Today's Horoscope

Your Ad Here

IP Tracer


Monday, May 25, 2009

Some Mathematical outcomes

Some Mathematical outcomes.


1 x 8 + 1 = 9
12 x 8 + 2 = 98
123 x 8 + 3 = 987
1234 x 8 + 4 = 9876
12345 x 8 + 5 = 98765
123456 x 8 + 6 = 987654
1234567 x 8 + 7 = 9876543
12345678 x 8 + 8 = 98765432
123456789 x 8 + 9 = 987654321

1 x 9 + 2 = 11
12 x 9 + 3 = 111
123 x 9 + 4 = 1111
1234 x 9 + 5 = 11111
12345 x 9 + 6 = 111111
123456 x 9 + 7 = 1111111
1234567 x 9 + 8 = 11111111
12345678 x 9 + 9 = 111111111
123456789 x 9 +10= 1111111111

9 x 9 + 7 = 88
98 x 9 + 6 = 888
987 x 9 + 5 = 8888
9876 x 9 + 4 = 88888
98765 x 9 + 3 = 888888
987654 x 9 + 2 = 8888888
9876543 x 9 + 1 = 88888888
98765432 x 9 + 0 = 888888888

Brilliant, isn't it?

And look at this symmetry:

1 x 1 = 1
11 x 11 = 121
111 x 111 = 12321
1111 x 1111 = 1234321
11111 x 11111 = 123454321
111111 x 111111 = 12345654321
1111111 x 1111111 = 1234567654321
11111111 x 11111111 = 123456787654321
111111111 x 111111111=123456789 87654321

6 Reasons

6 Reasons To Have A Data Centre Disaster Recovery Plan


By Brian I Park

Far too many new and small businesses are making the horrific mistake of not only not making a data centre disaster recovery plan a priority, but in some cases neglecting data centre disaster recovery plans altogether.


There are many reasons why a company may hold this opinion of data centre disaster recovery plans; perhaps they believe that a disaster is one of those things that will never happen to them, or maybe they feel that their business does not rely that much on soft data, and that a data centre disaster recovery plan is not practical. However, no matter what the reason, developing a quality data centre disaster recovery plan is always a warranted endeavour, and here's why:
1. Assurance: You can be sure that customer as well as employees will greatly appreciate the peace of mind they will obtain by knowing that they and their information is protected against any sort of disaster. Your customers will rest easy knowing that the company they are loyal too plans ahead and can deal with any sort of contingency and that it is prepared for any problems that may arise. Besides giving your current customers a reason to remain loyal, your data centre disaster recovery plan will be a major selling point to new clients, helping to expand your business.

2. Documentation: While a computer back up system is a staple in a data centre disaster recovery plan, excellent documentation is going to be a fringe benefit that any business will enjoy. Most systems are capable of organizing and sorting data for backups easily, which is an extremely useful feature in the case that you need to restore or refer to the original files and programs that have been, overtime, deleted or misplaced as a result of human errors.

3. File Security: With the risk of corruption being as high as it is nowadays, it is not that far fetched of a scenario of having worms or viruses wreaking havoc on a data centre. These attacks can not only slow your business to a standstill but also affect the quality of your companies output. By having a computer back up system in place, you will not need to worry as it is a simple fix to dislodge the traffic jam and restore any corrupted files, quickly allowing your business to resume as normal and keeping up with your quality of production.


4. Efficiency: Similar in concept to #3, computer backup systems help greatly in work efficiency by quickly restoring damaged or deleted files, allowing the problem to barely be detected as opposed to having major delays. Besides being able to tackle full-blown disasters, data centre disaster recovery plans are also great in sorting out minor problem, which themselves can cause significant delays in production.

5. Savings: That's right! Investing in a data centre disaster recovery plan can save your company a lot of money. By preventing and solving problems of many different sizes from slowing down business and productivity, a data centre disaster recovery plan will amass major savings over the long term. It will also prevent a major financial loss, such as that discussed in scenario #6.

6. Worst-case Scenario: In the natural or otherwise case that a disaster strikes and destroys invaluable data, the business it devastated will be extremely happy they had online computer backups that can quickly restore all the data that they lost. For the companies without online computer backups, there will not be much going on besides a lot of wishing that they had of planned ahead and created a data disaster recovery plan. Hopefully this time after starting their business back over from scratch they will make the right decision and develop a data centre disaster recovery plan.

If your business relies on data, you need a data disaster recovery plan. Find Out More About Online Backup Plan and Web Hosting

How to start...

How to start windows programs quickly with Run Command?

The run option of Start menu is used to run a program or to open a document directly. If you do not know the exact location of the program or document then click on Start button to open Run and type the programs shortcut name to open it directly.
Run Commands
appwiz.cpl — Used to run Add/Remove wizard
Calc –Calculator
Cfgwiz32 –ISDN Configuration Wizard
Charmap –Character Map
Chkdisk –Repair damaged files
Cleanmgr –Cleans up hard drives
Clipbrd –Windows Clipboard viewer
Control –Displays Control Panel
Cmd –Opens a new Command Window
Control mouse –Used to control mouse properties
Dcomcnfg –DCOM user security
Debug –Assembly language programming tool
Defrag –Defragmentation tool
Drwatson –Records programs crash & snapshots
Dxdiag –DirectX Diagnostic Utility
Explorer –Windows Explorer
Fontview –Graphical font view
Fsmgmt.msc — Used to open shared folders
Firewall.cpl — Used to configure windows firewall
Ftp -ftp.exe program
Hostname –Returns Computer’s name
Hdwwiz.cpl — Used to run Add Hardware wizard
Ipconfig –Displays IP configuration for all network adapters
Logoff — Used to logoff the computer
MMC –Microsoft Management Console
Msconfig –Configuration to edit startup files
Mstsc — Used to access remote desktop
Mrc — Malicious Software Removal Tool
Msinfo32 –Microsoft System Information Utility
Nbtstat –Displays stats and current connections using NetBIOS over TCP/IP
Netstat –Displays all active network connections
Nslookup–Returns your local DNS server
Osk —Used to access on screen keyboard
Perfmon.msc — Used to configure the performance of Monitor.
Ping –Sends data to a specified host/IP
Powercfg.cpl — Used to configure power option
Regedit –Registry Editor
Regwiz — Registration wizard
Sfc /scannow — System File Checker
Sndrec32 –Sound Recorder
Shutdown — Used to shutdown the windows
Spider — Used to open spider solitaire card game
Sfc / scannow — Used to run system file checker utility.
Sndvol32 –Volume control for soundcard
Sysedit — Edit system startup files
Taskmgr –Task manager
Telephon.cpl — Used to configure modem options.
Telnet –Telnet program
Tracert –Traces and displays all paths required to reach an internet host
Winchat — Used to chat with Microsoft
Wmplayer — Used to run Windows Media player

Wab — Used to open Windows address Book.
WinWord — Used to open Microsoft word
Winipcfg –Displays IP configuration
Winver — Used to check Windows Version
Wupdmgr –Takes you to Microsoft Windows Update
Write — Used to open Word Pad

Ultimate Protection

Ultimate Protection With Trojan Remover

Author: Arvind

A Trojan remover is effective software for removing the Trojan horse virus from PC. Trojans are delivered by hiding them into downloadable executable or media files. The most common ways of sending Trojan to the victim's computer are through email attachments, chat lines, FTP, freeware or shareware, MP3s and movie downloads. These downloads apparently seem to be innocent in nature and very attractive in their functionalities. Once downloaded, when the files are executed the Trojan is installed in the system.

As Trojan horses disable the anti virus software installed in the system, it is absolutely impossible to detect the presence of Trojan in the system and removing it without a good Trojan remover. If a computer is infected with Trojan and that malware sustains in the system, it can pose serious threats. Trojans can erase, overwriting or copy data, corrupt and encrypt files, upload and download files, steal passwords and credit card numbers. Trojans are also circulated for collecting email addresses for spamming. Trojan horse also poses the threat of installing other malicious software like spyware, adware and porn dialers. Trojans are also capable of running RAT or remote administration tool that enables a remote user to administer and use the computer.

A Trojan remover can save you from all these threats by scanning the system and removing the harmful Trojan. The anti Trojan software works much like an anti virus tool but it can remove the Trojans that is not done by the common anti virus software. With Trojan removal software you can schedule the scanning process that will execute automatically and scan the system for Trojans. The database of the Trojan removal software will be regularly updated as new Trojans are being created everyday. With the automatic updates and scanning you stay protected against any potential threat from Trojan horse.

Apart from using Trojan remover software you can also remove the Trojans from the computer but for that you need to format the hard disc and then carry out a clean installation of the operating system and other applications. But this is surely not a viable solution as that will eventually take a lot of time and can even cause data loss in case you forget to take a back up. So, a Trojan remover is always a smart choice to make to keep your computer protected from the deadly Trojan horses.

About the Author:

Author is admin and technical expert associated with development of computer security and performance enhancing software like Registry Cleaner, Anti Spyware, Spam Filter. Learn how to protect your system from Trojan. Visit our Home or Resource Center to read more about products.

Can you Find a Deleted File?

Can you Find a Deleted File Even if Windows Can't?


Author: Michael Porteous

It happens all the time all around the word on business machines and personal computers, a file you may think you don't need any more or one you accidentally delete without looking too closely and then you empty the recycling bin and ... that's it; the file is gone ... Or is it? Can you find a deleted file or is it totally lost? The answer is yes.

