Make your own Computer Software - without Programming!


With a new software technology the computer software, so far rather a specialty, is becoming an everyday commodity you can do yourself. And you SHOULD do it yourself: no one knows better what you want to get out of the computer than you!

Software development, isn't that the métier of a few highly trained specialists, the "inaugurated high priests of the computer"? - Not for applications as you need every day. With a new software technology, "component based software development", also software is going to become a commodity. Make it yourself and you will reap a number of benefits:

1. You get exactly the application software you want - without endless haggling with an external software developer.

2. Your application software will have much more quality and user-friendliness than you could ever get by conventional programming.

3. You save the cost of an external developer.

1st Component Design (http://www.1st-components.com) has developed a product line called "DLG", specialized in user interface (UIF), that is designed for exactly that purpose. DLG is especially useful for UIF-intensive applications, with a large number of user-interface elements and much user interaction. User-interaction - that's the most tricky part of application programming.

This economic development, that's quite natural in history. Starting out as a specialty for a few people. Via to some kind of "high tech" (as computers and software are regarded nowadays). Finally down to an everyday commodity that's open to the average user.

For example, think of the automobile technology. In the beginning, up to around 1900, an automobile was just another fad for those few who could afford it. By 1908 the Ford "Model T" came on the market, and now that technology turned to something even the average user could master. But still, particularly in Europe, automobiles required a good deal of attention, and many automobile owners hired professional drivers ("chauffeurs") to handle their cars. Not before the second half of the 20. century more and more people drove their automobiles themselves. Today, handling a car is just too simple to hire a professional "chauffeur" (except for busses, trucks, etc.)

Odds are that software will walk the same road in the years to come. System and standard software will continue to be programmed conventionally by professional software developers. Application software, however, will more and more be "plugged together" by the users (or their applier organizations) themselves.

Building software in an Application Framework like DLG (also called: 'component based software development') as a 3-step job:

1.Build a framework by combining DLG elements supporting the features you designed for the target application.

2.Make full use of DLG's flexibility to override the DLG defaults. You can do it by coding options in form of keyword parameters..

3.Only application-specific operations are left to be programmed in the conventional way. Additionally, there might be details you want to be handled in a more sophisticated way than by the DLG options. If so, you will need to program a number of callback procedures.

Visit http://www.1st-components.com: There you can download many free sample programs (+ their source code) to see that this can be done in a few code lines only, even for rather complex UIF-elements.

My Computer is Making a Strange Noise.


Permission is granted for the article below to forward, reprint,

distribute, use for ezine, newsletter, website, or part of a product for sale as long as no changes are made and the byline,and the resource box below is included.

----------------------------------------

My computer is making a strange noise.

Your computer, much like your car, may sometimes alert you to the fact that

something is wrong. When you take your car to the repair shop you probably

tell the technician that it is making some strange noise that you have never

heard before. This often helps the technician diagnose the problem.

Computers have the same advantage. Often the noises that a PC makes will

tell you what the problem is. I have tried to match the noise, tuff to

do when writing it, with the problem. Listen to your PC and then check

below to see if you hear a match. Remember, if your PC is making noise

that it didn’t make when it was new means it has a problem and depending

on the severity could cause permanent damage.

Sounds Like…..

No noise, my computer use to have a noise put in the last few days has been

pretty quite.

Stop what you are doing and check the back of your PC, there will be a grill

area next to the power cord connector with a fan installed. If you can’t feel

any air coming out of the fan take a closer look to see if the fan is running.

If the fan is not turning (with the computer on), you have a problem with the

power supply. You must replace the fan as soon as possible. In most cases it

is cheaper to replace the power supply that houses the fan rather then attempting to replace the fan alone. The fan in your computers power supply is what cools the internal components and if it’s not working you will overheat the PC.

My computer makes a loud noise that is constant; it never made that sound before!

Again, this is probably a fan problem; follow the steps above to make sure its

not the power supply fan. Most computers also have internal fans, they may be

mounted on one of the expansion slots of your PC, you will most probably have

one or two attached to the CPU (Central Processing Unit). You must open the

computer case to check these. THIS IS IMPORTANT, the CPU fans must be working,

with the case off, turn your computer on, NEVER TOUCH INTERNAL COMPONENTS WHILE THE PC IS ON. Check to make sure all fans are running. If there is a fan that is not turning or is turning erratically turn your PC off and check the wire power connections to the fan. Restart the PC and check to see if this fixed the problem. If a fan is still not running replace it right away. The CPU fan cools the processor and its imperative that it remains on.

