Saturday 19 March, 2011

how to solve "pinter access denied" error vista

When you try to connect shared network printer to windows vista sometimes it displayed "Access is Denied" error message. but you can access network shared files and folders, and you cant connect shared printer to the system. to overcome this issue you can add the shared printer as a local printer. follow these steps.
  • Go to the control panel
  • Double click printers icon
  • Now click on add a printer
  • Click on add a local Printer
  • Choose Create a New Port with port type of Local Port from the drop down menu , then click Next
  • In the Port Name box type the path to the printer you wish to connect to and click ok , (ex-\\computer name\printer name)
  • In the Install Printer Driver screen, select your printer from the list or choose Have Disk and specify drivers to install printer
  • Newly installed should be in the printers window
  • Test the printer by using test print
Now you should now be able to print from Windows Vista to this networked shared printer

CLICK ME FOR READ MORE >>>

3 ways to see yourself on a Magazine Cover



It is always fun to play with digital Images and when it comes to profile picture for any social networking sites like MySpace,orkut,Hi5 , etc , we always look for cool images to upload and Magazine covers with your pictures are so cool.
Lets check some cool websites which allows you to create Fake Magazine covers with your pictures.

MagMyPic


Its so easy to put your photo on a magazine with MagMypic.Just upload your picture,browse the various covers and choose a magazine(you can also choose comic book covers).
You can enlarge or shrink your image and when you are finished with your design , hit Save & continue.You can now get the code or automatically post your new magazine to your favorite site and you can save it to your computer.
MagMyPic has got 30 different magazines to choose from.

JPGfun
JPGfum has 35+ magazine covers to choose from.
Just upload your photo,it should be less than 5mb and select effect.
Hit Create Picture when you are finished and then you can save your customized Pic to your computer.

You can also add cool effects to your phots with Jpgfun.
Click here to know more about JPGfun.


FakeMagazinecover.com

This site has got 875 magazine templates to choose from and its easy to create a magazine cover.
You can also add effects and edit your photo after uploading.
You can grab the HTML code or save it to your computer.

CLICK ME FOR READ MORE >>>

windows fax cant install or not working (xp)

in some cases when you try to install windows fax your installation cant continue or stops suddenly, below mentioned solution tried and tested by me (at client place) after doing this i can successfully install windows fax. to do this follow these steps.

  1. click start and run
  2. type esentutl /p %windir%\security\database\secedit.sdb and press enter
  3. after pressing enter it will open warning message and allowing you two options, ok or cancel
  4. dont worry , click ok
  5. when finish, try to install windows fax again, the installation will continue with no problems.

CLICK ME FOR READ MORE >>>

cant defragment hard disk due to kaspersky

if you are kaspersky user, then you might want to hear this news.when kaspersky is up and running and the same time you want to defragment your C: drive (or whole hard disk), but when you start the process after a short time you might see this error "Disk Defragmenter cannot continue prescan because there is a corruption in file: C\Documents and Settings\All Users\Application Data\Kapersky Lab\AVP8\report" this error most common with kaspersky 2009 and kaspersky 2010 product, in order to stop this error keep coming and start defragment process follow these steps.
  • go to c:\windows\system32 folder
  • look for these 3 files " defrag.exe , dfrgntfs.exe , dfrgfat.exe "
  • now you have to add these 3 files to kaspersky trusted zone (or trusted applications list)
  • for example in kaspersky workstation mp4, right click kaspersky tray icon on taskbar > click settings > click protection in top left corner > in the right side click trusted zone button > in the opened window click trusted application tab > click add > click browse > click browse again > now specify all 3 files above one after the other > and make sure to check the all the check boxes (for each file you specify) >after adding files click ok > then apply and ok
after you add these files to trusted zone you can run disk defragment without any problem.


Note - another solution is also there, (to disable self defence on kaspersky and run the defragmenter) this one is also worked , but be sure to enable self defence after the deragment complted.

