FRIENDS

Your Ad Here

add

10 reasons why PCs crash U must Know

Thursday, October 2, 2008

Fatal error: the system has become unstable or is busy," it says. "Enter to return to Windows or press Control-Alt-Delete to restart your computer. If you do this you will lose any unsaved information in all open applications."

You have just been struck by the Blue Screen of Death. Anyone who uses Mcft Windows will be familiar with this. What can you do? More importantly, how can you prevent it happening?

1.Hardware conflict

The number one reason why Windows crashes is hardware conflict. Each hardware device communicates to other devices through an interrupt request channel (IRQ). These are supposed to be unique for each device.For example, a printer usually connects internally on IRQ 7. The keyboard usually uses IRQ 1 and the floppy disk drive IRQ 6. Each device will try to hog a single IRQ for itself.If there are a lot of devices, or if they are not installed properly, two of them may end up sharing the same IRQ number. When the user tries to use both devices at the same time, a crash can happen. The way to check if your computer has a hardware conflict is through the following route:* Start-Settings-Control Panel-System-Device Manager.Often if a device has a problem a yellow '!' appears next to its description in the Device Manager. Highlight Computer (in the Device Manager) and press Properties to see the IRQ numbers used by your computer. If the IRQ number appears twice, two devices may be using it.Sometimes a device might share an IRQ with something described as 'IRQ holder for PCI steering'. This can be ignored. The best way to fix this problem is to remove the problem device and reinstall it.Sometimes you may have to find more recent drivers on the internet to make the device function properly. A good resource is www.driverguide.com. If the device is a soundcard, or a modem, it can often be fixed by moving it to a different slot on the motherboard (be careful about opening your computer, as you may void the warranty).When working inside a computer you should switch it off, unplug the mains lead and touch an unpainted metal surface to discharge any static electricity.To be fair to Mcft, the problem with IRQ numbers is not of its making. It is a legacy problem going back to the first PC designs using the IBM 8086 chip. Initially there were only eight IRQs. Today there are 16 IRQs in a PC. It is easy to run out of them. There are plans to increase the number of IRQs in future designs.

2. Bad RamRam

(random-access memory) problems might bring on the blue screen of death with a message saying Fatal Exception Error. A fatal error indicates a serious hardware problem. Sometimes it may mean a part is damaged and will need replacing.But a fatal error caused by Ram might be caused by a mismatch of chips. For example, mixing 70-nanosecond (70ns) Ram with 60ns Ram will usually force the computer to run all the Ram at the slower speed. This will often crash the machine if the Ram is overworked.One way around this problem is to enter the BIOS settings and increase the wait state of the Ram. This can make it more stable. Another way to troubleshoot a suspected Ram problem is to rearrange the Ram chips on the motherboard, or take some of them out. Then try to repeat the circumstances that caused the crash. When handling Ram try not to touch the gold connections, as they can be easily damaged.Parity error messages also refer to Ram. Modern Ram chips are either parity (ECC) or non parity (non-ECC). It is best not to mix the two types, as this can be a cause of trouble.EMM386 error messages refer to memory problems but may not be connected to bad Ram. This may be due to free memory problems often linked to old Dos-based programmes.

3. BIOS settings

Every motherboard is supplied with a range of chipset settings that are decided in the factory. A common way to access these settings is to press the F2 or delete button during the first few seconds of a boot-up.Once inside the BIOS, great care should be taken. It is a good idea to write down on a piece of paper all the settings that appear on the screen. That way, if you change something and the computer becomes more unstable, you will know what settings to revert to.A common BIOS error concerns the CAS latency. This refers to the Ram. Older EDO (extended data out) Ram has a CAS latency of 3. Newer SDRam has a CAS latency of 2. Setting the wrong figure can cause the Ram to lock up and freeze the computer's display.Mcft Windows is better at allocating IRQ numbers than any BIOS. If possible set the IRQ numbers to Auto in the BIOS. This will allow Windows to allocate the IRQ numbers (make sure the BIOS setting for Plug and Play OS is switched to 'yes' to allow Windows to do this.).

4. Hard disk drives

After a few weeks, the information on a hard disk drive starts to become piecemeal or fragmented. It is a good idea to defragment the hard disk every week or so, to prevent the disk from causing a screen freeze. Go to* Start-Programs-Accessories-System Tools-Disk DefragmenterThis will start the procedure. You will be unable to write data to the hard drive (to save it) while the disk is defragmenting, so it is a good idea to schedule the procedure for a period of inactivity using the Task Scheduler.The Task Scheduler should be one of the small icons on the bottom right of the Windows opening page (the desktop).Some lockups and screen freezes caused by hard disk problems can be solved by reducing the read-ahead optimisation. This can be adjusted by going to* Start-Settings-Control Panel-System Icon-Performance-File System-Hard Disk.Hard disks will slow down and crash if they are too full. Do some housekeeping on your hard drive every few months and free some space on it. Open the Windows folder on the C drive and find the Temporary Internet Files folder. Deleting the contents (not the folder) can free a lot of space.Empty the Recycle Bin every week to free more space. Hard disk drives should be scanned every week for errors or bad sectors. Go to* Start-Programs-Accessories-System Tools-ScanDiskOtherwise assign the Task Scheduler to perform this operation at night when the computer is not in use.

