Monday, December 8, 2008

6 Free and Easy Steps to a Faster Laptop

Have you ever wanted a faster laptop computer? Would you like faster computer performance without the extra cost? Don't sweat it, you don't need to spend extra money to make your laptop computer run faster. Faster computer performance is within your grasp. Here are six easy and cost free steps to make your laptop computer run faster. They are simple to do and not too time consuming either.

1) Fix Those Chopped Up Disk Files.

Ever notice that it seems to take longer and longer to open up some of your computer applications? It is not your imagination. Over time, those program files become broken up into small pieces on your hard drive. It is called disk file system fragmentation. Your laptop computer system must search the hard drive for small pieces of a file and put them back together again. This happens when the operating system can not or will not allocate enough contiguous space to store a complete file. Hence, your laptop computer performance degrades significantly when you have a large amount of disk file fragmentation.

The good news is, there is a free and easy utility to fix disk files that are fragmented. There is more good news too. It is included with all Windows operating systems. It is called Disk Defragmenter. It will significantly speed up your laptop computer performance by consolidating fragmented files and folders.

2) Free Up Your Disk Space

When your disk space storage gets a little bit on the full side, it is a good time to free some space up. This will help to improve your laptop computer performance by safely deleting files that are no longer needed off your hard drive. Windows operating systems comes with a nice free utility tool called Disk Cleanup. It lets you decide whether or not to safely delete files that it identifies for you.

There are several areas within Windows where you can safely remove files with the Disk Cleanup tool. For example; temporary internet files, Windows temporary files, and Windows components that are not being used any more. It will also show you those programs that you have installed years ago, that are no longer used; old games, old pictures and even old videos.

3) Stop All Those Automatic Startup Programs

Stop those unneeded programs that startup automatically when your computer boots up. Just about every program that is installed on your computer, seems to want to start up when your computer starts up. This slows down your laptop computer very quickly and quite dramatically. They slow down your computer during shut downs and start ups. They also eat up valuable computer memory that you could being using for live active programs.

So go through your computer programs that you have installed one by one. Go to their program preferences or program options and uncheck automatic program startup. You can also run a free Windows utility program called " MSCONFIG " to stop some programs from automatically starting up.

4) Unclog Your Windows Registry

Everything and I mean everything, that has ever been installed or un-installed on your computer is listed in the Windows registry. Your computer registry grows like one hungry monster and never stops eating. And it never goes on a diet. It retains everything forever.

The bigger it gets the slower your computer will get. Over time, it gets so clogged up, that it even gets corrupted causing computer errors. You know, those unwanted blue screens with a bunch of numbers and letters that mean nothing to you. When it gets clogged up, some programs will even stop working. The congested Windows registry will slow down your computer constantly until you perform a clean up.

Don't wait until your computer crashes before doing a registry cleanup. The best free and safe way to clean up your computer registry is to run a free registry scanner and cleaner. You can find one that is recommended by user reviews by searching the internet.

5) Windows Vista ReadyBoost

If you are using Windows Vista, you should really look into ReadyBoost. A free utility tool included in Vista that allows you to use a USB flash drive or a memory card to act as additional memory. ReadyBoost will improve your laptop computer performance without having to add additional system memory. It does this by using your flash drive or memory card as a drive for disk cache. This is all done without having to spend more money on additional memory sticks too.

6) Clean Up Your Desktop

We are all guilty of Windows desktop clutter. Some of us have way more desktop icons than we know what to do with. Everytime I turn around another desktop icon seems to appear on my desktop. Everytime your PC starts up, it has to load all those icons and their properties into RAM, this does take time and slows your PC down. It eats up your memory and slows down your bootup speed. Delete those unused desktop icons. You will see a nice speed improvement on Windows boot-up time.


write by R.Z. Woodman on ezinearticles.com

Wireless Networks That Rock - 5 Ninja Tips to Speed Up Your Network

Is you wireless network capable of handle IPTV, streaming rock music, high speed down loads and gaming all at the same time?

1. Choose the right Wireless Access Point - A "fast wireless network" is a combination of two things. First is how stable is your signal and what is the range of that stable signal. Next, what is the receive sensitivity of you wireless adapter on your client device IE your laptops of Desktop.

2. External Wireless Adapters - Add a external wireless adapter to your laptop that is powered. Just by Google usb wireless adapter and you will find many different vendors

3. Wireless Access Point Placement - Place your wireless access point in the middle of you location. Almost all wireless access points come with omni-directional antennas, which emit a doughnut pattern signal in all directions. If you place your wireless access point near a wall then half of your signal is going out the door.

4. Transmit on G/N Only - Set your wireless network to only allow 802.11g/n clients. If you allow 802.11b clients then as soon as one 802.11b client connect to the network your speed is cut in half. This is due to the extra wireless management frames that are required for the "B" guys to talk to the "G" network.

5. Wireless Channel -If your network is slow and keeps kicking you off then you might be experiencing co-channel interference. Download Netstumbler and check out what channel your neighbors networks are running on. More that likely they are running on channel 6. If so then change your wireless access points channel to 1 or 11.

Wireless Networks that Rock!! Highland Park's and Chicago Lands Wireless Multi-Media Network installation team. Your property value will sky rocket with the ability to Stream IPTV, Music, Wireless Gaming, and high speed downloads on every square ft. Make you your home a Wireless Ninja home today. Your digital lifestyle now has a home. Rock On!! http://www.wirelessninja.com


write by Erick Meyer on ezinearticles.com

Satellite Internet Is the Answer to Your Low Speed Internet

Satellite internet access is rapidly grabbing the huge share of the internet market. It offers a superior connection to dial up access which is the only option outside of cities and towns. Many families have opted to buy satellite internet due to its unmatchable service. Where internet service is concerned, bandwidth is the deciding factor for customers.

