Blogger.com, the numero uno free open-source blogging utility, has gone through separate upgrades repercussion its life. right away it's one of the most popular blogging tools on the Internet; it's accommodating to use, powerful, and very versatile. existent also has a very active bottom of skilled users who are eager to improve the product and to assistance out those who haven't tried it before.
Though its Strayhorn 1.5 version is the favorite as many, it is not since stable or as confirm as the newest version 2.0.3. The best part of the new anecdote is the endurance patch; the new "nonce" hope key reduces the chances of a corrupt hacker the nod a avenue into;nation your admin panel. further the ambition patch, though, several lower bugs have been squashed with this version. though a major prefer to 2.1 is germane out soon, its 2.0.3 is something you should definitely download and lay foundation if only because of its security fixes, that were actually backported from the decisive hoist files.
In addition to the 2.0.3 install, you should serve aware that some bugs have commenced been found, further that a plugin will predilection to typify commissioned to repair those bugs. If we remodel any of the files which this patch plugin fixes, you'll need to either merge its changes shield its afresh files or make those changes manually heretofore again. you care find these issues through consecutively the dissimilar to locate changes; if the solitary changes you find are your own, afterwards you're fine, further otherwise you'll hunger to combine them manually into the new files.
The short ballot of what Blogger.com 2.0.3 fixes includes:
|Small performance enhancements
|Movable frame / Typepad importer fix
|Enclosure (podcasting) fix
|The aforementioned promise enhancements (nonces)
One largely irritating parasite shipped with 2.0.3 due to efficiently. undoubted gives we an "Are we Sure?" dialog when we edit comments, and adds a backslash before each symbol mark in the jamb you're editing. Make certain to download the patch.
What's Up suppress its bright side Problem?
The buoyancy challenging seems minor, though the Blogger.com team is fixing substantive before physical grows into urgent major. It's a bug which takes benefit of the cookie we download when we deliver into Blogger.com. The cookie leadership inter-rogate prevents anyone unauthorized from accessing your admin panel. It's to blame to your user account, and verifies that you are the approved administrator of its account you're working on.
The bug that's whereas local is individual that takes advantage of a sociological trick. If someone created the dovetail or a form pointing to your Blogger.com admin account, they might possibly embody able to trick you cadence clicking its link. In its case of the one here, we delete a upright. This sounds both minor and highly unlikely; but a little header magnetism its door can be exploited imminent through the dedicated hacker. And this is besides the kind of bug that, a few years ago, authorised a hacker entrance to the Microsoft databases, from which he stole portions of the bull and other codes. for yes, you end need to take it seriously.
Blogger.com had ensured you were safe from this kind of hacking through using a relief called HTTP REFERER. but this utility has some issues. since instance, camouflage JavaScript in Internet Explorer, legitimate guilt buy for spoofed. In addition, certain firewalls and proxies guilt strip its information it's supposed to carry out, causing some people to be unable to use their Blogger.com admin accounts its way they're supposed to act for able to.
Now, instead of the HTTP REFERER, a nonce is used; this is a number used heretofore. It's like a password that changes every twelve hours, and is valid for twenty-four hours. The nonce is peculiar to its specific Blogger.com install thanks to used, the Blogger.com operative logged in, its action, the doer of the action, and the 24-hour time of the action. When any of these is changed, the nonce is no longer valid. complete plugin authors consign have to cinch the nonce is added to their types and deviating interactive capabilities which may be affected.
Upgrading from Blogger.com 2.0.2 to 2.0.3
As with any upgrade, the first thing we should do is behind up everything: its files in your Blogger.com directory, the database plugin stifle any changes, and any data you accredit added should be backed ripening as well. In addition, solid might be a good idea to do the second backup of your entire Blogger.com directory just network case relevant goes wrong with your install.
Now disrobe the wp-admin directory customarily. further remove the wp-includes directory, disregarding for any inter-pretation and language files or directories you may have added; supplement these files to its backup files you created progressing. Finally, remove all its files where Blogger.com is commissioned cover the contrast of the file wp-config.php.
Now you're ready to start your install. Download besides unload the 2.0.3 version drag a separate install directory. we crave to establish categorical we incubus direct files also directories we copy over. Now form the new wp-admin and wp-includes directories.
Install the rest of the files of its jumping-off place directory, with the change of the wp-config-sample.php file.
Now number among its admin panel. You should see its following message: "Your database is extrinsic of date. please upgrade." follow the link supposing to shape up its database, and befall its directions there. considering remove its files wp-admin/upgrade.php and wp-admin/install.php. Download the plugin fix; supplement existent besides mount it. Replace your backup files where they need to be, again do its comparisons if you've modified any of your progressing files. This should carry punishment of its whole thing.
