About Technology

update technology ,more fast more smart...

GPS Tracking For Children: What You Need To Know

Written by oneself on 10:05 PM


by: Alvin Toh

GPS or global positioning system is a tracking system that can keep track of location via the use of satellite systems. A GPS tracking device can easily be attached to a car, person, backpack, etc.

What is GPS tracking for children?
GPS tracking for children uses a lightweight tracking device that can attach to a backpack or clip onto pants. Some GPS tracking devices for children are worn like watches or even attached to the shoes. The GPS tracking for children allows parents to easily find a child who gets lost or wanders away. It can also be used to help locate a child that is abducted.

How does GPS tracking work?
The GPS utilizes satellite-based navigation techniques. There are a series of satellites used for this purpose which were put into orbit by the U.S. Department of Defense. The signals emitted are specially coded so that the receivers can process the information and distinguish it from other information. GPS satellites are constantly circling the earth, providing precise information. The system can take the information from the signal and calculate the exact location of the user.

GPS tracking is done through various companies equipped for this service. The GPS device is purchased and programmed appropriately. Parents subscribe to a monthly user service. The fees for these services vary. The tracking device is attached to the child or kept in the child’s possession and turned on. The system can track people to within about several yards so it is quite accurate.

What can I find out from the tracking system?
That depends on the type of tracking service you get. There are some service plans that offer several “trackings” per month while other plans may offer unlimited trackings. Some can give you the tracking information through the internet or by telephone while others may provide software for your computer so that you can do the tracking yourself. Most tracking systems offer optional reports so you can see the activity on the tracking device. Real time tracking is typically more expensive.

Most parents use GPS tracking system to find a child that is lost. The technology is able to locate the street or actual address of an individual with incredible accuracy. Parents can use tracking software to find the location or call up the tracking company who can quickly provide details of the location.

What are the negatives?
For one thing, GPS tracking systems for children are expensive. Expect to pay anywhere from $150 onwards for the device itself. Monthly service plans may cost between $25 and $100 a month. Multiple devices (for several children) definitely cost more.

GPS tracking system for children can give parents a peace of mind. However, some children, especially as they become older, may not want to use the device and they may simply turn it off. Nevertheless, it should be considered a valuable parenting tool that is particularly well suited to younger children. Don’t use the device instead of good old-fashioned parenting. Always provide ample age-appropriate supervision to your children.

--------

Children are naturally curious and tend to wander off easily. The stress and anxiety associated with losing a child can be awful. GPS tracking for children helps to determine your child's location instantly and eliminate the unknown. Check out our top resources on GPS for children at www.gpstrackingsys.com

Read More......

Web-design & hosting

Written by oneself on 9:57 PM

Dean Barnard

The elements in web designing and development are numerous. In effect a web-site is a multimedia experience which includes text and graphics as the lowest denominator. Advanced web-sites may include streaming audio, video and animations. The steps which are required for development are:

Creation of separate individual components. This may include graphics and photographs. Adobe Photoshop and other graphics suite can be used to create, manipulate and convert images to suitable formats. For example a bit map image has a large file size which may take a very long time to download. This needs to be converted to a GIF or JPEG image which results in small file sizes. The images can also be converted to vector images by using software like Flash.

Create animations using GIF animator and Flash like software.

These images, text and animations are then loaded on a web page using software such as Adobe Dreamweaver and Microsoft FrontPage.

Creation of navigation buttons with rollover effects etc. needed to navigate between the web pages of a web-site.

Once the web pages are ready they have to be uploaded on a host computer server which is called hosting. The web-site has a unique address called domain name which can be obtained from domain name registrars.

Web Hosting

There was a time when I had all my web pages ready but did not know how to showcase my great creative genius to the wide world. Initially, I imagined converting my own computer into a web server. But I was soon to realize that hosting my site would bite into my pocket. The first step towards hosting was obviously to get a domain name registered. Nowadays there are many who provide the registering service. By the time I could register my favorite name, it seemed that all names were already taken. I was advised to put some numeric into the name which I reluctantly agreed to do. Maybe why many sites have some number thrown in? The web-site looks iffy too.

Next, I searched for an appropriate 'Hosting' service provider who would accept my humble five pages of offering. These providers have different packages to suit your requirement. A basic service without database connectivity can work out to be very cheap. You can also host you web-site totally free. Just search for it on the internet. Linux servers seem to be the flavor of the day and they are more economical than Windows servers, which should anyway not bother you, unless working with databases like SQL server. Once a host is found, it is pretty easy to upload the files and look at your wonder child with wonder.

About the Author

My profession is IT ranging from small business to large, the tools and knowledge that I have I will be sharing with you to maximize your business. Join me at http://deansitsupport.com

Read More......

Skilled IT Personnel Shortages Soon to Hit Crisis in Canada and the US

Written by oneself on 9:08 AM


By L. Winslow

It is a well-known fact that there is a severe shortage of competent and qualified IT people out there. Some of the reason is due to our Governments working to build the eGovernment initiatives, to systematize and become more efficient. Obviously, from a taxpayer's standpoint, that sounds good to you and I - if only the IT hackers were having a shortage too?

There are 86,000 IT people projected to be needed in the next five years in Canada alone, but they only graduate about 3,000 per year. Of those, 3,000 many are so new that they do not fully have the hang of things. The problems in the US are even bigger, of course the numbers are larger. If you look at all the needs of Washington DC for IT, you can immediately see the problem. What is the problem here and how can we solve it?

There are shortages of math and science majors, nurses, computer people and many other degreed personnel. Why are kids not flocking to these high paying careers? Well, it seems that parents are partly to blame, as IT Industry Analysts and College Admissions professionals say. IT is not glamorous, parents do not want their kids to grow up to be nerds and the parents have no real reference in their minds - IT, what's that, we do not want you to grow up to be a professional geek.

Something must be done otherwise all these perfect systems we are building to help control our ever growing complex civilizations will fail and when they do, who will fix the code, fix the problems and protect our data? Think on this.

L. Winslow is an Economic, Political and Technology Advisor to the Online Think Tank, a Futurist and retired entrepreneur http://www.worldthinktank.net . Currently Mr. Winslow is planning a bicycle ride from Canada to Mexico and in Spring across the US from San Diego to Virginia Beach to raise money for charity. Previously he was a track star athlete, private pilot, involved in politics, community volunteerism and a Franchising Founder. Mr. Winslow has choosen 100 titles of Books he wishes to write and has completed ten thus far. The subjects include; Community Planning, Future Tech, Franchising, Small Business, and Third World Issues.

Article Source: http://EzineArticles.com/?expert=L._Winslow

Read More......

What You Need To Know Regarding OC12 Applications

Written by oneself on 6:03 PM

An OC12 is a type of high-speed dedicated circuit. The OC12 transmits data at a speed of 622 Mbps. It is a large group of circuits that is equivalent to 4 OC3’s or 1344 T1s. The term OC stands for Optical Carrier. The OC12 circuit is a specific range of digital signal that can be carried on SONET fiber optic network. There are various levels of OC circuits depending on the data rate bit stream that can be carried by the signal.

A T1 is a high-speed dedicated circuit that consists of 24 channels. Each channel is flexible and is available to anyone when not in use. This makes the T1 extremely useful. The amount of T1 circuits required to provide service to your office is less than the amount of dedicated circuits that previously may have been needed. Each T1 can provide service to approximately 50 to 100 typical telephone users.

