Ads by Google 1. How to Create a Letter With Microsoft Word Processor in XP Or Vista

Most people that have not used a computer before can get intimidated. There is no reason for this. If you are able to use the internet to find this article, than you have the ability to use any other program on your computer. There is also a whole lot more you can do with the word processor, than the old typewriter.


To make a letter the most basic use of a word processor, Open your word processor by finding the icon, or looking for word processor in your programs. Once you find the word processor (usually located on the desktop) open the program.

Once you have opened the program open the word file, and choose the letter document, and then a letter wizard should open. Once it opens you can choose the letter style, and then the letter wizard will open.

When the letter wizard opens fill out all the formalities such as who it is to, from, date, etcetera. The wizard will then close. You will see where to place the body of your letter. Look for an insert key on your computer then press it, and use your mouse to put the pointer in front of the point where you wish to start your letter, just start typing until your done. Then hit insert again to turn it off. Then go through the grammar and spelling by pointing at each word that is highlighted and right click. A box will then come up that will show you how to correct your errors. In addition you can go to tools, and find your thesaurus if you need it.

To keep your letter from being generic, there is a tool bar at the top of the page with a lot of options to spruce up your letter. After you have finished your letter, you can put the pointer at the top of the document by holding ctrl and home at the same time. Then click the left side of your mouse, and click and hold and drag to the end of the document until it is all highlighted in black. To change your font (letter style) you can go to formant at the top of the page, and choose the font and size you like.

If you want your paragraphs indented, then you will choose format paragraph, and this will make your indentations, and line spacing which is to decide if you want one or two lines between the end of each sentence. If you want to put bullets , to make a point highlight the area and go to format bullets.

To insert your date, just go to insert and choose insert date. If you wish to insert a picture go to insert picture, and insert the object or clip art. To underline you can highlight a word then choose the u with the underline at the top of the page and underline the specific words. The same goes for making some letters bold, aligning your letter, and numbering.

You can also add some fancy letters by going to insert artwork, highlight and choose the one you like and put your letters or words you want to add into your letter. If you do not like the artwork then highlight and choose the delete key on the computer to take it off the page.

Some key shortcuts are ctrl, home takes you home. ctrl end takes you to the end of a page. you have page up and down as well. alt s will save you progress. It is best to save to documents when finished until you get to know your computer pretty well. When you press ctrl and s at the same time a box will come up for you to name your letter. If you wish to print go to file print, If you wish to email go to file and send. When your satisfied your done. Then just click on the x in the upper right corner and close it.

Good luck and look I will make many more article on how to use you computer.

Skyler Overton has been certified to use numerous Microsoft programs, and through her employment as a business manager has 10 years of experience with numerous software programs.

Skyler is a wife and parent of 4 children, a member of various civic club. She has also been a coach and trainer of software, and various other duties in the business world.

Skyler has been writing articles, and songs for about 4 years, and is currently working on writing a book which should be published by the end of 2009.

Read More

The 5 Best Computer Buys of 2009

My pick for the 5 best computers buys for 2009. Computers that have everything you want, but won't ruin your bank account.

I recently decided to buy my father a new computer (his was a dinosaur). Like most people in the market for a new computer, I wanted one that didn't cost a small fortune, but was still good. What I found was quite a bit of stress and a LOT of hype. Everyone claims to be the best for your money, so how do you know if it's true or not without being a computer genius? So I decided to write this article with the hopes of saving you some time and tears when searching for the perfect computer. It is a simple list of my pick for the top 5 best computer buys of 2009.

Please note that I am not a computer guru and this was not written for computer gurus. It is a quick overview for the average Joe. There are some spec for each computer, and a link in my bio to find out more information about each model if you desire.

5. HP Pavilion s3500f Desktop

HP has always been a trusted favorite of mine. The Pavilion is a well-established product, and for good reason. This particular model comes with:
-AMD Sempron
-4GB DDR2 SDRAM memory
-a 500GB hard drive
-Windows Vista Home Basic 32 bit
-and a whole lot more.
It's a great computer for home use and is an excellent deal.

4.Acer Aspire M3201

Acer is a brand I personally have not owned before. However, the brand gets great reviews and the prices are unbeatable. I've been hearing nothing but good things about it from friends and family members that own Acer computers, as well as the professionals. This particular model has:
-AMD Athlon processor
-3GB DDR2 SDRAM
-320GB Hard Drive
-and Windows Vista Home Premium 32 bit

3. Gateway DX4200-11

I think that the greatest thing about this computer is simply that it is backed by Gateway. They've always been very good with technical support and customer service for their products. I've always had very happy dealings with Gateway. The computer is a bit higher in price, but comes with:
-AMD® X-4 Quad-Core Processor
-6GB DDR2
-a 750GB hard drive (750 GB makes my head spin!)
-and Windows Vista Home Premium 64 bit

2.Acer Aspire X3200 Desktop

Yes, another Acer. You can tell that I fell in love with this brand pretty quickly. This model is actually the one I finally decided to buy for my father. It comes with:
-AMD Athalon processor
-4GB DDR2 SDRAM
-500GB hard drive
-and Windows Vista Home Premium 64 bit

The price is slightly higher than the other Acer listed, but the upgrade was well worth it for me. My father went from having a dinosaur to having a computer twice as good as mine!

1. Apple iMac Intel Core 2 Duo 24" Desktop

This is actually the computer I've been eyeing for myself recently (Don't tell my dad). A few months ago a friend of mine got one and every time I go to her place I ask to use it! It's quite a joy. I just fight with myself over the price tag and whether or not I truly want to switch to Mac. This is at the top of my list because it's the best. If you are in the market to pay this much for a new computer, this should be the one!
-Intel Core Duo processor
-3GB DDR2, 320GB hard drive
-Mac OS X v10.5 Leopard
-24' flat LCD screen monitor

This is my personal pick for the top 5 best computer buys based on the research I went through. Hope it saves some of you time and money!

Chrissy Dean has been published all over the web for years on topics such as relationships, healthy eating, exercise, and saving money, all with the goal of helping everyone live happier, healthier lives.

Read More

How to Get Someone You Know Switch to Macintosh

This is a honest article that will tell you how to convince users to switch to Mac. It might not be what you expect ...

If a Mac is so great why doesn't more people use them? Almost everyone I know are happily using Windows not knowing what they are missing. Often they ask me: why are you using that Mac? I get this question from time to time and I have developed a good routine in how to answer those questions. You want to know how I confront this?

First I tell them that I use a Mac because I like it and it suit my needs perfectly. And then I do not give them anymore. Sometimes they say OK and move on with their life. If that is the case it is OK. You do not have to defend what you like for anyone, that is your choice alone.

Other times they start asking questions and these questions I try to answer as honestly as possible. If I sense more interest from the person I usually start demonstrating a feature I like with Mac OS X. This can spark more questions from the subject and eventually get the snowball running.

As a person I am not the one that likes being subjected to sales pitch. And therefore I try to keep the same attitude when I need to speak to others about a product I like. Sometimes the person asking you questions actually expect sales pitch from you. Prove them wrong! This can also spark some interest because your answer is unexpected. It is not sales pitch.

If someone asks me what kind of problems I have had with my Macs I am honest there too. For example I had a bad battery once, Apple replaced that battery without question. If you keep being dead honest it will be easier for you to convince users to switch. In the end it is about what I like, not what others like me to use.

Read More

Webcam of My Laptop Will Not Function Or the Webcam Does Not Work

The cause of the issue can be due to corrupted webcam drivers or faulty webcam application. We need to check with the application and drivers to resolve the issue.

This problem can occur due to various reasons, some of them include, corrupted webcam application or software, corrupted webcam drivers, etc.

Resolution

Test your webcam with a new webcam application (you may try with Yahoo Messenger, Skype, Windows Live Messenger, Quick play, Youcam, etc)

Check if the webcam works with the new application.

If the webcam works well with the newly installed application, then the problem could be with the built - in webcam application or with the one that you have been using earlier.

Uninstall your previous application (the one with which the webcam did not work) and reinstall it.
Check now, if your webcam works.
If the webcam does not work, use the one with which your webcam works.

If the webcam does not work with any of the applications or software, then the problem could be with the corrupted webcam drivers.

Press and hold Windows Key and break key simultaneously.

In the System Properties window, select Hardware tab and click on Device Manager.

Click on "+" sign next to Imaging Device and check for any yellow exclamation mark beside the webcam device, if there is a mark, then it indicates that the device is in bad condition.
The device may function even at this situation but also can fail sometimes.

If you don't find any exclamation sign next to the device, then follow the below steps to isolate the problem.

Reinstall the webcam drivers from Recovery CDs or from the Recovery Partition in the notebook.

Just check now if your webcam works.

Also test the issue by reinstalling the new drivers from the webcam support link and if you are using the webcam application that came with your notebook then visit your notebook support website and in the drivers page you will be able to find the recently released webcam drivers.

After reinstalling or installing the new drivers check for the problem.

Ensure that the Startup type of Windows Image Acquisition (WIA) service is set to Automatic, if not set it to Automatic. WIA is a service that is required for running the webcam applications in the system and needs to enabled.

You can do this from Services, click on Windows key and R simultaneously to open the Run window.

Type services.msc in Run window and click on OK.

Now in the Services window, scroll down to Windows Image Acquisition (WIA) service and check its Startup type. If it is not set to Automatic, then double click on the service and set it as Automatic (beside Startup type) and click on "Start" to start the service and click on Apply. Click OK.

Check if your webcam works now.

If the problem still persists, then the issue could be due to an internal webcam hardware problem.

Before concluding if the problem is related to hardware, please check in your notebook support website for any diagnostic tools that you can run to fix these issues and sometimes you might have to be online to perform these diagnostic tests.

