About Technology

update technology ,more fast more smart...

The EeePC - My Thoughts

Written by oneself on 6:27 AM


By Olly Fallon

I love gadgets. I am addicted to them and if I see something I like then I feel a massive urge to immediately go and buy it.

Looking in a recent PC magazine I came across the EeePC by Asus - looking at the pictures I saw something that I had longed for, for some time. A small portable PC, a cheap price tag, seemingly specifically geared up for Internet on the move.

The EeePC is pronounced e-pc - it is meant to stand for three easy points - easy to learn, easy to work and easy to play. I think the original idea was to make something affordable to the many including students and families.

What attracted me to the device was it's apparent portability. Measuring 225 x 165 x 21 mm this is tiny in comparison to any other laptop. It has a solid state hard drive so pretty rugged in the fact you can knock it and bang it about without damage occurring. With three hours of battery life and a mobile phone sized charger makes it all pretty portable.

Of course as with any relatively new gadget the demand is great and getting hold of one was pretty tough. They come in different colours. My preference was the black one and I guess this was the same for most people as it was completely out of stock. In the end I settled for the blue.

After pressing the power button the wait is minimal. I would say about 20 - 30 seconds. It's strange as the machine is silent when booting. You kind of expect to hear the hard disks spin and the fan going. Peering into the 7 inch screen is surprisingly easy although I guess it could get annoying depending on what you are trying to achieve. However, so far, for just MSN, email and web browsing it is absolutely fine.

More surprisingly is the keyboard. It is obviously relatively small but it is quite easy to type on. I think after a small amount of adjusting typing should be relatively easy. Ok you would not want to type a full novel on it but for emails, blogging short articles etc - absolutely fine.

Even though it is hard to think of this little gadget like this, this machine is a fully functional PC. This means you can pretty much do anything on it that you could a normal PC. It comes with a Linux based system on it. This is open source and subsequently, with a couple of minor modification, there are literally thousands of free applications that can be run on it. The main screen is easy to navigate round giving you obvious icons such as 'Internet' or 'email' or 'messenger' so you really do not have to be a techie to work your way around. Having said that, if you wanted to, the machine is powerful enough to run XP on it should you require.

With wi-fi built in, connecting to the Internet is easy. A webcam, microphone and speakers allow for easy communication. You also have USB ports as well as a flash memory slot allowing for an addition 32gb of storage on top of the 4gb included within the machine. For me, this means I can take this machine and take it anywhere and where there is not a wireless network to connect to, I can connect via 3G from my data card. This means that I can be in the Internet anywhere without taking, what I now consider, a bulky item such as a laptop. This will even fit in the glove box of your car or in a handbag!

Whilst opening the EeePC will void your warranty - this system is upgradable. There are countless modifications or upgrades that can be done to make your Eeepc unique and super quick. As the software is open source, it can be modified to do pretty much anything you require.

I think this machine is going to be a huge success and pave the way for truly mobile computing. I have just paid £250 ($500 approx) for the 4GB model. There was a 2GB model for £200 and I have heard rumours that Asus have managed to relocate the speakers allowing for a greater screen size on a soon to be released model.

Olly is the webmaster for JBO Solutions - bringing you PC Parts at great prices. Full range of Computer Components including TFT Monitors

Article Source: http://EzineArticles.com/?expert=Olly_Fallon

Read More......

What is Subnetting?

Written by oneself on 6:18 AM

Subnetting is, at it’s essence, the process of allocating bits from a host portion of a network as a network portion of that same network. This is done with networks that are using the Internet Protocol, or IP address system to create a subnetwork (also known as a subnet) of logical addresses within a particularly limited address space that is assigned to a business, organization or other large group.

With every IP address, there is a subnet mask associated with it. The subnet mask is designed to determine which and how many IP addresses are on any given local network. The router or firewall is known as a default gateway, as it is the device that is contacted every time a computer wants to access another computer that is not located within the same local network.

The subnet mask that most people are familiar with is 255.255.255.0. This is the default mask for most systems. As is the case with all IP addresses, the last digit can range from 1 to 254--and that’s it. If there are more than 254 computers or other network devices that require IP addresses on a network, the subnet mask will run out of space.

How is subnetting used to extend the number of devices on a local network?

There are two different options for a systems administrator when a local network runs out of space in it’s subnet mask. One option is to change the subnet mask to allow for more devices. The other option is to add a router to extend the IP address range and essentially start over with a fresh subnet mask. Faster networks that have a lot of data transferring around should add a switch or router while smaller networks that will not exceed 300 devices should extend the subnet mask.

