Tuesday, January 22, 2008

How to Reformat Your Computer's Hard Drive

By [http://ezinearticles.com/?expert=Darrin_Johnson]Darrin Johnson

If you are like most people, your computer is one of the most valuable possessions in your home. This is not simply because of what it is capable of doing, but also for all the information it holds. For most people, computers are practically a family member. Few use date books or traditional calendars anymore because most of what they need is in one place ready to access at any time. For either personal or professional use, a computer is one piece of technology that most of us can no longer live without.

That is why it is so important to know how to reformat your computer's hard drive in case it takes a severe crash or doesn't boot up. The delicate nature of this exercise is reformatting in a way that salvages your data. You should never reformat your computer without knowing the step-by-step directions you need to follow. In fact, you should have very good reasons to justify your decision to reformat at all before doing so. Computer experts agree that reformatting a drive should be the last option you take considering it is such a major change to your computer.

First, long before your computer experiences any significant damage, make a backup of all the information and programs stored on your computer. Without a backup copy of your computer's vital information, you will lose any important documents, passwords, music files, and other desirable data you currently have stored. Backups should be made on regular intervals (weekly or even daily), and done at least monthly.

Additionally, you need a copy of your installation software that usually comes with your computer when you first buy it. It may also be called a backup CD. This includes the operating system that you are using as well as any other software for programs you use that comes standard with your computer. At the same time, you want to make a boot CD which can be created through the control panel on your computer. This will enable you to boot up your computer with that CD.

Finally, you will then take the steps to reformat and install your operating system, such as Windows XP. Follow the instructions completely by installing the system to the hard drive, which is usually drive C. If you are not confident in what you are doing, then by all means take your computer to someone who does, because you do not want to be left with a useless box after completion.

For practical [http://www.pc-security-keys.com/best-internet-security-software.shtml]PC security software information, please visit [http://www.pc-security-keys.com]http://www.pc-security-keys.com, a popular site providing great insights concerning issues that help you to combat [http://www.pc-security-keys.com/norton-virus-protection.shtml]viruses, spyware, adware, and more!

Wednesday, January 16, 2008

Top Computer Virus Threats in 2008

By Mark A

Computer Virus threats are neither surprising nor new on the Web. They are stepping towards newer technologies such as VoIP and instant messengers. With advancement in the features available on the Internet, hackers continue to drive malware. This underlines an importance of being aware and secure when traversing the Web. Antivirus Installation is must in each and every computer attached to Internet.

Predictions for top security threats in 2008 are:

• Increase in Password Staling Websites: There will certainly be a rise in the number of attacks seeking to capture a user's ID and password by displaying fake sign-in pages. Online services will primarily be targeted to spread virus and malware. As opposed to this, the attacks on ISPs are likely to decline, while those aimed at the financial sector will move with the same pace.

• Increase in Spamming: Spamming will continue to grow, accounting for 40 per cent of the total spam received as compared to 10 per cent a year ago. There has been a significant rise in the incidence of image spam and others such as pump-and-dump stocks, pharmacy, and degree spam.

• Increase in IM Attacks: Instant messaging client is gaining wide popularity among Internet-savvy. They are always in search of better messengers to communicate on the web. Since instant messengers feature a number of exclusive features such as file transfer & webcam support, the virus attacks on these applications may increase in near future.

• Increase in Online Gaming Attacks: Online gaming is both the source of entertainment and money for several companies which allow their registered members to buy virtual goods to continue the game. The computer virus attackers may try to target these virtual goods to make real money.

• Increase in Windows Vista Attacks: The attackers and hackers generally seek to take advantage of flaws present in the operating systems. Since Windows Vista, the latest version of Microsoft Windows is believed to be affected by critical vulnerabilities, the hackers may try to inject virus into the affected systems.

• Increase in Phishing Attacks: Phishing attacks are expected to be one of the top 10 threats in 2008. With growth in number of incidence of using copies of original websites to trick the users to get their sensitive data, the phishing attacks can increase.

Mark A is a part of the content team for Iyogi. Iyogi provides Antivirus setup, certified technicians to [http://www.iyogi.net/install-antivirus.html]Install Antivirus and scan computer, antivirus installation, latest antivirus updates, computer support, pc repair services, technical support, it support and services, over the phone and via remote access.

