Español | Deutsche | Français | Italiano | Português
Dell to Offer Windows Mobile 5.0 Upgrade
"Dell will offer a Windows Mobile version 5.0 software upgrade for the Dell AximTM X50 handheld family later this year.
The new software is expected to enable users to take advantage of several new productivity and multimedia enhancements, like updated Microsoft Office programs and Direct3D Mobile support. It also supports persistent storage capability, helping to protect against the loss of personal data and applications when batteries discharge completely"
Source: Dell
Read the Full Press Release This announcement has made some Dell Axim X30 owners feel left out since they aren't elligible for the upgrade. An upgrade won't even be offered even though the X30 can take advantage of it.
View Their Comments on the Dell Support Forum
Read more!
Español | Deutsche | Français | Italiano | Português
HP to Offer Upgrade to Windows Mobile 5.0
"HP will offer Windows Mobile 5.0 upgrades for the HP iPAQ hx2100, hx2400, hx2700 and hx4700 series of handhelds. These software upgrades are expected to be available this summer and can be purchased directly from HP."
Source: Hewlett-Packard
Read the Full Press Release
Read more!
Español | Deutsche | Français | Italiano | Português
Google Acquires Dodgeball.com
"Google Inc. has bought
Dodgeball.com, a social-networking startup that helps people find and talk to each other through mobile text messaging.
The Mountain View, Calif., search giant bought the two-person company May 11 for an undisclosed amount. The announcement was made on the Dodgeball.com website.
New York-based Dodgeball.com is run by founder Dennis Crowley and Alex Rainert, both graduates of New York University's Interactive Telecommunications Program. The company's technology enables people to send text messages that can go to pre-selected friends, as well as any friends of friends within a 10-block radius. Photos are sent with the alerts to help people identify strangers"
Source: InformationWeek
Read the Full Article
Read more!
Español | Deutsche | Français | Italiano | Português
Tips to Safeguard Your NoteBook
By: The Editor
The following is a list of tips to help safeguard your laptop while traveling or conducting business.
1. Never leave your laptop unattended. Keep your laptop in your physical possession at all times and pay particular attention at the following locations: airports, hotels, car rental agencies, offices, restaurants, college campuses, restrooms, payphones, libraries, bars, hospitals, conferences centers, train stations and bus terminals. (continued...)
2. Record your laptop’s serial number, make and model information in your purse or wallet so if your computer is stolen, the information will be readily available when you file a police report.
3. Disguise your carrying case. By carrying your laptop in a case designed specifically for computers, you alert thieves to the fact that you are carrying something valuable. Instead, consider carrying your laptop in an ordinary piece of luggage, satchel, briefcase or other inconspicuous bag.
4. Lock it up! Use computer- locking cables to secure your laptop to a desk or table.
5. Etch, engrave or permanently mark your computer with your name and phone number. You might also consider placing several of your business cards inside carrying case pockets.
6. Never place a computer in checked luggage.
7. Identify your carrying case in some unusual way. Brightly colored tape, yarn or tags will help you to locate your bag in the event it comes up missing. When traveling, you might also consider affixing something brightly colored to your actual laptop ( in light of new security measures at airports, travelers are required to remove their laptops from their cases at security checkpoints).
8. If your laptop must be left in your car, store it in the trunk of the vehicle prior to arriving at the final destination.
9. Regularly back up information. Make sure you store this information separately in case your computer is stolen.
10. Report it stolen as soon as possible. In the event that your laptop is lost or stolen, make sure you report it missing to your employer and local authorities as soon as possible. This will help to speed up the recovery process.
Read more!
Español | Deutsche | Français | Italiano | Português
Protect Yourself from WiFi Snoops
By: Preston Gralla, author of
Windows XP Hacks, 2nd EditionUsing a home or small-business WiFi network is like putting a sign on your front door reading, "Door is open. Please come in and steal whatever you like."
That's because any passerby can easily hop onto your network; nose around your PCs; and steal, edit, or delete your files. They can also sniff out the information you're sending and receiving over the internet, and take that as well.
