Showing posts with label Computer and Internet. Show all posts
Showing posts with label Computer and Internet. Show all posts

Monday, June 7, 2010

Internet Download Manager

Internet Download Manager or a lot of people call him by the name of the IDM, is the software that is able to retrieve / download data exist on the internet. Artificial devices in New York, United States occupies a top position in maximizing data download speeds. Display and simple graphics makes IDM user friendly with.

DM is supported by a resume feature, namely for the sake of re download the files that previously cut off due to lost internet connections, network problems, computer shutdowns, or unexpected power outages.

IDM is able to share a file during download process lasted up to be seven to eight parts.

The latest version 5.18 adds IDM download panel for web-players that can be used to download flash videos from sites like YouTube, MySpaceTV, and Google Video.

When users click on the download link in your browser, IDM will take over the download and accelerate it.

Internet Download Manager can record and download FLV videos from popular sites like YouTube, MySpaceTV, and Google Video. After installing IDM, "Download This Video" button appears each time users watch video anywhere on the Internet.

Antivirus checking makes IDM user who wants to download free of viruses and trojans. IDM automatically run a check once finished downloaded file to protect users from malicious files.

IDM is translated into Albanian, Arabic, Azerbaijani, Bosnian, Bulgarian, Chinese, Croatian, Czech, Danish, Dutch, Persian, French, German, Greek, Hebrew, Hungarian, Italian, Japanese, Korean, Lithuanian, Macedonian, Norwegian, Polish , Portuguese, Romanian, Russian, Serbian, Slovak, Slovenian, Spanish, Thai, Turkish, and Uzbek languages.

Simple installation by the IDM allows users to do the settings and connections status mericek status.

Source : www.wikipedia.com

Saturday, June 5, 2010

Operating Systems

The operating system is a software system that served to make the control and management of hardware and basic system operations, including the software applications such as word processing programs and web browsers.

In general, the Operating System software is the first layer is placed on the computer memory when the computer starts.

Operating systems generally consist of several parts:

1. Boot mechanism, namely to put the kernel in memory
2. Kernel, the core of an Operating System
3. Command Interpreter or shell, which reads input from the user
4. Libraries, which provides the basic set of functions and standards that can be called by other applications
5th. Drivers to interact with external hardware, as well as to control them.

Operating System currently

Operating system-the main operating system used by the general system of computers (including PCs, personal computer) are divided into three major groups:

1. Family Microsoft Windows - which is comprised of the Windows Desktop Environment (version 1.x to version 3.x), Windows 9x (Windows 95, 98, and Windows ME), and Windows NT (Windows NT 3.x, Windows NT 4.0 , Windows 2000, Windows XP, Windows Server 2003, Windows Vista, Windows 7 (Seven), was released in 2009, and Windows Orient which will be released in 2014)).
2. Unix family of operating systems that use the POSIX interfaces, such as SCO UNIX, family BSD (Berkeley Software Distribution), GNU / Linux, MacOS / X (BSD-based kernel is modified, and known by the name of Darwin) and GNU / Hurd.
3. Mac OS, is the operating system for Apple computers commonly referred to output your Mac or Macintosh. Newest operating system is Mac OS X version 10.4 (Tiger). Early in 2007 planned launch of version 10.5 (Leopard).

Source : www.wikipedia.com

Friday, June 4, 2010

Multimedia

Multimedia is the use of computers to present and combine text, sound, graphics, animation and video with tools ([tool]) and connectivity ([link]) so that users can be had ([navigation]), interact, work and communicate.

At first multimedia includes only media to be consumed senses of sight (still images, text, video motion picture, and the invention of motion picture / animation), and consumption of auditory (sound). In the development of multimedia includes also the kinetic (motion) and the smell of which is the sense of smell.

The smell started to become part of a multimedia since found the smell of reproductive technologies by telecommunications. With the smell of the input device, an operator can transmit the results of digitizing the smell via the internet. Recipients should be available on a computer output device reproduction machine odor.

