Monday, May 30, 2011

Tips On Buying Inkjet Cartridges

Computers have become an important part of everyday life. Printers also come with computer use. Buy ink cartridge for your printer can be a baffling question. Knowing the best way to choose one for your printer can help take the hassle out of the process.

The warning that the printer is almost out of ink can signal stress in some people. Determine which ink cartridge is the best, may seem an impossible task. The best place to start is to take a look at the cartridge into the printer. Check what type it is and try to buy the same. In some cases, but can Chuck unavailable for any reason the same cartridge can not be found. In this case, the following tips can help you.

- Avoid generic cartridges. The ink used in these cartridges can damage the nozzles of the printer.

- Figure in the print quality you need. ink cartridges made by the same manufacturer as the printer to produce the best results. These cartridges are also the most expensive.

- Check out the warranty on your printer. Some manufacturer warranties are voided if a cartridge is used, another manufacturer.

- Look at the ink cartridge yield is buying. This indicates that the print cartridge will do.

To prolong their shelf life inkjet cartridges and save money on refills, you can also take a few steps. Do not let the cartridge run dry as this can burn your printer can print making, even with a new cartridge. Do not operate a cartridge when the other is out, because it will also destroy the jet and cause future problems. You can also easily shake the cartridge side to another to help the printer will use the remaining amount of ink.

The above tips will help you make the best buy cartridges and toner. Although there are many options on the market, follow these simple tips will help you choose the best ink cartridge for your needs.

Friday, May 27, 2011

Easy Guide buy Cheap Laptops

Notebook or laptop computer is a small laptop. It 's easy to keep on his knees. Portable easy to carry out all tasks that desktops do. Buying a laptop is not easy to do because there are so many important things that should be kept in mind. The most common type of things are the processor, processor speed, amount of RAM, hard disk size, brand and support.

You can easily move your laptop from one place to another because of its portability factor. So look carefully at the time of purchase, and if you do not transfer you may prefer a desktop instead of laptop. Laptops are sophisticated and the perfect device for multiple business areas as record keeping applications, wireless networking, presentations and instant communication.

Laptop technology is changing day by day because thats not easy to find the best. These are smaller and faster than the computer desktop. Some come from high-quality portable Wireless Fidelity, and many people have a tri-mode 802.11a/b/g wireless system. You can also choose Sony's latest ultra-portable VAIO VGN-T350P, which offers the first integrated wireless modem. It can be easily connected to the mobile Internet.

Business PCs can be easily transported in the portfolio so that when you buy a new bear in mind that they do not cause you pain, because sometimes you have to carry all day. You can choose a category of laptop lighter and smaller than the "thin and light" and "Ultra-portable." Laptop computers are expensive and you can easily buy two desktop to One Laptop, but keep in mind that you can take your desktop throughout the day.

Some laptops offer a storage space between 60 and 100 GB hard drive, but you can increase the distance with an external hard drive. Laptops are very powerful and can do each task and difficult, but usually 256 MB of RAM for Windows XP and Mac OS X. You should also check the battery when you buy, because it is an important factor for a businessman traveling. The latest notebook models offer 5 hours or more power, while choosing laptop battery should always choose a battery with more cells numbered. Remember, the more cells will provide additional long-life battery.

You should also check security feature of the laptop. You can choose a series of IBM / Sonoma ThinkPad that can protect your files and sensitive and confidential corporate documents. factor last but not least is the price that is extremely important when buying a laptop. You can try two or more stores for a reasonable laptop. Buy Online notebook is another option for you. You should try to negotiate a special price. Several manufacturers offer cheap prices if bought in bulk.

You should not have to sacrifice quality for cheap. Try to buy a laptop that can easily meet your every need. You should check the speed, upgradeability, responsible and serious gaming laptop at the time of purchase.

Wednesday, May 25, 2011

Computer Viruses And Internet Worms Explained

Your computer is slow? Do not open programs and you can not get into something? Well, maybe you have a sick computer. Just as people get sick from the virus, so do computers. When this happens, you will need a computer technician look at the computer to format and get rid of the virus. If you know anything about computers, you may be able to do it yourself.

What is a virus?

