Athlon 64 Processor

Author: RaN // Category:
For a long time Intel has been leading the market in processor sales and popularity but AMD is finally putting a stop to that. With the release of their Athlon 64 processor, with 64 bit computing capabilities, they have been slowly but surely regaining the market back from Intel.

The Athlon 64 processors have been around for a while now and they have proven themselves the market leaders in processing power. As we know AMD processor run at a lot slower speeds than Intel processors making them cooler to run. This has eliminated the need for expensive cooling equipment and opened the doorway for overclocking.

Although AMD hit the target by releasing their 64 bit processor long before Intel did, they are not standing still. They have been constantly upgrading their line up to increase speed and efficiency.This is apparent with their fx series processors and their dual core processors.

The fx series processor are the king of the hill at AMD. They are the most powerful processor that is available. They show blistering speeds for CPU intensive functions such video encoding and gaming. They also show great performance in database driven work and most other aspects of computing.

The dual-core line of processor are the ultimate in multi-tasking. They provide the power of two processor running in unison while still being able to fit in a single processor motherboard. Although these processors are essentially two processors in one, they are rather pricy and may not be everyones cup of tea.

Intel is trying to fight back by forming an alliance with Apple. All macs are now available with Intel processors. Whether this will be profitable for Intel only time will tell.

With competition growing stronger from AMD this can only mean increased benefits for the consumer. As the war between Intel and AMD intensifies, the consumer will benefit from lowered prices, and increased quality in their processors.

Read more ...

Tips To Shopping For computer printers

Author: RaN // Category: ,
Consider the printer’s DPI (dots per inch) capability, which is the resolution at which it can print photos and documents. The higher DPI (dots per inch) you have, the better quality you will have in either text or photo printouts.

-Consider the cost of ink. When purchasing a new printer, take a moment to compare prices among ink cartridges and make sure that you can afford frequent ink purchases if you plan to do a lot of printing.

-Take a look at the connector and make sure it’s compatible with your system. Most new printers connect via a USB port. Older ones connect using a parallel port, which is not commonly found on new PCs.

-When looking at the cost of ink, also look at the number of pages a single ink cartridge can print. If the page count is high, the cost of the ink may be reasonable. If the page count is low compared to other similar ink cartridges, you may want to select another printer that offers a better performing ink cartridge.

-Check out the warranty. All new electronics, including printers, carry a manufacturer’s warranty. Depending on the company, warranties can be valid anywhere from 90 days to 1 year and may include defects in material and/or workmanship. If your printer fails to perform correctly and develops a problem while under warranty, you will be glad that you saved the paperwork. Always keep the original purchase receipt and warranty information relating to your purchase.

-Buy from a name that you trust. When shopping for any item, it is best to purchase from a manufacturer that you know produces a quality product and especially when it comes to a substantial electronics purchase.

-Consider the size and weight of the printer.

This is important for both cleaning general convenience. If your desk is small, you may not want a bulky printer taking up most of your space. At the same time, you may not want to lift on a heavy piece of equipment when cleaning your work station. A lightweight and compact style may be better, especially if your office is at home.

-Make sure that your computer is capable of running the printer software, which means it may require a specific processor type and speed, available memory, etc.

-Make sure that the printer you purchase has all of the features and capabilities that you need. For instance, if your primary goal is to produce realistic photos and you also plan to print written documents from time to time, consider the purchase of a photo printer. You can change the quality of printing to suit either images or documents or even a combination of both if you plan to print photo newsletters.

-Make sure that the printer has all of the necessary connector cables and that you will not need to buy any additional hardware prior to finalizing your purchase. If you need to purchase a USB cable, which is often the case with many new printers, you will want to purchase it at the same time to save on shipping if ordering online or having to make a special trip if you purchase locally.



Read more ...

Heuristic analysis

Author: RaN // Category:
Now, lets talk about heuristic analysis. Essentially, the heuristic method analyzes the object's activities in the computer system. If those actions are typical of malicious/high risk objects, the object is likely to be classed as malicious or suspicious file's. This allows new threats to be detected even before they have been researched by virus analysts. By default, heuristic analysis is oto enabled.
Some unti virus will notify you when a suspicious file is detected in a message/pop up. You should react to the notification by further processing the message.
Read more ...

