Friday, March 15, 2013

Using Computers




These days it's strange to hear people say, "I'm just not computer literate," as computers have evolved from archaic scientific calculators to simple point-and-click type machines. We suspect that today's "computer illiterates" are people who haven't taken the time to experiment with such a machine. And we strongly believe that spending just twenty minutes with one could turn the most adamant technological caveman into any one of those who have fun wreaking chatroom havoc on the Internet today.





Today, one only needs to learn how to manipulate a mouse, punch a few buttons on a keyboard, or really just turn the thing on to use a computer. It's hard for some folks to believe, but the computers of this generation almost run themselves! For fun, let's investigate just how little knowledge these thousand-dollar machines actually require.





Can an absolute newbie operate a computer without knowing how to use a mouse or keyboard? Assuming that a computer is set up to operate on voice command - sure! Voice command software allows users to tell a computer what to do and the computer responds by fulfilling the user's commands. Although it's pretty new and still under development, voice directed technology has already infiltrated consumer service related systems.





Think back to the last time that you paid a bill over the phone. Instead of speaking to a human being, chances are that you spoke to a computer that not only responded to what you said and followed the commands that you gave it, it also asked you for more information such as your full name or credit card number. In this case, a person (such as yourself) operated a computer without even knowing it!





Can an absolute newbie sit down at a computer without knowing how to use one? Assuming that a computer is set up to operate on touch command - the answer is again, yes! Touch command software allows users to literally touch objects on a monitor and tell the computer what to do with a finger. Known as "kiosks," these programs are already in use world wide at ATM machines, employment centers, and in health monitoring systems.





Neither a mouse nor a keyboard is required. A computer user only needs to touch various boxes on a screen to control a computer. Sure, the programming behind such technology is extensive and advanced, but to the end user, it makes computer use less intimidating and plain easy.





Of course when we talk about operating a computer, we envision more involvement than speaking on the phone or touching things on a screen. The above illustrations were just a couple of examples of how far computer technology has grown, and how far we've pushed "user-friendliness" to its limit. Eventually, the keyboard and mouse will have to play a role when computer newbies have to work with one as a cash register, as a hotel booking program, or as a library's catalog system.





These requirements don't make computers any less easier to operate, but they don't make them that much harder either. So much of today's software is designed to accommodate the experience of a new user that anyone could get connected to the Internet, send an email message, and download an MP3 file within the first five hours of purchasing a personal PC.


Thursday, March 14, 2013

Viruses




Over recent years, computers have become synonymous with viruses and viruses don't show any signs of disappearing any time soon. In recent news, LiveScience.com reported that "Before the month is even done, April has set a record for virus e-mails."1 In the past, we would be comfortable in telling new computer users not to worry about viruses and that catching a computer virus is rare. Today, that would be some of the worst advice we could give anyone. As reported in countless news reports, computer viruses are rampant and they're extremely worrisome. This article will describe what viruses are and then point you in the direction of some rather unique protection and prevention.





In short, a computer virus is a software program designed to destroy or steal data. It attacks computers via distribution - often unknowingly - through email attachments, software downloads, and even some types of advanced web scripting. Viruses that destroy data are known as Trojan horses, viruses that explode their attacks are called bombs, and viruses that duplicate themselves are called worms. Some viruses are a combination of each, however they can be further identified according to where they're located on a computer.





A virus originating from the boot sector of a computer is a boot-sector virus and this nasty devil does its dirty work the moment a computer is turned on. A virus that attaches itself to (infects) other programs is a file virus and activates the moment that an infected program starts. File viruses may also be referred to as parasitic viruses, however should a virus work from both the boot-sector and from an infected program, the virus is then known as a multipartite virus.





Why viruses exist remains a mystery, however we had privy access to the mind behind a virus programmer who explained his motivation behind his destructive inclinations. Apparently, this person had a deep grudge against a popular online service which shall remain unnamed. In this hacker's mind, the online service failed to do a quality job in protecting children from online smut and as retaliation, he created and distributed a virus to as many file libraries of this service as he could. His intentions were to disable the computers of the online service's users so much that they wouldn't be able to connect for days. In his mind, the loss of connection meant loss of revenue for the online service.





