Tuesday, May 3, 2011

Computer Cleaning Part. 5 of 5


Why clean your CD-ROM drive?
A CD-ROM drive is normally enclosed by a computer case. This does not totally protect it from the ravages of dust and grime. In fact, when a computer case has a negative pressure a significant amount of dust can filter in through the cracks around the CD tray. In addition, dust and debris on the compact disks themselves can deposit itself inside the CD-ROM drive and cover sensitive components. To keep your CD drive working smoothly it should be cleaned occasionally. However, it contains sensitive parts that may be easily damaged when tampered with, and intensive cleaning of interior components should be left to a professional. Fortunately, the most important parts can be cleaned by simply getting a cleaning disk (see below) and following the directions that come with it.
How to clean a CD-ROM drive in three simple steps
STEP 1: With the computer case opened for cleaning and the CD tray open, carefully blow compressed air in through the front of the CD tray opening. Do not blow with too high of a pressure as this may damage sensitive components. If the CD tray is closed and the power disconnected, you may need to open it using a paper clip. Press the paperclip into the tiny hole by the CD tray.
STEP 2: Buy a lens cleaning kit. For cleaning CD players and dvd players we recommend the Memorex CD/DVD Laser Lens Cleaner for its name brand quality, low price, and ease of use.
STEP 3: Use the CD drive cleaning kit as directed. Directions for using the Memorex CD / DVD laser lens cleaner are as follows:
1. Insert the Laser Lens Cleaner into your disk player and press play.
2. Listen and follow the audio voice instructions to guide you through the cleaning cycle and audio system checks.
3. After use, store the Laser Lens Cleaner in its case to prevent brush contamination.

Source: http://www.computerdust.com/clean_computer/clean_cd_rom_drive.html

Computer Cleaning Part. 4 of 5


Why clean your computer mouse?
It is probably the piece of computer equipment needing the most frequent cleaning. Dust, spilled food and drink frequently find their way into the computer pad or surface the mouse is rolled on, where it is promptly rolled up unto the mouse ball. From there it collects inside the mouse on the little rollers that are supposed to turn freely in order to move your pointer in the x and y directions on the computer screen. When sticky liquids and dirt particles prevent the ball or rollers from moving, you know it's past time to clean the computer mouse.
First, get some supplies:
Soft, lint-free cloths
Q-Tips or foam swabs
Canned, compressed air
Isopropyl alcohol
How to maintain your computer mice in eight simple steps
STEP 1: Disconnect the mouse cable from the back of the computer case.
STEP 2: Lightly dampen a cleaning cloth with isopropyl alcohol and wipe down the outside of the computer mouse and mouse pad. If you are concerned about damaging the plastic, dilute the alcohol 50:50 with water or use a mild detergent solution instead.
STEP 3: Remove the bottom cover of the mouse. To do this, turn it over and note the directional arrows that indicate the direction of rotation, or how to slide it off. Press with your fingers in the direction of the arrows and then turn the mouse right side up, letting the cover and mouse ball drop into your hand.
STEP 4: Wipe the computer mouse ball with a lint-free cloth dampened with isopropyl alcohol. Put it aside.
STEP 5: Dampen a swab with isopropyl alcohol and clean between, around and on top of the keys. Change swabs as they become dirty. You may need several swabs.
STEP 6: Replace the mouse ball and cover.
STEP 7: Wipe the mouse cord. Lightly dampen a cleaning cloth with mild soap solution and gently pull the cord through the cloth. Too tight a grip may damage it. Dry the cord with a dry cloth.
STEP 8: Plug the mouse back into the computer.

