PC TALK PRO

FREE SOFTWARE, HACKS AND INFO IN ONE PLACE.

 
Links

online casino bluebook - online casino


yoursourceforinfo
iknownil Blogger
Ask and Answer
>Boom Gamez
Extreme cars
Hummer 3 - H3
Best YouTube videos
Pizza Pos
Jupiter Directory
Pos Software Blog
Buy Computer Online
PureDir
WM Bulletin


  • For cheaper contents insurance in the UK, visit YHI




  • Computers Blogs - Blog 

Flare
    Add to Technorati Favorites
    hits
    Software blogs

    Register for a skinnyscore at www.blogskinny.com and increase traffic
    like what you've read, click here to give this author a higher rating at blogskinny.com



    Online Geeks/Guests!

    Subscribe with Bloglines
    web tracker

    Feeds

    Pc Talk Pro

    ↑ Grab this Headline Animator

    Other Websites!
    Free Image Hosting!
    Easy Money For Free!
    Text Link Ads
    Other things
    Lorem ipsum dolor sit amet, consectetuer adipiscing elit. Duis ligula lorem, consequat eget, tristique nec, auctor quis, purus. Vivamus ut sem. Fusce aliquam nunc vitae purus.
    AddThis Social Bookmark Button
    15 Steps to Speed Up Your Computer
    Wednesday, November 15, 2006
    15 Steps to Speed Up Your Computer
    Your question, how do I speed up my computer? You get frustrated when your computer is very slow. You can now save yourself from aggravation especially when you are very busy working. I will show you 15 steps to do to speed up your computer.

    Let me enumerate them: As I have also mentioned on my previous articles

    1. Defrag your computer at least once every two weeks (I do it once a week). Go to start>accessories>system tools>disk defragmenter. You can click on "analyze" first before you choose defrag, it will tell you if you need to defrag. Just defrag it even if it reports you don't need to.

    2. Do Disk Clean Up at least once every two weeks (again, I do this once a week). Go to start>accessories>system tools>disk clean up. It will analyze your disk and will generate reports. I suggest you delete files from the recycle bin and the files located in the temporary files folder. Note: I avoid compressing files. It's your call.

    3. Clean up your program files, delete and uninstall unwanted programs on your computer. Go to control panel>add remove programs. Make sure you restart your computer after uninstalling or removing the program so that complete deletion will take place.

    4. Delete all files (temporary files and cookies from the computer). Here's how: open a browser. On top of the browser click on tools>internet options>delete files and then delete cookies. Make your history set to (0). Others wants it on at least 10. I always set mine to (0).

    5. You have to be very careful in installing or downloading programs. Make sure you need it, if not please just avoid it. Uninstalling them is really hard. Many vendors has all the power to have their program stay in your computer!

    6. Always turn on your firewall. I suggest you have only one firewall and one anti virus. You get less safer if you have two anti virus running (I know people who likes to have two anti virus programs running on their computer, I don't know why.)

    7. Run anti-spyware programs. I trust spybot, search and destroy and the Adware from Lavasoft. I run SD every week, I do immunize them before I do the the entire program to run. I run adware every week too after I run spybot search and destroy.

    8. Run complete scan using your antivirus software at least everyday (some do it once a week). Mine is scheduled at 3:00am everyday.

    9. Avoid multi-tasking too much! Meaning to say, avoid opening too many programs all at the same time running at the task bar.

    10. I also suggest you get a dual hard drive (which I know is now common in the market), one for the operating system only and the other for all the programs, database and files. This way, the computer boots on one hard drive.

    11. Also check the performance of your computer when connected on the internet. Go to control panel >network and internet connections >network connections >right click the mouse on the connection available (e.g. local area connection "connected", "firewalled")>click on "STATUS". Make sure on the status tab, you will see the speed (mine is always 100 mbps). The packets sent and the packets received must not have a very high difference. If it is sending too much packets (as in ten times) than it receive (then try to do number 7!).

    12. Always make sure you install the latest updates on your computer.

    13. Always make sure all devices (drivers, etc) are properly functioning. Go to control panel >performance and maintenance >system >hardware >click on DEVICE MANAGER. You will see all the devices and adapters available on your computer. Make sure you don't see a yellow question mark (?) or this means there is an error on that device or adapter. If so, you need to update it or install the right drivers. Updated firmware might also be needed.

    14. Browsing the internet? well, I have my google toolbar installed on my computer and is my default search engine. Their pop up blocker is really great!

    15. A memory of at least 512 RAM might be a good idea installed on your computer

    There you go, 15 steps! Good luck!



    USMANZALI NETWORK

    Labels: , ,


    posted by Usmanzali @ 9:43 AM   0 comments
    AddThis Social Bookmark Button
    What You Need To Know About Computer Viruses
    What You Need To Know About Computer Viruses
    What, another computer security article? Who needs it? Aren't we tired of all that techie stuff that only geeks can comprehend? Virus my foot! But seriously. Computer security is an important topic and those who neglect it will surely get themselves in trouble sooner or later.

    There is much confusion about what exactly a computer virus is. To many people a virus is simply any kind of bad thing that happens to their computer. This would be more or less correct around 1995, but since then several other threats have appeared and using a blanket term like 'virus' for all of them is misleading. Having said that, I don't mean any disrespect to the word 'virus'. After all, it is the granddaddy of all malicious software (or malware for short).

