Friday 6 January 2012

Five Different Ways That Viruses Infect Our Computers

Viruses are the most threatening aspect of computers that will take your important data at risk. At times, it happens that a person may have kept some important data on his/her computer for future usage and when the time comes to access and use this data, the file has been corrupted and is no longer usable. These sorts of incidents are quite often reported by computer users around us and then people struggle to recover their data with very limited luck. It is not necessary to reach a situation where you will be trying to recover lost data. It is better that the user gets to know the ways in which a system can get infected with viruses in order to avoid them, and hence avoid also data loss. Generally there are five ways to get infected with a computer virus as we will see below.
Computer experts always recommend that each user must have a valid and licensed antivirus installed on their computer system so that it can counter any inbound threats that are trying to infect and cause damages to the system. There are five ways to get infected with a computer virus. First reason for a computer to get infected by a virus is the usage of a virus infected flash drive (USB Drive). Flash drives are commonly used in offices where there is a requirement for different kind of data to be shared from one computer to the other or between users. This situation is ideal for spreading viruses from one computer to another.
2nd reason for getting a computer infected with viruses is use of the Internet in a reckless way. While using the Internet we must be careful not to visit any infected websites. You will tell me now "how I'm I supposed to know which website carries viruses"? That's a great question. You just need to know that porn-download sites and also shareware and pirated software sites are mostly packed with viruses. These viruses that have been come up through the internet can easily be stopped by using a licensed and trusted antivirus.
Another way of virus infection is from emails. We normally come across a lot of emails in our mail box and most of the times we are unaware of the contexts of the email or of the attachments coming with it. Computer hackers and those involved with spreading of viruses send spam emails to all internet users. These emails contain viruses and once the user opens up the text of the mail or the attachment, virus gets routed to the system. These emails carry very attractive subjects and this is why most of the users are tempted to open up these emails.
It is a normal tendency that we like to download most programs for our computer for free so that we do not have to pay any kind of license charges. Most of the times these free programs are in fact viruses disguised as a useful program for the computer. Once the user installs the programs, a virus gets its way to the computer.
At times in firms and companies, computers are connected to each other through LAN networks for smooth functioning of office work. But a centrally unguarded and unprotected system will allow viruses to travel freely through the LAN. Infection in one computer is going to affect others.
These five ways to get infected with a computer virus must be carefully considered so that you will not be the next victim of computer virus. Get some means of protection or try to avoid some of the above mentioned reasons of being infected with viruses. Best protection is in the form of a good antivirus and user security awareness.
If your PC got a virus infection or got slower for any other reason, you should be aware of the best pc maintenance utility, PowerSuite golden. Check out this PowerSuite golden review to learn all important details about this software package.


Thursday 5 January 2012

The New Facebook? Understanding Google+

It seems like everyone has been talking about Google+ lately, a new social networking conglomerate developed by the giant Internet search engine Google. Although the platform is still in its field trial stage and is available by invitation only, there is already a large buzz about the product. So, what makes Google+ different from Facebook, the current most popular social networking site? 

Through its three main features – Circles, Hangouts, and Sparks, Google+ differentiates itself because it 

1) Gives the user more privacy by allowing him or her to be in full control of what is shared 

2) Has a group video chat feature 

3) Allows the user to uncover content rather than purely share content 

For the Facebook crowd at large who is unfamiliar with Google+, here is a quick glimpse into the nuts and bolts of the new site. 

The Stream 

Once you get the invite, (the word is that there are currently tens of millions of users, so ask around – chances are you probably know someone who is using it) just sign in with your Gmail, Picassa, or Youtube account. You are then prompted to create your personal profile, which consists of a profile picture, introduction, education, employment, places lived, etc. 

On the home screen, there is a GChat bar on the left side and a black bar at the top of the page that connects with Gmail, Calendar, Docs, Photo, Reader, and Web. Below this, there are four tabs that are quite similar to Facebook: Home, Photos, Profile, and Circles. The vast majority of the screen is taken up by a live news feed with comment and +1, or the “like”, capability of your Circles’s activities. But wait – what exactly is this “Circles” mechanism that keeps being referred to? 