CLICK ME FOR READ MORE >>>

change excel 2003 default font permanently

  • start excel 2003
  • in the menu click tools and click properties
  • in the options window click general tab
  • under standard font select your desired font
  • you can also specify the default font size
  • now click ok
  • you will see the message that prompt by the excel program, it will remind you to restart excel to changes go into effect
  • so go ahead and restart excel
  • you can see the selected font as a default font (also the font size)

CLICK ME FOR READ MORE >>>

windows mail spell check error "language is no longer available"

did you receive this error "Language is no longer available for spell checking" when using windows mail spell check.To fix this error message follow these steps

  • open windows mail
  • click on tools
  • click on options
  • click on the spelling tab
  • under the language section, click on another language besides english
  • click apply
  • choose english under the language section
  • click apply
  • click ok
  • create a new message and try spell check, it should now work

CLICK ME FOR READ MORE >>>

excel 2007 files cant open when double click

this is a strange problem, when you double click previously saved excel files nothing happens, but you start start excel 2007 program from start menu, then try to open the saved files using file > open files can open, to fix this problem follow these steps.
  • open excel 2007 (using start menu)
  • go to tools > options > general. uncheck "ignore other apps"
  • now close excel program
  • now click start > run then type excel.exe /unregserver and click to unregister excel
  • then again click start > run type excel.exe /regserver and click to re-register excel
  • now double click saved excel files, it should work normally

CLICK ME FOR READ MORE >>>

cant access network share folders (Not enough server storage is available to process this command)

when you try to access shared folders though the network, sometime you might receive the following error.
(Not enough server storage is available to process this command)
to solve this problem you have to modify some registry settings, to do that follow these steps.
  • click start > click run> type regedit, and then click ok to open registry editor
  • navigate to HKEY_LOCAL_MACHINE \SYSTEM \CurrentControlSet \Services\ LanmanServer \Parameters
  • in the right pane check for a IRPStackSize dword value
  • if it is not there you have to create new dword value. to do that right click blank area of the right pane > point to new > click DWORD value
  • now rename the value name as IRPStackSize
  • now double click IRPStackSize , in the value data box type 15 (which is the dafault value)
Note - It is recommended that you increase the value by 3, for example if value 15 not worked, you can try for value 18

after you changed value, restart your pc and try to access share folders on the network, it should work now.

CLICK ME FOR READ MORE >>>

Reimage Repair Review - Read About Reimage and The PC Performance Analysis

My computer has been acting kind of sluggish and congested, my windows would take forever to open and it was almost impossible to browse websites or play any games – things would just take too long! So I figured maybe I had a virus or some malware on my computer affecting performance. I did a search for a free PC performance analyzer, one that would also scan my computer for malware. I came across Reimage through a recommendation in a forum and it did just that.
You download the program and after it’s done compiling information on your PC (like which operating system you’re using), the preliminary scan begins.
Reimage first scans your computer thoroughly; all the files, folders, registry keys and values, drivers, DLL files, everything related to PC performance, etc. The free scan is done in only 5 minutes then you get your free PC scan summary.
Reimage will scan your PC for:
PC Stability –Compiles a graph depicting which programs on your PC crash the most often.
PC Security - Scans for malware threats and uses 3 different ways of checking if your files are indeed a threat to your PC’s security. It then lists all the malicious files it’s found. These files are “tagged” for repair during the repair step.
In my case, Reimage found 5 malicious files on my PC. It also told me about one program that may crash.
PC Hardware - You get a hardware profile of your PC’s parts. It then compares your PC’s hardware (memory, disk space, CPU temperature) to a worldwide average.
In my case, I didn’t have enough memory on my PC (I guess I’ll just have to delete some programs I’m not using.)
I went ahead and purchased a license key to start the repair.
The Reimage repair started by clearing all the faulty files they found on my PC during the scan.
Then it was on to repairing damaged files and installing the fresh files from Reimage’s up to date online database. These files are downloaded straight from their servers (based on my geo-location) and are chosen based on my exact Windows operating system.
After the new replacement files were downloaded to my PC, the stability check took the longest to complete. The stability check makes sure that all performance issues are resolved on your PC. This is done by comparing your now fixed PC to the original stability report.
I was prompted to reboot a few times and then it was done. My computer’s performance has improved; I think cleaning out all those junk files, viruses and repairing damaged files gave my PC a real boost.

CLICK ME FOR READ MORE >>>

How To Add Facebook Profile on Blog

How to get profile badge from Facebook?
How to create Facebook profile badge?
How to include Facebook profile on website?

