Tuesday, February 28, 2006

New iPod HiFi

The Apple store has a hi-fidelity speaker system for your iPod. It also comes with a docking bay for recharging. Check it out.

HiFi_486x60

Motherboard Functions

Computers are a part of everyday life. We use them at home, in school and in the office. We rely on them in many ways. Some of us even have some endearing feelings towards them, but do we know what the driving force behind our precious little desktop or laptop is? It is aptly named the Motherboard and it is in control of all of your computer functions.

The Motherboard is the most important part on your computer. If you are going to be computer savvy, you need to know a great deal about it. It is a large circuit that holds the CPU, memory board and peripheral cards. By itself the Motherboard is basically useless but it’s true, no computer can function without one. The Motherboard is the meeting place for everything that you have plugged into your computer.

The Motherboard is responsible for storage. The two most common type of storage are ATA/100 and ATA/133. One performs about as well as the other so you don’t need to spend too much time investigating them.

Your Motherboard is where all PCI slots are located. The more you have, the more gadgets you can plug into your PC. If you buy a peripheral card to improve sound or graphics, it will be plugged into a PCI slot. Most Motherboards have 4 or 5 PCI slots. AGP slots are essential and ISA or CNR slots may also be included, if necessary.



For the most part, sound and graphics are a given these days. Almost all Motherboards support both. But if you have a dinosaur, it may not. If you are a big gamer you will want a Motherboard with an AGP slot.

The Central Processing Unit determines the speed and ability of your PC. There are three basic classes that range from older, slower noncomplex models, to newer, faster complex ones that perform a number of high tech operations. Price and age tend to determine how much juice your CPU has.

Hard drives are controlled by the Motherboard. This is where you store data that operates your system. Hard drives hold and organize bits of information using magnetic storage techniques.

Any additional external plug-ins that you use in conjunction with your computer will have to be approved by your Motherboard. If you go out and buy a graphics card, it will have to be connected through one of the PCI slots in the Motherboard. If you want to upgrade, you will basically need to get permission from your Motherboard.

RAM is stored in the Motherboard. Most systems use DDR SDRAM but some higher class computers use Rambus memory. Memory comes in different speeds and the higher, the better. If you are going to upgrade the memory on your computer you will have to turn to the Motherboard. It is important to find out how much RAM a Motherboard can handle before you purchase a PC. If you purchase more memory, you must make sure that it is compatible with your system.

The form factor of the Motherboard, case, and power supply usually match one another. There are several types of form factors. The most common type used today is ATX. This integrates all of the connectors in the Motherboard.

Motherboards can have a number of PCI slots, ports and interfaces. Most will have four or five. The more PCI slots the better because you can connect more gadgets. And more gadgets allow you to use more applications.

The Chipset inside of the Motherboard serves as a sort of brain. The Chipset controls what hardware your computer can support. It carries information from the hard drive to memory to the CPU. You will want to know what type of CPU, rate of the IDE controller and if sound and video are included for future reference. Most of us get new toys from time to time. If you know these important facts about your chipset you can make sure they are compatible with new items.

It is good to know your Motherboard well. In the future, when you want to make changes to your computer, or purchase a new one, your Motherboard will be a big determining factor. You will want to know as much as possible about the Motherboard of any computer you buy, already own or build.

Monday, February 27, 2006

Web Cams – Big Brother Could Be Watching

So you get a web cam to enhance your internet experience. You hope it will allow you to more interactively communicate with family, friends, or acquaintances. The web cam sits on your desk, activated only when you use your video email or IM program, and otherwise you give it very little thought. Well, the problem is, maybe you should give it thought. Your web cam could be watching you.

Computer companies are becoming more and more concerned over viruses that have the ability to use web cams and microphones that are attached to the infected machines in order to spy on the users. These viruses can be used at home, work, or even in schools. There are an increasing number of hackers who are interested in spying on the victims of their viruses. These viruses, and the subsequent spying, open up companies to industrial espionage and homes to cyber peeping toms. These people are doing the equivalent of looking right in through your window or even sitting in your closet as you go about your daily routines. What’s more, your company could be exposed to all sorts of espionage and sabotage. Your meetings can be recorded, your moves and discussions can be seen, and all of it can happen without you or your co-workers’ knowledge. Privacy reaches everywhere, and these viruses can do the same, which essentially takes away privacy all together.

If your computer is infected with one of these viruses, your privacy is essentially gone. If your web cam is plugged into the infected computer, then everything you do, every move you make in front of that web cam can be seen, everything you say can be recorded, and the information is out of your control once the hacker has it. Imagine your family squabbles, your meeting about the company’s newest invention, or simply the audio from a conversation you had in private being posted and broadcast on the internet? It could happen with these new viruses.

Such a worm with backdoor Trojan functionality spreads over your computer network a number of ways. The most prevalent, though, is via weak passwords and the exploitation of several windows vulnerabilities. The greatest espionage use of the virus is in stealing passwords and product keys from a number of games and applications as confidential information. Most of these viruses also leave machines and PCs vulnerable to remote control. The only good news is that these viruses are still fairly rare, though novel and growing in popularity.

These viruses are not completely new. There have been a number of web cam Trojan viruses in the past. However, the web cam exploitation is becoming a growing problem. With the increase in connectivity of and popularity of web cams, the viruses will begin to happen more and more regularly. Though there are a number of machines out there that regularly are infected, the real weak link is humans. Many mistakenly link to bad sites or run programs that they shouldn’t, and they do it way too often.

The virus makes use of traditional mal ware methods of exposing security to make it vulnerable. The worm will not only take control of the web cams and microphones, but will send the images and files back to the hackers for storage. In addition, the mal ware writer will have access to information on the machine’s hard drive, steal passwords, and even initiate the denial-of-service attacks. There have already been a few hundred versions of the virus.

One way to figure out that your computer has been infected is by looking at your web cam. If you have the feature of an “activity light,” it should not be lit during times you are not using it. If the light is on, the cam is active. There are a lot of web cams, however, that do not have this feature. In the case of those, there is really only one thing you can do to protect your privacy, aside from good anti-virus software. You should unplug and put away your web cam and microphone when you are not using them. Only by keeping them disconnected can you definitely keep these increasingly smart hackers out of your home or business.

Web cams can be fun and enjoyable. As you can see, they can also be a tool for incredibly intrusive privacy breaches. It is important that you know what is out there and protect yourself from these dangerous viruses.

Sunday, February 26, 2006

The WiFi Route

WiFi is short for “wireless fidelity” and is a wireless local area network that uses high frequency radio signals to transmit and receive data over distances of a few hundred feet. The WiFi route uses an Ethernet protocol, which is different than using a wired Internet system. The WiFi system is a good alternative to wired LAN systems. Many buildings, airports, hotels and public places now offer WiFi networks so people can have portable access to the Internet. These locations are often called hotspots.

WiFi, also called 802.11 networking or wireless networking, is a good way to handle wireless network. The biggest advantage of using WiFi is it is a simple and portable way to connect to the Internet. Several computers in one location can be connected together without using cables or wires. This is a big advantage to businesses that need several computers to access the web. Computers that connect using a WiFi system will connect to the network utilizing radio tower signals. Computers can still connect to each other via WiFi and still be up to 100 feet apart.

