Saturday 30 May 2009

Online Chat Room

There are times when you can't help but sit in front of the computer. You're alone in the house, there's nothing interesting on TV so you killed the picture, and you aren't in the mood to listen to anything on the radio. But you're in the mood for some socializing on the Internet. This is where online chat rooms come in.

The term chat room is used by mass media to refer to any type of synchronous conferencing or even asynchronous conferencing. Also known as chatroom, the term therefore means any technology ranging from online forums and real-time online chats to full-blown graphical social environments.

There are different kinds of chat rooms. There are IRC chat rooms, instant messaging chat rooms, game chat rooms, dating chat rooms, etc.

In the Philippines, the popularity of chat rooms started around the same time they became popular in the rest of the world.

The origin of chat rooms could be traced back to 1974. PLATO System claims their Talkomatic computer program was the first functional chat room in the world. It was purely text-based, and because the world wasn't yet familiar with the idea of an online chat room, the system failed to hit it big.

People began to be more receptive to chat rooms in the 1990s. But by this time a new chat room technology called IRC was the talk of the town. One thing led to another. Before you knew it, it's the 21st century and the IRC has given way to more popular chat systems like Yahoo! and ICQ. That's the history of the chat room.

For more information and tips on Online Chat Room visit, http://chatroom.ph

Thursday 28 May 2009

Inkjet or Laser Printer: Which is Best For Me?

Information is accessible from a variety of sources these days. The Internet easily makes it possible to share such information with others and it can be duplicated as well and scattered around to minimise possibilities of it being lost. Despite all of this, printers are not obsolete and whether you are in the office or at home, there will be a time where you need to print hard copies of information to share and use.

Getting a printer is the first step and often the most difficult because you are normally stuck between two choices - either getting an inkjet printer or a laser printer. These four simple factors should help make your decision process a lot simpler.

Output Quality

Is the output quality an important factor or is all that matters is the document prints are legible and of a reasonable standard? This should be the first factor that should be evaluated because if quality is an absolute must, you should go for a good standard laser printer.

Budget

How much money do you have and how much are you willing to spend? Inkjet printers are obviously more affordable than the laser printers so if you are really stuck on a tight budget, don't make that final decision in getting an inkjet until you analyse the next two factors.

Frequency of Use

How often will you use the printer, or what is the average amount of pages to be printed weekly? Knowing the answer to this is very important because it will help foresee any future costs for ink toners and cartridges. Standard ink cartridges for inkjet printers may not be as expensive as the toners used for laser printers, but they aren't able to produce as many individual prints as their counterparts.

If you are planning to print around 500 pages a week, all you need is an average laser printer with toner to last you a couple of months. Going the budget route and letting an inkjet print 500 pages a week may appear that the savings potential is greater, but if you run the numbers, you will realise that you need more ink cartridges to do the job and that means more money spent. Laser printers are a must have if you plan on using it frequently. If the budget is still the major concern, you can always get a low cost laser printer.

Speed Demands

Laser printers have that extra specification highlighting the average number of pages the printer can print per minute. Logically, if you frequently use the printer often, speed can make a very convenient difference and when printing is needed during heavy office hours, laser printers are an absolute must have. This is the last factor that should be evaluated because there could be instances where companies or home users rarely use the printer; but when tons of pages are needed unexpectedly, speed makes it possible. Printing over 100 pages using an inkjet will take hours and is uneconomical.

The bottom line is that inkjets are largely inferior to laserjets in almost every aspect other than cost. This makes inkjet printers perfect for small business and home use where you don't have frequent usage, whilst a laserjet is ideal for anywhere that has a great deal of usage and has a budget to match.

Article Source: http://www.articlesbase.com/computers-articles/inkjet-or-laser-printer-which-is-best-for-me-938949.html

Monday 25 May 2009

Registry Cleaner Review - Crucial Components That Every Registry Cleaner Review Must Have

PCs became one of the most vital inventions the world has ever seen. They allow you to finish writing projects, create spreadsheets, surf the Net, and much more. But computers are not without problems...

A vital part of a Windows PC operating system is called the registry. A computer Simply can't run without a registry as it provides some very crucial functions to the system. Over time, the PC registry starts to build up errors from ordinary each day activities.

These registry errors start to cause problems for your computers performance. Symptoms of registry mistakes include such things as slow running programs, slow start-up or load time, windows crashing, and your system freezing up. All of these issues can become real headaches for any Computer owner.

A registry cleaner is a computer program that cleans up all the registry blunder issues. This includes invalid application paths, missing DLL files, missing startup programs, missing file associations, and much more. Fixing these registry problems can drastically enhance your computers performance.

There are a number of registry software programs available these days. Many claim to be better than others, whilst performing the vital function of cleaning up your Computer and improving performance. How did you know which registry cleaner software is the best choice? The answer's by reading registry cleaner reviews.

So, what should you look for in a registry cleaner review?

A registry cleaner review should always include some key parts. First, the review should provide details about what the registry cleaner does (i.e. features). At about that point, you know why you need a registry cleaner, but you need to be sure that the registry cleaner you choose will perform an inclusive system scan, perform the right functions, and fix any registry errors it finds.

A registry cleaner review must also include information on ease of use. How easy is it to use the software? One of the great things about registry cleaners is that they automate the registry cleanup process since manually modifying your registry can be very technical, troublesome, and dangerous. A registry cleaning software should be simple for anyone to use.

The next thing to look out for in a review about registry cleaners is scanning ability and repair capabilities. Ideally, the reviewer should have tried out the software and determined whether it essentially scans all the required PC sectors. It should determine whether the mistakes it uncovers really get repaired and whether the PC performance improves following the cleaning process.

Finally, a registry cleaner review should cover information on consumer support and software pricing. What kind of support can you are expecting from the software creator? The reviewer should be ready to tell you exactly how the merchant provides you to get in contact with them for any questions you can have and the various ways you can fetch help. The review should also include the price of the registry cleaner and how it measures up to other competing software.

An ideal registry cleaner review needs to include information on the features, scanning capability, fix efficacy, support, and pricing. Look for an unbiased review on a visually appealing website as well. In the end, these reviews can offer you with a good means of picking the software you need to get your PC running at optimal performance again.

