Laptop theft can affect users in more than one way. Not only do you lose your (undoubtedly not cheap) portable computer, you also lose all of the data on it. Of course, backing up ensures that it's not actually lost to you, but what about the person who has the laptop? Your electronic tax returns, embarrassing videos of yourself singing and dancing to N'Sync songs, and salacious e-mails are all somewhere out there, out of your control. (I once came into the possession of a laptop that was lost at O'Hare and never claimed, and found all sorts of e-mails on it from the owner who apparently cheated on his wife whenever he traveled. True story.)
Intel hopes to reduce that level of embarrassment (and more importantly, identity theft) by introducing Intel Anti-Theft Technology (ATT) later this year. The technology would involve placing a chip in the machine that would prevent it from booting without the owner's permission, Intel Mobility Group chief Dadi Perlmutter told The Register, although he declined to go into much more detail. He also indicated that ATT might one day incorporate tracking technology so that users might eventually be able to get their hardware back.
Intel isn't working on this initiative alone, though. In fact, a number of third parties announced today that they were partnering up with Intel to support ATT, such as Absolute Software Corporation (creators of firmware-based data protection/tracking solutions), BIOS maker Phoenix, and Utimaco (a data security company), to name a few. Intel also says that McAfee is on board, as well as manufacturers like Lenovo and Fujitsu.
ATT differs from current disk encryption technology because it would render the laptop useless, even if the hard drive is replaced. While this may not help the victim get the laptop back (unless it involves the aforementioned tracking technology), if widely adopted, ATT could deter thieves from stealing laptops in the first place if all they would end up with is an inoperable chunk of plastic and metal. Of course, if users want their data to be secure and for the laptop to be unbootable, it's probably wise to employ both ATT and some sort of disk encryption technology, in case the hard drive is removed and placed in another machine.
We (and the Register) don't expect to see ATT available to consumers soon, though. Perlmutter apparently said that it won't be available until at least the fourth quarter of the year, and it will take longer than that for manufacturers to incorporate it into their products. Still, as laptop sales increase, laptop theft is likely to as well. If the technology works well, then hopefully thieves will eventually learn to look for other, more attractive targets.
Thursday, October 23, 2008
How to track and recover stolen laptops .
Track and recover stolen laptops with LoJack for Laptops, Computrace, GadgetTrak and Undercover.
I hadn't heard of Computrace / Absolute until about two weeks ago, when we found two computers at my office talking to "search.namequery.com" several times a second. What I find is interesting: A program that installs without my permission or knowledge, takes orders from a 3rd party (up to and including "wipe the hard drive"), and actively resists removal.
One computer was brand-new (MPC/Gateway M685), the other just over a year old (MPC/Gateway E475). The first one they claim was "accidentally" activated at the factory, the second got a motherboard replacement that had this little program "activated" from its prior owner.
The sales rep at MPC/Gateway got the Absolute/Computrace rep on the phone and they both claim that it isn't a virus. Okay, fine, it doesn't self-replicate. Seems to fit darn near every other part of the definition! Their tech-support guy ordered the two computers to disable their BIOS component and uninstall, which THEY DID! The files in C:\Windows\System32 vanished before my eyes.
They were back the next day.
Gateway/MPC doesn't seem to understand my frustration. We spend so much time and money securing our computers and making sure they run only the software we WANT them to run. Now you want me to feel safe with a BIOS-level program that copies itself to FAT32/NTFS partitions and tricks Windows OSes into executing it? This same program that calls a 3rd party and requests instructions? I know of only three instructions it can accept, but what if there are others? ("Stolen, check in every 15 minutes", "Stolen, wipe hard drive", "Disable and uninstall" we know of)
I asked how they secure the disk-wiping function and was not impressed with the answer. They use an RSA token to verify that the right customer called in. I said 'Ok, what about the link to the computer? Is it signed or encrypted?' No answer, they just went back to the RSA token.
Heck, we have BlackBerries that can wipe themselves on remote command but RIM makes a big deal of how the communications are encrypted between the BB and my server. I know that J. Random Cracker isn't going to trick my BB into nuking itself. But what if he spoofs "search.namequery.com" and returns the code for "Nuke HD"? Will their little 200kb program accept the order?
I read that someone found and disabled Computrace/Absolute's BIOS code in a firmware dump and then re-flashed his machine. If I can't pull that off with Gateway/MPC I will have to recommend that we find a vendor that does NOT pre-infect the computers we purchase.
============================
The real Lojack system, for cars, predates the Internet and GPS. It's pretty good. About 90% of Lojack-equipped cars are recovered when stolen. When you buy Lojack, an installer comes out and installs a little box somewhere on your car. You don't know where, and they have many alternative locations. It gets power from the car, so it keeps itself charged.
The unit finds an FM broadcast station with the Lojack subcarrier and listens for a message with its serial number. If your car is stolen in an area with Lojack coverage (which includes most major US cities), a police stolen car report is copied to Lojack's computers, which then tell the subcarrier transmitter at the broadcast stations to start broadcasting messages with the unit's serial number. The unit in the car then starts emitting a beacon signal.
Lojack has good integration with big-city police departments. They equip police cars with Lojack receivers at Lojack's expense. Any Lojack receiver that's emitting turns on indicators in police cars, showing direction and approximate range. When you see a police car with four antennas in a square on the roof, that car has a Lojack receiver.
In Los Angeles, the LAPD's air force, both rotary and fixed-wing, has Lojack receivers. This has resulted in some dramatic stolen car recoveries. [wsati.org] Cops like the system, because not only do they get cars back, they often find someone they want driving the stolen car.
But "Lojack for Laptops" doesn't use that system. It just reports IP addresses when the unit connects to the Internet. A company called Absolute Software seems to have just licensed the Lojack name; it's apparently not part of Lojack Corporation at all.
=============================
I hadn't heard of Computrace / Absolute until about two weeks ago, when we found two computers at my office talking to "search.namequery.com" several times a second. What I find is interesting: A program that installs without my permission or knowledge, takes orders from a 3rd party (up to and including "wipe the hard drive"), and actively resists removal.
One computer was brand-new (MPC/Gateway M685), the other just over a year old (MPC/Gateway E475). The first one they claim was "accidentally" activated at the factory, the second got a motherboard replacement that had this little program "activated" from its prior owner.
The sales rep at MPC/Gateway got the Absolute/Computrace rep on the phone and they both claim that it isn't a virus. Okay, fine, it doesn't self-replicate. Seems to fit darn near every other part of the definition! Their tech-support guy ordered the two computers to disable their BIOS component and uninstall, which THEY DID! The files in C:\Windows\System32 vanished before my eyes.
They were back the next day.
Gateway/MPC doesn't seem to understand my frustration. We spend so much time and money securing our computers and making sure they run only the software we WANT them to run. Now you want me to feel safe with a BIOS-level program that copies itself to FAT32/NTFS partitions and tricks Windows OSes into executing it? This same program that calls a 3rd party and requests instructions? I know of only three instructions it can accept, but what if there are others? ("Stolen, check in every 15 minutes", "Stolen, wipe hard drive", "Disable and uninstall" we know of)
I asked how they secure the disk-wiping function and was not impressed with the answer. They use an RSA token to verify that the right customer called in. I said 'Ok, what about the link to the computer? Is it signed or encrypted?' No answer, they just went back to the RSA token.
Heck, we have BlackBerries that can wipe themselves on remote command but RIM makes a big deal of how the communications are encrypted between the BB and my server. I know that J. Random Cracker isn't going to trick my BB into nuking itself. But what if he spoofs "search.namequery.com" and returns the code for "Nuke HD"? Will their little 200kb program accept the order?
I read that someone found and disabled Computrace/Absolute's BIOS code in a firmware dump and then re-flashed his machine. If I can't pull that off with Gateway/MPC I will have to recommend that we find a vendor that does NOT pre-infect the computers we purchase.
============================
The real Lojack system, for cars, predates the Internet and GPS. It's pretty good. About 90% of Lojack-equipped cars are recovered when stolen. When you buy Lojack, an installer comes out and installs a little box somewhere on your car. You don't know where, and they have many alternative locations. It gets power from the car, so it keeps itself charged.
The unit finds an FM broadcast station with the Lojack subcarrier and listens for a message with its serial number. If your car is stolen in an area with Lojack coverage (which includes most major US cities), a police stolen car report is copied to Lojack's computers, which then tell the subcarrier transmitter at the broadcast stations to start broadcasting messages with the unit's serial number. The unit in the car then starts emitting a beacon signal.
Lojack has good integration with big-city police departments. They equip police cars with Lojack receivers at Lojack's expense. Any Lojack receiver that's emitting turns on indicators in police cars, showing direction and approximate range. When you see a police car with four antennas in a square on the roof, that car has a Lojack receiver.
In Los Angeles, the LAPD's air force, both rotary and fixed-wing, has Lojack receivers. This has resulted in some dramatic stolen car recoveries. [wsati.org] Cops like the system, because not only do they get cars back, they often find someone they want driving the stolen car.
But "Lojack for Laptops" doesn't use that system. It just reports IP addresses when the unit connects to the Internet. A company called Absolute Software seems to have just licensed the Lojack name; it's apparently not part of Lojack Corporation at all.
=============================
What Are the Best Laptop Theft Recovery Measures?
The old standby goes -- there's no one security measure that's perfect, but you can make it a lot easier.
The first and most obvious layer is physical access. Don't leave your laptop visible in your car when you park. Lock your office doors. Don't leave it at a coffee house when you go to the bathroom.
The second is physical security. Invest in a laptop leash and chain it down if you work in a shared office space environment.
The third layer is physical deterrence. Customize the heck out of your computer. A big engraved security mark (be it your driver's license #, your name, your cell #, your email address, whatever) will turn off thieves. Same if you've got anything else that's obviously unique and can't easily be removed.
The fourth layer is electronic deterrence. A boot password and a screensaver password will deter unskilled theives. There are plenty of skilled thieves who plan to reformat the drives, but a few will be deterred by not being able to sell the laptop on the corner without a password. (If you don't believe me, hang out in midtown NYC long enough and you can get offers to sell hot laptops in the $100 range).
The fifth layer is tracking. Things like LoJack and all the other services. If they boot your laptop it'll contact the network and you can at least have a shot at getting it back. (Note, some of these are not compatible with a boot password). Of course, record your Windows serial # (if you run Windows) and your Dell quick service code (if you use a Dell) or the equivalent for your system. These are uploaded.
The sixth layer is luck. Sometimes people catch theives by webcam, sometimes by stupid emails, sometimes by pure random encouters. You gotta get lucky.
No one of these layers is sufficient and it's silly to talk about LoJack for Laptops if you leave your laptop sitting in the open for somebody to grab it. LoJack is most useful to break open crime rings, not to actually get your laptop back -- by the time the police get around to subpoenaing the ISPs your laptop is gone, but the thieves might not be. I run it, but I don't expect it to save my butt.
The first and most obvious layer is physical access. Don't leave your laptop visible in your car when you park. Lock your office doors. Don't leave it at a coffee house when you go to the bathroom.
The second is physical security. Invest in a laptop leash and chain it down if you work in a shared office space environment.
The third layer is physical deterrence. Customize the heck out of your computer. A big engraved security mark (be it your driver's license #, your name, your cell #, your email address, whatever) will turn off thieves. Same if you've got anything else that's obviously unique and can't easily be removed.
The fourth layer is electronic deterrence. A boot password and a screensaver password will deter unskilled theives. There are plenty of skilled thieves who plan to reformat the drives, but a few will be deterred by not being able to sell the laptop on the corner without a password. (If you don't believe me, hang out in midtown NYC long enough and you can get offers to sell hot laptops in the $100 range).
The fifth layer is tracking. Things like LoJack and all the other services. If they boot your laptop it'll contact the network and you can at least have a shot at getting it back. (Note, some of these are not compatible with a boot password). Of course, record your Windows serial # (if you run Windows) and your Dell quick service code (if you use a Dell) or the equivalent for your system. These are uploaded.
The sixth layer is luck. Sometimes people catch theives by webcam, sometimes by stupid emails, sometimes by pure random encouters. You gotta get lucky.
No one of these layers is sufficient and it's silly to talk about LoJack for Laptops if you leave your laptop sitting in the open for somebody to grab it. LoJack is most useful to break open crime rings, not to actually get your laptop back -- by the time the police get around to subpoenaing the ISPs your laptop is gone, but the thieves might not be. I run it, but I don't expect it to save my butt.
The Adeona system was designed to protect Notebook against the common thief
What alternatives exist?
There are numerous commercial services offering proprietary (non-Open Source) device location tracking systems. Most offer little to no privacy guarantees, and the rest force a user to entrust privacy to the company involved.
What makes Adeona unique?
The Adeona system is unique in its ability to offer reliable location tracking while simultaneously ensuring that no third parties can abuse the system to track a device's legitimate users. Adeona is also open source.
What is the state of the Adeona code?
The current version of Adeona is 0.2.1. This beta version is a mostly re-written version of the research prototypes discussed in the academic paper. We've performed moderately extensive testing on Linux, Windows XP, and Mac OS X. Please report any bugs or issues.
Is Adeona only useful for laptops? What about desktops, iPhones, etc.?
Adeona can also be installed on desktop computers. Furthermore, you can also install it on your servers in case someone breaks into your server room and steals them. Currently we do not support mobile devices such as the iPhone, but we are looking into providing support here, as well.
How can we trust the security and privacy of Adeona?
Our techniques for ensuring security and privacy are not secret: the source code is available. Moreover, the system is also designed as part of a peer-reviewed academic paper that appeared at the 2008 USENIX Security Symposium, one of the top venues for computer security research publications. Adeona is designed to protect user location privacy against powerful adversaries: a malicious party who has control over the entire distributed remote storage infrastructure, a malicious party who has physical access to the device (and wants to learn prior locations using Adeona), and even collusions between the two. That said, in order to maintain efficiency and usefulness, Adeona does not consider some threats. For example we cannot ensure privacy in the extreme case that ISPs collude to reveal a device's locations. More details about our threat models are given in the paper. Adeona is, however, still under development and we welcome and encourage feedback and suggestions.
How do I install?
See the download instructions.
Can I install this on my girlfriend or boyfriend's computer and track her or him, and perhaps get pictures of them while they're doing certain activites?
Yes. Like all technologies, Adeona has the potential for being abused. However, if you are malicious enough to want to do the above, there is probably other software available out there more suited for your needs. (We won't provide links to these more malicious tools.)
How do I know if the Adeona client is running?
On Mac OS X or Linux, type "ps aux | grep adeona" from a command prompt. On Windows XP, the task manager will show adeona-client.exe as a process, if it is running. On Windows Vista, the task manager will show AdeonaClientService as a service, if it is running.
I run Zone Alarm on Windows or Little Snitch on OS X. What type of network connections should I see coming from Adeona?
The Adeona client requires Internet access, and so must not be blocked by Zone Alarm or Little Snitch to function properly. Allowing adeona-client.exe Internet access should typically suffice. The client uses this access to make several types of connections: HTTP requests to retrieve gateways for OpenDHT and for determining the current External IP address of the system, UDP connections for performing pings and traceroutes, RPC connections to perform inserts into (or retrieves from) the DHT (remote storage).
I'm behind a corporate firewall, will Adeona work? What ports need to be open?
Adeona will work as long as it is allowed connections on port 80 (HTTP) and port 5852 (for OpenDHT). Note that these are also required to be open for retrieval. Additionally, if one wants nearby routers reported, then UDP packets should not be dropped (this allows performing traceroutes).
I use a filesystem backup utility. How does this affect my Adeona client state ( .cst ) file?
If your filesystem is backed up, then an old copy of your .cst file may be archived as part of the backup. If someone is able to obtain the backup, then they would be able to track the locations you visit after the backup was made. However, the privacy of locations you visited before the backup was made would not be compromised. Like all backup regimes, we recommend encrypting your backups.
How often does the Adeona client send location updates?
The Adeona client sends updates at randomly determined times, to help prevent timing attacks. Currently, the default option is set so that the client sends an update on average every 30 minutes. Note that "on average" means that sometimes the client will send two updates within just a few minutes, while other times the gap might be larger.
How long do these location updates stay in OpenDHT?
OpenDHT allows one to store data for a maximum of 1 week i.e. 604,800 seconds. We have configured Adeona to do so.
How do I remove Adeona?
See the uninstall section of the documentation.
Wait a second --- why have you made it easy to uninstall the Adeona client?
This is the first public distribution for deployment. For this deployment we have chosen to make Adeona easy to uninstall because we wish to provide flexibility to you (the user). Pending your feedback, future versions of Adeona could incorporate mechanisms that will make it difficult to remove.
What if a thief removes the software, reinstalls the OS or doesn't connect to the Internet?
A motivated and sufficiently equipped or knowledgeable thief can always prevent Internet device tracking: he or she can erase software on the device, deny Internet access, or even destroy the device. For example, Adeona currently has no mechanisms for attempting to survive a disk wipe.