    Old School Viruses

    At first viruses were rather simple-minded, although dangerous at times. All they wanted was to enter your computer and destroy some data. Their favorite way of transmission was to attach themselves to otherwise harmless programs.

    Worms

    As "state of the art" viruses developed, a new breed came to the scene: worms. This charming name is used to describe a type of virus that not only infects the host machine, but also replicates itself over the network. In practice that means that a well-written worm can create real mayhem around the world in a matter of days. It is estimated that damage from some famous worms reaches billions of dollars.

    Trojan Horses

    Many programs, multimedia or other goodies can be found on the Internet. Often they are free and, let's face it, there are very few things that people like more than free stuff. The trouble with some free software is that it also comes with one or more viruses already included free of charge. Hence the name "Trojan Horse".

    Are viruses good for my computer?

    Absolutely! If you want to get rid of all that data clogging up your hard drive, a virus is a wonderful solution. If you want your spanking new computer to slow down to a crawl, then a virus is the way to go. If you're lucky, you may even get a worm which will not only help you clean up your computer from all those annoying files, but will also send a copy of itself to all your friends that it finds in your Outlook address book. In short, if you think that your computer is too fast and gives you too little trouble, a virus or two can really help!

    Thankfully, you don't have to try too hard to get a virus. Simply connect an unprotected computer to the Internet for a few hours and let them come. That's all it takes.

    Tips on How to Protect Yourself

    Truth be told, viruses are not as hot as they used to be. It turns out that there's not much money in writing them. This of course doesn't mean that you should neglect the virus threat. There are quite a few dangerous viruses roaming the Internet. So keep your hard drive happy and don't let the viruses ruin your day. Here is what you can do:

    1) Use a good antivirus program and update it regularly. Unfortunately, some antivirus products inflict more damage than actual viruses do. So, before getting an antivirus program, be sure to read some professional reviews and user feedback.

    2) If you download software from the Internet, use only reputable sources. Scan the installation file with an antivirus program before running it.

    3) Be very careful about opening email attachments. Be particularly vigilant if you use Microsoft Outlook.


    USMANZALI NETWORK

    Labels: , , ,


    posted by Usmanzali @ 9:42 AM   0 comments
    AddThis Social Bookmark Button
    CHECKING COMPUTER SECURITY
    CHECKING COMPUTER SECURITY
    Many people wonder whether or not their computer is secure. They fear that someone might be looking through their files, copying, altering, or erasing them. They are uneasy about the thought that someone might be monitoring their every move in cyberspace. These concerns come to mind when reminded of the problem of hackers, viruses, and other security risks that abound in the Internet. Fortunately it’s easy to prevent these problems by following a few simple tips.

    Update

    Perhaps the most important step for computer security is to keep it updated. Install the latest critical updates and service packs from Microsoft's download center. This is made easy by configuring the system to utilize Automatic Updates, if available. If not, updates can be downloaded directly from Microsoft's download center. Currently, Service Pack 2 (SP2) is the most current Service Pack for Windows XP.

    Firewall

    The easiest way to increase the security level of a computer is by using a firewall. Firewalls monitor all activity that occurs on a connection between one or more computers. They act as a “wall” with one or more computers on one side, and one or more computers (usually the Internet) on the other. Information transfer by suspicious programs are immediately cut off, preventing them from entering the protected side of the firewall. This way denying access to anything coming from unauthorized and unknown sources prevents possible infection by viruses, worms, and other malicious codes.

    Anti-Virus and Anti Spy-ware

    Even if a computer is protected by a firewall it is still necessary to use anti-virus and anti spy-ware. This is because a firewall only prevents unauthorized outside access, and cannot distinguish between malicious and benign access. It is still possible to inadvertently make a request for information that is harmful, which the firewall views as an authorized transfer. Anti-virus and anti spy-ware provides another layer of armor for a computer, making it harder for hackers and their malicious programs to penetrate and control a computer. Some well-known anti-virus programs include Norton, Trend Micro PC-cillin, and McAffee. Anti spy-ware programs are also important as they reduce the chances of spy-ware getting into a computer. Spy-ware behaves differently than viruses, making it necessary to use different programs to catch it. Spy-ware can monitor any activity a computer infected with it performs, or even act as a gateway to download additional spy-ware or viruses. Hackers typically use spy-ware to obtain important information that must remain confidential like credit card numbers, social security numbers, and police records.

    Protect Home Networks

    It is possible for a computer owner to be unaware they are using a network at home. If more than one computer shares the same Internet connection or if wireless Internet access is being used, a home network is present. Securing a single computer is not much use if it is part of a network. The whole network must be protected as well to prevent malicious software from simply hopping from computer to computer to avoid attack. Different kinds of home networks face different kinds of risks. In the case of a wireless connection, anyone within the broadcast range of the network may be able to look at any data contained within the network.

    Most networking devices employ their own security mechanisms. Using this in combination with security defenses installed on each computer's should provide enough protection to thwart attempts from hackers to hi-jack the network and use the computers connected to it. Most routers function as Network Address Translators (NAT) which makes them a safe connection to the Internet.

    While no measure can guarantee total immunity from attack, these steps should increase the security of a computer or network enough to protect against any typical attack.

    USMANZALI NETWORK.

