<?xml version="1.0" encoding="UTF-8" standalone="no"?><rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:blogger="http://schemas.google.com/blogger/2008" xmlns:gd="http://schemas.google.com/g/2005" xmlns:georss="http://www.georss.org/georss" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/" xmlns:thr="http://purl.org/syndication/thread/1.0" version="2.0"><channel><atom:id>tag:blogger.com,1999:blog-6925264790253362835</atom:id><lastBuildDate>Thu, 24 Oct 2024 10:05:28 +0000</lastBuildDate><category>differences between linux and windows</category><category>Apple G5</category><category>Brain</category><category>Brain Training</category><category>CPU</category><category>Cisnet</category><category>Cisnet NASCAR PC</category><category>DataTraveler Mini Slim</category><category>Geek</category><category>Geek Cuisine</category><category>Geek Friends</category><category>Geek Girls</category><category>Girls Geeks</category><category>How WiFi Works</category><category>IQ</category><category>Improve Memory</category><category>Kingston</category><category>Mini Slim USB</category><category>Motherboard</category><category>NASCAR PC</category><category>SATA</category><category>Sony VaioRB40</category><category>The Apple Imac G5 (Isight)</category><category>The Cisnet NASCAR PC</category><category>USB Drive</category><category>VOODOO OMEN</category><category>VOODOO OMEN a121</category><category>VOODOO a121</category><category>VaioRB40</category><category>What is WiFi</category><category>Why The Geek Girls Rule</category><category>WiFi</category><category>WiFi Spots</category><category>a121</category><category>addict</category><category>are you a computer addict</category><category>are you a geek</category><category>best usb flash drives</category><category>computer</category><category>computer addict</category><category>computer problems</category><category>computer-networking</category><category>connect-two-computers</category><category>definition of geek</category><category>desktop computer</category><category>dual core</category><category>dual core processor</category><category>external enclosure</category><category>firewall</category><category>geek test</category><category>hacker</category><category>how firewalls work</category><category>is your son a computer hacker? computer hacker</category><category>laptop internal hard drive conversion</category><category>linux</category><category>linux vs windows</category><category>share-files</category><category>share-internet</category><category>sony</category><category>take the geek test</category><category>tips n tricks</category><category>usb flash drive buyers guide</category><category>usb flash drive review</category><category>what is firewall</category><category>windows</category><title>computer geekz</title><description>Some people can hack it, others can't.</description><link>http://imeester.blogspot.com/</link><managingEditor>noreply@blogger.com (inbox411)</managingEditor><generator>Blogger</generator><openSearch:totalResults>18</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><language>en-us</language><itunes:explicit>no</itunes:explicit><itunes:subtitle>Some people can hack it, others can't.</itunes:subtitle><itunes:owner><itunes:email>noreply@blogger.com</itunes:email></itunes:owner><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6925264790253362835.post-7181993484554280879</guid><pubDate>Sat, 29 Nov 2008 12:16:00 +0000</pubDate><atom:updated>2008-11-29T04:26:55.065-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">computer problems</category><category domain="http://www.blogger.com/atom/ns#">computer-networking</category><category domain="http://www.blogger.com/atom/ns#">connect-two-computers</category><category domain="http://www.blogger.com/atom/ns#">differences between linux and windows</category><category domain="http://www.blogger.com/atom/ns#">share-files</category><category domain="http://www.blogger.com/atom/ns#">share-internet</category><category domain="http://www.blogger.com/atom/ns#">tips n tricks</category><title/><description>&lt;h1&gt;&lt;span style="font-size:100%;"&gt;Three easy ways to connect two computer for file sharing and Internet&lt;/span&gt;&lt;/h1&gt;  &lt;span style="font-size:100%;"&gt;&lt;span class="author_cat"&gt;Posted by &lt;a href="http://www.troublefixers.com/author/rohit/" title="Posts by Rohit"&gt;Rohit&lt;/a&gt;&lt;/span&gt;&lt;a href="http://www.troublefixers.com/author/rohit/"&gt;&lt;span class="cat_tag"&gt;&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;!--– google_ad_section_start –--&gt;&lt;script type="text/javascript"&gt;&lt;!-- google_ad_client = "pub-0488741336065540"; /* 336x280, TF_Large_Rec_Top */ google_ad_slot = "2564308407"; google_ad_width = 336; google_ad_height = 280; //--&gt; &lt;/script&gt;&lt;a href="http://www.troublefixers.com/author/rohit/"&gt;  &lt;/a&gt;&lt;script type="text/javascript" src="http://pagead2.googlesyndication.com/pagead/show_ads.js"&gt; &lt;/script&gt; &lt;!--– google_ad_section_start –--&gt;&lt;span style="font-size:100%;"&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;  &lt;p&gt;&lt;span style="font-size:100%;"&gt;&lt;img src="http://www.troublefixers.com/wp-content/uploads/2008/03/laptop-desktop-connection1.jpg" style="border: 0px none ;" alt="Laptop_desktop_connection" border="0" height="247" width="380" /&gt;&lt;/span&gt;&lt;/p&gt;  &lt;p&gt;&lt;span style="font-size:100%;"&gt;&lt;strong&gt;Fix:&lt;/strong&gt;&lt;/span&gt;&lt;/p&gt; &lt;p&gt;&lt;span style="font-size:100%;"&gt;Let’s discuss all the three methods one by one.&lt;/span&gt;&lt;/p&gt; &lt;p&gt;&lt;span style="font-size:100%;"&gt;&lt;span id="more-160"&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt; &lt;h1&gt;&lt;span style="font-size:100%;"&gt;&lt;strong&gt;First Method:&lt;/strong&gt; &lt;strong&gt;Using a Switch&lt;/strong&gt;&lt;/span&gt;&lt;/h1&gt; &lt;p&gt;&lt;span style="font-size:100%;"&gt;&lt;strong&gt; &lt;/strong&gt;&lt;/span&gt;&lt;/p&gt; &lt;p&gt;&lt;span style="font-size:100%;"&gt;&lt;span&gt;1. &lt;span style="font-weight: bold;"&gt;Plug in&lt;/span&gt;&lt;span style="text-decoration: underline;"&gt;&lt;/span&gt;&lt;span style="color: rgb(0, 0, 0);"&gt; LAN cables into both computer’s&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt; &lt;p&gt;&lt;span style="font-size:100%;"&gt;2. Open &lt;strong&gt;Start &gt;&gt; Control panel&lt;/strong&gt; and double click &lt;strong&gt;Network Connections&lt;/strong&gt;.&lt;/span&gt;&lt;/p&gt; &lt;p&gt;&lt;span style="font-size:100%;"&gt;3. Now, double click on &lt;strong&gt;&lt;/strong&gt;&lt;span style="font-weight: bold;"&gt;Network Connection&lt;/span&gt;&lt;br /&gt;&lt;/span&gt;&lt;/p&gt; &lt;p&gt;&lt;span style="font-size:100%;"&gt;4. Click the P&lt;strong&gt;roperties button&lt;/strong&gt; and type the IP address “&lt;strong&gt;192.168.0.1&lt;/strong&gt;” to one computer and “&lt;strong&gt;192.168.0.2&lt;/strong&gt;” to the other computer following the same procedure as specified above, both with the same subnet as “&lt;strong&gt;255.255.255.0&lt;/strong&gt;“, leave rest of the fields blank, as shown in the image below, and click &lt;strong&gt;OK&lt;/strong&gt;. &lt;/span&gt;&lt;/p&gt; &lt;p&gt;&lt;span style="font-size:100%;"&gt;&lt;img src="http://www.troublefixers.com/wp-content/uploads/2008/03/tcp-ip-properties1.jpg" style="border: 0px none ;" alt="TCP_IP_Properties" border="0" height="431" width="379" /&gt;&lt;/span&gt;&lt;/p&gt;&lt;div align="center"&gt; &lt;script type="text/javascript"&gt;&lt;!-- google_ad_client = "pub-0488741336065540"; /* 468x60, TF_Bottom_SinglePost */ google_ad_slot = "9263623352"; google_ad_width = 468; google_ad_height = 60; //--&gt; &lt;/script&gt; &lt;script type="text/javascript" src="http://pagead2.googlesyndication.com/pagead/show_ads.js"&gt; &lt;/script&gt; &lt;/div&gt; &lt;div align="left"&gt; &lt;script type="text/javascript"&gt;&lt;!-- google_ad_client = "pub-0488741336065540"; /* 468x15, created 9/16/08 TF_Link_Unit2 */ google_ad_slot = "7395917698"; google_ad_width = 468; google_ad_height = 15; //--&gt; &lt;/script&gt; &lt;script type="text/javascript" src="http://pagead2.googlesyndication.com/pagead/show_ads.js"&gt; &lt;/script&gt; &lt;/div&gt;  &lt;p&gt;&lt;span style="font-size:100%;"&gt;5. Now you need to rename the network names by right clicking on “&lt;strong&gt;My computer &gt;&gt; Properties&lt;/strong&gt;&lt;/span&gt;&lt;/p&gt; &lt;p&gt;&lt;span style="font-size:100%;"&gt;Click &lt;strong&gt;Computer Name&lt;/strong&gt; tab.&lt;/span&gt;&lt;/p&gt; &lt;p&gt;&lt;span style="font-size:100%;"&gt;6. Rename workgroup as “&lt;strong&gt;home&lt;/strong&gt;” in both computers.&lt;/span&gt;&lt;/p&gt; &lt;p&gt;&lt;span style="font-size:100%;"&gt;7. That’s it done, both of the computers will be connected thereafter.&lt;/span&gt;&lt;/p&gt; &lt;h2&gt;&lt;span style="font-size:100%;"&gt;&lt;strong&gt;Second Method: Using a LAN crossover cable&lt;/strong&gt;&lt;/span&gt;&lt;/h2&gt; &lt;p&gt;&lt;span style="font-size:100%;"&gt;&lt;strong&gt;What is a Crossover cable?&lt;/strong&gt;&lt;/span&gt;&lt;/p&gt; &lt;p&gt;&lt;span style="font-size:100%;"&gt;&lt;span&gt;Its a type of Networking / LAN cable to &lt;span name="IL_SPAN"&gt;&lt;input name="IL_MARKER" type="hidden"&gt;connect two computers&lt;/span&gt;&lt;span&gt; mainly for &lt;span name="IL_SPAN"&gt;&lt;input name="IL_MARKER" type="hidden"&gt;file sharing&lt;/span&gt; available at all computer shops.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt; &lt;p&gt;&lt;span style="font-size:100%;"&gt;&lt;span&gt;1. Connect both of the computers with &lt;a href="javascript:void(0)" style="border-bottom: 1px solid rgb(0, 0, 255); text-decoration: underline; color: rgb(0, 0, 255);" class="IL_LINK_STYLE"&gt;&lt;/a&gt;&lt;span style="font-weight: bold;"&gt;the cross&lt;/span&gt; LAN cable.&lt;/span&gt;&lt;/span&gt;&lt;/p&gt; &lt;p&gt;&lt;span style="font-size:100%;"&gt;2. Open &lt;strong&gt;Start &gt;&gt; Control Panel&lt;/strong&gt; and double click the &lt;strong&gt;&lt;span&gt;&lt;span name="IL_SPAN"&gt;&lt;input name="IL_MARKER" type="hidden"&gt;Network Connection&lt;/span&gt;, &lt;/span&gt;&lt;/strong&gt;open LAN connection and click the properties button.&lt;/span&gt;&lt;/p&gt; &lt;p&gt;&lt;span style="font-size:100%;"&gt;3. Select the option “&lt;strong&gt;Obtain the IP address automatically&lt;/strong&gt;” in both the computers.&lt;/span&gt;&lt;/p&gt; &lt;p&gt;&lt;span style="font-size:100%;"&gt;4. That’s it done, both of the computers will be connected thereafter.&lt;/span&gt;&lt;/p&gt; &lt;h2&gt;&lt;span style="font-size:100%;"&gt;&lt;strong&gt;Third Method: Using a special type of USB cable&lt;/strong&gt; (USB-USB bridged cable)&lt;/span&gt;&lt;/h2&gt; &lt;p&gt;&lt;span style="font-size:100%;"&gt;&lt;span&gt;Read about how to &lt;span name="IL_SPAN"&gt;&lt;input name="IL_MARKER" type="hidden"&gt;connect two computers&lt;/span&gt; with the &lt;/span&gt;&lt;a href="http://www.hardwaresecrets.com/article/248" target="_blank"&gt;third method here&lt;/a&gt;&lt;a href="http://www.hardwaresecrets.com/article/248"&gt;.&lt;/a&gt;&lt;/span&gt;&lt;/p&gt; &lt;div align="left"&gt; &lt;script type="text/javascript"&gt;&lt;!-- google_ad_client = "pub-0488741336065540"; /* 468x15, created 5/26/08 Tf_single_post_link_unit */ google_ad_slot = "4910313361"; google_ad_width = 468; google_ad_height = 15; //--&gt; &lt;/script&gt; &lt;script type="text/javascript" src="http://pagead2.googlesyndication.com/pagead/show_ads.js"&gt; &lt;/script&gt; &lt;/div&gt; &lt;span style="font-size:100%;"&gt;&lt;br /&gt;&lt;/span&gt; &lt;div align="left"&gt;&lt;span style="font-size:100%;"&gt; We hope you like the post, You can get more such updates,&lt;a href="http://feedburner.google.com/fb/a/mailverify?uri=troublefixers" target="_blank"&gt; get these fixes&lt;/a&gt; to computer troubles via email for&lt;strong&gt; free.&lt;/strong&gt;&lt;/span&gt; &lt;/div&gt; &lt;div align="left"&gt; &lt;script type="text/javascript"&gt;&lt;!-- google_ad_client = "pub-0488741336065540"; /* 468x60, created 5/29/08 */ google_ad_slot = "7325912488"; google_ad_width = 468; google_ad_height = 60; //--&gt; &lt;/script&gt; &lt;script type="text/javascript" src="http://pagead2.googlesyndication.com/pagead/show_ads.js"&gt; &lt;/script&gt; &lt;/div&gt;   &lt;h2&gt;&lt;span style="font-size:100%;"&gt;Related Articles&lt;/span&gt;&lt;/h2&gt; &lt;span style="font-size:100%;"&gt;&lt;b&gt;&lt;a rel="bookmark" title="Permanent Link: Block applications trying to connect to Internet"&gt;Block applications trying to connect to Internet&lt;/a&gt;&lt;/b&gt;&lt;/span&gt;&lt;ul&gt;&lt;li&gt;&lt;a href="http://www.troublefixers.com/problem-in-file-sharing-over-lan/"&gt;&lt;span style="font-size:100%;"&gt;&lt;b&gt;&lt;/b&gt;&lt;/span&gt;&lt;/a&gt;&lt;span style="font-size:100%;"&gt;&lt;b&gt;&lt;a rel="bookmark" title="Permanent Link: Problem In File Sharing Over LAN"&gt;Problem In File Sharing Over LAN&lt;/a&gt;&lt;/b&gt;&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;a href="http://www.troublefixers.com/problem-in-file-sharing-between-windows-vista-and-windows-xp/"&gt;&lt;span style="font-size:100%;"&gt;&lt;b&gt;&lt;/b&gt;&lt;/span&gt;&lt;/a&gt;&lt;span style="font-size:100%;"&gt;&lt;b&gt;&lt;a rel="bookmark" title="Permanent Link: Problem In File Sharing Between Windows Vista and Windows XP"&gt;Problem In File Sharing Between Windows Vista and Windows XP&lt;/a&gt;&lt;/b&gt;&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;a href="http://www.troublefixers.com/not-able-to-delete-a-file-in-windows-xp-delete-it-with-un-locker/"&gt;&lt;span style="font-size:100%;"&gt;&lt;b&gt;&lt;/b&gt;&lt;/span&gt;&lt;/a&gt;&lt;span style="font-size:100%;"&gt;&lt;b&gt;&lt;a rel="bookmark" title="Permanent Link: Not able to delete a file in Windows XP? delete it with un-locker"&gt;Not able to delete a file in Windows XP? delete it with un-locker&lt;/a&gt;&lt;/b&gt;&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;a href="http://www.troublefixers.com/how-to-check-which-application-or-software-is-using-internet-connection/"&gt;&lt;span style="font-size:100%;"&gt;&lt;b&gt;&lt;/b&gt;&lt;/span&gt;&lt;/a&gt;&lt;span style="font-size:100%;"&gt;&lt;b&gt;&lt;a rel="bookmark" title="Permanent Link: How to check which application or software is using Internet connection"&gt;How to check which application or software is using Internet connection&lt;/a&gt;&lt;/b&gt;&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;a href="http://www.troublefixers.com/3-ways-to-recover-accidentally-deleted-windows-application-file/"&gt;&lt;span style="font-size:100%;"&gt;&lt;b&gt;&lt;/b&gt;&lt;/span&gt;&lt;/a&gt;&lt;span style="font-size:100%;"&gt;&lt;b&gt;&lt;a rel="bookmark" title="Permanent Link: 3 Ways To Recover Accidentally Deleted Windows Application File"&gt;3 Ways To Recover Accidentally Deleted Windows Application File&lt;/a&gt;&lt;/b&gt;&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;</description><link>http://imeester.blogspot.com/2008/11/three-easy-ways-to-connect-two-computer.html</link><author>noreply@blogger.com (inbox411)</author><thr:total>1</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6925264790253362835.post-4894103046288806040</guid><pubDate>Sat, 29 Nov 2008 12:09:00 +0000</pubDate><atom:updated>2008-11-29T04:14:10.818-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">best usb flash drives</category><category domain="http://www.blogger.com/atom/ns#">usb flash drive buyers guide</category><category domain="http://www.blogger.com/atom/ns#">usb flash drive review</category><title/><description>&lt;div style="text-align: left;"&gt;&lt;span id="ctl00_ctl00_ctl00_ctl00_bcr_bcr_bcr_bcr_preview"&gt;&lt;h2&gt;&lt;span style="font-size:78%;"&gt;by: &lt;a&gt;&lt;span id="ctl00_ctl00_ctl00_ctl00_bcr_bcr_bcr_bcr_preview"&gt;         &lt;span id="ctl00_ctl00_ctl00_ctl00_bcr_bcr_bcr_bcr_preview_ctl00_HeadBlock_bhUserPoints1_panelUserDiplayName"&gt;                        &lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;a href="http://www.brighthub.com/members/mattbecker.aspx"&gt;Matt Becker&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style="font-size:100%;"&gt;&lt;span id="ctl00_ctl00_ctl00_ctl00_bcr_bcr_bcr_bcr_preview"&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h2&gt;&lt;h2&gt;&lt;span style="font-size:100%;"&gt;&lt;span id="ctl00_ctl00_ctl00_ctl00_bcr_bcr_bcr_bcr_preview"&gt; There are many different brands of USB Flash Drives out there. How do you know which brands you should look into, and which ones to avoid? This guide will briefly review ten different brands of USB Flash Drives, and will give you a better idea of which brands you should consider when you make your next purchase.&lt;/span&gt;&lt;/span&gt;&lt;/h2&gt;&lt;/span&gt;&lt;/div&gt;&lt;span id="ctl00_ctl00_ctl00_ctl00_bcr_bcr_bcr_bcr_preview"&gt;&lt;h2&gt;Brief Intro&lt;/h2&gt;&lt;div class="”KonaBody”"&gt;&lt;p&gt;Want more USB capacity for all your external devices? Read &lt;a href="http://www.brighthub.com/computing/windows-platform/articles/1756.aspx"&gt;&lt;span&gt;USB Hubs: A Review of the Best USB Hubs currently available&lt;/span&gt;&lt;/a&gt;&lt;/p&gt; &lt;p&gt;It has never been easier, more affordable or more efficient for personal data storage than in the present day. For those of you who have used computers for a long time, you'll remember exactly how many of those you've gone through. Fortunately, those days are long gone. Nowadays, one of the most convenient and cost-effective manner of data storage over the past several years has been the use of the USB Flash Drive.&lt;/p&gt; &lt;p&gt;&lt;strong&gt;What is it?&lt;/strong&gt;&lt;/p&gt; &lt;p&gt;A Flash Drive is a small electronic device that is capable of holding mass amounts of data. How it's used is by plugging it into a free USB slot. From that point, you can either transfer data to the device, or load data from the device. It is perfect for storing documents, pictures, music and anything else that you need to transfer.&lt;/p&gt; &lt;p&gt;&lt;strong&gt;What are the benefits?&lt;/strong&gt;&lt;/p&gt; &lt;p&gt;Portability and capacity are the main features of any USB Flash Drive. They are lightweight, and depending on how much storage space you require, you can select from a drive that holds between 1GB and 64GB of storage space. They're perfect if you have a few documents that you wish to back up for peace of mind in the unfortunate circumstance of something happening to your computer, or data you want to move between computers.&lt;/p&gt; &lt;p&gt;&lt;strong&gt;What are the drawbacks?&lt;/strong&gt;&lt;/p&gt; &lt;p&gt;USB Flash Drives can be expensive, depending on brand and storage space. Like any other type of storage device, you always risk the likelihood of data corruption, which could be caused by improper data transfer, or device failure (in other words, if it dies). In addition, because they are lightweight and small, they can easily be lost and/or damaged.&lt;/p&gt; &lt;p&gt;&lt;strong&gt;Recommended brands and devices&lt;/strong&gt;&lt;/p&gt; &lt;p&gt;&lt;strong&gt;&lt;/strong&gt;Typically it's a good idea to go with brands who specialize in working with memory devices. This guide will list the assets and setbacks of the following brands and devices. This general list should give you a better idea before purchasing a USB Flash Drive.&lt;/p&gt; &lt;p&gt;The order of this list does not imply that some devices are recommended more highly than others.&lt;/p&gt;&lt;/div&gt;&lt;h2&gt;10.) Centon Drives&lt;/h2&gt;&lt;img onclick="javascript:Telligent_Modal.Open('/bh_controls/viewarticleimage.aspx?url=http%3a%2f%2fimages.brighthub.com%2fCE%2fF%2fCEF9F33C638A6FA966AAB146CBB3E9997904FE75_large.jpg&amp;title=', 650, 650, null);" src="http://images.brighthub.com/CE/F/CEF9F33C638A6FA966AAB146CBB3E9997904FE75_small.jpg" title="" alt="" style="border: 0pt none ; margin: 5px; cursor: pointer;" /&gt;&lt;img onclick="javascript:Telligent_Modal.Open('/bh_controls/viewarticleimage.aspx?url=http%3a%2f%2fimages.brighthub.com%2f68%2f7%2f68792CA5BC240F6203125B39CDE0A7AB609F1D57_large.jpg&amp;title=', 650, 650, null);" src="http://images.brighthub.com/68/7/68792CA5BC240F6203125B39CDE0A7AB609F1D57_small.jpg" title="" alt="" style="border: 0pt none ; margin: 5px; cursor: pointer;" /&gt;&lt;div class="”KonaBody”"&gt;&lt;p&gt;&lt;strong&gt;Centon DSP4GB-007 Data Stick Pro&lt;/strong&gt;&lt;/p&gt; &lt;p&gt;Pros:&lt;/p&gt; &lt;ul&gt;&lt;li&gt;Lifetime warranty;&lt;/li&gt;&lt;li&gt;Compatible with Windows and Mac&lt;/li&gt;&lt;/ul&gt; &lt;p&gt;Cons:&lt;/p&gt; &lt;ul&gt;&lt;li&gt;Tends to deliver more duds than working devices;&lt;/li&gt;&lt;li&gt;Data is easily corrupted;&lt;/li&gt;&lt;li&gt;Does not always format correctly&lt;/li&gt;&lt;/ul&gt;&lt;/div&gt;&lt;h2&gt;9.) Corsair Drives&lt;/h2&gt;&lt;img onclick="javascript:Telligent_Modal.Open('/bh_controls/viewarticleimage.aspx?url=http%3a%2f%2fimages.brighthub.com%2fD0%2fB%2fD0B02D667E0283BD328855A1C4F8B7A84ED3599D_large.jpg&amp;title=', 650, 650, null);" src="http://images.brighthub.com/D0/B/D0B02D667E0283BD328855A1C4F8B7A84ED3599D_small.jpg" title="" alt="" style="border: 0pt none ; margin: 5px; cursor: pointer;" /&gt;&lt;img onclick="javascript:Telligent_Modal.Open('/bh_controls/viewarticleimage.aspx?url=http%3a%2f%2fimages.brighthub.com%2f09%2f0%2f090B1186FD628430DBA2DBB6EF71D6F68112B129_large.jpg&amp;title=', 650, 650, null);" src="http://images.brighthub.com/09/0/090B1186FD628430DBA2DBB6EF71D6F68112B129_small.jpg" title="" alt="" style="border: 0pt none ; margin: 5px; cursor: pointer;" /&gt;&lt;div class="”KonaBody”"&gt;&lt;p&gt;&lt;strong&gt;Corsair Flash Voyager 4GB&lt;/strong&gt;&lt;/p&gt; &lt;p&gt;Pros:&lt;/p&gt; &lt;ul&gt;&lt;li&gt;10 year + 1 month warranty;&lt;/li&gt;&lt;li&gt;Solid performer: decent reading and writing speeds&lt;/li&gt;&lt;/ul&gt; &lt;p&gt;Cons:&lt;/p&gt; &lt;ul&gt;&lt;li&gt;No protection on the device at all;&lt;/li&gt;&lt;li&gt;Drive can be easily manipulated physically (bends under some minor pressure)&lt;/li&gt;&lt;/ul&gt;&lt;/div&gt;&lt;h2&gt;8.) PNY Drives&lt;/h2&gt;&lt;img onclick="javascript:Telligent_Modal.Open('/bh_controls/viewarticleimage.aspx?url=http%3a%2f%2fimages.brighthub.com%2f67%2fF%2f67FCDDA32C420A5BFEF880FA754988CF142834B8_large.jpg&amp;title=', 650, 650, null);" src="http://images.brighthub.com/67/F/67FCDDA32C420A5BFEF880FA754988CF142834B8_small.jpg" title="" alt="" style="border: 0pt none ; margin: 5px; cursor: pointer;" /&gt;&lt;img onclick="javascript:Telligent_Modal.Open('/bh_controls/viewarticleimage.aspx?url=http%3a%2f%2fimages.brighthub.com%2f08%2f5%2f085B6D624C162FD9D136149F51099A6B6440B477_large.jpg&amp;title=', 650, 650, null);" src="http://images.brighthub.com/08/5/085B6D624C162FD9D136149F51099A6B6440B477_small.jpg" title="" alt="" style="border: 0pt none ; margin: 5px; cursor: pointer;" /&gt;&lt;div class="”KonaBody”"&gt;&lt;p&gt;&lt;strong&gt;PNY 8GB Optima PRO Attaché&lt;/strong&gt;&lt;/p&gt; &lt;p&gt;&lt;strong&gt;&lt;/strong&gt;Pros:&lt;/p&gt; &lt;ul&gt;&lt;li&gt;Reasonable