Saturday, June 30, 2012
インターネットへの基本的なガイド
インターネットは、世界中のネットワークの数千人から成っているコンピュータネットワークです。誰もがインターネットに接続されている正確にどのように多くのコンピュータを知らない。それは、これらの数百万ドル、しかし、確かである。
誰もがインターネットを担当していません。そこにこのネットワークの技術的側面を開発し、その上にアプリケーションを作成するための基準を設定する組織がある、しかし、統治体はコントロールではありません。インターネット·バックボーンを通じて、インターネットのトラフィックフローは、民間企業によって所有されています。
Thursday, June 28, 2012
Choosing An Internet Merchant Account, nice info on Internet Merchant Account..
I hope this insight wii provide a good use for those who want to do business on the web..
Wednesday, June 27, 2012
良いドメイン名を選択する、屋...良い名前は重要です!
成功したWebエクスペリエンスのためのもう一つの良いヒントは...それをinjoy!
Choisir un bon nom de domaine, ya .. bon nom est important!
Un autre bon conseil pour l'expérience web réussie .. il injoy!
Choosing A Good Domain Name, ya..good name is important!
Another good tip for successful web experience..injoy it!
WinXPのをスピードアップする23の方法、デフラグだけでなく、
ディスクをデフラグすると、Windows XPのパフォーマンスを向上させるために多くを行うことはありませんので、ここになります23の提案である。それぞれが顧客のPCのパフォーマンスと信頼性を向上させることができます。すべてのベスト、それらのほとんどはあなたに何の費用がかかりません。
Tuesday, June 26, 2012
23 如何加快 winxp 的,不只是碎片整理
由於碎片整理的磁盤不會做,以提高Windows XP的性能,這裡是23的建議,將。每個人都可以提高客戶的電腦的性能和可靠性。最好的是,他們大多會花你一分錢。
Monday, June 25, 2012
23 façons d'accélérer WinXP, non seulement Defrag
Depuis défragmenter le disque ne fera pas beaucoup pour améliorer les performances de Windows XP, voici 23 suggestions qui. Chacun peut améliorer la performance et la fiabilité des PC de vos clients. Le meilleur de tous, la plupart d'entre eux ne vous coûtera rien.
Sunday, June 24, 2012
20 Grands Secrets Google
http://www.pcmag.com/article2/0, 4149,1306756,00. asp
excl.gif Aucun Liens Actifs, lisez les règles - Modifier par Ninja excl.gif
20大Google.com秘密
http://www.pcmag.com/article2/0 ASP,4149,1306756,00。
excl.gif沒有主動鏈接,閱讀“規則” - “編輯”忍者excl.gif
Saturday, June 23, 2012
20グレートGoogleの秘密
http://www.pcmag.com/article2/0、4149,1306756,00。ASP
excl.gifないアクティブリンクは、ルールをお読みください - 忍者excl.gifによる編集
Friday, June 22, 2012
在Windows XP中的基本和動態磁盤轉換為
Windows XP Professional支持兩種磁盤存儲:基本和動態。基本磁盤存儲使用面向分區的磁盤。基本磁盤包含基本卷(主分區,擴展分區和邏輯驅動器)。
動態磁盤存儲使用面向卷的磁盤,包括基本磁盤的特點,如能夠創建跨越多個磁盤(跨區卷和帶區卷)的卷。
16X DVD +-RW DL DVD 刻錄機比較指南
來源:守則http://www.extrememhz.com/dlcomp-p1.shtml
雙層DVD刻錄機推出以來,一直的興趣相當絕大多數是為什麼我們繼續為您帶來這些廣受歡迎的驅動器的評論。期待現在已經變成降權的痴迷,它已成為在任何現有的或新的系統的重要組成部分的建設,由於價格下降和媒體的炒作持續。廠家是相當清楚的魅力,是他們為什麼每個被釋放他們自己的產品,至少在一個面積最多的評論中所使用的測試方法中脫穎而出。這導致了一些混亂,這是最適合個人需求的驅動。今天,我們比較四個16X雙層驅動器和突出的長處和短處,為了給你一個更好的主意,其中的驅動器是最適合你。
Thursday, June 21, 2012
16x DVD +-RW DL DVD Writer Guide de comparaison
Source:
CODE
http://www.extrememhz.com/dlcomp-p1.shtml
Depuis l'introduction de doubles graveurs de DVD couche, l'intérêt a été assez impressionnant et c'est pourquoi nous continuons à vous apporter des critiques de ces disques très populaires. L'anticipation est maintenant transformée en obsession droit vers le bas et il est devenu un élément clé de tout système actuel ou de nouvelles constructions, grâce à la baisse des prix et du maintien de battage médiatique. Les fabricants sont tout à fait conscient de la fascination et c'est pourquoi ils ont chacun été la libération de leurs propres produits qui se distinguent dans au moins un domaine de la méthodologie de test utilisé dans la plupart des critiques. Cela a conduit à une certaine confusion quant à ce qui est entraînement le mieux adapté pour les besoins des individus. Aujourd'hui, nous comparons quatre disques double couche 16x et mettre en évidence à la fois les points forts et faibles afin de vous donner une meilleure idée de ce qui entraînement le mieux adapté pour vous.
10 Améliorations de la sécurité rapides et gratuit
Le magazine PC.
Avant de dépenser un centime sur la sécurité, il ya des précautions que vous pouvez prendre qui vous protège contre les menaces les plus courantes.
Tuesday, June 19, 2012
10高速かつ無料のセキュリティ強化
PCの雑誌。
あなたがセキュリティにダイムを費やす前に、あなたが最も一般的な脅威からあなたを保護することを取ることができる多くの注意があります。
10快速和免费的安全性增强
PC杂志。
在你花一毛钱安全,有许多可以采取的预防措施,防止最常见的威胁,你。
Monday, June 18, 2012
你一定要知道为什么电脑死机的10个理由
致命的错误:系统变得不稳定或忙碌,“它说。”输入返回到Windows或按控制-Alt-Delete来重新启动您的计算机。如果你这样做,你将失去所有打开的应用程序中的任何未保存的信息。“
你刚才被击中死亡的蓝色屏幕。任何人使用MCFT的Windows将使用这个熟悉的。你能做些什么呢?更重要的是,你怎么能阻止它发生呢?
Sunday, June 17, 2012
Change The Default Location For Installing Apps Part 2.
