Saturday, November 21, 2009

Classification of Computers

Computers are available in different shapes, sizes and weights, due to these different shapes and sizes they perform different sorts of jobs from one another.

They can also be classified in different ways. All the computers are designed by the qualified computer architectures that design these machines as their requirements.

A computer that is used in a home differs in size and shape from the computer being used in a hospital. Computers act as a server in large buildings, while the computer also differs in size and shape performing its job as a weather forecaster.

A student carrying a laptop with him to his college is different in shape and size from all the computers mentioned above.

Here we are going to introduce different classifications of computers one by one. We will discuss what are in classifications and what job they perform.

Super computer

The biggest in size, the most expensive in price than any other is classified and known as super computer. It can process trillions of instructions in seconds. This computer is not used as a PC in a home neither by a student in a college.

Governments specially use this type of computer for their different calculations and heavy jobs. Different industries also use this huge computer for designing their products.

In most of the Hollywood’s movies it is used for animation purposes. This kind of computer is also helpful for forecasting weather reports worldwide.

Mainframes

Another giant in computers after the super computer is Mainframe, which can also process millions of instruction per second and capable of accessing billions of data.

This computer is commonly used in big hospitals, air line reservations companies, and many other huge companies prefer mainframe because of its capability of retrieving data on a huge basis.

This is normally to expensive and out of reach from a salary-based person who wants a computer for his home.

This kind of computer can cost up to thousands of dollars.

Minicomputer

This computer is next in he line but less offers less than mainframe in work and performance. These are the computers, which are mostly preferred by the small type of business personals, colleges, etc.

Personal computers

Almost all the computer users are familiar with the personal computers. They normally know what the personal computer is and what are its functions.

This is the computer mostly preferred by the home users. These computers are lesser in cost than the computers given above and also, small in size; they are also called PCs in short for Personal computers.

This computer is small in size and you can easily arrange it to fit in your single bedroom with its all accommodation. Today this is thought to be the most popular computer in all.

Notebook computers

Having a small size and low weight the notebook is easy to carry to anywhere. A student can take it with him/her to his/her school in his/her bag with his/her book.

This is easy to carry around and preferred by students and business people to meet their assignments and other necessary tasks.

The approach of this computer is also the same as the Personal computer. It can store the same amount of data and having a memory of the same size as that of a personal computer. One can say that it is the replacement of personal desktop computer.

COMPUTER BACKUPS

Computer backup is so important to your computer that to ignore it is to risk its damnation.

Computers require care and feeding. They require that you attend to their needs. If you don't, then they will most surely be sent to Hell.

Halloween means Hell. What! What do you mean that Halloween means Hell?

Well, if your computer is given the option of trick or treat, which will it accept? Will it accept the trick or the treat? What do you think?

Halloween is the time that computers are subject to tricks or treats. Did you know that more computers fail on Halloween than any other day of the year? That's right. It's true (smile). Your computer is in danger! Protect it. Do your computer backups.

Back to the Hell thing. Hell you say? Yep. Well, what do you mean by Hell?

Computer hell is the place for computers without computer backup. The failure to perform hard drive backup means that you are playing Russian Roulette with your data. Data needs your protection. Failure to protect your data may cause your home or business records to be sent to Hell.

Hell in this instance is for the records and files that cannot be resurrected. Resurrected you say, what does that mean?

It means that without computer backup as a source of salvation then the files can safely enjoy eternal oblivion. Oblivion you say, what does that mean? That means they are eternally lost from computer resurrection.

Is there any mercy for my precious files, you ask?

Why yes there is. Would like to know what the mercy for your files is? Yes! Yes! You say.

OK boys and girls listen carefully. The salvation, mercy, resurrection and redemption of your files lies in regular and consistent and persistent computer backup.

If you backup your computer consistently and persistently your files will be resurrected and saved from accidental deletion, hard drive failure and those nasty things like fire, flood, theft, earthquake, hurricanes, tornados and the like!

Computer backup is the key to your data's salvation!

Choosing a Laptop Computer Based on Hardware and Software Needs

Laptop computers are one of the most desirable techie gadgets. A laptop is a portable computer that could comfortably be used while on a person's lap - hence the name. It contains all the basic and necessary software (like Office System and Internet access) and hardware (like CD-Rom drive and Modem) features of an ordinary computer and still fits in an ordinary briefcase or backpack.

Advantages of Owning a Laptop

1. Portability.

Being portable, it can be brought along and used anywhere - school, work, vacation trips, unlike the ordinary desktop computer. This is especially handy to a person with a very hectic schedule and busy lifestyle. In this regard, a computer addict doesn't have to be a hermit anymore! He or she can go out under the glaring rays of the sun and still hold on to the best technological breakthrough product.

2. Convenience.

It is useful for the working person, for the student, for the hobbyist, and for a computer addict too. One can take notes in class, type and print assignments and reports, access the Internet and communicate with another person on the other side of the globe. Teachers and public relations officers can make use of the laptop to give a different dimension to their presentations. Some teachers also find students are more motivated when using a laptop.

3. Size and Weight.

The dormer and studio type apartment lessee would agree that a laptop would save them more space.

4. Image.

It cannot be denied that a laptop is cool. With its sleek shape and form, it can be very eye-catching. It also gives the statement that the owner is not outdated, that he or she is in keeping with the times, and finally, computer literate.

Laptops are not that expensive anymore, but this is not the kind of item a person would shop for every other week. Each and every laptop has its own demands, requirements and features. Features you may want to look for:

1. Size and weight. Laptops are portable, but their sizes and weight still vary. To be very portable, it must be small and lightweight. They usually weigh 5 pounds. If it will be used outdoors more often, the weight should not be more than 5 pounds.

The size of the screen is also important. The usual sizes are 12.1, 13.3 and 14.4 inches. Tiny screens, as small as 8 inches, are ideal for portability, but the demands of the eyes - to have a squint-free screen - should also be considered.

2. Sturdy. A laptop must be taken care of, but it would be more ideal to have a tough and sturdy one that will be able to withstand any accidental knock or minor bump. There are models available with shock-resistant hard drive mounts. It has to be durable enough if it will be taken outdoors often.

3. Internet connection. One has to be in touch with the rest of the online community. There are wireless connections offered already. To one with budget constraints, an ordinary 56Kbps modem would do to connect to the rest of the world.

4. USB port. This should also be carefully checked out so that the laptop can be used in many more ways. There should be at least one USB port if not more, for future expansion of adding other hardware. The USB port can be used for external keyboard and mouse, but it is most useful to create connection with digital cameras, external drives, and MP3 players.

5. Battery life. The battery life of the laptop must allow the user to use and enjoy it outdoors or in areas that do not offer power resources for the public. A reasonable battery life should not be lower than 5 hours. The battery life will determine the extent of freedom that can be enjoyed with the laptop.

There are 3 kinds of batteries available.

The Lithium-ion (Li+) is usually chosen. Li+ batteries have range that can offer the best quality.

Nickel metal-hydride (NiMH) batteries are less expensive, although they do not excle in terms of battery life.

Nickel cadmium (NiCad) batteries are the ones to stay away from. They require constant recharging.

6. Technical specifications. There should be enough RAM, storage space / hard drive and computing speed. The technical specifications would depend on the most probable purpose of the laptop to the owner. If the laptop would be used for playing 3D games, it is ideal to get at least a 256 RAM. If several music or video files will be stored, a larger hard drive should be considered, 40 gigabyte is ideal.

7. Price. Finally, the laptop should be reasonably priced. There are refurbished laptops available out there for those with strict budgets but there is a way to save money and still get the ideal laptop.

First, the purpose that the laptop will serve must be properly ascertained. This will avoid purchasing laptops with expensive features that would end up being unused. Don't buy 80 gigabyte of storage space if only 3 gigabytes will be used for documents.

Stick to your budget. There are many attractive add-ons in the computer shop like glow-in-the-dark mouse pads or wireless mouse. These may not be necessary and can add to the total cost.

Negotiate for add-on features. Lastly, it wouldn't hurt to try to negotiate for the price. 5% off can go a long way.

Career Track: Computer Software Engineers

Computer Software Engineers are responsible for a multitude of tasks that are evolving and changing as quickly as technology. According to the U.S. Department of Labor, professionals in this career are the ones that are "responsible for applying the principles and techniques of computer science, engineering and mathematical analysis to the design, development, testing and evaluation of software and the systems that enable computers to perform their many applications."

There are basically two sub categories of software engineers, which include:

* Computer Applications Software Engineers * Computer Systems Software Engineers

Applications Software Engineers are responsible for analyzing the needs of the user and then designing, constructing and maintaining the applications or software. Professionals in this career use programming languages such as C, C++, Java, Fortran and COBOL. Many Software Applications Engineers are responsible for developing both packed systems and systems software as well as creating customized applications. Computer Systems Software Engineers are responsible for "coordinating the construction and maintenance of a company's computer systems while planning for future growth." Most Software Engineers work closely with coworkers as well as customers to ensure their products meet needs and expectations. Opportunities for advancement and industry outlook:

The career outlook for Software Engineers is strong. According to the U.S. Department of Labor, this profession is projected to be one of the fastest growing occupations between 2002-2012. College graduates with at least a bachelor's degree in computer engineering and practical work experience will have little trouble finding placement. The only downside is that the increase in offshore contracting may impact this profession as well as others in the IT industry. Employers will continue to search out professionals with strong programming, systems analysis, interpersonal and business skills. Adding these to your resume would be a plus.

