Wednesday, December 17, 2008

Protecting Your Computer From Viruses, Spyware, And Other Security Threats

Most of us rely on our personal computers and those in our office to complete multiple tasks each day. If that data is lost or compromised it can create numerous problems for us. Protecting computers against viruses and spyware is something you should do before you start using any program on it. The information you prevent from being accessed could be your credit card accounts and bank accounts. If they are compromised you can end up becoming a victim of identity theft.

One way that people accidentally end up with viruses or spyware on their computer is by not paying attention to the sites they use. Don’t get into the habit of giving out your personal information online just because a site asks for it. To opt in, you should only have to give them a first name and an email address.

Always check the address in the URL to make sure you are accessing a secure site. It should start with “https” as this will let you know it is very secure. If it only starts with “http” then the site is not secure and you can end up compromising the security of your computer if you continue entering information on the site.

Viruses can spread very rapidly so if you think your computer may be infected, you should take care not to pass it to any other area of your computer or to others via email. By disconnecting your computer from the network you have a good chance of isolating the damages.

Always be on the alert for various types of emails known as phishing. This is a scam to get you to provide personal information. Once you do, spyware can be attached to your computer. Never respond to emails asking you for personal information as most credible companies won’t contact you for such information.

Make sure you purchase a virus and spyware protection program that is very easy to install. Most of them offer step by step instructions for you to follow. You can find out how easy such software programs are to install before you buy them just by reading some independent reviews online.

You need to choose the program for your computer protection very carefully. While they are designed to give you the very best security, you can be sure those trying to pass viruses or get spyware into your system are very smart. They have learned elaborate tricks to be able to gain access to your information.

One of the latest tactics that these criminals have been using is to sell software that is supposed to protect your computer from viruses and spyware. Unfortunately, what they are selling you is actually the very thing you are trying to protect yourself against. Always get such software from a company that has an excellent reputation, not just any one that you come across online for a good price.

In order to ensure your computer is well protected against viruses and spyware, you want a program that offers you instant updates. These will usually happen for one full year after you install the program. This ensures that your protective software is always the most current available and criminals will have a hard time infecting your computer system with viruses or spyware.

Published At: www.Isnare.com
Permanent Link: http://www.isnare.com/?aid=206069&ca=Computers+and+Technology

What to Do With a Slow Computer

There is nothing more frustrating that a slow running computer. Even modern computers, with huge amounts of RAM memory and fast processors, can sometimes just start running much slower than usual. There are a number of possible reasons why this should happen, and this article aims to cover most of them.

The internet offers a huge amount of free software and trial versions of paid software. With high speed internet connections becoming more and more common, increasing numbers of computer owners are downloading and installing pieces of software. There are also vast numbers of software directories now, which offer free downloads of various programs. Most of these programs are not malicious or viral, but installing lots of programs can slow your computer right down. A lot of these programs will add themselves to the operating system's start up directory. This means they start running when you switch your PC on. Often, these programs will contact their homepage and check for updates too. This all contributes to a slow running computer. Installing one of the many registry cleaners available will help you fix this problem. Most registry cleaners will provide a list of programs which start as soon as Windows boots up. A decent registry cleaner will also fix numerous other computer problems too.

Another aspect of installing software from the internet is that some programs can contain adware and/or spyware. This is mainly harmless, but takes up computer resources and will contribute to slowing it down. If you are a regular user of the internet you should probably think about getting a good spyware detector which will get rid of the problem and prevent it happening again.

The worst thing that can happen to your computer is that it gets infected with a virus. This is a piece of code written with malicious intentions. Viruses come in a variety of forms, and while some of them are quite harmless, some are very nasty indeed. Depending on the behavior of the virus, it may also make your computer run slower than it should, as the virus uses up system resources. The most important thing you can do with a computer connected to the internet is to install a virus checker and a firewall. This is a piece of software which defends your computer against viruses and computer hackers. You must also remember to update the virus checker when prompted, as new viruses are being programmed every day.

These are three of the main causes of your computer running a lot slower than usual. The best way to ensure your computer runs as fast as possible is to make sure you have some anti spyware installed, use an up to date virus checker/firewall. You should also get yourself a reputable Windows registry cleaner, and use it regularly. This should ensure that your slow computer is a thing of the past.

If your computer is running slowly, takes an age to boot up, or you experience unexpected system errors on a frequent basis, you might want to clean the windows registry. Visit http://www.clean-windows-registry.com and we can help you clean your windows registry.

OpenOffice.org 3.0 is out

For eight years ago today started the OpenOffice.org project, after Sun had released the source code to its competitor to Microsoft Office, Star Office. The day is celebrated with the release version 3.0 that comes with many new features and improvements. Among other things, you can now open Microsoft Office 2007 files such as. Docx.

Start Center

The first difference you'll notice when you open OOo 3.0 is the new Start Center. There you can choose whether to open a new text document, spreadsheet, presentation (similar to MS PowerPoint), draw sheet, database, or a new document in Math, a program for those doing advanced mathematical calculations. Alternatively, you can open a template or an existing document, or you can visit the website for information about OOo, to download new templates, or to download the extensions.

Construction on the new features even

This latest may prove to be the most important news in OOo, namely the ability to extend the functionality using extensions . The support for extensions can be said to be one of the leading causes of the browser Firefox 'enormous popularity and it will be interesting to see if it will be as much innovation around OOos extensions.

Sun has already created an extension that allows you to import and edit PDF files. Dictionaries now also are installed as extensions, and English dictionary can be found here.

"Native" support for Mac OS X

Another important news in OpenOffice 3.0 is the much improved support for Mac OS X. Previous versions have used the X11 to run in OS X, and they have not been seen visually well integrated with the operating system. This is fixed in version 3.0. In addition, OOo received support for accessibility features in OS X that will make it much easier to use the program for the blind and weak impaired. In this area turns OOo 3.0 Microsoft Office.

Other news in OpenOffice.org 3.0 should include a strong note improved function, the opportunity to work with others on the same spreadsheet, an improved appearance, a zoom slider that lets you view multiple sheets at once while working on a document, support for the 1024 columns in the spreadsheet. More information about these and more news can be found at openoffice.org.

OpenOffice.org 3.0 is free software and can be downloaded free for Windows XP and Vista, Mac OS X and Linux.

Article Source: http://www.articleszoom.com

How to find an email addresses online

You know how elusive email addresses are. Even if you once had a friend's address, you may not be able to locate or recall it now that you need it. Or maybe the address has changed. No matter whose email address you are looking for or how much you know about the person, here are eight strategies that you can use right now to help you find it. You'll look in new places and obvious but oft-overlooked corners.
1) Find email addresses in Previous Email Correspondence
If you have emailed them before, you probably have their address. Go find it now.

2) Find People in Email Address Directories or White Pages
From public records to MySpace.com to email address directories and change of address services: find people and their email addresses using dedicated search engines.

3) Find Somebody's Email Address by Searching the Web
Search somebody's email address like you search for anything else on the Web (and successfully).

4) Search for Email Addresses in Usenet Newsgroups
Find the person whose email address you are looking for in discussion groups.

5) Find an Email Address by Making it find You
If the person you are looking for is searching for herself, she will find you, and her email address will find its way to you.

6) Find Email Addresses on Business Cards
Go through your collection of business cards to find email addresses of more people than you probably know.

7) Ask Somebody for Their Email Address
Yes, that's obvious, but asking is still the easiest way to find an email address for email marketing.

8) Find Somebody's Email Address Using soc.net-people
If all other means to find somebody's email address fail, you can turn to the Usenet newsgroup soc.net-people.

By: searchrankpros

Article Directory: http://www.articledashboard.com

Every thing about email addresses, finding email addesses, Email marketing and opening new accounts can be found at Email.biz

1) Find email addresses in Previous Email Correspondence
If you have emailed them before, you probably have their address. Go find it now.

2) Find People in Email Address Directories or White Pages
From public records to MySpace.com to email address directories and change of address services: find people and their email addresses using dedicated search engines.

3) Find Somebody's Email Address by Searching the Web
Search somebody's email address like you search for anything else on the Web (and successfully).

4) Search for Email Addresses in Usenet Newsgroups
Find the person whose email address you are looking for in discussion groups.

5) Find an Email Address by Making it find You
If the person you are looking for is searching for herself, she will find you, and her email address will find its way to you.