Satellite Internet services make use of two way satellite communication. It means that you communicate to the satellite through your system and the satellite responds by sending the data you requested to your computer. Downloading speed of satellite Internet connection is 10 times more than dial up connection. This makes the Internet more useful to those who are formally depending upon phone modem connectivity. Large number of people are choosing two way internet over one way as two way internet don't require any modem and one can count on it to deliver you high speed internet and download speed. There is no comparison with satellite internet connection. With satellite internet one can experience:

• High speed up to 10 times faster than dial up. • Packages as low as $59.99 per month. • Always on connection. One don't require dial in and phone line • High downloading speed between 512 kbps - 1.5 mbps

The state of the art technology connects your home or small business computer to the Internet through a satellite using modem or mini-dish. You have noticed that most of dial up connections are unable to support streaming video but with 2 way satellite internet streaming video can be downloaded quickly. You can experience web pages load in a fraction of the time. You will see that dozens of web pages can be downloaded at one time.

Whether you are a first time user or season small business, you have options to select the package that befits you. The majority of broadband satellite Internet access subscribers are increasing at a fast rate. A certified installer would be available to connect your computer to a satellite modem and link it to a satellite dish that's typically mounted on the roof of your home.

Cosmosatellite specializes in 2 way satellite internet that is suitable for home and office purposes throughout the North America. If you are willing to buy satellite internet, Cosmosatellite is the one-stop shop for your internet needs.


write by Mike Nicholson on goarticles.com

Thursday, December 4, 2008

Cleanup Registry Software Gets Rid of Data That Slows Down Your Computer

PC registry repair sounds complicated, but it is actually fairly simple if you find a good pc registry fix. This is typically pc registry repair software that can fix or remove data fragments that tend to slow your computer down. You will need to understand how data fragments can build up, and the kind of software that can take care of the problem and improve PC performance.

The Windows registry is the place where the control panel stores all of the information it needs to perform the tasks that you require of it. This storage area has a tremendous amount of information packed into a tiny area. When your computer is running normally, when you decide to launch some software or fire up a piece of hardware, your computer goes to the control panel, which then goes to its storage area, the Windows registry, to find all of the information it needs to launch the software or hardware. Normally, when the information is correctly organized, the computer can very quickly find what it needs and begin work.

PC performance can lag when unnecessary bits of data get in the computer's way as it tries to find the data it does require to perform the job you want it to do. This data is the result of incomplete software or hardware removal, when small data fragments, which the computer will not be able to access in the future, are left behind in the Windows registry.

When this occurs, over time all of those broken or unneeded data bits build up in the Windows registry, hindering your computer in trying to speed up. PC repair software is available that can cleanup registry issues quickly, especially if performed as routine maintenance on your computer.

You will want a PC registry fix that allows you to choose which bits of data are actually removed from the registry. Some cleanup registry software will actually remove data before you have the opportunity to stop it, so this can be a problem. You want a pc registry repair solution that gives you a full report of the issues going on in the registry before it starts to work on them. In this way, you can ensure that no valuable information inadvertently gets deleted in the process.

If this sounds too hard to figure out on your own, you might want to peruse pc registry fix software reviews online. Here you will read about the specifics of each cleanup registry software, and an expert's opinion about how they worked. Your pc performance can be improved with the proper cleanup registry software, if you select one that does what you need.


wrote by Wayne Hemrick on ezinesarticles.com

How to Get Rid of Trojan Virus - 5 Easy Steps to Get Rid of Trojan Horse Virus

Before we can know how to get rid of trojan virus we need to specify exactly what it is and how it differs from a normal computer virus. A trojan horse virus is a form of malware (malicious software) that leaves your computer open to attack, and derives its name from the famous Greek legend of The Trojan Horse.

The Trojan Horse was used by the ancient Greeks to trick their way into the once impregnable city of the Trojans (Troy) and secretly send in soldiers to open the gates and allow the rest of the Greek army in to take over and conquer the city.

In the same way, computer trojan viruses disguise themselves as seemingly harmless pieces of software or desired files, but then "open the gates" to other forms of malicious software, spyware, keyloggers etc...leaving you open to anything from someone stealing your credit card information, to some basement-dwelling geek gaining remote access to your computer and files. So the trojan virus' real damage is done in its ability to compromise your computer's security and leave it open to other dangers.

So while a normal computer virus is lethal in itself and can "mutate" and infect other parts of your system, the trojan allows other digital nasties in through the back door. The good news is that this makes it easier to identify and get rid of trojan virus.

How did you get the trojan virus on your computer?

As mentioned above, the trojan virus is often disguised as a normal looking file, so maybe it was an mp3 music file, a patch for a game, an online video, or even a jpeg image file. Either way, it's on your computer, so how do you get rid of trojan horse virus?

Here are the 5 things you need to do right now to get rid of trojan horse virus and avoid it returning:

1. Make sure your anti-virus software is up-to-date and includes all the latest patches and virus, spyware definitions. This will be your first port of call when trying to get rid of trojan virus.

2. Run a system and registry scan to identify the evil trojan virus and then zap it into oblivion to get rid of it. Since it resides within an unimportant file you can easily delete it to get rid of trojan virus - whereas other computer viruses are more tricky to get rid of and need to be "quarantined" to stop them infecting other files on your system.

3. If you know the name of the trojan horse virus then you can check online for information on how to get rid of the trojan virus in question. Microsoft has regular updates on it's site about trojan viruses that affect Windows machines. Online forums also provide you a wealth of information about how to get rid of a trojan horse virus.

4. You could also try to get rid of the trojan virus manually. Check your Task Manager (press Ctrl +Alt +Del on Windows) to identify any programs that may be running in the background that shouldn't be - i.e. they started without your knowledge. If you see any such program, make a note of it's name, click its name to highlight it and click End Task. Open your Control Panel (click the Start menu) and use the Add/Remove programs to find the nasty blighter in question and get rid of it. Be careful with this though as you may end up wrongly deleting a file that is important to your system.

5. Overall you should take a look at your online habits and see how certain actions may compromise the security of your computer and your personal information. If you use Peer-2-Peer (P2P) file-sharing networks then take extra care on what you download, and make sure everything is run through your anti-virus / spyware scanning software first, to get rid of trojan virus that may be attempting to access your system.

How many of your personal details do you enter on your computer on a regular basis? For instance, do you bank online, or pay bills or a credit card? Perhaps you buy gifts and other purchases online? According to CNN, if you use the internet there is a 90% chance that your computer is infected with spyware. How can you be sure that your information is not being viewed by a third party right now?