5. Fatal OE exceptions and VXD errors

Fatal OE exception errors and VXD errors are often caused by video card problems.These can often be resolved easily by reducing the resolution of the video display. Go to* Start-Settings-Control Panel-Display-SettingsHere you should slide the screen area bar to the left. Take a look at the colour settings on the left of that window. For most desktops, high colour 16-bit depth is adequate.If the screen freezes or you experience system lockups it might be due to the video card. Make sure it does not have a hardware conflict. Go to* Start-Settings-Control Panel-System-Device ManagerHere, select the + beside Display Adapter. A line of text describing your video card should appear. Select it (make it blue) and press properties. Then select Resources and select each line in the window. Look for a message that says No Conflicts.If you have video card hardware conflict, you will see it here. Be careful at this point and make a note of everything you do in case you make things worse.The way to resolve a hardware conflict is to uncheck the Use Automatic Settings box and hit the Change Settings button. You are searching for a setting that will display a No Conflicts message.Another useful way to resolve video problems is to go to* Start-Settings-Control Panel-System-Performance-GraphicsHere you should move the Hardware Acceleration slider to the left. As ever, the most common cause of problems relating to graphics cards is old or faulty drivers (a driver is a small piece of software used by a computer to communicate with a device).Look up your video card's manufacturer on the internet and search for the most recent drivers for it.

6. Viruses

Often the first sign of a virus infection is instability. Some viruses erase the boot sector of a hard drive, making it impossible to start. This is why it is a good idea to create a Windows start-up disk. Go to* Start-Settings-Control Panel-Add/Remove ProgramsHere, look for the Start Up Disk tab. Virus protection requires constant vigilance.A virus scanner requires a list of virus signatures in order to be able to identify viruses. These signatures are stored in a DAT file. DAT files should be updated weekly from the website of your antivirus software manufacturer.An excellent antivirus programme is McAfee VirusScan by Network Associates ( http://www.nai.com/). Another is Norton AntiVirus 2000, made by Symantec ( http://www.symantec.com/).

7. Printers

The action of sending a document to print creates a bigger file, often called a postscript file.Printers have only a small amount of memory, called a buffer. This can be easily overloaded. Printing a document also uses a considerable amount of CPU power. This will also slow down the computer's performance.If the printer is trying to print unusual characters, these might not be recognised, and can crash the computer. Sometimes printers will not recover from a crash because of confusion in the buffer. A good way to clear the buffer is to unplug the printer for ten seconds. Booting up from a powerless state, also called a cold boot, will restore the printer's default settings and you may be able to carry on.

8. Software

A common cause of computer crash is faulty or badly-installed software. Often the problem can be cured by uninstalling the software and then reinstalling it. Use Norton Uninstall or Uninstall Shield to remove an application from your system properly. This will also remove references to the programme in the System Registry and leaves the way clear for a completely fresh copy.The System Registry can be corrupted by old references to obsolete software that you thought was uninstalled. Use Reg Cleaner by Jouni Vuorio to clean up the System Registry and remove obsolete entries. It works on Windows 95, Windows 98, Windows 98 SE (Second Edition), Windows Millennium Edition (ME), NT4 and Windows 2000.Read the instructions and use it carefully so you don't do permanent damage to the Registry. If the Registry is damaged you will have to reinstall your operating system. Reg Cleaner can be obtained from www.jv16.org Often a Windows problem can be resolved by entering Safe Mode. This can be done during start-up. When you see the message "Starting Windows" press F4. This should take you into Safe Mode.Safe Mode loads a minimum of drivers. It allows you to find and fix problems that prevent Windows from loading properly.Sometimes installing Windows is difficult because of unsuitable BIOS settings. If you keep getting SUWIN error messages (Windows setup) during the Windows installation, then try entering the BIOS and disabling the CPU internal cache. Try to disable the Level 2 (L2) cache if that doesn't work.Remember to restore all the BIOS settings back to their former settings following installation.

9. Overheating

Central processing units (CPUs) are usually equipped with fans to keep them cool. If the fan fails or if the CPU gets old it may start to overheat and generate a particular kind of error called a kernel error. This is a common problem in chips that have been overclocked to operate at higher speeds than they are supposed to.

One remedy is to get a bigger better fan and install it on top of the CPU. Specialist cooling fans/heatsinks are available from www.computernerd.com or www.coolit.com

CPU problems can often be fixed by disabling the CPU internal cache in the BIOS. This will make the machine run more slowly, but it should also be more stable.

10. Power supply problems

With all the new construction going on around the country the steady supply of electricity has become disrupted. A power surge or spike can crash a computer as easily as a power cut.If this has become a nuisance for you then consider buying a uninterrupted power supply (UPS). This will give you a clean power supply when there is electricity, and it will give you a few minutes to perform a controlled shutdown in case of a power cut.It is a good investment if your data are critical, because a power cut will cause any unsaved data to be lost.

Read more...

The Difference Between Spyware and Viruses

Shin, a fictional character whose name means "faith" or "trust," sits by his laptop in the living room of his home in Pyongyang, the capital of North Korea. He is busy at work for his boss, dictator Kim Jong-il. His job, to make sure some spyware gets into specific computers at the Pentagon so he can gain vital top secret information. He's particularly interested now that the United States government suspects his country might soon conduct its first nuclear test. With spyware surreptitiously installed on the computers, he could, for instance, engage in the practice of keylogging. In other words, our "trustworthy" Shin could tract the actual keys on the computer hit by the Pentagon officials. This would help him learn their passwords, the content of email messages, encryption keys, or other means to bypass security measures at our nation's defense fortress. Shin's not interested in crashing computers at the Pentagon or making them otherwise operable. That would be too overt and might reveal him. He's simply after information. There are other types of spyware, sometimes called "malware" because they don't actually spy on your computer habits. They might instead just barrage you with annoying popups, for instance. Or they might give you a different home page that isn't of your choosing, like one of an advertiser's. But for the moment those types of malware, or adware as it's sometimes called, aren't very useful for Shin. He wants to use spyware that actually spies. Over on another part of the globe in Turkey, a fictional terrorist sits with his own laptop in a suspected al Qaeda terrist cell. But he's not out to infect computers with spyware. That's child's play. He's out to bring the house down. This story is strictly hypothetical. But let's say the terrorist wanted to disrupt the daily hubub at a major American corporation. He'd infect the computers with a virus! The terrorist might try to attack the company's vast network by inserting a worm into it. Worms reside in RAM, and travel from machine to machine and, unlike the classic viruses, they attack the computers themselves rather than individual files. Very disruptive. This type of virus could potentially make the computers inoperable. Bring down the goings-on at a major corporation by spreading a worm through the computer network, and the terrorist could have a field day. But let's hope not. So to summarize, spyware often keeps track of your computer habits, and viruses are often out to disable computers in some way. Hence the difference.

