<?xml version="1.0" encoding="UTF-8" standalone="no"?><rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:blogger="http://schemas.google.com/blogger/2008" xmlns:gd="http://schemas.google.com/g/2005" xmlns:georss="http://www.georss.org/georss" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/" xmlns:thr="http://purl.org/syndication/thread/1.0" version="2.0"><channel><atom:id>tag:blogger.com,1999:blog-410906527029976681</atom:id><lastBuildDate>Thu, 19 Dec 2024 03:17:46 +0000</lastBuildDate><category>accounting ledger sheets</category><category>Just Google It</category><category>World Wide Web</category><category>spreadsheet</category><category>A laptop that doesn't want to start</category><category>A to Z in Excel</category><category>Actual Size in Bytes</category><category>Anatomy of a Web Address</category><category>Attachment</category><category>Basic Computer Hardware</category><category>Basic internet</category><category>Blogging Tips</category><category>Building the brand</category><category>CD/DVD Disc Burning</category><category>Calculating in Excel</category><category>Change the Display Language</category><category>Chat information</category><category>Common Cables</category><category>Computers Help and Tips</category><category>Connectors</category><category>Consider your words</category><category>Copyright and the Internet</category><category>Data</category><category>Data and then Sort</category><category>Desk.</category><category>Digital Subscriber</category><category>Disable Windows Vista</category><category>Double-clicking</category><category>Email Information</category><category>Email Safety Tips</category><category>Examples of Hardware</category><category>Eyes</category><category>Facebook Privacy Settings</category><category>Find inspiration everywhere</category><category>First impressions count</category><category>Flash Drives or even Thumb Drives</category><category>Format Cells</category><category>Formatting in Excel</category><category>Fully Control Android Device</category><category>Geography of Excel</category><category>Google offers</category><category>Hot Key</category><category>How to Search Like a Pro</category><category>How to servicing your Motherboard</category><category>Hyper Text Markup Language</category><category>IP URL domain</category><category>Improve Your Website</category><category>Including Welcome Screen</category><category>Internet Address Questions</category><category>Internet Relay Chat</category><category>LED LCD TV</category><category>Laser Printers and Ink Jet Printers</category><category>Lifespan</category><category>Lock the Computer Before you Go</category><category>Mega Byte This</category><category>Microsoft latest OS</category><category>Multilingual User Interface Language Pack.</category><category>Need More Space On Your Mac</category><category>Net Information</category><category>PC &amp; laptop.</category><category>Password to open</category><category>Patterns</category><category>Position</category><category>Printer Principles</category><category>Printer's Progress</category><category>Protecting Longevity</category><category>Purchase.</category><category>Re-position the Taskbar</category><category>Recording Function</category><category>Remove</category><category>Replacing existing drive</category><category>Resolution</category><category>Search Engine</category><category>Searching</category><category>Searching for a word on a webpage</category><category>Security &amp; Privacy Guides</category><category>Security Tips</category><category>Sort</category><category>Status</category><category>The Internet</category><category>Try These Tips</category><category>Try repairing</category><category>USB &amp; Other</category><category>USB Drives</category><category>Unlock Password</category><category>Web-based Malware</category><category>Website Security</category><category>Win7 hanging since</category><category>Windows 10 is Microsoft latest OS</category><category>Windows Taskbar</category><category>With Apps Download</category><category>XP window</category><category>Your business website</category><category>accelerator key</category><category>backup &amp; maintenance</category><category>basic unit is the page</category><category>browser infecting</category><category>common abbreviations</category><category>computer equipment</category><category>computer mouse tips</category><category>computer repair shop</category><category>conference groups</category><category>copyright laws</category><category>domain name</category><category>email</category><category>energy saving</category><category>error on screen</category><category>external hard drive</category><category>graphics card</category><category>green apples</category><category>hard disk tips</category><category>hard drive buying tips</category><category>hypertext</category><category>information</category><category>keep your pc anywhere</category><category>keyboard</category><category>laptop occasionally slowly hangs</category><category>laptop problem</category><category>lock your computer</category><category>mail information</category><category>methods to protect or restrict</category><category>mouse tips</category><category>mouse us</category><category>narrow search</category><category>opening up a window on your PC</category><category>pen drive</category><category>position being at the bottom</category><category>potentially readable</category><category>protected</category><category>protected from viruses.</category><category>remove shortcut virus</category><category>saving tips.</category><category>scroll down</category><category>shortcuts</category><category>shortcuts.</category><category>smartphone and respond</category><category>smartstrip</category><category>sophisticated forms of malwar</category><category>sorting a list in excel</category><category>specific word phrase</category><category>superior than Google</category><category>third button</category><category>type in your password</category><category>username</category><title>Computer Tips and Technology Support</title><description>User tips and Problem solution topics.</description><link>http://easiertips.blogspot.com/</link><managingEditor>noreply@blogger.com (Computer Tips and Technology Support)</managingEditor><generator>Blogger</generator><openSearch:totalResults>52</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><language>en-us</language><itunes:explicit>no</itunes:explicit><itunes:subtitle>User tips and Problem solution topics.</itunes:subtitle><itunes:owner><itunes:email>noreply@blogger.com</itunes:email></itunes:owner><item><guid isPermaLink="false">tag:blogger.com,1999:blog-410906527029976681.post-5265766309982567572</guid><pubDate>Sun, 02 Apr 2017 14:27:00 +0000</pubDate><atom:updated>2019-09-11T16:23:23.223+06:00</atom:updated><title/><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;br /&gt;&lt;/div&gt;
</description><link>http://easiertips.blogspot.com/2017/04/blog-post.html</link><author>noreply@blogger.com (Computer Tips and Technology Support)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-410906527029976681.post-3055697743306839495</guid><pubDate>Tue, 03 Nov 2015 13:57:00 +0000</pubDate><atom:updated>2015-12-02T12:11:50.888+06:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Blogging Tips</category><category domain="http://www.blogger.com/atom/ns#">Consider your words</category><category domain="http://www.blogger.com/atom/ns#">Find inspiration everywhere</category><title>Five Blogging Tips </title><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;h1 class="page-title" style="text-align: justify;"&gt;
&lt;/h1&gt;
&lt;div class="page-featured-image" style="text-align: justify;"&gt;
&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;h4&gt;
Here are some of Irwin’s best tips for getting the most out of small business blogging.&lt;/h4&gt;
&lt;/div&gt;
&lt;ol style="text-align: justify;"&gt;
&lt;li&gt;&lt;b&gt;Consider your words. &lt;/b&gt;For Irwin, creating a post 
around his company’s keywords is huge. “A lot of times search engines 
will pick up on my posts based on the keywords I use within them. I want
 to make sure both Google and my customers know that my writings are 
significant in the field,” he says. In Irwin’s case, he uses phrases 
relevant to his business like “video production” in blog titles or tags.
 “There’s an emphasis on creating content on the web right now. It 
really helps establish you with new customers. You want to create a 
happy medium between what’s interesting to the consumer and what you’re 
trying to sell.”&lt;/li&gt;
&lt;li&gt;&lt;b&gt;Find inspiration everywhere. &lt;/b&gt;When you’re writing 
about different topics all the time, it might become difficult to think 
of something new to say. Irwin suggests looking at your own life and 
experiences with customers for inspiration. “This week I posted an 
article about a guy who needed a piece of art installed in his house. He
 hired a crane to bring it six stories high and wanted me to film the 
experience for him. I called my post ‘Video One Gets Artsy’,”
 he says. Irwin also suggests writing about what you know and things 
you’ve done throughout your field. You may not think people will be 
interested but there’s always someone looking for the information you 
can provide. They could end up becoming a customer.&lt;/li&gt;
&lt;/ol&gt;
&lt;ol start="3" style="text-align: justify;"&gt;
&lt;li&gt;&lt;b&gt;Pay it forward. &lt;/b&gt;Irwin strongly believes that if you
 help people, they will be more inclined to help you. And this is the 
case for blogging as well. “I tend to create content around things that 
will help my clients. Maybe they can do some things themselves and I can
 help them learn how to do it. A blog entry is a great opportunity to 
show your personality and give customers a reason to like you” he says.&lt;/li&gt;
&lt;li&gt;&lt;b&gt;Share your posts. &lt;/b&gt;Irwin and his team share their 
posts through Facebook, LinkedIn, Twitter and his personal site. He 
suggests getting another person to help you if you’re not familiar with 
social media to reach a wider audience. Soon, Irwin will also be sending
 out emails once or twice a month to existing clients highlighting some 
featured blog posts. “We’ll definitely include a way for clients to opt 
out if they’d like but overall, we only receive really positive comments
 about the blog.”&lt;/li&gt;
&lt;/ol&gt;
&lt;ol start="5" style="text-align: justify;"&gt;
&lt;li&gt;&lt;b&gt;Stay cool.&lt;/b&gt; It might seem overwhelming to consider 
creating an entire blog, especially if you’re a small business owner 
with a lot of time constraints, but Irwin doesn’t see this as a bad 
thing. “You don’t want to overload customers or yourself,” he says. He 
suggests determining the nature of an individual post first and 
allotting the right time to it. “If you need to do some research it 
might take up to two hours but other posts can be much shorter.” He also
 says it’s important to do what feels right for your business. “If 
there’s a week where you can’t get anything posted, it’s fine. Just pick
 back up when you can. Slowly building a content base is better than not
 having any at all.”&lt;/li&gt;
&lt;/ol&gt;
&lt;/div&gt;
</description><link>http://easiertips.blogspot.com/2015/11/five-blogging-tips.html</link><author>noreply@blogger.com (Computer Tips and Technology Support)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-410906527029976681.post-775093019633318753</guid><pubDate>Mon, 19 Oct 2015 10:09:00 +0000</pubDate><atom:updated>2015-10-19T16:09:38.414+06:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Attachment</category><category domain="http://www.blogger.com/atom/ns#">Email Information</category><category domain="http://www.blogger.com/atom/ns#">Email Safety Tips</category><title>Email Tips</title><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;div class="span-17 last"&gt;

                      
             		&lt;div class="span-17 last"&gt;

      	
		   
			         				         		
   		       
	       
  
      
              
        
          
      &lt;div class="boxed-text"&gt;
 
      &lt;h3 style="text-align: left;"&gt;
&lt;u&gt;5 Ways to Protect Your Computer from Email Viruses and Scans&lt;/u&gt;&lt;/h3&gt;
&lt;h3&gt;
1. DON'T OPEN UNEXPECTED ATTACHMENTS&lt;/h3&gt;
Viruses are often sent via email attachments. Macalester’s email 
service, Google Apps, scans incoming email (sent to @easiertips) and cleans known viruses. It is nevertheless good practice to
 be cautious about unexpected attachments in the unlikely event that a 
new virus escapes the anti-virus update.&amp;nbsp;Learn how to manage&amp;nbsp;email attachments&lt;br /&gt;

&lt;h3&gt;
2. USE SPAM FILTERS&lt;/h3&gt;
Macalester is fortunate in that Google Apps uses one of the most 
advanced and continually improved spam filters in existence. This 
function is greatly enhance when you report a message as spam.&amp;nbsp;&lt;strong&gt;&amp;nbsp;&lt;/strong&gt;Learn how to report spam&lt;br /&gt;

&lt;h3&gt;
3. BEWARE OF EMAIL PHISHING OR SPOOFING&lt;/h3&gt;
Phishing emails are an attempt by thieves to lure you into divulging personal information for their profit.&amp;nbsp;Learn to recognize the telltale signs of phishing&lt;br /&gt;

&lt;h3&gt;
4. USE CAUTION WITH SENSITIVE INFORMATION IN EMAIL&lt;/h3&gt;
By default, @easiertips domain email messages are transferred 
securely via https. Nevertheless sensitive information, commonly known 
as Personal Information Requiring Notification (PIRN), should not be 
transferred via email.&amp;nbsp;Learn more about PIRN&lt;br /&gt;

Even though all Macalester email through Google is secure in transfer
 (https is “on” all the time) this does not change anything that is 
transferred in the message. Viruses and worms can get through, and 
phishing and spoofing attempts can still happen. &lt;br /&gt;

&lt;h3&gt;
5. AVOID CLICKING ON LINKS IN THE BODY OF AN EMAIL MESSAGE&lt;/h3&gt;
While these links may not be a phishing attempt, they may not go to 
the site you intend. Unless you are completely comfortable that the 
email is legitimate, it is best to copy and paste the link or type it in
 directly in your browser.&lt;br /&gt;

    &lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
</description><link>http://easiertips.blogspot.com/2015/10/email-tips.html</link><author>noreply@blogger.com (Computer Tips and Technology Support)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-410906527029976681.post-937154941451535065</guid><pubDate>Mon, 19 Oct 2015 09:48:00 +0000</pubDate><atom:updated>2015-10-19T15:48:38.459+06:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">hard disk tips</category><category domain="http://www.blogger.com/atom/ns#">hard drive buying tips</category><category domain="http://www.blogger.com/atom/ns#">Replacing existing drive</category><title>Computer hard drive buying tips</title><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;article&gt;
      &lt;div class="intro" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"&gt;
When
 purchasing a hard drive, it is important to understand and verify the 
hard drive is suitable for your uses and has or does not have the 
options you may or may not need. Unfortunately, with hard drive 
technologies frequently changing, it is can sometimes be confusing and 
frustrating when looking to purchase a hard drive.&lt;/div&gt;
&lt;h1&gt;
&lt;a href="http://cdn.computerhope.com/hard-drive.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"&gt;&lt;img alt="Computer hard drive" border="0" class="floatRight" height="320" src="http://cdn.computerhope.com/hard-drive.jpg" width="244" /&gt;&lt;/a&gt;Computer hard drive buying tips&lt;/h1&gt;
This document covers all considerations you should think about 
when thinking about upgrading or buying a new computer hard drive.&lt;br /&gt;