There are some disadvantages of using a WiFi connection. Just as in any radio transmission, a wireless network has the potential for radio interference. This maybe caused by bad weather or interference from other wireless devices. Obstructions, such as walls or buildings, can also cause interference with a WiFi connection. Many users though, feel that the advantages far outweigh the disadvantages.

WiFi connections that work with 802.11b and 802.11g transmissions can transmit waves at 2.4 GHz. The higher frequency allows the higher data rate. A WiFi connection can transmit data up to 100 times faster than a traditional dial-up connection. In addition, a WiFi connection can change frequencies when necessary. The connection is designed to hop the radio bandwidth and is resistant to interference.

Connecting a computer to WiFi is relatively simple. Most new laptops come equipped with a WiFi card built in. Older laptops can also be compatible with WiFi with an added card. To add a WiFi card to a laptop, purchase a PCMCIA card or buy an external adapter and plug it in the USB port. The card and driver are then installed on the computer. After installing, it is necessary to find a hotspot to access the Internet and email services. Most new computers will automatically connect to the hotspot and a connection will be established.

A hotspot will be the connection point for WiFi access. It is a small box that is hardwired into the Internet. It transmits radio waves that are compatible with the WiFi network. Many public places have WiFi hotspots. These can often be found in restaurants, hotels, libraries and airports.

Hotspots can also be created at home. These hotspots in the home can be established by purchasing a Wireless Access Point Router. The Wireless Access Point Router is a box that contains a connection port, a router, an Ethernet hub, a firewall and a wireless access point. Once this is turned on, the hotspot will have coverage of around 100 feet in all directions. Most homes can get adequate coverage throughout the house. Signal boosters can also be purchased to increase the hotspot range. When looking to purchase a WiFi system for the home, the 802.11b is usually less expensive, but it of the lowest quality. The 802.11g cost more, but is fast and works better in most homes.



It is important to remember that WiFi connections can either be open or secure. When a hotspot is open and security is an issue such as when using the network on a regular basis at home, it is necessary to use a WEP or Wired Equivalent Privacy, key to connect. This is a type of encryption system. When using a WEP key, the user will need to enter the code before gaining access to the WiFi network. Using a WEP key ensures that all of the data is protected at the same level as wired networks.

If the computer in use has access to a broadband or dial-up connection there is no additional cost for WiFi access, but does need an attached access point. This is a low cost device used to provide wireless access to media adaptors and laptop computers. Access point devices can cost anywhere from $20 to $300.

Saturday, February 25, 2006

Five Essentials for your Laptop

Everyone, it seems, has a laptop today, and if you don’t have one, you probably are thinking of buying one. As if it were not difficult enough to select from the numerous types and brands of laptops out there, then you are confronted with the accessories. Of the thousands of accessories out there, it can be daunting to figure out what you really need for your laptop. Obviously, it depends upon your needs and plans with your computer, but there are five essentials you might start with first.

If you are going to use your laptop at home with any kind of frequency, you will want to think about getting an external keyboard and pointing device (mouse). Why? Well if you have ever tried typing on a laptop for any more than an hour, you know that your neck, shoulders, and wrists can start to feel fatigued, to say the least. The solution is to purchase an external keyboard, which you can likely just plug into the back of your laptop, as well as a mouse. Then, for use in the office, raise the screen up with books or risers of some sort to make looking at the screen a little more ergonomic. You can even buy accessory swivel stands for your lap top.

Second, you will likely want to connect other things to your laptop when home, like a printer, perhaps a DVD player, or even a CD burner. This can add up to a lot of wires, and thus a lot of clutter to hook in and unplug when you want to take your laptop out of the office or settle back in. To prevent this problem, you are going to love having a docking station.

A docking station basically turns your laptop into a desktop computer when you are home. When you are ready to take it away, you simply take it out of the station and off you go.

Another option along the same lines is a port replicator, which contains computer ports. You connect your peripherals to the replicator and then to your laptop. When you want to take your laptop away, you simply unhook the one port replicator, rather than each individual device.

The third essential for your laptop isn’t as exciting as some other accessories, but you will be glad you have it, an external hard drive. It’s not fun, it’s not exciting, but the morning you wake up and your laptop won’t turn on will be the day you are thrilled you decided to get that external hard drive.

A tip to go along with your new external hard drive: always pack it separate when you go on a trip. If you lose your bag with both the backup drive and the laptop in it, you’re toast.

A fourth essential will allow you to hook up everything you need. Make sure you go out and get an external USB hub. You see, most desktop computers come with several, as many as 8 or 9, USB ports. However, since laptops are smaller, they often only have a couple of USB ports. The hub will usually include four or more ports and will connect through one of your laptop’s USB ports, making them very easy to use.

Fifth, think about worst case scenarios. You probably got your laptop so you could do work out of the office, out of your home, or wherever you need to, right? Well, since you will be out and about, you will definitely want to think about insurance for your laptop. The manufacturer’s warranty usually won’t cover anything beyond parts, and an extended warranty will not cover theft, even though it may cover you for breakage or fire.

There are a thousand different accessories out there for your computer. Some of them you might need others you might not. It all depends on what you plan to do with your laptop as well as where you plan on doing it. However, these five things are essential to making your laptop as functional to you as possible. While there may be some variation to what you need, most of these items will be useful to anyone who owns a laptop, no matter what the primary or secondary uses of this portable computer might

Three Reasons to Choose LCD over CRT

When choosing a new computer monitor, there are many choices and options available on the market. Consider whether or not you are looking for sharp graphics, bright colors and sleek designs. Perhaps you need a larger monitor for videos or games. Or, perhaps, you just need a basic monitor for basic computer functions. There are two types of monitors to choose from, LCD and CRT. Here are some reasons why LCD monitors are the top choice for computer buyers.

CRT (cathode-ray tubes) is a basic, inexpensive computer screen. While they are inexpensive, they are often bulky and take up a lot of room on a computer desk. Flat screen CRT monitors are also available, but they often create a glare, making sitting at the computer hard on the eyes.

LCD (liquid crystal display) is the newest trend in computer monitors. They are often more expensive but offer many advantages over traditional CRT screens. They also offer sleek, space saving designs and as an added benefit, are good for the user.

Space: LCD screens take up considerably less space than CRT monitors. This is a perfect option for those who are short on space. Most computer users do not have unlimited amounts of space to store their computer equipment. With the LCD screen, it can be moved closer to a wall to increase desk space. Some LCD screens can even be mounted on the wall. It is possible to get a larger screen, and still take up less space than a CRT.

The actual viewing size of an LCD is much bigger than that of a traditional CRT. A 12-inch LCD screen has only a slight smaller viewing area than a typical 14-inch CRT screen. When purchasing a new LCD screen, remember that the advertised size is the actual viewing area of the screen. This is not always so with a CRT monitor.

Better for health: LCD screens are healthier to use, too. CRT screens direct radiation equal to three electron beams constantly towards the user. Those beams are refreshed every 60-80 seconds. Many people even buy special radiation shields for their CRT screens. Also, the constant refreshing of the screen causes strain on the eyes. Not so with the LCD monitor. LCD monitors use pixels that alternate between on and off. This reduces the strain and fatigue on the eyes. Also, CRT screens are heavy and bulky. The LCD screen weighs about 20 pounds less than a CRT helping to save on muscle strain.