By: Jim Gordon

Article Directory: http://www.articledashboard.com

Saturday 23 May 2009

Microsoft Wireless Notebook Optical Mouse 3000 Review

Microsoft Wireless Notebook Optical Mouse 3000 is the best choice for those who spend a lot of time on the computer and tend to develop hands and wrist pains. I am in front of the computer and using a mouse the whole day and sometimes it extends into the wee hours of the night. I thought that only people who have poor posture and who have poor hands positions when using the computer are the ones that get wrist pains. Now I know that even mice can cause them.

When I started using this mouse, I was pleasantly surprised by how much ease of movement it gives to my hands. The center scroll wheel doesn't make scrolling hard for my fingers and my carpal tunnel. It is very smooth and it doesn't make any sound. I use this feature frequently and the principal reason why I bought this is because it felt good under my finger index and middle fingers.

The size of the mouse makes it lightweight and very easy on my hands and fingers. I have small hands so the small size fits me perfectly. I don't need a mouse pad for it to perform well.

It is very responsive. I don't have to move it with big strokes for the cursor to go the place I want it to go. The left and right button also responds even with very small movement of the finger.

Since using this mouse, I never had any wrist pains again. Working with this mouse and my laptop is such a pleasure since I bought Microsoft Wireless Notebook Optical Mouse 3000.

For more information, check other Microsoft Wireless Notebook Optical Mouse 3000 reviews.

Erika Ayala works part time for a consumer review company.

Article Source: http://EzineArticles.com/?expert=Erika_Ayala

Wednesday 20 May 2009

Strong Password Authentication Essential to Your Computer Security

1. Why Password?

Your computer and the websites you frequently visit contain a great deal of personal information about you. It is important, therefore to ensure that you do not allow your personal details to get into the wrong hands.
We do so much online these days: banking, shopping and social networking have become everyday activities. There are nasty people out there who want to steal from you. Not just your money, but your very identity. It is therefore very necessary to protect yourself by restricting access to your personal data. This is where passwords come in. They make sure that your personal details are only available to you.

2. Why a Strong Password?

We all like to keep things simple. Passwords can be a pain. So let us make it easy to remember and not complicate matters. Why not use the same password for all our safe sites. It is too much hassle remembering all those different passwords, after all.

Passwords can be seen as the weakest link between your data and those who could most benefit from access to your personal details. Once the password is cracked they are in. If you use the same password for different applications, your system is vulnerable, along with your online banking and credit card accounts.

Examples of weak passwords include your name, username, date of birth, names of your children, even your car registration number. Paul123 would not be a safeguard against my online bank account, for example. Hackers can use programs that try to guess your password by browsing through your files to search for personal information.
Criminals use a number of methods to identify passwords. Dictionary search trawls through online dictionaries to come up with a match to your password. Brute force attacks try every possible combination of keystrokes that can be used in connection with a user name. Phishing, official looking emails purportedly from banks, for example, seek to obtain passwords or PIN numbers from unsuspecting victims.

3. What is a Strong Password?

Many websites demand passwords that exceed seven or eight digits, including letters and numbers. Security experts advise even longer passwords, 14 characters are considered sensible. Experts also suggest that you mix upper and lower case letters and utilise characters in lieu of some letters. The key is to use a password that is simple enough for you to remember but no one else, even your close family and friends would be able to identify.

4. Further assistance

Microsoft has a very good application that rates the strength or weakness of your chosen password.

Password checker can be found here: http://www.microsoft.com/protect/yourself/password/checker.mspx

Paul Forrest has run marketing orientated businesses for more than ten years. He specialises in writing articles for websites, utilising proven successful methods that attract new customers. Paul has an extensive knowledge of Search Engine Optimisation (SEO) and enjoys a clear understanding of the profitable use of keywords.

Paul uses clear explanation regarding the subject. Paul's style of writing engages the attention of the reader in addition to maximising keyword profitability with the major search engines, particularly Google.

Based in Brighton in the United Kingdom, Paul keeps up to date with developments in all aspects of business and has a passion for helping companies to succeed in their marketplace. Following a multi-faceted career in commerce, Paul devotes his energies to writing articles that drive potential customers to his clients' websites. Paul can write about any subject which he will thoroughly research before pen touches paper or finger hits keyboard.

To find out how Paul Forrest can drive more customers to your website, check out http://www.articlewriter.biz today.

Article Source: http://EzineArticles.com/?expert=Paul_T_Forrest

Sunday 17 May 2009

The Technology Trends For 2009

Improved Televisions
Let us start with the television. It has been a steady feature in the homes of many people and yet it is one thing that has probably changed the most throughout the years. Last year, the flat panel televisions that were only four inches deep were the big thing. As the thinnest televisions on market, people flocked to the electronics store so that they could have the very best.

But this year, there are televisions that are making their panels only one inch, and in some cases even less, which means there is a new version of the flat televisions on the market. Many of the big name companies such as JVC, LG, Sharp, Sony, Mitsubishi, Samsung, and Hitachi are all jumping on the bandwagon and creating a television that will truly make history with how deep it is, or rather how deep it isn't.

But why do the televisions have to be so thin? The biggest reason is because the thin television gives the consumers much more flexibility with where they put it. The flat televisions help to improve a home, as it is truly a space saver. With how small the televisions are becoming, how does a person hide their DVD players, the cable box receivers, and the connections to their satellite receivers? The lowboy was something that was rather popular in the 1960s and 1970s but is finally making its comeback in 2009. Even though there are other products on the market, the lowboy is certainly the item that is the trendiest for this year. It is deep enough for the flat panel televisions and it is able to hide all of those connections so that the aesthetics of the wall display are not lost.

Blu-Ray Enters More Homes
When it comes to Blu-ray, many people feel as though it is something of the past. The thing is though, there have never been as many choices and options as there are in 2009. People are trying to get their movies and their normal everyday television viewing into the best picture possible. Even though this could not be done before, there are products out there that can now deliver high definition content to several televisions throughout the house. Instead of just having one television with the best viewing or having to purchase separate HD systems for all of the televisions, you can now get great viewing from all TV's with the help of a video distribution system that is HD-compliant.