We point out that we do not believe this renders Adeona (and other location-tracking systems) useless. The Adeona system was designed to protect against the common thief -- for example, a thief that opportunistically decides to swipe your laptop from a coffee shop or your dorm room, and then wants to use it or perhaps sell it on online. Such thieves will often not be technologically savvy and will not know to remove Adeona from your system. While device tracking will not always work, systems like Adeona can work, and it is against the common-case thief that we feel tracking systems can add significant value.
How do I do a retrieve?
See the retrieval section ( complete with screenshots ) of the documentation.
Can I perform retrievals from other computers?
Given the adeona-retrievecredentials.ost file generated during installation, one can perform tracking from any other computer that has the retrieval tools installed. For example, if you install the tracking client on your laptop and back up your credentials to a desktop, then you can perform retrieval from the desktop. This does not require running the tracking client on the desktop. See installing retrieval tools.
What information is included in a location update?
Currently, the location-finding component of Adeona includes the following information in its updates:
Internal IP address
This is your Internet location as reported by the operating system.
External IP address
This is your Internet location obtained by asking a web server like checkip.dyndns.org.
Nearby routers
These are network routers obtained by doing a traceroute to randomly selected PlanetLab computers. Usually, the names of network routers you are using can give a clue about your geographical location.
Access point
This is the name of the wireless hotspot you are connected to, can also give a clue about your location. Note that the Windows version simply reads a registry key that might contain stale information or no information on the current access point (for example, if one is not using the Windows-provided wireless management tools.)
Photos (Macs only)
The location-finding component takes a picture using isightcapture before sending an update to OpenDHT. If a thief was using the laptop, you could get a photo of them.
What else can I do to help make sure I can recover my lost or stolen laptop?
You should also register your laptop at JustStolen.net. Adeona can help you find the location of your laptop while it is in the thief's possession. But, if the police recover your laptop through other means (e.g., the battery was dead and the thief abandoned it), the police will be able to use JustStolen.net's database to determine that the laptop belongs to you. (You can also register your other important possessions, ranging from bicycles to cameras, at JustStolen.net.)
How do you take the photos on Macs?
We use the freeware isightcapture utility by Axel Bauer: http://www.intergalactic.de/pages/iSight.html.
If I install the Apple OS X version that takes pictures with the built-in iSight camera, will the green light on the camera turn on when the pictures are being taken?
Yes it will. While a thief could potentially notice this, we ourselves often did not. Please note that there is a Mac OS X package of Adeona with photos disabled here.
Is it safe to do retrievals even when my device is still in my possession?
A user can test retrieval at any time, however the location privacy of any retrieved updates cannot be completely ensured. However, the privacy guarantees for any previous (not retrieved) locations and all future locations remains. See the retrieval instructions.
What should I do once I do a retrieve and find the location (IP address) of my laptop or a picture of a thief?
Do not attempt to recover your lost or stolen laptop yourself. If you believe your laptop has been stolen, contact the appropriate law enforcement agency. You may also present them with the data you retrieved via Adeona.
I want to know the geographical locations visited by my laptop. How can I do this?
First, see the answer to the previous question. The current version of Adeona does not provide geolocationing (translating network coordinates into geographical coordinates). However, free geolocationing database services exist. For example, try Wigle (for wireless access points) or the Maxmind GeoIP demo (for IP addresses). We cannot vouch for the accuracy of such services.
What if OpenDHT goes down?
The remote storage facility is an essential component of any device tracking system. It is where the device's location information is kept. Our implementation of Adeona relies on OpenDHT to store a device's location updates. The best way to ensure the continued usefulness of OpenDHT is to support the OpenDHT project. We have engineered Adeona to deal with temporary connectivity issues when storing or retrieving data from OpenDHT.
Could a company adopt your techniques?
We believe that privacy is important and would love to see companies adopting our privacy-preservation techniques. Nothing prevents them from doing so, though they should still contact the University of Washington for licensing issues.
Why is my password being passed as a command line parameter to the initialize and retrieval programs?
In the Windows and OS X installer and recovery GUIs we have the user, by default, specify their password within a dialog box. This password is then passed as a command-line parameter to the appropriate Adeona executable. This could mean, for some system configurations, that the password might show up in the clear in a system log, when running `ps', etc. We recognize this is not a best practice, security-wise, however we made this the default because of the significant usability benefits for those not comfortable with command lines and the envisioned single-user machine common-case usage scenario.
There is a simple work-around. For the installation process, enter some irrelevant password (e.g. "password") into the appropriate password dialog boxes. This will cause adeona to be initialized with this password. The installation process is set to run the client so follow the instructions in the Readme.txt file on how to stop it. Then, from the Adeona installation directory, run the command
adeona-init.exe -r resources/ -l logs/
This will prompt you, within the command shell, to choose a password. Here you've simply re-initialized Adeona with a fresh set of credentials, now protected by the new password. Now, restart the client and make sure to copy the new adeona-retrievecredentials.ost file to a safe location (e.g., email it to yourself, place it on a USB thumbstick, or even print it out).
Windows users should use the cmd.exe terminal to run the command above. You can also just navigate to the directory where you installed Adeona and ( 1 ) click on StopAdeona.bat then, ( 2 ) click on InitAdeona.bat.
For recovery, just enter an incorrect password in the dialog box (e.g. "password"). The recovery command shell window that pops up will note the incorrect password, and prompt you to try again.
Are there any things you might change in the Adeona system, perhaps for future versions?
Yes. Please see our research paper for more information. One example avenue for improvement might be to create a cleaner interface between Adeona and the DHT (which is used as a bulletin board to store the location updates). Currently, because PlanetLab nodes (which house OpenDHT) are not always guaranteed to be stable, the Adeona client will download a fresh set of OpenDHT nodes from http://adeona.cs.washington.edu/gateways.adeona at every update interval.
What else could Adeona be made to do in the future?
The Adeona system is designed with extensibility in mind. We envision that it would be straightforward to add functionality to send authenticated commands back to the laptop (e.g., so as to delete sensitive data). Here the remote storage service, OpenDHT, would act as a private, anonymous bulletin board for relaying communication between the device and its owner. The Adeona client could also be engineered to be significantly more resistant to thieves attempting to disable it, via kernel-level support or even hardware support.
What software tools did you use to create the Adeona OS X and Windows packages?
In preparing the Adeona OS X and Windows packages, we made use of the following additional packages. We are grateful to them and wish to acknowledge them here.
Cygwin is used to build the Windows version of Adeona. The cygwin1.dll, cygcrypto-0.9.8.dll and the cygrunsrv.exe program are included in the Adeona Windows package.
NSIS or the Nullsoft Scriptable Install System is used to create the Windows installer of Adeona and the GUI interface for performing retrievals.
Packagemaker from Apple is used to create the OS X installer of Adeona.
We use the freeware isightcapture utility by Axel Bauer for taking pictures on OS X.
There are numerous commercial services offering proprietary (non-Open Source) device location tracking systems. Most offer little to no privacy guarantees, and the rest force a user to entrust privacy to the company involved.
What makes Adeona unique?
The Adeona system is unique in its ability to offer reliable location tracking while simultaneously ensuring that no third parties can abuse the system to track a device's legitimate users. Adeona is also open source.
What is the state of the Adeona code?
The current version of Adeona is 0.2.1. This beta version is a mostly re-written version of the research prototypes discussed in the academic paper. We've performed moderately extensive testing on Linux, Windows XP, and Mac OS X. Please report any bugs or issues.
Is Adeona only useful for laptops? What about desktops, iPhones, etc.?
Adeona can also be installed on desktop computers. Furthermore, you can also install it on your servers in case someone breaks into your server room and steals them. Currently we do not support mobile devices such as the iPhone, but we are looking into providing support here, as well.
How can we trust the security and privacy of Adeona?
Our techniques for ensuring security and privacy are not secret: the source code is available. Moreover, the system is also designed as part of a peer-reviewed academic paper that appeared at the 2008 USENIX Security Symposium, one of the top venues for computer security research publications. Adeona is designed to protect user location privacy against powerful adversaries: a malicious party who has control over the entire distributed remote storage infrastructure, a malicious party who has physical access to the device (and wants to learn prior locations using Adeona), and even collusions between the two. That said, in order to maintain efficiency and usefulness, Adeona does not consider some threats. For example we cannot ensure privacy in the extreme case that ISPs collude to reveal a device's locations. More details about our threat models are given in the paper. Adeona is, however, still under development and we welcome and encourage feedback and suggestions.
How do I install?
See the download instructions.
Can I install this on my girlfriend or boyfriend's computer and track her or him, and perhaps get pictures of them while they're doing certain activites?
Yes. Like all technologies, Adeona has the potential for being abused. However, if you are malicious enough to want to do the above, there is probably other software available out there more suited for your needs. (We won't provide links to these more malicious tools.)
How do I know if the Adeona client is running?
On Mac OS X or Linux, type "ps aux | grep adeona" from a command prompt. On Windows XP, the task manager will show adeona-client.exe as a process, if it is running. On Windows Vista, the task manager will show AdeonaClientService as a service, if it is running.
I run Zone Alarm on Windows or Little Snitch on OS X. What type of network connections should I see coming from Adeona?
The Adeona client requires Internet access, and so must not be blocked by Zone Alarm or Little Snitch to function properly. Allowing adeona-client.exe Internet access should typically suffice. The client uses this access to make several types of connections: HTTP requests to retrieve gateways for OpenDHT and for determining the current External IP address of the system, UDP connections for performing pings and traceroutes, RPC connections to perform inserts into (or retrieves from) the DHT (remote storage).
I'm behind a corporate firewall, will Adeona work? What ports need to be open?
Adeona will work as long as it is allowed connections on port 80 (HTTP) and port 5852 (for OpenDHT). Note that these are also required to be open for retrieval. Additionally, if one wants nearby routers reported, then UDP packets should not be dropped (this allows performing traceroutes).
I use a filesystem backup utility. How does this affect my Adeona client state ( .cst ) file?
If your filesystem is backed up, then an old copy of your .cst file may be archived as part of the backup. If someone is able to obtain the backup, then they would be able to track the locations you visit after the backup was made. However, the privacy of locations you visited before the backup was made would not be compromised. Like all backup regimes, we recommend encrypting your backups.
How often does the Adeona client send location updates?
The Adeona client sends updates at randomly determined times, to help prevent timing attacks. Currently, the default option is set so that the client sends an update on average every 30 minutes. Note that "on average" means that sometimes the client will send two updates within just a few minutes, while other times the gap might be larger.
How long do these location updates stay in OpenDHT?
OpenDHT allows one to store data for a maximum of 1 week i.e. 604,800 seconds. We have configured Adeona to do so.
How do I remove Adeona?
See the uninstall section of the documentation.
Wait a second --- why have you made it easy to uninstall the Adeona client?
This is the first public distribution for deployment. For this deployment we have chosen to make Adeona easy to uninstall because we wish to provide flexibility to you (the user). Pending your feedback, future versions of Adeona could incorporate mechanisms that will make it difficult to remove.
What if a thief removes the software, reinstalls the OS or doesn't connect to the Internet?
A motivated and sufficiently equipped or knowledgeable thief can always prevent Internet device tracking: he or she can erase software on the device, deny Internet access, or even destroy the device. For example, Adeona currently has no mechanisms for attempting to survive a disk wipe.
We point out that we do not believe this renders Adeona (and other location-tracking systems) useless. The Adeona system was designed to protect against the common thief -- for example, a thief that opportunistically decides to swipe your laptop from a coffee shop or your dorm room, and then wants to use it or perhaps sell it on online. Such thieves will often not be technologically savvy and will not know to remove Adeona from your system. While device tracking will not always work, systems like Adeona can work, and it is against the common-case thief that we feel tracking systems can add significant value.
How do I do a retrieve?
See the retrieval section ( complete with screenshots ) of the documentation.
Can I perform retrievals from other computers?
Given the adeona-retrievecredentials.ost file generated during installation, one can perform tracking from any other computer that has the retrieval tools installed. For example, if you install the tracking client on your laptop and back up your credentials to a desktop, then you can perform retrieval from the desktop. This does not require running the tracking client on the desktop. See installing retrieval tools.
What information is included in a location update?
Currently, the location-finding component of Adeona includes the following information in its updates:
Internal IP address
This is your Internet location as reported by the operating system.
External IP address
This is your Internet location obtained by asking a web server like checkip.dyndns.org.
Nearby routers
These are network routers obtained by doing a traceroute to randomly selected PlanetLab computers. Usually, the names of network routers you are using can give a clue about your geographical location.
Access point
This is the name of the wireless hotspot you are connected to, can also give a clue about your location. Note that the Windows version simply reads a registry key that might contain stale information or no information on the current access point (for example, if one is not using the Windows-provided wireless management tools.)
Photos (Macs only)
The location-finding component takes a picture using isightcapture before sending an update to OpenDHT. If a thief was using the laptop, you could get a photo of them.
What else can I do to help make sure I can recover my lost or stolen laptop?
You should also register your laptop at JustStolen.net. Adeona can help you find the location of your laptop while it is in the thief's possession. But, if the police recover your laptop through other means (e.g., the battery was dead and the thief abandoned it), the police will be able to use JustStolen.net's database to determine that the laptop belongs to you. (You can also register your other important possessions, ranging from bicycles to cameras, at JustStolen.net.)
How do you take the photos on Macs?
We use the freeware isightcapture utility by Axel Bauer: http://www.intergalactic.de/pages/iSight.html.
If I install the Apple OS X version that takes pictures with the built-in iSight camera, will the green light on the camera turn on when the pictures are being taken?
Yes it will. While a thief could potentially notice this, we ourselves often did not. Please note that there is a Mac OS X package of Adeona with photos disabled here.
Is it safe to do retrievals even when my device is still in my possession?
A user can test retrieval at any time, however the location privacy of any retrieved updates cannot be completely ensured. However, the privacy guarantees for any previous (not retrieved) locations and all future locations remains. See the retrieval instructions.
What should I do once I do a retrieve and find the location (IP address) of my laptop or a picture of a thief?
Do not attempt to recover your lost or stolen laptop yourself. If you believe your laptop has been stolen, contact the appropriate law enforcement agency. You may also present them with the data you retrieved via Adeona.
I want to know the geographical locations visited by my laptop. How can I do this?
First, see the answer to the previous question. The current version of Adeona does not provide geolocationing (translating network coordinates into geographical coordinates). However, free geolocationing database services exist. For example, try Wigle (for wireless access points) or the Maxmind GeoIP demo (for IP addresses). We cannot vouch for the accuracy of such services.
What if OpenDHT goes down?
The remote storage facility is an essential component of any device tracking system. It is where the device's location information is kept. Our implementation of Adeona relies on OpenDHT to store a device's location updates. The best way to ensure the continued usefulness of OpenDHT is to support the OpenDHT project. We have engineered Adeona to deal with temporary connectivity issues when storing or retrieving data from OpenDHT.
Could a company adopt your techniques?
We believe that privacy is important and would love to see companies adopting our privacy-preservation techniques. Nothing prevents them from doing so, though they should still contact the University of Washington for licensing issues.
Why is my password being passed as a command line parameter to the initialize and retrieval programs?
In the Windows and OS X installer and recovery GUIs we have the user, by default, specify their password within a dialog box. This password is then passed as a command-line parameter to the appropriate Adeona executable. This could mean, for some system configurations, that the password might show up in the clear in a system log, when running `ps', etc. We recognize this is not a best practice, security-wise, however we made this the default because of the significant usability benefits for those not comfortable with command lines and the envisioned single-user machine common-case usage scenario.
There is a simple work-around. For the installation process, enter some irrelevant password (e.g. "password") into the appropriate password dialog boxes. This will cause adeona to be initialized with this password. The installation process is set to run the client so follow the instructions in the Readme.txt file on how to stop it. Then, from the Adeona installation directory, run the command
adeona-init.exe -r resources/ -l logs/
This will prompt you, within the command shell, to choose a password. Here you've simply re-initialized Adeona with a fresh set of credentials, now protected by the new password. Now, restart the client and make sure to copy the new adeona-retrievecredentials.ost file to a safe location (e.g., email it to yourself, place it on a USB thumbstick, or even print it out).
Windows users should use the cmd.exe terminal to run the command above. You can also just navigate to the directory where you installed Adeona and ( 1 ) click on StopAdeona.bat then, ( 2 ) click on InitAdeona.bat.
For recovery, just enter an incorrect password in the dialog box (e.g. "password"). The recovery command shell window that pops up will note the incorrect password, and prompt you to try again.
Are there any things you might change in the Adeona system, perhaps for future versions?
Yes. Please see our research paper for more information. One example avenue for improvement might be to create a cleaner interface between Adeona and the DHT (which is used as a bulletin board to store the location updates). Currently, because PlanetLab nodes (which house OpenDHT) are not always guaranteed to be stable, the Adeona client will download a fresh set of OpenDHT nodes from http://adeona.cs.washington.edu/gateways.adeona at every update interval.
What else could Adeona be made to do in the future?
The Adeona system is designed with extensibility in mind. We envision that it would be straightforward to add functionality to send authenticated commands back to the laptop (e.g., so as to delete sensitive data). Here the remote storage service, OpenDHT, would act as a private, anonymous bulletin board for relaying communication between the device and its owner. The Adeona client could also be engineered to be significantly more resistant to thieves attempting to disable it, via kernel-level support or even hardware support.
