Friday, November 30, 2007

Hiding Your Navigation Bar

Really annoyed by the navigation bar on top of your blog? Want to get rid of it? Read on... After sometime surfing in the internet, I finally managed to find this good article of how to show or hide your navigation bar. Thanks to Derya my blog now looks great. You can see how to do it here. For your note, I didn't use the second part of the code because I want to get rid of the bar permanently.

Friday, November 23, 2007

Reinstalling Windows (Genuine)

Tired, that's what I'm feeling these last few days. People who use our computer at the internet cafe sometime are irresponsible. They don't care about the lifetime of the computer they use. They came to the cafe, rented a computer. Once they logged on, they installed many softwares such as Internet Download Manager (you know what this program is used to), MegaUpload toolbar (for downloading from MegaUpload), YouTube Grabber (to download files from YouTube). While these programs are useful for the customer, we (the administrator) have a lot of troubles to keep the internet connection stable once they installed the software. Using a bandwith manager also doesn't guarantee a stable connection. Anyone who installed and used this software could get all the bandwith while others will be left with a very slow internet connection.

To correct this problem, we usually uninstall these programs right after the customer left. Here is the tricky part, because we installed DeepFreeze and Billing Explorer we got another problem. Through Billing Explorer we can hide the Control Panel and DeepFreeze ensure that the Windows setting would never be changed. The two programs accidentally canceling each other leaving us with no choice than reinstalling the windows.

Another problem arise. We are using genuine Windows XP Home Edition at the internet cafe. As you know if you have a genuine copy of Windows you have to activate it 30 days after you install it. Now, it has been more than 30 days so I have activated all Windows. If you reinstall it you can't activate it anymore. You have to manually activate it by calling the Microsoft and ask for another activation key. Really why should we go with all these troubles because we are using a genuine product?

Fortunately, after searching on Google, I have came up with these two links, here and here. Both of these two links tell you the same thing, how to preserve your windows activation files before reinstalling. Note these tips would only be successful if you are reinstalling the Windows on the same machine with the same configuration as the time you first activate it. So if you're thinking on buying a genuine copy, install it, activate it and then install it on another computer you can forget that. If you have any major hardware changes such as adding another Graphic Card, you should take it off first, reinstall, reactivate the WPA and then put the Graphic Card back in.

Basically what you need to do is copy the WPA.dbl and WPA.bak files from Windows system folder (usually for Windows XP is C:\Windows\System32). Put it in a safe directory for use later. Reinstall your computer. After finished reinstalling, if you are asked to activate, just say no. Boot from safe mode (press F8 while booting). Go to system folder. You should see that there is a new WPA.dbl file there. Rename this file to whatever name you like, e.g: WPANew.dbl. Then copy your original WPA files and put it in the same folder. Restart your computer. You might be asked again to activate your Windows. Now click Yes, then choose only activate but don't register. After waiting for a few seconds your copy of Windows is activated and you should be able to use your Windows.

Monday, November 12, 2007

Label Clouds

Want to have a different look for your labels? When I was surfing the internet, I saw a lot of blogs who have a different look for their labels. The labels were randomly made bigger or smaller. So I started wandering if there is a code for this. After sometime I found the answer here. I have tried the code written there, and it worked fine. Hence, I have added a special thanks for Phydeaux3 who made this code at the bottom page of my blog. This is a really nice hacks!

Tuesday, November 06, 2007

How To Download Youtube

Have you ever heard about Youtube? If you haven't got any clues about Youtube, then probably you are in a town where you don't have internet access. Quoting from Wikipedia: "Youtube is a video sharing website where users can upload, view and share video clips". As stated before, you can watch almost anything in Youtube from movie, tv clips, music videos and even a video of your own production.
Youtube was founded by three former employees of Paypal, namely Chad Hurley, Steve Chen, and Jawed Karim. See below Youtube's earlier office in San Mateo.


It currently has 67 staffs and it is now acquired by Google Inc, in a deal worth US$1,65 billion. The deal was closed on 13 November 2006. TIME magazine awarded Youtube as "Invention of the Year" for 2006. Here is the look of the new office for Youtube in San Bruno.


