Saturday, July 21, 2012

Health Problems Caused by Frequent use of Computer




For all the frequent computer user. Of course it’s interesting to know how danger for our health computer can be. Working with computer for whole day is not rare now adays. If it’s an aspect of our work or if we use computers just for fun, there are certain risks involved with prolonged computer use.

1. Eye Disease                    
It’s the first what occur to us, when we talk about computer harm (right?). Prolonged computer use could be linked to glaucoma, especially among those who are short-sighted. Our eyes are very badly affected by how long you stare at that bright screen. We stop blinking and start staring which makes our eyes strain and dry out. Make sure you look away from the screen and close them for a few seconds every few minutes.
We can find many information about eyes health, as Snuz made. And it’s very important not to forget about our eyes while working on computer.
2. Bad Posture 
Bad posture is enemy number one. Check your posture now! You should be able to reach the keyboard and mouse whilst bending your elbows at 90 degrees, with your shoulders relaxed. If you are stretching, this could cause problems. Your back should be straight and the top of the monitor should be just below eye level. If your monitor is to the left or right of your keyboard you are putting strain on your neck.
Long periods of time at the computer while blogging, working or reading often leads to pain in the lumbar region of the back. Neck and shoulder problems also result from poor seating and the poor organization of equipment on the desk (stretching for the telephone or files etc).
3. Hurting Hands       
Your hand and wrist ache after working at the computer all day, and they sometimes start feeling numb. Research in recent years has found that things like typing and sewing rarely cause carpal tunnel. Wear splints while you work to keep your wrists from bending too high or low, and use a keyboard tray or adjust your chair so the keyboard and mouse are below your elbows and your wrists are level.
It is really important to give your fingers, wrists and hands a break from resting on the keyboard all day. A tennis ball is a great way to do this. Every time you need to think you should grab the ball and give it a few quick squeezes. This will do wonders for your joints and muscles.
4. Computer Stress Injuries                          
Many people suffer from structural problems related to the physical stress of sitting incorrectly, or for too long in front of their computers. So there are chances you’ve experienced a fair amount of computer stress, from minor frustrations here and there to a virtual visit to computer hell.
High levels of stress can kill you, don’t make mistakes! Highly stressful workers have a higher risk of developing heart diseases and even cancer. So make sure that you can manage your stress. Start making something to reduce it, don’t wait till computer stress will be the main problem in your life. Taking frequent breaks is an important step in preventing repetitive computer stress injuries.
Thus, it shows up that there are several problems that occur with prolonged computer use. It is also clear, however, that if certain rules of using computer are observed the risk of any of these problems can be minimized and computer users affected with computer related disorders can avoid or treat them. I consider that persons should have active lifestyle and an ergonomic computer work station, thereby even hardly computer working can’t affect their health
IF YOU LIKE IT THEN SHARE IT!!!

Tuesday, July 17, 2012

What is new in Microsoft Office 2013.

New and Cool Word Features

Microsoft has made a number of cool, interesting, and very useful improvements to Word 2013.

[Click to enlarge] The Embed PDF feature in Word; click for full-size image. The Embed PDF feature in Word.On the usefulness front, you can now import a PDF directly into Word, edit it as a Word doc, and then save it as either a Word doc or a PDF. Not only do imported files retain all of the original documents' formatting--including headers, columns, and footnotes--but elements such as tables and graphics can be edited in Word as such.

Import a PDF file containing a table, for example, and you can edit the table just as though you had created it in Word from scratch. You can also embed a PDF file in a Word doc.

[Click to enlarge] Saving files to the cloud; click for full-size image. Microsoft expects that people will want to save all of their files to the cloud. Your Sky Drive account is listed first, then Another cool feature is the ability to connect to online resources and bring them inside your documents. For example, you can use Bing to search the Web for videos, without leaving Word, and then embed the HTML code for that video in your document.

Link your Sky Drive account to your Flickr account, and you can jump to your online photo collection and embed photos directly in the document--again, without ever leaving Word.

Embedding a screenshot from an app running on your PC is even easier: Click Insert > Screenshot, and a window with thumbnails of every window open on your desktop will become visible. Click the image you want, and it will appear wherever your cursor is.

