Wednesday, March 31, 2010

All programs on the computer makes it easy to uninstall Norton

Uninstall all products
Norton antivirus antivirus is one of several popular antivirus in addressing local virus outside nd. Obviously, a fairly powerful antivirus software requires the hardware specifications of more than ordinary standard in order to run the program properly and smoothly.
For computer users with computer specs are quite common, it must be the Norton antivirus has a fairly long process when executed. So also in the process of uninstalling it.
Norton Removal Tool helps users to remove some Norton software on your computer easily. Norton Removal running on Windows OS. Norton Removal is used if the user's computer will be to uninstall the Norton program using Windows ADD / Remove programs, but did not go well. This application can uninstall all Norton products 2003-2010, Norton 360, Norton SystemWork 12.0

Source : id.shvoong.com

Computer Networks

Computer network is a system comprising computers and device other network working together to achieve a same goal.

Criteria computer network is divided into 4, namely:

1. Based on the distribution of sources of information / data

- Network This network consists of a centralized computer where the client and the server that the client computer that serves as an intermediary to access sources of information / data derived from a single computer server

- Networking is a combination of several networks of distributed centrally, so there are several computer servers that are interconnected with the client to form a specific network system.


2. Based on the geographic reach is divided into:

- Network LAN is a computer network that connects 2 or more in coverage such as laboratories, offices, and in 1 cafe.

- Network MAN network is covering a large city and its local area. Examples of local telephone networks, cellular telephone systems, as well as some ISP's internet relay network.

- WAN Network A network with worldwide coverage. Examples of PT network. Telkom, PT. Indosat, as well as networks such as GSM Cellular Satelindo, Telkomsel, and many more.


3. Based on the roles and relationships of each computer in the process data.

- Network Client-Server In this network there are 1 or more server computers and client computers. Computers that will be a server computer or client computer must be altered through software on the network protocol. As an intermediary for the client computer can access data on a server computer and the server computer provides the information required by the client computer.

Networking-Peer-to-peer network does not exist at the client computer and server computer because all computers can do the delivery and reception of information so that all computers function as clients as well as a server.


4. Based on data transmission media

- Wired Network (Wired Network) In this network, to connect one computer to another computer network cables required. Function in the network cable to send information in the form of electrical signals between the network computer.

- Wireless Network (Wireless Network) is a network with the medium in the form of electromagnetic waves. On this network is not necessary cables to connect between computers because it uses electromagnetic waves to transmit signals between the computer information network.

Source : www.wikipedia.com

Tuesday, March 30, 2010

Computer ethics

Computer ethics is a set of principles or values related to computer use. Computer ethics derived from the syllable 2 ethics (Greek: ethos) is the customs or good habits in individuals, groups and communities and the computer (in English: to compute) is a tool used for calculating and processing data.
Computers Ethical Issues Around
The birth of computer ethics as a new discipline in the field of technology can not be separated from issues around the use of computers, including computer crime, netiquette, e-commerce, intellectual property infringement and professional responsibilities.

Computer Crime
Computer crime or computer crime is a crime arising from the use of computers illegally. Computer crimes continue to evolve with advances in computer technology today. Some types of computer crimes include Denial of Service (a service crippling computer systems), the spread of viruses, spam, carding (theft via the Internet) and other

History of Computer Ethics
Computers found by Howard Aiken in the year 1973 computer discovery in 1973 was a milestone in the birth of computer ethics that evolved to become a new discipline in the field of technology.

Source : www.wikipedia.com

E-mail sent from the Tomb of the Website

When are we going to die no one knows. It turned out that it prompted one Australian entrepreneur had a strange idea. He opened the website so someone can contact the people who loved from the grave and could apologize or just leave.
All of this comes from Peter Ingram, a retailer of security systems, saw a friend he had known for 20 years. He was a patient of a hospital that has a lifetime only two weeks. Aunt 100% aware of what is happening and be able to understand what was happening around him but unable to do anything about it until his death with a secret.
This is a load Peter Ingram launched the website a virtual machine the first time Australia. Website called FromBeyond2u.com. On this website you are given the opportunity for the living to be able to leave video, photos and documents to be sent to loved ones after death.
For one dollar per week, users can save "precious digital memories" and make a farewell message at the time of his death or critical dates such as birthdays or celebrations in the future.
Customers can write their own speeches and creating multimedia offerings for use in their own funeral, and the left image and video files they

Source : id.shvoong.com

Monday, March 29, 2010

Criminals prey on Vulnerable Children

Facebook is a social networking site was also attractive to children aged 8-12 years. Though vulnerable children fall prey to criminals who roam the Internet.

That's what is revealed from a survey of media supervisor, Ofcom. From the survey found that one in four 8-12 year olds have a profile on the social networking site, one of whom is on Facebook.

This fact certainly invite concern for vulnerable children fall prey to the criminals on the internet. Even more alarming, the parents claimed not to know that the baby they visited social networking sites, so they do not monitor the activities of their children in cyberspace.

"At the time raised concerns about the increased risk (exploitation) of the child, it was not there for increasing supervision of parents," Ofcom said.

According to Ofcom, as quoted from the Mirror detikINET, Monday (29/3/2010), one of seven children aged 8-15 years old so easy indulgence in their personal profile on the internet. This of course increases the risk of children become victims of predators.

"From the survey, which involved 2131 children, also revealed that 3 out of 10 children aged 12-15 years old have a computer in their bedroom," said Ofcom.

Moreover, Facebook is a trend now, have a friend on Facebook is pride.

So for those of you who have children aged 8-15 watch out.

Source : detik.com

Sunday, March 28, 2010

Speculation YouTube Attacked In China Denies Google

YouTube video sharing site can not be used about an hour. But Google, the owner of the site death YouTube says it's not because the intervention of outside parties.

"YouTube is still overcoming the technical issues yet to be resolved," said a Google spokesperson. "We know how important YouTube for many people and we apologize for any inconvenience death YouTube servers and services that happen."

Around At 07.00 - 08.00 local time, YouTube extinguished for an hour. A source said that YouTube is not the result of events of the attack or any movement associated with Google's move could stop the censor searches in China.

Over time extinction YouTube, Internet users can still access the individual videos, but YouTube's main page keep coming back to the message 'HTTP/1.1 Service Unavailable'. Sources claim that Google's basic policy can not discuss details of the cause of the extinction of these services.

The search engine giant was involved in a dispute with China since the communist state in January 2010, when Google claimed to target high-level attacks originating from China.

"I think a lot of people, and understandably suspicious of China's conduct technical measures to punish the Google," said Ron Deibert, Director of Public Laboratory at the University of Toronto. [Ito]

Source : www.inilah.com

Saturday, March 27, 2010

How to Be Safe Twitter

Twitter development in Indonesia was so fast. A report from ReadWriteWeb.com states that in early 2010 Twitter user Indonesia sixth largest in the world.

Twitter increased rapidly throughout the world. The increase was made Twitter as an easy target cyber criminals, "said Ema Linaker, Global Head of Online Engagement AVG, a computer security company, in a press release.

One type of threat is quite popular these days is a fake phishing site alias. Perpetrators usually rip off the victims account and use that account to send a private message or Direct Message (DM) to the follower of these accounts.

DM it will contain a link that will lead users to a fake site. After that, the theft of information and data began.

Linaker offers ten tips for Twitter users to always be safe:



* Limit your talk

Users often feel easy about the location and call their activities. Minor comments given in response over time can be used to determine the schedule and plan activities that users daily. Criminals ready to become the next victim.

* Be careful Open Link

Many people use a URL shortening service on Twitter, so it is often difficult to really know the site. AVG LinkScanner feature in AVG Antivirus can be used to check these links. But when the rising doubts in the liver, the links should not be opened.

* Watchful

Watch for suspicious activity on the timeline or inbox. When starting the messages suspicious or your friends start sending messages smell spam, you should check whether an account is broken peer or not.

