tag:blogger.com,1999:blog-14934861554201851172023-11-15T20:16:57.271+07:00What - What - What - How ?What is and How do ?Anonymoushttp://www.blogger.com/profile/16970281043711075419noreply@blogger.comBlogger37125tag:blogger.com,1999:blog-1493486155420185117.post-32627728960811061152012-11-05T23:41:00.000+07:002012-11-05T23:41:41.585+07:00What is Device?<b><i><a href="http://what-is-how.blogspot.com/2012/11/what-is-device.html">Device</a></i></b> or element that joins to a pc. Illustrations of device consist of hard drives, picture photo printers, rats or rodents, and places. These particular device drop into the type of add-ons because they are individual from the main pc.<br />
<br />
Most device, whether side-line or not, require a program known as a system car owner that functions as a interpretation, changing common purchases from an program into particular purchases that the product is aware of. Anonymoushttp://www.blogger.com/profile/16970281043711075419noreply@blogger.com0tag:blogger.com,1999:blog-1493486155420185117.post-42801873115698604622012-10-28T18:00:00.000+07:002012-10-28T18:00:03.509+07:00What Is A DMA<b><a href="http://what-is-how.blogspot.com/2012/10/what-is-dma.html">What Is A DMA</a></b><br />
DMA, or Direct Memory Access, are pathways provided by the hardware to allow the hardware direct access to the computer's memory. See <b><a href="http://what-is-how.blogspot.com/2012/10/what-is-dma.html">DMA</a></b> Listing:<br />
<br />
<table align="center" cellpadding="5" cellspacing="1" class="mtable" style="width: 95%px;"><tbody>
<tr class="tcb wt"><td width="33%">CHANNEL</td><td width="34%">AVAILABILITY</td></tr>
<tr class="tcw"><td width="33%"><b>00</b></td><td width="34%">Available</td></tr>
<tr><td width="33%"><b>01</b></td><td width="34%">Sound device</td></tr>
<tr class="tcw"><td width="33%"><b>02</b></td><td width="34%">Standard floppy disk controller</td></tr>
<tr><td width="33%"><b>03</b></td><td width="34%">Available</td></tr>
<tr class="tcw"><td width="33%"><b>04</b></td><td width="34%">Direct memory access controller</td></tr>
<tr><td width="33%"><b>05</b></td><td width="34%">Available</td></tr>
<tr class="tcw"><td width="33%"><b>06</b></td><td width="34%">Available</td></tr>
<tr><td width="33%"><b>07</b></td><td width="34%">Available</td></tr>
</tbody></table>
<br />
<br />
Read: <a href="http://what-is-how.blogspot.com/2012/10/what-is-input-output.html">What is input output</a>Anonymoushttp://www.blogger.com/profile/16970281043711075419noreply@blogger.com0tag:blogger.com,1999:blog-1493486155420185117.post-20855005406853582882012-10-28T12:00:00.000+07:002012-10-28T12:00:00.354+07:00What is an Input Output<b><i><a href="http://what-is-how.blogspot.com/2012/10/what-is-input-output.html">What is an Input Output</a></i></b><br />
Input Output (I/O) represents the locations in memory that are designated by use of various devices to exchange information amongst themselves and the rest of the PC. See <i><b><a href="http://what-is-how.blogspot.com/2012/10/what-is-irq.html">IRQ</a></b></i> Listing for a list of IRQs and I/O ranges.Anonymoushttp://www.blogger.com/profile/16970281043711075419noreply@blogger.com0tag:blogger.com,1999:blog-1493486155420185117.post-63016261067634762202012-10-28T06:00:00.000+07:002012-10-28T06:00:01.402+07:00What is an IRQ<b><i><a href="http://what-is-how.blogspot.com/2012/10/what-is-irq.html">What is an IRQ?</a></i></b><br />
Short for Interrupt request, IRQ is a signal that has a direct line to the computer processor, allowing it to stop the processor momentarily and decide what to do next. <br />
<br />
Every IBM compatible computer has a maximum of 15 IRQs and are prioritized in the computer according to the importance of the device. The below lists the standard IRQ configuration found in modern PC computers. The below IRQs that have the Card Type 8/16-BIT are configurable and possibly removable.<br />
<br />
However, all others cannot be removed or shared. When listing the IRQs and encounter IRQs that are doubled, it could possibly indicate an <b><a href="http://what-is-how.blogspot.com/2012/10/what-is-irq.html">IRQ</a></b> confliction or that the IRQ is being shared. The exception to this are IRQs 14 and 15.<br />
<br />
<table align="center" cellpadding="5" cellspacing="1" class="mtable" style="width: 95%px;"><tbody>
<tr class="tcb wt"><td>IRQ </td><td>DEVICE</td><td>I/O PORT</td><td>BUS SLOT</td><td>CARD TYPE</td></tr>
<tr class="tcw"><td class="ce"><b>00</b></td><td>System Timer</td><td>None</td><td>NO</td><td>NONE</td></tr>
<tr><td class="ce"><b>01</b></td><td>Keyboard</td><td>None</td><td>NO</td><td>NONE</td></tr>
<tr class="tcw"><td class="ce"><b>02</b></td><td>Cascade Controller<br />
2nd PIC</td><td>None</td><td>NO</td><td>NONE</td></tr>
<tr><td class="ce"><b>03</b></td><td>COM 2
and 4</td><td>COM 2: 02F8h (02F8 or 2F8)<br />
COM 4: 02E8h (02E8 or 2E8)</td><td>YES</td><td>8 or 16-BIT</td></tr>
<tr class="tcw"><td class="ce"><b>04</b></td><td>COM 1
and 3</td><td>COM 1: 03F8h (03F8 or 3F8)<br />
COM 3: 03E8h (03E8 or 3E8)</td><td>YES</td><td>8 or 16-BIT</td></tr>
<tr><td class="ce"><b>05</b></td><td>Sound<br />
Parallel Port 2</td><td>PARALLEL PORT 2:<br />
0278h - 0378h</td><td>YES</td><td>8 or 16-BIT</td></tr>
<tr class="tcw"><td class="ce"><b>06</b></td><td>Floppy</td><td>03F0 - 03F5</td><td>YES</td><td>8 or 16-BIT</td></tr>
<tr><td class="ce"><b>07</b></td><td>Parallel Port 1</td><td>0278h - 0378h</td><td>YES</td><td>8 or 16-BIT</td></tr>
<tr class="tcw"><td class="ce"><b>08</b></td><td>Real-time Clock</td><td>None</td><td>NO</td><td>NONE</td></tr>
<tr><td class="ce"><b>09</b></td><td>Redirected IRQ 2<br />
Open<br />
Network Available</td><td>None</td><td>YES</td><td>8 or 16-BIT</td></tr>
<tr class="tcw"><td class="ce"><b>10</b></td><td>Open</td><td>None</td><td>YES</td><td>8 or 16-BIT</td></tr>
<tr><td class="ce"><b>11</b></td><td>Open<br />
SCSI<br />
Video</td><td>VIDEO:<br />
3B0-3DF</td><td>YES</td><td>8 or 16-BIT</td></tr>
