Jumat, 07 Desember 2007

Email to Fax Services Are Really Cool

If you were to ask me, I would not agree that fax is cool from any angle. Then again, many people from the last generation lost the wonder that copy machines used to instill. The technology has unfortunately been stereotyped as old, inconvenient, and ultimately more of a hassle than a good technology in today's digital world. But the world of today is seeing a new development. The fax machine is getting a makeover. It is getting connected to the Internet.In general, an email to fax service can be seen as just being really cool. In the past, sending out a fax message tended to involve a lot of hassle. Few people have actual fax machines inside their house and many would not want to run to the local library or copy center to try and send out their private message in a very public setting. Add in the pain and suffering felt as you have to constantly fiddle with the toner levels and paper levels, while also trying to use the buttons properly, so that your private resume does not get sent to random people halfway across the country. The traditional mode of faxing can be quite troublesome.However, the new online fax is making faxing a lot more convenient. They effectively just improve upon current attachment technology to give all of your little documents a professional feel without the hassle of actually sending a fax. All you need is some special software that will help you get a special email just for faxing. You could get a decent service at a low cost. This software then composes your email message into a professional level PDF file that can be sent out as a normal fax. You just have to punch in the number properly as the receiver of the email and your provider will take care of the rest. In fact, the receiver won't even know how you sent it. It will seem like just any other fax message that comes in. They don't realize how much time and effort you managed to save by taking advantage of new technology. And receiving faxes is not a problem at all. Just make sure that your service provider is a good one. Such a service will give you a real fax number that people can even send hard copy faxes to. The information is intercepted and sent to you as a PDF file that can be read easily through your email account like any other message. This beats the inconvenience of rushing to check the fax machine for messages. You won't have to keep taking the long walk to the machine, and best of all, your messages will be kept to the privacy of your own inbox and away from the prying eyes of nosy employees or competing salesmen. Communications are developing at breakneck speed and the online fax is one of the latest innovations. These services are really cool for anyone from the common office worker to the hardcore businessman or woman. They are a huge improvement over the old ways. The great thing is that they do away with all the hassles that we had come to associate with the old fax machine.

Formula-based Escape Velocity Systems Chosen by Alaska Brewing Company

Evan Garber, President of Escape Velocity Systems (www.evs-sw.com) recently announced that Alaskan Brewing Company selected the firm’s process manufacturing software solution. Garber commented, “We are delighted to provide an historical brewery with the most powerful formula-based technology solution.” In 1986, the Alaskan Brewing Company became the 67th operating brewery in the United States and the only one in Alaska. Since that time, products have brought home more than 33 major medals and awards, including "Best Beer in the Nation" in the 1988 Great American Beer Festival Consumer Preference Poll. The popularity of these beers has led to heroic efforts to keep up with the demand. The company claims the unofficial record for production on a 10 barrel brewing system, with a whopping 42 batches in a single week. The addition of a new, 100-barrel brewhouse in 1995, and a Sankey-type keg system installed the following year, finally made it possible to serve the entire Pacific Northwest and later the Desert Southwest. Brewing beer in Alaska is not easy. In the coastal community of Juneau, without road connections to the lower 48 states, everything arrives and leaves by water or air, and the weather always has the last word. As the company continues to grow, they needed to find the best process manufacturing technology solution and concluded that Escape Velocity Systems was best able to address the unique formula-based requirements.Escape Velocity Systems (EVS) was formed in 2001 to combine specific industry knowledge related to process manufacturing, distribution, and ERP implementations with cutting edge software development. The company focus is to create tools that enable mid-market enterprises to achieve their goals, focusing on lean processes and ROI. According Garber, “We realize that good ERP software is the hub of information in any process manufacturing enterprise. Timely, reliable, and centralized data are non-negotiable elements for businesses competing in the 21st century.”The term escape velocity refers to the speed that is necessary for an object to overcome gravity and soar into space. EVS provides direct applications for businesses looking for a catalyst, not just a software package. Process manufacturers require the best software solution coupled with industry experience that will accelerate the velocity with which they race towards their goals. The gravity of status-quo opposes aggressive, cutting edge organizations as they strive towards high quality and short lead time delivery while reducing inventories and operating costs.

Kamis, 06 Desember 2007

Broadband: Jumping the Gun?

According to the industry leading telecommunications operator, BT and the UKs independent regulator, Ofcom pressures to roll out what would prove a highly expensive fibre optic network throughout the UK could be premature.The network in question would use “fibre to the home”, providing broadband speeds of up to 100Mbps. The main downside of which, would be the implementation cost, which is estimated at anything up to £15bn.Peter Philips, Ofcom’s head of strategy has expressed concern to whether evidence for such a fast network, is required within the UK. Uncertainty over whether or not consumers will be willing to pay the extra costs for faster broadband has also been expressed. Such “fibre to the home” networks are commonplace within Japan and South Korea, who are the world leaders in broadband speeds. Similar roll outs are starting in the US, France and Germany.The Broadband Stakeholder Group (BSG) started the debate on whether or not the UK needed such a fast network back in spring of this year. “There is lots of competition and innovation in the broadband market and [it is not clear that] current bandwidth is a problem. We don't need to make any rash moves but the time is ripe for some collective thinking,” According to BSG’s chief executive Antony Walker.BT’s current plan, aims to implement the successor to ADSL, dubbed ADSL+2 within all of its exchanges by 2011. This roll out will begin early 2008, and will make available broadband speeds of up to 24Mbps. The only commitment BT has made with regards to “fibre to the home” is that it will implement such broadband technologies in new housing estates.Although 24Mbps is a far cry from the 100Mbps consumers within certain areas of the world enjoy, the impression from both Ofcom and BT is that it will be some time before such broadband networks are required, and subsequently the standard throughout the UK.

The Nokia 6500 - a Pouch of Class!

The classical designing of the Nokia 6500 phone helps the user to ensure that simplicity endures. User enjoy the image on the handset as it comes up with the two inch wide screen that gives high resolution on 16k color screen.The Nokia 6500 is a mobile from the classic range with more of today's technology and advanced features like Megapixel camera, advanced music player, large memory storage and high-end network. Well, it can be said that phone is reaffirmed its leadership in the mid-range mobile phone with all the third generation technology embedded. The handset is the 3G mobile phone with smooth and black colored stylish casing brushed up with the aluminum finish. The ergonomic keypad gives large and soft keys to work efficiently while messaging or accessing various features in the mobile phone. The classical designing of the Nokia 6500 phone helps the user to ensure that simplicity endures. User enjoys the image on the handset as it comes up with the two inch wide screen that gives high resolution on 16k color screen.The O2 dual band 3G technology in the Nokia 6500 offers it users for fast downloading and browsing; whereas the quad band GSM technology gives user to talk or connect with the friends across the world with the seamless network. Thus, built in 3G technology like Bluetooth wireless connectivity, Nokia USB cabled connection gives the user with an high speed broadband connection with fast data transfer, multitasking capabilities and video streaming options.The phone is comprised with 2Megapixel camera that allows the user to capture still and video pictures on his phone with the camera function like flash. So, with in-built camera function gives an access to high quality images and videos. The fun filled music experience in phone can be eared from the music player which supports all the popular music formats. Moreover, user can have the pleasure of playing Java games and downloading the games too on his O2 handset. You can store large number of photos, videos music, messages or contact list on its handset as Nokia 6500 comes with one GB in-built memory. Nokia, O2

Broadband: a Digital Divide

As consumers and providers alike are all to well aware, broadband speeds experienced within metropolitan areas far exceed that of speeds experienced within rural parts of the country. With super-fast broadband, or ADSL+2 scheduled for roll out next year, some predict the divide is only going to widen.Predictions show that people living in rural areas could even be waiting decades before they experience speeds close to that of their metropolitan counterparts.As mentioned, next year, BT plans to implement its ‘next generation’ ADSL (ADSL+2) which promises speeds of up to 24Mbps. As with the current broadband situation though, your average speed will depend greatly on how far you are from your nearest BT exchange. And for some rural residence, this can be hundreds of miles. Rural consumer concerns not only lie with the speed that they receive though, but also the extra cost they have to pay. "There is a growing digital divide as people in built-up urban areas are able to take advantage of cheaper broadband and 'free' line rental, while those in the country are left languishing on more expensive packages" said Michael Phillips from Broadbandchoices.co.uk.“Unbundled services” is the term given to when a provider (ie. Tiscali, TalkTalk, Pipex, etc) installs their own equipment within one of BTs exchanges. This allows providers to offer consumers far more competitive broadband deals than they would prior to unbundling. As this can cost providers anything in the region of £30,000 though, they tend to reserve such services to urban areas, where development tends to be more cost effective.

