วันพุธที่ 25 มิถุนายน พ.ศ. 2551

Seven Essential Computer Maintenance Tasks

Computers must be properly maintained to keep in top shape. Here are seven things you should do on a regular basis to keep yours running smoothly.

Clear out your files. Check your TEMP and RECENT folders for files to delete. Clear your cache and empty your trash can.

Run ScanDisk. ScanDisk is in your System Tools folder under Accessories in most Windows versions. The Mac's equivalent program is DiskFirstAid.

Defragment your hard drive. This will make your computer faster and more stable.

Update your virus program. Go into your program and look for an Update application. If you can't find it, go to the company website for the latest version.

Update your software. On both PC's and Macs, there are security holes in the operating systems that hackers can use to access your files. Download software updates whenever they're available to fix these.

Clean your screen. Mix water with a little white vinegar or isopropyl alcohol, and dampen (don't soak) a soft, lint-free cotton cloth. Gently wipe the cloth in a single direction across the screen.

Back up your data. Not necessarily a maintenance issue, but something you should get in the habit of doing regularly. If something goes wrong on your computer, you could lose everything (important files and documents, programs, and crucial personal information). So it's essential that you back up your files - on a separate disc or hard drive.

You'll need to perform a few regular maintenance tasks on your computer to keep it safe, secure, and healthy. Follow these tips, and you'll notice an improvement.

C.Smith is sales director for http://www.on365.co.uk a Leicestershire based IT and server room management company. For more info visit http://www.on365.co.uk/Server-Room-Solutions.aspx

Article Source: http://EzineArticles.com/?expert=Chirs_Smith

5 IT Exhibitions Worth Attending in the UK

There are a number of exhibitions and conferences that take place in the UK each year for I.T. specialists, people working in or using I.T., and for members of the public. Below we look at five of the annual IT exhibitions that you might be interested in.

1. The MacLive Exposition is an event that Mac lovers are certain to enjoy, but will also be fun for anyone interested in technology and computers. Taking place between the 23rd and 25th October for 2008 in London's Olympia Exhibition Centre, this event is more than 8 years old and therefore very well established. There will be a number of interesting seminars at this event and also an impressive line-up of exhibitors.

2. Another popular I.T. exhibition, which takes place in the Olympia Exhibition Centre, is the 'Online Information Services Conference and Exhibition'. Taking place this year between the 2nd and 4th December, this exhibition really focuses on Information Technology and is an event that attracts people from a wide range of fields. I.T. affects us all these days and everyone from librarians, I.T. Managers, Sales staff and shop owners are likely to attend this show.

3. The 'Human Resource Software Show' similarly takes place in Olympia and is a great show for anyone connected to Human Resource Management. This is an annual event which includes a number of workshops such as 'Document Management 101: taking control of the HR paper trail', 'Learning and Technology: beyond the hype', and 'Managing Personal Web Use at Work'. At this exhibition you will get to see the very latest technology for HR departments and there will be many companies on hand to advise you on all areas concerned with HR software. This show normally takes place in June of each year and there are software solutions for Recruitment, Training, Payroll, Attendance and Feedback.

4. The 'Computer Fair' at the Don Valley Bowl Stadium in Sheffield is an interesting and handy event. Taking place on the 5th and 6th July 2008, this is said to be one of the biggest two day Computer Fair in England each year with more than 100 exhibitors present. This is a popular event with the general public where you can buy just about anything you might think of to satisfy your computing needs.

5. The annual 'Retail Software Exhibition', held at Donington Park in Derby is another interesting event. There are a number of workshops planned and this event takes place in different UK cities being run by the IT Showcase Online. It has been scheduled for the 18th September 2008 and looks to be really useful to these looking at retail software.

Catherine writes about Exhibition Stands and Services and Exhibitions in Ireland.

Article Source: http://EzineArticles.com/?expert=Catherine_Gliddon

Best Registry Fix-What's the Best Registry Fix?

Best registry fix software is not easy to be found. If you use the Internet often enough, you are bound to come across a varied number of options which all advertise themselves as the number one registry fix software to fix your Windows registry problems, but how do you separate those that really work from those that do not. Answering the question What is the good registry fix software is bound to take some diligence on your part and this diligence will be required in order to find the right solution to your problem. Due diligence will involve assessing the software in question to determine what features it has or does not have.

In order to be considered as the best registry fix for your Windows computer, the software must be capable of scanning your registry completely and finding all the entries which may be invalid or incomplete. The good registry fix also has to have the capability to remove the remaining elements of programs that were not uninstalled properly. Other than this the excellent registry fix should also include the backup and restore features that will mean if something accidentally happens during the process, you can always restore your registry to its previous working state. This is a very crucial feature and the absence of this feature eliminates any registry fix from the top contenders list.

Some added extras which may not necessarily make a product the excellent registry fix but which may do wonders in terms of making it all the more functional include the ability to schedule registry scans on a regular basis. This is a good feature because the good registry fix you can carry out by yourself has to include you scanning your computer regularly to monitor any new changes and registry issues which may have occurred over some length of time. If you can get all these features in one software package then you can remain confident that you have the best registry fix.