* Think before Tweet

Tweet can be read by everyone even after deleted. Think carefully what you want to write.

* Do not Hurry Trust

You never know who your follower. Do not easily believe in and make friends with people who may have bad intentions.

* Check the Third Party Applications

There are hundreds of applications on Twitter. Before you use, make sure safety. Look for lots of applications discussed in the trusted sites. Remember that applications always ask for the key word and ID.

* Password Information

Use passwords and e-mail is different for each of your social networking account. That way, when you close the account,

You can easily delete the e-mail account.

* When Log in

Check your browser settings, make sure that the information is not recorded when you use the computer together.

* Beware of Phishing Attacks Against

Beware of attempts to obtain personal information through a tweet or DM.

* When Using Cell Phones

Be careful with cell phones and just anyone who can use it. If you have a Twitter application, make sure you always log out after use.

Source : tempo

Friday, March 26, 2010

Yahoo, Microsoft! and MySpace Staying in China

Rejection Google wish censorship policy in China does not influence the attitudes of Microsoft-including Bing search engine, Yahoo!, Or MySpace. They stuck with the states ready to follow the policy of the country's ginseng. "We respect other companies that take a different decision based on experience and their own perspective," said a Microsoft spokesman. "For more than 20 years we have been doing business in China and we are continuing our business there." Microsoft Company considers important official statement to the world, including Beijing. "We believe that all technology companies have committed to the public to help protect Internet users." Microsoft's response is a response to criticism of Google's Sergey Brin officials. She pointed to China's violation of freedom of speech and against human rights. Brin after closing the search engine in China and moved to Hong Kong expressed disappointment in the company's other technology companies. "I hope the bigger companies are not only interested in profits from it all. Generally, companies must pay attention to where and how their products are used." But not all behave like Microsoft, GoDaddy.com, peregister the world's largest Internet domain name, the congressional hearings on the Americans said they would pull out of China because of concerns with interference from the government and provasi. Company, which claimed 27,000 manage domain names China, said they asked the Chinese government to collect headshot photos, business license information and fill out the registration form from the user and sends it to the local government. "Intensification procedure appears ... based on Chinese government's desire to increase control over the domain registration subject by the Chinese government," executive vice president of GoDaddy, Christine Jones. "There is increased monitoring of the activities of the Chinese people on the internet."

Source : tempo

Rules of stifling China Giant Create Domain

Google seems to have become a martyr for Internet freedom struggle in China. After google retreat, a leading Internet domain company joined in boycotting the bamboo curtain country. Go Daddy Group (GoDaddy.com), go hot with the government imposed policy of China. Domain name registration company's largest American world is choosing to no longer offer the domain name ending in. China rules mention, anyone who registered domain.cn, must surrender of personal data and personal photos. Previously applicants were required to submit all the information themselves, but not until much detail as is the government of China today. Steps were taken to improve the government of China will control the site content content. Not only that, China is also threatening to "end" a history of the domain name owner. Cn if they do not want to give the information requested. GoDaddy itself has "maintain" as many as 40 million domain names under management. The company claims will continue to serve customers using the old domain. Cn, but to go to China ahead of this particular domain name will no longer offered. "We are concerned about security of each individual at the request of China's," said Christine Jones representing the Go Daddy Group. After Google and Go Daddy, who's next?

Source : detikcom

Thursday, March 25, 2010

Google Success Stories

With Google Map, people can know the location Brother, himself, where disaster and so on. Also, everyone was able to translate the various languages with google translate. Not to mention the google search engine famous quickly and accurately make millions of people in the world using google. Born from an accidental meeting of Larry Page and Sergey Brin at Stanford University. In January 1996 Larry and Sergey began collaborating in the making Search Enggine given name BackRub. 1998 Technology Search Enggine kept in perfect, they began looking for investors to develop the sophistication of their search engine technology. Thus, they get an injection of funds from Andy Bechtolsheim college friend and founder of Sun Microsystems. A check for 100 thousand U.S. dollars, which was unique in checks written on behalf of Google that even at that time had not established by Sergey and Larry. Larry and Sergey had previously been offered the possibility to Alta Vista, but was rejected on the grounds of Alta Vista parent company of Digital Equipment Corp. did not like depending on people from outside the company. Investors in Silicon Valley, Michael Moritz (Sequa Capital) and Jhon Doer (Kleiner Perkins), which could eventually compete convinced to inject capital worth 12.5 million U.S. dollars to the company Google that on December 7, 1998 was established. A room of their friend's garage was the first office in Menlo Park, California. In 1999, Google moved into offices at 165 University Ace Palo Alto California before finally moving to the Googleplex at the end of the year. Larry and Sergey continued to run the Google search engine until the year 2001. After that they recruited Eric E. Schdimt to become chairman and CEO of Google. Google has become the most influential companies on the Internet, including because they have mastered Blogger.com. Googleplex a workplace that is very convenient, because it provided facilities and complete infrastructure such as swimming pool, bar, billiards room, futsal, beach volleyball, free food, health drink for free, and abundant snacks. Moreover, a relaxed working atmosphere for Google employees are allowed to only wear a T-shirt and jeans, so if when we come to the Googleplex and saw someone wearing formal attire, jacket and so on, almost certainly he was Guest. One more interesting, Google implemented a system, employees are given 20% of their working time to be free to do what in her interest - within approximately 1 week day. So that the creativity of employees rose, and arose like google earth etc. eg. With so google is concentrated in Human Resources that they have. An article written by a journalist from Fortune, Freg Vogelstein, titled "Why Google scares Bill Gates" explains Google's rivalry with Microsoft conduction. This proves how great google now, so the giants like Microsoft are already aged over 25 years, implemented various strategies to compete with google. This looks real, with plans Yahoo.com acquisition by Microsoft recently, though eventually foundered. Beyond that, Google also perform philanthropic work (social) by setting up Google.org. The mission of the organization is to help the campaign about climate change, global warming, as well as health and global poverty. Director of Google.org is Dr. Larry Brilliant.

Source : id.shvoong.com

Come up with twitter Features Contributor

Last December, Twitter has been testing the new features, Contributor. The basis of this feature is to allow some people twit than one account with individual attributes brought twit.

Twitter noted this feature was not ready for prime time, but they started using the account @ twitter. This service has now started rolling on others.Micro-blogging Twitter is a company located in San Francisco. Established on March 21, 2006 with assets of U.S. $ 160 million. Twitter found Jack Dorsey, Biz Stone and Evan Williams.

Salesforce account, a company based in San Francisco, California which was established 13 April 1999 was, to apply this new feature since about an hour ago. The company is moving on Customer Relationship management.

Contributor considered as part of twitter's plan provides premium features for business. Although they seem to not apply. One could imagine them as a business tool ready to be marketed, it will enter into it.

Source : tempo

Wednesday, March 24, 2010

Webbuilder, Create your web with just a mouse!

You do not speak html, php, mysql, and language to create other web?There is always a way to make a web.This time I mean a website not WebBuilder software,so that the course will include a complete facility and very easy to use.With you can directly WebBuilder make web without any expertise and quality of design is not playing games, such as Amazon, eBay, or any websites that you think is good.WebBuilder owned facilities are:
1. Email with their own website domain name
2. Member website can create their own
3. Can sell the business to interact online with paypal, moneybooker, Credit Card and other payments
4. Amazing web design just by drag n drop
5. Arcade game to free member
6. Creating a chat with community members themselves
7. Controlling member in your website
8. Domain + hosting cheap about $ 20 per year
9. Interacting with Google AdWords, AdSense and other advertising facilities
10. Interact directly with the existing Search Engine
11. Analytic Traffic Facilities
12. Facilities consultation question and answer website marketing

Source : id.shvoong.com

8 How to optimize revenue from Youtube

Several ways:

1. Use Google Trends to compare the keywords will be accessible to people
2. Use Google Analyzer to compare specific categories that often sought after
3. Alexa.com Use in the Hot Wha'ts there is anything that is highly sought-after
4. Use Alexa.com and search for Audience of where & Youtube mostly in the months just how many people access to Youtube. You'll know in a particular season, most of them are often looking for movie trailers
5. Use Youtube itself, over time you will realize what the most wanted man.And explore the possibility Youtube because there are facilities that you do not know or have not familliar on your mind
6. If you have a website or blog, then after you determine what category you want you can upload the website summarize video showing you the quality
7. Give something unique in each of your videos so that people out there will get to know you and your video is uploaded
8. DO NOT upload videos that are not general / general can not be enjoyed, especially the smell of pornography. Since making the impression you are a community that may be different from most people and sooner or later you will be banned by Youtube

Source : id.shvoong.com




Source :

Tuesday, March 23, 2010

Google In China In Hong Kong Telecommunications Access

Google.cn access path diverted through the site in Hong Kong, Google.hk. The transfer was announced simultaneously with the closing of operations google.cn after Google and the Chinese government has failed to find the meeting point of the sensor results.

