3 Main Causes of Kernel Errors

A kernel error is a failure in some code critical to Windows. If you have ever encountered a Blue Screen of Death (BSoD), then you have seen a kernel error. Windows is actually several layers of programs made to work together. You can think of Windows as if it were your body, with many pieces working together to make a whole, and, like your body, some parts of Windows are more important than others.

The kernel is the most important part of Windows. It includes critical programs to handle things like memory management and device drivers for the graphics card. These programs are like a body's heart and brain. If something in the kernel crashes, it will often cause all of Windows to crash.

Software Failures

Because there are a lot of programs in the kernel, there are many opportunities for bugs to appear. Although Microsoft does extensive testing to get rid of bugs, their testing facilities can not run through all the combinations that billions of computers use with Windows when some bugs get through.

However, many of the kernel failures are in device drivers written by companies that make hardware, not by Microsoft. Your graphics card, for example, probably uses a driver created by the video company. These companies often work with Microsoft to test their drivers, but having companies working together adds an additional layer of complexity.

Hardware Failures

A hardware failure can cause a kernel error. If your graphics card fails, it can send bad data to the graphics device driver, which then crashes, creating a kernel error. If your hard disk fails, it can corrupt files used by Windows and cause the programs that use those files to crash.

Registry Failures

Registry failures can cause kernel errors. The registry is a database of information that Windows uses to store information about programs. If the registry gets corrupt, the programs that use it can cause kernel errors.

Registry corruption can come from either software or hardware failures. Software corruption can come from a bug in one of the programs that writes information out to the registry. Or if you turn off your computer without doing a complete shutdown, the registry files may not get completely written to the disk. Hardware corruption can happen when the hard disk fails causing parts of the registry files to be lost. It's a good idea to do some research on kernel errors and other registry issues.

Posted in general | Comments Off on 3 Main Causes of Kernel Errors

Surviving Missing Futon Frame Hardware Nightmares

There seems to be quite a few of us who have owned a futon frame and ended up losing the connecting hardware at one time or another. I myself bought a futon from the retail store I worked in for a number of years back in the early 1990s when futons were all the rage. Maybe you purchased your futon in college, purchased it from a friend or maybe made the purchase for a family room. If you're lucky to live out your life in the same house or apartment there will never be a need to move your futon except except to a different room or location. Obtaining replacement futon frame hardware involves several steps approached in order to locate exactly what you need.

In the first place do not panic just yet. Without the hardware to attach everything back together you're in some serious trouble. However there are ways to obtain what you need. At this point we could explain the many benefits of using a small bag to contain the hardware and attach it to a part of the frame with heavy packing tape so it's easily found. Who am I kidding though? I've moved mine now about three times and each time I ended up missing a bolt, a barrel nut, a nylon roller here and there. Heck, I was lucky I had all the wood components show up at each new move let alone any hardware that happened to make it as well. Besides, is not moving your home stressful enough without having to keep track of a small bag of metal hardware among a sea of ​​furniture, clothing, dishes, toys and appliances?

Pursuing this further we must calmly step back and think for a moment. Yes, we're stressed out and fuming at either our spouse or the moving company for losing the futon hardware but we need to move past that now. To be sure the futon needs our help and we're the only ones who can do it at this point. It's time for us to go through the steps of obtaining replacement hardware and there is a specific order in which we do this to obtain the fastest results. I would suggest the following steps to start tracking down replacement hardware as soon as possible.

First – identify your futon frame.
Having worked retail, it's quite possibly the toughest situation when a customer comes into the store requiring assistance but can not identify the product to the salesperson or service individual when requesting parts. Granted you're going to have to do a little research by pulling your receipt when you bought the futon from the store and identify the model or name of the futon. If you inherited the futon, found it by the side of the road or bought it at a garage sale you're in for a tough road ahead. Fear not however as the internet can be used to help you find the design and attach a name to it for use in tracking down hardware. Be aware that there are dozens of manufacturers out there using different hardware in their frames including many that have since closed their doors. Hopefully the manufacturer of your frame is still around.

Second – speak to the retailer.
Of course if you purchased your futon frame through a local retail store it's time to head down there and see if they can track down the hardware for your frame. Bring your receipt. If you do not have a receipt, then bring an image of the futon frame with you. Hopefully the salesperson or service representative is knowledgeable about the products that they've carried in the past. Best case scenario, they either can provide you with the name of the manufacturer with contact information or have the parts on hand to get you back up and running. Worst case scenario the store you purchased it is out of business or if the store is still around they have no clue about the product anymore.

Third – search online.
Supposing we've hit the worse case scenario it's time to use the web to search for the manufacturer or the name of the style of futon you have. I'd suggest using Google, Bing or Yahoo and use the name adding the word futon to the search. If you were not able to locate a name you're going to have to become a very good spotter and sift through the many images of futon frames till you find one that is very close to what you have. Identify the name of the style and the manufacturer and then proceed to locate the manufacturer of the futon frame.

