Tuesday, December 25, 2007

Intresting Technology News

A lot of interesting stuff going on today, most of it I don’t have time to comment on, just read.

Internet Explorer 8 and Acid2: A Milestone As a team, we’ve spent the last year heads down working hard on IE8. Last week, we achieved an important milestone that should interest web developers. IE8 now renders the “Acid2 Face” correctly in IE8 standards mode.

Duke Nukem Forever Teaser Debuts on Shacknews Following yesterday’s screenshot release, Shacknews is pleased to premiere the first new Duke Nukem Forever teaser trailer in over six years. According to George Broussard of developer 3D Realms, the approximately minute-long video was originally created internally for the purpose of holiday festivities and marks the beginning of further media unveilings surrounding the notoriously long-in-development first- person shooter.

Antivirus firm: Google text ad Trojan detected Advertisements placed by Google in Web pages are being hijacked by so-called Trojan horse software that replaces the intended text with ads from a different provider, Romanian antivirus company BitDefender says.

The Trojan redirects queries meant to be sent to Google servers to a rogue server, which displays ads from a third party instead of ads from Google, BitDefender said in a statement.

The Ultimate Fate of Supplemental Results In 2003, Google introduced a “supplemental index” as a way of showing more documents to users. Most webmasters will probably snicker about that statement, since supplemental docs were famous for refreshing less often and showing up in search results less often. But the supplemental index served an important purpose: it stored unusual documents that we would search in more depth for harder or more esoteric queries.

Worm Hits Google’s Orkut Google’s Orkut social networking site appeared to have been hit by a relatively harmless worm, but one that demonstrated the continuing vulnerability of Web applications.

The People Inside Google’s Black Box After I wrote about Google’s search technology earlier this year, I got an e-mail from an engineer at another search engine telling me not to believe Google when it said its search results were simply the product of fancy formulas. Google, he said, has human beings helping to pick the best sites for many queries.

Intel to delay launch of three 45nm quad-core CPUs on poor AMD performance Intel has recently adjusted its product strategy and will postpone three 45nm quad-core CPUs that were originally scheduled to launch in January next year, according to sources at motherboard makers.

Intel has already notified its partners that it will push back the launch of the three CPUs to February or March next year, depending on AMD’s schedule for triple-core and the upcoming Phenom CPUs.

Firefox 3 Beta 2 now available for download Firefox 3 Beta 2 is now available for download. This is the tenth developer milestone focused on testing the core functionality provided by many new features and changes to the platform scheduled for Firefox 3. Ongoing planning for Firefox 3 can be followed at the Firefox 3 Planning Center.

Source: tipsdr

Software errors to delay hybrid drive takeoff

A report from market researcher Objective Analysis predicts that only about 13 million of the hybrid hard disks that incorporate NAND flash for caching key data will ship in 2008 due to software errors.

"Microsoft has a good concept with its ReadyDrive software, but they can't devote attention to it because they have diverted energy to fixing Vista bugs," said Jim Handy, principal of Objective Analysis.

Early benchmarks of the drives have given them mixed results so far, Handy said, indicating performance tuning is needed. "Some of the benchmarks suggest the hybrid drives run some software faster and other software slower," he said.

The new drives, aimed primarily at notebook computers, "will become significant but not next year, and their success is contingent on Microsoft putting adequate attention on the software issues," Handy said.

The firm estimates fewer than one million hybrid drives will ship this year and only about 13 million in 2008. However, shipments could rise to 90 million in 2009 and 220 million in 2010.

Only Samsung and Seagate current have shipping hybrid drives. Both companies have models with 256Mbyte NAND cache and drive capacity of 80-, 120- or 160Gbyte. Other drive makers are waiting for market demand to pick up before launching the products, he said.

Using software in Vista, the hybrid drives are geared to slash the time for booting a system or loading applications. The code can also cache frequently accessed data.

In addition, the hybrid drives may hamper the rise of solid-state drives (SSD) that use flash memory and aim to give a bigger boost in performance and reliability but at a steeper cost. Handy estimated a hybrid drive carries a premium of about $10 while a SSD carries a premium of as much as $300.

"Hybrids offer 80 percent of more of the performance of solid-state drives at a much lower cost," he said.

Source: EETASIA

Wednesday, December 19, 2007

Latest Version of Firefox 3.0 Goes to Developers

Christmas came a little early for developers this year. Mozilla on Wednesday released the second beta version of Firefox 3.0 that promises enhanced security features and performance capabilities.

The release features an enhanced location bar that matches against page titles and addresses from local history, bookmarks and tags. It also incorporates feedback about security from Beta 1 testers, and includes an "effective top-level domain" that ensures that cookies and other Web content is only visible in a single domain, Mozilla said.

The company cautioned that the release is only geared toward Web developers and Mozilla's testing community, and is not intended for the average Web user.