Read more...

What Is Spyware ?- An Overview Of Spy And Malware

Spywares & Malwares are the most troublesome softwares to appear on the Internet in present.It's a malicious software that can intercept and take control of your computer without your knowledge or consent. When spyware infects a computer system, it may be relatively harmless or it may be devastating. Spyware like coolwebsearch and new.net are capable of paralyzing a computer system. Laws to regulate spyware are pending in many states and may take years to enforce. What Is Spyware? Spyware is any software that collects information about computer usage and/or the computer user. It is installed on one computer and sends information to another computer.Some spywares like the Weather Bug, Bear Share and Kazaa are knowinglydownloaded and installed by users. Other spyware is installed without the knowledge or permission of the user. Different types of spyware exist. so it becomes very difficult to remove them from the infected computers. The most common form of spyware is adware. Adware works through sending one pop up ad after another pop up ad for different products and services while you are working online on your computer. The adware maker is thus able to collect your personal information and then starts bombarding you with spam and junk emails. This can at times become very frustrating to the user. In fact at times spam and junk emails outnumber the normal emails which you receive daily in your mail inbox. How Does Spyware Affect A Computer? Symptoms of spyware infection includes: * Very slow system performance while browsing the Internet. * Your homepage changing mysteriously on its own. * Excessive appearance of pop-ups, on sites likes Google, Yahoo and MSN, which don't use them. * You can only get your browser to visit sites, which are trying to dupe you into buying spy ware removal software. Many spyware detection and elimination programs are easily available for free on the Internet. How Does One Deal With Spyware? Reading spyware reviews can help you in buying the best spyware remover available in the market.There are different types of spyware removers available in the market.There are many tools and catalogues available to deal with spyware. One of these tools is Spybot Search and Destroy.It scans computers for spyware and harmful programs. It shows a list of problem areas to the user and allows him to delete any or all of them. There are some online companies that give its customers free trail of the spyware removers. You can read spyware reviews and find out about sites which provide its customers with such facilities. You can visit such sites and download the software and see for your self if it is effective for you or not. Such offers will help you in buying the spyware remover that will suit your requirements. A user can leave legitimate programs installed by him. These may include peer-to-peer file sharing software or software installed to monitor the on-line activities of children. A Comprehensive Solution It may be a good idea for most computer owners to get a comprehensive PC security solution as a bundle. Norton and McAfee, now offer a complete security suite consisting of anti-virus, personal firewall, anti-spam and privacy offerings, and anti-spy ware. They are quite easy to install and allow parents to monitor children who use the computer. There are many threats on the Internet, from which these suites can protect your computer. The spyware reviews can help you in choosing to buy the remover which best suits your requirements.

Read more...

Why Choose Dial Up ISP Services

Dial up ISP service is the cheapest choice of any of the ISPs and may be a good option for that family on a tight budget. The software upgrades have definitely increased the speed of dial up ISPs, but their speed is still slower than some other options. Dial up ISP service can be purchased from several different companies including Earthlink, AOL, Juno, and others. One of the major issues with dial up ISP service is how long it takes to connect to the internet and disruptions in your connection. Depending upon the time of day and your company, connection can take anywhere from 30 seconds to two to three minutes or longer. Disruptions occur when you lose contact with the provider because of phone line static, storms, or problems at the providers end. This can be very irritating if you are working online or researching and have to keep reconnecting to the internet. When choosing dial up ISP service, choose a company with a long track record and software upgrades rather than the newest, cheapest service on the market. Cheaper does not necessarily translate into better, especially in an ISP service. Read the fine print of your policies. How long can you stay online before being cut off? How many email addresses are allowed per account? Is there a limit on the number of hours a month you can be online without additional charges? Access numbers are a necessity for dial up ISP service since you use the phone line to connect to the internet. Ensure that there are local access numbers for your use so you will not have to pay long distance charges. If you travel, do they have access numbers in a wide variety of locations or, even better, a toll free number for connection? What comes with your dial up ISP account? Do they offer SPAM blocker or virus protection? These are important tools for your internet experience and your computer. SPAM blocker helps to block some of the unsolicited email that you get from sellers and different companies. Although it does not block all of it, it will make a large difference in your email. Virus protection is something that no computer user should be without. It scans incoming email and downloads for viruses that may harm your computer. Dial-up ISP service is a great choice for budget minded people. Although the connection is slow and websites may be slow to load, the cost difference may be more important to some consumers. Think of it like this, if you have dial up service, then while websites load you have time to clean the house and balance your checkbook!

Read more...

