Tampilkan postingan dengan label to. Tampilkan semua postingan
Tampilkan postingan dengan label to. Tampilkan semua postingan

Computer system Pile of cash with respect to Hauppauge Computer Works Hauppage USB Live2 Video Capture 610

Bundle for Hauppauge Computer Works Hauppage USB Live2 Video Capture 610 Vendor

Reviews: Hauppauge Computer Works Hauppage USB Live2 Video Capture 610

Hauppauge Computer Works Hauppage USB Live2 Video Capture 610

Hauppauge Computer Works Hauppage USB Live2 Video Capture 610 Car dealer

The Hauppauge Haup610 USB video capturer is a great choice for connecting your VCR, camcorder or video to your computer without the hassle of opening the case. Equipped with composite plus s-video port on the end and built-in video digitizer, the Hauppauge Haup610 can conveniently turn the analog video into digital format, with 30 digital images per second over the USB bus. Besides the support of up to 720x480 video format size (NTSC video), the included software can help you grab still video images in adjustable high-resolution modes, saving your highlights on hard disk. And With the detachable design, you can leave the cables connected to your A/V source while moving the Hauppauge Haup610 to a different computer for maximum convenience. Type: Video Capture & Editing Features: Watch, capture or record live video from your VCR, camcorder or video camera! USB-Live connects to any S-Video or composite video source and plugs into your PC or laptop's USB port. USB-Live's video digitizer turns your analog video into digital video, and then sends 30 digital images per second over the USB (1.1 or 2.0) bus. Snap and print stills from whatever you're watching (BMP and JPEG supported). Or record video clips from your camcorder or VCR to create your own high-impact presentations. Add video clips to your Web Page: Creative Webmasters can incorporate still frame video highlights or motion video clips on their web sites! Videoconference over the Internet: USB-Live is a video digitizer and can be used with Internet videoconferencing applications such as Microsoft's NetMeeting, CU-SeeMe and more! Videoc.

Read more »
Read More..

Computing device Seve to get OPTIPLEX 7010 USFF 3G I5 3470S 2 9G 2GB 320GB DVDRW W7P 64BIT

Seve intended for OPTIPLEX 7010 USFF 3G I5-3470S 2.9G 2GB 320GB DVDRW W7P 64BIT really don't hold out

Comparisons: OPTIPLEX 7010 USFF 3G I5-3470S 2.9G 2GB 320GB DVDRW W7P 64BIT

OPTIPLEX 7010 USFF 3G I5-3470S 2.9G 2GB 320GB DVDRW W7P 64BIT

OPTIPLEX 7010 USFF 3G I5-3470S 2.9G 2GB 320GB DVDRW W7P 64BIT you should not simply wait

OPTIPLEX 7010 USFF 3G I5-3470S 2.9G 2GB 320GB DVDRW W7P 64BIT

Read more »
Read More..

Meet Again With Your Past Thanks To Cell Number Seek Out

By Ashlan Archard


Nuisance calls are fun for the caller and annoying for the one who gets the call specifically, if it takes place in the middle of the evening. It does not matter whether they talk to you or simply hang up on your kids. Fortunately is, you can make it stop. You can end the issue of having somebody you do not know calling your number by reversing the call after you have actually used Cell Number Seek out.

Contact number searches are not just for land lines anymore. This is due mainly to so many individuals utilizing cellular phone in contrast to common home phone lines. Anyone can do a mobile phone search as long as you have a mobile number for someone. You can search for even individuals that you do not feel are stressing you.

Picture that childhood pal that you had growing up that you lost touch with; you can have an additional opportunity to connect. Envision the individual you enjoyed in senior high school but things happened and the two of you parted ways. Would it be nice to understand where they are now? How life has treated them? You can easily search for their name and find out. You never understand, they could enjoy remembering with you as well.

