Minggu, 31 Januari 2010

Ways CCTV Can Help Your Business

Many business managers and owners discount the idea of installing a CCTV system on their premises. Worried about costs and benefits, they use other security measures to protect their stock and their staff.

CCTV systems could be more beneficial than you think. Here are three key ways that CCTV can help to protect your business.

Deterrent

Although they won’t stop all crime, it is thought that visible CCTV systems act as a deterrent to would-be criminals. It’s far less risky to steal from a shop with no CCTV than from one that explains its system clearly in a window poster and which has highly visible cameras. The presence of a camera at the entrance or exit of a building and watching over key areas like retail sales floors or IT suites can make the difference between your business being targeted and the criminal moving on.

Evidence and Interference

Depending on the type of system you install, CCTV has the potential both to stop a crime before it occurs and to provide the police with valuable images that can help them to detain a suspect. Monitored systems, where the images are fed from the camera to a real-time monitor, allow security staff to see what’s happening at the premises at all times. If they pick up anyone behaving suspiciously they can alert staff on the ground who may be able to prevent a crime. Recorded systems, on the other hand, should give vital information on the appearance and activities of any criminals, which can make a huge difference to a police investigation.

Peace of mind

For anyone working in, shopping in or visiting your business premises, the knowledge that there is a working CCTV system in place brings peace of mind. Not only does it let your employees know that you are concerned for their safety, but customers and visitors recognise it as a deterrent and automatically feel safer than in a business where there are no cameras at all. Whilst not everyone likes the presence of CCTV cameras in public places, most people would say that such systems make them feel more comfortable.


Jumat, 29 Januari 2010

A Profile Will Be More Tasteful With MySpace Backgrounds

Since MySpace is one of the most visited sites on the Internet, there are many users who offer designs of various sorts to be added to the profiles. They will design and allow free upload of MySpace backgrounds, so that the entire profile looks more tasteful. All this is going to take a short while, and this is going to be done without any technical knowledge either.

It only requires the member to log into his MySpace account, and then open the page where he desires to upload the background. The MySpace backgrounds will come with simple codes, which anyone can follow. They just need to copy paste the code onto the page where they want the background to be seen. Backgrounds can be used with either images or texts.

It is all up to the wish of the members. For example, for the blog part of the profile, a member might want a background that is related to the blog topics. They could then begin to pick one of the theme related MySpace backgrounds. There could be tennis fans, and they could be blogging on their profiles, thus they should be able to find a background with a tennis theme.

Users may apply any sort of theme, and the resources available on the internet for the MySpace backgrounds are really amazing. There are so many sites dedicated to backgrounds, and there is so much variety that it would seem as if one is unable to choose from any of them. Being able to express yourself is also a part of these backgrounds.

You can use any kind of background, and you can make sure that it fits with the profile. Any part of the profile needs attention, and you can use the right backgrounds for the necessary parts. Members might not have to look too hard either, as there would be plenty of themes to choose from. The applications of the backgrounds are extremely easy, and they would be the use of a simple code.

All profiles will look more tasteful if these various MySpace backgrounds are used. This is because there will be so many visitors to the site, and it would only make sense to make the site more appealing. This would also bring many creative ideas to the users. They can showcase their thoughts, and can also entertain themselves by decorating their profiles as and when they want.

It is also important to know that these backgrounds may be changed any time. Even if one has time to change it every week, it can be done. The member has to understand is the use of the codes, and how they have to be applied to the particular page. This is very easy, and no experience is needed to apply these codes. It can be done by even those who are new to MySpace.


Kamis, 28 Januari 2010

Keypad Ponsel tidak berfungsi

Kotoran yang masuk ke sela-sela keypad adalah biang kerok kerusakan keypad. Jika masih bisa dibersihkan dan keypad berfungsi normal maka tidak terlalu sulit dikerjakan, akan tetapi jika IC keypad sudah dimasuki kotoran atau terkena air, maka ada beberapa tahapan yang harus dilakukan.

Sebenarnya permasalahan keypad pada ponsel ada beberapa macam meskipun sangat jarang terjadi. Berikut adalah beberapa jenis kerusakan yang disebabkan keypad pada ponsel, lebih baik bila anda menggunakan skema diagram sebagai panduannya.


Berikut ini salah satu contoh rangkaian jalur keypad



a. Apabila salah satu keypad ditekan tetapi tidak berfungsi, misalnya angka 5, kita harus periksa tegangan volt pada tombol 5, bila tegangan volt yang keluar adalah 0 Volt itu berarti tidak ada tegangan yang keluar (masing-masing tombol keypad memiliki tegangan sekitar 1.2 - 1.8 Volt, tergantung dari type ponsel). Hal ini bisa disebabkan oleh koneksi yang buruk pada jalurnya (cek emif), sebelumnya coba bersihkan dulu lempengan kuningan pada PCB, apabila masih belum berhasil coba cek rangkaian jalur secara vertikal dan horisontal.

b. Semua keypad tidak berfungsi alias hang, coba periksa terlebih dulu apakah IC Power masih baik, cukup lakukan pemanasan saja jika masih baik, dan gantilah bila sudah rusak.

c. Bila salah satu keypad ditekan maka angka yang keluar tidak sama, misalnya kita tekan angka 5 tetapi yang keluar angka 1. Bila sudah diperiksa tegangan yang keluar adalah 2.0 Volt, kerusakan seperti ini bisa disebabkan karena koneksi yang kurang baik, emif keypad rusak atau putus jalur. Ada beberapa kasus seperti ini bisa juga disebabkan karena salah dalam proses flashing.

d. Salah satu tombol ditekan maka ponsel menjadi mati, bila tegangan yang diperiksa adalah 2.8 Volt, maka cek terlebih dulu IC Power, coba panasi terlebih dulu atau ganti bila sudah rusak.

e. Hang (saat ponsel dinyalakan kemudian semua tombol macet). Pada kasus ini lebih dikarenakan CPU yang bermasalah, rehot CPU atau cetak ulang, bila masih bermasalah ganti dengan yang baru. Kemudian lakukan flash ponsel dengan versi terbaru.

Bila Anda menyukai artikel ini silahkan berlangganan artikel terbaru via email

Sabtu, 23 Januari 2010

A Concise Guide To MICR And Associated Technologies

Magnetic Ink Character Recognition (MICR) was developed to utilize the benefits of computer technology in the banking industry. Prior to the use of a MICR line, check sorting by account number was a manual process. Two systems were previously used to handle the large numbers of checks processed in the banking industry: Sort-A-Matic and Top Tab Key Sort.

The Sort-A-Matic system included 100 metal or leather dividers numbered 00 through 99. Each check was placed in the corresponding divider by the first two numbers of the account. The sorting process was then repeated for the next two digits of the account number, and so on. When the process was complete, the checks were grouped by account number.

Under the Top Tab Key Sort system, small holes punched at the top of the checks indicated the digits. For instance, the first hole indicated the value of the first digits (0, 1, 2, 3...) A metal "key" was inserted through the holes to separate all of the checks with the same value in the first digit, and this step was repeated for each digit until all the checks were sorted.

Both of these systems worked, but they were time-consuming. With the advent of the computer and its movement from the laboratory into the business world, a sorting and matching task seemed ideal. Stanford University and Bank of America were the first to successfully use computers to sort and match checks. They developed what is now known as MICR.
The Development of the MICR Font

The MICR font was developed by Stanford University in conjunction with Bank of America and approved by the American Banking Association. The font is known as the E-13B font. E-13B has a total of 14 characters: ten specially designed numbers (0 through 9) and four special symbols (Transit, Amount, On-Us, and Dash).