When I use my CD-ROM/CD-Writer, my PC makes loud noises and shakes the

whole thing!

The new high-speed CD devices make this noise because of the high speed,

this is normal.

Sometimes my computer is makes a clanging noise when it starts and it seems to be getting worse! This noise is perfect indication that your hard drive is dying.

Stop now and backup any important data that you have, because once the hard drive starts making a loud clanging sound it won’t be long before your PC stops booting to it. There is no way to repair the hard drive so you will need to purchase a new

one.

physical topology of a network refers to the configuration of cables, computers


What is a Topology?

The physical topology of a network refers to the configuration of cables, computers, and other peripherals. Physical topology should not be confused with logical topology which is the method used to pass information between workstations. Logical topology was discussed in the Protocol chapter .

Real Family Freebies

free stuff from the USA

Best Surveys for Cah Rewards

Real Free Ringtones and Logos

Win Free Prizes with the latest free contests

Main Types of Physical Topologies

The following sections discuss the physical topologies used in networks and other related topics.

Linear Bus

Star

Star-Wired Ring

Tree

Considerations When Choosing a Topology

Summary Chart

Linear Bus

A linear bus topology consists of a main run of cable with a terminator at each end (See fig. 1). All nodes (file server, workstations, and peripherals) are connected to the linear cable. Ethernet and LocalTalk networks use a linear bus topology.

Advantages of a Linear Bus Topology

•Easy to connect a computer or peripheral to a linear bus.

•Requires less cable length than a star topology.

Disadvantages of a Linear Bus Topology

•Entire network shuts down if there is a break in the main cable.

•Terminators are required at both ends of the backbone cable.

•Difficult to identify the problem if the entire network shuts down.

•Not meant to be used as a stand-alone solution in a large building.

Star

A star topology is designed with each node (file server, workstations, and peripherals) connected directly to a central network hub or concentrator

Data on a star network passes through the hub or concentrator before continuing to its destination. The hub or concentrator manages and controls all functions of the network. It also acts as a repeater for the data flow. This configuration is common with twisted pair cable; however, it can also be used with coaxial cable or fiber optic cable.

Advantages of a Star Topology

•Easy to install and wire.

•No disruptions to the network then connecting or removing devices.

•Easy to detect faults and to remove parts.

Disadvantages of a Star Topology

•Requires more cable length than a linear topology.

•If the hub or concentrator fails, nodes attached are disabled.

•More expensive than linear bus topologies because of the cost of the concentrators.

The protocols used with star configurations are usually Ethernet or LocalTalk. Token Ring uses a similar topology, called the star-wired ring.

Star-Wired Ring

A star-wired ring topology may appear (externally) to be the same as a star topology. Internally, the MAU (multistation access unit) of a star-wired ring contains wiring that allows information to pass from one device to another in a circle or ring (See fig. 3). The Token Ring protocol uses a star-wired ring topology.

Tree

A tree topology combines characteristics of linear bus and star topologies. It consists of groups of star-configured workstations connected to a linear bus backbone cable (See fig. 4). Tree topologies allow for the expansion of an existing network, and enable schools to configure a network to meet their needs.

Advantages of a Tree Topology

•Point-to-point wiring for individual segments.

•Supported by several hardware and software venders.

Disadvantages of a Tree Topology

•Overall length of each segment is limited by the type of cabling used.

•If the backbone line breaks, the entire segment goes down.

•More difficult to configure and wire than other topologies.

5-4-3 Rule

A consideration in setting up a tree topology using Ethernet protocol is the 5-4-3 rule. One aspect of the Ethernet protocol requires that a signal sent out on the network cable reach every part of the network within a specified length of time. Each concentrator or repeater that a signal goes through adds a small amount of time. This leads to the rule that between any two nodes on the network there can only be a maximum of 5 segments, connected through 4 repeaters/concentrators. In addition, only 3 of the segments may be populated (trunk) segments if they are made of coaxial cable. A populated segment is one which has one or more nodes attached to it . In Figure 4, the 5-4-3 rule is adhered to. The furthest two nodes on the network have 4 segments and 3 repeaters/concentrators between them.