To understand why we must understand how windows and other operating systems find and display files on your computer. Every file and program and bit of data that your operating system can access has what is called a reference or pointer to where that file is stored on your hard disk. This file may not even be stored sequentially on your disk it may be stored in bits and pieces if it is large and the file itself has pointers referencing where the next pieces is and so on. These pointers are absolutely essential for windows to be able to see if a file exists, if there is no pointer to that file then as far as the operating system is concerned it does not exist.

Data on a hard drive when deleted is not lost, the same sequence of 1's and 0's that make up all parts of data and software are still there sitting on the disk it just cannot be found as there is no reference, it is lost not deleted. To truly delete a file the locations where the file is stored must be scrambled so that it does not make any sense to any system, only then is a file unreadable and effectively destroyed.

However when you delete a file it does not scramble and destroy the file it simply removes the pointers that reference it. This means that while windows cannot find your file and never will be able to the file exists and will continue to exist until such a time when that space on the hard disk is used to store other data.

So if you cannot find a deleted file at the moment you will not be able to get it back without some outside help from third party programs that can scan your hard disk and find your files for you. While annoying (or possible job security threatening!) losing a file does not have to be the end of things as it still exists!

About the Author:

Is your file defiantly deleted and gone?
how important was it?
If you really need that file and want the capability to undo any accidental damage you do to data click hereto find out more.
Don't panic! You can retrieve it very quickly!

Thursday, May 21, 2009

How to Recognize.....

How To Recognize If Your Computer Has A Virus Or Trojan On It.

You have permission to publish this article electronically
or in print, free of charge, as long as the bylines are
included and all links are made active. A courtesy copy of your publication would be appreciated: published@antivirus-report.com

How To Recognize If Your Computer Has A Virus Or Trojan On It.
Eric Koshinsky
http://www.antivirus-report.com

It isn’t always easy to tell if your computer has become infected with a virus or similar anti-social piece of software. Normally, your antivirus software will locate and identify any malicious programs that find their way onto your computer. However, in the event that you haven’t yet installed the antivirus software, or have let it get out of date (shame on you), here are a few things to look for as clues that you have an infection of some sort on your machine.

Disk Space Reduction
The disk space reduces suddenly without any cause - this is because many viruses create multiple copies of themselves every time the disk is accessed. These copies are normally made by attaching the virus code to already existing programs on your system. This increases the file size of the newly infected file and reduces the amount of space on your drive even though you did nothing.

Directory Structure Damage
Some viruses destroy directory structure to achieve replication. When this happens, when you try to view the contents of that folder, you may see garbage and/or incorrect files displayed on the screen.

File Allocation Tables (FAT) Damage
File allocation tables are used by Microsoft ™ operating systems to manage all data on computer disks. They are basically a complex record of what and where all data is located on your computer's disks. By destroying FAT, considerable data loss can happen very easily. This type of damage is not limited to Microsoft™ operating systems. All computer systems have some sort of disk data management system, and viruses are designed to attack any of them.

Improper Disk Function
Some viruses, when in memory, watch all disk activity and divert the system to access the disk in an improper, unwanted and damaging manner. This can often be noticed by increased disk activity (for instance your disk is always active), slower open and save times, and generally slow disk performance.

Hard drive noise
Some viruses watch all disk activity and when the conditions for infection are matched the virus will check for targets on the disk and infect/destroy them if found. This search, infection, destruction requires some extra time and more disk rotations, which is often indicated by more hard drive noise, the hard drive never stopping, or simply taking longer than normal to access your files. Unfortunately, these symptoms also develop when you need to defragment your disks. A good commercial virus checker will let you which is the case.

Drive light glows without any reason.
When some viruses take control they search for their target on all drives they can possibly access. As a result drive lights may glow (turn on) without you actually doing anything that accesses the disk (saving a file, loading a file).

If you find that your computer is accessing the hard drive more and more frequently while you are doing nothing that access the hard drive (like reading an email for example), you may want to perform a complete system scan with your antivirus software to rule out a possible virus or spyware infection.

Increased Number or size of Files.
Viruses often create new files to store their own code in separate files. Generally such newly created files are hidden. However if you suddenly start to lose disk space, it can often be a sign of a virus creating hidden files on your hard drives. Some viruses increase size of the executable files, while infecting them, as they attach their own code to them.

Change in Date/Time Stamp of the File.
Some viruses do not restore the old date/time stamp of a file after infecting it, hence date/time stamp of the file is the date/time stamp of the virus infection. Look out for other odd things like when the 'seconds' entry of a time-stamp shows more than 60 seconds.

Funny things happening with your screen
Viruses can use the screen for other activities than just for displaying the message. Some viruses are specially designed to play with the screen such as they can highlight some pixel character or can increase intensity of some pixel or display bouncing balls on screen etc. Some viruses show effective animated pictures e.g. a dancing girl on your screen while in background the virus is busily formatting your hard disk.

These few things represent clues to an infection – you could say they are all when your PC starts doing odd things. Relying on figuring out you’re infected isn’t really a very smart solution, since any damage could well be done before you notice. What you need to do is to take decent precautions to prevent the infection in the first place. Step one is almost undoubtedly buying and running antivirus software from one of the major suppliers.

To learn more about effective, easy to afford and use PC protection tools, visit http://www.antivirus-report.com

+++++++
Note:

If you manage a website with similar content to http://www.antivirus-report.com, we are interested in exchanging links with you. Please visit http://www.antivirus-report.com/link-to-us.html for more details.

+++++++

********
Note II:

We have a 100% brandable version of the antivirus report available to anyone who wants to add an effective broad appeal revenue source to their portfolio. It is available at no expense ( F.R.E.E. ) here:
http://www.antivirus-report.com/aa-brand.html

********

About the Author

Eric Koshinsky created the layman’s guide to antivirus and PC protection after helping too many people deal with simple PC problems. Find out exactly how to protect your computer from harmful internet attacks at http://www.antivirus-report.com. The comprehensive antivirus report is available at no cost. Find out how to block trojan horses, spyware, computer viruses, and other malicious software quickly and easily in one place.

Written by: Eric Koshinsky

Dual core Processor....

Dual core computer processors: luxury or necessity?

Most of the talk going on in the computer processor industry is revolving around dual core processors. But what advantages do they actually give and is it worth it in terms of price?

All processors have a core. A processor contains some memory, often referred to as cache, either L1, L2 or L3, depending on how close it is to the core, and the core itself, as well as a few other essentials. The core is the "brain" part, it performs all the big calculations that are needed for the various things a computer does.

Computer cores have been increasing in speed, and increasingly quickly. Manufacturers were in a race to have the chip with the fastest speed, measured in GHz. One surprise is that despite these increases in clock speed, the actual speed of programs didn't increase proportionately.

As modern programs make much heavier use of other computer parts like memory, and there are often many running at the same time, another approach was needed.

Dual core processors were the answer.

By putting two "brain" parts into the processor, you can run two programs on two cores, without having to share it between them. The effect of this is that when running two or more programs, the processor can now handle much more as a whole.

The part about them that might disappoint is gaming.

Unlike the multitasking environment that is usual for a computer either at home or at the office, games rely on the brute force of a powerful processor to help them along. So far there is no technology to take advantage of the two processors, like the ability to split its tasks over two cores. Most gaming has not improved with this new technology.

As with processors in the past the mainstream of dual core processors is dominated by the two big guys, Intel and AMD.

Intel offers two processors in its range, same processor, just different speeds. The lower priced of the Pentium D processors comes in at around $250. This price is reasonable considering how much you would pay for the top of the line single core processor.

The Pentium D is based on the same core as it's single core counterparts, just two of them inside. Its boost in performance is quite notable, and makes it presence felt in the multitasking environment.

The AMD Athlon X2 is AMD's offering in the dual core market. Unlike the Pentium D its lowest priced model comes in at a staggering $400. It's not expensive compared to processors like its FX series, which are over $1000, but in comparison to Intel it's expensive.

It too is based on the same core as its single core cousins and also offers the same performance increases.

The price of the AMD is surprising. From a company that became renowned for it's low cost, high performance processors this is quite a blow. Even the upper model of the Pentium Ds comes in at less that AMD's cheapest model.

The price might be justified if the AMD actually gave a significant performance boost, but it doesn't.

For the first time in a long time, I think I would be willing to switch back to an Intel processor. Although my preference is not for dual core, if I had or needed to switch I would certainly go straight for the Pentium D.

And finally, how do they compare to their now out of date traditional processors?

Considering how powerful processors have become I would still not make the switch. Dual core has not been around long enough to produce low cost, slightly out of date models. The power of the AMD Athlon 64 3000+ more than does it for my computing needs, and that's where I would stay for now.

So for those who are looking for the next cool thing for their desktop computer and price is not a huge issue, this would be your best choice, but go for the lower end Pentium D.
About the Author

Peter Stewart is a computer enthusiast, his interest in computers and focus on practicle down to earth advice inspired his two websites. http://www.computer-buying-guide.com - Practical buying tips http://www.computer-reviews.net - Fair and honest reviews and opinions

Written by: Peter Stewart

Computer Backups

COMPUTER BACKUPS

COMPUTERS AND HALLOWEEN, DO THEY MIX?

Computer backup is so important to your computer that to ignore it is to risk its damnation.

Computers require care and feeding. They require that you attend to their needs. If you don't, then they will most surely be sent to Hell.

Halloween means Hell. What! What do you mean that Halloween means Hell?

Well, if your computer is given the option of trick or treat, which will it accept? Will it accept the trick or the treat? What do you think?

Halloween is the time that computers are subject to tricks or treats. Did you know that more computers fail on Halloween than any other day of the year? That's right. It's true (smile). Your computer is in danger! Protect it. Do your computer backups.

