Showing posts with label Computer. Show all posts
Showing posts with label Computer. Show all posts

Saturday, March 14, 2009

External Laptop Battery

An external laptop battery could be the perfect solution for those who must use the very mobile conveniences of the laptop, but need the power availability of the larger desktop models. With technology and business on the go growing by leaps and bounds, business men and women (or anyone who has come to depend upon the extreme conveniences of these travel computers) are discovering the challenges that come with being dependent upon mobile networks. The reality of having technology, business, personal information, clients, and files at the one's fingertips at all times has developed an new style of commercial industry. More businesses than ever before have employees and subcontractors that are no longer in office, but on the road, working from home, or taking care of business while flying to new clients and countries around the world.

And so, the business world has changed. But, the challenges of having access to business systems twenty-four-seven has emerged and company tasks cannot be accomplished when that gold old constant computer companion has died for lack of battery power. But, never fear, there has been a response to the need for mobile light-weight, additional power and the result is the external notebook computer battery.

Work and play today equate to work and play on the go. This is a reality of the culture that we live in. As companies continue to expand to world wide enterprises and productions increase to meet the needs of many societies, combining office tasks and travel are necessary. The demands upon technology are high, however. Not only do we need technology to be lighter and easier to manage on an airplane or in the back of a taxi cab, but we need it to accomplish more, know more, file more, and offer more running time. Initially, manufacturers attempted to make better batteries that would last longer, and some have been successful. But, now the external laptop battery is the device that is providing the best solution. Anyone who uses a laptop daily will want to investigate the different models that are available on the market and discover that the amazing external notebook computer battery can add valuable work time by added uninterrupted power.

The new models of external power offer the same mobility that the latest laptop computers are offering. Some of the external laptop battery options available are less than one-half inch thick and weigh less than two pounds. These models will fit into almost any computer case and become part of the necessary accessories that users will need at all times. External notebook computer battery packs can be charged apart from the computer, giving the user the ability to charge in another location. Most of the models on the market will adapt to several of the major manufacturer's models, as well. Different batteries advertise different power times, but most have a run time of five hours with some boasting an eight hour continuous run time. Run time will also depend upon what types of programs are being used on the computer. Programs that require more power, such as games, can drain a battery of power. And with the length of some international flights, additional run time offered from an external source could come in very handy.

Some computer manufactures offer external laptop battery packs as an option with certain models. There are also several manufacturers that make external batteries adaptable to most computers. There are some of these power sources that also come with car adapters, so batteries can be charged without an electrical outlet source. These power sources can usually be used with DVD players, cell phones, electronic games, and cell phones. Those wanting to find a way to extend the running time of their computers can begin price comparison shopping online where many of these power sources are advertised.

When looking for the right power source to extend computer running time, it may be wise to talk to others who have experience in electronics and accessories. As with any new device that enters the market, there are usually a few bugs to work out and the prices come down as the instrument is produced by more manufactures. The Bible, God's Word of wisdom to man, explains that getting the counsel of experts will always lead to making wise decisions and choices. Take time and to not only price-compare when shopping for external notebook computer battery packs, but speak with salesmen and the manufacturer of the laptop, as well.

Consumers will want to also beware of cheaper batteries that are available through the Internet. Poor quality external laptop battery sources do exist in this competitive market. When a battery is as much as thirty percent cheaper than comparable models on the market, consumer may want to assume that the piece has been assembled with cells that do not meet UL standards. Check for UL standards before buying any battery power source.

Saturday, February 14, 2009

Find, Remove and Prevent Spyware, Internet Intruders, and Pop-Ups

Spyware is one of the most typical Internet intruders. Spyware, is any product that employs a user's Internet connection in the background without their knowledge, and gathers/transmits info on the user or their behavior. Many spyware products will collect referrer info (information from your web browser which reveals what URL you linked from), your IP address (a number that is used by computers on the network to identify your computer), system information (such as time of visit, type of browser used, the operating system and platform, and CPU speed.) Spyware products sometimes wrap other commercial products, and are introduced to machines when those commercial products are installed.