First, go to your Facebook account and log in. Then head on to your profile page, by clicking on your name or "Profile" on the top navigation bar.

Then on the left sidebar, scroll down until you see "Create a Profile Badge", something like this.
facebook profile badge

After a new page has loaded, click on "Create a new badge" on the top right corner. The button looks like this.
facebook profile badge

Select the layout and the information (items) you would like to display.
facebook profile badge

And then click save.
facebook profile badge

After that, select the code, copy and paste it to your blog as one of the page gadget on the layout settings page.

CLICK ME FOR READ MORE >>>

How To Update Blog Posts to Facebook via Notes

How to link blog to Facebook?
How to update blog on Facebook?
How to automatically import blog post to Facebook?

First log-in to your Facebook account.

Then click on the "Profile" link on the top right of the main navigation bar above to view your own profile.
facebook profile

After that, click on "Options" below the Share box.
facebook option

Then, the word "Settings" will appear. Click on it.
facebook settings

A list of ways to import stuffs (also known as Stories) to your Facebook will be available. Find for "Blog/RSS" and select it.
facebook import stories


After selection "Blog/RSS" a text field will appear right below. Enter your blog address or the blog feed, and click Import.

Facebook will then import all your available blog posts as Notes and it'll appear on your Wall and also your friends' Wall.

Also, whenever you update your blog, Facebook will automatically import the latest posts as well. Enjoy!

---

UPDATE (6/9/2010): Facebook imported stories is no longer available.
facebook imported stories

However, it seems that Facebook still auto-update the blog note after a few days. Just that you can't manually ping it anymore.

CLICK ME FOR READ MORE >>>

How to Add Facebook Like Button on Blogger

How to add Facebook Recommend Button on Blogger blog?
How to add Facebook Like Button on Blogspot blog?
How to customize Facebook Like Button on Blogger?
How to customize Facebook Recommend Button on Blogger?

You want to add the official Facebook Like or Recommend Button at the end (or at the top) of each of your blog post, here's how.
facebook like button

Firstly, go to Dashboard > Design > Edit HTML. Then click Expand Widget Templates.

Search for this code:
<data:post.body/>
<div style='clear: both;'/> <!-- clear for photos floats -->

Then, here's the code to add the Facebook Like Button.
<iframe allowTransparency='true' expr:src='&quot;http://www.facebook.com/plugins/like.php?href=&quot; + data:post.url + &quot;&amp;layout=standard&amp;show_faces=false&amp;width=100&amp;action=like&amp;font=arial&amp;colorscheme=light&quot;' frameborder='0' scrolling='no' style='border:none; overflow:hidden; width:450px; height:40px;'/>

---

Where to add Facebook Like Button?

To add it above each blog post, add the code before <data:post.body/>.

To add it after each blog post, add the code after <div style='clear: both;'/> <!-- clear for photos floats -->.

To distance the button away from the blog post, add <br/> before or after the Facebook Like Button code depending on where to put it.

Click "Save Template" and you're done.

---

How to customize Facebook Like Button?

1) To show Facebook Profile pictures/faces of people who "Liked/Recommended" the blog post, change "false" to "true".

2) To use different action on the Facebook Button, change "like" to "recommend". Decide which is suitable for you.

3) To change the font, change "arial" to either "lucida+grande", "segoe+ui", "tahoma", "trebuchet+ms" or "verdana". Decide which is suitable for you.

4) To change the colour scheme, change between "light", "dark" or "dark". It represents the background colour your blog uses. If it's light colours use "light", if it's dark use "dark" and "evil" is somehow the same.

5) To change the width or height of the button, change them accordingly.

That's all for now!