Computer Cleaning Part. 3 of 5


Why clean your keyboard?
Germs and disease spread rapidly when several people use the same computer and don't keep a clean keyboard. The effect could be even worse when dirt, dust, fingerprints and spilt food particles provide a home for bacteria to thrive on your keyboard. Spilled food and drink can make for sticky keys and a malfunctioning keyboard. For these reasons and more knowing how to clean your keyboard is a worthwhile endeavor.
For a clean keyboard, let's round up some supplies:
Soft, lint-free cloths
Q-tips or foam swabs
Canned, compressed air
Mild detergent solution or spray
Isopropyl alcohol
Small computer vacuum (optional)
How to clean a keyboard in seven simple steps
STEP 1: Remove the cable from the back of the computer case.
STEP 2: Use a vacuum to remove food, dust and debris from between the keys. If no vacuum is available, turn the keyboard upside down and gently tap on the back side to dislodge debris.
STEP 3: Aim between the keys and blow canned, or compressed air to remove remaining dust and debris. Use short puffs of air applied at about a 30-45 degree angle to the keyboard surface. Alternate between blowing between the keys and tapping the keyboard upside down to dislodge particles until it is clean.
STEP 4: Lightly dampen a cloth with a mild soap solution and wipe down the outside of the keyboard. Do not spray sooap solution directly onto the keyboard.
STEP 5: Dampen a swab with isopropyl alcohol and clean between, around and on top of the keys. Change swabs as they become dirty. You may need several swabs.
STEP 6: Wipe the keyboard cord. Lightly dampen a cleaning cloth with mild soap solution and gently pull the cord through the cloth. Too tight a grip may damage it. Dry the cord with a dry cloth.
STEP 7: For dusty or dirty manufacturing environments a good keyboard cover is recommended. X-Style Universal keyboard covers by Rota Technologies, Inc are very easy to use, economical options.
Computer keyboard covers: The X-STYLE Universal Keyboard Protector by ROTA is a simple, yet effective solution to protect your keyboard against dust, dirt, grime, oil, spilled beverages and more. One size fits all keyboards.
This computer keyboard dust cover is made from a super thin, yet strong & durable material. Installation is easy. The protector covers the full keyboard and gives the user the ability to type like there is no cover present. The fit is perfect for every model keyboard on the market.

Source: http://www.computerdust.com/clean_computer/clean_keyboard.html

Computer Cleaning Part. 2 of 5


Why clean computer screen and monitor?
Dirt, dust, fingerprints, wood chips—you name it, there is a lot of debris that can collect on your screen and on top of your monitor. On the screen these foreign particles and smears distort the image, making it difficult to read. They may even cause permanent damage to sensitive LCD and CRT screens. Collecting on top of the monitor, a layer of debris can clog the ventilation cooling ports and cause monitor overheating. In an extreme case an overheated monitor may start a fire.
The following instructions apply for cleaning regular (SVGA) monitor screens as well as LCD screens and CRT screens.
Before you begin, collect the following cleaning supplies:
Soft, lint-free cloth
Screen cleaner spray (read caution before cleaning monitor)
Compressed air and/or anti-static computer vacuum
Mild detergent solution or spray
How to clean your monitor and screen in six simple stepsSTEP 1: Unplug the power supply cord and cable from the back of the monitor and allow it to cool for at least 20 minutes.
STEP 2: Vacuum the outside of the monitor, particularly the cooling grooves, holes or slots in the top surface where heavy dust or other debris may have collected. If you don't have a vacuum, blow canned, or compressed air in short puffs at an angle to the monitor surface. The goal is to remove dust and dirt without letting anything fall into the ventilation holes.
STEP 3: Lightly dampen a cloth with a mild soap solution and wipe down the outside plastic portions of the computer monitor.
STEP 4: Clean the monitor cables and power cord while they are disconnected. Lightly dampen a cloth with mild soap solution and gently pull the cables and cords through the cloth. Too tight a grip may damage the cables. Dry the cables and power cords with a dry cloth.

STEP 5: Check the documentation or call the manufacturer to find out if your monitor screen has anti-glare, or other delicate coatings. If so, ask the manufacturer for cleaning instructions. If it does not have these special coatings you may spray a window cleaner unto a lint-free cloth and wipe it clean. Do not spray directly unto the screen. Chemicals may drip inside the monitor and damage it.
Absent manufacturer instructions, you can safely clean and protect all LCD, plasma, HDTV, flat screen, and CRT displays and monitors with a Klear Screen cleaning kit. Klear Screen is the only formula used, sold, or recommended by leading manufacturers such as Apple, Dell, Sony Vaio, HP/Compaq, Fujitsu, IBM, Panasonic, Samsung, Sharp, Toshiba, and ViewSonic.
STEP 6: For dusty or dirty manufacturing environments using a ShopShield™ computer monitor dust cover is recommended. The innovative ShopShield covers are breathable membranes that totally encase your computer or monitor to filter out dust and dirt, but at the same time allow clean, cool air to pass through. It is an economical way to allow you to keep your computer protected even while it is running.