We have found the some good registry fix software for you. Which one is best? After you click on registry cleaners at http://www.registrycleanersfreereviews.com you would find the best registry fix.

Article Source: http://EzineArticles.com/?expert=Ck_David


วันอาทิตย์ที่ 15 มิถุนายน พ.ศ. 2551

Self-Destructing DVDs

DVDs are fantastic pieces of equipment. They store vast amounts of information and, more importantly, play back movies with crystal clear pictures and sound. They are a boon to both the IT and entertainment industry. As with all significant achievements, no one is content to simply let things be. Someone is always working hard on the next big thing, which is brilliant because that's what drives technology forward. It's thanks to this need to constantly improve that we abandoned beta-max video tapes and have now moved onto Blu-ray discs. Sometimes, however, new ideas aren't always that new, but are old ideas that have been dug up from the past, repainted in glossy colours, and sent out for another attempt at immortality.

I don't remember the first time self-destructing DVDs came out, but according to Ars Technica, a company called Flexplay Technologies has decided to give them one more try. My experience with self-destructing mechanisms is limited to the tapes in Mission Impossible that disintegrate in a discrete puff of smoke and the enormous explosions in space when yet another Star Fleet captain blows up the Enterprise in Star Trek. So it was with some trepidation that I read about self-destructing DVDs. Visions of home entertainment shrapnel and curtains on fire swam across my mind. I was quite relieved to discover that the destruction concerned was rather low-key.

Self-destructing DVDs undergo a chemical reaction once they are exposed to the air. Over a two-day period, one of the DVD layers is slowly degraded until it becomes opaque and impossible to read or recover data from. The question then arises: what on earth do you do with an unreadable disc? Most people will probably throw them in the trash and think no more about it, or hang them from their rear-view mirrors (which is tres chic), but Flexplay Technologies encourages all of their customers to recycle used discs via their mail-in recycling programme.

The self-destruct discs will retail at $5, which is actually fairly expensive considering that you get such limited use out of them. (Amazon sells DVDs on special for around $5 or $6; their regular DVDs sell for between $16 and $18.) If you only want to see a DVD once or twice, renting one is a far more feasible option. It's cheaper, for one thing, and you have a wider selection for another. At the moment, Flexplay only has 49 movies in its collection. Self-destruct DVDs also have to compete with a growing market of videos-on-demand supplied by many ISPs.

Ars Technica has a rather dim view of the future of self-destructing DVDs. They believe that the current version has no greater chance of surviving the long haul than its predecessors. As Ars Technica says, the market for self-destructing DVDs exists; it's just too small to sustain them.

Recommended site:

http://arstechnica.com/news.ars/post/20080604-steep-learning-curve-self-destructing-dvds-resurface.html

Sandra wrote this article for the online marketers MVI Data Recovery data recovery specialists leaders in the field of data recovery and retrieval

Article Source: http://EzineArticles.com/?expert=Sandy_Cosser

Find Free Proxies For Myspace

Proxy servers let you access websites from restricted locations. They allow users to bypass secure sites from blocked locations, as they have the ability to bypass network firewalls and filters. These proxy servers enable users to surf the internet from blocked servers.

Proxy servers are compatible with sites that have audio and video streaming platforms like Youtube. Whether you are at work, in school, university library or any other public location like a cyber café or a coffee shop, from where access of networking sites or related websites is restricted, these proxies let you surf online networking websites like Myspace, Facebook or Hi5. These proxies are reliable and secure and to browse the net, you have to must accept the strict set of terms and conditions like not to access websites that contain illegal content such as ware sites, use for spamming purposes, or distribution Spyware or any other malicious script.

The process to use these servers is very simple. You may be required to sign up to be able to use these proxies. Most of these proxy websites offer services for free although, some of them may ask for a small fee to enroll you with their websites. After signup, the user can type the desired URL (for example: www.myspace.com) on the main page and all connections and traffic to and from the destination URL is redirected via the proxy, making it look as if the traffic is evolving from the main proxy , thus bypassing the domain based URL filtering blocking system.

These proxies allow users to browse through websites like Myspace and browse through profiles, post comments, write blogs etc. Sometimes, you may be required to use the IP address of the proxy rather than the domain name (i.e. http://170.22.28.6/), which you can find by pinging the URL.

When you use a proxy server, your computer establishes connection with the proxy instead of the destination website, and thus the blocking or filtering firewall will be able to trace this connection only. Moreover, this proxy server, which may be transparent or anonymous, will create a connection to the desired URL that you wish to access such as Myspace, and retrieve that website, eliminating any trace of your computer.

The number of free proxies is increasing more and more each day that are setup to earn revenues through advertisements. To search for proxies compatible with websites like Myspace, you can use search engines i.e. Yahoo or Google. There are a number of websites offering these services and you can choose any of them as per your requirement.

Narenverma is a webmaster who owns various proxy websites. If you enjoyed this article, you may like to check his Myspace Proxy website http://www.myspaceproxyace.com to enjoy the web freedom in which he strongly believes in.

Article Source: http://EzineArticles.com/?expert=Naren_Verma

Computer Keeps Hanging Or Crashing

Does your computer keep crashing or hanging on you? Sometimes when we're in the middle of an important document, and alt tab, the screen can suddenly freeze, or even worse a blue screen error pops up. The second is called the blue screen of death, and if work is not saved, it is instantly loss when we reboot.

