Samsung Galaxy S III which was originally going to towed five major carriers in the United States, seems to be facing a stumbling block of the rival is none other than the iPhone maker, Apple.
According to the information reported by The Verge, it was reported that Apple has filed a motion to ask the judge to block the marketing of the Galaxy S III in the United States before the shipment starts at the end of this month. Specifically in the report, Apple asked that the judge added Galaxy S III for inclusion in the initial court ruling against the Galaxy Nexus, where the hearing will be set in the near future.
Apple assumes that the Galaxy S III is quite worth it for the Galaxy Nexus to be bundled in the same motion. As a result if the request is granted, Apple no longer need to apply new, and more importantly the goal to block the Galaxy S III into the hands of customers, too, had been answered as well. In an analysis of a word, Apple claims that the Galaxy S III had violated two of the four patents from what it accused the Galaxy Nexus, including universal search and smart links.
Apple has not concluded two other patents, such as slide to unlock feature and keyboard suggestion is violating the patent. But because it has similarities, the two smartphones that can be assessed together. Associated with what is alleged that Apple, Samsung said that the prosecution could not be done within two days, without due process, and without any factual record. Samsung further said that if Apple asks a preliminary injunction against the Galaxy S III, should be put in motion a separate, about providing both parties sufficient time to analyze the evidence. What will the judge decide on the issue is, we wait for its development.

MyBackup Pro
In order not to lose important data and applications you should do the backup on your Android device. MyBackup Pro supports virtually all Android devices and can backup your most important data such as text, photos, contacts, call log, browser bookmarks, SMS, MMS, calendar, system settings, homescreens (including the position of the shortcut), alarms, music playlists , and much more.
Developer: Rerware, LLC
Download: https://market.android.com/details?id=com.rerware.android.MyBackupPro
File Size: 1.6MB
Price: $ 4.99
Anti-Virus Pro
Android growing number of course you invite to the hands of ignorant abuse, for example by creating a virus free. To protect your Android device and data security you should install an antivirus application. Anti Virus Pro can be an option because made by an experienced developer to make other antivirus on the PC platform.
Developer: AVG Mobilation
Download: https://market.android.com/details?id=org.antivirus
File Size: 2.1MB
Price: $ 1.99
Skype - free video calling
This application lets you make video calls between Skype and call a phone number or cell phone with a decidedly cheaper rates. In addition to video call, you can also make regular phone calls or just your Skype text chat with others even if they use Android, iPhone, Mac or PC.
Developer: Skype
Download: https://market.android.com/details?id=com.skype.raider
File Size: 12MB
Price: Free
App 2 SD (move app to SD)
If your Android device is not equipped with a spacious internal memory, install this application would be very helpful. As the name implies, this application serves to move the storage location of the application of internal memory for additional memory (external).
Developer: Sam Lu
Download: https://market.android.com/details?id=com.a0soft.gphone.app2sd
File Size : 634kB
Price : Free
VLC Direct Pro
This application allows you to play videos stored on a computer on Android devices and vice versa without having to transfer files between two devices. By installing this application, you can also control the video player VLC on a PC using Android device to run the function to find files, video rotate, add videos into a playlist, pause, stop, volume control, running the software in fullscreen mode and more.
Developer: QDevPlus
Download: https://market.android.com/details?id=com.vlcdirect.vlcdirectpro
File Size : 881kB
Price : $3.57
MX Video Player Pro
Although equipped with a video player default, but add a video player application on the Android device is highly recommended in order to play more video formats. This application also includes other features such as multi-core decoding, CPU optimization, pinch zoom, and the subtitle.
Developer: MX Technologies
Download: https://market.android.com/details
id=com.mxtech.videoplayer.pro
File Size : 4.6MB
Price : $5.36
Camera ZOOM FX
Android devices are usually equipped with a premium-class feature-rich cameras. But for those of you that Android devices are not filled with the desired features, the camera can add third-party applications such as Camera Zoom FX. This application features include 10 preset options (Diana, Retro, 35mm Holga, Toy Camera ...), 20 Color FX (vintage, lomo, cinematic, funky, pencil ...), 13 Frame (thin, rounded, lens, polaroid, filmreel .. .), surrounds Vignette 6 (heavy, invert, spotlight ...), 12 Distort FX (fisheye (like fxcamera), mosaic, twirl ...), 9 Mirror FX, 3 Tilt-shift FX and many other features.
Developer: androidslide
Download: https://market.android.com/details?id=slide.cameraZoom
File Size : 1.1MB
Price : $2.83
SoundHound
SaoundHound application will allow you to find information about the song being played in
radio. Your Android device close enough to the source audio for 4 seconds then the screen will display the song title and singer. Application even recognize the song that just hum.
Developer: SoundHound Inc..
Download: https://market.android.com/details?id=com.melodis.midomiMusicIdentifier
File Size: Varies depending on the device
Price: $ 4.99
Yahoo! Messenger
Messenger client that this is indeed very popular, so it's mandatory you install this application on your Android device. This application also has security features including free voice and video chat, integration with Facebook chat feature, International SMS, and photo and video over IM.
Developer: Yahoo! Inc.
Download: https://market.android.com/details?id=com.yahoo.mobile.client.android.im
File Size : 2.5MB
Price : Free
Layar
Augmented Reality technology (AR), digital information display screen is called the "Layers" to display your Android device. Simply by pointing the camera to a specific object, information about the object can be obtained thanks to the appearance of "layer" that appears.
Developer: Layar
Download: https://market.android.com/details?id=com.layar
File Size : 3.6MB
Price : Free
Google Goggles
This application allows you and other Android users to search the internet using pictures taken with the camera. Very useful for finding out about products, famous landmarks, storefronts, artwork, and other popular image that you can find online. Google Goggles can also perform translations between English, French, Italian, German, Spanish, Portuguese and Russian text with just a photograph in one foreign language.
Developer: Google Inc.
Download:
https://market.android.com/details?id=com.google.android.apps.unveil
File Size : 2.2MB
Price : Free
YouTube
Explore, upload and watch videos on youtube is easier to install this application on your Android device. In the latest version, this application is presented by the UI and the new video player controls. now you can also read the comments while watching the video without having to pause.
Developer: Google Inc.
Download: https://market.android.com/details?id=com.google.android.youtube
File Size : 2.1MB
Price : Free
ASTRO File Manager