What software tools did you use to create the Adeona OS X and Windows packages?
In preparing the Adeona OS X and Windows packages, we made use of the following additional packages. We are grateful to them and wish to acknowledge them here.
Cygwin is used to build the Windows version of Adeona. The cygwin1.dll, cygcrypto-0.9.8.dll and the cygrunsrv.exe program are included in the Adeona Windows package.
NSIS or the Nullsoft Scriptable Install System is used to create the Windows installer of Adeona and the GUI interface for performing retrievals.
Packagemaker from Apple is used to create the OS X installer of Adeona.
We use the freeware isightcapture utility by Axel Bauer for taking pictures on OS X.
Wednesday, October 22, 2008
Protecting your notebook
Many of us have become so dependent on our laptops that we take them nearly everywhere. But what would happen if your notebook were stolen? In addition to the loss of the computer itself, there are two other concerns, the loss of your data and the accessibility of that data to whoever accesses your computer. What information would the thief be able to access? Credit-card numbers, bank account information, photos, music, passwords?
A laptop is stolen every minute in the United States, and most are never recovered. That's 700,000 per year! As you'd expect, they're most frequently taken from hotel rooms, college dorms, automobiles, airports and coffee shops. So what can you do to minimize a loss?
Back up your information
First, back up your important data. I've been using a service called BackUpRight. The San Diego company of the same name provides an automated backup service for both corporations and individuals. 5GB of backup is $10 per month, 20GB is $60 per month and 50GB is $100 per month. 5GB is usually sufficient enough for your files, e-mails and photos.
Just install the software on a PC or Mac, select the files you want to back up, and when you want it done. You'll never need to think about it; it's done automatically. It sends an e-mail message each time a backup is scheduled, letting you know whether it was successful. The service works on multiple computers, your data is protected off-site and only you have the ability to view it. There's a free trial available on the company's Web site, backupright.com.
Experts advise using a password to access your computer, but many dislike the extra delay at startup. A password can often be bypassed by moving the hard drive to another computer.
If you do use a password, select a word with at least eight characters and unusual symbols such as %, $, @ or ?. Use a word or phrase that's easy to remember. So instead of "sandiego," choose "$@ndie%o".
Also refrain from storing social security, credit-card numbers and passwords in your contact list. If you must do it, reverse the numbers and append them with superfluous numbers.
What's the best way to protect against the loss of your computer? Consider Absolute Software's LoJack for laptops. (The company licenses the LoJack name from the company that sells a tracking system for recovering stolen automobiles.) It costs $50 a year. (absolutesoftware.com).
If your notebook is stolen, LoJack will capture the IP address the next time the person goes online and will provide authorities with the information.
Once the software is installed in your PC or Mac, the notebook silently contacts Absolute's monitoring center whenever it's connected to the Internet.
Should your notebook ever be stolen, notify Absolute's recovery team by phone and file a report with your local police department. The service captures the IP address the next time your notebook goes online.
Absolute provides the IP data and other documentation to law enforcement, which uses it to obtain a search warrant to get the physical location from the service provider such as Cox or Time Warner.
How well does LoJack work? According to Absolute, it recovers three out of four stolen computers using its service. If you're one of the four it misses, the company will refund the cost of the software 30 days after the theft.
I spoke with Detective Fernando Ramirez of the San Diego police department, who has experience with a large number of notebook thefts. He's encountered two stolen notebooks that had LoJack software installed. In both of the cases, the computers were successfully recovered, but one case took 3 months and the other took almost two months.
Much of the delay was waiting for the subpoenaed information from the service provider after the warrant was served. A LoJack representative told me the company is constantly trying to shorten the time, and the company even pays fees to the provider if it can expedite delivery of the information.
So while LoJack is effective, don't expect to get your stolen notebook back right away. In the meantime, the thieves have had ample time to access your data. LoJack is also looking at additional services to retrieve your data and then erase it remotely.
In spite of the current limitations, LoJack is worthwhile and provides another layer of protection. And it helps law enforcement identify thieves.
There's also a low-tech method for recovery of lost notebooks and other items that relies on good Samaritans. It's from Boomerangit of San Leandro.
You purchase tamper-resistant serialized labels and stick them on your notebook or your other important items such as your cell phone or camera. A multipack costs $15 and contains two labels and two different size tags to protect four devices.
You register the items and your personal information at boomerangit.com. If the person who finds your lost product calls the phone number on the tag, Boomerangit will contact you. The service has 1 million users.
A laptop is stolen every minute in the United States, and most are never recovered. That's 700,000 per year! As you'd expect, they're most frequently taken from hotel rooms, college dorms, automobiles, airports and coffee shops. So what can you do to minimize a loss?
Back up your information
First, back up your important data. I've been using a service called BackUpRight. The San Diego company of the same name provides an automated backup service for both corporations and individuals. 5GB of backup is $10 per month, 20GB is $60 per month and 50GB is $100 per month. 5GB is usually sufficient enough for your files, e-mails and photos.
Just install the software on a PC or Mac, select the files you want to back up, and when you want it done. You'll never need to think about it; it's done automatically. It sends an e-mail message each time a backup is scheduled, letting you know whether it was successful. The service works on multiple computers, your data is protected off-site and only you have the ability to view it. There's a free trial available on the company's Web site, backupright.com.
Experts advise using a password to access your computer, but many dislike the extra delay at startup. A password can often be bypassed by moving the hard drive to another computer.
If you do use a password, select a word with at least eight characters and unusual symbols such as %, $, @ or ?. Use a word or phrase that's easy to remember. So instead of "sandiego," choose "$@ndie%o".
Also refrain from storing social security, credit-card numbers and passwords in your contact list. If you must do it, reverse the numbers and append them with superfluous numbers.
What's the best way to protect against the loss of your computer? Consider Absolute Software's LoJack for laptops. (The company licenses the LoJack name from the company that sells a tracking system for recovering stolen automobiles.) It costs $50 a year. (absolutesoftware.com).
If your notebook is stolen, LoJack will capture the IP address the next time the person goes online and will provide authorities with the information.
Once the software is installed in your PC or Mac, the notebook silently contacts Absolute's monitoring center whenever it's connected to the Internet.
Should your notebook ever be stolen, notify Absolute's recovery team by phone and file a report with your local police department. The service captures the IP address the next time your notebook goes online.
Absolute provides the IP data and other documentation to law enforcement, which uses it to obtain a search warrant to get the physical location from the service provider such as Cox or Time Warner.
How well does LoJack work? According to Absolute, it recovers three out of four stolen computers using its service. If you're one of the four it misses, the company will refund the cost of the software 30 days after the theft.
I spoke with Detective Fernando Ramirez of the San Diego police department, who has experience with a large number of notebook thefts. He's encountered two stolen notebooks that had LoJack software installed. In both of the cases, the computers were successfully recovered, but one case took 3 months and the other took almost two months.
Much of the delay was waiting for the subpoenaed information from the service provider after the warrant was served. A LoJack representative told me the company is constantly trying to shorten the time, and the company even pays fees to the provider if it can expedite delivery of the information.
So while LoJack is effective, don't expect to get your stolen notebook back right away. In the meantime, the thieves have had ample time to access your data. LoJack is also looking at additional services to retrieve your data and then erase it remotely.
In spite of the current limitations, LoJack is worthwhile and provides another layer of protection. And it helps law enforcement identify thieves.
There's also a low-tech method for recovery of lost notebooks and other items that relies on good Samaritans. It's from Boomerangit of San Leandro.
You purchase tamper-resistant serialized labels and stick them on your notebook or your other important items such as your cell phone or camera. A multipack costs $15 and contains two labels and two different size tags to protect four devices.
You register the items and your personal information at boomerangit.com. If the person who finds your lost product calls the phone number on the tag, Boomerangit will contact you. The service has 1 million users.
[How To] Chose a Laptop (2)
Laptop or the lap-top computer has been the everyday requirement professional in fact also the student. In the purchase laptop, we often very much were mesmerized by the price that was given that was increasingly cheap. There were several matters that must be considered by you before buying one notebook, namely the speed of the processor, the measurement laptop, VGA Card, the completeness of multimedia, the completeness feature the network, casing, harddisk, memory, and his software. And was not significantly cheap that his quality was good. For example plenty of shops, vendor that offered laptop with the cheap price, with the processor celeron, centrino 740.730, and centrino duo. Was based on the specification of the place of the speed, could be put in order celeron that had the speed and the achievement that were lowered compared with the processor pentium 4 other.
Although the speed that was offered high, for example celeron 2 gigahertz, stayed far his difference with pentium 4 2 gigahertz, because cache memory that was received inside celeron small revolving 128 to 512 family planning, possibly the processor pentium 3 with the speed 1,2 gigahertz or often also in mentioned with Tualatin could match or compete with celeron this. Because this celeron was offered with the price was very cheap. There were many opinions that said that Celeron did not lose compared with Pentium 4 if in-overclock, but must be remembered, that overclock increased hot the processor, that resulted in the age of the processor being shorter, and damage that happened in laptop more is difficult to be handled from PC normally.
The code chip to prosessor this was 450, 440, 430, 423, 420, 410, 390, 383, 380, 373, 370, 360J, 360, 353, 350J, 350, 340, 333, 330, 320, 310 Pentium 4 had the speed that was higher until reaching 1 cloud so as to be able to be used to multi threading (accessed more than one operation) the Weakness of this processor only did not support wireless connection. This problem could be overcome with equipped wireless connection card that his price was relatively cheap. The Prosessor code 552, 548, 538, 532, 518. Centrino Duo was what was fastest in the market at this time. From the name could be concluded that in this processor was gotten 2 processors centrino the solo. This meaning that the speed that was offered then twice the speed centrino. His price then began to be cheap because the production cost was cheaper was compared made two processors.
Cache memory him was then very big, that is 4 clouds. The other surplus was supportive the operation 64 bit where really was suitable to undertake Windows Vista that was the newest version from Windows.Version Windows Vista I was launched by Microsoft and still was free. The processor that a Centrino Duo level was AMD Turion 64 x 2. The Prosessor code: E6700,E6600, E6400,E6300. Big laptop for the personal use where someone more often spent time in the field of the measurement 10,11,12,14 more appropriate. The practical small measurement and was easy to be brought, but the price that was offered more expensive. For the use as the replacement PC/Desktop better used notebook 15 inch. and the price that was offered relative was covered.
Because laptop was work equipment of the field, casing was the main matter.. Laptop cheap often was offered with casing that was bad, so as after several times the use would the crack and broken. Pilihkan casing that had the mixture alloy/metal, titanium, or that have material ebonite was mixed with metal fiber, so as to be able to keep the collision. Notebook was long-term investment, if in the use 2-3 months have had problems, casing broke out, certainly will be very damaging you. The completeness feature the network laptop that was good minimal had more than one USB and support with USB 2,0, bluetooth, infrared, RJ-45, the modem, LCD display out, the Out TV.
A great number laptop that was offered, but feature the modem that was available port, in a sense you must buy the modem, equipment of the additional modem so that could connected the internet. There were several vendor that did not provide driver his modem, so as to need the innovation or patience searched driver the replacement in the internet. The last important part was software of the operation system. Used software that was believed, like antivirus, the operation system. The user's majority used Microsoft Windows XP, not there is mistakenly used Windows XP original, because of the price that was offered for XP this was relatively cheap, around US$ 40.
Although the speed that was offered high, for example celeron 2 gigahertz, stayed far his difference with pentium 4 2 gigahertz, because cache memory that was received inside celeron small revolving 128 to 512 family planning, possibly the processor pentium 3 with the speed 1,2 gigahertz or often also in mentioned with Tualatin could match or compete with celeron this. Because this celeron was offered with the price was very cheap. There were many opinions that said that Celeron did not lose compared with Pentium 4 if in-overclock, but must be remembered, that overclock increased hot the processor, that resulted in the age of the processor being shorter, and damage that happened in laptop more is difficult to be handled from PC normally.
The code chip to prosessor this was 450, 440, 430, 423, 420, 410, 390, 383, 380, 373, 370, 360J, 360, 353, 350J, 350, 340, 333, 330, 320, 310 Pentium 4 had the speed that was higher until reaching 1 cloud so as to be able to be used to multi threading (accessed more than one operation) the Weakness of this processor only did not support wireless connection. This problem could be overcome with equipped wireless connection card that his price was relatively cheap. The Prosessor code 552, 548, 538, 532, 518. Centrino Duo was what was fastest in the market at this time. From the name could be concluded that in this processor was gotten 2 processors centrino the solo. This meaning that the speed that was offered then twice the speed centrino. His price then began to be cheap because the production cost was cheaper was compared made two processors.
Cache memory him was then very big, that is 4 clouds. The other surplus was supportive the operation 64 bit where really was suitable to undertake Windows Vista that was the newest version from Windows.Version Windows Vista I was launched by Microsoft and still was free. The processor that a Centrino Duo level was AMD Turion 64 x 2. The Prosessor code: E6700,E6600, E6400,E6300. Big laptop for the personal use where someone more often spent time in the field of the measurement 10,11,12,14 more appropriate. The practical small measurement and was easy to be brought, but the price that was offered more expensive. For the use as the replacement PC/Desktop better used notebook 15 inch. and the price that was offered relative was covered.
Because laptop was work equipment of the field, casing was the main matter.. Laptop cheap often was offered with casing that was bad, so as after several times the use would the crack and broken. Pilihkan casing that had the mixture alloy/metal, titanium, or that have material ebonite was mixed with metal fiber, so as to be able to keep the collision. Notebook was long-term investment, if in the use 2-3 months have had problems, casing broke out, certainly will be very damaging you. The completeness feature the network laptop that was good minimal had more than one USB and support with USB 2,0, bluetooth, infrared, RJ-45, the modem, LCD display out, the Out TV.
A great number laptop that was offered, but feature the modem that was available port, in a sense you must buy the modem, equipment of the additional modem so that could connected the internet. There were several vendor that did not provide driver his modem, so as to need the innovation or patience searched driver the replacement in the internet. The last important part was software of the operation system. Used software that was believed, like antivirus, the operation system. The user's majority used Microsoft Windows XP, not there is mistakenly used Windows XP original, because of the price that was offered for XP this was relatively cheap, around US$ 40.
[How To] Choose Mini Notebook?
Simple and was covered. Practical and mini. Notebook mini, or netbook like that his term if his processor was made by Intelligence, was drafted as the second system that could be put by you into the bag and brought everywhere. Notebook mini could give the Web service, the e-mail, and the application of the productivity in the body that his measurement not more than an agenda book.
Usually the equipment weight less than 1,5kg, was driven the processor of the power opinion from Intel or VIA, had the screen of 7” – 10”, the memory of 512MB – 1GB, storage take the form of harddisk or SSD (solid state disk), complete with the Windows operation system or Linux.
However the measurement that was smaller caused notebook mini this could not be as powerful as its relatives. We will not find the processor dual-core or feature discrete graphics here. That was received by us was the moving freedom (portabilities) in the price that was not as expensive as one ultraportabel.
At this time had many makes mini notebook circulated in the market. Because of this, chose whatever that most was suitable for your requirement possibly no longer was easy. So that too much did not have a headache, paid attention to matters along with:
The measurement keyboard and screen
mini Notebook quite measuring small, so important to choose the machine with the measurement of the screen and the resolution that were comfortable in your eyes. These machines offered the measuring screen 7” (including Asus Eee PC 4G), 8,9” (Acer Aspire One, Asus Eee PC 901, HP 2133 Mini- Note, Lenovo IdeaPad S9, MSI Wind Notebook U90), or 10” (Asus Eee PC 1000H, Axio Pico, MSI Wind Notebook U100, Lenovo IdeaPad S10).
The resolution in notebook measuring small became vital. One notebook mini with the resolution 800x480 pixel will demand you rolled-roll to the side (horizontal) when you wanted to see the page of a Web site intact. Fortunately mini notebook that emerged later offered the resolution 1024x600 pixel, so as to explore the quite pleasant Internet.
That also must be paid attention to was wide keyboard. Except if your fingers were indeed mini, keyboard to most notebook mini will be felt narrow if being compared keyboard PC that was normal you with. Keyboard that was most relieved in notebook mini possibly was HP 2133 Mini Note (92%) and MSI Wind Notebook U100 (92%), Acer Aspire One (89%).
However the measurement not all of them. The laying of the switch must be also paid attention to in order to be easy to be covered, or on the contrary, was not easy to be touched.
Operation System: Many of the mini-notebook had a cheap price came preinstall with the operation system open source that was free, Linux. Its variant could Linpus Linux (Acer Aspire One), or Xandros Linux (Asus Eee PC). The Linux’ use in fact beneficial. Apart from his measurement that was small, this operation system was relative stronger faced the attack malware.
Don't worry with the interface. The mini notebook producer has made so that the use interface Linux could easy like Windows. And if liking the person who tinkers, you could make interface3D that was pretty with help desktop the Manager like Compiz Fusion.
One obstacle here: the program installation could was felt was difficult and needed attempted with command line. Moreover, depended on the Linux version that was installed, possibly was also software that was incompatible with your mini notebook.