      &lt;h2&gt;
Adding a new drive&lt;/h2&gt;
&lt;div class="tab"&gt;
If you are adding a new hard drive because you need more disk space, and you have a desktop computer, a new hard drive can be added without replacing the old drive.&lt;/div&gt;
&lt;div class="tab"&gt;
The benefit of adding a new hard drive is that you 
gain additional storage without having to erase any of your existing 
files or reinstall any of your programs.&lt;/div&gt;
&lt;h2&gt;
Replacing existing drive&lt;/h2&gt;
&lt;div class="tab"&gt;
If you have a laptop computer or want to replace an older hard drive (HDD) with a new solid state drive (SSD),
 keep in mind that anything on the drive will be lost. While it is 
possible to transfer all of the data from one drive to another drive, we
 recommend doing a fresh install to prevent any future problems and to 
clean all of the junk software.&lt;/div&gt;
&lt;div class="tabb"&gt;
Before replacing a hard drive make sure you:&lt;/div&gt;
&lt;ul&gt;
&lt;li&gt;Backup all important data&lt;/li&gt;
&lt;li&gt;Make sure you have the operating system disc or recovery disc&lt;/li&gt;
&lt;li&gt;Make sure you have all the necessary discs to reinstall your software&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;
Interface&lt;/h2&gt;
&lt;div class="tab"&gt;
When
 looking to purchase a hard drive, the first and foremost important 
consideration is the interface the hard drive uses to connect and 
communicate with the computer. Below is a listing of each of the 
available interfaces with information how they may or may not apply to 
your computer.&lt;/div&gt;
&lt;ul&gt;&lt;a href="http://www.computerhope.com/jargon/s/sata.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"&gt;&lt;img alt="Sata cables and motherboard connection" border="0" class="floatRight" height="485" src="http://www.computerhope.com/jargon/s/sata.jpg" width="200" /&gt;&lt;/a&gt;
&lt;li&gt;&lt;b&gt;SATA&lt;/b&gt;
 - The more commonly found hard drive and used with all new computers.  
Most computers today can accommodate at least two SATA devices, and 
sometimes up to four or six SATA devices. Hard drives and other devices,
 like CD and DVD drives, can utilize a SATA connection. Make sure your 
computer has a SATA connection before purchasing this type of hard 
drive.&lt;/li&gt;
&lt;li&gt;&lt;b&gt;IDE/ATAPI/ATA&lt;/b&gt;
 - Another common hard drive interface used with older IBM compatible 
computers. IDE supports a maximum of four IDE devices, which can include
 hard drives and CD-ROM drives. Make sure your computer has an 
IDE/ATAPI/ATA connection before purchasing this type of drive.&lt;/li&gt;
&lt;li&gt;&lt;b&gt;SCSI&lt;/b&gt; - A less common interface, SCSI devices are found on older Apple computers, older IBM computers, and some servers. The SCSI interface is a faster solution when compared to IDE/ATAPI and can support up to eight drives.&lt;/li&gt;
&lt;li&gt;&lt;b&gt;External (USB, FireWire, or Parallel)&lt;/b&gt; - Several external solutions are also available; these include but are not limited to USB,  FireWire, eSATA,
 and Parallel. When considering an external hard drive, it is important 
to look at the speed difference for transferring data to and from the 
hard drive.&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;
Speed of hard drive&lt;/h2&gt;
&lt;div class="tab"&gt;
In addition to the interface, it is also important 
to look at the transfer rates of the hard drive. Long transfer rates can
 reduce the overall speed of your computer. There are two types of hard 
drives: Solid-State Drive (SSD) and the traditional Hard Disk Drive (HDD). &lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="http://www.computerhope.com/jargon/s/ssd.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"&gt;&lt;img alt="Crucial SSD" border="0" class="floatRight" height="341" src="http://www.computerhope.com/jargon/s/ssd.jpg" width="220" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class="tab"&gt;
&lt;b&gt;SSD&lt;/b&gt;
 - An SSD is much faster than a traditional hard drive. If your computer
 is capable of accommodating an SSD, and cost and total space is not as 
much as a consideration, we highly recommend an SSD.&lt;/div&gt;
&lt;div class="tab"&gt;
&lt;b&gt;HDD&lt;/b&gt; - With traditional hard drives the speed is measured in RPM
 (Revolutions Per Minute). An example of this would be a speed of 7,200 
RPM. The higher the RPM, the faster the hard drive, in general. In other
 words, 7,200 RPM is faster than 5,400 RPM.&lt;/div&gt;
&lt;div class="tab"&gt;
&lt;b&gt;Hybrid&lt;/b&gt; - Hybrid hard disk drives are drives that combine the above two technologies into one drive.&lt;/div&gt;
&lt;ul&gt;
&lt;li&gt;Advantages of SSD over HDD&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;
Other considerations&lt;/h2&gt;
&lt;div class="tab"&gt;
Below is a listing of some other important considerations to look at when purchasing a computer hard drive.&lt;/div&gt;
&lt;div class="tab"&gt;
&lt;b&gt;Warranty&lt;/b&gt; - How long is the warranty and what does it cover.&lt;/div&gt;
&lt;div class="tab"&gt;
&lt;b&gt;Included components&lt;/b&gt; - Verify that the hard 
drive comes with all the needed components. Most hard drives should 
include an extra cable and instructions. However, if you need a mounting
 bracket to mount a smaller drive in a larger bay, make sure you also purchase one of these with the drive.&lt;/div&gt;
&lt;div class="tab"&gt;
&lt;b&gt;Support&lt;/b&gt; - Is the technical support number a free number and is it open 24 hours, seven days a week.      &lt;/div&gt;
&lt;div class="tab"&gt;
&lt;b&gt;S.M.A.R.T.&lt;/b&gt; - S.M.A.R.T. is a technology used to help warn the computer user of possible problems with the hard drive.      &lt;/div&gt;
&lt;h2&gt;
Price range&lt;/h2&gt;
&lt;div class="tab"&gt;
The price can vary depending upon the type of hard 
	  drive (SSD or HDD), the interface, capacity of the drive, and speed 
of the drive. In general, drives can range from $70.00 to $300.00 
(U.S.).&lt;/div&gt;
&lt;h2&gt;
Ready to purchase&lt;/h2&gt;
&lt;div class="tab"&gt;
If after reviewing the above information you 
believe you are ready to make a purchase of a new hard drive, verify 
that the source you are purchasing the hard drive is a reputable source.&lt;/div&gt;
&lt;div class="tab"&gt;
To help support Computer Hope, you can purchase through Amazon.&lt;/div&gt;
&lt;h2&gt;
Installing a hard drive&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;Hard drive removal&lt;/li&gt;
&lt;li&gt;Hard drive installation&lt;/li&gt;
&lt;li&gt;Installing a PC IDE/EIDE hard drive.&lt;/li&gt;
&lt;li&gt;Computer hard drive help and support.&lt;/li&gt;
&lt;/ul&gt;
&lt;/article&gt;&lt;/div&gt;
</description><link>http://easiertips.blogspot.com/2015/10/computer-hard-drive-buying-tips.html</link><author>noreply@blogger.com (Computer Tips and Technology Support)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-410906527029976681.post-3946236308260146540</guid><pubDate>Mon, 19 Oct 2015 08:13:00 +0000</pubDate><atom:updated>2015-10-19T14:13:18.195+06:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Improve Your Website</category><category domain="http://www.blogger.com/atom/ns#">Security Tips</category><category domain="http://www.blogger.com/atom/ns#">Website Security</category><title> Improve Your Website Security For 10 Tips</title><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;h1 class="entry-title" style="text-align: justify;"&gt;
&lt;/h1&gt;
&lt;div class="separator" style="clear: both; text-align: justify;"&gt;
&lt;a class="cboxElement" href="https://blog.sucuri.net/wp-content/uploads/2015/06/Ten-Tips-for-Improving-Website-Security.jpg" rel="lightbox" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img alt="Ten-Tips-for-Improving-Website-Security" class="alignnone wp-image-13065 size-full" height="301" src="https://blog.sucuri.net/wp-content/uploads/2015/06/Ten-Tips-for-Improving-Website-Security.jpg" width="640" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
In recent years there has been a proliferation of great tools and 
services in the web development space. Content management systems (CMS) 
like WordPress, Joomla!, Drupal and so many other allow business owners 
to quickly and efficiently build their online presences. Their highly 
extensible architectures, rich plugin, module, extension ecosystem have 
made it easier than ever to get a website up and running without years 
of learning required.&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
This is undoubtedly a great thing; however, an unfortunate side 
effect is that now there are many webmasters who do not understand how 
to make sure their website is secure, or even understand&amp;nbsp;the importance 
of securing their website. In this post I want to share with you the top
 10 steps all webmasters, website owners, can, and should, take to keep 
their website secure.&lt;span id="more-13036"&gt;&lt;/span&gt;&lt;/div&gt;
&lt;h3 style="text-align: justify;"&gt;
1 – Update, Update, Update!&lt;/h3&gt;
&lt;div style="text-align: justify;"&gt;
This is something we cannot stress enough here at Sucuri. Countless 
websites are compromised every day due to the outdated and insecure 
software used to run them. It is incredibly important to update your 
site as soon as a new plugin or CMS version is available. Most hacking 
these days is entirely automated, with bots constantly scanning every 
site they can looking for exploitation opportunities. It is not good 
enough to update once a month or even once a week because bots are very 
likely to find a vulnerability before you patch it. Unless you are 
running a website firewall like CloudProxy, you need to update as soon as updates are released. If running WordPress, I personally recommend the plugin ‘WP Updates Notifier‘ – it emails you to let you know when a plugin or WordPress core update is available. You should also follow @sucuri_security on Twitter to get notified about important updates and security warnings.&lt;/div&gt;
&lt;h3 style="text-align: justify;"&gt;
2 – Passwords&lt;/h3&gt;
&lt;div style="text-align: justify;"&gt;
Working on client sites, I often need to log in to their site/server 
using their admin user details. I am frequently disturbed by how 
insecure their root passwords are. It is a little scary that I have to 
say this, but admin/admin is not a secure username and password 
combination. If your password appears in this list of most common passwords, it is guaranteed that your site will be hacked at some point.&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
Even if your password is not in that list, there are a lot of 
misconceptions about “strong” passwords. The lax requirements on most 
password strength meters are part of the problem. Our friends at WP 
Engine have put together some interesting research that debunks many of the myths surrounding passwords.&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
When it comes to choosing a password there are 3 key requirements that should always be followed (CLU – Complex, Long, Unique):&lt;/div&gt;
&lt;ul style="text-align: justify;"&gt;
&lt;li&gt;&lt;strong&gt;COMPLEX: Passwords should be random. &lt;/strong&gt; Do not let 
someone hack your account just because they could find out your birth 
date or favorite sports team. Password-cracking programs can guess 
millions of passwords in minutes. If you have real words in your 
password, it isn’t random. You might think you are clever for using 
leetspeak (letters replaced with characters L1K3 TH15) but even these 
are not as secure as a completely random string of characters. Hackers 
have compiled some seriously impressive word lists for cracking passwords.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;LONG: Passwords should be 12+ characters long.&lt;/strong&gt; I 
know some in the security community would scoff at an 12 character 
password and insist that passwords should be longer. However, when it 
comes to online login systems, any system that is following simple 
security guide lines should limit the number of failed login attempts. 
If there is a limit on the number of failed login attempts, an 12 
character password will easily stop anyone from guessing it in just a 
few attempts. Having said that, the longer the password, the better.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;UNIQUE: Do not reuse passwords! &lt;/strong&gt; Every single 
password you have should be unique. This simple rule dramatically limits
 the impact of any password being compromised. Having someone find out 
your FTP password should not enable them to log in to your email or 
internet banking account. Contrary to popular belief, we are not as 
unique as we believe ourselves to be; if you can randomly generate the 
password, even better.&lt;/li&gt;
&lt;/ul&gt;
&lt;div style="text-align: justify;"&gt;
Now I can already hear you ask, “how am I supposed to remember 10 
random passwords which are all 12 characters long?” The good news is you
 don’t need to remember them all, and in fact you should not even try. 
The answer is to use a password manager such as “LastPass” (online) and “KeePass 2″
 (offline). These brilliant tools store all your passwords in an 
encrypted format and can easily generate random passwords at the click 
of a button. Password managers make it much easier to use strong 
passwords than it is to memorize a couple of decent passwords.&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
Yes, these password managers &amp;nbsp;can present challenges and a possible 
weak point; just this week LastPass announced a compromise. Not all 
compromises are the same though,&amp;nbsp;more on this another time.&lt;/div&gt;
&lt;h3 style="text-align: justify;"&gt;
3 – One Site = One Container&lt;/h3&gt;
&lt;div style="text-align: justify;"&gt;
I understand the temptation. You have an ‘unlimited’ web hosting plan
 and figure why not host your numerous sites on a single server. 
Unfortunately this is one of the worst security practices I commonly 
see. Hosting many sites in the same location creates a very large attack
 surface.&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
For example, a server containing one site might have a single 
WordPress install with a theme and 10 plugins that can be potentially 
targeted by an attacker. If you host 5 sites on a single server now an 
attacker might have three WordPress installs, two Joomla installs, five 
themes and 50 plugins that can be potential targets. To make matters 
worse, once an attacker has found an exploit on one site, &lt;strong&gt;the infection can spread very easily&lt;/strong&gt;.&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
Not only can this result in all your sites being hacked at the same 
time, it also makes the cleanup process much more time consuming and 
difficult. The infected sites can continue to reinfect one another in an
 endless loop.&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
After the cleanup is successful, you now have a much larger task when
 it comes to resetting your passwords. Instead of just one site, you 
have a number of them. &lt;strong&gt;Every single password&lt;/strong&gt; associated with &lt;strong&gt;every website on the server&lt;/strong&gt; must be changed after the infection is gone: &lt;strong&gt;all of your Content Management System (CMS), database, and File Transfer Protocol (FTP) users&lt;/strong&gt; for all of those websites. If you skip this step, the websites could all be reinfected again and you are back to square one.&lt;/div&gt;
&lt;h3 style="text-align: justify;"&gt;
4 – Sensible User Access&lt;/h3&gt;
&lt;div style="text-align: justify;"&gt;
This rule only applies to sites that have multiple logins. It’s 
important that every user has the appropriate permission they require to
 do their job; if they require escalated permissions momentarily, grant 
it, then reduce it once the job is complete. This is a concept known as &lt;strong&gt;Least Privileged&lt;/strong&gt;.&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
For example, if you have a friend that wants to write a guest blog 
post for you, make sure their account does not have full administrator 
privileges. Your friend’s account should only be able to create new 
posts and edit their own posts because there is no need for them to be 
able to change website settings.&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
Having carefully defined access will limit any mistakes that can be 
made, it reduces the fallout of compromised accounts, and can protect 
against the damage done by ‘rogue’ users. This is a frequently 
overlooked part of user management: &lt;strong&gt;accountability&lt;/strong&gt; and &lt;strong&gt;monitoring&lt;/strong&gt;.
 If people share a user account and an unwanted change is made by that 
user, how do you find out which person on your team was responsible?&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
Once you have separate user accounts for every user, you can keep an 
eye on user behavior by reviewing logs and knowing the usual behavior 
(when and where they normally access the website) so you can spot 
anomalies and confirm with the person that their account hasn’t been 
compromised.&lt;/div&gt;
&lt;h3 style="text-align: justify;"&gt;
5 – Change the Default CMS Settings!&lt;/h3&gt;
&lt;div style="text-align: justify;"&gt;
Today’s CMS applications, although easy to use, are horrible from a 
security perspective for the end users. By far the most common attacks 
against websites are entirely automated, and many of these attacks rely 
on the default settings being used. This means that you can avoid a 
large number of attacks simply by changing the default settings when 
installing your CMS of choice.&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
For example some CMS applications are writeable by the user – 
allowing a user to install whatever extensions they want. There are 
settings that you may want to adjust to control comments, users, and the
 visibility of your user information. The file permissions, which we 
discuss later, are another example of a default setting that can be 
hardened.&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
It is usually easiest to change these default details when installing your CMS, but they can be changed later.&lt;/div&gt;
&lt;h3 style="text-align: justify;"&gt;
6 – Extension Selection&lt;/h3&gt;
&lt;div style="text-align: justify;"&gt;
One of the beautiful things about today’s CMS applications is it’s 
extensibility. What most don’t realize however is that, that same 
extensibility is it’s biggest weakness. There are a massive number of 
plugins, add-ons, and extensions providing virtually any functionality 
you can imagine. However the reality is that at times the massive number
 of extensions can be a double edged sword. Often there are multiple 
extensions offering similar functionality, so how do you know which one 
to install? Here are the things I always look at when deciding which 
extensions to use.&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
The first thing I look for is &lt;strong&gt;when the extension was last updated&lt;/strong&gt;.
 If the last update was more than a year ago I get concerned that the 
author has stopped work on it. I much prefer to use extensions that are 
actively being developed because it indicates that the author would at 
least be willing to implement a fix if any security issues are 
discovered or reported. Furthermore if an extension is not supported by 
the author, then it makes little sense to use it for your website as it 
may stop working at any time.&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
I also like to look at the &lt;strong&gt;age of the extension&lt;/strong&gt; and the &lt;strong&gt;number of installs&lt;/strong&gt;.
 An extension developed by an established author that has numerous 
installs is much more trustworthy than one that has 100 installs and has
 been released by a first-time developer. Not only is the experienced 
developer much more likely to have a good idea about best security 
practices, but they are far less likely to damage their reputation by 
inserting malicious code into their extension. More importantly, the 
larger the user base, the more incentive attackers have to invest in 
trying to break it.&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
It is incredibly important that you download all your extensions and themes from &lt;strong&gt;legitimate sources&lt;/strong&gt;. There are many sites that offer ‘free’ versions that are normally premium and require payment to download. These ‘free’ versions are pirated and frequently infected with malware.
 The websites offering these ‘free’ versions are setup with only one 
goal: to infect as many websites as possible with their malware.&lt;/div&gt;
&lt;h3 style="text-align: justify;"&gt;
7 – Backups&lt;/h3&gt;
&lt;div style="text-align: justify;"&gt;
Like anything in the digital world, it can all be lost in a 
catastrophic event. We often don’t back up enough, but you will thank 
yourself if you take some time to consider the best website backup solutions for your website.&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
Making backups of your website is very important, but storing these 
backups on your web server is a major security risk. These backups 
invariably contain unpatched versions of your CMS and extensions which 
are publicly available, giving hackers easy access to your server.&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
If you’re interested in learning how to make reliable and secure backups of your website, I recommend you read my website backup strategy guide.&lt;/div&gt;
&lt;h3 style="text-align: justify;"&gt;
8 – Server Configuration Files&lt;/h3&gt;
&lt;div style="text-align: justify;"&gt;
You should really get to know your web server configuration files. Apache web servers use the &lt;strong&gt;.htaccess&lt;/strong&gt; file, Nginx servers use &lt;strong&gt;nginx.conf&lt;/strong&gt;, and Microsoft IIS servers use &lt;strong&gt;web.config&lt;/strong&gt;.
 Most often found in the root web directory, these files are very 
powerful. These files allows you to execute server rules, including 
directives that improve your website security.&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
If you aren’t sure which web server you use, you can run your website through Sitecheck and click the Website Details tab.&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
Here are a few rules that I recommend you research and add for your particular web server:&lt;/div&gt;
&lt;ul style="text-align: justify;"&gt;
&lt;li&gt;&lt;strong&gt;Prevent directory browsing&lt;/strong&gt;: This prevents malicious
 users from viewing the contents of every directory on the website. 
Limiting the information available to attackers is always a useful 
security precaution.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Prevent image hotlinking&lt;/strong&gt;: While this isn’t strictly
 a security improvement, it does prevent other websites from displaying 
the images hosted on your web server. If people start hotlinking images 
from your server, the bandwidth allowance of your hosting plan might 
quickly get eaten up displaying images for someone else’s site.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Protect sensitive files:&lt;/strong&gt; You can set rules to 
protect certain files and folders. CMS configuration files are one of 
the most sensitive files stored on the web server as they contain the 
database login details in plain text. There may be other locations that 
can be locked down such as admin areas. You can also restrict PHP 
execution in directories that hold images or allow uploads.&lt;/li&gt;
&lt;/ul&gt;
&lt;div style="text-align: justify;"&gt;
There are many more rules and options that you can look into for your
 web server configuration file. You can search for the name of your CMS,
 your web server and “security” but make sure to confirm your findings 
are legitimate before implementing anything. Some people post bad 
information online with malicious intent.&lt;/div&gt;
&lt;h3 style="text-align: justify;"&gt;
9 – Install SSL&lt;/h3&gt;
&lt;div style="text-align: justify;"&gt;
I’m actually of two minds as to whether or not to include this point 
because there have been so many articles incorrectly stating that 
installing SSL will solve all your security issues. &lt;strong&gt;SSL does nothing to protect your site against any malicious attacks, or stop it from distributing malware.&lt;/strong&gt;&amp;nbsp;SSL
 encrypts communications between Point A and Point B – the website 
server and browser. This encryption is important for one specific 
reason: it prevents anyone from being able to intercept that traffic, 
known as a Man in the Middle (MITM) attack.&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
SSL is especially important for E-Commerce website security
 and any website that accepts form submissions with sensitive user data 
or Personally Identifiable Information (PII). The SSL certificate 
protects your visitors information in transit, which in turn protects 
you from the fines that come along with being found non-compliant with 
PCI DSS.&lt;/div&gt;
&lt;h3 style="text-align: justify;"&gt;
10 – File Permissions&lt;/h3&gt;
&lt;div style="text-align: justify;"&gt;
File permissions define &lt;strong&gt;who&lt;/strong&gt; can do &lt;strong&gt;what&lt;/strong&gt; to a file.&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
Each file has 3 permissions available and each permission is represented by a number:&lt;/div&gt;
&lt;ul style="text-align: justify;"&gt;
&lt;li&gt;‘&lt;strong&gt;Read&lt;/strong&gt;‘ (4): View the file contents.&lt;/li&gt;
&lt;li&gt;‘&lt;strong&gt;Write&lt;/strong&gt;‘ (2): Change the file contents.&lt;/li&gt;
&lt;li&gt;‘&lt;strong&gt;Execute&lt;/strong&gt;‘ (1): Run the program file or script.&lt;/li&gt;
&lt;/ul&gt;
&lt;div style="text-align: justify;"&gt;
If you want to allow multiple permissions you just need to &lt;strong&gt;add the numbers together&lt;/strong&gt;,
 e.g. to allow read (4) and write (2) you set the user permission to 6. 
If you want to allow a user to read (4), write (2) and execute (1) then 
you set the user permission to 7.&lt;/div&gt;
&lt;/div&gt;
</description><link>http://easiertips.blogspot.com/2015/10/improve-your-website-security-for-10.html</link><author>noreply@blogger.com (Computer Tips and Technology Support)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-410906527029976681.post-7842565271823388962</guid><pubDate>Sun, 18 Oct 2015 08:33:00 +0000</pubDate><atom:updated>2015-10-18T14:33:59.990+06:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">computer mouse tips</category><category domain="http://www.blogger.com/atom/ns#">Double-clicking</category><category domain="http://www.blogger.com/atom/ns#">third button</category><title>So here are some computer mouse tips:</title><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;h2 style="text-align: left;"&gt;
&amp;nbsp;mouse tips:&lt;/h2&gt;
&lt;b&gt;Shift + mouse&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;There’s a way to select entire paragraphs of text without needing to hold your mouse down and drag it across the desk like you’re wrestling with it. Simply place the cursor at the beginning of the text you wish to select, then scroll down to the end. Hold the shift key, and left click where you want the selection to end.&lt;br /&gt;&lt;br /&gt;&lt;b&gt;The third button&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;Unless you’re a gamer boasting a Razer Deathadder 2013 mouse with a dozen buttons, your mouse probably has two buttons and a wheel, right? Wrong. In case you didn’t know, the wheel is also a button and can be pressed down. Pressing a link in a browser with the wheel will open the link in a new tab, and pressing it anywhere else will allow you to fast scroll through the page. Holding the CTRL button while scrolling will zoom the browser in and out, and holding the Shift button will make the browser go back or forward.&lt;br /&gt;&lt;br /&gt;&lt;b&gt;Double-click and triple-click&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;Double-clicking a word selects it entirely, but triple-clicking the word will select the entire paragraph. Also, if you double-click a word, but keep your mouse button pressed, you can drag to select entire word by word.&lt;br /&gt;&lt;br /&gt;&lt;b&gt;CTRL Click&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;If you want to highlight particular parts of text that are not next to each other, that can be done simply by CTRL-left clicking whatever you wish to highlight. This might be useful when you’re trying to copy only parts of a table or a list.&lt;br /&gt;&lt;br /&gt;There are other things you can do with your mouse, like switch the left and right button or set up additional buttons to do particular tasks. These are only some mouse tips I found particularly useful in an office environment.&lt;/div&gt;
</description><link>http://easiertips.blogspot.com/2015/10/so-here-are-some-computer-mouse-tips.html</link><author>noreply@blogger.com (Computer Tips and Technology Support)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-410906527029976681.post-8433977942464527022</guid><pubDate>Sat, 17 Oct 2015 10:11:00 +0000</pubDate><atom:updated>2015-10-17T16:11:49.437+06:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">external hard drive</category><category domain="http://www.blogger.com/atom/ns#">Need More Space On Your Mac</category><category domain="http://www.blogger.com/atom/ns#">Try These Tips</category><title>Need More Space On Your Mac? </title><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;h2 style="text-align: center;"&gt;
Try These Tips&amp;nbsp;&lt;/h2&gt;
&lt;span style="font-size: small;"&gt;&amp;nbsp;&lt;strong&gt;“Your startup disk is almost full. You need to make more space available on your startup disk by deleting files.”&lt;/strong&gt;&lt;/span&gt;&lt;br /&gt;