Circles 

One of the three main features of Google+ is Circles. Circles allow you to sort your contacts into groups, including but not limited to friends, family, acquaintances, and following (like Twitter). Ever go through your 1000+ Facebook friends and not know who certain people are and how you met them? Have no fear – Google+ will keep your contacts organized. 

Additionally, Circles allows you to easily share posts and pictures with only a specific group of people. There is also the option of adding friends without a Google+ account to a circle, in which they will receive your posts via email. By giving the user control of essentially every post shared, Google+ can be as private or public as you want it to be. 

Hangouts 

The Hangout tool is a video chat function. After downloading Google’s Voice and Video Installer, you have the capability to create a Hangout and invite up to ten people in your network to chat. Rather than planning Skype sessions in advance, Google+ posts that you are “hanging out” in the live stream and gives others the chance to jump in. Another appealing feature of Hangouts is the ability for Groups to watch Youtube videos or movies together. 

An analogous application to Hangouts, the Huddle feature allows users to group chat through text. This can be useful for creating plans for the night or making decisions on a work related project. 

Sparks 

Sparks allows you to not only share content, but also to discover it. By typing your interests into the Sparks page that appears in your sidebar, you can stumble external sites that are of importance to you. Generally, these include current articles, videos, and other relevant content. Specifically, when I clicked on Recipes, which is one of the current featured interests, I was directed to “Foodmakers May Change Recipes to Cut Fat for Fare Advertised to Children,” “New Restaurant Shares a New Blueberry Pie Recipe,” and more. You can also share your favorite links from Sparks–and from anywhere on the web for that matter – onto your Wall. 

More on Google+ 

Similar to other social media sites, Google+ is available for those on the go. The native mobile app currently is available for the Android, but the web app is accessible for all smartphones, and SMS is coming soon. 

It is still undecided when Google+ will be fully available to the public, for Google+ representatives have stated, “How long the testing phase lasts, and how the product evolves, will really depend on how it goes. We don’t have a set amount of time” (Google+ Press Site). 

But, for those who have already snagged the invite, this ultimate question remains: Will you switch to Google+ or stay with Facebook?



Stephanie Wu is an Economics and Mathematics major at the University of Chicago.
http://www.thelevoleague.com
Article Source:http://www.articlecity.com/

Wednesday 4 January 2012

7 Tips to Keep Your Computer in Tip-Top Shape

In this modern age we keep in touch with relatives either through chat or emails, search for information about anything under the earth and sometimes out of the earth as well. We also do business proposals and communications with associates and of late do shopping and pay utility bills sitting conveniently at home. This is possible with the help of our computer and an internet connection. So it is important that we take care of our computer to work efficiently and without any hitches. Listed here are 7 tips to keep your computer running in tip-top shape.
1 Value in Brand: When you depend on the computer to do lot of your personal as well as business communications, it is of paramount importance that you invest in a good computer to do that. There are assembled sets available at a price lower than the quality branded computers. But in the long run they will make you incur more money on servicing and repairs due to the low quality parts used in them. Invest on a Good Brand for reliability and even if something goes wrong, the warranty will protect you from added expenditure.
2 Software: There is a tendency to rely upon counterfeit operating systems to save some money. This will prove as a wrong decision on the long run. Information technology being on a fast track, there are newer versions and updates to the existing versions released on a regular basis. Only genuine software is capable of updating them online. Further, there is no guarantee that the counterfeit will work without trouble. Imagine a situation when you have to reach an important client to close a deal but your computer crashes. Insist on OEM software.
3 Antivirus: Computer and Internet is regularly targeted by hackers to steal important data and details like username and password to use them for anti social activities. You can lose your money and credibility in that computer if your online bank account is compromised. Install the latest antivirus program on your computer and update them on a regular basis to stay ahead of the hackers and have peace of mind.
4 Power supply: As it is food for man, a computer to function at its best, require a continuous and steady supply of power. In case you area is prone for black-outs or power cuts valuable data can be lost when the power is lost abruptly while you are working on an important work. Therefore it is advisable to ensure a steady supply of power through a UPS (Uninterrupted Power Supply).
5 Qualified Personnel: The computer being a sensitive gadget, operations of them should be done by qualified personnel. The computer should be operated only by those who are aware of the basic functioning of the machine. Further, when there is a malfunction rather than fidgeting with the machine, it should be referred to the service personnel.
6 Regular Service: It is advisable to enter into an AMC (annual maintenance contract) with the supplier of the computer to ensure timely service and to avoid extra expenditure in way of repairing charges. Regular service will keep your computer in tip-top condition.
7 Beware of spam: One should be careful not to open spam emails which may contain viruses that will infect the computer. With the hackers also getting wiser day by day, any such email with "smart virus" in them can surpass the antivirus program installed. It will infect the system and important data will be lost.
It really pays to take care of your computer for a trouble free working day.
Mehmet Onatli is a computer technology enthusiast and an expert in computer performance optimization. He has helped thousands of people fix their computer with windows registry cleaner. Visit his site right now for more information and help to choose between top registry cleaners