Advancement opportunities within the industry continue to grow as professionals add to their experience. While entry level engineers will more than likely be tasked with testing and verifying designs, more experienced engineers will be involved in designing and developing actual software. The next step on the career ladder is project management. Once supervisory skills have been established, the door opens to positions like Information Systems Manager, or possibly Chief Information Officer. Many successful engineers open their own consulting firms.

Educational Requirements:

Most employers require a bachelor's degree and extensive knowledge or experience with a variety of systems and technologies.

Usual degree concentrations are computer science, software engineering, or computer information systems. For some positions, graduate degrees are required. While program certifications are recommended, they are not considered sufficient for most software engineering jobs unless accompanied by a degree. Also recommended are strong analytical skills and an attention to detail. Potential Salary:

(According to the U.S. Dept. of Labor)

Position & their respective Salary Range (2003) Median annual earnings of Computer Applications Software Engineers $70,900

Median annual earnings of Computer Systems Software Engineers $74,040

Starting salary offers for graduates with a Bachelor's degree in Computer Engineering $51,343

Starting salary offers for graduates with a Master's degree in Computer Engineering $64,200

Starting Salaries for Software Engineers in Software Development $64,250 - $97,000

Industry Certifications:

Recommended professional certifications include:

* CIW Associate

* CIW Professional

* CIW Security Analyst

* CIW Web Developer

* MCAD.NET

* MCDBA

* MCSD.NET

* RHCE

* SCP J2SE

Career Track: Computer Programmer

Article: According to the U.S. Department of Labor, the outlook for employment for Computer Programmers is expected to grow with other industries through 2012. Positions for Applications Programmers and Systems Programmers will be abundant in consulting businesses, data processing firms and software houses.

Roles and Responsibilities :

The primary role of a Computer Programmer is to write programs according to the instructions determined primarily by computer software engineers and systems analysts. In a nutshell, Computer Programmers are the ones that take the completed designs and convert them into the instructions that the computer can actually follow. The instructions are coded into a programming language. In some cases, programmers are also expected to know platform specific languages used in database programming. Many programmers at the enterprise level are also expected to know platform-specific languages used in database programming. Responsibilities include updating; repairing, modifying and expanding existing programs as well as running tests to authenticate that the program will produce the desired outcome.

Applications Programmers are the ones that actually write programs to handle very specific jobs, revise existing software or customize generic applications while Systems Programmers write programs to maintain and control computer systems software such as operating systems, database and/or networked systems. In some smaller organizations, the programmers may also be responsible for systems analysis and the actual programming. In many cases, however, technology is replacing the need to write basic code which doesn't bode well for those considering entering the field. According to the U.S. Department of Labor, however, the "demand for programmers with strong object-oriented programming capabilities and technical specialization in areas such as client/server programming, wireless applications, multimedia technology, and graphic user interface (GUI) should arise from the expansion of intranets, extranets, and Internet applications. Programmers also will be needed to create and maintain expert systems and embed these technologies in more products. Finally, growing emphasis on cyber-security will lead to increased demand for programmers who are familiar with digital security issues and skilled in using appropriate security technology."

Advancement Opportunities :

The advancement opportunities for computer Programmers are many and usually start with a promotion to a Lead Programmer. A Lead Programmer position will more than likely include supervisory duties. System programming is usually the next career step for Computer Programmers who have completed systems software courses. Programmer Analysts and Systems Analysts are also logical steps. Many programmers are also finding that independent contracting and consulting gives them the freedom to pick and choose their projects.

Advancement Opportunities :

The advancement opportunities for computer Programmers are many and usually start with a promotion to a Lead Programmer. A Lead Programmer position will more than likely include supervisory duties. System programming is usually the next career step for Computer Programmers who have completed systems software courses. Programmer Analysts and Systems Analysts are also logical steps. Many programmers are also finding that independent contracting and consulting gives them the freedom to pick and choose their projects.

Educational Requirements :

Although required skills and training will vary dependent upon the position and industry in which you're working, the demand for skill sets is even more driven by technological changes. In some positions, graduate degrees may be required. While traditional language knowledge is still important, C++ and Java are the programming languages of choice. GUI and systems programming skills are also sought after. In addition, general business skills will be an asset in any organization. Systems programmers usually need a 4-year degree in computer science and extensive knowledge of a variety of operating systems. They are usually also expected to be proficient in database systems such as DB2, Sybase and/or Oracle.

Salary Potential : (As reported by the U.S. Dept. of Labor)

Position Salary Range (2003)

Median Average Earnings $60.290

Starting salary for graduates with B.A. in Computer Programming $45,558

Salary range for Applications Development Programmers $51,500 - $80,500

Salary range for Software Developers $55,000 - $87,750

Salary range for Mainframe Programmers $53,250 - $68,750

Industry Certifications :

Computer programmers have a variety of options when it comes to adding certifications to their resumes. It is strongly recommended that potential candidates attain Language certifications as well as vendor or software specific certifications.

Build your first computer from hardware scratches

Wow- if you do it first time and have some asset of time in your disposition – then go ahead and purchase motherboard, your favorite processor, memory, video card (probably it is better to purchase it external for advanced quality). You will also need computer case – first computer should probably go to the cheap one – with USB 2 ports from the front side – the only question – you might want to replace noisy cheap power supply with $50 dollars one. Processor fan – nowadays you will see the variety for all the tastes – get the one with adjustable spinning speed to regulate noise (if you could not place it into the basement of your house – I guess you live in apartment or student dormitory). Let’s go to details:
•Ahead of Generation. It is not a secret that when you build your own computer – you might overpay – in considering to what is available in the stores.. However you usually get ahead of technology. For example – it is still common when Dell/Compaq/IBM computers use PC2700 standard of memory. If you bought PC3200 – you have two years of being ahead of the competition
•Processor. If you build your computer from scratches – you should look into 64-bits processor from the beginning. Get AMD Athlon 64 3400+ at least
•Video Card. For $100 you can get maximum of memory and performance. This is why we recommend to get external videocard
•DVD Writer. RW+/- unfortunately Japanese manufacturers are in the process of decision making on winning standards plus DVD of high density. Get both supported.
•Hard Drive. Decent motherboards support IDE raid and you could experiment with striping (raid 0). Then if you purchase two IDE disks 400 GB each – you will get 800 GB – unbelievable for supercomputers – but you are on your own and cosmopolitan individual – step forward and be ahead of competition.
•Troubleshooting. Understood and respected. First listen your mother board beeps and refer to its documentation. It might not see memory, graphical card, etc. When you are installing memory – be very careful to static electricity issue. When you are attaching your mother board to computer case – the most typical issue is motherboard shorting – so do not be surprised to try your motherboard first outside the case

Broadcasting Mp3 Audio Via Computer, The Looney Tune World Of Podcasting

Podcasting Is A New Form Of Fun Stuff To Do On The Computer. The Ipod Was Made For Music Downloads, But The Reality Is That It Has Created A Launch Of Mini Shows, That Are Uncut And Cheap To Produce.

Every Event You Can Imagine Is A Potential Contender As A Reality Radio Broadcast Show From Rio To Cape Cod, And From Boston To Broadway.

CB Radio,i.e. Ham Radio, Was Developed As Radio For The People, But Now Another Page In The Consumer Notebook Of Modern History Has Turned.

Any Music Concert Can Become An Mp3, Whether It's By Players Like Eminem & 50cent Or Country Music And Guitar Songs Dedicated To Andy Griffeth.

Mp3 Audio Can Include A Report From A Reality TV Show To A Las Vegas Show, To A Looney Tune Review, And It Can Range From Humor To Commentaries On The Weather, Oprah Winfrey & American Idol, The Titanic, The Da Vinci Code, Or Even A Live Sex Show In Harmony Hall.

They're All Now Available As A Downloadable Music Composition, A Video Or Even A Slide Show On Your Computer, And I Wouldn't Be Surprised If Some Of These Shows Show Up On Sirius Radio, XM Radio Or Other Satellite Radio Shows, Conventional Radio Or Even On TV.

The Ipod Is A Creative Way To Download Digital Music Automatically Via Computer Around The Clock, By Virtue Of Podcasting.

This Is Not About Downloading Online Music Onto Your Computer Via Music File Sharing. This Is About The Bone Thug Across The Street Writing A Music Lyric On His Computer Calling It A Skin Tune By Frankie J & Lil Jon Luny Mas, And With No Harmony Or Melody, Having A Ball, Because Some Stranger In Central Louisville Looking For Cheap Music Downloads Records It To His Mp3 Player While Waiting For A Pizza Delivery.

The Apple Ipod Is Not A Technology Whose Life Is Limited To A Trade Show Display.

It's In The Hands Of The People. Podcasting Is Way Bigger Than Two Way Radio Or Any Online Computer Game, And It's Not Limited To The Ipod Mp3 Player Or Even The Rio Sport Mp3 Player.

Newer Models Are Creating Competition And Getting Cheaper, Just Like All Computer Technology Always Does. Just Look At The DVD Player.

Ipod Is Getting The Credit, But Adam Curry, Former Music Video DJ And MTV Host In The 1980's, Is The Central Player In RSS (Real Simple Syndication).