How many of your personal details do you enter on your computer on a regular basis? For instance, do you bank online, or pay bills or a credit card? Perhaps you buy gifts and other purchases online? According to CNN, if you use the internet there is a 90% chance that your computer is infected with spyware. How can you be sure that your information is not being viewed by a third party right now?

Put your mind at rest and perform a FREE scan here How To Get Rid Of Trojan Virus.


wrote by Jake Unsworth on ezinearticles.com

Accounting and Financial Software Selection

Whether you have a small or a large business, it is always advisable to have an accounting and financial software. This software is basically designed to manage the financial transactions and create reports that allow you to keep track of all your expenses and income. The accounting and financial software stores everything from a simple spreadsheet to a customized and integrated system. This also has number of other features, support, and training included.

Accounting and financial software also manages your portfolio, general banking needs and retirement account. If you want the software to manage home finances, be sure that you not buy something more that required and spending more on it. By purchasing something more than you require you will end up paying high for the features that are of no use to you.

There are few features that you should check which should come with all accounting and financial software like ability to link with your particular bank, ability to generate reports which allows to see categories/features, ability to set up budget with bill due date reminders, ability to pay bills online or write checks. If you have investments or a portfolio, you need an added feature of accounting and financial software to help manage those accounts. These features include ability to calculate how much money is to be saved in order to retire and also the ability to track investments. Software with the feature of allowing you to calculate auto loan payoff scenarios and mortgage can be helpful as well.

Accounting and financial software can be of a great use but see to it that you buy something that you require and not more than that.

More Info About Online Financial Tools And free accounting software

wrote by Esther Cristian on ezinearticles.com

Accounting and Financial Software Selection

Whether you have a small or a large business, it is always advisable to have an accounting and financial software. This software is basically designed to manage the financial transactions and create reports that allow you to keep track of all your expenses and income. The accounting and financial software stores everything from a simple spreadsheet to a customized and integrated system. This also has number of other features, support, and training included.

Accounting and financial software also manages your portfolio, general banking needs and retirement account. If you want the software to manage home finances, be sure that you not buy something more that required and spending more on it. By purchasing something more than you require you will end up paying high for the features that are of no use to you.

There are few features that you should check which should come with all accounting and financial software like ability to link with your particular bank, ability to generate reports which allows to see categories/features, ability to set up budget with bill due date reminders, ability to pay bills online or write checks. If you have investments or a portfolio, you need an added feature of accounting and financial software to help manage those accounts. These features include ability to calculate how much money is to be saved in order to retire and also the ability to track investments. Software with the feature of allowing you to calculate auto loan payoff scenarios and mortgage can be helpful as well.

Accounting and financial software can be of a great use but see to it that you buy something that you require and not more than that.

More Info About Online Financial Tools And free accounting software

wrote by Esther Cristian on ezinearticles.com

Wednesday, December 3, 2008

Windows XP Will Not Shut Down - Simple Steps to Repair Computer

There are many people who have tons of different problems. Trying to shutdown their computer is actually one of the main problems - and although people think it's simple, it can usually be more complicated than previously thought.

This problem is annoying, and you definitely, do not want to do an improper shutdown because overtime this can hurt your computer. First of all, you need to get down to the nitty gritty - to find out why your computer isn't shutting down.

So, why isn't my computer shutting down?
As stated before, there are many reasons, but the main reason it's not shutting down could be a virus or some type of spyware that is being ran on your computer without your knowledge. You usually will have a hard time shutting these programs down, because they're meant to slow down, spy or even mess up your computer.

There are some terrible viruses out there that won't let your computer turn on after it shuts off - this is why it's not healthy or good for your computer to do an improper shutdown. You ultimately want to clean your registry so that you can get rid of all these things.

What is the Registry and How do I Clean it?
This is also a commonly asked question, and it is definitely possible for your to clean you registry. The registry is the part of the computer that holds all of the information, including all the applications, all of the programs, and everything else that makes your computer, your computer. It's basically the main that stores information about everything.

The truth is, you can go into the registry and delete everything by hand, but you can also find a way to crash it. All it takes is the deletion of one necessary program and your computer goes into non-start up mode.

You either need a professional, or a professionally made registry cleaner to scan and clean your computer for future purposes and to get rid of the spyware, viruses, adware, and unnecessary junk that the registry picks up.

Are you experiencing Repair DLL Error Messages, EXE error messages, Blue Screen of Death, Lack of Shutdown, general slow downs of your computer, Sychost, System 32, Fix General Protection Fault, Javascript, Activex, Adware, Spyware, Viruses, or a huge variety of errors for your computer? You can fix this with a very easy to use registry fix tool that is available for a free trial. For More Information, Visit:http://registrycleanpro.blogspot.com


write by Richard Cartwrigt on ezinearticles.com

How to make a flash video tutorial of your website and product in minutes

Do you want to show your website or product in a fashion way at this golden season? This article describes how to make a flash video tutorial of your website or product in minutes.

"A video is more than thousands of words!" How to make a video tutorial of your website? Use a camera to record their menus? Maybe it's not a so bad choice! But a camera face to your computer is not the best way to show your website with the following 3 reasons.
1. The camera can not record the screen clearly.
2. You can not edit the video by adding some instructions or narrations easily.
3. The video file is too big for web sharing and transmission.

Maybe you need an application to record your screen, not a camera! Screen recording software helps you to record the screen to mirror all of your operations by recording mouse movements and keystrokes with the screenshots. Even you can add some tips to highlight the important functions. Furthermore, you can add narration from microphone easily to enhance the tutorial. At last you can publish the flash movie and transmit to the technical guys. As you know, the flash format has smaller size and better for network transmission.

The following is a step-by-step guide of how to create a video tutorial of MS Outlook by recording the computer screen in minutes. Or you can click to view the samples now:
http://www.sameshow.com/samples/outlook-tutorial/outlook-tutorial.html

1. Setting the capture mode and record
There are 3 capture modes to be selected: Application region, Custom region and Full screen. Now we select application region to record the Microsoft Outlook, guide others how to create an account in Microsoft Outlook. Click "Record" button to start recording.
Application Region: Capture the window of the specific application that is running.
Custom Region: Capture a customized rectangular shape on your desktop.
Full Screen: Capture the entire screen.

