2010年11月29日星期一

Help me choose a low-end notebook - software

Not negligible for decent performance in a low-end notebook is the type of software installed. First, the operating system, if we can choose what kind of OS include, certainly opt for Windows XP than the heaviest view.
Vista was created with the prerogatives of hardware high-profile, if we look at the amount of resources it uses, we understand that a laptop will find it hard economic hell.

So XP will be the choice where to direct us, be sure to do so prior to purchase for the hardware in your notebook is not missing the driver release for Windows XP.
It is important, because some homes accertatevene release drivers for the operating system only when purchasing, and right now it is almost always the view.
An evaluation of a personal nature, dictated by work, that I just want to share is as follows: my notebook is updated to Service Pack 2 and later updates I chose not to run the Windows XP service pack 3 to my mind slows down not just processes. Block updates to SP2 will certainly have an effect on small leaks in security, but they are a trifle compared with the lightness maintained by the operating system. At this point you are free to decide for yourself.
A note, remember those who did not know that Windows XP (32-bit version) has the limit to "see" and then you can use up to 3 GB of RAM, this should be borne in mind in which case you want to expand this capacity over the ram . To work around this limitation you can install Windows XP 64-bit (normally referred to but are not drivers for the hardware), or alternatively view, although in view of a low-end notebook 3GB RAM really many.
An important hint on other software installed on your laptop, if you opt for older versions. And 'demonstrated that the same windows media player 10 and 11, has a downloadable web resource consumption much higher than that reported after the default installation of Windows XP.
Same for the office suite of software, older versions (Office XP or Office 2003) are much lighter (just consider the consumption of resources to realize) the latest release. Always performing as openoffice opensource versions instead (which I highly recommend to try sooner or later).
This section ends with the latter that he wanted to be a small guide to the acquisition, evaluation and use of a cheap notebook. All those written not want to be absolute rules on the choice of laptop to buy, but a way to reflect on the fact that you do not need a laptop for over a thousand euro to get a satisfactory product, as this depends entirely on what kind of use we are going to it.
A little as someone who buys a guitar from thousands of euro, and brings together two agreements, who can (economically) and do not want to hear it has all the right reasons, but certainly did not do a deal.

Other Information :
>> Acer laptop battery

>> Apple a1078 battery

>> IBM & Lenovo laptop battery

>> inspiron 1545 battery

>> Sony VGP-BPS9 battery

2010年11月26日星期五

Faces boss, the mafia on facebook


Becoming more common on Facebook and in growing numbers in other social networks, groups and profiles glorifying the mafia. When he seemed on the brink of the abyss through grueling fight recently by the police, the mob then found new life into what in effect is the main media of the new century, we enter on Facebook, you do a quick search and it can be seen springing up like mushrooms groups composed of more or less numerous fans of Toto Riina and friends.
There are obvious question: How can this be legal? How thin the line between legality and illegality in the field of freedom of expression has always been difficult, but right after these findings it is doing the threatening shadow of the government to regulate certain way this issue ...
Facebook does not take action? Social networks let loose to supporters of the mafia? Well said Senator D'Alia, to us! Having said that, in the twinkling of the Senator is proposing a rule of filtering that the Senate approve it without thinking too much about ... and as if no one expects the process of this standard will be completed as it will really troubles began then . Imagine if one day we wake up, turn on our PC, we connect and opening the homepage of Facebook, rather than on Youtube and so on, we are a better screen of the Ministry of Interior, which forbids us to enter!
We have already opened a fortune for himself on the debate within the government legitimacy or not to pass this rule without first properly amended, first of all to Peter via his blog announces that if the rule were to be approved would take a real negative state censorship against freedom of expression. He adds that the act of apology and instigation to commit a crime already prosecuted and punished in accordance with the law then there would certainly need to introduce another similar bill but with effects difficult to control and unthinkable.