As the size of hard drives increase, more people are using partitions to separate and store groups of files.
PCがUをクラッシュさせる10の理由を知っている必要があります
致命的なエラー:システムが不安定になったり、ビジー状態であるた、 "それは言います。"コンピュータを再起動するようにControl-Alt-DeleteでWindowsまたは記者に戻ります。これを行う場合には、開いているすべてのアプリケーションで保存されていない情報は失われます。 "
あなたはただ死のブルースクリーンに打たれています。 Mcft Windowsを使用して誰もがこれに精通しています。あなたは何を行うことができますか?さらに重要なのは、どのようにそれが起こって防ぐことができますか?
8人可以使用相同的MSN拨号帐户
它很容易真的。要拨号,整个家庭只有一个法案?
步骤一。购买20美元一个月订阅到MSN无限拨号接入。这将包括MSN 9的CD,您将需要。随着安装的软件,填补了新用户的辅助帐户插槽。确保你挑选@ MSN,如果它给你的选择,Hotmail电子邮件地址将无法正常工作......
说的第二个帐户是拨号连接johnsmith@msn.com类型
用户名:MSN/ johnsmith
密码:*******(任何)
连接到您的本地MSN电话号码,你给二级帐户的其他人将能够做同样的,当您连接。其甜美的交易考虑每个人的互联网接入支付约2块钱一个月,特别是如果你不能得到宽带。如果你想卖掉的人,你实际上可以赚钱这样......但我不建议。
我使用的是一个MSN的高科技,这是一个鲜为人知的秘密甚至大多数员工。
你这样做之后,你不需要任何软件。我会建议保持微观别人帐目。一个简单的事实,如果他们不投在削减它们赶走HEHEHE
我现在宽带所以我不关心,如果我告诉你我的小秘密。谁都知道这个吗?
Saturday, June 16, 2012
8 personnes peuvent utiliser le même compte Msn Dial Up
son vraiment facile. veulent avoir une famille entière sur dial-up avec une seule facture?
la première étape. l'achat de 20 dollar par mois d'abonnement à MSN un accès illimité dial up. Cela comprendra une MSN 9 cd dont vous aurez besoin. Avec le logiciel installé, remplir vos slots compte secondaire avec de nouveaux utilisateurs. Assurez-vous que vous chercher @ msn si elle vous donne le choix, adresses e-mail hotmail ne fonctionne pas ..
Friday, June 15, 2012
How To: Change Your Ip In Less Then 1 Minute
1. Click on "Start" in the bottom left hand corner of screen
2. Click on "Run"
3. Type in "command" and hit ok
Change The Default Location For Installing Apps
As the size of hardrives increase, more people are using partitions to seperate and store groups of files.
Change Text on XP Start Button
Step 1 - Modify
Explorer.exe File
In order to make the
changes, the file explorer.exe located at C:\Windows needs to be
edited. Since explorer.exe is a binary file it requires a special
editor. For purposes of this article I have used Resource Hacker.
Resource HackerTM is a freeware utility to view, modify, rename, add,
delete and extract resources in 32bit Windows executables and
resource files (*.res). It incorporates an internal resource script
compiler and decompiler and works on Microsoft Windows 95/98/ME,
Windows NT, Windows 2000 and Windows XP operating systems.
get this from
h**p://delphi.icm.edu.pl/ftp/tools/ResHack.zip
The first step is to make
a backup copy of the file explorer.exe located at
C:\Windows\explorer. Place it in a folder somewhere on your hard
drive where it will be safe. Start Resource Hacker and open
explorer.exe located at C:\Windows\explorer.exe.
The category we are going
to be using is "String Table". Expand it by clicking the
plus sign then navigate down to and expand string 37 followed by
highlighting 1033. If you are using the Classic Layout rather than
the XP Layout, use number 38. The right hand pane will display the
stringtable. We’re going to modify item 578, currently showing the
word “start” just as it displays on the current Start button.
There is no magic here.
Just double click on the word “start” so that it’s highlighted,
making sure the quotation marks are not part of the highlight. They
need to remain in place, surrounding the new text that you’ll type.
Go ahead and type your new entry. In my case I used Click Me!
You’ll notice that after
the new text string has been entered the Compile Script button that
was grayed out is now active. I won’t get into what’s involved in
compiling a script, but suffice it to say it’s going to make this
exercise worthwhile. Click Compile Script and then save the altered
file using the Save As command on the File Menu. Do not use the Save
command – Make sure to use the Save As command and choose a name
for the file. Save the newly named file to C:\Windows.
Step 2 – Modify the
Registry
!!!make a backup of your
registry before making changes!!!
Now that the modified
explorer.exe has been created it’s necessary to modify the registry
so the file will be recognized when the user logs on to the system.
If you don’t know how to access the registry I’m not sure this
article is for you, but just in case it’s a temporary memory lapse,
go to Start (soon to be something else) Run and type regedit in the
Open field. Navigate to:
HKEY_LOCAL_MACHINE\
SOFTWARE\ Microsoft\ Windows NT\ CurrentVersion\ Winlogon
In the right pane, double
click the "Shell" entry to open the Edit String dialog box.
In Value data: line, enter the name that was used to save the
modified explorer.exe file. Click OK.
Close Registry Editor and
either log off the system and log back in, or reboot the entire
system if that’s your preference. If all went as planned you should
see your new Start button with the revised text.[/b]
Change Music In The Malibu And The Pole Position, GTA Vice Modders
TOOLS YOU WILL NEED (ADOBE AUDITION)
in your Grand Theft Auto Vice City / Audio folder you will see a bunch of mp3's
in your Grand Theft Auto Vice City / Audio folder you will see a bunch of mp3's
Thursday, June 14, 2012
Caught A Virus?
If you've let your guard down--or even if you haven't--it can be hard to tell if your PC is infected. Here's what to do if you suspect the worst.
Heard this one before? You must run antivirus software and keep it up to date or else your PC will get infected, you'll lose all your data, and you'll incur the wrath of every e-mail buddy you unknowingly infect because of your carelessness.
How To Fix Cant See Secure Sites
Fix the problem with seeing them secrue sites (banks or online stores) i found this very usefull to me at my work (isp backbone support lol, at the time i was regular support )
Wednesday, June 13, 2012
cannot use my password to get back into Windows XP
Because of the security features built into Windows XP, it is virtually impossible to get back into the system without the password.
You have several options to try and get around this problem.
