Sunday, December 28, 2008

Lenovo ThinkPad T61p, suitable for the Professional


With the ability that more than enough, this laptop is considered feasible. However, if only for day-to-day needs, so can ThinkPad T61p is not obliged to make owned, considering the high price of middling.

TFT screen with wide 15.4-inch display capable of resolutions up to 1920 x 1200 pixels, field work that feels very roomy. Not to feature anti-glare that makes the display so sharp and bright but still comfortable in the eye. ThinkPad T61p this graphic processor using the NVIDIA Quadro FX 570M, with a capacity of 256MB of memory that will not have to play the short game-game output last.

By using the processor Intel Core 2 Duo T7700 2.4 GHz, which is supported by 2GB of RAM DDR2 SDRAM, and save as much as the media
100 GB SATA, to handle the operating system Windows Vista Premium, which are voracious resource is not a problem.

Up facilities such as DVD ± RW, 4 in 1 card reader, fax / modem, network adapter, and Wireless WiFi has been available on the Lenovo products. If interested, you can have them with the benefits of U.S. $ 1239.42, or about Rp.11.400.000 course setealah you see the specifications on the Lenovo official site

Read More......

MSi Wind U100-291, Portable Must Not Small











Apparently, predicted that the netbook will be able to compete with products that the laptop proved correct. Although not have the ability sehebat laptop, netbook have some value, the size of a small, affordable price, and the ability to adequate. One product that is quite interesting netbook is MSi Wind U100-291 is.

Wind can be MSi U100-291 is ideal enough. With 10-inch wide screen, netbook is still quite small but not too small so that disrupt the operation. Design is quite simple and not so interesting shameful when used in public places.

Netbook a black slab has a blunt corners, which makes tearful little less dynamic but firmly. The future contains no more decoration, there is only writing MSi white in the middle of this body netbook. The inside is also dominated by color jet, including the keyboard-it.

Screen that looks wide enough have a certain size brilliant. Colors are shown bright enough even from the corner a little wide. And more important is the ability to screen coated with anti-glare display case that can be read clearly and not make eye so tired when used long. Unfortunately, the same quality we can not from the speakers it is not good, especially when used to play music.

Keyboard design that meets all the visible surface is slightly disrupt the aesthetic, but when viewed from the side, the keyboard is close to normal size keyboard is so convenient to use because there is still a 'space' for both hands when used for typing. The design of the keyboard made with the space widish also create the possibility of a press so small.

From the performance, MSi Wind U100-291 is not much different with other netbook output last. Prosesornya use 1.6GHz Intel Atom N270 supported the installation of 1GB memory. That is quite interesting pairing with a 160GB hard disk on this netbook. With the capacity of this, so this gives netbook space roomy enough to store data or install applications. However, of course, the hard disk installation is making so little vulnerable to shocks. Can be so, the price is a constraint MSi why not install the SSD in the netbook this.

When compared with the previous generation MSi Wind, one of this experience with some improvements such as installation of 160GB hard disk, the Wireless-N battery 6 cells that make long time operation of the netbook is so increased.

Overall, good design and performance netbook is quite good and not disappointing. To that end, Trusted Reviews do not hesitate to give the value 9 of 10 for products that are sold with the price of 360 Pounds Sterling, or approximately Rp 6,000,000 this. The only weakness is that this site is the quality of the speakers it is not too good.

-kapanlagi-

Specifications:
Processor: 1.6GHz Intel Atom N270
Memory: 1GB
Chipset: Intel 945GSE + ICH7M
VGA: UMA
Screen: 10 "1024x600 LCD Panels
Hard Disk: 160GB
Optical Drive: N / A
Port / Slot: Graphics Card Output, USB2.0, Mic-in, Line-in, Headphones, LAN, 4-in-1 Card Reader
Webcam: 1.3 Megapixel
Wireless: WLAN, Bluetooth,
Dimensions: 260 X 180 X 19 ~ 31.5mm
Official Site: www.msicomputer.co.uk

Read More......

Acer aspire 6935, Entertainment Laptops











From the outside view Acer aspire 6935 it is visible normally. However, in the view that this is simply the ability of powerful laptop on the side of entertainment. Effects of the laptop entertainment is stronger with the buttons are provided for special media player to the left of the keyboard.

The outside of the laptop, given the color blue looks plain old bald except for the Acer logo is seen glaring at the center of this front. The effect of 'dark' is still maintained on the part of the laptop is a given color jet. This provides benefits in part because of Unsurprisingly, most often with hands so dirty, not easy.

Acer using the diagonal screen size of 16 inches with a 16:9 ratio in this laptop. This is not surprising because this laptop is designed to display the DVD format with the good. This screen has a resolution of 1366 x 768 pixels and looks quite sharp with a bright color although the viewing angle is slightly too narrow for the size of a multimedia laptop.

Because there is a space that must be provided to the buttons, the media player would not want to position the keyboard so slightly shift to the right. For those who are not used, this may be the position of the keyboard rather disrupt, but overall, the construction of the key on the keyboard make this quite comfortable and lower productivity while typing.

However, the most interesting that the media is a key player on the left of the keyboard. Button-key touch-sensitive with this design be very interesting. However, it is not only an attractive appearance, because the functional buttons is also working with the good and responsive.

The video quality will not be complete without balanced with adequate audio quality. And in this side, Acer aspire 6935 is also quite reliable. Acer even install sub-Woofer placed on the tube, which also functions as a hinge of the laptop. The sound quality is even a good place to start when the volume increased.

Acer laptop entrust the heart of this on the Intel Core 2 Duo P8400 2.26GHz, which is assisted by working with 4GB RAM DDR2. There is a 320GB hard disk with a speed of 7,200 rpm play installed on this laptop. In short, the laptop is powerful enough to use for heavy jobs and entertainment functions. And for that, Trusted Reviews provide value 9 of 10 for products that are sold with the price of 910 Pounds Sterling, or approximately Rp 16,000,000 this.

Specifications:
Processors: Intel Core 2 Duo P8400 2.26GHz
Memory: DDR2 4GB
Chipset: Intel Centrino2
VGA: Nvidia 9600M GT 512MB
Screen: 16 "WUXGA
Hard Disk: 320GB 7200 rpm
Optical Drive: Blu-ray ROM
Port: ExpressCard, 6-in-1 card reader, USB 2.0, HDMI, infrared, VGA, Microphone, Line-in, Modem, Ethernet
Webcam: 1.3 megapixel
Wireless: Draft-N Wi-Fi
Dimensions: 385 x 275 x 39.3 ~ 42.6mm
Official Site: www.acer.co.uk

Read More......

Acer aspire M7720, the First Core Processors With i7




Acer is one of the producers of products that the PC was first adopted in the Intel Core i7 products. This means that Acer aspire M7720 has the latest technology in the PC world. However, it is not only a mainstay of this product. Acer installing chassis with a number of functions and features that also quite interesting.

Color jet with a touch of orange color in some places, adding that strong impression. What is clear, not just the appearance of visible only reliable because the PC contains the latest technology from Intel, which is guaranteed to provide reliable performance while energy efficient.

Intel's latest technology, this is called a "drastic a transition from the previous technology. First, there is no longer the front side bus, because Intel is now using the memory controller, which was installed directly in the prosesornya. In addition, the system is now using three-channel memory and not two as previously.