Back to the Hell thing. Hell you say? Yep. Well, what do you mean by Hell?

Computer hell is the place for computers without computer backup. The failure to perform hard drive backup means that you are playing Russian Roulette with your data. Data needs your protection. Failure to protect your data may cause your home or business records to be sent to Hell.

Hell in this instance is for the records and files that cannot be resurrected. Resurrected you say, what does that mean?

It means that without computer backup as a source of salvation then the files can safely enjoy eternal oblivion. Oblivion you say, what does that mean? That means they are eternally lost from computer resurrection.

Is there any mercy for my precious files, you ask?

Why yes there is. Would like to know what the mercy for your files is? Yes! Yes! You say.

OK boys and girls listen carefully. The salvation, mercy, resurrection and redemption of your files lies in regular and consistent and persistent computer backup.

If you backup your computer consistently and persistently your files will be resurrected and saved from accidental deletion, hard drive failure and those nasty things like fire, flood, theft, earthquake, hurricanes, tornados and the like!

Computer backup is the key to your data's salvation!

Do your computer backups boys and girls.

Milk and cookies will be served in the pantry.

Trick or treat for your computer backup?

******* Did You Enjoy This Article? ********

If so, go ahead and publish it on your website, blog or Ezine.

Kindly include the following Resource Box and notify the publisher Jack Back at Jack@tweakspeed.com when you publish the article. You may publish the article only if you do so in its entirety without change.

Jack Back has been a working computer consultant company owner since 1991. He started in IT in 1983. Now get your FREE 2 part guide on how to save your precious computer data from loss at the http://www.tweakspeed.com/Computer-Backup-1.htm website.
About the Author

Jack Back has been in the computer business since 1983 as an IT executive and working computer consultant company owner. He has helped many clients after a computer crash who had no computer backup. Conversely he's insured that many others don't suffer that pain. His articles result from the daily challenge of solving and preventing client computer problems. Go to his website at http://www.tweakspeed.com/Computer-Backup-1.htm for more information.

Written by: Jack Edward Back

Buying a Used Laptop?

Buying a Used Laptop Computer

Buying a used or refurbished laptop is much the same as buying a new one - except you are going to get a much better buy! When considering buying a used laptop, the first thing to do is to determine what your needs are.

What do you want to use the laptop for?

*Word Processing *E-mail *Internet Browsing *Use at Work and at Home *Gaming *On-line Shopping *Database Applications *Personal Finance and Online Banking *Coding *Schoolwork

The reason for assessing what you applications you need are that most refurbished laptops often only include the Operating System (OS). Some don't even have an OS installed so make sure you know what you're buying before you spend your money.

Once you establish your computing needs, you need to determine your budget.

Refurbished laptops don't always come with an operational battery. If you need a battery, shop around to figure the cost to replace one. You should know that older laptop batteries don't last more than an hour or two, and even purchasing a new battery for the purpose of longer battery life may not be worth the expense. You should also stick with name brand battery manufacturers like IBM, Dell, Toshiba and Compaq-HP.

Once you have your refurbished laptop, you may not know what to do next. If you are new to computers and you want to browse the World Wide Web, you will need to obtain the services of an ISP (Internet Service Provider). There are basically two types of Internet access options: broadband (cable modem, DSL, satellite) and dial up. Broadband is the preferred type since download speeds can range from 128kbs to 6000kbs (faster is better). But, if your budget is tight, dial-up access will work fine for typical browsing and e-mail usage.

If you bought your used laptop for gaming, you definitely need a reliable broadband connection. Gaming over a dial up connection will be frustrating and on some cases even impossible. That is why it's critical that you check out the minimum systems requirement for the games you like before buying the laptop. You want to make sure the CPU speed and the RAM and graphic chip requirements will support your needs.

Finally, where do you buy your used or refurbished laptops?

* Some people choose to search at www.ebay.com. If you be sure to check out the seller to be sure you will have a smooth transaction. * Many don't want the hassle of bidding, so will use their favorite search engine: www.google.com or www.yahoo.com or www.msn.com for the terms used laptops or refurbished laptop.

How do you choose once you have a list? 1. Look for online reviews 2. Make sure they have a BBB Online Insignia 3. Make sure their service is up to you standard. Most of the vendors have 800 numbers, so it won't cost anything to call. 4. What do their prices look like?

If all the above seems like too much of a hassle, then buy a new computer. It will cost around $800 + but will come with a new battery and a one year warranty (although some new ones seem to have only 90 day warranties). It will also have the latest Windows XP system and an 800 number to call the vendor, should there be a problem.
About the Author

David Perlmutter is a successful entrepreneur dedicated to helping his customers maximize the benefits of refurbished laptops and refurbished notebooks. His business, UsedLaptops.com helps consumers get the technology they need without the cost of new hardware. Learn about maximizing your investment in refurbished laptops and used notebook computers with David's free articles at: http://www.cheap-refurbished-used-laptops.com/

Written by: David Perlmutter

Buying a computer?

Buying a computer? Ask these 3 questions!

1. Why do you need a computer?

Whether you are a new user or advanced one, whether this is your first computer or second (or even third), be clear as to why you want a computer before you even think of buying one.

How will you use your computer? Are you only interested in browsing the Internet and checking e-mail? Do you plan to use your PC as a programming machine? Do desktop publishing or video editing feature on your agenda? Or is it a gaming rig? What is a computer? http://www.hardwaresoftwarearticles.com/

Consider these factors before stepping into a hardware shop.

The basic components of a computer system are the motherboard (containing the processor and memory), keyboard, mouse, monitor, diskette drive, CD-ROM drive and hard drive.

In addition, there are several other types of devices you may or may not need. A trackball, joy stick, modem, tape drive, zip drive, printer, plotter, scanner, sound card and speakers, television card and video capture card, to name a few.

Whether you buy these will depend on what you need the computer for and which software applications you intend to use.

Remember the golden rule: the fastest or most expensive computer is not necessarily the one you need.

Finally, the length of time that you plan to own the computer before replacing it will also help determine which computer to buy.

2. What is your budget?

This is the next thing you need to be certain of. How much are you willing to spend on a PC?

After you arrive at a figure, keep a margin of a few thousands. It will give you some room for flexibility. If you are short on money when you buy your computer and cannot add all the peripherals you want, be smart. Hardware: http://www.hardwaresoftwarearticles.com/archive/index.php/f-21.html

Buy as much as you can afford. Don't cut corners on the main system unit (monitor, processor, memory, disk space).

Remember, you want the computer to last at least four years. You don't want to run out of disk space or memory in the very first year, all because you trimmed down on the memory or got a smaller hard drive.

Hard disk capacity matters a great deal as it takes no time for data to fill the available space. A 40 GB hard disk is sufficient disk space, but 80 GB is the standard recommendation.

Random Access Memory is the amount of memory available for use by programmes on a computer. One of the important factors to ensure the smooth running of your system is the memory available.

The more the memory, the better it is. Make sure you can upgrade your computer's memory as and when required.

The RAM chip comes in capacities of 128, 256, 512 MB, even 1 GB. Most computers function efficiently with 256 MB RAM, though a 512 MB RAM does offer you an edge.

Hold off on the printer or a software application and other accessories that you really don't need right away. You shouldn't have any problem installing these after the original purchase has been made. Just ensure you buy components that are compatible with your system.

3. Should you go for a branded PC or an assembled one?

Assembled machines are popular because they are more economically priced.

Branded PCs cost around 35 to 40% more than their assembled counterparts.

Besides, you can choose your own specifications with assembled PCs. You are not forced to accept a rigid component configuration. You cannot customise a branded PC to suit your exact requirements. Games: http://www.hardwaresoftwarearticles.com/archive/index.php/f-6.html

With the same price that you would pay for a branded piece, you will be able to own a superior assembled PC.

Make sure the components purchased for the assembled PC are original. Take along an informed, reliable assembler to purchase the components so that you are not fooled by counterfeit parts.

The advantage of a branded PC is the reliability of the brand, the after sales service and the technical support. On the flip side, the after sales services and repairs offered by the brands are a tad expensive and not prompt most times.

Don't forget to look at the warranty. Generally, a warranty period of a year is normal for all major parts of the PC. But there are good brands that offer either more years or the option of an additional payment to top up the warranty period.

Talk to your friends and colleagues who have assembled PCs. Ask them about their experience and recommendations on whom to approach. Question them as to what happened when they had a problem. Was the individual easy to access? Did he offer prompt service? Does their computer give a lot of trouble?

If possible, meet two or three individuals before you finally zero in on one.

Spend some time on these three issues and you will be all set to buy your very own PC!

About the Author

Adam Fletcher is the webmaster of Hardware Software Articles http://www.hardwaresoftwarearticles.com .

Written by: Adam Fletcher

A hacker Inside.......

A Hacker Inside Your Computer?

Imagine this nightmare scenario...

You check your e-mail program and it reports your username
and password as no longer valid. You call your Internet
service provider (ISP) to discuss the problem and they tell
you they turned off your account due to "abuse". "Abuse!"
you cry to the customer service operator, "What are you
talking about?"

"Someone used your computer this past Saturday night in an
attempt to hack into a government computer system. They
made the attempt at 1:20 a.m. from your account," replies
the rep. "Look in your windows registry for a file called
QAZWSX.hsq."

You punch a few keys and sure enough the file stares right
back at you. "What is it?" you ask, scared to know the
answer.

"Someone used a Trojan Horse virus to remotely control your
computer and cloak the identity of the hacker. Here's how
to get rid of it, just..."