Tuesday, January 15, 2008

PC Computer Software - How Is It Different From Hardware

By Jesse Miller

The PC software methods can include applications, operating systems, and device drivers for installed hardware components. The main components of information systems are computer hardware and software, databases, telecommunications systems, human resources, and procedures. It consists of the programs that instruct the hardware to perform tasks. A computer's operating system are the systems that allows all the hardware and components to work together. PC software is often more expensive than the computer hardware that it runs on. Device drivers are a special type that lets the operating system and other programs work with your computer's hardware. Hardware is the computer's physical electronic and mechanical parts. If your PC is not working properly while you are working on it, it could be a problem with device drivers, hardware or software.

Software is the entire set of programs, procedures, and routines associated with the operation of a computer system. PC software falls into two broad classes: system software and application software. The main system is known as the operating system. There are many of software updates. The free software often leads to poor quality because of the human nature to settle for something that cost less.

Often, upgraded versions of software are built to fix some problem that the previous upgrade introduced. Some upgrades add features that users were requesting or that a software developer thought would be desirable. With the growth of Internet access, many software applications and operating systems include an automatic update tool that will check your software manufacturer's Internet site to see if the current version of the software application running on a your system is the latest version. If not, a mechanism exists for downloading and installing the latest version of the software to your system. Do to some of the sizes of the software packages many of these downloads take an unreasonable amount of time if you are using a standard dial-up Internet connection.

If you really want to take the work out of looking for that right Spyware Protection from a [http://www.new-spybots.com]Spybot go to the Internet and get a [http://www.new-spybots.com]Free Spybot Download or a [http://www.new-spybots.com]Spybot Search and Destroy Download
to prevent your vital information from being ripped from your computer.

Tuesday, January 8, 2008

Ways To Protect Your Computer From Spyware and Adware

By Tina Porter

If you have any knowledge whatsoever about the Internet, then you are probably more than aware of the many dangerous spyware and adware programs that are lurking in the shadows waiting to infest your computer system. You are probably also aware of the many reputable programs that are available to help counteract them, the majority of which are legitimate. Unfortunately, there are a few of them that claim to protect you when in actuality they too are out to infest your system with some sort of malware. You could easily compound an already existing problem by using one of the illegitimate programs. The good news is that there are ways to protect your system from spyware and adware as well as ways to determine if an anti-spyware program is legitimate.

You first line of defense against rogue anti-spyware programs is research. Before you choose any program, do some research on what consumers have reported about it. You can get a really good idea of how good a program is just by seeing how effective it has been for others. People are eager to provide feedback on a product that has not met their expectations, especially when if it creates more of a problem for them. There are several websites that give fairly accurate reports, both good and bad, on these programs.

Also, never trust an anti-spyware or adware program that is offered through a pop-up window, especially one that claims your system is currently infected. The fact that it is offered through a pop-up window to begin with should raise a red flag immediately. Pop-ups are sneaky, underhanded ways for advertisers to get the information they want from you without your permission. In some cases, just clicking the close button inside of a pop-up window will install unwanted spyware or adware on your computer. With that being said, protect yourself even further by installing a reputable pop-up blocker to prevent dangerous, unsolicited pop-up advertisements.

Besides keeping an up-to-date anti-spyware program and a pop-up blocker installed on your computer, there are other things that you yourself can do to help protect your system:

- Never download any program or open any email that you are unsure of. If you are not 100% positive that it is something you want, do not download or open it.

- Make sure you update your operating system files on a regular basis, especially if you use Windows. Many security loopholes are fixed with during these updates so they are important.

- If you use Internet Explorer, adjust your browser security settings to at least medium.

- A good firewall goes a long way towards detecting possible system intrusions.

Each and every day there are new spyware and adware programs hitting the Internet. Your best defense against them is to make sure you are ready for them. While you may not be able to ward them all off, taking the steps above will provide you with the best protection possible.

Don't let spyware destroy your computer without you even knowing it. For information on some of the [http://www.antispywaredepot.com/best-spyware-removal-programs.html]best antispyware programs available be sure to visit [http://www.antispywaredepot.com]Antispyware Depot today.

