Wednesday, April 22, 2009

Microsoft Delivers Hotmail Upgrade

Microsoft Corp. has closed the public testing period for Windows Live Hotmail and has begun a months-long process of migrating users to this major upgrade of its Hotmail Web mail service, the company will announce Monday. (To read a hands-on review of the new Microsoft Hotmail, check out our Today@PCWorld Blog: Microsoft Launches New Hotmail.)

Windows Live Hotmail, dubbed as the biggest Hotmail upgrade since the Web mail service's debut in 1996, has been tested by about 20 million users since Microsoft first allowed people outside the company to try it out in mid-2005, said Brooke Richardson, Microsoft group product manager for the popular e-mail site.

"It is safer, faster and has more features than Hotmail. It's definitely an advance for our current customers," she said. Windows Live Hotmail has a brand new code foundation which will let Microsoft add improvements quickly, something that had become a challenge with Hotmail's decade-old code base, she said. "It's a much more stable foundation for us to innovate," she said.

A major challenge for Microsoft will be to convince long-time Hotmail users that the upgraded version is worth switching to, said Van Baker, a Gartner Inc. analyst. "Consumers get accustomed to things they use on a daily basis, like their e-mail service," he said. "When you make changes, sometimes it's a challenging transition for consumers."

Microsoft will not autocratically move users to the new version. For now, Microsoft will give Hotmail users the option to continue using the old version if they don't want to switch to the upgraded version. However, at some point, everyone will be unilaterally migrated over to Windows Live Hotmail, she said.

New users will be automatically signed up for Windows Live Hotmail but, like any user of the new service, they will get to choose from two user interfaces: a "classic" layout that closely resembles the old Hotmail; or the new interface, which was designed to look like Microsoft's Outlook e-mail and calendaring desktop application, she said.

Later this month, Microsoft will release a free software for linking Windows Live Hotmail with Outlook, a capability the company previously charged for. With Microsoft Office Outlook Connector for MSN, users of the Web mail service will be able to access their account from Outlook, along with e-mail, contacts and folder synchronization for free. In the future, Microsoft will release a desktop client for Windows Live Hotmail called Windows Live Mail. Windows Live Mail will be the successor to Outlook Express and Windows Mail on Windows Vista.

But all these different names, brands and components leave Microsoft with a fragmented story in the Web mail market that could lead to consumer confusion, Gartner's Baker said. "Another big challenge is to manage this message," he said.

In terms of security improvements, each e-mail message carries a "safety bar" which indicates whether the message came from a known, unknown or potentially fraudulent sender. Spam protection has also been enhanced. Windows Live Hotmail also has a mobile version so that its estimated 280 million users can access the service from cell phones and handheld devices with a Web browser.

How Do I Know If My PC Is Infected With Spyware or Adware

Many people that are new to the Internet world are nervous about the potential of viruses, Spyware or Adware that can harm their computer, affect performance or make their very private information public to others.

Spyware programs can do a number of damaging things to your personal computer. Spyware infects your pc and hides in the background and can do many nasty things to the performance of your system. It can also do harmful things to you such as send out your personal information, your every keystroke and photo that resides on your hard drive, watch your surfing habits and shopping habits and annoy you with annoying pop-ups filled with advertisements and even pornography.

If you are experiencing any unusual changes in your computer's performance or have any unusual new pop-ups, changes to your toolbars or new icons on your desktop, you should run a system scan to find out if you have Spyware. Products exist on the market to help you combat this problem. Be sure to install software that you know is credible. Downloading freeware can often result in further Spyware existing on your computer. Spyware, Adware and Malware companies frequently fool users into sending pop-ups telling them that there's a problem with their computer and this in fact is further spyware. These errors can open your system up to future further problems by fooling people into thinking they're downloading fixes when really further spyware is being downloaded.

Watch your system's performance and at the sign of any unusual activity, realize that you are probably infected. Do something as soon as possible to protect your privacy. These programs don't discriminate and can launch themselves when you or your family members sit in front of the computer. Pornographic pop-ups can turn up whether it's an adult or a child using the computer. Protect your pc.

Antivirus alone isn't enough to combat this problem. Spyware sneaks into your system via executable files that you don't need to do anything to launch. They can sneak in as attachments that you download or by many other means. They're harmful and annoying but you can protect your computer and your privacy with the right software. This software needs to have an auto update for spyware definitions as new spyware definitions are being added daily. So a spyware removal program is a great compliment to your existing anti-virus software.