While keeping with the same IP addresses, all hosts should have their subnet masks changed to 255.255.252.0. With this simple change via subnetting, the network will now be able to grow much larger and have a range of IP addresses from 192.168.0.0 to 192.168.3.254. With subnetting in this example, it is extremely important that all hosts are changed to the new subnet mask. If they are not, the network will experience communication issues and various other performance problems with the network.

Tom Paine writes for The Tech FAQ and is the author of articles such as Subnetting, Subnetting, and Subnet.

Communications Article Source: http://www.eArticlesOnline.com

Read More......

What Is the Difference between Predam iPhone or Prodam iPhone?

Written by oneself on 6:10 AM

Predam iPhone or Prodam iPhone is just another term describing "Unlocked" iPhone that can be used without a service contract with AT&T. The number of searches on Google for Predam or Prodam iPhone are growing by the day and one can only expect the searches to grow as the popularity of iPhones continue to rise. Currently, AT&T is only service provider for iPhones with a 2 year service plan and iPhones without this service plan is unless for people who want to use iPhone unless it is "Unlocked."

The people who are looking for Predam iPhone are the ones who do not have access to AT&T's service coverage or don't want to commit to a 2 year service contract. Most are from foreign countries where AT&T is unavailable. But growing number of people in the United States are also looking for Predam iPhones simply to avoid being tied down to a long-term contract. With the growing popularity of iPhones has also created a huge demand for Predam iPhones, not only in foreign countries, but in the United States as well.

If you are an iPhone owner, then you know why the iPhone is a "MUST HAVE" gadget. It makes running your life or business much easier and simpler than an ordinary cell phone or a PDA. iPhone not only work as a great cell phone, but it has many functionalities. For instance, you can access the internet with its browser capabilities, act as an mp3 player like iPod, read and send email, download and view movies and much, much more...

Apple recently announced the release of "iPhone Software Development Kit" which allows anyone to develop web applications for iPhones. New features like online banking or faxing capabilities are already added and more are being added everyday. And, with the release of software development kit, the demand for the iPhones are expected to grow exponentially with new added features.

So, where can you get a Predam iPhone? There are number of online vendors popping up everyday to meet this growing demand for unlocked iPhone. However, there are few things you should know before making a purchase. For one, Predam iPhone may not be covered under Apple warranty in case of damage. Also, some of the features may not be available at all or not function properly, such as visual voicemail.

Even with these limitations, if you want to get a Predam iPhone, Google for "Predam or Prodam iPhone" for vendors who presently sell unlocked iPhones. Another great source for Predam iPhone is eBay. Search for "unlocked iphone" as your main search term and you'll get a large list of great deals on Predam iPhone. Just make sure you are getting a genuine iPhone that has been unlocked not a cheap imitation from China or any other countries.

For busy professionals, iPhone is a great tool, but it is a must for anyone who are looking for an easier way to manage their daily activities. If you want to avoid a long-term contract with AT&T and still be able to use the unique features available only to iPhones, Predam iPhone is the only option.

Learn more about Predam iPhones and where to get the best deals, check out Predam iPhone for more information.

Hunter Lee offers latest trends that matters to people at HotReport.org, including Predam iPhone. Read about where you can get the best deal on "Unlocked" or Predam iPhone at his website at Predam iPhone Hot Report.

Communications Article Source: http://www.eArticlesOnline.com

Read More......

What is the difference between spyware and viruses?

Written by oneself on 6:05 AM

By: Deepak gosain

Shin, a fictional character whose name means "faith" or "trust," sits by his laptop in the living room of his home in Pyongyang, the capital of North Korea. He is busy at work for his boss, dictator Kim Jong-il. His job, to make sure some spyware gets into specific computers at the Pentagon so he can gain vital top secret information. He's particularly interested now that the United States government suspects his country might soon conduct its first nuclear test.

With spyware surreptitiously installed on the computers, he could, for instance, engage in the practice of keylogging. In other words, our "trustworthy" Shin could tract the actual keys on the computer hit by the Pentagon officials. This would help him learn their passwords, the content of email messages, encryption keys, or other means to bypass security measures at our nation's defense fortress. Shin's not interested in crashing computers at the Pentagon or making them otherwise operable. That would be too overt and might reveal him. He's simply after information.

There are other types of spyware, sometimes called "malware" because they don't actually spy on your computer habits. They might instead just barrage you with annoying popups, for instance. Or they might give you a different home page that isn't of your choosing, like one of an advertiser's. But for the moment those types of malware, or adware as it's sometimes called, aren't very useful for Shin. He wants to use spyware that actually spies.

Over on another part of the globe in Turkey, a fictional terrorist sits with his own laptop in a suspected al Qaeda terrist cell. But he's not out to infect computers with spyware. That's child's play. He's out to bring the house down. This story is strictly hypothetical. But let's say the terrorist wanted to disrupt the daily hubub at a major American corporation. He'd infect the computers with a virus!

