More About Me...

all about computer things in this blog you can find many information about computing things and google adsense. i hope it can tell you what you want to know. i'll hope you enjoy it.. Thanks for coming More About Me...

the soul

Mental illness doesn't touch the soul. Even as it punishes the mind. None can will the wanderings of the wind, Though winter come, and tempests take their toll. All who suffer innocent shall find, Love waiting by the window, well and whole, Inside the heart, where it has full control, Longing ever, ever unresigned. Let go your fear, and follow, then, your path,

How Spyware Blaster Can Protect Your Computer From Harm

By browsing a web page, you could infect your computer with spy ware, ad ware, dialers and hijackers. These, unwelcome guests, are some of the fastest growing threats on the Internet today. It is important to protect your computer and one of the most powerful software products, available for this, is Spy ware Blaster, a program created by Java cool.

How are you affected?


By browsing a web page, you could infect your computer with spy ware, ad ware, dialers and hijackers. These, unwelcome guests, are some of the fastest growing threats on the Internet today. It is important to protect your computer and one of the most powerful software products, available for this, is Spy ware Blaster, a program created by Java cool.

How are you affected?

A spyware program will record every keystroke and e-mail as well as every web page you visit and every chat session.
Some spyware programs will try to take control of your homepage, search page and other browser settings. Some may silently download themselves onto your computer. Others may pose as legitimate programs and persuade you to download them.

Private and confidential information extracted from a user's computer may be put on the Internet before he can realize that he is a victim of these malicious programs.

A Microsoft program called ActiveX is used to download software from websites for supporting legitimate services like file viewers or games. ActiveX can also be used to download spyware, hijackers, dialers and ad ware. Spyware Blaster can make it difficult for these ActiveX programs to run on your computer. It can also protect your computer from certain cookies while running Mozilla based browsers like Fire fox.

The major anti-virus software product manufacturers have ignored the risks of spyware, hijackers, dialers and adware till now. Due to this, users have little knowledge of the software products that can be effective in detecting and eliminating them. One of the most powerful products available to provide security from spyware is Spyware Blaster.

Spyware Blaster

Spyware Blaster is a freeware that offers effective protection from malicious Internet downloads. It disables malicious ActiveX controls that are already present and prevents downloads of malicious ActiveX controls from a web page. Its current database contains 822 items against which it provides protection. About 100 of these are tracking cookies, used by advertisers.

Spy ware Blaster's Flash Killer capability enables it to block the installation of distracting macromedia flash content. It gives the user the option to block specific search engine toolbars and browser plug-ins.

readmore »

Do You Know How To Remove Spyware From Your Computer?

Spyware is rapidly becoming a major problem for Internet users. It is estimated that 9 out of 10 computers are infected with spyware or ad ware or both. Spyware may be responsible for 50 % of all computer crashes. Spyware runs silently and you may not be aware that your every move on the Internet is being observed and recorded.

If a user does not detect and remove spy ware from his computer, all his files may get infected and it may stop working. All his passwords, credit card numbers and other personal information may be stolen before he can realize what is going on. Once spyware has been removed, the computer will run much faster. It is worth while you to find and use the best spyware removal software available.


Spyware is rapidly becoming a major problem for Internet users. It is estimated that 9 out of 10 computers are infected with spyware or ad ware or both. Spyware may be responsible for 50 % of all computer crashes. Spyware runs silently and you may not be aware that your every move on the Internet is being observed and recorded.

If a user does not detect and remove spy ware from his computer, all his files may get infected and it may stop working. All his passwords, credit card numbers and other personal information may be stolen before he can realize what is going on. Once spyware has been removed, the computer will run much faster. It is worth while you to find and use the best spyware removal software available.

Features Of Good Spyware Removal Software
A few features to consider, while searching for spyware removal software products, are:

* It should offer complete protection from spyware, key loggers, remote acess Trojans (RATS), browser hijackers and ad ware.
* A good spyware program will offer automatic updates, to provide protection from the latest spy ware threats.
* The spyware product should offer technical support, so you can call or e-mail someone, if you have a technical problem.
* A good customer service back up also shows that the manufacturer can be trusted to look after the needs of the customer in the long run.

How Does It Work?

It is very difficult to find and remove spyware software from a computer manually. Spyware protection software detects and removes spyware and ad ware from your computer automatically. It can also protect your computer from data thieves, hackers, malicious e-mail and other threats.

There are many free spyware protection software products available. These programs can be used to detect and remove spyware and adware that is already present in your computer. Many types of spyware, install themselves on your computer again, after you have deleted them.

readmore »

So You've Never Used A Computer Mouse Before?

Here is a lesson for beginning computer mouse users.

To hold the computer mouse;
Moveing the computer mouse;
Mouse pads;
Clicking The Mouse;


Here is a lesson for beginning computer mouse users.

To hold the computer mouse:
Hold the sides of the mouse with your thumb on one side and ring finger or pinkie, which ever feels more comfortable to you, on the other side. Your index finger goes on the left button and your middle finger on the right button. (Some computer mice only have one button, some have several, some have a wheel which you can use your middle finger to depress the wheel then turn it up or down to scroll pages very quickly or slow depending on how quickly you turn the wheel. Personally I love the wheel and would not have a mouse without it!) When you are told to 'click' use the button under your index finger, or the left button.

Moveing the computer mouse:
Slowly slide the mouse around on the mouse pad. See what happens to the arrow on the screen as you slide it around.

Mouse pads:
You should have a mouse pad under your computer mouse, (although the new optic mice do not require one). You will have an array of choices when purchasing a mouse pad; find the one that is comfortable for you. Rest you hand on the mouse pad or desk and move it slowly there is no need to lift the mouse off the mouse pad unless you run out of room, then you just lift it up and reposition where needed. You don't need to move the mouse to the left or right, simply slide it left or right with the buttons still facing away from you.

Clicking The Mouse:
Clicking sends a command to the computer. To click; gently press and release the left computer mouse button. Be careful not to move the mouse while you are clicking, if you accidentally do simply slide the mouse back to where you want to click and try again. Try to keep you hand relaxed on the mouse as you press and release without lifting your finger completely off the button.

Thats all you need to know to start using your computer and that computer mouse
Keep working on it and before you know it, it will feel like second nature to you and you will not even have to think about what you are doing, you will just do it.