Quality: LCD screens have the best image quality of any computer monitor on the market. It has sharp, crisp pictures and has excellent contrast. While a CRT monitor works more like a television, the LCD screens has the technology found in digital watches with a fine mesh of tiny crystals displaying the colors. This makes a higher quality picture on the screen.

The color quality of the LCD far outperforms a CRT screen. Many of the newer LCD screens have unlimited color capabilities, while a CRT screen has limited colors. The resolution on the LCD is also better than a CRT. With an LCD monitor, the resolution is generally the highest resolution possible. With that, the display appears much more in focus and sharp. A CRT screen has a limited amount of video resolution.

LCD screens are way ahead of traditional CRT monitors when space and quality is an issue. The health benefits of the LCD make it an appealing choice as well. As far as price goes, the LCD usually does cost more than the traditional CRT screen. However, a CRT screen will use more energy in the long run. The LCD is more energy efficient making it a wise choice for those looking to save on energy costs. The prices of LCD screens have gone down in the last couple of years. The cost of energy could add up for businesses or people who have multiple computers.

In addition LCD monitors are now sold with a wide variety of extras such as built in speakers, or jack outlets for headphones or microphones. Others might have multiple input connections so more than one computer can be hooked together. Accessories such as anti-glare filters and stands can also be purchased with LCD screens

Wednesday, February 22, 2006

Sound Cards – Top Three Things to Look for

If you remember the days of Atari and “Pong,” you probably also remember the personal computer’s first sound: beep. Yes, you are correct, in the early stages of computing, computers were only able to utter a beep. This sound was used as a warning to the user that something might be amiss. Later on, technicians were able to toy with the length and frequency of the beep, thus creating a bit more variety to the listener.

Fast forwarding to today, special sound cards now enable computers to play 3-D audio, which is extensively used for games, as well as surround sound playback for actual DVDs. Some sound cards even enable computer users to record the sounds around them and create almost professional audio recordings!

Sounds cards’ most basic function is the translation of analog sound waves into digital computer data that may be manipulated in any number of ways. While this sounds fairly straight forward, it is imperative to remember that not all sound cards are created equal, and depending on the extensiveness of your need for this little device, there are some things to consider. Let us take a quick look at the top three things to consider when considering which sound card to use:

Consider the sound card’s bit-rate. No matter what use you will have for your sound card; the bit-rate will affect your enjoyment of the sound. Usually, these cards rate anywhere from eight to 16 bit; however, the most advanced technology now supports 24-bit sound quality. While the numbers appear close, this is the time to remember that the bit-rate is directly related to the clarity and “detail” you will be able to discern when listening to the sounds. Akin to the way resolution of a picture is measured in pixels (and the more pixels the higher the resolution, the crisper the picture), clarity of sound may be expressed via the bit-rate.

Consider the sound card’s connections. At the basic level, sound cards will permit for the connection of a microphone and of speakers. Yet those users, who need additional connectivity for recreational or even professional use, have caused the development of a whole host of additional input and output connections. For example, depending on the card, some now offer connections for multiple speakers to support 3-D and also surround sound. Other connections allow for the connection of synthesizers and other electronic instruments to the computers’ sound cards. The specific form of connector is referred to as musical instrument digital interface (MIDI). USB connections also allow for the hook up of digital audio and video recorders to the sound cards.

Last but not least, consider compatibility with the software you use. The sound card is designed to give the audio portion of your data its due, but if your sound card will not support your software, you will be frustrated at best. For example, if you are a serious computer gamer, you are familiar with DirectX software. This software is a standard for Windows based games, and as such it is updated frequently by Microsoft. Purchase of an older model sound card may not support the latest software update, and thus be useless. For those who are strict music lovers and notice the lack of tuning the second violin in the orchestra has received, there are some other ratings that will be of interest to you. First there is the signal to noise ratio (S2N) which may be measured in DB’s. The lower the signal to noise ratio, the lower the sound quality will be. At the lowest end of the spectrum you may hear humming or whistling in addition to the sound. Secondly, you may wish to evaluate the total harmonic distortion (THD) offered. The higher the THD, the worse the sound quality is expected to be.

Obviously, computers have come a long ways from the original “beep” many of you will remember. With this loss of simplicity, we now find ourselves at a point where it is up to the users to define just how much of this technology they will need, which aspects are the most crucial in compatibility, and how the technology needs to be configured to best benefit the individual user.

Tuesday, February 21, 2006

Apple Revs Up Special Offers

There are a bunch of new specials Apple is currently running.

First off, the iPods are coming down in price and with more variations. They now are starting at $69. Great deals right now.

iPod Shuffle

If you'd like to get your hands on a new Apple with the dual core processor, Apple is offering a great financing deal. Check it out.

iMac

Get the new iMac with a 17-inch monitor and 1.83 GHz Intel Core Duo for as low as $31 A MONTH with Free shipping!

Saturday, February 18, 2006

Five Top PC Hardware Accessories to Boost your Performance

Admit it; your home computer isn’t just about work, paying bills, and emailing out resumes, is it? You sneak off from time to time to play the newest computer games, and that is certainly okay. So you probably also know that sometimes you just need certain accessories to fully enjoy the gaming experience. That is especially true with games like flight simulators that are a lot more enjoyable if you have joystick or sports games that are easier with a game pad. In that spirit, here are five hardware accessories that will boost your performance.

First of all, you are probably going to want a joystick. If you are going to do it, though, you might as well go all out and not cheat yourself. Some of the best have as many as 8 programmable buttons on them, and usually include gaming extensions software to allow you to program the joystick to whatever game you are playing at any given time. Look for something that allows you to adjust head tilt, palm rest, and all of the other movable parts for your comfort. Look for something that hooks up easy, like via USB and that can be used on whatever type of computer you have.

Second, make sure you have a good mouse. A good wireless optical mouse is best for your gaming needs. An optical mouse determines motion by imaging the surface it is gliding on over and over again. It then compares the successive frames to determine motion. This will give you a much quicker advantage over competitors when playing games on the internet. Try to find something that connects via USB. The one thing to be aware of with optical wireless mice, though, is that they run on batteries that tend to die fast. So, think about rechargeable batteries with your mouse.

Third, you will need a game pad, especially if you play console games. Many are set up just like the ones for home game systems. Find one with a comfortable grip, so if you have a long gaming session you won’t find yourself with tired hands. Most will be easy to install and will connect through your USB connection. Try several out in the stores to make sure it is one with which you will be comfortable and will be able to use effectively.

The fourth must have hardware accessory for your gaming needs is a 3-piece computer speaker set. You don’t need the fanciest set in the world, but a set of two speakers and sub woofer will have excellent quality for you. Look for a set where you will simply need to set the speakers up on your computer desk, put the subwoofer under the desk, and start gaming. Good speakers like this will enhance your gaming experience by bringing the sounds and effects of the game right to you. Along with your speakers you may consider headphones. Headphones will let you escape to another world and allow you to play late at night without waking up the entire household. Find some that fit you comfortably and that will not distort sound if turned to a moderate volume and you will find your gaming experience enhanced and perhaps improved.