Enough about history lesson, now to the important part. As you probably know that you can watch any videos in Youtube's website but the site itself doesn't provide you the tool or link to download the video you want. I don't know if this legal or not but you can download the video if you want. After doing some Googling (using the keyword "downloading youtube video", here are some sites that will provide you the download link of Youtube's video that you want.
Using those sites to download the file is easy, but it requires you to open the site first, enter the Youtube's video path until it finally gives you the actual download link. For me it is easier to use Mozilla add-ons that you can find here. Just download the add-ons, install and restart Firefox. After restarting Firefox, right-click on the toolbar (area to the left of your navigation bar), choose Customize. It will then open a window where you can choose a lot of items. Locate the VideoDownloader, and click to drag and drop it after the Home button. There you go, you can now download the video from Youtube just by clicking the VideoDownloader button. Easy right?

Tuesday, October 30, 2007

Changing Recent Comments

First, I would like to thanks Hans for this beautiful blogger hacks. This posting will not tell you how to add the recent comments to your blog, you can find it here and the Indonesian version here. Those two versions are working great, but if you want to have a different look for your recent comments please read on. If you follow the first link, you will find something like this:


Remember to choose Custom CSS. Click Customize and then Add Widget To My Blog. You can then follow the rest of the instructions to add the widget. But, before you view your blog you have to edit your template and declare three classes called ".bbrecpost", ".bbrecpostsum" and ".bbwidgetfooter". You can put those three classes anywhere in the skin declaration of your blog. Or just find this code: "]]>" and put the classes above that. Your recent comments will surely work.
Now, if you would like to take it a little bit further you can customize the look of your recent comments. The script that is responsible for this recent comments looks like this:

You can find the actual script here. The script called a function named "showrecentcomments" and uses json feeds as the input. If you have a little knowledge of C++ or Java, this wouldn't be a problem because the code is really similar. What this function do actually is looping through all the comments and then write it one by one in your blog. In the actual script, each comment will be divided into there groups (bbrecpost for the header, bbrecpostsum for summary of the comment and bbwidgetfoot), hence you must provide those three classes mentioned above to give it a different style than the common recent comments. In my script I didn'use the ".bbwidgetfooter" and introduce a new class called ".bbrecdate". You can see the implementation right here in this blog. These are my classes:

.bbrecheader {
font-size: 80%;
font-family: verdana, Trebuchet;
padding-left: 2px;
line-height: 1em;
}

.bbrecheader a:hover {
font-size: 100%;
text-decoration: none;
}

.bbrecdate {
text-align: right;
border-bottom: 1px dashed $bordercolor;
border-left: 1px dashed $bordercolor;
border-right: 1px dashed $bordercolor;
line-height: 1.2em;
font-size: 80%;
width: 70px;
float: right;
}

.bbrecpostsum {
background: #F5F5F5;
font-size: 80%;
font-family: verdana, Trebuchet;
padding-left: 2px;
line-height: 1em;
border-top: 1px solid $bordercolor;
border-bottom: 1px solid $bordercolor;
}

.bbrecpostsum a:hover {
font-size: 100%;
text-decoration: none;
}

Everything is quite clear I guess, but you must have a variable called "bordercolor" declared in your variable declaration. You can also download my script here. Use it at your own risk or better download it and put it somewhere where you usually put your online files. A little note: the script is originally Hans's, you can use the script or modify it but please remember to put credit for the original author in your blog. If you have any question, just leave it in your comments. I would love to help you and get back to you soon.

Sunday, October 28, 2007

Blogging

Having an internet cafe is opening up many doors for me. For an example, I can now start (again) my hobby of blogging. This hobby was stopped before because I was having trouble finding internet connection (which was free) after I resigned from my job as a programmer in a timeshare company. But now as I have internet connection 24 hours a day and 7 days a week, there are plenty of time for me to create new posts.

I started blogging when the blogging feature was introduced by Friendster. At that time, I have heard a little about blogging but didn't really know what it was. So to satisfy my curiosity I started blogging with Friendster. But after a while I found it that there was many limitations with Friendster's blogging feature, such as the need to change the look of your blog. At that time (I don't know if Friendster already improved their blogging feature now) Friendster didn't provide online tools to modify your background color, font color, or changing your header background with image that kind of stuffs. Then I found out about Blogger. It was like founding heaven for me, because you can use the predefined themes and then edit its html coding. Changing the color of your background and font was really simple as there is an online tools that you can use and even preview the changes before saving them. The introduction of sidebar also amazed me. Inserting new widgets to the sidebar is really simple, all you need to is a simple click. I have been using Blogger as my blogging place until now. I've heard about many other site which provides blogging such as Wordpress. It also has many big fans. I will try to use it later, but for now I am satisfied with Blogger.

