Welcome to my blog, hope you enjoy reading
RSS

Thursday 31 March 2011

SAFE POST IN SOCIAL NETWORK SITE



Because everyone can see, you must be careful in posting. Attitude or style is different from our talk when eating with parents, old friends, and more different with business associates. Our social network contains people from all walks of life. Therefore, there are important things to consider before you begin to build social networks, and create a strategy in order to be able to take the benefits without damaging career, marriage, or your friendship.

Where and What You Here For?
The first thing to consider is the nature of social networking sites you use. Sometimes the site is intended for professional and business relationships, while others are purely social. Post of the ordinary for people on Facebook or MySpace is not necessarily inappropriate in LinkedIn, even if you have the same person both sites. Think of it as follows: When common friends work together, your attitude may be different between the office and in restaurants or bars.
Sites like LinkedIn and Classmates.com have a more narrow purpose, while social networking sites more generally can be used for various purposes. Facebook can be used to communicate with family and friends who live far away, to communicate back with old school friends or work colleagues first, to interact with others in your work, to find work, or as a dating service. It is fine to do, but you will have difficulty if it will do all these things from one site.

Who is your target?
Social networks in general is a form of written communication. All writers know that the first rule of writing is knowing your target, because it not only affects what you write, but also how you write it down. If you use social networking sites as a place of public information will not really need to know who your target. For example, suppose you are using Twitter to announce new articles or posts on the blog's new, or to refer to articles that are considered important. Page Twitter may be open to all people, and also to update the line with your goals.

Not only do you post
Not only the posts of you who can cause problems. If you've just joined the social networking site, you may not realize that your friends can see some or all of which posted by your other friends, including the images that they post on their site that are tagged to you.
Posting of friends could inadvertently embarrass you. So, remember the old adage of be careful in choosing friends. Do not forget, it applies both ways: do well to post something that can treat your friends if your boss, spouse, or someone else read it.

Sensitive Material Can Be Boomerang
Many people use the status updates to tell what they were doing at the time. Others use it more than just a mini journal that says what they think of the events taking place, their personal lives, and so forth. Just like in "real world", you must be careful in expressing opinions, ratings, and comments, especially about politics, sex, and religion.
Those posts you about events in the workplace or even your excitement for what happens there, can get you in trouble or break the code of ethics. Be careful also in response to "cry" and complaints. If there are friends to post about the bad treatment their partners, showed sympathy may be the right thing. However, some time after repair, he may not remember your advice.

Do not post in Unstable Condition
We all know that driving under the influence of alcohol can cause harm. Posting when you're drunk too can be just as dangerous. While it is emotion, like anger, fear, or sad, or lack of sleep can affect your assessment, and it all can make you post things that are not desired.

Ready to Reject Requests or "Remove" Friends
Some people find it difficult to say no. However, if you accept all the requests coming, can be likened to a house you leave the door open, and now there are many people in your living room, view, and commenting on everything you do, and say. It's all back again to know your target. You also must have the courage to hurt people's feelings by rejecting requests from their friendship. Even more difficult to "remove" people who are on your friends list. Fortunately, most sites do not tell people when they are removed from the list of your friends. However, if you only object to the posting of them, for example, continued to shout about the political situation or the spread of religion, or maybe just posting dozens of sites that are not important, you may not need to remove them. Up for example, allows you to hide one's post. They can still see all your updates (unless, of course if they also hide you).

Are You Familiar with the settings and options
One of the most important thing to do when starting to use social networking sites is to know how to work and settings, and options to your configuration. You may be able to classify people into one group, and then control which items (of wall posts, posts of friends) that they could see on the basis of group or individual. When uploading images, you may be able to restrict who can see images or albums. You may be able to adjust if you want to be emailed when there are people who reply to those posts you or anyone to tag photos, so you will not be surprised later. You may be able to restrict all friends so as not to be posted on the wall or only a certain friend who could see the wall-posts. Social networking sites provide tools to maintain your privacy, so use it. However, do not forget that people who do not have access to capture or even photograph the monitor.