If you are running Vista in your notebook, ensure that it is Vista Service Pack 1.
If not, upgrade to Vista Service Pack 1 since it comes with a new webcam driver which is like a hotfix to the one in Vista.

Read More

How Do You Determine the Right Wide Area Network (WAN) Architecture For a Computer Network?

One of the most complicated decisions to make for an IT department concerns the architecture for a multi-site voice/data network. Should the network be based on simple T1 point-to-point bandwidth circuits? How about burstable DS3 bandwidth or maybe a single OC3 bandwidth cloud? No matter the bandwidth chosen .... the most efficient design should base the communication backbone on a MPLS configuration (Multi-Protocol Label Switching).


One of the most complicated decisions to make for an IT department concerns the architecture for a multi-site voice/data network. Should the network be based on simple T1 point-to-point bandwidth circuits? How about burstable DS3 bandwidth or maybe a single OC3 bandwidth cloud? No matter the bandwidth chosen .... the most efficient design should base the communication backbone on a MPLS configuration (Multi-Protocol Label Switching).

To get there, first and foremost in deciding about the WAN architecture of any organization communication network you must determine ....

- How many locations you would like to connect?

- Architecture - hub and spoke or mesh architecture?

- What applications would be run on this network .... Voice, Video, Data, all of the above?

- Precisely which applications will be run in case of Data?

- What will be the % each will take up of your QoS, the total of all three should be 100%?

- Voice is the premium level QoS and hence the most expensive as it is a real time communication, followed by video and then data.

- How many users precisely will be using the network at a given point of time at each location?

- What will be the concurrency factor? Are you are looking for 100% concurrency or you can manage with lesser concurrency?

- What is the scope of scalability at each location and hub location?

- Will the access to internet also be given to users?

- Internet at a central location can help you in implementing and enforcing various security policies of your organization.

- Do you want to give access to the network resources to a mobile user?

The answer to all these questions will help in arriving at the MPLS bandwidth required at each hub and spoke location.

Honestly speaking no organization should ideally try to do this calculation themselves. Instead they can hire a consultant or a telecom service provider to do this activity as they are experts in designing this solution. With their help you can easily decide upon the bandwidth for each location, select suitable router, make redundancy plans, routing the traffic on Atlantic or pacific routes, blah blah.

For help walking through the analysis .... and determining the best solution .... take advantage of the free help at DS3-Bandwidth.com.

Ideally I also recommend to give the freedom of providing and managing the routers at each location to the Telecom service provider. Then it becomes a managed solution and the service provider can easily monitor your network in the event of an outage. They then can remotely login into the routers and manage your complete network giving you higher uptimes and SLAs.

In the end .... take a deep breath and work through the steps above. Following this simple game plan will get you to the right decision for your organizations network architecture.

Read More

Living in the Computer Age

The incredible speed and capability of the computer makes it a huge asset. The tendency to lose touch with our own humanity is a risk we take. Saying that the world has come a long way since the advent of the computer is a vast understatement and though no one questions the distance we've all come, some, including myself, wonder about the direction.


Saying that the world has come a long way since the advent of the computer is a vast understatement and though no one questions the distance we've all come, some, including myself, wonder about the direction.

It is a staggeringly different world than when I was young and in school and striving to get my speed up to 80 words per minute on an electric typewriter. So much of the progress that has come about as a result of the electronic infiltration of our world has been good but a high price has been paid in many areas. True, people are able to get specific information at the touch of a fingertip that would have been difficult or at least much more time consuming to acquire at an earlier time. Students are able to accomplish a lot more than ever before and people can handle much heavier workloads with the aid of a computer, however, what has been gained in accessibility and speed has been greatly compromised by a loss of personal interaction and decline of human relationships.

It's sad to see young people glued to their computer screens for hour after hour playing action games instead of being involved personally with other young people. They lose a lot of the valuable experience of forming friendships and relationships that can be such an asset to their lives. Many of the youth of today are not nearly as well rounded as those of earlier times and often are not as healthy as they spend too much time sitting and staring at a monitor rather than moving and using their bodies. Being overweight is a significant problem with a high percentage of our young people now and is a direct result of too much inactivity along with a high fat, low nutrient based diet.

The same is true for a large number of adults who are less active and in worse physical shape now than ever before. Moderation can be a great ally in most areas of our lives. We should use what is available and take advantage of improved techniques and modern conveniences without being consumed by them. It's hard to find the correct balance but it is important to keep working at it. Pulling back when you're in the midst of a whirlwind of tasks to be completed and problems to be addressed and looking again at the big picture helps to keep the right perspective. Paying proper attention to the things that are the most important to us is critical. At a recent commencement ceremony for the graduates of the University of Pennsylvania, the special guest speaker was Eric Schmidt, the Chairman and Ceo of Google. He had this to say to the graduates; "turn off your computer. You're actually going to have to turn off your phone and discover all that is human around us. Nothing beats holding the hand of your grandchild as he walks his first steps".

In those two sentences lie a profound truth and volumes of wisdom. Mankind has been intelligent enough to invent amazingly efficient machines that can be an enormous aid to our lives. Let's hope it's also intelligent enough not to let those machines jeopardize or take the place of what is or should be paramount in our lives.

Read More

Critical Steps to Protect You and Your Computer on the Internet

Ways to get rid of scam and computer threats. Malware software and incentive posts on the websites which can really harm your computer.There are many solution on the internet to get rid of terror and scam.The whole internet area can be assumed like a tiger! You have to dominate it...

As long as our world is evolving and the internet area is rising many threats are knocking at our computer door! Not only but also the internet scam can have multiple aspects, it can be sustained by a simple software which is hosted by your PC or even more the social network by itself structure can draw you to an expected road! Furthermore many mails lists are claimed to be unsolicited and they are so invasive in that way we cannot figure out which one is genuine or which one represents the real sender!

The web entirely can be so tricky -an unleashed tiger i can say which eats your thoughts! you are coming there but at least you don't know where you really are or where you really wanted to be. Also many widgets are posted to many websites which draw your attention with an obtrusive goal: only to be noticed or to be clicked at request. This is a critical time when anybody wants to make money using any way.

The computer intelligence offers you the possibility to express your feelings and to be more precisely to socialize with the others and to interact definitely with them.I have to recognize that nowadays is a common way to socialize with the others. As a skilled programmer you can code a complicated software !You can be really an innovator! But now comes the question: who is and for what goals does this fellow creates codes.Many of them are dedicated to this job and they are successful in this area but some of them proves to be a felon of this virtual world ! They are our enemy indeed...

Take care and surf safe

Read More

Resurrect Old Laptops (And Desktop PCs) With Linux

When an old PC can no longer run Microsoft Windows at an acceptable speed, you can breathe new life into it by removing windows and installing a modern version of Linux. Today it's easier than you may think. Users of Microsoft Windows will be comfortable with the latest graphical user interfaces that hide the underlying complexities of Linux.

A customer came to me with a low-mileage 1999 vintage laptop which she wished to use for occasional web browsing. (Laptop specs: Dell Inspiron 3500. 333 MHz CPU, 64 MB Ram, 4.7 GB disk. Every spec was about one-tenth of today's PCs!). It was running Windows 98 Second Edition. Microsoft stopped providing Windows 98 updates years ago, and Windows 98 is now very vulnerable to attack. Worse, today's anti-virus and anti-spyware programs won't run on it. Shouldn't she just scrap the laptop?

Since the laptop was in like-new condition, we decided to extend its life by injecting some 21st century blood into it. We topped up its memory slots with the maximum RAM (a mere 256 MB!) and replaced Windows 98 with Xubuntu 8.10. It's not Microsoft Windows, but to a user it appears similar, and includes a word processor, spreadsheet, graphics / photo editor, and Mozilla Firefox web browser. I've not been able to get its onboard soundcard to work, but everything else works. There are three big upsides to any Linux-based desktop operating system when compared to MS Windows:

* It frees the user from constantly worrying about Windows Updates to patch vulnerabilties
* No anti-virus or anti-spyware programs are needed (Yay! )
* There are no Windows licensing headaches.


A potential downside is that Windows applications won't run on Linux without the assistance of either Wine or running a copy of Windows XP within a virtual machine. If you have a tired desktop or laptop PC -- especially one without a legitimate Windows license -- consider breathing new life into it with some form of Linux.

Most are available for free, such as http://www.xubuntu.org/ I tried Damn Small Linux (too minimal for this case), Puppy Linux (it was okay, but just barely), and Xubuntu 8.04, 8.10, and 9.04. Xubuntu 9.04 added some features but did something to slow response to user inputs. I settled on Xubuntu 8.10. (Xubuntu imposes a lighter load on the hardware than Ubuntu because it has a leaner desktop.) You can first just boot with the Xubuntu (or Ubuntu) Live CD, to see whether it's acceptable and runs okay on your hardware. (Of course it'll be slow when booting off the CD-ROM drive.) If so, you can install it on your hard drive from the same CD-ROM. Oh -- one caveat: Xubuntu and its siblings may not install without problems on all hardware. I'm now fighting to get it to install on a 1.1 GHz AMD Athlon desktop PC -- I have no idea why it won't install on this system, yet it installed with almost no problems on the old laptop. Let me know of your Linux adventures, please.

Read More

How to Fix Your Registry Fast So That Your Computer Isn't Slow Anymore

Have you noticed your computer taking longer to follow your commands? Has its speed changed since you first bought it? Unless your hard disk is full, it is likely that your problem is in your computer's registry. To fix this, you will need a reliable and effective registry cleaner.

Have you noticed your computer taking longer to follow your commands? Has its speed changed since you first bought it? Unless your hard disk is full, it is likely that your problem is in your computer's registry. To fix this, you will need a reliable and effective registry cleaner.

