Archive for January, 2009


Maximum everything. Energy-efficient performance. Multimedia power.

Intel® Core™2 Duo processor
Based on Intel® Core™ microarchitecture, the Intel® Core™2 Duo processor family is designed to provide powerful energy-efficient performance so you can do more at once without slowing down.

Intel® Core™ 2 Duo desktop processors

With Intel Core 2 Duo desktop processor, you’ll experience revolutionary performance, unbelievable system responsiveness, and energy-efficiency second to none.

Big, big performance. More energy efficient.¹ Now available in smaller packages. The Intel Core 2 Duo processor-based desktop PC was designed from the ground up for energy efficiency, letting you enjoy higher performing, ultra-quiet, sleek, and low power desktop PC designs.

Multitask with reckless abandon. Do more at the same time, like playing your favorite music, running virus scan in the background, and all while you edit video or pictures. The powerful Intel Core 2 Duo desktop processor provides you with the speed you need to perform any and all tasks imaginable.

Love your PC again. Don’t settle for anything less than the very best. Find your perfect desktop powered by the Intel Core 2 Duo processor and get the best processing technology money can buy. Only from Intel.

  • • Up to 6MB L2 cache
  • • Up to 1333 MHz front side bus

Advertisements

Just Build a new Computer based on Asus P5ql Pro Board.

It is a very nice Board with many featurers but it is easy to see that the EIDE era is on its way out now everything is Sata.

I did ad a PCI  EIDE Controller Card so i could use my Hard drives i allready had laying around,when you do that make sure to go into Bios and deactivate the onboard EIDE Controller if you dont Computer will not boot.

I also had to update the Xpress Gate feature Computer would not boot with it Activated in Bios but worked fine after update.

I did have several good Nvidia Graphics Cards but i could not use them in this board cause it was not pci xpress +16.

I dont have any other issues with this board Installed Linux and Win XP pro on it with no problem.

Board support up to 16 gig Ram on a 64 bit system that should be enough for most people.

This motherboard supports the latest Intel® Core™2 processors in LGA775 package. It also can support Intel® 45nm Multi-Core CPU. With new Intel® Core™ microarchitecture technology and 1600/1333/1066/800MHz FSB, Intel® Core™2 processor is one of the most powerful and energy efficient CPU in the world.


  • Intel LGA775 Platform
  • Intel® P43 chipset
  • ASUS EPU -4 Engine
  • ASUS Express Gate
  • 100% Japan-made high-quality Conductive Polymer Capacitors
  • VRD11.1 CPU support (backward support VRD10.X CPU)

The Safest Web Browser

Firefox keeps your personal info personal and your online interests away from the bad guys.

More info:     http://tinyurl.com/5c478d

100 Best Companies to Work For

Even in this economy, some companies are going out of their way to please employees. This year, there’s a new no. 1, as Google slips to no. 4. See detailed profiles of the top 100 employers, including interactive maps, key perks, contact information, and more. More
  1. NetApp
  2. Edward Jones
  3. Boston Consulting
  4. Google
  5. Wegmans
  1. Cisco
  2. Genentech
  3. Methodist Hospital
  4. Goldman Sachs
  5. Nugget Market

100 Most Breathtaking Fireworks in The World

http://tinyurl.com/868hwy

With virus, spyware and phishing scams so common on the web today, what’s an average user to do?  Even if you’re not a computer savvy geek there are still at least 6 simple steps everyone can take to have a more secure computer or browsing experience.

1. Create secure passwords.

Simple security starts with a password. Even if it’s not a super secure password, it’s better to have something than nothing at all. But why not go a step further? Creating secure passwords isn’t that tough to do. Here’s a few tips:

  1. Longer is better (if you can remember it)
  2. Add numbers and symbols($#@?) to mix things up.
  3. Don’t base your password on a dictionary word like “bigdog123”.

If you’d like some more tips, head over to Linux-Tip.net which has a pretty decent guide to follow, or if you want some deeper explanations take a look at Bruce Schneier’s article, “Secure Passwords Keep You Safer“.

2. Keep the passwords secure.

I would hope that this goes without saying, but for those who need it, here it is. DON’T GIVE ANYBODY YOUR PASSWORD! This includes help desk employees or anybody, unless you absolutely have to. 99.99% of the time, tech support personnel do not need your password and shouldn’t be asking for it in the first place. If you do give your password out to someone, please do yourself a favour and change it as soon as you can to protect your information.

Also, be sure to change your passwords regularly. Every couple months is a good rule of thumb.

3. Dot your “i”s and cross your “t”s.

Be careful when typing in a url. Phishers often set up sites on common misspellings of the site they’re attemping to get your information from.  Here’s an example of how it works: you type in “www.ebbay.com”, a site that looks like eBay shows up and asks for your password. Well, the rest is history from there I’m afraid.

Another variation on this form of attack involves the use of e-mail or other electronic communications. This is what happened to Twitter just recently. An e-mail was sent out with a link to a Twitter page. Instead of being taken to the official Twitter site, users were taken to twitter.access-logins.com/login/ where a very offical looking Twitter login screen asked them for their password. The site was not part of Twitter, but was part of a phishing website (hence the access-logins.com part of the address) that stole their twitter accounts and did crazy stuff to it. That’s why you should NEVER follow a link from an e-mail to login to any site.

