Here you can get the detailed information on Computers and Technology . Know the complete reviews and tips on Computers and Technology our articles are very clearly written posts that any one can understand. So learn more about Computers and Technology . read all blogs for get complete details......

Friday, October 17, 2008

Spyware Protection - What You Should Know

Spy-ware protection is critical to have installed onto your PC, as spy-ware can steal your personal information. User names and passwords are often sent. Many companies, like ad companies can send you unsolicited targeted advertisements. Spy-ware encourages pop-ups, security threats and even slow down your computer to a grinding halt. Microsoft, like many others, provides spy-ware protection by shipping the operating system with spy-ware protection. But it's not nearly as good as some of the other ones out there.

It is very difficult to remove spy-ware from the computer once you get it, so it is a lot easier to prevent it and one should look at that as an priority. There are two ways to tell which spy-ware can gain access to your computer. You could be asked to click a link, that is one way to get spy-ware installed onto your computer. Or maybe a web site opens a window that looks just like a dialog box, maybe there is a fake title bar and when you click it the spy-ware gets installed.

Another way spy-ware can gain access to your computer is installing freeware software, like Bearshare, or any other P2P program. File-sharing programs could bring in some spy-ware, and it's easy to fall for this trick. As soon as the spy-ware is installed, it starts downloading all kinds of advertisements all the time. Also, your home page, search page, or your browser settings may even be hijacked.

So keep some tips in mind for spy-ware protection. When you install any program, make sure it does not contain any spy-ware. You should also read the publishers site or check it out by searching the net. Another way to stop spy-ware is to install a pop-up blocker to prevent spy-ware pop-up windows. If you click a link that shows a dialog box showing a 'Yes' button to install the program, do not click on the button until you are sure that the software that's going to be installed is safe.

You may want to look into buying some spy-ware protection software to prevent spy-ware from gaining access to your computer. Most of the free anti-spy-ware software that ship with the OS just don't give the protection that everyday users need. You can find a link to a page regarding to anti-spy-ware at the bottom of this article. It will tell you most things you need to know and what anti-spy-ware software is right for you.


Article Source: http://EzineArticles.com/?expert=R_McCann

Labels: ,

Using Comments in Your Programming Source Code

At some point every programmer has experienced it; returning to code written days or months before, you find yourself unable to remember why you wrote the code the way you did and what it was for. Nothing can be more frustrating or more time consuming than having to step back through code and figure out what was going on. There is, however, a way to reduce the risk of this happening again. Adding comments to your source code may seem like a waste of time now, but when you have to go back to a chunk of code months down the road, you will be very thankful you took the time to add a few explanatory comments.

If you have decided to start investing time placing comments in your code, allow me to give you a few "pointers" that will allow your comments to have the greatest impact. The first thing I do is place myself in the position of someone who has never seen that particular code before. I try to imagine I am this person, trying to figure out what the code before me is intended to do. I start out at the beginning of the code with an explanation of what the overall code is trying to accomplish. This will give the reader at least some idea as to what the code is intended to do.

Next, I give a brief description of what each variable's role is in the code (i.e. counter, output, etc.). The person reading the code could eventually figure out what each variable is doing, but it is easier if you just spell it out for them.

Finally, I add the date. This is an extremely important step. It is extremely likely that sooner or later you will need to make revisions or corrections to your code. By including dates, you and others can see which pieces of code are the newest and which are the oldest. This can be extremely beneficial when debugging programs. I add a date, never erasing previous dates, each time I begin working in a piece of code. I also include a brief description of what was changed and why. This makes for a great reference log for later.

Many programmers find themselves reusing their code in different situations. Adding comments can help locate those needed pieces of code more quickly, saving valuable time. The important thing to remember with comments is that it not only benefits others, but will greatly benefit you in the future. Happy commenting!

Nicholas Brown is a recognized authority on the subject of Access Databases. He is the founder of Database Technology Services (DTS). DTS is a leader in custom Access database development. DTS programmers create databases for corporations, small businesses and individuals.

