Friday, April 30, 2010

Applications for analyzing the performance of Internet connections

Applications for analyzing the performance of Internet connections
Panic when discovered problems with internet connection, do not panic. Try to use a specific application to find out the cause, prior to the conclusion or file a complaint by contacting the ISP.

Try to find out first aid use of specific applications known as Visual RouteLite Edition. This application is capable of analyzing Internet connection, and to identify the cause of the problem. The analysis presented to the user in the form of graphic display that informs the routing network.

PC Connection user initiated, leading to the destination PC server connections, including network devices that pass. Slow response or loss of data can be easily known to the user on the graph that appears.

Source : id.shvoong.com

Thursday, April 29, 2010

analyzing your love affair with Software

Choosing a life partner or friend of this center should be selective. Changes in attitudes, habits and lifestyles can be affected from the interaction of man with his friends.Missteps in our society, so that we do not regret in the future.

Various methods can be done to analyze how many correspondences or matches is woven friendship between two people, one of them through the use of software known as the Birth Chart Synastry StarLove.

This application is designed specifically for the analysis of the compatibility of two people in a relationship. The ability of these applications, among others, compares the birth information between two people, and indicating the advantages, and challenges faced in the fabric of friendship.

Source : id.shvoong.com

Wednesday, April 28, 2010

Display desktop appearance changed to resemble the Mac OS 8

Has a beautiful view on a Macintosh computer is now not a mere fantasy, because without having to replace the older operating systems or buying new devices, namely through the use of software known as Winmac.

Of course the existence of such software is welcomed, especially by users of Windows operating system users older versions such as Windows 95. This application enables users to customize the toolbar, quick menus, icon, cursor, wallpaper, sounds, fonts, and display the startup / shutdown resembles Mac OS 8 (Copland) Through the toolbar, the user can run or switching applications, including process shutdown, logout, or restart. While the Quick menu available can facilitate quick access to the trash cans, eject the disk, speaker volume control, Windows guide, and the Task manager.


This application includes complete documentation for usage, so users can easily implement them. Make sure your PC has a minimum of 486 CPU, 4MB memory, mouse / pointing, devices and high-color display.

Good luck!

Sorce : id.shvoong.com

Tuesday, April 27, 2010

Outdated floppy

Floppy first ever victorious and popular, but it is now very rare in the use of people.
Sony also will suspend its distribution in his own country (Japan), and the whole production process will be discontinued in 2011.

Sony is a company that helps for the development of floppy disks in 1981 and began marketing it in 1983 and have soared as his name or the very popular data storage media in the year 2000, Sony had released up to 47 million units, floppy disks, but the arrival of USB drives and CD drives , diskettes are no longer relevant. Perhaps because of these new devices have a greater storage capacity so users prefer USB drives and CDs rather than floppies.

Although there is still a possibility to produce and use floppy disks but will soon be an antique, Sony had already ended production of the floppy just like many other companies that have not sold it.

Source : id.shvoong.com

Monday, April 26, 2010

Computer Definitions

There are several definitions of the computer as suggested by several parties.
among other things:

According to the Annual Computer books (Robert H Blissmer), Computer is an electronic device that can perform several tasks, among others, receive input, process the input was in accordance with the program, keep the commandments and the results of the processing and provides output in the form of information.

According to Computer books today (Donald H. Sanders), Computer is an electronic system to manipulate data quickly and accurately as well designed and organized in order to automatically receive and store input data, process it and produce output under the supervision of a step-by-step instructions that programs stored in memory (stored program).

According to the book Computer Organization (VC Hamacher), Computer is an electronic calculating machine that can quickly receive the digital input information, process it in accordance with a program stored in its memory and generate output information.

Can be concluded that the computer is
1. Electronic Equipment
2. Can process data
3. Can accept input data
4. Can provide information
5. Can store programs and results processing
6. Using a program stored in computer memory
7. Scara work automatically.

Source : id.shvoong.com

Check them easily on a flat file

Check them easily on a flat file

Interactive User Interface

Flat File Checker is an application that is easy to use in checking the flat file. Flat File Checker can find the data, the error in the batch from the flat file. These errors can be found with the scheme based on (XML) that defines the business rules.

In addition, the Flat File Checker can be used to filter the data exchange and data validation. This application is supported by an interactive user interface. This application has features that can represent the scheme as a document in a browser that can read.

Support Command Line also allows users to integrate these FlatFile Checker on batch processing. The latest version of the Flat File Checker can increase the functionality of VB expressions.

Source : id.shvoong.com

Sunday, April 25, 2010

The Chicago Manual of Style

The Chicago Manual of Style (CMS or Chicago) is a style guide for American English writing issued by the University of Chicago Press.CMS discuss all aspects of editorial practice, from American English grammar and usage to document preparation.

The first edition of this book is published by the University of Chicago in 1906, under the title A Manual of Style. On publication of the 13 in 1982, the book officially changed its name to The Chicago Manual of Style, which have previously been widely used unofficially by the users of this book. In recent years, the publisher has issued a new edition about every decade. (The 14th edition of this book was published in 1993.) Most recent edition, the 15th edition, published in 2003.
CMS is currently published in a hardcover edition and CD-ROM, accompanied by an online edition was published on September 29, 2006 (link). Online edition of this book includes the text fully searchable on the internet from the edition of 15, with Additional features include tools for editors, guidelines excerpted quickly, and access can be searched to the Chicago Style Q & A, a view that is popular among the editors of manuscripts and grammar addict.

Source : www.wikipedia.com

Saturday, April 24, 2010

Internetwork Packet Exchange

IPX is a computer networking protocol used by Novell NetWare operating system in the late 1980s to mid 1990s.

IPX is used for mapping the data packets from one point to another point in the network through an internetwork.

At first, the use of IPX very much, before the advent of the Internet boom of the mid-1990s. At that time, computers and computer networks can run multiple network protocols, so almost all IPX-based network also run TCP / IP to allow Internet connectivity.

IPX addressing
IPX nodes has the following addressing scheme:

Logical networks are 32-bit address is a hexadecimal number with a range from 0x00000001 to 0xFFFFFFFE. This address is also called the network address (network address).
Each host has its node address of each, which by default is set to the MAC address used by the network card used by the nodes. Node address was added to the network address to create a unique identifier for the hosts on the network.

Similarities with IP
IPX network address, in concept, similar to IP addresses, ie the network ID part of the total length of 32-bit IP address (the IP address with its subnet mask set to the number 1). Given the node address using the MAC address of network card is used, then the protocols Address Resolution Protocol (ARP) was not needed.

When doing the routing, the entries in the IPX routing table are also the same as the IP routing table, ie the routing is done by using its network address, and any network address, the format network: nodes are used, the same way with the format of an IP address / subnet mask used in the IP routing table.

IPX over Ethernet
IPX can also be transmitted via Ethernet using four types of encapsulation, as follows:

IEEE 802.3, which is used in the old systems and involves IPX data that dimulasi directly after 802.3 frame header.
IEEE 802.2 (Novell)
IEEE 802.2 (SNAP).
Ethernet II.

Source : www.wikipedia.com

Friday, April 23, 2010

E-business

E-business can be translated as a business activity that is done automatically and using a semiautomatic computer information systems. This term was first introduced by Lou Gerstner, the CEO of IBM company, is now a form of business activities conducted using Internet technology. E-business allows a company to deal with a system of internal and external data processing them more flexible and efficient. E-business is also widely used to dealing with suppliers and business partners, as well as meet the demand and serve customers better satisfaction.

