Tuesday, May 3, 2011

Computer Cleaning Part. 5 of 5


Why clean your CD-ROM drive?
A CD-ROM drive is normally enclosed by a computer case. This does not totally protect it from the ravages of dust and grime. In fact, when a computer case has a negative pressure a significant amount of dust can filter in through the cracks around the CD tray. In addition, dust and debris on the compact disks themselves can deposit itself inside the CD-ROM drive and cover sensitive components. To keep your CD drive working smoothly it should be cleaned occasionally. However, it contains sensitive parts that may be easily damaged when tampered with, and intensive cleaning of interior components should be left to a professional. Fortunately, the most important parts can be cleaned by simply getting a cleaning disk (see below) and following the directions that come with it.
How to clean a CD-ROM drive in three simple steps
STEP 1: With the computer case opened for cleaning and the CD tray open, carefully blow compressed air in through the front of the CD tray opening. Do not blow with too high of a pressure as this may damage sensitive components. If the CD tray is closed and the power disconnected, you may need to open it using a paper clip. Press the paperclip into the tiny hole by the CD tray.
STEP 2: Buy a lens cleaning kit. For cleaning CD players and dvd players we recommend the Memorex CD/DVD Laser Lens Cleaner for its name brand quality, low price, and ease of use.
STEP 3: Use the CD drive cleaning kit as directed. Directions for using the Memorex CD / DVD laser lens cleaner are as follows:
1. Insert the Laser Lens Cleaner into your disk player and press play.
2. Listen and follow the audio voice instructions to guide you through the cleaning cycle and audio system checks.
3. After use, store the Laser Lens Cleaner in its case to prevent brush contamination.

Source: http://www.computerdust.com/clean_computer/clean_cd_rom_drive.html

Computer Cleaning Part. 4 of 5


Why clean your computer mouse?
It is probably the piece of computer equipment needing the most frequent cleaning. Dust, spilled food and drink frequently find their way into the computer pad or surface the mouse is rolled on, where it is promptly rolled up unto the mouse ball. From there it collects inside the mouse on the little rollers that are supposed to turn freely in order to move your pointer in the x and y directions on the computer screen. When sticky liquids and dirt particles prevent the ball or rollers from moving, you know it's past time to clean the computer mouse.
First, get some supplies:
Soft, lint-free cloths
Q-Tips or foam swabs
Canned, compressed air
Isopropyl alcohol
How to maintain your computer mice in eight simple steps
STEP 1: Disconnect the mouse cable from the back of the computer case.
STEP 2: Lightly dampen a cleaning cloth with isopropyl alcohol and wipe down the outside of the computer mouse and mouse pad. If you are concerned about damaging the plastic, dilute the alcohol 50:50 with water or use a mild detergent solution instead.
STEP 3: Remove the bottom cover of the mouse. To do this, turn it over and note the directional arrows that indicate the direction of rotation, or how to slide it off. Press with your fingers in the direction of the arrows and then turn the mouse right side up, letting the cover and mouse ball drop into your hand.
STEP 4: Wipe the computer mouse ball with a lint-free cloth dampened with isopropyl alcohol. Put it aside.
STEP 5: Dampen a swab with isopropyl alcohol and clean between, around and on top of the keys. Change swabs as they become dirty. You may need several swabs.
STEP 6: Replace the mouse ball and cover.
STEP 7: Wipe the mouse cord. Lightly dampen a cleaning cloth with mild soap solution and gently pull the cord through the cloth. Too tight a grip may damage it. Dry the cord with a dry cloth.
STEP 8: Plug the mouse back into the computer.

Computer Cleaning Part. 3 of 5


Why clean your keyboard?
Germs and disease spread rapidly when several people use the same computer and don't keep a clean keyboard. The effect could be even worse when dirt, dust, fingerprints and spilt food particles provide a home for bacteria to thrive on your keyboard. Spilled food and drink can make for sticky keys and a malfunctioning keyboard. For these reasons and more knowing how to clean your keyboard is a worthwhile endeavor.
For a clean keyboard, let's round up some supplies:
Soft, lint-free cloths
Q-tips or foam swabs
Canned, compressed air
Mild detergent solution or spray
Isopropyl alcohol
Small computer vacuum (optional)
How to clean a keyboard in seven simple steps
STEP 1: Remove the cable from the back of the computer case.
STEP 2: Use a vacuum to remove food, dust and debris from between the keys. If no vacuum is available, turn the keyboard upside down and gently tap on the back side to dislodge debris.
STEP 3: Aim between the keys and blow canned, or compressed air to remove remaining dust and debris. Use short puffs of air applied at about a 30-45 degree angle to the keyboard surface. Alternate between blowing between the keys and tapping the keyboard upside down to dislodge particles until it is clean.
STEP 4: Lightly dampen a cloth with a mild soap solution and wipe down the outside of the keyboard. Do not spray sooap solution directly onto the keyboard.
STEP 5: Dampen a swab with isopropyl alcohol and clean between, around and on top of the keys. Change swabs as they become dirty. You may need several swabs.
STEP 6: Wipe the keyboard cord. Lightly dampen a cleaning cloth with mild soap solution and gently pull the cord through the cloth. Too tight a grip may damage it. Dry the cord with a dry cloth.
STEP 7: For dusty or dirty manufacturing environments a good keyboard cover is recommended. X-Style Universal keyboard covers by Rota Technologies, Inc are very easy to use, economical options.
Computer keyboard covers: The X-STYLE Universal Keyboard Protector by ROTA is a simple, yet effective solution to protect your keyboard against dust, dirt, grime, oil, spilled beverages and more. One size fits all keyboards.
This computer keyboard dust cover is made from a super thin, yet strong & durable material. Installation is easy. The protector covers the full keyboard and gives the user the ability to type like there is no cover present. The fit is perfect for every model keyboard on the market.

