Tuesday, June 8, 2010

Cisco Systems

Cisco Systems Inc. NASDAQ: CSCO SEHK: 4333 is a global company in the field of telecommunications which is headquartered in San José, California, United States. The company was founded in 1984. It employs 51 480 workers.

Cisco Systems (Cisco) sells networking and communications technology, equipment and services for data transport, voice and video.Produk and service companies consists of several categories such as routers, does even, network access, IP telephony, security, fiber-optic network, data network center, via a network signal to the home network, technical service support and service network.

Cisco Products in korporate addressed to businesses, public institutions, telekomunikasi.Cisco company also provides products used to deliver data, voice, video for inter-building, inter-campus, and all of Cisco's business management dunia.Model more to globalization and termanagement through the five sections countries, namely: Canada, Europe, Asia Pacific, and Japan as well as the existing market.

Source : www.wikipedia.com

Monday, June 7, 2010

Internet Download Manager

Internet Download Manager or a lot of people call him by the name of the IDM, is the software that is able to retrieve / download data exist on the internet. Artificial devices in New York, United States occupies a top position in maximizing data download speeds. Display and simple graphics makes IDM user friendly with.

DM is supported by a resume feature, namely for the sake of re download the files that previously cut off due to lost internet connections, network problems, computer shutdowns, or unexpected power outages.

IDM is able to share a file during download process lasted up to be seven to eight parts.

The latest version 5.18 adds IDM download panel for web-players that can be used to download flash videos from sites like YouTube, MySpaceTV, and Google Video.

When users click on the download link in your browser, IDM will take over the download and accelerate it.

Internet Download Manager can record and download FLV videos from popular sites like YouTube, MySpaceTV, and Google Video. After installing IDM, "Download This Video" button appears each time users watch video anywhere on the Internet.

Antivirus checking makes IDM user who wants to download free of viruses and trojans. IDM automatically run a check once finished downloaded file to protect users from malicious files.

IDM is translated into Albanian, Arabic, Azerbaijani, Bosnian, Bulgarian, Chinese, Croatian, Czech, Danish, Dutch, Persian, French, German, Greek, Hebrew, Hungarian, Italian, Japanese, Korean, Lithuanian, Macedonian, Norwegian, Polish , Portuguese, Romanian, Russian, Serbian, Slovak, Slovenian, Spanish, Thai, Turkish, and Uzbek languages.

Simple installation by the IDM allows users to do the settings and connections status mericek status.

Source : www.wikipedia.com

Sunday, June 6, 2010

Digital television

Digital television or DTV is a kind of television that uses digital modulation and compression to broadcast video signal, voice, and data to the television. Digital television is a tool used to capture digital TV broadcasting, the development of analog to digital broadcast system that converts the information into digital signal form of bits of data

Digital TV Frequency
Technically, the tape of the radio frequency spectrum used for analogue television can be used for digital television broadcasting. Comparison of bandwidth used analog technology to digital technology is one: 6. So, when analog technology requires 8 MHz bandwidth for a single transmission channel, digital technology with the same bandwidth (using the technique of multiplex) can emit as much as six to eight channels transmitting simultaneously to different programs.

Digital TV transmitter systems
There are three standard digital television transmitter systems in the world, the digital television (DTV) in the United States, terrestrial digital video broadcasting (DVB-T) in Europe, and integrated service digital broadcasting terrestrial (ISDB-T) in Japan. All standards-based digital system transmitter system coding OFDM system with MPEG-2 sound code for the ISDB-T and DTV as well as MPEG-1 for DVB-T.

The advantages of digital TV frequencies
Broadcast using a digital system to have robustness against disturbances and easy way to repair digital codes via error correcting codes. The result is picture quality and sound are far more accurate and higher resolution than analog television broadcasts. In addition to digital television broadcasts using low power.

Source : www.wikipedia.com

Saturday, June 5, 2010

Operating Systems

The operating system is a software system that served to make the control and management of hardware and basic system operations, including the software applications such as word processing programs and web browsers.

In general, the Operating System software is the first layer is placed on the computer memory when the computer starts.

Operating systems generally consist of several parts:

1. Boot mechanism, namely to put the kernel in memory
2. Kernel, the core of an Operating System
3. Command Interpreter or shell, which reads input from the user
4. Libraries, which provides the basic set of functions and standards that can be called by other applications
5th. Drivers to interact with external hardware, as well as to control them.

Operating System currently

Operating system-the main operating system used by the general system of computers (including PCs, personal computer) are divided into three major groups:

1. Family Microsoft Windows - which is comprised of the Windows Desktop Environment (version 1.x to version 3.x), Windows 9x (Windows 95, 98, and Windows ME), and Windows NT (Windows NT 3.x, Windows NT 4.0 , Windows 2000, Windows XP, Windows Server 2003, Windows Vista, Windows 7 (Seven), was released in 2009, and Windows Orient which will be released in 2014)).
2. Unix family of operating systems that use the POSIX interfaces, such as SCO UNIX, family BSD (Berkeley Software Distribution), GNU / Linux, MacOS / X (BSD-based kernel is modified, and known by the name of Darwin) and GNU / Hurd.
3. Mac OS, is the operating system for Apple computers commonly referred to output your Mac or Macintosh. Newest operating system is Mac OS X version 10.4 (Tiger). Early in 2007 planned launch of version 10.5 (Leopard).

Source : www.wikipedia.com

Friday, June 4, 2010

Multimedia

Multimedia is the use of computers to present and combine text, sound, graphics, animation and video with tools ([tool]) and connectivity ([link]) so that users can be had ([navigation]), interact, work and communicate.

At first multimedia includes only media to be consumed senses of sight (still images, text, video motion picture, and the invention of motion picture / animation), and consumption of auditory (sound). In the development of multimedia includes also the kinetic (motion) and the smell of which is the sense of smell.

The smell started to become part of a multimedia since found the smell of reproductive technologies by telecommunications. With the smell of the input device, an operator can transmit the results of digitizing the smell via the internet. Recipients should be available on a computer output device reproduction machine odor.

Source : www.wikipedia.com

Thursday, June 3, 2010

Graphic tablet

Graphics tablet is a hardware or computer input device that allows the wearer to draw by hand and insert a picture or sketch directly into the computer, like drawing on paper using pencil.

Operation

Passive Tablets
Passive tablet, which was introduced by Wacom, using electromagnetic induction technology, where the horizontal and vertical wires of the tablet operating as a sender and receiver rolls (coils). Tablet generate electromagnetic signals, received by the LC circuit in the pen. Cable in the tablet then change the mode of receiving and reading the signals raised by the pen.

Active Tablet
The difference lies in the passive tablet stylus. Active stylus on the tablet strength depends on the internal battery, not on tablets. This pen to create his own energy (self-powered) to then generate a signal on the tablet. By removing the obligation to supply energy to the pen, it means that the tablet will be able to obtain a constant signal to the pen, because he did not have to replace the signal and receiver modes, thus sending a signal will be more efficient.

Source : www.wikipedia.com

Wednesday, June 2, 2010

Global village

Global Village is a concept of the development of communications technology in which the analogue world into a village which is very large.

McLuhan said that the global village occurred as a result of the dissemination of information very quickly and massive in the community. Rapid and massive spread of this use of information and communication technology.

The impact of the global village
According to McLuhan, global village during the case, information and communication will be very open, so does the role of mass media in transforming the message. The impact on the community is that people will tend to have the same perception for obtaining equal opportunity to access information.

Source : www.wikipedia.com

Tuesday, June 1, 2010

Computer Networks

Computer network was a system that consists of computers and other network devices that work together to achieve a common purpose.

The purpose of the computer network are:

Dividing resources: for example the use of shared printers, CPUs, memory, hard drive.
Communication: eg electronic mail, instant messaging, chat
Access to information: for example web browsing.

In order to achieve the same goal, every part of the request and provide computer network services (service). Parties who request a service called the client (client) and that provides service is called servant (the server). This architecture is called client-server system, and used on almost all computer network applications.

Source : www.wikipedia.com

Sunday, May 30, 2010

Diary

Diary is a record of events that we experience daily. We wrote a memorable event on this day in the diary book. Diary function is as memorable times we've ever experienced. Can also as history of our lives. Along with the changing times that are too fast so that these changes create more stress for some individuals with career or family, or diary Diary also changed the function of simply storing memories become a medium to express one's feelings for his problems. According to Alice D. Domar, a journal is a step to express our feelings and emotions and helps us to treat our minds. Also with the development of technology, the diary is now not only written on a piece of paper but may also include data on notebook computers or even some form of online facilities to keep a diary on the internet.

Source : wikipedia

Saturday, May 29, 2010

Electronic commerce

Electronic commerce is the buying, selling, marketing, distribution of goods and services over electronic systems such as the Internet or television, www. E-commerce can involve electronic funds transfer, electronic data interchange, automated inventory management systems, and automated data collection systems.

Information technology industry saw an e-commerce activities as the application and implementation of e-business (e-business) related to commercial transactions, such as electronic funds transfer, SCM (supply chain management), e-marketing (e-marketing) , or online marketing (online marketing), online transaction processing (online transaction processing), electronic data interchange (electronic data interchange / EDI), etc..

E-trade was first introduced in 1994 when the first-electronic banner used for promotional and advertising in a web-page (website). According to Forrester Research, electronic commerce to generate sales worth U.S. $ 12.2 billion in 2003. According to another report in October 2006, online retail revenues, non-travel in the United States is forecast to reach a quarter of a trillion U.S. dollars in 2011.