<tr class="tcw"><td class="ce"><b>12</b></td><td>Open<br />
PS2</td><td>None</td><td>YES</td><td>8 or 16-BIT</td></tr>
<tr><td class="ce"><b>13</b></td><td>Coprocessor</td><td>None</td><td>NO</td><td>NONE</td></tr>
<tr class="tcw"><td class="ce"><b>14</b></td><td>Open<br />
Primary hard drive (master)<br />
Hard Drive Controller</td><td>1ST IDE: 1F0</td><td>YES</td><td>8 or 16-BIT</td></tr>
<tr><td class="ce"><b>15</b></td><td>Open<br />
2nd hard drive (slave)</td><td>2ND IDE: 170</td><td>YES</td><td>8 or 16-BIT</td></tr>
</tbody></table>
<br />
Read: <i><a href="http://what-is-how.blogspot.com/2012/10/what-is-sdio.html">SDIO</a></i>Anonymoushttp://www.blogger.com/profile/16970281043711075419noreply@blogger.com0tag:blogger.com,1999:blog-1493486155420185117.post-28265643283618956072012-10-28T00:00:00.000+07:002012-10-28T00:00:04.785+07:00What Is Collective Intelligence?<b><i><a href="http://what-is-how.blogspot.com/2012/10/what-is-collective-intelligence.html">What Is Collective Intelligence?</a></i></b><br />
The central principle behind the success of the giants born in the Web 1.0 era who have survived to lead the Web 2.0 era appears to be this, that they have embraced the power of the web to harness collective intelligence:<br />
<ul>
<li>Hyperlinking is the foundation of the web. As users add new content, and new sites, it is bound in to the structure of the web by other users discovering the content and linking to it. Much as synapses form in the brain, with associations becoming stronger through repetition or intensity, the web of connections grows organically as an output of the collective activity of all web users.</li>
<li>Yahoo!, the first great internet success story, was born as a catalog, or directory of links, an aggregation of the best work of thousands, then millions of web users. While Yahoo! has since moved into the business of creating many types of content, its role as a portal to the collective work of the net's users remains the core of its value.</li>
<li>Google's breakthrough in search, which quickly made it the undisputed search market leader, was PageRank, a method of using the link structure of the web rather than just the characteristics of documents to provide better search results.</li>
<li>eBay's product is the collective activity of all its users; like the web itself, eBay grows organically in response to user activity, and the company's role is as an enabler of a context in which that user activity can happen. What's more, eBay's competitive advantage comes almost entirely from the critical mass of buyers and sellers, which makes any new entrant offering similar services significantly less attractive.</li>
<li>Amazon sells the same products as competitors such as Barnesandnoble.com, and they receive the same product descriptions, cover images, and editorial content from their vendors. But Amazon has made a science of user engagement. They have an order of magnitude more user reviews, invitations to participate in varied ways on virtually every page--and even more importantly, they use user activity to produce better search results. While a Barnesandnoble.com search is likely to lead with the company's own products, or sponsored results, Amazon always leads with "most popular", a real-time computation based not only on sales but other factors that Amazon insiders call the "flow" around products. With an order of magnitude more user participation, it's no surprise that Amazon's sales also outpace competitors.</li>
</ul>
Now, innovative companies that pick up on this insight and perhaps extend it even further, are making their mark on the web:<br />
<br />
Collective Intelligence: Wikipedia, an online encyclopedia based on the unlikely notion that an entry can be added by any web user, and edited by any other, is a radical experiment in trust, applying Eric Raymond's dictum (originally coined in the context of open source software) that "with enough eyeballs, all bugs are shallow," to content creation. Wikipedia is already in the top 100 websites, and many think it will be in the top ten before long. This is a profound change in the dynamics of content creation!<br />
<br />
Sites like del.icio.us and Flickr, two companies that have received a great deal of attention of late, have pioneered a concept that some people call "folksonomy" (in contrast to taxonomy), a style of collaborative categorization of sites using freely chosen keywords, often referred to as tags. Tagging allows for the kind of multiple, overlapping associations that the brain itself uses, rather than rigid categories. In the canonical example, a Flickr photo of a puppy might be tagged both "puppy" and "cute"--allowing for retrieval along natural axes generated user activity.<br />
<br />
<b><a href="http://what-is-how.blogspot.com/2012/10/what-is-collective-intelligence.html">Collective Intelligence</a></b>: Collaborative spam filtering products like Cloudmark aggregate the individual decisions of email users about what is and is not spam, outperforming systems that rely on analysis of the messages themselves.<br />
<br />
It is a truism that the greatest internet success stories don't advertise their products. Their adoption is driven by "viral marketing"--that is, recommendations propagating directly from one user to another. You can almost make the case that if a site or product relies on advertising to get the word out, it isn't Web 2.0.<br />
<br />
Even much of the infrastructure of the web--including the Linux, Apache, MySQL, and Perl, PHP, or Python code involved in most web servers--relies on the peer-production methods of open source, in themselves an instance of collective, net-enabled intelligence. There are more than 100,000 open source software projects listed on SourceForge.net. Anyone can add a project, anyone can download and use the code, and new projects migrate from the edges to the center as a result of users putting them to work, an organic software adoption process relying almost entirely on viral marketing.