Rabu, 05 Desember 2007

Starting A Lucrative Pet Sitting Business

While the idea of a pet sitting business may some odd to many, it is actually a very lucrative industry. The home-based & commercial pet sitting industries are literally exploding in popularity in the U.S. and abroad.Currently, pet sitting businesses are one of the easiest, less riskiest & most profitable businesses to start as there are no substantial costs to look after pets. Over 40 million U.S. households own at least one dog, and Americans spend over $34 Billion a year caring for their animals. In addition, over 47 Million U.S. households own more than one pet.The statistics and market trends speak for themselves. The fact is owning a home-based or commercial pet sitting service can generate anywhere from several thousand to several hundred thousand dollars in additional income, regardless of which region or country you reside in.There is a fast-growing trend, not only in the U.S., but Canada, and other countries to find a loving, caring pet sitting service in their area, and in most cases, price isn't much of a factor. Many surveys have been conducted, and pet owners are choosing independent pet sitting services over the mainstream kennel.Think about it? Why would a pet owner drop their little companion off at a kennel where they are caged for most of the day, while they are off at work or on vacation. A pet that is not cared for equally as it is accustomed to, whether it be for a day or several days can impose a damaging psychological effect.For about the same price, more or less, a pet owner can look to Magazines, Newspapers, Direct Mailings or the Yellow Pages where they can bring their pet to a loving, caring place such as a home pet sitting service. Not a jail cell.As a pet sitting business owner, referrals will come gradually in a concerted manner. The most difficult part during the start-up phase of this kind of business is finding the first five to ten clients. After that, the client referral snowball will begin as your clients will refer others to your business and pretty soon, you'll need to hired help to take care of all of the pets.Please keep in mind, that there are numerous types of services you can provide, such as visiting the owners home to take pets for walks when they are absent, or by keeping a watchful eye over the pet owners home by not only caring for their animals but also watering their plants, maintaining their aquarium, performing security checks, or mowing their lawn. In addition, you can arrange for doggie-day-care outings and arrange for dogs to play in the parks. You can also provide taxi services to the veterinary appointments and grooming visits, and also deliver pet food to homes & other places.Before the first year is out, a home based business could pull $100k USD income, while a commercial pet sitting service at a public location can generate up to $500k USD and more.You are ultimately the one that determines how much money you'll make in the business as you'll be the one that attracts clients.If you take an active approach, you will soon learn that owning and operating a pet sitting business can be extremely profitable.If you are a little apprehensive about diving into this kind of business because you don't know how to attract new clientele, do not worry. Start-Up costs for this business is minimal to non-existent using various forms of advertising, including:1.) Listing your Business in the Yellow Pages, 2.) Distributing Flyers in the mail or door-to-door at places of businesses or residential areas, 3.) Community T.V. Bulletin Boards, 4.) and Web Sites which you can develop for FREE plus many others.From Internet Advertising, to Radio & T.V. Pay-Per-Lead Programs, to Direct & Co-Operative Coupon Mailings, we can honestly say that it will be easy to find new clients as demand is high.As far as hard costs go, there really is none, except Pet Food and maybe a few special leashes.As a pet sitting business owner, you will need to learn the business inside and out, including day to day operations, marketing techniques, the skills you need to know for short and long term success, avoiding costly mistakes, zoning issues "for commercial businesses", essential resources, etc...If you've been looking to start your own business, and be your own boss, with a minimal risk and virtually no startup costs, with a potential to earn six-figures a year doing what you love, then a pet sitting business may be just for you.

Lifeboat Distribution to Distribute Commence Database Management Software

Commence Corporation a leading provider of database management and desktop development tools has announced that they have entered into a distribution agreement with Lifeboat Distribution, the international specialty software distributor for database management, application development, and other technically sophisticated products. Under the agreement, Commence Corporation’s desktop database management tools will be made available to Lifeboat’s worldwide network of solution providers. The Commence tools enable software development professionals to rapidly prototype, develop and deploy business applications in a fraction of the time and cost of alternative solutions.Commence products have won numerous industry awards and are well-regarded for their intuitive design, flexibility and scalable architecture. They have proven to enable independent or team-based developers to create business solutions for diverse markets such as healthcare, government, finance, legal, manufacturing and construction. Commence products are currently utilized by several thousand businesses in twenty-two countries around the world.“Although Commence is best known for their CRM applications, they have a powerful set of underlying development platform tools that previously have only been available through OEMs”, said Dan Jamieson, Vice President and General Manager Lifeboat Distribution. “We are pleased that these tools will now be generally available to our network of solution provider partners as they look to grow their businesses and meet their customers’ application needs.”Larry Caretsky, president of Commence Corporation, said that he was pleased that Lifeboat has agreed to represent the company’s products. “Partnering with Lifeboat brings a significant business opportunity to thousands of value added resellers, integrators and solution providers. The Commence application development toolkit will enable their reseller channel to deploy customized database applications for even the most challenging industry requirements”, he concluded.About Lifeboat DistributionLifeboat Distribution, a subsidiary of Wayside Technology Group, Inc. (NASDAQ: WSTG), is an international specialty software distributor for virtualization, security, application and network infrastructure, business continuity/disaster recovery, database infrastructure and management, application lifecycle management, science/engineering, and other technically sophisticated products. We help software publishers recruit and build multinational solution provider networks, power their networks, and drive incremental sales revenues that complement existing sales channels. Lifeboat Distribution services thousands of solution providers, VARs, systems integrators, corporate resellers, and consultants worldwide, helping them power a rich opportunity stream, expand their margin+ services revenues, and build profitable product and service businesses. About Commence CorporationCommence Corporation (www.commence.com) is a leading provider of desktop database management, customer relationship management and application development tools. The company’s products are designed to provide small to mid-size businesses with flexible solutions that leverage the web to provide an integrated platform for managing front office business operations. Commence supports thousands of users through a worldwide distribution network, with outlets in North and South America, Europe and Asia. Commence products have been sold under private label by IBM, AT&T and Compaq Computer.

Why Bother To Wipe Hard Disk Drives

When you delete a file from your hard disk, it may seem as if it is gone forever. In truth, however, this is not the case. The seemingly permanent process of file deletion actually leaves the file data still on the hard disk. When a file is deleted, it is simply marked 'deleted', and the space that it occupies on the disk is accordingly marked 'ready for use'. Hence, it may be overwritten when more disk space is required, but this is by no means certain, unless the entire hard disk is filled with data.Now, the actual data that make up the file is still on the hard disk, even after deletion. This makes it available for recovery, usually done using specially designed data recovery programs. MSDOS, in fact, has a built-in UNDELETE command which may recover recently deleted files.The reason why file deletion is not as thorough as it can be is a simple one; resource management. Actually overwriting every bit of every file that is to be deleted will use more resources than would be practical, for everyday use. And in fact, this simple file deletion is usually sufficient for the basic user's needs.However, security considerations might necessitate the complete erasure of a given hard disk or collection of hard disks. When reassigning hard disks, for instance, or switching computers around, confidential data might need to be deleted. To lessen the possibility that this data is recovered, a hard disk wipe may be performed.When a hard disk wipe is performed, the entire area of the hard disk is actually overwritten with random data. This means that the data that used to be on the hard disk becomes much harder (practically impossible) to recover after such a process. Almost no traces of the previous data that used to be on the disk is left, making a hard disk wipe a secure improvement upon ordinary file deletion.The metadata or information on the data that used to be on the hard disk is also wiped clean, since the entire space of the hard disk is overwritten. The randomness of this data used to overwrite depends on the algorithm used to generate it. Some hard disk wipe programs give users the choice to select the algorithm they want the program to use. However this is not as necessary for hard disk wipe programs as it is for file shredder programs, which wipe individual files. This is because when it is the entire hard disk that is wiped, the degree of randomness of the overwriting data is not anymore as important.Performing a hard disk wipe is often as easy as clicking a few buttons in a specially designed hard disk wipe program. Some programs are set to run automatically when a CD containing the program is placed into the computer containing the hard disk to be wiped. This makes it easier to perform batch wipes on many computers at once, and makes the hard disk wipe a feasible security solution for multiple hard disks.