The letter E indicates the fifth version considered. The letter B indicates the second revision of that version. The number 13 is derived from the 0.013-inch module construction used for stroke and character width. This means that all character widths, both horizontal and vertical, are in multiples of 0.013 inches ranging from 0.052 to 0.091. The significance of this will be explained more thoroughly later in this article.
MICR Readers

Three types of machines are used to read MICR characters. The two that read the characters magnetically are referred to as MICR readers. The third machine is an Optical Character Recognition (OCR) reader.

E-13B characters are printed with toner containing iron oxide, which is capable of being magnetized. MICR readers transport the checks containing the E-13B magnetic characters past a magnet, thereby magnetizing the iron oxide particles. The magnetized characters then pass under a magnetic read head. The magnetic field (flux pattern) caused by the magnetized characters generates a current in the read head. The strength and timing of this current allows the reader to decipher the characters.

Magnetic readers come in two types: single track (single gap or split scan) and multiple track (matrix or pattern) readers.

Single-Track Reader Characteristics
Single track uses a read head with one gap to detect the magnetic flux pattern generated by the MICR character. When a magnetized E-13B printed character moves across the narrow gap of the read head, the electric voltage caused by the magnetic flux from the character generates a waveform unique to each character.

Multi-Track Reader Characteristics
The multiple track reader employs a matrix of tiny, vertically aligned read heads to detect the presence of the magnetic flux pattern. The small individual read heads slice across the character to detect the presence of magnetic flux. This sensing of magnetic flux over time produces a unique matrix pattern for each character.

An OCR reader does not use magnetic properties to detect the E-13B characters. Instead, it uses a scanner to detect the amount of light reflected from the character and the amount of light reflected from the background. A photocell column detects the presence of the dark area of a character.
Waveform Theory

The readers move and read documents from right to left. The right-hand edge of the character, as a result, is the first to cross the read head. Analysis of the signal level created by reading the character 0 will help explain this in greater detail.

As the character moves from right to left under the read head, the gap detects the magnetism of the first right-hand edge (edge 1). This results in the increase in magnetism and a positive peak is created (peak 1). As soon as the right-hand edge moves beyond the read head gap, no new magnetism is found, and thus the wave form returns to the zero signal level.

At the second edge, the vertical read head detects a drop in magnetism, which results in a -110 signal level at peak 2. Again the waveform returns to zero until the next portion of the inner ring of the character is detected. At this point (peak 3), an increase in magnetism (+110) is indicated. Finally, the outer portion of the character is read, resulting in a negative peak (peak 4) of -130.

The placement of the vertical edges must occur in increments of 0.013 inches from the first right-hand edge. There are five characters that have two positive and two negative peaks similar to the character 0 and also appear in a positive-negative-positive-negative format. They are 0, 2, 4, 5, and the transit character, which are differentiated from one another by the horizontal location of the peaks in the waveforms. The peaks do require different amplitudes, but ANSI standards allow them to vary from 50% to 200% of the nominal amplitudes (Canadian standards allow them to vary from 80% to 200% of the nominal amplitudes). This is why the placement of the waveform is so important and why the characters are shaped unusually.
What Affects the Signal Level?

Signal level can vary based on a number of factors. The amount of iron oxide (concentration) that is present in the character will affect the signal level. This is a function not only of the toner itself, but also of how it is laid on the paper and the pile height, which can be controlled by numerous other cartridge components (i.e., "hot" OPCs).

The taller the vertical edge of the character, the taller the peak (either positive or negative). A vertical edge that is not regular and/or not vertical will result in a reduction in the amplitude of the peak and will flatten the peak out.

Keys to proper waveform detection are:

* All peaks in a character's waveform must be detected. The reader sorter must know that the peak is there.

* The peak must be located at or near its anticipated location.

* No significant "extra" peaks can be present.

* There cannot be wide variations in the signal levels of peaks within a character.

What to Look for in MICR Printers and Consumables

Printers that are used for MICR printing must have a unique MICR font that is modified to suit the unique printer engine, and it must be modified to the pixel level to match the magnetic toner provided for that printer. This is essential to ensure the correct waveform, dimension, and signal strength when a check is printed with the correct MICR characters. In addition, the MICR font must meet ABA-X9 standards to ensure acceptance of your checks by banking institutions.

The magnetic MICR toner that you choose must be specifically designed for the particular print engine in the printer. Ensure the toner has been thoroughly tested for consistent signal readings, image permanence and uniformity, and excellent edge acuity. Toner coverage must be solid with no extraneous toner lay down.

OEM cartridges are always a safe (but more expensive) bet. If you buy a "compatible" brand, ensure it has a new OPC drum, new primary charge rollers (PCRs), a new black velvet magnetic sleeve, and new image wiper blades. The hopper system must be filled with high-quality, low-abrasion MICR toner.

The vendor you choose should use the latest and most advance MICR test equipment, such as a Verifier and Golden Qualifier to conform to ANSI X9 Standards. It is also recommended that the systems exceed U.S. and Canadian check printing standards.


Jumat, 22 Januari 2010

5 Tips for Buying a Laptop


Buying a laptop is a major investment decisions. Thus it is not one that you should make lightly. Here are 5 tips that will help prepare you to make the best decision and best information when buying a laptop.

Tip # 1 Size Matters

Buying a laptop is something that requires some thought. Note the size and weight of the laptop. How often you can bring your laptop? Your answers will help determine the size and weight best suited to your needs. If you will bring your laptop frequently, a lighter model would be better.

The keyboard is another area to consider when buying a laptop. Why is the size of the keyboard important? A larger laptop will have an area slightly larger keyboard. But keep in mind that if you worry about your fingers or wrists taking on too much stress from typing on a keyboard that is too small, you may want this to be a major factor in your purchasing decision,

Tip # 2 Choose Your Mouse

A laptop will come with a built in touch pad, an alternative to the mouse, where the pad is controlled by the user's finger movement. For some people, this type of pad is uncomfortable and not easy to work with. Before buying a laptop, determine what mouse options are available. Test each one and determine which one best suits your needs.

Tip # 3 Choice Wireless

Today, when many people think laptop, they think "wireless". There is no doubt people want to make sure that their laptop computers will be able to access the Internet with a wireless connection. Many tried to explain this by ensuring that their laptop has potential upgrade options, such as room for an expandable PC card or USB port. However, for many laptop users looking for a wireless connection, many laptops now come pre-wired for wireless Internet. All you need to do is turn on the wireless internet service, and your laptop will take it from there. So depending on your needs, choose your laptop whether it is capable of expanding or if it is configured for wireless internet.

Tip # 4 Check for Ports

Peripheral equipment will be connected to a laptop via USB port. You will make your life much less complicated by making sure that your laptop has adequate ports. Connecting equipment such as printers, scanners, and digital cameras will be easier if you have an available port. If you are not sure, really read the specs for each laptop you are considering purchasing.

Tip # 5 Check Your First Budget

Finally, when buying a laptop, be careful that you do not overspend. First create a budget and stick to it. If you think that you have found a laptop that you want, do not rush into it. Wait a day and check your budget, requirements, and see if you still as excited about the laptop in the morning, as when the sales clerk showing off its specs. If you still feel that it is a laptop that you want to buy, then go for it.

Kamis, 21 Januari 2010

10 Web Site Backup Essentials That You Should Live By


More and more webmasters nowadays do not value the importance of a complete website backup (files and databases). They have left this to chance and good luck which poses a great risk to their online presence. 