Secure Your Computer

By Dean Quek

With advancement in technology, your computer is an important tool, not to mention investment, to you; especially with everything from purchasing furniture to paying bills online, the need for your computer to be secure is increased.

Here are a few tips to protect your computer from both physical and non-physical damage.

Protection from loss of data

A hard disk will "crash" when it undergoes violent movement while in use. For example, you are on your computer, and you decide to turn and stretch yourself. In doing so, you knock into your computer, and the hard disk crashes. You have lost all your data! To prevent this, ensure that you back up your hard disk data periodically. You can back up information using portable hard disks, CDs or DVDs.

Protection from power surges

A surge protector will blow the fuse or trip the breaker when a sudden surge of electricity hits. This action will save your computer from severe damage. In addition, ensure that a surge protector is used in conjunction with your phone line. This will prevent the phone line from being a way for the electricity to travel and damage your computer.

Firewall

A firewall is a software program that ensures Internet security. A firewall filters and blocks unauthorized access to ports on your computer. This will serve to restrict malicious webpages, emails or programs that may damage your computer. There are a few types of firewalls, namely stateful firewall, software firewall and proxy firewall.

Safe sites

Surf only safe sites. There are numerous sites out there that carry malicious virus, adware or spyware that will infect your computer. Make sure you have your firewall functional before surfing unknown sites. Only make transactions on sites that employ safe payment methods, like Paypal. A site that comes to mind is target=_new [http://www.ablewise.com]Ablewise.com, a popular classifieds site, which utilizes safe credit card payment clients as well as Paypal.

Dean currently works in an IT firm, and writes short articles when the bug bites him.

Top Computer Virus Threats in 2008

By Mark A

Computer Virus threats are neither surprising nor new on the Web. They are stepping towards newer technologies such as VoIP and instant messengers. With advancement in the features available on the Internet, hackers continue to drive malware. This underlines an importance of being aware and secure when traversing the Web. Antivirus Installation is must in each and every computer attached to Internet.

Predictions for top security threats in 2008 are:

• Increase in Password Staling Websites: There will certainly be a rise in the number of attacks seeking to capture a user's ID and password by displaying fake sign-in pages. Online services will primarily be targeted to spread virus and malware. As opposed to this, the attacks on ISPs are likely to decline, while those aimed at the financial sector will move with the same pace.

• Increase in Spamming: Spamming will continue to grow, accounting for 40 per cent of the total spam received as compared to 10 per cent a year ago. There has been a significant rise in the incidence of image spam and others such as pump-and-dump stocks, pharmacy, and degree spam.

• Increase in IM Attacks: Instant messaging client is gaining wide popularity among Internet-savvy. They are always in search of better messengers to communicate on the web. Since instant messengers feature a number of exclusive features such as file transfer & webcam support, the virus attacks on these applications may increase in near future.

• Increase in Online Gaming Attacks: Online gaming is both the source of entertainment and money for several companies which allow their registered members to buy virtual goods to continue the game. The computer virus attackers may try to target these virtual goods to make real money.

• Increase in Windows Vista Attacks: The attackers and hackers generally seek to take advantage of flaws present in the operating systems. Since Windows Vista, the latest version of Microsoft Windows is believed to be affected by critical vulnerabilities, the hackers may try to inject virus into the affected systems.

• Increase in Phishing Attacks: Phishing attacks are expected to be one of the top 10 threats in 2008. With growth in number of incidence of using copies of original websites to trick the users to get their sensitive data, the phishing attacks can increase.

Mark A is a part of the content team for Iyogi. Iyogi provides Antivirus setup, certified technicians to [http://www.iyogi.net/install-antivirus.html]Install Antivirus and scan computer, antivirus installation, latest antivirus updates, computer support, pc repair services, technical support, it support and services, over the phone and via remote access.

Saturday, January 5, 2008

Why Computer Security Software is Essential

By Kelly Hunter

A lot of reasons exist for people to use computer security measures to protect information that is important to them whenever they are online. Different forms of security software provides internet users with the necessary protection that they require against viruses, worms and other forms of malware that infiltrate your computer and wreak havoc and steal personal information that could result in dire consequences for you.