Fifth, every gamer worth his salt knows that the best way to fully enjoy gaming is with lots and lots of random access memory (RAM). If you enjoy graphic intense games (and who doesn’t?) then you know that they are resource hogs. The more RAM you have the better your games will be. In fact, if you notice some of the games you are playing now seem to be slowing down, RAM will very likely help. Most of the time, RAM can be increased via a simple hardware piece you plug into your motherboard. However, consult your computer manual to find out the best way to increase RAM in your particular PC.

Gaming can be a lot of fun on your PC. You have access to the internet and unlimited opponents and teammates, plus it’s a good way to get away without actually going anywhere. Healthy competition and just good old fashioned fun, but to really enjoy it you may want to consider some hardware purchases or upgrades. By making these few adjustments you can enhance your gaming experience and perhaps improve your performance.

Thursday, February 16, 2006

How To Know If You Need Computer Memory

By: Michael Russell

Having a computer means you have to update it, but if you update
anything, it should be the memory. Memory is the cheapest
component to buy, and it is the easiest to install. Here are
some ways to know if you need more memory.

When you have more than 5 windows running programs and then you
notice that your computer slows down or the machine crashes,
more memory can help you.

If you have your computer running for about 10 hours and then
you get a message in the task bar that says Windows memory is
low, then you must get more memory.

If you use more then one browser window when surfing the web or
tab browse using Firefox and you notice a slow down, you need
more memory.

Another common way to tell that you need more memory is that
when you are running a Window XP game, the game slows down, and
then speeds up again, then slows and freezes. Most games will
tell you on the side of the box what the minimum amount of
memory required is to run the game without any problems. It's
best to get more than the minimum.

If you're still running Window 98 or any other kind of Windows
and want to upgrade to Windows XP, you must have a certain
amount of memory for the computer to run correctly. To find out
how much memory is needed for Windows XP call your computer
store, or run a search on Microsoft's website and it will tell
you the exact amount you will need.

If you do not know how much memory you currently have in your
computer right now, go Pcpitstop.com and run a scan on your
computer, this site will tell you how much memory you currently
have and will give you ratings. A red flag, means that you have
a problem that must to taken care of soon as possible. A yellow
flag means that you have a problem, but you do not have to worry
about it too much and a chequered flag means that it's in great
condition. This site will give you other information about your
computer, not just about the memory.

If you want to buy more memory, just go to any computer store
and tell them the make and model of your computer and tell them
how much memory you want. If you used Pcpitstop.com and had a
yellow or red flag for memory, get the amount of memory that the
site recommended. Some stores will install the memory for you
for a fee, but you can install it yourself, because it is easy -
just read your computer's instructions.

If you want you can go to Google and search on "memory" or try
Ebay to get memory for a good price. All you have to do is type
in what sort of memory you would like and decide if you want new
or used memory.

Memory can help speed up your computer and make it work better,
so consider buying some more for your computer.

About the author:
Michael Russell

Your Independent guide to Computer Memory

Wednesday, February 15, 2006

Spyware Removal

By: Matt Garrett

You may have purchased a state-of-the-art computer, yet it is
running so slowly that you have to pick up something to read
while you wait for it to connect to the internet. You might need
spyware removal for your PC, which is probably being tampered
with by an outside source. Other problems, such as frequent
error messages and security threats are caused by spyware, and
spyware removal is essential to prevent the following:

* data mining * aggressive advertising * Trojan horses * Browser
hijackers * Tracking components * mouse monitors

and similar intrusions. As more unscrupulous web savvy hackers
are creating new ways to get access to your valuable personal
information, Spyware removal is fast becoming an essential
program for every PC.

When you search the web, you not only find information, but you
also leave a lot of data behind. Your computer can leave
"footprints" of information as you surf, and can bring spyware
back with it, like tracking sand into a home. Spyware removal
can detect these parasitic devices placed on your PC that
monitors your browsing habits so you can later get spammed by
aggressive advertisers. Spyware also retrives sensitive
information, such as your credit card number. Increasing
security problems, theft and fraud are causing companies to do
more research and to update their spyware removal capabilities.

When choosing a spyware removal program, it is highly suggested
to opt for a brand that is well known and has been on the market
for some time. Some supposed spyware removal programs have
proven to be false, and like the spyware they are supposed to be
removing, they scan your disks in order to find sensitive
information that can be used or sold. It is for this reason that
some suggest using spyware removal that does not scan your
disks. Other experts might object that a spyware removal program
that does not scan your disk can not be guaranteed to remove all
of your spyware, whereas others tout certain programs that are
able to give maximum protection without scanning your computer
disks.

In addition to scanning your disks, many spyware removal
programs also search your removable drives and your memory for
traces of malware and spyware. Spyware removal works using Code
Sequence Identification (CSI) technology and has an extensive
spyware removal support system. Once your PC has been scanned,
your spyware removal program logs the results of the scan
showing which places contain spyware or other problems. It also
removes any behavior tracking devices and prevents others from
stealing your bandwith. Most spyware removal programs can also
prevent keyloggers which take password and credit card
information.

In addition to installing spyware removal on your regular PC,
you can also find spyware removal programs suited for the
corporate environment. These programs work with multiple
computers in a network, and work much like spyware removal for a
PC, but on a larger scale. For most businesses, it is worthwhile
to invest in the best spyware removal you can obtain, since, for
commercial reasons, you are likely to be dealing with sensitive
information for all of your customers. Don't let spyware point
the finger at your company when your customer's credit card
number is stolen.

Many spyware removal programs can be obtained as free downloads
for a limited period of time. These programs will do an initial
scan at no cost and will continue to protect your PC if you
purchase the spyware removal program. You can purchase sypware
removal that can build an instant defense if there is some
material that it cannot yet recognize. It is also a good idea to
get spyware removal that does not eliminate anything without
asking your permission first. For extra security, some spyware
removal programs do not access any of your private information
on your hard drive and do not connect to the net. If you trust
your spyware company, you need not be afraid of a scan, but
ensure that the company is a legitimate one before purchasing
their spyware.

About the author:
Matt Garrett http://www.ghost-surf.comwww.Internet-Priva
cy-Systems.com

Tuesday, February 14, 2006

Remove Blackworm Virus

By: Edward

Blackworm is a nasty internet worm which can delete DOC, XLS,
MDE, MDB, PPT, PPS, RAR, PDF, PSD, DMP, and ZIP files. In
addition to Blackworm, the worm has been named Kama Sutra,
Blackmal, MyWife and Nyxem. This worm started on the 3rd of
February and has been programmed to attack an infected computer
on the 3rd of every month thereafter. So far it has been
estimated that over 300,000 computers all over the world have
been infected. Besides destroying those types of files, the worm
also tries to disable anti-virus software so that it stops
updating. It can also disable the keyboard and mouse of infected
computers. Some Internet users have already lost important files
after becoming infected by the Blackworm mainly because the
clock time on their computer was wrong.

Like many Internet worms, Blackworm attempts to spread by
mailing itself to contacts in a user's address book. The e-mails
containing the worm can have a wide variety of subject fields
and attachment names. The worm also tries to add itself to the
auto-start programs in the Windows registy. Once a computer in a
network has been infected, Blackworm will try to infect all
other systems in the network.