The least expensive models on the market come from Sony with a price tag of anywhere between two thousand to two thousand five hundred dollars. These systems are the basics. But what about the homes that about more then two televisions? For that, Sony has developed a system as well. The HomeShare HD system can send HD video to up to four televisions. The cost is about one to two thousand per room.

Netbooks
When it comes to wanting the best of the best, 2009 has something great to offer those who love laptops. The Eee PC 1000HE is certainly the largest of the Eee series to date but there are more benefits to it which over shadows the size with no problem. The high-speed wireless capabilities are incredible and the battery life will last a person all day. This truly means that someone can work all day out in the sun or in the local coffee shop without having to worry about plugging in.

The ten-inch display makes seeing what is on the screen incredibly easy and the keys on the keyboard are ninety two percent of the size that would commonly be found on a laptop. This means that the spacing between each key is similar to what would be found on the common desktop keyboard. All in all, this is the netbook that is the best buy. While it may not be as pretty as another laptop or as compact, the features on it far exceed anything else out there for 2009.

And when you are shopping for the latest technology in netbooks, the thing that will be on your mind is what it can do for your personal and business life, not how pretty it looks.

Can It Get Better Then This?
With all of the various things that have already hit the shelves throughout the world in 2009, one would wonder if it could still possibly get any better then it already is. As far as designers and engineers are concerned, there is always room for improvement. There can always be something a little better, a little faster, and a little smaller. 2009 is truly a year that has brought many surprises and will probably bring even more before it is all said and done.

And what will next year bring? A half-inch thick television? Televisions that think more like computers? No one in the general public really knows for sure. What is known though is that we will most likely be continue to be amazed with what technology brings our way.


Saturday 16 May 2009

4 Easy Ways On How to Backup Files On Your Computer

Data loss is a big problem for anyone who uses a computer to work. Fires happen, computers crash (with alarming frequency), and virus programmers have become more advanced than ever before. Each of these situations presents its own uniques threat, but there is one way to deal with the most devastating outcome- file backup.

Some operating systems come with a backup utility that allows you to create backup copies of your entire hard drive (or folders that you select) automatically. The two most popular operating systems, Windows Vista and Mac OS X both come with backup utilities. After a certain point, though, backing up files on the same computer that has the potential for crash can end up devastating your system.

Backing up files on CD or DVD is a viable option for anyone who has that capability and backs up once in a while. The one major advantage to this method is that the CD or DVD is an external storage media, and it can be kept safe outside of the computer, or even the room the computer is in. Many large companies do routine backups of important data and keep those disks in a fire-proof safe off site.

This can still be a time consuming method, and each disk can only hold a fraction of the entire contents of a hard drive.

External hard drives offer the easiest and most reliable method of local backup storage, as they are available in very large capacities, connect easily, and can be physically isolated from the computer at any time. Unless you keep your external hard drive locked up in a safe as well, it too can be destroyed by fire, flood, or storm should a disaster strike. They are also prone to the same failure problems that plague internal drives.

A solution for how to backup files is growing in popularity among home users as well as office IT managers and that solution is online backup. This relatively new method of file backup is done online with a company that is physically miles away, yet the data is always available at the touch of a few keystrokes. For a nominal fee, there are several companies that will store your data in heavily protected servers, often automatically as well.

Choosing a backup method is simply a matter of determining how much capacity and security you need. Most people find that external hard drives and online services offer the best protection for the cost.

If you are looking for the best online storage solution, we recommend Carbonite or Mozy. Visit us to see a head-to-head comparison of Carbonite vs Mozy and decide for yourself which option is best for you.

Article Source: http://www.articlesbase.com/hardware-articles/4-easy-ways-on-how-to-backup-files-on-your-computer-915382.html

Thursday 14 May 2009

Computer Systems Upgrades Are Easier Than You Think

We have all been bombarded with news about the poor economy. Jobless numbers are increasing, corporate profits are tanking and, in the technology sector, computer systems sales have dropped significantly.

One upside to all this negativity is an increase in ingenuity and the resurgence of an old-fashioned "do-it-yourself" attitude. In the spirit of saving money, many business owners and IT people have embraced the idea of upgrading computer systems instead of opting for replacement at the first sign of trouble.

Is A Computer Upgrades Right for You

Do a Google search on computer system upgrades and you'll find tons of advice. One of the best came from an article on about.com: do an upgrade if the cost of the upgrade is half (or less) than that of replacing.

IT professionals know all about upgrading. Business owners who do their own IT or who contract out the job should also learn all they can about upgrading. Why? So they know what can be done and can arm themselves with the knowledge they need to avoid costly upgrades that net them little in performance gains.

First, it helps to know the basics about your computer. Learn what types of memory are out there and what kind your computer currently has. (You must replace your current memory with the same type or your machine won't work.) Educate yourself about hard drives too. To increase hard drive space, you can opt for any number of external hard drives, or update the one you have.

As the about.com article notes, the cost of upgrades can quickly escalate, and eventually total more than a replacement. Plan your upgrade carefully. Do some comparison shopping to see what a new machine would cost, and lay out a budget for your upgrades. Shop around for parts too. If your machine is more than a few years old, you may need to find a vendor of used or discontinued computer parts. Good news - there are lots of them and their parts tend to be very affordable.

One more caveat - desktops are typically easier to upgrade than laptops. You should proceed with caution in either case, and call in a professional to help if you feel you are in over your head.

Two Basic Upgrades You Can Try Before Replacing Your Computer

The main complaint of most computer users is speed. Signs of speed issues include files take that take too long to open or too long to save. To remedy this problem, you need a memory upgrade. Be sure that you know how much room you have (number of expansion slots) and the correct type of memory for your machine before you buy more memory. (To find out all you need to know about your memory, you can download a free System Information program.)

Another common complaint is hard drive space. Of course, if you work on a network, this shouldn't be a problem for you. (The IT people in your organization have to deal with storage space on enterprise computer systems.) But if you work in a small business with no network, hard drive space can be a problem. You can replace your internal hard drive with a bigger one, or simply add on an external hard drive to back up files (which you should be doing anyway).

If these two upgrades can't solve the problem with your computer systems, then you should probably consider replacing the units. Be sure to shop around. Whether you buy new or used, there are great deals to be had, especially in today's economy.