    Labels: , ,


    posted by Usmanzali @ 9:41 AM   0 comments
    AddThis Social Bookmark Button
    Computer Security Against Data Loss And Identity Theft
    Saturday, November 11, 2006
    Computer Security Against Data Loss And Identity Theft
    This week I was going to write about upgrading system RAM but while watching the news I saw the story about Hotels.com and their data theft. Last weeks big story was the data lose at the Veterans Administration. NOW .. to be clear, these were not computer security breeches but people actually carrying the data out on disk. But the point is data is valuable and this leads to computer security

    This past week alone we had 5 machines that were so loaded with spyware the machines literally stalled and were unusable. Now, knowing how low the response is when we run spyware ads I know many of you are not listening. Then, when you head to the repair shop it is already too late. Add to this the cost of the repair /clean out which usually costs many times is more then the actual machine is worth.

    If ever there was a case for the fabled "ounce of prevention" this is it. Anyway identity theft is the fastest growing, most damaging and expensive crime we have today. It can take up to a year to detect and by then the damage can be extensive, but with a few simple steps you can avoid it. The problem is getting you to take those steps so I'll go over them again.

    Before you go near the Internet your computer needs three types of software, first, a good anti-virus program. We recommend products like Norton Anti-virus, Trend Micro and if you are looking for a good freebie, get AVG. Now if one is good two should be better right ... wrong. This not true with virus software. Very often they will conflict and cause system performance issues.

    Next you need a firewall, if nothing else use the built in Windows firewall that comes with XP Sp2, if you have an earlier version then you seriously need to run Windows updates. This is not just for the firewall but you are missing a large collection of security updates. Finally, you need a spyware scanner and you need two of these, one pro-active (scanning threats as they come in) and one that is reactive (scans for threats that are let in by hiding in something else). This is especially true if you use Yahoo, MSN, or Google search bars.

    Also AOL is one of the biggest offenders when it comes to collecting and selling info on their subscribers. But they hide it well by keeping you focused on the competitors spyware they are removing. You also need two spyware scanners because neither will get all the threats and one will get what the other missed. We recommend Pest Patrol and Ad Aware. Avoid Spybot at all costs. This is just a spyware suite disguised as a scanner. Well there you have it, again. The Internet is a safe place if you take the proper precautions.

    USMANZALI NETWORK.

    Labels: , , ,


    posted by Usmanzali @ 3:58 PM   0 comments
    AddThis Social Bookmark Button
    HOW TO MAKE DIGITAL ART WORK.
    HOW TO MAKE DIGITAL ART WORK.
    Making digital art can be very easy and fanny. To make digital art you will need a computer and printer. You can start with redrawing your digital photographs admitting digital effects. To do this you can use photo editing software like Photoshop, Paintshop, GIMP( GNU Image Manipulation Program) and etc.

    To start using photo editing software you must learn it first. Then you can test all the digital effects in the software you should use. Don’t be afraid to play with the digital effects and to apply them to your digital photograph. Remember you can always recover your original image using Ctrl+Z (undo function).

    Now you are familiar with the photo editing software and visual effects. The next step is drawing. Test all draw instruments in your software and draw what you want in the image to make it looks like art work. Your imagination will tell you what to do.

    Now you have digital created art work and you may want to print it, put it in a frame and hang it on the wall. To print the image you will need a high quality photo printer and photo paper to ensure the best quality of your art work. Print the image and choose the perfect frame that match to your style. Put the printed image in the frame.

    Now you have perfect digital artwork, created by you.

    The author of this article is the proud owner of Photo Paradise, a site for Digital Photography and Digital Art.

    USMANZALI NETWORK

    Labels: , ,


    posted by Usmanzali @ 3:56 PM   0 comments
    AddThis Social Bookmark Button
    Wi-fi Wireless Internet Made Simple
    Wi-fi Wireless Internet Made Simple
    Just what is all this Wi-Fi wireless internet stuff they are trying to confuse and torment me with?

    It is actually quite simple, useful and most of all convenient.

    All you probably want to do is to share your internet connection throughout your home whether it be to other computers or so that you can sit in your bedroom and wirelessly surf the internet or send email. Perhaps as well you wish to share files such as songs throughout the computers in your house, apartment or condo.

    Don’t let them confuse with all this alphabet soup - b , g , a , 11 megabytes , 54 , 108.

    To begin with most any of the systems are beyond overkill. All will go faster than the even high speed broadband internet. Most use the same frequency as the standard cordless phones (2.4 GHz). . Be reassured the phones and the wireless internet in most cases will co- exist and work well with each other.

    The most common wireless setups wireless b and g use the frequency most cordless phone use. G wireless internet is sort of a faster b standard. What is important to know is that it is all standardized. B will work with G and G products will work with B. G is said to up to 5 times faster than B that is assuming that you are relatively close. G wireless is very useful primarily if you are sharing large files between computers. For ordinary browsing b wireless is still overkill speed, faster as said than most broadband internet connections. The usual stated range of these wireless products is 300 feet indoors range and 1000 feet outside. The range is basically line of sight. Heavy dense objects – primarily metal, metal doors, metal foil insulation, heavy bricks and pipes and objects such as furnaces, metal filing cabinets will block reception to some degree. As well if the manufacturer makes some ultra high speed claims remember that both the router and wireless network adapters will have to be that brand and that special computer networking hardware feature to work at those high speeds and transmission rates. Remember to that wireless internet transmission speeds fall rapidly with distance.

