Lenovo IdeaPad U450 Review

The Lenovo IdeaPad U450p is a thin-and-light, 14” widescreen notebook introduced in August 2009 to the brand's preexisting line of U-series portable, consumer laptops. The U450 fills the gap between the 13” U350and 15.4” U550. The U-series notebooks are advertised as stylish, portable, multimedia machines with Consumer Ultra-Low Voltage (CULV) chipsets and thin LED screens. So has Lenovo managed to blend the perfect mix of performance and portability? Read on to find out!

Trojan Horse, Greek Myth or Computer Nemesis?

We have all heard the term Trojan Horse, but what exactly is it? A Trojan Horse is a destructive program that masquerades as a harmless application. Unlike viruses, Trojan Horses do not replicate themselves, but they can be just as destructive. One of the most dangerous examples of a Trojan is a program that promises to rid your computer of viruses but instead introduces viruses into your computer.

The Trojan can be tricky. Who hasn’t been online and had an advertisement pop up claiming to be able to rid your computer of some nasty virus? Or, even more frightening, you receive an email that claims to be alerting you to a new virus that can threaten your computer. The sender promises to quickly eradicate, or protect, your computer from viruses if you simply download their “free”, attached software into your computer. You may be skeptical but the software looks legitimate and the company sounds reputable. You proceed to take them up on their offer and download the software. In doing so, you have just potentially exposed yourself to a massive headache and your computer to a laundry list of ailments.

When a Trojan is activated, numerous things can happen. Some Trojans are more annoying than malicious. Some of the less annoying Trojans may choose to change your desktop settings or add silly desktop icons. The more serious Trojans can erase or overwrite data on your computer, corrupt files, spread other malware such as viruses, spy on the user of a computer and secretly report data like browsing habits to other people, log keystrokes to steal information such as passwords and credit card numbers, phish for bank account details (which can be used for criminal activities), and even install a backdoor into your computer system so that they can come and go as they please.

To increase your odds of not encountering a Trojan, follow these guidelines.

1. Remain diligent
Trojans can infect your computer through rogue websites, instant messaging, and emails with attachments. Do not download anything into your computer unless you are 100 percent sure of its sender or source.

2. Ensure that your operating system is always up-to-date. If you are running a Microsoft Windows operating system, this is essential.

3. Install reliable anti-virus software. It is also important that you download any updates frequently to catch all new Trojan Horses, viruses, and worms. Be sure that the anti-virus program that you choose can also scan e-mails and files downloaded through the internet.

4. Consider installing a firewall. A firewall is a system that prevents unauthorized use and access to your computer. A firewall is not going to eliminate your computer virus problems, but when used in conjunction with regular operating system updates and reliable anti-virus software, it can provide additional security and protection for your computer.

Nothing can guarantee the security of your computer 100 percent. However, you can continue to improve your computer's security and decrease the possibility of infection by consistently following these guidelines.

Finding Cheap Ink Jet Cartridges

Printer users will know how expensive it is to buy new printer cartridges for your ink jet printer. The best way to save money is to buy cheap ink jet cartridges. Finding cheap ink jet cartridges can be easy if you know where to look for. There are mainly two ways of buying printer cartridges – shop online or from the retail store.

The internet is the best place to buy cheap ink jet cartridges. Due to increase in demand for printer cartridges many printer suppliers find it profitable to sell their products online. The online dealers have their websites, which offer information on the various types of ink jet cartridges available for purchase. Most online sellers offer discounts, especially on bulk purchases. These are really useful for office set-ups. Shopping online gives you the option of comparing the prices offered by the different sellers and choose the cheapest discounted price. Visit three to four websites before placing your order.

But care has to be taken when you are buying online. Make sure that you buy from reputed online printer suppliers. Reputed dealers give guarantee on their products and service. Some even have replace faulty cartridges without any extra charge. Buying cheap ink jet cartridges online doesn’t mean that you save only on the product. You can save on shipping and traveling expenses as well. Online dealers may have free shipping facilities, if you spend over a certain amount.