Not all Android devices equipped with a feature or application file manager by default. need to organize your pictures or photos, music, videos and other files. Astro File Manager has been downloaded more than 20 million times by Android users around the world.
Developer: Metago
Download: https://market.android.com/details?id=com.metago.astro
File Size: Varies depending on the device
Price: Free
Vlingo Virtual Assistant
Vlingo is a virtual assistant application,like SIRI on the iPhone 4S . With Vlingo, you can send SMS and email, call, do a search on the internet, find restaurants and shops, looking for direction on the map, update Facebook status, check in Foursquare, and many other things only through voice commands.
Developer: Vlingo
Download: https://market.android.com/details?id=com.vlingo.client
File Size : 4.2MB
Price: Free
Quadrant Standard Edition
Benchmark applications can be used to measure the ability of the BGers to then compared with other devices. Quadrant is a benchmark application that focuses on the CPU, I / O and 3D graphics. In the Standard version users need internet connection to calculate the test results.
The application does not work on devices with no GPU (Spica, Tattoo). Nexus S is not yet supported.
Developer: Aurora Softworks
Download: https://market.android.com/details?id=com.aurorasoftworks.quadrant.ui.standard
File Size : 916kB
Price : Free
Documents To Go
Applications that must have to support your work. Using this application, you can open the file Microsoft Word, Excel, PowerPoint and PDF. Even with the paid version you can edit desired file. Documents To Go supports the format doc, docx, xls, xlsx, ppt, pptx and PDF
Developer:
DataViz, Inc..
Download: http://www.dataviz.com/products/documentstogo/android/
File Size: Varies depending on the device
Price: $ 14.99 (Full Version Key)
SPB Shell 3D
SPB Shell 3D is an application launcher that will modify the user interface on your phone. By using this application, you will feel the experience of using mobile phones more attractive, thanks to 3D caraousel animatif effect on the displayed menu.
Developer:
SPB Software
Download: https://market.android.com/details?id=com.spb.shell3d
File Size : 9 MB
Price : $14.99
Adobe Flash Player 11
It's not all Android-based devices support this application, but if you have a device that supports these applications should install it. Adobe Flash Player to experience the virtual world to explore more fully by allowing interactive content-based access to your favorite flash.
Developer:
Adobe Systems
Download: https://market.android.com/details?id=com.adobe.flashplayer
File Size: Varies depending on the device
Price: Free
Best Apps Market ( BAM)
Bored with the Android Market, you can install the Best Apps Market as an alternative to separately explore the applications to be added to the Android device they own. Best Apps Market or the abbreviated BAM focuses on applications and best game. Not only as an alternative application market, BAM also features a variety of tools to allow you to adjust applications owned.
Developer: BestAppsMarket.com
Download: https://market.android.com/details?id=com.bestappsmarket.android.bestapps
File Size : 911 KB
Price : Free
WhatsApp Messenger
WhatsApp Messenger is a messenger applications available for Android, BlackBerry, iPhone, Windows Phone and Nokia. WhatsApp using the 3G or WiFi to send a message. Not only used for chatting WhatsApp also allows you to send images, audio notes, and video messages. Many of you who crowned WhatsApp as "BBM Killer"
Developer:
WhatsApp Inc..
Download: https://market.android.com/details?id=com.whatsapp
File Size: 5 MB
Price: Free
Opera Mini web browser

Who does not know Opera Mini? This one deserves to be the browser of your choice who intend to add alternate browser besides the default Android browser is already equipped with many features generally. Compression technology that have helped you save the cost for volume-based data service plan
Developer:
Opera Software ASA
Download: https://market.android.com/details?id=com.opera.mini.android
File Size: 845 KB
Price: Free
Facebook for Android

You certainly have been very understanding of the functions of this application is even easier for you to exist in the most popular social networking media in the world
Developer:
Facebook
Download: https://market.android.com/details?id=com.facebook.katana
File Size: Varies depending on the device
Price: Free
TweetCaster for Twitter

In addition to Facebook, social networking media that is not less popular is Twitter. For this one, for third-party applications more often be selected because it brings more features than Twitter itself artificial. TweetCaster allows you to make the game as well as a Facebook status update, add effects to photos you want uploaded and a few other interesting features.
Developer:
OneLouder Apps
Download: https://market.android.com/details?id=com.handmark.tweetcaster
File Size: 2.9 MB
Price: Free
Battery Saver

Not only is Android, many smartphone will usually have a problem battery endurance. For the battery-saving applications such as artificial Antutu Battery Saver feasible to add to your Android device.
Developer:
Antutu
Download: https://market.android.com/details?id=com.antutu.powersaver
File Size: 741 kB
Price: Free
Poweramp Music Player

This application can be selected as an alternative application audio player in your Android device. Poweramp Music Player supports many audio formats such as mp3, mp4/m4a, ALAC, ogg, wma, flac, wav, ape, wv, TTA, and aiff mpc. In addition this application also has many additional features that will keep your music playing experience more enjoyable.
Developer:
Max MP (MSR Ltd.)
Download: https://market.android.com/details?id=com.maxmpz.audioplayer.unlock
File Size: 22KB
Price: $ 5.19 (full version)
contineud
If the trojan has been entered into the system, he will get the same access rights as you and disguised as system services (system services). Mechanism similar to remote control PC software.
TeamViewer popular remote control (www.teamviewer.com) noodles for example, openly on its website their software can work without problems even though there Firewall protection, NAT router, and ports are blocked. TeamViewer to install itself as a Windows service so that users have appropriate access rights such as "System". In other words, he has access to the same level with Windows.
In addition, TeamViewer which communicates via port 80 is vital in the HTTP connection (this is not blocked). Thus, it is clear the firewall will not be powerless against TeamViewer because he could not block Windows and Internet connection.
If TeamViewer is a malicious program, he can transfer a variety of your valuable personal data to other PC or other activities without creating alarm firewall.
Security: fortify your PC
Weaknesses firewall that had been mentioned of course invites the question, still need a firewall? The answer, if configured correctly, a firewall can provide important information about system security and prevent hackers to spy on the security hole from the outside. However, if faced with trojans and malware, a firewall is not helpless. You need special software that can ward off malware on your hard disk. Now, create a defense system that could ward off various attacks that have been mentioned above.
it all off: As a firewall, PC Tools Firewall Plus software is worth a try. On the firewall security package, such as F-Secure Internet Security, use the standard configuration for a variety of other modules (antivirus and spyware) have been optimized with each other. Before you start the one program, disable the default Windows firewall in order not to block each other. Necessary to note also is the hardware / router firewall. The latter is usually not easily disabled. If the router is attached NAS devices such as hard disks, of course you can not disable the firewall to the NAS remains protected. Router users better resoure disable firewall to desktop systems that can return unused available.
Back to the setup process PC Tools Firewall Plus, decline option "Spyware Doctor" and select "Experts". Once completed, the tool icon in the taskbar and select "Settings" in the display operation. In the "General" tab set the slider to "Block All".
In addition, also disable the option "Automatically Allow Known applications', so escape is not a trojan in disguise. Next, open the Windows Task Manager with [Ctrl] + [Alt] + [Del]. In the tab "Network" there should be no packet of data sent or received.
SETTING RULE: If the PC has been isolated, pull back the settings slider to "Ask". Next, run a browser and Internet connection allowed through the "Allow". Through the "Applications" and the "In" and "Out" you can determine if the application is only sending or receiving data or both. In setting "Rules-based", the firewall provides various filter rules defined by an individual.
In the same way, set up rules for e-mail program, Antivirus, and other software that normally require an Internet connection. Note the instructions firewall to always block all the things you do not know. If a program or service under the "Applications" you've never heard of, find information on the Internet via Google.
In addition, through the "Activity", check what software is doing the activity on the network. With a click on the "Connections" in the "Remote Address", it seems the IP address of the PC destination. Enter the IP address in www.domaintools.com / reverse-ip to know, who's behind it.
Tapping On the PC Tools Firewall Plus, check which ports are used a program to send or receive data. Through "Connections" can know the IP address of the recipient.
CONTROL firewall: Finally, check whether the firewall has to make your PC invisible to hackers? Visit the website www.auditmypc.com and after free registration, select "Firewall Test" to test the toughness of protection against hacker attacks. If your firewall is configured correctly, your PC is relatively safe.
Next, the firewall log file. There you can read, when data packets are sent or received, blocked or allowed, through which ports are sent and who the recipients. In the PC Tools Firewall Plus click on "Log". Packets marked out the incoming arrows and blue-green. IP address under the "Source / Target" can be determined through reverse-IP search as described above. Whether the port is often used trojan can be detected through www.sans.org / security-resources / idfaq / oddports.php.
Now, control your PC has been returned. From the outside, a hacker can not identify your PC and find security gaps. To ward off attacks from the inside, see the step by the following stages.
PERFECT PROTECTION: If malware can still break into your PC even if the firewall is configured correctly, run the Antivirus to identify and get rid of him. For an acute attack, you can use programs like Dr. Web CureIt. Furthermore, for long-term protection, available Antivirus less resource consuming PCs, such as Avira Antivir Personal or F-Prot Antivirus.
Remember, Antivirals are only effective if the malware has been known by the manufacturer. Depending on the completeness of malware detection signatures held each Norton Antivirus.
As additional protection, use Snort also can counteract the threat of the unknown (Zero Day Exploit). Snort effectively reveal the trojan because her eye on the data flows directly to an ethernet card (network card). To minimize vulnerabilities PC, activate the Automatic Windows Update. Security problems in existing software (already been installed) on your PC can be "patched" with a specialization program Hotfix, which Secunia Personal Software Inspector. Remember, all precautions have been done will not be effective if you are still recklessly opened the e-mails from unknown senders or visit the various websites that are not clear. The best protection is your own PC.
10. Firewall Rules
1.Don't use double firewall
Some firewalls can be active at the same time blocking each other so that the risk of making your PC crashes.
2.Block all unknown
If there is a Windows service 'wklsd45xqy.exe' who want to send a data package? Block long as you do not know, what exactly do the service and who the recipient of the package.
3.Respect to the files. LOG
Only in the LOG file of the firewall you can read, anything that happens at various ports on your PC.
4.Don 't let alone firewall
Firewalls can not ward off viruses and trojans. Therefore install the Antivirus, Antispyware, and Intrusion Detection Systems (IPS).
5. Open security holes
If the browser has security holes, various malware \ directly into the firewall undetected. Therefore, you are obliged to do regular updates.
6.Don 't rely on NAT router
Router with NAT (Network Address Translation) is integrated to guess the proper recipient through heuristic mechanism. Thus, he avoided identification by IP address. This can be exploited by hackers.
7. Non-active unnecessary Services
Each Windows service that runs in the background without your knowledge risk invite viruses and hackers. Turn off the various services Windows are not needed (used) system.
8. Reject through
Firewalls can be rejected without comment the unused port request (Stealth mode) or with answers such as 'Service could not be contacted' (Reject mode). The latter prevents unnecessary alarms.
9.Don 't ignore all the warnings
If the window is open the firewall, see the contents of the warning. If not, you risk infiltrated by a trojan or other malware.
10.Appropriate Windows Configuration
Do not allow anyone on the Internet can access your files and printer. If allowed, even the best firewall will not be helpless.