You have several options to try and get around this problem.
Calculating Offsets
Introduction
This tutorial is more of a tip than a tutorial. It just explains how to calculate offsets for jumps and calls within the program you are patching.
This tutorial is more of a tip than a tutorial. It just explains how to calculate offsets for jumps and calls within the program you are patching.
Burning BIN/CUE Images with Nero Burning Rom
BIN/CUE image format is quite common on the Internet. It might seem that finding an appropriate software for burning these images is quite hard. Luckily, it's not. In addition to Golden Hawk CDRWin, the original software for BIN/CUE format, you can also use Nero Burning Rom to burn the images.
Please make sure that you have the latest version of Nero, which now is 5.5.10.0
Burn a BIN without a CUE using NERO
You've downloaded a *.BIN file, but there was no *.CUE file associated and you still want to burn the *.BIN file using Nero
Beep Code Manual (On Board Speacker) Part 2.
After repeated requests for beep codes i have decided to post them here maybe they could be pinned
Tuesday, June 12, 2012
Burn .bin file Without A .cue file
To burn a bin file, you will need an appropriate cue file.
You do exactly the same as for iso files, but when you click on burn image, you dont browse to the bin itself, but instead to the cue file, and you open that one.
When the writer starts to burn, it will automatically search for the bin file and start burning it. In fact, the cue file tells the burning program where it can find the bin file that is attached to it. It is VERY IMPORTANT that you use the right cue file when you burn a bin. i.e both cue and bin files that are attached to each other must be located in the same folder, and every bin file has its own cue file.
You do exactly the same as for iso files, but when you click on burn image, you dont browse to the bin itself, but instead to the cue file, and you open that one.
When the writer starts to burn, it will automatically search for the bin file and start burning it. In fact, the cue file tells the burning program where it can find the bin file that is attached to it. It is VERY IMPORTANT that you use the right cue file when you burn a bin. i.e both cue and bin files that are attached to each other must be located in the same folder, and every bin file has its own cue file.
Configuring your Bulletproof FTP Server Tutorial
I am not sure where I found this tutorial, Its been a while It might even have been here... ..So if it is one of yours, my hat goes off to you once again....
After reading the excellent tutorial on "Creating an FTP" that Norway posted
(I would suggest reading and following his tutorial first, then following up with this one)
Bulk Editing Of .xxx to .zip or .mp3
lets us say you have just download a new album or game
but all the files are .xxx and you need them to be
zip's, rar's, mp3's etc.....
then do the following
then do the following
Monday, June 11, 2012
Border And Text Effects In Psp8, For use with PSP8
Do you want to jazz up your graphics? Want to add a bit of pazazz to your art? Well, this guide features some knowledge, border effects, and even directions to make your own swirlie brushes!
Now, open PSP and get ready to learn! Let's start off with the basics.
Now, open PSP and get ready to learn! Let's start off with the basics.
Boot Winxp Fast Tutorial
Follow the following steps
Boot Block Recovery For Free
You don't need to pay a measly sum of dollars just to recover from a boot block mode. Here it is folks:
AWARD Bootblock recovery:
That shorting trick should work if the boot block code is not corrupted, and it should not be if /sb switch is used when flashing the bios (instead of /wb switch).
Sunday, June 10, 2012
Bit Torrent Tutorials
The first things you need to know about using Bit Torrent:
Tutorial BIOS Update Procedure
All latest Motherboards today, 486/ Pentium / Pentium Pro etc.,ensure that upgrades are easily obtained by incorporating the system BIOS in a FLASH Memory component. With FLASH BIOS, there is no need to replace an EPROM component. Once downloaded, the upgrade utility fits on a floppy disc allowing the user to save, verify and update the system BIOS. A hard drive or a network drive can also be used to run the newer upgrade utilities. However, memory managers can not be installed while upgrading.
Most pre-Pentium motherboards do not have a Flash BIOS. The following instructions therefore do not apply to these boards. If your motherboard does not have a Flash BIOS (EEPROM) you will need to use an EPROM programmer to re-program the BIOS chip. See your dealer for more information about this.
Please read the following instructions in full before starting a Flash BIOS upgrade:
A. Create a Bootable Floppy (in DOS)
With a non-formatted disk, type the following:
format a:/s
If using a formatted disk, type:
sys a:
This procedure will ensure a clean boot when you are flashing the new BIOS.
B. Download the BIOS file
Download the correct BIOS file by clicking on the file name of the BIOS file you wish to download.
Save the BIOS file and the Flash Utility file in the boot disk you have created. Unzip the BIOS file and the flash utility file. If you don't have an "unzip" utility, download the WinZip for Windows 95 shareware/ evaluation copy for that one time use from _www.winzip.com or _www.pkware.com. Most CD ROMs found in computer magazines, have a shareware version of WinZip on them.
You should have extracted two files:
Flash BIOS utility eg: flash7265.exe (for example)
BIOS eg: 6152J900.bin (example)
Use the latest flash utility available unless otherwise specified (either on the BIOS update page or in the archive file). This information is usually provided.
C. Upgrade the System BIOS
During boot up, write down the old BIOS version because you will need to use it for the BIOS backup file name.
Place the bootable floppy disk containing the BIOS file and the Flash Utility in drive a, and reboot the system in MS-DOS, preferably Version 6.22
At the A:> prompt, type the corresponding Flash BIOS utility and the BIOS file with its extension.
For example:
flash625 615j900.bin
From the Flash Memory Writer menu, select "Y" to "Do you want to save BIOS?" if you want to save (back up) your current BIOS (strongly recommended), then type the name of your current BIOS and its extension after FILE NAME TO SAVE: eg: a:\613J900.bin
Alternatively select "N" if you don't want to save your current BIOS. Beware, though, that you won't be able to recover from a possible failure.
Select "Y" to "Are you sure to program?"
Wait until it displays "Message: Power Off or Reset the system"
Once the BIOS has been successfully loaded, remove the floppy disk and reboot the system. If you write to BIOS but cannot complete the procedure, do not switch off, because the computer will not be able to boo, and you will not be given another chance to flash. In this case leave your system on until you resolve the problem (flashing BIOS with old file is a possible solution, provided you've made a backup before)
Make sure the new BIOS version has been loaded properly by taking note of the BIOS identifier as the system is rebooting.