A Music Download To A Mini Portable Mp3 Player Is Not New, The Ipod Buzz Is. Podcasting Is Going To Be Big.

I Feel Lucky To Have Gotten In On It At An Early Stage, With My Daily Podcast Sunny Thought Of The Day. It Supplements My Free Affirmations By E-Mail.

So Now You Have 2 Free Ways To Get Positive Thinking From Me.

I Was Interviewed Last Month In The Honolulu Star Bulletin, Who Told Me I Was The Only Daily Podcaster In The State Of Hawaii.

Since Then I've Found Out I'm One Of Only A Handful Who Podcast Daily In The Entire World.

And My Radio Interviews - I Was Interviewed By Positive Purpose Radio Host Kevin Mcdonald, On KLAY AM Radio In The Seattle Area, 5 Times - 1 Hour Each - Those Shows Were All Podcast Internationally, Too.

Welcome To The Future! It's Evolving One Day At A Time. Why Not Hit The Computer Airwaves Yourself? And Start Podcasting Today!

Buying a Used Laptop Computer

uying a used or refurbished laptop is much the same as buying a new one - except you are going to get a much better buy! When considering buying a used laptop, the first thing to do is to determine what your needs are.

What do you want to use the laptop for?

*Word Processing *E-mail *Internet Browsing *Use at Work and at Home *Gaming *On-line Shopping *Database Applications *Personal Finance and Online Banking *Coding *Schoolwork

The reason for assessing what you applications you need are that most refurbished laptops often only include the Operating System (OS). Some don't even have an OS installed so make sure you know what you're buying before you spend your money.

Once you establish your computing needs, you need to determine your budget.

Refurbished laptops don't always come with an operational battery. If you need a battery, shop around to figure the cost to replace one. You should know that older laptop batteries don't last more than an hour or two, and even purchasing a new battery for the purpose of longer battery life may not be worth the expense. You should also stick with name brand battery manufacturers like IBM, Dell, Toshiba and Compaq-HP.

Once you have your refurbished laptop, you may not know what to do next. If you are new to computers and you want to browse the World Wide Web, you will need to obtain the services of an ISP (Internet Service Provider). There are basically two types of Internet access options: broadband (cable modem, DSL, satellite) and dial up. Broadband is the preferred type since download speeds can range from 128kbs to 6000kbs (faster is better). But, if your budget is tight, dial-up access will work fine for typical browsing and e-mail usage.

If you bought your used laptop for gaming, you definitely need a reliable broadband connection. Gaming over a dial up connection will be frustrating and on some cases even impossible. That is why it's critical that you check out the minimum systems requirement for the games you like before buying the laptop. You want to make sure the CPU speed and the RAM and graphic chip requirements will support your needs.

Finally, where do you buy your used or refurbished laptops?

* Some people choose to search at www.ebay.com. If you be sure to check out the seller to be sure you will have a smooth transaction. * Many don't want the hassle of bidding, so will use their favorite search engine: www.google.com orwww.yahoo.com or www.msn.com for the terms used laptops or refurbished laptop.

How do you choose once you have a list? 1. Look for online reviews 2. Make sure they have a BBB Online Insignia 3. Make sure their service is up to you standard. Most of the vendors have 800 numbers, so it won't cost anything to call. 4. What do their prices look like?

If all the above seems like too much of a hassle, then buy a new computer. It will cost around $800 + but will come with a new battery and a one year warranty (although some new ones seem to have only 90 day warranties). It will also have the latest Windows XP system and an 800 number to call the vendor, should there be a problem.

Buying DDR memory for your computer

Many aspects of the personal computer have increased in leaps and bounds in terms of performance and what they are capable of doing.

Computer memory, often referred to as Random Access Memory (RAM), has become of greater and greater performance as time has gone on.

One of the famous quotes from back in the eighties was one made by Bill Gates when he said that no one would ever need more than 640KB of memory. Well that has been passed for ages now, with high performance machines sometimes sporting over 1GB of it.

There are many advantages that can be had with more memory. -Programs run faster -Less waiting time for programs to load -More programs can be run at a time -Overall computer speed is increased

Double Data Rate (DDR) memory is the staple of the consumer market. It has taken off due to public demand and now comes quite reasonably priced.

Computers don't generally come with less than 256MB of memory nowadays. My computer after freshly installing Windows 2000 (no, I haven't gone to Windows XP yet) takes about 80MB or memory. That is the very least, with no additional programs or anything else installed. After I have installed all the graphics drivers, Internet connection software for ADSL, virus protection and firewall it takes around 160MB of total memory.

From my previous experience, 256MB will do, but after it becomes quickly filled when running a few programs, Windows reverts to using the hard drive for memory. It's a way to fake more memory, by using the hard drive as a temporary store. 512MB now does it for my needs, but if you run many programs or memory intensive ones, 768MB or even 1GB will do better.

But is memory size the only factor?

An equally important factor is the memory speed. It is measured in MHz. Most systems use 400MHz DDR memory. This would be the safe bet with almost any processor you may have. 400MHz has also become the most common to buy, there is not much slower than that left to buy.

Memory from a reputable manufacturer will ensure that you don't have problems with it and will also provide a certain amount of overclocking if you are into that. Even better would be to get faster memory, it just runs down at the computers speed, even if it is designed for more.

Another aspect of memory has come into play, being highlighted mostly by the enthusiastic overclocking crowd, and that's latency.

Memory is a bank or table of places where information can be stored. In order to get the specific rows and columns certain things have to be activated within the memory. In a nutshell latency refers to how long it takes to be able to acces another part of memory. The shorter the time it takes, the quicker it is.

Low latency memory comes at a huge price premium, with 512MB of top class memory costing more than some processors.

But does it actually benefit you?

If you are into high-speed 3D games then there could certainly be a difference. For the rest of us, there probably won't be much difference. It's still worth it however to keep latency in mind when shopping around. I would certainly choose a lower latency model when buying.

Dual channel memory is another recent addition to memory technology. What it does is it puts the memory into pairs, the two pairs together can increase on the performance and speed of the memory by up to 10%. The motherboard has to support it, and the memory has to be the dual channel kind. Dual channel will work even when not in a pair, but normal memory will have no advantage when put in a pair.

Finally, DDR2 is a newer addition available for Intel systems. It has 240 pins (the little copper strips at the end that plugs into the slot) as opposed to DDR memory's 184 pins. In this respect the two are completely incompatable. DDR2 is by design meant to be in pairs, they don't have to be, but they all have dual channel capability. Only Intel processors with LGA775 socket type use this memory, but it is much faster.

So, whenever looking for more memory, try to bear these factors in mind...

-Do you need DDR or DDR2 (LGA775 systems) -What speed do I need? Usually 400MHz (named PC3200) or faster? -256MB minimum, preferably 512 or up to 1GB -Dual channel pairs. Do you need them and does your computer support them? -Latency, lower the better, but not essential. CAS of 3 is normal.

Beeps! Your computer is telling you something.

One beep from your computer at startup can make your whole day. Just ask anyone that has turned on the
PC and suffered the agony of several beeps and then nothing.

When you purchase a computer, it will arrive with the BIOS (Basic Input/Output System), pre-installed on an
EPROM (Erasable Programmable read Only Memory), chip on the main/motherboard. When you start your
computer the CPU (Central Processing Unit), sends control of the PC to the EPROM BIOS. The BIOS is part of
the POST (Power-On Self Test) of the computer. Once the BIOS receives the go ahead from the processor it starts
its magical journey through all the components and peripheral devices attached to the computer. CMOS
(complementary metal-oxide semiconductor), hold the data that is accessed by the BIOS setup. Basically, the
CMOS is the reason that you can unplug your computer and retain the startup and BIOS information. CMOS is
maintained on the motherboard in an always-on state supported by a battery installed on the main board.

Much like the human mind, when we wake up in the morning our brain remembers that we have eyes, ears, a nose
and so on. We know the town we live in. You can go to work, stop by the post office, the grocery store and back
home without having to spend time perusing a map for directions to each one. Your computer works much the same
way. Without a memory device to instruct the computer on what’s where, the operating system and other software
would literally have to take the time to locate each part of the PC and its components every time they are loaded.
Fortunately, the BIOS take care of that for the processor, operating system and components.

How the BIOS works. Every computer comes pre-loaded with the BIOS on the motherboard. Motherboard
manufacturers work long hours with BIOS manufacturers to make sure the information in the BIOS is specific to the
needs and components of the motherboard. Although there are a number of BIOS manufacturers, the two most
popular are AMI (American Megatrends Incorp.) and VIA. BIOS simply put, is a program and not an actual
device. It is the software that informs the computer at startup of all the devices (input and output) attached to the PC.
The BIOS also lets you know when there is a problem. It accomplishes this by checking for known devices and
makes sure they are still attached. When the BIOS detect a problem it sends a series of beeps to the motherboard
speaker. This series informs the user of what the problem is, at least as well as the BIOS can determine. Lets say
your video card has gone the way of the XT model computer, the BIOS senses that it has died or is not installed. The
BIOS sends a series of beeps to the onboard PC speaker to inform you of the problem. Pretty neat! The problem is
that no manufacturer of BIOS uses the same beep series. This is why it is important for you to know the BIOS
software manufacturer for your specific PC. We’ll explain how to find this out later.