Although the malicious code that this person generated may have worked for a small percentage of users, sufficed to say, the online service continued on and still exists today. Despite his motivation or intention, his efforts were null.





We wouldn't be surprised to learn if other motivations behind spreading viruses were similar to this person's, but that doesn't justify the damage that viruses do. Innocent people become pawns for the evil plans of others who've convinced themselves they're doing the "right" thing.





To protect a computer from getting a virus, or clean a virus from a computer system once infected requires the use of an antivirus utility. But may be something else we can do. Perhaps we could make an effort to educate the people who want put viruses into the public about ways to display dissatisfaction with a service or product that don't involve harming innocent parties. In doing so, we just might reduce the number of virus news stories and protect our own investments at the same time.





PPPPP





Word count 578



1 Source: http:// news.yahoo.com/s/livescience/20070426/sc_livescience/recordsettingspameffortturnscomputersintozombies


Working With Computers




Well, we've been warned that this time would come - probably from the earlier eighties on. Yes, computers have finally taken over and if you doubt it, we're here to convince you - but not because we want to or because we can. We want to convince you that if you don't take the necessary steps to control that reign, you're going to be left behind further than you could have ever imagined.





Computers are everywhere. Take a moment to try and think of a place a business where you didn't see a computer in use. From the small local corner store to the largest hospital, computers are in every gas station, grocery store, bank, restaurant, beauty shop, and doctor's office around. From a consumer's point of view - you may not think that's much to worry about. But along with computers, we've also been infiltrated with a little thing called "self-service." Today, there are more self-serviced resources than ever and in an effort to synchronize them with headquarter databases, they're provided via your inescapable computer.





Here are some examples. Banking is self-serviced through the desktop-clad ATM machine. Gas stations are self-serviced through a menu-clad touch screen kiosk. Most cash registers are Windows XP or Vista machines that send purchase details back to headquarters via the Internet (or a small Intranet). Having your weight, blood pressure, and heart rate measured and recorded is now a digitized process. Even ordering a pizza is now a simple matter of dialing from a wireless cell phone and making a few selections from series of pre-programmed menus!





The important thing to realize here is that this phenomenon isn't a new convenience - it's a new requirement. And if you haven't jumped onto the binary wagon, you're going to face a few problems. For just as this new lifestyle was once predicted, we're going to predict that "the old ways" will slowly disappear.





We're going to predict that all paper-based transactions (checks, money orders, etc.) and documentation (think of the old filing cabinet system) will disappear. We're going to predict that chips will replace everything that was once transported from one location to another through the trusty post office. And we're going to predict that homes will become less cluttered with stacks of paper and that our natural resources will flourish as a result of it.





This all sounds fine and dandy of course, but if you're not computer savvy, you're going to feel a little lost once the choice has past and the revolution is 100% complete. Fortunately, computer systems are designed in a way that even a child can manipulate them. In fact, if you can remember that most systems are designed along the line of menus and the selections of a few options on these menus, you'll do just fine no matter how many buttons there are to push.





For example, when you're faced with an electronic system, look for a main menu. Most main menus display themselves as soon as a device is turned on, so chances are that if you're standing before a device that shows a bunch of choices to do something, you're looking at a main menu. The buttons on these main menus of course take you to additional menus, which in turn give you even more choices to make. And all of those choices will eventually bring you to the service that you need. One very important choice you'll want to keep your eye on is the option to return to the main menu. This way, you can return to the beginning of a system and start over in case you get lost among the way.





Another important choice that you want to keep your eye on is the choice to get help! This option may not be available on every device that you encounter, but when it is available, be sure to use it.





There's just no way around it. Computers and computerized systems are here to stay. There's no need to fear them - but you surely can't avoid them. Just remember the menu system and you'll soon discover that you can approach and use these things as if you designed them yourself.


What's That File?

In an effort to be "user-friendly," Windows (and perhaps some other operating systems) hides the most important part of a file name from new computer users: the extension. Okay - we're assuming that the reasoning behind hiding extensions is a "user-friendly" one because we just can't come up with any other reason for hiding them. No harm could ever come from seeing an extension, but plenty could be learned from it. Fortunately you have this article to guide you through some of the most common extensions that you'll run into.