The good news, Canonical (the company behind the operation system desktop Ubuntu) was preparing Ubuntu Netbook Remix, an operation system of OEM-customizable that was drafted to mini notebook with Atom Intel processor . This operation system will come preinstall in several systems of the year end.
WINDOWS: XP became the Windows operation system that was general was found in mini-notebook. That rather the difference was the HP, that offered the Vista in 2133 Mini- Note him. Windows compatible with almost all the programs or accessories that were available in the market at this time. Unfortunately, because of his market share that was big, Windows machines tended to become the attack target malware, so the package of the security who was strong like Norton Internet Security 2008 must be added.
Prosesor
This time had two companies of – Intel and VIA - that produced the processor that was drafted to support the speed and battery efficiency in mini notebook. Intel initially drove notebook mini with the Celeron Intel processor M. processor (900MHz). However currently that often was used was the Atom Intel processor that was more efficient the power (800MHz until 1,8GHz).
The processor VIA’s C7-M. (1,0GHz until 1,7GHz) gave the moderate achievement (the HP 2133 Mini- Note), but was not as fast as his rival who came from Intelligence. Moreover notebook mini that was powered by the VIA processor tended faster was drained his battery. That just recently VIA introduced the Nano platform (1,0GHz until 1,8GHz), that was drafted to compete with Atom Intelligence in the matter of the achievement and battery endurance, but this system was not yet encountered by us in the market.
Storage System
Notebook mini at this time offered two types storage: harddisk and SSD (solid state the disk). Each one had the superiority and the weakness.
Harddisk gave huge storage (Ms Wind Notebook U100 and Asus Eee PC 1000H came with harddisk 80GB, Acer Aspire One A150 and HP 2133 Mini- Note respectively enclosed harddisk 120GB, whereas Axio Pico and Lenovo IdeaPad S10 became knotted harddisk 160GB), but harddisk more was susceptible to the jolt and produced more often was hot resulting from a part-a part that proceeded.
SSD faster, more kept towards the jolt and the surprise but also colder. However because his price was still expensive, his capacity then still was not yet too big. So, if you emphasized the capacity storage, chose mini-notebook that packed harddisk. However if you gave priority to the protection of the data from the jolt and the surprise, chose SSD.
The Number Port
If you liked to connected to digital camera, MP3 player, or even the external monitor, do not worry. In general notebook mini produced three port USB 2,0, port VGA-out, and slot the memory card. The exception was Lenovo IdeaPad S10 that only had two port USB 2,0. However as his substitute for Lenovo IdeaPad S10 put forward slot ExpressCard, agreed for you who liked to use the Internet card broadband. Slot ExpressCard this also bundle up by HP 2133 Mini- Note.
Battery
For one mini notebook that was mentioned anywhere, battery resistance became important. Unfortunately most mini notebook at this time only provided the battery 3-cell have a capacity 2000mAh. Battery resistance 3-cell this generally under 2 hours. Because of that will be very pleasant to be able to get the battery 6-cell have a capacity high (high capacity). Belonging to Asus Eee PC 901 that have a capacity 6600mAh for example, could remain around 6 hours.
Webcam Quality
Mini notebook invested Webcam 0.3 megapixel or 1.3 megapixel to facilitate you chatted while saw (the video) with friend and the workmate. Usually, increasingly high megapixel one of Webcam, increasingly good/sharply his picture.
Accessories
Touchpad and switches mouse that was relatively small was the normal matter in mini notebook, but you could always add the manager's personal system you, that is mouse. Chose that nirkabel with dongle that was mini, like Kensington SlimBlade the Mouse Media or Microsoft Wireless Notebook Optical Mouse 3000. If you need more storage to keep the photograph collection, music, the video and the document, should not reluctant bought harddisk external that was portable.
Usually the equipment weight less than 1,5kg, was driven the processor of the power opinion from Intel or VIA, had the screen of 7” – 10”, the memory of 512MB – 1GB, storage take the form of harddisk or SSD (solid state disk), complete with the Windows operation system or Linux.
However the measurement that was smaller caused notebook mini this could not be as powerful as its relatives. We will not find the processor dual-core or feature discrete graphics here. That was received by us was the moving freedom (portabilities) in the price that was not as expensive as one ultraportabel.
At this time had many makes mini notebook circulated in the market. Because of this, chose whatever that most was suitable for your requirement possibly no longer was easy. So that too much did not have a headache, paid attention to matters along with:
The measurement keyboard and screen
mini Notebook quite measuring small, so important to choose the machine with the measurement of the screen and the resolution that were comfortable in your eyes. These machines offered the measuring screen 7” (including Asus Eee PC 4G), 8,9” (Acer Aspire One, Asus Eee PC 901, HP 2133 Mini- Note, Lenovo IdeaPad S9, MSI Wind Notebook U90), or 10” (Asus Eee PC 1000H, Axio Pico, MSI Wind Notebook U100, Lenovo IdeaPad S10).
The resolution in notebook measuring small became vital. One notebook mini with the resolution 800x480 pixel will demand you rolled-roll to the side (horizontal) when you wanted to see the page of a Web site intact. Fortunately mini notebook that emerged later offered the resolution 1024x600 pixel, so as to explore the quite pleasant Internet.
That also must be paid attention to was wide keyboard. Except if your fingers were indeed mini, keyboard to most notebook mini will be felt narrow if being compared keyboard PC that was normal you with. Keyboard that was most relieved in notebook mini possibly was HP 2133 Mini Note (92%) and MSI Wind Notebook U100 (92%), Acer Aspire One (89%).
However the measurement not all of them. The laying of the switch must be also paid attention to in order to be easy to be covered, or on the contrary, was not easy to be touched.
Operation System: Many of the mini-notebook had a cheap price came preinstall with the operation system open source that was free, Linux. Its variant could Linpus Linux (Acer Aspire One), or Xandros Linux (Asus Eee PC). The Linux’ use in fact beneficial. Apart from his measurement that was small, this operation system was relative stronger faced the attack malware.
Don't worry with the interface. The mini notebook producer has made so that the use interface Linux could easy like Windows. And if liking the person who tinkers, you could make interface3D that was pretty with help desktop the Manager like Compiz Fusion.
One obstacle here: the program installation could was felt was difficult and needed attempted with command line. Moreover, depended on the Linux version that was installed, possibly was also software that was incompatible with your mini notebook.
The good news, Canonical (the company behind the operation system desktop Ubuntu) was preparing Ubuntu Netbook Remix, an operation system of OEM-customizable that was drafted to mini notebook with Atom Intel processor . This operation system will come preinstall in several systems of the year end.
WINDOWS: XP became the Windows operation system that was general was found in mini-notebook. That rather the difference was the HP, that offered the Vista in 2133 Mini- Note him. Windows compatible with almost all the programs or accessories that were available in the market at this time. Unfortunately, because of his market share that was big, Windows machines tended to become the attack target malware, so the package of the security who was strong like Norton Internet Security 2008 must be added.
Prosesor
This time had two companies of – Intel and VIA - that produced the processor that was drafted to support the speed and battery efficiency in mini notebook. Intel initially drove notebook mini with the Celeron Intel processor M. processor (900MHz). However currently that often was used was the Atom Intel processor that was more efficient the power (800MHz until 1,8GHz).
The processor VIA’s C7-M. (1,0GHz until 1,7GHz) gave the moderate achievement (the HP 2133 Mini- Note), but was not as fast as his rival who came from Intelligence. Moreover notebook mini that was powered by the VIA processor tended faster was drained his battery. That just recently VIA introduced the Nano platform (1,0GHz until 1,8GHz), that was drafted to compete with Atom Intelligence in the matter of the achievement and battery endurance, but this system was not yet encountered by us in the market.
Storage System
Notebook mini at this time offered two types storage: harddisk and SSD (solid state the disk). Each one had the superiority and the weakness.
Harddisk gave huge storage (Ms Wind Notebook U100 and Asus Eee PC 1000H came with harddisk 80GB, Acer Aspire One A150 and HP 2133 Mini- Note respectively enclosed harddisk 120GB, whereas Axio Pico and Lenovo IdeaPad S10 became knotted harddisk 160GB), but harddisk more was susceptible to the jolt and produced more often was hot resulting from a part-a part that proceeded.
SSD faster, more kept towards the jolt and the surprise but also colder. However because his price was still expensive, his capacity then still was not yet too big. So, if you emphasized the capacity storage, chose mini-notebook that packed harddisk. However if you gave priority to the protection of the data from the jolt and the surprise, chose SSD.
The Number Port
If you liked to connected to digital camera, MP3 player, or even the external monitor, do not worry. In general notebook mini produced three port USB 2,0, port VGA-out, and slot the memory card. The exception was Lenovo IdeaPad S10 that only had two port USB 2,0. However as his substitute for Lenovo IdeaPad S10 put forward slot ExpressCard, agreed for you who liked to use the Internet card broadband. Slot ExpressCard this also bundle up by HP 2133 Mini- Note.
Battery
For one mini notebook that was mentioned anywhere, battery resistance became important. Unfortunately most mini notebook at this time only provided the battery 3-cell have a capacity 2000mAh. Battery resistance 3-cell this generally under 2 hours. Because of that will be very pleasant to be able to get the battery 6-cell have a capacity high (high capacity). Belonging to Asus Eee PC 901 that have a capacity 6600mAh for example, could remain around 6 hours.
Webcam Quality
Mini notebook invested Webcam 0.3 megapixel or 1.3 megapixel to facilitate you chatted while saw (the video) with friend and the workmate. Usually, increasingly high megapixel one of Webcam, increasingly good/sharply his picture.
Accessories
Touchpad and switches mouse that was relatively small was the normal matter in mini notebook, but you could always add the manager's personal system you, that is mouse. Chose that nirkabel with dongle that was mini, like Kensington SlimBlade the Mouse Media or Microsoft Wireless Notebook Optical Mouse 3000. If you need more storage to keep the photograph collection, music, the video and the document, should not reluctant bought harddisk external that was portable.
How to Choose a Laptop?
In recent times newspapers have been flooded by the sale advertisement laptop cheap. From the kings laptop like Toshiba, IBM alias Lenovo, the MOBILE PHONE, Acer, to the newcomers like ECS, A Note, and Benq, all the pairs of the advertisement. By $500, who could bring came home laptop good-looking and the style. From many the make and the kind laptop that was widespread that approximately whatever that was suitable for you? Along with this some factors that must be considered in chose laptop. This results of thoughts dummy for dummies, hehehe … Who knew it is useful.
1. Determine the price limit
According to the financial consultants better we bought was based on the REQUIREMENT not the WISH not also PRESTIGE. (the prestige then how come not might)
2. The application what often was used:
If only for typing, made the presentation PowerPoint, excel, internet connection, from time to time Photoshop the Celeron Intelligence class or AMD Sempron has then been enough. Moreover often has been equipped by Wifi access. Need not buy laptop dg the Centrino processor yg expensive. Celeron/Sempron then strong for Photoshop, Corel Draw, moreover QuarkExpress (the design utk made the newspaper like that was worn the Tempo Newspaper) –was tested in the house. If wanted more powerful with laptop cheap, upgraded personally the memory or RAM from 256 MB – > 512 MB. because of Windows XP like Linux if being installed in the computer with 256 MB memory indeed not all that much.
If for they who like hack the computer program, the heavy graphic design, indeed more was good with the upper-class processor like Core 2, AMD Turion. Centrino or Core Solo normally then in fact also has been moderate.
And remembered laptop-laptop the Core Duo processor at this time then could not running 100 percent like that was wanted by his producer. Because, the Core processor 2 demanded software just that be suitable “brain”. And now software that still little. Just Windows Vista only(that then just launches). So, the aspect of the speed that was hoped for from the work laptop Core 2 this yes.. will be too dramatic..
3. How mobile are you?
More mobile chose that was small and light. In general laptop the weight 2,3-2,5 kg. Laptop this in order to cover the disturbance like in Tasikmalaya (Several years set) or Poso–means was carried in the backpack of the road of the city circle more than 2 jam–make stiff shoulders were moderate. Ideally for the reporter searched the light below 2 kg only was expensive. However, if being used by his work only in the office or 1-2 months very much the work in the cafe was so heavy 2,3-2,5 kg still OK. * More mobile chose the durable battery. In general laptop battery only 2.5 - 3 hours. That was ultra low voltage like Fujitsu output, Sony Vaio, Toshiba Portage could 4-7 hours. * For the user that not high frequent flyer the battery class 2.5-3 hours have then been enough. (It is, as strong we the work in the cafe like Starbucks? It was better to watch the guest of the cafe or barista would than the work, he.. he.. he..)
4. The screen
Who like small of course chose the screen 8, 10, 11 or 12 inch – > unfortunately the small this is usually more expensive. While 13 or 14 inch. That 15 inch usually again cheaper. Want to wide but not wanna looked big chose that wide screen. The screen 13 wide screen moderate, was not too small or big.
The design yes was glad him 17 inch 5. That must be remembered also laptop that has been bought by us tended his price entered free. In 2 years laptop second-hand that could descend his price 2-4 million. So if bought very expensive considered also the contraction thought yg foolish. If I more liked bought laptop that was not too sophisticated remembered his price 2-4 years will provide completely and sold came back laptop that was not easy. Choose medium technology, with the middle price possibly one of the alternatives that ought to be considered because from the side of technology was not left behind very much, from the price also lack the pocket really.
6. The Vendor Reputation
*IBM (now Lenovo) — the awkward design (the type finally then rather sweet like Z61), but strong and obstinate, the measurement keyboard most appropriate on the hands of
* Acer — the Taiwanese make the sweet design, his claim the number of one in Europe in 2006
* Toshiba — for years had been laptop no 1 in the world and in Indonesia, moderate obstinate
* ECS — the Taiwanese make, he said OK asked Prabandari (Kabiro the Time in Bandung, he bought ECS that the PC tablet form like the agenda book from 2005), after-sale he said also OK * Dell –Cool for the type that Inspiron as having Mas Wawan (Technology)
* Sony Vaio — Hfff… the design that the TX type so cool, really small and cute. Love his price still in $1800-$2000.
* the Mobile Phone/Compaq — Unfortunately I had not liked his design of
* Fujitsu — that the type of the good-looking small size.. Although being not as funny as Vaio
* Powerbook — cool and different, thin, but heavy and did not agree for hacker the computer because of his operation system of Macintosh. The other factor only accesoris like the connection bluetooth, infra red, security the examination of the finger, the card reader of SD. All of these could be minor consideration. Yes, the hunter and the lover laptop second-hand he.. he.. he.., might be heard might also not. So, the next one was up to you you.
1. Determine the price limit
According to the financial consultants better we bought was based on the REQUIREMENT not the WISH not also PRESTIGE. (the prestige then how come not might)
2. The application what often was used:
If only for typing, made the presentation PowerPoint, excel, internet connection, from time to time Photoshop the Celeron Intelligence class or AMD Sempron has then been enough. Moreover often has been equipped by Wifi access. Need not buy laptop dg the Centrino processor yg expensive. Celeron/Sempron then strong for Photoshop, Corel Draw, moreover QuarkExpress (the design utk made the newspaper like that was worn the Tempo Newspaper) –was tested in the house. If wanted more powerful with laptop cheap, upgraded personally the memory or RAM from 256 MB – > 512 MB. because of Windows XP like Linux if being installed in the computer with 256 MB memory indeed not all that much.
If for they who like hack the computer program, the heavy graphic design, indeed more was good with the upper-class processor like Core 2, AMD Turion. Centrino or Core Solo normally then in fact also has been moderate.
And remembered laptop-laptop the Core Duo processor at this time then could not running 100 percent like that was wanted by his producer. Because, the Core processor 2 demanded software just that be suitable “brain”. And now software that still little. Just Windows Vista only(that then just launches). So, the aspect of the speed that was hoped for from the work laptop Core 2 this yes.. will be too dramatic..
3. How mobile are you?
More mobile chose that was small and light. In general laptop the weight 2,3-2,5 kg. Laptop this in order to cover the disturbance like in Tasikmalaya (Several years set) or Poso–means was carried in the backpack of the road of the city circle more than 2 jam–make stiff shoulders were moderate. Ideally for the reporter searched the light below 2 kg only was expensive. However, if being used by his work only in the office or 1-2 months very much the work in the cafe was so heavy 2,3-2,5 kg still OK. * More mobile chose the durable battery. In general laptop battery only 2.5 - 3 hours. That was ultra low voltage like Fujitsu output, Sony Vaio, Toshiba Portage could 4-7 hours. * For the user that not high frequent flyer the battery class 2.5-3 hours have then been enough. (It is, as strong we the work in the cafe like Starbucks? It was better to watch the guest of the cafe or barista would than the work, he.. he.. he..)
4. The screen
Who like small of course chose the screen 8, 10, 11 or 12 inch – > unfortunately the small this is usually more expensive. While 13 or 14 inch. That 15 inch usually again cheaper. Want to wide but not wanna looked big chose that wide screen. The screen 13 wide screen moderate, was not too small or big.