2. Edit and Enhance the tutorial
Once the recording is finished. DemoCreator will import the slides automatically. You can easily to add some interactive elements to the tutorial by slide. Insert new slide or delete unwanted slide. Or add some callouts, notes, animations to the tutorial to make the tutorial more interactive and animated.

Picture URL:

http://www.sameshow.com/images/democreator/tutorial/1/edit.gif

3. Add sound to the tutorial
Click "Audio" button and login the Audio Timeline Editor. You can edit the audio easily by cutting, inserting and deleting. And also you can view the slide at the same time when editing the audio. Furthermore, you can record the sound when recording the screen.

Picture URL: http://www.sameshow.com/images/democreator/tutorial/1/sound.gif

4. Publish the flash movie
Click "Publish" button and login the publish menu. Select publish to SWF, LMS, auto-run CD, standalone EXE, or Email. As you know, flash file has the smaller size and safer in network transmission.

Learn more from: http://www.sameshow.com/demo-creator.html

View the created outlook tutorial from:

http://www.sameshow.com/democreator/create-software-demo-samples.html


by Share Wonder valuablecontent.com

Using Sector View in search for missing files

In previous article we talked about how to "Add" files to a list of "Files found via their signature". We also touched the possibility to use Sector View to hunt down files you know are there but cannot be found automatically.

It should be mentioned that this article is in the range of what we would call "Engineering". It requires some knowledge about the deeper mechanics of files and how data is stored on data carriers. However it may be a jump start to get a deeper understanding as well.

A CD, DVD, BD or HD DVD is built up from blocks, one after the other. Blocks and Sectors are used in the same context here. In this article a block is a sector and vice versa. Deep down there are several mechanisms, depending on the disc type and formatting (manufacturer formatting or end user formatting). So in reality the blocks that we get to see are not always really one after the other, deep down the data may be organized differently, or managed in larger chunks etc.

But the so called user-data blocks are seemingly organized one after the other, with incrementing addresses, starting from address 0, and the size is 2048 bytes or 2 KB per block.

This is where Sector View comes in handy. The Sector View window allows you to see the content of every sector or block, provided it is readable. An error message is displayed if it's not readable. Easy scrolling through the sectors can be done via the buttons on screen or if you push the Ctrl button in combination with an arrow (right or left) on your keyboard.

Now, to hunt down files. Suppose you did a scan for missing files and folders and you know a certain file is present on the disc, but it was not found by the software.

If the file is not shown in the "Files found via their signature" list. then the signature of the file does not match a signature in the program's database, or the file doesn't really have a good signature. Take a normal text file for instance, very hard to detect as ASCII text can be part of any type file, from the typical text based files (.html, .ini, .bat, ...) to binary files (such as .exe etc.) as well.

Except for certain Macintosh formatted discs, and except for very small files (less than 2 KB) in the UDF file system, all files on optical media start at offset 0 in a block. In other words, you'll find the beginning of the file on top in the "Sector View" window, not somewhere in the middle of the block. So that's what we concentrate on when looking through the sectors.

Continue skipping through the blocks until you also see the end of your file, or if you're unsure, make sure to define a very big byte size afterwards when you create the file. If you find the end, subtract the start address (e.g. 25) from the ends address (e.g. 125) and you have the block length of the file. The block length times the amount of bytes in a block (2048 bytes per block) makes a length of 204800 bytes in this example.

We're nearly there. Now it's back to what was explained in previous article. Use "Add file" to add a file to the list. Create it with the start address you found (e.g. 25) and set the size to 204800 bytes (per example). Give it an appropriate name, e.g. "My book.txt" and you're done. You can now right-mouse click the freshly created file and extract it to your HD.

PS. if you know more about the file you're looking for, either ASCII or binary signatures, then bare in mind that IsoBuster is not a hex-editor. The computer savvy will know how to make an image file of a disc instead and use a hex-editor on the resulting file to look for certain signatures. After some searching and the trusted calculator of course all the above still applies and you can use IsoBuster to extract files per your needs.

by Peter Van Hope on valuablecontent.com

Should you buy a desktop PC or laptop?

You really have no choice except of a notebook computer if your job or lifestyle needs plenty of travel every year. Your own notebook computer will help you a lot when you are out of your home or office.

Now-a-days, you can get laptops as powerful as desktop PCs. Laptops are available with high-resolution graphics, CD/DVD recording, large hard drives and even with more features.

However, if you're sitting on the fence and portability is not required as much, go on buying desktop computer with considering the following reasons:

Desktops are more expendable than laptops: - Desktop computers are quite plain easier to expand and upgrade (using USB and FireWire ports), especially the processor and your graphic card, though you can hang plenty of peripherals off a modern laptop.

Desktops are cheaper than laptops: - Desktop computer is even cheaper than a notebook, so if you don�t need it why you are paying so much. Jump to the desktop side of the fence which costs less and suitable for you.

Laptops repairing cost is much more than desktops: - For example, if your sound card fails with any reason you can easily replace it with any inexpensive adapter card. However, when your laptop creates such problem of sound hardware, you must pull out your wallet because you will not be able to fix it yourself, and the whole motherboard inside the unit will must be replaced.

Here we also figure out how to buy these once you made the decision?

Processor: - if you intend that you will use your machine for standard office tasks and internet browsing, does not matter it will do any processor. But if you are a heavy gamer or you need much more power the Intel Core 2 Duo chip is the better one then.

Memory: - As much memory your PC has installed, you would be able to run as much application at once. Upgrading memory in a desktop after you buy the PC is a snap, but actually its good to buy the amount of memory you like preinstalled with the machine.

Motherboards: - A new motherboard would deliver you smooth new technologies that you are missing right now. It would be faster, would be has Second-generation SATA connections, high-definition audio and even a Dual-card graphic. You should keep in mind to check either the motherboard you are buying has two or one USB ports in fronts or not, because of to plug in your USB memory drive and digital audio player etc.

Graphics: - Before going for shopping make sure what kind of Card will work suite in your PC. If you are a serious gamer and can pay as much go on dual-graphics-card. There are two types of cards, the one is removable from the board and the other is permanently soldered on the board. However we would recommend a discrete graphics board for gaming and an integrated graphics for other use.

