Cari Blog Ini

A headache could attack everyone and many peoples have suffered headaches

A headache could attack everyone and many peoples have suffered headaches. Simply put, having a headache can put a damper us on our entire day. If you’re suffering headaches, here are some tips to relieve your headaches, naturally:

a. Take a break from your current activity




Everyone use their heads to think most of the time. Like our others organ, we also need to rest our mind. Remember to give our head a rest. Headaches can sometimes be your body’s sign that you’re doing too much and need to slow down, so listen to what it’s telling you.






b. Breathe deeply
When your head hurts, stop, relax and take some deep breaths. Don’t underestimate the ability of the breath to calm your body and move energy and stress through it that may be stuck and causing pain. In fact, this is a good practice for every day, whether you’re experiencing pain or not.






c. Eat healthy
Everyone needs foods for their life. Everyone know, better foods gives us better life. So, begin with a good breakfast, which some people feel is the most vital meal of the day. You should also maintain a balanced diet throughout the day, so you can maintain consistent energy and blood sugar levels.






d. Cut out the caffeine
Caffeine can boost your energy and wake you up, but using it excessively (or even at all, for some people) can also cause tension headaches and leave you feeling nervous and irritable. This is another instance when it’s beneficial to listen to what your body tells you. If you have a reaction when you drink coffee, simply eliminate it. Herbal teas are good substitutes, as are roasted grain drinks that simulate coffee taste. You can buy these from the health food store.






e. Say no to additives
Food additives, such as artificial colors and flavors, can trigger headaches. There’s even some evidence that large doses over time may cause more serious problems, such as strokes and seizures. There’s no reason to ingest these additives and they can be easily avoided if you stick to natural foods, with an emphasis on “live” substances, such as fruits and vegetables.






f. Apply a cold, wet cloth
Cool down your aching head by using a towel that has been soaked in cold water and wrung out. If you have the patience to wait, you can also place the wet towel in the freezer before applying it to your head.






g. See an eye specialist
Vision problems or eye strain can sometimes be the cause of headaches, so if you have consistent headaches that don’t seem to have any other cause, get your vision checked. To lessen the financial stress going to the eye doctor can generate, check out your medical coverage to see if you’re covered. Some medical health plans have eye care coverage options, so know if yours does before you go.






If you don’t know what’s causing your headaches, you can assess which of the above factors are relevant to you by keeping a diary that lists which activities you’ve done during the day and what foods you’ve eaten. Patterns will probably surface quickly as you keep the diary, which will give you a good basis for knowing how to treat your headaches.










(sources; http://myonlinehealtharticles.com/headache-relief-tips/)

The Advancement of the Keylogger


A keylogger is a program that runs in your computer’s background secretly recording all your keystrokes. Once your keystrokes are logged, they are hidden away for later retrieval by the attacker. The attacker then carefully reviews the information in hopes of finding passwords or other information that would prove useful to them. For example, a keylogger can easily obtain confidential emails and reveal them to any interested outside party willing to pay for the information.

Keyloggers can be either software or hardware based. Software-based keyloggers are easy to distribute and infect, but at the same time are more easily detectable. Hardware-based keyloggers are more complex and harder to detect. For all that you know, your keyboard could have a keylogger chip attached and anything being typed is recorded into a flash memory sitting inside your keyboard. Keyloggers have become one of the most powerful applications used for gathering information in a world where encrypted traffic is becoming more and more common.

As keyloggers become more advanced, the ability to detect them becomes more difficult. They can violate a user’s privacy for months, or even years, without being noticed. During that time frame, a keylogger can collect a lot of information about the user it is monitoring. A keylogger can potential obtain not only passwords and log-in names, but credit card numbers, bank account details, contacts, interests, web browsing habits, and much more. All this collected information can be used to steal user’s personal documents, money, or even their identity.

A keylogger might be as simple as an .exe and a .dll that is placed in a computer and activated upon boot up via an entry in the registry. Or, the more sophisticated keyloggers, such as the Perfect Keylogger or ProBot Activity Monitor have developed a full line of nasty abilities including:

• Undetectable in the process list and invisible in operation
• A kernel keylogger driver that captures keystrokes even when the user is logged off
• A remote deployment wizard
• The ability to create text snapshots of active applications
• The ability to capture http post data (including log-ins/passwords)
• The ability to timestamp record workstation usage
• HTML and text log file export
• Automatic e-mail log file delivery

All keyloggers are not used for illegal purposes. A variety of other uses have surfaced. Keyloggers have been used to monitor web sites visited as a means of parental control over children. They have been actively used to prevent child pornography and avoid children coming in contact with dangerous elements on the web. Additionally, in December, 2001, a federal court ruled that the FBI did not need a special wiretap order to place a keystroke logging device on a suspect’s computer. The judge allowed the FBI to keep details of its key logging device secret (citing national security concerns). The defendant in the case, Nicodemo Scarfo Jr., indicted for gambling and loan-sharking, used encryption to protect a file on his computer. The FBI used the keystroke logging device to capture Scarfo’s password and gain access to the needed file.

Planet Gliese 581d Livable Ascertained

Gliese 581d, a rocky planet orbiting a giant red dwarf stars (stars with masses lower than the sun and the temperature below 4000 degrees Kelvin) is confirmed as the first planet that meets the requirements to accommodate life.

Planet which is about 20 light-years from Earth is one of our closest neighboring planet. He estimated temperature is warm enough and wet enough to cultivate a similar life-owned planet Earth.

Orbiting Gliese 581d in the Goldilocks zone (the area where possible life forms) belonging to the star Gliese 581. As is known, in the Goldilocks zone, the temperature not too hot, causing the water to boil or not too cold to make it freeze but it was in the right temperature so that water remains in liquid form.

"With a dense atmosphere of carbon dioxide will, which is the most probable scenario for giant planet, Gliese 581d stable climate and warm enough to have oceans, clouds, and rainfall," researchers said the National Centre for Scientific Research (CNRS).

Quoted from the Daily Galaxy, May 19, 2011, according to research published in the Astrophysical Journal Letters, Gliese 581d has a mass of at least 7 times bigger than the Earth is about 2 times the planet Earth.

Before this, the attention of astronomers precisely the focus to his brother, the planet Gliese 581g, after it emerged that the planet has a mass similar to Earth's mass and also near Goldilocks zone.

Was first discovered in 2007, Gliese 581d candidate was not originally signed as a place to search for extraterrestrial life. One reason is that he only gets a third of solar radiation as Earth and possibly get 'tidally locked' or just one side that always faces its sun and have a permanent day and night.

However, the latest model made by Robin Wordsworth, Francois Forget, colleagues and other CNRS researchers show a surprising result. Planet's atmosphere is able to store heat thanks to the dense gas CO2 and warmed by the light from the star.

"Overall, there temperature allows liquid water is present on the surface of the planet," said the researcher. "The mass of the planet that also means the gravity on its surface approximately two times higher than Earth's gravity," he said.

However, researchers can not simply send astronauts to the planet. From Earth, the spacecraft that can fly at speeds approaching the speed of light takes more than 20 years to get there. Unfortunately, the rocket technology that has been owned human beings has been only able to deliver us to Gliese 581d in 300 thousand years.

Protection You Can Afford


There are numerous ways you can lose the information on your computer. Your child decides to play Chopin on your keyboard, a power surge, lightening, a virus, or even simple equipment failure. Therefore, backing up the contents of your hard drive is an absolute MUST. By regularly making backup copies of your files and storing them in a separate location, you can typically get some, if not all, of your information back in the event your computer crashes.

While a regular backup to floppy, CD, or zip drive will save your files, wouldn’t it be great if you could create an exact copy (a drive image) of your hard disk? That means backups of all your files, programs, and user settings. This would definitely save you time when it came to reloading. Acronis may be able to help.