Total Innovations, Inc. specializes in developing award winning software programs designed to solve computer users needs. The spyware removal software, http://www.emailspy.com & http://www.folderhider.com are a few of the most recent. See full details at: http://www.spyblaster.com

Computer Graphics Specialist

Computer graphics is a powerful medium. Increasingly, businesses, agencies and organizations communicate information and knowledge though visual means. In the last few years, computer graphics has found its way into the mainstream of society, from entertainment, and engineering design, to the web and virtually every industry imaginable.

New opportunities are unfolding for people with high visualization abilities, who can use computer graphics tools to visualize scientific concepts and for the analysis and manipulation of complex three-dimensional information. Computer graphics specialists are the experts who use computers and related technologies to create and manipulate electronic images.

They consult with managers and clients about projects, and create sketches or layouts of their ideas. Once they get a sketch approved by the clients, the specialist will begin using various computer programs to transfer the image from paper onto computer software. This can involve writing and designing programs from scratch, or applying existing programs to help them in their work.

These specialists apply their talents to three-dimensional cartoons, video games, television and film. They use CAD (computer-aided design) systems to design models of building, cars or entire environments. CAD systems can also be used when designing models for physicians, surgeons and scientists. Computer graphics specialists also create geographical, topographical, meteorological, and environmental impact maps; charts; tables; and graphs to organize information for businesses and organizations.

In the ever-changing world of computer technologies and design, computer graphics specialists must be on the cutting edge of both hardware and software developments. They are helping spread information globally, enabling business and organizations to share their knowledge and experiences with the international community.

Interests and Skills
Computer graphics specialists must be able to pay close attention to detail and maintain good hand-eye coordination when working on projects. They must possess the ability to visualize three-dimensional objects, should be good at math, and feel comfortable with computers. They should be methodical, patient, and accurate, as well as creative, and be able to work well under pressure. They should be good communicators, able to work with others, as well as possess the self-discipline and stamina to work in their own when necessary.


Typical Tasks

* Consult with management and staff on the project
* Make detailed cost estimates of different design options
* Write programs if necessary
* Develop and prepare designs and drafts from preliminary concepts and sketches
* Study drafts, information and instructions from the client or engineer
* Operate computer-aided design (CAD) programs
* Check and verify design drawings to conform to specifications and design data
* Make the necessary changes to the designs, drawings or specifications
* Write technical reports
* The typical day for a computer graphics specialist will involve working with computers, analyzing, developing and implementing programs. They will spend some of each day with others, brainstorming new design projects, looking into programs to help create designs, and pitching project ideas to clients and supervisors. The job doesn't allow for much travel, as most of the work can be done from home or a head office, unless they need to consult with colleagues at locations all over their community.

Workplaces, Employers and Industries

* Computer graphics specialists work in both the public and private sectors. Consulting and construction companies, utility, resource and manufacturing companies, private machine design firms, architectural and engineering consulting firms, electronic and software manufacturing companies and organizations in the petrochemical, food processing and energy industries employ CAD technologists. In the public sector, they work for all levels of government, and in hospitals and universities. They can also work independently, and contract out their business to different clients.
* They work regular hours in offices, or set their own hours and work from home, depending on the nature of their employer. They work alone, or in a small team of other programmers and computer staff.

Long Term Career Potential
Computer graphics specialists can specialize in other aspects of computer programming. They can get into software and web design. There are also jobs in administration, PC support and website maintenance. Graphics specialists can open their own businesses, or write a column or book about computer design for the general public. There is also IT instruction, at colleges and universities.


Educational Paths
Individuals wanting ot pursue a career as a computer graphics specialist should complete either a bachelor's degree in computer science or in another discipline with a significant programming and design components, such as mathematics, commerce or graphic design; or a college program in computer science. There are a number of three- and four-year degree programs, two-year diploma programs and one-year certificate programs in this field offered by universities, colleges, technical institutes and private vocational schools. They should also consider taking a few psychology and business management courses.

Some individuals might choose to pursue a certificate in CAD drafting or design engineering technology. These are available through associations of engineering or applied science technologists and technicians.

Format Flashdisk with the NTFS file system

Some of us may be less attention to the file system type used Flashdisk us, whether it is NTFS, FAT32 or FAT. To find out the file system is used, right-click Flashdisk in Windows Explorer and select Properties. Here it is seen that type of File System is used.

But when we try to mem-format through windows Explorer, there may not have the NTFS, the FAT and FAT32 only. How do I mem-NTFS format and what is the difference with the FAT and FAT32?