Sound Card: - for office use you should buy an integrated sound card for your PC, but if you want to use the PC in your home then a dedicated sound card would be the better choice.

Hard Drive: - Its totally depends on you, if you plan on large amount of data, such digital images or multimedia files on your pc, Large capacity hard drive, opportunity to save more data. For normal use simply buy 40 or 80 GB that most of business users use these days.

Are you now ready and has made the decision to buy a desktop computer or notebook, visit http://computersnext.com where you can get these with the facility of comparing etc.

wrote by Zahir Shah on valuablecontent.com

WLAN Security, Customers and POS

The widespread acceptance of Wireless Local Area Networks is a money maker for the e-commerce market. Not only has the Small Office/Home Office (SOHO) been a welcomed market for the manufacturers of wireless devices ( Cisco/Linksys), the acceptance of wireless networking is saving millions of dollars to these markets. Organizations are reaping profits in the region of billions of dollars in cost and productivity savings. The customer base is generally unquestioning and accepting or at times even unaware of the presence of these technologies. One only has to venture into a Target, BestBuy, or Macys to be exposed to the transparent use of Wi-Fi.

Marketing is a remarkable skill. With the recent stampeding of a store attendant in a New York store, I'm in awe of the magnificence of marketers. Only an earthshaking advertising campaign could possibly entice a shopper to fall in line thousands deep to purchase a new toy. This, in a winter chill that is almost anti-human. Oh the brilliance of marketing. The everyday shopper follow the routine of choosing the item and forking over the plastic. Very few are aware of WLAN compliance requirements for wireless networks. Not many question the secure handling of their confidential information. Analysts from organizations like the Gartner group, Frost & Sullivan Research have posted numerous articles that are meant to educate the customer. I salute them for their in depth work. The question though remains, "How many shopper would read a technical article?" Should one expect the everyday shopper to understand PCI, Sarbenes Oxley or WLAN security best practices. I hear your answer. A resounding NO! Neither should one anticipate a memo from the large retail outlets identifying their due care or due diligence in protecting your confidential information.

Some may ask, "What does that have do with me?" The answer is everything. In our advanced shopping society, technology, though unnoticed, is at the forefront. We have become used to technology that is pushed on us without any great introduction. Most of us are leaving our data safety in the hands of organizations who at times do not take the necessary precautions to create a safe shopping environment. Questions are rarely asked. Who would have thought that a certain franchise's wireless network was so open that we were safer leaving our credit cards in the shopping cart than presenting it to the cashier. Does the customer need to know that despite all the brouhaha wireless networks are not as secure as wired networks? The government mandates legislation for organizations using wireless networks.

I beg to include here excerpts of an article I read that brings to the forefront the dismal task of providing security to the customer.

When thieves stole the PIN pads at a cash register in one of his company's stores, Daniel Marcotte was amazed. Not that they'd done it -- such thefts can happen once a week during the holiday season. But watching it on videotape later, "I couldn't tell they had it with them when they left" the store, says Marcotte, director of systems and data security at La Senza, a Montreal retailer now owned by The Limited.

A couple of hours later, the thieves were back. They'd doctored the PIN pads to let them get customer card data. They got them back onto the point-of-sale system quickly, too. But here's where La Senza's security precautions kicked in: Its PIN pads in effect have their own Media Access Control address, and once they're disconnected, that address is no longer available. So the thieves were foiled -- this time. What you are reading here is an attack on a Point of Sale system. These systems normally comprise the cash register, the bar code scanner, wi-fi access, the in-store voice or IP network and the store inventory management system. The everyday customer is vigilant of the thief who physically walks in to the outlet. Very few are aware of the tech savvy culprit. These are the invisible, bitheads who have compromised these systems for monetary gains. The targets are the uninformed, non-questioning shoppers with no knowledge of wi-fi vulnerabilities. According to one Mr. Keith Aubele, the former loss prevention executive at Wal-Mart and Home Depot, these systems are "incredibly easy to bypass."

Holiday cashiering is noticeably a seasonal job. A problem exists with this phenomena. It is called under-ringing or sweet-hearting. In this scheme the unscrupulous cashier does not scan all the items presented. This, however, affects the retail outlet. Their loss. Now we address the customer. Point-of-sale technology was not designed to capture customer data. These technologies were designed for tracking purposes, but retailers now use them to capture customer data. Alert! huge management/security issue! The customer is now left at the mercy of the mitigation steps taken by the retailer. Some organizations are managing numerous locations. Most outlets are using known vulnerable systems with a hope and pray approach. In Europe where E-commerce has caught on quicker that other world regions, they use a technology known as chip-and PIN for credit cards. The cost factor to upgrading to this technology is not feasible from the view of the outlet. These point of sale terminals are mostly not understood by the retailers who use them, most are not aware of the information collected by their systems.

Some of these outlets are presently using WEP (Wired Equivalent Privacy) as the encryption of choice. To the knowledgeable attacker this is an invitation. Now back to the customer. What guarantee do we have that our data is protected? Card companies like Visa and Mastercard are trying to pressure retailers to be compliant to PCI ( Payment Card Industry) security standards. We all know that this will be avoided if it costs too much to implement. There has been a promise from Visa to implement fines against non-compliant retailers. I read a disturbing report that the forecast of POS is dismal. The highly respected Gartner Group predicts that by 2009, most attacks against retailers would be through the POS. They further stated that merely 30% of POS software will be compliant.

I remember that old Captain and Tennille song, "you better shop around."


wrote by Keith Charles on ezinearticles.com

Beautiful screen saver and images from the desktop

You have long wanted to make their own photographic wallpaper with a favorite actor or actress or simply ponravivsheysya photograph, but do not know how? Then this article is for you. In it, I tell you about the programs and tools are needed to create high-quality screen saver, as well as open you some design secrets of the right songs.

But first, let me introduce, as unnamed teacher without «clan tribe» - this is the worst that could invent a school ;-) call me Alex generals and I am a fan of the copyright yarym photo and photo-oboynogo site Starsclub.ru: Private photo wallpapers, where more than half of photographic material are original works of your humble servant.