This rule does not apply to other network protocols or Ethernet networks where all fiber optic cabling or a combination of a fiber backbone with UTP cabling is used. If there is a combination of fiber optic backbone and UTP cabling, the rule is simply translated to 7-6-5 rule.

Considerations When Choosing a Topology:

•Money. A linear bus network may be the least expensive way to install a network; you do not have to purchase concentrators.

•Length of cable needed. The linear bus network uses shorter lengths of cable.

•Future growth. With a star topology, expanding a network is easily done by adding another concentrator.

•Cable type. The most common cable in schools is unshielded twisted pair, which is most often used with star topologi

Protect Your Computer!

Surfing on the Internet can be a major problem if you

don't employ a reasonable amount of protective software.

Hackers, spyware and viruses all combine to make it

essential that you have a firewall, a spyware detector and an anti-virus program - all up to date and operating on your system.

1. Safety First - Get Yourself a Firewall Now!

If you don't have a firewall installed and operating on your computer then you are risking an attack by a hacker!

Without a firewall your computer is like an open door.

Private and confidential information may become available to hackers with basic computer skills.

Not only could information be stolen but a hacker could leave your computer in a state where they could return and take control of it.

A firewall monitors all incoming traffic and only allows in what you have authorised.

You can even make your computer "invisible" when on the

Internet so hackers are not even aware of your presence!

It's one of the few things all "experts" agree with so go to http://www.zonelabs.com and get your FREE firewall now...

2. Keep Those Spyware Cookies Off Your Computer!

Most of the cookies you collect while using the Internet are harmless and just kept on your hard drive in case you return to the same website again.

A new type of cookie is now accessing your computer and

sending nformation about your activities on the Internet back to it's originator. These cookies are known collectively as "Spyware".

So why not get yourself a FREE copy of Lavasoft's Ad-aware which s a spyware removal utility which will scan your PC memory, your registry, and hard drive(s) for known spyware and allow you to remove them.

You can even update the data files so that your protection is always up to date!

For your FREE copy go to : http://www.lavasoft.nu

3. You Have Got Anti-Virus Protection - Haven't You?

I have assumed that everyone now has some type of anti-virus software to protect their computers against virus attack.

There have been so many well documented cases which have caused considerable financial loss both to small and large companies.

Protect Your Computer System With A Comprehensive Security Policy


The most difficult part of creating a Security Policy for your

business is determining what, exactly, to include in it. Never

heard of a Security Policy before? You’re not alone. But whether

you are the only employee in your company or you have a small

staff working for you, you need to learn what a Security Policy

is, and then you need to create one.

In much the same way that a personnel policy informs employees of

things like vacation time accrual, performance review schedule

and other personnel-related issues, a Security Policy informs

your employees of the steps that are necessary to keep your

company’s network and computers secure. The policy is your

company’s rules and regulations that are enforceable, under law

if necessary, if breached.

A Security Policy will include rules and formal procedures that

are clearly written and laid out. But most importantly, the

information contained must be easy for employees of all levels to

understand.

And just as it is with young children, the content of your

Security Policy must be enforceable, and it must be enforced

consistently. Saying in writing that something is not allowed,

then allowing it to happen during regular work hours sends mixed

messages to your employees. They won’t know what really is right

or wrong, which will defeat the whole point of your Security

Policy. Inconsistent implementation also leaves you open to legal

liability.

Like any good policy, your Security Policy should be regularly

updated to reflect today’s rapidly-changing business environment.

Most of the time, you will be the person making these changes.

However, if your company is growing and adding staff, this may

not always be the case. Make sure the person responsible for

updating your company’s Security Policy has guidelines and

boundaries, and most of all, make sure you read and approve any

changes made by someone else.

Make presenting your Security Policy part of your new employee

orientation procedure. Make sure every employee reads the policy,

signs and dates a document certifying that it has been read, and

then keep the signed and dated certification in their respective

personnel folder. And every time that your Security Policy is

updated, make every employee read it again, and sign and date a

document stating that they have read the changes.

