Tuesday, March 28, 2006

The Ongoing Transition Of Hardware

By: Paul Babs

Before the 1970s the word "hardware" usually meant one of two
things: the beautiful chrome handles on your new dresser and the
kitchen cabinets, or the hammer, saw, and nails that you
purchased at the local hardware store. Then came the computer
boom! Hardware took on a new meaning! If all the programming
that made a computer work were called software, then the hard
box and its components took on the name of hardware.

Hardware became a massive, competitive industry that expanded
beyond the largest, most powerful dreams of the 1970s. Made of
hundreds of various components that can be added, disconnected
or exchanged depending on which features you want, the computer
has a versatility that is limited only by ones imagination,
budget and, realistically, one's patience.

The basic components consist of the system unit itself (which
contains the so-called brains of the computer, the CPU, plus
various items referred to as 'boards'), the keyboard, mouse,
speakers, and of course, the monitor. To these basics one can
add printers, scanners, PC cameras, digital cameras, video
cameras, and joysticks.

During the mid 1980s several home-type computers became
available for the courageous home-computer geek. These used only
floppy disks, for the hard disk was still not portable in size.
Writing a book could use up to 75 floppy disks and nevertheless
was a major improvement over creating or working with a
typewriter.

After a few years the amazingly huge 10 MB Hard Disk came out
for home use, replacing the need for using floppies except for
backups. Since 10 MB didn't really hold all much data, the world
of floppies was still lively.

There was a word whispered about in murmurs in computer circles
back then: Gigabyte! It meant something so huge in size that the
human mind couldn't quite grasp it. Then it happened. A 100 MB
hard disk evolved into a 1 Gigabyte hard disk. People wondered
if it could possibly be reliable. And while they wondered,
computer stores started selling 10 Gigabyte hard disks. People
blinked and the hard disks were 100 Gigabytes.

While the capacity of the hard disk increased, the size of the
outside hardware began to get smaller and smaller, and before
long - there it is, sitting in the palm of your hand! The
flexibility of the hardware opens the door to thousands of
various software applications: now, instead of using the
keyboard to punch in letters, one can just talk to a computer
and it will record what was said. Modern e-mail delights people
of all ages as they communicate in seconds around the world.
And, computers can also read your e-mail back to you in the
language of your choice.

The competition between the hardware manufacturers has resulted
in prices dropping and dropping, creating a beautiful
opportunity for people of all income levels and all ages to now
enjoy a computer in their own home.

About the author:
Paul Babs is the owner of Tendon Ventures which
tackles all hardware issues. For more information, go to:
http://www.formhardware.com

Monday, March 27, 2006

Getting A Rack Mount Computer

By: Jeff Jefferson

Who says that only professionals need rack mount computers? This
is a very erroneous assumption that many people have about rack
mount computers.

Anyone, including you who are confronted with the problem of how
best to handle your computer, surely needs a rack mounted
computer. One of the biggest mistakes people make is that they
think they are far better off not buying one.

The argument that only professionals need rack mounted computers
certainly springs from the cost of acquiring one. But what
should be clear is that if you can afford it, why not go for it
instead of the normal computer. A smart person would take a rack
mount computer over a regular computer any day of the week.

You need a rack space for your computer. In other words, you
need a rack mounted computer to ease your work with the
computer, even if you are not a professional.

Before going into details on why you need a rack mounted
computer, it is necessary to familiarize ourselves with what a
rack mounted computer really is.

Many people are not very clear on exactly what it is.

A rack mounted computer is simply computer that is mounted on a
metal frame (other wise called a rack).

To prevent use of inferior computer racks, the Electronics
Industries Association (EIA) has provided standards for computer
racks. This standard helps to ensure that you only get to use
the best computer racks for your computer.

Note that there is a big difference between a computer rack and
a computer cabinet. The computer rack is the frame used for
mounting the computer, while the computer cabinet is fitted with
doors and usually side panels- and used to put in the computer.

About the author:
"Want to Discover 4 Secrets?" Computer Rack Mount
LCD
Monitors Rack Mount
Rack Mount
Computers

Sunday, March 26, 2006

Wireless Networks Are Easy to Setup

By: Ollie Brandt

In 1997, the Institute of Electrical and Electronics Engineers
(IEEE) created the first wireless LAN standard - 802.11. Because
it could only support a maximum bandwidth of 2Mbps, 802.11
wireless products are no longer being manufactured. The next
wireless version was 802.11b, which supports bandwidths of up to
11Mbps, followed by the creation of 802.11g, which supports
bandwidth up to 54Mbps. Here is a brief summary of the two
wireless standards used in home networks today.

802.11b, - This technology supports bandwidth up to
11MBps, which is comparable to the speeds of traditional
Ethernets. 802.11b uses the same 2.4GHz radio signaling as the
original 802.11 standard. Because it is an unregulated
frequency, 802.11b devices run the risk of incurring
interference from appliances that use the same 2.4 GHz range,
such as microwaves and cordless phones. However, if you install
802.11b devices out of range of other appliances, you can avoid
the interference.

802.11g - This technology supports of up to 54 Mbps,
uses the 2.4 GHz frequency and is backwards compatible with
802.11b devices. 802.11g supports more simultaneous users,
offers the best signal range and is not easily obstructed. The
disadvantages of 802.11g are higher cost and possible
interference with appliances on the unregulated signal frequency.

Wireless computers and routers use radio waves to communicate.
Those waves are sometimes strong enough to carry outside your
house. If your network is unprotected, your information could be
hacked. Many intruders already know this. They'll drive through
neighborhoods searching for stray signals with radio equipment.
With the right information, they could access your networked
computers and files. They could even borrow your Internet
connection. Hackers search for networks that use the default
factory settings. Those settings usually include no security.
You need to protect your network by reconfiguring your wireless
router for security.

