The Netbook Computer | Article | Dawn Clement

I just found an article that sure throws some light on the subject of netbook computers. I think you’ll find it interesting and here is an excerpt:

The Rise of the Netbook
“Small enough to fit in a purse, powerful enough for computing.”
by Dawn Clement

I’m using Google Documents to write this article on my newly acquired Acer Aspire One. These are important facts because five years ago I never would have deigned to use a computer that didn’t have an internal optical drive of some sort. These days, I’m not so sure I need an optical drive at all on a regular basis. You see, the Aspire belongs to a new class of computers called netbooks. These computers are ultra-portable laptops designed specifically for wireless communication and Internet access. They don’t need optical drives because it is assumed that the user will be accessing online services (i.e., Google Documents) instead of locally stored programs. Eliminating the optical drive and the PCMCIA slot results in a much smaller, much cheaper computer.

My Aspire has an Intel Atom N270 microprocessor with a speed of 1.6GHz, 1GB of RAM, a 160GB SATA HDD, came pre-installed with Windows XP, and cost $299. For comparison, my Dell Inspiron 9400 (yes, the same shiny new Dell that had the nasty malware problems and is now a Linux box) has an Intel Core 2 Duo processor with a speed of 2GHz, 2GB of RAM, a 120GB SATA HDD, also came pre-installed with Windows XP, and cost $1,700.

To read the whole article go to: http://webserver.computoredge.com/online.mvc?article=in1&issue=2733&zone=SD&src=1

Or go to www.computoredge.com and do a search. Enjoy!

“He is a wise man who does not grieve for the things which he has not, but rejoices for those which he has.”– Epictetus

Wi Fi Security | Digital Dave | Computoredge

I learned a few things about Wi-Fi Security in this explanation by Dave in Computoredge Magazine. It may help you too.

When you are using a Wi-Fi connection, or for that matter, anytime you are communicating over the Internet, the only time your information is secure is when you are using a secure (encrypted) connection. In Web browsing, an encrypted connection is accomplished through TLS (Transport Layer Security), previously SSL (Secure Socket Layer). Rather than using the standard port 80 for Web connections, TSL uses port 443. The browser knows this and looks for a valid Security Certificate from the Web site.
In most Web browsers, you can identify a secure TSL page by the “s” in https:// and the “closed padlock” icon on the end of the address field. See the figure below. Anytime you are sending private information over the Web, make sure that these appear. When you log on to the connection, it should be through a secure page. Also, any online business (purchases, banking, etc.) needs to be done through encrypted (TSL) Web pages. (Not all browser versions will display the “closed padlock” icon.)


Figure 2. See the https on the left and the “closed padlock” on the right for a secure (encrypted) Web site.

These browser indications (https and the icon) are not foolproof. If you want be sure that you are at the right Web site, then examine the Security Certificate. (Click on the “closed padlock” icon and select “View certificates.”) The URL, or address, should match the address line. Browsers will give warnings if a Security Certificate doesn’t look right.

You need to understand that most Internet communications are not encrypted and therefore not secure. E-mail is particularly vulnerable since it is rarely ever encrypted. As it bounces from e-mail server to e-mail server on its way to its destination, it can be intercepted. You should never put confidential information (credit card info, Social Security numbers, etc.) into an e-mail.

If you don’t know that you are using an encrypted connection, then you should always treat the Internet communication as vulnerable to public viewing. Plus, none of this protects you from the person looking over your shoulder at the coffee house.

For more information contact Digital Dave at: http://webserver.computoredge.com/online.mvc?article=dave&issue=2727&zone=SD&src=1 or www.computoredge.com

“When defeat comes, accept it as a signal that your plans are not sound, rebuild those plans, and set sail once more toward your coveted goal.”–Napoleon Hill

Google Wave | Email with Instant Messaging | Coming Soon

Google Wave Combines E-mail with Instant Messaging

In my last issue of Computoredge I received interesting news about Google’s exciting new wave. Coming soon! Excerpt below:

Google’s Next Wave

Before launching a new project, Google believes in rethinking how things should have been done in the first place. The company is every bit as innovative as Apple, but without the let’s-own-everything-ourselves culture. Google will develop a new product or system while seeming to have no idea how it can ever make money. Its goal always appears to be, “Let’s build that new system now. We’ll figure out the financial part later.” This is the case with Google Wave, one of the latest new projects from Google.