Source: http://www.computerdust.com/clean_computer/clean_computer_screen.html

Computer Cleaning Part. 1 of 5


CPU and Tower
Regular computer cleaning is recommended to prevent overheating and glitches caused by dust inside your CPU. In addition to shorting out electronics, dust can act as an insulating blanket and prevent heat sinks and other componants from cooling off. A few minutes of careful cleaning will remove the computer killing dust from your CPU's fans, heat sinks, electronics and case, allowing the heat to dissipate and cool air to flow unimpeded throughout your system.
For a dust and grime-free cpu and tower we need some computer cleaning supplies:
Anti-static wrist strap or anti-static mat
Soft, lint-free cloth
Canned, compressed air
Mild detergent solution or spray
Q-tips, preferably foam
Computer vacuum (optional)
CD Drive cleaner disk
How to clean your computer CPU in ten simple steps
STEP 1: Shut down the CPU and remove the power cord from the electrical outlet.
STEP 2: Remove the power cord and cables from the rear of your computer.
STEP 3: Place your computer tower on a stable platform above the floor. A floor's static charge may damage the computer, even a wood or vinyl floor. It is best to do the cleaning outside the building, or in a maintenance shop due to the air-borne dust created.
STEP 4: Clean the outside of the computer case by lightly dampening a cloth with a mild soap solution and wiping off the dust. Use a computer vacuum, if available to remove dust from the fans, air intake and exhaust areas at the rear of the computer.
STEP 5: Open the computer case, using a screwdriver if required. If it is unclear how to open it, carefully inspect the rear of the case for screws that may need to be removed. Or, as is the case of some recent Dell computers there are large buttons on the top and bottom of the case that must be depressed before the side of the case swings open (see right). Typically, the left or right side of the case will come off, it will swing open like a hinge, or the main case will lift off its base in a single piece. Consult your owners manual.
STEP 6: Open the CD-ROM drive tray and carefully blow air in, and around the tray to remove dust. Press a paper clip into the tiny hole beneath the CD tray to open it.
STEP 7: Put on an antistatic wrist strap and attach it to an electrical ground, like a metal plumbing fixture or the metal frame of equipment you are servicing (see photo). This will ensure you do not damage sensitive electronics due to static discharge from your body. Alternatively, use an anti-static mat.
STEP 8: Clean the computer inside as well as around fan air intakes and exhaust (see photo) by holding canned air or compressed air at a distance of at least two inches away and blowing away the dust. Clean fan blades, motherboard and other areas. If using canned air, use short puffs. Attack clumps of dirt from different angles to loosen. Take care not to touch anything inside of the case. Do not turn the can of air upside down as this may cause liquid to come out.
STEP 9: Replace the computer case cover.
STEP 10: Clean cables and power cords while they are disconnected. Lightly dampen a cloth with mild soap solution and gently pull the cables and cords through the cloth. Too tight a grip may damage the cables. Dry the cables and power cords with a dry cloth.
STEP 11: For a dusty or harsh computer environment using ShopShield™ computer dust covers are recommended. The innovative ShopShield is a breathable membrane that totally encases your computer or monitor to filter out dust and dirt, but at the same time allow clean, cool air to pass through. It's an economical way to allow you to keep your computer protected in dusty conditions even while it is running.
Other things to consider:
Cleaning your computer room regularly is important. Make sure all equipment is covered first and try to minimize air-borne dust.
Janitors and other staff may not be aware of how easily they can damage your equipment and should not be responsible for computer maintenance. A professional cleaning service should be used if you are unable to do it yourself.
Your computer room environment should be kept cool and relatively dry.
Start a regular computer maintenance program.
Cleaning your computer is essential to keep your data safe and extend the life of your equipment:

Source: http://www.computerdust.com/clean_computer/computer_cleaning.html

Things to Consider When Buying a Computer


Top Ten
When entering into the world of computers it can get very easy to get confused and loose sight of your goals and sometimes your budget. Hopefully I can help you set some realistic goals and make sure you get the computer you really want and need.

