ABM Digital Info

Digital Info On Demand

Guide to Better Password Practice

Password Security Usage

Let’s be honest, passwords are annoying. These days, we need a password or PIN everywhere. We have so many that we can’t keep track of them all. We forget to update them; and when we do, it’s difficult to come up with effective ones that we can still remember, so we procrastinate changing them for months, even years. We all know this is bad, but the alternative – the painful, irritating password creation and memorization process – is sometimes more than we can tolerate. There is hope! Passwords don’t have to be complex cryptograms. A few simple methods can help make living with passwords a little easier.

Do you have trouble remembering websites or passwords? I have this program that will securely manage all of your websites and passwords securely and make it easy to find. This can become an internet user's most valueble tool!
Click Here!

While we may find them annoying, and even take them for granted, it is important to remember why passwords are important: passwords are often the first (and possibly only) defense against intrusion. They protect personal information – information we don’t want anyone and everyone to know. In our personal lives, this means financial information, health data, and private documents. In a professional context, this may encompass anything considered crucial to the success of the organization: trade secrets, financial data, intellectual property, customer lists, etc.

Passwords are simpler and cheaper than other, more secure forms of authentication like special key cards, fingerprint ID machines, and retinal scanners. They provide a simple, direct means of protecting a system or account. For the sake of this article, we’ll define a ‘password’ as a word, a phrase, or combination of miscellaneous characters that authenticates the identity of the user. Passwords are generally used in combination with some form of identification, such as a username, account number, or e-mail address. While a username establishes the identity of the user for the computer or system, the password, which is known only to the authorized user, authenticates that the user is who he or she claims to be. This means that their function is to “prove to the system that you are who you say you are” (Russell).


Password Cracking

While passwords are a vital component of system security, they can be cracked or broken relatively easily. Password cracking is the process of figuring out or breaking passwords in order to gain unauthorized entrance to a system or account. It is much easier than most users would think. (The difference between cracking and hacking is that codes are cracked, machines are hacked.) Passwords can be cracked in a variety of different ways. The most simple is the use of a word list or dictionary program to break the password by brute force. These programs compare lists of words or character combination against password until they find a match. If cracking codes seems like science fiction, search “password cracker” on Packetstorm or Passwordportal.net. There are also numerous password cracking tools available that any average person can use. (For more information on password cracking tools, please see the SecurityFocus article Password Crackers - Ensuring the Security of Your Password.)

Latest news:

Hackers hook Web email users with "phishing" scams. Click here!

Another easy way for potential intruders to nab passwords is through social engineering: physically nabbing the password off a Post-It from under someone’s keyboard or through imitating an IT engineer and asking over the phone. Many users create passwords that can be guessed by learning a minimal amount of information about the person whose password is being sought.

(For more information on social engineering, you can obtain a copy of Kevin Mitnick - The Art Of Deception FREE! Cost US$27 in Amazon.com) Find out how you can obtain a free copy of Kevin Mitnick - The Art of Deception. Click here!

A more technical way of learning passwords is through sniffers, which look at the raw data transmitted across the net and decipher its contents. “A sniffer can read every keystroke sent out from your machine, including passwords” (University of Michigan). It’s possible that someone out there has at least one of your passwords right now.

How To Choose Good Passwords

Now that we have established the importance of passwords and some of the ways in which they may be vulnerable to cracking, we can discuss ways of creating good, strong passwords. In creating strong, effective passwords it is often helpful to keep in mind some of the methods by which they may be cracked, so let’s begin with what NOT to do when choosing passwords.


  • No Dictionary Words, Proper Nouns, or Foreign Words

As has already been mentioned, password cracking tools are very effective at processing large quantities of letter and number combinations until a match for the password is found, as such users should avoid using conventional words as passwords. By the same token, they should also avoid regular words with numbers tacked onto the end and conventional words that are simply written backwards, such as ‘nimda’. While these may prove to be difficult for people to figure out, they are no match for the brute force attacks of password cracking tools.

  • No Personal Information

One of the frustrating things about passwords is that they need to be easy for users to remember. Naturally, this leads many users to incorporate personal information into their passwords. However, as is discussed in the Social Engineering Fundamentals, it is alarmingly easy for hackers to obtain personal information about prospective targets. As such, it is strongly recommended that users not include such information in their passwords. This means that the password should not include anything remotely related to the user’s name, nickname, or the name of a family member or pet. Also, the password should not contain any easily recognizable numbers like phone numbers or addresses or other information that someone could guess by picking up your mail.