Article Source: http://www.articlesbase.com/computers-articles/computer-systems-upgrades-are-easier-than-you-think-912862.html

Sunday 10 May 2009

Outdoor LCD - A New Name of Entertainment

Outdoor spaces are now gradually being used as additional living space. People these days are buying outdoor sofas that have high grade cushions and a deep and comfortable sitting. They actually want to create an equally comfortable ambiance outside their home. Once this is done, they then would like to make arrangements for some entertainment. However, here too people look out for the same level of entertainment. With the latest progress in technology, many companies are bringing out televisions that are designed in such a way that they can withstand the outdoor elements. Initially, it was only seen in cruise liners and hotels, but now, even an average homeowner can afford it.

In order to withstand harsh weather conditions, outdoor TVs are built to be weatherproof. Typically, such TVs are LCDs as well as High Definition. Weatherproof outdoor TVs have some specially designed protective features, meant for withstanding exposure to high-velocity wind, rain and direct sunlight. There are certain accessories as well, such as protective cover, remotes and many others as well, to make the entire experience of outdoor TV viewing a pleasant one. Apart from all this, such TVs have a minimum warranty of one year.

An interesting thing about Weatherproof LCD televisions is that apart from providing outdoor entertainment, they can also be used in an indoor environment as well. Indoor spaces like kitchens and bathrooms are the places where a lot of moisture is accumulated. It can therefore be also said that the LCDs which are used for outdoor entertainment can as well be used in such places. These weatherproof LCD televisions would then function with equal efficiency which is a great thing in itself.

It therefore may be confidently asserted that Outdoor LCD televisions, which are weatherproof as well, are appropriate for both indoor and outdoor spaces. It provides a great opportunity to all to spend quality time with their families in an outdoor ambiance. Even if anybody has any important work to do outside, with an outdoor LCD television he/she can easily catch his/her favorite soaps or even matches. With so many advantages, it can easily be understood why most of the American families have made it a compulsory part of their outside decor. However, it is expected that such a great innovation will definitely find a place in most of the households across the world. Owing to all its fantastic and user-friendly features, this will surely be highly successful.

Outdoor LCD
I-techcompany is an online superstore for sunlight readable high brightness LCD for outdoor display, daylight viewable LCD and high brightness rack mount monitors. Call us at 888-483-2418 for more details.

Article Source: http://EzineArticles.com/?expert=Kilian_Allen

Useful Tips to Maintain the Temperature of Your Notebook

Many notebook users neglect one of the most important aspects of using the gadget, i.e, protecting it from overheating. Maintaining the temperature of the laptop computers is another way of enhancing its performance. The user should know and understand the safest operating temperature for a notebook.

How to find the temperature:

The temperature of the laptop can affect the performance of the device. But, the prime aspect of consideration is to find the notebook temperature. Here are some of the useful ways how you find the notebook temperature so that you can avoid the causes responsible for overheat of the machine.

Usually the notebooks come with software to keep track of the temperature. While purchasing notebook, look for the utility software meant to find the notebook temperature. Generally, the software is not a part of the Operating System of the computer, but a part of software provided by the manufacturer.

Apart from the preinstalled software you can download free software from the Internet. They are available with instructions of using them and help you find the temperature of your laptop. Few laptop users with technical mind use thermal sensor to keep track of the temperature of their machines.

How to keep your notebook from overheat:

Now that you are able to find the temperature of your notebook, you have to take necessary steps to maintain the temperature and protect the machine from overheating to keep the machine cool. In fact, it is an effective and cost-effective way of increasing the notebook performance.

If you feel that your notebook is getting too hot, it is high time it needs a break. Shut down the machine and allow it to cool. Also, try to place your notebook on a flat surface. You can find rubber feet that allow airflow to the lower side of the notebook. When you are using the machine placing it on a bed or any other such surfaces chances are there your laptop may not get enough air.

Alternatively, you can work with your laptop placing it on your lap if want to work away from the desk to allow proper airflow. You can also place a towel underneath to avoid the heat. Also, try to raise your notebook from the surface allowing increase of airflow to the lower surface. You can even use a laptop stand to rest your laptop on it.

Many people keep their laptop on even after placing them inside the laptop case as it is convenient to take the machine out of the bag, open the screen and work immediately. But, the environment inside the notebook case is generally warm and it can get warmer with the already switched-on computer. It can cause harm to the hardware of your laptop. It is better to shutdown the notebook before placing it in the notebook case.

It is common among the laptop users to keep the computer plugged in throughout the working hours. The constant flow of electricity will not only reduce the performance of the battery but also increase the heat of the battery. It will eventually overheat the laptop. It is very essential to charge your computer as long as necessary, otherwise unplug the charger once the battery is full.

Another way you can keep your laptop from overheat is by buying a laptop cooler. Of course it is a pricy choice, but it can provide cool air to the underside of the notebook. Now, enhancing the performance of your notebook is in your hand. While using your notebook, make sure that it does not get overheat.

Friday 8 May 2009

Using InstallAware 7 To Patch Software Products

Overview

This whitepaper describes how to use InstallAware for patching software products. While many third party patching tools are available, most are loosely integrated with installation tools. This makes the patch delivery and installation awkward, resulting in a less than satisfactory user experience. Certain setup authoring tools do provide an integrated mechanism for building patches, improving the user experience. However, in these cases the patch authoring process is very complex and requires special training. Patches are treated as a special kind of setup project, with many authoring pitfalls that the developer has to be conscious of both before and during actual patch development. Since patches are distributed after the actual product has shipped, this results in difficult situations where the original setups can no longer be modified, but were required to be authored differently for the patches to be successful.

InstallAware addresses these challenges in patch authoring using a unique technology: One-Click Patching. InstallAware literally builds patches for older versions of your products in a single click. You simply refer the IDE to the old, built versions of your setup to upgrade, and click the "Build Patch" button. No additional coding or development effort is required at any time. InstallAware takes care of the rest for you.

Despite this remarkable ease of use, in the InstallAware tradition, extensive customization of the patch process and patch user experience remains possible. This makes it possible for you to integrate your business logic into your installer at runtime, dramatically reducing development overhead that would otherwise be required to support that logic. For instance, before applying a patch, dynamic validation of the user's existing product license may be performed, barring the software upgrade if the license has expired or is invalid. Similarly, a single patch may be applied onto multiple targets - making it possible to reduce integration workload when patching products in different target languages, editions, and other configurations.

