May 29, 2011

Hard Drive Making Noises


A hard disk drive (HDD, or also hard drive) is a fixed data storage device that stores data on a magnetic surface layered onto hard disk platters. A hard disk uses rigid rotating platters (disks). Each platter has a planar magnetic surface on which digital data may be stored. Information is written to the disk by transmitting an electromagnetic flux through an antenna or read-write head that is very close to a magnetic material, which in turn changes its polarization due to the flux.
The information can be read by a read-write head which senses electrical change as the magnetic fields pass by in close proximity as the platter rotates.

Disk failure occurs when a hard disk drive no longer operates and the information on it can no longer be accessed by the computer.
This can happen for no reason at all or due to an external factor such as exposure to fire or water or High Magneticwaves or suffering a sharp impact How seriously the disk failure is varies.
The most serious and well-known kind is the head crash where the internal read-and-write head of the device touches a platter or a magnetic data storage surface. A head crash normally causes severe data loss and, moreover, data recovery attempts may cause further damage if not done by somebody with specialized knowledge.
There are also controller electronics which occasionally fail. If that happens it may be possible to recover all data.
When your computer's hard disk starts to act funny, make sure that you have an up-to-date backup. Then you can prepare some simple diagnostics and possibly repairs. Both Windows and Mac OS come with built-in hard-disk utility software that scans your hard disk for errors and attempts to fix them.
This is what you can do for Windows Steps: 1. Double-click on My Computer to open the My Computer window. 2. Select the disk that you want to diagnose and repair. 3. Choose Properties from the File menu. You can see the Properties window for the drive that you selected. 4. Choose the Tools button. 5. Click the Check Now button under Error Checking Status. 6. Choose either "Thorough" or "Scan for and Attempt Recovery of Bad Sectors." 7. Click on Start.
Tools to recover data are various such as:

There is a Data Recovery Utility which examines your inaccessible hard drive for damages and corruptions and recovers the data back.
Hard drive can be recovered from Windows 9x / ME / NT / 2000 XP / 2003 disk recovery Supports FAT16, FAT32, NTFS, NTFS5 file system Provides data recovery from Formatted logical drives Recovers data from Re-partitioned & Missing/ Lost Logical drives Lost folder and deleted file recovery.
There is also a partition recovery utility available that helps you in recovering all your important data lost after accidental formatting, virus problems, software malfunction,and file or directory deletion. There are also easy to use FAT & NTFS Partition File recovery Utilities that examine your inaccessible hard drives for damages and corruptions and recover the data.
There are also systems which:
Provide Partition recovery from FAT16, FAT32, NTFS, NTFS5 file systems. Recover deleted files/folders even after recycle bin has been emptied or use of Shift+Del key. File recovery from deleted partition, lost partition missing partition or formatted logical drives. File recovery from Missing or Lost folders. Recognize and preserve long file names when restoring files & folders. Multi-Disk Drive Support - Performs NTFS recovery on all IDE, EIDE and SCSI disk devices.
There is also software that recovers corrupt or lost data from floppy disks.
The software supports inaccessible floppy disk data retrieval, FAT, BOOT or ROOT area damaged situations, and rescues various corrupt files from a diskette. BadCopy Pro can recover data from floppy disks that Microsoft Windows identifies as "not formatted", "not accessible", or prompts you to format.
The software does not write data to your floppy disks, but saves the recovered data to a new file that you specify. It can fix corrupted files on floppy disk. It can restore damage to a FAT (File Allocation Table) or BOOT area of the disk. It can repair damage to the ROOT area of the disk, so that files can be listed again. It can erase Viruses on a diskette.
There is also software available that fixes corrupted or damaged Microsoft Word documents.
There is also a new product on the market; software that creates a Windows CD for you, and creates recovery files so you will not need to format to reinstall Windows.
It has been asked many times "I have Windows XP (or ME), how can I install Windows without having to lose all my files. I only have a Recovery Disk". Well it is really very simple, so long as you have a CD burner; or at least a second hard drive.