Since of household issues and now you want to reconnect, if you have a household member that you knew as a child however lost touch with them. You can do it. You can discover anything you want to know about them as long as they have a cellular phone and you utilize the cell number lookup. Possibly this relative or long lost buddy has actually been questioning you too. You could be doing that individual a favor by putting in the effort.

Searching for somebody utilizing their name or their telephone number does not make you a creepy stalker. With excellent intentions, you just have favorable results. You can use it to reconnect with your past or protect your future.

Understanding that you have the option to check phone numbers could even assist you secure yourself from possible scams. That business that keeps calling you saying you owe them cash and should provide them your credit card might or may not be genuine. If you had a for sure method to discover whether to trust them or not, would you utilize it? You can if you feel you should safeguard yourself and your financial resources.

In todays time of internet dating it can likewise safeguard you from being the one who is the other woman. If you search for a telephone number to the one who declares to wish to fulfill you personally and his information shows that he is married, you will know ahead of time exactly what you could be entering. You can have the option to state, "No." It can guarantee that you do not get played by someone from the web and keep you from getting hurt.

Everybody knows that you probably do not such as considering the bad things. Nobody wishes to check out another individual. Nevertheless, you do have to consider the possibility that someone is not telling you the entire reality all the time. You owe it to yourself to try and take the time to secure yourself and your family if you have an issue about someone who is calling you. Just make use of Cell Number Admire doing this.




About the Author:



Read More..

Desktop How to purchase Canon Computer Systems 1033B005 Value Pack Ink Pro 9500

Where to buy Canon Computer Systems 1033B005 Value Pack Ink Pro 9500 For the Buy

Reviews: Canon Computer Systems 1033B005 Value Pack Ink Pro 9500

Canon Computer Systems 1033B005 Value Pack Ink Pro 9500

Canon Computer Systems 1033B005 Value Pack Ink Pro 9500 In the Search

Prints high-quality documents and presentations with ease. Produces sharp edges and smooth shading. Easy installation saves time and money. Supply Type: Ink; Color(s): Cyan; Green; Magenta; Matte Black; Photo Black; Photo Cyan; Photo Magenta; Red; Yellow; Device Types: Inkjet Printer; Ink Yield: N/A.

Read more »
Read More..

Portable computer Packages with respect to Dell Inspiron Desktop Computer Intel Pentium G2020 2 90 GHz Black

Savings for the purpose of Dell Inspiron Desktop Computer - Intel Pentium G2020 2.90 GHz - Black on sale

Comparisons: Dell Inspiron Desktop Computer - Intel Pentium G2020 2.90 GHz - Black

Dell Inspiron Desktop Computer - Intel Pentium G2020 2.90 GHz - Black

Dell Inspiron Desktop Computer - Intel Pentium G2020 2.90 GHz - Black on sale

Intel Pentium G2020 processor, 4GB memory, 1TB hard drive, 20-inch monitor included. Processor Cache Size: 6MB. Screen Type and Resolution: 20" Active Matrix TFT Color LCD. Graphics Type: n/a. Wireless Compatibility: n/a. Chipset: B-75. Modem Detail: N/A. Audio: Yes. Optical Drive Write Speed: n/a. Energy Compliance: n/a. Screen Range: 17" and Above. Installed Memory DIMMs: N/A. Hard Drive Size: 1TB. Processor Brand: Intel. TV Tuner: No. Graphics Brand/Model: Intel HD Graphics. Dimensions: 14.8" x 3.9" x 10.4". Fingerprint Reader: No. Battery: No. Optical Drive Detail: DVD+/-RW Drive. Memory Type: DDR3 SDRAM. Graphics Memory: n/a. Card Reader: Yes. Processor Model: G2020. External Ports: Total Number of USB Ports: 8Number of USB 3.0 Ports: 2Number of USB 2.0 Ports: 6HDMI: NoVGA: YesNetwork (RJ-45): YesModem (RJ-11):NoAudio Line In: YesAudio Line Out: Yes. Webcam: No. Processor Speed (GHz): 3. Operating System: Windows 8. Estimated Battery Life: N/A. Networking Detail: Gigabit Ethernet. Processor Bus (MHz): N/A. Screen Size: 20". Processor Series: Pentium. Weight: 31 lbs. Hard Drive Detail: 7200 RPM. Installed Memory: 4GB.