InstallAware further aids patch deployment by reducing the payload size, improving compression ratios, and caching old version setup sources. Patches are built using binary incremental differencing technology, which includes only the delta between the old and new versions of your files in your patch packages. This data is then compressed using LZMA/BCJ2 compression technology, which pre-processes files to increase their compressibility for even more space savings. At runtime, InstallAware simply refers to cached setup sources, eliminating unnecessary CD/DVD and other kinds of original setup media prompts, which would otherwise derail patch deployment (other setup authoring mechanisms do not cache setup sources on the end-user system).

While offering these unique benefits, InstallAware is completely standards based - every InstallAware patch is a native Windows Installer patch package (MSP) that can execute directly, without requiring a third-party scripting runtime to be previously installed. Windows Installer is the only Microsoft approved installation technology and is a requirement of Microsoft logo certification programs. It offers several other advantages such as elevated-privilege installations in high-security contexts and automated corporate deployment using Active Directory Group Policy. These benefits make MSP format patches the only accepted software distribution format for large enterprises.

Building the First Version Installer

While it is possible to upgrade products built using any setup authoring technology using InstallAware, those upgrades cannot take advantage of InstallAware's One-Click Patching technology. Any product which you wish to patch using InstallAware must have originally been installed with InstallAware.

To build the installer for the first version of your product, perform the following steps.

1. Our hypothetical product is comprised of two files, an application file and a data file. Windows's standard text editor Notepad, located in your Windows folder, will serve as our application file.

We'll go ahead and create the data file. Right click your Desktop, and choose New - Text Document. Name the file Notepad Data, double click it, and edit it so its contents look like the screenshot below:

2. Now that our first version product files are ready, we can get started building the first version installer. Launch the InstallAware 7 IDE using the Windows Start Menu. Then, on the Project tab, in the New group, click the Basic Setup button. The New Project window is displayed.

3. The Basic Setup project type is pre-selected. Additionally, the New Project window lists other types of templates, wizards, sample projects, and project converters.

The Basic Setup project type contains all the plumbing we need to build a fully working installation - with out of the box support for multiple features, application repair and maintenance, uninstall, and also patching, our area of focus in this whitepaper.

4. Under the Project Name field, accept the default value of My Setup, or provide your own project name. Projects are normally created under your My Documents folder, and reside inside their own subfolders. If you would like to use a different folder, enter that folder name here, or use the suggested value. Click OK when you're ready to create the project.

5. Now that our setup project is ready, we'll begin to flesh it out with our products's logical organization. On the Design tab, click the Files and Settings button. Select the Features designer under the Setup Architecture heading and define two features, so your setup project looks like the screenshot above. Use the Rename button to rename existing features, and the New button to insert new features. The Up-Down buttons on the top right corner of the design view let you sort your features. You may also customize feature descriptions by highlighting a feature, and then editing its description in the Feature Description field.

When you're finished, select the Files designer under the Setup Architecture heading to add your actual product files to the setup project.

6. The top section of the Files designer lists the files available on your development system. The bottom section of the Files designer lists the files that are installed by your setup. Notice the list of variables that are displayed under the Target Folders list. $TARGETDIR$ is a special variable which indicates the destination directory chosen by the user at install time. Select $TARGETDIR$ before adding any files to make sure they will be installed into the end-user's chosen destination.

The Filter Files by Feature check-box lets you associate individual files with your product's logical organization (the features defined in the previous step). After checking this box, be sure to choose the product feature that you wish to associate files with.

From your Windows folder, add the file notepad.exe under the Program Files feature. Then browse to your Desktop folder, and add the file Notepad Data.txt under the Data Files feature.

7. Shortcuts will let us easily open installed files and test that the patch is working. Select the Shortcuts designer under the Setup Architecture heading, and then click New to display the New Shortcut dialog.

It's easy to create shortcuts in a variety of locations using this dialog. Click the Browse button to visually locate your shortcut targets from among the files you're installing, or alternately type any file or folder location directly in the Shortcut Target field. Be sure to name your shortcut using the Text field, and pick at least one location to create the shortcut under from the Shortcut Placement group. Click OK to save your changes.

Create two shortcuts - one called My Data which points to our dummy text file, and another called My Program which points to the copy of Notepad that we're installing. We're now ready to build our first version setup!

8. On the Project tab, in the Build group, click Web Deploy. We choose the Web Deploy build mode, because when a setup is built this way, it locally caches its setup sources on the target system - eliminating the need for source media prompts that would be occurring with other build modes, such as the CD or DVD build mode. It's also possible to build a setup in Web Deploy mode without actually deploying anything on the web - we'll revisit this subject in the second half of this guide.

When the build is complete, click the downward arrow on the Output Folder button in the Build group, and choose the Web Deploy location. Explorer opens up with our built setup, with the following files located inside the folder:

* My Setup.exe: This is the main setup executable, which contains the installer engine.

* Data Files.7zip: This setup data file contains all the files which were included in the Data Files feature.

* Program Files.7zip: This setup data file contains all the files which were included in the Program Files feature.

9. Create a new folder on your Desktop, calling it Version One. Copy all built setup files inside this folder. This folder serves as your backup location for your old version installer, which is all that is needed for building a patch targeting this first version. Old product files or setup sources are not required.

Building the Second (and further) Version Installers

Now that we've successfully built and saved a copy of our first version setup, we're ready to make the changes to the product and setup project for building the second version.

1. Edit the text file on your Desktop created in step 1 of the previous section, and edit its contents so it looks like the screenshot below:

2. Save your changes to the text file, and rebuild your setup following the procedure in step 8 of the previous section. Remember to create another folder on your Desktop called Version Two, and again copy all built setup files into this folder, backing up the second version installer for use with future patches.

3. If necessary, make further changes to your product files and setup project (such as adding more files), and build further version installers as necessary. Just be sure to backup each built setup, so you can patch them later on.

Building the Patch

There are absolutely no additional steps required to build a patch, above and over the changes made to your product files and the new version installer. Follow the steps below to create your patch:

1. On the Design tab, in the Views group, click the Deploy button.

2. Under the Deployment heading, choose the Patches designer. Click the Add button in the Patches designer and add the file My Setup.exe from the Version One folder created earlier on your Desktop.