<br />
Read: <b><i><a href="http://what-is-how.blogspot.com/2012/10/what-is-sdio.html">SDIO</a></i></b>Anonymoushttp://www.blogger.com/profile/16970281043711075419noreply@blogger.com0tag:blogger.com,1999:blog-1493486155420185117.post-4403513601893728252012-10-27T18:00:00.000+07:002012-10-27T18:00:06.549+07:00What Is SDIO?<b><i><a href="http://what-is-how.blogspot.com/2012/10/what-is-sdio.html">What Is SDIO?</a></i></b><br />
SDIO is the secure digital input output form of device where both the input and the output aspects of the device are performed. Moreover it had been found out that the SDIO had been designed in the form of card that is of portable in nature and thus it can be carried at any place. It can also be used with the computers or some other devices but mainly the SDIO card had been designed in the form of card which is somewhat a collection of the SD card and the input output device.<br />
<br />
Each of the devices are found to perform their own different functions. It had been found out that the electronic devices are the ones which are making use of the SDIO cards as this can be attached and detached from the device easily. Moreover it had been observed that the devices which are making use of the SDIO cards are the palm Treo or the PDA devices where the card can be inserted and then as a result the information and the data can be easily stored on that particular device. <br />
<br />
The entire information which is stored on the device is safe and secure. They are used in the mobile phones that are used by people on regular basis and at the same time it can also be used in the computers too which are used for different purposes.<br />
<br />
Mainly for the working of the <b><a href="http://what-is-how.blogspot.com/2012/10/what-is-sdio.html">SDIO,</a></b> it had been seen that the user have to use the SD form factor. Moreover some of the benefits had been provided to people. Some of the SD cards are also made available to people and in that case each of the cards which are offered to people are providing different features and benefits. The main benefit which is provided by the SD card is the SD Plus along with the data capacity where mush of the information can be stored on a larger range.<br />
Read: <i><b><a href="http://what-is-how.blogspot.com/2012/10/what-is-hacker.html">Hacker</a></b></i>Anonymoushttp://www.blogger.com/profile/16970281043711075419noreply@blogger.com0tag:blogger.com,1999:blog-1493486155420185117.post-4882336086984807752012-10-27T12:00:00.000+07:002012-10-27T12:00:00.417+07:00What Is Hacker?<b><i><a href="http://what-is-how.blogspot.com/2012/10/what-is-hacker.html">What Is Hacker?</a></i></b><br />
Hacker is a wider term which had been described in many different ways. Mostly it is the term which is associated with computing. In each and every field hacker have a different meaning. Hacker is a person who is able to gather all the entire information that is contained in the computer and hence is termed to be regarded as confidential. <br />
<br />
All the confidential is not hidden by the hacker at all as he is the person who is very expert in it. For this the person needs to have some certain hacking skills such as the ways in which hacking of the computer system or some other programs can be incurred. Moreover the hacker is the person who is considered to be a part of the community rather than being considered to be separate from the entire society.<br />
<br />
Moreover if hacker is looked from the computer perspective then it means a person who gathers all the internal and external data of the computer and the other networking systems. This type of activity is being used by the mass media people as they are the ones who are indulged into getting into all the information that can be gathered by the person in a less time period. Mostly for the hacking systems prescribed code had been allocated which needs to be entered by the hacker which as a result allows him to view all the information in the computer or systems.<br />
<br />
<b><a href="http://what-is-how.blogspot.com/2012/10/what-is-hacker.html">Hacker</a></b> are the people who are mainly referred to as the people who are computer criminals as they try their best to gather all the secured data of the company or some other industry at any cost but from all the perspective. Sometimes the hacking of the e-mail address also takes place and the hacker also changes the password. After some time the person at times gets his e-mail address back and thus can view it again. This type of service is not being appreciated as at all as the data of the secret data of the user remains no more secret.<br />
Read: <b><i><a href="http://what-is-how.blogspot.com/2012/10//what-is-dsl.html">DSL</a></i></b>Anonymoushttp://www.blogger.com/profile/16970281043711075419noreply@blogger.com0tag:blogger.com,1999:blog-1493486155420185117.post-1818055448573884822012-10-27T06:00:00.000+07:002012-10-27T06:00:05.317+07:00What Is DSL? Digital Subscriber Lines<b><i><a href="http://what-is-how.blogspot.com/2012/10//what-is-dsl.html">What Is DSL?</a></i></b><br />
The term DSL is an acronym for Digital Subscriber Lines and this term is the name of the family that provide technology for digital data transmission through the network over the wires of the local telephone network, which are usually made up of copper wires. The best example of this technology is broadband, where the internet ability is provided to the user over these telephone lines.<br />
<br />
The two main categories of this DSL are ADSL or Asymmetric Digital Subscriber Line and SDSL or Symmetric digital subscriber line. Apart from these two major categories, there are two other types of categories present in the market as well, named HDSL or High Data Rate DSL and VDSL or Very High DSL. These two types of the DSL are quite expensive and are installed only in the large sized enterprise, as they installation and the operational costs are both high. The most common type of the DSL that is used by many people throughout the world is ADSL, as it is cheaper and the operational costs are also low.<br />
<br />
This DSL technology basically pack the data on to the copper wire by using a sophisticated modulation technique and schemes and this technology is only used for connection from the telephone lines to homes and offices but not for providing connections between the switching stations. This DSL technology is quite similar to the ISDN technology as they both operate on the copper wires and both require the short run to the telephone office. However, the major difference between these two lies in the matter of speed.