  • Length, Width and Depth

A strong, effective password requires a necessary degree of complexity. Three factors can help users to develop this complexity: length, width & depth. Length means that the longer a password, the more difficult it is to crack. Simply put, longer is better. Probability dictates that the longer a password the more difficult it will be to crack. It is generally recommended that passwords be between six and nine characters. Greater length is acceptable, as long as the operating system allows for it and the user can remember the password. However, shorter passwords should be avoided.

Width is a way of describing the different types of characters that are used. Don’t just consider the alphabet. There are also numbers and special characters like ‘%’, and in most operating systems, upper and lower case letters are also known as different characters. Windows, for example, is not always case sensitive. (This means it doesn’t know the difference between ‘A’ and ‘a’.) Some operating systems allow control characters, alt characters, and spaces to be used in passwords. As a general rule the following character sets should all be included in every password:

  • uppercase letters such as A, B, C;
  • lowercase letters such as a, b,c;
  • numerals such as 1, 2, 3;
  • special characters such as $, ?, &; and
  • alt characters such as µ, £, Æ. (Cliff)

Depth refers to choosing a password with a challenging meaning – something not easily guessable. Stop thinking in terms of passwords and start thinking in terms of phrases. “A good password is easy to remember, but hard to guess.” (Armstrong) The purpose of a mnemonic phrase is to allow the creation of a complex password that will not need to be written down. Examples of a mnemonic phrase may include a phrase spelled phonetically, such as ‘ImuKat!’ (instead of ‘I’m a cat!’) or the first letters of a memorable phrase such as ‘qbfjold*’ = “quick brown fox jumped over lazy dog.”

What may be most effective is for users to choose a phrase that is has personal meaning (for easy recollection), to take the initials of each of the words in that phrase, and to convert some of those letters into other characters (substituting the number ‘3’ for the letter ‘e’ is a common example). For more examples, see the University of Michigan’s Password Security Guide.

How To Keep Hackers, Worms And Other Germs Out Of Your PC. The very best resource for Computer Security & Internet security!!
Written for novices & experienced users. Remove malware and speed up your PC. Learn to protect against all attacks and intrusions.Click Here!

Extra Protection

All of the good password cracking programs include foreign words, backwards words, etc. And the easiest way to steal a password is by asking for it, so it’s simpler to never give it away.

In some cases, a good password is enough protection to keep out intruders. In others, it’s just a start. Encryption and one-time passwords add extra protection to systems. Encryption means garbling the password to protect from sniffers or other onlookers, through a particular scheme that can be deciphered from the other end of the connection. One-time passwords (S/key is the most commonly used) are just that. They can be used only once. This requires carrying a list of passwords or having a special password calculator or SecureCard, but can be a very reliable method of password security.

There are also certain behaviors that users should practice in order to maximize the effectiveness of their passwords. Users should avoid using the same password on multiple accounts. Doing this creates a single point of failure, which means that if an intruder gains access to one account, he or she will have access to all of the user’s accounts. Users should never disclose their passwords to anybody unless they know them to be authorized (i.e., systems administrators). Even then, passwords should only be disclosed in person (not over the phone or by e-mail) to a known, trusted source.

Users should exercise extreme caution when writing down or storing passwords. Stories of hackers obtaining passwords through shoulder-surfing and dumpster diving are not urban myths, they are real. Users should resist the temptation to write down passwords on Post-It notes stuck to their monitors or hidden under their keyboards. Instead, they should choose passwords that they will be able to remember – not an easy task given the complexity required of strong, effective passwords.

There are always extraneous circumstances where we must write down passwords. This is not recommended, but if it must be done, it should be done with forethought, not haphazardly. The extreme example of too many passwords is contract system administrators, who have multiple clients and machines. For these people, the only advice is to write down the phrases or some sort of related thought to jog your memory and put it on a piece of paper carried on your person. Maybe photocopy that and leave that stored in a safe place at home. Never put it on a Post-It. Never store it online. An obscured hint might be okay, but never the actual password or even an encrypted version.