Source: http://www.computerdust.com/clean_computer/clean_keyboard.html

Computer Cleaning Part. 2 of 5


Why clean computer screen and monitor?
Dirt, dust, fingerprints, wood chips—you name it, there is a lot of debris that can collect on your screen and on top of your monitor. On the screen these foreign particles and smears distort the image, making it difficult to read. They may even cause permanent damage to sensitive LCD and CRT screens. Collecting on top of the monitor, a layer of debris can clog the ventilation cooling ports and cause monitor overheating. In an extreme case an overheated monitor may start a fire.
The following instructions apply for cleaning regular (SVGA) monitor screens as well as LCD screens and CRT screens.
Before you begin, collect the following cleaning supplies:
Soft, lint-free cloth
Screen cleaner spray (read caution before cleaning monitor)
Compressed air and/or anti-static computer vacuum
Mild detergent solution or spray
How to clean your monitor and screen in six simple stepsSTEP 1: Unplug the power supply cord and cable from the back of the monitor and allow it to cool for at least 20 minutes.
STEP 2: Vacuum the outside of the monitor, particularly the cooling grooves, holes or slots in the top surface where heavy dust or other debris may have collected. If you don't have a vacuum, blow canned, or compressed air in short puffs at an angle to the monitor surface. The goal is to remove dust and dirt without letting anything fall into the ventilation holes.
STEP 3: Lightly dampen a cloth with a mild soap solution and wipe down the outside plastic portions of the computer monitor.
STEP 4: Clean the monitor cables and power cord while they are disconnected. Lightly dampen a cloth with mild soap solution and gently pull the cables and cords through the cloth. Too tight a grip may damage the cables. Dry the cables and power cords with a dry cloth.

STEP 5: Check the documentation or call the manufacturer to find out if your monitor screen has anti-glare, or other delicate coatings. If so, ask the manufacturer for cleaning instructions. If it does not have these special coatings you may spray a window cleaner unto a lint-free cloth and wipe it clean. Do not spray directly unto the screen. Chemicals may drip inside the monitor and damage it.
Absent manufacturer instructions, you can safely clean and protect all LCD, plasma, HDTV, flat screen, and CRT displays and monitors with a Klear Screen cleaning kit. Klear Screen is the only formula used, sold, or recommended by leading manufacturers such as Apple, Dell, Sony Vaio, HP/Compaq, Fujitsu, IBM, Panasonic, Samsung, Sharp, Toshiba, and ViewSonic.
STEP 6: For dusty or dirty manufacturing environments using a ShopShield™ computer monitor dust cover is recommended. The innovative ShopShield covers are breathable membranes that totally encase your computer or monitor to filter out dust and dirt, but at the same time allow clean, cool air to pass through. It is an economical way to allow you to keep your computer protected even while it is running.

Source: http://www.computerdust.com/clean_computer/clean_computer_screen.html

Computer Cleaning Part. 1 of 5


CPU and Tower
Regular computer cleaning is recommended to prevent overheating and glitches caused by dust inside your CPU. In addition to shorting out electronics, dust can act as an insulating blanket and prevent heat sinks and other componants from cooling off. A few minutes of careful cleaning will remove the computer killing dust from your CPU's fans, heat sinks, electronics and case, allowing the heat to dissipate and cool air to flow unimpeded throughout your system.
For a dust and grime-free cpu and tower we need some computer cleaning supplies:
Anti-static wrist strap or anti-static mat
Soft, lint-free cloth
Canned, compressed air
Mild detergent solution or spray
Q-tips, preferably foam
Computer vacuum (optional)
CD Drive cleaner disk
How to clean your computer CPU in ten simple steps
STEP 1: Shut down the CPU and remove the power cord from the electrical outlet.
STEP 2: Remove the power cord and cables from the rear of your computer.
STEP 3: Place your computer tower on a stable platform above the floor. A floor's static charge may damage the computer, even a wood or vinyl floor. It is best to do the cleaning outside the building, or in a maintenance shop due to the air-borne dust created.
STEP 4: Clean the outside of the computer case by lightly dampening a cloth with a mild soap solution and wiping off the dust. Use a computer vacuum, if available to remove dust from the fans, air intake and exhaust areas at the rear of the computer.
STEP 5: Open the computer case, using a screwdriver if required. If it is unclear how to open it, carefully inspect the rear of the case for screws that may need to be removed. Or, as is the case of some recent Dell computers there are large buttons on the top and bottom of the case that must be depressed before the side of the case swings open (see right). Typically, the left or right side of the case will come off, it will swing open like a hinge, or the main case will lift off its base in a single piece. Consult your owners manual.
STEP 6: Open the CD-ROM drive tray and carefully blow air in, and around the tray to remove dust. Press a paper clip into the tiny hole beneath the CD tray to open it.
STEP 7: Put on an antistatic wrist strap and attach it to an electrical ground, like a metal plumbing fixture or the metal frame of equipment you are servicing (see photo). This will ensure you do not damage sensitive electronics due to static discharge from your body. Alternatively, use an anti-static mat.
STEP 8: Clean the computer inside as well as around fan air intakes and exhaust (see photo) by holding canned air or compressed air at a distance of at least two inches away and blowing away the dust. Clean fan blades, motherboard and other areas. If using canned air, use short puffs. Attack clumps of dirt from different angles to loosen. Take care not to touch anything inside of the case. Do not turn the can of air upside down as this may cause liquid to come out.
STEP 9: Replace the computer case cover.
STEP 10: Clean cables and power cords while they are disconnected. Lightly dampen a cloth with mild soap solution and gently pull the cables and cords through the cloth. Too tight a grip may damage the cables. Dry the cables and power cords with a dry cloth.
STEP 11: For a dusty or harsh computer environment using ShopShield™ computer dust covers are recommended. The innovative ShopShield is a breathable membrane that totally encases your computer or monitor to filter out dust and dirt, but at the same time allow clean, cool air to pass through. It's an economical way to allow you to keep your computer protected in dusty conditions even while it is running.
Other things to consider:
Cleaning your computer room regularly is important. Make sure all equipment is covered first and try to minimize air-borne dust.
Janitors and other staff may not be aware of how easily they can damage your equipment and should not be responsible for computer maintenance. A professional cleaning service should be used if you are unable to do it yourself.
Your computer room environment should be kept cool and relatively dry.
Start a regular computer maintenance program.
Cleaning your computer is essential to keep your data safe and extend the life of your equipment:

Source: http://www.computerdust.com/clean_computer/computer_cleaning.html

Things to Consider When Buying a Computer


Top Ten
When entering into the world of computers it can get very easy to get confused and loose sight of your goals and sometimes your budget. Hopefully I can help you set some realistic goals and make sure you get the computer you really want and need.

