<?xml version='1.0' encoding='UTF-8'?><rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/" xmlns:blogger="http://schemas.google.com/blogger/2008" xmlns:georss="http://www.georss.org/georss" xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr="http://purl.org/syndication/thread/1.0" version="2.0"><channel><atom:id>tag:blogger.com,1999:blog-4902654608097202933</atom:id><lastBuildDate>Fri, 01 Nov 2024 11:06:16 +0000</lastBuildDate><category>all about computer</category><category>computer</category><category>computer chirping</category><category>News</category><category>antivirus software</category><category>Apple</category><category>History of computing</category><category>Microsoft</category><category>Pocket PC</category><category>google</category><category>hackers</category><category>Acer</category><category>Download</category><category>Free E-book</category><category>Internet</category><category>MyDoom Virus</category><category>Personal computer</category><category>answered</category><category>fight</category><category>history</category><category>questions</category><category>tips n tricks</category><category>2010 gold cobra</category><category>Android</category><category>Cocktail</category><category>Cyberwarfare</category><category>EMI</category><category>Electronic</category><category>GhostNet</category><category>Hard Drive</category><category>Hardware</category><category>Intel</category><category>Korea</category><category>Linux</category><category>Notebook Price</category><category>Online Networks</category><category>Popular Product</category><category>Sony</category><category>Tablet computer</category><category>Team Cymru</category><category>US</category><category>Western Digital</category><category>Zii egg</category><category>activate</category><category>activate windows without product keys</category><category>advanced system</category><category>amazon uk</category><category>arkansas</category><category>attack</category><category>bacteria computer</category><category>big</category><category>blog</category><category>budget</category><category>buying laptop</category><category>bypass</category><category>bypass megavideo</category><category>camera</category><category>chrome OS</category><category>clear search</category><category>computer games</category><category>computer hardware by google</category><category>computer slow</category><category>computer system</category><category>computer user</category><category>conficker</category><category>cyberwarefare</category><category>desktop computer</category><category>experience</category><category>eyes</category><category>facebook</category><category>gadget</category><category>gold cobra</category><category>grow up</category><category>hack</category><category>haha</category><category>hidden camera</category><category>how to</category><category>insurance</category><category>language</category><category>laugh</category><category>lead</category><category>limewire</category><category>limit</category><category>limp bizkit</category><category>linux operation</category><category>magazine</category><category>maintenance</category><category>mark</category><category>megaproject</category><category>megavideo</category><category>megavideo timelimit</category><category>minister</category><category>money</category><category>netbook</category><category>next</category><category>notebook google</category><category>online search</category><category>online zombie</category><category>open source</category><category>password</category><category>pick</category><category>pirate bay</category><category>podcast</category><category>report</category><category>safe browsing</category><category>save</category><category>security</category><category>simple</category><category>simply filling</category><category>smart consumer</category><category>solve problem</category><category>solving problem</category><category>spam</category><category>speedbook</category><category>spyware</category><category>supports</category><category>synx</category><category>tax free</category><category>the new album</category><category>tools</category><category>tweeter</category><category>u buntu</category><category>victim</category><category>virus</category><category>virus 2010</category><category>wight</category><category>windows 7</category><category>youtube</category><category>zombie girl</category><category>彩票</category><category>所有有关计算机</category><category>计算机啁啾</category><title>All About Computer</title><description>Discussion About Computer and a few Tutorial</description><link>http://computerchirping.blogspot.com/</link><managingEditor>noreply@blogger.com (Unknown)</managingEditor><generator>Blogger</generator><openSearch:totalResults>63</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4902654608097202933.post-7783249209116165223</guid><pubDate>Sun, 16 Jul 2017 16:19:00 +0000</pubDate><atom:updated>2017-07-17T00:19:41.362+08:00</atom:updated><title>Blender Absolute Beginner Tutorial: Episode 1 </title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
https://www.youtube.com/watch?v=LLV7h-WLIx0&lt;/div&gt;
</description><link>http://computerchirping.blogspot.com/2017/07/blender-absolute-beginner-tutorial.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4902654608097202933.post-5069063839326829268</guid><pubDate>Sat, 14 Jan 2017 16:41:00 +0000</pubDate><atom:updated>2017-01-15T00:59:01.806+08:00</atom:updated><title>Blender - amatuer 3D animation</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhkQMrC8RuGDE8i06T-NzjhTYXSS3w41cXZXvM1b0Vk50gTMxIW33y8EhAvBIOxE0fEp57jJ-VGerV0zDTZblJGxIGV4IY3fhElLFbK1ruyUn0aPcoGb56zPDTnofNz7PhUV9ttZsaQvg/s1600/BLNDR.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;152&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhkQMrC8RuGDE8i06T-NzjhTYXSS3w41cXZXvM1b0Vk50gTMxIW33y8EhAvBIOxE0fEp57jJ-VGerV0zDTZblJGxIGV4IY3fhElLFbK1ruyUn0aPcoGb56zPDTnofNz7PhUV9ttZsaQvg/s320/BLNDR.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;&lt;/div&gt;
</description><link>http://computerchirping.blogspot.com/2017/01/blender-amatuer-3d-animation.html</link><author>noreply@blogger.com (Unknown)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhkQMrC8RuGDE8i06T-NzjhTYXSS3w41cXZXvM1b0Vk50gTMxIW33y8EhAvBIOxE0fEp57jJ-VGerV0zDTZblJGxIGV4IY3fhElLFbK1ruyUn0aPcoGb56zPDTnofNz7PhUV9ttZsaQvg/s72-c/BLNDR.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4902654608097202933.post-2216728792505253428</guid><pubDate>Fri, 06 Jan 2017 09:47:00 +0000</pubDate><atom:updated>2017-01-06T17:47:20.830+08:00</atom:updated><title>GIMP - colour manipulation.</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto; text-align: center;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEivQ_N-q0Y3-DBl2fUjpu5P5Zbh9S0dqHmLHwbgJ6mM5cR399PJZPVUqxuDi_83qz6ar7bvkgijQTGX2008XOu3fUAgacGbwi4k5IUsvQneYtXrqZudS2LrcOu_wmWnqiHX99O-5sIhrg/s1600/DSCF0893.JPG&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;240&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEivQ_N-q0Y3-DBl2fUjpu5P5Zbh9S0dqHmLHwbgJ6mM5cR399PJZPVUqxuDi_83qz6ar7bvkgijQTGX2008XOu3fUAgacGbwi4k5IUsvQneYtXrqZudS2LrcOu_wmWnqiHX99O-5sIhrg/s320/DSCF0893.JPG&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;After Edit&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;br /&gt;
&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto; text-align: center;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgJUCw4CqBFzB31H5xpZDYmJalG0yGUDSXZjmcJwkONXXmuDlxzyoRQaS056dFRpzP5dSdYCaJ-ndjkVyPbJ2HSk4ZTcgp1V4HUyGy-VbOgyX81EGcEnZkST0OGsSpfI9xw_yQZZ509jA/s1600/DSCF1741.JPG&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;240&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgJUCw4CqBFzB31H5xpZDYmJalG0yGUDSXZjmcJwkONXXmuDlxzyoRQaS056dFRpzP5dSdYCaJ-ndjkVyPbJ2HSk4ZTcgp1V4HUyGy-VbOgyX81EGcEnZkST0OGsSpfI9xw_yQZZ509jA/s320/DSCF1741.JPG&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;Before Edit&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;br /&gt;&lt;/div&gt;
</description><link>http://computerchirping.blogspot.com/2017/01/gimp-colour-manipulation.html</link><author>noreply@blogger.com (Unknown)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEivQ_N-q0Y3-DBl2fUjpu5P5Zbh9S0dqHmLHwbgJ6mM5cR399PJZPVUqxuDi_83qz6ar7bvkgijQTGX2008XOu3fUAgacGbwi4k5IUsvQneYtXrqZudS2LrcOu_wmWnqiHX99O-5sIhrg/s72-c/DSCF0893.JPG" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4902654608097202933.post-8766645154006775770</guid><pubDate>Mon, 26 Dec 2016 02:22:00 +0000</pubDate><atom:updated>2016-12-26T10:22:15.500+08:00</atom:updated><title>GIMP - input image inside TEXT</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiMFdnCejIpKanbtVCoY4yyiqfDN8e09GaJ6untj5abLLxioVGOl_Dtte9-G9FYdS5pn6pS3pJjDfdQf5g78Sg78_iy4TNzPA07jqSRR2nTbEbWtEztI7reIV92XaAGVWwgGB6KJfTNjg/s1600/IMAGE.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;86&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiMFdnCejIpKanbtVCoY4yyiqfDN8e09GaJ6untj5abLLxioVGOl_Dtte9-G9FYdS5pn6pS3pJjDfdQf5g78Sg78_iy4TNzPA07jqSRR2nTbEbWtEztI7reIV92XaAGVWwgGB6KJfTNjg/s320/IMAGE.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
Example 1.&lt;/div&gt;
</description><link>http://computerchirping.blogspot.com/2016/12/gimp-input-image-inside-text.html</link><author>noreply@blogger.com (Unknown)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiMFdnCejIpKanbtVCoY4yyiqfDN8e09GaJ6untj5abLLxioVGOl_Dtte9-G9FYdS5pn6pS3pJjDfdQf5g78Sg78_iy4TNzPA07jqSRR2nTbEbWtEztI7reIV92XaAGVWwgGB6KJfTNjg/s72-c/IMAGE.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4902654608097202933.post-3191541154875057841</guid><pubDate>Fri, 02 Dec 2016 20:04:00 +0000</pubDate><atom:updated>2016-12-03T04:04:50.457+08:00</atom:updated><title>The History of Laptop Computers</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
It is a little hard to determine which was the first portable or 
laptop computer since the earliest portable computers to arrive did not 
look anything like the book-sized folding laptops that we are familiar 
with today. However, they were both portable and can sit on a person&#39;s 
lap and did eventually lead to the development of notebook style 
laptops.&lt;br /&gt;
With that in mind, I have outlined several potential 
firsts below and how each might qualify for the honor. Many of the 
off-site links provided below include excellent photos of the computers 
so that you should be able to see the progression in design.&lt;br /&gt;
&lt;strong&gt;&lt;br /&gt;&lt;/strong&gt;
&lt;strong&gt;&lt;br /&gt;&lt;/strong&gt;
&lt;strong&gt;The First Laptop? Maybe&lt;/strong&gt;&lt;br /&gt;
The
 Grid Compass was designed in 1979 by a Briton named William Moggridge 
for Grid Systems Corporation. It was one-fifth the weight of any model 
equivalent in performance and was used by NASA as part of the the space shuttle program in the early 1980&#39;s. As far as technical specs, it featured a 340K byte bubble memory lap-top computer system with a die-cast magnesium case and folding electroluminescent graphics display screen.&lt;/div&gt;
</description><link>http://computerchirping.blogspot.com/2016/12/the-history-of-laptop-computers.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4902654608097202933.post-6003259552589040836</guid><pubDate>Sat, 26 Nov 2016 16:54:00 +0000</pubDate><atom:updated>2016-11-27T00:54:47.085+08:00</atom:updated><title>Microsoft is working on a new design language for Windows 10 codenamed Project NEON</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
Microsoft has made several adjustments to its design language over the 
last few years, starting with Windows 8 and evolving into what we now 
know as &lt;a href=&quot;http://www.windowscentral.com/whats-new-microsoft-design-language-2-windows10&quot;&gt;&quot;Microsoft Design Language 2&quot;&lt;/a&gt; or MDL2 in &lt;a href=&quot;http://www.windowscentral.com/windows-10&quot;&gt;Windows 10&lt;/a&gt;.
 With MDL2 being the current design language used throughout Windows 10,
 Microsoft has plans to begin using a much more streamlined design 
language with Redstone 3, codenamed Project NEON.&lt;br /&gt;
&lt;br /&gt;
&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;br /&gt;
&lt;h2&gt;
A Metro 2.0?&lt;/h2&gt;
Cassim Ketfi &lt;a href=&quot;http://www.numerama.com/tech/212129-en-2017-microsoft-va-retravailler-toute-la-charte-graphique-de-windows.html&quot;&gt;at &lt;em&gt;Numerama.com&lt;/em&gt;&lt;/a&gt; confirms our information and has heard Project NEON called &quot;basically Metro 2&quot;. That designation refers to &lt;a href=&quot;http://www.windowscentral.com/origin-metro-ui-design-language&quot;&gt;the first Metro design language&lt;/a&gt; (née Modern) that harkens to Windows Media Center up through Windows Phone 7 and Windows 8.&lt;br /&gt;