Changing & Storing Passwords and PINs

In order to ensure their ongoing effectiveness, passwords should be changed on a regular basis. Changing passwords securely is fairly simple. Windows passwords are changed through the Control Panel and in UNIX, the ‘passwd’ command generally does the trick. A good rule of thumb is to change passwords as close to the actual account as possible. For example, if it’s an ISP account, don’t telnet through three other machines to change that password. If it’s an office computer, users should be on that computer and not on a co-worker’s when changing it. Don’t let anybody watch while typing the old and new passwords. If at all possible, the password should be changed over a secure connection like a secure shell (SSH).

How often one should change passwords really depends on the account. Online financial accounts should be changed every month or two. Corporate network passwords should be changed every 3-4 months. A recent 2600 article recommended considering the “sensitivity of the resources which you are trying to protect” and suggested “enforcing password changes somewhere between once per fiscal year and once per fiscal quarter” (Thomas). Just use good judgment and don’t be lazy. Changing a password is relatively quick and painless compared to the irritating and expensive process of combating identity theft.

Tips for Organizations and Network Administrators

Managers and administrators can enhance the security of their networks by setting strong password policies. Password requirements should be built into organizational security policies. Network administrators should institute by regular changes/updates of passwords. They should also regularly remind users of how easy it is for hackers to get their passwords through social engineering and online attacks. New users should be taught about good password practices. Providing intranet resources on network security and password security can also be helpful. Finally, the organization’s password policy should be integrated into the security policy, and all readers should be made to read the policy and sign-off on it.

Systems administrators should implement safeguards to ensure that people on their systems are using adequately strong passwords. They should set password expiration dates on all programs being run on the organization’s systems. Keep a password history to prevent reuse, and lock of accounts after 3-5 password attempts. Keep the number of people in the organization who have these passwords as small as possible. The organization should also use newer versions of OSs that have more secure password files and authentication protocols. Keep your individual account passwords updated as well. Finally, when installing new systems, make sure default passwords are changed immediately.

Some articles parts are extracted from http://www.securityfocus.com/infocus/1537

How To Keep Hackers, Worms And Other Germs Out Of Your PC. The very best resource for Computer Security & Internet security!!
Written for novices & experienced users. Remove malware and speed up your PC. Learn to protect against all attacks and intrusions.Click Here!

Find out how you can obtain a free copy of Kevin Mitnick - The Art of Deception. Click here!

How to fix your Corrupted and Unreadable Drive

Have you seen this before?
You just power on your PC and decided to view some pictures from your hard drive or your external hard drive.
You happily double-click on your drive letter,
but then the dreadful thing appear in from you.

(Your Drive letter) eg . F:/ File is Corrupted and Unaccessible

You can't access your folders or files or anything from that hard drive.

CAN YOU BELIEVE IT?
WHAT HAD HAPPENED?!
BEGONE ALL YOUR PICTURES FILES FOLDERS MOVIES EVERYTHING FROM THAT HARD DRIVE!!! AAAHH.. DOOOM!!! Hard Disk Failure!!

hold on sec..
chill..
take a deep breath and no worries..
I face that before.
You do not need to seek professional help by hiring someone to help you recover all those files and spend money on them whereas you can do it yourself to recover all those files from that irritating- dreadful-in-shock hard drive.
I teach you how.

Click Here!

I don't want to get into the technical detail why that happened so let's go through the point yeah.
(that is what this weblog is all about!!)

THE STEPS TO TAKE:

1. Identify your hard drive letter. Go to My Computer, and go take a look what is the drive letter of that problematic hard drive.

(Still can't find that drive letter? Advance method: Click Start, right click on My Computer, and click Manage. A Computer Management window will popped out. Go to Device Manager and double click. You will find the drive letter. You still can't get it? Go ask your neighbour...
OK OK.. can ask me.. =D )

2. Once you already identify that drive letter, go to Start and click Run. (usually on your bottom left).

3.Type in : cmd

4. A DOS box will pop out. Let's say your drive letter is F. So type in
chkdsk f: /f /r
(take note {your drive letter}: /f /r)

5. This usually takes about 5 or more hours.
But be patient. The result is deserving. So while at it, surf the net, watch tv, disturb your siblings, or annoy your neighbours until it's all done.

6. When it is done, you will be happy you be able to access your folders and files again!!

7. Leave a comment on my shoutbox to Thank Me.

8. Say hello to me in my Facebook profile!


















Valuable data lost? How to Restore deleted files?
Recover them quickly and easily! Click Here!

How to update drivers automatically



Have you ever try updating your drivers manually?
You know how frustrating it is to update your drivers one by one, checking its compatibility with your OS and system before ensuring that you are getting the right drivers?