pricing;&lt;/li&gt;&lt;li&gt;Performs in different weather conditions (wet and dry) and extreme temperatures (hot and cold);&lt;/li&gt;&lt;li&gt;Transfers quickly and effectively;&lt;/li&gt;&lt;li&gt;Compatible for PC and Mac&lt;/li&gt;&lt;/ul&gt; &lt;p&gt;Cons:&lt;/p&gt; &lt;ul&gt;&lt;li&gt;Only offers a 1 year warranty compared with other products which offer 2 years or more;&lt;/li&gt;&lt;li&gt;Cap is not always secure; can easily come off;&lt;/li&gt;&lt;li&gt;Flimsy design;&lt;/li&gt;&lt;li&gt;In event of product failure, consumer will have to pay to have product shipped to be examined by PNY&lt;/li&gt;&lt;/ul&gt;&lt;/div&gt;&lt;h2&gt;7.) Transcend Drives&lt;/h2&gt;&lt;img onclick="javascript:Telligent_Modal.Open('/bh_controls/viewarticleimage.aspx?url=http%3a%2f%2fimages.brighthub.com%2fEB%2f5%2fEB5AC66E98205CE9556D9008E0D559A867507898_large.jpg&amp;title=', 650, 650, null);" src="http://images.brighthub.com/EB/5/EB5AC66E98205CE9556D9008E0D559A867507898_small.jpg" title="" alt="" style="border: 0pt none ; margin: 5px; cursor: pointer;" /&gt;&lt;img onclick="javascript:Telligent_Modal.Open('/bh_controls/viewarticleimage.aspx?url=http%3a%2f%2fimages.brighthub.com%2fAA%2fF%2fAAFAF5ACEBD7AB31F0E8725C46E48B442E58820C_large.jpg&amp;title=', 650, 650, null);" src="http://images.brighthub.com/AA/F/AAFAF5ACEBD7AB31F0E8725C46E48B442E58820C_small.jpg" title="" alt="" style="border: 0pt none ; margin: 5px; cursor: pointer;" /&gt;&lt;div class="”KonaBody”"&gt;&lt;p&gt;&lt;strong&gt;Transcend 8GB JetFlash V10&lt;/strong&gt;&lt;/p&gt; &lt;p&gt;Pros:&lt;/p&gt; &lt;ul&gt;&lt;li&gt;Lifetime warranty;&lt;/li&gt;&lt;li&gt;Enables user to password protect files;&lt;/li&gt;&lt;li&gt;Can compress files&lt;/li&gt;&lt;/ul&gt; &lt;p&gt;Cons:&lt;/p&gt; &lt;ul&gt;&lt;li&gt;Does not deliver on speed, and is actually much slower than it claims to be&lt;/li&gt;&lt;/ul&gt;&lt;/div&gt;&lt;h2&gt;6.) Hewlett-Packard Drives&lt;/h2&gt;&lt;img onclick="javascript:Telligent_Modal.Open('/bh_controls/viewarticleimage.aspx?url=http%3a%2f%2fimages.brighthub.com%2f44%2f9%2f44947818430912CDCBD6E4F861FD8FECE84FCF46_large.jpg&amp;title=', 650, 650, null);" src="http://images.brighthub.com/44/9/44947818430912CDCBD6E4F861FD8FECE84FCF46_small.jpg" title="" alt="" style="border: 0pt none ; margin: 5px; cursor: pointer;" /&gt;&lt;img onclick="javascript:Telligent_Modal.Open('/bh_controls/viewarticleimage.aspx?url=http%3a%2f%2fimages.brighthub.com%2f8B%2f9%2f8B9F06E854190347200DB2F546190E1FF91BEACC_large.jpg&amp;title=', 650, 650, null);" src="http://images.brighthub.com/8B/9/8B9F06E854190347200DB2F546190E1FF91BEACC_small.jpg" title="" alt="" style="border: 0pt none ; margin: 5px; cursor: pointer;" /&gt;&lt;div class="”KonaBody”"&gt;&lt;p&gt;&lt;strong&gt;HP V100W 4GB&lt;/strong&gt;&lt;/p&gt; &lt;p&gt;Pros:&lt;/p&gt; &lt;ul&gt;&lt;li&gt;2 year warranty;&lt;/li&gt;&lt;li&gt;Works quickly and efficiently;&lt;/li&gt;&lt;li&gt;Overall a steady performer&lt;/li&gt;&lt;/ul&gt; &lt;p&gt;Cons:&lt;/p&gt; &lt;ul&gt;&lt;li&gt;Not the fastest drive available, but works well enough&lt;/li&gt;&lt;/ul&gt;&lt;/div&gt;&lt;h2&gt;5.) SanDisk Drives&lt;/h2&gt;&lt;img onclick="javascript:Telligent_Modal.Open('/bh_controls/viewarticleimage.aspx?url=http%3a%2f%2fimages.brighthub.com%2f8C%2f6%2f8C6FDD5AB8212FD5575EE02E13E439945F6937E9_large.jpg&amp;title=', 650, 650, null);" src="http://images.brighthub.com/8C/6/8C6FDD5AB8212FD5575EE02E13E439945F6937E9_small.jpg" title="" alt="" style="border: 0pt none ; margin: 5px; cursor: pointer;" /&gt;&lt;img onclick="javascript:Telligent_Modal.Open('/bh_controls/viewarticleimage.aspx?url=http%3a%2f%2fimages.brighthub.com%2fAB%2f5%2fAB598DD9A7D395B3EDFC5CD58E0CF80651476B1E_large.jpg&amp;title=', 650, 650, null);" src="http://images.brighthub.com/AB/5/AB598DD9A7D395B3EDFC5CD58E0CF80651476B1E_small.jpg" title="" alt="" style="border: 0pt none ; margin: 5px; cursor: pointer;" /&gt;&lt;div class="”KonaBody”"&gt;&lt;p&gt;&lt;strong&gt;Sandisk Cruzer Slide 4GB (ReadyBoost compliant)&lt;/strong&gt;&lt;/p&gt; &lt;p&gt;Pros:&lt;/p&gt; &lt;ul&gt;&lt;li&gt;2 year warranty;&lt;/li&gt;&lt;li&gt;Sleek design, and a loop allowing one to wear it around the neck;&lt;/li&gt;&lt;li&gt;Solid performer&lt;/li&gt;&lt;/ul&gt; &lt;p&gt;Cons:&lt;/p&gt; &lt;ul&gt;&lt;li&gt;Not particularly environmentally friendly, as most SanDisk flash drives are over-packaged with plastic;&lt;/li&gt;&lt;li&gt;Tends to be selective with specific USB devices, resulting in compatibility issues;&lt;/li&gt;&lt;li&gt;It is not the fastest device around for what you pay for it&lt;/li&gt;&lt;/ul&gt;&lt;/div&gt;&lt;h2&gt;4.) Kingston Drives&lt;/h2&gt;&lt;img onclick="javascript:Telligent_Modal.Open('/bh_controls/viewarticleimage.aspx?url=http%3a%2f%2fimages.brighthub.com%2f3E%2fD%2f3EDB14313EEF41447C2C113B9E0E3304373CAA7C_large.jpg&amp;title=', 650, 650, null);" src="http://images.brighthub.com/3E/D/3EDB14313EEF41447C2C113B9E0E3304373CAA7C_small.jpg" title="" alt="" style="border: 0pt none ; margin: 5px; cursor: pointer;" /&gt;&lt;img onclick="javascript:Telligent_Modal.Open('/bh_controls/viewarticleimage.aspx?url=http%3a%2f%2fimages.brighthub.com%2f19%2f2%2f192826247FB8FE26B7AA40D0E286AF2F84F513EC_large.jpg&amp;title=', 650, 650, null);" src="http://images.brighthub.com/19/2/192826247FB8FE26B7AA40D0E286AF2F84F513EC_small.jpg" title="" alt="" style="border: 0pt none ; margin: 5px; cursor: pointer;" /&gt;&lt;div class="”KonaBody”"&gt;&lt;p&gt;&lt;strong&gt;Kingston 8GB DataTraveler&lt;/strong&gt;&lt;/p&gt; &lt;p&gt;Pros:&lt;/p&gt; &lt;ul&gt;&lt;li&gt;5 year warranty;&lt;/li&gt;&lt;li&gt;Incredibly light;&lt;/li&gt;&lt;li&gt;Solid performer&lt;/li&gt;&lt;/ul&gt; &lt;p&gt;Cons:&lt;/p&gt; &lt;ul&gt;&lt;li&gt;A rather expensive device for a standard unit, but it works&lt;/li&gt;&lt;/ul&gt;&lt;/div&gt;&lt;h2&gt;3.) A-Data Drives&lt;/h2&gt;&lt;img onclick="javascript:Telligent_Modal.Open('/bh_controls/viewarticleimage.aspx?url=http%3a%2f%2fimages.brighthub.com%2fDA%2f3%2fDA39A3EE5E6B4B0D3255BFEF95601890AFD80709_large.jpg&amp;title=', 650, 650, null);" src="http://images.brighthub.com/DA/3/DA39A3EE5E6B4B0D3255BFEF95601890AFD80709_small.jpg" title="" alt="" style="border: 0pt none ; margin: 5px; cursor: pointer;" /&gt;&lt;img onclick="javascript:Telligent_Modal.Open('/bh_controls/viewarticleimage.aspx?url=http%3a%2f%2fimages.brighthub.com%2f80%2f3%2f803A4371C1D72FE07B3196A0731EA1BD312B482E_large.jpg&amp;title=', 650, 650, null);" src="http://images.brighthub.com/80/3/803A4371C1D72FE07B3196A0731EA1BD312B482E_small.jpg" title="" alt="" style="border: 0pt none ; margin: 5px; cursor: pointer;" /&gt;&lt;div class="”KonaBody”"&gt;&lt;p&gt;&lt;strong&gt;A-Data 4GB PD30&lt;/strong&gt;&lt;/p&gt; &lt;p&gt;Pros:&lt;/p&gt; &lt;ul&gt;&lt;li&gt;Lifetime warranty;&lt;/li&gt;&lt;li&gt;Reads data quickly;&lt;/li&gt;&lt;li&gt;Sleek design protects drive;&lt;/li&gt;&lt;li&gt;Compatible with Windows, Mac and Linux&lt;/li&gt;&lt;/ul&gt; &lt;p&gt;Cons:&lt;/p&gt; &lt;ul&gt;&lt;li&gt;Writing speeds could be better&lt;/li&gt;&lt;/ul&gt;&lt;/div&gt;&lt;h2&gt;2.) Patriot Drives&lt;/h2&gt;&lt;img onclick="javascript:Telligent_Modal.Open('/bh_controls/viewarticleimage.aspx?url=http%3a%2f%2fimages.brighthub.com%2f31%2fD%2f31D22806A422810D383B5E2CF18E0DEA60089601_large.jpg&amp;title=', 650, 650, null);" src="http://images.brighthub.com/31/D/31D22806A422810D383B5E2CF18E0DEA60089601_small.jpg" title="" alt="" style="border: 0pt none ; margin: 5px; cursor: pointer;" /&gt;&lt;img onclick="javascript:Telligent_Modal.Open('/bh_controls/viewarticleimage.aspx?url=http%3a%2f%2fimages.brighthub.com%2fF2%2f4%2fF247CD860A3136D9254DEAEA025ED4FAEFA325CA_large.jpg&amp;title=', 650, 650, null);" src="http://images.brighthub.com/F2/4/F247CD860A3136D9254DEAEA025ED4FAEFA325CA_small.jpg" title="" alt="" style="border: 0pt none ; margin: 5px; cursor: pointer;" /&gt;&lt;div class="”KonaBody”"&gt;&lt;p&gt;&lt;strong&gt;Patriot Xporter XT Boost 4GB&lt;/strong&gt;&lt;/p&gt; &lt;p&gt;&lt;strong&gt;&lt;/strong&gt;Pros:&lt;/p&gt; &lt;ul&gt;&lt;li&gt;Lifetime warranty;&lt;/li&gt;&lt;li&gt;Works without installing drivers for Windows, Mac or Linux;&lt;/li&gt;&lt;li&gt;ReadyBoost compatible;&lt;/li&gt;&lt;li&gt;Solid reading rates - quite fast;&lt;/li&gt;&lt;li&gt;Overall a steady performer&lt;/li&gt;&lt;/ul&gt; &lt;p&gt;Cons:&lt;/p&gt; &lt;ul&gt;&lt;li&gt;Writing speeds could be faster;&lt;/li&gt;&lt;li&gt;Bulky design&lt;/li&gt;&lt;/ul&gt;&lt;/div&gt;&lt;h2&gt;1.) OCZ Drives&lt;/h2&gt;&lt;img onclick="javascript:Telligent_Modal.Open('/bh_controls/viewarticleimage.aspx?url=http%3a%2f%2fimages.brighthub.com%2fFC%2fE%2fFCE96EA276C326E038FC64537B2158948E77F004_large.jpg&amp;title=', 650, 650, null);" src="http://images.brighthub.com/FC/E/FCE96EA276C326E038FC64537B2158948E77F004_small.jpg" title="" alt="" style="border: 0pt none ; margin: 5px; cursor: pointer;" /&gt;&lt;img onclick="javascript:Telligent_Modal.Open('/bh_controls/viewarticleimage.aspx?url=http%3a%2f%2fimages.brighthub.com%2f6A%2fA%2f6AAEDD836B6E1057054726075310310442351C50_large.jpg&amp;title=', 650, 650, null);" src="http://images.brighthub.com/6A/A/6AAEDD836B6E1057054726075310310442351C50_small.jpg" title="" alt="" style="border: 0pt none ; margin: 5px; cursor: pointer;" /&gt;&lt;div class="”KonaBody”"&gt;&lt;p&gt;&lt;strong&gt;OCZ Rally2 8GB&lt;/strong&gt;&lt;/p&gt; &lt;p&gt;Pros:&lt;/p&gt; &lt;ul&gt;&lt;li&gt;Lifetime warranty;&lt;/li&gt;&lt;li&gt;Impressive transfer speeds (up to 35MB/second) for reading, 15MB/second for writing - one of if not the fastest of any flash drive available;&lt;/li&gt;&lt;li&gt;Compatible with Macs;&lt;/li&gt;&lt;li&gt;True Plug and Play - no drivers to install&lt;/li&gt;&lt;/ul&gt; &lt;p&gt;Cons:&lt;/p&gt; &lt;ul&gt;&lt;li&gt;Protection cap is not always secured, and can easily be lost;&lt;/li&gt;&lt;li&gt;Expect to have a lighter wallet after purchasing a drive from this brand&lt;/li&gt;&lt;/ul&gt;&lt;/div&gt;&lt;/span&gt;</description><link>http://imeester.blogspot.com/2008/11/by-matt-becker-there-are-many-different.html</link><author>noreply@blogger.com (inbox411)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6925264790253362835.post-177421825107801350</guid><pubDate>Sat, 29 Nov 2008 11:59:00 +0000</pubDate><atom:updated>2008-11-29T04:08:15.560-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">external enclosure</category><category domain="http://www.blogger.com/atom/ns#">laptop internal hard drive conversion</category><category domain="http://www.blogger.com/atom/ns#">SATA</category><title>Converting an Internal Laptop Hard Drive to an External Drive</title><description>&lt;a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEglF5owCFTcB-vFP82PU2qLi-_TzE2NnIHQ1GZokJukWaJX3LxX_LWAUgarkMB01pRYqPTExzps9_sZy7t7XkTXqkv9pLoRr_HVBq3Z3giADYqKs-f5Vy4z87HhSGSt1Ne9SpHaSX5ZDFE/s1600-h/138588-front.jpg"&gt;&lt;img style="cursor: pointer; width: 320px; height: 238px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEglF5owCFTcB-vFP82PU2qLi-_TzE2NnIHQ1GZokJukWaJX3LxX_LWAUgarkMB01pRYqPTExzps9_sZy7t7XkTXqkv9pLoRr_HVBq3Z3giADYqKs-f5Vy4z87HhSGSt1Ne9SpHaSX5ZDFE/s320/138588-front.jpg" alt="" id="BLOGGER_PHOTO_ID_5274049449554910866" border="0" /&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;span id="ctl00_ctl00_ctl00_ctl00_bcr_bcr_bcr_bcr_preview"&gt;You can save yourself some money and convert an internal laptop hard drive to an external hard drive? It's a simple process that will cost you anywhere from $13-$25, which is much less than you'd spend on an external right out of the box.&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;p&gt;&lt;strong&gt;About&lt;/strong&gt;&lt;/p&gt; &lt;p&gt;Internal hard drives stay in your computer, and risk crashing at any time.&lt;span&gt; &lt;/span&gt;External hard drives can connect to any computer via USB, but all that is inside an external hard drive is the same kind of hard drive your computer uses as its internal drive.&lt;span&gt; &lt;/span&gt;This means you can convert an internal to an external drive with a simple kit that includes a case, a USB cable and a power adapter. We'll focus on laptop drive conversions in this article, as an excellent article has already been done on &lt;a href="http://www.brighthub.com/computing/windows-platform/articles/1739.aspx" target="_self"&gt;desktop hard drive conversions&lt;/a&gt;.&lt;/p&gt; &lt;p&gt;&lt;strong&gt;Things You’ll Need&lt;/strong&gt;&lt;/p&gt; &lt;p&gt;Internal Hard Drive (SATA or IDE, though you need to know which type when purchasing your kit)&lt;/p&gt; &lt;p&gt;Hard Drive Enclosure Kit (available from a variety of merchants at a variety of prices--remember to check the type)&lt;/p&gt; &lt;p&gt;Screwdriver (to assist in closing the case around the drive, though some kits may come with one)&lt;/p&gt; &lt;p&gt;Anti-Static Bracelet (optional, used to discharge the static when handling an exposed hard drive)&lt;/p&gt; &lt;p&gt;&lt;strong&gt;Step One&lt;/strong&gt;&lt;/p&gt; &lt;p&gt;Purchase your internal drive and kit. Remember that a laptop drive is a 2.5'' drive so you should pay close attention to the size and internal dimensions of the casing when you purchase it to avoid a fiasco later. Also, when considering your kit, if you are using an IDE drive that you had laying around the house, you need to be sure that you purchase an IDE kit. SATA is the more commonly used method these days, and will not work with IDE. Some kits though, may have what you need to use it either way.&lt;/p&gt; &lt;p&gt;&lt;strong&gt;Step Two&lt;/strong&gt;&lt;/p&gt; &lt;p&gt;Next, remove the hard drive you either purchased or had as a spare from your computer or its packaging.&lt;span&gt; &lt;/span&gt;Connect it to the casing as requested by the kit- plugging in the connector or using the cables provided in the kit.&lt;span&gt; &lt;/span&gt;Close the kit around the drive using the screws that are provided in the kit.&lt;span&gt; &lt;/span&gt;&lt;/p&gt; &lt;p&gt;&lt;strong&gt;Step Three&lt;/strong&gt;&lt;/p&gt; &lt;p&gt;Insert the USB cable into the drive, and plug the AC adapter into both the hard drive and the power source.&lt;span&gt; &lt;/span&gt;Insert the other end of the USB cable into your computer.&lt;span&gt; &lt;/span&gt;You should now be able to pull information from one drive to another.&lt;span&gt; &lt;/span&gt;&lt;/p&gt; &lt;p&gt;&lt;strong&gt;Tips, Warnings, and Other Information&lt;/strong&gt;&lt;/p&gt; &lt;ul&gt;&lt;li&gt;If you experience any issues, you should consult the documentation that comes along with the kit you decided to purchase.&lt;/li&gt;&lt;li&gt;Remember to touch the outside of your computer case or wear an anti-static bracelet when you are handling the exposed hard drive&lt;/li&gt;&lt;/ul&gt;&lt;br /&gt;Source: http://www.brighthub.com/</description><link>http://imeester.blogspot.com/2008/11/converting-internal-laptop-hard-drive.html</link><author>noreply@blogger.com (inbox411)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEglF5owCFTcB-vFP82PU2qLi-_TzE2NnIHQ1GZokJukWaJX3LxX_LWAUgarkMB01pRYqPTExzps9_sZy7t7XkTXqkv9pLoRr_HVBq3Z3giADYqKs-f5Vy4z87HhSGSt1Ne9SpHaSX5ZDFE/s72-c/138588-front.jpg" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6925264790253362835.post-2184111783777343205</guid><pubDate>Sat, 29 Nov 2008 11:45:00 +0000</pubDate><atom:updated>2008-11-29T03:58:49.944-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">CPU</category><category domain="http://www.blogger.com/atom/ns#">dual core</category><category domain="http://www.blogger.com/atom/ns#">dual core processor</category><category domain="http://www.blogger.com/atom/ns#">Motherboard</category><title>What is an  Dual Core Processors</title><description>&lt;a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjYU4yP8d5qY7qMUWOPkVtaGXBbFAvFVP7cmKbc4YyFNcV5SqXl4xJBxIesYDBjfb4O5bRLygJHJsnMLbJYtDcoAtnyjivfNr6vxzDIyOgplYSLMsToAK1cdXL4018mkM1ZlSItJ5u0vFk/s1600-h/big_dc_compare2.png"&gt;&lt;img style="cursor: pointer; width: 320px; height: 192px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjYU4yP8d5qY7qMUWOPkVtaGXBbFAvFVP7cmKbc4YyFNcV5SqXl4xJBxIesYDBjfb4O5bRLygJHJsnMLbJYtDcoAtnyjivfNr6vxzDIyOgplYSLMsToAK1cdXL4018mkM1ZlSItJ5u0vFk/s320/big_dc_compare2.png" alt="" id="BLOGGER_PHOTO_ID_5274047252226099122" border="0" /&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;span id="ctl00_ctl00_ctl00_ctl00_bcr_bcr_bcr_bcr_preview"&gt;&lt;p&gt;&lt;span&gt;The dual core processor created quite a stir in the computer industry when it was first manufactured. It is great for anyone wishing to increase the speed at which they clock their computer. When shopping around for a dual core processor, it is essential to make the distinction between a “dual core processor” and a “dual processor”&lt;/span&gt;&lt;/p&gt; &lt;p&gt; &lt;/p&gt; &lt;p&gt;&lt;span&gt;To clarify, a “dual processor” is different than a "dual core processor" even though the terms sound quite similar. A dual processor means that a computer has two processors, each having a separate connection to the motherboard. However, a “dual core processor” involves two core processors, which are connected to a single socket.&lt;/span&gt;&lt;/p&gt; &lt;p&gt; &lt;/p&gt; &lt;p&gt;&lt;span&gt;The popularity of dual core processors is due to its characteristics of being able to magnify the speed that the computer “clocks” at. Dual core processors also make it easier to create smaller computers because they take up less space than a dual processor configuration. &lt;/span&gt;&lt;/p&gt; &lt;p&gt; &lt;/p&gt; &lt;p&gt;&lt;span&gt;Another reason for the popularity of a dual core processor is that it is more affordable than buying a computer with two processors and two motherboard sockets. &lt;/span&gt;&lt;/p&gt; &lt;p&gt;&lt;span&gt;A dual core processor is handy for computer users wanting to maximize the amount of activities they carry out on their computer. &lt;/span&gt;&lt;/p&gt; &lt;p&gt; &lt;/p&gt; &lt;p&gt;&lt;span&gt;If computer users are looking for a processor that can help them to multi task while using their computer, then a dual core processor is recommended. For example, computer users that are heavy gamers will need a computer that functions at top speed to enjoy the maximum effect of their game. &lt;/span&gt;&lt;/p&gt; &lt;p&gt; &lt;/p&gt; &lt;p&gt;&lt;span&gt;In terms of speed, a dual core processor has been shown to be faster, on average, than a computer with a single processor. Since the dual core processor is two processors with only a single motherboard socket, the dual processor is generally faster because there are two processors and two motherboard sockets. So, with all other factors being equal, a dual core processor will function, speed wise, somewhere in between that of a single processor and a dual processor.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Source: &lt;a href="http://www.brighthub.com"&gt;http://www.brighthub.com&lt;/a&gt;&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;&lt;/span&gt;</description><link>http://imeester.blogspot.com/2008/11/what-is-dual-core-processors.html</link><author>noreply@blogger.com (inbox411)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjYU4yP8d5qY7qMUWOPkVtaGXBbFAvFVP7cmKbc4YyFNcV5SqXl4xJBxIesYDBjfb4O5bRLygJHJsnMLbJYtDcoAtnyjivfNr6vxzDIyOgplYSLMsToAK1cdXL4018mkM1ZlSItJ5u0vFk/s72-c/big_dc_compare2.png" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6925264790253362835.post-2799486436007975896</guid><pubDate>Tue, 11 Nov 2008 10:18:00 +0000</pubDate><atom:updated>2008-11-29T03:44:33.569-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">DataTraveler Mini Slim</category><category domain="http://www.blogger.com/atom/ns#">Kingston</category><category domain="http://www.blogger.com/atom/ns#">Mini Slim USB</category><category domain="http://www.blogger.com/atom/ns#">USB Drive</category><title>Mini Slim USB Drive</title><description>&lt;span style="font-size:100%;"&gt;&lt;a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgO-QRzLLw7auJBC-kOQTSkD9fYRXQ8vMqhcuu9BcFMcxALS-lR1tmr5R5ruZ8p3yRntKF6tVPNCt_815ygyUsg_RUua6WHOacZUwOZV2Bvqrd_mo3LBfPSlAFXhQGnuL-9pvDdpUfwVQ8/s1600-h/kingston-minislim.jpg"&gt;&lt;img style="cursor: pointer; width: 320px; height: 223px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgO-QRzLLw7auJBC-kOQTSkD9fYRXQ8vMqhcuu9BcFMcxALS-lR1tmr5R5ruZ8p3yRntKF6tVPNCt_815ygyUsg_RUua6WHOacZUwOZV2Bvqrd_mo3LBfPSlAFXhQGnuL-9pvDdpUfwVQ8/s320/kingston-minislim.jpg" alt="" id="BLOGGER_PHOTO_ID_5267342653006292306" border="0" /&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;span class="intro"&gt;&lt;/span&gt;&lt;/span&gt;&lt;span align="justify" style=";font-family:verdana;font-size:100%;"  &gt;Kingston Technology has launched a new super thin DataTraveler Mini Slim USB Flash drive. Available in black, blue and pink with gray bottom casings, the new USB drives make a great fashion accessory by connecting to a keychain while storing up to 4GB of content, as per the company.&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style=";font-family:verdana;font-size:100%;"  &gt; "The DT Mini Slim lets anyone safely store and share their favourite media content everywhere they go with a little class and colour, in an ultra-small form factor," said Nitin Malhotra, country manager, India, Kingston.&lt;br /&gt;&lt;br /&gt;Kingston's DataTraveler Mini Slim USB Flash drive are compatible with Windows Vista (Windows ReadyBoost not supported), Windows XP (SP1, SP2), Windows 2000 (SP4), Mac OS X v.10.3.x+ and Linux v.2.6.x+.&lt;br /&gt;&lt;br /&gt;Kingston's new DataTraveler Mini Slim USB drives are available in 2GB and 4GB capacities. The new DT Mini Slim is backed by a two-year warranty. All the three drives -- DTMS/2GB (black), DTMSB/2GB (blue) and DTMSN/2GB (pink) -- are priced at Rs 455 (each).&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;h4&gt;&lt;span style="font-size:100%;"&gt;Meet The DataTraveler Family&lt;/span&gt;&lt;/h4&gt;&lt;span style="font-size:100%;"&gt;       Kingston's DataTraveler  USB Flash Drive is the latest in portable flash memory storage from the greatest name in        memory. Reliable and easy to use, it's the choice of corporations and consumers alike for securely storing, carrying        and transferring important digital files.  &lt;br /&gt;&lt;span style="font-size:85%;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=";font-family:verdana;font-size:85%;"  &gt;&lt;br /&gt;&lt;/span&gt;&lt;table style="width: 346px; height: 2128px;" border="1" cellpadding="4" cellspacing="0"&gt;&lt;tbody&gt;&lt;tr style="background-color: rgb(0, 69, 145);" align="center"&gt;&lt;td style="border-width: 0pt; background-color: rgb(255, 255, 255);" width="75"&gt;&lt;span style="font-size:85%;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/td&gt;        &lt;td class="td_cell_title" style="color: rgb(255, 255, 255);" width="75"&gt;&lt;span style="font-size:78%;"&gt;Type of USB&lt;/span&gt;&lt;/td&gt;         &lt;!