Selasa, 16 Agustus 2011

Tips : Kopi Kurangi Resiko Kanker Kulit



Tips : Kopi Kurangi Resiko Kanker Kulit
Ada berita gembira bagi para penggemar kopi. Berdasarkan sebuah penelitian di Amerika Serikat, kopi menunjukkan tanda dapat mengurangi resiko kanker kulit dengan membantu membunuh sel-sel yang rusak yang berpeluang dapat berubah menjadi tumor.

Temuan yang diterbitkan pada Senin itu, menunjukkan bahwa minum kafein secara wajar, atau bahkan menggunakan kopi di kulit, dapat berguna dalam menangkal kanker non-melanoma, diagnosis kanker kulit yang paling sering.

Dengan menggunakan tikus yang secara genetik telah dipengaruhi untuk menekan produksi enzim protein, ATR, dalam tubuhnya, para peneliti membuktikan bahwa tikus itu mampu menangkis kanker bahkan

bila terkena sinar ultraviolet.

Penelitian sebelumnya telah menyarankan bahwa minum sekitar satu cangkir kopi berkafein per hari memiliki efek menekan ATR dan memicu kematian sel yang rusak oleh sinar UV.

Tikus itu pada akhirnya menderita kanker, namun itu terjadi setelah tiga pekan, dibandingkan dengan tikus yang normal, menurut penelitian yang diterbitkan dalam Laporan Akademi Ilmu Pengetahuan Nasional.

Setelah 19 pekan terpapar sinar ultraviolet, tikus yang direkayasa itu menunjukkan 69 persen lebih sedikit tumor dan empat kali lebih sedikit tumor invasif dibandingkan kelompok normal.

Namun, efek perlindungan hanya selama itu, setelah lebih dari 34 pekan terpapar sinar ultra violet, seluruh tikus menderita tumor.

"Akhirnya, jika anda memamar mereka dengan sinar ultra violet cukup lama, semua tikus akan menderita kanker sehingga hal itu tidak 100 persen memberikan perlindungan selamanya," kata Allan Conney, salah satu penulis, kepada AFP.

"Sungguh, dengan hampir semua jenis karsinogen, pada akhirnya semua hewan akan menderita tumor," kata Conney, yang merupakan direktur dari Laboratorium Penelitian Kanker Susan Lehman Cullman di Universitas Rutgers, New Jersey.

Conney dan timnya mampu mengkonfirmasi hipotesis mereka bahwa kafein -ketika dikonsumsi atau dioleskan pada kulit - bekerja dengan cara menghambat ATR. Sekarang mereka mengatakan bahwa penelitian lebih lanjut diperlukan untuk melihat bagaimana teori yang sama mungkin dapat juga bekerja pada manusia.

"Kami ingin melihat apakah kafein memiliki efek pada manusia bila diberikan secara berkala," katanya.

"Kafein mungkin menjadi senjata dalam pencegahan karena mampu menghambat ATR dan juga bertindak sebagai tabir surya serta langsung menyerap sinar UV yang merusak."


Kanker kulit adalah kanker paling umum di Amerika Serikat, dengan lebih dari satu juta kasus baru setiap tahun, menurut Institut Kanker Nasional.

Kanker kulit jenis non-melanoma, termasuk jenis sel basal dan sel skuamosa, adalah jenis kanker kulit yang paling sering didiagnosis dan sering dapat diobati jika terdeteksi di tahap awal.

Penelitian sebelumnya telah menunjukkan peminum kopi cenderung memiliki resiko lebih rendah menderita kanker payudara, rahim, prostat dan usus besar, namun efek yang bermanfaat tidak terlihat pada orang yang minum kopi tanpa kafein.

Ramadhan : Penyebab Terbanyak Batal Puasa

Penyebab Terbanyak Batal Puasa

Penyebab seseorang membatalkan puasanya bisa bermacam-macam. Salah satu penyebab utama orang batal puasa pada pekan pertama Ramadan 1432 Hijriah adalah sakit perut.

Demikian disampaikan Ahli penyakit dalam dari Rumah Sakit Cipto Mangunkusumo (RSCM) Jakarta, Dr dr H Ari Fahrial Syam SpPD-KGEH MMB, di Jakarta belum lama ini.

"Berdasarkan survei di RSCM dan beberapa rumah sakit swasta, hampir 70 persen kasus orang batal puasa pada minggu pertama Ramadan karena sakit perut yang disertai diare. Penyebabnya karena faktor makanan dan lingkungan, faktor kebersihan tangan baik orang yang mengkonsumsi dan orang yang menyiapkan makanan," ujar Ari Fahrial Syam, yang merupakan Spesialis Penyakit Dalam dan Gastroenterologist.

Menurut dia berpindahnya satu bakteri dari satu tempat ke tempat lain dipengaruhi oleh kebersihan tangan kita. Karena itu sangat penting untuk memiliki kebiasaan sehat berupa cuci tangan pakai sabun terutama saat ingin mengonsumsi makanan.

"Mencuci tangan pakai sabun merupakan salah satu cara yang efektif untuk memutus rantai penyebaran penyakit yang disebabkan oleh kuman," lanjut Ari yang juga merupakan Ketua Bidang Advokasi Pengurus Besar Perhimpunan Ahli Penyakit Dalam Indonesia (PB PAPDI).

Penelitian telah membuktikan bahwa cuci tangan dengan menggunakan sabun akan menurunkan angka kejadian diare yang cukup signifikan, seperti hasil studi penelitian oleh Curtis V. Cairncross, yang menunjukkan cuci tangan pakai sabun dapat menurunkan risiko diare hingga 47 persen.