Fourth – speak to the manufacturer.
Assuming the retailer did not have parts but could identify the manufacturer for you then at least have something to go on. Perhaps you were able to locate your frame style through the search engines. Again, search online using the websites previously discussed using the name of the manufacturer. You'll likely get some online retail stores off of the search. Filter them out visually until you find a link for the manufacturer. Most do have websites, locate a contact phone number or email address and contact them for information on obtaining hardware. If you're unable to locate the manufacturer's website go ahead and contact one of the many futon stores that pop-up in the search results and email them with your issue and ask if they can either sell you hardware or point you in the right direction For finding the manufacturer in hopes of tracking down hardware.

Finally – the last resort.
If you were unable to determine the name of the futon frame or the name of the manufacturer you are indeed in a tight spot. At this point your options are limited to heading down to a hardware store and seeing if you can locate some generic parts that might get you back up and running. The problem will be in the way of connecting bolts and barrel nuts and getting the right lengths if available. I would suggest taking one of the wood arms and a stretcher rail with you to the store. Begin plugging in different bolts and nuts till you find a combination that connects correctly. You'll also need to track down connecting pins, washers and clips for the seat and back section as well as the four nylon rollers that most futon frames use on the back rest. If you're lucky these may still be attached to the backrest deck making your job a bit easier.

In conclusion we've discussed the issues presented with lost futon hardware and how to go about tracking down the hardware you need. Basically identify your frame through a receipt or spotting it online. Visit the retailer store you purchased it from and obtain parts through them if they are still open. If you purchased it privately or inherited the frame track down the manufacturer using a search engine of your choice and speak to them about ordering replacements. If you are not able to locate the manufacturer but have found stores online contact one of them to see if they can sell you hardware. If all else fails visit the local hardware store with your wood futon sections in hand and begin trying bolts and nuts till you find some that work. I sincerely hope you're able to obtain the needed hardware to get your futon frame back up and running. I wish you the best of luck to you and your futon.

Posted in general | Comments Off on Surviving Missing Futon Frame Hardware Nightmares

Best Windows 7 Optimizer That Can Stabilize and Improve Your Computer Performance

A system optimizer is a software designed to maintain the performance of your computer, fix software related problems and keep your computer stable and secure. The need of a system optimizer software in Microsoft Windows7 operating system is high. This is because Windows 7 itself is unable to maintain all the mentioned aspects without the help of third-party products.

We are going to learn what exactly Windows 7 optimizer software is.

The best Windows 7 optimizer software shall include all the following features:

1. Registry Cleaner to fix the registry related issues

2. System Cleaner to clean unnecessary stuff and free-up the disk space

3. Registry Defragmenter to defrag the system registry

4. Startup Manager to control the programs running when you turn on your computer

5. Backup & Restore feature to restore unfavourable registry changes

“Registry Cleaner” to Fix the Registry Related Issues

Windows Registry is a vital component in Microsoft Windows 7. It contains information stored by your operating system and installed software. For example, the default settings, changes you made to your computer, system information, runtime data, etc. are stored.

Registry Cleaner is a software that finds the junk entries in the registry, and repairs them as far as possible. Unfortunately, Windows 7 does not include a built-in registry cleaner. The registry cleaner software included in the best Windows 7 optimizer lets you scan the genuine registry problems and correct them. It thereby helps avoiding many runtime errors and problems, such as, File Not Found, etc.

“System Cleaner” to Clean Unnecessary Stuff and Free-Up the Disk Space

A System Cleaner software lets you find the files and stuff that have unnecessarily occupied the hard disk space.

The tasks, like installing a program, uninstalling, repairing or updating the existing programs, and even just running the installed programs many times create temporary files, log files that need not be kept after the corresponding operation is performed. Sadly, many programs do not itself delete such files and stuff and thus your hard disk space is used for such unproductive stuff. Using a system cleaner software included in best Windows 7 optimizer, you can easily and safely delete such temporary stuff.

“Registry Defragmenter” to Defrag the System Registry

You know the importance of the registry in Windows 7 operating system, as already discussed. The continuous access of a number of programs to the registry results in its fragmentation. It reduces the system performance and freezes your computer.

The best Windows 7 optimizer software includes a registry defragmenter that enables analyzing the registry fragmentation and afterwards defrags it. A reboot is required to perform this process and all other running programs and services must be terminated.

“Startup Manager” to Control the Programs when you Turn on your Computer

Running too many programs at the Windows startup, results in system freezing and slow performance. A Startup Manager, included in best Windows 7 optimizer, lets you monitor and control the programs that run each time your computer is started. It lets you disable or delete the unwanted program entries and enable only those who are necessary.

Backup & Restore Feature to Restore the Unfavourable Registry

While doing all the above steps, care must be taken that you have followed some precautionary measures first, so that any unfavourable registry change can be later restored and unwilling situations can be easily avoided. The best Windows 7 optimizer should include such a feature.

Best Windows 7 Optimizer Recommended by Worldwide Experts

Posted in general | Comments Off on Best Windows 7 Optimizer That Can Stabilize and Improve Your Computer Performance

Different Types of Computer Repair Services

Our dependency towards technology is increasing day by day. Even a minor problem in the operating system disrupts our life and hampers our work. With the development of new technology, there also comes many technical problems such as virus infections, spyware attacks on the operating system, networks issues, and hardware failures. Therefore, fast and efficient troubleshooters are always needed to fix all your technical problems without disabling your work.

