Tampilkan postingan dengan label survey. Tampilkan semua postingan
Tampilkan postingan dengan label survey. Tampilkan semua postingan

Selasa, 11 Januari 2011

How To Secure PC

Step 1. Use a strong password

The danger: malicious computer users can gain access to your computer over the Internet, stealing and deleting data and potentially implanting viruses and Trojan horses.

The cause:
The major irony of Microsoft's shift from non-password protected home operating systems like Windows 98 and ME to the password and access-list based 'security' of Windows 2000 and XP is that your data is actually less secure by default.

Sure, the new operating systems give security conscious users all the tools they need to protect their data, but what if the users are not aware of the risks? During the install process, you are prompted to create a password for the built-in 'administrator' user account. Users accustomed to Windows 9X/ME's pointless passwords often decide to bypass this by entering a blank password, thus opening up their entire computer to anyone who takes the trouble to look twice at their Internet address.

There are two reasons for this vulnerability: One, every Microsoft Windows XP and 2000 system has a built-in account called 'administrator' which has full access to all files and configuration settings of the computer. Anyone who is remotely familiar with these operating systems knows of this account's existence. This definitely includes anyone who might try to break into your computer.

The other factor in Windows 2000 and XP's vulnerability is the presence of hidden administrative shares. Each logical drive (C:, D:, etc.) on your system, plus the Windows directory, is actually shared (made available for remote access) by default. These hidden shares are only accessible to Users with administrative privileges, but once an intruder has your administrator account password, he has your entire system laid open for him.

By using one of a multitude of free and legal software tools, a potential intruder can easily locate and gain access to your data by finding your IP address and attempting to connect using the administrator account. Obviously, if there is no password on the account, you are defenseless.

Even if you have put a password on the account, you may not be safe. Simple passwords can easily be discovered by an intruder using a 'dictionary attack' software tool, which can try words and combinations of letters until your password is compromised.

The administrator account is uniquely open to this style of attack, because while other user accounts can be 'locked' by the operating system if an incorrect password is entered too many times, the administrator account cannot be locked out. This means that an intruder is free to try as many password possibilities as he or she wants, without worrying about losing access to your system.

The Cure to Step 1.

The cure: Set effective passwords for all users

The best way to protect yourself from malicious users is to effectively password protect all your user accounts. An effective password, according to Microsoft, is at least seven characters long and contains a mix of upper and lower case letters, numbers and symbols. While you can cut corners a bit here in the interests of memorization, make sure to use six or more characters and include at least some numbers and upper case letters in the middle of the word. By using several characters and a mix of upper and lower case letters and numbers, you can make your password effectively uncrackable to intruders who do not possess super computers capable of predicting the weather...

To change user passwords make sure you are logged in as a user with administrative privileges (the first user created during the XP install process has these). Right click on 'my computer' and select 'manage.' Expand 'local users and groups' then 'users.' Right click on each user and select 'set password.'

Note the ominous warning message. If you have used XP's built-in file encryption to protect any of your files, you must remove it before you change your password or you will lose access to the files. Otherwise, proceed and set a secure password for each account.

The accounts you should set passwords for are the administrator account, and any accounts you created during or after the installation of Windows.

Step 2. Make sure your system is protected by a firewall

The Danger: Malicious users may locate and attempt to break into your computer from the Internet.

The Cause: All computers that communicate over the Internet must have a valid IP address, such as 61.232.252.6. These addresses allow computers to exchange data with other computers over the 'net. Your system also leaves a variety of ports open to listen for incoming data. Ports are access points for certain kinds of data to enter and leave your computer. For example, while you are viewing this website, your computer and our web server are communicating through port 80, the default port for the HTTP language that web pages generally use.

The trouble is that anyone can use freely available software like GFI's LANguard security scanner to scan a range of IP addresses for computers and gather information about these systems. If your computer is poorly password protected these utilities provide remote users with the ability to directly access your files.

This happens because by default, many ports in your system are fully prepared to listen and respond to any data request from the Internet. This means that your system is fully visible, the equivalent of wearing glow-in-the dark clothes in a blackout…

The Cure to Step 2.

The cure: Use a firewall program or device.

A firewall is a software program or hardware device which blocks remote access to your computer. It does this by closing all ports to data unless the communication is initiated from inside the firewall first. So you could, for example, surf this page without problems through a firewall since your computer sends the request for data to our web server first.