&lt;div class=&quot;caption&quot;&gt;
&lt;img alt=&quot;&quot; class=&quot;image-large aligncenter&quot; height=&quot;485&quot; src=&quot;https://www.windowscentral.com/sites/wpcentral.com/files/styles/larger/public/field/image/2013/04/Metro%20Design%20Language%20Wallpaper.png?itok=acNOqI2k&quot; width=&quot;800&quot; /&gt; Microsoft&#39;s Metro was a strict codified theory about modern design language&lt;/div&gt;
Metro was the defining look of the Windows Phone OS with strict 
principles and guidelines. It also kicked off the design movement of 
flat, chrome-less design focused on simplicity that even iOS and Android
 now mimic.&lt;br /&gt;


Per our sources, Project NEON has been in the works for over a year 
internally at Microsoft. It builds upon the design language introduced 
with Windows 10, with its simple and clean interfaces, but adds some 
much-needed flair to the UI that the current design language just lacks.&lt;br /&gt;


Details are still scarce, but we hear some of the new designs in the 
plans include adding more animations and transitions, with the overall 
goal of making the UI very fluid and &quot;beautiful&quot; compared to the 
current, almost static UI that is MDL2. One source familiar with 
Microsoft&#39;s plans described NEON as &quot;Very fluid, lots of motion and nice
 transitions.&quot;&lt;br /&gt;


Other things we&#39;ve heard include app-elements being able to &quot;escape&quot; 
the borders of a window making for a much more unique experience.&lt;br /&gt;


&lt;div class=&quot;update&quot;&gt;
&lt;strong&gt;Update:&lt;/strong&gt; Some more information about 
NEON reveals that it serves as a bridge between holographic and 
augmented reality (AR) and the desktop environment. It&#39;s a &quot;UI that 
transports across devices&quot; with a UX that maps to the physical world. It
 uses textures, 3D models, lighting and more.&lt;/div&gt;
We&#39;re still digging for more info regarding what other new 
improvements are in the works, but from what we&#39;ve gathered so far, 
Microsoft is interested in making the UI in Windows 10 far richer, which
 is excellent news.&lt;br /&gt;


For those who like MDL2, don&#39;t worry, Project NEON intends to build 
upon the current design language rather than replace it entirely. This 
new design language will be a natural evolution to the UI rather than a 
complete redesign like the transition from Windows 8 to Windows 10. 
Developers building apps with MDL2 in mind won&#39;t have their apps look 
out of place when Project NEON arrives, but will, of course, have the 
option to add new design language elements if they wish.&lt;br /&gt;


&lt;img alt=&quot;&quot; class=&quot;image-large aligncenter&quot; height=&quot;450&quot; src=&quot;https://www.windowscentral.com/sites/wpcentral.com/files/styles/larger/public/field/image/2016/11/groovedesign.jpg?itok=1XdgFjz7&quot; width=&quot;800&quot; /&gt;&lt;br /&gt;


Microsoft also wants to clean up the so-called inconsistencies that 
MDL2 possesses. As it currently stands, developers can build apps that 
feature their own context menus, app bars, hamburger menu designs and 
more, causing for some odd inconsistencies throughout the operating 
system. Project NEON aims to clean all this up by providing developers 
with clear and consistent guidelines when designing their apps.&lt;br /&gt;


&lt;h2&gt;
Timeline&lt;/h2&gt;
Internal plans appear to suggest that the bulk of this new design 
language will start showing up with Redstone 3 in the early Fall of 
2017, but Insiders will likely start seeing these new changes a lot 
sooner, as Insiders are supposed to start receiving RS3 builds in 
April-May. There is also a reasonable chance we may see some NEON bits 
begin to appear in Redstone 2 in early 2017.&lt;br /&gt;


Microsoft will continue working on Project NEON throughout Redstone 
3&#39;s development cycle and leading into Redstone 4 in 2018, where 
3rd-party developers will also be able to take advantage of the new 
design language.&lt;br /&gt;


Microsoft has a lot in the pipeline for Windows 10 over the next 18 
months, with Redstone 3 seemingly turning out to be a pretty big update 
for Windows 10, &lt;a href=&quot;http://www.windowscentral.com/windows-10-mobile-get-x86-emulation?utm_medium=slider&amp;amp;utm_campaign=navigation&amp;amp;utm_source=wp&quot;&gt;Windows 10 Mobile&lt;/a&gt; and &lt;a href=&quot;http://www.windowscentral.com/future-xbox-dashboard-new-guide-menu&quot;&gt;Xbox One&lt;/a&gt;.&lt;br /&gt;


Stay tuned at Windows Central for more scoops regarding upcoming releases of Windows 10!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span style=&quot;color: #6aa84f;&quot;&gt;This post i just copy and pase from the original source&amp;nbsp;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;span style=&quot;color: #6aa84f;&quot;&gt;please visit &lt;a href=&quot;http://www.windowscentral.com/new-design-language-windows-10-project-neon&quot; target=&quot;_blank&quot;&gt;HERE &lt;/a&gt;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;/div&gt;
</description><link>http://computerchirping.blogspot.com/2016/11/microsoft-is-working-on-new-design.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4902654608097202933.post-3309240556837399400</guid><pubDate>Sat, 26 Nov 2016 16:11:00 +0000</pubDate><atom:updated>2016-11-27T00:11:27.109+08:00</atom:updated><title>zuckerberg &amp; T-shirtnya</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;header class=&quot;entry-header&quot;&gt;
  &lt;h1 class=&quot;entry-title&quot;&gt;
&lt;br /&gt;&lt;/h1&gt;
&lt;/header&gt;

 
  &lt;span style=&quot;color: red;&quot;&gt;&lt;strong&gt;Siapa tahu?&lt;/strong&gt;&lt;/span&gt;&lt;br /&gt;

t-shirt yang CEO pakai bukan T-shirt bodoh-bodoh kosong jer..&lt;br /&gt;

ada makna di sebalik baju yang dia pakai.tambah pulak selesa, siapa 
tak suka kan? paka t-shirt round neck aje masuk bilik meeting.&lt;br /&gt;

tapi ceo facebook itu printing logo yang sesuai dengannya, pada baju tersebut tertampal logo:&lt;br /&gt;

&lt;strong&gt;&lt;span style=&quot;color: #3366ff;&quot;&gt;1.people&lt;/span&gt;&lt;/strong&gt;&lt;br /&gt;

people yang melambangkan perhubungan setiap manusia,sesama kita 
biarpun dialam maya, dan perhubungan itu tentulah sesuatu yang 
menyeronok kan, kan?&lt;br /&gt;

disamping itu,ada juga yang bertemu jodoh dialam maya, betul bukan? 
tak masa zaman dahulu, hendak cari sorang calon terpaksa meredah ke satu
 negeri ke satu negeri, tu pun belum tentu jumpa lagi, sekarang, 
semuanya di hujung jari sahaja, dari hujung rambut sampai lah ke hujung 
kaki.&lt;br /&gt;