Why NTFS?
NTFS format is a file system after the latest Windows FAT32, and have several advantages such as the ability to store additional information about the file / folder (metadata), security features, data compression, a better structure and more.
In addition, the type of NTFS can be used to format mem-size is greater, for only 2 GB FAT, FAT32 8 TB (8,000 GB), while NTFS can be up to 16 EB (16 million TB). Nevertheless, there remain only NTFS kekurangannya, such as not legible in the Win9x and the read write to disk more often.
Because each file / folder store more information (metadata), then read the writing process each file / folder will be more common than type FAT32 or FAT, so that for the flash, affect age (resistance). Given the memory limitations Flashdisk have read the writing. (Article about keeping to be more durable flash can be read here: Characteristics and Tips Flashdisk maintain more durable)

Enabling NTFS format in Windows Explorer
We can only mem-format USB Flashdisk with type NTFS with the help of HP USB Format Tools. But the actual Windows Explorer can do. To activate the following steps can be followed
1. Open System Properties with the right click My Computer> Properties (or a keyboard with buttons Win + Break)
2. Open the Hardware tab and then click the Device Manager
3. Select Disk Drive and select Flashdisk in which you want to format with NTFS, right click, select Properties.
4. Once open select the Policies tab
5. Select Optimize for performance, and click OK



















6. Then try right-click the flash drive in Windows Explorer and select the Format menu, then there should appear NTFS File System.

To note when this option is enabled, each flash should always pull out through the Safety Remove Hardware. If the option is "Optimize for quick removal" is actually the flash can be removed immediately, without the Safety Remove Hardware

Test between NTFS, FAT32 and FAT

I have tried some of the comparison (especially the process to copy data) type with different, and the results are as follows:

11 * Copy the file (the size of each around 170 MB) total about 1.8 GB
NTFS 04:44 (4 minutes 46 seconds)
FAT32 05:09 (5 minutes 9 seconds)
FAT 04:46 (4 minutes 46 seconds)
1297 * Copy files (size between 1 KB to 23 KB) with a total of 8.23 MB
NTFS 29 seconds
FAT32 56 seconds
FAT 58 seconds
* Capacity in the format
NTFS 2,038,044,672 bytes Used space 12,937,216 bytes (12.3 MB)
FAT32 2,046,959,616 bytes Used space 4096 bytes (4.00 KB)
FAT 2,050,686,976 bytes Used Space 0 bytes

Copy the visible data with NTFS, relatively quickly, but after the size of the format a little smaller because of the additional space required is greater for the file / folder (metadata). If the flash is often used to read and write process does not require the NTFS features, such as data security, then select the type FAT32 may be better.

Insyaallah next article will discuss about the type utilizing NTFS Flahsdisk to protect from the virus will create, delete or modify the program with a simple Autorun.inf I create "Super Autorun".

Wednesday, April 8, 2009

Major in Computer Information Technology

The computer information technology major is designed to combine the benefits of a traditional college education with the benefits of hands-on training in state-of-the-art computer technology. Students become technically competent, but also learn to write well-organized and clear memoranda and reports. The computer information technology curriculum integrates technical skill with communication skills, superior general education requirements, and breadth of knowledge in the computer information technology field.

Objectives

The student who graduates with a major in computer information technology will be able to

  • Design and implement network and database administration solutions.
  • Produce effective proposals, reports, memoranda, briefings, and documentation.
  • Communicate effectively using oral and computer-based presentation techniques.
  • Apply effective information research techniques.
  • Discuss information technology from an international and historical perspective.
  • Apply ethical judgments to thinking critically and systematically about the impact of information technology on contemporary social, political, and economic issues.

Degree Requirements

A degree with a major in computer information technology requires the successful completion of 120 credits of coursework, including 33 credits for the major, 41 credits in general education requirements, and 46 credits in the minor, electives, and other degree requirements. At least 17 credits in the major must be earned in upper-level courses (numbered 300 or above), and 18 credits in courses designated CMIT.

The following course sequence will fulfill all the requirements for the BS in computer information technology. Since some recommended courses fulfill more than one requirement, substituting courses for those listed may make it necessary to take additional courses to meet degree requirements. Students should consult an advisor whenever taking advantage of other options. For information on alternate courses (where allowable) to fulfill general education requirements (in communications, arts and humanities, behavioral and social sciences, biological and physical sciences, mathematics, and interdisciplinary issues) click here. For cross-curricular requirements (in civic responsibility, historical, and international perspectives) click here.