In everyday use, e-business is not only about e-commerce course. In this case, e-commerce is more of a sub part of e-business, while e-business covers all kinds of functions and business activities using electronic data, including Internet marketing (e-marketing). As part of e-business, e-commerce is more focused on the activities of business transactions via the www or the Internet. By using knowledge management systems, e-commerce has the goal to increase revenu from company [1].

Meanwhile, e-business associated with the overall business process, including value chain: electronic purchasing (purchasing electronic), supply chain management (supply chain management), electronic order processing, handling and customer services, and cooperation with business partners. E-business gives the possibility to exchange data between one company and another company, either through the web, Internet, extranet, intranet or a pair of them.

Source : www.wikipedia.com

Thursday, April 22, 2010

McAfee antivirus virus mutates so

Beijing: McAfee antivirus software have a problem, Wednesday (21 / 4), causing some Windows XP computers worldwide were damaged or had to repeatedly re-ignited. The launch of the new McAfee released their own turned out to destroy this company.

The problem had resulted in some schools have a computer failure, the police were forced to write by hand reports and stop the patrol car terminal as a precaution, some of the prison to cancel the visit, and the hospital refused to non-trauma patients in emergency rooms and delaying some elective surgery.

McAfee apologized to customers, but they underestimate their impact. "We did not realize a significant impact on consumers," said anti-virus company. (Xinhua / ARI)

Surce : liputan6.com

ADSL

ADSL or Asymmetric Digital Subscriber Line is a form of DSL technology. Characteristic of ADSL is its asymmetric, ie that data transferred in a different speed from one side to another.

ADSL Feature
ADSL itself has a variety of speeds, type of router, USB and other devices inside. For example there can be used for two computers using a USB connection, but there also can be used for four computers with an Ethernet LAN connection. But it is better to choose an ADSL modem, we chose to use a modem that has the on and off. This is meant so that we can regulate the use of the connection as much as we need and save the cost of connection is used.
Another important thing which is owned by the ADSL modem is that there is a useful indicator light to know the process connection occurs.
Of the three existing indicator lights on the modem, the most important is the PPP and DSL light. Where is the DSL light indicates a connection has been connected with either the line. While the PPP light indicates the data flow when a person browsing.


Advantages of ADSL

The use of ADSL internet making activities become much cheaper. So that we can be surfing without worry about the bill's swollen.

Frequency division into two, namely to deliver high-frequency data, while the low frequencies to deliver voice and fax.


Lack of ADSL

As the distance is very influential on the speed of data transmission.

The existence of load coils that are used to provide telephone services to the affected areas, while the load induction coils itself is shifting the equipment onto the carrier frequency.

Not all software can use an ADSL modem

Bridged taps existence, namely the cable that are not on a direct path between the customer and the CO

The use of fiber optics in digital phone lines in use today. Where the use of optical fiber is not in accordance with ADSL systems that still use analog channels namely copper cable, so it will be difficult in the delivery of signals through optical fiber.

Source : www.wikipedia.com

Computer Networks

Computer network is a system consisting of computer and other network devices that work together to achieve a common purpose. The purpose computer network are:

Dividing resources: for example the use of shared printers, CPU, memory, hard drive
Communication: eg electronic mail, instant messaging, chat
Access to information: for example web browsing

Based on the criteria, a computer network is divided into 4, namely:

1. Based on the distribution of sources of information / data

- Network This network consists of a centralized computer where the client and the server that the client computer that serves as an intermediary to access sources of information / data derived from a single computer server

2. Based on the geographic reach is divided into:

- Network LAN is a network that connects 2 computers or more in coverage such as laboratories, offices, and in 1 cafe.

- Network MAN network is covering a large city and its local area. Examples of local telephone networks, cellular telephone systems, as well as some ISP's internet relay network.

- WAN Network A network with worldwide coverage.

3. Based on data transmission media

- Wired Network (Wired Network) In this network, to connect one computer to another computer network cables required.

- Wireless Network (Wireless Network) is a network with the medium in the form of electromagnetic waves.

4. Based on the roles and relationships of each computer in the process data.

- Network Client-Server In this network there are 1 or more server computers and client computers. As an intermediary for the client computer can access data on a server computer and the server computer provides the information required by the client computer.

Networking-Peer-to-peer network does not exist at the client computer and server computer because all computers can do the transfer and receipt of information so that all computers function as clients as well as a server.

Source : www.wikipedia.com

Wednesday, April 21, 2010

Accessing folders easily and quickly

Sometimes we have the folders that often we open the document because in it there is the task we are doing. At one time, for various reasons, you accidentally close the folder so you have to open it back through Windows Explorer. That way, maybe some of your hard work. Try this application to make it easier and faster.

Folder Menu is a portable application that will allow you to access your favorite folders. When executed, this application will be immediately entrenched in the system tray to allow you to access it.

Then you can directly apply the folders anywhere you want quickly accessed via this application. So, with this application, the old ways that seem troublesome in opening a folder can be changed.

Source : id.shvoong.com

Globalization

Globalization is a term that has a relationship with increasing interdependency among nations around the world and human world through trade, travel, investment, popular culture, and other forms of interaction other so that the boundaries of a country becomes increasingly narrow.

Globalization is a process in which the intergroup, interpersonal, and between countries interact with each other, dependent, related to, and influence one another across national borders

In many respects, globalization has many similar characteristics with internationalization, so these two terms are often interchangeable. Some parties use the term globalization is often associated with a reduced role of state or national boundaries.

Feature of globalization
Here are some characteristics that indicate the growing phenomenon of globalization in the world.
Changes in space and time of Constantine. The development of items such as satellite television, cell phone, and internet shows that the global communication happens so fast, while touring through such mass movements allows us to feel a lot of things from a different culture.
Market and economic production in different countries become interdependent as a result of the growth of international trade, increasing influence of multinationals, and the dominance of such an organization the World Trade Organization (WTO).
Increasing cultural interaction through the development of mass media (especially television, music, movies, and transmission of international news and sports). Currently, we can eat and experience new ideas and experiences on matters across diverse cultures, eg in the field of fashion, food, literature.
The increasing problem with, for example in the environmental field, multinational crisis, inflation, regional and others.
Kennedy and Cohen conclude that this transformation has brought us on globalism, a new awareness and understanding that the world is one. Giddens asserts that most of us realize that we are actually taking part in a world that must be changed without marked by a sense of control and the attraction will be the same thing, change and uncertainty, and the fact that may occur. Similarly, Peter Drucker mentioned globalization as the era of social transformation

Source : www.wikipedia.com

Tuesday, April 20, 2010

E-voting

e-voting comes from electronic voting

Understanding of e-voting in general is the use of information technology on the implementation of voting. Choice of technology used in the implementation of e-Voting is very varied, such as the use of smart card for authentication of voters who can be combined in an e-ID card, use the internet as a voting system or data transmission, use of the touch screen as a substitute for sound cards, and many variations technology that can be used today. In the development of thinking nowadays use mobile phone devices to provide a sound could be an option because it combines (convergence) computers and internet network in one single device.

Constraints on e-voting that has ever happened in various countries who have and are being applied to further improve e-voting. One positive aspect of the adoption of e-voting today is the increasingly cheap hardware used and the more open software is used so that the cost of implementing e-voting increasingly cheap from time to time and for the more open the software to be audited jointly.