Your PC registry starts to get errors and fragmented the more we use the computer because we enter more data every time, as well as make changes in our systems and setup. When the registry starts to get overloaded and full of errors, your computer will eventually crash. It is possible to fix it on your own but very risky, especially if you have no extensive experience in doing so. Therefore, do NOT even attempt to do this yourself.

Besides, if you can get a registry cleaner that can do the job for you effectively and quickly, then why not? There is one such program, RegCure which is very good and complete. It has features that other cleaners do not have. It is the most recommended registry cleaner today.

RegCure is able to restore your computer to its previous pristine condition, and give you the absolute headache-free cleaner in the market today. For one, RegCure can remove unnecessary or corrupted files, and corrects the system errors. It will fix the fragmented files and organize them properly so that your computer will perform much better.

It's like spring cleaning your registry from top to bottom, leaving you with a faster and more efficient machine. RegCure can do all this, making it a wise and worthy investment.

Fix your registry fast at http://www.slow-computer-solution.com



Read More

Data Correction and Cleansing Mechanisms

Sometimes on IT projects vendors during the sales cycle (and project managers during the engagement) underestimate the amount of time required to clean up key enterprise information. Technology helps in conducting this imperative exercise but is no panacea for sloppy data that needs to be cleansed.

One of the most overlooked issues during system implementations is data cleanup. Before going live with a new system, it's almost always wise to cleanse, fix, and consolidate data from the legacy system.

It's both really hard and pretty naive to look at fixing enterprise data in a vacuum. So, let's consider people, process, and technology together.

It is often the role of the consultant to identify potential or probable duplicates during a project. Whether using any number of specialized data cleanup tools or stalwarts such as Microsoft Access or Excel, I have found that it's typically not terribly difficult to identify potential duplicates--i.e., questionable records. The key word here is "potential", as many records need to be manually examined in order to consolidate, purge, or retire.

However, identification is simply the first step in the process--and often the easiest. After isolating suspect records, they must be investigated and ultimately fixed. Here's where it's usually a good idea to stop using phrases such as "not terribly difficult."

Some people become defensive when presented with data errors. Generally speaking, I try to say very innocently that "someone may have done something wrong." I find that it's much less confrontational than pointing a finger. Often, end-users are quick to plead ignorance or blame predecessors for mistakes. In the event that they themselves have made the mistakes (audit trails are pretty hard to dispute), the tone of the conversation is quite different. There's usually a reason that an end-user did what s/he did.

It's the client's role to ultimately make the final call on what to do with suspect records. Far too often, however, end-users do not have the time, desire, or skill set to make these calls. (See my post last month on the different focuses on consultants and end-users.) Failure to address data issues in a timely manner typically causes many problems, from cascaded delays on other project tasks to incomplete testing.

Conclusion

Sometimes on IT projects vendors during the sales cycle (and project managers during the engagement) underestimate the amount of time required to clean up key enterprise information. Technology helps in conducting this imperative exercise but is no panacea for sloppy data that needs to be cleansed.

With more than a decade of experience, Phil Simon assists organizations in all phases of systems consulting including vendor selection, project management, business needs analysis, gap analysis, system testing and design, end-user training, interface and custom report development, and documentation. The result: providing his clients with superior systems, increased ROI, and a healthier bottom line.

Phil is the author of the book Why New Systems Fail and a seasoned independent systems consultant. He started his company in 2002 after six years of related corporate experience. With his extensive knowledge of both well-known and homegrown applications, he has cultivated over twenty clients from a wide variety of industries, including healthcare, manufacturing, retail, and the public sector.

Phil is a graduate of the School of Industrial and Labor Relations at Cornell University (MILR) and Carnegie Mellon (B.S., Policy and Management). He lives in Northern, NJ, USA.

Read More

How to Send, Transfer, and Store Files Quickly and Easily

Backing up and transfer large files have always been a cumbersome task. The most direct solution is to use a local hard drive to back up all the data.

Backing up and transfer large files have always been a cumbersome task. The most direct solution is to use a local hard drive to back up all the data. The problem with this approach is that the hard drive is seldom portable. What happens if you wish to retrieve the files while you are traveling, or while you are in a cyber cafe? You would have no way of accessing your files.

Another solution would be to upload all the files to an online server. A server is accessible 24 hrs a day. However, you will have to use FTP (a software for uploading files) to upload your files. The process is cumbersome. Besides, not everyone likes to get involved with FTP.

The closest alternative, would be to use some kind of online application to store your files. Of course, you have to make sure that the application you are using is secure, reliable, and easy to use.

What to look out for when assessing a file transfer application.

Security concerns - Many web based applications are vulnerable. That is because coding can be easily viewed by everyone. Someone who is savvy in the programming language would be able to spot bugs (the geeky term for loophole) in the coding and they may try to make malicious attempts to hack the site.

To overcome this problem, some sites decide to release their applications on the Java platform. The coding for such software cannot be viewed easily, since the program is compiled. The first step a user needs to take is to download the Java application, and create a user account from the application. After that, log in using the same account to start transferring files. Sensitive information should be stored in the servers following industry encryption standards.

Transfer speed - Bandwidth is cheap these days, and most servers are sophisticated enough to offer you high speed transfers. Very likely, you may be uploading huge files. So you want the speed to be fast so that you don't have to spend all day waiting for a file transfer to be completed. Try to sign up for a paid service. Usually, a paid file transfer service runs at a much faster speed because the bandwidth is paid for. In addition, the fees deter other users from abusing the servers with excessive use.

Ease of use - The application that you choose should not be too fanciful or overly complicated. The ideal application should allow you to organize your files in a directory manner - the way you would manage your files on a local hard drive. That means being able to view your file names, directory hierarchy and so on. The moment you log in to your user account, you will see a virtual drive waiting for you. The virtual drive acts as your online hard drive. You may now copy, move, delete files as you normally would.

Send files easily - Since every user has a virtual hard drive, there is no need to upload files again and again to send to different users. With a single upload, the file can be sent to many users. The servers will compress the files and handle the distribution.

Uorale.com - The quickest way to transfer files

Read More

Spy Cameras You Can Use

If you are fascinated by spies and their high tech gadgets which we could see in the movies, you should be pleased to know that nowadays, you can use a spy camera yourself. The even better part is that whether you want it concealed in a hat, in eyeglasses or in a button, you can have it your way.

If you are fascinated by spies and their high tech gadgets which we could see in the movies, you should be pleased to know that nowadays, you can use a spy camera yourself. The even better part is that whether you want it concealed in a hat, in eyeglasses or in a button, you can have it your way.

This is because spy cameras are getting more popular. The pinhole sized cameras that once amazed people would now be easily available on camera phones or on laptop webcams and if you can have it in cameras and phones, you can also have it in virtually anything you can think of and with that, you can use it in whatever way you can granting that you don't do anything unethical.

The Evolution Of The Spy Camera

Since the concept of hidden spy cam is quite fascinating, people commonly think of it as an exclusive item that is only limited to spies. The idea of hidden spy cameras is not very new and it dates back to 1917 wherein people would attach mini cameras to pigeons while the birds would fly around and constantly take pictures. During this time, the only ones who are able to do this were the ones who can afford a lot.

Nowadays, we could just laugh at the idea that people once used to attach cameras to pigeons as spy cameras. These devices have become so affordable that most of us would already have it. To have it concealed in an object that you could use for spying however is not that common but fortunately, you can still have it.

Even through a brief browse in the internet, you should be able to find some hidden spy cameras, some would come in a teddy bear of which you can put in your kids room or in wristwatches of which you can take videos while pretending to check time.

Some Options To Choose From

Yes, you can have your cake and eat it especially when it comes to choosing spy cameras. Of all options, one of the most ideal is the spy camera that would be concealed in the nose part of eyeglasses. This type of spy camera would sell from $400 to around $4000 and can easily be found if you search it over in the internet.

These are very pleasing devices as they can take very clear videos of what you can actually see. They also look just like ordinary eyeglasses, barely distinguishable from the ones that do not have cameras in them. These are powered by strong batteries that can last up to 2 hours of continuous operation. These are also wireless, meaning that they operate without any wires at all.

This type of spy cameras is just one of the many options you have. Whether you are buying it to spy on something or the idea of it just fancies you, you are sure to be delighted with what it can provide you. It works so well and it surely looks like something they actually use in the movies.

Read More

How and Why Series - 1 - How Does a PC Work? A Simple Overview

When learning about any technology it's important to understand the basics first. It's all too common to rush ahead and tackle complex issues, while ignoring the fundamentals - such as how and why? This article is about using simple metaphor to explain how a PC works in basic terms. It also explains why it is designed that way.

You've seen the outside case - beige, black or some other muted colour, but what's actually inside your computer? Covering all the components would take an age, so let's just cover the basics.

The Processor, RAM, Mother Board and Hard Disk
There are many parts to the computer, but they all in some way support these 4 fundamental parts.

The processor is really concerned with the calculations in the computer. Let's imagine that you've got some accounts to do, with a pen and some paper.

If you scribble sums on the paper, your brain is acting as the processor (CPU - or Central Processing Unit). It's doing the calculating. The pad and pen are acting as the RAM (Random Access Memory). It's where your're storing your results. You'd write them in a format that would enable those results to be fed back in. You might have a total of all your monthly spending and another total of your monthly income. By subtracting your expenditure from your income, you're left with how much cash per month you have left over. Keeping these totals handy for future calculations is what the RAM is for. It's kept very close to the processor, so that calculations and results travel a short distance, very quickly.

The processor and RAM are kept together on the motherboard, for this reason. They are connected by two channels in both directions, the buses, which is how the information travels backwards and forwards (sometimes you will see FSB, or Front Side Bus speed quoted on the specifications - the higher the MHz, the faster the information travels).

