Pages

Thursday, August 28, 2008

10 More Tips and Tricks to Make Windows Easier

By : Duncan
As promised, here are a further list of tips and shortcuts to make your usage of Windows a bit more slick. Some of them you may know, but it's amazing (to me at least) how many people don't know these simple shortcuts and helps.

(If a key name is in bold, it means you HOLD IT DOWN while pressing the other keys)

1. When entering things like usernames and passwords into a dialog box, you normally press tab to go to the next item. If you want to go backwards (or up) to the previous item, press Shift Tab. This is useful when you want to type over whatever is in the edit box, as shift tabbing to it makes it highlighted, so that you just type, and that highlighted text is replaced without you having to delete it first.

DOWNLOAD WINDOWS VISTA

by : Gen Wright

We are all witnesses of how the Windows operating system has evolved since Windows 95. You have to admit, the Windows operating system has come a long way. From Windows 95, an OS that's very buggy and often crashes to the current highly visual Windows Vista. So what happened in between?

Well, we have Windows 98, Windows Millenium, Windows 2000, and for enterprise level systems, we have Windows NT and Windows Server 2000. These different operating systems are created to suit the needs of the various market segments. A home user will choose the home edition, and a developer could choose the professional edition.

Wednesday, July 16, 2008

Back to Back User Agents for Telecommunications

by: Danny Loeb

Today’s telecommunications networks are a delicate blend of clients and servers that together offer virtually endless possibilities when it comes to services and applications. For every new client developed, there seems to be a score more on the way — from mobile handsets, PDAs, terminals, telephones, video phones, IP set-top-boxes, and so on.

There are essentially two types of servers that connect between clients on large networks: Proxy servers and Back-to-Back User Agent (B2BUA) servers. The more prevalent Proxy servers feature predictable behavior — simply connecting between clients. Effectively, B2BUA servers are much stronger and intelligent entities that perform actions which Proxy servers cannot. Moreover, B2BUA servers provide a flexible solution for a wide range of applications and services and are becoming the primary engine for more and more SIP servers in NGN and IMS networks.

Can Data Breaches Be Expected From Bankrupt Mortgage Lenders?

by: Tim Maliyil


The stock market is in a tumult. Actually, it has been for about a year, ever since the subprime fiasco (anyone take a look at Moody's performance over the past year?) Now that that particular issue has been beaten to death, other mortgage related issues are cropping up. Most of the stuff covered in the media is financial in nature, but some of those mortgage related issues do concern information security.

It's no secret that there are plenty of companies in the US that discard sensitive documents by dumping them unceremoniously: leave it by the curb, drive it to a dumpster, heave it over the walls of abandoned property, and other assorted mind boggling insecure practices. In fact, MSNBC has an article on this issue, and names numerous bankrupt mortgage companies whose borrowers' records were found in dumpsters and recycling centers. The information on those documents include credit card numbers and SSNs, as well as addresses, names, and other information needed to secure a mortgage.

Sunday, July 6, 2008

by : Len Hutton

Blogs are now an extremely popular and important part of the internet. Millions of people blog every day. As blogs have evolved over the years, so has the commenting system. Now anyone can make comments on a particular blog posting. As blog commenting has grown more popular, so has spam commenting. In this newsletter, we’ll go over why comments are a great form of feedback for your blog, how they help the credibility of your content, what spam comments are and how to prevent them from happening.

How to Clean the Registry

by : Ray Gaide

In the beginning Windows' registry consisted of two files totalling around 5mb in size. Today it consists of at least 12 files with the Software file itself being 30mb or bigger in size. As the size of the registry has exploded, so has the trash and clutter in it. It may seem like a daunting task, but cleaning the registry properly can fix system problems, speed your computer up, and make it run more efficiently.

Symantec Norton Antibot The Latest In Norton Computer Protection Software

by : Lisa Carey

It seems like every other month a new “program” comes along to make our lives that much easier. For example, first we could bookmark favorites, and then RSS feed them, and then came widgets and now “bots” which are robots that do a lot of our computer work for us in the background. Examples of friendly bots are weather bots, game playing bots, instant messaging and my favorites are those on AOL Instant Messenger which do all kinds of functions for me like shop, find movie times and even give updates on the Wall Street Journal.

The Battle of the Browsers – The History and the Future of Internet Browsers

by : Nicholas C Smith

With Internet Explorer 8 now available, can Microsoft hope to retain market dominance over fierce open source rivals such as Mozilla's Firefox or the feature packed Opera web browser. Can history give us a clue to what the future of web browsers/browsing might hold? How did Netscape Navigator go from having a dominant 89.36% market share of all web browsers in 1996 and yet only 3.76% by mid 1999?