Note:
Most libraries have free computer classes for the beginner, if you feel you need hands on help this would be the perfect place to start!

readmore »

How to Increase Your Computer Speed Fast

I'm sure you've come across tons of articles and even suggestions from some of your friends on how to get your computer to work faster. Its really not that hard to increase your internet speed. I'm going to make it real simple for you and you don't need to be a computer geek to make this work. The first thing you need to remember is to never, and I mean absolutely never download programs especially free software without reading the fine print. Most free computer software will bombard your computer with spyware which will eventually bring your internet speed to a screeching halt! If your computer is already infected with spyware you can download the leading spyware remover called ad-aware which will scan your computer and remove spyware and tracking cookies from your computer.


I'm sure you've come across tons of articles and even suggestions from some of your friends on how to get your computer to work faster. Its really not that hard to increase your internet speed. I'm going to make it real simple for you and you don't need to be a computer geek to make this work. The first thing you need to remember is to never, and I mean absolutely never download programs especially free software without reading the fine print. Most free computer software will bombard your computer with spyware which will eventually bring your internet speed to a screeching halt! If your computer is already infected with spyware you can download the leading spyware remover called ad-aware which will scan your computer and remove spyware and tracking cookies from your computer.

Another way of making your computer and internet connection faster is by clicking on start, then run and typing in msconfig. Go to start tab and remove any program except your antivirus software and any other program which you must have start when windows starts. This tip will increase your computer start up time dramatically!

Step number 3, and I do this almost on a daily basis is to clean up your internet cache. Go to your control panel which you can access from your start button and click on internet options. Go to temporary internet files and clear your history. I would recommend that you also set internet history to a maximum of 2 days. Next step is to delete your temporary internet files including offline content. Last step is to delete cookies. Be careful though because deleting your cookies will also delete useful information from your computer. You can read a how to on cookies here www.howstuffworks.com/cookie.htm.

These steps are the basics you can take which will speed up your internet connection immediately. I would also recommend doing a virus check on your computer on a weekly basis. If you don't have antivirus software, get it! You'll be happy you did. Just one virus can wreak havoc on your computer! Make sure you test your internet speed whether its broadband or dial-up, before and after you take these simple steps so you can compare if these steps you've taken have worked. Taking these basic steps will make you a happy surfer and will restore your faith in the World wide web!

readmore »

Three Basic Types Of Computer Mouse

Mechanical: This type of computer mouse has a rubber or metal ball on its underside and it can roll in every direction. Sensors within the mouse, which are mechanical, detect the direction in which the ball is moving and moves the pointer on the screen in the same direction. A mouse pad should be used under the mouse to run on.

Optomechanical: This type is the same as the mechanical mouse except that it uses optical sensors to the motion of the ball. A mouse pad should be used under the mouse to run on.

Optical: This type uses a laser for detecting the mouse's movement. You don't need a mouse pad but you can use one made for optical mice. Optical mice do not have any mechanical moving parts. This type responds more quickly and precisely than the mechanical and optomechanical mice and now that they have been around awhile the price is pretty comparable.


Mechanical: This type of computer mouse has a rubber or metal ball on its underside and it can roll in every direction. Sensors within the mouse, which are mechanical, detect the direction in which the ball is moving and moves the pointer on the screen in the same direction. A mouse pad should be used under the mouse to run on.

Optomechanical: This type is the same as the mechanical mouse except that it uses optical sensors to the motion of the ball. A mouse pad should be used under the mouse to run on.

Optical: This type uses a laser for detecting the mouse's movement. You don't need a mouse pad but you can use one made for optical mice. Optical mice do not have any mechanical moving parts. This type responds more quickly and precisely than the mechanical and optomechanical mice and now that they have been around awhile the price is pretty comparable.

How does a computer mouse hook up to the computer?

Serial mouse: these ones connect directly to an RS-232C serial port or a PS/2port. This is the simplest type of connection.

PS/2 mouse: connects to a PS/2 port.
USB mice

Cordless mouse: These are not physically connected to the computer. They rely on infrared or radio waves to communicate with the computer. Cordless are more expensive than both the serial and bus mouse. The nice thing is that there is no cord to constrain or get in your way.

readmore »

PC Maintenance and Improving Performance

Once you bring your personal computer home from the store or receive it in the mail there is no one around to offer basic personal computer maintenance tips for cleaning up and improving performance of your computer.
Maintenance and cleaning up of your PC should be part of a regular routine to ensure that you don't have any long-term problems with the computer. Unfortunately most basic computer users may not understand the mechanics of a computer or may feel intimidated with the maintenance. There are really simple steps anyone can take to ensure that your computer will continue working at the level it did when you first pulled it out of the box.

One of the first files to become acquainted with on your computer is the System Tools, located under the Start Menu, then Programs, and Accessories.


Once you bring your personal computer home from the store or receive it in the mail there is no one around to offer basic personal computer maintenance tips for cleaning up and improving performance of your computer.
Maintenance and cleaning up of your PC should be part of a regular routine to ensure that you don't have any long-term problems with the computer. Unfortunately most basic computer users may not understand the mechanics of a computer or may feel intimidated with the maintenance. There are really simple steps anyone can take to ensure that your computer will continue working at the level it did when you first pulled it out of the box.

One of the first files to become acquainted with on your computer is the System Tools, located under the Start Menu, then Programs, and Accessories. The System Tools houses basic maintenance tools like Disk Defragmenter, Disk Cleanup, Backup, Scheduled Tasks, and System Information and ScanDisk on some Microsoft Windows computers.
Strange that these files are located in Accessories because they really are the key to keeping your system running correctly and helping to improve performance as the computer ages.

On a regular basis you want to go to My Computer and then right click on the Local Disk (C Drive) and open up the Properties. This allows you to see how much space you are using and how much you have left to use on your computer. Under Tools in this area you can usually perform a scan of the disk. If you cannot run a disk scan from here, your Microsoft should have a disk scan available under the System Tools. It is important to run this disk scan to determine if there are any errors or problems running on your computer and the disk scan will repair those potential problems. Some experts recommend doing a thorough disk scan the first time and then a basic disk scan up to once a week to keep your computer performing at top conditions.

After this it is important to regularly perform a disk cleanup, which is located either under Properties under the C Drive, or under System Tools. Be aware that both the disk scan and the disk cleanup can take quite a bit of time and it is best to before these maintenance tools when you will not be using the computer. Set a routine with yourself like performing the disk clean up and disk scan on Saturday night while you are watching movies with your family. After a disk cleanup, it also helps to regularly perform a disk defragmentation. A computer hard drive will begin to fragment over time, which means that programs that once worked in conjunction have become separated over time and may not be in the proper place to work well on your computer. This can slow down processes or make using certain programs difficult. Using the disk defragmenter can pull together those pieces again and return things to working order.