Wireless routers are configured through a browser such as
Internet Explorer. First, you need to connect your wireless
router to a computer with a Network Interface Card (NIC).
Connect the router from one of it's LAN ports to your computers
Network Interface Card using a RJ-45 cable.

Open your Internet browser. To communicate with the router,
you'll need its IP address. You can find this in your manual
under a heading like "configuration setup" or "manual
configuration." Most routers, for example, have an IP address
like 192.168.0.1. Type it directly into your Internet browser's
address bar. You'll then be prompted for a user name and
password. These will also be listed in your manual.

Now, you'll see your router's configuration tool. It looks like
an ordinary Web page. Most new wireless routers have a network
configuration wizard. Just follow the steps in the setup wizard.
The wizard will detect whether you are using broadband cable or
DSL. Each one requires a different configuration, (for example
DSL uses PPoE authentication). however the setup wizard will
walk though all the steps. It's really that easy.

Wireless routers default settings disregard security. That's
because low security makes them easy to install, but you need
change your router's settings to add security. Different routers
put these settings under different menus. You should be able to
find each without trouble. You need to change some of the
default settings.


  • Change the default administrator's password
  • Change
    the default SSID (Short for service set identifier. An SSID is
    also referred to as a network name because essentially it is a
    name that identifies a wireless network)
  • Disable SSID
    broadcasting


The best way to protect your wireless network is through
encryption. Use WPA (Wi-Fi Protected Access) for your encryption
setting. All new wireless routers support this standard. You'll
typically see this setting as WPA-PSK (pre-shared key). You'll
be prompted to enter a passphrase of eight to 63
characters--letters, numbers and symbols. The router will use
your passphrase to build an encryption key. WPA is the latest
and safest version of encryption. The only weak point of WPA is
your passphrase. So make it as strong as possible. Here are some
tips:


  • Use at least 20 characters.
  • Avoid words found in a
    dictionary.
  • Include letters, numbers and
    symbols.


Now your router is switched to use WPA encryption. But your
computers don't yet know what you've done. You'll have to update
them with the new setup. Here's what to do for each computer
you've got on the network. For Windows XP follow these steps.

Click Start>>Control Panel. Double-click Network Connections.
Right-click Wireless Network Connection. Select Properties from
the pop-up menu. Select the Wireless Networks tab. Under
"Preferred networks," click the Add button. In the box labeled
"Network name (SSID)," enter your network's name.

Under Network Authentication, select WPA-PSK. Under "Data
encryption," select TKIP. Under "Network key," enter the same
passphrase you used for your router. You'll have to enter it
twice to confirm it. Then make sure that the checkbox labeled
"The key is provided for me automatically" is not marked.
Finally, click OK>>OK.

Windows 98 and Me do not have built-in wireless networking. All
of the wireless configurations options are provided by your
wireless adapter software. Just make all the previously
discussed configuration settings with your wireless adapter's
software.

And that's all there is to it. Encryption makes your network a
less attractive target for hackers. And if your neighbors were
using your Internet service, they've just lost their connection.


About the author:
Ollie Brandt is a Microsoft Certified Professional and A+
certified PC technician.

Visit his web site at www.acecomputerguy.net

Saturday, March 25, 2006

Don't Be an Identity Theft Victim

Don't Be an Identity Theft Victim: Tips for Creating Good
Passwords

Crystal Coast Technologies, Inc.


According to recent studies, up to 7 million people per year
(yes, that is "million") are victims of identity theft in the
United States alone. That is more than 19,000 per day and nearly
800 per hour. Wow! While some feel that these figures may be
greatly inflated, they still are sobering. Regardless of the
actual number per year, we still need to protect ourselves from
this problem. Many, though not all, of the yearly victims become
so because they are not as careful with their sensitive data as
they should be. Carelessness is all a thief needs to make a
victim.

CCT
offers this article "Tips for Creating Good Passwords."
This will be the first article in the CCT Tip Series entitled "Protect your Data Online and in the Office". Please give
us your feedback. Feel free to leave comments and suggestions.

The chain of protection is only as strong as its weakest link.
Many times, the weakest link is a poor password. One of our
clients recently told me that at one time, every computer in
their office had a password of "password". Obviously, that
offered as much protection as a screen door on a submarine. A
password is the first step to safeguarding yourself and
protecting your sensitive data.

Password No-Nos

    Here are a few things to avoid when making your
    password:


    1. DO NOT include words that can be found in the
    dictionary in any language. Believe it or not, there are
    dictionaries for password cracking. They are filled with, not
    only words and names, but also number and letter combinations,
    such as 11111 and abc123. If your password is super simple, like
    "champ" or "bigtime", it can easily be guessed.

    2. DO NOT use only letters or only numbers.

    3. DO NOT use names of spouses, children, girlfriends,
    boyfriends or pets.

    4. DO NOT use phone numbers, birthdates or, even worse,
    your Social Security number.

    5. DO NOT use the same word as your log-in, or any
    variation of it.

    6. DO NOT give out your password to friends or family
    members (especially children) who could pass them on to other
    less trustworthy individuals.

    7. DO NOT store written passwords in your desk, under
    your keyboard or, worst of all, on a bright, yellow sticky note
    on your monitor. Sure, this is nice to have in case you forget
    your password. However, it also can provide easy access to your
    computer for thieves.