The T1 is the smallest unit of dedicated digital circuits and transmits at a speed of 1.544 Mbps. The T3 is equal to 28 T1s and transmits at a speed of 43.232 Mbps. An OC3 consists of 100 T1s and transmits at a speed of 155 Mbps. An OC12 transmits at a speed of 622 Mbps and equals 4 OC3s. An OC48 equals 4 OC12s and transmits at a speed of 2.5 gigabits per second. An OC192 is the largest grouping of T1s available and consists of 4 OC48’s transmitting at a speed of 9.6 gigabits per second.

OC12 circuits are typically used in large network backbones. Because of the large bandwidth of the OC12 you will be able to run most any application. You will be able to transfer large data files with ease as well as run streaming video and graphics. It can be used for any bandwidth intensive application. OC12 circuits can be used for voice, data or a combination of both. Because of the extremely large bandwidth you will be strategically placed for implementing new applications as they become available, keeping you on the cutting edge of technology. An OC12 can also be used as the backbone for large applications such as for an ISP provider.

When evaluating your business to determine what type of service you need take several things into consideration. First, understand the amount of traffic, both voice and data, that you intend to put over the circuits. You can find this information from current usage reports or bills. Second, take into account the possible growth potential of your business. Always add on at the very least 10% for future growth. If your company is experiencing fast growth patterns you should add on more, up to 25%. Finally, consider the applications that need to run over the circuits. Be sure to consider possible future use of new applications. Think about Internet access, web sites, streaming video, graphics and other potential bandwidth-heavy applications.

A technical support specialist can help you determine which type of circuit will work best for your potential application. Using your information, they can aid you in appropriately sizing your telecommunications services. Be sure to allow plenty of time for engineering and installation. A large installation of this magnitude can take months to complete, depending on the capacity of your local central office, where the lines need to originate.

Consider the service plan needed to ensure proper ongoing service on your OC12. Make sure that the service options include hours and days that your business is open. If your business is open 24/7 (such as an ISP) you will need to ensure that service corresponds to this requirement.

With careful planning and execution the OC12 can save you money in the very first year. Then, plan on monthly and yearly savings that will be significant.

About the Author:

Article written by Van Theodorou, you can receive a free analysis to see if you qualify for his guaranteed lowest T1 long distance rates and receive more T1 information at his T1 Learning Cen

Read More......

Better Computer Performance - 9 Free Or Inexpensive Fixes

Written by oneself on 5:46 PM

by Jed Jones

Poor computer performance by your Windows-based machine can sneak up on you gradually. You may find its performance deteriorating increasingly until one day you realize you must fix it or buy a new one. Signs of poor performance can include applications running very slowly, programs closing or freezing up suddenly, and a generally slower response time to OS (operating system)-related commands. I have compiled 9 fixes for you here that you can leverage right now to greatly improve your computer's performance.

Fix #1: Download and run MS Service Pack 2:

Every operating system requires patches and upgrades by its maker from time-to-time, with Microsoft XP being no exception. While Service Pack 2 was released in 2002, some people with older systems are still not running it: make sure your computer is. You can download it FREE from Microsoft's Web site.

Fix #2: Run the Disk Cleanup utility:

Your computer likely has a number of unused and unneeded files that take up valuable space on your hard drive and slow performance. Run your FREE, built-in Disk Cleanup utility to automatically remove these files. Find it by going to: Start | Programs | Accessories | System Tools | Disk Cleanup and following the prompts.

Fix #3: Defragment your hard drive:

Over time, your computer will store files in an increasingly inefficient manner on your hard drive, affecting file retrieval times and other performance factors. To fix this, you need to defragment your hard disk drive. To do this for FREE, just go to: Start | Programs | Accessories | System Tools | Disk Defragmenter. First, highlight the drive you want to clean up (e.g., C drive) and choose Analyze. Once complete, choose Defragment. Note that the defragmentation process could take up to an hour or more, so do this during a time when you can step away from your computer.

Fix #4: Run an anti-virus tool:

Computer viruses are malicious programs that drastically affect your computer's performance, either all at once or insidiously over time. You can stop a virus attack by installing and running anti-virus software which performs regular scans, locates the offending viruses and quarantines them.

Fix #5: Clean your registry:

Your computer's registry is a tool that most non-computer specialists never see but which is vitally important to computer operations. Your registry stores settings and options for your hardware, operating system, and other software. Unfortunately, given its fundamental role in the performance of your system, your registry is often the target of attack or infection. To thoroughly and automatically clean your registry, run a regular registry scan using a registry cleaning tool. I recommend RegCure, which recently found 1,626 problems with my registry (ugh!), is cheap and easy to use.

Fix #6: Run anti-spyware software:

Spyware is computer software that installs itself in your computer and performs a number of unwanted functions, including monitoring your computer usage and interfere with your control.

It represents a real threat and has become a significant problem in recent years. Fortunately, fixes are easy to find and include a number of free and inexpensive anti-spyware programs. Try SpyBot Search & Destroy. Get it FREE online.

Fix #7: Increase your computer's memory:

Today's applications require more and more memory (RAM) to run. If your computer is more than two years old or if you selected the minimal memory option upon purchase, you might benefit from adding another 1 GB or more to your computer. Check online or at your local computer dealer for pricing.

Fix #8: Clean your hard drive:

More comprehensive than the Disk Utility tool introduced above, cleaning your hard drive with professional cleaning software is a great way to improve performance. Try CCleaner for FREE by doing an online search.

Fix #9: As a last resort, re-format your hard drive:

If after trying all of the above items and your computer still performs poorly, a last resort is to completely reformat your hard drive. Warning: proceed with caution since this action will erase your entire hard drive, including your operating system (OS)! If you decide to take this route, consult an online tutorial for how-to steps. At minimum, remember two things: be sure to back up all of your files and applications and retain a copy of your OS on CD so that you can re-install it later.

About the Author
For a great way to improve your computer's performance right now, download RegCure at: www.Protected-Now.com.

Read More......

Sony Introduce New 40GB PlayStation 3

Written by oneself on 5:38 PM

Hamish Hayward

Sony have been losing money on their 60GB PS3 since it was introduced in the UK. Volume of sales has been lower than anticipated - with one significant factor being the high launch price. The pattern has been much the same in other countries worldwide.

The new 40GB PS3, released in the UK on October 10 2007, is the result of some significant cost cutting efforts on the part of Sony. A lot of the changes were made after discussion with PS3 users. Sony advises that it has made the changes after "feedback from thousands of existing PS3 owners as well as research into future potential PS3 owners."

Possibly one of the most controversial decisions was the lack of backward compatibility with both PS1 and PS2 games. However, Sony's research seems to suggest that this is not an important factor for new users. Presumably, anyone who has a lot of PS2 games also has a PS2 console on which to play them. The backwards compatibility with PS1 and PS2 games was one of the more expensive items to implement on the earlier PS3 version.

Here's a nice quotation form Ray Maguire, the MD of Sony Computer Entertainment UK:

"As we approach our first PlayStation Christmas, it is satisfying to be able to offer UK consumers the choice of two PlayStation 3 packages both now representing remarkable value"

And there's no doubt about it - it does look like a better deal for consumers. It seems like a very aggressive marketing strategy by Sony in the run up to Christmas.