Your Home Theater How-to Hookup

I love the movie theater experience. The large screen that sucks you into the story. The sound that literally shakes your seat and comes at you from all sides. The darkened room. As I get older though, budget, family and other responsibilities keep me from going to the theater as much as I would like. So how about the next best thing--bringing the theater going experience to you. I am talking about home theaters.Who wouldn't want a crystal clear picture, surround sound, all connected to give you a great home viewing experience? Of course, if you are like me both budget and lack of expertise can keep you from making the jump. I will attempt to lay out the basics for you here.Obviously, you need to start with a quality HDTV. HD stands for high definition. HDTV's give you a very high resolution image which give your picture great clarity. This is the central piece to your home theater system and can take up the majority of the price. HDTV's can range from several hundred dollars to several thousand dollars.When it comes to home theaters and TV's size does matter. You can get smaller HDTV's and the picture will be excellent but for a home theater you want to get something that is 32" or larger for the best experience. The picture quality on a larger TV may not be quite as good as the smaller sets, but the difference is minimal and it is worth the sacrifice in picture quality to get the larger set.After you choose what size TV is best for you, the quality of the image is your next concern. Resolutions range from 720p to 1080i to 1080p. The better the resolution the more the TV is going to run you. The easiest way to decide what resolution is satisfactory to both your eyes and your wallet is to go to the store and compare and contrast the different options you are considering.Once you have selected your TV, sound is your next issue. There are tons of options when it comes to sound. Many people, especially those with less technical knowledge, will choose a bundled system. Bundled systems tend to take up less room, have less wires to deal with, and are easier to install.However, other people may choose to customize their sound systems. If you choose to do this you have an almost infinite set of choices. The real issue is that it will take a lot of tweaking and trial and error to make sure all the components are working together. Do not skimp when it comes to speaker and cable quality. You may have a great sound system that will be worthless with cheap speakers or wires that dampen or dull the sound.For most people, a ready made system will be fine and will satisfy all your home theater needs. If you do decide to customize be sure to do your research well. Either way, enjoy that theater experience in the comfort of your own home!

Selasa, 04 Desember 2007

Watch Makers Discover Part Standardization

Like countless other consumer products, the way in which modern wrist watches are manufactured has undergone incredible changes since the Industrial Revolution that broke during the turn of twentieth century. This important period in world history ushered in entirely new ways to mass produce products for a growing world population.In every facet of manufacturing there were incredible technological advances that improved efficiencies and helped reduce production costs.Most of us have heard about the way Henry Ford changed the way automobiles were built by developing the production line assembly method. Cars would constantly roll off the Ford assembly line as workers would fit various parts to the chassis in a precise order and within a predetermined time.What few of us think about are the other changes that made this type manufacturing operation possible. Absolutely critical to the success of the mass production line was the development of standardized parts, components that are nearly identical to each other.Prior to the development of mass production assembly lines, most mechanical assemblies, including watches were built from components that were made individually most often by different producers. This meant that very often, parts from one machine be it a car, locomotive or sewing machine, could be not be used on another machine.A good example of the obvious draw backs to building machines individually can be seen in a tragic story from World War One. The French developed a machine gun, the Chauchat that was built one at a time by individual craftsmen. Though the plans for the gun called for the same dimensions, differing production methods and the whim of the builder resulted in each weapon literally being a one of a kind creation.For the troops in the field, this nonstandard way of manufacturing had tragic sometimes fatal results. French Army and U.S. Army troops that had been issued the gun quickly discovered that the parts were not interchangeable, meaning that the parts from one gun could not used on another.A second even more serious drawback was that the loading and firing mechanism in the guns would often jamb owing to the lack of integrated quality control methods. All in all, the Chauchat was a disaster for the troops that had rely in it during the brutality of trench warfare.A far less daunting problem was faced by those in the watch making and watch repair business. Like the Chauchat, the parts from one brand or even model of watch could not used to repair the same make and model. A major change in how watch parts were designed and manufactured came from the Bulova Watch Company.In the early nineteen twenties Bulova introduced the world’s first wrist watch designs that incorporated standardized parts manufactured to very close tolerances. The major benefit to this change in engineering and design strategy was that watch makers could use the parts from one Bulova watch to repair any other Bulova watch regardless of the model. Another additional benefit to watch repairers was the ability to keep spare parts on hand and as a result, the time needed to repair a Bulova watch was greatly reduced.As other watch producers adopted the practice of parts standardization and integrated quality control, the reliability of wrist watches was greatly increased. The use of standardized components meant that those parts that subject to wear did so in more consistent and predictable way, requiring far less maintenance and repair than those timepieces assembled as one of kind items.Sadly, as with most old line businesses that saw significant change and as watches became more trouble free, the once wide spread trade of watch repair has largely disappeared.

Sony Psp Slim: the Game Console

The new Play station Slim from Sony created a revolution in the field of gaming console. The model was launched by Sony on 2007 in competition to the Nintendo DS Lite, another gaming console brand. The new Sony PSP slim model with 189 grams is 33% lighter and 19% slimmer than the original PSP system. This model was launched in Europe on September 5 and in the U.S. on 6, 2007. The Sony PSP Slim got launched in Hong Kong on August 30, 07, while it arrived in the North America on September 5. The new Sony PSP Slim and Lite model gaming console offers several other tweaks and improvements from the older generation. To target the original PSP generation's poor load times for UMD games, the new model Slim has doubled its the internal memory to 64 MB to improve load times and accommodate for an improvement in the web browser's performance. The new model PSP slimmer from Sony comes with a battery that has a reduced capacity of about 1/3. With more efficient power usage, the runtime of the PSP is almost the same as its predecessor. Older model batteries will still work with the PSP Slim & Lite which extends the amount of playing time on the PSP Slim & Lite. The new Sony PSP Slim comes with a new enamel coated finish that can prevent scratches and smudges. The serial port is also modified as to accommodate a new video-out feature. This new model PSP Slim from Sony has a new UMD loading tray design that will make it more efficient in terms of size, while the Wi-Fi switch is now moved to the top of the console and the memory stick slot to the upper left. The new model has speakers repositioned on the front of the PSP near the top of the screen.

Kamis, 22 November 2007

Setting Up As A Cisco Network Engineer

The individual who works as a Cisco network engineer is one that has some of the most sought after training in the world of Internet technology. Cisco systems are widely used around the globe in the networking of devices and various computer systems. Because of this, individuals who have an inner knowledge of Cisco and can keep the system up and running are greatly in demand. Though many depend on their computers for a number of daily tasks, few have the skills or knowledge to understand the ins and outs of the systems they use. When that system needs maintenance or repair, most find it is necessary that a professional be used to deal with these issues. This can not only keep a system in tip-top shape but also prevent costly mistakes from being made. When one decides to become a Cisco network engineer, he or she will find there are a number of certifications and qualifications to achieve. For the most part, individuals will need a strong understanding of the basics. This often consists of an education that combines textbook learning with a hands-on environment. The curriculum for this type of training teaches an individual how to troubleshoot Cisco Systems from start to finish. Those who pursue this field should have an eye for detail. Learning the various aspects of what can go wrong during such things as installations, upgrades and configurations is what makes the Cisco engineer so important. Once an individual learns the essential basics, it is then that he or she can move on to other types of certifications. It is not uncommon for some Cisco engineers to carry a number of different certifications under their belt. This not only gives them more career options but also increases their earning potential. As with all computer-based vocations, Cisco engineers will find they must regularly update their skills. The world of technology simply moves at too fast a pace to assume that this is unnecessary. However, this means a Cisco network engineer can look forward to always being on the cutting edge of technology thanks to their career.Because it is such a highly popular aspect of Internet technology, finding institutions that offer training is hardly difficult. However, before making a final decision, prospective students should make sure the course is accredited and offers all the necessary skills. Students can expect to invest as little as a year to earn their Cisco Certified Networking Associate, or CCNA. Once an individual earns their CCNA, he or she can then move on to other certifications if so desired. As some Cisco Systems qualifications only last up to three years, individuals will be required to update their credentials in order to stay certified. While each certification will require a fee to update, the good news is most employers are willing to pick up the tab for their employees. For those individuals looking to take on this type of training, it is important that the program be fully accredited. This ensures that a certification will be considered legitimate upon completing the required coursework. Without legitimate certification, it will be next to impossible to find employment in this field.Becoming a Cisco network engineer promises to be one of the most stable IT careers a person can choose. Unlike other vocations that become outmoded with time, the use of computers guarantees there will always be a need for the services of a Cisco engineer. It is also one of the few professions that allow an individual to take their career as far as they see fit.

Sabtu, 10 November 2007

High School Musical Solus (ps2): Sing and Dance to All the Songs From High School Musical

The success run of modern technology can be seen everywhere – even gaming consoles are becoming trendier and hotter than ever. Leaving far those low resolution video games, modern gaming devices have come a long way in terms of display quality, additional features as well as portability. High School Musical Solus, the latest talk-of-the-town in the gaming platform is all set to make its grand debut this November 9th . Made for PS2 interface, the game will allow users to interact with the movie's (the game is made on the story and characters of the 2007 hit movie of the same name) characters for the first time. Players will now be able to immerse themselves in the world of the hit movie thus showing off their creativity and skills by mixing together their favorite characters, songs and scenes as they sing their way to stardom.The game comes with three play modes – Story, Party and QuickPlay. Popular characters like Troy, Gabriella, Sharpay, Ryan, Chad or Taylor will all come alive with the High School Musical Solus (PS2). In Story Mode, players live the movie through song and dance, performing High School Musical and High School Musical 2 songs, from "Start of Something New" to "We're All in this Together," solo or as a duet. In Party Mode, friends compete against each other. Players can also choose their favorite backdrop and belt out hit songs from other popular tunes sung by familiar Disney Channel stars. In Quickplay mode, players can jump into any song and pick from any characters, outfits, and environments they've unlocked. With the High School Musical Solus (PS2), players will be able to sing solo, in a duet or have a karaoke party with up to 7 friends. Players will also be able to sing through the entire soundtrack from the original and second movies and play as more than 10 main characters, unlocking rewards along the way. Featuring motion-captured-choreography from the original movie's dance routines, the game is sure to provide hours of fun for the entire family.

