Thursday, February 11, 2010

How to Hook a Laptop Up to Tv with Three Simple Steps

In three easy steps, I will show you how to hook up your laptop to a TV. Avoid the headaches and the lies. Save yourself from aggravation. The whole idea is to enjoy mirroring your PC to your TV, not spending hours trying to figure this out.

Pretty much, all laptops on the market today are the same. Even if you have an older laptop, the connection can be made if the proper inputs exist on your laptop and television.

There is no need for wasting numerous hours researching online and asking store personnel how this works. They will tell you that this procedure cannot be performed and that you will need to buy a PC to TV converter box. This might be true, only if you do not have the proper connections available. They will even tell you that you must restart or shutdown your laptop in order for this to work. Again this is not true. Also, there is no need in adjusting the display in your computer. Trust me, all of this is plain garbage.

If your TV has an available S-Video jack input and your laptop has a S-Video jack input, you can easily clone and view your desktop on your television. Most televisions come with a 4-Pin input and laptops come with 7-Pin input. All you would need is an S-Video jack to match up on both ends or just use a 4-Pin for both. As for the audio, all you need is an Audio Cable. An Audio Cable has a Red and White male connectors on one end and the other end is black.

* Step 1 ( Examine your Laptop and TV )
Look closely at your TV for a S-Video connection input. Also see if you have Red and White input connections. Check your laptop for both as well. Your laptop should have an available audio input, usually in the front of most laptops.

* Step 2 ( Check to see if you have the proper cables )View these images below.
Step 3 ( Hook it up )No need to restart your laptop. You can plug or unplug these connections at anytime with no problem at all.
Viewing movies online has become more and more popular today. I hope that this information helps a lot of people struggling with the know-how, like I did in the beginning. Learning how to hook up a laptop to your TV with 3 simple steps, without the garbage, can save you hours of aggravation.

Wednesday, February 10, 2010

Apple Ipad

In January 2009 the iPad was introduced to the world, the latest product in the extremely popular range of Apple products. The iPad is a revolutionary piece of equipment. The tablet computer is hoped to be made available for public release in March 2009.
The iPad at only half an inch thin is a product which Apple had been trying to create for years. Finally on the 27th January 2009 the director of Apple Inc. Steve Jobs showcased it. The tablet runs off the iPhone OS, which allows the tablet to be compatible with over 140,000 apps currently in the iStore. The technological device uses an LED-backlight with an LCD screen; it makes use of the popular virtual keyboard to allow data entry.
The iPad allows users to experience print, photo, video, audio, internet browsing and many other multimedia functions.
It uses Safari as a method of safe and secure internet browsing for the user. The touch-screen capabilities of the device allows websites to be experienced at a whole new level, with the ability to zoom on top and scroll with a simple flick of a finger.

Tuesday, February 9, 2010

Protection From Hackers

Hackers are a diverse group that could have many reasons for hacking into a system. Their tools and techniques are as diverse as the hackers themselves. Even though they have diverse methods, the only way through a computer system is through a network. A hacked application can be pulled down by a user, e-mailed as a virus, or put on the computer by the hacker. The hacker can sniff the network to understand the packets that are being sent. The organization can sniff the network just as well to protect their networks.



The hacker, through a strong understanding of the operating system and applications, can control the computer once he gains access to it. The user, having access to the computer, can apply his knowledge of operating systems to contain the hacker. The hacker can be mapped to an isolated system to be contained and identified. The hacker is feared among the organizations of the world, but the hacker has more to lose, and there is always the chance that he is hacking into an organization that knows more about hacking than he does.

Protecting From Hackers

Some reports state that someone on the inside, such as a disgruntled employee, performs 85% of all hacks suffered by organizations. Unlike a hacker who is entering through the outside system, the hacker for an internal attack knows the systems. The employee is familiar with the resources that are available and may have a set of passwords to start hacking. There may be internal systems that he is familiar with, and the employee could have applied logic bombs or backdoors to assist in any attacks.







Keeping tabs in the workplace



There are applications that can be purchased to keep tabs on what employees are doing on their workstation. Managers who are aware of what the software engineer or system administrator is doing on a daily basis can keep that person from becoming a hacker. An employee who knows he is being watched would likely be hesitant to do something he shouldn't do. It is the employee who works weekends and until midnight without the manager watching who has the time to establish a hack.



Always be aware of what is being loaded onto the system's machine. Keep a running inventory of the programs that were installed. Check the list with some of the security sites for potential security risks. Be a minimalist when it comes to installing new programs. Only install programs that are by trusted and well-known vendors. Sometimes, I need to install programs to use for a month and then not re-use them for several more months. The program can be un-installed and re-installed when I need it several months later. Also monitor and be aware of what is running on the system computer. If the CPU usage of a machine is maxed out and there should be nothing running on the machine, obviously something harmful could be running in the background of the machine.



Isolating your suspects



If a hacker is suspected, set up a machine and account just for the hacker. Isolate the hacker into a machine that can be monitored and controlled with almost no utilities and access on it. Have the keystrokes and commands captured to log files. Isolating, monitoring, and controlling the hacker in a remote site can lead to the search and capture of the hacker. In many cases, the hacker will not know that he has been isolated, but may think that he has accessed an organization's system. Think like the hacker. Give the hacker a Trojan horse to download and find him. Because the hacker uses viral kits, sniffers, and other toolboxes where very little programming and computer knowledge is involved, the hacker may not be aware of the total damage that he may cause to a system.