Read more »
Read More..

IE9 fails to publish blog post

I mistakenly used IE9 to create the previous post but I could not get it to publish. Thankfully Firefox was up to the job.
Read More..

Most Dangerous Types of Spyware How to Choose Anti Spyware

Bad News - the Threat is Bigger than it Seemed
How recently it was – when even many journalists thought that spyware gathers mostly information to be used for targeted advertising. Definitions like "spyware, a.k.a. adware, is…" were pretty common in articles. Keyloggers and system monitors were mentioned as dangerous, but relatively rare. Until the Spy Audit survey made by ISP Earthlink and Webroot Software clearly showed - they are not rare at all.
The results of the survey are here:
http://www.earthlink.net/spyaudit/press/ and [http://www.earthlink.net/about/press/pr_spyauditsurvey/]
Reading them will be time well-spent for everybody who uses Internet and at least sometimes deals with information valuable enough to be stolen; in fact, it means just everybody.
"Industry experts suggest that these types of programs [i.e. spyware in general] may reside on up to 90 percent of all Internet-connected computers" – thats the exact quote. Considering the number of computers scanned during this survey (which lasted for a whole year 2004), there is nothing left but to come to the conclusion – it must be true to fact.

Despite the fact that one of the Spy Audit authors is an anti-spyware vendor, there is no doubt that the results are trustworthy – there has been more than 4.6 million system scans made in 2004. It seems that the results of the survey might be like the bolt from the blue even for the specialists, not to mention general public.
16.48% of all scanned consumer PCs in 2004 had a system monitor installed. It means that 16.48% of these users were definitely under monitoring (who monitors them – thats another question). 16.69% had a Trojan horse program, and this is a troubling sign, too – it is a keylogging module that Trojans often have inside. "Information-stealing Trojan" in descriptions most often means "keylogger-containing Trojan". Both figures give us an overwhelming 33.17% PCs contaminated with some program with information stealing capability. Even if not all these Trojans were information-stealing ones, the situation is distressing anyway.
Schools of Phish and Herds of Trojan Horses
"Traditional" phishing and spoofing (sending emails linked to a bogus bank Web site and waiting for unwitting customers) are, unfortunately, not new phenomena. It is a modernized two-stage scam which includes contaminating the victims machine with a keylogger-containing Trojan horse program that is spreading like a wildfire now.
This scheme is without doubt much more dangerous; in this case the victim neednt follow the link in the email. Trojan horse lurks in the background until the victim types particular titles or URLs into his browser. Once the user visits one of a number of banking Web sites the malicious code is triggered into action, capturing passwords and taking screenshots. Then the information is sent to remote hackers who can use it to break into the bank account and steal money.
There were several outbreaks in activity of such information-stealing Trojans which targeted bank customers in 2004. Actually, such a scam was first used in Brazil – when the notorious Trojan named Troj/Banker-AJ appeared, experts recalled that the security firm Sophos had warned earlier in 2004 about criminals who used similar techniques to break into Brazilian online bank accounts.
Crooks may use pretty ingenious and "efficient"(if such a word could be appropriate for this activity) techniques to place the Trojan into users PCs – letters can be mimicking CNN news alerts, or offering to reserve the very latest book about Harry Potter in the series before it is published in July. Who knows what will they invent next?
Looking for Solutions to the Problem
In 2004 it become as clear as day to anyone - from being not much more than a nuisance for PC users, spyware turned into one of the major threats to information security. Since the Internet has become a part of daily life and business, rapid growth of such kinds of cybercrime as identity theft and phishing endanger the whole society. Some types of spyware, namely software capable of stealing valuable information (like passwords, SSNs), certainly facilitate these crimes.
Software vendors by all means are responding to the threat to meet the enormous demand for anti-spyware protection.