In our opinion it is the users themselves trying to use what little rationality in Mother Nature should have and groped them to self-regulate in matters like this, avoiding to meet a prospect of a bleak future.
A question naturally arises hours ... We will be the new "China"? At worst we'll never get to that level of censorship, but be warned that if there were to be removed and the freedom of expression at that point would be the beginning of a new and dark era of what now is the wonderful world of Web 2.0 .
Other Electronic News :
>> Dell latitude x300 battery

>> Apple macbook pro battery

>> Fujitsu laptop battery

>> IBM Thinkpad R61 Battery

>> HP laptop battery

Faces boss, the mafia on facebook


Becoming more common on Facebook and in growing numbers in other social networks, groups and profiles glorifying the mafia. When he seemed on the brink of the abyss through grueling fight recently by the police, the mob then found new life into what in effect is the main media of the new century, we enter on Facebook, you do a quick search and it can be seen springing up like mushrooms groups composed of more or less numerous fans of Toto Riina and friends.
There are obvious question: How can this be legal? How thin the line between legality and illegality in the field of freedom of expression has always been difficult, but right after these findings it is doing the threatening shadow of the government to regulate certain way this issue ...
Facebook does not take action? Social networks let loose to supporters of the mafia? Well said Senator D'Alia, to us! Having said that, in the twinkling of the Senator is proposing a rule of filtering that the Senate approve it without thinking too much about ... and as if no one expects the process of this standard will be completed as it will really troubles began then . Imagine if one day we wake up, turn on our PC, we connect and opening the homepage of Facebook, rather than on Youtube and so on, we are a better screen of the Ministry of Interior, which forbids us to enter!
We have already opened a fortune for himself on the debate within the government legitimacy or not to pass this rule without first properly amended, first of all to Peter via his blog announces that if the rule were to be approved would take a real negative state censorship against freedom of expression. He adds that the act of apology and instigation to commit a crime already prosecuted and punished in accordance with the law then there would certainly need to introduce another similar bill but with effects difficult to control and unthinkable.

In our opinion it is the users themselves trying to use what little rationality in Mother Nature should have and groped them to self-regulate in matters like this, avoiding to meet a prospect of a bleak future.
A question naturally arises hours ... We will be the new "China"? At worst we'll never get to that level of censorship, but be warned that if there were to be removed and the freedom of expression at that point would be the beginning of a new and dark era of what now is the wonderful world of Web 2.0 .
Other Electronic News :
>> Dell latitude x300 battery

>> Apple macbook pro battery

>> Fujitsu laptop battery

>> IBM Thinkpad R61 Battery

>> HP laptop battery

2010年11月22日星期一

Let's clarify Viruses, worms, spyware, etc.

First, we start by saying that the term Virus is an often abused. Unfortunately the same thing that happened with the term "hacker" now in common usage in the sense of crackers.
In common parlance, in fact, many use the term virus to indicate, in fact, an abundance of harmful elements that, instead, should be identified by the term malware (malicious software or Malicios Software) or badware...
This "malware" is nothing but a program (or part thereof) that "does something that if we knew not let them do" as I usually call me.
This "something" can range from simple information gathering to the redirection of web pages visited, the exploitation of our connection to the exploitation of our processor, automatic sending of spam from your computer to download other malicious software in short, nothing pleasant .

Is classified as Malware?
Depending on the function of the modus operandi, the structure of the code used in the Malware can be classified into several categories:
* Virus

* Worm

* Trojan Horse

* Rootkit

* Backdoor

* Keyogger

* Botnet

* Dialer

* AdWare

* Spyware

* Downloader

* Exploit

* Spam

* Hoax
There are other minor categories such as Rogue Software (never heard of the infamous Antivirus 2009?).
Therefore, let's define what these are and what they do "nice" guests once they have settled into our system.