Google announced the transfer of the service lane. »The last few days we stopped sesor of results-search service Google Search, Google News, and Google Images-on Google.cn. User Google.cn now diverted its course to Google.com.hk, where we offer tersensor not result in the Chinese language, specifically designed for users in mainland China and shipped through our servers in Hong Kong. "

»We want all people have access to our services, including its use in mainland China, after the Chinese government refused to repeal remains sensors."

Google first announced to revoke its operations in China in January. They write will not censoring search results as the provisions of the Chinese government, which then occurs with a variety of cyber attacks target human rights activists

Source : id.news.yahoo.com

Monday, March 22, 2010

Update BitDefender can Damage Windows

Last weekend, some antivirus software BitDefender users flooded the company's technical support forums. Apparently, the failed update antivirus has made computer-based 64-bit Windows to stop working. This problem is directly handled by BitDefender. "In connection with the last update, it is possible to detect some files BitDefender's BitDefender infected Windows and contains Trojan.FakeAlert.5," a company spokesman said in his statement, March 22, 2010. This notification comes after the software user to write hundreds of posts on that topic in the forum BitDefender. Some of them can not be reported to reboot their computers. "Any files that will work immediately quarantined," said the user that lhmathys nick. "Windows Explorer and even updates itself BitDefender quarantined," he said. "We're in big trouble now," said another user with the nick ufitec. "We have 150 business clients and most of their PCs using BitDefender and thought everything adalh virus and would not boot anymore," he said. In the description that was launched, BitDefender claims to have fix this problem and gives instructions on how to repair the damage. Users are also asked to delete the files in the quarantine list and then restart. Users who are not able to do that was shown using the facility's Windows Last Known Good Configuration or System Restore. Previously, BitDefender also recommend the user to wait for the latest definition updates that can resolve the issue.

Source : teknologi.vivanews.com

Internet Threatens Wildlife Life

Internet threat to wildlife in the world. Illegal hunting of animals that have protected more frenzied because of the illegal trading of protected animals in cyberspace."The Internet has a very broad impact, a baby lion can easily be traded on the Internet," said Paul Tood, Campaign Manager of the International Fund for Animal Welfare (IFAW) in the Convention on International Trade in Endangered Species (CITES) in Doha Qatar.Products from wild animals sold as well as many elephant tusks, and bones of tigers and even a baby lionThe Convention was attended by 175 representatives urged the country's wildlife trade on the internet stopped. Sites that offer the sale of animals should be blocked."Internet has become a dominant factor in the sale of protected species, a time will come a time when a country will export animals in large numbers in other countries," said Todd.IFAW own Tood information has been conducting a survey, sales of animals are often occurs through auction sites, chat rooms, and even advertising on the site. Thus was launched the Straits Times, Monday (22/3/2010).The countries listed on the site sold animals, among others, Australia, United States, Russia and China. Animals will be supplied from the African continent.

Source : okezone.com

Sunday, March 21, 2010

Internet Interkoloni

As a tool to facilitate human activity internet usage is increasing even for the purposes of the Internet has become berbelanjapun a practical option and very helpful. However, as the popularity of the internet does not mean there are no problems in use, even sometimes make us feel not practical to do the activity in question. Irony indeed, where original destination Internet can facilitate the activity of shopping, but it is not.One of the causes that make the internet seemed useless to us is the lack teraturan traffic flow on the server so that it can be reached - there was a sudden buildup that will burden the server. This is what will make the Internet is not useful to us.Later, scientists from Oxford and The Georgia Institute of Technology are working together to solve this problem. And do you know that that inspired them in solving these problems is of a flock of bees that live in colonies. This gives us the inspiration to learn more observant of nature, because it is not impossible that the sepel of natural events could be a solution for human life.

Source : id.shvoong.com

Google for Mobile

Get the fastest search experience by downloading the Google applications to your phone, and get the fastest search experience with features like this:download aja di http://www.ziddu.com/download/9077079/googleformobile.txt.htmlUniversal search. Searching the web, images, maps, local business, video, and more.Search by sound. Talk to your question in the U.S., UK, or Australian English accent.My Location. Avoid typing your current location while searching for nearby businesses (eg "pizza" or "starbucks").Google Suggest. Select the suggested queries, nearby businesses, and web sites that appear as you type

Source : id.shvoong.com

Saturday, March 20, 2010

Tips to make a laptop as a hotspot area

Laptop with windows 7 operating system could build hotspot networks only with Internet connection and your laptop.
That way, your laptop is only connected to the Internet (ethernet connection / cable internet) and your friends can join others to enjoy Internet access through hotspot network that you create. The point is .. you will turn your laptop into a wireless access point and laptop so your friends can surf the other if you join the network:)
interested? I give the following steps:
1. Download and Install the Connectify http://www.connectify.me/download/index.html
2. Open connectify from an existing icon in the taskbar
3. Fill in the name of WiFi networks, access passwords, then specify the type of connection you want to use to share (LAN support, VirtualBox Host Only, Wireless Network, and without internet sharing). After that click start hotspot.
Fill up your hotspot name
4. After that the program will work and please connect your computer / laptop the other to your laptop.
NB: Please note that connectify can only be installed and working on my laptop with windows 7 operating system, but the computer with any operating system can be connected to the network. For example, we connect a laptop windows XP operating sistem the hotspot network built with laptop connectify in bersistem windows 7:
1. open wireless network
2. Select the network that have been made earlier
3. enter your password and click connect
4. sistem laptop operating Windows XP is connected to a hotspot network created by a laptop with connectify windows 7.
And all my friends laptop you can connect and you can begin to surf with friends from only 1 cable internet connection only: p, it's easy is not it?? :)

Source : id.shvoong.com

Friday, March 19, 2010

Adding tips internet connection speed with Modem / HP CDM / GSM

1. Run > and ketik gpedit.msc ( anda akan masuk ke kolom Group Policy )" style="BACKGROUND-COLOR: #fff" closure_hashCode_lnxwud="328">Start> Run> and type gpedit.msc (you will enter the column Group Policy)2. Administrative Templates > Network > QoS Packet Scheduler" style="BACKGROUND-COLOR: #fff" closure_hashCode_lnxwud="330">Look at Computer Configuration> Administrative Templates> Network> QoS Packet Scheduler3. pilik on Limit Reservable Bandwidth and check the box enabled4. and fox Bandwidth limit% to 0%Both1. Run > regedit" closure_hashCode_lnxwud="337">Click Start> Run> regedit2. HKEY_LOCAL_MACHINE > SYSTEM > CurrentControlSet > Services > Ndiswan > Parameters > ketik New Key lalu ketik Protocols > Enter" style="BACKGROUND-COLOR: #fff" closure_hashCode_lnxwud="339">Click> HKEY_LOCAL_MACHINE> SYSTEM> CurrentControlSet> Services> Ndiswan> Parameters> type New Key and type Protocols> Enter3. Select the Protocols right click select New + Key. Then type 0 (NOL). Enter.4. Click the subkey "0", right click select New + DWORD Value.5. Type Value Name: PPPProtocolType. Enter the contents of the Value data: 21 (hex)6. Type Value Name: ProtocolType. Enter the contents of the Value data: 800 (hex)7. Type Value Name: ProtocolMTU. Enter the contents of the Value data: 514 (dec)8. Restart the PC, and feel the difference. Selamt try.