How To Increase Speed of Pc


There are several reasons that may cause you to want to improve the performance of our PC. The first is that nowadays, new programs are often large consumers of resources, so it is in the order of things that you want to optimize your PC in order to run the software without problems. It is also possible that your PC is running very well so far, and suddenly you notice a significant decrease in performance. Whatever the case, we will list the effective approaches that allow you to optimize your computer.
How to improve the speed of my PC without investing money?
There are two ways to achieve it. First, perform a series of regular maintenance. This is particularly indicated if your PC is very new (although this is relative, my mother's PC in use once a week, is as old as one year after the mine after a month ... it depends also how often you use it).
Maintenance of computer
To optimize your computer, you should defragment the disk, clean registry, remove malware (rogue) that infect 90% of the computer and to delete temporary files and other log files that Windows Parks and sows . These maintenance operations are used to solve common problems that cause performance problems.
How to optimize your computer with a free program?
Optimized PC is a PC regularly maintained with the steps mentioned above. In addition, you can install one of the many free software that improve the speed of the PC, most of them include utilities that support all these elements that optimize the computer.
Take a look at this website telecharger.com in the "utilities" and you'll be spoiled for choice these programs go even further than these four tips, because they will defragment the registry, they allow you to choose which programs will start automatically and more.
A PC with the settings optimized
That's fine, you say, but how do when already done all the maintenance operations imaginable and that it would further improve the speed of the pc? It is doable if you're ready to make some concessions on Windows features. One we can most easily happen is probably the indexing of files.
Disabling indexing permanent files - a great saving of resources
This indexer facilitates searches for files on the hard disk. For my part, I use it only very rarely, yet this indexer runs continuously and therefore impact system performance: you can disable it if you wish to further optimize the speed of your PC.
Another factor that slows down the system, they are all the graphic effects on the windows, buttons, etc.. If, like me, you prefer the appearance and functional performance, disable any shadow effects, fades, transparency etc.. (Especially in Vista). This will alleviate a lot of resources, this will allow you to optimize your computer and improve the speed of your PC! Is you pc getting slow day by day.Then get Speedupmypc 2011 Full version legally and increase the speed of your pc.Also learn other Pc tricks for your computer maintaince


Apple Wireless Magic Mouse

Seamless Multi-Touch Surface Magic Mouse — with its low-profile design and seamless top shell — is so sleek and dramatically different, it brings a whole new feel to the way you get around on your Mac. You can't help but marvel at its smooth, buttonless appearance. Then you touch it and instantly appreciate how good it feels in your hand. But it's when you start using Magic Mouse that everything comes together.
The Multi-Touch area covers the top surface of Magic Mouse, and the mouse itself is the button. Scroll in any direction with one finger, swipe through web pages and photos with two, and click and double-click anywhere. Inside Magic Mouse is a chip that tells it exactly what you want to do. Which means Magic Mouse won't confuse a scroll with a swipe. It even knows when you're just resting your hand on it.



Laser-Tracking Engine Magic Mouse uses powerful laser tracking that's far more sensitive and responsive on more surfaces than traditional optical tracking. That means it tracks with precision on nearly every surface — whether it's a table at your favorite cafe or the desk in your home office — without the need for a mousepad.
Introducing Magic Mouse. The world's first Multi-Touch mouse.
The same Multi-Touch technology first introduced on the revolutionary iPhone comes to the mouse. It is called Magic Mouse, and it is the world's first Multi-Touch mouse. Click anywhere, scroll in any direction, and swipe through images on its smooth, seamless top shell. It works wirelessly using Bluetooth, so you do not have to worry about cables or adapters cluttering your workspace. And built-in software lets you configure Magic Mouse any way you want.
The MacConnection is offering Apple's revolutionary Magic Mouse for only $64.99! This mouse relies on the same multi-touch technology as the iPad, which allows you to scroll and much more all with a flick of your finger on the mouse. This is a good Magic Mouse deal if you take advantage of the free shipping with orders of $99 or more, but if you pay the standard $6.25 in shipping, then you are better off paying the $69.00 at Apple Store with free shipping to save a few bucks. Limited supplies available. No coupon code needed for either offer.