"We encourage testers to download and install the Beta 2 release to test it against the Web sites they normally visit, and provide feedback about any incompatibilities," Mozilla said in a statement. "It is intended for testing purposes only."

Additional enhancements include more easily decipherable security notices, and a password manager that checks to make sure the correct password has been entered before Mozilla saves it. There is also an automatic check for insecure plugins, extensions and Java, and anti-virus integration with the new download manager.

Beta 2 also includes revamped personalization tools, improved text and graphics rendering, support for offline browsing and Web-based protocol handlers, and full-page zooming, Mozilla said.

Developers interested in testing out the release can visit the Mozilla developer center for more information.

Mozilla released version one of 3.0 in November. It later said it would fix only 20 percent of its known bugs before the latest version of the browser is released in its final version next year. Mike Shaver, Mozilla director of ecosystem development, subsequently penned a blog post that said that 20 percent prediction was a misunderstanding.

Source: PCMAG

Tuesday, December 11, 2007

Drive to use legal computer software

Domestic enterprises wanting to go public should aim to use legal computer software, an official said Monday.

The country will work strenuously to encourage and supervise enterprises to build a sound environment for the software industry, head of copyright administration Liu Binjie added at a national legal software conference.

"Strengthening protection for legal software and creating a conducive environment is a significant part of the national intellectual property rights (IPR) strategy", said Vice-Premier Wu Yi, who is also head of the national IPR working team, in a letter to the conference.

Initiated last year by nine authorities including the copyright and information industry, commerce, finance administrations and regulators of banks, insurances and securities firms, the ongoing campaign targeting enterprises is seen as a powerful government effort to realize the wide use of legal software.

Domestic enterprises are responding positively to the country's call to use legal computer software since then, Liu said.

More than 1,500 large enterprises with annual sales of over 300 million yuan ($40.5 million) are currently using legal computer software, a result of the nine ministries' efforts to weed out software piracy nationwide.

The groups include the headquarters of the major 157 State-owned enterprisessuch as Sinopec and Huaneng Group, and their subsidiaries across China.

Another 1,300 large-scale en-terprises are reportedly speeding up efforts to install licensed software on the operating system of their computers.

Source: China Daily

Monday, December 3, 2007

IE Expecting Threats from Hackers

Microsoft Corp said Monday that a flaw in the way its Windows operating system looks up other computers on the Internet has resurfaced, and could expose some customers to online attacks.

The flaw primarily affects corporate users outside of the U.S. It could theoretically be exploited by attackers to silently redirect victims to a malicious Web site.

Microsoft originally patched this flaw in 1999, but it was rediscovered recently in later versions of Windows and subsequently publicized at a recent hacker conference in New Zealand. "This is a variation of that previously reported vulnerability that manifests when certain client-side settings are made," said Mike Reavey, a group manager at Microsoft's Security Response Center.

The bug has to do with the way Windows systems look for DNS (Directory Name Service) information under certain configurations.

Any version of Windows could theoretically be affected by the flaw, but Microsoft issued an advisory Monday explaining which Windows configurations are at risk and offering some possible workarounds for customers. The company said it is working to release a security patch for the problem.

Here's how the attack would work: When a Windows system is specially configured with its own DNS Suffix, it will automatically search the network for DNS information on a Web Proxy Auto-Discovery (WPAD) server. Typically this server would be a trusted machine, running on the victim's own network.

WPAD servers are used to cut down on the manual configuration required to get Windows systems working on the network. DNS suffixes are used to associate computers with certain domains of the network and to simplify administration.

To make it easier for the PC to find a WPAD server, Windows uses a technique called DNS devolution to search the network for the server. For example, if an IDG PC was given a DNS suffix of corp.idg.co.uk, it would automatically look for a WPAD server at wpad.corp.idg.co.uk. If that failed, it would try wpad.idg.co.uk and then wpad.co.uk.

And that's where the problem lies. By looking for DNS information on wpad.co.uk, the Windows machine has now left the IDG network and is doing a DNS look-up on an untrusted PC.

Reavey says that this problem only affects customers whose domain names begin with a "third-level or deeper" domain, meaning that even with the DNS suffix, users on networks like idg.com or dhs.gov are not affected.

Attackers who registered "wpad" domains within second-level domains such as co.uk or co.nz could redirect victims to malicious Web sites without their knowledge -- a "man in the middle" attack." An victim might think he was visiting his bank's Web site, but in reality, he could be sent to a phishing site.

"It's particularly insidious because a lot of people don't realize that this is happening," said Cricket Liu, vice president of architecture with DNS appliance vendor Infoblox. To date, Microsoft has heard of no such attacks actually being carried out, Reavey said.

Customers who have set their own proxy server or who have a WPAD server on their network are not at risk, Microsoft said.

Still, according to the New Zealand security researcher who discovered this flaw, many customers could be affected. Beau Butler, who also happens to own the wpad.co.nz, domain estimates that about 160,000 PCs are affected by the problem in New Zealand alone, according to a published report. Butler could not be reached immediately for comment on this story, but in a note on a local Linux group Web site, he said he is collecting Web server data from this domain.

