Nature

Poetic beauty of nature.

Universe

The vastness of the universe.

Wallpaper

Beautiful pictures of nature.

Snow white

Winter cold.

Icebergs

Beautiful pictures of nature 2.

Thứ Tư, 28 tháng 8, 2013

10 should not do when using the computer

PC as well as all other electronics need maintenance, maintenance and need the attention of the user during use. But many of us have some bugs to the "care" not good cause computer problems on hardware, software, worse, data loss. Previously we had pretty much all share about what to do, but what not to do something, why?
1. Do not update your operating system and your applications
Windows_Update
I know that the updated operating system and applications are really upset with some people because they do not have the time, or sometimes the improvements in the new software version makes them feel familiar. For that reason, many of you will choose to turn off the auto-update, ignore the new updates and leave like that. However, when doing so is that you have inadvertently caused his computer to be "fragile" than with regular updates. Not when the manufacturer does not release the software update, it is used to fix the existing errors, improve software performance, add new features, interface changes ... With the operating system and increasing the error correction performance as more important because it helps us to work more smoothly, faster, less error prone than machines. It's wasteful when we refuse to use the improvements that developers hand delivered to us.
Therefore, take the time to try and update the software offline. With Windows , you can set the machine to inform the new update and choose yourself the download / update, so it will be little slower, less Internet bandwidth occupied over. If you are able to install and update, the computer itself was wonderful then. Similar to other software applications, if you choose option than the temporary bypass. Most of the app will have a button "Remind me later" to remind you to update later, but remember it is not okay to ignore. Browser, Flash, Java needs to be updated regularly by the very things they are vulnerable to attack from outside.
2. To close the computer too much dust
After a period of use, desktop or laptop will be dust. Dust will cause the fan turns slowly away, the air circulation is reduced and the temperature increase in our PC. If there is too much dust, heat dissipation system of the device may not work as good as the original design to computer overheating and the computer will automatically shut down. I once had a friend who uses a laptop, a system crash every 5 minutes even though he had installed the machine, complete software update, replace both batteries at. It turned out that due to the dense dust in the equipment slot radiator overheating and causing computer operating system of the PC-break operation. Just use the map blowing spray blowing dust a few times this condition is gone. Due rubber squeeze as they cost tens of thousands of contract and you can purchase at most computer stores.
To limit the above situation, you should always open the desktop case and cleaning inside it. In Vietnam, we do not have a lot of dust and gas should this need to be conducted more frequently. If you have time, you can do 2 a week, otherwise once a month. As for the laptop, you will need to open the machine for cleaning. It is very easy to open, with most laptops, we just need to open some screws underneath the machine, remove the bottom plate of the saw with the mainboard slot heatsink and fan. However, the laptop is able to stamp the warranty will be torn open, so if you are not familiar with it should bring out the best services to their computer to help you.
3. No data backup
I know this is very very very many people do, because they hesitate to take time, take extra backup capacity (!?). Even you know more about your computer and your data is not backed up by ... lazy. Why are you lazy while currently there are many tools for automated data backup? Just a little search on the Internet and you will see a lot of software has the function of "auto backup", both for Mac, Windows and Linux. Windows 8 users are even available free backup feature built into the operating system, you can also use the Mac Time Machine with equivalent functionality.Many data backup only proceed once they have experienced loss and "traumatic experience", do not become one of them okay for you.
A few rules when backing up data:
  • Restrictions on the backup storage device installed in the computer:  for example, many of you often create a backup partition on the computer and then copy data from drive C, drive D through it. This is almost useless because if you lose your computer, why? Or the hard drive fails, what to do? It is best to backup an external hard drive. HDD then current price is quite reasonable, just about 1 million is genuine 500GB drive to back up data before, about 700-800 thousand is good 320GB drive. If available HDD / SSD left over from the previous round of upgrade, please take advantage of it always okay. In addition, you also need to choose a safe place to put this backup drive offline. For example, if you put in pairs when theft is going to take the data on your computer and backup drive.
  • Regular backups : backup set schedule at least once a week, not for a month to do this once because of no backup data is very large, consuming our time. In addition, the regular backup will also help to limit to the minimum amount of lost data in the worst case.
  • Backing up on many different drives : if your data on the type of the utmost importance, the nature of "survival" with work or your life, do not regret the money again to buy a backup drive with a content. So you will have at least two backup drives, plus data on another computer, the safety is much higher. Of course, if necessary, feel alone, you do not need to invest in a backup drive Monday.
4. Plug the computer directly into a power outlet