A virus is a parasitic program written intentionally to enter a computer without your consent or knowledge. The parasite word is used, because the virus files or boot sectors and replicates itself, allowing it to spread. Though some viruses do nothing but replicate itself, others can cause serious damage or affect program and system performance. The virus should never be assumed harmless and left the system.

Viruses

Viruses are classified by how they infect computer systems:

1) Programme. As executable files that end with a COM, EXE, OVL, DRV Bin System .....

2) Boot: Boot Record, Master Boot, FAT and Partition Table.

3) Multi: Both program and boot infector.

What is the Trojan horse?

Besides being a large wooden horse used in the Trojan war 2500 years ago (and more recently by Brad Pitt), a Trojan or Trojan Horse is a computer program that seems trivial or harmless, but conceals a further additional function bad. In general, a Trojan is a part of the program on your computer from an external source - (Internet downloads, such as a diskette, CD, email infected). Trojans can sometimes be dangerous. For example, a computer program may seem a demo of a game, but at the same time enjoy the game, you may be happy to reformat your hard disk or by email to all the porn sites in your e-book addresses.

The Trojans also used the "back door", or "floor" to sneak the computer's operating system information. An example is a program that pretends to be a registry of the program (as you can see, Windows NT / XP or Linux). When the unsuspecting user tries to access a Trojan program used to store the user name and password. Then you can indicate a failed attempt to log in and log out on the actual program. The user can successfully access the system the next time, but this time a Trojan has received enough information to access the system.

Example Trojans

Notroj. This Trojan pretends to be a program that protects against the Trojans. It is actually a time bomb that erases the hard disk after more than 70 percent complete.

Pwsteal.refest A trojan that installs as a BHO (Browser Helper Object) for Internet Explorer and steals online banking information when presented in web forms.

PWSteal.Likmet.AA Trojan horse that displays a fake login window of MSN Messenger and steals the password available.

Run.me. This is a graphics program that plays the national anthem and display the U.S. flag while dragging on the hard drive and deletes the data it contains.

What worm?

Worm is a program of self-propagating that works its way through the system or network (eg the Internet), often cause damage. It does not require a host program to activate it. Someone has to add the worms directly into the network between the computers, which can be sent from one another, and the files and programs have changed. An example of a local network, where each computer has its own files, programs, operating systems and hard drives, as would be found in a university or corporate environment.

Example of Worms

Worm recovery. A worm that reaches out across the network to an output terminal (the one with a modem) and place the heels of a list of users.

vigilante worm. A special program that automatically takes measures to limit the size of a worm, on or off, it grows beyond a certain limit. The worm also has a changing of the guard ran the registry entry

Saturday, May 21, 2011

10 Tips to remove spyware from your computer

Your computer has been slower than normal? Are you worried someone may be able to access your computer and steal your private information and use it against you? If so, are these feelings that I shared with you in the past.

Some time ago, my computer 3 years has been so slow that I had to buy a new computer. Or at least I thought I needed a new computer. Then, in a matter of weeks of sailing, my new team has been so slow. Additionally, some programs do not work properly on my computer, and I did not recognize some of the programs that were running on my computer. What I most fear. Are there any programs that were tracking my keystrokes on my computer or programs that not only recalls the installation? I knew I had to find a quick answer and solution.

The truth is that we can all put up with slow computers, but few of us would like to receive information on our computers than others, but it can hardly happen when spyware or is loaded in the front, without our knowledge.

According to the site Spyware Nuker, "spyware applications, programs and files hidden on your hard drive without any direct knowledge. These programs allow hackers and advertising companies to track your every move, both online and even if you are working offline. They can monitor Web sites, items you buy online, e-mail you send and receive your chat dialog, and worst of all they can even save your credit card number, personal identification numbers, passwords and all. If you using a dial-up connection to the Internet then spyware may be charged for 900 numbers in your phone bill. This is just a short list of damage that spyware can cause. "

Site also has statistics that show spyware is a huge problem affecting many people. "27.3 million Americans were victims of identity theft in the last five years, of which 9,910,000 persons, representing 4.6% of the population last year alone."

It is also very easy on your computer should be infected with spyware as "a majority of all downloadable games, music, screen savers, etc., can infect your computer with spyware or adware. Most people do not know that after click on a random "pop up" ad, their computers may be infected with spyware or adware. "

No matter how we get spyware, here are 10 very specific reasons that you do not want spyware on your computer.

