Showing posts with label Internet. Show all posts
Showing posts with label Internet. Show all posts

Wednesday, June 2, 2010

Global village

Global Village is a concept of the development of communications technology in which the analogue world into a village which is very large.

McLuhan said that the global village occurred as a result of the dissemination of information very quickly and massive in the community. Rapid and massive spread of this use of information and communication technology.

The impact of the global village
According to McLuhan, global village during the case, information and communication will be very open, so does the role of mass media in transforming the message. The impact on the community is that people will tend to have the same perception for obtaining equal opportunity to access information.

Source : www.wikipedia.com

Tuesday, May 25, 2010

10 STEPS TO BE UNIQUE IMAGES modify HTML CODE

Follow the steps below

1: click on this post
2: click the new entry
3: click the code to transfer images posted who form a little blue box
4: show options documented your existing image and select your desired doodle
5: there is a choice of images would be placed beside the left, center or right just ignore them
6: there is also a display option menu of small, medium or large ignore it
7: click start open / upload pictures you've selected who
8: wait until the upload process is complete
9: The HTML code appears to the post box / entry
10: the code ready to paste copied and used as the HTML code DRAWINGS

Source : id.shvoong.com

Monday, May 24, 2010

Videos on YouTube Rental Store

Youtube video portal the number one in the world today offers video rentals to get new sources of revenue other than advertising.

So for free on the internet video market began to shift to commercial but with video and offer higher quality content, like Hulu which is planned to start wearing a subscription fee in the month of May.
Youtube video rental service can be found at: http://www.youtube.com/store

Currently Youtube video catalog is not yet complete and many options, mostly indie films, anime, foreign films (such as Bollywood) and documentaries. Rumored possibility in the future Google will work with Lion's Gate, Sony and Warner Bros. to put their movies on Youtube Store.

Geeksugar.com

Friday, May 21, 2010

How to Raise the Site or Blog on Search Engines especially Google

Disciplined and not lazy were the two keys to make your site lively. In addition, the first thing you should do is to register with search engines


While waiting, there's a good idea to beautify the look website / blog you with a template of interest. Open blog.prolr.com because at this site you will get many links to get everything for free for your site. Enroll your website / blog you are in this directory
This step is probably the most good for increasing traffic
List the following web directories:
http://dir.yahoo.com/ PR 8
http://www.dmoz.org RR8
http://www.stpt.com/ PR 8
http://www.open-site.org PR 8
http://www.femina.com PR 7
http://www.portal.eatonweb.com homework 7
http://www.bloggernity.com PR 6
http://www.podcastzoom.com/ PR 6
PR 6 http://www.bloguniverse.com
http://www.gogreece.com PR 6
http://www.lanic.utexas.edu PR 6
http://www.sacentral.sa.gov.au/site/page.cfm PR 6
http://www.worldhot.com/ PR 6
http://www.elib.org/ PR 6
6 http://www.christiansunite.com/ http://www.ezilon.com/ PR PR PR 6 http://www.aardvark.co.za 6
http://www.nzs.com/ PR 6
http://www.info-listings.com/ PR 6
http://findingblog.com/ PR 6
http://www.iguide.co.il/ PR 6

Source : id.shvoong.com

Wednesday, May 19, 2010

Playing threats Facebook

We have five threats to Play Facebook:

1. Your information will be shared by third parties, including the developers of Facebook applications.

2. Every time Facebook to redesign the site, the privacy settings the user account will become less secure and more vulnerable. Users must also be set manually reset their privacy, so the same with the previous arrangement.