The other option of finding cheap ink jet cartridges may be your local retail computer supplies store. Though prices of ink jet cartridges at retail stores are considerably higher than those offered by the online stores, sometimes the retail stores may also offer discounted prices on their printer supplies. So you have to watch out for such deals and discounts offered by the retail store.

Find your laptop drivers easily!

Many people, especially beginners, struggle in finding drivers for their laptops. In this article, I will illustrate two ways to help you find your laptop drivers quickly, and easily.

The first method we will consider is to visit a company's website, and attempt to find a 'Drivers' or 'downloads' link. If a similar link is not immediately apparent, look for a search box. Most laptop companies have a search box somewhere on the homepage of their website. Type the model number of your laptop into the search box and click search. Typically, you will be sent to an overview of the model you have entered. Look for 'Downloads' or 'Drivers' links. Hopefully, if this link is available, you can follow it to find the necessary drivers for your laptop.

For example, say you have a Dell Latitude D600 laptop, for which you wish to locate updated drivers. The first step is to visit Dell's website. From the first page, click on the 'Drivers and Downloads' section.

After clicking on the 'Drivers and Downloads' link, we choose the required model. In our example, it is Latitude. Then we enter the model number (D600), followed by selecting our operating system. The Dell website will show a list of available drivers and software updates for your model. Select the driver you wish, and click 'Download'. What if you do not know the website of your laptop's manufacturer? Or, perhaps when visiting the website, you couldn't find the 'Downloads and Drivers' section? A second method for locating laptop drivers would be to visit Google (www.google.com), and entering, "Download (manufacturer) (model name and number) [type] driver" or "[type] driver for (manufacturer) (model name or number)" into the query box, substituting your own manufacturer, model name and number.

For example, if we wished to find the sound card for a Dell Latitude D600 laptop, we could go to Google. We would enter either of the following queries:


-"Download Dell Latitude D600 soundcard Drivers"
-"soundcard driver for Dell Latitude D600"

The driver download page for you laptop should appear near the top of the results returned by Google. Follow the link to the driver page, and proceed to download the drivers you need. These two methods should make it easy to locate the drivers you need for your laptop. Good Luck!


Colocation Hosting

What’s colocation hosting?

Colocation hosting wherein multiple customers locate network, server and storage gear and interconnects to a volley of telecommunications and various other network service provider thus minimizes the complexity and cost. Have a dedicated hosting right away and enjoy complete freedom.

Added features of dedicated hosting!

Data centers should be monitored 24-7. Your systems should be housed in a state-of-the-art data center, with redundant air cooling and filtering systems, designed to operate even in the event of a power failure. Data centers should be located and built to withstand natural disasters, and other emergencies. Don’t you want to safeguard your data centre too. Evaluate your business's power, cooling and security requirements and design a solution that meets your need and scales to allow you to adapt in the future. Appropriate to businesses both large and small, co-location is a highly flexible, cost-effective and best practice solution to ensuring your business' IT service uptime.

Be one among the world’s leading players or excel them with secure and well managed colocation. Colocation pricing queries can be dealt with our online professionals with just a click or a phone call. Have a single rack or a dedicated private suite, your servers and core systems need to be housed in a secure, well managed, and environmentally controlled environment. Sometimes the server is hosted with one and the other provides the Internet connectivity. Here, there are issues with cross-connection fees, which can complicate the matter. The host must be able to provide uninterrupted connectivity without any major hiccups.

Colocation hosting can offer reliable power with clean, uninterruptible power, through a combination of multiple power grids, generators, and best-of-breed maintenance practices. Colocation facilities manage their climate with two kinds of dedicated cooling systems, chillers and CRAC units. Chillers are systems of pipes which circulate chilled water throughout the server rooms. CRAC units (computer room air-conditioning units) are targets air conditioners which never shut off. Servers generate enough heat to overheat a several-thousand square foot room in only a few minutes; by continuously cycling, CRAC units prevent heat buildup in server rooms.