To prevent getting infected by Blackworm you shouldn't open
attachments or click on Web links within these e-mails,
especially if these e-mails have a porn-related subject line.
Use caution before opening any e-mail attachments, even if you
know the sender. You should also backup any important files that
you want to preserve. Most antivirus products will detect
Blackworm assuming the worm hasn't disabled the antivirus
software. Because of this, it is important to frequently update
your antivirus software. It is also recommended to scan your
computer for viruses and use a firewall. To prevent the worm
from spreading to other computers in a network, you should use
strong passwords on all the users accounts.

About the author:
Edward is the owner of http://www.thespywareterminator.com where
you can download the highest rated spyware remover for 2005.
This superior software removes many unwanted Internet parasites
such as viruses, trojans, popups, adware and spyware. It really
works!

Monday, February 13, 2006

Wireless Lan And Laptop Computers

By: Mike Dobson

A small business run from home or on rented space, while it can
be extremely profitable, cannot be furnished in the same style
as a large-scale company office. Using standard full-size
desktop computers in such a set up is impracticable, as it takes
up too much space and is too bulky for cramped confines. To deal
with such a situation, desknotes or transportables may just hold
the key.

Desknotes are systems that can be alternately used as a standard
desktop PC, but also offers portability into the bargain.
Desknotes have the same power levels as a desktop PC and occupy
much less room. Moreover, to keep expenses to a minimum, it is
possible to install a LAN amongst the desknotes, where only one
laptop need be connected to the Internet and access is shared to
all the laptops connected to the network. This is also true for
the devices connected to the central laptop; through LAN, all
the laptops can use the same device. Thus, for small offices
with three or more laptops, LAN (Local Area Network) is surely a
boon.

LANs usually span a building or a small group of buildings.
Connecting one LAN with many others through telephone lines and
radio waves is called WAN (Wide Area Network). A Local Area
Network that uses radio waves to communicate is called WLAN
(Wireless Land Area Network). There are several advantages to
WLANs. One is its flexibility. Radio waves can pass through
walls of nearly any surface, and also do not require miles and
miles of cables, thus offering a clutter-free work atmosphere.
Wireless LAN can be almost invisible!

Another advantage is that WLANs are extremely easy to use. Most
laptops are built in with WLAN capability. So all you need to do
is plug in and make sure you have a wireless LAN card. WLANs are
very tough. If one base becomes disconnected, it is possible to
use another laptop as a base and can be shifted physically into
the range of another WLAN. Prices are very low these days for
WLAN, and it is no wonder the choice for home networks.

However, as nothing is perfect in this world, WLAN does carry a
few disadvantages. Anyone can operate a laptop near a WLAN and
hack into the stored wireless traffic. This makes safety an
issue due to the loss of privacy. While radio waves can pass
through almost any surface, too many obstacles in the path such
as buildings can degrade the transmission. Another drawback is
the data transfer speed. As many laptops share the same
bandwidth, data transfer speeds are significantly lower in a
WLAN. In addition to this, wireless data rates fall according to
signal strength or interference.

Wireless LAN is convenient where mobility is required, and is
the only choice in old buildings where cables cannot be
installed. Companies usually provide wired connections for fixed
offices, and wireless LAN for those users who have no fixed
location. In the end, WLAN should be installed only after taking
into account all factors regarding your office or home set up.

About the author:
At http://www.bizlaptops.com we'll find you the best deals on cheap laptops as well discount laptops. Sign up
for our free "Amazing Laptop Deals" service.

Sunday, February 12, 2006

Is Your Hard Disk Making These Noises?

By: D Breman

A hard disk drive (HDD, or also hard drive) is a fixed data
storage device that stores data on a magnetic surface layered
onto hard disk platters. A hard disk uses rigid rotating
platters (disks). Each platter has a planar magnetic surface on
which digital data may be stored. Information is written to the
disk by transmitting an electromagnetic flux through an antenna
or read-write head that is very close to a magnetic material,
which in turn changes its polarization due to the flux.

The information can be read by a read-write head which senses
electrical change as the magnetic fields pass by in close
proximity as the platter rotates.

Disk failure occurs when a hard disk drive no longer operates
and the information on it can no longer be accessed by the
computer.

This can happen for no reason at all or due to an external
factor such as exposure to fire or water or High Magneticwaves
or suffering a sharp impact How seriously the disk failure is
varies.

The most serious and well-known kind is the head crash where the
internal read-and-write head of the device touches a platter or
a magnetic data storage surface. A head crash normally causes
severe data loss and, moreover, data recovery attempts may cause
further damage if not done by somebody with specialized
knowledge.

There are also controller electronics which occasionally fail.
If that happens it may be possible to recover all data.

When your computer's hard disk starts to act funny, make sure
that you have an up-to-date backup. Then you can prepare some
simple diagnostics and possibly repairs. Both Windows and Mac OS
come with built-in hard-disk utility software that scans your
hard disk for errors and attempts to fix them.

This is what you can do for Windows Steps: 1. Double-click on My
Computer to open the My Computer window. 2. Select the disk that
you want to diagnose and repair. 3. Choose Properties from the
File menu. You can see the Properties window for the drive that
you selected. 4. Choose the Tools button. 5. Click the Check Now
button under Error Checking Status. 6. Choose either "Thorough"
or "Scan for and Attempt Recovery of Bad Sectors." 7. Click on
Start.

Tools to recover data are various such as:



There is a Data Recovery Utility which examines your
inaccessible hard drive for damages and corruptions and recovers
the data back.

Hard drive can be recovered from Windows 9x / ME / NT / 2000 XP
/ 2003 disk recovery Supports FAT16, FAT32, NTFS, NTFS5 file
system Provides data recovery from Formatted logical drives
Recovers data from Re-partitioned & Missing/ Lost Logical drives
Lost folder and deleted file recovery.

There is also a partition recovery utility available that helps
you in recovering all your important data lost after accidental
formatting, virus problems, software malfunction,and file or
directory deletion. There are also easy to use FAT & NTFS
Partition File recovery Utilities that examine your inaccessible
hard drives for damages and corruptions and recover the data.

There are also systems which:

Provide Partition recovery from FAT16, FAT32, NTFS, NTFS5 file
systems. Recover deleted files/folders even after recycle bin
has been emptied or use of Shift+Del key. File recovery from
deleted partition, lost partition missing partition or formatted
logical drives. File recovery from Missing or Lost folders.
Recognize and preserve long file names when restoring files &
folders. Multi-Disk Drive Support - Performs NTFS recovery on
all IDE, EIDE and SCSI disk devices.

There is also software that recovers corrupt or lost data from
floppy disks.

The software supports inaccessible floppy disk data retrieval,
FAT, BOOT or ROOT area damaged situations, and rescues various
corrupt files from a diskette. BadCopy Pro can recover data from
floppy disks that Microsoft Windows identifies as "not
formatted", "not accessible", or prompts you to format.

The software does not write data to your floppy disks, but saves
the recovered data to a new file that you specify. It can fix
corrupted files on floppy disk. It can restore damage to a FAT
(File Allocation Table) or BOOT area of the disk. It can repair
damage to the ROOT area of the disk, so that files can be listed
again. It can erase Viruses on a diskette.