What you just read happened very recently to someone I know
quite well. A computer hacker found an open port on his
computer when he switched over from a dial-up Internet
connection to an "always-on" high-speed connection.

The hacker used a robot scanning the Internet for available
"ports", openings in a computer that allow data to pass
back and forth from a network connection like the Internet.
Once the hacker found an unprotected port on my friend's
computer he simply inserted a Trojan Horse virus that rides
along with Windows Notepad, a handy utility used by just
about everyone who makes web pages.

When my friend activated the notepad program he also
activated the virus. The virus in turn transmitted all of
my friend's security information to the hacker and allowed
him to gain access and control his victim's computer in the
middle of the night.

Count me as the last person to sound paranoid, but, as
always-on connections through DSL, cable, and T-1 lines
proliferate, this story will repeat itself over and over
until people learn to protect themselves.

Most people underestimate or are completely ignorant about
the importance of information they send over the Internet
when surfing websites and checking email. Even if you only
use a simple dial-up account, you can unknowingly transmit
a significant amount of sensitive information.

You can analyze the security of your web connection for
free by going to http://www.symantec.com/SecurityCheck/ .
You can also verify the presence of any known viruses or
Trojan horses on your computer. The information I saw when
analyzing my personal computer frankly shocked me. I saw
data I didn't even know existed staring me right in the
face after I performed this analysis.

To protect your computer hardware and sensitive data you
should obtain a software package called a "firewall". A
firewall, when combined with a good anti-virus program,
helps stop unauthorized access on your computer, prevents
virus infection, and "cloaks" your data ports against a
hacker scanning for openings.

Symantec.com and McAfee.com both offer excellent personal
firewall and anti-virus software from their websites or you
can buy them off the shelf at your local office supply
store. A wise investment for anyone on the net... before
it's too late!

-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
"Finally – a Simple, Video-Based Training System on CD-ROM
that Teaches You Step-By-Step How to Make Real Money
Online-100% Guaranteed!" You can start with a few bucks and
a good idea to make lots of money online! I did, and I'll
teach you how no matter what product or service you sell...
http://www.the-easy-way.com/33days.html


About the Author

Jim Edwards writes a syndicated newspaper column in plain
language for non-technical people about current Internet
issues, challenges, news, HOT new tools... and much more!
"The Net Reporter" ==>
http://www.the-easy-way.com/33days.html


Written by: Jim Edwards

Way to make night....

Ways To Make Night-And-Weekend-Computer-Life Rich

Are you a computer-worm? Do you thrive on a computer 24/7? A “computer-worm” is analogous to “book-worm” – a person who spends most of the time working on a computer. Do you expend most of your time reading or writing emails, chatting with friends, watching movies, listening to music, cyber-window-shopping, etc? Do you relegate your important tasks of completing a school assignment, working on a contingency project, etc to realize later that you spent the prime-time idly? In this article, you would discover few ways of improving your cyber-life – how to make your working on a computer more useful and much more effective.

Technology revolution has supplemented the ease and increase of computer usage. The overall at-home global active internet use for a number of selected countries grew by two-thirds of a percentage point from February 2004 to March 2004 (Nielsen//NetRatings). Switzerland exhibited the largest growth rate at over 3 percent, while U.S. added the most active Internet users over the month. With this enormous increase in internet usage you have to keep the following 5 ideas in mind that would help increase the efficiency of work that you do while on your computer off-work.

1) Chat or email kills your time-

Avoid opening a chatting application, or an email application as your first window. When you find one of your friends on the chatting window (or email from one of your friends), you inadvertently start conversing with the person. On the other hand, if you do not find any friend, you search for a new chat-buddy. In both the cases you deviate yourself from important tasks. This hinders you from working on essential activities that you intended to do when you started the session.

Instead, make a habit of completing tasks that you planned before opening a chat window or an email window. Treat yourself with a chatting session (or an email session) for completing the daily (important) tasks.

2) Audio speakers add to your entertainment-

Turn on your pair of audio speakers, if you have one. Listen to online news, success stories, motivational speeches or jokes while working on your important tasks.

Online news is becoming common day after day. You can view and listen to news on many websites. You would find it easy to access online news channels if you have a “superpass” with Real Networks (http://www.real.com/superpass/). Nevertheless, websites like MSN (http://msnvideo.msn.com/), ABC News (http://abcnews.go.com/) offer feeds to news and other interesting stories available for free download.

3) Do smart-browsing not the hard-browsing-

When you read on the internet, do it intelligently. One way of intelligent reading is to increase your vocabulary. Look up difficult words in the dictionary when you read documents on the web. You can use innovative internet tools like XemanteX (http://www.xemantex.com) that provide an online-running-dictionary. You can read through the document with a built-in dictionary. Just double click the word to get the meaning on the same screen.

4) Online games as concentration tools-

Play online games. Games not only give you entertainment but also help you increase your concentration. There are many websites that offer free subscription to the games on their website. Perform a Google search on “free online games” that would bring up thousands of resources. Enjoy playing a game, improving your personal skills at the same time.

5) Help your mind concentrate-

Split your entire sitting into various sessions. You would be able to give out more every session. Take a coffee or tea break every 45 to 60 minutes. This would help your mind free up its resources and get back on track after the break. Moreover, this would help you avoid narrow thinking. One gets to think through a narrow channel when deep concentration.

Okay, I told you 5 simple and common ways to make your off-work computer life easy. Try them out and feel the difference. You would be happier and feel more accomplished. As you know internet has redefined human’s life. Computer, which was used only by intellectuals and elite a few years ago, is a basic requirement for a common man now. To add fuel to the fire, internet has supplemented its power transforming them the best communication tool. Instant messaging, emailing, electronic news, etc allow for fast and easy communication among the internet users. Very soon, computers would be indelible parts of our life. You should realize that the tremendous power that this internet has can only be harnessed when it is put to use in the most efficient way.

Prasad Kopanati is the Vice President of XemanteX Inc. (http://www.xemantex.com), an internet company offering language related services as dictionary tool displaying meanings for words appearing in the text on the internet web pages. You can reach him via email at team@xemantex.com.

Written by: Prasad Kopanati

Avoiding Spam, Scams....

Avoiding Spam, Scams and Computer Viruses

One of the most popular pages on about-the-web.com is about
avoiding scams, hoaxes and urban legends on the Internet
(http://about-the-web.com/shtml/scams.shtml). Here are a
few ways to avoid some of the perils associated with being
connected to the rest of the world.

As a general rule of thumb, beware of any offer that sounds
too good to be true. This applies to products being offered
on the Internet and especially to any unsolicited offer or
spam you receive in your email. Many of these are scams.

The term "spam", in case you don't know, refers to any
unsolicited bulk email. If it's not addressed to you, or
you don't recognize the sender, or you're being asked to
buy something or pass along questionable information, then
that's spam. My advise is to "can the spam" by immediately
deleting any email you receive from anyone you don't know.

The best way to avoid spam, is to be very careful about who
you give your email address to. My advise here is to set up
a free email account and to give this email address to
anyone you don't absolutely trust with your personal
information. It almost never does any good to fight back
against spam. Your best course of action is just to delete
any unwanted email.

A trick that has been pretty successful for me is to set up
an email rule (or filter) that automatically sends any mail
not addressed to me to a special folder. Most of this is
spam and can be easily disposed of.

In addition to spams and scams, the other thing to watch
out for on the Internet is hoaxes, urban legends and false
information. There are many of these floating around the
Internet these days. Beware of any email that asks you to
send money for any cause, or to forward the email to all
your friends. Almost all of these are hoaxes. An excellent
resource for information on hoaxes, urban legends and false
information is http://urbanlegends.about.com/index.htm

Another category of hoaxes involves virus warnings. If you
receive information that indicates you can get a computer
virus from doing anything except opening an email
attachment or running an application, then this is probably
false information.

Most computer viruses are spread by users opening email
attachments that contain the virus. NEVER OPEN AN EMAIL
ATTACHMENT THAT YOU ARE NOT EXPECTING. Even if you know
the sender, make sure the attachment is legitimate before
opening it. It is much safer to delete any questionable
attachments and ask the sender to resend them than to
assume that the sender intended to send that email.

Your best defenses against computer viruses are: 1) caution
in downloading programs from questionable sources,
2) regularly scanning your drive with virus protection
software, and 3) backing up all your important data to a
different drive or media (floppy, Zip or CD-ROM) as soon as
possible. By doing all of these, if your system does get
infected, you can restore it with a minimum of hassle.

Always check out any offer or information you receive
before sending any money or forwarding the information
to someone else. That way you can rest easy knowing you
aren't getting scammed or passing along an urban legend.


About the Author

Garth Catterall-Heart
About-the-web.com is an Internet Guide for new users to the
Internet. Learn about browsers, e-mail programs, search
engines, making money, avoiding scams, creating and
promoting web sites, and some simple tips for a better web
surfing experience at http://www.about-the-web.com

Written by: Garth Catterall-Heart

Tuesday, May 19, 2009

Top 5 tips

Top 5 Tips for Increasing Your Search Engine Rankings

Summary : According to Pierre Zarokian, �In the past couple of years, many of the major search engines have shifted their ranking algorithm to give higher preference to those sites that are more popular by having many links to them or having links from important sites.

CPU Review (www.cpureview.com) recently sat down with search engine optimization (SEO) expert Pierre Zarokian. Pierre is president of Submit Express (www.submitexpress.com) - which was founded in 1998 to provide search engine optimization for medium-sized and larger businesses that need to achieve top rankings within the search results at the major search engines. Submit Express specializes in the optimization of websites in competitive markets.