You have the power cord plugged straight desktop or laptop into a power outlet is not? You should not do that okay by unstable power source, which can increase fire component, which power your home or flashes of lightning will be "poignant" this. Adapter laptop too, although not directly affect the computer, but the money to replace and fix adapter pretty much. Instead, you should plug in a splitter and from splitter plugged into the wall. The reason for the split will often fuse, if power is too strong, the fuse off, bought out electric shop instead is done, both cheap and fast. Some have not only broken, it fuses itself only, not the device is plugged in to the same fate, and then buy back the share is still cheaper than buying the adapter and computer components. You note that the Department should avoid sharing three (in some places called Trident) okay because we do not have fuses, protective effect is not there. Used to split the socket is pure.
5. Defragment SSDs
With HDD on computers running Windows, the defragmentation is commonplace and we have done this a long time ago. But with SSDs, so you should not defrag. Why?
HDD will write data to the disc plates, and top with the task of finding them when you need access to. It so happens that the HDD is a condition that one data file (probably) have been stored in the different parts of the blade disc, leading to the access speed is reduced significantly, referred to as the fragmentation (fragment). Therefore, the operating system will have a function called Defragment (Defragment) to collect the pieces of data together to reduce this situation.
However, SSDs are made as well as other mechanisms HDD activity. Data is stored on the Flash memory chip, so despite being fragmented, but SSD does not use the word to search for data access should still take place immediately. Therefore, do not need and should absolutely not run defrag app for your SSD. Doing this meaningless and even harmful to the SSD because it's starting to make an overworked (SSD longevity is calculated according to the number of write / erase data that defrag programs that move data from place to another).
6. Running multiple antivirus software at the same time
You should run only one antivirus program on your computer at a time only. The antivirus app will dig into the system to manage the operation of the machine, check the software before running, scan everything you download or peripherals are plugged into the PC. If you have more than one anti-virus app, they will conflict with each other during the operation makes the machine "behavior" strange, is even reboot or blue screen of death. Some even get anti-virus software as malware and try to remove it from your computer again.
Also because of this, usually, when the anti-virus software installed, you will receive a warning similar to what I said above. Some apps, such as Kaspersky or Norton, will not let you proceed with installation if not uninstall antivirus software are.
7. Blocking airflow heatsink
As mentioned whimper, the computer needs to be properly heatsink to work best. In addition to ensuring that dust does not stick in the slot with heatsink, make sure that you do not let anything stop before this gap. If you use a desktop, do not leave it against the wall thermal losses (or grab something covered) by the hot air has no place to escape. If using a laptop, do not let up mattresses gaming machines and other heavy work done by the mattress will block vents.Similarly, do not put your laptop in your lap if your thigh is capable of blocking the gas. Keep in mind that space for heat dissipation is critical, while surfing the web or simple chit chat is fine, but when running intensive tasks, the machine needs a lot cooler.
8. Using powerful graphics card overkill
If only the office if you need to AMD HD 7990 card for gaming?
Everyone likes to have a powerful PC, but most people do not use all the power of the machine. If you build a desktop for a girlfriend, the wife, the parents, the more likely you will not need a powerful graphics card, even using onboard graphics chip has enough. The powerful graphics cards will consume a lot of energy even when you are not running graphics-heavy tasks. That power waste our money to buy something that costs almost never need to. Even if you have enough money, you should not do that, please save to buy something else better, more useful.
9. Refrain from using old CRT
If you are still using the old CRT, it will consume a lot of power and thereby increase your electric bill. Not to mention the CRT has lightning phenomena (flickr) was not good for the eyes and cause headaches when used in a long time. If possible, upgrade to LCD or LCD screen with LED backlighting for the screen type current was also very cheap then, to have various sizes from small to large are spoiled for choice. In addition, the LCD screen also helps you save a lot of desk space compared to the old CRT monitors used, which are bulky and big.
10. Do not make the desktop and hard drive clean and tidy
Good practice is to always clean your desktop and hard drive to make it tidier and less cluttered than. It not only helps us to more easily find that sometimes your desktop neat and less on the things that will make your computer run faster - in case you use a Mac. For the hard drive too, the file is no longer used to delete it and gather them into a file folder to help management easier.Take time for other things instead of sitting for a picture file on your hard drive or a cluttered desktop.
Supplement:
11. Remove the laptop battery when plugged in
This was a mistake that countless people have. You could argue that removing the battery and power only helps for longer battery life than the bottle, when you replace the battery on time.However, this is dead wrong because if the voltage is not stable or components may burn, and least flammable source chip. I've met a lot of you are like that then, very traumatic experience.With Macs, had proven that the test remove the battery and only power plant efficiency will decrease significantly.
The battery of the laptop is now using a new technology, besides it will interrupt power to the battery when the battery to 100% and switching to new sources should be used very long cylinders only a few% only. You should not worry then, lo the damaged machine back to the suffering. You want to change the batteries last few years a million times or want to spend money to fix my laptop?