Source : id.shvoong.com

There are 20 sites trusted to start an online business without blogs & web

1. Paid To Upload Video" style="BACKGROUND-COLOR: #fff" closure_hashCode_3hvs5n="278">Youtube.com -> Paid To Upload Videos2. Paid To Upload File" style="BACKGROUND-COLOR: #fff" closure_hashCode_3hvs5n="280">Ziddu.com -> Paid To Upload File3. Online Marketing & Selling" style="BACKGROUND-COLOR: #fff" closure_hashCode_3hvs5n="282">Amazon.com -> Online Marketing & Selling4. Social Networking" style="BACKGROUND-COLOR: #fff" closure_hashCode_3hvs5n="284">PeopleString.com -> Social Networking5. Online Selling" closure_hashCode_3hvs5n="286">ebay.com -> Online Selling6. Paid To Upload Video" style="BACKGROUND-COLOR: #fff" closure_hashCode_3hvs5n="288">Metacafe.com -> Paid To Upload Videos7. Social Networking" style="BACKGROUND-COLOR: #fff" closure_hashCode_3hvs5n="290">Yuwie.com -> Social Networking Forex" style="BACKGROUND-COLOR: #fff" closure_hashCode_3hvs5n="291">8 Marketiva.com -> Forex9. PTC" closure_hashCode_3hvs5n="293">Neobux.com -> PTC10. HYIP" closure_hashCode_3hvs5n="295">Verifield.com -> HYIP11. Paid To Take Survey" closure_hashCode_3hvs5n="297">SurveyHead.com -> Paid To Take Survey12. People Search Engine" closure_hashCode_3hvs5n="299">AcmePeopleSearch.com -> People Search Engine13. Paid To Share Links" closure_hashCode_3hvs5n="301">Linkbucks.com -> Paid to Share Links14. Paid To Write" closure_hashCode_3hvs5n="303">Shvoong.com -> Paid To Write15. Paid To Answer Question" closure_hashCode_3hvs5n="305">Answer.com -> Paid To Answer Question16. Paid To Discuss & Review" closure_hashCode_3hvs5n="307">Mylot.com -> Paid To Discuss & Review17. Paid To Take Review" style="BACKGROUND-COLOR: #ebeff9" closure_hashCode_3hvs5n="309">Ciao.co.uk -> Paid To Take Review18. Paid To Do Small Task" style="BACKGROUND-COLOR: #fff" closure_hashCode_3hvs5n="311">Microworkers.com -> Paid To Do Small Task19. Paid To Do Small Task" style="BACKGROUND-COLOR: #fff" closure_hashCode_3hvs5n="313">MyEasyTask.com -> Paid To Do Small Task20. Paid To Upload Picture" closure_hashCode_3hvs5n="315">Shareapic.com -> Paid To Upload a Picture

Tips to keep long-lasting laptop batteries

1. Do not use charger vain. If at any time the laptop charger is broken, do not use the charger is not compatible with our laptops. 2. Do not assume notebook Use notebook with the way the lap can clog the fan vents that laptops and laptop batteries become hot quickly. 3. Always check the battery clean. Clean is always in contact dust battery or metal2 there, not until there is a paper clip or other metals can connect these boxes. 4. Do not use the notebook on a carpet or sofa or other soft place. If you want to use the notebook in place of the above, use a hard pad. Because if not .. then the laptop will experience overheating due to blockage of vents by
the carpet. 5. Avoid shocks, pressure or any heavy impact on the battery or the laptop. 6. Do not put the laptop in a hot place, like the sun etc under. 7. Do not use the laptop in place that is too damp or wet. It is feared that the water can damage the battery and laptop circuits us. We always keep the laptop from the water or excessive heat. 9. Do not be too long to fill the battery. Make sure you disconnect your charger if the battery is full. 10. read the manual book carefully. Some brands of laptops have special rules regarding their products. Read the manual book your laptop and make sure we use it as a guideline

Source : pusatgratis.com

Apple iPad Negotiate Content

About two weeks before marketing in the United States, Apple Inc., still trying to secure media content for the iPad. The company is still looking for companies who will be encouraged to work together to fill the TV programs, digital newspapers and other content. The Wallstreet Journal source said the company's largest smart phone manufacturer in the United States is eager to add some features in the iPad. Since iPad can be ordered on Friday last week, Apple has inundated thousands of units of order in just a few hours. Even iPad sales in the first three months of sales is expected to beat iPone. The desire to add a variety of TV programs, digital newspapers and various other content with a narrow time Apple will make it difficult to find potential collaborators. Apple is still negotiating with media companies to cut prices on a TV show which can be downloaded iPad owners. Apple also hopes to work with newspapers, magazines and textbook publishers to obtain the contents of digital content. At the end of the discussion, Apple and Chief Executive Steve Jobs found the complexities in making multimedia connections
tool been pressing the company to complete the launch of the iPad. At the launch in January earlier this tablet, Jobs has a product called "magical and revoluasional" that makes people can play games, surf the Internet, view videos, and read books and newspapers on display color touch screen 9.7-inch size. Apple TV can still enter the iPad, because a number of media companies are interested. Apple also lowered the price of the TV show 99 cents from $ 1.99 and U.S. $ 2.99 when downloaded from the iTunes store. But Apple has not reached an agreement with a number of TV producers to cut prices. As the producers worried that this will interfere with the trimming busnis them, including their obligations bring ten billion dollars to the cost of cable companies and satellite networks. Apple considers the price decline could increase the market iTune.

Source : id.news.yahoo.com

BE CAREFUL IN YOUR INTERNET IDENTITY

You often trade on the internet? Or maybe you often write yourself complete data on social networking sites? Be careful, because someday you might have a problem "indentity theft" or phishing.The impact of identity theft in the intenet can cause problems for you. These problems can be one of the following things:You unexpectedly large bill from a credit card, but you can never have a credit card meant.You get a credit card bill when you do not have to shop using credit cards.Without your awareness, your bank account was saved for years was suddenly gone. And you rarely or never make a withdrawal.Unexpectedly, you get a warning letter to immediately pay the loan installments in one of the banks. And you never apply for credit at the bank.Your shopping transaction via e-banking, but the item you ordered never received the goods in question.That was a case of victims of Phishing or Identity Theft.What is phishing? Pishing is an illegal act committed person to obtain important information such as passwords (password) or other information from the credit card. Way, the perpetrator acted pishing or disguised as a person or business entity that is well known and trusted community. For example as banks, online retailers and credit card companies famous. The perpetrator the victim to hand over control of valuable information and secrets that the perpetrators desired.Then, what is meant by identity theft? Identity theft is the action taken by a person to know or unauthorized use of personal identity to others.To get the data or information yourself, the perpetrator of this crime through several ways.First, retrieve data from the companies that store your data, such as banks, insurance companies, property and so on.Pretending to be officers of a company or office, such as tax offices, the survey banking, insurance personnel and others.Searching in the garbage documents is not in use, especially around banks, companies, government offices and others.By phone or SMS with fake lottery informing that you are the winner of a lottery.Electronic transactions through e-commerce on the Internet for booking of goods or services.To avoid fraud virtual (cyber fraud), there are several ways that recommended by the Ministry of Communications and Informatics RI namely:Protect your secret code number, or PIN, and be sure to memorize all of your PINWhen traveling, try not carry bank cards.Do not carelessly dispose of garbage that contains data or your personal documents.Beware of SMS or a phone that is not clear.Protecting data is important data on the internet you (especially on social networking sites such as Facebook).Immediately reported to the authorities if found unusual transactions.Be careful with people around when using a PIN.Do not use Warnet to make transactions online.Photo copies of all your data and keep good.When you have to travel, check your bank balance.If you find that you have become victims of Cyber Fraud, what should you do? If this happens, do the following actions:immediately write down your correspondence and report it to the police;if the police could not take action against the perpetrators of identity theft, use your file to the police report it as one tool to deal with the creditors (banks, insurance companies, telecommunications companies or others) as evidence that you have been victimized Cyber Fraud. Make a report for your records;immediately contact customer service, security, or the fraud of their creditors and continue with a letter;immediately close your account that have been subject to fraud and open a new account.contact the post office and reported that if there are perpetrators of identity theft to take your letter to get a new credit card, credit card bills and bank charges, credit card offers or tax information, or if the perpetrator abusing an address change form.