How do I know if the BIOS are working? That’s easy, if your computer starts and you get a single short beep,
the BIOS is working and has found and relayed the information about the input/output devices to the CPU. If you
turn on your computer and nothing happens at all, the problem is probably in your power supply (this assumes that
you have it plugged in properly) the BIOS is probably still working but the computer can’t start because of a power
problem. If all is well, the BIOS will find all the attached input/output devices, send a single short beep to the internal
speaker and the computer will start the boot process.

OK, so who’s the boss…? BIOS, CMOS or POST? If we must choose, it would be the (Power-on, Self-test),
POST. The POST is simply the process of the BIOS using the information from CMOS to start the computer.
Remember, the BIOS information is stored in CMOS memory maintained by an onboard battery.

Three ways to change and/or update the BIOS. Unlike ROM (read-only memory) the EPROM BIOS can be
changed or updated. The term for changing the EPROM software is referred to as flashing. You may have over
heard someone say that they need to flash the BIOS with a new update. Don’t worry if you have never heard this,
well, maybe you should worry a little. Computer components change on a daily basis and the BIOS needs to be
flexible enough to be able to change with them. All computers allow the user to change the BIOS software and how
the computer reacts to input/output devices. The standard is to offer the user a way in to the software via a hotkey at
startup. Normally this hotkey is the F2 key, the Del (Delete) key and in some cases the F1 key or a combination of
keys. Start your computer and watch the bottom left corner on the screen. This should let you know which key to
press to enter the BIOS setup. The BIOS setup, sometimes called the CMOS setup, allow the user to make
changes on the fly and save them. Let’s say you added an external modem to your PC on Communication serial port
number 1(Comm1), and no matter how many times you install the drivers, you can’t get the PC or Windows to
recognize it. Chances are that the BIOS does not know that the modem exists. Entering the BIOS setup and
changing it to allow the use of Comm1 will fix the problem and let the PC know that a device exists on that port. This
is the most common use of the BIOS setup and also the easiest to do. WARNING: it is just as easy to totally screw
up your system by making changes in the BIOS setup. So be careful and make sure you know how and what to
change. Changing the wrong settings can render your computer useless. There, we warned you twice, that’s because
we want you to think twice before you change the BIOS. Second is the Flash BIOS update from the manufacturer
of the BIOS. This is a software program that the manufacturer of the BIOS sends out periodically to insure the BIOS
conform to new equipment and standards. You can normally get this software upgrade for the manufacturer and
sometimes from the motherboard manufacturer. Be careful…be very careful installing the software and be positive
that it is for your specific BIOS. Always follow the manufacturers instructions exactly. The third way is replacing the
BIOS chip. Replacing the chip may be your only recourse and should be left to professional computer repairmen.

How do I know which BIOS I have? That also easy, the computer will actually tell you. If you’re fast enough,
you will see the BIOS name and version on the screen the moment you turn it on. If you are not a speed-reader you
can access the BIOS setup and retrieve the information from the setup program. You may also contact the
motherboard manufacturer and find which BIOS was installed on that board.

Friday, October 30, 2009

Becoming a Computer Trainer

Have you ever attended a computer course at a computer training 
center and really thought about much money they make on teaching 
students? I know when I first started taking classes it just amazed 
me on how much money the training centers make for teaching many of 
the most popular Microsoft Office courses offered today. Of course 
there is big money in certification courses, but the majority of the 
home and small business users just want to learn how to use products 
like Microsoft Word, Excel, Outlook FrontPage and Access. That is 
were the computer trainer comes in to the equation. 

You see, many people do take courses at computer centers but many 
don't like to or have to travel to the centers. Some students
don't like the large classroom environments so many don't
even go. Don't even get me started on Computer Based Training
(CBT) and Web Based Training (WBT) methods of teaching. Don't
get me wrong, computer training centers are good and very attractive 
to the public. Many of the centers offer very good courses and have 
very knowledgeable instructors. The problem is they can't offer
one-on-one assistance to the customer like personal computer trainer 
can. 

The computer training business can be a very profitable and enjoyable 
business for a new business owner. For example, no too long ago I 
attended a course myself and realized I was sitting in a class full 
of students. After calculating the number students by the price of 
the course, I realized the center just made over $2000.00 for only 
seven hours of work (the class could have been done in half that 
time). That is good money for a computer trainer that could have gone 
on-site and conducted the same training. Not only did the center make 
over $2000.00, they did it for only one level. There were four more 
levels for the same course. Someone is making some very serious 
money, don't you think?

Whether you know a lot or a little about computers, you can become a 
computer trainer in not just Microsoft Office products but in a 
variety of computer related fields. My advice is finding your niche 
by looking at not only your talents but your passion. If you do 
decide to become a computer trainer, nothing can stop you if you have 
the drive and desire to be successful. 

Thursday, October 29, 2009

Basic Computer Thermodynamics

That desk in front of you and everything else around you is made up of atoms. An atom consists of electrons orbiting around a nucleus. An atom is increadibly tiny. You could line up 10 million of them inside a millimeter. What if we could scale up an atom so that the nucleus was the size of a basketball? The orbits of its electrons would then be 15 miles away. 

From this you can understand that atoms are almost all empty space. The nucleus of the atom is composed of quarks. If you could see a quark or an electron up close, it might appear as a tiny vibrating glow of energy. It turns out this world, which is causing us so many problems and so much stress, is mostly an illusion! 

The electrons orbit the nucleus at about the speed of light. If you could see them, they might appear as a blur. They do not orbit in a plane like the pictures in books. They create a shell. Sometimes two or more atoms will share electrons, causing them to link together forming a molecule. 

Looking at that desk in front of you again, it looks pretty solid. Actually, unless your desk is floating in deep space where the temperature is close to absolute zero, the molecules of your desk are vibrating like crazy. Picture the molecules bouncing around and smacking into each other like balls on a pool table. 

If you have ever played pool, you're very familiar with how when a pool ball hits another pool ball, it transfers it's energy to the second pool ball. When heat causes molecules to vibrate, they transfer energy between each other in a similar fashion. This action is called "conduction". 

Now picture the CPU of a computer cooking away because the designer wants to push too much power through a small piece of silicon. If we don't take away that heat as fast as it's created, that CPU will fry! 

The problem is usually solved by mounting a heat sink on the CPU. Conduction causes the heat to move from the hot CPU to the cooler heat sink. Because air doesn't conduct heat as well as metal, We apply a thin layer of heat sink compound between the CPU and the heat sink to fill in any gaps. 

You'll notice that a heat sink has fins on it. The fins allow the heat sink to conduct the heat to the air adjacent to the fins. The fins provide more surface area to aid in conduction. Eventually the adjacent air will get as hot as the heat sink and conduction will cease. 

If we move the air away from the heat sink, it will take the heat energy with it. A fan mounted on the heat sink is used to move the air. This method of heat transfer is called convection. Eventually all the air inside the computer case will get hot, so fans are used to blow the air out of the case of the computer. 

The heat has moved from the CPU, to the heat sink, to the air inside the case, to the air in the room where you're sitting at your computer desk. The room starts to get hot, and eventually the air conditioner turns on. 

You can view an air conditioner as a "pipe". A fan blows the hot air from your room through fins that transfer the heat to a liquid. The liquid is piped to fins outside the house. A fan blows cooler outside air past the fins to remove the heat from the liquid. 

The air conditioner has an evaporator valve that changes the liquid to a gas after the heat is removed. In a gas, the molecules are further apart than in a liquid. This causes it to cool down quite a bit more. The gas goes through the fins inside the house, picking up heat. It is then compressed into a liquid to concentrate the heat so the outside fins can remove the heat more efficiently. 

Shuttle's I.C.E. (Integrated Cooling Engine) Heat Pipe uses a very similar method to cool a CPU. The CPU has a heat sink with copper heat pipes. The heat of the CPU causes liquid coolant inside the heat pipe to change to a gas. Convection created by the pressure of the gas moves the coolant to a second heat sink where a fan is used to blow the heat out of the computer's case. Releasing the heat causes the coolant to change back to a liquid. Gravity then carries the coolant back to the CPU heat sink. 

One last method of heat transfer we haven't discussed yet is radiation. Some of the heat of the CPU and the heat sink is released as infrared radiation. Similar to light (although invisible to human eyes), the radiation strikes the insides of the computer case, causing it to get warm. Ultimately the computer case itself acts as a heat sink conducting heat to the outside air. 

This article explains the three ways - conduction, convection, and radiation - that heat is transported from a computer CPU to the air outside the computer case. You now understand the thermodynamics of a computers and why it is important to maintain its various components.

Are You Making Any Money With Your Computer Yet?

Starting a home based business is a fantastic way to earn additional income part time or full. You can build a six figure or higher residual income using your home computer and a few hours of your spare time each week. It is estimated that each day nearly 200,000 new people log on to the internet for the first time. Many of these people looking for a home based business.

Some of these people will go on to create a full time income equal to or exceeding their current pay from their jobs. You need very little capitol to start a home businesses and you can work the hours that are best for you.

Developing an opportunity mindset is key to your business success. Your business success is largely determined by your thoughts. If you believe that you can be successful in your business you will be. Henry Ford once said " if you believe you can or you can’t you are right."

Self-motivation and keeping an optimistic perspective is vitally important. You must possess the desire to succeed and take action everyday regardless of what obstacles you encounter along the way.