Acronis True Image 9.0 is a robust disk-imaging utility software that copies the entire contents of your hard drive including data and operating system files, personalized settings, and more, onto another disk or disk partition. Its layout is easy to use and navigate. It also includes wizards which can walk you through both backing up and restoring your computer. Highlighted features include:

• Secure Zone — allows you to save data to a special hidden partition located on your hard drive which would eliminate the need to purchase an extra hard drive.
• PC Cloning — you can upgrade to a new system disk without needing to reinstall the operating system and applications, or configure user settings.
• Acronis Snap Restore - lightening-speed restore of your PC from an image. You can start working in seconds while your system is still being restored.

Acronis provides a free test-drive of its product and a 30-day money back guarantee. When you are ready to purchase, you can either download for $49.99, or if you so desire, order a boxed version for $59.99. With Acronis True Image Home 9.0, you can rest easy that your family pictures, personal documents, tax returns, resumes, and other important information will not be lost forever.

Fujitsu announced the launch of the ScanSnap N1800


Fujitsu announced the launch of the ScanSnap N1800, network document scanner the first to offer features connection to various services such as Salesforce CRM Cloud, Google Docs and Evernote.

This scanner combines functionality with ease of use so that the scanning process and share documents seamlessly take place without the complicated process of preparation.

ScanSnap N1800 has a fully functional so that more cost effective because users do not need to purchase additional hardware. Users simply press one button to start the scanning process so that the accelerating digitalization of documents in order to facilitate access to information within the company.

The scanner is equipped with features advanced security to ensure the protection and safety when used by many users.

N1800 ScanSnap is a compact size, only 300mm x 226mm x 172mm, and is equipped with the Installation Wizard for easy installation in an office environment.

Administration function allows you to manage and organize a network consisting of many ScanSnap N1800, only from a single console. Menu on the touch panel and scan settings can be adjusted to the specific needs of users or groups of users so that more optimal in supporting work activities.

"Along with the trend of Internet-based IT networks, ScanSnap N1800 is designed with a variety of network capacity to meet the needs of today's business is increasingly challenging. This scanner can be placed in the organization's intranet system, but with features connection to the Cloud service, we aim to increase efficiency and productivity in the workplace, "said Janet Tan, Regional Director of the Fujitsu Imaging Products, told through its official statement on Monday (16 / 5 / 2011).

"Innovation Fujitsu in bringing the concept of an ideal document solution works efficiently and effectively become a reality. ScanSnap N1800 allows users to scan and upload documents to the cloud and access digital data from anywhere through a single touch. It is very easy in the sharing of information, "said Raymond Firdauzi, Country Head of Product Platforms Fujitsu Indonesia.

"ScanSnap N1800 Fujitsu will strengthen its position as the leader of the document scanner market in Indonesia since the second half of 2009 both in terms of volume and revenue."

Price ScanSnap N1800 is USD2, 070 and already available in Indonesia, Singapore, Malaysia, Thailand, Vietnam, Philippines and India.

Translated by Google
Oroginal Source:http://techno.okezone.com

How many spyware items are infecting your computer?


I just had, by mistake, a plug-in called Intelligent Explorer attach to my browser. What a nightmare! I have another article on this topic, but this brings home a point. Spyware or adware items are continually infecting computers. Most computers have no protection from them. Most frightening is the frequency of them. From the InfosecWriters web site, "According to a 2004 survey by America Online and the National Cyber Security Alliance, 91% of users questioned were familiar with the term spyware. Only 53% believed their computers were infected, but a scan found that 80% of their PCs had some type of spyware installed on them." It goes on to say, "...The average number of spyware components per computer was 93 with one computer having well over a thousand."

What is Spyware?

Butte College (www.bctv.butte.edu/support/spyware.html) offers this definition:

“The term ‘spyware’ is broadly defined as any program that gets into your computer without permission and hides in the background while it makes unwanted changes to your user experience.
Spyware is generally not designed to damage your computer. The damage it does is more a by-product of its main mission, which is to serve you targeted advertisements or make your browser display certain sites or search results.
At present, most spyware targets only the Windows operating system (Internet Explorer).”

To be fair, spyware can be harmless, for example tracking cookies don’t do much. While such things infringe on your privacy, they don't really harm anything. Others, however, are extremely dangerous.

So what do you do about it?

No spyware program seems to do everything, but there are a lot of goods solutions out there that can help. Here is a list of some of the top Spyware tools to look at:


1) Try Ad-Aware 6.0 Professional from LavaSoft (there is also a free version with less functionality)

2) Spybot Search & Destroy from PepiMK Software


3) Xoftspy form Pareto Logic

5) Spyware Guard from Javacool Software is a free program

4) Pest Patrol (now part of Computer Associates by acquisition)

5) McAfee Anti-Spyware

One thing is for certain: you do need to take spyware seriously. For some reason, too many people out there think anti-virus solutions are the end-all solution. They are not.

And, when all else fails?

Finally, as drastic as it seems, if your computer has been infected with a large number of spyware programs, the only solution you may have is backing up your data, and performing a complete reinstall of the operating system.

make your reading easy bye Reader Book Light


eReaders have certainly picked up the pace over the years, what with the introduction of touchscreen devices and what not. Well, some of us might have migrated our in-bed reading habits from a paperback to a paperless version with the slew of eReaders around, but what happens when you are looking for the perfect reading light solution that won’t disturb your soundly sleeping partner while not straining your eyes at the same time?
Enter the eReader Book Light, where it lets you shine a bright light at any angle and in any direction thanks to a fully adjustable and flexible arm. There is also a special e-flector that prevents glare while focusing soft, diffused light onto the screen. Capable of delivering more than 15 hours of readable light, each $30 purchase will come with batteries to get you started right out of the box.

Fighting off Viruses: Advancements in Antivirus Software Suites


Protecting your computer from a virus is getting harder and harder each day. While it may border on the paranoid, it goes without saying that you can’t leave your guard down for one second. Even corporate giant Microsoft has found its own systems compromised on more than one occasion.

Remember the “good old days”, before the advent of the Internet and downloadable programs? Life was simple then in terms of computer viruses. With the primary way in which a virus could be transmitted being limited to floppy disks, the ability to catch and eradicate the virus was a lot easier. By today’s standards, it used to take quite a while before a virus was able to infect a computer and slow down the system. The antivirus software of that time was typically able to identify and eradicate viruses before they caused too much damage. Additionally, computer users were pretty savvy on how to protect themselves in terms of scanning all floppy disks before copying them to our desktop.

The Internet helped change all that. The Internet provided a conduit by which viruses could move from host to host with lightening speed. No longer could a computer user just worry about floppy disks as points of entry, but they now had to worry about email, email attachments, peer-to-peer file sharing, instant messaging, and software downloads. Today’s viruses can attack through multiple entry points, spread without human intervention, and take full advantage of vulnerabilities within a system or program. With technology advancing everyday, and the convergence of computers with other mobile devices, the potential of new types of threats also increase.

