Tuesday, October 27, 2009

How To Protect Your Laptop - From Theft And Data Loss

The Frightening Truth:

Laptops have become one of those devices that is quickly going, and in some cases, already quickly gone from something that only techies or high level business people owned to something that even a poor college student finds a way to afford. This is simply that our lives become wrapped around these objects. Think of the cell phone. Ten to 15 years ago it was again only the techies or important business people that owned a cell phone. Now even elementary school kids have them so parents can be in constant contact when necessary.

We all have had the moment when we though we had misplaced our cell phone. Imagine losing your laptop. Not only is it a fairly significant expense, but think of the data you have on there. You probably keep a file with account numbers, you have your family pictures stored there, maybe music, movies. The list is a long one and an important one.

Therefore, make sure you follow the recommendations in this article on how to protect your laptop.

The convenience of the laptop is obvious. The computing power and versatility are equivalent to most desktop
computers. With the advent of wi-fi we can be on the internet almost anywhere and be emailing, chatting, writing, surfing the net or shopping, all anywhere in the world.

Here are some daunting statistics for laptop loss from 2008:

Relevant Data Loss and Data Breach Statistics

- 1 in 10 ...laptop computers will be stolen within the first 12 months of purchase.
- 97% ...of lost and stolen
notebooks are never recovered.
- 50% ...of organizations reported
laptop theft.
- every 43 seconds ...a computer is reported stolen.
- every 3 days ... an information security breach is reported in the U.S.
- 82% ...of all PC's will be mobile devices by 2008, increasing 4 times as fast as PCs.
- 4,425 ...laptops reported left behind in Chicago taxis during a six month period.
- 56 million ...individuals affected by significant U.S. data security breaches, 2005.
- 1 billion ...PC users expected by 2010, up from 660-670 million today.
- 57% ...of corporate crimes are linked to stolen laptops. The latest crimes of espionage and sabotage are theft of executive personnel devices to access vital financial or personnel data.

( data source: http://datarevoke.com)

How Much Does Laptop Loss Cost?:

That completely depends on how you look at it and who is doing the looking....

Personal Laptop:

The actual cost here is the cost of the laptop and if stolen while in the laptop bag (most often this is the case) then you've lost all your accessories as well. Not to mention possibly your wallet, MP3 player, passport (eek!). Obviously the actual cost of items and the intangible loss of items such as wallets, all your stored music, your passport, etc. are vastly different.

Business or Corporate Laptop:

Here the intangible costs can be astronomical. We have heard it on the news more than once and most of us have had it hit us directly with someone in the corporate world losing one or more laptops with critical customer data on it. The cost the hardware is only about $4000, the information carried upon it was could be worth millions..

Of course, to get to valuable proprietary information is not the reason for all laptop thefts some laptop thieves head try to quickly sell the laptop as-is. However, some data indicate that about 10 percent to 15 percent of those laptops are stolen by criminals intent on selling the data.

How to Protect Your Laptop:

With this in mind, what can we do as individuals to prevent our own personal loss?

Laptop
Security Cables:

This is one of the lowest cost and one of the most effective deterrents to theft. As with most theft attempts, even a small amount of effort can make a huge difference. For this to work you need to make sure that your laptop is equipped with the appropriate feature to attach a cable. This is called a Universal Security Slot.

It is important to pay attention to what you are attaching the laptop and cable to. You sometimes have to think like a thief. If you really wanted to get that laptop could you? If you answer is yes, then you need to add more security. Consider looping the cable through a hole drilled in the lag of the desk. If you just loop it around the leg than all it takes is some one strong enough to lift the desk enough to slip the cable under the leg and whoosh! your laptop is gone...

Keep Your Laptop Out of Sight:

If you are not with your laptop then it should be secured in a locked drawer or in the possession of someone you trust (for the short trip to the restroom for example). Especially if you are in a public place like an airport, bookstore, or your favorite coffee shop. Never leave your bag alone.

Some laptop cases scream "I have a laptop in here!"

Try to use a carrying case for your laptop that may be a bit beat up or at least not look like it obviously contains a laptop. This may be difficult to do but can be a real effective way to have a thief move on to the next victim without bothering your precious laptop inside your ugly bag.

How to Protect Your Data:

I'm sure you've had moments when you couldn't locate a file that you knew you had stored on your laptop. The feeling of panic can be terrible until you find it. Imagine your hard drive failing (it happens!). You would lose all your important files - pictures, videos, everything.

