Toner Cartridges

Oktober 29, 2008

Toner cartridges are implements that ensure that your copier produces high quality work with a look of professionalism. While there are many copiers that you can use, supplementing them with toner cartridges just gives you an additional touch of glamor.

The cartridges are generally in filled in black paint which are just but perfect for those documents you want to appear in black and white only. But for this to happen, the cartridges have to be compatible with your copier. The best way in which to ensure compatibility of the two is to check the model numbers and the brand names as well. Be very careful with the selection because there are many fake products in the market nowadays and you may just end up with scrap for a toner cartridge. One way you could do this is to ask the experts or manufactures to help you identify a mark of originality that would possibly not be their on the counterfeit goods.

Once you are quite satisfied with the information at hand, go to a reputable toner cartridge store to place your order. as you do so, you will find that there is a wide range to select from. Select only the cartridges that you are sure you need and those that will suit you comfortably. Get the right model number and brand name as the one of your copier. Make a pre-run copy test before making any financial commitment as this is the only way to ensure that your cartridge is in good shape and is functioning normally.


Article Source: http://EzineArticles.com/?expert=Peter_Gitundu

How Adding RAM Speeds Up Your Computer

Oktober 28, 2008

When your computer runs slowly, technicians often advise you to add more RAM memory to speed it up. Not only does this normally work, but sometimes the increase in speed is quite dramatic, especially when loading large programs or graphics. So how does this all work?

Well, RAM, or Random Access memory, is a small plug in card of Integrated circuits, which people commonly call "chips." What this means is that this memory is solid state ie. No moving parts, and is thus extremely fast, able to do hundreds of millions of operations every second. Programs, pictures, documents, videos and so on are all stored in this fast memory while you have these various things open and are working on them.

Now if your RAM gets full, and can't fit all this stuff in, the computer starts using what it calls Virtual memory, which is actually just space on your hard drive that is set aside for this emergency. You can see it on your hard drive as a file called pagefile.sys - and it's usually huge, because it has to be at least the size of your RAM.

What the computer system does is, it swops stuff in your RAM that you're not actually using right at that moment, putting it onto your hard drive, and then swops what you want to use right then, from your Hard drive to your RAM.

But your hard drive is very slow in accessing data compared to your RAM. And this swopping can get very hectic if your RAM memory size is small. Sometimes when you are in a word processor and you click page down, the computer has to swop the one page of your document out of RAM to hard drive, then pull the next page off the hard drive into RAM. This takes time and gives the impression that your computer is slow. Every time the computer swops a "page" of memory between the RAM and the hard drive, it registers what is called a "page fault." You can view these numbers in your task manager program, under the tab "Performance."

If you think of your computer as a restaurant, and yourself as the customer, then the RAM would be your plate of food, and the hard drive would be the kitchen. If your plate was full but you wanted to add a roast chicken, then you send all your potatoes back to the kitchen, and the waiter brings the chicken back to you. Getting a bigger plate is like getting more RAM. (Either that, or you have to eat less!)

With programs and graphics getting bigger and bigger all the time as new and exciting features are continually added, quite a large RAM memory is necessary even in the most basic computer. 256 MegaBytes is about the absolute minimum you can get away with, 512MB is usable, but I would recommend putting at least 1 Gigabyte (1000MB) of RAM in yoyr PC for comfortable computing. Put in more if you do a lot of graphics, gaming or you're a NASA space shuttle programmer.

And finally, if you can't afford any more RAM, then you can reduce RAM swopping aka Page faults, by closing any programs that you don't need. Try and close any process that uses memory if you don't actually need it. This will give your computer more RAM space to actually do it's job in.

And start saving for RAM!


Article Source: http://EzineArticles.com/?expert=Duncan_Kelly

About WMV Files

Oktober 27, 2008

With the increase in CPU power and the availability of high speed Internet connections, watching movies on PCs has become the norm. These videos can come in different formats, but one of the most widely recognized is WMV.

What WMV is

WMV stands for Windows Media Video, and it is the name of the video encoder that was created by software giant Microsoft. A video encoder is the file that makes it possible to watch videos on computers.

WMV is part of Microsoft's Windows Media, a series of files, formats and encoders aimed at integrating sound and video. These include the Advanced Systems Format (ASP), High Definition Photo (HDP), and Windows Media Audio (WMA), which is used for playing music files (similar to the mp3 format).