There is also software available that fixes corrupted or damaged
Microsoft Word documents.

There is also a new product on the market; software that creates
a Windows CD for you, and creates recovery files so you will not
need to format to reinstall Windows.

It has been asked many times "I have Windows XP (or ME), how can
I install Windows without having to lose all my files. I only
have a Recovery Disk". Well it is really very simple, so long as
you have a CD burner; or at least a second hard drive.

About the author:
D Breman http://www.disk-recovery-now.info
http://www.skype-wow.info

Saturday, February 11, 2006

Computer Viruses: The Nasty Truth

By: George Royal

The term, "virus", in computer technology, refers to a self
replicating application that spreads by making copies of itself
by inserting into other programs, other executables or
documents, and when executed begins to perform harmful actions
on the system. All computer viruses are deliberately created,
not always malicious and some of them may be benign and simply
annoying.

Non-Memory Resident and Memory Resident Viruses:

Non-Memory resident viruses, when they are executed, immediately
look for other hosts that can be infected. When they infect
these targets, they transfer control to the application program
they infected. A non-resident virus has a finder module and a
replication module. The finder module, once it finds a new file
to infect, calls upon the replication module to infect that file.

Memory-Resident virus stays in the memory and do not look for
hosts to infect when they are executed. It stays active in the
background after its host program is terminated, and infects
files as soon as they are opened or accessed by other programs
or the operating system. It does have the replication module
like the non-memory resident virus, but without the finder
module.

Types of Computer Viruses:

File Viruses: These types of viruses are the most common, and
mostly infect open files and program libraries on an operating
system. The virus functions by inserting itself into a host
file, modifies it in such a way that the virus is executed when
the file is opened. They are also known as left viruses. Today,
there are known viruses infecting all kinds of executables of
standard DOS: batch command files (BAT), loadable drivers (SYS,
including special purpose files IO.SYS and MS- DOS.SYS) and
binary executables (EXE, COM). There are also viruses targeting
executables of other operating systems - Windows 3.x,
Windows95/NT, OS/2, Macintosh, Unix, including the VxD drivers
of Windows 3.x and Windows95.

Macro viruses: Macros are used in most word processing programs
such as Microsoft Office in order to automate or simplify
recurring tasks in documents. Macro viruses are those viruses
that use the application's own macro programming language to
distribute themselves, in which an unwanted sequence of actions
is performed automatically when the application is started or
something else triggers it. These macro viruses may inflict
damage to the document or to other computer software but are
relatively harmless, and are often spread as an e-mail virus.

Boot Viruses: These were one of the most common viruses
prevalent during the early and mid 1990s, when the use of
diskettes was popular. These viruses infect or substitute their
own code for either the DOS boot sector or the Master Boot
Record (MBR), which controls the boot sequence of the PC. The
MBR is executed every time a computer is booted so the virus
will also be loaded into memory on every startup and spreads to
every disk that the system reads. They are typically very
difficult to remove, and most antivirus programs cannot clean
the MBR while Windows is running. So, bootable antivirus disks
are needed to fix boot sector viruses.

Script viruses: They are a division of file viruses, written in
a variety of script languages such as VBS, JavaScript, BAT, PHP,
HTML etc. They can form a part of multi-component viruses or
infect other scripts such as Windows or Linux command and
service files. If the file format, such as HTML, allows the
execution of scripts, they can infect it.

About the author:
Antivirus HQ: your online resource to help protect your PC from
viruses and spyware.

Thursday, February 09, 2006

MAC vs PC - Which is the best computer for your home business?

By: Dee Ideeut

Why do people love MAC computers? Are they really the best
choice for your home business? To answer that question you need
to understand the basic difference between MACs and PCs. A P.C.,
the acronym for "Personal Computer", is the machine that most of
the computing world owns. That actually should be the acronym
for "Popular Computer". You're likely reading this from a PC.

How can you tell? Well MAC computers, manufactured by Apple, run
on their own operating system, versus the PC which all run on
the Microsoft Windows operating system, i.e. Windows 98, 2000,
etc. That's it...that's the defining difference between the two
types of computers. If you're running a computer with a
Microsoft operating system, than you have a PC.

Bill Gates actually ripped off the original Apple operating
system, but that's a whole other article.

Most media and creative professionals, who work in design or in
the film and music industries, only use these computers. That's
the foundation of their business. But other than that, you don't
find them too much in many business settings.

Now I've never owned one, but I've worked with other business
owners who have and I actually fiddled around with one a few
times. Here's what I can tell you. MAC users LOVE MACs!!!!!!
They're generally like cult followers, they worship them and
would drink a vial of arsenic before switching to a PC.

That in itself does say a lot! You don't generally see PC users
feeling the same way. I admit they are really hot machines, but
since I've worked with PC's for over 15 years I am admittedly
biased. It's really just a "comfort", "familiarity", "feels like
a good ol' shoe" kind of thing.

The truth is MACs are essentially better-made. Apple tends to
"over-engineer" their computers, so that you can get by without
an upgrade for a much longer time. It's about eight to ten
years, as opposed to the PC's three to five year span.

Their operating system is superior to Windows and they have far
fewer technical issues, especially relating to viruses. Macs
only make up about 2% of all computers out there, so hackers
don't think it's worthwhile to develop viruses that affect their
operating system; hence computer viruses on MACs are virtually
non-existent.

Not to mention computer hackers hate the fact that Microsoft has
created a monopoly. Viruses are their way of creating a massive
migraine for them...and unfortunately us as well.

Now on the other side, since there are fewer Macs in the world,
not all software, especially specialty software, is available to
run on their operating system. So you have to look into that
before you decide to purchase one.

So if they're so great, then why doesn't everyone own one?

Simple...they are more expensive than PC's. That's the main
reason why PC's are more "popular"...period! You see "Popular
Computer"...oh never mind!

Most businesses, especially small businesses, don't need to
spend the extra bucks on a computer just to run simple word
processing and database programs...it's really not a necessary
cost. That's an important concern when starting a small business.

But that doesn't mean you shouldn't consider one. They're really
great machines and will certainly keep your business running at
peek efficiency. And the upfront price may be worth the cost,
because it may actually save you money on the back-end. The
savings from not having to upgrade hardware every couple of
years or having to update virus protection software will save
you lots over the long-term.

Read more about MAC computers at
http://www.starting-a-home-business.org/mac.html

© 2005 A Covert Operations, Ltd. All rights reserved.
http://www.starting-a-home-business.org



About the author:
Duh Idiot's Home Biz Start-Up Guide - The "Idiot's" on-line
resource for starting a home business.
http://www.starting-a-home-business.org

Wednesday, February 08, 2006

Clean-up Your PC

By: James Hayes

Installing an application is an easy task for most users. But
what about uninstalling? Do you know how to completely remove an
application from your system? Did you know that most
applications leave permanent files or registry entries on your
system? In order to keep your system clean, you need to properly
install and uninstall applications. Correctly uninstalling an
application can ensure that it will not cause you any problems
in the future. The right way to uninstall software is definitely
not the delete key. And it's not always the familiar Add/Remove
Programs dialog. In many cases, you need to follow a series of
steps in order to completely remove a program from your system.

