Wednesday, March 31, 2010

All programs on the computer makes it easy to uninstall Norton

Uninstall all products
Norton antivirus antivirus is one of several popular antivirus in addressing local virus outside nd. Obviously, a fairly powerful antivirus software requires the hardware specifications of more than ordinary standard in order to run the program properly and smoothly.
For computer users with computer specs are quite common, it must be the Norton antivirus has a fairly long process when executed. So also in the process of uninstalling it.
Norton Removal Tool helps users to remove some Norton software on your computer easily. Norton Removal running on Windows OS. Norton Removal is used if the user's computer will be to uninstall the Norton program using Windows ADD / Remove programs, but did not go well. This application can uninstall all Norton products 2003-2010, Norton 360, Norton SystemWork 12.0

Source : id.shvoong.com

Computer Networks

Computer network is a system comprising computers and device other network working together to achieve a same goal.

Criteria computer network is divided into 4, namely:

1. Based on the distribution of sources of information / data

- Network This network consists of a centralized computer where the client and the server that the client computer that serves as an intermediary to access sources of information / data derived from a single computer server

- Networking is a combination of several networks of distributed centrally, so there are several computer servers that are interconnected with the client to form a specific network system.


2. Based on the geographic reach is divided into:

- Network LAN is a computer network that connects 2 or more in coverage such as laboratories, offices, and in 1 cafe.

- Network MAN network is covering a large city and its local area. Examples of local telephone networks, cellular telephone systems, as well as some ISP's internet relay network.

- WAN Network A network with worldwide coverage. Examples of PT network. Telkom, PT. Indosat, as well as networks such as GSM Cellular Satelindo, Telkomsel, and many more.


3. Based on the roles and relationships of each computer in the process data.

- Network Client-Server In this network there are 1 or more server computers and client computers. Computers that will be a server computer or client computer must be altered through software on the network protocol. As an intermediary for the client computer can access data on a server computer and the server computer provides the information required by the client computer.

Networking-Peer-to-peer network does not exist at the client computer and server computer because all computers can do the delivery and reception of information so that all computers function as clients as well as a server.


4. Based on data transmission media

- Wired Network (Wired Network) In this network, to connect one computer to another computer network cables required. Function in the network cable to send information in the form of electrical signals between the network computer.

- Wireless Network (Wireless Network) is a network with the medium in the form of electromagnetic waves. On this network is not necessary cables to connect between computers because it uses electromagnetic waves to transmit signals between the computer information network.

Source : www.wikipedia.com

Tuesday, March 30, 2010

Computer ethics

Computer ethics is a set of principles or values related to computer use. Computer ethics derived from the syllable 2 ethics (Greek: ethos) is the customs or good habits in individuals, groups and communities and the computer (in English: to compute) is a tool used for calculating and processing data.
Computers Ethical Issues Around
The birth of computer ethics as a new discipline in the field of technology can not be separated from issues around the use of computers, including computer crime, netiquette, e-commerce, intellectual property infringement and professional responsibilities.

Computer Crime
Computer crime or computer crime is a crime arising from the use of computers illegally. Computer crimes continue to evolve with advances in computer technology today. Some types of computer crimes include Denial of Service (a service crippling computer systems), the spread of viruses, spam, carding (theft via the Internet) and other

History of Computer Ethics
Computers found by Howard Aiken in the year 1973 computer discovery in 1973 was a milestone in the birth of computer ethics that evolved to become a new discipline in the field of technology.

Source : www.wikipedia.com

E-mail sent from the Tomb of the Website

When are we going to die no one knows. It turned out that it prompted one Australian entrepreneur had a strange idea. He opened the website so someone can contact the people who loved from the grave and could apologize or just leave.
All of this comes from Peter Ingram, a retailer of security systems, saw a friend he had known for 20 years. He was a patient of a hospital that has a lifetime only two weeks. Aunt 100% aware of what is happening and be able to understand what was happening around him but unable to do anything about it until his death with a secret.
This is a load Peter Ingram launched the website a virtual machine the first time Australia. Website called FromBeyond2u.com. On this website you are given the opportunity for the living to be able to leave video, photos and documents to be sent to loved ones after death.
For one dollar per week, users can save "precious digital memories" and make a farewell message at the time of his death or critical dates such as birthdays or celebrations in the future.
Customers can write their own speeches and creating multimedia offerings for use in their own funeral, and the left image and video files they

Source : id.shvoong.com

Monday, March 29, 2010

Criminals prey on Vulnerable Children

Facebook is a social networking site was also attractive to children aged 8-12 years. Though vulnerable children fall prey to criminals who roam the Internet.

