tag:blogger.com,1999:blog-15613546273002284692024-03-12T21:48:24.060-07:00My Computer Technologydenysutanihttp://www.blogger.com/profile/17114943597593437284noreply@blogger.comBlogger621125tag:blogger.com,1999:blog-1561354627300228469.post-64115351897330244562009-01-18T03:03:00.000-08:002009-01-18T03:16:51.512-08:0030 Website to Download Freeware ApplicationBelow is the list of website where you can find many freeware application. I hope this can help to decrease piracy. <br /><br />1. FreewareFiles.com<br /><a href="http://www.freewarefiles.com">http://www.freewarefiles.com</a><br />game, browser web, screensaver, driver, desktop, spyware<br /><br />2. Nonags<br /><a href="http://www.nonags.com">http://www.nonags.com</a><br />All about freeware<br /><br />3. Freeware Home<br /><a href="http://www.freewarehome.com">http://www.freewarehome.com</a><br />All about freeware<br /><br />4. Free Downloads Center<br /><a href="http://www.freedownloadscenter.com">http://www.freedownloadscenter.com</a><br />game, video, program antivirus,wallpaper<br /><br />5. PortableApps.com<br /><a href="http://portableapps.com">http://portableapps.com</a><br />Portabel application<br /><br />6. SofoTex Downloads<br /><a href="http://www.sofotex.com">http://www.sofotex.com</a><br />PC utilities, games, screen savers<br /><br />7. Completely Free Software<br /><a href="http://www.completelyfreesoftware.com">http://www.completelyfreesoftware.com</a><br />Freeware Windows and DOS<br /><br />8. MyZips.com<br /><a href="http://www.myzips.com">http://www.myzips.com</a><br />All about freeware and shareware<br /><br />9. Programfiles.com<br /><a href="http://www.programfiles.com">http://www.programfiles.com</a><br />All about freeware and shareware<br /><br />10. FreewareWeb.com<br /><a href="http://www.freewareweb.com">http://www.freewareweb.com</a><br />All about freeware and shareware<br /><br />11. GameHippo<br /><a href="http://www.gamehippo.com">http://www.gamehippo.com</a><br />All about freeware game<br /><br />12. TinyApps.org<br /><a href="http://www.tinapps.org">http://www.tinapps.org</a><br />All about small freeware application<br /><br />13. Freeware Guide<br /><a href="http://www.freeware-guide.com">http://www.freeware-guide.com</a><br />All about freeware <br /><br />14. TopDownloads<br /><a href="http://www.topdownloads.net">http://www.topdownloads.net</a><br />Game, screen savers, wallpapers, and many others<br /><br />15. Open Universe<br /><a href="http://www.openuniverse.org"><br />http://www.openuniverse.org</a><br />Freeware simulator <br /><br />16. Files32.com<br /><a href="http://www.files32.com">http://www.files32.com</a><br />All about freeware and shareware<br /><br />17. Pricelessware<br /><a href="http://www.pricelessware.org">http://www.pricelessware.org</a><br />Best windows freeware application<br /><br />18. ACME Laboratories<br /><a href="http://www.acme.com">http://www.acme.com</a><br />Utiliti and tool for Unix and java<br /><br />19. ABF-SOFT.com<br /><a href="http://www.abf-soft.com">http://www.abf-soft.com</a><br />All about freeware and shareware<br /><br />20. Only Freeware<br /><a href="http://freeware.intrastar.net/">http://freeware.intrastar.net/</a><br />All about freeware <br /><br />21. SGI<br /><a href="http://www.sgi.com/fun/freeware/games.html">http://www.sgi.com/fun/freeware/games.html</a><br />Freeware game <br /><br />22. AnalogX<br /><a href="http://www.analogx.com/contents/download.htm">http://www.analogx.com/contents/download.htm</a><br />More than 5000 windows application <br /><br />23. DriversHeadquarters<br /><a href="http://www.drivershq.com">http://www.drivershq.com</a><br />All about freeware driver<br /><br />24. Mihov Freeware<br /><a href="http://www.mihov.com/eng/">http://www.mihov.com/eng/</a><br />All about freeware and shareware and image<br /><br />25. Freeware Directory<br /><a href="http://freewaredirectory.net">http://freewaredirectory.net</a><br />All about freeware and direct link<br /><br />26. Driverfiles<br /><a href="http://www.driverfiles.net">http://www.driverfiles.net</a><br />All about freeware driver and DLL<br /><br />27. Top Quality Freeware<br /><a href="http://www.topqualityfreeware.com">http://www.topqualityfreeware.com</a><br />Freeware application include game PC, icon, desktop, themes, image and internet utility <br /><br />28. The Free Site<br /><a href="http://www.thefreesite.com/free_software/">http://www.thefreesite.com/free_software/</a><br />All about freeware<br /><br />29. Freeware Network<br /><a href="http://www.fwnetwork.com">http://www.fwnetwork.com</a><br />All about freeware <br /><br />30. Free Software 4 All<br /><a href="http://www.freesoftware4all.co.uk">http://www.freesoftware4all.co.uk</a><br />List of good freeware applicationdenysutanihttp://www.blogger.com/profile/17114943597593437284noreply@blogger.com0tag:blogger.com,1999:blog-1561354627300228469.post-42440566086794397112009-01-18T00:20:00.000-08:002009-01-18T00:22:06.473-08:00Using Cursor at DB2After Stored Procedure, we will learn about how to use Cursor. Output with Cursor or without Cursor will be the same. The differences is just a the process. With Cursor we lock at 1 row only, without cursor we will lock all record.<br /><br />The advantage of using Cursor<br />- only lock 1 row<br />- there are an operation that must use Cursor<br /><br />The disadvantage of using Cursor<br />- it become more complex<br /><br />For example if we want to make a Stored Procedure to update salary depends on job. There are 2 ways that we can do, Stored Procedure with an without Cursor.<br /><br />This is the Stored Procedure without Cursor, the easier way.<br /><br />------------------------------------------------------------<br />create procedure proc_2(in bonus double,in work varchar(10))<br />dynamic result sets 1<br />p1: begin<br />update staff set salary = salary + bonus where job= work;<br />end p1<br />------------------------------------------------------------<br /><br />This is the screen shoot<br /><a href="http://img99.imageshack.us/my.php?image=sp2kg3.jpg" target="_blank"><img src="http://img99.imageshack.us/img99/6928/sp2kg3.th.jpg" border="0" alt="Free Image Hosting at www.ImageShack.us" /></a><br /><br /><br />This is the Stored Procedure without Cursor, more complicated query.<br /><br />------------------------------------------------------------<br />create procedure proc_1(in bonus double,in work varchar(10))<br />dynamic result sets 1<br />p1: begin<br />declare now_salary double;<br />declare c1 cursor with return for<br />select salary from staff where job=work;<br />open c1;<br />fetch from c1 into now_salary;<br />close c1;<br />set now_salary = now_salary + bonus;<br />update staff set salary = now_salary where job= work;<br />end p1<br />------------------------------------------------------------<br /><br />This is the screen shoot<br /><a href="http://img528.imageshack.us/my.php?image=sp3fm1.jpg" target="_blank"><img src="http://img528.imageshack.us/img528/2853/sp3fm1.th.jpg" border="0" alt="Free Image Hosting at www.ImageShack.us" /></a><br /><br />You can run this Stored Procedure at DB2cmd. Just write this command.<br />"db2 call proc_2(100.0,'Mgr')", but don't forget to connect to the DBMS first.denysutanihttp://www.blogger.com/profile/17114943597593437284noreply@blogger.com0tag:blogger.com,1999:blog-1561354627300228469.post-77836232235194441322009-01-17T23:40:00.000-08:002009-01-18T00:03:25.634-08:00Make Stored Procedure at DB2To make a Stored Procedure with IBM Data Studio, you can follow this step by step tutorial<br />1. Open IBM Data Studio<br />2. Choose file -> new -> data development project<br />3. Give a project name, for example Project2<br />4. Choose "Use an existing connection". Click Finish<br />5. At Data Project Explorer will show Project2<br />6. Right click at Proejct2 -> new -> Stored Procedure<br />7. Give a Stored Procedure name, for example PROC_3. Choose next<br />8. At statement detail, change with the query that you want. Click next<br />9. Click next<br />10. Choose the specific name. This is an alias name for Stored Procedure.<br />11. Click Finish<br /><br />This is the query generated by IBM Data Studio<br />CREATE PROCEDURE PROC_3 ( )<br />DYNAMIC RESULT SETS 1<br />------------------------------------------------------------------------<br />-- SQL Stored Procedure<br />------------------------------------------------------------------------<br />P1: BEGIN<br />-- Declare cursor<br />DECLARE cursor1 CURSOR WITH RETURN FOR<br />SELECT *<br />FROM EMPLOYEE;<br /><br />-- Cursor left open for client application<br />OPEN cursor1;<br />END P1<br /><br /><br />If you want to run it. First right click the Stored Procedure, then choose Deploy, after that choose run. You can see the output at the right below corner.<br /><br />This is the screenshot<br /><br /><a href="http://img443.imageshack.us/my.php?image=sp1ui9.jpg" target="_blank"><img src="http://img443.imageshack.us/img443/7237/sp1ui9.th.jpg" border="0" alt="Free Image Hosting at www.ImageShack.us" /></a><br /><br />Or you can run it from DB2cmd. Just write this command.<br />"db2 connect to sample" then "db2 call proc_3()"<br /><br />Best regards,<br /><br />Deny Sutanidenysutanihttp://www.blogger.com/profile/17114943597593437284noreply@blogger.com0tag:blogger.com,1999:blog-1561354627300228469.post-44446937150177521282009-01-17T08:04:00.000-08:002009-01-17T08:05:25.861-08:00Access Control: An Introduction To Access ControlThe Problem<br /><br />Your building is secure at night, but during the day there are several doors that have to be open. Anybody could walk in. What can you do?