Custom Search

السبت، 24 أبريل 2010

iPhone



The iPhone is a line of Internet- and multimedia-enabled smartphones designed and marketed byApple Inc. It functions as a camera phone (also including text messaging and visual voicemail), aportable media player (equivalent to a video iPod), and an Internet client (with e-mail, web browsing, and Wi-Fi connectivity)—using the phone's multi-touch screen to provide a virtual keyboard in lieu of a physical keyboard.

The first-generation phone was quad-band GSM with EDGE; the second generation phone addedUMTS with 3.6 Mbps HSDPA; the third generation adds support for 7.2 Mbps HSDPAdownloading but remains limited to 384 Kbps uploading as Apple has not implemented the HSPAprotocol.[17]

Apple announced the iPhone on January 9, 2007, after months of rumors and speculation.[19]The (retroactively labelled) original iPhone was introduced in the United States on June 29, 2007 before being marketed in Europe. Time magazine named it the Invention of the Year in 2007.[20]Released July 11, 2008, the iPhone 3G supports faster 3G data speeds and assisted GPS.Apple released version 3.0 of the iPhone OS for the iPhone (and iPod Touch) on June 17, 2009.The iPhone 3GS has improved performance, a camera with higher resolution and video capability, and voice control.[22] It was released in the U.S., Canada and six European countries on June 19, 2009, in Australia and Japan on June 26, and saw international release in July and August 2009.

Intel Core 2

is a brand encompassing a range of Intel's consumer 64-bit x86-64 single-, dual-, and quad-core CPUs based on the Intel Core microarchitecture. The single- and dual-core models are single-die, whereas the quad-core models comprise two dies, each containing two cores, packaged in a multi-chip module.[1] The introduction of Core 2 relegated the Pentium brand to the mid-range market, and reunified laptop and desktop CPU lines, which previously had been divided into thePentium 4, Pentium D, and Pentium M brands.

The Core microarchitecture returned to lower clock rates and improved the usage of both available clock cycles and power when compared with the preceding NetBurst microarchitecture of thePentium 4/D-branded CPUs.[2]The Core microarchitecture provides more efficient decoding stages, execution units, caches, and buses, reducing the power consumption of Core 2-branded CPUs while increasing their processing capacity. Intel's CPUs have varied wildly in power consumption according to clock rate, architecture, and semiconductor process, shown in the CPU power dissipation tables.

Core-based processors do not have Hyper-Threading Technology found in Pentium 4 processors. This is because the Core microarchitecture is a descendant of the P6 microarchitecture used by Pentium Pro, Pentium II, Pentium III, and Pentium M. Core 2 also lacks an L3 Cache found in the Gallatin core of the Pentium 4 Extreme Edition, although an L3 Cache is present in high-end versions of Core-based Xeons and Hyper-Threading is present on select Atom processors. Both an L3 cache and Hyper-threading is present in current Nehalem and future Westmere processors.

The Core 2 brand was introduced on July 27, 2006, comprising the Solo(single-core), Duo (dual-core), Quad (quad-core), and in 2007, the Extreme (dual- or quad-core CPUs for enthusiasts) version.[4] Intel Core 2 processors with vPro technology (designed for businesses) include the dual-core and quad-core branches .

الخميس، 22 أبريل 2010

Different Types of Computer Viruses

There are Different Types of Computer Viruses could be classified in (origin,techniques, types of files they infect, where they hide, the kind of damage they cause, the type of operating system or platform they attack) etc. Let us have a look at them…

___________

Computer Virus is a kind of malicious software written intentionally to enter a computer without the user’s permission or knowledge, with an ability to replicate itself, thus continuing to spread. Some viruses do little but replicate others can cause severe harm or adversely effect program and performance of the system. A virus should never be assumed harmless and left on a system. Most common types of viruses are mentioned below:

Resident Viruses
This type of virus is a permanent which dwells in the RAM memory. From there it can overcome and interrupt all of the operations executed by the system: corrupting files and programs that are opened, closed, copied, renamed etc.

Examples include: Randex, CMJ, Meve, and MrKlunky.