When you embed an image or a video in a document, you can grab that element and move it around the document and watch as your text automatically re flows around it in real time.
Word Collaboration Features

When you're collaborating with other people on a document, being able to track the changes that each person makes is critical. This becomes much easier to do in Word 2013, thanks to a new feature called simple markup view.

A red vertical line in the left margin indicates that changes have been made to the document, while a word balloon in the right margin indicates the presence of a comment. Click on the vertical line to reveal both the edit changes and the comments; click on the word balloon to show just the comments.

Microsoft has also added a new viewing mode, called Reader. When you view a document in this mode, each paragraph has a small triangle in front of it. Click the triangle after you've finished reading its associated paragraph, and the paragraph will collapse so that more text will appear, without your having to scroll to another page.

I haven't had time to explore every new feature of Word 2013, but I like what I've seen so far. It looks as though Microsoft has significantly improved the application, adding some great new features without mucking anything else up in the process. Nevertheless, my opinion at this stage is based on very limited time with the product.
Source: MIC|Nepal

Sunday, July 15, 2012

Why Should You Start Blog?

Reasons to Start a Blog

Here I had Listed Few Reasons Why You Should Start Blogging:-

1. To Express Your Thoughts and Opinions
You have something to say, and blogs provide a place to say it and be heard.

2. To Market or Promote Something
Blogging is a great way to help market or promote yourself or your business, product or service.

3. To Help People
Many blogs are written to help people who may be going through similar situations that the blogger has experienced. Many parenting and health-related blogs are written for this purpose.

4. To Establish Yourself as an Expert
Blogs are wonderful tools to help bloggers establish themselves as experts in a field or topic. For example, if you're trying to get a job in a specific field or hoping to publish a book on a specific topic, blogging can help legitimize your expertise and expand your online presence and platform.

5. To Connect with People Like You
Blogging brings like-minded people together. Starting a blog can help you find those people and share your opinions and thoughts.

6. To Make a Difference
Many blogs are issue-based meaning the blogger is trying to provide information to sway people's thinking in a certain direction. Many political blogs and social issues blogs are written by bloggers who are trying to make a difference in their own ways.

7. To Stay Active or Knowledgeable in a Field or Topic
Since successful blogging is partially dependent on posting frequency and providing updated, fresh information, it's a perfect way to help a blogger stay abreast of the events in a specific field or topic.

8. To Stay Connected with Friends and Family
The world has shrunk since the Internet has become more accessible. Blogs provide a simple way for family and friends to stay connected from different parts of the world by sharing stories, photos, videos and more.

9. To Make Money
It's important to point out that most bloggers don't make a lot of money blogging, but the potential does exist to generate revenue from your blog with hard work and commitment. There are many bloggers who bring in big bucks. With patience and practice, you can make money through advertising and other income-generating activities on your blog.

10. To Have Fun and Be Creative
Many people start a blog simply for fun. Perhaps a blogger is a fan of a particular actor or loves knitting and wants to share that passion through a blog. One of the most important keys to successful blogging is having a passion about your blog's topic, so you can write prolifically about it. Some of the best and most interesting blogs started out as blogs that were written just for fun and to give the blogger a creative outlet.

 

It's All about blog and there are more benefit's of blogging so It's now time to get in.

 

 


 