<br /><br />The Solution<br /><br />You need an Access Control System.<br /><br />What is an Access Control System?<br /><br />Access Control is an electronic security system which permits or restricts access to specific areas of a premises. It not only protects property against unwanted visitors but ensures the safety of both the property and of the people inside.<br /><br />In simple terms, an Access Control System provides control of entry (or exit) through nominated doors via a control panel and some form of electric locking facility.<br /><br />An Access Control System can be as simple or as complicated as you wish but in each case, the solution will always provide an easy passage for permitted persons around the building.<br /><br />Door Entry or Access Control?<br /><br />Door entry is commonly associated with a single door or gate, whereas access control is more suited to multiple doors or entry points.<br /><br />Access Control can also incorporate a host of other features which enhance other areas of the business.<br /><br />Access Control / Door Entry Technology<br /><br />There are a number of ways that a permitted user can open a door that is fitted with a system.<br /><br />PIN Code Entry<br /><br />The most common unit is the keypad system. This comprises a control unit with a series of numbered push buttons, or a touch-sensitive pad, connected to the lock release mechanism via a control unit located at the entrance.<br /><br />Magstripe (also called Swipe Card) Readers<br /><br />Each entry point has a card reader and the user “swipes” an encoded card similar to a credit card to gain entry.<br /><br />This technology is widely used and there are many choices of manufacturers.<br /><br />Proximity Readers<br /><br />Rather than swiping the card or tag, it is simply presented to a reader which typically will see the card at a distance of about 100mm. This is a fast, non-contact, method of entry.<br /><br />Long Range Readers<br /><br />Long range proximity readers (of approximately a meter or so) automatically unlock or open a door when it detects the card.<br /><br />This is particularly suitable for compliance with the Disability Discrimination Act (DDA) as no action is required by the card bearer.<br /><br />Smartcard Readers<br /><br />For systems that use cards or tags, these cards can also carry additional information which can be used for other building services – – for example, time and attendance functions, integration with payroll systems, car park management and even vending machine applications.<br /><br />Biometric Readers<br /><br />A Biometric Reader system uses unique human characteristics – such as finger prints or a retina scan – to clearly identify those who are permitted access.<br /><br />As there are no cards or tags which can be stolen or lost, or open to misuse, this type of system significantly increases the level of security.<br /><br />What about Visitors?<br /><br />You will want to welcome most of those who visit your premises, so it must be easy for them to let you know they are there.<br /><br />The three most common means of attracting attention are:<br /><br />• A simple door bell system which alerts your staff to the fact that there is someone waiting outside.<br /><br />• An audio intercom panel which allows the visitor to have a direct conversation with a member of your staff and, if appropriate, the door can be remotely released.<br /><br />• An audio intercom panel with a camera facility which allows your staff to see who wants to enter the building before permitting access.<br /><br />Once access has been permitted, the visitor can either be escorted around or issued with a card or pin number for the duration of their visit.<br /><br />Things to Consider<br /><br />When planning an access control system, you should consider the following:<br /><br />• How many entry/exit points<br />• Where are these located><br />• Level of security desired<br />• The movement of staff around the building<br />• Method of operation<br />• Future growth of building<br />• Turnover of employees<br />• Disability access<br />• Interface with other systems – for example, the fire alarm<br /><br />As with any type of security system, it is sensible to employ a company that you can trust. Make sure you use a NSI (NACOSS) approved organisation; this will ensure that your system will be designed and installed by professionals.denysutanihttp://www.blogger.com/profile/17114943597593437284noreply@blogger.com0tag:blogger.com,1999:blog-1561354627300228469.post-62913253919253547862009-01-17T08:03:00.000-08:002009-01-17T08:04:38.061-08:00Accelerator Software Provides a Faster DownloadOver half of all households that connect to the Internet have a broadband connection these days, mostly cable or DSL. Which means the other half does not and still uses dial-up. Modems are much faster than they used to be in the early days of computing, but today's websites are larger and require a lot of bandwidth to load quickly. To make matters worse for those on slower connections, even simple software updates are now often dozens of megabytes and can take a long time to download. What it all means is that modem users need a break!<br /><br />Fortunately, there are things that can be done to make a connection faster. You see, the operating system software on today's computers is not optimized for fast downloads. Microsoft's primary goal is simply to make sure Windows works with all the different hardware out there. Compatibility is important, of course, but it can be frustrating when things just don't work as well as they should.<br /><br />But not everything is your computer's fault. Your Internet service provider, too, is primarily concerned with reliability (good), compatibility (good), and moving as much traffic as possible with as little investment as possible (not so good). Further, while the Internet moves at electronic speed, not all connections are equal. You may have noticed that downloading pictures from the same exact website is sometimes faster and other times much slower. That may be because the server is very busy, but it can also be because your connection is taking some detours instead of directly getting on the highway.<br /><br />What does it all mean? It means that between hardware and software designed for compatibility rather than performance, and Internet connections that may not necessarily favor individual dial-up customers, you may simply not get the speed your computer is capable of and that you are paying for. This is bad news for those who frequently download movies, music or pictures.<br /><br />Fortunately, there are solutions, and I don't mean getting a new computer or waiting until you have broadband access. One such solution is download accelerators. They can greatly increase the speed and reliability of your downloads. How do they do it? By optimizing the way your computer works and by making sure your data downloads the fastest and most direct route possible. With a download accelerator, you are no longer at the mercy of some remote traffic routing computer. Instead, the accelerator in your own system determines the best way to download data as quickly and efficiently as possible.<br /><br />But speed is not the only benefit of a good download accelerator. How often has it happened to you that a connection times out or is interrupted before a file has downloaded completely? Probably quite often. And then you have to start all over. A download accelerator will keep track of things and will simply pick up where you left off if a connection gets dropped. Imagine how much time you save.<br /><br />The bottom line is clear. You have better things to do than wait for downloads to complete. If you want to regain control of your Internet connection, accelerate downloads and restore, or just web browsing in general, a good accelerator is invaluable.denysutanihttp://www.blogger.com/profile/17114943597593437284noreply@blogger.com0tag:blogger.com,1999:blog-1561354627300228469.post-48342097847285868902009-01-17T07:24:00.000-08:002009-01-17T07:26:22.297-08:00Global WarmingBrowsing, chatting and all other internet activities make a carbon polution. Every time we use Google service we have contributed on global warming. This is happened because every time we turn on the computer, it will use electricity.<br /><br />Physician from Havard University, Alex Wissner-Gross concluded that every time google search engine work, it make 7 grams of carbon. It means when we make 10 search, then it will produce 70 grams of carbon. <br /><br />This calculation based on carbon emissions from the consumption of electricity needed to power the computer users and the Google data center that operates around the world. Using large energy means more carbon dioxide emissions considering almost electricity that is used currently based fossil energy sources.