    8. DO NOT provide your password over e-mail even if a
    trusted company or individual requests it. Internet "phishing" scams might use fraudulent
    e-mail to entice you into revealing your user names and
    passwords so criminals can access your accounts, steal your
    identity, and more. E-mail security will be discussed in a
    future article.

    9. DO NOT use the same password for multiple accounts. If
    someone gets one password, they could gain access to many of
    your accounts.

    10. DO NOT enable the Save Password Option. You may see a
    dialog box which asks you if you want the computer to remember
    the password you just entered. In this case, your best bet is to
    choose NO. If you select YES, anyone who uses your
    computer could also use your pre-saved passwords on these
    accounts.


Ok. Now we know a little about what we should avoid. Let's
learn a little about what is involved in making a good password:

Proven Methods of Great Password Creation

    Follow these tips and you will be well on your way to
    creating a safe, secure password:

    1. DO make your password at least 8 characters long. This
    would apply to your PC on your desk and any Online account that
    you have that requires a password. A password of this length and
    containing a mix of upper and lowercase letters (more on this in
    the next step)will take about 2 years to crack.

    2. DO choose a phrase or combination of words to make the
    password easier to remember. For example, take a phrase that you
    can remember. Let's use "Where Oh Where Has My Little Dog
    Gone
    ." Now, take the first letter of each word in that
    phrase and you come up with: WOWHMLDG. Now, mix in
    some lowercase letters and you get: wOWhmLdG. For
    even more security, add some punctuation to the mix:
    wOW^hm%LdG. That is a very strong password and yet
    it is fairly easy for the owner to remember.

    3. DO change passwords regularly. Ideally, every few
    months you should create new, strong passwords for all of your
    accounts. This can help keep hackers off balance if they're
    monitoring a Web site that you visit frequently.


    Changing your password for your Online accounts

    Web sites have a variety of policies that govern how you can
    access your account and change your password. Look for a link
    (such as "your account") somewhere on the site's home page that
    goes to a special area of the site that allows password and
    account management.


    Changing the password for your office computer

    You can usually find information about how to create, modify,
    and access password-protected user accounts, as well as how to
    require password protection upon startup of your computer in the
    Help files of your operating system, or online at the operating
    system software manufacturer's Web site. For example, if you use
    Microsoft Windows XP, online help can show you how to manage passwords, change passwords, and more. Mac users can go here for more information.


I am sure that some of you may think that the suggestions
mentioned in this article might be a little extreme. However,
stop and consider this: In the time it took you to read this
article, 53 people in the United States became victims of
identity theft. Many of them because they were careless with
their sensitive data. A secure password is the first step in
making yourself safe online and in the office.

Next in our series, we will discuss "How to be Safe
While Using Email."
Be on the lookout for that article.

About the author:
Crystal Coast Technologies is a web design team headquartered in
Swansboro North Carolina. We specialize in Flash web design and
database driven e-commerce. Our blog contains more tips and the
latest tech news, including security alerts.

Thursday, March 23, 2006

Recent studies show that 9 out of 10 PCs are infected

By: Jason Frovich

Internet connections are infected with Spyware or other types of
information-gathering Malware. Spyware and malware are large
problems for Internet users today and can be both annoying and a
real threat to you and your computer. There exist a number of
different spy and malware of which some are relatively friendly
and only spies on your surfing habits, while others like the
Trojans can be used to corrupt your hard drive or steal your
usernames and passwords. A Trojan can even be used to steal your
identity by extracting all necessary information from your
computer.

You may think that ad ware might not be that bad, that it is
good if the ads are chosen to fit your interests. This might be
true if the spy ware didn't have a number of other negative
effects, such as an increased amount of pop up ads, unexplained
home page changes, strange results when searching the web and
the fact that your computer are being slowed down by the spy
wares. These are all very common results and symptoms of spyware
and ad ware.

More unusual problems connected with spyware and Trojans are the
corruption of the hard drive, the loss and exposure of private
information and login information and in a worst case scenario,
the theft of the identity of the owner of an infected computer.

Spyware is a large treat to the security of your online privacy.

There are however steps that you can take to avoid suffering the
negative effects that spy- and ad ware can bring, and start
protecting you computer and building an Identity Theft
Protection. The first of these steps are to get a good anti
spyware and anti adware program able to remove spyware. There
are a number of different spyware removers available and three
of the most well known might be Spy Sweeper,Ad Aware and Spybot
which are all good programs.

Spyware removal software can scan your computer and successfully
remove spyware like CoolWebSearch. Spyware removal software also
uses a system monitor that automatically discovers spy ware and
prevents installation of spyware on our computer. Spyware
removal software is effective for spyware and adware removal.

The active shield uses System Monitoring to in real time prevent
new spy- and adware programs from being installed on your
computer. This fact combined with the fact that Spy Sweepers
uses a constantly updated database of all available spy- and ad
wares means that this adware remover can clean your computer,
ridding it of any and all spy- and ad ware. Once it has cleaned
your computer it can keep it clean and assure that your computer
stays clean from ad- and spy ware.

By keeping your computer free from spyware and adware Spyware
removal software also protects your information and keeps your
identity safe. Spy Sweepers prompts you to update it if it has
been to long since it was last updated.

If Spyware removal programs finds a spyware it will immediately
quarantine the spyware and disable the spy wares functionality
until you can decide whether to delete the file or try to clean
the file from spyware elements and return the file to its
original place on your hard drive.