3. Facebook ads contain viruses and infect vulnerable users account.

4. Friends who really get to know you could accidentally create your account becomes vulnerable.

5. Hazards can also come from scammers who create fake profiles.

Source : id.shvoong.com

Sunday, May 16, 2010

Deleting your Facebook account

Follow the steps below and need patience because it took about five hours.
The steps are:
- Remove all your friends by clicking the "x" then select "delete friend".
- Delete all photos in your album pages. How, go to page images, then select an album and select "delete this album."
- Remove all the comments you send, by going to your profile page and select "x" and select "delete" on each box, and the wall to your comment.
- Remove your membership of the Group, the fans, and supporters in the INFO page. You do this by visiting your group and select "delete".
- Remove all the info about you. Select "info" to edit.
- Remove all existing tags on the photo page
- Send an email to http://www.facebook.com/help/contact.php?show_form=delete_account and choose to delete your account permanently. Enter your password and enter a password that is visible.
- Once confirmed, facebook will tell you that if you do not login for 14 days, your account will be deleted and not recoverable.
- After that facebook will automatically exit.
- Please check 14 days later by logging into your account. If you can not mean you managed to delete facebook.

Source : id.shvoong.com

Saturday, May 15, 2010

How to block prohibited sites at home, or office

To prevent your child or your staff in the office to open a porn site.
Try this.

Follow these steps:
1. Open the Control Panel.
2. Or click select the "Internet Options".
3. Click "Connections".
4. Click the modem used for internet on my laptop, home computer or your office.
5. Click "Settings".
6. Click "Propeties".
7th. Click on "Networking".
8. Click "Internet Protocol version 4"
9. Click "Properties".
10. Click "Use the Following DNS server adresses"
11. Fill out the "Preferred DNS Server" with the number "180 131 144 144"
12. The contents of the box "Alternate DNS Server" with the number "180 131 144 145"
13. Click OK to close all dialog boxes that you had passed. END.
Try testing your entry to one of porn or gambling sites. If it successfully blocked the site, means finished all. But if it can still be accessed, try returning to the step above by replacing select the click number eight on the to pick the "Internet Protocol version 6". While other steps remain the same.

Source : id.shvoong.com

Wednesday, May 12, 2010

Free movie telecast of Foreign Affairs

Want to watch foreign television broadcasts for free, especially for those of you who already subscribe to the Internet.

TvTube please open the website to prove it. This website provides hundreds of online television channels from around the world. You just choose which channel to watch.

Although this website presents the television broadcast for free, you still have to think about how much bandwidth is sucked up during the show an event in a stream.
Do not let your loss.

Source : id.shvoong.com

Saturday, May 8, 2010

Mode via Email Hacking Facebook

Data theft happens on the Internet, this time overwrite biggest social networking site in the world, facebook.com. Nytimes.com reported from the site, mode of action of theft operations began with the sending of bogus electronic messages from facebook (e-mail) to users via your facebook email.Dan direct users to click links in messages that are sent as the next step as long as This is done facebook.com. But in the original message (from www.facebook.com) provided direct links to the original site. So this time the site that was open was a fake facebook page to look exactly the same.

Parties attackers use an account that has been "hacked" to take advantage by making robots that send spam account to another account. So the attacker the opportunity to benefit from promotion through facebook utilizing active users.

When a community is growing rapidly, it was also a lot of people think to make money from it "(although in a way that is not kosher), said analyst Michael Argast a software system as quoted from gadgetwise.blogs.nytimes.com

Source : id.shvoong.com

Wednesday, May 5, 2010

Accelerating Internet Access, Configure TCP / IP Optimize.

Obviously we are very upset when seeing a slow Internet connection. Moreover, the data we're looking for we may not get.

Obstacles slow internet can actually be handled easily is to do the steps below.

There are six steps to speed internet access

Make:
1. First download the TCP / IP optimizer (please download below)
2. Finished downloading, run the application with the click Run, and click the General Settings tab.
Third. Make adjustments to the speed of your Internet connection by sliding the button Connection Speed.
4. Click Network Adapter and choose the interface you use to connect to the internet
5. Mark (tick) Option Settings, then click the Apply Changes button
6. To get the effect of this optimization.Restart your PC.