I7 920 Core processors that are used Acer aspire M7720 is a Quad-core processor that uses Hyper-Threading technology. This means that, in the virtual you have up to eight processors that work simultaneously. Each core work with the speed of 2.66GHz, but this speed can be derived in accordance with needs. Even this system can be shut core processor that is not required, so do not squander resources.

To support the performance of the processor, the Acer install 3Gb of DDR3 RAM and VGA card ATI Radeon HD4850. Save space provided is quite roomy. Acer install the hard disk capacity of 750GB. With the mix of specifications such as this, clearly Windows Vista Home Premium as the operating system can work freely with no answer.

Another thing that is interesting enough shelves provided connect external SATA drives in the future. This eases the process of installation of additional hard disk because you never again have to unload chassis to do so. This chassis also provide a backup of the key functions to create a backup of the system directly from the key.

What is more interesting is the media provided the key player in the PC chassis is so you can easily manage the media player functions without the need to access the menu in the software. A rather strange fact is not disediakannya indicators of the hard disk that can be 'mandatory' on a PC.

In general, Acer aspire M7720 is a performance that is reliable and therefore Good Gear Guide gives 4 out of 5 stars for this product. Unfortunately, there has been no information about the selling price of this product attractive.

Specifications:
Processors: Intel Core i7 920
Memory: 3Gb DDR3
Chipset: Intel X58
VGA: ATI Radeon HD4850
Screen: --
Hard Disk: 750GB
Optical Drive: Blu-ray ROM
Port: DVI output, Firewire, Line In, Line-out, RJ45, USB 2.0
Webcam: --
Wireless: --
Dimensions: --
Official Site: http://global.acer.com

Read More......

Friday, December 26, 2008

Track Santa Claus Through Mobile

In cooperation with the North American Aerospace Defense Command (NORAD), on Christmas 2008 Google map to bring back tracking Santa Claus in the way Christmas night. This time, Santa Claus can also be tracked via mobile phone.

As quoted detikINET from CNET, on Wednesday (24/12/2008), travel Santa will be included in Google Map map displayed on the site Noradsanta.org. In addition, users can download the Google Earth KML files to show Santa in Google Earth.

New features that are displayed for 2008 is tracking Santa via mobile phone, namely through the application Google Maps for Mobile. In addition, the user melacaknya can Twitter through '@ noradsanta'.

Tracking Santa is a part of the tradition of NORAD in progress for more than 50 years. This tradition started from a misprint Santa hotline phone number a campaign Department Store into the emergency hotline of the military.

Read More......

5 Most Popular Feature on Google

There are many special features in the Google search engine that can help us find what we find. In between you may already know.

Some of the features popular on Google, as quoted from Techdream, Friday (17/10/2008), is:

1. The calculation of simple mathematics.
Google's search engine can do simple math calculations such as addition, multiplication, division or subtraction, as have the ability to function as a calculator. Type the number you want to be counted along with calculations to sign in the box search engine, for example: 5 3 * 5, and press the Enter key or click the Search button on Google.

2. Currency conversion.
Currency conversion facility is also available in the Google search engine. Just type the figures currency followed signs that want to convert from a certain currency to the desired currency in the search engine, for example: 100 USD in INR, and press Enter.

3. Viewing time in various cities around the world.
You can find out the local time in a city or other countries. Just type in the time [name of city / country] in the search box to find out easily with the local time in a city / country. The time in Barcelona.

4. Conversion units.
In addition to functioning as a calculator, the Google search engine can also convert the size. For example: 100 inch in meters.

5. Check your spelling.
Google also have the facilities to check spelling, good spelling for a word objects, such as names and places, which may not appear in the program or spell check dictionary standard.

Read More......

7 Step Removing Virus' K0pL4xZ '

Virus "K0pL4xZ" that are detected as VBWorm.QTT take computer users, particularly those that have a lot of Office files, by changing the file type icon and Microsoft Office.

However, for, the virus is not to destroy files Office. The virus is created by using Visual Basic. So that the chance the virus, putting it by using the icon "Windows Media Player Classic" with the type of application files (exe). To clean up, follow these steps:

1. Disconnect the computer that will be cleaned from the network (LAN).
2. Turn off "System Restore" during the cleaning process.
3. Turn off the virus is active in memory. Use the tools to turn KillVB process in memory. Please downlod tools are in: http://www.compactbyte.com/brontok/killvb.zip

4. Fix registry that has been altered by a virus. To expedite the repair process registry copy the script under this program in notepad, then store with the name "Repair.inf." Run the file by:

- Click the right repair.inf
- Click Install

[Version]
Signature = "$ $ Chicago"
Provider = Vaksincom Oyee

[DefaultInstall]
AddReg = UnhookRegKey
DelReg = del

[UnhookRegKey]
HKLM, Software \ CLASSES \ batfile \ shell \ open \ command ,,,"""% 1 ""% * "
HKLM, Software \ CLASSES \ comfile \ shell \ open \ command ,,,"""% 1 ""% * "
HKLM, Software \ CLASSES \ exefile \ shell \ open \ command ,,,"""% 1 ""% * "
HKLM, Software \ CLASSES \ piffile \ shell \ open \ command ,,,"""% 1 ""% * "
HKLM, Software \ CLASSES \ regfile \ shell \ open \ command, "regedit.exe"% 1 ""
HKLM, Software \ CLASSES \ scrfile \ shell \ open \ command ,,,"""% 1 ""% * "
HKLM, SOFTWARE \ Microsoft \ Windows NT \ CurrentVersion \ Winlogon, Shell, 0, "Explorer.exe"
HKLM, SYSTEM \ ControlSet001 \ Control \ SafeBoot, AlternateShell, 0, "cmd.exe"
HKLM, SYSTEM \ ControlSet002 \ Control \ SafeBoot, AlternateShell, 0, "cmd.exe"
HKLM, SYSTEM \ CurrentControlSet \ Control \ SafeBoot, AlternateShell, 0, "cmd.exe"
HKLM, SOFTWARE \ Classes \ exefile, application
HKCU, Software \ Microsoft \ Internet Explorer \ Main, the start page, 0, "about: blank"
HKCU, Software \ Microsoft \ Internet Explorer \ Main, Search Page, 0, "about: blank"
HKLM, SOFTWARE \ Microsoft \ Windows \ CurrentVersion \ Explorer \ Advanced \ Folder \ HideFileExt, UncheckedValue, 0x00010001, 0
HKLM, SOFTWARE \ Microsoft \ Windows \ CurrentVersion \ Explorer \ Advanced \ Folder \ SuperHidden, UncheckedValue, 0x00010001, 1
HKLM, SOFTWARE \ Microsoft \ Windows NT \ CurrentVersion, RegisteredOrganization, 0, "Organization"
HKLM, SOFTWARE \ Microsoft \ Windows NT \ CurrentVersion, RegisteredOwner, 0, "Owner"
HKLM, SOFTWARE \ Classes \ txtfile, FriendlyTypeName, 0, "@ C: \ Windows \ system32 \ notepad.exe, -469"
HKLM, SOFTWARE \ Classes \ Word.Document.8, "Microsoft Word Document"
HKLM, SOFTWARE \ Classes \ Word.Document.8 \ DefaultIcon, "C: \ Windows \ Installer \ (90110409-6000-11D3-8CFE-01500 48383C9) \ wordicon.exe, 1"
HKLM, SOFTWARE \ Classes \ PowerPoint.Show.8, "Microsoft PowerPoint Presentation"
HKLM, SOFTWARE \ Classes \ PowerPoint.Show.8 \ DefaultIcon, "C: \ Windows \ Installer \ (90110409-6000-11D3-8CFE-015 0048383C9) \ pptico.exe, 1"
HKLM, SOFTWARE \ Classes \ Excel.Sheet.8, "Microsoft Excel Worksheet"
HKLM, SOFTWARE \ Classes \ Excel.Sheet.8 \ DefaultIcon, "C: \ Windows \ Installer \ (90110409-6000-11D3-8CFE-01500483 83C9) \ xlicons.exe, 1"
HKLM, SOFTWARE \ Classes \ Access.Application.11, "Microsoft Office Access Application"
HKLM, SOFTWARE \ Classes \ Access.Application.11 \ DefaultIcon, "C: \ Windows \ Installer \ (90110409-6000-11D3-8CFE-01 50048383C9) \ accicons.exe, 1"
HKCU, Software \ Microsoft \ Windows \ CurrentVersion \ Explorer \ Advanced, Hidden, 0x00010001, 1
HKCU, Software \ Microsoft \ Windows \ CurrentVersion \ Explorer \ Advanced, HideFileExt, 0x00010001, 0
HKCU, Software \ Microsoft \ Windows \ CurrentVersion \ Explorer \ Advanced, ShowSuperHidden, 0x00010001, 1
HKLM, SOFTWARE \ Microsoft \ Windows \ CurrentVersion \ Explorer \ Advanced \ Folder \ SuperHidden, WarningIfNotDefault, 0, "@ shell32.dll, -28964"