1. The first thing that most of us are constrained to is budget so this is the first thing you should consider. We always want the best but we need to be grounded on what we can afford. So Get a budget and stick to it.

2. The next thing you should be looking at is your requirements. Do you need a laptop or desktop? What is the machine going to be used for? Once you have done this go back to number one and see if these are compatible often they are not first time round. You either need to adjust your budget or adjust your goals to make them more compatible with each other.

3. Once you have ironed out the bugs it’s time to move onto the computer itself. There are many things to consider when actually buying the computer, here I will list the most important so you can choose wisely.

4. The Processor is the most important factor when choosing a computer nowadays and there are many factors in processor choice the main thing is that in my opinion Intel are at the moment making the best chips and their core 2 duo range is the best so go for one in this family and you will be ok.

5. Next it is on to RAM, now this is simple for most just go for as much as possible and remember if you go above 2 GB then you must make sure you get windows vista 64bit as your operating system.

6. Hard drive is the next piece you should tackle. Again for the ordinary person it should be just a case of bigger is better.

7. Graphics, now all computers come with some form of graphics built in. But my recommendation is to go with something a little better possibly from NVIDIA.

8. Now that should be your main considerations when thinking of the hardware. The next thing to think about is software now many computers come with windows vista as standard, this should be premium at least I wouldn’t even think about basic.

9. The last thing to do with the actual computer is a good virus and spy ware package. Don’t be under any illusion this is possibly the most important part of protecting your computer. It will get attacked at some point be prepared when it does.

10. Finally the internet, get a good internet provider broadband at least, no computer I complete without this basic of add-ons.

I hope this list is helpful in helping you make vital decisions when buying your new computer.
Please visit me and maybe we can help you in your building you a custom computer.
Source: http://www.streetdirectory.com/travel_guide/116135/computers/top_ten_things_to_consider_when_buying_a_computer.html

How to Prevent Hacking of your PC? Part. 3

Internet Security Facts
Between 80% and 90?/0 of successful computer attacks come from insiders.
Thirty percent of employees would do the unethical thing, given the right amount of money: Companies only catch 2% of security break-ins.
Most hacker-s are single males, age 16 to 28, from middle-income families.
Of 8,932 computers attacked, 7,860 were broken into, 390 detected the attack, and only 19 reported the attack, according to the Department of Defense.
In the first six months of 1993, the Forum for Internet Response and Security Teams identified more than 2 million sniffers running on Internet hosts.
For every incident a human' operator finds, he misses 75, according to Los Alamos National Laboratories.
Source: David Dumas, GTE Laboratories
Hacking Help
The good news is that help regarding hacking exists all over the Internet The bad news is that the help usually is for the bad guys, said David Dumas, GTE Laboratories principal ,member of technical staff. To see some sites where hackers learn their techniques and communicate with one another, check out the following:
www.thecodex.com/hacking.html
www.insecure.org/index.html
www.fc.net/phrack
utopia.hacktic.nl/
verbosity.wiw.org/neogenesis/features! hack.html
According to Cynthia Ward, Vestcom vice president of marketing and product development, several industry initiatives have sprung up to help companies ward off hack attacks. She pointed to The National Automated Clearinghouse Association (www.nacha.org) and Just in Time Solutions (www.justintime.com) for helpful information. Carriers also can find anti-hacking help from Purdue University (www.cs.purdue.edu/coast/coast-library.html), CTIA (www.wowcom.com),The Forum of Incident Response and SecurityTeams (first.org/). The Security Assurance Company (www.icsa.net/), Information Security Magazine (www.infosecuritymag.com/and Secure Computing (www.sctc.com/).
Tax Evasion?
Security is not the only thing you have to worry about when it comes to e-commerce, according to Arthur Andersen's Interconnect. U.S. Congressman Billy Tauzin, chairman of the House Commerce Committee's Telecommunications Subcommittee, predicted consumers will soon pay taxes on e-commerce. Andersen said the National Governors' Association reports states could lose $15 to $20 billion a year in sales taxes due to e-commerce's popularity.