The types of topics you may want to cover in your company’s

Security Policy include but are not limited to:

* What can be loaded onto an employee’s computer from floppy disk

or CD

* What personal business, if any, can be conducted on the company

computer

* Which files or company information is allowed to leave the

internal network or is allowed to be sent out over the Internet

* Who is allowed to install new software and software upgrades

onto the system, and equally important, who is not allowed to do

this

* A password management and password change policy which includes

the acceptable length of passwords. Provide examples of

permissible/non-permissible passwords. Examples of

non-permissible passwords might include date of birth, names of

pets, nicknames, children’s names, etc.

* Who’s allowed remote access to your network from off-site

* Policies for locking keyboard or using password protected

screensavers when an employee’s PC is left unattended

* Who is allowed to attach their laptop or other portable

computing device to the network and what information they are

allowed to upload/download

* Guidelines for vendors and other visitors who may need access

to your network while they are on-site.

Whether you have one PC or several networked together, you have a

lot of money invested. Protect this critical business asset with

an iron-clad Security Policy.

Security necessities to prevent your computer from Spyware.


In the internet world it is vital for users to have a good spyware scan and removal tool because of the multitude of

different spyware, adware, Trojans and other malware constantly looking to attack your system. Many spyware tools available are free and those up for purchase typically do not exceed $30 to $40. Anti-spyware tools will greatly assist in protecting your privacy and restoring full computer functions that spyware may have taken over.

Spyware gets into your computer and invades users’ privacy. Individuals or companies install spyware when you download freeware or visit certain web sites so they may track your internet habits and find personal information such as passwords, email addresses and even credit card and bank account numbers. By eliminating these applications from running on your computer you will restore your privacy and you should notice a much more efficient computer system because spyware uses up

its resources.

Finding a good spyware tool can be difficult because of seemingly endless list of programs. Researching online and reading reviews can help you decide which one is best for your situation. NoAdware is recommended by some users and has been a popular download from some sites because it is a user friendly, easy to use program.

Speed Up Your Computer : Inner cleansing tips for your pc


Renewed energy and vigor applies to us, surfers, as well as to our computers, too. But when web

pages seem to load forever in your personal computer, and programs take a snail's creep to

complete, then it is high time to do some inner cleansing in your computer so as to make your

computer run faster.

Here's how:

1. Deleted Unwanted Files

Culprits are your jpegs and old tunes which you no longer access. These files lie buried in your

system, take up considerable hard disk space, and bog down your PC.

2. Use the disk cleanup tools.

All windows-based operating system are equipped with disk cleanup tools. These are the devices

that sweeps your hard disk clean automatically. It gets rid of unwanted files that initiates

sluggishness in your computer's performance.

3. Uninstall Obsolete Programs.

In reality, obsolete programs, just like unwanted files, occupy hard disk space and could

contribute to the PC's sluggish performance.

But be careful, though. Do not just hit the Delete key. Instead, go to Control Panel, select

Add/Remove Programs, and then click "Remove" for the programs you no longer want.

4. Run Anti-Spyware/Malware In Your PC.

Spywares run in the background without your knowledge. It collects information about you and your

surfing habits then transmits them back to its authors. It burdens your computer with additional

task processes, not to mention the annoyances of receiving unwanted e-mails from the Spyware's

authors.

So, to protect you from these annoyances brought about by these unwanted programs, run an anti-

spyware program.

5. Utilize Removable Media.

By transferring your pictures, audio, and video clips to removable media such as CD-RW discs, you

can free your hard disk from the unnecessary burden.

The result: Your PC now runs faster.

6. Finally, Run Scandisk and Defrag.

Point to Start > Programs > Accessories > System Tools, and click Defrag.

Defragmenting your hard drive on a regular basis speeds up your pc.

On XP, you cannot find the venerable scandisk program. Instead, click Start > Accessories and

click Command Prompt. At the prompt, type CHKDSK /f. The program will check your hard disk the

next time it boots up. Afterwards, you can run Defrag.

The History Of Laptop Computers

Have you ever wondered where the sleek new portable PC’s of today came from? How did they get so small, and so fast? It’s true that modern notebook computers have undergone many changes throughout the years.