The King of Clubs (ps2)

Contrary to what the name suggest, The King of Clubs is not an action game marred with mortal combats and bloodshed. Rather, it’s a light hearted mini golf game with a few alterations and surprises thrown in. The setting is that of an amusement park in the Nevada desert. It features about 95 holes and various themed courses wherein each hole is more intricately designed than even in real life. The game allows you to play alone or with up to three other gamers. New courses and items to be used are opened once you taste success at one level. The loners have the option of choosing either the career mode or the tournament mode. In the tournament mode you get to compete against the CPU-controlled opponent who is also vying for the medals that you are playing for. The ‘party mode’ or the ‘grand prix’ caters to the multiplayer option. Three, six or nine unlocked holes are chosen randomly for the four players to compete on. This crazy game offers players with a lot of exciting courses to play on. Funky clubs and balls are provided to the players, whereas the mulligans (redos), music and action figures can be purchased. Features of The King of Clubs (PS2):
Five exciting themes-Prehistoric, Egyptian, Medieval, Futuristic and Tropical.
96 puzzling levels
Various game modes and a great choice of strokeplay for up to 4 players
The Pro Shop that lets you customise the patterns, colour and trail of your ball
The sounds made by the gamer’s clubs and balls can be personalised according to your choice
Cash bags, bonus letters, shot savers and mulligan tokens include the pick-up items to be collected on-course
Choose from a range of crazy putters and balls, including the power putter and the guide supreme.

Jumat, 28 September 2007

The Best iPhone Tips And Tricks

The iPhone is already assured to be one of the best-selling Apple products of all time, and its launch is being awaited by millions of consumers around the world. Even though the iPhone has not actually been released yet, there are a number of iPhone tips and tricks that will come in handy learning now.iPhone Tips and TricksWhen it comes to iPhone tips and tricks, one of the best involves how you can make the low ringer on the iPhone louder. This is important because in fact one of the most common complaints about the iPhone is that it has such a low ringer volume. If you are one of the many people who finds this to be a problem, then at least there are iPhone tips and tricks you can use to do something about it.You can easily resolve this issue by using a custom ringtone rather than those already available on the device, and make sure that the ringtone you choose is a loud, high frequency audio.Another great tip involves how you can watch Google videos over your iPhone, and the process required here is incredibly easy as well. Since the iPhone's Safari browser did not support Flash, the Apple Company therefore had to come up with a new application for the device which would allow streaming video to play on it, and yet it does not work on Apple's new application.You can however find various YouTube videos that give you step by step guides of the trick that is required to watch Google videos right from your iPhone.Another of the best iPhone tips and tricks involves streaming audio from your iPhone to your Bluetooth headset. This is another important issue because many people were very disappointed when they learned that Bluetooth's A2DP profile was not included in the iPhone feature list. In order to use Bluetooth, the device must be compatible with certain Bluetooth profiles.To achieve this you will need to pair a Bluetooth headset with your iPhone, switch on the headset so that it can perform the handshake with the iPhone, and once you have done this you will need to go into the Visual Voicemail screen and tap the Audio button in the upper right hand corner. You will then receive an audio selection dialog, from which you select the Headset option, and then you switch over to the iPod and begin playing your music or video.There are many other really great iPhone tips and tricks that you can use as well, all of which are really great because they allow you to get even more out of your iPhone device. http://www.the-iphone.biz

All About Ringback Tones

Ringback tones offer you a cool way to entertain your callers while they wait for you to answer their call. No more listening to that boring old 'ring ring' sound. Instead you can choose to amuse your friends with the latest pop, rock, jazz or country music while they are on hold.The idea of ringback tones has caught on in a big way and cell phone owners go out of their way to create unique tones to entertain their friends with. They are fun and are easy to download and manage. They can be personalized and set so that any one friend or group of friends can hear one specific song that you've chosen to play when they call. You can set another tune for another group of friends.Setting your specific ringback tone is easy to do too. All you need to do is go to your ringback tones website, then click on the Settings tab and assign your selected tones to your specific caller or callers. Some providers offer you up to 25 Caller ID assignments.Tones you can choose from do not include just music. Cell phone users can choose from a wide selection of songs by original artists or even holiday tunes or amusing comedy clips. You could even set your phone to play different ringback tones at different times of the day. Called 'time of day functionality' this feature allows you to choose a specific tone to be played during a certain set time period only. At other times the default ringback tone will automatically be played.In order to have access to ringback tones you need to register with an online provider and can choose any ringback tone you want upon paying a small fee. They can be copied, created, shared and edited but they cannot be customized. This is because they are stored by the carrier. What you can customize however, is how you use the various ringback tones that are available to you.

Minggu, 16 September 2007

Membuat Film Dokumenter dengan Windows Movie Maker – Windows Vista

Aplikasi Windows DVD movie maker, dalam Windows Vista, berfungsi untuk membuat film dokumenter dari video dan gambar yang kita miliki. Berikut langkah-langkahnya:
Salah satu kelebihan Windows Vista dalam urusan multimedia karena ada salah satu aplikasi yang menyertakan Windows DVD movie maker. Aplikasi ini berfungsi untuk membuat film dokumenter dari video dan gambar yang kita miliki. Berikut langkah-langkahnya:
Buka program Windows Video Maker dan persiapkan foto/video yang akan dimuat. Klik add item untuk memasukkan foto/video yang Anda miliki.
Setelah proses masukan gambar selesai, klik tombol next. Di layar akan tampil ready to burn disc ke dalam format DVD. Sebelum menyetujuinya, periksa kembali materi foto/video dengan mengklik preview. Lalu play untuk tampilan secara keseluruhan.
Setelah itu, Anda dapat mendesain style dari video yang akan dibuat di sebelah kanan program.
Perkaya tampilan dengan memberi keterangan. Klik tombol menu text. Atur jenis dan ukuran huruf sesuai minat.
Pada menu yang sama, Anda bisa mengubah disc title, play button, scane button dan nore button dengan cara mengetiknya pada masing-masing kotak.
Jika sudah merasa cukup, klik oke.
Cara yang hampir sama bisa dilakukan untuk mengubah background lewat browse di sebelah kanan kotak teks foreground video. Pilihlah dengan mengklik ganda, maka akan keluar tombol add.
Untuk menuangkan lagu guna menghidupkan tampilan gambar, manfaatkan fitur menu audio. Tekan tombol browse yang terletak di sebelah kanan kotak teks dari menu audio.
Pilih lagu yang diinginkan lalu klik add.
Tentukan ubahan slide show dengan mengklik tombol slide show di sebelah kanan customize menu.
Pilih slide show setting kemudian change slide show.
Jika sudah selesai, klik burn untuk menyimpan hasil kreativitas anda. (sumber: Genie)

Jangkauan Bluetooth Lampaui 1 km

from detikinet.com:Jangkauan menerima sinyal dari perangkat Bluetooth biasanya hanya berjarak beberapa meter, atau paling jauh mungkin sampai 100 meter. Namun, kini ada Bluetooth yang mampu menjangkau dari jarak 1000 meter alias 1 kilometer (km).Cellular News yang dikutip detikINET, Kamis (12/7/2007) melansir, modul Bluetooth wireless ini dibuat oleh EZURIO dan berukuran sebesar kartu pos serta dilengkapi antena.Pihak perusahaan mengatakan, alasan dibuatnya Bluetooth BISM II PA -- nama alat tersebut -- adalah untuk mengubah persepsi bahwa penggunaan Bluetooth hanya untuk jarak pendek. "Sudah terlalu lama kekecewaan dan banyak komentar terhadap Bluetooth yang hanya disebut teknologi berjarak pendek," ujar Nick Hunn, chief technology officer EZURIO.Meski demikian, Chief Executive Officer EZURIO Chris Shannon mengatakan, meski jangkauan 1 km akan memanjakan konsumen dalam memenuhi kebutuhan transfer data, namun mereka tidak bisa mengharapkan koneksi serupa jika menggunakan alat ini di dalam gedung."Banyak pengunaan Bluetooth di dalam gedung ataupun area yang konstrain dimana lingkungannya selalu berubah, akan mengakibatkan pantulan sinyal radio," ujarnya.Sayangnya, belum ada keterangan lebih lanjut mengenai berapa kecepatan transfer data yang dihasilkan dan harga yang dibanderol Bluetooth ini.

Sabtu, 15 September 2007

Apakah Access Point ?