For AMI BIOS
Once the BIOS has been successfully loaded, remove the floppy disk and reboot the system holding the "END" key prior to power on until you enter CMOS setup. If you do not do this the first time booting up after upgrading the BIOS, the system will hang.
BIOS Update Tips
note:
1.Make sure never to turn off or reset your computer during the flash process. This will corrupt the BIOS data. We also recommend that you make a copy of your current BIOS on the bootable floppy so you can reflash it if you need to. (This option is not available when flashing an AMI BIOS).
2. If you have problems installing your new BIOS please check the following:
Have you done a clean boot?
In other words, did you follow the above procedure for making a bootable floppy? This ensures that when booting from "A" there are no device drivers on the diskette. Failing to do a clean boot is the most common cause for getting a "Memory Insufficient" error message when attempting to flash a BIOS.
If you have not used a bootable floppy, insure a clean boot either by
a) pressing F5 during bootup
b) by removing all device drivers on the CONFIG.SYS including the HIMEM.SYS. Do this by using the EDIT command.
Have you booted up under DOS?
Booting in Windows is another common cause for getting a "Memory Insufficient" error message when attempting to flash a BIOS. Make sure to boot up to DOS with a minimum set of drivers. Important: Booting in DOS does not mean selecting "Restart computer in MS-DOS Mode" from Windows98/95 shutdown menu or going to Prompt mode in WindowsNT, but rather following the above procedure (format a: /s and rebooting from a:\).
Have you entered the full file name of the flash utility and the BIOS plus its extension?
Do not forget that often you will need to add a drive letter (a:\) before flashing the BIOS. Example: when asked for file name of new BIOS file which is on your floppy disk, in case you're working from c:\ your will need to type a:\615j900.bin, rather than 615j900.bin only.
BIN & .CUE simple tutorial.
There always seems to be the question "what do I do with a .bin and .cue file" in these forums so I figured I would write a quick and simple tutorial. Please feel free to add more.
So you have downloaded two files, one with a .bin extension and one with a .cue extension. "What do I do with these?" you ask. There are a number of options.
BURN TO CD
You will need either NERO, CDRWIN or FIREBURNER to burn the file.
To burn with NERO:
Start NERO, choose FILE, choose BURN IMAGE, locate the .cue file you have and double click it. A dialog box will come up, for anything other than music make sure you choose DISC-AT-ONCE (DAO). You can also turn off the simulation burn if you so choose.
Then burn away.
To burn with CDRWin:
Start CDRWin, choose the button on the top left, choose LOAD CUESHEET, press START RECORDING.
To burn with Fireburner:
Start Fireburner, click on the button on the bottom left corner "VISUAL CUE BURNER/BINCHUNKER", press the right mouse button and choose LOAD TRACKS FROM .CUE and choose the correct .CUE file, press the right mouse button again and chooseselect "Burn/Test Burn", choose DISK AT ONCE (DAO), disable TEST BURN and MULTISESSION, press OK.
.CUE ERRORS
The most common error you will get with a .cue file is when it points to an incorrect path. This is easily fixed. Find the .bin file, copy the exact title including the .bin extension. Now find the .cue file, open the .cue file using notepad. It should look similar to this:
FILE "name of file.bin" BINARY
TRACK 01 MODE2/2352
INDEX 01 00:00:00
TRACK 02 MODE2/2352
INDEX 00 00:04:00
INDEX 01 00:06:00
Delete everything in the quotes, in this case we would
delete name of file.bin. Now place the title you copied
in between the quotes. Save the changes and close out.
Thats it, your .cue file should work now.
OTHER WAYS TO USE .BIN & .CUE FILES
VCDGear:
This program will allow you to extract MPEG streams from CD images, convert VCD files to MPEG, correct MPEG errors, and more.
Daemon Tools:
This program creates a virtual drive on your PC which will allow you to "mount" the .cue file and use whatever is in the .bin file without having to burn it to a cd.
ISOBuster:
This program will allow you to "bust" open the .bin file and extract the files within the .bin.
_________________
Big Brother and Ndisuio.sys A new Internet phenomenon?
Ndisuio.sys, a very mysterious system file is present in Windows XP and is a driver for wireless things such as wi-fi and bluetooth. However, there have been many issues with this file downloading immense amounts of data and perhaps causing activity that is "big brother"ish.
涉及一個PSX墊連接到電腦,警告焊接..
如果你是冒險的感覺......
如果你有一個遊戲機和個人電腦,沒有電腦,或者只是那些在市場上有墊似乎過於昂貴,或任何你不喜歡,你在這裡有一個很好的選擇。它連接到您的PC保護其所有功能感謝優秀司機DirectPad您的PlayStation墊(人)。
Saturday, June 9, 2012
Beep Code Manual (On Board Speacker)
Beep Code Manual, Better Than Gold Techies, American Megatrends Int. & Phoenix
(I'm IT, I use these codes to trouble shoot hardware issues at my job. Enjoy) cold.gif
(I'm IT, I use these codes to trouble shoot hardware issues at my job. Enjoy) cold.gif
All About BandWidth
This is well written explanation about bandwidth, very useful info.
BandWidth Explained
Most hosting companies offer a variety of bandwidth options in their plans. So exactly what is bandwidth as it relates to web hosting? Put simply, bandwidth is the amount of traffic that is allowed to occur between your web site and the rest of the internet. The amount of bandwidth a hosting company can provide is determined by their network connections, both internal to their data center and external to the public internet.
Network Connectivity
The internet, in the most simplest of terms, is a group of millions of computers connected by networks. These connections within the internet can be large or small depending upon the cabling and equipment that is used at a particular internet location. It is the size of each network connection that determines how much bandwidth is available. For example, if you use a DSL connection to connect to the internet, you have 1.54 Mega bits (Mb) of bandwidth. Bandwidth therefore is measured in bits (a single 0 or 1). Bits are grouped in bytes which form words, text, and other information that is transferred between your computer and the internet.
If you have a DSL connection to the internet, you have dedicated bandwidth between your computer and your internet provider. But your internet provider may have thousands of DSL connections to their location. All of these connection aggregate at your internet provider who then has their own dedicated connection to the internet (or multiple connections) which is much larger than your single connection. They must have enough bandwidth to serve your computing needs as well as all of their other customers. So while you have a 1.54Mb connection to your internet provider, your internet provider may have a 255Mb connection to the internet so it can accommodate your needs and up to 166 other users (255/1.54).
