显示标签为“Compaq”的博文。显示所有博文
显示标签为“Compaq”的博文。显示所有博文

2011年1月27日星期四

PhotoScape - different image processor for bloggers


When I first drove PhotoScape I was really impressed. I still am. If I do not have access to a license for Photoshop, or if I should use a computer that is not greasy stools with Adobe programs, usually the choice to fall on PhotoScape. It is a different image editing program that is divided into various tools. The interface is neat and it is not difficult to learn.
In many ways PhotoScape the ultimate free program in imaging for bloggers.  It contains, inter alia, namely smart features to automatically scale the frame and put on more pictures. Say you took several digital photos that you want to publish to your blog. Then you need to rescale the images and maybe you want a frame around them.Select multiple images, make settings and let PhotoScape do the work for you.
More features worth mentioning is the excellent part of the collage. Here you will find a wide range of ready-made formats, ie types of collagen. After selecting one, then just drag and drop images on each frame in the collage. Then save your collage as a common Jpeg and upload to the blog. Furthermore, there is a feature for creating GIF animations.
PhotoScape is different from its competitors, but it's different in a good way. It is clearly worth a try!
Terminology :  Dell Vostro 1500 batteryApple Macbook Pro batteryCompaq Presario CQ60 batteryThinkPad t61 batterySony vgp-bpl13 battery

2010年11月22日星期一

Let's clarify Viruses, worms, spyware, etc.

First, we start by saying that the term Virus is an often abused. Unfortunately the same thing that happened with the term "hacker" now in common usage in the sense of crackers.
In common parlance, in fact, many use the term virus to indicate, in fact, an abundance of harmful elements that, instead, should be identified by the term malware (malicious software or Malicios Software) or badware...
This "malware" is nothing but a program (or part thereof) that "does something that if we knew not let them do" as I usually call me.
This "something" can range from simple information gathering to the redirection of web pages visited, the exploitation of our connection to the exploitation of our processor, automatic sending of spam from your computer to download other malicious software in short, nothing pleasant .

Is classified as Malware?
Depending on the function of the modus operandi, the structure of the code used in the Malware can be classified into several categories:
* Virus

* Worm

* Trojan Horse

* Rootkit

* Backdoor

* Keyogger

* Botnet

* Dialer

* AdWare

* Spyware

* Downloader

* Exploit

* Spam

* Hoax
There are other minor categories such as Rogue Software (never heard of the infamous Antivirus 2009?).
Therefore, let's define what these are and what they do "nice" guests once they have settled into our system.

Definitions.
  • VIRUS
A virus itself has the ability to copy itself on a computer without the user's awareness.
A virus itself has the sole ability to copy itself from one computer to another in the form of executable code (for example through the use of USB drives, CD / DVD or other media over the Internet or a LAN) and attacks another program by copying it in its own malicious code.
  • WORM
The Worm (worm) is similar to the virus and also has the ability to spread in a network without user intervention or knowledge, but is not included in the code of other programs being himself an executable program.
Tended harm to a network (bandwidth consumption, packet collision, etc.) and not to computer files as it does a Virus.
  • TROJAN HORSE (or Trojan)
The word itself (Trojan Horse) gives some idea of what a Trojan: A program that promises one thing (pleasant, desirable) and does another (unpleasant, undesirable).
Usually they are voluntarily downloaded from the Internet consciously by someone ignorant of the ultimate goal of the application that can range from destruction of data to an attack DoS (Denial of Service).
Typically has a catchy name and / or harmless:
screensaver.exe - sex.exe - telefonogratis.exe - downloadWindowsMediaPlayer.exe
  • ROOTKIT
I will not elaborate on the explanation of the origin of the name for which refer to reading this article.
A rootkit is a malware (the above categories are not exclusive) with the ability to completely hide the system (can not find the files that make up the processes, registry keys etc. ..).
  • BACKDOOR
A Backdoor (back door) denotes a secure access to those who have already made a connection to a goal (our computer, unfortunately).
Once you open this door (it may be a program as an inherent vulnerability of a system or software) the attacker is always the door open to come back and do more "damage."
  • BOTNET
A botnet is a network of computers (called zombie) compentence controlled by a remote user.
It is used to attack other systems through a node system on the botnet so attacked the attack is detected as having been made by one of these (ignorant) nodes.
  • KEYLOGGER
A keylogger is a program that can intercept keystrokes pressed to rebuild the user's typing and send it to a remote user or save it locally for future reference.
There are also hardware keyloggers.
  • DIALER
A dialer creates, without your knowledge, a new telephone line connection or ISDN and consists, in general, premium rate number that drives the phone bill.
With the spread of DSL connections are gradually disappearing.
  • ADWARE
Adware will go with the term to refer to all those who view software, download it or play advertisements.
They are considered dangerous because many of them are also Spyware.
The advertisements, however, are used by developers to keep the costs of software production. The most popular programs are Adware: eMule_Adunanza, Eudora, Daemon Tools, RealPlayer and Messenger Plus! Live.
  • SPYWARE
We identify with this term all the programs that gather information on uses, customs and user data without his consent and transmitted through the Internet.
The most popular spyware consist Zango Search Assistant and SonicMail
  • DOWNLOADER
As mentioned in the category of programs that perform all the Downloader to download other malware on the target computer.
  • EXPLOIT
Exploit The term refers to a program (or part thereof), a set of data, especially sending packets over the Internet or a sequence of commands that could exploit a vulnerability in a target system or software installed on it.
In December 2005 it was discovered a vulnerability in Windows Metafile that allowed the attack with the simple insertion of a clip in this format in an email, it was not necessary that the user opened or i ran no content: the simple view of 'preview of the email in question caused the exploit in the target system by installing a Trojan.
  • SPAM
The Spam is the so-called "junk mail". It may contain other types of Malware.
  • HOAX
This is called "Buffalo" or false information in attempting to mislead with aspects of verosomiglianza facts or actual things and tends to throw into confusion the recipient of the information.
I have received email according to which the famous MSN Messenger would become "paid" by one of my contacts (which I promptly rebuked and informed)!