Ia menganjurkan umat Islam yang sedang berpuasa supaya menjaga kebersihan tangan bebas dari kuman agar tetap sehat. "Mereka tahu bahwa cuci tangan pakai sabun sebelum buka puasa dan sahur itu penting, tetapi tanpa disadari ketika waktu sahur dan berbuka tiba mereka terburu-buru mengambil makanan dan lupa cuci tangan. Padahal tangan kotor dan akhirnya terinfeksi penyakit dan tidak bisa beribadah dengan baik," jelasnya.

Ramadhan : Nutrisi Penunjang Puasa



Ramadhan : Nutrisi Penunjang Puasa
Para pakar gizi menyatakan seseorang tetap aktif atau menjadi lamban saat berpuasa sangat bergantung pada jenis dan jumlah asupan makanan yang dikonsumsinya. Untuk mencegah kelelahan saat puasa dan badan tetap aktif tanpa kehilangan banyak energi, para pakar diet dan gizi merekomendasikan pola makan seimbang.

"Untuk mengatasi kecenderungan tubuh yang melamban dan malas, seseorang perlu mengonsumsi makanan ringan namun berenergi tinggi ketika berbuka puasa," kata Mahat Mohammed, seorang ahli gizi.

Para pakar gizi menganjurkan makanan padat energi dalam menu, terutama saat berbuka dan sahur. Makanan itu bisa berupa kurma, bubur oatmeal, jus buah segar dan juga karbohidrat seperti beras atau pasta. Dan jangan lupakan susu.

Berkaitan dengan jam puasa yang panjang di beberapa negara, karbohidrat kompleks atau jenis makanan yang lambat dicerna sebaiknya dikonsumsi saat ahur sehingga makanan tersebut bertahan lama dalam tubuh (sekitar delapan jam). Dengan demikian mereka yang berpuasa tak terlalu merasa lapar saat siang.

Sebagian besar pakar merekomendasikan sahur ringan dengan mengombinasikan beberapa jenis makanan seperti gandum, oats, semolina, kacang, lentil, gandum utuh dan beras.

Selain persoalan asupan, dehidrasi juga salah satu penyebab yang menjadikan kinerja dan aktivitas tubuh menurun saat puasa. Saat musim kemarau, tingkat dehidrasi yang dialami bisa kian memburuk, terlebih bagi mereka yang diharuskan bekerja di luar ruangan ketika matahari bersinar terik.

Menurut ahli nutrisi dehidrasi juga bergantung pada seberapa banyak seseorang minum sebelum puasa, aktivitas fisik dan efisiensi kerja organ tubuh seperti ginjal.

"Cukup minum air dan jus buah saat buka puasa dan sebelum sahur sangat dianjurkan. Pola ini dapat mencegah dehidrasi sekaligus detoksifikasi sistem pencernaaan," jelas Mahat.

"Sebisa mungkin anda harus menghindari olahraga berat, menghindari makanan karbohidrat olahan dan aktivitas yang menyerap banyak energi, seperti berargurmen dengan seseorang," imbuhnya.

Selain itu mereka yang berpuasa dianjurkan menghindari makanan penghasil gas lambung, seperti mengudap kacang-kacangan di malam hari, makanan tinggi lemak, makanan olahan dan makanan siap saji. Lalu menu yang berisiko memperparah dehidrasi seperti soda, gorengan dan makanan berbumbu pedas.

Es Kutub Utara Meleleh Lebih Cepat



Es Kutub Utara Meleleh Lebih Cepat
Perhitungan PBB mengenai masa leleh es Kutub Utara bisa jadi salah. Ilmuwan MIT perkirakan es Kutub Utara akan meleleh 4 kali lebih cepat.

Ilmuwan Massachusetts Institute of Technology (MIT) membantah penyataan Perserikatan Bangsa-bangsa mengenai perubahan iklim, yang menyebutkan bahwa es Kutub Utara akan habis meleleh pada 2100. Seperti dilansir International Business Times, menurut prediksi MIT, es di Kutub Utara akan meleleh dengan laju empat kali lebih cepat daripada yang dilaporkan PBB.

Pierre Rampal dari departmen Earth, Atmosphere and Planetary Sciences, MIT, mengingatkan, prediksi ini mungkin berbeda-beda dengan kenyataan di berbagai tempat, karena ada perbedaan data pada model Intergovernmental Panel on Climate Change (IPCC) dengan fakta sebenarnya, sehingga prediksi itu tidak akurat.

Data tersebut memprediksi dengan menggunakan variabel perubahan temperatur. Jadi laporan PBB melupakan keberadaan variabel dorongan mekanis dalam pengukuran waktu leleh es. Dorongan mekanis yang dimaksud misalnya arus angin yang menerpa es serta gelombang laut yang dapat menghantam dinding es. Seiring perubahan suhu yang terjadi berulang-ulang, es juga akan jadi lebih rapuh, sehingga es jadi lebih cepat meleleh.

Saying no to Encrypted Web Pages in Internet Explorer

Saying no to Encrypted Web Pages in Internet Explorer

If you manage your finances or shop online, then you have probably had experience with using secure Web connections, otherwise known as SSL. These secure connections encrypt the data that is transferred from a Web server to your computer. Once the data gets to your computer, your browser has a special key that decrypts the information and displays it on your computer. During this process, when the file is decrypted, it is saved in the Temporary Internet Files
directory so that the browser can display it.

This default appears to be harmless because the Web page is only saved on your computer. If no one has remote access to your computer, the data would be safe, right? Not necessarily, because your data is now vulnerable to anyone who has physical local access to your computer. If that person is clever and lucky enough, he or she can sort through your Temporary Internet Files directory to find confidential information, such as your online banking information. All of this information is saved by default on your hard drive for anyone to look at. They do not even need to know your password or even log into your account on the bank's Web site, because a snapshot of the Web page is stored locally on your computer.