Source : id.shvoong.com

Thursday, March 18, 2010

the steps to register Domain

Steps to Success Domain Name Registration Category: Online Basics, Choosing A Domain Name Domain name web address that tells visitors where to find your online business. But did you know that domain name is also one of the most powerful tools used to build a successful online business? 1. Alternative Domain Name Extensions register Choosing a memorable, relevant domain names is only the beginning. In order for your domain name to actually work for your business, it will need to help you attract visitors and search engines are equally while also supporting your brand. Network Solutions Domain Name Scorecard is a quiz designed to help you determine how well you are performing a domain name - and help you find a way to fix it. This quick, informative quiz addresses six key areas of domain name registration, including: 2. Registering Domain Names to Protect Your Brand Why stop at registering a domain name like janesbagels.com when registering several extensions - such as janesbagels.net and janesbagels.org - can help you capture a wider audience? When visitors arrive at the alternative domain extension, you can direct them to your website. 3. Descriptive register Domain Name Visitors can janesbagels.com intend to visit, but the kind of mistake instead jansbagels.com. In anticipation of this typing errors and to register them as domain name, you can catch the visitors before they were misled by competitors who may use the same strategy to lure visitors to their own sites. Registering domain names that describe the products and / or other services that help domain name strategy. In janesbagels.com example, relevant descriptive domain may include references to breakfast or catering. Adding a geographic element, such as the name of the city, is also a good way for local businesses to capture the visitors in their immediate area. 4. Extending Your Domain Registration Requirement While many people renew the domain name registration each year, it is possible to renew the long term. This option, along with the automatic update service, can help you avoid losing your domain name because of forgetfulness. In addition, search engines can see the long-term positive commitment domain names when indexing your site. 5. Selection Private Domain Registration In today's world, private domain registration is more a necessity than a luxury. Yet many continue to ignore this critical component of domain name registration. For a small monthly fee, private domain registration can keep your personal contact information from WHOIS database, which is available to the public through a simple domain search. 6. Securing Your Domain Name Registration By locking your domain name, you protect it from the unauthorized activity and human error - your own. If your domain is locked, the third party can not transfer your domain name to another registrar without your consent. Domain locking also prevents you from making accidental changes to your domain name server, which can interfere with your website and business email. Only in 30 seconds, Network Solutions' Domain Name Scorecard quiz can give the overall value of your domain name-based rating in six main areas. You can then use this information to unlock your domain name full potential as a business building tool

Source : id.shvoong.com

Internet Crimes

Female Internet users more than 40 percent (2009 data). Content on the Internet, too many to meet the needs of women. Finally, the target of the attackers were also women. Dewi and his partner, Rika (not her real name), are two of the many victims of Internet crime that dare to reveal the case is going through. They disseminate case information to other colleagues, or reported to the police. To Compass Female, Goddess told, his Facebook account burglarized the first person to break their email account. Perpetrator is a familiar friend, so easy to break down access email accounts. "Perpetrator break Facebook account with spreading slander and reply to comments, and even disrupt the activities I have already promoted through Facebook," said Goddess who is a manager of event organizer and social networker. Work activity that relies on social networking makes Goddess feel harmed by identity theft, and slander that was distributed on him. Others again with the case Rica. Yahoo email account! Was burglarized and used actors to ask for money to a number of relationships Rica. Perpetrators making excuses as to the cost of hospital treatment of children, and the like. She has reported the case to the police and decided to make a new account. Friendship in social networks or virtual world into an asset for internet users. Assets in the form of identity information that is the target of the perpetrator in carrying out its action. In addition to fraud, defamation, abolition friends list, and extortion, internet crimes targeting this identity with the economic pattern of illegal activity and high value. Muhammad Salahuddien, Vice Chairman of the Internet security institutions Id-SIRTII, said the attacker identity theft mode leads to large-scale crimes. This action commonly known as the underground economy. "Even a former Soviet country, Estonia, crippled with a cyberattack (technology crimes in this case the Internet, RED) in 2007. Attacker will always find a gap of weakness and carelessness system users," explained the man who always addressed this Didin. Carelessness about users, Internet users Didin suggested to be more precise, such as: Check back information received Always make time to check back, double check, even triple check, the entry of suspicious emails. Do not easily accept the invitation of friendship Friendship request on Facebook could come from anyone. Check back if there are friends whom you met at the friend's list. Ask your friends back to those who Invitor. If no one knew him forget it. Filter friends Do not be easily deceived by a friend's profile. Pretty or handsome face not be guaranteed. So fed up with the chat, when your identity is discovered. Beware applications The application is offered to you could be a trap, especially if it asks you enter the email to operate. Differentiate email account with a username Never use the same email account for social networking. Also do not ever put your email on the information themselves on social networking account.

Source : id.shvoong.com

Thanks to the Mafia arrested Kakap Facebook

The police successfully trace the existence of one of the most hunted Mafia in Italythanks to the tracking via Facebook. How Facebook's role in this?Is Pasquale Manfredi, snapper class fugitive convicted of killing action and trafficking drugs.Unfortunate for him, quoted from the BBC, Thursday (18/3/2010), he was eventually pinned on the roof of an apartment while trying to escape.Apparently, the success of the Italian police catch mafia in the 33 years that did not escape from their control of Facebook's popular account Manfredi.In the networking site calling itself Scarface Manfredi. Police were tracking the movement of Scarface via contacts Facebooknya that he finally was arrested.Success stories of police in arresting fugitives through tracking of Facebook is not the first.previous, in Pennsylvania, a robber was arrested after he was updating the Facebook status from within the victim's home.While in England, the authorities also successfully apprehended a fugitive because he took advantage Facebook to ridicule the police.


Source : www.detikinet.com

Prepare Microsoft Xbox 360 Slim?

Console output Microsoft - Xbox 360 - would likely redesigned. No longer want to fat-looking, Xbox 360 rumored to be ready made thinner aka slim.This news was blowing hard after the release of photographs of the inside of a console on the internet. Well, that device is allegedly redesign of the Xbox 360.According to one observer called Luke Plunkett games, console architecture that combines the CPU and GPU into one chip. As a result, be more streamlined shape than the previous version."This is not a series of simple hardware architecture. But it is said to be a total re-design of a console. Like Slim PS3 and Xbox 360 possible," he said, quoted from Tg Daily, Thursday (18/3/2010).Only, Plunkett was reluctant to speculate because it is still limited to images and data. No official statement from Microsoft as the console manufacturer."The project will come on Christmas this year, and changes in the Xbox 360 will be aligned with the cuts and the reduction of costs," he added

Source : detikINET

Samsung Prepare Competitor iPad

Samsung prepares electronic device competitor Apple product, iPad this year. Lack of processing power and not enough connection options will be used as sales materials in competition with iPad.»I feel this type of whiteboard has the advantage of flesibilitasnya, such as Atom basic products," said Director of Ericsson Australia IT Division Philip Newton in the Samsung Forum in Singapore. »It is more potential than iPad."This product aims to build a tool powerful enough to become the main engine for people thinking. Chip ARM chip as iPad force was not strong enough votes to make the tablets look different factors. Samsung did not mention going to use force or Atom chip Moorestown System. Thin devices can be used to display a PowerPoint presentation.Samsung is no stranger to the product of smart phones and laptops. This company has made Q1 ultra-mobile PC in 2006. Samsung considers tablet device will be more desirable in the future.