[del]
HKCU, Software \ Microsoft \ Windows \ CurrentVersion \ Policies \ Explorer, NoFolderOptions
HKCU, Software \ Microsoft \ Windows \ CurrentVersion \ Policies \ System, DisableRegistryTools
HKCU, Software \ Microsoft \ Windows \ CurrentVersion \ Policies \ System, DisableTaskMgr
HKCU, Software \ Microsoft \ Windows \ CurrentVersion \ Policies \ System, DIsablecmd
HKCU, Software \ Microsoft \ Internet Explorer \ Main, Window Title
HKLM, SOFTWARE \ Microsoft \ Windows \ CurrentVersion \ policies \ Explorer, NoFolderOptions
HKLM, SOFTWARE \ Microsoft \ Windows \ CurrentVersion \ policies \ System, DisableRegistryTools
HKLM, SOFTWARE \ Microsoft \ Windows \ CurrentVersion \ policies \ System, DisableTaskMgr
HKLM, SOFTWARE \ Policies \ Microsoft \ Windows NT \ SystemRestore
HKCU, Software \ Microsoft \ Windows \ CurrentVersion \ Run, System
HKCU, Software \ Microsoft \ Windows \ CurrentVersion \ Policies \ ActiveDesktop
HKCU, Software \ Microsoft \ Windows NT \ CurrentVersion \ Winlogon, shell
HKCU, Software \ Policies \ Microsoft \ Windows \ System, DisableCMD
HKLM, SOFTWARE \ Microsoft \ Windows \ CurrentVersion \ Explorer \ Advanced \ Folder \ HideFileExt, WarningIfNotDefault
HKLM, SOFTWARE \ Microsoft \ Windows NT \ CurrentVersion \ Run, Haha
HKLM, SOFTWARE \ Classes \ exefile, FriendlyTypeName

5. Delete the file "C: \ Windows \ desktop.ini" (the file which function to change the icon into the Windows Control Panel icon). Use a dos prompt to delete the file.

6. Find and delete files parent virus in the Hard Disk and Flash Disk with the first show hidden files. To accelerate the search function use the "Search Windows."

Here are some master file that will be made by Koplaxz:

* C: \ Documents and Settings \% user% \ Start Menu \ Programs \ Startup

Winhelp.exe

* C: \ Documents and Settings \% user% \ Start Menu \ Programs

Hellloo_Gheea.exe

* C: \ Documents and Settings \% user% \ My Documents

Jangan_Dihapus_Apalagi_Dibuka.exe

* C: \ Documents and Settings \% user% \ Start Menu

Koplaxz Kudo Shop.exe

* C: \ Documents and Settings \% user% \ Start Menu \ Programs

Exe Hellloo_Gheea ..

* C: \ Windows

TourWindowsXP.exe

svchost.exe

Kudo.com

command32.pif

KopLaXz@KudoShop.exe

* C: \ F4HM1_KudO_M4n4j3r.exe
* C: \ G0d3G.exe
* C: \ Ghe@_i_miss_u.3gp.exe (All Drive)
* C: \ K0pL4xZ.exe
* C: \ K 0 P L 4 X Z.exe
* C: \ KopLaXz@KudoShoP.exe (All Drive)
* C: \ R0n13G4N_G3Ndut_S3xY.exe
* C: \ R3eve5.exe
* C: \ K0pL4xZ @ KudoShop (All Drive)

folder.htt

msvbvm60.dll

K0pL4xZ.exe

* C: \ K0pl4xZ @ KudoShop \ K0pL4xZ.exe
* C: \ [space] Windows \ System_FriendZ_KopLaXz32

F4HM1_KudO_M4n4j3r.exe

G0d3G.exe

K 0 P L 4 X Z.exe

R0n13G4N_G3Ndut_S3xY

R3eve5.exe

* C: \ [space] Windows \ Zx4Lp0K.html
* C: \ Windows \ system32 \ smkn2majalengka.scr
* C: \ Windows \ system32 \ PCMAV.exe
* C: \ Windows \ system32 \ Asholest.exe
* C: \ Documents and Settings \% user% \ SendTo \ KoPLaXzKudo (e-mail). Exe
* C: \ Autorun.inf (all drives)
* C: \ Desktop.ini (all drives)
* C: \ A Letter Ghe @ 4. Txt (all drives)
* C: \ K0pL4xZ@kUdO_5h0P.txt
* C: \ Documents and Settings \ All Users \ Desktop \ A Letter Ghe @ 4. Inf file
* C: \ Windows \ desktop.ini


Then delete the file parent virus that has characteristics:

* Icon "Windows Media Player" clasic / 3GP Video Format
* The size of 31 KB
* Extension EXE, PIF, COM and SCR
* Type the file "Application"


Delete the following files:

* C: \ Autorun.inf (the root of each drive: c: \ or D: \)
* C: \ Desktop.ini (the root of each drive: c: \ or D: \)
* C: \ A Letter Ghe @ 4. Txt (the root of each drive: c: \ or D: \)
* C: \ K0pL4xZ@kUdO_5h0P.txt (the root of each drive: c: \ or D: \)
* C: \ K0pL4xZ @ KudoShop (in the root drive and Flash Disk)
* C: \ Documents and Settings \ All Users \ Desktop \ A Letter Ghe @ 4. Inf file
* C: \ [space] WINDOWS
* C: \ [space] Windows \ Zx4Lp0K.html


7. For optimal cleaning and prevent re-infection, a scan by using anti-virus up-to-date.

Read More......

