.=

12/21/2009

Mobile Phones Become Targets of Hacking

Mobile phones are becoming ever more like personal computers. That means they are also becoming more vulnerable to traditional computer menaces like hackers and viruses.
This year, the Russian antivirus company Kaspersky Lab reported on a new malicious program that stole money by taking over Nokia phones and making small charges to the owners’ wireless accounts.
Last month, an Australian student created an experimental worm that hopscotched across “jailbroken” iPhones, which are phones altered to run software Apple has not authorized. The mischievous worm did not cause any damage; it just installed a photo of the ’80s pop star Rick Astley. But to security experts, it suggested that pernicious attacks on iPhones are possible.

Where there are perceived security threats, there are always entrepreneurs and investors looking to capitalize on them — and build profitable businesses. This month Khosla Ventures, a prominent Silicon Valley venture capital firm, led an investment group that injected $5.5 million into a fledgling security start-up called Lookout.

Lookout, based in San Francisco, was previously a consulting firm called Flexilis run by recent graduates of the University of Southern California. Now it wants to be the security giant of the mobile world, similar to the role Symantec plays in the PC market.

This year, Lookout began testing security software for phones running the Windows Mobile and Android operating systems, and it will soon introduce security applications for the BlackBerry and iPhone. The software protects phones against rogue programs and gives phone owners the ability to remotely back up and erase the data on their phones. It also lets them track the location of their handset on the Web.

A basic version of the software is free, while the company plans to charge a monthly subscription for a version with more features.

“It feels a lot like it did in 1999 in desktop security,” said John Hering, Lookout’s 26-year-old chief executive, who for years has done research demonstrating security vulnerabilities in phones. “People are using the mobile Web and downloading applications more than ever before, and there are threats that come with that.”

Lookout represents the latest attempt to build a new business that capitalizes on the surge of smartphones. Thousands of companies making mobile games, shopping tools and other programs have sprung up in the last two years as the iPhone in particular has taken off. Lookout and its investors believe this is the right time to get into the market.

“The rules of mobile are different,” said Vinod Khosla, founder of Khosla Ventures, which also recently invested in Square, a mobile payments start-up. “This is people’s most personal computer, and it needs to be protected.”

Companies like Research In Motion, maker of the BlackBerry, and Good Technology, a Silicon Valley-based mobile messaging firm, already offer mobile security tools, but their systems are aimed at businesses. Security firms like Symantec also have mobile security divisions, and a five-year-old company, Trust Digital, based in McLean, Va., has set its sights on this market.

Lookout says it can address the unique challenges of protecting cellphones, like preserving battery life. While the company will not give details, it says it has figured out how to get its software to work on the iPhone, which does not allow non-Apple programs to operate in the background, as security software typically does.

Mr. Hering and his co-founder, Kevin Mahaffey, 25, have been publicly demonstrating the weaknesses of mobile phones for some time. In 2005, they camped outside the Academy Awards ceremony in Hollywood and scanned the phones of stars walking the red carpet, using a short-range Bluetooth wireless connection. They found that as many as 100 of the phones were vulnerable to hacking over such a connection.

That year, at the Black Hat security conference in Las Vegas, they hacked into a phone over a mile away using Bluetooth.

Lookout’s founders and backers concede that for now, snoops and bad guys pose much less of a threat to cellphones than to PCs. But they believe there is an immediate need for software that preserves and protects a phone’s data, from e-mail to corporate information, and they say current systems do not work when a family or business has multiple types of cellphones on various wireless networks.

For instance, a small business could install the Lookout software on many different types of devices, back up all the data and remotely erase a phone if, say, an employee leaves it in a cab.

Jeff Moss, a security expert and organizer of the Black Hat conference, said mobile security had historically “been a solution in search of a problem.” But he said mobile viruses had recently become more common in Asia. His own Nokia N97 phone even caught a bug recently, though software he was running from F-Secure, a Finnish security company, caught it in time.

“The tipping point will be when we’re using the phone to shop and conduct banking,” Mr. Moss said. “The more you do with the phone, the more valuable a target it becomes.”
By BRAD STONE
Article Sourch :http://topics.nytimes.com/top/reference/timestopics/people/s/brad_stone/index.html?inline=nyt-per

Troubleshooting Security Windows Vista

Firewall troubleshooting
Windows Firewall which comes with Windows Vista really sticks in the hatch in the port. Thus you can experience some problems when you first switch to the Windows Firewall. Here are some common problems and solutions to the problem.

Some Internet applications do not work when installed on Windows Vista

Stricter security measures imposed by the Windows Firewall, some online games and other Internet programs are not working correctly. Microsoft maintains a list of these programs and ways to this problem in Knowledge Base article 842242 fixed. To access the page, scroll to http://support.microsoft.com and search for 842,242. Optionally you can access http:// support.microsoft.com / default.aspx? Scid = kb, en, 842,242 & Product = windowsxpsp2. While the previous article was based on the Windows XP Service Pack 2, a list of applications and configurations for applications that still applies to Vista.

Error message "Windows Firewall has blocked this program to accept connections"

This message is just a warning. With the assumption that you are familiar with the FTP site and the confidence of the owner, you can block and continue uploading the file (s).

Can not adjust the Windows Firewall for AOL dial-up connection

AOL does not follow the same standards of other ISPs do, so you can be the firewall to enable access America Online. (It's risky business and you might want to consider to contact AOL about a better solution, or consider switching to another ISP.) If you disable the Windows Firewall to get online, follow these steps:

1. If you are online, the connection to the Internet.

2. Press the Windows key, type in seconds, and then click the Security Center. Or click on the Start button and choose Control Panel -> Security -> Security Center.

3. In the Windows Security Center window, select the Windows Firewall from the left column.

4. Click Change settings. Raise your rights by clicking Continue or by entering the password of the administrative account.

5. Click on (not recommended).

6. Click OK.

7. Close all open windows. You should be able to get online. The AOL would be better to find an alternative solution that allows you to get online without Windows Firewall. Hopefully there will be a better solution at the time you read this, because it will be online without a firewall to significant security risks to your system cause.

Phone dialer does not work after you install Windows Vista Windows Firewall is blocking TCP port 1720, which is used by many phone calls program. This was done to prevent unauthorized calls from the program connected to the network without your knowledge. For your phone to dial into work, you must open these ports as follows:

1. Click the Start button and choose Control Panel -> Security Center. Or press the Windows key, type in seconds, and then click the Security Center.

2. In the Windows Security Center window, select the Windows Firewall from the left column.

3. In the left column, click Allow a program through Windows Firewall, and lift your rights by clicking OK or by entering the password for the administrative user.

4. In the Windows Firewall Settings dialog that opens, click the Exceptions tab.

5. Click the Add Port.

6. Type in what you name as the box, as Dialup Port 1720. 7. Type the number in 1720 as a port and select TCP.

8. Click OK in each dialog box that appears.

9. Close the Windows Firewall and Security Center window.

Opening port 1720 allows the voter to call via this link, even programs that are not valid can be a conscious act by the Internet. These ports to block, return to the Exceptions tab of the dialog box and uncheck the box to the left of the name you specified in step 6 of the series of the previous steps.

Antivirus Software Troubleshooting

If you have problems installing antivirus program, make sure you get the version for Windows Vista is installed. Safety programs written for Windows XP or other Windows versions do not work with Vista, because Vista is the operating system is much different. Check your antivirus program website publishers to update and additional information about the product on Windows Vista.

Problems Automatic Updates

Automatic Updates has changed many times over the years and continue to grow to this day. Your best bet for solving problems with the automatic update is straight to the source of current information. Click the Start button and select All Programs -> Windows Update. In the left column of the Windows Update page that opens, click on Updates: frequently asked questions. Scroll to the bottom of the Help window open and click on the Problems with installing updates.

Problems with Windows Defender

Your best resources for Windows Defender will of Defense website, visit www.microsoft.com / defender.

Troubleshooting ActiveX Control Downloads

Windows Firewall blocks ActiveX controls downloaded. If you click on a link does not provide the desired results, look at the information bar of Internet Explorer for more information. With the assumption that you consider safe ActiveX controls, click the Run bar and select Install ActiveX control or ActiveX controls.

Article Sourch :http://www.web-articles.info/e/a/title/Troubleshooting-Security-In-Windows-Vista/

12/05/2009

A Place in the Sun for Apple’s MacBook

By STEPHEN WILLIAMS

Pay your money and take your choice: a solar-powered battery charger for an Apple MacBook for $1,200; or a new Apple MacBook for $200 less.

A Kansas company called QuickerTek has just announced the Apple “Juicz,” for those who just can’t find an AC outlet nearby, but can find the sun (the company claims someone took a Mac and a Juicz on a visit to Mount Everest and it worked well—closer to the sun, I guess).

The $1,200 lightweight, flexible panel puts out 55 watts and supposedly fully recharges just about any current Apple laptop in six hours, plugging into the Magsafe port. A bargain model for $700 has 27 watts and takes about twice as long to recharge the MacBook.

It’s a serious device, but at this price, one would have to be either committed to going green full time, or just committed. After all, AC outlets are…well, ubiquitous. As one reviewer noted, $1,200 could buy one heck of an extension cord.

Article Sourc :http://gadgetwise.blogs.nytimes.com/2009/12/03/a-place-in-the-sun-for-apples-macbook/

Dell Adds Firepower to Its Workstation Line

By STEPHEN WILLIAMS

With netbooks and ever-slimmer notebook computers attracting the lion’s share of consumers’ attention this holiday, Dell apparently believes there’s still room for workhorse PCs, even if — at about nine pounds — they defy current fashion. Enter the Precision M6500 “mobile workstation.”

Workstations are just that: monster-spec machines made for high-performance and powerhouse applications (although it still runs user-friendly Microsoft’s Windows 7, among other operating systems). Dell’s just-released package, priced to start at $2,750, is structured around an advanced Intel Core i7 quad-core processor — among the first mobile PCs to use that chip — and a 17-inch, 1920-by-1200 LED-lighted screen. There’s a gaudier variation, the Covet, in hot copper orange ($4,220), that makes the Apple MacBook Pro look like the Fisher Price version.