Requirements for the Computer Information Technology Major

Coursework for a major in business administration includes the following:

  • Required foundation courses (12 credits): CMIS 102/102A (or prior programming experience and an additional supplemental course), 141/141A (or CMSC 130), and 310 and CMIT 265
  • Core courses (15 credits): Any upper-level CMIT courses
  • Supplemental major courses (6 credits): Any CMIS, CMIT, CMSC, CMST, and IFSM courses
  • Required related course (3 credits), which may be applied anywhere in the degree: MATH 107

Recommended Sequence

The following course sequence will fulfill all the requirements for the BS in computer information technology. Coursework for the major is indicated by ±. Since some recommended courses fulfill more than one requirement, substituting courses for those listed may make it necessary to take additional courses to meet degree requirements. Students should consult an advisor whenever taking advantage of other options. For information on alternate courses (where allowable) to fulfill general education requirements (in communications, arts and humanities, behavioral and social sciences, biological and physical sciences, mathematics, and interdisciplinary issues) click here. For cross-curricular requirements (in civic responsibility, historical, and international perspectives)

Information Technology Computer Degree Choices

Those considering earning a degree or certification in information technology (IT) will find many choices from which to choose. As adults considering an IT degree search the list of available options, they soon discover there are more than the traditional computer science degrees available today. The range of degree options has become varied and specialized.

This change was brought about employers who want their new IT employees to have more than the traditional education available in colleges and universities. Employers prefer graduates with the ability to apply their IT learning to complex, real world challenges, as well as projects that integrate problem solving, writing, and analytical reasoning skills [The Association of American Colleges and Universities, Survey of Employers 2008].

Traditional Information Technology Degrees

Traditional IT degrees are still available in colleges and universities and are typically located within specific departments of these schools, such as: business, engineering, art, and liberal arts. The following briefly describes these degrees:

  • Computer Science – a rigorous theoretical study of data structures, operating systems, and programming.
  • Information Systems – called management information systems which teach databases, programming, and computer applications.
  • Electrical and Computer Engineering – a study of software design, communication systems, digital circuits, and technical products.

Degrees in any one of these areas are perfect for those who want to design electronic products and programs or for those who want to design new and better integrated circuit chips and digital applications.

Practical Information Technology Degrees

Employers want employees who know the practical applications of IT, along with the ability to adapt to evolving computer technology uses, equipment, and programs. These are some of the new degrees with brief descriptions:

  • Game Development – programs focus on designing and creating new games for computers and gaming systems.
  • Interactive Media – programs focus on the creation of websites and digital media to allow more interactivity in cell phones, kiosks, MP3 players, Internet, and gaming systems.
  • Network Engineer – programs focus on the application of IT in databases, programming, and networks.
  • Human Computer Interaction – programs focus on the practical application how humans interact with technology and the development of new computer interfaces.
  • Software Engineering – programs focus on the engineering applications and practical approaches to software development.
  • Multimedia Specialist – programs focus on the practical applications of computer programs and software in various industries for presentation and professional development.
  • Education Technology – programs focus the practical applications of IT in educational settings.

These programs may appear under different names in colleges, universities, vocational, and technical schools; however the emphasis is the same. Some schools may require enrollment in a bachelor’s degree, associate’s degree, or certificate program to enroll in specific courses. Many schools offer these programs through distance education.

Information Technology Degrees

Because of the ever-evolving information technology available for businesses and education, employers are searching for employees who understand the practical applications of IT. Also, they are searching for employees who can use their practical knowledge to solve problems which arise in IT applications.

The advantage of earning a degree in one of the new computer degrees or certificates is their specialization. These degree programs focus on completing complex real world challenge and integrating problem solving skills with analytical reasoning skills, which employers seek in new employees.

The face of information technology is evolving and anyone can be a part of this world by continuing his education to focus on these new degree choices. Visit Changing Careers to be a Web Designer and How to Select a Trade School for additional information regarding information technology degree programs.

Major in Computer Information Technology

The computer information technology major is designed to combine the benefits of a traditional college education with the benefits of hands-on training in state-of-the-art computer technology. Students become technically competent, but also learn to write well-organized and clear memoranda and reports. The computer information technology curriculum integrates technical skill with communication skills, superior general education requirements, and breadth of knowledge in the computer information technology field.