Web protection Feature

Author: RaN // Category:
Every time you use the Internet, you subject information stored on your computer to the risk of infection by risky software. These can infiltrate your computer while you are downloading free software, or browsing knowingly safe sites, which have recently suffered network attacks. Moreover, network worms and treat can penetrate your computer before you open a website or begin download unknown file just because your computer is connected to the Internet
If you work in a unsecure zone, you are recommended to use Web Anti-Virus while working in the Internet. Web protection monitors HTTP traffic that passes only through the ports included in the monitored port listIf your computer is running on a network protected by a firewall of HTTP traffic filters, Web Anti-Virus provides additional security when using the Internet.
Read more ...

Criteria For Choosing laptop memory

Author: RaN // Category: ,
Every now so often, laptop users have the need to upgrade their laptop memory, it is better to opt for the higher memory capacity because you'll be saving yourself the difficulty of upgrades, not to say the costs, later on. Make Sure You Have All the Memory Capacity You Will Need Because the higher the capacity and the speedier the rate of the hard disk, the better.
In conclusion, just use some common sense before you buy your
laptop memory. Use the Internet to check out and comparison shop for
the best (and cheap)laptop memory. and you will ultimately find your perfect laptop.
Read more ...

Privacy Policy

Author: RaN // Category:
pceditor.blogspot.com takes your privacy seriously. This privacy policy describes what personal information we collect and how we use it. Please See this privacy policy primer to learn more about privacy policies in general.
Lanjutkan

Routine Information Collection

All web servers track basic information about their visitors. This information includes, but is not limited to, IP addresses, browser details, timestamps and referring pages. None of this information can personally identify specific visitors to this site. The information is tracked for routine administration and maintenance purposes.

Cookies and Web Beacons

Where necessary, pceditor.blogspot.com uses cookies to store information about a visitor's preferences and history in order to better serve the visitor and/or present the visitor with customized content.

Advertising partners and other third parties may also use cookies, scripts and/or web beacons to track visitors to our site in order to display advertisements and other useful information. Such tracking is done directly by the third parties through their own servers and is subject to their own privacy policies.

Controlling Your Privacy

Note that you can change your browser settings to disable cookies if you have privacy concerns. Disabling cookies for all sites is not recommended as it may interfere with your use of some sites. The best option is to disable or enable cookies on a per-site basis. Consult your browser documentation for instructions on how to block cookies and other tracking mechanisms. This list of web browser privacy management links may also be useful.

Special Note About Google Advertising

Any advertisements served by Google, Inc., and affiliated companies may be controlled using cookies. These cookies allow Google to display ads based on your visits to this site and other sites that use Google advertising services. Learn how to opt out of Google's cookie usage. As mentioned above, any tracking done by Google through cookies and other mechanisms is subject to Google's own privacy policies.

Contact Information
Just leave a comment if you have question.
Read more ...

What is eco labels

Author: RaN // Category:
As the popularity of green product claims continues to grow and With the plethora of techno eco labels the more you try to learn, the more confused you can get.
Dont worry, we will try to help you make sense of all logo and spell out what each stand for- PCeditor.blogspot.com


1. Energy Star (www.energystar.gov)

When you boot your PC and you'll probably catch This logo on the bios boot screen.
ENERGY STAR is a joint program of the U.S. Environmental Protection Agency and the U.S. Department of Energy helping us all save money and protect the environment through energy efficient products and practices.

In 1992 the US Environmental Protection Agency (EPA) introduced ENERGY STAR as a voluntary labeling program designed to identify and promote energy-efficient products to reduce greenhouse gas emissions. Computers and monitors were the first labeled products. The ENERGY STAR label is now on over 50 product categories including major appliances, office equipment, lighting, and home electronics. EPA has also extended the label to cover new homes and commercial and industrial buildings.

2. EPEAT™ (www.epeat.net)

EPEAT (Electronic Product Environmental Assessment Tool) is a procurement tool to help large volume purchasers in the public and private sectors evaluate, compare, and select desktop computers, notebooks, and monitors based on their environmental attributes. EPEAT currently covers computer desktops, laptops, and computer monitors.
It enables purchasers to evaluate,compare and select based on environmental attributes.