If you are a Mac user and you haven’t run into this particular error 
message yet, chances are you will eventually. If there is less than 20 
GB free on your hard drive, your computer will start to slow down. With 
less than 10 GB, you will be forced to quite running applications until 
more space is cleared.&lt;br /&gt;

Sometimes there’s an easy fix for a full disk—emptying your trash, 
clearing your cache, moving that three-hour video of your sister’s dance
 recital to an external hard drive, etc.&lt;br /&gt;

&lt;strong&gt;Detecting The Source&lt;/strong&gt;&lt;br /&gt;

In other cases, clearing space requires a little detective 
work.&amp;nbsp;Start by checking out your system information, available by 
selecting &lt;em&gt;About This Mac&lt;/em&gt;, clicking on &lt;em&gt;More Information&lt;/em&gt;,
 and checking out the storage tab. If you can see that audio or video 
are eating up your hard drive, the best option is moving songs and 
videos to the cloud or to some kind of external storage device.&lt;br /&gt;

&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="http://infospace.ischool.syr.edu/files/2013/09/Screen-Shot-2013-09-11-at-8.01.24-PM.png" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img alt="The storage data for a relatively clean disk" class="wp-image-24139 " height="270" src="http://infospace.ischool.syr.edu/files/2013/09/Screen-Shot-2013-09-11-at-8.01.24-PM.png" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class="wp-caption alignleft" id="attachment_24139" style="width: 432px;"&gt;
&lt;div class="wp-caption-text"&gt;
The storage data for a relatively clean disk&lt;/div&gt;
&lt;/div&gt;
If apps are the problem, think about removing applications you don’t use regularly.&lt;br /&gt;

&lt;strong&gt;The Obvious, First&lt;/strong&gt;&lt;br /&gt;

The obvious choices are things that you’ve downloaded independently, 
but it’s worth looking at the default apps that came with your computer 
as well, i.e., Garage Band, iMovie, and temporary trial software that 
came automatically loaded.&lt;br /&gt;

Removing applications completely on a Mac requires a little 
creativity.&amp;nbsp;Simply dragging the file from the applications folder to the
 trash will leave behind a lot of the associated files.&lt;br /&gt;

&lt;strong&gt;Use An Uninstaller&lt;/strong&gt;&lt;br /&gt;

To make sure files are completely and totally deleted, use an uninstaller like Amnesia or AppTrap, or follow these instructions from MacRumors for manually deleting applications.&lt;br /&gt;

If a giant chunk of your storage space is taken up by the enigmatic 
yellow “other” bar (that was the case for me), look for file types that 
don’t fall into the named categories. Examples include email messages, 
zip files, and virtualized operating systems.&lt;br /&gt;

&lt;strong&gt;Helpful Tools&lt;/strong&gt;&lt;br /&gt;

It may still not be clear what is hogging space on your Mac. If 
you’re still stumped, try downloading a tool to help visualize the files
 taking up your hard drive. Disk Inventory X worked well for me, but Grand Perspective and Daisy Disk are equally good options.&lt;br /&gt;

&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="http://infospace.ischool.syr.edu/files/2013/09/Screen-Shot-2013-09-11-at-8.10.19-PM.png" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img alt="Disk Inventory X hard drive visualization" class="wp-image-24141 " height="269" src="http://infospace.ischool.syr.edu/files/2013/09/Screen-Shot-2013-09-11-at-8.10.19-PM.png" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class="wp-caption alignright" id="attachment_24141" style="width: 410px;"&gt;
&lt;div class="wp-caption-text"&gt;
Disk Inventory X hard drive visualization&lt;/div&gt;
&lt;/div&gt;
I can tell you from personal experience that cleaning out a full hard
 drive can make a serious difference in your computer’s performance.&amp;nbsp; &lt;/div&gt;
</description><link>http://easiertips.blogspot.com/2015/10/need-more-space-on-your-mac.html</link><author>noreply@blogger.com (Computer Tips and Technology Support)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-410906527029976681.post-965399084973731764</guid><pubDate>Sat, 17 Oct 2015 09:57:00 +0000</pubDate><atom:updated>2015-10-17T15:57:57.918+06:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Anatomy of a Web Address</category><category domain="http://www.blogger.com/atom/ns#">domain name</category><category domain="http://www.blogger.com/atom/ns#">Hyper Text Markup Language</category><title>Anatomy of a Web Address</title><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
You’ve seen them everywhere, even on some state license plates.&amp;nbsp; But 
what does all those http’s and .com’s mean.&amp;nbsp; Here’s the website that I 
referenced for the following information:&amp;nbsp;&lt;br /&gt;
            &lt;u&gt;http://www.googleguide.com/web_address.html&lt;/u&gt;
          &lt;br /&gt;
Below is a simplified explanation of what makes up a web address: &lt;br /&gt;

          &lt;div style="text-align: justify;"&gt;
First of all, the official computer name for a web address is&amp;nbsp;&lt;strong&gt;&lt;u&gt;URL&lt;/u&gt;&lt;/strong&gt;which stands for:&amp;nbsp;&amp;nbsp;&lt;strong&gt;Universal Resource Locator&lt;/strong&gt;.&amp;nbsp;&lt;/div&gt;
&lt;img alt="url image" src="http://www.180techtips.com/images2/7webaddress1.JPG" /&gt;          
          &lt;br /&gt;
Here’s a sample URL:&amp;nbsp;
          &lt;br /&gt;
&lt;h2&gt;
&amp;nbsp;&lt;span class="blue"&gt;&lt;strong&gt;http://&lt;/strong&gt;&lt;/span&gt;&lt;strong&gt;&lt;span style="color: red;"&gt;www&lt;/span&gt;.&lt;span style="color: #cc0099;"&gt;crsd&lt;/span&gt;.&lt;span style="color: #009900;"&gt;org&lt;/span&gt;/&lt;span style="color: #ff3300;"&gt;buildings/nj/&lt;/span&gt;&lt;span style="color: #990000;"&gt;index.html&lt;/span&gt;&lt;/strong&gt;&lt;/h2&gt;
&lt;strong&gt;&lt;u&gt;&lt;span class="blue"&gt;http://&lt;/span&gt;&lt;/u&gt;&lt;/strong&gt;&amp;nbsp;stands for&amp;nbsp;Hyper Text Transfer Protocol&amp;nbsp;and
 that basically tells the computer that we are looking to “Transfer” 
“Hyper Text” (a webpage) from the internet to your computer.&amp;nbsp; When 
typing a web address into Internet Explorer you usually don’t even have 
to type the “http://” because the computer assumes it.&lt;br /&gt;

          &lt;strong&gt;&lt;u&gt;&lt;span style="color: red;"&gt;www&lt;/span&gt;&lt;/u&gt;&lt;/strong&gt;&amp;nbsp;stands for&amp;nbsp;World Wide Web&amp;nbsp;which
 is the body of software rules and protocols that make up what we know 
of as the internet.&amp;nbsp; Just about every webpage you’ll ever view is a part
 of the world wide web.          &lt;br /&gt;

          &lt;table align="right" border="0" style="height: 255px; width: 255px;"&gt;
            &lt;tbody&gt;
&lt;tr&gt;
              &lt;td align="right" valign="top"&gt;
                &lt;ins id="aswift_3_expand" style="background-color: transparent; border: none; display: inline-table; height: 250px; margin: 0; padding: 0; position: relative; visibility: visible; width: 250px;"&gt;&lt;ins id="aswift_3_anchor" style="background-color: transparent; border: none; display: block; height: 250px; margin: 0; padding: 0; position: relative; visibility: visible; width: 250px;"&gt;&lt;/ins&gt;&lt;/ins&gt;&lt;/td&gt;
            &lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;div align="left"&gt;
&lt;strong&gt;&lt;u&gt;&lt;span style="color: #cc0099;"&gt;crsd&lt;/span&gt;&lt;/u&gt;&lt;/strong&gt;&amp;nbsp;in this example stands for Council Rock School District and it is technically the “second level domain name”&amp;nbsp;&lt;/div&gt;
&lt;strong&gt;&lt;u&gt;&lt;span style="color: #009900;"&gt;org&lt;/span&gt;&lt;/u&gt;&lt;/strong&gt;&amp;nbsp;is a an example of a “top level domain name”&amp;nbsp;
 “.org” is primarily used by Non-profits, “.edu” is commonly used by 
schools and universities, “.gov” is used by the government, and the now 
famous “.com” is primarily for commercial websites.&amp;nbsp; Together&lt;strong&gt;&lt;u&gt; crsd.org&lt;/u&gt;&lt;/strong&gt;&amp;nbsp;could be described as the school district’s “domain name”&lt;br /&gt;

            &lt;strong&gt;&lt;u&gt;&lt;span style="color: #ff3300;"&gt;buildings/nj/&lt;/span&gt;&lt;/u&gt;&lt;/strong&gt;&amp;nbsp;if you remember the old old days of DOS
 (before we had mice and folders on the screen) you might remember 
switching folder levels using the “/”.&amp;nbsp; If you don’t remember its OK, 
but you should know that “/buildings/nj/” tells the computer to go to a 
folder labeled “nj” that is inside a folder labeled “buildings”.&lt;br /&gt;

            &lt;strong&gt;&lt;u&gt;&lt;span style="color: #990000;"&gt;index.html&lt;/span&gt;&lt;/u&gt;&lt;/strong&gt;&amp;nbsp;this
 is the actual file name of this webpage.&amp;nbsp; More specifically, “index” is
 the name of the file and “.html” is the file extension which tells the 
computer what kind of file it is.&amp;nbsp; “.html” stands for&amp;nbsp;Hyper Text Markup Language&amp;nbsp;which is the language most web pages are written in.&lt;br /&gt;

            Now you know what the different parts of a web address are. &lt;/div&gt;
</description><link>http://easiertips.blogspot.com/2015/10/anatomy-of-web-address.html</link><author>noreply@blogger.com (Computer Tips and Technology Support)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-410906527029976681.post-3698924119586986770</guid><pubDate>Sat, 17 Oct 2015 09:49:00 +0000</pubDate><atom:updated>2015-10-17T15:49:10.861+06:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">green apples</category><category domain="http://www.blogger.com/atom/ns#">How to Search Like a Pro</category><category domain="http://www.blogger.com/atom/ns#">narrow search</category><title>How to Search Like a Pro</title><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
The internet is big, really, really big.&amp;nbsp; And it keeps growing bigger
 every day.&amp;nbsp; If you want to search it effectively you’re going to need 
to develop a couple of tricks to help you narrow the search.&amp;nbsp; Here’s a 
few real easy ones to integrate into your next search:
          &lt;br /&gt;
&lt;h2&gt;
&lt;strong&gt;&lt;em&gt;Using +, - and “ “ (quotes)&lt;br /&gt;
            to narrow your searches:&lt;/em&gt;&lt;/strong&gt;&lt;/h2&gt;
Lets say you were looking up apples on&amp;nbsp;Google.com.&amp;nbsp;
 If you just type in “apples” you get 22 million returns.&amp;nbsp; A few more 
sites than you can check in an afternoon so lets narrow the search 
down.&amp;nbsp; Let's say that what you're really interested in is&amp;nbsp;&lt;strong&gt;&lt;em&gt;green apples&lt;/em&gt;&lt;/strong&gt;.&amp;nbsp; To see all the apple websites that also have the word “green” on them type this:&lt;br /&gt;

          &lt;img alt="search1" border="0" height="73" src="http://www.180techtips.com/images2/8search1.JPG" width="217" /&gt;&lt;br /&gt;

          Now you will only see those apple sites that also have the 
word green on them.&amp;nbsp; Unfortunately we are still getting almost 6 million
 returned websites:&lt;br /&gt;

          &lt;img alt="search2" border="0" height="73" src="http://www.180techtips.com/images2/8search2.JPG" width="376" /&gt;&lt;br /&gt;

          To narrow the search even more lets eliminate a word.&amp;nbsp; For 
example, some of the websites are also about Apple Computers so lets get
 rid of them by typing this:
          &lt;br /&gt;
&lt;img alt="search3" border="0" height="78" src="http://www.180techtips.com/images2/8search3.JPG" width="220" /&gt;&amp;nbsp;          &lt;br /&gt;

          &lt;table align="right" border="0" style="height: 255px; width: 255px;"&gt;
            &lt;tbody&gt;
&lt;tr&gt;
              &lt;td align="right" valign="top"&gt;
                &lt;ins id="aswift_2_expand" style="background-color: transparent; border: none; display: inline-table; height: 250px; margin: 0; padding: 0; position: relative; visibility: visible; width: 250px;"&gt;&lt;ins id="aswift_2_anchor" style="background-color: transparent; border: none; display: block; height: 250px; margin: 0; padding: 0; position: relative; visibility: visible; width: 250px;"&gt;&lt;/ins&gt;&lt;/ins&gt;&lt;/td&gt;
            &lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
That reduced about 1 million of the returns but we still 
have about 5 million web pages to check out.&amp;nbsp; A final way to narrow the 
search is to use quotes to narrow the search to an exact phrase.&amp;nbsp; For 
example if what we’re really interested in is&amp;nbsp;&lt;strong&gt;&lt;em&gt;granny smith apples&lt;/em&gt;&lt;/strong&gt;&amp;nbsp;we can add that to the search like this:&lt;br /&gt;

            &lt;img alt="search4" border="0" height="93" src="http://www.180techtips.com/images2/8search4.JPG" width="286" /&gt;&lt;br /&gt;

