Thursday, October 30, 2008

What is broadband?

What is broadband?
The term broadband commonly refers to high-speed Internet access. The FCC defines broadband service as data transmission speeds exceeding 200 kilobits per second (Kbps), or 200,000 bits per second, in at least one direction: downstream (from the Internet to the user’s computer) or upstream (from the user’s computer to the Internet).

HOW IS BROADBAND DIFFERENT FROM DIAL-UP SERVICE?
-Broadband service provides higher speed of data transmission—Allows more content to be carried through the transmission “pipeline.”Broadband provides access to the highest quality Internet services—streaming media, VoIP (Internet phone), gaming, and interactive services. Many of these current and newly developing services require the transfer of large amounts of data which may not be technically feasible with dial-up service. Therefore, -broadband service may be increasingly necessary to access the full range of services and opportunities that the Internet can offer.
-Broadband is always on—Does not block phone lines and no need to reconnect to network after logging off.
-Less delay in transmission of content when using broadband.

What are the benefits of broadband?
It's fast ... generally 10-20 times faster than your existing dial-up modem. A typical dial-up modem operates at either 28.8 kbit/s or 56 kbit/s. A broadband connection operates at between 256 kbit/s and 10 Mbit/s, depending on the service you have selected.
To give you an idea of the difference that this speed can make, a 3.5 minute MP3 music file takes about 18 minutes to download using a 28.8 kbit/s dial-up modem but only about 21 seconds on a 1.5 Mbit/s broadband link. An e-mail containing a family photo takes about 55 seconds at 28.8 kbit/s but only about three seconds on a 512 kbit/s link.Broadband's high speed gives you access to applications that are either not feasible at the speed of a dial-up connection or just annoyingly slow.Broadband can allow you to transfer large files of text or graphics at high speeds give you instant access to webpages, even those with large amounts of graphics that are typically very slow to download on a dial-up connection; allow employees to telecommute, operating from their home or elsewhere with the same response speeds and level of security as if they were in their office; link several computers to the Internet through the same connection; make videoconferencing faster, smoother and more practical; save money by allowing a business to rationalise and centralise its servers.
It's always on. As long as your computer is switched on, you can be connected to the Internet. This means that you do not waste time dialling up and waiting for your modem to connect you to the Internet every time you go online. You will not be subject to annoying busy signals and your connection is unlikely to drop out. Your phone line is not tied up while using the Internet. Therefore there is no need to pay for a second phone line. There are no additional dial-up charges to connect each time you use the service.

Thursday, October 23, 2008

basic of computer or PC

Definition of a Computer -A machine that given instructions and can manipulate data by itself.

Basic Computer Needs
-Need to perform calculations faster and more accurately.
-Need to control processes consistently.
-Need to handle larger and larger amounts of data

Computer System-A computer system contains two parts:
-Hardware: actual pieces of equipment-keyboards, screens, components inside the boxes, printers, modems, etc.
-Software: instructions that direct-operating systems, compilers, applications

Hardware
-Access to data
-Read: fetching information from somewhere
-Write: putting information somewhere
-Common hardware components
-Central Processing Unit(CPU)
-Main Memory
-Secondary Storage
-Input & Output(I/O)

software operating system:
window:
(window history :
1985: Windows 1.0
1987: Windows 2.0
1990: Windows 3.0
1993: Windows NT 3.1
1993: Windows for Workgroups 3.11
1994: Windows NT Workstation 3.5
1995: Windows 95
1996: Windows NT Workstation 4.0
1998: Windows 98
1999: Windows 98 Second Edition
2000: Windows Millennium Edition (Windows Me)
2000: Windows 2000 Professional
2001: Windows XP
2001: Windows XP Professional
2001: Windows XP Home Edition
2001: Windows XP 64-bit Edition
2002: Windows XP Media Center Edition
2002: Windows XP Tablet PC Edition
2007: Window vista basic, home premium, business, ultimate)
LINUX
UNIX
MAC


CPU
-CPU is the heart of any computer-
Three functions
1. control: CPU takes on instruction at a time and follows it to direct the rest of the system.
2. arithmetic operations: addition, subtraction, multiplication, division.
3. logical operation: comparisons

Main Memory
-Main memory is a temporary, working storage area.
-Stores two types of things:
1. current set of instructions the CPU is following.
2. data these instructions manipulate.
-Made up locations with unique addresses.
-Addresses allow random access of data.
-Very fast, but expensive and volatile.

Secondary Storage
-Permanent storage device-Disk, hard and floppy, are common examples
-Relatively cheap, but slow(can be hundreds of times slower than Main Memory)
-Accessed in blocks(many characters at a time)

I/O Devices
-Provide a way for humans to communicate with computers
-Common input devices:
1. Keyboard
2. Mouse
3. Scanner
-Common output devices:
1. Monitor
2. Printer
3. Speaker

Quick Salution to remove Browser Hijacker from IP address: 85.12.43.84

Quick Salution to how to remove or solve Browser Hijacker from IP address: 85.12.43.84

***Finished reading this page about how to solve browser hijacker problem or Here if you want a Quick Salution to remove Browser Hijacker from IP address: 85.12.43.84 you can just go to this website to this website and download and antivirus that Why not go try out for free for a month - you can remote control your computer from anywhere. Cyberwalker uses it and thinks it's fantastic!