Source : tempo

Wednesday, March 17, 2010

The things most hated Internet Users

What are the things that are considered annoying by Internet users when browsing a commercial website? Check out the results of the survey Taylor Nelson Sofres of 2500 Internet users today in the United States. More than a third of respondents stated interfere with the pop-up ads, which suddenly appear when they open a site. Various kinds of the most hated things on the Internet as quoted by eMarketer. 1. Ads Pop-up (34.9%) 2. Obligation registration or login to view the website (16.7%) 3. The requirement to install the software in addition to seeing the website (15.7%) 4. Delay the appearance of web pages (9.1%) 5. Link dead, can not be accessed (4.7%) 6. Navigation is confusing (4.1%) 7. The information is not updated (3.1%) 8. There was no contact information, only the web form (2.6%) 9. Music is automatically reads (2.0%) 10. Browsers can not click "back" (1,7%) 11. Shops search is not effective (1.6%) 12. Flash or animated excessive (1.5%) 13. The text moves (0.9%) 14. Opening new window for links (0.9%) 15. Display the bad (0.3%) If the website unfortunately disturbing, the responses of Internet users is very clear: they will not come back, they will cancel the registration.

Source : id.shvoong.com

Tuesday, March 16, 2010

Cherry picking fruit from your computer

Childhood time in the countryside, it must be intimate with a procession of pick-pick fruit. Usually in yard village houses, grow several kinds of fruit trees. If the fruit season arrives, is very exciting to pick fruit itself.Introducing the world of plants to the children to tell about the origin of the fruit they ate. Is a pattern of education that needs to be introduced early on. Because, for many children today, especially for those living in urban areas to know the fruit only from various supermarkets, such as Hero, Tip Top, Carefour, Circle K, etc..Well, in this modern era, it was not difficult for you to know the fruit, even fruit is never exhausted and increasingly vitamins. Cherry USB Flash Drive is the storage form of shaped like a flash with Cherry Fruit. Flash drive has a capacity of 4 GB, is equipped with Hot Plug and Play, Durable solid rubber casing and supports a variety of computer systems, like Windows 7, Vista, XP, 2000 and Mac OS. Its size was not very big, only for 52 x 9 x 42mm and weighs 11g. If you want to buy, said prices range from Cherry fruit basket, which is $ 17.

Source : id.shvoong.com

Facebook and Twitter'Terancam 'in Venezuela

Jakarta - President of Venezuela, Hugo Chavez, made a statement implying will block Internet sites, including Facebook and Twitter, in the country. What is a fault?Facebook and Twitter are very popular in Venezuela. Both are often used to organize protests against the government.Quoted by Reuters on Tuesday (16/3/2010), Chavez complained that such sites are often used to spread rumors unclear."Internet can not always reliable. Each country must adopt rules and norms on their own," he said Chavez.Why is Chavez 'sudden' freedom internet talk? This is apparently triggered by a local website to write a rumor about the death of one of his ministers.Site supposedly named Noticierodigital could preach the murder of minister Diosadi Cabello. "We must act. It is a criminal act and can not be left like that," said Chavez angrily.

iPad Garnish 11.43 rust Diamond

until April, but the following companies seem eager to present something different and the 'glowing' for those who are waiting for this Apple tablet output.Mervis Diamond Importers is a company engaged in the field of jewelry that succeeded in realizing a diamond iPad is claimed to be the first in the next world.Mervis Diamond iPad show 11.43-carat diamond that has a grade (level) G / H in color and business affairs VS2/SI1 for clarity. The design itself is made up of classical and a bit vintage but do not leave the impression of high-technya.But those who have preyed on this product seems to still have to be patient because he was going to be marketed in Juni.Sold a limited basis.Then how much? Quoted from Luxist, Monday (15/3/2010), this diamond-studded iPad can have a price of U $ S 19,999 at the official site Mervis.

Source : www.detikinet.com

Monday, March 15, 2010

Caring Tips Notebook

Notebook is one of the electronic goods that are not easily damaged fragile. Agar Notebooks need to be treated regularly and continuously. Here are tips on caring for the notebook:1. Opening and closing the notebook properly. Open the lid by holding the notebook from the center, not from the side. In order to keep the hinge noteboot preserved.2. Check your notebook hinge on a regular basis. If you are a bit stiff, or sound then you should take it to the service center. Because the hinges are left stiff / stuck, will damage the body notebooks.3. Notebook not used (in the off state) should not be attached to the adapter. Keep up to charge the battery for 2-4 hours while your notebook is not used.4. Do not put the notebook on a pillow or other soft objects. Avoid carpet pads hairy or dusty easily. The reason, keep air circulation remained stable notebook. Should be placed on the flat board, tables, and other flat base that does not interfere with air circulation.5. Notebook screen should not be depressed. Because it will make the screen break. Avoid putting anything on the lid of the notebook.6. Do not clean the notebook with a liquid cleaner. Yes, there are several types of notebooks that should not be cleaned in vain. Each ordinary notebook is equipped with cleaning cloth.

Source : id.shvoong.com

Google Buying Online Photo Editing Sites For Chrome OS

Google is increasingly flying with wings expand Internet business. This time the search engine giant back into action by announcing that it had bought Picnik.com, an online photo editing website that is integrated with several services such as Picasa and Flickr. Not mentioned in detail how Google's range of funds for bringing Picnik remove under Google. So do not sound at all about how the changes will Google do in Picnik in the near future. Could be the Google may be integrated with Picasa immediately. "Currently, we are very pleased to announce that Google has mastered Picnik, one of the first photo editing website that will use cloud computing. By using Picnik, you can make photo cropping, editing and special effects to your photos without ever leaving your favorite browser. "Explained Brian Ax, product management director of Google's enterprise. "We are not a significant change Picnik announced today, although we will work hard to integrate new features. And also, we want to continue to support all existing partners Picnik, so users will continue to add their photos from other photo-sharing site, make edits, save and share pictures of colleagues. "Brian said. Both Google and Picnik stated that there would not be any changes to the site for now and more importantly, that Picnik will remain available to all current partners, but they do not make any guarantees. This is a big problem for Flickr, Picnik is where the major editing applications and integrated services both pretty good. Picnik also has long available in Yahoo Mail. This seems to be more stringent fuel competition between Yahoo and Google later. Picasa is one of several web services that rely heavily on desktop applications to handle the management, editing and uploading photos of mass. With Picnik, users can perform basic editing online, so there is little need for desktop applications. Considering that Google Chrome the OS will just be stuck in your browser, this is the appropriate action to make the Google party editing tool later.

Sunday, March 14, 2010

iPad Bestsellers

Apple orders flooded so pre-orders for the iPad was opened to the public. According to analysts monitoring, this tablet computer reportedly sold tens of thousands of units ordered in just a few hours.Castroll Victor, an analyst with Valcent Financial Group noted, in just 2.5 hours of pre-orders opened iPad has earned more than 74 thousand orders."iPad already booked 51 thousand units in just two hoursPre-order yourself a new iPad opened by Apple today, time 5:30 AM San Francisco, USA. Unfortunately pre-order only applies to some countries in Europe and America. It was only a model with features iPad Wifi are available.Meanwhile, 3G version of the iPad, a new digelontorkan in April. On price, the iPad with Wifi 16 GB valued U.S. $ 499, 32 GB U.S. $ 599, and 64 GB for the price of U.S. $ 699. But certainly, the price will be more expensive as the entry into Indonesia.For the Indonesian market, the gadget that has 9.7-inch wide screen is not expected to enter the fastest-April 2010 later. Reportedly, but can be purchased at the Apple retail stores, this device will dibundling by Indosat Mega Media (IM2).