Therefore, first and most important is external storage. External storage can be something as simple as a USB Flash Drive also known as a thumb drive (about the size of your thumb....) or a large external drive (about the size of an average hardcover book)

The type of external storage you select will depend on your needs. If you just keep basic files (i.e. "Word" documents or spreadsheets, etc) then a thumb drive could be enough (and they are very inexpensive) and can store up to 32 Gigabytes of data or if you are willing to pay a bit more they are larger storage capabilities available. If you plan on storing large files such as lots of photos and videos then you may need to step up in capacity with an external hard drive. They store up to 2 "Terabytes" (2000 Megabytes) of data.

Jeff Snyder is an online marketer and has a site that describes the best laptop accessories to make your time on your laptop more enjoyable and comfortable. To find the best accessories see go to-->http://www.BestLaptopAccessories.com

Friday, October 23, 2009

How To Avoid Laptop Battery Overheat

One of the most common issues with laptop batteries is overheating. Not that the batteries are designed poorly or improperly but due to, in most cases, user wear and tear. While the laptop is using the AC adapter for power the battery acts as a back up in case of a loss of power or accidental unplugging. During this AC power use the battery becomes hotter than it would if being used independently. To lessen the chances of this overheating, which leads to a shorter life expectancy of the battery, keep the AC power adapter plugged in only if you need to charge the battery while using the device.
If the battery is consistently hot to the touch, remove it and allow it to cool down first making sure it is close to room temperature before reinserting it. Should the battery continue to overheat or get too hot it will probably need to be replaced. Always replace a defective battery as soon as possible as it could cause irreparable damage to the laptop in question. In addition to overheating failure to charge or hold a charge is another very common issue with
laptop batteries.

First check to see if the AC adapter is securely plugged into the device; the tightness of the connection will vary form laptop to laptop but it should be held in place well. To check for a good connection look for the battery charging LED if one is present on your laptop. If it is not on wiggle the cord to see if the connection makes and breaks contact. If you notice a flickering LED light then the solution is a new adapter which is far better than needed to purchase a new battery or a new
DC power jack which can be repaired by a common user with a little instruction and help.

At espow.org we offer the widest selections of third party replacement batteries with the lowest prices, good battery life performance. Best laptop batteries - hp laptop batteries, ibm laptop battery, sony computer battery, dell laptop batteries, compaq laptop batteries, notebook desktop computer batteries

Thursday, October 22, 2009

Information about Laptop Hard Drives

Laptop hard drives act as the main storage of this portable computer. This is where files, applications and data are stored. The normal measurement of the drive is 2.5 x 2.5 inches. It is lighter and more compact compared to that of a desktop. It also has various storage capacities.

Take note that there are many kinds of hard drives. Be sure that what you get is compatible to your laptop. It comes in different sizes and capacities. Laptops with lower specs might not work well with a very big capacity storage. Some computers also are picky with brands. Even if the size is right, if it manufactured a by a certain rival brand, it will not work perfectly.

It is sometimes recommended to get a hard drive of the same brand as your portable computer. Test it first before buying and make sure the computer could read the drive without errors. There are also the generic brands that might work in your laptop too.

There are two kinds of laptop hard drives: the Internal Laptop Hard Drives and the external laptop hard drives.

The internal laptop hard drive is installed inside the device. It is in the laptop's dedicated hard drive slot. Its normal storage capacity ranges from 20 GB to 120 GB. The most modern of this type reaches as fast as 5400 rpm. The common transfer rate of the data is 100 MBps. The most common brands for internal hard drive are Seagate, CMS and Toshiba.

The external laptop hard drive is a stand-alone. This device has USB plug that can be connected to the laptop's USB port or the FireWire port. The normal storage ranges from 40 GB to 80 GB. The external laptop hard drive should have a big capacity so that you can store more data.

The advantage of this is that because it is stand-alone, it is easy to transfer files to other computers by just plugging it in the USB port. It is also easier to carry than having to bring the whole laptop if it is installed inside, especially when you need to carry only the data files with you.

There are also two speed options for you to choose when buying the external laptop hard drive. The first is you have to choose the high speed memory or the hard drive's cache size. The second is the availability of the special interface and adaptors.

When talking of size and speeds, the standard for laptop drives is 2.5 inches. These come in different speeds from 4200 rpm to 7200 rpm. The higher the rpm, the faster it opens.