Source : www.wikipedia.com

Friday, May 28, 2010

Telecentre

Telecenter is a resident facility where they can interact, learn, work and play using computers, internet and various other information and communication technology. Although different forms, telecenters have the special characteristic that is supportive of community empowerment activities such as assisting health improvement activities, education and economic development; promote public participation in national life, democracy and development; enhance community capacity in the organization and conduct of business; increase the participation of youth / girls and women; reduce isolation and decrease the digital divide; etc..

Some characteristics of a successful telecenter is as follows:

* Held by the public and financed by mutual cooperation
* Service can be trusted communication and information
* Services are useful and appropriate to the needs of residents
* Residents participate actively in the implementation of telecenter services
* Transparent in terms of administration and finance

Source : www.wikipedia.com

Thursday, May 27, 2010

E-voting

e-voting comes, which means electronic voting

Understanding of e-voting is the use of information technology on the implementation of voting. Choice of technology used in the implementation of e-Voting is very varied, such as the use of smart cards for authentication of voters in the use of the internet as a voting system or data transmission, the use of touch screen as a substitute for sound cards, and many variations of the technology could be used today . In today's development thinking using a mobile phone device to provide a sound could be an option because it combines (convergence) computers and internet network in one single device.

Conditions and the application of e-voting technology continues to change as developments in information technology very quickly. Constraints on e-voting that has ever happened in many countries that have and are being applied to further improve e-voting. One positive aspect of the adoption of e-voting today is the increasing cheapness of hardware used and the more open software used so that the cost of implementing e-voting increasingly cheap from time to time and for the more open the software to be audited jointly. One concept is a software application through Indonesia Goes Open Source (IGOS), with the introduction of e-Democracy applications in the year 2007 [1]

Source : www.wikipedia.com

Wednesday, May 26, 2010

Saving "Magic CD" into the Flash Disk

1. Download a utility named Unebootin from hirensbootcd.net with a file size of 4.25 MB

2. Once downloaded, run Unetbooting. Select DiskImage, ISO, and navigate to the file Hiren's. Boot-CD.10.3.iso ekstrakkan existing in the folder earlier.

3. In Type, select USB loader box, and select the drive.

4. Click OK to start the process of moving to a flash disk.

5. When finished, select exit. You do not need to restart the PC.

Please note that the display of a HBCD in CD and in the flash disk by using Unetbooting different, but basic usage stays the same, only different from appearance alone.

Source : id.shvoong.com

Tuesday, May 25, 2010

10 STEPS TO BE UNIQUE IMAGES modify HTML CODE

Follow the steps below

1: click on this post
2: click the new entry
3: click the code to transfer images posted who form a little blue box
4: show options documented your existing image and select your desired doodle
5: there is a choice of images would be placed beside the left, center or right just ignore them
6: there is also a display option menu of small, medium or large ignore it
7: click start open / upload pictures you've selected who
8: wait until the upload process is complete
9: The HTML code appears to the post box / entry
10: the code ready to paste copied and used as the HTML code DRAWINGS

Source : id.shvoong.com

Monday, May 24, 2010

Videos on YouTube Rental Store

Youtube video portal the number one in the world today offers video rentals to get new sources of revenue other than advertising.

So for free on the internet video market began to shift to commercial but with video and offer higher quality content, like Hulu which is planned to start wearing a subscription fee in the month of May.
Youtube video rental service can be found at: http://www.youtube.com/store

Currently Youtube video catalog is not yet complete and many options, mostly indie films, anime, foreign films (such as Bollywood) and documentaries. Rumored possibility in the future Google will work with Lion's Gate, Sony and Warner Bros. to put their movies on Youtube Store.

Geeksugar.com

Sunday, May 23, 2010

Applications to remember Password

In order not to forget your password use password recover applications, one of which is unrar Extract and Recover 2.1.

This application is designated to recover passwords, as well as to extract the archive file with extension. Rar. This application is lightweight and portable for use, without needing any installation.

Source : id.shvoong.com

Saturday, May 22, 2010

Tips & Trick eradicate the virus Windows

T ips and Trick eradicate the virus without virus.

* Turn off system restore
* Turn off the process of virus
* Restore registry that has been tampered with by virus
* Delete the files for viruses. Use the search facility on windows to find the virus files
* Come up with files that are hidden viruses
* Be careful while transferring files, either via floppy disks, usb flash disk, etc.

Source : id.shvoong.com

Friday, May 21, 2010

How to Raise the Site or Blog on Search Engines especially Google

Disciplined and not lazy were the two keys to make your site lively. In addition, the first thing you should do is to register with search engines


While waiting, there's a good idea to beautify the look website / blog you with a template of interest. Open blog.prolr.com because at this site you will get many links to get everything for free for your site. Enroll your website / blog you are in this directory
This step is probably the most good for increasing traffic
List the following web directories:
http://dir.yahoo.com/ PR 8
http://www.dmoz.org RR8
http://www.stpt.com/ PR 8
http://www.open-site.org PR 8
http://www.femina.com PR 7
http://www.portal.eatonweb.com homework 7
http://www.bloggernity.com PR 6
http://www.podcastzoom.com/ PR 6
PR 6 http://www.bloguniverse.com
http://www.gogreece.com PR 6
http://www.lanic.utexas.edu PR 6
http://www.sacentral.sa.gov.au/site/page.cfm PR 6
http://www.worldhot.com/ PR 6
http://www.elib.org/ PR 6
6 http://www.christiansunite.com/ http://www.ezilon.com/ PR PR PR 6 http://www.aardvark.co.za 6
http://www.nzs.com/ PR 6
http://www.info-listings.com/ PR 6
http://findingblog.com/ PR 6
http://www.iguide.co.il/ PR 6

Source : id.shvoong.com

Thursday, May 20, 2010

Create a partition D on Netbook

Netbook has two partitions C & D

These steps create a partition D in the Netbook is:

1. backup data first
2. Download & Install Wizard Home Edition
3. open the program, there'll be a partition C, which appears and click on partition C
4. Select Remove / Resize
5. Slide the navigation to the left as needed because the existing contents of the partition numbers
6. Select the partition to be formatted the remaining changes
7. select applay on the bottom right of the left column
8. netbook will restart and start a new partition
9. after completion alias startup partition, then re-explor and format the new partition

Good luck...

Source : www.penuliskomputer.com

Wednesday, May 19, 2010

Playing threats Facebook

We have five threats to Play Facebook:

1. Your information will be shared by third parties, including the developers of Facebook applications.

2. Every time Facebook to redesign the site, the privacy settings the user account will become less secure and more vulnerable. Users must also be set manually reset their privacy, so the same with the previous arrangement.

3. Facebook ads contain viruses and infect vulnerable users account.

4. Friends who really get to know you could accidentally create your account becomes vulnerable.

5. Hazards can also come from scammers who create fake profiles.

Source : id.shvoong.com

Tuesday, May 18, 2010

How to change the tone of XP Startup & Shutdown

Bored with that voice-that was it when Windows is turned on or turned off.

How:

* Prepare a song or tone of what we want with the format of song / tone "wav" could take some of the mobile phone, or recorded it first. Make sure the size is too big or long the duration is not an alias for a moment.
* Once you are ready, give the name of the song or the tone with

Windows XP Startup [for the start-up tone]
Windows XP Shutdown [for the tone of the cover]

* When given a name above, now choose the second tone with Clik left and copy or cut.
* Go to localdisk / System (C), click Windows, then Media. Then copy and paste the results in the media folder. When there is a warning "if you will change the tone of the old with the new tone?, Tap Yes or Yes to All.
* Now out of the windows explorer, try to restart Windows, and listen to the results.

But this method applies when we use the standard Windows XP Theme. In fact if you want to replace all of its tone also can be prepared to stay a new tone and give the same name as the one on the Media folder

Source : PenulisKomputer.com

Monday, May 17, 2010

Install XAMPP

Follow the steps below

1. first download XAMPP

2. after that, open the Terminal .. typing the command: sudo xvfz [XAMPP]-C / opt
eg:

$ Sudo xvfz xampp-linux-1.7.3a.tar.gz-C / opt

the intent of the above command, extract the tar.gz file into the folder opt.

3. later, we're setting her xampp with the command:

$ Sudo / opt / lampp / lampp security

this command to give xampp password, and FTP.

4. after that, run the command:

$ Sudo / opt / lampp / lampp start

this command to run the xampp.

if want to stop, type the command:

$ Sudo / opt / lampp / lampp stop

and no more commands to restart.

$ Sudo / opt / lampp / lampp stop

Source : id.shvoong.com

Sunday, May 16, 2010

Deleting your Facebook account

Follow the steps below and need patience because it took about five hours.
The steps are:
- Remove all your friends by clicking the "x" then select "delete friend".
- Delete all photos in your album pages. How, go to page images, then select an album and select "delete this album."
- Remove all the comments you send, by going to your profile page and select "x" and select "delete" on each box, and the wall to your comment.
- Remove your membership of the Group, the fans, and supporters in the INFO page. You do this by visiting your group and select "delete".
- Remove all the info about you. Select "info" to edit.
- Remove all existing tags on the photo page
- Send an email to http://www.facebook.com/help/contact.php?show_form=delete_account and choose to delete your account permanently. Enter your password and enter a password that is visible.
- Once confirmed, facebook will tell you that if you do not login for 14 days, your account will be deleted and not recoverable.
- After that facebook will automatically exit.
- Please check 14 days later by logging into your account. If you can not mean you managed to delete facebook.

Source : id.shvoong.com

Saturday, May 15, 2010

How to block prohibited sites at home, or office

To prevent your child or your staff in the office to open a porn site.
Try this.