          Now I will only see websites that have the words “granny 
smith” on them in that order spelled the way I spelled them.&amp;nbsp; Using 
quotes is always a great way to narrow a search and in my example I was 
able to go from having 22 million web pages returned from my original 
search for “apples” to around 220,000 by my last example.&lt;/div&gt;
</description><link>http://easiertips.blogspot.com/2015/10/how-to-search-like-pro.html</link><author>noreply@blogger.com (Computer Tips and Technology Support)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-410906527029976681.post-5371352895195430514</guid><pubDate>Sun, 04 Oct 2015 09:19:00 +0000</pubDate><atom:updated>2015-10-04T15:19:17.224+06:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Lock the Computer Before you Go</category><category domain="http://www.blogger.com/atom/ns#">lock your computer</category><category domain="http://www.blogger.com/atom/ns#">type in your password</category><title>Lock the Computer Before you Go</title><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;table align="center" border="0" cellpadding="0" cellspacing="0" style="width: 560px;"&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td valign="top"&gt;&lt;div align="left"&gt;
If
 you work in a network environment you probably have to log onto your 
computer each morning using a password and remember to log off each 
evening before you go.&amp;nbsp; And for network security reasons you're probably
 reminded to never leave your computer while it's logged on.&amp;nbsp; This is 
especially important in a school setting where a malevolent student 
could potentially make a real mess of the school network if they had 
access to a teacher computer.&lt;/div&gt;
&lt;table align="right" border="0" style="height: 255px; width: 255px;"&gt;
              &lt;tbody&gt;
&lt;tr&gt;
              &lt;td align="right" valign="top"&gt;
                &lt;ins id="aswift_2_expand" style="background-color: transparent; border: none; display: inline-table; height: 250px; margin: 0; padding: 0; position: relative; visibility: visible; width: 250px;"&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="http://www.180techtips.com/images3/111keyboard1.JPG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img alt="Lock your computer" border="0" height="142" src="http://www.180techtips.com/images3/111keyboard1.JPG" width="314" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;ins id="aswift_2_anchor" style="background-color: transparent; border: none; display: block; height: 250px; margin: 0; padding: 0; position: relative; visibility: visible; width: 250px;"&gt;&lt;/ins&gt;&lt;/ins&gt;&lt;/td&gt;
            &lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;div align="left"&gt;
Today's tip will help you with a quick way to 
log on and off your computer when you have to step away from it for a 
few minutes.&amp;nbsp; It will save you time as you won't have to log off and 
then back on again.&amp;nbsp; Instead you can just "Lock" your computer while 
you're away from it temporarily.&amp;nbsp; Please note that this will not work in
 all network environments or all operating systems.&amp;nbsp; But you can still 
give it a try:&lt;/div&gt;
&lt;div align="left"&gt;
To lock your computer press the Windows button (bottom left of your keyboard) and the letter "L" at the same time.&amp;nbsp;&lt;/div&gt;
&lt;div align="center"&gt;
&lt;/div&gt;
&lt;div align="left"&gt;
If it works your screen will go blank except for a message that says:&lt;/div&gt;
&lt;div align="center"&gt;
"This computer is in use and has been locked
 by (Your Username).&amp;nbsp; To unlock this computer press CTRL+ALT+DEL and 
type in your password"&lt;/div&gt;
&lt;div align="left"&gt;
This can be a great, easy to use way to lock 
your computer.&amp;nbsp; It doesn't work on all computers though.&amp;nbsp; If it doesn't 
work on your computer you'd have to contact your network administrator 
to ask them about it. Some network administrators decide to disable this
 feature. &lt;br /&gt;
          &lt;/div&gt;
&lt;div&gt;
          &lt;/div&gt;
&lt;/td&gt;
      &lt;/tr&gt;
&lt;tr&gt;
        &lt;td align="left" valign="top"&gt;&lt;div align="left"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div align="left"&gt;
&lt;strong&gt;&lt;u&gt;PRACTICE ACTIVITY&lt;/u&gt;&lt;/strong&gt;:&amp;nbsp;&amp;nbsp;Try locking and unlocking your computer right now to see if it works.&lt;/div&gt;
&lt;div align="left"&gt;
&lt;u&gt;&lt;strong&gt;TO KEEP ON LEARNING&lt;/strong&gt;&lt;/u&gt;&lt;u&gt;&lt;strong&gt;:&lt;/strong&gt;&lt;/u&gt;&amp;nbsp; To learn more about locking your computer try searching the internet for:&lt;/div&gt;
&lt;div align="center"&gt;
Windows key and L&lt;br /&gt;
            Lock your computer&lt;br /&gt;
            Windows shortcut keys          &lt;/div&gt;
&lt;ins id="aswift_3_expand" style="background-color: transparent; border: none; display: inline-table; height: 15px; margin: 0; padding: 0; position: relative; visibility: visible; width: 468px;"&gt;&lt;ins id="aswift_3_anchor" style="background-color: transparent; border: none; display: block; height: 15px; margin: 0; padding: 0; position: relative; visibility: visible; width: 468px;"&gt;&lt;/ins&gt;&lt;/ins&gt;&lt;/td&gt;
      &lt;/tr&gt;
&lt;tr&gt;
        &lt;td align="center"&gt;&lt;br /&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;/div&gt;
</description><link>http://easiertips.blogspot.com/2015/10/lock-computer-before-you-go.html</link><author>noreply@blogger.com (Computer Tips and Technology Support)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-410906527029976681.post-5969058788859808284</guid><pubDate>Thu, 01 Oct 2015 06:03:00 +0000</pubDate><atom:updated>2015-10-01T12:03:21.287+06:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Flash Drives or even Thumb Drives</category><category domain="http://www.blogger.com/atom/ns#">USB Drives</category><title>USB Drives</title><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;div align="left"&gt;
You
 may have seen other people with them, you might even have one of your 
own.&amp;nbsp; They’re the newest and most convenient way to store data and they 
look like these:&lt;/div&gt;
&lt;div align="center"&gt;
&lt;img alt="Sample USB drives" border="0" height="104" src="http://www.180techtips.com/images3/95thumb1.JPG" width="406" /&gt;&lt;br /&gt;
            &lt;img alt="More sample USB drives" border="0" height="97" src="http://www.180techtips.com/images3/95thumb2.JPG" width="295" /&gt;&lt;br /&gt;
            They also go by various names:&amp;nbsp; USB Drives, Flash Memory, Flash Drives or even Thumb Drives:&lt;br /&gt;
            &lt;img alt="A Thumb Drive" border="0" height="98" src="http://www.180techtips.com/images3/95thumb3.JPG" width="143" /&gt;&lt;/div&gt;
&lt;div&gt;
            &lt;div align="center"&gt;
Here's a link to the top 10 weirdest looking USB drives:&lt;br /&gt;
              &lt;a href="http://gadgets.fosfor.se/the-top-10-weirdest-usb-drives-ever/" title="http://gadgets.fosfor.se/the-top-10-weirdest-usb-drives-ever/"&gt;http://gadgets.fosfor.se/the-top-10-weirdest-usb-drives-ever/&lt;/a&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div&gt;
            &lt;strong&gt;&lt;u&gt;What you need to know about USB Drives:&lt;/u&gt;&lt;/strong&gt;&lt;br /&gt;

            &lt;ol&gt;
&lt;li&gt;
                &amp;nbsp;They go by several names:&amp;nbsp; Thumb drives, flash 
drives, flash memory, SanDisk drives.&amp;nbsp; The most official name would be 
just “USB Drive”&lt;br /&gt;

              &lt;/li&gt;
&lt;li&gt;
                They have much greater storage capacity than old fashioned floppy disks and are easier to carry than CD’s.&lt;br /&gt;

              &lt;/li&gt;
&lt;li&gt;
                They plug into the USB ports of any computer here at school&lt;br /&gt;

              &lt;/li&gt;
&lt;li&gt;
                There are two “speeds”:&amp;nbsp; USB 1.0 and USB 2.0 (2.0 is faster and all new USB drives are 2.0)&lt;br /&gt;

              &lt;/li&gt;
&lt;li&gt;
                They come in these standard sizes:&amp;nbsp;&amp;nbsp;&lt;a href="http://www.everythingusb.com/128mb_usb_flash_drives.html" title="http://www.everythingusb.com/128mb_usb_flash_drives.html"&gt;&lt;span title="http://www.everythingusb.com/128mb_usb_flash_drives.html"&gt;128MB&lt;/span&gt;&lt;/a&gt;,&lt;a href="http://www.everythingusb.com/256mb_usb_flash_drives.html" title="http://www.everythingusb.com/256mb_usb_flash_drives.html"&gt;&lt;span title="http://www.everythingusb.com/256mb_usb_flash_drives.html"&gt;256MB&lt;/span&gt;&lt;/a&gt;,&amp;nbsp;&lt;a href="http://www.everythingusb.com/512mb_usb_flash_drives.html" title="http://www.everythingusb.com/512mb_usb_flash_drives.html"&gt;&lt;span title="http://www.everythingusb.com/512mb_usb_flash_drives.html"&gt;512MB&lt;/span&gt;&lt;/a&gt;,&amp;nbsp;&lt;a href="http://www.everythingusb.com/1gb_usb_flash_drives.html" title="http://www.everythingusb.com/1gb_usb_flash_drives.html"&gt;&lt;span title="http://www.everythingusb.com/1gb_usb_flash_drives.html"&gt;1GB&lt;/span&gt;&lt;/a&gt;,&lt;a href="http://www.everythingusb.com/2gb_usb_flash_drives.html" title="http://www.everythingusb.com/2gb_usb_flash_drives.html"&gt;&lt;span title="http://www.everythingusb.com/2gb_usb_flash_drives.html"&gt;2GB&lt;/span&gt;&lt;/a&gt;.&amp;nbsp; Most recently&amp;nbsp;&lt;a href="http://www.everythingusb.com/kingston-data-traveler-200-flash-drive-17303.html"&gt;USB drives have gotten much larger&lt;/a&gt;&amp;nbsp;by the way.&amp;nbsp;&lt;br /&gt;

              &lt;/li&gt;
&lt;li&gt;
                Prices for USB drives range from $6-$129. &amp;nbsp;If a 512MB
 USB drive costs about $12 that equals about $.02 per MB.&amp;nbsp; Compare that 
to the price of an old fashioned 3.5” floppy diskette which holds 1.44 
MB's and could cost you about $.20 per MB.&lt;br /&gt;

              &lt;/li&gt;
&lt;/ol&gt;
To learn more about exactly how Flash Memory works try the video below.&lt;br /&gt;

            &lt;h2&gt;
&lt;strong&gt;Featured YouTube Video,&lt;/strong&gt;&lt;/h2&gt;
&lt;span style="font-size: x-small;"&gt;&lt;a href="http://www.youtube.com/watch?v=msi5GDz9JIw"&gt;How Flash Memory Works&lt;/a&gt;:&lt;/span&gt;&lt;br /&gt;
&lt;h2&gt;

            &lt;/h2&gt;
&lt;/div&gt;
&lt;div align="left"&gt;
&amp;nbsp;&lt;strong&gt;&lt;u&gt;PRACTICE ACTIVITY&lt;/u&gt;&lt;/strong&gt;:&amp;nbsp;&amp;nbsp;Look around for someone else who has a flash drive.&amp;nbsp; Chances are someone around you might be using one.
          &lt;/div&gt;
&lt;div align="left"&gt;
&lt;u&gt;&lt;strong&gt;TO KEEP ON LEARNING&lt;/strong&gt;&lt;/u&gt;&lt;u&gt;&lt;strong&gt;:&lt;/strong&gt;&lt;/u&gt;&amp;nbsp; To find more about flash drives try searching the internet for:&lt;/div&gt;
&lt;div align="center"&gt;
How Flash Drives Work&lt;br /&gt;
            Computer memory&lt;br /&gt;
            Thumb drives&lt;/div&gt;
&lt;/div&gt;
</description><link>http://easiertips.blogspot.com/2015/10/usb-drives.html</link><author>noreply@blogger.com (Computer Tips and Technology Support)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-410906527029976681.post-2622011914429634248</guid><pubDate>Thu, 01 Oct 2015 05:55:00 +0000</pubDate><atom:updated>2015-10-01T11:55:12.729+06:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Actual Size in Bytes</category><category domain="http://www.blogger.com/atom/ns#">common abbreviations</category><category domain="http://www.blogger.com/atom/ns#">Mega Byte This</category><title>Mega Byte This</title><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
When you work with computers you see KB (or KiloBytes) 
and MB (or MegaBytes) all the time but what does it stand for? Basically
 it’s a measurement of memory on a computer. To help you understand 
exactly what in means there is an example below.
        &lt;br /&gt;
&lt;h2 align="left"&gt;
 &lt;strong&gt;So What’s a Byte anyway?&lt;/strong&gt;&lt;/h2&gt;
&lt;table align="right" border="0" style="height: 255px; width: 255px;"&gt;
              &lt;tbody&gt;
&lt;tr&gt;
              &lt;td align="right" valign="top"&gt;
                &lt;ins id="aswift_2_expand" style="background-color: transparent; border: none; display: inline-table; height: 250px; margin: 0; padding: 0; position: relative; visibility: visible; width: 250px;"&gt;&lt;ins id="aswift_2_anchor" style="background-color: transparent; border: none; display: block; height: 250px; margin: 0; padding: 0; position: relative; visibility: visible; width: 250px;"&gt;&lt;/ins&gt;&lt;/ins&gt;&lt;/td&gt;
            &lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;div align="left"&gt;
When you get right down to it computers only 
know two things off and on.&amp;nbsp; That’s it just OFF and ON. And a computer 
expresses OFF as a “0” and ON as a “1”. Everything you see on the screen
 right now is just a specifically ordered combination of 1’s and 0’s to 
the computer that tell it exactly how to display this webpage. Now 
here’s the confusing part. Each individual 1 or 0 is called a&amp;nbsp;&lt;strong&gt;BIT&lt;/strong&gt;and&amp;nbsp;&lt;strong&gt;8 BITS&lt;/strong&gt;&amp;nbsp;together is called a&lt;strong&gt; BYTE&lt;/strong&gt;. When you type a 0 the computer actually recognizes that zero as the series of 8 BITS or “00000000”&lt;/div&gt;
&lt;div align="left"&gt;
Here are some examples of what some other numbers and letters look like to the computer:&lt;/div&gt;
&lt;div align="center"&gt;
            &lt;table border="0" cellpadding="0" id="table1" style="width: 100%px;"&gt;
              &lt;tbody&gt;
&lt;tr&gt;
                  &lt;td align="center"&gt;0 = 00000000&lt;/td&gt;
                  &lt;td align="center"&gt;a = 01100001&lt;/td&gt;
                  &lt;td align="center"&gt;L = 01001100&lt;/td&gt;
                &lt;/tr&gt;
&lt;tr&gt;
                  &lt;td align="center"&gt;1 = 00000001&lt;/td&gt;
                  &lt;td align="center"&gt;v = 01110110&lt;/td&gt;
                  &lt;td align="center"&gt;p = 01110000&lt;/td&gt;
                &lt;/tr&gt;
&lt;tr&gt;
                  &lt;td align="center"&gt;2 = 00000010&lt;/td&gt;
                  &lt;td align="center"&gt;$ = 00100100&lt;/td&gt;
                  &lt;td align="center"&gt;z = 01111010&lt;/td&gt;
                &lt;/tr&gt;
&lt;/tbody&gt;
            &lt;/table&gt;
&lt;/div&gt;
&lt;div align="left"&gt;
Here’s a link to even more if you’re curious:&lt;a href="http://www.micron.com/k12/lessonplans/zerosones/asciibinary.html"&gt; &lt;strong&gt;http://www.micron.com/k12/lessonplans/zerosones/asciibinary.html&amp;nbsp;&lt;/strong&gt;&lt;/a&gt;&lt;br /&gt;
            &lt;br /&gt;
            So, in really super simplified terms, when I type the letter
 “L” the computer translates that to be the BYTE “01001100."&amp;nbsp; If I typed
 the letter “L” 50 times that would be 50 BYTES of information. If I 
typed the letter “L” 1000 times that would be 1000 BYTES or 1 KiloByte 
or 1KB.&amp;nbsp; Actually Bytes are measured in powers of 2 so 1KB isn't exactly
 1000 bytes, but it is close enough.&amp;nbsp; Below is a chart of common 
abbreviations and their actual values in bytes:&lt;/div&gt;
&lt;table border="1" id="table2" style="width: 100%px;"&gt;
            &lt;tbody&gt;
&lt;tr&gt;
                &lt;td align="center"&gt;&lt;strong&gt;Name&lt;/strong&gt;&lt;/td&gt;
                &lt;td align="center"&gt;&lt;strong&gt;Abbreviation&lt;/strong&gt;&lt;/td&gt;
                &lt;td align="center" width="184"&gt;&lt;strong&gt;Actual Size in Bytes&lt;/strong&gt;&lt;/td&gt;
              &lt;/tr&gt;
&lt;tr&gt;
                &lt;td align="center"&gt;KiloBytes&lt;/td&gt;
                &lt;td align="center"&gt;KB&lt;/td&gt;
                &lt;td align="center" width="184"&gt;1024&lt;/td&gt;
              &lt;/tr&gt;
&lt;tr&gt;
                &lt;td align="center"&gt;MegaBytes&lt;/td&gt;
                &lt;td align="center"&gt;MB&lt;/td&gt;
                &lt;td align="center" width="184"&gt;1,048,576&lt;/td&gt;
              &lt;/tr&gt;
&lt;tr&gt;
                &lt;td align="center"&gt;GigaBytes&lt;/td&gt;
                &lt;td align="center"&gt;GB&lt;/td&gt;
                &lt;td align="center" width="184"&gt;1,073,741,824&lt;/td&gt;
              &lt;/tr&gt;
&lt;/tbody&gt;
          &lt;/table&gt;
&lt;div align="left"&gt;
&lt;br /&gt;
            To learn more about these bytes and their abbreviations try this site:&lt;br /&gt;
            &lt;a href="http://computer.howstuffworks.com/bytes1.htm"&gt;&lt;strong&gt;http://computer.howstuffworks.com/bytes1.htm&lt;/strong&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div align="left"&gt;
And here's some even more specific information about how bytes and mega bytes are measured:&amp;nbsp;&amp;nbsp;&lt;a href="http://www.t1shopper.com/tools/calculate/"&gt;&lt;strong&gt;http://www.t1shopper.com/tools/calculate/&lt;/strong&gt;&lt;/a&gt;&lt;/div&gt;
&lt;/div&gt;
</description><link>http://easiertips.blogspot.com/2015/10/mega-byte-this.html</link><author>noreply@blogger.com (Computer Tips and Technology Support)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-410906527029976681.post-7690381179735084134</guid><pubDate>Thu, 01 Oct 2015 05:49:00 +0000</pubDate><atom:updated>2015-10-01T11:49:11.024+06:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Laser Printers and Ink Jet Printers</category><category domain="http://www.blogger.com/atom/ns#">Printer Principles</category><category domain="http://www.blogger.com/atom/ns#">Printer's Progress</category><title>Printer Principles</title><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
So how does a printer work anyway?
        &lt;br /&gt;
&lt;div&gt;
          We have them all over the place, and many of us use them everyday, but how many people have any idea how they work?&lt;br /&gt;