Big difference in between Tablet and Notebook Computer

When on the subject of portable devices, both of those, tablets and notebooks is going to fulfill your entire mobile needs. While notebook is currently yet another name for laptop computer, which primarily is personal computer squeezed inside little and very slight package, tablet is something a little bit different.


Tablet is smaller sized computer without common keyboard which takes much space. Instead of classic QUERTY keyboard, tablet computers make use of stylus pen and touchscreen display which may be swiveled across keyboard for data inputting. Usually you can make use of classic pen for writing on their touchscreen or maybe use fingers to type on virtual keyboard.

Tablet computers have pretty capable and capable application which is able to recognize your handwriting and convert it into Word files or tiny text. Except that, you could draw sophisticated drawings using them or charts which will require much time drawing with mouse. Without a doubt, if you do not wish to use handwriting recognition tools you could make use of described virtual keyboard for writing text. 

Main benefit of tablet computers instead of laptops and notebooks is their fantastic flexibility. They aren't like other types that you need to place on reliable surface or your lap to be able to usage them comfortably; you may support tablets in one hand even though using other hand for manipulating using it and writing some thing that you need to remember while you really are in action. This can be notably necessary for those who are constantly in action, so they can require notes momentarily.




Than notebooks, as that might be their great benefit, it also will go down side. Tablets cost much more than notebooks, therefore if you might have tight budget you is going to be unable to provide one for yourself. Anyhow, if you are interested in this hybrid computer systems, read and learn in detail them.


Since lines involving laptop and notebook computers become thinner within time, also lines between notebooks and tablets start to blur as time passes. Due to the fact that notebook computers have received innovative touch screen display which are actually additionally swiveled across keyboard, dissimilarity between tablets and notebooks begins to dim.

Thus, here is little summary for the end of the article: tablet computers often don't have full keyboard that many of us may see on notebooks; tablets own touchscreen display that we can't find on most notebooks; tablets are incredibly flexible than laptop computers; tablets are considerably more expensive compared to laptops and notebooks.



Connie Alexander is experienced article writer with many published articles on technology feild. Last Her website is dedicated to best smart notebook. Read her article about diference between notebook vs laptop

 Article Source - CopyandPasteArticles.com 

Tuesday 3 January 2012

What Is a DVI Extender?