With the indispensable use of computers in our daily lives, we can not imagine encountering an issue that will leave us without our personal computers thus; We seek to have the computer service immediately. But due to the busyness of life, it is not possible for us to go to a computer service centers every time and get the system repaired leaving you days without a computer. Seeing today's need, there are many efficient and fast troubleshooters available online that will solve your problem in a fraction of time. Many of us do not understand need for professional computer repair services and try to solve the system related problem by themselves. Before going to any of the computer repair service sites, it is very important to be aware of the various types of services that are offered by the computer repair service centers:

1. IT services like network installation and configuration (LAN / WAN setup).

2. Virus & spyware removal. Installation of anti-virus software for a proactive approach to external attacks.

3. Hardware repair: Laptop / Mac / PC, printer, scanner, motherboard; CD / DVD ROM installation etc.

4. Problems related to Website development and presentation, graphic designing

5. Firewall and email security setup.

6. Windows OS installation and troubleshooting

7. Data backup and recovery

8. Tutorials to employees for solving small problems in-house

So, These are some of the services offered by the service providers. Before hiring any of the online computer repair services, it is very important to check the various types of services offered by them. So that you do not need to switch to different computer repair services sites for different services. It is also very important to check that there is a team of expert technicians for solving computer related problems individually, as this will help in solving the problem fast and efficiently. It is better to switch to such online computer repair services that you avail with the guarantee of fixing the problem fast else money back. As such, promises will pressurize the technicians to work efficiently and fix the problem quickly.

Posted in general | Comments Off on Different Types of Computer Repair Services

Different Types of Hospitality Management Systems

Hospitality management systems are the software that runs your hospitality business. From the food ordering system in your restaurant, to online accommodation booking software, it enables efficient communication and management of your operation, ultimately increasing revenues.

With a range of hospitality management systems to choose from, understanding what is offered is important in order to find the right system that is tailored for your needs and budget. Depending on the type of operation you manage, you should consider the following systems, their advantages and suitability to your company.

Accommodation management software:

Accommodation software packages range from those aimed at B&Bs and small motel owners to ones for running big hotels, clubs and resorts. The basic package offers simple guest and room management, while the more complex ones cover every aspect needed to manage and run a big hotel chain. This includes reservations, service, retail, inventory, staff roster and training, accounting and much more.

Front desk: A front office software package should enable reception staff to keep track of all bookings, state of rooms, guest details and charges, coordinate restaurant reservations for guests, plan housekeeping duties and process guest check-in and check-out. They should also provide a means to communicate effectively with all travel agents and activity operators linked to the system. Features you should look out for include: Reports for arrivals & departures on a specific date. Guest ledger and reservation details, including activities and special requests. Room rates, discounts, package deals, group bookings, etc. Visual schematic of hotel rooms and status. Visual schematic of calendar with room availability. Facility for printing check-in cards for guests. Flexibility in re-assigning guests to different room. Facility to easily add charges to rooms from restaurants, spa, gift shop, etc. Incorporate all payment options upon check-out and print receipt. Print work roster for staff Facilities for storing guest history Communicate efficiently with reservation and travel agents

Housekeeping/maintenance software: Easy-to-use software for the housekeeping and maintenance departments of your accommodation place will increase the efficiency of cleaning and servicing of rooms. Main features of this module will be: Keeping track of room status – dirty, cleaned, inspected, check-ins and check-outs, etc. All information such as number of guests, number of beds, length of stay, special requests (e.g. baby cot, high chair) should be visible to both housekeeping staff and management. Staff can enter maintenance issues as they arise, and those are automatically sent to the maintenance department. Staff can request cleaning materials and toiletries ordered. Staff can keep track of laundry status for uninterrupted linen supply.

Online reservation system: This software package is essential to any accommodation place. It helps you increase direct online bookings instantly. Prospective guests can view hotel rooms (size, choice of beds), availability and prices, plus services and facilities offered. The systems should have instant confirmation of credit card payments or other secure online payment method. After payment of deposit and confirmation by email, guests should be able to login to view or change their reservation details. Cancellation policies should be stated, airport transport options mentioned.

Hospitality management systems for point of sale (POS) operations: This includes restaurants and bars, the hotel gift shop, spa, tour desk and other guest services. It should have the options of direct payment or charge to room. Apart from recording normal vending operations, it should include issuing daily transaction reports to management or the accounting office, and a daily revenue report.

In the POS sector there are many operating hospitality management systems catering for the food vendor sector, namely restaurants, cafés, takeaway shops and delis.

Restaurant (POS) management packages. For POS management packages, you have the choice of an off-the-shelf system for restaurants and cafes, where you can set the options that suit your operation, or a customised one, specifically configured for your business. Most systems are quite easy to use and are cost effective. Their features vary, but most offer the following: Order taking, tallying, and cashier options using a hand-held PDA system. Credit-card processing interface Receipts customized for your business. The more advanced systems also offer: Integrating all transactions with your accounting software. Full inventory/stocktaking facility Translation facilities to selected languages.