WMV uses several technologies, but mainly it serves as Microsoft's own version of the popular MPEG - 4 encoder.

History and Development

WMV was developed by Microsoft in the 1990s and made its debut in 1999. It has undergone several version upgrades and changes, and today it functions mostly to distribute video on the Internet and also in some CDs and DVDs. This codec (as video encoders are called), while popular, has also faced competition from others, notably DivX, Xvid, MPEG-4 AVC, and Real Video.

How to Play WMV Files

To play WMV files you need to have Windows Media Player version 7 or higher (there are also several other media players on the Internet that you can download that plays this format). Among the more popular alternative WMV players are WinAMP. BSPlayer and MPlayer.

Other third party applications that can view WMV files include Zoom, KMPlayer, and Power DVD. There are also some portable music players that support this file format.

There are also several programs, from full blown to shareware to freeware, that allow for the export of video into the WMV format. They include Windows Movie Maker, Sorenson Squeeze, Adobe Premiere Pro, and Microsoft Expression Encoder.

WMV Specifications and Features

All these files end in the .wmv extension. There are several components in each one, and some of them include ASF files, Sipro ACELP.net audio codes. Most versions of .wmv can also be converted to avi files.

With each new upgrade and release, Windows Media Video increases its features and capabilities. Among them is the ability to process the data with a wide range of network protocols. WMV can also be played locally, and you can also download updates and components from the Internet.

WMV files can also be scaled, and offers support for several languages. It also supports constant bit rate, variable bit rate and average bit rate, frame interpolation, interlaced video high definition video content resolutions, and non square pixels.

Another advantage of WMV files is that it is supported by a large variety of applications and systems. The Xbox 360 and Windows Mobile can run WMV files.

For users of the Macintosh, there are currently several software programs that allow viewing of WMV files, one of the most popular being Flipmac WMV, which is part of the QuickTime application.


Article Source: http://EzineArticles.com/?expert=Peter_Garant

About Sound Cards

Oktober 26, 2008

A sound card also known as "audio card" or "audio adapter" is a peripheral device of a computer which handles the functions related to sound. The sound card is attached either to an ISA (Industry Standard Architecture) or PCA (Peripheral Component Interconnect) slot on the motherboard of the computer. The sound card receives input sound from an input device (e.g. Microphone), records the sound and performs some manipulations and delivers the resulting sound as output. It basically functions as digital-to-analog converter which converts the input digital signal to an analog format. The output devices include amplifiers, headphones or some external devices using standard interconnects (e.g. TRS connector, RCA connector). The sound cards are commonly used in multimedia applications like music composition, editing video or audio, presentation/education, and entertainment (games).

The major functions of sound cards are:

a] Synthesis (sound generation from digital signals)

b] MIDI (Musical Instrument Digital Interface: a standard protocol which allows electronic devices communicate, control and synchronize each other. Simply we can say that MIDI allows exchange of system data)

c] Analog-to-Digital converter (e.g. converts the input analog sound signals from microphone to digital mode)

d] Digital-to-Analog converter (e.g. reconverts the digital signals to output analog signals)

The sound synthesis includes three methods. They are FM (Frequency Modulation) synthesis, Wavetable synthesis and Physical Modeling.

Before the invention of sound cards it was widely believed that computers are not designed to produce sound or music. The computers then, had an internal PC Speaker which could deliver only a beep sound, which was produced occasionally as alarm or warning. Eventually, computer programmers thought of giving beep as accompaniment for the games. Even then they could produce only beep sound for the game. Initially the sound cards was designed and marketed for IBM PC , based on specific audio applications such as music composition (AdLib Personal Music System, Creative Music System, IBM Music Feature Card) or on speech synthesis (Digispeech DS201, Covox Speech Thing, Street Electronics Echo).By 1988 game companies such as Sierra started switching towards adding sound effects in games.

In the beginning, sound cards for IBM PC were manufactured by AdLib. The card was based on Yamaha YM3812 sound chip, aka the OPL2.At the same time; Creative Labs also marketed a sound card called the Creative Music System. The Creative Labs introduced the Sound Blaster card which created a major twist in the IBM PC compatible sound card market. The Sound Blaster had an additional processor for recording and play back of digital audio in addition to the AdLib model.

