21: What's it made of? Most laptop cases are still made from molded plastic, but you can find some encased in metal, which dissipates heat better. Look for models made from light, strong metal alloys. If you're in the market for a desktop replacement, check that the case has adequate ventilation for the powerful (and hot-running) components inside.22: Fixed or swappable Less-expensive notebooks have fixed drives, meaning the optical and hard drives can't be removed. Some, though, have a swappable-drive bay, letting you...
Saturday, January 26, 2008
Tips To Buy Perfect Notebook For You (4)
Posted on 8:35 PM by Unknown
16: Modern conveniences Some common desktop features have made their way into notebooks. Quick-launch keys are a perfect example. You can program these buttons to launch your favourite apps, turn on your wireless radio, or switch to a power-saving mode. A few of our other favourite luxuries are built-in TV tuners, and, for photo junkies, multiformat memory-card readers.17: Turn on, tune out--instantly Want to listen to music or watch a DVD without having to wait for your notebook to power up? An instant-on feature lets...
Thursday, January 24, 2008
Tips To Buy Perfect Notebook For You (3)
Posted on 4:51 AM by Unknown
11: Go wireless Integrated wireless networking (Wi-Fi) has become an indispensable feature. Most notebooks ship with a choice of 802.11b/g or 802.11a/b/g. Capable of data throughput of 11Mbps, 802.11b is fine for ordinary use. Public hotspots typically use 802.11b or 802.11g. (The latter is backward-compatible with 802.11b.) Unless you're in and out of office environments, don't worry about support for 802.11a. Santa Rosa-based notebooks have the option of the fastest Wi-Fi standard to date, the 802.11n radio which is...
Tips To Buy Perfect Notebook For You (2)
Posted on 4:02 AM by Unknown
6. Finger fitting As notebooks shrink in size, so do their keyboards. If possible, try some simple typing exercises before you buy. The smaller the keyboard, the more creative the vendor may have gotten with key size and placement. Pay particular attention to the spacebar, Shift, Ctrl, and Backspace/Delete keys. Be sure all are in a good location for your hand size and typing style. 7: Touchy, touchy Computing today relies a lot on mousing. With a notebook, all you get is a touch pad or pointing stick. Unless you plan on...
Tuesday, January 22, 2008
Tips To Buy Perfect Notebook For You (1)
Posted on 7:36 AM by Unknown
1. Choose Your Form We divide notebook into 4 form ( thin-light, ultraportable, mainstream, desktop replacement ). Decide which form is suit for you. -> Thin-light if you need balance between size, battery and power. This form is suit with students or bussinessman. Their larger screens (14-15) and it's roomier keyboard makes it better for longer usage -> Ultraportable, if you will use your notebook on the road (mobile). This form has small size, that's make it easy to bring. Finally, tiny tech comes with higher...
Monday, January 21, 2008
How To Remove Some Stuff On Start
Posted on 7:01 AM by Unknown
When you click on task bar (windows logo), you can see on start bar like RUN, NETWORK CONNECTION,etc. You feel bored of that ?Then you can try this :Click RUN, then type gpedit.mscThen choose User Configuration -> Administrative Templates -> Start Menu and Taskbar.There you can see a lot of things, for example "Remove Network Connection from Start Menu".Then double click it to open it's properties, and choose enable.Then click Run and type gpupdate, then check it out....
Friday, January 18, 2008
Is Microsoft Cracking Down on DVD Ripping?
Posted on 9:29 PM by Unknown
Is Microsoft trying to thwart DVD-ripping on PCs using Windows Vista with the new beta of Vista Service Pack 1?As I tested the public beta release of Vista SP1, I noticed the update crippled a popular DVD cracking program called DVD43.DVD43 is a free utility that disables a DVD's Content Scramble System (CSS) copy protection technology. Once a DVD's copy protection is disabled, you can copy its content using one of several third-party programs. You may be using DVD43 and not realize it, because it often is the engine of other ripping programs.When...
MacBook Air: How Incomplete Is It?
Posted on 9:19 PM by Unknown
Steve Jobs is, among many other things, the great denier. Second mouse buttons, floppy drives, 56-kbps modems--for decades, he has been perfectly willing to release products lacking one or more features that are standard equipment on everyone else's computers, if he thinks they're unnecessary or they offend his design principles or aesthetic sense.Typically, the news that a new Mac is missing a feature is met by yelps of protest. But then, sooner or later, the rest of the industry follows Jobs's lead. (Okay, usually--I haven't seen any one-button...
Wednesday, January 16, 2008
Macworld 2008 Impression
Posted on 1:44 PM by Unknown
The Macworld 2008 keynote is now behind us and it left a really bad taste for some of us. I think most existing iPod Touch users are a little upset with a couple of the announcements yesterday. The first announcement which I thought was good turned out to be sour. Steve Jobs said they will be adding five “new” apps to the iPod Touch, this includes: Mail, Maps, Stocks, Weather, & Notes. My initial thought was, “About time!”. Then that is when he said existing iPod Touch owners will have to pay $19.99. However, anyone buying a new iPod Touch...
Latest Vista SP1 Beta Opened Up to Public
Posted on 1:25 PM by Unknown
Microsoft has reversed field and opened public access to the latest beta build of Vista Service Pack 1. Users can now download Vista SP1 RC Refresh from Microsoft's Web site.Users can install the beta via Windows Update, but Microsoft is providing a list of procedures users should follow to avoid problems.Microsoft originally released the Refresh beta on Jan. 9 to approximately 15,000 beta testers that included corporate customers, consumer enthusiasts, software and hardware vendors, and others, according to a company spokesman.The spokesman said...