Administration software: This module is directed at top management and offers access to all levels of the organization. It provides instant access to the data base of all sectors, ensuring total transparency of operations Overseeing and early intervention by senior staff can prevent mistakes being made by inexperienced employees and save money and the reputation of your business. · Other facilities in this package may include:

Tools for setting different rate systems for rooms and services: daily, seasonal, special promotions, etc. Statistical data – percentage occupancy over set periods, and other data used for policy making and customized reports for board meeting presentations. Organizing promotions and package deals. Inventory for different departments. Employee accounts and employee training programs

Remember: with the high staff turnover common to the hospitality industry, it is important to choose a system that needs minimal training to use, and has ‘secure areas’, which only authorised personnel (with the proper clearance) may access and use.

Choosing and introducing hospitality management systems for your business is a significant undertaking, both operationally and financially. But once up and running, the system will increase efficiency, cut costs and improve the service in your company. You will have happier staff and happier guests, who will promote your business and ultimately increase your revenue.

Posted in general | Comments Off on Different Types of Hospitality Management Systems

Visualwize Chess Training Software: A Review

Chess enthusiasts of all levels are always seeking ways to improve their chess skills, so that they can win at chess games, whether they play professionally or socially.

One of the most effective ways to improve your chess skills is to use a chess visualization software, which enables you to practice and improve your visualization skills. Visualization is one of the most important skills you need to succeed in chess.

A program that is apparently gaining a lot of popularity and is helping many people to improve their chess is Visualwize Chess Training Software.

Let’s address the basic questions on this software.

What is it?

Visualwize is a chess training software that trains your ability to have a clear mental picture of chess moves before you make these moves on the board. This enables you to assess the implications of your moves before you make the actual moves. This therefore enables you to play better at chess, as you will be able to make the right decisions and avoid making some mistakes that would make you lost a game.

This program has 240 visualization training exercises which are designed to develop your visualization skills. It has and more than 1200 moves to visualize. These moves are real moves made by a master player in real chess games. With the software, you can train to visualize up to 8 moves ahead.

The program consists of 4 levels, level 1 being rather easy and level 4 being hard. You can order the level that suits your needs. For those who really want to significantly improve their skills, level 4, the complete program, is recommended.

How does it work – what does the program actually do?

In simple terms, the program shows a chess position from a game between two chess masters, and then, with arrows, it shows the next few moves that have been made in that position by the renowned chess masters. The arrows stop in a position where a tactic, i.e., a combination that wins the game exists.

Unlike other programs and books that use written annotations for the moves, this program uses arrows on the board. This means it reflects a realistic playing scenario, and you don’t have to take your attention and eyes from the board to read written annotations.

This is one major factor that separates this program from others that are available on the Internet today. Rather than building up the skill of moving your eyes between notation and the board, Visualwize trains you in the art of seeing unfolding moves without actually affecting the board.

On the website where the program is offered, there are many informative and short videos that you can watch, which describe how the program works.

Why is it important – what benefits can you get from this program?

It is recommended that chess players wanting to take their chess to the next level use this program because it offers several benefits:

  • You will be able to see more chess moves ahead, before you actually make any move on the board, giving you an opportunity to assess the consequences of every move before you make it.
  • You will avoid making mistakes which can make you lose a game in an instant.
  • You will make the most of your training time since you will be able to easily visualize the notation below chess diagrams.
  • You become an efficient and effective chess player – you won’t need to calculate variations several times over because you will be able to clearly the consequences of your move in your mind, saving you a lot of time.
  • You will make a wise investment that will help you significantly improve your chess – the program is favourably priced at only $30. If you were to hire a chess coach, you would pay a very high fee per hour of the coach’s time to train you.
  • It is convenient – once you purchase the program, you can train at any time of the day or night, as much as you want.

With several books and programs on how to improve chess, available today, Visualwize is considered to be a cut above the rest among many chess enthusiasts.

Posted in general | Comments Off on Visualwize Chess Training Software: A Review

Why Do We Need Software Engineering?

To understand the necessity for software engineering, we must pause briefly to look back at the recent history of computing. This history will help us to understand the problems that started to become obvious in the late sixties and early seventies, and the solutions that have led to the creation of the field of software engineering. These problems were referred to by some as “The software Crisis,” so named for the symptoms of the problem. The situation might also been called “The Complexity Barrier,” so named for the primary cause of the problems. Some refer to the software crisis in the past tense. The crisis is far from over, but thanks to the development of many new techniques that are now included under the title of software engineering, we have made and are continuing to make progress.

In the early days of computing the primary concern was with building or acquiring the hardware. Software was almost expected to take care of itself. The consensus held that “hardware” is “hard” to change, while “software” is “soft,” or easy to change. According, most people in the industry carefully planned hardware development but gave considerably less forethought to the software. If the software didn’t work, they believed, it would be easy enough to change it until it did work. In that case, why make the effort to plan?

The cost of software amounted to such a small fraction of the cost of the hardware that no one considered it very important to manage its development. Everyone, however, saw the importance of producing programs that were efficient and ran fast because this saved time on the expensive hardware. People time was assumed to save machine time. Making the people process efficient received little priority.