    Wireless internet is basically a radio setup with a transmitter and receivers. The transmitter is a box that plugs into the internet to share your internet connection. This is called a “Router “. . Wireless routers are made by a number of manufactures and the most widely known are the Linksys and D-Link brands. All routers are fairly good now. Tech support may be something to consider for setup ease. Routers are often sold on sale at big box stores as a means of drawing customers who already have at least one computer into their stores. It is reasoned that if a customer wants to buy a router the odds are good that he or she has more than one computer and once in the store will make additional purchases .Perhaps they will be even so fed up with the older computer as the kids have taken use of the newer faster model that the customer will even buy a additional new computer from the store.. The routers that you will find on sale will most likely be the newer g standard routers which will work with your B or G wireless network adapters in your computers.

    Secondly you will need a receiver to receive the wireless internet signal at the computer end. You will have several options depending on your setup. If your laptop is a newer model then you may have a wireless “network adapter:” already built into your laptop. If you have an older laptop you can install a PCMCIA wireless network adapter into the credit card sized slot on your laptop. If you have a desktop computer you will have several options. If you have the abilities and are allowed by your warranty to open your computer case then you can install a standard PCI wireless card. The advantage of the PCI cards is that they almost always work, are screwed in so that they cannot be dislodged to stop working. The disadvantage is that the antenna of the card is hidden behind the metal of the computer case limiting reception. Another option is USB wireless adapters. Not only can the USB wireless adapter be installed without opening the case but as well with a USB extension cord the YSB network adapter can be lifted away from the computer to a higher more open place.

    Several points on setup to make your life easier. After all networking is often called “Voodoo Science “. First if you are buying both the wireless adapters as well as the router try to buy the same brand, There will be easier setup , perhaps faster speed and tech support will not be able to blame the other vendor’s product for setup issues. You can tell tech support even after the return period of the store: “I guess the products are defective and have to be replaced “. There will be no issue of blaming the other vendor’s product. Case closed. Secondly most of the routers are setup by a “web based interface “. Some will come with an install disc as wizard. With others you will enter a web address usually 192.168.x.x and a password. To enter this setup interface. The instructions and passwords should be in either your instructional manual or disc that came in the box with your router. If you have a standard cable broadband account then just follow instructions if you have a DSL type of broadband internet connection then you will need the paper the phone company gave you with your internet account name and setup password. The type of connection that you set up in the router for DSL connections is called “POPE” The connection internet connection password is most likely different than your email password. This internet connection password is of very little value to anyone else. If you do not have this information phone your DSL provider tech support.

    Next install the wireless adapters. Windows XP has its own wireless utility program installed. With previous versions of windows (Windows 98, 2000 and ME) you will have to install the utility program that the manufacturer provided on the install disk.

    Most of his install manuals have 2 different sets of instructions – one for Windows XP, the other for the remaining operating systems.

    When you setup the router you will be given a choice of whether to turn on the security features so that other people can drive up in front of your house and freeload your internet signals. It is anyone’s choice whether they wish to use this feature or not.

    Believe me there will be no shortage of wireless internet connections for those freeloaders – estimate is 60 %. You can say to yourself if someone wants to waste gas to sit in front of my home to download songs or whatever good for them . If you wish to turn on the scrambling to sign onto your internet it will be in the advanced wireless or wireless security section of your router control panel. There are a number of choices. Most common is a setup called “WEP” (Web Enabled Protection)... This is available in a standard 64 bit or more secure 128 bit WEP settings. 64 bit setup is easier. 128 bit has you enter a long string of characters twice. Lots of fun with mistakes on entering those digits correctly. The easier to use security setup routines will allow an easy to use phrase code generator. For example in the phrase code generator you enter the word

    Badgerlinux. The number / character code will then be generated that you must enter both the router and wireless adapter ends of your system. WEP is considered by purists not as secure as a newer system called WPA. Not all of the older hardware supports WPA. You may look at it as – if someone in my area can break into my WEP protected wireless system then that is the least of my troubles.

    Lastly the biggest problem with wireless internet networks in neighbors. That is right neighbors. It is estimated that 40 % of wireless products are returned to big box stores. There are 12 available channels available in the wireless router settings. For convenience and to aid setup most brands of routers place the default channel of their routers as channel 6 right in the middle of the 12 channels available. It does not take much a signal at all to confuse your wireless adapter. You will see signal strength of your wireless route signal but you will unable to get a solid internet connection.

    Worse yet this phenomenon of no internet connection may be sporadic. In many cases you will not be able to even spot the culprit in your wireless configuration software.

    Remarkably wireless internet signals can travel a fair distance and may even appear to come out of nowhere. Worse yet the interference may be on sporadic. And as said it does not take much of a signal at all to leave you with no internet connection.

    The answer is simplicity itself. “Change the Channel “. There are 12 available channels in your router setup control panel. The next 2 choices for wireless channel selection are at the 2 ends of the spectrum – channels 1 and 11. However it may simply be a matter of trial and error.

    Wireless internet is rather amazing, you can surf the world, download songs, send email and transfer files conveniently at high speed and at some distance away from your internet connection. In addition you do not have to call or pay electrician to string the internet network wiring in your home. And if you wish to move the computers or even move just pickup and make the move.

    If in the end you are having troubles on setup do not feel afraid to call tech support. Someone in India or the Philippines will be more than happy to assist you. Remember in the end you have the ultimate threat of all , that is to take your new Wi-Fi wireless products back to your store of purchase.




    usmanzali network.