Access point atau yang lebih sering disebut dengan istilah AP merupakan sebuah perangkat penghubung antara jaringan wire dengan wireless. Maksudnya sebuah AP akan bertugas mengubah data yang lalu lalang di media kabel menjadi sinyal-sinyal radio yang dapat ditangkap oleh perangkat wireless. AP akan menjadi gerbang bagi jaringan wireless untuk dapat berkomunikasi dengan dunia luar maupun dengan antarsesama perangkat wireless di dalamnya.
Biasanya pada perangkat AP terdapat satu atau lebih interface untuk media kabel. Apakah port ethernet, port ADSL, Cable, line telepon biasa, dan banyak lagi. Interface media kabel tadi akan dibridging oleh AP tersebut ke dalam bentuk sinyal-sinyal radio, sehingga perangkat wireless dengan kabel tadi dapat terkoneksi. AP biasanya memiliki sistem antena untuk mentransmisikan sinyal-sinyalnya. Sistem antenanya pun bermacam-macam.
Penggunaan AP yang banyak tentu akan meningkatkan kapasitas pengguna dan juga jarak coverage jaringan wireless Anda. Selain itu, Anda juga dapat menciptakan sebuah sistem roaming WLAN. Maksudnya para pengguna dapat bergerak ke sana-ke mari dengan bebas tanpa terputus koneksinya karena sinyal-sinyal komunikasinya dapat dilayani oleh beberapa AP yang berbeda. Sistem yang sama juga digunakan dalam jaringan telepon selular.

Serba-serbi Wireless

Komunikasi wireless memang tidak tampak mata, namun nyatanya Anda dapat berkomunikasi dengan lawan Anda melalui media ini. Kenalilah istilah dan terminologi di dalamnya untuk dapat lebih memahami penggunaannya.Komunikasi data membutuhkan sebuah media penghantar agar informasi yang ingin disampaikan dapat berjalan ke tujuannya dengan baik. Media komunikasi data bisa berwujud apa saja, selama media tersebut dapat menghantarkan informasi dengan baik tanpa ada cacat-cacat yang berarti. Selama bertahuntahun hingga saat ini pun, media komunikasi data didominasi oleh media komunikasi kabel. Namun, kini arah trennya sudah mulai bergerak menuju ke jenis media lain yang tidak kalah hebat dan menariknya. Media yang sedang naik daun tersebut adalah media wireless LAN atau yang biasa disingkat WLAN. Media jenis ini bukanlah media baru dalam dunia komunikasi data, namun perkembangannya yang terus-menerus menuju ke arah yang lebih baik membuatnya semakin disukai oleh masyarakat. Dengan semakin berkembangnya kualitas media ini menghantarkan data, jarak jangkauannya yang semakin jauh, kekebalannya yang semakin tinggi dalam menangani interferensi, dan banyak lagi perkembangan lainnya, membuat pengguna media ini semakin meningkat dari hari-ke hari. Tidak bisa dipungkiri, media ini mungkin akan menguasai dunia komunikasi data beberapa tahun mendatang. Khususnya komunikasi data dalam jaringan lokal (LAN).
Karena semakin meluasnya penggunaan media ini, maka ada baiknya bagi Anda untuk mengenal lebih jauh apa sih sebenarnya teknologi wireless LAN ini. Mungkin WLAN sudah bukan merupakan barang baru lagi, namun seluk-beluknya perlu Anda pahami benar-benar jika ingin menggunakannya dengan nyaman. Apalagi jika Anda ingin menggunakannya dalam skala besar, tidak ada salahnya untuk mengetahui lebih banyak lagi apa sih sebenarnya WLAN itu, apa yang ada di dalamnya, dan banyak lagi.

Selasa, 11 September 2007

Steganografi

Steganografi merupakan seni untuk menyembunyikan pesan di dalam pesan lainnya sedemikian rupa sehingga orang lain tidak menyadari ada sesuatu di dalam pesan tersebut. Kata steganografi (steganography) berasal dari bahasa Yunani steganos, yang artinya 'tersembunyi/terselubung', dan graphein, 'menulis' sehingga kurang lebih artinya "menulis (tulisan) terselubung". Teknik ini meliputi banyak sekali metoda komunikasi untuk menyembunyikan pesan rahasia. Metoda ini termasuk tinta yang tidak tampak, microdots, pengaturan kata, tanda tangan digital, jalur tersembunyi dan komunikasi spektrum lebar. Walaupun steganografi dapat dikatakan mempunyai hubungan yang erat dengan kriptografi, tapi metoda ini sangat berbeda dengan kriptografi. Kriptografi mengacak pesan sehingga tidak dimengerti, sedangkan steganografi menyembunyikan pesan sehingga tidak terlihat. Pesan dalam cipherteks mungkin akan menimbulkan kecurigaan sedangkan pesan yang dibuat dengan steganografi tidak akan. Kedua teknik ini dapat digabungkan untuk mendapatkan metoda pengiriman rahasia yang sulit dilacak. Pertama pesan dienkrip, kemudian cipherteks disembunyikan dengan cara steganografi pada media yang tampak tidak mencurigakan. Cara ini sangat berguna jika digunakan pada cara steganografi komputer karena banyak format file digital yang dapat dijadikan media untuk menyembunyikan pesan. Format yang biasa digunakan diantaranya:
Format image: bitmap (bmp), gif, pcx, jpeg, dll.
Format audio: wav, voc, mp3, dll.
Format lain: teks file, html, pdf, dll.
Metoda yang digunakan untuk menyembunyikan pesan pada media digital tersebut berbeda-beda. Contohnya pada file image pesan dapat disembunyikan dengan menggunakan cara menyisipkanya pada bit rendah (lsb) pada data pixel yang menyusun file tersebut. Seperti kita ketahui untuk file bitmap 24 bit maka setiap pixel (titik) pada gambar tersebut terdiri dari susunan tiga warna merah, hijau dan biru (RGB) yang masing-masing disusun oleh bilangan 8 bit (byte) dari 0 sampai 255 atau dengan format biner 00000000 sampai 11111111. Dengan demikian pada setiap pixel file bitmap 24 bit kita dapat menyisipkan 3 bit data. Contohnya huruf A dapat kita sisipkan dalam 3 pixel, misalnya data raster original adalah sebagai berikut:(00100111 11101001 11001000)(00100111 11001000 11101001)(11001000 00100111 11101001)Sedangkan representasi biner huruf A adalah 10000011. Dengan menyisipkan-nya pada data pixel diatas maka akan dihasilkan:(00100111 11101000 11001000)(00100110 11001000 11101000)(11001001 00100111 11101001)Terlihat hanya empat bit rendah yang berubah, untuk mata manusia maka tidak akan tampak perubahannya. Secara rata-rata dengan metoda ini hanya setengah dari data bit rendah yang berubah, sehingga bila dibutuhkan dapat digunakan bit rendah kedua bahkan ketiga.
sumber: www.bimacipta.com

Minggu, 09 September 2007

how to place javascript in friendster profile

placing javascript in friendster profile

just copy paste this code below and replace url script nya ditaroh with your url

<script type="text/javascript" src="url script nya ditaroh"></script>

hope this can be inspiring

Selasa, 28 Agustus 2007

Apa Itu Wireless LAN (WLAN) ?

Mungkin bagi sebagian orang istilah ini sudah tidak asing lagi bahkan sudah terkesan basi. Namun, tidak sedikit pula yang lupa atau bahkan belum tahu apa itu WLAN. Sebenarnya WLAN adalah sebuah jaringan lokal (LAN) yang terbentuk dengan menggunakan media perantara sinyal radio frekuensi tinggi, bukan dengan menggunakan kabel. Wireless LAN ini memiliki tingkat fleksibilitas yang lebih tinggi daripada media kabel. Maka dari itu, WLAN sering digunakan sebagai ekstensi dari komunikasi melalui media kabel atau sebagai media alternatif bagi komunikasi melalui kabel.

ngirim email tanpa email

artikel ini akan ngasi informasi sedikit tentang bagaimana mengirim email dengan nama email terserah kita, jadi kita bisa ngerjain temen kita pake email ini.
misalnya kamu ngirim email pake nama iblis@neraka.com atau apa aja sesuai kreasi kamu..
gimana caranya ...
caranya gampang ga perlu daftar atau registrasi segala .. yang perlu kamu lakukan adalah mencari kata kunci 'xccdonts.asp' lewat mr. google dan kamu akan dikasih alamar web yang nyediain aplikasi nya pokoknya yang belakang urlnya ada kata 'xccdonts.asp' nih salah satu contoh nya klik di sini
di situ kamu tinggal isi nama email kamu dengan nama terserah kamu, misalnya admin@yahoo.com , m3@m3-access.com , pokoknya yang asik buat ngerjain temen kamu deeh ...
catatan : aplikasi ini cuma bisa buat ngirim dan ga bisa nerima email jadi klo temen kamu ngereply email kamu yah pasti ga bakal nyampe...
met mencoba ... klo ada info baru kasih tau ya

Akses voicemail lewat no telepon lain

Ini sebenarnya merupakan fitur/layanan yang ada pada voicemail agar kita bisa mengakses kotak suara dari no.telepon yang berbeda. Biasa dimanfaatkan jika kita tidak bersama pesawat telepon tersebut atau kita sedang kehabisan pulsa untuk menelpon kotak suara secara langsung. Beberapa operator telepon mematikan fungsi ini.Untuk bisa mengakses voicemail dari no telepon yang berbeda, bisa dengan cara sebagai berikut:
Hubungi no ponsel/telepon milik anda dengan voicemail yang aktif hingga anda mendapatkan ucapan 'selamat datang' dari dalam voicemail.
Ketika kalimat ini berlangsung segeralah tekan '#' maka akan ada suara yang meminta password untuk login (fitur ini bergantung pada operator telepon tersebut). Jika anda tidak menekannya, anda dipersilahkan untuk meninggalkan pesan.
Masukan password anda kemudian tekan '#'
Anda akan dipersilahkan memasuki kotak suara telepon tersebut.