Basic maintenance routines that will ensure your computer runs at peak performance start with simply getting rid of files you do not use. If you have old word documents, software programs you have not used in a long time, or pictures and music you are not using, delete them from your computer. Remember that once you delete them, they do not automatically disappear, but instead go to the recycle bin and it is just as important to empty the recycle bin as it is to delete old files.

Old internet files can also cause your computer to slow down. Often with a Disk Cleanup there will be an opportunity for you to get rid of temporary internet files, but you can also get rid of them on your own by going to your Temporary Internet files in Microsoft Explorer. Click on Tools then Internet Options, General Tab, Temporary Internet Files, and Delete Files. As well, take time to clean out any other temporary files you may have acquired, like downloads from the internet. Depending on the model of your computer, the temporary files could be in different locations, but most often when you go to Disk Cleanup and scan there will be an option to get rid of temporary files as well.

One of the other helpful and easy ways to maintain your computer's performance is to always run your protection programs, use a personal firewall when accessing the computer, and always install software updates available for Microsoft and protection programs. Keeping up on regular maintenance and setting a routine for updates on the computer will ensure that your computer performs the way it was intended to when you first brought it home.

readmore »

Hateful and annoying spywares.

Have they infected my computer?
As Technology advances, spyware has become a norm in many people's life. But what is spyware? Spyware is not a virus. It is not meant to attack your system but it is used to steal information from your system.

To explain this as simple as possible, spyware is computer software that is used to run undetected in a victim's computer to steal important information and report to the creator's without the victim's knowledge and permission. This information can be emails, password, credit card information; etc.


As Technology advances, spyware has become a norm in many people's life. But what is spyware? Spyware is not a virus. It is not meant to attack your system but it is used to steal information from your system.

To explain this as simple as possible, spyware is computer software that is used to run undetected in a victim's computer to steal important information and report to the creator¡¦s without the victim's knowledge and permission. This information can be emails, password, credit card information; etc.

These spywares also have many different features. They not only steal information. They can even re-rout user to illegal websites or installing phone dialers. They even have the ability to destroy your computer files residing on it.

Knowing so many bad things that can happen if they infect your computer. But many people might ask; how do I know that there are residing in my computer? I need to know that they assisted before I can remove them.

No doubt it can be quite tough in removing these malware. But it is fairly easy to detect them. Below are some characteristics you will encounter if your computer is infected by these notorious malware.


* Computer slow down. These spyware often get involve with other computer applications and as a result crashes these applications and slow down the computer.
* Popups appear when you did not even know why.
* You are being re-directed to other websites and commercials.
* Additional Internet shortcuts on your desktop such as dialers, games or free software that is difficult to remove.

Now you know how to detect spywares in case they infected your computer. Removing them should be easy if you have good anti-spyware software. Below are some of the softwares that you might want to consider.

(1) NoAdware
(2) Spyware Nuker

Start taking action against these spywares now. Time should be spent on more productive work and should not be spent on these hateful, annoying spywares.

readmore »

Computer Backups

Computer backup is so important to your computer that to ignore it is to risk its damnation.

Computers require care and feeding. They require that you attend to their needs. If you don't, then they will most surely be sent to Hell.

Halloween means Hell. What! What do you mean that Halloween means Hell?

Well, if your computer is given the option of trick or treat, which will it accept? Will it accept the trick or the treat? What do you think?


COMPUTERS AND HALLOWEEN, DO THEY MIX?

Computer backup is so important to your computer that to ignore it is to risk its damnation.

Computers require care and feeding. They require that you attend to their needs. If you don't, then they will most surely be sent to Hell.

Halloween means Hell. What! What do you mean that Halloween means Hell?

Well, if your computer is given the option of trick or treat, which will it accept? Will it accept the trick or the treat? What do you think?

Halloween is the time that computers are subject to tricks or treats. Did you know that more computers fail on Halloween than any other day of the year? That’s right. It’s true (smile). Your computer is in danger! Protect it. Do your computer backups.

Back to the Hell thing. Hell you say? Yep. Well, what do you mean by Hell?

Computer hell is the place for computers without computer backup. The failure to perform hard drive backup means that you are playing Russian Roulette with your data. Data needs your protection. Failure to protect your data may cause your home or business records to be sent to Hell.

Hell in this instance is for the records and files that cannot be resurrected. Resurrected you say, what does that mean?

It means that without computer backup as a source of salvation then the files can safely enjoy eternal oblivion. Oblivion you say, what does that mean? That means they are eternally lost from computer resurrection.

Is there any mercy for my precious files, you ask?

Why yes there is. Would like to know what the mercy for your files is? Yes! Yes! You say.

OK boys and girls listen carefully. The salvation, mercy, resurrection and redemption of your files lies in regular and consistent and persistent computer backup.

If you backup your computer consistently and persistently your files will be resurrected and saved from accidental deletion, hard drive failure and those nasty things like fire, flood, theft, earthquake, hurricanes, tornados and the like!

Computer backup is the key to your data's salvation!

Do your computer backups boys and girls.

Milk and cookies will be served in the pantry.

Trick or treat for your computer backup?

readmore »

Why Do I Need Anti Virus Software For My Computer?

If you’ve recently purchased a computer, or are just learning about using email and the internet, you may have heard about computer viruses and anti-virus software. You may be wondering if this is something that you should be concerned about, and if so, what you should do about it. This article will attempt to answer these questions for you.

First, you may be wondering just what a computer virus is. Basically a computer virus is one of many types of small programs that install themselves on your computer without your consent. Usually they enter your program through an email, or while you are browsing a website.


If you’ve recently purchased a computer, or are just learning about using email and the internet, you may have heard about computer viruses and anti-virus software. You may be wondering if this is something that you should be concerned about, and if so, what you should do about it. This article will attempt to answer these questions for you.

First, you may be wondering just what a computer virus is. Basically a computer virus is one of many types of small programs that install themselves on your computer without your consent. Usually they enter your program through an email, or while you are browsing a website.

When these programs run, usually without you knowing, they can cause all types of problems with your computer.
Some viruses can be mildly annoying, slowing down your computer as they use your computer’s resources for
another purpose. Others can be very dangerous, collecting your personal information and sending it to another party, or damaging your hard-drive.

True to their name, viruses are able to use your internet connection and email program and send themselves to the computers of other people you know, spreading themselves just like a contagious disease.

Because of this, just like the health of your body, when it comes to computer viruses, an ounce of prevention is worth a pound of cure. It is much easier to prevent viruses from entering your computer than it is to get rid of them and cure your computer once it becomes infected. This is why Anti-Virus software is important.