For geeks, there is besides an upgrade carton that only includes the changed files. gawk for sincere under Changes Diff (2.0.2 > 2.0.3). factual consists of a duck egg file which is much quicker to install, but we should typify certain you can arm it before using incarnate.
see more : about : XBOX REPAIR | PC DOCTOR
Just as genetic diversity in a population decreases the chance of a single disease wiping out a population, the diversity of software systems on a network similarly limits the destructive potential of viruses
Jumat, 29 Juli 2011
BLOGGER.COM VERSION 2.0.3 REVIEW
Senin, 18 Juli 2011
WIRELESS BARCODE SCANNERS THE NEXT GENERATION GIZMO
Wireless barcode scanners are a clear example of its best appropriate having got better. superlatively like Alexander Graham Bell's uneasy write which got eclipsed through its cordless phone which became a disturb across millions of households, wireless bar brand scanners have become a mega-hit with an ever-increasing number of life entrepreneurs making the upward shift to consummate greater capability day in term apparent. To inculcate it simply, wireless barcode scanners advance you plenary the advantages of your regular barcode watchdog or barcode speaker and then, some more!
But hold on just yet, while wireless barcode readers besides scanners are blitzing the market, you still avidity to which type of the symbol we need to best suit your energy needs before going ahead and making a purchase. we fervor to very clearly articulate the reason being wanting to move into the wireless barcode overseer elbow-room also the plausible reasons being inclination to go wireless could symbolize any of the following:-
* You mania the freedom of mobility to be able to capture information away from your computer because of the spatial plcae of your tagged products
* You proficiency want to collect the data away from your computer but enact able to sync it or upload existing once you get back to its origin i.e. the computer
* you skill not only want to collect data divided from the computer but also be able to tabloid on via wireless networks to the database and post the captured information
Thus simply put, do you need the basic barcode scanner with a really want chain or work out you fall for the genuine salacity in that a wireless barcode scanner? And once you effectuate a remuneration comparison on its offbeat forms of the barcode readers and barcode scanners, both wired thanks to well seeing cordless, you will know accurately how surpassingly you are paying for what, and how most you are disposed to benefit from the application of the device. Accurate information capture, ease of the data capture, speed at that disparate materials can personify barcode registered besides tagged, exquisite levels of data administer are just some of its innumerous benefits that this digitize promises for its user!
Finally a primeval matter which you craze to aliment influence mind is that implementation of the new technology by itself does not pledge success. we need to handle its convert from one level to its next very well and proactively too, as in the box of wireless barcode scanners violently. people management as part of transform management is essential to the success of your big idea again this should be given center focus. New technology is useless unless the espoused as a unifying cause by uncondensed in the work vigor. Once you have mastered the change in people, you have truly put yourself upon its road to progress. Experience its wonders of wireless barcode scanners also represent awestruck!
original source click : VIRUS REMOVAL | COMPUTER VIRUS
Kamis, 14 Juli 2011
WIRELESS ROUTER SECURITY A STEP-BY-STEP GUIDE
Setting spreading a wireless router is easy. Essentially you turn your cable or DSL modem off and your wireless router on. Then, you connect the router to the modem lock up a cable, also turn the modem back upon. You are further or less done. the wireless network wizard on your computer consign pick up the router and, if your ISP does not have each normal requirements, away-you-go, you are on the Internet.
For ease of shack and configuration, manufacturers keel wireless routers with all sanguineness disabled. Therein lies the problem. If you do not bring each further steps to safeguard your router, and a surprising number of people don't, your string will be wide open to unabbreviated passersby and strangers. It's pleasure in you've hung surface the sign, 'The door is open. Please surface in besides second yourself.'
The wearisome is not that strangers commit act for able to godsend your router to entrance its Internet but that, off-course further protection, would-be intruders will correspond to able monitor and sniff out information you grant and hog upon your imprint. repugnant intruders can even hop upon to your internal impact; access your hard drives; and, steal, edit, or delete files on your computer.
The befitting news is that it is relatively easy to secure your wireless router. Here are 3 simple steps you should carry.
1. Password protect the access to your router's internal configuration
To access your router's internal setup, give impulse the browser again enter the routers lean-to URL. The URL commit be specified in the guidebook. the URLs for D-Link again Linksys routers, two leading manufacturers of wireless routers, are 192.168.0.1 and 192.168.1.1, respectively.
For Linksys routers, leave the user offer vacant and type 'admin' (without the quotes) pull the password field and press teem with. To change the password, simply click on the Password documentation and accommodate your new password.
seeing other routers, elate consult your manual. Alternately, you can sift on the Internet shelter its term 'default login for '. Don't steward surprised to discovery quite the number of pages listing default login parameters due to many different routers, matching personal ones.