Definitions.
  • VIRUS
A virus itself has the ability to copy itself on a computer without the user's awareness.
A virus itself has the sole ability to copy itself from one computer to another in the form of executable code (for example through the use of USB drives, CD / DVD or other media over the Internet or a LAN) and attacks another program by copying it in its own malicious code.
  • WORM
The Worm (worm) is similar to the virus and also has the ability to spread in a network without user intervention or knowledge, but is not included in the code of other programs being himself an executable program.
Tended harm to a network (bandwidth consumption, packet collision, etc.) and not to computer files as it does a Virus.
  • TROJAN HORSE (or Trojan)
The word itself (Trojan Horse) gives some idea of what a Trojan: A program that promises one thing (pleasant, desirable) and does another (unpleasant, undesirable).
Usually they are voluntarily downloaded from the Internet consciously by someone ignorant of the ultimate goal of the application that can range from destruction of data to an attack DoS (Denial of Service).
Typically has a catchy name and / or harmless:
screensaver.exe - sex.exe - telefonogratis.exe - downloadWindowsMediaPlayer.exe
  • ROOTKIT
I will not elaborate on the explanation of the origin of the name for which refer to reading this article.
A rootkit is a malware (the above categories are not exclusive) with the ability to completely hide the system (can not find the files that make up the processes, registry keys etc. ..).
  • BACKDOOR
A Backdoor (back door) denotes a secure access to those who have already made a connection to a goal (our computer, unfortunately).
Once you open this door (it may be a program as an inherent vulnerability of a system or software) the attacker is always the door open to come back and do more "damage."
  • BOTNET
A botnet is a network of computers (called zombie) compentence controlled by a remote user.
It is used to attack other systems through a node system on the botnet so attacked the attack is detected as having been made by one of these (ignorant) nodes.
  • KEYLOGGER
A keylogger is a program that can intercept keystrokes pressed to rebuild the user's typing and send it to a remote user or save it locally for future reference.
There are also hardware keyloggers.
  • DIALER
A dialer creates, without your knowledge, a new telephone line connection or ISDN and consists, in general, premium rate number that drives the phone bill.
With the spread of DSL connections are gradually disappearing.
  • ADWARE
Adware will go with the term to refer to all those who view software, download it or play advertisements.
They are considered dangerous because many of them are also Spyware.
The advertisements, however, are used by developers to keep the costs of software production. The most popular programs are Adware: eMule_Adunanza, Eudora, Daemon Tools, RealPlayer and Messenger Plus! Live.
  • SPYWARE
We identify with this term all the programs that gather information on uses, customs and user data without his consent and transmitted through the Internet.
The most popular spyware consist Zango Search Assistant and SonicMail
  • DOWNLOADER
As mentioned in the category of programs that perform all the Downloader to download other malware on the target computer.
  • EXPLOIT
Exploit The term refers to a program (or part thereof), a set of data, especially sending packets over the Internet or a sequence of commands that could exploit a vulnerability in a target system or software installed on it.
In December 2005 it was discovered a vulnerability in Windows Metafile that allowed the attack with the simple insertion of a clip in this format in an email, it was not necessary that the user opened or i ran no content: the simple view of 'preview of the email in question caused the exploit in the target system by installing a Trojan.
  • SPAM
The Spam is the so-called "junk mail". It may contain other types of Malware.
  • HOAX
This is called "Buffalo" or false information in attempting to mislead with aspects of verosomiglianza facts or actual things and tends to throw into confusion the recipient of the information.
I have received email according to which the famous MSN Messenger would become "paid" by one of my contacts (which I promptly rebuked and informed)!

Conclusions
I tried to make this series definition as accessible as possible to those of computer security and knows very little, hoping to shed light on some little known aspects.
A quick debunk some myths about Virus, Antivirus, and Security.
Electronic News:
>> Apple ibook g4 battery