Trojans, also known as RATS (remote access Trojans), is another type of Internet intruder. Like the horse of old, a trojan carries with it an unexpected surprise. Trojans do not replicate like a virus, but they do leave behind a program that can be contacted by another computer. From there, they can do just about anything. While it's possible a trojan can be used to take control of a computer, the most common trojans are dialer programs. Dialers are used without your knowledge to make international or premium calls (900-type numbers) from your PC. That's more than an annoyance; it can get expensive.

Trojans are most often hidden in games and other small software programs that unsuspecting users download then unknowingly execute on their PCs. Two common trojans are known as Back Orifice and SubSeven.

Adware is software that displays advertisements to computer users. Some of the most strict definitions of adware include applications that are sponsored for their free use. For example, Gator is one adware that collects users information in exchange for its free use.

Spyware's Symptoms

Spyware, trojans and adware contact other computers, and each of them is program of its own, therefore they use system resources such as CPU cycles, memory and an Internet connection.

Slower Computer Speed

There are several reasons your computer may be running slow, but if you use it on a regular basis, then you're familiar with their normal speed. Older computers tend to run slower. Some applications cause computers to run slower. Computers are machines, they do not have moods. A sudden change in how your computer is running could be a sign of spyware or adware.

E-Mail Symptoms

If you're getting a lot of bounced back mail and see evidence of e-mails being sent without your knowledge, then it's possible that trojan spamware has found its way onto your computer. Spamware is a trojan that can turn your computer into a spam launching pad and create headaches for unknowing computer users, especially if a virus is sent. Even if your computer is not being used to send spam, trojans can steal a copy of your e-mail address book and send it back to a spammer.

Abnormal Behaviors

Victims of some trojans report CD drives opening and shutting, or programs opening and closing. These are all signs a program may be up to no good in the background.

Offline Symptoms

Keyboard loggers can capture passwords and user names, so if the bank, brokerage or credit card accounts you access online appear to have been tampered with, your computer may be a place to start looking for clues. User names and passwords to e-mail and Web-based applications are also vulnerable.
If you have any reason to believe someone is interested in tracking what you do online, scan for spyware regularly.

Pop-Up Advertisements

If the following signs are present, it might be an indication that you are infected with Adware or spyware.

-- Ads pop-up on your desktop or over offline applications such as a word processor
-- Ads pop-up when you visited a Web site or open a new Web page.
-- Pop-ups appear after you visited hacker sites or pornographic sites.
-- The pop-up ads are targeting on terms you have searched recently .

Locating Internet Intruders on Your PC

To locate Internet intruders, your first stop should be the Add/Remove Programs section of your Windows Control Panel (Start Menu --> Settings --> Control Panel). You should also check the Windows Start-Up Folder (C:\Documents and Settings\All Users\Start Menu) to see if any programs have been added.

Evidence of spyware infestations can also be found in your computer's registry. It is recommended that only experienced computer users change the registry, and there are registry editors available that help makes changes when they are needed. There are also registry monitors that keep track of which applications are accessing your computer's registry.

Removal of Internet Intruders

One of the first things you should do if you find a trojan or spyware on your computer is disconnect it from the Internet. It is probably not enough to just close a browser session; you should pull the phone line out of the wall or disconnect the modem so your computer is not connected to any network.

Spyware and Adware Scanning Software

The easiest way to find and remove spyware and adware is with scanning software. Anti-spyware software is not the same as anti-virus software, although some anti-virus packages will detect some known spyware programs. The good news is that some of the most functional anti-spyware and anti-adware software is free.

Anti-spyware software works in much the same way as anti-virus software. It scans your computer's hard drive and looks for files associated with known spyware and adware programs. After the scan, the software usually displays or quarantines potential problems and allows users to decide what should be removed. As mention earlier, definitions vary and your tolerance to certain advertising-related cookies may be high.

Like anti-virus software, anti-spyware software relies on databases of known rogue programs that must be updated. Regardless of which anti-spyware package you decide to use, make sure you understand how and when it updates so you are protected against the newest pests. Also check any type of spyware or adware removal programs with the spyware databases. A program called SpywareNuker claims to be a removal program, but has been reported to be spyware itself.

Some anti-spyware software may specialize in locating only keyloggers, for example, so read the features before you use it.