Friday, July 6, 2012

If Hackers Didn't Exist, Governments Would Have to Invent Them

The hackers who dominate news coverage and popular culture -- malicious, adolescent techno-wizards, willing and able to do great harm to innocent civilians and society at large -- don't exist
The perceived threat landscape is a warped one, which directs attention and resources to battling phantoms, rather than toward preventing much more common data-security problems. According to the Privacy Rights Clearinghouse, the loss or improper disposal of paper records, portable devices like laptops or memory sticks, and desktop computers have accounted for more than 1,400 data-breach incidents since 2005 -- almost half of all the incidents reported. More than 180,000,000 individual records were compromised in these breaches, which included individuals' names, Social Security numbers, addresses, credit-card information and more. This is compared to the 631 incidents from the same period that the Clearinghouse assigns generically to "hacking or malware." Your private data is more likely to be put at risk by a factotum leaving a laptop on a train than by a wired teen with too much time on his hands.
Insider threats, otherwise known as frustrated grown-ups with real jobs, also constitute a significant challenge for information security. The Wall Street Journal recently reported on a survey which showed that 71 percent of IT managers and executives believe insider threats present the greatest risk to their companies. 
And the recent high-profile security breach at LinkedIn shows that one of the greatest risks to our personal security is ourselves: more than two-thirds of the leaked LinkedIn passwords were eight characters or fewer in length, and only one percent used the mix of upper- and lower-case characters, numbers, and symbols that makes passwords difficult to crack.
But these more serious threats don't seem to loom as large as hackers in the minds of those who make the laws and regulations that shape the Internet. It is the hacker -- a sort of modern folk devil who personifies our anxieties about technology -- who gets all the attention. The result is a set of increasingly paranoid and restrictive laws and regulations affecting our abilities to communicate freely and privately online, to use and control our own technology, and which puts users at risk for overzealous prosecutions and invasive electronic search and seizure practices. The Computer Fraud and Abuse Act, the cornerstone of domestic computer-crime legislation, is overly broad and poorly defined. Since its passage in 1986, it has created a pile of confused caselaw and overzealous prosecutions. The Departments of Defense and Homeland Security manipulate fears of techno-disasters to garner funding and support for laws and initiatives, such as the recently proposed Cyber Intelligence Sharing and Protection Act, that could have horrific implications for user rights. In order to protect our rights to free speech and privacy on the internet, we need to seriously reconsider those laws and the shadowy figure used to rationalize them.
* * *
The hacker character in mainstream culture has evolved as our relationship with the technology has changed. When Matthew Broderick starred in War Games in 1983, the hacker character was childish, driven by curiosity and benign self-interest, and sowed his mayhem largely by accident. Subsequent incarnations, like those in Hackers, Sneakers, GoldenEye, and Live Free or Die Hard became more dangerous and more intentional in their actions, gleefully breaking into protected networks and machines and causing casual destruction incomprehensible to techno have-nots. The hacker in American film, almost always white, middle class, and male, is immature, socially alienated, vindictive, and motivated by selfish goals or personality problems. The plots of such films are built on apocalyptic techno-paranoia, reflecting a belief that hackers have supreme control over the technologies that make the world run.
News coverage parallels the pop culture frame. Basement-dwelling hackers remain a primary villain on the evening news and the front page, even at the cost of an accurate and rational portrayal of current events. "Hacking" is used as a catch-all term to describe almost any computer-related crime or "bad" action, no matter the skills or techniques involved. Coverage often confuses what could happen with what is actually happening, reporting on theoretical exploits of the type often presented at security conferences as if they were a clear and present danger. Recent media and government fixation on the prankster-protesters of Anonymous has stoked the fires of techno-paranoia and, as Yochai Benkler pointed out in a recent article in Foreign Affairs, has conflated modes of electronic civil disobedience with outright cybercriminality in ways that damage the cause of political speech online.
The hacker lurks in the network, a decentralized threat, able to cause harm far from his actual location. His relationship with technology is pathological, he is compulsive in his hacking activities, and therefore cannot be reformed. Because he is socially alienated, he lacks the normal social checks on his behavior, and is instead stuck in a feedback loop with other hackers, each trying to outdo the other in juvenile mayhem on the public internet. Add to all this the hacker's superhuman ability to manipulate anything running code, and you have a terrifying modern boogeyman that society must be protected from at all costs.
* * *
In the effort to protect society and the state from the ravages of this imagined hacker, the US government has adopted overbroad, vaguely worded laws and regulations which severely undermine internet freedom and threaten the Internet's role as a place of political and creative expression. In an effort to stay ahead of the wily hacker, laws like the Computer Fraud and Abuse Act (CFAA) focus on electronic conduct or actions, rather than the intent of or actual harm caused by those actions. This leads to a wide range of seemingly innocuous digital activities potentially being treated as criminal acts. Distrust for the hacker politics of Internet freedom, privacy, and access abets the development of ever-stricter copyright regimes, or laws like the proposed Cyber Intelligence Sharing and Protection Act, which if passed would have disastrous implications for personal privacy online. The hacker folk devil as depicted in popular culture and news coverage is the target of and the justification for these laws and regulations. But rather than catching that phantom, these laws invite guilt by association, confusing skill with computers with intent to harm. They snag individuals involved with non-criminal activities online, as happened in the case of Bret McDanel, who served 16 months in prison for sending a few emails, and leave the rest of us with legally crippled technology and a confused picture of our rights online.
Crafting governmental and corporate policy in reaction to a stereotyped social ghoul lurking in the tubes is ineffective at best, and actively malignant at worst. There are real threats in the online space, from the banal reality of leaving a laptop on the bus and sloppy personal security habits to the growing reality of inter-state cyberwar. However, focusing on the boys-in-the-basement hacker threat model drains attention and resources from discovering what and where the actual threats are. Taking down file lockers, criminalizing jail breaking, modding, and terms-of-service violations, and casting legal aspersions on anonymous and pseudonymous speech online is distracting fear mongering and wastes governmental and corporate resources. Recent court decisions, like the opinion handed down by the Ninth Circuit in US v. Nosal, work to narrow the scope of the CFAA, which gives hope to the idea that it is possible to regulate the Internet in a more reality-driven way. 
In order to achieve that regulation, though, we must discard the hacker stereotype as a central social villain and legal driver. The past few years have seen the internet emerge as a central haven for political speech, domestically and internationally. The internet has been used to exchange ideas, organize protests, and overthrow dictators. We hold the right to free political speech dearly in this country, and, for better or for worse, the laws we pass regarding the regulation of the internet have a disproportionally large impact on the way this international resource operates. The question that we must ask ourselves is, do we want the next Arab Spring regulated out of existence by our fear of hackers who don't even exist?