--        &lt;td class="td_cell_title" style=" color:#FFFFFF;"&gt;Read/Write Speed*&lt;/td&gt; --&gt;        &lt;td class="td_cell_title" style="color: rgb(255, 255, 255);" width="125"&gt;&lt;span style="font-size:78%;"&gt;Special Features/&lt;br /&gt;&lt;/span&gt;&lt;span style="font-size:78%;"&gt;Capacities† / &lt;/span&gt;&lt;span style="font-size:78%;"&gt;Part Numbers&lt;/span&gt;&lt;/td&gt;                                  &lt;!--        &lt;td width="12%" style="border-width:0; background-color:#FFFFFF;"&gt; &lt;/td&gt;        &lt;td width="9%" class="td_cell_title" style=" color:#FFFFFF;"&gt;Type of USB&lt;/td&gt;        &lt;td width="10%" class="td_cell_title" style=" color:#FFFFFF;"&gt;Primary User&lt;/td&gt;        &lt;td width="30%" class="td_cell_title" style="color:#FFFFFF;"&gt;Special Features&lt;/td&gt;        &lt;td width="9%" class="td_cell_title" style="color:#FFFFFF;"&gt;Capacities&amp;dagger;&lt;/td&gt;        &lt;td width="7%" class="td_cell_title" style="color:#FFFFFF;"&gt;Read/Write Speed&lt;/td&gt;        &lt;td width="14%" class="td_cell_title" style="color:#FFFFFF;"&gt;Colors&lt;/td&gt;        &lt;td width="9%" class="td_cell_title" style="color:#FFFFFF;"&gt;Part Numbers&lt;/td&gt; --&gt;       &lt;/tr&gt;       &lt;tr align="center"&gt;        &lt;td style="border-width: 0pt;"&gt;&lt;span style="font-size:85%;"&gt;&lt;a href="http://www.kingston.com/flash/dtms.asp"&gt;&lt;img src="http://www.kingston.com/channelmarketingcenter/flash/product_images/DT_SLIM_8gb_ANGLE_GROUP_tn.jpg" border="0" /&gt;&lt;/a&gt;&lt;br /&gt;DataTraveler Mini Slim &lt;/span&gt;&lt;/td&gt;        &lt;td class="td_cell_text_small"&gt;&lt;span style="font-size:78%;"&gt;Standard&lt;/span&gt;&lt;/td&gt;         &lt;!--        &lt;td class="td_cell_text_small"&gt;Up to 6MB/s Read&lt;br /&gt;Up to 3MB/s Write&lt;/td&gt; --&gt;        &lt;td class="td_cell_text_small"&gt;&lt;span style="font-size:78%;"&gt;Works with Windows Vista™&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style="font-size:78%;"&gt;2GB - 8GB&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style="font-size:78%;"&gt;DTMS/xxx&lt;br /&gt;DTMSB/xxx&lt;br /&gt;DTMSN/xxx&lt;/span&gt;&lt;br /&gt;&lt;/td&gt;                                       &lt;/tr&gt;       &lt;tr align="center"&gt;        &lt;td style="border-width: 0pt;"&gt;&lt;span style="font-size:85%;"&gt;&lt;a href="http://www.kingston.com/flash/dt100.asp"&gt;&lt;img src="http://www.kingston.com/channelmarketingcenter/flash/product_images/DT100_open_angle_tn.jpg" border="0" /&gt;&lt;/a&gt;&lt;br /&gt;  DataTraveler 100 &lt;/span&gt;&lt;/td&gt;        &lt;td class="td_cell_text_small"&gt;&lt;span style="font-size:78%;"&gt;Standard&lt;/span&gt;&lt;/td&gt;         &lt;!--        &lt;td class="td_cell_text_small"&gt;Up to 6MB/s Read&lt;br /&gt;Up to 3MB/s Write&lt;/td&gt; --&gt;        &lt;td class="td_cell_text_small"&gt;&lt;span style="font-size:78%;"&gt;Works with Windows Vista™&lt;br /&gt;Capless design&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style="font-size:78%;"&gt;2GB - 16GB&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style="font-size:78%;"&gt;DT100/xxx&lt;br /&gt;DT100R/xxx&lt;br /&gt;DT100B/xxx&lt;/span&gt;&lt;br /&gt;&lt;/td&gt;                                       &lt;/tr&gt;                &lt;tr align="center"&gt;        &lt;td style="border-width: 0pt;"&gt;&lt;span style="font-size:85%;"&gt;&lt;a href="http://www.kingston.com/flash/dt101.asp"&gt;&lt;img src="http://www.kingston.com/flash/image_files/DT101_Group_tn.jpg" border="0" /&gt;&lt;/a&gt;&lt;br /&gt;  DataTraveler 101 &lt;/span&gt;&lt;/td&gt;        &lt;td class="td_cell_text_small"&gt;&lt;span style="font-size:78%;"&gt;Standard&lt;/span&gt;&lt;/td&gt;         &lt;!--        &lt;td class="td_cell_text_small"&gt;Up to 6MB/s Read&lt;br /&gt;Up to 3MB/s Write&lt;/td&gt; --&gt;        &lt;td class="td_cell_text_small"&gt;&lt;span style="font-size:78%;"&gt; Works with Windows Vista™&lt;br /&gt;Password protected&lt;br /&gt;Caplesss swivel design&lt;br /&gt;range of colors&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style="font-size:78%;"&gt;2GB - 8GB&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;/td&gt;                                       &lt;/tr&gt;       &lt;tr align="center"&gt;        &lt;td style="border-width: 0pt;"&gt;&lt;span style="font-size:85%;"&gt;&lt;a href="http://www.kingston.com/flash/dt110.asp"&gt;&lt;img src="http://www.kingston.com/flash/image_files/DT110_8GB_tn.jpg" border="0" /&gt;&lt;/a&gt;&lt;br /&gt;DataTraveler 110 &lt;/span&gt;&lt;/td&gt;        &lt;td class="td_cell_text_small"&gt;&lt;span style="font-size:78%;"&gt;Standard&lt;/span&gt;&lt;/td&gt;         &lt;!--        &lt;td class="td_cell_text_small"&gt;Up to 6MB/s Read&lt;br /&gt;Up to 3MB/s Write&lt;/td&gt; --&gt;        &lt;td class="td_cell_text_small"&gt;&lt;span style="font-size:78%;"&gt;Works with Windows Vista™&lt;br /&gt;Capless design&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style="font-size:78%;"&gt;1GB - 8GB&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style="font-size:78%;"&gt;DT110P/1GB&lt;br /&gt;DT110B/2GB&lt;br /&gt;DT110R/4GB&lt;br /&gt;DT110G/8GB&lt;/span&gt;&lt;br /&gt;&lt;/td&gt;                                       &lt;/tr&gt;       &lt;tr align="center"&gt;        &lt;td style="border-width: 0pt;"&gt;&lt;span style="font-size:85%;"&gt;&lt;a href="http://www.kingston.com/flash/dt150.asp"&gt;&lt;img src="http://www.kingston.com/flash/image_files/dt150-64gb.gif" border="0" /&gt;&lt;br /&gt;&lt;img src="http://www.kingston.com/flash/image_files/dt_150_tn.jpg" border="0" /&gt;&lt;/a&gt;&lt;br /&gt;DataTraveler 150 &lt;/span&gt;&lt;/td&gt;        &lt;td class="td_cell_text_small"&gt;&lt;span style="font-size:78%;"&gt;Standard&lt;/span&gt;&lt;/td&gt;         &lt;!--        &lt;td class="td_cell_text_small"&gt;Up to 6MB/s Read&lt;br /&gt;Up to 3MB/s Write&lt;/td&gt; --&gt;         &lt;td class="td_cell_text_small"&gt;&lt;span style="font-size:78%;"&gt;Works with Windows Vista™&lt;br /&gt;&lt;/span&gt;          &lt;p&gt;&lt;span style="font-size:78%;"&gt;Stores  cap securely on&lt;br /&gt;end of device to prevent&lt;br /&gt;loss of cap&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style="font-size:78%;"&gt;32GB - 64GB&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style="font-size:78%;"&gt;DT150/32GB&lt;br /&gt;DT150/64GB&lt;/span&gt;&lt;/p&gt;&lt;/td&gt;                                        &lt;/tr&gt;       &lt;tr align="center"&gt;        &lt;td style="border-width: 0pt;"&gt;&lt;span style="font-size:85%;"&gt;&lt;a href="http://www.kingston.com/flash/dt_style.asp"&gt;&lt;img src="http://www.kingston.com/flash/image_files/dt_style.jpg" border="0" /&gt;&lt;/a&gt;&lt;br /&gt;DataTraveler Style &lt;/span&gt;&lt;/td&gt;        &lt;td class="td_cell_text_small"&gt;&lt;span style="font-size:78%;"&gt;Standard&lt;/span&gt;&lt;/td&gt;         &lt;!--        &lt;td class="td_cell_text_small"&gt;Up to 6MB/s Read&lt;br /&gt;Up to 3MB/s Write&lt;/td&gt; --&gt;        &lt;td class="td_cell_text_small"&gt;&lt;span style="font-size:78%;"&gt;Personalize with changeable&lt;br /&gt;“Skins”&lt;br /&gt;Works With Windows Vista™&lt;br /&gt;Capless design&lt;br /&gt;Co-Logo available&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style="font-size:78%;"&gt;2GB, 8GB (White)&lt;br /&gt;2GB - 8GB (Black)&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style="font-size:78%;"&gt;DTYLW/xGB&lt;br /&gt;DTYLB/xGB&lt;/span&gt;&lt;br /&gt;&lt;/td&gt;                                       &lt;/tr&gt;              &lt;tr align="center"&gt;        &lt;td style="border-width: 0pt;"&gt;&lt;span style="font-size:85%;"&gt;&lt;a href="http://www.kingston.com/flash/datatraveler.asp"&gt;&lt;img src="http://www.kingston.com/flash/image_files/DTI_Group_Oct08.jpg" border="0" /&gt;&lt;/a&gt;&lt;br /&gt;DataTraveler&lt;/span&gt;&lt;/td&gt;        &lt;td class="td_cell_text_small"&gt;&lt;span style="font-size:78%;"&gt;Standard&lt;/span&gt;&lt;/td&gt;         &lt;!--        &lt;td class="td_cell_text_small"&gt;Up to 6MB/s Read&lt;br /&gt;Up to 3MB/s Write&lt;/td&gt; --&gt;        &lt;td class="td_cell_text_small"&gt;&lt;span style="font-size:78%;"&gt;Range of colors, Works with Windows Vista™ Co-Logo available&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style="font-size:78%;"&gt;2GB - 16GB&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style="font-size:78%;"&gt;DTI/xxx&lt;/span&gt;&lt;br /&gt;&lt;/td&gt;                                       &lt;/tr&gt;       &lt;tr align="center"&gt;        &lt;td style="border-width: 0pt;"&gt;&lt;span style="font-size:85%;"&gt;&lt;a href="http://www.kingston.com/flash/dt400.asp"&gt;&lt;img src="http://www.kingston.com/channelmarketingcenter/flash/product_images/dt400_8gb_angleTopOpen_tn.jpg" border="0" /&gt;&lt;/a&gt;&lt;br /&gt;DataTraveler 400 &lt;/span&gt;&lt;/td&gt;        &lt;td class="td_cell_text_small"&gt;&lt;span style="font-size:78%;"&gt;Multifunctional&lt;/span&gt;&lt;/td&gt;         &lt;!--        &lt;td class="td_cell_text_small"&gt;Up to 6MB/s Read&lt;br /&gt;Up to 3MB/s Write&lt;/td&gt; --&gt;        &lt;td class="td_cell_text_small"&gt;&lt;span style="font-size:78%;"&gt;Data, email and internet synchronization software (MigoSync)&lt;br /&gt;Password protection&lt;br /&gt;SecureTraveler)&lt;br /&gt;Works With Windows Vista™&lt;br /&gt;Enhanced for Windows Readyboost™**&lt;br /&gt;Co-Logo available&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style="font-size:78%;"&gt;2GB - 16GB&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style="font-size:78%;"&gt;DT400/xxx&lt;/span&gt;&lt;br /&gt;&lt;/td&gt;                                       &lt;/tr&gt;              &lt;tr align="center"&gt;        &lt;td style="border-width: 0pt;"&gt;&lt;span style="font-size:85%;"&gt;&lt;a href="http://www.kingston.com/flash/dt_HyperX.asp"&gt;&lt;img src="http://www.kingston.com/flash/image_files/DTHX_2GB_tn.jpg" border="0" /&gt;&lt;/a&gt;&lt;br /&gt;DataTraveler HyperX &lt;/span&gt;&lt;/td&gt;        &lt;td class="td_cell_text_small"&gt;&lt;span style="font-size:78%;"&gt;Standard&lt;/span&gt;&lt;/td&gt;         &lt;!--        &lt;td class="td_cell_text_small"&gt;Up to 6MB/s Read&lt;br /&gt;Up to 3MB/s Write&lt;/td&gt; --&gt;        &lt;td class="td_cell_text_small"&gt;&lt;span style="font-size:78%;"&gt;Works with Windows Vista™&lt;br /&gt;  Enhanced for Windows Readyboost™**&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style="font-size:78%;"&gt;2GB - 8GB&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style="font-size:78%;"&gt;DTHX/xxx&lt;/span&gt;&lt;br /&gt;&lt;/td&gt;                                       &lt;/tr&gt;                         &lt;!--   &lt;tr align="center"&gt;        &lt;td style="border-width:0"&gt;&lt;a href="http://www.kingston.com/flash/dt_II.asp"&gt;&lt;img src="http://www.kingston.com/press/image_files/flash/USB_DT_II_final_open_100.jpg" border="0" /&gt;&lt;/a&gt;&lt;br /&gt;DataTraveler II&lt;/td&gt;        &lt;td class="td_cell_text_small"&gt;Standard&lt;/td&gt;        &lt;td class="td_cell_text_small"&gt;Consumer, SMB&lt;/td&gt;         &lt;td class="td_cell_text_small"&gt;Up to 11MB/s Read&lt;br /&gt;Up to 7MB/s Write&lt;/td&gt;                 &lt;td class="td_cell_text_small"&gt;Password protection (SecureTraveler), Co-Logo&lt;/td&gt;        &lt;td class="td_cell_text_small"&gt;1GB - 8GB&lt;/td&gt;        &lt;td class="td_cell_text_small"&gt;11MB/sec&lt;br /&gt;7MB/sec&lt;/td&gt;        &lt;td class="td_cell_text_small"&gt;Silver&lt;/td&gt;        &lt;td class="td_cell_text_small"&gt;DTII/xxx&lt;/td&gt;       &lt;/tr&gt;    --&gt;           &lt;!-- Removed as of 7/2/2008 - but keeping here for a while... just in case.        &lt;tr align="center"&gt;        &lt;td style="border-width:0"&gt;&lt;a href="http://www.kingston.com/flash/dt_IIplusMigo.asp"&gt;&lt;img src="http://www.kingston.com/press/image_files/flash/DT2P_angle_open_100.jpg" border="0" /&gt;&lt;/a&gt;&lt;br /&gt;DataTraveler II Plus - m&lt;span style="color:red;"&gt;i&lt;/span&gt;go Edition&lt;/td&gt;        &lt;td class="td_cell_text_small"&gt;Multifunctional&lt;/td&gt;        &lt;td class="td_cell_text_small"&gt;Consumer, SMB, Corporate&lt;/td&gt;         &lt;td class="td_cell_text_small"&gt;Up to 19MB/s Read&lt;br /&gt;Up to 13MB/s Write&lt;/td&gt;                &lt;td class="td_cell_text_small"&gt;Data, email and internet synchronization software (Migo 3.0)&lt;br /&gt;Password protection (SecureTraveler)&lt;br /&gt;Co-Logo&lt;/td&gt;        &lt;td class="td_cell_text_small"&gt;1GB - 8GB&lt;/td&gt;        &lt;td class="td_cell_text_small"&gt;1-4GB:&lt;br /&gt;       19MB/sec&lt;br /&gt;       13MB/sec&lt;br /&gt;       8GB:&lt;br /&gt;11MB/sec&lt;br /&gt;7MB/sec&lt;/td&gt;        &lt;td class="td_cell_text_small"&gt;Dark Silver&lt;/td&gt;        &lt;td class="td_cell_text_small"&gt;DTII+M/xxx&lt;/td&gt;       &lt;/tr&gt; --&gt;       &lt;tr align="center"&gt;        &lt;td style="border-width: 0pt;"&gt;&lt;span style="font-size:85%;"&gt;&lt;a href="http://www.kingston.com/flash/dt_secure.asp"&gt;&lt;img src="http://www.kingston.com/press/image_files/flash/DTS_angleClosedBottom_100.jpg" border="0" /&gt;&lt;/a&gt;&lt;br /&gt;DataTraveler Secure&lt;/span&gt;&lt;/td&gt;        &lt;td class="td_cell_text_small"&gt;&lt;span style="font-size:78%;"&gt;256-AES Encrypted&lt;/span&gt;&lt;/td&gt;                &lt;td class="td_cell_text_small"&gt;&lt;span style="font-size:78%;"&gt;256-AES hardware-based encryption&lt;br /&gt;File access protection software (MyDataZone)&lt;br /&gt;Waterproof, Cologo&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style="font-size:78%;"&gt;1GB - 8GB&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;/td&gt;                                       &lt;/tr&gt;       &lt;tr align="center"&gt;        &lt;td style="border-width: 0pt;"&gt;&lt;span style="font-size:85%;"&gt;&lt;a href="http://www.kingston.com/flash/privacyusb.asp"&gt;&lt;img src="http://www.kingston.com/flash/image_files/DTSP100.jpg" border="0" /&gt;&lt;/a&gt;&lt;br /&gt;DataTraveler Secure - Privacy Edition&lt;/span&gt;&lt;/td&gt;        &lt;td class="td_cell_text_small"&gt;&lt;span style="font-size:78%;"&gt;256-AES Encrypted&lt;/span&gt;&lt;/td&gt;                &lt;td class="td_cell_text_small"&gt;&lt;span style="font-size:78%;"&gt;100% encrypted zone, Enforced complex password, Waterproof, Cologo&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style="font-size:78%;"&gt;1GB - 8GB&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style="font-size:78%;"&gt;DTSP/xxx&lt;/span&gt;&lt;br /&gt;&lt;/td&gt;                               &lt;/tr&gt;       &lt;tr align="center"&gt;        &lt;td style="border-width: 0pt;"&gt;&lt;span style="font-size:85%;"&gt;&lt;a href="http://www.kingston.com/flash/DTVault.asp"&gt;&lt;img src="http://www.kingston.com/flash/image_files/DTV_8GB_tn.jpg" border="0" /&gt;&lt;/a&gt;&lt;br /&gt;&lt;span class="td_cell_text_small"&gt;DataTraveler Vault &lt;/span&gt;&lt;/span&gt;        &lt;/td&gt;        &lt;td class="td_cell_text_small"&gt;&lt;span style="font-size:78%;"&gt;256-AES Encrypted &lt;/span&gt;&lt;/td&gt;                &lt;td class="td_cell_text_small"&gt;&lt;span style="font-size:78%;"&gt;256-AES hardware-based encryption, Assembled in the USA, TAA compliant, File access protection software (DTVaultLock), Waterproof, Cologo&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style="font-size:78%;"&gt;1GB - 16GB&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style="font-size:78%;"&gt;DTV/xxx&lt;/span&gt;&lt;br /&gt;&lt;/td&gt;                                       &lt;/tr&gt;       &lt;tr align="center"&gt;        &lt;td style="border-width: 0pt;"&gt;&lt;span style="font-size:85%;"&gt;&lt;a href="http://www.kingston.com/flash/DTVaultPrivacy.asp"&gt;&lt;img src="http://www.kingston.com/flash/image_files/DTVP_8GB_tn.jpg" border="0" /&gt;&lt;/a&gt;&lt;br /&gt;&lt;span class="td_cell_text_small"&gt;DataTraveler Vault - Privacy Edition&lt;/span&gt;&lt;/span&gt;        &lt;/td&gt;        &lt;td class="td_cell_text_small"&gt;&lt;span style="font-size:78%;"&gt;256-AES Encrypted&lt;/span&gt;&lt;/td&gt;                &lt;td class="td_cell_text_small"&gt;&lt;span style="font-size:78%;"&gt;100% encrypted zone, Assembled in the USA, TAA compliant, Enforced complex password, Waterproof, Cologo&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style="font-size:78%;"&gt;1GB - 16GB&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style="font-size:78%;"&gt;DTVP/xxx&lt;/span&gt;&lt;br /&gt;&lt;/td&gt;                                       &lt;/tr&gt;              &lt;tr&gt;        &lt;td style="border-width: 0pt;"&gt;&lt;span style="font-size:85%;"&gt; &lt;/span&gt;&lt;br /&gt;&lt;/td&gt;        &lt;td style="border-width: 0pt; text-align: left;" colspan="2" class="td_cell_text_footnote"&gt;&lt;span style="font-size:78%;"&gt;         * Speed may vary due to host hardware, software and usage.    &lt;br /&gt;&lt;br /&gt;   ** Available on systems installed with Windows Vista™    &lt;br /&gt;&lt;br /&gt;   † Please note: Some of the listed capacity is used for formatting and other functions and thus is not available          for data storage.  For more information, please consult Kingston's          &lt;a href="http://www.kingston.com/products/pdf_files/FlashMemGuide.pdf"&gt;Flash Memory Guide&lt;/a&gt;.    &lt;br /&gt;&lt;br /&gt;   THIS DOCUMENT SUBJECT TO CHANGE WITHOUT NOTICE    &lt;br /&gt;&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;span style="font-size:100%;"&gt;&lt;span style="font-size:85%;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;&lt;/span&gt;</description><link>http://imeester.blogspot.com/2008/11/mini-slim-usb-drive.html</link><author>noreply@blogger.com (inbox411)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgO-QRzLLw7auJBC-kOQTSkD9fYRXQ8vMqhcuu9BcFMcxALS-lR1tmr5R5ruZ8p3yRntKF6tVPNCt_815ygyUsg_RUua6WHOacZUwOZV2Bvqrd_mo3LBfPSlAFXhQGnuL-9pvDdpUfwVQ8/s72-c/kingston-minislim.jpg" width="72"/><thr:total>0</thr:total><enclosure length="976239" type="application/pdf" url="http://www.kingston.com/products/pdf_files/FlashMemGuide.pdf"/><itunes:explicit>no</itunes:explicit><itunes:subtitle>Kingston Technology has launched a new super thin DataTraveler Mini Slim USB Flash drive. Available in black, blue and pink with gray bottom casings, the new USB drives make a great fashion accessory by connecting to a keychain while storing up to 4GB of content, as per the company. "The DT Mini Slim lets anyone safely store and share their favourite media content everywhere they go with a little class and colour, in an ultra-small form factor," said Nitin Malhotra, country manager, India, Kingston. Kingston's DataTraveler Mini Slim USB Flash drive are compatible with Windows Vista (Windows ReadyBoost not supported), Windows XP (SP1, SP2), Windows 2000 (SP4), Mac OS X v.10.3.x+ and Linux v.2.6.x+. Kingston's new DataTraveler Mini Slim USB drives are available in 2GB and 4GB capacities. The new DT Mini Slim is backed by a two-year warranty. All the three drives -- DTMS/2GB (black), DTMSB/2GB (blue) and DTMSN/2GB (pink) -- are priced at Rs 455 (each). Meet The DataTraveler Family Kingston's DataTraveler USB Flash Drive is the latest in portable flash memory storage from the greatest name in memory. Reliable and easy to use, it's the choice of corporations and consumers alike for securely storing, carrying and transferring important digital files. Type of USB Read/Write Speed* -- Special Features/ Capacities† / Part Numbers Type of USB Primary User Special Features Capacities&amp;dagger; Read/Write Speed Colors Part Numbers -- DataTraveler Mini Slim Standard Up to 6MB/s Read Up to 3MB/s Write -- Works with Windows Vista™ 2GB - 8GB DTMS/xxx DTMSB/xxx DTMSN/xxx DataTraveler 100 Standard Up to 6MB/s Read Up to 3MB/s Write -- Works with Windows Vista™ Capless design 2GB - 16GB DT100/xxx DT100R/xxx DT100B/xxx DataTraveler 101 Standard Up to 6MB/s Read Up to 3MB/s Write -- Works with Windows Vista™ Password protected Caplesss swivel design range of colors 2GB - 8GB DataTraveler 110 Standard Up to 6MB/s Read Up to 3MB/s Write -- Works with Windows Vista™ Capless design 1GB - 8GB DT110P/1GB DT110B/2GB DT110R/4GB DT110G/8GB DataTraveler 150 Standard Up to 6MB/s Read Up to 3MB/s Write -- Works with Windows Vista™ Stores cap securely on end of device to prevent loss of cap 32GB - 64GB DT150/32GB DT150/64GB DataTraveler Style Standard Up to 6MB/s Read Up to 3MB/s Write -- Personalize with changeable “Skins” Works With Windows Vista™ Capless design Co-Logo available 2GB, 8GB (White) 2GB - 8GB (Black) DTYLW/xGB DTYLB/xGB DataTraveler Standard Up to 6MB/s Read Up to 3MB/s Write -- Range of colors, Works with Windows Vista™ Co-Logo available 2GB - 16GB DTI/xxx DataTraveler 400 Multifunctional Up to 6MB/s Read Up to 3MB/s Write -- Data, email and internet synchronization software (MigoSync) Password protection SecureTraveler) Works With Windows Vista™ Enhanced for Windows Readyboost™** Co-Logo available 2GB - 16GB DT400/xxx DataTraveler HyperX Standard Up to 6MB/s Read Up to 3MB/s Write -- Works with Windows Vista™ Enhanced for Windows Readyboost™** 2GB - 8GB DTHX/xxx DataTraveler II Standard Consumer, SMB Up to 11MB/s Read Up to 7MB/s Write Password protection (SecureTraveler), Co-Logo 1GB - 8GB 11MB/sec 7MB/sec Silver DTII/xxx -- DataTraveler II Plus - migo Edition Multifunctional Consumer, SMB, Corporate Up to 19MB/s Read Up to 13MB/s Write Data, email and internet synchronization software (Migo 3.0) Password protection (SecureTraveler) Co-Logo 1GB - 8GB 1-4GB: 19MB/sec 13MB/sec 8GB: 11MB/sec 7MB/sec Dark Silver DTII+M/xxx -- DataTraveler Secure 256-AES Encrypted 256-AES hardware-based encryption File access protection software (MyDataZone) Waterproof, Cologo 1GB - 8GB DataTraveler Secure - Privacy Edition 256-AES Encrypted 100% encrypted zone, Enforced complex password, Waterproof, Cologo 1GB - 8GB DTSP/xxx DataTraveler Vault 256-AES Encrypted 256-AES hardware-based encryption, Assembled in the USA, TAA compliant, File access protection software (DTVaultLock), Waterproof, Cologo 1GB - 16GB DTV/xxx DataTraveler Vault - Privacy Edition 256-AES Encrypted 100% encrypted zone, Assembled in the USA, TAA compliant, Enforced complex password, Waterproof, Cologo 1GB - 16GB DTVP/xxx * Speed may vary due to host hardware, software and usage. ** Available on systems installed with Windows Vista™ † Please note: Some of the listed capacity is used for formatting and other functions and thus is not available for data storage. For more information, please consult Kingston's Flash Memory Guide. THIS DOCUMENT SUBJECT TO CHANGE WITHOUT NOTICE</itunes:subtitle><itunes:author>noreply@blogger.com (inbox411)</itunes:author><itunes:summary>Kingston Technology has launched a new super thin DataTraveler Mini Slim USB Flash drive. Available in black, blue and pink with gray bottom casings, the new USB drives make a great fashion accessory by connecting to a keychain while storing up to 4GB of content, as per the company. "The DT Mini Slim lets anyone safely store and share their favourite media content everywhere they go with a little