Other Removal Options

You can always check the Add/Remove Programs section of Windows to see if any adware or spyware is listed. Some of the quasi-legitimate adware programs may include uninstallers, but malicious pests do not.

Blocking Pop-Up Ads

One way to avoid the potential danger lurking behind pop-up ads is to install software that blocks them. Many ISPs offer tools to stop pop-ups from appearing. The Mozilla browser does not allow pop-ups. The Google Toolbar also blocks pop-up ads.

There are numerous programs that block pop-ups. Before installing them, research the developer and the company to make sure they are legitimate. Also be sure to note how they effect your system. Some pop-up blockers may discourage new windows, such as instant messages being sent to you, from opening.

Windows Messenger Pop-Ups

One relatively new form of pop-up that has been annoying Internet users with potentially dangerous effects is spam being sent using the Windows Messaging feature in Windows XP. This is not the instant messaging software that is used by millions of computer users, but rather an administrative tool that is meant to be used by systems administrators to contact users.

While there are utilities that claim to stop such pop-ups, the Windows Messenger feature is relatively easy to disable. To disable the Windows Messenger in Windows XP:

In Windows XP --> Control Panel --> Administrative Tools. Double-click Services. Double-click

Messenger. In the Startup type list, choose Disabled. Click Stop, and then click OK.

Safe E-Mailing

You probably know that opening spam or any e-mail from persons unknown or with an unexpected attachment is unwise. In addition to viruses, RATS and other programs can be present in e-mail attachments. Web sites advertised in unsolicited e-mail can try to plant dialers or other types of pests on your computer.

If you use Outlook or Outlook Express for your e-mail, there are some settings you can adjust to make your e-mail safe from spyware and viruses. The Preview Pane, which lets you view an e-mail while keeping your mailbox on the screen, has been a cause of concern among e-mail users, especially if you have scripting or ActiveX enabled. By automatically opening e-mails, there are reports of viruses spreading, such as the KAK-Worm. Malicious content like the KAK-Worm exploits security holes in the software, so enabling or disabling the Preview Pane is not the ultimate issue. Keeping up with patches and security fixes is a better long-term solution.

To disable the Preview Pane in Outlook, click on the View menu. For more information on securing Outlook and Outlook Express, read this: http://www.tames.net/security/oesettings.htm

Safe Surfing

Be careful what you download. Read all dialogue boxes carefully and close anything that looks suspicious. When closing dialogue boxes or pop-up advertisements, be sure to use the proper "X" to close the window. The Web is full of ads that feature mock "Xs" or "Close" or "OK" buttons within the ad. Clicking on them actually clicked on the ad itself. If you're not sure how to safely close a window that has opened in your browser, right click on the window in your Windows Taskbar (usually at the bottom of your display) and click on "Close."

Some ads that appear online attempt to pass themselves off as security alerts or messages from tech support (these are called FUIs, or Fake User Interface, ads). If you're using a computer within an organization, communicate with your tech support staff if you're unsure whether a message is legitimate, and familiarize yourself with how tech support communicates with the computer users in your organizations.

Monday, February 9, 2009

Protect your Wi-Fi from unauthorized access

Computers are connected through wired or wireless media. In wired media STP or UTP cables and devices like hub, switches, routers etc. are used. Now a days people are opting for wireless networking more than wired networking. In wireless networking radio waves and microwaves are used to attach computers. Wireless network also called Wi-Fi network. The first wireless card was 802.11b but the standard are upgraded day by day. In companies, universities, libraries, hotels, airports wireless network are more in demand and more feasible than the wired network. Telecommunication network is a bigger network in wireless networking eg. Mobile Phones. There are many wireless devices that are used like wireless Access Point, Wireless LAN Cards, Wireless Adapters, Wireless Routers etc. There are many types of wireless networking like Wireless PAN, Wireless LAN, Wireless MAN etc.

The wireless network has many advantages as compare to wired networking, there is no need to put cables across the walls of homes and offices, it helps maintaining the beauty and cost/time incurred on drilling/repairing the walls is saved. We also save cost incurred on network cables, it is less time consuming and requires less technical support, easy to set up than wired media. It is accessible anywhere within its range, hence you need not to find a network I/O to get connected, take your laptop within the range of the wi-fi network and access the internet or other resources.