Saturday, May 26, 2012

This is how wireless network work

        WiFi Wireless networks work using radio waves instead of wires to transmit data between computers. That's the simple version. If you're curious to know what's going on in more detail, then it's all explained in this article.
I'm sure you know that computers transmit data digitally, using binary: ones and zeros. This is a way of communicating that translates very well to radio waves, since the computer can transmit ones and zeros as different kinds of beep. These beeps are so fast that they're outside a human's hearing range -- radio waves that you can't hear are, in fact, all around you all the time.
The way it works is a lot like Morse code. You probably already know that Morse code is a way of representing the alphabet so that it can be transmitted over radio using a dot (short beep) and a dash (long dash).More importantly for this example, though; it is a binary system, just like a computer's ones and zeros. You might think of wireless networking, then, as being like Morse code for computers. You plug a combined radio receiver and transmitter in, and the computer is able to send out its equivalent of dots and dashes (bits, in computer-speak) to get your data from one place to another.
You might wonder how the computer could possibly transmit enough bits to send and receive data at the speed it does. After all, there must be a limit on how much can be sent in a second before it just becomes useless nonsense, right? Well, yes, but the key to wireless networking is that it gets around this problem.
First of all, wireless transmissions are sent at very high frequencies, meaning that more data can be sent per second. Most wireless connections use a frequency of 2.4 gigahertz (2.4 billion cycles per second) -- a similar frequency to mobile phones and microwave ovens. As you might know, though, a frequency this high means that the wavelength must be very short, which is why wireless networking only works over a limited area.
In addition, wireless networks make use of a technique known as 'frequency hopping'. They use dozens of frequencies in the range they are given, and constantly switch between them. This makes wireless networks more immune to interference from other radio signals than they would be if they only transmitted on one frequency.
The final step is when it comes to all the computers on a network sharing Internet access. This is done using a special piece of wireless equipment called an access point. Access points are more expensive than wireless cards for one computer, as they contain radios that are capable of talking to around 100 computers at the same time, and sharing out access to the Internet between them. Dedicated access points are only really essential for larger networks, though -- if you only have a few computers, it is possible to use one of them as the access point, or you could just get a wireless router.
That's all well and good, then, but how does wireless equipment made by entirely different companies manage to work together when this is all so complicated? Well, the answer is that there are standards that all wireless devices follow. These standards are technically called the 802.11 standards, and are set by the IEEE (Institute of Electrical and Electronics Engineers). It is thanks to people sticking to their standards that wireless networking is so easy and cheap to use today.