More:

How to Prevent Hacking of your PC? Part. 2

Inside Jobs
Roland Jones, Sun Microsystems senior product manager for Java security, said you can spend all of the money in the world on encryption, but security is a bigger package.
"Why go off the deep end and encrypt every little thing, only to find out everyone has their passwords stuck on their computers?" he said.
The whole package includes better business practices, Dumas said. You should train all existing staff and new hires about Internet security and give a refresher course every year. Support should come from the top, down. One way to test your business processes is to think about whom you would call if you discovered a security breach. You should have at least one full-time person dedicated to securing infrastructure.
Finn noted that employee security breaches also are an issue. Insiders often inappropriately use company information.
"There are not any foolproof technological means for preventing that; you have to rely on good procedural measures to address those kinds of risks," he said.
If you have a database server that is storing credit-card information or user profiles, you can do several things to make sure your system can't be compromised. Methods include doing background checks and maintaining strong host security. Host security means locking down and limiting access to your systems where you maintain sensitive information. You should issue policies stating which users are allowed to log in to a computer, who is allowed to maintain systems and how often employees must change passwords. Keep records of who accesses internal systems, and audit what they do when they are connected.
Dumas added that sometimes untrustworthy employees will defend criminal actions by saying that nobody told them breaching inside security was wrong. You should notify employees that you don't permit internal breaches. Another way to maintain security while connected to the Internet is to partner with security companies or organizations. When programmers develop a product, or when web designers create a site, they think about functionality and design rather than security. Asking a cryptologist or security specialist to check out your system can plug security holes. Vestcom's Ward said organizations such as the National Automated Clearinghouse Association are working to set industry standards for EBPP that address security and passing data.
Ward pointed out you should ask your bank how it is enabling electronic information exchange, and follow its lead. Most big banks have their own initiatives and will share them with you. You also should make sure you are dealing with a reputable party before you ask a company to help you. Finn said you can gauge reputation by asking a company if it is certified by the International Computer Security Association. This industry group evaluates firewalls and ensures they meet minimum security criteria. Potential partners should be familiar with the various kinds of attacks that hackers can mount against computer systems. Look for a company with vast experience, and check its references.
Ryan said you can have the best security system in the world, but the real challenge is implementation. Look for vendors with the most experience in security. Government agencies, for example, are not likely to hire amateurs, so references such as post offices or other federal agencies are a good sign the vendor is legitimate.

More:

How to Prevent Hacking of your PC? Part. 1

Hack Attack
Before you can implement web-security solutions, you first must understand potential problems. David Dumas, GTE Laboratories principal member of technical staff, said passive attacks are when hackers listen and collect data, often as a prelude to an active attack. Active attacks are when they change, delete, alter or add to your data.
Dumas explained the various ways people can hack into your billing records and data through the World Wide Web. Social engineering is a common, non-technical way to access system passwords, and sometimes all too easy. The attacker socializes with company personnel to find out people's names and the departments in which they work, then he name-drops in conversations with other employees to learn user names and passwords as a front end to an electronic attack. Once he has that information, he can break through firewalls to look at customer records, credit-card numbers and security PINs.
Other hackers will pose as employees. They might make an authentic-looking company badge and walk into your building or apply to the company as a janitor. Sometimes a hacker will install a sniffer while he is there. Dumas said a sniffer, which is commonly available from various Internet sites, plugs into a network jack and collects user names and passwords.
"It could be on your box today," Dumas said. "You can't detect it."
Some hackers don't even have to install a device because they find Post-It notes in plain view with passwords written on them.
Hackers have other means to get at your passwords. One is through simple trial and error. If they know you have security in place, hackers actually will slow down attacks to avoid setting off bells and whistles, Dumas added. Password-guessing software, such as Cracker, also facilitates attacks. Some can listen to your system, capture passwords and then knock the legitimate user off the system so the hacker becomes the user.
Attacks known as man-in-the-middle, spoofing and Trojan horse also can capture passwords and PINs. A "man-in-the-middle" attack is when a hacker appears to the server as if he were the legitimate remote agent. To the end user, he looks like the server. The user unknowingly sends credit-card information to the hacker. Spoofing occurs when a user logs in to a remote system. The workstation is not actually connected to the remote system, but it generates the log-in banner and prompts the user to input his user ID and password. Software captures the information and kicks the end user off the system. In a Trojan horse attack, the hacker alters the local system to allow a later entry. He may use a bogus code to bypass system controls to hide the existence or current status of an account.