Direct Action Viruses
The main purpose of this virus is to replicate and take action when it is executed. When a specific condition is met, the virus will go into action and infect files in the directory or folder that it is in and in directories that are specified in the AUTOEXEC.BAT file PATH. This batch file is always located in the root directory of the hard disk and carries out certain operations when the computer is booted.

Overwrite Viruses
Virus of this kind is characterized by the fact that it deletes the information contained in the files that it infects, rendering them partially or totally useless once they have been infected.

The only way to clean a file infected by an overwrite virus is to delete the file completely, thus losing the original content.

Examples of this virus include: Way, Trj.Reboot, Trivial.88.D.

Boot Virus
This type of virus affects the boot sector of a floppy or hard disk. This is a crucial part of a disk, in which information on the disk itself is stored together with a program that makes it possible to boot (start) the computer from the disk.

The best way of avoiding boot viruses is to ensure that floppy disks are write-protected and never start your computer with an unknown floppy disk in the disk drive.

Examples of boot viruses include: Polyboot.B, AntiEXE.

Macro Virus
Macro viruses infect files that are created using certain applications or programs that contain macros. These mini-programs make it possible to automate series of operations so that they are performed as a single action, thereby saving the user from having to carry them out one by one.

Examples of macro viruses: Relax, Melissa.A, Bablas, O97M/Y2K.

Directory Virus
Directory viruses change the paths that indicate the location of a file. By executing a program (file with the extension .EXE or .COM) which has been infected by a virus, you are unknowingly running the virus program, while the original file and program have been previously moved by the virus.

Once infected it becomes impossible to locate the original files.

Polymorphic Virus
Polymorphic viruses encrypt or encode themselves in a different way (using different algorithms and encryption keys) every time they infect a system.

This makes it impossible for anti-viruses to find them using string or signature searches (because they are different in each encryption) and also enables them to create a large number of copies of themselves.

Examples include: Elkern, Marburg, Satan Bug, and Tuareg.

File Infectors
This type of virus infects programs or executable files (files with an .EXE or .COM extension). When one of these programs is run, directly or indirectly, the virus is activated, producing the damaging effects it is programmed to carry out. The majority of existing viruses belong to this category, and can be classified depending on the actions that they carry out.

Companion Viruses
Companion viruses can be considered file infector viruses like resident or direct action types. They are known as companion viruses because once they get into the system they "accompany" the other files that already exist. In other words, in order to carry out their infection routines, companion viruses can wait in memory until a program is run (resident viruses) or act immediately by making copies of themselves (direct action viruses).

Some examples include: Stator, Asimov.1539, and Terrax.1069

FAT Virus
The file allocation table or FAT is the part of a disk used to connect information and is a vital part of the normal functioning of the computer.
This type of virus attack can be especially dangerous, by preventing access to certain sections of the disk where important files are stored. Damage caused can result in information losses from individual files or even entire directories.

Worms
A worm is a program very similar to a virus; it has the ability to self-replicate, and can lead to negative effects on your system and most importantly they are detected and eliminated by antiviruses.

Examples of worms include: PSWBugbear.B, Lovgate.F, Trile.C, Sobig.D, Mapson.

Trojans or Trojan Horses
Another unsavory breed of malicious code are Trojans or Trojan horses, which unlike viruses do not reproduce by infecting other files, nor do they self-replicate like worms.

Logic Bombs
They are not considered viruses because they do not replicate. They are not even programs in their own right but rather camouflaged segments of other programs.

Their objective is to destroy data on the computer once certain conditions have been met. Logic bombs go undetected until launched, and the results can be destructive.

Make Money Online Taking Simple Surveys – PureProfile.com Review

Internet money making is a huge business today due to global financial crisis. More and more people crave to make some fast cash to pay off their loans, and Internet jobs is a great way out. But the crisis has caused a new problem – the amount of Internet scams has doubled (if not tripled) over the last decade.

Web-masters earn more cash by scamming people, that’s way it’s vital to stay up to date and join only trusted websites. One of such websites (trusted ones) is Pureprofile.com. So now more about this make money online opportunity.

Pureprofile.com has been around for a while, and I haven’t found any negative replies about this company so far. At first they were officially launched in the UK in 2002. After a successful start they launched a global version one their website in 2006 (the one you can see now). During the time of their existence they have gained good survey company reputation and there are thousands of registered members.