6) Find Email Addresses on Business Cards
Go through your collection of business cards to find email addresses of more people than you probably know.

7) Ask Somebody for Their Email Address
Yes, that's obvious, but asking is still the easiest way to find an email address for email marketing.

8) Find Somebody's Email Address Using soc.net-people
If all other means to find somebody's email address fail, you can turn to the Usenet newsgroup soc.net-people.

By: searchrankpros

Article Directory: http://www.articledashboard.com

Every thing about email addresses, finding email addesses, Email marketing and opening new accounts can be found at Email.biz

1) Find email addresses in Previous Email Correspondence
If you have emailed them before, you probably have their address. Go find it now.

2) Find People in Email Address Directories or White Pages
From public records to MySpace.com to email address directories and change of address services: find people and their email addresses using dedicated search engines.

3) Find Somebody's Email Address by Searching the Web
Search somebody's email address like you search for anything else on the Web (and successfully).

4) Search for Email Addresses in Usenet Newsgroups
Find the person whose email address you are looking for in discussion groups.

5) Find an Email Address by Making it find You
If the person you are looking for is searching for herself, she will find you, and her email address will find its way to you.

6) Find Email Addresses on Business Cards
Go through your collection of business cards to find email addresses of more people than you probably know.

7) Ask Somebody for Their Email Address
Yes, that's obvious, but asking is still the easiest way to find an email address for email marketing.

8) Find Somebody's Email Address Using soc.net-people
If all other means to find somebody's email address fail, you can turn to the Usenet newsgroup soc.net-people.

Article Directory: http://www.articledashboard.com

Every thing about email addresses, finding email addesses, Email marketing and opening new accounts can be found at Email.biz

Software For All Your Blogging Needs

Anyone today who has the writing flair or ability or is dreaming to be a writer has at least written a blog in the net. There are blog softwares which are simple & easy to use and individuals who are technically-inclined and likes challenge can easily acquire a blog online.

For some individuals, blogs are like their dairies or even small projects of everyday living, as they talk about their daily episodes as well as make tribute to their friends and family.

Furthermore, blogs assume a profound meaning written to compose and assemble political statements, endorse a product, supply information on research, and even offer tutorials. Any subject that are of your interests, you can be sure that someone has written a blog on it, unless it's exceptionally a very new topic ...

Blogs are now being written by musicians, politicians, sports figures, novelists, newscasters as well as other well-known figures or even celebrities. It is this blog fever that has raised controversy. You can visit www.atoz-about-rss.com The fact that anyone can compose and regarding any subject matter under the sun, complaints about certain write-ups are an issue. In a lot of blogs, names are being mentioned; do bear in mind that although you are entitled to write anything that interests you in a blog, you have to be very careful and take in a lot of responsibility. Do not make any statements which can become controversial; or else, be very prepared.

Why a Blog?

1) For personal acquaintances, relationships and hobby. A person can write a blog about his daily activities, what’s going on with his life as his way of telling his family and friends the things that goes on in his life. Likewise, one may also write a blog just so he can express what he feels about himself, or about a certain subject matter that is of interest to him.

2) Topical, Some blogs are committed to a precise topic, like computer hardware or politics. These are frequently read like magazines.

3) For marketing, Corporations are too, into blogging; when well written and implemented, this kind of blog can be a powerful instrument for business communications, forming eagerness and anticipation regarding their products and services offered, or used as tool within the company, keeping employees well informed about company issues and news.

www.rss-announcers.com

www.feed-reader-links.com

Why someone else's software?

A lot of web designers and creators will laugh at the belief and idea of utilizing the software of someone else. This is somewhat correct esp. when each software differs greatly from the particular requirements that a client may have.

On the other hand, when it refers to a Weblog software, there is no reason for apprehension in the use of a package that is pre-written, as most packages were developed through years of study; not just knocked together over a couple of days.

Of course, one may study its feature set. For a developer, it would take a lot of time and effort to write and compose from “nothing at all” every single feature in the Weblog software packages of today. You can log on www.greatblogbox.com For most people, a blog is there for the main reason that chooses to publish or make known your literature and texts on the Web, so you want to spend your time more on writing than coding.

Hosted Services

If one wishes to start broadcasting on the Web, yet he/she does not have web hosting, one can consider looking into a hosted service, which includes Blogger, TypePad, Live Journal, and more.

These services are operated or handled for an individual, so there is no need to concern one about technical upkeep of one’s Weblog; instead, one can concentrate on his blog's appearance and content. In just minutes, after signing for an account, one can readily start his own blog. Many such services are offered free, such as blogger. TypePad charges a minimal amount for monthly service fee.

Self-Hosted

When one has Web hosting on hand, or is eager to buy a web hosting service, in which one feels that the advantage will prevail over the problems of keeping up your own blog connection and installation, then you may want to take into account a package that is self-hosted, which includes Movable Type, Textpattern and WordPress.

Other hosting companies did construct the process of installation easier, permitting installation with just a click from a control panel that is browser-based. It is important that you check with a hosting company so you can view if this function is offered. Similar to hosted services, some self hosted packages are made available either for free or for a certain fee which is dependent on the type of package that you choose as well as the basis why you are using it.

Do stay tuned for more interesting articles ...

Related Articles - Blogging, Blogs, Profit, Blogger, Profits, Make Money,

https://www.amazines.com/article_detail.cfm/699381?articleid=699381

Fix Registry Errors - 7 Steps To Fixing Your Registry Errors

If you need to fix registry errors then the impulsive thing to do is to go and find the first free program you can get but did you know this could be causing you further problems.

The fact is, like anything that needs attention, the solution needs to be well researched and as you would do when out shopping, looking around for the best credentialed program will save you a lot of frustration in the long run.

Dangers Of Fixing Registry Errors

Many people cause more trouble than they started with when fixing registry errors. This is no surprise as believe it or not, most computer users have little knowledge of their machine, it's intricacies and technical aspects.

That's why we recommend you always do research when dealing with an issue such as registry repair. The problems that can be created if you're not sure of what to do could include actually deleting your hard drive. Here's a few things to be aware of:

1. Do you know if you have a registry? Well, if you have a Windows operating system on your machine then you have a registry.

2. Programs and hardware files are stored in the registry so when one is opened, it's recognized by Windows. It's a good idea to become familiar with the basics of how your operating system works.

3. Be careful not to delete stuff when attempting to repair registry errors as this could cause items on your computer to no longer work or can even affect the hard drive.

4. When fixing errors, make it a habit to always create a back up file of your registry. This is more important for people with little experience in doing this. If you're not sure then it makes sense to consult with an expert.

5. Many programs you come across designed to assist you in cleaning the registry do have a restore function ability which eases worry during the cleaning process.

6. Let's say the hard drive is accidentally deleted - this would make the restore function useless so when shopping for a registry error fix program, always give preference to one that will be
kind to your system. In other wordsHealth Fitness Articles, one that doesn't cause problems in the first place

Source: Free Articles from ArticlesFactory.com
http://www.articlesfactory.com

video
http://www.youtube.com/watch?v=H-2VOMp7fvw

Download Music to Your PSP in 4 Steps

Don't want to put your favourite music on your PSP? This method is really easy and it's fool-proof.

I am going to show you how to put your favourite music on your PSP. This method is really easy and to tell the truth it's fool-proof so don't worry, anyone can use it.

1. The beginning

You need a CD Ripper and a PSP Video converter software. Wait a minute! What the heck is CD Ripper? It's a program which is used for pulling music=rip of CD's. Alright, but what is PSP Video converter? This will let you rip and convert videos to watch on the PSP. I hope the beginning was not difficult. Lets go on the next step!

2. Use the CD ripper

Now start the CD ripper, load the CD you want to use, select the song(s) you want to put on the PSP and hit the "extract and encode" to PSP. Make sure that you select the "PSP" format!

3. What to do if you already have music files on your computer?

In this case you have to hit "add" from your CD ripper application or PSP Video converter. Yeah it's easy, I told you.

4. The last step

After the steps above all you have to do is connect the PSP to your computer with the USB cable, and copy your MP3 file(s) into the "F:PSPMUSIC". Oh and "F" is equal the drive of the PSP. That means it can be "D" or "E" or another word on your computer.