The firewall would note the Internet address that your request was sent to, and allow return communications from that specific address back through the firewall. However, anyone trying to scan a range of IP addresses for vulnerable computers would turn up a blank for your address, since the firewall blocks all unsolicited communication from the Internet.

Almost all home Internet sharing devices include firewalls, so if you are using a router to share your Internet connection within your home, you are likely already protected. Otherwise you need to use a software firewall. Windows XP comes included with one, though you need to activate it. Several free third-party software firewalls are also available, most notably Zone Lab's Zonealarm.

To activate the Windows XP firewall go to 'start/control panel/network and Internet connections/network connections' then right click on your Internet connection and select 'properties'.

Go to the 'advanced' tab and check the 'internet connection firewall' box.

The windows XP firewall is now active and will block most non-requested data from entering your system.See PCSTATS Beginner's guide to Firewalls and Internet security for more details on configuring the XP firewall.
If you have installed Service Pack 2 for Windows XP, the firewall works a little differently. Unless you have another form of firewall software like Zonealarm installed, the XP firewall should be active by default.

To check this, go to 'start\control panel\windows firewall' and ensure that the firewall is set to the 'on (recommended)' position. The 'windows firewall' icon in control panel is only available to Service Pack 2 users, so if it's not there, simply follow the directions given in the last paragraphs. For more information about the changes to Windows XP made by Service Pack 2, see PCSTATS article on WinXP-SP2 right here.

To use Zonealarm first download and install the software.
Go to 'alerts and logs' and change the 'alert events shown' setting to off. This is just to prevent the program informing you every time it blocks data remotely.

The main advantage of Zonealarm over the XP firewall is its ability to block data coming from inside your system out to the Internet. This enables it to catch Trojan horse viruses and spyware in the act and prevent them from sending privacy and security compromising data from your system. Zonealarm will pop up a permission box every time a program attempts to access the Internet.
Step 3

Step 3. Use antivirus software

The Danger: Computer viruses can cripple your computer and destroy your data.

The cause: There are an incredible variety of computer viruses on the Internet, with many different ways of infecting your system. The stereotypical vector for viruses is the email attachment, and this is still the most common source of infection for unwary users. Opening up a seemingly innocent attachment from a friend can have disastrous consequences. There are few computer users who have not experienced the effects of a computer virus at some point, and malicious coders keep churning them out.

The cure: Install and use a professional antivirus program

Using an antivirus software package from a reputable manufacturer like Symantec or MacAfee provides an effective defence against viruses. You should scan your system for viruses once a week at least, and use the software to examine any email attachments you are unsure about. Many packages, like Norton Antivirus, come with auto-protection features which will scan any files entering or leaving your system for viruses.

While this is fairly self explanatory, a couple of extra tips: if you're going to buy and install anti-virus software, do it now, before you get infected with a virus, rather than waiting until your system starts to act up. The reason for this is that many viruses have components that can disable or subvert popular antivirus programs like Norton's and MacAfee's software. So if your system is infected before you install the antivirus software, it may not be able to help you.

Secondly, make sure you keep the program updated. Antivirus software manufacturers are constantly creating new sets of virus definitions to keep up with new threats. Without updated definitions, the software will not stop newer viruses from infecting your PC. Most reputable antivirus programs will update themselves automatically when you are connected to the Internet, but it doesn't hurt to make sure you have the latest update before you scan for viruses.

Step 4. Check your PC for spyware and adware

The Danger: Spyware and Adware programs can quickly infest your PC, compromising privacy and performance.

The cause: Spyware and adware are generic names for a variety of programs designed to collect data and/or advertise products. Sound innocent? The catch is that these programs are often installed on your PC from websites or as part of 'free' software like Kazaa, and work from inside your computer, gathering information about your surfing habits for marketing purposes. Worse, this is only the tip of the iceberg.

Programs in this category may call up extra pop-up advertising while you are surfing, or even redirect your browser to websites of their own choosing. While makers of this type of software need to obtain your consent to install their programs, they are often presented in misleading ways, or hidden within the license agreements of other software.

There is a second category of programs involved as well, browser hijackers. These malicious programs can subvert your web browser's home page and links and generally cannot be removed without great difficulty. At their worst, these programs can make using your computer a trial. System and Internet performance can be slowed due to the extra data being sent from your computer, and floods of (often obscene) advertisements may dog your Internet surfing experience.