Source : www.wikipedia.com

Maemo

Maemo is a development platform that is open source for devices that use a Linux system, like the internet tablets, which inherited the architecture of Linux from the Unix operating system.

Internet tablet is a device used to provide the level of desktop PCs that are used for Internet services (such as web pages and email.) Those devices has a high resolution, touch-sensitive screen with 800 x 480 pixel size. Nokia has released three Internet Tablet platform Maemo, the Nokia 770, Nokia N800, and Nokia N810, and the latest Nokia N900.

Hardware
Maemo operating system designed for the Nokia internet tablets, which have features similar specifications with high-level mobile phones Nokia, the N series and E series, with a TI OMAP ARM SOCS, large screen and internal storage that can be enlarged.

Source : www.wikipedia

Monday, April 19, 2010

Laptop Very Important Components

Buying a laptop is an investment not only for students but most importantly for young professionals who want to know more.

The most important part of the laptop is the processor without it, the laptop will not work at all. It is involved in data processing for better performance and maximum. Laptops have a motherboard that all the circuits and chips are connected to the inside. Bypassing the battery or DC. They give the best results for users to enjoy. These processors can be found in the motherboard.

RAM or Random Access Memory is one of the most important part of the laptop. It is responsible for the speed of data processing.

Hard disks are also important. This is where all data is stored. If memory is low hard drive, users can also try using an external hard drive. Of course, they need an adapter for this. . Also a good source, an external hard disk to back up all files in the laptop in a case may have been lost or destroyed by the virus.

The battery is the lifeblood of the laptop. This is the laptop that is necessary to look into before buying. Some people say that it's better to charge while working, so there will be no disruption to their work. They actually can do this by using the power cord. However, it also is not recommended as a laptop battery for possible costs resulting in lower power backup.

Laptops really needs right now. With the rapid improvement in technology, all people tend to rely on it to make their reports at work or in school. Also, are good sources to find out all the latest news of the world if they have an internet connection. Source : shvoong.com

Benefits of Buying a Laptop Computer Parts Online

The internet has so much sway in the market today because a lot of merchandise can be purchased directly from web.

Computer products is also growing and developing through the internet, with so many websites that offer them for sale. That makes it even more difficult to choose and buy a laptop computer parts online.

We will mention a few reasons why shopping online is profitable.

1. Having to choose the right time, and not have to worry whether open or closed shop is one particular advantage. You'll also find that shopping online computer parts much, much cheaper. Why? Simply because the web site need not worry about the cost of which involve running the store. And lastly, it is the simple pleasure of shopping in the comfort of your own home. No traffic, no long lines, no crowded areas, and there are no physical discomfort caused by making your purchase. It's fast, easy and far more efficient.

2. More often than not, you will not find what you're looking for when you go directly to the store. Number of computer products in the market is very high that you can not fit them all in there. On the other hand, a web site can hold a high volume of information on each product can be viewed and inspected to specification. You can also learn more by reading the comments on the product from web site visitors. Most online shopping sites are now able to send orders within 24-48 hours, compared with retail stores to take days, even weeks to find a particular product out of stocks and send it to your home.

3. Information about products can be easily examined on a web site, including but not limited to, specifications, compatibility information, and feedback from site visitors. online shopping sites usually have an application that allows you to compare the computer results by categories such as cost, memory, batteries, and more.

4. Since you can register an account on the website, you will have your own page showing your shopping history. This can help you double back certain products that have been purchased and that has been marked for purchase in the future. A newsletter can also be sent to your email providing recommendations related to the item you have ordered or placed in your online shopping cart.
Source : d.shvoong.com

Sunday, April 18, 2010

Displays a list of applications installed and information is complete

Term Add / Remove Programs certainly no stranger to your Windows user. Windows operating systems provide utilities to install or uninstall the program via the control panel. Some applications may not be visible in the standard Windows utility, and the display of information were limited. Not satisfied with the functions contained in the Add / Remove Program of Windows standard?

You can try to use other applications in order to function better, one of which is MyUninstaller, which is an alternative utility Add / Remove Prgram applications, in addition to the standard applet on the Windows operating system. This utility displays the entire list of installed applications at once enable you to perform uninstalls the application, delete an uninstall entry, and store that list into a text file or html.

Additional information from the most installed applications that can be presented by MyUninstaller, where the standard applet Add / Remove Program can not be displayed. Some of the information, including product name, company, version, uninstall string, installation folder, and so forth. The news that there is a bug in previous versions, the loss of focus on the main window when users switch to another application and switch back to the window My Uninstaller, has been fixed in version 1:40

Good luck ... Source : www.id.shvoong.com

Keeping Tips durable LCD monitors

LCDs are more susceptible to damage. Now, how to keep the LCD monitor durable? The tips are as follows.

Place a dry place and avoid direct sunlight
because it will cause damage, minimal color change occurs, either on screen or on its LCD casing.
Avoid touching the LCD screen
LCD screens are made of fabric Liquid (liquid), making it very vulnerable to shifts when exposed to touch the liquid, so as much as possible avoid touching the LCD screen directly.
Turn on the LCD maximum of 4 hours under normal conditions
This is to give a break to the components inside. Use of continuous LCD will make the LCD image blurred faster. If you use the LCD 24 hours, try to turn off the LCD every 4 hours for 5 minutes.
Close the LCD after use
aim to avoid the LCD from dirt and dust
Use UPS or stabilizer
although not sensitive CPU, use the right voltage will obviously make the LCD more durable, especially from the loss of power disturbances that suddenly.
Use the recommended resolution
Each LCD has a native resolution or the best resolution of the LCD. If the LCD is set outside the native resolution, the images shown will be reduced quality. So try to use the recommended resolution. Eg for LCD 15 "1360 x 768 resolution nativenya for wide screen.
Use the settings in the Normal Brighness and Contral
If both settings are too high, then existing lights in the LCD will be easier to die. So try to use the default settings alone. (Approx. 50%)
Put in place a flat LCD
This is to anticipate the collapse of the LCD
Do not be too often shifted LCD
This is to keep the frequent occurrence of shocks in the LCD. Shocks that are too hard can cause damage to the LCD screen.
Keep away from Magnetic Field
Magnetic field is a lot of the source. For example is the speaker (the most frequently used by computer users). Yanag magnetic field too close will damage the image quality of LCD, and if left too long will cause permanent damage to the color.
Keep out of reach of children
This aims to avoid accidents, such as electric shock, collapse or other units.
Hopefully useful Source : id.shvoong.com

Saturday, April 17, 2010

CHOOSE techniques COMPUTER

We would like to buy a computer of course wanted a computer that can be used for all types
application needs. To select the appropriate computer then we have the desired
selecting based on need factors. Factors associated with objective needs
computer use, who the users and software applications that will be used.
Apart from demand factors, knowledge of computer hardware needed to
choose the computer components that suit their needs. In selecting the components
Also consider the ability of computer work, correspondence, balance and price
and the possible upgrading of the selected components. Source : SHVOONG.COM

Modem

Modem is a part that converts the signal into the information signal (carrier) and ready for delivery and the part that separates the information signal (which contain data or messages) received from the carrier signal so that information can be well received. Modem is a two-way communication tool. Each remote communications devices typically use two-way section called "modem", such as VSAT, microwave radio, etc., but generally the term modem is better known as the hardware that is often used for communication on the computer.