<br /><br />Google said it's true that every time they make a search it will produce a carbon polution, but it is only cost 0,0003 kWh or 0,2 gram of carbon. Google claims that the result is too high. Moreover Google has make Climate Savers Computing Initiative to lower the use of energy in the consumer level to half of 2010 and began to decrease carbon dioxide emissions 54 million tons per year.denysutanihttp://www.blogger.com/profile/17114943597593437284noreply@blogger.com0tag:blogger.com,1999:blog-1561354627300228469.post-76016867321229570142009-01-17T03:27:00.000-08:002009-01-17T03:30:47.273-08:00How to Install IBM Data StudioThis is the step by step to install IBM data studio<br />1. Open drive:\Installer\DB installer2_Install\IBM Data Studio\Windows<br />2. Extract IBM_data_studio_v111_win file<br />3. Click setup.exe.<br />4. Choose Install IBM Data Studio. <br />5. Tick all checkbox then click next.<br />6. Choose I accept the aggrement then click next<br />7. Choose create a new package group then choose your preferred path, then click next<br />8. If you have alreday had Eclipse, try yo use Extend and existing Eclipse.<br />9. Choose your preferred language.<br />10. Choose feature that you want to be installed.<br />11. IBM instalation manager will install IBM data studio to your computer, just sit relax <br />12. Finish and you can use IBM data studio right now.<br /><br />Best regards,<br /><br />Deny Sutanidenysutanihttp://www.blogger.com/profile/17114943597593437284noreply@blogger.com0tag:blogger.com,1999:blog-1561354627300228469.post-39849534786071080432009-01-17T02:47:00.000-08:002009-01-17T03:18:25.271-08:00DB2 Product OverviewDB2 is a DBMS made by IBM. It was released for the first time at 1983 in MVS. At 1996, IBm released DB2 UDB v5. At this version, DB2 has a feature to support saving many data type like audio, video and text<br /><br />DB2 9 is the lateset release. In this version, like the previous, can run on many platform like AIX, HP-UK, Linux, Solaris, Windows, i5/OS and z/OS. In this version, DB2 has many type as you can see below.<br />The bigger the number, it become more expensive, more stable, and has more feature.<br /><br />1. DB2 Everyplace<br />This version is the smallest DB2, it's size only 350KB. This version made for handheld user like PDA or smartphone.<br /><br />2. DB2 Express<br />This version is an entry level for data server which is designed for <br />a computer with up to 2 CPU and 4GB memory and run on Linux platform. It has a few important feature such as<br />- pureXML : give an simple and efisien access to XML data at the same security and integrity with relational data.<br />- High Availability : give 24 x 7 reliability to DB2 data server. There 3 komponent in this feature, HADR, Online Reorganization, and IBM TSA MP.<br />- Workload Management : this feature monitoring query actively and manage it to run efisiently<br />- Performance Optimization : this feature combine 3 module, MQT, MDC and Query Parallelism<br />- DB2 Homogenous Federation Feature : this feature has ability to manage and access multiple data server<br /><br />3. DB2 Express-C<br />This version is an entry level for data server which is designed for <br />a computer with up to 2 CPU and 4GB memory and run on Linux or Windows platform. This version can be used for evaluation and education freely. It has a few important feature such as<br />- Spatial Extender Client and samples<br />- Microsoft Cluster Server support<br />- Informix Data Source support<br />- Replication Data Capture<br />- DB2 Web Tools<br />- Global Secure Toolkit<br />- APPC and NetBios support<br /><br />4. DB2 Personal Edition<br />This is the DBMS for single user on dekstop or notebook. It can be used to create, modify, and manage many local database.<br /><br />5. DB2 Workgroup Server Edition<br />This version is the DBMS for multi user, client/ server which is designed for a computer with up to 4 CPU, 16GB memory and run on Linux, Windows, Solaris, Linux, AIX platform. This has the same feature with DB2 Express, but it has more scalability.<br /><br />6. DB2 Enterprise Server Edition<br />This version is the DBMS for multi user, web enabled client/ server which is can hold huge transaction, multi terabyte data warehouse. It can run on server which has up to hundreds CPU running on Linux, Windows, Solaris, Linux, AIX platform. It has the same feature with DB2 workgroup with additional feature such as<br />• High Availability Disaster Recovery (HADR)<br />• Table (range) partitioning<br />• Online reorganization<br />• Materialized Query Tables<br />• Multi-dimensional data clustering<br />• Full intra-query parallelism<br />• Connection Concentrator<br />• The DB2 Governor<br />• Tivoli System Automation for Multiplatforms (TSA MP)<br /><br />7. DB2 Data Warehouse Edition<br />This version can be used to make dynamic data warehouse. This is a combination between DB2 enterprise server and DB2 data partitioning.<br /><br />8. DB2 Personal Developer’s Edition<br />This version can be used by application developer to make an application which interact with DB2 personal edition. In this version, developer can make application which connect to DB2 by using SQL, SQLJ, .NET or JDBC method.<br /><br />There are another version of DB2 such as DB2 universal Developer, DB2 enterprise developer, DB2 for i5/OS and DB2 for z/OS. These version have more scalability and feature.<br /><br />Best regards,<br /><br />Deny Sutanidenysutanihttp://www.blogger.com/profile/17114943597593437284noreply@blogger.com0tag:blogger.com,1999:blog-1561354627300228469.post-25438826848588777822009-01-15T06:25:00.000-08:002009-01-15T06:36:40.472-08:00UNION and UNION ALL at DB2Union at DB2 used to join 2 or more resultset from a query. For example if we want to see list of staff who work at IT department and FA department.<br /><br />This is the syntax<br />select column1, column2<br />from table_name<br />where….<br />UNION<br />select column1, column2<br />from table_name<br />where….<br /><br />Each column1 and column2 must be match with other resultset, or it will generate an error. <br /><br />This is an simple example how to using UNION in Stored Procedure<br /><br />CREATE PROCEDURE SP_PAKE_UNION ( )<br />DYNAMIC RESULT SETS 1<br />————————————————————————<br />– SQL Stored Procedure<br />————————————————————————<br />P1: BEGIN<br />– Declare cursor<br />DECLARE cursor1 CURSOR WITH RETURN FOR<br />select a.firstnme, b.deptname<br />FROM EMPLOYEE a, DEPT b<br />where a.workdept = b.deptno<br />and a.workdept =’E21′<br />union<br />select a.firstnme, b.deptname<br />FROM EMPLOYEE a, DEPT b<br />where a.workdept = b.deptno<br />and a.workdept =’A00′;<br />– Cursor left open for client application<br />OPEN cursor1;<br />END P1<br /><br />That Store Procedure will generate list of staff who work at 'A00' and 'E21' department.<br /><br />UNION is differ from UNION ALL. UNION just list the DISTINCT output. It will remove any record which is redundant. If you want to see all output, just change UNION with UNION ALL<br /><br />Best regards,<br /><br />Deny Sutanidenysutanihttp://www.blogger.com/profile/17114943597593437284noreply@blogger.com0tag:blogger.com,1999:blog-1561354627300228469.post-36551180977921020072009-01-14T00:02:00.000-08:002009-01-14T00:05:14.221-08:00How to Connect Java to DB2It's not difficult to connect java application to DB2. It's almost the same like connect java to other DBMS such as access, SQL server and so on.<br /><br />This is the snippet code.<br /><br />String DB_URL = “jdbc:db2:SAMPLE”;<br />String userid = “db2admin”;<br />String password = “mypasswd”;<br /><br />Connection connection = null;<br /><br />Properties connectProperties = new Properties();<br />connectProperties.put(”user”, userid);<br />connectProperties.put(”password”, password);<br /><br />Class.forName(”com.ibm.db2.jcc.DB2Driver”).newInstance();<br />connection = DriverManager.getConnection(DB_URL, connectProperties);<br />PreparedStatement pstmt = connection.prepareStatement(”SELECT * FROM employee”);<br />ResultSet rs = pstmt.executeQuery();<br /><br />Best regards,<br /><br />Deny Sutanidenysutanihttp://www.blogger.com/profile/17114943597593437284noreply@blogger.com0tag:blogger.com,1999:blog-1561354627300228469.post-44134287127838395542009-01-13T23:58:00.000-08:002009-01-14T00:01:26.051-08:00Change Font in JavaThis is an example code how to change a font in Java application.<br /><br />import javax.swing.JFrame;<br />import javax.swing.JLabel;<br />import java.awt.FlowLayout;<br />import java.awt.Font;<br /><br />public class Teks extends JFrame {<br />JLabel lbl1 = new JLabel(”Helvetica biasa”);<br />JLabel lbl2 = new JLabel(”SansSerif bold”);<br />JLabel lbl3 = new JLabel(”Monospaced italic”);<br />JLabel lbl4 = new JLabel(”Serif biasa”);<br /><br />public Teks()<br />{<br />setTitle(”Font”);<br />setApplicationLayout();<br />setSize(175,200);<br />setLocationRelativeTo(null);<br />setVisible(true);<br />}<br /><br />public static void main(String args[])<br />{<br />Teks teks = new Teks();<br />teks.setDefaultCloseOperation(JFrame.EXIT_ON_CLOSE);<br />}<br /><br />public void setApplicationLayout()<br />{<br />setLayout(new FlowLayout());<br />lbl1.setFont(new Font (”Helvetica”, Font.PLAIN, 16));<br />lbl2.setFont(new Font (”SansSerif”, Font.BOLD, 16));<br />lbl3.setFont(new Font (”Monospaced”, Font.ITALIC, 16));<br />lbl4.setFont(new Font (”Serif”, Font.PLAIN, 24));<br />add(lbl1);<br />add(lbl2);<br />add(lbl3);<br />add(lbl4);<br />}<br />}<br /><br />Best regards,<br /><br />Deny Sutanidenysutanihttp://www.blogger.com/profile/17114943597593437284noreply@blogger.com0tag:blogger.com,1999:blog-1561354627300228469.post-41840222724240798402009-01-13T23:54:00.000-08:002009-01-13T23:57:41.797-08:00Digital Clock in JavaOneday, my friend ask about how to make digital clock in java. It's like a timer, when the second has reach 60, the minute will be added by 1, when the minute reach 60, the hour will be added by 1.