Let's start our first lesson on the roll of photographic art. To work you need the program (always try to find a «fresh» software) Adobe Photoshop and ACD Systems. You take photos like you, open the program Adobe Photoshop. Select your desired piece of photo and copy it into a new document. Permission to new photo-saver, I would be advised to choose at least 1076 * 768.

Now some tips to design your wallpaper. The most simple and common wallpaper and photos on your desktop - is large photos of celebrities on the left or right on a dark background. It is such a screen saver, I would advise you to do to start. Once you learn how to do simple wallpaper - go for more sophisticated photo-wallpaper on your desktop. And here are some tips to help you make a memorable and quality wallpaper: • if possible, choose uniform substrate. Do not forget that you are doing in the first place it on your desktop wallpaper, which should not «get» Your eyes; • try to bring a certain zest or nuance into each of your savers. As a rule, do not need to think specifically, all is already in the photo-prototype; • Try to choose nestatichnye photos, as photos in motion is always beautiful, and «dynamic» photo wallpaper on your desktop obtained much better; • Do not forget to specify the name of the actor referred to the saver, as well as its author's name or address of your photo site.



wrote by benedict on goarticles.com

Microsoft Windows Vista Tutorial

At few years ago using Windows' earlier version was a treat. Ask those who started computers with DOS. Now there are much more choices for users.

Choosing the software you need, is one of the important decisions. Assuming that you have decided to the shop for operating system for your computer, you will need to decide whether you want to use the Mac or a Windows operating system. Both perform similar tasks, though they are different in their appearance and functionality. Many users think Mac OS X is more stable, secure and easier to use than Windows. This debate aside, Windows is compatible to more number of gadgets people need to connect with computers, such as mobile phones, sat-nav systems and portable media players to name just a few.

Those who choose Vista will need to pick the version that suits them best. For consumers, Vista comes in three different forms: Home Basic, Home Premium and Ultimate. Upgrades from XP are possible. There is only one version of the latest Mac OS X (Leopard), which is bundled with all new Macs. You can also upgrade an older version of OS X to Leopard. If you move from Vista Home Basic through to Ultimate, you will get more features. Like Home Basic does not come with the new aero screen appearance of the Premium and Ultimate versions. Similarly, only Vista Ultimate ships with Windows Bit Locker Drive Encryption to encrypt your private data and Shadow Copy for easy back-up.

MS office is another utility without which most users cannot live. Buying Office packaged with a new computer is cheaper than buying it later off the shelf. By the way, there are many applications (like OpenOffice) that do a similar job to Office -- and some of them are online rather than installed on your machine. For email and as a replacement for Microsoft Outlook, users can have the Vista mail program included with all versions of Vista. Free alternatives include Thunderbird or web-based email such as Gmail or Hotmail.

Which operating system are you using?

wrote by M. Aslam on goarticles.com

Monday, December 1, 2008

Secrets to hacking your spouse's cheating in their Yahoo Mail account?

Nowadays, almost everyone uses the Internet on a regular basis. From such people, almost everyone have (at least) one e-mail account. And from all the people using an e-mail account regularly, trust me... almost everyone of them will eventually allow some of his/hers personal secrets to somehow get into their accounts. In other words... we all have our secrets, and in one way or the other we allow them to get nestled within our personal e-mails. Which goes to say: if you're interested in finding potential dark secrets from your wife's love life, one of the cleverest places to start looking might just be her Yahoo Mail account.

It doesn't take a stretch of the imagination to come up with a list of interesting things that you could find if from looking around your wife's mail box. You might realize she's engaging regular conversations with men you're not familiar with, you might notice something strange about her online shopping activities, you might find out she's browsing around some naughty websites, or even using some kind of online dating service or romantic chat room.

The possibilities are limitless once you think about it, and this may actually spike your curiosity. However, before going out on a limb and try to hack your wife's email, there are some questions you should ask yourself. What motivates your curiosity? Do you suspect something? What do you expect to find? And more importantly... is your relationship going through such a bad phase that you can't simply ask to look around her email? Sometimes it's best to just ask for something than going through the motions of being some kind of a haphazard cyberspace detective.

No matter how you put it, a long-term relationship is all about trust. And when you completely trust your wife, you won't feel compelled to snoop around her e-mail, right? Well, the truth of the matter is that such reasoning goes around both ways: when your wife absolutely trusts you, she will be unlikely to express resistance to give you access to her e-mail account. Personally, I think there's a good way around this kind of dilemma:

Just take the initiative and write down the password to your own e-mail account and give it to your wife, as a display of trust. In fact, invite her to snoop around your mailbox, and show her what you've been up to! Then tell her that she should feel free to return the favor, but make sure to avoid pushing her into making a decision. Just watching her reaction to such a proposition may provide you with as much information as peeking around her emails - if not more.


wrote by hacking 1234 on goarticles.com

Kaspersky 7.0.0.325 Blacklist Crack

  1. Instal KAV or KIS
  2. Instal Key
  3. Disable Self Defense Service
  4. Disable Kaspersky (KAV or KIS), right click on taskbar, exit
  5. Download Patch Kaspersky on http://rapidshare.com/files/94020599/Patch Kaspersky AV-IS 7.0 .exe
  6. Activated Patch Kasperky choose KAV or KIS
  7. Activated Kaspersky (KAV or KIS) Enable Self Defense Service
  8. Finish

Key KAV (new)

http://rapidshare.com/files/144291676/KAV_7.0.rar


Hacking WEP (Wifi) with Windows XP

Aireplay-ng Packet Injection Windows

Czech version of Packet injection Windows How to Packet injection Aireplay-ng & Windows XP. System Windows XP SP2 :: WiFi card: CM9 (WNC AR5213) + miniPCI/PCI reduction :: Aplictions: package Aircrack-ng-win 0.9 :: Driver: commView for netgear + library (older commview.dll or new ca2k.dll) :: Read Metasploit Hacking Windows. Feel free ask for or post txt mistakes. (All the software used in the tutorial it's possible to download in the download DIR. Archive password for aircrack-ng-svn+driver+dll.rar is "password").