While the base version is loaded with only 2 gigabytes of memory — not nearly enough for a computer with this potential — it will accommodate up to 16 gigs in four memory slots, a feature normally found on desktops, not on laptops. The nine-cell battery should run strong, although its life on the road depends on how the PC is configured. The M6500 began shipping on Dec. 1.

Article Sourch :http://gadgetwise.blogs.nytimes.com/2009/12/02/dell-adds-firepower-to-its-workstation-line/

12/04/2009

Norton Antivirus 2010

The New Ultimate Security System For Your PC

The presentation of Norton Antivirus 2010 will open a new chapter in protection system with the lightest and fastest antivirus application created on the line of revised technology based on experience.

Hackers and spammers would be away with the uninterrupted protection with Symantec intrusion detection system. It prevents and stops viruses and spyware.Positive action eliminates open threats and bars fresh threats promptly to safeguard your PC.

Norton Antivirus 2010 works with minimum memory requirement and its intrusion detection system detects hidden spiteful symbols before its invasion. Norton's updating system ensures that you are always covered by Symantec security network with regular updates that are affected within minutes.

The new Version works on the principle of intelligence based technology to speed up the scanning process and thereby takes shorter effective times for scanning. It goes on examining the complete online intelligence network in actual duration to detect the trustworthiness of files present in the system.

It clearly defines the nature of files to be trusted or left out and performs the scanning of doubtful files.This is employed at a very fast speed consuming negligible time for scanning and you use your PC for more time. The files at risk are scanned with lightning speed.

Norton Antivirus 2010 is efficient to provide clean performing process and identifies threats clearly. It is able to provide all the information regarding the CPU including the memory resources utilized by several applications present in the machine for functioning of your PC.

It provides a clear picture of the threats that it recognizes the source and the subsequent effect the threats could bring upon the machine. You are therefore cautioned about threats. You are able to prevent them to infect your machine just by avoiding them. It has the system to update the PC frequently to identify the current threat positions to maintain a perfect security of the system.

Norton Antivirus 2010 has the facility of the real time SONAR2, a competent device that is the online network and advance research system to detect upcoming threats in a quick manner. It continuously watches every file and each process separately to keep the PC free from any kind of threats.

Download now your Free Norton Antivirus 2010 Trial Version and test it yourself.

By Adrian Keating
Article Source: http://EzineArticles.com/?expert=Adrian_Keating

Beat the Heat

Effective Cooling Strategies For Today's Datacenters

Datacenter cooling is the main concern for many datacenter managers. Excess heat in a server room adversely affects equipment performance, shortens its lifespan, and leads to a premature end of life for equipment. Keeping a server room at the recommended 68 ° to 77 ° F (1) is not an easy task. There are many factors that make cooling today’s datacenters a significant challenge, including high-density computing clusters and rapid changes in technology.

High-Density Computing Clusters

The rise in the use of blade servers and virtual servers has greatly increased the potential amount of power consumed per rack, as well as the resulting heat output. While the heat dissipated by a 2 ft by 2.5 ft rack is currently about 10 kilowatts or more, experts estimate that designs for future equipment will require dissipations of 30-50 kW in the same rack space.(2) The trend toward increased power consumption has been documented in several studies, including one recent five-year study of 19 computer rooms that showed that power consumption rose by 39% from 1999-2005.(3)

Changes in Technology

Traditionally, advances in technology have occurred at an extremely rapid rate, as illustrated by “Moore's Law,” which predicts the doubling of semiconductor performance approximately every 24 months. Historically, increased computational abilities have led to increased power consumption and heat loads. Datacenter managers should take these trends into account when planning for future expansion. According to Gartner Research, "Without careful planning and coordination between the data center facilities staff and the server procurement staff, data centers will not be able to increase power or cooling in line with increases in server deployments…through year-end 2008, heat and cooling requirements for servers will prevent 90 percent of enterprise data centers from achieving the maximum theoretical server density." (4)

Isolating Hot Spots

Hot Spots are areas in a datacenter that are not properly cooled, often resulting in temperatures that exceed recommend conditions for maximum equipment reliability and performance. Hot spots are not necessarily caused by a lack of cooling capacity and commonly occur in datacenters with sufficient or excess cooling capacity, but can be caused by poor circulation or improper air flow.

Zone Hot Spots can be present over fairly large areas in a datacenter and occur when the temperature at all air intake levels of a rack or cabinet are too hot, due to expelled air flow that is not properly routed.

Vertical Hot Spots occur over a small area and often affect a single server rack. They occur when equipment at the bottom of a rack consumes the available supply of cold air and devices higher up in the rack pull in the hot air exhaust of adjacent equipment or ambient air.

Strategies to Improve Datacenter Cooling

Datacenter managers can take several steps to meet datacenter cooling challenges, including choosing the right rack, increasing datacenter energy efficiency, using liquid cooling units, and taking advantage of environmental monitoring.

1. Select The Right Rack And Accessories

To fully maximize equipment cooling, when selecting a server rack consider intelligent and space-efficient design features that various rack models offer, including frame profile and capacity for increased packing density. Use blanking panels to manage air flow efficiency and select a rack with built-in channels for better cable management and improved air flow. Fully perforated doors and top panels can help improve ventilation as well. Also consider server rack accessories that will improve cooling, including fans, enclosure blowers, and rack air conditioners. In addition, consider using energy-efficient power supplies, such as 220V power, which significantly increases available amperage into the server rack, using fewer circuits while providing a more balanced power load. This can reduce the overall number of PDUs needed to power equipment, leaving more space for airflow.

2. Aim for Energy Efficiency

There are several steps you can take to reduce overall energy consumption and resulting heat loads in your data center. To begin with, consider hiring an expert to conduct room diagnostics, measure airflow, and correct any cooling problems identified. Next, conduct a thorough audit of your equipment and determine if any servers can be consolidated or discarded—this process can cut power consumption in some organizations by up to 30%. (5) Finally, clean up any clutter under your datacenter floor, including cabling, that might be impeding air flow.

3. Deploy Liquid Cooling Units

As power-intensive applications and server densities have increased, Liquid Cooling Packages (LCPs) have become a valuable alternative to ambient air cooling and can better meet the cooling challenges presented by high-density computing clusters. These modular, temperature-neutral high-density cooling solutions utilize air/water heat exchangers to provide uniform, effective cooling. Liquid cooling units use a special horizontal airflow with constant-temperature cold air provided at the front intake and hot air removed from the rear of the enclosure. They can be mounted at the rack base, in a rack “side car.” Fully-loaded LCPs have a 30kW cooling output with three cooling modules possible per equipment rack, and controlled variable speed fan and water flow based on actual heat load generated in a cabinet.

4. Use Environmental Monitoring

These devices allow administrators to proactively monitor rack and server room temperature, including hot spots, at any time and from anywhere and provide protection to mission-critical applications. They also allow administrators to continuously monitor amperage draw per circuit, water leaks, and physical security and can send alerts automatically via SMTP/SMS/SNMP when conditions exceed established thresholds. This allows IT managers to quickly respond to any irregularities before they become larger problems. Environmental monitoring devices also help administrators in future planning, as they provide valuable data that can be used for trending analysis.

When considering datacenter management, cooling is only one piece of the puzzle. Other key considerations include intelligent power management and KVM console management tools. The team at 42U specializes in assessing needs, creating solutions, and supporting our clients, to ensure that IT professionals maximize their use of current technologies to improve overall business performance.

References:

(1) Flaherty, Escott, Soucey and Khankari. (2005). “Thermal Guidelines for Data Processing Environments” (2004) referenced in “CFD Simulation Helps Optimize DataCenter Cooling Performance.” Datacenter Journal.

(2) Brill, K. (2005) “2005-2010 Heat Density Trends in Data Processing, Computer Systems and Telecommunications Equipment.” Uptime Institute.

(3) Brill, K. (2005) “2005-2010 Heat Density Trends in Data Processing, Computer Systems and Telecommunications Equipment.” Uptime Institute.

(4) Connor, D. and Mears, J. (2004). “Blades won't cut it unless you keep them cool.” TechWorld. Quoting Gartner Research (2004).

(5) Mitchell, R. (2006) "Sidebar: Eight Tips For a More Efficient Datacenter.” Computerworld.

This article was written by Lauren Nowenstein, with guidance and input from DirectNET's team of technical sales engineers. If you would like to send us feedback about this article, or have any questions, please write to us.

By Lauren Nowenstein
Article Source: http://EzineArticles.com/?expert=Lauren_Nowenstein

12/03/2009

Finding The Right Driver For Your Laptop

Getting the right driver is essential for your computer and your peripherals. It might even be detrimental to the health of your entire network. In this article you will learn about what a driver is, what you need to know to determine what driver you need and where you can get the right device drivers for you computer.

What is a driver anyway? A driver is a small piece of software that is installed on your computer. It is software that “drives” a device. Your computer needs to know how to get each individual device working, whether it’s installed or plugged in, so if you consider the driver as the instructional manual that your computer reads, you can get the picture. You need the right device driver for your computer, because not all device drivers are created equally.

The device is based upon both your device and your operating system. A printer driver won’t be the same for your Vista machine as a video card driver. Without the right device driver, the computer becomes illiterate. If you have drivers for the same device but on two different operating systems, there are differences. Some people will also describe a driver as a liaison or a translator between the computer and the peripheral. Anything you add onto your computer can require a driver. Some items are considered plug and play but many require just a small program to act as that translator or instruction manual.

You may need device drivers when you install a piece of hardware or plug it in. You may also need device drivers when you do an operating system upgrade or a hard drive formatting. Sometimes our drivers are not compatible with new systems and other times we need new copies just because there was something corrupt on our computer that disrupted the integrity of the driver or deleted the software.