CLICK ME FOR READ MORE >>>

How To Disable Credentials Prompt of RDP 6.0

Remote Desktop Connection client 6.0 introduces new authentication features to improve security for Windows Vista and Windows Longhorn Server, which makes it mandatory for the user to enter logon credentials before RDP client can establish connection to the remote server (" Enter your credentials for <server>. These credentials will be used when you connect to the remote computer" ). But if the remote machine is configured to show logon warning message or if the remote system happens to be Windows 2000 or XP, you’ll need to enter the credentials again at remote machine’s logon screen.
There is however a workaround to skip the credentials screen that RDP 6.0 client shows by choosing “Do not attempt authentication” under Authentication options on the Advanced tab, but this option is not set permanently. To permanently skip the additional credential screen of RDP 6.0 client, edit the Default.RDP file in notepad to include enablecredsspsupport:i:0 . The Default.RDP is located in each user’s My Documents folder. Including enablecredsspsupport:i:0 disables the Credentials Security Service Provider for the connection. If you use separate .RDP files for different server, modify each of those .RDP files. Below is the content section of the default.rdp file with enablecredsspsupport:i:0 option included.
redirectposdevices:i:0
authentication level:i:0
enablecredsspsupport:i:0
prompt for credentials:i:0
negotiate security layer:i:1
Note that this workaround is suggested only if you connect Windows 2000/2003/XP systems because according to Terminal Services Team blog post“This option does disable the new credential prompting behavior, but it also disables support for Network Level Authentication for Vista (and Longhorn Server) RDP connections; Network Level Authentication requires credentials to be provided by the client before a session is created on the server side.” So if you do connect to Vista/Longhorn over RDP, you’ll not be able to use this option.
References: http://blogs.msdn.com/ts/archive/2007/01/22/vista-remote-desktop-connection-authentication-faq.aspx

CLICK ME FOR READ MORE >>>

NETSH / How to reinstall TCP/IP in XP/2003

Admins who manage HP/Compaq Proliant servers would probably agree with me that remotely administering these server using RIB/iLO is a real pain. Few weeks ago, I had to re-do network teaming on one of the remote servers located in different geography using the RIB interface. It was a real pain trying to keep mouse cursor in sync to be able to go through many clicks to make network configuration and re-assign IP/gateway/DNS/WINS addresses. That was when I realized the true potential of NETSH command-line interface and the scripting capabilities it offers on Windows platform.
For the same scenario, I could’ve exported the network configuration using c:\>netsh -c interface dump > c:\netsetting.txt and after re-doing the teaming could’ve imported the same setting from the text file using C:\>netsh -f c:\netsetting.txt
Though we need to be careful not to change the name of any of the network interfaces – HP Network Team #1 should not become HP Network Team #2 after redoing the teaming.
Netsh comes handy not only for exporting/importing network configurations, but it is also capable of making different network settings like assigning IP/mask/gateway/DNS/WINS. Netsh command is also used for resetting TCP/IP stack in Windows XP and 2003 platforms. Unlike Window 2000, TCP/IP is a core component of Windows XP/2003 and cannot be uninstalled/reinstalled; it can only be reset to the state when the operating system was installed, which the following command does
c:\>netsh int ip reset resetlog.txt

CLICK ME FOR READ MORE >>>

How To Change Default Blogger Commenting System

 How to modify default Blogger commenting system?
How to adapt Wordpress commenting system?
How to improve Blogger commenting system?
How to enable reply on Blogger commenting system?
How to change commenting system on Blogger?

Here's how. All you need is just to install or implement an external commenting system. After installing, commenters will be required to enter their name, email and optional website when commenting, just like default Wordpress commenting style.

Reason to change? It's more interactive and you can well manage all your comments on a particular website. External commenting system provides more feature - with custom top commenters widget, popular posts widget and recent comments widget.

Furthermore, you are able to reply on a particular comment and your reply will appear right under the replied comment - one feature that Blogger has yet to implement - which is very important to blogs these days.

Here are some recommended external commenting system - preferably try it out on a test blog before implementing on your intended blog.

1) Disqus
disqus logo

They offer:
  • A powerful comment system that easily enhances the discussion on websites.
  • In minutes, connect your community with those of thousands of other websites.
  • Threaded replies reveal the conversations in your comments.
  • And now it's easier to keep the discussion alive with email and mobile replying.
  • Features such as ratings and video comments make comments interactive and expressive.
  • An intuitive admin section makes it easy to moderate the discussions from one or multiple websites.
  • Disqus is easy to customize, with widgets that lets your audience become your community.
  • With search engine-friendly plugins and complete data sync, Disqus is as safe to use as it is easy.
  • And many more...