For more details, see PCSTATS guides on spyware, adware and browser hijackers.

The Cure to Step 4

The cure: Install and use a reputable spyware finding/removal tool.

Fortunately, certain individuals have devoted a lot of time and effort to create free software which is specifically aimed at removing these (legal) pests from your system. One software system we tend to use is Ad-Aware, freely available from the Lavasoft website as it is the most popular and frequently updated removal tool. Ad-Aware functions much like any antivirus program, so it should seem instantly familiar to most users.

Use the 'check for updates now' function to make sure you have the latest updates. Hit the 'start' button and choose 'next' to scan your system with the default options.

Once the scan is complete, you will be shown any suspicious files, registry entries or cookies detected. You can now delete or quarantine these files.

If Ad-aware found and removed malicious software, you should empty your recycling bin and restart your computer and scan again to make sure it is completely removed. Make sure to rescan your computer weekly.

Step 5

Step 5. Update update update

The Danger: Viruses and malicious users may exploit newly discovered security holes within Windows and Internet Explorer.

The Cause: Windows XP is an extremely complex operating system, and as such has a number of bugs and design holes which are constantly in the process of being fixed by Microsoft. On the other side of the fence, there are users who are enthusiastically trying to discover these flaws, either for the purpose of informing Microsoft or just for the heck of it.

Generally, major vulnerabilities or flaws are patched almost immediately after their existence is made known, or even before. However, users who do not update their systems with the new patch are at the mercy of anyone using software tools designed to exploit the vulnerability.

A recent example of this would be the infamous 'blaster' worm which used a weakness in Window's RPC (Remote Procedure Call) handling to infest an enormous number of systems across the world. Once on a system, the virus could spread itself out to other vulnerable PCs and also force its host to shut down automatically. Microsoft quickly patched the security hole and provided a tool to remove the worm, but since many users did not patch their systems, the infestation spread and slowed down Internet traffic worldwide.

The Cure: Keep your Windows computer up-to-date with the latest Microsoft security patches.

Windows XP includes an automatic updating feature which will periodically check Microsoft for updates and download them to your system, ready for installation. To use automatic update, right click on 'my computer' and select properties, then choose the 'automatic updates' tab.

If it is not already, check the 'keep my computer up to date…' checkbox to enable automatic updating. PCSTATSNow run Windows update from 'start\all programs\windows update' to make sure you are fully patched for now. Windows update will now periodically check Microsoft's site for updates and download them to your PC. You will be prompted with an icon in the task bar when new updates are available.

Advanced security steps: The following five procedures will provide you with an extra blanket of security to complement the essential changes you just made to your system.

Step 6.

Step 6. Change the name of the administrative account

The Danger: Malicious users may attempt to use the built-in 'administrator' user account to gain access to your PC.

The cause: As mentioned above, every Windows 2000 and XP installation includes an 'administrator' user account which has full control over files and system settings. This account cannot be locked or disabled and is thus the first target for anyone trying to hack into your computer. While the account should already have a password, provided you followed the procedure above, this does not protect it from attack.

The Cure: rename the administrator account.

Renaming the administrator account adds an extra layer of security by removing the standard user name 'administrator' which any malicious user will try first when attempting to gain access to your PC.

Make sure you are logged in as a user with administrative privileges - the first user created during the XP install process has these, as does the administrator. Right click on 'my computer' and select 'manage.' Expand 'local users and groups' then 'users.' Highlight the 'administrator' account and right click. Choose 'rename' and change the account to a name of your choosing.

Step 7. Disable 'hidden' shares within XP and 2000

The Danger : malicious users can easily gain access to every file and folder in your computer.

The Cause: Windows 2000 and XP both use a system of hidden administrative shares. Every drive on your computer system is shared under the name '(drive letter)$.' These shares exist to allow users with the correct username and password to remotely administer files on your computer. Of course, if a malicious user obtains a username and password with administrative rights to your system, all your files and folders are available to them over the Internet. They would be free to copy, change or delete as much of your data as they saw fit.

The cure: Disable the hidden shares.

Unless you are in a business environment, it is unlikely you will have a need for the hidden shares. Disabling them will considerably reduce the danger of your data being compromised remotely.