Protecting Your Computer
Luckily, the advancement of antivirus software has kept pace with current virus threats. Antivirus software is essential to a computer’s ability to fend off viruses and other malicious programs. These products are designed to protect against the ability of a virus to enter a computer through email, web browsers, file servers and desktops. Additionally, these programs offer a centralized control feature that handle deployment, configuration and updating.
A computer user should remain diligent and follow a few simple steps to protect against the threat of a virus:

1. Evaluate your current computer security system.
With the threat of a new generation of viruses able to attack in a multitude of ways, the approach of having just one antivirus software version has become outdated. You need to be confident that you have protected all aspects of your computer system from the desktop to the network, and from the gateway to the server. Consider a more comprehensive security system which includes several features including antivirus, firewall, content filtering, and intrusion detection. This type of system will make it more difficult for the virus to penetrate your system.
2. Only install antivirus software created by a well-known, reputable company.
Because new viruses erupt daily, it is important that you regularly update your antivirus software. Become familiar with the software’s real-time scan feature and configure it to start automatically each time you boot your computer. This will protect your system by automatically checking your computer each time it is powered up.
3. Make it a habit to always scan all new programs or files no matter from where they originate.
4. Exercise caution when opening binary, Word, or Excel documents of unknown sources especially if they were received during an online chat or as an attachment to an email.
5. Perform regular backups in case your system is corrupted. It may be the only way to recover your data if infected.

Recommended Antivirus Software
There are numerous applications available to consumers. With a little research, you can pick the program that is right for you. Many programs provide a trial version which allows you to download the program and test its abilities. However, be aware that some anti-virus programs can be difficult to uninstall. As a precaution make sure to set up a System Restore point before installing.

Here are a few programs which typically receive high marks in terms of cost, effectiveness, ease of use, and customer service.


The Shield Pro ™ provides virus protection and hacker security through ongoing support and updates. When a virus breaks out, The Shield Pro™ promises to provide a patch within 2-3 hours and a fix for the virus within 5 hours. You can set your computer to update viruses weekly and run a complete virus scan.

BitDefender 9 Standard provides antivirus protection, as well as Peer-2-Peer Applications protection, full email protection, and heuristics in a virtual environment. This provides a new security layer that keeps the operating system safe from unknown viruses by detecting malicious pieces of code for which signatures have not been released yet.

Kaspersky Anti-Virus Personal  program is simple to install and use. The user only needs to choose from three levels of protection. It allows updates as frequently as every hour while promising not to disrupt your computer. The program also offers a two-tier email protection feature and round-the-clock technical support.

PC-cillin Internet Security combines antivirus security and a personal firewall—for comprehensive protection against viruses, worms, Trojans, and hackers. It also detects and removes spyware and blocks spam. It even guards against identity theft by blocking phishing and pharming attacks.

AVG Anti-Virus Free Edition is a free downloadable antivirus program that has received high marks for its reliability. In the past, free downloadable antivirus programs have been viewed skeptically because of issues relating to its reliability. However, AVG from Grisoft, remains one of the best-known free anti-virus programs available. While AVG can not be installed on a server operating system and there is no technical support, it still makes a good choice for many home computer users. The best part is that since it is free, you can try it with no further obligation necessary.

Spyware Beware

Spyware and Adware are not only an ever increasing nuisance for computer users everywhere, but also a booming industry. According to Webroot Software, Inc., the distribution of online advertisements through spyware and adware has become a $2 billion industry.

The aggressive advertising and spying tactics demonstrated by some of these programs, require an equally aggressive response from a seasoned eradicator. Sunbelt Software is such a company. A leader in Anti-Spyware, Anti-Spam, Network Security and System Management tools, they gave consistently remained on the cutting-edge of anti-spyware programming since 1994.

One of their more notable software applications is CounterSpy 1.5. CounterSpy is designed to detect and remove spyware that is already in your computer system. Additionally, it provides real-time protection while preventing browser hijacking and changes to your computer’s Registry.

Other notable features include:
• Detection and Removal of Tracking Cookies – while it is true that applications like Microsoft AntiSpyware Beta are free, they do not include the ability to detect and remove tracking cookies like CounterSpy does.
• History Cleaner - erases any traceable trails left on your computer as you surf the Internet.
• Secure File Eraser - a powerful deletion tool that can completely eliminate all files you want removed from your computer including images, music, movies and applications.
• PC Explorer - allows you a look into files and areas that are normally inconvenient to access, such as your startup programs, browser helper objects, and ActiveX programs that are being downloaded or used.
• Support for Older Operating Systems – includes Windows 98SE, Windows ME, and Windows NT.

Recommended by PC World, ConsumerSearch, and Dell, CounterSpy holds one of the highest effective ratings for spyware removal. It also received high marks from TopTenReviews (2006) for ease of use, customization/installation, and help/support. For only $19.95 per machine, users can receive a one year subscription with updates, upgrades, and technical support from real live humans. CounterSpy definitely provides ease of use and affordability for just about any computer user from the novice to the expert.

What in Google chrome book

 

With Acer and Samsung on hand with the first of the hardware, the Chromebook is the market culmination of the Google Chrome OS project publicly announced back in 2009. As we found in our review of the Cr-48, Google’s initial Chrome OS notebook targeted at developers, Chrome OS works best for those who already live their computing lives in the cloud: Gmail for their email, Chrome for their browser, Google Docs for their content creation and editing.A Chromebook basically takes that Chrome OS platform and puts it onto specially designed hardware: it’s a new breed of laptops rather than one specific model.

The Google Chrome Book is making headlines with it’s simplicity. This may be the first desktop with a legitimate offering to replace Microsoft’s stronghold on schools, business, and enterprise computing. The Chrome Book loads directly into a web browser.

From Wired Magazine:
“With kids, they flip the lid and they are online,” Wente-Chany said. “They don’t spend eight minutes booting up and authenticating with the network,” which she described as a waste of classroom time.
The Google Chrome Book is to be released on June 15th.

Computer Viruses that Come a Callin’


Every day new computer viruses are created to annoy us and to wreck havoc on our computer systems. Below are ten viruses currently cited as being the most prevalent in terms of being seen the most or in their ability to potentially cause damage. New viruses are created daily. This is by no means an all inclusive list. The best thing you can do is to remain vigilant, keep your anti-virus software updated, and stay aware of the current computer virus threats.

Virus: Trojan.Lodear
A Trojan horse that attempts to download remote files. It will inject a .dll file into the EXPLORER.EXE process causing system instability.


Virus: W32.Beagle.CO@mm
A mass-mailing worm that lowers security settings. It can delete security-related registry sub keys and may block access to security-related websites.

Virus: Backdoor.Zagaban
A Trojan horse that allows the compromised computer to be used as a covert proxy and which may degrade network performance.

Virus: W32/Netsky-P
A mass-mailing worm which spreads by emailing itself to addresses produced from files on the local drives.

Virus: W32/Mytob-GH
A mass-mailing worm and IRC backdoor Trojan for the Windows platform. Messages sent by this worm will have the subject chosen randomly from a list including titles such as: Notice of account limitation, Email Account Suspension, Security measures, Members Support, Important Notification.

Virus: W32/Mytob-EX
A mass-mailing worm and IRC backdoor Trojan similar in nature to W32-Mytob-GH. W32/Mytob-EX runs continuously in the background, providing a backdoor server which allows a remote intruder to gain access and control over the computer via IRC channels. This virus spreads by sending itself to email attachments harvested from your email addresses.


Virus: W32/Mytob-AS, Mytob-BE, Mytob-C, and Mytob-ER
This family of worm variations possesses similar characteristics in terms of what they can do. They are mass-mailing worms with backdoor functionality that can be controlled through the Internet Relay Chat (IRC) network. Additionally, they can spread through email and through various operating system vulnerabilities such as the LSASS (MS04-011).

Virus: Zafi-D
A mass mailing worm and a peer-to-peer worm which copies itself to the Windows system folder with the filename Norton Update.exe. It can then create a number of files in the Windows system folder with filenames consisting of 8 random characters and a DLL extension. W32/Zafi-D copies itself to folders with names containing share, upload, or music as ICQ 2005a new!.exe or winamp 5.7 new!.exe. W32/Zafi-D will also display a fake error message box with the caption "CRC: 04F6Bh" and the text "Error in packed file!".