The last part of the puzzle concerns the hard disk. If you were working on your monthly accounts, when you'd finished, you'd want to store that information somewhere, such as an accounts ledger; so that you could use it later - say, for your annual accounts. In this respect the hard disk, is like an accounts ledger. It's a way of storing information you use in the short term - for the much longer term. The hard disk has a very important characteristic that the other parts do not share. The processor, RAM and motherboard are volatile. That means that when the power is switched off, the information is lost. So results which need to be kept, are sent to the hard disk, for long term storage.

Why have a Hard Disk? - Why not use more RAM instead?
There is another significant factor to consider here: cost. The processor and RAM are both chips - integrated circuits. The processor is one large one, made of many parts, the RAM is many smaller chips attached to a circuit board. They perform their tasks at phenomenal speeds and hence are costly. 4Gb of memory costs approximately the same as 400Gb of hard disk space, so the reason hard disks exist, is that they offer a lot of space for the money.

So that's it. Certainly there are lots of other parts, that perform many useful and important functions, but they all support this model.

In fact this CPU/RAM design was originally called 'Von Neumann Architecture" and was the basis for all early computer designs. As well as being a formidable mathematician, John Von Neumann was also highly influential in the fields of Computing, Weather Forecasting, Game Theory and Nuclear Physics (working on the Manhattan Project during WW2).

In later articles, we can come back to some of the other parts. To fill in the blanks and flesh out the model, but for now - the processes which occur in a computer follow the same, approximate model a person would use performing calculations with a pen and paper, and storing the results in a ledger.

Copyright (c) Patrick Seery

You have permission to publish this article electronically, in print, or on your web site, free of charge, on the condition that the author bylines are included, without alteration.

Patrick Seery
http://www.ptgr.co.uk

for Web development, CMS design, advice and Search Engine Optimization. Complex information, delivered simply.

Free consultation and further articles via the website.

Read More

Windows Registry Fixing

How to use software to fix your windows registry. The importance of the rule of three. Fixing the windows registry using software.

The windows registry is like windows, very complex, and it is also not something for the average user to be messing with.

If your registry needs to be cleaned or repaired, you should not do it manually, always have a piece of software do the job for you. The software tittles available to repair or clean the windows registry are numerous to put it mildly. They all do the same basic thing, scan the registry for dead, broken, erroneous entries. The software will find file extensions that no longer have programs that are associated with them. This is to say that a program you installed told the windows registry that the files it was going to use ended in .xyz or .zxy or what ever they want their files to have. You later un-installed that software package, but the entry in the windows registry that said the program files would end in .xzy or .zxy is still there in the registry taking up room, taking up time to load and generally do you no good at all.

These are the sort of things a Registry fixer/cleaner/optimizer software tittle looks for, and will attempt to repair or delete.

This brings me to my own little rule for working any problem with windows, The rule of three, is my personal rule,. And it states that anything you want to do in windows you should have three different pieces of software to achieve. I have found that no matter how good the software or how many promises they make you, no one piece of software can do the job completely.

This is because of the way the software searches and what the software is searching for, some will not recognize certain errors. So if you have three different pieces of software to do the same thing, and run them one at a time you will be able to find the majority of problems and errors in the windows registry.

After the Software finishes its scan, you should always select repair, this makes the software search for solutions to the problems it has found and if a solution is found the error is automatically fixed.

Some software tittles, most in fact, have an option or present the user with the option of backing up the bad data that it has found before any changes are made, Always select yes and back the data up before doing anything else.

As I already said the windows registry is very complex and even software can find something it thinks is an error when it is not. When you back up before changes are made, you can then tell the software to fix what it can and delete the rest, then if you reboot and your favorite Jukebox software does not work anymore you can go back and tell the windows registry repair software to restore the registry from the back up you made and your system is back to where it was before you cleaned it.

You should run all three of the registry repair/cleaning/fixing software about once a month, or anytime you notice something working slow or throwing errors at you.

Follow this advice and you should have no problem keeping your window registry clean and running smooth.

Here are two pieces of software I recommend.

http://www.Registryfixr.com
http://www.Registryeazyfix.com

Thanks for Reading, hope I have been of help.

Lokin Bakshire.

I have been messing up computers and consumer electronics since I was 9years old, I quickly learned that if I did not want people to know what an idiot I was that I would have to learn

Read More

Tips to Speed Up Your Computer

Remember when you first got your new computer? How fast it was, Like a Porsche on the auto bond. Windows smashed through the start up process in no time.

Remember when you first got your new computer? How fast it was, Like a Porsche on the auto bond. Windows smashed through the start up process in no time. Applications opened up so fast all you could is stare in amazement. But over time your Porsche turned in to a metro driving up hill pulling a trailer. Never fear there is step that can be taken to speed your old pc up. You do not need to be a super geek to perform these tweaks. Your computer will probaly never be as fast as it was when it was fresh out of the box. But below is a list of steps you can take to regain some performance on your pc.

Visual effects in Windows can be turned off to help speed things up a bit. If you go to start, control panel, system, then on the left side under tasks click advanced system settings. Now select performance. Here you can uncheck certain visual effects. Windows Aero transparency can also eat up resources; it is very simple to turn off. 1. Go to the start menu 2. Then select personalization 3. Now select Windows color and appearance 4. Now look for open classic appearance properties for more color options 5. Under color schema choose Vista basic

Why defrag your hard drive? Well if your hard drive is fragmented, Its like trying to build some thing when your tools are in ten different rooms. When you defrag it's like putting all your tools right next to each other. So how to defrag, 1.Go to start, computer, right click your hard drive and go to properties then tools. 2. Click the Defragment Now button. 3.A window will open, Once again click the defragment now button. 4.Now select the drives you would like to defragment, Hit ok and your computer will start to defrag.

What is Spyware? It is malicious applications that allow the publisher to monitor your online activity and cause pop-ups when you are online. Spyware can clog up your hard drive and slow your computer. Some times they gather information you enter in online forms. There are programs out there that can find and get rid of these malicious applications like Adaware and Spybot search and destroy. Remember, just because you download a spy ware removal tool you need to keep it up to date and run it to keep you protected.

Uninstalling unused Software Installing excess Software can slow down your computer. It grows your registry and can add extra utilities to start, which can slow you down. So the programs you don't use should be removed. 1. First go to Start menu then control panel. 2. Click on programs and features. 3. Click the programs you want to uninstall. Do not uninstall any programs you unfamiliar with, Windows may need them.

System clutter Over time, excess file clutter can build up on your computer and hog up your hard drive space. Cleaning out excess file clutter and freeing disk space can help to increase your computers speed. 1. To get to disk clean up go to Start then select computer right click your hard drive then Properties. 2. A box will pop up that will calculate how much space it can free up. 3. Next, select the files you want to get rid of. 4. Click ok and let the computer do the cleaning for you.

Clean out and Fix Registry The Windows Registry can begin to house out of date information. Such as, applications that have been uninstalled. These types of things can stack up and clog your registry, slowing down your PC and resulting in error messages and crashes. Your computer start up process may take longer then before. Cleaning your registry is the easiest way to help prevent these problems. The registry is a dangerous place for most people to go in to, you can screw things up very bad, if you do not know what you are doing. So I suggest you Software for this task,You can find the software and ratings for them on Cnet.

What is RAM? Well it is what your computer uses to store information for processing by your CPU. So when your computer runs out of RAM it has to use your paging file on your hard drive, which is much slower then ram. When you add more RAM it gives your CPU a bigger workspace to process the entire task you ask it to do. You can buy RAM at your local computer store or from an online retailer. All in one programs are a option if all this seams over whelming, or you do not want to take the time. There are programs out there that can take care of these steps for you. You can find the software and ratings for them on Cnet.

A link to my blog
http://moes-spott.blogspot.com/

Read More

Record Videos Without Anyone Knowing

Wouldn't it be nice to record some things while people around you would have no idea at all? If that seems appealing to you, you can do this with the use of hidden spy cameras. With that being attractive enough, it gets even better as you have a lot of options to choose from.

Wouldn't it be nice to record some things while people around you would have no idea at all? If that seems appealing to you, you can do this with the use of hidden spy cameras. With that being attractive enough, it gets even better as you have a lot of options to choose from.

People used to think that spy cameras would only be possible in movies wherein spies would have it alongside other cool gadgets. While that notion is quite popular, it is not true as spy cameras are commercially available for anyone in fact, a simple browse over the internet would bring you to some great finds if you really want one.

How Spy Cameras Came About

Spy cams are commonly thought to be high tech and futuristic, thus some people would think that it is something that comes from the future however; the idea of it is actually quite old, even dating back to the early 1900s. Spies before World War 1 would have cameras attached to their hats, buttons and jackets and they would use it to record secret documents and later spill everything out.

Nowadays, we have cameras all over us most commonly on our cellular phones and on our laptops. Looking back on how people would use to regard cameras that were the size of needle holes, we could just sit back and laugh. With what cameras have become, having spy cameras are much easier. If you can have it in your cell phone and your computer, why not have it in strategic places such as the middle part of a hat of the nose part of eyeglasses? With some people's creative thinking, this has been made possible.

Hidden Cameras Today

With the many things you can do with a camera, you can have it virtually anywhere. These are so popular in fact; a visit to the tech store or a quick browse through the internet could bring you some great finds. There are so many types of wireless spy cams of which would seem like everyday objects but with cameras in them.

A popular example of this is the eyeglasses with spy cameras. The cameras are so small and the glasses are designed so well that they blend together well, so well in fact it is barely distinguishable from the type of eyeglasses that do not have cameras. Prices for these cameras would range from around $400 to $4000 depending on what features you would like to avail of.

While cameras could be in glasses, they could be virtually anywhere. Spy cameras match the description and by that, they have to be hidden in nature. What is better is that they can be hidden almost everywhere, from a teddy bear in your kid's room, a soup can in the kitchen or a picture frame.