<br />
<br />
The <b><a href="http://what-is-how.blogspot.com/2012/10//what-is-dsl.html">DSL</a></b> technology is capable of giving speed up to 32 Mbps for upstream traffic and max speed of 1 Mbps for the downstream traffic. This technology is currently undergoing revision and it is quite possible that the speed that this technology has to offer to the users might even increase drastically, after all the main thing is loading the cables with the data packets with the help of modulation schemes.<br />
Read: <b><i><a href="http://what-is-how.blogspot.com/2012/10/what-is-vbr.html">VBR</a></i></b>Anonymoushttp://www.blogger.com/profile/16970281043711075419noreply@blogger.com0tag:blogger.com,1999:blog-1493486155420185117.post-35449497427577257032012-10-27T00:00:00.000+07:002012-10-27T00:00:04.603+07:00What Is VBR? Variable Bit Rate<b><a href="http://what-is-how.blogspot.com/2012/10/what-is-vbr.html">What Is VBR?</a></b><br />
The term VBR is quite a versatile term, that is, even in the computing world it stands for several things, and this term also has specific meaning attached to it even if it is used outside the networking world. This article will only deal with this term with respect to the networking and computing world.<br />
<br />
The term VBR stands for variable bit rate in the networking world. VBR or variable bit rate is class B quality of service. This VBR is a ATM bandwidth allocation service which allows the users to specify a certain throughput capacity, that is, a peak rate at which the data is to be transmitted. <br />
<br />
In this service the throughput rate is set according to the wishes of the user, however, the data through this service is not sent evenly, the way the data is sent depends entirely upon this service. The most common use of this service is seen in places where compressed packetized voice and video data has to be sent to the end user present in the network. The best example of the scenario where this service would be extensively used is videoconferencing, in it both, the voice and video data is sent to the end users who are present in this videoconferencing.<br />
<br />
The main advantage of VBR is that it allows a higher bit rate to be allocated, hence allowing more storage space to be allocated. However, like having an advantage, this service also have some disadvantages. The first one is that, the time needed to encode the data with service is often more as compared to the other services used, because the process is more complex and some of the hardware might not be compatible with service. <br />
<br />
<b><a href="http://what-is-how.blogspot.com/2012/10/what-is-vbr.html">VBR</a></b>: Then over a dial up connection and internet broadband, the user have to face a problem with this service, and the third disadvantage is that the encoding process done provides very little security for the data as many could interpret what the encoded message is.<br />
Read: <b><i><a href="http://what-is-how.blogspot.com/2012/10/what-is-hijacker.html">HIJacker</a></i></b>Anonymoushttp://www.blogger.com/profile/16970281043711075419noreply@blogger.com0tag:blogger.com,1999:blog-1493486155420185117.post-14053690010943228682012-10-26T18:00:00.000+07:002012-10-26T18:00:02.351+07:00What Is HIJacker?<a href="http://what-is-how.blogspot.com/2012/10/what-is-hijacker.html"><b><i>What Is HIJacker?</i></b></a><br />
A hijacker is an attempt from a third party to take control of your web browser and use it for their own evil purposes. Some browser hijacks can be done to spread awareness of a particular website, but aren’t actually dangerous. In some cases, though, they can be malicious, and they can steal information like passwords you have saved into your browser automatically. Perhaps the most common type of browser hijack is done by a program that installs itself on your computer without you knowing. The program will add several favorites to your list without your knowledge, and it will change the start page of your browser and even some registry keys. When you attempt to reset your browser, you will be unable to do so.<br />
<br />
The most obvious sign of a browser hijack is that your start page has been changed and you can’t change it back. You may notice a complete slowdown in the performance of your computer since many browser hijacks work as fully functional programs that run in the background of your computer from the time you turn it on to the time you turn it off. These programs are often resource hogs that cause everything else on your machine to run slower.<br />
<br />
You may also notice that a whole new set of bookmarks have been added to your browser that you’ve never seen before. Some websites have been known to add one bookmark (usually one for that particular site), but if you see a whole new folder full of questionable bookmarks, you may have a browser hijacker installed on your machine.<br />
<br />
The first step you should take if you feel that you have a hijacker installed on your computer is head to the Microsoft Update site to ensure that you have all the patches and updates you need. Microsoft does a great job of stopping many of these.<br />
<br />
Once you’ve updated and restarted your computer, you need to install a reputable anti-spyware program on your computer to run in the background and monitor what bad programs you come into contact with. Two reputable programs are provided by Paretologic and PC Tools Software. Both not only remove browser hijackers they also provide the dynamic monitoring you need to protect you against future hijacks.<br />
<br />
You can download and install either of their programs in minutes. Run a full scan of your machine immediately. Once you’ve removed any initial problems, you should run a full scan of your machine at least once per week to ensure that you haven’t come down with any browser <a href="http://what-is-how.blogspot.com/2012/10/what-is-hijacker.html"><b>hijackers</b></a> or any other program that can affect your machine in a negative way.<br />
<br />
Finally, make sure you keep your anti-virus and anti-spyware programs updated at all times.<br />
Read: <b><i><a href="http://what-is-how.blogspot.com/2012/10/what-is-dialer.html">Dialer</a></i></b>Anonymoushttp://www.blogger.com/profile/16970281043711075419noreply@blogger.com0tag:blogger.com,1999:blog-1493486155420185117.post-46174384709150193782012-10-26T12:00:00.000+07:002012-10-26T12:00:09.873+07:00What Is Dialer?<b><i><a href="http://what-is-how.blogspot.com/2012/10/what-is-dialer.html">What Is Dialer?</a></i></b><br />
A dialer is a program that uses a computer’s modem to establish a dialup connection to the Internet. A connection is made by dialing a predetermined phone number. Malicious dialers are designed to use international or premium rate local phone numbers to make a connection bypassing the local Internet service provider. Their activity usually results in receiving high phone bills, as per-minute charges of most phone numbers used exceed 5 or 10 dollars.<br />
<br />
Most dialers are parasitical programs. They work in the same manner as regular computer <a href="http://what-is-how.blogspot.com/">viruses</a> and therefore change system’s essential dialup and networking settings without user knowledge and consent. <br />
<br />
A typical dialer runs on every computer startup and attempts to hide its presence in the system. Its activity cannot be easily noticed, as a parasite usually doesn’t affect computer performance and doesn’t leave any clues like unexpected advertisements or third-party toolbars. Practically all dialers are designed for commercial purposes. <br />
<br />
Their vendors strive to make money out of credulous and unaware users. Parasites deliberately do not offer fast and reliable Internet connection, as every minute that a user spends being online brings them quite a tangible income. A typical dialer’s victim loses hundreds of dollars every day and doesn’t even know about it until he receives an enormous phone bill from a local phone company.<br />
<br />
Dialers complicate usual web surfing. Due to very low connection speed and throughput some web sites cannot be accessed or do not work as intended. Downloading software or music, watching online video or animation, browsing complex multimedia sites are almost impossible tasks for users whose computers are infected with dialers. <br />
<br />
Moreover, some dialers provide access only to several predetermined web resources, and other sites and servers cannot be accessed at all. As it was said above, most dialers work in the same manner as the computer viruses and therefore can be found and removed with the help of effective antivirus products like Symantec Norton AntiVirus, Kaspersky Anti-Virus, McAfee VirusScan, eTrust EZ Antivirus, Panda Titanium Antivirus, AVG Anti-Virus. <br />
<br />
Advanced spyware removers, which are able to scan the system in a similar way antivirus software does and have extensive parasite signature databases can also detect and remove dialers and related components. Powerful anti-spyware solutions such as Microsoft AntiSpyware Beta, Spyware Doctor, Ad-Aware SE, SpyHunter, eTrust PestPatrol or Spybot - Search & Destroy are well-known for perfect dialer detection and removal capabilities.