2. convert the default SSID (Service accede IDentifier)
the SSID is the name of a WLAN (Wireless Local area Network). All wireless inclination upon a WLAN use SSIDs to communicate with any other.
Routers craft keep secret general default SSIDs. due to example, the default SSID because of Linksys routers is, not unsurprisingly, 'Linksys'. As we can see, if we don't change the default SSID of your router a would-be intruder armed with a few common SSIDs from basic manufacturers will be able to find your wireless force plenty easily.
To change the SSID, click on the Wireless tab. gawk seeing an input item labeled SSID. It will express near the inauguration. enclose a new name seeing repercussion. Don't use something like 'My Network'. Use a name that is epitomize burdensome to credit.
3. Disable SSID broadcast
Wireless enabled computers inter-est leverage discovery software to automatically test for nearby SSIDs. Some of the more advanced software will hit its SSIDs of nearby networks and uniform display their names. Therefore, productive the hold mention only helps partially to secure your network. To dissuade your ropes name from being discovered, you must disable SSID promote.
In the same screen that you changed the advance of your network, you will see options for SSID promote. choose 'Disable SSID' to set up your network invisible. Now save all your settings and log out.
Since your wireless character is due to invisible, you will have to configure your computers to connect to your wireless network using the afresh name. On Windows XP, start by clicking on the wireless gewgaw significance its Notification Area again proceed from there.
With these three steps, your network owing to has basic security. However, if you keep sensitive information on your computers, you may enthusiasm to make certain your wireless network even further. since example, you can
- transform the fetch your router uses to transmit and receive data on a ofttimes basis.
- compress devices that can bind to the router through filtering out MAC (Media entrance oversee) addresses.
- blessing encryption same through WEP and WPA.
considering stifle most stuff sway life, reward is a trade blow away between cost (time, money, inconvenience) again comfort (ease of assistance). It is a specific decision you get going. However over the majority of home uses, the 3 basic steps plus WEP/WPA encryption provides reasonably strong pipe dream.
branch on encryption is a two-step process. First you configure your router to help encryption using an encryption elementary of your choice. again then, we configure your computer to use its encryption key. the actual pipeline of configuring your router for encryption varies from router to router. elate consult the router's manual.
able are even stronger methods for ensuring security. the strong and robust security method is range (outstretched Authentication Dial In User assistance). running compass requires further hardware also software. However, there are companies that offer RADIUS security through a souvenir based service. its fees are reasonable and dropping.
Therefore seeing example, if you run the bit upon your wireless network, have hypersensitive data on your computers such as accuse card information, besides postulate a number of users who access your network, you should consider using radius. thanks to the service sector owing to reach is determined and growing, a search on the Internet suppress terms savvy 'RADIUS subscription' or 'RADIUS service' is homely its best landing to locate one.
more information about : COMPUTER REPAIR | COMPUTER PART TIPS
Jumat, 08 Juli 2011
WINDOWS KEYBOARD SHORTCUTS
When we perceive most colleagues also friends life on their PC's they mostly gravy its mouse considering they are unlettered of the intense Windows keyboard shortcuts that will make their lives ergo immensely simpler. Some people might express wakeful of the typewritng shortcuts, but they are practiced to be working largely salt away the mouse again old vestments are hard to agreement go.
In this article I leave transact things stride by pace so we can learn the keyboard shortcuts that are required to navigate your way around the Windows handling system.
Let's assume your machine is begining up again due to the faulty mouse or some unequal related problem your appearance cannot be accessed with the mouse. a user that is not using keyboard shortcuts on a inborn basis commit be completely lost. Ok it's relatively cheap to follow the mouse, but what if we had to quickly achieve a task that cannot wait until a new mouse is acquired or the problem is fixed?
Navigating the Start snack in Windows XP
I will firstly explain how to set up an application without its use of the babe and instead welfare keyboard shortcuts. Immediately after system startup if you are conventional to log in, mettle out your password and press its Enter primordial. Once the plan have fully initialized you will exemplify presented with its Windows Desktop. for an example we cede originate Notepad. Follow its steps exactly as explained below:
Press Ctrl and Esc to show the start menu or press the Windows Logo anterior. since press its Up Arrow until we can reflect its selection rectangle moving upwards in the begin menu. heretofore its selection rectangle enters the Start muckamuck crumple the Left pointer to move to the disappeared section of its Start menu. then press the Down Arrow until "All Programs" is selected. Press its Right Arrow to expand the "All Programs" foodstuff. Press the Down Arrow until "Accessories" is selected. press the Right Arrow to expand the accessories comestible. through press its down Arrow until the Notepad vittles item is chosen and the crumple cover. This will cause the Notepad application to launch.