<br /><br />This is the code. Hope this code will be useful not only for my friend, but also other people who need it.<br /><br />import java.util.Timer;<br />import java.util.TimerTask;<br />import javax.swing.JFrame;<br />import javax.swing.JLabel;<br />import java.awt.FlowLayout;<br /><br />public class Jam extends JFrame {<br /><br />private Timer timer;<br /><br />int detik,menit,jam = 0;<br /><br />JLabel lblDetik = new JLabel(”");<br />JLabel lblMenit = new JLabel(”");<br />JLabel lblJam = new JLabel(”");<br /><br />public Jam()<br />{<br />setTitle(”Jam”);<br />setApplicationLayout();<br />setSize(150,75);<br />setLocationRelativeTo(null);<br />setVisible(true);<br />}<br /><br />public static void main(String args[])<br />{<br />Jam jam = new Jam();<br />jam.setDefaultCloseOperation(JFrame.EXIT_ON_CLOSE);<br />}<br /><br />class PuterJam extends TimerTask<br />{<br />public void run()<br />{<br />detik++;<br />if(detik==60)<br />{<br />detik=0;<br />menit++;<br />}<br />if(menit==60)<br />{<br />menit=0;<br />jam++;<br />}<br />if(detik<10) lblDetik.setText(”0″+detik);<br />else lblDetik.setText(”"+detik);<br /><br />if(menit<10) lblMenit.setText(”0″+menit+” : “);<br />else lblMenit.setText(”"+menit+” : “);<br /><br />if(jam<10) lblJam.setText(”0″+jam+” : “);<br />else lblJam.setText(”"+jam+” : “);<br />}<br />}<br /><br />public void setApplicationLayout()<br />{<br />timer = new Timer();<br />timer.schedule(new PuterJam(), 0,1*1000);<br />setLayout(new FlowLayout());<br />add(lblJam);<br />add(lblMenit);<br />add(lblDetik);<br /><br />}<br /><br />}<br /><br />Best regards,<br /><br />Deny Sutanidenysutanihttp://www.blogger.com/profile/17114943597593437284noreply@blogger.com0tag:blogger.com,1999:blog-1561354627300228469.post-86180540495697822982009-01-13T23:48:00.000-08:002009-01-13T23:52:40.391-08:00Insert an Icon to JInternalFrameOften, we insert an icon into a JFrame in Java application, but how to insert an icon into JInternalFrame? It's almost the same, it's only need to use different method. We can user setFrameIcon() method.<br /><br />This is the snippet code<br />URL url = getClass().getResource(”image/login.gif”);<br />Icon icon = new ImageIcon(url);<br />setFrameIcon(icon);<br /><br />Best regards,<br /><br />Deny Sutanidenysutanihttp://www.blogger.com/profile/17114943597593437284noreply@blogger.com0tag:blogger.com,1999:blog-1561354627300228469.post-52701855298208048942009-01-13T07:24:00.000-08:002009-01-13T07:25:52.419-08:00A Computer And Internet GlossaryWhen you use computers and the Internet in your business, it's all too easy to start feeling like you're drowning in a sea of nonsense. Computer-related things tend to have a language all their own, and while you don't need to know all of it, there are many confusing words and phrases that you're going to come across sooner or later. Here's a quick primer.<br /><br />Bandwidth. Bandwidth is the amount of data that your website can send each second, as well as the amount of data that the visitor to your website can receive. If either one doesn't have enough bandwidth, then the website will appear slowly. For this reason, you should choose a host with plenty of bandwidth, as well as testing that your site doesn't take too long to download on slow connections.<br /><br />Browser. A browser is the software (see below) that visitors to your site use to view it. The most popular browser is Microsoft's Internet Explorer, which comes with Windows.<br /><br />Cookie. Cookies are data files that your site can save on the computer of someone who visits that site, to allow it to remember who they are if they return. You will find that problems people have in ordering from you will almost inevitably be related to cookies -- they will need to have them turned on.<br /><br />Download. Transferring data from a website to a computer.<br /><br />Favourite. A favourite is a website that a user has stored to look at again, by choosing 'Add to Favourites' in their browser's menu.<br /><br />FTP. File Transfer Protocol. This is a common method of uploading (see below) files to your website.<br /><br />Javascript. A common language for writing 'scripts' on websites, which are small programs that make the site more interactive. Another common cause of problems for visitors.<br /><br />JPEG. Joint Photographic Experts Group. This is the name of the most popular format for pictures on the web, named after the group that came up with it. If you want to put pictures on your website, you should save them as JPEGs.<br /><br />Hardware. Hardware is computer equipment that physically exists. It is the opposite of software.<br /><br />Hosting. If you've got a website out there on the Internet, then you'll be paying someone for hosting. It is the service of making your site available for people to see. <br /><br />HTML. HyperText Markup Language. A kind of code used to indicate how web pages should be displayed, using a system of small 'tags'. The 'b' tag, for example, causes text to appear in bold, and the 'img' tag displays a picture.<br /><br />Hyperlink. A hyperlink is when a piece of text on a website can be clicked to take you to another site, or another page on the same site. For example, if clicking your email address on your website allows someone to email you, then your email address is a hyperlink.<br /><br />Programming. This is when the computer is given instructions to tell it what to do, using one of many 'programming languages'. Programming languages for the web include PHP and Perl.<br /><br />Server. The server is where your website is stored, and it is the server that people are connecting to when they visit the site. If someone tells you, for example, that your server is 'down', it means that your website is inaccessible. Note that server refers both to the hardware and software of this system.<br /><br />Software. Programs that run on the computer, or that make your website work. Microsoft Word is software, for example, as is Apache (the most popular web server software). Opposite of hardware.<br /><br />Spider. Don't be scared if a spider visits your website! Spiders are simply programs used by search engines to scan your site and help them decide where it should appear when people search. It is good to be visited by spiders, as it means you should start appearing in search engines soon.<br /><br />Upload. Uploading is when you transfer data from your own computer to your website. For example, you might upload your logo, or an article you've written. Opposite of download.<br /><br />URL. Uniform Resource Locator. This is just a short way of saying 'web address', meaning what you have to type in to get to your website. Sometimes pronounced as 'Earl'.denysutanihttp://www.blogger.com/profile/17114943597593437284noreply@blogger.com0tag:blogger.com,1999:blog-1561354627300228469.post-68919366610888908232009-01-13T07:23:00.000-08:002009-01-13T07:24:14.214-08:00A Close Look At DVI CablesWe all have many times heard about DVI, but what does it really means and what it does? What is the main function of this tiny white port on a video card? How it can benefit you and your personal computer? Do you know which DVI is suitable to meet your requirements?<br /><br />Digital Video Interface is created by Digital Display Working Group to solve the problem of accommodation analog and digital interfaces just by using single connector. It was developed because of insufficiency of standardization in digital interfacing.<br /><br />Three types of standards can be seen in DVI cables. It is very important to know how each type looks like before buying to upgrade your DVI. So it is very important to know how DVI cable works and which one will be most beneficial for you.<br /><br />However, DVI cables are still in the phase of development. Hence there is no specific standard for the DVI cable. In ideal circumstances, DVI home theater cable is capable to create ' digital to digital' connection between the data or video sources and home theater projectors.<br /><br />The standard rule for DVI cables is that it should have maximum length of 5 m for trouble free operation. It is very typical to decide a DVI cable first time.<br /><br />There are two types of DVI connector and each has its own characteristics. The flat pin denotes whether the cable is analog or digital. A flat pin with four surrounding pins denotes either DVI-A or DVI-1. A single flat pin denotes DVI-D. The pin sets depends upon whether the cable is single link or dual link or analog.<br /><br />To choose a perfect Digital video interface cable you should remember these tips:<br /><br />1.Check both female DVI plugs to make sure what type of signals they compatible with.<br />2.One or both connections should be DVI-D if you are choosing a DVI-D cable.<br />3.One or both connections should be DVI-A if you are choosing a DVI-a cable.<br />4.If one of the connections is DVI and other is VGA, and if the DVI is analog compatible, then you must buy a DVI/VGA adaptor or a DVI to VGA cable.<br />5.when both connections are DVI-1, you are advised to use any of DVI cable, but better if you use DVI-1 cable.