What can you do to protect your computer from this vulnerability besides setting up better computer security such as complex passwords? There is a cool feature of Internet Explorer that you just have to turn on that will eliminate the problem completely. Simply called Do Not Save Encrypted Pages to Disk, this feature, when enabled, will solve your problems. To enable it, follow these steps:

1. Open Internet Explorer.

2. Click Tools and select Internet Options.

3. Then, select the Advanced tab.

4. Scroll down through the list toward the bottom of the window until you see the Security section.

5. Locate Do Not Save Encrypted Pages to Disk, and check the box to the left of it.

6. Click OK to save and activate your changes.

Now you will no longer have to worry about pages that were encrypted being saved to your drive for anyone who has access to your computer to see.

Tags : Saying no to Encrypted Web Pages in Internet Explorer, Internet Explorer

Clearing temporary Internet files and cookies

Clearing temporary Internet files and cookies

Every time you visit a Web site, the files for the Web page, such as the HTML and the images, are downloaded and stored in a temporary directory known as Temporary Internet Files. Over time, this directory can become full of images and HTML from various Web sites that you have visited. This directory can end up taking up a lot of space on your hard drive. Additionally, a user can browse your Temporary Internet Files directory and find out exactly what site you have been visiting just as if they were looking at your browser history. If you are concerned about your privacy, or just concerned about disk space, then clearing the Temporary Internet Files is a must.

Cookies are another item that is created on your computer when you visit a Web site. Contrary to popular belief, cookies are really not that bad. Most Web sites use them to save user data to a browser. One example of this is site preferences or automatic logon when you visit a Web site. The Webmaster of the Web site can detect if their Web site has already given you a cookie that has your user ID stored in it. If it finds one, then it knows exactly who you are and logs you on automatically. Advertisers also use cookies to store personal data. Instead of showing you the same advertisement 50 times, they use cookies to keep track of how many times an advertisement is displayed on your screen.

A common myth about cookies is that they allow Web sites to track other sites you visit. That is just not true. The only cost of having cookies on your computer is a privacy concern for local users. Any user that has physical access to your computer can browse to the directory that the cookies are stored and view what Web sites you visit because the cookies are named after the Web site that instructed your browser to put them on your computer.

Clearing the Temporary Internet Files and removing the cookies is a very simple task. Just follow these steps to clear these files:

1. Open up another copy of Internet Explorer.

2. Click Tools and then select Internet Options.

3. Under the Temporary Internet Files section, click the Delete Files button.

4. You will be prompted to confirm if you would also like offline files to be deleted. For maximum privacy, check the box and Click OK.

5. Once the files are erased, you will be shown the Internet Options screen again. Taking care of the cookies for your privacy is just as easy. Just click the Delete Cookies button.

6. Click OK on the confirmation screen.

7. Select OK once more to close Internet Options and you are done.

Now users will no longer be able to see what Web sites you visit from the cookies and Temporary Internet Files that are stored on your computer. Additionally, you will have freed up some disk space by deleting these files.

Tags : Clearing temporary Internet files and cookies, Internet

Clearing visited Web sites history


Clearing visited Web sites history

Internet Explorer, by default, is configured to record all of the Web sites that you visit for a 30-day period. If you are concerned about your privacy, your browsing history should be cleaned frequently and history settings configured best for privacy. Doing so will ensure that any user of your computer will not be able to easily see what you have been doing. Keep in mind, however, that if you get rid of the browser history, you will eliminate the ability to use the history to go back to Web sites for which you might have forgotten the URL.

That use is really the only reason I can think of that makes the browser history useful. If you can live without that convenience, then follow these steps to clear your history from your PC:

1. Open up a copy of Internet Explorer by using either the icon on the desktop or on the Start panel.

2. Once Internet Explorer is open, click the Tools menu bar item and select Internet Options.

3. Then, just click the Clear History button.

4. Your history will now be cleared. Because you still have Internet Options open on your screen, adjust the amount of days that your browsing history is stored.

5. As mentioned earlier, the default setting for this value is normally 30 days. Highlight the number in the days to keep pages in history box and type in 0 to maximize your privacy.

6. Then, click OK to save your changes and exit the Internet Options screen.

After you have cleared your browser history and modified the history setting, your privacy will be much easier to protect.

Tags : Clearing visited Web sites history, Web Sites

Locking down Internet Explorer

Locking down Internet Explorer

Now that you have removed all of the spyware and adware on your computer, let's turn off certain features of Internet Explorer so that you will be less likely to accidentally install more spyware. To get started, change the ActiveX install settings to prevent any new ActiveX apps to be installed. Follow these steps to change this setting:

1.Open Internet Explorer.

2.Click the Tools menu bar item and select Internet Options.

3.Click the Custom Level button on the Security tab.

4.Locate Download Signed ActiveX Control at the top of the list and select Disable.

5.Click OK and click Yes on the confirmation screen.

6.Select OK once more to close Internet Options.

A change in this setting can prevent you from installing new ActiveX controls from all Web sites, good and bad. If you ever run into some problem with a Web site not loading correctly, just re-enable this setting and try the site again.

Tags : Locking down Internet Explorer, Internet Explorer

Using WPA for a more secure wireless connection


Using WPA for a more secure wireless connection

Wi-Fi Protected Access, or WPA, is a new, improved security standard for wireless connections. WPA has addressed the weaknesses of WEP; it was developed to create a viable alternative to WEP that is more secure than that standard. The fundamentals are the same between the standards, but WPA has improved some of the various mechanisms that plagued WEP. For example, encryption keys are now dynamic and change often automatically. Additionally, the complexity of the encryption key has also been increased to help fight off users who try to derive a key from data that they capture. One of the largest improvements in WPA is the addition of authentication to the wireless connection. Now, users have to have the right encryption settings, as well as a valid username and password, to gain access to the network.