Data from the computer in the form of a digital signal provided to the modem to be converted into an analog signal. Analog signals can be transmitted through several media, telecommunications such as telephone and radio.

Arriving at the destination modem, the analog signal is converted into digital signals back and sent to the computer. There are two types of modems are physical, ie an external modem and internal modem.

The types of modems
Modem 3GP
CDMA Modem
GSM Modem
Analog modem is a modem that converts analog signals into digital signals
ADSL Modem Cable Modem is a modem that receives data directly from service providers via cable TV
Source : www.wikipedia

Friday, April 16, 2010

Be careful Virus Attack Internet Porn

Japan trojan virus is installed automatically on computers using the popular file sharing service called Winni. A new malware attack PCs through shared files and Internet traces announce users to a site. Malware authors are also demanding money for deletion.

The target is those who illegally download hentai game type (animated porn) in the form of shaped cartoon pornography. Yomiuri website claims there are 5500 people who claimed to have been infected.

Kenzero Viru is being monitored by security company Trend Micro website in Japan.

By masquerading as a game installation view, these viruses require personal details of PC owners.

Furthermore, viruses take the web user history and then publish them online with their name, before sending an email or pop-up screen demanding payment credit card 1500 yen (USD 150 thousand).

That demand is called for "complete violation of copyright laws" web page is deleted.

"We have seen this name previously associated with Zeus and Trojan Koobface. This is a crime gang that is continually involved with crimes like this, "said Rik Ferguson, senior security advisor at Trend Micro.

Kenzero makeup of the virus is that asks ransom, he added, where the malware that infects your computer and do the encryption on documents, images, music and then forced to demand payment for the decryption key.

Website is owned by a company called Romancing Inc. which is registered by a fictitious individual named Shoen Overns.
Source : www.inilah.com

10 "laptop" was great in the year 2010

What notebook or laptop aja, which so gagdet "most" sought in this century?? There are 10 "laptop" was great in the year 2010. Laptops are: Number 1 ..!!! Luvaglio - the first laptop worth millions of dollars .. with screen 17 "special LED anti-glare reflective coating, 128GB Solid State Disk and a slot loading Blue-Ray drive .. then there is an integrated screen cleaning device plus there very rare colored diamond that serves as the power button when placed into the laptop, and also acts as security identification ...


Subsequently number 2 ..! Orkin's rolltop .. .. people said this product should go list "of must-haves" .. because he has a flexible LED screen, plus the forgiveness multitouch connect ama dah create iPhone.Udah so, klo opened full, so ni notebook screen 17 "flatscreen ..

Next .. none other than the Hewlett-Packard ZT1000 ranked 3rd. Equipped with carved wooden frame, then I can dual OS (linux ubuntu and Win.XP) .. antique copper keyboard and mouse, bearing arms, engraved brass accents, claw feet.

What to Lenovo ... 4 .. i

Next in rank 5 .. .. EDSSKN there ... only one word can say ... AMAZING ...!

Patients in the number 6 there Buyanov Nikita HP ... ...

Can word i say nothing ... hiks ..

The next patient .. Dual Touch Screen Laptop from Canova. ... Features dual display with touch-sensitive screens, sketch pad, music score, graph paper, electronic pen and a special hardware for smooth functioning.

Number 8 - Fujitsu's DJ Laptop, has a 20-inch LCD screen, easy to be folded closed.

This allows us to create a laptop to explore all your favorite tracks are the same as vinylturntable.

To 9 .. NEC LaVie G-type L .. with a 15.4-inch flanking .. besides there is a very important key is "Emergency Button", which is going to shutdown the engine when the unexpected intrusion. Launched in 2006, made only 300 units and is very secretive. Type-No1 was made at a cost of up to ¥ 174,510 ($ 1,476).

Last number 10 .. Felix Schmidberger. Dideasin for 2015 with OLED touch screen. Computer itself has a OLED touch screen, very similar to the UMPC or PDA. The entire screen is a slider, because it can be moved forward to open a second OLED touchscreen below, where we can have a keyboard or working controls, similar to the setup with 2 monitors.
Source : id.shvoong.com

Thursday, April 15, 2010

Move important data before disappearing

Most of you who use Microsoft Windows operating systems must often put important documents in My Document directory. By default, the directory is My Document on the system drive (C: \)

The problem is, when there is system failure, whether it's caused by viruses or anything else that causes have to reinstall your entire system, we can be sure important documents will also be lost. Before this happened to you, try using this application.

0.99 Relocator profile will help you move the Windows User Profiles to other drives. Thus, when the system failur occurred that caused you to reinstall Windows, important documents contained in the My Documents directory will not go missing. Before using this application, make sure your operating system already installed. NET Framework SP2 first. Source : id.shvoong.com

Personal computer

Personal computer or PC has several meanings:

A general term that can be used on computers and people easily obtained.
The general term in the microcomputer according to the specifications of IBM.
Personal computer was first released by IBM and indirectly sparked the use of the term PC (Personal Computer) - refer to the IBM PC.
There are several types of personal computers, among others:

Desktop computer
PDA Notebook or Laptop
Computers that can fit into the body (wearable computer)

Source : www.wikipedia.com

Wednesday, April 14, 2010

Extensible hypertext markup language

XHTML stands for eXtensible HyperText Markup Language. XHTML is a reformulation of HTML forms using the XML paradigm. [1] XHTML is a markup language for the router and the development of HTML which has a capacity of more or less similar to HTML, but with a more strict syntax rules. HTML is an application of SGML (Standard Generalized Markup Language) that is very flexible, whereas XHTML is an application of XML, SGML derivative that is more limited.

Reasons for Using HTML
XHTML improve the deficiencies in the HTML.
XHTML can be run on multiple platforms, allowing us to open the site either through the PDA and mobile phones.
Writing
XHTML is not too different from the HTML 4.01 standard. If you already have the ability HTML 4.01 it will help to launch XHTML. XHTML requires that the writing of tags with lowercase (lowercase) and always closed using the closing tag. Some rules in XHTML
As mentioned previously, XHTML is an improved version of HTML. For that, there are some rules that are more stable and consistent program.

Each tag must be written in lowercase.
Opening and closing tags on the correct nest.
Attribute tags are written with lowercase letters and using quotation marks.
Providing cover for each tag.
Source : www.wikipedia.com

USB 3.0 is halted progress until the end of 2011

USB 3.0 device application on every computer in every home, is clearly an easy thing, let alone it directly raised by the motherboard manufacturer, such as Asus and Gigabyte. But unfortunately what happens is you will not see the development of a USB 3.0 until the end of 2011. What reason? The main reason is the lack of support from Intel to implement these technologies.

"A clear line is that if the new version of USB can be integrated into a chipset from a PC," said Brian O `Rourke, an analyst at In-Stat." That is the real current from the USB. With integrate into the chipset, Intel basically allows PC OEMs to feel a new sense of USB for free.

But according to O `Rourke, Intel has not made this as a main agenda item until the end of 2011. Is it true or not, Intel does not confirm it, but at least it (USB 3.0) has not been a priority from Intel.

"USB 2.0, for some people has been doing its job perfectly," according to Brookwood. But what about the HD camcorder or digital HD cameras, which can benefit from the extra transfer speed offered by USB 3.0? Surely for high-end circles are willing to pay more, in order to get the speed of this transfer.