3. 80 plus (www.80plus.org)

The 80 PLUS performance specification requires multi output power supplies in computers and servers to be 80% or greater energy efficient at 20%, 50% and 100% of rated load with a true power factor of 0.9 or greater. Look for the logo on stand alone power supply and on some PC packaging.
To date, Over 700 power supplies have been certified and many local and major computer manufacturers are selling qualified computers.
Read more ...

Cleaning the LCD screen

Author: RaN // Category:
Cleaning an LCD screen is easy,But, make sure you following this tips:

1.Turn off your computer or display.
2.NEVER! using alcohol or ammonia based cleaners on your LCD screen. Because This could damage the LCD screen. Dampen a clean, soft, lint-free cloth with water only.
3.Never squirt any cleaner directly on a LCD screen.
4.LCD screens are not made for constant touching,so be careful when cleaning because you don't want to damage the pixels within the screen.Be sure to wring out all the excess moisture.
5. If you got some extra money, i recommend using a LCD cleanser that can be purchased at any electronics store.
Read more ...

Hibernate your PC

Author: RaN // Category: ,
Modern PC are designed to go into stand By mode when they're under power (battery/UPS). If the computer not see the activity(no mouse movements/no typing), its going to sleep to safe his power. the delay time after which PC automatically enters Stand By mode is set in the Power Options Properties dialog box, obtained through the Control Panel. Unlike Stand By mode, you can leave your PC in a hibernated state for as long as you wish. A big advantage of hibernation is that it’s quicker to start the computer than a regular start up.

Here’s step by step to hibernate your PC:

A. Make sure save your work, you didn't need to quit any applications. just save your work.
B.Hit start button
C.You will see The Turn Off Computer box thing appears
D.Press the Shift key.
Now you can see the magic. The Stand By button changes to read Hibernate. Keep that Shift key down.

E.Its time to Click the Hibernate button.
Now your PC turns itself off.
Now, how If your laptop seems to be unable to enter Hibernation mode after you hold the shift button? its ok. no need to panic. we need to change some setting:
A. From the Start menu, choose the Control Panel.
B. And Open the Power Options icon.
C. Look and click on the Hibernation tab.
If You can't find the Hibernation tab, then there’s your problem, The PC is not capable of hibernating.

If not, Just make Enable hibernation mark. (Picture)

Note: Hibernation mode requires hard drive space! If your hard drive space runs low, it’s possible that Hibernation mode won’t work.

Read more ...

Adobe and Intel will improve Adobe Flash technology

Author: RaN // Category:

Hot news this month coming from Intel Corporation and Adobe Systems Incorporated, they
announced plans to collaborate on the development to port and optimize Adobe Flash technology for the Intel Media Processor CE 3100.
This technlogy is expected to provide all consumers with richer and more seamless Web based and video viewing experiences through advanced Intel based cable boxes,digital TVs, Blu-ray ,Disc players, and retail connected AV devices.

Intel plans to ship the first CE3100 with support for an optimized implementation of Adobe Flash Lite before mid-2009.
For a note, Intel and Adobe have a long history of technical collaboration.
more information about adobe, visit www.adobe.com.
Or information about Intel at www.intel.com
Read more ...

Password protect folders

Author: RaN // Category: ,
If you only have 1 computer and share it with other users, I think its a good idea if you add some extra security to protect your data (maybe private data). You can do this with 2 methode. (for windows platform). we will not using any software here.

1. If Your hard drive formatted using NTFS. this can be used to protect folders from other users. But Only If you have a log in password for your account.
Here's the step:

Right-click the folder that you want to make private and choose "Properties" (or Alt+Double-click). Go to the "Sharing" tab and check the "Make this folder private" box. (see the img)

Then Click Apply, Type a password then confirm it. Click the "Create Password" button then close the Password window.

Click OK in the Properties dialog box.

Done.

2. Give a password If the Folder is Zipped
Double click the zipped folder. In the top menu select File and then click "Add a Password".
Next step is Type and confirm your password.
Read more ...