Monday, November 26, 2007

Work online on Office Documents with Instacoll

You have a desktop or laptop PC, with a connection to the Internet. You still use earlier versions of Microsoft’s Office tools such as the word processor Word, the presentation tool Powerpoint and the spread sheet Excel. You have not upgraded to the latest — 2007 — versions of MS Office. May be you could no longer afford to do so.

Thirty Indian engineers based in Bangalore have created a suite of online productivity tools that enables such users to enjoy the look, feel and much of the functionality of the newest edition of the three main Microsoft Office tools by downloading for free, a 5-megabyte chunk of software. What’s more, they can work on their files, from any machine anywhere by accessing them from a 100 megabyte storage space that is provided to them on the Web; they can switch seamlessly from desktop to Web and back; they can share their files from chosen friends or colleagues; they can collaborate on a single document, deciding who can share what, and exchanging comments live through text pop-pops… all this on any platform, Windows, Linux, Unix or whatever.

The application is called Live Documents. It was unveiled a few days ago to a lot of global interest and critical scrutiny. It is the work of the Bangalore-based InstaColl, a wholly Indian Internet-driven company whose Chairman and inspiration is Sabeer Bhatia, the man who co-developed Hotmail, the world’s first Web-based e-mail service, which he subsequently sold to Microsoft.

While the ability to use Live Documents is free for individual users (You can apply for an invitation to join at www.live-documents.com but due to the huge number of requests in the last few days, the company is having to beef up its infrastructure and it might take 3-4 weeks to receive your authorisation.)

Sunday, November 25, 2007

Windows Vista Memory Issues or Problems

It’s been said that you need a “super computer” to run Vista and now that some new information has come to light, that may not be too far from the truth.

As it turns out, “Windows for Supercomputers” aka Windows HPC (High Performance Computer) Server 2008 requires less memory to run than Vista does. Granted, super computers are usually not general computing platforms but are designed to do one specific task and be fast at it. That may not be much of an excuse for the issue at hand but it needed to be pointed out.

All versions of Vista require a minimum of 1GB of memory except for the Home Basic version which can run on as little as 512MB, but won’t necessarily be fast on said amount of memory.

Windows HPC server 2008 can run on 512MB of memory but it is designed for cluster computing and Vista is designed for Home and Office use but still requires 1GB of memory but runs best on 1.5GB to 3GB (32-bit versions) or 4GB and beyond (64-bit versions).

However, Microsoft noted that Windows HPC server runs best with more memory, just like Vista does and unlike Vista, HPC server supports up to 64GB of memory and more processors.

A spokesperson for the company explained to PC World, “The minimum hardware requirements for Windows HPC Server 2008 are similar to the hardware requirements for the x64-based version of the Windows Server 2008 Standard operating system.”

Sunday, November 11, 2007

Remote PC Repair - Unleashed - Go for it!

Consumers and SOHO users seeking a remote PC repair service can easily find a bevy of choices by plugging the term "remote PC repair" into any Internet search engine. Be aware, though, that not all remote PC repair Web sites operate the same way. They charge a wide range of prices, and all do not offer the same service solutions and guarantees of satisfaction.

After the initial warranty period has expired on a desktop or laptop computer, consumers, SOHO (small office/home office) users and SMBs (small- and medium-sized businesses) may find themselves stranded when computer woes strike. Without costly warranty extension plans or an IT department, there is little to do but pay up.

An alternative to costly local repair shops and third-party service contracts is getting technical help from a growing number of online and phone-based repair services. Remote PC repair centers -- Internet-based tech support Web sites -- are fast becoming an oasis for computer users and small companies that lack IT departments.

Part 1 of this two-part series on remote PC repair considers no-warranty options. This installment compares a few remote repair possibilities.

OS Matters
"Remote PC support service is beneficial for small businesses with fewer than 10 computers. This is the marketing niche -- consumers and the work-at-hope population," David Gerhart, CIO of My Computer Works, told TechNewsWorld.

Like much of the computing market involving consumers and SOHO workers, remote PC repair services mostly cater to the installed base of users of a particular computing platform. The realities of the marketplace, therefore, provide Microsoft (Nasdaq: MSFT) Windows users the lion's share of service and support.

Few remote support centers exist for Mac and Linux operating systems beyond the traditional user discussion forums and dedicated developer communities. Some centers have limited support for Mac issues, and even fewer sites offer meaningful help for Linux users. Finding remote PC repair help for Linux problems is especially challenging because of the wide range of free and paid distributions.

"Usually, if you are running Linux, you better have a contact handy to help you out if there are issues," Matthew Dworkin, a Geek Squad technician at a Best Buy (NYSE: BBY) store, told TechNewsWorld.