It is worth noting that Sony intend that, in future, only the 40GB PS3 will be available in the UK. The price drop on the 60GB model is intended to boost their sales between now and Christmas and use up the existing stock. After the current stocks of 60GB PS3 consoles are depleted only the 40GB version will be available to the public.

Sony also admit that they have been losing money on the 60GB consoles sold to date and, more surprisingly perhaps, admit that this will continue, even on the reduced cost 40GB console. They will lose less money than before, but they will still lose.

Another factor which will help sales between now and Christmas is the increasing number of PS3 games becoming available.

Current game console market leader, Nintendo, advised that there were no plans to cut the price of the Nintendo Wii. According to George Harrison, senior vice president of Marketing for Nintendo America: "We are still selling everything we can make."

Microsoft's XBox 360 had a recent price cut in August of 2007. With the release of the latest offering in the hugely popular Halo series, imaginatively titled "Halo 3", which is currently only available for the XBox 360, a cut in the Xbox price seems unlikely in the near future.


Hamish Hayward

PS3 Review

Review your latest PS3 options online.

Discover the key criteria you must consider before getting involved in any business opportunity. Now available in free e-book format.

Read More......

When To Buy A New Computer And What To Do With The Old One

Written by oneself on 8:13 PM

by Malcolm Grant

Computers are great. When you receive your first computer, you will be amazed and a little confused at what you need. The first time you surf the Internet, you will be hooked; there is no better feeling. As time goes on, you will find that the computer that you purchased does not suit you needs anymore. With all of the tools that are available such as downloads and online games, your computers memory will soon be insufficient. When this happens, it may be time to sell your old computer in order to purchase a bigger and better one.

You can find upgrades for your computer by doing a Google search, however, with the advances that are made in technology everyday, the upgrades may not be compatible with your computer. This is also true when you install a new operating system that may require new hardware. It is very easy to end up spending way more than the cost of a new computer. In some instances, you can save yourself a lot of time, money and headaches just by purchasing a new computer. This is not to say that upgrading your computer is a waste of time and money, only that there are times when it is unnecessary.

Once you have made the decision to purchase a new computer, you have to decide what to do with the old one. Even though it may not suit your needs, it is still a good computer that someone else may benefit from. There are several different things you can do with your old computer.

Kids - When you have school age children, giving them your computer can not only give them great joy, it can also assist them in their schoolwork. In today's school system, many different subjects are taught and they are also required to do homework that requires a lot of research. Your old computer may be perfect for them because you can install educational materials such as encyclopedias and thesaurus' can be installed to assist them with their schoolwork.

Often times, older people will shy away from purchasing a computer because they feel that they are too old to learn how to use one and that it is an expense that they can live without. However, if you give your old computer to them, they will often be more receptive to learning how to use it. Once they catch on, they will wonder how they got along without one. Another advantage of giving your computer to someone who has limited knowledge is that if he or she somehow causes a critical error, it is more easily fixable than with a new computer. This will give him an incentive to learn and later purchase one with more features and a larger memory.

Another thing that you can do with your old computer is to use it to store all of your records and important information such as bank statements as well as insurance and mortgage information. With this use it is recommended to disconnect it from the Internet to avoid anyone hacking into it, and also prevent any viruses from attacking it.

There are many different uses for your old computer. Even if your needs have outgrown the computers capabilities, it can still be a useful machine in your home.

About the Author
Go To My PC is used to make a secure online connection to your PC. Click here for more info about GoToMyPC.

Read More......

Motorola's New Unlocked Phone Motorola Razr Maxx V6

Written by oneself on 8:08 PM

Author: prabakar

Motorola presents new mobile phone Motorola RAZR MAXX V6. It performs very well. This mobile phone uses TFT display technology that is the latest type and has 256K colors with 240 x 320 pixels. The screen is measured as 33 x 45 millimetres. This unlocked phone may also display with secondary external 65K color display with 120 x 160 pixels resolution. It has a camera with 1600 x 1200 of pixels and 2 mega pixels. This V6 phone uses video secondary call with VGA technology.

The attractive dimensions are measured in millimetres as 104 x 53 x 15. The web browsers used are WAP 2.0, xHTML, HTML (opera 8). The message capabilities supported by the device are EMS, SMS and MMS. EMS is E-mail message service that helps to send mails easily with the help of handset from any place. SMS is short message service that helps you to share the text messages in a short way. MMS stands for Multimedia Message Service that helps to share the photos or images with the text message. Memory is an important feature to store ample number of files. Internal memory has 50 MB of storage capacity and it also has MicroSD and TransFlash cards for external memory. It also has much connectivity options. Polyphonic ring tones are different types of ring tones that are default in the mobile.

MP3 ring tones are the song ring tones that will have a very good sound effect. These ring tones are used for incoming calls, messages and alarms. Vibration is a fine feature that helps the mobile to vibrate for a call or message without ring tones. The connectivity used in Motorola RAZR MAXX V6 mobile phone are EDGE which is used for networking process. Bluetooth is a wireless technology that is featured in the device for hands free talking and easy file transfer. To connect to your PC you can make use of the USB port.

The Motorola RAZR MAXX V6 is more than just a phone it’s a statement of individual style. Following the legendary lineage of the MOTORAZR, the Motorola RAZR MAXX V6 weighs in at 3.7 ounces and measures a sheer 0.6 inches thick. Comprised of metal housing and chemically hardened glass displays, the Motorola RAZR MAXX V6 does more than just reflect your sophisticated style. A vibrant 2.2 inch 256k color screen and touch music keys that illuminate to brighten your daily routine. Please purchase online www.phoneandbeyond.com

Source: http://www.articlesbase.com

About the Author:

Representing Motorola RAZR MAXX V6 in the website www.phoneandbeyond.com

Read More......

System Restore Process in Windows Xp

Written by oneself on 5:36 AM

By:Arun

The System Restore feature of Microsoft® Windows® XP (the operating system previously known as Microsoft® Whistler) enables administrators to restore their PCs, in the event of a problem, to a previous state without losing personal data files (such as Word documents, drawings, or e-mail). System Restore actively monitors system file changes and some application file changes to record or store previous versions before the changes occurred. With System Restore, users never have to think about taking system snapshots as it automatically creates easily identifiable restore points, which allow users to revert the system back to a previous time. Restore points are created at the time of significant system events (such as application or driver install) and periodically (every day). Additionally, users can create and name their own restore points at any time. System Restore has an automatic restore point space-management feature that purges the oldest restore points to make room for new ones, so that a rolling safety net is always kept under the user, enabling the user to recover from recent undesirable changes.

If users experience system failure or another significant problem, they can use System Restore from SafeMode or Normal Mode to go back to a previous system state, restoring optimal system functionality. System Restore will not revert user data or document files, so restoring will not cause users to lose their work, mail, or even browsing history and favorites

Detail

System Restore is enabled by default and will run upon the successful completion of either the Windows XP Professional or Home version installation. System Restore uses 400mb or 12% of the Hard Drive (whichever is greater) by default. It requires a minimum of 200 MB of space available on the system partition. If there are not 200 MBs available, System Restore will install disabled and will enable itself automatically once the required disk space is created.

