Monday, May 30, 2011

How to Lock Your Computer using Usb – PREDATOR


Technical advancement has brought new vistas of safety and security and today it is very easy to make your laptops and notebooks safe and secure with technologies such as fingerprint readers, face recognition, eye scanners etc. But is there any way to make your personal computer safe?
Here, you’ll find a simple trick that will let you lock your computer using a Usb. This will make your computer work only when you’ll plug in the Usb and once you’ll remove it the keyboard as well as the mouse will be disabled automatically and the screen will turn dark. And finally your computer will be locked automatically. And in order to unlock it, you will have to insert the Usb again.
You can use this trick on all the versions of Windows which include both 32 bit and 64 bit Windows.
So, here we go for the trick that will get your computer Locked with the help of Usb using Predator:-

Step 1. Download the predator software.
Step 2. Once the installation gets completed, Predator gets launched automatically but if it doesn’t happen so in your case, you always have the possibility to run it from –Start/Programs/Predators.
Step 3. After this step, you’ll have to insert your Usb. You will now receive a message asking you to define a new password for yourself. (At the same time it is notable that this won’t get your pendrive formatted and hence your pendrive data will not get lost by this.)
Step 4. Click on the Ok of the dialogue box after which another dialogue box will appear, simple Enter your new password in it.
Step 5. Make sure that the drive letter that gets displayed under “USB key drive” really matches your flash drive. Otherwise you can also select the correct letter from the dropdown list.
Step 6. This is the final step where you are simply required to click on the Create Key button and after that on the OK button.

n the OK button.
Now, the software will automatically exit and after this you will just have to restart the program for which you’ll have to click its icon on the desktop. But remember, a few seconds will be needed in the initialization of Predator and when you’ll find the icon in the taskbar turned green, the software will have self initialized.





Sunday, May 29, 2011

Decoding IT rules 2011


NEW DELHI: Here we find out how the recent changes in India's national IT law affects the internet industry -- and its different arms. 

Who gains, who loses 
Measure: Electronic service providers to maintain transactions, receipts, vouchers in specific formats. The records should be produced for inspection and audit by a government nominated agency or person. Government can audit security and privacy protection measures. 

Impact on Corporates: Increases costs for Intermediaries since they would have to keep electronic records now. 

User Impact: All their transaction data will be kept for access for a time. Ensures a more secure environment. 

Measure: Corporates who collect, or handle, personal information should get permission from citizens through letter, fax or email. Sensitive personal data includes passwords, financial information, physical, physiological, medical records and biometric information. 

Impact on Corporates: All domestic/international BPOs which collect information on behalf of banks, financial companies, will have to take user consent. More cost, administrative hassles and implementation difficulties 

User Impact: More secure personal information. Misuse of sensitive data largely minimised 

Measure: Intermediaries must publish rules and regulations, privacy policy and user agreement for access. 

Impact on websites: All websites will have to take legal help to draft privacy policies and user agreement. They will have a safe harbour in case of legal dispute. 

User impact: Users would be more aware of consequences of accessing a website. Will shift the onus of infringement on user, once he accepts the terms of access. 

Measure: If an intermediary receives a complaint, it must act within 36 hours and also store such information for 90 days. Each website to have a grievance officer. 

Impact on websites: They will have to keep a team to monitor & take off content whenever reported unlawful. 

Impact on users: Faster resolution of disputes. But freedom of speech can be curbed if controversial blogs and article posts are removed on flimsy complaints. Rights of different user groups can be hurt and protected at the same time. 

Measure: Cyber cafes must register with a government appointed agency. They must identify every customer and keep a user record for a year. Computer screens must face the open area of the cafe. Cubicles must not be more than 4.5 ft high. Cafes will be inspected by a government agency. 

Impact on websites: Government control can stifle entrepreneurship in the sector. Bureaucracy will encourage corruption. 

User impact: Users may face problems to internet access if they don't possess and ID card. Minors won't be allowed access alone, unless accompanied by an adult. May stifle internet access in the country.

What is a Machine ID (Computer Name) and How It Can Be Changed?


What is a Machine ID or Computer Name?

A Machine ID or Computer Name in a nutshell, is the name that a computer uses to identify itself from the other machines on a given network.  There is also such a thing as a virtual name or id, but that is not the same thing as a computer name and is another lesson for another day. For example: I have a desktop computer, two laptops, a cell phone and a printer on my network.  The name of my network workgrouop is Camelot.  The names that identify the individual devices (Arthur, Guinevere, Lancelot, Merlin and Galahad) on the Camelot workgroup are known as machine id’s. The name that your computer has by "default" when you buy it is basically unnecessary once you have made your purchase and can be pretty ugly and difficult to remember, so changing it to something that you will remember and that represents you and/or your company may hold some obvious attraction for you.
To take this concept one step further, let’s say that my network was the internet  domain named camelot.org.  The computer name or machine id will often stand as the host name of a particular machine on the network. One host or machine name might be www aka www.camelot.org, another might be lancelot, lancelot.camelot.org, etc. Often virtual host names are given to a machine within a domain so that it may use several different names on the network.

