A screensaver is software automatically activated after a PC screen has been inactive for some time and it displays a blank screen or various moving images. The duration after which a screensaver gets automatically activated can be defined by the user. For example, if the user defines 20 minutes as the time duration, the screensaver becomes active when the PC is inactive for 20 minutes.Screensavers with animations and sounds can be amusing to watch and if they also come with some interesting music makes it even more exciting. Actually, they may even take the users mind off work, that much fun they can be. Usually, animations are created in Flash, which is a software application, after which they are converted into screensavers. Children best like the screensavers with animations and sounds with their favorite cartoon characters. They mostly love screensavers coming from their favorite movies or TV shows. Screensavers with animations and sounds bring a touch of fun and relaxation to their ambience, especially when users work in more demanding positions.People working in creative fields, such as advertising and graphic designing and even students in different levels of education tend to choose screensavers with animations and sounds. Advertising specialists and graphic designers are more tempted to choose animated screensavers as their jobs imply communicating exact messages in a short period of time. Therefore, it is no surprise, that animations with messages attract them the most. Sometimes, these also trigger ideas that they can use in their work. Often, they are in challenging situations, and the sight of a zany animation eases the tension, and helps them get back into their assigned work. The same applies to students, especially those in college.While working on different school assignments the sight of a funny animation on computer screen may be very relaxing, inspiring and entertaining the user. Sharing and exchange of screensavers among students is also an interesting thing. A freshly downloaded screensaver in the dorm, especially an animated one, may attract lots of attention and get the user the whiz kid status.Different types of screensavers are popular among different kinds of users. Nowadays, PC users basically belong to every age-group. It is no longer a surprise that their different interests are being reflected in the screensavers they choose. Most popular themes must also depend on their computers configuration, especially the memory and the processing speed. The popularity of a screensaver could even depend on the effect it has on users and the people around them.It is common the case when a colleague in an office sees a screensaver, makes an off-hand but often critical remark about a screensaver being used by someone else, and succeeds in making that person use a different kind of screensaver. Sometimes, it creates the opposite effect though. A colleague notices the screensaver on someone elses computer and asks more about the same one.Actually, in some instances, someone who is thought to be cool decides which screensaver everyone else will use by making his or her preference well known among the group. In a way, the same happens as in the case of phone ring tones. If a person who is considered really cool by all group members goes for a particular ring tone, everybody else has to have it. Its just top notch advertising.
It is always a great advantage if you can carry on a conversation through your cell phone without hampering the use of both hands. The cell phone, even with its multi-faceted functions in your everyday life also has the distinct disadvantage of being a device which should constantly be held with one hand and should be held near your ear when you talk to somebody through it. The Enhancement in Cell Phones:Although some cell phones feature speakers for a hands free option when talking, this is generally unwise since users rarely want their neighbors to hear bits and pieces of their conversation, right? Loudspeaker options in some cell phones are commonly used for playing music and videos on a cell phone and it is imprudent and irresponsible for cell phone users to use this feature when talking to somebody else on the phone. Technological advances have been made to remedy this and one such advance is the use of headsets and headphones that enable you to talk to somebody without the inconvenience of holding the cell phone to your ear. Headphones for the cell phone function more like a normal earphone but with an enhancement of a microphone in it to enable the user to listen and talk to the recipient of the call at the same time. This enhancement is great but long wires trail from your cellular phone to your ear every time you use them. Dangling wires are also irritating and a bit frustrating for some users. This may be the reason why the manufacturers of such headsets moved on to introduce the Bluetooth enhanced headphones for a more convenient use.The Bluetooth Enhanced Headphones:The innovation of Bluetooth enhanced headphones for cellular use rapidly provided a solution for the constant hassle of dangling wires. It promptly brought users to the latest breakthrough in technology for cellular phones. Linking your cell phone to a Bluetooth headphone is not a problem since most cell phones offered in the market today also include Bluetooth connective features. Computers also offer the same Bluetooth features, making this enhancement device not just compatible with the cell phone but with the computer as well. Pairing passwords are needed to connect to your cell phone or PC though. Whats great about the Bluetooth headset is that when you carry a conversation with someone through your cell phone, you do not need to carry your cell phone with you when you are within the range or distance that the Bluetooth covers. Simply carry the Bluetooth headset with you and you can easily answer a call. The ease and convenience of not having to hold your cell phone, not dealing with dangling wires and having a multi-functioning headphone is indeed tempting, right? One downside to a Bluetooth Enhanced headphone though is that it is quite bulky. Extensive technological innovations have been added to make this headset function and a battery is added for its power source so you have to be prepared for this headset to be a bit uncomfortable when first used. But when compared to the benefits of having one, mere discomfort may not be bothersome, right?