Your level of success depends on the time and effort you are willing to put into your business. To reap the greatest return on the time you invest you must keep a positive outlook and maintain the belief that you will eventually succeed.

The author Norman Vincent Peale once said, "We tend to get what we expect." Are your expectations for your business ones of abundance and reward for work well done?

Everyday you must plant mental seeds of prosperity into you mind and nurture them. We become what we think, therefore develop the thoughts that will create the life you want to live. The key difference between a successful person and an unsuccessful person is their habits.

Develop the habit of being a power of intelligence and positive expectancy in your business and interactions with others. Cultivate patience and practice the work habits that will get you the results you desire.

Your mind is goal-seeking mechanism. Set large goals for yourself and others and work daily on achieving them. The purpose of setting goals is for you to decide exactly what it is that you want. You must clearly understand where you want to go before you can expect to arrive there.

The philosopher Aristotle wrote that all behavior is "teleological" or purposeful- aimed at a goal. The one factor that governs your actions is your desire that you would be better off than you would be in the absence of your actions.

Stay positive and focused on your home business continually reminding yourself of your purpose. What ever we focus on becomes our reality. Continually focus on where you want to be and that is the direction you will go.

Are cyber-criminals "phishing" your identity from your computer?

Phishing (definition) (FISH.ing) pp. Creating a replica of an existing web page or HTML email input form to fool a user into submitting personal, financial, or password data. —adj.

Today phishing seems to be one of the most serious new scams on the Internet. Now hackers and spamming companies not only bother you with thousands of unwanted emails each day but also, you might be the victim of a phishing attack! Phishing refers to the activity by hackers who simulate a legitimate organization and use e-mails to persuade people to share their personal and private financial data. No, this is not a bad joke: phishing attacks involve the mass distribution of "spoofed" email messages with return addresses, links, and branding which appear to come from well known banks, insurance agencies, retailers or credit card companies. The result of these scams is that consumers suffer credit card fraud, identity theft, and financial loss.

So what’s the deal here? Well, for starters, to most Internet users the emails and web sites are indistinguishable from legitimate business communications. Secondly, trusted sources reveal that by hijacking the brands of well-known banks, online retailers and credit card companies, phishers are able to induce up to 5% of recipients to respond to them. How far can these unscrupulous companies and individuals get? Farther than most of us would think. Last Nov. 8, a man in Sydney, Australia, was imprisoned for more than five years for duping people into sending him millions of dollars in a global Internet ruse known as the Nigerian scam. He presented himself as someone who needed access to a Western bank account in order to transfer a large sum of money out of a politically troubled country. Criminals taking part in the Nigerian scam would then promise the innocent email recipients a share of the money, but ask for a smaller upfront cost - in the concept of an ‘administration fee’ - before the larger sum can be transferred. This way they make millions! Although this man pleaded guilty at the Sydney Court, chances are it will take much more than one guilty man imprisoned to get this problem under control.

According to APWG’s Phishing Attack Trends Report (July 2004), the most targeted industry sector for phishing attacks continues to be Financial Services, both from the perspective of total attacks and the number of companies targeted. Retail is second, whereas ISPs are third. Citibank seems to be the company whose brand was hijacked most often by phishers. Some other recent phishing targets include AOL, Suntrust, Earthlink, Wells Fargo, MBNA, Charlotte's Bank of America, Paypal, Fleet, Best Buy and eBay. 

Although the United States is the top country in terms of the total number of hosted phishing web sites, other nations engaging in phishing attacks include Russia, the UK, Mexico and many Asian countries such as South Korea, China and Taiwan – among others. APWG’s report indicates that that approximately 35% of phishing web sites are hosted on exploited machines, unbeknownst to their owners. Because they are fake, phishing web sites normally do not have a long life span. The average life span for both phishing and fraud sites, measured by how long they continue to respond with content, does not go beyond a week. 

Think you are covered because you know what phishing is and you have an idea on how to handle these attacks, sit back because you have not heard it all. Research indicates that the dramatic increase in the number of fraud-based websites over the past few months may result not only in identity theft, but also in the false belief that you have purchased something online when in fact, you have not! Unlike phishing attacks that hijack the brand of trusted e-commerce or financial institutions, these web sites are presented as generic ecommerce sites. How do they operate? Well, users believe they are ordering legitimate products or applying for a legitimate mortgage when in reality, they are becoming fraud victims. The most common fraud-based web sites are fake loan scams, mortgage frauds, online pharmacy frauds, and fake online banking institutions. In addition to the direct cost of fraud and the enduring effects of identity theft for consumers, the growth of criminal spam threatens the integrity and brand of organizations that do business online.
Phishing attacks are growing quickly both in number and sophistication. If you have been tricked this way, you should assume that you will become a victim of credit card fraud, bank fraud, or identity theft. Some basic advice on what to do in this situation if you have given out your credit, debit or ATM card, or bank account information, is to report the theft of this information to the card issuer or the bank as quickly as possible. Canceling your account and opening a new one is advisable in addition to reviewing your billing statements carefully after the loss. 
How can you solve your company’s email problems and keep the right information flowing? Phishing is one of the most dangerous forms of spam, thus if you are worried about the problem of phishing, online fraud, and email spoofing, you should first control the spam in your mailbox and report those who are sending it. To take an active role in the fight against spam, you can become a member of the Anti-Spam League for free and learn how to detect and recognize potential phishing and online fraud threats. Find out how by visiting www.Anti-Spam-League.org

An eBay Computer Purchase

A story of fraud, deceit, and broken promises.

Let me preface my statements by saying that I think eBay is great.

I’m a handicapped senior citizen and it’s been a boon to me to be able to shop the Internet and particularly eBay.

In nearly six years I’ve had two problems both to do with non-delivery.
One incident was insignificant as it involved a $5.00 purchase and was quickly remedied. 

It only deserves mention because it was my first purchase, and because I complained about non-delivery the vindictive seller gave me a negative feed back, which remains on my record to this day.

Some months ago I purchased a computer through eBay. It was a very good price, but not so low as to arouse suspicion.

I paid through Paypal using a credit card.

I had checked the seller's feedback record, which was perfect. Next day I received an acknowledgment and a promise to ship in a day or so.

I waited for a week or so, then followed up the shipment. The seller, Ann apologized and said that she was a government attorney, on call and had been called out of town unexpectedly. She said she was on the road and on her return home would advise me the status of the order.

About a week later I received an email with an email with a UPS tracking number and an expected delivery date. The date was somewhat extended, but I accepted it, as it was coming across country. 

When the PC didn't arrive as expected I sent Ann another email. Her response was another apology and she said that her father had died and she was in another state for the funeral and would look into the matter upon her return, also that due to the inconvenience she was going to refund half my money.

More time elapsed and after several email inquiries I received an email from Ann's husband stating that on her way home from the funeral she had been in a car crash and was hospitalized. He said he was not involved in the transaction, but on her instructions was looking into the matter, and would see that I received not only my computer but also a full refund.

Naturally many weeks had elapsed by this time.
I was beginning to become suspicious and checked their feedback record when suddenly there appeared six or seven bad reviews. On a subsequent check they made their feedback private so it couldn't be accessed.

By then it was too late, the next thing I knew their email was suspended.
When I contacted eBay they gave me Ann's phone number. When I called the phone number their service had been disconnected. 

I was unable to get an address from either eBay or Paypal.
I reported this case of fraud, deceit and broken promises to eBay and Paypal. Both had time limits, which had expired, so they were unable to help me, so I turned the matter over to my credit card company.

Fortunately, I had used a protected credit card, and I was within the prescribed time limit. 

I don't know what transpired but I subsequently received a notice from Paypal that they had credited my account. Eventually I received a full refund.

Lessons Learned:

* Always uses a consumer-protected credit card. Do not ever use your checking or savings account even though Paypal encourages you to do so.

* Make sure you have a consumer-protected card, some do not have this feature, and be aware of the time limits, and other restrictions.

* Do not accept stalling tactics even if they seem legitimate. Paypay has a 30-day limit. EBay's is 60 days, or 90 days in some cases. Put in a claim immediately, you can always retract it.

* Be careful when checking feed back, make sure you’re getting reports from buyers not sellers. eBay has made it easier to do this now. 

These people had deliberately purchased a lot of small items to build up a positive feed back record.

I have seen a tutorial that advocates doing it for new sellers who have no feed back record .

* Follow tour instincts, I had ignored a lot of danger signals. ---DON'T DO THAT---use your common sense---If you suspect foul play, Take immediate action.

Remember that scam artists are very good psychologists. They know how to appeal to your sensibilities.

Beware---They're Pros they make their living that way. Fraud and deceit are their tools of trade.

All About Computer Viruses

Your computer is as slow as molasses. Your mouse freezes every 15 minutes, and that Microsoft Word program just won’t seem to open. 

You might have a virus.

Just what exactly is a virus? What kind is in your computer? How did it get there? How is it spreading and wreaking such havoc? And why is it bothering with your computer anyway?

Viruses are pieces of programming code that make copies of themselves, or replicate, inside your computer without asking your explicit written permission to do so. Forget getting your permission down on paper. Viruses don’t bother to seek your permission at all! Very invasive.

In comparison, there are pieces of code that might replicate inside your computer, say something your IT guy thinks you need. But the code spreads, perhaps throughout your office network, with your consent (or at least your IT guy’s consent). These types of replicating code are called agents, said Jimmy Kuo, a research fellow with McAfee AVERT, a research arm of anti-virus software-maker McAfee Inc.