Follow these steps:
1. Open the Control Panel.
2. Or click select the "Internet Options".
3. Click "Connections".
4. Click the modem used for internet on my laptop, home computer or your office.
5. Click "Settings".
6. Click "Propeties".
7th. Click on "Networking".
8. Click "Internet Protocol version 4"
9. Click "Properties".
10. Click "Use the Following DNS server adresses"
11. Fill out the "Preferred DNS Server" with the number "180 131 144 144"
12. The contents of the box "Alternate DNS Server" with the number "180 131 144 145"
13. Click OK to close all dialog boxes that you had passed. END.
Try testing your entry to one of porn or gambling sites. If it successfully blocked the site, means finished all. But if it can still be accessed, try returning to the step above by replacing select the click number eight on the to pick the "Internet Protocol version 6". While other steps remain the same.

Source : id.shvoong.com

Friday, May 14, 2010

Software to ease your eyes on the Internet

For those who have older and younger age-old but her vision is not normal. Sure you want to see clearly on the internet. Try the following ways.

Read Easy Toolbar 1.5 allows you to enlarge or reduce a web page by clicking on the Plus and Minus sign. In version 1.5, the application has added the ability to right click and replacement sizes.

EasyRead can use on Windows XP as well as other Windows systems. Free to download and can be added as your IE toolbar.

If you've downloaded, they provide a tutorial for this application on Iconico.com address.

Source : id.shvoong.com

Thursday, May 13, 2010

Record movement of Mouse and Keyboard with Software

Lost again, forgot to mention ...
Often show that only once or twice from an instructor, can not make us remember the overall steps that must be done.
Now you do not have to worry about forgetting.

Try the following applications

Mouse Recorder Pro enables you to record all input from the keyboard and mouse for a certain time. With this application, all movement of the mouse and keyboard will be recorded in a script which will be called again.

So, you can repeat the steps that have been done by your instructor until you really know by heart. Before you run this application, first make sure your system is installed. Net Framework 3.5 (2.7 MB).

Source : id.shvoong.com

Software To Record Sound in Computer

There are some free software that can be used to record audio (voice), both internal, microphone or other media.

Jet Audio Basic
In addition to running a variety of audio files, audio conversion, Jet Audio also provides features for recording audio, good sound out of speakers, line-in or through a microphone.

Voice recordings can be saved to various formats, such as wav, ogg, wma, FLAC, realmedia and others. In addition, the output can be automatically given a name with an extra time (date, hours, minutes, seconds) that can record a lot of audio without having to constantly confused with the output file name.

If you have a paid version, there is an additional feature to adjust the equalizer and band-pass (low pass filter and high pass filters) as well as Audio Trimmer. But with free vrsi was actually quite adequate.

One program is free and open source Audacity. Beside rich with software for editing audio, audacity also provides features for recording audio. Just as Jet Audio, Audacity can record audio / sound from the mic, line-in and audio out on the internal speakers.

Audacity provides several advantages compared with JetAudio, as we can directly edit audio recordings, and more output formats. The result can be exported to various formats such as MP3, WAV, GSM 6:10 wav (for mobile / cell phone), OGG, FLAC, MP2, WMA, AMR, M4A (AAC) and others. Audacity Also available for Windows, Linux and Mac OS X.

The next free software Audio Recorder for Free. Software from this tool.net audio-in dedicated to record audio only. So easy to use and can save the recording into MP3, WMA or WAV. Can also record from line-in, microphone, voice coming out of the speakers.

Source : id.shvoong.com

Wednesday, May 12, 2010

Free movie telecast of Foreign Affairs

Want to watch foreign television broadcasts for free, especially for those of you who already subscribe to the Internet.

TvTube please open the website to prove it. This website provides hundreds of online television channels from around the world. You just choose which channel to watch.

Although this website presents the television broadcast for free, you still have to think about how much bandwidth is sucked up during the show an event in a stream.
Do not let your loss.

Source : id.shvoong.com

Tuesday, May 11, 2010

Loss of Flash Disk can be prevented

If you do not want to miss your Flash Disk for forgetting to remove the computer, especially in public places, such as internet cafes, try this application.

Pendrive Reminder is an application designed to prevent you from forgetting that there is a USB flash disk that is still plugged into the computer. This application will provide a sign for you, by bringing up a pop up that contains a notice that there is a USB flash disk that is still plugged into the computer.

The appearance of these pop ups can also be set if you want to bring it up when you want to turn off the computer or for a specified time. Before you run this application, make sure your computer is already in install.Net Framework 2.0 in it.
Good luck!

Source : id.shvoong.com

Monday, May 10, 2010

How to backup data on the notebook

Backup data with the help of a live distro made in Linux. Many distributions that can be used an important live cd version. Linux version of this live cd linux based operating system allows to run without harddiks.
The steps are as follows:
* Select the option in bios to boot the dvd or cdrom
* Enter the linux live cd into the cdrom or dvd, I used to use puppy linux, why linux is lightweight enough not consume a lot of memory
* Once the system from live cd linux running critical success, try mounting a disk (hard disk detection on Linux systems) C, find the data that will be the backup.
* After the data unreadable to copy to the flash or external hard drive if large data.
* Finish

After the data backed up hard drives please tooling fiddle with in your notebook. . Should create two partitions when reinstalling, if damage occurs to facilitate the operating system again.

Source : id.shvoong.com

Sunday, May 9, 2010

PC World

Computer magazine PC World is global. This magazine contains suggestions from the various aspects of computers and components, the magazine is published monthly by IDG. Internet, and technology products and personal service. In each edition, the PC world to discuss and test hardware and software products from various companies, as well as other technology related devices such as cameras and video, audio devices and televisions.


PC World
Image: PC World logo.svg
PC World logo

Contributing editor Steve Fox
Magazine Categories Computers
Monthly Frequency
Circulation 745 000 [1]
First published March 1983
IDG Company
American Countries
English Language
Website www.pcworld.com
ISSN 0737-8939

Source : www.wikipedia.com

Saturday, May 8, 2010

Mode via Email Hacking Facebook

Data theft happens on the Internet, this time overwrite biggest social networking site in the world, facebook.com. Nytimes.com reported from the site, mode of action of theft operations began with the sending of bogus electronic messages from facebook (e-mail) to users via your facebook email.Dan direct users to click links in messages that are sent as the next step as long as This is done facebook.com. But in the original message (from www.facebook.com) provided direct links to the original site. So this time the site that was open was a fake facebook page to look exactly the same.

Parties attackers use an account that has been "hacked" to take advantage by making robots that send spam account to another account. So the attacker the opportunity to benefit from promotion through facebook utilizing active users.

When a community is growing rapidly, it was also a lot of people think to make money from it "(although in a way that is not kosher), said analyst Michael Argast a software system as quoted from gadgetwise.blogs.nytimes.com

Source : id.shvoong.com

Friday, May 7, 2010

In Windows Explorer specific commands can be added

File Menu Tools 5.8 is a tool to facilitate in conducting activities in Windows Explorer context menu. This application can perform some configuration, like adding some built-in utilities to perform additional operations on files or folders, such as change the icon, an advanced Renamer, delete locked files, run with arguments, change time, and others. Can also add some specific commands, like copy / move to specific folders or can also delete a particular file type.

Another example, if you want to delete any files / folders permanently so users can not directly do it with right click, then delete. However, users should use the shortcut Shift + Del to files / folders can be deleted permanently.

By using this File Menu 5.8 tools, users can right click, select File Menu Tools, and delete Permanently.

Good luck!

Source : id.shvoong.com

Thursday, May 6, 2010

Make their own maps with the software

Now find a location with a map it is easier. Only by accessing the Google Map on the website, you can find almost all the existing locations all over the world.

But there are also other easy ways too, namely with the help of GPS (Global Positioning System), a navigation system that uses satellites aid in mapping a location.

This software can help you who want to create their own MAP. For more details please you to the address below.

http://bagisahabat2.blogspot.com/2010/04/software-untuk-membuat-peta-sendiri.html

Source : id.shvoong.com

Wednesday, May 5, 2010

Accelerating Internet Access, Configure TCP / IP Optimize.

Obviously we are very upset when seeing a slow Internet connection. Moreover, the data we're looking for we may not get.

Obstacles slow internet can actually be handled easily is to do the steps below.

There are six steps to speed internet access

Make:
1. First download the TCP / IP optimizer (please download below)
2. Finished downloading, run the application with the click Run, and click the General Settings tab.
Third. Make adjustments to the speed of your Internet connection by sliding the button Connection Speed.
4. Click Network Adapter and choose the interface you use to connect to the internet
5. Mark (tick) Option Settings, then click the Apply Changes button
6. To get the effect of this optimization.Restart your PC.

These steps are really just one way of many other ways to speed up internet connection, ie you can do to configure TCP / IP Optimize.

A little extra, this optimization is needed because basically connecting a PC to the Internet is required media called Network Interface Card (NIC) or Ethernet Card. Where this work using the Ethernet protocol TCP / IP.

So by optimizing the TCP / IP will do little to speed up access to the internet. Good luck!

Tuesday, May 4, 2010

Changing Background Images with Software

Sometimes the photographs that we have impressed less attractive because it has a background that does not quite fit with its object. Try this application to change the background of your images quickly and easily.

This application can combine two different photo files into one new image file. On tips and tricks this time, we will try to use the application to merge FotoMix two photos with the aim to replace the background of a photo. For that, you need to prepare two photos, each of which represents the object image and background image. Next, download this application at the address Diphso.com with 2:20 MB file size.

