Wednesday, January 21, 2009

Keeping Your Computer Security



In theory, Virus / Worm or other malware family always step further than antivirus vendor / security anywhere. It is very naive and unrealistic security only if we submit the product's vendor-vendor without any effort from us to behave in a safe computer use.

There are some things you can ensure your computer and your data safe. Computers not connected to the network at all. Put your computer in the special room. Release your hard disk and store in a safe place. Non-port USB switch and drop the DVD drive. Key on the keyboard. Rent a room guard your computer .... In this way the computer and your data will be guaranteed safe.

But, the actual security system is not changed.

Internet is the "world" is very dangerous. Do not ever visit the website that you do not know, let alone that will give gifts, let alone you must first pay.

In selecting an antivirus software program to make sure you choose one that also scan incoming email for viruses. When people set up their firewall and anti-virus programs sometimes they neglect to create a filter their email. There are many good titles that offer anti-virus scanning and email that can protect you from malicious attempts to send mail without an attachment.

Email is a favorite vehicle for people looking for damage to your computer through the Internet, so you must be vigilant when it comes to email. If you get an email with attachment always use your antivirus software to scan the attachment before opening it. Always be careful when opening email attachments as email attachments when the criminals who hide their virus and spyware software that can attack your computer and potentially steal your personal information.

Be careful when Browsing, Chatting & Mailing.
Categorieze thr Internet as a red zone or hazardous or network can not be trusted. Many fell victim exposed to the virus / worm, spyware, sniffing (data theft of information) because the Social Engineering (Social Engineering) through the Internet, such as: Free product information, pornography, cracksite, how easy dapet money, etc..
Be careful though, if the things that reference from friend / colleague you. Moreover, information that comes from people who do not know us.

Antivirus software you have the option of scheduling maintenance tasks, and you should always schedule for the antivirus scan does not only make your system's normal, but it also allows you to periodically check the antivirus software house website for updates to protect their offer. Regular updates to the antivirus software and scan your system's normal can help you to detect and eliminate viruses before they do they can damage.

There are many free spyware removal titles available on the internet. You need to download one to your computer and have a scan of your system periodically to remove spyware software and other malicious code. Make sure to get a reputation and spyware removal program will also offer some of the regular free updates to keep you protected from all the new code of spyware out.

Computer maintenance


Currently, more and more people use computers both for online communication, banking and investment to shop for.

Here are some tips to make a good plan of the Computer maintenance with effective steps you can take to make your computer more secure:
1. Always make a backup and store important information in a safe place separate from your computer.

2. Update your operating system, web browser and software as often as possible.

3. Microsoft Updates, Microsoft regularly releases updates to its operating system (Windows XP, Vista and Microsoft programs other). This update is available . Tuesday of each month and can be downloaded and installed manually or automatically. In most versions of Microsoft operating system users have the option to set all the automatic update program to download and install the update available at a certain time. This is generally the best option because it insures that all critical updates have been installed with a minimum of interaction.

4. Virus, Trojan, Spyware and Firewall Protection Virus, Trojans, worms and spyware that other everywhere in the Internet and a proactive, use antivirus software, you can usually eliminate the threat of system compromise caused by the vulnerability of the system. There are many products available such as Norton Anti Virus, McAfee and Trend Micro and each is capable of providing comprehensive protection. In addition, each can be set to automatically update the system and perform periodic scans provide real-time protection.

5. Disk Defragmenter A Disk Defragmenter to help you to improve system performance and speed back to lose by re-organize the files on the computer's hard drive with the operating system that can find them more quickly. Although most versions of Windows come with a free disk defragmenting program is another tool that can perform more functions, such as defragmenting forward Diskeeper, Perfect Disk, etc. The key again is to set Defragmenter periodically to perform the defragmentation.

6. Install firewalll, because the virus can easily access your computer from the Internet. Consideration should be given to the benefits and differences between the hardware and software-based firewall program.

7. Review your browser and email settings for optimal security. Why should you do this? JavaScript is often used by hackers to plant malicious programs on your computer. While the cookies are relatively harmless in terms of security, they still track your movements on the Internet to build your profile. At least set the security settings for your online frequently.

8. Install antivirus and automatic updates so that you manage to receive the latest version.

9. Do not open unknown email attachments. because the virus can spread from an address.

10. Do not run the program from the address that is not clear / known.

11. Disabling extension file name is hidden. By default, the Windows operating system is set to "hide the file extensions for known file types." Disabling this option to display the file extension on Windows. Some file extensions will, by default, continue to remain hidden, but you are more likely to see all the file extension is not unusual to own.

12. Turn off your computer and disconnect from the network when not using the computer. hackers can not attack your computer when you drop out of the computer or network is not active.

i'm confident and believe that outside there was a lot of the smart and even more to understand about the Computer maintenance.With all humility and respect, not to please others to provide additional if there is a lack of security on computer systems.