Capture Screenshots with easy

Author: RaN // Category:


Usually, when we want to capture an image directly from our computer we use a standart way:Print Screen button. then we have to open an image editor application, paste the picture and then save it. Mmh, what a boring methode.
Let me introduce you with this Freeware, Gadwin's free PrintScreen. Gadwin PrintScreen allows much more flexibility with that Print Screen button at the top of your keyboard.

When you hit print screen button, you can choose to save the screen directly to a specific folder. This progie will sit on sys tray.

You can download this Freeware Here
Size: 3 Mb
Read more ...

Software:Blaze Media Pro

Author: RaN // Category:

Sometimes when we want to watch your favorite movie or just want to listen a song, you get mad because your media player doesn't support some formats. But there is some solutions for this. you can use Blaze Media Pro,This software supports almost all kinds of formats and allow us to join audio, edit tags and more.
This software supports CDDB and offers you many comprehensive video-editing operations (delete frame, crop, flip, trim resize, rotate, mirror, delete selection text overlay, adjust audio volume). There are also over color adjustment operations and 29 effects, which allow powerful video enhancement and alternation.
Download Blaze Media Pro, install and run it .
Read more ...

Installing Windows Server 2008

Author: RaN // Category: ,
Today we will try to installing the Windows Server® 2008 operating system.
Before we do this, there is System requirements did you need to know.

Processor
Processor performance depends not only on the clock frequency of the processor, but also on the number of processor cores and the size of the processor cache. The following are the processor requirements for this product:
• Minimum: 1.4 GHz (for x64 processors) And 1 GHz (for x86 processors)
• Recommended: 2 GHz or faster


Disk space
• Minimum: 10 GB
• Recommended: 80 GB or mor
e

RAM
The following are the RAM requirements for this process:
• Minimum: 512 MB
• Recommended: 2 GB or more
• Maximum (32-bit systems): 4 GB (for Windows Server 2008 Standard) or 64 GB (for Windows Server 2008 Enterprise or Windows Server 2008 Datacenter)
• Maximum (64-bit systems): 32 GB (for Windows Server 2008 Standard) or 2 TB (for Windows Server 2008 Enterprise, Windows Server 2008 Datacenter)


The upgrade process from Windows Server 2003 to Windows Server 2008 requires free disk space for the new operating system image, for the Setup process, and for any installed server roles.

For the domain controller role, the volume or volumes hosting the following resources also have specific free disk space requirements:
• Application data (%AppData%)
• Program files (%ProgramFiles%)
• Users’ data (%SystemDrive%\Documents and Settings)
• Windows® directory (%WinDir%)


The free space on the %WinDir% volume must be equal or greater than the current size of the resources listed above and their subordinate folders when they are located on the %WinDir% volume. By default, dcpromo places the Active Directory® database and log files under %Windir%—in this case, their size would be included in the free disk space requirements for the %Windir% folder.

However, if the Active Directory database is hosted outside of any of the folders above, then the hosting volume or volumes must only contain additional free space equal to at least 10% of the current database size or 250 MB, whichever is greater. Finally, the free space on the volume that hosts the log files must be at least 50 MB.

A default installation of the Active Directory directory service in Windows Server 2003 has the Active Directory database and log files under %WinDir%\NTDS. With this configuration, the NTDS.DIT database file and all the log files are temporarily copied over to the quarantine location and then copied back to their original location. This is why additional free space is required for those resources. However, the SYSVOL directory, which is also under %WinDir% (%WinDir%\SYSVOL), is moved and not copied. Therefore, it does not require any additional free space.