There are two common interfaces: the Parallel -ATA (PATA) and the Serial-ATA. The first type of interface was in the market since 1986. This is a 16 bit interface commonly known as the Integrated Drive Electronics. It has a built-in controller that has computer installation. It can transfer data of up to 133MB per second. This is the standard interface of most laptops.

On the other hand, the serial-ATA was introduced in year 2000. It can transfer up to 300 MB per second. It certainly has lots of benefits from the parallel ATA.

The standard capacity of a laptop is up to 160 GB. This depends on your laptop model. There are newer models of laptop that can offer higher capacities. These are to be developed soon enough and to be released in the market.

Wednesday, October 21, 2009

Types of Computer Viruses

A computer virus is referred to as a computer program that can copy itself and infect a computer. “Virus” is commonly used to indicate other types of malware, adware, and spyware programs that do not have the reproductive ability.

A real computer virus can only spread from one computer to another when its host is taken to the target computer. The virus is contracted in some form of executable code.

Below are a few examples of computer viruses:

Direct Action Viruses
Replicates and takes action when it is executed. When a specific condition is met, the virus will go into action and infect files in the directory or folder that it is in and in directories that are specified in the AUTOEXEC.BAT file PATH. This batch file is always located in the root directory of the hard disk and carries out certain operations when the computer is booted.

Resident Viruses
This type of virus is a permanent which dwells in the RAM memory. From there it can overcome and interrupt all of the operations executed by the system: corrupting files and programs that are opened, closed, copied, renamed etc.

Examples include: Randex, CMJ, Meve, and MrKlunky.

Trojans or Trojan Horses
Another unsavory breed of malicious code are Trojans or Trojan horses, which unlike viruses do not reproduce by infecting other files, nor do they self-replicate like worms.

Boot Virus
This type of virus affects the boot sector of a floppy or hard disk. This is a crucial part of a disk, in which information on the disk itself is stored together with a program that makes it possible to boot (start) the computer from the disk.

The best way of avoiding boot viruses is to ensure that floppy disks are write-protected and never start your computer with an unknown floppy disk in the disk drive.

Examples of boot viruses include: Polyboot.B, AntiEXE.

Macro Virus
Macro viruses infect files that are created using certain applications or programs that contain macros. These mini-programs make it possible to automate series of operations so that they are performed as a single action, thereby saving the user from having to carry them out one by one.

Examples of macro viruses: Relax, Melissa.A, Bablas, O97M/Y2K.

Directory Virus
Directory viruses change the paths that indicate the location of a file. By executing a program (file with the extension .EXE or .COM) which has been infected by a virus, you are unknowingly running the virus program, while the original file and program have been previously moved by the virus.

Once infected it becomes impossible to locate the original files.

About CODANK Charlotte Website Design and Markjeting Company CODANK is a top rated Web Design and Internet Marketing firm located in Charlotte, NC. We are dedicated to provide the highest quality, cost effective custom software development services, delivering a broad range of business consulting and outsourcing services. For more information, visit us at http://codank.com

Article Source: http://www.articlesbase.com/computers-articles/types-of-computer-viruses-1364246.html

Tuesday, October 20, 2009

Spy Cameras - Things to Consider

Buying spy cameras to safeguard their home is turning out to be increasingly well-liked by many people. A lot of people consider that home surveillance will keep them secured. You can record anybody that is looking after your children or nearest and dearest and confirm they are carrying out their job as they should. You can even confirm your home is secure. Spy cameras are simple to make use of. There are a lot of types of spy cameras that you are definite to come across one to goes well with your requirements. The smallest DVR camera with 2GB memory and the pen cam combo in the World, for example, are very good at recording somebody in close proximity to you without them realizing on it. In addition, they are really simple to conceal and are as well very simple to utilize.

Including a home surveillance, as they buy a new home or as they renovate, their home, is very popular in recent times. A lot of people don't consider themselves secure in their home therefore they would like to have added security. Together with home alarms people are setting up cameras that work on with motion sensors. The color spy camera with integrated DVR and the Looker Security DVR are both great for use on homes. If anybody walks in the proximity of your home they will be captured on videotape and will provide evidence to the crime they did.

If you want more selection on cameras, with extended video recording option, a wired spy camera with pinhole lens and separate recorder should be your choice. Pinhole spy cameras requires just about 1/16" hole to see through and their small size of 1" or less square make them simple to put in a range of household or office objects. You would have to run a wire from the camera to a recording device for instance a DVR or a VCR although with some care the wires can be without any difficulty is hidden.