Design Overview

System Restore monitors a core set of system and application files, recording and sometimes copying states of these files before changes are made. Monitored files include those that are not in excluded directories (My Documents) and that do not have known data file extensions (such as .doc). System Restore automatically creates restore points; no user intervention is required. To create a restore point, System Restore takes a full snapshot of the registry and some dynamic system files. For a list of file extension types, which are included (monitored and restored), refer to the Monitored File Extensions list in the System Restore section of the Platform SDK.

To restore a system, System Restore reverts file changes done to monitored files, recapturing the file state at the time of the selected restore point. It then replaces the current registry with the “snapshotted” one, which coincides with the selected restore point. Some security and dynamic rights and authentication information from the current registry is then copied to the restored registry. The next sections will discuss in-depth how this feature works. To achieve the desired behavior after a restore, application developers should answer the following:

Do key application binaries to be protected by System Restore contain extensions consistent with those included in the portion of the System Restore Monitored File Extensions list in the Platform SDK?

Are user-editable files, or intended personal data files (for example, .pdf, .xls, .htm) named in such a way that they will not be monitored as included extension types? For example, have you named a file extension .ini that a user can modify as a personal data file? If so, this will impede the perception of your product’s performance, as well as cause the user to lose work as a result of a restore. (See the Monitored File Extensions list in the System Restore section of the Platform SDK.)

Is there key information stored in the registry which, following a restore, will prevent users access to their personal data files or their application? If so, is there a mechanism by which the user can again download or install an application without having to pay for it again? Or have you specified the registry keys where this information is stored in the registry under hklm->system->currentcontrolset->control->backuprestore->KeysNotToRestore? If the information also resides in files, have you ensured System Restore will not restore these files by calling out hklm->system->currentcontrolset->control->backuprestore->filesnottobackup?

For backup utilities, does it check the files specified in NTFilesnottobackup and, if listed, not back them up? System Restore datastores should not be backed up and are specified in NTFilesnottobackup. System Restore only monitors on first write, so when backing up files, using the operation “open to backup” will not cause additional overhead from System Restore.

Does the backup utility have undo functionality in the event of a cancelled or failed recovery? If not, calling the System Restore API (14-Recovery) will ensure users have a restore point immediately before a recovery so that users can revert an undesirable or cancelled recovery. (See SRSetRestorePoint in the System Restore section of the Platform SDK.)

Automatically Created Restore Points

Restore points are created to allow users to choose previous system states. Each restore point gathers the necessary information needed to restore to a precisely chosen system state. They are created before key changes are made to the system. Since these restore points are automatic, users don’t even have to think about creating manual restore points (unless they choose to). The following topics describe the triggers that cause this feature to create a restore point.

Event-triggered restore points

System Restore will automatically create a restore point before the following events:

Application installations (provided the application utilizes a current installer that is System Restore RestorePT.API compliant). In the event the application causes harm to the user’s system, choosing a restore point before the application was installed allows the user to roll the system state back to the time before the installation of the application, if needed.

AutoUpdate installation. The Auto/Industry Update feature of Windows XP provides an easier way for users to download critical Microsoft Windows® updates in an unobtrusive way. Once the update is downloaded, the user is presented with the opportunity to install the update on the user’s system. When the user chooses to install the update, the System Restore feature will create a restore point before the actual installation of the update begins. If the user restores after files are downloaded but before the installation of the update occurs, the downloaded files will not be removed by the restore operation.

Restore operation. If a user, for example, accidentally chooses the wrong system state to restore back to, the user can, by choosing a restore point before this operation, undo the restore operation. The user can then choose the correct restore point. The restore operation itself will create a restore point for undo purposes.

Microsoft Backup Utility Recovery. Before Microsoft Backup Utility performs a backup recovery, System Restore will create a restore point. In the event the recovery is cancelled or leaves the system in an undesirable state, users can use this restore point to revert the system to the point before the recovery started.

Unsigned driver installation. Unsigned device driver installations are detected by the INF installer of Windows. Before the installation proceeds, a restore point is created so in the event the installation results in a harmful impact to the system, users can restore to the point immediately before the unsigned driver installation.

Manual Restore points. At any time, users (administrator/owner users only) may create and name an on-demand restore point. This is useful to create a “checkpoint” to return to preceding a particularly risky change, before a shared system is left to other users, or at a particular state the user perceives to be optimal.

What's Restored and What's Not

Restored

Registry

Profiles (local only—roaming user profiles not impacted by restore)
COM+ DB
WFP.dll cache
WMI DB
IIS Metabase
Files with extensions listed in the portion of the Monitored File Extensions list in the System Restore section of the Platform SDK

Not Restored

DRM settings
SAM hives (does not restore passwords)
WPA settings (Windows authentication information is not restored)
Specific directories/files listed in the Monitored File Extensions list in the System Restore section of the Platform SDK
Any file with an extension not listed as in the Monitored File Extensions list in the System Restore section of the Platform SDK
Items listed in both Filesnottobackup and KeysnottoRestore (hklm->system->controlset001->control->backuprestore->filesnottobackup and keysnottorestore)
User-created data stored in the user profile
Contents of redirected folders

For more details on this topic please go to www.wintechhelp.com

Source: http://www.articlesbase.com

Read More......

Windows Vista Boot Process Overview

Written by oneself on 5:12 AM

By:Arun

The Windows Vista™ boot process differs from Windows® XP in the way the operating system is located and initialized. Start-up begins with the BIOS loading the Master Boot Record (MBR) on the bootable disk. The MBR in turn loads the Partition Boot Record (PBR) on the active partition. So far, Windows Vista remains relatively unchanged.

Windows Vista is different from XP starting by the fact the PBR code written by Windows Vista no longer looks for Ntldr. The new boot loader in Windows Vista is Bootmgr. This component loads the Boot Configuration Database (BCD), which in turn loads an OS loader boot application (Winload.exe, in the case of Windows Vista). Finally, the OS loader application is responsible for initializing the kernel. This process is illustrated below.

You can think of this change in two elements:

The two key actions performed by Ntldr in previous Windows versions have been divided between two components:

1. Bootmgr reads the boot configuration, including device and path locations.

2. WindowsSystem32Winload.exe initializes the kernel.

The boot configuration stored by Boot.ini in previous Windows versions is now stored in an extensible database, BootBCD, the Boot Configuration Database (BCD).

These changes are significant because of the impact they have:

1. The boot process can be extended to support other applications, such as other operating systems or other versions of the OS.

2. Only nonversion-specific components are stored in the root of the active partition. This means that theoretically Windows Vista could be installed on a machine running some future Windows version with the same boot structure, and it would not break the boot process for that future version. With legacy Windows, installing an older Windows version last causes the newer version to fail on start-up. This is due to version-specific code improvements in Ntldr.

3. Tool-oriented boot entries can be supported to offer maintenance options on boot when a previous start-up failed. In the past, Windows supported an menu provided by a target operating system. This new structure can make tools available earlier during the boot process, meaning that they are available even if all OS-specific boot entries are damaged. The Windows Memory Diagnostic tool is provided in the boot menu in this way.