4 Tools Free Restores Deleted Files

Never delete important files on the computer without accidentally? Cases such as this may never befall you, sometimes occurs because we hurried the middle or in the future.

However, do not worry, you can use special tools to restore the files overnight. Here are 4 tools that you can use to restore the files that were deleted. These tools can be downloaded for free on the Internet.

1. Undelete Plus
Among the applications for free circulation in the exterior to restore deleted files, Undelete Plus one that can be used. Its user interface (interface) very simple. You can restore files that were deleted easily with the file type, for example, the Application, GIF graphics, HTML Documents, PDF.

These tools operate on the operating system Windows 95, Windows 98, Windows Me, Windows NT, Windows 2000, Windows XP, Windows 2003 and Windows Vista. You can download the Undelete Plus: http://www.undelete-plus.com/

2. Restoration
Restoration is one of the application to restore the files that were deleted. Tools are also very easy to use and does not need to be installed on the computer. Simply download the tools at: http://www.snapfiles.com/get/restoration.html, the executable file and run it to restore the files that were deleted.

3. PC Inspector File Recovery
Although the user interface PC Inspector File Recovery is not so user friendly, application of this very powerful to detect and restore deleted files. After the scanning process, will be presented the files that were deleted in the folder tree structure (tree structure) to facilitate the search. Thus, you can easily find and select the files / folders that were deleted, and click on the icon and "save" to restore the files. These tools can be downloaded at: http://www.pcinspector.de/Sites/file_recovery/info.htm?language=1

4. Recuva
Recuva often referred to as "Recover". User interface is very simple. In basic mode, this tool will display a list of files that are deleted can be restored. If you change to advanced mode, the scanning process will be re-done and the option to display the information contains the list of files that were deleted. These tools can be downloaded at: http://www.recuva.com/

-detik-

Read More......

Thursday, December 25, 2008

To stop the QoS Accelerating 'Browsing'

QoS named full Quality of Service provided with the goal to make sure your network works well. But the reality is not so useful, but that can take up to 20% of your bandwidth. You can try and see the difference when QoS is disabled.

If you use Windows XP Professional, the following steps off the QoS:
- Click Start, then Run.
- Type "gpedit.msc" in the field, and press enter.
- In the Local Computer Policy, click the plus sign in the Computer Configuration, then click again on the Administrative Templates.
- Click on the plus sign and select Network QoS Packet Scheduler.
- On the right-hand box, double-click on Limit Reservable Bandwidth.
- On the Settings tab, select Enabled.
- In the Bandwidth Limit%, replace the contents so 0%. (Do not leave empty the contents)
- Click OK.

If you use Windows Home Edition, follow these steps:
- Click Start and then select Settings.
- Select Control Panel, and open Network Connections
- Right-click on Local Area Connection and select Properties.
- On the General tab, check the lost QoS.

Read More......

Set 'Browser Add-ons' With' Service Pack 2 '


If you have not installed Service Pack 2 for Windows XP, this will be the other reason why it should do. SP2 will give you more control in detail for the add-ons in Internet Explorer, which will help you take control of your browser and remove spyware from attack.

Facilities that secretly and tersamar such as a toolbar, spyware can enter the Internet Explorer, hijack your browser, and overwhelm you with ads and all the activities you when online. Even add-ons that are officially eliminated so difficult to have one installed on your system.

To set this add-ons, first make sure that Service Pack 2 you have one installed. And run Internet Explorer, go the Tools menu, select Internet Options, and click the Programs tab.

Click on Manage Add-ons and you may be given a long list of add-ons that disrupt lumayan. Look one by one on the list, click anywhere that looks suspicious, and then select Disable.

Not be a problem for a little aggressive in men-disable add-ons, including Browser Helper Objects and Browser Extensions, because it's easy to enable back later when you need it.

Of course for a more extreme again, you may consider uninstall Internet Explorer and switch to alternative browsers such as Mozilla Firefox. Handling this will limit your use of the many spyware and virus threat.

kapanlagi

Read More......

Overcome the 'Error' In the Word From the 'Template Files'


Sometimes the problems that arise when we run the Microsoft Word toolbar, such as lost, often hangs suddenly or can freaks react Word also caused because the file is corrupted template. Word when run will automatically call the normal templates and other additional functions in the startup folder.

To address the following steps:

1. Start the Word template but without any call. How to run Word from the Start menu> Run and type winword.exe / a and press enter. Do not forget there must be a space before / a. Word will be run without calling a global template, and other additional functions and the Normal.dot. If the issue is resolved means the problem lies in the Normal.dot file, and proceed to step number two. If the problem is still there, only to immediately step number 7.

2. Close Word.

3. Use the Windows feature to find the Normal.dot file. Click on the blank on the taskbar and press F3 to display the Search window. Make sure you find the primary hard drive and includes Subfolders tercentang. Type the name of Normal.dot on the line and click the Search button.

4. Depending on your version of Windows, Normal.dot may be located in a folder that is hidden.

5. If found, rename Normal.dot so Normal.old.

6. Run back Word. When you delete or rename your Normal.dot file Word will then create a new file based on the standard settings. If the issue is resolved then the problem because your damaged Normal.dot file. If still not continue to step to seven.

7. If the problem lies not in the normal template, then the problem is the global template and other additional functions. To go to your Word startup folder. Usually there are at C: \ Documents and Settings \ username \ Application Data \ Microsoft \ Word \ Startup.

8. Move all the contents of the folder.

9. Close Word and try again enter one by one the contents of the startup folder. Word then run again, the test whether there is an error and then closed again. Repeat for the other contents of the startup folder. If the error it appears, you will know where the additional functions into the causes of these errors and could install it again.

Read More......

Creating PDF Files Without Using Acrobat


By using some free programs, you can easily PDF files from Word files without having to need to spend nearly U.S. $ 300 to get the full version of Adobe Acrobat. The program is Ghostscript, a free program available for all kinds of operating systems.

Ghostscript can create PDF files from PostScript files. PostScript is a programming language-page description of nearly all known types of printers, and this is usually the format of your file when you print to the printer.

From Word, you can print your document to a file not to the printer. File format that will be a file if the PostScript printer driver that you use a printer that supports PostScript. This means you can use the program to make Ghostscript PDF file from the file.

To check whether your printer supports PostScript, try to print a short document to a file (from the menu select File> Print and Print centanglah box to file), then open the file with a text editor program such as Notepad. Although Word will give the extension. Prn, it will be the same as the PostScript file. Characteristics of the PostScript file is the content of the first line (when opened with Notepad) always starts with the characters%! PS near the top of the file.

If you do not have a printer that supports PostScript, do not worry because many printer drivers provided by the printer. For example a printer driver from Hewlett-Packard. Due to print only need to file its driver, then you surely do not need a printer.

Once you install the printer or PostScript printer driver, you will be able to directly use the Ghostscript, Ghostview and GhostWord to create PDF files from Word files.

To get a free Ghostscript you can download it from the site the University of Wisconsin. You can also download GSview to open a PostScript file.

Using GhostWord

Ghostscript is GhostWord view so that one with the Word. This program will add a button from the Word toolbar. Use this feature to change the Word document that is now on directly to a PDF file.

There was also able to run this facility outside of Word. GhostWord even have a display to receive input on the command-line. You can get one for free here.

kapanlagi

Read More......