According to Pierre Zarokian, "In the past couple of years, many of the major search engines have shifted their ranking algorithm to give higher preference to those sites that are more popular by having many links to them or having links from important sites. This is called Link Popularity. Since, Link Popularity is a major ranking factor these days, most my tips below are geared towards this issue, rather than other criteria such as site content."

Tip #1 - Make Sure that You Get Listed With Yahoo!

If you're not listed with Yahoo! you should go ahead and pay for the Yahoo! Directory submission. This will set you back around $300 annually. Getting a Yahoo! listing will help your Google page rank. Having a link from a site such as Yahoo! , which itself is a popular site is very beneficial. Remember that Quality is better than Quantity.

Tip #2 - Submit to All the Other Directories, Especially the Dmoz Directory

The Dmoz Directory (www.dmoz.com) also known as the Open Directory Project contains search results that are reviewed and categorized by human editors in a way similar to Yahoo! The results are popular among a variety of search engines and power various other listings. Therefore, getting listed at Dmoz.com can have a great trickle down effect. Recently, DMOZ has been having problems with accepting new listings via their submission form. However, I urge all webmasters to keep checking and submit when the form is working. Two other directories worth getting listed in: business.com and jayde.com.

Tip #3 - Create a Large Volume of Inbound Links (But Only the Right Kind!)

Make it a point to initiate link exchanges with other relevant sites - but don't bother exchanging links unless the partner site has a Google page rank. It is best if the exchanging site has a Google page rank of at least 2 or 3. Pages that have a page rank under 2 have little impact on your search rankings. You can observe any site's page rank by downloading the Google toolbar at: http://toolbar.google.com. Again, remember that Quality is better than Quantity. You should also try to find sites with topics related to your website to trade links with.

Tip #4 - Include Keywords in Text Links

When requesting text links in your link exchange campaigns, it is most beneficial to include some keywords in your title of the link. For example, if your company is called ABCcarts.com and your main service is offering shopping cart software, I would recommend the following link title: "ABC Carts - Shopping Cart Software"

Note that by separating keywords in your domain name, you may have the benefit of adding additional keywords.

Tip #5 - Stay Ahead of Your Competition by Reading Online Resources Regularly

Search engines change ranking algorithms frequently and the search engine industry is rapidly changing. Subscribe to online news services and read bulletin boards to keep up with all the changes. We recommend the following resources, some of which may are paid services:

Search Engine Watch: The premier search engine news and tips resource. Offers a free and a fee-based subscription option.
http://www.searchenginewatch.com

Search Engine Forums: A long running search engine message board used by many expert webmasters and SEO professionals.
http://www.searchengineforums.com/

Webmaster World: A leading Webmaster message board that covers search engines. Many professionals also use this site. Once in a while you can get expert advice from "GoogleGuy" who is a Google employee.
http://www.webmasterworld.com/

Submit Express Newsletter: A free newsletter covering the latest search engine news and tips.
http://www.submitexpress.com/newsletters/

Planet Ocean Newsletter: A fee based newsletter with many great tips from SEO experts.
http://www.searchengine-news.com/

For more information, free SEO tools or if you are interested in search engine optimization services, visit Submit Express website at
http://www.submitexpress.com

Monday, May 18, 2009

30 Secrets

30 Secrets Of A Good Computer Lesson

1. The lesson forms part of a unit which forms part of a scheme of work.

2. There is a good starter activity, one that gets the pupils settled down an in the right frame of mind to do the work you've planned for them.

3. The teacher spends time at the start letting pupils into the secret what the objectives (intended learning outcomes) of the lesson are, ie what is intended to be achieved by the end, and how this lesson fits in with the preceding and following lessons

4. Pupils are given open ended tasks (as far as possible), or at least not tasks with a glass ceiling. (Even lessons designed to impart a set of skills can still be more interesting than "drill & practice").

5. There are plenty of resources for the pupils to use, enabling the teacher to give QUALITY guidance, ie not confined to explaining how to save the document! Such resources will include "how to' guides and posters, on screen help (which the pupils will have been taught how to use), and each other.

6. Ample time is allowed for the plenary, thereby allowing it to be somewhat more useful than the POLO model: Print Out and Log Off. The plenary is an ESSENTIAL part of the lesson, used to check what learning has taken place, consolidate learning, and prepare pupils for the next stage. In fact, a lesson might have two or three plenaries rather than just one at the end.

7. Homework is set at the START of the lesson, enabling the teacher to explain what needs doing, and for the pupils to understand what they need to have achieved by the end of the lesson in order to be able to make a good job of the homework; note that homework is ALWAYS given, regardless of so called homework timetables! (It doesn't always have to be written down.

8. Pupils are given plenty of time on the computers, with the teacher helping individuals and small groups.

9. Work is set at an appropriate standard, taking into account the pupils̢۪ prior learning and attainment, and what is expected of their age group in terms of national standards.

10. There is a lot of questioning â€" PROBING questioning â€" and assessment for learning techniques in evidence.

11. There is a good range of material to provide for differentiation (higher attainers and children with special educational needs) and personalised learning.

12. The teacher is aware of individual pupils’ needs, such as their individual education plans â€" and makes use of the assessment and other data she has â€" remember: data only becomes information if you DO something with it!

13. Not all work takes place at the computer.

14. Pupils come in on time, prepared, and ready to start work.

15. There is a good buzz in the room pupils are talking about the work, not last night's TV programs.

16. Pupils organise themselves and, if working in groups, work collaboratively rather than competitively at least with other members of their own group!

17. Pupils don't keep asking the time, unless they are worried about not being able to complete the work (see below though) and don't notice the time going by.

18. Pupils don't understand the concept of finishing the work in the sense of having time left over to check email, play Solitaire etc.

19. Pupils, even normally poorly behaved ones, ask to be allowed to stay on, come back at lunchtime or come back early in the morning.

20. Pupils respect the equipment and the room. For example, they do not leave discarded print outs on the floor.

21. Pupils are happy and confident enough to try out things you haven't shown them: they ask help from each other or look at the posters and manuals that are available for them.

22. If you interrupt their work in order to announce or explain something, someone asks you to hurry up so that they can get back to their work.

23. Pupils do a greater amount work, say for homework, than you have asked them to. For example, instead of conducting a survey with 10 people they decide to ask 20.

24. Pupils do a wider range of work than you have asked them to. For example, instead of just writing about what the hospital of the future will be like, they canvass the views of others and carry out some research about current developments.

25. Pupils want to show off to you little tricks they have discovered, such as keyboard shortcuts.

26. Pupils talk to their friends about the lesson.

27. Pupils discuss with their friends the possibility of taking a particular ICT course in 3 years time.

28. Pupils not only want to assist at open evenings/days, but are able to look after and even create an ICT presentation on your behalf.

29. Pupils are able to help other (younger or older) pupils with confidence and enthusiasm.

30. Pupils ask you questions that you are unable to answer.

This article is (c) 2005 Terry Freedman

About the author:

Terry Freedman has nearly thirty years' experience in education, and nearly 20 years' experience as a writer. A member of the UK's Society of Authors, Terry has had around a dozen books published, and over 800 specialist articles in leading newspapers and magazines.

Written by: Terry Freedman

Have you invited

Have You Invited A Spy Into Your Computer?

Yes, it's true. You may have inadvertently invited a spy into your computer. This spy is known as "spyware, adware, or trojans", and once it is in your computer it starts taking statistical information as you travel the Internet. In some cases, it may send you pop-up ads and slow down your computer. A wired.com article, mentions it "could even collect your credit card information".

How did you invite the spy?
Maybe you visited a website you knew and enjoyed only to find that it was recently purchased by a pornography site. The new company has imbedded "spyware" into the home page and now, in many cases without your knowledge, it is on your computer.

Maybe you downloaded a free or paid program and as part of the package you were provided with an added secret bonus – a “spyware” program. Spyware may also be placed on CD’s you purchase, too.

Maybe you agreed to it! You could have downloaded a program and checked the box to allow the program to take statistics from you "for their own use".

Maybe someone sent you spam, especially porn spam, and that spam created the spy. Spys can easily be placed, without your knowledge, in pictures or HTML email.

What you can do?
Purchase a firewall program and it should let you know if a program is about to download from the website you are at. Note the word "should".

Or you can learn all about spyware, download an anti-spyware program, and schedule time in your weekly calendar to run an anti-spyware program. The first time I conducted a ”clean up”, on my 18-month old computer, I found 2 porn and 42 other spyware programs. Then a week later, I had 4 new spyware files appear.

To further reduce the amount of spyware that ends up in your e-mail Inbox, create a "rule" or "filter” that will move any e-mail containing "certain adult words of your choosing” directly to your delete or spam folder.

Norton and MacAfee the virus protection specialists, have added anti-spy programs to the list of maintenance programs they sell. However, according to information I’ve seen on email lists, they’re not as anywhere as good as the Ad-aware program from Lavasoft.

Just a note: If a few people use your computer and each has their own log in password, when you run LavaSoft program, you need to run it under each password. Example: Let’s say Katie and Molly have passwords on your computer. Log in as Katie and run Lava Soft. Then log out of Katie, and log in as Molly and “run the program again.” I’m sure, you’ll find additional spys under each log in name – just like I did last weekend when I cleaned and updated a friend’s computer.