Traffic
A very simple analogy to use to understand bandwidth and traffic is to think of highways and cars. Bandwidth is the number of lanes on the highway and traffic is the number of cars on the highway. If you are the only car on a highway, you can travel very quickly. If you are stuck in the middle of rush hour, you may travel very slowly since all of the lanes are being used up.
Traffic is simply the number of bits that are transferred on network connections. It is easiest to understand traffic using examples. One Gigabyte is 2 to the 30th power (1,073,741,824) bytes. One gigabyte is equal to 1,024 megabytes. To put this in perspective, it takes one byte to store one character. Imagine 100 file cabinets in a building, each of these cabinets holds 1000 folders. Each folder has 100 papers. Each paper contains 100 characters - A GB is all the characters in the building. An MP3 song is about 4MB, the same song in wav format is about 40MB, a full length movie can be 800MB to 1000MB (1000MB = 1GB).
If you were to transfer this MP3 song from a web site to your computer, you would create 4MB of traffic between the web site you are downloading from and your computer. Depending upon the network connection between the web site and the internet, the transfer may occur very quickly, or it could take time if other people are also downloading files at the same time. If, for example, the web site you download from has a 10MB connection to the internet, and you are the only person accessing that web site to download your MP3, your 4MB file will be the only traffic on that web site. However, if three people are all downloading that same MP at the same time, 12MB (3 x 4MB) of traffic has been created. Because in this example, the host only has 10MB of bandwidth, someone will have to wait. The network equipment at the hosting company will cycle through each person downloading the file and transfer a small portion at a time so each person's file transfer can take place, but the transfer for everyone downloading the file will be slower. If 100 people all came to the site and downloaded the MP3 at the same time, the transfers would be extremely slow. If the host wanted to decrease the time it took to download files simultaneously, it could increase the bandwidth of their internet connection (at a cost due to upgrading equipment).
Hosting Bandwidth
In the example above, we discussed traffic in terms of downloading an MP3 file. However, each time you visit a web site, you are creating traffic, because in order to view that web page on your computer, the web page is first downloaded to your computer (between the web site and you) which is then displayed using your browser software (Internet Explorer, Netscape, etc.) . The page itself is simply a file that creates traffic just like the MP3 file in the example above (however, a web page is usually much smaller than a music file).
A web page may be very small or large depending upon the amount of text and the number and quality of images integrated within the web page. For example, the home page for CNN.com is about 200KB (200 Kilobytes = 200,000 bytes = 1,600,000 bits). This is typically large for a web page. In comparison, Yahoo's home page is about 70KB.
How Much Bandwidth Is Enough?
It depends (don't you hate that answer). But in truth, it does. Since bandwidth is a significant determinant of hosting plan prices, you should take time to determine just how much is right for you. Almost all hosting plans have bandwidth requirements measured in months, so you need to estimate the amount of bandwidth that will be required by your site on a monthly basis
If you do not intend to provide file download capability from your site, the formula for calculating bandwidth is fairly straightforward:
Average Daily Visitors x Average Page Views x Average Page Size x 31 x Fudge Factor
If you intend to allow people to download files from your site, your bandwidth calculation should be:
[(Average Daily Visitors x Average Page Views x Average Page Size) +
(Average Daily File Downloads x Average File Size)] x 31 x Fudge Factor
Let us examine each item in the formula:
Average Daily Visitors - The number of people you expect to visit your site, on average, each day. Depending upon how you market your site, this number could be from 1 to 1,000,000.
Average Page Views - On average, the number of web pages you expect a person to view. If you have 50 web pages in your web site, an average person may only view 5 of those pages each time they visit.
Average Page Size - The average size of your web pages, in Kilobytes (KB). If you have already designed your site, you can calculate this directly.
Average Daily File Downloads - The number of downloads you expect to occur on your site. This is a function of the numbers of visitors and how many times a visitor downloads a file, on average, each day.
Average File Size - Average file size of files that are downloadable from your site. Similar to your web pages, if you already know which files can be downloaded, you can calculate this directly.
Fudge Factor - A number greater than 1. Using 1.5 would be safe, which assumes that your estimate is off by 50%. However, if you were very unsure, you could use 2 or 3 to ensure that your bandwidth requirements are more than met.
Usually, hosting plans offer bandwidth in terms of Gigabytes (GB) per month. This is why our formula takes daily averages and multiplies them by 31.
Summary
Most personal or small business sites will not need more than 1GB of bandwidth per month. If you have a web site that is composed of static web pages and you expect little traffic to your site on a daily basis, go with a low bandwidth plan. If you go over the amount of bandwidth allocated in your plan, your hosting company could charge you over usage fees, so if you think the traffic to your site will be significant, you may want to go through the calculations above to estimate the amount of bandwidth required in a hosting plan.
BandWidth Explained
Most hosting companies offer a variety of bandwidth options in their plans. So exactly what is bandwidth as it relates to web hosting? Put simply, bandwidth is the amount of traffic that is allowed to occur between your web site and the rest of the internet. The amount of bandwidth a hosting company can provide is determined by their network connections, both internal to their data center and external to the public internet.
Network Connectivity
The internet, in the most simplest of terms, is a group of millions of computers connected by networks. These connections within the internet can be large or small depending upon the cabling and equipment that is used at a particular internet location. It is the size of each network connection that determines how much bandwidth is available. For example, if you use a DSL connection to connect to the internet, you have 1.54 Mega bits (Mb) of bandwidth. Bandwidth therefore is measured in bits (a single 0 or 1). Bits are grouped in bytes which form words, text, and other information that is transferred between your computer and the internet.
If you have a DSL connection to the internet, you have dedicated bandwidth between your computer and your internet provider. But your internet provider may have thousands of DSL connections to their location. All of these connection aggregate at your internet provider who then has their own dedicated connection to the internet (or multiple connections) which is much larger than your single connection. They must have enough bandwidth to serve your computing needs as well as all of their other customers. So while you have a 1.54Mb connection to your internet provider, your internet provider may have a 255Mb connection to the internet so it can accommodate your needs and up to 166 other users (255/1.54).
Traffic
A very simple analogy to use to understand bandwidth and traffic is to think of highways and cars. Bandwidth is the number of lanes on the highway and traffic is the number of cars on the highway. If you are the only car on a highway, you can travel very quickly. If you are stuck in the middle of rush hour, you may travel very slowly since all of the lanes are being used up.