This new standard is just starting to gain momentum. Microsoft has released a special patch for Windows XP that adds this new standard to Windows. However, installing the patch will not allow you to use this new standard. Just as with WEP, WPA is programmed into the firmware of the hardware components. In order to use WPA, you must have hardware that specifically supports it. Currently, only a few companies offer base stations and wireless adapters that support this new method of security. However, that will change in time.

The next time you are considering purchasing a wireless base station and adapter, do some research and pick one that supports WPA to ensure that your wireless communications will not be decrypted and your privacy is secure.

Tags : Using WPA for a more secure wireless connection, Network Security, Wireless Connection

Using WEP for secure communication

Using WEP for secure communication

Wired Equivalent Privacy, or WEP, is the first security standard for wireless networks. The basic concept for WEP security is to encrypt the data that is sent back and forth between the access point and the client adapter. This is done using various degrees of encryption strength. A special key, known as the encryption key, is used by computers to connect to a WEP-protected wireless network. This allows the client computer's adapter to be able to decrypt and also send
encrypted messages in the same language as the base station.

This standard sounds like a great way to secure a wireless network. However, it presents some flaws. The largest one is that the whole system relies on just one key. If someone's laptop is stolen that is part of a corporate network, the encryption key must be changed for the base station and for all of the other computers using the wireless connection. This change is necessary because the current encryption key could be easily extracted from the system settings.
Additionally, someone can potentially derive the encryption key by carefully analyzing the data they intercepted.

If you have a wireless base station, I highly recommend that you enable WEP to protect your home. Setting up WEP is different on every set of hardware, but the following are the basics:

1. Connect to your base station setting remotely using your Web browser. This address and port number varies, but usually is http://192.168.1.1 or http://192.168.2.1. Often, the port number is changed to 8080 so people donÕt think you have a Web server running. In that case, try http://192.168.1.1:8080 or http://192.168.2.1:8080.

2. Once you connect, you usually are asked for a password. For all Linksys hardware, the Username field is left blank and the password is admin. Other hardware manufacturers use some sort of a variation of the above. It also would be a good idea to change the password to something other than admin when you are working in the administration settings.

3. Locate the WEP settings and specify the encryption strength in bits. Then, come up with an encryption key and type that in. Write down your encryption key and strength for use in step 5.

4. Save your changes. You can now close the Web administration site.

5. The last part of setting up WEP is configuring the client computers that will connect to the base station. Once again, this information varies, depending on your wireless card. Consult the manual for your card to find out how to set up your card to use WEP.

Setting up WEP will greatly increase the security of your wireless network. Even though there are some flaws, it is much better than using no protection at all. It has the same effect as a car alarm. If a burglar has to choose between a car that clearly has an alarm or one that doesn't, which one will they choose to break into?

Tags : Using WEP for secure communication, Network Security

Disabling Messenger Service


Disabling Messenger Service

Microsoft has included a service in the last few versions of Windows that allows system administrators to send pop-up messages to all computers on a local network. This service can be an invaluable resource for administrators who want to get the word out about some upcoming server maintenance. For example, end users would see a message pop up on their screens that notifies them that the work group file server will be inaccessible for the next hour while routine maintenance is performed.

This is a great service n when it is used correctly. Unfortunately, the Messenger Service has been abused. Just because any user can send messages to the entire work group doesn't mean that she or he should. This capability is sometimes not a good thing. Users that are part of large local area network, such as just about every Internet user, can send out a mass message to all users in the same subnet. As you can imagine, some users that know how to use the service have started to
abuse it by sending spam to all the users in their same subnet. Nowadays, you may get spam not only in your inbox but also in a pop-up window that could appear at any time.

The Messenger Service, just like any other service or program that is accessible to the outside world, increases your security risk. Although there is currently not an exploit for the Messenger Service that allows remote users to execute commands on your computer, who knows what the future will hold? To be safe, it is best to just disable this service. You will also be cutting down on a new type of spam.

Disabling the Messenger Service can be done by using the Service Manager. Follow these steps to get started:

1. Click the Start button and select Run.

2. Key in services.msc in the box and click OK.

3. The Services Manager will load. Scroll though the list and right-click Messenger and select Properties.

4. Change the Startup Type to Disabled.

5. Click the Stop button and then click OK to save your changes.

Now the Messenger Service is one less thing to worry about. You can kiss the annoying pop-up text ads goodbye and also reduce your risk for an attack in the future.

Tags : Disabling Messenger Service, Messenger

Disabling Remote Desktop connection

Disabling Remote Desktop connection

The Remote Desktop feature of Windows XP is a great way to be able to access your
computer when you are away from the office or home. However, if you have poor computer security, the Remote Desktop also is a great way for anyone to be able to access and control your whole computer. Remote Desktop is a very risky application to leave exposed to the world. Its security relies solely on your account password, which for most users is easy to guess.

If you do not use Remote Desktop, then it would be a good idea to disable the feature. Doing so is a snap. Just follow these steps to turn it off:

1. Right-click the My Computer icon on the desktop or in the Start Menu and select
Properties.

2. Click the Remote tab to expose the remote access settings.

3. Next, uncheck the box under Remote Assistance.

4. Uncheck the box under Remote Desktop as well.

5. Click OK to save your changes.

When Remote Desktop connections are disabled, you have one less thing to worry about namely, someone having the ability to break into your computer.