In this article I will attempt to put together a rough history and timeline based on the laptop computer. I say rough because no one can really put a finger on who developed the first mobile computer. Anyways, let’s get started!

Computer buffs may not know who created the first laptop, but most will agree that Alan Kay of the Xerox Palo Alto research center was the first to come up with the idea of the portable PC in the 1970’s. Kay envisioned a portable computer much like the ones found today – Something small and lightweight that anyone could afford.

Some say that the first notebook that was actually built in 1979 by William Moggridge who was with Grid Systems Corp. It featured 340 kilobytes of memory, a folding screen, and was made of metal (magnesium). This was hardly like the laptop computers found today, but it was a start.

Arguably, the next mobile computer produced was in 1983 by Gavilan Computers. This laptop featured 64 – 128 megabytes of memory, a touchpad mouse, and even a portable printer. Weighing in at 9 pounds without the printer, this computer was actually only a few pounds heavier than notebooks found today.

Gavilan later failed largely due to their computer being incompatible with other computers – Mainly because the Gavilan laptop used their own operating system.

Apple Computers introduced the apple IIc model in 1984, but it wasn’t all that much better than what Gavilan had produced a year earlier. It did feature an optional LCD panel which had on impact on later notebooks.

Finally in 1986 a true laptop was created by IBM called the IBM PC Convertible. I say “true” because unlike a few of the others, this laptop didn’t have to be setup everywhere. And unlike the others it featured two modern 3.5 inch floppy drives, and space for an internal modem! Also found on the Convertible was an LCD screen and basic applications the user could use to create word documents, and schedule appointments.

Maybe most interesting was that the IBM PC Convertible sold for $3500! Of course you would be hard pressed to find that price tag on any laptop these days – (They have gone way down).

Since the late 80’s many manufacturers have come forward to produce new machines that are even faster and more powerful than their previous counterparts. These days the buyer has a lot of choice, and laptops are faster than ever.


The Top Twelve Threats No Computer User Should Ignore The internet is undoubtedly a fantastic resource for families and offers a rich vein of educational content. However, there are potential dangers - welcome to the seedy world of viruses, spam, trojans, pornography, spyware and other nasties.

Here are the Top Twelve Threats No Computer User Should Ignore:

1. Viruses - A computer program that copies itself. They often disrupt your computer system or damage your data. Viruses are usually received by email attachments so be careful opening anything from a dubious source. They can affect anyone, for example, the destructive Mydoom worm affected one out of three small and mid-sized businesses.

2. Spyware - Sends information about you and your computer to somebody else. Spyware may send the addresses of sites you have visited or worse still, transmit personal information. With today's concerns about identify theft this is a real worry. For example, CoolWebSearch may hijack web searches, home page, and other Internet Explorer settings. Spyware is normally received as part of shareware or freeware downloaded from the web.

3. IP Spoofing - A technique to gain unauthorized access to computers, whereby the intruder sends messages to a computer with an address indicating that the message is coming from a trusted host.

4. Trojans - An apparently legitimate computer program that is really intended to disrupt and damage computer activity by sending information, perhaps even passwords onto a third party without you knowing. As an example, recent emails entitled "Osama Bin Laden Captured" attempted to download the "Trj/Small.B." Trojan if the embedded URL was clicked. This trojan attempts to hijack the PC.

5. Spam - Unsolicited mail often promoting products of a dubious financial or sexual nature. Don't leave your email address on websites and internet bulletin boards as they are harvested by spammers.

6. Adware - puts advertisements on your screen. These take many forms including popups, popunders and advertisements that appear later, even if your browser is closed. Some are sent using the Windows Messenger service which allows a spammer to direct an advertisement straight to your computer by sequentially sending messages to IP addresses. Always irritating, they are also often of a pornographic nature.

7. Diallers - for those of us still with dial up modems, dialler programs redirect calls to a very expensive number. You won't know until you get the bill.

8. Hijackers - Hijackers take control of your web browser and may reset your home page, search bar and search pages. They can redirect you to undesirable sites or stop you going to particular sites.