Source : www.wikipedia.com

Sunday, May 30, 2010

Diary

Diary is a record of events that we experience daily. We wrote a memorable event on this day in the diary book. Diary function is as memorable times we've ever experienced. Can also as history of our lives. Along with the changing times that are too fast so that these changes create more stress for some individuals with career or family, or diary Diary also changed the function of simply storing memories become a medium to express one's feelings for his problems. According to Alice D. Domar, a journal is a step to express our feelings and emotions and helps us to treat our minds. Also with the development of technology, the diary is now not only written on a piece of paper but may also include data on notebook computers or even some form of online facilities to keep a diary on the internet.

Source : wikipedia

Saturday, May 29, 2010

Electronic commerce

Electronic commerce is the buying, selling, marketing, distribution of goods and services over electronic systems such as the Internet or television, www. E-commerce can involve electronic funds transfer, electronic data interchange, automated inventory management systems, and automated data collection systems.

Information technology industry saw an e-commerce activities as the application and implementation of e-business (e-business) related to commercial transactions, such as electronic funds transfer, SCM (supply chain management), e-marketing (e-marketing) , or online marketing (online marketing), online transaction processing (online transaction processing), electronic data interchange (electronic data interchange / EDI), etc..

E-trade was first introduced in 1994 when the first-electronic banner used for promotional and advertising in a web-page (website). According to Forrester Research, electronic commerce to generate sales worth U.S. $ 12.2 billion in 2003. According to another report in October 2006, online retail revenues, non-travel in the United States is forecast to reach a quarter of a trillion U.S. dollars in 2011.

Source : www.wikipedia.com

Friday, May 28, 2010

Telecentre

Telecenter is a resident facility where they can interact, learn, work and play using computers, internet and various other information and communication technology. Although different forms, telecenters have the special characteristic that is supportive of community empowerment activities such as assisting health improvement activities, education and economic development; promote public participation in national life, democracy and development; enhance community capacity in the organization and conduct of business; increase the participation of youth / girls and women; reduce isolation and decrease the digital divide; etc..

Some characteristics of a successful telecenter is as follows:

* Held by the public and financed by mutual cooperation
* Service can be trusted communication and information
* Services are useful and appropriate to the needs of residents
* Residents participate actively in the implementation of telecenter services
* Transparent in terms of administration and finance

Source : www.wikipedia.com

Thursday, May 27, 2010

E-voting

e-voting comes, which means electronic voting

Understanding of e-voting is the use of information technology on the implementation of voting. Choice of technology used in the implementation of e-Voting is very varied, such as the use of smart cards for authentication of voters in the use of the internet as a voting system or data transmission, the use of touch screen as a substitute for sound cards, and many variations of the technology could be used today . In today's development thinking using a mobile phone device to provide a sound could be an option because it combines (convergence) computers and internet network in one single device.

Conditions and the application of e-voting technology continues to change as developments in information technology very quickly. Constraints on e-voting that has ever happened in many countries that have and are being applied to further improve e-voting. One positive aspect of the adoption of e-voting today is the increasing cheapness of hardware used and the more open software used so that the cost of implementing e-voting increasingly cheap from time to time and for the more open the software to be audited jointly. One concept is a software application through Indonesia Goes Open Source (IGOS), with the introduction of e-Democracy applications in the year 2007 [1]

Source : www.wikipedia.com

Sunday, April 25, 2010

The Chicago Manual of Style

The Chicago Manual of Style (CMS or Chicago) is a style guide for American English writing issued by the University of Chicago Press.CMS discuss all aspects of editorial practice, from American English grammar and usage to document preparation.

The first edition of this book is published by the University of Chicago in 1906, under the title A Manual of Style. On publication of the 13 in 1982, the book officially changed its name to The Chicago Manual of Style, which have previously been widely used unofficially by the users of this book. In recent years, the publisher has issued a new edition about every decade. (The 14th edition of this book was published in 1993.) Most recent edition, the 15th edition, published in 2003.
CMS is currently published in a hardcover edition and CD-ROM, accompanied by an online edition was published on September 29, 2006 (link). Online edition of this book includes the text fully searchable on the internet from the edition of 15, with Additional features include tools for editors, guidelines excerpted quickly, and access can be searched to the Chicago Style Q & A, a view that is popular among the editors of manuscripts and grammar addict.