You will need to edit the Windows registry using REGEDIT in order to carry out this step. Please ensure that you backup your registry to a file before editing it.

To disable the hidden shares first start REGEDIT ('start\run' and type 'regedit') and then navigate to: HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\lanmanserver\parameters
Add the Dword value 'AutoShareWks' with a value of '0' and restart your computer.

Step 8. Change Internet Explorer security settings

The Danger: Viruses and browser hijacking programs can infect your system through the use of ActiveX code on certain websites.

The Cause: By default, Internet Explorer will run certain content, including small programs embedded in the code of a website. An example of this sort of thing would be a pop-up ad asking you whether you wish to install so-and-so's software. Say yes and you may have just saddled yourself with a spyware problem. Certain malicious software may not even have the courtesy to ask before it has its way with your browser.

The cure to Step 8

The cure: Raise Internet Explorer's default security level.

Fortunately, IE can be set to a more restrictive level of security. At this setting, the browser will not run certain types of content found on websites. This includes potentially malicious ActiveX code. Of course, this can also change your web browsing experience, as it will cut off certain content from safe websites also. To get around this, you can add known safe sites that you regularly visit to Internet Explorer's 'trusted sites' list.
To raise IE's security level:

Open Internet Explorer, go to the 'tools' menu and select 'Internet options.' Now select the 'security' tab.

PCSTATS

Set the Internet zone to the 'high' security setting. This will ensure that IE will not run activeX instructions, the means by which most browser hijackers get access to your computer. You can place trusted websites that you regularly visit into the 'trusted sites' Internet zone.

PCSTATS

Site addresses that you enter here will be mostly unrestricted, allowing them to display their content properly.

Step 9

Step 9. Secure your shared files

The Danger: Intruders may access your shared files

The Cause: By default, Windows XP uses the simple file sharing system. This allows any user that has authenticated to your computer to have full access to all shared files. In Windows XP Home, the 'guest' user account is the account used by all remote users to access shared files. Of course, the guest account has no password by default, allowing unlimited, non-password access to your shared files for virtually anyone who finds your IP address.

While a firewall will block this type of access in most cases, it still pays to limit your venerability by configuring simple file sharing and the guest user account more securely than the default.

The Cure: Secure and configure the guest user account

If you are using Windows XP Professional, you should password protect and disable the guest account. This will force any intruder to use one of the user accounts you created or the administrator account, both of which should now be secure if you followed the above procedures.

Make sure you are logged in as a user with administrative privileges (the first user created during the XP install process has these, as does the administrator).

Right click on 'my computer' and select 'manage.' Expand 'local users and groups' then 'users.' Highlight the 'guest' account and right click. Choose 'set password' and provide the account with a secure password. Now right-click the guest account again and choose 'properties.'

PCSTATS

Check the 'account is disabled' box.If you are using Windows XP Home, you cannot truly disable the guest account, as it is used as an integral part of the file sharing system. You can password protect it though… Bring up the command prompt (start/run and type 'cmd') and type 'net user guest password' where 'password' is the password you want to use to secure the account.

Step 10

Step 10. Stop using Internet Explorer and Outlook Express

The Danger: many viruses and malicious programs target Internet Explorer and Outlook Express specifically.

The Cause: IE and OE are unquestionably the most popular web browser and email client in the world. They are the default applications that a majority of Windows users are familiar with. Because of this, many viruses and other malicious programs are created to target specific vulnerabilities in these two programs. Since the user base is so huge, they can afford to be specific. These viruses generally will not affect systems which employ other products for their web browsing and email retrieval.

The Cure: Learn to use a new web browser and email client.

There are several free browsers and email clients available that can easily replace IE and Outlook Express. The trick is to get used to using them. By not using IE and OE, you considerably reduce the danger of infecting your system with a virus.

Some examples of alternate browsers and mail clients include;Mozilla the makers of this popular browser also offer Thunderbird, a free email client.Opera. Eudora which is an ad-supported mail client with a long and successful history.

If you have any comments or questions, please post them in the PCSTATS Forums. Find out about this and many other reviews by joining the Weekly PCSTATS Newsletter today! Catch all of PCSTATS latest hardware reviews right here.

megapixel camera for 2011

COLOGNE, Germany--For those who find Hasselblad's 60-megapixel H4D-60 camera a little too confining, the company plans to sell a 200-megapixel model in the first quarter of 2011.