With its versatility and the many benefits people are able to get from it, it is no wonder a lot has happened to the typical concept of a spy camera. From concealing cameras in hats to having them in everyday objects, a whole lot indeed has happened.

Read More

How to Stop Your Computer Crashing All the Time

A computer which constantly crashes is no fun. In fact, it can be downright annoying and frustrating - all the times it makes you lose your work, or even your games. It's a problem which is affecting millions of PCs across the globe, and one which can actually be easily fixed. Here's how.

Computers crash for many different reasons. From being overheated, to just having too many programs running... Windows is famous for just crashing without warning, and it can be so frustrating to have to use. This said, there's actually a relatively easy way to stop this from happening - even a beginner can do it.

The reason why PCs crash is because Windows reaches a dead end. Normally, your system can fix most of its problems, but sometimes, it comes up against a problem which it just can't handle. When this happens, your computer does one of two things. If the problem isn't that important, your PC just raises an error, telling you to fix it. However, if the problem is to do with something your computer needs, then it's just going to fail and crash.

To fix this, you first need to identify the reason why your PC crashes. There are many different reasons for this, but there's one hidden reason which makes 99% of computers crash. Most of the time, it's all down to a part of your system known as the 'registry'. This is the central database for your computer, containing all your system's most important files. The problem is that since these files are used so much, they either become corrupted or damaged. This means that when Windows *needs* to use them, it can't actually find what it wants, which means that it's left with no choice but to crash.

Luckily, there's a simple tool which can fix all the problems in the registry database. A registry cleaner is a small piece of software which can speed up your PC and stop all the crashes. It basically scans through your registry and fixes all the corrupt and damaged files. This allows Windows to find all the files it needs, making it a lot more stable and smooth. All you need to do is install a registry cleaner, and click on "Scan Now" to make it scan through the registry. Then you just need to sit back and click on "fix all" when it finds all the problems that are causing your PC to crash.

From my experience, the easiest way to stop crashes is to use a piece of software such as RegCure.



Read More

Headsets - The Emblem of Portability and Mobility in Music

Well the good land of Britannia certainly has many wonderful rock stars living with all of them having done marvels in terms of composing wonderful songs. Listening to those songs certainly can be given a whole new set up in terms listening to them by donning on headsets. These items as products certainly bear an immense level of potential in terms of being able fetch in revenue resulting from their sale.

Well the good land of Britannia certainly has many wonderful rock stars living with all of them having done marvels in terms of composing wonderful songs.

Listening to those songs certainly can be given a whole new set up in terms listening to them by donning on headsets. These items as products certainly bear an immense level of potential in terms of being able fetch in revenue resulting from their sale.

Now you would certainly be wondering about why are we, virtually writing an ode about all these wonderful soul rendering items. Well we certainly believe that good products should be easily accessible to the customer.

You can be rest assured that you have certainly arrived at the right place when it comes to acquiring headsets that have been created by some of the biggest brand names in the headset making industry.

However, apart from having headsets, we also feature cordless phones, and dect phones as well. Therefore, the choices for you are many with each and every one of those choices being a good one.

Now let us come to the distinguished presences in our product list of headsets. One of them is the Sennheiser SH 310 Over the ear headset.

This headset can be worn on either ear and the comfort level of these headsets is also quite good with extremely cushy ear pads. Moreover, the ear pads are also replaceable and, therefore, the worn out ones can be replaced with new ones.

Well one little peek in our wonderful arsenal of products is the teaser for you and we certainly hope that you come to love each and every one of the products that we have. Welcome to our website and, moreover, welcome to this wonderful section which lets you have the opportunity of acquiring some of the best and the latest headsets that are there in the world today.

And when it comes to home phones then we are your penultimate destination due to one simple reason. The reason is the overall quality of the home phones that you will find

Get to have the best in the product range of telephones, and, therefore, utilise your money to its fullest potential by acquiring premier products.

About the Author:-

Dennis Jaylon is a renowned business writer who has years of experience in writing technical reviews, product descriptions and product feature analysis of technical gizmos like headsets. He has won appreciation especially for enlightening people about the latest communication gizmos home phones.

Read More

Which Computer Forensic is Right For Me?

There are a number of computer forensics certifications that one could choose to challenge including the Encase Certified Examiner (EnCE), AccessData Certified Examiner (ACE), Certified Computer Examiner (CCE), GIAC Certified Forensics Analyst (GCFA) and Certified Computer Forensic Examiner (CFCE) to name a few.

There are a number of computer forensics certifications that one could choose to challenge including the Encase Certified Examiner (EnCE), AccessData Certified Examiner (ACE), Certified Computer Examiner (CCE), GIAC Certified Forensics Analyst (GCFA) and Certified Computer Forensic Examiner (CFCE) to name a few.

How then, does one choose the appropriate certification to pursue? While all of the certifications listed above are valuable, I would recommend pursuing one that includes a practical examination and one in which you can use the tools with which you are most familiar. As an example, it is going to be difficult for you to pass the ACE if the only forensic utility that you've used is EnCase Enterprise.

If you are trying to obtain a certification in order to break into the computer forensics field, I'd recommend searching the job boards for computer forensics positions to see the utilities that they are most often listing as required skills. About.com provides a good overview of most of the computer forensics certifications so I'm not going to go into the nitty gritty of each certification. If you are interested in reviewing their coverage, go to www.about.com and search for "computer forensic certifications."

Call me biased, but I am personally a fan of the EnCE certification. EnCase is a standard of the industry and found in most, if not all, computer forensics shops. So having the EnCE certification demonstrates to employers that you have mastered the tools that they use in their forensic labs.

In addition, passing the EnCE practical was a major confidence booster for me and I have used many of the techniques that I learned as a result of the EnCE practical during my "real" analysis.

In summary, in order to determine the proper computer forensics certification I would look at the following:

1. Certifications that require a practical.
2. Certifications that demonstrate mastery of an industry-standard tool or utility.
3. Certifications that you see in job listings.
4. Certifications that allow or require you to use a forensics utility with which you already have experience.

The EnCase Certified Examiner (EnCE) examination is a two part examination that consists of a written portion and a practical. The practical is difficult, but it tests the basic computer forensic skills that an examiner must have. The Forensic Secrets eBook is a concise guide to passing the EnCE practical. It is by no means a brain dump of the examination but rather a compilation of the techniques that are necessary to pass the practical portion of the exam.

Read More

Slow Computer for Windows XP - Get the Performance Back With This Easy Tip

How to manually increase the speed of your Windows XP computer if it is running slow or better still, use an automated solution and save a heap of time in the process. It's not so hard to get your computer back to what it was and increase your productivity in the process.

If you have a slow computer that uses the windows XP operating system then it could be because the registry has lost it's integrity in some way. By cleaning the registry you can potentially get much of the performance or speed that your computer once had back.

Poor performance is often related to the age of a computer. It will inevitably become slower as it gets filled up with more data and programs. Not only will the performance be slowed because it has to process through more data before it can find what it needs or want to run, but it may be sent to redundant links depending on the state of the registry.

The registry is a database file that is used by most windows operating systems, including XP and Vista. It is a central location that stores information on the locations of programs, files and various settings that might be set by the computer user. The processor will utilize the information on the registry whenever a task is initiated by the user. Amongst other things, it will look for the location of the program. If the registry is bloated with details or has information that is redundant, the the system will not find the program or take a long time to find it.

So by cleaning the registry every couple of months you could improve slow computer windows XP systems. You can do this manually by entering the regedit command in the run box or you could use a software program.

There is much debate about the improvements that cleaning the registry can make, but if you subscribe to the view that it does make a difference, then the most efficient way to clean it is using software rather than manually.

Software takes all the work out of the job. It reports what may be wrong and suggests possible actions. Within minutes you can clean your registry that might have taken hours to do manually. A clean registry could improve the performance speed of a slow computer and make it enjoyable to use you computer again.

Get your computer back to full speed using a registry cleaner fixer, simply click on regclean download for more details on how you can have your computer back to normal in minutes.

Read More

The Many Wonders of Spy Cameras

Growing up, most of us could have been fascinated by the many cool gadgets our favorite spy heroes had. Some of these were inspector gadget who would have all sorts of gadgets pop put of nowhere and James Bond who would have some things come right out of his sleeve.

Growing up, most of us could have been fascinated by the many cool gadgets our favorite spy heroes had. Some of these were inspector gadget who would have all sorts of gadgets pop put of nowhere and James Bond who would have some things come right out of his sleeve. When looking back at the gadgets our childhood spy heroes used to have, one of them that we cannot forget would be the spy cam.

The fantasies of kids being able to record events without anyone knowing it has been long accomplished. Cameras can now be concealed in all sorts of objects. What is better is, you have some options to choose from and you can really use these, granting that you don't violate anything.

Rise Of The Hidden Camera

Hidden cameras were first used by spies even before World War 1. During this time, spies would attach small cameras to pigeons while the pigeons would fly around a desired area having the cameras record what they are able to see. Since then, it has grown so much more popular. Later on, the lenses of hidden spy cams became as small as needle holes, allowing spies to have it concealed in buttons, hats or eyeglasses.

After that, cameras are everywhere so much in fact; it is very basic for a cell phone to have a camera nowadays. Looking back to how people used to regard hidden cameras, we could just laugh at the idea. Spy cameras nowadays are more like toys although some people would still use it for investigation.

Can You Use One?

Camera lenses the size of needle holes are indeed getting more common, but can you have it and use it to investigate? Unfortunately, your job has to be directly involved with investigation; otherwise issues can be pressed against you for invading privacy. Having wireless spy cameras should only be used for personal purposes.