If you are confused in using it .. You can clearly read the tutorial on page Diphso Help.

Source : id.shvoong.com

Memory usage is limited to the application

When running many applications of computer sometimes we seem to be much slower. You'll want to know what the cause. To monitor, you can use the default Windows Task Manager. But if you are less familiar with it, try using this application.

Kiwi Application Monitor is a small application that can be used to monitor the work process an application. This application works by collecting data on how long an application is running, memory usage, and CPU usage. The application also monitors the load computer memory (RAM), windows, and user activity.

In addition, this application will also allow you to set priorities in the use of RAM by the application. One thing is interesting, this application provides a facility which allows you to limit the amount of memory that can be used by an application. In effect, this application will give a sign when an application is using memory beyond what has been set.

Good luck!

Source : id.shvoong.com

Monday, May 3, 2010

Windows troubleshooting you confused? Try overcome by using FixWin

Windows troubleshooting you confused? Try overcome by using FixWin.

This application is able to handle more than 50 common problems that often occur in Windows. Some problems that may occur, such as context menu does not appear when required, the recycle bin does not refresh automatically blocked or some Windows utility by itself due to malware attacks. This application can be downloaded ith file size 173 KB from the windowsclub.com, but the application is devoted to Windows 7 & Vista, 32-bit and 64-bit versions.

- - - - - - - - - - - - - -

Context Menu. Specific menus that appear when users right click on an item, the item can be clicked on icons, files, CD-ROM, and others. Usual context menu varies from item to item, depending on the item clicked. Context is also called a popup menu menu.

Malware. The computer program is created with the aim to find a weakness or even damage the software or operating system. There are several categories of malware such as viruses, trojans, worms, spyware, and other. Such computer programs typically can damage the existing software on the computer so as to bring the impact of loss is not small.

Source : id.shvoong.com

Sunday, May 2, 2010

Organize with easy download process

Usually the files are large will be difficult to be downloaded by the user. Moreover, when the Internet connection is not stable, and service that does not support resuming downloads if the download is interrupted due to network problems, blackout, or Internet connection is interrupted.

To overcome this, you can rely on a special application to download, and one of them is Download Accelerator Manager (DAM). The application supports a variety of browsers, including Internet Explorer, Firefox, Chrome, Opera, and so forth.

You can also easily download media files using Download Accelerator Manager version 4, which has advantages mediagrabber, which this program provides ease of downloading media files from the YouTube site, Myspace, and so forth. Downloading activity can be managed, including acceleration, schedule, resume and recover. This application is a web protocol also supports cookies, proxy, http, https, and ftp.

Good luck!

source : id.shvoong.com

Saturday, May 1, 2010

Optimization with the role of the Multi Monitor Software

With dual monitors or more, will certainly help your productivity at work, and allows you to perform different jobs in one time. The advantage of multi-monitor with the following top applications are:

1. DisplayFusion (Windows, Basic: Free / Pro: $ 25)
DisplayFusion is a multi-monitor management software. These tools add a taskbar, to monitor other monitors, change the look of wallpaper hanging position tuning, and can integrate with flickr and VladStudio, and a title-bar buttons to manage the display monitor. In addition, you can also configure the hot-button keys for everything, move the files. Version of the free version is almost cover all the major features of this tool, as a pilot because it's $ 25 is not meant to facilitate your performance.

2. Synergy (Windows / Mac / Linux, Free)
Synergy, took a different decision to that may be cited as the top application. Because these applications provide multi-monitor experience using the system, while other applications are not. If you routinely use multiple monitors, and install a different OS on a third computer, you simply install the Synergy, and you can use your mouse and keyboard on all three monitors at once.

3. Windows 7 (Operating System, Starting from $ 70)
In previous generations of Windows, it is clear that this feature is not eligible for consideration. Giving the impression that you need to look for other software. But now, with Windows 7 multi-monitor feature has been developed so that you no longer need to search for software to manage your multi-monitor. If you feel enough for his ability to move the taskbar to multiple monitors, Windows 7 is a program that fits, but if you want more, you can see other features such as Synergy, DisplayFusion.

Source : rumah teknologi

Friday, April 30, 2010

Applications for analyzing the performance of Internet connections

Applications for analyzing the performance of Internet connections
Panic when discovered problems with internet connection, do not panic. Try to use a specific application to find out the cause, prior to the conclusion or file a complaint by contacting the ISP.

Try to find out first aid use of specific applications known as Visual RouteLite Edition. This application is capable of analyzing Internet connection, and to identify the cause of the problem. The analysis presented to the user in the form of graphic display that informs the routing network.

PC Connection user initiated, leading to the destination PC server connections, including network devices that pass. Slow response or loss of data can be easily known to the user on the graph that appears.

Source : id.shvoong.com

Thursday, April 29, 2010

analyzing your love affair with Software

Choosing a life partner or friend of this center should be selective. Changes in attitudes, habits and lifestyles can be affected from the interaction of man with his friends.Missteps in our society, so that we do not regret in the future.

Various methods can be done to analyze how many correspondences or matches is woven friendship between two people, one of them through the use of software known as the Birth Chart Synastry StarLove.

This application is designed specifically for the analysis of the compatibility of two people in a relationship. The ability of these applications, among others, compares the birth information between two people, and indicating the advantages, and challenges faced in the fabric of friendship.

Source : id.shvoong.com

Wednesday, April 28, 2010

Display desktop appearance changed to resemble the Mac OS 8

Has a beautiful view on a Macintosh computer is now not a mere fantasy, because without having to replace the older operating systems or buying new devices, namely through the use of software known as Winmac.

Of course the existence of such software is welcomed, especially by users of Windows operating system users older versions such as Windows 95. This application enables users to customize the toolbar, quick menus, icon, cursor, wallpaper, sounds, fonts, and display the startup / shutdown resembles Mac OS 8 (Copland) Through the toolbar, the user can run or switching applications, including process shutdown, logout, or restart. While the Quick menu available can facilitate quick access to the trash cans, eject the disk, speaker volume control, Windows guide, and the Task manager.


This application includes complete documentation for usage, so users can easily implement them. Make sure your PC has a minimum of 486 CPU, 4MB memory, mouse / pointing, devices and high-color display.

Good luck!

Sorce : id.shvoong.com

Tuesday, April 27, 2010

Outdated floppy

Floppy first ever victorious and popular, but it is now very rare in the use of people.
Sony also will suspend its distribution in his own country (Japan), and the whole production process will be discontinued in 2011.

Sony is a company that helps for the development of floppy disks in 1981 and began marketing it in 1983 and have soared as his name or the very popular data storage media in the year 2000, Sony had released up to 47 million units, floppy disks, but the arrival of USB drives and CD drives , diskettes are no longer relevant. Perhaps because of these new devices have a greater storage capacity so users prefer USB drives and CDs rather than floppies.

Although there is still a possibility to produce and use floppy disks but will soon be an antique, Sony had already ended production of the floppy just like many other companies that have not sold it.

Source : id.shvoong.com

Monday, April 26, 2010

Computer Definitions

There are several definitions of the computer as suggested by several parties.
among other things:

According to the Annual Computer books (Robert H Blissmer), Computer is an electronic device that can perform several tasks, among others, receive input, process the input was in accordance with the program, keep the commandments and the results of the processing and provides output in the form of information.

According to Computer books today (Donald H. Sanders), Computer is an electronic system to manipulate data quickly and accurately as well designed and organized in order to automatically receive and store input data, process it and produce output under the supervision of a step-by-step instructions that programs stored in memory (stored program).

According to the book Computer Organization (VC Hamacher), Computer is an electronic calculating machine that can quickly receive the digital input information, process it in accordance with a program stored in its memory and generate output information.

Can be concluded that the computer is
1. Electronic Equipment
2. Can process data
3. Can accept input data
4. Can provide information
5. Can store programs and results processing
6. Using a program stored in computer memory
7. Scara work automatically.

Source : id.shvoong.com

Check them easily on a flat file

Check them easily on a flat file

Interactive User Interface

Flat File Checker is an application that is easy to use in checking the flat file. Flat File Checker can find the data, the error in the batch from the flat file. These errors can be found with the scheme based on (XML) that defines the business rules.

In addition, the Flat File Checker can be used to filter the data exchange and data validation. This application is supported by an interactive user interface. This application has features that can represent the scheme as a document in a browser that can read.

Support Command Line also allows users to integrate these FlatFile Checker on batch processing. The latest version of the Flat File Checker can increase the functionality of VB expressions.

Source : id.shvoong.com

Sunday, April 25, 2010

The Chicago Manual of Style

The Chicago Manual of Style (CMS or Chicago) is a style guide for American English writing issued by the University of Chicago Press.CMS discuss all aspects of editorial practice, from American English grammar and usage to document preparation.

The first edition of this book is published by the University of Chicago in 1906, under the title A Manual of Style. On publication of the 13 in 1982, the book officially changed its name to The Chicago Manual of Style, which have previously been widely used unofficially by the users of this book. In recent years, the publisher has issued a new edition about every decade. (The 14th edition of this book was published in 1993.) Most recent edition, the 15th edition, published in 2003.
CMS is currently published in a hardcover edition and CD-ROM, accompanied by an online edition was published on September 29, 2006 (link). Online edition of this book includes the text fully searchable on the internet from the edition of 15, with Additional features include tools for editors, guidelines excerpted quickly, and access can be searched to the Chicago Style Q & A, a view that is popular among the editors of manuscripts and grammar addict.