class and colour, in an ultra-small form factor," said Nitin Malhotra, country manager, India, Kingston. Kingston's DataTraveler Mini Slim USB Flash drive are compatible with Windows Vista (Windows ReadyBoost not supported), Windows XP (SP1, SP2), Windows 2000 (SP4), Mac OS X v.10.3.x+ and Linux v.2.6.x+. Kingston's new DataTraveler Mini Slim USB drives are available in 2GB and 4GB capacities. The new DT Mini Slim is backed by a two-year warranty. All the three drives -- DTMS/2GB (black), DTMSB/2GB (blue) and DTMSN/2GB (pink) -- are priced at Rs 455 (each). Meet The DataTraveler Family Kingston's DataTraveler USB Flash Drive is the latest in portable flash memory storage from the greatest name in memory. Reliable and easy to use, it's the choice of corporations and consumers alike for securely storing, carrying and transferring important digital files. Type of USB Read/Write Speed* -- Special Features/ Capacities† / Part Numbers Type of USB Primary User Special Features Capacities&amp;dagger; Read/Write Speed Colors Part Numbers -- DataTraveler Mini Slim Standard Up to 6MB/s Read Up to 3MB/s Write -- Works with Windows Vista™ 2GB - 8GB DTMS/xxx DTMSB/xxx DTMSN/xxx DataTraveler 100 Standard Up to 6MB/s Read Up to 3MB/s Write -- Works with Windows Vista™ Capless design 2GB - 16GB DT100/xxx DT100R/xxx DT100B/xxx DataTraveler 101 Standard Up to 6MB/s Read Up to 3MB/s Write -- Works with Windows Vista™ Password protected Caplesss swivel design range of colors 2GB - 8GB DataTraveler 110 Standard Up to 6MB/s Read Up to 3MB/s Write -- Works with Windows Vista™ Capless design 1GB - 8GB DT110P/1GB DT110B/2GB DT110R/4GB DT110G/8GB DataTraveler 150 Standard Up to 6MB/s Read Up to 3MB/s Write -- Works with Windows Vista™ Stores cap securely on end of device to prevent loss of cap 32GB - 64GB DT150/32GB DT150/64GB DataTraveler Style Standard Up to 6MB/s Read Up to 3MB/s Write -- Personalize with changeable “Skins” Works With Windows Vista™ Capless design Co-Logo available 2GB, 8GB (White) 2GB - 8GB (Black) DTYLW/xGB DTYLB/xGB DataTraveler Standard Up to 6MB/s Read Up to 3MB/s Write -- Range of colors, Works with Windows Vista™ Co-Logo available 2GB - 16GB DTI/xxx DataTraveler 400 Multifunctional Up to 6MB/s Read Up to 3MB/s Write -- Data, email and internet synchronization software (MigoSync) Password protection SecureTraveler) Works With Windows Vista™ Enhanced for Windows Readyboost™** Co-Logo available 2GB - 16GB DT400/xxx DataTraveler HyperX Standard Up to 6MB/s Read Up to 3MB/s Write -- Works with Windows Vista™ Enhanced for Windows Readyboost™** 2GB - 8GB DTHX/xxx DataTraveler II Standard Consumer, SMB Up to 11MB/s Read Up to 7MB/s Write Password protection (SecureTraveler), Co-Logo 1GB - 8GB 11MB/sec 7MB/sec Silver DTII/xxx -- DataTraveler II Plus - migo Edition Multifunctional Consumer, SMB, Corporate Up to 19MB/s Read Up to 13MB/s Write Data, email and internet synchronization software (Migo 3.0) Password protection (SecureTraveler) Co-Logo 1GB - 8GB 1-4GB: 19MB/sec 13MB/sec 8GB: 11MB/sec 7MB/sec Dark Silver DTII+M/xxx -- DataTraveler Secure 256-AES Encrypted 256-AES hardware-based encryption File access protection software (MyDataZone) Waterproof, Cologo 1GB - 8GB DataTraveler Secure - Privacy Edition 256-AES Encrypted 100% encrypted zone, Enforced complex password, Waterproof, Cologo 1GB - 8GB DTSP/xxx DataTraveler Vault 256-AES Encrypted 256-AES hardware-based encryption, Assembled in the USA, TAA compliant, File access protection software (DTVaultLock), Waterproof, Cologo 1GB - 16GB DTV/xxx DataTraveler Vault - Privacy Edition 256-AES Encrypted 100% encrypted zone, Assembled in the USA, TAA compliant, Enforced complex password, Waterproof, Cologo 1GB - 16GB DTVP/xxx * Speed may vary due to host hardware, software and usage. ** Available on systems installed with Windows Vista™ † Please note: Some of the listed capacity is used for formatting and other functions and thus is not available for data storage. For more information, please consult Kingston's Flash Memory Guide. THIS DOCUMENT SUBJECT TO CHANGE WITHOUT NOTICE</itunes:summary><itunes:keywords>DataTraveler Mini Slim, Kingston, Mini Slim USB, USB Drive</itunes:keywords></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6925264790253362835.post-4342098196637334555</guid><pubDate>Sat, 08 Nov 2008 12:08:00 +0000</pubDate><atom:updated>2008-11-08T04:12:20.290-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">a121</category><category domain="http://www.blogger.com/atom/ns#">VOODOO a121</category><category domain="http://www.blogger.com/atom/ns#">VOODOO OMEN</category><category domain="http://www.blogger.com/atom/ns#">VOODOO OMEN a121</category><title>VOODOO OMEN a121</title><description>&lt;a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiZDc_hUKNkxN6NTVObaJbb6gPL5GdK3ICG1X9UdZO9aRsBL6Kj3W9utZgqdzckAGFDvoOP1pMWlD5Ps7D_bpMUHnP7dXj2rDZzR7PjoCFM1CySQnxfwCGlXBTHP1Xj4giNFARF9hXO7FY/s1600-h/voodoo-omen.jpg"&gt;&lt;img style="cursor: pointer; width: 310px; height: 194px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiZDc_hUKNkxN6NTVObaJbb6gPL5GdK3ICG1X9UdZO9aRsBL6Kj3W9utZgqdzckAGFDvoOP1pMWlD5Ps7D_bpMUHnP7dXj2rDZzR7PjoCFM1CySQnxfwCGlXBTHP1Xj4giNFARF9hXO7FY/s320/voodoo-omen.jpg" alt="" id="BLOGGER_PHOTO_ID_5266257710822839698" border="0" /&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;p align="justify"&gt;The &lt;strong&gt;Voodoo Omen a121&lt;/strong&gt; is Voodoo PC’s newest attempt for the gaming  category. Its processor is the &lt;em&gt;AMD Athlon  64 FX&lt;/em&gt;; with an installed &lt;em&gt;RAM&lt;/em&gt; of &lt;em&gt;1024 MB&lt;/em&gt; and a &lt;em&gt;hard drive capacity&lt;/em&gt; of &lt;em&gt;1024  GB&lt;/em&gt;.  Its graphics card is a &lt;em&gt;GeForce 7800GTX SLI&lt;/em&gt; which is the latest in the market for 3D gaming. The PC’s primary optical drive is a dual layer DVD+ /-RW writer. For your visual pleasure, it has the &lt;em&gt;Omen a121’s LCD,&lt;/em&gt; an impressive 21-inch monitor. &lt;/p&gt; &lt;p align="justify"&gt;In the physical outlook of &lt;strong&gt;Omen a121&lt;/strong&gt;, it can be considered as a gamer’s eye candy. The transparent casing reveals a crafty internal design. A chromed mirror in the center acts as a divider to separate the heat generating parts from the other internal peripherals. The cooling tubes are filled with a blue liquid cooling agent to prevent the over-locked CPU and video cards to overheat. Voodoo over-locked its &lt;em&gt;Athlon  FX-57 processor&lt;/em&gt; to &lt;em&gt;3.0Ghz&lt;/em&gt; and  included 2 over-locked &lt;em&gt;GeForce7800 GTX KO  cards&lt;/em&gt;, which means that even in the highest quality of resolution (1600 x 1200) your game will run smoothly and stay as detailed as reality itself.  &lt;/p&gt; &lt;div align="justify"&gt;The &lt;strong&gt;Voodoo  Omen a121&lt;/strong&gt; is a gamer’s dream inside and out. The price, although in the high end range of PCs, is surely worth the investment, especially if you are a hardcore gamer. &lt;/div&gt;</description><link>http://imeester.blogspot.com/2008/11/voodoo-omen-a121.html</link><author>noreply@blogger.com (inbox411)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiZDc_hUKNkxN6NTVObaJbb6gPL5GdK3ICG1X9UdZO9aRsBL6Kj3W9utZgqdzckAGFDvoOP1pMWlD5Ps7D_bpMUHnP7dXj2rDZzR7PjoCFM1CySQnxfwCGlXBTHP1Xj4giNFARF9hXO7FY/s72-c/voodoo-omen.jpg" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6925264790253362835.post-3169399146050265121</guid><pubDate>Sat, 08 Nov 2008 12:04:00 +0000</pubDate><atom:updated>2008-11-08T04:08:14.459-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Cisnet</category><category domain="http://www.blogger.com/atom/ns#">Cisnet NASCAR PC</category><category domain="http://www.blogger.com/atom/ns#">NASCAR PC</category><category domain="http://www.blogger.com/atom/ns#">The Cisnet NASCAR PC</category><title>The Cisnet NASCAR PC</title><description>&lt;a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgWRxU0NYIRj8jiWQOmK6aBlYQmy-IROU4fWHR9xVWaDUlxzP4JZ7bx58FKAaat5KU9MypXrTLIx8ldtIeLOdwXNKZctlT6-qP-AN95wdMKze7RWv3Gk1dpXUL2gPZXu6UlLnCl23n_lHA/s1600-h/nascar-01.jpg"&gt;&lt;img style="cursor: pointer; width: 255px; height: 212px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgWRxU0NYIRj8jiWQOmK6aBlYQmy-IROU4fWHR9xVWaDUlxzP4JZ7bx58FKAaat5KU9MypXrTLIx8ldtIeLOdwXNKZctlT6-qP-AN95wdMKze7RWv3Gk1dpXUL2gPZXu6UlLnCl23n_lHA/s320/nascar-01.jpg" alt="" id="BLOGGER_PHOTO_ID_5266256818062632274" border="0" /&gt;&lt;/a&gt;&lt;br /&gt;&lt;p align="justify"&gt;If you are a fan of &lt;em&gt;NASACAR  Racing&lt;/em&gt; and are planning to purchase a brand new PC, then the &lt;strong&gt;Cisnet NASCAR PC &lt;/strong&gt;is the best and most  affordable desktop equipment for you. &lt;/p&gt; &lt;p align="justify"&gt;This desktop PC is certainly designed for the &lt;strong&gt;NASCAR&lt;/strong&gt; fanatics out there, for the greeting upon start up of the PC is “Gentlemen start our engine!” With the tweaking of its Windows XP operating system, most of the prominent icons (My Computer and Recycle bin icons) are designed to follow the NASCAR theme. The Windows Outlook of the Internet Explorer and Windows in general also fall into the said theme. The Windows Media Player has a unique volume control that looks like a racecar’s large center tachometer, adding to the maximum feel of a racing experience.&lt;/p&gt; &lt;p align="justify"&gt;The external features include an “Engine Start” button for power on/off functions, a water-screened design on the side panels featuring ten of the &lt;em&gt;best NASCAR teams&lt;/em&gt; up to  date.&lt;/p&gt;The &lt;strong&gt;NASCAR PC&lt;/strong&gt;’s  specs are above average, compared to others on its price range. It has an &lt;em&gt;AMD Athlon 64 3200+ processor&lt;/em&gt;; 512MB of  RAM, 160 GB hard drive, dual layer DVD writer, and an ATI integrated Radeon  Xpress 200 graphics. Due to the &lt;strong&gt;NASCAR  PC&lt;/strong&gt;’s compact design, the unit is only limited to two empty memory slots if ever you might want to expand the PC’s memory and storage capacity. A PCIe x16 slot, a PCIe x1 slot, and a regular PCI slot are the only ones available; there’s the TV out and surround sound connectors, 6 USB 2.0 ports or the single FireWire port. For those into racing games, you can connect a USB based steering wheel if you want to venture more in the simulation area of &lt;em&gt;NASCAR Racing&lt;/em&gt;.      &lt;div align="justify"&gt;As  an overall impression, the &lt;strong&gt;NASCAR PC&lt;/strong&gt; is of good value for an entry level PC, with its unique and attractive design, above-average internal specs and user-friendly operating and maintenance features.&lt;br /&gt;&lt;br /&gt;Source: &lt;a href="http://www.widgetsandgadgets.com"&gt;http://www.widgetsandgadgets.com&lt;/a&gt;&lt;br /&gt;&lt;/div&gt;</description><link>http://imeester.blogspot.com/2008/11/cisnet-nascar-pc.html</link><author>noreply@blogger.com (inbox411)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgWRxU0NYIRj8jiWQOmK6aBlYQmy-IROU4fWHR9xVWaDUlxzP4JZ7bx58FKAaat5KU9MypXrTLIx8ldtIeLOdwXNKZctlT6-qP-AN95wdMKze7RWv3Gk1dpXUL2gPZXu6UlLnCl23n_lHA/s72-c/nascar-01.jpg" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6925264790253362835.post-4703505818755865844</guid><pubDate>Sat, 08 Nov 2008 11:53:00 +0000</pubDate><atom:updated>2008-11-08T04:04:28.956-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">desktop computer</category><category domain="http://www.blogger.com/atom/ns#">sony</category><category domain="http://www.blogger.com/atom/ns#">Sony VaioRB40</category><category domain="http://www.blogger.com/atom/ns#">VaioRB40</category><title>Sony VaioRB40</title><description>&lt;a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgbmoL3n2YHjlzmcm7QY7QVagLxC7cu0kVf6_nRPJ31xJ0ROWdvZyflVvMn2EybfY3Kf89IowntzMFA5N9NVXl1epJvBBs-qGT12z2J1rMnwOwYqh3G0nZ5f5A-JwzaM0pbOzE5DVcaWV8/s1600-h/sonyvaioRB40.jpg"&gt;&lt;img style="cursor: pointer; width: 310px; height: 201px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgbmoL3n2YHjlzmcm7QY7QVagLxC7cu0kVf6_nRPJ31xJ0ROWdvZyflVvMn2EybfY3Kf89IowntzMFA5N9NVXl1epJvBBs-qGT12z2J1rMnwOwYqh3G0nZ5f5A-JwzaM0pbOzE5DVcaWV8/s320/sonyvaioRB40.jpg" alt="" id="BLOGGER_PHOTO_ID_5266253746329301074" border="0" /&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;span class="cap"&gt;Sony VaioRB40 Desktop Computer&lt;br /&gt;&lt;br /&gt;This is another installment from one of the world’s leading technological manufacturers. The Sony VAIO RB40 Desktop Computer is equipped with the latest hardware. This desktop computer opens the possibility of the expansion of your multimedia needs and at the same time giving you the convenience of what a pc should be, The pc’s specifications are listed in detail below, however some points must be specified for you to know the value of this device.&lt;br /&gt;&lt;br /&gt;The processor is Intel Pentium 4 with an installed memory of 512 MB. It can receive either from a Ddram or an Sdram.  The maximum memory can host up to 2 gigs of free space.&lt;br /&gt;&lt;br /&gt;The Sony VAIO RB40 desktop computer includes A DVD/ RW CD ROM drive for storage and reproduction purposes. For those of you who want to manage their music for their listening pleasure, or the photos taken, this PC has exclusive Sony softwares to suit your needs. There are slot types provided for the users to take advantage of since this is an exclusive offer only.  The ports are for PCI, Memory, CompactFlash Card, PCI Express x1, PCI Express x16, SmartMedia Card, Memory Stick, SD Memory Card, XD-Picture Card. The Sonic Stage Digital software will help you download and manage your music in your PC.  The Picture Gear Studio is incharge of your photo storage, sharing or enhancement.  The PC also features an advanced way of burning DVDs and cds.  With its dual layer capacity it burns DVDs and stores up to 8.5GB of recording capacity.&lt;br /&gt;&lt;br /&gt;Unleash your capacity for creativity with SONY VAIO RB40 Desktop computer. Customize your world through the digital and multimedia prowess that only Sony can give.&lt;br /&gt;&lt;br /&gt;&lt;span style="font-weight: bold;"&gt;CPU and Memory&lt;/span&gt;&lt;br /&gt;Processor Brand:  Intel&lt;br /&gt;Processor Class : Pentium 4&lt;br /&gt;Processor Speed: 3 GHz&lt;br /&gt;Installed Memory: 512 MB&lt;br /&gt;Bus Speed: 800 MHz&lt;br /&gt;Cache Size: 1 MB&lt;br /&gt;Memory Technology: DDR SDRAM&lt;br /&gt;Maximum Memory: 2 GB&lt;br /&gt;Number of Installed Processors: 1&lt;br /&gt;Maximum Number of Processors: 1&lt;br /&gt;System Chipset: Intel 915G Express&lt;br /&gt;&lt;br /&gt;&lt;span style="font-weight: bold;"&gt;Storage&lt;/span&gt;&lt;br /&gt;Included Drives: DVD±RW (+R double layer), CD-ROM&lt;br /&gt;Hard Drive Capacity: 200 GB&lt;br /&gt;CD Write Speed: 32 X&lt;br /&gt;CD Rewrite Speed: 24 X&lt;br /&gt;DVD Write Speed: 8x (DVD-R), 16x (DVD+R), 2.4x (DVD+R DL)&lt;br /&gt;Drive Controllers: Serial ATA&lt;br /&gt;CD Read Speed (2nd): 40 X&lt;br /&gt;&lt;br /&gt;&lt;span style="font-weight: bold;"&gt;Monitor and Graphics&lt;/span&gt;&lt;br /&gt;Video Integration: Integrated&lt;br /&gt;&lt;br /&gt;&lt;span style="font-weight: bold;"&gt;Communications and Networking&lt;/span&gt;&lt;br /&gt;Modem Speed: 56 Kbps&lt;br /&gt;Network Support: Ethernet, Fast Ethernet&lt;br /&gt;&lt;br /&gt;&lt;span style="font-weight: bold;"&gt;Connectors&lt;/span&gt;&lt;br /&gt;Interface Provided: Parallel Port, VGA, Ethernet&lt;br /&gt;&lt;br /&gt;&lt;span style="font-weight: bold;"&gt;Expansion&lt;/span&gt;&lt;br /&gt;Slot Types Provided: PCI, Memory, CompactFlash Card, PCI Express x1, PCI Express x16, SmartMedia Card, Memory Stick, SD Memory Card, XD-Picture Card&lt;br /&gt;&lt;br /&gt;&lt;span style="font-weight: bold;"&gt;Chassis and Power Supply&lt;/span&gt;&lt;br /&gt;Chassis Style: Tower&lt;br /&gt;&lt;br /&gt;&lt;span style="font-weight: bold;"&gt;Software&lt;/span&gt;&lt;br /&gt;Operating System: Microsoft Windows XP Home Edition&lt;br /&gt;Included Software: Drivers &amp;amp; Utilities, Corel WordPerfect, VAIO Help and Support, VAIO Update, VAIO Zone, Sonic RecordNow! 7, Sony SonicStage 2.1, Quicken 2005 New User Edition, Norton Internet Security (90 days subscription), InterVideo WinDVD, Sony Click to DVD, Sony PictureGear Studio, VAIO Media, Sony DVgate Plus, VAIO Recovery Wizard&lt;br /&gt;&lt;br /&gt;&lt;span style="font-weight: bold;"&gt;Dimensions and Weight&lt;/span&gt;&lt;br /&gt;Weight :   25.35 lbs&lt;br /&gt;&lt;br /&gt;&lt;span style="font-weight: bold;"&gt;General Product Info&lt;/span&gt;&lt;br /&gt;Input Devices: Mouse, Keyboard&lt;br /&gt;Also known as: Sony VAIO VGC-RB40, Sony VAIO RB40, Sony VAIO, Sony RB40, Sony VGC-RB40&lt;br /&gt;&lt;br /&gt;Manufacturer Part No.:&lt;span style="font-weight: bold;"&gt; &lt;/span&gt;VGC-RB40&lt;br /&gt;UPC: 027242676084&lt;br /&gt;Dimension: 16.9 in x 7.1 in x 15.2 in (HxWxD)&lt;br /&gt;&lt;br /&gt;Source: &lt;a href="http://www.widgetsandgadgets.com"&gt;http://www.widgetsandgadgets.com&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;</description><link>http://imeester.blogspot.com/2008/11/sony-vaiorb40.html</link><author>noreply@blogger.com (inbox411)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgbmoL3n2YHjlzmcm7QY7QVagLxC7cu0kVf6_nRPJ31xJ0ROWdvZyflVvMn2EybfY3Kf89IowntzMFA5N9NVXl1epJvBBs-qGT12z2J1rMnwOwYqh3G0nZ5f5A-JwzaM0pbOzE5DVcaWV8/s72-c/sonyvaioRB40.jpg" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6925264790253362835.post-5624075309455621146</guid><pubDate>Sat, 08 Nov 2008 11:47:00 +0000</pubDate><atom:updated>2008-11-08T03:49:50.541-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Apple G5</category><category domain="http://www.blogger.com/atom/ns#">The Apple Imac G5 (Isight)</category><title>The Apple Imac G5 (Isight)</title><description>&lt;a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjo21W8bjXSdj8EaA6BO84Yfrw6GMMMfMtl6e56g_XSwRY9m4LLZBxfEhrBH-AUqGTopGLkK_302EnsuswQIoHWBFWMnntEqi42L6eu48PwD3pbvEELdUkeHkKbcq3r347zoGj_5dn2c7Q/s1600-h/apple-imac-g5-02.jpg"&gt;&lt;img style="cursor: pointer; width: 250px; height: 247px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjo21W8bjXSdj8EaA6BO84Yfrw6GMMMfMtl6e56g_XSwRY9m4LLZBxfEhrBH-AUqGTopGLkK_302EnsuswQIoHWBFWMnntEqi42L6eu48PwD3pbvEELdUkeHkKbcq3r347zoGj_5dn2c7Q/s320/apple-imac-g5-02.jpg" alt="" id="BLOGGER_PHOTO_ID_5266252230018203746" border="0" /&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;The Apple iMac g5 is the 3rd installation of the company to the iMac series. The updated version of the pc makes it appear to have undergone a major evolution from its predecessors. If one looks at the physical structure carefully there is a noticeable change in terms of the outlook of the PC itself. The once brick-like design has taken a new form, now with sleek curves. The unit now looks better than ever.&lt;br /&gt;&lt;br /&gt;On the back panel one can find two firewire ports and three USB ports plus 2 more USB ports on the keyboard to make way for additional attachments. The power button has been moved from the back right to the back left to avoid any more unnecessary accidental turning off the computer when fixing the power source plug. One can jump easily to the wireless technology with iMac The PC has a built in 802.11g. AirPort Extreme for those who are always on the go and who would want to experience wireless networking features, and the Bluetooth 2.0+EDR technologies.&lt;br /&gt;&lt;br /&gt;The most outstanding feature of iMac g5 is its built in camera also known as iSight.  It is located above the monitor its main function can either be for videoconferencing or even snap some pictures or record video clips with the aid of the photo booth software with the monitor acting as a flash bulb. The iSight basically functions as a web cam.&lt;br /&gt;&lt;br /&gt;The iMac includes a whole new bundle of software to make the iMac the center of our digital life. Softwares included are:&lt;br /&gt;&lt;br /&gt;Mac OS v.10.4 Tiger:  This is an improved version of the OS with useful programs like the spotlight search technology, and new versions of the system applications like the Satari 2, Mail 2, Address book 4, iChat AV 3, iCal 2, Font book 2, DVD Player 4.5, Preview 3 and X code 3.&lt;br /&gt;&lt;br /&gt;In addition to the ones mentioned above other bundles include:&lt;br /&gt;&lt;br /&gt;Life 05 (with the latest versions of iTunes, iMovie, iPhoto, HD, iDVD and Garageband), Front Row, Photo booth, Appleworks, Quicken 2006 for Mac, Work ’05 (30-day trial version) 2006 World Book, Nanosaur 2, Marnle Glass Gold, and Microsoft Office for Mac (test-drive)&lt;br /&gt;&lt;br /&gt;Another innovation included in the package would be its remote known as the apple remote. With the front row interface that the pc could give, the user can control the pc from almost anywhere in the room. The front row interface comes with the function of the remote where you can control your music, movies and DVDs with the touch of a button.&lt;br /&gt;&lt;br /&gt;&lt;span style="font-weight: bold;"&gt;Here are the specs of Apple iMac G5 (iSight):&lt;/span&gt;&lt;br /&gt;Type: All-in-one, General Purpose, Media, Business&lt;br /&gt;Processor Family: Apple G5&lt;br /&gt;Installed RAM: 512 MB&lt;br /&gt;Hard Drive Capacity: 250 GB&lt;br /&gt;RAID: No&lt;br /&gt;Graphics Card: ATI Radeon x600&lt;br /&gt;Primary Optical Drive: Dual-Layer DVD+/-RW&lt;br /&gt;Secondary Optical Drive: None&lt;br /&gt;Monitor Type: LCD Widescreen&lt;br /&gt;Monitor Size: 17/ 20 inches&lt;br /&gt;&lt;br /&gt;Source: &lt;a href="http://www.widgetsandgadgets.com"&gt;http://www.widgetsandgadgets.com&lt;/a&gt;</description><link>http://imeester.blogspot.com/2008/11/apple-imac-g5-isight.html</link><author>noreply@blogger.com (inbox411)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjo21W8bjXSdj8EaA6BO84Yfrw6GMMMfMtl6e56g_XSwRY9m4LLZBxfEhrBH-AUqGTopGLkK_302EnsuswQIoHWBFWMnntEqi42L6eu48PwD3pbvEELdUkeHkKbcq3r347zoGj_5dn2c7Q/s72-c/apple-imac-g5-02.jpg" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6925264790253362835.post-2658437745658716650</guid><pubDate>Sat, 04 Oct 2008 10:15:00 +0000</pubDate><atom:updated>2008-10-04T04:51:49.526-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">firewall</category><category domain="http://www.blogger.com/atom/ns#">how firewalls work</category><category domain="http://www.blogger.com/atom/ns#">what is firewall</category><title/><description>&lt;span style="font-weight: bold;"&gt;&lt;span style="font-size:130%;"&gt;How Firewalls Work&lt;/span&gt;&lt;br /&gt;&lt;span style="font-size:100%;"&gt;by &lt;a href="http://www.howstuffworks.com/author-tyson.htm"&gt;Jeff Tyson&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;h3&gt;Inside this Article&lt;/h3&gt;  &lt;ol class="column" type="1"&gt;&lt;li&gt;&lt;a href="http://computer.howstuffworks.com/firewall.htm" class="on" onclick="var s=s_gi(s_account);void(s.tl(true,'o','How Firewalls Work : Top TOC : Page 0'));"&gt;Introduction to How Firewalls Work&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href="http://computer.howstuffworks.com/firewall1.htm" onclick="var s=s_gi(s_account);void(s.tl(true,'o','How Firewalls Work : Top TOC : Page 0'));"&gt;What Firewall Software Does&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href="http://computer.howstuffworks.com/firewall2.htm" onclick="var s=s_gi(s_account);void(s.tl(true,'o','How Firewalls Work : Top TOC : Page 0'));"&gt;Firewall Configuration&lt;/a&gt;&lt;/li&gt;&lt;/ol&gt; &lt;ol class="column" start="4" type="1"&gt;&lt;li&gt;&lt;a href="http://computer.howstuffworks.com/firewall3.htm" onclick="var s=s_gi(s_account);void(s.tl(true,'o','How Firewalls Work : Top TOC : Page 0'));"&gt;Why Firewall Security?