Life without surfing the Web is as unthinkable as life without the telephone.No matter what you're doing in any given day, whether it be shopping, checking the weather, or catching up on the events around the world, we all have a tendency to go online to get the scoop on these matters.Whether you're thinking about starting your first Internet connection or you want to get the most out of your existing connection, knowing how to accomplish this can boost that connection and make your web surfing much more enjoyable.If your starting out for the first time, you must find an ISP or Internet Service Provider in your area that serves as a middleman between your PC and the Internet.Once you have found yourself a reliable ISP, you have two choices of Internet connections. The slower of the two is the Dial-Up connection but its also the cheapest.If you can afford to pay a higher monthly fee, a broadband connection is the way to go.Whichever connection you have or start first, it can probably run faster with a little optimization. In order to improve your current Internet connection, it would be to your advantage to know your current connection speed.Check this by running a Speed Test at such sites as PC Pit Stop at www.pcpitstop.com and if you're running a broadband connection, try Broadband Speed at www.band withspeedtest.com and another is Broadband Reports at www.broadbandreports.xom/stest.You can go to such search engines as Google or MSN and perform a search for let's say, "Internet Speed Test" and you will have a ton of software allowing you to test your Internet connection and many are free.The Broadband Speed Test site allow you to test up to three times a month free.After that you can purchase a subscription and test up to 1,000 tests for $60.00. You can also purchase just 100 speed tests for just $12.00Run a few speed tests to objectively test the connection and its best to run tests at different hours of the day.These test sites report their values in different formats.In the evening Internet traffic is much higher and you want to know how fast your connection is during this time. With this data written down and safely put away, you should want to find out how fast your modem is at other times, especially in the mornings.This values may be reported in 1kb or 1 kilobyte or 1MB which is 1 megabytes.Look at the site's reporting values and take careful, detailed notes of each connection speed test.To optimize either connection you will need to tweak Windows Settings and install optimization software.If you have a Dial-Up connection and use Windows 98 or Me, click Start, Settings, and click Control Panel. Then right click the Modems icon.Now click Properties, and choose the General tab.Use the Maximum Speed Drop-Down menu to select 115200. If this setting causes your Modem to no longer connect, change it to 57600.Windows XP users should click Start, Control Panel and switch to classic view.Double-click the Phone And Modem options and choose the Modem tab.Change the maximum settings port speed to 115200 and if the Modem responds poorly or not at all, change the speed to 57600.Broadband users should consider using a tweak utility such as TCP Optimizer at www.speedguide.net/downloads.php and after downloading the software, you run it and make a backup of your current settings.Save the backup, and follow the instructions in the software to optimize your broadband speed.Don't forget to click apply changes and click Yes if the software ask you to re-boot the computer.And now you're on the home stretcth. Your computer should run faster now.If the new settings cause trouble, return to the program and restore your back up settings. If you failed to make a backup, restore Windows default settings.