&lt;strong&gt;&lt;span style=&quot;color: #3366ff;&quot;&gt;2.Mention-it&lt;/span&gt;&lt;/strong&gt;&lt;br /&gt;

yang ini tentulah di sebalik foto dan video, perlulah beserta dengan 
caption masing-masing supaya setiap dari kita tahu apa yang ingin 
disampaikan, bukannya foto atau media sahaja, kalau tak, manusia ni suka
 buat cerita sendiri dan di tambah tokok, tambahan pulak facebook 
sekarang sedang fight it misinformation campaign sejak menangnya trump 
sebagai president amerika selepas obama.&lt;br /&gt;

&lt;strong&gt;&lt;span style=&quot;color: #3366ff;&quot;&gt;3.world&lt;/span&gt;&lt;/strong&gt;&lt;br /&gt;

yang ini pula facebook sedang bertungkus lumus menerajui bisnes ini 
dengan menghubungkan seluruh manusia didunia ni dalam satu laman sahaja.&lt;br /&gt;

dan seterusnya menjadikan people-mention it-world kepada satu yang nyata iaitu facebook “everyone connected.&lt;br /&gt;

&lt;img alt=&quot;mark&quot; class=&quot;alignnone size-full wp-image-70&quot; src=&quot;https://blogzwan.files.wordpress.com/2016/11/mark.jpg?w=863&quot; /&gt;&lt;br /&gt;