As of now, in the commercial market, sound cards are available in a price range of $10 to costly models of $1000.



Different Methods Through Viruses Maybe Transferred

Oktober 10, 2008

There are different methods through viruses may be transferred from one computer to another.

  1. Now- a-days, most of the viruses spread due to receiving unknown e-mail messages that contains viruses. When a user opens such an infected message, the virus is also loaded into the computer memory. In this way, many other program files loaded into the memory are infected. This virus is also transferred to other computers when e-mail messages are sent from the infected computer to them. Due to these viruses, some time an auto generated email message from your email ID sends to your friends from your side with different virus messages. Never open unknown and attractive subject line email messages, always scan first even if you know the sender of the message.
  2. Another way of spreading virus is by using Internet and other networks. For example, when you download infected executables files or data files from the Internet or from a shared disk on the network, viruses are transferred to your computer. It must be noted that many software are available on the Internet with free of cost. Most of that software contains viruses, for example free PHP or ASP scripts are the main source of virus, always get these scripts from reliable sources. In an LAN, if a computer contains a virus, then all the computers on the network may be infected with that virus.
  3. One important means of exchanging data is through the use of removable media like, CDs, MP3 player, ipod and flash devices. So, when you copy the data from one computer to another by using a removable media, the viruses are also transferred.
  4. The virus can also infect your computer by using pirated software. The software, which is installed into your computer without license is referred to as pirated software. Some companies may intentionally attach some virus programs into their software. This program will only activate when it does not find some special files like license files on your computer.


Wireless Security

Oktober 09, 2008

The ability to share an Internet connection is great and the ability to do this wirelessly is even better. Wireless networks are easy to install, you don't have to run cables, and you can roam around a location within the WLAN (wireless local area network), or physical range of wireless connectivity . These features are what makes wireless networks so popular with both end users, and hackers.

The one problem with wireless networks is the vulnerability of your network. A typical hardwired network has physical security due to limited access to the actual network and one opening to the internet (Gateway) has a firewall or two in place (or it had better). This can stop most unauthorized access to your network. The difficulty in setting up wired networks has discouraged a lot of people from installing networks in the first place.

Then a long came the wireless which, as I stated earlier in the article, made the home networking game more appealing and not as intimidating. Having a wireless network means that the physical security that is inevitable in a wired network is simply not there. Anyone in the range of your wireless network can see your network, and if not secured properly, can gain access. If your wireless access point isn't the router on your network then outsiders can slip in behind your firewall. This used to happen at my college, there was an apartment complex behind a portion of the school, and the other techs would piggyback on some guy's network. He had an unsecured wireless network, no one did anything bad to him, they just used him for Internet access but he never knew.

There are some practices you can perform to insure that no one is using your connection or trying to get on your personal network. First and foremost you need to get WEP (Wired Equivalent Protection) in place, which is an encryption that stops unauthorized users from accessing your network. There are at least two encryption types in 802.11b (128bit, and 64bit) and should probably be changed every other week or so. WEP encryption used to be completely the user's responsibility, but now I'm seeing hardware out of the box with at least one encryption key configured, forcing the user to configure his PCs in order to connect.

Using WEP is essential to wireless security, but don't rely on it alone, there are other security measures you can put in place as well. With some wireless units you can set a MAC address filters, witch can really beef up your security. A MAC address is an identification number the manufacturer stamps on a network device, and is (or should be) completely unique. If this security is in place then even if someone knows the WEP Key they still cannot get into the network because your wireless access device will deny it.

There are two other things you might want to do to tighten up your network: The first thing you should do is go through and change all of the default security settings, and passwords. The reason I said this is most Routers and access points usually have a lot of these configuration fields (i.e. username and password or the SSID ) filled out with generic values for ease of setup. The bad thing about this is that people can use these settings against you to gain access into your network. Secondly, with a lot of routers your SSID is set to broadcast by default, this means that it's broadcasting your network's name to the physical reaches of your network. Not good, even if your neighbors don't have the security rights to access your network they will constantly see it every time they boot up one of their wireless PC's.


What kind of attachments can contain viruses

Oktober 08, 2008

Basically, anything that is executable (able to run). You're generally safe with picture files, text files, and the like. However, it still pays to scan first.

