Jumat, 03 Juni 2011

10 Steps To A Safe, Smooth Running PC

readthenrate.com
10 Steps To A Safe, Smooth Running PC By Michael A Silva
These ten steps will help you increase your computer's security. From discovering viruses to learning how to avoid them, this article is a must read!
Windows password This is the easiest way to make sure you know who is using your pc. Choose a lengthy password that contains capital and lower case letters. Including a number or two will greatly increase your security. Having a Windows password means that the only people that can log onto a Windows session are people that you have granted access to.
Password manager You should never write your passwords down. Using the same password all the time will also make it very easy for hackers to reach your personal information. So if you can't write it down and you're not
supposed to use the same one – how are you supposed to keep track of all of your passwords? The easiest way to do this is to use a password manager. We prefer to use Roboform. Roboform is an easy to use password and profile manager that docks neatly into your Internet Explorer toolbar and keeps track of all of your passwords for you. Roboform also uses a master password system. You will have one password that accesses all of the passwords in the program. This way you can keep all of your information safe and secure. You can download Roboform for free by http:// www.roboform.com.
Spyware Remover Next to spam, spyware is the internet's biggest annoyance. By definition, spyware is "any software that covertly gathers user information through the user's Internet connection without his or her knowledge, usually for advertising purposes. Once installed, the spyware
monitors user activity on the Internet and transmits that information in the background to someone else. Spyware can also gather information about e-mail addresses and even passwords and credit card numbers." The amount of spyware that exists on your pc is dependent on the amount of internet surfing you do. A good rule of thumb here is to scan for spyware once per week or whenever poor system performance surfaces. If you don't have a spyware scanner, we recommend http:// www.webroot.com.
Antivirus This should go without saying, but if your computer is connected to the internet you need antivirus software. With weekly scans and program updates you should be protected
from most threats. For added protection, we
recommend using more than one anvtivirus scanner.
Firewall A firewall will keep unwanted visitors out of your computer. You can obtain a firewall either by using software application like ZoneAlarm or Black Ice Defender, or by using a router with your internet connection. For more information on routers plese visit http:// www.Linksys.com.
File sharing Basically, file sharing programs are the single biggest security risk you will come across. This is because the only facts you have about the files you are downloading are the file name and the file size. It is quite simple to change a filename to dupe someone into downloading a virus or other malware like keystroke recorders. Our advice – stay away from file sharing at all costs. If you need to use it, make sure you have updated antivirus software installed and running.
Research In a sentence – know what's out there. http:// www.Symantec.com has a section on their website that will serve you well. Knowing what types of viruses exist and how to avoid them will make you a much smarter internet user.
Email protection Most of the antivirus applications available offer email scanning. If yours does not, you will want to get one that does. Email scanning will make sure all of your incoming and outgoing emails are safe for both you and the recipient. Email viruses spread very quickly by using your address book to propagate. Never read email from people you don't know and always make sure your email scanner is active.
Network security Another way that viruses spread is through computer networks. We have a few quick tips to keep your network safe. Always scan any files that come in from other computers. Even if it's a file you have brought from home. Never allow a file to be placed on your network until it
has been scanned. The main server should be the only computer with file sharing enabled. By not allowing computer users to transmit files, you can quickly neutralize a threat.
Maintenance Performing weekly virus and spyware scans will go a
long way to keeping your computer safe. Defragmenting weekly will also greatly improve performance. If you put in the effort, you will be rewarded with a safe and smooth running pc. Not to mention less headaches!
By following these ten guide lines, you will greatly improve the performance of your computer. You will also generate peace of mind as you gain a new sense of security.
------------------
For more information on affordable hosting packages, website builder software, dedicated and shared server packages, website design and promotion services and specialized fund raising and campaign websites please visit us at http://www.ipowereurope.com