• Single rack to full private suite options
• Fully complemented value-added connectivity and managed service solutions
• Have high bandwidth on-net network connectivity to tier one carrier backbones for Internet access and private network connectivity
• Ensuring maximum security and uptime

Meet the requirements of your business! Get on to the online route and find a Colocation Hosting provider for your business.


Clean Room Data Recovery - What's Its Significance?

What are clean rooms? Why is clean room data recovery important? We look at these issues first.

What Are Clean Rooms?

Clean rooms are rooms that have been designed to reduce the level of particulates in the air like dust aand airborne microbes. Clean room construction employs filters extensively. Outside air is filtered to prevent dust entering the room. Filters and processes will be in place inside the room to remove internally generated contaminants during production and working areas are often further filtered locally such as laminar flow bench.

Staff would usually have to enter clean rooms through airlocks and wear protective gear while working inside the rooms.

There are different "classes" of clean rooms, with each class limiting permissible different numbers of particles per cubic meter, as well as the maximum sizes particles. Thus a Class 1 clean room is one where the number of particles should not exceed 1000 particles per cubic meter.

Clean rooms are used extensively in the pharmaceutical, semiconductor manufacturing and biotech industries. Data recovery centres typically use a Class 100 clean room that has an allowance of 100,000 particles per cubic meter (compared to 35 million particles per cubic meter in a normal room).

Why Use Clean Rooms for Data Recovery?

Clean rooms are used for data recovery to prevent dust, electro static discharges and such disturbances. These kinds of precautions become necessary because even microscopic dust particles can damage the image on the drive platters, and make data recovery difficult.

With each generation of disks, data is packed more and more densely on the disk platters. It is thus increasingly important that data recovery be attempted in exceptionally clean rooms.

Drive manufacturers usually specify that their product guarantee will become void if the drive is opened by anybody other than themselves, or their authorized agents. And typically, one of the conditions they impose on authorized agents is that the disks be opened in clean rooms meeting specified standards.

Thus clean rooms are necessary for data recovery on both performance and product warranty considerations.

Clean Room Data Recovery

Disk drives are opened only in clean rooms and kept there until the recovery is complete and the drive is closed. All devices are also protected against electro-static discharge, physical shocks, temperature fluctuations and electrical disturbances.

Staff wear special clothing while working in the rooms and particle density is constantly monitored using particle counters. A typical objective of clean room data recovery centers is to maintain Class 10 conditions during production.

Conclusion

Data storage media are getting packed with data more and more densely with each new generation of drives. It is thus extremely important to attempt data recovery in exceptionally dust free rooms.

These days, clean room data recovery uses Class 100 clean rooms where the number of particles is reduced by some 350 times compared to normally prevailing particle density.

Clean room data recovery centers actually aim to achieve even higher levels of dust free conditions during production operations. Even minute specks of dust on the drive platters can damage the image on the media, and make data recovery even more difficult, if not impossible.


Spec HP Presario CQ45-318TX

Best Laptop Computer. Spec HP Presario CQ45-318TX

Intel® Core™2 Duo Processor T6400 (2.0 GHz, 800 MHz FSB, 2MB L2 Cache)

14.1" WXGA HD Bright View (1280x800)

NVIDIA Geforce 9200GS with 256MB Dedicated Video Memory

Intel® GM45 Express Chipset, 1GB 667 DDR2 RAM, HDD 250GB 5400RPM

8X DVD-RW SuperMulti with Double Layer Support,

5-in-1 Card Reader, 802.11b/g Wireless, Bluetooth, 10/100 Ethernet LAN

Webcam with microphone, Altec Lancing Speakers, 6 Cell Battery, 65 Watt AC Adaptor

2.29 kg with battery, Include Carrying Case, Windows Vista Home Basic

Companies must be prepared for data storage and backup compliance

Companies must account and deal for new legislation governing how information is stored on IT systems.

The EU is shortly to adopt many of the recommendations on corporate governance set out by the Sarbanes-Oxley Act in the US, UK firms are to be expected to deal with and manage explicit guidelines on how to store email and other documents on their IT systems. IT managers should consider the necessary procedures and technologies needed for compliance now, in order ensure technology is able to deal with the new legislation.