The design yes was glad him 17 inch 5. That must be remembered also laptop that has been bought by us tended his price entered free. In 2 years laptop second-hand that could descend his price 2-4 million. So if bought very expensive considered also the contraction thought yg foolish. If I more liked bought laptop that was not too sophisticated remembered his price 2-4 years will provide completely and sold came back laptop that was not easy. Choose medium technology, with the middle price possibly one of the alternatives that ought to be considered because from the side of technology was not left behind very much, from the price also lack the pocket really.
6. The Vendor Reputation
*IBM (now Lenovo) — the awkward design (the type finally then rather sweet like Z61), but strong and obstinate, the measurement keyboard most appropriate on the hands of
* Acer — the Taiwanese make the sweet design, his claim the number of one in Europe in 2006
* Toshiba — for years had been laptop no 1 in the world and in Indonesia, moderate obstinate
* ECS — the Taiwanese make, he said OK asked Prabandari (Kabiro the Time in Bandung, he bought ECS that the PC tablet form like the agenda book from 2005), after-sale he said also OK * Dell –Cool for the type that Inspiron as having Mas Wawan (Technology)
* Sony Vaio — Hfff… the design that the TX type so cool, really small and cute. Love his price still in $1800-$2000.
* the Mobile Phone/Compaq — Unfortunately I had not liked his design of
* Fujitsu — that the type of the good-looking small size.. Although being not as funny as Vaio
* Powerbook — cool and different, thin, but heavy and did not agree for hacker the computer because of his operation system of Macintosh. The other factor only accesoris like the connection bluetooth, infra red, security the examination of the finger, the card reader of SD. All of these could be minor consideration. Yes, the hunter and the lover laptop second-hand he.. he.. he.., might be heard might also not. So, the next one was up to you you.
How To Treat Your Laptop?
The user laptop or notebook in Indonesia at this time already even more, together with increasingly achieve the price laptop in the market. Behind all that, still many people who often carried out the mistake in treated laptop him, so as laptop often fast broken. Through the simple article this time will be presented by various tips simple in treated and avoided laptop you from early damage. This will be useful in increasing the age laptop you.
Don't download random software free from the internet. At first again for example software that as if as some antivirus. Used software-software that was obtained by you from the package laptop that was bought by you. The risk of the virus could damage inside laptop you if you at random used software from the internet. If you continue to want to used software results download, then confirmed already you scan software this with antivirus that was had by you.
should not place laptop on the floor. When laptop you on the floor, then the risk laptop was stepped on foot the person, the child you, or the animal kept will be very big. The small child will think laptop you the toy and your kept animal could damaged certain parts of laptop. Moreover laptop that was placed on the floor will be fast dirty by dust.
Stick to stabilizer electricity laptop you. If you were working in laptop by using electricity (without the battery), then better used stabilizer that could prevent the occurrence of the tension of electricity that was unstable to laptop you.
don't place the object anything between keyboard and the screen laptop. Often the writer met someone that used laptop, afterwards placed papers above keyboard laptop, afterwards closed laptop him. This was very dangerous, because the risk of the screen was scratched became big. Definitely you did not want to replace the screen laptop just because of being scratched not?
should not place laptop you to the too soft surface. For example laptop was placed by you to the very soft sofa, so as laptop to was seen rather sank in the sofa. This was very dangerous, because could hinder the hot issuing from inside laptop and made laptop you were hot.
Big-hearted-heart when brought laptop you in the bag. Did don't use ordinary bag to bring laptop you. Use the bag that indeed was used to laptop so as other objects will not scratch certain parts in laptop.
did not have drunk or eaten or placed the drink that contained the liquid around laptop. This really was dangerous, because laptop really was sensitive to the liquid that concerning laptop, for example the liquid that entered inside keyboard.
Don't had tried to take apart laptop you yourself. This was the action that was really unwise. Laptop not like radio or fermented recorder normally. Many very insignificant parts that from his factory has been assembled by using the robot's precision. If being soiled by you, then laptop you could be broken serious. Brought always laptop that was broken to dealer or service center from laptop you.
Reference:
* From various sources in the internet. This simple article concerning tips in treated laptop you. It is hoped was useful for You All.
Don't download random software free from the internet. At first again for example software that as if as some antivirus. Used software-software that was obtained by you from the package laptop that was bought by you. The risk of the virus could damage inside laptop you if you at random used software from the internet. If you continue to want to used software results download, then confirmed already you scan software this with antivirus that was had by you.
should not place laptop on the floor. When laptop you on the floor, then the risk laptop was stepped on foot the person, the child you, or the animal kept will be very big. The small child will think laptop you the toy and your kept animal could damaged certain parts of laptop. Moreover laptop that was placed on the floor will be fast dirty by dust.
Stick to stabilizer electricity laptop you. If you were working in laptop by using electricity (without the battery), then better used stabilizer that could prevent the occurrence of the tension of electricity that was unstable to laptop you.
don't place the object anything between keyboard and the screen laptop. Often the writer met someone that used laptop, afterwards placed papers above keyboard laptop, afterwards closed laptop him. This was very dangerous, because the risk of the screen was scratched became big. Definitely you did not want to replace the screen laptop just because of being scratched not?
should not place laptop you to the too soft surface. For example laptop was placed by you to the very soft sofa, so as laptop to was seen rather sank in the sofa. This was very dangerous, because could hinder the hot issuing from inside laptop and made laptop you were hot.
Big-hearted-heart when brought laptop you in the bag. Did don't use ordinary bag to bring laptop you. Use the bag that indeed was used to laptop so as other objects will not scratch certain parts in laptop.
did not have drunk or eaten or placed the drink that contained the liquid around laptop. This really was dangerous, because laptop really was sensitive to the liquid that concerning laptop, for example the liquid that entered inside keyboard.
Don't had tried to take apart laptop you yourself. This was the action that was really unwise. Laptop not like radio or fermented recorder normally. Many very insignificant parts that from his factory has been assembled by using the robot's precision. If being soiled by you, then laptop you could be broken serious. Brought always laptop that was broken to dealer or service center from laptop you.
Reference:
* From various sources in the internet. This simple article concerning tips in treated laptop you. It is hoped was useful for You All.
[How To] Chose a Laptop
Laptop or the lap-top computer has been the everyday requirement professional in fact also the student. In the purchase laptop, we often very much were mesmerized by the price that was given that was increasingly cheap. There were several matters that must be considered by you before buying one notebook, namely the speed of the processor, the measurement laptop, VGA Card, the completeness of multimedia, the completeness feature the network, casing, harddisk, memory, and his software. And was not significantly cheap that his quality was good. For example plenty of shops, vendor that offered laptop with the cheap price, with the processor celeron, centrino 740.730, and centrino duo. Was based on the specification of the place of the speed, could be put in order celeron that had the speed and the achievement that were lowered compared with the processor pentium 4 other.
Although the speed that was offered high, for example celeron 2 gigahertz, stayed far his difference with pentium 4 2 gigahertz, because cache memory that was received inside celeron small revolving 128 to 512 family planning, possibly the processor pentium 3 with the speed 1,2 gigahertz or often also in mentioned with Tualatin could match or compete with celeron this. Because this celeron was offered with the price was very cheap. There were many opinions that said that Celeron did not lose compared with Pentium 4 if in-overclock, but must be remembered, that overclock increased hot the processor, that resulted in the age of the processor being shorter, and damage that happened in laptop more is difficult to be handled from PC normally.
The code chip to prosessor this was 450, 440, 430, 423, 420, 410, 390, 383, 380, 373, 370, 360J, 360, 353, 350J, 350, 340, 333, 330, 320, 310 Pentium 4 had the speed that was higher until reaching 1 cloud so as to be able to be used to multi threading (accessed more than one operation) the Weakness of this processor only did not support wireless connection. This problem could be overcome with equipped wireless connection card that his price was relatively cheap. The Prosessor code 552, 548, 538, 532, 518. Centrino Duo was what was fastest in the market at this time. From the name could be concluded that in this processor was gotten 2 processors centrino the solo. This meaning that the speed that was offered then twice the speed centrino. His price then began to be cheap because the production cost was cheaper was compared made two processors.
Cache memory him was then very big, that is 4 clouds. The other surplus was supportive the operation 64 bit where really was suitable to undertake Windows Vista that was the newest version from Windows.Version Windows Vista I was launched by Microsoft and still was free. The processor that a Centrino Duo level was AMD Turion 64 x 2. The Prosessor code: E6700,E6600, E6400,E6300. Big laptop for the personal use where someone more often spent time in the field of the measurement 10,11,12,14 more appropriate. The practical small measurement and was easy to be brought, but the price that was offered more expensive. For the use as the replacement PC/Desktop better used notebook 15 inch. and the price that was offered relative was covered.
Because laptop was work equipment of the field, casing was the main matter.. Laptop cheap often was offered with casing that was bad, so as after several times the use would the crack and broken. Pilihkan casing that had the mixture alloy/metal, titanium, or that have material ebonite was mixed with metal fiber, so as to be able to keep the collision. Notebook was long-term investment, if in the use 2-3 months have had problems, casing broke out, certainly will be very damaging you. The completeness feature the network laptop that was good minimal had more than one USB and support with USB 2,0, bluetooth, infrared, RJ-45, the modem, LCD display out, the Out TV.
A great number laptop that was offered, but feature the modem that was available port, in a sense you must buy the modem, equipment of the additional modem so that could connected the internet. There were several vendor that did not provide driver his modem, so as to need the innovation or patience searched driver the replacement in the internet. The last important part was software of the operation system. Used software that was believed, like antivirus, the operation system. The user's majority used Microsoft Windows XP, not there is mistakenly used Windows XP original, because of the price that was offered for XP this was relatively cheap, around US$ 40.
Although the speed that was offered high, for example celeron 2 gigahertz, stayed far his difference with pentium 4 2 gigahertz, because cache memory that was received inside celeron small revolving 128 to 512 family planning, possibly the processor pentium 3 with the speed 1,2 gigahertz or often also in mentioned with Tualatin could match or compete with celeron this. Because this celeron was offered with the price was very cheap. There were many opinions that said that Celeron did not lose compared with Pentium 4 if in-overclock, but must be remembered, that overclock increased hot the processor, that resulted in the age of the processor being shorter, and damage that happened in laptop more is difficult to be handled from PC normally.
The code chip to prosessor this was 450, 440, 430, 423, 420, 410, 390, 383, 380, 373, 370, 360J, 360, 353, 350J, 350, 340, 333, 330, 320, 310 Pentium 4 had the speed that was higher until reaching 1 cloud so as to be able to be used to multi threading (accessed more than one operation) the Weakness of this processor only did not support wireless connection. This problem could be overcome with equipped wireless connection card that his price was relatively cheap. The Prosessor code 552, 548, 538, 532, 518. Centrino Duo was what was fastest in the market at this time. From the name could be concluded that in this processor was gotten 2 processors centrino the solo. This meaning that the speed that was offered then twice the speed centrino. His price then began to be cheap because the production cost was cheaper was compared made two processors.
Cache memory him was then very big, that is 4 clouds. The other surplus was supportive the operation 64 bit where really was suitable to undertake Windows Vista that was the newest version from Windows.Version Windows Vista I was launched by Microsoft and still was free. The processor that a Centrino Duo level was AMD Turion 64 x 2. The Prosessor code: E6700,E6600, E6400,E6300. Big laptop for the personal use where someone more often spent time in the field of the measurement 10,11,12,14 more appropriate. The practical small measurement and was easy to be brought, but the price that was offered more expensive. For the use as the replacement PC/Desktop better used notebook 15 inch. and the price that was offered relative was covered.
Because laptop was work equipment of the field, casing was the main matter.. Laptop cheap often was offered with casing that was bad, so as after several times the use would the crack and broken. Pilihkan casing that had the mixture alloy/metal, titanium, or that have material ebonite was mixed with metal fiber, so as to be able to keep the collision. Notebook was long-term investment, if in the use 2-3 months have had problems, casing broke out, certainly will be very damaging you. The completeness feature the network laptop that was good minimal had more than one USB and support with USB 2,0, bluetooth, infrared, RJ-45, the modem, LCD display out, the Out TV.
A great number laptop that was offered, but feature the modem that was available port, in a sense you must buy the modem, equipment of the additional modem so that could connected the internet. There were several vendor that did not provide driver his modem, so as to need the innovation or patience searched driver the replacement in the internet. The last important part was software of the operation system. Used software that was believed, like antivirus, the operation system. The user's majority used Microsoft Windows XP, not there is mistakenly used Windows XP original, because of the price that was offered for XP this was relatively cheap, around US$ 40.
[How To] Treat Your Laptop LCD
1.Don't placed the burden that was weight above laptop if we placed the thing thing that the big weight burden above laptop, its could cause the scratch in the LCD screen.
2.Avoid placed laptop in the bag with the thing that too much with things.. because of causing the occurrence of the pressure on laptop
3.Give an attention with the temperature condition
Laptop or notebook was compiled from various electronics components that the work was affected by the temperature. Among them, the too extreme temperature, for example too hot or too cold, could disrupt the achievement or even broke laptop. Therefore, avoided the habit left laptop inside car that was parked under intense sunlight. Avoided also laptop was low the direct beam the Sun rays. Generally the producers recommends the temperature between 5 - 35 Celsius levels. In the meantime, for the height laptop was recommended worked in the height below 2.500 meter above sea line.
4.When you will keep laptop in a long time (one week more), it is better released the battery and kept in the cool and dry place, and quite good air circulation. Place gel silicon to avoid the fungus. Like that wanted to use him came back, the current or the contents of the battery with filled and emptied fully as many as three successive times.
5.Avoid magnetic field
to protect the available data inside harddisk, don't place the device contained the magnetic field/electromagnet strong around laptop. Device the producer of the magnetic field, for example speaker that unshielded speaker system or the cell phone. If you want to accessed internet used facilities infrared to the cellular phone, placed the cellular phone in distance around 15 cm from laptop.
6.Use a stabilizer
If you were working in laptop by using electricity (without the battery), then better used stabilizer that could prevent the occurrence of the tension of electricity that was unstable to your laptop.
7. Shut down correctly.
Don't turn off laptop during indicator light harddisk still blinking. This condition showed hard the disk was still active. The power loss suddenly (for example during laptop was shut down) could result in data damage or the disturbance of the achievement in hard the disk. Ascertain indicator light harddisk turned off before you shutdown laptop.
8.Avoid the surface was too soft
should not place laptop when being on in the place with the surface that was too soft like the sofa or the mattress, so as laptop to was seen rather sank. This was very dangerous, because could hinder the hot issuing from inside laptop as well as made laptop was hot.
9. Monitor hinge
If being paid attention to thoroughly, in the fold between CPU and the monitor LCD was met the hinge that enabled the two components closed to one another. Must be realized that the most difficult burden in some laptop was in part this hinge. Therefore, should not give stamping at the time of open the monitor when wanted activated laptop. Likewise was the reverse, don't closed the monitor was too hard when being finished used the laptop.
10. Don't take apart laptop.
Take apart personally laptop or not by expert, was the action was really unwise. Laptop not like radio or fermented recorder normally. Many very insignificant parts that from factory already assembled by using robot's precision. If being soiled by you, then your laptop will broken serious. Brought always laptop that was broken to IT or service center from your laptop.
So 10 tips.. to treat Laptop so that always in the fresh situation …
2.Avoid placed laptop in the bag with the thing that too much with things.. because of causing the occurrence of the pressure on laptop
3.Give an attention with the temperature condition
Laptop or notebook was compiled from various electronics components that the work was affected by the temperature. Among them, the too extreme temperature, for example too hot or too cold, could disrupt the achievement or even broke laptop. Therefore, avoided the habit left laptop inside car that was parked under intense sunlight. Avoided also laptop was low the direct beam the Sun rays. Generally the producers recommends the temperature between 5 - 35 Celsius levels. In the meantime, for the height laptop was recommended worked in the height below 2.500 meter above sea line.
4.When you will keep laptop in a long time (one week more), it is better released the battery and kept in the cool and dry place, and quite good air circulation. Place gel silicon to avoid the fungus. Like that wanted to use him came back, the current or the contents of the battery with filled and emptied fully as many as three successive times.
5.Avoid magnetic field
to protect the available data inside harddisk, don't place the device contained the magnetic field/electromagnet strong around laptop. Device the producer of the magnetic field, for example speaker that unshielded speaker system or the cell phone. If you want to accessed internet used facilities infrared to the cellular phone, placed the cellular phone in distance around 15 cm from laptop.
6.Use a stabilizer
If you were working in laptop by using electricity (without the battery), then better used stabilizer that could prevent the occurrence of the tension of electricity that was unstable to your laptop.
7. Shut down correctly.
Don't turn off laptop during indicator light harddisk still blinking. This condition showed hard the disk was still active. The power loss suddenly (for example during laptop was shut down) could result in data damage or the disturbance of the achievement in hard the disk. Ascertain indicator light harddisk turned off before you shutdown laptop.
8.Avoid the surface was too soft
should not place laptop when being on in the place with the surface that was too soft like the sofa or the mattress, so as laptop to was seen rather sank. This was very dangerous, because could hinder the hot issuing from inside laptop as well as made laptop was hot.