Once you realize that you need anti-virus software installed and running on your computer, you’ll have to choose which one to purchase and install. This can be a complicated process, but here are some tips to make it a bit easier.

First, check your computer to see if it came with anti-virus software. Many new computers are shipped with anti-virus programs already to go on them, you just need to turn them on. Check your instruction manual to see if this is the case with your computer.

Check with the vendor. If you purchased your computer from a local retailer, check with them to see what anti-virus program they recommend. They should be more than willing to help you and may even be able to provide you with a discount since you purchased a computer from them.

Once you have your anti-virus installed and running on your computer, be sure to contact the software’s support if you have any questions. It is also important to keep your software updated. Many of these programs will automatically update themselves when you are online. This is very important since new viruses are always appearing and you want to make sure your computer is protected.

readmore »

Why You Need To Clean Your Windows Registry?

Registry is the database where data of programs and windows is stored. Registry cleaner is software, used to run your computer faster and smoother. Registry cleaning is very important for a smooth running of your computer system. Whenever you delete a file form your system, the registry does not remove this data. Thus, a reference to the deleted file remains in the registry. Gradually as the registry gets filled up with these databases, the computer gets slower and slower in its functioning. If the registry is not cleaned up regularly, severe damage can be caused to your computer.

A registry cleaner scans the windows and finds out the outdated and incorrect information stored in your computer’s registry.


Registry is the database where data of programs and windows is stored. Registry cleaner is software, used to run your computer faster and smoother. Registry cleaning is very important for a smooth running of your computer system. Whenever you delete a file form your system, the registry does not remove this data. Thus, a reference to the deleted file remains in the registry. Gradually as the registry gets filled up with these databases, the computer gets slower and slower in its functioning. If the registry is not cleaned up regularly, severe damage can be caused to your computer.

A registry cleaner scans the windows and finds out the outdated and incorrect information stored in your computer’s registry. The software fixes this improper information enabling your system to be error free and run faster. The software is enabled with advanced features that make your computer run smoothly and efficiently.
Registry cleaning makes your computer run very quickly and also safely.

There are many advantages for registry cleaning. Your computer will have a cleaned up registry and no information in the registry will be cluttered. You can regain the lost disk space and use this for installing new software. Registry cleaning will also block the installation of spyware and adware in your computer. If your computer was having any application errors, you can see that this has been fixed after you clean up your registry. Your system will be maintained as it was in its initial stages and you can also understand your computer much better.

If you do not clean up your computer’s registry timely, you can face different types of problem while using the computer. When you are in the midst of doing important work related activity, your computer can suddenly crash or the system can get stalled all of sudden. This can have damaging impact on your work. Timely cleaning up and fixing of the registry will prevent you from facing such crisis.

There are different kinds of registry cleaner available. You can use the best registry cleaner available in the market to maintain the registry of your computer. Keeping your PC clean is very important if you want it to run efficiently all the time. The registry cleaner software will help you in repairing some applications that are not working in your computer.

The software uses speed detection techniques to very quickly identify the missing and invalid reference from your windows registry. After identifying the problems, the software with the use of its advanced technology can easily clean your registry. After this your computer will start functioning, like a new PC. After installing the software you can customize its different options according to the requirements of your computer.

Many online sites provide registry cleaner software for its customers. Before you buy a registry cleaner, make sure that you are aware about its different features. This will help you in customizing the features of the software according to the needs of your computer.

Buy the best registry cleaner that is available for your computer.

readmore »

5 Sure-Fire Tips for Buying a New Computer

So you're thinking of buying a new computer...

Where do you start? There are so many brands and models of computers available, and it can all be a little overwhelming when you start to look around.

How do you decide what type of computer you need? And perhaps more importantly, how do you decide what the best value is?

So you're thinking of buying a new computer...

Where do you start? There are so many brands and models of computers available, and it can all be a little overwhelming when you start to look around.

How do you decide what type of computer you need? And perhaps more importantly, how do you decide what the best value is?

1. Buy What You Need, Maybe a Little More

One of the most important things you can do when buying a new computer is make a list of the things that you will be using it for. There are so many different models - with different capabilities - that you can easily buy more, or less, than you really need if you don't.

If this is your first computer, this can be a little tougher. Until you've used a computer, it's hard to know exactly what you might want to do with it beyond the obvious, like connecting to the internet.

Regardless, you should think about some of the things you might want to do. Some possibilities include:

- Connect to the internet
- Play games
- Digital photography
- Digital video
- Type documents
- Accounting
- Design websites
- Programming
- Digital scrapbooking
- Geneology

Some of these things need more power than others. For example, connecting to the internet really doesn't need a lot of power. Even the most basic computer available will probably work just fine.

Digital video and many games need a lot more power. If you don't get a fast enough computer with enough memory, you'll be disappointed with the performance.

Knowing what you're going to be using your computer for will help your salesperson, whether they're on the phone, the internet or standing in front of you, recommend the best system for your needs.

As a general rule you're always better off buying more power than you need rather than less, but buying too much can be a waste of money.

2. Warranty Considerations

Computer warranties are one of the most confusing and obscure parts of your purchase. Most manufacturers have cut back on their customer service to the point where poor service has become a given.

The three most common options are onsite, carry-in or manufacturer's depot service.

Onsite service can be helpful, but think about whether you want to have to be available for a technician to come and diagnose your computer, and possibly have to come back with parts at another time.

Carry in service is a good option, but find out whether the service center is factory authorized for warranty repairs, as well as whether the technicians are all certified.

Shipping your computer to a factory service center can take a long time - sometimes a number of weeks. It also creates risk that your computer will be damaged or even lost in shipping. In some cases, the manufacturer will even replace your computer with another unit and ship it back to you, rather than repairing it. This can result in your losing any information that was on your system and having to reload all your software.

Another aspect of the warranty to find out about is technical support. Find out if the computer manufacturer offers a toll-free phone number and what the quality of service is like.

The better computer salespeople will be honest about this and tell you if a company's service leaves something to be desired. You can also do some research on the internet - most of the computer magazines like PC Magazine and PC World have annual customer service comparisons that rate the larger computer companies.

Always find out how the warranty is handled before making your decision. Even if it doesn't influence your choice, knowing what to expect if something does go wrong will save some nasty surprises down the road.

3. Can You Negotiate the Price Down?

A computer is a relatively large investment - anywhere from a few hundred to a few thousand dollars. Many computer buyers expect that there is a significant amount of "wiggle room" on the price.