Broadband Feature Connections

Broadband Features Available The variety of Internet service providers available is growing as the Internet makes its way into more homes in America. This proliferation of ISP providers makes it difficult to decide which ISP you should subscribe to. To make matters more confusing, most offer a huge list of benefits to entice customers away from their current ISP. What follows is some information on the kind of features that should be available with any good ISP. Security is of uppermost concern. With new viruses invading the Internet everyday, virus protection is a must. A virus blocker is a critical feature for any ISP. Many offer a pop up blocker, too, and this is also a good thing. The ads from pop up blockers can be harmful to your computer in addition to being extremely annoying. This is why ISPs are beginning to have features that not only speed up customer's computer but also make their Internet experience more enjoyable. A good ISP will also have tools to protect your children while they are on the Internet by providing parent-controlled blocks for blocking unwanted adult material. You will also want to have multiple e-mail accounts. This is so common that most ISPs now offer between 5 and 10 e-mail accounts to each subscriber. Now everyone in the family can have their own email account. This way, parents don't have to scroll through a long list of messages and forwards from their children's friends, and the children don't have to skip over their parent's business emails. This is definitely the best solution for families. Finding an ISP with plenty of accounts gives you the option of having family accounts, business accounts and personal accounts. If you have always dreamed of having your own web page, you may be able to get one without any unwanted ads. This is due to the fact that many ISPs now offer a free web space as part of their standard package. This space may be more limited in size than other free web spaces. A good ISP will often have templates and special tools such as counters to help you create the perfect web site. Since some ISPs will not allow you to use a free web site for your business, it is important to check with them about the parameters of free web site use. Another important feature of your ISP should be the opportunity to use it with multiple computers in your home. This service could be free, but may cost you some kind of fee. However, the freedom it provides is worth it. Parents can access things for work online, while at the same time, your son is doing research for a school assignment. The point is that whatever features are important; you should be able to find an ISP that has them. The key is doing your homework on the various ISPs. This is the best way to find the features that you need at a price you can afford.

Read more...

What is Google AdSense?

Adsense has become very popular lately, people even refer to it as the new "internet gold mine". And yes, it is true that Adsense is unique and a very interesting way to earn money on the internet with one or more websites.

AdSense may be one of the fastest and easiest ways to monetize traffic to your web site whether you have products or services for sale or you simply provide free content to your visitors.

Simply stated, Google AdSense enables website operators to place some code on their site that connects to Google’s ad server content database and pulls keyword-relevant advertising onto the web pages. The webmaster gets paid a percentage of the fee that Google receives from the advertiser every time a visitor clicks on an ad. There is no charge for the webmaster to participate in AdSense. All costs are covered by the advertiser who participates in the AdSense sister program called AdWords.

Google’s sends out digital “robots” which use proprietary algorithms to parse the host web page and analyze the content in an effort to determine what keywords are relevant. It reports its findings back to Google’s ad server which then serves ads matching those keywords. Given that the entire process is automated, the “ad robots” do a pretty good job of getting the advertising content right most of the time.

The History of Google AdSense

Google AdSense has its roots in the old “Google Content-Targeted Advertising” program which they introduced back in March of 2003. Although this program was similar in concept to AdSense, there was no automated way of participating. Each webmaster negotiated a deal directly with Google, and websites that served less than 20 million page views per month were not welcome to participate.

As Google grew, they began to see how much money they were leaving on the table by excluding the smaller sites, which greatly outnumbered the sites serving over 20 million hits that were willing to serve other people’s ads. Their answer to that problem was AdSense which has no minimum traffic requirements and is open to all sites meeting Google’s content and decency requirements.

How much can you make running Google AdSense?

The answer to that question depends upon three factors:

1. How much traffic your site draws

2.How many visitors click on your ads

3.How much those ads pay per generated click

With some ads paying as much as $5 or more, it’s possible that you can generate a serious income with AdSense. There are relatively well documented cases of some people earning as much as $500 per DAY and more. Numbers like that are rare exceptions however. Even so, there is no reason why you can’t earn somewhere around $1,000 per month, or more, once you get the hang of it.

How to get started using Google AdSense

Make a visit to Google’s AdSense Site ( https://www.google.com/adsense/ ) and sign up. Make sure that you read their Acceptable Use Policy and that you follow their content requirements. Google has their own “AdSense Police” who will have no problem booting you out of the program if you fail to walk the line.

Using Google AdSense on your site is like collecting free money. There’s no reason not to do it and potentially thousands of dollars worth of reasons to do it.

Start today... treat your AdSense business like it is a REAL business and track what you do.

Read more...

Where’s the best place to put Google Adsense Ads?

Why, on your web pages of course. Ok, just kidding. The real question should be: “Is there really any truth to the rumors that where you place those Google AdSense ads can actually improve response?” According to my best information, the answer to that question is: Yes. Google’s own AdSense experts say that that there is a direct correlation between the placement of the AdSense ads and the resulting clickthrough. When ads are placed in “content zones”, rather than in “advertising zones”, response rates on Google AdWords goes up. There are also indications showing that ads appearing on the right side of the page get clicked more than ads appearing on the left side. Advertising analysts with degrees in human behavior and psychology have spent thousands of man-years (people-years?) studying how people read printed and Internet content and what it takes to get them to respond to ads. While some of these studies are proprietary, or are only available to anyone with $10,000 or more to spend on a copy, other studies have been made public and can be read by anyone who is interested. Google themselves has released some relevant information which is focused directly on increasing your Google AdSense response. You can read their findings here ( https://www.google.com/support/adsense/bin/static.py?page=tips.html ). Of course, all of the studies in the world aren’t worth a hill of beans if the findings don’t work on your web site. That’s why it is important to test, test and test again. Experiment with your Google AdSense placement and track the results over a period of time. Google provides response tracking tools in your AdSense control panel. Learn how to use them. As you begin to see what may be only subtle differences in response, you’ll be able to determine what works best for your particular site. But don’t get complacent. What’s working for you now might not work next month if you change your site design or content. One of the most important factors in determining placement of your ads is the type of content that your site delivers. If you are primarily an e-commerce site, and you have a lot of pictures and ad copy for your own products competing for attention against AdSense ads, then it is going to be a particularly tough challenge getting any kind of decent Google AdSense clickthrough. It is situations like this that require very thorough testing and a lot of trial and error. Blogs seem to have a lot of success generating high response rates to Google AdSense listings. Perhaps it’s because blog readers realize that ad revenue is the only way that their favorite blogmaster can keep the lights on, so the readers think of clicking on ads as a way to make a donation. Regardless of what the experts say, your best bet is to tailor your Google AdSense ad placement to what your own experience shows works best for you. In the end, you’re the only expert who matters.