<br />6. If one connection is digital and the other is analog then there is no possibility of connection between them.denysutanihttp://www.blogger.com/profile/17114943597593437284noreply@blogger.com0tag:blogger.com,1999:blog-1561354627300228469.post-46634819849422778722009-01-13T07:22:00.001-08:002009-01-13T07:22:47.142-08:00A Brief Introduction To Fiber Optics TechnologyUnderstanding how fiber optics are made and function for uses in everyday life is an intriguing work of art combined with science. Fiber optics has been fabricated from materials that transmit light and are made from a bundle of very thin glass or plastic fibers enclosed in a tube. One end is at a source of light and the other end is a camera lens, used to channel light and images around the bends and corners. Fiber optics have a highly transparent core of glass, or plastic encircled by a covering called "cladding". Light is stimulated through a source on one end of the fiber optic and as the light travels through the tube, the cladding is there to keep it all inside. A bundle of fiber optics may be bent or twisted without distorting the image, as the cladding is designed to reflect these lighting images from inside the surface. This fiber optic light source can carry light over mass distances, ranging from a few inches to over 100 miles. <br /><br />There are two kinds of fiber optics. The single-mode fiber optic is used for high speed and long distance transmissions because they have extremely tiny cores and they accept light only along the axis of the fibers. Tiny lasers send light directly into the fiber optic where there are low-loss connectors used to join the fibers within the system without substantially degrading the light signal. Then there are multi-mode which have much larger cores and accept light from a variety of angles and can use more types of light sources. Multi-mode fiber optics also use less expensive connectors, but they cannot be used over long distances as with the single-mode fiber optics. <br /><br />Fiber optics have a large variety of uses. Most common and widely used in communication systems, fiber optic communication systems have a variety of features that make it superior to the systems that use the traditional copper cables. The use of fiber optics with these systems use a larger information-carrying capacity where they are not hassled with electrical interference and require fewer amplifiers then the copper cable systems. Fiber optic communication systems are installed in large networks of fiber optic bundles all around the world and even under the oceans. Many fiber optic testers are available to provide you with the best fiber optic equipment.<br /><br />In fiber optic communication systems, lasers are used to transmit messages in numeric code by flashing on and off at high speeds. This code can constitute a voice or an electronic file containing, text, numbers, or illustrations, all by using fiber optics. The light from many lasers are added together onto a single fiber optic enabling thousands of currents of data to pass through a single fiber optic cable at one time. This data will travel through the fiber optics and into interpreting devices to convert the messages back into the form of its original signals. Industries also use fiber optics to measure temperatures, pressure, acceleration and voltage, among an assortment of other uses.denysutanihttp://www.blogger.com/profile/17114943597593437284noreply@blogger.com0tag:blogger.com,1999:blog-1561354627300228469.post-32212742050950191702009-01-13T07:20:00.002-08:002009-01-13T07:21:35.859-08:0010 Tips For Overcoming Procrastination At The PCCopyright 2006 Michael Madigan<br /><br />Procrastination is the thief of time - and money too, at the PC. Your Internet connection, equipment and power cost you. Some tasks are no fun - but don't let them pile up. Constant dithering and delaying will wreck your health, wealth and reputation.<br /><br />Here are 10 tips for helping you stop procrastination dead:<br /><br />1/ Before you even sit down, sort out in your mind what’s 'urgent', 'important', both, or neither. (If an 'urgent' task isn't 'important' and the deadline passes, so what?). An 'urgent and important' task should normally come before an 'important' task. If you have a poor memory (like me) write or type a quick list of your Top Five To Dos for the session, and delete or amend as need be.<br /><br />2/ All other things being equal plan on doing easy tasks before difficult short tasks before long tasks. Always have something concrete to show for worktime in front of your PC.<br /><br />3/ As far as you can YOU decide what' important' and 'urgent'. There are bullies about - bosses, colleagues and customers - who think their merest whim is law. Learn to say 'No' politely. They may not like it, especially at first. But you'll grow.<br /><br />4/ If you need help for your work, get it now, not later. If it’s not there now, you can ask later - more chances. If you leave it till later, it may have gone off earlier so no chances....<br /><br />5/ You’re there going thru your emails, databases and memos and suddenly out of nowhere, new jobs appear. The tendency is to 'do what's on top of the pile' first. Don't. Put it into the right place in your existing list.<br /><br />6/ Do you get distracted easily? Try and be aware of this, and stay aware of what tasks need doing - and by when.<br /><br />7/ Are you more energetic and creative morning, noon or night? Can you reschedule your targets to take this into account? Or do you just plod along, whatever? You may be a tortoise or a hare, but you can still win your own personal race if you plan ahead.<br /><br />8/ Don't give up your breaks. You need to pace yourself. But put a time limit on all breaks, surfing, chatting or just daydreaming can eat into worktime with disastrous results. A rushed job is rarely your best shot, or a true reflection of your abilities.<br /><br />9/ Be particularly wary of long lunch breaks, and overeating or drinking. If your afternoon's festooned with urgent and important chores, you’ll feel inclined to procrastinate bigtime if you're hung over, stuffed to the gills, or dead beat.<br /><br />10/ Give yourself a treat if you hit all your deadlines. Doesn't have to be chocolate! And don't procrastinate on rewarding yourself when you deserve it.<br /><br />Use these tips to stop procrastination at the PC (AND off), and it’ll boost your free time and make you happy and healthy computing thru 2006 and beyond!denysutanihttp://www.blogger.com/profile/17114943597593437284noreply@blogger.com0tag:blogger.com,1999:blog-1561354627300228469.post-17040061441933739352009-01-13T07:20:00.001-08:002009-01-13T07:20:46.882-08:0010 Tips For Overcoming Procrastination At The PCCopyright 2006 Michael Madigan<br /><br />Procrastination is the thief of time - and money too, at the PC. Your Internet connection, equipment and power cost you. Some tasks are no fun - but don't let them pile up. Constant dithering and delaying will wreck your health, wealth and reputation.<br /><br />Here are 10 tips for helping you stop procrastination dead:<br /><br />1/ Before you even sit down, sort out in your mind what’s 'urgent', 'important', both, or neither. (If an 'urgent' task isn't 'important' and the deadline passes, so what?). An 'urgent and important' task should normally come before an 'important' task. If you have a poor memory (like me) write or type a quick list of your Top Five To Dos for the session, and delete or amend as need be.<br /><br />2/ All other things being equal plan on doing easy tasks before difficult short tasks before long tasks. Always have something concrete to show for worktime in front of your PC.<br /><br />3/ As far as you can YOU decide what' important' and 'urgent'. There are bullies about - bosses, colleagues and customers - who think their merest whim is law. Learn to say 'No' politely. They may not like it, especially at first. But you'll grow.<br /><br />4/ If you need help for your work, get it now, not later. If it’s not there now, you can ask later - more chances. If you leave it till later, it may have gone off earlier so no chances....<br /><br />5/ You’re there going thru your emails, databases and memos and suddenly out of nowhere, new jobs appear. The tendency is to 'do what's on top of the pile' first. Don't. Put it into the right place in your existing list.<br /><br />6/ Do you get distracted easily? Try and be aware of this, and stay aware of what tasks need doing - and by when.<br /><br />7/ Are you more energetic and creative morning, noon or night? Can you reschedule your targets to take this into account? Or do you just plod along, whatever? You may be a tortoise or a hare, but you can still win your own personal race if you plan ahead.<br /><br />8/ Don't give up your breaks. You need to pace yourself. But put a time limit on all breaks, surfing, chatting or just daydreaming can eat into worktime with disastrous results. A rushed job is rarely your best shot, or a true reflection of your abilities.<br /><br />9/ Be particularly wary of long lunch breaks, and overeating or drinking. If your afternoon's festooned with urgent and important chores, you’ll feel inclined to procrastinate bigtime if you're hung over, stuffed to the gills, or dead beat.<br /><br />10/ Give yourself a treat if you hit all your deadlines. Doesn't have to be chocolate! And don't procrastinate on rewarding yourself when you deserve it.