The reality is that most computer hardware - the physical pieces like the computer, monitor and printer - is sold at very low profit margins. Often, computer systems are even sold at or below the dealer cost. When you're buying a computer, it never hurts to ask for a better deal, but don't be surprised if you only get a few dollars off, if anything.


What you can do to get the best price is to do some comparison shopping. Most computer stores offer price-matching guarantees, so if you find your computer for less at another store, most dealers will match or beat that price, even if it means they lose money.

4. How Do Computer Stores Make Any Money?

You might be wondering how these computer stores make any money if they're selling computer for so little profit.

Their money is made on add-on items. The highest profit areas in most computer stores are cables and "consumable" products such as printer ink and paper.

Printer ink is a huge money-maker for most computer stores (even more so for the printer manufacturers). Why is this? Once you've bought a printer, you're going to have to replace your ink at some point, and continue to replace it as it runs out.

Most chain computer stores and office supply stores that carry a large selection of ink cartridges make more from ink than they do from the computers themselves.


If you're buying a new computer, you will likely need to buy some cables. Some items - printers, for example - don't often include the cables needed to hook them up.

Many printers also come with "starter" ink cartridges that are only half-full. You might also want to pick up some extra ink cartridges.

This is where you should be able to negotiate a better price. Don't expect the salesperson to throw them in for nothing, but they should be willing to offer you a better price. After all, if you're happy with their service, you'll probably continue to buy your ink, paper and other products from that store in the future.

5. What Software is Included?

The last secret of buying a new computer has to do with the software that is included. Most new computer systems include quite a few programs and sometimes the value of the software can be quite high.

Something to watch out for when looking at the included software is "trial versions" or "limited editions".

Many programs that are preloaded are either crippled versions that don't have all the features of the full program, or trial versions that will only run for a certain amount of time before they expire.

Computer are often sold with trial versions of the following types of software:

- antivirus
- firewall
- MS Office or other office suites
- Accounting - both business and personal

The computer manufacturers generally don't make it easy to tell whether the software on their systems are trial versions or limited versions. This is a question that you should specifically ask if you can't find the answer in their promotional information.

If you're buying a new computer with trial versions of the software, keep in mind that you will need to pay to continue using it after the trial period is over. This is an added cost that you need to consider as part of your overall budget.

These five "secrets" of buying a new computer are fairly common sense, but they are not always made clear up front. Knowing what to ask will help you in two ways. First, you can be sure you are getting the right computer for your needs.

Second, if the salesperson or company that you're dealing with explains these things to you without being asked, you'll know you're dealing with someone who is honest and upfront.

Knowing you can trust the people you're dealing with is an invaluable feature of your new computer system.

readmore »

Protect Your Computer And Your Personal Information From Spyware



Spyware is a broad term used for certain types of software that are downloaded onto your computer without your knowledge. Malware has become a phrase that is used when describing spyware and adware.
Spyware is placed on your computer in order to track your internet surfing habits. It knows every site you visit and every page on that site. Spyware also collects your personal information through software that tracks your actual keystrokes. If you fill in a form to make a purchase all your personal information, including name,
address and credit card information can be tracked. The potential abuse of spyware tracking is also being discussed in some businesses that store secure information, such as credit card numbers or even medical records.


Spyware is a broad term used for certain types of software that are downloaded onto your computer without your knowledge. Malware has become a phrase that is used when describing spyware and adware.
Spyware is placed on your computer in order to track your internet surfing habits. It knows every site you visit and every page on that site. Spyware also collects your personal information through software that tracks your actual keystrokes. If you fill in a form to make a purchase all your personal information, including name,
address and credit card information can be tracked. The potential abuse of spyware tracking is also being discussed in some businesses that store secure information, such as credit card numbers or even medical records.

Adware is another type of spyware. It doesn't work by tracking your information as spyware does, but what it can do is actually change your browser settings without your consent. It can cause pop up ads to show on your computer. It can even place a new toolbar on your computer. Most people are unaware they even have any type of
adware installed on their computer until their computer starts to slow down.

The spyware business is a billion dollar a year industry with people getting very rich selling the information they steal about you. There is a case currently in court in the State of New York against a spyware company.
The outcome of this legal case will hopefully mean the end of secretly placed spyware.
In order to not fall prey to these types of malwares there are steps you can take. First, don't download freebies. A lot of services that are offered to you as "free" such as free music downloads are free per say, but the price you pay is allowing them to place spyware software or adware targeted advertisements on your computer. Read any agreements about the software very carefully before you download it.
Run an anti spyware software program often along with your virus protection software. Generally spyware and adware are designed to be difficult to remove from you computer and they leave behind "ticklers" which reinstall the software.

readmore »

The Difference Between Spyware and Viruses


Shin, a fictional character whose name means "faith" or "trust," sits by his laptop in the living room of his home in Pyongyang, the capital of North Korea. He is busy at work for his boss, dictator Kim Jong-il. His job, to make sure some spyware gets into specific computers at the Pentagon so he can gain vital top secret information. He's particularly interested now that the United States government suspects his country might soon conduct its first nuclear test.




The Difference Between Spyware and Viruses
by Kara Glover
Shin, a fictional character whose name means "faith" or "trust," sits by his laptop in the living room of his home in Pyongyang, the capital of North Korea. He is busy at work for his boss, dictator Kim Jong-il. His job, to make sure some spyware gets into specific computers at the Pentagon so he can gain vital top secret information. He's particularly interested now that the United States government suspects his country might soon conduct its first nuclear test.

With spyware surreptitiously installed on the computers, he could, for instance, engage in the practice of keylogging. In other words, our "trustworthy" Shin could tract the actual keys on the computer hit by the Pentagon officials. This would help him learn their passwords, the content of email messages, encryption keys, or other means to bypass security measures at our nation's defense fortress. Shin's not interested in crashing computers at the Pentagon or making them otherwise operable. That would be too overt and might reveal him. He's simply after information.

There are other types of spyware, sometimes called "malware" because they don't actually spy on your computer habits. They might instead just barrage you with annoying popups, for instance. Or they might give you a different home page that isn't of your choosing, like one of an advertiser's. But for the moment those types of malware, or adware as it's sometimes called, aren't very useful for Shin. He wants to use spyware that actually spies.

Over on another part of the globe in Turkey, a fictional terrorist sits with his own laptop in a suspected al Qaeda terrist cell. But he's not out to infect computers with spyware. That's child's play. He's out to bring the house down. This story is strictly hypothetical. But let's say the terrorist wanted to disrupt the daily
hubub at a major American corporation. He'd infect the computers with a virus!