Even if there are limitations, these are very much easy to get. Simply browsing the internet for spy cameras that are concealed within objects would give you a lot of pleasant finds. Prices on average would range from around $400 to $4000 depending on the features.

Get One Now

If your inner investigator is still itching to get a spy camera, then you should get one now and start spying on whoever you wish. Be aware however of some things that you should avoid, a lot of sensitive issues can arise from this. Privacy for example is one of the biggest issues with spy cams.

Even for decent purposes such as when you want to watch over your kids while they are left alone with a nanny with the use of a spy cam, if the nanny is not aware that you are watching her then this could be an invasion to her privacy.

Knowing what you can do with spy cameras and what you should not do, you can still enjoy these very much as there are a lot of benefits that you can get from it.

Read More

Learning Computer Programming - The Right Approach Which Most Don't Follow

Programming is the most interesting task on the earth. But surprisingly, most of the students undergoing some computer programming training course, freshers, and even experienced programmers exhibit very poor programming skills. This article shows the right approach for beginning computer programming, which most computer programming training courses and articles skip.


I regard programming as the most interesting subject on the earth. But, to my dismay, most of the students undergoing some computer programming training course, freshers, and even experienced programmers I come across exhibit programming skills much below my expectations.

I think this happens because while beginning computer programming, students miss the right approach. Programming is a different type of subject - it requires a different approach. Beginning computer programming without really understanding how to learn programming is disastrous. But, surprisingly, most of the computer programming training courses I have seen begin abruptly, without addressing this first. If you search on Google, you will find numerous articles and tutorials for learning programming. But, I am yet to find one which really touches the basics, so that the foundation of the student is properly built.

What is Programming?

In simple terms, programming is teaching somebody how to do a task. Obvious examples are

* teaching a child how to add some numbers
* teaching a housewife how to prepare some recipe
* any teaching under the earth that you can imagine

For programming human beings, we use some language, such as English, French, Hindi. For programming computers, we use some language computers understand. Some examples of computer languages are C, Pascal, Python, Java.

Human beings are very intelligent and hence human languages like English are extremely complex. The same statement might mean different things in different scenario in English. In contrast, computers are the stupidest beings in the world, and so the language used to teach them are quite simple. So, for a human being like you, learning a computer language is really easy and fun. And, once you know one computer language, learning another is as easy as knowing few more words.

In order to learn computer programming, you have to mimic computer and think like a computer. My Blog (url given below) contains a nice article with an example. There I give a must have start to the students, explaining them the very basics of programming and more importantly, how to learn it. A must read for all programming students before they start any computer programming training.

Sanjay is the Director (Technical) of RAD Solutions Private Limited. He has about 16 years of versatile experience on software development. He also loves teaching technical and self development topics.

Read More

Compaq Laptops Prices

Compaq Laptops are among the most popular brands of laptops used by the techno-buffs worldwide. Laptops are the most tech savvy and business savvy computers till so far. Laptops are like a notebook which you can carry anywhere whether travelling or in office or in home.

Compaq Laptops are among the most popular brands of laptops used by the techno-buffs worldwide. Laptops are the most tech savvy and business savvy computers till so far. Laptops are like a notebook which you can carry anywhere whether travelling or in office or in home. Their flip design is just perfect to protect the keyboard and screen after the use. Laptops are just amazing! The first product of Compaq, the Compaq Portable was launched in the market in March 1983 at a price of $2995. This was quite reasonable price at that time and it sold about 53,000 units in the very first's year. This model can be said as the ancestor of today's laptops.

Compaq Presario, the most popular brand of Compaq, was introduced in retail computer market in mid-1990s. Compaq models include Compaq Evo, Compaq NC, Compaq Presario and Compaq Armada. Compaq Presario is among the best Compaq Laptops. Within the Compaq Presario Range, there are many models available with different features. Mainly, this laptop has 2.8 GHz Intel Pentium 4 Processor and 60 GB hard drive. 512 MB RAM is just perfect for storing large files and running multiple applications at a time. Other features include DVD/CD-RW combo drive, 15.0-inch LCD screen, ATI MOBILITY RADEON 9000 IGP graphics card and integrated JBL Pro Performance speakers.

There are various kinds of laptops available in the market for the different kinds of users and wide range of usages. For basic home and office work, budget laptops are right. For more advanced work requiring multimedia features like audio and video, you can go for workhorse, which has in built webcam and sound system. Tablet type laptops have handwriting reorganization software. Another kind is ultra portable laptops with shrinking keyboards and screens.

Compaq laptop prices are just worth what they offer. Because of its hi-tech features and easy maneuverability, Laptops command more prices than traditional PCs. You can purchase Compaq laptop according to your budget and requirements. If your requirements are very minimal and basic, then you can opt for low price Compaq company laptops which start from about Rs.24, 000. For more sophisticated usage, you can go for expensive ones and they can be as expensive as Rs. 155,960.

You have very easy and comfortable option to buy online Compaq laptops. You just have to match your requirements with the features available in a laptop. Out of wide range of Compaq Laptops, you can easily find one for yourself. A Compaq laptop is just made to enhance your productivity. Compaq Laptops are simply the best!

Vinnit Alex is well known author has written article on IPods, Computer Store, DTH, Online Shopping and many other subjects.

Read More

Penetration Tester Scanning Phase

During the scanning phase, you will begin to gather information about the target's purpose-specifically, what ports (and possibly what services) it offers. Information gathered during this phase is also traditionally used to determine the operating system (or firmware version) of the target devices. The list of active targets gathered from the reconnaissance phase is used as the target list for this phase.

During the scanning phase, you will begin to gather information about the target's purpose-specifically, what ports (and possibly what services) it offers. Information gathered during this phase is also traditionally used to determine the operating system (or firmware version) of the target devices. The list of active targets gathered from the reconnaissance phase is used as the target list for this phase. This is not to say that you cannot specifically target any host within your approved ranges, but understand that you may lose time trying to scan a system that perhaps does not exist, or may not be reachable from your network location. Often your penetration tests are limited in time frame, so your steps should be as streamlined as possible to keep your time productive.

Put another way: Scan only those hosts that appear to be alive, unless you literally have "time to kill."

Time Is of the Essence

Although more businesses and organizations are becoming aware of the value of penetration testing, they still want to see the time/value trade-off. As a result, penetration testing often becomes less an "attacker-proof" test and more a test of the client's existing security controls and configurations. If you have spent any time researching network attacks, you probably know that most decent attackers will spend as much time as they can spare gathering information on their target before they attack. However, as a penetration tester, your time will likely be billed on an hourly basis, so you need to be able to effectively use the time you have. Make sure your time counts toward providing the best service you can for your client.

Read More

Why Students Should Be Getting a Netbook Instead of a Standard Size Laptop

Netbooks are really popular nowadays. They are seen almost everywhere. It's as if this little laptop has just popped out of nowhere and became the star among students overnight. If you are wondering why netbooks are so pupuar, and why it's more suitable to students compared to the normal laptops, this article list down all the benefits that netbooks have over the standard-size laptops for students.

Netbooks are really popular nowadays. They are seen almost everywhere. It's as if this little laptop has just popped out of nowhere and became the star among students overnight.

So what's the difference between netbooks and standard-size laptops?

Here's a few simple criteria that distinguish netbooks from standard laptops. Netbooks have small screen size that typically measure up to 10 inches or less. They run on Linux or Windows XP and usually have a price of $500 or less. The main function of a netbook is to simply let the owner connect to the Internet anytime they want without much hassle.

Asustek was the first one to introduce netbooks when they launched the very first Eee PC in 2007. However, it was only in 2008 that these mini laptops exploded like wildfire and became extremely popular all over the globe. Nowadays, companies like Samsung, Acer and Dell are now venturing on the latest trend about mini laptops. Thus, netbooks are now fast rising in popularity and there is an expected 139-million netbook units that will be manufactured by 2013.

There is a reason why netbooks received an instant popularity. One reason is because of the hunger for mobility. Most people want a portable device that can keep them connected with the Internet wherever they go and they want something that is light and small too, the more portable the better. Most of them crave for a convenient portable device that can keep them connected with their family and friends.

Why are netbooks great for students then? Here are the few reasons:

1. Portability - Netbooks are not only small, light and compact; they are also portable - a perfect mobile device for people who are always on the go, like students who cannot afford to be out of connection with their family and friends.

2. Size - Netbooks make great laptops for students because it is small and handy. It has a 10-inch wide screen display, which is very ideal for students. They are very light and compact, making it easy for students to tuck the device inside their backpacks or school bags.

3. Battery Life - Since netbooks are small in size, they do have longer battery life compared to regular laptops. This is also vital for students who spend all their time in school and don't have a chance to re-charge.

4. Price - One of the many reasons why netbooks are great for students is because the price is very affordable. Most students do have limited budget and a laptop that has a price of $300-$500 makes a great deal for them.

5. Storage - The storage capability of netbooks nowadays are gradually increasing, however since these are just mini laptops, you cannot always expect a wide storage capability as compared to regular laptops. Normally, netbooks can only reach up to 160 GB, which is normally more than enough for students.

6. Sturdiness- Netbooks are mostly tough and sturdy. They are not easily threatened by careless handling. As we all know, students are not actually the gentlest people on earth, thus, they need a tough and sturdy machine to keep up with their aggressiveness.

7. Performance - Despite its size, netbooks do have a very impressive and competitive front to be proud of. Some models have solid-state hard drives that are very durable. Most models make use of Windows XP, which is much recommended for smaller laptops as compared to Vista.

With all the points stated above, you may notice that netbooks do carry a lot of features that respond to every student's need. It is small, lightweight, portable, sturdy, has a long battery span, quality performance, great Internet connection, enough storage capability and of course affordable. Thus, netbooks are really great for students and classroom use.