<br />
<br />
In some cases even an antivirus or spyware remover can fail to get rid of a particular <b><a href="http://what-is-how.blogspot.com/2012/10/what-is-dialer.html">dialer</a></b>. That is why there are Internet resources such as 2-Spyware.com, which provide manual malware removal instructions. These instructions allow the user to manually delete all the files, directories, registry entries and other objects that belong to a parasite. However, manual removal requires fair system knowledge and therefore can be a quite difficult and tedious task for novices.
<br />
<br />
If you are one of the millions of people who have suffered a browser hijacking, you likely know it, and you clearly remember what you were doing when it happened. The best known form of browser hijacking is when a sudden flood of pop-ups, many of them obscene, explode over your screen and you are forced to use the CTRL-ATL-DEL sequence to close your browser and regain control of your computer. Here is a quick guide you can use to identify the different kinds of browser hijackings and how you can rid yourself of them once and for all.<br />
Read: <b><i><a href="http://what-is-how.blogspot.com/2012/10/what-is-wiki.html">Wiki</a></i></b>Anonymoushttp://www.blogger.com/profile/16970281043711075419noreply@blogger.com0tag:blogger.com,1999:blog-1493486155420185117.post-14032186316683996562012-10-26T06:00:00.000+07:002012-10-26T06:00:01.883+07:00What Is Wiki?<a href="http://what-is-how.blogspot.com/2012/10/what-is-wiki.html"><b><i>What Is Wiki?</i></b></a><br />
Wiki is a website where users can add, remove, and edit every page using a web browser. It's so terrifically easy for people to jump in and revise pages that wikis are becoming known as the tool of choice for large, multiple-participant projects.<br />
<br />
Somewhere, in a dimly lit classroom, a library bench, or in a home study, some lucky so-and-so is writing an essay from beginning to end with no notes. This splendid individual is able to craft entire sections without forgetting by the end what the section was intended to include at the beginning, and can weave a carefully paced argument with thoughts and references collected over a period of months, all perfectly recollected. Neither of your authors is this person. Instead, we need help, and that help comes in the shape of a wiki.<br />
<br />
A wiki is a website where every page can be edited in a web browser, by whomever happens to be reading it. It's so terrifically easy for people to jump in and revise pages that wikis are becoming known as the tool of choice for large, multiple-participant projects. This tutorial is about how to effectively use a wiki to keep notes and share ideas amongst a group of people, and how to organize that wiki to avoid lost thoughts and encourage serendipity.<br />
<br />
This article was written using a wiki, as were most of the 100 hacks in our book, Mind Hacks. The prime example of a wiki in action is Wikipedia, the open source encyclopedia. Wikipedia is one of the best resources on the internet, and its quality and breadth lends credence to the wiki as a great tool. But it illustrates just one way of using the wiki.<br />
<br />
Wikipedia builds on transparency, simple linking, and a low barrier to entry for crowds of people to be involved in editing and authoring. We can use these same qualities with just two or three people for a different outcome: a shared workspace and, in effect, a shared memory.<br />
<br />
As with any large project, we found that a book was too big to hold in mind all at once, and definitely too big to guarantee remembering those many promising ideas that came up at times we were least able to pursue them. Some of these ideas would start as off-the-cuff thoughts and, when followed up, grow to change large parts of our major concept. So it was important to record them, and give them room. <br />
<br />
A large number of recorded ideas means, of course, that it's easy to get out of sync with project partners, and that's where the wiki as shared memory comes in. Using a <a href="http://what-is-how.blogspot.com/2012/10/what-is-wiki.html"><b>Wiki</b></a> for your big projects keeps all participants on the same page.<br />
Read: <a href="http://what-is-how.blogspot.com/2012/10/what-is-wep.html"><b><i>WEP</i></b></a>Anonymoushttp://www.blogger.com/profile/16970281043711075419noreply@blogger.com0tag:blogger.com,1999:blog-1493486155420185117.post-3824832495690905862012-10-26T00:00:00.000+07:002012-10-26T00:00:04.676+07:00What Is WEP? Wired Equivalent Privacy<b><a href="http://what-is-how.blogspot.com/2012/10/what-is-wep.html">What Is WEP?</a></b><br />
WEP is a standard method for encrypting traffic over a wireless network. WEP was intended to give wireless users security equivalent to being on a wired network. With WEP turned on, each packet to be transmitted is first encrypted and then passed through a shredding machine called RC4. <br />
<br />
128-bit encryption is preferred over 64-bit encryption, as it is lot more difficult to break. A major problem associated with WEP is key management. When we enable WEP according to the wireless standard, we need to visit each wireless device that we use and type in the proper WEP key. <br />
<br />
If the key is compromised due to some reasons, either you have to change the key or lose all security. <br />
<br />
Also, if you have hundreds of users on your network, changing the <b><a href="http://what-is-how.blogspot.com/2012/10/what-is-wep.html">WEP</a></b> key creates lots of difficulties. Thus, though WEP has several weaknesses, using WEP is better than not using it.<br />
Read: <b><i><a href="http://what-is-how.blogspot.com/2012/10/what-is-ssid.html">SSID</a></i></b>Anonymoushttp://www.blogger.com/profile/16970281043711075419noreply@blogger.com0tag:blogger.com,1999:blog-1493486155420185117.post-39289545491563497732012-10-25T18:00:00.000+07:002012-10-25T18:00:14.785+07:00What Is SSID? Service Set Identifier<b><i><a href="http://what-is-how.blogspot.com/2012/10/what-is-ssid.html">What Is SSID? </a></i></b><br />
SSID (Service Set Identifier) is meant to differentiate one <i><b><a href="http://what-is-how.blogspot.com/">network</a></b></i> from another. SSID is the identification string used by the wireless access points by which clients are able to initiate connections. <br />
<br />
SSID settings on your network should be considered the first level of security, and should be treated as such. In its standards-adherent state, SSID may not offer any protection to who gains access to your network, but configuring your SSID to something not easily guessable can make it harder for intruders to know what exactly they are looking at. <br />
<br />
For each wireless access point you deploy, it is very important to choose a unique and difficult-to-guess SSID. Also, by default, wireless gateways happily broadcast the SSID to be picked up by any wireless network device for easy configuration. Hiding the <b><a href="http://what-is-how.blogspot.com/2012/10/what-is-ssid.html">SSID</a></b> by disabling the SSID broadcast makes the life of an intruder tough.<br />
Read: <a href="http://what-is-how.blogspot.com/2012/10/what-is-wireless-network.html"><b><i>Wireless Network</i></b></a>Anonymoushttp://www.blogger.com/profile/16970281043711075419noreply@blogger.com0tag:blogger.com,1999:blog-1493486155420185117.post-19539410418219560232012-10-25T12:00:00.000+07:002012-10-25T12:00:04.651+07:00What Is Wireless Network?<b><a href="http://what-is-how.blogspot.com/2012/10/what-is-wireless-network.html">What Is Wireless Network?</a></b><br />
The new standard in <b>wireless network</b>--802.11g--offers speed, security, and performance. It is also the most widely employed standard in corporate internal wireless LAN network. You can transfer data at up to 54Mbps using 802.11g (which is five times the speed of older 802.11b wireless network). And wireless LANs provide some obvious benefits: they always provide on-network connectivity, they do not require a network cable, and they actually prove less expensive than traditional network. <br />
<br />
Wireless network have evolved into more affordable and logistically acceptable alternatives to wired LANs. But to take advantage of these benefits, your <b><a href="http://what-is-how.blogspot.com/">wireless</a></b> LAN needs to be properly secured.