The Copenhagen-based medium-format camera maker announced the product today at the Photokina imaging show here. Interestingly, it uses the same camera body as its current H4D-50MS, which will be upgradable, said Peter Stig-Nielsen, director of product development.

However, even in the rarefied air of the medium-format market, where image sensors are very large and very expensive, the 200-megapixel "extended multishot" technology won't appeal to everyone: each shot will take about 30 seconds to capture, restricting the camera to stationary subjects such as cars, watches, and jewelry.

That's because of the design of the Hasselblad multishot-series cameras such as the H4D-50MS. The current model uses tiny piezoelectric motors to shift the sensor a very small amount to combine two shots into one higher-quality image.

"We are now building it into a real product that's going to hit the market in the first quarter of next year," Stig-Nielsen said. "It is going to be an extension of the current H4D-50 multishot."

Most digital cameras capture color with a checkerboard of color filters called a Bayer pattern over image sensor pixels; each pixel captures only red, green, or blue color information. The multishot technology shifts the sensor so the same pixel can capture each of the colors, ridding the camera of the need to mathematically infer the missing values of red, green, and blue.

Hasselblad's new iteration of the technology, called extended multishot, moves the sensor only a half pixel in various directions, which protracts the multishot process from about 20 seconds to 30 seconds. But it quadruples the resolution of a 50-megapixel sensor.


Multishot and extended multishot modes aren't mandatory, of course, a move that would preclude the models from use in fashion photography, one of the biggest markets for this type of camera.

"The cameras we bring out will be able to work in all three modes at the touch of a button," Stig-Nielsen said.

One issue with a 200-megapixel camera is whether lenses can keep up with the tremendous resolving power. If not, they're just capturing blur more precisely. To that end, Hasselblad also announced two new lenses, overhauled designs that improve on earlier models.

First is the HC 50mm-II, an f3.5 model for 2,999 euros (about $4,006). Second is the HC Macro 120-II, an F4 model with a price of 3,420 euros (about $4570). Both are available immediately.

Older lenses will have some trouble keeping up with the 200-megapixel design. "The old models will still work, but they will not give you 100 percent resolution all the way to the corner," Stig-Nielsen said. With the new models, "you will see resolution all the way edge to edge."

Hasselblad underwent tough times, and more are ahead as full-frame SLR cameras from Canon and Nikon encroach on medium-format turf with advantages in cost, flexibility, low-light sensitivity, accessories, and ease of use. And Hasselblad has had trouble with customer service and delivering the cameras it promises.

But things have improved for Hasselblad.

"In the first eight months of the year, we have had a profitable turnaround," said Chairman Larry Hansen. The period has been "very successful for Hasselblad," he said.

Two factors in the company's better fortunes were an improving economy and restructuring that reduced Hasselblad expenses. But the biggest factor was the "the success of the H4D platform," he said.

Hasselblad's H4D is an integrated system that builds the sensor into the camera body like a conventional SLR. In contrast, earlier film and digital medium-format cameras use a removable back that lets photographers upgrade or change the sensor without changing the camera body.

The design shift hurt a Hasselblad competitor, Phase One, which manufactures such digital backs. Consequently, Phase One acquired a controlling interest in Mamiya, a venerable Japanese medium-format camera company, and sells its camera bodies under the Phase One brand name.

In addition, Phase One acquired another digital camera back maker, Leaf, which at Photokina announced a new 80-megapixel medium-format back.

In these markets, brand is still important even if sales are the merest sliver of the overall camera market. To that end, Hasselblad also announced it's building a limited series of 499 H4D cameras that draw on the clout of another boutique brand, Ferrari.

The special series of cameras sport the Ferrari logo and the gleaming red "rosso fuoco" color of new Ferrari sports cars.


Twitter and youtube in North Korean

The Twitter and YouTube accounts held by the North Korean government were hijacked over the weekend and used to post messages critical of the regime and mocking North Korea leader Kim Jong-Il's heir apparent, Kim Jong-Un.

The official Twitter account for North Korea posted messages on Saturday, the day of Jong-Un's birthday, calling for an uprising and criticizing him for reportedly hosting lavish parties while North Koreans starve, Reuters reported.