But you needn't be at the mercy of WiFi snoops. There's a lot you can do to protect your home or business network, without spending a lot of time or even any money. Read on to see how. (continued...)
Hide Your Network SSID
Your wireless router tells the world that it's wide open and available to all comers. It does this by broadcasting what's called its SSID (service set identifier). Your wireless router's default SSID, essentially its name, is the same for the thousands or millions of routers the manufacturer makes. (For example, Linksys routers have the SSID of--surprise--Linksys.) So, a would-be intruder can search for networks with a few common default SSIDs from the major manufacturers, and quickly find wireless networks.
Changing your default SSID will help, but only partially. That's because XP, as well as most war-driving software, including NetStumbler, automatically searches out nearby SSIDs, displays their name, and lets you easily connect to them. So you want to not only change the name of the SSID, but also tell your router not to broadcast its real name. That way, it will be invisible. But because you know its name, you'll be able to tell your own PCs to connect to it.
The steps you take to change the SSID's name and to tell your network to stop broadcasting its SSID vary from router to router. The following steps show you how to do it using a Linksys router, although it may vary from model to model:
1. Log in to the setup screen by opening your browser and going to http://192.168.1.1. When the login screen appears, leave the username blank, type admin in the password section, and press Enter. (If you already changed the password, use your new password instead.)
2. Click on the Wireless tab. In the Wireless Network Name (SSID) box, type a new name for your network. For the most security, type a random collection of letters and numbers, and don't give it a name that can be easily guessed, such as "My Network."
3. In the Wireless SSID Broadcast section, select Disabled.
4. While you're at the Wireless screen, you can do something else to help keep your network invisible to outsiders. You should regularly change the wireless channel your router uses to transmit. That way, if someone has previously tapped into your network, he won't know which channel you're currently using to broadcast. Choose a new wireless channel from the Wireless Channel drop-down list.
6. Click on Save Settings to save all your settings. Figure 1 shows you what your settings should look like.
Figure 1. Change the settings on your wireless router--click for full-size image
6. You now have to go to each of the PCs connected to your network, and tell them to connect to the router using the new network name. In Windows XP SP2, click on the small wireless icon in the Notification Area, and click on the View Wireless Networks button. Click on "Change advanced settings" in the left-hand column and then click on the Wireless Networks tab. Click on the Add button in the "Preferred network" section, type your new network name, click on OK, and then click on OK again. You'll now be connected to your network.
7. If you're running an earlier version of Windows XP, click on the small wireless network icon in the Notification Area and select the Wireless Networks tab. Click on the Add button, type the network name, click on OK, and then click on OK again. You'll now be connected to your network.
Now only someone who knows the name will be able to connect to your network.
Filter Out MAC Addresses
Every piece of networking hardware has a unique ID number--in essence a serial number--called a MAC address. No two pieces of networking hardware have the same MAC address, which looks something like this: 00-08-A1-00-9F-32.
You can use these MAC addresses to keep out intruders. Many routers let you permit only certain MAC addresses onto the internet. So you can tell your router to let in all of your computers and keep everyone else out.
Again, how you do this varies from manufacturer to manufacturer, and even from model to model. The following steps show you how to do it using a Linksys router:
1. Open your browser and go to http://192.168.1.1. When the login screen appears, leave the username blank, type admin in the password section, and press Enter. (If you already changed the password, use your new password instead.)
2. Choose Wireless -> Wireless Network Access. The Wireless Network Access screen appears with grayed-out boxes labeled MAC 01, MAC 02, and so on, up to MAC 20.
3. Choose the Restrict Access option to make the grayed-out boxes active.
4. Scroll to the bottom of the screen and click on Wireless Client MAC List. A screen appears listing every wireless PC on your network with basic information about each, including the MAC address. Check the Enable MAC Filter box for each computer and click on Save.
5. You'll be sent back to the Wireless Network Access screen. All the MAC addresses that you check will be automatically filled into the boxes next to MAC 01 and so on, as shown in Figure 2.