Rely solely on a software firewall is not enough. Collaboration in a compact with other security software is essential in making the PC an ideal defense in warding off a variety of malware and hackers.
Do you dare to fly a plane without a pilot's license? The answer is unlikely. Viewing the contents of the cockpit alone may directly reduce your guts. Although the use of soft ware firewall is not less complex as flying a plane, is generally not afraid amateur users to install it because the active firewall software automatically. Users who feel safe (because it has a firewall-protected) is finally with confidence direct "flight" to the virtual world. Did he really have a safe?
PC firewall as protection is still debated on the Internet. One of the Newsgroups with security specialization, even suggested the extreme to rule out some kind of firewall from a PC because of less effective to protect your PC, even spend the PC resources. The call above is true. What really is needed is a PC user protection system in a compact and complete. Firewalls are only one of its components. Then how firewalls work, manipulated, and integrated into a total security concept.
The workings of the firewall
If the company used to use a hardware-based firewall, personal users use a software firewall such as ZoneAlarm or the Windows default firewall. Today, WLAN router, the Netgear RangeMax NISO also has an internal firewall. All solutions above checks incoming and outgoing data packets, and filter it if necessary. The information is important for a firewall between the other PCs IP addresses (source and destination) and port (protocol) used to send or receive data packets.
Desktop firewall has a filter application (Application Control) to allow or disallow an application to access the Internet.
Many firewalls offer extra facilities, such as "Learn Mode" that adjusts the filter rules with user behavior and the "Content Filter" that block ActiveX components, JavaScript, and so forth. Firewalls of this type are sold as "webshield" or "Web Application Firewall." Who also began offering the "Stealth Mode" which block all unused ports request (Deny Mode).
One of the facilities are usually present at almost all hardware firewalls are "stateful Packet Inspection (SPI)." These facilities improve the standard filter rules. If you, for example, run the browser, some occur in parallel connection, so some of the services often send (receive) packet active simultaneously. In examining the data packet, the SPI refers to the connection status. Whether the data packet originated from an existing connection? Is required by the browser to receive the reply packet? Based on these questions and many others, the firewall decides whether the packet forwarded or blocked.
Any filtering system that used a firewall, the same goal, namely to block suspicious packets coming from the Internet (for protection against attacks from outside). If the malware could escape onto the hard disk, a firewall can no longer just went (some manufacturers firewaal still has its own arguments against this fact). Why?
Ideally, packet filtering can be relied upon to protect your PC. In fact, not so.
Prior to hackers trying to infiltrate a firewall, he should know, vulnerabilities that exist on the PC, such as a browser bug, or a file Windows service (printer) sharing the wrong configured. What also might happen is the inclusion of a trojan (when opening e-mail attachment) or malicious code (when accessing the website). All these attacks can pass through the firewall filters for e-mail client or browser are generally not blocked by the user. For example, MS Outlook can directly send or receive e-mail containing a trojan because of firewalls itself that gives him access.
As part of a comprehensive security package, desktop firewall must always be improving its ability to identify malicious code by working with other security modules, such as antivirus for better overall protection. A good firewall automatically evaluate the types of data traffic, open or block the connection without popup window always displays a disturbing, depending on whether the data packet is good or evil. Unlike the default Windows firewall, a good desktop firewall also checks the data traffic (incoming and outgoing) in standard configuration. He also provides Intrusion Prevention functionality that can anticipate and block new attacks, even when the system is not security holes are patched.
Dangerous from the desktop firewalls is that we've felt safe in the protection. Whereas some firewall protection mechanism still has weaknesses. Usually, the browser acces allowed the firewall to the Internet via HTTP connection. Conversely, an unknown program may not contact a service is also not yet known on the Internet. However, if a smart trojan neatly wrapped in HTTP communications and transfer them via a web browser that is connected to the Internet, firewalls automatically allow it. When we realize the limitations of a firewall and combining it with other security software with, for example, Antivirus, and treat system (updates, etc.) on a regular basis, the PC must be properly protected