Source : rumahteknologi.com

Tuesday, April 13, 2010

Multimedia

Multimedia is the use of computers to present and combine Gamba, text, sound, animation and video with tools ([tool]) and connectivity ([link]) so that users can be had ([navigation]), interact, work and communicate. In the world of multimedia entertainment is often used. Apart from the entertainment, Multimedia Games is also adopted by the world.

Multimedia is used also in education and business. In education, multimedia is used as a medium of instruction, either in class or individually. In the world of business, multimedia is used as a media company profile, product profile, even as media information kiosks and training in e-learning systems.

At first multimedia includes only media to be consumed senses of sight (still images, text, video motion picture, and the invention of motion picture / animation), and consumption of auditory (sound). In the development of multimedia includes also the kinetic (motion) and the smell which is konsupsi sense of smell. Multimedia began to include elements of kinetic since was applied to the 3-dimensional movies are combined with the movement of the chair seat in the audience. Kinetic and 3-dimensional films evoke rialistis sens.

Since the discovery of reproductive technologies through telekomunikas smell, the smell started to become part of multimediai. With the input device penditeksi smell, an operator can transmit the results of digitizing the smell via the internet. Recipients should be available on a computer output device reproduction machine odor. This smells of reproduction machine mixing different types of material that smells after a mixed output of a smell similar to data sent from the Internet. With with out the printer, this tool makes the pheromone-scent feromor instead of ink. Output is not a mold but the aroma. Source : www.wikipedia.com

Java

Java 'is a programming language that can run on various computers, including mobile phones. Developed and published in 1995 by Sun Microsystems. Java should not be misunderstood as JavaScript. JavaScript is a scripting language used by web browsers.

Initial Version
A preliminary version of Java in the year 1996 is already a release version so called Java Version 1.0. This version of Java includes many standard packages are constantly being developed at the beginning of the next version:

java.lang: The allotment of the basic elements of class.
java.io: The allotment of input and output classes, including the use of the file.
java.util: The allotment of such supplementary class class class class structure and calendar data.
java.net: The allotment of the class of TCP / IP, which enables communication with other computers using TCP / IP network.
java.awt: The base class for applications with a user interface (GUI)
java.applet: The base class interface applications to be implemented on a web browser.

Phase Compiling Java
Write / Modify. Programmers write programs and store them in the media in the form of a file. 'Java'.
Compilation. Establish a form of bytecodes from program files. 'Class'.
Load. Loader to load class bytecodes into memory.
Verification. Peng-verification ensures bytecodes do not interfere with the Java security system.
Run. Language translator to translate bytecodes to be in use''computer.
Source : www.wikipedia.com

Monday, April 12, 2010

8 WAYS TO AVOID CYBER CRIME

Various facts of evil in the world show off the internet more in line with the development of science and technology. This condition implies that it is not always good science and technology development and is used with care even further dampen the quality and quantity of our society. Therefore, the consumers of science and technology, especially Internet, are expected to have a moral and social values are high not only concerned with the interests of individuals or groups so as not to harm the many.

With the current situation would have been difficult to just rely on a wise statement. You are actively protect themselves from criminal attack on the internet do not just depend on others. There are 8 fundamental way that must be taken to ensure that you do not themselves become victims of the perpetrators of "cyber crime".

1. Protecting Computers
Always use anti-virus applications, anti-spyware applications and firewall.Cek every month whether the antivirus is still the way what does not.
2.Melindungi children
Children are the most vulnerable targets in the virtual world. Monitor their activities while surfing.
3. Always Up-to-date
Update your system regularly along with other security applications like anti-virus.
4. Secure Email
Vigilant in receiving emails from people you do not know. Most damaging emails that carry viruses on the email attachment.
5. Protecting your account
Always use a password with a combination of letters, numbers and symbols that consist of many characters.
6. Make a copy of
Back up your data to avoid loss and theft and damage from the action of a viral infection.
7. Find Information
Active in the development of information about Internet security.
8. Protect your identity
Never let a profile on the parties obviously did not know his origins.
Source : www.id.shvoong.com

Dribbling TRICKS WEBSITE SEARCH ENGINE TO YOUR BLOG

Website that has been registered with search engines is not enough without the tricks to a minimum. This trick is useful to your Website a good position in search results.
The trick is:
The first stage, list your website URL. To facilitate you make a list of URLs you can try this service on http://www.xml-sitemaps.com

List or a list of URL extensions are different and the search engine has its own characteristics regarding the format of the receipt of a list of URLs. More details see the following file formats.

• sitemap.xml: files list of URLs, and file compression sitemap.xml.gz who registered later in Om Google.
• ror.xml: files list of URLs to be exchanged via RSS Feeds.
• urllist.txt: files list of URLs, and file compression urllist.txt.gz to be registered into the Yahoo search engine.
• sitemap.html: files list your URL to serve to guests and reserve for other search engines.

The second phase, upload formats a list of URLs that have been made to your webhosting (usually in the public_html).

The third stage, list the files into various search engines like Google by using Google Webmaster Tools service, Yahoo with MSN Live Webmaster Tools service it, and other popular search engines.
Good luck and see the results.
Source : www.id.shvoong.com

Sunday, April 11, 2010

Internet Protocol

Internet Protocol is a network layer protocol (network layer in the OSI Reference Model) or internetwork layer protocol (internetwork layer in the DARPA Reference Model) used by TCP / IP for addressing and routing data packets between hosts in a computer network-based TCP / IP. A widely used version of IP is IP version 4 (IPv4) defined in RFC 791 and published in 1981, but some time to come will be replaced by IP version 6.

IP protocols offer services
IP offers the service as a protocol between the network (inter-network), because that IP is also often referred to as a protocol that is routable

IP protocol supports multiple clients, because that IP is a "courier" carrying data that is sent by the protocols higher layer comparison.

Send data in the form of IP datagram, since it only provides the IP is connectionless data transmission service and not reliable (unreliable) to the protocols that are higher than the IP protocol.

It is independent of the network interface layer (first layer in the DARPA Reference Model), because that IP is designed to support multiple computers and network interfaces.

To support the largest frame size that is owned by the network interface layer technology is different, the IP can make towards solving the data packet into multiple fragments before placed on a network channel.

Can be expanded by using the IP Options feature in the IP header.

Source : www.wikipedia.com

Hotspot

Hotspots are certain places that have Internet service using Wireless LAN technology, such as at universities, plazas, malls, restaurants, libraries or airports. Internet service like this, there are paid and there are provided free of charge. [1]

Hotspot concept was first proposed in 1993 by Bret Stewart and when Networld Interop conference, in San Francisco.

Some components in the hotspot are:
Mobile station
Access Point
Switch, Router, Network Access Controller
Web server or other servers
High-speed Internet connection
Internet Service Provider
Wireless ISPs

There are several commonly used types of hotspot, namely: [3]

Free hotspots as an additional general customers.
Hotspot is paid directly to the landlord.
Paying to wifi hotspot hotspot operators, such as Boingo, iPass. Threat
Today, more and more hotspots are available in many public places, but every time you make a connection at a hotspot is actually endangering your PC or laptop itself. . This condition is possible at all for the hacker to access the hotspot user's credit card, if you conduct transactions online.