About the author:
Supportcave.com offers new and enhanced Free Spyware
Removal
Software. Not only will these programs effectively
check and clean your computer from Spyware, once installed they
will also shield your computer from future Spyware intrusions
and browser hijacks - before the malevolent software even have a
chance to enter you PC! Spyware Remover Software is an important
funct

Wednesday, March 22, 2006

Reclaim Your PC from the Internet Spies

By: Jason Frovich

Most Internet users recognize the need of protecting their
computers against viruses, as the vast majority of us sooner or
later become painfully aware of these nasty little programs when
they shut down our PC, spam our mailbox or delete our files.
Viruses are, however, not the only malicious software programs
out there. The newest addition to the evil software family is
the so called Spywares and a good anti-virus program or firewall
is not enough to safeguard against these clever programs.

Spywares are known by many names such as adware, trojans,
malware, browser hijackers etc. The thing they all have in
common is that they will transmit your personal information to
companies and individuals who have an interest in knowing about
your surfing habits, online purchases, credit worthiness,
interests, web searchs, chats, birth date and even your credit
card number. The list goes on and on, since Spywares are
constructed by promotional companies who need to know as much as
possible about the online consumers to target them effectively.
By ewes dropping on you online, these companies hope to be more
successful when sending out promotional materials.

Spyware usually enter your PC by piggybacking on other software
downloads. Every time you use downloaded or otherwise shared
files, including Freeware, Shareware or p2p sharing programs,
you stand the risk of unknowingly infecting your computer with
Spyware. Even confirmed virus free music files, films and
computer programs can have Spyware stowaways. Once inside your
computer, they will hide, monitor all your actions and promptly
start telling your secrets to anyone willing to listen.

Contrary to most viruses the Spywares actually make an effort
not to be observed. Since they won't cause obvious harm such as
deleting important files or shutting down your computer, they
can thrive in your PC for years without you noticing, sending
out massive amounts of information about all your online habits.

At a first glance, you might find this annoying but essentially
harmless. Why not let the companies send me promotional material
about things I am actually interested in? Spyware is however far
from harmless, since the infiltration by Spyware not only let
the companies know about your latest online search, but also
much more private matters such as credit card details, online
purchases of medicine and your private e-mail correspondence
with family, friends and business partners. There are even
examples of how this massive gathering of personal information
has led to an overall loss of privacy and stolen identities. In
the computerized world of today it is not hard to imagine the
amount of damage and personal suffering the fraudulent use of a
persons' identity can cause.

It is obvious to anyone that we must start combating the Spyware
programs, but the best way of doing this is not to panic and
pull the plug on your PC, never go online again and keep five
feet away from all Freeware. There is a much better solution:
http://www.supportcave.com

About the author:
Supportcave.com offers new and enhanced Free Spyware
Removal
Software. Not only will these programs effectively
check and clean your computer from Spyware, once installed they
will also shield your computer from future Spyware intrusions
and browser hijacks - before the malevolent software even have a
chance to enter you PC! Spyware Remover Software is an important
funct

Tuesday, March 21, 2006

5 Ways to Optimize Your PC

By: Keith Park



Check for viruses



Viruses are the most common problem when a PC's performance
begins to slow down. If there is one piece of software that you
must have on your PC, make sure it is Virus Scanning software.
There are many paid and free versions of software, I recommend
AVG Free Edition from Grisoft www.grisoft.com





As the title states, it is a free version and I have found it to
be just as good as any paid version I have used. It can be set
to update automatically, scan your hard drive at specific times
and scan your emails as they come in.



Do a complete scan of your PC once you install the software and
then set it up to scan incoming emails as well as do a complete
scan monthly, just to be safe. Set it to run in the middle of
the night or during the day while you are at work when you don't
use your PC.



Check for spyware



Spyware is becoming just as prevalent as viruses when it comes
to infecting your PC. There are over 38,000 spyware and adware
programs infecting PC's around the world. Chances are that if
you have been on the Internet, you have been infected with some
form of spyware.



For those that don't know, spyware is a program that collects
information from your PC without your knowledge. It is usually
installed without the user knowing but often it is installed
with the users consent whether they know it or not. How many of
us read the End User License Agreement (EULA) when we install
software?



Not many! I know I don't.



Hidden in the pages and pages of these EULA's are statements
that you agree to share information on various things including
your surfing habits, purchases you've made and even to install
extra software to track other things or to store files for their
network they have created. In their eyes this makes it all legal
because they have told you about it, again who reads the
EULA?



Spyware is not only bad because of what it tracks, it also
brings along with it unwanted trojans, worms and viruses. All
these combined running on a PC can bring it to a grinding halt.
There are spyware removal tools and software, most of them free,
Spybot, Ad-Aware SE Personal, Hijack This.



These are just a few, there are many more, too many to count. I
personally like Ad-Aware SE Personal, it is free and has been
able to remove most of the spyware I have come across. Download
it free at www.lavasoftusa.com



Update the definition files and run a scan on your PC, chances
are you are infected. Check out Lavasoft's website for more info
on how to use this software.



Remove unnecessary programs from your computer



Software that you are no longer using not only takes up space on
your hard drive, it also can run at startup using system
resources that could be used for other things. Go into your
Control Panel (Start --> Settings --> Control Panel) and
double-click on Add/Remove Programs. Go through the list of
programs and remove any that you don't use.



Run scan disk on your hard drive



Running a scan disk on your hard drive will detect and attempt
to fix any problems with files or the hard drive itself. File
errors or bad sectors on your hard drive can cause PC slowness
or random computer crashes. If bad sectors are found on your
hard drive it is highly recommended to back up your data and it
may be time to look into buying a new hard drive.



Double-click My Computer on your desktop, right-click your C:
drive (or whatever drive needs scanning), select Properties and
then click on the Tools tab. Click on the check now button to
begin scanning.