1. The first thing that most of us are constrained to is budget so this is the first thing you should consider. We always want the best but we need to be grounded on what we can afford. So Get a budget and stick to it.

2. The next thing you should be looking at is your requirements. Do you need a laptop or desktop? What is the machine going to be used for? Once you have done this go back to number one and see if these are compatible often they are not first time round. You either need to adjust your budget or adjust your goals to make them more compatible with each other.

3. Once you have ironed out the bugs it’s time to move onto the computer itself. There are many things to consider when actually buying the computer, here I will list the most important so you can choose wisely.

4. The Processor is the most important factor when choosing a computer nowadays and there are many factors in processor choice the main thing is that in my opinion Intel are at the moment making the best chips and their core 2 duo range is the best so go for one in this family and you will be ok.

5. Next it is on to RAM, now this is simple for most just go for as much as possible and remember if you go above 2 GB then you must make sure you get windows vista 64bit as your operating system.

6. Hard drive is the next piece you should tackle. Again for the ordinary person it should be just a case of bigger is better.

7. Graphics, now all computers come with some form of graphics built in. But my recommendation is to go with something a little better possibly from NVIDIA.

8. Now that should be your main considerations when thinking of the hardware. The next thing to think about is software now many computers come with windows vista as standard, this should be premium at least I wouldn’t even think about basic.

9. The last thing to do with the actual computer is a good virus and spy ware package. Don’t be under any illusion this is possibly the most important part of protecting your computer. It will get attacked at some point be prepared when it does.

10. Finally the internet, get a good internet provider broadband at least, no computer I complete without this basic of add-ons.

I hope this list is helpful in helping you make vital decisions when buying your new computer.
Please visit me and maybe we can help you in your building you a custom computer.
Source: http://www.streetdirectory.com/travel_guide/116135/computers/top_ten_things_to_consider_when_buying_a_computer.html

How to Prevent Hacking of your PC? Part. 3

Internet Security Facts
Between 80% and 90?/0 of successful computer attacks come from insiders.
Thirty percent of employees would do the unethical thing, given the right amount of money: Companies only catch 2% of security break-ins.
Most hacker-s are single males, age 16 to 28, from middle-income families.
Of 8,932 computers attacked, 7,860 were broken into, 390 detected the attack, and only 19 reported the attack, according to the Department of Defense.
In the first six months of 1993, the Forum for Internet Response and Security Teams identified more than 2 million sniffers running on Internet hosts.
For every incident a human' operator finds, he misses 75, according to Los Alamos National Laboratories.
Source: David Dumas, GTE Laboratories
Hacking Help
The good news is that help regarding hacking exists all over the Internet The bad news is that the help usually is for the bad guys, said David Dumas, GTE Laboratories principal ,member of technical staff. To see some sites where hackers learn their techniques and communicate with one another, check out the following:
www.thecodex.com/hacking.html
www.insecure.org/index.html
www.fc.net/phrack
utopia.hacktic.nl/
verbosity.wiw.org/neogenesis/features! hack.html
According to Cynthia Ward, Vestcom vice president of marketing and product development, several industry initiatives have sprung up to help companies ward off hack attacks. She pointed to The National Automated Clearinghouse Association (www.nacha.org) and Just in Time Solutions (www.justintime.com) for helpful information. Carriers also can find anti-hacking help from Purdue University (www.cs.purdue.edu/coast/coast-library.html), CTIA (www.wowcom.com),The Forum of Incident Response and SecurityTeams (first.org/). The Security Assurance Company (www.icsa.net/), Information Security Magazine (www.infosecuritymag.com/and Secure Computing (www.sctc.com/).
Tax Evasion?
Security is not the only thing you have to worry about when it comes to e-commerce, according to Arthur Andersen's Interconnect. U.S. Congressman Billy Tauzin, chairman of the House Commerce Committee's Telecommunications Subcommittee, predicted consumers will soon pay taxes on e-commerce. Andersen said the National Governors' Association reports states could lose $15 to $20 billion a year in sales taxes due to e-commerce's popularity.

More:

How to Prevent Hacking of your PC? Part. 2

Inside Jobs
Roland Jones, Sun Microsystems senior product manager for Java security, said you can spend all of the money in the world on encryption, but security is a bigger package.
"Why go off the deep end and encrypt every little thing, only to find out everyone has their passwords stuck on their computers?" he said.
The whole package includes better business practices, Dumas said. You should train all existing staff and new hires about Internet security and give a refresher course every year. Support should come from the top, down. One way to test your business processes is to think about whom you would call if you discovered a security breach. You should have at least one full-time person dedicated to securing infrastructure.
Finn noted that employee security breaches also are an issue. Insiders often inappropriately use company information.
"There are not any foolproof technological means for preventing that; you have to rely on good procedural measures to address those kinds of risks," he said.
If you have a database server that is storing credit-card information or user profiles, you can do several things to make sure your system can't be compromised. Methods include doing background checks and maintaining strong host security. Host security means locking down and limiting access to your systems where you maintain sensitive information. You should issue policies stating which users are allowed to log in to a computer, who is allowed to maintain systems and how often employees must change passwords. Keep records of who accesses internal systems, and audit what they do when they are connected.
Dumas added that sometimes untrustworthy employees will defend criminal actions by saying that nobody told them breaching inside security was wrong. You should notify employees that you don't permit internal breaches. Another way to maintain security while connected to the Internet is to partner with security companies or organizations. When programmers develop a product, or when web designers create a site, they think about functionality and design rather than security. Asking a cryptologist or security specialist to check out your system can plug security holes. Vestcom's Ward said organizations such as the National Automated Clearinghouse Association are working to set industry standards for EBPP that address security and passing data.
Ward pointed out you should ask your bank how it is enabling electronic information exchange, and follow its lead. Most big banks have their own initiatives and will share them with you. You also should make sure you are dealing with a reputable party before you ask a company to help you. Finn said you can gauge reputation by asking a company if it is certified by the International Computer Security Association. This industry group evaluates firewalls and ensures they meet minimum security criteria. Potential partners should be familiar with the various kinds of attacks that hackers can mount against computer systems. Look for a company with vast experience, and check its references.
Ryan said you can have the best security system in the world, but the real challenge is implementation. Look for vendors with the most experience in security. Government agencies, for example, are not likely to hire amateurs, so references such as post offices or other federal agencies are a good sign the vendor is legitimate.