Should Using Alias​​?
You may need to consider whether the best way to avoid all the problems in social networks is to use an alias? You can create fake accounts and say whatever you want, and no one knew that it was you. However, this can reduce the primary goal of social networks, namely to know people, and allow them to get to know you.
Read More..

USING CHECK FOR ANALYZING DISK HDD



Although not as frequently as before, the file system and sector errors sometimes occur. Error can be caused by hardware problems, power failures or even a software error. Usually Windows 7 recognize hard disk problems and automatically schedule a disk check when the computer restarts.
However, if including a proactive person, you may want to monitor their own health status of your hard drive rather than wait for Windows 7 to recognize the problem. If so, you may be pleased to know that can use the Check Disk to analyze the hard drive every time. If it found a problem, you can use Check Disk to fix the problem.

Running Check Disk
While checking the disk is essentially a command line tool, you do not have to open a command prompt to run it. In fact, you can run it from the computer. After the computer is open, simply right-click the hard drive that put before and select Properties. When the Properties dialog box appears, select the Tools tab. Furthermore, the panel Error-checking, click check now.
When User Account Control (UAC) appears, click Yes. After the UAC closing, you will see a dialog box check the disk. Usually, we check the Automatically fix file system errors and Scan for and attempt recovery of bad sectors and click Start. Windows 7 will schedule Check Disk to run at start-up and ask you to restart. Check Disk will fix the problems found. However, to run Check Disk in analysis mode, we need to use a combination of other settings.

Performing Basic Analysis
If you want to see your hard drive quickly circumstances, clear the check mark on both the Check Disk option and click Start. By doing so, Check Disk runs relatively fast and in read-only mode. Once completed, you will see a status message that tells what happens at each stage of the process and of course, a progress bar showing how long the process will continues.
When the process is complete, you will see a dialog box that contains a summary of the process. However, if you click the arrow See details, you'll see a fairly detailed report. As you can see, the process of checking the hard drive through three stages. In addition to displaying the report on screen, Check Disk also save the report in the Application log with the code of Chkdsk and Event ID 26212. Event log contains all statements and details of changes made ​​Check Disk.

Conducting Thorough Analysis
If you want to do a more thorough analysis of the hard disk, remove the check mark in the box Automatically fix file system errors and check the Scan for and attempt recovery of bad sectors and click Start. Checking process will be run in read-only mode which means that Check Disk only will examine and identify bad sectors, will not try to recover them.
After the operation is complete, Check Disk will save the report in the Application Log and display the report in the dialog box. As you can see, when doing a thorough analysis, Check Disk will perform the four stages of the examination.

Stages of Check Disk.
When you run Check Disk in fix mode and recovery, he made the five-stage process (the three main phases and two additional stages). However, when you run the basic analysis, Check Disk only runs three major stages. When you run a thorough analysis, Check Disk only runs three main stages and an additional second stage.
Phase 1: Check Disk checks each segment of data files in the Master File Table (MFT), which shows every file and directory on the volume. Phase 2: Check Disk to check the consistency of each index (directory) on the volume and verify every file and directory represented by the data file in the MFT. Check Disk also ensure that every file or subdirectory in each directory has the appropriate file data segment in the MFT. Check Disk then ensure that time and file size are in accordance with the list of available files. Stage 3: Check Disk examine every information security of each file and directory on the volume by verifying that each security information structure consistent. Stage 4 (optional): Check Disk verifies all clusters in use. Stage 4 is only executed when you select the Automatically fix file system errors. Stage 5 (optional): Check Disk verifies unused clusters. Stage 5 is run when you select Scan for and attempt recovery of bad sectors.
Read More..

Wednesday 30 March 2011

IS MY COMPUTER AFFECTED MALWARE?



A common symptom of malware infection is the home page hijacking, piracy search engines, advertising pop-ups, and system crashes.