Changing Roles
However, it is possible for consumers and SOHO users -- even adherents to Mac and Linux platforms -- to find help without outsourcing tech support to long-term IT providers. The same type of system adjusting that IT staffs provide through a master console connected to a network can now be applied to individual users of any platform.

"Service technicians across the world have the same powers and abilities that users sitting in front of the desktop themselves have. So now, as long as you can connect to the system itself, you can perform the same troubleshooting on a Windows machine -- if you have appropriate administrative access -- that previously was only available remotely to Linux users," Dworkin said.

Still, there are limits to a remote operator's ability to hop onto a computer and fix Linux or Mac problems in the same way one can with Windows -- mostly because both of those non-Windows platforms are so customizable, he explained.

No Shortage
Consumers and SOHO users seeking a remote PC repair service can easily find a bevy of choices by plugging the term "remote PC repair" into any Internet search engine. One such search revealed more than 10 pages of hits.

Be aware, though, that not all remote PC repair Web sites operate the same way. They charge a wide range of prices, and all do not offer the same service solutions and guarantees of satisfaction. However, these online service centers for ailing computers generally deliver what they promise, assured Gerhart.

Here are three companies that offer remote PC repair service -- each one employs a different approach. These are a representative microcosm of the types of Web sites waiting to fix your ailing PCs.

Tuesday, November 6, 2007

Your Tech Support Executive Just A Call Away!

Imagine yourself working on an extremely important project and then bothered by a technical default in your computer. The moment can be highly frustrating. However, you can now get tech support online, through do-it-yourself programs. This not only saves your time but money as well, which is why more and more companies running operations on small and large scale prefer to beef up their electronic support offerings.

Of all computer savys, small business owners and computer enthusiasts working from home or using PCs for fun are benefitted most from Online computer support services. The best part of using live tech support is that the owner controls the actions taken on his/her system.

Calling any technical support executive at your premises can make you spend loads of dollars unnecessarily. Contrary to this, online tech support services offer a comprehensive package of efficient solutions at incredible prices. Companies offering such kind of tech-help generally have different yearly packages that are budgets-friendly too. Such an array of options is largely available for small business PC support.

Availing online computer support has proven to be cost efficient for small-scale operations. With significant advances have been done in recent years, technology assisted programs have tended to be associated with huge success. Small scale businesses based in the US, UK, and Canada are largely leveraging the online PC support services to transform their business for consistent results as their computer complexities increase.

Small businesses understand the necessity and headaches of the advanced technology. A desire for smooth functioning encourages a need for them to get their mundane Computer Repair and tech support issues handled in a user friendly manner.

Companies providing tech support offers high-touch customer experience which allows you to sit back and watch your problem getting resolved within an hour. Small businesses can avail the benefits of the online tech support for PC repair to ensure smooth functioning of operating systems in order to perform their individual roles and responsibilities in the most effective manner.
Source: http://www.tech-support-news.com

Monday, October 29, 2007

Apple - Eat or Sweet Operating System Launched

Apple's delayed update to the Mac OS X operating system is hitting store shelves as consumers are increasingly snapping up Macintosh computers to complement their iPods and iPhones.

Dubbed Leopard, the upgrade has gone on sale at stores around the world. It offers improvements to an operating system that already was widely praised for its ease-of-use and slick interface.

Leopard boasts more than 300 new features, including one called 'Boot Camp' that lets users instal Windows on Macs, though both operating systems cannot run at the same time. 'Time Machine,' an automated data backup system, and 'Spaces,' a way to simultaneously view open applications, are among the other highlighted features.

Macs have reached record sale levels, and the launch of Leopard is expected to bolster a continuing rise.

At Apple's flagship 5th Avenue store in New York City, a line of about 500 people snaked around the block before Leopard went on sale. The anxious, some of whom queued up more than four hours beforehand, included not only the longtime Apple faithful but new converts. Patrick van Rosendaal, 31, visiting from Columbus, Ohio, stood in line for an hour and a half before he got his hands on a shrink-wrapped copy of Leopard. He bought his first Mac two months ago. "Macs are still rather new to me," he said. "But I'm completely addicted."

Novell unleashed one more Gem in the Operating System Segment

Novell India has released the latest version of PC operating system openSUSE - version 10.3. has a dual-boot (an option to start running either Linux or Windows on the PC), compatibility of OpenOffice.org office suite with Microsoft Office and better multimedia support.

The latest GNOME and KDE desktop environments have been included, including a KDE 4 preview. AppArmor protects the operating system and applications from attacks, viruses and malicious applications. Version 10.3 also now includes MP3 support for Banshee and Amarok, the default media players.

Users can also set up a home network and run a Web server with virtualisation software such as Xen 3.1 and VirtualBox 1.5 on the OS. With ‘1-Click Install’, the installation of new drivers and applications is simplified. OpenSUSE is created by the openSUSE project, which has more than 54,000 registered members.