Additionally, wireless spy cameras must be taken into consideration as well. They wirelessly broadcast the signal to a receiver in a different place, as a rule a different room or nearby house. The receiver is then connected by cables to a recording device like a DVR or a VCR that can have a great deal extended recording time. By means of recording the video in a different place the proof will not be lost if the camera is exposed and taken along or damaged.

This video recording will be an excellent proof for the police and would be a lot easier to find the person responsible for the crime. The police can make use of this footage as a proof. This can provide you and your family a sense of security. The color spy camera with integrated DVR is an excellent camera that you can carry with you. Since its handy it can go with you wherever you are interested in to record evidence. You don't have to plug-in, just place it and switch it on and it works for 4 to 5 hours on 4 AA size batteries, this is a great option.

Like all things at present, you will get excellent deals on the internet, as you search for the above mentioned video cameras. As soon as you want to capture the evidence on tape keep in mind that surveillance cameras work extremely well. Take care that you look after your family by setting up spy cameras in close proximity to your home.

Shane is an expert in the field. For more information on http://www.my-spycam.com'>spy cams and onhttp://www.my-spycam.com/all-spy-cams-products/'>spy cameras Please visit: http://www.my-spycam.com

Saturday, October 10, 2009

Laptop Screen Care Tips - Guide to Complete Laptop Screen Care

The laptop screen is a delicate part of the laptopcomputer and apparently the most expensive part of the laptop computer. Lets take a closer look at the laptop computer screen, why it is essential to take care of the laptop screen and how exactly can you safeguard the screen. Before that, let me brief you on the anatomy of a laptop screen. Laptop screen is made of Liquid Crystal display or LCD as we better know it. LCD compositions comprises of individual transistors at each pixel (the minute dots that form images on the laptop screen). Laptop screens could have as many as 1,500,000 pixels. Every pixel is known to have an individual liquid crystal/ transistor combination. Even if a single combination is damaged you might have a permanent black mark on the laptop screen. This seemingly small black spot will not make your laptop unusable. However, if you happen to physically damage the laptop screen through scratch marks or abrasions you will lose much more than one pixel.

Laptop Screen Care Tips: -

Cleaning Laptop Screen - Use a computer buff to clean your laptop screen. These are very handy and can also double up as mouse pads. One of the bestlaptop screen protector, buying laptop buff does not burn a hole in your pocket. Even if you have oil or dirt marks, computer buff will take care of it in a single swipe. Also, finger prints are also something which are clearly visible on the laptop screen. Avoid touching the laptop screen. Avoid use of paper towels or rough cloths to clean; this might worsen things rather than resolving them.

Laptop Screen Protection Shield - Use laptop screen shields also known as laptop bullet proof shields to safeguard the sensitivity of your laptop screen. Laptop protection could not get any better. We know how tough it would be to deal with scratch marks on laptop screen. Avoid using alcoholic cleaners if you are not sure of the amount to be used. Some cleaning liquids need to be diluted with water before use. Besides, certain laptop cleaning liquids use ammonia that spoils the screen and makes it brittle and yellowish in color.

Laptop Physical Damage - Other than cleaning and protecting the laptop using computer buffs and laptop computer shields, you ought to know that simple poking could also damage the laptop screen. For instance, if you are making a laptop presentation never use pointed objects like pencil or pen to point out something on the laptop screen. If you find it difficult to use the mouse cursor, change the size or shape of the mouse cursor from the Control Panel.

The best way to safeguard your laptop computer and laptop screen in particular is to use it with care. Laptop repair could cost much more than the laptop maintenance and laptop care. Apart from the laptop screen protection, you also need to ensure the laptop exterior is not damaged. For this you can use laptop skins which are available in the market. You could even get a variety of it now. Many companies like HandStands have now come up with numerous laptop accessories likelaptop bullet proof shields and computer buffs that help you in this endeavor. All you have to do is pick one!

Schreiberistic has been an avid gadget and gizmo fan. Some of her favorites are laptop accessories and various automotive accessories and computer accessories. She has been using these accessories from one of the best laptop computer accessories and iPod accessories provider

Article Source: http://www.articlesbase.com/laptops-articles/laptop-screen-care-tips-guide-to-complete-laptop-screen-care-558322.html