<br /><br />Use these tips to stop procrastination at the PC (AND off), and it’ll boost your free time and make you happy and healthy computing thru 2006 and beyond!denysutanihttp://www.blogger.com/profile/17114943597593437284noreply@blogger.com0tag:blogger.com,1999:blog-1561354627300228469.post-66272191755228784452009-01-13T07:19:00.001-08:002009-01-13T07:19:51.417-08:0010 Web Site Backup Essentials That You Should Live ByMore and more webmasters nowadays do not value the importance of a complete website backup (files and databases). They have left this to chance and good luck which poses a great risk to their online presence. <br /><br />Can you relate to this? Then read this important article which might save you an arm and a leg later. <br /><br />Web site backup is the most ignored task of the webmasters simply because it poses no immediate threat to them until something worse happen to their hosting server. Many times, this task is set aside, delayed and even regarded as nuisance to the busy website owner. <br /><br />They just don't realize what is at stake here.<br /><br />So before your website will be wiped out of the internet by unexpected accidents like server breakdowns, harddisk failures, hacking and DDOS attacks among other bad things, let me share with you the 10 Backup E-S-S-E-N-T-I-A-L-S you should not live without online.<br /><br />EXPECT - Know that your webhosting company (even the biggest and the most boastful out there) may encounter problems and that your diligence to backup up will pay off later on. Online computing has never been so unpredictable that the worse of times will happen when you least expect it. With the proper mindset, you are insuring the continuity of your online endeavour in any eventualities. In short, be ready. <br /><br />SCHEDULE - Your backup process should not compete with your busy schedules. Create your own backup schedule at the most convenient time for you in the week. If you're like me, I do this during lunch and dinner times. Sometimes, I have to leave my PC overnight working on the backups. If you can make it not to conflict with your busy schedules, you will be able to keep up with the demands of this job. In short, don't complicate.<br /><br />STICK with it - Just do it. Patience is key to your backup tasks. Once you have a schedule, stick with it. You must do this diligently every time it should happen. This is a tough challenge especially to busy people working online. But the sooner you discipline yourself and make backing up your files a habit, the more you will benefit from a worry-free online environment. In short, get a good habit.<br /><br />EVALUATE - After a while, test your backup files. A good backup can be tested by simply restoring it on another system. Evaluating your backup results from time to time is good way to know that you are keeping what you should keep - a good and working backup. In short, be sure.<br /><br />NO Complacency - After some time, your backup schedule may slip away and you will tend to forget or intentionally miss it. Don't succumb to this temptation. Man has never been so busy in his lifetime like it is today in this era of the high tech trends, new developments and discoveries. In short, don't be lazy to backup.<br /><br />TRASH - Know which files to keep and not to keep. You need to do this to keep your backup process as short and as efficient as possible. It also saves you valuable resources like hard disk space and backup mediums. Backup only what you need. Keep out the trash and dump it. In short, don't sweat with the trash. <br /><br />INTUITION - Have faith in your backup results. Believe that what you are doing is for your own good later on. Like vitamins that keep your body healthy, backups keeps your mind away from stress and worries. A good working backup will make you smile even on the worst of times because you are insured by your patience. In short, believe in good results.<br /><br />AUTOMATE - Look for alternatives to traditional backup process that can make your life simpler. There are several technologies and softwares you can use now to generate the fastest and safest backup files you will need to restore in case of emergency without you lifting a finger. Automation is king in this lazy man's world. In short, be efficient.<br /><br />LIBERATE - Free yourself from worries and anxiety of theunexpected. A death sentence that can be prevented will not kill you. So think about what you can do more (like sleepingmore at night) than to think about what harm may come. With your own backup systems established, you can retire at night calmly knowing the next day, if you don't see your websites as you should, you know you can pubish it back within the day even if your webhost cannot recover it for you. In short, relax and enjoy life to the max.<br /><br />SECURITY - Nothing beats the feeling of being secured. This is the reason why the insurance businesses have flourished over the years. But more importantly, your commitment to backup your files will not only save you from stress, humiliation, frustration, anger and guilt, but also lift your spirit and confidence because you know at the end of the day, your self reliance is well worth it. <br /><br />And that, my friend, is a great and wonderful feeling.denysutanihttp://www.blogger.com/profile/17114943597593437284noreply@blogger.com0tag:blogger.com,1999:blog-1561354627300228469.post-77533466253303037952009-01-13T05:33:00.000-08:002009-01-13T05:45:09.564-08:00Koobface virusRecently I got an email from someone i don't know which tells me that I got a message in Friendster. I read that message and this is it's content. <br /><br />Your behavior looks pretty shocking to me.<br />http://www.geocities.com/mbsnhwqmo/<br /><br />When I clicked that link, I was redirected to other website http://60.53.68.219:7777/?ch=&ea= which contains a video, like a youtube. This website suggest me to download a file to play the video. My anti virus has detected this file a koobface virus.<br /><br />This is the screenshot of the website<br /><a href="http://img525.imageshack.us/my.php?image=koobfacehk5.jpg" target="_blank"><img src="http://img525.imageshack.us/img525/629/koobfacehk5.th.jpg" border="0" alt="Free Image Hosting at www.ImageShack.us" /></a><br /><br />This virus has known as a facebook virus. The spreading technique almost the same, but with other social network like Friendster. Try to fool someone to play the video and install the file.<br /><br />Be carefull if you get message which almost the same with this. <br /><br />With this article, I hope that we can be more carefully not too easily click a link or download a file from other people, even we know that people.<br /><br />Best regards,<br /><br />Deny Sutanidenysutanihttp://www.blogger.com/profile/17114943597593437284noreply@blogger.com0tag:blogger.com,1999:blog-1561354627300228469.post-3175462560361564622009-01-09T22:02:00.000-08:002009-01-09T22:03:40.620-08:0010 Steps To A Safe, Smooth Running PC10 Steps To A Safe, Smooth Running PC By Michael A Silva<br /><br />These ten steps will help you increase your computer's security. From discovering viruses to learning how to avoid them, this article is a must read!<br /><br />Windows password This is the easiest way to make sure you know who is using your pc. Choose a lengthy password that contains capital and lower case letters. Including a number or two will greatly increase your security. Having a Windows password means that the only people that can log onto a Windows session are people that you have granted access to.<br /><br />Password manager You should never write your passwords down. Using the same password all the time will also make it very easy for hackers to reach your personal information. So if you can’t write it down and you’re not<br />supposed to use the same one – how are you supposed to keep track of all of your passwords? The easiest way to do this is to use a password manager. We prefer to use Roboform. Roboform is an easy to use password and profile manager that docks neatly into your Internet Explorer toolbar and keeps track of all of your passwords for you. Roboform also uses a master password system. You will have one password that accesses all of the passwords in the program. This way you can keep all of your information safe and secure. You can download Roboform for free by http://www.roboform.com.<br /><br />Spyware Remover Next to spam, spyware is the internet’s biggest annoyance. By definition, spyware is “any software that covertly gathers user information through the user's Internet connection without his or her knowledge, usually for advertising purposes. Once installed, the spyware<br />monitors user activity on the Internet and transmits that information in the background to someone else. Spyware can also gather information about e-mail addresses and even passwords and credit card numbers.” The amount of spyware that exists on your pc is dependent on the amount of internet surfing you do. A good rule of thumb here is to scan for spyware once per week or whenever poor system performance surfaces. If you don’t have a spyware scanner, we recommend http://www.webroot.com.<br /><br />Antivirus This should go without saying, but if your computer is connected to the internet you need antivirus software. With weekly scans and program updates you should be protected from most threats. For added protection, we<br />recommend using more than one anvtivirus scanner.