Monday, October 15, 2007

Fight against Spyware - Choose the right Anti-Spyware

If you ever go online, you know what can happen. Without the right software to protect it, your computer is vulnerable to all kinds of viruses, trackers and other intruders. This you already know. Because every time you turn around, there's something new on the market that claims it's crucial to the safety of your PC. Heck, you even get spam about protecting your computer from spam.

If you paid attention to all of this, you'd end up with a hard drive full of anti-virus programs and a whole host of spyware seekers. Which would really slow down your computer, if nothing else. So what do you truly need to protect your home PC? We asked Monica Forrest, who's a DCI -- that's deputy of counterintelligence -- for Best Buy's cheeky computer support team, the Geek Squad. (Don't ask about the job title. It's a geek thing.)

Here's what Forrest says you need: "One really good anti-virus program and one good spyware program." Really? Is that all? It seems too simple. As long as those two programs are reputable and updated, you should be safe, she says. How do you know what to get? Here are tips:

Do your research.

What kind of software should you buy -- Norton? McAfee? Trend Micro?

Most computer and technology publications rate this stuff every so often, so go online and search for recent ratings. (You can go to CNet.com to find all the reviews you'll ever want to read.) Once you've seen a few of these charts, you'll start to see which software programs consistently come out on top -- and which have features that you like. Or, of course, you can ask an expert. Forrest urges you to drop by the Geek Squad counter at your neighborhood Best Buy and ask for advice.

Don't opt for the combo.

Lots of companies sell software suites -- package deals that offer both anti-virus and anti-spyware programs. But Forrest doesn't recommend those. In her experience, when security software is packaged, it tends to protect against one problem far better than it protects against the other. "They tend to work better," she says, "if it's not a combination." So don't just settle for the suite. It's unlikely that the very best will come in a single package.

Beware of freebies.

What about those anti-spyware programs that are free for the downloading?

Those can be OK, Forrest says. But be careful. Sometimes free software can have some nasty stuff attached. "Some of the free anti-spyware programs are very good programs," Forrest says. "But some that say they are free are more spyware than they are protection."

Don't assume your computer is protected.

Yes, some sort of anti-virus software probably came with your computer. You've seen the little icon on your desktop, and you know you once saw it scanning for something. Isn't that enough? Probably not, unless your PC is brand-new. Most of those programs are installed with a 60- or 90-day trial period. And once that trial expires, if you don't subscribe to the service, then you're out of luck.

(Watch the expiration date even if you paid for the program, by the way. You don't get indefinite protection; you have to re-up every year or so.) Once you've picked out your software, how do you know it's doing its job?

Here are tips for making your security software work for you:

Don't forget to scan

You can have all the protection programs you need, but if you don't use them to scan your computer, they might as well not be there. You should set up your anti-virus program to scan your system once a week. And run your anti-spyware program at least a couple of times a week. "You don't have to sit there and watch it," Forrest says. "Let it run in the background, then check and see if it finds anything."

Don't forget to update

Here's why you pay for these programs in the first place: They're constantly searching for new threats, coming up with new ways to protect your computer. But you don't get the benefit unless you update your system. So check for updates every time you run a scan. (You may be able to set your program to do this automatically.)

Set up your firewall

A firewall protects your computer from more than just viruses -- it keeps out a whole array of network intruders. Some security suites include a personal firewall. But the one that Windows installs on your PC is perfectly decent, Forrest says. "As long as that's turned on," she says, "that'll protect you as well as anything else." To turn it on, or to see whether it's turned on, go to your computer's Security Center.

Be careful out there anyway

"Be careful where you go on the Internet," Forrest says. Just about anytime you download something for free, you're going to get some spyware. Those programs that offer you free music and free movies? Yeah, you may get entertainment for free. But there's likely some stuff you don't want thrown in with the deal. The Geek Squad sees a lot of that, Forrest says.

"You're getting the music, but you're also getting X, Y and Z spyware that's on there," she says. And that's just asking for it.

So Just be Cautious Enough to Fight them all........

Computer Software - Blood for PC

Computer software is a general term used to describe a collection of computer programs, procedures and documentation that perform some task on a computer system. The term includes application software such as word processors which perform productive tasks for users, system software such as operating systems, which interface with hardware to provide the necessary services for application software, and middleware which controls and co-ordinates distributed systems.
Practical computer systems divide software systems into three major classes: system software, programming software and application software, although the distinction is arbitrary, and often blurred.
* System software helps run the computer hardware and computer system. It includes operating systems, device drivers, diagnostic tools, servers, windowing systems, utilities and more. The purpose of systems software is to insulate the applications programmer as much as possible from the details of the particular computer complex being used, especially memory and other hardware features, and such accessory devices as communications, printers, readers, displays, keyboards, etc.
* Programming software usually provides tools to assist a programmer in writing computer programs and software using different programming languages in a more convenient way. The tools include text editors, compilers, interpreters, linkers, debuggers, and so on. An Integrated development environment (IDE) merges those tools into a software bundle, and a programmer may not need to type multiple commands for compiling, interpreter, debugging, tracing, and etc., because the IDE usually has an advanced graphical user interface, or GUI.
* Application software allows end users to accomplish one or more specific (non-computer related) tasks. Typical applications include industrial automation, business software, educational software, medical software, databases, and computer games. Businesses are probably the biggest users of application software, but almost every field of human activity now uses some form of application software. It is used to automate all sorts of functions.