Symantec Security has released the news about the threat of a new rootkit called
"Tmphider or Stuxnet." The threat of a recently discovered has been stealing the attention because it uses techniques that have never encountered before and is spread through USB drives.
Analysis of these threats have been made and the Symantec Security will update this blog, with more complete information if necessary.
There are many files associated with this threat. The files are comprised of installers and components rootkoit threat. Both were detected as W32.Temphid. Here are some of the file name components
~ WTR4141.tmp
~ WTR4132.tmp
Mrxcls.sys
Mrxnet.sys
Moreover, these threats creates shortcut files / related links within the system. Here are some examples:
Copy of Shortcut to.Ink
Copy of Copy of Shortcut to.lnk
Copy of Copy of Copy of Shortcut to.lnk
Copy of Copy of Copy of Copy of Shortcut to.lnk
Although Symantec Security analysis still continues and to see that so many PCs in Southeast Asia which became the target of this threat, the following is a detailed information about the countries targeted by the threat:
Category "Others" is a list of 50 more countries, but the chance of emergence of this threat is very small.
These threats exploit vulnerabilities that have not been encountered previously and transmitted using a drive that can be removable. This vulnerability has been confirmed by Microsoft that has released security advisory for this issue.
Data in the field showed some version of Windows is the target of this malicious file attacks. However, not all the versions that have exploited this vulnerability to be used for an attack.
These threats have rootkit components that are used to hide the two types of files:
All files that end with '. Ink'
All files that begin with '~ WTR' and ends with '. Tmp'.
The threat has user mode and kernel rootkits. The files '. Sys' mentioned above is used in kernel mode. The files '. Tmp' is used to hide files via user mode.
This means, when an infected system, you will not be able to see the files copied to the USB drive because the files are hidden by the rootkit. However, Symantec products still will detect these files.
Link files mentioned above are part of the exploits and used to enter and then ~ ~ WTR4141.tmp WTR4132.tmp. These threats have a variety of functions. Symantec's analysis of these functions are now still in progress; even so, Symantec can confirm that today the threat is using some DLLs from Siemens for its 'Step 7' to access the system 'SCADA'. The threat was determined using the username and password have been set up to connect to the database associated with the SCADA system in order to obtain the file and run various queries to gather information. The threats were also collect other information relating to the configuration of servers and network.
Symantec Security has released a set of signatures designed to detect the files. Lnk used in this attack. These files will be detected as W32.Temphid from the definition of Rapid Release on July 16, 2010 revision 035 and thereafter.
Does disabling Autoplay will protect against this threat?
Unfortunately not. This worm exploits a newly discovered vulnerabilities and have not patched and it works just like Windows Explorer to handle the files. Lnk. This feature has no relation with that of disabling Autoplay Autoplay will not help prevent worm infections in this attack. In general, disabling AutoPlay is a good idea.
EFI BIOS
17 Jul 2010 5:37 AM (14 years ago)
Once the PC is turned on, the BIOS will check for almost ALL COMPONENTS. This time, the review process that occurs and how you can speed up your PC with just a few BIOS settings.
Booting a uniform system starting January 11, 1996. Several companies agreed to create a standard BIOS in the "BIOS Boot Specification." Until recently, the standard becomes the operating system for the system (the bootstrap loader) is still used to set the operating system.
When the operating system is always offered with new features, such as the BIOS is still first. That condition was intentional, the manufacturer does not offer a feature i cool "weird" in the BIOS because it is not unusual for these things can cause problems
The latest EFI BIOS supports native 64-bit and has a graphical interface. However, until recently, rarely PC equipped with EFI because it is not compatible with existing motherboards. Only Apple is using BIOS wear this type since 2006. How where you able to install Mac OS on a PC with an EFI-Electric
If all goes well, you will briefly hear "beep". For most users, this signal is a sign that the computer is in good condition and is ready to run PC operating systems. However, there are rarely find out what happened during the first second until the sound of "beep" sound. Power supply, CPU, RAM, hard disk connections, controllers, and motherboards, all checked by the BIOS (Basic Input Output System). This time, we look more closely, what is checked by the BIOS before the computer actually running the operating system.
BIOS that is used by even the newest computer has actually been to the annual age, but still the best. His successor was already available, that is EFI (Extensible Firmware Interface) that supports 64-bit system so it is appropriate for future generations of PCs. Thanks to the graphical user interface, EFI easier than a computer configured with the current BIOS. This new super-new BIOS is used by computers Mac and PC use only slightly worn. How BIOS protocol that is used by almost 90 percent of today's computers, all featured here.
0.0300 seconds
Once the system is turned on, the first stage of the BIOS, the POST-Test (Power-On Self-Test) will be activated. This phase checks the core components of a computer, whether it is functioning correctly. Next, the BIOS will recognize the computers chipset.
1.7300 seconds
The first one was done the BIOS is reset the CPU. Here, the BIOS will decide NM-Interrupt-Line (non mask Able Interrrupt) to the CPU. For that, the BIOS will set the 7th bit in the I / O-Port 70h.
In almost the same time, the keyboard controller is also reset with the appropriate Bits Hard Reset after voltage is available. With Reset-Determination, the BIOS also checks whether the controller will only need a Soft-Reset. For that, the BIOS will read the appropriate bit in the keyboard controller. The advantage, Soft-Reset lasts a few milliseconds faster because the system only up to 64 KByte memory test.
2.6100 seconds
BIOS now examine its own systems by making a checksum consisting of all the bits on the chip. With the numbers that have been determined, the BIOS must produce "2000".
Furthermore, the PC sends an instruction to the keyboard controller. PC will perform other tests and defines a data buffer for programming command. Here, the BIOS will write a command byte and check the internal keyboard controller.
4.1100 seconds
Now, go into the chip CMOS (Complementary Metal Oxide Semiconductor). Here are stored all the user-defined settings for the BIOS. Each time the boot, the BIOS will read the configuration from the CMOS chip. However, the data and settings are only stored in the chip while it is connected to the battery, just like RAM.
Here, the system also test the checksum the CMOS chip, the part that can be written in the BIOS. In addition, a checksum will be made. This process will detect whether a computer battery is damaged. When the battery is weak, the voltage is not sufficient to supply certain components in the CMOS chip. Users will know that user-defined settings in the BIOS and system time is reset.
4.6200 seconds
In a further step, the POST test-Timer Interrupt function of the duty to improve the function of allocating IRQ. IRQs (Interrupt Requests) is a command that will be sent to the CPU, for example by the hard disk or graphics card so that the processor knows that the data for processing already available. This request is always accompanied by the latency time which will adjust the time between the beginning of IRQ-Signal and data processing.
Next, the BIOS set the IRQ Vector-Table and load user-defined settings in the BIOS to the CMOS-Memory. Interrupt-Queries from the very first device received by the Programmable Interrupt Controller then forwarded to the CPU. Then terminate the command processor is running and confirm the interrupt on the Controller.
Then, the CPU read the IRQ numbers (Vector) accordingly from the Controller and use it as an index in the Interrupt-Vector-Table. This table contains the appropriate allocation for each IRQ, for example where the processes that have been implemented specifically for a particular device. Because of the limited number of available IRQ, on modern systems, multiple devices sharing an interrupt (Interrupt Sharing).
The problem is routine for an interrupt that must be executed by any such device drivers that have enabled the interrupt. This can cause problems if the driver is active for too long (because the drivers are not programmed in an optimal). Meanwhile, another device and then write into the buffer, which quickly filled and there will be overflow from a certain time. This process can cause data to be lost.
Therefore, in modern peripheral devices, operating systems provide a dynamic IRQ numbers.
PC Over Tighten: With BIOS Tricks
Better to use the new BIOS instead of buying a new PC. Typically, the BIOS- using Flash-EEPROMS (Electrically Erasable Programmable Read Only Memory) and can be updated through software. However, you must be careful. Upgrading quite risky. When the update process does not run smoothly, your hardware will be damaged. On the other hand, updating the BIOS can provide much faster performance.
BIOS RECOVERY:
Many motherboards are equipped with an emergency system in the BIOS. When the update process is broken, will run system recovery. From here, you can run a file recovery.
BIOS-tuning:
With the right settings in the BIOS, you can increase your PC's performance significantly.
Generally, by making over-clock the CPU. Enter a value in the menu "Advanced | Configuration JumperFree | CPU Frequency", for example 20 MHz higher than those displayed in the BIOS. With this increase, the CPU temperature will not reach more than 60 degrees Celsius, while at peak load, the temperature does not exceed 90 degrees Celsius.
Improved performance was also obtained by setting the appropriate RAM. Go to the menu "Advanced | Chipset | North Bridge Configuration" and lower "CAS Latency" to "3". If Windows can not boot, restore the value to "4". In the same way, change also the value of "RAS # to CAS # Delay" and "RAS # Precharge". Set the "RAS # Activate to Precharge" to value "10". Principally, the lower the value, the faster computer performance.
4.8200 seconds
BIOS will test whether there is an error in the allocation Channel and Channel Address on the first MByte RAM. To that end, samples POST write data into RAM and then compare them. Currently, the system of checking and initializing the video adapter graphics card. First, examine the type of Video Adapter BIOS and run a battery of tests on the adapter and monitor. If any, error messages will be displayed on the screen.
5.0200 seconds
Furthermore, the turn-Controller DMA (Direct Memory Access). CPU and RAM databus connected with the motherboard via a Host-Bridge. Transactions on the bus generally occurs between the bridge and peripheral devices. Peripherals in order to process data quickly and peripherals hostbridge can access directly, without having to go through the RAM. For testing, the BIOS back to using the sample data. The system will write it into memory.
Keyboard device must also be tested. BIOS can now detect the keyboard is not functioning. NumLock button located in the right area of the keyboard will be active.
7.6300 seconds
Now, the BIOS go into the final test. BIOS re-examine the disk drives, hard disk, and connections, before handing control to the system to interrupt the boot loader-19. The task of this interrupt to load the operating system and monitor the hard disk data transfer along with its controller. Many versions of the BIOS to disable IRQ19 offer this feature. However, these features are only effective if the computer is equipped with an additional drive controller, such as a PCI-RAID-Controller.
If there are errors in self-test, beep signal will be sounded several times and error messages displayed on the screen. To understand this BIOS SOS code, a table was available on the Internet (www.computerhope.com / beep.htm). With these tables, you can limit the sources of error. If you want to ensure that components are damaged, you can use a diagnosis Card. This card is inserted into an empty slot on the motherboard and will display the error code in the form of numbers. A code table is used to find the faulty component.
12.4300 seconds
If all goes well, the computer reads only briefly and then look for a bootable operating system on the boot media. When an error occurs here, usually caused by the failure of the MBR (Master Boot Record). You can try to restore the system by running the Windows installation DVD. When a PC using Windows XP, booting with the CD is to install and run the "Repair Console". Then, run the command 'fixmbr' and restart. When using Vista, run the installation DVD and select the option "System Repair" in Setup. If this does not work, do the procedure as in XP and go to Repair Console. Then, run the command "bootrec / fixmbr".
If this method fails, do not immediately decide to reinstall. In Vista, a warning message NTLDR is often marked by the cursor on the screen with berkedipnya who is black. In this case, go to the Repair Console and give the following command:
c:
cd·boot
attrib·c:\boot\bcd·-s·-h·-r
ren·c:\boot\bcd·bcd.old
bootrec·/rebuild
When using Windows 7, you can enter a Bootable DVD and his right boot sector recovery through the Repair feature. Note the BIOS boot sequence correct. Here, IRQ19 will find the right system and run a real operating system.
Mac OS X with EFI-X module, you can install another system on your PC.
Manufacturers are less motivated by this BIOS successor. EFI (Extensible Firmware Interface) has long been applied to the Mac computer, while sis where the PC is still limping along. Hardware vendors, MSI, has two new motherboards equipped with EFI. Meanwhile, the new ASUS video display only those concepts with EFI in November last. !
HOW TO BECOME A PC MAC:
With the EFI-X-Module (www.efi-x.com, about U.S. $ 200) you can use a new version of the BIOS. This module is a special internal USB-dongle that will outwit the computer so that the PC is considered as an Apple computer. Mac OS X can be ins tall on all PCs, although it is not available in EFI-BIOS. Without tricks like this, the installation will not succeed. EFI-X module requires specialized hardware, such as an Intel CPU. In addition, the required computer motherboard from Gigabyte or DFI should. For graphics cards, Nvidia or ATI will suffice. If you want to use the EFI-BIOS module on the USB port, you still require additional adapters that are easily available in computer stores. The price is approximately around U.S. $ 4. Now, you must be running Mac OS X from the installation DVD (www.apple.com). Done.
For information, EFI-X Firmware chip is easy to be updated. Update for the chip can be obtained on the Internet. Later, more hardware components that can be operated with the EFI chip.
Huawei not only showing off Android-based smartphone. With Google's open platform artificial, mobile phone manufacturers from China was also released its product innovation in the form of tablet computers.
Android tablets made with Huawei named Huawei S7. The product is intended for people who enjoy going to new gadgets and technology with new technology but also mobile. But, unlike Apple's iPad tablet, Huawei S7 also functions as a smartphone.
"S7 is designed different from our competitors, so the S7 is not a tablet PC works only Android but he's also his phone functions well,"
The specifications of the S7 is to use the Android OS version 2.1, capacitive screens with a width of 7 inches WVGA 800x480, trackpad is responsive, the camera is 1.3MP front camera, gravity sensor, Bluetooth 2.1, Micro USB 2.0, Wi-fi, Hi-fi speakers, 3.5 mm audio jack, 8GB Internal Memory up to 32GB support, and the sim card slot. This device uses Qualcomm's Snapdragon processor.
Huawei S7 also features a multimedia application that is a media player and photo browser. Can also connect directly to your TV via HDMI. Can be used for the eBooks as well. For the price still a secret because there is no certainty that the price will be sold in the market.