After the upgrade, the space that was reserved for the copied resources will be returned to the file system.
Before you start Setup
Before you install Windows Server 2008, follow the steps in this section to prepare for the installation.
• Check for application compatibility. To help with this, you can use the Microsoft Application Compatibility Toolkit. Although it is primarily used to provide compatibility information about network applications, you can also use it to prepare for Windows Server 2008.
• Disconnect UPS devices. If you have an uninterruptible power supply (UPS) connected to your destination computer, disconnect the serial cable before running Setup. Setup automatically attempts to detect devices that are connected to serial ports, and UPS equipment can cause issues with the detection process.
• Back up your servers. Your backup should include all data and configuration information that is necessary for the computer to function. It is important to perform a backup of configuration information for servers, especially those that provide network infrastructure, such as Dynamic Host Configuration Protocol (DHCP) servers. When you perform the backup, be sure to include the boot and system partitions and the system state data. Another way to back up configuration information is to create a backup set for Automated System Recovery.
• Disable your virus protection software. Virus protection software can interfere with installation. For example, it can make installation much slower by scanning every file that is copied locally to your computer.
• Run the Windows Memory Diagnostic tool. You should run this tool to test the random access memory (RAM) on your computer.
• Provide mass storage drivers. If your manufacturer has supplied a separate driver file, save the file to a floppy disk, CD, DVD, or universal serial bus (USB) flash drive in either the root directory of the media or in one of the following folders: amd64 for x64-based computers, i386 for 32-bit computers, or ia64 for Itanium-based computers. To provide the driver during Setup, on the disk selection page, click Load Driver (or press F6). You can browse to locate the driver or have Setup search the media.
• Be aware that Windows Firewall is on by default. Server applications that must receive unsolicited inbound connections will fail until you create inbound firewall rules to allow them. Check with your application vendor to determine which ports and protocols are necessary for the application to run correctly.
• Prepare your Active Directory environment with Windows Server 2008 updates. Before you can add a domain controller that is running Windows Server 2008 to an Active Directory environment that is running Windows 2000 or Windows Server 2003 operating systems, you will need to update the environment.

Note:
Even if you have followed these steps to install previous releases, you must repeat these procedures prior to installing this release of Windows Server 2008.

To do this, you need to update the Active Directory environment by using the following procedure. If you are performing an unattended installation, perform this step before you install the operating system. Otherwise, you will need to do this after you run Setup and before you install Active Directory Domain Services.

To prepare a forest
1. Log on to the schema master as a member of the Enterprise Admins, Schema Admins, or Domain Admins group.
2. Copy the contents of the \sources\adprep folder from the Windows Server 2008 installation DVD to the schema master role holder.
3. Open a Command Prompt window, navigate to the Adprep folder, and run adprep /forestprep.
4. If you plan to install a read-only domain controller (RODC), run adprep /rodcprep.
5. Allow the operation to complete and the changes to replicate before following the next procedure.

To prepare a domain
1. Log on to the infrastructure master as a member of the Domain Admins group.
2. Copy the contents of the \sources\adprep folder from the installation DVD to the infrastructure master role holder.
3. Open a Command Prompt window, navigate to the Adprep folder, and run adprep /domainprep /gpprep.
4. Allow the operation to complete and the changes to replicate.

After completing these steps, you can add domain controllers that are running Windows Server 2008 to the domains you have prepared. Among its tasks, the adprep command extends the schema, updates default security descriptors of selected objects, and adds new directory objects as required by some applications.
Installing a Server Core installation

When installing a Server Core installation of Windows Server 2008 on an x86-based or x64-based server, you will be prompted during Setup to install one of the following options. You can use the following explanations to determine which one to choose:
• Windows Server 2008 VERSION (Full Installation). This option installs the complete installation of Windows Server 2008. This installation includes the entire user interface, and it supports all of the server roles.
• Windows Server 2008 VERSION (Server Core Installation). This option installs a minimal server installation of Windows Server 2008, which you can use to run supported server roles.

When you select this option, Setup will install only the files that are required for these server roles to function. For example, the traditional Windows interface will not be installed—you configure and manage the server locally from the command prompt. You should consider this option because it will reduce the servicing and management requirements and the attack surface of your server.
Installing multiple operating systems on the same computer

We recommend that you install Windows Server 2008 on a partition separate from your previous operating system. By doing this, you will still have access to the other operating system. For best results, we recommend that you start Setup from within Windows (rather than booting from the product DVD), and then perform a custom (clean) installation onto a separate partition.

For more info you can visit breachsoftware.biz
Read more ...