BCD Store

The Boot Configuration Data (BCD) store contains boot configuration parameters and controls how the operating system is started in Microsoft Windows Vista operating system. These parameters were previously in the Boot.ini file in BIOS-based operating systems or in the nonvolatile RAM (NVRAM) entries in Extensible Firmware Interface-based operating systems. You can use the Bcdedit.exe command line tool to affect the Windows code which runs in the pre-operating system environment by adding, deleting, editing, and appending entries in the BCD store. Bcdedit.exe is located in the WindowsSystem32 directory of the Windows Vista partition.

The BCD is a database used by Bootmgr. It contains the functions of Boot.ini and is located in the {ActivePartition}boot folder

Bcdedit.exe

You can use Bcdedit.exe to modify the Windows code which runs in the pre-operating system environment by adding, deleting, editing, and appending entries in the BCD store. Bcdedit.exe is located in the WindowsSystem32 directory of the Windows Vista partition.

Boot.ini Compared to BCD

BCD eliminates the need for Boot.ini in Windows Vista, although Boot.ini is still present on dual-boot systems for backwards compatibility. Because the BCD boots to the boot environment first instead of Ntldr, the location of Ntldr is not verified unless a legacy operating system is chosen.

Configuration Tools

The BCD store can be modified or repaired using several tools:

System Properties in Control Panel

SystemPropertiesAdvanced.exe

Msconfig

Windows Recovery Environment (WinRE) Startup Repair

Bcdedit.exe

Bootrec.exe

Most of these tools enable you to perform simple tasks, such as setting a boot menu timeout, setting a default operating system, or configuring boot options such as /SOS and /SAFEBOOT. Others are repair-oriented tools; Startup Repair and Bootrec.exe, in particular, provide automated mechanisms for fixing problems in the BCD.

Bcdedit.exe is the main tool for detailed BCD store modifications. You can use Bcdedit to change Bootmgr options; add boot, delete, and edit boot entries; import and export the BCD store; and create a new store if it becomes significantly damaged. Bcdedit.exe is located in the WindowsSystem32 directory of the Windows Vista partition and is also available in WinRE.

BCD Store Location

The BCD store is a registry hive, stored as BootBCD on the active partition. This hive is loaded but hidden from view in Regedit.exe within Windows Vista. The store is loaded to the following registry location: HKLMBCD00000000.

You can also view the store manually in WinRE by loading the hive from the Boot folder. To obtain a copy of the hive on a running system, use the Bcdedit /export filename command to export a hive file for offline examination. This command exports the BCD store to a file called filename in the current directory.

Related Components

Msconfig

Msconfig is the preferred PSS UI tool for managing boot settings. The tool supports BCD and allows the user to enumerate all BCD objects in the system store. It allows certain elements to be altered for each OS object, including debug settings, safe mode settings, and other popular PSS options. It cannot be used with the WinRE console; Bcdedit needs to be used in these cases.

Bcdedit.exe

Bcdedit.exe is a command line tool that can be used to manage BCD settings. In summary, Bcdedit.exe is a replacement for Bootcfg.exe. However, it is enhanced for better scripting and to expose some of the more powerful features of BCD that bootcfg.exe did not expose for manipulating Boot.ini. Bcdedit.exe is designed to work on previous operating systems and in recovery environments.

For more details on this topic please go to www.wintechhelp.com

Source: http://www.articlesbase.com

Read More......

Very Famous Mobile Phone Samsung P310

Written by oneself on 5:03 AM


by Prabakar

Samsung introduced latest design cell phone Samsung P310. Its touch-sensitive buttons are mounted beneath the display, so that you will definitely be keeping on unwittingly running over the display's edge on every press, although fingerprints are mostly invisible, therefore it doesn't bring about any troubles. But the way the sensor works is rather fancy: in stand-by mode the touch-sensitive buttons doesn't always respond to the touch and so you have to push the key a couple of times to make it react. My attempt to find a replacement for the soft-keys resulted in a failure - these buttons take part in most interactions with the Samsung P310. Such behavior of the soft-keys and exhausting push-it-again's, do frustrate a lot; it appears the handset's ergonomics was missing on the developers' to-do list.

In conditions of Moscow networks the device lasted 3 days on average at 30 minutes of calls, and other functions being inactive. At the same time should you be heavy on what the Samsung P310 brings to the table, it will put up 2 days of lifetime. Without the leather casing, the device remains good for about a day at 20-30 minutes of calls. Full charging time of the both batteries makes about 3.5 hours.

Search method of Samsung P310 is very well. There are two lines for First Name and Last Name (search is conducted only by first field), fields get summed when displayed, Name comes first. For example Raj Kumar will be shown only in this order. Length of each field is 20 characters for any supported input language. You can also switch languages on the go when entering a name.

All entries, without regard to language, are sorted out under the algorithm - all contacts with headings made in a local language (Russian, for example) go first and then those with names in English. This is rather convenient and handy list sorting system. Taking into account fast language switch option during the search, it's clear that no language will spoil the experience of working with this phone.

Samsung P310's music player is well. Apart from phone numbers, e-mail address (there may be several of them), a little text memo can be submitted on top of all that. Any music file as well as composed MP3's can be picked as a ring tone for a contact. Three caller groups are provided by default with the possibility for creating any number of additional groups, selecting a personal melody and image for each. SMS alerts are also customizable.

Call list of Samsung P310 is very performed level. Each of the given lists contains up to 30 phone numbers. There is a combined list of all the last calls with an icon indicating a call type. Deflecting the navi-pad horizontally, you can switch quickly from one list to another. The date and the time of a call without special note of duration are displayed in extended view for separate entries. Calls from/to one number are summarized, so that a number standing next to the call specifies total amount of calls made. In order to access duration data you will need to call up detailed information on desired item. As always, the overall time of the calls and their prices can be viewed in this menu (in case the service has been enabled). Please purchase online www.phoneandbeyond.com

About the Author

Representing Samsung P310 in the website www.phoneandbeyond.com

source:www.goarticles.com

Read More......

UnHack Your Computer

Written by oneself on 6:18 AM


There's nothing new under the sun, and rootkits are no exception. In the early days of personal computers, in the age of the DOS command-line operating system, there were viruses that hid their presence from the users and anti-virus programs. They did it by intercepting some system calls that were responsible for reading the files, and lied to the system by filling these calls with fake information. You could view an infected file right in front of your eyes and see nothing but legit code! These viruses were called 'stealth' in those days.

When computers evolved, Windows replaced the DOS. Old viruses did not run under the new operating system, and it wasn't easy to develop simple hacks to intercept system calls in Windows. But time has passed, and now there's a new wave of viruses that can work on Windows and hide their presence even more efficiently than the stealth viruses of the old days. These new viruses are called rootkits.

Today, using an antivirus does not guarantee complete safety. A rootkit could install into your system and fool the antivirus system by hiding itself. The problem is that modern antivirus programs try to detect rootkits at the time when they are already active. Antivirus programs use the very functions that are intercepted by the rootkits specifically for the purpose of deceiving antivirus. It's a gun vs. armor race and your PC is the firing range.

Microsoft tried to address the problem by releasing their own Rootkit Revealer. While being a correct concept, this tool fails on too many levels. Microsoft Rootkit Revealer is intended for use by system administrators and software developers. The results of its work are not detections but rather hint that there's something in the system that's hidden. And of course, Rootkit Revealer does not remove rootkits, making its benefits questionable at best for a regular computer user.

Complement your antivirus with a rootkit detection and removal system and liberate your PC from rootkits! UnHackMe with Partizan technology is highly compatible and designed to complement other antivirus solutions instead of conflicting with them.