    Labels: , , , ,


    posted by Usmanzali @ 3:55 PM   0 comments
    AddThis Social Bookmark Button
    Printer Buying Guide
    Printer Buying Guide
    Printers are essential peripherals, performing a critical role as they render electronic information into tangible records or material output. You're simply not using your computer to its fullest potential if you are unable to print reports, presentations, letters, photos, or whatever it is you need to output. Choosing a printer can be confusing, however, in today's competitive, ever-changing landscape. This buying guide rounds out some of the more important criteria to consider before you make that all-important purchase decision.

    Printing Technologies

    This is the biggest decision to make before anything else. Your choice should be based on how you work and the kind of output you will be expecting from the printer.

    •Inkjet: Inkjet printers can deliver stunning color, so this is the way to go if you are mostly concerned with printing photos. Inkjets can be used for printing text, but the print speed is too slow if the primary purpose of the printer is document printing. To obtain more photo-realism, choose inkjets with an expanded range of colors that includes light cyan and light magenta in addition to the standard four-color CMYK (cyan, magenta, yellow, and black). The extra colors deliver more subtle color gradations in blue skies and skin tones. And if you print a great deal of black-and-white photos, consider photo printers with more than one variation of black ink or with gray inks. Many photo printers use color inks to produce a composite black, resulting in a muddy tint. A second black-ink cartridge and different shades of gray help maintain a neutral tone, with the gray ink allowing for subtle shading and thus improving the quality of black-and-white photos.

    •Dye-sublimation: Dye-sub printers can print continuous tones and a superior range of colors that laser printers are unable to, making them ideal for more demanding graphic applications or color printing. Dye-sub prints are also less prone to fading and distortion over time than dye-based ink prints. In addition, many consumer-based dye-sublimation printers can print directly from digital cameras and also accept memory cards. They are, however, more limited in the range and size of printing media that can be used - usually letter-size paper or smaller.

    •Laser: Laser printers are the perfect choice if you need to print large amounts of text documents. They print faster than inkjets and have a lower cost of operation over the long-term - even though they may cost more to buy initially. There are trade-offs, however. Monochrome laser printers produce crisp black-and-white text but cannot be used for color printing. Color lasers deliver excellent text and graphics but are much more expensive and can be costly to maintain.

    Printer Usage

    Some printers are good for general printing, while others are better at specialized tasks or combine several functions into one machine.

    •Photo: If you take lots of pictures, consider getting a photo printer. Photo printers can be in the form of photo inkjets - which can print both photos and text; snapshot photo printers - for outputting small 4x6-inch prints; or professional photo printers - for large, tabloid-size photos and often including network connections to enable printer sharing. Most consumer and professional photo printers use inkjet technology, while most snapshot photo printers that print 4x6-inch prints rely on dye-sublimation technology. Regardless of the type or technology that is used, the most important thing to look for in a photo printer is photorealistic quality. Everything else is secondary.

    •General Purpose: As the name implies, general purpose printers can be used for printing almost anything, including text and photos. Choose a general printer with a laser format if you print more text than photos; and choose an inkjet format if you print more photos than text. •Multifunction: Multifunction printers (MFPs) combine in one device several functions such as printing, scanning, faxing, and copying. MFPs cost less than buying separate stand-alone devices and cut down on the hassle of setting up individual machines. If you are strapped for budget or space, consider these all-in-one devices. Take note, however, that a malfunction with one component takes down the whole device, and individual components may not be upgradeable. MFPs are available with either laser printers to emphasize speedy text printing and the occasional graphics output; or they are available with inkjet printers for vibrant photo printing.

    Printer Specs and Key Features

    Printers feature various specifications, so navigating the spec sheet intelligently requires familiarity with what each specification entails according to the printing technology involved or for the type of usage planned for the printer.

    •Resolution: For laser printers, 300 dpi is adequate if all you need is to print black-and-white text, but choose at least 1200 dpi for photorealistic grayscale or color printing. For inkjets, choose one featuring 1200-dpi or higher resolution with a droplet size of 4 picoliters or smaller for sharp, clean output. With photo printers, resolution varies according to technology: Output at 300 dpi by photo printers using dye-sublimation technology is comparable to photo printers using inkjet technology outputting at 1200 dpi or higher.

    •Speed: Speed ratings vary greatly, and the print speeds cited by manufacturers usually refer to printing in draft mode or at the lowest resolution. For laser printers, a more accurate way of measuring actual print speed is to time just how long it takes from the minute you hit "Print" - to the time that it takes the printer to warm up, spool the job into the print queue, and for the printed output to finally come out. For inkjets, print speed is not one of its stronger suits; so don't be overly concerned with this spec.

    •Memory: Extra memory will come in handy for laser printers to enable them to handle large graphics and documents more easily. Check the maximum upgradeable memory allowed for your printer, if it features a hard drive with similarly upgradeable memory, and if the printer can use generic memory or needs the manufacturer's brand. In the case of inkjets, memory is built-in and not upgradeable, but this is not an issue inasmuch as processing occurs on the side of the computer - so there's no need for large amounts of installed RAM to begin with on inkjets.

    •Connectivity: Most printers today no longer support the older parallel connection but feature instead USB 1.1 or Hi-Speed USB (USB 2.0) - either of which should work fine with USB computers. For printers to be used on a network, it will need to have an Ethernet port to enable printer sharing. For more flexible printing options, you may want to look for printers with infrared input/output ports that allow wireless printing from notebooks or other devices with infrared ports. And if high-speed or long-distance printing is what you need, consider printers with a FireWire port.