Many hackers are tracked by organizations to give the estimate of the damage done to the organization so they can fix the damage. It might be that the hacker cannot give detailed information but can only point to a hack kit that he got on the Internet. The organization should always be aware of the hacking products and security Web sites. Several hacking sites that I visited last year no longer exist, and I am sure that any information on their tools is hard to come by. Organizations should know their systems well enough that, if they are hacked, they can assess the damage themselves and not depend on any other information.
Understanding your security system




The biggest effort that can help in securing systems is to be security aware. Many companies are aware of the latest and greatest technologies, but when asked about security, their typical response is "We have a firewall." A firewall does help if properly configured, but I have seen people answering this question and then pulling down hundreds of software packages the next time they're attacked.



There were so many programs on this person's desktop that a hard drive was added and when asked about the origin of some of the files, the response was "Just things collected over the years. I don't know where most of it came from." Even if the person was very technology aware, security should also be a big consideration. Some of the programs could be malicious without the person knowing. The suggestion was to compress and backup all of the files to a CD-ROM and later retrieve the files only when necessary. When considering security, be a minimalist with downloading and using programs of unknown origin. There may or may not have been malicious programs on this person's desktop. Usually, the only time that a hack is found is when it affects a system and it starts to cost money.



Hiring an expert



The biggest advantage that an organization could have is having security requirements established by a security expert. Many organizations give the security requirements to a business analysis person who lacks the background to understand security issues. The security expert will always ensure that chances of a security risk are avoided. Security consciousness is, in many ways, just a frame of mind. Just as a person is motivated to learn new technology, so there is a frame of mind for someone who wants to learn new security techniques. In the security plan, have tiger teams test the organization's systems and plan to revisit the security needs of the organization at regular intervals. Have a designated security administrator visit the advisories of applications and operating systems found at www.cert.org/advisories.

Monday, February 8, 2010

Password safety

Passwords are what make sure only you have access to your personal accounts on the web (ex: e-mail, online banking, Facebook and so on). For example, once someone signs up for e-mail and gives the website their name, address and other information, the password is what keeps other people from going to your account and viewing yourpersonal information . With so many passwords to remember from several websites, a lot of people make their passwords incredibly simple and easy to guess. Using words like apple or 123 as passwords are incredibly easy to guess and makes a hacker's job very easy when he tries to guess your password and steal yourpersonal information. Imagine how hard it would be to guess your passwords if all them where completely random, imagine if all your passwords went something like this: Gt:IRdr&L0 . Obviously, it's impossible to remember that password but that's why you should use a password database. There are several password databases available for download online and most are free. A good password database available for free is a program called KeePass. It is very easy to use. You simply write all of your passwords in the database and then use them whenever you need to login into an account online. KeePass also has the ability to generate random passwords like the one shown above. Your KeePass database will also be encrypted to avoid anyone but you from entering it.

How to Break Windows Xp Password

Learn how to clear windows xp administratior password.

it is easy just do the following:

Action 1
Step1.Pop the bootable Password Genius CD into your locked PC, and boot from the CD.

Tips: Why to use a bootable CD?
Windows passwords are Encrypted by Windows on the hard drive to provide better security. It even prevents any external tampering while Windows is running so that the only way to change those passwords would be through Windows itself. The Easiest Way to reset windows passwords is with the right bootable CD,you can bypass Windows security restrictions and reset the password directly before the Windows starts up.

Action 2
Enter POWERSUITE2010’s interface, follow these steps: PowerSuite Bootcare2010 ->Password Kit -> Admin/User Password

Action 3
Select the “Windows XP” and “Administrator”, and then click the “Start”

i hope you can do it.

Sunday, February 7, 2010

Types Of Computers

Generally the computer system are classified as MICRO ,MINI and MAINFRAME Computers.



MICRO Computer



Micro Computer are small ,single user that provides a simple processor and a few input/output devices.The micro computer is also known as Personal Computer(PC).







MINI Computer



Mini Computer were first developed as special purpose mainframe computers .They were widely used for instance , to control machine manufacturing unit.







MAINFRAME Computer



Mainframe computer can process several million program instruction per second. They were mainly used in insurance companies,banks,airlines,railway reservation system,etc.Mainframe have more access to storage space and to i/p device. To work with these extra device mainframe also have more powerful "PROCESSOR".

Saturday, February 6, 2010

Free Antivirus for Your Computer

Free Antivirus For Your Computer.


Avast is a free anti-virus that I got after I was done with McAfee I have Avast 5.0 which is the new free version which keeps your computer and files free from viruses. So I did a review on Avast because it ‘s free and I think it’s better then McAfee and takes up less space on your computer.

Setup:

So when I downloaded and installed the free Avast anti-virus it took no time at all I did find out that once you install this it only works for 60 days unless you register for a free license key by e-mail then it good for one year until you need to re-register it again. After I installed I had to reboot my computer and Avast performs a boot level anti-virus scan looking for any kind of viruses that might load with the operating system.


Interface:

The interface is pretty good looking comes in orange and black when you launch Avast it will do a memory and start up scan of you system. You will also encounter a helpful screen explaining how to use the interface.


Features:
Features included automatic updates, P2P shield, file system shield, mail shield, web shield, network shield, behavior shield and IM shield.


Performance:
did a full system scan of my computer once it was done installing and I have to say it took some time to finish but that on because I have a lot of things on my computer so based on how much stuff is on your computer is how long it will take to finish. But other than that it seem to get the job done.

Support:

There is a comprehensive in-program help menu. There are also robust technical support forums, free e-mail support, and international telephone support, Monday through Friday, from 9 a.m. to 5 p.m. Central European Time.

Conclusion:

My conclusion is that this free anti-virus is a lot better than the last anti-virus I had. (McAfee) The best part is that it’s free it’s not hard to set up and it dose not take up a lot of space. If you need anti-virus and don’t have the money to buy it then get avast anti-virus. Click To Download

About Me

My photo
Web developer, I love to Code, Design and explore more and more latest technology gadget