There are many reasons why the Blue screen of death happens or the screen freezes/crashes...Often it can be attributed to software or programs that we downloaded over the internet or installed through a cd, which caused a conflict with exisiting programs.

Check for a software conflict:

1. If an older program suddenly stops working properly after you install a new program, try reinstalling the older program, which may have had some of its files overwritten by the new one.

2. If your computer crashes after you install a new program, when both it and an older program are running, check with the publishers of the programs to see if there are updates that address the conflict.

3. If you've installed a new program and start getting crashes that don't seem to be related to running any other program, try uninstalling the new program. (See How to Remove a Windows Program.) If crashes continue, reinstall the operating system.

4. The Lazy Mans Way

The lazy way is to get a good registry cleaner because software conflicts results in errors in our registry, which contains all the drivers, information about our computer, printer drivers, softwares, video card drivers etc. An up to date registry cleaner quickly and easily fixes software errors

Download & Compare the Top 5 Registry Cleaners in the Market.

http://www.registrycleanercompare.blogspot.com

Article Source: http://EzineArticles.com/?expert=Sherman_C

วันพุธที่ 4 มิถุนายน พ.ศ. 2551

Computer Terminology - I Don't Understand It

Computer Terminology Is An Alien Language

I have been working in and on computers for over 50 years, and yes, I am a Geek. When I lapse into computer terminology, my wife's eyes glaze over, and I hear "borrrrrrrrrrrring" from her. Suspecting she is not the only person that is illiterate when it comes to computers, I have developed a simple terminology to use when speaking to a non-geek.

First, an analogy: A computer is made of many components. They fall into 3 groups:

Memory or RAM:

Memory or RAM is your work bench. It is where the work gets done. The more memory you have, the more things you can do at the same time. Ram is measured in mega (mega= million) bytes.

CPU or Processor

Your CPU or Processor is your motor. The more powerful your motor, the faster you can get things done. Processor speed is measured in GHZ or giga (Giga= A million million) hertz.

Hard Drive

The Hard Drive is your file cabinet, the more data you can save for future use. Hard Drive space is measured in mb or mega (millions of) bytes.

See? Nothing mystical about those terms is there?

Now on to the Definitions.

Definitions

Adware Those unwanted ads that appear on your browser.

Software that can detect and block viruses from entering your computer. It is vital that you have this and run it regularly to protect your data.

Bit A Single piece of data.

Byte A block of bits, usually 8 bits. An example of a byte would be a single letter as "A".

Browser The software that helps find what you are looking when you surf the internet.

Computer A high speed moron. It does exactly what it is told. This is not necessarily what you want it to do.

CPU Central Processing Unit. This is the heart, engine, motor of your computer.

DVD+R A format used to burn a DVD. Usually not compatible with a DVD-R drive.

DVD-R A format used to burn a DVD. Usually not compatible with a DVD+R drive.

Firewall A vital device that can be either software or hardware that hides your computer from the outside world. Windows has a built in firewall.

Firewire A type of connection to a computer. Used for connecting a device such as a camcorder to a PC. It is also known as IEEE1394. Sony calls their version "I-link".

Floppy disk A type of storage media. Floppies are no longer popular due to the limited capacity and slow speed.

Gamer A person that uses a PC primarily for playing video games. It requires a fast PC and a high level graphics card.

GHZ Giga hertz. Abbreviated as ghz. This is the speed of a processor. A hertz is a cycle.

Gigabyte A billion (thousand million) bytes of data.

Graphics Processor The component that processes and sends images to the monitor. Many demanding programs use the graphics processor as an additional processor to help the main CPU.

Hard Drive A storage unit. The hard drive is where data or applications are stored until needed again. It has non destructive readout meaning reading it does not destroy the data as in RAM.

Hi-Def High Definition as in TV. It is a very high resolution device and requires a lot of storage space.

IEEE1394 A type of connection to a computer. It is usually used by digital camcorders or external hard drives. Also known as "Firewire".

Internet The internet is a superhighway with information at waypoints scattered everywhere. In order to find where you are going, you need a browser, a url or a search engine such as Google or Yahoo.

LAN Local area network. The connection of several PCs together. They can also share an internet connection. An example of a LAN would be the 3 PCs in my house connected together. Data can be shared between the PCs.

Megabyte A million bytes of data.

Memory Also known as RAM. It is where data and programs are kept whle working or being worked upon. It is a destructive readout deivce, meaning that if you want to keep it, you must restore it. This is a concern only for programmers not users.

OS OS stands for operating system. Windows and Linux are examples of operating systems.

Processor The unit that does the work in a computer. Also known as CPU.

RAM Ram stands for random access memory. Random because you can pull data from any address, not wait flr sequential as in a hard drive.

Ram Drive A very fast retrieval device for storage. It uses memory as its media, where as a disk uses a metallic storage.

Router A device for connecting to the network. It allows several PCs to share a single network connection.

Scanner A peripheral device for reading a document, converting to a digital data stream and sending it to the computer.

Software A compilation of instructions to the processor telling it what to do in order to complete its taks. Remember, the high speed moron does only what it is told.