Several big anti-virus vendors, such as Norton and McAfee, have already begun providing anti-spyware protection as well. Microsoft also joined the anti-spyware market this year (and has already become a target for the malicious Trojan called Bankash-A; fortunately, no serious damages reported so far). Symantec plans to announce new features to fight spyware in some of its enterprise antivirus and intrusion prevention products.
Besides, there also are – literally - hundreds of stand-alone anti-spyware developers and vendors. The number of anti-spyware software they all develop, promote and sell is constantly growing - and will grow in future. So will the profits. According to predictions from the market advisory firm IDC, the market for anti-spyware solutions is expected to boom in the next few years. Anti-spyware software revenues will soar from US$12 million in 2003 to $305 million in 2008.
But what about end users – are they going to benefit from such a variety of anti-spyware solutions available at the market? Or will they just feel bewildered and lost in all this mass of ads offering instant relief from nasty and dangerous spyware? It looks like most people are already confused because advertising is pretty much alike – how to distinguish a high-quality product from some hit-or-miss software developers fabricated in haste just to get quick profit?
What a user can (actually must) do is to know what exactly he or she is buying or installing for free. Here are several simple common-sense tips:
The first step is to visit the site of the company that produces this product. Look it through. Read "about us" section. How long does this company exist? Ignore "testimonials" – there is no guarantee that it wasnt the companys PR manager who wrote them. It would be better to search, say, Google groups for opinions.
A good old background check will also do a lot of good. It takes some time, though – but peace of mind later is worth half an hours browsing the Web now. The simplest way is to search for the products name along with such words like "installs", "spyware", "adware", "popups", etc.
There are even lists of suspicious, low-performing, or adware-installing products. See, for example, http://www.spywarewarrior.com/rogue_anti-spyware.htm - an ample list of anti-spyware youd better not buy. By the way, the whole this site is worth studying thoroughly.
The fact that you are not a tech person doesnt mean you can afford not knowing the basic principles these products are based on. What a user can expect from an anti-spy product and what is simply impossible?
Most anti-spyware products apply signature databases, i.e. rely on simple pattern-matching technique. Detecting spy software is the crucial step of the whole process – all the protection depends on whether the anti-spy software is able to detect as many malicious programs as possible. The bigger the database is and the more often it is updated, the more reliable protection the product will provide.
Signature base, which most anti-spy products depend on, is actually the "list" of signatures – small pieces of spy programs codes. Anti-virus or anti-spy program actually scans the system and compares its codes with those in signature bases. So, in this case only the spies whose signatures already are in the base will be detected and eventually "caught". As long as anti-spy software is regularly updated and the system doesnt come across some unknown spy product, everything is all right.
The problem is that there is good deal of people capable of creating something brand-new, unknown to anti-spyware developers. The period of time when a new spy already exists, but the updates have not been released yet, is the very time when cybercriminals make their biggest profits.
The advantage of signature base analysis is that programs based on this method of detection can be of wider range – it is possible to include signatures from different types of spyware and adware into a single database. However, regular release of updates for these bases becomes crucial. If the developer fails to do it properly and on time, there is a considerable risk for such a program to become "Jack of all trades and a master of none."
The conclusion is simple – if a product applies signature database, its better to choose anti-spyware with the biggest and most frequently updated base. Dont expect absolute protection – with this technique it is simply unattainable.
But in case of information-stealing programs, like keyloggers or keylogging-containing Trojans, a single "overlooked" program may mean lost valuable data. Since signature analysis cant ensure protection against constantly appearing brand-new keyloggers, blocking the very process of keylogging would be better. Such a technology already exists, and it may be the next step towards more reliable protection against the most malicious types of spy programs.


Article Source: http://EzineArticles.com/14596
Read More..