More:

How to Prevent Hacking of your PC? Part. 1

Hack Attack
Before you can implement web-security solutions, you first must understand potential problems. David Dumas, GTE Laboratories principal member of technical staff, said passive attacks are when hackers listen and collect data, often as a prelude to an active attack. Active attacks are when they change, delete, alter or add to your data.
Dumas explained the various ways people can hack into your billing records and data through the World Wide Web. Social engineering is a common, non-technical way to access system passwords, and sometimes all too easy. The attacker socializes with company personnel to find out people's names and the departments in which they work, then he name-drops in conversations with other employees to learn user names and passwords as a front end to an electronic attack. Once he has that information, he can break through firewalls to look at customer records, credit-card numbers and security PINs.
Other hackers will pose as employees. They might make an authentic-looking company badge and walk into your building or apply to the company as a janitor. Sometimes a hacker will install a sniffer while he is there. Dumas said a sniffer, which is commonly available from various Internet sites, plugs into a network jack and collects user names and passwords.
"It could be on your box today," Dumas said. "You can't detect it."
Some hackers don't even have to install a device because they find Post-It notes in plain view with passwords written on them.
Hackers have other means to get at your passwords. One is through simple trial and error. If they know you have security in place, hackers actually will slow down attacks to avoid setting off bells and whistles, Dumas added. Password-guessing software, such as Cracker, also facilitates attacks. Some can listen to your system, capture passwords and then knock the legitimate user off the system so the hacker becomes the user.
Attacks known as man-in-the-middle, spoofing and Trojan horse also can capture passwords and PINs. A "man-in-the-middle" attack is when a hacker appears to the server as if he were the legitimate remote agent. To the end user, he looks like the server. The user unknowingly sends credit-card information to the hacker. Spoofing occurs when a user logs in to a remote system. The workstation is not actually connected to the remote system, but it generates the log-in banner and prompts the user to input his user ID and password. Software captures the information and kicks the end user off the system. In a Trojan horse attack, the hacker alters the local system to allow a later entry. He may use a bogus code to bypass system controls to hide the existence or current status of an account.

More: http://web.ebscohost.com/ehost/detail?sid=1fff7848-8fc8-464a-8ccc-fd71bf9a203d%40sessionmgr11&vid=5&hid=14&bdata=JnNpdGU9ZWhvc3QtbGl2ZQ%3d%3d#AN0001858715-3

Computer hackers...


What is a computer hacker?

The article focuses on computer hardware hacking and the methods and rationales for this practice. A computer hardware hacker operates in a mode that is the opposite of an academic researcher, the author argues. The author focuses on the hacking work of Andrew Huang while he was a Ph.D. candidate at the Massachusetts Institute of Technology (MIT). Huang worked on taking apart the hardware of Microsoft's original Xbox game device in 2001. His work identified potential security vulnerabilities of the device and gave Microsoft insight into what computer hackers may choose to do with such devices.

A BRIEF HISTORY OF HARDWARE HACKING

Hardware hacking dates back almost 200 years. Charles Babbage's Difference Engine In the early 1800s was a mechanical form of hardware hacking. The method William Crookes used to discover the electron in the mid-i8oos might have been the first form of electronics-related hardware hacking. Hardware hackers have since been involved in the development of wireless telegraphy, vacuum tubes, radio, television, and transistors. Benjamin Franklin, Thomas Edison, Nikola Tesia, and Alexander Graham Bell were all hardware hackers. So were William Hewlett and David Packard and Steve Jobs and Steve Wozniak.
Contrary to how the word hacker is sometimes used to describe criminals breaking into computer systems, a hacker can be defined more simply as someone involved in the exploration of technology. A "hack" in the technology world usually defines a new and novel creation or method of solving a problem, typically in an unorthodox fashion [2-4]. Here, I focus on an idealistic vision of hardware hackers—the good guys—even though some people, corporations, and agencies may use the same techniques for illegal, illegitimate, or unethical purposes, seeking some sort of financial gain or market advantage. Hardware hacking means different things to different people, coming down to personal preferences, as in art or music. Someone can be taught, to a point, to have the hacker mindset and break the mold of conventional thinking, but hacking goes much further. It is a passion, a drive, something that stems from some amount of anti-establishment and anti-authority sentiment coupled with the desire to do things on one's own agenda and with one's own hands. Hardware hacking is the technologists' version of the classic
phrase "Don't judge a book by its cover." Hackers are driven by a variety of motivations:
Cunosit^ and jun. See how things work, scratch the curiosity itch, and have fun experimenting with and modifying products;
Education. Learn by doing;
Improvement and innovation. Build a better mousetrap;
Consumer protection. Ensure a product does what its marketing pitch claims it to do. Often distrustful of marketing or sales literature, hackers want to find out for themselves whether certain claims are true and how they can make a particular product do more; and
Security. Test whether hardware devices are secure, identifying failures or weaknesses. Beyond strengthening the perceived value of a product, it allows users to mitigate the risk of an attack by updating, fixing, or discarding the product.
Most hardware hacks fall into four categories:
Personalizing and customizing. Often called "hotrodding for geeks" it includes modifications, custom skins, and even art projects (such as creating an aquarium out of a vintage computer);
Adding functionality. Making the system or product do something it wasn't intended to do (such as converting an iPod to run Linux or modifying a classic Atari 2600 video game console to support stereo sound and composite video output);
Improving capacity or performance. Enhancing or otherwise upgrading a product (such as expanding the recording capacity of a TiVo box by adding a larger hard drive, modifying a wireless network card to support an external antenna, or overclocking a PC's motherboard);
Defeating protection and security mechanisms. Included are finding "Easter eggs," hidden menus, and backdoors in DVD players or video game consoles or creating a custom cable to unlock the secrets of a cell phone.
Reverse engineering, generally viewed as a subset of hardware hacking, is essentially the art of learning from practical examples and experience. Examining technologies or any kind of product to see how they work is an integral part of the hardware hacking process and is a great way to learn the state of the art. I use reverse engineering to add to my mental toolbox of circuit designs, manufacturing techniques, and printed circuit board layout tricks, all of which improve my knowledge of the product development process.
Reverse engineering and hardware hacking represent continuing education, interconnected with developing new products and technologies.