    Consumables and cost per page

    The purchase price of the printer is just the beginning of its overall cost because over time, the hidden cost of ink or toner, paper, and parts will add up. These "hidden costs" are the consumables; dividing the total cost of consumables by the number of pages that can be produced from the consumables gives you the cost per page. Laser printers offer the lowest cost per page, using relatively inexpensive toner and normal-weight, uncoated paper. On the other hand, cost per page for inkjets can be four or five times as much, depending on how much ink you use and the cost of the paper - normally more expensive, coated, glossy paper for higher-quality color output. The tank configuration for inkjets should also be taken into consideration. Inkjets with a single cartridge for the colored inks will incur higher replacement costs because the cartridge must be replaced as soon as one color runs out - even if the cartridge still contains plenty of ink for the other colors. To save costs, get an inkjet with separate cartridges for black and each individual color.



    usmanzali network.

    Labels: , ,


    posted by Usmanzali @ 3:54 PM   0 comments
    AddThis Social Bookmark Button
    Buying a Refurbished Laptop
    Buying a Refurbished Laptop
    When considering buying a used laptop, the first thing to do is to determine what you want to use the laptop for?

    * word processing

    Requires minimal CPU, since you cannot type faster than a very old Pentium 90.

    * e-mail

    Requires a minimal CPU, minimal RAM and the connection speed does not matter, unless you are sending or receiving very large files (photos).

    * browsing web pages

    Requires minimal CPU, 64MB RAM performs ok, but 128MB better. The speed you are connecting to the Internet is more important than the speed of the CPU. 56K modems are slow and DSL or cable are at least ten times faster).

    * moving from home to work

    Most laptops weigh around seven pounds. If this is important check out the weight. Laptops with a smaller display, typically 12.1" weigh less than four pounds.

    * gaming

    You should review the Minimum Systems Requirements of the games you play the most. Some games require a very fast CPU (2 GHz, lots of RAM (maybe 2GB) and a specialized graphics chip.

    * music

    Music does not require much in the way of computing resources. The amount of storage depends upon how many songs you have. The average song takes about 5MB, so 300 songs would be 1.5GB. Most people do not listen regularly to more than 300 songs?

    * on-line shopping

    This in essence is just like browsing the web. You should have at least 128MB. The CPU is not as important as your connection speed (56K modem is much slower than DSL or Cable).

    * a database application or personal finance

    Simple database applications like Goldmine or other sales applications do not usally need much in the way of CPU or Hard Drive space. Again check the Minimum Systems Requirments of your application. A very complex or large database (like Quickbooks) might need a large hard drive and a very fast CPU.

    Determine what applications you need for your computing environment. They will not come with the laptop, as refurbished laptops often only include the Operating System (OS). If they don't include an installed OS, then be prepared to install it yourself. This is not for those that don't know what they are doing, so research what is involved before buying one without an OS.

    Once you understand what you really need, you need to determine your budget.

    Most old laptops do not have working batteries. If you need a battery, shop around to figure out how much they cost. You should know that on older laptops, batteries don't last more than an hour or two, so purchasing a new battery for the purpose of longer battery life may not be worth the expense. And by all means, stick with a name brand … IBM, Dell, Toshiba, Compaq-HP.

    If you are new to computers and you want to browse the World Wide Web, you will need to obtain the services of an ISP (Internet Service Provider).

    There are basically two types of Internet access options: broadband (cable modem, DSL, satellite) and lowband (dial-up). Broadband is the preferred type since download speeds can range from 128kbs to 6000kbs. The faster the better, of course. But, if your budget is tight, dial-up works just fine for typical browsing and e-mail usage.

    Your choice of ISP will be dependent upon two things: budget and location. If the budget allows and you don't mind paying upwards of $50/month, you can purchase a broadband connection. However, even if money were no object, your physical location will determine what types of services are available to you. Broadband is not available everywhere (with the exception of satellite). If you have a telephone line, you can always choose dial-up. AOL's bread and butter is dial-up users. Do your research to determine what is available in your area and compare costs.

    And for you gamers out there, you definitely need a reliable broadband connection. Gaming over a lowband connection can be a frustrating experience and sometimes even impossible. You will need to check out the minimum systems requirement for the games you are interested in using to make sure the CPU speed and the RAM and graphic chip requirements will suppor the games you wish to play.

    Once you have figured out your budget and your needs and the requirements of y0ur laptop it is time to search for the laptop of your desires.

    Some people choose to search at www.ebay.com. If you be sure to check out the seller to be sure you will have a smooth transaction.

    Many don't want the hassle of bidding, so will use their favorite search engine: www.google.com or http://yahoo.com or www.msn.com for the terms used laptops or refurbished laptop.

    If you do you are likely to come across my business … www.usedlaptops.com. If you see anything you like at our website or any of the other refurbished laptop vendors call. Most of the vendors have 800 numbers, so it does not cost anything to call. If you happen to call us you will be pleasantly surprised that someone will answer the phone, as it rarely goes to call forward.

    An important thing to come in mind is how will the vendor treat you should there be a problem. If you don't like their attitude or they don't pick up the phone shop elsewhere. Price is important, but if you have a problem and spent the least amount of money possible the vendor may not have any resources available to help you after you have purchased and spent your money.