2) JS-Kit
js-kit logo

They offer:
  • Feature rich services backed by enterprise-class reliability and performance;
  • "Cut and paste" deployment - no coding or other technical expertise required;
  • Integrated RSS feeds for search engine visibility and data backup;
  • Spam protection, moderation capability and other administrative controls;
  • Knowledgeable and responsive support.
  • And many more...

3) Intense Debate
intense debate logo

They offer:
  • Comment Threading - Improve the conversation within the comment section and reply directly to an individual comment. Indented replies make following various conversations manageable.
  • Reply-By-Email - Respond to and moderate comments with ease via email, even if you're on the go. Just because you're away from your computer doesn't mean the conversation stops.
  • Commenter Profiles - Commenter profiles let you and your readers learn more about each other. Watch the conversation go to new levels once you and your readers are able to get to know each other. Don't forget, their universal profiles can be used on any site with IntenseDebate.
  • Moderation/Blacklistin - IntenseDebate offers some truly hardcore moderation options. Customize your settings to moderate by keywords, number of links, commenter email, and/or IP addresses.
  • OpenID - Your readers can post comments easily using their OpenID. They can tie their OpenID to their IntenseDebate profile so they won't have to worry about remembering another set of login credentials.
  • And many more...

CLICK ME FOR READ MORE >>>

How to Remove WhiteSmoke Translator (Uninstall Guide)

A few days ago we received an email from our friend explaining that a program called WhiteSmoke Translator mysteriously appeared on his computer and he doesn't know how to get rid of it. After a fair bit of research, we learned that WhiteSmoke Translator is "an all-new application that enables you to take any text from any text-based application, and automatically translate it into a destination language". We also found many complains about this program on popular tech support forums. Finally, we found a sample of a Trojan (MD5: c5a4a504e73fda80390b630643d580b9) that drops WhiteSmoke Translator and some other adware/malware onto your computer without your consents. Whitesmoke Translator appeared on our computer along with several new desktop icons including one called "Improve Your PC" which pointed to a web page promoting Uniblue RegistryBooster 2011. We installed this software on your test machine too. It found 81 moderate registry errors. We were prompted to change our default search provider to whitesmokestart.com in Internet Explorer. If you somehow ended up with this misleading application on your computer, please follow the steps in the removal guide below to remove WhiteSmoke Translator and any related malware for free.

WhiteSmoke Translator hides translated words behind its advertisements. You have to close advertisements to see the translation which is kind of annoying.



Unlike other adware or potentially unwanted applications, WhiteSmoke Translator can be removed using the Add/Remove Programs control panel. However, we got an error on attempt to uninstall this program saying that some of the files are locked by rundll32.exe process. We had to end the process in order to uninstall this program.



WhiteSmoke Translator and Uniblue RegistryBooster 2011 icons:



The user is prompted to change the default search provider or keep using Bing. Please see how misleading it looks "Change to Yahoo (www.whitesmokestart.com)".





"Improve Your PC" icon links to a web page where you can download Uniblue RegistryBooster 2011.



Such software distribution methods are unacceptable. If you got with this malware, please scan your computer with anti-malware software. To remove WhiteSmoke Translator, please follow the removal instructions below. Let me know if you need any help with malware. Just leave a comment. Good luck and be safe online!

CLICK ME FOR READ MORE >>>

How to Remove System Cleaner (Uninstall Guide)

System Cleaner is a rogue security product that gives false reports of threats on your computer. It uses scare tactics to frighten you into thinking that your computer is infected with Trojans, worms, spyware and other malicious software. It runs fake system scans, displays fake alerts and warnings stating that your computer is under attack or unprotected against the latest malware. System Cleaner refuses to remove the supposed threats until you buy the rogue software. Price range $69 - $89. This program is a complete scam! If you have bought this fake AV program, you just been scammed. In such case, your credit card number could be for sale on the Internet black market. You should contact your credit card company directly and dispute the credit card charges. You can explain that System Cleaner is a computer infection. If this rogue security program has infected your computer, please follow the steps in the removal guide below to remove System Cleaner fraud.



Infected websites and fake online scanners are very common infection sources for malware. System Cleaner enters your computer with the help of Trojans and other malware too. You may end up with the fake "cybercriminal activity test" pop-up on your computer which states your PC might be infected or even controlled by cyber-criminals. Once the "cybercriminal activity test" is executed, it displays the following message:
Your system has not passed the cybercriminal activity test and cannot be considered safe.
You might be a victim of cybercriminals.
Click here to learn more.


