am infected by spyware and/or adware and I want to speed up my PC, I simply open my most trusted spyware remover – Search & Destroy – a free utility that is powerful enough to wipe out all the known spyware and adware variations today.
Speed Up My PC, Technique No. 4: Scan For Viruses And Kill Them
Slow PCs may also be caused by viruses, the most popular of which are Trojans – wicked programs that keep hammering our systems their evil deeds.
There is only one way to determine the existence of a virus in your system, that is, by running a complete diagnostic scan using an anti-virus software. The best anti-virus software I can recommend is AVG, a free, open source program that is regularly updated with the latest virus descriptions which allows the program to run a really comprehensive examination of your system.
Thereafter, the anti-virus program will eliminate the threat and I’d be able to speed up my PC with no hassle at all.
Speed Up My PC, Technique No. 5: Defragment Regularly
One of the really under-appreciated features of a Windows-based PC is the Disk Defragmenter. Basically, the Disk Defragmenter will eliminate useless and redundant files in your entire system, not just your registry.
I swear to God, defragmenting your disk is THE best way to speed up my PC. Defragmenting may take a couple of hours or more, but the end result is very much worth it.
To access the Disk Defragmenter, go to START, then ALL PROGRAMS, then ACCESSORIES, then SYSTEM TOOLS, and voila! You’d be able to speed up your PC as efficiently as I can speed up my PC!
by: Mehmet Onatli
read more...
5 Powerful And Free Methods That I Use To Speed Up My PC
Diposkan oleh satriyo al-jef pada Selasa, Januari 13, 2009Label: tips komputer
CCNA, CCENT, Network+, And Security+ Practice Questions: TCP, UDP, Smurf Attacks, And More!
Diposkan oleh satriyo al-jef pada Selasa, Januari 13, 2009Let’s test your knowledge of UDP, TCP, smurf attacks, EIGRP, and more with these questions designed to help you prepare for success on your CCENT, CCNA, CCNP, Network+, and Security+ certification exams!
CCENT Certification / Network+ Certification:
Which of the following protocols runs on both UDP and TCP?
A. DHCP
B. SNMP
C. DNS
D. ARP
E. Inverse ARP
Answer: C. DNS runs on port 53, both on TCP and UDP.
Security+ Certification:
Briefly define the term "smurf attack". (Not too briefly, though!)
Answer: Basically, a smurf attack involves sends ICMP Echo packets (pings) with the intended victim's IP address specified as the source of the Echo packets. This transmission takes the form of a directed broadcast, which means that quite a few hosts can receive it - and then respond with ICMP Echo Replies, which will all be sent to the intended victim.
CCNA Exam:
R1 and R3 are directly connected at their respective Serial1 interfaces via a DTE/DCE cable. What command will tell you whether the interface is connected to the DTE or DCE end of the cable?
Answer: Run show controller serial 1 on either router - the DTE / DCE information is near the top of the output.
CCNP Certification / BSCI Exam:
DUAL has discovered four possible paths to a remote network, with the following metrics: PathA, 1500. PathB, 1500. PathC, 2600. PathD, 3100. What command will allow EIGRP to use the first three paths without using the fourth?
Answer: variance 2 would do the job. Any path with a metric of 3000 or lower will be utilized; setting it to 3 would bring PathD into the equation.
CCNP Certification / BCMSN Exam:
What is the main purpose of IEEE 802.3ac?
Answer: The IEEE 802.3ac standard allows the maximum frame length to be extended to 1522 bytes, which means the dot1q 4-byte header doesn't cause problems in transmission.
CCNP Certification / ONT Exam:
Which queueing strategy gives priority to interactive, low-bandwidth communications by default?
Answer: Weighted Fair Queueing (WFQ) gives priority to interactive, low-bandwidth conversations, and then splits the remaining bandwidth fairly among the remaining conversations.
Look for a new set of Cisco and CompTIA certification exam questions soon!
by: Chris Bryant, CCIE #12933
read more...
Label: Networking, tips komputer
Blogs are now an extremely popular and important part of the internet. Millions of people blog every day. As blogs have evolved over the years, so has the commenting system. Now anyone can make comments on a particular blog posting. As blog commenting has grown more popular, so has spam commenting. In this newsletter, we’ll go over why comments are a great form of feedback for your blog, how they help the credibility of your content, what spam comments are and how to prevent them from happening.
