Sunday, 13 July 2014

Mobile Phone Satellite Navigation


Dedicated portable GPS navigation systems in cars are now very popular, What could be better than being able to get to wherever you want to without having to stop and ask for directions.

Nevertheless, a lot of people overlook a convenient an easy way of navigation which is using your mobile phones for GPS Navigation. You might think because of the small screens on mobile phonbes, it wouldn't be practical, but from experience that is farther from the truth. There are quite a few advantages choosing a a mobile phone over a dedicated portable GPS system for navigation. The main being convenience, Since mobile phones are usually compact and small, it makes it much easier then having a bulky dedicated system.

Another overlooked advantage is security, Since dedicated portable navigation sytems come with a distinct windscreen car mount. There have been cases where cars have been broken into because thieves saw the windscreen mount on the windscreen and the owner park the vehicle, coming out with nothing and then assumed the unit will be in the car.

With the mobile phones, all you need is a compatible phone loaded with the navigation software and a bluetooth receiver. One thing i do sometimes is to also use a bluetooth headset and have the voice prompts from the phone through the headset. You just have to make sure you get the right phone by checking which mobile phones are supported by your choice of navigation software. When you receive an incoming call the software pauses and allows the call to come through and resumes when the conversation is ended.So if you have a correct phone, it might make more sense opting for a navigation software and bluetoth GPS receiver.

How Wireless Networks Work?



Wireless networks work using radio waves instead of wires to transmit data between computers. That's the simple version. If you're curious to know what's going on in more detail, then it's all explained in this article.

Ones and Zeros.


I'm sure you know that computers transmit data digitally, using binary: ones and zeros. This is a way of communicating that translates very well to radio waves, since the computer can transmit ones and zeros as different kinds of beep. These beeps are so fast that they're outside a human's hearing range -- radio waves that you can't hear are, in fact, all around you all the time. That doesn't stop a computer from using them, though.

Morse Code.

The way it works is a lot like Morse code. You probably already know that Morse code is a way of representing the alphabet so that it can be transmitted over radio using a dot (short beep) and a dash (long dash). It was used manually for years, and became a great way of getting information from one place to another with the invention of the telegraph. More importantly for this example, though, it is a binary system, just like a computer's ones and zeros.

You might think of wireless networking, then, as being like Morse code for computers. You plug a combined radio receiver and transmitter in, and the computer is able to send out its equivalent of dots and dashes (bits, in computer-speak) to get your data from one place to another.

All About Frequencies.

You might wonder, though, how the computer could possibly transmit enough bits to send and receive data at the speed it does. After all, there must be a limit on how much can be sent in a second before it just becomes useless nonsense, right? Well, yes, but the key to wireless networking is that it gets around this problem.

First of all, wireless transmissions are sent at very high frequencies, meaning that more data can be sent per second. Most wireless connections use a frequency of 2.4 gigahertz (2.4 billion cycles per second) -- a similar frequency to mobile phones and microwave ovens. As you might know, though, a frequency this high means that the wavelength must be very short, which is why wireless networking only works over a limited area.

In addition, wireless networks make use of a technique known as 'frequency hopping'. They use dozens of frequencies in the range they are given, and constantly switch between them. This makes wireless networks more immune to interference from other radio signals than they would be if they only transmitted on one frequency.

Access Points.

The final step is when it comes to all the computers on a network sharing Internet access. This is done using a special piece of wireless equipment called an access point. Access points are more expensive than wireless cards for one computer, as they contain radios that are capable of talking to around 100 computers at the same time, and sharing out access to the Internet between them. Dedicated access points are only really essential for larger networks, though -- if you only have a few computers, it is possible to use one of them as the access point, or you could just get a wireless router.

They Understand Each Other.

That's all well and good, then, but how does wireless equipment made by entirely different companies manage to work together when this is all so complicated? Well, the answer is that there are standards that all wireless devices follow. These standards are technically called the 802.11 standards, and are set by the IEEE (Institute of Electrical and Electronics Engineers). It is thanks to people sticking to their standards that wireless networking is so easy and cheap to use today.

You Don't Need to Worry.

If all this talk of frequencies has you a little worried, you don't need to be -- wireless networking hardware and software handles all of this automatically, without you needing to do a thing. Don't think that you're going to have to tell one wireless device what frequency another is using, because it's just not going to happen, alright? Wireless networking, for all its complicated workings, is really far more simple to use than you'd ever expect.

Computer Memory



Computer memory is called Random Access Memory (RAM). The information stored in RAM can be accessed randomly, rather than sequentially. This means that data can be found in any location at the same rate of speed. Other storage media, such as CD-Rom and hard drives, must wait while the drive spins to the correct location before the data can be accessed.

Computer memory is simply a storage area for the program code and the data that program uses. Computer programs use RAM to write and retrieve information, allowing for fast data retrieval and manipulation.


How Much RAM is Enough?