Here is a very short list of the most common to watch out for:

exe
zip
scr
vbs
bat
com
pif
asp
doc
xls

Those are the most common; don't misinterpret this to mean that if you get one of these files it's automatically a virus. A ".zip" file may be nothing more than a set of compressed files your friend sent you to look at. A "doc" or "xls" file may simply be an MS Office file. It's just that these type of files could also be viruses.

A couple other virus tricks you need to be aware of. First, MS Office files can contain what are called "Macro Viruses". Without getting into too much detail, these files can run a "macro" (a macro is a mini-program run from within another program) that can be as destructive as any "regular" virus. So, my advice on MS Office attachments is not to open them unless you are expecting them. If they just show up, verify with the sender first.

The other trick you need to look out for is an extra extension added to an attached file. For example, you may have something like "mypicture.jpg.vbs". In fact, if you don't have your computer set to view file extensions, it may just look like "mypicture.jpg" and omit that last "vbs" part.

This may appear to be a jpg picture file, but it's actually a Visual Basic Script file. If executed, it will happily infect your computer with a virus.

So, be careful out there.


Web Bugs

Oktober 07, 2008

Have you ever heard the term Web Bug? How about Web Beacon or Clear GIF? Well, don't feel left out if you haven't, it's not everyday terminology. The terms I mentioned are different names for the same thing. For the sake of remaining simple I'll stick with one name Web Bug. So what are Web Bugs and what to they do? They are small (1 by 1 pixel), usually transparent gifs hidden on websites or e-mails within other images like banner adds. Web bugs come from a different site than the one you are viewing but are most often affiliated with the site being viewed.

They are a lot like cookies in that they allow sites to recognize you and track where you've been. Web Bugs have a couple of major differences however. Web bugs share your information with any site that you may visit with the same type of web bug imbedded on it. The personal information bugs are sharing can be harmless information or very personal information, it depends on what information you have put on one of these sites. If you have given one of these sites information like your email address, then every other site you visit with the same bug will have your email address and can now send you spam. By sharing this personal information between sites these entities using bugs can get your email address and send out more spam and web bugs right to your front door. If you visit a site that recognizes you from a Web Bug then that server can not only track you but also send images and blocks of text to you. Web Bugs are also harder to detect than cookies because they are hidden, extremely small, and invisible.

These Web Bugs can also be placed in e-mails, a favorite trick of spammers is to hide a Web Bug in a random email. Opening or even previewing this e-mail can initiate the Web Bug process, which tells spammers that this is a valid e-mail address when someone views it. This validates your address, essentially making you part of their list of e-mails to spam. Most of the more recognized e-mail clients are affected by this such as Outlook Express, Gecko for Linux, Netscape, AOL, and more.

So, how do you stop or prevent these web Bugs from tracking you? As far as e-mail, make sure you don't open or even preview e-mails from unknown sources. Another thing you can do to prevent the Web bugs from biting is to block images in your e-mail all together, this will stop the GIFs from getting through your defenses. Win XP Service Pack 2 turns this setting ON by default in Outlook Express, and other e-mail clients have similar options (i.e. MSN/Hotmail and AOL).

You can also configure tougher cookie settings in your browser, but keep in mind all of these settings will affect the way you surf the web and view your e-mail. You can get advertising blocking software, but these programs have a hard time distinguishing between images that show information and images that are crawling' with Bugs. You can also go through the HTML code and look for the img tag that relates to a cookie (sounds like fun).

So are these bugs really something to get all worked up about? Well if you really don't like the thought of constantly being tracked and evaluated. If you don't like spam or pop-ups then this could be something you might want to at least regulate. You can figure out exactly what a web bug is doing by viewing the privacy policy which should be located on the website of the owner of the bug. If you don't find the privacy policy, you can always send the company e-mail and ask for what purposes do they have web bugs on their site.


How Firewalls Work

There are mean people out there that want very badly to get into your system or network. Maybe they want to steal information, to simply cause as much destruction as possible, or to use your system for their own uses. If you're online a lot or have a broadband connection, the attempts to enter your system may be relentless.

