Comparison of Galaxy S III vs iPhone 4S vs HTC One X

The battle in the mobile market is sure to be a class above the more intense after the presence of Samsung Galaxy S III.

Samsung Officially Launches Galaxy S III

After a long wait, finally Samsung officially unveils Galaxy S III. Android's latest generation of South Korean vendor will soon be visited Europe and Asia followed this by the end of May 2012.

New Nokia Photo Samples from 808 PureView, Wow

For those of you who are interested to buy Nokia 808 Pureview, it's good to see the first images captured using a camera phone. This time the sample photos of the 41MP camera has been obtained through Nokia's official Flickr account.

Samsung: Planning for Windows Phone 8 Smartphone with Base Galaxy S III?

Windows Phone 8 is still not officially announced, but rumors about the smartphone vendors who are making phones with the operating system in it keeps popping up. WP-Life.com this time claiming that they heard the initial details about plans for a product Samsung Windows Phone 8.

6 Expected Features Available on the iPad Mini

Re hot news comes from a family line of iPad. Apple rumored to be making a new tablet with a 7 inch size with a price tag in the range of USD 200. This was done to compete with the Kindle Fire.

Cisco Routers Are the best Network Solution

When choosing routers for your company's network, which brand should you select? While several manufacturers are available, the absolutely, positively best choice is Cisco. Here are some reasons why:
1. Maintainability
Since its creation in 1984, Cisco has been dedicated to customer service. Specifically, it has focused on providing its customers with the network solutions that they need. Supplying their customers with quality routers is only one way that the company strives to accomplish that goal. Interestingly, the company's founding was based on a husband and wife's inability to e-mail each other from separate buildings at Standard University. It resulted in their creating multi-protocol routers. This was just the beginning of their commitment to customer service, through finding solutions to its customers' needs.
2. Durability
The ability to handle high network loads is definitely one of the top benefits of Cisco routers over other companies' versions. When network traffic is heavy at your company, it's crucial that you have top-of-the-line equipment to handle the load. Alternative versions might be unable to handle such situations. But if you choose one a model from the leading manufacturer, then that won't be a problem.
3. Compatibility
Cisco has everything to connect your company to the Internet, and to connect it through an intranet. One of the main benefits of choosing one of their routers is that you'll be choosing parts that can be part of Cisco integrated system. When creating a network, this option is much more practical and reliable than creating a network that contains a hodgepodge of components from different manufacturers. When you opt for a router from the leading manufacturer, compatibility should be straightforward and you should have a network perfectly suited for your needs.
4. Availability
Cisco is one of the largest technology companies in the world. Is bigger better? In this case, being larger provides benefits. First, there's the availability of Cisco networking components themselves-such. This means that there's a high availability of their products wherever you shop for your Networking components. Another benefit of choosing to buy your router from them is that you won't be left high and dry after purchase.
If you have questions or issues, then you can be assured that the network of specialists and maintenance teams will be on hand to provide assistance. Due to the size of the company and the popularity of products, this support network is significantly larger than you'd find with most other manufacturers.
5. Versatility
When Cisco was founded, it was innovative in creating multi-protocol routers for its customers. That situation changed due to the increased use of the Internet Protocol (IP). Today, their most popular routers are designed to transfer IP packets. However, it's important to note that Cisco provides its customers with a wide array of routers to choose from. That means that it's highly likely that they can supply your company's network with the routers it needs. Essentially, the company's prime focus is intent on supplying its customers with the equipment that will help the network to function as smoothly as possible.
When choosing routers for your company's network, you should certainly consider those from Cisco. Not only is it one of the largest technology corporations in the world, but it also supplies the best routers.