Backup before Upgrading PC

Author: RaN // Category:


When you make a decision to upgrade your PC, The most crucial step is back up all your (in)important data. Its easy to do. you can transfer your data to another media such disc, portable media etc.
Simply drag and drop your files.
after you done. take a look for hardware compability;
a.RAM
b.Mainboard
c.Processor
d.Driver
e.VGA/graphics card
With early diagnose, you will speed up the process to avoid some problem when something bad happen.
Read more ...

Slow transfer? use Turbo Charge

Author: RaN // Category:


All computer user already know the important of backing up data, slow data transfer and less than portable gadget drive can make the process far from convenient.And buffalo answer this, they found a way to speed up USB hard drives with what it's calling Turbo USB.
The drive has some extrathing, some of this features:
-.AES Level encrytion
-.Turbo USB features
Buffalo say, with turboUSB we can increase the rate transfer 64% faster.
The mini station is speediest drive for USB 2.0 transfer, with turboUSB it took only 1 min 45 sec to back up 1 gb data.
So its a good choice for sombody that care with safety and time.
Read more ...

Delete your Computer History

Author: RaN // Category: ,


When we surf the internet, Pictures, Flash, animation and text get cached/stored on our hard disk. Slow but sure,This condition will slow down our computer AND this is not safe for us, because some Companies use cookies to track your actions/actifity on the web. So how we can removing all unnecessary files and thus makes more hard disk available for use?
Follow this step:

You can do this with 2 way. Manual and automatic(use a software registry cleaner)
But not every user can install this (under a limited account/Guest status etc) So lets do it manually.
1. Click start
2. Open up internet explorer Go to explorer bar and then search
3. Now that your in search click all files and documents
at the bottom it says more advanced options click on that
Then check the line that says Search hidden folders and files
4.Type history, And continue to search.
5.Focus at C:\Documents and Settings\yourusername\Local Settings
Open this folder.
6. The rest is pretty simple you just need to open up the four different folders you will find there
* Open "Apps Folder" delete everything
* Open "Temp Folder" delete everything
* Open "History Folder" delete All
* Open "Temporary Internet Files Folder" empty it



7.Done, if not enough, you can Clear all CACHE and cookies on browser setting.

Read more ...

PC Not responding when start up

Author: RaN // Category:
When your computer hangs or not responding after 4 or 5 since startup and you cant access the Taskbar, it may be due to one specific service (Background Intelligent
Transfer) running in the background. its not good.
Here's some good way to solve this problem..
1.Click Start/Run,
2. Then type 'msconfig', then click 'OK'
See picture:

Go to the 'Services' tab, And find the 'Background Intelligent Transfer' service.
Disable this(uncheck), apply all changes on prompt & reboot your PC.
Read more ...

PC Modem

Author: RaN // Category:
Many cell phone can pull double agent as a modem for connecting PC or laptop to the internet, With the right cell phone and online data service, the Internet is just a call away. All you need is a phone with modem enabled, a wifi data access plan that support using the one as a modem and some software that you need.

Verizon, Sprint and AT&T data plans designed for people who want to use their cell phone as a modem. Most of this cellphone using a bluetooth,data cable or USB cable to make a connection(to the PC). dont worry, if you dont have one you can get one. its not expensive anymore.

AT&T
AT&T offers phone-as-modem packages ranging from $60 to $80 a month
some of the Verizon handsets that can be used as a wireless modem:

* Motorola Razr v3m
* Samsung Flipshot
* Samsung Gleam
* LG Voyager
* LG enV
* LG enV2
* LG Decoy
* LG Dare

To use AT&T service, you need to download a softwware first. go to official site. install the app on your phone and connect it to your PC via USB.

Sprint
Sprint offers an Unlimited Phone as Modem plan that costs Avg $40 -$50 a month.

Some of the Sprint handsets that can be used as a wireless modem:

* BlackBerry 7130e
* BlackBerry 8703
* Motorola Q
* Palm Treo 700wx

Note: Any call you receive while using your cell phone as a modem will go straight to voice mail. and if you place a call your modem connection will end automatically.
Read more ...