One crime that computer security software can help prevent to a large degree is identity theft. Identity theft is a serious crime that affects a huge proportion of the global population on an annual basis. The effects caused by identity theft and associated crimes may result in a situation that it takes a long time to recover from. After suffering from identity theft you'll be very lucky if you can afford to get an educational loan or a job. Identity thieves are always out for one thing - to benefit themselves financially by using your identity.

One other benefit of using computer security software is that the computer security software was specifically crafted in order to prevent hackers from accessing computers that they have no right to access. This if often the best way to ensure that you privacy is catered for whenever you're online. Security software may also disguise and hide you IP address so hackers cannot use your IP address in order to target your computer system specifically and disrupt your computer system. Whenever you place security software on you computer system what you are trying to do is that you're making sure that any personal information on your computer system sis kept secure when you are in public locations such as an Internet café or a wireless hotspot in a hotel or an airport. Internet users who are always on the move will appreciate such security measures.

What you do when you use internet security software is that you are securing all the data that is present on your computer with encryption software that is specially created for that task. Some other benefits that are provided by internet security software is the elimination of various pop-ups as well as the security of the hard drives and the prevention of censorship by your ISP as well as a lot of other benefits. The Internet has done a lot in our lives by altering the way we live , the way we do our jobs and the way we have fun. We can instantly connect with people and businesses all over the entire world and it makes it easier for us to do simple things from searching for jobs online to conducting business via a virtual offices. The different advances in the areas of the Internet have also increased the ease with which it takes to commit various crimes. In order to prevent these crimes from affecting our way of life the use of computer security software is essential for computer protection. Failure to protect our computers may mean a failure to protect our businesses and our way of life which may ultimately precipitate a person towards disaster.

Kelly Hunter operates http://www.security-software-help.com and writes about Security Software.

How to Learn Computer Programming Fast

By Damian Power

Computer programming is not for everyone, working with computers constantly is hard work not physical work but very much mental. The drawbacks of working with computer are you cannot really work outside, tired eye and some days I personally cannot go near my computer. In saying that I love working with computers. My first computer was a commador 64bit and since then technology has integrated into nearly everything in modern life.

One huge lie is that you need a college degree to work as a computer programmer.
Computer Programming has well paid jobs anywhere in the world, if you feel up to the task of learning a useful new skill. It is possible that you can learn computer programming in under 4 weeks if devoted enough.

I find it hard to dedicate oneself to learning no matter what age, but I believe with the right motivation anyone can learn to do anything, and start a new career in one of the fastest growing sectors in the world. You can learn from experts worldwide and learn what you need to know for the high paying Programming jobs. The first time I looked at computer code and languages I was totally confused, but I learned the computer languages and after practice to code quicker.

You can learn databases and software to become a programming. Pick the best computer languages for you to use. Information, techniques and hands on experience will lower your learning curve, increase your chances of a job, where to find jobs with these new found skills and lower your learning time dramatically.

I believe the best way to learn anything is to have a study plan which allows you to use your time more efficiently as if you have children and work. That's why I like home learning you can take you time no rush learn the way that best suits you. You can learn all the skills of the computer programming that are required for the higher paying contract work.

If You Would Like More Information [http://dpowermarketplace.blogspot.com/ ]Click Here

I learned computer programming and I personally really enjoy my job but it more like a hobby for me than work. So if computer programming is something that you wanted to do for a long time, you should not wait! Start learning now, enjoy a better job and live your dream.

Friday, January 4, 2008

Computer Training - Computer Repair and Building

By Michael Russell

There is no getting around that there are a lot of computers in the world. The percentage of homes alone that now have computers is staggering and with all these computers, some running literally around the clock, there had better be somebody available to repair them when they break down, and they DO break down. If you're interested in the field of computer repair or even building computers from the ground up, this article will give you some idea of what you can expect to learn from an accredited school.

Even though most of the glamour belongs to those who program computers to work, it is the ones who build and repair them who really have the hardest jobs. There is more involved with the building and repairing of computers than with any aspect of programming, networking or other area. If you plan to do this for a living, a good school will teach you the following:

The first thing you will need is a basic course in electronics. You had better have a solid foundation and understanding of how current flows, what a transistor is, what a resistor is and a number of other electronically related areas. You may not have to know as much as an electrician, but you need to have a fundamental understanding in this area or you can end up frying your PC to a crisp.