3. If there are other product versions to patch, add their installers from their backup folders as well. These saved old version installers are all InstallAware needs for creating a patch!

4. Click the Build Patch button. Once your patch has been built, click the Browse button to open Explorer inside the folder containing your patch file, My Setup.exe. This patch will successfully upgrade all referenced old versions to your latest version!

Congratulations! You have now built a patch for your software product using InstallAware. Install your first version install, open the text file to verify its contents; then install the patch and verify that your text file has been updated. Experiment with making more changes to your setup project, and let InstallAware take care of building more patches for you with a single click!

Deployment Scenarios

Patch Source Resolution

All Windows Installer patches require access to the old version product's setup files. The setup files for the old version must be successfully identified (resolved) before any patches may be applied. This section describes how InstallAware patches handle this source resolution requirement.

Patch Source Resolution for Web Deployed Setups

Since web deployed setups always locally cache their setup files, patch source resolution for web deployed setups is automatic. No manual steps are required during patch source resolution. It is also possible to author web deployed setups such that they do not require an Internet connection at any time during installation; these advantages make web deployed setups ideal for patching in InstallAware.

Patch Source Resolution for CD or DVD Setups

If it is undesirable to cache setup sources locally, CD or DVD setups may also be used. When patching a CD or DVD setup, a dialog box will ask for the original setup files. At this stage, the end-user simply needs to insert the original installation media, and select the drive containing the setup sources. If a CD or DVD setup was not stored on a removable medium but resides on a hard drive folder, simply selecting that folder will again suffice during patch source resolution.

Patch Source Resolution for Single File Setups

A single file setup packs all setup files into a single self extracting file. This self extracting archive, when run, first expands all setup files into a temporary folder, and then initiates setup. When patching against these setups, therefore, it is not sufficient to point to the folder containing the single self extracting file. Instead, the self extracting file should be run, allowing it to complete to the stage of extracting its setup files to a temporary folder, and then that temporary folder should be chosen. Identifying this folder can be a little daunting for novice end-users, therefore single file setups are not recommended as patch targets; however if necessary it is still possible to patch single file setups.

A practical step by step method to locate the temporary folder where setup files are extracted into is as follows:

1. Click the Windows Start button, choose Run, and type in %temp% into the Open field. Then click OK.

2. Windows Explorer opens, displaying the contents of the user's temporary folder.

3. Look for a folder that starts with the characters mia and ends with the characters .tmp, with some random numbers and letters in between. In the rare event that there are multiple folders fitting this pattern, simply try each folder until the patch installer accepts one of your choices (the patch installer will check to make sure valid sources are specified).

The main advantage of using a single file setup is to create a monolithic package that contains everything needed to install an application without requiring an Internet connection or a CD/DVD (and other types of removable media). It is possible to build web deployed setups which are still monolithic and do not require access to the Internet at any time during installation, so in cases where a monolithic single file setup is desired, the Web Deploy build mode can be preferred over the Single File build mode. Patch source resolution is automatic with all web deployed setups, and the output of a setup built using the Web Deploy build mode can still be a single physical file, as described in the following section.

Building Monolithic Web Deployed Setups

Since web deployed setups are the easiest base setups to patch against, it is desirable to use them when deploying your full version installers. In certain situations you may want to build setups which do not require an Internet connection at any time. InstallAware makes it easy to build monolithic web deployed setups - that are fully self-contained - so they always cache setup files, contain all setup data in a single setup file, and are easy for your end-users to patch against. To convert any existing setup to a monolithic web deployed setup, follow these steps:

1. Open your setup project in the InstallAware IDE, and choose the MSIcode tab to access the full sources of your installation.

2. Inside the MSIcode editor, choose the tab immediately to the right of the Welcome Page tab. For our hypothetical setup, this tab is called My Setup.

3. Notice the two drop-down combo boxes immediately above the MSIcode script. Select Web Media Blocks in the left combo box. Then expand the right combo box to display a list of all your Web Media Blocks (parts of your setup that are downloaded from the Internet at runtime).

4. Select a Web Media Block from the open combo box. The MSIcode editor positions the cursor at the exact location in the script where the Web Media Block is defined.

5. Right-click the highlighted Web Media Block line, and choose Comment Out/In. This comments out the Web Media Block definition, directing the InstallAware setup compiler to ignore this directive.

6. Repeat steps 4-5 until all Web Media Blocks in the MSIcode script have been commented out.

7. Press the Page Up key repeatedly until you are on top of the installation script.

8. Using the mouse, drag-drop the Web Media Block command from the MSIcode command palette (on the right of the MSIcode editor) to the top of your script. This inserts a new Web Media Block command into the MSIcode script.

9. The Define Web Media Block dialog box appears. Without making any changes in this dialog, simply click the OK button. This inserts a new line into your MSIcode script called [OFFLINE CONTENT]. This instructs the InstallAware setup compiler to include each file of your setup package directly inside the main setup.exe file, instead of an Internet location where they will be downloaded from at runtime.

Building your setup in the Web Deploy build mode will now create a monolithic web deployed setup, which does not require access to the Internet at any time during installation, providing the easiest targets to patch against thanks to automated patch source resolution.

Customizing Patches

Compiler Variables

InstallAware features Compiler Variables, which offer an easy way to build multiple setup files from a single setup project. Using Compiler Variables, which are similar to conditional directives found in most programming languages, you may conditionally include/exclude parts of the MSIcode script, and build different flavors of an existing setup, all based on a single setup project.

Built-In Compiler Variables

InstallAware provides various built-in Compiler Variables. For instance, the internal BUILDMODE Compiler Variable evaluates to PATCH when building patches in InstallAware. This makes it very easy to add additional logic to your MSIcode script, that is only compiled during a patch build (for instance, when clicking the Patch button in the Build group on the Project tab). Additional, custom Compiler Variables may be defined using the Project Options window (accessible by clicking the Project Settings button in the Manage group on the Project tab). Compiler Variable values can also be set from the command line when using the miabuild.exe command line build tool, for added convenience.