Virus: W32/Netsky-D
A mass-mailing worm with IRC backdoor functionality which can also infect computers vulnerable to the LSASS (MS04-011) exploit.

Virus: W32/Zafi-B
A peer-to-peer (P2P) and email worm that will copy itself to the Windows system folder as a randomly named EXE file. This worm will test for the presence of an internet connection by attempting to connect to www.google.com or www.microsoft.com. A bilingual, worm with an attached Hungarian political text message box which translates to “We demand that the government accommodates the homeless, tightens up the penal code and VOTES FOR THE DEATH PENALTY to cut down the increasing crime. Jun. 2004, Pécs (SNAF Team)”

Just what is Intelligent Explorer? For your safety, you really need to know

I recently hit, by mistake, what I thought was an Explorer upgrade option. It turned out to be a pop-up appearing legitimate but really was not. It uploaded a product called Intelligent Explorer on my machine. What a nightmare!

I did some research on the web and found messages like this one from a BullGuard Antivirus Forum,

"PLEASE HELP!!! I HAVE A SPYWARE, TROJAN AND HIJACKER ON MY COMPUTER. I HAVE RUN BULLGUARD, CWSHREDDER AND AD-AWARE. ALL HAVE PICKED UP THE VIRUSES AND SAID THAT THEY HAVE BEEN MOVED/REMOVED BUT WHEN I LOG ONTO THE INTERNET THAT DAMN INTELLIGENT EXPLORER TOOLBAR IS SHOWING"

Another message from spywareinfo Forum goes something like this:

"Hey I'm having issues with something called Internet explorer toolbar - Intelligent explorer. I can’t find a way to remove it from my comp and I really don’t want to reinstall windows. I've used spybot, ad-ware, and cw shredder but nothing seems to work."

It appears that Intelligent Explorer allows other software to be downloaded to your machine and this is where the problem occurs. What is even more remarkable is that by downloading Intelligent Explorer, their license grants them the right to install software add-ins on your computer at their will. Take a look at what the software license for Intelligent Explore says (go to http://www.ieplugin.com/terms.html to read it all):

"You grant to us the right, exercisable by us until you uninstall the Software or this agreement is otherwise terminated, to provide to you the Service of downloading and causing to be displayed advertising material on your computer, through ‘pop-up’ or other display while you use your browser. You acknowledge and agree that installation of the Software may automatically modify toolbars and other settings of your browser. By installing the Software you agree to such modifications."

The company, IBC incorporated, is incorporated in Belize. I really can't believe this license!

One end user found highly objectionable pop-up advertisements generated by this software bundled with Intelligent Explorer in the form of extreme pornography.

I have yet to break this.

Intelligent Explorer is a plug-in, which can create a new home page, as well as start up and endless loop of pop-ups. You can remove the view bar, but then starting up Internet Explorer will cause it to reappear. I asked some friends to help, and no one could tell me what to do.

This is what I did:

I bought a copy of a program called XoftSpy and it removed the software. It took two scans and a reboot to do it. This is not an advertisement for this product. They advertised it was free, which it was to run, but then I had to buy it to actually fix anything. It cost me $40 and I am sure that there are freeware products out there as well, but that is what ended the nightmare for me. Other spyware products I have seen out there include spybot, NoAdware, Spyware Eliminator, Pal Spyware Remover, and Spyware C.O.P.

About Encryption and Making Your System Secure

 
What does encryption do for me?

Encryption and cryptographic software has been used in many different ways to make systems more secure. This article discusses only a few ways that such software can make your system more secure, including:

1) Encrypting your email

2) Encrypting your files

To programs are mentioned that will help encrypt information. There are many more programs out there that will help, but these programs are good and a good place to start as any. They have the added benefit of both being free with source code available.

Will encryption stop people from accessing my information?

Encryption simply makes it harder for people to gain access to important information, like passwords or sensitive information in a file. The first thing you should know about encryption is that the algorithm that is used to encrypt can be simple or more complex and that affects how securely what you have encrypted is protected. Encryption systems have been broken when the method of encryption is understood by hackers and is easy to break.

Why bother to encrypt my email?

It should be noted that email is far less secure than paper mail for two very good reasons: first, electronic data can be accessed easily over an Internet and secondly, electronic data is really simple to copy. There is a very good chance that someone has snooped around in your email despite your best intentions to stop it.

How do I go about encrypting my email?

There are many programs out there that can help you encrypt your email. A very popular one is PGP (Pretty Good Privacy) or its Gnu offshoot GPG.

PGP (http://www.pgpi.org/) self-describes itself this way: This "is a program that gives your electronic mail something that it otherwise doesn't have: Privacy. It does this by encrypting your mail so that nobody but the intended person can read it. When encrypted, the message looks like a meaningless jumble of random characters. PGP has proven itself quite capable of resisting even the most sophisticated forms of analysis aimed at reading the encrypted text."

Why bother to encrypt my files?

The answer to this boils down to what you store on your computer. If you have financial data with important information like social security numbers, email addresses, account numbers and passwords, then you open yourself up to losing very valuable information. Most corporate Internet security employees will attest to the widespread theft of very valuable information. As long as you are connected to the Internet you are vulnerable.

How do I go about encrypting my files?

AxCrypt File Encryption Software (http://axcrypt.sourceforge.net/) Self-described as "Free Personal Privacy and Security for Windows 98/ME/NT/2K/XP/seven with AES-128 File Encryption, Compression and transparent Decrypt and Open in the original application."

Western Digital My Book Essential 3TB Review

Western Digital (WDC), one of the world's premier manufacturer of storage capacity of 3TB external hard drive brings to the Indonesian market. Although not the first company to launch a hard disk with a capacity for it, but the products offered by Western Digital is the first that fully supports USB 3.0 connection.

Items referred to the My Book Essential 3TB. In contrast to the My Passport Essential series, this product is an external hard drive which is intended to accommodate data users in the office or at home. Not to carry around, although you can still portable if needed.

Specifications and Features

There are several models that are provided by the WDC to drive this series. Ranging from 500GB to 3TB capacity as discussed this time, and from which only supports USB 2.0 to support USB 2.0 as well as 3.0.

Western Digital My Book Essential, especially WDBACW0030HBK model supports USB 3.0 and also continue to support USB 2.0. As is known, USB 3.0 capable of transmitting data with maximum speeds up to 5Gbps, while USB 2.0 only a maximum of 480Mbps. The following specifications WD My Book Essential WDBACW0030HBK 3TB.

3TB Capacity

Connectivity USB 3.0 (Max 5GBps)

USB 2.0 (Max 480Mbps)

Physical Dimensions 165 x 135 x 48 millimeters

1.18 kilograms

Working temperature 5 to 35 degrees Celsius

Storage temperature -20 to 65 degrees Celsius

System files

NTFS

Supported operating systems Windows XP, Vista, 7, Mac OS X, Tiger, Leopard, Snow Leopard (need to be reformatted)

Just as the Western Digital external hard drives made by others, this model also comes with the application SmartWare. This application allows users to perform backups automatically, synchronize the files easily, and protect certain files by using passwords.

Trial

Western Digital My Book Essential use glossy casing that makes it look simple. For he was still working in cool conditions, ventilation is provided at the top, rear, and bottom. Input panel output connector and the power button itself is located in the rear.

When connected to a computer with operating system Windows XP 32-bit, direct product can be recognized. However, the detected only 2TB capacity. Similarly, when installed on the operating system Windows 7 Ultimate 64-bit.

To be able to fully utilize the capacity of 3TB, you need to run applications WD SmartWare, do Set Up Drive, then format the drive. After formatting is completed, the capacity of a relief it is ready for use.