&lt;span style=&quot;color: lime;&quot;&gt;walaupun kurang cerdik,janji ada facebook, dan korang pandai-pandai la tapis maklumat dalam laman itu.&lt;/span&gt;&lt;/div&gt;
</description><link>http://computerchirping.blogspot.com/2016/11/zuckerberg-t-shirtnya.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4902654608097202933.post-7050022869187177255</guid><pubDate>Tue, 22 Nov 2016 13:35:00 +0000</pubDate><atom:updated>2016-11-22T21:35:03.476+08:00</atom:updated><title>Cyber hackers target ATMs, Europe and Malaysia hit</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div style=&quot;-webkit-appearance: none; -webkit-text-stroke-width: 0px; background-color: white; border-radius: 0px; border: 0px; color: #444444; font-family: Roboto, Arial, Helvetiva, Tahoma, sans-serif; font-size: 16px; font-style: normal; font-variant-caps: normal; font-variant-ligatures: normal; font-weight: normal; letter-spacing: normal; line-height: 1.353em; margin: 0px 0px 20px; orphans: 2; padding: 0px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px;&quot;&gt;
CYBER criminals have remotely attacked cash machines in more than a dozen countries across Europe this year, using malicious software that forces machines to spit out cash, according to Russian cyber security firm Group IB.&lt;/div&gt;
&lt;span id=&quot;innity-in-post&quot; style=&quot;-webkit-appearance: none; -webkit-text-stroke-width: 0px; background-color: white; border-radius: 0px; border: 0px; color: #333333; font-family: Roboto, Arial, Helvetiva, Tahoma, sans-serif; font-size: small; font-style: normal; font-variant-caps: normal; font-variant-ligatures: normal; font-weight: normal; letter-spacing: normal; margin: 0px; orphans: 2; padding: 0px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px;&quot;&gt;&lt;/span&gt;&lt;span style=&quot;-webkit-text-stroke-width: 0px; background-color: white; color: #333333; display: inline !important; float: none; font-family: Roboto, Arial, Helvetiva, Tahoma, sans-serif; font-size: small; font-style: normal; font-variant-caps: normal; font-variant-ligatures: normal; font-weight: normal; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px;&quot;&gt;&lt;/span&gt;&lt;div style=&quot;-webkit-appearance: none; -webkit-text-stroke-width: 0px; background-color: white; border-radius: 0px; border: 0px; color: #444444; font-family: Roboto, Arial, Helvetiva, Tahoma, sans-serif; font-size: 16px; font-style: normal; font-variant-caps: normal; font-variant-ligatures: normal; font-weight: normal; letter-spacing: normal; line-height: 1.353em; margin: 0px 0px 20px; orphans: 2; padding: 0px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px;&quot;&gt;
Diebold Nixdorf and NCR Corp, the world&#39;s two largest ATM makers, said they were aware of the attacks and have been working with customers to mitigate the threat. The newly disclosed heists across Europe follow the hacking of ATMs in Taiwan and Thailand that were widely reported over the summer.&lt;/div&gt;
&lt;div style=&quot;-webkit-appearance: none; -webkit-text-stroke-width: 0px; background-color: white; border-radius: 0px; border: 0px; color: #444444; font-family: Roboto, Arial, Helvetiva, Tahoma, sans-serif; font-size: 16px; font-style: normal; font-variant-caps: normal; font-variant-ligatures: normal; font-weight: normal; letter-spacing: normal; line-height: 1.353em; margin: 0px 0px 20px; orphans: 2; padding: 0px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px;&quot;&gt;
Although cyber criminals have been attacking cash machines for at least five years, the early campaigns mostly involved small numbers of ATMs because hackers needed to have physical access to cash out machines.&lt;/div&gt;
&lt;div style=&quot;-webkit-appearance: none; -webkit-text-stroke-width: 0px; background-color: white; border-radius: 0px; border: 0px; color: #444444; font-family: Roboto, Arial, Helvetiva, Tahoma, sans-serif; font-size: 16px; font-style: normal; font-variant-caps: normal; font-variant-ligatures: normal; font-weight: normal; letter-spacing: normal; line-height: 1.353em; margin: 0px 0px 20px; orphans: 2; padding: 0px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px;&quot;&gt;
The recent heists in Europe and Asia were run from central, remote command centres, enabling criminals to target large numbers of machines in &quot;smash and grab&quot; operations that seek to drain large amounts of cash before banks uncover the hacks.&lt;/div&gt;
&lt;div style=&quot;-webkit-appearance: none; -webkit-text-stroke-width: 0px; background-color: white; border-radius: 0px; border: 0px; color: #444444; font-family: Roboto, Arial, Helvetiva, Tahoma, sans-serif; font-size: 16px; font-style: normal; font-variant-caps: normal; font-variant-ligatures: normal; font-weight: normal; letter-spacing: normal; line-height: 1.353em; margin: 0px 0px 20px; orphans: 2; padding: 0px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px;&quot;&gt;
“They are taking this to the next level in being able to attack a large number of machines at once,” said Nicholas Billett, Diebold Nixdorf’s senior director of core software and ATM Security. “They know they will be caught fairly quickly, so they stage it in such a way that they can get cash from as many ATMs as they can before they get shut down.”&lt;/div&gt;
&lt;div style=&quot;-webkit-appearance: none; -webkit-text-stroke-width: 0px; background-color: white; border-radius: 0px; border: 0px; color: #444444; font-family: Roboto, Arial, Helvetiva, Tahoma, sans-serif; font-size: 16px; font-style: normal; font-variant-caps: normal; font-variant-ligatures: normal; font-weight: normal; letter-spacing: normal; line-height: 1.353em; margin: 0px 0px 20px; orphans: 2; padding: 0px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px;&quot;&gt;
Group IB declined to name banks that were “jackpotted,” a term used to describe forcing ATMs to spit out cash, but said the victims were located in Armenia, Belarus, Bulgaria, Estonia, Georgia, Kyrgyzstan, Moldova, the Netherlands, Poland, Romania, Russia, Spain, Britain and Malaysia.Indeed, Dmitry Volkov, head of threat intelligence with Group IB, told Reuters he expects more heists on ATMs.&lt;/div&gt;
&lt;div style=&quot;-webkit-appearance: none; -webkit-text-stroke-width: 0px; background-color: white; border-radius: 0px; border: 0px; color: #444444; font-family: Roboto, Arial, Helvetiva, Tahoma, sans-serif; font-size: 16px; font-style: normal; font-variant-caps: normal; font-variant-ligatures: normal; font-weight: normal; letter-spacing: normal; line-height: 1.353em; margin: 0px 0px 20px; orphans: 2; padding: 0px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px;&quot;&gt;
&lt;strong style=&quot;-webkit-appearance: none; border-radius: 0px; border: 0px; margin: 0px; padding: 0px;&quot;&gt;MORE HEISTS EXPECTED&lt;/strong&gt;&lt;/div&gt;
&lt;div style=&quot;-webkit-appearance: none; -webkit-text-stroke-width: 0px; background-color: white; border-radius: 0px; border: 0px; color: #444444; font-family: Roboto, Arial, Helvetiva, Tahoma, sans-serif; font-size: 16px; font-style: normal; font-variant-caps: normal; font-variant-ligatures: normal; font-weight: normal; letter-spacing: normal; line-height: 1.353em; margin: 0px 0px 20px; orphans: 2; padding: 0px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px;&quot;&gt;
Hackers have moved from stealing payment card numbers and online banking credentials to more lucrative hacks on bank networks, giving them access not only to ATM machines, but also to electronic payment networks.&lt;/div&gt;
&lt;div style=&quot;-webkit-appearance: none; -webkit-text-stroke-width: 0px; background-color: white; border-radius: 0px; border: 0px; color: #444444; font-family: Roboto, Arial, Helvetiva, Tahoma, sans-serif; font-size: 16px; font-style: normal; font-variant-caps: normal; font-variant-ligatures: normal; font-weight: normal; letter-spacing: normal; line-height: 1.353em; margin: 0px 0px 20px; orphans: 2; padding: 0px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px;&quot;&gt;
A February attack on servers at Bangladesh&#39;s central bank that controlled access to the SWIFT messaging system yielded more than $81 million (64.98 million pounds) in one of the biggest digital heists on record. Russian banks lost over $28 million in a series of wire-fraud cases that were identified earlier this year.&lt;/div&gt;
&lt;div style=&quot;-webkit-appearance: none; -webkit-text-stroke-width: 0px; background-color: white; border-radius: 0px; border: 0px; color: #444444; font-family: Roboto, Arial, Helvetiva, Tahoma, sans-serif; font-size: 16px; font-style: normal; font-variant-caps: normal; font-variant-ligatures: normal; font-weight: normal; letter-spacing: normal; line-height: 1.353em; margin: 0px 0px 20px; orphans: 2; padding: 0px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px;&quot;&gt;
&quot;What we are seeing demonstrated is the new model of organised crime,&quot; said Shane Shook, an independent security consultant who helps banks and governments investigate cyber attacks and reviewed Group IB&#39;s findings.&lt;/div&gt;
&lt;div style=&quot;-webkit-appearance: none; -webkit-text-stroke-width: 0px; background-color: white; border-radius: 0px; border: 0px; color: #444444; font-family: Roboto, Arial, Helvetiva, Tahoma, sans-serif; font-size: 16px; font-style: normal; font-variant-caps: normal; font-variant-ligatures: normal; font-weight: normal; letter-spacing: normal; line-height: 1.353em; margin: 0px 0px 20px; orphans: 2; padding: 0px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px;&quot;&gt;
Diebold Nixdorf and NCR both said they had provided banks with information on how to thwart the new types of attacks.&lt;/div&gt;
&lt;div style=&quot;-webkit-appearance: none; -webkit-text-stroke-width: 0px; background-color: white; border-radius: 0px; border: 0px; color: #444444; font-family: Roboto, Arial, Helvetiva, Tahoma, sans-serif; font-size: 16px; font-style: normal; font-variant-caps: normal; font-variant-ligatures: normal; font-weight: normal; letter-spacing: normal; line-height: 1.353em; margin: 0px 0px 20px; orphans: 2; padding: 0px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px;&quot;&gt;
&quot;We have been working actively with customers, including those who have been impacted, as well as developing proactive security solutions and strategies to help prevent and minimize the impact of these attacks,&quot; said Owen Wild, NCR&#39;s global marketing director for enterprise fraud and security.&lt;/div&gt;
&lt;div style=&quot;-webkit-appearance: none; -webkit-text-stroke-width: 0px; background-color: white; border-radius: 0px; border: 0px; color: #444444; font-family: Roboto, Arial, Helvetiva, Tahoma, sans-serif; font-size: 16px; font-style: normal; font-variant-caps: normal; font-variant-ligatures: normal; font-weight: normal; letter-spacing: normal; line-height: 1.353em; margin: 0px 0px 20px; orphans: 2; padding: 0px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px;&quot;&gt;
Disclosure of the campaign follows two ATM hacks in July: $2.5 million was stolen from Taiwan&#39;s First Bank and $350,000 from Thailand&#39;s state-run Government Savings Bank.&lt;/div&gt;
&lt;div style=&quot;-webkit-appearance: none; -webkit-text-stroke-width: 0px; background-color: white; border-radius: 0px; border: 0px; color: #444444; font-family: Roboto, Arial, Helvetiva, Tahoma, sans-serif; font-size: 16px; font-style: normal; font-variant-caps: normal; font-variant-ligatures: normal; font-weight: normal; letter-spacing: normal; line-height: 1.353em; margin: 0px 0px 20px; orphans: 2; padding: 0px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px;&quot;&gt;
Hackers remotely infected ATMs at both banks, forcing them to spit out cash that was collected by teams of &quot;money mules,&quot; who authorities say travelled to Asia from Eastern Europe.&lt;/div&gt;
&lt;div style=&quot;-webkit-appearance: none; -webkit-text-stroke-width: 0px; background-color: white; border-radius: 0px; border: 0px; color: #444444; font-family: Roboto, Arial, Helvetiva, Tahoma, sans-serif; font-size: 16px; font-style: normal; font-variant-caps: normal; font-variant-ligatures: normal; font-weight: normal; letter-spacing: normal; line-height: 1.353em; margin: 0px 0px 20px; orphans: 2; padding: 0px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px;&quot;&gt;
&lt;strong style=&quot;-webkit-appearance: none; border-radius: 0px; border: 0px; margin: 0px; padding: 0px;&quot;&gt;ONE CRIMINAL GROUP?&lt;/strong&gt;&lt;/div&gt;
&lt;div style=&quot;-webkit-appearance: none; -webkit-text-stroke-width: 0px; background-color: white; border-radius: 0px; border: 0px; color: #444444; font-family: Roboto, Arial, Helvetiva, Tahoma, sans-serif; font-size: 16px; font-style: normal; font-variant-caps: normal; font-variant-ligatures: normal; font-weight: normal; letter-spacing: normal; line-height: 1.353em; margin: 0px 0px 20px; orphans: 2; padding: 0px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px;&quot;&gt;
The U.S. Federal Bureau of Investigation earlier this month sent a private alert to American banks, warning them to be on the lookout for attacks on ATMs following the heists in Taiwan and Thailand, the Wall Street Journal reported on Monday.&lt;/div&gt;
&lt;div style=&quot;-webkit-appearance: none; -webkit-text-stroke-width: 0px; background-color: white; border-radius: 0px; border: 0px; color: #444444; font-family: Roboto, Arial, Helvetiva, Tahoma, sans-serif; font-size: 16px; font-style: normal; font-variant-caps: normal; font-variant-ligatures: normal; font-weight: normal; letter-spacing: normal; line-height: 1.353em; margin: 0px 0px 20px; orphans: 2; padding: 0px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px;&quot;&gt;
An FBI spokesman declined to comment on the attacks in Europe.&lt;/div&gt;
&lt;div style=&quot;-webkit-appearance: none; -webkit-text-stroke-width: 0px; background-color: white; border-radius: 0px; border: 0px; color: #444444; font-family: Roboto, Arial, Helvetiva, Tahoma, sans-serif; font-size: 16px; font-style: normal; font-variant-caps: normal; font-variant-ligatures: normal; font-weight: normal; letter-spacing: normal; line-height: 1.353em; margin: 0px 0px 20px; orphans: 2; padding: 0px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px;&quot;&gt;
Group IB released a report describing its findings late on Monday, saying it believed the attacks across Europe were conducted by&lt;a href=&quot;http://www.group-ib.com/cobalt.html&quot; style=&quot;-webkit-appearance: none; border-radius: 0px; border: 0px; box-sizing: border-box; color: #107fc9; cursor: pointer; margin: 0px; padding: 0px; text-decoration: none;&quot; target=&quot;_blank&quot;&gt;&lt;span class=&quot;Apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;a single criminal group which it dubbed Cobalt&lt;/a&gt;.&lt;/div&gt;
&lt;div style=&quot;-webkit-appearance: none; -webkit-text-stroke-width: 0px; background-color: white; border-radius: 0px; border: 0px; color: #444444; font-family: Roboto, Arial, Helvetiva, Tahoma, sans-serif; font-size: 16px; font-style: normal; font-variant-caps: normal; font-variant-ligatures: normal; font-weight: normal; letter-spacing: normal; line-height: 1.353em; margin: 0px 0px 20px; orphans: 2; padding: 0px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px;&quot;&gt;
It named them after a security-testing tool known as Cobalt Strike, which the perpetrators used in the heists to help them move from computers in the bank network that were infected with tainted emails to specialised servers that control ATMs.&lt;/div&gt;
&lt;div style=&quot;-webkit-appearance: none; -webkit-text-stroke-width: 0px; background-color: white; border-radius: 0px; border: 0px; color: #444444; font-family: Roboto, Arial, Helvetiva, Tahoma, sans-serif; font-size: 16px; font-style: normal; font-variant-caps: normal; font-variant-ligatures: normal; font-weight: normal; letter-spacing: normal; line-height: 1.353em; margin: 0px 0px 20px; orphans: 2; padding: 0px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px;&quot;&gt;
Group IB believes that Cobalt is linked to a well-known cyber crime gang dubbed Buhtrap, which stole 1.8 billion roubles (22.46 million pounds) from Russian banks from August 2015 to January 2016, because the two groups use similar tools and techniques.&lt;/div&gt;
&lt;div style=&quot;-webkit-appearance: none; -webkit-text-stroke-width: 0px; background-color: white; border-radius: 0px; border: 0px; color: #444444; font-family: Roboto, Arial, Helvetiva, Tahoma, sans-serif; font-size: 16px; font-style: normal; font-variant-caps: normal; font-variant-ligatures: normal; font-weight: normal; letter-spacing: normal; line-height: 1.353em; margin: 0px 0px 20px; orphans: 2; padding: 0px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px;&quot;&gt;
Buhtrap stole money through fraudulent wire transfers, not ATM jackpotting.&lt;/div&gt;
&lt;div style=&quot;-webkit-appearance: none; -webkit-text-stroke-width: 0px; background-color: white; border-radius: 0px; border: 0px; color: #444444; font-family: Roboto, Arial, Helvetiva, Tahoma, sans-serif; font-size: 16px; font-style: normal; font-variant-caps: normal; font-variant-ligatures: normal; font-weight: normal; letter-spacing: normal; line-height: 1.353em; margin: 0px 0px 20px; orphans: 2; padding: 0px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px;&quot;&gt;
The ATM Security Association declined to comment on Group IB&#39;s findings.&lt;/div&gt;
&lt;div style=&quot;-webkit-appearance: none; -webkit-text-stroke-width: 0px; background-color: white; border-radius: 0px; border: 0px; color: #444444; font-family: Roboto, Arial, Helvetiva, Tahoma, sans-serif; font-size: 16px; font-style: normal; font-variant-caps: normal; font-variant-ligatures: normal; font-weight: normal; letter-spacing: normal; line-height: 1.353em; margin: 0px 0px 20px; orphans: 2; padding: 0px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px;&quot;&gt;
Members of the group, which works to improve ATM security, include ATM maker Diebold Nixdorf as well as banks ABN Amro, Bank of America Corp, Royal Bank of Scotland Group and Wells Fargo &amp;amp; Co.&amp;nbsp;&lt;/div&gt;
&lt;div style=&quot;-webkit-appearance: none; -webkit-text-stroke-width: 0px; background-color: white; border-radius: 0px; border: 0px; color: #444444; font-family: Roboto, Arial, Helvetiva, Tahoma, sans-serif; font-size: 16px; font-style: normal; font-variant-caps: normal; font-variant-ligatures: normal; font-weight: normal; letter-spacing: normal; line-height: 1.353em; margin: 0px 0px 20px; orphans: 2; padding: 0px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px;&quot;&gt;
Representatives of Europol, which coordinates investigations of cyber crimes across Europe, had no immediate comment. - Reuters&lt;/div&gt;
&lt;/div&gt;
</description><link>http://computerchirping.blogspot.com/2016/11/cyber-hackers-target-atms-europe-and.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4902654608097202933.post-4812111827432646880</guid><pubDate>Sun, 16 Oct 2016 15:58:00 +0000</pubDate><atom:updated>2016-10-16T23:58:00.436+08:00</atom:updated><title>Next Windows 10 Update To Cut Down On Bloatware</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;h2&gt;
&lt;strong&gt;Latest Preview build allows users to uninstall some of the default Windows 10 apps.&lt;/strong&gt;&lt;/h2&gt;
For many Windows 10 users, some of the system apps that come 
preinstalled with Windows 10 by default, qualify as little more than 
Microsoft’s own unique brand of irremovable bloatware.&lt;br /&gt;
&lt;br /&gt;
Trying to remove some of these apps, originally involved power users 
having to run Powershell commands to remove the apps they didn’t want. 
Fortunately, after a while, thanks to programs like &lt;a href=&quot;http://filehippo.com/download_geekuninstaller/&quot; target=&quot;_blank&quot;&gt;Geek Uninstaller&lt;/a&gt;, everyone else could uninstall the sometime cumbersome apps as well.&lt;br /&gt;