Pembajakan Halaman Home
Home page hijacking is when malware changing the web browser home page and then lock it so it can not change it back to its original choice. Or, the home page can be changed, but additional malware to be installed shortly after we return home pages. For example, certain malware will allow us to change the home page to the URL option, but it was followed by the loss of the display screen and a great search toolbar that can not be turned off permanently.
It should be noted that there are also "Piracy" home page that was done intentionally, for example by computer suppliers, ISPs, and locked the office home page to the URL of their choice (to the company home page or support page.) Piracy like that usually we recognize and do not be classified as malware. Malware is often marked by a sudden change. We who was always able to change the home page, but suddenly can not anymore.

Hijacking Search Engine
One of the most popular forms of malware is hijacking the search engines. Suddenly we know search engines on the web browser to disappear, replaced by the search engines and foreign. Often the search engine settings no longer work or if it works, there is no option to choose a regular search engine. Another common symptom of malware is the emergence of a new toolbar that claims to provide web search services. It may appear at the top or bottom of the screen and often can not be turned off, either temporarily or permanently.

Pop-Up Ads
Pop-up ads can be a normal part of surfing the internet. However, pop-up ads that appear when the user is not actively surfing the web is not normal, nor is it a normal thing when there is so much advertising that appears to be a slow connection or computer to be silent or locked. Nor is it normal if there is a window pop-ups that fill the entire screen and can not be closed.

Scareware
Scareware is a free fraud. He is also known as "rogue scanner" or "software trickster" whose purpose is to frighten people into buying or installing. Just like the Trojans, scareware deceive the user so unwittingly install the product. Scareware do scary tactics with display screen that says your computer is attacked attacked later claimed to be the solution to that problem.
Scareware using virus alerts and false system problems. False warnings that are often very convincing and will fool most people who see it. Example scareware is SystemSecurity that scare people by showing a blue screen showing Windows crashes with a window warning that urges us to fix the problem.

System Crash
System crashes always happen though now rarely than two years ago. A lot of things done to improve the stability of Internet Explorer. Kernel32.dll errors are usually caused by graphics card drivers are very rare now.
So, how to differentiate regular crashes and crashes malware? First, malware crashes often involve unusual filenames, for example djiofg982746.dll or may refer to the modules (files) are not known. Second, malware crashes can happen when you're not doing anything. Indeed, the PC can be turned on, but said nothing.
Read More..

Wednesday 16 March 2011

Autorun and AutoPlay



Autorun and AutoPlay term often used ambiguous. Autorun first introduced in Windows 95, while the newly introduced AutoPlay in Windows XP as a new feature that detects content such as image files, music, and video on a removable disk or the newly installed device. So, to say the AutoPlay is a part or one of the Autorun feature.

AutoPlay will automatically call the application to play or display the appropriate content making it easier for ordinary users to run files in various formats, from a different source devices such as USB flash disks, memory cards, mp3 players and so on. AutoPlay can be performed, although there is no autorun.inf in the root directory.
How to Handle the Windows AutoRun
From the moment you put the disk in the computer until the release of the AutoPlay window in front of you (if the conditions enable), is a process that consists of a series of instructions. To further understand how the Autorun works, following the translation process that occurs:

1. Windows Explorer will receive notification of the change in volume on the drive where the disk is inserted.
2. Autorun function put before, whether in the disable / enable. If the disabling condition to drive, then Windows Explorer will not process further. However, there is a bug since Windows 2000 to Windows 2008 Server, which still reads commands contained in the autorun.inf, although not displaying the AutoPlay or execute applications. This does not prevent malware attacks are waiting when the user double clicks or access the context menu made malware. There is a security update to fix this at http://support.microsoft.com/kb/967715
3. Checking whether there is any autorun.inf file in the main directory contained in the media.
4. Send message QueryCancelAutoPlay in the foreground application window, so that an application can be programmed to receive this message and respond to prevent AutoRun and AutoPlay.
5. Changing behavior double-click on the drive, and its context menu with the configuration contained in the autorun.inf.
6.Menambahkan icon and description on the drive, according as defined in autorun.inf.
7. Checking whether the Shift key pressed. If so, then the process will not continue, this does not apply to Windows Vista and later.
8. Furthermore, depending on the version of Windows, the media, and the instructions on the autorun.inf. Windows may display the AutoPlay, executing application instructions found on the Open or ShellExecute in autorun.inf, or does not perform any action.
Read More..