Spyware A snippet of instructions that is stored on your hardware without your knowledge. It then reports back to its originator what you are doing. Anti-spyware software can prevent this.

Switch A device used in a network. It usually has a router integrated into it. It also is an excellent firewall.

Terabyte Terabyte is a million million. That is a "1" followed by 12 "0"s.

Trojan Horse A snippet of software (usually malicious) that gets into your computer as a part of a legitimate message, such as email. Once activated, it can wreak havoc, even ruining a hard drive. Most anti-virus software also blocks trojans.

USB Universal Serial Bus (USB) is a type of connection to your PC. It is used to connect devices to your PC.

Virus A virus is a piece of malicious that enters your computer, usually against your knowledge that can corrupt your hard drive and thus your data.

Virus Checker Software that blocks viruses from entering your PC. Also known as anti-virus software.

Vista Vista is the latest operating system (OS) from Microsoft.

WAN Wide area network. Usually a connection of systems in several locations off the main premise or campus. For example, if you work at a company that has several locations in various cities that are connected via high speed lines, this is a WAN.

Web cam A small camera that is connected to your PC via USB or firewire can record what is going on within its view and send to your PC. From there, you can allow relatives in another location to view what is going on at your home.

Wireless In computerese, a method of connecting several PC's together. Each computer would require a wireless adapter. Routers and switches can offer a wireless connections. This eliminates the need to run cables between the various units.

Worm A snippet of programming language that is covertly slipped into your computer. When activated, it can corrupt your files, take over your browser, etc. Generally, anti virus software blocks worms.

WYSIWYG What you see is what you get. In other words, this is how your output will look.

XP Microsoft Windows operating system. XP is the predecessor to Vista.

My name is Rick. I am 74 years of age and have worked in computers since 1957. I became hooked on what you can do with a good computer and camcorder a couple of years ago. I have purchased most of the video editing software available including 3 chromakey programs. I am an Adobe Community expert and have all of the Adobe software. I also have special effects software that allows you to create special effects in your video during the editing process. I also use animation software. You should hear my poodles talk!

Visit my website at http://computersprintersandmonitors.com Here you can see other articles I have written along with computers and peripherals for sale.

Article Source: http://EzineArticles.com/?expert=Richard_Blackmon

Microsoft and Yahoo - Fatal Attraction Or - Finding Lolita?

I Agree with Icahn, although I think that his idea is only to cash yahoo value, where he doesn't bother about the new outcome; a takeover, merger amongst "equals," ...

This view on a possible merger between the two is only concentrated on the cultural effect.

When I bought MS Vista -- by acquiring a new notebook -- the first thing that I noticed was that Live messenger didn't work any more. I use yahoo messenger since. And the combination works perfect. Although this could very well be a stand-alone incident, I have read about the many open issues of this new operating system of Microsoft.

Microsoft needs more effort to become a powerful online player, Yahoo is not strong enough to face the challenges of its' main opponent, and ... 1 + 1 = ?

A merger of the two or an acquisition of Yahoo by MS, what ever you call it would be a great thing for the ... search-engine, software and community market. Of course, there will be a big challenge to have both groups cooperate, but obviously enough, the current MS developers need someone from outside to shake them up. Another example.

Vista Again: Not every day, but many days my browser on vista (not on XP notebooks) crash. The operating systems informs me about a "problem caused by the flash player." I wonder why I never receive a message stating that the operating system dumped due to an uncertain reason. Which would be more closer to the truth.

We concentrating on the cultural affect, think about this: the old man and the young girl. Yahoo would revitalize Microsoft's culture. Maybe that is the best reason why those to should marry: the old may feel young again. The latest presented earnings of Microsoft were beyond expectations, but this is only short-term. Although vista is not the only indication of the longer term, it is showing that something news is to come. And will the old giant be able to make it? The interest in the younger partner is emotionally the right step. This is a mergers' world. There is no single company that is able to compete with Google. When Microsoft and Yahoo cooperate they may come up with some interesting features the market would benefit from.

Of course there is this taboo on dating younger girls, but in this case I think Microsoft is wise enough and Yahoo starting to mature. The perfect moment for getting acquainted...

Hans Bool

© Hans Bool

Article Source: http://EzineArticles.com/?expert=Hans_Bool


Planning For the Future of Your IT Infrastructure - Notes From Interop Conference

Managing Data Centers

A typical data center or room full of servers should be built correctly and build to last for at least 7 to 10 years in order to be truly effective. These servers should have the capability of accommodating a minimum of ten GB (gigabits) of data. Still, with the growing demand on bandwidth, planning technology should prepare for a need of 100 GB to run efficiently. Another common concern is the need for cooling and power in the server room. For example, the IT staff at Google spends more on electricity for cooling their rooms every year than the cost of the servers within the data centers. Think about it.

Virtualization is another popular discussion topic. This term refers to hiding the characteristics of computing resources through encapsulation. This includes the process of making an individual physical resources appear to work like multiple logical resources. It can also include making many physical resources like storage devices or severs appear as a single resource. It's important to understand how virualization can help: although it can reduce the physical amount of servers, it doesn't mean that admin time to support them is also reduced. The costs of administration can truly hinder the entire process and the overall attempt to find a cost-saving strategy.