Apple Wireless Magic Mouse only $64.99
The Magic Mouse is a multi-touch mouse manufactured and sold by Apple,and it was announced and sold for the first time on October 20, 2009 The Magic Mouse is the first consumer mouse to have multi-touch capabilities Taking after the iPhone, iPad, iPod Touch, and multi-touch trackpads, the Magic Mouse allows the use of gestures such as swiping and scrolling across the top surface of the mouse to interact with desktop computers.
The mouse requires at least Mac OS X 10.5.8 and Bluetooth. It can be configured as a two-buttoned left-handed or right-handed mouse, but the default is a single button. It uses laser tracking for increased pointer accuracy over previous generation Apple mice Since its release, it has been included along with a wireless keyboard with the 2009 generation of iMacs, and with a wired keyboard with the 2010 Mac Pro workstations. It can also be purchased separately.
Initial reception to the Magic Mouse was mixed, with positive reactions to its scrolling functions but negative reactions to its inability to middle click (without any additional software), or trigger Exposé, Dashboard or Spaces (features offered by its predecessor). Many of those features can be enabled on the Magic Mouse with the use of third party tools.
Underside of the Magic Mouse
The Magic Mouse also has known issues with maintaining a stable connection to Mac Pro workstations
Connectivity
Wireless Technology

Bluetooth Connector
Wireless
Connector Type


Bluetooth General Color White Contents Magic mouse, (2) AA batteries, documentation Returns Policy This product is subject to our return policy. Please see our complete return policy for details. System Requirements A Bluetooth-enabled Macintosh computer Mac OS X v10.5.8 or later with Wireless Mouse Software Update 1.0 Warranty - Labor Call for Warranty Warranty - Parts Call for Warranty


How Is Cloud Computing Influencing The IT Industry?


   As we all know, the traditional way of building an IT environment is to buy servers, hardware, licenses and to install the software. This is a long and costly process, involving many infrastructure demands and long deployment cycles. This fully IT internal model may be commonplace, but IT as we know it today is being replaced by newer technologies.

Lately, cloud computing is causing a major shift in the IT industry. New technologies have been developed, and now there are various ways to virtualize IT systems and to access the needed applications on the Internet, through web based applications. This means no IT costs for hardware or servers.

his utility based and service oriented IT model is no longer a plain hardware or software market. Currently, vendors can offer email apps, production systems, security options, storage and backup services, to name just a few of the IT components that can be moved to the cloud.
But how do software developers and IT decision makers adjust themselves to this trend? How is the traditional IT industry affected by these newer available technologies?
* Traditional IT jobs are being changed, as new skills and specialties are increasingly demanded. Before moving to the cloud, the IT staff will need to fully understand the advantages of cloud computing and how it can be integrated into the current business model. Issues such as security and maintenance should be discussed upfront with the cloud computing vendors, and also a good IT department will have to oversee the migration and the ongoing relationship with the cloud provider. * The IT Infrastructure will be crucially changed, as more applications are being moved to private or public clouds. Software developers will have to adjust the ways they create and deliver applications. * The need for IT support staff is reduced, thus diminishing the cost with desktop support. However, a new need is created, which is training the employees to work with and understand the new systems and applications. * The effort to maintain the data is also diminished. However, moving the data to the cloud equates losing its physical control, as it is stored in the vendor’s data center. Although clients might not be comfortable with this fact, they should understand that data in the cloud can be safer than being in-house. This brings us to our next point. * Security: Enterprise cloud providers that offer a managed cloud solution have security experts on staff managing the applications, with security options included. A best-practice method is to store the data in more facilities to make sure it is safe. I believe this is better than do-it-yourself. * Highly customizable software: Most of the software that companies use is not “cloud-ready”. This is where the software developers intervene, by creating code especially designed for the cloud. Also, cloud providers should make their best in making this transition easy. However, once the applications are SaaS, the need for the IT department troubleshooting decreases.
I have always said that cloud computing is about shifting the interest from physical resources (IT resources and capital expenses) to efficiency and utility. In the end, cloud computing allows companies to focus on doing what they know best, and not on spending a lot of money and time on IT processes. I believe that the companies which fail to adjust to this trend are going to face serious economic and business disadvantages.

Virtual Private Server

Virtual private server is nothing but a marketing term used by Internet Hosting Services which refers to a virtual machine for the use of an individual customer availing the service. Even software running on the same computer as same as the individual customer computer, it absolutely work as a separate computer and for the need of the customer. It also has the privacy of the separate physical computer and can run just like a server computer if configured. The term VDS is less used for the same process compared to VPS, each of these can run their own operating system and can be independently rebooted, which helps the user a lot in configuring any process and using it. Partitioning of a single server is done so that it can be showed as multiple has been in practice since a long time, especially both on mainframe computer and mid range computers. It has become more popular with the development occurring day by day in case of virtualization of software and technologies for micro computers.
It bridges the gap between dedicated hosting services and shared web hosting services by giving independence of the services in software terms. It cost less compared to physical dedicated servers. It runs at its own operating system and is capable of running any software on other operating systems some doesn’t run in virtualized ones. There are two types of hosting, the first one is Unmanaged and other is unmetered. In the case of unmanaged one the customer is left to monitor and administer their own server and in the case of unmetered one, unlimited amount of data transfer is allowed on a fixed bandwidth line. Unmetered hosting is offered with 10 Mbit/s, 100 Mbit/s or 1000 Mbit/s.