But now the latest Windows 10 preview (14936) that is currently out 
for testing, has given an uninstall option for some of these apps. 
Before, the uninstall button was an annoyingly untouchable greyed out 
icon. Users have thankfully been given some more control of what they do
 and don’t want to have installed on their computers when it comes to 
Windows 10.&lt;br /&gt;

According to&amp;nbsp;the &lt;a href=&quot;http://www.ghacks.net/2016/10/06/windows-10-14936-uninstall-system-apps/?&quot; target=&quot;_blank&quot;&gt;Ghacks&lt;/a&gt;
 website, who seem to have noticed this development first,&amp;nbsp; Microsoft 
are giving users the ability to uninstall five default apps, namely 
Mail, Calendar, Calculator, Groove Music, Maps, and Weather.&lt;br /&gt;

Some apps, such as Cortana, for instance can still be disabled, but 
it would appear that Microsoft won’t be giving its customers the 
uninstall option for that anytime soon, if ever.&lt;br /&gt;

Ordinary users of Windows 10 on the current stable live version will 
have to wait until Preview 14936 is pushed out to everyone before they 
are given the choice whether they wish to get rid of one or all of the 
five Microsoft apps that can be uninstalled.&lt;br /&gt;

Curiously,&amp;nbsp; Microsoft never provided a reason as to why certain apps 
couldn’t be removed from Windows 10 before build 14936, but some &lt;a href=&quot;http://www.techradar.com/news/software/operating-systems/the-next-windows-10-update-might-cut-down-on-bloatware-1330064&quot; target=&quot;_blank&quot;&gt;websites&lt;/a&gt;
 have postulated the theory that some Windows Apps are essential parts 
of the Operating System’s core functionality, and as such essential for 
Windows 10 to run.&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;http://news.filehippo.com/2016/10/next-windows-10-update-to-cut-down-on-bloatware/&quot; target=&quot;_blank&quot;&gt;original post here &lt;/a&gt;&lt;br /&gt;
&lt;/div&gt;
</description><link>http://computerchirping.blogspot.com/2016/10/next-windows-10-update-to-cut-down-on.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4902654608097202933.post-5759180002365289736</guid><pubDate>Fri, 07 Oct 2016 16:07:00 +0000</pubDate><atom:updated>2016-10-08T00:07:10.414+08:00</atom:updated><title>games </title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
http://shopap.lenovo.com/my/en/gaming/?ipromoID=my_pub_espot3_gaming&amp;amp;&lt;/div&gt;
</description><link>http://computerchirping.blogspot.com/2016/10/games.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4902654608097202933.post-7083816693407227886</guid><pubDate>Sat, 05 Dec 2015 18:13:00 +0000</pubDate><atom:updated>2015-12-06T02:13:49.428+08:00</atom:updated><title>BREIN Does a Deal With Kickass and Pirate Bay Uploader</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div class=&quot;entry-summary&quot;&gt;
&lt;div class=&quot;entry-lead&quot;&gt;
Anti-piracy group BREIN says that after 
identifying an uploader of around 5,000 torrents on sites including 
KickassTorrents and The Pirate Bay, it has reached settlement with the 
individual. In response the man has published a warning to others, 
noting that while uploading may seem harmless, it&#39;s actually a damaging 
and expensive hobby.&lt;/div&gt;
&lt;/div&gt;
&lt;br /&gt;
In August 2015, BREIN &lt;a href=&quot;https://torrentfreak.com/torrent-site-uploaders-agree-to-snitch-on-colleagues-150816/&quot;&gt;announced&lt;/a&gt;
 that it had reached a private agreement with members of ‘Dutch Release 
Team’ (DRT), a group that had uploaded movies to torrent sites including
 The Pirate Bay and KickassTorrents.&lt;br /&gt;

The deal entailed them deleting their files from Kickass, paying a 
cash settlement, and informing on remaining members of the group.&lt;br /&gt;

Now BREIN has announced a new development which should herald the 
final nail in the coffin for another release group. According to the 
anti-piracy outfit it first identified and then settled with the last 
active member of DMT (Dutch Movie Theater).&lt;br /&gt;

According to BREIN the man uploaded mostly movies and eBooks on an 
almost daily basis to sites including KickassTorrents and The Pirate 
Bay. Revealing his alias as ‘ipod020′, BREIN says that overall around 
5,000 torrents were uploaded.&lt;br /&gt;

On Kickass, where the man used to have an active account, all 
torrents have been deleted. In their place sits a warning message 
(Dutch, translated by TF) to other would-be releasers.&lt;br /&gt;

“Illegal uploading and downloading costs a lot of money to the film 
industry, but also to me. Do not do it. I had to settle with BREIN for 
thousands of euros,” the &lt;a href=&quot;https://kat.cr/user/ipod020/&quot;&gt;message&lt;/a&gt; reads.&lt;br /&gt;
&lt;br /&gt;
SOURCE &lt;a href=&quot;https://torrentfreak.com/brein-does-a-deal-with-kickass-and-pirate-bay-uploader-151205/&quot; target=&quot;_blank&quot;&gt;HERE &lt;/a&gt;&lt;/div&gt;
</description><link>http://computerchirping.blogspot.com/2015/12/brein-does-deal-with-kickass-and-pirate.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4902654608097202933.post-9090091598495500607</guid><pubDate>Tue, 26 May 2015 23:14:00 +0000</pubDate><atom:updated>2015-05-27T07:14:37.635+08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">pirate bay</category><title>The Pirate Bay Suffers Downtime</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div class=&quot;entry-summary&quot;&gt;
&lt;div class=&quot;entry-lead&quot;&gt;
The Pirate Bay is down at the moment, causing a 
mild panic among many BitTorrent users. While some fear the worst, the 
site probably won&#39;t be offline for very long.&lt;/div&gt;
&lt;/div&gt;
&lt;img alt=&quot;pirate bay&quot; class=&quot;alignright size-full wp-image-53470&quot; height=&quot;207&quot; src=&quot;https://torrentfreak.com/images/pirate-bay.jpg&quot; width=&quot;200&quot; /&gt;&lt;br /&gt;
The Pirate Bay has become unreachable since a few hours.&lt;br /&gt;

It’s currently not clear what’s causing the problems. There might be a
 hardware issue, hosting problem or a software glitch, issues that have 
occurred many times in the site’s history.&lt;br /&gt;

What we do know is that the site’s domain names are not the culprit.&lt;br /&gt;

The Pirate Bay currently displays a CloudFlare error message across &lt;a href=&quot;http://torrentfreak.com/pirate-bay-moves-to-gs-la-vg-am-mn-and-gd-domains-150519/&quot;&gt;all domain names&lt;/a&gt;, suggesting that TPB’s servers are unresponsive.&lt;br /&gt;
&lt;br /&gt;
source : torrent freak &lt;/div&gt;
</description><link>http://computerchirping.blogspot.com/2015/05/the-pirate-bay-suffers-downtime.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4902654608097202933.post-1047195453070781597</guid><pubDate>Wed, 17 Dec 2014 15:53:00 +0000</pubDate><atom:updated>2014-12-17T23:53:40.888+08:00</atom:updated><title>London air traffic control computer failure resolved, flights resume</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;h2 class=&quot;eza-summary&quot; id=&quot;summary&quot; itemprop=&quot;description&quot;&gt;
London&#39;s 
airspace was briefly closed Friday afternoon due to what authorities 
said was a computer failure at one of Britain&#39;s two air traffic control 
centers.&amp;nbsp;The shutdown came at the start of the weekend in a sprawling 
city with five commercial airports, including London Heathrow — Europe&#39;s
 busiest.&lt;/h2&gt;
&lt;/div&gt;
</description><link>http://computerchirping.blogspot.com/2014/12/london-air-traffic-control-computer.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4902654608097202933.post-1269122662810771177</guid><pubDate>Fri, 12 Dec 2014 19:49:00 +0000</pubDate><atom:updated>2014-12-13T03:49:17.428+08:00</atom:updated><title>Computer Programming and Animation Competition</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div class=&quot;twelve column&quot; id=&quot;page-content&quot;&gt;
&lt;dt&gt;Details:&lt;/dt&gt;
&lt;dd&gt;
        &lt;h3&gt;
Joint Computer Programming and Animation Competition&lt;/h3&gt;
Featuring students from the Intro to Programming and Logic Course and the REaCH Robotics/Animation Club.&lt;br /&gt;