I feel that there are three main areas of defense against these threats: Anti-virus (of course), Firewall, and Spyware removal. With some programs being more important than others, but none being without importance. What I would like to do is give all of our readers at least a good concept of what these Firewalls and Anti-virus programs do to protect your system. I'm going to attempt to highlight the functions of these utilities and even some good practices that you can implement.

This week I'll be discussing the first line of defense between you and the Internet firewall. A firewall isn't going to stop you from getting a lot of viruses out there, unless it's the kind of viruses that proactively scans systems for open ports like the 32.Sasser that has recently stepped onto the virus scene. Where firewalls really come into play is in the area of Internet or Network access.

There are two basic types of firewalls: hardware and software.

A common hardware firewall is a routers. In a small network it sits in-between your PC and modem. These firewalls feature the ability to hide your PC from others on the Internet by assigning you private IP addresses through a process called NAT (Network Address Translation) or DHCP (Dynamic Host Configuration Protocol).

I may have lost some people there who are not familiar with IP addressing. This can get confusing rather quickly. To put it simpler: a router will take the Internet address that your ISP has doled out to you and give the PCs the are connected to the router a generic private IP address (not valid for the internet). The other primary job is to close ports (these are numbers that are associated with certain jobs, for example most email clients and servers use SMTP port 25 and POP3 port#110) ports can be a vulnerability as seen in the past and a hacker can have an easy time getting into your PC with ports wide open to the world. When hackers try to scan your network for known vulnerable ports the Firewall simply drops the packets because they contain data that no PC on the network requested.

Software firewalls are a little bit different and they have good points and bad points. First let me start by saying that it is always better to have a firewall then not to. The main difference between the two styles of firewalls is that one is an external device that runs on it's own hardware. The software firewall is an application that runs on your PC. This is the one down side I believe because it's one more application running on your PC while you're trying to surf the web and can cause resource overhead and slow things down in older PCs. In concept the firewalls really are the same, except that one of the biggest differences is a software firewall doesn't have any address translation services (i.e. NAT or DCHP).

Software firewalls do have some really great features however. For instance, a software firewall is great for someone who is new to this area of PCs and wants to learn more. I say this because most of these firewalls have a reasonably easy to understand interface different from the more "Techie" looking router interfaces.

Software firewalls also have a feature for Internet access that I think is very informative, for example in most of the software firewalls I have come across when a program tries to access the internet the firewall will pop up and ask you if you want this action to be allowed every time, prompt every time, or deny Internet access to the program. Most software firewalls will also notify you when someone from outside is hitting your firewall and a lot of times you get the IP address of the party on the other end of the actions. Both of these features can be used to further protect your PC, in some cases you might even be able catch a hacker trying to get into your PC by getting their IP address and then asking there ISP what this IP address is doing pinging your IP address.

I've actually helped one of customers do this they called me up and said that there firewall kept making noises and popping up with windows saying that there was some activity on here firewall. She said that this had been going on for a couple of days. Well we opened up the interface and looked at the log describing what the activity was and from whom it originated. There were a bunch of pings hitting her firewall, but the software gave us the IP address, and from there we opened up a command line and pinged the IP address back and it came up with their ISP's domain name. She called that ISP and talked to them about this address and what has been going on. I wouldn't be surprised if he was kicked from his Internet service.


How to secure your password from hackers attacks?

Oktober 06, 2008

Today tip will help you to secure your computer from the access of professional hackers. There are some hacker’s breaks into your computer without using any impressive programming skills but trying to find words to guess as your password. Normally people use their name, house number, mobile number and word “password” as a password. If you have very simple password then a hacker can hack your computer very easily. To safe your computer from hackers there is a best way to create a tricky password. Here I will tell you some different type of tricks to make your password that can’t guess easily by any body.

Use the maximum characters in your password.
Always set the password using maximum characters length, because it is simple method, if your password is longer then it is very difficult to guess.

Use the combination of lower-case and upper case letters in your password.
Normally computer users use the lower case in password selection but it is best practice to use the combination of both (lower-case and upper case). So using different cases in your password makes it much more difficult to crack.

Use the combination of letters and numbers in your password.
When you mix both letters and numbers just like one letter and one number then your password is more incomprehensible.

Avoid using the name of your family members as password.
Always try to avoid the name of your child, spouse, city and country name as password, because if any body knows about your personal life’s details then they try to use these detail to guess your password.