Sunday, October 14, 2007

Windows XP - Problem Free Desktop

As a regular computer user, it is essential for you to understand the need and importance of keeping your system problem free. There are many ways through which you can keep your computer fit and in proper shape. But the most important way of keeping your system problem free is by using it properly.

All the computers available nowadays can easily perform a number of tasks simultaneously, but you must realize that the more tasks you do at a single time, the slower your computer will become. On the other hand most of the people don’t realize that many programs load up when they first turn-on their computers. These programs start automatically and remain until you turn off the computer.

If by chance you use these programs, your computer will become slower and possibly less reliable. You can locate these programs at the right side of screen just near the clock in form of small icons. In order to remove these unwanted programs, follow the given steps carefully.

1. Place your mouse over one of the small icons. Then right click on them and see if there is any option to delete or prevent it starting when Windows loads up. Do the same with other icons except the speaker icon.

2. After that right click on the start option at the left hand side of the screen and click on explore, look for a folder called programs just do a double click on this folder and then again double click on startup. Is there any shortcut in this folder that you don’t want while starting up every time and if you find anything unwanted then do a right click on it and the click on ‘delete’ option.

3. At last, to avoid obstinate or stubborn programs, you need to go into Windows System Information – click on Start menu, go to Programs, then Accessories and System Tools and finally click on System Information.

When the window gets opened, click Tools and then System Configuration. If you click on startup tab you can see the remaining programs that automatically load up when the system first starts. So now simply uncheck the box besides those things that you dont want to load up and then restart your computer.

Remember that these unwanted programs can spoil your computer’s speed and reliability so remove them as early as possible.

Computer Repair / Help - "Professional Help versus fixing it Yourself"

In a world that is filled with viruses, worms, and other harmful computer programs many computer owners may find themselves in need of a computer repair. Dangerous programs are just a small amount of the common computer repairs that may need to be made. Sometimes a computer part can stop working or cosmetic damage may occur.

Once damage occurs to a computer there are many computer owners who have to make an important decision. As much as many individuals would love to purchase a new computer there are a many people who can’t afford the large purchase. Since a computer is an expensive piece of equipment many computer owners with a broken machine often opt for having it repaired.

Depending on the computer problem there are a number of repair choices available. Having a computer professionally repaired is a great way to make sure that the problem is fully fixed; however, professional computer repair does not always come cheap. There are many computer owners who try and repair their computer themselves or have a friend do it for little or no money.

Which is the better computer repair choice? As previously mentioned the best repair option will mostly depend on the type of repair that a computer needs. Each computer repair option has its own advantages and disadvantages.

Viruses and worms are just a couple of the dangerous computer programs that somehow can make its way into our computers. These programs often attack the operating system of a computer. Many computers can be fixed by simply installing an anti-virus computer program; however, other computers may actually crash and no longer operate.

Simply installing and deleting viruses and other dangerous computer programs is something that many computer owners can do on their own. A large number of anti-virus computer software programs can be purchased over the internet or from a wide variety of retail store locations. This process is best done before it gets out of control because some computers may have their operating system completely destroyed and many individuals are unable to do the repair themselves.

It is not uncommon for a specific computer part to stop working. Office supply stores and the internet make it possible for just about anyone to purchase a specific computer part. Individuals who are able to retrieve the needed computer part may be able to repair their computer on their own. Many online internet resources guides offer tips and instructions for completing a certain repair.

Fixing your computer without having to pay a professional is nice; however, many computer owners do not successfully repair their computer. Many actually end up causing additional damage to the computer or only temporarily fixing the problem. Self computer repair may end up costing a computer owner a lot more money then the intended to spend.

As difficult as it may be for you to fork over your hard earned money to have your computer professionally repaired it may be more beneficial to an inexperienced computer owner. Many computer technicians are properly trained and educated in repairing a computer. There are some computer technicians that stand behind their work so much that they offer a warranty or a satisfaction guarantee on their work. Deciding whether to have your computer professional repaired or not is up to you; however, you should think about the pros and cons of each repair option before making you final decision.

Anti-Virus "Precaution is Better than Cure"

In today's world, everyone needs to protect their computers from viruses. There are a number of things you can do for free to keep your computer safe from viruses. Below are the few tips on safe computing that you should follow even with good automated anti-virus protection.

Update Your Self: This not only applies to your anti-virus software, but also your operating system, browser and email client. Most viruses take advantage of known security problems in your computer's software. There is almost always a patch available for the software before viruses appear on the scene that take advantage of the vulnerabilities. If you use Microsoft Windows and Microsoft Office, Windows Update and Office Update respectively provide an easy way to keep up-to-date with security patches.