Network security in a wireless LAN environment is a unique challenge.<br />
<br />
Whereas wired network send electrical signals or pulses through cables, wireless signals propagate through the air. Because of this, it is much easier to intercept wireless signals. This extra level of security complexity adds to the challenges network administrators already face with traditional wired network. There are a number of extremely serious risks and dangers if wireless network are left open and exposed to the outside world. <br />
<br />
This article covers the types of attacks <i><b><a href="http://what-is-how.blogspot.com/2012/10/what-is-wireless-network.html">wireless network</a></b></i> encounter, preventive measures to reduce the chance of attack, guidelines administrators can follow to protect their company's wireless LAN, and an excellent supply of online resources for setting up a secure wireless network.<br />
Read: <b><a href="http://what-is-how.blogspot.com/2012/10/what-is-window-manager.html">Window Manager</a></b>Anonymoushttp://www.blogger.com/profile/16970281043711075419noreply@blogger.com0tag:blogger.com,1999:blog-1493486155420185117.post-37585125761613729022012-10-25T06:00:00.000+07:002012-10-25T06:00:06.573+07:00What Is Window Manager?<b><a href="http://what-is-how.blogspot.com/2012/10/what-is-window-manager.html"><i>What Is Window Manager?</i></a></b><br />
The window manager is the client application, with responsibility for managing client windows. There are a number of window managers to choose from, many with features that begin to approach those of a desktop. For information on many of the available window managers, see the Window Managers for X web site.<br />
<br />
The window manager controls the general operation of the window system; in particular, it controls the geometry and aesthetics of your X display. With the window manager you can change the size and position of windows on the display, reshuffle windows in a window stack, and so on.<br />
<br />
Figures 1 and 2 are screenshots from my fvwm-managed system. If you are using another window manager, the X display will have that window manager's appearance. In fact, because X is so customizable, even two users running the same window manager are likely to have screens that look very different.
<br />
<br />
fvwm is compliant with the Inter-Client Communication Conventions Manual (ICCCM). The ICCCM is a standard that defines interactions between X clients, including client interactions with the <b><a href="http://what-is-how.blogspot.com/2012/10/what-is-window-manager.html">window manager</a></b>. It defines basic policy that is intentionally omitted from X itself, such as the rules for transferring data between applications and for transferring keyboard focus. <br />
<br />
Window managers and other applications that follow the ICCCM should be able to coexist and work together on the same server, even if they were written using different toolkits. This capability explains why you can, for example, run KDE applications on a GNOME desktop or with fvwm.<br />
Read: <i><b><a href="http://what-is-how.blogspot.com/2012/10/what-is-x-server.html">X Server</a></b></i>Anonymoushttp://www.blogger.com/profile/16970281043711075419noreply@blogger.com0tag:blogger.com,1999:blog-1493486155420185117.post-84846856244220957092012-10-25T00:00:00.000+07:002012-10-25T00:00:02.350+07:00What Is X Server?<b><a href="http://what-is-how.blogspot.com/2012/10/what-is-x-server.html">What Is X Server?</a></b><br />
The X server manages the display hardware. The server captures input events from the user via keyboard or mouse (or other input device) and passes the information to a client application that has requested it. It also receives requests from the application to perform some graphical action. <br />
<br />
For example, if you use your mouse to move a window on the screen, the X server passes the information to the window manager, which responds by telling the server where to reposition the window, and the X server performs the action. If the client is a calculator, such as xcalc, it might request that digits be displayed into the window as the user clicks on buttons to enter a number.<br />
<br />
In any case, it is always the server that interacts with the hardware. Thus only the server software has to be hardware-specific. In fact, only the parts of the server that actually interact with the hardware need to be rewritten for X to be ported to new systems or to be usable with a new terminal or a new type of input device, for example. As long as the X clients are written to use the X Protocol, they can run on any system and communicate with the <b><i><a href="http://what-is-how.blogspot.com/2012/10/what-is-x-server.html"><span id="goog_1827953112"></span>X server</a></i><span id="goog_1827953113"></span></b>.<br />
Read: <a href="http://what-is-how.blogspot.com/2012/10/what-is-x-client.html"><b>X Client</b></a><br />
<br />Anonymoushttp://www.blogger.com/profile/16970281043711075419noreply@blogger.com0tag:blogger.com,1999:blog-1493486155420185117.post-36302208116828891292012-10-24T18:00:00.000+07:002012-10-24T18:00:00.530+07:00What Is X Client?<a href="http://what-is-how.blogspot.com/2012/10/what-is-x-client.html"><b><i>What Is X Client?</i></b></a><br />
The client, as it is implemented by X, may seem backward at first glance. Generally, we think of servers as remote machines like file servers, news servers, or mail servers, with local clients accessing the servers. For X, however, it's the server that runs on the local machine, providing its services to the display based on requests from client programs that may be running locally or remotely. The server also manages the input devices (usually a keyboard and mouse), and it manages the display of colors and fonts on the screen, all based on requests from a client.<br />
<br />
One of the most significant features of <a href="http://what-is-how.blogspot.com/2012/10/what-is-x-client.html"><b>X Client</b></a> is that it was specifically designed to work across a network. The client and the server communicate via the X Protocol, a network protocol that can run locally or across a network. Regardless of whether a client program is local or remote, X Client communicates with the server through the X Protocol.<br />