Regulations regarding data storage at the moment are fairly lax, but there will be a huge increase in the amount of data than must be held over the next 18 months to two years.

Email archiving, the increased use of expencive write-once read-many media, information lifecycle management and content-aware storage as a few of the technologies which firms should consider for the future, though in some cases companies will simply need to improve the way they manage existing systems.

It is anticipated that new legislations will demand that an organizations’ archiving solutions must guarantee that the information they hold has not been changed, and keep it for a specific period of time before automatically deleting it.

A survey of 493 companies in the UK has shown that compliance with regulations has a high or fairly significant impact on the data storage strategies of 87% of the organisations surveyed. Back-up and recovery was also very important to the data protection strategy of 93% of organisations.
78% of organisations future storage strategy is set to include Disk-to-Disk-to-Tape technology. This may be due to the highly affordable and flexible nature of this new technology. For example, recent deployments of disk-to-disk-to-tape (D2D2T) solutions by various companies have, on average, reduced the backup window by more than 70%, from fifteen hours to less than four, yielding significant time and cost savings in tape management.

Interestingly, product features were far more important than the brand of the product, with 82% of organisations making a decision based on product features. When it came to the decision of choosing a specialist storage supplier or a general IT provider for storage solutions there was a very slight preference for specialised storage suppliers (51%) over general IT providers (49%).

This survey shows that compliance with regulations is a key driver in companies' storage security policy and that we are likely to see more companies deploying Disk to Disk to Tape technology in the future.

All the above is fine if you are a corporate, you have an annual IT budget of £500,000 and numerous members of staff who can plan and complete such a system. Is it very easy to talk about SANs, NAS’s Virtual Tape Libaries. Organisations of this nature already have a very stable and flexible infrastructure, where it is comparably easier to implement such a system.
What about the 1000’s of smaller companies such as solicitors, accountants, medical practices and manufactures etc, which may have only 2 servers on site, but still have the same reliance on data and have to adhere to the same legislations? Backup to tape is an option, however, there is an upfront cost and a requirement for a trusted member of staff to take the tapes off site every night and store in a safe place. Can you guarantee your backup has worked, and do you really trust your long term data on magnetic media? Another option is to archive your data onto optical devices, however the cost is even more prohibitive than tape and you still need to take the disk offsite.
No doubt your data is growing quickly; recently enforced legislations makes sure of this, so why not employ a backup and archival solution which has no upfront cost, is fully automated, secure and regardless of disaster will ensure your data is always available, Offsite Backup.



A Choose Up Game - One of My Best Games

The teams were picked and the line ups were announced. I was batting third. I could not wait to hit. Hitting to me was like eating for a fat man with a tape worm. I lived for the experience. I knew even before I batted that I would get a hit. I was so young and cocky! After the first two guys on my team made outs, I strolled up to the plate, as confident as Babe Ruth - pointing to center field in the 1934 World Series when he called his famous home run. Digging in and sneering at Donnie, I was determined to smack that pill. First pitch was a high and tight fastball.

I got out of the batter’s box and stared at Donnie. I was thinking fastball for his next offering. I was right. The ball came in so big. I could see the red seams on the ball. Boom! I connected on that real sweet spot on the bat. All batters love that sound. That crack that sounds so solid. Pitchers hang their heads when they hear that noise. It’s like the strike of chalk on a backboard, they hate it. The ball jumped off my bat and sailed over the left and centerfielder’s heads. It was a shot and a half. As I rounded the bases I got a glimpse of Mr. Ginsburg, the high school coach, watching me round the bases. This was Major League stuff.
A few innings later.....