With Driver Robot, you do not need to worry about all these, whether you install the correct drivers, whether it is suitable for your system. Nah.. Forget all that. The frustration when looking for a suitable driver tend to make us give up and we have to endure that problematic PC or laptop of ours.
Can you stand going through all that? That frustration?

Driver Robot's scan engine and database ensure that you get the latest drivers.
No need to visit Manufacturers website for your updated drivers.
Driver Robot's database do it for you. Even when your manufacturer's website is down, Driver Robot will safe the hassle.

Don't let yourself go through all the hassle and the frustration you have to endure.
Let Driver Robot update your system automatically!
Download is FREE!
See for yourself.

MSN Problem?

Have you had problems with Windows Messenger Live?
When you want to install, the dreaded issue you faced is the "Another Version of the product is already installed".
but in fact, your messenger is not install in your system.Something must be wrong.
You check your control panel ,add/remove programs, but your messenger is not there.
Or other similar issues that frustrated people.


US - PC-cillin Internet Security 2009


Here I show you a program that allows you to fix this dreadful problems that can get into the nerves.
It's called ZapMessenger.

HOW it WORKS?
'It completely remove Windows Live Messenger, MSN Messenger and Windows Messenger 5.x. The first thing ZapMessenger will do is attempt to cleanly uninstall Messenger normally and if that fails for any reason, it will forcibly remove Messenger from the Windows Installer engine allowing you to reinstall at your leisure without hindrance.' extract from http://messengergeek.spaces.live.com/blog/

Visit the website and it shows you how.

TwitterFOX


Follow me on Twitter!

Have you use Twitter before?
Do you Tweet?
Do you have a Twitter account?
A Twitter fan?
Love tweeting?

I have been using this simple program and I am recommending to all of you.
It is aa simple add-ons into your Mozilla Firefox browser. (I love Firefox!)
It is call TwitterFox.

It allows you to Tweet wherever,whenever you are browsing the net without the need to login to your Twitter account homepage directly to Tweet.
Simply,click on it, a small pop-up will appear and while you are surfing the web,you Tweet.
It is fairly simple!
I've set up a sample how-to-install-Twitterfox video below.
Watch it as a guide.
It has an auto-pause feature where you can start following what I have shown in the video. When you are done, click play again. =)



1. Get FIREFOX 3.5
2. Search Twitterfox through Firefox addons
3. Install
4. Restart Browser
5. Have FUN!


Trend Micro's TV a Day Giveaway!

Electrical Power

The lowdown on three kinds of batteries.

WATT's The Difference?

Carbon Zinc

The granfather of dry cells batteries that first appeared in 1887 on the market.
Uses a zinc chloride and ammonium chloride electrolyte with cathode of manganese dioxide
and carbon, and a zinc anode.
Best for low-drain devices: clocks, radios, remote controls.

Price per Batt: 5 to 55 cents.
The good: Cheapest and the lightest at 12-15g.
The bad: Least powerful, shortest shelf life - 3 to 5 years.


Alkaline

Made their debut in 1959, using alkaline electrolyte of potassium hydroxide(instead of using the acidic ones in carbon zinc battery) , upping their power and shelf life.

Price per Batt: 85 to 95cents The good : Shelf life of 5 years to 7 years; works at temperature down to minus 18 deg C.
The bad : Heaviest, at 24g.


Lithium

The new kid on the block, appeared in 1989. Not to be confused with rechargeable lithium-ion batteries.(although both used the same metal - lithium)
Do have a lithium anode, iron disulphide on aluminium foil cathode and a lithium salt electrolyte.
Lithium is flexible, that batteries can be built with 20 times more active area than alkalines.
Longest shelf life and juice in powering tech devices - eg. digital cameras.
Can be use for any purpose, if you can afford it.