That's what is revealed from a survey of media supervisor, Ofcom. From the survey found that one in four 8-12 year olds have a profile on the social networking site, one of whom is on Facebook.

This fact certainly invite concern for vulnerable children fall prey to the criminals on the internet. Even more alarming, the parents claimed not to know that the baby they visited social networking sites, so they do not monitor the activities of their children in cyberspace.

"At the time raised concerns about the increased risk (exploitation) of the child, it was not there for increasing supervision of parents," Ofcom said.

According to Ofcom, as quoted from the Mirror detikINET, Monday (29/3/2010), one of seven children aged 8-15 years old so easy indulgence in their personal profile on the internet. This of course increases the risk of children become victims of predators.

"From the survey, which involved 2131 children, also revealed that 3 out of 10 children aged 12-15 years old have a computer in their bedroom," said Ofcom.

Moreover, Facebook is a trend now, have a friend on Facebook is pride.

So for those of you who have children aged 8-15 watch out.

Source : detik.com

Sunday, March 28, 2010

Speculation YouTube Attacked In China Denies Google

YouTube video sharing site can not be used about an hour. But Google, the owner of the site death YouTube says it's not because the intervention of outside parties.

"YouTube is still overcoming the technical issues yet to be resolved," said a Google spokesperson. "We know how important YouTube for many people and we apologize for any inconvenience death YouTube servers and services that happen."

Around At 07.00 - 08.00 local time, YouTube extinguished for an hour. A source said that YouTube is not the result of events of the attack or any movement associated with Google's move could stop the censor searches in China.

Over time extinction YouTube, Internet users can still access the individual videos, but YouTube's main page keep coming back to the message 'HTTP/1.1 Service Unavailable'. Sources claim that Google's basic policy can not discuss details of the cause of the extinction of these services.

The search engine giant was involved in a dispute with China since the communist state in January 2010, when Google claimed to target high-level attacks originating from China.

"I think a lot of people, and understandably suspicious of China's conduct technical measures to punish the Google," said Ron Deibert, Director of Public Laboratory at the University of Toronto. [Ito]

Source : www.inilah.com

Saturday, March 27, 2010

How to Be Safe Twitter

Twitter development in Indonesia was so fast. A report from ReadWriteWeb.com states that in early 2010 Twitter user Indonesia sixth largest in the world.

Twitter increased rapidly throughout the world. The increase was made Twitter as an easy target cyber criminals, "said Ema Linaker, Global Head of Online Engagement AVG, a computer security company, in a press release.

One type of threat is quite popular these days is a fake phishing site alias. Perpetrators usually rip off the victims account and use that account to send a private message or Direct Message (DM) to the follower of these accounts.

DM it will contain a link that will lead users to a fake site. After that, the theft of information and data began.

Linaker offers ten tips for Twitter users to always be safe:



* Limit your talk

Users often feel easy about the location and call their activities. Minor comments given in response over time can be used to determine the schedule and plan activities that users daily. Criminals ready to become the next victim.

* Be careful Open Link

Many people use a URL shortening service on Twitter, so it is often difficult to really know the site. AVG LinkScanner feature in AVG Antivirus can be used to check these links. But when the rising doubts in the liver, the links should not be opened.

* Watchful

Watch for suspicious activity on the timeline or inbox. When starting the messages suspicious or your friends start sending messages smell spam, you should check whether an account is broken peer or not.

* Think before Tweet

Tweet can be read by everyone even after deleted. Think carefully what you want to write.

* Do not Hurry Trust

You never know who your follower. Do not easily believe in and make friends with people who may have bad intentions.

* Check the Third Party Applications

There are hundreds of applications on Twitter. Before you use, make sure safety. Look for lots of applications discussed in the trusted sites. Remember that applications always ask for the key word and ID.

* Password Information

Use passwords and e-mail is different for each of your social networking account. That way, when you close the account,

You can easily delete the e-mail account.

* When Log in

Check your browser settings, make sure that the information is not recorded when you use the computer together.

* Beware of Phishing Attacks Against

Beware of attempts to obtain personal information through a tweet or DM.

* When Using Cell Phones

Be careful with cell phones and just anyone who can use it. If you have a Twitter application, make sure you always log out after use.

Source : tempo