Many applications tend to leave permanent files laying around on
your hard disk. Your system does not need these files and so,
apart from wasting space, sometimes they may adversely affect
the performance of your system (e.g. an older version of a
library may cause compatibility issues with newer applications).
On the other hand, there are also programs that leave useless
registry entries on your Windows registry that can cause similar
problems. Using the following Windows tools, however, will
certainly help you in keeping your system cleaner and in better
shape!

Add/Remove Programs: This is the familiar application you can
find on your Control Panel. It is (obviously) the most important
tool that you use to remove an application. It is primarily
intended for applications that don't offer an Uninstall program
on their own as we'll see below. Most of the times however, it
can be safely used to uninstall these applications as well,
since their own uninstall program will be started by the
Add/Remove Programs dialog. It can be found at Start - Control
Panel - Add/Remove Programs

Uninstall Software: Many software applications offer their own
uninstall program. It can usually be found inside the
application folder on the start menu, just go to Start - Program
X - Uninstall. Just because they exist, these uninstall programs
doesn't mean the rid you of all the old and unnecessary files
the application might leave behind or any of the registry
entries.

Disk Cleanup: Although you will probably not see amazing gains
in terms of speed and storage space, Disk Cleanup can help rid
your PC of all kinds of useless files, temporary files or
shortcuts. It can be found at Start - Programs - Accessories -
Systems Tools - Disk Clean Up.

Program Files: It is often the case that removed applications
don't delete the folders where their executable or other files
used to live. Bear in mind, that this is not the only place an
application may have "forgotten" some of it's files. If it was,
things would be so much easier, but unfortunately many
applications tend to place files inside the windows/system or
other system directories and just leave them there. Still, it's
a good idea to delete the empty folders you may find in the
Program Files directory, which can be found at Start - My
Computer - C: - Program Files.

Registry Editor: You can use your registry editor to search for
entries created by an application you have decided to uninstall.
Applications also hold uninstall information in the registry, so
you should start searching and deleting registry entries only
AFTER you have actually uninstalled the application. The
registry editor does not exist anywhere in the start menu. You
have to run it yourself. Just go to Start - Run and enter
"regedit.exe" in the option box.

Alternatively, you can also use a registry cleaner, which is a
software program specifically designed for cleaning up your
registry.

About the author:
No need to clean up your PC manually. Check out the Best
Registry Cleaners
out there!

Tuesday, February 07, 2006

New 1GB iPod nano

Apple just unveiled a New 1GB iPod nano! The new 1GB iPod nano is available for just $149 and offers the same features as the 2GB and 4GB iPod nano models, holding up to 240 songs or 15,000 photos.

Check it out here:



iPod nano 1GB - White

Monday, February 06, 2006

Worm_Grew.A Threat, Hype, or Dud?

By: Darren Miller


The Worm_Grew.A Virus Got A lot Of Attention


The 3rd has come and gone. What has been the real effect or
impact of the "WORM_GREW.A (Also know as Nyxem, BlackMal,
MyWife, and so on)" virus? For weeks there has been tons of
warnings, in the news, print, e-zines, you name the forum and it
has been a discussion topic. Current information indicates that
the WORM_GREW.A virus has not caused mass destruction as
promised or suspected. I'm sure some of those 600,000 or so
suspected infected computers were impacted, but who really knows
at this point.

Viruses Can Impact You In Various Ways


There is one thing I do know however; Even if the BlackMal virus
has not done as much physical damage as predicted, it has done a
good deal of indirect damage. Think about how much time
corporate technical people have spent preparing for the
possibilities, making sure their enterprise anti-virus solution
is functioning properly, the time devoted to discussing and
planning for disaster recovery in the event a direct impact is
realized. What about all the home and small business people
stressed about the doom looming over their computers head in the
form of a "possible" destructive and wide spread infection.

How Do You Know If Your Business Is Protected Against Viruses


A business associate of mine recently worked on a project in
which he performed a complete infrastructure upgrade for a
document / information heavy business. During the upgrade, he
found that the anti-virus solution they were using was not
functioning properly, had not updated its virus signatures for
eight months, and on top of this, their very expensive tape
backup solution had not been working for about as long. The
customer kept changing the tapes, but they were blank. Just
imagine what would have happened if they had not had this
upgrade done, and an effective anti-virus and tape backup
solution put back in place. If they had contracted this virus it
could have not only shut them down for a period of time, it very
well may have cost them huge financial losses or worse.

Virus Threat, Hype, or Somewhere in Between


Do I think this particular virus scare is a product of a real
threat, fueled by hype, or a dud? Quite frankly I think it has
been a little of all three. The threat was / is definitely real,
the hype was all over the media and other information outlets,
and as far as being a dud, if you analyze it using the equation
threat+hype= impact, maybe.

I think what really has set this virus apart from recent malware
/ threats, is its destructive capabilities. Many malware
developers have moved away from creating destructive worms and
viruses in favor of creating cash generating malware. There's no
money in it for them if they just blow up your system.

Conclusion


It's quite interesting, the parallel between how we deal with
threats and risks in our personal lives, and that of the
technology world. Many of us only prepare for a negative or
damaging event shortly before the event takes place. That is if
we have been warned with time to prepare. The bottom line is we
can never let our guard down. Consistency, persistence,
awareness, and preparedness need to be in the forefront of our
minds.

You may reprint or publish this article free of charge as long
as the bylines are included.

Original URL (The Web version of the article)


http://www.defendingthenet.com/newsletters/Worm_Grew.A-Threat-Hyp
e-Or-Dud.htm

About the author:

Darren Miller is an Information Security Consultant with over
seventeen years experience. He has written many technology &
security articles, some of which have been published in
nationally circulated magazines & periodicals. If you would like
to contact Darren you can e-mail him at
Darren.Miller@defendingthenet.com. If you would like to know
more about computer security please visit us at http:

Saturday, February 04, 2006

What To Do When Your Hard Disk Fries

By: J Schipper

A hard disk drive (HDD, or also hard drive) is a fixed data
storage device that stores data on a magnetic surface layered
onto hard disk platters. A hard disk uses rigid rotating
platters (disks). Each platter has a planar magnetic surface on
which digital data may be stored. Information is written to the
disk by transmitting an electromagnetic flux through an antenna
or read-write head that is very close to a magnetic material,
which in turn changes its polarization due to the flux.

The information can be read by a read-write head which senses
electrical change as the magnetic fields pass by in close
proximity as the platter rotates.

Disk failure occurs when a hard disk drive no longer operates
and the information on it can no longer be accessed by the
computer.

This can happen for no reason at all or due to an external
factor such as exposure to fire or water or High Magneticwaves
or suffering a sharp impact How seriously the disk failure is
varies.

The most serious and well-known kind is the head crash where the
internal read-and-write head of the device touches a platter or
a magnetic data storage surface. A head crash normally causes
severe data loss and, moreover, data recovery attempts may cause
further damage if not done by somebody with specialized
knowledge.

There are also controller electronics which occasionally fail.
If that happens it may be possible to recover all data.

When your computer's hard disk starts to act funny, make sure
that you have an up-to-date backup. Then you can prepare some
simple diagnostics and possibly repairs. Both Windows and Mac OS
come with built-in hard-disk utility software that scans your
hard disk for errors and attempts to fix them.