1. The computer may start running slower

2. Some of the programs on your computer is not working properly

3. You may not recognize programs that are now in the team, as they may have been installed by a web site or related to spyware loaded on your computer.

In addition, you may be concerned that:

4. Someone might be able to read your emails

5. Someone might be able to access your e-mail list

6. Someone might be able to see that you continue to type keystrokes

7. Someone might be able to access your credit card information on your PC

8. Someone could use the list of passwords on your computer

9. Someone could steal your social security number

10. Someone might be able to monitor all Web sites you visit

As I mentioned, most of these programs on your computer with you even know, but another part is frustrating is that I know that some of these programs because I remember installing and uninstall! So now I know that when we install some of these commercial practices followed shortly passwords online or programs to help with e-mail or keep track of time, even if we uninstall them, they can not being away from our computers. They are still in our computers, waiting to spy on us, at least.

A good way to find and remove spyware is to run spyware detector and remover. Most spyware detection and removal software today offers a free scan to make sure it does or does not have spyware on your computer.

Thursday, May 19, 2011

Hot Topics is Computer Viruses

Regardless of whom you speak, both had a computer virus or know someone who has experienced the pain of trying to get rid of the problem. Computer viruses are a hot topic that seems to affect everyone who owns a computer system, whether at work or at home. Companies that produce software that capture and remove these viruses are constantly updating their databases and virus definitions so they can better protect your system against all the latest viruses. Creating programs to protect against viruses, is a multi-billion which is growing every day. The number of viruses are created and uploaded to the Internet develops an astonishing pace for a new one every eighteen seconds! It definitely keeps companies on their toes virus protection, research and development.

Because this virus copies itself to any computer system which comes into contact with the virus via a computer network or the Internet is very fast and deadly reach your computer. Because computer viruses are a hot topic, which is usually covered by the articles and forum topics online. While some viruses do nothing more than frustration with pop-up ads or messages, others are harmful and completely implemented at the beginning to destroy files and operating systems on your computer.

Of the 53 000 viruses have been identified and classified more than 80 percent of them are classified as harmful and can damage your computer or files. These viruses behave in the same way as biological viruses from infecting computer systems, which are in contact. These programs start automatically, are generally very low, and work equipment damage or cause damage or completely eliminate the key system files.

When computer viruses are a hot topic, more and more destructive power of these programs. So many people learn about programs and virus protection programs running on the latest protection or to ensure their protection against viruses so far. Many magazines and newspaper articles, the impact of the virus panic sometimes people think their computers are at risk. Having a good antivirus program and update the exchange rate is one of the best ways to protect your computer from viruses.

This should also be accompanied by good habits such as file scan all downloaded files with antivirus software before opening. It is always a good idea to take the time to make sure that the file you think downloading is really you. For example, a file is marked as a video file and less than one megabyte in size, not a video file. Video files are typically about a thousand times larger, and therefore the downloaded file is probably not a video file and may actually be a virus.

Computer viruses are a hot topic in the office when a virus attack could be cross-protection protocols in place, network administrators. All you need is someone to give the program files were sent to open and start playing through a computer network to make life a hell of business. The virus attacks can cripple your desktop for quick results in loss of income and consumer confidence, which may affect fish stocks that the company has been trading involves further financial losses. It 's so important for large companies with large computer virus protection programs in place.

These anti-virus programs are much more accurate and effective anti-virus software that many consumers to protect their IT systems. Since the effects of a virus attack is economically much more damage to a large corporation, an anti-virus would be much more stable and able to protect multiple systems on the farm. Computer viruses are a hot topic among the companies simply because of how it may affect the financing of the company.