Price per batt: $3.80
The good: Most powerful and lightest at 15g.
The bad: The price- damn


Batteries that are tested on flashlight and digital camera.
Source: Digital Life (The Strait Times)


Duracell Alkaline
:-

Price:$0.93
Camera Shots:187
Cost per shot: 2c
Flashlight time(mins):115 Cost per minutes: 0.8c



Panasonic Evolta:-

Price:$1.73
Camera Shots:425
Cost per shot: 1.6c
Flashlight time(mins): 125 Cost per minute:1.4c




Energizer e2 Lithium:-

Price:$3.80
Camera Shots: 1354
Cost per shot: 1.1c
Flashlight time(mins) : 274 Cost per minute:1.4c



Energizer Alkaline Max:-

Price:$0.83
Camera Shots:297
Cost per shot: 1.1c
Flashlight time(mins) : 105 Cost per minute:0.8c



PenesamiG General Purpose:-

Price: $0.04
Camera Shots:0
Cost per shot: N.A
Flashlight time (mins): 3
Cost per minute: 1.3c


Do's And Don'ts


  • Abused batteries will leak/explode.
    Abuse: inserting upside down in device,peeling off label(act as battery insulation) and carrying them looselu in pockets where coins and keys are present. It may short circuit. Put one close to fire, it will explode.
  • Batteries continued to be drain after they are exhausted will leak. Remove the batteries if not being use for a long time.Even when it is turned off, poorly designed devices will continue draining the batteries.
  • Do not mix battery types (use same type or same brand batteries) or mix old batteries with new ones. The more powerful one may cause the lower capacity to fail prematurely or leak or lead to shorter life.
  • Store them in cool place. Alkaline batteries stored at 20 deg C has almost twice the shelf life- more than 7 years - than one stored at 40 deg C. (According to Energizer Alkaline Handbook, 2008)

How To Get mp3 or mp4 format files from Youtube





Youtube is the leader in online video.
Mny of us will go to Youtube to search for videos, educational or for entertainment.
What if you can download this videos for later reference, into your iPod,iPhone or mp4 players, without the need of another converter programs?
You can even get these flash files into mp3 format, without the need to convert.
All done for you.
Check it out. (zoom in pan capabilities disabled due to some technical difficulties. More text details, stated)




in details:
1. Download Mozilla Firefox 3.5 (Get them from getfirefox.com)
2.Go to Mozilla Firefox add-ons.
3. Under categories, go to Photos, Music & Videos.
4. Scroll down. Under top-rated, click on (Youtube to mp3). Under recently added, click on Download Youtube as MP4.
5. Install them both.
6.Restart Firefox.
7. Go to Youtube or any other similar online video website.



Feel free to give
Any comments, inquiry or questions.

Taking Professional Photograph

Professional Tips And Tricks For Taking
Awesome Photos With Your Digital Camera (Even If You're A Complete Newbie)...

you know. Sometimes when we took photos, it doesnt look professional or satisfying from our digital camera.

Then we are being frustrated with not being able to take high-quality photos with your Digital Camera?

No worries.

You're just a click away from learning the simple and satisfying tricks used by professionals to take one amazing pic after another.

Click on the picture below...

Nikon SLR

SkypeDECT Hub


Skype VoIP USB + Landline (2-in-1) SkypeDECT Hub that lets you make and receive VoIP calls right on your landline phone!

An amazing little device that lets you consolidate all your VoIP phone calls into your landline phone. When you receive a Skype In call, your landline phone rings. When you want to dial a Skype Out call, you can dial either on your computer screen or on the phone itself. If you receive a landline call while you're making a Skype call, you can put your Skype call on hold and switch to the landline call.

Setting up and using SkyDECT is easy and intuitive. You can receive and make VoIP calls with Skype and other low-cost VoIP programs on your landline phone. SkyDECT do comes with presets that let it integrate seamlessly with a number of low-cost or free VoIP services, such as Skype, VoipBuster, VoipStunt, and many more!



Lets take a look at their
Manufacturer Specifications

Primary Function:
VoIP Presets: Skype, VoipBuster, VoipStunt, VoipCheap, VoipDiscount, SparVoip, Internetcalls, NetAppel, Poivy, FreeCall, VoipCheapCom, and WebCallDirect
System Requirements
- Windows 2000, XP, Vista
- Skype version 1.2 or higher and internet connection
- Regular landline (DECT) phone
- DECT phone or other analog phone
- LAN/ADSL/33.6K modem or faster Internet connections
Telephone Interface: One FXS port, one PSTN port for pass-thru
Indicators: 1 LED indicator for Power, 1 LED indicator for VoIP
Voltage: 4~5.25V
Operating Humidity: 5~95% RH
Operating Temperature: 0~40 Degrees C
Ports: Line, Phone, USB
Software Languages: English, Portuguese, Polish, Japanese, Korean, Chinese (simplified), Chinese (traditional)
Dimensions (mm): 100(L) x 75(W) x 25(H)
Certifications: CE, FCC
Manufacturers Ref: GCXZ7SE9BT