>> Toshiba pa3399u 2brs

>> Acer aspire one battery

>> HP Compaq NX9030 battery

>> Dell Latitude E5400 battery

2010年11月18日星期四

Bloom, how to upload photos and video on Facebook right from your desktop


Upload photos to Facebook, though it may be an action that brings positive results for us, is never a simple and quick accomplices also the many problems that incur on Facebook and we meet just simply in the choice of images and determining Long connections sometimes very difficult to want to miss a mistake, maybe even unknown.
And 'well then groped mitigating the myriad of difficulties in which we all run into this simple yet hard action as, for example, we did last week with our proposal for purposes like this. A program can once again give us a hand, and our choice is, this time, software Bloom.
Bloom is an easy to use program that allows you to upload photos and video on their Facebook profile from your PC directly from your desktop, thereby avoiding the use of browsers that are often in error or lost in the misinterpretation of some script.
With Bloom, as well as upload photos and videos, we also look at our pictures and our friends in comfort, we can save just click on a button, we can set the permissions and privacy regarding our multimedia content.
The use of the program is easy to interpret and is understandable in spite of the English language software. Bloom works on all major platforms (Windows 32 and 64-bit, Mac OSX, Linux) and it was thanks to the Facebook API available for developers.
One note worth mentioning is that this resource is used only after login and authorization from our personal page on the social network, to give only the first time. You can download it from this page of our extensive download section and, as far as we can tell, hardly regret it.
More Related News :
>>  PA3399U-2BRS battery

>>  IBM Thinkpad R61 Battery

>>  Dell XPS M1330 Battery

>>  Toshiba pa3285u 3brs

>>  Sony VGP-BPS9/S battery

2010年11月11日星期四

Care for Laptop Batteries

Lithium Ion Laptop wear due to two factors: 1) the active use of your notebook battery and 2) the natural aging of the laptop battery. Both will wear your notebook battery with time the trick is to minimize their impact while achieving the performance of your laptop battery that you need.
So rule number one is: keep your cool battery ofcomputer Cell. Manufacturers Batteries for computer Mobile store their products at about 60F. (It does not help to put them in the fridge, and you can damage the Apple macbook pro battery by freezing it.)
The second most important thing to understand about Batteries ofcomputers laptops is that their capacity decreases with each cycle of loading and unloading (or use). This in itself is not surprising - but when combined with the previous point, it leads to a surprising conclusion.
When laptop users leave their battery ofcomputer Cell inside the machine, but leave thecomputer plugged into the wall, the Dell Inspiron 1525 Battery ofcomputer Mobile is going through a constant cycle of charge-discharge. The device is used to sitting inside the notebook, exercise a little faster than normal due to the heat of thecomputer Cell. Once its charge level drops to a predetermined level (which is different for each manufacturer), AC adapter provides extra juice to "top it off" the battery from thecomputer. As the laptop Pavilion DV6000 battery gets older, it tends to self-discharge a little faster, which speeds the process even further.
Lithium ion laptop normally offer 600 to 800 charge / discharge of over 1.5 to 3 years of useful life. When you use your laptop as described above, you do not use your offer to recharge.
An additional note: many people recall that Batteries of computers most phones on the first computers work best when they were fully discharged before being recharged. While this remains true for Nickel-cadmium, lithium ion laptop today work best when they are recharged when they still have a capacity of 10 to 20%. So if you use your laptop on a long flight, try not to get into the habit of using the Apple powerbook g4 battery a1078 ofcomputer laptop until it has almost no load. Your laptop battery literally will not be the same when you reload the next time.
Some guidelines for Batteries of computers Phones:
1. Remember that Batteries New laptops usually come in a discharged state, you must charge for at least four hours before first use.
2. Keep his cool Compaq presario cq50 battery ofcomputer portable, but do not put it in the refrigerator or freezer.
3. Do not use the battery ofcomputer laptop if you do not! Many people keep their laptop plugged in most of the time. They can keep their laptop Dell latitude d420 battery for storing the battery outside of thecomputer laptop in a cool place.
4. Try to avoid running the battery in your computer Mobile all the way to zero.
5. Do not charge your notebook Thinkpad x60 tablet battery before long periods of inactivity.
6. Although we would like to sell you Batteries more portable, do not buy extra batteries computer laptop for later use. The more you take, the less useful life they provide.