The only problem of a wi-fi network is its limited range and larger networks are affected by weather as well. If you want to setup wi-fi for a large area say college campus etc. you have to add in more access points.

If you are planning to setup a wi-fi network at your home or office, you must address the security issues as someone may intrude into your network and access your valuable information or may send emails using your IP. In the recent incidences, terrorists used the Wi-Fi network of neighbors to communicate with each other and sent threatening emails to people. Hence, ensure that your Wi-Fi is fully secured and nobody else is using it except you.

You can protect your network with firewalls, proxy, VPN and WEP key etc. In WEP (Wired Equivalent Privacy) we give a security code that secures our network and unauthorized person can not access the network. WEP comes with 64bit, 128bit , WPA-PSK, WPA–TKIP security features. For better security, keep changing your WEP key and administrator password, router password regularly, filter out the MAC address and use firewalls at every computer in a network and lock all the folders and make access lists. Access list provided extra level security while giving instructions to routers and filter the MAC addresses. Switch off the routers and other devices when not in use. But the above securities measures can not be implemented in the public areas like libraries, hotels, airports etc.

Saturday, February 7, 2009

5 Easy Tips To Keep Your Computer Running Smooth And Safe

There are various ways to streamline computer performance and functionality. I will show you five very helpful methods that I have learned in the field to help keep your computer running great. Some are free but there are some which will require a small investment which is well worth the cost. I have provided some links at the bottom of this article to help you decide what tools to invest in. This article is for Windows 2000/XP users only

1. Cleanup your startup menu- This is perhaps the fastest way to improve overall performance and startup speed. To do this, go to the run command line in the start menu and type in msconfig. Please ONLY use the startup tab at the top!! Go through the list of startup programs and disable messengers, updaters, and applications that are not used at all times ie. (quick time task, winzip, Ituneshelper). The rule of thumb here is disable what you know you don't need and don't touch anything you do not understand or recognize, they are most likely drivers and system files.

2. Run a disk defragment- If you notice that your applications are taking a long time to load or are not running as smooth as your used to run a disk defragment. This will basically organize your hard drive to run more efficiently. To run, go to your start menu, program files, accessories, system tools, Disk Defragmenter. Click the analyze button to see if you need to defragment and if you do, click the defragment button. Please note, while running this utility you should not make any system changes including saving and deleting files, installing and/or uninstalling programs or moving files on your hard drive. It is best to just start it and let it run. It can take up to 5 hours depending on the size of the drive and the amount of fragmentation in the volume. This is easiest to start before you go to bed.

3. Use anti-virus- I can't stress this enough, if you are on the internet you need anti-virus. Not only will it protect you from attacks but it will actively scan any files you open and will stop most viruses BEFORE they infect you computer. You will have to purchase this for your computer and I have provided some helpful links to good anti-virus programs. These should be set to be running at all times through the settings of the anti-virus program and updated weekly if not daily.

4. Run spy-bot scans regularly- Spy bots are not the same as viruses. A virus is aimed to infect and deter your computer from running correctly. Spy bots can steal your information, passwords, logins, and are typically malicious in intent. I consider these more dangerous than viruses because they can literally steal your identity without you knowing it and open the door to automatically download viruses to your computer. I have also provided links for effective spy bot removal tools. These should be run twice a month.

5. Registry Cleaners- A little known tool for making a huge performance increase to your computer is running a registry cleaner regularly. Basically what these do is remove any unnecessary piece of your registry left behind from either updating your software, removing a program or deleting program directories. By doing this it will help your computer find the correct paths it needs to run the commands given to it and help avoid "confusion" by removing "broken pieces" in the registry.