Then the System Cleaner malware scanner shows up and runs fake system scans. It may report hundreds of infected files. The reported infections do not exist. Then the misleading pop-up windows guide you through the steps necessary to purchase this rogue security product. What is more, System Cleaner may block other applications on your computer and redirect your web browser to misleading websites that can further harm your computer. If you find that your computer is infected with this scareware, please follow the removal instructions below to remove System Cleaner using legitimate and free anti-malware software. Do not hesitate to contact us if you need further assistance or you have questions regarding removal of this fake AV. Please leave a comment below. Good luck and be safe online!

System Cleaner removal instructions:

1. Reboot your computer is "Safe Mode with Networking". As the computer is booting tap the "F8 key" continuously which should bring up the "Windows Advanced Options Menu" as shown below. Use your arrow keys to move to "Safe Mode with Networking" and press Enter key. Login as the same user you were previously logged in with in the normal Windows mode. Read more detailed instructions here: http://www.computerhope.com/issues/chsafe.htm


CLICK ME FOR READ MORE >>>

It could be the hardware fault

Reformatted the hard disk and the problem still exists?
If you are experiencing problems while running PC and you try to solve it by uninstall some suspicions software but it doesn't work .Finally,You though reformat your computer and start a fresh Window.

This will most likely resolve any software issues, remove those viruses or any other natives and give you a clean start. But what happens if you have already reformatted and the problem still exists?
computer hardware fault

It could be the hardware fault
Apparently, you have a hardware fault. This is where problems occur.
Diagnosing a computer hardware fault can be a right pain as any of the computer components could the cause. Unless you are intending to replace the entire machine you need to carefully diagnose with what components the fault lies with.

These are few areas most frequently happened fault.

1.Memory / RAM
Memory – this is fortunately quite easy to diagnose. Search the Internet for a memory tester.Visit "Memory Tester Tool at no cost" for the free software.Generally these can be put onto a CD ,boot up from the CD which then enters the memory test. This will constantly cycle through, testing the memory for errors. It is wise to leave this on for several hours or even better over night. It will advise you if the memory fails.

2.Power Supply
Power Supply – Most people don't even know this.people generally assume that if the power supply does fail then you would start you computer at all. This sometimes is not true.In fact,When computers turn off at random times, and computers that have the power light on, but do not start up,Also the blue screen that appear during start up, etc .it has turned out to be the supply –Testing it can be difficult without the right equipment. Really the only way is to get a volt tester and check the voltage and current coming out.If you/friend have another PC ,Just borrow the power supply unit to have a try.

3.Hard Disk
Hard Disk – this can be one of the worst problems , unless you have been sensible and done regular backups of your most valuable data, you stand to lose it all. Hard disks can go at any time and usually you will hear a harsh sounding clicking noise that is coming from your computer. If this is the case you need to probably replace the hard disk. Get someone who then knows what they are doing here to try and recover your old data for you.Don't even think to get your hard disk fix by checking the component inside by your self..It will destroy the data with no change to recover any data when it explore to the air.Get the professional.

4.System board
If none of the above solves your problem then most likely the fault being with the motherboard or any other plug in cards or devices you have. Remove those devices one by one to test whether it is cause by the plug in. Take out those sound cards etc and any other PCI devices that are not essential. If you have more than one stick of ram then leave in only one and see if the problem resolves.
This isn’t a complete definitive list, obviously depending on your issue ie if your issue is that you don’t get sound then it could be a sound card issue, similarly if you don’t get a display then graphics could be the culprit. If it is a random fault then either of the above could be the cause.

CLICK ME FOR READ MORE >>>

Wireless Broadband Basics Walk through

Wireless Broadband Basics Walk through.
What is the alternative for ADSL broadband?
What is Wireless Broadband ?
Wireless broadband is a general term used for the technology that is able to
gain access to the INTERNET wirelessly, and at high bandwidth speeds. What is the technology behind wireless broadband services?
Wireless broadband is available on virtually any digital device, so long as it has the proper connectivity hardware
.Such hardware, like a wireless dongle, can easily be attached to most PDAs and laptop computers.