Autorun.inf is a Plain Text File



One of the main reasons for the creation of autorun function is to facilitate the installation of software for general users. Suppose you buy a software product on CD / DVD and want to do the installation, you simply insert the CD / DVD into your computer CD-ROM/DVD-ROM drive, it will show a step and display the installation program that is easily recognizable common user. Autorun introduced since the release of Windows 95.

On the CD / DVD automatically run a particular program, you will find a file named "autorun.inf" which is located on the main directory (root directory) CD / DVD. This file contains the instructions / commands to run the program. Not only that, the command contained in the autorun.inf also can serve to change the drive icon, or add the option / shortcut to the context menu (context menu popup menu that appears is context-sensitive applications through user interaction, such as right-click the drive / folders .) Special, autorun.inf file is a simple text file that can be created by anyone using a text editor such as NotePad. Here's one example of the contents of the autorun.inf file:

[Autorun]
Open = setup.exe
Icon = setup.exe, 0
Label = Installation Program

If the file autorun.inf on top along with the setup.exe file (the programs are launched), placed on a flash disk, and then installed on computers that enable AutoRun, then the AutoPlay will show a context menu that automatically exit.
Here's a brief description of the contents of the autorun.inf. The first line, the [autorun] is a section which must exist in the autorun.inf to function. A section contains certain commands. Examples of open, icons, labels. The meaning of each command are:

1. Open
As in the example open = setup.exe, this command is to determine what application is run when the disk is inserted in the drive. Syntax is open = [exepath \] exefile [param1 [param2 ...]]. So, you can define the path and parameters if necessary.

2. Icon
Determine what the icon will appear on the drive, replace the standard drive icon shown in Windows Explorer. Syntax are icon = iconfilename [, index, where iconfilename can be a file icon (*. ico) or executable files that contain icons. If it says icon = setup.exe, 0, it means that the icon was taken from the resource icon contained in the file setup.exe. Amgka index 0 indicates the first icon (because they may be there are some icons in the resource file.)

3. Label
Syntax is pretty simple: label = text, where text is a string that represents the drive appear in Windows Explorer.
Read More..

Know the System Restore in Windows 7



This feature already exists in previous versions of windows. However, on windows vista and windows 7 it is increasingly improved their ability. Its main function is to restore the system to its original position, after the event of damage or crash. Unlike previous Windows versions, on Windows 7 might return the system to its original position better than ever.

You must have a first, at least one point for a restore point to go to the restore point. How to make it, right click "Computer ", select "Properties", then "System Protection", and select the "Create".
To continue the restore process, right-click Computer, select "Properties", then "System Protection", and "System Restore", then click "Next". Select the restore point you want.
Try also click the new button "Scan for affected programs. " Its main function is to perform the scanning process. The scanning process is intended to find out what programs and drivers should be deleted or recover the restore point you will choose.
Read More..

Protecting Privacy on Facebook



How to block peeper from your personal profile? Facebook has a lot of privacy controls, and continue to change it.

Fortunately, Facebook now put most of their privacy settings in one place, under the link account. We'll see how to take full control over your profile, applications, contact details, and posting on the wall.

Create Friends List
Friends Lists allow us to filter the content more easily. The quickest way to make the list: Click on Home on the main menu bar, then click the friends on the left sidebar. You will see a list on the Create button at the top of the page. Enter a name for your list, such as "Work" or "Schools", and select friends who want to enter into the list.

Adding People to the List of Existing
If there are people who have not entered when the first list is created, you can select and add them. Click Account, then click Edit Friends All Friends. You will see a list of all your friends, with the Add to List on each side. You can also add new friends to the list when they invite or accept invitations.

Protect Status Update
By default, Facebook has four levels of privacy: Friends, Friends and Networks, Friends of Friends, and Everyone. All you can see on your facebook page, from wall to post photos, restricted to one group. But, you also can make an exception by using the list.
Open up your profile, and go to the Wall. Type status updates, but before the post, click the Privacy button. Such as the padlock button with an arrow beside it. Select Customize. Hide this from the box, type the name of the list. Click Ok and your update will be hidden all the people on that list.