Can you relate to this? Then read this important article which might save you an arm and a leg later. 

Web site backup is the most ignored task of the webmasters simply because it poses no immediate threat to them until something worse happen to their hosting server. Many times, this task is set aside, delayed and even regarded as nuisance to the busy website owner. 

They just don't realize what is at stake here.

So before your website will be wiped out of the internet by unexpected accidents like server breakdowns, harddisk failures, hacking and DDOS attacks among other bad things, let me share with you the 10 Backup E-S-S-E-N-T-I-A-L-S you should not live without online.

EXPECT - Know that your webhosting company (even the biggest and the most boastful out there) may encounter problems and that your diligence to backup up will pay off later on. Online computing has never been so unpredictable that the worse of times will happen when you least expect it. With the proper mindset, you are insuring the continuity of your online endeavour in any eventualities. In short, be ready. 

SCHEDULE - Your backup process should not compete with your busy schedules. Create your own backup schedule at the most convenient time for you in the week. If you're like me, I do this during lunch and dinner times. Sometimes, I have to leave my PC overnight working on the backups. If you can make it not to conflict with your busy schedules, you will be able to keep up with the demands of this job. In short, don't complicate.

STICK with it - Just do it. Patience is key to your backup tasks. Once you have a schedule, stick with it. You must do this diligently every time it should happen. This is a tough challenge especially to busy people working online. But the sooner you discipline yourself and make backing up your files a habit, the more you will benefit from a worry-free online environment. In short, get a good habit.

EVALUATE - After a while, test your backup files. A good backup can be tested by simply restoring it on another system. Evaluating your backup results from time to time is good way to know that you are keeping what you should keep - a good and working backup. In short, be sure.

NO Complacency - After some time, your backup schedule may slip away and you will tend to forget or intentionally miss it. Don't succumb to this temptation. Man has never been so busy in his lifetime like it is today in this era of the high tech trends, new developments and discoveries. In short, don't be lazy to backup.

TRASH - Know which files to keep and not to keep. You need to do this to keep your backup process as short and as efficient as possible. It also saves you valuable resources like hard disk space and backup mediums. Backup only what you need. Keep out the trash and dump it. In short, don't sweat with the trash. 

INTUITION - Have faith in your backup results. Believe that what you are doing is for your own good later on. Like vitamins that keep your body healthy, backups keeps your mind away from stress and worries. A good working backup will make you smile even on the worst of times because you are insured by your patience. In short, believe in good results.

AUTOMATE - Look for alternatives to traditional backup process that can make your life simpler. There are several technologies and softwares you can use now to generate the fastest and safest backup files you will need to restore in case of emergency without you lifting a finger. Automation is king in this lazy man's world. In short, be efficient.

LIBERATE - Free yourself from worries and anxiety of theunexpected. A death sentence that can be prevented will not kill you. So think about what you can do more (like sleepingmore at night) than to think about what harm may come. With your own backup systems established, you can retire at night calmly knowing the next day, if you don't see your websites as you should, you know you can pubish it back within the day even if your webhost cannot recover it for you. In short, relax and enjoy life to the max.

SECURITY - Nothing beats the feeling of being secured. This is the reason why the insurance businesses have flourished over the years. But more importantly, your commitment to backup your files will not only save you from stress, humiliation, frustration, anger and guilt, but also lift your spirit and confidence because you know at the end of the day, your self reliance is well worth it. 

And that, my friend, is a great and wonderful feeling.



10 Simple Reasons To Remove Spyware From Your Compute

Is your computer been running slower than normal? Are you worried someone may be able to access your computer and steal your private information and use it against you? If so, these are feelings I have shared with you in the past. 

Some time back, my 3-year old computer was running so slow that I had to buy a new computer. Or at least I thought I needed a new computer. Then within a matter of weeks of surfing on the Internet, my new computer was also running so slowly. In addition, some programs did not run well on my computer, and I did not recognize some of the programs that were running on my computer. That scared me most. Were these programs that were tracking my keystrokes on my computer or programs I just not remember installing? I knew I had to find a answer and solution fast. 

The truth is, we can all put up with a slow computer, but very few of us would want others to have access to the information on our computers, but that is exactly what can happen when spyware or malware is loaded on our computers without our knowledge. 

According to Spyware Nuker’s web site, “Spyware applications are programs and files that hide on your PC's hard drive without your direct knowledge. These programs allow hackers and advertising companies to track your every move, both online and even when you work offline. They can track the websites you visit, the items that you buy online, the emails you send and receive, your Instant Message dialog, and worst of all they can even record your credit card number, personal identification numbers, and all of your passwords. If you use dial-up to connect to the Internet then spyware can be used to bill 900 numbers to your phone bill. This is just a short list of the harm that spyware can cause.” 

The web site also provides statistics that show spyware is a huge problem effecting many people. "27.3 million Americans have been victims of identity theft in the last five years, including 9.91 million people or 4.6% of the population in the last year alone."

In addition, it is very easy for your computer to become infected with spyware as "The majority of all downloadable games, music, screensavers, etc., can infect your computer with SpyWare or AdWare. Most people do not know that after simply clicking on a random "pop up" ad, their computers may have been infected with SpyWare or AdWare."

No matter how we get spyware, here are 10 very real reasons you don’t want spyware on your computer. 

1. Your computer may start running slower 
2. Some programs on your computer will not run correctly 
3. You may not recognize programs that are now on your computer because they may have been installed there by a spyware related web site or program you loaded on your computer. 

In addition, you might be worried that: 

4. Someone might be able to read your e-mails 
5. Someone might be able to access your e-mail list
6. Someone might be able to see you track the keystrokes you type 
7. Someone might be able to access your credit card information on your pc
8. Someone might be able to access your passwords list on your computer 
9. Someone might be able to steal your social security number
10. Someone might be able to track all the web sites you visit 

As I mentioned, most of these programs get on your computer with out you even knowing, but another frustrating part is I recognized a few of these programs because I remember installing AND uninstalling them! So now I know that when we install some of these handy little utilities to track passwords online or programs to help with e-mail or keep track of the weather, even if we uninstall them, they may not be gone from our computers. They are still in our computers, waiting to spy on us, at the least. 

A great way to find and remove spyware is to run a spyware detector and remover. Most spyware detection and removal software today offers a free scan to verify that you do or do not have spyware on your computer.


Flashing DCT-4 menggunakan UFS

Lanjut kembali dengan tutorial software, kali ini tentang bagaimana cara flashing ponsel dari Nokia DCT-4 dengan menggunakan Box UFS yang disebabkan karena kerusakan software. Bagi yang perlu informasi mengenai apa itu software silahkan dibaca mengenai penjelasan software ponsel dan bagaimana cara membedakan kerusakan software dan hardware dari ponsel yang akan Anda diperbaiki.

Setelah box service terkoneksi dengan komputer dan kabel data sudah terpasang, lanjutkan dengan menekan tombol Check pada program UFS DCTxBB5... yang saya contohkan disini ponsel Nokia 7250i, apabila 1st Boot OK menandakan bahwa ponsel siap untuk di-flashing (perhatikan gambar).

Catatan: Selalu pastikan bahwa ponsel telah di-back up datanya sebelum melakukan proses flashing



Untuk memeriksa firmware yang telah ada sebelumnya, bisa dilakukan dengan menekan tombol Info. (beberapa ponsel yang telah rusak firmware/mati software biasanya tidak akan menampilkan hasil, kecuali bila Anda hanya ingin melakukan up grade versi ataupun bahasa maka akan mepunyai hasil seperti ini)



Tekan tombol Flash kemudian masukkan data dari MCU dan PPM di tempat Anda menyimpan file tersebut, berikut gambar prosesnya.