Source : www.wikipedia.com

Saturday, April 24, 2010

Internetwork Packet Exchange

IPX is a computer networking protocol used by Novell NetWare operating system in the late 1980s to mid 1990s.

IPX is used for mapping the data packets from one point to another point in the network through an internetwork.

At first, the use of IPX very much, before the advent of the Internet boom of the mid-1990s. At that time, computers and computer networks can run multiple network protocols, so almost all IPX-based network also run TCP / IP to allow Internet connectivity.

IPX addressing
IPX nodes has the following addressing scheme:

Logical networks are 32-bit address is a hexadecimal number with a range from 0x00000001 to 0xFFFFFFFE. This address is also called the network address (network address).
Each host has its node address of each, which by default is set to the MAC address used by the network card used by the nodes. Node address was added to the network address to create a unique identifier for the hosts on the network.

Similarities with IP
IPX network address, in concept, similar to IP addresses, ie the network ID part of the total length of 32-bit IP address (the IP address with its subnet mask set to the number 1). Given the node address using the MAC address of network card is used, then the protocols Address Resolution Protocol (ARP) was not needed.

When doing the routing, the entries in the IPX routing table are also the same as the IP routing table, ie the routing is done by using its network address, and any network address, the format network: nodes are used, the same way with the format of an IP address / subnet mask used in the IP routing table.

IPX over Ethernet
IPX can also be transmitted via Ethernet using four types of encapsulation, as follows:

IEEE 802.3, which is used in the old systems and involves IPX data that dimulasi directly after 802.3 frame header.
IEEE 802.2 (Novell)
IEEE 802.2 (SNAP).
Ethernet II.

Source : www.wikipedia.com

Friday, April 23, 2010

E-business

E-business can be translated as a business activity that is done automatically and using a semiautomatic computer information systems. This term was first introduced by Lou Gerstner, the CEO of IBM company, is now a form of business activities conducted using Internet technology. E-business allows a company to deal with a system of internal and external data processing them more flexible and efficient. E-business is also widely used to dealing with suppliers and business partners, as well as meet the demand and serve customers better satisfaction.

In everyday use, e-business is not only about e-commerce course. In this case, e-commerce is more of a sub part of e-business, while e-business covers all kinds of functions and business activities using electronic data, including Internet marketing (e-marketing). As part of e-business, e-commerce is more focused on the activities of business transactions via the www or the Internet. By using knowledge management systems, e-commerce has the goal to increase revenu from company [1].

Meanwhile, e-business associated with the overall business process, including value chain: electronic purchasing (purchasing electronic), supply chain management (supply chain management), electronic order processing, handling and customer services, and cooperation with business partners. E-business gives the possibility to exchange data between one company and another company, either through the web, Internet, extranet, intranet or a pair of them.

Source : www.wikipedia.com

Thursday, April 22, 2010

McAfee antivirus virus mutates so

Beijing: McAfee antivirus software have a problem, Wednesday (21 / 4), causing some Windows XP computers worldwide were damaged or had to repeatedly re-ignited. The launch of the new McAfee released their own turned out to destroy this company.

The problem had resulted in some schools have a computer failure, the police were forced to write by hand reports and stop the patrol car terminal as a precaution, some of the prison to cancel the visit, and the hospital refused to non-trauma patients in emergency rooms and delaying some elective surgery.

McAfee apologized to customers, but they underestimate their impact. "We did not realize a significant impact on consumers," said anti-virus company. (Xinhua / ARI)

Surce : liputan6.com

ADSL

ADSL or Asymmetric Digital Subscriber Line is a form of DSL technology. Characteristic of ADSL is its asymmetric, ie that data transferred in a different speed from one side to another.

ADSL Feature
ADSL itself has a variety of speeds, type of router, USB and other devices inside. For example there can be used for two computers using a USB connection, but there also can be used for four computers with an Ethernet LAN connection. But it is better to choose an ADSL modem, we chose to use a modem that has the on and off. This is meant so that we can regulate the use of the connection as much as we need and save the cost of connection is used.
Another important thing which is owned by the ADSL modem is that there is a useful indicator light to know the process connection occurs.
Of the three existing indicator lights on the modem, the most important is the PPP and DSL light. Where is the DSL light indicates a connection has been connected with either the line. While the PPP light indicates the data flow when a person browsing.


Advantages of ADSL

The use of ADSL internet making activities become much cheaper. So that we can be surfing without worry about the bill's swollen.

Frequency division into two, namely to deliver high-frequency data, while the low frequencies to deliver voice and fax.


Lack of ADSL

As the distance is very influential on the speed of data transmission.

The existence of load coils that are used to provide telephone services to the affected areas, while the load induction coils itself is shifting the equipment onto the carrier frequency.

Not all software can use an ADSL modem

Bridged taps existence, namely the cable that are not on a direct path between the customer and the CO

The use of fiber optics in digital phone lines in use today. Where the use of optical fiber is not in accordance with ADSL systems that still use analog channels namely copper cable, so it will be difficult in the delivery of signals through optical fiber.

Source : www.wikipedia.com

Computer Networks

Computer network is a system consisting of computer and other network devices that work together to achieve a common purpose. The purpose computer network are:

Dividing resources: for example the use of shared printers, CPU, memory, hard drive
Communication: eg electronic mail, instant messaging, chat
Access to information: for example web browsing

Based on the criteria, a computer network is divided into 4, namely:

1. Based on the distribution of sources of information / data

- Network This network consists of a centralized computer where the client and the server that the client computer that serves as an intermediary to access sources of information / data derived from a single computer server

2. Based on the geographic reach is divided into:

- Network LAN is a network that connects 2 computers or more in coverage such as laboratories, offices, and in 1 cafe.

- Network MAN network is covering a large city and its local area. Examples of local telephone networks, cellular telephone systems, as well as some ISP's internet relay network.

- WAN Network A network with worldwide coverage.

3. Based on data transmission media

- Wired Network (Wired Network) In this network, to connect one computer to another computer network cables required.

- Wireless Network (Wireless Network) is a network with the medium in the form of electromagnetic waves.

4. Based on the roles and relationships of each computer in the process data.

- Network Client-Server In this network there are 1 or more server computers and client computers. As an intermediary for the client computer can access data on a server computer and the server computer provides the information required by the client computer.

Networking-Peer-to-peer network does not exist at the client computer and server computer because all computers can do the transfer and receipt of information so that all computers function as clients as well as a server.

Source : www.wikipedia.com

Wednesday, April 21, 2010

Accessing folders easily and quickly

Sometimes we have the folders that often we open the document because in it there is the task we are doing. At one time, for various reasons, you accidentally close the folder so you have to open it back through Windows Explorer. That way, maybe some of your hard work. Try this application to make it easier and faster.

Folder Menu is a portable application that will allow you to access your favorite folders. When executed, this application will be immediately entrenched in the system tray to allow you to access it.

Then you can directly apply the folders anywhere you want quickly accessed via this application. So, with this application, the old ways that seem troublesome in opening a folder can be changed.

Source : id.shvoong.com

Globalization

Globalization is a term that has a relationship with increasing interdependency among nations around the world and human world through trade, travel, investment, popular culture, and other forms of interaction other so that the boundaries of a country becomes increasingly narrow.

Globalization is a process in which the intergroup, interpersonal, and between countries interact with each other, dependent, related to, and influence one another across national borders

In many respects, globalization has many similar characteristics with internationalization, so these two terms are often interchangeable. Some parties use the term globalization is often associated with a reduced role of state or national boundaries.

Feature of globalization
Here are some characteristics that indicate the growing phenomenon of globalization in the world.
Changes in space and time of Constantine. The development of items such as satellite television, cell phone, and internet shows that the global communication happens so fast, while touring through such mass movements allows us to feel a lot of things from a different culture.
Market and economic production in different countries become interdependent as a result of the growth of international trade, increasing influence of multinationals, and the dominance of such an organization the World Trade Organization (WTO).
Increasing cultural interaction through the development of mass media (especially television, music, movies, and transmission of international news and sports). Currently, we can eat and experience new ideas and experiences on matters across diverse cultures, eg in the field of fashion, food, literature.
The increasing problem with, for example in the environmental field, multinational crisis, inflation, regional and others.
Kennedy and Cohen conclude that this transformation has brought us on globalism, a new awareness and understanding that the world is one. Giddens asserts that most of us realize that we are actually taking part in a world that must be changed without marked by a sense of control and the attraction will be the same thing, change and uncertainty, and the fact that may occur. Similarly, Peter Drucker mentioned globalization as the era of social transformation

Source : www.wikipedia.com

Tuesday, April 20, 2010

E-voting

e-voting comes from electronic voting

Understanding of e-voting in general is the use of information technology on the implementation of voting. Choice of technology used in the implementation of e-Voting is very varied, such as the use of smart card for authentication of voters who can be combined in an e-ID card, use the internet as a voting system or data transmission, use of the touch screen as a substitute for sound cards, and many variations technology that can be used today. In the development of thinking nowadays use mobile phone devices to provide a sound could be an option because it combines (convergence) computers and internet network in one single device.

Constraints on e-voting that has ever happened in various countries who have and are being applied to further improve e-voting. One positive aspect of the adoption of e-voting today is the increasingly cheap hardware used and the more open software is used so that the cost of implementing e-voting increasingly cheap from time to time and for the more open the software to be audited jointly.

Source : www.wikipedia.com

Maemo

Maemo is a development platform that is open source for devices that use a Linux system, like the internet tablets, which inherited the architecture of Linux from the Unix operating system.