Hide Post's Wall
To hide a wall post from a list, go to Account, Privacy Settings. On the Sharing on Facebook, click customize settings. There are three entries that affect the post wall, namely Posts by me, Can see wall posts by Friends and Can comment on posts can be filtered based on the list. Click on privacy drop down next to an item, and select customize. Type a name in the box Hide this list from.

Preventing Spam Notification
There are few things more disturbing than the application to your spam automatically every time they update. If there is an update notification Mafia Wars Farmville or other person appears in your feed point your cursor to the top post. A mark "X" will appear. When clicked, you will be given the option to hide all the posts of the respective application.

Do not Tag Embarrassing Photos
You can not prevent people to tag photos of you who are drunk while dancing on the table, but you can prevent others from seeing the tag. Open again the Privacy Settings, and select Profile Information. On the Photos and videos I'm tagged in, select custom, then select the Only Me, from the menu Make this visible.

Never Seen
Is someone you do not like to find you on Facebook, and send a friend request? This can be prevented if you remove yourself from searches. In the Privacy Settings, go to Search. You can set so that only friends now are able to find you.

Hide Your Profile of Search Engine
What if your old enemy is more persistent, and he used Google to find your facebook profile? Do not worry. On the Privacy Settings page, click Edit your settings in the Applications and Websites that exist at the bottom. Click Edit Settings, next to public search. Uncheck the box Enable public search. Wait for a few days, and your facebook profile will disappear from search engines.

Application Block Annoying
Some applications, including applications that are installed by your friends only, using pictures and even your profile data in its update. Stop them access to your information by going to Edit your settings in the Applications and Websites. Important setting here is the info accessible through your friends. List of available data is a bit scary, but do not worry, remove the check mark on each application that bother you, and your information will remain protected.

Hide Your Contact Details
You can hide the details of specific contact from a list of certain people. For example, if you do not want your business partners see your house number, first make friends Lists contain the people you wish to exclude. In the sharing on facebook, click Customize Settings. Select Other phone, and Customize to hide your number from the list.
Read More..

Saturday 12 March 2011

Could Servers In Hack To Get Password?



One form of cybercrime is misused for identity theft crimes. For milder cases, you may never see your facebook account or e-mail someone hijacked, and is used haphazardly for fun.

Many users worry if his account was stolen, but did not realize that identity theft often occurs because of a lack of awareness and vigilance in keeping its accounts.
Maybe there who think that there is no point in having a strong password because when a hacker or a malicious program master database server, he can find out all the usernames and passwords stored. This is not entirely correct. On the database server, generally a password will be stored in a hash value using cryptography function is one-way, such as MD5 or SHA-1. So you type as passwords, are stored in the form of the complex. This applies a one-way, meaning that the algorithms used do not provide the function to return the hash value into a string first. In this way, even a web application developers themselves do not know what exactly the user password.

Example:
MD5 hash of the password / string "abc" is 900150983cd24fb0d6963f7d28el7f72
MD5 hash of the password / string "c0mpl3xPwD" is 7df5701a8eda2733674c16252465649a

Therefore, if you forget the password, the general solution adopted is a web application to reset your old password, and provide a new password for you. If the web application can tell you the old password, instead it indicates that the password storage database in the form of what is, as you type, and can read anyone who can access the database server. Professional web applications do not do so because of safety factors.
A more reasonable for cybercrime perpetrators to know the password for a user is to utilize the user ketidakwaspadaan, or trying commonly used passwords (here use strong passwords, for example, consist of a combination of letters and numbers, and more of those characters), or using techniques / specific tools to perform brute-force, phishing, keyloggers, and so forth. Some general advice for users is: Carefully put the record your passwords, do the login just on a personal computer, change passwords periodically, do not run unknown applications, not just click the link URLs from untrusted sources, use different passwords for each account. Especially important to the account.
Read More..

Friday 11 March 2011

Terminology 3

41.Access Point
A Device That allows computers and other wireless devices were devices to Communicate via a wired network. It is Also Used to extend the reach of a wireless network. By Placing the access point in a remote position.