Saat pengisian data berikut prosesnya dan tunggu sampai selesai.



Bila flashing berjalan normal maka hasilnya seperti ini



Untuk melihat hasil flashing, silahkan tekan tombol Info kembali. Maka akan didapatkan bahwa firmware telah berubah ke versi terakhir yang Anda flashing tadi (lihat hasil gambar Info sebelumnya).



Selesai... segera lepas kabel kemudian nyalakan ponsel, maka ponsel akan kembali normal.
Semoga bermanfaat...

Jangan lupa untuk berlangganan artikel terbaru langsung ke email Anda disini

Senin, 18 Januari 2010

A must-know about computer and internet glossary

Computer-related things tend to have a language all their own. While you do not need to know all of it, there are many confusing words and phrases that you are going to come across sooner or later. 

Bandwidth. Bandwidth is the amount of data that your website can send each second, as well as the amount of data that the visitor to your website can receive. If either one does not have enough bandwidth, then the website will appear slowly. 

For this reason, you should choose a host with plenty of bandwidth, as well as testing that your site doesn't take too long to download on slow connections.

Browser. A browser is the software (see below) that visitors to your site use to view it. The most popular browser is Microsoft's Internet Explorer, which comes with Windows.

Cookie. Cookies are data files that your site can save on the computer of someone who visits that site, to allow it to remember who they are if they return. 

FTP. File Transfer Protocol. This is a common method of uploading (see below) files to your website.
Javascript. A common language for writing 'scripts' on websites, which are small programs that make the site more interactive. Another common cause of problems for visitors.

JPEG. Joint Photographic Experts Group. This is the name of the most popular format for pictures on the web, named after the group that came up with it. If you want to put pictures on your website, you should save them as JPEGs.

Hardware. Hardware is computer equipment that physically exists. It is the opposite of software.
Hosting. If you've got a website out there on the Internet, then you'll be paying someone for hosting. It is the service of making your site available for people to see.

HTML. HyperText Markup Language. A kind of code used to indicate how web pages should be displayed, using a system of small 'tags'. The 'b' tag, for example, causes text to appear in bold, and the 'img' tag displays a picture.

Hyperlink. A hyperlink is when a piece of text on a website can be clicked to take you to another site, or another page on the same site. For example, if clicking your email address on your website allows someone to email you, then your email address is a hyperlink.

Programming. This is when the computer is given instructions to tell it what to do, using one of many 'programming languages'. Programming languages for the web include PHP and Perl.

Server. The server is where your website is stored, and it is the server that people are connecting to when they visit the site. Note that server refers both to the hardware and software of this system.

Software. Programs that run on the computer, or that make your website work. Microsoft Word is software, for example, as is Apache (the most popular web server software). Opposite of hardware.

Spider. Do not be scared if a spider visits your website! Spiders are simply programs used by search engines to scan your site and help them decide where it should appear when people search. It is good to be visited by spiders, as it means you should start appearing in search engines soon.

Upload. Uploading is when you transfer data from your own computer to your website. For example, you might upload your logo, or an article you've written. Opposite of download.

URL. Uniform Resource Locator. This is just a short way of saying 'web address', meaning what you have to type in to get to your website.


Kamis, 14 Januari 2010

Discount Toner Cartridge is Better Than Ever and...You Will Save 50% or More

Having used discount toner cartridges for twenty years, there have been a lot of changes in the toner cartridge market. The market today is approximately a twenty billion dollar business. The savings today are significant. The quality of the discount cartridges is unsurpassed. To insure your complete satisfaction in purchasing discount toner, take a minute to make an informed choice.

Discount toner cartridges were originally sold as recycled toner cartridges. The basic recycling method consisted of drilling a hole in the cartridge and refilling it with toner. Once the cartridge was filled, the hole was plugged. This toner cartridge was then sold to the consumer as a great deal or a "discount toner cartridge".

The problem was that the drill and fill cartridges produced poor quality and printed fewer pages. They were very inconsistent from cartridge to cartridge. In short, there was no quality control. One discount toner cartridge might perform great and the next may not.

However, things have changed significantly. Today, discount toner cartridges are brand new cartridges made from brand new parts... the same parts specified in your OEM printer manual. The technology is the same as that used by major printer manufacturers. Today, a reputable discount toner company uses the same components as major printer companies. Their toner, drums and rollers are the same quality and specification.

Know What Type of Toner Cartridge You Are Purchasing

Discount toner cartridges sometimes has a dual meaning. When some companies use the term discount toner cartridge, they really mean “remanufactured” toner cartridges. When other companies use the term discount toner cartridge, they mean a “new” toner cartridge manufactured by a third party merchant.  Both types of cartridges could be a good buy.

Learn About the Toner Company

Be sure you learn about the company you buy toner from. All companies are not the same. Remember, a remanufactured toner cartridge can be as good of quality as a new discount toner cartridge. Both types of toner cartridges will save you a significant amount of money.

The best suppliers of discount toner cartridges have a quality control process in place. They insure that their toner cartridges are checked and double-checked so that you get high quality printing and the same number of pages or more. If a cartridge is remanufactured, any parts that do not meet their standards are replaced. You should be satisfied with the first and last page of printing.

You may not know everything about a printer company before you purchase, but you can find out exactly what type of discount toner cartridge you are buying. Look at our section on purchasing discount toner cartridges online. This will give you some basic information on what to look for in a toner cartridge merchant. 

Good companies offer good warranties. You should always get a strong money back guarantee. If a company does not warranty their toner cartridges for one year, you haven't found the right company.

Do your homework. Visit the websites of several reputable toner companies. Find your exact toner cartridge. Compare prices, warranties, shipping, service, etc. If you can talk with someone that has purchased from the company, do it. Once you've done your part, purchase a discount toner cartridge and test it out. Discount toner cartridges are better than ever and will reduce your printing cost by half or more.


Rabu, 13 Januari 2010

A Moving Experience

I’ve found a cool apartment! Okay, okay…so it’s not perfect. Just a few bugs. I mean literally! First expense? An exterminator! Is it worth the cash? Well, I can’t afford a more expensive place, so a one-time (please!) cash outlay should be okay. Maybe just a can of “Raid?”

I need a way to move my stuff. Daddy, can I borrow your truck? You don’t have one? Why not? Do you want one? I’ll help you pick it out! Well, it was just a suggestion. No need to get all bent out of shape! I guess I’d better call the truck rental places. What do you mean…$200…PLUS mileage? AND Gas? Good grief!

While I’m on the phone I’ll call the utility and phone companies. Yes, I know I haven’t used your services before. No, I don’t have a credit card; this is my first place. You want what? A $100 deposit? For EACH? Holy cow…do you people have a license to steal? 

Daddy, I need $500 for moving expenses! I used all my money for the first and last months rent AND the damage deposit. Well, how was I to know this was going to be so expensive? Sell something? Daaaaad…I NEED my TV!

Boy, this place is pretty empty. Maybe I should buy a couch and a chair. Nah…I have my bed. That’ll be good enough. I don’t need a table; I’ll just use this box.

Renters Insurance? I don’t think so! What do I have to insure?

Just got my first phone call! I’d love to come to your party! Daddy, I need a car. Because it’s too far to walk to work, that’s why. Umm, Daddy…there’s car insurance too! Thanks, Dad…you’re the best! And gas? I didn’t think so…

Time for dinner. Let’s look in these boxes. Oh, No! No dishes or pans. No FOOD! 