Senin, 27 Agustus 2007

Ngakalin Aktivasi Norton antivirus biar bisa abadi.......

Oh iya kalo kita nginstall Norton Antivirus edisi taun berapapun biasanya tuhh antivisrus aktifnya cuman 1 taun doang, kalo udah lebih dari satu tahun norton antivirus, biasanya minta aktivasi lagi lagi untuk memperpanjang lisensi pemakaiannya, nah "celakanya" aktivasinya harus konek langsung ke internet ke servernya symantec & harus mbayar lagi, dan ini udah nggak bisa diakalin lagi. Ini adalah caranya norton Antivirus yang sangat efektif untuk mengatasi pembajakan. Kalaupun kita menguninstall Norton Antivirus trus kita Install ulang Norton Antivirus, Hasilnya sama saja, masa berlakunya tetep aja udah abis dan nggak bisa nambahin waktu aktivasinya walaupun di Install ulang. Biasanya satu-satunya cara yang dilakukan adalah sekalian menginstall ulang windows & memformat ulang hardisk, biar Norton Antivrusnya bisa jalan lagi.
Solusinya
Cara yang paling efektif untuk mengatasi masalah tsb adalah: nah waktu pertama kita ngistall norton antivirus, kita ubah tanggalan komputer kita, caranya tinggal klik task bar sebelah kiri bawah, kita tinggal pilih mau aktif berapa taun. Kalo mau aktif sampe selamanya sekalian aja tanggalan taunnya diganti jadi taun 2100 selama instalasi. Nah setelah selesai Instalasi, kembalikan tahun tanggalan anda ke tahun tanggalan semula (tahun 2006) nah dengan begitu Aktivasi Norton Antivirus Anda berlaku sampai tahun 2101, mungkin saat aktivasi norton antivirus anda sudah habis anda sendiri sudah Almarhum........ hehehehehehehehehe.............
Selamat mencoba,... semoga berhasil...

Minggu, 26 Agustus 2007

Blog-WebBlog-Blogger

Artikel ini akan mengulas apa itu Blog / Weblog dari berbagai sudut. Semoga penjelasan singkat berikut dapat menambah pengetahuan Anda mengenai jenis homepage yang lagi nge-trend saat ini.
Apa tuh Blog?
Blog adalah kependekan dari Weblog, istilah yang pertama kali digunakan oleh Jorn Barger pada bulan Desember 1997. Jorn Barger menggunakan istilah Weblog untuk menyebut kelompok website pribadi yang selalu diupdate secara kontinyu dan berisi link-link ke website lain yang mereka anggap menarik disertai dengan komentar-komentar mereka sendiri.
Blog kemudian berkembang menjadi dimensi baru untuk mengikuti kemauan para pembuat Blog atau para Blogger. Blog yang pada mulanya merupakan “catatan perjalanan” seseorang di Internet, yaitu link ke website yang dikunjungi dan dianggap menarik, kemudian menjadi jauh lebih menarik daripada sebuah daftar link. Hal ini disebabkan karena para Blogger biasanya juga tidak lupa menyematkan komentar-komentar “kreatif” mereka, pendapat-pendapat pribadi dan bahkan mengekspresikan atau mengungkapkan isi hati mereka pada link yang mereka buat.

Cookies ....

Sewaktu mengakses Internet. Kita akan berhubungan dengan yang namanya cookies. Apa itu cookies dan bagaimana mengatasinya sehingga tidak mengganggu privasi kita di site site Internet yang kita kunjungi.
Cookies yaitu data file yang ditulis ke dalan komputer kita oleh Web Server untuk meng-identifikasikan diri kita pada site tersebut sehingga sewaktu kita kembali mengunjugi site tersebut, site itu sudah mengenali komputer kita. Jadi bisa dikatakan bahwa cookies itu semacam ID card kita untuk di site tersebut yang kita kunjungi. Dan tiap tiap Web site pada umumnya mengeluarkan/membuat cookies itu masing-masing. Ada web yang menyapa kita tiap kali kita mengunjungi site tersebut selayaknya teman lama, itu berkat cookies.
Jadi bisa disimpulkan cookies itu fungsinya yaitu:
Cookies membantu Web site untuk "mengingat" siapa kita dan meng-set preferences sesuai untuk kita sehingga apabila kita kembali mengunjungi web site tersebut akan langsung dikenali.Menghilangkan kebutuhan untuk me-register ulang di web site tersebut yang memerlukan kita untuk me-register supaya bisa mengakses web site tersebut (site tertentu saja), cookies membantu meng-log-in kita ke dalam web server tersebut. Memungkinkan Web site untuk meng-track pola Web surfing kita dan site site favorit yang suka kita kunjungi. Meskipun sekilas kita melihat cookies itu seakan banyak gunanya, akan tetapi sampai sekarang masih menjadi bahan perdebatan mengenai keberadaaan cookies ini, Mengapa ? Karena selain membuat sebuah web site terlihat user friendly, tetapi juga menghadirkan isu melanggar privasi pengakses Web.
Saat kita mengunjungi site yang ada cookiesnya, server akan mencari informasi yang dibuat sebelumnya dan browser membaca informasi di cookies dan menampilkannya. Cookies di simpan di salah satu directory di dalam harddisk kita, salah satu cara cepat untuk mencari tahu di mana cookies disimpan yaitu dengan search/find 'cookies'. Sebagai contoh misalnya sebagai contoh saya menggunakan windows 2000 versi profesional di dalam notebook saya dengan browser Internet Explorer dan login ke network dengan account iceberg. Maka cookies itu akan disimpan di direktori (profiles) yaitu C:\Documents and settings\iceberg\cookies. Atau di windows 95/98 disimpan di direktori C:\Windows\cookies. Atau jika menggunakan Netscape, maka file cookies akan disimpan di cookies.txt.
Cookies dapat dibedakan menjadi 2 jenis yaitu session cookies dan persistent cookies. Session cookies akan hilang sewaktu kita menutup browser kita dan biasanya digunakan oleh 'shopping carts' di toko belanja online untuk meng-track item item yang kita ingin beli. Persistent cookies di-set oleh site site portal, banner/media iklan site dan lainnya yang ingin tahu ketika kita kembali ke site mereka. File file ini tersimpan di hardisk kita.
Kedua tipe cookies ini menyimpan informasi mengenai URL atau domain name dari site yang kita kunjungi dan beberapa kode yang mengindikasikan halaman apa saja yang sudah kita kunjungi. Cookies bisa berisi informasi pribadi kita, seperti nama dan alamat email, Akan tetapi itu jika kita memberikan informasi tersebut ke web site tersebut misalnya melalui proses registrasi. Dengan kata lain, cookies tidak akan bisa "mencuri" nama dan alamat email kita tanpa kita yang memberinya. Tetapi ada kode tertentu (malicious code) yang dibuat misalnya dengan Active X control, bisa mengambil informasi dari PC kita tanpa sepengetahuan kita. Mungkin ada yang pernah masuk ke site tertentu yang apabila kita mengklik icon tertentu akan membuat PC kita "hang" ? Karena sewaktu kita mengklik icon tersebut, itu akan mengeksekusi kode yang sudah dibuat. (saya lupa kalau ngak salah salah satu bug dari IE). Any info ?
Cookies umumnya kurang dari 100 bytes sehinggan tidak akan mempengaruhi kecepatan browsing kita. tetapi karena umumnya browser di-set default untuk menerima cookies (baca: roti :-) ) kita tidak akan tahu bahwa cookies sudah ada di komputer kita. Bagi user seperti kita, cookies bisa berguna terutama di sites yang memerlukan registrasi, sehingga setiap kali kita mengunjungi site tersebut, cookies akan me-login-kan kita tanpa kita harus memasukkan user name dan password lagi.
Untuk keperluan bisnis, seperti site amazon.com, menggunakan cookies untuk membantu menghubungkan ke data pembelian kita yang terdahulu yaitu ke database mereka yang berisi unique ID dan historikal pembelian kita. Sehingga site site seperti ini mampu me-recommend kepada kita buku yang sesuai dengan selera kita. Bukankah ini hal yang menarik ?? sehingga user/pembeli akan dengan senang untuk kembali ke site site seperti ini. Site site lain juga menggunakan cookies untuk mengecek berapa orang yang mengakses site mereka setiap harinya. Sehingga angka yang dihasillkan oleh cookies tersebut menunjukkan seberapa sibuknya site mereka.
Bagaimana cara supaya kita bisa mengatasi dan memblok cookies ini ? Di masing-masing browser baik netscape maupun IE bisa di-set untuk enable maupun disable cookies. Sebagai contoh misalnya kita menggunakan IE, maka bisa di set di bagian Internet Options, di bagian security.