Rabu, 01 Juni 2011

Bluetooth

readthenrate.com
What is Bluetooth
If you have recently purchased a cellphone you may have been told whether or not your device was Bluetooth capable. Bluetooth technology enables a completely wireless headset that attaches onto the ear of the user. It allows the user to communicate hands free with no additional wires. Bluetooth technology prides itself on being very secure and having privacy as one of its main focuses. The device looks almost space age like something out of Star Wars since it fits directly on the ear and is very small like most advanced technology.
Why Own a Bluetooth?
The most obvious reason to own a Bluetooth is for the ability to talk hands free while moving around or driving. Many state are beginning to implement traffic laws that forbid the usage of cellphones without a hands free device. Bluetooth technology will become all important for people that are on
the go that need to reach the home or office while driving. Not to mention they are very convenient while shopping at the supermarket and one forgets what they were supposed to purchase. It allows the user to call home to find out what needed to be purchased.
About Bluetooth Technology
Bluetooth comes equipped with a 2.45 GHz which is a tranceiver that sends and receives in an unused frequency. It is able to be accessed around the world. Also, each bluetooth has its own 48 bit address. The connections are in the format of point to point or multipoint in nature. The furthest range allowed is ten meters at this time, so it is a short range wireless device. Data
travels at a speed of one megabit a second.
How Bluetooth Can be Used
Bluetooth is by far not just to be used as a hands free device for a cellphone. In addition, Bluetooth can allow for the exchange of information between multiple devices such as:
digital cameras, GPS receivers, laptops, mobile phones, PC's, printers, and video game consoles. The communication passes through a secure, short- range radio frequency. It is licensed on a global level.

Burglary Victim Remotely Controls His Stolen Laptop

KOMPAS.com - A designer who had his laptop stolen
helped police by using a spy
camera programme to take
pictures and catch the thief
red-handed. Joshua Kaufman
thought he had lost his Apple MacBook when a thief broke
into his apartment and stole
the computer in March. And with police giving his
burglary report a low priority,
he was resigned to never
recovering the expensive
laptop until he remembered
the software he had installed on his MacBook. Using 'Hidden' software, he
remotely took pictures of the
thief using his stolen computer
- before handing the evidence
to police to make an arrest. Mr Kaufman captured the thief
in a variety of bizarre
locations - including using the
stolen MacBook in bed, and in
his car. 'Hidden' also provided him with
location information, which
police in Oakland, California,
used to identify the thief as a
taxi driver. Officers then caught the thief
by arranging for a 'pick up'
from his car firm and arresting
the man when he appeared in
person. Mr Kaufman said he started
using the software once he
realised his laptop had been
stolen when the thief got into
his apartment through an
open window on Monday, March 21. He also lost a Kindle and some
jewellery stuffed into a
computer bag. A few days
after activating the program
he started receiving pictures
revealing of the hapless thief in action. Mr Kaufman said: 'The following
Thursday I started getting
images and location
information. 'I was amazed. I was, like, this
thing actually works!' The thief was captured using
Mr Kaufman's computer to
browse Middle Eastern music
videos, changing the laptop's
account information and even
typing a password to get on Facebook. But his one-man investigation
hit an obstacle when police
told him they didn't have the
resources to follow up his
complaint - despite him telling
officers exactly where the thief was. It was only when he created a
blog - 'This Guy Has My
MacBook' - which generated
support from thousands on
the internet, that police were
forced to revisit the case and eventually catch the thief. Mr Kaufman added: 'I was
excited, honestly - it feels like
the power of the Internet is
on my side. 'They (Oakland Police
department) said, we're really
sorry you fell through the
cracks.' Mr Kaufman said he was told
by Holly Joshi, OPD's director of
public relations: 'We have
about 2400 theft reports that
come in per month, and 3
theft investigators.' After two months of ignoring
Mr Kaufman's information,
Oakland Police finally nabbed
the thief on Tuesday night
after he was caught on
camera. He tweeted shortly after:
'ARRESTED! An Oakland police
officer just called me to let me
know that they arrested the
guy in my photos! BOOYA!' Later, he tweeted: 'This just in:
MacBook acquired by the OPD!
The officer was so kind on the
phone: "It's these kinds of
partnerships that make things
happen".'