If you don’t install the right driver, not only will your device be unlikely to work but you could cause other problems. When a computer is looking for a device to initialize or command and it cannot find it, it can cause other networking problems including fatal errors. Be sure that when you download a driver, not only does the manufacturer and model number of the peripheral match but also that the operating system matches as well. This is something that is discussed in more detail on the website http://www.laptopdriverstoday.com, which is filled with information on how to find the right driver for your laptop.

There are programs that can help you find the right drivers whether you are having problems with your computer after an upgrade or if you are determining what your requirements for upgrading an operating system will be. Beyond this, manufacturers and third party websites exist to guide you and help you find the right driver.

You might require drivers for any number of devices including: monitor, keyboard, mouse, printer, scanner, plotter, USB port, Bluetooth device, video cards, PCMCIA cards and other hardware as well. But whatever you need it for, the golden rule is to make sure that the device driver is the right one or you could end up with malfunctioning equipment, not to mention a bad headache.

Carl Formby writes for http://www.laptopdriverstoday.com a website packed with resources on how to find the best laptop drivers, including the right laptop display drivers. Get Your Laptop Driver Now....!!!

By Carl Formby
Article Source: http://EzineArticles.com/?expert=Carl_Formby

12/01/2009

Using a Registry Cleaner to Speed Up Windows 7

Using a registry cleaner has its risks and rewards, but if you want to speed up your PC, it's something that many people are interested in trying. Luckily, we've been using registry cleaners for a long time and the good news is that they do work very well to make Windows 7 run faster.... but as you're about to find out, you need to be careful when using them. Contrary to popular belief, registry cleaners don't actually work to speed up your PC in the typical sense. They do the opposite - they 'cleanse' your computer of junk files and errors, in order to make it run more reliably and efficiently. It's basically like cleaning out your closet - your PC is able to find all the files it needs & run the programs it wants extremely quickly. This means that if you use a registry cleaner to make your PC run faster, you need one which is going to be able to fix the most problems that are causing it to slow down.

The problem with many registry tools is that they remove the wrong parts of your system, meaning that they delete perfectly healthy files & settings, making Windows run even slower. They work by basically scanning through your 'system files' of your PC, which is where Windows keeps its most important information and settings, and then removing any of the erroneous or junk files that are in there. What happens with Windows (and this is still a problem with Windows 7), is that whenever you use your PC, many files are saved in the wrong way, making them unable to be processed quickly enough, which slows your PC down. Over time, this makes Windows run at a snail's pace and generally makes your system unusable.

Registry utilities fix this by cleaning out all the causes of problems on your PC... however, because Windows Seven is so new, many registry tools do not recognize many of its new features & files, making them delete a lot of "healthy" files on your system. This means that if you want to speed up Windows 7 with a registry cleaner, you really just need to get the best one for that operating system, install it and then let it remove the errors it finds. You should also use the backup feature it has before removing any problems that it will find, which is a feature all good registry tools have.

Using a registry cleaner to speed up Windows 7 is one of the most beneficial and effective ways to do it. However, to speed up your PC the most, you need to use the best registry cleaner. From our experience, the best registry cleaner is a tool called "RegAce".

By James Henry Johnson
Article Source: http://EzineArticles.com/?expert=James_Henry_Johnson

11/30/2009

Cheap Mobile Phone

Price: $49.99 the Samsung t809 Phone (T-Mobile) has to be looked at as one of the best choices for a Samsung cheap mobile phone or (cell phone ).

Product Description

This flagship quad-band phone from Samsung cheap mobile phone or (cell phone ) combines a super-slim slider design with the latest technologies, making it a must-have tool for those who demand the best. Goodies include Bluetooth, support for EDGE high-speed data, a swiveling megapixel camera, a music player, and a microSD memory card slot. The Samsung cheap mobile or (cell phone ) SGH-t809 is the perfect way to take advantage of all that T-Mobile service has to offer.

Design

The Samsung cheap mobile phone or (cell phone ) t809's sliding design hides the phone's number pad under the display until you need to make a call. The massive, 240 x 320 display supports up to 262,000 colors -- plenty of resolution and color depth for your videos and photos. A five-way center control button is positioned below the display, as are shortcut and selection keys. The phone's 1.3 megapixel camera is housed on the top of the phone and it swivels to face in or out. USB data and charging ports are located on the phone's bottom edge. There's also a connector for a stereo 2.5 mm headset on the left side, while the microSD slot resides on the right.

Calling Features

With 70 MB of internal memory, the Samsung cheap mobile phone or (cell phone ) t809 is designed to hold all the contacts, phone numbers and addresses you can throw at it. A call list remembers your most recent missed, received and dialed calls, and in addition to a vibrating alert, the Samsung cheap mobile or (cell phone ) t809 supports polyphonic ringtones and MP3-based music ringtones. You can also download additional MP3 music ringtones from T-Mobile's t-zones service. A speakerphone lets you talk hands-free while you're doing other things, and picture caller ID lets you assign a photo to specific callers. Similarly, a ringer ID lets you assign ringtones to callers. Like all T-Mobile phones, the Samsung cheap mobile phone or (cell phone ) t809 also supports voicemail, caller ID, conference calling, call forwarding, call waiting, call hold, built-in paging, and access to T-Mobile's 411 service. Lastly, the phone's Bluetooth connectivity means that your favorite Bluetooth headset is fully compatible.

Messaging, Internet, and Tools

The Samsung cheap mobile phone or (cell phone ) t809 has all the bases covered when it comes to messaging. Support is built in for sending and receiving text, video, graphics and sound via messages. When used in combination with the phone's built-in camera, MMS opens up a whole new world of messaging fun. Messaging clients for AOL, Yahoo!, and ICQ are included.

Getting on the Internet is easy with Samsung cheap mobile phone or (cell phone ) t809, too. It supports the GPRS protocol, as well as the new, high speed EDGE data protocol. When used with a T-Mobile data plan and the phone's USB or Bluetooth data capability, the phone can be used as a wireless modem for laptops and PDAs. There's also a built-in browser for t-zones downloads and mobile Web browsing. T-Mobile's t-zones service lets you receive and send emails, read news headlines, get weather updates, download games and ringtones, and more. T9 text entry, which is a technology that makes it easier for people to enter words and text on handsets, is built into the unit-- a plus for mobile text messaging users.

A number of handy productivity tools are bundled with the Samsung cheap mobile phone or (cell phone ) t809 including a voice memo recorder, an alarm clock, a calculator with currency converter, a calendar, and a to-do list.

Imaging and Entertainment

The Samsung cheap mobile phone or (cell phone ) built-in 1.3 megapixel camera captures stills and video to the phone's internal memory, or to an optional microSD memory card. The camera captures video at 352 x 288 resolution, and it features white balance and brightness controls. Meanwhile, the phone's powerful still camera sports a self-timer, a multi-shot mode, a night mode, brightness and white balance controls, ISO controls, and spot metering.

Into music? You're in luck with the Samsung cheap mobile phone or (cell phone ) t809. Store your favorite MP3-based music on the t809 and listen whenever the feeling strikes you on the built-in stereo speakers. Simply upload the songs from your PC via the phone's USB interface (the phone supports USB mass storage mode), then organize and play your songs with the Samsung cheap mobile or (cell phone )t809's music management software. And when you want to jam out in private you can hook up a stereo headset. Lastly, if you want to dress up the t809, picture effects, custom screensavers, backgrounds, and themes can be set to fit your personality.

Vital Statistics

The Samsung cheap mobile phone or (cell phone ) SGH-t809 weighs 3.35 ounces and measures 3.9 x 2.0 x 0.58 inches. Its lithium-ion battery is rated at up to 4.3 hours of digital talk time, and up to 130 hours of digital standby time. It runs on the GSM/GPRS/EDGE 850/900/1800/1900 frequencies. The phone comes with a one year limited warranty.

Visit me on my websites at Cheap Mobile Phone - Cell Phone

http://www.bestgiftsdeal.com

By Clarence Harrell
Article Source: http://EzineArticles.com/?expert=Clarence_Harrell

Hot Promotions

















11/29/2009

Fix Windows Vista Shut Down Issues

How to Fix Them in a Very Easy Way Instantly

Windows vista shut down issues can be quite an annoying phenomenon. But you need not live with it. There are ways available to speed up the shut down process of your computer just as there are methods used to hasten the start-up process.

Now to take a look at factors that contribute windows vista shut down issues:

1. First cause could be a Windows registry that is overflowing with unwanted entries. This is actually a list that is used to hold information on the system related software, hardware and so on. When the computer has been in use for long this registry tends to catch redundant items. Registry cleaners provide a quick and easy solution to corrupt registries.

2. The Virtual memory support has a system page file which is used for swapping memory pages with the disk when they are not in use. The option "Clear Page file at Shutdown" being enabled is one. When enabled during the shutdown, the system page file needs to be wiped clean by the operating system which takes additional time. You might consider disabling this option. Computer configuration windows settings security settings local policies security options - is where you can disable this option. However it should be remembered that in a dual or multi-boot environment the pagefile.sys will have contents that is publicly accessible.

3. Programs, drivers and services that are not responsive also cause slow shut downs. If you notice that there are windows vista shut down issues post installation of software application or driver software you could try taking the system back to the status that existed before the installation - using a System Restore option which rolls back to an earlier state.

4. Clean boot troubleshooting is a procedure that has been designed to figure out what is causing a performance slowdown. During this process there are a few recommended actions to be performed. After each you will need to re-start your system to see if that has helped. Complete details regarding this procedure can be found on the net in the Windows help itself.

5. You can try closing all applications before trying to shutdown.

6. Disabling the "Terminal Services" service by launching services.msc (Control Panel Administrative tools services) can bring down shut off times considerably.

To learn in more detail about how to fix windows vista shut down issues by getting registry cleaners and other options go to the link shown below.