Objectives

The student who graduates with a major in computer information technology will be able to

  • Design and implement network and database administration solutions.
  • Produce effective proposals, reports, memoranda, briefings, and documentation.
  • Communicate effectively using oral and computer-based presentation techniques.
  • Apply effective information research techniques.
  • Discuss information technology from an international and historical perspective.
  • Apply ethical judgments to thinking critically and systematically about the impact of information technology on contemporary social, political, and economic issues.

Degree Requirements

A degree with a major in computer information technology requires the successful completion of 120 credits of coursework, including 33 credits for the major, 41 credits in general education requirements, and 46 credits in the minor, electives, and other degree requirements. At least 17 credits in the major must be earned in upper-level courses (numbered 300 or above), and 18 credits in courses designated CMIT.

The following course sequence will fulfill all the requirements for the BS in computer information technology. Since some recommended courses fulfill more than one requirement, substituting courses for those listed may make it necessary to take additional courses to meet degree requirements. Students should consult an advisor whenever taking advantage of other options. For information on alternate courses (where allowable) to fulfill general education requirements (in communications, arts and humanities, behavioral and social sciences, biological and physical sciences, mathematics, and interdisciplinary issues) click here. For cross-curricular requirements (in civic responsibility, historical, and international perspectives) click here.

Requirements for the Computer Information Technology Major

Coursework for a major in business administration includes the following:

  • Required foundation courses (12 credits): CMIS 102/102A (or prior programming experience and an additional supplemental course), 141/141A (or CMSC 130), and 310 and CMIT 265
  • Core courses (15 credits): Any upper-level CMIT courses
  • Supplemental major courses (6 credits): Any CMIS, CMIT, CMSC, CMST, and IFSM courses
  • Required related course (3 credits), which may be applied anywhere in the degree: MATH 107

Recommended Sequence

The following course sequence will fulfill all the requirements for the BS in computer information technology. Coursework for the major is indicated by ±. Since some recommended courses fulfill more than one requirement, substituting courses for those listed may make it necessary to take additional courses to meet degree requirements. Students should consult an advisor whenever taking advantage of other options. For information on alternate courses (where allowable) to fulfill general education requirements (in communications, arts and humanities, behavioral and social sciences, biological and physical sciences, mathematics, and interdisciplinary issues) click here. For cross-curricular requirements (in civic responsibility, historical, and international perspectives)

Kaspersky Mobile Security S60v3 v6.0

kaspersky® Mobile security is a convenient and reliable solution that protects smartphones from malicious programs that target mobile platforms. Viruses, worms and Trojans have spread beyond personal computers. With the growing popularity of smartphones and communicators (that are essentially small computers), malicious programs for mobile devices are appearing in increasing numbers and diversity. For an in-depth look at how widespread mobile malware really is in the modern world, read our white paper, "Mobile Malware Evolution".
In developing Kaspersky Anti-Virus Mobile we have combined the latest Kaspersky Lab technologies to protect mobile platforms with our long experience of working in the antivirus field. This solution offers effective protection for your smartphone and personal data from malicious programs. Functions: * On-demand scanning. You can launch a scan of your mobile at any time. Scanning the memory of a mobile device takes several minutes at most. It is possible to focus scanning on memory cards, individual folders and files. If an infected object is detected, it is stored in the quarantine folder or deleted. * On-access scanning All incoming or modified SMS, MMS and email items are automatically scanned for malicious programs. The product also monitors executable files arriving via Bluetooth and other connection channels. * On-schedule scanning. You can pre-set the best time for antivirus scanning (for example, at night). Kaspersky Anti-Virus Mobile removes any infected objects and stores suspicious objects in quarantine. You have the option of viewing reports on suspicious objects and making the final decision. * Antispam for SMS/EMS/MMS. Telephone numbers of spam sources can easily be added to a blacklist to ensure that such messages are always blocked.
You can also add addresses from your contact list to a safe list. * Automatic updates. The Kaspersky Lab Virus Lab constantly updates databases on the server with new virus samples. Antivirus databases on the phone can be updated on schedule (at intervals set by the user). By default, the databases update automatically once a week. Updates are available via WAP / HTTP (GPRS, EDGE, 3G) or with the aid of a PC. There are English version & German version in zip file.

Tech Tips for the Basic Computer User

“One of these days, I’m going to write a book called, ‘The Basics.’ It’s going to be a compendium of the essential tech bits that you just assume everyone knows–but you’re wrong.

“(I’ll never forget watching a book editor at a publishing house painstakingly drag across a word in a word processor to select it. After 10 minutes of this, I couldn’t stand it. ‘Why don’t you just double-click the word?’ She had no clue you could do that!)”