Conclusions
I tried to make this series definition as accessible as possible to those of computer security and knows very little, hoping to shed light on some little known aspects.
A quick debunk some myths about Virus, Antivirus, and Security.
Electronic News:
>> Apple ibook g4 battery

>> Toshiba pa3399u 2brs

>> Acer aspire one battery

>> HP Compaq NX9030 battery

>> Dell Latitude E5400 battery

2010年4月9日星期五

Taking the iPad and leaving the notebook at home is versatility Later

 

Favorable government policies, and subsidies for renewable energy attracting the flow of investment in this sector. GBI investigation is confident of the huge investment opportunities for renewable energy during the projection period. Among all the clean technology areas of agriculture said the minimum number of investments. of industry experts, interviews with GBI investigation suggested that the solutions to mitigate the agricultural footprint of climate change are available TO Inspiron Mini 9 (all 8.9 series), but that the methods for implementation success is yet to be discovered. Concerns about food safety, adverse weather conditions, increasing population and energy independence is to promote clean technology investments.
In comparison, the Congo-based Dell Latitude D410 Battery, which can play back a tape full HD LCD TV that you exhausted in about four hours to three cells.

Additionally, the Lenovo IdeaPad Y550 also has Gigabit Ethernet, Wi-Fi 802.11n and Bluetooth 2.1 connectivity. Besides the standard set of input / output ports around body (USB, headphone, microphone, VGA, sound recording DVD, reader multicard), the Lenovo (IBM ThinkPad T40 Battery) IdeaPad Y550 also includes a slot ExpressCard, an HDMI and eSATA port. There is a 1.3MP camera indentation at the top of the screen the crown of the Lenovo IdeaPad Y550. Ports placement is well thought out the IdeaPad Y550? Lenovo has made clever use of the front edge of the laptop IdeaPad Y550 includes headphones, microphone, card reader slot, and a Wi-Fi toggle button.
Intel is fighting back with a massive R & D dollars to get back in. But even if Intel Atom processors using more advanced process technology (45nm), the lag processors ARM (the Apple A4, nVidia Tegra 2, Qualcomm Snapdragon etc.) from FABS less advanced in the area is most important - performance per Watt of electricity consumption. Simply speaking, this is the performance for a given HP Compaq NC6230 battery life.
The display unit of HP (HP Compaq NC6120) has sent me to review a 1.66GHz Intel Atom N450 processor, 2GB RAM, 250GB hard drive, Windows 7 Professional, and a 10.1 inch, 1024 x 600 pixel touch screen. It also, 802.11a/b/g/n WiFi and Bluetooth 2.1 wireless.FYI, this review is rather lengthy. If you want to cut to the chase, you can skip to the end for a video review.
Besides the standard set of input / output ports around body (USB, headphone, 85wh apple A1172 Adapter, microphone, VGA, sound recording DVD, reader multicard), the Lenovo IdeaPad Y550 also includes a slot ExpressCard, an HDMI and eSATA port. There is a 1.3MP camera indentation at the top of the screen the crown of the Lenovo IdeaPad Y550. Ports placement is well thought out the IdeaPad Y550? Lenovo (IBM ThinkPad T43 Battery) has made clever use of the front edge of the laptop IdeaPad Y550 includes headphones, microphone, card reader slot, and a Wi-Fi toggle button.
But Jupiter, which has a history of designing low-power processor, is expected to deliver a comparable laptop battery time a person based netbooks released when high-def netbooks in 3 months.
And there is just enough room for the touchpad, the surface is small and the buttons are tiny. It's about a quarter inch deep and just on the edge of the laptop ibook g4 adapter. If you lose the keys (not hard to do), slide your thumb from the laptop completely. The trackpad does multitouch features, but the response is inconsistent, sometimes two finger scrolling works just fine, sometimes the trackpad does not notice it at all.
For $ 369, you do not get much more than any other Netbook when it comes to internal specs and ports, 1GB RAM, a hard disk 160GB, and a simple VGA-out included. The lone element is also a port USB. Netbooks that cost more, like the Toshiba (Toshiba Portege M205) NB305, tend to have a 250GB hard drive. Netbooks with nearly identical feature sets S10-3 can be had for $ 299-case, the Acer Aspire One battery.
The latter will therefore provide for taking the iPad and leaving the notebook at home is flexibility. The iPad is a direct-to interconnection and can easily transition from playing music to watching a movie, Apple A1175 battery to type a document in Pages, surfing the internet (if your flight is so equipped) to play a game of Tetris. It offers both business productivity and entertainment consumers in a thin package.
TrackBack URL