In Windows XP, the time required to transfer 1GB of data to the hard drive via the USB 2.0 connection to reach 46.75 seconds. Conversely, to transmit data from the My Book Essential to the computer, it takes only 39.84 seconds.

Using Windows 7, the time to send data to a 1GB hard drive a little longer which is 1 minute 4.84 seconds. Conversely, sending data from an external hard drive to a computer via the USB 2.0 it took 39.84 seconds.

From experiments using CrystalDiskMark application, a sequential, using a USB 2.0 connection, this hard drive can write data up to 34.58 MBps and write up to 26.5 MBps. As a comparison, if the Western Digital hard drive Essential paired in port that supports USB 3.0, speed reading achieve 65.95MBps, while he wrote in 64.97MBps speed.

Today, Western Digital MyBook Essential 3TB began to be marketed in a price range of Rp2 million. Price ratio is still large enough adrift with a smaller version that is 2TB and 1TB are marketed in a price range of Rp1, 2 million and Rp850 thousand. However, it is worth the price if needed relief capacity hard drive in one unit.

Excess
- Large capacity
- Supports USB 3.0 for faster data transmission


Deficiency
- The price far adrift with a size below it.

Found, Wind Galaxy Destroyer

Infrared Space Observatory Herschel owned by European Space Agency (ESA) has detected the movement of wind consisting of gas molecules that flow away from the galaxy.

The wind that has been monitored for many years was thought to have sufficient power to destroy the galaxy consists of gas and halt star formation early on.

Herschel detected the wind is incredible. Some blowing hard, with a speed of more than 1,000 kilometers per second. The wind is 10 thousand times faster than the storms that blow on Earth.

"This is the first time that such molecular gas flow can be clearly observed in a galaxy," Echard said Sturm, a researcher from the Max-Planck Institute, who chaired the study, as quoted by the Daily Galaxy, Wednesday, May 11, 2011.

This finding, Sturm said, is important because the stars are formed from molecular gas. While this wind flow steal materials belonging galaxies needed to make new stars. "If hembusannya strong enough, they can even stop the total star formation," he said.

"With Herschel, now we can study what effect the wind is blowing towards the evolution of galaxies," said Sturm.

From the research, concluded that up to 1200 times the mass of our sun is lost every year due to the devastating winds. The amount is equal to the depletion of gas supplies to form a galaxy of stars between one and 100 million years into the future. In fact, the disruption of star formation has adverse effects on galaxies.

The wind itself could be due to the expenditure of particles and intense light of a new star or it could be by the shock wave from the explosion of an old star. Alternatively, the wind can be triggered by radiation caused by substances that are spinning around the black hole, in the middle of the galaxy-4R826TNZNX92

Sony Ericson-Xperia Neo

undefined

The Xperia™ neo smartphone is powered by Sony multimedia technology. It's great to look at. Even better to hold. And when you want more, there's the whole world of Android™. On the smart Xperia™ neo touch phone

A touch phone for great pics

Snap superb pictures in the sunset. Shoot sharp scenes in low light. The Xperia™ neo touch phone comes with an 8.1 megapixel camera and Sony's award-winning Exmor™ R for mobile image sensor. 



Xperia™ neo - a sharp and bright smartphone

Take the brightest photos. Create shining movie epics. Show it all on your Xperia™ neo smartphone. With the multi-touch Reality Display with Mobile BRAVIA® Engine, you see colours and contrasts in a whole new light.




Smartphone goes videophone

Time for your big screen premiere? View videos and photos on your HD TV. Just connect via the built-in HDMI connector. Browse your files using your TV's remote. So if there's nothing on TV tonight, no worries - use your smartphone. It doubles as a videophone. (TV must be CEC compatible)

The Best Notebooks Below US$500

undefinedEven though tablets are all the rage nowadays, some people would opt to buy notebooks instead despite the steep price largely because of hardware difference. With a notebook, users type with an actual keyboard, view the webpages on a larger screen, and can even connect with HDMI without the use of an adapter.

Now, laptop enthusiasts would be delighted to know that the new batch of portable computers can now be bought for prices US$500 and below, thanks to its AMD Fusion E-350 processor that enables to work both as a dual-core processor and graphics chip. And because Fusion does not take much power, these notebooks are assured of a longer battery life compared to its contemporaries.

Laptop Magazine compiled the best notebooks under $500 and here are their top choices. You can read the full reviews on the source link.

HP Pavilion dm1z (pictured) – For only $479, this notebook earns the Editor’s Choice tag for its good graphics performance and long battery life. Users can also rely on its superior sound quality, CoolSense technology, and comfortable keyboard. It has, however, a distracting fan and a slow hard drive.

Acer Aspire AS5253 – This Fusion-powered notebook offers long battery life and good performance despite its low price. It gets high scores for its comfortable keyboard, good-quality webcam, and relatively light weight; while it earns low marks on its lackluster speakers and low-efficient wireless connectivity.


MSI CR650 – Costing $499, this AMD-powered laptop from MSI gets high marks for its strong sound, long battery life, strong graphics performance, and sleek design. However, its lid picks up fingerprints, while it takes a while to boot.

Toshiba Satellite C655D – For $398, users can get a netbook with a larger screen, textured finish, and above average battery life. Its performance though is very much like a netbook, plus its space bar is shorter than usual.

70 Year Evolution of Mobile

The phone now has a gadget such as compulsory for everyone. Just look at the people you meet on the road. Most likely a cell phone in his trouser pocket or slip into their shirts.

But did you know that the way the phone has come a process of evolution for 70 years? Site WonderHow To immortalize the journey of evolution that phone.

1. SCR-194 (1938)


From Backpack to Smartphone Transceiver: A Visual History of the Mobile Phone

Komunasi tool is 'mbahnya' phones. SCR-194 and SCR-195 is the first portable AM ??radio in the world. It is created by the U.S. Army Signal Corps Engineering Laboratories at Fort Monmouth, New Jersey. Equipment which is seen as a walkie talkie that first weighs about 11 kg and helpless to reach 8 km.

2. SCR-300 (1940)


From Backpack to Smartphone Transceiver: A Visual History of the Mobile Phone

This tool is a replacement for SCR-195. Developed by Motorola, SCR-300 is a portable FM radio used by allied forces in World War II. He weighs between 14-17 kg, with 4.8 km radius coverage.

3. SCR-536 (1942)


From Backpack to Smartphone Transceiver: A Visual History of the Mobile Phone

Motorola produces 'Handie talkies' to the U.S., as the development of two previous communications tool. By using the AM radio technology, SCR-536 is much lighter weight, which is only 2.27 kg with a range of 1.6 km.

4. MTA (1956)


From Backpack to Smartphone Transceiver: A Visual History of the Mobile Phone

Mobile System A (MTA) is a communication device made by Ericsson and is used by Sweden. He weighs 40 kg or the equivalent weight of 300 units of mobile phones iPhone.

5. DynaTAC (1973)


From Backpack to Smartphone Transceiver: A Visual History of the Mobile Phone

Motorola makes a portable phone prototype Dynamic Adaptive Total Area Coverage (DynaTAC) as the first practical personal cell phone. In the picture, former Vice President of Motorola's Martin Cooper was called competitors of Bell Labs, Joel S. Engel.

6. DynaTAC (1983)


From Backpack to Smartphone Transceiver: A Visual History of the Mobile Phone

Ten years after the emergence of a prototype DynaTAC, Motorola began marketing this phone to the public. With a weight weighing 0.9 kg, DynaTAC worked in network technology, AMPS, first-generation analog cellular service in North America.

7. MicroTAC (1989)


From Backpack to Smartphone Transceiver: A Visual History of the Mobile Phone

Motorola introduces MicroTAC which is the first flip phone design in the world. This design reduces the size of the phone when not in use. With its small size. MicroTAC is also the world's first cell phone pocket.