Tired of slowing PC performance? Do you want to repair windows vista shut down issues in cheap and fast way? You can scan the registry error in your computer for free and fix them with the best registry cleaner on the market. After scanning and fixing your PC, you will be surprise how fast your computer is. Clik Here

About the Author: Ally Wood is a professional software reviewer and has worked in CNET. Now she is working for her own review software company to give feedback to the software creator and has done deep test in registry cleaner software. After reviewing the most popular registry cleaner, she has written complete review on a review site for you that can be accessed for free.
By A. Wood
Article Source: http://EzineArticles.com/?expert=A._Wood

Saving Your Money With Cheap Laptops From China

Do you need help finding that laptop that you need? Oh wait, let me rephrase that, finding that cheap laptop that you need? Since laptops are very popular today, there are a lot of choices in the market now for that cheap laptop that you require. Other than opting for refurbished laptops which are also an inexpensive alternative, some cheap laptops from China are also a good option to look at.

We know how China is with technology; they are now one of the major countries that produce electronic gadgets for the rest of the world. If you check some of the internal parts of your computer, you will see that these parts are made and put together in China. In other words, you should realize that since the materials came from and were made in China, you are in essence buying a Chinese laptop.

One of China's largest and fastest growing laptop manufacturers is Lenovo. What's great with them is that they don't stop improving the quality of their products and services, thus getting the trust and loyalty of their buyers. In fact most people don't realize that Lenovo has been making IBM's ThinkPad laptops since 2005.

Lenovo has three laptop series that are popular with their customers. These series are ThinkPad, IdeaPad and Lenovo 3000 series. What they have in common is that they have high speed dual core processors by Intel.

Netbooks or mini-laptops are another example of cheap laptops from China. Their most popular mini laptop now is called the Lanyu LY-EB01 eBook, with the price of $100 or less if you get it from China directly or pay extra to have it shipped for you.

Another factor that comes to mind when we are looking for cheap laptops from China, is that they come cheaper when they are bought wholesale. Many companies give several discounts to buyers when they are bought in bulk. For example, many sites will have a minimum order of 100 units.

So for those of you who plan to buy cheap laptops from China, it would probably be best that you either get it from a direct seller or from a retail store. Unless, you have enough orders to buy in since that is clearly the cheaper alternative.

I know that people often buy laptops based on brand awareness. However, doing so means you won't always get the best deal. Top name brands come with hefty price tags. Some well-known brands do come from China (like Lenovo), but some second-tier brands can still give you that top of the line model but for much less money.

Though these second-tier brands won't mean anything to you since you're not familiar with them, in China they may be consider first rate companies. So you might as well have a look again, since these cheap laptops from China could be worth a second glance.

Ian Wright can help you save money on cheap new laptops and prevent you from falling for free laptop computer scams.

By Ian E. Wright
Article Source: http://EzineArticles.com/?expert=Ian_E._Wright

Top 10 Laptops For 2009

Buying a laptop specific to the usage is one of the most important things to be kept in mind while buying one. we constantly look for the best laptops we can recommend based on our experience and the one from our clients. Here are the top 10 laptops which are categorized according to their functionality. The categories for the top 10 laptops are, everyday use, netbooks, power laptops, ultra portable laptops and gaming laptops.

For daily use the best ones are:

DELL Inspiron 1525 - As it predecessors this model offers a lot of bang for the money. This being the main consumer laptop line, the company reworked on the Inspiron 1520 platform to create the 1525. The problem with the previous model was its huge size and weight. The DELL Inspiron 1525 is much lighter and smaller than its predecessor.

The latest Inspiron 1525 is a very good option for daily use and rough handling. Though the body is made of plastic it can handle a lot of stress. The laptop comes with an HDMI output and pressure responsive media controls. Inside the machine a powerful combination of T7000-series Intel Core 2 Duo CPU and 2GB RAM processes information faster than we think.

Lenovo T400s - The 14-inch T400s is much lighter and thinner than its original predecessor the T400. With the T400s Lenovo ahs created a highly portable device which is still packed with a powerful Core 2 Duo processor from Intel. The company claims that the T400s is so powerful that can survive a hit from a truck though it is not tested yet. It has one small drawback. That is the price. This series starts at US$ 1,599. If we make a comparison it can dwarf a MacBooks and make it look like a budget laptop as it starts at US$ 1,199. 13-inch MacBook Pro has superior graphics and better connectivity for a lot less. What Lenovo banks on is its set of business and security branded hardware and software which is capable of delivering a superb performance. Apart from the price it can be a very good contender for the top 10 laptops spot.

The best Netbooks are:

HP Mini 1000 - This slim and snazzy netbook is among the hot favorites. With the decrease in the price it has become even more popular. But the company claims that though the price has decreased it does not move away from the levels of performance.

At first look the Mini 1000 look identical to its predecessor, but with a closer look it was found out the earlier model was a bit heavier and thicker as well. Records show that these slight changes in the dimensions can really make big differences. Other than the changes in the dimension there are few alterations in the specifications that include Intel Atom N270 processor, 1GB of memory and 160GB 5,400rpm hard disk drive. The price of the product is it biggest advantage which is US$ 329. It is very competitively priced for this segment. Replacing the Acer Aspire One as the entry point for netbooks it has secured it spot in the top 10 laptops.

Samsung N120 Netbook - The main attraction of this model from Samsung is the specialized keyboard and speakers. The N120 version is a treat to those people who believe the netbooks have really small keyboards and squeaking speakers. This model from Samsung has taken all the basic components from the N110 and fitted with a keyboard usually fitted to a 12-inch laptop. It also has a 2.1-speaker sound system which plays good music. Both the models N110 and N120 are a bit high ended in term of price. It starts at the US$ 469 mark which is a more than the other brands such as Asus, Lenovo, and Acer. Inside the machines there is a processing unit powered by the Intel Atom processor, 1GB memory and 160GB HDD.

The best Power Laptops:

HP HDX18 - This machine is known for its brawn more than its beauty. Under the hood is a 2.8-GHz Core2 Duo CPU from the T9600 series along with 4GB of RAM and 512MB GeForce 9600M GT graphics processing unit from NVidia. The powerful combination is enough to deliver a whooping 90 frames rate per second at a resolution of 1280 by 1024 and it is capable handling even bigger guns with ease. The HDX18 is really big and heavy with a weight of 8.9-pound. The dimensions are 17x11.26x1.72 inch. The "18" in the model name signifies the huge 18.4-inch display which is capable of showcasing full size high-definition video streams with ease. The keyboard feels good to touch with a cool metallic feel and is highly sensitive. The lustrous finish on the outside panels will make you see your reflection most of the time. It is not highly polished which would irritate the eyes, but you will also not be able to look away from it.

Apple MacBook Pro 2009 - This 17 inch laptop with a unibody makeover is a little late in the market as the most of the other brands have already launched their unibody model late last year. The metallic exterior is not the only difference pertaining to the latest version of the MacBook. Several changes were made such as boosting the processor, system bus, and increasing the RAM speeds. The most important development is the battery design. The latest MacBook battery is at least 40 % larger than the battery of the predecessor models and gives power to the same for upto 8 hrs. The system's core is the 2.66 GHz Core 2 Duo processor 6MB of L2 cache and 1066 MHz 4GB DDR3 of RAM.

With all this devices it packs a powerful punch being a really good contender for the top 10 laptops spots. The wide screen display with a resolution of 1920 x 1200, a trademark of the Apple laptops enhances the performance further.

The top ultra portable laptops among the top 10 laptops are:

Lenovo IdeaPad U110 - It is more of a piece of art than an electronic device. The venal pattern engraved into to the black or red aluminum casing and the decorative vents under the base make us think of an illuminated manuscript or a cloth made of silk. 1.6GHz Intel Core 2 Duo from the L7500 series with 667MHz 2GB RAM memory is quite a powerful combination. It has other features like 120GB 4,200rpm hard disk, integrated 7-cell battery GMA X3100 from Intel and so on. The laptop has a dimension of 10.8 x 7.7 x 0.72 inches with a screen size of 11.1 inches. The Lenovo IdeaPad U110 is priced at US$ 1899. Inspite of the diminutive size and delicate design, this laptop is amazingly sturdy in its construction, all the credits to the aluminum cover along with magnesium-aluminum casing.

Toshiba Portege R600-series - This series of ultraportable laptops provide a superb level of performance. The compact and lightweight body is aimed at the serious output of work is also an excellent mobile performer. It is priced at US$ 2099. 1.4GHz Core 2 Duo from the U9400 of Intel with 800MHz 3GB DDR2, 160GB 5,400rpm hard disk drive, Mobile Intel GM45 Express Chipset, and integrated 128MB GMA 4500MHD from Intel. The dimensions are 11.1 inches x 8.5 inches x 0.77 inches and it has a 12.1 inch display.

The best gaming laptops among the top 10 laptops are:

AlienWare Area-51 m17x - When it comes to gaming shut your eyes and say yes to this product. Under the hood is a Core 2 Extreme Quad-core processor with over-clocking option from Intel supported by 1333MHz 8GB DDR3 RAM and Dual GeForce GTX 280M graphics processing unit from NVIDIA which will give you the best gaming experience. The 17" Wide Screen WUXGA 1920 x 1200 with Clearview option and 1200p HDTV resolution support enhances the experience further giving you the ultimate gaming device. This is also a great option for the top 10 laptops slot.

Asus W90Vp-X1 - This can be the solution for both mobility and extreme performance.

2.8GHz Intel Core 2 Duo from the T9600 series with a 64 bit processor supported by 800 MHz 6GB DDR II SDRAM and 512MB Dual ATI Radeon HD4870 CrossFire graphics processing unit gives the user an experience of the lifetime. It also has very large storage like 320GB hard disk drive. The display is a whooping 18.4 inches in TFT WUXGA with a resolution of 1920×1080. The dimensions of this laptop is 2.5 x 17.4 x 12.9 inches. The other advantage is that this device is not highly priced making it one of the most attractive laptops.

We hope to facilitate your buying decision with this short list of great laptops. Feel free to get back in touch with us with your comments and remarks.