Use the resources below to help you learn more about Spy’s:

Learn about protecting your computer from spam and spyware
http://www.unwantedlinks.com/
http://grc.com/optout.htm
http://www.spyware.co.uk/

Check for spyware on new software before you download it.
http://www.spychecker.com/

Free anti-spyware program. Use it at least monthly and don’t delete the items you really want! http://www.lavasoft.de/

Opt out of double click ads
http://www.doubleclick.com/us/corporate/privacy/privacy/ad-cookie/default.asp

Removing your e-mail, address and telephone numbers from lists.
http://www.dmaconsumers.org/consumerassistance.html#mail

Anti-Spam Tools
http://www.webattack.com/freeware/comm/fwspam.html

BONUS: Opt-out of credit card marketing mail
The three big credit-reporting companies provide your information to “resellers” or “vendors”. To curtail this abuse, call toll free 888-567-8688. Listen to all the options before hitting a key. #3 is the best option to remove you "forever" (well till you change your phone number). Remember to get your cell phone number removed, too. Once you call them they will mail you a confirmation letter for you to mail back to them.

You can stop computer viruses

You Can Stop Computer Viruses

Hardly a day goes by when you don't hear about a computer virus in the news or from someone you know. As a matter of fact, there are well over 8,000 active computer viruses in the world in any given twenty-four period and 5 new viruses are introduced daily. The majority of computers will catch a virus through an e-mail attachment or link. Most viruses will use an infected computers address book to distribute themselves, so you are much more likely to receive a virus from someone you know rather than a total stranger.

However, the best way to identify whether or not any attachment could be a potential virus hazard is by looking at the extension (suffix) of the attached file. Hazardous file attachments are .pif, .exe, .com, .vbs, .bat, .bin, .dot, .reg, .js, .scr, .xlm and .dll. While this list is by no means exhaustive these are the definite ones to be on-guard for. In case you're wondering, catching a virus by file sharing is the second most popular way to get infected. File sharing whether you use removable disks, CDs, DVDs, memory cards/sticks or even synch cables can make your "never connected to the Internet" computer, vulnerable to catching a virus.

Protecting your computer from a computer virus infection is relatively easy if you follow these simple steps:

1. Put anti-virus software on all your computers whether they are Internet connected or not.

2. Don't open or download file attachments (attached files) in your e-mails. Especially the ones with the extensions .pif, .exe, .com, .vbs, .bat, .bin, .dot, .reg, .js, .scr, .xlm and .dll.

3. Don't click on links in the body of your e-mails.

4. Don't download software from web sites that you do not know.

5. Never install software on your computer unless you know where it came from.

6. Run a manual anti-virus scan for every 24 hours you use your computer.

7. Be sure that your anti-virus software is up-to-date. All anti-virus software products usually provide updates every 2 - 4 weeks and this service is free of charge to registered users for up to a year.

8. Received an e-mail from someone you know but didn't expect them to send you a file attachment? Call the person first, before downloading or opening the file attachment to confirm that it really came from them. Some virus programs are very good at making it look like they are just files sent to you from someone in yours or your friends e-mail address book.

9. Put firewall software on all your computers that are temporarily or permanently connected to the Internet.

If you follow these simple steps you should be able to stop a virus before it infects your computer.
About the Author

Dr. Robert Ing is a forensic intelligence specialist and has appeared on North American news networks on the issues of technology crime, computer security, privacy and identity theft. For more articles by Dr. Robert Ing please visit
Written by: Robert Ing, DSc, FAPSc, CPO

Advancement in Computer..

Advancement in Computer Technology

5 years ago we gathered around and marveled at the little specs moving at our commands, doing not much – except moving off course, we called these things games. Today the hardware in computers and other devices has changed significantly; we went from having a “spacious” 1mb hard drive to 250 GB of space. The graphics have also taken a giant leap for our computers, no longer are we confined to little dots but our 256mb graphic cards allow us to explore a virtual world in 3d. The sound has also changed from 4bit to 32 and pretty soon 64bit; we went from beeps to actually words. Finally the speed of our beloved computers has also increased from mere kilobytes to gigabytes of rams. In such a short period of time we went from what we used to call “advanced” technology to today’s much superior devices. So if you guys are like I am, there is one question that strikes our mind, what’s next? Well I would love to say that we will be able to put on our virtual glasses that will allow us to explore the virtual world as if we were in it, but this is not likely, sorry guys; however, these sorts of glasses are being constructed but its unlikely they will come out any time soon. What we can expect to see is an improvement in our Text-to-speech and vise versa programs after the 64bit sound card is released allowing the computer to understand our voices much clearly, also we should soon be seeing more “dept” in our computer as you may know that the most our computers can run on 32bit resolution, it is expected that Microsoft is like to bring out a 64bit resolution with there next version of windows. Also the speed and graphics are to increase a lot more, already some games look as they are almost real, and soon they will look real. I am not certain exactly what marvel the computer hardware’s will hold in the future, but one thing is certain it will be something to forward too, and once again the next generation will be mocking the so called advanced technology we have today.

Your computer may be effected

Your Computer May Be Infected. Here's How To Check.. (NOT about virus)

NOTE: Please take time to read on - it may be vital for your PC's security. If you are not in the mood, just save it or print it out for later reference.

A recent research revealed that 80% of the computers today is infected with these dangerous spyware and most of the users not aware of it. (Your computer could fall into this lot too.) The most dangerous fact is, even though the anti-virus software is running, these software can even inactivate them and take over your PC.

Have you experienced any of the following?

* Awsome popups comes out of nowhere, when browsing the web

* Home page reset to some other site

How can this happen?

- The components installed when viewing certain sites, starts up and running as soon as it's finished installing (or after the page is completely loaded) and with every windows startup since then. Their job is to collect information and report (or transfer) it to an external computer.

What is deceptive software? (Reference: www.microsoft.com)

Spyware and unauthorized adware are two examples of "deceptive" software. Deceptive software includes programs which take over your home page or search page without first getting your permission. There are a number of ways deceptive software can get on your system. A common trick is to covertly install the software during the installation of other software you want such as a music or video file sharing program.

Whenever you are installing something on your computer, make sure you carefully read all disclosures, including the license agreement and privacy statement. Sometimes the inclusion of adware in a given software installation is documented, but it may appear at the end of a license agreement or privacy statement.

Sometimes deceptive software gets silently installed on your system without any warning at all. If you use Internet Explorer as your Web browser, this can happen if your Internet Explorer security setting is set to its lowest value. Make sure to keep this setting at the medium level or higher. Doing so will help you control what is being installed on your computer.

Have you ever had an experience where you were repeatedly asked to accept a download even after you said "no"? Creators of deceptive software often use such tricks to get you to load their software. If this happens to you, do not click "yes". Instead, try to close the Web page that first asked you to accept the download by hitting the "X" in the corner of the window. Alternatively, quit Internet Explorer and restart it to begin browsing the Internet again. If you visit a Web page that continually displays these tricky pop-up windows, that Web site may not be worthy of your trust.

Your computer may be infected by now, but you may not know. Just have a checkup with a software specifically designed for it, to know the status of your computer. You must clean infections once you find it and the game is not over yet. The spyware might reinfect your PC. So it's highly recommended that you run a firewall on your system after the clean up. This will allow you to monitor every single communication occurs with your computer and block the ones which you feel unnecessary. The firewall acts as a barrier between your PC and the external world (Internet / Network).

A good spyware detector recommended by most people is, http://noadware.cjb.net and it shows you all the infections and potential dangers in great detail. It's free to scan but not to clean. It's a good idea to have a scan even you have no idea of cleaning, since you know the status of your PC in great detail. This gives two advantages.

Firstly, if there are minor infections and if you have a fair knowledge on registry settings and how to edit them, you may have a try to clean them up. Secondly, if it shows that there are major infections, you can avoid using credit cards and doing other confidential stuff, until you clean it up later.

You must run a firewall. In many new operating systems (eg. Windows XP), there is a built-in firewall. Google search on how to activate it. Others may try one at http://www.download.com

You may have a question by now. What is the purpose of these spyware? Even though we cannot give an explicit and clear cut answer, we can safely state that every thing boils down to the urge of more profits. How? The spyware collects all your personal information and transfer it to an external computer. The information is reviewed by a software in the receiving computer and then deleivered targeted popup ads to your PC. There are many things that spyware does in addition to this. The most dangerous of those is that collecting the credit card numbers.

If you have some technical knowledge on your PC, here's a technical explanation on what trouble does the spyware cause.

1. An extra process is running to monitor and log your activities in your PC.

2. Constant transfer is taking place between your PC and the spyware writer's computer.

The first process in it self is an unneeded process and it contributes to slow down your PC. Second is the most harmful. It transfers logged info to the external PC (spyware writer's PC). Then the external PC transfers targeted popups to the infected PC. This, in addition to slowing down your PC because of these extra processes, it also slows down the internet connection, as the bandwidth is shared. In short, PC with a spyware is like a dumping ground for snakes. Once its there and up and running, it can do almost anything with your PC.

Please pass this on to all you know. The most risk is for people who use Internet Explorer, as it is the most popular web browser and that very fact has drawn more attention of many malicious software developers.

Fazly Mohamed - fazlymohamed @ yahoo.com



Written by: Fazly Mohamed

Computer running slow?

Computer Running Slow?...Here's One Reason

"Computer Running Slow?...Here's One Reason!"
copyright 2001-02 John Evans

Just the other day, my computer started running a
little slow. Kind of puzzled me. And I put up with
it for a while.

But then it got a little irritating. While trying
to surf the web, I noticed that web pages were taking
much too long to load. This is always an irritant.
And, Internet Explorer was also taking its time
coming up.

Now, I'm no novice on the computer, but, sometimes
we humans can get a 'lapse of memory'. Anyway,
that's my excuse for forgetting one of the basics
of computing; and that is that the computer uses
up SYSTEM RESOURCES.