Core Java coding question converting String to BigDecimal

There are times while coding you need to convert an entity of one data type to another or validate a given input.



Q. Can you write a generic function that converts an amount in String to double amount?
A.

Step 1: Ask the right questions and arrive at a more detailed requirements.
  • Handling negative amounts like -34.01 or (34.01) with a parenthesis. Parentheses denote a negative value. 
  • Handling commas in formatted values like 1,205.45, etc.
  • Handling negative scenarios like amount being  empty as in ( ).
Since, it is a requirement to write a generic function, all the above scenarios need to be taken care of.

Step 2: Lets use a TDD (Test Driven Development approach).

So, write a skeleton class so that all our unit tests fail.

  
package com.mycompany.app5;

import java.math.BigDecimal;
import java.text.ParseException;

public class ConvertingAmount
{

public BigDecimal convert(String amount) throws ParseException
{
BigDecimal result = null;
return result;
}
}

Next, write the unit tests based on the above requirements so that all fail, but cover the requirements.

  
package com.mycompany.app5;

import java.math.BigDecimal;
import java.text.ParseException;

import junit.framework.Assert;

import org.junit.Before;
import org.junit.Test;

public class ConvertingAmountTest
{
private ConvertingAmount ca;

@Before
public void setUp()
{
ca = new ConvertingAmount();
}

@Test
public void testPositiveAmount() throws ParseException
{
BigDecimal converted = ca.convert("2255.001");
Assert.assertEquals(new BigDecimal("2255.001"), converted);
}

@Test
public void testNegativeAmount() throws ParseException
{
BigDecimal converted = ca.convert("-2255.001");
Assert.assertEquals(new BigDecimal("-2255.001"), converted);
}

@Test
public void testNegativeAmountWithParanthes() throws ParseException
{
BigDecimal converted = ca.convert("(2255.001)");
Assert.assertEquals(new BigDecimal("-2255.001"), converted);
}

@Test
public void testPosiotiveAmountFormatted() throws ParseException
{
BigDecimal converted = ca.convert("2,255.001");
Assert.assertEquals(new BigDecimal("2255.001"), converted);
}

@Test
public void testNegativeAmountFormatted() throws ParseException
{
BigDecimal converted = ca.convert("-2,255.001");
Assert.assertEquals(new BigDecimal("-2255.001"), converted);
}

@Test
public void testNegativeAmountWithParenthesesFormatted() throws ParseException
{
BigDecimal converted = ca.convert("(2,255.001)");
Assert.assertEquals(new BigDecimal("-2255.001"), converted);
}

@Test(expected = ParseException.class)
public void testExceptionalScenario() throws ParseException
{
String amount = "()";
ca.convert(amount);
}

@Test(expected = ParseException.class)
public void testExceptionalScenario2() throws ParseException
{
String amount = "abc";
ca.convert(amount);
}
}




Step 3: Implement the functionality, so that all the above unit tests pass.

 
package com.mycompany.app5;

import java.math.BigDecimal;
import java.text.DecimalFormat;
import java.text.ParseException;

import org.apache.commons.lang.StringUtils;

public class ConvertingAmount
{

public BigDecimal convert(String amount) throws ParseException
{
BigDecimal result = null;

DecimalFormat df = new DecimalFormat("#,#00.00;-#,#00.00"); //positive;negative

//convert (2255.001) to -2255.001 and (2,255.001) to -2255.001
if (StringUtils.isNotBlank(amount) && amount.startsWith("(") && amount.endsWith(")"))
{
String valueStr = amount.substring(1, amount.length() - 1);
Number valInParenthesis = df.parse(valueStr.trim());
result = BigDecimal.valueOf(valInParenthesis.doubleValue()).negate();
amount = result.toPlainString();
}

//parse 2,255.001 and -2,255.001
Number val = df.parse(amount);
result = BigDecimal.valueOf(val.doubleValue());

return result;
}
}

Now, all green.


Read More..