After teaching you the basics of electronics, a good school will then concentrate on the individual parts of the computer itself.

You'll first learn about all the different pieces of electronic equipment that you'll be using to work on your computer. There are a number of diagnostic and assembly tools that you will need to learn how to use proficiently.

The next thing you will learn is a general overview of the various parts of the computer such as the mother board, power supply, memory chips, hard disk drive and all the peripheral equipment such as CD ROM drives, modems, and floppy disk drives. The entire list is of course much more extensive.

After learning what each part of the computer does, you'll learn how to shop for various pieces depending on compatibility issues. You'll learn what hard drives can be used, size wise, based on the type of mother board you have and things of that nature.

You'll then learn how to install every possible piece that can be put into a computer. This covers hard drives, modems, mother boards, CD ROM drives, backup drives and the list goes on and on. Each one of these items will have special installation instructions.

You'll learn basic trouble shooting techniques when things start to go wrong. This part of the course is usually the most challenging. What the instructor will usually do is present you with a computer that has a specific problem. As the student, you have to first diagnose what is causing the problem and then figure out the solution needed for repair. This is the most intensive part of the hands on course.

After your computer is built, you'll then learn how to format your hard drive and how to install the operating system.

Mixed in with these basic areas you'll also learn about computer numbering systems, how to install adapters, how data is stored and a number of other things that are just beyond the scope of this overview.

Finally, when your course is completed you will then go for your A-1 certification which will qualify you to get a job as a computer technician.

Building and repairing computers is not a glamorous job, but when people bring their computers in to be repaired, they probably count on you more than on anyone else in the computer industry, and that has to be a great feeling.

Michael Russell

Your Independent guide to [http://computer-training-guides.com/]Computer Training

Computer Training - Computer Repair and Building

By Michael Russell

There is no getting around that there are a lot of computers in the world. The percentage of homes alone that now have computers is staggering and with all these computers, some running literally around the clock, there had better be somebody available to repair them when they break down, and they DO break down. If you're interested in the field of computer repair or even building computers from the ground up, this article will give you some idea of what you can expect to learn from an accredited school.

Even though most of the glamour belongs to those who program computers to work, it is the ones who build and repair them who really have the hardest jobs. There is more involved with the building and repairing of computers than with any aspect of programming, networking or other area. If you plan to do this for a living, a good school will teach you the following:

The first thing you will need is a basic course in electronics. You had better have a solid foundation and understanding of how current flows, what a transistor is, what a resistor is and a number of other electronically related areas. You may not have to know as much as an electrician, but you need to have a fundamental understanding in this area or you can end up frying your PC to a crisp.

After teaching you the basics of electronics, a good school will then concentrate on the individual parts of the computer itself.

You'll first learn about all the different pieces of electronic equipment that you'll be using to work on your computer. There are a number of diagnostic and assembly tools that you will need to learn how to use proficiently.

The next thing you will learn is a general overview of the various parts of the computer such as the mother board, power supply, memory chips, hard disk drive and all the peripheral equipment such as CD ROM drives, modems, and floppy disk drives. The entire list is of course much more extensive.

After learning what each part of the computer does, you'll learn how to shop for various pieces depending on compatibility issues. You'll learn what hard drives can be used, size wise, based on the type of mother board you have and things of that nature.

You'll then learn how to install every possible piece that can be put into a computer. This covers hard drives, modems, mother boards, CD ROM drives, backup drives and the list goes on and on. Each one of these items will have special installation instructions.

You'll learn basic trouble shooting techniques when things start to go wrong. This part of the course is usually the most challenging. What the instructor will usually do is present you with a computer that has a specific problem. As the student, you have to first diagnose what is causing the problem and then figure out the solution needed for repair. This is the most intensive part of the hands on course.

After your computer is built, you'll then learn how to format your hard drive and how to install the operating system.

Mixed in with these basic areas you'll also learn about computer numbering systems, how to install adapters, how data is stored and a number of other things that are just beyond the scope of this overview.

Finally, when your course is completed you will then go for your A-1 certification which will qualify you to get a job as a computer technician.

Building and repairing computers is not a glamorous job, but when people bring their computers in to be repaired, they probably count on you more than on anyone else in the computer industry, and that has to be a great feeling.