Figure 2. The MAC addresses of devices on your network will be automatically added to this screen and allowed on your network--click for full-size image
This security feature applies only to your wireless PCs. If you have any wired PCs connected to your router, you will not see their MAC addresses listed. After all, if someone broke into your house and connected their PC to your network with an Ethernet cable, you would probably notice.
6. Click on Save Settings. Now only computers you specify will be allowed onto your network.
What happens if you buy a new computer and want to add it to your wireless network? You just need to find the MAC address of the wireless adapter and enter it into a MAC box on the Wireless Network Access screen. To find the MAC address, go onto the PC, select Start -> Run, type command, and press Enter. A command-line box will open. Type ipconfig /all and press Enter. Copy the number next to Physical Address into a MAC box on the Wireless Network Access screen. The computer will be allowed to connect to your network.
Use Encryption
Finally, you should use encryption on your network. That way, even if an intruder manages to somehow discover your SSID, he won't be able to snoop on the information you're sending out over the airways.
The two most common types of encryption are WEP and WPA. The WEP protocol is older and less secure than WPA, but you might be forced to use it if you have older hardware that doesn't support WPA. Keep in mind that all of your hardware has to support the same encryption standard. For example, if your newer router uses WPA, your wireless network adapters must also support it. If not, you'll have to use WEP.
The truth is, though, that for home networks, WEP is most likely plenty strong enough. You really only need to protect yourself against passersby, not against someone dedicated to break into your network. Again, though, if your hardware supports WPA, it is a better bet. And it's certainly more suitable for small-business networks.
There's not enough room in this article to go into all the details of how to set up encryption, but it's a two-step process. First, you tell your router to turn on encryption and choose an encryption key. How you do this varies from router to router. On some Linksys models, log in to the administrator screen, select Wireless -> Wireless Security, and you'll come to the encryption setup screen.
After you turn on encryption, you tell each PC to use encryption. On each PC, you'll first click on the wireless connection icon in the Notification Area. Then click on the Properties button and click on the Wireless Networks tab. Highlight your network, click on the Properties button, and click on the Association tab. From there, you configure the PC for encryption.
There are even stronger methods of encryption, such as RADIUS encryption, but these often required dedicated servers or other hardware. However, if you want stronger protection than WPA can provide for your home or small-business network, there's a very affordable way to do it, without buying hardware. A new service from WiTopia called SecureMyWiFi provides RADIUS encryption for up to five network users for $29 per year. You can add more users for nominal fees; for example, you can have up to 20 users for $15 extra. After you subscribe, you'll receive instructions on how to use it, but setup is quite similar to that of WEP and WPA encryption. Note, though, that you can only use the service if all your hardware supports WPA.
Related Reading:
Windows XP Hacks
Tips & Tools for Customizing and Optimizing Your OS
By Preston Gralla
Read more!
Español | Deutsche | Français | Italiano | Português
What Can a Tablet PC Do for You?
By: The Editor
Tablet PCs are great. If you are a mobile person, and you have never considered getting a tablet PC in the past, now is as good a time as any to start checking them out - the technology is cutting-edge, the usability is superb, and prices are starting to drop.
There are two main types of tablet PCs: convertible and slate. Convertible tablets look a lot like normal laptops except the screen can be rotated all the way around and laid down flat across the keyboard. You then input information through the screen using a stylus. Slate tablet PCs include only the screen interface – though they are fully integratable with peripherals like keyboards and mouses, the computer itself does not have them. Both types are viable options, depending on your personal preferences and what you’ll be using it for. (continued...)
As with any technology, tablet PCs have advantages and disadvantages. Thanks to the last few years of development and enhancement, the disadvantages are shrinking in number, and the perks are becoming more and more enticing.