For more similar articles, visit here, and read about Laptop and notebook reviews and ratings, most popular laptops, industry news, forums.

By Christophe Catesson
Article Source: http://EzineArticles.com/?expert=Christophe_Catesson

Safeguarding Your Wireless Network

Life has never been this fast-paced before and for this reason, we simply need to have more freedom to cope with its demands. One of such freedoms we've been enjoying greatly is wireless networking. With our laptops, we can now bring our tasks everywhere we go and need not be confined to a physical place of work. That means more thigns done, more things done faster and definitely, more goals achieved. However, even with this benefit of wireless technology, there are risks involved and wardriving appears to be the most serious. Wardriving is a technique used by hackers who illegally access other people's wirelessly connected computers using their own laptops and scanner programs. What they do is drive around town and look for a spot where they can detect an unsecured wireless network they can connect to. Then they will connect and start sniffing information from other laptops in the network.

Imagine if they were wardriving your wireless network at home with your laptop containing confidential information about the company you work for. The possibilities are endless. They could snatch that information and use it against you, whether for kicks or to extort money from you. Worse, they could sell the information to your company's competitors and leave you in hot water with your business partners or your bosses. Or if you had your own personal private details saved there like your bank account number, credit card user names and passwords and the like, they could snatch those details and start using your accounts without your knowledge. These are definitely discomforting scenarios you wouldn't want to figure in. That's why you need to take extra precautions to ensure the safety of your files.

You can begin by changing the default settings on your router - that means your usernames, passwords and other details meant to secure your network. Built-in security measures are usually available with your wireless device such as the wireless encryption protocol (WEP) or the Wifi protected access (WPA), the latter being more preferable because it's newer and more effective. Your firewalls are, of course, indispensable especially when you're wirelessly connected. You can have a choice between software firewalls for each laptop in your home network or a hardware firewall that works at once for all attached devices.

Besides, even if you didn't have any sensitive information in your computer, some hackers could leave you some nasty codes that can wreak havoc in your network. These can be anything from viruses to worms to Trojans and even keyloggers which are programs that log everything you type into your computer through your keyboard. You may not have saved your credit card information in your hard drive, but when you need to enter it when buying something online, they could snatch that using those codes. To be sure, use every possible measure you can use to secure your files.

Another thing you can do is to install an IP changing software to beef up your Internet security. While this won't work to ward off wardrivers, it can keep you safe while surfing the web. Because your IP is your unique identifier while you're online, you escape hackers by misleading them with the fake IP supplied by your software. This means that even if you end up in unsafe sites, you can't leave a trail they can follow to access your computer.

Of course, this means safety and this is possible with the use an IP changer that allows you to mask your real IP address, surf anonymously and provide significant protection for your computer or network.

By Brad M Smith
Article Source: http://EzineArticles.com/?expert=Brad_M_Smith

A Guide to Help With Finding Cheap Laptops

Regardless of the reason that you are looking at cheap laptops, you are going to want to make sure that the one that you get is something that is worth it. One of the reasons you may be looking at these kinds of laptops is since you know that many of them are worth the money. As with any of the things that you buy, there are some things to think of when you are looking around at the different ones.

As you already know, laptops are great with the way they allow people to work on the go. This gives people a lot of convenience and has a lot to do with the popularity they have. If you have already started looking around, then you probably noticed the many different kinds that are out there. Various choices exist and this gives people more options on the type and price of computer they will buy. As the number of choices has increased in prices, so have the number of those that are cheaper. As many are already aware, choosing a computer that is not the newest one out there can help to keep the cost of the computer down.

If you do want one of the newer models, there are some decent computers that are made according to the needs of students and others that do not have a lot of graphic needs. In most cases, these kinds of computers are very reliable and will have no problem in handling what you need them to, in the case that you are a student or need a laptop just for some general use. Usually, you can get a laptop such as this, starting as low as $300.

If however, you need the computer for something else, then you may want to think of other options. This would be anything like gaming or some kind of designing or music, basically anything that is going to put a large load on the physical memory of the computer as well as the graphics. These are the kinds of situation that you would want to consider buying a computer that is refurbished by one of the manufacturers or through someone else.

If you find that you fall into this category, then you may want to think of buying a computer that is pre-owned or refurbished. One thing to consider however is if you buy a computer that is refurbished through a manufacturer then at least it will come with some kind of warranty. When you buy a computer from a person owner this is not the kind of protection that you will have and is something to think of.

Some people do actually find really good cheap laptops with personal owners, but this is not always the case. There are some cases where there could have been a problem they caused and that they covered up and you are unaware of and will not know about until it is too late. This is the reason that it is always best to buy one that comes from a store or manufacturer so that you always have some kind of protection on the computer.

Matthew Kerridge is an expert in electronic consumables. If you would like more information about cheap laptops or are searching for a trusted computer retailer please visit HERE

By Matthew Richard Kerridge
Article Source: http://EzineArticles.com/?expert=Matthew_Richard_Kerridge

Using Remote Access to Improve Your IT System


Remote access is becoming more and more widely used by businesses as it has slowly become a necessity for so many. Software solutions can now be hosted remotely and delivered from off-site locations with the increasing scope and range of high-speed Internet services.

This allows businesses to do more outsourcing and save a lot of money by easily and quickly sharing applications with all of their offices around the globe. Virtual meetings are quickly rising in breadth of use, which gives just one outstanding example of how remote access via the Internet is impacting the modern business.

What are some of the most important ways that your business can improve its IT system by using remote access?

• Secure e-mailing. You can now easily receive your company e-mails onto your mobile phone or PDA and make use of secure wireless synchronisation.

• Hosting CRM remotely. There are now some very good remote-access CRM software solutions with which you can increase your company's repeat sales and customer retention levels, and have remote salesmen working effectively and efficiently no matter where in the world they are.

• Work no matter where you are. Now your desktop can go with you to any location on the planet where you can pick up an Internet signal. You can work from anywhere you desire to or need to without interruption. As a business owner, you can also use these facts of remote access to set up a virtual office, thereby eliminating huge amounts of overhead costs.

• Disaster Recovery. You can stop losing sleep at night over the possibilities of losing your data or having your business victimised by things like theft, fire, etc. as now you can have all of your files and data stored in secure data centres. Upward and downward encryptions on all connections to your remote desktop keep your communications safe from hackers.

• Save a lot of money by never again needing purchase Microsoft Office suite software - it now typically gets included with remote IT system packages.

• With your IT system getting remotely delivered from and to secure data centres, you save tremendous amounts of money on IT support, infrastructure and hardware. Indeed, some of these things you may never need again. Your remote hosting company is responsible for ensuring and guaranteeing that you are able to access everything you need.

Remember that you are also going to be using the services of a company whose business it is to operate IT systems for other companies in a variety of industries. This fact alone means that you will, or at least should improve your IT systems, perhaps dramatically. You will no longer need to take the time and spend the money hunting down some IT experts that you need to maintain in house. You no longer need to trouble yourself over whether or not you have the latest and greatest technology at work in your IT systems. The company that gives you your remote access IT services will deal with all of that. This is Adam Smith's principle of the division of labour at its finest!

Derek Rogers is a freelance writer who writes for a number of UK businesses. For information about Networks, he recommends Network Needs, a leading provider of Remote Access Services.

By Derek Rogers
Article Source: http://EzineArticles.com/?expert=Derek_Rogers

How to Make Your Laptop Faster


Easy Instructions to Speed Up My Laptop in 3 Simple Steps!
Slow laptops can prove to be extremely frustrating for people whose work depends on them. However, there are many ways to make your laptop faster. These steps do not require you to be an expert. All you need is basic knowledge that helps you in improving your laptop's performance.

Today, laptops and desktops are an integral part of any organization, big or small, and many people use these personal computers and laptops for individual use. Many home businesses rely on the laptop and the Internet. To access the Internet, your laptop needs to run at a fast speed.

The speed or the performance of a laptop depends on various factors such as disk space, RAM space, operating system, and regular maintenance. Make sure you keep these factors in mind while trying to step up the performance of your laptop. You can increase the speed of your laptop in three easy steps. These steps are:

1. Check the RAM: Your laptop's RAM is an integral part of the system and is responsible for storing the main data for immediate access. Therefore, it is imperative that you upgrade your laptop's RAM after every few years. This is because a lot of the new programs and applications require increased memory to run. A small RAM, therefore, results in slow system speed. However, if you upgrade your RAM to a big one, you can make your laptop faster.

2. Defragment your laptop's hard disk: If you are a regular laptop user, it is imperative for you to be familiar with this term. Defragmentation is important, once in a few months as it helps optimize your laptop and assists you in streamlining all your files for easy access. It serves as mini-maintenance for your system and can make your laptop faster.

3. Run a good registry cleaner: Registry is an important part of your laptop and stores all your login details along with software settings. However, the problem with your laptop's registry is that it can only store files and not delete them. Therefore, over the time, files keep on accumulating on the system's registry, are overwritten a number of times, and thus can be misplaced or corrupted. This causes the laptop to take more time than usual to open different applications. By running a good registry cleaner regularly, you clean up the registry, which can make your laptop run faster.

Follow these three steps religiously to ensure that your laptop runs like it is new. For additional information, visit the following mentioned link:

http://www.expert-product-reviews.net/detect-registry-error.html

Tired of slowing PC performance? Do you want to make your laptop in cheap and fast way? You can scan the registry error in your computer for free and fix them with the best registry cleaner on the market. After scanning and fixing your PC, you will be surprise how fast your computer is.

By A. Wood
Article Source: http://EzineArticles.com/?expert=A._Wood

USB Thumb Drives - Personal Storage and More


A few years ago, many of us were still using those little 3.5 inch floppy disks to save our valuable information on. While these magnetic disks shielded in a flimsy plastic casing were the best and most portable option most of us had, they were far from perfect. At what always seemed to be the most inopportune time, our floppy disks would fail and/or loose our homework assignments for school, a presentation for work, or those important backups from our personal banking software. We struggled for a better way. While business relied on large hard drives and other forms of magnetic media such as tape drives to store their important information, the average joe had to keep packing around those lovely little floppy disks, hoping and praying that we wouldn't crook our mouths the wrong way and ruin the floppy.