&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href="http://computer.howstuffworks.com/firewall4.htm" onclick="var s=s_gi(s_account);void(s.tl(true,'o','How Firewalls Work : Top TOC : Page 0'));"&gt;Proxy Servers and DMZ&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href="http://computer.howstuffworks.com/firewall5.htm" onclick="var s=s_gi(s_account);void(s.tl(true,'o','How Firewalls Work : Top TOC : Page 0'));"&gt;Lots More Information&lt;/a&gt;&lt;/li&gt;&lt;li class="more"&gt;&lt;div class="moreBox" onmouseover="var s=s_gi(s_account);void(s.tl(true,'o','How Firewalls Work : See More TOC : Page 0'));"&gt;&lt;a href="http://computer.howstuffworks.com/computer-internet-security-channel.htm"&gt;See more »&lt;/a&gt;  &lt;/div&gt;&lt;/li&gt;&lt;/ol&gt;&lt;br /&gt;&lt;p style="text-align: justify;"&gt; If you have been using the Internet for any length of time, and especially if you work at a larger company and browse the Web while you are at work, you have probably heard the term &lt;strong&gt;firewall&lt;/strong&gt; used. For example, you often hear people in companies say things like, "I can't use that site because they won't let it through the firewall." &lt;/p&gt;&lt;p style="text-align: justify;"&gt; If you have a fast Internet connection into your home (either a &lt;a href="http://www.howstuffworks.com/dsl.htm"&gt;DSL connection&lt;/a&gt; or a &lt;a href="http://www.howstuffworks.com/cable-modem.htm"&gt;cable modem&lt;/a&gt;), you may have found yourself hearing about firewalls for your &lt;a href="http://www.howstuffworks.com/home-network.htm"&gt;home network&lt;/a&gt; as well. It turns out that a small home network has many of the same security issues that a large corporat&lt;/p&gt; &lt;p style="text-align: justify;"&gt;e network does. You can use a firewall to protect your home network and family from offensive Web sites and potential hackers.&lt;/p&gt;&lt;h3&gt;&lt;a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiftgxPCnKfLo6_nrNbA_kKft4ZlPJ-eLFbQ9q1042I5plVQhkLtroUIMD05ooizCA_V-9-UhgDhI_ke-85glglddGAwzBpSz-jmAIW2lkuZtFwwIrTWyUv0VucgF7xDuh4cFbYbuounRA/s1600-h/firewall.gif"&gt;&lt;img style="cursor: pointer; width: 359px; height: 182px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiftgxPCnKfLo6_nrNbA_kKft4ZlPJ-eLFbQ9q1042I5plVQhkLtroUIMD05ooizCA_V-9-UhgDhI_ke-85glglddGAwzBpSz-jmAIW2lkuZtFwwIrTWyUv0VucgF7xDuh4cFbYbuounRA/s320/firewall.gif" alt="" id="BLOGGER_PHOTO_ID_5253246977096062162" border="0" /&gt;&lt;/a&gt;&lt;/h3&gt; &lt;span style="font-weight: bold;"&gt;&lt;span style="font-size:100%;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;Basically, a firewall is a barrier to keep destructive forces away from your property. In fact, that's why its called a firewall. Its job is similar to a physical firewall that keeps a fire from spreading from one area to the next. As you read through this article, you will learn more about firewalls, how they work and what kinds of threats they can protect you from.</description><link>http://imeester.blogspot.com/2008/10/how-firewalls-work-by-jeff-tyson-inside.html</link><author>noreply@blogger.com (inbox411)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiftgxPCnKfLo6_nrNbA_kKft4ZlPJ-eLFbQ9q1042I5plVQhkLtroUIMD05ooizCA_V-9-UhgDhI_ke-85glglddGAwzBpSz-jmAIW2lkuZtFwwIrTWyUv0VucgF7xDuh4cFbYbuounRA/s72-c/firewall.gif" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6925264790253362835.post-6610586380804628497</guid><pubDate>Tue, 30 Sep 2008 12:20:00 +0000</pubDate><atom:updated>2008-09-30T06:01:24.153-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">hacker</category><category domain="http://www.blogger.com/atom/ns#">is your son a computer hacker? computer hacker</category><title/><description>&lt;a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgHos5ZQqw_mgicF66FWsbZftzgYk9arm9D-3a7ivIAQs04cDG1oSKl0k-sDW6OS9sOsy2EQy12VNIm75aQom5KGavZEaMiBl9eYF_505qsr9ezEG0NjKYgChl41WQK3bjPftHFGNZ7JDQ/s1600-h/Hacker.jpg"&gt;&lt;img style="cursor: pointer;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgHos5ZQqw_mgicF66FWsbZftzgYk9arm9D-3a7ivIAQs04cDG1oSKl0k-sDW6OS9sOsy2EQy12VNIm75aQom5KGavZEaMiBl9eYF_505qsr9ezEG0NjKYgChl41WQK3bjPftHFGNZ7JDQ/s320/Hacker.jpg" alt="" id="BLOGGER_PHOTO_ID_5251798683198302594" border="0" /&gt;&lt;/a&gt;&lt;br /&gt;&lt;span style="font-size:130%;"&gt;&lt;br /&gt;Is Your Son a Computer Hacker?&lt;/span&gt;&lt;br /&gt;&lt;span style="font-size:85%;"&gt;&lt;b&gt;Author:&lt;/b&gt;&lt;a href="http://www.adequacy.org/users/720/index.html"&gt;T Reginald Gibbons&lt;/a&gt;&lt;br /&gt;&lt;b&gt;Topic:&lt;/b&gt;&lt;a href="http://www.adequacy.org/index.topic.html#internet_idiocy"&gt;Internet Idiocy&lt;/a&gt;               &lt;b&gt;&lt;br /&gt;Posted:&lt;/b&gt;Dec 02, 2001&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;div style="text-align: justify;"&gt;&lt;span style="font-size:100%;"&gt;   As an enlightened, modern &lt;a href="http://s1.amazon.com/exec/varzea/ts/exchange-glance/Y01Y1268070Y7469210/adequacy-20"&gt;parent&lt;/a&gt;, I try to be as involved as possible in the lives of my six children. I encourage them to join team sports. I attend their teen parties with them to ensure no drinking or alcohol is on the premises. I keep a &lt;a href="http://s1.amazon.com/exec/varzea/glance-browse/Y02Y0921909Y2426340/adequacy-20"&gt;fatherly&lt;/a&gt; eye on the CDs they listen to and the shows they watch, the company they keep and the books they read. You could say I'm a model parent. My children have never failed to make me &lt;a href="http://s1.amazon.com/exec/varzea/glance-browse/Y02Y4248125Y0732691/adequacy-20"&gt;proud&lt;/a&gt;, and I can say without the slightest &lt;a href="http://www.amazon.com/exec/obidos/ASIN/156158231X/adequacy-20"&gt;embellishment&lt;/a&gt; that I have the finest family in the &lt;a href="http://www.usflag.org/"&gt;USA&lt;/a&gt;.    &lt;/span&gt;&lt;/div&gt;&lt;p style="text-align: justify;"&gt;&lt;span style="font-size:100%;"&gt;Two years ago, my wife Carol and I decided that our children's education would not be complete without some grounding in modern computers. To this end, we bought our children a brand new &lt;a href="http://www.compaq.com/"&gt;Compaq&lt;/a&gt; to learn with. The kids had a lot of fun using the handful of &lt;a href="http://www.amazon.com/exec/obidos/ASIN/0735613486/adequacy-20"&gt;application&lt;/a&gt; programs we'd bought, such as &lt;a href="http://www.adobe.com/"&gt;Adobe&lt;/a&gt;'s &lt;a href="http://www.amazon.com/exec/obidos/ASIN/B00004YNJJ/adequacy-20"&gt;Photoshop&lt;/a&gt; and &lt;a href="http://www.microsoft.com/"&gt;Microsoft&lt;/a&gt;'s &lt;a href="http://www.amazon.com/exec/obidos/ASIN/B00005B0C6/adequacy-20"&gt;Word&lt;/a&gt;, and my wife and I were pleased that our gift was received so well. Our son Peter was most entranced by the device, and became quite a pro at surfing the net. When Peter began to spend whole days on the machine, I became concerned, but Carol advised me to calm down, and that it was only a passing phase. I was content to bow to her experience as a mother, until our youngest daughter, Cindy, charged into the living room one night to &lt;a href="http://www.amazon.com/exec/obidos/ASIN/B00000IZMJ/adequacy-20"&gt;blurt&lt;/a&gt; out: "Peter is a computer hacker!"&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;&lt;p style="text-align: justify;"&gt;&lt;span style="font-size:100%;"&gt;As you can imagine, I was amazed. A computer hacker in my own &lt;a href="http://www.hemingway.org/images/House-turret256.JPG"&gt;house&lt;/a&gt;! I began to monitor my son's habits, to make certain that Cindy wasn't just &lt;a href="http://www.amazon.com/exec/obidos/ASIN/B00004WG5A/adequacy-20"&gt;telling stories&lt;/a&gt;, as she is prone to doing at times. &lt;/span&gt;&lt;/p&gt;&lt;p style="text-align: justify;"&gt;&lt;span style="font-size:100%;"&gt;After a few days of &lt;a href="http://www.adequacy.org/s1.amazon.com/exec/varzea/ts/exchange-glance/Y03Y3490725Y7094331/adequacy-20"&gt;investigation&lt;/a&gt;, and some research into computer hacking, I confronted Peter with the evidence. I'm afraid to say, this was the only time I have ever been truly disappointed in one of my children. We raised them to be &lt;a href="http://www.amazon.com/exec/obidos/ASIN/0226728129/adequacy-20"&gt;honest&lt;/a&gt; and to have &lt;a href="http://www.whitehouse.gov/president/gwbbio.html"&gt;integrity&lt;/a&gt;, and Peter &lt;a href="http://www.whitehouse.gov/history/presidents/bc42.html"&gt;betrayed the principles&lt;/a&gt; we tried to encourage in him, when he refused point blank to admit to his &lt;a href="http://s1.amazon.com/exec/varzea/ts/exchange-glance/Y03Y3164158Y1319640/adequacy-20"&gt;activities.&lt;/a&gt;&lt;a href="http://www.capitolhillblue.com/July1997/textofjul4.htm"&gt;denials&lt;/a&gt; continued for hours, and in the end, I was left with no choice but to ban him from using the computer until he is old enough to be &lt;a href="http://www.amazon.com/exec/obidos/ASIN/0691089582/adequacy-20"&gt;responsible&lt;/a&gt; for his actions.  His &lt;/span&gt;&lt;/p&gt;&lt;p style="text-align: justify;"&gt;&lt;span style="font-size:100%;"&gt;After going through this &lt;a href="http://s1.amazon.com/exec/varzea/ts/exchange-glance/Y04Y3769065Y6606319/adequacy-20"&gt;ordeal&lt;/a&gt; with my own family, I was left pondering how I could best help others in similar situations. I'd gained a lot of &lt;a href="http://www.amazon.com/exec/obidos/ASIN/0670030260/adequacy-20"&gt;knowledge&lt;/a&gt; over those few days regarding hackers. It's only right that I provide that information to other parents, in the hope that they will be able to tell if their children are &lt;a href="http://www.amazon.com/exec/obidos/ASIN/0884193748/adequacy-20"&gt;being drawn&lt;/a&gt; into the world of hacking. Perhaps other parents will be able to steer their sons back onto the straight and narrow before &lt;a href="http://www.amazon.com/exec/obidos/ASIN/B000001GX8/adequacy-20"&gt;extreme measures&lt;/a&gt; need to be employed. &lt;/span&gt;&lt;/p&gt;&lt;p style="text-align: justify;"&gt;&lt;span style="font-size:100%;"&gt;To this end, I have decided to publish the top ten signs that your son is a hacker. I advise any parents to &lt;a href="http://s1.amazon.com/exec/varzea/ts/exchange-glance/Y01Y1333938Y9036082/adequacy-20"&gt;read&lt;/a&gt; this list carefully and if their son matches the profile, they should take action. A smart parent will first try to reason with their son, before resorting to &lt;a href="http://www.amazon.com/exec/obidos/ASIN/0943990955/adequacy-20"&gt;groundings&lt;/a&gt;, or even &lt;a href="http://www.spanking.com/"&gt;spanking&lt;/a&gt;. I pride myself that I have never had to spank a child, and I hope this guide will help other parents to put a halt to their son's &lt;a href="http://www.amazon.com/exec/obidos/ASIN/0380788012/adequacy-20"&gt;misbehaviour&lt;/a&gt; before a spanking becomes necessary. &lt;/span&gt;&lt;/p&gt;&lt;p style="text-align: justify;"&gt;&lt;span style="font-size:100%;"&gt;&lt;b&gt;1. Has your son asked you to change ISPs?&lt;/b&gt;&lt;/span&gt; &lt;/p&gt;&lt;p style="text-align: justify;"&gt;&lt;span style="font-size:100%;"&gt;Most &lt;a href="http://s1.amazon.com/exec/varzea/ts/exchange-glance/Y04Y3090578Y4769781/adequacy-20"&gt;American families&lt;/a&gt; use &lt;a href="http://www.amazon.com/exec/obidos/ASIN/1890386456/adequacy-20"&gt;trusted&lt;/a&gt; and responsible Internet Service Providers, such as &lt;a href="http://www.aol.com/"&gt;AOL&lt;/a&gt;. These providers have a strict "No Hacking" policy, and take careful measures to ensure that your internet experience is enjoyable, educational and above all &lt;a href="http://www.amazon.com/exec/obidos/ASIN/0575042362/adequacy-20"&gt;legal&lt;/a&gt;. If your child is becoming a hacker, one of his first steps will be to request a change to &lt;a href="http://www.home.net/"&gt;a more hacker friendly provider&lt;/a&gt;. &lt;/span&gt;&lt;/p&gt;&lt;p style="text-align: justify;"&gt;&lt;span style="font-size:100%;"&gt;I would advise all parents to refuse this request. One of the reasons your son is interested in switching providers is to &lt;a href="http://www.amazon.com/exec/obidos/ASIN/B00005PJ8I/adequacy-20"&gt;get away&lt;/a&gt; from &lt;a href="http://www.amazon.com/exec/obidos/ASIN/0764534173/adequacy-20"&gt;AOL&lt;/a&gt;'s child safety filter. This filter is vital to any parent who wants his son to &lt;a href="http://www.amazon.com/exec/obidos/ASIN/B00005BC23/adequacy-20"&gt;enjoy the internet&lt;/a&gt; without the endangering him through exposure to "adult" content. It is best to stick with the protection &lt;a href="http://www.aol.com/"&gt;AOL&lt;/a&gt; provides, rather than using a &lt;a href="http://www.cyberpatrol.com/"&gt;home-based solution&lt;/a&gt;. If your son is becoming a hacker, he will be able to circumvent any home-based measures with surprising ease, using information gleaned from various hacker sites. &lt;/span&gt;&lt;/p&gt;&lt;p style="text-align: justify;"&gt;&lt;span style="font-size:100%;"&gt;&lt;b&gt;2. Are you finding programs on your computer that you don't remember installing?&lt;/b&gt;&lt;/span&gt; &lt;/p&gt;&lt;p style="text-align: justify;"&gt;&lt;span style="font-size:100%;"&gt;Your son will probably try to install some hacker software. He may attempt to conceal the presence of the software in some way, but you can usually find any new programs by reading through the programs listed under "Install/Remove Programs" in your &lt;a href="http://members.aol.com/motwn/page1.htm"&gt;control panel&lt;/a&gt;. Popular hacker software includes "Comet Cursor", "Bonzi Buddy" and "Flash". &lt;/span&gt;&lt;/p&gt;&lt;p style="text-align: justify;"&gt;&lt;span style="font-size:100%;"&gt;The best option is to confront your son with the evidence, and force him to remove the offending programs. He will probably try to install the software again, but you will be able to tell that this is happening, if your machine offers to "download" one of the hacker applications. If this happens, it is time to give your son a stern talking to, and possibly consider punishing him with a grounding. &lt;/span&gt;&lt;/p&gt;&lt;p style="text-align: justify;"&gt;&lt;span style="font-size:100%;"&gt;&lt;b&gt;3. Has your child asked for new hardware?&lt;/b&gt;&lt;/span&gt; &lt;/p&gt;&lt;p style="text-align: justify;"&gt;&lt;span style="font-size:100%;"&gt;Computer hackers are often  limited by conventional computer hardware. They may request &lt;a href="http://www.matrox.com/"&gt;"faster" video cards&lt;/a&gt;, and larger hard drives, or even more &lt;a href="http://www.amazon.com/exec/obidos/ASIN/0960170618/adequacy-20"&gt;memory&lt;/a&gt;. If your son starts requesting these devices, it is possible that he has a legitimate need. You can best ensure that you are buying legal, trustworthy hardware by only buying replacement parts from your computer's manufacturer. &lt;/span&gt;&lt;/p&gt;&lt;p style="text-align: justify;"&gt;&lt;span style="font-size:100%;"&gt;If your son has requested a new "processor" from a company called &lt;a href="http://www.amd.com/"&gt;"AMD"&lt;/a&gt;, this is genuine cause for alarm. &lt;a href="http://www.amd.com/"&gt;AMD&lt;/a&gt; is a third-world based company who make inferior, "knock-off" copies of &lt;a href="http://www.intel.com/"&gt;American processor chips&lt;/a&gt;. They use child labor extensively in their third world sweatshops, and they deliberately disable the security features that American &lt;a href="http://s1.amazon.com/exec/varzea/ts/exchange-glance/Y01Y3117867Y3420222/adequacy-20"&gt;processor&lt;/a&gt; makers, such as &lt;a href="http://www.intel.com/"&gt;Intel&lt;/a&gt;, use to prevent hacking. &lt;a href="http://www.amd.com/"&gt;AMD&lt;/a&gt; chips are never sold in stores, and you will most likely be told that you have to order them from internet sites. Do not buy this chip! This is one request that you must refuse your son, if you are to have any hope of &lt;a href="http://www.amazon.com/exec/obidos/ASIN/0415900042/adequacy-20"&gt;raising him well&lt;/a&gt;. &lt;/span&gt;&lt;/p&gt;&lt;p style="text-align: justify;"&gt;&lt;span style="font-size:100%;"&gt;&lt;b&gt;4. Does your child read hacking manuals?&lt;/b&gt;&lt;/span&gt; &lt;/p&gt;&lt;p style="text-align: justify;"&gt;&lt;span style="font-size:100%;"&gt;If you pay close attention to your son's reading &lt;a href="http://www.amazon.com/exec/obidos/ASIN/0880480467/adequacy-20"&gt;habits&lt;/a&gt;, as I do, you will be able to determine a great deal about his &lt;a href="http://www.amazon.com/exec/obidos/ASIN/155874942X/adequacy-20"&gt;opinions&lt;/a&gt; and &lt;a href="http://www.amazon.com/exec/obidos/ASIN/087474816X/adequacy-20"&gt;hobbies&lt;/a&gt;. Children are at their most impressionable in the teenage years. Any father who has had a &lt;a href="http://us.imdb.com/Title?0198021"&gt;seventeen year old daughter&lt;/a&gt; attempt to sneak out on a date wearing make up and perfume is well aware of the effect that improper influences can have on inexperienced minds. &lt;/span&gt;&lt;/p&gt;&lt;p style="text-align: justify;"&gt;&lt;span style="font-size:100%;"&gt;There are, unfortunately, many hacking manuals available in bookshops today. A few titles to be on the lookout for are: "Snow Crash" and "Cryptonomicon" by Neal Stephenson; "Neuromancer" by William Gibson; "Programming with Perl" by Timothy O'Reilly; "Geeks" by Jon Katz; "The Hacker Crackdown" by Bruce Sterling; "Microserfs" by Douglas Coupland; "Hackers" by Steven Levy; and "The Cathedral and the Bazaar" by Eric S. Raymond. &lt;/span&gt;&lt;/p&gt;&lt;p style="text-align: justify;"&gt;&lt;span style="font-size:100%;"&gt;If you find any of these hacking manuals in your child's possession, confiscate them immediately. You should also petition local booksellers to remove these titles from their shelves. You may meet with some resistance at first, but even booksellers have to bow to community pressure. &lt;/span&gt;&lt;/p&gt;&lt;p style="text-align: justify;"&gt;&lt;span style="font-size:100%;"&gt;&lt;b&gt;5. How much time does your child spend using the computer each day?&lt;/b&gt;&lt;/span&gt; &lt;/p&gt;&lt;p style="text-align: justify;"&gt;&lt;span style="font-size:100%;"&gt;If your son spends more than thirty minutes each day on the computer, he may be using it to DOS other peoples sites. DOSing involves gaining access to the "command prompt" on other people's machines, and using it to tie up &lt;a href="http://home.netscape.com/"&gt;vital internet services&lt;/a&gt;. This can take up to eight hours. If your son is doing this, he is breaking the &lt;a href="http://www.redwolfairsoft.com../images/review%20images/Super90%20M3/lapd%20m3.jpg"&gt;law&lt;/a&gt;, and you should stop him immediately. The safest policy is to limit your children's access to the computer to a maximum of forty-five minutes each day. &lt;/span&gt;&lt;/p&gt;&lt;p style="text-align: justify;"&gt;&lt;span style="font-size:100%;"&gt;&lt;b&gt;6. Does your son use Quake?&lt;/b&gt;&lt;/span&gt; &lt;/p&gt;&lt;p style="text-align: justify;"&gt;&lt;span style="font-size:100%;"&gt;Quake is an online virtual reality used by hackers. It is a popular meeting place and training ground, where they discuss hacking and train in the use of various firearms. Many hackers develop anti-social tendencies due to the use of this virtual world, and it may cause erratic behaviour at home and at school. &lt;/span&gt;&lt;/p&gt;&lt;p style="text-align: justify;"&gt;&lt;span style="font-size:100%;"&gt;If your son is using Quake, you should make hime understand that this is not acceptable to you. You should ensure all the firearms in your house are carefully locked away, and have &lt;a href="http://www.jpfo.org/triggerlocks.htm"&gt;trigger locks&lt;/a&gt; installed. You should also bring your concerns to the attention of his school. &lt;/span&gt;&lt;/p&gt;&lt;p style="text-align: justify;"&gt;&lt;span style="font-size:100%;"&gt;&lt;b&gt;7. Is your son becoming argumentative and surly in his social behaviour?&lt;/b&gt;&lt;/span&gt; &lt;/p&gt;&lt;p style="text-align: justify;"&gt;&lt;span style="font-size:100%;"&gt;As a child enters the electronic world of hacking, he may become disaffected with the real world. He may lose the ability to control his actions, or judge the rightness or wrongness of a course of behaviour. This will manifest itself soonest in the way he treats others. Those whom he disagrees with will be met with scorn, bitterness, and even foul language. He may utter threats of violence of a real or electronic nature. &lt;/span&gt;&lt;/p&gt;&lt;p style="text-align: justify;"&gt;&lt;span style="font-size:100%;"&gt;Even when confronted, your son will probably find it difficult to talk about this problem to you. He will probably claim that there is no problem, and that you are imagining things. He may tell you that it is you who has the problem, and you should "back off" and "stop smothering him." Do not allow yourself to be deceived. You are the only chance your son has, even if he doesn't understand the situation he is in. Keep trying to get through to him, no matter how much he retreats into himself. &lt;/span&gt;&lt;/p&gt;&lt;p style="text-align: justify;"&gt;&lt;span style="font-size:100%;"&gt;&lt;b&gt;8. Is your son obsessed with "Lunix"?