Tuesday, January 20, 2009

How to Create a PC Network Workgroup

A workgroup is nothing more than a collection of computers on a network. By isolating larger networks into workgroups, you can more easily access other computers. Your computer must belong to a workgroup if you want to easily access other computers in that workgroup. To join a workgroup, simply specify its name:




1
Open the System icon in the Control Panel.

Or choose Start→Control Panel→System. The System Properties dialog box appears.








2
Click the Change Settings link located in the Computer Name, Domain and Workgroup Settings area.

Click the Continue button if you’re prompted with a User Account Control security warning.









3
Click the Change button.

The Computer Name/Domain Changes dialog box appears.








4
In the Member Of area, select the option labeled Workgroup and type the name of the workgroup.

Either enter the name of an existing workgroup or create a new name for your workgroup here. The workgroup name should be short, with no spaces.











5
Click OK three times to close windows.

You want to close the Computer Name Changes dialog box, the welcome message, and the restart message.











6
Click the Close button to dismiss the System Properties dialog box.

You can also close the Control Panel window, if you want.





7
Restart Windows.

To view all computers belonging to the workgroup, open the Network window.

USB Speeds

If you've gotten a new computer in the last few years, it more than likely came with USB ports. If you're not sure, USB ports are the little slots on either the front or back of your computer that you can use to plug in certain devices, such as a flash drive or digital camera. USB ports come in two different speeds: 2.0 and 1.0, with 2.0 being faster. Most newer PCs have the 2.0 speed, but if you purchased yours quite awhile ago, you may have the 1.0 speed. So, if you've ever wondered which speed you have, keep reading to learn how you can find out!

To get to your computer's USB area, you need to right click on the My Computer icon on your desktop and choose Properties. Next, click on the Hardware tab and then hit the Device Manager button. When the new window opens, scroll down to the very bottom where it says Universal Serial Bus controllers. Click on the plus sign (+) next to that and all of your USB information will come up. You may have quite a few listings or you may only have a few. It just depends on how many ports came with your computer and if you've added any yourself.

If you see one that says something like "USB Enhanced Host Controller," that means you have the 2.0 speed. The "Enhanced" part is what sets the 2.0 apart from the slower speed. On my computer, that entry was the very last one, so make sure you look through your whole list before you make any assumptions. Also, just for your information, if one of your USB ports is 2.0, it's likely that all of your ports will be the same. That goes for the 1.0 speed as well. Most computers don't come with two different port speeds. So, tell me, how does it feel to know what kind of USB speed your PC is running? Pretty darn good, huh? Check yours out today!



Which you use Blogger or Wordpress?

For the first time like blogging, may want to create confusion where blog. Because many options offered. Start from the outside blogs like Blogger, Wordpress, Multiply, and Blogdrive.

Among the many options that the blogging, this time let's peel and discuss blog about the two most widely used at this time, the blogger and wordpress. What are the similarities of both? And what are the advantages to be both?

In choosing any kind, most of us would choose the good and (if the can) for free. The two earlier general criteria can be fulfilled is certain blogger and wordpress. But in addition to two earlier, they have other similarities. What?

1. Easy to use. Both are equally easy to use. It's you type in the word processing program. Before the post is published, you can review it to see first. Does not make it any harder. We follow the instructions that live only in a few steps, so we blog.
2. Available options template (theme). Both have the same choice of theme. However, the amount, there are many more options in WordPress. This template or theme was in fact we can replace with another template circulating on the internet.

In addition, the blogger has the advantages:

1. Can change the design. Edit the file with the style (CSS), we can change the design as we want.
2. Adsense can be made. The majority of the money from Adsense who use a free blog, usually wearing blogger. Perhaps because the blogger and adsense is equally owned by Google. So much easier to adsense approved it. WordPress is actually can, but must use a paid version.

Wordpress has advantages are, among others:

1. Having the feature category. There is a category will make it easier for owners and visitors to the blog. The owner of a blog is easy to determine the scope of the topics will be discussed. For the visitor, this feature makes it easy to search for particular topics of interest. In wordpress, this feature automatically appears. In any blogger can actually appear, but need a little business.
2. It is easy to communicate. I think this is one of the most important advantages wordpress. Which can make or Trackback pingback. Because, in fact every blog owners are social creatures. Like to interact with other blog owners. In addition to comments, and do pingback Trackback are other ways to communicate with other blog owners.
3. There are statistics. Wordpress plug in is available in the statistics can show, either daily, weekly, or monthly. There is also information about the number of users each page and keywords. All this information is important to monitor the development of your blog. So you can take the appropriate action for the development of your blog.