9. Hackers - With so much personal data available online to anyone with a password you must be sure your password is secure. If you are using your mother's maiden name, your cat's name or your birthday then your password is at risk. Here are two tips for making a secure password. Method One - pick two random unrelated three letter words and two digits. Mix them up and what do you have? A secure password such as "red19cat" or "hotpin73". Method Two - pick a short sequence of words such as Now Is The Winter Of Our Discontent Made Glorious' and you have a password of "nitwoodmg". You could even change the I's and O's to digits.

10. Phishing - Emails purporting to come from reliable sources such as Paypal, Ebay or your bank. Often wanting you to verify your account details, they can look very realistic but are generally scams to harvest usernames and passwords. Always open a new browser winder and type the address there, rather than clicking on the link provided.

11. Hoaxes - Chain letters, scams, false alarms. At best they take up time and bandwidth but at worst vulnerable can be victims of fraud. Pass it on!

12. Stranger-danger - For those of us with children - do you know what they actually do when they are online? Are they working on homework tasks, downloading illegal music or pornography? Or are they chatting to strangers in chat rooms? You should consider blocking access to undesirable sites and logging their activity with a surveillance tool. Oh, and don't forget that where children are concerned, computers should always be kept in a family room and never in their bedroom.

Three Step Action Plan

There are three essential steps that should be taken to ensure your PC is kept threat-free.

Firstly, be sensible when opening attachments or following email instructions from apparently reputable sites.

Secondly, make sure you are using the latest service pack of Windows as Microsoft is continually closing loopholes to tighten up security.

Finally, there's a range of low cost tools such as firewalls, antivirus, spam blockers and spyware killers available. Like everything else they vary in quality and you tend to get what you pay for so always do your research first and perhaps try a free trial before getting your credit card out.

http://www.surfcontrols.com specializes in providing reviews and recommendations of top-rated tools to help protect your online experience. There's a quick reference list to dozens of top sites promoting different aspects of safe surfing packed with useful information and there's also a great set of top tips for safe surfing.

The Trials and Tribulations Of Learning A New Computer Skill


It all started several years ago when I walked out on a well-paid job of 11 years. I needed to get another job fairly quickly. My monthly mortgage repayments were pretty hefty. Something I hadn't thought about during my dramatic exit.

I eagerly poured over the job columns in the newspaper. Yikes, every job required Microsoft Word. To get another job, I needed to learn a new computer skill. So what? There are loads of people "in the same boat" in this ever-changing world. If they can do it, so can I.

First, I had to decide how! Group classes didn't work for me. At one, I got left behind - simply because I didn't grasp one little point and wasn't brave enough to admit that I, apparently, was the only one who hadn't "got it". At another, I actually knew more than others and felt frustrated listening to stuff I already knew. One-on-one training would be better, but too expensive.

My computer-whiz niece offered to help. She sat in my computer chair, took control of my mouse and went zap, zap, zap. All kinds of things appeared and disappeared on the screen at a fast rate. During all this activity, I stood behind her chair feeling quite dazed. Finally, she said with a smile "That's how you do . . . whatever it was she was trying to teach me (I still don't know)". Her smile was replaced by an incredulous look when I said that she had lost me after the second zap. Needless to say, I didn't pursue her kind offer any further and, as a result, we are still the best of friends.

What I really wanted to do was to learn at my own pace and at home. I decided to try the manual that came with my computer. At this stage, I was blissfully unaware of the terrors ahead.

I successfully started Microsoft Word and, then, clicked a couple of things. All of a sudden, I had a box on my screen that I couldn't get rid of. What do I do now? The manual didn't help. I was stuck and too scared to click anything else. I eventually rang a computer help line company I found in the Yellow Pages. Chris, the guy who answered, said to click the Cancel button in the box. I felt really stupid. Why didn't I think of that?

Over the next 4 weeks, I spent a small fortune ringing Chris (the computer help line company charged by the minute) and he started treating me like a long lost friend. I just felt more and more stupid as most of the solutions were as simple as clicking the Cancel button! I remember thinking, thank goodness, he's the only witness to my stupidity!

Eventually I discovered the Undo button. What a find! I could now undo any action I had taken. This made me feel heaps better. Then, an amazing thing happened. As I was able to do more and more things, thanks to Chris and the Undo button, I started to feel excited by what I was achieving and CONFIDENT. I still made mistakes (plenty), but I didn't feel scared. Nor did I ring Chris. I was CONFIDENT that I could work it out on my own. And I usually did.