Thankfully, someone (namely Dov Moran in 1998) came up with the brilliant little idea of a USB thumb drive. You may know this lovely little piece of equipment by one of its many other names: Flash drive, pen drive, jump drive, thumb drive...the list goes on and on. But what has made these thumb drives so popular? Are they good for anything other that storage? How much information can they hold?

Popularity

First things first, let's talk about the wild popularity of thumb drives. For one, they are virtually impervious to scratches, dents, drops that plagued floppy disks, and to some extent, compact discs. I personally have washed (and dried) a thumb drive on several occasions, with no ill effect. (I personally would not recommend this as a testing point for your thumb drive. I didn't set out to test mine that way and if I weren't so forgetful, my poor little thumb drive would never have been subjected to such a test!)

Portability is another benefit that thumb drives offer that was sorely lacking in floppy disks. Everybody used to carry around their floppy in the back pocket of their pants; a disaster waiting to happen. Thumb drives easily slip in a pocket, or in most cases, come with a lanyard for hanging around your neck for easy access. Just be sure that when you purchase a thumb drive, don't get one where the lanyard attaches to the cap! Your extremely rugged and portable thumb drive will do you no good if it falls off your lanyard and lands in the middle of the road. Not even a thumb drive can stand up to the pure force of a tractor-trailer.

Functionality

Yes, thumb drives were originally designed as a portable storage device. But now, they good for so much more. Thumb drives have become popular with PC technicians as there are a lot of diagnostic tools that can be run from a thumb drive, even to the point of having an entire operating system that can boot from the thumb drive.

There are several programs (with more being added all the time)
that can run from a thumb drive. U3, a company back by SanDisk and M-Systems, develops applications specifically formatted so they can be launched from a USB thumb drive. U3 provides development tools to companies that wish to make a version of their software that can be used from a thumb drive. The list of available software grows more everyday and includes everything from web browsers (Mozilla Firefox) to antivirus scanners (Avast!) and much more.

Storage Capacity

As advances in flash storage technology continue to break the barriers on storage capacity, thumb drives will continue to hold more and more information. And do it at an increasingly lower cost. A 2GB thumb drive today costs about what a 256 MB drive cost only 2 years ago. Drives as large as 4 GB are now available, with larger sizes not too far off in the future.

Personal storage certainly has come a long way since the days of the floppy. USB thumb drives are cheap, portable, reliable, durable, and hold much more information than any floppy ever dreamed of. For transporting your information from one place to another, there's no better choice than a thumb drive. And with new technology, your thumb drive can almost be a portable resource, carrying your web browser, media player, photos and more right along with you wherever you go.

Michael Paul is the host/producer of the TechCast Weekly podcast, a weekly podcast dedicated to offering computer help and computer tutorials to everyday people. Visit here to listen to the latest shows and great computer help and advice.

By Michael Paul Jr
Article Source: http://EzineArticles.com/?expert=Michael_Paul_Jr

7/07/2009

Antivirus Software


Antivirus (or anti-virus) software is used to prevent, detect, and remove malware, including computer viruses, worms, and trojan horses. Such programs may also prevent and remove adware, spyware, and other forms of malware.
A variety of strategies are typically employed. Signature-based detection involves searching for known malicious patterns in executable code. However, it is possible for a user to be infected with new malware in which no signature exists yet. To counter such so called zero-day threats, heuristics can be used. One type of heuristic approach, generic signatures, can identify new viruses or variants of existing viruses for looking for known malicious code (or slight variations of such code) in files. Some antivirus software can also predict what a file will do if opened/run by emulating it in a sandbox and analyzing what it does to see if it performs any malicious actions. If it does, this could mean the file is malicious.
However, no matter how useful antivirus software is, it can sometimes have drawbacks. Antivirus software can degrade computer performance if it is not designed efficiently. Inexperienced users may have trouble understanding the prompts and decisions that antivirus software presents them with. An incorrect decision may lead to a security breach. If the antivirus software employs heuristic detection (of any kind), the success of it is going to depend on whether it achieves the right balance between false positives and false negatives. False positives can be as destructive as false negatives. In one case, a faulty virus signature issued by Symantec mistakenly removed essential operating system files, leaving thousands of PCs unable to boot. Finally, antivirus software generally runs at the highly trusted kernel level of the operating system, creating a potential avenue of attack.
In addition to the drawbacks mentioned above, the effectiveness of antivirus software has also been researched and debated. One study found that the detection success of major antivirus software dropped over a one-year period.

Download Antivirus Software Update :
AVG Antivirus
PC Media Anti Virus
ANSAV
McAfee VirusScan
Symantec Norton AntiVirus
Kaspersky Antivirus
TrendMicro
BitDefender

(Articel from www.wikimedia.com)

6/29/2009

7 Secrets To Top Search Engine Rankings

by John Pawlett

There’s hope for the ‘little guys’ in the search engine ranking game, even if they can’t tell the difference between the title and keyword meta tag!

You can achieve high rankings for important keywords simply by applying certain rules that stand the test of time and even technology, the number one rule is really to., help the search engines provide relevant search results!

How do you do this? I’ll reveal the ’secrets’ soon.

While I’m far from being an SEO (Search Engine Optimization) expert and am just sharing experiences here, I’ve achieved some phenomenal results by following these basic rules and without resorting to ‘tricks’. Importantly, these are rankings that last.

I’m not suggesting you shouldn’t learn about SEO or use genuine software that helps, in fact you should.

For example (at this time of writing), here are my rankings for www .Marketing-Make-Money. com in Yahoo alone (remember these are extremely competitive keywords):

‘Make money online’ | rank: 1 of 33.9 ‘Make money’ | rank: 27 of 85.4 million ‘Web marketing’ | rank: 4 of 113 million ‘Web marketing tips’ | rank: 6 of 10.2

How did I achieve such incredible rankings without being some SEO guru or even obsessively optimizing my site?Recall the number one rule? It’s to help the search engines provide relevant search results.

Now I honestly believe there are only two MAIN things which support this rule and in the process, reward your website with the high rankings you desire.

These two things are Keyword Rich Content and Targeted Back Links which we’ll talk about later…

Here then are 7 powerful secrets you can use to model your website after to explode your high search engine rankings!

Step 1: Determine Highly Searched Keywords Determine highly searched and targeted keywords/keyword phrases related to your site and put them into a list. Here’re the tools to us e.

Step 2: Register Keyword Rich Domain Names While there’ve been contrasting arguments about whether having keywords in your domain helps, I strongly feel it does. The same goes for dashes between words in the domain.

Step 3: Use Your Targeted Keywords In Your Copy Use the list of keywords in step 1 within your website copy, especially in the title, headline and first paragraph. The important thing is to make them flow smoothly within the context of the copy so prospects will not find it weird.

Step 4: Insert Keyword Rich Relevant Content Next, build up your site’s content with relevant topics containing your keywords. Don’t worry, here are some ways to get instant content:

Step 5: Aggressively Acquire Targeted Back Links This is the second most important (some say it’s the first) factor to note after targeted and relevant content.

Step 6: Hand Submit Your Site To The Top Directories and Search Engines There’s no point in using those ’submit to millions’ services as only a few search engines really matter.

Using those services may actually cause your site to be penalized by these major engines.

Step 7: Tune Your Site For Maximum Optimization The final step would be to constantly monitor and analyze your website traffic against rankings. This is so you can review and tweak for further improvement in your rankings.

I hope this article will prove highly useful to you. Do not be scare away by SEO, it’s simple once you follow the above system. While these steps are not everything you can do, it’ll be enough to get your site ranked very well for the targeted keywords you chose.

Again, remember the number one rule of giving relevant content and establishing good back links. Help the search engines provide relevant results for their customers and your rankings will automatically skyrocket to the top!

About the Author: The Web is an informative website that looks into all aspects of the internet from building your own sites, to surfing others optimised sites. To find out more visit Grace.

Windows Vista


Microsoft and PC manufactures began the Vista Express Upgrade program. The Vista Express Upgrade Program allows customers who purchase a new computer between October 26, 2006 and March 15, 2007, to get an upgrade version of Windows Vista for free (minus shipping and handling costs). So if you’ve been waiting to make that new computer purchase until Vista is released, the wait is over. Purchase now and you’ll be guaranteed a copy of Vista for your new system when the final version is released.

But what if you don’t want to buy a new computer? Does your existing system have what it takes to run Vista, and run Vista as it was meant to? Don’t think that just because you might have purchased a top-of-the-line system at one time that you’ll be able to purchase Vista Ultimate Edition and have everything work correctly.

The hardware requirements for Vista are higher than any other version of Windows to date. And there seems to be a lot of confusion on the market today with the terms “Vista Capable” and “Vista Premium Ready” being plastered all over computers at every retail store. What exactly do these two terms mean?

Vista Capable PCs Vista Capable basically gives the minimum requirements that your computer system needs in order to “boot” Vista and run the operating system at it’s most minimal level. Vista Capable will allow you to install the version of Vista dubbed Vista Home Basic, which features most of the core components of Vista except for the new interface, dubbed Aero. Aero offers an entirely new visual experience for computer users, using the power of your computer’s video card. Vista Capable PCs will not be able to experience all of the benefits of the Aero interface.

Vista Premium Ready PCs Vista Premium Ready PCs have that missing component, a beefy video card, that allows the Aero interfact to shine through and give you the full experience of Windows Vista. You’ll get 3D windows with translucent frames, live previews of windows in the taskbar located at the bottom of your screen, and the new Flip windows functionality that makes it easier to find the window you want to work in.

If you’re looking to upgrade to Vista, I’d recommend you look into the Home Premium version. You’ll get the full Aero experience, along with the rest of the enhancements available in Vista. Better security, an easy to use interface, and improved stability make Vista a worthy upgrade. If you want to go Home Premium, here’s what you’re computer will need.