8. StarTAC (1996)


From Backpack to Smartphone Transceiver: A Visual History of the Mobile Phone

Continuing its line of TAC, Motorola then launched the first clamshell phone named StarTAC that can be folded like a clam shell. According to Motorola, the phone is inspired by a communication device that appears in the movie series Star Trek.

9. Communicator (1997)



Nokia 9000 Communicator is a mobile phone that brings users into the era of smart phones or smartphones. With its clamshell design, this phone is the first to provide the LCD screen and a full QWERTY key board.

10. Benefon (1999)


Geosentric is the first handset vendor that makes the phone integrated with GPS devices. Not only that, this phone called Benefon withstand splashes of water, using a greyscale, and provides a map to track the position and movement of the user.

11. VP-201 (1999)


In Japan, Kyocera launched its mobile phone VP-201 which is the first phone that has an integrated camera.

12. BlackBerry 5810 (2002)


RIM launches first BlackBerry devices are integrated with the phone. It is targeting the mobile professional users who require instant email service and schedule adjustments. The disadvantage, these devices do not have a speaker and microphone.

13. iPhone (2007)


Steve Jobs started Apple introduced the iPhone in 2007, a revolutionary smart phone that uses touch screen as well as adopting 3G technology.

14. HTC EVO 4G (2010)


This phone is a phone first to adopt the standard 4G, and WiMAX networks operating in. With Android operat system 2.1, it is the largest mobile phone touch screen, 8 MP camera, video recorder high definition, HDMI output, features Mobile Hotspot, and Sense HTC interface.

2030, Space Trash Rise 3 Times Fold

 https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi_kT5qU2mGjZcf7NSd4MYTeHKTZTfQC16geqBhuUU6XbD23_69Bx7BfadfRvq4NWsYrTPIc26-5cfcsmUaPtNmosYnzYiBT-DZPFggVb8IIhTrsM_In_xqIFuNx4FvcUHeSYU5DkV_lGE/s1600/SpaceJunk72.jpg



Science Info-In a conference, William Shelton, chairman of the U.S. Air Force Space Command expressed concern about the increasing number of man-made space junk.

"The numbers continue to rise. Now it has more than 50 countries involved in space exploration, "Shelton said, as quoted from Space, May 10, 2011. "Currently, more than 20 thousand objects in the unused space," he said.

Currently, Shelton said, it continues to monitor regularly the growth of space debris. "Looking at growth trends, it is estimated that number will triple by 2030," he said. "In fact, the possibility of the amount of waste is 10 times more because we have sensors that are currently not able to keep track of all the waste that exists," said Shelton.

Terrible, call Shelton, objects that become garbage is very dangerous. "They can damage the system of military space, civil space systems, commercial satellites, and others," he said. "No one is immune from the threat that is in orbit today," Shelton said.

According to Marshall Kaplan, an expert on space debris of the Space Department, Johns Hopkins University, space junk in low earth orbit have been accumulating since the past 50 years. Last additions are, remnants of Anti-Satellite Test (asat) of China in 2007.

"One of these trials has increased the number of objects from the rubble about 35 percent," said Kaplan. "Worse, located at an altitude of 865 kilometers, where most populous region generally orbiting satellites," he said.

Another case, in February 2009, Iridium Satellite 33, US-owned communications satellite collides with the Cosmos, the Russian spacecraft that was not used, at an altitude similar to China's asat test. As a result, pieces of debris scattered more.

"The results of satellite launches during the past 50 years and the two events, now the area between the altitude of 700 kilometers to 1300 kilometers there jutaaan debris size from a few millimeters to several meters," says Kaplan.

Unfortunately, says Kaplan, the growth of this waste can not be reversed. Cleanup efforts space would be too expensive. "Currently there is nothing we can do. We do not have sufficient funds, the technology does not exist, and there is no cooperation. No one wants to fund this effort, "said Kaplan.

Kaplan added, the cleaning space is 'industry that continues to grow' but no one wanted to do. "In addition, politically, it is also not profitable," he said.

Global Warming Disturb Internet Connection

 http://noviayolanda.student.umm.ac.id/files/2010/09/internet-macet.jpg


Techno Info-Internet access via Wi-Fi connection and other communications-related threat of global warming unless some action is taken to protect them from temperatures continue to rise and weather gets worse.

According to Caroline Spelman, Minister of Environment UK, higher temperatures can reduce the distance the signal beam wireless communication devices. The rain storms can affect the reliability of the device in the capture signal. Wetter winters will also cause landslides, damaging the stake, as well as underground cables.

The threat posed by climate change on the Internet and telephone access is a rare occurrence and only developed countries that experienced more severe impact. In developing countries alone, a greater risk posed by climate change is flooding, droughts, and rising water level.

"If climate change threatens the quality of the signal or you do not get a signal due to extreme fluctuations in temperature, then you will incur a loss. This is very urgent for us to overcome, "Spelman said, quoted by the Guardian, Wednesday, May 11, 2011.

"Imagine if at the time an emergency condition, internet connection or telecommunications were cut off," said Spelman.

Spelman said the report prepared, it was concluded that the infrastructure, from roads and railways, electricity supply sources to the water supply source, should be made more resilient to climate change.

More detail, the report concludes, electrical cable network should be strengthened to prevent damage, the road must be coated with a protective surface for the asphalt does not melt, and the trains should be made more resistant to heat so as not curved.

The government itself, says Spelman, acknowledged that climate change impacts on telecommunications is not well understood. But a report prepared showed a number of potential risk. Besides the impact on coverage and reliability, the warmer temperatures and more intense storms that could potentially lead to the communication infrastructure have flooded or damaged by falling trees are uprooted.

In the report, researchers also predicted that changes in the growth of trees can affect how the radio waves move

blackberry bold 9900-Review



Gadget Review-BlackBerry World 2011 is now behind us and what a week it was. Adam, Bla1ze and I made it home from Orlando and we are exhausted. But before catching up on some Zzzz's we first recorded our BlackBerry World Super Duper Roundup Podcast which you can listen to here or download on your BlackBerry PlayBook or Smartphone via the Podcasts app. We want to see this episode be the most downloaded in the BB Podcasts app, so be sure to subscribe to us there and download.

In this show we cover all of the news coming out of BlackBerry World 2011, including the newly announced BlackBerry Bold 9900/9930 as well as all of the PlayBook-related news and announcements and much, much, much more.

Like the BlackBerry® Torch™ smartphone, these new devices integrate brilliant, high resolution, capacitive touch screens, trackpads and full QWERTY keypads and are the thinnest BlackBerry smartphones yet. Here’s a quick look at some of the key specs for the BlackBerry Bold 9900 and 9930 smartphones.