Conditional Compilation using Compiler Variables

Three MSIcode commands offer the possibility to test the values of Compiler Variables, and selectively include/exclude parts of the MSIcode script at build time. These commands are found on the Compiler Directives group of the MSIcode command palette (accessible on the MSIcode tab, to the right of the MSIcode editor):

* Compiler Variable If: Opens a new conditional compilation block. Simply drag-drop this command into your MSIcode script to create a new conditionally compiled block.

In the Variable field of this command, enter the Compiler Variable to test for. You may test for both built-in and custom Compiler Variables using this command. To start a new conditionally compiled block included only when building patches, enter BUILDMODE in this field. In the Comparison field, choose a type of comparison to perform. Accept the default comparison of Equals for testing patch builds. If you need to reverse the type of comparison, check the Reverse Comparison (If Not) check-box. In the Compare With field, enter the literal value to test the value of the Compiler Variable against. For patches, enter PATCH in this field.

* Compiler Variable Else: Branches a previously started conditional compilation block, such that if the immediately preceding Compiler Variable If test failed, the MSIcode commands following the Compiler Variable Else command are conditionally compiled.

* Compiler Variable End: Closes a conditional compilation block previously opened with a Compiler Variable If command. Each Compiler Variable If command must have a corresponding Compiler Variable End command.

You may freely nest multiple conditional compilation blocks as you see fit. You may also use any kind of MSIcode commands within your conditionally compiled blocks.

InstallAware internally uses Compiler Variables to make One-Click Patching possible. Most InstallAware templates (including the Basic Setup template used in this whitepaper) provide a properly constructed MSIcode script with all necessary Compiler Variable If/Else/End commands that provide effortless patch construction from the same setup project used for the main setup.

Using Compiler Variables in this way provides out-of-the-box One-Click Patching convenience for developers, while retaining developer flexibility and permitting additional customizations to patches being built based on a single setup project. You may freely customize any of the InstallAware templates to suit your requirements and embed any kind of business logic to your installations for patching, while avoiding the problems and overhead associated with having to create and maintain new, separate patch projects from scratch.

Additional Resources

Please visit the InstallAware website publications section at the following URL for more information on InstallAware technologies:

http://www.installaware.com/home/publications.asp

Whitepapers providing an in-depth analysis of InstallAware's scripting and web deployment technologies, as well as a Reviewer's Guide, are available at the above URL.

About The Author:
Candice Jones is employed at InstallAware Software Corporation.

http://www.articleclick.com/

Tuesday 5 May 2009

Types of Computer Viruses

In computing terminology, a ‘malicious code’ is a term used for computer viruses and programs designed to cause damage to computers. Other types of destructive PC worms are known as Internet virus including the examples like Worms and Trojans.

Outlined below is the description of different kinds of computer viruses:

Program/File Infector

Falling under the category of parasitic viruses, a program or file infector attempts to infect the files with extension code like .exe, .com, .drv, .dil, .bin, .ovl, and .sys. It gets activate along with the execution of executable file containing virus. The virus then loads itself into memory and replicates itself to other executable files when these files are opened or run.

The File Infector virus can destroy the content contained in files and cause irreversible damage to them. Some file viruses have also operated as email worm and Trojan horse.

The best way to disinfect files infected by the file virus is to delete them and restore from back up.

Macro Computer Virus

A macro computer virus is a virus written in a language built into a software application such as a word processor. For example: Microsoft Office has the macro language built into its application. This is why most of its application programs are affected by macro computer virus.

Macro viruses are generally created using the macro recorder or Visual Basic for Applications. The applications that are the most prone to this antivirus are Word Documents, Excel Spreadsheets, Power Point Presentation, and Access Database. The virus infects templates of these documents and therefore every file that the user opens gets affected. Some common macro computer viruses are Auto Exec, Auto New, Auto Open, Auto Close, and Auto Exit.

The auto macros can be disabled by using the command ‘DisableAutoMacros’ in any macro that is written. Another way to remove it is by holding down the shift key while opening a document.


Multi-Partite Virus

It behaves in the same way as other computer viruses do. As the name signifies, they are sometimes more than one type. These are hybrids and are known as multi-partite virus.

Polymorphic Viruses

It is a kind of virus which produces different but operational copies for itself. Its attack is considered to be extremely dangerous as virus detectors will not be able to detect all instances of virus attacks simultaneously. And this is one of the reasons why it is known to be strategically designed.

Stealth Viruses

A stealth virus uses different mechanisms to prevent recognition by antivirus software. It tries to escape detection either by redirecting the disk head to head to read another sector or modifying the file size shown in the Directory listing.

Classification of some viruses is not possible as they are the file type viruses which start behaving as computer worms with an activation code.

Article Source: http://www.articlesbase.com/computers-articles/types-of-computer-viruses-898938.html

Friday 1 May 2009

Tips to Protect Windows Vista Operating System

So far, Windows Vista can be considered the safest operating system but not most perfect one. In its early configuration, Vista still uncovers the possibility of leaking out the user's data to Internet through Windows Firewall, or some bots which can change settings without letting you know.

Consult the WINDOWS SECURITY CENTER

In order to have an overview of security settings, come to Windows Security Center where you can see the status of firewall system, automatic updating, malware protection and other security settings. Press "Start" - "Control Panel" - "Security Center", or simply click the shield-shaped icon on the taskbar.

If there are any red or yellow entries, it means that you are not completely protected. If you have not installed antivirus software, for example, or the existing antivirus program is expired, the "Malware" entry in Security Center will be marked yellow. Windows does not integrate any antivirus software so that you have to install yourself.

Use WINDOWS DEFENDER as a diagnosis device

Malware entry in Security Center is also supposed to report the anti-spyware capacity, and Vista depends on Windows Defender to do this job. Although anti-spyware capacity in security or anti-virus utilities is usually better than that of Windows, there are some good reasons to maintain the existence of Windows Defender. One of those is that each spyware utility uses a different definition to identify the spyware. Therefore, an abundant protection sometimes brings about practical benefit.

Another reason to keep Windows Defender in standby status is diagnosis capacity. Click "Tools", select "Software Explorer". Here you will find a list of all programs by category: Currently Running Programs, Network Connected Programs and Winsock Service Providers, but Startup Programs seems to be the most useful. Click ant names in the left window, the full details will display on the right. By checking any listed program, you can uninstall, deactivate or reactivate that one.