Tuesday, May 17, 2011

Dual core processors have become very popular in the world of computing. Some hot tips about dual core processors have been printed in many computer magazines for the last few years and have served to whet the appetite of many computer users looking to upgrade their computer systems. The ability of dual core processors to make computer systems run much faster and cooler means that many people want these processors in their computers. The hot tips about dual core processors have been talked about in many computer user forums online for many months now and the consensus seems to be that everyone wants them to be in their computer systems. While many older computers may not have the correct architecture to accept these dual processors, many of the newer models of computer can easily adapt to this innovation. The ability of dual core processors to handle multiple programs at one time is a very attractive aspect for anyone thinking of buying dual core processor architecture for their computer system. The goal of the companies that are producing these dual core processor systems has been to get a system that can do the work at the best price for consumers. Because hot tips about dual core processors have become commonplace among many computer users, the popularity of these processors has grown a lot. Many people have been waiting for the ‘bugs’ to be worked out of the dual core processor systems, before they purchase a system for their own computer. The main groups of computer users who are interested in this technology are the ones that use higher memory applications and people who use a lot of graphic programs such as computer games. This last set of users has been behind the dual core technology since the beginning as this innovation will enhance their playing considerably and allow their systems to compete with video game consoles already on the market. Once dual core processor systems can easily compete with video gaming consoles, and then the gaming consumer will think twice about buying a video console rather than upgrading to a dual core system. While some manufacturers of these processors have gone after the gaming market, others have aimed their marketing towards the business sector. Offering reliable and powerful processing systems to both markets has resulted in many computer users having much more powerful systems with a high level of reliability. The speed at which these processors deliver results is staggering to many users who have been waiting for innovations such as this to come along. Many hot tips about dual core processors can be traced back to online forums among users who wanted a better and faster way to process computer applications. The companies that create these applications wanted the manufacturers of the processors to make the processors faster so that the newer programs could be run much better and faster than they once had. This allowed for a great deal of innovation in the programs being produced as well. Knowing that the dual core processors could handle the program criteria allowed the programmers of games and applications to do whatever they wanted in the creation of a better and faster game or applications program. When talking about hot tips about dual core processors, it’s important to realize that not only are these new processors faster at handling multiple tasks, but they are more capable of being able to deal with many computer programs and processes running at the same time. Since many people seldom run a single program or application on their computer at any one time, this ability to handle multiple applications is very important. The chance of your computer crashing under the load of trying to operate many programs at the same time is very slim now. These powerhouse processors can easily handle all the computing needs you have. You can read all about the newest innovations where dual core processors are concerned by simply searching online for manufacturers who specialize in these systems for computer users.

dual core processors have become very popular in the computer world. Here are some hot tips on dual core processors have been printed in the computer magazines for many in recent years and has helped to whet the appetite for many users wishing to upgrade their computer systems. Ability of dual core processors to run computer systems means much faster and cooler than many people want these processors in their computers.

Hot tips about dual core processors have been discussed in many forums online computer users for several months, and the consensus seems to be that everyone wants on their computer systems. Although many older computers can not be correct architecture to accept these two processors, the majority of new computer models are easy to adapt to this innovation. The ability to dual-core processors to handle multiple programs at once is a very interesting aspect for anyone thinking of buying a dual-core processor architecture in their computer system.

The objective of the companies producing these systems with dual-core processor to achieve a system that can do the work for the best price for consumers. Due to the extreme heat of the dual-core processors have become common among computer users, the popularity of these processors has increased significantly. Many people have been waiting for the "error" to be worked by the system of dual-core processor before you buy a system for their own team.

The main groups of computer users who are interested in this technology are applications that use more memory and people who use many graphics programs such as computer games. The latter group of users has been the source of the dual-core technology from the beginning that this innovation will greatly improve your game and allow their systems to compete with video game consoles already on the market. When the dual-processor systems can compete with game consoles, games and consumers will think twice before buying a video game instead of going to a dual core system.

While some manufacturers of these processors have gone after the gaming market, while others have tried to market them in the corporate sector. Provides a reliable and efficient markets has led to many computer users, who are much stronger in high reliability. The speed with which these processors are able to provide meaningful results for many users who have been waiting for this news come from. Many of the hot tips about dual core processors can be traced back to online forums among users who wanted to improve and accelerate the conclusion of computer applications.

Although some manufacturers of these processors have gone after the gaming market, others have searched for marketing in companies. processing systems that provide reliable and efficient markets has enabled many users with more powerful systems with a high degree of reliability. The speed at which these processors is huge for many users who have been waiting for innovations like to come. Many hot tips about dual core processors back in online forums with users who want better and faster processing of applications.