Advantages of Tablet PCs
Far and away, the best thing about tablet PCs is their mobility. You can take and use them anywhere you go, the same way you would take notebook and pen. That means that when your boss bumps into you in the hallway and gives you a number of assignments, you can write them down. In meetings you don't have to hide your face behind the monitor of your laptop because you can lay the tablet PC flat on the table. For students, this mobility is great - you can study your notes while you're waiting in lines or even in the car.
Tablet PCs let you use digital ink to store handwritten notes, graphs, charts, and pictures. You don't have to worry about taking your laptop and a notepad and pen to meetings or classes. Using the stylus, tablet PCs record your handwriting and drawings. They can convert your handwriting to text if you need to turn in an assignment typewritten.
All of the money you have been spending on pens, pencils, highlighters, notepads, papers, binders, folders, staples, and paperclips stays in your pocket. Because of the digital ink option on tablet PCs, much of the need for paper supplies and writing utensils is eliminated. You can keep all your notes on your computer.
Finally, one of the advantages of tablet PCs over regular laptops is that you don't lose any functionality from your computer. Tablets operate on similar platforms and run many of the same programs. In fact, many programs integrate all of their normal functions with digital ink, so you can add notes to documents and even email your handwritten notes to someone.
Disadvantages of Tablet PCs
Despite the advantages of tablet PCs, you must recognize that there are still some disadvantages. First is the price. The prices for tablet PCs are coming down quite a bit from when they were first released, but on average, you can expect to spend more for a tablet PC than for its equivalent laptop. Depending on the bells and whistles you're looking for, expect to pay anywhere from $1,000 on up.
The handwriting-to-text conversion does not always work the way you wish it would. Just like speech-to-text systems require a trained style of speech to work properly, tablet PCs recognize a trained penmanship easier than the way you may write naturally. A lot of the kinks in these conversion systems have been worked out - but don't plan on handwriting your next novel expecting to be able to convert into a print-ready copy with no problems.
Finally, their smaller size is both an advantage and disadvantage. They are much more mobile than their laptop counterparts, but the viewing area is also smaller. Likewise, the keyboard also shrinks down to accommodate the smaller size, so if you feel like your fingers are already cramped on a laptop-sized keyboard, you'll want to make sure you're going to be able to use the tablet PCs before you buy one.
Read more!
Español | Deutsche | Français | Italiano | Português
Español | Deutsche | Français | Italiano | Português
Gates Launches Mobile Windows 5.0
"Microsoft threw a gauntlet down in the mobile market on Tuesday with the launch of Windows Mobile 5.0, the embedded operating system it hopes will anchor a raft of wireless phones and other devices"
Source: InformationWeek
Read the Full Article
Read more!
Español | Deutsche | Français | Italiano | Português
Basics -- The DVD Drive Alphabet
By: The Editor
Most of today's notebook computers come with an internal DVD drive. But do you know what type of drive you have and what its capabilties are? Do you understand the ABCs of DVD drives?
The number of different formats available in DVD drives can be confusing to anyone in the market for one. The list is much longer, but to address a few of the common formats, we have DVD-ROM, DVD-R, DVD-RW, DVD+R, DVD+RW, DVD-RAM ,DVD+R DL and DVD±RW. Wow! This list of common formats is long enough, no wonder it’s confusing!
What's with all the Formats?!
The reason for various recordable DVD formats is that no one group owns the technology and different groups have chosen to support one technology over another. There is no industrial standard for manufacturers to reference, so for the time being consumers will have a few choices. (continued...)
The first thing to address is DVD itself, which stands for Digital Versatile Disc. Some may argue that the V stands for Video, but with the capability to store video, audio, and data files, Versatile is definitely the keyword.
Start with the Basics
A DVD-ROM drive is the only one we will address that does not record. ROM stands for Read Only Memory, and refers to the typical drive that can merely read DVDs, as well as CDs (all DVD drives can read CDs). The Lite-On LTD-163-DO-R has attributes representative of your typical DVD-ROM drive, and features a maximum DVD read speed of 16x and a maximum CD read speed of 48x.
