Updated on July 4th, 2011 ( 5,523 views ) No comments
In this article I will cover about HTTP proxy only. Axtually, HTTP proxy is an IP adress. If you use proxy while surfing the net, your IP adress that is sent to the web server is changed too. This is what hackers do to make sure their their location can’t be detect.
What happens when you visit a website? Let say that you enter www.yahoo.com, these are several things that involve:
(a) Domain name for Yahoo.com is changed to its server IP adress by using Domain Name System or DNS. (actually every website have their own IP adress such as 22.214.171.124 but visitors will feel difficulty to remember those number. So domain name is created in order to resolve the numbers into words) .
Updated on July 3rd, 2011 ( 7,736 views ) 3 comments
I have a friend who is quite rich. He likes to mod his pc and last week he just added another 2GB of computer ram into his motherboard making them 4GB total. He thinks that more speed means faster performance and that’s only half true.
What is the function of computer ram?
When we open a program, our cpu will use some memory that is what we called memory usage. You can view your memory usage by going to task manager (ctrl + alt + del).
For me, I have 1GB of ram and only use xp. For my maximum usage, it only take around 750MB from my memory. So 250MB still free. So why do I need to bother to add my computer ram for larger memory?
Then why my computer shows slow performance?
I think you all need to understand that larger memory doesn’t mean faster performance however when your memory is not enough, let say you have 512MB memory but you use 650MB… from where the 138MB come from?
Updated on July 2nd, 2011 ( 2,397 views ) No comments
- motherboard can’t support every type of ram because different motherboard has different number of pin.
- that’s why you need to know what type of ram your motherboard supports before buying.
Type of ram:
- So-dimm (use in laptop, smaller than dimm)
- Dimm (use in desktop)
(1) Sdram (old type pc system)
- can be categorised into PC100 and PC133.
- has 168 pin.
(2) Ddr Sdram (also known as DDR1)
- has 184 pin
- can be categorised into PC1600 (DDR200), PC2100 (DDR266), PC2700 (DDR333), and PC3200(DDR400). Read the rest of this entry »
Updated on July 2nd, 2011 ( 1,651 views ) No comments
Phishing site is a site that create a clone site or a site that look exactly just as the other site that he want.
The main objective of phishing site is to get your email for spam purpose. However, most of phishing site want to get your username and password for the site so that the owner can access your account.
Phishing site is easy to make
Furthermore, phishing site is really easy to do. Just save the webpage that you want as html complete with image and then upload it to your hosting server. After that you just need to tweak the coding for the login form so that the entered username and password will be save in their database. That’s all.
In most case, Rapidshare is one of the most targeted site for phishing since once they get you to sign in at the phishing Rapidshare site, they will know your premium Rapidshare username and password for sure.
In order to make you don’t realize that you are being phished, they will a make a redirection coding so that you will be brought to the wrong password section at the real Rapidshare site. This will make you thing that it’s your own fault for entering the wrong password.
It looks all natural until you realize that you can’t login at your rapidshare premium account anymore since they have change your password. Read the rest of this entry »
Updated on January 10th, 2011 ( 2,778 views ) 2 comments
Having a laptop as desktop replacement is pretty common especially for a college student. I open my laptop for around 10 hours a day thus proper cooling is needed if I don’t want my laptop to undergo severe “health” issue.
Power on your laptop for a long time means your processor and on-board graphic tends to be hot. Hotness more than 50 degree can make your laptop performance going down. Besides, you just reduce the lifespan of the laptop processor, hard disk, and especially battery. For further elaboration, you can spend some time to read how temperature can affect a lithium ion battery life.
Actually I already have a free gift notebook cooler that I got when buying my notebook. But somehow the performance is quite terrible. Besides, the bottom of the notebook cooler is not cover thus means I cannot use it at surface that is not flat such as bed.
Then I came across a notebook cooler created by Cooler Master. Though the price is a bit expensive, but it suit my needs. Thus I present Notepal U2 by Cooler Master.
Updated on December 18th, 2010 ( 1,551 views ) No comments
Laser printing is the absolute way if you want to do professional printing either at home or corporate use. Despite the pro, laser printing user will face difficulty in replacing empty laser toner cartridges because there are not many computer shops that sell toner cartridges.
Even if they do, you might have problem to find the suitable laser toner cartridges for your laser printing machine. Because of the difficulties, some take initiative to replace the old printing machine with the new one without knowing that the default ink in the new machine is usually not more than 1/3. This is a total loss.
The best place to get Toner Cartridges
CartridgesDirect is one of the best sites if you wish to find variety type of cartridges for your printer. Just named it and I am sure you will find it there. In addition, secure transaction and fast shipping is the absolute reason why people prefer to buy printer cartridges here.