But before you can see file extensions, you need to turn them on. From Windows Explorer, click on the "Tools" menu, and select "File Options." Click the "View" tab and then uncheck the box next to "Hide file extensions for known file types." Click "OK" and you'll notice that the files in Windows Explorer show a dot and group of three letters after their names. That dot and group of three letters is known as an "extension," and the extension explains what kind of file it is.

A file could be a plain text file, an image, a sound, a video, or program. But without seeing the extension, you wouldn't know it unless you double-clicked on it. The following list defines some of the most common extensions that you'll find on your computer.

.au - This extension indicates a sound file. Most sound players will load up and play this kind of file.

.art - This extension indicates an image file that was compressed with AOL (America Online) technology. Both Internet Explorer and the AOL service software can display this kind of file, however if you don't have AOL installed on your system, Internet Explorer will display it.

.avi - This extension indicates a video file playable by most multimedia viewers including Microsoft's Media Player.

.bmp - This extension indicates another image file that might have originated from Windows Paint program.

.dll - This extension indicates a Dynamic Link Library which may contain additional programming code for software. Many different programs often share Dynamic Link Libraries and you'll find a bunch of them in the Windows/System directory (but don't ever delete them)!

.exe - This extension indicates a program or an application like Microsoft Word, Internet Explorer, or Outlook Express. Use extreme caution when downloading .exe files from the Internet since malicious programmers like to hide viruses in these types of files.

.gif - This extension indicates another image file and it stands for "Graphics Interchange Format." .Gif files are often smaller than .bmp files (described earlier) and they're commonly found on Internet web pages.

.jpg - This extension indicates yet another image file and it stands for "Joint Photographers Experts Group." Like the .gif file, it's commonly found on Internet web pages, however it's much smaller than both the .gif image and the .bmp image.

.mid - This extension indicates a sound file created with a Musical Instrument Digital Interface. Windows Media Player will open and run these files, however they don't sound like normal .wav or .mp3 files (described later). .Mid files are designed to product synthetic sounds using a computer's sound card.

.mp3 - This extension indicates a sound file that authentically reproduces voice and/or music. Windows Media Player will open and run this kind of file.

.scr - This extension indicates a screen saver file.

.sit - This extension indicates a Macintosh archive StuffIt file. They will not open on a Windows system without a special utility.

.ttf - This extension indicates a font especially designed for use on a Windows system. It stands for "True Type Font."

.txt - This extension indicates a plain text file that can be opened with Notepad.

.wav - This extension indicates a sound file that like the .mp3 file, can be opened with Windows Media Player or Windows Sound Recorder. .Wav files are much larger than .mp3 files.

.zip - This extension indicates a Windows archive WinZip file. They will not open on a Macintosh system without a special utility.

Tuesday, March 12, 2013

Numbers Patterns


3 PDFs about numbers and patterns ( it's serious shit )
find strategies behind numbers !! ( its deeper than you think)
link to 12 mirrors here : Download

Saturday, March 9, 2013

sports live 2013


  1. watch live events in all this categories in one place : http://goo.gl/u4L5n
  2. 1 Association football
  3. 2 American and Canadian football
  4. 3 Australian rules football
  5. 4 Auto racing
  6. 5 Baseball
  7. 6 Basketball
  8. 7 Bowling
  9. 8 Boxing
  10. 9 Cricket
  11. 10 Cue sports
  12. 11 Cycling
  13. 12 Darts
  14. 13 Ice hockey
  15. 14 Rugby league
  16. 15 Rugby union
  17. 16 Team Handball
  18. 17 Tennis
  19. 18 Rodeo/Bull Riding
  20. 19 Running
  21. 20 Swimming
  22. 21 Ultimate Frisbee
  23. proof links :
  24. Tennis (BNP Paribas Open Masters 1000 Indian Wells):
  25.  Fernando Verdasco - Jarkko Nieminen   link : http://goo.gl/bvBej
  26.  
  27. Basket: NCAA : http://goo.gl/zfRfi

Friday, March 8, 2013

clintes


Monday, March 4, 2013

05-03-13 | US Socks 5


Insane! Facts about Gambling


Learn everything you never knew about your favorite casino games! Article here

Snippet:  #15 All the numbers on a roulette add up to 666,hence why roulette is referred to as
"the devil's game" Well, after all the money we've lost on roulette wheels, at least that's what we call it.
For more check out the original post here

Tips for Younger and more Beautiful Skin



Check out Proven Tips for Healthy & Younger Skin! #2 is awesome! Tips here
Adevrtisement link : Check out the Coolest Celeb Ink!