Michael Russell

Your Independent guide to [http://computer-training-guides.com/]Computer Training

Basic Computer Knowledge - The First Step Prior to Acquiring Basic Computer Training

By Joseph Brochin

For acquiring promotion in this modern technological era, you are required to keep the pace of the growing world by having sound knowledge of computers by basic computer training. It is a fact that for becoming a computer savvy, you need to firstly acquire the basic knowledge of computer. Once you acquire it, you are provided with a platform necessary for enhancing yourself with the technological advancements that are continuously coming up. The tools provide the basic knowledge in computers which is always going to be helpful to you in all spheres of life.

Necessity of basic computer training

Basic computer training ensures you a platform for acquiring the training related to the current technological advancements. Without it, it is very difficult for you to acquire anything from the more advanced computer program training that your company sponsors. Here is some basic information about computers that can work for you prior to taking basic computer training. By acquiring the knowledge from this data, you can prosper in your area.

The general basics in any program can be derived from its courses offered in the basic computer training. More information about the computer, its various parts and function is stated. Central Processing Unit or CPU is recognized as the computer brain. Different drives associated to the computer are held by the CPU.

The drive used for inserting floppy diskettes is Drive A. The 'Hard Disk' forms the next major drive of the computer where all the programs are installed for working. Depending upon the number of partitions, these drives are generally symbolized through simple English alphabets. However, Drive C will always be there. CD Drives are another important part of a computer. They are used for loading or acquiring data and programs on to or from the hard drive. Their labeling is done according to the number of partition of hard drive and the number of CD drives present. All these will be nicely explained to you in any basic computer training.

Apart from the drives and the CPU, these references to the fact that the computer system consists of keyboard, mouse, monitor and printer are done. In a course, different input and output devices used for providing the system with user defined messages and then displaying them are discussed in detail. Through any training it is true that people definitely learn more minutely about computers. It definitely makes the trainee efficient and reasonable enough to understand his/her own actions. It might have been noticed by you that due to the advent of graphical interface, people use computers even without knowing the actual logic behind the action. This should be avoided because by half knowledge is worse than no knowledge and may lead to serious consequences like loosing data, crashing of hard disk etc. So it is always preferable to at least have basic computer training to safe guard yourself from any mishap.

After knowing the devices of a computer, you should learn the procedures for starting them. It is simple. Just press the power button of your monitor and CPU and as soon as the images are displayed, the system has been started.

The next thing is to know the working of different software associated to your system where the requirement of it through reputed organization comes into being. Basic computer training builds the first step on the ladder of success.

Joseph Brochin wrote several articles on basic training in computers and other information technology solutions and related subjects.

History of the Computer - How Computers Multiply

By Tony Stockill

In previous articles, 'History of the Computer - How Computers Add' and '- Flip-flops - a basic counter' we looked at adders, and counters. Now we will consider how these building blocks can be used to perform multiplication.
In the Decimal system, we can multiply by 10 by adding a 0 to the end of a number. For example 4 with a zero added becomes 40, similarly 346 becomes 3460.We can expand this by adding 2 or 3 zeros to multiply by 100 or 1000.

THE SHIFT REGISTER

In the Binary system used in computers, we can multiply by 2 by adding a zero at the end of the number. Thus 110 (2+4=6 decimal) becomes 1100 (4+8=12 decimal). Similarly we can add more zeros and multiply by 4,8,16 etc. (decimal). This is one form of multiplication, the process is called shifting as each bit, 1 or 0 is shifted to the next bit position, and a zero is added in at the first bit position.

THE ALU

Several different techniques have been used to multiply using logic elements, as before these are usually described in a logic diagram as a 'black box' labeled multiplier. In an even more sophisticated logic diagram, this would be combined with other 'black boxes' such as adders, dividers, square roots, etc. to make one big 'black box' the ALU (arithmetic logical unit). The actual 'works' inside this unit are irrelevant to the overall design of the computer. All the designer needs to know is that if he puts two numbers into the ALU, and tells it to multiply them, he will get an output of the result.

Initially these boxes would have been made up physically of vacuum tubes, in a box the size of your bedroom, these have been gradually improved, replaced, miniaturised, until nowadays that will all fit on a chip. However the basic principles are the same.