42.MAC Address
Media Access Control address is the ID that you have on the devices that connect to the network. Like the Ethernet controller and wireless ethernet.

43.Ethernet
A protocol Local Area Network (LAN) developed by Xerox Corporation in conjunction with DEC and Intel in around 1976. This protocol one LAN standard of the most widely used today.

44.MIMO
Short for Multiple-Input Multiple Output, which is a technique of data transmission by using multiple lines of data signals at once. To increase the throughput. This technique exploits the phenomenon of a signal scattered by establishing some lines when it is transmitted, rather than try to eliminate them.

45.Equalizer
Function to improve sound output generated MP3 Player. Most MP3 players only provides preset EQ with several options. FM Range, Range FM frequency waves that can be accepted by the radio tuner. In Indonesia, the FM range used was 87-108 MHz.

46.CF
Compact Flash was introduced in 1994 as a successor to PCMCIA / PC Card. Most used a digital camera. Capacities ranging from 64 MB to 12 GB.

47.M2
Acronym for Memory Stick Micro M2. The size of the smallest form factor for MS, only ¼ of the MS PRO Duo. Starting announced in September 2005, but only marketed in 2006.

48.MicroSD
MicroSD cards are the smallest form of an SD card. Also known as transflash, or T-Flash. Capacity 16 MB-1 GB.

49.MiniSD
MiniSD card has a size of ± 60% of the SD Card. Writing Protection Switch is available in this form. Dimensions 21.5 × 20 × 1.4 mm with a weight of 1 gram. Capacity of 16 MB to 2 GB.

50.MS
Memory Stick cards first introduced in 1998 by Sony Corporation, for use on Sony devices, especially digital cameras. However, limited to 128 MB capacity. New in 2003 introduced the Memory Stick PRO, its capacity and its ability to grow. Capacity of 16 MB to 4 GB.

51.MS PRO Duo
Memory Stick PRO Duo is the second form factor for MS. With a smaller form, is used also in mobile phones, and PSP. Capacity of 16 MB to 2 GB.

52.SD
Secure Digital cards introduced in 2001 by SanDisk Corporation, Matsushita (Panasonic) and Toshiba. Developed from the MMC, so it has much in common. Capacity of 16 MB to 4 GB.

53.Uninterruptable Power Supply (UPS)
Also known as a continuous power supply (CPS) or battery backup, which serves to maintain the availability of electrical power continuously for electrical equipment connected to it, by taking a different power source, if all of a sudden not tersediannya main power source.

54.PSU (Power Supply Unit)
PSU (Power Supply Unit) is one of the main components of a computer, which functions as a provider of electricity to other computer components as a whole. Sometimes, PSU already installed when you buy a PC case, or also you can buy it separately.

55.Print Head
For inkjet printers, the ink nozzle and the electronic controller is located.

56.Expansion Slot / Slot Expansion
Joint or crack found on the motherboard, used to install additional equipment such as card or board. Installation of additional equipment will enhance the ability of computers in performing certain tasks. There are two types of expansion slots are PCI and ISA type. PCI or Peripheral Component Interconnect is a slot that is designed based on the standard PCI standard Interest Group. Meanwhile, aka ISA Industry Standard Architecture is the first time slot that was developed by IBM / AT.

57.FSB (Front Side Bus)
In microsprocessor, FSB connects the processor with main memory. And is also used to communicate between the processor with other components onto the motherboard.

58.NTSC
National Television System Committee, is a committee organized by the (EIA) that the TV broadcasting standard developed in the United States and several other countries.

59.PAL
Short for phase-alternating line, is a color encoding used in broadcast television. PAL was developed in Germany by Walter Bruch, who worked at Telefunken.

60.Core Clock
Value Frekensi owned graphics chip on the video card. Usually the greater the value of this frekensi, the higher the performance. Frequency value is expressed in units of Hz (Hertz), and also commonly added to the range of values ​​such as Mega (million), Giga (Billion), and so forth.
Read More..