Before getting into the different recordable formats, let’s address the basics of what the R and RW stand for, regardless of whether there is a + or – in the middle. R stands for Recordable, which indicates that the disk may be recorded to only once. RW stands for ReWritable, which indicates that the disc may be recorded to more than once, and are generally rated for 1000 rewrites under good conditions.
The DVD-R/-RW format was developed by Pioneer, and was the first format compatible with stand alone DVD players. The group that promotes the technology calls itself the DVD Forum, which is “an international association of hardware manufacturers, software firms, content providers, and other users” with notable members such as Hitachi, Samsung, and Toshiba. The DVD-R/-RW format is based on CD-RW technology and uses a similar approach to burning discs.
The DVD+R/+RW format is a newer format, also based on CD-RW technology, and compatible with a large percentage of stand alone DVD players. The +R/+RW technology is not supported by the DVD Forum, and its main backing comes from a group called the DVD+RW Alliance. The Alliance “is a voluntary group of industry-leading personal computing manufacturers, optical storage and electronics manufacturers” with members such as Dell, Hewlett Packard, Sony, and Phillips Electronics.
The DVD-RAM format is based on PD-RW (Phase-Differential) drives, and actually uses a cartridge to hold the media (just like its PD-RW predecessor). Some DVD-RAM cartridges are double sided, making them ideal for companies to use as system backup, hence DVD-RAM is usually found only in commercial applications, and most end-users won’t ever need to use or see this type of drive. The DVD-RAM standard is also supported by the DVD Forum just like the DVD-R/RW format. However, because of its use of a cartridge (limiting it’s compatibility), and the scarcity and price of the media used, DVD-RAM is a distant third when compared to the DVD+R/+RW and DVD-R/–RW technology.
The +R/+RW and –R/-RW formats are similar, and the main difference DVD+R technology has is the ability to record to multiple layers (with its new DVD+R DL format), where DVD-R can only record to one layer (not all +R drives are capable of dual layer burning, but no -R drives are). The Plextor PX-504U is an example of an external DVD+R/+RW drive capable of recording single layer discs in the +R/+RW format, but also able to read discs recorded by a DVD-R drive.
What is DVD±RW?
DVD±RW is not actually a separate format, but the designation given to drives capable of both –R/–RW and +R/+RW operation. This type of drive is typically called a “Dual Drive” (not to be confused with a “Double Layer” drive) since it can write to both the +R/+RW and –R/–RW formats. The Samsung TS-H552 is a DVD±RW drive capable of reading and writing every format discussed so far, and then some. It takes advantage of DVD+R DL (Double Layer) technology available with the +R format, allowing the appropriate media to store virtually double the 4.37 GB capacity of a typical single layer disc.
The other main thing to consider with DVD burners is selecting the correct media. Media for DVD-R, DVD-RW, DVD+R and DVD+RW media may all look the same, but they are slightly different in order to match the specific recording formats. The price of media for either format is generally the same, with RW media costing a good deal more than R media of either format. Double Layer media is even more expensive, and is the only way for an owner of DVD+R DL drive to take advantage of the tremendous capacity increase. As the amount of Double Layer drives increase in the market, the price of the DVD+R DL media is expected to fall with increased production of the media. DVD Burners (as these drive are often referred to) can be picky about the media supported, so be sure to choose your media wisely.
DVD in a Nutshell
DVD-ROM : Reads DVD discs
DVD+R : Writes to DVD+R media (will also typically write to CD-R and CD-RW media)
DVD+RW : Writes to DVD+RW media (will also typically write to DVD+R, CD-R and CD-RW media)
DVD+R DL : Writes to DVD+R DL (Double Layer) media (will also typically write to DVD+R, DVD+RW, CD-R and CD-RW media; many Double Layer drives are ALSO dual drives – that is, able to write to BOTH +R/RW and –R/RW media)
DVD-RAM : Writes to DVD-RAM cartridges (not in wide use on consumer market – mainly a business format; can also read PD-RW discs. Will not usually be able to write to any other format including CD-R or CD-RW)
DVD-R : Writes to DVD-R media (will also typically write to CD-R and CD-RW media)
DVD-RW : Writes to DVD-RW media (will also typically write to DVD-R, CD-R and CD-RW media)
DVD±RW : Writes to DVD-RW and DVD+RW media (will also typically write to DVD-R, DVD+R, CD-R and CD-RW media; typically called “Dual Drives” since it can burn to two different DVD formats)
Final Words
This article took a look at the more common formats of DVD drives in order to shed some light on all the choices available. The differences between them all may be subtle, but the compatibility issues can be quite frustrating. The simple answer to anyone considering a drive is to forget about + and – by themselves, and shoot for universal compatibility with a good DVD±RW with DVD+R DL support.