Comments – A great form of feedback
When blogs first came around, they were simply online journals. No one could post comments on a blog posting. That all changed in 1998 with OpenDiary, a site which allowed people to comment on blog postings. Now every blog, whether it is remotely or self-hosted, includes this option to comment.
Commenting is great because it allows real people to tell you what they think about your form. It gives you feedback on what you are doing right and what you may need to improve. Comments can be encouraging to you and motivate you to post more quality blog messages. Or they can be constructive criticism to make you work harder to get better at writing content.
Whatever the style of comment is, it is still very useful to your blog. High numbers of comments have the ability to make a blog look credible because they show that the blog is being read by a lot of people. That’s something that every blog owner wants, and comments help to let them know just how many people enjoy their content.
Bad comments
Unfortunately, spammers have now started to use comments as a way to spam. How do you know what a spam comment is? Well, a spam comment is a comment that only advertises another site or product. If the comment seems bland/generic with a cheap link thrown in, then it’s definitely a spam comment.
Here is an example of a typical spam comment:
“Hey, this site is really cool. Check out my really cool site at spamsite.com.”
Of course not all spam comments will be this blatant, but you get the point.
Fortunately for bloggers, as spam comments have grown, so has the ways to prevent it. Here are a couple ways that you can prevent spam comments from even being posted on your blog.
#1: Close off commenting on older blog posts
There are options for you to stop comments from being posted on any particular blog post. Lots of times, spammers will post comments in weeks or months old posts. So take away this opportunity from them to keep it from happening. Most blog hosters now offer this as a standard option in the tool panel. If one of your posts has been up for a couple weeks, close it up.
#2: Take advantage of software offered to prevent comment spam
If you host your own blog using WordPress, you can use an option in that software to prevent spam. Even if you aren’t using WordPress, you can still use other Spam comment blocking software like Spam Karma, Akismet, and Bad Behavior. While these aren’t 100% effective, they have proven to be quite effective in preventing spam from happening.
#3: Take a look at your settings and see what can be tweaked to toughen your protection
Lots of blogs now have settings to help prevent spam. If you already have a spam blocker on in your blog and are still experiencing spam, take a closer look at the settings to see if there’s anything that can be tweaked to make your protection stronger. However, if you do this, you should closely monitor your posts to make sure legit comments aren’t being blocked out. If they are, you might have to lighten up a bit.
#4: Regularly read your blog comments
Be sure to keep an eye on your comments. Even the best software or setting can’t prevent everything, so you will have to occasionally manually remove comments on your own.
By applying the above principles, you can ensure that your blog is full of only good, quality comments, which will help your credibility tremendously.
Comments are a great form of communication between yourself and your readers. They help the credibility of your blog!
author len hutton
read more...
Label: komputer, tips komputer
One of the great debilitators in online business is simply the perceived (or real) lack of time. Business owners are used to moving forward. An online web presence can make them feel tied to an office chair learning skills they aren’t sure they want to know.
It’s not uncommon for those who deal in full time web design to have individuals contact them for a site design, but have absolutely no idea what they want. Furthermore when the designer questions them the response might be, “I don’t know, just make it look nice.”
Let’s not forget the core values or mission of the business. Many business owners have no idea how to answer those kinds of questions. They may stare blankly for a moment or two and there’s no more time for further deep thought so they go back to action – without answers.
In many cases it is possible to answer some of the questions needed, but it may require taking time away from a familiar setting. It may also require more time than you think you want to give.
If you can get to a place of concentrated contemplation you are likely to find yourself stripping ideas to their core to find out what your business is trying to accomplish and what your ultimate goals might be.
As with almost any project you can turn frustration around if you will just take the time to come to terms with your vision.
Sometimes we spend so much time ‘doing’ we never stop to ask the question, “Why?”
This process can be a bit like taking a bus that drives around the park. You keep looking at the flowers and the park bench and long to sit in the quiet shade of a tree and just absorb the calming atmosphere. You know they will have a positive effect on you, but for some reason you just can’t seem to find the energy to get off the bus.
It seems to me there are some sites that are misguided or rarely guided that could benefit from the process of self-evaluation. These sites may look nice, but there is a sense of disconnection that may not be easy to identify, but it’s fairly obvious to visitors.
Creative energy is at a minimum while business owners simply tackle what seem to be the most urgent details.
As more people gravitate to online business there needs to be a shift in the thinking of how one goes about doing business online. In many ways it can’t be approached in the same way a traditional business is developed, yet that is typically the way many new web commerce ventures choose to tackle the subject.