Simply stated, the answer is, as much as possible. Keep in mind, though, once you've reached a certain upper limit, which is determined by the computer program(s) used, investment in more memory will see a diminished return.

Adding more memory is one of the best ways to maximize computer performance. If you compare 2 identical computer systems, the one with the most memory will over-all be the faster. More RAM allows the computer to place more program instructions into memory, relying less on the slower hard drive.

Think of 512 Megabytes (MB) as the base standard for a modern computer. With that you can multi-task (run several applications concurrently). For instance, you can check email and download MP3s, without noticeable sluggishness.

Some applications, however, are more memory-hungry than others. Graphics programs, for example, are notoriously greedy. Memory needs are further exagerated by the operating system used. Microsoft Windows is far more demanding than, say, Linux. Currently, most PCs use Windows, though.

Should you notice your computer slowing down, consider adding more memory. Before committing to that option, however, try de-fragmenting your hard drive with a utility (program) designed for that sole purpose. A fragmented hard drive is a common cause of stalled computer performance.


Types of RAM

Right now DDR SDRAM is the most popular memory module. DDR stands for Double Data Rate, which means that the memory can be accessed twice per clock-cycle. SDRAM, the acronym for Synchronous Data Random Access Memory, has been the standard for memory modules for nearly a decade.

To add memory to your computer, you must install modules with the correct contact layout. Before purchasing new memory, you must know which type your motherboard will accept. The most common form factors are 168 pin, 184 pin and 200 pin.

You'll also need to know whether there are slots available on your motherboard. If all the slots are already in use, you'll have to replace 1 or all of the current modules with higher capacity ones. If there is at least 1 free slot, you can simply buy a new memory module and insert it in the empty slot.

A word of caution: whereas some motherboards can accept either SDRAM or DDR SDRAM, the 2 types cannot be mixed. You must decide on 1 or the other. Check the motherboard manual first to determine which kind of memory your computer requires.

And finally, when you are ready to install your brand new memory module, make sure of 2 things: the power is off (for your safety) and you are electrically grounded (for your computer's safety).

What is the need of Registry Cleaners ?



The registry is the place where your computer stores the configuration information about your computer and your installed programs so that your operating system can use them.

Maintaining the registry is an important step in keeping your computer healthy. Registry problems can include slow performance, computer crashing, and the annoyingh Microsoft Windows error messages.

If any of these describes you as a computer user:

- Has old drivers on their system that have not been removed.

- Installs or uninstalls software very often.

- Have third party programs running such as Spyware and Adware (you can't stop these from being installed)

- Remove software by deleting them from the Program Files folder.

- Installs or Uninstalls hardware.

Then you absolutely need to be repairing your Microsoft Windows registry regularly! All of the above leave traces in your registry that will only hurt your computer in the long run. If you don't clean your computer to fix your registry than you are going to be in a whole world of trouble.

Make sure that you backup your registry before you try to clean or fix anything. Most registry cleaners have registry backup automatically for you, but be sure to check them out. Remember, don't try to edit anything in the registry yourself unless you are very computer savvy.

Why do you need a registry cleaner? Registry cleaners are important because it protects your PC from harmful processes. Is your computer slowing down for no apparent reason? Are you having errors that are not solved by your anti-virus or anti-spyware program? Your PC might be affected by applications that are running without your knowledge. Registry cleaners are a must! Registry cleaners ensure that your registry is clean.

Some errors are just a quick registry fix, while others could be more problematic.

If you keep your registry clean, free of viruses and spyware your computer will last much longer. Spend the time or money now for a registry cleaner to save you even more time or money later down the road.

If you are short on cash then there is a free registry cleaner available that I use exclusively. The program is called Error Nuker and it is a free ware registry cleaner. Error Nuker works on Windows XP, Windows 98, Windows ME, Windows NT4, and Windows 2000. Microsoft Windows does NOT come with a registry cleaner.

Sunday, 29 June 2014

Spyware ?

 Spyware

Spyware is the most troublesome software to appear on the  Internet in recent times. When spyware infects a computer system, it may be relatively harmless or it may be devastating.

Spyware like coolwebsearch and new.net are capable of paralyzing a computer system. Laws to regulate spyware are pending in many states and may take years to enforce.

What Is Spyware?

Spyware is any software that collects information about computer usage and/or the computer user. It is installed on one computer and sends information to another computer. Some spywares like the Weather Bug, Bear Share and Kazaa are knowingly downloaded and installed by users. Other spyware is installed without the knowledge or permission of the user.

How Does Spyware Affect A Computer?

Symptoms of spyware infection includes:

* Very slow system performance while browsing the Internet.
* Your homepage changing mysteriously on its own.
* Excessive appearance of pop-ups, on sites likes Google, Yahoo and MSN, which don't use them.
* You can only get your browser to visit sites, which are trying to dupe you into buying spy ware removal software.

Many spyware detection and elimination programs are easily  available for free on the Internet.

How Does One Deal With Spyware?