These steps are really just one way of many other ways to speed up internet connection, ie you can do to configure TCP / IP Optimize.

A little extra, this optimization is needed because basically connecting a PC to the Internet is required media called Network Interface Card (NIC) or Ethernet Card. Where this work using the Ethernet protocol TCP / IP.

So by optimizing the TCP / IP will do little to speed up access to the internet. Good luck!

Friday, April 30, 2010

Applications for analyzing the performance of Internet connections

Applications for analyzing the performance of Internet connections
Panic when discovered problems with internet connection, do not panic. Try to use a specific application to find out the cause, prior to the conclusion or file a complaint by contacting the ISP.

Try to find out first aid use of specific applications known as Visual RouteLite Edition. This application is capable of analyzing Internet connection, and to identify the cause of the problem. The analysis presented to the user in the form of graphic display that informs the routing network.

PC Connection user initiated, leading to the destination PC server connections, including network devices that pass. Slow response or loss of data can be easily known to the user on the graph that appears.

Source : id.shvoong.com

Friday, April 23, 2010

E-business

E-business can be translated as a business activity that is done automatically and using a semiautomatic computer information systems. This term was first introduced by Lou Gerstner, the CEO of IBM company, is now a form of business activities conducted using Internet technology. E-business allows a company to deal with a system of internal and external data processing them more flexible and efficient. E-business is also widely used to dealing with suppliers and business partners, as well as meet the demand and serve customers better satisfaction.

In everyday use, e-business is not only about e-commerce course. In this case, e-commerce is more of a sub part of e-business, while e-business covers all kinds of functions and business activities using electronic data, including Internet marketing (e-marketing). As part of e-business, e-commerce is more focused on the activities of business transactions via the www or the Internet. By using knowledge management systems, e-commerce has the goal to increase revenu from company [1].

Meanwhile, e-business associated with the overall business process, including value chain: electronic purchasing (purchasing electronic), supply chain management (supply chain management), electronic order processing, handling and customer services, and cooperation with business partners. E-business gives the possibility to exchange data between one company and another company, either through the web, Internet, extranet, intranet or a pair of them.

Source : www.wikipedia.com

Thursday, April 22, 2010

ADSL

ADSL or Asymmetric Digital Subscriber Line is a form of DSL technology. Characteristic of ADSL is its asymmetric, ie that data transferred in a different speed from one side to another.

ADSL Feature
ADSL itself has a variety of speeds, type of router, USB and other devices inside. For example there can be used for two computers using a USB connection, but there also can be used for four computers with an Ethernet LAN connection. But it is better to choose an ADSL modem, we chose to use a modem that has the on and off. This is meant so that we can regulate the use of the connection as much as we need and save the cost of connection is used.
Another important thing which is owned by the ADSL modem is that there is a useful indicator light to know the process connection occurs.
Of the three existing indicator lights on the modem, the most important is the PPP and DSL light. Where is the DSL light indicates a connection has been connected with either the line. While the PPP light indicates the data flow when a person browsing.


Advantages of ADSL

The use of ADSL internet making activities become much cheaper. So that we can be surfing without worry about the bill's swollen.

Frequency division into two, namely to deliver high-frequency data, while the low frequencies to deliver voice and fax.


Lack of ADSL

As the distance is very influential on the speed of data transmission.

The existence of load coils that are used to provide telephone services to the affected areas, while the load induction coils itself is shifting the equipment onto the carrier frequency.

Not all software can use an ADSL modem

Bridged taps existence, namely the cable that are not on a direct path between the customer and the CO

The use of fiber optics in digital phone lines in use today. Where the use of optical fiber is not in accordance with ADSL systems that still use analog channels namely copper cable, so it will be difficult in the delivery of signals through optical fiber.

Source : www.wikipedia.com

Tuesday, April 20, 2010

Maemo

Maemo is a development platform that is open source for devices that use a Linux system, like the internet tablets, which inherited the architecture of Linux from the Unix operating system.