Read: <b><i><a href="http://what-is-how.blogspot.com/2012/10/what-is-x-window-system.html">X Window System</a></i></b>Anonymoushttp://www.blogger.com/profile/16970281043711075419noreply@blogger.com0tag:blogger.com,1999:blog-1493486155420185117.post-52163647619772025512012-10-24T12:00:00.000+07:002012-10-24T12:00:09.173+07:00What Is X Window System? <i><b><a href="http://what-is-how.blogspot.com/2012/10/what-is-x-window-system.html">What Is X Window System?</a></b></i><br />
The X Window System (commonly referred to as X or X11) is a network-transparent graphical windowing system based on a client/server model. Primarily used on Unix and Unix-like systems such as Linux, versions of X are also available for many other operating systems. Although it was developed in 1984, X is not only still viable but also is in fact the standard environment for Unix windowing systems. <br />
<br />
The X Window System is a graphical windowing system that was developed at MIT in 1984. X was developed as part of Project Athena, a cooperative effort between MIT, IBM, and Digital Equipment Corporation to develop a network of heterogeneous engineering terminals that could be used for teaching purposes. The current version, X11, was released in 1987 and is now up to X11 release 6, known as X11R6.<br />
<br />
One reason X Window System has had such staying power is that from the beginning it incorporated many of the windowing capabilities that we now take for granted. These capabilities include network transparency, graphical capability, the use of a mouse, and the ability to link together a heterogeneous network of workstations from different vendors.<br />
<br />
In addition, X was intentionally designed to provide the low-level mechanism for managing the graphics display, but not to have any control over what is displayed. This means that X has never been locked into a single way of doing things; instead, it has the flexibility to be used in many different ways. Both the simplest window manager and the most complex desktop environment can, and do, use the X Window System to manage the display.<br />
<br />
The responsibility and stewardship of X is currently in the hands of the X.Org Foundation; the X.Org implementation of the <b><a href="http://what-is-how.blogspot.com/2012/10/what-is-x-window-system.html">X Window System</a></b> is included with most of the major Linux and free Unix distributions. Until 2004, the standard version of X was XFree86, developed by the XFree86 Project. New licensing restrictions imposed by XFree86 led to the switch to X.org.<br />
Read: <a href="http://what-is-how.blogspot.com/2012/10/what-is-ip-address-lookup.html"><b><i>IP Address Lookup</i></b></a>Anonymoushttp://www.blogger.com/profile/16970281043711075419noreply@blogger.com0tag:blogger.com,1999:blog-1493486155420185117.post-85858353239476660272012-10-24T06:00:00.000+07:002012-10-24T06:00:00.514+07:00What Is IP Address Lookup?<a href="http://what-is-how.blogspot.com/2012/10/what-is-ip-address-lookup.html"><i><b>What Is IP Address Lookup?</b></i></a><br />
The IP Address Lookup tool also referred to as IP Lookup, Lookup IP, Lookup IP Address, IP Address Location, IP Location, and IP Locator is designed to give you an idea of where your IP Address or the IP Address you lookup is located. This tool is not 100% accurate due to many different factors. <br />
<br />
Some of those factors include where the owner of the IP has it registered, where the agency that controls the IP is located, proxies, cellular IPs, etc. If you are in the US and the controlling agency of the IP is located in Canada, chances are the IP address lookup results will show as Canada. Showing a Canadian IP while in the US is very common among Blackberry users on the Verizon network.<br />
<br />
The results of this IP Address Lookup utility include the IP Address, City, Host Name, Region / State, Postal / Zip Code, Country Name, Country Code, Time Zone, Longitude, Latitude, ISP, Domain Name, Net Speed, and IP Decimal.<br />
<br />
Often, people think if they perform and IP address lookup, that they are going to find the physical mailing address of the user assigned the IP in question. This is simply not true. At this time, we are not aware of any IP address database that will give you the exact physical postal address of the IP address you lookup. At best, you'll get the exact city in which the user of the IP is located. For an exact physical address you would need to contact the ISP (Internet Service Provider) of the IP address in question. <br />
<br />
<b><a href="http://what-is-how.blogspot.com/2012/10/what-is-ip-address-lookup.html">IP Address Lookup</a></b>: However, without a police warrant, or some sort of legal document forcing the ISP to turn over the information, don't expect them to give you the mailing address of the user that was assigned the IP at the time you received the offensive email, or other means of offensive / questionable communication from said IP. The best you can do in this case is to file a complaint with the ISP and forward them all of the information from the questionable / offensive communication regarding the complaint.<br />
Read: <a href="http://what-is-how.blogspot.com/2012/10/vpn-protocol.html"><b><i>VPN Protocol</i></b></a>
Anonymoushttp://www.blogger.com/profile/16970281043711075419noreply@blogger.com0tag:blogger.com,1999:blog-1493486155420185117.post-15294010904222170452012-10-24T00:00:00.000+07:002012-10-24T00:00:02.944+07:00What Is VPN Protocol?What Is <b><i><a href="http://what-is-how.blogspot.com/2012/10/vpn-protocol.html">VPN Protocol</a></i>?</b><br />
The number of protocol and available security features continue to grow with time. The most common protocol are:<br />
<ul>
<li>PPTP - PPTP has been around since the days of Windows 95. The main selling point of PPTP is that it can be simply setup on every major OS. In short, PPTP tunnels a point-to-point connection over the GRE protocol. Unfortunately, the security of the PPTP protocol has been called into question in recent years. It is still strong, but not the most secure.</li>
<li>L2TP/IPsec - L2TP over IPsec is more secure than PPTP and offers more features. L2TP/IPsec is a way of implementing two protocol together in order to gain the best features of each. In this case, the L2TP protocol is used to create a tunnel and IPsec provides a secure channel. This makes for an impressively secure package. <a href="http://what-is-how.blogspot.com/2012/10/vpn-protocol.html"><b>VPN Protocol</b>.</a></li>
<li>Open VPN - OpenVPN is an SSL-based VPN that continues to gain popularity. The software used is open source and freely available. SSL is a mature encryption protocol, and OpenVPN can run on a single UDP or TCP port, making it extremely flexible.</li>