In this article, though, we’re not talking about the good guys, or the agents. We’ll be talking about the bad guys, the viruses.

A long, long time ago in computer years, like five, most viruses were comprised of a similar breed. They entered your computer perhaps through an email attachment or a floppy disk (remember those?). Then they attached themselves to one of your files, say your Microsoft Word program. 

When you opened your Microsoft Word program, the virus replicated and attached itself to other files. These could be other random files on your hard drive, the files furthest away from your Microsoft Word program, or other files, depending on how the virus writer wanted the virus to behave. 

This virus code could contain hundreds or thousands of instructions. When it replicates it inserts those instructions, into the files it infects, said Carey Nachenberg, Chief Architect at Symantec Research Labs, an arm of anti-virus software-maker Symantec. Corp.

Because so many other types of viruses exist now, the kind just described is called a classic virus. Classic viruses still exist but they’re not quite as prevalent as they used to be. (Perhaps we could put classic viruses on the shelf with Hemingway and Dickens.)

These days, in the modern era, viruses are known to spread through vulnerabilities in web browsers, files shared over the internet, emails themselves, and computer networks.

As far as web browsers are concerned, Microsoft’s Internet Explorer takes most of the heat for spreading viruses because it’s used by more people for web surfing than any other browser.

Nevertheless, “Any web browser potentially has vulnerabilities,” Nachenberg said.

For instance, let’s say you go to a website in IE you have every reason to think is safe, Nachenberg said. 

But unfortunately it isn’t. It has virus code hidden in its background that IE isn’t protecting you from. While you’re looking at the site, the virus is downloaded onto your computer, he said. That’s one way of catching a nasty virus.

During the past two years, another prevalent way to catch a virus has been through downloads computer users share with one another, mostly on music sharing sites, Kuo said. On Limewire or Kazaa, for instance, teenagers or other music enthusiasts might think they’re downloading that latest Justin Timberlake song, when in reality they’re downloading a virus straight into their computer. It’s easy for a virus writer to put a download with a virus on one of these sites because everyone’s sharing with everyone else anyway.

Here’s one you might not have thought of. If you use Outlook or Outlook Express to send and receive email, do you have a preview pane below your list of emails that shows the contents of the email you have highlighted? If so, you may be putting yourself at risk.

Some viruses, though a small percentage according to Nachenberg, are inserted straight into emails themselves. 

Forget opening the attachment. All you have to do is view the email to potentially get a virus, Kuo added. For instance, have you ever opened or viewed an email that states it’s “loading”? Well, once everything is “loaded,” a virus in the email might just load onto your computer. 

So if I were you, I’d click on View on the toolbar in your Outlook or Outlook Express and close the preview pane. (You have to click on View and then Layout in Outlook Express.)

On a network at work? You could get a virus that way. Worms are viruses that come into your computer via networks, Kuo said. They travel from machine to machine and, unlike, the classic viruses, they attack the machine itself rather than individual files.

Worms sit in your working memory, or RAM, Nachenberg said.

OK, so we’ve talked about how the viruses get into a computer. How do they cause so much damage once they’re there?

Let’s say you’ve caught a classic virus, one that replicates and attacks various files on your computer. Let’s go back to the example of the virus that initially infects your Microsoft Word program. 

Well, it might eventually cause that program to crash, Nachenberg said. It also might cause damage to your computer as it looks for new targets to infect. 

This process of infecting targets and looking for new ones could eventually use up your computer’s ability to function, he said.

Often the destruction a virus causes is pegged to a certain event or date and time, called a trigger. For instance, a virus could be programmed to lay dormant until January 28. When that date rolls around, though, it may be programmed to do something as innocuous but annoying as splash popups on your screen, or something as severe as reformat your computer’s hard drive, Nachenberg said. 

There are other potential reasons, though, for a virus to cause your computer to be acting slow or in weird ways. And that leads us to a new segment – the reason virus writers would want to waste their time creating viruses in the first place.

The majority of viruses are still written by teenagers looking for some notoriety, Nachenberg said. But a growing segment of the virus-writing population has other intentions in mind.

For these other intentions, we first need to explain the “backdoor” concept.

The sole purpose of some viruses is to create a vulnerability in your computer. Once it creates this hole of sorts, or backdoor, it signals home to mama or dada virus writer (kind of like in E.T.). Once the virus writer receives the signal, they can use and abuse your computer to their own likings.

Trojans are sometimes used to open backdoors. In fact that is usually their sole purpose, Kuo said. 

Trojans are pieces of code you might download onto your computer, say, from a newsgroup. As in the Trojan War they are named after, they are usually disguised as innocuous pieces of code. But Trojans aren’t considered viruses because they don’t replicate. 

Now back to the real viruses. Let’s say we have Joe Shmo virus writer. He sends out a virus that ends up infecting a thousand machines. But he doesn’t want the feds on his case. So he instructs the viruses on the various machines to send their signals, not of course to his computer, but to a place that can’t be traced. Hotmail email happens to be an example of one such place, Kuo said.

OK, so the virus writers now control these computers. What will they use them for?

One use is to send spam. Once that backdoor is open, they bounce spam off of those computers and send it to other machines, Nachenberg said. 

That’s right. Some spam you have in your email right now may have been originally sent to other innocent computers before it came to yours so that it could remain in disguise. If the authorities could track down the original senders of spam, they could crack down on spam itself. Spam senders don’t want that.

Ever heard of phishing emails? Those are the ones that purport to be from your internet service provider or bank. They typically request some information from you, like your credit card number. The problem is, they’re NOT from your internet service provider or your bank. They’re from evil people after your credit card number! Well, these emails are often sent the same way spam is sent, by sending them via innocent computers.

Of course makers of anti-virus software use a variety of methods to combat the onslaught of viruses. Norton, for instance, uses signature scanning, Nachenberg said.

Signature scanning is similar to the process of looking for DNA fingerprints, he said. Norton examines programming code to find what viruses are made of. It adds those bad instructions it finds to its large database of other bad code. Then it uses this vast database to seek out and match the code in it with similar code in your computer. When it finds such virus code, it lets you know!

Advancement in Computer Technology

5 years ago we gathered around and marveled at the little specs moving at our commands, doing not much – except moving off course, we called these things games. Today the hardware in computers and other devices has changed significantly; we went from having a “spacious” 1mb hard drive to 250 GB of space. The graphics have also taken a giant leap for our computers, no longer are we confined to little dots but our 256mb graphic cards allow us to explore a virtual world in 3d. The sound has also changed from 4bit to 32 and pretty soon 64bit; we went from beeps to actually words. Finally the speed of our beloved computers has also increased from mere kilobytes to gigabytes of rams. In such a short period of time we went from what we used to call “advanced” technology to today’s much superior devices. So if you guys are like I am, there is one question that strikes our mind, what’s next? Well I would love to say that we will be able to put on our virtual glasses that will allow us to explore the virtual world as if we were in it, but this is not likely, sorry guys; however, these sorts of glasses are being constructed but its unlikely they will come out any time soon. What we can expect to see is an improvement in our Text-to-speech and vise versa programs after the 64bit sound card is released allowing the computer to understand our voices much clearly, also we should soon be seeing more “dept” in our computer as you may know that the most our computers can run on 32bit resolution, it is expected that Microsoft is like to bring out a 64bit resolution with there next version of windows. Also the speed and graphics are to increase a lot more, already some games look as they are almost real, and soon they will look real. I am not certain exactly what marvel the computer hardware’s will hold in the future, but one thing is certain it will be something to forward too, and once again the next generation will be mocking the so called advanced technology we have today. 

A Hacker Inside Your Computer?

Imagine this nightmare scenario...

You check your e-mail program and it reports your username
and password as no longer valid. You call your Internet
service provider (ISP) to discuss the problem and they tell
you they turned off your account due to "abuse". "Abuse!"
you cry to the customer service operator, "What are you
talking about?"

"Someone used your computer this past Saturday night in an
attempt to hack into a government computer system. They
made the attempt at 1:20 a.m. from your account," replies
the rep. "Look in your windows registry for a file called
QAZWSX.hsq."

You punch a few keys and sure enough the file stares right
back at you. "What is it?" you ask, scared to know the
answer.

"Someone used a Trojan Horse virus to remotely control your
computer and cloak the identity of the hacker. Here's how
to get rid of it, just..."

What you just read happened very recently to someone I know
quite well. A computer hacker found an open port on his
computer when he switched over from a dial-up Internet
connection to an "always-on" high-speed connection. 

The hacker used a robot scanning the Internet for available
"ports", openings in a computer that allow data to pass
back and forth from a network connection like the Internet.
Once the hacker found an unprotected port on my friend's
computer he simply inserted a Trojan Horse virus that rides
along with Windows Notepad, a handy utility used by just
about everyone who makes web pages.

When my friend activated the notepad program he also
activated the virus. The virus in turn transmitted all of
my friend's security information to the hacker and allowed
him to gain access and control his victim's computer in the
middle of the night. 

Count me as the last person to sound paranoid, but, as
always-on connections through DSL, cable, and T-1 lines
proliferate, this story will repeat itself over and over
until people learn to protect themselves.