Source : www.wikipedia.com

Saturday, April 10, 2010

Removing a stubborn application

If you often install applications for free, would you ever experienced an application that is still listed in Add or Remove Programs list when you remove it from the system. Now, to remove a stubborn application
could be through the Registry Editor.
The trick is:

Open the Registry Editor window, then find the location "HKEY_LOCAL_MACHINE-SOFTWARE-Microsoft-Windows-CurrentVersion-Uninstall." This directory stores all the application's name in the Add or Remove Programs window is stored in a directory.
Find the name of the application you want removed. After the meet, click on the directory, then select "Delete" from the menu bar "Edit".

Right-click on that directory.

after a context menu appears, select "Delete".

Before closing the Registry Editor window, press the "F5" on your keyboard to update the contents of the registry.

Without having to restart Windows, open the Add or Remove Programs window, and locate the name of the application which was originally difficult to remove. certain applications that had already gone wayward. Source :id.shvoong.com

Beware! Computer Virus "Life Is Beautiful" can destroy your computer data

Microsoft and Norton Intrusion inform the threat of new viruses via electronic mail (e-mail) that can damage a user's computer data internet services, like Yahoo, Hotmail, and AOL (American OnLine).
Viruses' Life is Beautiful ". was signed by electronic mail names. If you accept, delete the file immediately. When it opened, will display a message on your computer screen the words: "it is too late now, your life is no longer beautiful ...." (Too late now, you can only let go).
Furthermore, all data on your computer you will be lost. Not only that, people who send a "virus" that will also get access to your name, e-mail, and your password. AOL has confirmed that, while the antivirus software was not able to destroy the existing "Life is Beautiful".

Source : id.shvoong.com

Friday, April 9, 2010

Caring Tips Laptop Batteries

Batre tips on caring for a laptop that does not quickly broken.

1st. Battery discharges
Do not ever let your batteries in a state of power supply does not get below 30%. Often allow the battery below 30% or even wait until the
running out of supplies, will accelerate the damage to your battery.

2. Memory Effect
If you hear no memory effect on knowl-san-charged battery, it will not happen for this type of battery output current. Batteries are the new laptops are very protective with the memory effect. You can at any time to charge your battery and the battery should not be allowed to empty.

3. Temperature
If your battery is used for common activities that produce a temperature of about 40 degrees, a battery can stay connected to the socket. But if the drive has reached the temperature at 60 degrees, meaning that the battery must be removed from the socket.

4. Saving Laptops In Long Term
You're planning to travel for a long time and should keep a laptop, try to remove the battery from the laptop while the battery is still at 40% before the shut down and stored. Then, save your battery dry and fresh place (not humid) or in the freezer with a temperature of 0 º C - 10 º C.

5. Buying Replacement Batteries
Do not buy a battery if your battery is not damaged. If you intend to buy, then the battery needs to be saved by using the means at number 4.

6. Some features that make spendthrift Batteries
Windows Aero.
SuperFetch.
ReadyBoost.
SearchIndexer.
if the situation was not charge (battery mode) should turn off the feature at the top, if not, charge the battery when the road on those features.

7. 3 Do
USB: do not plug any USB connection when not in use, remove all the USB connection is not used, state of the battery mode.
Sound: want to save battery? Do not harden sound when listening to music or movies, state of the battery mode.
Wireless: do not turn on the wireless connection when not in use.

8. Nothing On USB
Which should not be used:
External cooling fan, usually installed under the laptop.
USB vacuum cleaner
Lighting via a USB / LED super

Source : id.shvoong.com

Computer

Computer is a tool used to process the data according to procedures that have been formulated. Computer word originally used to describe people who job perform arithmetical calculations, with or without hearing aids, but the meaning of the word is then transferred to the machine itself. Origins, information processing is almost exclusively related to arithmetical problems, but modern computers used for many tasks unrelated to mathematics.

Computer consists of 2 major parts:
1.software (software)
2.hardware (hardware)

1.Hardware
Processor or CPU as the data processing unit
RAM memory, to store data temporarily
Hard drives, semi-permanent storage medium
Input device, the media used to enter data to be processed by the CPU, such as mice, keyboards, and tablets
Output device, the media used to display the output of CPU processing, such as monitors and printers

2.Software
Operating Systems
Basic program on a computer that connects users with computer hardware. Commonly used operating systems are Linux, Windows, and Mac OS. Duties include operating systems (but not only) controls the execution of programs on it, coordination of input, output, processing, memory, and software installation.
The computer program
An additional application installed in accordance with the operating system
[Edit] Slot on the computer
ISA / PCI slot for additional input of non-graphics card
AGP / PCIe, an input slot for additional graphics card
IDE / SCSI / SATA, slots for hard drives / ODD
USB, media input slots for plug-and-play (plug and play, meaning the devices can be connected directly to your computer and can be used)
[Edit] Types of computers
Analog computer
Computer Pulse
Microcomputers
Home computer (home computer)
Personal computer (PC)
Servers
Mainframe computer
Supercomputer

Thursday, April 8, 2010

6 Steps to limit a program in Windows or your computer

For those of you who do not like the program or your file in the open or use another orng. This tutorial has the fragmentation that matches your needs are. Where, here you can perform a block (block) or prohibit access to any / some programs on a computer (of course your own computer).
Additionally, this tutorial can also work on Windows XP, Windows Vista or Windows 7. Here are his steps:
1st. Kik Windows + r or Run. In the column "run" is available type in "gpedit.msc" (without the quotes). Then press Enter to open Group Policy.
2. In the Group Policy window, open the User Configuration → Adiministrative Templates → System.
3. After that, look on the right side of the window, locate the item Run Windows Applications Allowed only and double click (double click) the item.
4th. On the Run only Allowed settings window of Windows Applications, select the option enabled (red arrows), then click the Show icon (colored blue arrows) that is right below it.
5. Finally, in the Show window contents enter the names of the executable file of the application will not be on the block (the block). For example: Excel.exe for Microsoft Excel, notepad.exe to Notepad, word.exe for Microsoft Word, and others.
The names of the executable file you can see the program files folder in Windows Explorer.
6. After all the names of the programs you do not want to block or can be accessed by your users have entered. Then click OK.
After all the above steps have been followed, it is time to try. Try to open the programs that were not included in the Show Window Contents. If the program is not running, then you have succeeded.
Good luck. . . . . . !

Source : id.shvoong.com

Google Voice Pilot VoIP Technology

Google Inc.., The possibility of trying to implement Google Voice applications to call or receive calls from outside through a computer at the beginning of next week.
The world's largest search engine company, in November last, Google invites Gizmo5, service provider Voice over Internet Protocol (VoIP), Skype competitor, making VoIP phone people-to-people, as call and receive calls with the normal tissue and cell phones.

Google never commented the possibility of their use Gizmo5 technology. Google has confirmed that they now have to build a computer application for Google Voice telephone. For the user perspective, this application will allow someone calling from his computer.

Gizmo5 fill some holes on the Google Voice products, be able to provide telephone service. Visitors must complete Google Voice Google Voice phone with the tools to contact or receive telephone.

Google is not sure when this application will be launched, but as followed from one of the sites, »possibility immediately. Earlier this week begin the application being tested internally. "

Source : id.news.yahoo.com

Wednesday, April 7, 2010

iPad

iPad is a tablet computer products made by Apple Inc. (AI). IPad view shape similar to the iPod Touch and iPhone, it was bigger than the iPod Touch and iPhone and have additional functions such as the one on Mac OS X.