Every program on the computer, including icons,
uses some SYSTEM RESOURCES.

Whenever a program is started, it loads into your
computer's memory. Memory is a resource. Some
programs will release the memory it was using, when
you quit the program, and some will not. So, part
of a resource is not being made available to you.
Get enough of these, and guess what? Slow Downs!
Hang-ups (freezes).

I'm not an expert on the subject, but I did a little
experimenting with this. Here's what I found (remember,
this is only my computer, and yours may vary): After
about 3 hours of operation, I checked my available
resources; down to 58% free. So, from the right-hand
end of my taskbar, I exited the Resource Meter;free
resources now up to 60%. Exited the Pop-Up Stopper;
63% free. Closed Windows Help; 64% free. Closed
Windows Explorer; 66% free. Exited Download
Accelerator; 71% free.

So, from 58% to 71% is a saving of 13%. May not sound
like a whole lot, but it gives you a good idea as to
why your computer may be slowing down.

How do you check your free System Resources? Just go
to Control Panel>System>Performance. If you want to
check it often, then just right-click on the System
icon, choose 'Create shortcut'. It will appear on
your desktop, and you can drag it down to the left
end of your taskbar. Now it's available for quick
use. Or...

Use the System Resource Meter. Go to Start>Programs>
Accessories>System Tools, and click on Resource
Meter. The meter will pop up in your task bar (right
side), and you can keep an eye on it. When it starts
to turn red, then your resources are getting low.
But remember, it also is using up some of your
System Resources.

When you restart your computer, these resources will be
returned to you. But, as you again use the computer,
your computer will again use up the resources.

It really is a 'never-ending' story, and something we all
have to live with. But, if you'll restart your computer
every once in a while, you may find that it runs a
little bit faster.

Worth a try.

+++++++++++++++++++++++++++++++++++++++++++++++++
copyright2001-02 John Evans
http://www.dailybiz.com/
Want to REALLY make money online? Visit us now.
You can use this article but please leave it intact.
+++++++++++++++++++++++++++++++++++++++++++++++++


About the Author

Writing articles is one real pleasure in my life.
Have owned dailybiz.com for several years.


Written by: John Evans

Friday, May 15, 2009

Maximum everything


Maximum everything. Energy-efficient performance. Multimedia power.
Intel® Core™2 Duo processor



Based on Intel® Core™ microarchitecture, the Intel® Core™2 Duo processor family is designed to provide powerful energy-efficient performance so you can do more at once without slowing down.



Features and benefits
Delivering the best overall performance. Period. With Intel Core 2 Duo processors powering your desktop PC you'll get the latest arsenal of performance-rich technologies, including up to 6MB of shared L2 cache and up to 1333 MHz Front Side Bus. And, all of the latest additions to the Intel Core 2 Duo processor family are built using Intel’s 45nm technology and Hafnium infused circuitry. You've got the future of computing now, and only from Intel:

Dual-Core Processing, combines two independent processor cores in one physical package. Processors run at the same frequency and share up to 6MB of L2 cache and up to 1333 MHZ Front Side Bus for truly parallel computing

Intel® Wide Dynamic Execution, enabling delivery of more instructions per clock cycle to improve execution time and energy efficiency

Intel® Intelligent Power Capability, designed to deliver more energy-efficient performance and smarter battery performance in your laptop

Intel® Smart Memory Access, improving system performance by optimizing the use of the available data bandwidth

Intel® Advanced Smart Cache, providing a higher-performance, more efficient cache subsystem. Optimized for multi-core and dual-core processors

Intel® Advanced Digital Media Boost, accelerating a broad range of applications, including video, speech and image, photo processing, encryption, financial, engineering and scientific applications

Essential steps

6 Essential Steps to Protect Your Computer On the Internet For Free

Recently one of my friends asked me to check out if his computer was infected by virus. He suspected because occasionally the computer was shut down automatically when connected to internet. My first thought was the Sasser worm 60 seconds auto count-down. As he uses Windows 98 second edition with IE5, the virus must be a Sasser variant.
I'm not network security expert but I know some basic things he must do to protect his home PC. It was a shock when he told me that his 4 years old PC had no protection except McAfee anti-virus.
• Bought in 2000 and no Windows service packs had been applied since then.
• McAfee anti-virus software came with the PC when bought and no updates since then.
• No firewall installed.
• No anti spyware installed.
This is what I did to beef up his PC to the best of my knowledge.
Step #1: Patch the operating system.
The first thing I did was update his Windows 98 to the latest available Windows updates for Windows 98.
• Open Microsoft Windows Update page at http://windowsupdate.microsoft.com/
• Scan the PC to find out what critical updates and security fixes are missing.
• Select, download, and install a selection of updates, especially any Critical Updates.
• Restart the PC after finished.
When you open the Microsoft Windows Update page, click the "Scan for updates" link. The page will suggest what updates are needed based on your Windows version. You should install all Critical Updates suggested by Microsoft.
It took me about one and half hour to complete the above steps.
Step #2: Download, install, and run Spybot to get rid of all spyware.

http://www.safer-networking.org/index.php?page=download
Spybot-S&D is a free anti-spyware software to detect any spyware installed on your PC.
Spyware is any software that is installed on your PC and tracks your online behavior without your knowledge or consent. Spyware generally can
• Track what web pages you are visiting and send these information to advertising companies. This kind of spyware is commonly called adware.
• Track and record your computer activities such as what keys you hit. This is generally called Trojans.
• Change your web browser's home page.
• And more...
After installed Spybot, I immediately scanned my friend's computer and found 166 problems. The first run killed nearly all of them except some memory residents that had to be killed after a reboot.
Step #3: Download and install Kerio Personal Firewall (KPF).

http://www.kerio.com/us/kpf_download.html
Kerio Personal Firewall limited free edition is for home users. After installation, KPF works as the full edition for 30 days, after which it becomes the limited free edition.
You may also try the free ZoneAlarm firewall. Be aware that ZoneAlarm free edition uses a lot of computer memory.
The following is the free ZoneAlarm firewall download link. You hardly can find this download link on ZoneAlarm site because they want you to buy the Pro version which is a much better choice.

http://www.zonealarm.com/store/content/company/products/znalm/freeDownload.jsp
Step #4: Download AVG anti-virus software

http://www.grisoft.com/us/us_dwnl_free.php
Because my friend has McAfee antivirus installed but has not been updated for about 4 years. I downloaded AVG Free Edition antivirus software and let him to consider if he wanted to pay and update his McAfee or use the freebie. Running two antivirus software on the same computer can cause conflicts.
Step #5: Install password management software - RoboForm free edition.

http://www.roboform.com/?affid=siter
RoboForm is a password management software with Artificial Intelligence built in that can automatically fill online forms for you. It has been featured on The Wall Street Journal, CNN, The New York Times, Financial Times, PC Magazine, etc.
Nowadays we all have many usernames and passwords to use on the internet. Some spywares record your keystrokes and send them to the hackers. It has been reported many times that people lost all their money in online bank account or internet payment system account.
One of RoboForm key features is designed to combat this kind of key logger hacking. RoboForm can
• AutoSave passwords in browser.
• AutoFill passwords to login form.
• Click Login button for you.
• Fill personal info into online forms.
• Save offline passwords & notes.
• Generate Secure Random Passwords.
• Encrypt passwords and personal info using 3-DES.
• All personal info is stored on your computer only.
• Put passwords on USB KeyChain for extra security.
• Sync your passwords and safenotes to a Palm.
• Backup & Restore, Print your passwords.
• More features: drill down for more.
RoboForm works best with IE 5.0 and above. IE6 is the recommended browser to use with Artificial Intelligence RoboForm.
Note: free eidition comes with some limitations.
Step #6: Apply additional security measures.
More security measures and resources:
• Read Web Security tutorial from W3Schools, especially the paragraphs for home users.

http://www.w3schools.com/site/site_security.asp
• Use Audit My PC to do three Penetration Testing.

http://www.auditmypc.com/freescan/prefcan.asp
• Use Gibson Research's ShiedsUP to do port scan and get useful advice.

https://grc.com/x/ne.dll?bh0bkyd2
• Download Gibson Research's LeakTest and check if personal firewall can be fooled. If the firewall is good, the LeadTest will not be able to reach the internet.

http://grc.com/lt/leaktest.htm
• Browse Microsoft security home page to learn more about Windows security.

http://www.microsoft.com/security/default.mspx
Mission completed. It took me nearly 4 hours that night and the result is so far so good.
The author, Jerry Yu, is an experienced internet marketer and web developer. Visit his site http://www.WebActionGuide.com for FREE "how-to" step-by-step action guide, tips, knowledge base articles, and more.