Terminology 2

21.Touchpad
Is an input device commonly used on laptop computers. Its function as the driving cursor on the monitor, through stimulation of finger movements that touch the touchpad. With this function well, the touchpad is used instead of a mouse. From the size, usually have different sizes, but usually not more than 50 cm ². Touchpad development also continues, which is now not only as an activator of the cursor, but also has a function for scrolling and zooming a specific document.

22.Northbridge
One of the two chips in the chipset that connects the processor to system memory and AGP and PCI bus. Another is the southbridge chip.

23.Southbridge
One of the two chips on the motherboard chipset, which controls the IDE bus, USB, Plug and Play, and so forth.

24.D-Sub
Standard output ports that are used from the video card to the monitor by using the 15-pin on the connection.

25.DVI-I
One of the DVI variant cans That pass analog and digital signals. DVI connector Itself is Used in LCD monitors are very effective to reduce video noise Pls I do the conversion from digital to analog and back to digital again.

26.MP3
MPEG-1 Audio Layer 3, or better known as MP3 is a file format that has compression encoding sound good (although lossy) so that the file size can be smaller. This file was developed by a German engineer Karlheinz Brandenburg. MP3 encoding uses Pulse Code Modulation (PCM). MP3 reduces the number of bits of data by using a psychoacoustic model (eliminating the human voice is not audible.)

27.MPEG
MPEG (Motion Picture Expert Group) is the name of the international organization ISO / IEC are developing moving image coding standard (such as video). Some of the standards developed are MPEG-2 and MPEG-3.

28.PCMCIA
Short for Personal Computer Memory Card International Association, is an organization consisting of more than 500 companies, which has developed a standard for small-sized components. Less is more for credit cards, and so-called PC Cards. Where the use of majority for notebook computers.

29.Pin
Are the grooves and the legs of the chipset that connects the module output or input data transfer and flow into the motherboard. Usually there is a row of pins on a PCB board inside a memory chip is also a slang term for these types of memory. For example, the number of pin DDR1 memory will not be equal to the number of pin DDR2 memory.

30.USB 2.0
Interface that is used most recent UFD. In theory connection with this interface capable of transferring data as fast as 480 Mbps.

31.Pitch
Pitch or also called the dot pitch, is the distance between pixel and next pixel. The greater the distance, the resulting display tends to look coarse (grainy).


32.Resolution
Describing the number of pixels that appear in the calculation of two dimensi.Sebagai example 1.280 x 1.024 pixel resolution, meaning that pixel is displayed as many as 1024 rows and 1280 columns.

33.SVGA
Abbreviations of supervideo graphics array, displaying in a resolution of 800x600 pixels.

34.VGA
Abbreviation of video graphics array, displaying in a resolution of 640x480 pixels.

35.Heatsink
Heatsink is an object which is placed on components, with the aim of releasing heat generated corresponding components. Heat transfer can go through the process of conduction, convection or radiation. On the PC components, usually the material used to heatsink is copper or alumunim. Aluminum is lighter and cheaper. While copper has the ability to release heat faster. To speed cooling, usually combined with a heatsink fan (HSF).

36.HSF (Heat Sink Fan)
A CPU components that are used to absorb heat. Usually made of aluminum. Use as the absorber temperature fan is used to improve the stability of your computer.

37.802.11a
Standard wireless network with a maximum data transfer rate of 54 Mbps and works at a frequency of 5 GHz.

38.802.11b
Standard wireless network with a maximum data transfer rate of 11 Mbps and works at a frequency of 2.4 GHz.

39.802.11g
Standard wireless network with a maximum data transfer rate of 54 Mbps (typical 200 Mbps) and works at a frequency of 2.4 GHz, with backward compatibility to 802.11b berperangkat.

40.802.11n
Standard wireless network with a maximum data transfer rate of 600 Mbps and works at a frequency of 2.4 GHz or 5 GHz. Standard 802.11n specification is expected to be finalized in 2009.
Read More..

Terminology 1

1.API (Application Programming Interface)
A joint command and a sequence of instructions that can be used to design games software developer or application. By the standards of this API, developers do not have to specify the application made by a particular hardware architecture. In essence, the API function as an intermediary that connects programmers with the hardware.