Traffic is simply the number of bits that are transferred on network connections. It is easiest to understand traffic using examples. One Gigabyte is 2 to the 30th power (1,073,741,824) bytes. One gigabyte is equal to 1,024 megabytes. To put this in perspective, it takes one byte to store one character. Imagine 100 file cabinets in a building, each of these cabinets holds 1000 folders. Each folder has 100 papers. Each paper contains 100 characters - A GB is all the characters in the building. An MP3 song is about 4MB, the same song in wav format is about 40MB, a full length movie can be 800MB to 1000MB (1000MB = 1GB).
If you were to transfer this MP3 song from a web site to your computer, you would create 4MB of traffic between the web site you are downloading from and your computer. Depending upon the network connection between the web site and the internet, the transfer may occur very quickly, or it could take time if other people are also downloading files at the same time. If, for example, the web site you download from has a 10MB connection to the internet, and you are the only person accessing that web site to download your MP3, your 4MB file will be the only traffic on that web site. However, if three people are all downloading that same MP at the same time, 12MB (3 x 4MB) of traffic has been created. Because in this example, the host only has 10MB of bandwidth, someone will have to wait. The network equipment at the hosting company will cycle through each person downloading the file and transfer a small portion at a time so each person's file transfer can take place, but the transfer for everyone downloading the file will be slower. If 100 people all came to the site and downloaded the MP3 at the same time, the transfers would be extremely slow. If the host wanted to decrease the time it took to download files simultaneously, it could increase the bandwidth of their internet connection (at a cost due to upgrading equipment).
Hosting Bandwidth
In the example above, we discussed traffic in terms of downloading an MP3 file. However, each time you visit a web site, you are creating traffic, because in order to view that web page on your computer, the web page is first downloaded to your computer (between the web site and you) which is then displayed using your browser software (Internet Explorer, Netscape, etc.) . The page itself is simply a file that creates traffic just like the MP3 file in the example above (however, a web page is usually much smaller than a music file).
A web page may be very small or large depending upon the amount of text and the number and quality of images integrated within the web page. For example, the home page for CNN.com is about 200KB (200 Kilobytes = 200,000 bytes = 1,600,000 bits). This is typically large for a web page. In comparison, Yahoo's home page is about 70KB.
How Much Bandwidth Is Enough?
It depends (don't you hate that answer). But in truth, it does. Since bandwidth is a significant determinant of hosting plan prices, you should take time to determine just how much is right for you. Almost all hosting plans have bandwidth requirements measured in months, so you need to estimate the amount of bandwidth that will be required by your site on a monthly basis
If you do not intend to provide file download capability from your site, the formula for calculating bandwidth is fairly straightforward:
Average Daily Visitors x Average Page Views x Average Page Size x 31 x Fudge Factor
If you intend to allow people to download files from your site, your bandwidth calculation should be:
[(Average Daily Visitors x Average Page Views x Average Page Size) +
(Average Daily File Downloads x Average File Size)] x 31 x Fudge Factor
Let us examine each item in the formula:
Average Daily Visitors - The number of people you expect to visit your site, on average, each day. Depending upon how you market your site, this number could be from 1 to 1,000,000.
Average Page Views - On average, the number of web pages you expect a person to view. If you have 50 web pages in your web site, an average person may only view 5 of those pages each time they visit.
Average Page Size - The average size of your web pages, in Kilobytes (KB). If you have already designed your site, you can calculate this directly.
Average Daily File Downloads - The number of downloads you expect to occur on your site. This is a function of the numbers of visitors and how many times a visitor downloads a file, on average, each day.
Average File Size - Average file size of files that are downloadable from your site. Similar to your web pages, if you already know which files can be downloaded, you can calculate this directly.
Fudge Factor - A number greater than 1. Using 1.5 would be safe, which assumes that your estimate is off by 50%. However, if you were very unsure, you could use 2 or 3 to ensure that your bandwidth requirements are more than met.
Usually, hosting plans offer bandwidth in terms of Gigabytes (GB) per month. This is why our formula takes daily averages and multiplies them by 31.
Summary
Most personal or small business sites will not need more than 1GB of bandwidth per month. If you have a web site that is composed of static web pages and you expect little traffic to your site on a daily basis, go with a low bandwidth plan. If you go over the amount of bandwidth allocated in your plan, your hosting company could charge you over usage fees, so if you think the traffic to your site will be significant, you may want to go through the calculations above to estimate the amount of bandwidth required in a hosting plan.
Backtracking EMAIL Messages
Tracking email back to its source: Twisted Evil
cause i hate spammers... Evil or Very Mad
Ask most people how they determine who sent them an email message and the response is almost universally, "By the From line." Unfortunately this symptomatic of the current confusion among internet users as to where particular messages come from and who is spreading spam and viruses. The "From" header is little more than a courtesy to the person receiving the message. People spreading spam and viruses are rarely courteous. In short, if there is any question about where a particular email message came from the safe bet is to assume the "From" header is forged.
Friday, June 8, 2012
B.A. regedit
ok,any of you that do websites and like to open .html and similar files in notepad to edit scrpits, this is THE coolest windows registry edit ever
you can download the zip file with the .reg in it (run it and it automatically adds itself to your registry) or do it manually
you can download the zip file with the .reg in it (run it and it automatically adds itself to your registry) or do it manually
A Web Standards Checklist, How to make a proper website
A web standards checklist
The term web standards can mean different things to different people. For some, it is 'table-free sites', for others it is 'using valid code'. However, web standards are much broader than that. A site built to web standards should adhere to standards (HTML, XHTML, XML, CSS, XSLT, DOM, MathML, SVG etc) and pursue best practices (valid code, accessible code, semantically correct code, user-friendly URLs etc).
A very small tut for RealMedia
You may find this helpful if you donwload hundreds of short episodes in rm format like me and tired of double-click to open next files.
Thursday, June 7, 2012
Auto End Tasks to Enable a Proper Shutdown
This reg file automatically ends tasks and timeouts that prevent programs from shutting down and clears the Paging File on Exit.
anti leech hacking tutorial
I was just asking to know if there is some audiance before
here is my methode
here is my methode
Anonymity of Proxy
The exchange of information in Internet is made by the "client - server" model. A client sends a request (what files he needs) and a server sends a reply (required files). For close cooperation (full understanding) between a client and a server the client sends additional information about itself: a version and a name of an operating system, configuration of a browser (including its name and version) etc. This information can be necessary for the server in order to know which web-page should be given (open) to the client.