The terrorist might try to attack the company's vast network by inserting a worm into it. Worms reside in RAM, and travel from machine to machine and, unlike the classic viruses, they attack the computers themselves rather than individual files. Very disruptive. This type of virus could potentially make the computers inoperable.

Bring down the goings-on at a major corporation by spreading a worm through the computer network, and the terrorist could have a field day. But let's hope not.
So to summarize, spyware often keeps track of your computer habits, and viruses are often out to disable computers in some way. Hence the difference.

readmore »

A Basic Introduction To Spyware



Spyware is the most troublesome software to appear on the Internet in recent times. When spyware infects a computer system, it may be relatively harmless or it may be
devastating.
Spyware like coolwebsearch and new.net are capable of paralyzing a computer system. Laws to regulate spyware are pending in many states and may take years to enforce.

What Is Spyware?



Spyware is the most troublesome software to appear on the Internet in recent times. When spyware infects a computer system, it may be relatively harmless or it may be
devastating.
Spyware like coolwebsearch and new.net are capable of paralyzing a computer system. Laws to regulate spyware are pending in many states and may take years to enforce.

What Is Spyware?

Spyware is any software that collects information about computer usage and/or the computer user. It is installed on one computer and sends information to another computer.
Some spywares like the Weather Bug, Bear Share and Kazaa are knowingly downloaded and installed by users. Other spyware is installed without the knowledge or permission of the user.

How Does Spyware Affect A Computer?

Symptoms of spyware infection includes:
* Very slow system performance while browsing the Internet.
* Your homepage changing mysteriously on its own.
* Excessive appearance of pop-ups, on sites likes Google, Yahoo and MSN, which don't use them.
* You can only get your browser to visit sites, which are trying to dupe you into buying spy ware removal software.

Many spyware detection and elimination programs are easily available for free on the Internet.

How Does One Deal With Spyware?

There are many tools and catalogues available to deal with spyware. One of these tools is Spybot Search and Destroy.
It scans computers for spyware and harmful programs. It shows a list of problem areas to the user and allows him to delete any or all of them.
A user can leave legitimate programs installed by him.
These may include peer-to-peer file sharing software or software installed to monitor the on-line activities of children.

A Comprehensive Solution

It may be a good idea for most computer owners to get a comprehensive PC security solution as a bundle. Norton and McAfee, now offer a complete security suite consisting of anti-virus, personal firewall, anti-spam and privacy offerings, and anti-spy ware.
They are quite easy to install and allow parents to monitor children who use the computer. There are many threats on the Internet, from which these suites can protect your computer.

readmore »

Computer Hardware Preventive Maintenance Software



Computers often break down at the worst of all times. These problems can be averted, or at least minimized with preventive maintenance. Several methods of keeping computer hardware in good working order deal with the external components of the computer, such as the keyboard and monitor. For example, it is important to keep the
processor away from excess heat and moisture. There are also computer hardware preventive maintenance software programs that can help with the upkeep of other internal aspects of a computer.


Computers often break down at the worst of all times. These problems can be averted, or at least minimized with preventive maintenance. Several methods of keeping computer hardware in good working order deal with the external components of the computer, such as the keyboard and monitor. For example, it is important to keep the
processor away from excess heat and moisture. There are also computer hardware preventive maintenance software programs that can help with the upkeep of other internal aspects of a computer.

While it is rare to find a CMMS that works on all of a computer’s hardware, many different programs can be utilized simultaneously. Some computers have periodic automatic updates available that can be downloaded and used to improve the computer’s performance. Other software programs, known as disk defragmenters, manage hard drive space so that software programs take less time to access. Programs known as hardware diagnostic utilities can check the computer’s hardware components and alert the user about any potential failures. Since some new hardware will not always work on all computers and could cause existing hardware to malfunction, it is
important to have a CMMS program to ensure that the new hardware is compatible with existing hardware.

Antivirus programs are another important component of computer hardware preventive maintenance software. Computer viruses have become increasingly common in recent years and can render a good computer useless. While computer viruses mainly attack software programs, they can ruin hardware as well. Several manufacturers make
reliable antivirus software. A couple of well-known companies are Norton and McAfee. As with much preventive maintenance software, these programs are usually available for a free trial period before the user must pay a subscription fee.

Computer hardware preventive maintenance software is necessary to keep computers in good working order. This software manages aspects of computer hardware that would be difficult and time-consuming for even the most computer savvy users.

readmore »

Spyware and Adware – Are You Protected?



Spyware is without doubt the most prevalent threat to online computer privacy and security.

Exactly what is Spyware?

Some Disturbing Facts About Spyware:


Spyware is without doubt the most prevalent threat to online computer privacy and security.

Exactly what is Spyware?

Spyware applications are programs and files that hide on your PC's hard drive without your direct knowledge.
They allow hackers and advertising companies to track your every move, both online and even when you work offline.
Tracking the websites you visit, the items that you buy online, the emails you send and receive, your Instant Message dialog, and worst of all they can even record your credit card number, personal identification numbers, and all of your passwords.

If you use dial-up to connect to the Internet then spyware can be used to bill 900 numbers to your telephone bill.
Spyware allows hackers to take control of your browser and alter your computer system files.
These computer parasites slow down your Internet connection by inundating you with unwanted Spyware pop-up ads.
This is just a short list of the harm that Spyware can cause.

Note: Spyware and Adware cannot be detected by anti-virus and firewall software.

Some Disturbing Facts About Spyware:

· Spyware infects 91% of all computers. That equates to an alarming 9 out of 10 computers!
· 27.3 million Americans have been victims of identity theft in the last five years, including 9.91 million people or 4.6% of the population in the last year alone.

Keep reading to learn how to keep from becoming a victim of Identity Theft.
Have you noticed your computer running slower than ever?

The reason for that may have to do with online advertisers adding Spyware, or Adware to your computer without your knowledge.

Exactly what is Adware?

Adware works very much like Spyware.

Adware is software that will show you popup ads over and over. These files can also be extremely dangerous to your PC and could cause major problems with your Computer.

Note: This article is an excerpt from a SPECIAL REPORT entitled "Spyware! – How To Get And Stay Safe". In the full report you'll find the information you need to effectively protect your computer and personal information.

Avoiding the grief of dealing with problems like Identity Theft among others.

readmore »

What Is Adware?



Adware is one of many "malwares" or malicious software programs that are unknowingly installed on your computer when you visit online sites and download freebies. When you use share files or visit sites with free downloads of wallpaper, videos, or music, some of these sites will send along adware software with your download.