Tags : Disabling Remote Desktop connection, Remote Desktop

Configuring Windows firewall


Configuring Windows firewall

Configuring the firewall to allow certain programs to work through it is not always the best thing to do, because it will expose your computer more to the outside world and increase your risk of getting infected with something. However, in the short term or for an application that you must use, you can make it work through the firewall. In the original version of the firewall, the only possibility was to specify a port number to open. Now, it is much easier to make an application work though the firewall. Instead of typing in a port number, users can just select the program on their computer that they want to have accessed through the firewall.

This capability makes the firewall configuration much more user-friendly. Additionally, in Service Pack 2, Microsoft left in the old way to open up the firewall manually by entering in a port number, so that users still have total control if they really want it. The end result of these two methods is the same; the only difference is the ease of use for less experienced Windows XP users.

Using the new feature to open up holes in the firewall is pretty cool. Follow these steps to open up the firewall for a specific application:

1. Open up Network Connections again by clicking the Start Menu and selecting Run. Then, type firewall.cpl in the box and click OK.

2. When the Windows Firewall settings window loads, click the Exceptions tab.

3. You will see a list of all of the different exceptions that are currently enabled, as signified by the check in the box. By default, a few applications will be enabled. I recommend that you uncheck all of the entries unless you use them. If not, then you are just taking an unnecessary risk by leaving those doors open.

4. If you want to add an application to the exception list so that it will be able to accept connections and data from the outside world, such as an Instant Message program that wants to receive files from other users, just click the Add Program button.

5. Select the name of the program from the list or click the Browse button on the Add a Program window to select the executable of the application that you want to open to the world.

6. When you are finished selecting the program that you want to be able to access through the firewall, click OK and it will appear on the list.

7. Now that the program is on the list, just check the box next to the name to open up the firewall for the application.

8. Click OK to activate your new firewall settings.

Windows Firewall also includes settings on how you want your computer to respond when several different standard Internet messages are sent to it. For example, one setting you can specify is the ping command, which is a network command used to estimate turnaround time between sending data to a computer and receiving a response. All of these settings are found on the Advanced tab by clicking the Settings button under the ICMP section. The screen is pretty straightforward. If you want your computer to have a stealth presence on the Web, as I mentioned earlier, you should uncheck all of the entries listed on the ICMP tab.

Tags : Configuring Windows firewall, Windows

Disabling Unneeded Protocols

Disabling Unneeded Protocols

With every computer comes programs installed that you do not need. As with extra programs taking up space, extra protocols are just wasting your network connection and can actually slow it down. How is this possible? By default, a few different protocols are installed on your computer to allow for maximum compatibility with other computers on a network; these protocols each require bandwidth to operate. Most users will not use too many protocols, and their computers will use up a portion of their connection as they respond and transmit information for these protocols.

Additionally, with extra protocols installed on your network adapter connected to the Internet, you increase your risk of security-related problems. One of the most common risks for broadband users is that they have the Client for Microsoft Networks networking protocol enabled on their connection. This protocol allows everyone in their neighborhood to connect to the users computers and view any files that they may be sharing. This fact alone should be a good enough reason for you to turn off the extra protocols. But with them disabled, you will also save a little bandwidth as well.

Viewing protocols on your network adapters


Viewing the protocols installed and active on your various network adapters is easy. Just follow
these quick steps and you will be viewing them in no time:

1. Right-click the My Network Places icon on the desktop or in the Start Menu and select
Properties. If the My Network Places icon is not in either of those locations, then go to the Control Panel and click the Network Connections icon that is shown under the Classic view.

2. Next, right-click the network adapter with which you want to view the network proto
cols and select Properties.

3. This will bring up a list of the protocols installed as well as active on your adapter, as
Figure 11-11 shows. The protocols that are installed but not active are indicated by the absence of a check in the checkbox.

Disabling a specific protocol


Now that you have the list of installed and active protocols on your screen, you are ready to dis
able a protocol. To do so, just click the check box to remove the check. Then click the OK button and the protocol is no longer active on the network adapter. I highly recommend that you disable all protocols except for the TCP/IP protocol (also referred to as the Internet Protocol). Doing so will optimize your adapter for speed and security.
Be aware that if you remove the Client for Microsoft Networks protocol and the file-sharing protocol, you will no longer be able to share your files. Additionally, you will no longer be able to connect to remote computers to view their shared files.

Also keep in mind that if you have multiple adapters in your machines, such as a wireless
adapter, a wired network adapter, and a dialup modem, you will have to repeat the preceding instructions for each adapter.

Tags : Disabling Unneeded Protocols, Protocols

Assigning Alternative IP Addresses

Assigning Alternative IP Addresses

One of the most common network-related delays occurs in the last moments of the system startup. The majority of computer users use dynamic network card configuration. There is nothing wrong with this feature, but under certain configurations, the user can experience delays when getting an IP address.

Every time you turn on your computer, it has to set up the IP configuration. Often, this setup can result in your computer pausing for moments during the loading process. The delay is a result of your PC waiting for the DHCP server (a DHCP server dynamically assigns addresse to computers connected to a network), which is the provider of the network information, to respond. In other situations, a user can experience a delay when a DHCP server is not present on the network.

If you use a dialup connection to the Internet, your computer will rely on getting a dynamic IP address from your service provider when you connect. When you first turn on your computer, it will search for a DHCP server to get an address for the local networking components of the operating system. This is occurring when your computer is still in the early boot stages and is not connected to your dialup ISP (Internet Service Provider). Because you are not connected to a network that has a DHCP server, such as when you are dialed up to your Internet provider, your computer may experience a delay, as the computer is searching for a DHCP server when there really is none available.