Many readers chimed in with other “basics” that they assumed every computer user knew–but soon discovered that what’s common knowledge isn’t the same as universal knowledge.

I’m sure the basics could fill a book, but here are a few to get you started. All of these are things that certain friends, family or coworkers, over the years, did *not* know. Clip, save and pass along to…well, you know who they are.

* You can double-click a word to highlight it in any document, e-mail or Web page.

* When you get an e-mail message from eBay or your bank, claiming that you have an account problem or a question from a buyer, it’s probably a “phishing scam” intended to trick you into typing your password. Don’t click the link in the message. If in doubt, go into your browser and type “www.ebay.com” (or whatever) manually.

* Nobody, but nobody, is going to give you half of $80 million to help them liberate the funds of a deceased millionaire…from Nigeria or anywhere else.

* You can hide all windows, revealing only what’s on the computer desktop, with one keystroke: hit the Windows key and “D” simultaneously in Windows, or press F11 on Macs (on recent Mac laptops, Command+F3; Command is the key with the cloverleaf logo). That’s great when you want examine or delete something you’ve just downloaded to the desktop, for example. Press the keystroke again to return to what you were doing.

* You can enlarge the text on any Web page. In Windows, press Ctrl and the plus or minus keys (for bigger or smaller fonts); on the Mac, it’s the Command key and plus or minus.

* You can also enlarge the entire Web page or document by pressing the Control key as you turn the wheel on top of your mouse. On the Mac, this enlarges the entire screen image.

* The number of megapixels does not determine a camera’s picture quality; that’s a marketing myth. The sensor size is far more important. (Use Google to find it. For example, search for “sensor size Nikon D90.”)

* On most cellphones, press the Send key to open up a list of recent calls. Instead of manually dialing, you can return a call by highlighting one of these calls and pressing Send again.

* When someone sends you some shocking e-mail and suggests that you pass it on, don’t. At least not until you’ve first confirmed its truth at snopes.com, the Internet’s authority on e-mailed myths. This includes get-rich schemes, Microsoft/AOL cash giveaways, and–especially lately–nutty scare-tactic messages about our Presidential candidates.

* You can tap the Space bar to scroll down on a Web page one screenful. Add the Shift key to scroll back up.

* When you’re filling in the boxes on a Web page (like City, State, Zip), you can press the Tab key to jump from box to box, rather than clicking. Add the Shift key to jump through the boxes backwards.

* You can adjust the size and position of any window on your computer. Drag the top strip to move it; drag the lower-right corner (Mac) or any edge (Windows) to resize it.

* Forcing the camera’s flash to go off prevents silhouetted, too-dark faces when you’re outdoors.

* When you’re searching for something on the Web using, say, Google, put quotes around phrases that must be searched together. For example, if you put quotes around “electric curtains,” Google won’t waste your time finding one set of Web pages containing the word “electric” and another set containing the word “curtains.”

* You can use Google to do math for you. Just type the equation, like 23*7+15/3=, and hit Enter.

* Oh, yeah: on the computer, * means “times” and / means “divided by.”

* If you can’t find some obvious command, like Delete in a photo program, try clicking using the right-side mouse button. (On the Mac, you can Control-click instead.)

* Google is also a units-of-measurement and currency converter. Type “teaspoons in 1.3 gallons,” for example, or “euros in 17 dollars.” Click Search to see the answer.

* You can open the Start menu by tapping the key with the Windows logo on it.

* You can switch from one open program to the next by pressing Alt+Tab (Windows) or Command-Tab (Mac).

* You generally can’t send someone more than a couple of full-size digital photos as an e-mail attachment; those files are too big, and they’ll bounce back to you. (Instead, use iPhoto or Picasa–photo-organizing programs that can automatically scale down photos in the process of e-mailing them.)

* Whatever technology you buy today will be obsolete soon, but you can avoid heartache by learning the cycles. New iPods come out every September. New digital cameras come out in February and October.

* Just putting something into the Trash or the Recycle Bin doesn’t actually delete it. You then have to *empty* the Trash or Recycle Bin. (Once a year, I hear about somebody whose hard drive is full, despite having practically no files. It’s because over the years, they’ve put 79 gigabytes’ worth of stuff in the Recycle Bin and never emptied it.)

* You don’t have to type “http://www” into your Web browser. Just type the remainder: “nytimes.com” or “dilbert.com,” for example. (In the Safari browser, you can even leave off the “.com” part.)