Acer Aspire One 8.9-inch Netbook review

Author: RaN // Category:
Acer Aspire One 8.9-inch Netbook review-
Pceditor.blogspot.com

Acer Aspire one not only packed with the latest technology and unique design, but each of them also includes special features. its a good choise for light packing buisness travelers.The touchpad of the Acer Aspire One is likely to be the first deal breaker for most people,The LCD screen, at a resolution of 1024x600 pixels (WSVGA resolution),is plenty big with the widescreen aspect ratio working for the Acer One to yield a much bigger feel and view.
aspire one so Slim, compact and fits easily in your backpack,Because of its size, the Aspire One does not come with an integrated optical drive, but optional CD/DVD read/write drives can be connected to the laptop via one of the three USB ports.
Let see Acer Aspire One Features and specifications

Features

* 1.6GHz Atom N270
* 1GB DDR2 SDRAM
* 1.3 Megapixel camera, SDHC and multi-format media readers
* 802.11b/g, Ethernet, three USB 2.0, VGA, and 3.5mm audio out
* One free mini PCI slot for WWAN, 160GB hard drive (2.2 pounds)

Processor, Memory, and Motherboard

* Hardware Platform: PC
* Processor: 1.6 GHz Intel Core Solo
* System Bus Speed: 533
* Number of Processors: 1
* RAM: 1000 MB
* Memory Type: DDR2

Hard Drive

* Size: 160 GB
* Manufacturer: Portable
* Type: Serial ATA

Misc
* Operating Systems: Windows XP - Home
* Startup Operating System: Windows XP Home
* Platform: Netbook
* Expansion Ports: 1 - SD Card Slot
* Display Type: WSVGA with CrystalBrite Technology
* Viewable Screen Size: 8.9"
* Maximum Resolution: 1024 x 600
* Processor Brand: Intel
* Processor Class: Intel Atom
* Processor Type: Single Core
* Processor Speed: 1.60GHz
* Processor Number: N270
Read more ...

Using A Live CD

Author: RaN // Category:

With All the fuss about linux OS these day, The huge library of open source software, the freedom from spyware and virus- its only natural to be curious about it. You can set up a dual boot configuration with linux instead of window XP. A little web searching for Vista Linux dual boot will produce plenty of how to guide to get started (if you are really ambitious, seek for vista triple boot for instruction on installing vista, linux and window XP at the same system).
But because the operating system are so different, dual booting them can be (very) challenging, A single mistake could wipe out all your PC master boot record (and trust me, its a bad thing!) OR you whole Hard drive!. so you should Back up everything essential before embarking on a windows/linux dual boot adventure.

There's an easier and safer way to take linux for a spin and its requires no system tinkering whatsover. its called LIVE CD- Essentially linux on a bootable disc. when you boot your PC with a live CD in the drive, its load the OS. into memory (RAM / Swap). when you finish, you just shut down the system and remove the disc from dock. Next boot you will find your self in vista.
So ready to get started? you only need to download a linux image file. a popular choice is ubuntu and backtrack(backtrack for security). you can google it with "linux iso download" to find other linux distro. After download the image, then you need to burn it. you can use nero or a freeware like imgburn.
Read more ...

Get Total protection for Your PC

Author: RaN // Category:


Everyday, New threat, virus and malware will attempt to harm our computer. It's the real PC big enemy. Who’s the man behind this threat? No one knows for sure. with a simple software, a pro or a newbies can create this easy.-
PCeditor.blogspot.com


Here is a list of the usual threats that you face as you use the internet

* Virus - virus is a a computer program (usually hidden), written to cause mischief or damage to a computer system because virus infects programs and causes them to malfunction.

* Spyware - is any software application that is generally installed without the knowledge or consent of the user then it will send your info to another source, usually an internet marketing or porn website.

* Bots - A botnet is a group of bot infected PCs that are all controlled by the same controlling party. They can then use them to crack codes, send spam or perform other tasks without the owners knowledge or consent.

* Trojans - Software that appears to perform or actually performs a desired task for a user while performing a harmful task without the user’s knowledge or consent.

* Malware - They are designed to take control of a PC, the examples of it may be viruses and Trojans

* Adware - A form of spyware that collects information about a user in order to display annoying ad in the Web browser based on the information it collects from the user’s browsing patterns. Frequently this is installed in free packages such as Freeware.