Three awards will be given out: one for overall best animation, one 
for best high school animation, and one for best college level 
animation.&lt;br /&gt;

Spectators are welcome. Please come out to see the great work of theses students and to lend your support to them.&lt;br /&gt;

    &lt;/dd&gt;
&lt;dl&gt;
&lt;dt&gt;When:&lt;/dt&gt;
&lt;dd&gt;
            December 18, 2014
        &lt;/dd&gt;
&lt;dt&gt;Time:&lt;/dt&gt;
&lt;dd&gt;12:00 PM - 01:00 PM&lt;/dd&gt;
&lt;dt&gt;Category:&lt;/dt&gt;
&lt;dd&gt;    
    
    
            
        &lt;span class=&quot;label red&quot;&gt;Campus Events&lt;/span&gt;
        &lt;/dd&gt;
&lt;dt&gt;Location:&lt;/dt&gt;
&lt;dd&gt;
            Intro to Computers Lab, Business Sciences
        &lt;/dd&gt;
&lt;dt&gt;Contact:&lt;/dt&gt;
&lt;dd&gt;
            Dana Anderson 
                &lt;br /&gt;&lt;a href=&quot;tel:828-395-1523&quot;&gt;828-395-1523&lt;/a&gt;
                &lt;br /&gt;&lt;a href=&quot;mailto:danderson@isothermal.edu&quot;&gt;danderson@isothermal.edu&lt;/a&gt;
            