&lt;/b&gt;&lt;/span&gt; &lt;/p&gt;&lt;p style="text-align: justify;"&gt;&lt;span style="font-size:100%;"&gt;&lt;a href="http://www.bsd.org/"&gt;BSD&lt;/a&gt;, &lt;a href="http://www.lunix.com/"&gt;Lunix&lt;/a&gt;, &lt;a href="http://www.debian.org/"&gt;Debian&lt;/a&gt; and &lt;a href="http://www.mandrake.com/"&gt;Mandrake&lt;/a&gt; are all versions of an &lt;a href="http://www.lunix.com/"&gt;illegal hacker operation system&lt;/a&gt;, invented by a &lt;a href="http://www.goldeneye.com/julian/boris.html"&gt;Soviet computer hacker&lt;/a&gt; named Linyos Torovoltos, before the Russians lost the Cold War. It is based on a program called "&lt;a href="http://www.xenix.org/"&gt;xenix&lt;/a&gt;", which was written by &lt;a href="http://www.microsoft.com/"&gt;Microsoft&lt;/a&gt; for the &lt;a href="http://www.usflag.org/"&gt;US government&lt;/a&gt;. These programs are used by hackers to break into other people's computer systems to steal credit card numbers. They may also be used to break into people's stereos to steal their music, using the "mp3" program. Torovoltos is a notorious hacker, responsible for writing many hacker programs, such as "telnet", which is used by hackers to connect to machines on the internet without using a &lt;a href="http://www.att.net/"&gt;telephone&lt;/a&gt;. &lt;/span&gt;&lt;/p&gt;&lt;p style="text-align: justify;"&gt;&lt;span style="font-size:100%;"&gt;Your son may try to install "&lt;a href="http://www.lunix.com/"&gt;lunix&lt;/a&gt;" on your hard drive. If he is careful, you may not notice its presence, however, &lt;a href="http://www.lunix.com/"&gt;lunix&lt;/a&gt; is a capricious beast, and if handled incorrectly, your son may damage your computer, and even break it completely by deleting Windows, at which point you will have to have your computer repaired by a &lt;a href="http://www.adequacy.org/users/70/index.html"&gt;professional&lt;/a&gt;. &lt;/span&gt;&lt;/p&gt;&lt;p style="text-align: justify;"&gt;&lt;span style="font-size:100%;"&gt;If you see the word "LILO" during your windows startup (just after you turn the machine on), your son has installed &lt;a href="http://www.lunix.com/"&gt;lunix&lt;/a&gt;. In order to get rid of it, you will have to send your computer back to the manufacturer, and have them fit a new hard drive. &lt;a href="http://www.lunix.com/"&gt;Lunix&lt;/a&gt; is extremely dangerous software, and cannot be removed without destroying part of your hard disk surface. &lt;/span&gt;&lt;/p&gt;&lt;p style="text-align: justify;"&gt;&lt;span style="font-size:100%;"&gt;&lt;b&gt;9. Has your son radically changed his appearance?&lt;/b&gt;&lt;/span&gt; &lt;/p&gt;&lt;p style="text-align: justify;"&gt;&lt;span style="font-size:100%;"&gt;If your son has undergone a sudden change in his style of dress, you may have a hacker on your hands. &lt;a href="http://www.geocities.com/syme1984/hackers_graphics/hackg02.gif"&gt;Hackers&lt;/a&gt; tend to dress in bright, day-glo colors. They may wear baggy pants, bright colored shirts and spiky hair dyed in bright colors to match their clothes. They may take to carrying "&lt;a href="http://glowproducts.com/quinten.jpg"&gt;glow-sticks&lt;/a&gt;" and some wear &lt;a href="http://media.chickclick.com/chickclick/image/culfea_rave_165.jpg"&gt;pacifiers&lt;/a&gt; around their necks. (I have no idea why they do this) There are many such hackers in schools today, and your son may have started to associate with them. If you notice that your son's group of friends includes people dressed like this, it is time to think about a severe curfew, to protect him from dangerous influences. &lt;/span&gt;&lt;/p&gt;&lt;p style="text-align: justify;"&gt;&lt;span style="font-size:100%;"&gt;&lt;b&gt;10. Is your son struggling academically?&lt;/b&gt;&lt;/span&gt; &lt;/p&gt;&lt;p style="text-align: justify;"&gt;&lt;span style="font-size:100%;"&gt;If your son is failing courses in school, or performing poorly on sports teams, he may be involved in a hacking group, such as the infamous "&lt;a href="http://time-stranger.net/otaku/"&gt;Otaku&lt;/a&gt;" hacker association. Excessive time spent on the computer, communicating with his fellow hackers may cause temporary damage to the eyes and brain, from the electromagnetic radiation. This will cause his marks to slip dramatically, particularly in difficult subjects such as Math, and Chemistry. In extreme cases, over-exposure to &lt;a href="http://www.yourneighborhooddoctor.com/computer-monitor-radiation-shield-dr.htm"&gt;computer radiation&lt;/a&gt; can cause schizophrenia, meningitis and other psychological diseases. Also, the reduction in exercise may cause him to lose muscle mass, and even to start gaining weight. For the sake of your child's mental and physical health, you must put a stop to his hacking, and limit his computer time drastically. &lt;/span&gt;&lt;/p&gt;&lt;div style="text-align: justify;"&gt;&lt;span style="font-size:100%;"&gt;I encourage all parents to read through this guide carefully. Your child's future may depend upon it. Hacking is an illegal and dangerous activity, that may land your child in &lt;a href="http://www.cdc.state.ca.us/facility/instfol.htm"&gt;prison&lt;/a&gt;, and tear your family apart. It cannot be taken too seriously.   &lt;br /&gt;&lt;br /&gt;Source: &lt;a href="http://www.adequacy.org/"&gt;http://www.adequacy.org/&lt;/a&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;</description><link>http://imeester.blogspot.com/2008/09/is-your-son-computer-hacker-author-t.html</link><author>noreply@blogger.com (inbox411)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgHos5ZQqw_mgicF66FWsbZftzgYk9arm9D-3a7ivIAQs04cDG1oSKl0k-sDW6OS9sOsy2EQy12VNIm75aQom5KGavZEaMiBl9eYF_505qsr9ezEG0NjKYgChl41WQK3bjPftHFGNZ7JDQ/s72-c/Hacker.jpg" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6925264790253362835.post-5876770717879299815</guid><pubDate>Tue, 30 Sep 2008 12:12:00 +0000</pubDate><atom:updated>2008-09-30T05:18:29.885-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">addict</category><category domain="http://www.blogger.com/atom/ns#">are you a computer addict</category><category domain="http://www.blogger.com/atom/ns#">computer</category><category domain="http://www.blogger.com/atom/ns#">computer addict</category><title/><description>&lt;a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgf4LY2t9XOyOAhVbmJIC3JMHD1VoUXGZ94_Z0bM6xwMU0CEbkYPoqiYBpZ89Vc9p_GJjJWvYIZlTG8MgbQJX-ch7xB3KWA_SnbZ57o899UpMSOUz6HuSK2tg2OwSvvVQHLIpRQIdkTf2s/s1600-h/17_nt_computer_addict_4.jpg"&gt;&lt;img style="cursor: pointer;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgf4LY2t9XOyOAhVbmJIC3JMHD1VoUXGZ94_Z0bM6xwMU0CEbkYPoqiYBpZ89Vc9p_GJjJWvYIZlTG8MgbQJX-ch7xB3KWA_SnbZ57o899UpMSOUz6HuSK2tg2OwSvvVQHLIpRQIdkTf2s/s320/17_nt_computer_addict_4.jpg" alt="" id="BLOGGER_PHOTO_ID_5251786459304605490" border="0" /&gt;&lt;/a&gt;&lt;br /&gt;&lt;table id="article_edit" border="0" cellpadding="0" cellspacing="0"&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td class="Heading"&gt;&lt;h1&gt;&lt;br /&gt;&lt;/h1&gt;&lt;h1&gt;Are you a computer addict?&lt;/h1&gt;&lt;/td&gt;        &lt;/tr&gt;    &lt;tr&gt;       &lt;td&gt;&lt;p class="para" align="left"&gt;By Reema Saffarini, Staff Reporter&lt;br /&gt;&lt;span style="color: rgb(179, 179, 179);"&gt;Published: February 17, 2008, 01:26&lt;/span&gt;&lt;/p&gt;&lt;/td&gt;    &lt;/tr&gt;       &lt;tr&gt;     &lt;td class="ArticleBody"&gt;      &lt;p class="para" align="left"&gt;&lt;span style="color: rgb(0, 0, 0);font-family:Verdana;font-size:85%;"  &gt; &lt;!--maxlength:12622--&gt; &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style="color: rgb(0, 0, 0);font-family:Verdana;font-size:85%;"  &gt;Do you or someone you know have OCD? And by that I mean Obsessive Computer Disorder! Yes, it is certainly not a registered, real medical term, but it does somehow convey the idea.&lt;br /&gt;&lt;br /&gt;Simply ask yourself this question: Can you imagine yourself going about your life for a day without checking your email, browsing the net to download music and movies, replying to your Facebook messages or even playing that computer game you have become so obsessed with?&lt;br /&gt;&lt;br /&gt;If you can do it, well … many can't. Why? Because being glued to the computer screen has become as important as breathing and eating to many.&lt;br /&gt;&lt;br /&gt;Computer addiction is a reality, even though there is no "psychological" diagnosis for it, according to American University of Sharjah (AUS) student counsellor Dr Mona Mergani. It may not be listed in the giant Diagnostic and Statistical Manual of Mental Disorders as a form of addiction, but like any other type of dependency it affects family and friends.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;A lifestyle&lt;/strong&gt;&lt;br /&gt;&lt;br /&gt;Ahmad Abu Hattab, an electrical engineering senior at AUS, gets upset if a day passes without his going online to check his email and chat. In fact, he spends an average of five to six hours daily watching television shows online, downloading movies and chatting with friends.&lt;br /&gt;&lt;br /&gt;"I spend a lot of hours on the computer at the university because there isn't much else to do. At home it is a different case. As I live in a dorm and do not have a television set in my room, you will find me most of the time on the computer," he said.&lt;br /&gt;&lt;br /&gt;Even the phrase "taking a break from work" no longer means moving away from your machine. "Now when you want to take a break, you log on to Facebook to see who left you a message and if you want to talk to somebody, just log on to MSN Messenger and start chatting," said Ahmad.&lt;br /&gt;&lt;br /&gt;Arif Khan, hotel management student at the European International College for Hotel Management and Tourism in Abu Dhabi, also spends an average of six hours a day at his computer. "I think I am a computer addict and I can't go through a day without checking my email and messages. I need to read at least the emails even if I cannot reply," he said.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Assignments and research&lt;/strong&gt;&lt;br /&gt;&lt;br /&gt;However, not everyone who spends that many hours at the computer is an addict. Bashar Tariq, a third-year architecture student, is constantly logged on to his university email because of the demands of his studies.&lt;br /&gt;&lt;br /&gt;"I always get my assignments through email, information about competitions and contests … things that are directly related to my work. I check my email regularly even during holidays because of that. It is true that I am usually connected to MSN and my Facebook is always on, but I do not chat or message friends while I am working," he said.&lt;br /&gt;&lt;br /&gt;"I have seen though some students who are willing to skip classes to stay online and play computer games."&lt;br /&gt;&lt;br /&gt;Bashar's brother, however, spends an average of two hours at his computer. Omar Tariq, an electrical engineering student at the Ajman University of Science and Technology (AUST), says that he does not care if he doesn't check his online messages for a day or two.&lt;br /&gt;&lt;br /&gt;"I don't consider myself a computer addict. In fact I think that computer addiction causes people to become isolated, anti-social and incapable of dealing with people directly," he said. "Add to that the physical problems like back pain or eye damage."&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Depression, back pain and blinking problems&lt;/strong&gt;&lt;br /&gt;&lt;br /&gt;Omar is not off the mark when he speaks about the consequences of computer addiction. Dr Mergani says that the most immediate negative effects are social.&lt;br /&gt;&lt;br /&gt;"Relationships begin to wither as the user stops attending social gatherings, skips meetings with friends and avoids family members to get more computer time. Even when computer addicts interact with their friends, they may become irritable when away from the computer," she said.&lt;br /&gt;&lt;br /&gt;Excessive computer use can take an emotional toll. Users may gradually withdraw into an artificial world.&lt;br /&gt;&lt;br /&gt;"Constant computer gaming can cause someone to place more emotional value on events within the game than things happening in their real lives," said Mergani.&lt;br /&gt;&lt;br /&gt;Other effects also include getting nervous if computer users let a day go by without checking their e-mail and thinking longingly about their computer when they are not using it.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Eating disorders and computer addiction&lt;/strong&gt;&lt;br /&gt;&lt;br /&gt;This destructive electronic love affair, according to Mergani, may not only cause emotional damage but also lead to repetitive stress injuries, back problems, sleep deprivation, obesity, eating irregularities and the failure to blink, resulting in migraines.&lt;br /&gt;&lt;br /&gt;Luckily, though, there is a cure.&lt;br /&gt;&lt;br /&gt;"Like any addiction, this one can be treated. I believe that one of the most effective methods to deal with all these types of problems is Cognitive Behaviour Therapy, which teaches the individual to identify the problem, solve it and learn coping skills to prevent a relapse," she said.&lt;br /&gt;&lt;br /&gt;Treatment, she said, must be similar to that given for an eating disorder where the aim is to help the patient normalise their behaviour in order to survive. "A combination of cognitive behaviour therapy and motivational interviewing are the most helpful to the patient. Treating the depression and anxiety with antidepressants is also recommended," said Mergani.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;It can happen to you&lt;/strong&gt;&lt;br /&gt;&lt;br /&gt;It is easy to read about issues like computer addiction and brush them off as something that can never happen to us … after all it is always "others" who suffer.&lt;br /&gt;&lt;br /&gt;Students and professors, however, can easily fall into this cyber trap. According to Mergani, university campuses are "ripe" for internet overuse. This is generally because of "free and unlimited internet access, huge blocks of unstructured time, newly experienced freedom away from parental control, the desire to escape college stress and social intimidation and alienation."&lt;br /&gt;&lt;br /&gt;It maybe true that it is hard to go about our life without spending at least an hour in front of our beloved machines every day, however, the key to avoiding this addiction is moderation.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Questions to ask yourself to test if you are a computer addict:&lt;/strong&gt;&lt;br /&gt;&lt;br /&gt;According to an ABCnews.com interview with Psychologist Dr Dave Greenfield, a nationally and internationally recognised expert in the study and treatment of all forms of internet abuse and behaviours associated with addictions linked to technology, these are some questions you need to ask yourself:&lt;/span&gt;&lt;/p&gt; &lt;ul&gt;&lt;span style="color: rgb(0, 0, 0);font-family:Verdana;font-size:85%;"  &gt;    &lt;li&gt;Are you spending an excessive amount of time online? &lt;/li&gt;     &lt;li&gt;Are you preoccupied with the internet? &lt;/li&gt;     &lt;li&gt;Are you keeping it a secret from people? &lt;/li&gt;     &lt;li&gt;Do other people think you might have a problem? &lt;/li&gt;     &lt;li&gt;Do you experience intense intimacy while online? &lt;/li&gt;     &lt;li&gt;Can you not wait to go online or to use the computer? &lt;/li&gt; &lt;/span&gt;&lt;/ul&gt; &lt;p&gt;&lt;span style="color: rgb(0, 0, 0);font-family:Verdana;font-size:85%;"  &gt;&lt;em&gt;— Information courtesy of:www.virtual-addiction.com&lt;/em&gt;&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Psychological symptoms of computer addiction:&lt;/strong&gt; &lt;/span&gt;&lt;/p&gt; &lt;ul&gt;&lt;span style="color: rgb(0, 0, 0);font-family:Verdana;font-size:85%;"  &gt;    &lt;li&gt;Having a sense of well-being or euphoria while using the computer; &lt;/li&gt;     &lt;li&gt;Inability to stop the activity; &lt;/li&gt;     &lt;li&gt;Craving more and more time at the computer; &lt;/li&gt;     &lt;li&gt;Neglecting family and friends; &lt;/li&gt;     &lt;li&gt;Feeling empty, depressed, irritable when not at the computer;  &lt;/li&gt;     &lt;li&gt;Lying to employers and family about activities; &lt;/li&gt;     &lt;li&gt;Problems with school or job. &lt;/li&gt; &lt;/span&gt;&lt;/ul&gt; &lt;p&gt;&lt;span style="color: rgb(0, 0, 0);font-family:Verdana;font-size:85%;"  &gt;&lt;em&gt;— Information courtesy of: &lt;a href="http://www.computeraddiction.com/"&gt;www.computeraddiction.com&lt;/a&gt;&lt;/em&gt;&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Advice on how to survive computer addiction&lt;/strong&gt; &lt;/span&gt;&lt;/p&gt; &lt;ul&gt;&lt;span style="color: rgb(0, 0, 0);font-family:Verdana;font-size:85%;"  &gt;    &lt;li&gt;Avoid relapsing. One of the keys to recovery is creating your new schedule that stresses brief but regular periods of online use. &lt;/li&gt;     &lt;li&gt;Be patient with yourself. Give recovery time. Real-life change takes longer than the instant intimacy and satisfaction you are used to from the internet. &lt;/li&gt;     &lt;li&gt;Give yourself credit for trying. It is natural to feel embarrassed or ashamed that you got hooked on the internet and can't seem to handle the problem overnight.  &lt;/li&gt;     &lt;li&gt;Tune in to your addictive triggers. Recognising the emotions fuelling your online use, you will be much better able to make healthy decisions at the key points in your recovery. &lt;/li&gt;     &lt;li&gt;Get your loved ones on board. You may want to work with loved ones to clarify and finalise your recovery goals and steps. &lt;/li&gt;     &lt;li&gt;Make specific time limits. Set an alarm to go off in one hour and end computer time when it rings. &lt;/li&gt;     &lt;li&gt;Set aside "computer-free" parts of the day. If your computer use starts after dinner and extends into the night, get all your computer work done in the morning and don't touch it after dinner. &lt;/li&gt;     &lt;li&gt;Install software to restrict your access to web sites that you visit compulsively. &lt;/li&gt;     &lt;li&gt;Make a list of things you could be accomplishing instead of wasting time on the computer and post it prominently near your monitor. &lt;/li&gt;     &lt;li&gt;Enlist family members to help encourage you to limit your use. It might be difficult to stop on your own. &lt;/li&gt;     &lt;li&gt;Put the computer in high-traffic area of the house. With others looking over your shoulder all the time, you'll be less likely to overuse the computer. &lt;/li&gt; &lt;/span&gt;&lt;/ul&gt; &lt;p&gt;&lt;span style="color: rgb(0, 0, 0);font-family:Verdana;font-size:85%;"  &gt;&lt;em&gt;— Information courtesy of Dr Mona Mergani, student counsellor at the American University of Sharjah&lt;/em&gt;&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;How many hours a day do you spend on the computer?&lt;br /&gt;&lt;/strong&gt;&lt;em&gt;— Compiled by Maysam Ali/Staff Reporter&lt;/em&gt;&lt;br /&gt;&lt;br /&gt;"I spend around two to three hours a day. I check Facebook, chat on MSN, and also use it for research."&lt;br /&gt;&lt;em&gt;— Sara Meslmani, business administration, American University in Dubai (AUD)&lt;/em&gt;&lt;br /&gt;&lt;br /&gt;"I spend six to seven hours a day. I watch movies, check my mail and play poker on Facebook."&lt;br /&gt;&lt;em&gt;— Yamin Darwish, finance, AUD&lt;/em&gt;&lt;br /&gt;&lt;br /&gt;"I use it for two hours. I check my email and do some research on the internet for academic projects and for work."&lt;br /&gt;— Darwish Ahmad, industrial engineering, Alhosn University&lt;br /&gt;&lt;br /&gt;"I use the internet for around two hours, basically for msn and checking my email."&lt;br /&gt;&lt;em&gt;— Gazi Al Janahi, electronics engineering, Dubai Men's College (DMC)&lt;/em&gt;&lt;br /&gt;&lt;br /&gt;"I spend more than five hours a day on my computer. I use it mainly for checking my email, research and just surfing the net."&lt;br /&gt;&lt;em&gt;— Faisal Al Saffar, BBA and financial services, DMC&lt;/em&gt;&lt;br /&gt;&lt;br /&gt;"I spend most of my time on the computer, more than six hours a day. I use it for browsing the internet, downloading music, videos and applications."&lt;br /&gt;&lt;em&gt;— Tom Thomas, BBA, Mahatma Gandhi University Off-Campus Centre&lt;/em&gt;&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;How can you break computer addiction?&lt;/strong&gt;&lt;br /&gt;&lt;em&gt;— Compiled by Manal Ismail/Staff Reporter&lt;/em&gt;&lt;br /&gt;&lt;br /&gt;"By increasing the number of extra-&lt;br /&gt;curricular activities available to students."&lt;br /&gt;&lt;em&gt;— Rafay Ahmad, MBA, Szabist&lt;/em&gt;&lt;br /&gt;&lt;br /&gt;"Technology has become an important part of our lives that we can't avoid."&lt;br /&gt;—Adeel Quraishi, BBA, University of Wollongong in Dubai (UOWD)&lt;br /&gt;&lt;br /&gt;"By engaging students in more outdoor activities. "&lt;br /&gt;— Faraz Khan, finance, UOWD&lt;br /&gt;&lt;br /&gt;"The administration should reduce the dependence on computers inside the classroom. They should also make them not so easily available."&lt;br /&gt;&lt;em&gt;— Kulsoom Usmani, BBA, UOWD&lt;/em&gt;&lt;br /&gt;&lt;br /&gt;"Internet usage should be reduced in and outside the classroom. The net is the main cause for computer addiction."&lt;br /&gt;&lt;em&gt;— Mohammad Quraishi, accounting and finance, London School of Economics&lt;/em&gt;&lt;br /&gt;&lt;br /&gt;"Students should be involved in other activities such as sports, music and art."&lt;br /&gt;&lt;em&gt;— Atif Nafis, banking and finance, London School of Economics&lt;/em&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;span style="color: rgb(0, 0, 0);font-family:Verdana;font-size:85%;"  &gt;&lt;em&gt;&lt;/em&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style="color: rgb(0, 0, 0);font-family:Verdana;font-size:85%;"  &gt;&lt;em&gt;Source: &lt;a href="http://archive.gulfnews.com/"&gt;http://archive.gulfnews.com/&lt;/a&gt;&lt;br /&gt;&lt;/em&gt; &lt;/span&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;</description><link>http://imeester.blogspot.com/2008/09/are-you-computer-addict-by-reema.html</link><author>noreply@blogger.com (inbox411)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgf4LY2t9XOyOAhVbmJIC3JMHD1VoUXGZ94_Z0bM6xwMU0CEbkYPoqiYBpZ89Vc9p_GJjJWvYIZlTG8MgbQJX-ch7xB3KWA_SnbZ57o899UpMSOUz6HuSK2tg2OwSvvVQHLIpRQIdkTf2s/s72-c/17_nt_computer_addict_4.jpg" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6925264790253362835.post-4162043141635998283</guid><pubDate>Mon, 22 Sep 2008 09:46:00 +0000</pubDate><atom:updated>2008-09-22T03:01:07.688-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">differences between linux and windows</category><category domain="http://www.blogger.com/atom/ns#">linux</category><category domain="http://www.blogger.com/atom/ns#">linux vs windows</category><category domain="http://www.blogger.com/atom/ns#">windows</category><title>10 Major Differences Between Linux And Windows</title><description>&lt;a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEikdcDT1HcAyUidpuYi7YiNQsjlwTw8wbVlTpmaePDSdPUzA2pLkO6s3SP-hTeyaaESCoyoedSRZanwLBR8PoT8nETtEjvYWrFhJXrq78JGdpYLpRNEKYfbFN5kWHIUirH9JwubgPxcHB8/s1600-h/linuxdj2.jpg"&gt;&lt;img style="cursor: pointer;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEikdcDT1HcAyUidpuYi7YiNQsjlwTw8wbVlTpmaePDSdPUzA2pLkO6s3SP-hTeyaaESCoyoedSRZanwLBR8PoT8nETtEjvYWrFhJXrq78JGdpYLpRNEKYfbFN5kWHIUirH9JwubgPxcHB8/s320/linuxdj2.jpg" alt="" id="BLOGGER_PHOTO_ID_5248781557206787874" border="0" /&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;div style="text-align: justify;"&gt;Both Linux and Windows are operating systems. An operating system is the most important program that runs on a computer. Every general-purpose computer must have an operating system to run other programs. Operating systems perform basic tasks, such as recognizing input from the keyboard, sending output to the display screen, keeping track of files and directories on the disk, and controlling peripheral devices such as disk drives and printers.