* Rootkits - A program (or combination of several programs) designed to take fundamental control of your computer. itsa type of Trojan that keeps itself, other files, registry keys and network connections hidden from detection.

So how we prevents them to enter our computer.well. The best defense against the Storm Worm and other malware is a good antivirus, antispyware, antispam and firewall program and always keep your applications up to date.

Dont worry, We will help you to pick the best anti virus for you.


1. Avira AntiVir Personal
Avira AntiVir Personal - Free Antivirus 8.2.0.337

Avira AntiVir Personal gives you the following functions:
  • Control Center for monitoring, administering and controlling the entire program
  • Central configuration with user-friendly standard and advanced options and context-sensitive help
  • Scanner (On-Demand Scan) with profile-controlled and configurable search for all known types of virus and malware
  • Integration into the Windows Vista User Account Control allows you to carry out tasks requiring administrator rights
  • Guard (On-Access Scan) for continuous monitoring of all file access attempts
  • Integrated quarantine management to isolate and process suspicious files
  • Rootkit protection for detecting hidden malware installed in your computer system (rootkits) (Only for 32-bit systems)
  • High-performance multithreading function (simultaneous high-speed scanning of multiple files)



2.ESET

ESET Smart Security is built on an integration framework that allows each threat protection component to share. ESET Smart Security is based on three basic pillars:
  • ESET NOD32 Antivirus + Antispyware
  • ESET Anti Spam
  • ESET Personal Firewall

Just set it and forget it. That’s the beauty and the power of NOD32’s ThreatSense® technology. NOD32 proactively protects against viruses, spyware, rootkits and other malware. And, its high performance engine won’t slow your system down. Take a free NOD32 30-day test drive.

Download Eset-Smart-Security at ESET.com


3. AVG Free Edition 8.0 Build 176a1400

Here are some key features of AVG Free Edition:

· Automatic update functionality
· The AVG Resident Shield, which provides real-time protection as files are opened and programs are run
· The AVG E-mail Scanner, which protects your e-mail
· The AVG On-Demand Scanner, which allows the user to perform scheduled and manual tests
· Free Virus Database Updates for the lifetime of the product
· AVG Virus Vault for safe handling of infected files

AVG Free is available free of charge to home users for the life of the product. Though the free version of this program will suffice for average folks, those who demand more control should certainly consider AVG Anti-Virus Professional.


4. Norton AntiVirus 2009

Norton AntiVirus was designed to remove viruses, worms, and Trojan horses automatically - without interrupting your work. It automatically suspends all non-critical tasks and alerts when you're enjoying games and movies. And while Web-based attacks may be the single fastest growing type of online threat, Symantec's patent-pending Browser Protection lets you surf the Internet with confidence.

Here are some key features of "Norton AntiVirus 2009":

· Norton Internet Worm Protection stops certain damaging Internet worms at their attempted point of entry.
· QuickScan tool automatically searches for and removes viruses whenever new virus protection. worms, and Trojan horses.
· Scans and cleans both incoming and outgoing email messages.
· Blocks viruses in instant message attachments.
· Detects spyware and certain non-virus threats such as adware and keystroke logging programs.
· Scans compressed file archives before you open them and risk infecting your computer.
· Downloads new virus protection updates automatically to protect against new threats.
· Worm Blocking and Script Blocking can detect new threats even before virus protection updates are created for them.
· Improved performance delivers faster scans
· One click access to expert support
· Works quietly in the background.
· Network mapping provides a view of your home network.




5.Kaspersky Anti-Virus Personal


Kaspersky AV provides all types of anti-virus protection:anti-virus scanners, monitors, behavior blockers and integrity checkers, kaspersky anti virus personal pairs a topnotch interface with solid performance in threat detection. You only need to choose from three levels of protection and your PC is completely safe.

Here are some key features of Kaspersky Anti-Virus Personal
· Automatic configuration during installation
· Protects from viruses, Trojans and worms
· Blocks spyware and adware
· Scans files in real time (on access) and on demand

· Wizards for common tasks
· Visual reports with charts and diagrams
· Alerts provide all the information necessary for informed user decisions
· Automatic database updates

Read more ...