Internet tablet is a device used to provide the level of desktop PCs that are used for Internet services (such as web pages and email.) Those devices has a high resolution, touch-sensitive screen with 800 x 480 pixel size. Nokia has released three Internet Tablet platform Maemo, the Nokia 770, Nokia N800, and Nokia N810, and the latest Nokia N900.

Hardware
Maemo operating system designed for the Nokia internet tablets, which have features similar specifications with high-level mobile phones Nokia, the N series and E series, with a TI OMAP ARM SOCS, large screen and internal storage that can be enlarged.

Source : www.wikipedia

Friday, April 16, 2010

Be careful Virus Attack Internet Porn

Japan trojan virus is installed automatically on computers using the popular file sharing service called Winni. A new malware attack PCs through shared files and Internet traces announce users to a site. Malware authors are also demanding money for deletion.

The target is those who illegally download hentai game type (animated porn) in the form of shaped cartoon pornography. Yomiuri website claims there are 5500 people who claimed to have been infected.

Kenzero Viru is being monitored by security company Trend Micro website in Japan.

By masquerading as a game installation view, these viruses require personal details of PC owners.

Furthermore, viruses take the web user history and then publish them online with their name, before sending an email or pop-up screen demanding payment credit card 1500 yen (USD 150 thousand).

That demand is called for "complete violation of copyright laws" web page is deleted.

"We have seen this name previously associated with Zeus and Trojan Koobface. This is a crime gang that is continually involved with crimes like this, "said Rik Ferguson, senior security advisor at Trend Micro.

Kenzero makeup of the virus is that asks ransom, he added, where the malware that infects your computer and do the encryption on documents, images, music and then forced to demand payment for the decryption key.

Website is owned by a company called Romancing Inc. which is registered by a fictitious individual named Shoen Overns.
Source : www.inilah.com

Wednesday, April 14, 2010

Extensible hypertext markup language

XHTML stands for eXtensible HyperText Markup Language. XHTML is a reformulation of HTML forms using the XML paradigm. [1] XHTML is a markup language for the router and the development of HTML which has a capacity of more or less similar to HTML, but with a more strict syntax rules. HTML is an application of SGML (Standard Generalized Markup Language) that is very flexible, whereas XHTML is an application of XML, SGML derivative that is more limited.

Reasons for Using HTML
XHTML improve the deficiencies in the HTML.
XHTML can be run on multiple platforms, allowing us to open the site either through the PDA and mobile phones.
Writing
XHTML is not too different from the HTML 4.01 standard. If you already have the ability HTML 4.01 it will help to launch XHTML. XHTML requires that the writing of tags with lowercase (lowercase) and always closed using the closing tag. Some rules in XHTML
As mentioned previously, XHTML is an improved version of HTML. For that, there are some rules that are more stable and consistent program.

Each tag must be written in lowercase.
Opening and closing tags on the correct nest.
Attribute tags are written with lowercase letters and using quotation marks.
Providing cover for each tag.
Source : www.wikipedia.com

Monday, April 12, 2010

8 WAYS TO AVOID CYBER CRIME

Various facts of evil in the world show off the internet more in line with the development of science and technology. This condition implies that it is not always good science and technology development and is used with care even further dampen the quality and quantity of our society. Therefore, the consumers of science and technology, especially Internet, are expected to have a moral and social values are high not only concerned with the interests of individuals or groups so as not to harm the many.

With the current situation would have been difficult to just rely on a wise statement. You are actively protect themselves from criminal attack on the internet do not just depend on others. There are 8 fundamental way that must be taken to ensure that you do not themselves become victims of the perpetrators of "cyber crime".