Meanwhile, an animation appeared on the regime's YouTube channel the same day showing Jong-Un mowing down impoverished women and children in a sports car, the report said. The posts and video were removed but another copy of the video was still accessible.

Members of a North Korean Internet forum, DC inside, have claimed responsibility for the prank, according to reports.

The hijackings come as North and South Korea prepare to begin talks at the end of the month. Last year in November a group of South Koreans were killed on Yeonpyeong island during an exchange of artillery fire and in March a South Korean military ship was torpeadoed.

Minggu, 09 Januari 2011

Anti Sosial Of Sosial Media

Portland, People walking by the floor-to-ceiling glass windows surrounding Cristin Norine could be excused for thinking that she is working in an office alone or lives in a ground-level apartment in dire need of drapes.

She does not look like a prisoner.

But for 30 days that's exactly what Norine is. Her "cell" is a large storefront that sat unrented for months until the owner decided to let artists use it as a gallery so it wouldn't look so empty.


Norine has moved in donated furniture, exercise equipment and a large-screen computer with a projector overhead so everyone walking by can see as she tweets, updates her Facebook page and Skypes.

During her stay no one comes in and Norine never goes outside. Her only contact with other people is through technology.

In that regard, Norine says she is not that different from anyone else.

"We think we are being social on these gadgets," she said. "And it can be a really great thing when people live in different states, but when you are at dinner or you are trying to have a conversation and you are being distracted by these other things. Or maybe you are just not going out as much because you are staying home and are online."

Usually a TV and photography production manager based in Los Angeles, California, Norine ended up in her own personal fishbowl in Portland after a chance meeting with Josh Elliott.
Elliott worked in photography in Oregon and the two realized they shared a similar curiosity about the effects that the barrage of new technologies are having on people.

Elliott knew about the available storefront and almost overnight, Norine moved in.

The Public Isolation Project was born.

As she literally X's off the 30 days she is spending cut off from the world, Norine chronicles her experience through her blog http://www.publicisolationproject.com/.

On the other side of the glass, Elliott is filming a documentary on their collaboration.

They are not anti-technology, Elliott says, just hoping to inspire more conversation about how everything from the internet to iPads are shaping people's lives.

"We are accessible 24/7," Elliott says. "Having a cell phone in your pocket you can be called or texted or video chatted at any point. With Facebook you are updating all time. You have friends on Facebook that you have never met, and they know more about what's going on in your life than your mother does who is not on Facebook."

Norine puts herself out there in a way that would make the most avid Twitterer or Facebook addict suffer an attack of shyness.

She eats, exercises and sleeps in full view of a busy Portland street. With a bathroom as her only private area, she is on almost constant display.

Norine's exhibitionism is extreme but hardly unique. Last month, the Chicago Museum of Science and Industry held a prize for a contestant to move to the museum for a month and become a living exhibit. Some 1,500 people applied.

In 2004, a Malaysian woman set a record for enduring 32 days in a glass box with hundreds of scorpions as company. In 2000, an actress living in a glass house in Chile inspired protests after taking public showers.

Elliott says the near total lack of privacy takes a toll on Norine.
"Even on a Sunday when she just wants to take a break from this and have a cup of coffee," he said, "There's people coming up and knocking on the window. She just doesn't have any time for herself and I think that's hard."

Norine admits she didn't think she would make it past two weeks and has what she calls "the bad days."

On day 16 of her blog she writes, "Went to bed before 9 p.m. I wasn't feeling well and was too tired to write. ... I could really use some fresh air."

But she says having a routine has made the experiment more bearable.

"I get up, I make myself coffee and breakfast and get ready." Norine says. "Some days I'll be working out. Then I get on the computer and do my work -- I try to take a lunch break. I even have people who will come and have lunch with me on the other side of the window."

Norine e-mails and Skypes and chats online with anyone who wants to know more about her and the project. Until, she says, the overload sets in.

"I'll realize I need to take a break," Norine says. "And I'll go and do something that doesn't have to do with the computer and I can't turn it off. I still hear those dings and I get drawn back to the computer. I definitely have noticed since I have been here that I am addicted!"

The project ends on December 1 and Norine says she yearns for human interaction, a good meal and to hear live music.

Even if Norine can't wait to leave her self-imposed prison, she and the project have changed the surrounding neighborhood.

People who walk by her every day on their way to work stop for a few brief seconds to wave hello.