Tuesday, April 19, 2011

How to make a computer faster... Part. 6

6. Upgrade to Windows 7
If you try all the previous remedies and your computer still isn't as fast as you would like it to be, you may want to consider updating to Windows 7.
Find out if your computer can run Windows 7 using the Upgrade Advisor.
Compare Window 7 editions.
Read a third-party review of Windows 7 by David Pogue of The New York Times.
If the Windows 7 Upgrade Advisor determines that your computer can't run Windows 7 and you still have the need for speed, it might be time for a new computer. There are some great deals on new computers right now:
• Shop for new desktop computers.
• Shop for new laptop computers.
• Shop for netbooks.

How to make a computer faster... Part. 5

5. Learn about ReadyBoost
If you're using Windows 7 or Windows Vista, you can use ReadyBoost to speed up your system. A new concept in adding memory to a system, it allows you to use non-volatile flash memory—like a USB flash drive or a memory card—to improve performance without having to add additional memory.

More info: http://windows.microsoft.com/en-us/windows7/Turn-ReadyBoost-on-or-off-for-a-storage-device

How to make a computer faster... Part. 4

4. Detect and repair disk errors
In addition to running Disk Cleanup and Disk Defragmenter to optimize the performance of your computer, you can check the integrity of the files stored on your hard disk by running the Error Checking utility.
As you use your hard drive, it can develop bad sectors. Bad sectors slow down hard disk performance and sometimes make data writing (such as file saving) difficult or even impossible. The Error Checking utility scans the hard drive for bad sectors and scans for file system errors to see whether certain files or folders are misplaced.
If you use your computer daily, you should run this utility once a week to help prevent data loss.
Run the Error Checking utility:Close all open files.
Click Start, and then click Computer.
In the Computer window (My Computer in Windows XP), right-click the hard disk you want to search for bad sectors, and then click Properties.
In the Properties dialog box, click the Tools tab.
Click the Check Now button.
In the Check Disk dialog box (called Error-checking in Windows 7), select the Scan for and attempt recovery of bad sectors check box, and then click Start.
If bad sectors are found, choose to fix them.
Tip: Only select the "Automatically fix file system errors" check box if you think that your disk contains bad sectors.

How to make a computer faster... Part 3

3. Speed up access to data
Disk fragmentation slows the overall performance of your system. When files are fragmented, the computer must search the hard disk as a file is opened (to piece it back together). The response time can be significantly longer.
Disk Defragmenter (sometimes shortened to Defrag by users) is a Windows utility that consolidates fragmented files and folders on your computer's hard disk so that each occupies a single space on the disk. With your files stored neatly end to end, without fragmentation, reading and writing to the disk speeds up.
When to run Disk Defragmenter
In addition to running Disk Defragmenter at regular intervals (weekly is optimal), there are other times you should run it, too, such as when:
• You add a large number of files.
• Your free disk space totals 15 percent or less.
• You install new programs or a new version of the Windows operating system.
• To use Disk Defragmenter:
Windows 7 usersClick Start, click All Programs, click Accessories, click System Tools, and then click Disk Defragmenter.
In the Disk Defragmenter dialog box, click the drives that you want to defragment, and then click the Analyze disk button. After the disk is analyzed, a dialog box appears, letting you know whether you should defragment the analyzed drives.
Tip: You should analyze a volume before defragmenting it to get an estimate of how long the defragmentation process will take.
To defragment the selected drive or drives, click the Defragment disk button. In the Current status area, under the Progress column, you can monitor the process as it happens. After the defragmentation is complete, Disk Defragmenter displays the results.
To display detailed information about the defragmented disk or partition, click View Report.
To close the View Report dialog box, click Close.
You can also schedule the Disk Defragmenter to run automatically. (Your computer might even be set up this way by default.) Under Schedule, it reads Scheduled defragmentation is turned on and then displays the time of day and frequency of defragmentation. If you want to turn off automatic defragmentation or to change the time or frequency, click Configure schedule (or Turn on Schedule, if it is not currently configured to run automatically). Change the settings, and then click OK.
To close the Disk Defragmenter utility, on the title bar of the window, click the Close button.
Windows Vista usersOpen Disk Defragmenter: Click the Start button, click All Programs, click Accessories, click System Tools, and then click Disk Defragmenter. If you are prompted for an administrator password or confirmation, type the password or provide confirmation.
In the Disk Defragmenter dialog box, click the drives that you want to defragment and then click the Analyze disk button. After the disk is analyzed, a dialog box appears letting you know whether you should defragment the analyzed drives.
Tip: You should analyze a volume before defragmenting it to get an estimate of how long the defragmentation process will take.
To defragment the selected drive or drives, click the Defragment disk button. In the Current status area, under the Progress column, you can monitor the process as it happens. After the defragmentation is complete, Disk Defragmenter displays the results.
To display detailed information about the defragmented disk or partition, click View Report.
To close the View Report dialog box, click Close.
You can also schedule the Disk Defragmenter to run automatically. (Your computer might be set up this way by default.) Click Modify schedule....
In the Disk Defragmenter: Modify Schedule dialog box, choose how often, which day, and at what time of day you want defragmentation to occur, and then click OK.
Click OK again.
Windows XP usersClick Start, point to All Programs, point to Accessories, point to System Tools, and then click Disk Defragmenter.
In the Disk Defragmenter dialog box, click the drives that you want to defragment and then click the Analyze button. After the disk is analyzed, a dialog box appears, letting you know whether you should defragment the analyzed drives.
Tip: You should analyze a volume before defragmenting it to get an estimate of how long the defragmentation process will take.
To defragment the selected drive or drives, click the Defragment button. Note: In Windows Vista, there is no graphical user interface to demonstrate the progress—but your hard drive is still being defragmented.
After the defragmentation is complete, Disk Defragmenter displays the results.
To display detailed information about the defragmented disk or partition, click View Report.
To close the View Report dialog box, click Close.
To close the Disk Defragmenter utility, on the title bar of the window, click the Close button.
Running Disk Cleanup and Disk Defragmenter on a regular basis is a proven way to help keep your computer running quickly and efficiently. If you'd like to learn how to schedule these tools and others to run automatically, please read Speed up your PC: Automate your computer maintenance schedule.