9. Monitor hinge
If being paid attention to thoroughly, in the fold between CPU and the monitor LCD was met the hinge that enabled the two components closed to one another. Must be realized that the most difficult burden in some laptop was in part this hinge. Therefore, should not give stamping at the time of open the monitor when wanted activated laptop. Likewise was the reverse, don't closed the monitor was too hard when being finished used the laptop.
10. Don't take apart laptop.
Take apart personally laptop or not by expert, was the action was really unwise. Laptop not like radio or fermented recorder normally. Many very insignificant parts that from factory already assembled by using robot's precision. If being soiled by you, then your laptop will broken serious. Brought always laptop that was broken to IT or service center from your laptop.
So 10 tips.. to treat Laptop so that always in the fresh situation …
Maximized the Laptop Battery
How long the Battery could remain?
The specification of the manufacturer laptop showed how long your battery resistance. Despite that was written possibly between two and two half of the hour, the fact is often less than that. There is nothing more annoying apart from the indicator of the battery that was on when doing a temporary task of not having the electricity plug that was available. If really with the battery less than specifications the manufacturer laptop, that could was caused because of various factors. Must have been, even more works that were carried out by you in laptop, even more resource that will be used. For example, multi-tasking will give the burden that was difficult to CPU, the memory and harddisk, that in the long run will finish the battery power.
Saw and improved Consumption of the Power
When in your trip will be very depending to the strength of the battery to light laptop. You certainly felt you were pressed if when completing the work of the battery power increasingly down.Icon in system tray showed that only had some time again that remained. His profit, there was the method that could be used by you to extend the period with the battery and confirm you used his power maximally. First and that was main that must be maximized was fitur the management of the power laptop you. This could be carried out through Power Options to Control Panel. Under Power Scheme was two setting, one when laptop was connected to the electricity plug and other when using the battery. There were several schemes that have been provided that could be used for various situations. The clique to choose the scheme, like Portable Laptop, Minimal Power Management, or Max Battery. Each one had various setting that was different in accordance with the situation. You could choose personally setting that wanted to be used.For example, if using your battery could change the length of time when the monitor or harddisk was killed. You could keep the change and made the power scheme personally be used in afterwards time. After chose setting that was wanted, clicked Save USA and gave the name of your power scheme that was new. The second step was decisive laptop could be on between 2.5 to 4 hours in one time of the battery filling. If the battery could not give time of the standard operation, then possibly necessary reconditioned or was replaced, depended how the kind and the condition for the battery. If the battery functioned well, you must possibly buy the second battery or even added the battery extended universal, depended to operational time that was wanted in one filling time.
The Right Time to Eject the Battery
When used laptop from the electricity plug, you must pull out the battery laptop if not passing him. If you allowed him in battery a long time to be flat. The battery will continue to be charged that in the long run reduced the period with him. The battery had the number of limited filling cycles so use the battery only if really was needed. Moreover, used the battery until as low as possible before you each time passed him. If you used the new battery, then the battery must be charged was full and was emptied.
The specification of the manufacturer laptop showed how long your battery resistance. Despite that was written possibly between two and two half of the hour, the fact is often less than that. There is nothing more annoying apart from the indicator of the battery that was on when doing a temporary task of not having the electricity plug that was available. If really with the battery less than specifications the manufacturer laptop, that could was caused because of various factors. Must have been, even more works that were carried out by you in laptop, even more resource that will be used. For example, multi-tasking will give the burden that was difficult to CPU, the memory and harddisk, that in the long run will finish the battery power.
Saw and improved Consumption of the Power
When in your trip will be very depending to the strength of the battery to light laptop. You certainly felt you were pressed if when completing the work of the battery power increasingly down.Icon in system tray showed that only had some time again that remained. His profit, there was the method that could be used by you to extend the period with the battery and confirm you used his power maximally. First and that was main that must be maximized was fitur the management of the power laptop you. This could be carried out through Power Options to Control Panel. Under Power Scheme was two setting, one when laptop was connected to the electricity plug and other when using the battery. There were several schemes that have been provided that could be used for various situations. The clique to choose the scheme, like Portable Laptop, Minimal Power Management, or Max Battery. Each one had various setting that was different in accordance with the situation. You could choose personally setting that wanted to be used.For example, if using your battery could change the length of time when the monitor or harddisk was killed. You could keep the change and made the power scheme personally be used in afterwards time. After chose setting that was wanted, clicked Save USA and gave the name of your power scheme that was new. The second step was decisive laptop could be on between 2.5 to 4 hours in one time of the battery filling. If the battery could not give time of the standard operation, then possibly necessary reconditioned or was replaced, depended how the kind and the condition for the battery. If the battery functioned well, you must possibly buy the second battery or even added the battery extended universal, depended to operational time that was wanted in one filling time.
The Right Time to Eject the Battery
When used laptop from the electricity plug, you must pull out the battery laptop if not passing him. If you allowed him in battery a long time to be flat. The battery will continue to be charged that in the long run reduced the period with him. The battery had the number of limited filling cycles so use the battery only if really was needed. Moreover, used the battery until as low as possible before you each time passed him. If you used the new battery, then the battery must be charged was full and was emptied.
How long the Battery could give the Power to Laptop?
This had difficulty being determined. For a long time time in fact the battery laptop could give the power depended on the requirement for the power that was needed by equipment. The use of the monitor, harddisk and other accessories could finish the battery power that as a result reduced his operation time. The total time of the battery operation also depended on the design.
Could the Element of the Battery be replaced?
NiCad, NiMH, and lithium the ion basically different to one another and could not exchange each other except equipment has configure repeated by the manufacturer to accept more than one battery kind. Each one had the pattern of the different filling to be able to be filled up well. Therefore, charger also must configure to be able to handle this battery kind.
Battery live
Really with the battery rechargeable in the normal condition usually between 500 to 800 contents-repeated cycles. This usually is the same as one half up until three years to user in general. Together with the battery that began to weaken, battery resistance will decrease. If your battery that usually two hours now only could be used for one hour, then already during him bought that was new.
The Special battery for Power User
If the client you were a person power user that often worked while the long trip, continually undertook the application high-end, or only needed the power more, you must carry out the more extreme action: bought the new battery as back up, the battery extended universal, or even laptop that was newer that processor him has been maximized so as the period could with the battery be longer. The battery extended universal could operate between 6 to 10 hours and could be filled up repeated until 80 percent in time 4 hours. They were lithium the ion, so did not have the problem “memory effect”. His price revolved between 250 and 800 American dollar depended the length of time that was wanted. His dimension approximately 0.5” x 8.5” x 11” seriously around 2 pound. They are usually supplemented with the guarantee for 6 months and could be used in heterogeneous the kind laptop.
The Analyze step
From analyzed the problem of the power with checked how many the power that was used laptop. Further, the evaluation of the health of the battery and if being needed the substitute with battery Lithium Ion, that could easily was found with used search engine or by contacting the manufacturer. Finally, if the fund sufficed and was needed by the power more, bought laptop with technology processor newest and the battery extended universal.
Could the Element of the Battery be replaced?
NiCad, NiMH, and lithium the ion basically different to one another and could not exchange each other except equipment has configure repeated by the manufacturer to accept more than one battery kind. Each one had the pattern of the different filling to be able to be filled up well. Therefore, charger also must configure to be able to handle this battery kind.
Battery live
Really with the battery rechargeable in the normal condition usually between 500 to 800 contents-repeated cycles. This usually is the same as one half up until three years to user in general. Together with the battery that began to weaken, battery resistance will decrease. If your battery that usually two hours now only could be used for one hour, then already during him bought that was new.
The Special battery for Power User
If the client you were a person power user that often worked while the long trip, continually undertook the application high-end, or only needed the power more, you must carry out the more extreme action: bought the new battery as back up, the battery extended universal, or even laptop that was newer that processor him has been maximized so as the period could with the battery be longer. The battery extended universal could operate between 6 to 10 hours and could be filled up repeated until 80 percent in time 4 hours. They were lithium the ion, so did not have the problem “memory effect”. His price revolved between 250 and 800 American dollar depended the length of time that was wanted. His dimension approximately 0.5” x 8.5” x 11” seriously around 2 pound. They are usually supplemented with the guarantee for 6 months and could be used in heterogeneous the kind laptop.
The Analyze step
From analyzed the problem of the power with checked how many the power that was used laptop. Further, the evaluation of the health of the battery and if being needed the substitute with battery Lithium Ion, that could easily was found with used search engine or by contacting the manufacturer. Finally, if the fund sufficed and was needed by the power more, bought laptop with technology processor newest and the battery extended universal.
Extended the Period with the Battery
The battery had the number of limited powers and even more that were carried out laptop, increasingly fast his power will be finished. Along with was several suggestions to really with the long battery: used the electricity plug if enabled. The application by many graphic, like games, or even watched DVD in laptop, could reduce the battery power in a signifi manner would. Avoid this activity until you used the electricity plug or reduced the resolution. Your Laptop will dismiss the commemorative sound when the battery power has almost been finished. You could arrange when the voice sounded from tab Alarm to Power Options. There were two setting that could be activated by you: Low battery alarm and Critical battery alarm. After chose, you could determine the kind alarm that was used, alarm with the sound and/or message. Few laptop was supplemented with the switch or utility to change brightness the screen. The LCD screen was one of the users of the biggest battery power so each reduction that was carried out by you will help extended the period with the battery.
You could use Hardware Profi le to turn off certain equipment that was not needed at the time. For example, you did not need drive CD/DVD then you could make profile to kill him and saved the power. The other method to confirm battery worked maximal was by taking off all peripheral that was not needed from laptop. For example, if having USB equipment that was not used by you then released them. Checked tab Advanced to Power Options and chose the action that was carried out when you close laptop or when you pressed the switch power. If you kept the battery and not used it, tried to get his capacity still remained approximately 40 percent. Don't opened too many programs at the time of that simultaneously. Be closed that was not needed to you not often used the CPU power and memory. The battery just came with the condition to have to be filled and charged was full before being used.
Better the contents be full and emptied the battery of two to four times to be able to achieve the maximum capacity. Guard the battery stayed clean. There is good him you cleaned the battery part that was dirty with cotton cloth and alcohol. This to the connection between the battery and laptop stayed good. Don't let the battery be kept still too long. Better use the battery at least very much every time two or three weeks. If the battery was not used for a long time, carried out the exercise as in the case of against the new battery. If you will not use the battery for a month or more, better kept in the clean, dry, cool and far from hot place and metal. The battery NiCad, NiMH and Lithium the Ion would mengosong personally while being kept; don't forget to train them before being used. Add RAM if could, because this will reduce the burden harddisk.
Used freeware power management like Power Center 2,12. Disable Auto Insert Notification in drive CD/DVD. Turn off AutoSave feature. Disable fitur automatic formatter, spell checker, and auto recalculate. Use the disc program caching like Norton Utilities to reduce time of disk access. If you had the battery back up, with in a changing manner with the battery that at this time was used. Used fitur Standby or Hibernate when resting. Use the smaller program if enabled (for example WordPad as the replacement Word).
Standby vs Hibernate
When was not using laptop and wanted to reduce the use of the battery without must turn off totally, you had two choices: Standby and Hibernate. Hibernation worked by making the image in harddisk and considering file, the folder and the application that were opened when you chose Hibernate. When lighted laptop came back the system would boot and returned to the situation originally with item that was same in the screen. Although depending to how many the power that was kept to harddisk, undertook laptop from hibernation far more faster from boot normally. When choosing resources, Standby possibly better if you will leave laptop for several hours or more. This will send the system to mode the power that was smaller by the fast profit of summary time when you wanted to begin to work again. If you wanted to postpone the activity for longer time, for example for a night, then Hibernate possibly the best choice.
You could use Hardware Profi le to turn off certain equipment that was not needed at the time. For example, you did not need drive CD/DVD then you could make profile to kill him and saved the power. The other method to confirm battery worked maximal was by taking off all peripheral that was not needed from laptop. For example, if having USB equipment that was not used by you then released them. Checked tab Advanced to Power Options and chose the action that was carried out when you close laptop or when you pressed the switch power. If you kept the battery and not used it, tried to get his capacity still remained approximately 40 percent. Don't opened too many programs at the time of that simultaneously. Be closed that was not needed to you not often used the CPU power and memory. The battery just came with the condition to have to be filled and charged was full before being used.
Better the contents be full and emptied the battery of two to four times to be able to achieve the maximum capacity. Guard the battery stayed clean. There is good him you cleaned the battery part that was dirty with cotton cloth and alcohol. This to the connection between the battery and laptop stayed good. Don't let the battery be kept still too long. Better use the battery at least very much every time two or three weeks. If the battery was not used for a long time, carried out the exercise as in the case of against the new battery. If you will not use the battery for a month or more, better kept in the clean, dry, cool and far from hot place and metal. The battery NiCad, NiMH and Lithium the Ion would mengosong personally while being kept; don't forget to train them before being used. Add RAM if could, because this will reduce the burden harddisk.
Used freeware power management like Power Center 2,12. Disable Auto Insert Notification in drive CD/DVD. Turn off AutoSave feature. Disable fitur automatic formatter, spell checker, and auto recalculate. Use the disc program caching like Norton Utilities to reduce time of disk access. If you had the battery back up, with in a changing manner with the battery that at this time was used. Used fitur Standby or Hibernate when resting. Use the smaller program if enabled (for example WordPad as the replacement Word).
Standby vs Hibernate
When was not using laptop and wanted to reduce the use of the battery without must turn off totally, you had two choices: Standby and Hibernate. Hibernation worked by making the image in harddisk and considering file, the folder and the application that were opened when you chose Hibernate. When lighted laptop came back the system would boot and returned to the situation originally with item that was same in the screen. Although depending to how many the power that was kept to harddisk, undertook laptop from hibernation far more faster from boot normally. When choosing resources, Standby possibly better if you will leave laptop for several hours or more. This will send the system to mode the power that was smaller by the fast profit of summary time when you wanted to begin to work again. If you wanted to postpone the activity for longer time, for example for a night, then Hibernate possibly the best choice.
Free Software To Trace Your Notebook!
For many people, lost notebook could mean to lose some himself. Understand in notebook that was kept by various private matters and that was related to the work, including music, the document, the photograph, the e-mail. Then grateful to the researchers in University of Washington and University of California, San Diego that found the method to return ‘live’ you through the tracker's service notebook was named Adeona. His good news, Adeona this was free and was personal. Like this the procedure software that his name was taken from the name of the goddess of Rome.yang guided children back to his parents. Download software client that was free from Adeona (http://adeona.cs.washington.edu) to one notebook. Software afterwards anonymously sent the note was encoded about the existence notebook to server-server in the Internet.
If notebook that was lost, the user remained download the other program, put username and password, afterwards took this information from server, especially the service storage free that was mentioned OpenDHT. In the Mac Adeona version, snapshot from who that was using notebook that was lost that in fact could be taken through the program freeware that was mentioned isightcapture. Unfortunately Adeona that license open source this could not give the address and the number of the telephone of the thief. That was provided by him was the IP address finally that was used, along with the data about router that was worn to connect to the Internet. Had a supply of these information, said Tadayoshi Kohno (assistant the professor in University of Washington), necessarily authorities could trace the long-sleeved. However according to Aviel Rubin, a professor in Johns Hopskins University, not all information that was received adequate to could find notebook or arrested the thief. “But, this has been a big step. Because without this, notebook you possibly could not return,” he stressed.
Apart from Adeona, has had the commercial product (paid) similar, for example Lojack for Laptops from Absolute Software and PC PhoneHome from Bigradoon. In the USA, Absolute Software has also established the co-operation with police for the affair lost notebook. Compared with Adeona, fitur Lojack also richer. However Lojack and PC PhoneHome not free. Lojack pulled the cost US$ 40 per the year, whereas PC PhoneHome quoted US$ 30.
If notebook that was lost, the user remained download the other program, put username and password, afterwards took this information from server, especially the service storage free that was mentioned OpenDHT. In the Mac Adeona version, snapshot from who that was using notebook that was lost that in fact could be taken through the program freeware that was mentioned isightcapture. Unfortunately Adeona that license open source this could not give the address and the number of the telephone of the thief. That was provided by him was the IP address finally that was used, along with the data about router that was worn to connect to the Internet. Had a supply of these information, said Tadayoshi Kohno (assistant the professor in University of Washington), necessarily authorities could trace the long-sleeved. However according to Aviel Rubin, a professor in Johns Hopskins University, not all information that was received adequate to could find notebook or arrested the thief. “But, this has been a big step. Because without this, notebook you possibly could not return,” he stressed.
Apart from Adeona, has had the commercial product (paid) similar, for example Lojack for Laptops from Absolute Software and PC PhoneHome from Bigradoon. In the USA, Absolute Software has also established the co-operation with police for the affair lost notebook. Compared with Adeona, fitur Lojack also richer. However Lojack and PC PhoneHome not free. Lojack pulled the cost US$ 40 per the year, whereas PC PhoneHome quoted US$ 30.
Tuesday, September 23, 2008
7 quy tắc chọn mua netbook
Mua một chiếc máy tính không bao giờ là đơn giản, đặc biệt là với việc chọn mua một chiếc netbook. Hãy nghe tư vấn của các chuyên gia Computer World.