Michael is a blogger who owns several blogs about gadgets and technology. If you find this article useful, you should head over to one of his blog about mini laptops to find out more articles written by him. You will find netbook news, reviews, and the recommendation for the best mini laptop on his blog.

Read More

Basic Guide to Selecting a Personal Laptop For Home Use

Computers had become part of human lives. When laptops came into the scene it offered more convenience to many people. Having a laptop at home is very typical today; it is becoming a household name nowadays. If you are eyeing for a personal laptop that are capable of multipurpose jobs, this article will give you a basic overview to get you started.

Computers had become part of human lives. When laptops came into the scene it offered more convenience to many people. Having a laptop at home is very typical today; it is becoming a household name nowadays. If you are eyeing for a personal laptop that are capable of multipurpose jobs, the following are the few factors that you should take into consideration.

Screen Size: Given that you are looking for a laptop to be used at home, you might as well consider the ones with bigger screen. You need not to worry about portability since you will not carry it outside often. Having a 17-inch laptop at home will be good for watching movies at home.

Memory: Software applications nowadays require bigger RAM size especially computer games. If you are going to install PC games on it, make sure you have at least 2GB of RAM.

Storage: For home laptop you should consider a big storage space. You will expect many files to be stored in this laptop, files like your wedding pictures or videos, movies, music and many others. It is best to get a laptop with either 320GB hard drive or 400GB hard drive.

Connectivity: You don't want many wires around your house right? Always consider a laptop with wireless capabilities like Bluetooth and Wi-Fi. Also, having wireless connectivity and Bluetooth will make it much easier and less stressful when having to move or connect to other equipment at home.

Above are the general guidelines in buying a laptop for your home. Now the next part will tackle about specific brand of laptops, brands that would fit the category of a home laptop.

Dell: It is one of the big names in the laptop industry with an excellent track record. The best laptop for home use in Dell's product line should be the Dell Studio. The Dell Studio has a 17" screen version perfect for home use. And you will not worry about the other specs because in their website they let customize the laptop. You choose what video card, RAM and hard drive to use.

HP: This is another good brand in the laptop market. The HP G70t is a laptop best for home use. It sports a 17" screen and its parts are also customizable. Just like the previous brand you can choose whatever parts you want to be bundled in it.

Acer: The brand is one of the popular brands when it comes to laptop. The Acer Aspire AS8930 is the best laptop they can offer for home use. The screen of this laptop is really big, a whopping 18.4 inches. One of the downside about this brand is the fact that you cannot customize the laptop, they stick to the specs. But never worry though; the specs are good enough already.

Apple: This is another name that people would look for when it comes to laptops. The Macbook Pro will be the best for home use in their product line. Like the other brands it has a 17-inch screen. This too, is the most stylish brand compared to the others.

Before making a major decision in life you always have to do enough research to make the most rational decision there is and this would also be true in buying a home laptop. You now have enough pointers above, use it and you will never go wrong.

Michael is a part time blogger who owns a blog about pink laptops. His blog is targeted more towards female readers, and features articles such as pink laptop buying guide, and various news and reviews about pink laptop computers.

Read More

Leather Computer Bags - Things to Look Out For

Leather computer bags are great, but what should you look out for when buying one? In this article discover the two most crucial factors in buying a bag.


Leather - A stylish and cool material that smells good and looks great. There are numerous reasons to choose a leather bag and by leather I mean real leather, so if you aren't a big fan of leather then stop reading now. Your laptop is temperamental and needs to be treated well so make sure that you don't buy cheap fake leather (the plastic sort), these just look bad.

Your computer bag should give your laptop some space, but not enough space that when the bag is fastened that the laptop moves around as this can lead to scratches on it. When looking for a good bag you need to find one that has padding inside to stop the laptop from moving as much.

Something you need to make sure that your leather computer bag has is padding. If you see a bag that looks really nice and has no padding then find another one. No matter how nice a bag you see, if it doesn't have all around protection then there is no point buying it. You want to find a bag with a nice padded inner compartment that will absorb all the impact from accidental kicks or bumps as these could damage the outer (or even worse the inside) of your laptop.

The next important thing that your bag should have is enough space for accessories; your charger, extra battery and any other type of cables you may need to carry around. The most important item that should go in your case first is your charger because with no charger you are most likely going to run out of battery in a couple of hours and if you end up getting the short stick and have to work on a project that you would normally do on the train home then you are in a bit of trouble so make sure you carry your charger or an extra battery if possible.

Leather computer bags are nice and stylish, but you need to make sure that they are right for your laptop and also for your needs, so make sure that you have enough space for all extra equipment (including your laptop, of course) and padding to protect everything inside.

Make sure to visit ==> Laptop Bags and Cases for outstanding information and GREAT savings on the latest Laptop Computer Bags

Read More

# # Understanding Laptop Prices For Small Business Owners

Laptops are power centers for small business owners in this information-driven world. The costs for new laptops vary between manufacturers, warranties, features, and uses. Small business owners interested in purchasing a new laptop should consider the price, functionality, and life expectancy of the equipment. Another factor includes the benefits of laptops can add to business operations such as flexibility, lightweight, and mobility. Ironically, majority of today's small businesses are based off one laptop with paperless software to help business operations from someone's lap.

Laptops are power centers for small business owners in this information-driven world. The costs for new laptops vary between manufacturers, warranties, features, and uses. Small business owners interested in purchasing a new laptop should consider the price, functionality, and life expectancy of the equipment. Another factor includes the benefits of laptops can add to business operations such as flexibility, lightweight, and mobility. Ironically, majority of today's small businesses are based off one laptop with paperless software to help business operations from someone's lap.

Purpose for the Laptops

What are the plans for the laptop? Will it be used to design, configure, or write excessive programs? Will the laptop be used for all business purposes including accounting, faxing, and printing documents? If so, business owners can use relatively cheap laptops to manage their business operations. Web designers, developers, and internet hosts may use their laptops to work from anywhere in the world. Majority of these laptops require internal modems for wireless connections in Wi-fi hotspots. Laptops prices are generated by the many functions needed for business owners. If an owner understands their needs, the price of the laptop will play in favor of their purchases.

Warranties & Upgrades

Warranties and hardware upgrades can cost a substantial amount of money when purchasing computers. Many business owners have paid additional fees for 1-year or extended warranties to ensure functioning of their laptops. In laptops pricing comparisons, the additional costs play a significant role in how reliable a laptop computer may be for the business. Hardware upgrades include speed improvement, memory, video graphic cards, and other hardware which improve business productivity. In comparing laptop notebook prices, consider the features needed in online business operations including web cams, wireless internet connections, and headset compatibility.

Laptops Price Comparisons

Laptop prices vary from manufactures, features, and weight; small business owners interested in simple, easy-to-use laptops without bells and whistles can find an affordable laptop online. Now, the ability to find great sales on laptops is a click away on a desktop; this ease of transactions leads many business owners to online auction sites, online shopping sites, and other well-known forums to purchase equipment. The cost of the laptops includes shipping, upgrades, and warranties offered by sellers or manufactures.

Smart business owners analyze each factor contributing to their laptop prices. The comparison between a basic computer for word processing, accounting, and publishing may not need as much speed as a web developer in need of memory space. The make up of each computer is different dependent upon the manufacturer, operating system, and availability. With a little luck, a small business owner can find a laptop under budget to add to company assets.

Compare prices on Laptop and computers. Best buy laptop prices on our store. Laptop prices comparison, prices details of laptops, notebooks. Please visit our site laptopsprices.info for further details.

Read More

How Secure Are RFID Tags?

First I must explain. To begin, RFID (radio frequency identification) was initially developed and implemented as a tool for inventory control. It works like this: the RFID tag is a kind of chip with information stored on it. For example, it can be located in a plastic tag, which is then clipped to a shirt at a clothing store.

From a security standpoint, RFID tags are the scariest thing I have come across in a long time.

First I must explain. To begin, RFID (radio frequency identification) was initially developed and implemented as a tool for inventory control. It works like this: the RFID tag is a kind of chip with information stored on it. For example, it can be located in a plastic tag, which is then clipped to a shirt at a clothing store. When inventory time comes along, an employee takes that shirt and waves it in front of a station that acts as a receiver and transmits the radio frequency required to activate the RFID tag. Once the RFID tag in the shirt comes within range of the signal, the tag responds by transmitting its data back on the same radio frequency. Somewhere a computer records the data about what kind of shirt it was, what manufacturer produced it and so on.

The benefits of RFID technology are huge. Unlike a scanner, the RFID tag does not have to be oriented a specific way or be particularly close to the transmitter that activates it. The transmitter broadcasts the signal all the time, so it is just waiting for your RFID tag to come along. Transmitters are able activate an RFID tag from 10+ meters away, through a wallet or clothing, and unless the RFID tag is in some kind of protective cover, it will send its data back. The RFID tag is small, and so can be added to a card that fits into your wallet, or sewn into a piece of clothing. Another benefit is that the RFID tag itself does not need to be connected to a power source to operate. All of these benefits (and more) meant that this technology became popular very quickly, and its use and applications have grown faster than anyone could have anticipated.

The result is that RFID technology is being applied to uses for which it was that it was never intended. In terms of securely transmitting data RFID technology is fundamentally flawed. And because this technology was NEVER designed to be used this way, forcing it through is quite simply setting us up for major identity theft problems.

The problem is this: there is nothing special about the transmitter and the receiver that prompts the RFID tag to send its data. It is radio equipment. And the RFID tag does not have the ability to authenticate the credentials of a transmitter before sending its data. If the RFID tag is activated, it WILL send its data. Period. That means that if you want to collect the data, all you need is a transmitter tuned to the correct radio frequency to activate the RFID tag and a mechanism to capture and store the data it sends you. The equipment you need to do this is not particularly specialized, and completing purchases on the internet would allow the average person to obtain it without a radio license. Currently, an $8.00 purchase on Ebay will buy you the equipment required to clone and re-transmit the RFID tag of a credit card. It is that easy and accessible. For well less than $250.00 you can purchase a complete set up that would allow you to clone and transmit most RFID tags for credit cards, passports and drivers' licenses for whatever use you like.