Thursday, October 18, 2007

Profile Suns Warrior III

This is the youngest of all Suns Warrior: Gustu or known as Bonbon by his friends. A bit eccentric, the guy who claims to be a vocalist of an unknown band, is the latest administrator to join with Suns.NET. At first, it seems that he is irresponsible but after a long hard fought you can be sure that he is a true administrator now. Here is the complete profile of Bonbon.

Name : Ida Bagus Putu Ekawadi
Nickname : Gustu or Bonbon
Birthday : 1986
Occupation : University Student
University : Udayana University
Status : Still Looking for a Partner (anybody interested?)
Friendster : Bony Eka


Sunday, October 07, 2007

How To Increase Your Page Rank?

Many bloggers would have asked the same question as myself, how do you increase your Google PageRank? Well, let's not get too hasty right now. I mean do you already know what a PageRank is? Maybe you have some clue about this thing, but I'll try to expain here for you.

PageRank is a system for ranking web pages developed by Google's founders Larry Page and Sergey Brin at Stanford University. So Google uses PageRank to determine which site will they viewed on the first page of a search conducted by a person. What really tricky is how does Google give a PageRank for a site. To determine its PageRank, Google analyze the link structure of the site. In essence, Google interprets a link from page A to page B as a vote, by page A, for page B. But, Google looks at considerably more than the sheer volume of votes, or links a page receives; for example, it also analyzes the page that casts the vote. Votes cast by pages that are themselves "important" weigh more heavily and help to make other pages "important." Using these and other factors, Google provides its views on pages' relative importance. Get the meaning? So to improve your PageRank you have to get other sites link to your site. It would be really excellence if you have links from sites who have higher PageRank than yours. By using this methodology some sites on the internet act as a provider to exchange link within their members. LinkALizer is an example of such sites. You have to register as a member to use their service. To register you only need to fill in the url of your site and your email address. They will then send an invitation to exchange links with other sites. You can accept or reject the invitation. Should you accept, you must put the other site's link in your site. That way, the other site's PageRank will go higher and so as yours.

Well, that is really the simplest way to make your PageRank higher. Optimizing the keywords of your site is also another way. But it requires a skill in SEO. Maybe we'll talk about SEO some other time when I'm finally understand what it is about.

Tuesday, September 18, 2007

Suns General I

The general, of course it is a higher rank than the warrior if you are in the army. But in this context it is not so different as this specific general has the same abilities as the other warriors. The only different is this general is the brother of the Suns's owner, hehehehe. The general name is General Bino. He has a good sense of humor, Here is his complete profile.

Name : AA Ngurah Dharma Putra
Nickname : Bino
Occupation : Highschool student
School : SMU Negeri 2 Denpasar
Status : In a relationship
Friendster : Bino

Tuesday, September 11, 2007

10 Simple Ways To Speed Up Your Windows XP

1. Defrag Disk to Speed Up Access to Data

One of the factors that slow the performance of the computer is disk fragmentation. When files are fragmented, the computer must search the hard disk when the file is opened to piece it back together. To speed up the response time, you should monthly run Disk Defragmenter, a Windows utility that defrags and consolidates fragmented files for quicker computer response.

* Follow Start > All Programs > Accessories > System Tools > Disk Defragmenter
* Click the drives you want to defrag and click Analyze
* Click Defragment

2. Detect and Repair Disk Errors

Over time, your hard disk develops bad sectors. Bad sectors slow down hard disk performance and sometimes make data writing difficult or even impossible. To detect and repair disk errors, Windows has a built-in tool called the Error Checking utility. It’ll search the hard disk for bad sectors and system errors and repair them for faster performance.

* Follow Start > My Computer
* In My Computer right-click the hard disk you want to scan and click Properties
* Click the Tools tab
* Click Check Now
* Select the Scan for and attempt recovery of bad sectors check box
* Click Start

3. Disable Indexing Services

Indexing Services is a little application that uses a lot of CPU. By indexing and updating lists of all the files on the computer, it helps you to do a search for something faster as it scans the index list. But if you know where your files are, you can disable this system service. It won’t do any harm to you machine, whether you search often or not very often.