  • 1 GHz processor
  • 1 GB of system memory
  • Support for DirectX 9 graphics, 128 of graphics memory
  • 40 GB of hard drive space with 15 GB free space
  • DVD-ROM Drive
  • Audio output
  • Internet access

*These specifications pulled from Microsoft’s web site

Check out your PC today and see if you’re ready for Vista. If not, you can feel secure that when you purchase a PC between now and March 15, 2007, you’ll be able to upgrade for the cost of shipping a DVD to your home.

Michael Paul is the host/producer of the TechCast Weekly podcast, a weekly podcast dedicated to offering computer help and computer tutorials to everyday people. If you’re the type of person that wants to know how to use your computer and don’t want to listen to a lot of geek speak to get good advice, the TechCast Weekly is the show for you. Even if you don’t know what a podcast is, you can find out on the TechCast Weekly site and learn how you can get great audio content absolutely free and chock full of helpful hints to help you use and understand your computer more effectively. The TechCast Weekly offers common sense answers to your computer questions, plus tutorials on popular software titles, with a Premium service offering video tutorials showcasing different software titles, allowing you to follow along and implement your new knowledge right away. Visit www.techcastweekly.com to listen to the latest shows and great computer help and advice.

Article Source: http://EzineArticles.com/?expert=Michael_Paul_Jr

5/04/2009

E-Learning Education ;

Lifelong learning is not limited space of time and distance, in this decade we recognize the existence of E-Learning Education, or learning to use electronic media. With the launch of our simplicity and limitations, PKBM Argowilis Village Sokawera District Cilongok Banyumas regency of Central Java province, to try learning with E-Learning Education. This we do learn that all citizens can obtain PKBM Argowilis study guide in softcopy. So that residents learn to learn independently obtain the services of e-learning this. For the initial phase of the trial or the service we already have in the radio broadcast 87.5 MHz Radio RP2M Education and Community Empowerment, and is now trying to crawl to the Internet Information Technologi form. With hope and praying childhood village in the hope that our dream to provide a decent education for all sections of the community immediately realized.

Download Center
Download Center
1. Computer Materials
module 10-finger typing technique
techniques to identify the computer module
Module Periferal
Software modules to work with Word
The processing module software work
Module Presentation Software
Software Processing Module Database
Internet Connection Guide module, and Working With Internet
Managing Information Module

4/23/2009

History of Printer :

Woodblock printing

Woodblock printing is a technique for printing text, images or patterns that was used widely throughout East Asia. It originated in China in antiquity as a method of printing on textiles and later on paper. As a method of printing on cloth, the earliest surviving examples from China date to before 220, and from Egypt to the 4th century.

In East Asia

"Selected Teachings of Buddhist Sages and Son Masters", the earliest known book printed with movable metal type, 1377. Bibliothèque Nationale de Paris.
Main article: History of typography in East Asia

By 593 A.D., the first printing press was invented in China, and the first printed newspaper, Kaiyuan Za Bao, was available in Beijing in 713 A.D. It was a woodblock printing. And the Tianemmen scrolls, the earliest known complete woodblock printed book with illustrations, was printed in China in 868 A.D.; it did not supersede the use of block printing.

In Middle East


Woodblock printing on cloth appeared in Egypt by the 4th century, though it is not clear if the Egyptian printing of cloth was learned from China or developed separately. Block printing of text, called tarsh in Arabic was developed in Arabic Egypt during the 9th-10th centuries, mostly for prayers and amulets. It is unclear whether the print blocks were made from metal or wood or other materials. This technique, however, appears to have had very little influence outside of the Muslim world. Though Europe adopted woodblock printing from the Muslim world, initially for fabric, the technique of metal block printing was also unknown in Europe. Block printing later went out of use in Islamic Central Asia after movable type printing was introduced from China.

In Europe

Block printing first came to Christian Europe as a method for printing on cloth, where it was common by 1300. Images printed on cloth for religious purposes could be quite large and elaborate, and when paper became relatively easily available, around 1400, the medium transferred very quickly to small woodcut religious images and playing cards printed on paper. These prints were produced in very large numbers from about 1425 onwards.

Around the mid-century, block-books, woodcut books with both text and images, usually carved in the same block, emerged as a cheaper alternative to manuscripts and books printed with movable type. These were all short heavily illustrated works, the bestsellers of the day, repeated in many different block-book versions: the Ars moriendi and the Biblia pauperum were the most common. There is still some controversy among scholars as to whether their introduction preceded or, the majority view, followed the introduction of movable type, with the range of estimated dates being between about 1440–1460.

Movable type printing

A case of cast metal type pieces and typeset matter in a composing stick.
Main article: Movable type
See also: History of Western typography

Movable type is the system of printing and typography using movable pieces of metal type, made by casting from matrices struck by letterpunches. Movable type allowed for much more flexible processes than hand copying or block printing.

Around 1040, the first known movable type system was created in China by Bi Sheng out of porcelain. Sheng used clay type, which broke easily, but Wang Zhen later carved a more durable type from wood by 1298 AD, and developed a complex system of revolving tables and number-association with written Chinese characters that made typesetting and printing more efficient. However, the main method in use there remained woodblock printing.

Around 1450, Johannes Gutenberg introduced what is regarded as an independent invention of movable type in Europe (see printing press), along with innovations in casting the type based on a matrix and hand mould. Gutenberg was the first to create his type pieces from an alloy of lead, tin and antimony – the same components still used today.

Johannes Gutenberg's work on the printing press began in approximately 1436 when he partnered with Andreas Dritzehen — a man he had previously instructed in gem-cutting—and Andreas Heilmann, owner of a paper mill. It was not until a 1439 lawsuit against Gutenberg that official record exists; witnesses testimony discussed type, an inventory of metals (including lead) and his type mold.

Compared to woodblock printing, movable type page setting was quicker and more durable. The metal type pieces were more durable and the lettering was more uniform, leading to typography and fonts. The high quality and relatively low price of the Gutenberg Bible (1455) established the superiority of movable type, and printing presses rapidly spread across Europe, leading up to the Renaissance, and later all around the world. Today, practically all movable type printing ultimately derives from Gutenberg's movable type printing, which is often regarded as the most important invention of the second millennium.

Rotary printing press
Main article: Rotary printing press

The rotary printing press was invented by Richard March Hoe in 1847. It uses impressions curved around a cylinder to print on long continuous rolls of paper or other substrates. Rotary drum printing was later significantly improved by William Bullock.

Modern printing technology

The folder of newspaper web offset printing press.

Across the world, over 45 trillion pages (2005 figure) are printed annually. In 2006 there were approximately 30,700 printing companies in the United States, accounting for $112 billion, according to the 2006 U.S. Industry & Market Outlook by Barnes Reports. Print jobs that move through the Internet made up 12.5% of the total U.S. printing market last year, according to research firm InfoTrend/CAP Ventures.

Offset press

Offset printing is a widely used printing technique where the inked image is transferred (or "offset") from a plate to a rubber blanket, then to the printing surface. When used in combination with the lithographic process, which is based on the repulsion of oil and water, the offset technique employs a flat (planographic) image carrier on which the image to be printed obtains ink from ink rollers, while the non-printing area attracts a film of water, keeping the non-printing areas ink-free.

Currently, most books and newspapers are printed using the technique of offset lithography. Other common techniques include:

  • flexography used for packaging, labels, newspapers.
  • hot wax dye transfer
  • inkjet used typically to print a small number of books or packaging, and also to print a variety of materials from high quality papers simulate offset printing, to floor tiles; Inkjet is also used to apply mailing addresses to direct mail pieces.
  • laser printing mainly used in offices and for transactional printing (bills, bank documents). Laser printing is commonly used by direct mail companies to create variable data letters or coupons, for example.
  • pad printing popular for its unique ability to print on complex 3-dimensional surfaces.
  • relief print, (mainly used for catalogues).
  • rotogravure mainly used for magazines and packaging.
  • screen-printing from T-shirts to floor tiles.

Gravure

Gravure printing is an intaglio printing technique, where the image to be printed is made up of small depressions in the surface of the printing plate. The cells are filled with ink and the excess is scraped off the surface with a doctor blade, then a rubber-covered roller presses paper onto the surface of the plate and into contact with the ink in the cells. The printing plates are usually made from copper and may be produced by digital engraving or laser etching.

Gravure printing is used for long, high-quality print runs such as magazines, mail-order catalogues, packaging, and printing onto fabric and wallpaper. It is also used for printing postage stamps and decorative plastic laminates, such as kitchen worktops.

Impact of the invention of printing

Religious impact

Samuel Hartlib, who was exiled in Britain and enthusiastic about social and cultural reforms, wrote in 1641 that "the art of printing will so spread knowledge that the common people, knowing their own rights and liberties, will not be governed by way of oppression". For both churchmen and governments, it was concerning that print allowed readers, eventually including those from all classes of society, to study religious texts and politically sensitive issues by themselves, instead of thinking mediated by the religious and political authorities.

It took a long long time for print to penetrate Russia and the Orthodox Christian world, a region (including modern Serbia, Romania and Bulgaria) where reading ability was largely restricted to the clergy. In 1564, a White Russian brought a press to Moscow, and soon after that his workshop was destroyed by a mob.

In the Muslim world, printing, especially in Arabic or Turkish was strongly opposed throughout the early modern period (printing in Hebrew was sometimes permitted). Indeed, the Muslim countries have been regarded as a barrier to the passage of printing from China to the West. According to an imperial ambassador to Istanbul in the middle of the sixteenth century, it was a sin for the Turks to print religious books. In 1515, Sultan Selim I issued a decree under which the practice of printing would be punishable by death. At the end of the century, Sultan Murad III permitted the sale of non-religious printed books in Arabic characters, yet the majority were imported from Italy.