Read more...

13 Common Mistakes NOT to do with Google AdSense

Before you try to gain some income through Adsense, it might be important for you know exactly what are the mistakes NOT to do with Google AdSense.

1. First Of All ,Do not use fake information when creating your Google AdSense account.

Google says that’s a no-no and they will cut your account off and keep all the money you may have earned. Besides, trying to hide your true identity can cause serious problems with the I.R.S. or whoever your tax authority is.

Keep in mind ,One Account suffices for Multiple websites. You do not need to create 5 accounts for 5 different websites. One account will do. If you live in the fear that if one account is closed down for violation of TOS, believe me they will close all accounts when they find out. You can keep track of clicks by using channels with real time statistics. They will automatically detect the new site and display relevant ads.

2. Do not Try to hack ,change or modify Google AdSense code other than to change the parameters that Google authorizes you to change. There are enough means of adsense optimization & customizations available to change the colour, background or border to suit your needs. Do whatever you want to do outside the code, never fiddle within the ad or the search code.

They know it when you doAny attempt to bypass Google’s built-in algorithms not only poses a danger to the integrity of the network, but it threatens the financial modle that Google operates under. You’re not dealing with some Mom-and-Pop company here, and Google has the legal muscle and deep enough pockets to drag you through every court in the land if you damage their business with your hacking antics.

3. Do not display AdSense ads and a competitor's ads (like Overture's) on the same page at the same time.

That just makes plain good sense. Google doesn’t demand 100% SITE loyalty from you, but they do insist that their own ads not be cluttered up by offerings from their competitors.Never try to create link structures resembling the adsense ads. Never use other competitive search tools on the same pages which have Adsense powered Google search. They do allow affiliate or limited-text links.

4. Place ads only on Content Pages.Keep AdSense ads off of your registration, confirmation, and all "thank you" pages.

Don’t ask me why you can’t put your ads there. It makes sense to me that those would be wonderful locations.Do not mask ad elements. Alteration of colours and border is a facility to blend or contrast ads as per your site requirements. I have seen many sites where the url part is of the same color as the background. While blending the ad with your site is a good idea, hiding relevant components of the ads is not allowed. Also do not block the visibility of ads by overlapping images, pop ups, tables etc.Google thinks however, and doing so is a hanging offense according to their Terms of Service.

5. Do not send your ads by email,Don't "beg for clicks" or provide any incentive for clicking on your Google AdSense ads. They are watching!

This is a biggie and you see this rule violated all the time. Any of the “get paid to do stuff” sites that put Google ads in the member’s control panels are walking the plank and they don’t even realize it. Even those sites with the polite little messages asking you to “help keep my site running by clicking on our sponsor’s ads” are asking to be cut off if those happen to be Google ads.

6. Never click your own adsense ads or get them clicked for whatever reason, even if you are genuinely interested in the product or service and are thinking of buying it!This is a surefire way to close you Adsense account. Never tell your office associates or friends to click on them. Keep a check if your family or children are busy increasing your income by clicking your ads and indirectly trying to stop your income. Dont even think of offering incentives for clicks, using automated clicking tools, or other deceptive software. Adsense is very smart to detect fraudulent clicks. Check the ads which appear on your pages by the Google Preview tool if required.Nothing screams FRAUD louder than a webmaster running up his or her own click counts by happily clicking on ads fromtheir own site. The Google Gods can track this activity and it won’t be long until you find yourself getting a goodbye note from their fraud team.

7. No misleading labelingGoogle is very specific about what text can be placed around their ads. Their Terms of Service state: “Publishers may not label the ads with text other than ‘sponsored links’ or ‘advertisements.’ This includes any text directly above our ads that could be confused with, or attempt to be associated with Google ads.”This is to keep visitors from becoming confused and barking up Google’s tree when they clicked on an ad that led to a porn site instead of the recipe site they were expecting to visit.

8. Don’t advertise anything on Google’s prohibited items list.It’s a lot shorter lists than PayPal’s or eBay’s, but it includes a lot of the same stuff like hacking/cracking content, porn, illegal drugs, gambling sites, beer or hard alcohol (I guess wine is OK), weapons, and the other usual stuff.

9. Avoid excessive advertising ,keyword spamming and other divisive tricksYou may be tempted to buy one of those “generates thousands of key-word rich pages in seconds” programs that are so popular these days but I’ll tell you this: Their days are numbered. Google is wise to such shenanigans and they will be hot on your trail. Other prohibited gimmicks include:

• ”Sneaky” page redirects that send a visitor off to a different site then they were expecting to visit.• Excessive outbound links on any page. Google recommends no more than 100. I’d keep it way below that.

• Multiple sites, domains, pages, etc. which have substantially duplicate content.

• Hidden text or links of any type.

• And here is a nugget of wisdom straight from Google’s mouth: “Do not participate in link schemes designed to increase your site's ranking or PageRank. In particular, avoid links to web spammers or "bad neighborhoods" on the web as your website may be affected adversely by those links.

10. Do not place more than 3 ad unit and 1 ad links or 2 adsense search boxes on any web page. Anyway, ads will not appear in those units even if you place more ad units. But this is the limit they set, so it is better to stick to it.

11. Do not send your ads by email. Html formatted emails look good and allow placement of these javascript ads. But it is not allowed as per TOS. You do not want impressions registering on their logs from any email even once. They are watching!