Internet tablet is a device used to provide the level of desktop PCs that are used for Internet services (such as web pages and email.) Those devices has a high resolution, touch-sensitive screen with 800 x 480 pixel size. Nokia has released three Internet Tablet platform Maemo, the Nokia 770, Nokia N800, and Nokia N810, and the latest Nokia N900.

Hardware
Maemo operating system designed for the Nokia internet tablets, which have features similar specifications with high-level mobile phones Nokia, the N series and E series, with a TI OMAP ARM SOCS, large screen and internal storage that can be enlarged.

Source : www.wikipedia

Monday, April 19, 2010

Laptop Very Important Components

Buying a laptop is an investment not only for students but most importantly for young professionals who want to know more.

The most important part of the laptop is the processor without it, the laptop will not work at all. It is involved in data processing for better performance and maximum. Laptops have a motherboard that all the circuits and chips are connected to the inside. Bypassing the battery or DC. They give the best results for users to enjoy. These processors can be found in the motherboard.

RAM or Random Access Memory is one of the most important part of the laptop. It is responsible for the speed of data processing.

Hard disks are also important. This is where all data is stored. If memory is low hard drive, users can also try using an external hard drive. Of course, they need an adapter for this. . Also a good source, an external hard disk to back up all files in the laptop in a case may have been lost or destroyed by the virus.

The battery is the lifeblood of the laptop. This is the laptop that is necessary to look into before buying. Some people say that it's better to charge while working, so there will be no disruption to their work. They actually can do this by using the power cord. However, it also is not recommended as a laptop battery for possible costs resulting in lower power backup.

Laptops really needs right now. With the rapid improvement in technology, all people tend to rely on it to make their reports at work or in school. Also, are good sources to find out all the latest news of the world if they have an internet connection. Source : shvoong.com

Benefits of Buying a Laptop Computer Parts Online

The internet has so much sway in the market today because a lot of merchandise can be purchased directly from web.

Computer products is also growing and developing through the internet, with so many websites that offer them for sale. That makes it even more difficult to choose and buy a laptop computer parts online.

We will mention a few reasons why shopping online is profitable.

1. Having to choose the right time, and not have to worry whether open or closed shop is one particular advantage. You'll also find that shopping online computer parts much, much cheaper. Why? Simply because the web site need not worry about the cost of which involve running the store. And lastly, it is the simple pleasure of shopping in the comfort of your own home. No traffic, no long lines, no crowded areas, and there are no physical discomfort caused by making your purchase. It's fast, easy and far more efficient.

2. More often than not, you will not find what you're looking for when you go directly to the store. Number of computer products in the market is very high that you can not fit them all in there. On the other hand, a web site can hold a high volume of information on each product can be viewed and inspected to specification. You can also learn more by reading the comments on the product from web site visitors. Most online shopping sites are now able to send orders within 24-48 hours, compared with retail stores to take days, even weeks to find a particular product out of stocks and send it to your home.

3. Information about products can be easily examined on a web site, including but not limited to, specifications, compatibility information, and feedback from site visitors. online shopping sites usually have an application that allows you to compare the computer results by categories such as cost, memory, batteries, and more.

4. Since you can register an account on the website, you will have your own page showing your shopping history. This can help you double back certain products that have been purchased and that has been marked for purchase in the future. A newsletter can also be sent to your email providing recommendations related to the item you have ordered or placed in your online shopping cart.
Source : d.shvoong.com

Sunday, April 18, 2010

Displays a list of applications installed and information is complete

Term Add / Remove Programs certainly no stranger to your Windows user. Windows operating systems provide utilities to install or uninstall the program via the control panel. Some applications may not be visible in the standard Windows utility, and the display of information were limited. Not satisfied with the functions contained in the Add / Remove Program of Windows standard?

You can try to use other applications in order to function better, one of which is MyUninstaller, which is an alternative utility Add / Remove Prgram applications, in addition to the standard applet on the Windows operating system. This utility displays the entire list of installed applications at once enable you to perform uninstalls the application, delete an uninstall entry, and store that list into a text file or html.

Additional information from the most installed applications that can be presented by MyUninstaller, where the standard applet Add / Remove Program can not be displayed. Some of the information, including product name, company, version, uninstall string, installation folder, and so forth. The news that there is a bug in previous versions, the loss of focus on the main window when users switch to another application and switch back to the window My Uninstaller, has been fixed in version 1:40

Good luck ... Source : www.id.shvoong.com

Keeping Tips durable LCD monitors

LCDs are more susceptible to damage. Now, how to keep the LCD monitor durable? The tips are as follows.

Place a dry place and avoid direct sunlight
because it will cause damage, minimal color change occurs, either on screen or on its LCD casing.
Avoid touching the LCD screen
LCD screens are made of fabric Liquid (liquid), making it very vulnerable to shifts when exposed to touch the liquid, so as much as possible avoid touching the LCD screen directly.
Turn on the LCD maximum of 4 hours under normal conditions
This is to give a break to the components inside. Use of continuous LCD will make the LCD image blurred faster. If you use the LCD 24 hours, try to turn off the LCD every 4 hours for 5 minutes.
Close the LCD after use
aim to avoid the LCD from dirt and dust
Use UPS or stabilizer
although not sensitive CPU, use the right voltage will obviously make the LCD more durable, especially from the loss of power disturbances that suddenly.
Use the recommended resolution
Each LCD has a native resolution or the best resolution of the LCD. If the LCD is set outside the native resolution, the images shown will be reduced quality. So try to use the recommended resolution. Eg for LCD 15 "1360 x 768 resolution nativenya for wide screen.
Use the settings in the Normal Brighness and Contral
If both settings are too high, then existing lights in the LCD will be easier to die. So try to use the default settings alone. (Approx. 50%)
Put in place a flat LCD
This is to anticipate the collapse of the LCD
Do not be too often shifted LCD
This is to keep the frequent occurrence of shocks in the LCD. Shocks that are too hard can cause damage to the LCD screen.
Keep away from Magnetic Field
Magnetic field is a lot of the source. For example is the speaker (the most frequently used by computer users). Yanag magnetic field too close will damage the image quality of LCD, and if left too long will cause permanent damage to the color.
Keep out of reach of children
This aims to avoid accidents, such as electric shock, collapse or other units.
Hopefully useful Source : id.shvoong.com

Saturday, April 17, 2010

CHOOSE techniques COMPUTER

We would like to buy a computer of course wanted a computer that can be used for all types
application needs. To select the appropriate computer then we have the desired
selecting based on need factors. Factors associated with objective needs
computer use, who the users and software applications that will be used.
Apart from demand factors, knowledge of computer hardware needed to
choose the computer components that suit their needs. In selecting the components
Also consider the ability of computer work, correspondence, balance and price
and the possible upgrading of the selected components. Source : SHVOONG.COM

Modem

Modem is a part that converts the signal into the information signal (carrier) and ready for delivery and the part that separates the information signal (which contain data or messages) received from the carrier signal so that information can be well received. Modem is a two-way communication tool. Each remote communications devices typically use two-way section called "modem", such as VSAT, microwave radio, etc., but generally the term modem is better known as the hardware that is often used for communication on the computer.

Data from the computer in the form of a digital signal provided to the modem to be converted into an analog signal. Analog signals can be transmitted through several media, telecommunications such as telephone and radio.

Arriving at the destination modem, the analog signal is converted into digital signals back and sent to the computer. There are two types of modems are physical, ie an external modem and internal modem.

The types of modems
Modem 3GP
CDMA Modem
GSM Modem
Analog modem is a modem that converts analog signals into digital signals
ADSL Modem Cable Modem is a modem that receives data directly from service providers via cable TV
Source : www.wikipedia

Friday, April 16, 2010

Be careful Virus Attack Internet Porn

Japan trojan virus is installed automatically on computers using the popular file sharing service called Winni. A new malware attack PCs through shared files and Internet traces announce users to a site. Malware authors are also demanding money for deletion.

The target is those who illegally download hentai game type (animated porn) in the form of shaped cartoon pornography. Yomiuri website claims there are 5500 people who claimed to have been infected.

Kenzero Viru is being monitored by security company Trend Micro website in Japan.

By masquerading as a game installation view, these viruses require personal details of PC owners.

Furthermore, viruses take the web user history and then publish them online with their name, before sending an email or pop-up screen demanding payment credit card 1500 yen (USD 150 thousand).

That demand is called for "complete violation of copyright laws" web page is deleted.

"We have seen this name previously associated with Zeus and Trojan Koobface. This is a crime gang that is continually involved with crimes like this, "said Rik Ferguson, senior security advisor at Trend Micro.

Kenzero makeup of the virus is that asks ransom, he added, where the malware that infects your computer and do the encryption on documents, images, music and then forced to demand payment for the decryption key.

Website is owned by a company called Romancing Inc. which is registered by a fictitious individual named Shoen Overns.
Source : www.inilah.com

10 "laptop" was great in the year 2010

What notebook or laptop aja, which so gagdet "most" sought in this century?? There are 10 "laptop" was great in the year 2010. Laptops are: Number 1 ..!!! Luvaglio - the first laptop worth millions of dollars .. with screen 17 "special LED anti-glare reflective coating, 128GB Solid State Disk and a slot loading Blue-Ray drive .. then there is an integrated screen cleaning device plus there very rare colored diamond that serves as the power button when placed into the laptop, and also acts as security identification ...


Subsequently number 2 ..! Orkin's rolltop .. .. people said this product should go list "of must-haves" .. because he has a flexible LED screen, plus the forgiveness multitouch connect ama dah create iPhone.Udah so, klo opened full, so ni notebook screen 17 "flatscreen ..