I went on to learn many new computer skills and they all featured some Microsoft Word tools and menu commands AND an Undo button! And, guess what, I became so thrilled with Microsoft Word that I went on and created three tutorials for computer novices.

Three Things You Can Do to Keep Your Computer Running at Maximum Performance


Although there are many things that can affect the performance of your computer, there are a few simply things you can do each month to help keep your computer running at maximum performance. This article will focus on two problems that impact the performance of your computer and will then explain what you can do about it.

Problem #1: Computer Hard Disk Files

Your computer is always writing information to your hard disk, no matter what you do. Your computer attempts to keep all file information in the same location on your hard drive. As you add and delete files, blank spaces are left between your files. As you add new programs or files, your computer tries to use these blank spaces.

Over time, this reading and writing of files can affect the way your computer performs. The files eventually become scattered in multiple locations on your hard disk rather than in the same location.

Your computer will still find the information. However, the more scattered the information becomes on your hard drive, the more accesses your computer has to make to find (and gather) the information. This requires your hard disk to work harder and do more reading/writing than is necessary. It will slow down your computer by as much as 200% and causes increased wear and tear on your hard drive.

Problem #2: Spyware

If you use the Internet, at some point you will download a file or software program onto your computer. Sometimes you will know something is being downloaded to your computer. Other times you will have no idea. (Although this article will not talk about small files called “cookies”, you may want to look up information on this subject. Cookies are written onto your computer from the Internet.)

Free computer programs (often referred to as Freeware) are a big hit on the Internet. Every day thousands of users download these “free programs”. Although there are some great freeware programs, these programs often have advertisements or tracking code associated with their use. The term “Spyware” refers to programs that gather information about your computer and (Internet) surfing habits without your knowledge. This information is then sold to a third party company as a means of generating revenue.

The problem with Spyware is that it also impacts the performance of your computer. It can make your computer very sluggish and unresponsive.

Three Steps to Improved Computer Performance

Now that we’ve discussed two problems that affect the performance of your computer, let’s discuss three things you can do to get your computer performance back to normal. You should do these three steps in the order presented. Ideally, you should repeat them about once a month or whenever you notice a change in your computer’s performance.

Step #1: Delete Spyware

The first thing you should do is to delete spyware files or programs from your computer. To do this, you can use a free software program such as Ad-Aware SE Personal Edition from LavaSoft. To get the program, go to www.download.com and search for “Ad-Aware SE” (without the quotes). Select “Download Now” and follow the installation instructions. Once the program is installed, you can scan your computer for spyware files. Then, you can select and delete them from your computer.

Note #1: Always be sure to use the “Check for updates now” option to keep your program current.

Note #2: You need to be aware that when you delete spyware files, some of those “free” programs you downloaded may not continue to work correctly. If you have a program you’ve downloaded and want to continue to use, check very carefully what you select to delete from the “Scanning results” once the scan has been completed.

Step #2: Clean up your Hard Disk

Once the spyware is removed, you need to clean up temporary and unwanted files from your hard disk. To do this on your windows PC, select the start option in the lower left hand corner of your computer screen. Then, select the program option. Under the program option, select “Accessories”. Under the “Accessories” option, select “System Tools”. From the System Tools option, select “Disk Cleanup”.

Select the drive you want to clean from the pull-down menu and select OK. Usually, this is Drive C. If you have more than one hard drive, select one at a time. This program will then scan your computer for files that could be erased from your computer. You can safely erase all temporary and Recycle Bin files. You can also check the box of any other files you want the program to erase.

Step #3: Defrag your Hard Disk

Once all the spyware and temporary files are removed, you need to defrag your hard disk. This process simply rewrites your computer files so they are no longer scattered all over your hard disk, but are written in the same location for quick sequential access.

To defrag your hard disk on your windows PC, select the start option in the lower left hand corner of your computer screen. Then, select the program option. Under the program option, select “Accessories”. Under the “Accessories” option, select “System Tools”. From the System Tools option, select “Disk Defragmenter”. First, select the hard drive from your computer. Usually, this is Drive C. However, many computers have multiple hard drives. Select one at a time.

You can select “Analyze” to have the program check out the hard drive and see if it needs to be defragged. The program will prompt you at the completion of its analysis. Use the defragment option as prompted.