Most people underestimate or are completely ignorant about
the importance of information they send over the Internet
when surfing websites and checking email. Even if you only
use a simple dial-up account, you can unknowingly transmit
a significant amount of sensitive information.

You can analyze the security of your web connection for
free by going to http://www.symantec.com/SecurityCheck/ .
You can also verify the presence of any known viruses or
Trojan horses on your computer. The information I saw when
analyzing my personal computer frankly shocked me. I saw
data I didn't even know existed staring me right in the
face after I performed this analysis.

To protect your computer hardware and sensitive data you
should obtain a software package called a "firewall". A
firewall, when combined with a good anti-virus program,
helps stop unauthorized access on your computer, prevents
virus infection, and "cloaks" your data ports against a
hacker scanning for openings.

Symantec.com and McAfee.com both offer excellent personal
firewall and anti-virus software from their websites or you
can buy them off the shelf at your local office supply
store. A wise investment for anyone on the net... before
it's too late!

A Guide to Computer Desks

Computer furniture has evolved over the years. Improvements in the design and decor of computer desks have revolutionized the way people work at the computer. With the increase in the number of computer accessories, such as keyboard, mouse, and additional attachments like the printer, scanner, hard disks, modems, the allotment of space for all these accessories has become a challenge. Modern office furniture has to be modular, movable and flexible.

The most important feature of a good computer desk is ergonomic design. As people work spend more hours at the computer, it is important that the desks are comfortable to sit at for long hours. Moreover, they have to look good and blend in well with the rest of the office or home. As greater comfort ensures greater productivity, companies are more willing to provide the best computer desks for employees.

Modular computers desks provide flexibility and versatility in use – they can be remodeled very easily depending on the use. These are ideal for the limited office spaces of today, and also work well in homes because they can be easily changed according to different requirements. Fittings are provided to accommodate various other accessories that may be required while using the computer, such as a document holder, wrist rest, file hangers, CD holders, or telephone shelf. Such desks are also often accompanied by a manual that contains comprehensive instructions for assembling or disassembling the unit. On the whole, computer desks today are leaner, and have fewer drawers and more shelf-space than before.

In most modern computer desks, the unique arrangement of the panel systems ensures optimum space, privacy and advanced wire management. The spine of the desk should be designed to not only provide power and data to the whole unit but also to support the desk assemblies, staking storage, divisional screens, transfer screens and other accessories. The end result is optimal space utilization.

A versatile computer desk should not necessarily compromise style. Computer desks are being designed with every kind of material possible ranging from traditional oak and wood to metal, glass and fiber.

6 Essential Steps to Protect Your Computer On the Internet For Free

Recently one of my friends asked me to check out if his computer was infected by virus. He suspected because occasionally the computer was shut down automatically when connected to internet. My first thought was the Sasser worm 60 seconds auto count-down. As he uses Windows 98 second edition with IE5, the virus must be a Sasser variant.

I'm not network security expert but I know some basic things he must do to protect his home PC. It was a shock when he told me that his 4 years old PC had no protection except McAfee anti-virus.

  • Bought in 2000 and no Windows service packs had been applied since then.

  • McAfee anti-virus software came with the PC when bought and no updates since then.

  • No firewall installed.

  • No anti spyware installed.

This is what I did to beef up his PC to the best of my knowledge.

Step #1: Patch the operating system.

The first thing I did was update his Windows 98 to the latest available Windows updates for Windows 98.

  • Open Microsoft Windows Update page athttp://windowsupdate.microsoft.com/

  • Scan the PC to find out what critical updates and security fixes are missing.

  • Select, download, and install a selection of updates, especially any Critical Updates.

  • Restart the PC after finished.

When you open the Microsoft Windows Update page, click the "Scan for updates" link. The page will suggest what updates are needed based on your Windows version. You should install all Critical Updates suggested by Microsoft.

It took me about one and half hour to complete the above steps.

Step #2: Download, install, and run Spybot to get rid of all spyware.


http://www.safer-networking.org/index.php?page=download

Spybot-S&D is a free anti-spyware software to detect any spyware installed on your PC.

Spyware is any software that is installed on your PC and tracks your online behavior without your knowledge or consent. Spyware generally can

  • Track what web pages you are visiting and send these information to advertising companies. This kind of spyware is commonly called adware.

  • Track and record your computer activities such as what keys you hit. This is generally called Trojans.

  • Change your web browser's home page.

  • And more...

After installed Spybot, I immediately scanned my friend's computer and found 166 problems. The first run killed nearly all of them except some memory residents that had to be killed after a reboot.

Step #3: Download and install Kerio Personal Firewall (KPF).


http://www.kerio.com/us/kpf_download.html

Kerio Personal Firewall limited free edition is for home users. After installation, KPF works as the full edition for 30 days, after which it becomes the limited free edition.

You may also try the free ZoneAlarm firewall. Be aware that ZoneAlarm free edition uses a lot of computer memory.

The following is the free ZoneAlarm firewall download link. You hardly can find this download link on ZoneAlarm site because they want you to buy the Pro version which is a much better choice.


http://www.zonealarm.com/store/content/company/products/znalm/freeDownload.jsp

Step #4: Download AVG anti-virus software


http://www.grisoft.com/us/us_dwnl_free.php

Because my friend has McAfee antivirus installed but has not been updated for about 4 years. I downloaded AVG Free Edition antivirus software and let him to consider if he wanted to pay and update his McAfee or use the freebie. Running two antivirus software on the same computer can cause conflicts.

Step #5: Install password management software - RoboForm free edition.


http://www.roboform.com/?affid=siter

RoboForm is a password management software with Artificial Intelligence built in that can automatically fill online forms for you. It has been featured on The Wall Street Journal, CNN, The New York Times, Financial Times, PC Magazine, etc.

Nowadays we all have many usernames and passwords to use on the internet. Some spywares record your keystrokes and send them to the hackers. It has been reported many times that people lost all their money in online bank account or internet payment system account.

One of RoboForm key features is designed to combat this kind of key logger hacking. RoboForm can

  • AutoSave passwords in browser.

  • AutoFill passwords to login form.

  • Click Login button for you.

  • Fill personal info into online forms.

  • Save offline passwords & notes.

  • Generate Secure Random Passwords.

  • Encrypt passwords and personal info using 3-DES.

  • All personal info is stored on your computer only.

  • Put passwords on USB KeyChain for extra security.

  • Sync your passwords and safenotes to a Palm.

  • Backup & Restore, Print your passwords.

  • More features: drill down for more.

RoboForm works best with IE 5.0 and above. IE6 is the recommended browser to use with Artificial Intelligence RoboForm.

Note: free eidition comes with some limitations.

Step #6: Apply additional security measures.

More security measures and resources:

Mission completed. It took me nearly 4 hours that night and the result is so far so good.

5 Ways To Make Night-And-Weekend-Computer-Life Rich

Are you a computer-worm? Do you thrive on a computer 24/7? A “computer-worm” is analogous to “book-worm” – a person who spends most of the time working on a computer. Do you expend most of your time reading or writing emails, chatting with friends, watching movies, listening to music, cyber-window-shopping, etc? Do you relegate your important tasks of completing a school assignment, working on a contingency project, etc to realize later that you spent the prime-time idly? In this article, you would discover few ways of improving your cyber-life – how to make your working on a computer more useful and much more effective.

Technology revolution has supplemented the ease and increase of computer usage. The overall at-home global active internet use for a number of selected countries grew by two-thirds of a percentage point from February 2004 to March 2004 (Nielsen//NetRatings). Switzerland exhibited the largest growth rate at over 3 percent, while U.S. added the most active Internet users over the month. With this enormous increase in internet usage you have to keep the following 5 ideas in mind that would help increase the efficiency of work that you do while on your computer off-work.

1) Chat or email kills your time-

Avoid opening a chatting application, or an email application as your first window. When you find one of your friends on the chatting window (or email from one of your friends), you inadvertently start conversing with the person. On the other hand, if you do not find any friend, you search for a new chat-buddy. In both the cases you deviate yourself from important tasks. This hinders you from working on essential activities that you intended to do when you started the session.

Instead, make a habit of completing tasks that you planned before opening a chat window or an email window. Treat yourself with a chatting session (or an email session) for completing the daily (important) tasks.

2) Audio speakers add to your entertainment-

Turn on your pair of audio speakers, if you have one. Listen to online news, success stories, motivational speeches or jokes while working on your important tasks.

Online news is becoming common day after day. You can view and listen to news on many websites. You would find it easy to access online news channels if you have a “superpass” with Real Networks (http://www.real.com/superpass/). Nevertheless, websites like MSN (http://msnvideo.msn.com/), ABC News (http://abcnews.go.com/) offer feeds to news and other interesting stories available for free download.

3) Do smart-browsing not the hard-browsing-

When you read on the internet, do it intelligently. One way of intelligent reading is to increase your vocabulary. Look up difficult words in the dictionary when you read documents on the web. You can use innovative internet tools like XemanteX (http://www.xemantex.com) that provide an online-running-dictionary. You can read through the document with a built-in dictionary. Just double click the word to get the meaning on the same screen.

4) Online games as concentration tools-

Play online games. Games not only give you entertainment but also help you increase your concentration. There are many websites that offer free subscription to the games on their website. Perform a Google search on “free online games” that would bring up thousands of resources. Enjoy playing a game, improving your personal skills at the same time.