Uhhh, Mom?




A Few Computer Lessons To Get You On The Right Path

If you don’t know how to use a computer at all, it’s a good idea to get a computer lesson and get started. Even just having a basic working knowledge of how to use a computer and how to use the internet will drastically increase the amount of things you can do and open a lot of doors that would otherwise be shut for you.

Indeed, if you are still working or looking for employment (i.e.; not yet retired) knowing how to use a computer will allow you to do a world of different jobs you never would have been able to before.

You are extremely limited in the kind of work you can do without any knowledge of computers, so it is well worth whatever the fees are for a computer lesson or two.

Of course, if you are reading this you probably already have at least a basic knowledge of computers because you are online right now. Even if you already know the basic skills to use the internet and some simple programs like word processors or spread sheet programs, an additional computer lesson or two can still be very valuable.

Most programs have loads of features above and beyond the more obvious ones. Word for Windows and Excel, for example, may seem pretty self-explanatory initially, but with a couple of computer lesson you can do things you never would have even dreamed before with even such standard programs.

Even operating systems, like Windows XP or the Mac OS series have loads of features and nuances that a few computer lessons can expose for you.

I took some night school classes held at a local high school on the beast of a program that is Adobe Photoshop a while back, and the computer lessons were invaluable to me. I have just begun to crack the surface of that particular program and yet I can do things with photos I never would have imagined before.

Live classes are probably the most effective way to get a computer lesson, but another thing I recommend is buying computer courses in the form of interactive CD-ROMs or DVDs to be played on your computer.

These can be done at your own convenience, in the comfort of your home, and are generally less expensive. One I recommend is ‘Video Professor’. His commercials are kind of annoying, but they are very affordable computer lessons and cover the basics for most programs you’d ever use.


Selasa, 12 Januari 2010

10 Benefits Of Smarthphone Bluetooth

10 Benefits Of Smarthphone Bluetooth Below, are 10 benefits and reasons to use Bluetooth technology.

1. Wireless As you probably already know, there are many benefits and advantages to using wireless devices. Along with improving safety as a result of eliminating wires you don't need, wireless also offers you plenty of other advantages. When traveling with your laptop or other wireless devices, you'll no longer have to worry about bringing connection cables.

2. Bluetooth is actually inexpensive The technology of Bluetooth is cheap for companies to implement, which results in lower costs for the company. These savings are then passed from the company on to you.

3. Bluetooth is automatic Bluetooth doesn't have you set up a connection or push any buttons. When two or more devices enter a range of up to 30 feet of each other, they will automatically begin to communicate without you having to do anything. 

4. Standardized protocol Bluetooth is standardized wireless, meaning that a high level of compatibility among devices is guaranteed. Bluetooth will connect devices to each other, even if they aren't the same model.

5. Low interference Bluetooth devices almost always avoid interference from other wireless devices. Bluetooth uses a technique known as frequency hopping, and also low power wireless signals.

6. Low energy consumption As a result of Bluetooth using low power signals, the technology requires very little energy and will use less battery or electrical power as a result. This is an excellent benefit for mobile devices, as Bluetooth won't drain the battery.

7. Sharing voice and data The standard for Bluetooth will allow compatible devices to share data and voice communications. This is great for mobile phones and headsets, as Bluetooth simplifies driving and talking on your cell phone.

8. Instant PAN (Personal Area Network) You can connect up to seven Bluetooth devices to each other within a range of up to 30 feet, forming a piconet or PAN. For a single room, you can also set up multiple piconets.

9. Upgradeable Upgradeable is the standard for Bluetooth. There are newer versions of Bluetooth in the works, which offer many new advantages and backward compatible with older versions.

10. The technology stays Bluetooth technology is a world wide, universal wireless standard. With it being as popular as it is, you can count on it being around for years to come. As more and more devices start to use Bluetooth technology, more manufacturers will be eager to make their products compatible. A chain reaction will occur, making Bluetooth the standard for cutting edge wireless.


Webmin Installation SUSE 10.1



Want to unix like web coordinator web host hosting server management via the web? Webmin can be answer. Webmin offers a wide range of alternate options for settings
Linux, so it would not harm to try.

Let us begin,
1. Download Webmin (could take a tarball or RPM. I
take the RPM, webmin-1270-1.noarch.rpm. The latest version can be taken
in Website Webmin
2. Copy the install location. Whatever you want to copy where,
remember the location where the original copy:-P. I still used to install from a folder
/ opt.
3. Install Webmin
RPM version:
- Open a Konsole / Terminal
• Log in to install location
cd / opt
rpm-ivh webmin-1270-1.noarch.rpm

That's it. We can go to webmin via the web by typing
URL: http://computername:port (10000 is the standard interface.
If we modify the set up, modify the port). Could also
URL http://IPAddress:port.Version Tarball

- Untar the tarball version
tar zxvf webmin-1270-1.tar.gz
- Go to the folder of tar
cd webmin-1270-1 (or cd / opt/webmin-1.270-1)
- Run the setup file
. / setup.sh
- Fill out all appropriate configuration webmin installer questions
4. Post-Installation
To protect the webmin setup, we can switch on the life
ssl, by the way:
- Install ssl module for perl (perl-Net_SSLeay). CD / DVD SUSE
10.1 already includes. Install it via YaST.
- Open the file / etc / webmin / miniserv.conf
- Change ssl = ssl = 0 to 1
- Restart webmin (can be via the menu in webmin)
- Open webmin using a browser by replacing the URL protocol

http to https (https: / / computername: port or
https: / / Ipaddress: port).
5. Ready to use webmin. Building Squid, Samba, DNS, Email
Postfix hosts etc. must besimple for your webmin.
Regards,

Senin, 11 Januari 2010

Computer Networking

For small-scale gadgets could be used as a information interaction moderate is a laptop or computer system system (Local Area Network), which can be designed using the technological innovation to bigger worldwide system (Internet) and this diera creating information marketing and sales communications with a wide range of programs such as graphic 1.

The characteristics of computer networks:
1. sharing hardware (hardware).
2. sharing software (software).
3. sharing of communication channels (internet).
4. sharing of data with ease.
5. facilitate communication between network users.

As for the main application which runs on computer networks in general are:
• E-mail
• Discussions / electronic conference
• Shipping files / file electronically
• Access to the distributed database.
• Facilities talnet to work on a remote computer.
• And many more in accordance with its development.
Computer Network Type:
1. LAN (Local Area Network)
2. MAN (Metropolitan Area Network)
3. WAN (Wide Area Network)
4. Internet


Hardware generally required:
Hardware needed to build a pc system system, namely: pc system either as a server or client, Network Card, Hub, and everything associated with a system connection such as: printer, CD-ROMs, readers, Connects, Routers and other necessary data for the modification process within the system.


Computer Network Configuration Basis:

Each pc system in a network environment as well as small-scale housing to have a pc system address or IP address is often referred to, by using TCP / IP protocol that is similar to a pc system address.

Here are some utility commands basic pc system network configuration is:

1. PING
To check whether a computer is properly connected to the network.
2. IPCONFIG
In general, to see the network configuration on a computer, for example to determine the host, ip address, subnet mask, and others.
3. Tracert
Search of a network routing network.
4. NETSTAT
To determine the network status.
5. Nslookup
To know the IP address of a domain name or address of the site.