Product Notes

Upgrade your regular landline phone set to be a PSTN/VoIP Dual mode phone
Makes Skype In and Skype Out calls on your cordless or landline phone
Call Hold allows you to handle VoIP and PSTN at the same time
Auto reply with an instant message when you are unavailable
Enjoy wireless VoIP if you have a DECT phone
Speed-dial up to 99 contacts if supported by your VoIP service
Included software and detailed user manual make using the SkyDECT easy


The
Package Contains

Model CVIX-G67
Base Station
USB Cable
Telephone Cable
CD with software and user manual

Find out more here! Or Get Them NOW!

Affliate Marketing

If you are familiar with Clickbank.com (R), or even if you are not but you want to make profits online, then you will want to check this out ASAP ...




While I like Clickbank, and they are a great marketplace... they are limited to many restrictions to sell products or earn affiliate commissions...

Well, there is a GREAT NEW SERVICE now...

It is a new FREE marketplace where you can sell any product you want.

Yours OWN product...

- OR - (the best part)
You can become an INSTANT Affiliate for ANY item in their HUGE marketplace.

It is called PayDotCom.com!

Did I mention it is 100% FREE to Join!

This site is going to KILL all other marketplaces and I by now, almost EVERY SINGLE SERIOUS online marketer has an account with PayDotCom.com

So get yours now and see how much they offer...


OH! - Also, they have their won affiliate program now that pays you COLD HARD cash just for sharing the site with people like I am doing with you...

They give you cool tools like BLOG WIDGETS, and they even have an advertising program to help you get traffic to your site.

If you want an ARMY of affiliates to sell your products for you, they also allow you to have Free placement in their marketplace!

Even better... If your product becomes one of the Top 25 products in its category in the marketplace (not that hard to do)...

...then you will get Free advertising on the Blog Widget which is syndicated on THOUSANDS of sites World Wide and get Millions of impressions per month.

So, what are you waiting for...

PayDotCom.com ROCKS!

Get your FREE account now...



Ash Burn

P.S. - Make sure to get your Account NOW while it is Free to join.

iCloud









Swedish firm Xcerion, launched a cool online service called iCloud!

What is iCloud?

It is complete with a free operating system, data storage, email, application development
and desktop productivity tools.
isn't that cool?
It is based on an XML-based operating sustem called XIOS, that runs inside a web browser.
Sitting on top of true operating system like Mac OS X, Windows or Linux.

Once you are a registered users, you can share photos, videos,music, with friends.
You can even chat with them using a Web-based instant messaging tool.
Just like MSN.
But this is inside a Web Browser!
Seems like we don't to own our own computer.. *chuckles*

It has hard drive storage of up to 50GB!
Supported Internet Explorer and Mozilla Firefox Browsers at this time.
I was using Google Chrome, but it doesnt support that browser.

Some demo video below.


Register now!

Fun Side Of Having Portable DVD Player And Watching Stream Online Movies With Ease

Technology has come a long way since before the television was invented. It was pretty much a shocker when televisions were made into small portable TV's that you could take with you anywhere. Then came the DVD's that were and still are so much more reliable and longer lasting than the VHS tapes that we are all so familiar with. They are more compact and much easier to use when it comes to stopping, playing, and going to the exact scene of the movie or show that you want to see. Now we have the luxury of taking that movie or show with us with the portable DVD players.

When you have decided to invest in a portable player to play your DVD's on, you should definitely visit the internet and read all of the reviews that are online about the many different types of portable DVD players that are on the market today. There are players that are very reasonably priced while there are other players that are very expensive due to the fact that they may have a lot more options to play with than that of the cheaper ones. These players work great for very long car rides.

Parents and kids alike love portable dvd players because for the simple fact that it will keep you occupied when you have nothing better to do. You could be taking a vacation with your children and it might take several hours to get to your destination. What could be better than sitting your kids down and putting in a two hour movie for them to watch while you are traveling. They have even become a standard item that most of the car manufacturers are including in their vehicles because they know the importance of keeping the kids quiet and busy while on road trips.

The portable DVD players can come in many different styles, shapes, and with many different functions. The screens on the DVD players can range in the sizes of five inches to over 10 inches when measured diagonally. Most of the bigger screen sizes are separate from the actual player with ports for headphones so that two or more people can watch the movie or show at the same time. The portable DVD player will open up like a laptop in order to insert the DVD and the screen is usually placed on the outside of the lid making it very convenient to hold and watch.