Adware is one of many "malwares" or malicious software programs that are unknowingly installed on your computer when you visit online sites and download freebies. When you use share files or visit sites with free downloads of wallpaper, videos, or music, some of these sites will send along adware software with your download.

These malwares are a rapidly growing threat to all computer systems. It is estimated that in the first three months of 2005 over 80% of computer users had some type of malware software program running on their computer, without their knowledge.

Although it is much less a threat to your computer and information than spyware is, what adware will do is cause pop up banners and advertisements to appear on your computer. These advertisements are displayed on your computer no matter what program you might be using. What the people who place this type of nuisance software on
you computer say is that adware advertising helps them to recover costs and allows them to offer you those freebies you want.

What you want to do to stop adware from appearing on your computer is to first run an anti-adware program. Run this program on demand regularly. Along with an anti-adware software program run your regular computer virus scan on demand also.
Check the security level on your computer. You security level setting should be at least medium to help protect you from unwanted downloads.
Do not download free files from the internet, period. When downloading any software read the end-user license agreement. Some of these agreements will state that when you download their software you are also agreeing to accept a downloaded spyware that may be placed on your computer at the same time.

Be aware of threats to your computer, and your personal information.

readmore »

All About Computer Viruses


Your computer is as slow as molasses. Your mouse freezes every 15 minutes, and that Microsoft Word program just won’t seem to open.
You might have a virus.

Just what exactly is a virus? What kind is in your computer? How did it get there? How is it spreading and wreaking such havoc? And why is it bothering with your computer anyway?
Viruses are pieces of programming code that make copies of themselves, or replicate, inside your computer without asking your explicit written permission to do so. Forget getting your permission down on paper. Viruses don’t bother to seek your permission at all! Very invasive.


Your computer is as slow as molasses. Your mouse freezes every 15 minutes, and that Microsoft Word program just won’t seem to open.
You might have a virus.

Just what exactly is a virus? What kind is in your computer? How did it get there? How is it spreading and wreaking such havoc? And why is it bothering with your computer anyway?
Viruses are pieces of programming code that make copies of themselves, or replicate, inside your computer without asking your explicit written permission to do so. Forget getting your permission down on paper. Viruses don’t bother to seek your permission at all! Very invasive.

In comparison, there are pieces of code that might replicate inside your computer, say something your IT guy thinks you need. But the code spreads, perhaps throughout your office network, with your consent (or at least your IT guy’s consent). These types of replicating code are called agents, said Jimmy Kuo, a research fellow
with McAfee AVERT, a research arm of anti-virus software-maker McAfee Inc.

In this article, though, we’re not talking about the good guys, or the agents. We’ll be talking about the bad guys, the viruses. A long, long time ago in computer years, like five, most viruses were comprised of a similar breed. They entered your computer perhaps through an email attachment or a floppy disk (remember those?). Then they attached themselves to one of your files, say your Microsoft Word program.
When you opened your Microsoft Word program, the virus replicated and attached itself to other files. These could be other random files on your hard drive, the files furthest away from your Microsoft Word program, or other files, depending on how the virus writer wanted the virus to behave.
This virus code could contain hundreds or thousands of instructions. When it replicates it inserts those instructions, into the files it infects, said Carey Nachenberg, Chief Architect at Symantec Research Labs, an arm of anti-virus software-maker Symantec. Corp.

Because so many other types of viruses exist now, the kind just described is called a classic virus. Classic viruses still exist but they’re not quite as prevalent as they used to be. (Perhaps we could put classic viruses on the shelf with Hemingway and Dickens.)
These days, in the modern era, viruses are known to spread through vulnerabilities in web browsers, files shared over the internet, emails themselves, and computer networks.

As far as web browsers are concerned, Microsoft’s Internet Explorer takes most of the heat for spreading viruses because it’s used by more people for web surfing than any other browser.
Nevertheless, “Any web browser potentially has vulnerabilities,” Nachenberg said.
For instance, let’s say you go to a website in IE you have every reason to think is safe, Nachenberg said.
But unfortunately it isn’t. It has virus code hidden in its background that IE isn’t protecting you from. While you’re looking at the site, the virus is downloaded onto your computer, he said. That’s one way of catching a nasty virus.

During the past two years, another prevalent way to catch a virus has been through downloads computer users share with one another, mostly on music sharing sites, Kuo said. On Limewire or Kazaa, for instance, teenagers or other music enthusiasts might think they’re downloading that latest Justin Timberlake song, when in reality
they’re downloading a virus straight into their computer. It’s easy for a virus writer to put a download with a virus on one of these sites because everyone’s sharing with everyone else anyway.

Here’s one you might not have thought of. If you use Outlook or Outlook Express to send and receive email, do you have a preview pane below your list of emails that shows the contents of the email you have highlighted? If so, you may be putting yourself at risk.
Some viruses, though a small percentage according to Nachenberg, are inserted straight into emails themselves.
Forget opening the attachment. All you have to do is view the email to potentially get a virus, Kuo added. For instance, have you ever opened or viewed an email that states it’s “loading”? Well, once everything is “loaded,” a virus in the email might just load onto your computer.
So if I were you, I’d click on View on the toolbar in your Outlook or Outlook Express and close the preview pane. (You have to click on View and then Layout in Outlook Express.)

On a network at work? You could get a virus that way. Worms are viruses that come into your computer via networks, Kuo said. They travel from machine to machine and, unlike, the classic viruses, they attack the machine itself rather than individual files.
Worms sit in your working memory, or RAM, Nachenberg said.

OK, so we’ve talked about how the viruses get into a computer. How do they cause so much damage once they’re there?
Let’s say you’ve caught a classic virus, one that replicates and attacks various files on your computer. Let’s go back to the example of the virus that initially infects your Microsoft Word program.
Well, it might eventually cause that program to crash, Nachenberg said. It also might cause damage to your computer as it looks for new targets to infect.
This process of infecting targets and looking for new ones could eventually use up your computer’s ability to function, he said.

Often the destruction a virus causes is pegged to a certain event or date and time, called a trigger. For instance, a virus could be programmed to lay dormant until January 28. When that date rolls around, though, it may be programmed to do something as innocuous but annoying as splash popups on your screen, or something as
severe as reformat your computer’s hard drive, Nachenberg said.

There are other potential reasons, though, for a virus to cause your computer to be acting slow or in weird ways. And that leads us to a new segment – the reason virus writers would want to waste their time creating viruses in the first place.

The majority of viruses are still written by teenagers looking for some notoriety, Nachenberg said. But a growing segment of the virus-writing population has other intentions in mind.
For these other intentions, we first need to explain the “backdoor” concept.