How to make a computer faster... Part 2

2. Free up disk space
The Disk Cleanup tool helps you to free up space on your hard disk to improve the performance of your computer. The tool identifies files that you can safely delete and then enables you to choose whether you want to delete some or all of the identified files.
Use Disk Cleanup to:
Remove temporary Internet files.
Delete downloaded program files, such as Microsoft ActiveX controls and Java applets.
Empty the Recycle Bin.
Remove Windows temporary files, such as error reports.
Delete optional Windows components that you don't use.
Delete installed programs that you no longer use.
Remove unused restore points and shadow copies from System Restore.
Tip: Typically, temporary Internet files take the most amount of space because the browser caches each page you visit for faster access later.
To use Disk Cleanup:
Windows 7 usersClick Start, click All Programs, click Accessories, click System Tools, and then click Disk Cleanup. If several drives are available, you might be prompted to specify which drive you want to clean.
When Disk Cleanup has calculated how much space you can free up, in the Disk Cleanup for dialog box, scroll through the content of the Files to delete list.
Clear the check boxes for files that you don't want to delete, and then click OK.
For more options, such as cleaning up System Restore and Shadow copy files, under Description, click Clean up system files, and then click the More Options tab.
When prompted to confirm that you want to delete the specified files, click Yes.
After a few minutes, the process completes and the Disk Cleanup dialog box closes, leaving your computer cleaner, performing better, and potentially increasing your PC speed.
Windows Vista usersIn the Start menu, click All Programs, click Accessories, click System Tools, and then click Disk Cleanup.
In the Disk Cleanup Options dialog box, choose whether you want to clean up your own files only or all of the files on the computer.
If the Disk Cleanup: Drive Selection dialog box appears, select the hard disk drive that you want to clean up, and then click OK.
Click the Disk Cleanup tab, and then select the check boxes for the files you want to delete.
When you finish selecting the files you want to delete, click OK, and then, to confirm the operation, click Delete files. Disk Cleanup then removes all unnecessary files from your computer. This may take a few minutes.
The More Options tab is available when you choose to clean files from all users on the computer.
Windows XP usersClick Start, point to All Programs, point to Accessories, point to System Tools, and then click Disk Cleanup. If several drives are available, you might be prompted to specify which drive you want to clean.
In the Disk Cleanup for dialog box, scroll through the content of the Files to delete list.
Clear the check boxes for files that you don't want to delete, and then click OK.
When prompted to confirm that you want to delete the specified files, click Yes.
After a few minutes, the process completes and the Disk Cleanup dialog box closes, leaving your computer cleaner and potentially performing better.

How to make a computer faster... Part 1


How to make a computer faster: 6 ways to speed up your PC
By following a few simple guidelines, you can maintain your computer, help increase your PC speed, and help keep it running smoothly. This article discusses how to use the tools available in Windows 7, Windows Vista, and Windows XP Service Pack 3 to help make your computer faster, maintain your computer efficiently, and help safeguard your privacy when you're online.
Note: Some of the tools mentioned in this article require you to be logged on as an administrator. If you aren't logged on as an administrator, you can only change settings that apply to your user account.
1. Remove spyware, and help protect your computer from viruses
Spyware collects personal information without letting you know and without asking for permission. From the websites you visit to user names and passwords, spyware can put you and your confidential information at risk. In addition to privacy concerns, spyware can hamper your computer's performance. To combat spyware, you might want to consider using the PC safety scan from Windows Live OneCare. This scan is a free service that helps check for and remove viruses.
Download Microsoft Security Essentials for free to help guard your system in the future from viruses, spyware, adware, and other malicious software (also known as malware). Microsoft Security Essentials acts as a spyware removal tool and includes automatic updates to help keep your system protected from emerging threats.
The Microsoft Windows Malicious Software Removal Tool is another utility that checks computers running Windows 7, Windows Vista, Windows XP, Windows 2000, and Windows Server 2003 for infections by specific, prevalent malicious software, including Blaster, Sasser, and Mydoom, and helps remove any infection found.

More: http://www.microsoft.com/atwork/maintenance/speed.aspx

Monday, April 4, 2011

MSconfig


MSConfig, or Microsoft System Configuration Utility, (or simply System Configuration in Windows Vista and Windows 7) is a utility to troubleshoot the Microsoft Windows startup process. It is bundled with all Microsoft Windows operating systems since Windows 98 except Windows 2000. Windows 95 and Windows 2000 users can download the utility as well, although it was not designed for them. MSConfig modifies which programs run at startup, edits certain configuration files, and simplifies controls over Windows services. As part of the base Windows install, MSConfig has commonly not been linked to in the Start Menu or Control Panel, but is accessible by using the Run dialog to launch 'msconfig' on any system on which the user has administrator access.
Files that can be edited through MSConfig include AUTOEXEC.BAT, CONFIG.SYS, WIN.INI, SYSTEM.INI on Windows 9x systems, and WIN.INI, SYSTEM.INI and BOOT.INI on Windows NT systems prior to Windows Vista. The chief benefit to using MSConfig to edit these files is that it provides a simplified GUI to manipulate sections of those files and the Windows registry tree pertaining to the Windows boot sequence. Using MSConfig, Windows can also be configured to perform a diagnostic startup (load a minimum set of drivers, programs and services).
More info: http://en.wikipedia.org/wiki/MSConfig

Tuesday, March 8, 2011

What is Ubuntu?



UBUNTU |oǒ'boǒntoō|
Ubuntu is an ancient African word meaning 'humanity to others'. It also means 'I am what I am because of who we all are'. The Ubuntu operating system brings the spirit of Ubuntu to the world of computers.