Article Source: http://EzineArticles.com/?expert=Simon_Harris


Play any streamed movie on your computer, Home theater or Television. You can easily burn your DVD Videos to CD, no expensive DVD burner required!. You can find everything you need to share with millions of users all over the world! Stream Movie Online!


AGP & PCI-express








Wanna know about PCI-express?
PCI-express is a recent future addition to many new motherboards in the market.
PCI-express support can have major impact on your hardware choices in years to come.

There are two main reasons to care about PCI-Express: 1) PCI is now an old standard dating back to the early 90's and no longer fits our needs in terms of speed/performance. 2) AGP also is in a similar position as PCI now, and chipset manufacturers are killing AGP motherboard support in favor of the much faster PCI Express interface. This means you are looking at a forced transition in the graphic sector, thus you really don't have a lot of choice in the coming years. At this point (August, 2008) choices in AGP cards represent less than 5% of available cards, and the latest chipsets can not be found in the form factor.

While we've spent plenty of time and energy improving the speed of processors, memory, and other parts of the PC we've done virtually nothing with the main connection betweern many devices-PCI. As such we are stuck with a technology in our PCs and Servers that still runs at the speeds and bandwidth we were comfortable with in the 90's. PCI as we know it is holding us back - it is a bottle neck - a limitation to the maximum performance of our systems.

We all want the most from our PC. To get the most out of our PC we must remove all bottlenecks (obstacles to performance). To that end we must turn to the next best alternative: PCI Express.

Q:Is PCI Express Video Faster than AGP Video?
A:Yes and No. A 16x PCI Express connection is at least 190% Faster than AGP 8x but this is the connection between the system and the video card. You use the connection the most when your video card is low on memory or when the game you are using uses a Direct X or Open GL feature that isn't supported in hardware.

So, what this means is that in terms of real world performance there may not be a huge difference between AGP and PCI Express if you are talking about identical chipsets. Unfortunately this is very hard to prove because graphics chipsets are designed either for PCI Express or AGP. If you have a card that is available in both forms then you have a graphics chipset that was designed for PCI Express and has a special bridge chip installed to let it communicate with the AGP bus. The short of this is: if two cards of the same chipset are available in AGP and PCI-E then the PCI-E one will always be faster. On PCI-E you don't have the overhead of the bridge chip so it's faster, and you have the better bandwidth so in intense situations such as high resolution gaming you'll come out on top every time.

The main point here is: If you have a system with AGP on it, it doesn't make sense to upgrade just to get PCI-E video right now. The fastest AGP card to ever come out is likely to be the nVidia 6800GT. If you are at a point where that is too slow then by all means it makes sense to make a complete switch. If your happy with you're AGP graphics options, wait until you are ready to upgrade the processor or other components before making the PCI-E switch.


extracted from 'What is PCI Express? A Layman's guide to high speed PCI-E Technology'.Read more

World OF Warcraft


For those WOW fans,
these websites are for you to check them out.
How can u boost your characters to level 80 the fastest way possible.
No hacks.
No cheats.
Discover the techniques,
in these guides!

Happy Surfing!



Videos playback

Downloading videos from YouTube and then playback them in their own mp4 players?
I present you the easiest way
to do it.
Any kind of videos you download from YouTube or the internet flash player,
you wanna playback them in your mp4 player but in the end you can't.
Coz why?
The video you want to play is in the wrong format.
For example, when you download videos from YouTube,
it is in flash player format. (eg. video.flv)
When you want to play them in mp4 player, you need a mp4a format.(video.mp4)

Anyway, let's get on with it.
To download videos from YouTube, you need a program like Downloadhelper.net
If you are using Mozilla Firefox, it will be easy for you to search them in Addons.
Get Downloadhelper to assist you in downloading flash videos from website such as YouTube.
Now you can download your flash videos to the format you want such as avi so that you can playback them in Windows Media Player or RealPlayer.

Anyway, if you wanna playback your downloaded flash videos, you can watch them with Applian FLV Player 2.0, the easiest player I've been using so far. Others don't work well. But this is the best I've been using.

And, yes. Lastly. You want to convert your avi videos to mp4 format, wma, mpg,mpeg etc.
This program allow you to convert them in any format you want with ease.
This is a free version.If you wanna convert into dvd format, you need to purchase another version of it.
I guess you have heard before 'Any Video Converter'?
This is the program that can assist you in converting any video format to your choices.
Download the program here.