A DVI (Digital Visual Interface) is a video connector designed to transport uncompressed digital video data to a digital display device, like an LCD screen or monitor. A DVI extender is used to extend the distance between a DVI display and a DVI-based computer.
Background to DVI Extenders
Older computer monitors were CRT (Cathode Ray Tube) displays. A CRT is an analog device dependent on an analog signal sent from computers through an internal graphics card to the monitor. The graphics card translated the data sent from the computer into an analog signal which was then displayed on the CRT monitor screen. Eventually, these CRT monitors were replaced by a new technology in video presentation, the LCD digital monitor. That's when DVI connectors came into the picture eventually followed by the DVI extender.
The early representation of the digital monitor was the Liquid Crystal Display (LCD). Consumers loved these monitors as they were much thinner and lighter than the CRT displays. However, when LCD screens were first introduced there needed to be some way to accept and adapt the analog signal to ensure backward compatibility with the majority of available computers setting on desktops. In order for the data to properly be presented on the LCD screen, the analog signal had to be converted into a digital format.
A group of computer industry leaders called the Digital Display Working Group (DDWG) developed a specification to provide this backwards compatibility. This specification defined that the DVI connector should accommodate both analog and digital interfaces. The initial implementation was the DVI-I (DVI-Integrated) connector. As computers transitioned away from the analog graphic conversion cards, a different connector DVI-D (DVI-Digital) was specified and it handles only digital signals.
DVI Over CAT5 - Distancing the Monitor
In most cases, a computer is within a few feet of a monitor. However, there are many scenarios where there is added benefit keeping the computer a distance away from the monitor, for example in computer rooms, testing environments, classrooms, hospitals, airports, shopping venues, or any area where it's better to keep the computer away from the general public. A DVI extender makes this possible by extending the distance of the DVI display from the computer. A type of network cable, called Cat5/Cat5e/Cat6, connects the two devices.
Using DVI over CAT5 extender, the monitor can be as much as 300 feet away from the computer. The picture delivered by the DVI over CAT5 is clear and without loss of signal or degradation. In fact, screen resolutions as high as 1920x1200 are supported using the DVI extender. CAT5 DVI extender units are delivered as a paired product with a transmitter and receiver. The transmitter connects to the source and the receiver connects to the DVI monitor.
Find the best deals on DVI Extender and DVI over CAT5 products at KVMSwitchTech. Call our support team Toll FREE and get your questions answered before you spend money on any other product. Our video extender products are used in to support military, government, education, digital signage, as well as, commercial and medical applications.

How To Copy Videos to DVD

if you are like the rest of us, a quick glance into the closet towards that box in the back brimming with a collection of videos gathering dust in their obsolescence. With time, the deterioration of these tapes will begin and you will be stuck with miles of useless tapes that no one can ever watch again. The simple and smart thing to do with these would be to convert them all into DVD format. DVDs quality does not degrade with time and once you have converted them you will never again find yourself swearing as you fish tape from the inside of your VCR.
The simplest method of transferring VHS to DVD would be to attach the video and audio out lines from the VCR straight into your computer. The video can be saved to the hard drive as you watch it one last time as VHS and then it can be later saved as a DVD. Problem solved.
It might be wise to run and watch the VHS on your VCR and then through an editing program on your computer. Doing so will allow you to fine tune the output effectively neutralizing any imperfections in the taped recording or the effects of aging on the magnetic tape. Editing programs are widely available as free downloads on the internet and can turn most VHS tapes that have seen better days into rejuvenated versions that will entertain you for years to come. There is a lot to be said for storing a hundred DVDs in a storage rack versus a hundred VHS tapes in a huge cardboard box you can barely move let alone sort through.
One thing to consider when converting VHS to DVD would be the resolution issue. If the resolution during the conversion is reduced by up to half of the normal settings, you will be able to fit 2 or maybe even three movies onto one DVD. The quality of the movie won't be effectively reduced and there still is a lot to be said about storage space, even with DVDs.
There are also services available that will convert your VHS tapes to DVDs at a fairly reasonable price. One would be however be well advised to check with their policies and pricing before you cart 100 pounds of VHS tapes and hope for the best. All in all, the process of converting video to DVD is a simple procedure for anyone computer savvy, even if it is time consuming.
Do you want to copy videos to DVD? Visit our website to find perfect video to DVD converter....
Article Source: http://EzineArticles.com/?expert=Jaina_Wang