Use any tools to create random password.
There are many third party tools are available to create the random password. You can create passwords containing a very difficult –to-guess collection of random characters with these tools.

How You Can Maintain Your Personal Computer

It has been said that computers are the new revolution. Once thought only to be essential for business offices, computers are now in over 60% of all homes in the US and other countries are quickly getting there as well. Computers used to be for the scientist or the geek but now people from all walks of life use the computers to get onto the Internet to communicate via email, read the news, share pictures and videos and even work from home. With the number of home computers now almost as common as homes with television sets, the issue of PC maintenance comes into the picture. Should you buy the limited or lifetime warranty on your PC or MAC, or should you scout your local classified section of your newspaper to get a technician to call in case something goes wrong? Or should you just do maintenance yourself? We're going to concentrate on how you can maintain your PC to avoid making that call to a technician.

1. Power surge protection

While electricity is what powers your home PC, it can also be its worst enemy. Power surges are now the number one cause of computer data and critical parts malfunction in the United States and elsewhere. A power surge is a sudden increase in the power coming into your home through the electrical outlets. This sometimes can come about as a result of a storm that causes lightning to surge through the power grid causing a temporary interruption and then resumption of power. This slight electrical hiccup can cause a massive power surge to be sent into your PC and practically fry critical components. To guard against this, you need to purchase a Power Surge Protector. The best ones come from a company called APC.

2. Do not turn off PC

Many people have this impression that computers, like television sets or radios, need to be turned off when they go to bed. This is not the case. Windows operated computers need not be turned off and on all the time. Turning computers off and then on may result in data damage and even a system crash. Most PCs have a sleep or hibernate button which should be pressed to enable to computer to "snooze"

3. Do not download from unknown websites

A computer's worst enemy is a computer virus. Viruses travel across the Internet and gain entry into one's computer via emails, email attachments and downloading software and other programs from third party sites which have a dubious origin. Viruses can also get into your computer via streaming media (watching streaming video or listening to audio from unverified sites). If you are given to visiting third party sites and downloading media and programs, make sure you have a recent version of a good anti-virus software such as Norton or McAfee. Also do anti-virus scans on your PC and do not open email attachments from people you do not know.



Article Source: http://EzineArticles.com/?expert=Theodor_Cartman

8 methods prevented Laptop Overheat

Oktober 05, 2008

The incident laptop exploded because overheat (hot excessive) in recent times often happened. Be on the alert quite important, but did not become paranoid. Take note the method avoided overheat in laptop along with this…

1. Clean the ventilation system in laptop with the compressor.

2. Always placed laptop in the hard surface. Avoided placed laptop in the blanket, cloth wool or the other soft surface that could obstruct the wind and the exchange of air.

3. Turn off laptop before putting him into the box/the bag. If you did not want to kill him, arranged laptop in the condition hibernate. This was important to prevent the occurrence of the process of the hot increase. Don't very much-time placed laptop that was operating in the crowded place, this could increase hot.

4. Instal software monitoring, like SpeedFan, that enabled you to supervise and monitor the temperature of the processor, hard drive and the other component.

5. Arranged setting power to prevent hot was abundant to the component like the screen and hard drive. Lowered power as soon as possible if indeed was not needed.

6. And you too could use the cooler laptop that could prevent hot excessive.

7. If laptop you potential experienced overheat and still in the guarantee period, don't hesitate to report your complaint.

8. If you were planned bought laptop just, don't be reckless! Thorough previously thoroughly. Look for information about laptop the model and the make what often overheat, so as you did not regret in afterwards the day.



How to Penetrated Proteksi PC Security TM

Oktober 01, 2008

If you the lover software-software the protection for windows, you must know with software this one. PC Security was software the protection to file-file, the system, boot et cetera that was equipped with fiture-fiture the interesting protection.

To be able to enter and changed setting his protection, you must ident as the administrator PC security and for this will be asked for password

So that you could login without through password, his method searched file that his name sdeamon.exe and winwd.exe that was file the PC Security TM gift, file this dihidden from windows, so entered through DOS.

Usually this location in the directory c:\windows or c:\windows\system. Delete the two file this and you can enter PC Security TM easily and changed setting him without being asked for password.

Have Nice Try..


 
 
 
 
Copyright © Sharing Everyone