Problems antenna found on the iPhone 4 apparently still continues in the spotlight many circles. Recently, a review of pro-consumer magazine, Consumer Reports, gives a bad rating on the iPhone 4.
As quoted from the AP, Consumer Reports earlier this week issued the results of his review of the iPhone 4 and the result: Consumer Reports does not recommend consumers to buy Apple's latest mobile.
After comparing the iPhone with some other phones in AT & T network operator (operational network iPhone 4), Consumer Reports concluded that only the iPhone that has the problem of signal reception.
"From our findings, claims that Apple said that the problem of signal strength on your iPhone 4 only a matter of optical illusion, caused by faulty software, must be questioned," said Mike Gikas, of Consumer Reports.
Tests conducted by Consumer Reports also indicate that AT & T network is not the main cause of the problem of signal reception is pathetic iPhone 4.
"The phone supports the display and video cameras that are not found in other phones. Even also improve battery life and other new features like a front camera for video chat and a gyroscope as a game controller is very responsive," said Consumer Reports. "But Apple needs to fix this problem permanently and antenna for free, before we can recommend the iPhone 4."
The phone itself is a successor to the iPhone 3GS, and have been sold in the United States market since last June. Once released, buyers began to blow away a lot of complaints about cell phone signal reception problems.
Many buyers who complained that when gripped by the hand phone, cell phone signal reception can be reduced drastically, causing even talk on the phone to be disconnected. These problems were mainly experienced by left-handed users.
In addition to Consumer Reports, and the tech site Engadget Anandtech review site also encountered the same problem