Source : detik.com

Saturday, March 13, 2010

United Nations trailer Microsoft and Google

United Nations cooperation with a number of computer giant companies, including Microsoft and Google, in the fight against terrorism through the internet.According to the Media Center in New York, Monday (22 / 2), the cooperation will primarily try to uncover who carried out the workings of the terrorists, including members of terrorist recruitment problems, the implementation of crime, and the efforts they do to raise funds.Currently the UN Working Group on Treatment of the Use of Internet for the purpose of terrorism (CTITF) is in talks with Cisco, Symantec, and other companies in Seattle, United States, to discuss technical issues."There are high levels of crime related to the Internet and we need to embrace the private sector, an important partner in making steps forward," said one of the working group's chairman, Richard Barrett, as quoted by the Media Center.Meeting in Seattle which will last until Tuesday (23 / 2) was done after a similar meeting in Berlin, Germany, on a month ago.We met in Berlin, participants are assessing the current law is regarding direct attacks against the network and computer systems.According to Barrett, has not agreed or the most appropriate definition of the right of "terrorism", is still a special difficulty in a discussion of the legal framework should be established to prevent or limit the movement of terrorists in using the Internet.Barrett argues, it also invites limitation concerns about the possibility of violations of freedom of speech and human rights.Head of Task Force CTITF, Jean-Paul Laborde, currently the UN is the only international organization which studies the link between the Internet and terrorism.

Source : www.gatra.com

Domestic robot would Created More Lean

Researchers from the University of Tokyo have created a humanoid robot. This time he was able to staying any house cleaning jobs, like domestic serviceWith a body built like a man, complete with a mechanical skeleton, muscles and tendons, as well as the existence of false spine, he was able to walk gracefully like a human.Maker robot team led by Professor Nakanishi was named "Kojiro".Nakanishi future he hopes to make Kojiro in lighter weight and flexible so that more agile for business cleaning up the house.It is considering, although the robot is quite capable, but the slower movements. And one thing that will cause problems concern is about the weight.With heavycarrying , Kojiro feared could hurt people or objects around them.Kojiro, but equipped with a system that contains about 100 muscle tendon, he was also given a sensor to track movement and also an accelerometer and two gyroscope to help stay balanced.So far, the experts try to move Kojiro using game controllers. But for the future, as quoted from DailyMail, Wednesday (10/3/2010), the team had planned to create a computer algorithm for complex movements.

Source : www.detik.com

Google Add Features Bike Path Map

California: For your bike vehicle users, now do not have to worry anymore for the special track bike. The reason, the company's largest search site in the world, Google, continue to add facilities to facilitate the needs of its users, not just pieces of bicycle users, to add map features points of this environment-friendly vehicles with the latest online mapping option.Directions the new bike path will be available in the mapping system "Google Maps", starting from Wednesday (10 / 3). In the last six months, Google concentrated on mapping service that can recommend a bike route starting from the big hills to the crowded streets.Completing the previous directions have been available to motorists and pedestrians, bike path directions will be available initially for the bike path in the United States. Google's latest feature can be used in the existing bicycle lanes on more than 150 cities.Google's mapping service is the most popular service in the U.S., with more than 55 million people become loyal visitors of this website in February, according to comScore, a market research firm.

Source : Liputan6.com

Friday, March 12, 2010

Porn Site Beat Microsoft, handful of U.S. $ 3075 per-Second

JAKARTA - MI: smelling sites pornography sought by around 28,258 people per second. In fact, based on research that was launched by TopTenReviews, every second, sucking porn site more than U.S. $ 3075.64.Indonesia turned out to be one of the country who likes to porn sites. Recorded major cities, namely, Semarang, Yogyakarta, Medan, Surabaya, Jakarta, and Bandung became the center of concentration of Internet users who liked a pornography site. When Internet users type in keywords sex in the Google search engine, it certainly would appear 662 million sites, 568,981 videos, 157 million images, and 111,057,569 blogs. The data indicate that the pornography industry is not a nut industry. In fact, the total income of technology companies, like Microsoft, Google, Amazon, eBay, Yahoo, and Apple can not compete with pornography business revenue reached U.S. $ 97 billion.

Income is so great that indicates the velocity of money is very large. So, not strange if the pornography industry is believed to be the most profitable online industries.

Source : www.mediaindonesia.com

Deaf Patients Can Now Enjoy YouTube

SAN FRANCISCO. To be content accessible to deaf users on the Internet, Youtube will develop a feature that auto-captions such subtitle (translation).

"Today, we launched firtur auto-captions for all Youtube users," said Hiroto Tokusei, YouTube Product Manager in the official blog of the website, yesterday.

So far, auto-captions are only in English-language videos, Tokusei said. However, YouTube plans to expand it to feature 50 different languages in the coming months.

Youtube started to develop auto-captions feature in 2008. In November last year, actually it has released the website on auto-captions, but only for certain circles.

YouTube trusted development of auto-captions feature will help users, especially those who have hearing problems with gnats can be more clear in watching the video.

According to research conducted Youtube, as many as 700 million people in the world will have a problem with their hearing in 2015.

Source : www.mediaindonesia.com

Thursday, March 11, 2010

Internet topology

Internet topology deals with finding the topological structure of the Internet. It is daunting to map the entire hierarchy due to the rate at which the network is growing. The effort to map the Internet is usually incomplete and out of date the moment it appears. Internet topology has attracted interest from various disciplines including mathematical sciences, computer science and physics.
The networking researcher's motivation for studying Internet-specific topologies is to enable prediction of how new technologies, policies, or economic conditions will impact the Internet’s connectivity structure at different layers, whereas a physicist is interested in studying the Internet as any other complex network. This has led to many models being proposed including the Jellyfish and Bow Tie models to physically represent the structure of the Internet.[1][2]

Source : www.wikipedia.com

Instant computer support

Traditional computer support used to be delivered either by a person physically attending the premises where a computer was located or over the telephone with technicians on one end talking customers through a series of information gathering which was then relayed to the technician so that the technician could propose a solution which they would then talk the customer through implementing.
In early 2000 IT departments began to implement remote desktop computer support rather than necessitate a visit to an employee’s desk as it was a more productive use of the technician’s and the employee’s time. This was made possible due to the remote software available to the technician that allowed them to remotely connect to any company PC at any time and the fact that the employees’ computers were all on a LAN (Local Area Network) which could provide sufficient bandwidth for a remote connection to function properly.
In the mid 2000’s, as broadband penetration began to become fairly ubiquitous, some new companies began operations offering Instant Computer Support over the Internet to home users and small/medium businesses and a new era of Instant Computer Support was begun. These services are fully encrypted (secure) and delivered over the Internet rather than over a LAN using technology such as that offered by LogMeIn and Citrix. Prior to this, due to bandwidth limitations faced by dial up Internet, remote services were not possible or available to non corporates.
Instant Computer Support is very similar to what the corporates were doing previously with two exceptions, access is requested by the customer and remains active just for that session and it is instant, they need not pre-book. Subscribers have an icon on their desktop and all they have to do is click it to receive instant computer support or software assistance - most companies operate 24/7. The remote software used opens an IM (Instant Messaging) session between the customer and the technician and can display the screen of the customer’s computer, with their permission, onto the screen of a company that provides computer support. The software program allows the company to instantly fix computer problems and deliver software assistance to its customers’ computers remotely as if the technician were sitting in front of it. Therefore, any technical problems can be quickly addressed immediately and fixed from anywhere in the world by an Instant Computer Support company rather than the customer being talked through it over the phone or having to wait for a technician to visit their premises.
Retrieved from "http://en.wikipedia.org/wiki/Instant_computer_support"

Wednesday, March 10, 2010

Internet censorship

Internet censorship is control or suppression of the publishing or accessing of information on the Internet. The legal issues are similar to offline censorship.
One difference is that national borders are more permeable online: residents of a country that bans certain information can find it on websites hosted outside the country. A government can try to prevent its citizens from viewing these even if it has no control over the websites themselves.
Filtering can be based on a blacklist or be dynamic. In the case of a blacklist, that list is usually not published. The list may be produced manually or automatically.
Barring total control on Internet-connected computers, such as in North Korea, total censorship of information on the Internet is very difficult (or impossible) to achieve due to the underlying distributed technology of the Internet. Pseudonymity and data havens (such as Freenet) allow unconditional free speech, as the technology guarantees that material cannot be removed and the author of any information is impossible to link to a physical identity or organization.
In November 2007, "Father of the Internet" Vint Cerf stated that he sees Government-led control of the Internet failing due to private ownership.