When it comes to hot stuff dual core processors, it is important to realize that not only are these new faster processors to handle multiple tasks, but they are better able to manage multiple software programs and processes running simultaneously. Like most people rarely run a single program or a program on your computer at a time, this ability to handle multiple applications is very important. Opportunities for the pressure of the computer hangs trying to run multiple programs at the same time very thin now. These central processors can easily handle all IT needs. You can find information on the latest dual-core processors, which are involved in a simple online search for manufacturers that specialize in these systems to computer users.

Sunday, May 15, 2011

Unique Collection of Coordinates In Google Earth

Google Earth is a virtual globe program called Earth Viewer and was created by Keyhole, Inc..
This program maps the earth from the superimposition of images collected from satellite mapping, aerial photography and GIS 3D globe.
Available in three different licenses: Google Earth, Google Earth Plus and Google Earth Pro.
If you frequently play with google earth, following the location containing the coordinates of the unique sights that succeeded in recording by google earth.

1. Indian Head Picture
This image is available in Alberta, Canada.
Coordinates: 50.010083, -110.113006

2. Crop Circles
Located in the desert dipinggiran Beatty, Nevada.
Coordinates: 37.401437, -116.86773

3. Pictures Oprah Winfrey
Located in Arizona.
Coordinates: 33.225488, -111.5955

4. Giant Rabbit
Located in Prata Nevoso, Italy.
Coordinates: 44.244273,7.769737

5. Giant Ford logo
Located in Detroit, Michigan.
Coordinates: 42.302284, -83.231215

6. Color Red Lake
Located in Iraq
Coordinates: 33.39845000,44.48416800

7. Shaped Building Nazi Symbol
Coordinates: 32 ° 40'33 .83 "N 117 ° 9'28 .36" W

8. Firefox Logo Image
Coordinates: 45 ° 7'25 .87 "N 123 ° 6'48 .97" W

9. Picture Lions In the Meadow
Coordinates: 51 ° 50'43 .09 "N 0 ° 33'11 .03" W

10. KFC Logo Image
Coordinates: 37 ° 38'43 .31 "N 115 ° 44'59 .03" W

11. Coca-Cola posts
Coordinates: 18 ° 31'45 .67 "S 70 ° 15'05 .25" W

12. Image Circle Weird
Coordinates: 53 ° 31'54 .19 "N and 1 ° 21'24 .27" W

13. Jet Aircraft Parking In Front Of Home
Coordinates: 48.825183,2.1985795

14. Bikini Collection
Coordinates: -33.892351,151.27538

15. African Break Time
Coordinates: 15.298693,19.429661

Good luck:)

Friday, May 13, 2011

Sites To Download Motherboard Driver

If your motherboard drivers are missing and want to find the motherboard drivers that match your brand PC or Laptop, here I give the info a few sites that provide free motherboard driver.
Link to download the motherboard deliberately takes from the official website so you do not need to fear the infiltrated a trojan or virus.

1. ASUS (www.asus.com)
Download Driver:
http://support.asus.com/download/download.aspx?SLanguage=en-us
2. Gigabyte (www.gigabyte.com.tw)
Download Driver:
http://www.gigabyte.com.tw/Support/Default.aspx
3. Intel (www.intel.com)
Download Driver:
http://downloadcenter.intel.com/
4. MSI (www.msi.com)
Download Driver:
http://www.msi.com/index.php?func=downloadindex
5. PCChips (www.pcchips.com.tw)
Download Driver:
http://www.pcchips.com.tw/PCCWebSite/Downloads/Category_Download.aspx?MenuID=6&LanID=2
6. BIOSTAR (www.biostar.com.tw)
Download Driver:
http://www.biostar.com.tw/app/en-us/support/download.php
7. ASRock (www.asrock.com)
Download Driver:
http://www.asrock.com/support/download.asp
8. AOpen (www.aopen.com)
Download Driver:
http://global.aopen.com/download.aspx
9. ECS (www.ecs.com.tw)
Download Driver:
http://www.ecs.com.tw/ECSWebSite/Downloads/Category_Download.aspx?MenuID=6&LanID=0
10. JETWAY (www.jetway.com.tw)
Download Driver:
http://www.jetway.com.tw/jw/download.asp
11. IWill (www.flextronics.com/)
Download Driver:
http://www.flextronics.com/iwill/product_adns.asp
12. ABIT (www.abit.com.tw)
Download Driver:
http://www.abit.com.tw/page/en/download/download_driver.php
13. Chaintech (www.chaintech.com.tw)
Download Driver:
http://www.chaintech.com.tw/a40_downloads.php
14. EPoX (www.epox.com)
Download Driver:
http://www.epox.com/downloads.asp?class=DRIVERS
15. Foxconn (www.foxconnchannel.com)
Download Driver:
http://www.foxconnchannel.com/support/downloads.aspx