A number of security issues that the hacker will be presenting at Black Hat and Def Con 2013

This week, thousands of computer hackers going to Las Vegas to attend the Black Hat and Def Con, two facts about the security and safety information globally famous. Participants will often reveal new findings at two conferences of this, the media is also closely monitored to know that things seemed safe could suddenly turn off "attack" users. Some things have been revealed at the Black Hat and Def Con last year as the hack can tell in a minute via iPhone charger off, access to the system of bank surveillance camera, prisons, military facilities only the manipulation of the "simple", or as the hack ATMs to spit it out without money to your bank account. But this year, why?
Hacker can find out your self-destruct message
Poke Facebook app is the ability to send messages, photos, videos to one or more friends.Message from Poke the recipient will see the display for 10 seconds and then disappear.Snapchat, Wickr app features are similar, and also send text messages that self-destruct message. We thought that this app is safe because it does not save anything, but the reality is not so. Two expert digital examination and Kyle O'Meara Drea London will go on stage at Def Con 2013 to talk about how to read the message seemed to have been deleted. By looking in the phone's memory, test data, as well as ping is sent to the application server, the two men know how to retrieve messages from Poke, Snapchat, Wickr before, during and after messaging users.
Camera GoPro sports camera can be turned into tracking
Camera_GoPro
Imagine the following scene: your GoPro camera attached to his hat to prepare for a trip by motorcycle Donate with friends. This camera means terrible, just beautiful recording, which is small and flexible, both the integrated Wi-Fi. But there is also the possibility that someone is listening to every word that you say through the wireless connection of the machine. Two security researchers Zach Lanier Todd Manning and found not one, but many ways to turn your GoPro a tracking device into a voice, they can also control it remotely. This problem will become more serious in the case of soldiers using GoPro to record their military campaigns, such as this video.
Using computers to hack and create 3D models of door key
O_khoa_cua
Locks Wi-Fi, or smart locks are prey to bad hacker, who would have guessed it., So many people still use traditional locks. But this is also not safe because a hacker group can create 3D models of any keys that are manufactured by Schlage Primus, a company specializing in high security locks of America. All you need is some hacker group series of locks, and when they have, they will come model in 3D, and that is the key to life.
In addition, a group of security experts also make a way to "open, pass or decode" a common locks in seconds. They wait to Def Con announced more details about this.
You could be eavesdropping on phone calls with mobile devices $ 250
Tram_di _Multioutlers
Two years ago, the hacker has to know how to listen to the call on the mobile phone runs on GSM only device is priced under $ 1,500. Now, a third-party security adviser has found a way to do the same with phones running CDMA network, and the cost to purchase the equipment for this hack is only $ 300 or less.
On the Black Hat website, this team revealed: "I have a box on the desk and your phone will automatically connect to it when you send or receive calls, text messages, email, web browsing. I own this box. I see all the data passing through it and you did not even know that you are connected to me. " This box is actually a femtocell, a small broadcast stations located in the household to help increase signal coverage and capacity of mobile networks. The box will cost only about $ 250, some phone companies do not even give their customers. When in range of the femtocell, your phone will automatically routing data to go through the box without informing the user.
These tiny computers are recording your every move