Changing Your Computer Name

Changing your computer name is generally an easy feat in Windows XP, 7 or Vista. When changing your computer name or machine ID, keep in mind that computers may have only 15 alpha-numeric characters per name(a-z and 0-9). Special characters are not allowed.
To change your computer name in:
Windows XP
  From the desktop:
  1. Right click on My Computer
  2. Choose Properties. 
  3. At the top of the screen click the Computer Name tab
  4. In the center click on the Change button
  5. Change the name in the top box
  6. Be sure to choose domain or workgroup and add the appropriate information
Windows 7 or Vista
From the start menu:
  1. Right-click on Computer.
  2. On the left, choose Advanced System Settings.
  3. On the titlebar, you should see "System Properties". Verify that you are on the Computer Name tab.
  4. In the center click on the Change button.
  5. Change the name in the top box.
  6. Be sure to choose domain or workgroup and add the appropriate information.
So, there you have it. Now you know just what a computer name is, what it does and how to change it to something of your liking, rather than some silly and difficult to remember default name, provided by your OEM.

What is a Fiber Optic Cable


A fiber optic cable consists of a center glass core through which signals passes. It is surrounded by a glass cladding. Sometimes the cladding is surrounded by PVC to increase the cable strength and provide a support for the cladding. This cladding is sometimes surrounded by metal fibers to give extra strength to the cable. It is finally surrounded by an outer cover known as sheath.
In a fiber optic cable, the electrical signals are converted into appropriate light signals and transmitted through it. An emitter sends the signals from one end of the cable and a light sensor (Photo detector) senses this signals and then converts into its digital equivalent. There is a transceiver located at both ends of the cable where the signals are converted from electrical to light signals and vice versa. Fiber optic cables are available in different sizes with varying core and cladding diameters. But the most commonly used fiber optic cable is the 62.5/125 micrometer. The diameter of the core is 62.5 micrometer and that of the cladding is 125 micrometer. Almost alI network technologies that use fiber optic cable require pair of fibers to create the popular duplex fiber optical cabling. Two sources of lights: Laser and LED are used for fiber optic cable. In a fiber optic cable, signals can be transmitted in only one 

direction. So, two strands of cables, each contained in different cladding are used to send and receive data signals. Kevlar fibers are used as a sheathing material as they are extremely strong I Kevlar fiber is an organic, man-made fiber which is five times stronger than steel. It has an advantage of light weight and high strength. It provides high resistance to chemicals and fire and thus protects the signal comfortably.
Fiber Optic cables use the principle of total internal reflection to transmit light signals. Speed of a light differs depending on the mediums. The ratio of the speed of a light in a vacuum to the speed of light in a material is called as a refractive index. The refractive index of the cladding is more than that of the core. Thus light waves bounce back and forth inside the core and thus the signals are transmitted. This phenomenon is known as total internal reflection.
Uses and Need of Fiber Optic Cables
Fiber optic cables are mainly used in environments that are highly susceptible to noise and other interferences. Since these cables carry light signals, they are not prone to any interference problems. These cables are highly secure as they do not emit any external signals. Fiber optic cables are used instead of copper wires due to the following characteristics:
Bandwidth - Carries huge amount of data ranging from 100 Mbps to 1 Gbps.
Segment length - Transmits readable data signals in a range of 2 kilometers to 100 kilometers. This allows the user to transmit data over a long distance.
Interference - Secures data from being secretly read as no electrical signals pass through these types of cables. These cables can be used in areas that are highly susceptible to noise, for example, near T.V. towers, Radio stations, Electric transformers. Copper cables are prone to interference to a certain extent.

Saturday, May 28, 2011

Top 5 Free Programs to Speed Up Your PC

Have you ever been stuck with a slow computer that made simple things like browsing the Web next to impossible? If yes, then you know how frustrating it is. Fortunately, you can speed up a slow computer without having to spend a single dollar. Here are 5 free programs that will help you speed up your PC.
1. Auslogics Disk Defrag
Disk fragmentation can make your computer really slow, as it scatters file fragments all over the hard drive. That’s why it’s important to defrag your PC at least once a month. Auslogics Disk Defrag is a free defragmenter that has a lot of advanced features even the paid defrag utilities lack. It can defrag files, consolidate free space and move system files to the faster parts of your hard drive, so that your computer works faster in general.
2. CCleaner
Piriform’s CCleaner is a great little computer cleanup package that can cleanup all types of computer junk. It can delete temporary system and Internet files, fix registry errors, help you uninstall software without leaving a single trace, manage your startup items for faster PC boot, and protect your privacy by shredding files and wiping free disk space.
3. Autoruns
Even though CCleaner has a startup management utility, it’s best to get Autoruns to manage your startup list properly. This application will help you analyze our startup configuration and help you optimize it for best performance.
4. Revo Uninstaller
Too often people install software just to try it out and never use it after playing with it for a couple of days. Having too many programs installed on your computer can slow it down by stealing hard drive space. Revo Uninstaller is an advanced utility that can completely remove software without leaving a single trace. This means that everything is removed – even the registry entries.
5. Auslogics Duplicate File Finder
Duplicate File Finder is another handy free program from Auslogics. With its help you will be able to detect unnecessary duplicate copies and free up disk space. The program is very intuitive and can match detected duplicates by content, so that you can be sure you are deleting a true duplicate and not a file with the same name.
These 5 free programs are essential for everyone wanting to keep their computer running fast, stable, and error-free. Remember to cleanup junk on a weekly basis and defrag at least once a month, and your computer will be running as good as new.