          Today’s technology tip will give you some basic information
 about how the venerable laser printer and ink jet printer works.&amp;nbsp; But 
first some background:&lt;br /&gt;

        &lt;/div&gt;
&lt;table align="right" border="0" style="height: 255px; width: 255px;"&gt;
          &lt;tbody&gt;
&lt;tr&gt;
              &lt;td align="right" valign="top"&gt;
                &lt;ins id="aswift_2_expand" style="background-color: transparent; border: none; display: inline-table; height: 250px; margin: 0; padding: 0; position: relative; visibility: visible; width: 250px;"&gt;&lt;ins id="aswift_2_anchor" style="background-color: transparent; border: none; display: block; height: 250px; margin: 0; padding: 0; position: relative; visibility: visible; width: 250px;"&gt;&lt;/ins&gt;&lt;/ins&gt;&lt;/td&gt;
            &lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;h2&gt;
&lt;em&gt;&lt;strong&gt;&lt;u&gt;The Printer's Progress:&lt;/u&gt;&lt;/strong&gt;&lt;/em&gt;&lt;/h2&gt;
In the beginning there was the pen, paper and a room full of monks.&amp;nbsp; Eventually this was replaced by the&lt;a href="http://inventors.about.com/library/inventors/bltypewriter.htm" title="http://inventors.about.com/library/inventors/bltypewriter.htm"&gt;typewriter&lt;/a&gt;&amp;nbsp;and carbon paper (if you’ve never heard of carbon paper before here’s a link to:&amp;nbsp;&amp;nbsp;&lt;a href="http://www.kevinlaurence.net/essays/cc.php" title="http://www.kevinlaurence.net/essays/cc.php"&gt;The Exciting History of Carbon Paper&lt;/a&gt;).&amp;nbsp;
 When computers came out there was a great urge to create “hardcopies” 
or printouts of whatever the computer did.&amp;nbsp; Initially they connected&amp;nbsp;&lt;a href="http://www.columbia.edu/acis/history/teletype.html" title="http://www.columbia.edu/acis/history/teletype.html"&gt;teletype machines&lt;/a&gt;to early computers but these were eventually replaced with&amp;nbsp;&lt;a href="http://bits.me.berkeley.edu/mmcs/PROPRNT2/DOTMATRX.HTM" title="http://bits.me.berkeley.edu/mmcs/PROPRNT2/DOTMATRX.HTM"&gt;dot matrix printers&lt;/a&gt;.&amp;nbsp;
 By the late 1980’s the old dot matrix printers, with their messy ink 
ribbons and uniform letter spacing, were being replaced by better 
technologies.&lt;br /&gt;

        Today there are basically two kinds of printers, Laser 
Printers and Ink Jet Printers.&amp;nbsp; The laser printers are the best choice 
for large scale printing while the ink jets are better for small scale 
printing.&amp;nbsp; Chances are you have an ink jet printer at home for example.&lt;br /&gt;

        &lt;strong&gt;How they Work:&lt;br /&gt;
          &lt;img align="right" alt="Laser Printer" border="0" height="165" src="http://www.180techtips.com/images3/122printers2.JPG" width="225" /&gt;Ink Jet Printers&lt;/strong&gt;&amp;nbsp;–
 They spray tiny drops of ink onto the paper to create the image.&amp;nbsp; The 
dots are as small as 50 microns. &amp;nbsp;A human hair is about 70 microns for 
reference, so don’t bother looking for them.&amp;nbsp; For more information about
 how ink jet printers work we recommend this website:&amp;nbsp;&lt;a href="http://www.howstuffworks.com/inkjet-printer.htm" title="http://www.howstuffworks.com/inkjet-printer.htm"&gt;http://www.howstuffworks.com/inkjet-printer.htm&lt;/a&gt;&amp;nbsp;&amp;nbsp;&lt;br /&gt;

        &lt;a href="http://www.180techtips.com/images3/122printers1.JPG" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"&gt;&lt;img align="right" alt="Inkjet Printer" border="0" height="185" src="http://www.180techtips.com/images3/122printers1.JPG" width="194" /&gt;&lt;/a&gt;&lt;strong&gt;Laser Jet Printers&amp;nbsp;&lt;/strong&gt;–
 They use static electricity to stick plastic powder (toner) on the 
paper and then melt it onto the paper using a hot roller.&amp;nbsp; That’s right,
 laser jets don’t use ink they use toner which is a very fine plastic 
powder. &amp;nbsp;For more information about how these printers work I recommend 
this website:&amp;nbsp;&lt;a href="http://computer.howstuffworks.com/laser-printer.htm" title="http://computer.howstuffworks.com/laser-printer.htm"&gt;http://computer.howstuffworks.com/laser-printer.htm&lt;/a&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;There
 are color laser jet printers by the way.&amp;nbsp; They use toner that is black,
 cyan, magenta and yellow to create all the colors of the rainbow.&lt;br /&gt;

        &lt;br /&gt;
    &lt;br /&gt;

        
        
       &lt;center&gt;
&lt;/center&gt;
&lt;div align="left"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div align="left"&gt;
&lt;strong&gt;&lt;u&gt;PRACTICE ACTIVITY&lt;/u&gt;&lt;/strong&gt;:&amp;nbsp;&amp;nbsp;Try to identify whether the printers you use are Laser Jet Printers or Ink Jet Printers.&lt;/div&gt;
&lt;div align="left"&gt;
&lt;u&gt;&lt;strong&gt;TO KEEP ON LEARNING&lt;/strong&gt;&lt;/u&gt;&lt;u&gt;&lt;strong&gt;:&lt;/strong&gt;&lt;/u&gt;&amp;nbsp; You can learn more about computer printers by searching the internet for:&lt;/div&gt;
&lt;div align="center"&gt;
Computer Printer History&lt;br /&gt;
            Ink Jet Printers&lt;br /&gt;
            Laser Jet Printers&lt;/div&gt;
&lt;/div&gt;
</description><link>http://easiertips.blogspot.com/2015/10/printer-principles.html</link><author>noreply@blogger.com (Computer Tips and Technology Support)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-410906527029976681.post-2678209722042990506</guid><pubDate>Thu, 24 Sep 2015 10:05:00 +0000</pubDate><atom:updated>2015-09-24T16:05:38.612+06:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Digital Subscriber</category><category domain="http://www.blogger.com/atom/ns#">potentially readable</category><category domain="http://www.blogger.com/atom/ns#">Security &amp; Privacy Guides</category><title>Security &amp; Privacy Guides</title><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
These two guides are designed to help you understand security and 
privacy issues while connecting to the web and the Internet and to give 
you things you can do to improve both.&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="http://www.walthowe.com/navnet/security.html"&gt;&lt;b&gt;Security Guide&lt;/b&gt;&lt;/a&gt;. Learn how vulnerable you are to intrusion by hackers and crackers and what steps you can take to protect yourself.Are you safe from crackers and hackers on your home or office system? If
 you use a dial-up connection, you probably are reasonably safe. If you 
use a full time network connected to the Internet or use a full time 
connection like cable modem or Digital Subscriber Line (DSL), you may be
 quite vulnerable.. At any time, thousands of automated programs are 
running on the Internet just looking for vulnerable computer systems. As
 a result, your computer is probably being probed repeatedly during the 
day. In the day before I wrote this, I had probes blocked by my firewall
 software from Chile, two sites in China, a Korean elementary school 
(what are they teaching there, anyway?), Norway, California, and 
Washington state.

You can test your own system's security using the Shields UP
 web site. If it shows you that your system is vulnerable, consider 
reconfiguring your system to prevent intrusions (the Shields UP site 
will help) or installing good firewall software. 
&lt;br /&gt;

Another site to check your system security is Symantec's Security Check.
&lt;br /&gt;


A firewall refers to the concept of a security interface or gateway 
between a closed system or network and the outside Internet that blocks 
or manages communications in and out of the system. The security may be 
provided by passwords, authentication techniques, software, and 
hardware. In particular, I recommend the free &lt;a href="http://free.avg.com/us-en/homepage/"&gt;AVG Anti-Virus&lt;/a&gt; for protecting a personal Windows system or the &lt;a href="http://www.symantec.com/sabu/nis/nis_pe/"&gt;Norton Internet Security&lt;/a&gt;
 package. Many ISPs provide a free security package these days. If you 
have a home network and a router, your router provides another type of 
firewall for you. Make sure you use its security features, including 
wireless encryption.
&lt;br /&gt;
 &lt;/li&gt;
&lt;li&gt;&lt;a href="http://www.walthowe.com/navnet/privacy.html"&gt;&lt;b&gt;Privacy on the Internet&lt;/b&gt;&lt;/a&gt;.
 Learn what information about yourself is available on the World Wide 
Web and Internet and what steps you can take to better protect yourself.&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.blogger.com/null" name="intro"&gt;&lt;b&gt;Introduction.&lt;/b&gt;&lt;/a&gt;
We are in the midst of the Information Era! There has been an enormous information explosion,
and the mushrooming popularity of the Internet and its World Wide Web puts huge amounts of
information right at your fingertips. How much of that information is about you? Are you 
concerned about it?
&lt;br /&gt;

Some of the threats to privacy have been widely publicized. NSA is 
accessing Internet communications all over the world. The Federal 
Government wants the FBI to be able to access any one's PC. Amazon has 
been sharing customer information with others in their "purchase 
circles". Several years ago, a major security hole was revealed in 
Microsoft's Hotmail service that allowed anyone to view any hotmail 
member's mailbox by using a correctly configured URL that included the 
username, but not the password.
&lt;br /&gt;

If you are running a business, you probably want information to be easily accessible about your 
products or services. You don't want potential customers to look elsewhere because they
could not locate information about your business. Possibly you want your name to be readily
recognizable, too. It may enhance your career standing. But what about your personal 
telephone number? Or your personal home address? Do you want your e-mail address to be
accessible to all? Do you want just anyone to know about your personal interests? What
information would you expect to remain private and unavailable to anyone with an Internet
account? Are your expectations realistic, and what can you do about it? This 
page will give you some answers.
&lt;br /&gt;
&lt;b&gt;What information do you give away while web surfing?&lt;/b&gt;
&lt;br /&gt;
When you visit a web site, some information is automatically available:
&lt;/li&gt;
&lt;li&gt;who your provider is
							&lt;/li&gt;
&lt;li&gt;where it is located
							&lt;/li&gt;
&lt;li&gt;what site you came from
							&lt;/li&gt;
&lt;li&gt;what software you are using.
	  &lt;/li&gt;
&lt;/ul&gt;
It can also record information about what you do while
you are there, and perhaps collect further information from you, such as the controversial &lt;a href="http://www.walthowe.com/glossary/g.html#guid" target="_blank"&gt;Globally Unique Identifier (GUID)&lt;/a&gt;. Many sites want you to register
in order to use their services. You may be asked your real name and e-mail address, your home or
business address, your telephone number, your income level, your interests, and so on. This
can be valuable information for running a business. The information is voluntary, of course,
and they have no way to tell if you are faking the information. Think twice before giving out
such information freely. Think about who you are giving it to and what uses they could put the
information to. How does your name get on &lt;a href="https://www.blogger.com/null"&gt;spam&lt;/a&gt; mailings? This is one way!
The &lt;a href="http://www.nytimes.com/"&gt;NY Times&lt;/a&gt; wants you to register for the privilege of reading 
their online newspaper. Will they misuse the information they get and sell it to spam mailers? 
Perhaps not! Will Joe's Awesome Cool Sites page resell the information? You decide.
&lt;br /&gt;
If you want to prevent web sites from collecting information 
automatically
about you and your computer, software, provider, and previous sites, you
 can use anonymizer sites to protect this information from being passed 
along. See &lt;a href="http://en.wikipedia.org/wiki/Anonymizer"&gt;Wikipedia's Anonymizer page&lt;/a&gt; for more help with this.&lt;br /&gt;
&lt;a href="https://www.blogger.com/null" name="cookies"&gt;&lt;b&gt;What are cookies, and should you disable them?&lt;/b&gt;&lt;/a&gt;
&lt;br /&gt;
If you clicked on the NY Times link above, and it was your first visit there, you were asked to
register and provide some information. If it was not your first visit and you had already 
registered, you were probably not asked to register again. How could they tell that you were
a repeat visitor? The answer is that they planted a &lt;a href="https://www.blogger.com/null"&gt;cookie&lt;/a&gt; on
your system with information about you. When you connected, your cookie files were checked to see
if you were a registered user, and if you had elected to store your username and password in
the cookie. This is an example of a persistent cookie, which remains on your system for a long
time. Only the service that installed the cookie has access to it (besides yourself). It is
either in a cookies.txt file on your browser's disk drive or in a separate file of its own.
Cookies may or may not be encrypted.
&lt;br /&gt;
Many ISPs use another type of cookie to keep track of
logins. They can use a non-persistent cookie that remains in RAM, not on
 disk, while you are connected. If you are a registered member of an 
ISP, you must log in with your username and password the first time you 
access parts of the service that are for members-only (this page isn't 
one of those). Unless you have told your browser not to accept cookies, 
which is an option you have, you can continue to visit members-only 
parts of the service until you close your browser and the cookie goes 
away.On the other hand, if you tell Delphi to remember your password, it
 is stored in a persistent cookie, and you don't have to retype it each 
time. If you refuse cookies, every new page you visit for members only 
will ask you to log in again with your username and password. The cookie
 makes it easier for you to get around, and no one but you and the 
service can access the cookie.
&lt;br /&gt;
Cookies are very common and are used to simplify navigation for 
you and identify you to the site you are visiting. A cookie can store 
quite a bit of information about you, and release it again each time you
 visit the site that generated it. A NOTE OF CAUTION: The site that 
generates the cookie isn't necessarily the site you are visiting. In 
some cases, cookies may be generated by another site, such as an 
advertising agency, that is providing services for a number of web 
sites. In this situation, the cookie-generating site may collect 
information on you any time you visit any of its sites. It won't know 
your identity (unless they can cajole you to fill out a form), but it 
will know your habits.
&lt;br /&gt;
For a much more thorough explanation of cookies, see the &lt;a href="http://www.cookiecentral.com/faq/"&gt;Cookie FAQ&lt;/a&gt; at cookiecentral.com.
&lt;br /&gt;
Should you disable cookies on your system? It is a personal 
judgment to make, just as it is your judgment how much information to 
give out about yourself as you visit web sites. Personally, I allow 
cookies to do their thing, but I am very careful about the information I
 give out and where I give it. i won't fill out a form full of personal 
information to get a one in a million chance of winning a prize, for 
example.
&lt;br /&gt;
&lt;a href="https://www.blogger.com/null" name="infoonweb"&gt;&lt;b&gt;What information is already on the web about you?&lt;/b&gt;&lt;/a&gt;
&lt;br /&gt;
Are your name, address, and phone number already on the web? Most people's are! 
&lt;br /&gt;
The information in printed white pages telephone books is in the 
public domain, and services like Switchboard have compiled the 
information into their databases. They will generally remove them, if 
you ask to be removed. There are a number of similar services.
&lt;br /&gt;
That was the easy part. Is there other information about you on the web?
Try searching for your name in &lt;a href="http://www.walthowe.com/navnet/privacy.html#" target="_blank" title="http://www.google.com"&gt;Google&lt;/a&gt;. Put double-quote marks around your
first and last names (for example, "Walt Howe")

&lt;br /&gt;
Did you find anything interesting?
&lt;br /&gt;
That is a quick look at the public sources with information about
 you. Whether you found anything or not, there still may be a lot more 
information about you that isn't as readily available. There are 
commercial databases available through the nets that are available for a
 fee to "qualified" businesses or individuals. Your social security 
number and credit rating are just two of the items that can be found on 
commercial databases.
&lt;br /&gt;
&lt;a href="https://www.blogger.com/null" name="e-mail"&gt;&lt;b&gt;Is e-mail secure?&lt;/b&gt;&lt;/a&gt;
&lt;br /&gt;

The security breach at Microsoft's hotmail that we mentioned in our 
introduction was a worst case situation. For a few hours, anyone who 
learned the URL trick or accessed the hacker web site that automated it 
could access any hotmail account and see the contents. The security hole
 was plugged, but there may be others out there, and e-mail isn't very 
secure anyway.
&lt;br /&gt;
Whenever you send e-mail, it is relayed through successive sites, and is theoretically
accessible to a couple of dozen or so postmasters and system administrators, who have
access to everything that passes through their machines. As a practical matter, so many
thousands of messages pass through their machines that the chances of anyone looking at
any particular message is pretty small (unless NSA or the FBI have targeted you).
&lt;br /&gt;
If you are using an e-mail account on your 
employer's system, the courts have said that employers have a right to monitor e-mail
on their systems. You probably run a somewhat higher risk of e-mail being read than you would with a large commercial provider.
&lt;br /&gt;
On the other hand, suppose you have attracted the attention of an
 employer or law enforcement authorities for some reason. It is 
relatively easy to set up "sniffer" software to monitor every word of 
every message looking for your name or for certain keywords  or
combinations of words and to forward all such messages for special 
attention. If the organization's security isn't good and tight (many 
places aren't), it is also possible for hackers outside the system to 
set up "sniffer" software in an e-mail system, too.
&lt;br /&gt;
What this all adds up to is that unless you have reason to be a 
particular target, you chances of having mail intercepted and read is 
very small, but still exists. As a rule, don't say anything in e-mail 
that you wouldn't want to see stuck up on a public bulletin board. If 
you can't accept that, consider encryption. It takes some extra effort 
to set up, but good, secure encryption is available in the United States
 and Canada.