* On the iPhone, hit the Space bar twice at the end of a sentence. You get a period, a space, and a capitalized letter at the beginning of the next word.

* Come up with an automated backup system for your computer. There’s no misery quite like the sick feeling of having lost chunks of your life because you didn’t have a safety copy.

Prayer reminder in Mozilla Firefox, Pray Times !


For those of you who frequent browsing (exploring) the virtual world with Mozilla Firefox, so if there is no reminder, could forget the time when prayer has been entered. Among the benefits of Firefox is support Add-ons (additional functions) that there are so many. One of them is a prayer reminder.
One of the add-ons that are quite useful Pray Times!, Prayer reminder for Firefox.
Pray Times! calculation algorithm using a similar (possibly the same) with a prayer reminder application, such as Shollu, Azan Times and others. So if Shollu have been using, then look almost the same time.
What are the features of Pray Times!
* Different methods of prayer time calculation
* Information within the time prayer
* Automatic azan voice or other audio when the time comes
* Support various places in the world
* The calculation of local (does not need internet connection)
* Display information prayer time when the mouse on the area of Pray Times!
* Not limited Operating System that is used, which use web browser Mozilla Firefox
* Various options (calculation) that can be entered manually
* Available jadwan monthly prayer time

How Installasi
1. Go to the URL address Pray Times!
2. Click the "Add to Firefox".




3. And if the browser used is Firefox, it will automatically install the direct add-on, with confirmation as shown below:


4. Just click the Install Now. See the effect so that firefox needs to be opened and closed again.
Download and manually Installasi
If we do not want to install directly from the brower firefox (possible to install in the home, eman browser, computer, etc.), then we can download this add-on separately.

Download the add-on
1. Use a browser other than Firefox, for example, Chrome, IE, Safari, etc. Operas.
2. Open the link above, Pray Times!
3. Just click "Add to Firefox", it will be in the download file pray_times!-1.1.3-fx.xpi

x
4. Save this file on your computer.

Add-on installation manually:
1. Open the Firefox browser
2. Select the File menu> Open File, and locate the file before (pray_times!-1.1.3-fx.xpi)
3. Click Open, then it will continue with the installation process of Pray Times!
In the right corner of the Firefox browser will look prayer time. To set, please right click and select Opstions. Azan files that are included only a sample only, so only heard the sound Takbir adzan. To download files adzan other, can be downloaded from http://tanzil.info/praytime/audio/

In addition to the Pray Times!, Reminders prayer for windows could use Shollu, while for handphone (HP) and other gadgets that support java, can use the Azan Times.

Prevent Virus Autorun.inf make the Super Autorun

Continuing the previous any posts about Secure dummy file with the flash and with flash format type NTFS, this time it will continue on the technical protection of the flash drive or a virus or program that will create the file Autorun.inf, simple program with Super Autorun. So it can be expected to reduce the spread of the virus. I had doubts the effectiveness of this way, because it thinks it easy for viruses to change, delete, and create a new autorun.inf file.
Some of this information I can after reading one of any posts in the blog WinPowerTips. Indeed, with only the file autorun.inf to make it, even though the system hidden attribute will be easily overcome by the virus. But there is described with three levels and the result is not easy to delete the file and try to make the virus Autorun.inf file with the usual way will fail.

The following short explanation of the level 3 (stages) to prevent the virus to create / modify the Autorun.inf file:
1. Prevent the virus to create the autorun.inf file on how to create a folder Autorun.inf. Because if you already have this folder then the Autorun.inf file will not be made.
2. Prevent virus remove Autorun.inf folder (with the usual way) by adding Unicode files inside. This fact can make the virus or error programmernya close if not overcome with good.
3. Prevents users Removing Autorun.inf folder with the folder not terhapuskan. Such as Microsoft own explanation that sometimes we can not remove file / folder name if the name is invalid (disability).
Explanation about the length of each level, please visit the blog directly the IT Guy is. Because there are also many tips-other interesting tips.
However, with 3 levels itupun, if virusnya (the virus) and the jelly can still overcome the virus and can still create Autorun.inf file to transmit itself.
Super Autorun
Provided in the blog file vbs (visual basic script), to create Autorun.inf folders and folders that are not [easily] terhapuskan (phases 1 and 3) to phase 2 (make the file unicode) we have to create your own.
After reading the article, I tried googling further information (details) about this, and finally, I try (inspired) to make the file a simple, small and easy to use anyone else associated with this. The result? Super Autorun

















File size is only about 24 KB, no need to install the. Consistent with its name, aims to create a folder / file-specific, to prevent the virus (easily) create, modify or delete the file Autorun.inf. This file using additional special techniques, so that it can not be easily removed, or modified by direname virus. For unicode file, not included in this program.