Wednesday, June 6, 2012
Anonymity
I can see you hiding in the shadows over there and so can the logs of all the web sites, FTP servers and other nooks and crannies you visit on the web. The sort of information gathered by these logs and which is available to the webmasters of the sites you visit include the address of the previous site you visited, your IP address, your computer's ID name, your physical location and the name of your ISP along with less personal details such as the operating system you're using and your screen resolution. If someone was snooping through your dustbin to gather information on consumer trends or tracking your every move to see where it is you go everyday you wouldn't be too chuffed would you. Well the web is no different, it's still an invasion of privacy and a threat to security and you don't have to put up with it.
Tuesday, June 5, 2012
ALL About Spyware
There are a lot of PC users that know little about "Spyware", "Mal-ware", "hijackers", "Dialers" & many more. This will help you avoid pop-ups, spammers and all those baddies.
What is spy-ware?
Spy-ware is Internet jargon for Advertising Supported software (Ad-ware). It is a way for shareware authors to make money from a product, other than by selling it to the users. There are several large media companies that offer them to place banner ads in their products in exchange for a portion of the revenue from banner sales. This way, you don't have to pay for the software and the developers are still getting paid. If you find the banners annoying, there is usually an option to remove them, by paying the regular licensing fee.
What is spy-ware?
Spy-ware is Internet jargon for Advertising Supported software (Ad-ware). It is a way for shareware authors to make money from a product, other than by selling it to the users. There are several large media companies that offer them to place banner ads in their products in exchange for a portion of the revenue from banner sales. This way, you don't have to pay for the software and the developers are still getting paid. If you find the banners annoying, there is usually an option to remove them, by paying the regular licensing fee.
All About Movie Tags (what Is A Dvdrip, Cam Etc.)
Original Sources
Monday, June 4, 2012
All about ftp must read
Setting Up A Ftp:
Well, since many of us have always wondered this, here it is. Long and drawn out. Also, before attempting this, realize one thing; You will have to give up your time, effort, bandwidth, and security to have a quality ftp server.
Well, since many of us have always wondered this, here it is. Long and drawn out. Also, before attempting this, realize one thing; You will have to give up your time, effort, bandwidth, and security to have a quality ftp server.
That being said, here it goes. First of all, find out if your IP (Internet Protocol) is static (not changing) or dynamic (changes everytime you log on). To do this, first consider the fact if you have a dial up modem. If you do, chances are about 999 999 out of 1 000 000 that your IP is dynamic. To make it static, just go to a place like h*tp://www.myftp.org/ to register for a static ip address.
Accessing The Entire Internet On Your 3 Phone, U8110, E616 etc
If you have a phone thats with the provider 3 theres a simple trick to allow you to access the entire internet on its browser without having to go through 3 services and only what they want to allow you access to view.
Simply do the following.
Simply do the following.
A Basic Guide to the Internet
The Internet is a computer network made up of thousands of networks worldwide. No one knows exactly how many computers are connected to the Internet. It is certain, however, that these number in the millions.
Sunday, June 3, 2012
匿名性
私は、あなたがあそこの影に隠れて見ることができますので、あなたがウェブ上のすべてのウェブサイト、FTPサーバーと他の隅や割れ目のログができます。これらのログが収集する情報の種類、どのあなたが訪問した以前のサイトのアドレスが含まれて訪問したサイトのウェブマスターに利用可能で、IPアドレス、コンピュータのID名は、物理的な場所と一緒にISPの名前以下の個人的な使用しているオペレーティングシステムなどの詳細と画面の解像度。誰かが消費者の動向に関する情報を収集するために、ごみ箱経由で詮索したり、それがどこにあるか見るためにすべての動きを追跡されている場合はあなたが毎日行くにはあまりにもあなたでしょう喜んでされることはありません。よくウェブは違いはありません、それはまだプライバシーとセキュリティへの脅威の侵入だとあなたはそれを我慢する必要はありません。
FTPについてのすべての
ftpをアップ設定:
さて、私たちの多くはこれを常に疑問に思っているので、ここにある。ロングと引き出された。また、これを試みる前に、一つのことを実現する、あなたの時間、労力、帯域幅、および高品質のFTPサーバを使用しているように、セキュリティを放棄する必要があります。
そうは言っても、ここに行く。あなたのIP(インターネットプロトコル)は、(変更が毎回ログオンする)静的(変化しない)または動的の場合、まず第一に、見つける。あなたがモデムダイヤルアップを使用している場合これを行うには、まず事実を考慮してください。あなたがしなければ、チャンスはあなたのIPが動的であること1 000 000のうち999程度である。それは静的にするには、単にH * tpは:/ /静的IPアドレスに登録するwww.myftp.org/~~Vような場所に移動します。
Un guide de base de l'Internet
L'Internet est un réseau informatique constitué de milliers de réseaux à travers le monde. Personne ne sait exactement combien d'ordinateurs sont connectés à l'Internet. Il est certain, toutefois, que ces nombres dans les millions.
Personne n'est en charge de l'Internet. Il ya des organisations qui développent des aspects techniques de ce réseau et établir des normes pour la création d'applications à ce sujet, mais aucun organe directeur est sous contrôle. La dorsale Internet, à travers lequel les flux de trafic Internet, est détenue par des sociétés privées.
16倍速DVD +-RW DL DVDライター比較ガイド
ソース:CODEhttp://www.extrememhz.com/dlcomp-p1.shtml
片面2層DVDライターの導入以来、関心は非常に圧倒的され、私達はこれらの人気の高いドライブのレビューをもたらし続ける理由でもあります。期待は右下の強迫観念になってきましたが、ビルド、現在または新しいシステムの主要コンポーネントで、価格低下と継続的なメディアの誇大宣伝のおかげでとなっています。メーカーが魅力の非常に認識しており、彼らはそれぞれほとんどのレビューで使用されているテスト方法の少なくとも1つの領域に優れた自社製品をリリースしている理由です。これは最高の個人のニーズに適しているドライブへのようないくつかの混乱につながっている。今日、私たちはあなたのドライブが最高のあなたに適しているのより良いアイデアを与えるために、4倍速二層ドライブを比較し、長所と短所の両方を強調表示します。
10 raisons pour lesquelles accident PC U Know doit
Fatal error: le système est devenu instable ou est occupé, "dit-il." Entrée pour revenir à Windows ou appuyez sur Ctrl-Alt-Suppr pour redémarrer votre ordinateur. Si vous faites cela, vous perdrez toutes les informations non enregistrées dans toutes les applications ouvertes. "
Vous venez d'être frappé par le Blue Screen of Death. Toute personne qui utilise MCFT Windows sera familier avec ce. Que pouvez-vous faire? Plus important encore, comment pouvez-vous empêcher que cela se?
