Saturday, April 10, 2010

Disadvantages of Computer Visualizations



Performance might be slower than actual physical devices

When virtualized, there can be some logical hardware which might not give as much as performance as their physical counterparts do. This is especially true in virtualized servers. Since, the servers has to run VMMs and do their management, there will be a drop of overall performance of the system. Even virtualized disk-related processes can be relatively slower at peek hours.

Hardware compatibility issues

Sometimes, hardware specific device drivers and applications may have compatibility issues with VMMs. This is a result of using software products to emulate physical hardware. The organization must check the compatibility of current with the recommended virtualization environments. For example, VMWare virtual machines do not support FireWire. Also there have been few known issues with USB 2.0 and 3D hardware acceleration.

May not support some protocols

It is necessary to make sure that the virtualized environment will have the ability to support current protocols used in the organization. This is especially relevant to LANs and storage virtualization.

May have future threats

VMs are generally safe for experiments, since they can be put on their own sandbox environments. However, still there are some rootkits which can be used to penetrate even that level of security. Rootkits are software programmes which have the ability to run above the OS's and file system's access level. They are very successful at staying undetected since they can conceal their own running process. There have been several technologies discovered in the recent past which has the ability to exploit the new features of Intel Vanderpool and AMD Pacifica chips.

IT is one of the fastest changing industries in the world. As a result many companies are coming up everyday. Each company will have a different type of solution and the customers always want fast and efficient solutions at reasonable prices. Thus, IT organizations must adopt latest, yet most efficient and economical technologies for their requirements.
Read Full Post ►

MSCONFIG Cleanup



By:  Jacob A. Turner Platinum Quality Author

As we all know, MSCONFIG cleanup is a way of removing or disabling unnecessary files in your startup list. This is to avoid them from loading when your Windows boot and to optimize your computer's performance as well.

When you try disabling items on your startup list, there may be instances when you will see this items again when you restart your system. If this is the case, you must be aware that this may be due to a virus infecting your system or an application in your system. Sometimes you may also encounter items that are already uninstalled and yet, they are still in your startup list. These items will not be removed even if you try restarting your system several times. The way to get rid of them is to cleanup your MSCONFIG.

Entries on your MSCONFIG that are enabled or checked may be found in the following registry locations:

• HKEY_LOCAL_MACHINE >> Software >> Microsoft >> Windows >>CurrentVersion>> Run
• HKEY_CURRENT USER >> Software >> Microsoft >> Windows >>CurrentVersion>> Run
• HKEY_CURRENT_USER >> Software >> Microsoft >> Windows NT >>CurrentVersion>> Run
• HKEY_CURRENT_USER >> Software >> Microsoft >> Windows NT >>CurrentVersion>> Load

The disabled or unchecked entries can be found in these locations:
• HKEY_LOCAL_MACHINE >> Software >> Microsoft >> Shared Tools >>MSConfig>>startupreg
• HKEY_LOCAL_MACHINE >> Software >> Microsoft >> Shared Tools >>MSConfig>>startupfolder

To be able to remove the entries, start the Registry Editor or regedit.exe and go to the paths mentioned above. You should not forget to backup your registry before deleting and saving it.

If you are unsure of what to do or which items to delete, you can try doing this:

• Open MSCONFIG and click on the Startup tab
• Open Regedit and navigat to HKLM >> Software >>Sharedtools>> MSCONFIG
• Compare the items of the registry keys on your Startup folder and Startupregwith their counterparts in MSCONFIG
• Start deleting the keys which are no longer valid

Again, remember to backup your registry keys before doing any changes in it. If you do not want to undergo through all these procedures, you can simply download MSCONFIG Cleanup software. This third-party tool will allow you to remove any item that has been previously disabled or deleted through MSCONFIG. However, you must be careful when downloading third-party tools on your computer as you may acquire viruses from some sites just by downloading applications or software from them.

If you are unsure of how to cleanup your startup list, it is always wise to search the web for tutorials of contact your vendor for further assistance. You must know that some items might be essential to your system and deleting or disabling them might cause your system to crash or encounter errors. It is always recommended to take the necessary precautions before changing anything that is connected to your system to avoid having problems with it later on. Read the guidelines or seek help from a professional when you changed something by mistake and does not know how to revert it back to the original setup.
Read Full Post ►

Tips and Tricks For Linux Mint



Linux Mint is a upcoming and popular distribution of Linux. There are many common questions about Linux Mint that people want to know the answers to.

How do you install Linux Mint?

Download the distribution and burn it to a CD as an image and not a data file. You can put this CD into your computer and boot up from it. You have the option of previewing the operating system and not installing it if you wish. If you want to install it, simply click on the install icon on the desktop and follow the prompts. This process will take about 5 minutes to fill out basic information about about 20 to install.

How do you install the flash player to Linux Mint?

One version of Mint does not come with Flash. Simply search the repositories with the Mint Install tool and find Flash. This will install it to your system.

Is Ubuntu or Linux Mint Better?

Linux Mint is based on Ubuntu. The core system is basically the same. Mint comes with a different look and feel and a few additional tools. Neither one is really better than the other. There are differences that just come down to user preference.

How do you run EXE files in Mint?

You need to install a program called WineHQ. This will let you run EXE files and other Windows programs on your Linux system. It won't run everything, but will do a fairly good job.

Where is the Thunderbird profile in Mint?