Common Sense Need To Be Used: Most virus infections wouldn't happen if the computer user would think about what they are doing and use a little common sense. If you get a strange looking email message delete it instead of opening it to satisfy your curiosity. If a message, even a normal looking one, has an attachment you were not expecting to receive, don't click on it to see what it is. Much of the secret to safe computing is smart computing.

Don't visit Questionable Sites: Don't visit questionable sites like those with pirated software (warez sites), hacker sites, or sites that promise you software keys and other ways to break the law.

Be Little Different From Others: Almost all viruses use flaws or features of Microsoft products. Using alternative software, especially Web browsers and email programs will thwart most viruses. Mozilla is good choice for both Web browser and email client. Using a non-Microsoft operating system such as Linux can also be a good choice for some. These measures won't prevent all viruses but they will greatly improve your chances of not becoming infected with the most prevalent viruses. You should use software that you install that can prevent infections instead of finding them after the fact.

Xerox Printers - Ultimate Expierience

Xerox Corp. is trying to snag new small-business customers for its color printers with a focus on a particular hue — the green of money. The region’s fourth-largest employer on Monday unveiled two new color printers for small and mid-sized businesses that it said make full-color printing no more expensive than black-and-white.The Xerox Phaser 8860 and 8860MFP both use ink sticks — walnut-sized, waxy blocks resembling lumps of melted crayon — to provide the color.

New developments in ink stick technology have driven down the per-page cost of color printing substantially, said Jim Rise, vice president and general manager of Xerox’s solid ink products business unit. “When we survey our own customers … or we look at third-party market research, consistently we see that the cost of color printing is the No. 1 barrier to adoption for everyday use in the office,” Rise said.

The Phasers were designed and engineered in Xerox’s Webster and Henrietta facilities. They are being produced by Singapore-based Flextronics Ltd., which took over much of Xerox’s manufacturing in 2001. Xerox produces solid ink at its Wilsonville, Ore., plant. “We improved these inks right down to the molecular level,” Rise said. “It’s a brand-new ink formulation.”

The company also invented a new manufacturing process that lets it put more ink in each stick, he said. The two new Phasers are the first to use the new solid ink. The 8860, with a base price of $2,499, is available now, while the 8860MFP, at $3,999, will be available in November. They are aimed at businesses that print 1,000 to 10,000 pages a month. In announcing the new machines, Xerox took a shot at Hewlett-Packard Co., which dominates the color printer business. According to Xerox, the ink sticks to do 14,000 pages would cost $432, while the toner cartridges to do roughly the same amount of color printing on an HP 4700dn would cost $941. The 4700dn machine costs $1,499.

"Hewlett-Packard was largely dismissive of Xerox’s announcement."

Tom Codd, director of marketing for HP’s LaserJet business, said that while the company has looked at solid ink technology, “there are so many drawbacks in the office to it, we chose not to pursue it.” “It does very nice glossy images, but the challenge with the technology is the image is not very durable on the page and it requires a tremendous amount of power to keep that wax in a liquid state,” Codd said.

Along with cost, Xerox also was trumpeting the supposed environmental friendliness of its solid ink technology, saying it generates one-tenth the waste that laser printers do. Xerox introduced its solid ink technology in 1991. With Monday’s announcement, it now has four solid ink printers on the market.

Monday, October 8, 2007

Top 5 Protection Tips for DSL(Internet) Users

The World Wide Web is useful and dangerous too! What most people may not know is that by connecting their computers to the internet they are setting themselves up as targets for thieves and unscrupulous people. The US government is taking steps towards inculcating an understanding of the importance of cyber security among citizens especially home computer users. Similarly DSL connection providers like Verizon are also making great efforts to provide secure connections.

DLS users like others need to protect their computer systems and private information stored on computers from cyber thieves and malicious hackers. Recent exercises such as the “Honeymoon Project” found that most computer systems can be hacked into between 3-5 days.
While DSL providers will have security systems in place it is best you take steps to protect yourself and your family and business. It is simple:
1. Install a firewall. It is software that recognizes unauthorized access and blocks it. What is more it prevents unauthorized movement of files from your computer too! This is important as a DSL connection means your computer is always connected to the internet and is susceptible to attack. A firewall must always be the latest version and configured properly to scan your system continuously.
2. Ensure that your anti virus software is functional and updated regularly. Never leave your computer system open to virus attacks. Not only are you putting your files and private information in jeopardy but also that of others who are in your address book and system. Cyber criminals steal credit card and bank information for personal financial gain. Ensure that your computer has the latest virus protection system in place. Be sure to renew the antivirus software license.
3. Configure your computer properly. If you don’t know how to do this seek the help of a trustworthy family member or friend. Use secure and original passwords. Its important to regularly change your password and create unique passwords that are a mix of words and numbers.
4. Always used authentic operating systems and software. Pay the licensing fees and update your computer regularly with the latest vendor security patches. This will protect your computer system to the highest possible extent.
5. Always use safe e-mail practices. Most “bugs” attack your system through attachments. So never open emails with attachments from unknown sources. All attachments must be scanned before opening. Avoid opening attachments with file extensions like “.vbs.” P2P networks are dangerous as also downloading executable programs. Learn all you can about dangers termed as “Trojan horses.”
In order to protect yourself you need to learn as much as possible on computer security for home users. Protecting your system will make things difficult for hackers, attackers, and crackers. When shutting down your computer after use please make sure you have disconnected your system from the internet completely. This will ensure that attacks don’t happen while you are asleep.
Simple steps could save your life and money.