* Go to Start
* Click Settings
* Click Control Panel
* Double-click Add/Remove Programs
* Click the Add/Remove Window Components
* Uncheck the Indexing services
* Click Next
4. Optimize Display Settings

Windows XP is a looker. But it costs you system resources that are used to display all the visual items and effects. Windows looks fine if you disable most of the settings and leave the following:

* Show shadows under menus
* Show shadows under mouse pointer
* Show translucent selection rectangle
* Use drop shadows for icons labels on the desktop
* Use visual styles on windows and buttons

5. Speedup Folder Browsing

You may have noticed that everytime you open My Computer to browse folders that there is a little delay. This is because Windows XP automatically searches for network files and printers everytime you open Windows Explorer. To fix this and to increase browsing speed, you can disable the “Automatically search for network folders and printers” option.

6. Disable Performance Counters

Windows XP has a performance monitor utility which monitors several areas of your PC’s performance. These utilities take up system resources so disabling is a good idea.

* Download and install the Extensible Performance Counter List (http://www.microsoft.com/windows2000/techinfo/reskit/tools/existing/exctrlst-o.asp)
* Then select each counter in turn in the ‘Extensible performance counters’ window and clear the ‘performance counters enabled’ checkbox at the bottom button below

7. Optimize Your Pagefile

You can optimize your pagefile. Setting a fixed size to your pagefile saves the operating system from the need to resize the pagefile.

* Right click on My Computer and select Properties
* Select the Advanced tab
* Under Performance choose the Settings button
* Select the Advanced tab again and under Virtual Memory select Change
* Highlight the drive containing your page file and make the initial Size of the file the same as the Maximum Size of the file.

Windows XP sizes the page file to about 1.5X the amount of actual physical memory by default. While this is good for systems with smaller amounts of memory (under 512MB) it is unlikely that a typical XP desktop system will ever need 1.5 X 512MB or more of virtual memory. If you have less than 512MB of memory, leave the page file at its default size. If you have 512MB or more, change the ratio to 1:1 page file size to physical memory size.

8. Remove Fonts for Speed

Fonts, especially TrueType fonts, use quite a bit of system resources. For optimal performance, trim your fonts down to just those that you need to use on a daily basis and fonts that applications may require.

* Open Control Panel
* Open Fonts folder
* Move fonts you don’t need to a temporary directory (e.g. C:\FONTBKUP?) just in case you need or want to bring a few of them back. The more fonts you uninstall, the more system resources you will gain.

9. Use a Flash Memory to Boost Performance

To improve performance, you need to install additional RAM memory. It’ll let you boot your OS much quicker and run many applications and access data quicker. There is no easiest and more technically elegant way to do it than use eBoostr (http://www.eboostr.com).

eBoostr is a little program that lets you improve a performance of any computer, powered by Windows XP in much the same way as Vista’s ReadyBoost. With eBoostr, if you have a flash drive, such as a USB flash thumb drive or an SD card, you can use it to make your computer run better. Simply plug in a flash drive through a USB socket and Windows XP will use eBoostr to utilize the flash memory to improve performance.

The product shows the best results for frequently used applications and data, which becomes a great feature for people who are using office programs, graphics applications or developer tools. It’ll surely attract a special attention of laptop owners as laptop upgrade is usually more complicated and laptop hard drives are by definition slower than those of desktops.

10. Perform a Boot Defragment

There's a simple way to speed up XP startup: make your system do a boot defragment, which will put all the boot files next to one another on your hard disk. When boot files are in close proximity to one another, your system will start faster.

On most systems, boot defragment should be enabled by default, but it might not be on yours, or it might have been changed inadvertently. To make sure that boot defragment is enabled:

* Run the Registry Editor
* Go to HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Dfrg\BootOptimizeFunction
* Set the Enable string value to Y if it is not already set to Y.
* Exit the Registry
* Reboot

Hope you find these 10 tips useful. Have a nice day!