The Partizan technology is unique to UnHackMe. Microsoft states that there exists no sure way to know of a rootkit's presence from within a running system. Instead of trying to combat rootkits on their own ground, Partizan fools them by booting with the operating system and taking control before any rootkits can load. Being the first to load, UnHackMe can safely watch all stages of the Windows boot process, effectively detecting and terminating any activities attempted by the rootkits.

Once there's no rootkit in the computer's memory, detecting and removing one is a matter of routine. UnHackMe can remove known rootkits by itself or simply block the rootkit from loading into memory and pass control to your regular anti-virus.

Scanning your entire PC for the presence of a rootkit with a regular antivirus can take hours of time depending on the number of files and programs you have. UnHackMe takes scanning speed to another level by taking only a few seconds every time your computer loads.

Antivirus and anti-rootkit products often conflict with each other. Not UnHackMe! You can safely pair UnHackMe with an antivirus of your choice, providing ultimate protection against all kinds of viruses and rootkits. Download your evaluation copy now from: http://greatis.com/unhackme/

About the Author

Dmitry Sokolov is a manager of the Greatis Security Team. He is an author of RegRun Security Suite and UnHackMe software

Read More......

XP To Vista - Upgrade Or Downgrade?

Written by oneself on 5:59 AM


by Susan Bernau

According to Derek Torres at microsoft.com, written December 8, 2006, there are many reasons for upgrading to Windows Vista; new features, improved security and better overall experience.

Some of the features noted by Derek are:

Windows Aero, Windows Sidebar, Media Player II, and Windows Search. Let's look at the practicalities of these new features.

Windows Aero: This interface offers a "cleaner, transparent look with impressive graphic quality". But Aero requires a higher-end video graphics card. If your computer doesn't have a higher-end graphics card, Windows Vista is displayed using Windows Basic. In other words, without the "right" graphics card, you are paying for a feature in Vista that you can't even see or use. Plus the aero feature requires more memory in order for Vista to function.

Windows Sidebar: This is a window usually on the right hand side of your display that shows a selection of what Microsoft terms "gadgets". These are mini-applications such as a clock, a calender, currency exchange, etc. However, using this feature uses 20% of the computer's resources slowing down the computer considerably.

Windows Media Player II: Uses a new graphics-oriented interface rather than the text-oriented look and feel of the previous versions.

Windows Search: One of the most useful features of Vista is the new search that is capable of searching for files or applications simply by typing in a few letters in the start search box in the start-up menu.


Parental controls which allow you to set rules of access for each family member, (but since most teenagers are more computer proficient than their parents, one wonders how effective this actually is);

Windows Vista User Account Control (UAC) which protects many features and processes such as renaming a file, deleting files, and accessing certain control functions. It will require the user to have the "proper permissions" in order to accomplish that task. This means that the user will have to click through a few popup windows everytime they try and accomplish a task. "Are you sure?" and "Do you really want to?" are just a few of the clicks that will have to be made. This feature is the cause of numerous complaints as, in many cases, the computer owner is prohibited from doing his work in a fast, efficient manner.

Better overall performance is what Microsoft envisioned back in 2006 when Vista was first rolled out. Many users are finding this far from reality. One feature that is supposed to result in an improved user experience is the start menu. This new start menu displays everything within one single menu thus saving on screen real estate, that is, when it is working. A large portion of my start-up menu is blank as the "most frequently used" program icons just stopped appearing. The search function does make finding files and applications fast and easy however, which is a good addition. The start-up menu now also includes the new and improved folders, Documents, Music, Pictures, etc. Microsoft has improved the My Documents, My Music, My Videos of XP by simplifying them to appear as Documents, Music, Videos, etc.

Microsoft claims that Vista is "a much faster operating system." Many forum and blog posts say just the opposite. Vista's speed is only apparent if the computer has enough memory. At least 2 gigs of ram is needed in order for Vista to perform at close to XP speeds but for most home users with only 512 mg ram or even 1 gig, Vista takes a long time to boot up and even longer to shut down with a complete reboot taking up to ten minutes. Downloading files and extracting folders also is abominably slow. I downloaded one folder at the same time with my XP and with Vista with 1 gig ram. The Vista computer estimated time for downloading was 20 minutes. The XP accomplished the download and the extracting in 3 minutes.

Should you upgrade to Vista? To answer that let's renumerate the benefits that you will get for your $300 to $500.

Aero- if you have a higher-end graphics card.

Windows Sidebar- which slows your computer but does have a nice clock.

Windows search- is easy and fast.

Media Player II- graphics instead of text. Now you have to look at an icon and figure out what it means.

A new start menu- uses less space on your display.

Improved folders- eliminated the "My".

Increased security - Parental control - if you can't figure out how to set it, ask your teenager.

User Account Control- puts the computer in charge as it continually checks to see that you have permission to do what you want to do and continually asks you with popups if you know what you're doing.

Slower computer speed unless you add enough memory to your computer- 2 gig is the minimum for any serious computer user.

If you feel that those benefits are worth $300, then upgrade. Just make sure that your hardware exceeds the Microsoft's basic requirements or you can expect stalls, black screens, crashes and basic slow operation from the "upgrade" to Vista.

About the Author

Susan Bernau was rudely introduced to the world of Vista with the purchase of a laptop. The resulting frustration and aggravation has resulted in a site for people to post their pent-up aggravations about Vista. Vista's Got To Go! Haven't You Had Enough? Speak Out! http://vistasgottogo.com

Read More......

Suggestions On Creating Videos

Written by oneself on 4:51 PM

Have you ever stopped off at a website that provided tutorials on a subject, such as establishing a website or modifying a blog? Today, there are numerous ways to go about just that on the Web that include a wide-range of tools and resources.

In order to learn how to create an uncomplicated collection of photographs, music files, and words to celebrate matrimony, a new baby, or even a weekend BBQ with friends, then try considering http://onetruemedia.com. The best part is that this convenient tool is free.

When you wish to have a bit of fun with the Internet, http://digitalfilms.com is the site to seek out, which permits you to generate short animated films that allow you to select various background images, make up your own characters and much more.

To enter the more technical side, as well as gather helpful instructions or how-to tutorials, there are products like Camtasia and NetPlay that make recording on your desktop a reality. For example, you can open a Word document and use a chosen product to record text selection, font changes, color alteration, as well as insert pictures.

To take advantage of all the possibilities associated with videos, you can begin with the end. Think of how this video will capture and communicate with your audience? It is also suggested to produce an uncomplicated script to serve as an outline that ensures that all key points are covered.

When you are considering a demonstration for a market you are targeting that will be shown on your site, don’t hesitate to explore the technical side and create a lengthy video. If it is successful in educating the audience on the information they seek out, then they will never leave the screen.

However, if the video is to enter the stage that is called "viral," then it will pass from one Internet viewer to the next with the help of sites with specialized services. One of the most popular of these sites is called http://YouTube.com. When making a video for the Web, the content should be short and avoid lingering off of the topic. Since viewers tend to have short attention spans and don’t enjoy spending too much time on one thing, it is suggested to adhere to this recommendation. Usually, the most successful are able to produce a collection of several short videos that relay a particular message. If viewers are interested, then they will continue to look out for the next video.