Source : www.wikipedia.com

Saturday, April 24, 2010

Internetwork Packet Exchange

IPX is a computer networking protocol used by Novell NetWare operating system in the late 1980s to mid 1990s.

IPX is used for mapping the data packets from one point to another point in the network through an internetwork.

At first, the use of IPX very much, before the advent of the Internet boom of the mid-1990s. At that time, computers and computer networks can run multiple network protocols, so almost all IPX-based network also run TCP / IP to allow Internet connectivity.

IPX addressing
IPX nodes has the following addressing scheme:

Logical networks are 32-bit address is a hexadecimal number with a range from 0x00000001 to 0xFFFFFFFE. This address is also called the network address (network address).
Each host has its node address of each, which by default is set to the MAC address used by the network card used by the nodes. Node address was added to the network address to create a unique identifier for the hosts on the network.

Similarities with IP
IPX network address, in concept, similar to IP addresses, ie the network ID part of the total length of 32-bit IP address (the IP address with its subnet mask set to the number 1). Given the node address using the MAC address of network card is used, then the protocols Address Resolution Protocol (ARP) was not needed.

When doing the routing, the entries in the IPX routing table are also the same as the IP routing table, ie the routing is done by using its network address, and any network address, the format network: nodes are used, the same way with the format of an IP address / subnet mask used in the IP routing table.

IPX over Ethernet
IPX can also be transmitted via Ethernet using four types of encapsulation, as follows:

IEEE 802.3, which is used in the old systems and involves IPX data that dimulasi directly after 802.3 frame header.
IEEE 802.2 (Novell)
IEEE 802.2 (SNAP).
Ethernet II.

Source : www.wikipedia.com

Wednesday, April 21, 2010

Globalization

Globalization is a term that has a relationship with increasing interdependency among nations around the world and human world through trade, travel, investment, popular culture, and other forms of interaction other so that the boundaries of a country becomes increasingly narrow.

Globalization is a process in which the intergroup, interpersonal, and between countries interact with each other, dependent, related to, and influence one another across national borders

In many respects, globalization has many similar characteristics with internationalization, so these two terms are often interchangeable. Some parties use the term globalization is often associated with a reduced role of state or national boundaries.

Feature of globalization
Here are some characteristics that indicate the growing phenomenon of globalization in the world.
Changes in space and time of Constantine. The development of items such as satellite television, cell phone, and internet shows that the global communication happens so fast, while touring through such mass movements allows us to feel a lot of things from a different culture.
Market and economic production in different countries become interdependent as a result of the growth of international trade, increasing influence of multinationals, and the dominance of such an organization the World Trade Organization (WTO).
Increasing cultural interaction through the development of mass media (especially television, music, movies, and transmission of international news and sports). Currently, we can eat and experience new ideas and experiences on matters across diverse cultures, eg in the field of fashion, food, literature.
The increasing problem with, for example in the environmental field, multinational crisis, inflation, regional and others.
Kennedy and Cohen conclude that this transformation has brought us on globalism, a new awareness and understanding that the world is one. Giddens asserts that most of us realize that we are actually taking part in a world that must be changed without marked by a sense of control and the attraction will be the same thing, change and uncertainty, and the fact that may occur. Similarly, Peter Drucker mentioned globalization as the era of social transformation

Source : www.wikipedia.com

Tuesday, April 20, 2010

E-voting

e-voting comes from electronic voting

Understanding of e-voting in general is the use of information technology on the implementation of voting. Choice of technology used in the implementation of e-Voting is very varied, such as the use of smart card for authentication of voters who can be combined in an e-ID card, use the internet as a voting system or data transmission, use of the touch screen as a substitute for sound cards, and many variations technology that can be used today. In the development of thinking nowadays use mobile phone devices to provide a sound could be an option because it combines (convergence) computers and internet network in one single device.

Constraints on e-voting that has ever happened in various countries who have and are being applied to further improve e-voting. One positive aspect of the adoption of e-voting today is the increasingly cheap hardware used and the more open software is used so that the cost of implementing e-voting increasingly cheap from time to time and for the more open the software to be audited jointly.