Friday, September 07, 2007

Get Yourself Started In Blogging - The Right Way

As of September 2007, more than 106 million blogs have been tracked which makes one wonder just what blogging is.Blogging is that wonderful world where you can write your personal thoughts about what you think on any subject imaginable, whether good or bad, with or without anonymity, although in reality anonymity really doesn’t exist when it come to the Internet. Your website, your email has an ISP address which is easily traceable to any given computer.

In general, blogs are articles you write and post on the web for the entire world to see. Your blog puts you, your thoughts in the forefront, which lets others see your brilliance or idiocy. You can have your own website dedicated to your thoughts, or you can respond to a particular article that has been written which allows you to voice your opinion about the subject or article, although use tact when responding. Most news media allowing you respond to a written article requires you to provide a valid email address in order for you to make a comment.

Most subscribers to the Internet post there blogs on personal web pages or websites their ISP provides. Other bloggers post their comments on the multitude of websites available for posting their thoughts, usually indexed by subject. To find a blog site, simply type “blog/s” in any search engine and behold you will find thousands of blog sites you can read or post.

Methods for blogging vary which you should consider before doing any posting. Blogging in response to a particular article, as well as posting on dedicated blog sites are permanent blogs, in that they can not be changed once posted. With that in mind, you really need to think about what you want to say before posting your thoughts. It’s somewhat like making a comment, once spoken it can’t be undone.

The other side of posting on an open blog site is the libel issue. At present, blog sites are not libel for what you say, so use caution when blogging.

The other method of blogging is to have your own website or page where you write your own blog. Using this method, you can edit your blog, write about another subject or simply delete the blog entirely. This method in my opinion is perhaps the safest method of blogging, but there is a caveat to this method. When you write something on your computer using a word processor and save the document, even if you delete the article, or document, it still resides on your computer and unless you completely reformat or destroy the hard drive, it remains on you computer forever. If someone wants to prove you wrote the article, with the proper software they can retrieve it.

You may wonder if blogging is without peril. That depends. If you are blogging about your Aunt Tilly’s super fruit cake recipe, you’re safe, but if you’re blogging about a politician, an organization, the government, religious leaders, a company, an individual, you need to be careful about what you have to say, as you just might be libel. Presently, in the US, the courts are undecided about blogging, weighing in on the free speech side of the argument, however; individuals have been imprisoned and/or fined for their blogs.

To be safe when blogging, it’s important to use the correct adjectives, or follow the method the news media use when writing an article. Words like; alleged, subject to, suspected of, and the like may keep you out of trouble. Although, innuendos you make can been seen as an attack, an accusation, by some very sensitive people and they just might decide to take action against you.

Even when using safe words, that doesn’t mean you’re not going to suffer the consequences for your big mouth. Many states have what is known as; “The Right To Work Law,” which simply means employers can fire an employee for any reason, or for no reason. Individuals have been fired from their jobs for posting blogs about their company.

Many blogs are instructional in nature from how to grow a tree, wash a cat to building an explosive device. Here again you need to be careful. Those blogs about explosive devices just might cause a visit from a federal agency. Unfortunate as it is, when it comes to blogging, “Big Brother Is Watching!”

Monday, September 03, 2007

K4L0N6

Probably you will be wondering what is the meaning of the title above. K4l0n6 is local virus developed by an Indonesian (in his blog he also put the antivirus) which will disabled:
1. Task Manager - you won't be able to invoke the task manager using Ctrl-Alt-Del. It will say that the task manager has been disabled by your administrator. Although you've logged in as a user who has the administrator rights it will also display that message.
2. Regedit - if you run regedit.exe/regedit32.exe, it will be debugged with notepad.
3. It will disabled the cmd.exe, msconfig.exe, folder options and many more.

Symptoms:
1. If you do a double click on C drive or any drive, it won't show the contains of the folder (unfortunately you have just activated the virus).
2. You can't run regedit, cmd, msconfig, instead it will show notepad.
3. You can't see the folder options.

How to remove:
1. Kill the process of WScript.exe (you won't be able to use the task manager, so you need another program to do it. ProcessXP is one of the softwares you can use. Download it here.)

2. Run Autoruns (if you don't have it already, download it here). Go to Image Hijacks sections. Delete all entries there except the last (it is related to file ntsd.exe, don't delete it as it is needed by windows).