Selasa, 31 Mei 2011

Computer Viruses - the basics

readthenrate.com:
In its simplest terms a virus is a disruptive computer code period!
A computer virus almost always repeats itself and spreads by attaching itself to other files. Viruses can be made to host a number of harmful things on any computer from disrupting files to crashing networks. It can even be laying dormant, without you knowing it's there and then attack when least expect it, like right in the middle of downloading a large file or typing
a long report.
It can even be made to open at a certain date, sitting like a timebomb until it's time arrives. As you can see it can be annoying at the very least.
I do not want go into all the different types of viruses here because there are so many and more are being made everyday in some dank basement by the Dark Lord.
However, since so many viruses came from unknowingly opening e-mails I would like to mention some basics here:
Never open e-mail attachments unless you know for sure who it's from and that it's safe.
Some mail programs will even ask if you trust the attachment and if you're sure this you want to do. Your computer software can also scan attachments for viruses.
The danger is that when the attachment is opened the virus can attach itself to your hard drive and damage files. Not only that, it can search your saved e-mail addresses and send itself out to your friends, business partners and whoever is on the list, masking the message to look like a legitimate one from you. It will probably have an attachment
too and when opened will infect other computers.
Many people like to download music, video, games or other programs from different sites. If it is a site you dealt with before and trust it may be safe ok, but if you're not sure you can always run a virus scan on the download before installation. (You will need to check the anti- virus program that came with your system on procedures). This
security measure is necessary because some downloads may contain virtues, spyware or adware – these last two can collect personal information, note
your browsing habits and spam your e-mail with unwanted ads. Some software sites will offer a readme file that shows technical information on the download (if you like tech talk) as well as contact info.
The better sites that offer downloads will test and scan all there software programs before going online with it. As a last resort you can do an internet search for reviews on that particular company to see if others got burned.
This may sound scary to some but the fact is in this world anyone who owns a computer will have to look over there shoulders for hidden attacks when working with online.
That said there are some things should do to prevent viruses from attacking your computer:
* Download the latest virus definition lists ( files that tell your computer what to scan for)
that's used for your anti-virus program.
* Check to see if your internet service provider has tools to stop viruses before they can reach your mailbox.
* Always back-up your computer on CD-R disks or other media in case you loose some or all your data.
* You can scan software for viruses before installing it. (See system manual for procedure)
* Set your security settings at the highest level.
* Check your web browser and e-mail settings.
Doing these things at least every week will help keep your computer up to date on Virus protection and running safely.

Extend The Life Of Your Laptop Battery

readthenrate.com:
If you are the owner of a laptop computer, you know how frustrating it can be when you are working on the laptop and your battery is low. If you are constantly on the go, it is sometimes difficult to find a place
to plug in your computer to let it recharge. There are a few things that you can do to help you take care and extend the life of your laptop battery.
General caution should be observed when running the battery of your laptop. A laptop should be plugged in to the AC adaptor whenever possible. This will ensure that your laptop battery is always charged and ready to go when it is needed. Another tip is to not expose your laptop to extreme weather conditions, especially very cold temperatures. A cold battery will run much slower than one that is warm. Also, try not to use your laptop for long periods of time without recharging the battery. This can cause information to be lost if the battery sudden stops working.
When using your battery on your laptop, remember use as little power as you can by adjusting the settings on the laptop. This will make your computer go inactive when not in use for a certain amount of time. Adjusting the power setting
is easy if you go into the control panel and set the display time. It is also possible to adjust the brightness of the screen display to help the life of the laptop battery. Remember to turn programs off that you are not using. This will waste battery usage quicker. Also, running movies and videos will quickly drain the battery charge.
When using your laptop battery you will want to make sure you check the battery charge frequently. Charge your laptop as soon as you see the battery getting low. Whenever you can, plug in your computer. It is a good idea to always plug in your computer so that it is ready to go. Also, take care of your battery. It is important to clean the laptop battery and keep it free of dust and debris. Using canned air or a cotton swab on a regular basis can do this. The battery will run longer if it is cleaned frequently.
Another tip is to have an extra battery on hand. These are easily purchased. Have at least one fully charged at all times for a quick battery change. Some laptops can run with two batteries. Most laptops are also compatible with external batteries that can easily be added and changed when necessary. Battery charges that work in the car are also good options for anyone taking their laptops on trips. Also, if you are purchasing a new laptop computer, consider buying a smaller, lightweight version. These are more efficient and are able to run longer on a battery charge than the larger laptop versions. Following these basic tips can help extend the amount of time your computer can run with a battery.