LG LCD Screen Use Sun Power


The sun is probably the case that most laptop users avoided because light will disrupt the view of the LCD screen. Cope with, of course, how to improve the level of brightness of the screen that ultimately consume more battery power. With the technology developed by LG, this issue will not again face the future generation laptop.


In fact, the screen will be on display starting in Consumer Electronics Show in January this year claimed able to reduce power consumption to 75% when used under the blazing sun. The secret lies in the use of a reflective layer placed on the panel LCD screen's backlight is.

At the time used in the room, the panel can be enabled to emit light that will illuminate the display on the screen while at the time used in the outdoor bar is reflective of the sun to illuminate the display screen. Even when used outside the room, the screen can achieve this level of contrast four times higher than normal screen mode and to change this and also the only way to press the button that has been provided.

According to news from TGDaily on Tuesday (23/12/08) mentioned that in this mode sunlight, LCD screens consume power only about 25% of normal power. LCD screen measuring 14.1 inches normally consume power between 50 watts to 70 watts and decrease power consumption to 75% means very clearly for the laptop.

Read More......

Recognize Variety UPS



Power Supply Uninteruptible or better known as UPS, for some people, this term may sound familiar. However, people often only know two types of UPS that is most easily found in the market. Both types are the type of UPS and standby UPS type online. In fact, UPS has several other advantages and disadvantages of each.

American Power Conversion (APC), a global leader in critical power services and cooling services are also popular with UPSnya products, provide information and tips about multiformity UPS so users can better identify and select the UPS in accordance with their needs.

Standby
Standby UPS type is the type used by the user's home to be with their PC. Transfer Switch has been set to take the AC input (direction) as the main source of power, while the resources taken from the backup battery or inverter (at the time the main source of power off). UPS equipment is able to perform like this against interference filtrasi power and flow management, in addition to the benefits for users of the design of an efficient, small size and cost that must be regarded issued cheap.

Line Interactive
UPS is the type most often used on small business units, web developers, and a number of servers that are in the government department. This is because in addition to having a high level of reliability, this type also has the ability to adjust the voltage is quite good. The inverter (Battery charger from the modifier to AC) is always connected to the output of the UPS system. In normal circumstances, will make the inverter Battery. Meanwhile, in the electricity off, Transfer Switch will close and drain power from the Battery to the UPS output. Position the inverter is always connected to the output filter to provide additional resources. This makes this type of UPS with lots of servers used for electricity and conditions that are not too good.

Double Conversion Online
This type is the most common for UPS power with more than 10kVA. This type has similarities with the type Standby. Just type a main source of energy that lies in the inverter, not the AC power source. On this type, the main electricity supply dissolution will not trigger the switch because of the transfer of AC electric current at the entrance to the input of the Battery which provides power to the inverter is located at the output. Therefore, when the flow of AC power is lost, the flow of energy will be transferred immediately without taking a rest when the diversion occurs. UPS is the type of performance above average. This type can be said to a picture of an ideal UPS, type unfortunately this heat is high enough.

Delta Conversion Online
UPS is a diagram of Double Conversion technology (Double Conversion) that terah updated and is available with power 5kVA to 1.6MW. Have a similarity with the type Double Conversion, using this type of inverter for the supply voltage. When power supply is lost, this type do the same type with Double Conversion.

Suppose a package should only be transmitted from the floor 4 to 5 floors. Delta Conversion technology to save energy in a way to deliver the package according to the differences in the starting point and end point only. Delta Conversion has two functions, the first is to control the characteristics of the input power. Meanwhile, the second function is to control the flow of direct input to the process of charging the battery system. Things to remember this is the type of energy that minimize terbuang. In addition, it has a high compatibility of the various types of generators and reduce the need for the use of cables.

In the end, all of the UPS mentioned above have their purpose and no one type of any type that can be the most 'ideal'. We must be able to recognize the needs and the right environment where the UPS will be put before deciding what type to use.

Refers to the categorization discussed previously, the table below will make it easier to see in which type fits your needs.

UPS Type: Standby
The advantages: low cost, high efficiency, compact design
Disadvantages: The battery still in use when the power off; not suitable for use on the 2kVA
Description: Most suitable for personal users

UPS Type: Line Interactive
Excellence: High Reliability, high efficiency, good voltage adjustment
Disadvantages: Not suitable for use on the 5kVA
Description: Type of UPS is the most frequently used in the condition of electricity that is not stabilized

UPS Type: Double Conversion On-Line
The advantage: the voltage adjustment is very good, easy to connect in parallel
Disadvantages: Low efficiency; expensive price for the type of power under 5kVA
Description: close to the ideal image of UPS, but the heat is high enough.

UPS Type: Delta Conversion On-line
The advantage: the voltage adjustment is very good, high-efficiency
Disadvantages: Not suitable for use under 5kVA
Description: high efficiency to extend life cycle when the device is used on a large system

Read More......

Nokia integrate System Sign-in at the Ovi

Nokia realize the many obstacles that occur in accessing the Internet, including the use of multiple accounts to access the site.

To that end, Nokia is finally making a service that combines all incoming access to many sites, one in the roof, Ovi.com.

During a year later, Nokia has purchased dozens of companies engaged in Internet services, including the purchase price of USD8, 1 billion for the acquired company Navteq navigation. This is done to Nokia still retains the top of the world mobile phone market and the power of the Internet era.

Finnish handset vendor origin is also combine each have access to services in a single integrated service called Ovi.com. Even to visit each of the existing service, Nokia users do not need to use additional username or password. This is done to ease the user to access all the Internet service owned by Nokia in Ovi.

"We have to unite to sign-in system in our Ovi, so that our users more comfortable and has experience in a different berinternet," said Nokia spokesman, as quoted by Reuters on Monday (22/12/2008).

Nokia expects, in the year 2011 they are able to produce as much revenue USD2, 79 billion from Internet service, particularly focusing on the navigation service, music, games, messaging and media. This means that Nokia will compete directly with Google, Apple and Yahoo.

Unfortunately, Nokia does not provide definitive data how many internet users that they have, it is reported that as much revenue has recorded 115 million euros since July to September this year

okezone

Read More......

Wednesday, December 24, 2008

Logitech Illuminated Keyboard, Pas Create Day in the Night


When you include people who spend more time working with the computer, you will need the input devices such as mouse and keyboard that provide comfort when you work. And when you include people who often work at night, be it Logitech Illuminated Keyboard is indeed fit for you.

Logitech keyboard display production this interesting. From the side, the keyboard was very thin with a curved shape to the right in the space provided for the wrist rest. Soft texture of the stucco space at the bottom of the range is key keyboard feels quite comfortable in the base wrists and not make the pain even though this should be using this keyboard for long enough time.


Seen from the key layout, the keyboard is actually very simple. Not many buttons beside the four buttons in the top row of the array NUM key pad. The fourth button is working to access functions from the keyboard backlight, which can be light in the dark. Some function for the media player and Web browser had merged with the key functions of the organization that is in the top row of the keyboard.

Construction of each key on the keyboard is also quite good, so convenient to keep a long time. Level ergonomis board productivity, the key is to make your time typing is not experiencing a decline. In addition, the keyboard is almost no beeps when used so that people will not disturb the other when you have to work overtime until late at night even.