The terrorist might try to attack the company's vast network by inserting a worm into it. Worms reside in RAM, and travel from machine to machine and, unlike the classic viruses, they attack the computers themselves rather than individual files. Very disruptive. This type of virus could potentially make the computers inoperable.

Bring down the goings-on at a major corporation by spreading a worm through the computer network, and the terrorist could have a field day. But let's hope not.

So to summarize, spyware often keeps track of your computer habits, and viruses are often out to disable computers in some way. Hence the difference.

Did you find this article useful? For more useful tips and hints, points to ponder and keep in mind, techniques, and insights pertaining to computers, software, viruses and other information, do please browse for more information at our websites. www.infozabout.com www.computers.infozabout.com.

Computers-and-Technology Article Source: http://www.eArticlesOnline.com

Read More......

Secure Your Wireless Connection In Five Easy Steps

Written by oneself on 6:30 AM

The convenience of connecting two or more computer in your home or office has increased, especially with the cost of home or small office kits decreasing. Unfortunately there are people out there who want to use your wireless Internet for free or use it to hack into your computer.

There are now many websites devoted to 'Wardriving', which involves people searching for exposed wireless networks and sharing this information via websites of via their social network.

If you have set up your wireless network straight from the box and have not changed any of the default settings, then there is a huge chance that you are supplying somebody else free Internet access or being hacked into. A wireless network will never be as secure as a cabled network. By following the seven steps below then you will stand a much better chance of protecting your home network.

1. Change Admin Password

The default password for most wireless kits is ADMIN. If you haven't changed this password then change it as soon as you can. It is surprising the amount of wireless networks that are hacked into or accessed by a third party because the ADMIN password is still ADMIN. Especially as manufacturers manuals can be downloaded from the Internet with their admin password.

2. Disable or Change the SSID

The Service Set Identifier [SSID] is a code that wireless hardware sends out to identify itself to other devices. By default the SSID is normally the manufacturer's name. The SSID is only required when devices are first synchronizing with each other, so the best option is to disable the SSID broadcast once your network connection is established.

By disabling SSID broadcast you will make it much harder for an intruder because they will have to start guessing the SSID code. Most wireless gateway devices offer the option to disable SSID broadcast, however some may require a firmware upgrade, and some devices do not offer that option at all.

If you cannot change the SSID or do not want to disable it, then the SSID should be changed to a unique phrase that is hard to guess. Using non-dictionary words as well as numbers and special characters for the new SSID will make it much more for your wireless network to be accessed by hackers.

3. Use 128-bit WEP Encryption

Wireless Equivalent Privacy [WEP] is the security standard and offers the option of either 64 or 128 bit encryption. It also includes additional encryption using the Initialization Vector (IV), which is a series of random bits added in front of a message before it is encrypted. 64-bit encryption is easier to hack into than 128 bit. You may need to update the firmware on your wireless device to be able to use 128-bit encryption.

Bu using encryption, if the wireless device and computer do not contain the encryption key, then no exchange of data will take place. Enabling 128-bit encryption will discourage people not permitted to access your network and make your network more secure. The casual hacker will normally move onto an easier target if they find encryption is enabled.

4. Turn off DHCP

Most wireless devices have Dynamic Host Control Protocol [DHCP] enabled. This allows a new host on your network to introduce itself and request an IP address so it can then connect and use your wireless connection. All very convenient for a legitimate user, but for an trespasser onto your wireless network, that's like putting a 'come steal from me sign' outside your open and unlocked front door.

While it may be a pin to the legitimate user to your wireless network, it's a necessary one due to the amount of damage that can be done if left turned on. By using static IP addresses you will create another hurdle for the unwanted prowler wanting to steal your bandwidth and probably more.

5. Enable MAC Address Filtering

Each computer network adaptor has a unique address built in called the MAC address. Most wireless devices allow MAC address filtering. By creating a MAC address list of permitted network adaptors [that are attached to a computer], you are creating a guest-list so to speak. If a computer with a MAC address on the list, they will not be permitted to access the wireless network.

Mac addresses can be spoofed by a very technical minded knowledgeable individual, however by using MAC address filtering you will deter all but the most determined hacker.

If you are unsure about how to proceed with any of the above please read the manual that came with your wireless hardware. There normally is a wizard or step-by-step walk through that will help you.

I hope the five above tips will come in handy and enable you to use your wireless network without the threat of an unwanted intruder.

John French has been breaking, repairing and building computers for over 15 years. He has expertise in computer security and maintaining a healthy computer. He is in constant battle with computer infections including spyware, viruses and malware.
For more computer tips and advice please visit http://www.john-french.net

Read More......