3. Copy this code below and save it as "antivirus.vbs":
[Version]
Signature=”$Chicago$”
Provider=Fariskhi

[DefaultInstall]
AddReg=UnhookRegKey
DelReg=del

[UnhookRegKey]
HKCU,Software\Microsoft\Internet Explorer\Main, Window Title,0, “INTERNET EXPLORER”

[del]
HKCU, Software\Microsoft\Windows\CurrentVersion\Policies\Explorer, NoFind
HKCU, Software\Microsoft\Windows\CurrentVersion\Policies\Explorer, NoFolderOptions
HKCU, Software\Microsoft\Windows\CurrentVersion\Policies\Explorer, NoRun
HKCU, Software\Microsoft\Windows\CurrentVersion\Policies\System, DisableRegistryTools
HKCU, Software\Microsoft\Windows\CurrentVersion\Policies\System, DisableTaskMgr
HKCU, Software\Microsoft\Windows\CurrentVersion\Policies\Explorer, NoViewContextMenu
HKLM, Software\Microsoft\Windows\CurrentVersion\Winlogon, LegalNoticeCaption
HKLM, Software\Microsoft\Windows\CurrentVersion\Winlogon, LegalNoticeText
HKLM, Software\Microsoft\Windows\CurrentVersion\Run, Systemdir
HKLM, SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cmd.exe, Debugger
HKLM, SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\install.exe, Debugger
HKLM, SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msconfig.exe, Debugger
HKLM, SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regedit.exe, Debugger
HKLM, SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regedt32.exe, Debugger
HKLM, SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RegistryEditor.exe, Debugger
HKLM, SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\setup.exe, Debugger
HKLM, SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\PCMAV.exe, Debugger
HKLM, SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\PCMAV-CLN.exe, Debugger
HKLM, SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\PCMAV-RTP.exe, Debugger

4. Search and delete these two files: autorun.inf and k4l0n6-x.dll.vbs.

After you have done all the steps above, you should be able to see the folder options again and run cmd or msconfig. Note: if you have opened an explorer before doing the cleanup just close and reopen. All options are now back where it belongs.

For the full information about this virus please refer to the author's blog. It is really amazing what he can do, but although he has put a disclaimer to his post, I am still convince that this is wrong. Sharing knowledge is one thing but if the use of knowledge for wrong purposes that is really destructive. My advise to the author is please be careful with what you are posting because your blog can be read by many people of which we can't control all of them.

Friday, August 31, 2007

Broadband: Understanding the Jargon and How to Get the Best Plan

If you find yourself reading this article online, then odds are you are no stranger to the vast wilderness that is the internet. Uploads, downloads, blogs, videos, podcasts, pictures, forums, games, news, email, animation, flash, webmail, webcams and music can all make for a vast and limitless real-time environment that is constantly changing. It is often the seemingly inexhaustible amount of resources that has many net users tearing out their hair due to strolling performance and extended loading time for content. However, in many cases, the real culprit is not the content or the website itself, but rather the combination of an ill-equipped connection speed and an internet plan that does not adequately address specific user needs.

Before roaming free in the World Wide Web, every internet user must first choose a connection plan and connection speed that will be able to accommodate both their budget and their user needs. The following article seeks to outline some of the basic areas that novice users should address when deciding to connect to the internet. For some, it may seem like commonsense, but for those suffering easily avoidable headaches and long load times it may just make a world of difference.

Connection Speeds

Before beginning it would first be wise to explain the two types of connection speeds and how they fundamentally differ. All methods of internet usage around the globe only use either one or the other of these types of connections.

Kbps: Is the common acronym for ‘Kilobits per second’. A Kilobit is one thousand bits of data – a ‘bit’ being the most fundamental form of binary code that makes up all information available both online and on your home PC. Essentially, a ‘bit’ is the building block of all computer technology and communication. In layman’s terms it is simply the combination of 1s and 0s that form the language of computers.

Mbps: A much larger unit of data, Mbps refers to the term ‘Megabits per second’. A Megabit is one million ‘bits’. This form of data transference is used by every internet connection above Dial-Up speed.

Types of Connection

Dial-Up: The most basic connection available, a Dial-Up connection uses the existing phone line in a business or household to transfer data at around 56Kbps. This is the slowest connection currently available in Australia and is in the process of steadily being outdated due to faster connections being more widely and readily accessible for a lower cost.