Galaxy Beam still will carry the Android operating system, like the previous Galaxy series. Beam will be pinned Android 2.1 to the prefix, then the ability will be enhanced by Android 2.2 or known by the name Froyo.
Special, Galaxy Beam will be equipped with devices Pico projector, which can shoot images up to 50 inches. This makes the beam, as first Android phone that uses a projector.
"Galaxy Beam combines the best of both worlds, offering users the ability to enjoy technology and entertainment features and functions work on a smartphone. This experience will be enhanced thanks to features built-in projectors,"
"Galaxy Beam Samsung will capture the imagination of users who want the option of either enjoying their favorite media files at the Super AMOLED display or projector to project their files to share with friends and colleagues,"
Beam carrying the 3.7-inch AMOLED screen Super, an 8-megapixel camera on the back, plus a VGA-quality lenses at the front for video chat, integrated FM radio, plus a standard Wi-Fi, Bluetooth, and GPS support.
However, Galaxy Beam will not be sold the first time in America, but in Singapore's StarHub subscribers were released beginning July 17. Only later followed by other regions in Asia and Europe later this year.
Specification :
Network : HSUPA 5.76 Mbps/HSDPA 7.2Mbps
3G ( 900 / 1900 / 2100 Mhz )
EDGE,GPRS,GSM QUA bAND ( 850/900/1800/1900 mHZ
OS : Android 2,1
Display : 3,7 WVGA SUPER AMOLED
Camera : 8,0 mega-pixel Camera + Auto focus with Flash ( Front:VGA )
Video : MPEG4,H.263 ,H.264.VMV,DivX,Xvid
Audio : MP3,AAC,AAC+,eAAC+WMA
Value-added Feature : A-Gps,Android Market,FM RAdio,Augmented reality with Layar Reality Browser,SMS,MMS,Email,Exchange ActiveSync,sensor,accelerometer,Proximity,Offline & No SIM Mode,Handwriting Recognition,English & Simplified Chinese,RSS Reader,Mobile widget,A-GPS
Connectivity : Bluetooth Technology v 3.0 ,USB v2.0 ( High Speed ) ,Wi-Fi 802.11 b/g/n
AllShare (DLNA),Mobile AP ( wireless Internet tethering),TV Out
Memory : 4Gb+2Gb+1Gb+ 16Gb MoviNAND
3D Flash Player
11 Jul 2010 6:39 PM (14 years ago)


Later, users will be able to play videos or play games with the format of three-dimensional (3D) online. This will happen because Adobe plans to make a 3D version of Flash.
This information is obtained from the Adobe Max conference schedule is scheduled to take place in October 2010. The agenda was mentioned, one of the points which we will discuss the presentation on the future of 3D Flash Player.
Statement Thibault Imbert Adobe Product Manager in the blog on the official website of Adobe, gives a signal that there will be supporters of 3D applications on the latest version of Flash.
"If you are working on 3D games or just like to interact with the 3D display on the site, do not miss the presentation titled 'Flash Player 3D Future' at the Adobe Max 2010 conference to be held October 27 at 11:00 am in room 503,".
Imbert, however do not include further details about these new product development plans. Presumably, Adobe is not ready to brag about these plans.
"When this product is available? We will also share stories about these plans at the conference later. A serious findings will be present for the developers of 3D content," he said.
One of the symptoms that appear when the PC is affected by fake antivirus desktop into dark and flashing warning virus in earnest. Furthermore, an unknown virus suddenly offered as the solution to de with a certain price. This event certainly is often experienced by the end of the Internet. Is the warning really shows your PC virus? Not necessarily! Today, many hackers to send fake antivirus (rogueware) with reports of such viruses. They always try to lure users to buy the full version with expensive price.
This nasty trick fooled many victims. The proof? McAfee this year alone has lost more U.S. $ 300 million globally.
Identification: the forced popup
Rogueware spread through the website is manipulated by exploiting browser vulnerabilities or plugins like Flash Player. This Malware infiltrated with Drive-by-line system or require users to download fake video codecs that were malcode content.
How to know a fake antivirus up to your PC? This can be identified by several symptoms. One of the most striking thing was the appearance of a popup that reported the existence of viruses and recommend you purchase the full versions of these antivirus.
To prevent the entry of fake antivirus software, close the popup via the Task Manager because hackers often use a button "cancel" to view a malicious website or download other malware. Some popups are annoying because it can even display the reports about security risks and change the desktop.
Other traits, rogueware usually make the process of scanning a PC with a faster time than the original virus. However, a very quick process that can display and found many viruses. One thing that is not realistic.
Usually, rogueware not come alone. If the hacker has access to a PC, he could sneak malware and trojans. This Trojan can spy on your PC and send personal data through a backdoor or a keylogger to down load.
Some malware integrate into the user's PC so that bot network without knowing it, your PC is infected will also contribute in spreading rogueware. Together has also appeared fake antivirus programs blackmailer (ransomware). Variety of symptoms that appear aimed at making the user to panic and eventually buy the full version.
Links to these fake antivirus websites spread through spam, YouTube, Facebook, or Twitter. By way of spreading like that, you can detect a fake program through a web address that is not clear.
Ways need to watch out for the next deployment is through search engine results that have been manipulated. Hackers using actual themes about the virus so the search query associated virus protection can occur in the first row of the search results. Its own website (fake antivirus website) actually has no malcode. However, these websites can open another website and subsequently exposed to the virus infects a PC user. Their website was also created as a professional.
They use a seal of quality (false), display test results fictitious, and discounts to attract visitors. They also provide telephone and e-mail.
One tip to avoid the threat of such link is not to serve bids for free virus scan on a popup. Also, do not ever give your credit card data to the website.
If you already have the actual original security suite, antivirus use to counteract the counterfeit. This original program if it can be updated rogueware deter any attack. However, if the hackers managed to infiltrate (because the antivirus is not updated), so the original antivirus could not walk normally, use several malware removal tools from other manufacturers, such as Kaspersky Virus Removal Tool. You can also use the Boot CD to track malware security suite.
If all steps are conducted does not provide an appropriate result, manually remove the malware. First, check your PC with antivirus online from the manufacturer of the popular antivirus. After rogueware type detected, search within the registry. Entry showing the name should be removed rogueware.
Top 5
Dangerous Rogueware
1. MS Antivirus
Family "MS Antivirus" widespread professional appearance and can block the active antiviral. Rogueware is also marketed under names like "System Security" or "WinPC Defender."
2. Security Tool
Known as the "Total Security" is imitative Windows security alert. He removes the icon on the desktop, displaying a black screen, and slows down the system.
3. Internet Security 2010
Internet Security 2010 not only peeve with some warning. DLL file that infiltrated through, he was blocking Facebook and YouTube to accelerate the user buy the full version
4. Defender anti-malware
Posing as "Windows Defender" from Microsoft. Rogueware is difficult to differentiate for an inexperienced user. Once entered into the PC, he blocked the browser and display continuous virus warnings.
5. User Protection
This version is spreading itself in the form of fake video codec is manipulated through the website. "User Protection" reduce system performance, even causing crashes
Impressed with the original scan, so encourage users to buy the full version
Imagine you are in a room, in it can not find one even if the milling cable. TV, stereo system, DVD, or Bluray-Player, Hifi-headset, everything works without a battery or power cord. In fact, the batteries of mobile devices such as laptops, mobile phones or digital cameras loaded automatically, so you enter the house, of course without having to plug the cable.
The basic principle of technology that would be a vision of life was designed by researchers from the Massachusetts Institute of Technology (MIT). This project started in 2006 and was called by the name "WiTricity". This technology later developed by Intel since 2007. Their targets, the technology is immediately realized in the next few years. Intel calls this technology as WREL (Wireless Resonant Energy Link), transmitting energy wirelessly through resonance.
Intel itself has demonstrated the realization of these technologies since last year. In the event the Intel Developer Forum (IDF), Intel Chief Technology Officer (CTO), Justin Rattner, showed a 60-watt light that can glow in the distance of one meter without using cable connections. Since that time, Intel also showed that WREL can also operate a netbook without sounding speakers without batteries or wires by changing voice signals into electrical signals.
The working principle: capture electricity from the air
For people who saw the first demonstration of WREL technology, the same reaction as when the introduction of the WLAN. You must still remember how it feels first time can be connected to the Internet without wires. Initially, many people are surprised that the Internet can be accessed wirelessly. People were moved to disconnect manually and was surprised that everything is still running. Furthermore, these technologies for granted.
The basic principle of this wireless power transfer technology with this WREL ass0ciate with the phenomenon of resonance. A WREL receiver can capture the energy of a de with the help of a magnetic field coil, when emitted de with the same frequency from a transmitter (through the coil). In order for optimal impedance, used rolls of wire on both sides. Here, the coil wire also functions as transmission gear bikes. When climbing, gear transmission can be reduced in order to use energy more efficiently. Conversely, while declining to use a higher transmission gear. The receiver also sets himself a large current and voltage required by its size. So, no need to bother with the adapter. In addition, the transmitter emits energy WREL only as needed by the receiver only.
Other wireless power transmitting technique has actually been used, such as the electronic toothbrush or a new smartphone from Palm Pre with charge station "Touchstone" him. Here, the device must be as close to or touching the transmitter. Conversely, WREL can work with long distances. In the draft that was demonstrated by Intel (see picture above), the receiver unit can be used in a distance of 20 cm to one meter. This zone is referred to by researchers at Intel as a magical area. WREL receiver can move freely in this area without power to decide .Focus research: higher efficiency, wider Magical Areas
However, before we throw all the power cord and adapter, still much to be done by the researchers. In the next few years, they still have to explain the details. Intel Labs research team in Seattle was more focused on optimizing the efficiency, form factor, and the level of radiation safety.
In experiments conducted by Intel, the level had reached 75 percent efficiency. This figure is very large indeed. However, from the side of the world energy crisis, the figures were still too small. Head of research, Intel, Rattner, explaining that the energy wasted is still a big if not done charging the battery. "The level of high efficiency becomes a problem on WREL, almost impossible to be realized."
Levels of efficiency also depends on the alignment of coil and coil wire. When the receiver rotated slightly, the level of efficiency is drastically decreased. This is what the researchers wanted to avoid. They replace the cable with the sensor coil and a microchip that can adjust the resonance in a magnetic field better.
"Electricity could have been from a cupboard," said Justin Rattner. "So, you no longer need to plug the Espresso machine." WREL transmitter can also be installed in the wall of the house to supply electricity to all the tricks of electronic devices that are in magical zone. Desk can also be useful to supply and charge the battery all the devices in the vicinity.
Radiation safety is also yet to be questioned. Does this technology is not harmful if a large energy emitted through the air? The principle was not the case because WREL uses magnetic waves are not harmful to human body.
Indeed, a strong magnetic field always brings netis electromagnetic radiation. Therefore, researchers from Intel tried to use a frequency that produces a net magnetic field is strong with minimal electromagnetic loads. We've launched the first product to market, this WREL technology should really safe to humans.
Future: no more cables, adapters, and plug
Once the technology was mature and safe WREL, its application will expand rapidly, eg for medical applications, such as to operate the device manager to implement the heartbeat or artificial organs.
Wirelessly transmitting power will be an important factor, not only antarperangkat, but also in the sophisticated devices itself. Imagine computers, with processors that are no longer supplied with electricity through hundreds of contacts, but without the cord through WREL.
The same principle to other PC components. After this, maybe many are wondering how much longer we'll get to the era of wireless electricity, is like seeing the Internet through WLAN today.