• 115 x 66 x 10.5 mm, approximately 130 g
• 2.8? capacitive touch screen display – VGA (640×480), 287 PPI resolution
• Full, wide QWERTY keyboard, optical trackpad
• 1.2 GHz Processor, 768 MB RAM
• 8 GB on-board memory, plus microSD slot supporting up to 32 GB cards
• NFC technology
• 5.0 MP camera with flash, supports 720p HD video recording
• Orientation Sensor (Accelerometer), Digital Compass (Magnetometer), Proximity Sensor
• Built-in GPS / aGPS
• Dual-Band Wi-Fi® – 802.11 b/g/n at 2.4 GHz and 802.11 a/n at 5 GHz
• Bluetooth® 2.1+EDR support
• 1230 mAh removable, rechargeable battery

Wireless Network support:
o BlackBerry Bold 9900 smartphone: Tri-Band HSPA+, Quad-Band GSM/EDGE
o BlackBerry Bold 9930 smartphone: Dual-Band CDMA/EVDO Rev A, Dual-Band HSPA+, Quad-Band GSM/EDGE

BlackBerry 7 OS

In addition to being the first touch BlackBerry Bold smartphones, the BlackBerry Bold 9900 and 9930 smartphones are also the first to feature the BlackBerry 7 OS. The BlackBerry 7 OS is a performance driven platform designed to deliver a faster and easier communication, multimedia and productivity experience for BlackBerry smartphone users. In addition to improved web browsing and universal search capabilities (now with voice-enabled search!), here is a quick rundown of some of the new functionality that the BlackBerry 7 OS powers in the BlackBerry Bold 9900 and 9930 smartphones:

• Liquid Graphics™ – The BlackBerry 7 OS delivers fast, fluid performance when browsing, accessing pictures or video, or running graphics intensive games.
• NFC – Built-in support for Near Field Communications (NFC), an exciting new technology that is designed to provide a secure exchange of information between NFC-enabled devices over a very short distance. Watch our interview with Andrew Bocking, VP Handheld Software Product Management, to learn more about BlackBerry and Near Field Communications.
• Augmented Reality – The BlackBerry Bold 9900 and 9930 smartphones feature a built-in compass (magnetometer) to take advantage of BlackBerry 7 OS support for augmented reality applications.
• HD Video – The BlackBerry 7 OS supports up to 720p HD video recording.

The BlackBerry Bold 9900 and 9930 smartphones are expected to be available from carriers around the world beginning this summer. Stay tuned for additional blog posts where we dive deeper into the BlackBerry 7 OS and BlackBerry Bold 9900 and 9930 smartphones! For now, head to the BlackBerry Bold smartphone page for the latest info.

Ubuntu 11.04 Natty Narwhal Beta Review

Review Last year, Mark Shuttleworth christened Ubuntu 11.04 “Natty Narwhal”, saying the disto would be stylish and create a good, lasting first impression.

While its debut in beta form is smart looking and definitely chases the fashion in operating-system design it’s also the single worst beta release of Ubuntu I’ve ever tested.

That’s not to say there isn’t much to love in Ubuntu 11.04 with the new Unity Interface being the primary news, but even for a beta this release is way too rough. Unity - regardless of what you think of it - isn’t ready for prime time and it seems unlikely Canonical will iron out all its problems before the planned final release in April.

Bugs can be fixed, and there are numerous bugs to fix in this release of Unity, but the larger problem is that Unity, thus far, lacks the functionality of GNOME 2.32. Ubuntu, and its users, would be better served if Unity were not the default desktop for this release.

Unity is a radical departure, but no less so than GNOME 3.0, which has wisely been pushed back until later this year. The problem isn’t that everything you know and love about GNOME is suddenly gone, and Ubuntu 11.04 is, for all intents and purposes a completely different experience than everything that came before it.

The real problem is that Unity can’t do half of what GNOME can do.

If that sounds familiar it might be because the same thing happened to KDE users in the move from KDE 3.x to 4.0. Sadly, rather than learn from the KDE 4 backlash, Canonical has decided to soldier on into the Unity future, whether it’s ready or not. Spoiler alert: it’s not.

On the surface Unity looks good. In fact, Unity will most likely one day trump GNOME in many ways - it’s noticeably snappier than GNOME, works well at just about any screen resolution and even appears to be designed with touch-based devices in mind. Eventually, come Ubuntu 13.04 or so, Unity will seem like a brilliant move, but the transition is going to be bumpy.

The new universal or global menu - which pulls the main menu out of the application window and puts them in the global menu bar - works surprisingly well and is the first of many features that reflect the influence of Apple’s user interface designs. It’s different, but the global menu is probably the easiest change to adjust to - same menus, new location.

Unity’s new launcher/dock is another element that closely mirrors what you’ll find in OS X, though without much of the polish and functionality built-in to Apple’s offering. The dock has some problems and is missing some obvious features, but it’s not hard to see how the dock and accompanying search and launcher tools will eventually be a great time saver.

We have been following Ubuntu 11.04 closely and have thoroughly reviewed Ubuntu Natty Alpha 1, Alpha 2 and Alpha 3 releases. While the first two releases dealt with adding more and more features and functionalities primarily, the latest Ubuntu 11.04 beta release and the one prior to that concentrated on actually bringing in more polish and stability to Unity Shell.

And they are indeed doing a pretty good job IMO. After trying out Ubuntu 11.04 beta for sometime, I decided that I need to do a bit more about it than simply testing it out for the sake of reviewing it. And so I installed Ubuntu 11.04 beta replacing my old reliable workhorse, Ubuntu 10.10 "Maverick Meerkat". I have been using Ubuntu 11.04 Natty Narwhal beta 1 as my primary OS since then.

Ubuntu 11.04 Beta Review, Screenshots
We have been following Ubuntu 11.04 closely and have thoroughly reviewed Ubuntu Natty Alpha 1, Alpha 2 and Alpha 3 releases. While the first two releases dealt with adding more and more features and functionalities primarily, the latest Ubuntu 11.04 beta release and the one prior to that concentrated on actually bringing in more polish and stability to Unity Shell.

And they are indeed doing a pretty good job IMO. After trying out Ubuntu 11.04 beta for sometime, I decided that I need to do a bit more about it than simply testing it out for the sake of reviewing it. And so I installed Ubuntu 11.04 beta replacing my old reliable workhorse, Ubuntu 10.10 "Maverick Meerkat". I have been using Ubuntu 11.04 Natty Narwhal beta 1 as my primary OS since then.




The second screenshot introduces to a new impressive feature. In the Ubuntu installer, there is an option now that lets you upgrade directly from Ubuntu 10.10 to Ubuntu 11.04 using Live CD, a feature I always wished for since it saves a lot of time and bandwidth. A very nifty addition indeed especially because of Ubuntu's 6 month release cycle. Instead of upgrading though, I went on to install it manually completely replacing Ubuntu 10.10.

Essential Keyboard Shortcuts are Now Available
If you are someone who loves to use keyboard shortcuts in Ubuntu, this is probably the first Ubuntu Natty release that has taken YOU into account. Alt+F1 takes you straight into first item in the Unity dock menu and can browse through the dock further using up and down keys.


You must be familiar with the feature shown in the above screenshot already which came into existence during the third alpha release of Ubuntu 11.04. Press and hold the Super key and a whole gamut of keyboard shortcuts are displayed.

Number of Minor UI Improvements
Though there are no big changes in terms UI since Unity itself is *the* biggest change, there are indeed a number a minor UI improvements which brings in a lot of polish and finesse to the Unity interface. Unity has developed a number of rough edges as well in the process.

GNOME Control Center in Ubuntu 11.04

Not only did the developers included GNOME Control Center as a default application, there is now an menu item called System Settings(see the screenshot above) that will take you straight to the GNOME Control Center.



Alt+F2 is also available by default though there is no auto completion of application names or commands yet which makes it rather useless. There are already dock items specifically to search for applications as well as files and folders with dedicated shortcut keys.


CompizConfig Settings Manager(CCSM), so far my biggest disappointment. There are many useful compiz animations that I used to use on a daily basis, like desktop zoom functionality for example, which were missing. So I went on to install CCSM. I was in for a nasty surprise. Whenever you try to enable *any* new Compiz animation, Compiz window manager crashes and restarts. This is a very big problem when you consider the fact that everything about Compiz was buttery smooth in the old GNOME desktop.


Now you can hover your mouse pointer over the volume indicator and change the volume by simply scrolling. That's a nice touch.



Now you can drag n' drop files directly into applications docked in the Unity dock and when you drag a file into it, only supported applications are displayed and every other entry fades away. Another nice touch though it has its share of problems. I was trying to move an image file directly into my home folder, but as you can see only Firefox was 'enabled'.