That's all for now folks. Use this guide, and enjoy the music on your PSP!

http://www.articles43.com/article/Download-Music-to-Your-PSP-in-4-Steps-38019.html

video
http://www.youtube.com/watch?v=ttzlHYd14OI

How to Configure Ssh (secure Shell) for Remote Login on a Cisco Router

Prior to the introduction of SSH in the Cisco IOS, the only remote login protocol was Telnet. Although quite functional, Telnet is a non-secure protocol in which the entire session, including authentication, is in clear text and thus subject to snooping.

SSH is both a protocol and an application that replaces Telnet and provides an encrypted connection for remote administration of a Cisco network device such as a router, switch, or security appliance.

The Cisco IOS includes both an SSH server and an SSH client. This document is concerned only with the configuration of the SSH server component.

Prerequisites

Software

The SSH server component requires that you have an IPSec (DES or 3DES) encryption software image from Cisco IOS Release 12.1(1)T or later installed on your router. Advanced IP services images include the IPSec component. This document was written using c2800nm-advipservicesk9-mz.123-14.T5.bin.

Pre-configuration

You must configure a hostname and a domain name on your router. For example:

router#
router#conf t
Enter configuration commands, one per line. End with CNTL/Z.
router01(config)#hostname router01
router01(config)#ip domain-name soundtraining.net

You must also generate an RSA keypair for your router which automatically enables SSH. In the following example, note how the keypair is named for the combination of hostname and domain name that were previously configured. The modulus represents the key length. Cisco recommends a minimum key length of 1024 bits (even though the default key length is 512 bits):

router01(config)#
router01(config)#crypto key generate rsa
The name for the keys will be: router01.soundtraining.net
Choose the size of the key modulus in the range of 360 to 2048 for your General Purpose Keys. Choosing a key modulus greater than 512 may take a few minutes.

How many bits in the modulus [512]: 1024
% Generating 1024 bit RSA keys ...[OK]

Finally, you must either use an AAA server such as a RADIUS or TACACS+ server or create a local user database to authenticate remote users and enable authentication on the terminal lines. For the purpose of this document, we'll create a local user database on the router. In the following example, the user "donc" was created with a privilege level of 15 (the maximum allowed) and given an encrypted password of "p@ss5678". (The command "secret" followed by "0" tells the router to encrypt the following plaintext password. In the router's running configuration, the password would not be human readable.) We also used line configuration mode to tell the router to use its local user database for authentication (login local) on terminals lines 0-4.

router01(config)#username donc privilege 15 secret 0 p@ss5678
router01(config)#line vty 0 4
router01(config-line)#login local

Enabling SSH

To enable SSH, you must tell the router which keypair to use. Optionally, you can configure the SSH version (it defaults to SSH version 1), authentication timeout values, and several other parameters. In the following example, we told the router to use the previously created keypair and to use SSH version 2:

router01(config)#
router01(config)#ip ssh version 2
router01(config)#ip ssh rsa keypair-name router01.soundtraining.net

You can now log on to your router securely using an SSH client such as TeraTerm.

Viewing SSH Configurations and Connections

You can use the privileged mode commands "view ssh" and "view ip ssh" to view SSH configurations and connections (if any). In the following example, the SSHv1 configuration from a Cisco 871 router is verified using "show ip ssh" and a single SSHv1 connection is displayed using the command "show ssh". Notice that we did not enable SSHv2 on this router, so it defaulted to SSH version 1.99. Also note in the output of the "show ssh" command that SSH version 1 defaults to 3DES. SSHv2 supports AES, a more robust and efficient encryption technology. SSHv2 is also not subject to the same security exploits as SSHv1. soundtraining.net recommends the use of SSHv2 and disabling a dropback to SSHv1. Enabling SSHv2 disables SSHv1. This example is included only to demonstrate backwards compatibility:

router04#
router04#show ip ssh
SSH Enabled - version 1.99
Authentication timeout: 120 secs; Authentication retries: 3
router04#
router04#show ssh
Connection Version Encryption State Username
2 1.5 3DES Session started donc
%No SSHv2 server connections running.
router04#

You can also use the command "debug ip ssh" to troubleshoot SSH configurations.

Article Source: http://www.articlesbase.com/computers-articles/how-to-configure-ssh-secure-shell-for-remote-login-on-a-cisco-router-667048.html Article Tags: Ssh, Cisco Training, Telnet, Cisco Router Training, Network Cisco Training,
Remote Login

video
http://www.youtube.com/watch?v=VLDt7B0ZCJQ

Simple ways to add videos to you website

There are many different ways through webmasters look to increase the traffic on their websites and blogs. Increasing the number of visitors to their websites is quite reminiscent to adding more money into their pockets. Whether you have an online store to sell products or you simply earn by displaying advertisements on your website, number of visitors on a website work just like oxygen works for a human body.

Therefore, webmasters go to all limits in order to attract more visitors to their website. From adding articles to starting online contests, there are hoards of methods to pull more people to your website. One such tool to increase the popularity of your website is uploading quality videos to your website. Adding this feature will give a new dimension to your site, and will increase the interest of visitors. Apart from uploading videos to your own website, you can add them to several top websites that allow free submissions.

Uploading a video is not as difficult as it may seem on the first glance. Almost all of us have a digital camera of decent quality, which can be used to take pictures and videos of whatever you like. It is important to keep a steady hold on the camera as the success of your video depends on its quality. After successfully making videos, you can transfer them to your PC.

But your video right now is not in the finished form and you will require software to convert your video file's format into a compatible format. Although, most of the websites that allow video submission accept files in many formats but still you will have to get a file converter. The easiest way to get hold of one is through the internet, where you will easily find good file converter software for free.

MPG-Flash Converter software offers many features to convert file formats. This program compresses your video files into Flash format which is considered to be the best in video files. Then, all you have to do is to update your concerned webpage with a basic HTML code and upload these files to the hosting server system. All this might seem to be a bit hassling, but the results will be outstanding, as the videos will be viewed by viewers without the need to download them. After all, if your video does run at a good streaming rate, then you will lose your viewer immediately.

There are other programs that can convert videos to several other formats as well such as .AVI, .MPEG, .MOV and .SWI. A MOV-AVI file converter is also a great program that can convert files into any desired format. You can also choose to burn them on to your DVD as a built-in DVD authoring tool is also in it. A PSP Converter is also widely used by people who publish video files on the web. Just like audio files, it can convert video files to MP3 format as well.

Converting video is an easy job even for an inexperienced hand, as the features in these programs are self-explanatory. Whether you want to promote your website or you simply want to publish your memorable videos with friends and relatives, uploading videos is a fun job. Things to be kept in mind while uploading videos is that smaller size files will definitely run better. While publishing a video one should make sure that the rate at which it streams is decent as people haven’t got enough time to wait for hours to view your movie.

Article Source: http://www.articleszoom.com

video

http://www.youtube.com/watch?v=3MYrIwhwj6w


How To Safely Download A Screensavers

To download a screen saver is relatively simple. They are usually executable files with the extension "exe". Click these files twice with the left mouse button and the installation begins. The menus window will pop-up asking the user a location for the screen saver to be installed. The standard is usually the folder 'Program Files' on drive C. Sometimes, these executable files are compressed using a popular program called WinZip. These files can be unpacked and extracted using the same programs, ie, WinZip. After unpacking now they can be installed just like the other executable files are installed.

The Internet is the spin-off with a screen saver, which can be easily downloaded and installed. These are organized according to different themes. Some of them are stars, sports, nature, entertainment, politics and the movies. Most of these topics to users the additional option of all screensaver with music and without music. Many users to download the screensaver with the music, and if they do not want the music, they are just off the speakers of their computer. If the speakers are integrated, they have left, click on the speaker icon in the corner right on the screen on the left side and click again to control the option that says, dumb, or drag the volume of the deepest Point possible.

It is easy to download and install the screensaver, it's almost as easy to install, a screen saver, which is infected with a virus or adware or spyware. Such a screen saver may be the data on the user's computer and can also be temporary or permanent loss of data. It may also be too many pop-ups to a court hearing and to the chaos at work. Therefore, it is important for downloading screen savers from a trust. Even after downloading a screen saver from a trust, it is necessary to examine the executable file that was downloaded the screen saver for the virus.

Review of a file against viruses is relatively simple. A click with the right-click the executable file, a pop-up menu. The menu has a scan with ... "Option. On the left, click the option makes the anti-virus software on the user's computer scan and other infections. If the scanner shows that the executable file is infected, should be deleted immediately. Sometimes, the Anti -Virus software is configured to take care of that automatically deleted.