This approach proved satisfactory in the early days of computing, when the software was simple. However, as computing matured, programs became more complex and projects grew larger whereas programs had since been routinely specified, written, operated, and maintained all by the same person, programs began to be developed by teams of programmers to meet someone else’s expectations.

Individual effort gave way to team effort. Communication and coordination which once went on within the head of one person had to occur between the heads of many persons, making the whole process very much more complicated. As a result, communication, management, planning and documentation became critical.

Consider this analogy: a carpenter might work alone to build a simple house for himself or herself without more than a general concept of a plan. He or she could work things out or make adjustments as the work progressed. That’s how early programs were written. But if the home is more elaborate, or if it is built for someone else, the carpenter has to plan more carefully how the house is to be built. Plans need to be reviewed with the future owner before construction starts. And if the house is to be built by many carpenters, the whole project certainly has to be planned before work starts so that as one carpenter builds one part of the house, another is not building the other side of a different house. Scheduling becomes a key element so that cement contractors pour the basement walls before the carpenters start the framing. As the house becomes more complex and more people’s work has to be coordinated, blueprints and management plans are required.

As programs became more complex, the early methods used to make blueprints (flowcharts) were no longer satisfactory to represent this greater complexity. And thus it became difficult for one person who needed a program written to convey to another person, the programmer, just what was wanted, or for programmers to convey to each other what they were doing. In fact, without better methods of representation it became difficult for even one programmer to keep track of what he or she is doing.

The times required to write programs and their costs began to exceed to all estimates. It was not unusual for systems to cost more than twice what had been estimated and to take weeks, months or years longer than expected to complete. The systems turned over to the client frequently did not work correctly because the money or time had run out before the programs could be made to work as originally intended. Or the program was so complex that every attempt to fix a problem produced more problems than it fixed. As clients finally saw what they were getting, they often changed their minds about what they wanted. At least one very large military software systems project costing several hundred million dollars was abandoned because it could never be made to work properly.

The quality of programs also became a big concern. As computers and their programs were used for more vital tasks, like monitoring life support equipment, program quality took on new meaning. Since we had increased our dependency on computers and in many cases could no longer get along without them, we discovered how important it is that they work correctly.

Making a change within a complex program turned out to be very expensive. Often even to get the program to do something slightly different was so hard that it was easier to throw out the old program and start over. This, of course, was costly. Part of the evolution in the software engineering approach was learning to develop systems that are built well enough the first time so that simple changes can be made easily.

At the same time, hardware was growing ever less expensive. Tubes were replaced by transistors and transistors were replaced by integrated circuits until micro computers costing less than three thousand dollars have become several million dollars. As an indication of how fast change was occurring, the cost of a given amount of computing decreases by one half every two years. Given this realignment, the times and costs to develop the software were no longer so small, compared to the hardware, that they could be ignored.

As the cost of hardware plummeted, software continued to be written by humans, whose wages were rising. The savings from productivity improvements in software development from the use of assemblers, compilers, and data base management systems did not proceed as rapidly as the savings in hardware costs. Indeed, today software costs not only can no longer be ignored, they have become larger than the hardware costs. Some current developments, such as nonprocedural (fourth generation) languages and the use of artificial intelligence (fifth generation), show promise of increasing software development productivity, but we are only beginning to see their potential.

Another problem was that in the past programs were often before it was fully understood what the program needed to do. Once the program had been written, the client began to express dissatisfaction. And if the client is dissatisfied, ultimately the producer, too, was unhappy. As time went by software developers learned to lay out with paper and pencil exactly what they intended to do before starting. Then they could review the plans with the client to see if they met the client’s expectations. It is simpler and less expensive to make changes to this paper-and-pencil version than to make them after the system has been built. Using good planning makes it less likely that changes will have to be made once the program is finished.

Unfortunately, until several years ago no good method of representation existed to describe satisfactorily systems as complex as those that are being developed today. The only good representation of what the product will look like was the finished product itself. Developers could not show clients what they were planning. And clients could not see whether what the software was what they wanted until it was finally built. Then it was too expensive to change.

Again, consider the analogy of building construction. An architect can draw a floor plan. The client can usually gain some understanding of what the architect has planned and give feed back as to whether it is appropriate. Floor plans are reasonably easy for the layperson to understand because most people are familiar with the drawings representing geometrical objects. The architect and the client share common concepts about space and geometry. But the software engineer must represent for the client a system involving logic and information processing. Since they do not already have a language of common concepts, the software engineer must teach a new language to the client before they can communicate.

Moreover, it is important that this language be simple so it can be learned quickly.

Posted in general | Comments Off on Why Do We Need Software Engineering?

Examples Of Spyware And What They Are

Spyware is a general term used to describe software that performs certain behaviors such as advertising, collecting personal information, or changing the configuration of your computer, generally without appropriately obtaining your consent first.

Spyware is often associated with software that displays advertisements (called adware) or software that tracks personal or sensitive information.

That does not mean all software that provides ads or tracks your online activities is bad. For example, you might sign up for a free music service, but you “pay” for the service by agreeing to receive targeted ads. If you understand the terms and agree to them, you may have decided that it is a fair tradeoff. You might also agree to let the company track your online activities to determine which ads to show you.

Other kinds of Spyware make changes to your computer that can be annoying and can cause your computer slow down or crash.