Backup Solutions For the Home User

For any home user there are many reasons to backup your data. In case of hard drive failure, fire, flood, computer crashes etc. There are also many ways to preserve your data with different types of backup solutions.
The easiest and most inexpensive way to backup data such as pictures, home movies, or financial data is to burn the files to a DVD. That way, in case of data loss or if you have to rebuild your computer, you just simply put in your DVD with the data on it and copy it back to where it should be. If you do not have a DVD burning program, they typically cost about $30. With that you will be able to choose what data goes on each DVD and can be a much easier way to organize your data. There are various backup programs on my site. I can't stress enough though, once the data is backed up please move the discs off site from your home. If there is a fire you will lose the data on both the computer and your backups. If you cannot find a place to put them away from home, buy a DATA fire safe. They cost a couple hundred dollars, but if you try to put a dollar amount on your data the price is well worth the investment.

If you do not like burning DVDs or you just have too much data to copy. I highly recommend purchasing an attachable drive bay with as much space as you need. A drive with anywhere from 500GB to 1TB will cost anywhere from $150 to $300 depending on the size of the drive. Once the data is copied over, you need to find a way to protect it in case of disaster. You can put it in a fire proof safe or possibly at a trusted person's house. Keep in mind though if you are adding data regularly you will want to backup at least once a week. To avoid copying the same data twice, use a program similar to AllWay Sync, it will read both sides of data, compare them and only copy the changes.
Another solution which makes it easy to save data offsite is by using an online backup solution. These sites can be found by searching for a remote offsite backup solution. They will charge you a monthly fee typically and can be very expensive depending on how much data you have. There is also the argument of them having access to your data which is something I personally do not like.
In the end, the choice is up to you. I highly recommend some type of backup solution and I have personally suffered the consequences of not doing so. I lost all of me wedding pictures and the first four months worth of pictures of my son because my hard drive crashed

Tuesday, January 27, 2009

The History Of Laptop Computers

Have you ever wondered where the sleek new portable PC's of today came from? How did they get so small, and so fast? It's true that modern notebook computers have undergone many changes throughout the years.

In this article I will attempt to put together a rough history and timeline based on the laptop computer. I say rough because no one can really put a finger on who developed the first mobile computer. Anyways, let's get started!

Computer buffs may not know who created the first laptop, but most will agree that Alan Kay of the Xerox Palo Alto research center was the first to come up with the idea of the portable PC in the 1970's. Kay envisioned a portable computer much like the ones found today ' Something small and lightweight that anyone could afford.

Some say that the first notebook that was actually built in 1979 by William Moggridge who was with Grid Systems Corp. It featured 340 kilobytes of memory, a folding screen, and was made of metal (magnesium). This was hardly like the laptop computers found today, but it was a start.

Arguably, the next mobile computer produced was in 1983 by Gavilan Computers. This laptop featured 64 ' 128 megabytes of memory, a touchpad mouse, and even a portable printer. Weighing in at 9 pounds without the printer, this computer was actually only a few pounds heavier than notebooks found today.

Gavilan later failed largely due to their computer being incompatible with other computers ' Mainly because the Gavilan laptop used their own operating system.

Apple Computers introduced the apple IIc model in 1984, but it wasn't all that much better than what Gavilan had produced a year earlier. It did feature an optional LCD panel which had on impact on later notebooks.

Finally in 1986 a true laptop was created by IBM called the IBM PC Convertible. I say 'true' because unlike a few of the others, this laptop didn't have to be setup everywhere. And unlike the others it featured two modern 3.5 inch floppy drives, and space for an internal modem! Also found on the Convertible was an LCD screen and basic applications the user could use to create word documents, and schedule appointments.

Maybe most interesting was that the IBM PC Convertible sold for $3500! Of course you would be hard pressed to find that price tag on any laptop these days ' (They have gone way down).

Since the late 80's many manufacturers have come forward to produce new machines that are even faster and more powerful than their previous counterparts. These days the buyer has a lot of choice, and laptops are faster than ever.

source: http://blogcomputers.cn/426838-The-History-Of-Laptop-Computers.html

Tuesday, January 20, 2009

How to locked down keys on keyboard without installing any software

To prevent person that fad with our computer (especially laptop) when we're

leaving our workshop, can be done by pressing keys on keyboard.

This trick is very simple, only by pressing secret keys on keyboard we can

locked down our keyboard and avoid person's hand that fad.

Keyboard must have Fn or Turbo key (usually keyboard on

laptop), and its trick is very easy only by press Fn key and F11 at the same time

keyboard will automaticly locked . And if you wants to activate it just press the same keys again.