Which introduced the first iPad is Steve Jobs, the CEO (which stands for Chief Executive Officer) from Apple Inc. in Apple Special Event held at yerba Buena Center for the Arts, San Francisco, United States, on January 27, 2010.

Specification
So far Apple has already announced two types of models iPad.
Model Wi-Fi with Wi-Fi 802.11a/b/g/n with 680 grams of weight that will be marketed 3 April 2010 and a model Wi-Fi + 3G that allows users to use the HSDPA network with a weight of 730 grams, which will be marketed at the end April 2010. This product has multi-touch screen design with a 9.56x7.47-inch wide-screen 9.7 inches, or about 25 centimeters (cm), equipped with an LED backlight display with IPS technology (an abbreviation of In-Plane Switching), a resolution of 1024x768 pixels, flash memory drives starting from a range of 16 gigabytes (GB) to 64 Gb, processor 1 gigahertz (GHz) Apple A4, lithium-polymer battery that can last up to 10 hours of use, support playback of AAC audio format, MP3, VBR, Audible, Apple Lossless, AIFF and WAV, and supports up to 720p H.264 video format,. m4v,. mp4,. mov, and MPEG-4. There are also Bluetooth 2.1, digital compass, GPS, Wi-Fi (802.11a/b/g/n), dock connector, built-in speaker, microphone, 3.5-mm stereo headphone jack and use the same operating system with system iPhone operation.

Source : www.wikipedia.com

Creating a Blog with WordPress

Usually create a blog to register to the site first blog service providers, and only then can perform activities of blogging. To make blogging should require Internet connection. For those who have internet connection at home will not be a problem, tp for which there is no need to internet cafe and would have to spend more money. So as to overcome the problem that is one blog service providers ie "WordPress" providing applications that can be used
for the blog offline (not connected to the Internet), so are free to design and post which will stay on the original wordpress uploaded to the Internet. The following will try to do it. Previously, the application shall be prepared and Applications Wordpress Xampp which can be downloaded at http://www.apachefriends.org/en and
http://www..wordpress.com/download

Source : id.shvoong.com

Tuesday, April 6, 2010

IRC

Internet Relay Chat (IRC) is a form of communication on the Internet that was created for interpersonal communication, especially communication in place of a discussion group called the channel (the channel), but also can be used for private line communications.
IRC was created by Jarkko Oikarinen (nickname "Wiz") at the end of August 1988 to replace the BBS program called Mut (multiuser talk), in Finland called OuluBOX. Oikarinen found inspiration Bitnet Relay Chat which operated on the Bitnet network. He made an IRC client and IRC server at the University of Oulu, Finland (At the time he worked in the Department of Information Science). Now, the IRC has been used in more than 60 countries around the world.

When we use the Internet Relay Chat, we will be greeted by the Message of the Day (Order Today) or motd which contains information about the site and traffic on the network. When using IRC, users are asked to name the nickname or pseudonym. The user has a program (called a "client") to connect you to an IRC server from one of the nets mentioned above.
Source : www.wikipedia.com

Videotext

Videotext is an interactive information services from the central computer that allows individuals to request information from the central computer frame by telephone or cable, to be displayed there is a video display screen.

Videotext, or also known as video-text, and teletext is an information service in the form of alphanumeric text and graphics through a television screen.

Videotext can present information in a limited number of pages, depending on the memory capacity of the central computer.

Videotext developed by Sam Fedida and colleagues at the British Telecommunications Research Laboratories in 1971.

In any format developed various countries according to the above, Videotext remains a superior technology that combines mass communication with computer technology. Surce : www.wikipedia.com

Monday, April 5, 2010

Final Fantasy

Final Fantasy RPG series console and computer games produced by Square Enix. Final Fantasy game series is the most widely distributed of all time.

In the first series of products was launched in Japan on December 18, 1987 and has devoted for markets in North America, Europe and Australia, in a lot of video game consoles, including Nintendo Entertainment System, MSX 2, Super Nintendo Entertainment System, PlayStation, WonderSwan Color , PlayStation 2, Game Boy Advance, Nintendo GameCube was also computer-IBM PC compatible computers and some types of cellular phones. Subsequent output has been reported will be present for the Nintendo DS game system, Nintendo Wii, PlayStation Portable, PlayStation 3 and Xbox 360. Final Fantasy is a series of products Squre Enix's most successful and best-selling three product series of all time, with sales to date have exceeded 63 million units worldwide.

Final Fantasy

Developer Square Enix (formerly Square)
Publisher Square Enix (formerly Square)
The author Hironobu Sakaguchi
Console role-playing game genre
Platform Mobile phones, Game Boy Advance, MSX, Nintendo DS, Nintendo Entertainment System, Nintendo GameCube, Windows, PlayStation, PlayStation 2, PlayStation 3, PlayStation Portable, Super Nintendo Entertainment System, Wii, WonderSwan Color, Xbox 360
'Original Nintendo Entertainment System Platform
Date of first release of Final Fantasy
December 18, 1987
Date of Final Fantasy XIII release
December 17, 2009
Official Site-enix.com www.square

Source : www.wikipedia.com

Website

A web site (often shortened to just site; web site, site) is the designation for a group of web pages (web page), which is generally a part of a domain name (domain name) or subdomain on the World Wide Web (WWW) on the Internet . WWW consists of all web sites that are available to the public.

Types of websites
A static Web site, is one form of the website contents in the website is not intended to be updated periodically, and usually is maintained manually by a few people using the software editor. There are 3 types of categories of editor software that is usually used for the purpose of maintaining it, they are:

a. Element 1 text editor. Examples are Notepad or TextEdit, where the HTML changed in the program editor.
b. Element 2 WYSIWYG editor. Such as Microsoft FrontPage and Macromedia Dreamweaver, where the site be edited using a GUI (Graphical User Interface) and HTML formats are automatically generated by this editor.
c. Elements 3 Editor which already has a template, for example Rapidweaver and iWeb, which, this editor allows the user to create and update the website directly into a web server quickly, without knowing anything about HTML. They can choose a template in accordance with their wishes, add a picture or object, filled with writing, and with a flash they can make web sites without having to look at all the HTML codes.

Source : www.wikipedia.com

Sunday, April 4, 2010

Malware

Malware is software designed to infiltrate or damage a computer system, server or computer network without permission from the owner.

Malware includes computer viruses, computer worms, Trojan horse (Trojan horses), majority-root kit (rootkits), the surveillance device (spyware), advertising tools (adware) that dishonest, evil device (crimeware) and any other malicious software and unwanted

Malware outbreak: computer viruses and worms
Malware's most recognizable, 'virus' and 'computer worm', known by the way she spread, not the behavior of others. The term 'computer virus' is used for software that has spread some of the software can be like (executable software) and make the software, when executed, spreads the virus to be like any other software. Viruses also can carry a payload (payload) that perform other actions, often malicious. Conversely, 'computer worm' is software that actively deliver himself through a network to infect other computers, and also can carry a payload.

This conception indicates that the virus requires user intervention to spread, while a computer worm can spread automatically. By using these differences, the outbreak of the sent through surel or Microsoft Word documents that depend on the recipient's actions (opening files or surel) to infect the system, should be classified as a virus rather than a computer worm.