Next .. none other than the Hewlett-Packard ZT1000 ranked 3rd. Equipped with carved wooden frame, then I can dual OS (linux ubuntu and Win.XP) .. antique copper keyboard and mouse, bearing arms, engraved brass accents, claw feet.

What to Lenovo ... 4 .. i

Next in rank 5 .. .. EDSSKN there ... only one word can say ... AMAZING ...!

Patients in the number 6 there Buyanov Nikita HP ... ...

Can word i say nothing ... hiks ..

The next patient .. Dual Touch Screen Laptop from Canova. ... Features dual display with touch-sensitive screens, sketch pad, music score, graph paper, electronic pen and a special hardware for smooth functioning.

Number 8 - Fujitsu's DJ Laptop, has a 20-inch LCD screen, easy to be folded closed.

This allows us to create a laptop to explore all your favorite tracks are the same as vinylturntable.

To 9 .. NEC LaVie G-type L .. with a 15.4-inch flanking .. besides there is a very important key is "Emergency Button", which is going to shutdown the engine when the unexpected intrusion. Launched in 2006, made only 300 units and is very secretive. Type-No1 was made at a cost of up to ¥ 174,510 ($ 1,476).

Last number 10 .. Felix Schmidberger. Dideasin for 2015 with OLED touch screen. Computer itself has a OLED touch screen, very similar to the UMPC or PDA. The entire screen is a slider, because it can be moved forward to open a second OLED touchscreen below, where we can have a keyboard or working controls, similar to the setup with 2 monitors.
Source : id.shvoong.com

Thursday, April 15, 2010

Move important data before disappearing

Most of you who use Microsoft Windows operating systems must often put important documents in My Document directory. By default, the directory is My Document on the system drive (C: \)

The problem is, when there is system failure, whether it's caused by viruses or anything else that causes have to reinstall your entire system, we can be sure important documents will also be lost. Before this happened to you, try using this application.

0.99 Relocator profile will help you move the Windows User Profiles to other drives. Thus, when the system failur occurred that caused you to reinstall Windows, important documents contained in the My Documents directory will not go missing. Before using this application, make sure your operating system already installed. NET Framework SP2 first. Source : id.shvoong.com

Personal computer

Personal computer or PC has several meanings:

A general term that can be used on computers and people easily obtained.
The general term in the microcomputer according to the specifications of IBM.
Personal computer was first released by IBM and indirectly sparked the use of the term PC (Personal Computer) - refer to the IBM PC.
There are several types of personal computers, among others:

Desktop computer
PDA Notebook or Laptop
Computers that can fit into the body (wearable computer)

Source : www.wikipedia.com

Wednesday, April 14, 2010

Extensible hypertext markup language

XHTML stands for eXtensible HyperText Markup Language. XHTML is a reformulation of HTML forms using the XML paradigm. [1] XHTML is a markup language for the router and the development of HTML which has a capacity of more or less similar to HTML, but with a more strict syntax rules. HTML is an application of SGML (Standard Generalized Markup Language) that is very flexible, whereas XHTML is an application of XML, SGML derivative that is more limited.

Reasons for Using HTML
XHTML improve the deficiencies in the HTML.
XHTML can be run on multiple platforms, allowing us to open the site either through the PDA and mobile phones.
Writing
XHTML is not too different from the HTML 4.01 standard. If you already have the ability HTML 4.01 it will help to launch XHTML. XHTML requires that the writing of tags with lowercase (lowercase) and always closed using the closing tag. Some rules in XHTML
As mentioned previously, XHTML is an improved version of HTML. For that, there are some rules that are more stable and consistent program.

Each tag must be written in lowercase.
Opening and closing tags on the correct nest.
Attribute tags are written with lowercase letters and using quotation marks.
Providing cover for each tag.
Source : www.wikipedia.com

USB 3.0 is halted progress until the end of 2011

USB 3.0 device application on every computer in every home, is clearly an easy thing, let alone it directly raised by the motherboard manufacturer, such as Asus and Gigabyte. But unfortunately what happens is you will not see the development of a USB 3.0 until the end of 2011. What reason? The main reason is the lack of support from Intel to implement these technologies.

"A clear line is that if the new version of USB can be integrated into a chipset from a PC," said Brian O `Rourke, an analyst at In-Stat." That is the real current from the USB. With integrate into the chipset, Intel basically allows PC OEMs to feel a new sense of USB for free.

But according to O `Rourke, Intel has not made this as a main agenda item until the end of 2011. Is it true or not, Intel does not confirm it, but at least it (USB 3.0) has not been a priority from Intel.

"USB 2.0, for some people has been doing its job perfectly," according to Brookwood. But what about the HD camcorder or digital HD cameras, which can benefit from the extra transfer speed offered by USB 3.0? Surely for high-end circles are willing to pay more, in order to get the speed of this transfer.

Source : rumahteknologi.com

Tuesday, April 13, 2010

Multimedia

Multimedia is the use of computers to present and combine Gamba, text, sound, animation and video with tools ([tool]) and connectivity ([link]) so that users can be had ([navigation]), interact, work and communicate. In the world of multimedia entertainment is often used. Apart from the entertainment, Multimedia Games is also adopted by the world.

Multimedia is used also in education and business. In education, multimedia is used as a medium of instruction, either in class or individually. In the world of business, multimedia is used as a media company profile, product profile, even as media information kiosks and training in e-learning systems.

At first multimedia includes only media to be consumed senses of sight (still images, text, video motion picture, and the invention of motion picture / animation), and consumption of auditory (sound). In the development of multimedia includes also the kinetic (motion) and the smell which is konsupsi sense of smell. Multimedia began to include elements of kinetic since was applied to the 3-dimensional movies are combined with the movement of the chair seat in the audience. Kinetic and 3-dimensional films evoke rialistis sens.

Since the discovery of reproductive technologies through telekomunikas smell, the smell started to become part of multimediai. With the input device penditeksi smell, an operator can transmit the results of digitizing the smell via the internet. Recipients should be available on a computer output device reproduction machine odor. This smells of reproduction machine mixing different types of material that smells after a mixed output of a smell similar to data sent from the Internet. With with out the printer, this tool makes the pheromone-scent feromor instead of ink. Output is not a mold but the aroma. Source : www.wikipedia.com

Java

Java 'is a programming language that can run on various computers, including mobile phones. Developed and published in 1995 by Sun Microsystems. Java should not be misunderstood as JavaScript. JavaScript is a scripting language used by web browsers.

Initial Version
A preliminary version of Java in the year 1996 is already a release version so called Java Version 1.0. This version of Java includes many standard packages are constantly being developed at the beginning of the next version:

java.lang: The allotment of the basic elements of class.
java.io: The allotment of input and output classes, including the use of the file.
java.util: The allotment of such supplementary class class class class structure and calendar data.
java.net: The allotment of the class of TCP / IP, which enables communication with other computers using TCP / IP network.
java.awt: The base class for applications with a user interface (GUI)
java.applet: The base class interface applications to be implemented on a web browser.

Phase Compiling Java
Write / Modify. Programmers write programs and store them in the media in the form of a file. 'Java'.
Compilation. Establish a form of bytecodes from program files. 'Class'.
Load. Loader to load class bytecodes into memory.
Verification. Peng-verification ensures bytecodes do not interfere with the Java security system.
Run. Language translator to translate bytecodes to be in use''computer.
Source : www.wikipedia.com

Monday, April 12, 2010

8 WAYS TO AVOID CYBER CRIME

Various facts of evil in the world show off the internet more in line with the development of science and technology. This condition implies that it is not always good science and technology development and is used with care even further dampen the quality and quantity of our society. Therefore, the consumers of science and technology, especially Internet, are expected to have a moral and social values are high not only concerned with the interests of individuals or groups so as not to harm the many.

With the current situation would have been difficult to just rely on a wise statement. You are actively protect themselves from criminal attack on the internet do not just depend on others. There are 8 fundamental way that must be taken to ensure that you do not themselves become victims of the perpetrators of "cyber crime".

1. Protecting Computers
Always use anti-virus applications, anti-spyware applications and firewall.Cek every month whether the antivirus is still the way what does not.
2.Melindungi children
Children are the most vulnerable targets in the virtual world. Monitor their activities while surfing.
3. Always Up-to-date
Update your system regularly along with other security applications like anti-virus.
4. Secure Email
Vigilant in receiving emails from people you do not know. Most damaging emails that carry viruses on the email attachment.
5. Protecting your account
Always use a password with a combination of letters, numbers and symbols that consist of many characters.
6. Make a copy of
Back up your data to avoid loss and theft and damage from the action of a viral infection.
7. Find Information
Active in the development of information about Internet security.
8. Protect your identity
Never let a profile on the parties obviously did not know his origins.
Source : www.id.shvoong.com

Dribbling TRICKS WEBSITE SEARCH ENGINE TO YOUR BLOG

Website that has been registered with search engines is not enough without the tricks to a minimum. This trick is useful to your Website a good position in search results.
The trick is:
The first stage, list your website URL. To facilitate you make a list of URLs you can try this service on http://www.xml-sitemaps.com

List or a list of URL extensions are different and the search engine has its own characteristics regarding the format of the receipt of a list of URLs. More details see the following file formats.

• sitemap.xml: files list of URLs, and file compression sitemap.xml.gz who registered later in Om Google.
• ror.xml: files list of URLs to be exchanged via RSS Feeds.
• urllist.txt: files list of URLs, and file compression urllist.txt.gz to be registered into the Yahoo search engine.
• sitemap.html: files list your URL to serve to guests and reserve for other search engines.