Source : www.wikipedia.com

Saturday, April 17, 2010

Modem

Modem is a part that converts the signal into the information signal (carrier) and ready for delivery and the part that separates the information signal (which contain data or messages) received from the carrier signal so that information can be well received. Modem is a two-way communication tool. Each remote communications devices typically use two-way section called "modem", such as VSAT, microwave radio, etc., but generally the term modem is better known as the hardware that is often used for communication on the computer.

Data from the computer in the form of a digital signal provided to the modem to be converted into an analog signal. Analog signals can be transmitted through several media, telecommunications such as telephone and radio.

Arriving at the destination modem, the analog signal is converted into digital signals back and sent to the computer. There are two types of modems are physical, ie an external modem and internal modem.

The types of modems
Modem 3GP
CDMA Modem
GSM Modem
Analog modem is a modem that converts analog signals into digital signals
ADSL Modem Cable Modem is a modem that receives data directly from service providers via cable TV
Source : www.wikipedia

Saturday, March 13, 2010

United Nations trailer Microsoft and Google

United Nations cooperation with a number of computer giant companies, including Microsoft and Google, in the fight against terrorism through the internet.According to the Media Center in New York, Monday (22 / 2), the cooperation will primarily try to uncover who carried out the workings of the terrorists, including members of terrorist recruitment problems, the implementation of crime, and the efforts they do to raise funds.Currently the UN Working Group on Treatment of the Use of Internet for the purpose of terrorism (CTITF) is in talks with Cisco, Symantec, and other companies in Seattle, United States, to discuss technical issues."There are high levels of crime related to the Internet and we need to embrace the private sector, an important partner in making steps forward," said one of the working group's chairman, Richard Barrett, as quoted by the Media Center.Meeting in Seattle which will last until Tuesday (23 / 2) was done after a similar meeting in Berlin, Germany, on a month ago.We met in Berlin, participants are assessing the current law is regarding direct attacks against the network and computer systems.According to Barrett, has not agreed or the most appropriate definition of the right of "terrorism", is still a special difficulty in a discussion of the legal framework should be established to prevent or limit the movement of terrorists in using the Internet.Barrett argues, it also invites limitation concerns about the possibility of violations of freedom of speech and human rights.Head of Task Force CTITF, Jean-Paul Laborde, currently the UN is the only international organization which studies the link between the Internet and terrorism.

Source : www.gatra.com

Monday, February 8, 2010

Computer and Internet Protocol Address Verifier

From Wikipedia, the free encyclopedia

The Computer and Internet Protocol Address Verifier (CIPAV) is a data gathering tool that the United States Federal Bureau of Investigation (FBI) uses to track and gather location data on suspects under electronic surveillance. The software operates on the target computer much like spyware, whereas it is unknown to the operator that the software has been installed and is monitoring and reporting on their activities.[1]
The CIPAV captures location-related information, such as: IP address, MAC address, open ports, running programs, operating system and installed application registration and version information, default web browser, and last visited URL.[1]
Once that initial inventory is conducted, the CIPAV slips into the background and silently monitors all outbound communication, logging every IP address to which the computer connects, and time and date stamping each.[1]
The CIPAV made headlines in July, 2007, when its use was exposed in open court during an investigation of a teen who had made bomb threats against his high school. [1]
FBI sought approval to use CIPAV from United States Foreign Intelligence Surveillance Court in terrorism or spying investigations.[citation needed]
See also
Wiretapping
Backdoor (computing)
Policeware
ECHELON
Magic Lantern (software)
References
^ a b c d "FBI's Secret Spyware Tracks Down Teen Who Made Bomb Threats". Wired Magazine. 2007-07-18. http://www.wired.com/politics/law/news/2007/07/fbi_spyware.
External links
http://blog.wired.com/27bstroke6/2009/04/fbi-spyware-pro.html
http://www.computerworld.com/action/article.do?command=viewArticleBasic&articleId=9131778&source=NLT_AM
Retrieved from "http://en.wikipedia.org/wiki/Computer_and_Internet_Protocol_Address_Verifier"
Categories: Federal Bureau of Investigation Computer law Surveillance Spyware Privacy