Internet through Wireless and Concept VOIP!

For those interested in internet access while on the go, WiFi hotspots provide a partial solution, but coverage is spotty at best. Using a cellular phone as a modem solves the coverage issue, but unfortunately the increased coverage comes at the expense of bandwidth which is only comparable to dial-up speed. Fortunately deciding on which trade-off to take is no longer an issue as Verizon has recently introduced their wireless broadband service which provides high speed internet access to users on the go. Adding only a simple PC card provides that computer with data access speeds comparable to DSL service anywhere on Verizon's Broadband Access network. Equally impressive is the fact that access is charged at an extremely reasonable flat monthly rate and not on a per-minute or bandwidth basis.

VOIP Service
One additional benefit of high speed internet access that many consumers have recently discovered is the ability to use VoIP service for all of their telephone calls and reduce their monthly telephone bills by up to 50% or more. Voice over IP service makes traditional home phone service obsolete as the high speed internet connection is used to carry all phone calls rather than traditional phone lines. Transitioning to the new service is easy as you can use the same phone that you currently use, it just needs to be plugged into an small adapter which is provided.

High Speed Internet - Demand the Best

The content available on the internet today has evolved to be more than just simple text based webpages. Today's bandwidth intensive games, videos and Flash based websites push your internet connection harder than ever before. Without a reliable high speed internet connection at home you are missing out on the best the internet has to offer. Not at home and constantly on the go? If so, not to worry as high speed internet access is also now available in the form of wireless broadband to users on the go.

Three of the most popular high speed internet access providers in the United States are Comcast, Earthlink DSL and AT&T Yahoo and for good reason. All three companies not only provide reliable, high speed internet access, but they also bundle in such features as virus protection, photo sharing, disk space for a personal web page and much more. Prices for complete access packages such as these have dropped considerably in the past two years and each of these providers sweeten the pot even further by offering very attractive introductory rates. So, no matter whether you desire faster internet access to be able to work from home or for downloading music, watching videos and experiencing everything else the web has to offer, there has never been a better time to upgrade your service. Additionally, add a network card and a wireless router to your setup at home and you can enjoy the benefits of your high speed internet access anywhere you wish in your home or even share the connection on multiple computers if you wish.

Tuesday, September 25, 2007

DELL thriving into the China Market


DELL Inc. will now be selling its computers through an electronic goods retailer in China.
The Round Rock-based computer giant says it has partnered with GOME, China's largest electronics retailer, in order to reach more consumers.


Dell (NASDAQ: DELL) will begin rolling out its merchandise in about 50 GOME stores next month. It also plans to deploy Dell employees to the stores in China to service in-store customers.
The stores will stock Dell notebooks and desktops, such as the 1420 notebook, 9200 desktop and Inspiron 530 desktop.
"Starting in October, consumers can buy Dell products at GOME stores that will help satisfy customers' diversified needs," Chen Xiao, president of GOME. "I am confident that we made the right decision to partner with a top-name brand to sustain our growth in China."
The agreement with GOME is the latest effort by Dell to drive up worldwide computer sales. Dell has reached similar agreements with Bic Camera Inc. in Japan, Carphone Warehouse in the United Kingdom and Wal-Mart in the U.S.
And last week, Dell said it will open its first retail store in Russia, next month. The store will be in Moscow.

Thursday, September 20, 2007

Technologia to Technology to "Computer Technology" - Howzzat !

Technology is a broad concept that deals with a species' usage and knowledge of tools and crafts, and how it affects a species' ability to control and adapt to its environment. In human society, it is a consequence of science and engineering, although several technological advances predate the two concepts. Technology is a term with origins in the Greek "technologia", "τεχνολογία" — "techne", "τέχνη" ("craft") and "logia", "λογία" ("saying"). However, a strict definition is elusive; "technology" can refer to material objects of use to humanity, such as machines, hardware or utensils, but can also encompass broader themes, including systems, methods of organization, and techniques. The term can either be applied generally or to specific areas: examples include "construction technology", "medical technology", or "state-of-the-art technology".

At Last the Computer Technology. So keep reading about the latest "Computer Technology Updates".