<br /><br />Firewall A firewall will keep unwanted visitors out of your computer. You can obtain a firewall either by using software application like ZoneAlarm or Black Ice Defender, or by using a router with your internet connection. For more information on routers plese visit http://www.Linksys.com.<br /><br />File sharing Basically, file sharing programs are the single biggest security risk you will come across. This is because the only facts you have about the files you are downloading are the file name and the file size. It is quite simple to change a filename to dupe someone into downloading a virus or other malware like keystroke recorders. Our advice – stay away from file sharing at all costs. If you need to use it, make sure you have updated antivirus software installed and running.<br /><br />Research In a sentence – know what’s out there. http://www.Symantec.com has a section on their website that will serve you well. Knowing what types of viruses exist and how to avoid them will make you a much smarter internet user.<br /><br />Email protection Most of the antivirus applications available offer email scanning. If yours does not, you will want to get one that does. Email scanning will make sure all of your incoming and outgoing emails are safe for both you and the recipient. Email viruses spread very quickly by using your address book to propagate. Never read email from people you don’t know and always make sure your email scanner is active.<br /><br />Network security Another way that viruses spread is through computer networks. We have a few quick tips to keep your network safe. Always scan any files that come in from other computers. Even if it’s a file you have brought from home. Never allow a file to be placed on your network until it<br />has been scanned. The main server should be the only computer with file sharing enabled. By not allowing computer users to transmit files, you can quickly neutralize a threat.<br /><br />Maintenance Performing weekly virus and spyware scans will go a long way to keeping your computer safe. Defragmenting weekly will also greatly improve performance. If you put in the effort, you will be rewarded with a safe and smooth running pc. Not to mention less headaches!<br /><br />By following these ten guide lines, you will greatly improve the performance of your computer. You will also generate peace of mind as you gain a new sense of security.<br /><br />------------------<br /><br />For more information on affordable hosting packages, website builder software, dedicated and shared server packages, website design and promotion services and specialized fund raising and campaign websites please visit us at http://www.ipowereurope.comdenysutanihttp://www.blogger.com/profile/17114943597593437284noreply@blogger.com0tag:blogger.com,1999:blog-1561354627300228469.post-9568707600245179382009-01-09T22:01:00.000-08:002009-01-09T22:02:28.626-08:0010 Simple Reasons To Remove Spyware From Your ComputerIs your computer been running slower than normal? Are you worried someone may be able to access your computer and steal your private information and use it against you? If so, these are feelings I have shared with you in the past. <br /><br />Some time back, my 3-year old computer was running so slow that I had to buy a new computer. Or at least I thought I needed a new computer. Then within a matter of weeks of surfing on the Internet, my new computer was also running so slowly. In addition, some programs did not run well on my computer, and I did not recognize some of the programs that were running on my computer. That scared me most. Were these programs that were tracking my keystrokes on my computer or programs I just not remember installing? I knew I had to find a answer and solution fast. <br /><br />The truth is, we can all put up with a slow computer, but very few of us would want others to have access to the information on our computers, but that is exactly what can happen when spyware or malware is loaded on our computers without our knowledge. <br /><br />According to Spyware Nuker’s web site, “Spyware applications are programs and files that hide on your PC's hard drive without your direct knowledge. These programs allow hackers and advertising companies to track your every move, both online and even when you work offline. They can track the websites you visit, the items that you buy online, the emails you send and receive, your Instant Message dialog, and worst of all they can even record your credit card number, personal identification numbers, and all of your passwords. If you use dial-up to connect to the Internet then spyware can be used to bill 900 numbers to your phone bill. This is just a short list of the harm that spyware can cause.” <br /><br />The web site also provides statistics that show spyware is a huge problem effecting many people. "27.3 million Americans have been victims of identity theft in the last five years, including 9.91 million people or 4.6% of the population in the last year alone."<br /><br />In addition, it is very easy for your computer to become infected with spyware as "The majority of all downloadable games, music, screensavers, etc., can infect your computer with SpyWare or AdWare. Most people do not know that after simply clicking on a random "pop up" ad, their computers may have been infected with SpyWare or AdWare."<br /><br />No matter how we get spyware, here are 10 very real reasons you don’t want spyware on your computer. <br /><br />1. Your computer may start running slower <br />2. Some programs on your computer will not run correctly <br />3. You may not recognize programs that are now on your computer because they may have been installed there by a spyware related web site or program you loaded on your computer. <br /><br />In addition, you might be worried that: <br /><br />4. Someone might be able to read your e-mails <br />5. Someone might be able to access your e-mail list<br />6. Someone might be able to see you track the keystrokes you type <br />7. Someone might be able to access your credit card information on your pc<br />8. Someone might be able to access your passwords list on your computer <br />9. Someone might be able to steal your social security number<br />10. Someone might be able to track all the web sites you visit <br /><br />As I mentioned, most of these programs get on your computer with out you even knowing, but another frustrating part is I recognized a few of these programs because I remember installing AND uninstalling them! So now I know that when we install some of these handy little utilities to track passwords online or programs to help with e-mail or keep track of the weather, even if we uninstall them, they may not be gone from our computers. They are still in our computers, waiting to spy on us, at the least. <br /><br />A great way to find and remove spyware is to run a spyware detector and remover. Most spyware detection and removal software today offers a free scan to verify that you do or do not have spyware on your computer.denysutanihttp://www.blogger.com/profile/17114943597593437284noreply@blogger.com0tag:blogger.com,1999:blog-1561354627300228469.post-16457690977070988032009-01-09T22:00:00.001-08:002009-01-09T22:00:58.927-08:0010 Reasons Why To Print with Printer AnywherePrinterAnywhere has developed a new technology and software that allows any user with internet connection to connect and print any document all over the world. Users now have the power and provision to connect to any printer all over the world without any networking. The users just need to download and install the free software that PrinterAnywhere provides. That too without the requirement of any special knowledge by the user or the owner of printer!<br /><br />With the software that Printer Anywhere provides, the user is now able to print anything directly from your applications like the Photo Editor, Outlook Explorer, and so on. Also the page the user wants is printed thousands of miles away from your own computer. <br /><br />The software is developed with such precision that uses high security as well as the quality standards for the printing the page at the desired destination. The software also uses a high quality encryption algorithm and securely sends the printable media through electronic pulses to the desired destination. This also adds to the user’s security because the imitation of the original copy is sent. <br /><br />The Printer Anywhere software also bans the forwarding of the document, thus, unlike e-mail, solves the problems faced for the privacy issues. It is also unnecessary for the user to have an email id for the printing of document anywhere in the world. The user also has the authority of how many copies are to be printed. <br /><br />There are the ten most basic reasons why to print documents around the world using on the software that is provided by Printer Anywhere. The ten reasons are:<br /><br />1. To ensure that the documents are not only received but also printed:<br />Many times it happens that the important documents that are sent through email are received properly but are either misplaced or are deleted from the receivers computer. With PrinterAnywhere, the user can be assured that the documents are not just received but printed so that the receiver has a hard copy of the documents.<br /><br />2. The user does not want to send electronic copies of the documents:<br />With the sending of emails, all the privacy issues pop-up. The emails, for example, can be forwarded and the privacy of the document is compromised. Instead if the user chooses to print the document using PrinterAnywhere, the user has a benefit of preventing the abuse of privacy.