Services & Infrastructure

As with Data Center management, Infrastructure and Services' virtualization has benefits which deserve a look. However, the experts will highlight the reality that it can also generate far more work, especially in large environments.

The solutions from appliances are returning as they create reliable, simple services which require little overhead, making them suited for an environment in which administrative support fetches a premium. A key point on this topic is that Asset Management Network Administrators must be aware while maintaining good records of each piece of equipment - not just the servers and workstations. It's important to control this information for security and administrative purposes as well as lifecycle management and optimization.

Security

Many companies showed an interest in data security and compliance issues. The recommended advice seems to be 'Defense in Depth.' Perimeter defense systems which use Web Gateways and Unified Threat Management are available from a variety of companies and were discussed by several speakers. These systems monitored and blocked Web usage while defending against complex attacks using methods of prevention and detection. Network Access Control, or NAC, was a big hit at the conference. NAC disallows unauthorized access, either through wireless access points or the Ethernet. No security plan is complete without encryption. If a system is ever hacked and the info isn't encrypted, the industry will show no tolerance for having practiced this unsafe strategy.

Collaboration and VoIP

While most everyone will agree that Voice over Internet Protocol (VoIP) and Collaboration technology are significant advantages to end users, the vendors and speakers both agree that there's no real 'one solution.' The client's needs need to match the features of the solution, no matter if it's an IP PBX system, hosted solution, or a combination of the two. Voice over Wi-Fi (VoWF) was also demonstrated. Even though many office locations are wi-fi connected, there are some complexities and solution to make VoIP work on the these networks as well.

Mobility and Wireless

Many speakers and vendors discussed the access methods to gain corporate data from a mobile phone. Security methods including encryption, SSL, and others ensure that the data which flows between the wireless system and the headquarters is secure while in transit. In fact, nearly all companies are headed toward a more mobile workforce. This is not just the executive staff any longer, as there are more people telecommuters, field personnel and sales representatives who need to access information while away from the headquarters building in order to do their jobs well. The final point on Mobility and Wireless revolved around wireless access point placement architecture, particularly for campus locations. With the need for bandwidth and technological advances, there will be radical changes in the ways these networks are set up.

Nick Pegley is a marketing expert with All Covered: Technology Services Partner for Small Business, providing information technology consulting and IT services in 20 major U.S. metro areas. Outsource your procurement, installation and technical headaches.

Article Source: http://EzineArticles.com/?expert=Nick_Pegley

วันอังคารที่ 3 มิถุนายน พ.ศ. 2551

Computer Problems Tip - Spyware Invasion - What to Do When You Have Been Hacked

Hey, it could happen to you. I know. I am professional PC technician and it happened to me. Yes, I write how-to articles and tell all my clients the same things: be careful of "freeware" programs, watch where you download stuff, change password frequently, etc. All the rest but despite my best efforts I got jacked!

It happened innocently enough. I was doing some work for a client and was trying to convert some music and video files into a more portable format. But all the good software was only had "paid" versions and I wanted to save myself some money. So I logged into some geek forums and started nosing around.

One guy recommended this little "freeware" program he had used to good success. So I clicked on his link and surfed over to a software directory I had never used before and downloaded it. The program was running fine, when I noticed that my hard drive was being hit really hard, with its activity light going nuts.

So I quickly stopped the program and uninstalled it. But within a few days I got emails from eBay complaining that I was sending out "spam" emails to other users all across the eBay system. When I logged in, I realized that "someone" had used my user name and password to fraudulently send messages selling some kind electronic gear from a seller in Poland!

Dang! I had been hacked!

What Not to Do...

Don't panic. You have to remain calm so you access the damage and take the appreciate action. Running around downloading this and that "fix-it" software program can only make worst. Take a breath and get a grip...

...What To Do

I immediately took my PC off the Internet (I turned off my cable modem), then restarted and entered Safe Mode (hit F8 after the PC logo). I ran both of my anti-spyware and anti-virus programs for a deep scan of my PC. I found several Trojan Horse programs, which I removed.
Then I manually searched the "Program Files" folder to see if I could find any strange programs (don't do this unless you know what to look out for). I then used the Windows "Add/Remove Programs" module and got rid of thing suspicious.

After I was sure had scrubbed down my computer and was clean, I logged back online and entered my eBay account. I changed by password and then changed the password for PayPal also. I tried to remember every online account I had visited over the last several days. Oops, my bank!

So I contacted my local bank and changed the password for their account too. Was this strictly necessary...hmmm, I wasn't sure, but I could recovered from a shut-down eBay account a heck of alot faster than I could from empty checking account!

So after changing passwords for any websites I was working on and any other accounts, I could settle down and figure out what I had done wrong. I routinely use anti-virus and spyware killer software. I have a good firewall installed and I seldom download "freeware" from unknown sites, but I got in a hurry and I overrode my own rules. Being cheap was a lot more than the few bucks the software would have cost once I tallied the "price" downtime and lost productivity.

But it could have been worse. I didn't lose any money or my identity!

For more free tips visit http://www.fixcomputerproblemsguide.com - Hard Drive Crashed? Repair or Rescue Any Hard Drive...see http://www.fixcomputerproblemsguide.com/Hard-Drive-Crashed.html - From Chancer Reese, your Small Office Tech Diva.