Laptop mini hay còn gọi là netbook (hoặc một cái tên mới nghe khá ngộ là laptot) là tên gọi của dòng sản phẩm có khả năng di động cao, dễ dàng kết nối Internet, có kích thước màn hình nhỏ (thường từ 7 đến 10 inch), trọng lượng nhẹ (khoảng 1 kg), thời gian dùng của pin lâu (có thể lên đến 8 tiếng) và “đáng yêu” nhất là giá rẻ từ 199 đến 699 USD.
Dựa vào những đặc điểm này của netbook mà các chuyên gia của Computer World có 7 lời khuyên dành cho những người đang chuẩn bị rước nó về nhà.
1. Hãy xác định bạn mua netbook để làm gì và có thể “móc ví” bao nhiêu
Hãy đừng mua netbook nếu cái bạn cần là một laptop với con chip tốc độ cao, màn hình lớn để chơi game, dung lượng bộ nhớ lớn để lưu trữ nhiều bộ phim, RAM và card đồ họa “siêu khủng” để phục vụ cho các công trình thiết kế, đồ án… Có điều là bạn cần phải “chi đậm” cho những chiếc laptop kiểu này.
Thế nhưng với một ví tiền không mấy rủng rỉnh và cái mà bạn cần là lướt web, trò chuyện với bạn bè qua mạng, làm bài tập về nhà, soạn thảo các báo cáo văn bản, lập các bảng tính Excel hay chuẩn bị các bài thuyết trình… nói chung là các công việc khai thác bộ phần mềm văn phòng, netbook sẽ là “ý trung nhân” mà bạn đang tìm kiếm.
2. Hãy mua netbook có màn hình 8,9 inch trở lên
Với một chiếc Eee PC có màn hình 7 inch bạn sẽ nhận ra rằng các trang web không thể hiển thị đầy đủ bởi lý do là màn hình quá nhỏ. Lời khuyên của chuyên gia là hãy mua một chiếc netbook có màn hình từ 8,9 inch trở lên vì với màn hình này bạn sẽ yên tâm là hầu hết các tác vụ đều được hiển thị bình thường mà kích cỡ hay trọng lượng của chiếc netbook gần như không thay đổi. Giá tiền tất nhiên là sẽ đắt hơn nhưng cũng không nhiều.
3. Hãy chọn loại pin 6 cell trở lên nhé
Kể cả là bạn sẽ phải móc ví thêm 50 USD hay chiếc netbook sẽ nặng thêm đôi chút nhưng quá trình sử dụng sau này bạn sẽ thấy một viên pin 6 cell “lợi hại” thế nào so với pin 3 cell mặc định của các nhà sản xuất.
Với pin 3 cell bạn chỉ có thể làm việc được từ 2 đến 3 tiếng nhưng với pin 6 cell, ít nhất bạn cũng có thể sử dụng được lâu gấp đôi, thậm chí với những model Eee PC 1000 hay Eee PC 901 của Asus, pin 6 cell có thể dùng được đến 8 tiếng.
Với một thiết bị di động như netbook, pin là điều kiện sống còn bởi không phải lúc nào chúng ta cũng tìm được một ổ cắm điện 220v khi công việc đang dang dở mà pin lại sắp cạn.
Hiện nay rất mừng là nhiều nhà sản xuất netbook cũng đã bắt đầu bắt chước Asus tích hợp pin 6 cell vào sản phẩm của họ nhưng lại buồn ở chỗ các nhà bán lẻ lại cố tình dùng loại pin 3 cell để giảm giá bán. Chính vì vậy khi đi mua netbook hãy kiểm tra kỹ pin và đòi hỏi đúng loại 6 cell cho dù phải chi thêm chút tiền.
Một lợi ích nữa của loại pin lớn này mà ít người để ý là mặt dưới của chiếc netbook sẽ hơi nhô lên và tạo thành một góc nghiêng rất phù hợp cho việc đánh máy vì cổ tay và bàn tay được thoải mái hơn.
4. Hãy chú ý đến bàn phím
Các chuyên gia của Computer World đã thử đánh máy trên một số loại netbook và kết luận của họ là: Eee PC (Asus), Wind (MSI) và G10IL (Elitegroup) thua xa ClassMate PC của Intel. Khoảng cách giữa các phím trên bàn phím của ClassMate PC rộng hơn và điều đó khiến cho bàn tay của người dùng được thoải mái hơn rất nhiều.
Chuyên gia của Elitegroup nói rằng họ cố tình thiết kế một bàn phím “phẳng” với khoảng cách giữa các phím là rất nhỏ hoặc gần như là không có. Điều đó khiến cho bàn phím của họ đẹp hơn nhưng trong trường hợp này cái đẹp và sự tiện dụng lại không đi liền với nhau.
5. Phần mềm và hệ điều hành Linux
Có 2 vấn đề về phần mềm mà bạn cần chú ý khi mua netbook:
Thứ nhất, một số nhà sản xuất đã cố tình bỏ qua các phần mềm kèm theo cho netbook để giảm giá bán và bao biện rằng người dùng hoàn toàn có thể tải về hàng đống phần mềm miễn phí từ Internet tùy thuộc nhu cầu của họ. Điều đó đúng nhưng liệu mấy ai muốn ngồi download phần mềm khi mà họ muốn mua netbook về để dùng ngay?
Rất may là không phải nhà sản xuất nào cũng làm như thế. Asustek đã tích hợp khá nhiều phần mềm hữu ích trong những phiên bản Eee PC 1000, 1000H và 901 của họ. Acer thậm chí còn chơi trội khi tặng luôn người dùng phần mềm tăng tốc khởi động máy chỉ mất 12 giây.
Thứ hai, Hãy thử hệ điều hành Linux
Phần mềm tăng tốc khởi động chỉ mất 12 giây của Acer thực ra chỉ hoạt động trên nền hệ điều hành Linpus Linux Lite OS. Hầu hết tất cả netbook chạy trên Linux đều có tốc độ nhanh hơn hẳn.
Đừng lo Linux khó sử dụng vì bạn chỉ quen với Windows, đã có nhiều người thử và cho biết 2 hệ điều hành này không khác nhau nhiều lắm. Với Linux bạn có thể sử dụng vô số chương trình miễn phí trên Internet như bộ phần mềm văn phòng Open Office, Google Pack, StarOffice của hãng Sun hoặc bộ ứng dụng chạy trên web của Google.
6. Nếu netbook có giá trên 500 USD. Quên nó đi!
Giá của netbook hiện nay rất đa dạng nhưng nếu vượt qua mức giá 500 USD, netbook bắt đầu phải cạnh tranh với anh bạn laptop với đầy đủ tính năng hơn và mạnh mẽ hơn.
Ngày nay, không ít hãng sản xuất đã cho ra đời những model laptop có giá cực mềm mà vẫn không giảm cấu hình của máy. Với khoảng 550 USD trở lên người dùng đã có vô số sự lựa chọn trong đó có cả những laptop có khả năng “đối đầu” với netbook về độ gọn nhẹ.
Hãy bình tĩnh, đừng để người bán “dụ” bạn bỏ ra hơn 500 USD và mua về 1 "em" netbook.
7. Hãy nhìn ra xung quanh và mở rộng sự lựa chọn
Có rất nhiều netbook đáng để bạn phải cân nhắc và lựa chọn. Thương hiệu là một điều quan trọng nhưng đừng để những chiêu câu khách của các chuyên gia marketing làm bạn “mờ mắt”.
Đôi khi khách hàng phải đứng trước một bài toán hóc búa với nhiều tham số như: giá thành, tính năng, trọng lượng, khả năng kết nối… Nhưng hãy tập trung vào một số thành phần chính với tiêu chí thỏa mãn càng nhiều càng tốt với cùng một mức giá.
Tổng kết lại, lời khuyên mà các chuyên gia đưa ra là một chiếc netbook tốt phải thỏa mãn các điều kiện sau đây: độ lớn màn hình (8,9 inch trở lên), pin (6 cell), ổ cứng (nếu có ổ cứng loại SSD là tốt nhất), và chuẩn giao tiếp không dây (kết nối Wi-Fi, Bluetooth…) và giá bán dưới 500 USD.
Laptop mini hay còn gọi là netbook (hoặc một cái tên mới nghe khá ngộ là laptot) là tên gọi của dòng sản phẩm có khả năng di động cao, dễ dàng kết nối Internet, có kích thước màn hình nhỏ (thường từ 7 đến 10 inch), trọng lượng nhẹ (khoảng 1 kg), thời gian dùng của pin lâu (có thể lên đến 8 tiếng) và “đáng yêu” nhất là giá rẻ từ 199 đến 699 USD.
Dựa vào những đặc điểm này của netbook mà các chuyên gia của Computer World có 7 lời khuyên dành cho những người đang chuẩn bị rước nó về nhà.
1. Hãy xác định bạn mua netbook để làm gì và có thể “móc ví” bao nhiêu
Hãy đừng mua netbook nếu cái bạn cần là một laptop với con chip tốc độ cao, màn hình lớn để chơi game, dung lượng bộ nhớ lớn để lưu trữ nhiều bộ phim, RAM và card đồ họa “siêu khủng” để phục vụ cho các công trình thiết kế, đồ án… Có điều là bạn cần phải “chi đậm” cho những chiếc laptop kiểu này.
Thế nhưng với một ví tiền không mấy rủng rỉnh và cái mà bạn cần là lướt web, trò chuyện với bạn bè qua mạng, làm bài tập về nhà, soạn thảo các báo cáo văn bản, lập các bảng tính Excel hay chuẩn bị các bài thuyết trình… nói chung là các công việc khai thác bộ phần mềm văn phòng, netbook sẽ là “ý trung nhân” mà bạn đang tìm kiếm.
2. Hãy mua netbook có màn hình 8,9 inch trở lên
Với một chiếc Eee PC có màn hình 7 inch bạn sẽ nhận ra rằng các trang web không thể hiển thị đầy đủ bởi lý do là màn hình quá nhỏ. Lời khuyên của chuyên gia là hãy mua một chiếc netbook có màn hình từ 8,9 inch trở lên vì với màn hình này bạn sẽ yên tâm là hầu hết các tác vụ đều được hiển thị bình thường mà kích cỡ hay trọng lượng của chiếc netbook gần như không thay đổi. Giá tiền tất nhiên là sẽ đắt hơn nhưng cũng không nhiều.
3. Hãy chọn loại pin 6 cell trở lên nhé
Kể cả là bạn sẽ phải móc ví thêm 50 USD hay chiếc netbook sẽ nặng thêm đôi chút nhưng quá trình sử dụng sau này bạn sẽ thấy một viên pin 6 cell “lợi hại” thế nào so với pin 3 cell mặc định của các nhà sản xuất.
Với pin 3 cell bạn chỉ có thể làm việc được từ 2 đến 3 tiếng nhưng với pin 6 cell, ít nhất bạn cũng có thể sử dụng được lâu gấp đôi, thậm chí với những model Eee PC 1000 hay Eee PC 901 của Asus, pin 6 cell có thể dùng được đến 8 tiếng.
Với một thiết bị di động như netbook, pin là điều kiện sống còn bởi không phải lúc nào chúng ta cũng tìm được một ổ cắm điện 220v khi công việc đang dang dở mà pin lại sắp cạn.
Hiện nay rất mừng là nhiều nhà sản xuất netbook cũng đã bắt đầu bắt chước Asus tích hợp pin 6 cell vào sản phẩm của họ nhưng lại buồn ở chỗ các nhà bán lẻ lại cố tình dùng loại pin 3 cell để giảm giá bán. Chính vì vậy khi đi mua netbook hãy kiểm tra kỹ pin và đòi hỏi đúng loại 6 cell cho dù phải chi thêm chút tiền.
Một lợi ích nữa của loại pin lớn này mà ít người để ý là mặt dưới của chiếc netbook sẽ hơi nhô lên và tạo thành một góc nghiêng rất phù hợp cho việc đánh máy vì cổ tay và bàn tay được thoải mái hơn.
4. Hãy chú ý đến bàn phím
Các chuyên gia của Computer World đã thử đánh máy trên một số loại netbook và kết luận của họ là: Eee PC (Asus), Wind (MSI) và G10IL (Elitegroup) thua xa ClassMate PC của Intel. Khoảng cách giữa các phím trên bàn phím của ClassMate PC rộng hơn và điều đó khiến cho bàn tay của người dùng được thoải mái hơn rất nhiều.
Chuyên gia của Elitegroup nói rằng họ cố tình thiết kế một bàn phím “phẳng” với khoảng cách giữa các phím là rất nhỏ hoặc gần như là không có. Điều đó khiến cho bàn phím của họ đẹp hơn nhưng trong trường hợp này cái đẹp và sự tiện dụng lại không đi liền với nhau.
5. Phần mềm và hệ điều hành Linux
Có 2 vấn đề về phần mềm mà bạn cần chú ý khi mua netbook:
Thứ nhất, một số nhà sản xuất đã cố tình bỏ qua các phần mềm kèm theo cho netbook để giảm giá bán và bao biện rằng người dùng hoàn toàn có thể tải về hàng đống phần mềm miễn phí từ Internet tùy thuộc nhu cầu của họ. Điều đó đúng nhưng liệu mấy ai muốn ngồi download phần mềm khi mà họ muốn mua netbook về để dùng ngay?
Rất may là không phải nhà sản xuất nào cũng làm như thế. Asustek đã tích hợp khá nhiều phần mềm hữu ích trong những phiên bản Eee PC 1000, 1000H và 901 của họ. Acer thậm chí còn chơi trội khi tặng luôn người dùng phần mềm tăng tốc khởi động máy chỉ mất 12 giây.
Thứ hai, Hãy thử hệ điều hành Linux
Phần mềm tăng tốc khởi động chỉ mất 12 giây của Acer thực ra chỉ hoạt động trên nền hệ điều hành Linpus Linux Lite OS. Hầu hết tất cả netbook chạy trên Linux đều có tốc độ nhanh hơn hẳn.
Đừng lo Linux khó sử dụng vì bạn chỉ quen với Windows, đã có nhiều người thử và cho biết 2 hệ điều hành này không khác nhau nhiều lắm. Với Linux bạn có thể sử dụng vô số chương trình miễn phí trên Internet như bộ phần mềm văn phòng Open Office, Google Pack, StarOffice của hãng Sun hoặc bộ ứng dụng chạy trên web của Google.
6. Nếu netbook có giá trên 500 USD. Quên nó đi!
Giá của netbook hiện nay rất đa dạng nhưng nếu vượt qua mức giá 500 USD, netbook bắt đầu phải cạnh tranh với anh bạn laptop với đầy đủ tính năng hơn và mạnh mẽ hơn.
Ngày nay, không ít hãng sản xuất đã cho ra đời những model laptop có giá cực mềm mà vẫn không giảm cấu hình của máy. Với khoảng 550 USD trở lên người dùng đã có vô số sự lựa chọn trong đó có cả những laptop có khả năng “đối đầu” với netbook về độ gọn nhẹ.
Hãy bình tĩnh, đừng để người bán “dụ” bạn bỏ ra hơn 500 USD và mua về 1 "em" netbook.
7. Hãy nhìn ra xung quanh và mở rộng sự lựa chọn
Có rất nhiều netbook đáng để bạn phải cân nhắc và lựa chọn. Thương hiệu là một điều quan trọng nhưng đừng để những chiêu câu khách của các chuyên gia marketing làm bạn “mờ mắt”.
Đôi khi khách hàng phải đứng trước một bài toán hóc búa với nhiều tham số như: giá thành, tính năng, trọng lượng, khả năng kết nối… Nhưng hãy tập trung vào một số thành phần chính với tiêu chí thỏa mãn càng nhiều càng tốt với cùng một mức giá.
Tổng kết lại, lời khuyên mà các chuyên gia đưa ra là một chiếc netbook tốt phải thỏa mãn các điều kiện sau đây: độ lớn màn hình (8,9 inch trở lên), pin (6 cell), ổ cứng (nếu có ổ cứng loại SSD là tốt nhất), và chuẩn giao tiếp không dây (kết nối Wi-Fi, Bluetooth…) và giá bán dưới 500 USD.
Wednesday, April 23, 2008
Cách đấu dây mạng (Cáp chéo - Cáp thẳng)
Dây mạng CAT-5 (UTP) có 8 sợi được xoắn thành 4 cập: Trắng Cam - Cam, Trắng Dương - Dương, Trắng Lá - Lá, Trắng Nâu - Nâu và việc bấm dây mạng được bấm theo 2 chuẩn A và B
Chuẩn A:
Chân 1 - Trắng Lá
Chân 2 - Lá
Chân 3 - Trắng Cam
Chân 4 - Dương
Chân 5 - Trắng Dương
Chân 6 - Cam
Chân 7 - Trắng Nâu
Chân 8 - Nâu
Chuẩn B:
Chân 1 - Trắng Cam
Chân 2 - Cam
Chân 3 - Trắng Lá
Chân 4 - Dương
Chân 5 - Trắng Dương
Chân 6 - Lá
Chân 7 - Trắng Nâu
Chân 8 - Nâu
Nếu bạn bấm cả 2 đầu cùng 1 chuẩn (A - A hoặc B - B ) thì gọi là bấm thẳng, dùng để nối từ máy đến Hub/Switch. Còn nếu bạn dùng 1 đầu chuẩn A và 1 đầu chuẩn B thì gọi là bấm chéo, dùng để nối 2 máy tính lại với nhau mà không dùng Hub/Switch.