12. Never launch a New Page for clicked ads by default. Adsense ads should open on the same page. You may be using a base target tag to open all links in a new window or frame by default. Correct it now as they do not want new pages opening from clicked ads.

13. Be honest !! .Honest site that’s designed to make the most out of this very profitable opportunity that Google offers!Good Luck!!

Read more...

* Intel® Desktop Board DP43TF

Wednesday, October 1, 2008

The Intel® Desktop Board DP43TF delivers new levels of performance and the next generation of PCIE* 2.0 x16 in the ATX form factor supporting Intel® Core™2 Quad and Intel® Core™2 Duo processors.The board also offers exciting premium features such as Intel® High Definition Audio, integrated 10/100/1000 Network connection, ample USB ports and IEEE 1394a for consumers to enjoy a great digital entertainment experience.The Intel® Desktop Board DP43TF is Microsoft Windows Vista* Premium Ready. The Intel® 4 Series Chipset fully supports the visually stunning Windows Aero* user interface with amazing transition effects and realistic animations.Product informationDownload product brief View available configurationsView supported processorsLatest BIOS and driver updatesFeatures and benefitsForm factor ATX (11.60 inches by 9.60 inches [294.64 millimeters by 243.84 millimeters])Processor View supported processors for the most current list of compatible processors.At product launch, this desktop board supports:Support for an Intel® Core™2 Quad processor in an LGA775 socketSupport for an Intel® Core™2 Duo processor in an LGA775 socketSupport for an Intel® Pentium® Dual-Core processor in an LGA775 socketSupport for an Intel® Celeron® Dual-Core processor in an LGA775 socketSupport for an Intel® Celeron® processor 400 sequence in an LGA775 socketMemory Four 240-pin DDR2 SDRAM Dual Inline Memory Module (DIMM) socketsSupport for DDR2 800 or DDR2 667 MHz DIMMsSupport for up to 8 GBS of system memoryChipsets Intel® P43 Express ChipsetAudio Intel® High Definition Audio subsystem in the following configuration: 6-channel (5.1) audio subsystem using the Realtek* ALC888VC audio codecVideo N/AI/O control Legacy I/O controller for serial header, and PS/2* portsLAN support Gigabit (10/100/1000 Mbits/sec) LAN subsystem using the Intel® 82567V Gigabit Ethernet ControllerPeripheral interfaces Up to 12 USB 2.0 portsSix Serial ATA IDE interfacesTwo IEEE-1394a ports (1 external port, 1 internal header)One serial port via headerOne parallel ATA IDE interface with UDMA 33, ATA-66/100 supportPS/2 keyboard and mouse portsRelated productsProcessors Intel® Core™2 Quad processorIntel® Core™2 Duo processorIntel® Pentium® Dual-Core processorIntel® Celeron® Dual-Core processorIntel® Celeron® processor 400 seriesChipsets Intel® P45 Express ChipsetS System resources and hardware (such as PCI and PCI Express*) require physical memory address locations that can reduce available addressable system memory. This could result in a reduction of as much as 1GB or more of physical addressable memory being available to the operating system and applications, depending on the system configuration and operating system.

Read more...

* Intel® Pentium® processor Extreme Edition

The Intel® Pentium® Processor Extreme Edition, with the processing capabilities of four threads, delivers more computing capabilities that enable you to explore new ways to accomplish and enjoy performance-intensive tasks on your PC.View Product Brief (PDF 168KB)View Product ImageCompare specifications for Intel® Pentium® Processor.Build a comparison chart that identifies which Pentium processors have the specific technical features you need. Compare all or a selection. Includes compatible motherboard and chipset information.ProcessorIntel® Pentium® processor Extreme EditionProcessor Number?840, 955, 965Architecture90 nm and 65 nm technologyL2 Cache2x1MB and 2x2MBL3 CacheNAClock Speed3.20, 3.46 GHz and 3.73 GHzFront Side Bus800 MHz and 1066 MHzChipsetIntel® 975X Express chipsetIntel® 955X Express ChipsetSocketLGA775MotherboardIntel® Desktop Board D955XBKIntel® Desktop Board D975XBXIntel® Pentium® Processor Extreme Edition FeaturesFeaturesBenefitsHyper-Threading Technology†Enables you to run multiple demanding applications at the same time.Execute Disable Bit°Can improve protection against malicious "buffer overflow" attacks when properly enabled with a supporting operating system.Intel® Extended Memory 64 TechnologyFProvides flexibility for future applications that support both 32-bit and 64-bit computing.Dual-CoreTwo physical cores in one processor support better system responsiveness and multi-tasking capability than a comparable single core processor.Intel® Virtualization TechnologyFIntel® Virtualization Technology enables one hardware platform to function as multiple "virtual" platforms. For businesses, it offers improved manageability, limiting downtime and maintaining worker productivity by isolating computing activities into separate partitions. In the home, it allows creating unique user environments for multiple family members looking to use the same platform simultaneously. (supported only on 900 sequence).

Read more...