Article Source: http://EzineArticles.com/?expert=Chancer_Reese

Computer Problem Tips - 5 Spyware Mistakes Most Everyone Makes - Could This Be You?

You have already heard enough about spyware to last you for a lifetime. So why is your machine acting so strange lately? The crashes, the sluggish behavior and the pop-ups are driving you mad.

You have got all the right stuff: all the software programs, the anti-virus, the firewall, etc. But your PC has been acting up and now there is some weird program installed on your desktop. If you want to get your computer back on track then you should see if you are making these five mistakes.

1) Did you forget to update your operating system?

Updating your computer can be a pain, I know. But of the things you could do to lock down and secure your PC, this one beats out all the others hands down. The boys from Redmond, WA (Microsoft headquarters), develop and send out operating system updates at least once a month, usually on a Tuesday.

Your best method is to turn on your Windows "Automatic Updates" module and let it handle the download and installation process for you "auto-magically". But you prefer you can just remember to use the "Windows Update" browser (click on "START" > "Windows Update") to manually download the latest patches.

2) Did you forget to use your anti-spyware program?

If you haven't already done it, you should download a good spyware remover like Ad-Aware SE, Spybot S&D or SpySweeper. Once you have the program of your choice installed, you should take the time to run a complete scan of your hard drive. Now this could take several minutes up to an hour if your PC is heavily infected. So you should do this while no one is scheduled to use the PC since multitasking slows down the scanning process.

Quarantine and remove as much of the spyware as you can. If you run into any really stubborn to remove stuff, just restart your computer and press "F8" after the PC logo, to enter the Windows Safe Mode area. Once in Safe Mode, just run the program.

3) Did you remember to install a good firewall?

You should use a personal firewall like ZoneAlarm or Avast! If you are using Windows Vista, then you should make sure the native firewall is turned on. A firewall is basically an application that acts as a "shield" that protects your PC from attacks from outside. It also can act as a barrier that makes it difficult for certain malicious programs access the Internet though your connection.

Bad programs often are designed to act as Trojan Horses (there is special class of software named exactly for this) that "open" the doorways (ports) of your PC for more dangerous programs to enter.

4) Did you visit one of the "3 G's" lately?

Gaming, Gambling and Girlie websites are often hotbeds of spyware and viruses. Be very cautious when visiting websites like these unless they are run by a trusted (brand-name) publisher. A website named "Get-your-woo-woo-here" is more likely to use malicious programs then a website published by a million dollar company like Playboy Enterprises. Gaming "cheat" sites can also have digital tag-alongs for "advertising" purposes. Also exercise extreme caution in using off-shore gambling sites run by shady operators.

5) Did you download something from a P2P network?

Copyright issues aside, some users and some shady operators of peer-to-peer (P2P) file sharing networks deliberately upload infected files and programs to gain illegal access to sensitive stuff on other people's computers. Don't reuse any password you have used on a P2P, since most don't secure usernames or passwords. And make sure your web browser is set to ask your permission before downloading any file. Know what you are downloading!

For more free tips visit http://www.fixcomputerproblemsguide.com Hard Drive Crashed? Repair or Rescue Any Hard Drive...see http://www.fixcomputerproblemsguide.com/Hard-Drive-Crashed.html From Chancer Reese, your Small Office Tech Diva.

Article Source: http://EzineArticles.com/?expert=Chancer_Reese

Computer Problems Tips - Spyware Hackers Or You - Who is the Most Dangerous?

"The Amish Virus

You have just received the Amish virus. As the Amish don't have any technology or programming experience, this virus works on the honor system.

Please delete all the files from your hard drive and manually forward this virus to everyone on your mailing list. Thank you for your cooperation."

As a computer technician, the first time I read this joke, I laughed out loud. Yep, I thought to myself, ain't that the truth. I know from both personal and professional experience that spyware programmers can cause a lot of damage not only to a computer but also to your personal life if they have access to your sensitive files.

But all jokes aside, the most dangerous person who can access your machine is not some remote foreign hacker but you and your family. Often when I visit a client who is having spyware issues, I often find that the bulk of their problems are self inflicted.

Malicious programmers can only hide their products inside of innocent looking pop-ups, webpages or "freeware" programs hoping to lure some unwary computer user into downloading them. Like a fisherman on the river bank, they can only cast out appetizing bait hoping to hook you.

But it's you, the computer user who can do whatever you like with your machine:

Like download files or programs from unknown sources...

Or turn off your firewall, because you find it annoying...

Forget to download and update security patches for operating system...

"Borrow" programs from your good buddy and install on your PC...

Visit high-risk websites catering to game "cheats", offshore gambling or the "babe-of-the-day"...

Use weak passwords or don't change them frequently enough...

Change the security and privacy settings on your web browser, so you don't have to keep approving downloads...

Never look at the URL or address of website to make sure you haven't been redirected to a spoof site...

Never read the EULA (end user license agreements), opt-in terms, privacy statements, and any notices with any software you download.