<br /><br />3. The recipient does not have the application to open the document: <br />With the technology advancing all the time, there is an acute possibility that the recipient does not have the proper application to open certain documents that have come from the other parts of the world. Hence it is very useful to have the software provided by PrinterAnywhere, which facilitates the printing of any document in any part of the world. This saves the time in finding and installing the correct application to open the document.<br /><br />4. The user wants to print paper photos on someone else’s printer:<br />The software is very useful in printing you archived photos on any printer in any part of the world. So, instead of sending the photos through email and then let the recipient download and then print the photos, the user can directly print the photos on the recipient’s printer.<br /><br />5. The user wants to ensure that the documents are printed on loy on the specific printer:<br />The software provided by the PrinterAnywhere ensures that when a document sent for printing, it goes to the right recipient.<br /><br />6. The user wants to print directly from the applications as if it were a local printer:<br />The user now has the opportunity of printing the required document directly from the application by just commanding the application to print and then giving the correct link of the address of the recipient printer.<br /><br />7. Microsoft printer sharing on the home network of the user doesn’t seem to work:<br />The Microsoft printer sharing may not work correctly hence; PrinterAnywhere is a better option for all the users.<br /><br />8. The document is too big to print or the user wants to save his paper:<br />If the user does not wants to waste his paper for something which maybe useless yet necessary, then with PrinterAnywhere, the user has the option to directly print the document at the recipient’s printer.<br /><br />9. Fax quality is not good or the international fax calls are very expensive:<br />The Fax calls are very expensive in case you want to send a fax overseas. In this case the PrinterAnywhere is a very good option.<br /><br />10. The user wants to print right at that moment and for free:<br />PrinterAnswers is the best option to print documents on the spot and for free.<br /><br /><br />With all these reasons, PrinterAnywhere is the most irresistible.denysutanihttp://www.blogger.com/profile/17114943597593437284noreply@blogger.com0tag:blogger.com,1999:blog-1561354627300228469.post-21943456331363715522009-01-09T21:59:00.001-08:002009-01-09T21:59:47.059-08:0010 Benefits Of Smarthphone Bluetooth10 Benefits Of Smarthphone Bluetooth Below, are 10 benefits and reasons to use Bluetooth technology.<br /><br />1. Wireless As you probably already know, there are many benefits and advantages to using wireless devices. Along with improving safety as a result of eliminating wires you don't need, wireless also offers you plenty of other advantages. When traveling with your laptop or other wireless devices, you'll no longer have to worry about bringing connection cables.<br /><br />2. Bluetooth is actually inexpensive The technology of Bluetooth is cheap for companies to implement, which results in lower costs for the company. These savings are then passed from the company on to you.<br /><br />3. Bluetooth is automatic Bluetooth doesn't have you set up a connection or push any buttons. When two or more devices enter a range of up to 30 feet of each other, they will automatically begin to communicate without you having to do anything. <br /><br />4. Standardized protocol Bluetooth is standardized wireless, meaning that a high level of compatibility among devices is guaranteed. Bluetooth will connect devices to each other, even if they aren't the same model.<br /><br />5. Low interference Bluetooth devices almost always avoid interference from other wireless devices. Bluetooth uses a technique known as frequency hopping, and also low power wireless signals.<br /><br />6. Low energy consumption As a result of Bluetooth using low power signals, the technology requires very little energy and will use less battery or electrical power as a result. This is an excellent benefit for mobile devices, as Bluetooth won't drain the battery.<br /><br />7. Sharing voice and data The standard for Bluetooth will allow compatible devices to share data and voice communications. This is great for mobile phones and headsets, as Bluetooth simplifies driving and talking on your cell phone.<br /><br />8. Instant PAN (Personal Area Network) You can connect up to seven Bluetooth devices to each other within a range of up to 30 feet, forming a piconet or PAN. For a single room, you can also set up multiple piconets.<br /><br />9. Upgradeable Upgradeable is the standard for Bluetooth. There are newer versions of Bluetooth in the works, which offer many new advantages and backward compatible with older versions.<br /><br />10. The technology stays Bluetooth technology is a world wide, universal wireless standard. With it being as popular as it is, you can count on it being around for years to come. As more and more devices start to use Bluetooth technology, more manufacturers will be eager to make their products compatible. A chain reaction will occur, making Bluetooth the standard for cutting edge wireless.denysutanihttp://www.blogger.com/profile/17114943597593437284noreply@blogger.com0tag:blogger.com,1999:blog-1561354627300228469.post-36413917187614540002009-01-09T21:57:00.000-08:002009-01-09T21:59:06.151-08:007 Tips For Buying Cheap LaptopLaptops are gaining in popularity these days. Almost everyone is carrying one now either for work or entertainment. Laptops with the latest technology are introduced to the market everyday and these new laptops come with a huge price tag. However, that does not mean you cannot get a good and cheap laptop. I have put together a guide that may help you out in your hunt for a cheap and good laptop.<br /><br />Buy cheap laptop with older technology<br /><br />Rapid advance in technology makes it meaningless to buy the latest technology at a high price. When laptop with wireless capability first came to the market, a unit with this technology can cost up till US$2500. NOw after 2 years, you can get a relatively fast centrino laptop for less than US$1000 <br /><br />Buy used or refurbished laptop<br />The depreciation of a laptop value is so high, that after one year in the market, a laptop can easily lose half its value. So if you are looking for a cheap laptop, look for one which is close to one year old. Not all used laptop are in bad condition. You will be surprised to find that some used laptops are still in good condition because their owners are power users or gamers.<br /><br />Buy laptop from power users or gamers<br />I like to buy electronic gadgets including laptops from hard core power users or gamers. Let me share with you why. Gamers or power users usually require the latest and most powerful technology to run their games or power hungry applications. They often will not settle for second best. They also have the tendency to chase after the latest technology. So after one year, they will be bored of what they have and will look to sell off their laptops so that they can buy a new one. Now if you are looking to buy cheap laptops with up to date technology and you happen to have friends who are gamers, do ask them if they are looking to sell off their laptops. Who knows, maybe you can buy a good and cheap laptop from them.<br /><br />Scan through gaming forums and local gaming community<br />if you do not already have friends who like to play computer games, then scanning through gaming forums on the internet is another way to get good and cheap deals for used laptop. Internet makes it easy for you to do this. Go to google.com and start searching for gaming forums. Visit each and everyone and see if they have a Trading Section. You will definitely find many post from gamers looking to sell their gaming laptops.<br /><br />Scan through local bulletin boards <br />Do scan through local bulletin boards near you for cheap deals on laptop.Especially if there are software companies around the area. Software companies do offer their used computers or laptops for sale when their software projects end. I personally had gotten a few good deals for my family and friends.<br /><br />Look for cheap laptop with at least 512mb memory<br />This is especially important for used laptop. If the processor speed is slow, then having more memory can compensate for the lack in speed. In fact, The size of memory plays a big part in determining how fast a laptop runs an application. Just by increasing the memory size, you can see a huge difference in speed. A cheap laptop with at least 512mb memory can run most non graphic intensive application easily.<br /><br />Get cheap laptop from reputable manufacturer<br />This is very important because if you are buying used laptop, then the chances of requiring servicing is higher than a new laptop. So if you buy from a reputable manufacturer, you will save alot of trouble and time if your laptop do require servicing.denysutanihttp://www.blogger.com/profile/17114943597593437284noreply@blogger.com0