Enjoy watching your videos in your mp4 player!

Happy Surfing!

De Activator




For those Windows XP user, u know that Microsoft have this annoying security measures
where u have to activate your XP copy before it expires?
You can still use your copy without activating for up to 30 days.
By then , u have to activate your copy through the internet.
Those who don't have the net have to activate through the phone.

But have u ever wonder what will happen if ur pc crash and u reinstall ur XP?
After u input your serial number, u can't activate your XP copy through the net anymore.
You have to make a call to the Microsoft Help Center.
Then they will give a long string of numbers to key in to activate your XP copy.
Kinda troublesome though,

MY PC crash a few times before.
First, my Professional version is gone.
So i install the Home Version which is already installed on my other PC.
We cant use two XP OS installed from the same one cD.
We have to make a call to the HELP center and explained why this and that.
Troublesome.
Recently, i just repaired my PC. So i have to activate this version of mine before 30 days.
How many times must i do that?

This lil program, which come in handy.
How does it works?

LEt make it short and simple.
There are two files in your WINDOWS/SYSTEM32.
wpa.dbl and wpabaln.
wpabaln is the baloon that keeps popping out reminding you to activate.
wpa.dbl is the important file for your XP copy.
This lil program will tweak a little on your PC.
Don't worry.
Just a lil tweak.
Doesnt effect your whole system.

The program will insert a file called antiwpa.dbl.
It makes your computer think that it is working on safe mode.
In actual fact, it doesnt.
SMART eh?
=D
So you won't be irritated by the constant popping asking you to activate.
This lil program i have has an extra features though, different fro mthe previous one i have.
Its called WGA Fixer.
This will make your XP copy 'genuine'
So that u can download or update your Windows Media Player to 11 and download Internet Explorer 7.
There is no need for you to validate when everytime u need to download new update programs.

I don't recommend you peeps install a pirated copy of XP and use this lil program.
Its best when u have an orginal copy install in your PC.
This lil program is a great help.
You can ask me.
I will assist in the process of activating your windows XP.

(I don't recommend this method though. According to powerful anti-virus program such as BitDefender, it is consider a virus or worm although it isnt)

Happy Surfing!

Earn Money Online





Ever since I start serving in the army, I miss studying...
Dang...

Somehow, I decided to sign up a newsletter( online course mail? watever...) on
Networking. Its a some kind of e-course learning.








Get Paid To Read Emails! Who says you can't have fun making money? U can folks! Click here!

http://www.emailcashpro.com


While i'm learning more about the insides of networking,
I am researching on Network Security at Home.
I learning too more bout tis stuff...
Interesting.


If I find out some interesting facts, I may share it here..
You never know some facts or info u really need. :D




Stay tuned!


Get Paid Reading Emails!


p.s Need exposure for your website/blog? You need web traffic here! Try it!





Secure your PC

We are living in a world where mostly everyone have internet access at home, in school, office, the library or even the cafe.
The important thing is when you access into the net world, you are vulnerable to attacks by hackers, viruses, worms,trojans, spyware, adware etc. You name it. The net world is a dangerous place where hackers sniff around for its next unaware victim to attack.



Although your XP software system have its own Windows Firewall install, it is not strong enough. You are still vulnerable to attacks. (more info about Windows Firewall)
Invest yourself into PC security software to protect your computer or laptop.
But hey! I'm not talking bout investing money.
WE have to think bout budget.
There are lots of FREE basic software out there.
Invest your TIME to install them.


Click Here!

For anti-virus programs, I'm using AVG Free Edition for one of my PC
and Avast! Professional (previously Free Home edition) for the other.
In my opinion, these two anti-virus programs are the best free edition I have ever use. Simple, never drain your PC memory like Norton did, the top choices for users around the world.These two software companies won many awards for their Powerful software.

Download latest AVG here!
Download Avast! Home Edition here!



OR View the video demo here peeps!


ShoutMix chat widget

Followers

Sponsors

LinkShare_120x240v1 CO.CC:Free Domain

Recommendation

Artisteer - Wordpress Theme Generator CO.CC:Free Domain
CO.CC:Free Domain
Social Networking for Bloggers, Free Blog Submissions, Blog Traffic

SKYPE ME

My status

Sponsors