&lt;br /&gt;
&lt;a href="https://www.blogger.com/null" name="creditcards"&gt;&lt;b&gt;Are credit cards safe to use on the net?&lt;/b&gt;&lt;/a&gt;
&lt;br /&gt;
From the preceding discussion of e-mail vulnerability, you might 
not want to send credit cards numbers through e-mail. What about using 
credit cards with web
sites? There was a news story last year about a hacker who retrieved a 
credit card number list from a web site's computer and sent the card 
numbers to the owners of the cards to show them how insecure the net is.
&lt;br /&gt;
But you take similar risks every time you give your credit card 
to a stranger in a store or restaurant or over the phone? You take a 
risk every time you throw your credit card slips out in the trash? You 
risk giving away your credit card number every time you use it. The 
risks of using credit cards on the nets are
probably less than every day usage, and the banks generally cover any 
losses anyway.
&lt;br /&gt;
The public has been slow to trust credit card use online, and 
that is one major thing that is holding up large scale electronic 
commerce.
&lt;br /&gt;
Many sites provide servers that operate in a secure mode with 
your browser
to let you send information in safe encrypted form through the web now. 
The major credit card companies have  agreed on standards
for secure transmission of credit cards. 
&lt;br /&gt;
Will increased security enable the long predicted boom in 
electronic commerce?
Not by itself. One more thing is needed, and that is a micropayment 
system. Many things are being offered free on the nets today with the 
expectation that eventually very small amounts can be charged for 
them--that people will pay a few cents or even fractions of cents to 
access information online that is free now, but costs more than a few 
cents offline. If micropayments were tried with today's systems, it 
would probably cost much more to process them than the payments 
themselves. These problems can be solved with good system design, the 
experts say, When micropayments systems succeed, perhaps then, the 
economic predictions can be realized.
&lt;br /&gt;
&lt;a href="https://www.blogger.com/null" name="usenet"&gt;&lt;b&gt;What information do you give away with Facebook, Twitter,  newsgroups and e-mail discussion lists?&lt;/b&gt;&lt;/a&gt;
&lt;br /&gt;
Everything you post to Facebook and other social media is 
potentially readable throughout the world. Furthermore, your posts are 
archived by search engines like Google and
can be searched for anytime. The places you elect to post to are an 
expression of your interest areas and tell a lot about you. Facebook 
suggests you use their privacy functions to limit who can read your 
posts, but they keep changing the rules and the methods, and many people
 never catch up. It is very important to stay up to date on their 
privacy controls and use them.&lt;br /&gt;

&lt;strong&gt;&lt;a href="https://www.blogger.com/null" id="spyware" name="spyware"&gt;&lt;/a&gt;&lt;/strong&gt;
&lt;strong&gt;&lt;a href="https://www.blogger.com/null" id="spyware" name="spyware"&gt;&lt;/a&gt;&lt;a href="https://www.blogger.com/null" id="scumware" name="scumware"&gt;&lt;/a&gt;&lt;a href="https://www.blogger.com/null" id="adware" name="adware"&gt;&lt;/a&gt;Is there spyware or adware planted on your computer?&lt;/strong&gt;.&lt;br /&gt;

Spyware is software planted on your computer to harvest and forward 
information about you to others outside your system. The information 
collected can range from a survey of your surfing habits passed along to
 advertisers and marketers to the passwords and credit card numbers you 
type passed along to crackers who will exploit it. The software can be 
planted through Trojan horses received in e-mail or even included in 
software you obtain and install for other purposes, such as Gator, 
Gozilla, products from Brilliant Digital, and freeware versions of 
CuteFTP. Many free game demos now include spyware embedded in them. &lt;br /&gt;

Spyware used to support advertising is often called adware. Another 
common name for these hidden programs with a hidden purpose is scumware.&lt;br /&gt;

To defend yourself against spyware, adware, and scumware, always 
maintain current anti-virus software on your system, and be very careful
 about installing software from unknown sources. Check out independent 
reviews before installing. Note that anti-virus software will not 
necessarily detect spyware.&lt;br /&gt;

Another disturbing trend in scumware is planting software that not 
only serves you ads, but uses your computers own unused processing power
 -- and that of many other unsuspecting people -- to support its own 
intensive processing tasks. This kind of capability has been used openly
 on a voluntary basis for such things as the worthwhile &lt;a href="http://setiathome.ssl.berkeley.edu/" target="_blank"&gt;SETI project&lt;/a&gt;, but harnessing your computer deceptively for commercial purposes is about as low as you can get. &lt;br /&gt;

Spyware planted by advertisers is quite common. If you seem to be 
seeing an unusal amout of pop-up ads unrelated to the sites you visit, 
your system may be inviting them through spyware. Consider getting the 
free &lt;a href="http://www.lavasoftusa.com/software/adaware/"&gt;Ad-Aware software &lt;/a&gt;to
 check your system. I thought I protected my system well, but when I ran
 this software the first time, I found a dozen plants on my system from 
such sources as Adware, Doubleclick, and Flyswat.&lt;br /&gt;

&lt;a href="http://www.webroot.com/" target="_blank"&gt;Webroot Spysweeper&lt;/a&gt; is another good program that I have used. &lt;br /&gt;

&lt;a href="http://www.tomcoyote.org/hjt/"&gt;HijackThis&lt;/a&gt; is another 
powerful program for removing scumware, but use it with extreme caution.
 It can indiscriminately remove good software, too.&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;&amp;nbsp;&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
</description><link>http://easiertips.blogspot.com/2015/09/security-privacy-guides.html</link><author>noreply@blogger.com (Computer Tips and Technology Support)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-410906527029976681.post-4679799678558755240</guid><pubDate>Thu, 24 Sep 2015 09:52:00 +0000</pubDate><atom:updated>2015-09-24T15:52:36.728+06:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Chat information</category><category domain="http://www.blogger.com/atom/ns#">conference groups</category><category domain="http://www.blogger.com/atom/ns#">Internet Relay Chat</category><title>What is Internet Relay Chat?</title><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
Internet Relay Chat is an Internet protocol that enables people to meet 
in conference groups
(called channels) from all over the world. At any time, there are 
thousands of channels running simultaneously, and you can join an 
existing one or start one of your own. When IRC first 
started, you could list all the channels in session and look them over 
to see what you want
to join. You still can, but it takes so long to list them all that it is
 hardly worth it. It is
best to decide in advance what channel to join or to prearrange to meet 
in a particular channel.
&lt;br /&gt;

IRC is wild and unregulated, and you will meet all kinds of people. Never give out passwords or
credit card numbers or personal information on IRC! Because it is so huge and chaotic, many people
look for quieter places to hold chats. Undernets have been created separate from IRC, and there are
public chat rooms attached to many web sites and Internet providers that are open to the public.
Most of the latter types do not use the IRC protocol, but use their own software. Try Delphi's &lt;a href="http://www0.delphiforums.com/dir-app/chat/mainchat.asp"&gt;Chat Rooms&lt;/a&gt;.
&lt;br /&gt;

Like other protocols, you can use command mode with shell accounts or providers with text
modes like Delphi. Alternatively, if you run your own TCP/IP software with a SLIP, PPP, or network
account, you can run your own IRC software. Running software like as you like a lot easier to learn than to learn all the commands and variations of IRC in command mode. You can 
review the commands at any time by typing the command /HELP. There are extensive help files available at the &lt;a href="http://easiertips.blogspot.com/"&gt;http://easiertips.blogspot.com&lt;/a&gt; site, too.
&lt;/div&gt;
</description><link>http://easiertips.blogspot.com/2015/09/what-is-internet-relay-chat.html</link><author>noreply@blogger.com (Computer Tips and Technology Support)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-410906527029976681.post-3278223075953908277</guid><pubDate>Thu, 24 Sep 2015 09:38:00 +0000</pubDate><atom:updated>2015-09-24T15:38:47.284+06:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">email</category><category domain="http://www.blogger.com/atom/ns#">mail information</category><category domain="http://www.blogger.com/atom/ns#">username</category><title>Internet Mail Questions</title><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;b&gt;Mail questions:&lt;/b&gt;
							&lt;br /&gt;
&lt;ol&gt;
&lt;li&gt;How do I &lt;a href="http://www.walthowe.com/navnet/faq/mailq.html#setup"&gt;set up my e-mail software&lt;/a&gt; to send and receive mail?
								&lt;/li&gt;
&lt;li&gt;How do I &lt;a href="http://www.walthowe.com/navnet/faq/mailq.html#address%20mail"&gt;address mail&lt;/a&gt;?
								&lt;/li&gt;
&lt;li&gt;How can I &lt;a href="http://www.walthowe.com/navnet/faq/mailq.html#mailtext"&gt;mail text files&lt;/a&gt;?
								&lt;/li&gt;
&lt;li&gt;How can I&lt;a href="http://www.walthowe.com/navnet/faq/mailq.html#mailbinary"&gt; mail binary files&lt;/a&gt;?
								&lt;/li&gt;
&lt;li&gt;How can I &lt;a href="http://www.walthowe.com/navnet/faq/mailq.html#forward"&gt;auto-forward mail to another address&lt;/a&gt;?
								&lt;/li&gt;
&lt;li&gt;How can I &lt;a href="http://www.walthowe.com/navnet/faq/mailq.html#findppl"&gt;find someone's e-mail address&lt;/a&gt;?
								&lt;/li&gt;
&lt;li&gt;How can I &lt;a href="http://www.walthowe.com/navnet/faq/mlistsq.html#startlist"&gt;create a distribution list&lt;/a&gt; to send a message to a lot of people?
								&lt;/li&gt;
&lt;li&gt;For Delphi members: How do I &lt;a href="http://www.walthowe.com/navnet/faq/mailq.html#address%20change"&gt;change my e-mail address&lt;/a&gt;?
&lt;/li&gt;
&lt;li&gt;For Delphi members: How do I &lt;a href="http://www.walthowe.com/navnet/faq/mailq.html#send%20e-mail"&gt;send e-mail to a member&lt;/a&gt; when I don't know the person's e-mail address?
							&lt;/li&gt;
&lt;/ol&gt;
&lt;ol&gt;
&lt;li type="1"&gt;&lt;a href="https://www.blogger.com/null" name="setup"&gt;&lt;b&gt;How do I setup my e-mail software to send and receive mail?&lt;/b&gt;&lt;/a&gt;&lt;br /&gt;If
 you want to receive and send mail from Delphi (or other ISPs) using 
mail software like Outlook, Eudora, or Pegasus or the mail capability of
 Netscape or MSIE, you need to enter the correct addresses, your 
username, and your password. In general, the address to receive mail 
from is &lt;b&gt;pop.yourdomain.com&lt;/b&gt;. Some software will have you add your username to that address, so that you list &lt;b&gt;username@pop.yourdomain.com&lt;/b&gt;. To send mail, generally use the form &lt;b&gt;smtp.yourdomain.com&lt;/b&gt;. There are many variations to these addresses, so check with your e-mail provider for exact addressing.


The pop and smtp prefixes are common, and to collect and send mail from 
other addresses, you often use the same form. If in doubt, check with 
your provider.
&lt;br /&gt;
Recent versions of Outlook Express, Eudora Pro and Pegasus allow 
you to set up more than one receive address, so you can collect mail 
from different accounts. Most providers will let you collect mail from a
 remote address, but not all do.
&lt;/li&gt;
&lt;li type="1"&gt;&lt;a href="https://www.blogger.com/null" name="address mail"&gt;&lt;/a&gt;&lt;b&gt;How do I address mail?&lt;/b&gt;&lt;br /&gt;To send mail, you must know the correct address and fill it in at the
To: prompt. Simple Internet mail addresses consist of a Username, an 
@ symbol, and the address, which will consist of at least two words,
separated by periods. For example, this is a correctly formatted
address:

						&lt;br /&gt;
&lt;pre&gt;&lt;b&gt;To:  jsmith@delphiforums.com&lt;/b&gt;
&lt;/pre&gt;
There is never more than one @ symbol in an address. Rarely, you
will encounter an alternate form of address that uses exclamation points (called bang addresses)
instead of an @ symbol or one in which there are several levels of
addresses in which one or more % symbols act as secondary @
functions.

&lt;br /&gt;
All addresses (other than those with exclamation points) must end with a 
correct domain. The domains may be any of these:
							&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;com
								&lt;/li&gt;
&lt;li&gt;edu
								&lt;/li&gt;
&lt;li&gt;gov
								&lt;/li&gt;
&lt;li&gt;int
								&lt;/li&gt;
&lt;li&gt;mil
								&lt;/li&gt;
&lt;li&gt;net
								&lt;/li&gt;
&lt;li&gt;org
								&lt;/li&gt;
&lt;li&gt;a two-letter &lt;a href="http://www.walthowe.com/navnet/faq/country.html"&gt;country code&lt;/a&gt;.
							&lt;/li&gt;
&lt;/ul&gt;
A recent international meeting approved the use of new
top-level domain names. Implementation dates remain to be worked out.
&lt;/li&gt;
&lt;li type="1"&gt;&lt;a href="https://www.blogger.com/null" name="mailtext"&gt;&lt;/a&gt;&lt;b&gt;How can I mail text files?&lt;/b&gt;&lt;br /&gt;Unless you are sure that your addressee can receive separate files, it 
is best to include a text file 
as the text of the message itself. In Eudora, you can do this by 
clicking on the Attach file icon 
(the one to the right of the left and right arrows) and inserting the 
filename of the file to be attached, 
as prompted.  Before mailing the attachment, select Special/Settings/
Attachments and click on the 
box labelled "Put text attachments in body of message."
&lt;/li&gt;
&lt;li type="1"&gt;&lt;a href="https://www.blogger.com/null" name="mailbinary"&gt;&lt;/a&gt;&lt;b&gt;How can I mail binary files?&lt;/b&gt;&lt;br /&gt;Not all addresses can receive &lt;a href="https://www.blogger.com/null"&gt;binary&lt;/a&gt;files by e-mail. It requires 
a compatible mailer. If you are not sure, ask your addressee if their 
mailer supports MIME. If so, 
using Eudora, you can attach the binary file by clicking on the Attach 
file icon 
(the one to the right of the left and right arrows) and inserting the 
filename of the file to be attached, 
as prompted. Before mailing the attachment, select Special/Settings/
Attachments and make sure 
the MIME button is checked.
If your addressee cannot accept MIME, you can still check uuencode or 
binhex, and the file will be 
encoded into either of these two text forms. Your addressee may need to 
decode them separately, 
but decoders for uuencode and binhex are very common for all systems. 
Binhex is primarily used 
by Macintosh computers.
&lt;br /&gt;
If your mail software will not handle the automatic encoding, you can
use appropriate software such as uuencode or WinCode for PCs, or binhex or stuffit
for Macs to 
do the job offline, and then send the file as a text attachment.
&lt;/li&gt;
&lt;li type="1"&gt;&lt;a href="https://www.blogger.com/null" name="forward"&gt;&lt;b&gt;How can I forward mail to another address?&lt;/b&gt;&lt;/a&gt;&lt;br /&gt;
Most mail providers give you a way to forward e-mail automatically to 
another address. Check your provider's documentation for the exact 
methods.
Unix shell systems usually allow you to create a file named &lt;b&gt;.forward&lt;/b&gt; (dot forward) in your workspace, which is a text file consisting of the forwarding address, such as &lt;b&gt;easiertips@gmail.com&lt;/b&gt;
&lt;br /&gt;
Whichever system you use, it is a good idea to test it with a test message after you set the forwarding.
&lt;br /&gt;

&lt;/li&gt;
&lt;li type="1"&gt;&lt;a href="https://www.blogger.com/null" name="findppl"&gt;&lt;b&gt;How do I find someone's e-mail address?&lt;/b&gt;&lt;/a&gt;
 Most online services will not give out personal information like e-mail
 addreses. On the other hand, some people register them and make them 
widely available. Other e-mail addresses are collected from usage. &lt;/li&gt;
&lt;/ol&gt;
&lt;/div&gt;
</description><link>http://easiertips.blogspot.com/2015/09/internet-mail-questions.html</link><author>noreply@blogger.com (Computer Tips and Technology Support)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-410906527029976681.post-5060478648415190731</guid><pubDate>Thu, 24 Sep 2015 09:29:00 +0000</pubDate><atom:updated>2015-09-24T15:29:22.651+06:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Basic internet</category><category domain="http://www.blogger.com/atom/ns#">Internet Address Questions</category><category domain="http://www.blogger.com/atom/ns#">IP URL domain</category><title>Internet Address Questions</title><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;blockquote&gt;

&lt;b&gt;Internet Address questions:&lt;/b&gt;&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;How are &lt;a href="http://www.walthowe.com/navnet/faq/addressq.html#address"&gt;Internet addresses&lt;/a&gt; formed?
&lt;/li&gt;
&lt;li&gt;What is a &lt;a href="http://www.walthowe.com/navnet/faq/addressq.html#domain"&gt;domain address&lt;/a&gt;?
&lt;/li&gt;
&lt;li&gt;What is an &lt;a href="http://www.walthowe.com/navnet/faq/addressq.html#IP"&gt;IP address&lt;/a&gt;?
&lt;/li&gt;
&lt;li&gt;What is a &lt;a href="http://www.walthowe.com/navnet/faq/url.html"&gt;URL&lt;/a&gt;?
&lt;/li&gt;
&lt;li&gt;How do I &lt;a href="http://www.walthowe.com/navnet/faq/findppl.html"&gt;find people's or business' addresses&lt;/a&gt;?
&lt;/li&gt;
&lt;/ul&gt;
&lt;a href="https://www.blogger.com/null" name="address"&gt;&lt;/a&gt;&lt;b&gt;Internet Addresses&lt;/b&gt;&lt;br /&gt;
There are two types of Internet addresses--domain addresses made up of 
words separated by dots (for example, world.std.com), and IP addresses
made up of four numbers separated by dots (for example, 199.0.65.101).
&lt;br /&gt;
&lt;br /&gt;
Both types represent computer addresses on the Internet, and for many
purposes, either type can be used. Numbered IP addresses represent
specific computers on the Internet. Domain addresses may represent a
specific computer or may be less specific.&lt;br /&gt;
 