The World of Search Engines

The computer world is a fascinating place as it is, but when it comes to finding information, it can be a huge stress.  For many people, they have their favorite search engines, however there are still many more people, that don’t, they like to test the waters. 
The search engine world is bigger than many people realize.  There are a lot of different search engines to choose from.  Since it is near impossible to list them all, here are a few that may help you and what they do in terms of searching the world wide web.
1) Google- http://www.google.com- Google isn’t just a search engine these days, it has changed and evolved into a world all of its own.  Not only can you do your web searching, but you can also get e-mail by using their gmail system.  But, wait, you can also set up your own personal home page that can reflect your personality and give you information that you care about.  This home page is called iGoogle.  On your iGoogle homepage you can have a news feed, weather, comedy, videos, recipes and much more.  If you like to shop, you can select one of the many preselected tabs at the top of the google page that simply says "shop"  You are then taken to a page that will show a bunch of different items to choose from and a search bar.  If you don’t see what you are looking for on the page, simply type it into the product search bar and you are shown what you are after.  The page will then give you a list of different sites offering the items and the prices.  Google will have the lowest price as the feature on the top of the page.  Looking for directions?  Many have found how wonderful it is to use Google Earth to get directions to a destination.  But, alas, this isn’t everything that google has to offer.  Google has a huge list of many different things for its users, even online documentation storage.  Go to Google and check it out for yourself.

2) Yahoo- http://www.yahoo.com-  Yahoo is a big competitor of Google’s and I must say, quite competitive at that.  Yahoo was the first search engine to offer Instant messanging.  Many of us get into contact with friends and family through Yahoo messenger, it is a great way to talk instantly to someone when you are sitting at your computer.  Yahoo is also really good at helping you to search for things on the internet. You can also hop into a game, even check out some of the other forums that Yahoo offers for example, dating, groups, careers, movies and much more.  Yahoo makes it quite convenient for you to find the information that you need.
3) Dogpile- http://www.dogpile.com- Dogpile compiles a search list from all of the top search engines that are found; google, bing, yahoo, etc.  Simply type in your desired search request, then hit the "fetch" button and the engine whizzes off to find the information that you are looking for.  Dogpile allows you to create a tool bar on your web browser so that you can use it directly when you are researching different topics.  On the main page you are greeted with a picture of a cute dog and popular "fetches" that have been performed by other users.  You can make dogpile your homepage just like you can with many other search engines. 
4) Swag Bucks- http://www.swagbucks.com- This search engine provides you a way to earn money and points for prizes.  However, in order to use Swagbucks as a search engine, you have to create an account.  If you aren’t comfortable with this step, that’s fine, as you know there are many alternatives on the internet.  If you do choose to become a member, there are a lot of interesting things that you can do on Swag Bucks besides simply searching for things.  Swag Bucks has a similar screen lay out to the one that you find on Yahoo.  You can even clip coupons with Swag Bucks and earn points for the coupons you choose.  This is a great way to save money at the store and earn a little extra on the side.  You can also watch different programs, simply by clicking on "Swag TV".  You are given a list of different videos, however at the top of the screen you can also choose from different genres.  If you think this is a cool way to earn points that can be cashed in for money or other items, hop on and take a ride on the Swag Bucks website. 
5) Bing- http://www.bing.com or http://www.msn.com- As many people know, MSN has gained a lot of internet respect for the many things that they have done.  Most of which was being an inovator and getting the news on the web.  As many sites have done, they have evolved into a world of their own, part of that world is now Bing.  Bing is MSN’s search engine system.  When you enter from Bings link, you are taken to their main page, which is simple with a pretty background.  From there, like all search engines, you simply type in what you are looking for and off you go to what is a list of available possibilites.  Bing also gives you an option list if you are looking for something specific like maps, entertainment, videos, etc.  If you don’t want all the other stuff and want a basic search engine, simply go to Bing directly for your internet research needs.
6) Alta Vista- http://www.altavista.com- Alta Vista is another simplified search engine sticking to the basics of web searches.  You are greeted with a main screen that has the search tool bar, you can simply type in what you need and Alta Vista will give you a list of websites that you can review for your search.  You are given the option to strictly look in the US websites or also international sites that might be available for your search.  Not finding what you need, you can click on the small words "advanced search" Alta Vista will then help you do a deeper search for what you are looking for.  A little secret, Alta Vista is a part of Yahoo, so when you do your search you might be shocked when you look up at the top of your web browser and see the small yahoo icon. 
7) Web Crawler- http://www.webcrawler.com- Webcrawler is similar to Dogpile.  The site compiles a search from the top search engine sites and gives you a list of result.  It also provides you with some simplified key searches like coupons, this of course is stated as being one of its "featured" searches.  Again, if you are looking for simple, Webcrawler can help.
8) Ask.com- http://www.ask.com- Have a question that needs to be answered?  Ask.com can help.  This is another simplified site.  When you go to the main page, you are greeted with the search bar and "Question of the Day".  Type in your question and answers will pop up, from there, you can then do the search that you need to do.  Ask is its own system.  When you do type in a search question or information, it is quick to retrieve the information that you are looking for. 
9) Lycos- http://www.lycos.com Lycos has been around for a long time, however, because of the popularity of so many other sites, many people don’t remember that Lycos is still available for your web searching needs.  Lycos uses a dog for its mascot.  On the home page, you are given images and information on the latest news.  This information could be from events happening around the world to the entertainment industry.  You are also given a list of "Things to do"  This list is compiled of Playing games, checking e-mail and much more.  To use the e-mail service you will have to pay a fee.  This one may be one to only use when doing an information search. However, if you are setting up a new business and wish to create a domain and e-mail for that business Lycos has reasonable rates for those looking to keep within a specific budget for their new businesses.
10) AOL- http://www.aol.com- For many users of AOL they know how easy it is to use AOL’s search engine.  You can compile a nice list using AOL’s search engine.  AOL’s homepage is no way simple.  You are given news information and much more.  If you don’t want to feel overwhelmed when doing your search, you might want to skip this one, however, if you like getting additional information, then open up your arms to the search engine provided by AOL.  Many members that still use AOL do it every day.  AOL provides you with the latest news headlines as well as Sports, Entertainment, Weather and more. 
What ever search engine you choose just remember it does take time to adjust to if you have used others before.  Many people will go back to old habits and use the one that most people still use.  You hear the name used in most conversations when searching for information on the web.  That search engine of course in number one in the world.  As the saying all of us have heard for many years now; "Just Google It"  But, is google really for everyone? 