This is what you can do for Windows Steps: 1. Double-click on My
Computer to open the My Computer window. 2. Select the disk that
you want to diagnose and repair. 3. Choose Properties from the
File menu. You can see the Properties window for the drive that
you selected. 4. Choose the Tools button. 5. Click the Check Now
button under Error Checking Status. 6. Choose either "Thorough"
or "Scan for and Attempt Recovery of Bad Sectors." 7. Click on
Start.

Tools to recover data are various such as:

There is a Data Recovery Utility which examines your
inaccessible hard drive for damages and corruptions and recovers
the data back.

Hard drive can be recovered from Windows 9x / ME / NT / 2000 XP
/ 2003 disk recovery Supports FAT16, FAT32, NTFS, NTFS5 file
system Provides data recovery from Formatted logical drives
Recovers data from Re-partitioned & Missing/ Lost Logical drives
Lost folder and deleted file recovery.

There is also a partition recovery utility available that helps
you in recovering all your important data lost after accidental
formatting, virus problems, software malfunction,and file or
directory deletion. There are also easy to use FAT & NTFS
Partition File recovery Utilities that examine your inaccessible
hard drives for damages and corruptions and recover the data.

There are also systems which:

Provide Partition recovery from FAT16, FAT32, NTFS, NTFS5 file
systems. Recover deleted files/folders even after recycle bin
has been emptied or use of Shift+Del key. File recovery from
deleted partition, lost partition missing partition or formatted
logical drives.

File recovery from Missing or Lost folders.

Recognize and preserve long file names when restoring files &
folders. Multi-Disk Drive Support - Performs NTFS recovery on
all IDE, EIDE and SCSI disk devices.

There is also software that recovers corrupt or lost data from
floppy disks.

The software supports inaccessible floppy disk data retrieval,
FAT, BOOT or ROOT area damaged situations, and rescues various
corrupt files from a diskette. BadCopy Pro can recover data from
floppy disks that Microsoft Windows identifies as "not
formatted", "not accessible", or prompts you to format.

The software does not write data to your floppy disks, but saves
the recovered data to a new file that you specify. It can fix
corrupted files on floppy disk. It can restore damage to a FAT
(File Allocation Table) or BOOT area of the disk. It can repair
damage to the ROOT area of the disk, so that files can be listed
again. It can erase Viruses on a diskette.

There is also software available that fixes corrupted or damaged
Microsoft Word documents.

There is also a new product on the market; software that creates
a Windows CD for you, and creates recovery files so you will not
need to format to reinstall Windows.

It has been asked many times "I have Windows XP (or ME), how can
I install Windows without having to lose all my files. I only
have a Recovery Disk". Well it is really very simple, so long as
you have a CD burner; or at least a second hard drive.

About the author:
Recover your data by
J Shipper
Skype Wow?
All
about Direct TV

Friday, February 03, 2006

Protect Your Computer from Latest Virus

By: Nowshade Kabir


A deadly new virus under the name of W32/Nyxem-D which spreads
via email attached file is set to strike on the 3rd day of every
month half an hour after the infected computer boots up. The
damage caused by this virus could be extensive. If unsuspecting
user opens the infected attached file it gets into the system
and start delivering itself to all the available email addresses
residing in the infected computer. Once activated it overwrites
all DOC, XLS, MDB, MDE, PPT, PPS, ZIP, RAR, PDF, PSD and DMP
files by replacing their contents with the data string: DATA
Error [47 0F 94 93 F4 K5]. This can create a big mess, as all
integrated to the computer drives will suffer. This means your
flash cards, network drives, external drives or any drive which
gets identified by an alphabet. This virus is also known as
"CME-24," "BlackWorm," "Mywife.E" and "Kama Sutra" and seems
even capable of disabling out-of-date antivirus software. Over
300 thousand computers are believed to be infected by this worm
mainly in India, Peru, Turkey and Italy, where people are less
prone to safeguard their computers with up-to-date antivirus
programs. What should you do to protect your computer from this
and other malware?

1. Upgrade your antivirus software. If you don't have an
antivirus software installed and you don't feel like buying
them. These two are excellent antivirus programs you can get for
free.

AntiVir Personal Edition Classic 6.32 (http://www.free-av.com/)
Alwil Software Avast Home Edition 4.6
(http://www.avast.com/i_kat_207.php?lang=ENG)

2. Scan your computer for possible malware regularly. A great
free tool that scans your computer remotely for viruses and
eliminates them you can find at
http://housecall.trendmicro.com/housecall/start_corp.asp

3. Get a firewall and install it. A great free firewall that you
can download and install is Zonealarm. You can download it from
http://www.zonelabs.com/store/content/home.jsp

4. Regularly get patches for your version of Windows and update.

5. Use email filters similar to Eprompter. It gives you the
ability to delete unwanted spam or suspicious looking mail,
which might contain viruses. Get it free from
http://www.eprompter.com.

If you take these precautions, your chances of getting infected
will be reduced drastically.



About the author:
Nowshade Kabir is CEO of Rusbiz.com, a global B2B portal for
small and midsize companies. Our distinctive web stores along
with many outstanding features like e-marketplace, e-catalog,
supply chain management solutions, and trade leads section will
allow you to build robust Internet presence and manage key
business processes online. Rusbiz also develops Corporate B2B
portals.

Wednesday, February 01, 2006

Clean Up Your Computer Now

By: George Williams

How do you think your computer will run if you don't perform
regular maintenance on it? If your computer is running sluggish,
if it periodically needs to be rebooted or doesn't boot up as
quickly as it used to, it sounds like it's time for a Clean Up.
The following instructions below will give you step by step
instructions on how to ensure your PC continues to operate at
its fullest potential. These instructions are relevant for
machines running Windows XP and using Internet Explorer.

Here are the steps:

1. Open up Internet Explorer

2. Next click on the word Tools up at the top of your screen.

3. Click Internet Options.

4. In the middle of that box you'll see a section called
Temporary Internet Files. Click the Delete Files button.

5. Click the box Delete offline content too, then OK.

6. Once that is done, click the Delete Cookies button within the
Temporary Internet Files section. Click OK there too.

7. Next click the Settings button. Check for newer versions of
stored pages should be clicked to automatically if it isn't
already.

8. Change the Amount of Disk Space to use to 8MB. Click OK
twice.

9. Next go to the green Start button in the very lower left
corner of your screen. Click My Programs, Accessories, System
Tools, Check Disk Clean up.

10. Use offline content or anything else it asks. It will take a
few moments while it is checking how much space it can clean up.
When you get the new pop-up window, make sure there are checks
in every box. Click OK

11. After running Disk Clean up, go to Ad-Aware, update and run
the program. If you don't have Ad-Aware SE Personal, it's a free
very comprehensive spyware removal tool and it's remarkably
simple to use. You can download it through Lavasoft. After
running Ad-Aware, reboot your computer.

You should perform the above maintenance about once a week. Then
on an as-needed basis, run Disk Defrag, which you can find in
Start, My Programs, Accessories, System Tools, Disk Defrag. By
following the above simple steps your computer should continue
to run at optimum performance!

About the author:
George Williams maintains many autocad websites, including Autocad Online, and Auto Cad Free
Download
. Please visit his websites and find more
interesting autocad articles.