This hack will only work for users that have network cards and modems installed. It does not apply to users that just have modem connections to the Internet.

One easy solution to this problem is to assign alternative information to your network card. This task is actually pretty easy, as it does not require any major tampering. Follow these steps to specify an alternative IP configuration for your computer:

1. First, get into Network Properties. This can be accomplished by going to the Control Panel through the Start Menu.

2. Once you are in the Control Panel, make sure that you are in the Classic View,
and open Network Connections. If you are not in Classic View, just click the button on the left that states Switch to Classic View.

3. Now that you are in the Network Connections window, you will see a list of network adapters on your computer. Right-click the icon to which your network connection is hooked up and select Properties.

4. Doing so will launch a new window that lists the different protocols installed on the network card. Click the Internet Protocol (TCP/IP) to select it. Then click the Properties button.

5. Once the Internet Protocol (TCP/IP) Properties window is displayed, click the
Alternative Configuration tab. This is where you will have to enter in your data.

6. First, you will have to click the User Configured radio button to allow the text boxes to be edited.

7. Next, type in an IP address for your computer that will be used for the sake of speed in the event that your computer cannot get a DHCP address because you are using a dialup Internet connection. I recommend you use 192.168.1.X. Replace X with any unique number for each computer between 2 and 254. The exact IP address numbers that you choose do not matter. You just want to have a valid IP address filled in so that your

computer does not waste too much time looking for a DHCP address when there is no DHCP server giving out the address on your network.

8. Then, type in 255.255.255.0 as your Subnet Mask.

9. Your Default Gateway should be set to 192.168.1.1 because that is a valid gateway address. As I mentioned earlier, the exact numbers do not matter. We just want to have the computer assign some value instead of spending time searching when it will not find a DHCP server.

10. Then, enter in what your DNS servers should be. You can ask your ISP what they should be. But this information really isn't essential, as this configuration will almost never be used to connect to the Internet. It is just a default fallback in the rare case that you are having networking trouble. Feel free to leave these fields blank, as well as the WINS fields.

11. Click the OK button and then click the OK button for the network properties screen.

That's it; you are now finished.

Tags : Assigning Alternative IP Addresses, IP Address

short names long meaning

short names long meaning

A ---
ADSL - Asymmetric Digital Subscriber Line
AGP - Accelerated Graphics Port
ALI - Acer Labs, Incorporated
ALU - Arithmetic Logic Unit
AMD - Advanced Micro Devices
APC - American Power Conversion
ASCII - American Standard Code for Information Interchange
ASIC - Application Specific Integrated Circuit
ASPI - Advanced SCSI Programming Interface
AT - Advanced Technology
ATI - ATI Technologies Inc.
ATX - Advanced Technology Extended

B ---
BFG - BFG Technologies
BIOS - Basic Input Output System
BNC - Barrel Nut Connector

C ---
CAS - Column Address Signal
CD - Compact Disk
CDR - Compact Disk Recorder
CDRW - Compact Disk Re-Writer
CD-ROM - Compact Disk - Read Only Memory
CFM - Cubic Feet per Minute (ft�/min)
CMOS - Complementary Metal Oxide Semiconductor
CPU - Central Processing Unit
CTX - CTX Technology Corporation (Commited to Excellence)

D ---

DDR - Double Data Rate
DDR-SDRAM - Double Data Rate - Synchronous Dynamic Random Access Memory
DFI - DFI Inc. (Design for Innovation)
DIMM - Dual Inline Memory Module
DRAM - Dynamic Random Access Memory
DPI - Dots Per Inch
DSL - See ASDL
DVD - Digital Versatile Disc
DVD-RAM - Digital Versatile Disk - Random Access Memory

E ---
ECC - Error Correction Code
ECS - Elitegroup Computer Systems
EDO - Extended Data Out
EEPROM - Electrically Erasable Programmable Read-Only Memory
EPROM - Erasable Programmable Read-Only Memory
EVGA - EVGA Corporation

F ---
FC-PGA - Flip Chip Pin Grid Array
FDC - Floppy Disk Controller
FDD - Floppy Disk Drive
FPS - Frame Per Second
FPU - Floating Point Unit
FSAA - Full Screen Anti-Aliasing
FS - For Sale
FSB - Front Side Bus

G ---
GB - Gigabytes
GBps - Gigabytes per second or Gigabits per second
GDI - Graphical Device Interface
GHz - GigaHertz

H ---
HDD - Hard Disk Drive
HIS - Hightech Information System Limited
HP - Hewlett-Packard Development Company
HSF - Heatsink-Fan

I ---
IBM - International Business Machines Corporation
IC - Integrated Circuit
IDE - Integrated Drive Electronics
IFS- Item for Sale
IRQ - Interrupt Request
ISA - Industry Standard Architecture
ISO - International Standards Organization

J ---
JBL - JBL (Jame B. Lansing) Speakers
JVC - JVC Company of America

K ---
Kbps - Kilobits Per Second
KBps - KiloBytes per second

L ---
LG - LG Electronics
LAN - Local Area Network
LCD - Liquid Crystal Display
LDT - Lightning Data Transport
LED - Light Emitting Diode

M ---
MAC - Media Access Control
MB � MotherBoard or Megabyte
MBps - Megabytes Per Second
Mbps - Megabits Per Second or Megabits Per Second
MHz - MegaHertz
MIPS - Million Instructions Per Second
MMX - Multi-Media Extensions
MSI - Micro Star International

N ---
NAS - Network Attached Storage
NAT - Network Address Translation
NEC - NEC Corporation
NIC - Network Interface Card

O ---
OC - Overclock (Over Clock)
OCZ - OCZ Technology
OEM - Original Equipment Manufacturer