The second phase, upload formats a list of URLs that have been made to your webhosting (usually in the public_html).

The third stage, list the files into various search engines like Google by using Google Webmaster Tools service, Yahoo with MSN Live Webmaster Tools service it, and other popular search engines.
Good luck and see the results.
Source : www.id.shvoong.com

Sunday, April 11, 2010

Internet Protocol

Internet Protocol is a network layer protocol (network layer in the OSI Reference Model) or internetwork layer protocol (internetwork layer in the DARPA Reference Model) used by TCP / IP for addressing and routing data packets between hosts in a computer network-based TCP / IP. A widely used version of IP is IP version 4 (IPv4) defined in RFC 791 and published in 1981, but some time to come will be replaced by IP version 6.

IP protocols offer services
IP offers the service as a protocol between the network (inter-network), because that IP is also often referred to as a protocol that is routable

IP protocol supports multiple clients, because that IP is a "courier" carrying data that is sent by the protocols higher layer comparison.

Send data in the form of IP datagram, since it only provides the IP is connectionless data transmission service and not reliable (unreliable) to the protocols that are higher than the IP protocol.

It is independent of the network interface layer (first layer in the DARPA Reference Model), because that IP is designed to support multiple computers and network interfaces.

To support the largest frame size that is owned by the network interface layer technology is different, the IP can make towards solving the data packet into multiple fragments before placed on a network channel.

Can be expanded by using the IP Options feature in the IP header.

Source : www.wikipedia.com

Hotspot

Hotspots are certain places that have Internet service using Wireless LAN technology, such as at universities, plazas, malls, restaurants, libraries or airports. Internet service like this, there are paid and there are provided free of charge. [1]

Hotspot concept was first proposed in 1993 by Bret Stewart and when Networld Interop conference, in San Francisco.

Some components in the hotspot are:
Mobile station
Access Point
Switch, Router, Network Access Controller
Web server or other servers
High-speed Internet connection
Internet Service Provider
Wireless ISPs

There are several commonly used types of hotspot, namely: [3]

Free hotspots as an additional general customers.
Hotspot is paid directly to the landlord.
Paying to wifi hotspot hotspot operators, such as Boingo, iPass. Threat
Today, more and more hotspots are available in many public places, but every time you make a connection at a hotspot is actually endangering your PC or laptop itself. . This condition is possible at all for the hacker to access the hotspot user's credit card, if you conduct transactions online.

Source : www.wikipedia.com

Saturday, April 10, 2010

Removing a stubborn application

If you often install applications for free, would you ever experienced an application that is still listed in Add or Remove Programs list when you remove it from the system. Now, to remove a stubborn application
could be through the Registry Editor.
The trick is:

Open the Registry Editor window, then find the location "HKEY_LOCAL_MACHINE-SOFTWARE-Microsoft-Windows-CurrentVersion-Uninstall." This directory stores all the application's name in the Add or Remove Programs window is stored in a directory.
Find the name of the application you want removed. After the meet, click on the directory, then select "Delete" from the menu bar "Edit".

Right-click on that directory.

after a context menu appears, select "Delete".

Before closing the Registry Editor window, press the "F5" on your keyboard to update the contents of the registry.

Without having to restart Windows, open the Add or Remove Programs window, and locate the name of the application which was originally difficult to remove. certain applications that had already gone wayward. Source :id.shvoong.com

Beware! Computer Virus "Life Is Beautiful" can destroy your computer data

Microsoft and Norton Intrusion inform the threat of new viruses via electronic mail (e-mail) that can damage a user's computer data internet services, like Yahoo, Hotmail, and AOL (American OnLine).
Viruses' Life is Beautiful ". was signed by electronic mail names. If you accept, delete the file immediately. When it opened, will display a message on your computer screen the words: "it is too late now, your life is no longer beautiful ...." (Too late now, you can only let go).
Furthermore, all data on your computer you will be lost. Not only that, people who send a "virus" that will also get access to your name, e-mail, and your password. AOL has confirmed that, while the antivirus software was not able to destroy the existing "Life is Beautiful".

Source : id.shvoong.com

Friday, April 9, 2010

Caring Tips Laptop Batteries

Batre tips on caring for a laptop that does not quickly broken.

1st. Battery discharges
Do not ever let your batteries in a state of power supply does not get below 30%. Often allow the battery below 30% or even wait until the
running out of supplies, will accelerate the damage to your battery.

2. Memory Effect
If you hear no memory effect on knowl-san-charged battery, it will not happen for this type of battery output current. Batteries are the new laptops are very protective with the memory effect. You can at any time to charge your battery and the battery should not be allowed to empty.

3. Temperature
If your battery is used for common activities that produce a temperature of about 40 degrees, a battery can stay connected to the socket. But if the drive has reached the temperature at 60 degrees, meaning that the battery must be removed from the socket.

4. Saving Laptops In Long Term
You're planning to travel for a long time and should keep a laptop, try to remove the battery from the laptop while the battery is still at 40% before the shut down and stored. Then, save your battery dry and fresh place (not humid) or in the freezer with a temperature of 0 º C - 10 º C.

5. Buying Replacement Batteries
Do not buy a battery if your battery is not damaged. If you intend to buy, then the battery needs to be saved by using the means at number 4.

6. Some features that make spendthrift Batteries
Windows Aero.
SuperFetch.
ReadyBoost.
SearchIndexer.
if the situation was not charge (battery mode) should turn off the feature at the top, if not, charge the battery when the road on those features.

7. 3 Do
USB: do not plug any USB connection when not in use, remove all the USB connection is not used, state of the battery mode.
Sound: want to save battery? Do not harden sound when listening to music or movies, state of the battery mode.
Wireless: do not turn on the wireless connection when not in use.

8. Nothing On USB
Which should not be used:
External cooling fan, usually installed under the laptop.
USB vacuum cleaner
Lighting via a USB / LED super

Source : id.shvoong.com

Computer

Computer is a tool used to process the data according to procedures that have been formulated. Computer word originally used to describe people who job perform arithmetical calculations, with or without hearing aids, but the meaning of the word is then transferred to the machine itself. Origins, information processing is almost exclusively related to arithmetical problems, but modern computers used for many tasks unrelated to mathematics.

Computer consists of 2 major parts:
1.software (software)
2.hardware (hardware)

1.Hardware
Processor or CPU as the data processing unit
RAM memory, to store data temporarily
Hard drives, semi-permanent storage medium
Input device, the media used to enter data to be processed by the CPU, such as mice, keyboards, and tablets
Output device, the media used to display the output of CPU processing, such as monitors and printers

2.Software
Operating Systems
Basic program on a computer that connects users with computer hardware. Commonly used operating systems are Linux, Windows, and Mac OS. Duties include operating systems (but not only) controls the execution of programs on it, coordination of input, output, processing, memory, and software installation.
The computer program
An additional application installed in accordance with the operating system
[Edit] Slot on the computer
ISA / PCI slot for additional input of non-graphics card
AGP / PCIe, an input slot for additional graphics card
IDE / SCSI / SATA, slots for hard drives / ODD
USB, media input slots for plug-and-play (plug and play, meaning the devices can be connected directly to your computer and can be used)
[Edit] Types of computers
Analog computer
Computer Pulse
Microcomputers
Home computer (home computer)
Personal computer (PC)
Servers
Mainframe computer
Supercomputer

Thursday, April 8, 2010

6 Steps to limit a program in Windows or your computer

For those of you who do not like the program or your file in the open or use another orng. This tutorial has the fragmentation that matches your needs are. Where, here you can perform a block (block) or prohibit access to any / some programs on a computer (of course your own computer).
Additionally, this tutorial can also work on Windows XP, Windows Vista or Windows 7. Here are his steps:
1st. Kik Windows + r or Run. In the column "run" is available type in "gpedit.msc" (without the quotes). Then press Enter to open Group Policy.
2. In the Group Policy window, open the User Configuration → Adiministrative Templates → System.
3. After that, look on the right side of the window, locate the item Run Windows Applications Allowed only and double click (double click) the item.
4th. On the Run only Allowed settings window of Windows Applications, select the option enabled (red arrows), then click the Show icon (colored blue arrows) that is right below it.
5. Finally, in the Show window contents enter the names of the executable file of the application will not be on the block (the block). For example: Excel.exe for Microsoft Excel, notepad.exe to Notepad, word.exe for Microsoft Word, and others.
The names of the executable file you can see the program files folder in Windows Explorer.
6. After all the names of the programs you do not want to block or can be accessed by your users have entered. Then click OK.
After all the above steps have been followed, it is time to try. Try to open the programs that were not included in the Show Window Contents. If the program is not running, then you have succeeded.
Good luck. . . . . . !

Source : id.shvoong.com

Google Voice Pilot VoIP Technology

Google Inc.., The possibility of trying to implement Google Voice applications to call or receive calls from outside through a computer at the beginning of next week.
The world's largest search engine company, in November last, Google invites Gizmo5, service provider Voice over Internet Protocol (VoIP), Skype competitor, making VoIP phone people-to-people, as call and receive calls with the normal tissue and cell phones.

Google never commented the possibility of their use Gizmo5 technology. Google has confirmed that they now have to build a computer application for Google Voice telephone. For the user perspective, this application will allow someone calling from his computer.

Gizmo5 fill some holes on the Google Voice products, be able to provide telephone service. Visitors must complete Google Voice Google Voice phone with the tools to contact or receive telephone.

Google is not sure when this application will be launched, but as followed from one of the sites, »possibility immediately. Earlier this week begin the application being tested internally. "

Source : id.news.yahoo.com