5) Help your mind concentrate-

Split your entire sitting into various sessions. You would be able to give out more every session. Take a coffee or tea break every 45 to 60 minutes. This would help your mind free up its resources and get back on track after the break. Moreover, this would help you avoid narrow thinking. One gets to think through a narrow channel when deep concentration.

Okay, I told you 5 simple and common ways to make your off-work computer life easy. Try them out and feel the difference. You would be happier and feel more accomplished. As you know internet has redefined human’s life. Computer, which was used only by intellectuals and elite a few years ago, is a basic requirement for a common man now. To add fuel to the fire, internet has supplemented its power transforming them the best communication tool. Instant messaging, emailing, electronic news, etc allow for fast and easy communication among the internet users. Very soon, computers would be indelible parts of our life. You should realize that the tremendous power that this internet has can only be harnessed when it is put to use in the most efficient way.

5 Tips For Buying The Right Laptop Computer

It's easy to be intimidated by all the laptop models on the market today. There are literally dozens and dozens in every price range. 

The key to finding the right one for you is to step back and consider exactly how you plan to use your laptop. When you define what you need before you go shopping, buying the right machine becomes much easier. 

Here are 5 basic factors to consider: 

1. SIZE 

In the world of mobile computing, size definitely matters. The size of a laptop affects two key areas: portability and display size. 

If you're always on the go and will be using your computer only in short bursts, a so-called ultralight will save you some shoulder strain. 

On the other hand, if you're going to spend hours in front of your laptop, a larger display may be in order. 

Today, some laptop displays exceed 17 inches, rivaling the display size of many desktop systems. The down side is that these monsters can easily weigh three times as much as an ultralight. 

2. HARD DRIVE 

Speaking of size, what about the size of the hard drive? One way to approach this issue is to ask yourself the following question: 

Will this be my primary computer, or will it supplement my desktop system? 

If the former, you should look for a bigger hard drive - 60 GB or more. 

If the latter, you may be able to make it with a 20-30 GB hard drive. 

But even this isn't absolute. 

If, for example, you plan to copy a huge MP3 library from your desktop system to your laptop to make your music library portable, you'd be well advised to err on the side of too big. 

3. MEMORY 

In determining the right amount of system memory, or RAM, take a look at the ways in which you intend to use your laptop: 

If your needs are somewhat mundane - email, spreadsheets, word processing, etc. - 256 MB of RAM should be plenty. This is a common configuration for many laptops, so it means you probably won't need to spend extra for more RAM. 

On the flip side, if you're an aspiring mobile digital photographer or videographer, you should stuff your laptop with as much RAM as it can hold. 

In fact, exactly how much RAM your laptop can hold may in part drive your purchase decision. Applications for editing and manipulating multimedia content are notorious resource hogs. 

4. NETWORK CONNECTIONS 

Thanks in no small part to the Internet, computing in the 21st century relies heavily on being connected: 

Connected to the Internet, connected to a corporate network, connected to a wireless network, connected to a home network, connected to an online service.

Your life will be easier if you buy a laptop that includes built-in means to connect to them all. 

5. PRICE 

If you're considering a laptop, you're probably wondering how much money you'll need to spend. 

A few years ago, you'd be hard-pressed to find one for under $2,000. Today, there are plenty of laptops to be had for under $1,000. 

What's more, most of the major manufacturers offer a variety of financing options. 

Laptop prices have come down, to be sure. However, a laptop still represents a fairly major purchase for most people. 

If you take the time to search for a laptop that meets your specific needs, you should get many years of use and enjoyment from this important investment.

5 Sure-Fire Tips for Buying a New Computer

So you're thinking of buying a new computer...

Where do you start? There are so many brands and models of computers available, and it can all be a little overwhelming when you start to look around.

How do you decide what type of computer you need? And perhaps more importantly, how do you decide what the best value is?

I have sold computers professionally for almost 20 years, and there are certain "tricks of the trade" that most computer stores and salespeople use. Knowing these secrets can make your decision easier and will help you buy the right computer for your needs.

1. Buy What You Need, Maybe a Little More

One of the most important things you can do when buying a new computer is make a list of the things that you will be using it for. There are so many different models - with different capabilities - that you can easily buy more, or less, than you really need if you don't.

If this is your first computer, this can be a little tougher. Until you've used a computer, it's hard to know exactly what you might want to do with it beyond the obvious, like connecting to the internet.

Regardless, you should think about some of the things you might want to do. Some possibilities include:

- Connect to the internet
- Play games
- Digital photography
- Digital video
- Type documents
- Accounting
- Design websites
- Programming
- Digital scrapbooking
- Geneology

Some of these things need more power than others. For example, connecting to the internet really doesn't need a lot of power. Even the most basic computer available will probably work just fine.

Digital video and many games need a lot more power. If you don't get a fast enough computer with enough memory, you'll be disappointed with the performance.

Knowing what you're going to be using your computer for will help your salesperson, whether they're on the phone, the internet or standing in front of you, recommend the best system for your needs.

As a general rule you're always better off buying more power than you need rather than less, but buying too much can be a waste of money.

2. Warranty Considerations

Computer warranties are one of the most confusing and obscure parts of your purchase. Most manufacturers have cut back on their customer service to the point where poor service has become a given.

The three most common options are onsite, carry-in or manufacturer's depot service.

Onsite service can be helpful, but think about whether you want to have to be available for a technician to come and diagnose your computer, and possibly have to come back with parts at another time.

Carry in service is a good option, but find out whether the service center is factory authorized for warranty repairs, as well as whether the technicians are all certified.

Shipping your computer to a factory service center can take a long time - sometimes a number of weeks. It also creates risk that your computer will be damaged or even lost in shipping. In some cases, the manufacturer will even replace your computer with another unit and ship it back to you, rather than repairing it. This can result in your losing any information that was on your system and having to reload all your software.

Another aspect of the warranty to find out about is technical support. Find out if the computer manufacturer offers a toll-free phone number and what the quality of service is like.

The better computer salespeople will be honest about this and tell you if a company's service leaves something to be desired. You can also do some research on the internet - most of the computer magazines like PC Magazine and PC World have annual customer service comparisons that rate the larger computer companies.

Always find out how the warranty is handled before making your decision. Even if it doesn't influence your choice, knowing what to expect if something does go wrong will save some nasty surprises down the road.

3. Can You Negotiate the Price Down?

A computer is a relatively large investment - anywhere from a few hundred to a few thousand dollars. Many computer buyers expect that there is a significant amount of "wiggle room" on the price.

The reality is that most computer hardware - the physical pieces like the computer, monitor and printer - is sold at very low profit margins. Often, computer systems are even sold at or below the dealer cost. When you're buying a computer, it never hurts to ask for a better deal, but don't be surprised if you only get a few dollars off, if anything.

Over the close to 20 years I've sold computers, I watched the profit margins go from over 40% to less than 5%. It's almost embarassing to offer a $20 discount on a $2500 computer system, but that could mean the difference between making and losing money on the sale.

What you can do to get the best price is to do some comparison shopping. Most computer stores offer price-matching guarantees, so if you find your computer for less at another store, most dealers will match or beat that price, even if it means they lose money.

4. How Do Computer Stores Make Any Money?

You might be wondering how these computer stores make any money if they're selling computer for so little profit.

Their money is made on add-on items. The highest profit areas in most computer stores are cables and "consumable" products such as printer ink and paper.

Printer ink is a huge money-maker for most computer stores (even more so for the printer manufacturers). Why is this? Once you've bought a printer, you're going to have to replace your ink at some point, and continue to replace it as it runs out.

Most chain computer stores and office supply stores that carry a large selection of ink cartridges make more from ink than they do from the computers themselves.

Cables also have huge markups. A cable that costs the store $2-3 will often sell for $20-30. That's ten times their cost!

If you're buying a new computer, you will likely need to buy some cables. Some items - printers, for example - don't often include the cables needed to hook them up.

Many printers also come with "starter" ink cartridges that are only half-full. You might also want to pick up some extra ink cartridges.

This is where you should be able to negotiate a better price. Don't expect the salesperson to throw them in for nothing, but they should be willing to offer you a better price. After all, if you're happy with their service, you'll probably continue to buy your ink, paper and other products from that store in the future.

5. What Software is Included?

The last secret of buying a new computer has to do with the software that is included. Most new computer systems include quite a few programs and sometimes the value of the software can be quite high.

Something to watch out for when looking at the included software is "trial versions" or "limited editions".

Many programs that are preloaded are either crippled versions that don't have all the features of the full program, or trial versions that will only run for a certain amount of time before they expire.

Computer are often sold with trial versions of the following types of software:

- antivirus
- firewall
- MS Office or other office suites
- Accounting - both business and personal

The computer manufacturers generally don't make it easy to tell whether the software on their systems are trial versions or limited versions. This is a question that you should specifically ask if you can't find the answer in their promotional information.

If you're buying a new computer with trial versions of the software, keep in mind that you will need to pay to continue using it after the trial period is over. This is an added cost that you need to consider as part of your overall budget.

These five "secrets" of buying a new computer are fairly common sense, but they are not always made clear up front. Knowing what to ask will help you in two ways. First, you can be sure you are getting the right computer for your needs.

Second, if the salesperson or company that you're dealing with explains these things to you without being asked, you'll know you're dealing with someone who is honest and upfront.

Knowing you can trust the people you're dealing with is an invaluable feature of your new computer system.