I feel, that to a certain extent, lack of proper knowledge on how to prevent spyware is a problem but still a good many clients just don't care enough to stop their bad browsing habits. They like doing what they want on the Net and they just figure that spyware is the "cost" of doing business as usual.

But this "it can't happen here" mindset is exactly what the bad guys are looking for. They have created the best "lures" they possibly can but you still have to "take the nibble" to get caught.

Spyware like the "Amish Virus" relies on people to make their own selves victims.

For more free tips visit http://www.fixcomputerproblemsguide.com - Hard Drive Crashed? Repair or Rescue Any Hard Drive...see http://www.fixcomputerproblemsguide.com/Hard-Drive-Crashed.html - From Chancer Reese, your Small Office Tech Diva.

Article Source: http://EzineArticles.com/?expert=Chancer_Reese

วันจันทร์ที่ 2 มิถุนายน พ.ศ. 2551

Taking a Look at the Camcorder World

The world of videos was forever changed when the first camcorder came along. These small devices offered those who wanted to take home videos with sound a chance to make their own movies, which can watch and relish the memories for years to come. A video recorder that also had sound incorporated was something that previously had only been available for broadcasters. With this invention, the world of memory-keeping was changed forever.

The world of the camcorder became known in 1980 when the inventor, known as Jerome Lemelson, patented his idea. He had tried before to receive a patent on this hand held recorder, but the office of patents claimed that it would never work.

Lemelson also had a hand in inventing crucial components for machines, such as the ATM, the Walkman and the barcode scanner seen in almost every retail store. Lemelson changed the way that technology fits into our everyday lives with his ideas for the advancement of technology.

When a person thinks of camcorders, they most likely do not consider the internal components. Inside those small digital handycam recorders are many components, including a mini VCR.

The handy cams are so tiny that one may have a hard time believing this, but in every type of camcorder, this crucial component exists. Also included inside is a CCD, which helps measure the light used to show the images, as well as lens and motors that deal with zoom, focus and aperture.

The camcorder offers a person the chance to record memories that they would not have been able to do fifty years ago. Not only can a person record the still pictures of an event, but now, thanks to the video recorder known as the camcorder, people can also capture the voices.

Technology has advanced to levels unseen by many of our predecessors; however, if a person only learns about how to operate one of these high tech devices, then they can take advantage of this world of the video recorder and save memories for a day when they will slowly begin to forget them. Memories are the cornerstones of the past.

Mike Selvon has a passion for digital videography, and his portal answers your common questions about the camcorder. Visit his portal for your free gift and leave a comment at his digital camcorder blog.

Article Source: http://EzineArticles.com/?expert=Mike_Selvon

How Not To Screw Up Your Computer Or Laptop

Here's some personal advice on how not to screw up your computer or laptop based on stupid things I've done over the years. This article should be of help to people who are brand new on the computer, people without much experience and possibly people with mid-level computer skills, who if nothing else can use this as a refresher. I've also included some other advice and pointers to help you avoid other potential computer pitfalls. I'm sure this is elementary advice to the more experienced computer user.

What Not to Do on Your Computer or Laptop if You Don't Want to Mess Them up:

1. Do not delete anything that you don't know what you're deleting. For example, if you delete a driver, you can totally screw the computer up. So do not delete anything unless you know what you're deleting & know it won't harm your computer by deleting. If you're not sure, do not delete.

2. Do not go to porn sites at all. This has nothing to do with morality but a lot of them have viruses,spyware and adware on them.

3. Do not open up any email with an attachment that you do not know who the sender is. Delete them. I also would not open up any email period if you do not know who the sender is. If you see an email from a place like Ebay, Paypal and Amazon, a Bank, etc. and the subject does not make sense- I.E., "Your account is suspended", etc., do not open it up, chances are its bogus with some nasty hidden computer code attached or its a scam email, On a lot of these suspicious emails you can check if they're genuine by looking at the messages on the actual site. I would never open up any Ebay message for example unless it is in your Ebay message Box.

4. Do not download any software from a site unless you know it is a legitimate site. A lot of sites are known to contain spyware, adware, and perhaps viruses. If you are going to download free software, I would only do it from sites like Download.com, Tucows, Microsoft, the software company's website, etc. As an aside, I have an Ezine Article on Free Software that you might find helpful, titled "10 Great Free Computer Software Programs and Applications (OK Some Of Them Are Cheap Software!), " Ezine ID 1062401

5, If you are not sure how to install a program, ask someone with experience. If you do install a program, initially just use the defaults and don't try to custom install it because the chances are you will screw it up.

6. When deleting a program, go to the control panel where it says add or delete a program and if during the deletion process it asks you if you wish to remove all files or a certain file which may cause damage, click no and/or no to all. This will seem clearer to you when that happens.

7. If you see some outrageous offer like free dinner, etc., for clicking a site, don't click it. Chances are you'll be getting spam, spyware, adware or worse.

8. Keep a seperate email address for personal email for people you know. Keep a separate one for e-commerce.

9. Try to not put your personal email address on anything you buy online, use a separate email address for online purchases. I would also try to avoid using your correct phone number, address, full name, etc., unless you absolutely have to or the website is from an established place like Amazon, etc. Obviously if you purchase something online you will have to give a correct address and name but you don't have to give a correct phone number. I would also give incorrect birthday dates that you'll remember. On websites/services that will not be sending you stuff in the mail, I would try to avoid giving your true information out alltogether even if it means changing it after your original info was put in and verified. I mean there's nothing like an angry person you sold something to online, harassing you by phone. Do not give out your Social Security Number! Repeat do not give out your Social Security Number.