Where did it all begin?
Linux was already established as an enterprise server platform in 2004. But free software was still not a part of everyday life for most computer users. That's why Mark Shuttleworth gathered a small team of developers from one of the most established Linux projects – Debian - and set out to create an easy-to-use Linux desktop, Ubuntu.

The vision for Ubuntu is part social and part economic: free software, available free of charge to everybody on the same terms, and funded through a portfolio of services provided by Canonical.

Ubuntu releases
The Ubuntu team broke new ground in committing to a programme of scheduled releases on a predictable six-month basis. It was decided that every fourth release, issued on a two-year basis, would receive long-term support (LTS). LTS releases are typically used for large-scale deployments.

Ubuntu is different from the commercial Linux offerings that preceded it because it doesn't divide its efforts between a high-quality commercial version and a free, 'community' version. The commercial and community teams collaborate to produce a single, high-quality release, which receives ongoing maintenance for a defined period. Both the release and ongoing updates are freely available to all users.

Governance
Version 4.10, codenamed the 'Warty Warthog', the first official Ubuntu release, was launched in October 2004. Global interest in Ubuntu was dramatic from the outset. The year following the Warty Warthog release saw huge growth in the Ubuntu community as thousands of free software enthusiasts and experts joined.

The governance of Ubuntu is somewhat independent of Canonical, with volunteer leaders from around the world taking responsibility for many of the critical elements of the project. It remains a key tenet of the Ubuntu Project that Ubuntu is a shared work between Canonical, other companies, and the thousands of volunteers who bring their expertise to bear on making it a world-class platform for the whole world to use.

Ubuntu today
The first version of Ubuntu was based on the GNOME desktop. We have since added a KDE edition, Kubuntu, and a server edition. All of the editions of Ubuntu share common infrastructure and software, making Ubuntu a unique platform that scales from consumer electronics to the desktop, and into the cloud for enterprise computing. Developers can work on their desktop of choice, and smoothly deliver code to cloud servers running the stripped-down Ubuntu Server Edition.

In recent years, special emphasis has been placed on netbooks for lightweight, connected, mobile computing, and on the cloud as a new architecture for data centres. Ubuntu is a pioneer in both fields, with Ubuntu Netbook Edition and Ubuntu Enterprise Cloud setting the standard for easy deployment and management. Ubuntu is hugely popular on Amazon's EC2 and Rackspace's Cloud, and is pre-installed on computers from Dell, Lenovo and other global vendors.

Ubuntu still is and always will be free to use, share and develop. We hope it will bring a touch of light to your computing – and we hope that you'll join us in helping to build the next version too.

Source:

http://www.ubuntu.com/project/about-ubuntu

How computers affect student performance, the good and the bad.


Computers and Education and how it affects the students with their learning process. Regular use of computers can have an effect on student performance on standardized tests, according to a new study by researchers at Boston College and the University of Massachusetts at Lowell.

Analyzing test performance and computer uses of 986 fourth grade students from 55 classrooms in nine Massachusetts school districts, the study found that the more regularly students use computers to write papers for school, the better they performed on the Massachusetts Comprehensive Assessment Systems (MCAS) English/Language Arts exam. This positive effect occurred despite the fact that students were not allowed to use computers for the test.

Conversely, the study found that students' recreational use of computers to play games, explore the Internet for fun, or chat with friends at home had a negative effect on students' MCAS reading scores. Similarly, students' use of computers to create PowerPoint presentations was also negatively associated with MCAS writing scores.

This study of students' MCAS performance is part of the "Use, Support and Effect of Instructional Technology" (USEIT) study conducted by the Technology and Assessment Study Collaborative of the Lynch School of Education at Boston College. Funded by the US Department of Education, USEIT is a three-year assessment of educational technology that occurred across 22 Massachusetts districts.

The MCAS achievement component of USEIT is the most sophisticated analysis of the relationships between students' computer use and test performance conducted to date. Building on several shortcomings of past research on this topic, this study collected detailed measures of a variety of student uses of computers in and out of school, controlled for differences in home learning environments, separated effects of teachers' instructional practices, and controlled for differences in prior achievement by using third grade MCAS scores.

In addition to analyzing the effect of a variety of uses of computers on students' total MCAS scores, this study also examined the sub-scores provided by the MCAS test.

At a time when standardized testing is playing an increasingly important role in shaping the learning experiences of students and instructional practices of teachers, the researchers believe this study provides evidence that students' computer use does have an impact on student achievement as measured by tests like MCAS. More importantly, they say, the study demonstrates that different uses of computers have different effects on student learning.

"Specifically, this study finds that students' use of computers throughout the writing process had a statistically significant positive effect on MCAS writing scores," said the study's director, Michael Russell of BC's Lynch School of Education. "Using computers simply to type in final drafts of essays, however, had no effect on students' test performance. These findings are consistent with past research and demonstrate the importance of allowing students to use computers to produce rough drafts, edit their papers, and to produce final drafts."

This study also indicates that using computers for recreational purposes had a negative effect on test performance, particularly for reading scores. The authors speculate that this occurs because students who spend more time using computers for recreational purposes at home may spend less time reading at home.

Similarly, the study found that use of computers in school to create presentations was negatively associated with writing test scores. According to the researchers, this negative relationship may result from students spending less time writing during class time and more time creating and revising multimedia projects that contain relatively small amounts of written work. In essence, time spent creating presentations may detract from time available during class to develop students' writing skills.

"These findings are important for two reasons," said Russell. "First, at a time when schools are under increased pressure to raise test scores, yet are also facing budget shortfalls, this study provides evidence that investments in computers can have positive effects on student achievement. Second, it shows that teachers and students must be thoughtful about how computers are used and what types of learning they expect to impact."

"When examining the effect of computer use on student learning, it is important to consider how well a specific use is aligned with the measure of learning," added the study's lead author, Laura O'Dwyer of the Graduate School of Education at UMass Lowell, formerly a researcher at Boston College. "While this study found that use of computers to create presentations was negatively associated with writing scores, it does not mean that students should not be creating presentations with computers. Creating presentations may be a positive learning experience, but such effects are not captured by a test like MCAS that measures reading and writing skills."