Article Source: http://EzineArticles.com/?expert=Nicholas_Brown

Labels:

Running a WiFi Hotspot - A Guide to Hotspot Systems

What is a WiFi Hotspot ?

A WiFi Hotspot is an area that has WiFi access to the Internet. The term Hotspot is now used interchangeably for the both the area where the signal is available and the device (WiFi Router or WiFi Access Point) that is broadcasting the signal. Likewise the terms "WiFi Router" and "WiFi Access Point" (AP) are often used interchangeably.

Simple Hotspot - The Open or Unencryped Router.

The easiest way to run a Hotspot is to purchase a domestic WiFi router, hook it up to the Internet and set the wireless security settings as "Disabled" or "Open". This would allow anyone to access the Internet and potentially also access other computers connected to the router. You would have very little control over who connects and how much bandwidth is used. If you have no security concerns and are not looking at making any money this is a simple way to go. Cost ~$50-100

Simple Hotspot - The Encrypted Router with WPA or WEP

Another option is to enable security on the router, there are two types of WiFi security WEP and WPA - WPA is the newer and more secure. With both types you specify a "key" which is a code you need to connect. You could tell your customers what the WPA or WEP key is and they could connect. This offers some security and I guess you could change the WPA or WEP key each day, however there is nothing to stop someone telling their friend the key so it's not ideal for generating revenue.

The Captive-Portal.

Nearly all commercial Hotspots are Captive Portals, this appears as an Open or Unencrypted WiFi signal but then redirects any traffic to a specific web page called a "Splash Page" where your often asked to login or purchase internet access. This is a clever way of doing things as most laptops will automatically connect to an open WiFi signal, then when a customer runs Internet Explorer (or which ever Web browser they use) they are sent to your splash page no matter what site they try to connect to.

Walled Garden.

When discussing Captive Portals the term "Walled Garden" is often used. This is a website or websites that a customer can connect to without paying. For example a customer connecting to your Hotspot will be diverted to the Splash Page. They will then be given a choice of paying for internet access or accessing free websites you have chosen, for example your Hotel website or local attractions websites.

Hosted Hotspot Services.

There are several companies offering business owners a hosted hotspot service. These services normally involve installing a modified Linksys WRT54GL router on the customer premises that redirect traffic to a splash page hosted by the hotspot company. The hosting company normally also processes payment for Internet access. These services normally work on a revenue sharing basis where the hosting company pay the hotspot owner a percentage of the income from the hotspot. Some companies also charge the hotspot owner a monthly fee for using their services.

DIY Captive Portals.

If you don't want to use a hosted hotspot solution there are a few options for a DIY Captive Portal. There are some commercial software packages that run on Windows or Linux PCs and act as a captive portal, with these the PC has to be turned on 24 hours a day. Another approach is to run the Hotspot software on the WiFi router itself, replacing the stock firmware with a Linux based OS such as OpenWRT or DD-WRT. The challenge here is to fit the software required on the small amount of memory available on a domestic router.



Article Source: http://EzineArticles.com/?expert=Chris_McGregor

Labels: ,

Tuesday, October 14, 2008

How to Fix a Msvcrt.dll Error

First of all we should see what is Msvcrt.dll. The Msvcrt.dll library file comprises a program code to enable programs written using Microsoft Visual to function correctly on your Windows system. The DLL provides basic features such as string comparison tools and mathematical operations, (such as trigonometric operations), to the programmers. Most computers contain this file. As many Windows components do, this file can generate some strange errors. We are going to discuss some common errors related to MSvcrt.dll and see some methods to repair these errors. But, in order to prevent such errors, all you have to do is install and run a registry cleaner on a daily basis. It is a easy and fast way of keeping away from errors.