Categories of Fiber Optic Cables


Fiber optic cables can carry signals in a single direction. Data is sent from one end of the cable and received on the other end. Data signal is sent using a Light emitting Diode (LED) or by using lasers. In order to send and receives signals to complete the round, you need to have two strands of cables. Light signals are turned on and off in order to transmit data. Different types of fiber optic cables are available. The two types of cables usually used are as follows:

1) Single mode - A type of cable that has only a single strand of glass fiber with a thin diameter. The diameter of the core glass is approximately 8.3 to 10 micrometer. Only a single light signal can be transmitted through it. Single mode fiber is more resistant to signal attenuation than multimode fiber. Thus more information can be transmitted over long distances, increasing speed of transmission. Fiber optic cables that use lasers are known as single mode cable.
The advantage of single mode fiber optic cable is that data can be transmitted at higher speeds. Single mode fibers can also transmit data over longer distances as compared to multimode cables.
The disadvantage of single mode fibers are that only one signal can be transmitted through it. To transmit two signals you need two strands of fiber optic cables.
2) Multi mode - A type of cable that contains a glass fiber with a larger diameter. Multiple modes of light signals can be propagated through it. This is a 62.5/125 micrometer fiber cable. Light signals are transmitted into the fiber using different paths and wavelengths. Multi mode fiber transmits the data over short distances as the various modes tend to spread over long distances, resulting in attenuation. Fiber-optic cables the use LEDs are known as multimode cables.
The advantage of this type of cable is that you can transmit two or more signals using a single fiber. The disadvantage of this type of cable is that data cannot be transmitted over long distances using this cable. Since two or more signals are transmitted using one fiber, the transmission speed is less as compared to single mode fiber optic cables. Single mode fiber-optic cable that uses laser light has a capacity to cover a long distance with high transfer rates. To differentiate between a single mode and multimode fiber-optic cable is somehow a difficult task. Single mode and multi mode fiber can be differentiated depending on their core diameter. Multi mode fiber has larger core diameter as compared to single mode fiber. Multimode cables are used nowadays.