Backlight function keyboard has four levels that can be set according to taste. With so you can still feel comfortable and undisturbed even though using the keyboard in different lighting conditions. When the conditions are really dark, you can lower the intensity backlight, so you can still see the location of each of the keyboard without having to feel interfere with the light is too bright.

May be a little strange is the construction of the bottom row of buttons that made a little higher than the key line in the other. Not clear why this progression is made higher than the array of other functional and the construction is also not too much effect on the level of the entire range ergonomis button on the keyboard.

With a variety of considerations, Logitech Illuminated Keyboard this is the keyboard can be reliable, especially if you frequently work at night need comfort and adequate time to interact with the computer. For the keyboard that is sold with the price of 57 Pounds Sterling, or equivalent to Rp 1 million, the value Trusted Reviews 8 of 10.

Specifications:
Connectivity Technology: wired
Interface: USB
Key / Button Function: E-mail, Multimedia, Internet browsing
Features: Backlit, Palm rest, PerfectStroke
System Requirements: Microsoft Windows Vista / XP
Dimension: 18:03 "7:56 x" x 0:37 "
Official site: www.logitech.com

kapanlagi

Read More......

Lenovo ThinkPad W700, making the PC Overrides


Lenovo products released this feasible as the replacement for the PC. Seen from the overall performance, Lenovo ThinkPad W700 is indeed give 'experience' that is not much different when using a PC. But with the many advantages offered, there is only one barrier, which makes machines failed to become the perfect replacement for the PC.

One is clearly visible is the decision to use the media keep the hard disk with the speed of play is just 5,400 rpm. With the increasing number of laptops that start to switch to a media saved SSD (solid state drive) that have access speed faster than conventional hard disk, hard disk with a speed of 5,400 rpm to play it feels very slow. May be another problem if Lenovo install a hard disk with 7,200 rpm speed of play.

Despite the constraints of the media store, the ThinkPad W700 is indeed quite powerful. Processor that is used is the Intel Core 2 Duo T9400 2.53GHz, which works supported by DDR2 2GB of RAM. For graphics card, Lenovo mempercayakannya on NVIDIA Quadro FX 2700M, which can be reliable enough to handle jobs that require high performance VGA including games.

With 17-inch screen size, the laptop is not feasible as the engine that easily brought to any easily. However, the large size of this seemed to make it more convenient to use. The first clear screen size makes a wide eyes when I quickly tired of working in a long time. Display screen with a resolution of 1440 x 900 pixels, it looks very sharp and bright and increasingly mengokohkan value ergonomis this screen.

Excess second is the size of each key on the keyboard is big enough and have the space distance between the button far enough so easily operated and not make it down even though the performance is used for a long time. Construction buttons is also designed to create good, so I quickly tired of the finger.

Completed ports such as USB, mini-FireWire, DisplayPort, DVI, ExpressCard slot and is also available on this laptop. This is supported by features such as wireless Bluetooth and Wi-Fi, which increasingly seems to add more value from the engine, which is sold as the device is working. And seems to understand the desire of the business, Lenovo accidentally install the Windows XP operating system even though of course you can still replace them with other operating systems at any time because the ThinkPad W700 is also equipped with a DVD Writer.

In short, if you do not use the objection to the hard disk with low-speed turn, ThinkPad W700 is still quite powerful as a PC replacement facilities work. Feasible if the Good Gear Guide provides an assessment 4 + stars out of 5 stars for the products that are sold with the price of U.S. $ 2,500, or around Rp 27 million of this.

Specifications:
Processors: Intel Core 2 Duo T9400 2.53GHz
Memory: 2GB DDR2
Chipset: --
VGA: NVIDIA Quadro FX 2700M 512MB
Screen: 17 "WXGA + LCD 200NIT
Hard Disk: 250 GB 5,400 rpm
Optical Drive: DVD Writer
Port: ExpressCard, D-Sub, DVI output, Firewire, Headphones Jack, Microphone Jack, Jack Phone RJ11, RJ45, USB 2.0
Webcam: --
Wireless: Wireless 802.11n, Bluetooth
Dimensions: 410 x 310 x 49mm
Official Site: www.lenovo.com

Read More......

IronKey, USB Flash Disk With Security Features


The increase Medium popularity of USB Flash Disk store is very fast. Almost all people could be familiar with the computer must have a media store this. With the increasing number of players in this business, producers, I must find ways to make their products in the market behavior. Some offer design and resilience of the 'field weight' while not rare, which also offers security features such as the IronKey Secure Flash Drive this.

Seen from the shapes, flash disk this is not special. Flash disks are made of metal bodinya this experience with the design that normally. However, with brushed metal finishing, flash disk is indeed visible at once elegant respite. Not many ornaments except IronKey logo in the bottom of the front of this flash disk.

Physically, flash disk should also quite strong because there is a limit layer of rubber between the metal casing and a chip-in. At least, the producer mentions that the flash disk is designed waterproof and resistant tossing although it is not the features of this product.

So the mainstay of the flash disk is the ability to protect data that is in it. By default the data is entered into the flash disk will have encryption and this process can not be disabled. According to the producers, the encryption system used does not use the software but use the chip, which is equivalent to the standard encryption used by the military. Even if you enter the password, then automatically all the data will be destroyed.

Like most producers flash disk with security features, IronKey also provide important information services such as a password online through the Password Manager and Secure Backup. Another feature is the Firefox Internet browser that allows you to browse the Internet without having to leave the 'impressions' on the computer you use. Unfortunately, the default browser when using flash disk, the Internet access so little slow.

When you first use the flash disk, you will be on the menu that asks you to enter a password that you choose. Next flash disk will make a configuration that more or less takes about two minutes.

Overall, this flash disk may not be too interesting for you that is not too important security data. However, for the businessman, could be a flash disk data storage solution is a temporary safe enough. For all the features of the expense, Trusted Reviews give the value of 8 of 10 for products that are sold with the price of 51 Pounds Sterling, or approximately Rp 900,000 this.

Specifications:
Type: USB Flash Disk
Capacity: 1GB, 2GB, 4GB, or 8GB
Speed: Up to 30 MB / Seconds to Read, up to 20 MB / sec to Write
Features: Waterproof, Shockproof, Hardware Encryption
OS Compatibility: Windows XP, Vista, Windows 2000 SP4
Dimensions: 75mm x 19mm x 9mm
Site: www.ironkey.com

kapanlagi

Read More......

Save Ink and Paper Every Prints

There is one trick that can quickly cut the number of the printer that you minimize the results of the mold so that you will be 2 pages in just one sheet of paper. This is very easy to do, and can save you the cost of printing up to 50%.

The approach "2-in-1" this is how it works like this: each page will be reduced size and played 90 degrees, so that 2 pages can be quite a shop in a sheet of paper. The form will be booklets. In a program like Microsoft Word and Adobe Reader will provide this option in the Print menu. In programs that do not provide this option (like Firefox), you can speculate on the Properties menu to the type of the selected printer and view on the options page layout or page scaling.


Indeed, this is not always practical, there are cases when you need to print in full size in one full page. But in such situations only to review the structure of the document and save the printing material to be read as a reference, the page zooms This can be useful with both.