Ok, so it has been proven again and again and again just how easy it is to capture (hijack) the data stored on RFID tags. People have made presentations and said, "It is simply NOT safe to transmit data this way". And the response is, "Well, if they steal the data it's ok, because the data is encrypted".

Please.

First of all, a lot of vendors and companies currently using RFID technology do not bother encrypting the data that is transmitted. Scary thought, isn't it?

Second, the encryption has been cracked, documented, and is readily available on the internet. That means that with a little effort you can un-encrypt the data you collect.

Third, and most importantly, the person stealing the data does not have to un-encrypt it to be able to use it.

Another example: Joe Schmoe hangs out at his local neighborhood coffee shop all day working on his laptop computer. He has all the equipment needed to activate RFID tags and store the data, and it is hidden on his person or in his laptop bag. He captures the credit card data of individuals throughout the day. He then loads that data onto his PDA, which is set up to transmit the data, and now he can go buy gas, or coffee, or merchandise at any vendor that accepts cards with RFID tags in them. If the transaction is under $25.00 Joe will not be asked to show the card or id. And if it is over $25.00, the chances are pretty good the salesperson still won't check. Joe Schmoe does not have to know that Jane Doe came in to buy coffee that day, and had a Visa with an RFID tag in it, or her credit card number. All he has to be able to do is to transmit her data the same way the RFID tag in her Visa card did.

Even though security experts have pointed out all of these issues they have been ignored and the popularity of RFID tags continues to spread. They have been incorporated into passports and some states have added them to drivers' licenses. While using RFID tags along with photo identification is more complicated and requires a physical document in addition to the tag, we already know there are sophisticated forgers out there that can produce very convincing passports and drivers' licenses.

Do you begin to understand why I am extremely concerned about the increasingly widespread use of this technology?

In the past year we have seen the stock market plummet the most it has since the Great Depression. Unemployment is at the highest levels in 25 years. Credit Suisse is predicting that the credit crisis will directly result in the foreclosure of 8 million homes, and it is generally accepted as a conservative number. Basically, there are suddenly a lot more desperate people out there, and stealing this data is seductively easy. The stakes are huge. The perception that RFID data is secure makes people complacent so if you steal it, and use it, you are less likely to be caught. People are less likely to look closely at the picture on your passport or drivers' license. They are less likely to confirm the signature on a receipt or ask for photo id on a credit/debit transaction.

This is a serious risk. Back in February someone spent less than $500 on Ebay to buy the equipment, set everything up, and then went on a 20 minute drive through down town San Francisco. In that 20 minutes he collected and copied the RFID tag passport data from two people. Imagine how much data he could collect if he loitered around the ticket counter of the airport, which is not a secured area. Or what if just sat in his car in the airport parking garage?

So what can you do to protect yourself? Fortunately, you do have a choice as to whether or not your credit/debit card has an RFID tag. Do not allow a bank to issue you one. When Washington Mutual sent me a replacement debit card with an RFID tag, I refused to activate it, and went to the bank and requested one without the RFID. I was able to obtain one with minimal hassle. I hate to say it, but with your passport or drivers' license you might have little choice if the technology has already been implemented. In situations where you can't avoid carrying an RFID tag there are holders, sleeves, wallets, and purses available made out of fabric that prevents the radio signal from reaching and activating the RFID tag. Unfortunately, as soon as you take the RFID document out of the protective cover you are at risk, since one second is all someone needs to steal the data, but the chances that the person will be on hot standby to steal your data during the limited amount of time you have it out is reduced. Finally, if you hear of a push in your area to incorporate RFID technology, fight it. Inform your friends and contact your legislators. In California, the proposal to implement RFID technology into their drivers' licenses was defeated by a narrow margin, but it WAS defeated.

While I am not one to take an alarmist view, these are serious risks to consider. Right now at least 45 countries are using RFID technology in their passports. Four states are in various stages of deployment for their drivers' licenses. Unless public awareness grows, and we begin to see what a risk it truly is and take measures to force the use better technology, the use of RFID tags will expand to more areas of our daily lives. Some of the potential uses would make you lose sleep at night.

More generally RFID technology is a very good illustration of how something might be cool, and can be used in many different ways, but that doesn't mean that it SHOULD be. Since technology is moving at a faster and faster pace, it is becoming increasingly important to consider the consequences of using technology for a use other than what it was initially developed for.

Read More

Ending the Confusion - A Simple Explanation of Data Deduplication

It goes by many names, data deduplication, commonality factoring, single instance store, common file elimination, referential integrity and the list goes on. The data reduction field is still struggling with many terms and a lack of standardization. I will define the basics degrees of deduplication available today and the advantages as they relate to data backup.

Data Deduplication or is it de-duplication, the very fact that every time I type it, my spell check tells me it's spelled wrong, is a hint that it might need some clarification.

It goes by many names, commonality factoring, single instance store, common file elimination, referential integrity and the list goes on. What do all of these terms have in common?

Two things come to mind. First, none of them set off alarms in my word processor, which means they can't be used in a technical discussion. When we invent new technology, we need to invent new words for it. Second, at a high level, they all refer to various methods to reduce the amount of data being stored.

The data reduction field is still struggling with many terms and a lack of standardization. I will define the basics degrees of deduplication available today and the advantages as they relate to data backup.

Full Backup

A Full backup is a complete copy of data for every file and every server, every time you complete a backup. This method is used because it is straightforward and simple. If you want to recover data from four days ago, you retrieve that tape (or tapes) and begin your restore. The restore process is one tape or set of tapes. The drawback is it uses the longest backup window of all the methods.

As backup administrators begin to run into shorter backup windows, they usually start doing differential backups.

Differential Backup

This is where you have a weekly or master backup and each successive backup after that includes all the changes from the master. That means as the week goes on, you are backing up more and more data each time to capture all the changes. When it is time to recover, you only need your master and the differential for the day you are recovering to, so a Friday recovery requires only two tapes. This is a basic level of deduplication introduced by tapes decades ago.

Incremental Backup

Differential backups may cause your Thursday night backup windows to be too long. That is where tape based incremental backups come in. After your master, each tape only stores file that have had changes since the last backup. The trade off here is recovery. If you are recovering Friday's backup, you will need to take the master, let's say Sunday, and insert each tape until you reach Friday to process a full restore. This deduplicates more data than the differential, but it has some tradeoffs. It can be very time consuming and is further complicated when tapes are taken off-site each night.

Deduplication Backup

Enter the various levels of disc-based deduplication technology. At a basic level, that can be broken down into three types: Single instance, Block level and Byte level. Some of the earliest deduplication technologies came out of the wide area file services segment. Reducing data allowed higher bandwidth utilization and minimized the expense of wide area networks.

Single Instance Deduplication Backup

An email application example is the best way to describe single instance deduplication. If you email a 10 MB attachment to 100 employees in your company, that could equate to 1,000 MBs of data. In this case, a single instance of the attached file is stored. Other recipients receive the email with a "pointer" to that file. This reduces the storage on the email server to the original 10 MG. Now let's say everyone loves the file and they all save it in their personal directory on a server. You now have 1,000 MBs on your file server. A backup solution that uses single instance or common file elimination will only store a single copy of that file. This reduces your backup window, network traffic and backup storage from 1,000 MBs to 20MBc. All other references to that file are stored as pointers. They are still available for recovery, but use almost no storage.

This method also eliminates the need to backup common files like operating systems and applications when doing full server backups. Since I am using a disk-to-disk based example, all the "which tape has which version" is eliminated and tracked in the metadata of the backup solution.

Block-Level Deduplication Backup

Block-level data deduplication assigns a unique hash algorithm to every block of data. Block size varies depending on the application ranging from 4KB to 56KB. Some applications use a fixed block size while others use a variable block sizing. Generally, a smaller blocks size will find more commonality and reduce data by a greater amount. Block level deduplication can be applied globally across many backup sets.

A tradeoff to smaller blocks size is the greater processing and I/O overhead. Breaking a 100GB block of data into 8K blocks produces 12 million chunks of data. Reconstructing all these chunks of data delays restore times. Some technologies have configurations settings to increase restore performance by producing "sub-masters" within the data set. This allows for faster restores but requires additional storage. You must consider the additional overhead when evaluation of deduplication methods.

Byte-level Deduplicatiion Backup

Byte-level data deduplication performs a byte-by-byte comparison of the current data streams with the bytes it has seen before. This is a much more accurate comparison and produces a much higher commonality in the data sets. Most byte-level deduplication approaches are content aware. That means it is engineered specifically to understand the backup application's data stream so it can identify information like file name, file type and date/time stamp.

Because comparisons at this level are resource intensive, it is usually done after the backup occurs, called post processing, versus in-line, which is the norm with block level deduplication. This means backups complete at full disk performance, but require additional storage to cache the backups while they are processed. In addition, the byte-level deduplication process is usually limited to a single backup set and not generally applied globally across backup sets.

In many cases, byte-level technology keeps the most recent generation as a master. That significantly improves restore times. Ninety percent of all restores are of the most recent generation. Restore times are an important consideration when considering any backup solution.

All venders have their own approach to deduplication. Some use storage appliances, others have software only solutions, and still others have complete end-to-end replacements for existing backup solutions.

One thing is for sure, without data deduplciation remote backup and automated business continuity solutions across corporate and public Wide Area Networks would not be a reality today.

Read More

 
©2009 Tips & Article Computers and Technology | by TNB