Characteristics of Fiber Optic Cables

Networking involves connection of computers, workstations and peripheral devices. Networking hardware involves ail the peripheral devices, interface cards, and other equipments such as cables and wires that are used to establish a network connection. Wire is a single, cylindrical strand of metal conductor with low resistance to the current flow. Cable can be defined as a bunch of wires bound together which may be bare or insulated. A medium or channel is needed to link these devices. You can connect these devices either using physical transmission medium or using wireless transmission medium. Physical transmission media involves the use of wires and cables. Wireless transmission involves the use of radio wave, Infrared and Microwave technologies.
Characteristics of fiber optic Cables
Beforeselecting a cable for a network, you may have to consider various cable characteristics. Every cable has certain advantages and disadvantages. You may have to consider the following criteria before selecting and installing a network cable:
Segment length - Defines the length of a single wire. Every cable has a limitation to carry signals only to a particular distance after which the quality of the signal degrades and becomes corrupt. The capacity of I cable to carry signals to a certain distance till they can be regenerated using amplifiers or repeaters is known as the maximum segment length of that cable.
Attenuation - As the signals travel through copper cables, they lose their strength. This loss of signal strength in a cable is called as attenuation. With more attenuation, the signal strength arriving at destination decreases. As the operating frequency and cable length increases, attenuation also increases. Attenuation s measured in DB (decibels) and expressed as a negative value as it indicates a loss, for example -12 DB.
Bandwidth - It is the amount of digital data that a cable can carry. Each type of cable can carry only a certain amount of information or data over a given period of time. This capacity is measured in terms of bandwidth. It is measured in terms of bits or bytes the cable can carry at a certain time. It is an important factor while selecting a network.
Number of segments - Defines the maximum number of segments in a network. Every network cable is subject to a maximum number of segments it can have. The amount of time taken by a signal to traverse through the particular length of the cable is known as latency. Every cable is subject to latency. If the time taken to traverse is long, it is assumed that the signal will not reach the other end. Therefore cables are subject to a maximum number of segments so that there is no delay in receiving the signals from one end to the other.
Cost - Cables come in different quality. Depending on the length, size of the network, you may need to choose the right type of cable. Copper cables are the cheapest form of cable, whereas fiber optic cables are the most expensive. Installation costs of copper cables are cheap as compared to that of fiber optic cables.
Interference susceptibility - Explains the concept of electronic interference on cables. Each type of cable is susceptible to some interference such as internal or external noise. It depends on the environment where the cable is to be laid. External noise may consist of Electromagnetic interference (EMI) or Radio frequency interference (RFI). EMI refers to unwanted radiations or noise from external devices such as motors and relays. RFI refers to the radiation in the radio frequency range interfering with transmissions over copper cables. In case of shielded cable, if the shield is not grounded properly, then it acts as an antenna and picks up such interfering signals. Cables that consist of shielding are less susceptible to interference than the unshielded cables. Coaxial cables and shielded twisted pair cables are less susceptible to interference. Fiber optic cables are the least susceptible to interference.
Crosstalk - Explains the concept of interference generated when magnetic fields or current of one cable affects electrical currents of other cable. Cable crosstalk can result into signal distortion which leads towards network problems. Crosstalk can be reduced by twisting and shielding the wire pairs. In twisted pair cable the magnetic fields cancel each other to decrease the crosstalk.


Source: http://factoidz.com

Friday, May 27, 2011

eReader growth among Americans surpasses previous expectations


New statistics coming out from eMarketer are reporting that eReaders in the US have more than quadrupled in the last two years. They also report that the rapid growth is ongoing.
According to eMarketer, in 2009, 1.9 percent of adults, 4.4 million Americans over the age of 18, owned an eReader. By the end of this year they estimate that the number of Americans with an eReader will jump up to 20.6 million Americans, or 8.7 percent.
They also predict that by 2012, 12 percent of adult Americans will have an eReader or similar device.
Upon hearing of Amazon’s success with its Kindle eReader and eBooks, last summer Forrester predicted great success for eReaders - but not to such a degree that we’re seeing now and is currently being projected for the future.

Forrester’s James McQuivey stated that by 2012, 15.5 million adults in the U.S. will own an eReader; 13.4 million less than eMarketers current prediction.
Forrester also predicted that the eReader market will cap in 2015 with just less than 30 million Americans – the approximate one-fifth of online adults who are said to read more than two books a month.
The current eMarketer figures represent a single user for each eReader; there is no assumption there is sharing of the eReaders.
However, eMarketer notes that many users do in fact share their eReaders. In a Nielsen report last year, they surveyed consumers and found that a third of eReader owners share their eReaders with at least one other person.
According to eMarketer senior analyst Paul Verna, the reason for the healthy growth of eReader users has to do with the healthy selling numbers at both the lower end, and higher end of the spectrum.
He said, “Amazon’s announcement that its ad-supported, lowest-priced Kindle is now its best-seller supports the view that people are eager for affordable, no-frills devices. At the same time, Liberty Media’s $1 billion offer for Barnes & Noble was predicated largely on the retailer’s success with the NOOK Color, whose list price is nearly double that of the ad-supported Kindle. Healthy sales at both ends of the ereader price spectrum bode well for continued adoption of this device category.”
Of the relationship between advertising and eReaders, Verna went on to say, “Brand marketers seeking to reach book enthusiasts have a new medium at their disposal with the ad-supported Kindle. Naturally, marketers will want to avoid disrupting the reading experience, but ads on the Kindle screen saver and homepage appear to be hitting the spot where the interests of advertisers, publishers, device-makers and consumers converge.”
paidContent.org reports that many experts believe a price below $100 is crucial to eReaders growing success.
When Kobo announced this past week that they were releasing a new touch-screen version of their eReader, they also revealed that the prices for their original devices were going to drop to $99 US.