But clearly, the best way to save paper and ink is not printed at all. When it if possible to print the form of PDF files, you can save it or send it via email. There is one program CutePDF Writer (can be downloaded at http://www.pcworld.com/downloads/file/fid ,25938-order ,6-page, 1/description.html), a free printer driver that can all change your documents in PDF form.

kapanlagi

Read More......

Ecofont, Save Ink Letter


Many of the people how to reduce the use of printers that can save ink from the print quality to draft use digital media as a means of exchange of information. A company based in the Netherlands to try another approach with a way to make that case husbandly ink.

According to the author, a letter that they Ecofont is able to reduce printer ink consumption up to 15%. How it works simple. Each letter has made many holes in the midst of so much ink do not need to print documents that use different types of letters (font) this.

The company named Spranq has tried many approaches before finally reaching this design. They were trying to create a thin letter from the normal type of letters to create blank lines in the middle of the letter. However, early results from the experiment are not able to type the letter, which can save ink at a time can still be read easily.

According to a news This USA Today on Monday (22/12/08) mentioned that the font can be downloaded free from the official site Ecofont. So far Gerjon Zomer, one of the founders of this company, acknowledges that this type of letter may not be too good because it focused to save ink. Gerjon Zomer also mentioned that the font will also be made in the version of the Hebrew and Arabic letters.

kapanlagi

Read More......

Chumby, The Simple Way to Connected Internet



Basic idea of this product is content to present the internet without having to use a computer. This will be very useful for those who often access several sites on a regular basis and do not want to have to turn on the PC every time you want to visit these sites.
Indeed, the functional, this gadget can not replace the functions of a PC or laptop for browsing the Internet business. In fact, you actually need a laptop or computer to do the beginning of this gadget. But when you start including people who depend on the news that is presented in the format of the web, so it can indeed be very practical because you can turn this peranti and then you are ready to read the latest news you want.

View from the looks, in fact this gadget can not be spelled out interesting. Shaped like a television mini-wrapped with the skin. Chumby offers three color options: black, brown and white. With the size of a relatively not too large, you can put this Chumby anywhere, including at the table next to your bed. That way you can still read the news or access the sites your favorite before bed.
Behind the view that this is not interesting specifications despite the rather powerful can not be compared with the specification netbook or laptop. Chumby use this processor with a 350MHz clock performance is supported with the memory of 64MB. To connect with the internet connection to use this Chumby Wi-Fi 802.11g that supports the security protocol commonly used, including WEP, WPA and WPA2 with AES encryption using the system.

To operate the gadget this one, would not you want to have to use screen sentuhnya because there is no other input system. Actual touch screen is already equipped with the accelerometer, but because the resolution is only 320 x 240 pixels and a little problem in displaying the image are large. Another weakness of the touch screen is less responsifnya view when operated with the fingers, so you must use the stylus.
To operate it, you must register on the Chumby site and choose from the many widgets that are presented. Next you need to synchronize between Chumby with the account that you have. You can remove a widget you do not like directly from the Chumby but unfortunately you have to add to the site and add Chumby widget manually.

On the whole, this gadget is actually quite interesting, especially if you often spend the time to access the Internet to read news, socializing sites through social networking or just read the email. Although the design is not too good in some weakness in the feature screen sentuhnya, Chumby is actually quite feasible to consider. Perhaps that is why PC World also gave a more than 4 stars out of 5 stars for the total product sold with the price of U.S. $ 200, or about Rp 2,000,000 this.

Specifications:
Display: 3.5 in TFT touchscreen
Storage Capacity: 64 MB
Wired Terminals / Ports: USB 2.0
Processor: 350MHz
Connectivity: Wi-Fi 802.11g
Dimension: 83 x 140 x 108mm
Official Site: www.chumby.com

Read More......

Tuesday, December 23, 2008

Secure off the 'Password' from 'Power-Saving'


Windows password protection on the manifold. There will appear when booting, and have also appeared at the exit from the Stand By mode and Hibernate. Can not use the password?

There is one good reason why the password protection for the power saving mode, that is because when we leave the table, we will be vulnerable computers used by others. Modes. But if you feel safe with the environment where you use a computer, you may think will be removed to speed up the process.

How to make it very simple. The way this works for Standby mode XP, Vista Sleep mode, Hibernation mode and a second version of Windows. Here's how:
- Windows XP
Right-click on the desktop and select Properties. Click the Screen Saver tab, then click the Advanced tab and Power. Uncheck the future any posts "Uncheck Prompt for password when computer resumes from standby", and then click OK.
- Vista
Click Start, type Power Options, and press ENTER. Click "Change plan settings for your selected plan," then click "Change advanced power settings." In the dialog box that appears click on "Change settings that are currently unavailable" and then to User Account Control. Finally, go to the option Require a password on wakeup and select No. Then click OK.

Read More......

Friday, December 19, 2008

Acer Launches e-Machines in Yogyakarta


Acer Group of Indonesia to develop successful e-Machines for users in Yogyakarta.

This product is the result of Acer Inc. merged with Packard Bell and Gateway. According to Helmy Anam, Head of the Marketing Communications Department's Acer Group, the success of this merger at the same time strengthen Acer to implement the multibrand strategy that consists of four brand, namely Acer, Packard Bell, Gateway and e-Machines.

Everything is based on unique users, but still maintain the characteristics and the character of each brand, said Helmy told reporters before the launch of eMachines in the Hotel Melia Purosani of Yogyakarta on Wednesday (17/12/2008).

Helmy added availability of e-Machines in Indonesia will be able to expand the PC penetration, especially for beginning computer users, Small Office Home Office (SOHO), and among students or students.

"This is certainly the future will be the solution for the region in order to access technology with affordable, reliable and comfortable," he said.

He said that currently, the Acer has Servive Customer Center in four cities, namely Jakarta, Surabaya, Yogyakarta and Medan.

While specific to the e-Machines, which began available since November 2008 and, Helmy said, will be available with a series of laptop eMD720-320516Mi.

The opportunity was also Helmy offensive that Acer currently has also taken over HP's position as the No. 1 PC brand in Indonesia with 16.6 percent market share, while HP's subsequent 14.0 percent, as data from the IDC PC Tracker for Q4 2007.

"The third quarter 2008 we reached the second position in the global PC to a mobile or as much difference between 300 thousand units of Hewlett Packard's PC sales," he said.

With the presence of e-Machines in Yogyakarta is believed to have opened the market potential that can strengthen Acer's position in Indonesia.

Read More......

Japan asks Google Close Google Street View


A number of lawyers and professors in Japan ask the Internet giant Google to turn Google Street View, because the votes violated someone's privacy.

Google Street View is a feature of Google Maps introduced since 2007 and provides 360 degree views of streets and allow users to see the city of their choice and the surrounding metropolitan area on the primary level.

Currently, the Google Street view is able to display the 12 views of the city streets in Japan, 50 cities in the United States, and several other cities in Europe.

"We strongly believe that what Google clearly violate the basic rights that are owned by someone else," said constitutional law professor at Sophia University, Tokyo, Yasuhiko Tajima, such as the BBC This Friday (19/12/2008).

According to Yasuhiko Tajima, which is also the chairman of the Campaign Against Surveillance Society demanded Google to stop the service and remove all the images recorded from the Google Street View.

Protests related to the termination of the appreciation in the Japanese media after a number of Japanese citizens find the picture house in Street View. While in the United States, stronger protests after a woman is seen sunbathing in the house.