What is this IP adress 85.12.43.84 ? it is an "attacker" websites, and when the web page loads, it loads anywhere from this IP address: 85.12.43.84

If ur are having this problem i recomend you all to use the below tool to solve your website browser website.eset-nod32-antivirus-smart-security/Here you can also find the serial key for above..

How to solve Browser Hijacker Problem

Here's a series of steps by step on how you can take to use Hijack This to remove a browser hijack.
(BTW, thanks to my good friend RT for teaching me this, providing the notes this was based on and allowing me to pass this on to you.)
BEFORE YOU START - Download and install Hijack This from http://www.downloads.com/

-STEP 1- SAFETY STUFFBackup your documents and create a system restore point.

-STEP 2- CHECK FOR SUSPICIOUS STARTUP ITEMS

You can use Hijack This to clean out hijacked items from Microsoft's Internet Explorer (redirections due to spyware), however they will return if the executable program causing it is not removed.a.

Click on Start> Run and type "msconfig" and click OK.b. Select the "Startup" tab. c. Uncheck any items you don't recognize.

Note that many legitimate programs will appear here too.Most spyware will load from this area.

If unsure if a particular item is legitimate or not, do a Google search on the .exe file name that loads. The only caveat here is that some spyware .exe files get a randomly generated name, so a search will not identify them.

You can look in the Command column to see the name of the .exe file itself and you can stretch this column if you cannot see the entire line of text.

By the way, it IS safe to uncheck everything here as a test anyway - nothing critical to Windows loads here. So, if in doubt, it is OK to uncheck something.

d. Apply the changes, and restart Windows.

-STEP 3 - Run Hijack This1.

Run the tool, and select "Scan".

2. Look mostly at the R0, R1 and 02 entries. This relates to the hijack, and represent changes to your default browser settings (homepage, search page).

3. Have a look at the addresses for these entries. If they are different from your preferences, check the box next to it.4. Click on "Fix Checked" and confirm.

This process cleans out the modified (hijacked) entries. You can also define what Hijack This uses by clicking the Config button (lower right), however this is not required.

-STEP 4 - DOUBLE-CHECK HOME PAGE AND TEST

One problem is that if the IE Home Page isn't cleared, you'll get "rehijacked" when you launch IE. This is because that particular page is the source of the problem. (It may try to load an ActiveX control.)

Hijack This may have already reset your Home Page in

STEP 3, but double check before starting IE:

a. Head to Control Panel, Internet Options.
b. Change your Home Page on the General tab.
c. Browse the Internet, reboot your machine, and test over the next little while.
If the hijack stays away, you've successfully cleared it, and one of the Startup items you disabled in STEP 2 might still be the cause.

-STEP 5- PERMANENETLY DELETE THE CAUSE
We need to find the Startup item that is causing this, if any. Recall that in STEP 2 we disabled some suspicious startup items. One, or several of them may be triggering the hijack.Also note that we've been testing the machine with the Startup Items disabled. We want to ensure the computer runs fine (no errors) with all these items unchecked.
If you are unsure about deleting an item or using the registry editor, seek help with your local tech expert.a. Launch MSCONFIG once more.b. For the first suspicious item, expand the "Location" column to see where it is loading from in the registry.c.

Click on Start, Run, type "regedit" and click OK.d. Browse to the key listed in the "Location" column for MSCONFIG.e. Delete the key on the right hand side only, that specifically matches that startup item. **See example below.** f. Note the "Command" folder in MSCONFIG. Browse to this folder, and delete the .exe file itself.

What is browser hijacker ?

How To Resolve / Remove this IP address: 85.12.43.84
Problem?
Solution?

First of all This A browser hijacker (sometimes called hijackware) is a type of malware program that alters your computer's browser settings so that you are redirected to Web sites that you had no intention of visiting. Most browser hijackers alter default home pages and search pages to those of their customers, who pay for that service because of the traffic it generates.

More virulent versions often: add bookmarks for pornographic Web sites to the users' own bookmark collection; generate pornographic pop-up windows faster than the user can click them shut; and redirect users to pornographic sites when they inadvertently mistype a URL or enter a URL without the www. preface. Poorly coded browser hijackers -- which, unsurprisingly, are common -- may also slow your computer down and cause browser crashes.

Browser hijackers and the pornographic material they often leave in their wake can also be responsible for a variety of non-technical problems. Employees have lost jobs because of content and links found on their computers at work; people have been charged with possession of illegal material; and personal relationships have been severed or strained. In one case in the United States, a Russian immigrant was convicted for possession of child pornography, although he claims to have been the victim of a browser hijacker.

Like adware and spyware, a browser hijacker may be installed as part of freeware installation. In this case, the browser hijacker is probably mentioned in the user agreement -- although, obviously, not identified as a browser hijacker. The problem is that users typically either ignore the fine print or only give it a cursory reading. A browser hijacker may also be installed without user permission, as the result of an infected e-mail, a file share, or a drive-by download.

To avoid contamination, experts advise users to read user agreements carefully, and to be cautious about freeware downloads and e-mail messages from unknown sources.If You ever Been infects by a Broser Hijaker such as from this IP address: 85.12.43.84You can Get the Solution Here