Ubuntu Software Center keeps on improving. Latest Ubuntu Software Center update adds much needed reviews and ratings support. Now you can rate your favorite applications from within Ubuntu Software Center and can even write quick reviews/comments about them.

Things are Not All Hunky Dory
This is the first beta release of Ubuntu 11.04 and there is not even a month left for the final release to happen. I think its time to scrutinize Ubuntu 11.04 a bit more closely. Here are some of the things that requires immediate attention.

* There is no dock resizing options yet. The current dock is very big for my taste. May be an option to hide dock while not in use is also preferable.

* Compiz is not anywhere near stable, rough edges galore.

* As we have noted earlier, drag-drop of files not working properly.

* As of now, you can't drag-drop applications into Unity dock. You need to open the desired application and choose "keep in launcher" option to achieve the same result. Very unintuitive IMO.

* CompizConfig Settings Manager is an absolute disaster. Installing CCSM used to be among the first things I did after installing Ubuntu, but with the current state of affairs it is not at all recommended.

* Global menu won't work as expected every time.

I like where Ubuntu is going with the new Unity interface. Take dock for example, the number of most frequently used apps for me is around 5 to 6 and listing them in the dock makes it so damn easy and preferable to the old GNOME ways any day. Global menu is awesome and Compiz is way better than the Mutter window manager of GNOME Shell. But a number of minor flaws spoiled the overall experience. But yes, this is not the final product and I just hope that Canonical is able to iron out all the issues prior the the final release.

Source :http://www.techdrivein.com/2011/04/ubuntu-1104-natty-narwhal-beta-review.html

PSN Back up…When?


PSN has been offline since 20 April in the wake of a security breach that saw 77 million account details accessed by a hacker. Obviously it’s really inconvenient and there are lots of people out there who use Sony equipment for entertainment and will be understandably disgruntled about this downtime,” added the consultant.

As things stand the latest update that has come from the PlayStation blog talks about what happens when normal services resume where Debbie Turner of OSM has revealed that there are a few services that will be compensated but asks… It’s a pretty tough question as many gamers will have lost faith because of their credit card details being at risk and already switched over to the Xbox 360. Fingers crossed that that we Westerners have the service resumed soon as many people have been chomping at the bit to play Portal 2 and Mortal Kombat 9 online. Is Sony doing enough for those paying for services?

The heads of Sony held a press conference in which they bowed their heads in shame because of the major PSN compromise. Sony promises to have Playstation Network back up this week!

Unfortunately, Sony lost money on the PlayStation 3 for the first two years, and now they offer multiplayer for free. Anyone remember the big Sony laptop battery debacle? Sure sounds like Sony hasn’t learned their lesson yet.

Imac – More Power - More Stuck

 iMac
The iMac is a range of all-in-one Macintosh desktop computers designed and built by Apple Inc. It has been the primary part of Apple’s consumer desktop offerings since its introduction in 1998, and has evolved through five distinct forms.

In its original form, the iMac G3 had a gum-drop or egg-shaped look, with a CRT monitor, mainly enclosed by a colored, translucent plastic case, which was refreshed early on with a sleeker design notable for its slot-loaded optical drive. The second major revision, the iMac G4, moved the design to a hemispherical base containing all the main components and an LCD monitor on a freely moving arm attached to it. 

The third/fourth major revision, the iMac G5 and the Intel iMac placed all the components immediately behind the display, creating a slim unified design that tilts only up and down on a simple metal base. The current iMac shares the same form as the previous model, but is thinner and uses anodized aluminum and a glass panel over the entire front. In addition it also added a SDXC slot directly under the Slot-Loading SuperDrive. The newest version is available with flash storage instead of a hard drive.

Update
On July 27, 2010, Apple updated its line of iMacs to feature the new Intel Core processors across the line. The 21.5? models, including the low end 27? now feature the Core i3 processor but these are upgradable to the Core i5. The high end 27? features a Quad-Core i5 processor, which is upgradable to a Quad-Core i7. On this date Apple also announced its new “Apple Magic Trackpad” peripheral, a trackpad similar to that of the Macbook Pro for use with the iMac, or any other Apple computer. T

On May 3, 2011, Apple updated its iMac line with the introduction of Intel Thunderbolt technology and Intel Core i5 and i7 Sandy Bridge processors as well as a 1 mega pixel high definition FaceTime camera, features which were first introduced in the MacBook Pro line in February 2011

And Now
the iMac all-in-one with the next-generation processor quad-core processors, powerful new graphics, Thunderbolt innovative high-speed I / O and new technologies FaceTime ® HD camera. Dibanderol halted price of U.S. $ 1,199, the new iMac has a 70 percent faster performance, especially the new graphics capabilities to provide up to three times the performance of previous generations.

“Customers Apple beloved, today we add a new family of iMac that has the technology generation quad-core processor, and graphic quality. Moreover what makes it special is the technology iMac Thunderbolt and completeness FaceTime HD camera,” said Philip Schiller, senior vice president Apple’s Worldwide Product Marketing.
iMac is the first desktop computer on the market to include Thunderbolt breakthrough I / O technology. Developed by Intel with the collaboration of Apple, Thunderbolt possible upgrade ever possible all-in-one computer.

21.5-inch iMac has a single Thunderbolt port, while the 27-inch model has two expansion ports for greater data. Featuring two-lane bi-directional transfer speeds up to a 10Gbps every stunning, Thunderbolt pinned directly to the PCI Express high-performance external peripherals, namely RAID arrays.

new iMac also has supported FireWire device that makes you free cable that meticulous.
Besides being equipped with quad-core Intel Core i5. Apple also provides special services to customers, the freedom to choose an Intel Core i5 Core i7 up to 3.4 GHz. This processor is the next generation features an integrated memory controller responsive to experience extraordinary and powerful new engine medium to high-performance video encoding and decoding. With the new AMD Radeon HD graphics processors, the new iMac has the most powerful graphics ever on the all-in-one desktop.

Continuing commitment to Apple as a leader in green design for the environment. tight iMac meets the Energy Star 5.2 and EPEAT Gold rating achieved.
iMac also features an LED-backlit displays are mercury-free, and made with arsenic-free glass. iMac uses PVC-free components and cables, do not contain brominated flame, using highly recyclable materials and material-efficient features of the system and packaging design.
Every Mac comes on the market, have been equipped with Mac OS ® X Snow Leopard and iLife – Apple’s innovative suite of applications to create and share great photos, movies and music. Snow Leopard build in more than a decade of innovation and includes a Mac App Store ? for finding great new application for your Mac.

iLife ’11 features iPhoto ® stunning full screen for browsing, editing and sharing photos, iMovie ® with powerful easy to use tool to convert home videos into fun trailer theater, and GarageBand ® with new ways to improve your play and create great sounding songs.

Pricing & Availability
New IMac is available through the Apple Store (www.apple.com), Apple’s retail stores and Apple Authorized Resellers. 21.5-inch IMac is available in two configurations: one with 2.5 GHz Intel Core, Quad-core AMD Radeon HD 6750M i5 and 500GB hard drive with a suggested retail price of $ 1.199 (U.S.), and one with quad 2.7 GHz Intel Core i5-core, AMD Radeon HD 6770M and 1TB hard drive with a suggested retail price of $ 1,499 (U.S.).

New 27-inch IMac is available in two models: one with 2.7 GHz Intel Core, Quad-core AMD Radeon HD 6770M i5 and 1TB hard drive with a suggested retail price of $ 1.699 (U.S.), and one with 3.1 GHz quad-core Intel Core i5, AMD Radeon HD 6970M and 1TB hard drive with a suggested retail price of $ 1,999 (U.S.).