</ul>
<div>
Read: <i><b><a href="http://what-is-how.blogspot.com/2012/10/what-is-vpn-security.html">VPN Security</a></b></i></div>
Anonymoushttp://www.blogger.com/profile/16970281043711075419noreply@blogger.com0tag:blogger.com,1999:blog-1493486155420185117.post-71940400876358603382012-10-23T18:00:00.000+07:002012-10-23T18:00:02.486+07:00What Is VPN Security?<b><i><a href="http://what-is-how.blogspot.com/2012/10/what-is-vpn-security.html">What Is VPN Security?</a></i></b><br />
Security is the main reason why corporations have used VPNs for years. There are increasingly simple methods to intercept data traveling to a network. WiFi spoofing and Firesheep are two easy ways to hack information. A useful analogy is that a firewall protects your data while on the computer and a VPN protects your data on the web. VPNs use advanced encryption protocols and secure tunneling techniques to encapsulate all online data transfers. <br />
<br />
Most savvy computer users wouldn't dream of connecting to the Internet without a firewall and up-to-date antivirus. Evolving security threats and ever increasing reliance on the Internet make a VPN an essential part of well-rounded security. <br />
<br />
<b><a href="http://what-is-how.blogspot.com/2012/10/what-is-vpn-security.html">VPN Security</a></b>: Integrity checks ensure that no data is lost and that the connection has not been hijacked. Since all traffic is protected, this method is preferred to proxies.<br />
Read: <i><b><a href="http://what-is-how.blogspot.com/2012/10/what-is-vpn.html">VPN</a></b></i>Anonymoushttp://www.blogger.com/profile/16970281043711075419noreply@blogger.com0tag:blogger.com,1999:blog-1493486155420185117.post-17550553735428893662012-10-23T12:00:00.000+07:002012-10-23T12:00:11.873+07:00What Is VPN? Virtual Private Network<a href="http://what-is-how.blogspot.com/2012/10/what-is-vpn.html"><b><i>What Is VPN?</i></b></a><br />
A VPN or Virtual Private Network is a method used to add security and privacy to private and public networks, like WiFi Hotspots and the Internet. VPNs are most often used by corporations to protect sensitive data. However, using a personal VPN is increasingly becoming more popular as more interactions that were previously face-to-face transition to the Internet.<br />
<br />
Privacy is increased with a VPN because the user's initial IP address is replaced with one from the VPN provider. This method allows subscribers to attain an IP address from any gateway city the VPN service provides. For instance, you may live in San Francisco, but with a <i><b><a href="http://what-is-how.blogspot.com/2012/10/what-is-vpn.html">VPN</a></b></i>, you can appear to live in Amsterdam, New York, or any number of gateway cities.
<br />
Read: <b><a href="http://what-is-how.blogspot.com/2012/10/what-is-dhcp-server.html">DHCP Server</a></b>Anonymoushttp://www.blogger.com/profile/16970281043711075419noreply@blogger.com0tag:blogger.com,1999:blog-1493486155420185117.post-46155012912726852002012-10-23T06:00:00.000+07:002012-10-23T06:00:03.434+07:00What Is A DHCP Server? Dynamic Host Configuration Protocol<span style="color: #0000ee;"><b><i><u><a href="http://what-is-how.blogspot.com/2012/10/what-is-dhcp-server.html">What Is A DHCP Server?</a></u></i></b></span><br />
In simple terms, DHCP determines if your IP is static or dynamic and the length of time an IP address is assigned.<br />
<br />
Dynamic Host Configuration Protocol is controlled by a DHCP server. Your router can be a DHCP server...and if you're on a home network, it most likely serves this purpose.<br />
<br />
I know this might be confusing because the word dynamic is in the term, but just because you have DHCP enabled on your computer doesn't mean you can't be assigned a static IP. DHCP enabled on your computer simply means you're letting a DHCP server assign its IP. Having it enabled DOES NOT mean it's a DHCP server.<br />
<br />
A true DHCP server (not your Linksys router) gives the LAN Admin a ton of control with IP assigning.<br />
<br />
Ever print to a network printer? Ever wonder how that printer keeps its network assignment? Each network device has a MAC address. You can assign a static IP at the server to a specific MAC address. This allows the network printer to always get the same IP even after it reboots and without assigning the IP at the printer. If you print the network configuration at the printer, it will probably tell you that DHCP is enabled and no static IP is assigned. That's because the IP assignment is handled at the server.
<br />
<br />
Your ISP has a DHCP server. They can assign IPs by modem MAC addresses. When your modem comes online, it communicates to the network indicating it is looking for an IP address. The DHCP server listens to this communication and starts talking to the modem. The modem then transmits its MAC address to the DHCP server. At that point, either an IP has been reserved for the modem or one is assigned at that time. Hence cloning your MAC address to get a new IP from your ISP.<br />
<br />
Routers and <b>DHCP</b> - Under the General Setup or LAN Setup tab in your router, you'll see a settings option for DHCP. You can control how many IPs are assigned or to enable/disable the DHCP server portion of the router. If you disable it, you'll have to statically assign IPs to each computer, or have a <b><a href="http://what-is-how.blogspot.com/2012/10/what-is-dhcp-server.html">DHCP server</a></b> or your network. This goes for wired and wireless. Any connection on your network has an IP address.<br />
<br />
There's a lot more to DHCP than this, but this is a basic explanation.
Read: <a href="http://what-is-how.blogspot.com/2012/10/what-is-static-ip.html"><i><b>Static IP</b></i></a>Anonymoushttp://www.blogger.com/profile/16970281043711075419noreply@blogger.com0tag:blogger.com,1999:blog-1493486155420185117.post-11375397026061623022012-10-23T00:00:00.000+07:002012-10-23T00:00:00.703+07:00What Is Static IP?A <a href="http://what-is-how.blogspot.com/2012/10/what-is-static-ip.html"><b>static IP</b></a> is one that will never change. A dynamic IP is exactly that, dynamic. It could change frequently, or not change for more than 1 year. It really depends on how the DHCP server that’s assigns the IPs is set up.
<i><a href="http://what-is-how.blogspot.com/2012/10/what-is-static-ip.html">What Is Static IP?</a></i><br />
Read: <a href="http://what-is-how.blogspot.com/2012/10/what-is-ip-address.html"><b>IP Address</b></a>
Anonymoushttp://www.blogger.com/profile/16970281043711075419noreply@blogger.com0