Source : www.wikipedia.com

Computer science

Computer science or computing science (sometimes abbreviated CS) is the study of the theoretical foundations of information and computation, and of practical techniques for their implementation and application in computer systems.[1][2][3] It is frequently described as the systematic study of algorithmic processes that create, describe, and transform information. According to Peter J. Denning, the fundamental question underlying computer science is, "What can be (efficiently) automated?"[4] Computer science has many sub-fields; some, such as computer graphics, emphasize the computation of specific results, while others, such as computational complexity theory, study the properties of computational problems. Still others focus on the challenges in implementing computations. For example, programming language theory studies approaches to describing computations, while computer programming applies specific programming languages to solve specific computational problems, and human-computer interaction focuses on the challenges in making computers and computations useful, usable, and universally accessible to people.
The general public sometimes confuses computer science with careers that deal with computers (such as the noun Information Technology), or think that it relates to their own experience of computers, which typically involves activities such as gaming, web-browsing, and word-processing. However, the focus of computer science is more on understanding the properties of the programs used to implement software such as games and web-browsers, and using that understanding to create new programs or improve existing ones.[5]

Source : www.wikipedia.com

Tuesday, March 9, 2010

Computer-mediated communication

Computer-Mediated Communication (CMC) is defined as any communicative transaction that occurs through the use of two or more networked computers.[1] While the term has traditionally referred to those communications that occur via computer-mediated formats (e.g., instant messages, e-mails, chat rooms), it has also been applied to other forms of text-based interaction such as text messaging. [2] Research on CMC focuses largely on the social effects of different computer-supported communication technologies. Many recent studies involve Internet-based social networking supported by social software.

Source : www.wikipedia.com

Internet studies

Internet Studies is an interdisciplinary field studying the social, psychological, pedagogical, political, technical, cultural, artistic, and other dimensions of the internet and associated information and communication technologies. While studies of the internet are now widespread across academic disciplines, there is a growing collaboration among these investigations. In recent years, "internet studies" have become institutionalized as courses of study at several institutions of higher learning, including the University of Oxford, Curtin University of Technology, Brandeis University, Appalachian State University and the University of Minnesota. Cognates are found in departments of a number of other names, including departments of "digital culture", "new media" or "convergent media", various "iSchools", or programs like "Media in Transition" at MIT[1]. On the research side, Internet Studies intersects with studies of Cyberculture, Human-Computer Interaction, and Science and Technology Studies. A number of academic journals are central to communicating research in the field, including Bad Subjects, Convergence: The Journal of Research into New media Technologies, Ctheory, Cyber Psychology + Behaviour, First Monday, Information, Communication, and Society, The Information Society, Journal of Computer-Mediated Communication, M/C, New media & Society, and TeknoKultura, but research relating to internet studies appears in a diverse range of venues and disciplines.

Source : www.wikipedia.com

Computer-generated imagery

Computer-generated imagery[1] (also known as CGI) is the application of the field of computer graphics or, more specifically, 3D computer graphics to special effects in films, television programs, commercials, simulators and simulation generally, and printed media. Video games usually use real-time computer graphics (rarely referred to as CGI)[citation needed], but may also include pre-rendered "cut scenes" and intro movies that would be typical CGI applications. These are sometimes referred to as FMV (Full motion video).
CGI is used for visual effects because computer generated effects are more controllable than other more physically based processes, such as constructing miniatures for effects shots or hiring extras for crowd scenes, and because it allows the creation of images that would not be feasible using any other technology. It can also allow a single graphic artist to produce such content without the use of actors, expensive set pieces, or props.
3D computer graphics software is used to make computer-generated imagery for movies, etc. Recent availability of CGI software and increased computer speeds have allowed individual artists and small companies to produce professional grade films, games, and fine art from their home computers. This has brought about an Internet subculture with its own set of global celebrities, clichés, and technical vocabulary.
Simulators, particularly flight simulators, and simulation generally, make extensive use of CGI techniques for representing the outside world.[2]

Source : www.wikipedia.com

Home computer

Home computers were a class of personal computers entering the market in 1977, and becoming increasingly common during the 1980s.[1] They were marketed to consumers as accessible personal computers, more capable than video game consoles. These computers typically cost much less than business, scientific or engineering-oriented desktop personal computers of the time, and were generally less powerful in terms of memory and expandability. However, a home computer often had better graphics and sound than contemporary business personal computers. Usually they were purchased for education, game play, and personal productivity use such as word processing.
Advertisements for early home computers were rife with possibilities for their use in the home, from cataloging recipes to personal finance to home automation,[2][3][4] but these were seldom realized in practice. If no packaged software was available for a particular application, the home computer user was required to learn computer programming; a significant time commitment many weren't willing to make. Still, for many the home computer offered the first opportunity to learn to program.[5]
The line between a 'business' and 'home' computer market segments has blurred, since the computers typically use the same operating systems, processor architectures, applications and peripherals. Another change from the home computer era is that the once-common endeavour of writing one's own software programs has almost vanished from home computer use.[6]

Source : www.wikipedia.com

Monday, March 8, 2010

CMC

Computer-Mediated Communication (CMC) is defined as any communicative transaction that occurs through the use of two or more networked computers.[1] While the term has traditionally referred to those communications that occur via computer-mediated formats (e.g., instant messages, e-mails, chat rooms), it has also been applied to other forms of text-based interaction such as text messaging. [2] Research on CMC focuses largely on the social effects of different computer-supported communication technologies. Many recent studies involve Internet-based social networking supported by social software.

Source : www.wikipedia.com

Computer crime

Computer crime or cybercrime is a form of crime where the Internet or computers are used as a medium to commit crime. Issues surrounding this type of crime have become high-profile, particularly those surrounding hacking, copyright infringement, child pornography, and child grooming. There are also problems of privacy when confidential information is lost or intercepted, lawfully or otherwise.
Computer crime encompass a broad range of potentially illegal activities. Generally, however, it may be divided into one of two types of categories: (1) crimes that target computer networks or devices directly; (2) crimes facilitated by computer networks or devices, the primary target of which is independent of the computer network or device.
Examples of crimes that primarily target computer networks or devices would include:
Malware (malicious code)
Denial-of-service attacks
Computer viruses
Examples of crimes that merely use computer networks or devices would include:
Cyber stalking
Fraud and identity theft
Phishing scams
Information warfare
A common example is when a person starts to steal information from sites, or cause damage to, a computer or computer network. This can be entirely virtual in that the information only exists in digital form, and the damage, while real, has no physical consequence other than the machine ceases to function. In some legal systems, intangible property cannot be stolen and the damage must be visible, e.g. as resulting from a blow from a hammer. Where human-centric terminology is used for crimes relying on natural language skills and innate gullibility, definitions have to be modified to ensure that fraudulent behavior remains criminal no matter how it is committed.
A computer can be a source of evidence. Even though the computer is not directly used for criminal purposes, it is an excellent device for record keeping, particularly given the power to encrypt the data. If this evidence can be obtained and decrypted, it can be of great value to criminal investigators.

Soucre : www.wikipedia.com