P ---
PC - Personal Computer
PCB - Printed Circuit Board
PCI - Peripheral Component Interconnect
PDA - Personal Digital Assistant
PCMCIA - Peripheral Component Microchannel Interconnect Architecture
PGA - Professional Graphics Array
PLD - Programmable Logic Device
PM - Private Message / Private Messaging
PnP - Plug 'n Play
PNY - PNY Technology
POST - Power On Self Test
PPPoA - Point-to-Point Protocol over ATM
PPPoE - Point-to-Point Protocol over Ethernet
PQI - PQI Corporation
PSU - Power Supply Unit

R ---
RAID - Redundant Array of Inexpensive Disks
RAM - Random Access Memory
RAMDAC - Random Access Memory Digital Analog Convertor
RDRAM - Rambus Dynamic Random Access Memory
ROM - Read Only Memory
RPM - Revolutions Per Minute

S ---
SASID - Self-scanned Amorphous Silicon Integrated Display
SCA - SCSI Configured Automatically
SCSI - Small Computer System Interface
SDRAM - Synchronous Dynamic Random Access Memory
SECC - Single Edge Contact Connector
SODIMM - Small Outline Dual Inline Memory Module
SPARC - Scalable Processor ArChitecture
SOHO - Small Office Home Office
SRAM - Static Random Access Memory
SSE - Streaming SIMD Extensions
SVGA - Super Video Graphics Array
S/PDIF - Sony/Philips Digital Interface

T ---
TB - Terabytes
TBps - Terabytes per second
Tbps - Terabits per second
TDK - TDK Electronics
TEC - Thermoelectric Cooler
TPC - TipidPC
TWAIN - Technology Without An Important Name

U ---
UART - Universal Asynchronous Receiver/Transmitter
USB - Universal Serial Bus
UTP - Unshieled Twisted Pair

V ---
VCD - Video CD
VPN - Virtual Private Network

W ---
WAN - Wide Area Network
WTB - Want to Buy
WYSIWYG - What You See Is What You Get

X ---
XGA - Extended Graphics Array
XFX - XFX Graphics, a Division of Pine
XMS - Extended Memory Specification
XT - Extended Technology

Tags : short names long meaning, Short Names

Maximize Dial-up Modem Settings

Maximize Dial-up Modem Settings

Did you know that by changing a few settings you can make your dial-up modem run better? That's right you might have a fast modem and a good connection, but you are not getting the best performance. With a few adjustments, you can get faster connection speeds.

NOTE: Since every PC configuration is different, these adjustments might not work for everyone.

With Windows 95, 98 & ME you'll need to open your Control Panel ( Start / Control Panel ). Click "System" then choose "Device Manager". Open up "Ports", highlight your modem port (should be COM2), and choose "Properties" near the bottom. When you click "Port Settings", you will see the modem speed listed under "Bits per second".

With Win XP , just hold down the Alt key and double-click "My Computer" to bring up System Properties. Click the "Hardware" tab, then choose the "Device Manager" button. Scroll down to "Modems" and click the little (—) to show your modem, then double click it.

Selecting the "Modem" tab will allow you to adjust the port speed.

Usually, the Maximum Port Speed is on the highest setting (115,000 bps), but sometimes you will find it on a slower default of 9600 bps. If you have a 56k modem, you can crank it up to the maximum setting without any trouble (in most cases). If you live in a cave and have a 28k modem, then the fastest you can do is 57,600 bps.

Win 9x users should also adjust the "Flow Control" near the bottom. The default for this is usually Xon/Xoff which is the software control—change this to "Hardware" if you want to get the most from your modem. Next, click the "Advanced" button to adjust the Receiver Buffer to its highest setting (all the way to the right). If you run into any problems, just turn this one back to the 2/3 setting.

To check/adjust the Receive-Transmit buffers in XP, click the "Advanced" tab of your modem properties then choose the "Advanced Port Settings" button. Make sure that both are set to their highest settings.

There are many more tweaks that can be done in the registry, but the potential for disaster is too high for the average user. Some folks install dial-up accelerators, which basically tweak these registry settings for you and perform other routines to optimize performance.

Just by changing these few settings, though, you should see better performance.

Tags : Maximize Dial-up Modem Settings, Dial-Up

Advanced Google Search

Advanced Google Search


Google is clearly the best general-purpose search engine on the Web.But most people don’t use it to its best advantage or in an advanced way. Do you just plug in a keyword or two and hope for the best? That may be the quickest way to search, but with more than 3 billion pages in Google’s index, it’s still a struggle to pare results to a manageable number. There are some ways in which advanced Google search can be used to get the desired results.

But Google is an remarkably powerful tool that can ease and enhance your Internet exploration. Advanced Google search options go beyond simple keywords, the Web, and even its own programmers. Let’s look at some of the advanced Google search options.

Syntax Search Tricks
Using a special syntax is a way to tell Google that you want to restrict your searches to certain elements or characteristics of Web pages.Here are some advanced Google search operators that can help narrow down your search results.
1.Intitle: at the beginning of a query word or phrase restricts your search results to just the titles of Web pages.

2.Intext: does the opposite of intitle:, searching only the body text, ignoring titles, links, and so forth. Intext: is perfect when what you’re searching for might commonly appear in URLs. If you’re looking for the term HTML, for example, and you don’t want to get results such as
www.tipsz.blogspot.com/
you can enter intext:html

3.Link: lets you see which pages are linking to your Web page or to another page you’re interested in. For example, try typing in
link:http://www.tipsz.blogspot.com/

3.site: (which restricts results to top-level domains) with intitle: to find certain types of pages. For example, get scholarly pages about Mark Twain by searching for intitle:”Mark Twain”site:edu. Experiment with mixing various elements; you’ll develop several strategies for finding the stuff you want more effectively. The site: command is very helpful as an alternative to the mediocre search engines built into many sites.