Sunday, March 3, 2013

Metal gear solid lovers

Facebook fan page : link

10 Most Hilarious Google Search Results



#10 A Piece Of Paper Worth Signing

#9 A War On Investigators


Things you learn on google. Love #1 for full list  Continue here

12 tips to setting the perfect mood


How to set the mood: 12 tips every guy needs to know, # 2 is a MUST!! http://bit.ly/WpnVdo

Condoms are More Interesting Than You Think


Everything you never knew about condoms. http://bit.ly/WBrisG

The 12 Hottest College Cheerleading Squads


The Knights, Horned Frogs, Trojans and Longhorns... but who is the #1 hottest NCAA cheer squad? http://bit.ly/WBrckC

3/3/2013 | David Ferrer - Rafael Nadal


Guy Throws Girlfriend Off Canyon 400ft!


Dog Walking Around Store Like A Human Being!


Spectacular Sex Moves

Publisher: Quiver
Sonia Borg Ph.D.
2011
Language: English
ISBN-10: 1592334806
ISBN-13: 978-1592334803
160 PAges
PDF
73.1 MB
(7 mirrors link)

Kate Upton 2013 Sports Illustrated Swimsuit Photoshoots


46 JPGs | Mixed Resolution | 19.8 MB


Thursday, February 28, 2013

Windows7 activation no key required (still get updates)



Download the activation tool here: http://tinyurl.com/cap7qte
1. run cmd as admin and paste this code and press enter:
2.copy one of these line:
for 32bit:
dism /online /remove-package /PackageName:Microsoft-Windows-Security-­WindowsActivationTechnologies-Package~31­bf3856ad364e35~x86~~7.1.7600.16395
for 64bit: 
dism /online /remove-package /PackageName:Microsoft-Windows-Security-­WindowsActivationTechnologies-Package~31­bf3856ad364e35~amd64~~7.1.7600.16395
3.run removewat as admin. press removeWAT and wait for program to close itself.
4. reboot and enjoy!

Activate Adobe Photoshop Cs6 No keys needed



In this video I'm showing you how to activate your Adobe Photoshop CS6,without any keys.
Follow these steps:
1)Download and extract crack: http://tinyurl.com/cc7d753 
2)Copy the amtlib.dll file to your install directory:
For 64bit: C:\Program Files\Adobe\Adobe Photoshop CS6 (64 Bit).
For 32bit: C:\Program Files (x86)\Adobe\Adobe Photoshop CS6
3)Past the file there and click replace.
4)That's it!!! you're done enjoy.
(NOTE:You need to install Photoshop as trail first).
Music:Sneak by Zweihander .

Battlefield 2 crash to desktop Fix



This Bf2 crashing problem solution,it worked for me!!
Daemon tools: http://adf.ly/K0k65
Mini image: http://adf.ly/K0k9Z
Music By :David guetta - every time we touch:http://adf.ly/K0kKn

How to install Themes/skins on motorola v3i EASY!!



Hi,This is my first video i hope you like it,it's really easy and simple.
Links to donwload The files you need:
Skinsmanager: http://adf.ly/JoycI
Moto driver: http://adf.ly/JoyVG
If you need any help just ask.
Thnx .

Socks 5 29/02/2013

watch all football match's everyday

Wednesday, February 27, 2013

Google Chrome Harlem Shake video explanation


  1. good luck.


watch harim sultan season 3 here :http://tinyurl.com/bt9cljm

Fallout 3 xlive.dll Problem fix! win7



Hi,here's how i fixed this xlive.dll problem.
You need to download the following files:
-xlive.dll: http://tinyurl.com/cgxxu5s
-msidcrl40.dll: http://tinyurl.com/cbdreom
after that,you need to copy these two files and past them in Fallout 3 folder.
that it it should work now.
i hope it works for you... :)