For now we have 3 options.(In some country ,it might be more.)


1.3G


2.Wi-Fi


3.Wimax


What is 3G?


The term 3G refers to the third generation of mobile phone standards as set by the International Telecommunications Union (ITU). 3G technologies allow mobile operators to offer more options to their users, such options include mobile broadband.As a technology, 3G facilitates devices such as mobile phones and mobile dongles to deliver broadband speed internet.

Most new top of the range mobile phones are 3G enabled, making it easy to check emails and browse the web on the go.These technologies enable mobile broadband users to access of up to 7.2Mb speed downloads and uploads with speeds of up to 1.7Mb via a mobile dongle, USB modem or data card which they plug into the USB port of their laptop or PC.
What is Wi_Fi?
One of the most popular and well known wireless technology standards is Wi-Fi (Wireless Fidelity), which allows users to access the internet over a wireless Local Area Network. The speed and range of Wi-Fi, however, is severely limited. There is another wireless connectivity standard, called Wimax , which is considerably more advanced..
What is WiMAX?WiMAX is a protocol by which signals are sent to wireless broadband users. A WiMAX base station can theoretically beam a signal as far as 50km (31 miles), meaning that a single station could potentially cover an entire city (unlike Wi-Fi, which is only available in "hotspots").The cons for WiMAX is the base stations are very expensive to build, and arent cost effective in less densely populated areas. Because of this limitation, WiMAX technology is not yet available in most non-urban regions.
The Further of Wireless Broadband technology.
Even though WiMAX has been a major technological achievement, wireless broadband certainly doesn't stop there. There are a number of other cutting edge wireless protocols currently in development. The most notable of these is a new protocol called xMax, which is similar to WiMAX, but a lot more efficient. It can cover a broader range at a lower cost, by piggybacking on radio frequencies.
Although xMax is not yet available to the public, it will most likely be launched within the next couple of years.3G is one of the most popular options now.With a laptop with built-in 3G broadband you get the best of both worlds. Whether you're in the back of a cab or waiting at the airport, a pre-installed 3G broadband gives you fast, secure access.



P/s:Local surfer,If you live in Klang Valley and you are not satisfied with Streamyx ADSL broadband service because they just didn't provided affection service to user ,you can go P1 w1max Wireless or the latest BEST BROADBAND SERVICE

CLICK ME FOR READ MORE >>>

Wireless Keyboards –more freedom, and to help save on space.

Wireless keyboards have became increasingly common and popular. It  give the user more freedom, and to help save on space.
 vibewireless3
Many of the early prototypes of wireless keyboards did not have a particularly successful career, due to limited battery lifespan and a constant need to replace the batteries soon irked consumers. Advances have now been made which have ensured that the longevity of the batteries are ensured. Whilst keyboards in general are always assumed to be the QWERTY model so often associated with desktop and laptop computers, wireless keyboards have became increasingly common amongst handheld devises such as PDA and other media players.

These wireless keyboards are used to more conveniently play and manipulate media, and include fast forward, rewind, play features as well as volume control and mute function. Miniature QWERTY keyboards which are fully wireless are also available for the likes of PDAs and other hand held devices so as to allow the user a greater ease for entering data and contacts.

Other useful features include a button which can be used to engage the Internet browser, and another dedicated to email. Rather than being a traditional keyboard minus the cords, wireless keyboards are a clear mark in the next stage of evolution of keyboards, designed to be more user friendly as well as of greater, practical benefit to the user. Many wireless keyboards also come with a pointer device akin to he standard mouse which is designed to eliminate the need for a traditional mouse, and this further increases the freedom for the user.

Concerns have been raised however as to the actual security of the wireless keyboards. Wireless keyboards in order to actually work, need to transmit signals from the device to the computer and this has meant that they are open to abuse and exploitation.

Radio frequency (RF) or infrared (IR) signals sent and received from the keyboard and the unit attached to the computer facilitates it to work as wireless keyboard and these can be readily intercepted by hackers. This means that not only can the keyboard itself be compromised, but that the actual integrity of your system can also be compromised as well.