Read more!
Español | Deutsche | Français | Italiano | Português
Used Notebook Inspection Guide -- Part 2
By: The Editor
Used laptop computers are everywhere these days. How can you sift through the mass of available used laptop computers to narrow your search down to the right laptop for you? This is the second part of a series of articles designed to give you a few suggestions for your next purchase.
Assuming you've done the visual inspection mentioned in
Part One, you're ready to power up the laptop and do some more digging.
Laptop Operating System
Does the laptop you're looking at come with an operating system? If not, it could be difficult for you to fully test the operation of the laptop. One good alternative to a built in operating system is to download and burn a copy of Knoppix. Knoppix is a linux operating system that runs off the CD-ROM drive instead of the hard drive. This allows you to test the laptop even if it doesn't have an operating system installed. You can find Knoppix at www.knoppix.com
Quick Power Up Inspection (continued...)
Power up the laptop if it already isn't on. Make sure to open the CD-ROM or DVD-ROM drive that comes with the laptop. Look for USB ports and make sure they are in good repair. Locate the vent for the CPU fan (if it has one – most do) and listen to the sound it makes. If you hear any whining or grinding sounds, beware. This may be an indication that the CPU inside has not been getting proper cooling which can definitely lead to problems down the road like random crashes, shut downs, etc...
Examine the LCD Screen
Chances are, you're going to be staring at that screen an awful lot. Make sure the colors are stable and that there are no parts of the LCD screen that are washed out or discolored. Replacing an LCD screen is expensive. Better to find a problem with it before you buy it then afterwards.
Is the LCD screen bright enough for your needs? Some used laptops will have LCD screens that are too dim to be practical. Keep in mind that older laptops will often not be very bright in direct sunlight. They should all be bright in normal lighting conditions however.
Read Part 3
Read more!
Español | Deutsche | Français | Italiano | Português
3 Tips to Fix Unreliable Wireless Connections
By: Sharron Senter
Generally speaking, wireless computer connections are reliable. However, nothing is perfect, and sometimes you may lose your connection or experience a weak signal. There are many factors that impact the reliability of your wireless connection.
For example, if your wireless adapter is too close to a 2.4 GHz wireless telephone, you may notice a decrease in your computer’s wireless single strength. Why? Because the phone and the computer reside on the same frequency and can interfere with each other’s performance.
Handy Repair Checklist for Wireless Interruptions (continued...)
1. First check to see if your cable or DSL is actually working. Usually located in your basement, most modems have four lights. You have a live Internet connection if the “data” or “status” light is on. If it’s off, or flashing, your cable is out.
2. If your cable/DSL is working, then reboot your computer. Sometimes, if your cable/DSL goes out for even 10 seconds, your computer and the wireless router may no longer be able to talk to each other. By rebooting your computer, a new IP address is assigned, allowing them to once again communicate.
3. If your desktop is wireless and you’ve moved the wireless adapter [the box that sits next to the computer with antennas], then you may need to move the adapter until you find a stronger signal.
About The Author:
Sharron Senter is co-founder of http://www.VisitingGeeks.com - an on site computer repair, security and networking company serving north of Boston, Southern NH and Maine. Visiting Geeks’ technicians are crackerjacks at squashing viruses, popups and securing and making computers perform faster.
Read more!