Hardware & Software

The process of Cracking WEP key on Windows system enhanced about Aireplay-ng packet injection is executed through "hack". The process applies CommView for Wifi library. The functionallity is theoretically relevant on every chipset that the mentioned application supports.

CommView

The library (through socket) allows the Airodump and Aireplay applications to connect into the network card. All of this is possible thanks to Airserv-ng application that Aircrack-ng package newly contains. The list of supported
network cards is on producers webpages. The most well known are D-Link, Z-Com (Prism), Netgear (Atheros), ipw22xx,29xx (Centrino), Cisco..

How To

Preparation. As a first step the driver actualization is necessary. This procedure applies CommView for Wifi driver which knows packet injection and supports much more wireless cards such as AiroPeek driver. Exe instaler is not available. It is not necessary to install a conventional driver. The new card installation procedure is the same as well as the "actualization" procedure of the existing (conventional) driver. If you have installed a driver that knows packet injection you can skip this step.





In the network card configuration it is necessary to take off zero config.






Click above the network card icon (right mouse button) induces pull-down menu where in "Properties" and then in "Configuration"






..we go ahead -> onto card "Driver" where we can find the button "Driver Actualization"






This step offers online actualization which is for this purpose useless.





Next step: choose "Install from the list or..."





Next step: "Do not search. I will choose the driver myself..."





In the dialog window enter the path to the install folder CommView Wifi/Driver where..





..the file net5211.inf is located





At a standard installation the whole path is: C:\\Program Files\CommViewWiFi\Driver\net5211.inf





The automatic vendor detection is implemented and the detected card is offered for the installation. The .inf file contains the entire list of cards.





Installation of uncertified driver click yes.





The installation is completed. Thats all.




Packet Injection & Aireplay-ng

So far it is not possible to generate the trafic packet injection on
the Windows platform. Packet injection as we know it from the Linux distribution in the application Aireplay-ng is the only possibility how effectively speed up "capture" of needed amount of ivs for the crack WEP key. This
text will describe a small obstruction and a 100% functional way how to use Aireplay-ng and packet injection in Windows.

Hack the box.
Direct and oficialy presented method so far does not exist. This all is solved by a small hack that consists of two parts.

Library commview.dll (ca2k.dll)
Through the installation of CommView Wifi application we get the library. In the installation file is the library that will serve as a connection between the application and network card. In the Aircrack-ng 0.9 package is a small gimmick that we are going to use. It allows a multiple use of the network
card in the real time. What does the "Start up" in the Start up menu mean?

Airserv-ng.
For this purpose the application Airserv-ng was. It is a server as it is obvious from the name. It allows the use of one card for more applications. The further procedure is working only on the console. In the menu Start/Start up with the command cmd we induce the console window. With the command cd we move into the file

cd c:\aircrack-ng-0.9

Start up Airserv-ng on the channel no. 6

airserv-ng -d commview.dll -p 12345 -c 6

or see the proggres and start up Airserv-ng on the channel no.6 in the debug mode

airserv-ng -d "commview.dll|debug" -p 12345 -c 6

Airserv-ng console in the debug mode shows mess..





We confirm the inquiry: "Does this look like yourd card!? In the new (second) console we start up on the channel no.4 Airodump-ng


airodump-ng --ivs --ch 6 -w dumpfile 127.0.0.1:12345


Aireplay-ng
Aireplay-ng is an application that allows client disconnection from AP, false autentization, interactive packet playback, repeated sending of ARP. It implements KoreK chopchop, fragmentation and newly also injection testing. It is operated through these switches:


- 0: Deauthentication
- 1: Fake authentication
- 2: Interactive packet replay
- 3: ARP request replay attack
- 4: KoreK chopchop attack
- 5: Fragmentation attack
- 9: Injection test

In the new console we will use - 2 (interactive packet replay)

aireplay-ng -2 -b 00:xx:xx:xx:xx:xx -d 00:xx:xx:xx:xx:xx 127.0.0.1:12345




Aircrack-ng:
In the last console we start up Aircrack-ng. In the case that there is in the file more records we should choose the right MAC. Each record has its sequence, number and the number of captured ivs.

aircrack-ng *.ivs





The key was recovered.





"Weplab" - All the windows.


for more information you can see in here


Speed up slow PC - Squeeze every last drop of performance out of your XP

With faster machines cropping up almost daily, the life span of a midrange PC is a little more than two years of service. Physically, the computer you bought a few years ago is just as sound as any new piece of hardware. Ideally, it could probably last you a decade or two--as long as you didn't add any new software or surf the Net. Realistically, that's not likely to be the case. Instead of buying a new computer, optimize your present one. The following are 11 things that Chip Manufacturers and PC Retailers don't want you to know or how to perform. Following these advices will drastically increase your PC performance and help you regain your sanity while saving loads of money. And, if your PC is years old and can't afford to upgrade yet, you will be able to squeeze out some more juice out of the old thing!

1. Disable file indexing. This is a tiny service that uses a great deal of RAM and induces much disk thrashing. Your system instantly becomes more responsive. Here's how: First, doubleclick the My Computer icon. Then, right-click on the C: Drive, then hit Properties. Uncheck "Allow Indexing Service to index this disk for fast file searching." Next, apply changes to "C: subfolders and files," and click OK.

2. Zap the Windows Prefetch folder every week. Windows XP can "prefetch" portions of data and applications that are frequently loaded. This allows processes appear to start faster when requested the user. Over time, the prefetch folder overwhelms with references to files and applications no longer in use. Guess what happens? Windows XP wastes time and grinds to a halt by pre-loading obsolete data. It helps you gain some performance on your XP Professional to periodically empty the prefetch folder.

The prefetch folder resides on your local hard disk, under the Windows folder.
%systemroot%\prefetch
-or-
X:\windows\prefetch

Where X is the drive letter where you have Windows installed. Either path will get you to your local system. The second path is for those who have the default installation on the most commonly used drive letter, C:\

3. Optimise Display Settings. Windows XP can look sexy but displaying all the visual items can waste system resources. Kill unnecessary animations, and nix active desktop. Here's how to do it:
1) Go to Start
2) Click Settings
3) Click Control Panel
4) Click System
5) Click Advanced tab
6) In the Performance tab click Settings
7) Leave only the following ticked:
(1) Show shadows under menus
(2) Show shadows under mouse pointer
(3) Show translucent selection rectangle
(4) Use drop shadows for icons labels on the desktop
(5) Use visual styles on windows and buttons
Feel free to play around with the options offered here, as nothing you can change will alter the stability of the computer - only its responsiveness.