There are many tools and catalogues available to deal with spyware. One of these tools is Spybot Search and Destroy.  It scans computers for spyware and harmful programs. It shows a list of problem areas to the user and allows him to delete any or all of them.

A user can leave legitimate programs installed by him. These may include peer-to-peer file sharing software or software installed to monitor the on-line activities of children.

A Comprehensive Solution

It may be a good idea for most computer owners to get a comprehensive PC security solution as a bundle. Norton and McAfee, now offer a complete security suite consisting of anti-virus, personal firewall, anti-spam and privacy offerings, and anti-spy ware.

They are quite easy to install and allow parents to monitor children who use the computer. There are many threats on the Internet, from which these suites can protect your computer.

Friday, 27 June 2014

Know whether Yur PC is Vulnerable on the Internet?



Think about this: Is a simple antivirus application enough to protect your PC against all threats?

No longer are viruses the only threat on the internet. In recent years other threats have evolved which include spyware, adware, hacking, identity theft, information theft, pop-ups and the loss of information.

Let’s begin with the basics. We all need to protect our PC in the same way we protect our home, car and bank account. We wouldn’t give a stranger the keys to our car, home or bank account now would we. If you don’t protect your PC it is like giving the keys to a stranger and letting him/her have full access to your PC. Once the stranger has the keys they can snoop around and take whatever they want. I know, your thinking how can they do this, my computer is in my house and my doors are locked. Well, today you can be anywhere in the world and access someone’s computer via the internet. Since the introduction of cable modems and DSL everyone’s PC is online all the time and accessible.

Why do I need to protect my PC, I don’t keep any important information on it? Ask yourself a couple of questions.

1.    Do I bank online?
2.    Do I shop online?
3.    Do I create documents, spreadsheets?
4.    Do I let other people use my PC?
5.    Do I download music, files onto my PC?

If you answered yes to any of these questions then your PC is vulnerable. If you bank online then you are sending personal confidential information to your bank via the Internet. For Example: Let’s say you are infected with spyware and you are typing in your account number plus password. A spyware installation can record key strokes and then send them off to a site on the internet. Now the person who setup the site has your account number and password to your bank. Here is one more example, if you answered yes to I let other people use my pc, here is what happens. The other person decides that they like this new cool piece of software. They download and double click on the exe, msi or whatever installs the software. The adware, spyware or virus installs. Now the infection is installed and now it can start stealing confidential information or cause havoc on your PC. You get onto the PC as always, since you don’t know this has happened and start doing what you always do, type documents, go to chat rooms, do your banking online, reconcile your banking with quicken and all this time your confidential information is stolen and you are completely unaware that this occurred.

The million dollar question, what do I do? Well, you can follow this approach.

1.    Install a Spyware application and install and configure correctly. If you already have spyware application installed make sure it is up to date and make sure that is configured properly.

2.    Install an Adware application and install and configure properly. If you already have adware application installed make sure it is up to date and make sure that is configured properly.

3.    Install an AntiVirus application and install and configure properly. If you already have antivirus application installed make sure it is up to date and make sure that is configured properly.

4.    Install backup software, why because if something does get through your defenses or delete something by accident you always have a way of retrieving the information. You should try to backup your system at least every other day.

5.    Install Encryption software. This software will encrypt files like word docs, spreadsheets, banking file on quicken. This way if someone does steal your information they will not be able to read it.

6.    Install a Firewall. The Firewall can either be software or hardware based. I would install both especially if you bring your laptop with you and connect to the internet at different locations. The Firewall will block hackers trying to scan your system while you are on the Internet.

Many people have these applications installed but they do not configure them correctly. Just installing the application does not mean that the application is working properly to stop the threat/infection. On some applications you need to configure the setting to make the application work the way it was designed to. Find out how to configure and install the software properly either by reading a how to book or getting someone to help. If you already have the application installed make sure it is up to date and make sure that is configured properly. All of the software needs to be up to date and kept current. As new threats are release on the internet, all applications will need the current updates to fight these threats.

Various Types of Computer Infections exists


When you listen to the news, you hear about many different forms of electronic infection. The most common are:

Viruses - A virus is a small piece of software that piggybacks on real programs. For example, a virus might attach itself to a program such as a spreadsheet program. Each time the spreadsheet program runs, the virus runs, too, and it has the chance to reproduce (by attaching to other programs) or wreak havoc.

E-mail viruses - An e-mail virus moves around in e-mail messages, and usually replicates itself by automatically mailing itself to dozens of people in the victim's e-mail address book.

Worms - A worm is a small piece of software that uses computer networks and security holes to replicate itself. A copy of the worm scans the network for another machine that has a specific security hole. It copies itself to the new machine using the security hole, and then starts replicating from there, as well.

Trojan horses - A Trojan horse is simply a computer program. The program claims to do one thing (it may claim to be a game) but instead does damage when you run it (it may erase your hard disk). Trojan horses have no way to replicate automatically.