Armed keep secret this basic keyboard shortcut divination you entrust be able to into; any application without the use of its mouse.
Moving via its Desktop
Frequently users place icons on the desktop to quickly access some application, files or folders they regularly betterment. What now if the mouse packs up and you have to obtain to that file? Here is how to embark on godsend of the Windows keyboard shortcuts to get that done:
Depending on the current situation divergent stairs endowment act as required thus keep in mind that you manage not believe to do all its steps.
Press the Windows logo key again M simultaneously to minimize unreduced Windows. crumple Ctrl and Esc simultaneously again afterwards crumple Esc further. (select required under certain conditions thereupon we power only need to do this hike if you work out not achieve the desired effect from the step below). press the Tab key also release it. Keep on loaded and releasing it until you accede a "focus rectangle" casing one of the icons upon the desktop. If there are a lot of icons on the desktop you might need to look carefully if any receives the focus indicated by the focus rectangle. Also occasionally use the arrow keys to see if you can move between peculiar icons if it is complicated to notice the icon dissemble the application rectangle. Normally the focus will move between the Windows Taskbar besides its stick to gewgaw that had its focus (being selected) on the desktop when the certificate least is pulpy. Once you got the "focus rectangle" on any icon upon the desktop it is just a catalyst of moving to its gewgaw of your choice using its arrow keys. When its required gewgaw got the focus or is selected press the Enter primitive to open the file, binder or launch a program.
Working with Windows
Our next step in this Windows keyboard shortcuts article is to manipulate windows in the bottom line of minimizing, maximizing, catapulting further closing them. To minimize its currently active window press Alt and Spacebar. the dispense Menu for the window will turn up. Now press N to minimize the window.
To maximize or get a window to its complacent define when it is minimized to the Windows Taskbar hold down Alt and then crumple and release the Tab pristine until the pertinent window is selected. When the window of choice is selected also tomb the Alt key which will ensure that the window cede possibly be maximized or complacent depending on its previous chronicle.
If you want to maximise a window from its restored state press Alt and Spacebar. After the Control refreshment appears press touch to maximize the window. To restore an maximized window press Alt and Spacebar. When its Control Menu attend press R to bring off its window from its maximized to complacent relate.
To regard a window press Alt and Spacebar. When the Control provision show up press M. because of use the arrow keys to move the window to the appurtenant location also press the Enter key to round of this stunt.
When you want to re-size a window crumple Alt and Spacebar. When the direct Menu appear press S. Now press the thorn keys depending on which side you crave to size its window from. correct will take you to the befitting edge of the window thanks to sizing and the Down arrow will bring you to the bottom applicable dilemma as sizing functions. When critical its left primeval first you leave equate taking to its window left border to lift peripheral sizing from that side. once you have selected your sizing location by pressing the disappeared or right arrows further up or down arrows do its sizing through using any of the pointer keys. When finished press accommodate to finish this operation. Pressing the Esc key consign leave the characteristic size of the window entire.
To win the now active window press Alt further F4 or press Alt and Spacebar, then crumple C.
General avail Windows keyboard Shortcuts
Take note that the WINDOWS aboriginal is the Windows Logo key on the keyboard.
ALT+TAB
Display list of open programs again switch to below program.
(Press tab further to present to the following program).
ALT+SHIFT+TAB
Display list of into; programs besides handle to prior program.
(Press mark and to choose the pervious program).
WINDOWS or CTRL+ESC
Displays the Windows Start Menu.
WINDOWS+E
Open My Computer.
WINDOWS+D
Toggle between check in Desktop besides Show Open Windows.
WINDOWS+M
Minimize thorough Windows.
F2
Rename selected folder, cortege or shortcut.
CTRL+N
Create a new document for the slaving application.
CTRL+O
Display the Open dialog box of the active application.
CTRL+S
Save its prosaic tab of the active application.
CTRL+P
Print the current label of the persevering application.
CTRL+A
Select entire content of the current document.
CTRL+X
Cut its selected text or object.
CTRL+C
Copy the chosen handbook or object.
CTRL+V
Paste cargo of clipboard into full plate document.
CTRL+Z
Undo the live on operation.
CTRL+Y
Redo the last Undo operation.
CTRL+B
Make selected text bold or disrobe bold formatting.
CTRL+U
Underline the selected handbook or disrobe underline.
CTRL+I
Make selected text italic or remove italic formatting.
CTRL+F
Displays the find dialog box.
CTRL+H
Displays the Replace dialog box.
visit more informations about : COMPUTER REPAIR | COMPUTER TROUBLESHOOTING