Sabtu, 25 Agustus 2007

Lindungi Data Penting Anda !

Beragam alasan yang bisa dikemukakan mengapa melindungi data menjadi satu hal yang sangat penting, diantaranya adalah :
Melindungi supaya tidak ada orang lain yang bisa membuka file data Anda.
Melindungi data atau dokumen supaya orang lain hanya bisa melihat isi dokumen Anda, tidak bisa menambah atau pun memodifikasi data.
Melindungi file executable (file *.exe) dari serangan virus.
Mencegah orang lain menjalankan file executable. Dalam aplikasinya Anda bisa mencegah orang lain menjalankan game yang ada di komputer Anda atau mencegah orang lain menjalankan program yang cukup riskan untuk dijalankan oleh sembarang orang.
Mencegah orang lain membuat file atau folder baru pada folder yang telah Anda tentukan.
Menyembunyikan data Anda sehingga orang lain tidak dapat melihatnya walaupun setting pada Folder Options - View berada pada Show All Files.
Maka beruntunglah — dalam hal keamanan data — orang yang menggunakan sistem operasi Linux, Windows NT dan Windows 2000 karena ketiga sistem operasi tersebut mempunyai tingkat keamanan yang cukup tinggi. Bagaimana halnya dengan sistem operasi seperti Windows 95, 98 dan Windows ME ?
Tidak dapat dipungkiri sebagian besar pemakai perseorangan mengandalkan Win 9x dan ME untuk sistem operasinya. Mungkin termasuk Anda. Lalu bagaimanakah cara melindungi data penting Anda tanpa harus mengganti sistem operasi ?
Cara yang paling mudah adalah dengan menggunakan program proteksi yang banyak beredar di internet. Salah satunya adalah File Protector. Ada beberapa macam proteksi yang ditawarkan oleh software berukuran sekitar 80 Kb ini, yaitu :
Read Only : Mencegah terjadinya overwrite, modifikasi, append (penambahan data), mencegah rename (disable rename), dan mencegah penghapusan (disable delete) pada file atau directory yang diproteksi.
No Access :Sama dengan feature Read Only dengan beberapa tambahan untuk mencegah data Anda dibuka (disable open), dibaca (disable read), dan dieksekusi/dijalankan (disable execute).
Hidden :Memungkinkan Anda untuk menyembunyikan file atau directory.
Protect from virus : Mencegah dari serangan virus
Dengan interface yang sederhana, Anda dapat melakukan berbagai setting pada File Protector dengan sangat mudah bahkan untuk seorang pemula sekalipun.
Jika Anda tertarik menggunakannya silakan download programnya di http://mikkoaj.hypermart.net/. Setelah itu ekstrak file yang masih berbentuk ZIP tersebut ke sembarang folder. Untuk memulai proses install jalankan file install.exe. Setelah proses install selesai maka reboot komputer Anda.

VoIP

Voice over Internet Protocol (disebut juga VoIP, IP Telephony, Internet Telephony, dan Digital Phone) adalah technology yang memungkinkan percakapan jarak jauh (suara) melalui internet / Internet Protocol.
Data Suara diubah menjadi kode digital dan dialirkan melalui jaringan yang mengirimkan paket2 data dan bukan lewat sirkuit telepon biasa.
VoIP sederhananya adalah suara orang yang dilewatkan ke paket IP.
Orang berbicara ditangkap oleh Microphone. Microphone mengubah getaran suara menjadi listrik.
Amplitudo tegangan listrik berubah-ubah ini merupakan informasi suara yang dikirimkan ke sentral telepon (telkom). Sentral telepon di sini membentuk jaringan.
Lawan bicara menangkap sinyal listrik ini dengan menggunakan bantuan speaker yang mengubah kembali tegangan listrik menjadi suara.
Gambar 1 pemakaian VoIP
.:: Jaringan Internet untuk Jaringan VoIP ::.
Jaringan peling sederhana dari VoIP adalah 2 buah komputer yang terhubung ke Internet.
Dengan software tertentu kedua pemakai komputer bisa saling terhubung satu sama lain. Bentuk hubungan tersebut bisa dalam bentuk pertukaran file, suara, gambar.
Penekanan utama untuk VoIP adalah komunikasi atau hubungan dalam bentuk suara.
Gambar 2 Penggunaan Jaringan VoIP
.:: Perangakat untuk Implementasi VoIP ::.
Untuk melewatkan suara melalui jaringan internet (IP), memerlukan gateway. Gateway dapat berbentuk card yang diinstal ke PC, atau berbentuk smart terminal (tidak memerlukan PC).
Gateway berfungsi mengubah sinyal suara (analog) ke paket IP, dan sebaliknya.
Metode komunikasinya juga sangat beragam bisa phone to phone, phone to computer, computer to phone, cellular to phone, cellular to computer, dsb sesuai dengan kebutuhan.
.:: Protokol penunjang Jaringan VoIP ::.
TCP/IP (Transfer Control Procotcol / Internet Protocol) merupakan sebuah protokol yang digunakan pada jaringan internet.
Gambar 3 mekanisme protokol TCP/IP
Application Layer - -
Lapisan ini digunakan untuk pemindahan file. Perpindahan file dari sebuah sistem ke sistem lain yang berbeda memerlukan sistem pengendalian untuk mengatasi adanya ketidak kompatibelan sistem file yang berbeda2. protocol ini berhubungan dengan aplikasi.
Contoh aplikasi yang telah dikenal misalnya HTTP (Hypertext Transfer Protocol) untuk web, FTP (File Transfer Protocol) untuk perpindahan file, dan TELNET untuk terminal maya jarak jauh.
TCP (Transmission Contorl Protocol) - -
TCP digunakan untuk menjamin setup suatu call pada sesi signaling. TCP akan mengirim dan menerima informasi dengan panjang data bervariasi pada suatu datagram internet.
TCP menjamin realibilitas hubungan komunikasi karena melakukan perbaikan terhadap data yang rusak, hilang atau salah kirim.
TCP tidak digunakan dalam pengiriman data suara pada VoIP
UDP (User Datagram Protocol) - -
UDP digunakan untuk mengirimkan audio stream yang dikirimkan secara terus-menerus.
IP (Internet Protocol) - -
Sebuah komputer diidentifikasikan dengan alamat IP. Tipa2 komputer memiliki alamat IP unik yang masing-masing berbeda satu dengan yang lainnya. Hal ini dilakukan unuk mencegah kesalahan transfer data.
.:: Keuntungan VoIP ::.
Biaya lebih rendah untuk sambungan langsung jarak jauh
Memanfaatkan infrastruktur jaringan data yang sudah ada untuk suara.
Penggunaan bandwith yang lebih kecil dari pada telephone biasa.
Memungkinkan digabung dengan jaringan telepon lokal yang ada.
Berbagai bentuk jaringan VoIP bisa digabungkan menjadi jaringan yang besar.
Variasi penggunaan peralatan yang ada misal dari PC disambung ke telepon biasa, IP Phone Handset.
.:: Kelemahan dari VoIP
Kualitas suara tidak sejernih telepon ISDN (telepon rumah)
Ada jeda dalam berkomunikasi (perubahan data menjadi suara, jeda jaringan)
Tidak pernah ada jaminan kualitas jika VoIP melewati Internet
Peralatan relatif Mahal
Berpotensi menyebabkan jaringan data yang ada menjadi penuh jika tidak diatur dengan baik
Penggabungan jaringan tanpa dikoordinasi dengan baik akan menimbulkan kekacauan dalam sitem penomoran.

Kamis, 23 Agustus 2007

Replacing Your Motherboard CMOS Battery

Computers contains a battery to keep time when the computer is off, much like a watch or some alarm clocks. Just like a watch, the battery needs to be replaced when it runs low on power. You can purchase these batteries in most department or PC specialty shops. For most of us, the computer becomes obsolete long before we need to change the battery, but new technology allows us to keep our systems longer and longer by swapping out components.

How and Where to begin when changing the CMOS battery:

CMOS is an abbreviation for Complementary Metal Oxide Semiconductor. You may need to change your CMOS battery if your computer clock isn't accurate when you boot. However, if your pc loses time as the computer runs, that's another problem.