Friday, May 25, 2012

Password Protect Compressed (zipped) Folders

How to Compress Folders and Files
To compress all files and sub-folders inside a folder, right click on the folder in Windows Explorer. To compress a file, right click on the file in Windows Explorer. After that, choose “Send To”. And when sub-menu comes out, click and select “Compressed (zipped) Folder”. Windows will now compress all the contents inside the folder or the file and create a compressed folder, more commonly known as zipped file. Rename the compressed folder to your desired name, and if you want, delete the original file or folder.
To compress multiple files and/or multiple folders, just launch the Windows Explorer, and select all the files and folders (sub-folders will be included automatically) by holding the Ctrl key while clicking. If you want to select files and folders that listed continuously, just holding the Shirt key, select the first item and the last item, and all items between them will be selected. Once selected, again, right click and click on “Send To”, and then “Compressed (zipped) Folder”. The name of the compressed folder will be based on the first file been compressed, so locate it and rename it to something meaningful. Delete the original files if you want.
How to Password Protect Compressed Folder
If you want to enhance the security and do not want others to view the contents of your compressed folder, you can assign password to the compressed folder or zip file. Locate your compressed folder or zip file in Windows Explorer or My Computer, then open the folder by double clicking on it. From the File menu, choose “Add a password…” (Encrypt in Windows Me), and key in your password twice then click on OK.
Add a Password to Compressed (Zipped) File
Note that all of the files in compressed folder are password-protected at the time of encryption or password adding. Any subsequent files will not be password-protected, to password protect subsequent files, the password needs to be removed and added again.
Note: Add a password to compressed folder (ZIP) is only available in Windows XP. Windows Vista and Windows 7 have removed such option, and user has to use third-party tool such as SecureZIP to password-protect compressed folders.
How to Remove and Disable Compressed Folder (zip file) Password
To remove the password of compressed folder or zipped file, just locate and open the compressed folder by double clicking it in Windows Explorer or My Computer, then from File menu, choose “Remove password” (“Decrypt” in Windows Me).
Tips and Tricks
1. Instead of compressing existing files or folders, it’s possible create an empty zipped and compressed folder to store future files in. Just go to the folder you want to store your compressed folder, click the “New” from File menu or from menu after right-clicking inside the folder. Then choose Compressed (zipped) Folder. Type in the name for the compressed folder.
2. To protect your sensitive files and folders on your PC from viewing by others, just send them to compressed folders and add a password to the compressed folder to keep it private.
3. You can drag and drop files or folders to a compressed folder. To do this, open the compressed folder first. Drag and drop does not move the files into the compressed folder, but copies them. If you want to move the files, hold down the Shift key when droping the files into the compressed folder. Alternatively, you can manually delete the existing files.
4. Same with drag and drop, Send To function does not move the files either. To move, delete the existing files manually.
5. File names in password-protected compressed folder are visible even though the files themselves are inaccessible without the password. To hide them, create another compressed folder (not necessary to be password-protected) inside the compressed folder which will be password protected. With this, those unauthorised users can view the contents of protected zip file, which is another zip file, but not the contents inside the secod zip file.

Monday, May 21, 2012

Restore Your System When You Can't Launch System Restore


System Restore automatically backs up the state of Windows and your installed programs (but not your data). When Windows misbehaves, System Restore allows you to return the operating system to a previous condition. So when System Restore misbehaves, you may be tempted to pick up your laptop and smash it into the wall.
That's not recommended.
Let's start with the basics: To launch System Restore in Windows 7 or Vista, click Start, type system restore, and press ENTER. In XP, select Start>All Programs>Accessories>System Tools>System Restore.


Now, onto Linda's problem:
Malware often blocks System Restore, so its failure to run could be a sign of infection. Before you do anything else, see Remove Hard-to-Kill Malware and follow the recommendations there.
If that doesn't solve the problem, try running System Restore in Safe Mode: Boot your PC and press F8 just before Windows starts loading. Getting the timing right can be tricky; you may need to press and release it over and over until you get the desired result.


That result is a simple, text-based menu. Use the keyboard arrow keys to select Safe Mode. Then launch System Restore as described above.
If that doesn't work, Windows 7 users have another option: the Windows 7 System Repair Disc.
To create it, in Windows 7, select Start, type system repair disc, press ENTER and follow the prompts. You'll need a blank CD-R and an optical drive that can burn one.
Once the disc is burned, leave it in the drive and reboot your PC. Keep an eye on the screen. When you're prompted to "Press any key;" do so.
Follow the prompts until you get to the "Choose a recovery tool" page. Then select System Restore.
Source: PCWORLD