2010年11月9日星期二

Lithium-Ion chemistry batteries is the power behind today

If you own a laptop, chances are very very good which is probably powered by a lithium-ion (Li-Ion). This type of VGP-BPS9A/B battery has been applied in a wide variety of consumer electronics, including PDAs and cell phones.
They dominated market Batteries Rechargeable today for laptops because they are much lighter than other types of Batteries laptop, they retain their charge longer than other technologies, and because they do not suffer from memory effect phenomenon. Type LithiumIon has twice the energy density of a standard nickel cadmium Apple macbook pro 17 inch battery. In addition, Batteries LithiumIon has a single cell voltage of 3.6 volts and 1.2 volts per cell Batteries nickel-cadmium batteries.
However, the disadvantages associated with Batteries LithiumIon are: the possibility of a failed battery may catch fire under adverse conditions, they are more sensitive to high temperature environments than other technologies Batteries in their ability to retain their charge, they may fail if they are completely discharged, and the legacy of the chemical Dell latitude d630 battery degrades with age, as opposed to the strong correlation between failure and battery charge / discharge cycles battery chemistries elderly.
The Batteries Lithium-Ion computer also require protection circuits to be incorporated into the battery to monitor battery voltage and provide a safe and current levels and to ensure that the Apple A1185 battery temperature remains in a range of safe operation.
Cylindrical cells LithiumIon are generally tubular in shape, somewhat like the form of standard notebook batteries. Several cells are enclosed in a plastic case and the individual cells are connected so as to provide the proper output voltage and maximize storage capacity (rated in milliamp-hours). The prismatic Lithium-Ion form are also available, but they are much smaller and are typically used in devices like cell phones where weight and space is a primary consideration.
There are several things that affect the life of a laptop battery LithiumIon. Battery degradation is accelerated by heat, if the storage battery in a cool will prolong its life. Manufacturers generally recommend a storage temperature of about 60F for long term storage of Batteries LithiumIon. These BatteriesAs mentioned above, does not retain a memory of partial discharge cycles, the discharge cycles to complete are not necessary. In fact, cycling part of the battery will help to prolong his life.
The Batteries Lithium-Ion batteries have a limited life span as technology Batteries older, but they are relatively independent of their charge cycles and is mainly related to their age. A standard battery lasts only 2-3 years. This is true even if the ThinkPad T42 battery is unused so it is important not to buy a laptop battery replacement until it is ready to be put into service.

2010年11月2日星期二

Tips to maximize battery life of your laptop

As more and more a part of the mobile workforce and using laptop or Tablet PC battery life is often a major concern. Today's laptops use lithium-ion batteries instead of older sources of power style nickel-cadmium batteries as ThinkPad T60 battery.
While it will add to the cost it can provide up to twice the use of a battery normally. To make the most of your Lenovo Thinkpad x61 tablet battery you'll need to understand a little about how battery work. Each battery has a limited number of charge cycles. If your battery lasts four hours and the first day you use it for 2 hours and then recharge it fully and the next day you use it again for 2 hours, then fully recharge it again, you have completed a charge cycle. Each battery has a limited number of charge cycles before it starts to lose its load it can hold.
If you do use your wireless connection to connect to the Internet or network disable the wireless connection, it will extend the life of your battery. The same is true for Bluetooth connections. Another way of prolonging your life for the HP pavilion dv8000 battery is to decrease the brightness of your monitor. Finally keep in mind that using your computer laptop to play a DVD movie uses more power than using a spreadsheet.
If you find that you are often using the computer with the battery fully charged while connected to the main power supply, you can remove the battery. Keep the battery is fully charged during high temperature, which is typical of the conditions of a computer laptop is always connected to the mains, may shorten its lifetime. Discharging the Dell latitude d830 battery regularly is also conducive to the life of battery time. Under optimum battery computer laptops going to last 24 to 36 months, under less optimal, you can shorten the lifespan to 12 to 18 months.
To help keep your battery in optimum operating conditions try to fully discharge it once a month. Many people find it useful to set a calendar reminder so they do not forget. If you find your Dell inspiron 1545 battery lasts less than 60 minutes, try to fully discharge it several days in a row. Just leave your computer on overnight with no applications running. Be sure to disable the alarm or less power than the warnings are associated with your power settings. If this does not work, you must replace the Cf623 battery.