Please try the sites above to find the motherboard drivers you need.

Monday, May 9, 2011

Tools To Analyze A Virus

These viruses are spread on the internet the day grew much so that many companies like kaspersky antivirus providers, McAffe, Norton and others competing to make a very powerful antiviral.
Making an antivirus alone certainly can not be separated from the introduction of the virus itself. We must analyze how it works, what it can do by a virus in it, what are infected and so forth.
To perform the analysis of a virus usually requires tools that can menganaliasa a virus in detail and quick.
Here are some tools you can use to analyze a virus.

1. Malcode Analysis Pack
(Http://labs.idefense.com/software/download/?downloadID=8)
This tool consists of a variety of applications that can help you analyze a malcode.
Examples such as ShellExt, socketTool, fakeDNS, Sheilcode2Exe and so forth.

2. For Windows Autorun
(Http://technet.microsoft.com/en-us/sysinternals/bb963902.aspx)
This application is used to determine the location of auto-starting of the startup screen in windows.
This application will show the programs that run during the system bootup or login.

3. Regmon for Windows
(Http://technet.microsoft.com/en-us/sysinternals/bb896652.aspx)
This tool can show which applications are running to access the registry on your system.
All will be displayed in real-time

4. FileMon for Windows
(Http://technet.microsoft.com/en-us/sysinternals/bb896642.aspx)
This tool will display the activity system of an operating system file in real-time.

5. Multipot (http://labs.idefense.com/software/download/?downloadID=9)
This application is designed to collect a lot of malicious code found on the internet.

6. Process Explorer for Windows
(Http://technet.microsoft.com/en-us/sysinternals/bb896653.aspx)
This tool handles dal find out information about DLLs processes that are currently open.
This application will show a list of processes that are active at that time.

7. Resource Hacker (http://www.angusj.com/resourcehacker/)
Tools that can be used to change the resource on win32 executables and resource files to another.

8. Rootkit Unhooker (http://www.antirootkit.com/software/RootKit-Unhooker.htm)
Applications for mendateksi rootkit.
Some of the features offered include Ultimate Drivers Detection, Hidden Files Detection and so on.

9. SysAnalyzer (http://labs.idefense.com/software/download/?downloadID=15)
This tool is able to analyze malcode automatically run time to monitor what is being done by the system and running processes.

10. PE Identifier (http://www.peid.info/)
This application is used to detect packers, cryptors.
This tool is capable mendeteks more than 600 signatures different from the PE file.

11. VB Decompiler Lite (http://www.vb-decompiler.org/download.htm)
A program decompiler for programs that berextensi EXE, DLL and OCX.

12. MiTec EXE Explorer (http://www.mitec.cz/exe.html)
This tool was created as an executable reader.
This application is able to read and displays executable file properties and structure of a file that is analyzed.

Saturday, May 7, 2011

Distinctive Computer Virus Transmission.

Here's one of the characteristics of Computer Virus Transmission:

1. Your computer runs slower than usual.
2. Menu Run, Search hidden by the virus.
3. CTRL + ALT + DEL can not be used.
4. Regedit and msconfig in disabled
5. Original folders on your computer hidden and replaced with virus files.
6. Menu Tools -> Folder Options in Windows Explorer is missing.
7. Computer frequently stops responding or not.
8. Computer suddenly restarts or crashes and it happens a few minutes.
9. Computer application is not running properly and often error.
10. Files with Folder Icon Appears but has a file type. exe
11. Hard drive or disk drive can not be accessed.
12. Activity print does not work properly.
13. It often happens that strange error messages and do not usually.
14. Often seen a menu or dialog box that is damaged.
15. There is a duplication of the name of the folder in the folder.
16. Computers always remove the message from where the virus originated.