As long as users are careful, they can download screensavers, how many they want and install. However, it is also important that the area of the screen saver on your computer so that the computer is not prevented, with the screen saver. And it is important to have a screen saver, the computer processor can be used with ease, without freezing or slowing down.

Article Source: http://www.articleszoom.com

video

http://www.youtube.com/watch?v=1b6xmGo1SfI

Adobe Photoshop CS3: Top 5 Standout New Features

Upon first digging into Adobe Photoshop CS3, a few features have really popped out at me as incredibly useful. I would like to offer a brief overview of some of these new ways of attacking your creative challenges using the latest version of Adobe's flagship app. PsCS3 will run you about $649 to buy it outright if you do not own any previous versions. If you own Photoshop 7, CS, or CS2, you are eligible for upgrade pricing - looks like $199 for the upgrade. Check Adobe's store on their website for more info. For more information about what comes in the different versions of CS3, and what your suite configuration options are, see my previous post.

My current favorite five new PsCS3 features in order are:

1. Nondestructive Smart Filters
2. Quick Selection Tool & Refine Edge
3. Photomerge with advanced alignment and blending
4. Automatic layer alignment and blending
5. Vanishing Point with adjustable angle

Feature Overviews:

* Nondestructive Smart Filters

Adobe has finally given us non-linear, nondestructive filters. Can I just say "HOORAY!" In the past, you applied filters and effects in a linear order: one filter would alter your image, and the second filter would alter your now altered image, and a third filter would alter the altered altered image. The problem with that workflow is that if you decide you want to slightly tweak the second filter, you'd have to either undo back to that point (losing your subsequent edits), or use the history palette to step directly "back in time" to the point before you added the second filter, add your "revised" second filter and then add your third manually. All too often, you don't quite remember what exact parameters you had set on that third one - or worse, your real world project involved applying 20 filters instead of the 3 in my example and changing the second filter would mean redoing the 18 that follow it. What a drag. Because of this issue, people developed many work arounds (often involving saving off multiple "partially completed" versions of files all over your hard drive with iterative file names, hoping that if you needed to go back to a certain point in time you'd be able to figure out where you needed to be), and while these workarounds were clever and well-conceived in many cases, there was a perfect, real solution, waiting to happen.

The real solution to all this is what we have been given in CS3: Nondestructive Smart Filters. In this new version, each filter and effect that you apply to a layer, remains live and continually re-editable, in real time, and the parameters that you adjust will all cascade down through whatever subsequent filters or effects you might have added to your layer. These are savable, movable, copy and pastable, and most importantly scalable.

* Quick Selection tool & Refine Edge

A design mentor of mine once told me "Photoshop is all about the selection. You select something, and then you do something with the selection. Nothing more, nothing less. Remember that, and you'll never go wrong using this app." Almost 10 years later, I must say she was absolutely correct. Using Photoshop is all about "the selection." There are more tools in Photoshop for selecting than for any other single task.

As in just about every version of Photoshop that has ever been released, CS3 has made even greater strides in the area of "making your selection" than comes to memory in recent years. The new Quick Selection Tool used in combination with the Refine Edge palette is about the most helpful and clean way of selecting the edges of an object in your image that I have ever seen. This new revised Quick Selection tool is so smooth. You basically set the parameters of your Quick Selection tool - as if it were a brush - and paint the general area of your image edges (like trying to select just a kid and his soccer ball out of the photo of the big game) and Photoshop is watching what you do, and interpreting what you consider to be the general edges of what you are wanting to select and it figures out what's kid and ball and what's grass and goal posts and sky and crowd and selects just what you want it to. It's VERY fast and clean. Then, you can invoke the Refine Edge palette, and you have seemingly infinite control over exactly how the edges of that selection behave. Check out the palette to the right to get an idea of what you could do to "refine" that edge. With radius, feathering, smoothing, and various display settings, I believe this new combo will cut down on my masking and selecting time in a quantifiable way.

* Photomerge with advanced alignment and blending

Ever tried to stitch together a series of images that you took, that you intended to "put together" into a panorama? Even with some of the stand alone tools that have been available over the years—even those for doing quicktime VR's—are clunky and difficult to use - with mixed results at times. I have always wanted something built into Photoshop to let me do these "photo merges" - I never expected that Photoshop would actually be able to automatically do it for me. This feature floored me. The technologies involved in my number four choice "Automatic layer alignment and blending" are at work here in this feature as well, and the new auto layer alignment features in CS3 are far-reaching and crop up again and again in different areas of the application. It's really one of the revolutionary things about this new version.

All of the things that have made making panoramas a difficult task in the past are all done automatically. The primary among these being 1. those times when you have to actually distort, rotate, skew or transform one of your elements because the perspective is screwy, 2. those times when the sun or lighting or a window made the white balance, color space or over all wash of brightness and contrast different from one image to the next (especially when doing 360's) and of course 3. actually finding and aligning those overlapping areas of consecutive elements. Photoshop CS3 does these all for you and with surprisingly amazing results. It's not just about the typical "panorama" either... I saw a demo of someone standing "too close" to a building, and taking pictures zoomed all the way out, of the front door, windows and window-boxes, front brick walk way, tilting upward and taking a picture of the balcony and roof line of the second floor - in other words, many elements that were WAY out of whack in terms of perspective, lighting and color space, and these 4 or 5 images were distorted, tweaked, rotated, matched, blended, lighting and color density matched... and I was amazed in like 5 seconds, there was this "wide angle" almost "fisheye" photomerge of the front of the building, from brick walkway to roof-line, and it looked incredible.

* Automatic layer alignment and blending

Another powerful application of this new alignment and blending technology is with a series or stack of images of the same subject. Let's say you wanted to take a picture of a statue in a park somewhere, or a huge fountain, or the front of a monument or building. There are always people walking through the frame - if you can't close down the area and still need a picture of the statue, in the park, in it's beautiful setting, but with no people or birds or random elements - what are you to do? In the past, it was a painstaking process of shooting a bunch of images, selecting the "closest" one to your vision of a nice, clean, tourist-less frame, and begin the hours and hours of painting, cloning, healing, brushing etc., to remove all of your "randoms." There are artists who are very good at this process, but I'm fairly certain they would agree that if there was a way to not have to spend all that time, they'd take it. Well, it's here. Photoshop CS3 can take your stack of images and by analyzing all of them, figure out which things are permanent (things that appear in all the images like that building in the distance, the big tree, the sidewalk, and which parts of the image are obscured in one of the frames but not all of them, are healed automatically by borrowing pixels from other images in the stack and building an advanced composite of all the images and doing 90% or more of the work for you. There's even a set of "fuzziness" sliders letting you say "eleminate things that are in X% of the images in the stack or less." This is so impressive to see in action. You have to try it on some of your own images. It's really hard to believe that it's this easy to do this sort of process now. This is one of those new areas that I'm sure we'll see artists finding incredibly creative ways to utilize this feature. Again, this one floored me when I first saw it.

* Vanishing Point with adjustable angle

One of the most powerful new features of Adobe CS2 was the vanishing point feature. One limitation it had was that you only had one set of right angles to work with in the vanishing point interface. Adobe took it one exponential step further by adding multiple, adjustable angle perspective planes to this vanishing point feature. What this enables you to do is copy, paste and clone in far more complex image planes than just the "clone parts of a building in perspective" job that the first iteration of this feature offered (impressive and powerful, but not very flexible). One of the big examples Adobe is pushing with this feature is to simulate 3D packaging and work on multiple planes at various angles in the same image. Like an open box for a new product, or even for experimenting with your final package art by seeing it in its real-world context. Again I think this feature has so many far reaching implications for inventors, prototypers, 3D modelers, visual effects artists... and can give Photoshop artists the ability to render full blown mockups of product packaging art for clients in a whole new way - getting us to sign-off, green-light and on to the next project at hand much more quickly. I like that a lot.

There are numerous new features in the application, especially when you dig down deep into the Photoshop Extended editions (sounds like a Peter Jackson DVD...) and as the week progresses here, I'd like to look into some of what PsCS3 Extended has to offer. The versions of PsCS3 that are available are the Film & Video, Medical & Science, AEC (Architecture, Engineering & Construction), and Manufacturing editions.