10. Do not open up your computer and put things in like extra memory, drives, etc., if you haven't done that before as you're liable to screw things up big-time.

11. Have your computer plugged into a good surge protector that you get at a computer place or retail store like Best Buy based on a salesman's recommendation or online reviews. Do not buy at your local supermarket. If there is lightning outside, I'd recommend shutting your computer off completely as it still could get messed up even with the surge protector.

12. Do not let a friend or anyone else use your computer without you seeing what they're doing as they''re bound to do things covered here that I said you shouldn't do!

13. Don't leave your laptop outside for a long period of time if its hot as that could cause your computer to overheat.

14. If you hear your computer making a strange sound or smell anything burning, turn your computer off at once. The sound is probably coming from its fan. I once had a computer at work start to burn up from the fan.

15. Treat your laptop with care. If you drop it, bang it, etc., there is a good chance you will have caused some damage.

16. I personally recommend if you're not that experienced with a computer, to always buy a new one that has most things already installed- plug and play. If you buy

a used one, there's a chance that there could be something wrong that an experienced person could fix right away but you can't. Let the buyer beware. Here's just

a quick example. I bought a used laptop online from someone years ago and he said everything was set to how the laptop was when it was in the store. Well I

discovered massive amounts of spyware, adware, some viruses, etc., on it but I was experienced enough to know how to remove them with the aid of the right software. If you're not and try to do it, your asking for possibly even worse problems.

17. Don't drink any soda, water, etc. near your computer and try not to eat near the keyboard, either.

18. If a key gets stuck on your keyboard, do not pull it out, especially on a laptop, Alot of times, if a key comes off a laptop and you can't put it back in place, if you get it fixed, they will replace all the keys and charge you accordingly. Bummer.

19, I would get an extended warranty on a computer because if disaster strikes at least you won't be totally wiped out. Think of it as insurance.

20. Make sure you understand what you're doing with new software programs before you start using them.

These are just a few basic things and I'm sure I haven't come close to touching the surface but things will come fairly easy to you once you use the computer regularly.

I recommend http://www.2008Software.com which offers one of the largest selections of Discount Software on the Web as well as great discount prices on laptops and computers, printers, monitors, media and other computer products. Specializing in carrying the newest 2008 software and computers.

I also recommend http://www.OrderItDiscount.com which has the largest amount of discount name brand products on the web including electronics, HDTV's, Household Goods, Home Improvement, Auto parts, Jewelry and Watches, Tools and Hardware, Sports Equipment and much more.

Article Source: http://EzineArticles.com/?expert=P_Hershon

How Do You Repair The Windows XP Registry?

If you have noticed that your computer is slowing down, or if a lot of errors windows are popping up, then it is time to repair your Windows XP registry file. This file is key to having a computer run at optimal speed and for smoothness of PC operation. Like other versions of Windows, your Windows XP registry becomes corrupted with time as part of its normal operation. Here are some tips on repairing your Windows XP registry file and restoring it back up to its prime condition.

Create Registry File Backup First

The first thing you want to do is to create a point of time to which to restore your computer to - if it should be needed. This means you need to create a file for a System Restore. To find this, simply go to your Start button, then Accessories, then System Tools, and finally, System Restore. Name your file and then you have a current place to restore your computer to if needed.

After this is completed, go to the Start button again, then click on Run, then type in REGEDIT. Be sure not to do anything here except to click on the File button, then click on the Export link. Choose a place to save your new file, and then save it there. It would be a good idea to put a date in the file name so you can tell later how current that file is.

Look For Windows XP Compatible Registry Repair Software

There are more and more registry repair products being offered on the market. Some of these are free and others will cost. You need to look at the various products available and make sure that the one you are going to use will work with Windows XP.

Compare the Various Windows XP Registry Repair Cleaners

Look at some of the Windows XP registry repair software reviews in order to understand quickly what features a registry cleaner has when it is compared to other ones. The range of the ability of registry cleaner software to scan and repair registry errors varies widely. Some will barely touch the problems at all, and others may be the best registry repair tool you can find.

Choose the Best Registry Repair Software

After you have compared the various Windows XP registry repair software, you will find one or two that really stand out. You want to download the one that you think is best for the task of repairing your computer registry and enabling your computer to start operating the way it used to.

Even though one Windows XP registry repair software says it will do everything, it may be a good idea to use more than one. That is, of course, unless you find one that will do everything. Remember that software needs to be updated regularly and you will want to keep up with the latest versions. You should consider running Windows XP registry repair software at least once every two weeks in order to keep your computer in the best of shape.

Ronald Hudkins maintains a website that provides consumers a wide array of software solutions from business productivity, computer security optimization, anti spyware, adware, anti virus, language learning, scrap booking, computer and cell phone networking and more. To learn more about his outlet visit http://www.registryfixing.com

Article Source: http://EzineArticles.com/?expert=Ronald_Hudkins