Network Technology Improvements


To benefit from the central resources and communications, a remote user usually has at least one wide area connection to the central site. The bandwidth requirements for the wide area connection depend on the kind of network services that the employers want to use in their job. If remote employees are part of the IP telephony network, a call manager device may need to be placed remotely. The network architect must think through whether the remote users need access to video resources concurrently. This kind of access will impact bandwidth. For instance, streaming video may be used for a business meeting. These design decisions involve evaluating the bandwidth at the central site wide area connection as well.
Selecting a Permanent or On Demand link
The net architect chooses whether it is superior to use permanent or on-demand links to the central location. The architect works with the client to consider security, cost as well as availability requirements.
A high-speed Internet link is a good choice for outworkers. It is easy to install in remote offices and is also available in many hotels. Occasionally, asynchronous dialup links are the one and only remote access solution accessible to travelers. Personnel who travel can use a laptop with a modem and the current telephone net to connect to the enterprise.
Wide area network connections at teleworker sites can use the following technologies: Asynchronous dialup, ISDN BRI, Cable modems, DSL, Wireless and satellite, VPN, Traffic Flow.
Traffic flow on a net is analogous to the car traffic flow on metropolitan streets. Vehicles move from one place to another throughout the city. Data traffic created from applications moves from one place in the net to another. The route is usually defined by a Net Layer TCP/IP address. Depending on the quality of service policies configured in the net, the route can be influenced by additional factors like Transport Layer source and destination port numbers. Let's say, a host sends a request for a shared folder to a server in one traffic flow. The server examines the request and if the user has the expected permissions, returns the data to the user in another traffic flow.
Traffic Control
Without a method of traffic control, like traffic signs or alternative roads to retain the flow, traffic on the highways becomes congested. Nets also need a path to regulate traffic flows. Quality of service mechanisms are created to guarantee the smooth traffic flow of application data traffic on the net.
Traffic flow is very important for all the networks and this is what really differentiates a good for a bad network.
Manolis Skoras is a Cisco, Microsoft and HP Certified Trainer and systems-network engineer. Recently he created a blog about IT exams to help his students and people around the world to better understand the material they will be tested on, thus having greater success rates. Check Certify4Sure today!
Article Source: http://EzineArticles.com/?expert=Manolis_Skoras 

Useful Tips for Buying Used Personal computers


Within this modern era, hi-tech devices that have become expensive like the computers is usually replaced with less expensive ones.
Such cheap pc's mostly come by using used computers. Used computers is located in abundance in this used computer warehouses in various places, even from your area of the prospective buyer's residence. However there will be no guarantee of quality when investing in an used computer. The customer has to take his own personal risk in completing this task. But, if the buyer is ready to spend some cash in upgrading the exact level of the used computer and also some time checking the quality of the used pc before purchase, it will save him from loss. Used computers can save a bundle for the buyer when compared to buying a different computer. There are numerous who cannot afford to get a new computer such as students who do not have any source connected with income but certainly require computers. Intended for such people, used computers come to be a boon.

Also, used computers need not always be second hand computers. They can also be recertified or refurbished computers. Refurbished or recertified computers are those, which are checked for any faults, if any corrected and sold with a warranty ensuring the working condition of the computer to be perfect. Hence, such computers are considered to be the safest form of buying an used computer. Refurbished computers can be bought from many of the online stores at very less prices. Quality computer manufacturers also sell such kind of recertified or refurbished computers. However, certain measures need to be taken while buying such kind of computers. more information visit Computer Tips site to read more information

That prime aspect to become considered while investing in an used or refurbished computer is to discover a good printed one. There tend to be various companies which sell used computers or refurbished pc's. The main advantages for opting for a branded one is that it includes a warranty and also the customer can be sure that the parts used are of top quality.

While buying used or refurbished computers related software documents, licenses and paperwork have to be got from the seller as this will avoid stolen computers being passed off as used computers to the buyer. If possible working for some time on the used computer will determine its efficiency. Most of the reputed dealers would certainly allow the purchaser to make use of the computer for a shorter period to check the quality previous to purchase.

While checking for the efficiency of the used computer, it is good to check if the booting process is smooth, as most of the problems occur during booting and also to check all the sound drivers, video, graphics, monitor, mouse, keyboard etc. CD drives and hard disks also need to be checked. Another aspect is the support system offered for any used computer if technical or non-technical, support staff capabilities and the quantity of support staff which determine the caliber of service offered. If the purchaser is unsatisfied, he can very well think of yet another choice.

article by johan768
 
Design by Free WordPress Themes | Bloggerized by Lasantha - Premium Blogger Themes | Hot Sonakshi Sinha, Car Price in India