    &lt;/dd&gt;&lt;/dl&gt;
&lt;/div&gt;
&lt;/div&gt;
</description><link>http://computerchirping.blogspot.com/2014/12/computer-programming-and-animation.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4902654608097202933.post-3956433210277929653</guid><pubDate>Mon, 06 Feb 2012 14:00:00 +0000</pubDate><atom:updated>2012-02-06T22:00:45.815+08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">grow up</category><category domain="http://www.blogger.com/atom/ns#">linux operation</category><category domain="http://www.blogger.com/atom/ns#">open source</category><category domain="http://www.blogger.com/atom/ns#">u buntu</category><title>Linux operation</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto; text-align: center;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgKIxikc5qXzCHweIWuERk9Wpp-FsPI7yO9ELb-PY0lmV8lyADlrjvqNv8_wOldc3eeX9DCNPer3v50Nn9LlyG9sLSkBeTsr8Ts8puvqKeDYsAafn9Okhcz9GPR2kN6gaz9gKO8VkRC-Q/s1600/linux.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;320&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgKIxikc5qXzCHweIWuERk9Wpp-FsPI7yO9ELb-PY0lmV8lyADlrjvqNv8_wOldc3eeX9DCNPer3v50Nn9LlyG9sLSkBeTsr8Ts8puvqKeDYsAafn9Okhcz9GPR2kN6gaz9gKO8VkRC-Q/s320/linux.jpg&quot; width=&quot;138&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;once click for large image&lt;/td&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;&lt;br /&gt;
&lt;/td&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;&lt;br /&gt;
&lt;/td&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;&lt;br /&gt;
&lt;/td&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;&lt;br /&gt;
&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;&lt;br /&gt;
more info @ http://en.wikipedia.org/wiki/Linux&lt;/div&gt;</description><link>http://computerchirping.blogspot.com/2012/02/linux-operation.html</link><author>noreply@blogger.com (Unknown)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgKIxikc5qXzCHweIWuERk9Wpp-FsPI7yO9ELb-PY0lmV8lyADlrjvqNv8_wOldc3eeX9DCNPer3v50Nn9LlyG9sLSkBeTsr8Ts8puvqKeDYsAafn9Okhcz9GPR2kN6gaz9gKO8VkRC-Q/s72-c/linux.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4902654608097202933.post-5394398254477297157</guid><pubDate>Fri, 03 Sep 2010 14:19:00 +0000</pubDate><atom:updated>2010-09-03T22:19:05.576+08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">chrome OS</category><category domain="http://www.blogger.com/atom/ns#">computer hardware by google</category><category domain="http://www.blogger.com/atom/ns#">google</category><category domain="http://www.blogger.com/atom/ns#">netbook</category><category domain="http://www.blogger.com/atom/ns#">notebook google</category><category domain="http://www.blogger.com/atom/ns#">speedbook</category><title>Google Files for Trademark On SpeedBook Active Computer Hardware</title><description>&lt;div style=&quot;background-color: white; color: purple;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;b&gt;Is Google working on a Netbook for Chrome OS?&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;&lt;span&gt;&lt;span style=&quot;background-color: #f3f3f3;&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
Google is targeting netbooks and notebooks with its new, lightweight operating system, Chrome OS. However, it seems the company could soon venture into the hardware side of things, as a recent trademark filed by the search giant indicates the company&#39;s interest in the term &#39;speedbook&#39;.&lt;br /&gt;
&lt;br /&gt;
BNet reports that Google last week filed an application with the U.S. Patent and Trademark Application Office for a trademark on the name &#39;Speedbook&#39; for computer hardware. Editor Erik Sherman points out that through you can patent a product without having to actually produce it, a trademark application must be linked to a product or service that is launching in the reasonably near future.&lt;br /&gt;
&lt;br /&gt;
The trademark application describes &#39;Speedbook&#39; as &quot;active computer hardware&quot; so it would certainly seem like Google has plans for a netbook, notebook or possibly even a tablet. Though Google has stated on previous occasions that it will not be releasing hardware to go along with Chrome OS, preferring instead to work with partners, the company said something similar about Android before the release of the Nexus One.&lt;br /&gt;
&lt;br /&gt;
Do you think its likely Google will come out with a Google-brand notebook to go along with Chrome OS? Let us know in the comments below!</description><link>http://computerchirping.blogspot.com/2010/09/google-files-for-trademark-on-speedbook.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4902654608097202933.post-4774018264016909917</guid><pubDate>Tue, 24 Aug 2010 15:55:00 +0000</pubDate><atom:updated>2010-08-24T23:55:20.450+08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">all about computer</category><category domain="http://www.blogger.com/atom/ns#">amazon uk</category><category domain="http://www.blogger.com/atom/ns#">facebook</category><category domain="http://www.blogger.com/atom/ns#">history</category><category domain="http://www.blogger.com/atom/ns#">History of computing</category><category domain="http://www.blogger.com/atom/ns#">Internet</category><category domain="http://www.blogger.com/atom/ns#">mark</category><category domain="http://www.blogger.com/atom/ns#">tweeter</category><category domain="http://www.blogger.com/atom/ns#">youtube</category><title>History of the Internet</title><description>&lt;a href=&quot;http://www.onlinemba.com/blog/internet-history&quot;&gt;&lt;img src=&quot;http://onlinemba.com.s3.amazonaws.com/internet-history.jpg&quot; alt=&quot;MBA Online&quot; width=&quot;500&quot;  border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;Via: &lt;a href=&quot;http://History/&quot;&gt;MBA Online&lt;/a&gt;</description><link>http://computerchirping.blogspot.com/2010/08/history-of-internet.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4902654608097202933.post-4602744211857769539</guid><pubDate>Mon, 23 Aug 2010 15:44:00 +0000</pubDate><atom:updated>2010-08-23T23:44:51.559+08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Acer</category><category domain="http://www.blogger.com/atom/ns#">all about computer</category><category domain="http://www.blogger.com/atom/ns#">antivirus software</category><category domain="http://www.blogger.com/atom/ns#">blog</category><category domain="http://www.blogger.com/atom/ns#">computer slow</category><category domain="http://www.blogger.com/atom/ns#">hackers</category><category domain="http://www.blogger.com/atom/ns#">solving problem</category><category domain="http://www.blogger.com/atom/ns#">spyware</category><category domain="http://www.blogger.com/atom/ns#">virus 2010</category><title>Could The Way Your Computer Look Be What Is Slowing It Down?</title><description>&lt;div class=&quot;entry&quot;&gt;                Could it really be true that your computers look might  be the real reason why it runs slow? Yes, and no. Its part of the  reason you have a &lt;span class=&quot;IL_AD&quot; id=&quot;IL_AD1&quot;&gt;slow computer&lt;/span&gt;, well actually it’s a small part of the reason your &lt;span class=&quot;IL_AD&quot; id=&quot;IL_AD3&quot;&gt;computer runs slow&lt;/span&gt;. Your computer runs slow  because of all of the junk that builds up on it, but Windows has tuned  its operating system to look good so that it will have user appeal.&lt;br /&gt;
This holds especially true if you are using Windows Vista since Vista  has a lot of unnecessary things that are running in the back ground  that are designed to just make the computer look good. Here is how to  tune down your computers looks to make it run faster:&lt;br /&gt;
If you are using Windows XP, click Start, right click on My Computer  and select Properties. Select the Advanced tab and where it says “&lt;span class=&quot;IL_AD&quot; id=&quot;IL_AD4&quot;&gt;Performance&lt;/span&gt;”, click on the Settings button. In the Visual Effects tab select Adjust For Best Performance.  What you are doing here is making Windows XP look more like Windows 98.  If you would like your computer to look somewhat good and still be  tuned for performance, select the &lt;span class=&quot;IL_AD&quot; id=&quot;IL_AD2&quot;&gt;Custom box&lt;/span&gt;,  make sure that all of the other boxes are checked off, scroll down to  the bottom and select “Use Visual Styles On Windows And Buttons”. Now  select Apply and then OK.&lt;br /&gt;
If you are running Windows Vista, click Start, right click on  Computer and select Properties. On the left hand side, select Advanced  System Settings. In the advanced tab where it says Performance, click on the Settings button. Now in the Visual Effects tab, select Adjust For Best Performance.  This will make Vista look more like Windows 98. If you would like to  keep the way that Vista looks, and still have your computers look tuned  for performance, just select the Custom box, make sure that everything  is checked off and then select the box that says “Use Visual Styles On  Windows And Buttons”. Click Apply and then OK.&lt;br /&gt;
The amount of a performance boost on your slow computer will vary  greatly depending on your computers limitations, but I have used this  tune up for many different computers and most of them saw a noticeable  difference. Surprisingly most computer users never really take the time  to tune their computers looks for performance and this can be one of the main causes of a slow computer.  For the most part there really isn’t any loss at all to the person  using the computer and most people will do just about anything to make  their slow computer a bit faster, so feel free to give it a try.&lt;br /&gt;
Want to find out more about &lt;a href=&quot;http://registrycleanersalternative.com/&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;Registry Cleaners&lt;/a&gt;, then visit Gary Foster’s site on how to choose the best &lt;a href=&quot;http://registrycleanersalternative.com/3%20Quick%20Tips%20To%20Speed%20Up%20Your%20Slow%20Computer.htm&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;Registry Cleaners Reviewed&lt;/a&gt; for your needs.&lt;br /&gt;
&lt;/div&gt;</description><link>http://computerchirping.blogspot.com/2010/08/could-way-your-computer-look-be-what-is.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4902654608097202933.post-659185778754139620</guid><pubDate>Sun, 15 Aug 2010 07:25:00 +0000</pubDate><atom:updated>2010-08-15T15:25:42.312+08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">all about computer</category><category domain="http://www.blogger.com/atom/ns#">clear search</category><category domain="http://www.blogger.com/atom/ns#">how to</category><category domain="http://www.blogger.com/atom/ns#">Microsoft</category><title>How to Clear Searches From a Computer</title><description>&lt;div style=&quot;background-color: white; color: blue;&quot;&gt;After you conduct a desktop search for files, the computer still saves  it. It is possible to erase the searches, depending on the operating  system.&amp;nbsp;&lt;/div&gt;&lt;div style=&quot;background-color: white; color: blue;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;PCs (Personal Computers) and laptop computers save and store all the  searches you conduct on the desktop and the Internet for your  convenience so you can go back to them later for reference. However, if  you share a computer, this does not ensure privacy and may be more of a  hassle. It is possible to delete the desktop and Internet search history  when you are done with it if you do not wish to go back to it. This  method varies depending on the type of operating system and Internet  search engine you are using.&lt;h3 class=&quot;dynamic&quot; style=&quot;color: magenta;&quot;&gt;Windows XP and Vista Operating Systems &lt;/h3&gt;Select the &quot;Start&quot; tab in the lower-left corner of the screen and click on &quot;Run.&quot; Type in &quot;Regedit&quot; and push the &quot;Enter&quot; key.&lt;br /&gt;
Move the arrow so it is to the side of each folder on the left pane  of the &quot;Registry Editor.&quot; Click on the numbers &quot;5603,&quot; which will be  located on the left side of the &quot;Registry Editor.&quot;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Erase every line that is on the right pane. To delete the  information, press the &quot;backspace&quot; button on the keyboard or highlight  the text and press &quot;Delete.&quot;&lt;br /&gt;
&lt;h3 class=&quot;dynamic&quot;&gt;Windows 7 &lt;/h3&gt;Select the &quot;Start&quot; menu and type in &quot;Run&quot; in the &quot;Search programs and  files&quot; space and press &quot;Enter.&quot; Type &quot;Regedit&quot; in the Run space and  push the &quot;Enter&quot; key.&lt;br /&gt;
Move the side of each folder so it is in the left pane of the &quot;Registry Editor.&quot;&lt;br /&gt;
Select &quot;Word Wheel Query&quot; on the left pane. Select and erase all the words in the right pane with the mouse.&lt;br /&gt;
&lt;b&gt;&lt;strong&gt;Clearing Search History on Internet Explore&lt;/strong&gt;&lt;/b&gt;r&lt;br /&gt;
Select the &quot;Safety&quot; menu and click on &quot;Delete Browsing History.&quot; Check the box that says, &quot;Form Data.&quot; Select the &quot;Delete&quot; menu.&lt;br /&gt;
&lt;h3 class=&quot;dynamic&quot;&gt;Firefox&lt;/h3&gt;Choose the &quot;Tools&quot; menu and click on the &quot;Clear Recent History&quot; tab.  Select the &quot;Details&quot; tab and click on &quot;Form and Search History.&quot; Click  on the time period you want to clear the history from in the drop down  menu. Click on &quot;Clear Now.&quot; Right-click on the search bar in the top  right corner of Firefox and then click on the &quot;Clear Search History.&quot;&lt;br /&gt;
&lt;h3 class=&quot;dynamic&quot;&gt;Google Chrome&lt;/h3&gt;Select the wrench icon in the top right corner of the window. Click  on the &quot;Clear Browsing Data&quot; tab. Check the &quot;Clear saved form Data&quot; box  and choose the time period you wish to clear the history from by using  the drop down menu. Select the &quot;Clear Browsing Data&quot; tab.&lt;br /&gt;