* Intel® Core™2 Processor with vPro™ Technology

Designed from the ground up to empower IT while meeting the needs of business,Intel® Core™2 processor with vPro™ technology provides enhanced security, remote manageability, energy-efficiency, and performance so you can spend more time on strategic initiatives and less time on PC issues and downtime.¹Demo: Get inside notebook and desktop PCs with Intel vPro technologyLearn more about business PCs with Intel vPro technology Take business PCs to the next level with PCs with Intel® vPro™ technology (PDF 1.72MB)White paper: Intel® Centrino® with vPro™ Technology and Intel® Core™2 Processor with vPro™ Technology (PDF 2.32MB)Features and benefitsGet peace of mind with hardware-assisted security features.Designed from the ground up, Intel Core 2 processor with vPro technology provides built-in hardware-assisted security features that IT can rely on. New filters have also been included that identify malicious patterns, viruses, worms, or potential attacks in network traffic. Plus, with the addition of Cisco Self-Defending Network* (PDF 289KB) and 802.1x support, there is no need to lower security for OS-absent management.Reduce deskside visits for software and hardware problems up to 56 percent.² Using powerful out-of-band access and management, you can automatically isolate, remotely diagnose, and repair infected PCs using hardware-based remote manageability features¹—even if your PCs are turned off or the OS is unresponsive. And with convenient remote configuration, you now have an option for over–the–wire set–up.Conduct hardware and software inventory up to 94 percent faster.² Maintain accurate asset inventory, and up-to-date licenses; helping to ensure that you're only paying fees for software you're actually using.Decrease energy requirements without compromise to performance. Built on the latest 45nm Intel® Core™ microarchitecture, Intel Core 2 processor with vPro technology offers reduced electrical current leakage, and increased performance while meeting ENERGY STAR*³ requirements.Enjoy broad industry support from leading manageability and security independent software vendors (ISVs) like Symantec, LANDesk, HP, Microsoft, and Cisco that take advantage of the Intel Core 2 processor with vPro technology.Remain compliant with next-generation management standards. More capable, extensible and secure than ASF? and standardizes management between console and PC as well as inside the PC, Intel Core 2 with vPro technology supports next generation communication protocols such as WS-MAN and DASH.Prepare for the future with Microsoft Windows Vista*. Get breakthrough performance for 64-bit Microsoft Windows Vista* and next-generation multithreaded software with Intel Core 2 processor with vPro technology. With powerful Intel® Graphics you can run Microsoft Windows Vista with full Aero* graphics support without the expense of an external graphics card.Gain access, share ideas, and discuss PCs with Intel vPro technology with IT leaders on Intel's Open Port

Read more...

* Intel® Centrino® 2 with vPro™ Technology

Keep your workforce secure, managed, and mobile. With security and manageability built right onto the chip, Intel® Centrino® 2 with vPro™ technology provides hardware-assisted remote isolation, diagnostics, and repair, so you can manage your mobile workforce remotely, even if the system's OS is unresponsive.¹ And with exceptional dual-core performance, you'll get faster wireless connectivity speeds and the longest possible battery life.²Features and benefitsBest for business. Keep your workforce secure, managed and mobile with state-of-the-art threat protection for your business. Get added protection against security threats with hardware defense filters and agent presence checking.³Top mobile performance. Taking you to the next level of breakthrough mobile performance,? the new Intel Centrino 2 with vPro technology provides everything you need for future 64-bit applications² and other next-generation software.Increased energy-efficiency. Built on the latest 45nm Intel® Core™ microarchitecture, Intel Centrino 2 with vPro technology provides industry-leading,² energy-efficient performance.Longer battery life. With advanced hafnium-based 45nm Intel® processor technology and unique energy-saving components, Intel Centrino 2 with vPro technology is designed to give you the longest possible battery life.Faster, more predictable wireless. Experience up to 5x faster connectivity speeds with optional 802.11n wireless technology improving reliability while decreasing connection loss.OManage your mobile workforce wirelessly. Remotely diagnose, isolate, and repair infected notebooks using hardware-based remote manageability features that work even if notebooks are off or the OS is unresponsive.¹Broad industry support from leading manageability and security independent software vendors (ISVs) like Symantec, LANDesk, HP, Microsoft, and Cisco that take advantage of the Intel Centrino 2 with vPro technology features.Reduce maintenance costs and stay compliant. Provide routine patching and maintenance and ensure you're only paying software license fees for what you're using and that your licenses are always up-to-date.¹Get the most out of graphics-intensive Windows Vista*. Powerful Intel Graphics allow you to run Windows Vista with full Aero* graphics support-without the expense of an additional graphics card.²

Read more...

* Intel® Core™2 Processor with Viiv™ Technology

When you want a sensational high-definition (HD) experience, look no further than PCs with Intel® Core™2 processor with Viiv™ technology. Built on the latest hafnium-infused 45nm dual- and quad-core processors, these systems give you performance for HD audio and video and your most demanding applications.Key componentsThe cutting edge is now. Every PC with an Intel Core 2 processor with Viiv technology is powered by an Intel Core 2 Duo or Intel Core 2 Quad processor to give you the performance to run demanding applications and manage your HD entertainment. To see the list of all processors available for the Intel Core 2 processor with Viiv technology, see the PC Requirements page.PCs built from the ground up for sensational high-definition experiences. The Intel Core 2 processor with Viiv technology includes the latest Intel chipsets with most everything you need to build a multimedia PC for HD content. Experience stunning sound from movies and music with up to 7.1 surround sound capabilities enabled by Intel® High Definition Audio (Intel® HD Audio). Get full 1080P video playback for movie clips, media streams, and the latest generation of HD video cameras with optional Intel® Clear Video Technology. And explore the Internet with 1GB-capable broadband Ethernet to quickly access high-definition content. The possibilities are endless.Operating systemMicrosoft Vista Home Premium* makes it easy to control and enjoy your digital media.Features and benefitsFor systems based on Intel® Core™2 Duo processorAdvanced dual-core performance opens up the world of high definitionGet incredible performance from up to 6 MB of cache (a 50 percent increase), higher frequencies, and 1333 MHz FSBGet up to 30 percent faster performance for applications like photo-editing, retouching, and publishing¹For systems based on Intel® Core™2 Quad processorExtraordinary quad-core performance lets you get the most of HD multimediaEnjoy incredible quad-core performance with 12 MB of cache (a 50 percent increase), higher frequency and 1333 MHz FSBFour processing cores and Intel's hafnium-infused circuitry delivers high-performance for multimedia applicationsIntel® HD BoostImproved multimedia performance on 45nm dual and quad core processors when editing and encoding video or working with photosIntel Core 2 Duo processors with Intel HD Boost give you up to 70 percent more performance when encoding high-definition memories from your HD video camera²Intel® High Definition Audio (Intel® HD Audio)Enjoy superior sound.Experience high-quality audio for stunning sound from movies and music and up to 7.1 surround sound capabilitiesIntel® G35/G33 Express Chipset with (optional) Intel® Clear Video TechnologyCrystal clear high definition.Get full 1080P video playback for movie clips, media streams, and the latest generation of HD video camerasIntel® PRO Client Wired LANBroadband ready.Explore the Internet with 1GB-capable broadband Ethernet to quickly access high-definition contentOptional Intel® Matrix Storage TechnologyProtect your digital memories.Improved storage performance and help protect digital photos, video, and music with automated back-up and restore on systems with optional dual disk drivesOptional surround sound speakersHear all of your music and moviesTake advantage of surround sound with up to eight high-quality speakers with Intel HD AudioOptional TV tuner cardTV on your terms.Watch, record, and pause live TV