FPM DRAM Fast Page Mode Dynamic Random Access Memory is one of the earlier forms of RAM type and is an improvement over the conventional DRAM. Traditional DRAM requires the physical column and row address of each memory cell for each memory access, whereas FPM DRAM uses one row address for multiple accesses.Ironically, Fast Page Mode DRAM is the slowest type of memory technology compatible with modern PCs and can only be used on buses up to a maximum of 66MHz.EDO DRAM Extended Data-Out Dynamic Random Access Memory is only marginally (5%) faster than FPM DRAM based on the concept of allowing a memory access to begin before the last one is finished. This saves time by overlapping the processes required to retrieve a set of data. Like FPM DRAM, it can only be used on computer systems with memory bus speeds of up to the recommended 66MHz.By the time EDO DRAM was introduced, computers (of the 486 model) became increasingly common and thus economies of scale reduced the price of EDO DRAM below that of FPM DRAM.SDRAM - Synchronous Dynamic Random Access Memory departed from FPM and EDO DRAMs architecture and can be run on systems with higher memory bus speeds (100Mhz and more). It runs synchronously with the system clock, after the initial read or write, and thus allows read or write operations at one access per system clock cycle.Despite the improvements over older memory technology, SDRAM is only marginally (5%) faster than EDO DRAM. However, the main objective of SDRAM was to be able to use RAM on higher memory bus speeds.DDR SDRAM Double Data Rate Synchronous Dynamic Random Access Memory is quite a long name when you think about it :o) DDR SDRAM is based on the SDRAM concept with just one exception doubling the number of read or write operations to two accesses per system clock cycle. This effectively double the memory bandwidth over conventional SDRAM.The DDR SDRAM concept is used in AGP (Advanced Graphics Port) technology to improve performance of graphics cards.DRDRAM Direct Rambus Dynamic Random Access Memory offers the largest departure to conventional RAM architecture. The concept centres on the high-speed, but narrow, Direct Rambus Channel.DRDRAM gained recognition when Intel decided to create chipsets to work specifically with the Rambus technology. However, as DRDRAM is proprietary, it suffers from the lack of economy of scale to reduce its price tag.
An Intrusion Detection System (IDS) employs a combination of hardware and software products to analyze network traffic. The software analyzes and checks known patterns of traffic and ferrets out activity it suspects as malicious. A sophisticated IDS can even automatically terminate a connection and send an alert to the admin the minute it detects suspicious activity.An IDS is employed mainly by companies to detect various malicious types of behavior, primarily through the Internet, that can place their networked computers at grave risk. It detects any kind of attack on network systems or on software, as well as unofficial and unauthorized logins and access to critical documents.Intrusion detection schemes fall into one of the following categories: Anomaly IDS these systems look for behavior and traffic that is not regular. Misuse IDS these scout for Internet behavior that matches a known attack scenario the characteristics of which are already stored in the IDS; these are compared with real-time system behavior.There is another type of IDS called network-based intrusion detection system (NIDS). These systems monitor packets of data on the network and scout for malicious activity. Such a system can monitor several computers on a network at one time, and this sets them apart from other types of IDS, which can usually monitor only one computer at a time.So, Who's Trying to Break Into The Company's Network?You will be surprised to learn that a company's computers are more at risk from its employees than from outside hackers! Corporate America thrives in an extremely competitive environment, and competitors will pay top Dollar if they can lay their hands on critical data. Also, employees are job-hopping all the time or setting up their own ventures, so if they can get their hands on valuable data free of charge, it will do them a lot of good and the company a lot of harm.How Do Intruders Attack the System?The easiest method of breaking into a system by an insider is to gain physical access to a system. In companies, it is very difficult to stop employees from gaining access to a computer system located anywhere in the office.Also, the employee wanting to break into a system may already be computer-savvy and may know how to hack into systems. All he has to do is employ the usual tricks of the hacking trade to gain access into any system on the office network.Finally, sophisticated hackers who are operating from a remote location can also break into a company's network. Such remote hacking methods are tough to detect and complex to fight.How Do I get An IDS?Developers affiliated with the open-source movement have built a few IDSs that are available free of cost. Here are their details:AIDE (Advanced Intrusion Detection Environment) is a free replacement for Tripwire a semi-free IDS. AIDE is an efficient IDS and new as well as old users of Tripwire must try it out.File System Saint (FSS) is another open-source IDS that is available for download at http://insecure.dk/. FSS too works like Tripwire it is lightweight, is developed in Perl language, and works on any platform that runs Perl.Snort is yet another open-source IDS that started off small but has matured considerably. It detects intrusions into a network based on rules, combining benefits of signature, protocol and anomaly-based inspection methods. You can get snort here: http://www.snort.org/Commercial IDSIf you want Commercial Intrusion Detection Systems, then you must consider Tripwire or Polycenter Security Intrusion Detector both these IDSs have garnered a formidable reputation in the market.