Hopefully good for you



Tuesday, January 13, 2009

Computer hardware

-Motherboard
  • Motherboard - It is the "body" or mainframe of the computer, through which all other components interface.
  • Central processing unit (CPU) - Performs most of the calculations which enable a computer to function, sometimes referred to as the "backbone or brain" of the computer.
    • Computer fan - Used to lower the temperature of the computer; a fan is almost always attached to the CPU, and to the back of the case, also known as the 'muffin fan'.
  • Firmware is loaded from the Read only memory eg. ROM run from the Basic Input-Output System (BIOS) or in newer systems Extensible Firmware Interface (EFI) compliant
  • Internal Buses - Connections to various internal components.
  • External Bus Controllers - used to connect to external peripherals, such as printers and input devices. These ports may also be based upon expansion cards, attached to the internal buses.
-Power supply
A case contro, and (usually) a cooling fan, and supplies power to run the rest of the computer, the most common types of power supplies are mechanic shed (old) but the standard for PCs actually are ATX and Micro ATX.
-Video display controller
Produces the output for the visual display unit. This will either be built into the motherboard or attached in its own separate slot (PCI, PCI-E, PCI-E 2.0, or AGP), in the form of a graphics card.
-Removable media devices
  • CD (compact disc) - the most common type of removable media, inexpensive but has a short life-span.
    • CD-ROM Drive - a device used for reading data from a CD.
    • CD Writer - a device used for both reading and writing data to and from a CD.
  • DVD (digital versatile disc) - a popular type of removable media that is the same dimensions as a CD but stores up to 6 times as much information. It is the most common way of transferring digital video.
    • DVD-ROM Drive - a device used for reading data from a DVD.
    • DVD Writer - a device used for both reading and writing data to and from a DVD.
    • DVD-RAM Drive - a device used for rapid writing and reading of data from a special type of DVD.
  • Blu-ray - a high-density optical disc format for the storage of digital information, including high-definition video.
    • BD-ROM Drive - a device used for reading data from a Blu-ray disc.
    • BD Writer - a device used for both reading and writing data to and from a Blu-ray disc.
  • HD DVD - a high-density optical disc format and successor to the standard DVD. It was a discontinued competitor to the Blu-ray format.
  • Floppy disk - an outdated storage device consisting of a thin disk of a flexible magnetic storage medium. Used today mainly for loading RAID drivers.
  • Zip drive - an outdated medium-capacity removable disk storage system, first introduced by Iomega in 1994.
  • USB flash drive - a flash memory data storage device integrated with a USB interface, typically small, lightweight, removable, and rewritable.
  • Tape drive - a device that reads and writes data on a magnetic tape, used for long term storage.
-Internal storage
Hardware that keeps data inside the computer for later use and remains persistent even when the computer has no power.
  • Hard disk - for medium-term storage of data.
  • Solid-state drive - a device similar to hard disk, but containing no moving parts and stores data in a digital format.
  • RAID array controller - a device to manage several hard disks, to achieve performance or reliability improvement in what is called a RAID array.
-Sound card
Enables the computer to output sound to audio devices, as well as accept input from a microphone. Most modern computers have sound cards built-in to the motherboard, though it is common for a user to install a separate sound card as an upgrade. Most sound cards, either built-in or added, have surround sound capabilities.
-Random Access Memory (RAM)
There's too much "stuff" on your computer's hard disk to use it all at the same time. During the average session sitting at the computer, you'll probably use only a small amount of all that's available. The stuff you're working with at any given moment is stored in random access memory (often abbreviated RAM, and often called simply "memory"). The advantage using RAM to store whatever you're working on at the moment is that RAM is very fast. Much faster than any disk. For you, "fast" translates to less time waiting and more time being productive.

So if RAM is so fast, why not put everything in it? Why have a hard disk at all? The answer to that lies in the fact that RAM is volatile. As soon as the computer is shut off, whether intentionally or by an accidental power outage, every thing in RAM disappears, just as quickly as a light bulb goes out when the plug is pulled. So you don't want to rely on RAM to hold everything. A disk, on the other hand, holds its information whether the power is on or off.
Source :*Wikipedia