Brendan O'Connor, a security expert, has created a system valued at $ 60 includes a sensor mounted around the region or around the city. The system can track almost everything, from phones, tablets, PC. Corresponding signal will be sent to the central database in the monitoring process and then it will be mapped onto a map. Currently, each of the lines carries at least one mobile device, so that the above system can track every step of the way our country. Hear action movies like that. It is known that many of the projects Brendan O'Connor has been funded by the Agency for Research Projects of National Defense (DARPA) of the U.S. government.
Hacker can shut down a power plant
Nha_may_dein_hat_nhan
Wireless networks are often used to control power plants, and in fact, it was present in the nuclear power plants, thermal power, hydropower. Two hackers have recently discovered a security flaw in the system equipment manufactured by three wireless automation company leading the world.When successfully exploited the vulnerability, the hacker would have evil intentions may read and write data to the device above the 64km distance only by a radio receiver.
Once you have access to the control system devices, hackers can cause false test results of the sensor, override unauthorized data. This action will result in the plant is not running at full capacity, the voltage can be increased suddenly, and oil to run the generators could be wrong mix ratio. In addition, hackers can simply disable the wireless network and for decommissioning the plant. This attack can leave extremely serious consequences, depending on the size and scale of the plant. It sounds horrible to you, right? Just as the movie Live Free and Die Hard.
Hackers can break into your smart home
Den_LED_Gunilamp_tinhte_9
Let's start with the Smart TV: Hackers can access this smart TVs to steal personal information, install viruses, hijack your webcam and microphone, while still eating corn and watch movies with his girlfriend without knowing anything. And if you suddenly feel the space suddenly becomes hot, the thermostat can the hacker was then corrected. In the case of continuous flashing lights, automatic door suddenly opened like ghost movies can also interfere with the hacker has your home already. These are just some small examples show that smart appliances are increasingly provide many benefits, but it also comes with the huge security risk.
You may be shocked by the death of his pacemaker
May_tro_tim
In 2006, in the U.S. alone, approximately 350,000 of the 173,000 pacemaker and defibrillator implanted into the patients. This was also the year that the Department of Food and Drug Administration approved the United States began medical devices have wireless connections.Celebrity hacker Barnaby Jack plans to show the access and take control of medical equipment, the individual with a pacemaker, he can order them up or stops working electrical pulses to the patient in eternity. The hack can be carried out at a distance of 9m. Sadly Jack died suddenly last week, but his findings also still have to make people frightened.
Session presentation at the Black Hat Jack remain unchanged and we will use that time to commemorate the work of his very useful. Before that he was looking for ways to make ATM cash injection out without resorting to any bank account. Jack also discovered errors allowed hack insulin pumps and "assassinate" a remote patient.
Hackers can control your car when you are driving it
xe_o_to
The hack and cars is becoming a trend among hackers this year. The security expert can break into your vehicle and control it remotely, they also know how to tweak parameters on the front panel to the steering wheel. More of the situation "as the film" appears here: hackers can disable the brakes, steering wheel controls illegal, suddenly speed up, or empty the fuel tank as the screen is still showing full average. Charlie Miller, a security expert from Twitter, along with Chris Valasek, director of security firm IOActive, recently demonstrated the hack above to view Forbes magazine. Four other groups will also demo the same thing at Def Con.
These are just a few things to take place at the Black Hat and Def Con 2013. Let's wait and see what surprises are appearing again.