If a program accessing the Msvcrt.dll is unable to find the procedure entry point in the file, you may receive error messages similar to the following when you start your Windows XP system:

* Lsass.exe: Entry Point Not Found
* The procedure entry point _resetstkoflw could not be located in the dynamic link library Msvcrt.dll
* Services.exe: Entry Point Not Found
* The procedure entry point _resetstkoflw could not be located in the dynamic link library Msvcrt.dll

When you select the OK button on the error message box, a blank desktop will be displayed on your screen. In this situation, although your mouse pointer will still be present and working, you will not have anything on the screen to click. Additionally, you will not be able to use your keyboard. These errors usually occur if the original Msvcrt.dll file on your system is replaced with a third-party file that does not include the _resetstkoflw function required to recover from stack overflow. To repair the issue of missing _resetstkoflw function, you will have to restore the original Msvcrt.dll file from the Windows XP installation CD-ROM. You can do this by performing the simple steps listed below:

1. Insert the Window XP installation CD-ROM in the CD drive and boot your PC from the CD-ROM
2. When the Welcome to Setup screen is displayed, press R to open Recovery Console
3. Next, press the number key that corresponds to the operating system installation you want to repair
4. Login using a user with administrative privileges to your system
5. Next, on the Recovery Console screen type the following commands and press Enter after each command to execute them
6. cd system32
7. ren msvcrt.dll msvcrt.bak
8. F:
9. cd i386
10. expand msvcrt.dl_ C:windowssystem32
11. exit

But, as we said at the start of the article, the best way to prevent such errors is to maintain a registry cleaner! These tools guard your system and make sure that your registry does not contain errors or any other malicious strings of data. Registry Easy is definitely a good choice. It is fast and makes the best out of your resources. It scans, fix, and repair your system in no time! Users are very satisfied with its friendly User Interface and power. It also comes stacked with many useful features to prevent many types of Windows errors.



Article Source: http://EzineArticles.com/?expert=Dor_Raba

Labels:

Gadgets and New Inventions - What to Look For

It can be declared without any hint of hesitation that mobile phone is the most happening gadget of this era. Gone are the days when mobile phones were just phones that are mobile. Today, it is a multi-purpose device that can be used as camera, video recorder, music player, remote control, radio, television, real-time map, and personal computer for surfing the internet. The list is incomplete as more and more functions are being added to the tiny handset at a frantic pace. But new gadgets and inventions are launched in several other fields also. The world of personal computer and the internet is another major breeding ground of such innovations. Brick and mortar business segments also witness useful innovations periodically.

Robots guided by artificial intelligence technology are attractive and useful gadgets. Such robots can wash your cloths, clean the floor, and do most of the household cleaning activities. The robot can do these works without the guidance of a human being. When this robot becomes popular and affordable, one can happily say goodbye to the servants. One will also need to find some other uses for washing machines, dishwashers, and vacuum cleaners.

A new invention that can potentially change the way we travel is what is known as easy glider. The traffic jams in the cities on Monday mornings can be added along with death and tax as the certainties in life. Many solutions have been proposed to solve the problem of traffic jam and resultant air pollution. Easy glider is one such solution. In simple terms, it is a roller-skating device that is powered electrically. You just need to stand on the device and guide it using the handle. Its manufacturers claim that the device can attain a maximum speed of 20 km/hour. It is definitely more than what your Ferrari can practically attain during rush hours.

The next interesting device is the USB connector. This is a gadget that any of us could have invented or at least imagined. The USB connector allows the user to connect two or more USBs, and the connected system works as a single USB unit. This is very helpful when one needs to store large volumes of data. This is particularly useful considering the fact that USBs with large storage capacity (say more than 5GB) are really expensive if you consider the rate per GB.

The last of interesting gadgets and inventions in this essay has the potential to permanently end a common cause of quarrel between married couple. Its name says it all: automatic opening and closing toilet bowl lid. Once this device is installed, a light sensor detects when person approaches the bowl and the lid automatically opens. Similarly, it closes automatically when the person leaves the place.

Wendy Pan is an accomplished niche website developer and author.



Article Source: http://EzineArticles.com/?expert=Wendy_Pan

Labels: ,