Source:  http://www.digitaljournal.com

Microsoft releasing its next-gen Windows Phone


Microsoft previewed for release today the next generation Windows Phone, code-named Mango, with an array of new features and a faster browser.
Pushing the limits with its more than 500 new features, the “Mango” is set to be released in early fall, and will be available to Windows Phone 7 customers for free.
"Seven months ago we started our mission to make smartphones smarter and easier for people to do more," said Andy Lees, president of the Mobile Communications Business at Microsoft in a press release. “With ‘Mango’, Windows Phone takes a major step forward in redefining how people communicate and use apps and the Internet, giving you better results with less effort.”



The “Mango”, which organizes information around the person or groups people interact with, is said to simplify the way smartphone users communicate. In addition, rather than apps running independent of each other, they are integrated into the core of the phone, so they are always there, allowing for multitasking.
When compared to Apple's iPhone and Android, “Mango’s” Internet Explorer 9 trumped the competition in a Windows Phone Browser Speed Test by GeekWire.
As reported in the Official Microsoft Blog, some of the new “Mango" features include:


Improved Live Tiles, which provides even more real-time information to the home screen. Live Tiles on Mango can be more dynamic and contain more information.

Deeper social network integration. Twitter and LinkedIn feeds are now integrated into contact cards, and “Mango” includes built-in Facebook check-ins and new face detection software that makes it easier to quickly tag photos and post to the Web.

Internet Explorer 9. A browser based on the powerful Internet Explorer 9 and including support for HTML5 and full hardware acceleration. That's a shot of IE9 to the left.


Local Scout. Provides hyperlocal search results and recommends nearby restaurants, shopping and activities in an easy-to-use guide.
Having recently made public a partnership with Nokia, Microsoft proposes the “Mango” will help further expand and strengthen new partnerships with Acer Inc., Fujitsu Ltd. and ZTE Corp., which announced, today, plans to ship new Windows Phone devices to markets around the world. Additionally, Microsoft announced it will support new languages.
Currently, the Windows Phone Marketplace offers more than 17,000 apps, and projects to be in 35 countries by this fall.

Thursday, May 26, 2011

How to create your own Wi-Fi hotspot


Almost all the portable gadgets we use today need to be connected to the internet. Instead of getting an individual internet connection for each of them, you can use one of them to create a personal, mobile Wi-Fi hotspot. 

All your other Wi-Fi-enabled devices will then be able to connect to this hotspot and share the primary internet connection. 

Apart from the practicality angle, there can be many uses for this. Your laptop can have high-speed internet connectivity on the move. Within your own network, your devices will be able to share data with each other. 

And you will save quite a bit of cash at the end of the month if you share just one unlimited data plan with five other devices.


Using a Symbian Phone


Symbian Series 60 phones with Wi-Fi were actually the first to get the ability to create a Wi-Fi hotspot, using a free app called JoikuSpot Light. JoikuSpot also supports certain Samsung Symbian Series 60 phones like the Omnia HD i8910 and the Maemo-powered Nokia N900. 

Well, JoikuSpot is still around (joiku.com) and has been upgraded to include support for Symbian Series 60 5th Edition (touch phones like the Nokia 5800 and 5530 Xpress Music) and the latest Symbian^3 (for phones like the Nokia C6, C7, N8 and E7). 

With the Light version of JoikuSpot, you cannot name your network and the Wi-Fi hotspot that you create is unsecured, meaning that anyone with a Wi-Fi enabled device will be able to connect to it. 

The Light version is also limited in the sense that it only supports basic internet protocols (not all websites will be accessible using a hotspot created by JoikuSpot Light). 

Apart from that, there are no restrictions on the Light version, no time limitations and no obligation to upgrade to the paid version. 

To download the Light version directly to your phone, visit joikuspot.com/light from your phone?s web browser. If you prefer to secure your Wi-Fi hotspot so that only you can access it, you can get the paid version for $12.50 from joikushop.com.

Using the iPhone 4


Wi-Fi tethering on the iPhone was previously only available for jailbroken devices. The MyWi application (available for $19.99 from the Cydia installer on jailbroken devices) can connect to a cellular network on the iPhone 2G, 3G, 3GS, 4 and iPad to create a personal Wi-Fi hotspot. 

The app also enables USB and Bluetooth tethering on the same devices. More information on MyWi can be found on the developers website, intelliborn.com. 

No such app is available for non-jailbroken devices. However, with the latest iOS 4.3 software update (available to download from March 10, 2011 onwards), the iPhone 4 also gets the personal Wi-Fi hotspot option officially. Using the new feature, three devices can connect to the iPhone 4 using Wi-Fi, and another two using USB and Bluetooth. 