These programs can change your Web browsers home page or search page, or add additional components to your browser you don’t need or want. These programs also make it very difficult for you to change your settings back to the way you originally had them.

The key in all cases is whether or not you (or someone who uses your computer) understand what the software will do and have agreed to install the software on your computer.

There are a number of ways Spyware or other unwanted software can get on your computer. A common trick is to covertly install the software during the installation of other software you want such as a music or video file sharing program.

Any software that covertly gathers user information through the user’s Internet connection without his or her knowledge, usually for advertising purposes. Spyware applications are typically bundled as a hidden component of freeware or shareware programs that can be downloaded from the Internet; however, it should be noted that the majority of shareware and freeware applications do not come with SpyWare. Once installed, the Spyware monitors user activity on the Internet and transmits that information in the background to someone else. Spyware can also gather information about e-mail addresses and even passwords and credit card numbers

Aside from the questions of ethics and privacy, SpyWare steals from the user by using the computer’s memory resources and also by eating bandwidth as it sends information back to the spy ware’s home base via the user’s Internet connection. Because SpyWare is using memory and system resources, the applications running in the background can lead to system crashes or general system instability.

Because SpyWare exists as independent executable programs, they have the ability to monitor keystrokes, scan files on the hard drive, snoop other applications, such as chat programs or word processors, install other SpyWare programs, read cookies, change the default home page on the Web browser, consistently relaying this information back to the SpyWare author who will either use it for advertising/marketing purposes or sell the information to another party.

Licensing agreements that accompany software downloads sometimes warn the user that a SpyWare program will be installed along with the requested software, but the licensing agreements may not always be read completely because the notice of a SpyWare installation is often couched in obtuse, hard-to-read legal disclaimers.

Examples of SpyWare

These common SpyWare programs illustrate the diversity of behaviors found in these attacks. Note that as with computer viruses, researchers give names to SpyWare programs which may not be used by their creators. Programs may be grouped into “families” based not on shared program code, but on common behaviors, or by “following the money” of apparent financial or business connections. For instance, a number of the SpyWare programs distributed by Claria are collectively known as “Gator”. Likewise, programs which are frequently installed together may be described as parts of the same SpyWare package, even if they function separately.

o CoolWebSearch, a group of programs, takes advantage of Internet Explorer vulnerabilities. The package directs traffic to advertisements on Web sites including coolwebsearch.com. It displays pop-up ads, rewrites search engine results, and alters the infected computer’s hosts file to direct DNS lookups to these sites.

o Internet Optimizer, also known as DyFuCa, redirects Internet Explorer error pages to advertising. When users follow a broken link or enter an erroneous URL, they see a page of advertisements. However, because password-protected Web sites (HTTP Basic authentication) use the same mechanism as HTTP errors, Internet Optimizer makes it impossible for the user to access password-protected sites.

o Zango (formerly 180 Solutions) transmits detailed information to advertisers about the Web sites which users visit. It also alters HTTP requests for affiliate advertisements linked from a Web site, so that the advertisements make unearned profit for the 180 Solutions Company. It opens pop-up ads that cover over the Web sites of competing companies.

o HuntBar, aka WinTools or Adware,WebSearch was installed by an ActiveX drive-by download at affiliate Web sites, or by advertisements displayed by other SpyWare programs-an example of how SpyWare can install more SpyWare. These programs add toolbars to IE, track aggregate browsing behavior, redirect affiliate references, and display advertisements.

oZlob Trojan or just Zlob, Downloads itself to your computer via ActiveX codec and reports information back to Control Server. Some information can be as your search history, the Websites you visited, and even Key Strokes.

Posted in general | Comments Off on Examples Of Spyware And What They Are

Wide Area Network (WAN)

Types and Characteristics of WANs

What is a WAN?

There are two prevailing definitions of a Wide Area Network (WAN). The book definition of a WAN is a network that spans large geographical locations, typically to interconnect multiple Local Area Networks (LANs). The practical definition of a WAN is a network that traverses a public network or commercial carrier, using one of several WAN technologies

What are its Main Components?

The main components for a WAN are routers, switches and modems. These components are described below in the hardware section.

CPE – Devices on the subscriber contracts are called customer premises equipment (CPE).
The subscriber owns the CPE or leases the CPE from the service provider. A copper or fiber cable connects the CPE to the service provider's nearest exchange or central office. This cabling is often called the local loop, or "last-mile".

DTE / DCE – Devices that put data on the local loop are called data circuit-terminating equipment, or data communications equipment (DCE). The customer devices that pass the data to the DCE are called data terminal equipment (DTE). The DCE primarily provides an interface for the DTE into the communication link on the WAN cloud.

Hardware

In a WAN you will need various types of hardware components for it to function. The typical items of hardware that you will need in a WAN are:

Router – An electronic device that connects a local area network (LAN) to a wide area network (WAN) and handles the task of routing messages between the two networks. Operates at layer 3, and makes decisions using IP addresses.

Switch – A switch is a network device that selects a path or circuit for sending a unit of data to its next destination. Operates at layer 2, and uses MAC addresses to send data to correct destination.