If your computer is experiencing one of the characteristics above, there is a possibility your comp7uter a virus, immediately update your antivirus and scan your computer
to clean the virus.

Thursday, May 5, 2011

How Computer Viruses Work by Type

Virus is a computer program that has the ability to destroy files or damage a computer system.
Viruses have many different types and has a way of working is different,

The following types of viruses and how each virus:

1. Virus Files
This virus has infected the workings of an existing application or document on your computer.
When an infected application is executed, the virus will spread by infecting files or documents accessed by the application.

2. Boot Sector Virus
This virus has a way of working that is infecting the hard disk boot sector (boot sector is an area in the hard drive is accessible when the computer is first turned on).
If the boot sector virus is active, users will not be booting the computer normally.

3. E-mail Virus
This virus has a way of working that is spread via e-mail (usually in the form of attached files / attachments).
The virus has a special characteristic of the extension. Scr,. Exe,. PIF, or. Bat.
If the virus is active, it will transmit itself to the various e-mail addresses contained in the user's address book.

4. Multipartite Virus
This virus has a way of working that infects computer files on the hard disk boot sector as well.
This type of virus will cause many problems because it causes a fatal damage.

5. Polymorphic virus
This virus has a unique way of working with this virus can change the code itself (change form) while spreading itself to other computers
The virus type is more difficult to detect because it has properties like that ..

6. Virus Beast (stealth virus)
This virus has a way of working that is he able to hide himself by making an infected file as if the file is not infected.

7. Macro Virus
This virus has a way of working which infect Microsoft Office applications, such as Word and Excel.
Documents are usually infected by Macro Virus will modify the existing command in Microsoft Office such as the "Save" to spread itself when the command is run.

Tuesday, May 3, 2011

In the editions of Windows Vista

Windows Vista is the name of the newest version of Microsoft Windows, graphics-based operating system from Microsoft that is used on personal computers (PCs), both for home users and businesses, on a laptop computer, or media center.

Windows Vista Editions:

1. Windows Vista Starter
Much like Windows XP Starter Edition, this edition is still 32-bit technology, this edition is limited to local areas, especially as an alternative to the use of legal rather than pirated copies.
Users of this edition will be very limited use, for example, can only be to use three programs at once in a while, barring a network connection, and physical memory is limited to 256MB.

2. Windows Vista Home Basic
Like Windows XP Home Edition, with 64-bit technology, its features also increase.
But not as much as the other edition, Home Basic is intended for home users who do not require a higher facility.
The theme "Aero Glass" with transparency effects also will not be included in this edition.
Home Basic will support up to 8GB of physical memory.

3. Windows Vista Home Premium
Based on Windows Vista Home Basic, this edition features additional support for higher segment devoted to home users, such as HDTV support and DVD menu creation.
Another addition is more games, support for tablet computers and mobile devices, file encryption system, as well as a photo management application.
This edition is similar to Windows XP Media Center Edition and Tablet PC Edition.
Home Premium supports up to 16GB of physical memory.

4. Windows Vista Busines
Comparable to Windows XP Professional, and intended for business users.
Media Center features of Home Premium is not included in this edition, but has facilities IIS web server, fax support, offline files, support for dual physical processor, Remote Desktop, collaboration, P2P, and able to handle up to 128GB of memory.
Product activation is not required for this edition.

5. Windows Vista Enterprise
This edition is intended for the enterprise segment, and is a high-level edition of the Business edition.
Additional features include single-session version of Virtual PC, a multilingual interface support, BitLocker Drive Encryption, and support for UNIX applications.
This edition will not be available through retail or OEM channels, but through Microsoft Software Assurance.

6. Windows Vista Ultimate
This edition combines all the features Home, Premium, and Enterprise.
In this edition also added support for making a podcast (which is translated by Microsoft to "blogcasting"), program-enhancing gaming performance (WinSAT), DVD ripping facilities, and special online services for downloadable media, as well as additional customer service options.
Ultimate edition is intended as the most impressive edition of Vista, aimed at high-end users, gamers, multimedia professionals, as well as PC addicts.
As Business and Enterprise editions, product activation is also not required.