    If all the above seems like too much of a hassle, then buy a new computer. It will cost around $800+ (out the door) but will come with a new battery and a one year warranty, although some new ones seem to have only 90 day warranties. It will also have the latest Windows XP system and an 800 number to call the vendor, should their be a problem. I'd call the 800# first before buying to get an idea what kind of support they will provide.



    usmanzali network

    Labels: , ,


    posted by Usmanzali @ 3:47 PM   0 comments
    AddThis Social Bookmark Button
    MY PC IS SLOW?
    MY PC IS SLOW?
    Question: Why is my computer running so slow? Do computers slow down when they get older?

    Answer: No, but here are some of the most common reasons a computer slows down.

    Background programs running:

    This is the biggest reason and can be fixed quickly and for free... it's possible that your computer may have so many background programs running simultaneously that there is not enough resources to run normally.

    The end result of this is that your computer begins to run more and more slowly over time as you add other programs.

    There are two remedies, get Anti-Spyware and use the feature which allows you to view running programs and to disable any of those running programs. Or, if you like to get into your system with your bare hands, use the remedy below.

    How to disable unneeded background programs:

    All icons in your computer's system tray are background programs using memory. There are more, but you will get a hint from that system tray. To see and exit all running background programs:

    Windows 95 - ME

    *
    a. Press the Ctrl + Alt + Delete keys at the same time.
    *
    b. Click any program or task except Explorer or Systray,
    *
    c. and then click End Task.

    Repeat steps b and c to quit all programs except Explorer and Systray which are necessary components of Microsoft Windows.

    You should now have a clean system. See if the computer runs like it used to... if it does, you will want to prevent those programs from restarting the next time you start the computer.

    If you don't want any background programs starting when you restart the system, and you know what you are doing, you can run msconfig from the run menu and completely disable what you find in the 'Startup' tab. If you aren't that experienced and you want a safe way to disable all those unneeded background programs, get the remedy recommended for the spyware on this page. It has a feature allowing you to disable startup programs safely.

    Windows XP through 2003 Server

    *
    a. Press the Ctrl + Alt + Delete keys at the same time.
    *
    b. Choose 'Task Manager' tab to view and end any running programs.
    *
    c. disabling these programs will require that you change their startup properties in the 'Administrative Tools' area of your system. The Windows Help menu will walk you though that process if you search 'disable programs' in your help section.

    Spyware:

    Many kinds of software add themselves to your system start menu without even asking your permission. Sometimes you will click on a link or visit a hacker website that installs spyware on your computer without you knowing. Click here for the best fix. and its free to try.

    Fragmented hard drive:

    This results from programs being loaded and deleted. Run the Window's hard drive defragmenter (Defrag) once a month. It is under your System Tools menu. Your computer's help menu will tell you how to do it.

    Other problems: (Possible, but unlikely to cause problems)

    You could have old or conflicting Windows device drivers. An example would be you might actually have two entirely different video drivers on your system and Windows could actually be alternately using both of them.

    To prevent this problem, First boot the computer in Safe Mode by pressing and holding the F8 key during startup, after the DOS memory check has completed.

    While in Safe Mode select Start/Settings/Control Panel/System/Devices. Click on all the devices and see if the various drivers have any yellow or red exclamation marks (which indicates a driver conflict) and also determine if there are any duplicate drivers that can be eliminated.

    You may have to delete and reload a driver to correct these problems. Duplicate drivers can and should be deleted.

    As each new Windows program is installed and uninstalled, it leaves behind parts of itself that can slow down or crash your computer. These are mostly .dlls and other shared files.

    It's also very possible when uninstalling a program that needed Windows system files can be deleted. When your computer asks if you want to uninstall shared files it's usually safest to say no -- even if your uninstall program claims the files are not being used.

    Old Windows drivers can be found by booting into Safe Mode, then opening Control Panel/System/Devices and ridding your system of old drivers.

    Otherwise, the only real answer to this problem is to pick up ERROR DOCTOR or just reload Windows into a new directory which eliminates all old junk and leftover files. Reloading Windows is something to do last, as you will also have to reload all your Windows settings, drivers, and programs.

    You could be lacking system memory - The only time this may be a problem is if you have an older system and upgraded your operating system without adding some more memory. You should probably upgrade to 256 or 512MB or more of system memory, while it isn't free, it isn't very expensive like it was at one time. Check out Tiger Direct to find great deals on memory upgrades.


    USMANZALI NETWORK.

    Labels: , ,


    posted by Usmanzali @ 3:32 PM   0 comments
    AddThis Social Bookmark Button
    brodband the fact
    brodband the fact
    What Is Broadband?

    Traditional Internet is called dial-up, because it works through dialing the phone line to access the Internet. Broadband Internet access provides a higher speed of transmitting the data to the user. The line carrying the data can therefore carry more information to the user than dial-up.

    The new and latest consumer broadband implementations of up to 30 Mbits per second are considerably faster and more economical than the ones that were available when the Internet first became popular such as the ISDN and 56 kbits per second. They are also different prices charged depending on the geographical locations, spread over different countries. The main reason for naming these fast connections as broadband Internet is because of the unusually high speeds of transmitting data, which in turn, is due to being able to send different amounts of data concurrently.