Wireless keyboards are also becoming increasingly eco-friendly, with the latest innovative design feature being the inclusion of solar powered keyboards. This has meant that batteries and plugs are no longer required and has thus guaranteed the smooth operation of the keyboards for a long time to come. With an eco-friendly design, wireless keyboards are fast becoming the latest must have computer item.

CLICK ME FOR READ MORE >>>

Tips on choosing computer mouse

Choosing the right ergonomic equipment for your office space can make a world of difference. It might mean coming home feeling less physically tired or stressed because your body will feel so much better.
There are many different types of computer mouse in the world today. Several examples include the finger mouse, the wireless mouse or the mouse pen. Here are a couple tips that you should follow when looking for that perfect ergonomic mouse for you.
Wired_Optical_Mice
Hand PositionConsider the position your hand is in when it is on the mouse. Make sure it feels comfortable and allows your hand to remain in a natural position. When standing, your hand should fall at an angle. Many ergonomic mice may have an angled surface to imitate a natural position.
Rest your Wrist
If you don’t have one already, make sure your mouse has a wrist rest. It should be connected to the mouse pad so that it remains stationary and allows you to completely rest your wrist. Generally you will find these rests made out of a gel or flexible type of material to provide ultimate comfort. And actually, it should be your palm resting on the rest and not your actual wrist.
While these two ideas may seem common and simple, they need to be used more in the workplace. Employers need to provide their employees with the necessary equipment. Let’s face it – we use our mouse so frequently – it is an obviously essential piece of office equipment. This is why it is one of the hottest selling items in the computer market today.
One of the main ways that the mouse has changed over the years is that developers have created the infrared movement sensor.
This has allowed the mouse to become more ergonomic and has eliminated the need for the roller ball. Next, they made it wireless. No more wrists jerking to loosen up those tangled cords. And, you must admit, it’s nice not having to clean out that roller ball when it gets clogged.Okay, so you’ve shopped around and have chosen your new ergonomic mouse. You’ve positioned it on your desk just right with the wrist rest. Even with the top of the line ergonomic mouse, ergonomic experts still say that using keyboard shortcuts whenever possible is still much better for you and probably faster in the long run too.
Even though you may now have the best ergonomic mouse – don’t forget about the other things too. Make sure you have a good chair and that you are sitting up straight in it. Consider a footrest.
Why not try out an ergonomic keyboard. Think about a glare filter on your computer screen to help with those headaches. And above all else – take a break! Rest your wrists, your eyes, your back and your head. Take a deep breath and stretch.
One thing is certain: we spend a lot of time at our desks. It is essential that we create the perfect ergonomic workspace.
From the office chair we sit in all day to the keyboard we type each e-mail on – it’s all essential. However, don’t forget that small piece of office equipment it is so easy to overlook: The ergonomic mouse.

CLICK ME FOR READ MORE >>>

Mouse and Keyboard

There are special keyboards with extra functions on them for such things as surfing the internet.






what is computer mouse?
A device that controls the movement of the cursor or pointer on a display screen.When we move the mouse, the pointer on the display screen moves in the same direction.

Type of mouse:
-mechanical mouse that uses a ball and rollers to track the movement of the mouse
- optical mouse that uses a light and a sensor to track the movement of the mouse ,they are preferred over standard mechanical mice as they tend to be more reliable and require less maintenance.



INTERFACES to connect the mouse:


Infrared/Bluetooth
A cordless mouse, has no cable, this type of mouse utilises batteries for its power supply.

PS/2 Port
The PS/2 port is a mini DIN plug that contains six pins that is found on almost all IBM compatible computers .

Serial PortThis is a mouse with a serial connector, it requires a free serial port on your PC.

USBUsing uSB plug to connect to the pc.
This type of mouse has a USB connector and requires a free USB port.

CLICK ME FOR READ MORE >>>

Apple Innovations:iPhone


iPhone: The Web In Your Pocket Introduced: 2007
What It Does: This über-gizmo makes phone calls, surfs the Web, handles e-mail and plays music and movies with aplomb.
Why It's Great: The creepy thing is how well the software powering the phone--which is based on Apple's OS X desktop operating system--swaps between handling a phone call one moment, viewing a movie another and surfing the Web the next. It shouldn't work, but it does.





CLICK ME FOR READ MORE >>>

Recent

Followers

AddUrlYahoo
Powered by Blogger.