4. Remove the Desktop Picture Your desktop background consumes a fair amount of memory and can slow the loading time of your system. Removing it will improve performance.
1) Right click on Desktop and select Properties
2) Select the Desktop tab
3) In the Background window select None
4) Click Ok

5. Remove Fonts for Speed Zap extra fonts fonts installed on their computer. Fonts, especially TrueType fonts, use quite a bit of system resources. The more fonts they have, the more lethargic the system will become. Anything over 300 fonts tax the system and slow down load times- especially graphic apps. For optimal performance, trim your fonts down to just those that you need to use on a daily basis and fonts that applications may require.
1) Open Control Panel
2) Open Fonts folder
3) Move fonts you don't need to a temporary directory (e.g. C:\FONTBKUP?) just in case you need or want to bring a few of them back. The more fonts you uninstall, the more system resources you will gain.

6. Speedup Folder Browsing You may have noticed that everytime you open my computer to browse folders that there is a slight delay. This is because Windows XP automatically searches for network files and printers everytime you open Windows Explorer. To fix this and to increase browsing significantly:
1) Open My Computer
2) Click on Tools menu
3) Click on Folder Options
4) Click on the View tab.
5) Uncheck the Automatically search for network folders and printers check box
6) Click Apply
7) Click Ok
8) Reboot your computer
To prevent a single Windows Explorer window tanking up takes the rest of your OS down, you can launch separate folder windows in multi processes. Open My Computer, hit on Tools, then Folder Options. Click on the View tab. Scroll down to "Launch folder windows in a separate process," and enable this option.

7. Disable Performance Counters Windows XP has a performance monitor utility which monitors several areas of your PC's performance. These utilities take up system resources so disabling is a good idea. To disable:
1) download and install the Extensible Performance Counter List
2) Then select each counter in turn in the 'Extensible performance counters' window and clear the 'performance counters enabled' checkbox at the bottom button below

8. Optimise Your Pagefile Windows XP sizes the page file to about 1.5X the amount of actual physical memory by default. While this is good for systems with smaller amounts of memory (under 512MB) it is unlikely that a typical XP desktop system will ever need 1.5 X 512MB or more of virtual memory. If you have less than 512MB of memory, leave the page file at its default size. If you have 512MB or more, change the ratio to 1:1 page file size to physical memory size.
1) Right click on My Computer and select Properties
2) Select the Advanced tab
3) Under Performance choose the Settings button
4) Select the Advanced tab again and under Virtual Memory select Change
5) Highlight the drive containing your page file and make the initial Size of the file the same as the Maximum Size of the file.

9. Improve Memory Usage PC Washer improves the performance of your computer by optimizing the disk cache, memory and a number of other settings.

Once Installed:
1) Click the 'Tools' from the left menu
2) Select 'Memory Booster' in the tools list. A new window named 'PC Turbo Memory' will popup.
3) Click Defragment button in the new window.
4) Exit the program. That's all.

10. Disable unnecessary services Windows XP loads services you will never need. To determine which services you can disable for your client, visit the Black Viper site for ideal Windows XP configurations. Here are a few services I booted off to streamline my PC:
* Alerter
* Background Intelligent Transfer Service
* ClipBook
* Computer Browser
* Error Reporting Service
* Help and Support
* Indexing Service
* IPSEC Services
* Messenger
* NetMeeting Remote Desktop Sharing
* Network DDE
* Network DDE DSDM
* Performance Logs and Alerts
* Portable Media Serial Number
* QOS RSVP
* Help Session Manager
* Remote Registry
* Secondary Logon
* Server
* Smart Card
* Smart Card Helper
* SSDP Discovery Service
* System restore Service
* TCP/IP NetBIOS Helper
* Uninterruptible Power Supply
* Universal Plug and Play Device Host
* WebClient
* Windows time
* Wireless Zero Configuration
* WMI Performance Adapter

11. Disconnect USB devices you aren't using. When Windows starts, it must load all the drivers for the devices connected to your computer. If you have many devices connected to the USB ports, such as printers, scanners, cameras and hard drives that you don't use on a regular basis, disconnect them. You can reconnect them when you use them. Disconnecting them when they are not in use will allow Windows to load the drivers only when needed.

The above steps should help increase the performance of Windows XP as well as keep it running with more stability

wrote by Duncan Kredion on here

How To Repair Windows Stop Errors

What is it?

Windows stop errors are a common registry error that occurs only on NT-based operating systems (that is Windows NT, 2000, XP and Vista.

The stop error will be displayed in a hexadecimal format (eg STOP 0x0000000A) or in a shorthand (eg Stop 0xA).

These errors are generated by your computer when it come across a certain error that forces it to stop in order to avoid damaging the OS (hence the "stop").

So What?

The first thing I advise you do if you get stop errors is check if anything was changed recently on your computer: did you add new memory modules? Did you install a new printer etc.



Almost all windows stop errors are caused by hardware-related conflicts.

  1. Update your device drivers. Stop errors can also appear if you are using outdate drivers. If however you have been getting this type of errors after downloading new drivers, I suggest you remove them and roll back to your older version.

    Alternatively, you can download a different version, preferably directly from the device vendor. Most in fact would let you download new drivers versions free.

  2. Open your computer box and check if all components are in place. In fact this is where you should start once you get windows stop errors.
  3. Run an antivirus scan. Viruses are also known to change and corrupt registry configurations.

  4. Open the computer Event viewer and check the "System" and "Application" logs.

    It is possible that similar errors have happened in the past. This can possibly give you clues on the cause of the error you now experience.

    To access the Event viewer, type "EventVwr.msc" in the Run box (on your start menu). The event viewer can also be accessed by going to: Control Panel - Administrative tools - Event viewer.

  5. Remove any recent software that you have installed.
  6. Get an updated version of your system BIOS.


wrote by Ali Gator on goarticles.com