Meanwhile, Google's representative in Japan can not yet issued a statement regarding the demands termination of the service.

Read More......

Ten Firefox extensions to keep your browsing private and secure

Most people lock their doors and windows, use a paper shredder to protect themselves from identity theft, and install antivirus software on their computers. Yet they routinely surf the Internet without giving a second thought to whether their browser is secure and their personal information safe. Unfortunately, it's easy for someone with nefarious intentions to use a Web site to glean data from -- or introduce spyware to -- your computer. Even worse, sometimes all you have to do is randomly click on a site to have your data probed in a most unwelcome way.

Mozilla Firefox has several security settings you can adjust via the Preferences pane, but there are also more than 150 privacy and security extensions you can add as well. They are easy to install and take little time to set up; some even work automatically after you restart your browser. Let's have a look at some of the most popular and most useful.

One of the best ways to protect your computer is to prevent the browser from using JavaScript at Web sites without permission. JavaScript, though useful for developing glitzy Web sites, has gained something of a reputation as a method for doing Bad Things to unsuspecting computers. NoScript is an extension that makes every site that uses JavaScript ask your permission before running it. NoScript can render JavaScript-heavy sites unreadable, but it provides a whitelist of acceptable sites that you can easily add to in order to speed up your surfing experience.

Many people use Tor to hide their online surfing habits. FoxTor provides a way to mask and unmask your browser on the fly, without having to commit to anonymous surfing throughout an entire browsing session. It requires the use of Tor and Privoxy.

Your browser's history logs help provide a speedier surfing experience for you. Unfortunately, skilled hackers can peek at them remotely to see where you've been. Deleting log information after each browsing session would slow you down, but fortunately, there's another way. Don't delete your data -- hide it with SafeHistory.

Some of the most sensitive information sent over the Internet travels via email, so many people prefer to send their messages encrypted. The Gmail S/MIME extension encrypts Gmail messages, including attachments, automatically, as long as you have the recipient's digital certificate.

While Firefox 2 has built-in phishing protection, it never hurts to have a backup plan. The premise behind Petname is simple: leave reminder notes on your trusted Web sites and the notes will automatically appear each time you return. If you surf to what you assume is one of your whitelisted sites and no reminder note appears, you'll know something's not right. This extension is particularly useful if you're running an older version of Firefox without anti-phishing protection.

SecurePasswordGenerator is a long name for a little extension that sits in your toolbar and helps you create unique passwords. Half the battle of staying safe online is using complex and different passwords whenever you register at a Web site. Use this tool to help you create a unique password everywhere you go.

Have you ever wondered where the information you type into an online form goes once you hit "send"? With FormFox, you can find out. Once you download and enable this extension, hovering your mouse over the data field of a form or search box will reveal exactly who receives the information you enter. Use this extension to check out an unfamiliar Web site before you cough up your name, address, and credit card information while doing your online holiday shopping.

Many people use disposable or temporary email addresses around the Internet to avoid email spam. Although spam is generally considered more of a nusiance than a security issue, there are occasions when a disposable address may be a safer option than providing a real one (on message forums, for example). There are several temporary email services to choose from; the TrashMail.net Firefox extension makes that service an attractive choice.

Sometimes you need to protect your information from the prying eyes of people around you. If you're surfing at an airport or local coffee shop, people wandering past can have a look at the titles of the tabs you have open. Page Title Eraser lets you either blank out the title and icon in your browser's tabs, or replace the text with something of your choice.

When trying to protect your privacy, the last thing you want is for a Web site to collect data on what you do while you visit: where you click, how long you view a page, and so on. That's called profiling. While it's harmless if a site tracks data on how long it took you to read an article on how to install a video game, most people feel that there's no reason a Web site needs to know anything about your surfing habits, even if it's only to collect data for marketing purposes.

Most extensions and tools commonly used to prevent data profiling by search engines work by concealing information from outsiders. TrackMeNot takes the opposite approach and actually sends out a bunch of information for the search engines to process. Of course, it sends mostly false information, which means your search activities remain hidden from view and search engines won't glean any meaningful data from your visit.

These are only a few of several dozen privacy and security extensions available for Firefox; you can find a larger list at Mozilla's Web site. Tools like these can make your surfing experience safer, but remember: nothing is foolproof, and talented hackers can still find ways to pull information from your system if they try hard enough. Always be careful.

Lisa Hoover

Read More......

Sunday, December 14, 2008

Awesome, computer can predcted people age

WASHINGTON - The technology developed to enhance human intelligence computer company was far from what people have thought this. A tentative lllinois the University, the United States, has successfully developed a machine that can detect the age of the users.

The computer experts at the University lllinois some time ago has created a software on the computer which can identify the face of computer users quickly, and tell how the age of the user.

"Calculating age is very difficult. If you use the face as the benchmark age, so our software can mengatakanya appropriately," said Thomas Huang Chairman of this experiment.

Huang explained that the software results kembangannya team is made with the way they train the computer algorithm in 1600 to see the faces of people from five different images provided, and the total picture that is shown as 8,000 units.

To measure the age of a person, they have mensettingnya from age 1 to 93 years. Once the software is installed in the computer, they will identify the face of someone who desired. Once they find a database of thousands of faces that have been recorded, after mencocokan, the computer will notify the presentation of age most.

Computers can guess that this age, according to the developers is very suitable with the women. Usually, the women who have aged will completely do that makeup can look younger. Now, the computer will be examined and the extent to which mencocokan make up to make the young woman was visible.

"Women often do make up to see the young. Computers we will mencocokan the extent to which young women see it," added Huang, as This Big News Network, on Thursday (30/10/2008).

This software is claimed by the pengembangnya able to tell the age of someone with high accuracy up to 80 percent. Huang said softwarenya is very helpful for women in determining the make-up the right to make them see the young.

Read More......

Tuesday, December 9, 2008

Awesome!! Computer can predicted people age

WASHINGTON - The technology developed to enhance human intelligence computer company was far from what people have thought this. A tentative lllinois the University, the United States, has successfully developed a machine that can detect the age of the users.

The computer experts at the University lllinois some time ago has created a software on the computer which can identify the face of computer users quickly, and tell how the age of the user.

"Calculating age is very difficult. If you use the face as the benchmark age, so our software can mengatakanya appropriately," said Thomas Huang Chairman of this experiment.

Huang explained that the software results kembangannya team is made with the way they train the computer algorithm in 1600 to see the faces of people from five different images provided, and the total picture that is shown as 8,000 units.

To measure the age of a person, they have mensettingnya from age 1 to 93 years. Once the software is installed in the computer, they will identify the face of someone who desired. Once they find a database of thousands of faces that have been recorded, after mencocokan, the computer will notify the presentation of age most.

Computers can guess that this age, according to the developers is very suitable with the women. Usually, the women who have aged will completely do that makeup can look younger. Now, the computer will be examined and the extent to which mencocokan make up to make the young woman was visible.

"Women often do make up to see the young. Computers we will mencocokan the extent to which young women see it," added Huang, as This Big News Network, on Thursday (30/10/2008).

This software is claimed by the pengembangnya able to tell the age of someone with high accuracy up to 80 percent. Huang said softwarenya is very helpful for women in determining the make-up the right to make them see the young.

Read More......
 
Template design by Amanda @ Blogger Buster