IPad owners soon be able to run the program Flash in the IOS operating system. Comex, a software development company made a breakthrough by developing an application that allows Frash , run Flash on the Safari browser.
Frash not yet available to the public, but among the developer, this application has been outstanding. Comex provide it at
GitHub. Destination Frash circulation among developers to Frash more perfect and can be released to the public.
As is known Apple blatantly restrict other platforms developed in their place. In fact, Flash allows users to view content from a variety of browsers, platforms, and devices. Apple's new rules harm the user equipment, because they are not free to choose the content they want to see.
Which was considered arrogant policy was also fully supported by Apple CEO Steve Jobs who said the quality is everything.
Comex Frash assessed as the right solution for iPad and iPhone owners who have waited long enough presence of flash. Many applications that run video games and use flash


Sonim Technologies re-introduce the creations durable phone. This time is XP3 Sentinel, which is intended for users who work the field like construction, forestry, logistics and other sectors. Just who has the work environment aura 'wild' and extreme.
Even so, not only 'the field' this Sonim designated, the mobile office workers who crave a strong, reliable and robust even deserve to be longing for this phone.
Not only the muscular shape, Sonim XP3 Sentinel body, also has been tested in a variety of physical tests. This phone has passed the certification testing of security from the effects of shocks, such as falls from a certain height (2 meters). Hold the salt conditioned environment, moist heat to the environment. Included are soaked in water depths up to 1 meter for 30 minutes.
Despite visible 'haunted' Sonim XP3 Sentinel also has features that are interested enough to make the weaker sex. Here there are 2 MP camera, GPS tracking capability, Bluetooth, external memory slot, and others.
In the body there is a keypad beside the XP3 Sentinel GPS emergency alerts, as an omen when in emergency situations. Including to make phone calls even in a locked condition.
Specifications: Status:
Marketed in July 2010 Network: Triband GSM Dimensions: 11.9 x 5.6 x 2.5 cm Weight: 170 g Display: TFT 65K colors, 176 x 220 pixels Camera: 2 MP, 1600x1200 pixels, LED flash, video External Memory: microSD, up to 2GB Data transfer: GPRS 10, EDGE 10 Connectivity: Bluetooth v2.1 (A2DP), microUSB v2.0 CPU: ARM 9 264 MHz processor, Philips Nexperia 5210 platform Messaging: SMS, Browser: WAP 2.0/xHTML Other Features: Dedicated buttons for red-side risk "GPS emergency alerts, Lone worker tracking app with a GPS, Accelerometer-based Man-Down IP67 certified sensors - dust and water submersible (up to 1m for 30 mins), MIL-STD 810G-grade salt, fog, humidity, transport shock and thermal shock resistant, drop-to-concrete resistance from up to 2m, shock / vibration resistant, Operational range of -20 ° C to +55 ° C, Flashlight, Organizer, Voice Memo, Stopwatch, Count-down timer, file manager; Battery: Li-Ion 1850 mAh


- During this time, impressed by the focus on the development of Kaspersky anti-virus mobile for Symbian and Windows Mobile. With the height of the user's Blackberry and Android, they admit that they would bring a second anti-virus for that platform.
Amid the launch of Kaspersky Internet Security 2011 and Kaspersky Anti Virus 2011, Jesmond Chang, Kaspersky Corporate Communication Southeast Asia gave an explanation regarding this matter.
"Not just for Symbian only, actually we were preparing a mobile anti-virus for the BlackBerry and Android,"
Today's consumers, especially in Indonesia is like a cell phone from RIM. Android as a new platform from Google also he predicted would be busy at some future time. For that reason kaspersky anti virus make a mobile version for BlackBerry and Android.
When asked whether Kaspersky would use the business model of application distribution through shops kinds OVI Store, Android App Market World or, Jesmond give an explanation. "For the business model, we are not going to lead to it. Application of anti-virus applications are not as easy as usual, a lot of scatter in each mobile platform," he explained.
Then when the antivirus application for BlackBerry and Android are present? Questions are answered by Jimmy Fong, Channel Sales Director Southeast Asia Kaspersky.
"Currently we are working on anti-virus applications for the Blackberry and Android. We can not tell you exact schedule. What is clear about this year," he explained. Jimmy added, the application is still functionally the same as versions of Symbian and Windows Mobile.
Sandbox on Kaspersky
Kaspersky since last year has developed technology called Sandbox. Now, the technology is developed further. As a result, a virtual desktop is now present in the product Kaspersky to protect user data.
This technology allows users to run an application or open a site in the virtual browser. So if the user would open a foreign application or site suspected of carrying the malware, just take advantage of this feature alone.
"If you open a foreign site that contains malware is suspected, just use the sandbox. Virtual desktops from Kaspersky will secure your desktop,"
Use Sandbox is quite easy. . By clicking on the widget Kaspersky icon on the desktop of Windows Vista or Windows 7, the virtual desktop to work immediately.
When tested, this feature works on both versions of Kaspersky products, both Internet Security Anti-Virus 2011 or 2011. To run it, users simply click on Kaspersky widgets on the desktop, then select the menu to the left of the safe run. After that, users are given three choices to run the virtual desktop, virtual browser or a virtual keyboard. Fairly simple.
Download Kaspersky anti-virus
here