MULTIPLICATION

If we analyse the concept of multiplication, we see that it is one of repetition (and we know computers excel at this). Take for example 2X4. This means take 4 lots of 2, and add them together, or 2+2+2+2=8. So to make a multiplier for a computer we can use an adder, which we have, and some method of counting, which we also have, as discussed in the earlier articles we mentioned.

MULTIPLIER LOGIC

For the example we just looked at, 2X4, our multiplier would have one input from the 2 (10 binary) going to a 4-bit adder. The output, or result, from the adder would be looped around to form the second input to the adder.

The second of the numbers to be multiplied, 4 (100 binary) sets a flip-flop counter to count down from 4 to 1, with one count pulse every time we add. Thus the counter is 'more than 1, which is the condition for the adder output to be routed to its input. The initial add would be 10 + 10 binary (2+2 decimal), giving 100 binary.

This result is returned to the input, gated by the counter 'more than 1' to be added to 10 again, giving 110 binary. We perform another add of 110 + 10 getting a result of 1000.
This time the counter has counted down to one, and blocks the adder input. At the same time it allows the adder result output to become the multiplier result.

APPLICATION

You can see how this simple example could be used in a scaled-up version capable of multiplying multi-bit numbers. All we need is a lot more adders, and a few logic gates to control them, maybe throw in a bit of timing, so that it doesn't all get mixed up! As we've said before, when you're talking in nanoseconds, you can get through a lot of calculations very quickly.
Still to come we will look at how negative numbers are represented in computers, and how they handle very large numbers with something called Floating Point Arithmetic.

Tony is an experienced computer engineer. He is currently webmaster and contributor to http://www.what-why-wisdom.com. A set of diagrams accompanying these articles may be seen at http://www.what-why-wisdom.com/history-of-the-computer-0.html.

Put That Old Computer To Good Use

By Thomas A

An old computer these days is no longer a completely useless system. In fact, even though I might upgrade my main computer every couple of years, I usually take ten to fifteen years before I completely remove it from my home network and send it to that great LAN in the sky!



Here are ten twelve uses that I have discovered for that more "experienced" computer system!



And once you have read through the article and decided which exciting project you want to do, make sure you let us know by voting in the poll!



Firewall/Router



This was the very first use I had for an older computer. I grabbed an old 286, installed a couple of network cards, and the latest version of FREESCO and suddenly every computer in my house had Internet access without having to keep my main system running or without having to buy an expensive (at the time) dedicated router/firewall device.



Not to mention that I learned a ton about Linux through this process!



Here is a list of some Linux distributions and tools that you could use to create a firewall/router for your home:



* FREESCO



* IPCOP



* Smoothwall



* Firestarter



* Coyote Linux Personal Firewall



* Shorewall/Shoreline



* Mason



* Vyatta



* floppyfw



* FireHOL



* Guarddog



* Turtle



* m0n0wall



* Endian



* pfSense



* LutelWall



* Zorp



* ClarkConnect



* Devil Linux



* Sinux



* Kaladix



* SafeSquid



File Server



If you've been on Daily Cup of Tech before, you will know my love for FreeNAS. With an old computer and a couple of hours effort, you can have a nifty little file server available on your network.



There are other ways that you can create a file server other than FreeNAS. Here are some that I found:



* FreeNAS



* Samba



* iFolder



* NASLite



* Openfiler



* CryptoBox



Print Server



My wife and I share a printer that used to be hosted on her computer. It was a real pain when her computer would go into sleep mode or she would shut it off and I would lose my ability to print. I was able to turn an old computer into a print server that is always running and I can now print regardless of the status of my wife's computer.



Nicholas Fong has a great tutorial on setting this up.
Fax Gateway



Yes, I know. Faxing is so 1985. But, a lot of people and companies still rely on this technology to keep their business running. With a bit of effort and some old computer hardware, you can set up a HylaFAX server to manage and control all of your incoming and outgoing faxes. Plus, you could save a few trees because you are using less paper.
Web/FTP Server



With the advent of LAMP server installations, it is relatively trivial for someone to create a web server. This will give you the ability to create your own websites in house before you distribute them to the world or you can simply use it as an intranet site to keep your busy family in touch.