Read more...

* Intel® Core™2 Duo Processors

Maximum everything. Energy-efficient performance. Multimedia power.Based on Intel® Core™ microarchitecture, the Intel® Core™2 Duo processor family is designed to provide powerful energy-efficient performance so you can do more at once without slowing down.Intel® Core™ 2 Duo desktop processorsWith Intel Core 2 Duo desktop processor, you'll experience revolutionary performance, unbelievable system responsiveness, and energy-efficiency second to none.Big, big performance. More energy efficient.¹ Now available in smaller packages. The Intel Core 2 Duo processor-based desktop PC was designed from the ground up for energy efficiency, letting you enjoy higher performing, ultra-quiet, sleek, and low power desktop PC designs.Multitask with reckless abandon. Do more at the same time, like playing your favorite music, running virus scan in the background, and all while you edit video or pictures. The powerful Intel Core 2 Duo desktop processor provides you with the speed you need to perform any and all tasks imaginable.Love your PC again. Don’t settle for anything less than the very best. Find your perfect desktop powered by the Intel Core 2 Duo processor and get the best processing technology money can buy. Only from Intel.• Up to 6MB L2 cache• Up to 1333 MHz front side busIntel® Core™ 2 Duo mobile processorsAt the dual-core heart of Intel® Centrino®2 processor technology, the Intel® Core™2 Duo processor family features a faster FSB (up to 1066 MHz), higher clock speeds, and enhanced microarchitecture technologies, helping to maximize Intel®Centrino®2 processor technology's dual-core performance and power savings.• 6 MB of total L2 cache• Up to 1066 MHz front side busProduct informationDownload the desktop processor product brief (PDF 767KB)Download the mobile processor product brief (PDF 1.61MB)Check out the desktop benchmarksFor the digital homeFor the digital office ›Check out the mobile benchmarksUnrivaled performance, built for power savingsSee product imageLearn about processor numbers?Features and benefitsDelivering the best overall performance. Period. With Intel Core 2 Duo processors powering your desktop and laptop PCs you'll get the latest arsenal of performance-rich technologies, including up to 6MB of shared L2 cache, up to 1333 MHz Front Side Bus for desktop, and up to 1066 MHz Front Side Bus for laptop, you've got the future of computing now, and only from Intel:Intel® Wide Dynamic Execution, enabling delivery of more instructions per clock cycle to improve execution time and energy efficiencyIntel® Intelligent Power Capability, designed to deliver more energy-efficient performance and smarter battery performance in your laptopIntel® Smart Memory Access, improving system performance by optimizing the use of the available data bandwidthIntel® Advanced Smart Cache, providing a higher-performance, more efficient cache subsystem. Optimized for multi-core and dual-core processorsIntel® Advanced Digital Media Boost, accelerating a broad range of applications, including video, speech and image, photo processing, encryption, financial, engineering and scientific applications

Read more...

* Intel® Pentium® D Processor

Extend your multitasking capabilities. An Intel® Pentium® D processor-based PC delivers an extra powerful gear when you need it. Accomplish more while running multiple applications, such as editing video while downloading music, or using robust business applications while managing security tasks.Features and benefitsRevved up multitaskingWith an Intel Pentium D processor-based PC featuring two full processing cores, you get the flexibility and performance to handle multimedia entertainment, digital photo editing, even multiple users, simultaneously.Your PC gets resources for multitasking, and you get to accomplish more while running multiple applications, such as editing video while downloading music.Built for advanced applicationsGet the most out of your demanding, multi-threaded applications, perfect for the new world of immersive, high-end entertainment. The Intel Pentium D processor-based PC with Intel® dual-core processing technology provides the performance to take advantage of sophisticated gaming software which can result in realistic game environments and challenging game play.Multiply your multimedia experienceCombined with a digital media adaptor and a home network, an Intel Pentium D processor-based PC allows two people to share the content from one PC - in the same room, or even from different places in the house. For example, one person can be checking email while the other uses a remote control to access digital photos stored on the same PC and view them on the TV from the comfort of their living room.

Read more...

* Intel® Pentium® 4 Processor Extreme Edition Supporting Hyper-Threading Technology













Get advanced performance for high-end gaming and the most demanding power applications. The Intel® Pentium® 4 Processor Extreme Edition supporting Hyper-Threading Technology† is designed specifically for those who know their technology and crave high performance.Build a comparison chart that identifies which Pentium 4 processors have the specific technical features you need. Compare all or a selection. Includes compatible motherboard and chipset information.

Read more...

  © Blogger template Leaving by trading-info.piczo.com 2008

Back to TOP