Written by: Jerry Yu

5 stress reducing

5 Stress Reducing Computer Tips

For most entrepreneurs computers are an intrical part of our business. An
entrepreneur can not afford for their computer to be inoperable even for a minute. Implement some of these quick and affordable computer tips to keep your computer healthy and making money for your business.
#1 - Double Internet Speed
Comcast recently doubled cable modem download speeds. Now you can surf the Internet and download files twice as fast. However, you need to power cycle your cable modem [unplug it for 30 seconds and reboot computer] for the new configuration to be automatically downloaded to your modem.
#2 - Connecting to Work from Home
Having trouble with your corporate VPN connection when working from home? Oftentimes this can be fixed with a simple firmware upgrade to your network router or a slight change in settings.
#3 - Sudden Lost Connection
Has your Internet connection suddenly stopped working? Frequently computer users with software-based firewalls suddenly find their Internet connection no longer available. Oftentimes when you download a software update, it can change your original configurations. As a quick test, disable the software firewall. If connectivity returns, it’s a misconfiguration issue.
#4 - Slow E-mail and Internet Browsing
Has your computer been working wonderfully, but suddenly e-mail or Internet browsing is painfully slow? It could be your cable connection went out. And although the connection has returned, your computer and the cable modem may be having difficulty communicating. Try power cycling your modem.
#5 - Eliminate Popups
Google offers a free popup blocker with its toolbar. Download the toolbar at www.toolbar.google.com. System requirements: Microsoft Windows 95/98/ME/NT/2000/XP, Microsoft Internet Explorer 5.0 or later. The popup blocker requires Internet Explorer 5.5 or later.
Sharron Senter is co-founder of http://www.VisitingGeeks.com - an on site computer repair, security and networking company serving north of Boston, Southern NH and Maine. Visiting Geeks’ technicians are crackerjacks at squashing viruses, popups and securing and making computers perform faster. Learn more about Sharron at http://www.SharronSenter.com.


Written by: Sharron Senter

5 simple ways

5 Simple Ways To Increase Your Computer Speed

If you're a computer expert, you'll probably already know about these tips (hopefully this will provide you with a little reminder). If you're not an expert, don't worry - these tips are simple, and don't require a lot of computer experience.

While an old computer will never operate at the same speed as a newer (and bigger & faster) computer, you can help your computer stay as "young & healthy" as possible.

1) Disk Cleanup

Performing a disk cleanup regularly is a good idea. Whenever you "surf the internet", open attachments, delete files, your computer saves a record of your activity. Many of these files are harmless, and individually are very small. But if you spend a lot of time on your computer, before long you'll take up enough space to slow your computer down a bit.

Disk Cleanup is a Windows utility that helps keep unused and unwanted files from taking up extra storage space on your computer. You can think of it as "spring cleaning” for your computer.

Basically, it removes files that may have once been useful or used but now are just taking up extra room that could be used for more useful programs and files.

To perform a disc cleanup, click on the Start button on the bottom left of your computer screen, then Programs, Accessories, System Tools, Disc Cleanup. A small box will pop up, allowing you to select the files to delete (most files are OK to delete, but if you are unsure, it is best to not select the file). Then click OK, and the unused files will be removed.

If you've never done a disk cleanup on your computer, now is a good time to get started. Then, depending on how much you use your computer, you can perform a disk cleanup every few weeks to keep your computer running smoothly!

2) Defragmenting Your Computer

Another way to improve the performance of your computer is to defragment your hard drive. What is defragmenting, and why do you need to do it? Here's a simple explanation:

Basically, defragmenting is putting files back where they belong. With the files in the proper order, your computer will run more efficiently.

You don't need to hire a computer expert to defragment your computer. It's simple to do. You just need to plan ahead, because if you have a lot of "stuff" on your computer, it could take a while.

And it's best not to use your computer while defragmenting.

Not sure how to defragment your computer? You can either click on your computer's help file (Click the "Start" button on the bottom left of your computer screen, then Help), or click on Start, Programs, Accessories, System Tools, Defragment - for most computers) .

Keep in mind that the actual wording is slightly different depending on the operating system you use (Windows 95, 98, XP, etc) so you might need to refer to your computer's help file.

Periodically defragmenting your computer will keep it running smoothly!

3) Removing Spyware & Adware

If you've ever had spyware or adware on your computer, you know how frustrating it can be - strange things happening, your homepage changing, inappropriate popups, unfamiliar icons...
What exactly is spyware or adware?

Simply, files that are often downloaded onto your computer without your knowledge (or at least without you knowing what they really are).

Unfortunately, many of these programs "sneak" their way onto your computer, so avoiding them entirely is difficult, especially if you spend a lot of time on your computer, surfing the Internet and downloading new programs and files.

Fortunately, there are ways to remove these unwanted files from your computer.

Here are 2 adware/spyware removal programs that are simple to use (and both are free):
Ad-Aware http://www.lavasoftusa.com/support/download/>http://www.lavasoftusa.com/support/download/
Spybot http://www.safer-networking.org/en/download/index.html>http://www.safer-networking.org/en/download/index.html

Why does adware/spyware continue to be such a problem? Because most of these programs make money for the people creating and spreading them, unfortunately. So, all we can do is try to avoid them as much as possible, and to remove them when they do find their way onto our computers.

If you do find spyware on your computer, don't panic. In many cases, you just have some extra "junk" on your computer. But keeping spywaer and adware off of your computer will help it run more quickly and efficiently.

4) Uninstalling Old & Unused Programs

While uninstalling old, unused programs will help speed up your computer, removing the wrong files can cause you some big problems. So, please proceed carefully. And if you are not comfortable, please ask for help from someone you know who is more knowledgeable.

Most programs that you download simply have an "uninstall" feature that comes with them. If you're like me and you download a lot of free programs or free trials, after a while your computer begins to slow down. That means it's time for me to remove some of the old programs I don't use any more (and most I only used once just to see how they work).

To uninstall unused programs from your computer, first click on the Start button on the bottom left, then Programs, then click on the name of the program and Uninstall. If there is no uninstall option, then click on the Start button on the bottom left, then Control Panel, Add/Remove Programs.

Again, if you are unsure whether or not to remove a program, it is best to leave it.

If you follow these instructions, you should find your computer working faster right away.

Your computer maybe...

Your Computer May Be Infected. Here's How To Check.. (NOT about virus)

NOTE: Please take time to read on - it may be vital for your PC's security. If you are not in the mood, just save it or print it out for later reference.
A recent research revealed that 80% of the computers today is infected with these dangerous spyware and most of the users not aware of it. (Your computer could fall into this lot too.) The most dangerous fact is, even though the anti-virus software is running, these software can even inactivate them and take over your PC.
Have you experienced any of the following?
• Awsome popups comes out of nowhere, when browsing the web
• Home page reset to some other site
How can this happen?
The components installed when viewing certain sites, starts up and running as soon as it's finished installing (or after the page is completely loaded) and with every windows startup since then. Their job is to collect information and report (or transfer) it to an external computer.
What is deceptive software? (Reference: www.microsoft.com)
Spyware and unauthorized adware are two examples of "deceptive" software. Deceptive software includes programs which take over your home page or search page without first getting your permission. There are a number of ways deceptive software can get on your system. A common trick is to covertly install the software during the installation of other software you want such as a music or video file sharing program.
Whenever you are installing something on your computer, make sure you carefully read all disclosures, including the license agreement and privacy statement. Sometimes the inclusion of adware in a given software installation is documented, but it may appear at the end of a license agreement or privacy statement.
Sometimes deceptive software gets silently installed on your system without any warning at all. If you use Internet Explorer as your Web browser, this can happen if your Internet Explorer security setting is set to its lowest value. Make sure to keep this setting at the medium level or higher. Doing so will help you control what is being installed on your computer.
Have you ever had an experience where you were repeatedly asked to accept a download even after you said "no"? Creators of deceptive software often use such tricks to get you to load their software. If this happens to you, do not click "yes". Instead, try to close the Web page that first asked you to accept the download by hitting the "X" in the corner of the window. Alternatively, quit Internet Explorer and restart it to begin browsing the Internet again. If you visit a Web page that continually displays these tricky pop-up windows, that Web site may not be worthy of your trust.
Your computer may be infected by now, but you may not know. Just have a checkup with a software specifically designed for it, to know the status of your computer. You must clean infections once you find it and the game is not over yet. The spyware might reinfect your PC. So it's highly recommended that you run a firewall on your system after the clean up. This will allow you to monitor every single communication occurs with your computer and block the ones which you feel unnecessary. The firewall acts as a barrier between your PC and the external world (Internet / Network).
A good spyware detector recommended by most people is, http://noadware.cjb.net and it shows you all the infections and potential dangers in great detail. It's free to scan but not to clean. It's a good idea to have a scan even you have no idea of cleaning, since you know the status of your PC in great detail. This gives two advantages.
Firstly, if there are minor infections and if you have a fair knowledge on registry settings and how to edit them, you may have a try to clean them up. Secondly, if it shows that there are major infections, you can avoid using credit cards and doing other confidential stuff, until you clean it up later.
You must run a firewall. In many new operating systems (eg. Windows XP), there is a built-in firewall. Google search on how to activate it. Others may try one at http://www.download.com
You may have a question by now. What is the purpose of these spyware? Even though we cannot give an explicit and clear cut answer, we can safely state that every thing boils down to the urge of more profits. How? The spyware collects all your personal information and transfer it to an external computer. The information is reviewed by a software in the receiving computer and then deleivered targeted popup ads to your PC. There are many things that spyware does in addition to this. The most dangerous of those is that collecting the credit card numbers.
If you have some technical knowledge on your PC, here's a technical explanation on what trouble does the spyware cause.
1. An extra process is running to monitor and log your activities in your PC.
2. Constant transfer is taking place between your PC and the spyware writer's computer.
The first process in it self is an unneeded process and it contributes to slow down your PC. Second is the most harmful. It transfers logged info to the external PC (spyware writer's PC). Then the external PC transfers targeted popups to the infected PC. This, in addition to slowing down your PC because of these extra processes, it also slows down the internet connection, as the bandwidth is shared. In short, PC with a spyware is like a dumping ground for snakes. Once its there and up and running, it can do almost anything with your PC.
Please pass this on to all you know. The most risk is for people who use Internet Explorer, as it is the most popular web browser and that very fact has drawn more attention of many malicious software developers.
Fazly Mohamed - fazlymohamed @ yahoo.com


Written by: Fazly Mohamed