Run a defrag on your hard drive



Defragging is done to increase disk speed access and retrieval
of files. As files are updated or deleted they are stored on the
largest continuous space on the hard disk, often in a different
section of the hard drive from where the other parts of the file
are stored. When files are fragmented like this, a computer must
search the entire hard disk each time the file is opened to
locate all of its parts, which slows down response time
considerably. It is recommended to run a disk defragmentation on
a regular basis, approximately every 2-3 months.



Double-click My Computer on your desktop, right-click your C:
drive (or whatever drive needs defragmentation), select
Properties and then click on the Tools tab. Click on the
defragment now button to begin the process.





About the author:
Keith Park has been in the IT industry for the last 7 years and
is the author of the website TechCorner PC Resource Zone. Go there for
more articles and resources.

Additional resources @ http://mgrcentral.com/computers/default.aspx?stud
entid=1575219

Saturday, March 18, 2006

Wireless Troubleshooting

Wireless networks can be funny things. They'll work for weeks or months and then suddenly, one day -- bang! They're dead. But what can you do to try and resuscitate a dead wireless network?

The Simple Things.

Before you go to too much trouble to fix your network, you should try the simple solutions. No-one's quite sure why they work, to be honest, but they have a surprisingly high success rate.

To get Windows to attempt to fix problems with a wireless connection, double click the connection's icon in the bottom right corner of your screen. Go to the Support section of the box that appears, and then click Repair. Windows will deactivate and reactivate the connection in an effort to get it to work.

Once you've tried this, the last-ditch simple solution is that Windows classic: restart the computer. If that doesn't work either then, well, you'll have to try something else.

Has Your Wireless Card Come Loose?

If you have a USB or PCMCIA wireless card, you should check now to see whether it's come loose. The best way to do this is to disconnect everything and reconnect it. USB devices are especially vulnerable to gradually coming loose -- make sure you unplug your USB wire at both ends of the connection, if possible.

Of course, if you have an internal PCI wireless card, you might want to try a few other things first before you go to the trouble of opening the computer to take a look at it.

Have the Networks in Your Neighbourhood Changed?

Sometimes, if someone sets up a new network near you, it can cause some interference and take precedence over your own network, especially if you're in a part of your house where your network's signal is weak. Once your computer is connected, though, there's no guarantee your computer will be granted -- the other network could be set up in any number of strange ways. This leaves you in a position where your computer has connected to a network that it thought was 'better' without telling you, even though it turns out that network is useless to you.

You need to go to the 'View Available Wireless Networks' screen and take a look at what you're connected to. If it's something you don't recognise, you should double-click your own network in the list to connect to it. If this works, make sure you remove other networks' names from your 'preferred networks' list, to avoid connecting to them in the future.

Check for New Sources of Interference.

If you find that your connection will work if you put your computer right next to the source of the Internet signal, but stops working as you get further away, then the cause could be interference. You should consider any changes you've made to your home recently. For example, did you just get a new cordless phone? They can often interfere with wireless networks. Treat any equipment that uses radio waves as suspect -- try switching each thing off in turn and see if the performance of the wireless network improves.

Reset Equipment to Factory Settings.

With routers and access points, one thing that might work is to log in to their admin control panels (using a web browser) and click the option to restore to factory settings. This removes all your settings and makes the router or access point 'like new' again, meaning that any problems it was causing should be solved, unless it has been physically damaged.

If none of these things work, but the network was working fine before, the chances are that you've got a hardware failure somewhere on your network. This could be as simple as someone having sat on a USB device, or knocked an antenna on a router. You need to try unplugging things in turn to figure out where the failure is, and then call the manufacturer to report the fault -- be prepared that you might need to replace the item yourself, though, if it's not their fault or the equipment is outside warranty. Even if it turns out not to have been a hardware failure, they should be able to help you fix your network.

Friday, March 17, 2006

Which Hard Drive Is Right For You?

Deciding on the appropriate hard drive is a personal decision made according to an individual’s computing needs. These days, 20 gigabyte, up to 40 gig, 80 gig, 100 gig and even larger are common. When pricing hard drives, it is common to see very little price differences between smaller size drives and larger. For instance, the price difference between a 20 gig and a 40 gig may be only twenty dollars. An old rule of thumb among the computing community has always been to buy the largest hard drive that you could possibly afford since everyone loads and uses more software than they initially imagine they will, and since that will put off the need to upgrade the computer the following year. However, if your budget is limited remember that a 20, 30 or 40 gig hard drive is plenty for the average user.

These hard drive sizes would astound a computer user from the 1980’s or early 1990’s. Back then hard drives were sized in megabytes, not gigabytes. The original IBM PC commonly had a ten Meg or twenty Meg drive, and when the thirty Meg drive came out it was considered absolutely gigantic. However, that was a time of smaller programs, less software and before Windows dominated the home computer world.

When choosing a hard drive you should always remember that the type we are most familiar with is called Parallel ATA type. A new type, serial ATA, is gaining popularity. This type is much faster – as much as twenty percent – and has other benefits including improved airflow. Your hard drive will need flowing air because it is constantly rotating at extremely high speeds and generates heat. The airflow helps the hard drive stay cool and run properly.



Most of the name brand hard drives are fine quality and it is hard to go wrong if they are purchased from an authorized reseller. If you buy your hard drive from an OEM – original equipment manufacturer – or from a discount store be sure to check out the warranty.

When choosing a new hard drive, keep several things in mind: size measured in gigabytes, size physically measured in inches, speed, and brand.