    In general electronics and telecommunications, any signal or circuit that consists of or handles a broad range of frequencies is known as broadband. This is a term that is used relatively and is best understood in the context of wide frequencies.

    Will I Be Able To Get Broadband?

    The sad truth about todays broadband Internet technology is that not everyone has easy access to affordable broadband. People in rural areas must often resort to expensive satellite broadband if they are going to have broadband availability. The government feels that broadband should be available to all Americans, and several agencies are taking steps to ensure that this occurs in the near future.

    What Kind Of Broadband Options Do I Have?

    When it comes to broadband Internet, there are actually several different options you have to choose from, including: DSL, cable, and satellite, as being the most recommended. DSL, or digital subscriber line, uses a phone line to carry digital signals directly, without having to convert them over to an analog signal first. Through DSL, you can attain much higher data rates than with a regular modem, your connection will always be on which means that you will not have to dial-up every time you wish to use the Internet, and as well, because of the fact that the copper wire is split at the exchange, you can even use your home phone while you’re also using the Internet, which is an incredibly useful factor.

    There are a number of different options available to users with a broadband connection, whereby they can connect according to varied needs. Some people may ask if it is possible to connect two PCs to a broadband connection or if its possible to have more than two computers connected to the same broadband connection. The answer in short, is yes.

    Where Can I Get Broadband?

    Getting broadband access can be the difference between surfing the Internet the old way and engaging in its remarkable content the new way. It will change the way you surf the web and change the way you engage yourself, making the Internet a whole new playground to embark on wonderful journeys on. Broadband access is generally available from most Internet companies for a fee that differs depending on the value of the service and the connectivity options. Be sure to consult your local provider for more information.
    visit http://isp-online.blogspot.com/

    What Is Broadband Cable?

    Traditionally, computers communicate using baseband transmissions, which mean transmissions that only send one signal per wire. When your computer talks to your printer, it is using a baseband transmission. The same goes for your computer and your monitor. Broadband transmission allows one wire to carry many signals at the same time. Cable TV uses broadband technology and because of this, you can get your Internet access through the broadband cable without disrupting your viewing of cable channels.

    What Does A Broadband Accelerator Do?

    The primary purpose of a broadband accelerator is to sit between that of your broadband connection and your router, and most of these devices use DHCP, and consume an IP address which is generated by your router. Generally all you have to do here is leave it set to the auto-detect mode and let it run on its own without any sort of required assistance, and overall a broadband accelerator does have the same effect in reducing lag when playing over the Internet, until of course you begin to really saturate the network.

    A broadband Internet service can change the way you look at your online capabilities. You can get faster download speeds and a more generous time of surfing thanks to the fast connections enabled with broadband Internet services. Some of the best service available online is available through a broadband Internet connection, so ensure that you remain on the cutting edge of technology today and grab hold of a broadband Internet service package before the deals run out.

    Labels: , , , ,


    posted by Usmanzali @ 3:30 PM   0 comments
    AddThis Social Bookmark Button
    The Increase of Internet Shopping
    The Increase of Internet Shopping
    Internet shopping is shaping up. However today, internet shopping is a really significant part of the retail sector. Internet shopping is the new shopping experience of the future. Of course the other major hurdle for internet shopping is shipping charges, sometimes they are to expensive. The growth rate for Internet shopping is growing. Secure internet shopping is secure using encryption and ssl techniques. Internet shopping is easier, safer, and more convenient than at any point in its history. Internet shopping is fast becoming one of the easiest ways to buy almost anything you want. Internet shopping is a way of shopping that allows shopping for required products without going to the store physically. The Internet is great because people are able to shop 24 hours a day without having to leave their home or work.

    The Internet is changing the wholesale/retail landscape daily. In today’s market the shopping sector is taking about a tenth of all retail shopping sales in the US, and the percentage in other countries is not as high. One reason we use the internet is to buy merchandise at a discount to retail.

    One of the biggest benefits of shopping online is the convenience and access to more products and information 24 hours a day 7 days a week. Note that blocking all cookies prevents some online services from working, so you must allow cookies on your browser. Nearly 40 percent of remote workers said they use their work computers for Internet shopping. Be a smart shopper and use common sense when online shopping and just go ahead and enjoy your Internet shopping experience today. The more people that shop online, the bigger their expectations. The supermarket industry now services many customers through online food shopping over the Internet. We understand that shopping online can feel risky and uncertain.

    The following tips will help ensure a safe Internet shopping. If you follow this advice on safe Internet shopping, this should not be a problem. All purchases are made through safe and secure servers. It's safe to say SSL is extremely sophisticated software and safe. Always know where your cards are and keep them in a safe place.

    The phenomenal success of online retailers such as Amazon and Expedia is proof that internet shopping is practiced - and trusted - by millions. Of course the other major hurdle for internet shopping is shipping charges, sometimes shipping is much more than the product. Whether we love it or hate it, Internet shopping is convenient, provides a wide choice and competitive prices. Internet shopping is a big time-saver. As mentioned above, Internet shopping is very much like conventional in-home shopping from catalogs or mail orders. Despite the toughening competition, Internet shopping is likely to continue to grow.


    usmanzali network.

    Labels: , , ,


    posted by Usmanzali @ 3:20 PM   0 comments



    SEO
    YouTube
    Best of YouTube
    Links
    Previous Post
    Archives
    Links
    Friends!

    visit for hacks for games

    © 2005 PC TALK PRO Template by AllTechMasters