This sort of thing happens all the time, even with online banking sites sometimes. Watch that address before you enter your username and password.

4. Bring in … the ANTI-VIRUS!

Anti-virus programs are such a simple way to improve computer security, yet some people still don’t use them. If you don’t like spending the extra cash, why not get a free version? AVG offers an excellent free product that is just as effective against viruses as any paid application. In fact, AVG is the only anti-virus program I use now. You can download it here.

5. Man the firewall!

Firewall? I don’t need no stinking firewall! What’s a firewall? A firewall is like putting a lock on your back door to keep burglars from waltzing straight in. A simple firewall will keep out an entire host of viruses and hackers. If you use Windows XP, just check out this guide for help on how to turn on your firewall.

6. Think before you click.

This kind of ties in with those notes in #3 about phishing. A lot of people (you may be one of those) will click on anything that grabs their attention. Yeah, those “shoot the monkey 5 times and win a plasma TV” ads, you know the ones. Sometimes people will login to a phishing site like the Twitter example and accidentally give away usernames and passwords to their online banking site. It is a very dangerous thing to just click on anything in front of you. Think first, use some common sense, and ask yourself, “how could they afford to give away all those plasma TVs if all you have to do is shoot the stupid monkey?”

7. Update, update, update.

Keeping up-to-date is an important part of computing and security. The recent worm attack on Windows is a prime example of this. Most operating systems make this easy with automatic updates so that you don’t have to worry about it.  However, you should make sure that those automatic updates are enabled. Click here for information on how to double check this on a Windows PC.

I have Norton Internet security, yet my computer has been infected with the Antivirus 2009 program. How can this happen and how do I get rid of it? – Glenn

Your question underscores an often mistaken mindset of many computer users: “If I have security software in place, I shouldn’t get any infections.” Nothing could be further from reality.

Anti-virus/anti-spyware programs as well as firewalls are of no protection if the user of the computer decides to click on links that generate malicious code or download and run questionable files.

The user’s interactions can easily override the installed protection and in some cases, actually disable your protection programs, but make it look like they are still running.

The fake anti-virus program scams actually started last year as “Antivirus 2008″ and it was so successful that it lives on as many variations including “Antivirus 2009.” A clever author of malware discovered a sneaky way to fool folks into installing malicious software into their computers, THEN extract money from them by posing as a legitimate program for removing the malicious software.

The reason that this approach has been so successful is that they very closely mimic Windows warning screens and legitimate antivirus programs. Virtually every legitimate antivirus company has a product called Antivirus 2009, which further confuses the uninitiated.

The most common ways to come in contact with this infection include maliciously coded Web sites that popup a warning message that you are infected, e-mail messages that trick folks into clicking on a link, Web sites that claim you need to download software in order to see a posted video and links or downloads that are spread through social networking sites such as MySpace and Facebook as well as all of the Instant Messaging systems.

At this point in time, any form of popup or error message that refers to Antivirus 2008 or 2009 (including System Antivirus, Ultimate Antivirus, Vista Antivirus, Pro Antivirus or XP Antivirus followed by a number) should be considered extremely suspicious.

If you ever see any reference to a virus that is not specifically from the product that you have installed in your computer for protection, you should consider it to be a fake (Windows, itself won’t ever alert you of a virus infection).

In the same token, any Web site that claims that you need to download a new video program or “codec” in order to view a video should be considered a threat.

Users of file sharing networks are at a high risk of contracting malicious software as it’s often hidden within what appears to be a legitimate program (referred to as a Trojan).

The writers of malicious code count on users that are not really paying attention and at this point, they are fooling people by the millions around the Internet. This type of infection is amongst the worst that I have seen in my 20 years of servicing computers.

Getting rid of the code once it has infected your system can be very involved and is different for the various versions of the infections, so don’t attempt this without help if you are a novice.

Start by identifying the exact version of the malware that you have and placing it in quotation marks followed by the words ‘removal instructions’ in Google (Ex: “Antivirus 2009″ removal instructions).

WARNING: There are so many people infected with this family of malware that many new scam programs that claim to specifically clean the code have popped up. Some appear to be free programs that will only scan your system for free, but charge you to remove the code and often they don’t even do that properly.

Since there are so many different variations of this infection, the exact steps are going to be based on the exact version of the malware that you have.

In our service business, we use a combination of several manual detection and removal processes (again, based on the exact version of the infection) along with multiple scanning programs to ensure that all potential re-infection avenues (temp files, restore points, modified dll files, etc.) have been removed or restored.

Depending upon how long and which version of the malware you have, you may also need to run a Windows repair after you remove the code as certain Windows files can become corrupted as a side effect.

If you know how to work with the Windows registry, operate in Safe Mode and have a current backup of your critical files, you should be able to find instructions online for removing the exact version of the infection that you have.

If not, consult a tech savvy friend or a professional as removing this infection properly (so that you don’t re-infect) is not for the novice.

New Windows Worm Seises 8 Million Business PC’S in a Week

More info:  http://tinyurl.com/74rbj4

Hubble’s Latest Views of the Universe

http://tinyurl.com/8s578g

AntiVirus Software Review

You think the winter flu was bad…

Today’s computer viruses are more sophisticated and aggressive than ever. Thankfully, with antivirus software, you can confidently keep your data safe and your computer free of infection.

http://tinyurl.com/dojbp