When it comes time to upload a video to a site that shares such material, it is important to fill out the details pertaining to the video in the most descriptive manner. This assists viewers in finding your work. People are usually able to rate video, so if you receive a bad rating, chalk it up as constructive criticism or let the comments roll off of your back. Lots of individuals are not satisfied with their own lives and spend their time posting negative comments on blogs and about videos on the Web.

The best advice will come from the target market of a site. Try asking website visitors to scan the videos and offer feedback. To make matters less complicated, generate a form that visitors can fill out. Entice them to participate by offering a simple thank you, such as a free report after they have completed the form.

To make sure you are on the right path with your videos, it is important to take feedback into consideration. In the future, the responses will only aid in producing a higher level of videos.


About the Author:

Robert Paul Williams is the Editor of Work At Home Business Website. Come Visit Robert's Blog for "Free and Low Cost Website Advertising Ideas."


Article Source: www.iSnare.com

Read More......

Samsung F520 – an Ultra-smart Phone to Fulfill Many Needs!

Written by oneself on 4:44 PM


Assimilating the best of iPods and digital cameras, mobile phones are the best alternatives for millions worldwide. While far ahead of being mere calling devices, mobile phones have metamorphosed into multi-utility instruments powerful to perform many an important tasks effortlessly. Today, they integrate features of a music player, digital camera, gaming console, and web browser. They are equipped with document viewer applications and wireless connectivity.

Now share your favourite sound track or the best moment clicked via the powerful camera, everything is possible with a phone in hand. Not to forget some additional facilities coming along with an advanced phone. With paying tad bit more, there is a mobile phones all ready to serve you with much advanced connectivity options and features like direct TV feed, high resolution camera etc and many more. Now if we are to site one such example of an advanced phone that has already generated quite a stir among the mobile phone lovers, we have Samsung F520 to name. The recent mobile sensation is designed to deliver.

In a dual slider mechanism Samsung F520 comes to offer you with a full QWERTY as well as a simpler numeric keypad. Now make use of any to fulfill your need. This 3G phone supports GPRS, EDGE, and HSDPA connectivity. Not to forget the Bluetooth and USB support. A 3.15 megapixel camera with flash is ready to fulfill your photographic urge, and along side still photography it aids in video photography too.

A 3'' touch screen TFT supports 262k colours and offers resolution of 480 x 272 pixels. To help you in saving all your audio and video files the camera, in addition to its inbuilt memory, comes with microSD expansion slot. The screen features Samsung F520 is a Flash-based user interface with document viewer application. And when all of these features come bundled in 104.8 x 53.7 x 17.4 mm dimensions, who needs a better ally than the one it is? Right now all our calls are answered.

About the Author:

Samuel Herrick writes about best mobile deals. Let’s review of Samsung F520 from Latest Samsung Mobiles.

Source: http://www.articlesbase.com

Read More......

How Do I Play Windows Games on a Mac?

Written by oneself on 8:16 PM

By Vic Thomas

Have you ever wanted to play Windows games on your Mac? Well if you have an Intel powered Mac running a Mac OS X 10.4.6 or later operating system you can run a complete Windows operation system such as Windows XP in parallel with your normal Mac operating system. With the Windows operating system installed on your Mac you can than play those Windows Game in fact you can run any Windows program.

To install Windows on your Mac you will first need to install the Parallels Desktop 3.0 for Mac software on your system. To successfully run the Parallels Desktop software on your Mac you must have the following:-

• Mac OS X 10.4.6 or later. To check what version of Mac OS X you have got, choose About This Mac from the Apple menu in the menu bar.

• An Intel-powered Core™ Duo or Core™ Solo Mac® Mini, iMac®, MacBook™, MacBook Pro or Mac Pro.

• A minimum of 768MB of RAM but 1GB is recommended.

• About 200 MB of hard disk space on the boot volume for Parallels Desktop installation.

• Sufficient space on your hard disks to allocate for the virtual machines, i.e. 15 GB of hard disk space is recommended for each virtual machine.

Installing Parallels Desktop software on your Mac is not difficult. When it is installed you can then use it to install what it calls the Guest operation systems i.e. the other operating system such as Windows XP or Vista or even Linux that you want to run at the same time as your Mac operating system. You can install any of the Windows operating systems but there is a Windows Express Installation Assistant especially for Windows XP and Windows Vista. You can also install using Typical or Custom installation settings. During the installation process you will be instructed to insert the CD or DVD containing the Operating System software you want installed, such as the Windows XP Operating System disk.

When the Guest operating system is installed it will run in a window on your Mac screen. When you run an application in the virtual machine with Windows installed, the running application's icon appears in the Dock by default. If you want this application icon to remain in the Dock even when it or the virtual machine are not running simply Right-click (Control-click) the applications icon in the Dock, and select Keep in Dock. If you then click the Windows application's icon in the Dock it launches the virtual machine and then the Windows application. In this way you can have the icon for your favourite Windows Game in the Dock and simply click it when you want to play that game.

If you follow the above procedure you will be in a position to install and run all of those Windows Games that you wanted to play, as well as install and run any other Windows applications.

Click the following link to get more information on Parallels Desktop 3.0 for Mac software and to watch a demo video.

http://www.clickdigitalproducts.com/featured/software/how-to-run-windows-or-linux-on-your-intel-powered-mac.html

From Click Digital Products Webmaster at http://www.ClickDigitalProducts.com It's a Digital World we live in and sometime we need help, and at Click Digital Products we will be trying to provide some of that help.

Article Source: http://EzineArticles.com/?expert=Vic_Thomas

Read More......

How to Troubleshoot Your Internet Connection

Written by oneself on 7:59 AM

By Timothy Scheiman

You have a broadband connection and suddenly your not able to get online. What do you check? Do you call your ISP? Before you call your ISP there are some troubleshooting steps you can do to check if the problem is on your end or not. In this article I intend to walk you through checking your Internet connection.

If your connection to Internet was to stop functioning suddenly than what you would do first is to check your DSL or cable modem. Is there power to the modem? Are all lights lit? Do you have a flashing activity light? Do you have a router? Is it powered on? Are the connection lights lit?

These are the things you need to check first as well as check your connections. If you have more than one computer connected through a router does any of the other computers online? If you have one computer that is not connected online the problem could be as simple as rebooting to a bad graphics card.

If you recently installed a software firewall this could disrupt you from getting online. You could have some applications that connect to the Internet and others that are blocked. If you have any blocked applications you would have to go into the firewalls permissions and remove any blocks on those applications that do not function.

If you have checked all your connections and no computer in the house is getting online than it could be a problem with your ISP, a bad modem, or router. One thing your ISP would have you do to check it would be to a flushing of the modem. In order to flush the modem you would disconnect the power source. If you have a router you disconnect its power source as well. You wait 30 sec or more than plug the modem back in. Wait for the response on the modems four lights before you plug the router back in.

If after doing this you have Internet again problem is solved and you can go back to what you were doing. This will happen at times that the modem will need flushing as packets pass from the ISP back and forth. If this happens a lot you may need to have your modem replaced. If for some reason your modem does not light up all four lights see if the ISP can ping the modem. If they can't it could be a problem in the line or the modem needs to be replaced. In any case it would need an ISP service call to determine the problem. Usually at this point we have ruled out the router and the computers.