When looking at brands, there are many good choices. Choose a brand you’ve heard of and trust. Possibilities from good companies include Maxtor, Quantum, Western Digital, Fijutsu, Toshiba, and IBM among others.

When looking at price, remember the old adage “you get what you pay for.” A wise shopper will look around for the best price, but price isn’t the only thing here. A low price without a warranty, or from a dealer you don’t trust, could just cost you more in the long run. Fortunately with hard drives the manufacturer provides warranties on new drives, but a company willing to back up their product and replace a defective drive out of inventory can save you lots of hassle and downtime.

Size of drive in gigs, as said before, will have little price difference in certain increments and are usually very small. Figure out what each gig is costing you on each drive. Take a calculator into the store and do the math, then make your choice. Size physically is important because you must have a hard drive that fits the slot in your particular computer. Hard drives come in two primary sizes. The smaller, standard size is the size of a 3.5 inch floppy disk drive. The larger type is the size of a CD ROM drive. Larger drives tend to cost less, but most computers have enough slots for smaller, standard drives and most computer users consider them a little more preferable.

Speed is used to describe the revolution speed of the spinning hard drive. The faster the better of course, but check out the price difference when going from a relatively slow hard drive to a faster drive and see if the price difference is really worth it. After all, the hard drive is really spending most of its time waiting for you to type in data.

In summary, choosing a hard drive is as individual as choosing a car, but most people want as much size and speed as they can afford. Ask your friends, check online message boards, and perhaps members of a local computer users group to see what other people’s experiences have been, analyze all of your options and then make a wise decision.

Wednesday, March 15, 2006

Top Warning Signs of a Failing Power Supply

The death of a power supply could be rather traumatic. A PC is almost like a part of the family. When we loose touch with our computers, it is great cause for concern. How are we going to chat with our friends? How are we going to research that project that is due the next day? What about those very important and vital files?

A power failure could cause you to loose important files on your computer. Since everything from journal entries to the monthly budget is usually stored on computers now, it is comforting to know that your files are safe. The best way to reinforce safety of files is to have a backup power supply.

Don’t fret. There are ways to make sure that your precious computer is safe and sound. There are signs to watch out for and measures you can take to keep your files safe. You can prevent this forbidden tragedy by paying close, and careful, attention to your power supply.

The power supply is one of the most important units of your computer. Unfortunately, it is also one of the most overlooked components as well. This being the case, it is incident prone because few pay attention to it until it fails. Don’t take your power supply for granted. Make sure it is as healthy and happy as the rest of your system.

Before you draw the conclusion that your power supply has failed, make sure it is connected properly and set to the correct voltage. A PC that you have recently moved or move frequently may have this problem. If the voltage selection is changed and you try to use your power supply, you could blow a fuse. If the voltage selection has been altered, unplug the power supply and adjust the voltage selection.

The first sign of a failing power supply can be its failure to turn on. This obvious sign may be interment at first, but eventually it may become permanent. If you hit the power switch and it does not come on, then you might have an issue. Of course, there can be other reasons why the power supply does not power up.

There are many other reasons for a power supply to lay dormant. Many of which can be easily corrected. So don’t immediately run out and get a new power supply until you are sure that the old one is not any good. You don’t have to be a technician to detect some of the signs that your power supply is on the way out, but you do have to pay attention to your computer.

If you can not hear the fans turning, or if your system is as hot as a summer day in Florida, you have a problem. If the fans are very noisy check to see if anything is obstructing them, like a piece of paper. If all is clear and there is still noise, your power supply may be the culprit. A hot system may mean that the power supply is working its way to frying your system. This is not only dangerous for your computer, it potentially dangerous for you as well.

Spontaneous reboots and lock ups are a warning sign. If your system, on occasion, decides to shut down on its own accord, it may be the power supply. A system that freezes up is a sign as well. These are often defensive mechanisms on the part of your motherboard.

An old AT power supply drastically increases your chance of a power failure. How do you know if you have an AT power supply? Look for a heavy cord that feeds into a big switch on the front of the case and has four connections. This kind of power supply has a potentially fatal live line voltage at the switch.



There are a few ways to test your system to find out if your power supply is the source of your problem. None of which require you to do anything terribly technical. Unhook all of your peripherals and try your system. If it works properly, then it might be one of your accessories that may be causing the problem.

Monday, March 13, 2006

The Top Five Most Popular Computer Upgrades

Most everyone with a computer is looking to have the fastest, most efficient computer filled with the latest computer technology. To keep up with the continual changes as technology becomes more and more advanced; it requires complete upgrades on the computer. But, what are the best computer upgrades available?

Memory Upgrade

One of the most popular computer upgrades is a memory upgrade. A memory upgrade is one of the easiest ways to boost the performance of a PC. Before making a memory upgrade, first check the BIOS operating system to determine how much memory is already on the system.

To make a memory upgrade, it is also necessary to open the case of the computer to find how many modules are currently installed and how many slots are still empty. It may be necessary to take some out and replace them with larger modules if all of the slots are already full.

After finding out the current memory situation, review the operating system and application programs to determine how much memory is needed to make the computer perform at its optimal level. In general, these programs provide a minimum and a recommended rating. To reach the fullest potential of the computer, the memory should meet or exceed the recommended level.

Before running out and buying a memory upgrade, however, check the computer manual or go directly to the motherboard to find out what type of memory is supported by the current computer operating system. If this information isn’t gathered, the memory upgrade may not work.

When buying a memory upgrade module, it is best to buy the largest amount of memory with the least number of modules. This way, there is room for growth in the future. For example, instead of buying two 128MB modules, purchase one 256 MB module.