Provided by ArticleGOLD: Articles Directory - Article Directory

http://www.articlegold.com

video
http://www.youtube.com/watch?v=0cMlG0ugge8

Key Steps To Creating An Adobe Dreamweaver Web Site

Adobe Dreamweaver has brought the business of web development within the reach of everybody. However, it is still a sophisticated piece of software with numerous floating palettes which can be a little off-putting for the new user. So, in this article, we aim to show you how to find your way through the maze of features and create a basic Dreamweaver web site.

It is very important that you design and sketch out how you want the site to work and what information will be available for users to navigate their way through. It is also a good idea to keep your first project simple. Once you have completed a basic version of your site, you can look to expand your knowledge and expertise and then add enhancements to the site.

Next, create a folder somewhere on your hard disk or desktop which will contain all of the files which will make up your site. Dreamweaver refers to this folder as the "local root folder". It should contain nothing but the files pertaining to your web site and will become a mirror image of your actual site when the site goes live.

Next, create a folder inside the "local root folder" which will hold your images. This will help you to avoid ending up with "broken images" on your site, where visitors are presented with an empty box instead of the actual image.

Now, finally, we launch Dreamweaver and create a new web site by choosing New Site from the Site menu. Click the Advanced tab ("Advanced" here simply means manual, so don't be intimidated.) You will notice a series of categories on the left of the screen. Only the first two categories need to be completed: Local Info and Remote Info.

Local Info relates to your version of the site. In this window, first enter a name for the new site. Next, click on the yellow folder icon next to the box marked "Local Root Folder" and browse for the folder you created earlier. Repeat this step to identify the "Default Image Folder".

The second piece of information is Remote Info. In this section, you tell Dreamweaver how to connect to the server hosting your web site. Set you Access Method to Local/Network if you are working on an intranet site then browse to locate your intranet server. Choose FTP if you are working on a public website for the internet and enter your FTP login details in each of the boxes. This information will be supplied by your web hosting company.

The next step is to create all of the pages in your website arranged in the appropriate sub-directories. Don't put any content in the pages at this stage, just create and save each page into your local root folder. This is done, so that later, when you create links on any page, the page that you link to will already exist, so you can just point to it and automatically create the correct link.

Naturally, you will want to ensure that there is some consistency within your pages with some elements that remain the same as visitors move from page to page. One of the best ways to achieve this is to create at least one Dreamweaver template. Templates contain the basic design and layout that you want each of the pages to have as well as editable regions which can be modified each time you apply the template to a page.

Having finished your template or templates, you are ready to build the web pages that will constitute your site. Simply open each page, choose Modify - Templates - Apply Template to Page and then add the text, images etc. that make up the page.

Provided by ArticleGOLD: Articles Directory - Article Directory

http://www.articlegold.com

video
http://www.youtube.com/watch?v=nUM_SUPvjjo

Operating Systems: File Systems

File systems are an integral part of any operating systems with the capacity for long term storage. There are two distinct parts of a file system, the mechanism for storing files and the directory structure into which they are organised. In mordern operating systems where it is possibe for several user to access the same files simultaneously it has also become necessary for such features as access control and different forms of file protection to be implemented.

A file is a collection of binary data. A file could represent a program, a document or in some cases part of the file system itself. In modern computing it is quite common for their to be several different storage devices attached to the same computer. A common data structure such as a file system allows the computer to access many different storage devices in the same way, for example, when you look at the contents of a hard drive or a cd you view it through the same interface even though they are completely different mediums with data mapped on them in completely different ways. Files can have very different data structures within them but can all be accessed by the same methods built into the file system. The arrangment of data within the file is then decided by the program creating it. The file systems also stores a number of attributes for the files within it.

All files have a name by which they can be accessed by the user. In most modern file systems the name consists of of three parts, its unique name, a period and an extension. For example the file 'bob.jpg' is uniquely identified by the first word 'bob', the extension jpg indicates that it is a jpeg image file. The file extension allows the operating system to decide what to do with the file if someone tries to open it. The operating system maintains a list of file extension associations. Should a user try to access 'bob.jpg' then it would most likely be opened in whatever the systems default image viewer is.

The system also stores the location of a file. In some file systems files can only be stored as one contigious block. This has simplifies storage and access to the file as the system then only needs to know where the file begins on the disk and how large it is. It does however lead to complications if the file is to be extended or removed as there may not be enough space available to fit the larger version of the file. Most modern file systems overcome this problem by using linked file allocation. This allows the file to be stored in any number of segments. The file system then has to store where every block of the file is and how large they are. This greatly simplifies file space allocation but is slower than contigious allocation as it is possible for the file to be spread out all over the disk. Modern oparating systems overome this flaw by providing a disk defragmenter. This is a utility that rearranges all the files on the disk so that thay are all in contigious blocks.

Information about the files protection is also integrated into the file system. Protection can range from the simple systems implemented in the FAT system of early windows where files could be marked as read-only or hidden to the more secure systems implemented in NTFS where the file system administrator can set up separate read and write access rights for different users or user groups. Although file protection adds a great deal of complexity and potential difficulties it is essential in an enviroment where many different computers or user can have access to the same drives via a network or time shared system such as raptor.

Some file systems also store data about which user created a file and at what time they created it. Although this is not essential to the running of the file system it is useful to the users of the system.

In order for a file system to function properly they need a number of defined operations for creating, opening and editing a file. Almost all file systems provide the same basic set of methods for manipulating files.

A file system must be able to create a file. To do this there must be enough space left on the drive to fit the file. There must also be no other file in the directory it is to be placed with the same name. Once the file is created the system will make a record of all the attributes noted above.

Once a file has been created we may need to edit it. This may be simply appending some data to the end of it or removing or replacing data already stored within it. When doing this the system keeps a write pointer marking where the next write oparation to the file should take place.

In order for a file to be useful it must of course be readable. To do this all you need to know the name and path of the file. From this the file system can ascertain where on the drive the file is stored. While reading a file the system keeps a read pointer. This stores which part of the drive is to be read next.

In some cases it is not possible to simply read all of the file into memory. File systems also allow you to reposition the read pointer within a file. To perform this operation the system needs to know how far into the file you want the read pointer to jump. An example of where this would be useful is a database system. When a query is made on the database it is obviously ineficient to read the whole file up to the point where the reuired data is, instead the application managing the database would determine where in the file the required bit of data is and jump to it. This operation is often known as a file seek.

File systems also allow you to delete files. To do this it needs to know the name and path of the file. To delete a file the systems simply removes its entry from the directory structure and adds all the space it previously occupied to the free space list (or whatever other free space management system it uses).

These are the most basic operations required by a file system to function properly. They are present in all modern computer file systems but the way they function may vary. For example, to perform the delete file operation in a modern file system like NTFS that has file protection built into it would be more complicated than the same operation in an older file system like FAT. Both systems would first check to see whether the file was in use before continuing, NTFS would then have to check whether the user currently deleting the file has permission to do so. Some file systems also allow multiple people to open the same file simultaneously and have to decide whether users have permission to write a file back to the disk if other users currently have it open. If two users have read and write permission to file should one be allowed to overwrite it while the other still has it open? Or if one user has read-write permission and another only has read permission on a file should the user with write permission be allowed to overwrite it if theres no chance of the other user also trying to do so?

Different file systems also support different access methods. The simplest method of accessing information in a file is sequential access. This is where the information in a file is accessed from the beginning one record at a time. To change the position in a file it can be rewound or forwarded a number of records or reset to the beginning of the file. This access method is based on file storage systems for tape drive but works as well on sequential access devices (like mordern DAT tape drives) as it does on random-access ones (like hard drives). Although this method is very simple in its operation and ideally suited for certain tasks such as playing media it is very inneficient for more complex tasks such as database management. A more modern approach that better facilitates reading tasks that arent likely to be sequential is direct access. direct access allows records to be read or written over in any order the application requires. This method of allowing any part of the file to be read in any order is better suited to modern hard drives as they too allow any part of the drive to be read in any order with little reduction in transfer rate. Direct access is better suited to to most applications than sequential access as it is designed around the most common storage medium in use today as opposed to one that isnt used very much anymore except for large offline back-ups. Given the way direct access works it is also possible to build other access methods on top of direct access such as sequential access or creating an index of all the records of the file speeding to speed up finding data in a file.

On top of storing and managing files on a drive the file system also maintains a system of directories in which the files are referenced. Modern hard drives store hundreds of gigabytes. The file system helps organise this data by dividing it up into directories. A directory can contain files or more directories. Like files there are several basic operation that a file system needs to a be able to perform on its directory structure to function properly.