The sole purpose of some viruses is to create a vulnerability in your computer. Once it creates this hole of sorts, or backdoor, it signals home to mama or dada virus writer (kind of like in E.T.). Once the virus writer receives the signal, they can use and abuse your computer to their own likings.
Trojans are sometimes used to open backdoors. In fact that is usually their sole purpose, Kuo said.

Trojans are pieces of code you might download onto your computer, say, from a newsgroup. As in the Trojan War they are named after, they are usually disguised as innocuous pieces of code. But Trojans aren’t considered viruses because they don’t replicate.

Now back to the real viruses. Let’s say we have Joe Shmo virus writer. He sends out a virus that ends up infecting a thousand machines. But he doesn’t want the feds on his case. So he instructs the viruses on the various machines to send their signals, not of course to his computer, but to a place that can’t be traced.
Hotmail email happens to be an example of one such place, Kuo said.

OK, so the virus writers now control these computers. What will they use them for?
One use is to send spam. Once that backdoor is open, they bounce spam off of those computers and send it to other machines, Nachenberg said.
That’s right. Some spam you have in your email right now may have been originally sent to other innocent computers before it came to yours so that it could remain in disguise. If the authorities could track down the original senders of spam, they could crack down on spam itself. Spam senders don’t want that.

Ever heard of phishing emails? Those are the ones that purport to be from your internet service provider or bank. They typically request some information from you, like your credit card number. The problem is, they’re NOT from your internet service provider or your bank. They’re from evil people after your credit card number!
Well, these emails are often sent the same way spam is sent, by sending them via innocent computers.
Of course makers of anti-virus software use a variety of methods to combat the onslaught of viruses. Norton, for instance, uses signature scanning, Nachenberg said.
Signature scanning is similar to the process of looking for DNA fingerprints, he said. Norton examines programming code to find what viruses are made of. It adds those bad instructions it finds to its large database of other bad code. Then it uses this vast database to seek out and match the code in it with similar
code in your computer. When it finds such virus code, it lets you know!

readmore »

A Guide To Basic Computer Terminology

Ram? Mouse? One is an animal and one is a rodent right? Ram...that is the zodiac sign for Aries... If this is what these words mean to you than you can surely use this quick glossary of computer terminology. It would be a good idea to read through them before purchasing a computer because these are things you should know about first. If you already have a computer then these computer terms can help you know what to do if your new computer equipment is unfamiliar. Also, this computer terminology can help you if you have to call in for
technical help.

Okay lets go!



Ram? Mouse? One is an animal and one is a rodent right? Ram...that is the zodiac sign for Aries... If this is what these words mean to you than you can surely use this quick glossary of computer terminology. It would be a good idea to read through them before purchasing a computer because these are things you should know about
first. If you already have a computer then these computer terms can help you know what to do if your new computer equipment is unfamiliar. Also, this computer terminology can help you if you have to call in for technical help.

Okay lets go!

Cache: Cache is another type of memory kindred to RAM. The computer uses cache to quickly move data between the RAM and the CPU.

CD-ROM Drive: Most new computers now come with a CD-ROM drive as standard equipment. A CD-ROM drive reads data from a disc. These CDs look like a music CD, but hold data instead of music. CD-ROMs also contain games, dictionaries, recipe files, and lots of other things that you can load onto your computer.

CPU: The CPU, or central processing unit, is the brains of the computer. Most new Windows based programs use a Pentium processor or a AMD Athlon XP. New Macs use a different type of CPU called Power PC.

Disk Drive:Virtually all computers come with a disk drive that can read and save information on portable diskettes, also called floppy disks. You can use floppy disks to save information or to load new software onto your computer.

Hard Drive: The hard drive is also called the hard disk. You'll probably never see it because it is nestled inside your computer. It's the computer's electronic filling cabinet, and it stores the computer's operating system, files, programs and documents.

Keyboard: Just like a typewriter keyboard, this device is the primary way of inputting data into the computer programs.

Megahertz (MHz): This is the clock speed of the microprocessor. The higher the number, the quicker the information is processed. MHz relates to how many millions of instructions can be processed per second.

Memory:This is the circuitry or device that holds information in an electrical or magnetic form. There is read-only memory (ROM), which is information primarily stored on a disk, and random-access memory (RAM), which is chip-based storage inside the computer. Memory is typically measured in megabytes (MBs).

Modem:This mechanism connects a computer to a phone line so information can be sent from one computer to another or the user can access an on-line service or the Internet. In view of the popularity of the Internet, a modem is now considered basic equipment and comes on practically all-new computers. Most modems come with fax
capabilities.

Monitor: An output device that allows you to see what you are doing (it is what you are looking into right now to see this). Most computers come with 14 or 15-inch monitors. This size is good for most people's needs.
Larger 17 or 21-inch monitors also are available, but may cost more. Myself, I prefer the 17-inch.

Motherboard:The motherboard is the circuit board that everything in the computer plugs into. The CPU, RAM and cache all plug into the motherboard.

Mouse: The mouse is another input device that makes getting around in your computer easier. It is a handheld object that is good for doing tasks such as moving and pointing to objects on the screen, and can replace the function and control keys of the keyboard. (If you need a lesson on how the mouse works and how to use it click
here for a tutorial.)

Printer: A printer is an essential part of the computer if you want a hard copy of your work. There are four types of printers on the market: dot matrix, inkjet, bubble jet and laser. The dot matrix is the most basic.
Most inkjets and bubble jets can print color and graphics, and a laser printer offers the best resolution at the highest speed.

RAM:Computers save data in two ways: on the hard drive and in random access memory or internal memory. New computer buyers should look for models with at least 16 MBs of RAM (or more, depending on what types of programs you'll be running). Make sure that the computer can be upgraded.

Scanner:A scanner is a useful accessory to have if you are working with lots of artwork or photos. This device can copy written documents, pictures or photographs directly into your computer. There are three types of scanners: handheld, hopper-feed and flatbed.

Sound Card: This device allows your computer to reproduce music, sounds and voices. Make sure you have a sound card if you're planning to play multimedia games.

Video Card: The video card is the part of the computer that sends the images to the monitor.

Well there you have it, a quick course on computer terms. I hope it has helped to guide you in your purchase of a new computer; or to help you with the one you have.

About The Author
B. Archer is a successful author and publisher of ttp://www.A1-computers.net- A great source of nformation about computers and computer accessories.

readmore »
 

different paths

college campus lawn

wires in front of sky

aerial perspective

clouds

clouds over the highway

The Poultney Inn

apartment for rent