Updated on October 12th, 2010 ( 3,540 views ) No comments
You might not having any performance issue if you only use your PC for simple tasks like accessing the internet, watch movie, or playing mini games. Somehow, you might face some lagging if you want to do heavy task such as playing online games, playing high end games, video editing, or 3D rendering.
Upgrade your hardware
If you dedicated to those heavy tasks (and experience lagging), the best option is to replace your hardware with better one. You can upgrade your processor and added RAM with bigger speed and size so that your PC can process more data in fast speed.
Although upgrading hardware can solve performance issue, money issue shouldn’t be taken lightly. Hardware is quite expensive and I am sure you don’t want to spend hard earned money just for running certain task that you rarely do. In this case, operating system tweaking is the best choice.
Updated on October 3rd, 2010 ( 2,826 views ) No comments
Nowadays, almost all new laptop use lithium battery compare to decade ago where nickel battery widely used. Lithium battery is a lot better than nickel since lithium battery doesn’t suffer from memory effect. Do you remember that one good way to prolong mobile phone battery is by only charging the battery once the battery power nearly empty. The advice is due to most old mobile phones use use nickel battery that suffer memory effect. Let say that you charge your mobile phone although 40% battery still left. If the mobile phone use nickel battery, then you might having trouble as the nickel battery will forget that there is already 40 % charge left once charging start. That means, your mobile phone will show empty sign once you have use all of the 60 percent charge.
This is totally different if your mobile phone or laptop use lithium battery. Since Lithium ion battery doesn’t have memory effect, it doesn’t matter anymore when you charge your laptop battery. Besides free from memory effect, lithium ion battery knows when to stop charging once it is already full of charge. This avoid overcharging from happening in laptop battery.
If overcharging never happen, then why some people recommend to keep laptop battery away if they want to use plug-in power? That is nothing related to overcharging but due to heating problem. Lithium battery can be worn out faster if it is left in hot environment. Thus leaving the battery in the laptop while using plug-in power is not a good idea for someone who make laptop as desktop replacement as the battery can become hot easily.
A good practice to keep laptop battery is by putting it inside plastic bag and left it in a cold and dry environment. Once in a month, put back the battery inside laptop and use it so that the battery will always perform at it best.
Updated on September 28th, 2010 ( 1,302 views ) No comments
Older motherboard tends to only support IDE hard disk. If your motherboard is one of the old school type, then you may suffer if you want to use SATA hard disk. You can still use IDE hard disk but you can get better space for the same price if you buy SATA hard disk. Not only the price and space, SATA hard disk differ a lot than IDE hard disk in term of speed.
Instead of buying new motherboard that supports SATA hard disk, the better solution is to buy IDE to SATA converter that you can get from pc shop for not so expensive price. You can get it for RM15 – RM20. If your nearest PC shop doesn’t sell IDE to SATA converter, just buy it online. RM5 for shipping is not a big issue compare to the price that you need to pay for buying new motherboard.
Before you buy new hard disk for your PC, please at least know one thing; that is ATA and SATA is different though they sound quite similar. ATA 100 and ATA 133 have IDE port. It will be bad if you buy wrong hard disk thinking that your motherboard supports SATA.
Updated on September 19th, 2010 ( 5,505 views ) No comments
The first month of a university time was really hard for me. It’s not that difficult but redoes the assignments twice for all six subjects do make anyone frustrated and exhausted. It’s not totally my fault that I’ve to make it again, but it’s all due to a virus attacked all over the university computer and a adjacent zone. It will make your files seem to be hidden. Not just hidden, but totally hidden. No one can see those hidden files and was replaced by shortcuts. You can’t get access to the hidden file even you double-click all of the shortcuts. In fact, you’re not even know that your file still in there.
Since we don’t have much time to retrieve those files or find any other ways to get that files back, we just redo all the assignments and it was really frustrating. Before that, we just try to scan the pen drive but no threat was detected. We use the latest Kaspersky database but still nothing. And the time to focus doing assignments begin…………
But after sometimes, someone came out with the theory that the files were hidden by the virus-maybe he found it from the internet or something- and so, everyone start to find a way to unhide the files. I found something that really interesting to solve our problem by using attribute command from command prompt-actually from a friend of mine (credit to rezduan)-… Here’s the way to do it…
1. Open command prompt. (Don’t know how to do it? refer to this article…)
2. Redirecting your command to the infected partition.
eg: C:\Documents and Settings\user>F:
The above example done if your pen drive is F: it may be G:, I:, W:, or anything…
3. The command will show the partition to be commanded.
4. Simply type this, [attrib -h -s /s /d]
eg:F:\>attrib -h -s /s /d
5. Wait until the hidden files being retrieved.
If you’re familiar with the command prompt.. You can just type this from the beginning….
1. ATTRIB -H -S [[drive:] [path] filename] [/S [/D]]
I will explain the meaning of -h, -s, /s, /d later, ok? Hope it’ll help you and see you later…