Microsoft is testing Windows Phone 8.1, may be released next year

Recently, Tom Myles, a Chinese developer has released application called Love Wallpaper HD.Based on the data in the logs, Tom discovered a number of devices running the operating system version is Windows Phone 8 is installed your application. Tom said the current version of Windows Phone 8 last he is allowed to access 8.0.10328.78, however, the other device to use the new version are as 8.10.12073.0, 8.10.12086.0, and 8.10.12100.0 8.10.12102.0. Therefore, we have grounds to suspect that Microsoft has begun to test the OS version Windows Phone 8.1 .
Microsoft is testing Windows Phone 8.1, may be released next year


But more likely, Microsoft will be launching Windows Phone update GDR3 allowing smartphone use Full HD display and quad core chips in the fourth quarter last year. Hence, time release updateWindows Phone 8.1 will be coming back in 2014. It is expected that the operating system version 8.1 will have additional deficiencies present messages as notification center, improved performance when multitasking and supports screen rotation lock.

Apple co-founder: Microsoft lags for flexibility and creativity not by Apple

In 2007, when Apple first launched the iPhone, Steve Ballmer had boldly declared that iPhone "can not stop" as opposed to Microsoft, and is optimistic that "Windows operating system will be used in 60%, even 80% of mobile devices across the globe. "

Steve Wozniak said that Microsoft does not slow as flexible and innovative as Apple
Steve Wozniak said that Microsoft does not slow as flexible and innovative as Apple

However, the reality is the opposite occurred with the predictions of subjective Steve Ballmer.The trip across the battle, Steve Jobs eager to culminate iPhone. Until 2010, the new Microsoft began offering Windows Phone. But the efforts of U.S. software firms too late. In a world changing by the minute, three years is enough time for Apple's iPhone and Google's Android to create a consumer trend that Microsoft is hard to overthrow.
According to Steve Wozniak, the reason for Apple's success is always flexible and creative as soon as the company became a major. This is what Microsoft did not get under Steve Ballmer. "Steve Ballmer Bill Gates does not matter," Apple co-founder emphasized.
However, Apple is also Samsung has been overcome to become the phone maker's largest smartphone world. So Apple is "day bed" like Microsoft? The answer to this question, Steve Wozniak said that those who are criticizing Apple because it does not bring anything new to understand that "great progress for humanity does not happen every year."

Steve Wozniak who was "straight intestine horse". Not only public comment on the competition, in the past many times and Wozniak criticized shortcomings in the products of Apple as Siri, Mac OSX, ... In an interview with the Daily Beast, he revealed that his request to use the iPhone because the beauty of this phone. But he estimated the iPhone will have the same abilities as the Motorola Droid phone.

The beautiful fountains around the magical world


Fountains at Lake Burj Khalifa, Dubai.

Nozzle near the foot of the Eiffel Tower makes the scene more romantic Paris France.

Sprinklers Merlion at Marina Bay is where any visitor to Singapore were also pose.

Buckingham fountain in Chicago, Illinois, United States.

Fountains Show in Shanghai, China attracted many tourists visit.

Fountains in front of a modern shopping center in Port El Kantaoui in Sousse, Tunisia.

Fountains at the war memorial in Washington DC, USA.

Magic fountain in Barcelona, ​​Spain.

Sprinklers in the building south of John Ferraro, Los Angeles, California, United States.

Fountains Square in downtown Seattle, Washington, USA.

Fountains in a park in Warsaw, Poland.

Sprinklers Parque de la Reserva in Lima, Peru.