Jumat, 08 Januari 2010

INTRODUCTION INTERNET

What is the Internet?
The Online is a selection of computer systems or hosts that are attached with each other through various advertising (cable, r / c, satellite tv, etc.). The computer systems are relaxing existing around the world to allow the development of a international information system. A set of computer systems in one place has the type and features that are not the same as other locations, but all attached by a identical conventional method known as TCP / IP (Transfer Management Protocol / Online Protocol). TCP / IP can be considered of as a terminology comprehended by all kinds of computer systems attached with the Online. Without following this conventional method, our computer systems will not be able to convey with other computer systems on the Online.
TCP / IP provides an IP Number (IP number) that is unique for each computer connected to the Internet so that data traffic on the Internet can be arranged. To help us remember it was made IP Address (IP address) as a representation of the IP number.
Example IP number: 203.130.205.65
Example IP address: tociex.ac.id
Each computer on the Internet contain information so diverse, ranging from things that are trivial to matters such as research seriously. This allows the sharing of resources on the Internet.

Internet Benefits
• Communication
• Internet enables super-fast communications between a party to the other party, without recognizing limits of space and time. This is possible because the reach of the Internet that had global. If we know the address of a person or an institution on the Internet, we can send information anytime and anywhere around the world in a very short and very easy way. The Internet also can save communication costs that must be paid.
• Information
• As mentioned above, because so many computers connected to the Internet, where each computer has the information content of its own, then combined all the information on the Internet so incredible. The Internet is a rich source of information (almost without limit) that continue to evolve with further development of the Internet itself.
• Collaboration
• Collaboration is meant here is a process of completing a work together (team-work). Team members can consist of various experts from various fields scattered in various countries around the world. The Internet is a medium that helps a collaboration that is usually restricted by space and time. Through the Internet we can do a conference (conference) with various parties wherever they are. We can even do a job simultaneously via the Internet.

How to Connect Yourself to the Internet?


To go to the Online, we need to join to an Online Assistance Company (Internet Assistance Company - ISP). ISPs can be regarded as a trip to get in touch to the Online. We are now looking for an ISP in the same city where we stay or the closest city.
There are 2 (two) types of ways we can go to the Online, namely:

1. Dial-up Connection
Dial-up Connection is a connection to the Internet which are temporary. For Dial-up Connection is what we need is:
• Computer hardware (hardware):
• Computers
• Modem
• Telephone Line
• Software (software): in general provided by the ISP which we subscribe.
Username (login) and Password: provided by ISP which we subscribe, login can not be replaced while we can change the password itself periodically to maintain security.
What we need to do is:
• Subscribe to one of the closest ISP
• Install a modem to your computer
• Install Internet software provided by your ISP
• Linking self (dial-up) to the ISP

Once your computer is connected to the ISP at the same then we have connected the computer to the Internet and we can begin our exploration of the Internet. Our relationship to the Internet only exists as long as we maintain our computer connection to the ISP through a modem. Once we disconnect the modem from the ISP kompuer the same time we disconnect from the Internet and return the computer to function as we normally use.
Relationships that we do to the ISP is a local connection (using local phone toll) but we can explore the Internet and visit other places around the world. Surely 'visit' us to other places that are virtual (not real) because we can only see the information contained on other computers around the world who terhubug to the Internet. Because of the virtual character is the Internet known as cyberspace (virtual world).
Dial-up Connection This is generally used by individuals who want to access the Internet from home. Computers are used for dial-up in general is a single computer (not a computer network)
2. Dedicated Connection
Dedicated Connection is settled to the Internet means that the relationship lasted for 24 hours a day, 7 days a week and 365 days a year, non-stop. This relationship form is popular by organizations or other organizations by the number of workers and computer systems enough. When you need Also is very large then it is not powerful to be connected each pc system to the Online with the form of dial-up relationship. Can think about how many modems and cellphone collections that must be offered and how much it costs to be carried telecom organizations.
An organization that uses this form of relationship will make a regional pc system system (Local Area Network - LAN) at the location and be connected their LAN to the Online through an ISP by using only 1 (one) device and range lease (leased line) are online during the 24 hours non-stop. All computers are connected to the LAN institution will have access to the Internet through the same path. Of course, additional equipment required for this type of connection.
That all existing computers can be made to the network, then each computer must be equipped with an Ethernet Card. As a tool to establish a network hub. To have a local network (LAN - Local Area Network), we can be connected to the Internet, the LAN must be connected to a router and the ISP via a special modem. In this way only takes one line of communication to serve all the computers in our LAN. When we connected the LAN to the Internet, each computer on our LAN as if a part of the Internet itself.

Mengatasi kerusakan LCD

Beberapa kerusakan yang sering terjadi pada LCD diantaranya :

LCD garis
Pada tampilan layar terdapat garis hitam, jenis kerusakan ini terdapat pada hardware LCD. Solusi lakukan penggantian LCD.

LCD Blank
Pada tampilan layar tidak ada gambar ataupun tulisan sama sekali, umumnya terjadi pada ponsel clamshell atau ponsel lipat. Flexible merupakan penghubung antara mesin ponsel dan LCD. Jika terjadi kerusakan pada komponen ini maka LCD ponsel blank atau mati, bias disebabkan karena terkena air atau jatuh.

Noda hitam pada sudut LCD
Bila LCD hitam putih anda dapat mencoba untuk memanasi permukaan LCD dengan blower pada setelan panas terendah dan biarkan LCD menjadi hitam lalu dinginkan, jika masih ganti LCD.

Gambar muncul lalu hilang
Rubber atau soket LCD kotor, coba bersihkan terlebih dahulu.


Penyelesaian :

1. Cek LCD tersebut dengan mencoba mengganti LCD lain yang kondisinya normal.
2. Untuk ponsel clamshell, coba dengan mengganti Flexible dengan yang baru karena itu merupakan penghubung antara mesin dengan LCD.
3. Bila setelah diganti kondisi tetap sama, maka lakukan pengecekan pada IC emif. Untuk DCT-3 kerusakan bisa terjadi pada IC CPU.
4. Untuk ponsel DCT-4 lakukan pemanasan pada IC emif atau ganti dengan yang baru.

Blank Putih pada LCD juga dibedakan menjadi 2 bagian :
1. Blank putih (ponsel rusak). Bisa disebabkan kareda rusak pada data/program ponsel, lakukan flashing ulang.
2. Blank Putih (ponsel normal). Bisa disebabkan jalur yang putus, bisa dilakukan jumper. Baca juga cara pengukuran dengan Avometer untuk mengetahui jalur yang putus.

10 Reasons Why To Print with Printer Anywhere


PrinterAnywhere has developed a new technology and software that allows any user with internet connection to connect and print any document all over the world. Users now have the power and provision to connect to any printer all over the world without any networking. The users just need to download and install the free software that PrinterAnywhere provides. That too without the requirement of any special knowledge by the user or the owner of printer!

With the software that Printer Anywhere provides, the user is now able to print anything directly from your applications like the Photo Editor, Outlook Explorer, and so on. Also the page the user wants is printed thousands of miles away from your own computer. 

The software is developed with such precision that uses high security as well as the quality standards for the printing the page at the desired destination. The software also uses a high quality encryption algorithm and securely sends the printable media through electronic pulses to the desired destination. This also adds to the user’s security because the imitation of the original copy is sent. 

The Printer Anywhere software also bans the forwarding of the document, thus, unlike e-mail, solves the problems faced for the privacy issues. It is also unnecessary for the user to have an email id for the printing of document anywhere in the world. The user also has the authority of how many copies are to be printed. 