But there are still some questions to solve, most of us have read about making money online with surveys and it does sound like a scam, so

How Does PureProfile.com Work? | Can We Earn With It?

According to all positive replies, this website does work, and you won’t become super rich with this website (but you can start earning cash online). All you have to do is simply register with Pure Profile and answer some questions based on different factors, including your personal likes (taken from the profile). Usually you get email notifications about available surveys, where businesses ask you thought about their product or service, not a big deal actually, but you will earn for doing so. Every email has a link to the survey and usually the number of available surveys is limited.

Another question is

How And How Much Do I Get Paid At Pure Profile?

Pureprofile’s website states that you will receive minimum of £1.00 for every survey you complete. You will have to complete all the survey to receive a credit, and they do have tricky questions to make sure that you actually read the questions. It takes no more then 5 minutes to see your money roll in, don’t expect 20 surveys per day, but there are a sufficient amount of these available.

As for the redemption – you have several choices of receiving you cash. You can either:

1. Have PureProfile sending you a cheque. However, you need at least £25.00 to request money by cheque.
2. Money earned on PP can be redeemed for points, which on their turn can be spent on various merchandise at their partner stores.

3. Exchange earned money for CD-WOW voucher. £8.99 and £14.99 vouchers are available for redemption at CD-WOW.com
4. Be really nice and donate money to the local charity organizations.

Pureprofile.com’s Registration Process

Registration with Pureprofile is pretty much easy and straight forward. In order to become a member you must be at least 18 years of age. Registration takes no more then 30 seconds (that’s what their website says ;) ). So to to register just click the banner in this post. They don’t require any personal information except your full name, address and email.

Earn Money Referring Friends

If you don’t feel like filling in surveys, you can always spread the word and get paid for it. Pureprofile.com has a bonus referral program, and you will receive up to 5 pounds per every friend that joins under your personalized link.

Getting referrals has never been easier, you can write about this website in your blogger.com/wordpress.com blog, or send the link to your friends on FaceBook. I bet a lot of them would be highly interested in the offer.

New members are easily attracted to this website, because when being a member of Pureprofile you get credited right away, and no one has to wait for their money. You can say that you

“…do recommend this site for those of you wanting to earn a few extra pounds in your spare time. You don’t have to put in quite a lot of effort to begin earning money, just complete your profile and once that is done you will receive offers from the advertisers…”

I have some experience with this website and I can certainly tell about the pros and cons of this website.

:The main advantages are

Minimum of £1.00 for every survey you take.
One pound is not a limit, you can get up to £4 for every survey.
Money are credited instantly (in several minutes).
There are several options of receiving your money.
Surveys are pre-screened to match your likes.
You never receive spam from them
Surveys are really fast and easy to complete.

… and the disadvantages

Not that much surveys are available
It’s kind of hard to redeem money for points and vouchers.

So, this survey website is for those, who don’t want to be scammed and would like to start making money online. Even if you don’t have many surveys to complete, or don’t like to – there is always an option to refer your friends.

Difference Between DSL and ADSL

Many of us may already know that there is no any difference between DSL and ADSL; the latter is a type of the former. To understand better, one should foremost construe the terms, DSL and ADSL, individually. Let us first see what DSL is all about, before we start to discuss on ADSL.


?What is DSL

DSL (Digital Subscriber Line), also referred as xDSL (x stands for different DSL techniques), is a group of technologies that provide high-speed Internet access, by using the ordinary telephone lines.

It converts the ordinary telephone line into a high-speed passage for digital audio, video and data. DSL technology is widely used for business and personal purpose. The technology is simple as the setup required for network already exists. It does not keep the telephone line busy as is the case in the Imternet access used in the Dial-up connection. However, the speed depends on the distance between the Internet service provider and the user. More the distance, less will be the speed of the Internet access.


?What is ADSL


ADSL is a type of asymmetric DSL which allots more bandwidth for downstream than upstream. The downstream speed (1.5-9 Mbps) is higher than the upstream speed (1.5 Mbps). The downstream speed depends on the distance of the user from the service provider.