Source: http://id.wikipedia.org

Sunday, May 1, 2011

10 Influential People in the Web World

Based on the analysis of PC World about anyone who is influential in determining how to use web services in the world.

Here's a list of 10 most influential people in the world wide web:

1. Eric Schmidt, Larry Page and Sergey Brin, Google Executive
If your stock price reaches $ 500 per share, you're able to collect money as much as USD 33 billion. You can run a search engine's most crowded traffic on the Internet. Small project Sergey Brin and Larry Page developed into a substation from the Stanford Web's most talked-about and one of several names on this list turned into a verb. Schmidt left Novell to join the ranks of Google's director in 2001 and soon became CEO of the company. By dominating the online advertising world, Google seems ready to travel and buy YouTube acquisition signifies a major step toward complete domination in the Web business.

2. Steve Jobs, Apple CEO
No doubt you'll get bored with media awards Apple CEO about this action. But when someone is applying DRM free music echoes throughout the world, it is difficult to ignore the power of man's influence. Jobs popularize download music, TV shows and movies legally. Through the iPhone to be released in less than five months away, the demonstration at MacWorld Expo to advise that this product is likely to popularize Internet browsing using mobile devices.
If your stock price reaches $ 500 per share, you're able to collect money as much as USD 33 billion. You can run a search engine's most crowded traffic on the Internet. Small project Sergey Brin and Larry Page developed into a substation from the Stanford Web's most talked-about and one of several names on this list turned into a verb. Schmidt left Novell to join the ranks of Google's director in 2001 and soon became CEO of the company. By dominating the online advertising world, Google seems ready to travel and buy YouTube acquisition signifies a major step toward complete domination in the business Web.Tidak doubt you'll get bored with media awards Apple CEO about this action. But when someone is applying DRM free music echoes throughout the world, it is difficult to ignore the power of man's influence. Jobs popularize download music, TV shows and movies legally. Through the iPhone to be released in less than five months away, the demonstration at MacWorld Expo to advise that this product is likely to popularize Internet browsing using mobile devices.

3. Bram Cohen, BitTorrent cofounder
P2P systems like Kazaa and eDonkey are the product of last year. The future is anything related to BitTorrent, the initiator of a mathematician and child prodigy in the world of programming Bram Cohen. BitTorrent was developed in 2001 and gained popularity as a means of pen-downloading large files (like movies) by sharing the load through the hardware and bandwidth. This technology skills to handle large files take Cohen at odds with the Motion Picture Association of America, who asked BitTorrent remove copyrighted content from its network. But the withdrawal did not hamper its work. Reported more than a third of Web traffic now comes from BitTorrent clients. BitTorrent and the entertainment giant has long been combining their strengths. BitTorrent Entertainment Network launched recently released thousands of industry standard film, television shows, games, and songs for sale and lease.

4. Mike Morhaime, president of Blizzard Entertainment
In the world of online gaming, there is World of Warcraft, etc.. With a total of 8 million players worldwide, Blizzard made a profit of USD 1.5 billion a year of WoW. Every player with breathless attention to Mike Morhaime continue if there is a chance to get Blade of Eternal Justice. As with Second Life, the overall real-world business based gaming technology. Unlike Second Life, although this business is exploiting the economic and game play WoW, the whole does not give a good reception.

5. Jimmy Wales, Wikipedia Founder
Many visitors consider online Internet encyclopaedia Wikipedia as the first and last stop in the search for a topic. User generated content to be very reliable that Nature magazine declared it as "a source that is almost as accurate [Encyclopedia]." The site is cited as a source of information in more than 100 decisions in U.S. courts since 2004. But its popularity also makes Wikipedia as a target by spammers, the case is very much so that Wikipedia temporarily blocked access from the entire country of Qatar to the action editing. For business foil spammers, Wales decided to deletion tag "nofollow" on external links, notify search engines to ignore links in preventing the increase in search engine rankings made towards the target of this link. This strategy ensures that the search for excellence Simple will continue to rise. But Wikipedia is only the beginning of Wales. He also launched a personal search engine named WikiSeek who searches on the sites mentioned in Wikipedia.