Deactivate the Start Up

Windows Vista monitors all documents and programs you generate in Start Up. This is convenient for some users, but on the other hands, it can be harmful for your privacy if the computer is shared in office or family. Fortunately, Window Vista provides a simple way to change this setting. The steps should be taken as follow:

Right-click the taskbar and select Properties, then select "Start Menu" tab
Uncheck "Store and Display a list of recently opened files"
Uncheck "Store and Display a list of recently opened programs"
Press OK.

2-way Firewall

Almost every PC is equipped with Firewall software, currently. However, even when Security Center states that you are protected, you might not be protected at all.

The Windows Firewall function in Vista is able to "block" any input data which can endanger system, and that is really a good thing. Nevertheless, the off-line security function is not activated by default, so that this may be a dangerous situation if some new harmful software finds a way to break into your PC.

Microsoft has equipped Windows Vista with tools to deploy 2-way firewall feature, but finding these settings is a little complicated. In order to activate 2-way firewall feature of Windows Vista, press "Start", select "Run", then type "wf.msc", then press "Enter". Click the icon of "Windows Firewall with Advanced Security". This interface will display the principles of monitoring system inbound/outbound information. Select "Windows Firewalls Properties". You can see a dialog box containing some tabs. For the profiles: Domain, Private and Public, you should change the settings of "Block", then press "OK".

However, 2-way firewall activation can prevent all the applications from connecting to Internet. Therefore, before getting out of "Windows Firewall with Advanced Security", scroll down, select "Outbound Rules" and "New Rules" on the top right of the screen. Select "Program", on the next screen. Then select the path for Internet Explorer, iTunes or some of your applications requesting to connect to Internet. For each program, on the next screen, select "Allow the Connection", then name each principle/rule created. You will have to set a new rule for all applications which have access to the Internet.

Besides, you can use a firewall utility of third party such as Comodo Firewall Pro or ZoneAlarm, which are all free and able to offer other features in addition to firewall.

Close the doors to unexpected guests

If you share your computer with others (even if you don't), Windows Vista provides a good way to prevent unexpected guests from guessing your password of admin account. When you create a new user and assign someone to be admin (with full rights and authority), Windows Vista allows other users to guess your selected password. The following steps are to restrain the penetration of strangers:

Select "Start", type "Local Security Policy".
Press "Account Lockout Policy"
Select "Account Lockout Threshold"
At the prompt, fill the maximum allowed invalid log-on attempts (e.g.: 3).
Press "OK" and close the window.

Verify the attackers

With proper Account Lockout policy, you can activate the feature of verifying attempts to attack your account. In order to start verify the invalid log-on, the steps are as follow:

Select "Start", type "secpol.msc, click "secpol" icon.
Press Local Policies then press "Audit Policy"
Right-click "Audit account logon events policy" option and select "Properties".
Check the dialog box "Failure" and press OK
Close "Local Security Policy" window.
Now, you can use Event Viewer feature (by typing the command: eventvwr.msc) to view the log-on history recorded in Windows Logs and Security.

INTERNET EXPLORER settings security

Windows Security Center also has function of reporting if security status of Internet Explorer 7 and Internet Explorer 8 is as required or not. If the status is marked red, you should rapidly modify the IE settings

In the menu, select Tools, then select Internet Options
Select Security tab
Select Custom Level

Now you will see a window containing all options relating to IE's security issue. If the options are lower than required (can be changed by some malwares), those will be marked red. To modify a setting, click the corresponding one. In order to reset the original settings, press "Reset" button at the bottom of the tab. If you want, you can change the general security settings of the browser from Medium - High (by default) to High or Medium as required. Press "OK" to save these changes

Use OPEN DNS

DNS (Domain Name System) servers play the role of a telephone directory. When you type a domain name dantri.com.vn, for example, in the address bar, Internet Explorer will send the requirement of common domain name to DNS servers of the your ISP, then these servers are supposed to transform the character sequence to a string of numbers or an IP address. The DNS servers have been attacked over the past few years because the hackers have tried every possible way to redirect the common DNSs to the servers which they can control. A solution to prevent this abuse is to use Open DNS.

Click "Start" à "Control Panel" à "Network and Internet"
Select "Network and Sharing Center". Under the taskbars listed on the left, select "Manage Network Connections". In the window of "Manage Network Connections", follow these steps:
Right-click the icon of your network card
Select Properties.
Then select "Internet Protocol Version 4".
Click "Properties" in the next displayed screen.
Select "Use the following DNS server addresses".
Input 208.67.222.222 into the primary address
Input 208.67.220.220 into the secondary address
Press OK

Cohabit with USER ACCOUNT CONTROL

There is a setting status that some users want it marked red. That is Vista's User Account Control (UAC) - the controversial security function of Vista operating system.

Designed to prevent the remote malware/spyware from automatically installing or modifying system settings, UAC tends to block legal installations by stopping the ongoing process with unnecessary error messages. In Windows 7, you can set up UAC as you want. Up to then, you will have more options.

There is an option of invalidating UAC. However, you should consider this risky choice because UAC can warn you of potential dangers. Instead, install Tweak UAC - a free utility that allows you to turn on or turn off UAC and simultaneously provides an intermediate "quiet" mode (this mode keeps UAC on but suppresses administration elevation prompts). With TweakUAC in "quiet" mode, UAC seem to be turned off to those who use administration accounts, but those who use standard account will still receive the warning messages.

Verify the results

By modifying the security settings of Windows Vista, now you can monitor the safety of system via System Health Report. This diagnosis tool receives the input date from Performance and Reliability Monitor and transforms them into a report with general information. To some extent, this report can provides you with information of potential security issues.

Open Control Panel.
Click System.
In Tasks list, select Performance (near the bottom of the list).
In resulting Tasks list, click Advanced tools (near the top of the list).
Click the last item on the resulting Task list: Generate a system health report.
This report will list any missing drivers which can cause errors, reporting to you if the antivirus protection is installed or not, or if the UAC is on or off. To make sure of the best condition of your Pc, run this report monthly.

Dinh Cong Tuan is now working for a software company that provides IT solutions and software development services. If you want to know more about his work, visit the website: http://attsoftware.net see how he can optimize your business.

Article Source: http://EzineArticles.com/?expert=Dinh_Cong_Tuan