Modem – Short for modulator / demodulator, a modem that enables a computer to communicate with other computers over telephone lines. Operates at layer 1, where signals are converted from digital to analogue and vice versa for transmission and receiving.

Wan Standards

WANs operate within the OSI model using layer 1 and layer 2 levels. The data link layer and the physical layer. The physical layer protocols describe how to provide electrical, mechanical and functional connections to the services provided by the ISP. The data link layer defines how data is encapsulated for transmission to remote sites.

Encapsulation

Encapsulation is the wrapping of data in a particular protocol header. Remember that WANs operate at the physical layer and the data link layer of the osi model and that higher layer protocols such as IP are encapsulated when sent across the WAN link. Serial interfaces support a wide range of WAN encapsulation types, which must be manually specified. These types include SDLC, PPP, Frame delay etc. Regardless of WAN encapsulation used it must be identical on both sides of the point to point link.

Packet and Circuit Switching

Circuit switching and packet switching are both used in high-capacity networks.
The majority of switched networks today get data across the network
Through packet switching.

Circuit-switching is more reliable than packet-switching. Circuit switching is old and expensive, packet switching is more modern.

General Routing Issues

What is a Routing Protocol?

A routing protocol is a protocol that specifies how routers communicate and exchange information on a network. Each router has prior knowledge of its immediate neighbors and knows the structure of the network topology. The routers know this because the routing protocol shares this information.

Protocol

RIP (Routing Information Protocol) was one of the most commonly used protocols on internal networks. Routers use RIP to dynamically adapt changes to the network connections and communicate information about which networks routers can reach and the distance between them. RIP is sometimes said to stand for Rest in Pieces in reference to the reputation that RIP has for breaking unexpectedly and rendering a network unable to function.

Routing Algorithms

Distance Vector

This type of routing protocol requires that each router simply inform its neighbors of its routing table. The distance vector protocol is also known as the bellman-ford algorithm.

Link State

This type of routing protocol requires that each router maintain a partial map of the network. The link state algorithm is also know as Dijkstra's algorithm.

IGRP

IGRP is a type of distance vector routing protocol invented by cisco used to exchange routing data in a autonomous system. Distance vector protocols measure distances and compare routes. Routers that use distance vector must send all or a portion of their routing table in a routing update message at regular intervals to each neighbor router.

Addressing and Routing

What does routing mean?

Routing is the process of deciding how to move packets from one network to another.
The directions also known as routes can be learned by a router using a routing protocol then the information is passed from router to router along the route of the destination.

IP Address's

Every machine connected to the internet is assigned an IP address. An example of an IP address would be 192.168.0.1. IP addresses are displayed in decimal format to make it easier for humans to understand but computers communicate in binary form. The four numbers that separate an IP address are called Octets. Each position consists of eight bits. When added to together you get 32 ​​bit address. The purpose of each octet in an IP address is to create classes of IP addresses that can be assigned within a network. There are three main classes that we deal with Class A, B and C. The octets of an IP address are split into two parts Network and Host. In a class A address the first octet is the network portion, this determinates which network the computer belongs to, the last octets of the address are the hosts that belong to the network.

Sub netting

Sub netting allows you to create multiple networks within a class A, B or C address. The subnet address is the address used by your LAN. In a Class C network address you would have a subnet mask of 255.255.255.0. A subnet mask identifies which portion is network and which is host. For example 192.168.6.15 the first octet three octets are the Network address and the last octet being the host (Workstation). It is important to subnet a network because gateways need to forward packets to other LANS. By giving each NIC on the gateway an IP address and a Subnet mask it allows the gateways to route packets from LAN to LAN. Once the packet arrives at its destination, the gateway then uses the bits of the subnet portion of the IP address to decide which LAN to send the packets.

Circuit Switched Leased Lines

A circuit switched network is one that establishes a dedicated circuit (or channel) between nodes and terminals before the users may communicate. Here are some terminologies associated with a Circuit switched network.

Frame relay is a telecommunication service designed for cost-efficient data transmission between local area networks (LANs)

Basic rate interference is a service used by small business for internet connectivity. An ISDN BRI provides two 64 Kbps digital channels to the user.
Primary rate interface (PRI) is a telecommunications standard for carrying voice and data transmissions between two locations
All data and voice channels are ISDN and operate at 64kbit / s

Packet Switching

Http://www.raduniversity.com/networks/2004/PacketSwitching/main.htm – _Toc80455261

Packet switching refers to protocols in which messages are broken up into small packets before they are sent. Each packet is then transmitted over the Internet. At the destination the packages are reassembled into the original message. Packet switching main difference from Circuit Switching is that that the communication lines are not dedicated to passing messages from the source to the destination. In Packet Switching, different messages can use the same network resources within the same time period.

Http://en.wikipedia.org/wiki/Asynchronous_Transfer_Mode

Asynchronous Transfer Mode (ATM) is a cell relay, packet switching network and protocolwhich encodes data into small fixed-sized cells.