Here the customer can use 3.33~ TB on 10 Mbit/s, 33~ TB on 100 Mbit/s and 333~ TB on a 1000 Mbit/s line. A VPS is also referred as cloud server it has two attributes which are- additional hardware resources can be added at runtime (CPU, RAM), and Server can be moved to other hardware while the server is running (automatically according to load in some cases). As an intermediary service between shared web hosting and dedicated server hosting, the actual hardware server is divided into several isolated environments. Each environment, or space of the hardware, has its own server software, mail server, and independent software instances and services. VPS hosting offers an extremely affordable hosting solution for business owners.

May 20, 2011

"Kids under 13 should be allowed on Facebook ":Mark Zukerberg


Mark Zukerburg, Facebook CEO at the NewSchools Venture Fund's Summit in Burlingame, Calif. earlier this week,

"Education is clearly the biggest thing that will drive how the economy improves over the long term," Zuckerberg said. "We spend a lot of time talking about this"

"In the future, software and technology will enable people to learn a lot from their fellow students."



Zuckerberg said he wants younger kids to be allowed on social networking sites like Facebook. Currently, the Children's Online Privacy Protection Act (COPPA) mandates that websites that collect information about users (like Facebook does) aren't allowed to sign on anyone under the age of 13. But Zuckerberg is determined to change this
"That will be a fight we take on at some point," he said. "My philosophy is that for education you need to start at a really, really young age."

"Because of the restrictions we haven't even begun this learning process," Zuckerberg said. "If they're lifted then we'd start to learn what works. We'd take a lot of precautions to make sure that they [younger kids] are safe."

Facebook secretly hired a PR organisation to asperse Google

The famous Social Networking site Facebook caught secretly hiring top Public Relations Organisation to implant negative stories about the Internet Search Gaint Google Inc.

PR firm Burson-Marsteller, got captured in a scandal for running a secret anti-Google asperse campaign on behalf of Social Networking site Facebook,
The Evidence – that damage relations between the two giants, that have already bitter rivals – came to light in leaked emails late on wednesday. Facebook later admitted that it had hired Burson-Marsteller to the Daily Beast.

Burson gave a statement yesterday faulting the Facebook. The statement said Facebook insisted on being kept anonymous, and that Burson should not have gone along with that request.

Paul Cordasco, a spokesman for Burson-Marsteller, told the Guardian yesterday that the assignment was not at all standard operating procedure and was against the company's policies.

Google refused to comment.

May 19, 2011

Symantec says Facebook apps leak personal data


Security company Symantec claims Facebook application coding error may allow third parties to access users' private details...

Facebook applications may leak users' private data to third parties, including advertisers, according to researchers at security giant Symantec.

The social network site allows third party applications, the most popular of which are games, to run inside an iFrame, a partition within a web page that allows it to run code from an external site.

Symantec claims that due to a coding error, Facebook's iFrame applications leak 'access tokens' to third parties such as advertisers or web analytics providers, granting them permission to access users' photos, messages and personal data.

"We estimate that as of April 2011, close to 100,000 applications were enabling this leakage," wrote Symantec research Nishant Doshi in a company blog post "We estimate that over the years, hundreds of thousands of applications may have inadvertently leaked millions of access tokens to third parties."

The company believes that those parties may not have realised that they could access that data.

Symantec has informed the social networking giant of the issue, it says. "Facebook notified us of changes on their end to prevent these tokens from getting leaked." It recommends that Facebook users change their passwords.

It is not the first time Facebook has been accused of inadvertantly leaking users' private data. In October last year, two Facebook users sued the company, alleging that the 'referrer headers' that tell advertisers when a user has clicked on an ad contain private data about that user's browsing history.

Facebook denied the charges, arguing that there had been no material damage as a result of the practice. A similar suit has since been launched against LinkedIn, the professional social network popular in the IT industry.

Comments system

Disqus Shortname