It needs to be able to create a file. This is also covered by the overview of peration on a file but as well as creating the file it needs to be added to the directory structure.

When a file is deleted the space taken up by the file needs to be marked as free space. The file itself also needs to be removed from the directory structure.

Files may need to be renamed. This requires an alteration to the directory structure but the file itself remains un-changed.

List a directory. In order to use the disk properly the user will require to know whats in all the diretories stored on it. On top of this the user needs to be able to browse through the directories on the hard drive.

Since the first directory structures were designed they have gone through several large evolutions. Before directory structures were applied to file systems all files were stored on the same level. This is basically a system with one directory in which all the files are kept. The next advancement on this which would be considered the first directory structure is the two level directory. In this There is a singe list of directories which are all on the same level. The files are then stored in these directories. This allows different users and applications to store there files separately. After this came the first directory structures as we know them today, directory trees. Tree structure directories improves on two level directories by allowing directories as well as files to be stored in directories. All modern file systems use tree structore directories, but many have additional features such as security built on top of them.

Protection can be implemented in many ways. Some file systems allow you to have password protected directories. In this system. The file system wont allow you to access a directory before it is given a username and password for it. Others extend this system by given different users or groups access permissions. The operating system requires the user to log in before using the computer and then restrict their access to areas they dont have permission for. The system used by the computer science department for storage space and coursework submission on raptor is a good example of this. In a file system like NTFS all type of storage space, network access and use of device such as printers can be controlled in this way. Other types of access control can also be implemented outside of the file system. For example applications such as win zip allow you to password protect files.

There are many different file systems currently available to us on many different platforms and depending on the type of application and size of drive different situations suit different file system. If you were to design a file system for a tape backup system then a sequential access method would be better suited than a direct access method given the constraints of the hardware. Also if you had a small hard drive on a home computer then there would be no real advantage of using a more complex file system with features such as protection as it isn't likely to be needed. If i were to design a file system for a 10 gigabyte drive i would use linked allocation over contigious to make the most efficient use the drive space and limit the time needed to maintain the drive. I would also design a direct access method over a sequential access one to make the most use of the strengths of the hardware. The directory structure would be tree based to allow better organisation of information on the drive and would allow for acyclic directories to make it easier for several users to work on the same project. It would also have a file protection system that allowed for different access rights for different groups of users and password protection on directories and individual files.Several file systems that already implement the features ive decribed above as ideal for a 10gig hard drive are currently available, these include NTFS for the Windows NT and XP operating systems and ext2 which is used in linux.
http://www.articlecity.com

video
http://www.youtube.com/watch?v=iHYiG-H-bKw

Get FREE Internet Access on Your Computer

Will mobile internet ever be possible? Mobiles phone service providers give you access to the internet or at least that is the claimed. However, there are issues of boundaries, availability of good signals, telephone memory which affects down load speeds and the most prohibitive aspect is the cost.

You can have access to the internet via your computer on the move using s data card with a starting price of nearly £50 per month for limited access. Unlimited access via data card can cost as much as £150 per month. WEBAROO soon to be on the market is about to change all that. This device in conjunction with a computer or other mobile tool for the first time gives you the ability to have "Web on your computer on the move". This clever little tool does Google searches on the underground, on a plan, on top of a mountain or even in the wildest part of the Amazon jungles. How does Webaroo add the power of internet to your computer? Cutting edge compression technology which is the core of this device saves the internet on the hard drive of your computer or on your memory chip of your computer. The whole internet is compressed into 2 gigabytes of memory and it is thereafter yours to take it with you to where you want to take your computer. What are the benefits of this technology? There are no wifi issues to be concerned about. There are no costs for the use of internet on the move. You simply have free internet at your finger tips on your computer to use as you please. You can access useful information like maps, encyclopedia and even news stories. Short comings of Webaroo? You don't have access to the entire web. Your access to the web is limited to the internet as seen by Google. The amount of information being help does depend on the memory of your computer. Depending on the popularity of your search term, the search results are limited to the first few pages as opposed to the entire search results for your chosen term. Updates are only possible when the machine is hooked up to the internet the next time. Finally, Webaroo is not just another internet device or tool to fit neatly in a niche that has remained available for a long while. It is innovation itself. Webaroo; for the first time, has made it possible for people to have internet on their computer and in their pocket at its very first attempt. And, all that technology, information and system for free on your computer and on the move. Because of this achievement, Webaroo is therefore a very serious contender on the market with a myriad of possibilities. Webaroo is very good news for the market because it will encourage other suppliers in the market to come up with even more innovative products. Cheaper internet access via your computer on the move is really needed and I hope that Webaroo makes big inroads into that area by its very presence.

Did you find this article useful? For more useful tips & hints, Points to ponder and keep in mind, techniques & insights pertaining to Google Ad sense, Do please browse for more information at our website :-

http://www.reprintarticlesite.com
http://computertips.reprintarticlesite.com

http://www.articlebasement.com
video
http://www.youtube.com/watch?v=3lNqqryPBNU

Increase Server Uptime with Automatic Defrag

In today’s computing environment, uptime is a critical factor. This is because information technology has slowly crept up from the supporting position it had years back—suddenly we look up and IT is not merely enhancing business operations, it in itself has become business operations. When a customer is placing an order, it is directly or nearly directly with a computer. When a shipment is received by a customer, the receiving signature is scanned and receipt is immediately confirmed through a computer. Messaging, quotes, accounting, inventory—they’re all done straight through automated systems that cannot afford downtime.

Now that so many servers are “front and center” and must run 24X7, time to perform tasks such as anti-virus, backups and defrag has become incredibly scarce. So scarce, in fact, that some sites put off defrag until performance is absolutely intolerable and the only choice is to bring a system down and run a manual or scheduled defragmentation.

Disk fragmentation occurs when a file is broken up into pieces to fit on the disk. Because files are constantly being written, deleted and resized, fragmentation is a natural occurrence. When a file is spread out over several locations, it takes longer to read and write. But the effects of fragmentation are far more widespread: Slow performance, long boot-times, random crashes and freeze-ups — even a complete inability to boot up at all. Many users blame these problems on the operating systems, when disk fragmentation is often the real culprit.

In the context of administering computer systems, defragmentation is a process that reduces the amount of fragmentation in file systems. It does this by physically reorganizing the contents of the disk to store the pieces of each file close together and contiguously. It also attempts to create larger regions of free space using compaction to impede the return of fragmentation. Some defragmenters also try to keep smaller files within a single directory together, as they are often accessed in sequence.

Jim Bernal, Senior Network Engineer with Howe Barnes Hoefer & Arnett in Chicago, Illinois, found out just how bad it can get. “We constantly had servers running slowly and getting really fragmented from constant file access and over time file access would almost halt or take minutes to access a file,” Bernal said. “We also had problems with users logging in with domain controllers sometimes rejecting users because of timeouts in communicating with our DNS servers.”

Like many sites today, Bernal’s company was running the whole gamut of services and applications, including Microsoft Exchange, SQL, fileservers, domain controllers, print servers, Terminal Services, Live Communications servers, accounting software, SharePoint and Virtual Services servers for virtualization.

But also like many sites, Bernal’s fortunately discovered Disk Defragmentation. Only a high quality disk defragmenter utilizes only otherwise-idle system resources, so defrag takes place whenever and wherever possible. There is never a negative performance hit from defragmentation, and no scheduling is ever required. Performance is always maximized, so systems can remain up and running.

Today, taking your systems down is the same as taking part of your business down. Therefore it is always well said that its better to take care of your servers & systems before the problem
becomes incurable. So go ahead & download your copy of a free Disk Defragmentation Software

http://www.articlefeeder.com

3 Ways of Repairing the Windows Blue Screen

The most frustrating computer error of all, the blue screen that pops up out of no where and almost always when you're in the middle of something very important. The screen appears listing some strange cryptic message of numbers and letters about something going wrong. For us average computer users we have no idea what the heck is happening, I hope this article can help.

Once you've read through this article and tried each of the steps I hope that you will be able to cure your windows blue screen blues. Each of these tasks you can do on your own, and I suggest you give each one of them a try before you send your computer into a repair shop.

NOTE: Before you attempt any of these steps you should ensure you have a Windows restore point set, and that all of your important files and documents are backed up externally some how. This will ensure if anything went wrong you won't be at a total loss.