Day laborers awaiting work across the street watch her moving around the living space as if it were a favorite soap opera.

New friends pop by and hold notes against the window.

A woman who only gives her name as Debra watches Norine intently for several minutes before saying, "I know what it's like: I have an infant and I get stuck in my house all the time and I find myself so hungry for adult conversation."

Minggu, 05 Desember 2010

smartphones in December

f you're in the market for a new smartphone, you might want to keep a close eye on Best Buy's latest offer.

The company announced today that through the rest of December, it will be offering at least four models of smartphones for free in its brick-and-mortar stores, online, and in its mobile specialty shops. All four major carriers--Verizon, AT&T, T-Mobile, and Sprint--are included in the offer. The company said it decided to launch the program after enjoying a successful "Free Phone Fridays" campaign in October.

The devices Best Buy plans to offer include the HTC Droid Incredible, the LG Optimus, and RIM's BlackBerry Curve, among others.

But as with most deals, there is a catch. To get a free device, consumers will need to either enter into a two-year contract or upgrade their current line with a new two-year agreement.

Senin, 29 November 2010

Samsung M5650 Survey

Samsung M5650 Lindy structures design similar Corby S3650. The interface was also still relying on Cartoon UI, which has capacitive touchscreen TFT display as a primary access medium. In addition, Lindy M5650 panel also dedicate multimedia at the bottom line of the call / endcall to show multimedia capabilities.

The features, recorded The M5650 Lindy has better facilities than Corby Touch. Look the HSDPA network, to access the data can reach 7.2 Mbps. In addition, Samsung M5650 Lindy has also been equipped with track Wi-Fi connection beside Bluetooth and data cable MicroUSB.

In the entertain sector, this phone includes 3.2 MP powerful camera plus autofocus capability. There are also video and music player that has the ability to extract information about the song, via the Find Music feature recognition.

Samsung M5650 Lindy provides adequate facilities and attractive form of cool widget application for Facebook, MySpace and Twitter. The Services includes photo / video upload into the Youtube, Flickr, Picasa and Photobucket.

The plan, the phone will be marketed end of the year with an estimated price of 149 EURO.

Specifications:
Network: Quadband GSM and HSDPA 1900/2100 MHz; dimensions: 10.6 x5, 7×1, 2 cm Weight: 98 g; screen: 2.8 inch, TFT 262,144 color capacitive touchscreen, 240×320 pixels; Data transfer: HSDPA 7.2 Mbps, EDGE 10 , GPRS 10; Camera: 3.15 MP, 2048×1536 pixels, autofocus, video recording; Internal Memory: 50 MB; External Memory: microSD up to 8GB; messaging: SMS MMS, e-mail, IM;

Connectivity: Wi-Fi 802.11 b / g, Bluetooth v2.1 (A2DP support), microUSB data cable, 3.5 mm audio jack; Browser: WAP 2.0/xHTML, HTML;

Other Features: Polyphonic (MP3), MP3/WMA/eACC + player, H.263/H.264/MP4/WMV player, Find music recognition service, DNSe, social networking integration with live updates, Smart unlock, Cartoon UI, Dedicated music keys, wid RDS FM radio, java MIDP 2.0, Phonebook 1000 entries, Organizer, Document viewer, Voice memo, Speaker phone, Games; Battery: 960 mAh lithium ion; Standby: 300 hours, Talk time 3 hours

LG Apex Slide

LG Apex is U.S. Cellular’s latest high-performance, Android-powered device. The LG Apex, with its vibrant 3.2″ touchscreen and sleek, slide-out QWERTY keyboard, joins a string of cutting-edge products recently launched by the carrier, including the HTC Desire, Samsung Acclaim, Samsung Mesmerize (a Galaxy S smartphone) and the upcoming Samsung Galaxy Tab, slated to arrive in stores this month. The LG Optimus U will debut in December rounding out U.S. Cellular’s Android-powered offerings for 2010.
LG Apex Specs

LG Apex is a cool productivity tool that runs on Android 2.1 and features a 3.2-inch durable tempered glass touchscreen that responds to a feather touch with vibration feedback. The screen also boasts luminous sensors that adjust brightness depending on light conditions and shows off the dynamic, animated live wallpaper. Five customizable home screens allow customers to create shortcuts to their favorite apps and widgets. Its stylish and functional design offers a QWERTY keyboard that slides out to make typing and texting easy.