You may discover your business will be more successful if you take some time for rigorous reflection. The time set aside can be a bit like an architect that takes the time to develop plans for a new building. You wouldn’t expect the architect to simply tell a construction crew to, “Go out there and build – something.”
Work at ‘building’ your online business in a comprehensive way. Your effort can develop a firm foundation for long-term success.
by: Scott Lindsay
read more...
Can Data Breaches Be Expected From Bankrupt Mortgage Lenders?
Diposkan oleh satriyo al-jef pada Selasa, Januari 13, 2009The stock market is in a tumult. Actually, it has been for about a year, ever since the subprime fiasco (anyone take a look at Moody's performance over the past year?) Now that that particular issue has been beaten to death, other mortgage related issues are cropping up. Most of the stuff covered in the media is financial in nature, but some of those mortgage related issues do concern information security.
It's no secret that there are plenty of companies in the US that discard sensitive documents by dumping them unceremoniously: leave it by the curb, drive it to a dumpster, heave it over the walls of abandoned property, and other assorted mind boggling insecure practices. In fact, MSNBC has an article on this issue, and names numerous bankrupt mortgage companies whose borrowers' records were found in dumpsters and recycling centers. The information on those documents include credit card numbers and SSNs, as well as addresses, names, and other information needed to secure a mortgage.
Since the companies have filed for bankruptcy and are no more, the potential victims involved have no legal recourse, and are left to fend for themselves. In a way, it makes sense that companies that have filed for bankruptcy are behaving this way. (Not that I'm saying this is proper procedure.) For starters, if a company does wrong, one goes after the company; however, the company has filed for bankruptcy, it is no more, so there's no one to "go after." In light of the company status, this means that the actual person remaining behind to dispose of things, be they desks or credit applications, can opt to do whatever he feels like. He could shred the applications. He could dump them nearby. He could walk away and let the building's owner take care of them. What does he care? It's not as if he's gonna get fired.
Also, proper disposal requires either time, money, or both. A bankrupt company doesn't have money. It may have time, assuming people are going to stick around, but chances are their shredder has been seized by creditors. People are not going to stick around to shred things by hand, literally.
Aren't there any laws regulating this? Apparently, such issues are covered by FACTA, the Fair and Accurate Credit Transactions Act, and although its guidelines require that "businesses to dispose of sensitive financial documents in a way that protects against 'unauthorized access to or use of the information'" [msnbc.com], it stops short of requiring the physical destruction of data. I'm not a lawyer, but perhaps there's enough leeway in the language for one to go around dropping sensitive documents in dumpsters?
Like I mentioned before, inappropriate disposal of sensitive documents has been going on forever; I'm pretty sure this has been a problem since the very first mortgage was issued. My personal belief is that most companies would act responsibly and try to properly dispose of such information. But, this may prove to be a point of concern as well because of widespread misconceptions of what it means to protect data against unauthorized access.
What happens if a company that files for bankruptcy decides to sell their company computers to pay off creditors? Most people would delete the information found in the computer, and that's that-end of story. Except, it's not. When files are deleted, the actual data still resides in the hard disks; it's just that the computer's operating system doesn't have a way to find the information anymore. Indeed, this is how retail data restoration applications such as Norton are able to recover accidentally deleted files.
Some may be aware of this and decide to format the entire computer before sending it off to the new owners. The problem with this approach is the same as deleting files: data recovery is a cinch with the right software. Some of them retail for $30 or less-as in free. So, the sensitive data that's supposed to be deleted can be recovered, if not easily, at least cheaply-perhaps by people with criminal interests.
Am I being paranoid? I don't think so. I've been tracking fraud for years now, and I can't help but conclude that the criminal underworld has plenty of people looking to be niche operators, not to mention that there are infinitesimal ways of defrauding people (look up "salad oil" and "American Express," for an example). An identification theft ring looking to collect sensitive information from bankrupt mortgage dealers wouldn't surprise me, especially in an environment where such companies are dropping left and right.
The economics behind it make sense as well. A used computer will retail anywhere from $100 to $500. The information in it, if not wiped correctly, will average many times more even if you factor in the purchase of data recovery software. Criminals have different ways of capitalizing on personal data, ranging from selling the information outright to engaging in something with better returns.
Is there a better way to protect oneself? Whole disk encryption is a way to ensure that such problems do not occur: One can just reformat the encrypted drive itself to install a new OS; the original data remains encrypted, so there's no way to extract the data. Plus, the added benefit is that the data is protected in the event that a computer gets lost or stolen. However, commonsense dictates that encryption is something ongoing concerns sign up for, not businesses about to go bankrupt. My guess is that sooner or later we'll find instances of data breaches originating from equipment being traced back to bankrupt mortgage dealers.