&lt;div style=&quot;background-color: transparent; border: medium none; color: black; overflow: hidden; text-align: left; text-decoration: none;&quot;&gt;&lt;/div&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div style=&quot;background-color: transparent; border: medium none; color: black; overflow: hidden; text-align: left; text-decoration: none;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;background-color: transparent; border: medium none; color: black; overflow: hidden; text-align: left; text-decoration: none;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;</description><link>http://computerchirping.blogspot.com/2010/08/how-to-clear-searches-from-computer.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4902654608097202933.post-4400834372143436159</guid><pubDate>Wed, 05 May 2010 16:55:00 +0000</pubDate><atom:updated>2010-05-06T00:55:11.476+08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">2010 gold cobra</category><category domain="http://www.blogger.com/atom/ns#">gold cobra</category><category domain="http://www.blogger.com/atom/ns#">limp bizkit</category><category domain="http://www.blogger.com/atom/ns#">the new album</category><title>Limp Bizkit _why try lyric</title><description>&lt;div style=&quot;text-align: center;&quot;&gt;oh no guess who&#39;s back, trapped with the flow like a (?)&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;walk with the limp, it&#39;s the pirate pimp&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;on the nightman track with the smack down gold&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;stuck with the psycho (?) hybrid, getting plucked from your island, get that?&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;ya&#39;ll better come quick, better come fast&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;imma drop a match in your gas, boom&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;every hit don&#39;t lie&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;pitch you a fit when your shit don&#39;t fly&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;eat you alive, got that punk&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;spit this fire to the bizkit funk&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;uno, dos, tres in your face&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;catch me a case when you run from the dose&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;with a cut in the clip, one little slip&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;the alligator grip gonna turn you to toast&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;so why try, you gonna die&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;you&#39;re going straight to the gate in the sky&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;with all the hate i relate to the cry&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;one more sucker MC gonna fry&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;why try, you gonna die&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;you&#39;re going straight to the gate in the sky&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;with all the hate i relate to the cry&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;one more sucker MC gonna fry&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;ground through stack it to your feet&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;homies in your corner thought you&#39;re done with the sleep&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;this one ought to do it, so step it on back&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;you&#39;re only seeing stars when you&#39;re knocked down flat&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;imma tell you somethin you prolly never knew&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;tangle with the lion you gonna end up in the zoo&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;check out all your crew, lookin in my cage&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;it&#39;s feedin time playa imma eat you like the plague&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;time are gettin tough&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;but i ain&#39;t had enough&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;this heavy metal beatin on your brain is gonna crush home what a rush&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;like a million women, (?)&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;maybe i&#39;m explicit&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;but man it&#39;s just the bizkit&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;havin me some fun with your dumb little chicklets&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;you know who you are&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;you insecure gorillas&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;the underdog (?) navigate your (?)&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;so why try, you gonna die&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;you&#39;re going straight to the gate in the sky&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;with all the hate i relate to the cry&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;one more sucker MC gonna fry&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;why try, you gonna die&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;you&#39;re going straight to the gate in the sky&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;with all the hate i relate to the cry&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;one more sucker MC gonna fry&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;imma rock it like some TNT&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;blow it up like a G with a dollar bill 3&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;all the G&#39;s (?) don&#39;t lie&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;fuck with me and you&#39;ll fry&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;oh yeah&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;imma rock it like some TNT&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;blow it up like a G with a dollar bill 3&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;all the G&#39;s (?) don&#39;t lie&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;fuck with me and you&#39;ll fry&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;so why try, you gonna die&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;you&#39;re going straight to the gate in the sky&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;with all the hate i relate to the cry&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;one more sucker MC gonna fry&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;why try, you gonna die&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;you&#39;re going straight to the gate in the sky&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;with all the hate i relate to the cry&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;one more sucker MC gonna fry&lt;/div&gt;</description><link>http://computerchirping.blogspot.com/2010/05/limp-bizkit-why-try-lyric.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4902654608097202933.post-4890295823992239715</guid><pubDate>Sat, 29 Aug 2009 13:10:00 +0000</pubDate><atom:updated>2009-08-29T21:10:54.363+08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">megaproject</category><title>microsoft….</title><description>&lt;p&gt;&amp;#160;&lt;/p&gt;  &lt;p&gt;&amp;#160;&lt;/p&gt;  &lt;p&gt;megaproject..&lt;/p&gt;  </description><link>http://computerchirping.blogspot.com/2009/08/microsoft.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4902654608097202933.post-6557129595472599245</guid><pubDate>Thu, 20 Aug 2009 17:02:00 +0000</pubDate><atom:updated>2009-08-21T01:03:54.988+08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">spam</category><title>my page..</title><description>i never know why my page suspected as SPAM..</description><link>http://computerchirping.blogspot.com/2009/08/my-page.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4902654608097202933.post-9046169198941951226</guid><pubDate>Thu, 20 Aug 2009 04:30:00 +0000</pubDate><atom:updated>2009-08-20T12:33:11.362+08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">all about computer</category><category domain="http://www.blogger.com/atom/ns#">computer user</category><category domain="http://www.blogger.com/atom/ns#">eyes</category><category domain="http://www.blogger.com/atom/ns#">tips n tricks</category><title>Computers May Cause Eye Syndrome</title><description>prevent, protect with these tips.......&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;You probably spend time on the computer at work or school everyday. Staring at the screen too long can cause a vision condition, if you&#39;re not careful. Working at the computer can put you at risk for Computer Vision Syndrome.&lt;br /&gt;&lt;br /&gt;It has been called the number one occupational hazard of the 21st century. Dr. Melissa Billings with Vision Park Family Eye Care in Urbandale says, &quot;When people are using computers these days, they&#39;re using them anywhere from four to eight hours at a time without taking breaks. And, it is causing a lot of &lt;a class=&quot;taxInlineTagLink&quot; href=&quot;http://www.baltimoresun.com/topic/health/symptoms/fatigue-HEISY000019.topic&quot; title=&quot;Fatigue&quot; id=&quot; HEISY000019&quot;&gt;fatigue&lt;/a&gt; and different symptoms that are popping up.&quot;&lt;br /&gt;&lt;br /&gt;Dr. Billings says more patients are complaining about headaches, eye strain, red and watery eyes and trouble seeing things far away. She says, &quot;They get done looking at the computer, and they look across the room and they can&#39;t see things as clearly as they could earlier in the day. Those are pretty typical symptoms.&quot;&lt;br /&gt;&lt;br /&gt;Dr. Billings says Computer Vision Syndrome is caused when people stare at pixilated images, like the computer screen for too long. Your eye muscles have to work extra hard to focus. She says It&#39;s like when you overexert yourself in a sport and experience muscle fatigue. She says, &quot;The eyes, just like any other muscle in the body, there are very very fine muscles in the eye that allow you to focus on the computer.&quot;&lt;br /&gt;&lt;br /&gt;Your eye doctor can prescribe special anti-glare glasses to help you focus on the computer. But, you can also do simple things on you own to prevent Computer Vision Syndrome. Dr. Billings says to follow the 30-30-30 rule. Take a break from the computer every 30 minutes, look at something for 30 seconds that&#39;s 30 feet away. Also, minimize glare on your screen by covering windows and reducing the amount of fluorescent light in your work place. And, consider putting an anti-glare screen on your monitor.&lt;br /&gt;&lt;br /&gt;She says, &quot;Allow those fine muscles in the eye to have that opportunity to relax a little bit.&quot; The National Institute of Occupational Safety and Health recommends computer users get a full eye exam at least once every year.&lt;br /&gt;&lt;br /&gt;source:&lt;a href=&quot;http://www.baltimoresun.com&quot;&gt;The baltimore sun&lt;/a&gt;</description><link>http://computerchirping.blogspot.com/2009/08/computers-may-cause-eye-syndrome.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4902654608097202933.post-2822321928840486964</guid><pubDate>Tue, 18 Aug 2009 16:57:00 +0000</pubDate><atom:updated>2009-08-19T01:24:43.187+08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">language</category><category domain="http://www.blogger.com/atom/ns#">synx</category><title>How I grew to hate every computer language</title><description>In the beginning, I knew Basic. Those were good times. The Apple II was a pretty decent machine to learn to program on. It actually didn’t take me long to run into the fundamental limits of basic programming, even as a kid. In particular, it was insanely slow. I wanted to write games like the games that were already on my computer. I had learned graphics programming and everything but basic (QBasic in particular) just couldn’t keep up. There were probably dirty hacks that would make it work, but at the time I realized I needed to switch to a “real” language, and so I bought a C book.&lt;br /&gt;&lt;br /&gt;&lt;h3&gt;The syntax phase&lt;/h3&gt; &lt;p&gt;In this phase, I knew many languages, and I liked them all.&lt;/p&gt; &lt;p&gt;I learned C and some of C++ on my own. They made me learn Pascal in high school. And then Java as a freshman in college. I liked all of these languages. They were basically all the same. It was just a matter of trading one syntax for another.&lt;/p&gt; &lt;p&gt;All of the features of each language that made them different were of no interest to me. I didn’t use, need, or want any of those features. I saw no need for them. C++ had templates. Who needs that nonsense? Java came with a ton of libraries. That was alright but it seemed like you were just trading one problem (a lack of features) for another (the need to be married to huge piles of documentation). I was always the kind of guy who preferred working from first principles.&lt;/p&gt; &lt;h3&gt;The blub stage&lt;/h3&gt; &lt;p&gt;I knew many languages, but my favorite was the one I used the most.&lt;/p&gt; &lt;p&gt;As I got farther into college and began to learn programming languages in depth, I began discovering the holes that these advanced features filled. I learned, like I usually do, from the “problem end”. I knew of the solution but never bothered to really learn it until one day a problem arose and finally the feature became justified. I began diving into various magical features of my favorite language. At the time, this was C++. I was operator overloading. I was using multiple inheritance. I was a big fan of templates. I became quite accustomed to the advanced features of C++ and every other language seemed quite lacking. They all had features I didn’t need, and were missing features I did.&lt;/p&gt; &lt;h3&gt;The grass is always greener stage&lt;/h3&gt; &lt;p&gt;Here, I knew many languages, but my least favorite was the one I used the most.&lt;/p&gt; &lt;p&gt;It takes a long time of using your “favorite language” and all of its features to be able to see the “beauty” in another language and exactly what you are missing. When you are locked into that single language, you don’t see how it could be improved. Eventually, though, I came to realize that other languages had some truly fantastic things to offer. This is when I learned Lisp, Python, and Ruby.&lt;/p&gt; &lt;p&gt;C++ had so many abusive warts. It wasn’t until I saw these problems fixed in other languages that I even knew they could be fixed. I was so sick of ugly templates and insanely verbose code. I was so sick of static typing and bizarre template hacks to get around it. I was so sick of operator overloading creating so much magic it was hard to understand. I was so sick of symbol names being mangled to pieces. I was really sick of error messages that lasted pages and pages.&lt;/p&gt; &lt;h3&gt;And now, I hate all of them&lt;/h3&gt; &lt;p&gt;Slowly, over time, I played around with all of those other “grass is greener” languages. As I began trying more and more languages, I kept finding things I hated in them. Over time, I became better at this. I’ve done this enough to realize things I hate about a language before I’ve really even dove into it. It still stands though that the less I know about it, the less I hate it. C++ is pure frustration. C is so slow (to develop in, not to run in). Ruby and Python have some serious greatness but also some serious annoyances.&lt;/p&gt; &lt;p&gt;I’ve heard really nice things about D. Maybe I’ll play with that.&lt;/p&gt;</description><link>http://computerchirping.blogspot.com/2009/08/how-i-grew-to-hate-every-computer.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4902654608097202933.post-184296057323938724</guid><pubDate>Mon, 17 Aug 2009 16:48:00 +0000</pubDate><atom:updated>2009-08-18T00:51:45.248+08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">computer games</category><category domain="http://www.blogger.com/atom/ns#">insurance</category><category domain="http://www.blogger.com/atom/ns#">pick</category><title>Ins. Dept plans computer game: Pick your health insurance plan...</title><description>&lt;div class=&quot;article_dateline&quot;&gt;Aug 16 2009  5:10PM&lt;br /&gt;Associated Press&lt;/div&gt; &lt;seadspot&gt;&lt;/seadspot&gt;Ins. Dept plans computer game: Pick your health insurance plan&lt;br /&gt;&lt;br /&gt;  &lt;a title=&quot;Click here to view all related stories&quot; href=&quot;http://www.kxmc.com/t/bismarck-nd&quot; class=&quot;kxInlineLink&quot;&gt;Bismarck&lt;/a&gt;, N.D. (AP)  &lt;a title=&quot;Click here to view all related stories&quot; href=&quot;http://www.kxmc.com/t/north-dakota&quot; class=&quot;kxInlineLink&quot;&gt;North Dakota&lt;/a&gt;&#39;s Insurance Department will be hosting a computer game  aimed at helping people suggest a basic health insurance plan.&lt;br /&gt;&lt;br /&gt;  It&#39;s called CHAT. It stands for Choosing Healthplans All Together.&lt;br /&gt;&lt;br /&gt;  People get together in groups of six to 15 and try to agree on what should be included in basic health insurance coverage. They decide which benefits are most important  and which may not be needed.&lt;br /&gt;&lt;br /&gt;  The department is hosting ten sessions this month  starting tonight in &lt;a title=&quot;Click here to view all related stories&quot; href=&quot;http://www.kxmc.com/t/dickinson-nd&quot; class=&quot;kxInlineLink&quot;&gt;Dickinson&lt;/a&gt;.&lt;br /&gt;&lt;br /&gt;  Deputy insurance commissioner Rebecca Ternes (TUR&#39;-nuss) says the exercise helps people learn more about health insurance costs and trade-offs.&lt;br /&gt;&lt;br /&gt;  Data from the 10 sessions will be given to a legislative interim committee that&#39;s studying health insurance costs. The Industry, Business and Labor Committee plans to go through the exercise itself at a meeting in &lt;a title=&quot;Click here to view all related stories&quot; href=&quot;http://www.kxmc.com/t/fargo-nd&quot; class=&quot;kxInlineLink&quot;&gt;Fargo&lt;/a&gt; next month.&lt;br /&gt;&lt;br /&gt;      (SOUND: Sound files have been e-mailed to accompany this story)            (Copyright 2009 by The Associated Press.  All Rights Reserved.)    APNP 08-16-09 1700CDT</description><link>http://computerchirping.blogspot.com/2009/08/ins-dept-plans-computer-game-pick-your.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item></channel></rss>