&lt;a href="https://www.blogger.com/null" name="domain"&gt;&lt;/a&gt;&lt;b&gt;Domain Addresses&lt;/b&gt;&lt;br /&gt;
Domain name addresses all end with a correct top-level domain. The top-level domains may be any of these:&lt;br /&gt;
&lt;ul&gt;&lt;b&gt;
 &lt;br /&gt;
&lt;li&gt;com 
 &lt;/li&gt;
&lt;li&gt;edu 
 &lt;/li&gt;
&lt;li&gt;gov
 &lt;/li&gt;
&lt;li&gt;int
 &lt;/li&gt;
&lt;li&gt;mil
 &lt;/li&gt;
&lt;li&gt;net
 &lt;/li&gt;
&lt;/b&gt;
&lt;li&gt;&lt;b&gt;org 
&lt;/b&gt;
&lt;/li&gt;
&lt;li&gt;a two-letter country code, such as &lt;b&gt;us&lt;/b&gt;, &lt;b&gt;uk&lt;/b&gt;, or &lt;b&gt;mx&lt;/b&gt;. See the &lt;a href="http://www.walthowe.com/navnet/faq/country.html"&gt;country code table&lt;/a&gt;.&lt;/li&gt;
&lt;/ul&gt;
A complete domain address adds one or more terms to the left of the 
top-level domain, separated by dots. The top-level domain at the right 
is the most general; each term to the left is more specific.&lt;br /&gt;


The &lt;a href="http://www.icann.org/index.html"&gt;Internet Corporation for Assigned Names and Numbers (ICANN)&lt;/a&gt; announced a new series of top level domains to become available for registration in 2001. They are:&lt;br /&gt;
&lt;ul&gt;&lt;b&gt;
&lt;/b&gt;
&lt;li&gt;&lt;b&gt;biz
&lt;/b&gt;&lt;/li&gt;
&lt;li&gt;&lt;b&gt;pro
&lt;/b&gt;&lt;/li&gt;
&lt;li&gt;&lt;b&gt;museum
&lt;/b&gt;&lt;/li&gt;
&lt;li&gt;&lt;b&gt;aero
&lt;/b&gt;&lt;/li&gt;
&lt;li&gt;&lt;b&gt;name
&lt;/b&gt;&lt;/li&gt;
&lt;li&gt;&lt;b&gt;coop
&lt;/b&gt;&lt;/li&gt;
&lt;li&gt;&lt;b&gt;info&lt;/b&gt; 
&lt;/li&gt;
&lt;/ul&gt;
&lt;br /&gt;

&lt;a href="https://www.blogger.com/null" name="IP"&gt;&lt;/a&gt;&lt;b&gt;IP Addresses&lt;/b&gt;&lt;br /&gt;
IP, or Internet Protocol, addresses consist of four numbers from 0 to
255, separated by dots. The first number is the most general, and each
following number is more specific. 
&lt;br /&gt;

A network might be assigned the hypothetical numbers 185.33.27.0 through
185.33.27.255. This would give them 256 numbers to use. A very large
network might be given all numbers beginning with, for example, 125.211.
This would give that network approximately 65 thousand addresses to use
from 125.211.0.0 through 125.211.255.255. More commonly, a network will
be assigned a portion of the range appropriate to its size.&lt;br /&gt;
 
&lt;/blockquote&gt;
&lt;/div&gt;
</description><link>http://easiertips.blogspot.com/2015/09/internet-address-questions.html</link><author>noreply@blogger.com (Computer Tips and Technology Support)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-410906527029976681.post-837284258319925029</guid><pubDate>Thu, 24 Sep 2015 09:23:00 +0000</pubDate><atom:updated>2015-09-24T15:23:14.589+06:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">information</category><category domain="http://www.blogger.com/atom/ns#">Search Engine</category><category domain="http://www.blogger.com/atom/ns#">Searching</category><title>Expert Searching</title><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;h3 align="center"&gt;
A Guide to Developing Your Search Skills&lt;/h3&gt;
&lt;div style="text-align: justify;"&gt;
This is a set of guides and tips to searching on the Internet. Taken 
together, they provide enough information to become a skilled searcher. 
If you are new to searching, use the Search Engine Guide as your 
starting point, and come back to the other features listed here as you 
develop your skills. If you are an experienced searcher, look through 
all of these features for tips you can use.
						&lt;/div&gt;
&lt;ol&gt;
&lt;li&gt;&lt;a href="http://www.walthowe.com/navnet/faq/search.html"&gt;Search Engine Guide&lt;/a&gt;. Links and how-to-do-it instructions for the major search engines and directories. This file is updated regularly.
                              
                            &lt;/li&gt;
&lt;li&gt;&lt;a href="http://www.walthowe.com/navnet/faq/findit.html"&gt;Find-It! A Guide to Specialized Searches&lt;/a&gt;. There are many search engines devoted to particular types of data, and this is a guide to finding those.

							&lt;/li&gt;
&lt;li&gt;&lt;a href="http://www.walthowe.com/navnet/invisible.html"&gt;Searching the Invisible Web.&lt;/a&gt; How to find information that the search engines cannot reach. 

							&lt;/li&gt;
&lt;li&gt;&lt;a href="http://www.walthowe.com/navnet/search1.html"&gt;Search Tip: Find Expert Help&lt;/a&gt;. If you can't find the information, locate an expert source to help you.

							&lt;/li&gt;
&lt;li&gt;&lt;a href="http://www.walthowe.com/navnet/search2.html"&gt;Search Tip: Boolean Searching&lt;/a&gt;. Learn to use the full power of Boolean searching to narrow your searches.

							&lt;/li&gt;
&lt;li&gt;&lt;a href="http://www.walthowe.com/navnet/search3.html"&gt;What to do with 50 Million Hits!&lt;/a&gt; How to refine those searches that produce too many results.

							&lt;/li&gt;
&lt;li&gt;&lt;a href="http://www.walthowe.com/navnet/search4.html"&gt;Finding Broken Links&lt;/a&gt;. Broken links are everywhere, even in search engine results. Learn how to track down updated addresses on the nets.
&lt;/li&gt;
&lt;/ol&gt;
&lt;h2 align="center"&gt;
&amp;nbsp;&lt;/h2&gt;
&lt;/div&gt;
</description><link>http://easiertips.blogspot.com/2015/09/expert-searching.html</link><author>noreply@blogger.com (Computer Tips and Technology Support)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-410906527029976681.post-5198339640177337120</guid><pubDate>Thu, 24 Sep 2015 09:12:00 +0000</pubDate><atom:updated>2015-09-24T15:12:36.810+06:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">basic unit is the page</category><category domain="http://www.blogger.com/atom/ns#">hypertext</category><category domain="http://www.blogger.com/atom/ns#">World Wide Web</category><title>What is the World Wide Web?</title><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;blockquote&gt;
&lt;div style="text-align: justify;"&gt;
The World Wide Web is one of the protocols that lets you link to many
sites on the Internet. The basic unit is the page, such as the page you
are now reading. A page can be one or many screens as it 
displays on your monitor. 
&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
Within the page are links to related pages and
other web sites. This system of embedding links in the text on a page is
called hypertext. The links are distinctive, and vary depending on your
browser. With most graphical browsers, links are underlined and appear
in a contrasting color. 
&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
Text browsers may number the links or show them
in bold text to contrast them or in reverse colors when selected. 
You can select a link in a text browser either by typing the number of the
link or by moving the up and down arrow keys to select the link. Once
selected, either press Enter or the right arrow to connect to the link.
&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
This page includes several links in contrasting colors or type. These
are hypertext links to other pages, and you can switch to the linked
page by clicking on or selecting the link. Try it. 
&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;a href="http://www.walthowe.com/navnet/faq/example.html"&gt;&lt;img align="left" alt="[graphic link]" src="http://www.walthowe.com/navnet/images/qmark.gif" /&gt;&lt;/a&gt; You will also see buttons and pictures used for links. With a graphical
browser, there will often be a blue or magenta border around the graphic
to show you it is a link.  If you are using a text-only browser, you 
won't see the picture, but you will usually see an [image] tag or an
alternate name. 
&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
The Web was invented by Tim Berners-Lee and others at the European 
Laboratory 
for Particle Physics (CERN) in Switzerland. It was
originally for text links only, but as it was further developed, 
multimedia links were added, too. Now, you can see pictures,
listen to audio links, and see video links, if your computer and 
software are set up for them. With the addition of sound and graphics 
and fast modems to carry the large sound and graphics files, the Web 
soon became the most popular way
of linking to resources on the Internet, replacing 
gopher, which was invented 
at the University of Minnesota.
&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
For more background about the web, see Walt's &lt;a href="http://www.walthowe.com/navnet/faq/history.html#www"&gt;
Internet History&lt;/a&gt;.
&lt;/div&gt;
&lt;/blockquote&gt;
&lt;table align="center" bgcolor="white" border="0" style="width: 420px;"&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td&gt;&lt;table background="/graphics/smallweb.gif" bgcolor="#99CCFF" border="2"&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td align="center" width="209"&gt;&lt;a href="http://www.walthowe.com/"&gt;&lt;img alt="Back to top" border="0" height="126" src="http://www.walthowe.com/graphics/spidglobe.gif" width="80" /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;/td&gt;&lt;td align="center"&gt;&lt;table border="2"&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td&gt;
&lt;a href="http://www.walthowe.com/ilrntree.html"&gt;&lt;img alt="Back to Learning Tree" border="0" height="139" src="http://www.walthowe.com/images/learningtreelink.gif" width="209" /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;/td&gt;&lt;/tr&gt;
&lt;tr align="center"&gt;
&lt;td&gt;&lt;a href="http://www.walthowe.com/index.html"&gt;Go to Top&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;&lt;a href="http://www.walthowe.com/ilrntree.html"&gt;Go to Learning Tree&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;/div&gt;
</description><link>http://easiertips.blogspot.com/2015/09/what-is-world-wide-web.html</link><author>noreply@blogger.com (Computer Tips and Technology Support)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-410906527029976681.post-182248634388439816</guid><pubDate>Thu, 24 Sep 2015 09:01:00 +0000</pubDate><atom:updated>2015-09-24T15:01:26.133+06:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Net Information</category><category domain="http://www.blogger.com/atom/ns#">The Internet</category><category domain="http://www.blogger.com/atom/ns#">World Wide Web</category><title>The Internet</title><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;br /&gt;
&lt;h2 style="text-align: left;"&gt;
What is the Internet? &lt;/h2&gt;
The Internet is a vast network that connects many independent
networks spanning over 170 countries in the World. It links computers of
many different types, sizes, and operating systems, and, of course, the
many people of those countries that use the Internet to communicate.&lt;br /&gt;

The one thing all these different computers have in common is the use of 
the Internet Protocol, abbreviated as IP, which allows computers of 
different types to communicate with each other. You will often
see reference to the longer abbreviation, TCP/IP, which stands for
Transmission Control Protocol/Internet Protocol. Your own computer uses
TCP/IP software to enable it to link to this service.&lt;br /&gt;

&lt;a href="https://www.blogger.com/null" name="whatdo"&gt;&lt;/a&gt;
&lt;h2&gt;
What can I do on the Internet?&lt;/h2&gt;
The Internet Protocol makes it possible for you to communicate in
various ways, find things that interest you, and exchange information
and files. The most common things you can do are: 
&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;Get information on almost any subject by searching the web. It takes
 some skill to search efficiently, and since anyone can publish just 
about anything, there is lots of misinformation on the web, too. You 
need to develop some skill in evaluating the accuracy and reliability of
 the information you find. 
&lt;/li&gt;
&lt;li&gt;Send and receive email or chat or exchange messages with people all over
  the world.  Almost as fast as the telephone, there is never a busy
  signal, and you never play phone tag. 
  &lt;br /&gt;
&lt;/li&gt;
&lt;li&gt;Join discussion groups about a common subject with message boards, Newsgroups and email
discussion lists. 
&lt;br /&gt;
&lt;/li&gt;
&lt;li&gt;Get or exchange software and files with the File
Transfer Protocol (FTP)&lt;br /&gt;
&lt;/li&gt;
&lt;li&gt;Explore the World Wide Web, which can use all
of the above, and adds easy links to other resources and adds
multimedia--graphics, sound, and video capabilities. 
  &lt;/li&gt;
&lt;li&gt;Publish your own material on the web in blogs, message boards, or your own web pages. &lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
</description><link>http://easiertips.blogspot.com/2015/09/the-internet.html</link><author>noreply@blogger.com (Computer Tips and Technology Support)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-410906527029976681.post-7570978640969391395</guid><pubDate>Wed, 23 Sep 2015 19:52:00 +0000</pubDate><atom:updated>2015-09-24T14:39:09.881+06:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">mouse tips</category><category domain="http://www.blogger.com/atom/ns#">mouse us</category><category domain="http://www.blogger.com/atom/ns#">scroll down</category><title>So here are some computer mouse tips:</title><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
Shift + mouse&lt;br /&gt;
There’s a way to select entire paragraphs of text without needing to hold your mouse down and drag it across the desk like you’re wrestling with it. Simply place the cursor at the beginning of the text you wish to select, then scroll down to the end. Hold the shift key, and left click where you want the selection to end.&lt;br /&gt;
The third button&lt;br /&gt;
Unless you’re a gamer boasting a Razer Deathadder 2013 mouse with a dozen buttons, your mouse probably has two buttons and a wheel, right? Wrong. In case you didn’t know, the wheel is also a button and can be pressed down. Pressing a link in a browser with the wheel will open the link in a new tab, and pressing it anywhere else will allow you to fast scroll through the page. Holding the CTRL button while scrolling will zoom the browser in and out, and holding the Shift button will make the browser go back or forward.&lt;br /&gt;
Double-click and triple-click&lt;br /&gt;
Double-clicking a word selects it entirely, but triple-clicking the word will select the entire paragraph. Also, if you double-click a word, but keep your mouse button pressed, you can drag to select entire word by word.&lt;br /&gt;
CTRL Click&lt;br /&gt;
If you want to highlight particular parts of text that are not next to each other, that can be done simply by CTRL-left clicking whatever you wish to highlight. This might be useful when you’re trying to copy only parts of a table or a list.&lt;br /&gt;
There are other things you can do with your mouse, like switch the left and right button or set up additional buttons to do particular tasks. These are only some mouse tips I found particularly useful in an office environment.&lt;/div&gt;
</description><link>http://easiertips.blogspot.com/2015/09/so-here-are-some-computer-mouse-tips.html</link><author>noreply@blogger.com (Computer Tips and Technology Support)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-410906527029976681.post-1438801801326210031</guid><pubDate>Wed, 23 Sep 2015 08:18:00 +0000</pubDate><atom:updated>2015-09-23T14:18:23.792+06:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">A laptop that doesn't want to start</category><category domain="http://www.blogger.com/atom/ns#">computer repair shop</category><title>A laptop that doesn't want to start </title><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
When
 Paul Wright switches on his laptop, it can wait for up to an hour 
before it starts. Is it the motherboard? If not, can we find the fault?








&lt;br /&gt;

&lt;figure class="media-primary media-content()  " data-component="image" itemprop="associatedMedia image" itemscope="" itemtype="http://schema.org/ImageObject"&gt;

&lt;div class="content__meta-container js-content-meta js-football-meta u-cf
    
    
    
    
    
    
    "&gt;
&lt;img alt="Laptop " class="maxed responsive-img" itemprop="contentUrl" src="https://i.guim.co.uk/img/static/sys-images/Technology/Pix/pictures/2011/6/9/1307626315720/Laptop--007.jpg?w=620&amp;amp;q=85&amp;amp;auto=format&amp;amp;sharp=10&amp;amp;s=ce180c1b2d9dedabce693b57771666ec" /&gt;&lt;div class="meta__extras"&gt;
&lt;div class="meta__save-for-later js-save-for-later" data-position="top" style="display: block;"&gt;
&lt;a class="button button--medium button--tertiary save-for-later__button js-save-for-later__button save-for-later__button--save" data-component="save-for-later" data-link-name="Save | top" href="https://profile.theguardian.com/save-content?returnUrl=http%3A%2F%2Fwww.theguardian.com%2Ftechnology%2Faskjack%2F2011%2Fjun%2F09%2Fask-jack-laptop-windows-fault&amp;amp;shortUrl=/p/2pkbq&amp;amp;platform=web:Firefox:wide&amp;amp;INTCMP=SFL-SO"&gt;
    &lt;span class="rounded-icon inline-bookmark inline-icon"&gt;&lt;svg height="16" viewbox="0 0 8.6 16" width="8.6"&gt;&lt;path d="M0 15.7V1l1-1h6.5l1 1v14.7l-.2.3-4-2.2-4 2.2"&gt;&lt;/path&gt;&lt;/svg&gt;&lt;/span&gt;
    
    &lt;span class="save-for-later__label save-for-later__label--save"&gt;Save for later&lt;/span&gt;
    
&lt;/a&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/figure&gt;
&lt;div class="content__article-body from-content-api js-article__body" data-test-id="article-review-body" itemprop="articleBody" style="display: block;"&gt;
&lt;em&gt;I have a two-year-old HP laptop. When I switch it on, it does 
nothing for up to an hour then it suddenly springs into action and fires
 up. The local "computer chaps" say it is the motherboard. I'm not 
convinced, and it is still working after six months of the same. Loose 
connections? I have shaken it. Dust and muck? I have used a hairdryer, 
to no avail. Do you have any thoughts – or is it just the motherboard!&lt;/em&gt;&lt;br /&gt;&lt;strong&gt;Paul Wright&lt;/strong&gt;&lt;br /&gt;

Intermittent faults are very hard to diagnose, and it would be worth 
your while searching for [laptop "intermittent start" OR "intermittent 
boot"] and the model number of your laptop. If you happen to have an HP 
dv6000, some versions seem to have been a bit of a nightmare, judging by
 the long discussion in HP's own forum at &lt;a class=" u-underline" data-component="in-body-link" data-link-name="in body link" href="http://forums13.itrc.hp.com/service/forums/questionanswer.do?admit=109447627+1307578545560+28353475&amp;amp;threadId=1147659"&gt;HP dv6000 laptop start-up problems.&lt;/a&gt;&lt;br /&gt;