Here are a few tutorials on setting up a web server:



* Setting up a local web server in Debian Linux



* The Apache Web Server



* Ubuntu 7.04 (Feisty Fawn) LAMP Server Setup



* Quick Linux Server



SSH/SCP Server



SSH and SCP provide you with a lot of very powerful abilities so that you can remotely access your network and copy files securely. One of the best ways is to set up a FreeNAS box, enable SSH and then connect to it using an SCP client such as WinSCP to transfer files or PuTTY for accessing your network.
Anti-Spam Server



We all hate spam. So, use your old computer to get rid of it! By using SpamAssassin on a Linux box, you can quickly stem the flood of incoming spam. I have also found a really good tutorial on the subject (Sorry, I had to use the Google cache.).
Proxy Server



Most users have the same webpages that they visit on a regular basis. Each time that they go to these websites, they need to go and download all of the files again. While this is not a terribly big issue if you have lots of bandwidth and it is not being used very much, it can become an issue if your are a high bandwidth user.



You can also use it to filter out undesirable content.



Here are a few tutorials on setting up a proxy server:



* Setup a transparent proxy with Squid in three easy steps



* Minimal Linux Proxy



* 3Proxy



Thin Client



I've always thought that the next time I decide to upgrade all of the computers for my entire family at home, rather than upgrading each system, buy a rather beefy server with lots of RAM and then create virtual computers for everyone. Then, I could use their original hardware and ThinStation to give them access to their new virtual computer!



You may also want to check out AnywhereTS to help with the setup.
Voice Mail Server



For me, voice mail has always been so passive. It just kinda waits in one place until I remember to check it (which could be days later). A voice mail server would be a great tool!



One great advantage would be the ability to have my voice mail e-mailed to me. Another would be the ability to check it from my computer. The VOCP System provides me with all of those abilities and more!
Media Server



More people are going away from their CD and DVD players and heading for MP3 and AVI files. A media server is a great way to use that old box.



Here are some resources to get you rockin'!



* Jinzora



* Firefly



* TVersity



* MediaTomb



* LIVE555



* MythTV



* Icecast



* Helix



* LinuxMCE



* Darwin Streaming Server



* GNUMP3D



Bittorrent Box



I put all of my bittorrent stuff on a separate box a long time ago. It just seemed much neater and cleaner. For a good tutorial on how to do this, check out Nerdica.




techiepage

http://www.techiepage.blogspot.com



Article Source: http://EzineArticles.com/?expert=Thomas_A
http://EzineArticles.com/?Put-That-Old-Computer-To-Good-Use&id=882282

Buying Computer Hardware Online

Computer hardware would refer to the physical components of the computer. If you do not have the proper hardware, you would naturally not be able to run any program or software on your computer. Also, a program's optimum performance mainly depends on the type of hardware being used. For this reason, it is absolutely essential that the product you would be purchasing should be of great quality.

As an individual plans to purchase computer parts, he is faced with the option of buying from an actual store or buying from an online retailer. It is actually more advisable to buy online, as you would have the ability of browsing through different models and items effortlessly.

You would just need to verify if the website that you are planning to buy the items from would have a security system that would prevent your personal details from being stolen.

Buying computer hardware online usually is a lot cheaper compared to buying it at an actual store, because the overhead costs they incur are a lot lower. So you would be paying less yet getting more. This is one of the reasons why a lot of consumers have been turning to the online option when purchasing computer parts.

Discounted and relatively cheap computer hardware is fairly easy to locate online. Regardless of the computer part you are searching for, you would surely be able to land great deals and get an amazing value for your money.

And before agreeing to anything, verify that all the items you are purchasing would be genuine so be sure to do business with the more reputable dealers.

How to buy hardware online? While it is important to buy from popular online retailers, you can save lot of money if you look for some good deals, bargains and discount coupons at the [http://www.cheapstingybargains.com/cheapster/dell/]dell coupons blog.

You can buy [http://www.cheapstingybargains.com/cheapster/computer-hardware/]hardware, printers, [http://www.cheapstingybargains.com/cheapster/computer-accessories/]accessories, mobiles, ipods and software by using online coupons and save money in the process as well.

Article Source: http://EzineArticles.com/?expert=Bill_Pratt http://EzineArticles.com/?Buying-Computer-Hardware-Online&id=871446