ISDN is used to carry voice, data, video and images across a telephone network. ISDN stands for integrated services Digital Network. Isdn also provides users with a 128kbps bandwidth. This is done through frame relay. Frame relay complements and provides a service between ISDN, which offers bandwidth at 128 Kbps and Asynchronous Transfer Mode which operates in somewhat similar fashion to frame relay but at speeds from 155.520 Mbps or 622.080 Mbps. Frame relay is based on the older X.25 packet switching technology and is used to transmit analogue signals such as telephone conversations.

PSDN stands for packet switched data network and is a data communication network. Packet switched networks do not establish a physical communication signal like the public telephone circuit (circuit switched network) Packets are sent on a fixed length basis and assigned with a source and a destination address. The packages then explicitly on the routers to read the address and route the packets through the network.

Mobile and Broadband Services

Digital Subscriber Line (DSL) is mainly used to bring high bandwidth connections to homes and small business's over a copper wire telephone line. This is can only be achieved if you stay within the range of the telephone exchange. DSL offers download rates of up to 6mbps allowing continuous transmission of video, audio and 3D effects. DSL is set to replace ISDN and compete with the cable modem in providing multimedia to homes. DSL works by connecting your telephone line to the telephone office over copper wires that are twisted together.

Asymmetric Digital Subscribers Line is most commonly used for home users. It provides a high download speed but a lower upload speed. Using ADSL, up to 6.1 megabits per second of data can be sent downstream and up to 640 Kbps upstream.

Http://en.wikipedia.org/wiki/Symmetric_Digital_Subscriber_Line

Symmetric Digital Subscriber Line is a digital subcriber line which runs over one pair of copper wires. The main difference between ADSL and SDSL is the difference in upload and download speeds. SDSL allows the same upstream data rate and downstream data rate as ADSL upstream can be very slow.

[Http://searchnetworking.techtarget.com/sDefinition/0],,sid7_gci558545,00.html

HDSL High bit-rate Digital Subscriber Line, one of the earliest forms of DSL, is used for wideband digital transmission within a corporate site and between the telephone company and a customer. The main characteristic of HDSL is that that provides equal bandwidth in both directions.

IDSL is a system in which data is transmitted at 128 Kbps on a regular copper telephone line from a user to a destination using digital transmission.

The Local Loop enables operators to connect directly to the consumer via copper local loops and then add their own equipment to offer broadband and other services. This process involves operators accessing local exchange buildings to connect to a network of copper lines which connect them to homes and businesses. BT is an Example of a Local Exchange. The local loop connecting the telephone exchange to most subscribers is capable of carrying frequencies well beyond the 3.4 kHz upper limit.

Benefits of using DSL

DSL can provide a virtual instantaneous transmission of voice, data and video over ordinary copper phone lines. A DSL connection can eliminate delays while waiting to download information and graphics from the Internet. It provides users with a cost effective high speed Internet connection. Another benefit is that a DSL connection is always on-line (like a LAN connection) with no waiting time for dialing or connecting.

There are now more than 10 million broadband connections in the UK. By December 2005 there were 9.792 million broadband connections in the UK and the average broadband take up rate during the three months to December was more than 70,000 per week.

Posted in general | Comments Off on Wide Area Network (WAN)

Corel DRAW – Best Desktop Publishing Software

Corel DRAW is a supreme supplier of graphics software, including the popular Corel DRAW program. Corel DRAW has tools that allow the user to both create and edit images. The type of desktop publishing tools that you use will depend on the type of project. For more information and assistance, use the Corel website.

Corel DRAW is the best Desktop publishing software that empowers users to create illustrations containing graphics, text and photographs. Corel has an extensive range of tools which enable the user to edit any shape or character with ease and precision, fit text to curves and create custom color separations. It is developed and marketed by Corporation of Ottawa. This tool can open files: Adobe PageMaker, Microsoft Publisher and Word, and other programs can print documents to Adobe PDF using the Writer printer driver, which such software can then open and edit every aspect of the original layout and design.

Several innovations to vector-based illustration originated with Corel: a node-edit tool that operates differently on different objects, fit text-to-path, stroke-before-fill, quick fill/stroke color selection palettes, perspective projections, mesh fills and complex gradient fills.

One of this software’s many strengths is the huge range of over 1,000 fonts that it comes with, provided in both TrueType and Postscript Type 1 format. Corel differentiates itself from its opponent in a number of ways: The first is its positioning as a graphics suite, rather than just a vector graphics program. A full range of editing tools allow the user to adjust contrast, color balance, change the format from RGB to CMYK, add special effects such as vignettes and special borders to bitmaps. Bitmaps can also be edited more extensively using Corel PhotoPaint, opening the bitmap directly from Corel and returning to the program after saving. It also allows a laser to cut out any drawings.

Expert believed it was the first of the Windows-based drawing programs and has built on this early start to become far-and-away the dominant drawing package on the PC. Its biggest strength – and its biggest potential limitation – is its all-encompassing approach. In the past this has led to accusations of unfocused bloating, but with version 7.0 Corel has addressed the criticisms with a far tighter and better rationalized program. Even so, there’s a huge range of functionality to cover.

Corel DRAW Download was originally developed for Microsoft Windows and currently runs on Windows XP, Windows Vista, and Windows 7. The current version, X5, was released on 23 February 2010.

Posted in general | Comments Off on Corel DRAW – Best Desktop Publishing Software