Jews were banned from German printing guilds; as a result Hebrew printing sprang up in Italy, beginning in 1470 in Rome, then speading to other towns. Local rulers had the authority to grant or revoke licenses to publish Hebrew books.

It was thought that the introduction of the printing medium 'would strengthen religion and enhance the power of monarchs.' The majority of books were of religious nature with the church and crown regulating the content. The consequences of printing wrong material were extreme. Meyrowitz used the example of William Carter who, in 1584, printed a pro-Catholic pamphlet in Protestant-dominated England. The consequence of his action was hanging.

The widespread distribution of the Bible 'had a revolutionary impact, because it decreased the power of the Catholic Church as the prime possessor and interpretor of God's word.'

Social impact

Print gave a broader range of readers access to knowledge and enabled later generations to build on the intellectual achievements of earlier ones. Print, according to Acton in his lecture On the Study of History (1895), gave "assurance that the work of the Renaissance would last, that what was written would be accessible to all, that such an occultation of knowledge and ideas as had depressed the Middle Ages would never recur, that not an idea would be lost".

Print was instrumental in changing the nature of reading within society.

Elizabeth Eisenstein identifies two long term effects of the invention of printing. She claims that print created a sustained and uniform reference for knowledge as well as allowing for comparison between incompatible views. (Eisenstein in Briggs and Burke, 2002: p21)

Asa Briggs and Peter Burke identify five kinds of reading that developed in relation to the introduction of print:
  1. Critical reading: due to the fact that texts finally became accessible to the general population, critical reading emerged because people were given the option to form their own opinions on texts.
  2. Dangerous Reading: reading was seen as a dangerous pursuit because it was considered rebellious and unsociable. This was especially in the case of women because reading could stir up dangerous emotions like love. There was also the concern that if women could read, they could read love notes.
  3. Creative reading: Printing allowed people to read texts and interpret the reatively, often in very different ways than the author intended.
  4. Extensive Reading: Print allowed for a wide range of texts to become available, thus, previous methods of intensive reading of texts from start to finish, began to change. With texts being readily available, people began reading on particular topics or chapters, allowing for much more extensive reading on a wider range of topics.
  5. Private reading: This is linked to the rise of individualism. Before print, reading was often a group event, where one person would read to a group of people. With print, literacy rose as did availability of texts, thus reading became a solitary pursuit.
"While the invention of printing has been discussed conventionally in terms of its value for spreading ideas, it’s even greater contribution is its furthering of the long-developing shift in the relationship between space and discourse".

The proliferation of media that Ong is discussing in relation to the introduction of the printing press, to the death of an oral culture and that the new this new culture had more of an emphasis on the visual rather than in an auditory medium. As such the printing press gave birth to a more accessible and widely available source of knowledge in the sense that it broke down the boundaries between the possessors of knowledge and the masses. The narrative or discourse now existed in what would become indirectly through time, the global village.

The invention of printing also changed the occupational structure of European cities. Printers emerged as a new group of artisans for whom literacy was essential, although the much more labour-intensive occupation of the scribe naturally declined. Proof-correcting arose as a new occupation, while a rise in the amount of booksellers and librarians naturally followed the explosion in the numbers of books.

Digital printing

Digital printing accounts for approximately 9% of the 45 trillion pages printed annually (2005 figure) around the world.
Printing at home or in an office or engineering environment is subdivided into:
  • small format (up to ledger size paper sheets), as used in business offices and libraries
  • wide format (up to 3' or 914mm wide rolls of paper), as used in drafting and design establishments.
Some of the more common printing technologies are:
  • blueprint—and related chemical technologies.
  • daisy wheel—where pre-formed characters are applied individually.
  • dot-matrix—which produces arbitrary patterns of dots with an array of printing studs.
  • inkjet—including bubble-jet—where ink is sprayed onto the paper to create the desired image.
  • laser—where toner consisting primarily of polymer with pigment of the desired colours is melted and applied directly to the paper to create the desired image.
  • line printing—where pre-formed characters are applied to the paper by lines.
  • solid ink printer-where cubes of ink are melted onto paper.
  • heat transfer—like early fax machines or modern receipt printers that apply heat to special paper, which turns black to form the printed image.
Vendors typically stress the total cost to operate the equipment, involving complex calculations that include all cost factors involved in the operation as well as the capital equipment costs, amortization, etc. For the most part, toner systems beat inkjet in the long run, whereas inkjets are less expensive in the initial purchase price.

Professional digital printing (using toner) primarily uses an electrical charge to transfer toner or liquid ink to the substrate it is printed on. Digital print quality has steadily improved from early color and black & white copiers to sophisticated colour digital presses like the Xerox iGen3, the Kodak Nexpress, the HP Indigo Digital Press series and the InfoPrint 5000. The iGen3 and Nexpress use toner particles and the Indigo uses liquid ink. The InfoPrint 5000 is a full-color, continuous forms inkjet drop-on-demand printing system. All handle variable data and rival offset in quality. Digital offset presses are called direct imaging presses; although these receive computer files and automatically turn them into print-ready plates, they cannot insert variable data.

Small press and fanzines generally use digital printing or more rarely xerography. Prior to the introduction of cheap photocopying the use of machines such as the spirit duplicator, hectograph, and mimeograph was common.

See also

* Color printing
* Converters (industry)
* Flexography
* Foil imaging
* Foil stamping
* Hot metal typesetting
* In-mould decoration
* In-mould labelling
* Intaglio (printmaking)
* Jang Young Sil
* Letterpress printing
* Movable type
* Offset printing
* Pad printing
* Print on demand
* Printmaking
* Security printing
* Typography
* Wang Zhen
* Waterless printing
* Laurens Janszoon Coster
* Printing press check

External links
Sister project Look up printing in
Wiktionary, the free dictionary.
  • Centre for the History of the Book
  • American Printing History Association - numerous links to online resources and other organizations.
  • Children of the Code - Online Video: The DNA of Science, The Alphabet and Printing.
  • Learn about printing — International Paper.
  • Planet Typography - history of printing - selection of international sites dedicated to the history of printing.
  • Printing Industries of the Americas - national trade association for printers and companies in the graphic arts.
  • The development of book and printing. English website of the Gutenberg-Museum Mainz (Germany)
  • BPSnet - The website of the British Printing Society

References
  1. Geoffrey Roper, Muslim Heritage
  2. Richard W. Bulliet (1987), "Medieval Arabic Tarsh: A Forgotten Chapter in the History of Printing", Journal of the American Oriental Society 107 (3), p. 427-438.
  3. Master E.S., Alan Shestack, Philadelphia Museum of Art, 1967
  4. Encyclopaedia Britannica. Retrieved November 27, 2006, from Encyclopaedia Britannica Ultimate Reference Suite DVD – entry 'printing'
  5. a b Meggs, Philip B. A History of Graphic Design. John Wiley & Sons, Inc. 1998. (pp 58–69)
  6. In 1997, Time–Life magazine picked Gutenberg's invention to be the most important of the second millennium. In 1999, the A&E Network voted Johannes Gutenberg "Man of the Millennium". See also 1,000 Years, 1,000 People: Ranking The Men and Women Who Shaped The Millennium which was composed by four prominent US journalists in 1998.
  7. a b "When 2% Leads to a Major Industry Shift" Patrick Scaglia, August 30, 2007.
  8. Ref: Briggs, Asa and Burke, Peter (2002) A Social History of the Media: from Gutenberg to the Internet, Polity, Cambridge, pp.15-23, 61-73.
  9. "A Lifetime’s Collection of Texts in Hebrew, at Sotheby’s", Edward Rothstein, New York Times, February 11, 2009
  10. Meyrowitz: "Mediating Communication: What Happens?" in "Questioning the Media", p. 41.
  11. Meyrowitz: "Mediating Communication: What Happens?" in "Questioning the Media", p. 41.
  12. Meyrowitz: "Mediating Communication: What Happens?" in "Questioning the Media", p. 41.
  13. Ref: Briggs, Asa and Burke, Peter (2002) A Social History of the Media: from Gutenberg to the Internet, Polity, Cambridge, pp.15-23, 61-73.
  14. Briggs, Asa and Burke, Peter (2002) A Social History of the Media: from Gutenberg to the Internet, Polity, Cambridge, pp.15-23, 61-73

Further reading
  • Saunders, Gill; Miles, Rosie (2006-05-01). Prints Now: Directions and Definitions. Victoria and Albert Museum. ISBN 1-85177-480-7.
  • Nesbitt, Alexander (1957). The History and Technique of Lettering. Dover Books.
  • Steinberg, S.H. (1996). Five Hundred Years of Printing. London and Newcastle: The British Library and Oak Knoll Press.
  • Gaskell, Philip (1995). A New Introduction to Bibliography. Winchester and Newcastle: St Paul's Bibliographies and Oak Knoll Press.
  • Elizabeth L. Eisenstein, The Printing Press as an Agent of Change, Cambridge University Press, September 1980, Paperback, 832 pages, ISBN 0-521-29955-1
  • Marshall McLuhan, The Gutenberg Galaxy: The Making of Typographic Man (1962) Univ. of Toronto Press (1st ed.); reissued by Routledge & Kegan Paul ISBN 0-7100-1818-5.
  • Tam, Pui-Wing The New Paper Trail, The Wall Street Journal Online, February 13, 2006 Pg.R8
  • Woong-Jin-Wee-In-Jun-Gi #11 Jang Young Sil by Baek Sauk Gi. Copyright 1987 Woongjin Publishing Co., Ltd. Pg. 61.

On the effects of Gutenberg's printing
Early printers manuals The classic manual of early hand-press technology is

* Moxon, Joseph (1683-84), Mechanick Exercises on the Whole Art of Printing (ed. Herbert Davies & Harry Carter. New York: Dover Publications, 1962, reprint ed.)

A somewhat later one, showing 18th century developments is

* Stower, Caleb (1808), The Printer's Grammar (London: Gregg Press, 1965, reprint ed.)

Download Free Driver Printer :
Driver Printer Canon
Driver Printer HP
Driver Printer Epson