More: http://web.ebscohost.com/ehost/detail?sid=1fff7848-8fc8-464a-8ccc-fd71bf9a203d%40sessionmgr11&vid=5&hid=14&bdata=JnNpdGU9ZWhvc3QtbGl2ZQ%3d%3d#AN0001858715-3

Computer hackers...


What is a computer hacker?

The article focuses on computer hardware hacking and the methods and rationales for this practice. A computer hardware hacker operates in a mode that is the opposite of an academic researcher, the author argues. The author focuses on the hacking work of Andrew Huang while he was a Ph.D. candidate at the Massachusetts Institute of Technology (MIT). Huang worked on taking apart the hardware of Microsoft's original Xbox game device in 2001. His work identified potential security vulnerabilities of the device and gave Microsoft insight into what computer hackers may choose to do with such devices.

A BRIEF HISTORY OF HARDWARE HACKING

Hardware hacking dates back almost 200 years. Charles Babbage's Difference Engine In the early 1800s was a mechanical form of hardware hacking. The method William Crookes used to discover the electron in the mid-i8oos might have been the first form of electronics-related hardware hacking. Hardware hackers have since been involved in the development of wireless telegraphy, vacuum tubes, radio, television, and transistors. Benjamin Franklin, Thomas Edison, Nikola Tesia, and Alexander Graham Bell were all hardware hackers. So were William Hewlett and David Packard and Steve Jobs and Steve Wozniak.
Contrary to how the word hacker is sometimes used to describe criminals breaking into computer systems, a hacker can be defined more simply as someone involved in the exploration of technology. A "hack" in the technology world usually defines a new and novel creation or method of solving a problem, typically in an unorthodox fashion [2-4]. Here, I focus on an idealistic vision of hardware hackers—the good guys—even though some people, corporations, and agencies may use the same techniques for illegal, illegitimate, or unethical purposes, seeking some sort of financial gain or market advantage. Hardware hacking means different things to different people, coming down to personal preferences, as in art or music. Someone can be taught, to a point, to have the hacker mindset and break the mold of conventional thinking, but hacking goes much further. It is a passion, a drive, something that stems from some amount of anti-establishment and anti-authority sentiment coupled with the desire to do things on one's own agenda and with one's own hands. Hardware hacking is the technologists' version of the classic
phrase "Don't judge a book by its cover." Hackers are driven by a variety of motivations:
Cunosit^ and jun. See how things work, scratch the curiosity itch, and have fun experimenting with and modifying products;
Education. Learn by doing;
Improvement and innovation. Build a better mousetrap;
Consumer protection. Ensure a product does what its marketing pitch claims it to do. Often distrustful of marketing or sales literature, hackers want to find out for themselves whether certain claims are true and how they can make a particular product do more; and
Security. Test whether hardware devices are secure, identifying failures or weaknesses. Beyond strengthening the perceived value of a product, it allows users to mitigate the risk of an attack by updating, fixing, or discarding the product.
Most hardware hacks fall into four categories:
Personalizing and customizing. Often called "hotrodding for geeks" it includes modifications, custom skins, and even art projects (such as creating an aquarium out of a vintage computer);
Adding functionality. Making the system or product do something it wasn't intended to do (such as converting an iPod to run Linux or modifying a classic Atari 2600 video game console to support stereo sound and composite video output);
Improving capacity or performance. Enhancing or otherwise upgrading a product (such as expanding the recording capacity of a TiVo box by adding a larger hard drive, modifying a wireless network card to support an external antenna, or overclocking a PC's motherboard);
Defeating protection and security mechanisms. Included are finding "Easter eggs," hidden menus, and backdoors in DVD players or video game consoles or creating a custom cable to unlock the secrets of a cell phone.
Reverse engineering, generally viewed as a subset of hardware hacking, is essentially the art of learning from practical examples and experience. Examining technologies or any kind of product to see how they work is an integral part of the hardware hacking process and is a great way to learn the state of the art. I use reverse engineering to add to my mental toolbox of circuit designs, manufacturing techniques, and printed circuit board layout tricks, all of which improve my knowledge of the product development process.
Reverse engineering and hardware hacking represent continuing education, interconnected with developing new products and technologies.