Backed by U.S. Cellular’s high-speed nationwide network, customers can browse and download thousands of applications in Android Market that allow users to customize their phone to fit their lifestyle. Customers can also access popular Google applications, including Google Maps™ with its turn-by-turn directions and Google Voice Search™ that helps them locate anything without a single key tap. The LG Apex’s 3 megapixel autofocus, flash-ready camera/camcorder comes with a panorama mode that lets customers take up to six side-by-side shots to build a sweeping view.

LG Apex is a Wi-Fi enabled phone also comes with an MP3 player, and customers can easily organize their music library, repeat and shuffle their favorite songs. They can even multi-task, playing music in the background while simultaneously e-mailing, texting or downloading videos. A video player is included for WMV, MP4, 3GP and 3G2 formats.
LG Apex Price

The LG Apex will retail for $80 after an $80 mail-in rebate and will be available Nov 19 at US Cellular locations.

New Nokia N8

The Nokia N8 comes with an array of applications such as free global Ovi Maps walk and drive navigation, making this the perfect substitution for a Satellite Navigation system. The Nokia N8 boasts to take you exactly where you want to be, it also features information on 70 worldwide destinations, making it a great handset for those that love to travel.

The Nokia N8 offers an impressive total of 16GB of in-built storage space, however, if you desire even more storage this is in fact expandable up to a total of 48GB, which is available via the use of a Micro SD card. This enables users to send and transfer large files to a memory stick through the USB On-the-Go device.

Such a declaration is offering developers a new platform to work from. The Nokia N8 also comes complete with Qt, which is a software development environment that in actual fact simplifies the development. Such software makes it possible to create applications just once and then organize them across other software platforms, such as Symbian for example.

In order to enable developers to start grasping the prospective of Qt, Nokia has also made the simple to use Nokia Qt SDK available in its initial form.

The Nokia N8 will be going live late in 2010 and will be released only to select markets.

The Nokia N8 introduces the global device unveiling of the new Symbian 3 software; such software features an assortment of major developments and improvements. These improvements include a total of three personal homescreens, each are easily scrolled through by a simple touch of the screen.

A selection of improved usability options are also available, which feature across the user interface and include elements such as ‘pinch-to-zoom’ options and single tap and multi-tap support motions. Due to the new 2D and 3D graphics architecture, both quicker and more amenable user interface is available; this takes complete advantage of the all-new hardware acceleration. More applications can be run alongside one and another due to the highly efficient memory management, allowing users to multi-task with ease.

If you’re looking to buy the new Nokia N8, then check out www.phones4u.co.uk and find yourself the best deal.

Powerfull BlackBerry

With the launch of the Blackberry Torch in August of this year, there was much talk of what new features would be introduced to the new Blackberry 6 web browser. The browser in Blackberry Torch, while not being viewed as the most important aspect of Blackberry’s impressive arsenal of features, is obviously an important part of a smart phone and the impressive browsers on Apple’s iPhone and on certain high end Android phones mean that Research in Motion have had to act on their latest model. RIT have seemingly not shirked from this responsibility and have introduced some impressive new features to their browser.

One of the key features of the browser which has been lauded by Blackberry’s spokespeople has been that of the browser’s integration with the social feeds application on the Blackberry Torch. Blackberry users have, for a long time been able to add RSS feeds to their browser. With Blackberry 6 though, this option has become a much more simple, engaging and fun experience, adding, finding and reading new feeds.

The “Browser Options” screen has also undergone a facelift with the previous incarnations being criticised for being hard to manoeuvre around and confusing. The new version has, along with having it’s look change, been streamlined by having options that are no longer required (mainly due to improvements in performance) removed meaning that the options section of the browser works a lot more smoothly and is more user friendly.

With the new and improved touch screen also, comes new and improved features that dramatically impact on the performance of the browser. The new browser is now a lot more interactive with users now able to zoom and pinch the interface using the touch screen with the browser now reacting a lot more smoothly than it has in the past. Also, in order to help users read content that is more text heavy RIM have introduced an Automatic Font Size Adjustment” feature which mean users can quickly resize and confine the web based content to the width of the screen.

To read the latest review on the Blackberry Torch, visit Dial-A-Phone and also check out the latest news on their superb mobile phone and technology blog.