ISDN: Is anIntegrated Services Digital Network and is twice the speed (at 128Kbps) of Dial-up. It can be difficult to obtain due to its reliance on what is fast becoming outdated technology. ISDN was essentially the technological stepping stone between Dial-Up and ADSL.

ADSL: Stands forAsymmetric Digital Subscriber Line, also most commonly referred to when the term ‘broadband’ is used, and is a one-way connection where the download speed is much faster than the upload speed. This is a common trap for the average consumer because the speed of the connection is always referenced in terms of the maximum download speed (i.e how fast a page loads up / time it takes to save a file), rather than the much slower upload speed (i.e how long it takes to send an email / send a file to another computer)

Cable: The fastest connection available for both business and residential use (Fibre Optic connections, which are the next level up, are currently exclusive to business due to the high cost of installing and maintaining). Cable internet uses a similar system of connections to most pay television providers. It is completely separate to the household phone line and connection speed is substantially faster for both uploads and downloads. However, speed can be compromised by the number of separate households located in close proximity that use the same cable as only one cable is generally provided for a whole neighborhood. Generally cable runs at around 1.5 – 6 Megabits of bandwidth which is substantially faster than ADSL.

Connection Plans and Common Traps

To maintain a steady and consistently fast connection you need to take care in the selection of your plan. Having selected the telecommunications company with which you wish to subscribe for the service you then need to select a plan based on the cost of installing and maintaining your connection, the type of connection you wish to have installed, the speed of the connection, the download limit, if any, and the consequences if that download limit is exceeded.

The download limit or ‘shaping’ of your plan dictates how much information you can access from the internet within a month before being subjected to either additional costs (which can be significant) or slower connections (usually Dial-up).

According to Miles Humphrys, IT Manager for Corporate Executive Offices, one of the largest international chains of serviced offices throughout the Asia Pacific Region, a common pitfall when deciding on your internet plan is, “not knowing what it is that you, or your business, wish to use the connection for”. According to Mr Humphrys, “Before connecting the business or user must first decide what their primary methods of usage will be. Will they be sending a substantial amount of emails? Downloading live videos or music? Or simply surfing for information? All these factors must be weighed up before signing up to a limited connection or one with a capped amount of usage. Nothing is more frustrating for a business, or home office, than being crippled by an incredibly slow connection because they have gone over their download limit during the day-to-day requirements of the business or user.”

If you are unsure of the amount of data which you are likely to download in a month make sure you select a plan that gives you sufficient download capacity to enable you to then monitor your usage without fear of exceeding your limit. Make sure that your plan is flexible enough to then change if your download requirements are either substantially less or more than you expected.

“The one piece of advice that I would give for anyone looking to connect to the internet either now or in the future, above all, is to - read the fine print! The things to look out for are capped plans, download limits, shaping and especially ‘extra charges’. If you see anything that looks a little odd, always ask questions or consult an IT Professional”, concluded Mr Humphrys.

Monday, August 27, 2007

How To Wipe Disk Drives, And Why

Data security has become a bigger concern as the information age goes into full swing. Computers are becoming more and more commonplace as versatile tools for a wide variety of tasks and uses. This has made digital storage increasingly the data storage format of choice, since digital information is easily accessed and processed by computers.

This has led to a rise in interest in digital information and data storage systems. Apart from developments in hardware technology that allow bigger capacity devices with faster access times, security has also become a prime consideration. Most software and programs nowadays come equipped with varying levels of security options. For instance, it is now possible to protect almost any file with a password such that only those who can provide the correct password would be able to access the information within the file.

However, these software security measures would not stand up to dedicated data extraction efforts, in particular those involving the actual physical hardware. Physically securing the hard drive (or other data storage device) under consideration may not always be possible or practical. Another way of ensuring that important data is not placed at risk is to wipe the disk.

Simply deleting the contents of a hard disk is not enough to ensure that they are not recovered. In fact, there are software utilities that allow the recovery of deleted data. This possibility is because when a file is deleted, it is not actually overwritten or removed from the hard disk. Instead, a marker is just associated with the file to say that it has been deleted, and the space it occupies on the disk is marked available for use. This means that the data in the file remains on the disk for the knowledgeable hacker to extract and view.