At this point, it’s not clear as to why Apple is not offering the feature on older devices like the iPhone 3G/3GS or for that matter on the 3G version of the iPad.

Using an Android device


Android has the most options when it comes to sharing an internet connection via Wi-Fi. For starters, any phone or tablet with Android version 2.2 or later has the personal Wi-Fi hotspot feature built in by default (without any restrictions). 
To activate it, go to Settings > Wireless and Network > Mobile AP. Once you activate Mobile AP, you can configure it with a name, add an access password and even hide the network so that only trusted devices can connect to it. 
There are many options for older Android devices too. PdaNet is an option for USB and Bluetooth tethering (It was earlier also available for Palm and Windows Mobile phones). You can download the app directly from the Android App Market, connect the device to your computer and access the data connection. 
Another open source project is Android Wi-Fi Tether (available from code.google.com/p/android-wifi-tether). The app is available even for older devices with Android version 1.1 and 1.5 (cupcake). However, to use the Android Wi-Fi Tether app with Android version 2.1, you need to have a rooted device. 
Rooting an Android phone is a process similar to jailbreaking on Apple iOS devices. It allows more access to the device?s hidden settings. Rooting is not illegal but will definitely void the warranty on the phone.

Using Windows Mobile 6.5


Devices like the HTC Touch Diamond and HTC HD2 powered by Windows Mobile 6.5 can also use JoikuSpot the same application that Symbian smartphones use. It is available for purchase and immediate download from joikushop.com. 

Another option is WmWiFirouter (wmwifirouter.com). While a 21-day free trial of the app is available, you will have to buy the full version for Rs 940 to continue using it after that. Wi-Fi tethering is not yet available for the latest Windows Phone 7 devices yet.

Using a Windows 7 laptop


If you have a Wi-Fi enabled Windows 7 laptop (32-bit or 64-bit), a free program called Connectify (connectify.me) can create a personal hotspot, allowing other nearby laptops, phones, portable gaming consoles and tablets to use your internet connection. 

Like with any Wi-Fi router, you can configure it with a name, add access passwords and hide the network (disable broadcasting). Once the software is installed, the Connectify hotspot can be started and stopped at any time from the Windows 7 notification area on the right side of the taskbar. 

Connectify works with most Wi-Fi cards in laptops, though the functionality may be limited in some cases. For example, if your laptop connects to the internet using Wi-Fi itself, it may not be able to use Connectify to further share the network. 

If your laptop connects to the internet using an Ethernet cable or using a USB data card, Connectify will work without an issue. However, if your laptop has a Windows 7 certified Wi-Fi card, it will support Access Point connections. 

This means that even if the laptop connects to the internet using Wi-Fi, it will still be able to share the internet connection with other devices. If your laptop has a Windows 7 certified Wi-Fi card that supports Access Point connections, Connectify can also be used as a repeater or range extender for your home Wi-Fi network. 

All you have to do is place your laptop towards the periphery of your existing Wi-Fi network and enable Connectify. 

Unfortunately, Connectify depends on improvements made to Windows 7 to operate, hence it is not compatible with Windows XP or Vista (although it is compatible with Windows Server 2008 R2). Connectify will also soon be available for Android devices (available on the Android App Market).

Using Tata Photon Wifi


Apart from the regular Tata Photon+ USB device, you can also go for the Tata Photon Wifi. It is a pocket-sized, battery-powered router that connects to the Photon network and provides high speed Wi-Fi connectivity for up to 5 nearby devices. It costs Rs 6,599 (plus the usual monthly plan).

Using Olive VR-9 Router


This battery-powered device is an easy way out if you already have a high-speed USB data card. The Olive Nexus VR-9 has a USB port into which you can plug in a data card and it creates a Wi-Fi hotspot that can be accessed by five devices. 

It costs Rs 3,500 and can be purchased from olivetelecom.in. 

It has a complicated initial setup process?you have to connect the device with an Ethernet cable, enter the router?s IP address and feed in data card details (number, username, password). 

The battery lasts for 4 hours but you have the flexibility to plug your data card directly into the laptop anyway. It might make more sense than the Tata Photon WiFi because even after adding the cost of a USB data card (Rs 1,599 for Reliance, Rs 1,799 for Tata), it is still cheaper. 

All your other Wi-Fi enabled devices will then be able to connect to this hotspot and share the primary internet connection. 

Apart from the practicality angle, there can be many uses for this. Your laptop can have high-speed internet connectivity on the move. Within your own network, you devices will be able to share data with each other. 

And you’ll save quite a bit of cash at the end of the month if you share just one unlimited data plan with five other devices. 