Your application settings are going to be in your home folder. Most of the time these folders start with a period meaning they are hidden from you. You need to select the option to see your hidden folders. For every Thunderbird folder to find your stored mail and profiles. This is the same for just about any program installed to your system.

http://ezinearticles.com/?expert=Liz_Lavender
Read Full Post ►

Saturday, February 13, 2010

Just Text : Combating Computer Espionage



In some cases, spies and covert operations are found in war grounds or politically tense regions. Now however, you can find spies and covert operations running undetected within your personal computer system as you use your computer and the Internet.

Have you noticed a suspicious slow down of your computer's processing without any particular reason? Are you bombarded by unsolicited pop up ads that indiscriminately appear whether you are running a program or not? These symptoms may continue to happen despite checking your system and running your recently updated anti virus program to run diagnostics on your computer.

Unless you run the correct program, you will not be able to detect the real problem in your system: spyware and adware.

Adware are unsolicited programs that usually come bundled with freeware or shareware. Yes, sometimes things that seem to be good to be true usually come with unwanted invisible strings attached. Companies usually pay freeware or shareware creators to be able to capitalize and prey on unsuspecting individuals who download these programs. Adware cause unsolicited pop up advertisements in your computer and in severe cases, adware causes pop up advertisements to pop up soon as you boot your system.

Spyware on the other hand is more covert and usually undetected in your system until you run an anti spyware program. Spyware is used exactly to spy on you. In relatively mild cases, spyware is used to track your Internet browsing habits so that the spyware can report your preferences to build a marketing profile. This means that as you go about your Internet business, you are under surveillance and your basic right to privacy is impinged upon.

In severe cases though, certain spyware better labeled as malware, are used for criminal purposes and can steal keywords and other sensitive information based on your computer and Internet usage.

For instance, malware can take note of your keystrokes or take note of your credit card number and other vital information that can be used to steal your identity and generally put your security at risk.It is said that 9 out 10 computers are infected with spyware and to make sure that you are not part of statistical majority, you need run an adware and spyware cleaner to detect unwanted security and privacy breach within your system.

There are a lot of reliable adware and spyware cleaners in available to remove these unwanted programs in your computer. You must note however that some adware and spyware are intricately bundled within their parent programs that cleaning them out from your computer will inadvertently disable the legitimate programs they infect. This consequence is a necessary evil to clean your computer of unwanted adware and spyware. You should choose an adware and spyware cleaner that can also work proactively by preventing future accidental installation of these nuisances.

Adware and spyware cleaners work like your anti virus programs except that these particular cleaners target adware and spyware.Considering the trouble adware and spyware creators take to ensure that extracting installed adware and spyware from your computer system will be difficult, the adage about an ounce of prevention being worth more than a pound of cure applies in this situation.  Be sure to install a reliable and secure adware and spyware cleaner in your system to remove existing security and privacy risks as well as preventing future hassle.    
Read Full Post ►

Test Post With Image : The Difference of Adware, Spyware and Anti-virus



Adware, spyware and computer virus share some similarities, one of which is that all three are major nuisances for computer users. Let's differentiate the three.

Spyware is software that does not intentionally harm your computer. What they do is that they create pathways wherein someone else aside from the computer owner can communicate with the computer. Normally spywares record the various types of web sites you visit which are later used by web advertisers to allow them to send you unwanted emails and pop-ups.

This is why spyware are usually frowned upon and greatly avoided. They are more intrusive than adware. Spyware have their own separate executable programs which allow them to record your keystrokes, scan files on your hard disks and look at other applications that you use including but not limited to chat programs, cookies and Web browser settings.

The spyware then will send the information that it had gathered to the spyware author. The agent will then use this information for advertising and marketing purposes. They even sell the information to advertisers and other parties.

Adware, on the other hand, are more legitimate form of freeware. Similar to spyware, adwares are advertising materials which are packaged into a software or program and are installed automatically once that particular program or software is added into the computer system. Some forms of adware, on the other hand, download advertising contents as a particular application is being utilized. It is quite unfortunate that most of the adware programs take the form of spywares that is they track and report user information to program authors.

Some signs of spyware infections include pop-up ads that seem to be not related to the site you are viewing. More often than not, spyware pop-ups are advertisements about adult contents. Also if you notice your computer slowing down, there's a big chance that spywares and its other components have found their way in your operating system. When the Windows desktop also takes a longer time to load, its best to scan your computer for possible spyware infections.

Meanwhile, viruses are destructive form of software. They were purely designed and created for one purpose alone: to wreck havoc to your computer. They destroy whatever they come in contact to and will initiate self replication and infect as many components of the computer's operating system or network as possible.

Nowadays, a lot of anti-virus software also provides spyware and adware scanning and removal utilities. Some programs, however, are focused on located and deleting or destroying spyware and adware programs. Whether is an anti-virus software or a anti-spyware dedicated scanner, they both search your computer and identify any spyware and virus installed on your system.

They then remove it as well as their components located in the system registry among other places in your computer. It is therefore, good to regularly update your virus or spyware scanner to ensure that your computer is protected from the thousands of spyware and viruses in the internet. Never be fooled from ads that claim that their products only contain adware.

These adware maybe spyware in disguised and are just waiting to be deployed for them to gather your information. Learn to setup firewall systems and always block pop-up blockers to minimize computer infection and ensure the security of all your computer files.
Read Full Post ►
 
Design by: Oemar | from Lembar Coretan
Smurfin Blogger Template | Sponsored by | nowGoogle.com adalah Multiple Search Engine Popular