Hard Disc Drive (HDD) is a secondary storage device where data is stored as magnetic pulses on a rotating metal disc that is integrated. Data is stored in concentric circles called tracks. Each track is divided into several segments or sectors.
As a data storage medium in a large capacity, the invention HDD backdrop of application programs may not stay in one disc. In addition to storage capacity, the ability to be balanced by the speed of HDD access. Improving the performance of HDD, processor speed, memory and storage capacity are important components determining performance of the computer.
Especially for the HDD, the rate of speed as measured from the revolutions per minute (RPM). Now, the HDD is available has a speed of 5400 RPM, 7200 RPM, 10,000 RPM, and 15,000 RPM. RPM HDD with 10 000 and 15 000 are usually not used for personal computer (PC) desktop. Because, the price is still quite high. Its use is more for special purposes such as in servers, as well as graphics and gaming purposes.
But, high-speed HDD is also not immune from problems. First, if you have problems in spindle motor, the damage quickly spread to other parts. Second, the revolution speed improvement on the Bering HDD causing vibration and noise


iPhone 4 has just released into the global market. However, there are also versions of 'luxury, which appears in the concept of glamorous and luxurious. Now, when previously people had been impressed tsk Apple's latest mobile phone design, whereby the body is covered with glass, and frames made from thin metal so this time would be more impressed.
iPhone 4 Gresso is the answer, where the mobile phone the iPhone is only produced limited edition. Later, this type will be available in several styles that is for men and women. Apple's iPhone four parties appreciate this luxury with a nominal 3000 to 3500 U.S. dollars in its home country.
Luxurious and artistic side of the iPhone 4 Gresso lies in the material that wraps the body. Gresso wood coated 200-year-old African Blackwood, which combined with 18-karat gold splash on the rear panel. Plus, a sprinkling of Swarovski crystals for a finishing touch, which is reserved for women. Woow.
In addition to the iPhone 4, Gresso models are also available for iPhone 3GS type lux edition. This luxury phone also comes in two versions, with a revenue stamp equivalent to the version recorded for the iPhone 4.
As undeniably glamorous phone, consumers here pay more emphasis to the material, not limited to the functions and features. In their home country, 3GS Gresso iPhone will be available in the market beginning in July. And, the iPhone version was released four months starting in December.
Google is one of the biggest supporters of a collection of Web technology that reproduces many important features of the Adobe Systems Flash. In fact, the current HTML 5 middle mengacam Flash era.
One of the most important part of the HTML5 standard is support for video that can be built directly into web pages without the need for a plug-ins such as Flash Player. Other open standards such as Cascading Style Sheets (CSS) to format Scalable Vector Graphics (SVG), and Web Open Font Format (WOFF) for typography can mimic the features of Flash, but the ability to provide streaming Flash video to some of the browser is one of the main reasons for Flash has a strong position.
"While the HTML5 video support enables us to bring most of the content and features from YouTube to your computer and other devices that do not support Flash Player, it has not met all our needs," said John Harding Programmer YouTube in posts on his blog, quoted by Cnet, Friday (02/07/2010).
"Today, Adobe Flash provides the best platform for video distribution needs of YouTube, which is why our primary video player built with it," he added.
Google actually start showing some YouTube videos with HTML5 in January, but the program is still experimental.
Adobe Flash is working hard to keep relevant despite the threat of Web technologies and Chief Executive Steve Jobs, Apple's disparaging about Flash. Moreover, they started spreading the Flash version of Mobile, with its first Android as a platform
Cisco Cius
1 Jul 2010 10:46 PM (14 years ago)

Following the steps Apple, Cisco soon release his first tablet computer. However, this device will not be sold retail to the consumer market because it is intended for the needs of professionals in the corporate market.
Tablet Cius named using the Android platform that Google made based on open source. Cius plan launched by the end of this year and sold in 2011 will premiere in early years.
The size is slightly smaller than Apple's iPad. 7-inch wide screen just does not like the iPad is 9.7 inches. Ask any lighter weight than the 0.52 kg 0.68 kg iPad. Battery endurance long enough to reach 8 hours.
But, if the camera is not equipped iPad, Cius even already have two cameras. The main camera of high quality can be used for video streaming and video communications in realtime. The second camera as a webcam also has 5 megapixels.
Cius also provides features for managing email, instant messaging, and web browsing, via WiFi and 4G networks. Her presence is accompanied cloud computing service that allows users to save data / documents on the internet and access them from anywhere.
"Platforms like this can transform the way healthcare professionals in clinics serve patients, changing the way retailers provide better service to customers, or how the university provides world class education to its students," said Tony Bates, senior vice president at Cisco as reported by AFP, Wednesday (06/30/2010).
Prior to Cisco, Dell has also been developing Android-based tablet with a Streak. Smaller size and designed to be more practical ditenteng everywhere. Apple as a pioneer in tablet even has sold more than 3 million units since its launch iPad past 3 April 2010.


External hard drive capacities greater the longer the course, and now through three terabytes. Seagate became the first manufacturer to produce hard drives with a capacity for it by releasing 3TB GoFlex FreeAgent Desk, Tuesday (06/29/2010)
With that much capacity, the owner can use to store HD video files up to 120 movies, video game titles in 1500, thousands of photos, or music files for hours. Actually three terabyte 3000 gigabytes aka far above the average requirement for personal storage media which, according to Parks Associates research is only 900 GB in late 2014 that was later. However, these needs continue to rise because of the increasing trend of multimedia needs. The quality of the better videos and movies with HD quality and 3D technologies so that need greater storage capacity.
3TB GoFlex supports Microsoft Windows operating system and Apple Macintosh. The interesting thing is already equipped with an external hard drive is NTFS driver for Mac so that the files are stored can be read in its entirety reproduce when used on Windows-based computer or Mac OS X. In addition, this product is very easy to adapt to the needs of data transfer according to availability apakha interface is USB 2.0, USB 3.0 or FireWire 800.
Practical size with a width of 3.5 inches and can be installed vertically or horizontally. GoFlex 3TB. Selling price is around 250 U.S. dollars
4 iPhone users reporting a new problem on their smart phone. This time they complained about the failure of four sensors are overly sensitive iPhone.
Quoted from Cnet, on Thursday (07/01/2010), these sensors are designed to disable the function of true touch-screen iPhone when the device is placed in the bag. Some users reported, when the screen appears dark, the sensitivity of these sensors are still working. Whereas in such conditions, the sensor should be non-active.
Because of that problem, the iPhone is often 'work' phone calls, conference calls, or other tasks without the knowledge of their owners.
Report this sensor related problems add to the list of 'defective' iPhone officially sold to four since the market. Previously, iPhone users have been complaining about a row of four other problems. Among these 4 iPhone screen is speckled yellow, the body smart phone that easily scratched, and the function of an antenna that does not work properly.
From a series of such complaints, problems with the antenna of the most in the spotlight. At that time the users reported, the antenna does not work when the iPhone be compressed using the left hand. Apple immediately responded and gave the official confirmation that the true received signal depend on the way iPhone users holding their smar tphone.