Source : www.wikipedia.com

Turning off the computer voice software

Mute on Lock
At certain times, we want the music that appears when turned off or lock the system. When you're computing in the room at night and no baby is sleeping or you're using a notebook in class, it certainly sounds very disturbing. Try using this application, Mute on Lock 1.0.
The application is working in the system tray, and monitor your activities while computing. When about to turn off or lock the system, then this application will automatically turn off your speakers. In addition, because the place is on yan system tray, will allow you to turn off the center speaker.
With less set to be made on this application, when your done double click it. It enables you to be turned on / off sound, or activate / deactivate application

Source : id.shvoong.com

Saturday, April 3, 2010

Google Run Quake Scientists use HTML5

HTML5 development, encouraged by Google to improve the next generation of web standards. Google scientists had successfully used it to run the game Quake.
As quoted from the official Google Web Toolkit blog, Saturday (3/4/2010), the legendary three-dimensional game Quake works with HTML5 Google researchers only.

Yes, the game which in its time the computer resources needed enough 'weight' that can now be run on an Internet browser. By using HTML5, Quake and even run without the plug ins like Adobe Flash.

"We were really amazed when I saw the game that can penetrate to 30 frames per second in our laptops," wrote Chris Ramsdale from the Google Web Toolkit team.

Quake, Quake II was used. Researchers at Google's expanding from Jake2, Quake II port to Java, then use the Google Web Toolkit and a number of other technologies.

Though still a laboratory product, which performed this experimental success shows the potential of HTML5 is quite interesting. In addition to the games, HTML5 browsers will be able to play any video without the need plug ins.

Researchers have been showing a video on YouTube. In addition, they also share the code behind the experiment.
Please see for yourself.

Source : detikcom

Apple, Inc.

Apple, Inc.is a Silicon Valley company based in Cupertino, California, which is engaged in computer technology. Apple is famous for his creation of hardware, such as the iMac, Macbook, iPod music player devices, and mobile phones iPhone. Some creations any software able to compete in a creative field such as Final Cut Pro video editors, sound editors Logic Pro and iTunes music player that also functions as an online music store.

Apple, Inc..
Open Type (NASDAQ: AAPL)
Founded California (January 3, 1977)
Location 1 Infinite Loop
Cupertino, CA 95014th
Steven P. important people Jobs, CEO & Director
Timothy D. Cook, EVP & COO
Peter Oppenheimer, SVP & CFO
Jonathan Ive, VP of Industrial Design
Employees 14,800 (2005)
Products Mac OS X
iMac
Mac Pro
MacBook Pro
MacBook
iPod
QuickTime
AirPort
Final Cut Studio
Mac mini
Xserve
Logic Pro
iLife
iWork
iPhone
Apple TV
Www.apple.com website

Source : www.wikipedia.com

Friday, April 2, 2010

Internet forum

Internet forum users can discuss with the facilities available on the internet. This Internet-based forum has been known since 1995, and functions much like even better than the internet bulletin boards and mailing lists that have been around since the 1980s.

Membership and anonymity
Forum anonymous offer full anonymity or pseudo-anonymity, allows sending anonymous. CAPTCHA, email authentication, and tripcode is applied in ways to prevent spam attacks on anonymous forums.

Members who registered on the forum has a better right, such as the ability to edit their own kirimannya, start a topic, setting and controlling access to another user profile. Members diindentifikasikan with username (username) that is unique. Profiles generally have a picture in the form of avatars and signature blocks are added at the end of each post. Members also have the right to send personal messages to other users. Sometimes registered members also have the right to delete posts and close the topic before they enter.

Administrators and moderators
A forum administrator has the ability to edit, delete, move or make changes to an existing topic on the forums. Administrators generally also have the ability to close the forum, forum tool change, skin change globally, modify the forum, and ban, delete or add members in the forum. Generally moderators permissions can be delegated to other forum members. Moderators have fewer skills than administrators, among them is to edit, delete, move topic, commemorating members of the submissions that are considered rude, or change the details of the forum. To become a moderator, members must first send an application letter to the administrator via private message (Private Message / PM).

Software
Forum software packages are widely available on the internet, and written using many programming languages, like PHP, Perl, Java and ASP. Configuration and data of each shipment can be stored in text files or databases. Each package offers different features, ranging from just sending a text to support multimedia and formatting with the code (known as BBCode). Many packages can be integrated easily into existing web pages.

Some Internet applications, such as blogs also use a similar feature with forums. Comments on Wordpress at the bottom of the blog provides a topic of discussion capabilities to a blog post.

Internet forum software is divided into two kinds of licenses are free (freeware) and paid. Free Sample packages include phpBB, SMF, MyBB, YaBB, Snitz, Forumer, and PuBB. While the pay packages such as vBulletin, IPB and UBB.Classic.

Ethics
Shipments Double
Violation of the forum's most lots are the double delivery in the same forum. This can also refer to the person who sends in a different forum but have little differences in the content, especially in forums that allow users to edit previous posts. In this case, the number of users can post to the same bertambah.Masalah that can happen is the delivery of cross-examination, that is sending the same topic in several different forums.

Spam
Spamming is a violation of ethics forum where users send the same word or phrase repeatedly, but differs from the double posts because sending spam is intended for intentional and sometimes with bad intentions.

Sanction
To members who violate the rules of the forum will be subject to sanctions. Sanctions can be given a stern warning, temporarily blocked the most severe and is blocked permanently.

Source : www.wikipedia.com

Ziddu.com "Free Upload free and free MP3 downloads"

Download free songs taken from live ziddu.com select what song you just type in the title song in the search box ziddu.com, when the song there that we can upload and download songs stored on your computer, usually in the file zip format files you must have in unzip it first.
Not only songs that can be uploaded and downloaded video files and pdf formats also you can download and upload.
We can also be income from here when we upload the file then each time someone downloads then we will be able to pay her even though a small amount but many who downloaded it because it is also the amount.
To be in transfer payments to your paypal account.
So this is one alternative to get the income in the virtual world while sharing also can produce good luck.

Source : id.shvoong.com

Thursday, April 1, 2010

Wireless Application Protocol (WAP)

WAP is a protocol or a technical messaging service that allows a digital mobile phones or mobile terminals that have a WAP facility, see / read the contents of a site on the internet in a special text format. This Internet site should be a site with WAP facilities. WAP is published by the WAP Forum, founded by Ericsson in 1997. Motorola, Nokia and Unwired Planet to do the same.

Limitations of WAP device
Ability Central Processing Unit (CPU) which is lower than the CPU used on the wired devices such as computers.
Saving power usage (power) that typically use batteries
The smaller display sizes and limited
Limitations of memory size
Input devices are devices that are different from ordinary
The design of the information is usually sent via WAP WML format (Wireless Markup Language). WML is similar to HTML, only more specifically to wireless devices that have keterbatasa as above.

WAP Usage Examples
Departure flight schedule information
Admission to flight departure
Transaction purchase tickets
Traffic Information
Information on stock values
Looking for a phone number or address information
List of weather conditions

Source : www.wikipedia.com

10 Tips to treat a laptop

1. Keep away from liquids.
2. Using a laptop must place a flat surface
3. Do not put the laptop lap for a long time
4. Avoid the shock of his time to bring ..
5. Completed using the laptops do not jump on the lid allow the new 10-minute closed.
6. Avoid battery charging when using a laptop because it has resulted in rapid battery exhausted
7. Use the software in accordance with laptop capacity
8. Use the same charge its wattage & voltage
9. use not use anti-virus updates
10.check is your laptop every 1 month, was to address & fix hardware error.


Source : id.shvoong.com