Use Super Autorun

This program is very easy to use, run the live file, then select the drive that will be used as a target or choose "Select all drives" to select all drives, then click Create Autorun.inf, If you already have a file / folder Autorun.inf then this program will try immediately remove, and create new ones. If you are successful, please try to delete, rename, edit, open this folder in any way.

So essentially, this program will create Autorun.inf folders that are not easy to erase, or rename the modifications, so that viruses or other programs can not create file Autorun.inf.

In order to succeed, then the flash drive or to be made must bertipe NTFS. To Flashdisk, because the default Windows Explorer does not have the menu to format NTFS, I can read any posts before mem-Tips Flashdisk format with NTFS file system

Download Super Autorun (24 KB)

Note: This technique is not to prevent the virus to duplicate itself flash, only to prevent the virus mambuat file Autorun.inf, so it does not spread to the computer without us. Perhaps the future can be combined with comprehensive protection creating dummy files protected with Super Autorun to protect the flash. If you want to delete the folder had autorun.inf, can use the software Unlocker

Format Flashdisk with the NTFS file system

Some of us may be less attention to the file system type used Flashdisk us, whether it is NTFS, FAT32 or FAT. To find out the file system is used, right-click Flashdisk in Windows Explorer and select Properties. Here it is seen that type of File System is used.

But when we try to mem-format through windows Explorer, there may not have the NTFS, the FAT and FAT32 only. How do I mem-NTFS format and what is the difference with the FAT and FAT32?

Why NTFS?
NTFS format is a file system after the latest Windows FAT32, and have several advantages such as the ability to store additional information about the file / folder (metadata), security features, data compression, a better structure and more.
In addition, the type of NTFS can be used to format mem-size is greater, for only 2 GB FAT, FAT32 8 TB (8,000 GB), while NTFS can be up to 16 EB (16 million TB). Nevertheless, there remain only NTFS kekurangannya, such as not legible in the Win9x and the read write to disk more often.
Because each file / folder store more information (metadata), then read the writing process each file / folder will be more common than type FAT32 or FAT, so that for the flash, affect age (resistance). Given the memory limitations Flashdisk have read the writing. (Article about keeping to be more durable flash can be read here: Characteristics and Tips Flashdisk maintain more durable)

Enabling NTFS format in Windows Explorer
We can only mem-format USB Flashdisk with type NTFS with the help of HP USB Format Tools. But the actual Windows Explorer can do. To activate the following steps can be followed
1. Open System Properties with the right click My Computer> Properties (or a keyboard with buttons Win + Break)
2. Open the Hardware tab and then click the Device Manager
3. Select Disk Drive and select Flashdisk in which you want to format with NTFS, right click, select Properties.
4. Once open select the Policies tab
5. Select Optimize for performance, and click OK



















6. Then try right-click the flash drive in Windows Explorer and select the Format menu, then there should appear NTFS File System.

To note when this option is enabled, each flash should always pull out through the Safety Remove Hardware. If the option is "Optimize for quick removal" is actually the flash can be removed immediately, without the Safety Remove Hardware

Test between NTFS, FAT32 and FAT

I have tried some of the comparison (especially the process to copy data) type with different, and the results are as follows:

11 * Copy the file (the size of each around 170 MB) total about 1.8 GB
NTFS 04:44 (4 minutes 46 seconds)
FAT32 05:09 (5 minutes 9 seconds)
FAT 04:46 (4 minutes 46 seconds)
1297 * Copy files (size between 1 KB to 23 KB) with a total of 8.23 MB
NTFS 29 seconds
FAT32 56 seconds
FAT 58 seconds
* Capacity in the format
NTFS 2,038,044,672 bytes Used space 12,937,216 bytes (12.3 MB)
FAT32 2,046,959,616 bytes Used space 4096 bytes (4.00 KB)
FAT 2,050,686,976 bytes Used Space 0 bytes

Copy the visible data with NTFS, relatively quickly, but after the size of the format a little smaller because of the additional space required is greater for the file / folder (metadata). If the flash is often used to read and write process does not require the NTFS features, such as data security, then select the type FAT32 may be better.

Insyaallah next article will discuss about the type utilizing NTFS Flahsdisk to protect from the virus will create, delete or modify the program with a simple Autorun.inf I create "Super Autorun".