&lt;br /&gt;&lt;br /&gt;&lt;/div&gt;&lt;ol&gt;&lt;h2 style="text-align: justify;"&gt; &lt;li&gt;Reduces the risk of &lt;a href="http://www.ninds.nih.gov/disorders/carpal_tunnel/detail_carpal_tunnel.htm"&gt;carpal tunnel syndrome&lt;/a&gt;&lt;/li&gt; &lt;/h2&gt;&lt;p style="text-align: justify;"&gt;When linux is properly installed, there no longer a need to use the mouse. Chances of you using a mouse is close to zero.&lt;/p&gt;&lt;h2 style="text-align: justify;"&gt; &lt;li&gt;Use the extra cash for rewards&lt;/li&gt; &lt;/h2&gt;&lt;p style="text-align: justify;"&gt;Linux is 100% free while &lt;a href="http://www.amazon.com/s/ref=nb_ss_sw/104-1533694-4304702?url=search-alias%3Dsoftware&amp;amp;field-keywords=windows+vista&amp;amp;Go.x=0&amp;amp;Go.y=0&amp;amp;Go=Go"&gt;Windows Vista Ultimate costs $398.99&lt;/a&gt; at the time of writing. Companies that pay a licensing annually could have used the money for other things like buying an additional server to reduce the load or even give a bigger bonus to its loyal employees.&lt;/p&gt;&lt;h2 style="text-align: justify;"&gt; &lt;li&gt;Formats are free, freedom is preserved&lt;/li&gt; &lt;/h2&gt;&lt;p style="text-align: justify;"&gt;Linux file formats can be accessed in a variety of ways because they are free. Windows on the other hand makes you lock your own data in secret formats that can only be accessed with tools leased to you at the vendor’s price. &lt;a href="http://news.bbc.co.uk/2/hi/health/1694372.stm"&gt;“What we will get with Microsoft is a three-year lease on a health record we need to keep for 100 years”&lt;/a&gt;&lt;/p&gt;&lt;h2 style="text-align: justify;"&gt; &lt;li&gt;Zero risk in violating license agreements&lt;/li&gt; &lt;/h2&gt;&lt;p style="text-align: justify;"&gt;Linux is open source so you are unlikely to violate any license agreement. All the software is happily yours. With MS Windows you likely already violate all kinds of licenses and you could be pronounced a computer pirate if only a smart lawyer was after you. The worldwide PC software piracy rate for 2004 is at 35%. Which means that 3 out of 10 people are likely to get into real trouble.&lt;/p&gt;&lt;h2 style="text-align: justify;"&gt; &lt;li&gt;Transparent vs Proprietary&lt;/li&gt; &lt;/h2&gt;&lt;p style="text-align: justify;"&gt;MS Windows is based on DOS, Linux is based on UNIX. MS Windows Graphical User Interface (GUI) is based on Microsoft-own marketing-driven specifications. Linux GUI is based on industry-standard network-transparent X-Windows. &lt;/p&gt;&lt;h2 style="text-align: justify;"&gt; &lt;li&gt;Better network, processing capabilities&lt;/li&gt; &lt;/h2&gt;&lt;p style="text-align: justify;"&gt;Linux beats Windows hands down on network features, as a development platform, in data processing capabilities, and as a scientific workstation. MS Windows desktop has a more polished appearance, simple general business applications, and many more games for kids (less intellectual games compared to linux’s). &lt;/p&gt;&lt;h2 style="text-align: justify;"&gt; &lt;li&gt;Customizable&lt;/li&gt; &lt;/h2&gt;&lt;p style="text-align: justify;"&gt;Linux is customizable in a way that Windows is not. For example, &lt;a href="http://www.serverelements.com/"&gt;NASlite&lt;/a&gt; is a version of Linux that runs off a single floppy disk and converts an old computer into a file server. This ultra small edition of Linux is capable of networking, file sharing and being a web server.&lt;/p&gt;&lt;h2 style="text-align: justify;"&gt; &lt;li&gt;Flexibility&lt;/li&gt; &lt;/h2&gt;&lt;p style="text-align: justify;"&gt;Windows must boot from a primary partition. Linux can boot from either a primary partition or a logical partition inside an extended partition. Windows must boot from the first hard disk. Linux can boot from any hard disk in the computer.&lt;/p&gt;&lt;h2 style="text-align: justify;"&gt; &lt;li&gt;Mobility&lt;/li&gt; &lt;/h2&gt;&lt;p style="text-align: justify;"&gt;Windows allows programs to store user information (files and settings) anywhere. This makes it impossibly hard to backup user data files and settings and to switch to a new computer. In contrast, Linux stores all user data in the home directory making it much easier to migrate from an old computer to a new one. If home directories are segregated in their own partition, you can even upgrade from one version of Linux to another without having to migrate user data and settings.&lt;/p&gt;&lt;h2 style="text-align: justify;"&gt; &lt;li&gt;Proven Security&lt;/li&gt; &lt;/h2&gt;&lt;p style="text-align: justify;"&gt;Why isn’t Linux affected by viruses? Simply because its code has been open source for more than a decade, tested by people all around the world, and not by a single development team like in the case of Windows. This leads to a lightning fast finding and fixing for exploitable holes in Linux. So that my friends, proves Linux as having an extremely enhanced security and lesser chances of exploits compared to Windows.&lt;br /&gt;&lt;/p&gt;&lt;/ol&gt;&lt;div style="text-align: justify;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;ol&gt;&lt;br /&gt;&lt;p&gt;&lt;a href="http://www.michaelhorowitz.com/Linux.vs.Windows.html"&gt;LINUX vs WINDOWS&lt;/a&gt;&lt;br /&gt;A comparision of Linux and Windows&lt;br /&gt;&lt;/p&gt;&lt;/ol&gt;&lt;p&gt;&lt;span style="line-height: 12px; font-size: 11px; font-family: verdana,arial,sans-serif;"&gt;&lt;strong&gt;&lt;a href="http://www.michaelhorowitz.com/Linux.vs.Windows.html"&gt;&lt;u&gt;&lt;br /&gt;&lt;/u&gt;&lt;/a&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/p&gt;       Source: &lt;a href="http://rangit.com"&gt;http://rangit.com&lt;/a&gt;&lt;br /&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;&lt;span style="line-height: 16px; font-size: 10px; font-family: verdana,arial,sans-serif;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;</description><link>http://imeester.blogspot.com/2008/09/10-major-differences-between-linux-and.html</link><author>noreply@blogger.com (inbox411)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEikdcDT1HcAyUidpuYi7YiNQsjlwTw8wbVlTpmaePDSdPUzA2pLkO6s3SP-hTeyaaESCoyoedSRZanwLBR8PoT8nETtEjvYWrFhJXrq78JGdpYLpRNEKYfbFN5kWHIUirH9JwubgPxcHB8/s72-c/linuxdj2.jpg" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6925264790253362835.post-6038045434899823733</guid><pubDate>Sun, 21 Sep 2008 09:39:00 +0000</pubDate><atom:updated>2008-09-21T03:23:22.815-07:00</atom:updated><title>How Safe Is Your Computer?</title><description>&lt;a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg0nSM4XLBSGtRAcHcMhC04lX3VG7yfmxfrf7uEnRnMGpvNe8hmOLgGYHhs4IQ0oRsc2xPBbIjEbTcsfcLXVDZ_Qco9fib3qNGHNdJ9rkTIgxyvYa9NP-B-bxZsbARilrSQDC-y6GkXzhg/s1600-h/secureComputer.jpg"&gt;&lt;img style="cursor: pointer;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg0nSM4XLBSGtRAcHcMhC04lX3VG7yfmxfrf7uEnRnMGpvNe8hmOLgGYHhs4IQ0oRsc2xPBbIjEbTcsfcLXVDZ_Qco9fib3qNGHNdJ9rkTIgxyvYa9NP-B-bxZsbARilrSQDC-y6GkXzhg/s320/secureComputer.jpg" alt="" id="BLOGGER_PHOTO_ID_5248418173970087458" border="0" /&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="font-weight: bold;font-size:180%;" &gt;10-Step Security&lt;/span&gt;   &lt;h2&gt;&lt;span style="font-size:130%;"&gt;If you have about an hour, you can batten down your machine's hatches against Net threats new and old. Here's how.&lt;/span&gt;&lt;/h2&gt;by: Dennis O'Reilly&lt;br /&gt;&lt;br /&gt;Each new wave of computer viruses, spies, and spam may have you ready to dust off your typewriter, but PC security can be effective without being a chore. To keep your computing safe from current and future threats, we've distilled our security advice down to the basics. These ten quick and easy tips will help protect your hardware, software, and data.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;&lt;span&gt;1. Patch automatically:&lt;/span&gt;&lt;/strong&gt; Ensure Windows is set to update itself. In XP, click &lt;em&gt;Start, Control Panel, Security Settings&lt;/em&gt; (if you're in Category view)&lt;em&gt;, Automatic Updates&lt;/em&gt;. In 2000, choose &lt;em&gt;Start, Settings, Control Panel, Automatic Updates&lt;/em&gt;. In both versions, verify that 'Automatic (recommended)' is selected. You can also have Windows notify you before it downloads an update, or you can install the update manually. (The steps and options are only slightly different in Windows 98 and Me.)&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;&lt;span&gt;2. Don't wait for Windows:&lt;/span&gt;&lt;/strong&gt; If your PC has been off for more than a few days, don't wait for Windows' automatic update to kick in. Make the &lt;a href="http://update.microsoft.com/windowsupdate/v6/thanks.aspx?ln=en&amp;amp;&amp;amp;thankspage=5" target="_blank"&gt;Windows Update&lt;/a&gt; site your first Internet stop. Also, there may be a lag between when a patch is available and when Windows Update pushes it to you. Microsoft releases Windows patches on the second Tuesday of each month, so to be safe check for updates manually every couple of weeks. And don't forget to set your antivirus and anti-spyware tools to update automatically (or check weekly for updates yourself).&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;&lt;span&gt;3. Use XP's security monitor:&lt;/span&gt;&lt;/strong&gt; Windows XP Service Pack 2's most welcome addition is the Windows Security Center, which alerts you when your PC's firewall and antivirus protection are disabled or out of date. Still, XP's own firewall protects you only from inbound pests; it doesn't alert you to suspicious outbound traffic (see "&lt;a href="http://find.pcworld.com/49402"&gt;Tweak Windows XP SP2 Security to Your Advantage&lt;/a&gt;" for more). We recommend that you disable the XP firewall and instead use Zone Labs' (&lt;a href="http://find.pcworld.com/49403"&gt;ZoneAlarm&lt;/a&gt;) or another third-party firewall program that protects both ways.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;&lt;span&gt;4. Make your file extensions visible:&lt;/span&gt;&lt;/strong&gt; Some viruses masquerade as harmless file types by adding a bogus extension near the end of their name, as in "funnycartoon.jpg.exe," in hopes your system is set to hide such extensions (the default in Windows XP and 2000)--you see '.jpg' but not '.exe'. To make these troublemakers easier to spot, open Windows Explorer or any folder window and click &lt;em&gt;Tools, Folder Options, View&lt;/em&gt;. Ensure that the option 'Hide file extensions for known file types' is unchecked.&lt;br /&gt;&lt;br /&gt;&lt;p&gt;&lt;strong&gt;Bonus Tip 1:&lt;/strong&gt; To get the most complete picture of your Windows setup, check &lt;em&gt;Show hidden files and folders&lt;/em&gt; and uncheck &lt;em&gt;Hide protected operating system files (Recommended)&lt;/em&gt;.&lt;/p&gt;   &lt;p&gt;&lt;strong&gt;Bonus Tip 2:&lt;/strong&gt; Click&lt;a href="http://www.microsoft.com/athome/security/asx/step2_updateyourpc.asx"&gt; &lt;/a&gt;&lt;a href="http://www.microsoft.com/athome/security/asx/step2_updateyourpc.asx"&gt;here&lt;/a&gt;&lt;a href="http://www.microsoft.com/athome/security/asx/step2_updateyourpc.asx"&gt; &lt;/a&gt;to play Microsoft's video guide to Windows XP security settings.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;&lt;span&gt;5. Keep Internet Explorer safe:&lt;/span&gt;&lt;/strong&gt; Many people find IE 6's Medium security level too obliging to ActiveX controls and other small programs, or scripts, that the browser runs on your PC. ActiveX and JavaScript enable such useful Web features as order forms and security scans, but they also may run malicious code and give attackers access to your system. To make IE safer, click &lt;em&gt;Tools, Internet Options, Security, Custom Level&lt;/em&gt;, select &lt;em&gt;High&lt;/em&gt; from the drop-down menu at the bottom of the Security Settings dialog box, and click &lt;em&gt;Reset, Yes, OK&lt;/em&gt;.&lt;/p&gt;&lt;p&gt;Unfortunately, setting IE to the High security setting can lead to the browser's unleashing a fusillade of warnings and permission pop-ups every time you visit a site. The solution is to add the sites that you access often to IE's Trusted Sites list: &lt;em&gt;Choose Tools, Internet Options, Security&lt;/em&gt;, click the &lt;em&gt;Trusted Sites&lt;/em&gt; icon, and then click the &lt;em&gt;Sites&lt;/em&gt; button. Enter the Web address, click &lt;em&gt;Add&lt;/em&gt;, and repeat as necessary (see the Trusted Sites screen below). Be sure to uncheck &lt;em&gt;Require server verification (https:) for all sites in this zone&lt;/em&gt;. When you're finished, click &lt;em&gt;OK&lt;/em&gt; twice.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;&lt;span&gt;6. Make Firefox more secure:&lt;/span&gt;&lt;/strong&gt; The only way to block JavaScripts on a site-by-site basis in the Mozilla Foundation's free Firefox browser is to download and install the &lt;a href="https://addons.mozilla.org/en-US/firefox/addon/722?application=firefox&amp;amp;id=722"&gt;NoScript&lt;/a&gt; add-in that was created by Giorgio Maone. NoScript places a warning bar at the bottom of all the Web pages you visit that use JavaScript. Click the bar to see options for allowing scripts on the site (permanently or temporarily), blocking scripts, and other operations (see the NoScript screen below). The program can also stifle Flash animations and other Firefox plug-ins, but keep in mind that going Flash-less means you'll be missing out on some of the Web's richest content (along with all of those great dancing ads). Although NoScript is freeware, the author does accept donations at &lt;a href="http://noscript.net/" target="_blank"&gt;www.noscript.net&lt;/a&gt;&lt;a href="http://noscript.net/"&gt;.&lt;/a&gt;   &lt;/p&gt;&lt;p&gt;&lt;strong&gt;&lt;span&gt;7. Handle e-mail links with care:&lt;/span&gt;&lt;/strong&gt; If a virus infects your PC, chances are good it arrived piggybacked on e-mail. To reduce your risk of an e-mail-borne infection, don't click links in suspicious messages (the text in the message may mask the actual Web address). Instead, enter the URL in your browser's address bar manually, or go to the site's home page and then navigate to the page in question.&lt;br /&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;&lt;span&gt;8. Scan attachments for viruses:&lt;/span&gt;&lt;/strong&gt; Run each of the e-mail attachments you receive through your antivirus software before you open them. Rather than double-clicking the attachment to open it instantly, save the file to a drive on your PC, open Windows Explorer, right-click the file, and choose the option to scan it for viruses. (Better yet, set your antivirus software to scan incoming and outgoing e-mail automatically.)&lt;/p&gt;   &lt;p&gt;&lt;strong&gt;&lt;span&gt;9. Close the preview pane:&lt;/span&gt;&lt;/strong&gt; Some maleficent messages need only be opened in your e-mail program's preview window to do their dirty work. That's why we recommend that you close the preview pane in all of your inboxes. In Microsoft Outlook 2003, click &lt;em&gt;View, Reading pane, Off&lt;/em&gt;. In Outlook Express 6, click &lt;em&gt;View, Layout&lt;/em&gt; and verify that 'Show Preview Pane' is unchecked. In Mozilla Thunderbird, click &lt;em&gt;View, Layout&lt;/em&gt; and confirm that 'Message pane' is unchecked (or press &lt;strong&gt;&lt;f8&gt;&lt;/f8&gt;&lt;/strong&gt; to toggle the preview pane on and off).&lt;/p&gt;   &lt;p&gt;&lt;strong&gt;&lt;span&gt;10. Read your mail in plain text:&lt;/span&gt;&lt;/strong&gt; Since many e-mail pests rely on HTML code to achieve their nefarious goals, you can stop them in their tracks by viewing your messages as plain text. In Outlook 2003, click &lt;em&gt;Tools, Options, Preferences, E-mail Options&lt;/em&gt; and check &lt;em&gt;Read all standard mail in plain text.&lt;/em&gt; In Outlook Express 6, choose &lt;em&gt;Tools, Options, Read&lt;/em&gt; and click &lt;em&gt;Read all messages in plain text&lt;/em&gt;. In Mozilla Thunderbird, select &lt;em&gt;View, Message Body As, Plain Text&lt;/em&gt;.&lt;/p&gt;&lt;br /&gt;&lt;br /&gt;Source: &lt;a href="http://www.pcworld.com/"&gt;http://www.pcworld.com&lt;/a&gt;</description><link>http://imeester.blogspot.com/2008/09/how-safe-is-your-computer.html</link><author>noreply@blogger.com (inbox411)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg0nSM4XLBSGtRAcHcMhC04lX3VG7yfmxfrf7uEnRnMGpvNe8hmOLgGYHhs4IQ0oRsc2xPBbIjEbTcsfcLXVDZ_Qco9fib3qNGHNdJ9rkTIgxyvYa9NP-B-bxZsbARilrSQDC-y6GkXzhg/s72-c/secureComputer.jpg" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6925264790253362835.post-1025830503180817249</guid><pubDate>Sat, 20 Sep 2008 08:04:00 +0000</pubDate><atom:updated>2008-09-21T02:39:03.437-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">are you a geek</category><category domain="http://www.blogger.com/atom/ns#">definition of geek</category><category domain="http://www.blogger.com/atom/ns#">geek test</category><category domain="http://www.blogger.com/atom/ns#">take the geek test</category><title>About Geeks</title><description>&lt;a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj5iqkcuUWfHKDtn_7bDz8c07B6zHzt3jpPAEBFe1WeT5VwSbaqnfnnLObtOBd70wO1ykqDS3dmzWzqvCnrbcUWLbRxWLMmhEymDyAW3ndsZWXr-fmvRF_tMfh9Rvo1_SRsGN52mbJA5UQ/s1600-h/20071128-geek.jpg"&gt;&lt;img style="cursor: pointer;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj5iqkcuUWfHKDtn_7bDz8c07B6zHzt3jpPAEBFe1WeT5VwSbaqnfnnLObtOBd70wO1ykqDS3dmzWzqvCnrbcUWLbRxWLMmhEymDyAW3ndsZWXr-fmvRF_tMfh9Rvo1_SRsGN52mbJA5UQ/s320/20071128-geek.jpg" alt="" id="BLOGGER_PHOTO_ID_5248015992817735634" border="0" /&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;p&gt; What is a geek? (a subjective work in progress) &lt;/p&gt;      &lt;p&gt; c:\GEEK&gt;&lt;br /&gt;n. Slang &lt;/p&gt; &lt;p&gt; 1. A person who is single-minded or accomplished in scientific or technical pursuits but is felt to be socially inept.&lt;br /&gt;2. A person regarded as foolish, inept, or clumsy.&lt;br /&gt;3. A carnival performer whose show consists of bizarre acts, such as biting the head off a live chicken.  &lt;/p&gt;  &lt;p&gt; c:\OPINION&gt;&lt;/p&gt; &lt;p&gt; This official defintion (found in most dictionaries) does not entirely describe the word "geek." Whereas it may imply certain social deficiencies, I would say that a geek is a person who is talented in an area outside the boundaries of social normality. There are different kinds of geeks; band geeks, gaming geeks, literary geeks, film geeks, science geeks, computer geeks, etc. They generally have one thing in common, whether or not they are able to disguise it from the rest of the world. &lt;/p&gt; &lt;p&gt; c:\NEW_DEFINITION&gt;  &lt;/p&gt; &lt;p&gt; Geeks strive to prove their worth outside the definitions of mainstream.&lt;br /&gt;&lt;br /&gt;&lt;a href="http://geek.wikiverse.org/" target="_blank"&gt;Wikipedia&lt;/a&gt;, the free encyclopedia, now has a thorough definition. Probably because there are plenty of geeks who like to spend their time updating open content encyclopedias!&lt;br /&gt;&lt;a href="http://en.wikipedia.org/w/index.php?title=Geek&amp;amp;oldid=31667764"&gt;Wikipedia article about geeks.&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p style="color: rgb(153, 0, 0);"&gt;&lt;span style="color: rgb(255, 0, 0);font-size:180%;" &gt;&lt;a&gt;&lt;/a&gt;&lt;a href="http://www.innergeek.us/geek-test.html"&gt;&lt;span style="font-size:130%;"&gt;Take the Geek Test! v.3.1&lt;/span&gt;&lt;/a&gt;.&lt;/span&gt;&lt;/p&gt;&lt;br /&gt;&lt;br /&gt;&lt;p style="color: rgb(204, 102, 0);"&gt;&lt;a href="http://www.flickr.com/photos/scottjohnson/2086153791/sizes/o/"&gt;&lt;span&gt;&lt;span style="font-size:100%;"&gt;&lt;span style="color: rgb(255, 0, 0);"&gt;56 Geeks, Illustrated&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;/p&gt;&lt;p style="color: rgb(204, 102, 0);"&gt;&lt;a href="http://www.innergeek.us/images.html"&gt;&lt;span style="font-size:100%;"&gt;&lt;span style="color: rgb(255, 0, 0);"&gt;Free Buttons &amp;amp; Avatars&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;/p&gt;&lt;p style="color: rgb(204, 102, 0);"&gt;&lt;a href="http://www.brunching.com/geekhierarchy.html"&gt;&lt;span style="font-size:100%;"&gt;&lt;span style="color: rgb(255, 0, 0);"&gt;The Geek Hierarchy&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;/p&gt;&lt;p style="color: rgb(102, 102, 204);"&gt;&lt;a style="color: rgb(204, 102, 0);" href="http://www.geekcode.com/geek.html"&gt;&lt;span style="font-size:100%;"&gt;&lt;span style="color: rgb(255, 0, 0);"&gt;&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;span style="font-size:100%;"&gt;&lt;span style="color: rgb(255, 0, 0);"&gt;&lt;a style="color: rgb(204, 102, 0);" href="http://www.geekcode.com/geek.html"&gt;The Code of The Geeks v3.12&lt;/a&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p style="color: rgb(153, 0, 0);"&gt;&lt;span style="font-size:100%;"&gt;&lt;a style="color: rgb(102, 102, 204);" href="http://en.wikipedia.org/w/index.php?title=Geek&amp;amp;oldid=31667764"&gt;&lt;/a&gt;&lt;a href="http://www.innergeek.us/geek-test.html"&gt;&lt;span style="color: rgb(255, 0, 0);"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;/p&gt;Source : &lt;a href="http://www.innergeek.us"&gt;http://www.innergeek.us&lt;br /&gt;&lt;/a&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://en.wikipedia.org/w/index.php?title=Geek&amp;amp;oldid=31667764"&gt;&lt;br /&gt;&lt;/a&gt;  &lt;/p&gt;</description><link>http://imeester.blogspot.com/2008/09/about-geeks.html</link><author>noreply@blogger.com (inbox411)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj5iqkcuUWfHKDtn_7bDz8c07B6zHzt3jpPAEBFe1WeT5VwSbaqnfnnLObtOBd70wO1ykqDS3dmzWzqvCnrbcUWLbRxWLMmhEymDyAW3ndsZWXr-fmvRF_tMfh9Rvo1_SRsGN52mbJA5UQ/s72-c/20071128-geek.jpg" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6925264790253362835.post-1787684128286975269</guid><pubDate>Mon, 15 Sep 2008 11:25:00 +0000</pubDate><atom:updated>2008-09-21T02:38:00.681-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Geek</category><category domain="http://www.blogger.com/atom/ns#">Geek Cuisine</category><category domain="http://www.blogger.com/atom/ns#">Geek Friends</category><category domain="http://www.blogger.com/atom/ns#">Geek Girls</category><category domain="http://www.blogger.com/atom/ns#">Girls Geeks</category><category domain="http://www.blogger.com/atom/ns#">Why The Geek Girls Rule</category><title>Guide to Geek Girls</title><description>&lt;a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgLOQxqe3EJoYXxiJkMa_Tra8y1anzQ7nvs4DG406f3Oz6-XXgC6i0YEvh6RcDr2TpUCizOFikmonQBWFhMrcW8Gsg-IB6VCKsXSBDTyBtwYR5FZUSf23O65qIp75U5KeaGAV8FFg2mSxU/s1600-h/geek-style-.jpg"&gt;&lt;img style="cursor: pointer;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgLOQxqe3EJoYXxiJkMa_Tra8y1anzQ7nvs4DG406f3Oz6-XXgC6i0YEvh6RcDr2TpUCizOFikmonQBWFhMrcW8Gsg-IB6VCKsXSBDTyBtwYR5FZUSf23O65qIp75U5KeaGAV8FFg2mSxU/s320/geek-style-.jpg" alt="" id="BLOGGER_PHOTO_ID_5246213697834618594" border="0" /&gt;&lt;/a&gt;&lt;br /&gt;&lt;div style="text-align: justify;"&gt;&lt;span style=";font-family:Helvetica,Arial,Verdana,Geneva;font-size:85%;color:black;"   &gt;&lt;span style="font-size:100%;"&gt;&lt;br /&gt;&lt;span style=";font-family:arial;font-size:130%;"  &gt;&lt;span style="font-size:100%;"&gt;So, your crush on &lt;a href="http://www.imdb.com/name/nm0001951/"&gt;Björk&lt;/a&gt; has finally died a whimpering death and you're wondering where to go from here. All the scenester ladies are either dating a series of interchangeable high-school riot boys in skater uniform and an overdose of manic panic, or permanently shacked up with some bitter old gentleman who pays all the bills. Which will it be, a masculine prison or a humiliating one night stand? Into this void of potential mates comes a woman you may not have considered before, a woman of substance, quietude and stability, a cerebral creature with a culture all her own. In short, a geek girl.