The stock market is in a tumult. Actually, it has been for about a year, ever since the subprime fiasco (anyone take a look at Moody's performance over the past year?) Now that that particular issue has been beaten to death, other mortgagerelated issues are cropping up. Most of the stuff covered in the media is financial in nature, but some of those mortgagerelated issues do concern information security.
It's no secret that there are plenty of companies in the US that discard sensitive documents by dumping them unceremoniously: leave it by the curb, drive it to a dumpster, heave it over the walls of abandoned property, and other assorted mindboggling insecure practices. In fact, MSNBC has an article on this issue, and names numerous bankrupt mortgage companies whose borrowers' records were found in dumpsters and recycling centers. The information on those documents include credit card numbers and SSNs, as well as addresses, names, and other information needed to secure a mortgage.
Since the companies have filed for bankruptcy and are no more, the potential victims involved have no legal recourse, and are left to fend for themselves. In a way, it makes sense that companies that have filed for bankruptcy are behaving this way. (Not that I'm saying this is proper procedure.) For starters, if a company does wrong, one goes after the company; however, the company has filed for bankruptcy, it is no more, so there's no one to "go after." In light of the company status, this means that the actual person remaining behind to dispose of things, be they desks or credit applications, can opt to do whatever he feels like. He could shred the applications. He could dump them nearby. He could walk away and let the building's owner take care of them. What does he care? It's not as if he's gonna get fired.
Also, proper disposal requires either time, money, or both. A bankrupt company doesn't have money. It may have time, assuming people are going to stick around, but chances are their shredder has been seized by creditors. People are not going to stick around to shred things by hand, literally.
Aren't there any laws regulating this? Apparently, such issues are covered by FACTA, the Fair and Accurate Credit Transactions Act, and although its guidelines require that "businesses to dispose of sensitive financial documents in a way that protects against 'unauthorized access to or use of the information'" [msnbc.com], it stops short of requiring the physical destruction of data. I'm not a lawyer, but perhaps there's enough leeway in the language for one to go around dropping sensitive documents in dumpsters?
Like I mentioned before, inappropriate disposal of sensitive documents has been going on forever; I'm pretty sure this has been a problem since the very first mortgage was issued. My personal belief is that most companies would act responsibly and try to properly dispose of such information. But, this may prove to be a point of concern as well because of widespread misconceptions of what it means to protect data against unauthorized access.
What happens if a company that files for bankruptcy decides to sell their company computers to pay off creditors? Most people would delete the information found in the computer, and that's that-end of story. Except, it's not. When files are deleted, the actual data still resides in the hard disks; it's just that the computer's operating system doesn't have a way to find the information anymore. Indeed, this is how retail data restoration applications such as Norton are able to recover accidentally deleted files.
Some may be aware of this and decide to format the entire computer before sending it off to the new owners. The problem with this approach is the same as deleting files: data recovery is a cinch with the right software. Some of them retail for $30 or less-as in free. So, the sensitive data that's supposed to be deleted can be recovered, if not easily, at least cheaply-perhaps by people with criminal interests.
Am I being paranoid? I don't think so. I've been tracking fraud for years now, and I can't help but conclude that the criminal underworld has plenty of people looking to be niche operators, not to mention that there are infinitesimal ways of defrauding people (look up "salad oil" and "American Express," for an example). An identification theft ring looking to collect sensitive information from bankrupt mortgage dealers wouldn't surprise me, especially in an environment where such companies are dropping left and right.
The economics behind it make sense as well. A used computer will retail anywhere from $100 to $500. The information in it, if not wiped correctly, will average many times more even if you factor in the purchase of data recovery software. Criminals have different ways of capitalizing on personal data, ranging from selling the information outright to engaging in something with better returns.
Is there a better way to protect oneself? Whole disk encryption is a way to ensure that such problems do not occur: One can just reformat the encrypted drive itself to install a new OS; the original data remains encrypted, so there's no way to extract the data. Plus, the added benefit is that the data is protected in the event that a computer gets lost or stolen. However, commonsense dictates that encryption is something ongoing concerns sign up for, not businesses about to go bankrupt. My guess is that sooner or later we'll find instances of data breaches originating from equipment being traced back to bankrupt mortgage dealers.
read more...