Wednesday, February 25, 2009

BD to replace CD

Compact Disk(CD) is getting a new shape and its actually getting transformed to new form of Data Storage disk.The size of this new disk is much more larger than the CDs and DVDs.

This new disk is referred as Blue-Ray Disk(BD).This is going to be new data carrier in the future.Blue-Ray Disks can be either single layered (or) dual layered.

Dual layered Blue-Ray disks can store data up to 50 GB which is 6 times higher than the storage of Dual layered DVDs itself (size of the dual layered DVD is 8152 MB (approx 8.1 GB)).

Single Layered Blue-Ray disks can store data up to 25 GB. In India, Blue-Ray Disc writers are not available directly at present (may be available from Gray market).

Firstly the BD Writers are launched in large scale by LG Electronics. This BD Writer has maximum writing speed of 6x where x varies from 1000 to 2000 Kb/sec.

In single BD, its possible to store 35 full length movies in one stroke. The writer launched by LG is considered as writer launched with high writing speed.

In pricing, variation from 20K to 30K is possible. This BD Writer can be incorporated to any Desktop computers.

Thus BD not only replace CD,DVD but can also replace Hard Drives as it has huge storage capacity and also provides longer life...

Tuesday, February 17, 2009

Google Chrome

Google Chrome is a stable web browser developed by Google. Google Chrome web browser is designed for 43 languages. It was first released as a beta version for Microsoft Windows on September, 2008. The name is derived from the graphical user interface frame, or "chrome", of web browsers.

Do Visit the Website Google Chrome

Chrome uses the open source code of FireFox and Apple for developing the web browser. Thus it has some resemblance of FireFox Browser.

Chrome browser was also designed for Linux by mainly using the Shell scripts but some have tried this shell, which apparently lacks many features, but appears to function quite well in rendering web sites (including JavaScript).

Primary design goals were to improve security, speed and feel good GUI compared to existing browsers. Chrome was assembled from 26 different code libraries from Google and others from third parties such as Netscape.

Google Chrome is also getting popular now a days, can become a good competitor among other web browsers..

Firefox Encrypted Text

Firefox browser has its own security settings. It display warning messages in case of any critical date handling. For receiving messages from browser,users have to set the security options.

In Internet connection, for data hiding encryption of original text (called Cipher Text) is done to hide from other users and sent to various locations.

For such encryptions browser cannot go inside and describe about the data.Thus encryptions may have good messages and in worst case it may have virus (or) other malware programs.

Thus in such cases, we need to receive proper warning messages from the firefox browser.

For setting the warning messages, go to "Tool-->Options" and in that select the "Security" icon and from that select "Warning Messages" column. In that click the "Settings" button and can enable the various warning messages.

Thus whenever you are in Internet then you can receive warning messages and thus your system is retrieved from problems.

The various warning messages are :

(1) I am about to view an encrypted page

(2) I am about to view page that uses low-grade encryption

(3) I have encrypted page for one that isn't encrypted

(4) I submit information that's not encrypted

(5) I am about to view an encrypted page that contains some unencrypted information.

Have you ever received such type of messages in your FireFox browser, if not then enable the security settings..

MS Word File Properties

For knowing the details of file we right click the file and select the properties option. Sometime after the file creation, we come to know that file size is more than what is expected.

Thus users have other idea of saving the same file with different format for size reduction policy .Thus is it possible to view the properties of file while it is being saved for the first time.. ?

Yes its possible, but for that we have to enable certain conditions. The viewing of file size feature is enabled in MS Word. For that you have to go to the "Tool" menu. In that select "Options" and in that further select the "Save" tab.

In the current window opened, select "Prompt for Document Properties". This must be enabled for knowing the properties of file.

In some MS Word document, if the author information is not needed, then this feature has to be disabled. For that select "Tool" menu.

In that select "Options". From the various tabs available select the "Security" tab.Then enable "Remove Personal Information from Properties on Save" option.

Finally if other users should not know that you have recently viewed certain document, then for that you have to goto "My Recent Documents" select "Tools".

In the obtained folder just delete all the shortcuts and refresh it. Then the recent documents viewed will show as empty.

Thus by knowing certain properties available in MS Word, we can maintain our size, privacy and other security aspects..

CD-R/CD-RW

Both are physically same but their writing activity differs.While CD-R is Write Only Read Many (W1R*).CD-RW is Write Many Read Many (W*R*).In both, CD Writing can be done Part by Part (Multisession possible).

If user is interested in keeping the data for long time then he can prefer CD-R as it preserves data for long time( in such a case that there is no too much physical damage).

If user need to store data for temporary period of time then he can prefer CD-RW.

In CD-R, writing is done only once. In CD-RW the same can be overwritten by 40 times.

CD-R can be burnt at a high writing speed of upto 52x (where x denote in range of 1000 kb/s to 2000 kb/s).

But CD-RW can be burnt at low writing speed of 10-20x only. Cost of the CD-R is cheap compared to CD-RW as the former is written once and latter can be overwritten many times.

Time consumed for CD-R is less as writing speed is more. But time consumed by CD-RW is more as writing speed is low and also time taken for erasing the previous data is also taken into consideration.

While erasing the CD-RW there are 2 modes available.First one being the quick erasing which erases just deletes the pointers assigned to main data.

Second is that full erasing of CD-RW which means the deletion of the main data and its pointers.Thus this erasing method is used very rarely as it consumes nearly half an hour to an hour time period.

But both these CDs are used in wide scale..

If you feel that some data are important then copy the data in CD or in higher versions as this storage may be useful in back up operations (if main system crashes then CDs are being used as backup)..

What is Phishing ?

What is Phishing ?

In computers, we hear the word phishing, what is it? a virus or what.. How it may/can affect our system let us see

Those techniques which are being used to dominate other computer users in improper (or) indirect way is phishing. For example daily we receive email messages. Some may personal and others can be unwanted.

Some messages(emails) are posted like "We remove spywares from your system at free of cost". And that too this email (which provide free service) is obtained from popular websites like Microsoft or Norton Anti Virus.

Thus we blindly click their hyperlinks given in that email.

By Clicking those links, you are not sent to main website (which is not known to user). Thus some underground website obtain necessary details about computer users.

These websites may slow down your computer(can make your PC Slave).These underground websites can create unwanted problem to your computer (can give black out screen in your system and can create hindrance without your knowledge).

If you are sending secret information (like passwords used in Net Banking), then your account information is being hacked and further used by these underground website hackers.

For such dominance over other computers they create and use different methods. These Kind of act is called phishing..
Custom Search