One: Scan your Windows Registry for Errors

Few computer users know what the Windows registry is. It's a grouping of files and information that really keeps Windows running. Every piece of software that is or has been installed on your PC makes a modification to the Registry system, and small errors can cause big problems.

If you don't have a registry cleaner I suggest you try Regcure a well known registry repair solution. They offer a free scan tool so you can scan your entire PC for errors in the registry before you have to spend a dime.

Two: Virus and Spyware Scanning

It's rare that a virus or piece of adware will envoke the blue screen error but it's not impossible. It's worth it to take the time to run a virus or adware scanner on your PC to look for these items and correct them if they exist.

If you don't have a piece of software to do either of these scans you can get a free virus scanner from Grisoft (AVG antivirus) and a free spyware/adware scanner from Lavasoft (Adaware).

Three: Un-install and Re-install Program(s)

When the blue screen error appears does it happen with the same program(s) consistently? If so it's possible that there is something corrupt with the file(s) of that particular program. The good news is this is one of the easier items to repair so long as you have the program(s) backed up.

Visit your control panel, then the Add/Remove programs icon. There you'll find a listing of all the programs on your PC. You can select programs to remove from this list. Once you've removed it you can then do a fresh install of that program.

NOTE: before you rush off to remove any programs ensure you do have the ability to re-install the program, and that you backup any of your personal files associated with that program as well.

What's Next if These Steps Don't Work?

There of course is a chance that none of this will improve the performance of your computer and you'll still be getting the blue screen error. If this is the case then you have two options.

There's always a chance that none of these items will fix the blue screen errors you're getting on. If this is the case there are two other options you can take.

1.) You can take your PC into a repair shop and let them take a go at it. Be prepared to spend a few bucks, and ensure you have everything backed up because there's a good chance they'll reformat everything.

2.) You can restore windows and format your hard drive yourself rather then paying a tech shop to do this. Again be sure you have everything backed up of course, because once you reformat and restore your Windows install you'll likely lose everything.


http://www.goarticles.com

video
http://www.youtube.com/watch?v=HFndVORlXGE

Discover the Easy Way to Copy Wii Games and to Make Backups Anytime You Want

The Nintendo Wii is an incredibly popular system that offers a unique method of gameplay. It s no wonder so many people want to make copies of their own Wii games as backups to keep them from being damaged.

Right off the bat we want to make one thing clear we are NOT encouraging you to copy games that you do not own. The purpose is to help you make backups of your existing games. Making backups of your own discs is completely legal.

While these games come on a disc that looks a lot like your burnable CDs, they can t just be copied the same way you d rip a music CD. It s a little more complicated than that. Here s a guide to tell you the basics of copying Wii games, as well as the circumstances when you should and shouldn t do it.

Your usual burning software can t copy your Wii games the same way you d burn a CD. Roxio, Nero, and other popular burning programs just can t copy these disks. That s because there s encoded copy protection on the disk that keeps your computer from being able to make sense of it.

I remember trying this on my computer a few years ago. I figured if Roxio could burn a CD, it could burn a game right?

My efforts just left me frustrated as obviously it wasn t working for me.

Of course, like most copy protection, it didn t take long for someone to come up with a workaround. There are programs available that can read through the copy protection that comes on a Wii disc.

Once you ve installed this kind of software, making a copy of the game is relatively easy your computer is suddenly able to understand the data that was unreadable before. This is true for games on just about any system, including the PS3, Xbox 360, and the Wii.

By having the one program, you are able to make copies of games for all your systems if you own more than just the Wii. You don t need a seperate program for each one.

Even some PC games use encryption that can be broken by these programs. Should you own more than one game system, this software can help you produce backup copies for all of them, not just your Wii.

After you ve found and installed a program to help you break the encryption, you ll need to copy the data on your game as a disk image. Once you have this disk image on your hard drive, all you need to do is put a blank DVD or CD into the drive, then instruct the program to burn the image to it.

The copying programs that are now available make it possible to copy Wii games without having to do anything but click a few buttons. Copying Wii games is a great way to make a backup copy of any game you want. It never hurts to have a backup in the case that the original gets lost or damaged. Enjoy!
Author Resource:- Go to http://www.burnyourgames.com to find out how you can get a free trial of the most popular game-copying software.
Article From Article Press

http://www.articlepress.org

video
http://www.youtube.com/watch?v=2OiXV0h8Jec

Data Loss and Data Recovery: An Overview

Data stored on computers can get lost in several ways. To recover from such a situation the main option would be to restore from backed up data.Alternatively calling on the services of a specialist data recovery company. Reconstructing all the lost data manually is usually not a viable option.

Reconstruction will involve:
  • Locating the original documents or specifications,

  • Huge amounts of data entry, and

  • Serious disruption to the business during the reconstruction period



    • The cost of such an exercise can seem very expensive, but without it's being done a company's viability can be put at risk.

      This is the context in which data recovery becomes a significant issue. Before we look at data recovery, let us take a brief look at how data gets lost.

      How Does Data Get Lost?

      Data stored on computer media can get lost in different ways, including:

      • User actions such as deleting data unintentionally, carelessly, or even deliberately for malicious or financial gain

      • Loss of removable media such as CD/DVD on which valuable data were stored (see UK Revenue and Customs, DVLA, Banks and Building Societies etc ) /li>
      • Administration and other human errors leading to loss of valuable data (e.g leaving primary data on a laptop not backed up which can be at risk of theft.)

      • Power supply problems leading to system malfunctions that cause data damage

      • System crashes leading to incomplete sessions and loss of data

      • Hardware problems causing incorrect or incomplete write operations

      • Corrupted media or databases making recorded data unreadable

      • Natural disasters like fire, flood or earthquake destroying the computer facilities

      • Data loss caused by malicious external agents like viruses and hackers

      • Pilferage of physical media or equipment such as laptop computers



      Studies indicate that almost three quarters of data loss is caused by hardware failure and human errors. It is in these cases that data recovery becomes a viable option.

      Data recovery is not possible where the media storing the data has been lost and there are no backups available.

      Preventing Data Loss

      USER EDUCATION: Training your staff in various aspects of computer operations can minimize data losses, particularly losses caused through human errors, which are a major cause of data loss. Staff can be trained to take the necessary precautions, such as backing up, antivirus checking, working through firewalls, but there should always be someone in charge the security of data.

      BACKUP: The impact of data loss can be minimized through well-implemented data backup procedures. The qualification "well-implemented" is important. Often, data backup is done in a routine manner without checking whether a full data recovery is possible in case original data is lost.

      Data backup might not be up to date. Data in backup media can prove irrecoverable owing to improper backing up or media corruption. It is important to make regular reviews and tests of both back up procedures and backed up data to ensure that the data is indeed recoverable if it becomes necessary.

      Storing backed up data in a location away from the primary data location can help in such cases as a fire / flood or other natural disaster.

      ANTI VIRUS & FIREWALL SOFTWARE: Anti virus software, if kept up to date, can help guard against virus attacks. Firewalls can stop most hackers from hacking into your systems.

      REDUNDANT MEDIA AND WRITE OPERATIONS: Data is written to more than one media device or location so that if one of them fails, the other can be used to repair the damage.


      Data Recovery

      Where a proper backup system is in place, lost data can be recovered to a greater or lesser extent using the backups. The speed of such recovery will depend on the kind of backup media used. Where the backup media is online, such as in RAID systems, or Web-based third party facilities, data recovery can be quick.

      At the other extreme, where data is stored on magnetic tapes at locations away from the primary site, data recovery could be a time-consuming exercise and may need to be shipped or couriered to the main location.

      Where backups are not available or unsatisfactory, you have to depend on data recovery software or data recovery specialists. Data recovery software might be able to recover deleted files and repair corrupted directories. However, more serious data losses are likely to need the services of data recovery companies with expertise and specialized facilities, like Class 100 (Iso 5) Clean Rooms.

      Data recovery companies extract the raw image from the disk and might try different techniques such as file system recovery, replacing damaged hardware components with compatible healthy ones, and reprogramming the firmware. These are technically involved and often delicate procedures requiring considerations to dust and electrostatic discharge (esd) in order to recover as much of the data as possible.

      Conclusion

      Data loss can occur owing to numerous factors and is something that has to be planned against. Training your computer personnel, proper back up procedures and use of anti-virus and firewall software are some of the measures you can take to guard against data loss.