There are the ten most basic reasons why to print documents around the world using on the software that is provided by Printer Anywhere. The ten reasons are:

1. To ensure that the documents are not only received but also printed:
Many times it happens that the important documents that are sent through email are received properly but are either misplaced or are deleted from the receivers computer. With PrinterAnywhere, the user can be assured that the documents are not just received but printed so that the receiver has a hard copy of the documents.

2. The user does not want to send electronic copies of the documents:
With the sending of emails, all the privacy issues pop-up. The emails, for example, can be forwarded and the privacy of the document is compromised. Instead if the user chooses to print the document using PrinterAnywhere, the user has a benefit of preventing the abuse of privacy.

3. The recipient does not have the application to open the document: 
With the technology advancing all the time, there is an acute possibility that the recipient does not have the proper application to open certain documents that have come from the other parts of the world. Hence it is very useful to have the software provided by PrinterAnywhere, which facilitates the printing of any document in any part of the world. This saves the time in finding and installing the correct application to open the document.

4. The user wants to print paper photos on someone else’s printer:
The software is very useful in printing you archived photos on any printer in any part of the world. So, instead of sending the photos through email and then let the recipient download and then print the photos, the user can directly print the photos on the recipient’s printer.

5. The user wants to ensure that the documents are printed on loy on the specific printer:
The software provided by the PrinterAnywhere ensures that when a document sent for printing, it goes to the right recipient.

6. The user wants to print directly from the applications as if it were a local printer:
The user now has the opportunity of printing the required document directly from the application by just commanding the application to print and then giving the correct link of the address of the recipient printer.

7. Microsoft printer sharing on the home network of the user doesn’t seem to work:
The Microsoft printer sharing may not work correctly hence; PrinterAnywhere is a better option for all the users.

8. The document is too big to print or the user wants to save his paper:
If the user does not wants to waste his paper for something which maybe useless yet necessary, then with PrinterAnywhere, the user has the option to directly print the document at the recipient’s printer.

9. Fax quality is not good or the international fax calls are very expensive:
The Fax calls are very expensive in case you want to send a fax overseas. In this case the PrinterAnywhere is a very good option.

10. The user wants to print right at that moment and for free:
PrinterAnswers is the best option to print documents on the spot and for free.


With all these reasons, PrinterAnywhere is the most irresistible.

Kamis, 07 Januari 2010

overclock

This part of the most interesting. In this section we will walk overclocking, relying on some software that can be downloaded free from the internet.

Overclock Video Card
Overclocking the video card, is relatively easy especially with Powerstrip.

* You can use Powerstrip with downloading from www.entechtaiwan.net.
* Set the configuration of Performace profile, by right clicking the tray icon.
* You will see two vertical slider. Slider left, the control for the video card core speed. Right slider is the control of the speed of video card memory.
* Add the video card core speed gradually (maximum 2 MHz). Perform the stability test by playing 3D games or running benchmarks. Repeat this until the maximum core speed of the video card. Do the same thing for the memory clock. Now you can enjoy a new frame rates faster for free.

Overclock Motheboard
In order to overclock the motherboard is slightly different. You must customize the application according to the motherboard chipset. Here we take the example of two overclocking motherboard. First is the motherboard with nForce2 chipset.

* For motherboard with nVidia chipset, you can take advantage NV system utilities applications from www.nvidia.com.
* In this application, lived shifts towards the right slider on the bus speeds. This will adjust the FSB clock is also memory bus. For the AGP bus, available on a separate slider.
* There are also settings for memory timing control. Memory setting a more aggressive would be beneficial for AMD systems.
* Just like the video card, you must add gradually FSB and AGP bus. Run a stability test. When finished, you can close by clicking on the button (OK). Note: when the OC that you do not match, then the computer will automatically hang and had to restart the computer.

The second is the Intel motherboard D875PBZ. Using the Intel Desktop Control Center, unfortunately, this utility only runs on Intel motherboards output.

* To conduct OC, you can do it automatically.
* Can also manually. In Tune menu located at the top, select the option Burn-in, burn-in enable mode.
* There are a host of I / O mode and AGP / PCI mode. On the Host I / O mode, OC is based on the percentage to 4%. While the AGP / PCI mode, raising the AGP bus clock that automatically increase the PCI clock.
* After the addition, you can measure stability. By doing stress-it on the bottom left of the application with a check mark. google1bb127b06f32c158.html

Tips to accelerate Windows XP

Here is a simple trik2 to accelerate Windows XP. Effectiveness trik2 may berbeda2, following Tips2 might make your computer unstable. then the "Proceed WITH CAUTION". Also do not forget to backup the registry before tweaking.
How to Backup Registry
Start> Run> regedit> file> export
give the backup file name. reg you click ok!
done
1. Reply to disable the Windows Service is not required.
Because windows intended for different users and tasks, then the windows to make service the truth is not really necessary. Following Service2 often resource consuming wrote not a few, with disable (to disable it) then we can get the computer a little boost because of it.
* Alerter
* Clipbook
* Computer Browser
* Distributed Link Tracking Client
* Fast User Switching
* Help and Support - (If you are using windows help, then this step-skip aja)
* Human Interface Access Devices
* Indexing Service
* IPSEC Services
* Messenger
* Netmeeting Remote Desktop Sharing
* Portable Media Serial Number
* Remote Desktop Help Session Manager
* Remote Procedure Call Locator
* Remote Registry
* Remote Registry Service
* Secondary Logon
* Routing & Remote Access
* Server
* Telnet
* TCP / IP NetBIOS Helper
* Upload Manager
* Universal Plug and Play Device Host
* Wireless Zero Configuration - (Do not be disabled if you are using Wireless)
* Workstation

How to disable service above:
1. Click Start> Run> type "services.msc"
2. Double-click the service wrote to changed
3. Change the startup type to 'Disable "
2. Turn off System Restore
System restore can be useful if the computer trouble, but all the restore points funded could take a big elbow room on your hard drive. System restore is always a burden for the system monitor, disable system restore with the most resources can be allocated to other posteriority.
1. Open the Control Panel
2. Click Performance and Maintenance
3. Click System
4. Click the System Restore tab
5. Select 'Turn off System Restore on All Drives'
6. Click 'Ok'
3. Accelerating access Folder - with disable Last Access Update.
If you have a lot of folders and subdirectories, then access to the Windows XP direktory2 very heavy and often cuman waste of time. With the update time stamp on the registry, the last access updates to all sub-directories will speed up access to the folder.
Proceed with caution:
1. Start> Run> regedit
2. "HKEY_LOCAL_MACHINE \ System \ CurrentControlSet \ Control \ FileSystem" 3. Right-click on the part and the right (look for an empty area of reply), and select 'DWORD Value'
4. Create a DWORD Value with the name 'NtfsDisableLastAccessUpdate'
5. Right-click the new value and hold select 'Modify'
6. Change the data to '1 '7. Click 'OK'
4. Disable Microsoft System Sounds
By default Mikocok Sound Systems to make the computer sound / noise when booting the start, shutdown, error, etc.. Scenario sound windows makes jelas2 slower computers (particularly in the early shutdown and booting), to disable please follow these steps:
1. Open the Control Panel
2. Click the Sounds and Audio Devices
3. Click the Sounds tab
4. Choose "No Sounds" from the Sound Scheme
5. Click "No"
7. Click "Apply"
8. Click "OK"
5. Boot time speed up
Yg pretty cool feature of Windows XP is the ability to mendefrag when there is in the process of booting. Boot Defrag to set file2 yg principles relevant to the boot sequence. By default this feature has been activated on several Build of Windows, but some windows build does not, it's good cross-check our reply to the reply feature of this one.
1. Start Menu> Run
2. Regedit
3.HKEY_LOCAL_MACHINE \ SOFTWARE \ Microsoft \ Dfrg \ BootOptimizeFunction
4. Search for "Enable" in the right side regedit
5. Click "Modify"
6. Select "Y to enable"
7. Reboot / logoff
Note:
Bootvis also can be tried, to cut the boot time with sweet maneuvers.