8人がアカウントをダイヤルアップと同じMSNを使用できる
它很容易真的。要拨号,整个家庭只有一个法案?
步骤一。购买20美元一个月订阅到MSN无限拨号接入。这将包括MSN 9的CD,您将需要。随着安装的软件,填补了新用户的辅助帐户插槽。确保你挑选@ MSN,如果它给你的选择,Hotmail电子邮件地址将无法正常工作......
说的第二个帐户是拨号连接johnsmith@msn.com类型
用户名:MSN/ johnsmith
密码:*******(任何)
连接到您的本地MSN电话号码,你给二级帐户的其他人将能够做同样的,当您连接。其甜美的交易考虑每个人的互联网接入支付约2块钱一个月,特别是如果你不能得到宽带。如果你想卖掉的人,你实际上可以赚钱这样......但我不建议。
我使用的是一个MSN的高科技,这是一个鲜为人知的秘密甚至大多数员工。
你这样做之后,你不需要任何软件。我会建议保持微观别人帐目。一个简单的事实,如果他们不投在削减它们赶走HEHEHE
我现在宽带所以我不关心,如果我告诉你我的小秘密。谁都知道这个吗?
23 Ways To Speed WinXP, Not only Defrag
Since defragging the disk won't do much to improve Windows XP performance, here are 23 suggestions that will. Each can enhance the performance and reliability of your customers' PCs. Best of all, most of them will cost you nothing.
20 Great Google Secrets
Google is clearly the best general-purpose search engine on the Web
But most people don't use it to its best advantage. Do you just plug in a keyword or two and hope for the best? That may be the quickest way to search, but with more than 3 billion pages in Google's index, it's still a struggle to pare results to a manageable number.
But Google is an remarkably powerful tool that can ease and enhance your Internet exploration. Google's search options go beyond simple keywords, the Web, and even its own programmers. Let's look at some of Google's lesser-known options.
16x Dvd+-rw Dl Dvd Writer Comparison Guide
Since the introduction of double layer DVD writers, the interest has been quite overwhelming and is why we keep bringing you reviews of these highly popular drives. The anticipation has now turned into down right obsession and it has become a key component in any current or new system build, thanks to the declining prices and continued media hype. Manufacturers are quite aware of the fascination and is why they have each been releasing their own products which excel in at least one area of the testing methodology used in most reviews. This has led to some confusion as to which drive is best suited for the individuals needs. Today, we compare four 16x double layer drives and highlight both the strong and weak points in order to give you a better idea of which drive is best suited for you.
Saturday, June 2, 2012
Check For Dos, Check to see if you are infected.
When you first turn on you computer (BEFORE DIALING INTO YOUR ISP),
open a MS-DOS Prompt window (start/programs MS-DOS Prompt).
Then type netstat -arn and press the Enter key.
Your screen should display the following (without the dotted lines
which I added for clarification).
open a MS-DOS Prompt window (start/programs MS-DOS Prompt).
Then type netstat -arn and press the Enter key.
Your screen should display the following (without the dotted lines
which I added for clarification).
Broken Ie, How to fix it
So one of your friends, not you of course, has managed to nuke Internet Explorer and they are unsure how they did it. You;ve eliminated the possibility of viruses and adware, so this just leaves you and a broken IE. Before you begin to even consider running a repair install of the OS, let.s try to do a repair on IE instead.
Best Keyboard Shortcuts (On Windows)
Getting used to using your keyboard exclusively and leaving your mouse behind will make you much more efficient at performing any task on any Windows system. I use the following keyboard shortcuts every day:
Fast and Free Security Enhancements
10 Fast and Free Security Enhancements
PC magazine.
Before you spend a dime on security, there are many precautions you can take that will protect you against the most common threats.
PC magazine.
Before you spend a dime on security, there are many precautions you can take that will protect you against the most common threats.
10 reasons why PCs crash
10 reasons why PCs crash U must Know
Fatal error: the system has become unstable or is busy," it says. "Enter to return to Windows or press Control-Alt-Delete to restart your computer. If you do this you will lose any unsaved information in all open applications."
You have just been struck by the Blue Screen of Death. Anyone who uses Mcft Windows will be familiar with this. What can you do? More importantly, how can you prevent it happening?
Fatal error: the system has become unstable or is busy," it says. "Enter to return to Windows or press Control-Alt-Delete to restart your computer. If you do this you will lose any unsaved information in all open applications."
You have just been struck by the Blue Screen of Death. Anyone who uses Mcft Windows will be familiar with this. What can you do? More importantly, how can you prevent it happening?
Multiple User At Msn Dial Up Account
8 People Can Use The Same Msn Dial Up Account
its easy really. want to have an entire family on dial-up with just one bill?
step one. purchase 20 dollar a month subscription to MSN unlimited access dial up. This will include an MSN 9 cd which you will need. With the software installed, fill up your secondary account slots with new users. Make sure you pick @msn if it gives you the choice, hotmail email addresses will not work..
its easy really. want to have an entire family on dial-up with just one bill?
step one. purchase 20 dollar a month subscription to MSN unlimited access dial up. This will include an MSN 9 cd which you will need. With the software installed, fill up your secondary account slots with new users. Make sure you pick @msn if it gives you the choice, hotmail email addresses will not work..
Friday, June 1, 2012
Becoming an Uebercracker
A Guide to Internet Security: Becoming an Uebercracker
and Becoming an UeberAdmin to stop Uebercrackers.
Author: Christopher Klaus <cklaus@shadow.net>
Date: December 5th, 1993.
Version: 1.1
This is a paper will be broken into two parts, one showing 15 easy steps
to becoming a uebercracker and the next part showing how to become a
ueberadmin and how to stop a uebercracker. A uebercracker is a term phrased
by Dan Farmer to refer to some elite (cr/h)acker that is practically
impossible to keep out of the networks.
Here's the steps to becoming a uebercracker.
Subscribe to:
Posts (Atom)