      If these measures are absent or prove inadequate, you may have to approach
      external data recovery specialists, with the expertise and facilities to recover lost
      http://www.softensive.com








video

http://www.youtube.com/watch?v=1_sNdPoQdcM

Partial Page Rendering Using Hidden IFrame

Partial Page Rendering Using Hidden IFrame
Executive Summary:

Partial-page rendering removes the need for the whole web page to be refreshed as the result of a postback. Instead, only individual regions of the page that have changed are updated. As a result, users do not see the whole page reload with every postback, which makes user interaction with the Web page more seamless.
Developers that want to add such behaviors to their web pages are often faced with a difficult decision. All of these actions can be implemented using a very simple solution: by refreshing the entire page in response to the user interaction. However this solution is easy but not always desirable. The full page refresh can be slow, giving the user the impression that the application is unresponsive. Another option is to implement such actions using JavaScript (or other client-side scripting technologies). This results in faster response times, at the expense of more complex, less portable code. JavaScript may be a good choice for simple actions, such as updating an image. However, for more complicated actions, such as scrolling through data in a table, writing custom JavaScript code can be a very challenging undertaking.
This paper provides a solution which avoids the drawbacks of the full page refresh and custom JavaScript solutions. In this paper partial page rendering functionality provides the ability to re-render a limited portion of a page. As in the full page render solution, partial page rendering sends a request back to the application on the middle-tier to fetch the new contents. However, when partial page rendering is used to update the page, only the modified contents are sent back to the browser. This paper gives the solution using a hidden IFrame and simple JavaScript to merge the new contents back into the web page. The end result is that the page is updated without custom JavaScript code, and without the loss of context that typically occurs with a full page refresh.

Introduction:

Web pages typically support a variety of actions, such as entering and submitting form data and navigating to different pages. Many web pages also support another type of action, which is to allow the user to make modifications to the contents of the web page itself without actually navigating to a different page. Some examples of such actions include.
Clicking on a link could update an image on the same page. For example, an automobile configuration application might update an image of a car as the user chooses different options, such as the preferred color.
Selecting an item from a choice box might result in modifications to other fields on the same page. For example, selecting a car make might update the set of available car models that are displayed.
Clicking a link or selecting an item from a choice could be used to scroll to a new page of data in a table. Clicking a button in a table might add a new row to the table.
All of these actions are similar in that they result in the same page being re-rendered in a slightly different state. Ideally, these changes should be implemented as seemlessly as possible, so that the user does not experience a loss of context which could distract from the task at hand.
Partial page rendering can be implemented with very simple solution using a hidden IFrame and minimal JavaScript. Any part of the page can be partially rendered with using a div or table tags in HTML.

Page Elements That May Change During PPR:

•Re-Render Data: The same fields are redrawn but their data is updated. Examples include the Refresh Data action button, or recalculate totals in a table.
•Re-render Dependent Fields: Fields may be added, removed, or change sequence, and data may be updated. Examples include the Country choice list, which may display different address fields, and toggling between Simple and Advanced Search.
•Hide/Show Content: Both fields and data toggle in and out of view.

Page Elements That Do Not Change During PPR:

Some page elements are always associated with a page, regardless of the content displayed on the page.

As a general rule of thumb, elements above the page title (except message boxes) remain constant and do not change position, whereas elements in footer constant but may move up or down the page to accommodate changes to page content. The following elements never change when PPR is initiated:
• Branding
• Global buttons
• Tabs, Horizontal Navigation, SubTabs
• Locator elements: Breadcrumbs, Train, Next/Back Locator
• Quick links
• Page titles (first level header)
• Page footer
• Separator lines between the Tabs and Page Title
In most cases the following elements will also not change, other than moving up or down the page to accommodate changed elements. Nevertheless, in certain cases actions on the page may require them to be redrawn:
• Side Navigation, unless it contains a Hide/Show control.
• Subtabs
• Contextual information
• Page-level action/navigation buttons
• Page-level Instruction text
• Page-level Page stamps
• Page-level Key Notation
In all above scenarios this solution can be used to achieve the good performance and user interaction of the web pages.

Contexts in Which PPR Should Not Be Used:

When PPR is implemented correctly, it significantly improves application performance. When performance improvement is not possible with PPR, it should not be implemented, thus avoiding unnecessary code bloat, PPR can’t be used when navigating to another page (with a different title).

Partial Page Rendering Solution:

Solution provided to the Partial Page Rendering using simple hidden iframe and JavaScript, this can be used as a generalized solution to all the Partial Page Rendering scenarios.
Below is the main html (Table 1.1), which will have two buttons one is to show a simple table which will be generated by the server, and another button to remove the table.

[html]
[head]
[title] Main Document [/title]
[script language="JavaScript"]
[!--
function showTable() {
hiframe.location="./table.htm";
}
function removeTable() {
document.getElementById("tableId").innerHTML="";
}
//--]
[/script]
[/head]
[body]
[iframe id="hiframe" style="visibility:hidden;display:none"][/iframe]
[table]
[tr]
[td]Table::[/td]
[td][/td]
[/tr]
[tr]
[td colspan="2"][div id="tableId"][/div][/td]
[/tr]
[tr]
[td][input type="button" value="Show Table" onclick="showTable()"][/td]
[td][input type="button" value="Remove Table" onclick="removeTable()"][/td]
[/tr]
[/table]
[/body]
[/html]

Table 1.1

[iframe id="hiframe" style="visibility:hidden;display:none"][/iframe]
This iframe tag is used as target to the Partial Page Rendering Request.
The tag [input type="button" value="Show Table" onclick="showTable()"] gives the user action to get the contents of a table from the server, in this solution sample html is provided to render the table, which supposed to be generated by the server.
The tag [input type="button" value="Remove Table" onclick="removeTable()"] gives the user to remove the table from the user interface.
The JavaScript
function showTable() {
hiframe.location="./table.htm";
}
Is used to get the contents from the server, the line hiframe.location="./table.htm"; sends the GET request to the server, and as a response iframe gets the HTML.
If the requirement insists to send a POST request for Partial Page rendering Response, that can be achieved by setting the html form element target attribute as the name of hidden iframe.

The code for the post request looks like
[form method=”post” action=”/myaction” target=”hiframe”]

Partial Page Rendering Server Response:

Table 1.2 shows the sample response from the server for Partial Page Rendering. This response has the JavaScript code to transfer the HTML from hidden iframe to main page.


[html]
[head]
[script language="JavaScript"]
[!--
function iframeLoad() {
parent.document.getElementById("tableId").innerHTML = document.getElementById("tableId").innerHTML;
}
//--]
[/script]
[/head]
[body onload="iframeLoad()"]
[div id="tableId"]
[table]
[tr]
[td]1[/td]
[td]One[/td]
[/tr]
[tr]
[td]2[/td]
[td]Two[/td]
[/tr]
[/table]
[/div]
[/body]
[/html]

Table 1.2
The tag [div id="tableId"] encloses the content to transfer from hidden iframe to main page.
[table]
[tr]
[td]1[/td]
[td]One[/td]
[/tr]
[tr]
[td]2[/td]
[td]Two[/td]
[/tr]
[/table]
This is the content to show the table to user.

The code [body onload="iframeLoad()"] is used for triggering the action to transfer the content.

function iframeLoad() {
parent.document.getElementById("tableId").innerHTML = document.getElementById("tableId").innerHTML;
}

This JavaScript function does the transferring data from the hidden iframe to main page.
parent.document.getElementById("tableId").innerHTML This part refers to tag div html id in main page and this part document.getElementById("tableId").innerHTML refers the HTML of the Partial Page Response.


Conclusion:

Improve the user experience with Web pages that are richer, that are more responsive to user actions, and that behave like traditional client applications. Reduce full-page refreshes and avoid page flicker. Partial page rendering using iframe is a very simple solution.

References:
1. http://ajax.asp.net/docs/overview/PartialPageRenderingOverview.aspx
2. http://www.w3schools.com/htmldom/dom_obj_document.asp
3. http://www.w3schools.com/tags/tag_iframe.asp
4. http://www.oracle.com/technology/tech/blaf/specs/ppr.html
5. http://download-west.oracle.com/otn_hosted_doc/jdeveloper/904preview/uixhelp

/uixdevguide/partialpage.html

source
http://www.articleorange.com
video
http://www.youtube.com/watch?v=SDE782cFm7M
Custom Search
Powered By Blogger