Tuesday, May 24, 2011

First Ever Desktop PC with Chrome OS Announced




This device was originally not brought out for running Chrome OS instead its initial creation was in order to run Windows 7and Suse Linux. However, the company has announced that the device will also be available for running Chrome OS from this July 4.
Though it is believed that design is just what you like or dislike, yet the Chromium PC has something mischievously attractive about it. It looks different and one can surely say that displaying it in your living room makes you feel far prouder than keeping a netbook out there!
A modular has been used inside and out for designing the computer. The operating system can be switched on by simply switching a board present on the inside part of the device. Added to this, you get a scalable architecture because of the multiple systems that it offers.
The Chromium PC’s specs have not yet been finalized; however, 8 to 25 watt AMD Athlon single or dual core processors are being used for the current Windows as well as the Linux versions.  The PC will come along with two eSATA ports, six USB ports, DVI interface, Ethernet, and connections for video/audio and power.
With its prices ranging from $849 to $1500, one cannot place it in the cheaper PC slot. The ones which will be available at $1500 will come equipped with an SSD of 128 GB along with a faster processor. And with an extra $30 you get a Chrome finish – customization option.

Source : freesoftz.com

Thursday, May 19, 2011

3 Troubleshooting Tips for Corrupt CD ROMs

Without exception, all hardware in your computer needs to have device drivers installed in the computer for it to be able to function. Even the “lowly” CD ROMs require device drivers. While CD ROMs are slowly being phased now it still retain some of its usefulness especially in installing an operating system or restoring back-ups of files and device drivers.

Most of the CD ROMs that are being used nowadays can be installed without much of a hassle. You just plug in the device in your machine, start up the computer and your operating system will automatically install the device drivers for your CD ROM to work. Devices that can be automatically used after ‘plugging’ them in your system are called plug-and-play devices. What an operating system will do is detect your CD ROM and check if a universal driver is available for use within the operating system itself. Of course, this is only applicable if your CD ROM is either generic or older than your current operating system. If your CD ROM is more of the ‘advanced’ type, you will have to then install its device drivers before you can use it.

There are cases wherein your CD ROMs’ device drivers become corrupted. Once this happens your CD ROM will cease to function or some of its features will be unavailable. There are 3 ways to troubleshoot corrupt CD ROM drivers.

Update the device driver of your CD ROM. Check the version history of the device driver of your CD Rom and when it is necessary, update it. You can easily update its device drivers by connecting to the internet and downloading the latest available drivers. Go to the manufacturer’s website of your device, look for the driver’s support link and check for newer versions of device drivers for your CD ROM. Updating your CD ROMs’ device drivers is relatively easy and free.
If your CD ROM malfunctioned right after you install another piece of hardware like a video card or a network adapter then it is most probable that there is a driver conflict between your CD Rom and the newly installed hardware. To solve this, uninstall the device and check its hardware documentation before installing it back. Check also the compatibility issues of your new device with your CD ROM. If this does not solve the problem there are support forums in the internet that will help you solve hardware conflicts.

You can also restore the device drivers of your CD ROMs by doing a clean install. First, you uninstall the device driver, turn off your computer and physically remove your CD ROM. Reinsert the CD ROM and restart your computer then install the device drivers back. The reason why your CD ROM does not work may be as simple as bad installation, so consider a lot of possibility first before declaring your hardware defective.

These three simple things in trouble shooting corrupt CD ROMs are easy to do. It also helps avoid throwing a good piece of hardware when all the while the problem lies on its software.

Client/Server Configuration and Open System Interconnection (OSI) Model

Client/Server Configuration

Client/Server is a configuration of the computer network that includes a server and one or more clients. The client manages the local resources that are used by the user such as monitor, keyboard, CPU and peripherals. The server is a more powerful system which manages shared resources such as databases, printers, resources communication links or high powered-processors and handles all the incoming requests for its shared resources.
Server is a centralized and dedicated entity which manages data, printers or network traffic depending upon the type of the server. The server must run a server program to share its resources. In a network, one server can be used for multiple purposes or you can have multiple servers for specific applications. Many programs are built into the Operating System (OS) which can be used for the sharing of resources and for other purposes. Client is a computer on which user runs applications. Clients can also be called as workstations. The network resources are stored on the server and are accessed by the clients. Clients cannot access shared resources available another client. Server has large storage capacity. It stores most of the information required by the clients. Client Server architecture is also known as two-tier architecture. The example of this type network is Novell Netware client/server system.

Open System Interconnection (OSI) Model

Open System Interconnection (OSI) model developed by the International Standards Organization (ISO) describes the flow of information from one computer to another. Open System Interconnection (OSI) model is also called ISO OSI Reference Model. Open System Interconnection (OSI) Model is a conceptual model that has seven layers. Physical, data link, network, transport, session, presentation and application are the seven layers of OSI model. Each layer performs distinct functions on the data in accordance with the previous layer functions. The application, presentation and session layers are called as upper layers. All the lavers of the OSI reference model use different protocols. Protocol defines the procedure that is to be followed during data transmission; it is the set of specified rules and standards used to transmit data from one device to other device. The different layers of Open System Interconnection (OSI) Model are discussed further in minute details in my upcoming articles.

Source : http://factoidz.com/