Tips for Creating Symbols Copyright, Trademark, Registry in Microsoft Word

Tips to make the symbol "copyright", "register" or "trademark" in Microsoft Word in a simple and concise manner,
The first way by using the Symbol function from the Insert menu in Microsoft Word. But an easier way is to use a shortcut that is a short way to activate a menu. What are the shortcuts to make symbols like ©, ® or TM in Microsoft Word?:

    
* To create a symbol like the following Copyright ©, shortcuts used are:
      
[Ctrl] + [Alt] + [C]
    
* To create a symbol like the following Registry ®, shortcuts used are:
      
[Ctrl] + [Alt] + [R]
    
* To make the following Trademark symbol TM, shortcuts used are:
      
[Ctrl] + [Alt] + [T]

Tips - Closing All Files Excel

Microsoft Excel is a spreadsheet software that is reliable. With Microsoft Excel, you can create inventory reports, financial reports, and various types of other reports. In fact you can display in a pivot table for data can be processed and presented with interesting.

Because in most offices, chances are you open lots of files or Excel files on your computer. If you want to close all these files, you must close it one by one. If you are chased by time and want to do it quickly, of course this is not an efficient way.
Actually there is a quick way to cover the entire Excel file brief. How do I? You simply press and hold the "Shift" then choose "File" menu. On the menu that appears, there will be a new additional menu item called "Close All". Select the "Close All" then all your Excel file will be closed simultaneously. Of course if you do not save (save) the file Excel will then automatically advance to confirm to you before closing the file.

Computers and Internet threats!

Computers are now a common thing. Every day, you may be associated with this object. Computers and the Internet has helped many of your work. Ease of finding information, perform various financial transactions, store or process data into something that is not too burdensome. But behind its simplicity, there are many threats that can destroy data or your computer either a PC or laptop.

When you find your computer is not working properly, such as computers slow, hangs, look for missing data, display annoying when you're working, you may conclude your computer a virus. Actually there are various threats that target when you work with computers and the Internet. These threats can damage data, computers, and even steal important data.
Security threat is not just a virus. Maybe there are some terms you've ever heard but still do not know what he meant. Here's an explanation of the things that can threaten your computer or take your important data.


 Adware
This is a program that will display ads on the computer. It would be disturbing because adware generally will use the resources of the computer, as a result computer is running slow. There is also a type of adware that appear in pop-ups that can interfere when you're working.

 
Brute Force
An activity to break the password by combining numbers and letters in sequence. Very dangerous if with this technique, people who are not entitled to succeed to know your password and then misused. To overcome this problem, it's good password that is used not only consist of numbers and letters but also consists of symbols like $, #, &, and others.

 
DDoS
Is a continuation of a Distributed Denial of Service, where a server or computer is attacked with bombarded shipment data in a very large size of many computers simultaneously. As a result the computer is difficult to access or damage to hardware not being able to accommodate very large data items.

 
Exploit
That is an application that tries to find and attack the weaknesses of the system to gain access to or for the purpose of infecting the system or computer.

 
Fake Antivirus
The way it works is by making as if a computer virus and suggest to buy anti-virus to overcome the virus.

 
Hoax
That is plain hoax spread through email or website. The effect is a panic or a lot of readers who were deceived. Another result is burdensome because of the Internet network of hoax chain messages are delivered to another person.

 
Keylogger
It is one threat that is dangerous. Keylogger will record that entered through the keyboard input to be stored or sent to someone who normally used for purposes that are not good. This is in particular to watch out for when you enter the password in public places like cafes. Password that you entered via the keyboard can be known and may be used for purposes that are not good.
One way to avoid a keylogger is to use On Screen Keyboard now must enter the password. On Screen Keyboard can be run from the Windows programs that are on Programs | Accessories | Accessbility or by typing in "OSK" from Start | Run on Windows Operating System.

 
Malware
Usually found on the bootsector on the disk, then change the course of the first run. Systems that are usually affected first is the Operating System. Infections in Operating System makes it easier malware to spread themselves or spread the virus on storage media such as CD ROM or Flash Disk.

 
Phishing
Is a form of fraud on the internet by making someone would provide important information that is not entitled to know. For example, by creating a website similar to a bank website. A victim does not realize he had been deceived and then enter the password that setealh known by the manufacturer can be used to deplete savings victim.