1. Protecting Computers
Always use anti-virus applications, anti-spyware applications and firewall.Cek every month whether the antivirus is still the way what does not.
2.Melindungi children
Children are the most vulnerable targets in the virtual world. Monitor their activities while surfing.
3. Always Up-to-date
Update your system regularly along with other security applications like anti-virus.
4. Secure Email
Vigilant in receiving emails from people you do not know. Most damaging emails that carry viruses on the email attachment.
5. Protecting your account
Always use a password with a combination of letters, numbers and symbols that consist of many characters.
6. Make a copy of
Back up your data to avoid loss and theft and damage from the action of a viral infection.
7. Find Information
Active in the development of information about Internet security.
8. Protect your identity
Never let a profile on the parties obviously did not know his origins.
Source : www.id.shvoong.com

Dribbling TRICKS WEBSITE SEARCH ENGINE TO YOUR BLOG

Website that has been registered with search engines is not enough without the tricks to a minimum. This trick is useful to your Website a good position in search results.
The trick is:
The first stage, list your website URL. To facilitate you make a list of URLs you can try this service on http://www.xml-sitemaps.com

List or a list of URL extensions are different and the search engine has its own characteristics regarding the format of the receipt of a list of URLs. More details see the following file formats.

• sitemap.xml: files list of URLs, and file compression sitemap.xml.gz who registered later in Om Google.
• ror.xml: files list of URLs to be exchanged via RSS Feeds.
• urllist.txt: files list of URLs, and file compression urllist.txt.gz to be registered into the Yahoo search engine.
• sitemap.html: files list your URL to serve to guests and reserve for other search engines.

The second phase, upload formats a list of URLs that have been made to your webhosting (usually in the public_html).

The third stage, list the files into various search engines like Google by using Google Webmaster Tools service, Yahoo with MSN Live Webmaster Tools service it, and other popular search engines.
Good luck and see the results.
Source : www.id.shvoong.com

Sunday, April 11, 2010

Internet Protocol

Internet Protocol is a network layer protocol (network layer in the OSI Reference Model) or internetwork layer protocol (internetwork layer in the DARPA Reference Model) used by TCP / IP for addressing and routing data packets between hosts in a computer network-based TCP / IP. A widely used version of IP is IP version 4 (IPv4) defined in RFC 791 and published in 1981, but some time to come will be replaced by IP version 6.

IP protocols offer services
IP offers the service as a protocol between the network (inter-network), because that IP is also often referred to as a protocol that is routable

IP protocol supports multiple clients, because that IP is a "courier" carrying data that is sent by the protocols higher layer comparison.

Send data in the form of IP datagram, since it only provides the IP is connectionless data transmission service and not reliable (unreliable) to the protocols that are higher than the IP protocol.

It is independent of the network interface layer (first layer in the DARPA Reference Model), because that IP is designed to support multiple computers and network interfaces.

To support the largest frame size that is owned by the network interface layer technology is different, the IP can make towards solving the data packet into multiple fragments before placed on a network channel.

Can be expanded by using the IP Options feature in the IP header.

Source : www.wikipedia.com

Hotspot

Hotspots are certain places that have Internet service using Wireless LAN technology, such as at universities, plazas, malls, restaurants, libraries or airports. Internet service like this, there are paid and there are provided free of charge. [1]

Hotspot concept was first proposed in 1993 by Bret Stewart and when Networld Interop conference, in San Francisco.

Some components in the hotspot are:
Mobile station
Access Point
Switch, Router, Network Access Controller
Web server or other servers
High-speed Internet connection
Internet Service Provider
Wireless ISPs

There are several commonly used types of hotspot, namely: [3]

Free hotspots as an additional general customers.
Hotspot is paid directly to the landlord.
Paying to wifi hotspot hotspot operators, such as Boingo, iPass. Threat
Today, more and more hotspots are available in many public places, but every time you make a connection at a hotspot is actually endangering your PC or laptop itself. . This condition is possible at all for the hacker to access the hotspot user's credit card, if you conduct transactions online.

Source : www.wikipedia.com