Video Card Upgrade

A video card upgrade makes it possible to play all of the great games that are currently available on the market. In fact, some games are so advanced that they won’t play at all without a very powerful video card.

Since there are literally dozens of video cards available, it can be tough choosing the right one. But, it is important to first take a look at the motherboard to determine what type of video cards can be supported by the system. The best video cards are the ones that transfer data the fastest. In order from fastest to slowest are PCI express, AGP 8x, AGP 4x, AGP 2x, AGP, and PCI.

Sound Card Upgrade

A sound card improves the sound produced by the computer. This makes computer gaming more enjoyable, as well as listening to music and watching digital media.

To install a sound card, locate an available ISA slot on the back of the computer. These slots are the longest sockets on the motherboard and there might be other cards already installed in the sockets. There are two internal openings on each of the slots at the back of the computer. So, remove the access plate at the rear of the socket to insert the sound card. Make sure the access plate on the sound card covers the hole created by removing the initial access plate. But, be sure to gently insert the sound card with a slow back and forth movement, otherwise the sound card can be damaged.

DVD Player/Burner Upgrade

With so many digital videos becoming available, many people are looking to upgrade to a DVD player and burner combo. The most power DVD player/burner currently available is the DVD+R/RW. These do tend to, however, be incompatible with older DVD-ROM drives and DVD players. But current big names in the industry, such as Sony, HP, and Phillips, support these players. DVD+R/RW drives are faster than previous models and are capable of formatting while burning data to the disc.

Motherboard Upgrade

For those who are truly serious about upgrading their computer, motherboard upgrades are another popular option. A motherboard upgrade is the most difficult upgrade to accomplish. Those who can manage, however, will enjoy the freedom of never having to buy a new computer. Instead, the motherboard can be upgraded as technology advances.

In addition to eliminating the need to buy a new computer, a motherboard upgrade also makes it easier to upgrade other components on the computer. This is because purchasing a motherboard ensures receiving the most up to date technology, which is then compatible with other upgrade components.

Upgrading the motherboard, however, requires serious advanced planning and reading of the computer manual. If done incorrectly, the computer will become nothing more than a paperweight. If finished correctly, however, the computer will remain on the cutting edge of current technology.

Saturday, March 11, 2006

Wanna Go Wireless?

The ability to access the Internet via wireless means has become one of the top selling assets for cell phones. Consider yourself being out and about, while your real estate business information is locked up tight in the memory of a personal computer. You know you have your latest client’s information in your e-mail, but unfortunately you are far away from the office, and you cannot retrieve it from anywhere else. Will you lose that multi-million dollar deal? Will you entrust your client’s information to someone else? Would it not be wonderful if you could access your e-mail account from the front seat of your parked car in the mini-mart’s parking lot? Actually, what you need is wireless access and there are five essentials you need to make it happen:

First and foremost, you will need a cell phone. Believe it or not, cell phones are the most useful gadgets to get on the Internet. While it is true that many cell phones themselves offer little web browsers, it is also true that they offer Internet access at data transfer rates of about 14.4 Kbps at best or maybe even less -- sometimes even only in the range of 9.6 Kbps. Computer users will remember that even dial-up Internet service usually operates at about 56 Kbps. Nonetheless, these little gadgets also have other tricks up their sleeves. When investing in a cell phone, be sure to choose a provider that offers data services!

Second, you will need a laptop or other notebook computer that runs an operating system that will support your cell phone’s data services software.

Third, be sure that your hardware is compatible. For example, will you be using a PC Card as a modem? Check the model number (usually imprinted on the card itself) against the specifications of the cell phone service provider. Similarly, if you will use your phone as a modem, again check the model number (usually located underneath the phone’s battery). If your cell phone service provider does not recognize your choice of modem, it will not be supported by its software, and thus will be useless to you. Additionally, this hardware cross check will enable you to ascertain what other possible hardware needs you might be facing, i.e. will you be connecting via a USB port or via a serial port?

Fourth, know your data service provider’s fine print. Not all data service plans are created equal, and the fine print will spell out the terms, conditions, and costs. For example, some plans will permit unlimited access while others will not. Many will only work in certain areas, similar to the cell phone coverage, and if you foresee traveling outside these areas you may need to sign up with an alternate provider. Other providers may contract with alternate providers to allow for seamless use, but your will be presented with two bills. Additionally, security issues are quite often on the forefront of warnings in the fine print, and many data service plans readily admit that they lack encryption, authentication or other security features. At times, these features may be available at additional cost. You will also need to be sure to understand access limitations, such as non-connectivity for periods of 90 days or more, or connection limits of 150 uses per month. Again, all of this is spelled out in the service agreement.

Fifth, and last, secure your alternate power supply! No matter how useful your data services plan is, if your cell phone or your laptop computer shut down because they run out of power, you will be as bad of as you were before. Fortunately, you may purchase a car charger (CD adapter/charger) for you cell phone, which will allow you to charge it as you drive. You will also need to buy a car charger (DC adapter/charger) for your laptop, but since the batteries in these devices may run for long periods of time, you may need it less, especially if you only use the laptop periodically.

In closing, if you have an adapter/charger, a well-rounded data services plan, and compatible equipment and software...you will travel well!

Tuesday, March 07, 2006

Tips for Securing your Home Wifi Network

By: Jim Faller


As consumers upgrade their computers and laptops and are
discovering the convenience of wireless computing, they may also
be opening themselves up to attacks from random hackers. If you
have a home network and it has wireless capabilities one of the
most important things you can do to protect yourself, your
computers and most importantly your data, is to secure your
network. You may think you are doing a good thing leaving your
wireless network open for your neighbors to use, but you may
also be allowing people to use your network to download pirated
music or movies (which you will be responsible for), send
unsolicited commercial email (aka spam) or launch viruses.