Adds BC researcher Damian Bebell, the study's third author, "Although this study finds some interesting effects of students' use of computers, teachers in this study generally did not use technology to teach. As more and more schools, districts, and states provide teachers and students with their own laptops, it will be interesting to see if teachers are able to use technology more in the classroom and if these uses add to the effects of student technology use."

SOURCE:
http://www.medicalnewstoday.com/articles/19387.php

Saturday, March 5, 2011

COMPUTER VIRUSES: AN ASSESSMENT OF STUDENT PERCEPTIONS


Computer viruses have become a major security issue during the last few years. They pose a threat to the reliability and validity of many aspects of computing (Hafner, 1988; Highland, 1990a, 1990b; Zajac, 1990; Alexander, 1991; Thimbleby, 1991). No system is immune from contamination: Viruses have been found on stand-alone microcomputers, networks, minicomputers, and mainframes. They are transmitted through many sources, including disks shared by individuals, bulletin boards, disks from vendors, and shrink-wrapped disks from a variety of sources.
Some of the better known viruses are products of college students or have experienced pronounced proliferation on college campuses (Highland, 1991). For instance, the BRAIN virus surfaced at the University of Delaware in October 1987 and was followed 1 month later by LeHigh University's COMMAND.COM virus. The first strains of the Jerusalem virus were found at Israel's Hebrew University. Robert Morris, Jr.'s Internet worm, perhaps the most celebrated virus, began at Cornell and infected thousands of computers on the Internet in only a few hours (Highland, 1990b).
There is little or no research that addresses the role of business school education in combatting and preventing the spread of computer viruses. We undertook this study to begin to fill that void, although our report is primarily exploratory and descriptive in nature. The purpose of the study was to assess business student awareness and perceptions of computer viruses. In this article, we hope to provide information that may be used by educators to heighten awareness of the occurrence and implications of computer viruses. Without this type of education, students are entering the work-place unprepared to deal with a very real and rapidly growing destructive phenomenon.
Conclusions and Implications for Educators
Computer viruses will continue to invade college campuses for some time to come. Teachers who expect computer use in their classes have a responsibility to discuss CVs with their students. The impact of knowledge about viruses cannot be overlooked. Results indicate that when students are more informed, they understand more thoroughly the importance of scanning, the insidious nature of viruses, and the danger of sharing disks with other individuals. Education can certainly make a difference by making students aware of the nature and effects of computer viruses.
If students do not fully understand the scope of damage and the potential sources for viruses, then they are more likely to be lax about virus detection/containment activities during their college careers and will continue this bad habit when they enter the workforce. Without education, it is difficult to control or contain the potential damage that CVs can cause.
Here in lies a major task for educators who shoulder a responsibility for computer virus education. This responsibility is heightened in educational environments because of the extent of software and data sharing (whether ethical or not) that take place among students.
There are three primary areas on which educators should focus. First, they should make students aware of the multiple sources of CVs, such as disk sharing, downloading, and shrink-wrapped software. Second, instructors should describe to students the breadth and extent of damage of existing CVs, not only in educational institutions, but also in the other public- and private-sector environments. Viruses are everywhere, and their effects can be devastating on an organization. Third, instructors should inform students of virus detection and removal methods. These may be provided through different sources, depending on the particular campus environment.
In addition to these three areas, reinforcement, as with other teaching strategies, is vital for virus education. Attention should be given to these findings by instructors in all classes that require student use of computers. Reinforcement in additional classes will increase student awareness of viruses. This awareness will result in more secure working environments for the students not only while they are in college but also when they enter the workforce.

Source:

http://web.ebscohost.com/ehost/detail?hid=7&sid=df61174d-924f-438c-9579-acd905118c2f%40sessionmgr14&vid=11&bdata=JnNpdGU9ZWhvc3QtbGl2ZQ%3d%3d#db=aph&AN=9209210716

Tuesday, February 15, 2011

What Makes Computer Fast?

What makes a computer fast is a question that may have different answers for different people. If you are a business user with a large database, de-fragging your hard drive may make your computer faster. If you use your computer mainly for games, then video card memory may be the most important thing. If you keep many programs open and running at the same time, the RAM will be the key component.
CPU
1. The Central Processing Unit (CPU) is the most basic answer to what controls the speed of your computer. This is the brain of the computer attached to the motherboard and it processes data at a set rate. Usually, if you want a faster computer, you need a faster processor.
RAM
2. Although Random Access Memory (RAM) doesn't make your computer faster like a new CPU, it does allow more programs to be opened at once. This will allow the computer to complete more processes at the same time, giving you a faster computer.
Bus Speed
3. The bus is the data transport system on the motherboard that should be matched in speed by the CPU and the RAM. It transports data between all the devices on the computer. This has an impact on how fast data can arrive and therefore the perceived speed. Think of bus speed as a smooth, freshly paved multi-lane highway between the CPU and the RAM.
Video Memory
4. On most regular desktop computers, the video memory is a shared part of the RAM and a certain portion is dedicated to video processing. A video card with on-board memory can free up that RAM so it can be used in regular operations by the CPU. The more memory on the video card, the better it can process and render your games and graphics. This will keep the CPU from having to slow down and take time from other processes.
Hard Drive
5. The hard drive has the least impact on overall speed. There are drives that have faster data transfer rates than others, but unless everything else on the computer is vastly faster, you would never notice this. Usually, the hard drive can have a noticeable impact on speed when it is more than 75 percent to 80 percent full, or badly fragmented. If you store several gigabytes of files in one folder like My Documents, this can slow down opening files and folders. Regularly de-fragging your hard drive, un-installing old and unneeded software and culling through old files will help these issues and reduce any impact on speed.
Viruses
6. Every computer faces the threat of slow performance due to viruses and malware. Keep a good, updated anti-virus and anti-malware program to keep your computer clean. Viruses, spyware and malware can install unwanted files and conflicting processes, which eat up a computer's processing speed and keep your machine from running fast.


Read more: What Makes Computer Fast? eHow.com http://www.ehow.com/about_5394578_computer-fast.html#ixzz1E3OeohTD