CES 2008: Intel Debuts 16 New Processors
Posted on 12:46 PM by Unknown
We knew they were coming…just not this many. Intel kicked off this year's CES in a big way, introducing 16 new processors all based on the chipmaker's 45 nanometer (nm) process technology. We've been hearing a lot about 45 nm lately and, admittedly, it's kind of hard to get excited about semiconductor fabrication -- especially when there's all manner of shiny new gizmos vying for your attention. (For a layman's overview of 45 nm, see the company's...
Tuesday, January 15, 2008
How To Run Vista Legally Without Activation for a Year
Posted on 7:56 AM by Unknown
A security expert says Windows Vista can be run for at least a year without being activated, but Microsoft calls the process an antipiracy 'hack'.Windows Vista can be run for at least a year without being activated, a serious end run around one of Microsoft's key antipiracy measures, Windows expert Brian Livingston said Thursday.Livingston, who publishes the Windows Secret newsletter, said that a single change to Vista's registry lets users put off the operating system's product activation requirement an additional eight times beyond the three...
Monday, January 14, 2008
How To Download From Multiply
Posted on 9:46 AM by Unknown
Now way to download from multiply has revealed !!!First, browse for song that u looking for like usual.Then, u can find them in song list. Then play that playlist (use option that already given there). Use winamp to play them....Right klik on file that u want to download then choose view file info. Copy paste link that will shown on the top of new window (view file info window). Paste that link on your internet browser. And start downloading.You also can use notepad or edit plus to reveal link of the song, but you can't sure which one is it.Enjoy...
Saturday, January 12, 2008
How To Get 4 Desktop In Your Computer
Posted on 6:59 PM by Unknown
If you want 4 dekstop that you can rotate, check this out !Open GOOGLE then search "YODM" then choose the first result ( YODM 3D Free Download ). Open the site and download the program.After you install it, you can customize your computer with 4 rotateable desktop.Enjoy it...
Friday, January 11, 2008
Windows Short Keys
Posted on 3:32 AM by Unknown
Alt + Tab Switch quickly between open applications.Alt + Shift + Tab Switch backwards between open applications.Ctrl + Esc Bring Up Start button.Alt + Esc Switch Between open applications on taskbar.F2 Renames selected file or icon.F3 Starts Find option.F4 Opens the drive selection when browsing.F5 Refresh ContentsAlt + F4 orCtrl + w Closes current open program or window.Ctrl +...
Basic Short Keys
Posted on 3:27 AM by Unknown
BASIC SHORTCUT KEYSAlt + F File menu options in current program.Alt + E Edit options in current programF1 Universal Help in 90% of Windows programs.Ctrl + A* Select all text.Ctrl + X* Cut selected item.Shift + Del Cut selected item.Ctrl + C* Copy selected item.Ctrl + Ins Copy selected itemCtrl + V* PasteCtrl + F Find (or Find and Replace) dialogue box will pop up. Use this to search a document or web page for a...
What I Should Do If My Computer is Slow
Posted on 3:20 AM by Unknown
*Empty Your Recycle Bin Regularly*One important thing to remember is to empty your recycle bin/garbage can. Whenever you delete a file isn't actually deleted. It's stored in your recycle bin and saved in short term memory, using up RAM that your programs may need to run efficiently.*Clean Unneeded Files Using the Windows Disk Cleanup Accessory*Use the accessory that comes with most Windows operating systems called "Disk Cleanup". Go to the Start Button menu, choose Programs (or All Programs), Accessories, System Tools, Disk Cleanup.This program...
How To Search Aplication Crack Using Google
Posted on 3:16 AM by Unknown
For example you want to search crack for Corel Draw X3...Then you type "crack: corel draw X3"After that u will see lists of result of your search..Easy right....
Saturday, January 5, 2008
Beat back that Trojan horse
Posted on 10:31 AM by Unknown
Like its mythical namesake (dramatized in Lego), whatever crawls out of a digital Trojan horse will be a nasty surprise. A Trojan horse usually takes the form of an innocuous software program that unleashes a flood of malware or viruses after it's installed and run. Since attacks and ease of removal vary--an ad generator is easier to remove than a stealth rootkit--there's no one-size-fits-all solution. However, there are some common techniques for picking your way through the wreckage.Reboot Windows in Safe ModeWhat is Safe Mode?Safe Mode is a...
Virus History Summary
Posted on 10:24 AM by Unknown
Narrative histories of the early years by Dr. Alan Solomon and Robert M. Slade are available. Below is an expanded summary.1981 - The First Virus In The WildAs described in Robert Slade's history, the first virus in the wild actually predated the experimental work that defined current-day viruses. It was spread on Apple II floppy disks (which contained the operating system) and reputed to have spread from Texas A&M. [Side note: Thanks to a pointer from anti-virus pioneer Fridrik Skulason we know the virus was named Elk Cloner and displayed...
How Viruses Infect (2)
Posted on 10:16 AM by Unknown
Multipartite VirusSome viruses can be all things to all machines. Depending on what needs to be infected, they can infect system sectors or they can infect files. These rather universal viruses are termed multipartite (multi-part).Sometimes the multipartite virus drops a system sector infector; other times a system sector infector might also infect files.Multipartite viruses are particularly nasty because of the number of ways they can spread. Fortunately, a good one is hard to write.Summary• Multipartite viruses have dual capabilities and typically...
How Viruses Infect ( 1)
Posted on 10:11 AM by Unknown
Polymorphic VirusesTo confound virus scanning programs, virus writers created polymorphic viruses. These viruses are more difficult to detect by scanning because each copy of the virus looks different than the other copies. One virus author even created a tool kit called the "Dark Avenger's Mutation Engine" (also known as MTE or DAME) for other virus writers to use. This allows someone who has a normal virus to use the mutation engine with their virus code. If they use the mutation engine, each file infected by their virus will have what appears...
Subscribe to:
Posts (Atom)