Gazing at Donnie, I thought how much more determined he looked, as I went to bat for the second time. His brow was crimped and his eyes were staring. With a runner on first he was pitching from the stretch. His leg glided toward home his arm raised high, he flung the ball at me. I do not know what kind of pitch he threw. What I do know is that I hit a rocket about 15 feet over the third baseman’s head down the left field line. As the ball rolled and rolled I scampered around the bases as if I was being chased by some animal. I saw home plate in my head as I ran. And as I rounded second base I again saw Coach Ginsburg now watching the outfielders race after the ball. I hit third base with authority and sped home for my second round tripper in two at bats. My teammates congratulated me. The stands were buzzing again. I remember my friends jumping up and down with big smiles on their faces.

I felt wonderful. Two times to bat. Two home runs, against our high school star pitcher. This game was a fantasy baseball dream come true. I was Babe Ruth, Lou Gehrig and Willie Mays all rolled in to one that day.

Feel free to pass this on to anyone you think would enjoy reading about baseball.

Specifications laptop Sony Vaio VGN-TZ38GN/X :

- Processor Intel Core 2 Duo U7700, 1.33 GHz

- L2 Cache 2MB, 533 FSB
- Chipset Mainboard Mobile Intel 945GML Express
- SDRAM DDR2 2GB (Max 2GB di slot 2 SO-DIMM)
- Flash memory 48-GB
- DVD Writer SuperMulti Dual layer 8x (8.5 GB)
- Display 11.1-inch (28.19 cm) Widescreen WXGA TFT, Clear Bright technology
- Chipset graphics Intel GMA 950 Graphics 251MB
- Resolusi layar 1366 x 768 pixel
- Connection wireless LAN 802.11a/b/g
- Bluetooth standard 2.0 + EDR
- Ethernet LAN Built-in 10/100/1000
- Modem 56Kbps V.92
- Fingerprint Reader, MotionEye Webcam VGA
- Microphone
- 2 Port USB v2.0
- Slot ExpressCard/34
- Port Digital HDMI untuk HDTV
- 8-in-1 media card reader
- 2 Headphone Jacks
- Microsoft Windows Vista Busines Edition
- Altec Lansing Stereo Speakers
- Battery 6-cell Li-ion VGP-BPS8, stay 11 hours for one charge
- Dimensions: (WxDxH): 277 x 198.2 x 22.5 mm
- Weight: 1.20 kg plus battery

Laptop Screen Inverter

The small piece of circuit board, which is usually located underneath the plastic shell of your laptop’s screen casing, is probably the cause of one of the most common problems related to screen failure and, more specifically, dimness, or darkness to the screen itself.

The main purpose of the inverter is basically to give power to the backlight. The way it works is simple, it takes power from the laptop itself by a small inverter lead that runs from the motherboard of the laptop, sometimes it is a direct lead on it’s own, other times this lead can be connected into the inverter through the LCD cable (the lead that runs from the motherboard to the back of the screen itself), giving the screen its visual display.

At one end of the inverter, usually the left end, the lead that gives it power is plugged into a small white socket and from the other end, usually the right side, the backlight lead from the screen is plugged into another white socket. The backlight is a very small, thin, long, very delicate light bulb that runs along the very bottom or sometimes the side of the screen.

The problems related to the inverter is dimness or darkness to the screen in most cases or flickering of the backlight. Sometimes it can stop the screen form working at all but not usually. A common fault with laptop screens is a dark or dim screen, generally it is assumed that it is the backlight that is at fault, sometimes this may be correct, however more often or not it is simply the inverter not working, or not giving the backlight the power it needs. The inverter is usually cheaper to replace than the backlight, as the backlight is very fragile and can be easily broken. On some occasions a repair of the inverter is possible, although usually labour charges on fixing the inverter can sometimes lead up to being more expensive than simply replacing it.

When it comes to purchasing an inverter most companies will require the part number which is usually printed on a bar code on the outside of the inverter but sometimes you may need to look carefully to find it. If your lucky then you may get away with just stating what your laptop make and model is, for example ‘I have an IBM Thinkpad T22 and I need an inverter’, we try our hardest to locate the inverter with just these details, however sometimes you will need to provide the part number; here is an example of a part number from the inverter for an IBM Thinkpad T22, (10L1402). This inverter is also compatible with the IBM T21, and T20 all three laptops as a whole are basically the same apart from the processor.