If you having one computer that cannot get online this could be another issue. If its not software related like a firewall it could be a faulty Internet cable, network card, or even a virus that is blocking Internet access.

If one computer is involved try rebooting first. If you still cannot get online go into network properties and check those. Under network connections right click on your network and click repair. If you can get on after that than your good to go. Your network connection should be enabled and firewalled. If it is disabled than try enabling it. If you have an extra cable you can try connecting it to the modem or router to see if the problem is that.

Make sure you check device manager that you network card is not splatted or disabled. If it is try enabling it or you may have to reinstall the drivers. It may come down to a defective network card which you need to replace. If the network is built in you can buy an add on network card to solve this. They are not expensive and you should be able to get one for under $50.

With this troubleshooting guide you should be able to identify where the problem is and take steps to fix it.

source:www.associatedcontent.com

Read More......

Is A Pop-Up Blocker the Reason Your Website Isn’t Working Properly?Are you aware that you might have as many as a dozen pop-up blockers on your system

Written by oneself on 4:56 AM

Are you aware that you might have as many as a dozen pop-up blockers on your system at any given time? Do you know how many pop-up blockers you actually need?

During the past five years, pop-up blockers have been heralded as the next best thing. The general public has been told – again and again and again – to install pop-up blockers because they will protect your system from everything from Bird Flu to computer viruses and hackers.

Let’s talk turkey about pop-up blockers. First, they will not protect you or your family from Bird Flu. They will not protect your system from most harmful computer viruses. Finally, they are not used by hackers to gain access to your network. All they really do, is prevent windows from opening when you are visiting a website or browsing the internet.

Most people install and update pop-up blockers because they want to reduce or eliminate the frustration of a pop-up window opening when you are in the middle of an important task online. There are, to be sure, some sites that are infamous for the number of pop-up windows they allow for the use of advertising. But put yourself in the shoes of the company paying for those pop-up ads for a minute. From their point of view, using pop-up blockers wastes their money! Okay, so much for the lighter side.

Pop-up windows are actually not used by most websites any longer. If there is a pop-up, it is usually java-based or it has some kind of programming included which bypasses the pop-up blocker. To be truthful, if you are getting irritating pop-ups on your computer, it is probably because your have some kind of malware somewhere on your computer. The malware is the danger – not the pop-up window.

Pop-up blockers can also cause problems for some programs and websites which use them for legitimate purposes. For example, most web-based email programs use pop-up windows to display your calendar or your task list. Some sites use them to provide help screens or to display background information or calculations.

At Intelligent Network Services, Inc., we get calls frequently from clients complaining that a website is not working properly. When we arrive and start evaluating the source of the problem, we often find that the client has installed several toolbars – such as yahoo, google, viewpoint, and others – that include pop-up blockers. To get things operating properly again, we often find it necessary to disable two or more of these pop-up blockers.

If you have consistent problems with certain programs or websites, you might find it necessary to disable some pop-up blockers. A better idea might be just not to add the toolbars in the first place, because you probably don’t need the pop-up blocker in the first place.

Copyright (c) 2007 Thomas Burns

Article Source: http://www.articlesnatch.com

About the Author:
Thomas Burns, founder and CEO of Intelligent Networks Services (INS) has been an industry expert in computer network and technology for over 20 years. Under his careful supervision, INS has become a leading, full service IT support company servicing small to mid-sized businesses in Silicon Valley. INS’s goal is to save their client’s money by focusing on preventative maintenance and intelligent network designs. For more information go to: www.intelligentns.com

Read More......

The PDA: Not A PC Replacement...Yet

Written by oneself on 10:06 PM

by: Steve Bralovich

Personal organizers or PDAs are not yet handheld microcomputers, but they've been utilized by a lot of people over the past few years. Personal digital assistants are known as pocket pc devices or palmtop PDAs. They have umpteen uses including: mathematical calculations, use as a clock with calendar functions, surfing the Web, sending and receiving netmail, video uses, typing and word processing, address book functionality, constructing and compiling spreadsheets, interpreting bar codes, listening to radio programs or stereo music listening, playing video game*, poll results entries, and Global Positioning System functions. More contemporary PDAs also have color displays, MP3 audio and telephone capabilities, allowing for them to be applied as mobile phones (smartphones), online browsers, and portable media players. Many now also feature cameras that can shoot pictures which can then be sent via email to Flickr and mySpace accounts. Practically all later PDAs can browse the Net, intranets or extranets via wireless local area network, or Wireless Wide-Area Networks .Almost all PDA's use touch screen displays excepting Smartphones which depend on keypad menu systems ascribable to their more diminutive display screens.

PDA's Past

The term "personal data assistant" was first used on Jan 7th, 1992 by then Apple Computer Chief Executive Officer John Sculley at the Consumer Electronics Show (CES) in Las Vegas, Nevada, concerning the Apple Newton.

PDAs are occasionally denoted as "Palms", "Palm Pilots" or "Palm Tops" so-named after an early personal digital assistant produced by USR and Palm Inc called the "Palm Pilot". Today however, the term is much more encompassing and includes a very diverse range of products developed by a host of many manufacturers including HP, Dell, Blackberry and Sharp to name a few.

.Characteristic capabilities

Presently, a regular PDA has a touch screen for data entry, a memory card slot for data storage and at the least one of the following for device-todevice communication: IrDA, Bluetooth and/or WiFi. Even so, many personal digital assistants (commonly those used chiefly as cell phones) may not possess a touch screen, instead using softkeys, a directional pad (d-pad) and either the numeric keypad or a thumb operated keyboard for idata nput.

In order to meet the PDA definition, standard software should include an appointment calendar, a task list, an address book for business and personal contacts and some kind of notes program. Internet connected PDAs also usually include E-mail and Web support.Most units also include memo recording software for audio notes. Very handy for remembering important details.

Not Quite A Laptop Replacement...Yet

Possibly, to a higher degree than any other computer device, the personal digital assistant lacks the raw computing horsepower and Wireless Broadband capabilities of a desktop or notebook computer. Presently, costs of laptop computers are coming down. Although a good deal bigger in size, laptop computers have more full-size screens and keyboards and are have greater computing power.

However, the OQO Model 2 has been brought out in recent times as a fully desktop PC compatible PDA with a USB port so that people can use their normal work and business software or play computer games compatible with ubiquitous operating systems such as Windows XP. It can also connect to regular PC peripherals. Costs still have a way to fall prior to mass adoption takes place in the market but OQO is no longer the exclusive manufacturer of these types of units, so costs should fall possibly within the next few years.

Conclusion

The PDAs strength is that it is easy to transport and less bulky than full-sized computers.It slides easily into a dress shirt or trousers pocket. The additional features like cameras, Global Positioning System, telephony and MP3 player make it flexible unlike any other type of computers in the market.

A lot of people simply don't need full desktop features while actively on the go. As long as they can access their information and sync their data to a full-sized computer when they arrive at their homes and offices, that's really all they need and want to do. So at least in the short run, the PDA will most likely remain as a portable helper for millions of users for years to come.

--------

The writer has served as a Pocket PC software developer for over 5 years. He runs a weekly web log that addresses all areas of mobile computing including personal digital assistants. To view videos and read more info about PDAs, Smartphones and other associated devices visit: http://pdatoday.blogspot.com

Read More......