It is important to get into the BIOS settings and write down any special settings. If you remove and replace the battery quick enough, you might not lose your settings, but it's best to write everything down.

Remove the side panel so you have access to the motherboard. You should have the pc unplugged and be wearing an antistatic wrist strap to avoid damaging your boards.

  1. Jot down notes if you cannot access the battery directly and need to remove cables. Note the connection and orientation of each cable. Do not unplug anything from the board unless absolutely necessary.

  2. The battery is often only held in place by a couple of thin clamps that can be gently slid aside or raised enough to get the battery out. DO NOT BREAK THE CLAMPS.

  3. Once the replacement is in, replace any cables, close the case and boot the computer. Go back into the BIOS and restore any settings, if necessary.

Discharge the CMOS

It is sometimes necessary to discharge the CMOS. This is done by a set of jumpers on the motherboard, often near the CMOS battery. The small plastic clip is normally on pins 1 and 2. To discharge the CMOS memory, make sure the power is off and move the jumper to pins 2 and 3. You can return the jumper to pins 1-2 after only a few seconds. Now the CMOS memory has been cleared.

Device Manager Error Codes

The Device Manager in Windows XP is often the first place to look when you are having a problem with Microsoft Windows--particularly a piece of hardware that is malfunctioning. The Device manager lists the components in order, and will sometimes have a red "X" over the device, or an exclamation point beside its icon. This indicates there is a problem with the device, and if you double click the icon, you may find that there is an error code associated with the error.

Error Codes and Explanation

Code 1

Problem: This device is not configured correctly. (Code 1)
Resolution: This error could mean the device has no drivers installed or is incorrectly configured. Try updating the drive by clicking Update Driver. This starts the Hardware Update wizard. If updating the driver doesn't work, see your hardware documentation for more info.


Code 10

Problem: This device cannot start. (Code 10)
Resolution: First, try updating the driver for this device. If that doesn't work, on the General Properties tab of the device, click Troubleshoot to start the Troubleshooting Wizard.


Code 19

Problem: A registry problem was detected (Code 19)
Resolution: Navigate to the General Properties tab of this device, then click Troubleshoot to start the Troubleshooting Wizard. Click Uninstall, and then click Scan for hardware changes to load a usable driver. Restart the computer in Safe Mode, and then select Last Known Good Configuration. This rolls back to the most recent successful registry configuration.


Code 22

Problem: This device is disabled. (Code 22)
Resolution: The device is disabled because a user disabled it by using Device Manager. Click Enable Device. This starts the Enable Device wizard.


Code 39

Problem: Windows cannot load the device driver for this hardware. The driver may be corrupted or missing. (Code 39)
Resolution: The driver may be corrupt. You should uninstall the current driver, then click scan for hardware changes. To reinstall the driver.


Error Code Summary

Some typical resolutions for Microsoft Windows error codes:

  • Uninstall the driver for the device.
  • Reinstall the driver.
  • Try Rebooting.
  • Swap out the hardware with a known good device.
  • Roll back the driver.
  • If all else fails, either reinstall Windows or use the recovery disks that came with the PC. Be sure to backup all data first.

Take A Quick Visual Of The Computer

You should have already done this before trying to power up the PC, but a lot of novice PC builders will skip this step in anticipation of powering up their new machine. This step may save you time and money. First, triple check to make sure the CPU is sitting flat on the motherboard socket. It's probably hard to tell because of the heat sink, but if the entire CPU and heat sink combo looks skewed, then chances are it's not installed properly. Next, go over the IDE cables and the thin wires running from the power and reset switches to the motherboard. While the IDE cables are keyed, it's quite possible to get those case wires backwards or completely. Lastly give the PC a little shake. Make sure an errant screw didn't fall behind the motherboard during the install. This could blow the motherboard or cause the system to go to ground.

Windows Backup

Windows has a backup program ready to go on your system. Navigate to START, PROGRAMS, ACCESSORIES, then SYSTEM TOOLS and you'll find the backup utility. While older versions of this utility will differ slightly from XP Professional's, you'll be able to follow the Wizard when backing up.

You can backup the entire system, which isn't a great idea. Windows and other programs can be reinstalled. So you're probably better off keeping your data in a centralized location, such as your My Documents folder. You can add folders within that directory by opening My Documents and right-clicking an empty space. Name the new folders whatever you want and organize your data. Then use the Windows backup utility to create a backup of your data. Put this file on another hard drive, burn it to disk, or copy it over to another computer on your network.

Also, take a moment to schedule backups. The Windows backup utility will give you a chance to schedule backups automatically. This is normally located under the Advanced tab at the end of the backup process. Take a moment to set this up.

Trik Mempercepat Kinerja Pocket PC Anda

Buat kamu yang menggunakan PDA/PDA Phone berbasis Pocket PC, ada trik nih untuk meningkatkan performance atau kinerjanya. Trik ini memerlukan perubahan di registry dan diambil dari belantara internet. BTW, trik ini works great di XDA IIi. Lanjut »
1. Disable Windows menu animation Switching off eye candies like animation keeps your handheld zippy. To do so, you'll need a registry editor like PHM RegEdit to modify the registry. Navigate to HKEY_LOCAL_MACHINE \SYSTEM\GWE\Menu, then change the value of "AniType" from 6 (default) to 0. This disables the menu animation. If doing this is a daunting task, an easy alternative is with RegKing. This nifty freeware lets you toggle the menu animation easily and offers other tweaks.
2. Increase display cache Another tip to speed up the display is to increase the glyph cache value. However, this will take up more system memory. Launch your registry editor and browse to HKEY_LOCAL_MACHINE\SYSTEM\GDI\GLYPHCACHE. Change the value of "limit" from 8192 (default) to 16384 or even 32768. If meddling the registry is unnerving for you, RegKing gets this done in a few taps.
3. Close not minimize If you are unaware, when you tap on the close button, the program only minimizes. Hence, you may end up with a string of programs running on the background taking up valuable memory. Check out some freeware task managers to better manage your device's resources. If you don't mind spending a little, we recommend Spb Pocket Plus. In addition to task management, this feature-laden software adds a launcher, battery meter and other functions.

Menghapus Data Duplikat di Microsoft Outlook

Sinkronisasi data Microsoft Outlook (calendar, contacts, tasks, notes, e-mail, dan sebagainya) sudah menjadi hal yang biasa bagi pengguna PDA Pocket PC agar data outlook di PC dan Pocket PC tetap sama. Namun, yang membuat pengguna Pocket PC gusar adalah ketika menjumpai adanya data duplikat yang terkadang lebih dari dua. Biasanya ini terjadi setelah kita memilih 'Combine the item on my device with the items on the computer' saat sinkronisasi. Menghapus data duplikat ini tentu tidak terlalu merepotkan bila hanya satu dua buah saja. Lalu, bagaimana menghapus data-data duplikat yang bisa mencapai ratusan bahkan ribuan? Pertanyaan ini membuat saya mencari di internet apakah ada software khusus yang tugasnya menghapus data duplikat ini hanya dengan beberapa klik.
Dari hasil surfing tadi pagi, saya menemukan beberapa shareware (software berbayar) yang mungkin bisa kamu coba. Namun, dari beberapa software tersebut ada satu software yang sangat bagus melakukan tugasnya menghapus data duplikat di Outlook. Namanya NoMoreDupes - http://www.nomoredupes.com/. Sofware versi 1.4.3 yang saya download ini berukuran 1,361 KB (1,4 M). Setelah di-install, NoMoreDupes otomatis terintegrasi dalam deretan toolbar di Microsoft Outlook. Kita tinggal pilih menu 'Search for duplicates' lalu jendela untuk memilih data outlook (calendar, contacts, dsbnya) yang hendak kita cari duplikatnya muncul.
Setelah meng-klik 'Search duplicates' dan menunggu sejenak, jendela yang berisi daftar data duplikat di outlook muncul. Kita bisa memilih atau memverifikasi data duplikat mana saja yang akan dihapus. Untuk versi shareware ini, kita bisa menghapus sepuluh data duplikat sekaligus.
Ogah mencoba software berbayar? Coba software gratis yang dibuat oleh seorang Frater ini, Outlook Duplicates Remover Version 5.0 - http://www.mailexchanger.net/mailtools/Outook/OutlookDuplicatesRemover/ ODR5/. Untuk software berbayar lainnya, kamu bisa mencoba Duplicates Remover for Outlook 2.4.4 (MAPILab) - http://www.mapilab.com/ - (Software ini juga terintegrasi dalam deretan toolbar di Microsoft Outlook namun gagal menemukan ratusan data duplikat di calendar yang sudah terlebih dahulu ditemukan oleh NoMoreDupes) dan Easy2Sync for Outlook 1.13 Freeware Edition - http://www.easy2sync.com/ -(Software ini cocok untuk sinkronisasi data outlook di PC yang berbeda/notebook).