Wiping a disk, on the other hand, is a much more thorough process. In a disk wipe, all data to be wiped off is actually overwritten with random data. This eliminates almost entirely the traces that a normal deletion leaves behind, and makes recovery of data practically impossible. (In theory, it would still be possible to reconstruct the data lost after a hard disk wipe, but this would require high-powered microscopes and would proceed much too slowly to be useful!)

Performing a disk wipe is facilitated by the many disk wipe programs available. There are many free options, as well as commercial software options, which may differ in terms of functionality and documentation. The majority of these are available online, which makes it quite easy to browse through and find the most appropriate program for the specific task. Some programs are designed for use on a single personal computer, while others may be designed for use on batches of computers.

Confidential data that needs to be kept from being exposed may best be hidden by using a disk wipe. This simple additional security measure makes the recovery of deleted data nearly impossible. With the many disk wipe programs available, it is easier than ever to perform a disk wipe, even for casual users, making this a real data security option.

Friday, August 24, 2007

Free Spyware Removal Software - Why Use It?

I guess most of us have been bothered with spyware infections once or more. Nobody likes that their computer become slow because of them, and nobody likes to pay a huge pile of cash just to get rid of them either. In this article I write about a great spyware removal tool that is free. What you get for zero bucks could sometimes actually be a whole lot.

When people get infections into their home computer, many are not aware of the existence of such threats. They just keep on working with their slow running computers until they stop almost completely. Some ask friends or relatives with a little computer experience to take a look at their computer. Therefore I will try to explain the importance of having protection, and how to get something that works.

Through the two latest decades we have seen computers eventually come into our lives, and that we use them more and more, and integrate them to become more or less a necessity in our homes. But, when internet was made public in 1990 we also began to see more and more of all the problems that came along with it.

An experience that I've had often is, when a system was near a breakdown, the problems was very often caused by a massive infection of online threats. Today we know them as spyware, adware, worms, trojan horses or viruses. They crawl up your cables and into your system, and when they become many they start competing with eachother for the available resources.

This will cause the computer to slow down, and when it eventually comes to a complete stop, the number of nfections will be too high for the computer to handle. All the power you need to do your stuff will be unavailable. An overrun system is of no real value to the user, because there are virtually no resources left to run real programs. This computer system has also become a real danger to privacy.

A good security tool could get rid of these bugs. I recommend that you have three basic types of security software installed on your system. Number one is a firewall protection. This will help prevent hackers from breaking into your system. Number two is a good antivirus solution. This keeps viruses, worms, trojan horses and often other types of threats away. Number three is to have a good spyware removal tool, because these threats are the most common ones today. They spread between computers like wildfire. Some of them are even made to steal your private information.

A quality piece of security software would protect you from various types of threats. But no software will make your system total immune, and a combination of different pieces of quality software is always preferred.

No matter what, it is always better to atleast have somekind of protection software installed, rather than nothing at all. So you might need to look for some you too. A good place to do this is online. This is because you simply get the fastest delivery and the best prices. But you have to look carefully for it.

I need to alert you about a new type of threats that is spreading around the world these days. A bug slips into your system, and almost instantly pops up with a warning about a "system error" from something called "Security Center" or similar. You should pay attention to this kind.

They infect you in the first place, then they want you to purchase a remedy for their disease and other types of infections. But most of them don't get rid of anything but the warnings, and even slips more bugs into your computer. Sneaky don't you think?

There are alot of software and solutions to choose from. Some are expensive, some are cheap, some are good and some are worse. They vary as much quality as they vary in price, and the most expensive ones are not by far always the best ones.

Infact there are actually spyware removal software packages that will protect against several categories of threats, and it will even clean up your computer's registry. This feature alone is a good way to increase the computers speed. I know about a really great tool that will do all this for you, and even for free.

This package does unfornately not include a firewall protection, but if you are running Windows XP there is a good firewall included in this operating-system. Just go to the control panel, and then to the Windows security center to activate it. It works great, and you should definately turn it on if you have it in the first place. This firewall in combination with the totally free spyware removal tool we provide on our website, you'll suddenly have a nice protection.

If you see the point of being protected for free rather than not protected, I have met my goal. Take care, and secure your computer properly. More information about this great free tool is to be found at our website.