Yach, So much had a few tricks for accelerating the Windows .. .

How to create a password that is difficult burglarized hackers?

These days the name online hackers or cookies to get innovative, in many ways they try to get through your contact, fb, records, website, even site.Anda not want it, if at some point your account in friendster modified by people? Web page or you instantly modified by a cyberpunk looks / crackers?One way online hackers broken our account is by wondering account details. Hackers can use a script that included dozens of passwords per second for trying to get into our account.The way a hacker to think our value among other things:1. Brute-force assault, ie by trying all blends, including aaaa to zzzz, until a few people.2. Thesaurus assault, ie by wondering using thoughts in a dictionary, and in addition to statistics or people.3. Private information assault, by coming into individual information such as statistics, birthday, name of partner, zip value, and so on.A very vulnerable value would be very easily damaged into by online hackers this way. Example of a very vulnerable value such as:• 123456, texting, asdf, this is because it is easy once people are writing on the laptop key pad collaboration.• value, mypassword, and others who use thoughts in a dictionary (all languages).• date of birth, name of boyfriend, and the other is the data that person.Weak passwords can be broken in a faster time, for example:• using all lowercase.• use a combination of words and numbers, for example buku10, teroris80.• replacing letters with characters, such as c1nt @How strong password and difficult to penetrate a hacker?1. Is a combination of uppercase, lowercase, numbers, and characters.2. The length of more than 10 characters.3. Does not include the words in the dictionary.Strong passwords should be easily remembered by the owner.Examples of strong passwords: 1mAu $ 100RibuHow to remember:• 1 = the word "I" translated in English (I).• wanted = want• $ = cash• 100Ribu = 100 thousand0+1Gul" onmouseover="this.style.backgroundColor='#ebeff9'" onmouseout="this.style.backgroundColor='#fff'">Examples of strong passwords are: yellow-> 0 +1 GulHow to remember:• yellow = instance name for your sepesial: Naning = panah identik dengan adalah" onmouseover="this.style.backgroundColor='#ebeff9'" onmouseout="this.style.backgroundColor='#fff'">• -> = arrows is identical to• 0 + = symbol girl• 1 = means the number one or at most• Gul = sugar is sweetSome tips:1. Do not use the same password for various services, such as your email password as the password friendster. This means:o someone who can break your myspace password, can also break down your email password. While in the cope with of fb value nuller to individual more easily than a Search engines get in touch with individual.o management or "people in" friendster know your value, he may also get into their value to your get in touch with.2. Do not adhere to the website link in the get in touch with disclosing you must validate your value. This idea was sent by on the internet online hackers.3. Do not get into a value moreover to our web page that provide remedies. For example do not get into a value in the search engines friendster web page for any objective (such as move cope with book).4. Before you log into an get in touch with or something else, make sure the URL in your strategy effectively For example mail.yahoo.com not mail.yahoo-yahoo-ltd.com or verify.com or another. 
 

Rabu, 06 Januari 2010

5 Tips for Offshore Software Development

As a business owner or manager, the decision to opt for offshore software development can be difficult. As anyone who has experience knows, there are advantages and disadvantages to outsourcing software development. How then, do you balance the risks and rewards and come out on top? Here are five tips to ensure that you receive an excellent return on investment:

1. Complex project management experience. When selecting an offshore software development company, ensure that they have extensive experience in complex project management. The company's internal team should run like a well-oiled machine, and they should have longstanding relationships with their own subcontractors. 

2. Specialized knowledge and expertise. The most agile software development companies have an extensive network of specialists. These specialists may not be on the company payroll (which is why the company can offer you significant cost savings), but they can be depended upon to complete the necessary tasks on time and within the budget. 

3. Knowledge of your industry. In theory, offshore software development companies should be able to perform custom software development for any type of business. There will be less of a learning curve, though, and greater chances for success, if the company has knowledge of your industry or a related industry. For this reason, ask for referrals and determine if the projects the company has managed are similar to or in alignment with the goals of your project.

4. Delineate areas of responsibility. Chances are, you're considering hiring an offshore software development company because you don't have the in-house expertise to get the job done and know that it is more cost-effective to outsource the project. Nonetheless, you will need to actively participate in a needs assessment and at various benchmarks throughout the life of the project. By creating a clear delineation of areas of responsibility, you will have a clear understanding of the number of staff hours you need to devote to the project, and plan accordingly.

 5. High standards. Both you and the offshore software development company you choose should adhere to high standards. Aside from the talent of the technical experts involved, successful custom software development depends upon rigorous testing. The most dependable companies use the highest industry standards in testing each aspect of the products they create so that you receive a product that is ready to implement. 

Essentially, the most successful offshore software development companies are competent and flexible, and see their role as an information technology partner who solves your software problems, supports your team, and manages your projects from beginning to end. When you choose such a company, you can rest assured that you will receive an excellent return on investment.


Selasa, 05 Januari 2010

THIS WAS DISASTER!

I woke up this early morning around 6.25am n had took my bath about 20mins.. ngee~~
[the shower was so hotttt!!! made me feel so comfy and about to fall asleep! hahaa]




after bath, prepared myself and straight away went down upstairs and headed to the Melur Cafe.
it was 6.55am and the cafe wasn't open yet. it was dark and gloomy during this time, but i got the rights to get early breakfast which i don't know why. so i had my toasted bread with strawberry jam or kakngah called it STRAWBERRA! hahaha.... then... myself, adek and ayin waited my bro, piju and kak sharinee till around 7.10am.

OMG! ayin and adek had morning assembly today and they had to gather before 7.15am, GOOD!
congratulations for your first time -5 demerit. hahaha. no merit but they gained demerit in the earlier year! hahaha...
kak sharinee and her family woke up around 6.45am, baguih laa noh!! hahahaha...

adek and ayin arrived their school around 7.20am, so congrats! i'm waiting for them. haha

hello here are the disaster!

this budak gebok but his heart so kecik, went to school for the 3rd day, and story is he cried on the 2nd day. so today, his father warned him in the car not to cry. so... he tried! at first, he was sooooo cool!
but then. when his mom and i wanted to get out from the class, he pulled his mom's hand and whispered,
" Mama, tunggu abg kat kantin taw,jangan balik lagi.." said him..


and he kept repeating and started to cry!






owh this is what i call DISASTER!
SPELL OUT LOUD PLZ.. D - I - S - A - S - T - E - R!!!
hahaha...

and mama took her roll, she warned him, " Abg, don't cry over here!" with her eyes staring at him straight to his eyes which was totally like SUPERMAN! Kak, when you got the Superman's power? hahaha...





so, he did his mata redup to raise SYMPHATY from us. NO EFFECT!!!! Tetttt... Buzz sounds that was wrong. hahaha. no symphaty at all encik hafiz! hahaha.


dah la... everything went well till recess time. then after he got into his class,abg tan, kak sharinee and i went back to hotel and took him back from school 12.45pm.

CRYING DISASTER a.k.a HAFIZ! hahaha.. [sorry it wasnt my intention to tease u! but purposely yes.. hahaha] i love u pijudeen!