Google Wave, planned for initial release later this year, could be the future replacement for both the current e-mail system and instant messengers. By rethinking the 40-year-old e-mail system and integrating instant messaging techniques, Google has combined the functionality of both while opening it up to collaboration. Although it is not a totally new way of viewing Internet communications, Wave does pull together the concepts underlying e-mail, instant messaging and network meetings.

Google Wave is open source. That means Google is making it freely available to developers for building their own apps. While Google will be offering Wave accounts hosted on its own servers, anyone will be able to host their own Wave server, which can either be inside a private network or connected to the wider Google Wave community—your choice. Google Wave is more a protocol for developing communications systems than it is an end product.

You can see the whole article at: http://webserver.computoredge.com/online.mvc?article=toc&issue=2725&zone=SD&src=mailrev

“Only one thing has to change for us to know happiness in our lives: where we focus our attention.”– Greg Anderson

Twitter | Is it a Fad?

Spammers abound in most social networks and Twitter is no different. Only a few of my contacts actually communicates.  Should I stay or should I go? I found an interesting article about Twitter and here is an excerpt. To see the whole article go to www.computoredge.com  

Should I Stay or Should I Go?

“Some call Twitter a “fad,” and it’s uncertain how the model can turn a profit. An April 2009 Nielsen report, “Twitter Quitters,” found that “more than 60 percent of U.S. Twitter users fail to return the following month.” In a June 10, 2009 blog post, Nine Inch Nails lead singer Trent Reznor announced that he’s “out” of the social networking game. Reznor said that the noise outweighs the benefits. Since that post, Reznor continues to contribute, but no longer accepts RTs (return tweets).

While there is some obvious fall-off, Neeman said that the audience is there, and the high amount of active users proves it. “If the audience is well read, technologically savvy and connected to the social media,” Neeman said, “Twitter is great.”

While there may be some changes in store for Twitter, Toliver thinks the concept will remain. “All these sites will evolve. I don’t think there’s any going back, though,” Toliver said. “Now that it’s here, we’re all too curious to see what other people are doing at any given time. I know several people who admit to being addicted.””

Computer Security | Digital Dave | ComputorEdge

“In the last issue of ComputorEdge, Digital Dave gave one of his readers (and us subscribers) some interesting advice on keeping our computers safe. You too may find it useful.

Here it is:

“Since you are a “security nut,” I assume that you have antivirus and anti-spyware software running on your computer. In addition, you should have some sort of firewall protection for your Internet connection. If you haven’t already done so, put in a router between your DSL modem and the computer. The firewall in the router will give you added protection, plus it makes it easy to share the connection with trusted friends and family. This will make it harder for intruders to get onto your network and your computer.

By default, the drives on your computer are not shared. That means that even if someone is on your network, they cannot access the drives on your computer. If you do have reason to share a drive on the network, be sure to add password protection with a strong password.

Generally, your firewall software and the protections built into Firefox should do a pretty good job of blocking outside intrusions. However, once someone gets inside the wall to your computer, either through a virus or spyware, there is little to protect your drives.

Most viruses get in through trickery and our own lapses in judgment. There is no software that will protect us from ourselves. The most important steps to take are in preventing yourself from allowing something nefarious into your system.

• Never download (save) an unverified attachment in an e-mail, link on a Web page, or from a pop-up at a Web site. If it’s an unexpected e-mail from a friend, talk to that friend under separate cover to verify the document sent.

• The Internet browsers have built-in protections to prevent the Web sites from accessing your computer. If you are merely surfing the Web, you are in little danger of being infected. However, if you click on a link, then allow something to be downloaded, the risk begins. There are some add-ons for browsers, such as Adobe Reader and Flash, that can enhance the Web experience and need to be downloaded. Rather than downloading the software from any site that may determine that you need it, you should go directly to the parent site for the software.

• Be suspicious of everything, especially windows that pop up offering to solve your virus problem.

• Only install software that you know comes from a legitimate source. Even then, be cautious. If you are downloading software, be sure that it’s coming from the correct site.

• If you are not sure about something, do a Google search for reviews on the questionable item.

• If reading files is a concern, to further protect your files, you can encrypt files or entire drives to make them unreadable for people without the proper key, which can be kept on a thumb drive. This should stop reading, although not deleting or altering.

The best protection is to prevent problems from ever getting on your computer in the first place.”

Digital Dave at: www.computoredge.com