Saturday, November 22, 2008

Why is your graphics solution important?

Much of what you do on a computer today, including using the Vista operating system, browsing the Internet, editing photos, making presentations, watching movies, and gaming, is becoming increasingly visually intensive. Selecting the right graphics solution can make these visually intensive tasks come alive, and enable a rich, lifelike and pleasing experience.

Which Graphic Solution Should I Select?

Basic (Integrated) solutions: In a basic solution, the graphics “engine” is part of the system chipset, and the memory that is used for graphics is typically part of the main memory (RAM) that is also used for other system functions. A basic solution may be adequate for you if you use your notebook for basic tasks. For example:

* Word processing or e-mail
* Run the Microsoft Vista Basic operating system
* Browse the internet and visit text-heavy sites


Advanced (Discrete) solutions: Advanced solutions are physically separate (“discrete”) from the chipset, and include a high performance graphics engine that is dedicated to executing graphics functions, as well as high-speed graphics memory that is also separate from main system memory. Typically, discrete solutions are more powerful than integrated solutions, and are the preferred type of solution if you use your notebook for visually demanding tasks. For example:

* Run the Vista Premium, Vista Business or Vista Ultimate Operating systems
* Browse graphics intensive web sites
* Play video games
* View, create and edit videos

Help you to choose battery cell


When choosing a laptop battery, it’s important to consider how your laptop is used:

* Is your laptop plugged in on your desktop most of the time?
* Do you spend more time unplugged than plugged in?
* Do size and weight matter when you travel?

In most cases, the number of cells inside a battery determines its size, weight and life between charges. A cell is essentially a smaller battery that is packaged with and connected to other cells to form one large battery. Generally, the more cells, the more power, weight and size a battery has.

Finally, it’s important to note that battery life is always subject to demands and usage. For extended periods of use away from an outlet, you might want to consider purchasing a second battery for your laptop from Dell.com.

Thursday, November 20, 2008

Computer virus attacks 'to peak next Monday'

Internet users are being warned to stay vigilant by researchers who believe that next Monday could be the worst day the year for computer attacks.

After analysing information on viruses and internet worms taken from more than 500,000 machines around the world, security experts at PC Tools have pinpointed November 24 as the potential peak of malicious software activity for 2008.

Data from 2007 showed that the high point of action from viruses, worms and other internet-based attacks came three days before America's Thanksgiving holiday, leading them to suggest that the same day could prove the bleakest 24 hours of this year.

The company says the increase in virus activity could be the result of internet shopping in the run-up to Christmas, as millions of users begin going online to purchase gifts for their friends and family.

With the chance for criminals to access financial details, online shoppers make an attractive target for the writers of malware.

The number of people shopping online this Christmas is expected to grow again this year, with internet sales in the UK alone predicted to hit £13.16bn – an increase of 15% over 2007.

More people are expected to use the web for their shopping as a way of finding lower prices to help them beat the credit crunch.

But while security experts are expecting the traditional increase of malware over November and December, they have also warned of another source of potential attacks. Spammers and criminals have attempted to use the popularity of American president-elect Barack Obama as a way to trick users into downloading malware.

A flood of emails purporting to link to a video of Obama's acceptance speech were actually connected to a trojan horse program which would compromise the target's PC. Meanwhile, a separate burst of spam messages contained a file called BarackObama.exe, which, when activated, places a rootkit on the victim's machine and opens it up to hackers around the world.

IPv6

Credit to PC Magazine

Definition of: IPv6

(Internet Protocol Version 6) The next generation IP protocol. Started in 1991, the specification was completed in 1997 by the Internet Engineering Task Force (IETF). IPv6 is backward compatible with and is designed to fix the shortcomings of IPv4, such as data security and maximum number of user addresses.

Virtually Unlimited Addresses
IPv6 increases the address space from 32 to 128 bits, providing for a virtually unlimited (for all intents and purposes) number of networks and systems. It also supports quality of service (QoS) parameters for real-time audio and video. Originally called "IP Next Generation" (IPng), IPv6 is expected to slowly replace IPv4, with the two existing side by side for many years.

IPv6 was officially deployed in July 2004 when ICANN added IPv6 records to its DNS root server for the .jp (Japan) and .kr (Korea) country codes.

What Happened to IPv5?
IPv5 was an experimental streaming audio/video protocol, which had nothing to do with the fundamental structure of IP addressing.