&lt;/span&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style="font-weight: bold;font-family:arial;font-size:100%;"  &gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style="font-weight: bold;font-family:arial;font-size:130%;"  &gt;Why Geek Girls Rule&lt;/span&gt;&lt;span style="font-weight: bold;font-size:100%;" &gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;ul&gt;&lt;li&gt;&lt;span style=";font-family:Helvetica,Arial,Verdana,Geneva;font-size:100%;color:black;"   &gt;They are generally available.&lt;br /&gt;&lt;/span&gt;       &lt;/li&gt;&lt;li&gt;&lt;span style=";font-family:Helvetica,Arial,Verdana,Geneva;font-size:100%;color:black;"   &gt;Other men will tend not to steal them.&lt;br /&gt;&lt;/span&gt;       &lt;/li&gt;&lt;li&gt;&lt;span style=";font-family:Helvetica,Arial,Verdana,Geneva;font-size:100%;color:black;"   &gt;They can fix things.&lt;br /&gt;&lt;/span&gt;       &lt;/li&gt;&lt;li&gt;&lt;span style=";font-family:Helvetica,Arial,Verdana,Geneva;font-size:100%;color:black;"   &gt;Your computer will love them.&lt;br /&gt;&lt;/span&gt;       &lt;/li&gt;&lt;li&gt;&lt;span style=";font-family:Helvetica,Arial,Verdana,Geneva;font-size:100%;color:black;"   &gt;They're smart.&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;&lt;span style="font-weight: bold;font-size:100%;" &gt;&lt;br /&gt;&lt;span style=";font-family:arial;font-size:130%;"  &gt;Where the Geek Girls Lurks&lt;/span&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style=";font-family:Helvetica,Arial,Verdana,Geneva;font-size:100%;color:black;"   &gt;&lt;br /&gt;&lt;span style="font-size:100%;"&gt;While they are often into alternative music, geek girls tend not to go to shows too often. Instead you'll find them hanging out with their friends, discussing the latest hardware revolution or perfecting their Bill Gates impressions. You know how some people wear t-shirts with their favorite bands on them, thus showing that they went to certain shows? Well, geek girls wear t-shirts with the logos of different software companies on them, thus showing that they are up on the latest releases. A small, though con-vivial, rivalry may be detected here amongst the geek ladies. Try wearing one yourself and see if she strikes up a conversation.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="font-weight: bold;font-family:arial;font-size:130%;"  &gt;Imprinting&lt;/span&gt;&lt;span style="font-weight: bold;"&gt;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=";font-family:Helvetica,Arial,Verdana,Geneva;font-size:100%;color:black;"   &gt;You might notice that these women harbor some strange ideas about how the world works and some particularly strange ideas about men. There is a reason for this. Because they've had limited interpersonal experience, geek girls must look elsewhere for behavior models. Lacking a real world social milieu, geeks often go through a transference stage with such narratives, and try to model their interactions on them. Thus, certain media images and themes come to have an overly cathected, metaphorized reality to them, while the rest of us view such programming as mere entertainment. Case in point, our next topic...&lt;br /&gt;&lt;br /&gt;&lt;span style="font-weight: bold;font-size:130%;" &gt;&lt;br /&gt;The SciFi Factor&lt;/span&gt;&lt;span style="font-weight: bold;"&gt;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=";font-family:Helvetica,Arial,Verdana,Geneva;font-size:100%;color:black;"   &gt;If you're not up on your Star Trek, you can forget about getting or keeping a geek girl. You've got to be up on your The Next Generation, your Deep Space Nine, your Babylon 5. Armed with your own knowledge of Federation policies, you can better gauge when and how to act. The sexual politics of Star Trek are pretty blunt: the women run the technology and the ship, and the men are caretakers (a doctor and a counselor). Note the sexual tensions on the bridge of the Enterprise: the men, in skin tight uniforms, and with luxuriant, flowing hair. The women, often balding, and sporting some sort of permanently attached computer auxiliary. This world metaphorizes the fantasies of the geek lady, who sees herself in the geeky-but-heroic female officers and who secretly desires a sexy, smart, Berry or Kevin to come along and deferentially accept her for who she is. If you are willing to accept that this is her starting point for reality, you are ready for a geek relationship.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="font-weight: bold;font-size:130%;" &gt;Once You Have Nabbed Her&lt;/span&gt;&lt;span style="font-weight: bold;"&gt;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=";font-family:Helvetica,Arial,Verdana,Geneva;font-size:100%;color:black;"   &gt;Of course, catching that geek girl is only half the battle. Keeping her by your side is another story altogether. I was privileged to speak with a guy, who not only got himself a geek girl, but was also clever enough to marry her just a few short months ago. He interrupted his newlywed bliss to give us a few tips on the care and feeding of a geek woman: Geeks are sensitive and caring lovers and wifes. If you can hang with the techno-lifestyle, they make the best mates. They are the most attractive people, not flashy or hunky, but the kind who get cuter and more alluring over time (I told you he was a newlywed). Definitely give geeks a chance.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="font-weight: bold;"&gt;&lt;span style="font-size:130%;"&gt;Geek Cuisine&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=";font-family:Helvetica,Arial,Verdana,Geneva;font-size:100%;color:black;"   &gt;Geeks tend towards packaged junk foods since they prefer to work and think and aren't all that into cooking for themselves. Make sure that your geek girl understands that you are not merely a replicator, and provide her with home-cooked food. A batch of chocolate chip cookies will let her know that you love her. You do have to monitor your geek girl for weight gain, however; remember that most of their days are spent sitting and staring at a monitor.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="font-weight: bold;font-size:130%;" &gt;Geek Lifestyles&lt;/span&gt;&lt;span style="font-weight: bold;"&gt;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=";font-family:Helvetica,Arial,Verdana,Geneva;font-size:100%;color:black;"   &gt;The geek girl has long work habits and tends to bring her work home with her. She seems permanently connected to her hard disk. You must at least appear interested in her work. Generally, a solid understanding of the computer is a must; if you cannot master this, you should at least be able to talk the talk. Remember most geeks are anal and they get stressed about details which appear insignificant. Be understanding, put on your best face and empathize.&lt;br /&gt;&lt;br /&gt;To relax, geeks love to play the latest computer games. Let her play Tomb Raider III if she wants to. Act concerned if she's stuck or has just been erased. Some geeks love to try to help people on the internet who say that they are stuck in a game. She comes up with clever riddles instead of directing them point blank. Geeks also like to go to sci-fi and Japanese animated movies, again, a basically harmless vent for your woman.&lt;br /&gt;&lt;br /&gt;&lt;span style="font-size:130%;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style="font-weight: bold;font-size:130%;" &gt;Geek Friends&lt;/span&gt;&lt;span style="font-weight: bold;"&gt;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=";font-family:Helvetica,Arial,Verdana,Geneva;font-size:100%;color:black;"   &gt;Many geeks extend their work friendships into what they jokingly refer to as RL (Real Life, also known as "that big room with the ceiling that is sometimes blue and sometimes black with little lights"). The greatest thing about your geek's friends is that you can feel secure in setting them up with your boyfriends. They may feel awkward around males at first, so don't overwhelm them. In time they will come out of their shell and realize that you are into the same things they are.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="font-weight: bold;"&gt;&lt;span style="font-size:130%;"&gt;One Last Thing&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=";font-family:Helvetica,Arial,Verdana,Geneva;color:black;"  &gt;&lt;span style="font-size:100%;"&gt;Because they have been so abused and ignored by society, many geek girls have gone underground. You may actually know some and just haven't noticed it. They often feel resentful, and misunderstood, and it is important to realize this as you grow closer to them. Don't ever try to force the issue, or make crazy demands that she choose between her computer and you. Remember, her computer has been there for her whole life; you are a new interloper she hasn't quite grasped yet.&lt;br /&gt;&lt;br /&gt;Geek girls thrive on mystery and love challenges and intellectual puzzles. Don't you consider yourself one? Wouldn't you like a little intellectual stimulation of your own? We thought so.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style=";font-family:Helvetica,Arial,Verdana,Geneva;color:black;"  &gt;Source: &lt;a href="http://www.obn.org/"&gt;http://www.obn.org&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=";font-family:Helvetica,Arial,Verdana,Geneva;color:black;"  &gt;&lt;br /&gt;&lt;/span&gt;&lt;span style="font-weight: bold;"&gt;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;&lt;/div&gt;&lt;span style=";font-family:georgia;font-size:130%;"  &gt;&lt;span style="font-weight: bold;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;</description><link>http://imeester.blogspot.com/2008/09/guide-to-geek-girls.html</link><author>noreply@blogger.com (inbox411)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgLOQxqe3EJoYXxiJkMa_Tra8y1anzQ7nvs4DG406f3Oz6-XXgC6i0YEvh6RcDr2TpUCizOFikmonQBWFhMrcW8Gsg-IB6VCKsXSBDTyBtwYR5FZUSf23O65qIp75U5KeaGAV8FFg2mSxU/s72-c/geek-style-.jpg" width="72"/><thr:total>1</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6925264790253362835.post-164607859517429858</guid><pubDate>Mon, 15 Sep 2008 10:51:00 +0000</pubDate><atom:updated>2008-09-15T04:12:35.878-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">How WiFi Works</category><category domain="http://www.blogger.com/atom/ns#">What is WiFi</category><category domain="http://www.blogger.com/atom/ns#">WiFi</category><category domain="http://www.blogger.com/atom/ns#">WiFi Spots</category><title>How Stuff Works</title><description>&lt;span style="font-size:130%;"&gt;&lt;span class="articleTitle"&gt;&lt;span style="font-weight: bold;font-size:180%;" &gt;How WiFi Works&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style="font-size:85%;"&gt;by &lt;a href="http://computer.howstuffworks.com/about-author.htm#wilson"&gt;Tracy V. Wilson&lt;/a&gt; and &lt;a href="http://computer.howstuffworks.com/about-author.htm#brain"&gt;Marshall Brain&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;h3&gt;&lt;span style="font-size:85%;"&gt;Inside this Article&lt;/span&gt;&lt;/h3&gt;  &lt;ol class="column" type="1"&gt;&lt;li&gt;&lt;a href="http://computer.howstuffworks.com/wireless-network.htm" class="on" onclick="var s=s_gi(s_account);void(s.tl(true,'o','How WiFi Works : Top TOC : Page 0'));"&gt;Introduction to How WiFi Works&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href="http://computer.howstuffworks.com/wireless-network1.htm" onclick="var s=s_gi(s_account);void(s.tl(true,'o','How WiFi Works : Top TOC : Page 0'));"&gt;What Is WiFi?&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href="http://computer.howstuffworks.com/wireless-network2.htm" onclick="var s=s_gi(s_account);void(s.tl(true,'o','How WiFi Works : Top TOC : Page 0'));"&gt;WiFi Hotspots&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href="http://computer.howstuffworks.com/wireless-network3.htm" onclick="var s=s_gi(s_account);void(s.tl(true,'o','How WiFi Works : Top TOC : Page 0'));"&gt;Building a Wireless Network&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href="http://computer.howstuffworks.com/wireless-network4.htm" onclick="var s=s_gi(s_account);void(s.tl(true,'o','How WiFi Works : Top TOC : Page 0'));"&gt;Lots More Information&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href="http://computer.howstuffworks.com/internet-wifi-channel.htm" onclick="var s=s_gi(s_account);void(s.tl(true,'o','How WiFi Works : Top TOC : Page 0'));"&gt;See all WiFi &amp;amp; Mobile articles&lt;/a&gt;&lt;/li&gt;&lt;/ol&gt;&lt;br /&gt;&lt;div style="text-align: justify;"&gt;If you've been in an &lt;a href="http://science.howstuffworks.com/airport.htm"&gt;airport&lt;/a&gt;, coffee shop, library or hotel recently, chances are you've been right in the middle of a wireless network. Many people also use wireless networking, also called WiFi or 802.11 networking, to connect their computers at &lt;a href="http://computer.howstuffworks.com/home-network.htm"&gt;home&lt;/a&gt;, and some &lt;a href="http://computer.howstuffworks.com/municipal-wifi.htm"&gt;cities&lt;/a&gt;&lt;a href="http://computer.howstuffworks.com/municipal-wifi.htm"&gt; &lt;/a&gt;are trying to use the technology to provide free or low-cost &lt;a href="http://computer.howstuffworks.com/internet-infrastructure.htm"&gt;Internet&lt;/a&gt;&lt;a href="http://computer.howstuffworks.com/internet-infrastructure.htm"&gt; &lt;/a&gt;access to residents. In the near future, wireless networking may become so widespread that you can access the Internet just about anywhere at any time, without using wires.&lt;br /&gt;&lt;br /&gt;&lt;a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjd5KMmp6QQpek6jdbQr949n7HVrq-bgaYnlpwXQI9L-cfrWx5jM-g0J7iNoUda6mtZz3ggZA-jZrqYgoAzmrTpr7gus2hQIa21cZWlYWgxSuFZSCpp8oPMmPkmRpIlSGPc5lhOEB4Ba3M/s1600-h/wireless-network-1.jpg"&gt;&lt;img style="cursor: pointer; width: 216px; height: 319px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjd5KMmp6QQpek6jdbQr949n7HVrq-bgaYnlpwXQI9L-cfrWx5jM-g0J7iNoUda6mtZz3ggZA-jZrqYgoAzmrTpr7gus2hQIa21cZWlYWgxSuFZSCpp8oPMmPkmRpIlSGPc5lhOEB4Ba3M/s320/wireless-network-1.jpg" alt="" id="BLOGGER_PHOTO_ID_5246202504886993474" border="0" /&gt;&lt;/a&gt;&lt;br /&gt;&lt;/div&gt;&lt;span style=""&gt;&lt;strong&gt;One wireless &lt;a href="http://computer.howstuffworks.com/router.htm"&gt;router&lt;/a&gt; can allow multiple devices to connect to the Internet.&lt;/strong&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:arial,helvetica;"&gt; &lt;/span&gt;   &lt;p&gt;WiFi has a lot of advantages. Wireless networks are easy to set up and inexpensive. They're also unobtrusive -- unless you're on the lookout for a place to use your &lt;a href="http://communication.howstuffworks.com/laptop.htm"&gt;laptop&lt;/a&gt;, you may not even notice when you're in a hotspot. In this article, we'll look at the technology that allows information to travel over the air. We'll also review what it takes to create a wireless network in your home.&lt;/p&gt; &lt;p&gt;First, let's go over a few WiFi basics.&lt;/p&gt;&lt;br /&gt;Source: http://computer.howstuffworks.com&lt;br /&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;</description><link>http://imeester.blogspot.com/2008/09/how-stuff-works.html</link><author>noreply@blogger.com (inbox411)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjd5KMmp6QQpek6jdbQr949n7HVrq-bgaYnlpwXQI9L-cfrWx5jM-g0J7iNoUda6mtZz3ggZA-jZrqYgoAzmrTpr7gus2hQIa21cZWlYWgxSuFZSCpp8oPMmPkmRpIlSGPc5lhOEB4Ba3M/s72-c/wireless-network-1.jpg" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6925264790253362835.post-8674749518316671220</guid><pubDate>Sun, 14 Sep 2008 12:08:00 +0000</pubDate><atom:updated>2008-09-14T05:18:09.794-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Brain</category><category domain="http://www.blogger.com/atom/ns#">Brain Training</category><category domain="http://www.blogger.com/atom/ns#">Improve Memory</category><category domain="http://www.blogger.com/atom/ns#">IQ</category><title>10 Geeky Ways To Train Your Brain</title><description>&lt;a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh6igCKzX5JqmO5MoPKDMW7PWoL7Usw7o7eJGKQ2B8qby8M-KFEV7o0T4ep5hXmCe4rBCkWxBv_UF8K9-B1xzJphZWipPYQt6_4rU3ZKc4fY_ejXsiiouvlZj6Inxwo1SBkeu4Th4l-SPU/s1600-h/fitbrains.jpg"&gt;&lt;img style="cursor: pointer;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh6igCKzX5JqmO5MoPKDMW7PWoL7Usw7o7eJGKQ2B8qby8M-KFEV7o0T4ep5hXmCe4rBCkWxBv_UF8K9-B1xzJphZWipPYQt6_4rU3ZKc4fY_ejXsiiouvlZj6Inxwo1SBkeu4Th4l-SPU/s320/fitbrains.jpg" alt="" id="BLOGGER_PHOTO_ID_5245847911411028850" border="0" /&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;h1 class="articleTitle"&gt;&lt;span style="font-size:100%;"&gt; Train Your Brain&lt;/span&gt;&lt;/h1&gt;Improve your memory, increase your IQ, and test your spatial skills with the help of these 10 fun brain games and exercises.&lt;br /&gt;&lt;br /&gt;&lt;p class="byline"&gt;&lt;span class="bylineBy"&gt;by &lt;/span&gt; &lt;a href="http://www.pcmag.com/author_bio/0,1908,a=5569,00.asp" class="authorsource"&gt;Jennifer L. DeLeo&lt;/a&gt;&lt;/p&gt;&lt;p class="byline"&gt;&lt;span name="intelliTxt" id="intellitxt"&gt;f you're blessed with a memory like an elephant, we congratulate you. However, if you—like me—have a memory like a sieve, you know too well how easy it is to forget where you last left the car keys or if you mailed your mortgage payment.&lt;/span&gt;&lt;/p&gt;&lt;p class="byline"&gt;&lt;span name="intelliTxt" id="intellitxt"&gt; We'd all love to have a memory like that of 50-year-old &lt;a href="http://en.wikipedia.org/wiki/Dominic_O%27Brien" target="_new"&gt;Dominic O'Brien&lt;/a&gt;, who can remember the order of 54 randomly shuffled decks of playing cards (that's 2,808 cards total). The good news is that we're &lt;i&gt;all&lt;/i&gt; capable of improving our memories—maybe not 2,808 cards worth, but every little bit helps. How you go about retraining your brain—whether it's driving a different way to work, reading books you wouldn't normally read, doing crosswords, or starting yoga—is what helps to stimulate and exercise the brain on a day-to-day basis.&lt;/span&gt;&lt;/p&gt;&lt;p class="byline"&gt;&lt;span name="intelliTxt" id="intellitxt"&gt;According to research and advisory firm SharpBrains, the U.S. revenue from brain stimulation products—such as online Flash puzzles and &lt;a title="Nintendo Co. Ltd." href="http://www.pcmag.com/topic/0,2944,t=Nintendo%20Co%20Ltd&amp;amp;s=26589,00.asp"&gt;Nintendo&lt;/a&gt;'s popular Brain Age—rose from $100 million in 2005 to $225 million in 2007. Among the various brain-training resources available today, there are 10 in particular that we think you should check out. Set aside at least 15 minutes a day and try out these great brain exercises and games that will improve your memory, increase your IQ, and test your spatial skills.&lt;/span&gt;&lt;/p&gt;&lt;p class="byline"&gt;&lt;span name="intelliTxt" id="intellitxt"&gt;Here are a couple of resources featured in today's  &lt;!-- start ziffslideshow //--&gt; &lt;a href="http://www.pcmag.com/slideshow/0,1206,l=231633&amp;amp;s=26589&amp;amp;a=231632,00.asp"&gt;The 10 Ultimate Brain-Training Resources&lt;/a&gt; &lt;!-- end ziffslideshow //--&gt;  slideshow:&lt;/span&gt;&lt;/p&gt;&lt;span name="intelliTxt" id="intellitxt"&gt;&lt;b&gt;Fit Brains&lt;/b&gt;&lt;br /&gt;To keep your brain actively fit, visit &lt;a href="http://www.fitbrains.com/" target="_new"&gt; Fit Brains&lt;/a&gt; daily. This site features ten games designed to exercise your visual and spatial skills, memory and concentration, language, and executive functions. Currently in beta, all games are free as long as you sign up to become a member. I have a horrible memory most of the time, so I immediately started playing Crime Scene Shuffle, in which you use your memory skills to convict criminals by collecting clues at the crime scene. It's very &lt;i&gt;CSI&lt;/i&gt;! I've always been a math geek, so I also enjoy playing Sum Snap. You can also read up on the science and technology behind the mind on Fit Brains's blog.&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;span name="intelliTxt" id="intellitxt"&gt;&lt;p&gt;&lt;b&gt;CogniFit MindFit Software&lt;/b&gt;&lt;br /&gt;The unique software program &lt;a href="http://www.e-mindfitness.com/" target="_new"&gt; MindFit&lt;/a&gt; from CogniFit determines how much memory you have left (yes, the results can be very depressing), then helps amp up your memory by designing an individual training program for you. According to the company, the program will help improve brain functioning by more than 18 percent. Consisting of fun algorithms to solve, the program requires you to use it 15 to 20 minutes three times per week. Some of the games include Tip of the Tongue, to test your naming skills, and Picasso, in which you're presented with geometric shapes to solve a puzzle. Download MindFit for $139 or purchase it as a boxed copy for $149.&lt;/p&gt;  &lt;p&gt;Now check out the rest of  &lt;!-- start ziffslideshow //--&gt; &lt;a href="http://www.pcmag.com/slideshow/0,1206,l=231633&amp;amp;s=26589&amp;amp;a=231632,00.asp"&gt;The 10 Ultimate Brain-Training Resources&lt;/a&gt; &lt;!-- end ziffslideshow //--&gt; slideshow, including Smart-Kit, Kaplan's futureU, Happy Neuron, Games for the Brain, Brain Age 2, Lumosity, Brain Arena, and Big Brain Academy: &lt;a title="Nintendo Wii" href="http://www.pcmag.com/topic/0,2944,t=Nintendo%20Wii&amp;amp;s=26589,00.asp"&gt;Wii&lt;/a&gt; Degree.&lt;/p&gt;&lt;/span&gt;Source: &lt;a href="http://www.pcmag.com/article2/0,2817,2329509,00.asp"&gt;http://www.pcmag.com&lt;/a&gt;</description><link>http://imeester.blogspot.com/2008/09/10-geeky-ways-to-train-your-brain.html</link><author>noreply@blogger.com (inbox411)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh6igCKzX5JqmO5MoPKDMW7PWoL7Usw7o7eJGKQ2B8qby8M-KFEV7o0T4ep5hXmCe4rBCkWxBv_UF8K9-B1xzJphZWipPYQt6_4rU3ZKc4fY_ejXsiiouvlZj6Inxwo1SBkeu4Th4l-SPU/s72-c/fitbrains.jpg" width="72"/><thr:total>0</thr:total></item></channel></rss>