 
Rootkit
That is a program that aims to hide other programs running. Usually used to spread malware, virus, or keylogger.

 
Spam
Mean an unexpected email. Usually an email advertisement or a teaser for a person visiting a particular website which is actually a phishing or to disseminate malware. Messages can be sent in large quantities, so spend time to remove them.

 
Spyware
Is a program that works to spy on users with the purpose of obtaining critical information such as credit card numbers, PINs or passwords that can harm the victim because the leaking of such information.

 
Trojan
Acting as if he dalah good program that can be used to help users work. But, actually in it there are functions that endanger the overall system or to steal confidential information. Trojans easily spread to other computers.

 
Worm
Is malware that can multiply and then sends copies itself over a network without having a specific activity performed by users. The worm can be dangerous because it can become an entry point for viruses, malware or other destructive programs.

Microsoft: Do not Press the F1 Currently Browsing

Microsoft found a weakness in software. In order to prevent this vulnerability exploited, the Redmond giant was also recommends users not to press F1 while browsing the web.
As quoted from Microsoft Security Advisory, Wednesday (3/3/2010), a weakness has been discovered in VBScript. Strictly speaking, this weakness will affect computer running Windows XP and Internet Explorer browser (IE).
This weakness could be exploited when a user presses the F1 key. Buttons are usually used to call the help function (Help menu) in Windows applications.
"If a malicious site displays the Dialog Box specially made and the user presses F1, a malicious code can run on a user's computer in accordance with the authority of the user," according to a warning from Microsoft.
Well, Microsoft offered a few ways to prevent this weakness to attack your computer:

    
* Do not press F1 when prompted by a particular site
    
* Turn off access to the Windows Help
    
* Change the rules of the IE security to 'High' to block ActiveX
    
* Set IE for giving warnings when trying to run ActiveX

Once again, this vulnerability affects computers running Internet Explorer on Microsoft Windows XP operating system. User's operating system or software other browsers will not be affected.

4 Got Cracks iPhone to Access Phone

A crack was detected on the iPhone 4. This gap is known allows anyone to gain access to phone functions without having to enter a passcode.
Cracks that had tried Ben Grubb and the team from the Sydney Morning Herald that involves only a few buttons on the screen and physical buttons for accessing phone.
"With this method, we can make the iPhone 4 phone calls and send emails from your contacts list. All this is done without entering a PIN number," Grubb wrote, as quoted on Wednesday (10/27/2010).
Grubb and his team conducted the same experiment iPhone 3G. As a result, the previous version of the iPhone is also known to have the same gap. In fact, the iPhone 3G at first sight seem not vulnerable at all.
Some websites mentioned, the latest software version for the iPhone is currently available for software developers as IOS 4.2 beta, reportedly will be facing this method.
When released in November, this software will patch the gap. That means users can not break the security of the iPhone 4 in this way. There has been no official statement from Apple regarding this.
Apple itself seems to have not shown an indication of whether to fix this problem before the official release IOS 4.2. Of course this is in the spotlight because consumers look at one example, other companies like Microsoft for example, usually hastily issued a software fix to patch the crack that was detected remedy rather than wait until the release of new software

Download Google Chrome 7.0 Offline Installer

After last month has released Google Chrome Chrome 6.0, this time one browser it has released the latest version of Google Chrome 7.0 Stable. In the 6.0 version of Google Chrome did a lot of changes to the side of the interface (interface), as in the Address bar no longer displays the http:// at the website address and the loss of bookmarks button in the address bar.
As I quoted from the Google Blog Chrome, the Google Chrome 7.0 is more focused on a few bug fixes. Also, added also support for AppleScript in Mac OS X to implement HTML 5. Similarly, block site feature, the Google Chrome 7.0, you can block sites by using a dialog box.
To try out Google's new Chrome you can update Google Chrome directly from the browser (see How to Update Google Chrome) or to download Google Chrome Offline Installer 7.0 and install it offline.


Download Chrome Offline Installer 7.0