Chuẩn A:
Chân 1 - Trắng Lá
Chân 2 - Lá
Chân 3 - Trắng Cam
Chân 4 - Dương
Chân 5 - Trắng Dương
Chân 6 - Cam
Chân 7 - Trắng Nâu
Chân 8 - Nâu
Chuẩn B:
Chân 1 - Trắng Cam
Chân 2 - Cam
Chân 3 - Trắng Lá
Chân 4 - Dương
Chân 5 - Trắng Dương
Chân 6 - Lá
Chân 7 - Trắng Nâu
Chân 8 - Nâu
Nếu bạn bấm cả 2 đầu cùng 1 chuẩn (A - A hoặc B - B ) thì gọi là bấm thẳng, dùng để nối từ máy đến Hub/Switch. Còn nếu bạn dùng 1 đầu chuẩn A và 1 đầu chuẩn B thì gọi là bấm chéo, dùng để nối 2 máy tính lại với nhau mà không dùng Hub/Switch.
Saturday, January 19, 2008
Total Video Converter version 3.11
Total Video Converter (TVC) là chương trình chuyển đổi định dạng file multimedia toàn diện nhất hiện nay. Không những giúp bạn trích xuất nhanh chóng nhạc audio từ các file video, chuyển đổi qua lại giữa các định dạng file audio và video khác nhau, TVC còn cho phép chuyển những định dạng multimedia dành riêng cho điện thoại di động sang những định dạng sử dụng trên máy vi tính và thực hiện theo tiến trình ngược lại. TVC chắc chắn là “bảo bối” không thể thiếu trong hành trang của các tín đồ âm nhạc.
TVC có thể đọc được những định dạng: rm, rmvb, mp4, 3gp, 3g2, psp, mpg, mpeg, vob, asf, wmv, avi, flv, mov, fli, flc, gif, dv (định dạng video); cda, mp3, mp2, wav, wma, ra, ogg, amr, ac3, au, swf (định dạng audio) và một số định dạng video sử dụng trên các hệ máy chơi game. Đồng thời hổ trợ trích xuất file dưới các định dạng: mp4, 3gp, 3g2, psp, mpg, mpeg, avi, swf, flv, gif, mov, fli, flc, dv, mp3, mp2, wav, wma, ogg, amr, ac3, au, mp4 audio.
1. Từ giao diện chính của chương trình, bạn bấm vào thẻ New Task, chọn ra những file muốn convert, tiếp đó bấm vào thẻ Convert Now. Trong cửa sổ Please select the format to be converted xuất hiện, chương trình sẽ đưa ra 23 định dạng file multimedia khác nhau để bạn tùy chọn. Bạn bấm vào thẻ tương ứng với định dạng file muốn trích xuất.
2. Trước khi convert, bạn bấm vào thẻ Settings để xác lập một vài thông số quan trọng cho các file audio hoặc video sẽ được tạo ra. Trong cửa sổ Options, tại tab Audio Option, bạn lựa chọn mức Sample rate và tần số bit cho các file audio. Tại tab Video Option, bạn lựa chọn số khung hình trên giây và tần số bit cho các file video. Tại tab Video Resize, bạn có thể xác định lại kích thước khung hình cho các file video. Sau khi chọn ra các thông số vừa ý, bạn bấm OK.
3. Tại mục Default Converted Folder, bạn bấm vào nút dấu ba chấm và chọn ra một thư mục mặc định sẽ lưu lại những file được trích xuất. Nếu muốn duyệt thử trước những file này, bạn bấm vào nút Play trên công cụ Media Player của TVC. Sau cùng, bấm vào thẻ Convert Now để bắt đầu tiến trình chuyển đổi.
Total Video Converter is a total solution for video conversion which supports reading, playing lots of video and audio formats and converting them to popular video formats. Total Video Converter includes a powerful media conversion engine internally so that you can convert media files with very fast speed.
Total Video Converter supports reading the following file formats:
Video Formats:
. Rmvb(.rm,.rmvb)
. MPEG4(.mp4)
. 3gp(.3gp, 3g2)
. Game Psp(.psp)
. MPEG1(.mpg, mpeg)
. MPEG2 PS (.mpg, mpeg, vob)
. MPEG2 TS (DVB Transport Stream)
. Ms ASF(.asf, .wmv)
. Ms AVI(.avi)
. Macromedia Flash video FLV (.flv)
. Real Video (rm)
. Apple Quicktime(.mov)
. FLIC format(.fli, .flc)
. Gif Animation(.gif)
. DV (.dv)
. Video Formats Dx9 Directshow can open
Audio Formats:
. CD audio(.cda)
. MPEG audio(.mp3, mp2)
. Ms WAV(.wav)
. Ms WMA(.wma)
. Real Audio (.ra)
. OGG(.ogg)
. Amr audio(.amr)
. AC3(.ac3)
. SUN AU format (.au)
. Macromedia Flash embedded audio(.swf)
. Audio Formats Dx9 Directshow can open
Game Video Formats:
. Technologies format, used in some games(.4xm)
. Playstation STR
. Id RoQ used in Quake III, Jedi Knight 2, other computer games
. format used in various Interplay computer games,Interplay MVE
. multimedia format used in Origin's Wing Commander III computer game,WC3 Movie
. used in many Sega Saturn console games, Sega FILM/CPK
. Multimedia formats used in Westwood Studios games, Westwood Studios VQA/AUD
. Used in Quake II, Id Cinematic (.cin)
. used in Sierra CD-ROM games, Sierra VMD
. used in Sierra Online games, .sol files
. Electronic Arts Multimedia, Matroska
. used in various EA games; files have extensions like WVE and UV2
. Nullsoft Video (NSV) format
Your registration code (serial number) is:
2b020f2e-6cacff32-e0c6f7d8-6908e728-631a0cd3-486b2dea-57b06da7-9d 9caf63-01058309-dc271669-3f75c0b8-485e0391-d6dcb468-c1a64cd1-e3903719-e a2d4e53
6fe8f04c-d7bcfe45-1b0d2b19-56fd30d0-d99ee730-2fb44e5c-fd10 cdd9-8d74ee33-35aed210-cda4d8d9-b0d37e1d-f04647b8-4b93e798-ee6f4917-ae1 7b520-1036f199
09ab6405-d46a2261-4e4e5259-4726b550-b62f326b-5822cd 08-222d339c-8af1c174-973c9d7c-657758e4-88a658a5-8234a057-c0ee6e5f-4b2e8 20b-d05dfae7-1d2c0deb
65e0144c-35e309f0-08b97d3c-2084b769-5dcdefb7 -dbc51fc1-fc936bbd-50f15bcf-c2c6a93b-f1d394fc-bd3739f0-d74fae75-944a8a3 f-b2953af9-c7eac0ed-17ce6bdf
0361fc99-d88d03f1-26faaf7c-0b6283b4-5 0a5ca60-25f5b887-9ecb3770-69644216-758e560c-9695f862-f06d8c89-ab4e06d6- b8ee07e9-a199f27f-9f771161-c60734fa
39ab36fb-c6514193-fbfb2813-7af f6e69-9b1b3e86-f3516d31-ade0a0bf-9555e085-efc16718-8b1657fa-670d910f-81 abb545-47410ece-f81e86a6-943cd527-f36f8e71
9972a7c8-469acdd6-6261c 8d0-77df7dda-7eaf199e-41d1d317-c602e420-ad245087-e84b94dd-9935e807-61d3 b33a-8aaf6ec3-a7c8c1d4-2b8fd1c3-57ba6b3f-4bbf4bbe
44f17ad7-b22a874 6-10323508-b696ea4f-4ddca135-94005d3c-ad7be54e-3c943332-3e4243c8-103b99 a2-1fa50d46-10e30562-204f4594-a843f5a9-d3674712-0e9b7f37
73efbd4d- cc644100-1896a35a-b80989ed-027e2e5f-46cad92f-048c9ae3-5170260c-589465a9 -f86d139e-70c55e09-00077610-b520c962-e4f027d5-ccdce7f7-bb355ebc
42 4344b3-28f88cc5-b6f90bda-6ab0c6cd-d6799952-db2f6d0e-83383612-0a30de42-dc298ee0-d97703d4-e4bacacb-e82c3cb0-20036817-47755890-291e2b67-67260fbf
91fccb67-ab57a3ca-2c745820-e8867116-6f730e27-53ff8112-c3af6d1c-931e086f-2df03816-b0036982-36c029f8-5a0b4fe8-cb4bc250-8a0c1af3-7a08ff52-bd 95b51b
25ed51de-f800673e-80bd22a9-fdb5a33d-9cac4498-b5ba3f3f-a0da1 c5c-590e5685-77d14e97-5246b599-bc539b39-d6201de4-fe4746e6-e75d5947-0244 7fe6-d9e1cea3
6e3a3776-d57e385c-b9657f1f-cdc9d7fc-8dc1773c-5db9de6 2-2e9b03ae-0c25de4e-c6189255-37ca1d4c-c26699e9-740b548b-ca24d388-ec488b 17-52d64556-0081422d
0578921f-e5c3653e-e7825447-9ec4866b-e7254c5a-70c1e181-4febd240-751cb335-29efc3ba-5b5e52ec-e0dae883-237a8fd2-9ef0fda3-c1f78507-808f15bf-53575bb7
TVC có thể đọc được những định dạng: rm, rmvb, mp4, 3gp, 3g2, psp, mpg, mpeg, vob, asf, wmv, avi, flv, mov, fli, flc, gif, dv (định dạng video); cda, mp3, mp2, wav, wma, ra, ogg, amr, ac3, au, swf (định dạng audio) và một số định dạng video sử dụng trên các hệ máy chơi game. Đồng thời hổ trợ trích xuất file dưới các định dạng: mp4, 3gp, 3g2, psp, mpg, mpeg, avi, swf, flv, gif, mov, fli, flc, dv, mp3, mp2, wav, wma, ogg, amr, ac3, au, mp4 audio.
1. Từ giao diện chính của chương trình, bạn bấm vào thẻ New Task, chọn ra những file muốn convert, tiếp đó bấm vào thẻ Convert Now. Trong cửa sổ Please select the format to be converted xuất hiện, chương trình sẽ đưa ra 23 định dạng file multimedia khác nhau để bạn tùy chọn. Bạn bấm vào thẻ tương ứng với định dạng file muốn trích xuất.
2. Trước khi convert, bạn bấm vào thẻ Settings để xác lập một vài thông số quan trọng cho các file audio hoặc video sẽ được tạo ra. Trong cửa sổ Options, tại tab Audio Option, bạn lựa chọn mức Sample rate và tần số bit cho các file audio. Tại tab Video Option, bạn lựa chọn số khung hình trên giây và tần số bit cho các file video. Tại tab Video Resize, bạn có thể xác định lại kích thước khung hình cho các file video. Sau khi chọn ra các thông số vừa ý, bạn bấm OK.
3. Tại mục Default Converted Folder, bạn bấm vào nút dấu ba chấm và chọn ra một thư mục mặc định sẽ lưu lại những file được trích xuất. Nếu muốn duyệt thử trước những file này, bạn bấm vào nút Play trên công cụ Media Player của TVC. Sau cùng, bấm vào thẻ Convert Now để bắt đầu tiến trình chuyển đổi.
Total Video Converter is a total solution for video conversion which supports reading, playing lots of video and audio formats and converting them to popular video formats. Total Video Converter includes a powerful media conversion engine internally so that you can convert media files with very fast speed.
Total Video Converter supports reading the following file formats:
Video Formats:
. Rmvb(.rm,.rmvb)
. MPEG4(.mp4)
. 3gp(.3gp, 3g2)
. Game Psp(.psp)
. MPEG1(.mpg, mpeg)
. MPEG2 PS (.mpg, mpeg, vob)
. MPEG2 TS (DVB Transport Stream)
. Ms ASF(.asf, .wmv)
. Ms AVI(.avi)
. Macromedia Flash video FLV (.flv)
. Real Video (rm)
. Apple Quicktime(.mov)
. FLIC format(.fli, .flc)
. Gif Animation(.gif)
. DV (.dv)
. Video Formats Dx9 Directshow can open
Audio Formats:
. CD audio(.cda)
. MPEG audio(.mp3, mp2)
. Ms WAV(.wav)
. Ms WMA(.wma)
. Real Audio (.ra)
. OGG(.ogg)
. Amr audio(.amr)
. AC3(.ac3)
. SUN AU format (.au)
. Macromedia Flash embedded audio(.swf)
. Audio Formats Dx9 Directshow can open
Game Video Formats:
. Technologies format, used in some games(.4xm)
. Playstation STR
. Id RoQ used in Quake III, Jedi Knight 2, other computer games
. format used in various Interplay computer games,Interplay MVE
. multimedia format used in Origin's Wing Commander III computer game,WC3 Movie
. used in many Sega Saturn console games, Sega FILM/CPK
. Multimedia formats used in Westwood Studios games, Westwood Studios VQA/AUD
. Used in Quake II, Id Cinematic (.cin)
. used in Sierra CD-ROM games, Sierra VMD
. used in Sierra Online games, .sol files
. Electronic Arts Multimedia, Matroska
. used in various EA games; files have extensions like WVE and UV2
. Nullsoft Video (NSV) format
Your registration code (serial number) is:
2b020f2e-6cacff32-e0c6f7d8-6908e728-631a0cd3-486b2dea-57b06da7-9d 9caf63-01058309-dc271669-3f75c0b8-485e0391-d6dcb468-c1a64cd1-e3903719-e a2d4e53
6fe8f04c-d7bcfe45-1b0d2b19-56fd30d0-d99ee730-2fb44e5c-fd10 cdd9-8d74ee33-35aed210-cda4d8d9-b0d37e1d-f04647b8-4b93e798-ee6f4917-ae1 7b520-1036f199
09ab6405-d46a2261-4e4e5259-4726b550-b62f326b-5822cd 08-222d339c-8af1c174-973c9d7c-657758e4-88a658a5-8234a057-c0ee6e5f-4b2e8 20b-d05dfae7-1d2c0deb
65e0144c-35e309f0-08b97d3c-2084b769-5dcdefb7 -dbc51fc1-fc936bbd-50f15bcf-c2c6a93b-f1d394fc-bd3739f0-d74fae75-944a8a3 f-b2953af9-c7eac0ed-17ce6bdf
0361fc99-d88d03f1-26faaf7c-0b6283b4-5 0a5ca60-25f5b887-9ecb3770-69644216-758e560c-9695f862-f06d8c89-ab4e06d6- b8ee07e9-a199f27f-9f771161-c60734fa
39ab36fb-c6514193-fbfb2813-7af f6e69-9b1b3e86-f3516d31-ade0a0bf-9555e085-efc16718-8b1657fa-670d910f-81 abb545-47410ece-f81e86a6-943cd527-f36f8e71
9972a7c8-469acdd6-6261c 8d0-77df7dda-7eaf199e-41d1d317-c602e420-ad245087-e84b94dd-9935e807-61d3 b33a-8aaf6ec3-a7c8c1d4-2b8fd1c3-57ba6b3f-4bbf4bbe
44f17ad7-b22a874 6-10323508-b696ea4f-4ddca135-94005d3c-ad7be54e-3c943332-3e4243c8-103b99 a2-1fa50d46-10e30562-204f4594-a843f5a9-d3674712-0e9b7f37
73efbd4d- cc644100-1896a35a-b80989ed-027e2e5f-46cad92f-048c9ae3-5170260c-589465a9 -f86d139e-70c55e09-00077610-b520c962-e4f027d5-ccdce7f7-bb355ebc
42 4344b3-28f88cc5-b6f90bda-6ab0c6cd-d6799952-db2f6d0e-83383612-0a30de42-dc298ee0-d97703d4-e4bacacb-e82c3cb0-20036817-47755890-291e2b67-67260fbf
91fccb67-ab57a3ca-2c745820-e8867116-6f730e27-53ff8112-c3af6d1c-931e086f-2df03816-b0036982-36c029f8-5a0b4fe8-cb4bc250-8a0c1af3-7a08ff52-bd 95b51b
25ed51de-f800673e-80bd22a9-fdb5a33d-9cac4498-b5ba3f3f-a0da1 c5c-590e5685-77d14e97-5246b599-bc539b39-d6201de4-fe4746e6-e75d5947-0244 7fe6-d9e1cea3
6e3a3776-d57e385c-b9657f1f-cdc9d7fc-8dc1773c-5db9de6 2-2e9b03ae-0c25de4e-c6189255-37ca1d4c-c26699e9-740b548b-ca24d388-ec488b 17-52d64556-0081422d
0578921f-e5c3653e-e7825447-9ec4866b-e7254c5a-70c1e181-4febd240-751cb335-29efc3ba-5b5e52ec-e0dae883-237a8fd2-9ef0fda3-c1f78507-808f15bf-53575bb7
Subscribe to:
Comments (Atom)