2.Access Time
The time required to access the data needed, from idle (silent) to obtain the data.

3.ATA/133
Represents the highest standards of data transfer speed devices with PATA interface (parallel). Some other names are the ATA-7, ATA/ATAPI-7, Ultra-DMA/133, UDMA 6, and others. To achieve this requires the necessary disk controller that supports, as well as a bus controller on the PC side (more precisely on the motherboard). Meanwhile, in the next development is ATA-8 or ATA/ATAPI-8.

4.Keyboard
Peripherals for data input on the computer with a QWERTY key configuration. Apart from the configuration of the QWERTY keypad, a computer keyboard also comes standard other buttons to be able to use all the features possessed by a computer.

5.Monitor
Tool in the form of computer output display to indicate directly when processing by the computer is going.

6.CRT (Cathode Ray Tube)
Type monitors that use a large tube as a display unit that is usually found on conventional TV.

7.LCD (Liquid Crystal Display)
New types of monitors that use liquid crystal material in forming the cross-section display on the monitor.

8.TFT (Thin Film Transistor)
A type of LCD technology in which each pixel is connected directly to the component transistors.

9.Pixel
Short for picture element, which is the smallest element that forms an image on a monitor.

10.Mouse
Computer data input tools in order to move the cursor on the monitor display, in order to directly choose the applications that will run. Usually the mouse is used for computers with operating system-based GUI (Graphical User Interface).

11.LGA775
Having stood for Land Grid Array, is a type of socket used by Intel CPUs, with a pin in the socket, instead of the processor anymore. While the 775 indicates the number of pins are owned by the socket.

12.PCIExpress
PCIe, formerly known as 3GIO (3rd Generation I / O). Currently, video cards use this type of interface, to increase data transfer bandwidth.

13.Chipset
Chips or chipsets are small pieces of silicon that is used to store information and computer instruction. Each computer component has at least a chip in it. The chipset on the motherboard to control the input and output (input and output) of underlying computer. The chipset on the video card controls the rendering of 3D graphics and the output of the image on your monitor. CPU is one example of a chip that is very important. Chipset motherboard, such as BX, i810, i820, and many others.

14.DVD-RAM
Standard writing format on DVD media, as well as the format ± R / RW. It's just using different techniques, allowing random access technique. However, RAM format is more directed to the same function as RW format. Where, the writing process can be repeated on the same medium, also remove them.

15.Burn
Record information / data to optical media, either CD or DVD.

16.Burst
The way data transmission by way of collecting information, then sent as a large unit in a high-speed line.

17.SATA
SATA (Serial Advanced Technology Attachment), a standard interface and command set for transferring data between devices to the PC bus. Unlike IDE which uses parallel signaling, SATA works serially. Allows the use of a more compact data cable, longer cable distances, and a faster transfer speed. Previously been used, has a data transfer rate 150 MB / s (SATA-150). The now widely used is SATA-300 (SATA II) and later SATA-600.

18.SCSI
SCSI (Small Computer System Interface) a standard interface and command set for inter-device data transfer to the PC bus. In addition to the hard drive, is also frequently used in optical drives, and back-up storage. More widely used in workstations and servers. Desktop PCs rely more interface ATA / IDE.

19.SO-DIMM
Short for Small Outline Dual Inline Memory Module, is a smaller version of a DIMM standard commonly used in notebook computers. Where, SO-DIMM has a size of 72 pins to interface 32-bit, 144 pins for 64-bit interface.

20.PC Card
Expansion cards are usually used in notebooks, so the notebook have new functions, Such as WLAN, Bluetooth, Sound, danain-other. PC Card is divided into three types. Type I, Type II and Type III. Differences shape of the three, only Stood at each card thickness. Type I, the which has a thickness of 3.3 mm is usually Used as memory cards. Type II with a thickness of 5 mm is usually Used for tools that function as I / O, Such as modems, LAN, and others. For Type III, with a thickness of 10.5 mm is usually Used for Such devices as micro drives or other components having dimensions Greater thickness.
Read More..