PCs are supposed to beep to indicate any problems following a &lt;a class=" u-underline" data-component="in-body-link" data-link-name="in body link" href="http://en.wikipedia.org/wiki/Power-on_self-test"&gt;POST or "power-on self test"&lt;/a&gt;, where one short beep means everything is OK.&lt;br /&gt;The
 beeps and things like flashing cursors usually tell you where to start 
looking for the fault. Most operating systems also keep logs that can 
indicate problems. If you are running Microsoft Windows XP, read support
 document Q308427: &lt;a class=" u-underline" data-component="in-body-link" data-link-name="in body link" href="http://support.microsoft.com/kb/308427"&gt;How to view and manage event logs in Event Viewer in Windows XP&lt;/a&gt;.
 Vista and Windows 7 have much-improved versions. With no hardware or 
software indicators to go on, we're reduced to experiment and guesswork.&lt;br /&gt;

In this case, it could be the motherboard, a loose connection, the 
hard drive failing, the power supply, or something attached to the 
computer, such as an external hard drive. (Unplug everything you've 
plugged in.) I think it's more likely to be a hardware than a software 
problem, but it could be a bad video driver. It might even be malware 
such as a boot-sector virus, and it's never a bad idea to check for 
those.&lt;br /&gt;

The hard drive would be my biggest worry. If it is failing to start 
for anything from a few minutes to an hour, then one day it could fail 
to start at all. Make sure all your data files are backed up. Also, keep
 a USB thumbdrive plugged in while you're working, so you can quickly 
back up the most recent files.&lt;br /&gt;

&lt;div class="js-ad-slot ad-slot ad-slot--dfp ad-slot--inline1 ad-slot--inline u-h" data-link-name="ad slot inline1" data-mobile-landscape="1,1|300,50|320,50|300,250" data-mobile="1,1|300,50|300,250" data-name="inline1" data-node-uid="6" data-tablet="1,1|300,250" data-test-id="ad-slot-inline1" id="dfp-ad--inline1"&gt;
&lt;div class="ad-slot__label" data-test-id="ad-slot-label"&gt;
Advertisement&lt;/div&gt;
&lt;/div&gt;
Several
 small applications will check the health of your hard drive and predict
 when it will eventually fail. Run Pantera Soft's free &lt;a class=" u-underline" data-component="in-body-link" data-link-name="in body link" href="http://www.panterasoft.com/"&gt;HDD Health&lt;/a&gt;
 and see what it says. Also, see if you can hear whether the hard drive 
spins up when you turn the power on, and whether the laptop boots only 
after the hard drive kicks in. With a desktop PC, one idea is to lift 
the lid and hold the drive lightly, because your fingers will feel the 
disk start to spin. You might be able to feel it through the laptop 
case.&lt;br /&gt;

You can also try changing the boot order in your laptop's BIOS set-up
 chip so that it tries the optical drive before the hard drive. If your 
laptop will boot immediately from your &lt;a class=" u-underline" data-component="auto-linked-tag" data-link-name="auto-linked-tag" href="http://www.theguardian.com/technology/windows"&gt;Windows&lt;/a&gt; DVD, or a Linux Live CD, that suggests a hard drive problem.&lt;br /&gt;

With a laptop, there is no good way to isolate hangs that might be 
caused by loose connections. On a desktop, it's relatively easy to check
 that all the internal plugs and wires are correctly seated and that no 
expansion cards are slightly loose. It's harder to get to connectors on a
 laptop, but reseat any that are easily accessible.&lt;br /&gt;

Also, while waiting for the laptop to start, try pressing down gently
 on the keyboard and other parts of the case. Sometimes a slight 
movement will get things going, perhaps because there's a loose 
connection or because the motherboard has what we used to call (in the 
days when every home had a soldering iron) a "dry joint". However, if 
you can't recognise a dry joint on a motherboard – and I couldn't – then
 you have no chance of fixing it yourself. See if varying the power 
supply makes a difference. Try starting your laptop with the battery 
removed and the mains adaptor plugged in. Also, if possible, try it with
 a different mains adaptor.&lt;br /&gt;

There are a couple of things that you can do to find possible 
software faults. First, assuming your Windows installation is up to 
date, run a few searches to see if you can find more recent drivers, 
particularly video drivers. &lt;a class=" u-underline" data-component="in-body-link" data-link-name="in body link" href="http://www.guru3d.com/category/driversweeper/"&gt;Guru3D's Driver Sweeper&lt;/a&gt; can help you clean out old drivers.&lt;br /&gt;

&lt;div class="js-ad-slot ad-slot ad-slot--dfp ad-slot--inline2 ad-slot--inline" data-link-name="ad slot inline2" data-mobile-landscape="1,1|300,50|320,50" data-mobile="1,1|300,50" data-name="inline2" data-node-uid="7" data-tablet="1,1|300,250" data-test-id="ad-slot-inline2" id="dfp-ad--inline2"&gt;
&lt;div class="ad-slot__label" data-test-id="ad-slot-label"&gt;
Advertisement&lt;/div&gt;
&lt;/div&gt;
Second, run a check for rootkits and boot sector viruses. Microsoft's Windows Sysinternals has a free &lt;a class=" u-underline" data-component="in-body-link" data-link-name="in body link" href="http://technet.microsoft.com/en-us/sysinternals/bb897445"&gt;RootkitRevealer&lt;/a&gt;, but &lt;a class=" u-underline" data-component="in-body-link" data-link-name="in body link" href="http://www.techsupportalert.com/best-free-rootkit-scanner-remover.htm"&gt;Sophos Anti-Rootkit&lt;/a&gt; and Kaspersky's &lt;a class=" u-underline" data-component="in-body-link" data-link-name="in body link" href="http://support.kasperskyamericas.com/home/tools-utilities"&gt;TDSS Killer&lt;/a&gt; are worth a go. Finally, run &lt;a class=" u-underline" data-component="in-body-link" data-link-name="in body link" href="http://www.malwarebytes.org/products/malwarebytes_free"&gt;Malwarebytes Anti-Malware Free&lt;/a&gt; from your desktop, selecting the Quick Scan option.&lt;br /&gt;

Knowing you have a secure backup, you could also try a "factory 
restore". To do this, reboot, your laptop and press F10 a few times when
 the HP logo appears. When you see the recovery screen, choose Next and 
then Yes to perform a non-destructive recovery. If that doesn't solve 
the problem, you could try choosing Advanced and then Yes to perform a 
destructive recovery. You will have to reinstall your software 
(including a lot of Windows updates!) afterwards, but a full reset can 
clear out a lot of junk and solve many niggling problems.&lt;br /&gt;

Alternatively, if your system is running Windows XP or Vista, then 
you could upgrade to Windows 7, preferably the 64-bit version. This 
provides much better monitoring (start typing "performance monitor"), 
which helps when things go wrong.&lt;br /&gt;

If all else fails, take your laptop to a local computer repair shop, 
since these have tools that can more easily identify faults. They should
 give you an estimate of the cost of attempting to repair it, though 
success is not guaranteed. It would be a shame to give up on a 
two-year-old machine that would probably run Windows 7 or Windows 8 for 
several more years. However, a quick look at &lt;a class=" u-underline" data-component="in-body-link" data-link-name="in body link" href="http://www.ebay.co.uk/"&gt;ebay.co.uk&lt;/a&gt; should give you a good idea of the second-hand value of your PC, and there's a limit to how much it's worth spending to fix it.&lt;br /&gt;

&lt;/div&gt;
&lt;/div&gt;
</description><link>http://easiertips.blogspot.com/2015/09/a-laptop-that-doesnt-want-to-start.html</link><author>noreply@blogger.com (Computer Tips and Technology Support)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-410906527029976681.post-4718917297084948862</guid><pubDate>Wed, 23 Sep 2015 08:02:00 +0000</pubDate><atom:updated>2015-09-23T14:02:34.904+06:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">laptop occasionally slowly hangs</category><category domain="http://www.blogger.com/atom/ns#">laptop problem</category><category domain="http://www.blogger.com/atom/ns#">Win7 hanging since</category><title>Win7 hanging since I replaced HD -- HD or laptop problem?</title><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
I have a 2+ yr old laptop (HP dv7-6199us) that had been very reliable.  
Over time it got more and more sluggish, until it was nearly unusable.  I
 tried re-installing win7, and it wasn't much better.  (!?  Maybe the 
disk was getting flaky?)&lt;br /&gt;
&lt;br /&gt;
I tried swapping in an SSD, specifically a WD Black2 SSD/HD hybrid, with
 another fresh win7 install.  Shazam!  My old workhorse turned into a 
fire-breathing hot-rod.  Performance was awesome.  All was good.&lt;br /&gt;
&lt;br /&gt;
But then I started noticing problems.  I got a few BSODs shortly after 
installing the Black2, but that hasn't happened in the last 2 months.  
But lately I'm having a bigger problem:  hangs.&lt;br /&gt;
&lt;br /&gt;
The laptop occasionally (unpredictably) slowly hangs.  I'll notice that 
one app has hung -- it quits responding and gives a spinny-circle mouse 
sprite.  Usually the app screen grays out.  Hung apps like that can't be
 killed or anything else.  I can continue working with other apps -- 
shutting down, writing out data, media files are still playing, etc -- 
but usually within 2-3 minutes EVERYthing is hung.  I have to kill the 
power.  This has been happening every few days for the last 2 weeks.&lt;br /&gt;
&lt;br /&gt;
I suspect it's temperature-related.  The laptop has been running 
significantly hotter than it used to.  The left palm rest gets extremely
 hot.  Ambient temps are generally 75-85°F but it hung several times in 
the middle of the night when it was pretty cool.&lt;br /&gt;
&lt;br /&gt;
I've been running Open Hardware Monitor to watch the temps, and the CPUs
 typically run in the 70-90°C range.  Temps will jump 5° or more just by
 opening an app, even if the app doesn't stress the CPU.  It's almost 
like just having the app in RAM makes it run hotter.  When apps start 
hanging, it seems like the Monitor has already hung so I can't see what 
the current temps are.  (Then I reboot and put the laptop on an ice 
pack. )&lt;br /&gt;
&lt;br /&gt;
I'm not real confident in the Black2 SSD/HD.  The logical next step is 
to replace it with a different SSD that hopefully runs cooler.  But 
before I throw more money at this old laptop, does it sound like the 
Black2 is the culprit?
						&lt;/div&gt;
</description><link>http://easiertips.blogspot.com/2015/09/win7-hanging-since-i-replaced-hd-hd-or.html</link><author>noreply@blogger.com (Computer Tips and Technology Support)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-410906527029976681.post-9172799854106665984</guid><pubDate>Tue, 22 Sep 2015 19:10:00 +0000</pubDate><atom:updated>2015-09-23T12:35:37.872+06:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">graphics card</category><category domain="http://www.blogger.com/atom/ns#">How to servicing your Motherboard</category><category domain="http://www.blogger.com/atom/ns#">Try repairing</category><title>How to servicing your Motherboard?</title><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;div style="text-align: left;"&gt;
Computer Mother Board is one of the vital parts in CPU. This consists of all the Microprocessor and other integrated chipsets elements which support every computer to function more efficiently. What will you do when it is on repair? Try repairing on your own with detailed tips on how to repair computer monitor.&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="http://hutsolutions.in/wp-content/uploads/2013/10/Computer-Repairs.jpg" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img alt="Computer Repair Services" class="size-full wp-image-80" height="225" src="http://hutsolutions.in/wp-content/uploads/2013/10/Computer-Repairs.jpg" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class="wp-caption aligncenter" id="attachment_80" style="width: 277px;"&gt;
&lt;div class="wp-caption-text"&gt;
source:netizens-stalbans.co.uk&lt;/div&gt;
&lt;/div&gt;
&lt;div style="text-align: left;"&gt;
Finding such complicated issues like Mother board not booting, No Clock, DIMM clock chip is failed, CPU Reset signal, The whole board without reset or may be the reset does not boot can be precise problems that can find only by smart technicians. In case of above issue, no big risks involved for any person/consumer.&lt;/div&gt;
&lt;div style="text-align: left;"&gt;
&lt;br /&gt;&lt;/div&gt;
What should you do when a CPU Total OFF?&lt;br /&gt;
Do you think of a mother board issue? Most common problems might be power issue and display issue due to faulted capacitor/may due to integrated graphics card.&lt;br /&gt;
Check the power cable in case of motherboard repair to find whether it rotates in that power or reinstall ATX1. Inspect the position of CMOS Jumper in mother board. IC Chipset is connected to power source and locate whether it generates excessive heat, if yes, it could be damaged. Replace it CMOS IC Chipset. Check the fans are rotating in good condition. Else replace it or replace IC regulator around the socket on mother board power. Change 1000S.D/3300DF capacity. Use anti-virus software to remover virus from the computers to overcome memory RAM Problem with blue screen display. You can &lt;/div&gt;
</description><link>http://easiertips.blogspot.com/2015/09/how-to-servicing-your-motherboard.html</link><author>noreply@blogger.com (Computer Tips and Technology Support)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-410906527029976681.post-4493054170774873583</guid><pubDate>Tue, 22 Sep 2015 09:44:00 +0000</pubDate><atom:updated>2015-09-22T15:44:16.466+06:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Change the Display Language</category><category domain="http://www.blogger.com/atom/ns#">Including Welcome Screen</category><category domain="http://www.blogger.com/atom/ns#">Multilingual User Interface Language Pack.</category><title>How to Change the Display Language (Including Welcome Screen) in Windows Vista</title><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
The display language is the language that Windows uses in wizards, 
dialog boxes, menus, Help and Support topics, and other items in the 
user interface (UI). In &lt;a href="http://www.tipandtrick.net/category/tips-tricks/windows-vista/"&gt;Windows Vista&lt;/a&gt;,
 additional display languages in MUI (Multilingual User Interface 
Language Pack) can be installed by users of Windows Vista Ultimate and 
Enterprise editions (other editions allow only one display language). 
When there is more than one languages installed, users can change and 
switch display language using steps below.&lt;br /&gt;
&lt;span id="more-202"&gt;&lt;/span&gt;&lt;br /&gt;
&lt;strong&gt;How to Change the Display Language (Including Welcome Screen)&lt;/strong&gt;&lt;br /&gt;

&lt;ol&gt;
&lt;li&gt;Click on &lt;strong&gt;Start Menu&lt;/strong&gt;, then go to &lt;strong&gt;Control Panel&lt;/strong&gt;.&lt;/li&gt;
&lt;li&gt;Click on &lt;strong&gt;Clock, Language, and Region&lt;/strong&gt; option (or &lt;strong&gt;Regional and Language Options&lt;/strong&gt; icon in Classic View).
&lt;img alt="" class="alignnone size-medium wp-image-185" height="90" src="http://www.tipandtrick.net/wp-content/uploads/2008/04/open-clock-language-region.jpg" title="Open Clock, Langauge, and Region in Control Panel" width="277" /&gt;&lt;br /&gt;

&lt;/li&gt;
&lt;li&gt;Click on &lt;strong&gt;Change display language&lt;/strong&gt; under “Regional and Language Options”. For users on Classic View, click on &lt;strong&gt;Keyboards and Languages&lt;/strong&gt; tab.
&lt;img alt="" class="alignnone size-medium wp-image-206" height="80" src="http://www.tipandtrick.net/wp-content/uploads/2008/04/change-display-language.jpg" title="Change Display Language" width="429" /&gt;&lt;br /&gt;

&lt;/li&gt;
&lt;li&gt;Under Display language, choose a language from the list.
&lt;img alt="" class="alignnone size-medium wp-image-207" height="468" src="http://www.tipandtrick.net/wp-content/uploads/2008/04/choose-display-language-407x468.jpg" title="Choose Display Language" width="407" /&gt;&lt;br /&gt;

If no list of display languages been shown, make sure that you have &lt;a href="http://www.tipandtrick.net/2008/how-to-install-mui-language-files-in-windows-vista/"&gt;installed additional language packs or files&lt;/a&gt;.&lt;br /&gt;

&lt;/li&gt;
&lt;li&gt;Click OK (skip if you intend to change the language of Welcome screen too).&lt;/li&gt;
&lt;/ol&gt;
The new language is now applied to user interface. Log off and log on
 again to apply the change. The new language set is applied for your 
user account only, but not on Welcome screen nor default user account 
settings for new users. To effect the change of language in Welcome 
screen and/or default user account, follow these steps:&lt;br /&gt;

&lt;ol&gt;
&lt;li&gt;In the “Regional and Language Options” window, click on &lt;strong&gt;Administrative&lt;/strong&gt; tab.&lt;/li&gt;
&lt;li&gt;Click on &lt;strong&gt;Copy to reserved accounts&lt;/strong&gt; button under “Reserved accounts” section.
&lt;img alt="" class="alignnone size-medium wp-image-208" height="468" src="http://www.tipandtrick.net/wp-content/uploads/2008/04/copy-to-reserved-accounts-407x468.jpg" title="Copy to Reserved Accounts" width="407" /&gt;&lt;br /&gt;

&lt;/li&gt;
&lt;li&gt;If you are prompted for an administrator password or confirmation by UAC, type the password or provide confirmation.&lt;/li&gt;
&lt;li&gt;In the “Regional and Language Settings” dialog box, check to select &lt;strong&gt;System accounts (local system, local service, and network service)&lt;/strong&gt;
 check box. The system accounts are special accounts used by Windows‌ 
services. This setting allows administrators to specify a display 
language and keyboard layout for the Welcome screen. It also sets the 
display language for users who have not specified a display language.
&lt;img alt="" class="alignnone size-medium wp-image-209" height="211" src="http://www.tipandtrick.net/wp-content/uploads/2008/04/change-welcome-screen-language.jpg" title="Apply New Language to Welcome Screen and New Users" width="430" /&gt;&lt;br /&gt;

Optionally, to copy the current settings to the default user account, select the &lt;strong&gt;Default user account (new users)&lt;/strong&gt;
 check box. The default account is used as a template for creating new 
user accounts. This setting allows administrators to set the default 
format, keyboard layout, and display language for new users. Any user 
account created on the computer after the settings have been copied to 
the default user account has these settings applied to it. Existing user
 accounts are not affected.&lt;/li&gt;
&lt;li&gt;Click OK to apply the change.&lt;/li&gt;
&lt;/ol&gt;
&lt;/div&gt;
</description><link>http://easiertips.blogspot.com/2015/09/how-to-change-display-language.html</link><author>noreply@blogger.com (Computer Tips and Technology Support)</author><thr:total>0</thr:total></item></channel></rss>