Swiss Army Google

Google has a number of services that can help you accomplish tasks you may never have thought to use Google for. For example, the new calculator feature
(www.google.com/help/features.html#calculator) lets you do both math and a variety of conversions from the search box. For extra fun, try the query “Answer to life the universe and everything.”

Suppose you want to contact someone and don’t have his phone number handy. Google can help you with that, too. Just enter a name, city, and state. (The city is optional, but you must enter a state.) If a phone number matches the listing, you’ll see it at the top of the search results along with a map link to the address. If you’d rather restrict your results, use rphonebook: for residential listings or bphonebook: for business listings. If you’d rather use a search form for business phone listings, try Yellow Search

(www.buzztoolbox.com/google/yellowsearch.shtml).
Let Google help you figure out whether you’ve got the right spelling—and the right word—for your search. Enter a misspelled word or phrase into the query box (try “thre blund mise”) and Google may suggest a proper spelling. This doesn’t always succeed; it works best when the word you’re searching for can be found in a dictionary. Once you search for a properly spelled word, look at the results page, which repeats your query. (If you’re searching for “three blind mice,” underneath the search window will appear a statement such as Searched the web for “three blind mice.”) You’ll discover that you can click on each word in your search phrase and get a definition from a dictionary.

Extended Googling
Google offers several advanced services that give you a head start in focusing your search. Google Groups (http://groups.google.com/)

indexes literally millions of messages from decades of discussion on Usenet. Google even helps you with your shopping via two tools: FroogleCODE(http://froogle.google.com/),

which indexes products from online stores, and Google CatalogsCODE(http://catalogs.google.com/),

which features products from more 6,000 paper catalogs in a searchable index. And this only scratches the surface. You can get a complete list of Google’s tools and services at
www.google.com/options/index.html

You’re probably used to using Google in your browser. But have you ever thought of using Google outside your browser?
Google Alert
(http://www.googlealert.com/)

monitors your search terms and e-mails you information about new additions to Google’s Web index. (Google Alert is not affiliated with Google; it uses Google’s Web services API to perform its searches.) If you’re more interested in news stories than general Web content, check out the beta version of Google News Alerts
(www.google.com/newsalerts).

This advanced Google service (which is affiliated with Google) will monitor up to 50 news queries per e-mail address and send you information about news stories that match your query. (Hint: Use the intitle: and source: syntax elements with Google News to limit the number of alerts you get.)
Google on the telephone? Yup. This service is brought to you by the folks at Google Labs
(http://labs.google.com/),

a place for experimental Google ideas and features (which may come and go, so what’s there at this writing might not be there when you decide to check it out).

With Google Voice Search
(http://labs1.google.com/gvs.html),

you dial the Voice Search phone number, speak your keywords, and then click on the indicated link. Every time you say a new search term, the results page will refresh with your new query (you must have JavaScript enabled for this to work). Remember, this service is still in an experimental phase, so don’t expect 100 percent success.
In 2002, Google released the Google API (application programming interface), a way for programmers to access Google’s search engine results without violating the Google Terms of Service. A lot of people have created useful (and occasionally not-so-useful but interesting) applications not available from Google itself, such as Google Alert. For many applications, you’ll need an API key, which is available free fromCODE www.google.com/apis

Tags : Advanced Google Search, Google

Best 3 Ways online money

Best 3 Ways online money

1) Google Adsense Is a joint program via internet advertising created by Google. Ads will be shown to be an image, link units and will be paid with Pay system Every Click or Pay Per Click. Google Adsense is the advertising on the internet site of the greatest and controlled by Google.

2) Adbrite is an advertising the site offers links and image like Google Adsense ads and you’ll be paid according to the price offered advertising in accordance with the contents of the site content and your payment will be calculated once for the site at Adbrite, and I do not really know how you will get a commission from the ad is clicked and to register on Adbrite more easily than register to Google Adsense.

3) BidVertiser is a site advertising a very high demand by middle-lower sites and ads that will appear in the form of a link BidVertiser and the results obtained large enough to register this BidVertiser you do not need to have a Good PageRank or Alexa Rank.

Tags : Best 3 Ways online money, Online Money, Google Adsense, Adbrite, BidVertiser

Removing Stored User Name and Password in Mozila Firefox

Removing Stored User Name and Password in Mozila Firefox


When you visit a Web site that requires authentication or attempt to connect to remote computers, you are given the option to save your password so that the next time you visit the page or attempt to access a remote resource, you do not have to reenter your password. This feature can be a huge convenience, especially if you access a particular Web site or resource frequently. The downside to this convenience is the potential for horrible security and privacy problems. Essentially, you are taking the password off all of the sites and resources for which you saved a password. Anyone who has physical access to your computer can get in using your username and password, even if they do not know your password.

1. Open Mozila Firefox.

2
. Click on Tools -> options -> Security -> Seved Passwords -> Show Passwords -> Yes.

3. The Stored User Names and Passwords window will load, showing you a list of all of the accounts that are saved on your computer.

4. To remove a saved password, select the account on the list and click the Remove
button.

5. Repeat the previous steps for any other accounts that you want to remove.

6. When you are finished, just click Close.

You can also use the Stored User Names and Passwords window to add more user names and passwords to your computer.

Tags : Username and Pasword, Mozilla Firefox, Removing Stored User Name and Password in Mozila Firefox,

ALL INFORMATION Copyright © 2011 | Template created by O Pregador | Powered by Blogger