Securing your network is fairly easy and can be done by just
about anyone, even if you aren't computer savvy. If you are
using a laptop you may want to connect your computer via
ethernet cable to your router, while you are making the
configuration changes. The first thing you should do is log into
your wireless router and change the administration password and
username if possible. Leaving the default settings is like
locking your door and hiding a key under the mat. Next you want
to enable WEP (wireless equivalent privacy) security on your
router. If your router has 128 bit encryption use it, it's more
secure than 40 bit encryption. If you have an older router you
may only have 40 bit encryption, 40 bit encryption is better
than no encryption so if that's all you have use it. You will
need to enter the corresponding WEP encryption key on all of
your computers that connect wirelessly. Reboot the router and
verify you can still connect with the network cable removed. It
would be easier to make all of the changes at once and the
reboot, but if you make a mistake doing it step by step helps
you find your mistakes easier.

The next step is changing the SSID (Service Set Identifier). The
first thing you should do is change the name from its default
setting. If your router lets you disable the SSID broadcast you
should. Again make the corresponding changes on each of the
computers that connect wirelessly and reboot the router. Once
the router reboots make sure you can still connect to the
network.

Your next step is to allow access via Mac addresses. Every
computer has a unique Mac address that looks like
0A-3C-2A-55-E4-A0. Get all of the MAC addresses of all of the
computers that connect wirelessly and restrict access on the
router to only those Mac addresses. Reboot the router and verify
you can still connect.

While these tips won't keep out sophisticated professional
hackers they will keep out casual snoopers. Lastly on each
computer make sure you are sharing only the folders that you
want other people to be able to see.

© Computers.6ln.com, All Rights Reserved.

About the author:
Jim Faller is an author for http://computers.6ln.com which has
information about computer security, viruses, spyware, data
recovery and backups

Monday, March 06, 2006

Size Does Matter-In Hard Drives

The hard drive disk of a computer is the primary storage device of the computer. It is a non-removable device that retains all the information when the computer is turned off. A fast hard drive supplies the computer with data as fast as it needs. Hard drives are measured in Gigabytes (GB) and the larger the number, the more storage the computer has. When looking at purchasing a new home computer or laptop, it is important to understand how the hard drive works with your computer and how much storage capacity you will need.
When saving information on your computer, the application is recorded on a magnetic platter inside the hard drive. Most hard drives have several platters that allow them to spin up to 15,000 times per minute. The amount of hard drive space the computer has will affect how much data that can be saved. The data on a hard drive can be deleted or erased from the memory at any time and does not need a constant power supply to save the information.
It used to be that hard drives were small and had a capacity of no more than 5 MB, now most new computers and laptops have no less than 40 GB. Some hard drive capacities can exceed 120 GB. Today, computers with these capabilities can store a massive amount of information, videos and photos without getting bogged down.
Choosing a hard drive can be confusing if you are not familiar with what to look for. Hard drives can have a very high capacity and they can be very small. It is important when looking at hard drive for your computer or laptop to know what you need. Performance in a hard drive can vary dramatically. There is nothing more frustrating than trying to save information and learning your hard drive is full. If you plan on using your hard drive to store a minimum amount of information, you may not need to spend the extra money on a bigger hard drive.
For storing large files, videos, music and pictures, your computer will need to be equipped with a larger amount of hard drive space. You can purchase 160 GB and bigger of hard drive space on most computers. The general rule of thumb for purchasing hard drive space is to purchase the largest amount of space you think you will need and that you can afford.
Price is another factor when choosing the right hard drive size. The most common size of hard drive for the money ranges from 60 to 80 gigabytes. These hard drive sizes are readily available on most operating systems. They are a good economical choice for computer users needing the computer for everyday storage and use.
Besides the size of the hard drive and purchase price consider access times and transfer rates when looking at hard drives. The transfer rate is how much data can be transferred per second. This can vary though, depending on the condition of the computer. A computer that is nearly full may have a much slower transfer rate.
Transfer rates come in either internal or external. The internal transfer rate is how fast the hard drive can read the date. The external transfer rate is how fast the drive can speed data to whatever it is connected to. Usually, the transfer rate will be a little slower than listed, so it is best to get a faster transfer rate. The external rate is link to the type of hard drive that the computer is using.
Be aware that hard drive speed is affect by the computer’s capabilities. If your computer is slow, a bigger and faster hard drive will do you little good. Also, if your computer is operating slowly, a bogged down hard drive may be the problem. If your computer system is running slow, deleting unnecessary files from the hard drive. Defrag is another option used to optimize slow hard drive systems.
Fragmentation of the hard drive occurs when the operating system breaks a saved file into separate pieces and stores them in other places. This usually happens when there is not enough room to store all the date. Defrag takes those stored file fragments and pieces them back together again. The process can be time consuming, but is a good way to optimize hard drive space and the speed of the computer.

Thursday, March 02, 2006

Mac Mini

Apple has just unveiled the new Mac mini with the Intel Core Duo processor, delivering performance up to four times faster than its predecessor and providing even greater expansion in the same innovative and incredibly compact design.

Starting at just $599, the Mac mini is the most affordable way to enjoy iLife® '06, the next generation of Apple's award-winning suite of digital lifestyle applications, and features the Apple Remote and Front Row so you can play your music, enjoy your photo slideshows, watch your DVDs, iMovies, music videos and television shows from across the room.

MacMini_180x150