Note: If you’ve never used this option before, I would recommend that you select the defragment option.

Once, you’ve completed these three steps, your computer and hard disk should be able to operate at maximum performance. Don’t forget to repeat these steps at least once a month or whenever you notice a change in your computer’s performance.

Tips For the Late Blooming Computer User


For years I’ve been a stay-at-home mom, and I have only recently

gone back into the work force. I’ve done pretty well for myself, but

I could have really saved some time and frustration in the

beginning if I’d just known a few things about how to use a

computer.

I come from the era of the typewriter and adding machine, and the

computer was really intimidating to me at first. When I first

entered the business world, I lived in constant fear of losing my

document or crashing my machine. The word processor was my

enemy, as was business email. The only thing I could figure out

was how to open incoming messages. This was fine for trading

those cute stories about angels with my friends, but it had my

boss in a rage. Now, those of you who know the difference

between an attachment and a hyperlink can stop reading, but if

you’re as confused as I once was, read on. I’ve got some useful

tips.

First, face your fear. The computer is just a machine. It’s not

going to yell at you or blow up. Don’t be afraid to press a key

or click on an icon (those little picture boxes that link you to

programs and things.) Quite often I would end up staring at my

screen afraid to move, because I didn’t know what to do next and

I was afraid of the consequences of making the wrong decision. I

wasted so much time. Just dive in. If you end up doing

something that looks funny or wrong, you can almost always find a

solution.

Second, save your work. This is so important in word processing

programs. Have you ever been typing along, only to hit a wrong

key and have your entire document disappear? Boy, I sure have.

This doesn’t have to happen. If you just remember to hit "save"

(under the file menu on most all word processors) every few

sentences, the most you’ll ever lose is a phrase or two.

Third, get to know your undo and help keys. "Undo" simply

reverses the last action completed on the computer. If you hit

something that makes your document go all kerflooey, chances are

you can just click "undo" (under the edit menu usually) a time or

two and you’ll be fine. The "help" menu is another great asset

in both word processors and email programs. Rather than sitting

there wondering how many times you’ve already asked your boss to

explain something, just go to "help" and then type in a question

like "how do I set up columns, or "how do I attach a file," and

the help feature will walk you right through the steps. It can

take you a little time, but it’s better than constantly running

to your boss and looking helpless.

Fourth, make a computer savvy friend. This is so important. If

there’s someone in the office who seems to be really good at the

computer, bring them some cookies or take them to lunch and ask

them if you can have a little of their time. Have them sit with

you for a few minutes while you work on a document or email. Do

this on a few different occasions. Chances are they’ll not only

be able to answer your questions, but they’ll be able to point

out some great shortcuts for you, too.

Computers don’t have to be the unconquerable beasts they

sometimes appear to be. Just face your fear and approach the

machine calmly and logically, and chances are you’ll be doing

fine. The better you are at using your computer, the better

you’ll be at your job, and the happier people will be with you!

Tips For Finding Great Deals On Computer Accessories & Supplies


Tip #1. Do a Google search. Don't be to general in your search, type

in exactly what your looking for. Try putting the words you

type in quotes to narrow the search.

Tip #2. Go shopping at the office supplies and discount clubs. You

may find some discount clubs like Costco & Sams have a 6

month return policy, check your location. California stores

have a 6 month no questions asked policy, and yes, this means

Computers and Software too, even if the package is open and

you have used it. Just make sure you can put it back in the box

and you have the receipt.

Tip #3. Don't forget to check eBay.

Tip #4. Try other stores like Fry's, Best Buy, Circuit City, Dell, Gateway,

CompUSA.

Tip #5. If your looking for used try craigslist.org, eBay.com,

http://auctions.yahoo.com

Tip #6. Compare prices at pricescan.com, pricewatch.com,

pricegrabber.com, price.com, epinions.com, shopper.cnet.com,

streetprices.com & bizrate.com

Tip #7. Check the Sunday newspaper.

Tip #8. Staples, Office Max and Office Depot have price matching. So

If one of them has a sales you can take the sale ad to any one

of them and they will honor it. Helpful if the store having the

sale is not to close to you.

Hope this helps, good luck and thanks for reading.