Debian 6 sluggish and slow due to Mono

I have been playing around with Debian 6 for the past two weeks and overall quite happy with Debian but have noticed a slight sluggish feel when working with Gnome. (eg compared to Fedora 14)

My Debian 6 install is a default desktop install which had a working internet connection during the installation process. As a result OpenOffice, Java, Mono, extra Gnome themes and icons were all pulled in.

It would be nice if the Debian installer allowed for a more customized Desktop setup.

To cut a long story short, I have no need for Mono and decided to erase it.

apt-get purge cli-common libmono-*

If you are a Ubuntu user reading this, please do not run this command.

Now the interesting thing after performing this action was I noticed my desktop was more snappy and responsive, and more inline with Fedora 14.

Furthermore, I have also experienced the same feel when removing mono from Ubuntu 10.04 LTS.

Mono makes Linux sluggish!
Read More..

How to Remove Windows Risk Eliminator Uninstall Guide

Windows Risk Eliminator is a malicious program that uses a number of misleading techniques to make a hefty profit out of unsuspecting victims. This program is classified as a rogue security tool because it pretends to scan your computer for malware and reports system threats which do not even exist. Cyber-criminals spread their malware through the use of Trojan Downloader and fake online scanners. Victims are typically tricked into paying for additional tools or services. This rogue costs almost $80 with a lifetime support. You can get perfectly legitimate anti-malware software for about $40. Windows Risk Eliminator gives a false sense of security. It displays fake security alerts and notifications saying that your computer is infected with some sort of malware. Furthermore, Windows Risk Eliminator claims that you can make your computer run faster if you pay for a additional tools that will fix numerous system/registry errors. Please do not fall victim to this scam and remove Windows Risk Eliminator from your computer as soon as possible. What is more, this scareware blocks other programs on the victims computer. It blocks web browsers, task manager, registry editor and of course anti-malware software. Thankfully, weve got the step-by-step removal instructions to help you to remove Windows Risk Eliminator malware. Last, but not least, if you have purchased this bogus program, please contact your credit card company and dispute the charges. If you need help removing Windows Risk Eliminator, please leave comment. You can post additional information about this rogue too. Good luck and be safe online!

Windows Risk Eliminator is from the same family as Windows Universal Tool, Windows Utility Tool, and Windows Security & Control.



Fake Windows Risk Eliminator scan results:


Fake security alert saying that taskmgr.exe is a key-logger:


A web form where you can purchase Windows Risk Eliminator:



Windows Risk Eliminator removal instructions:

1. Rename the main executable of Windows Risk Eliminator:

In Windows XP:
C:Documents and Settings[UserName]Application Data[SET OF RANDOM CHARACTERS].exe

In Windows Vista/7:
C:Users[UserName]AppDataRoaming[SET OF RANDOM CHARACTERS].exe



Look for htwlfy or similar file and rename it to malware. Then restart your computer. This should disable Windows Risk Eliminator. After reboot, please continue with the rest of the removal process. NOTE: By default, Application Data folder is hidden. If you can find it, please read Show Hidden Files and Folders in Windows.

OR you can download Process Explorer and end Windows Risk Eliminator process.

2. Download shell-fix.reg. Double-click to run it. Click "Yes" when it asks if you want to add the information to the registry. This file will fix the Windows Shell entry.
3. Download free anti-malware software from the list below and run a full system scan.
NOTE: in some cases the rogue program may block anti-malware software. Before saving the selected program onto your computer, you may have to rename the installer to iexplore.exe or winlogon.exe With all of these tools, if running Windows 7 or Vista they MUST be run as administrator. Launch the program and follow the prompts. Dont forget to update the installed program before scanning.

4. New threats appear every day. In order to protect your PC from such (new) infections we strongly recommend you to use ESET NOD32 Antivirus.


Alternate Windows Risk Eliminator removal instructions (in Safe Mode with Networking):

1. Reboot your computer is "Safe Mode with Networking". As the computer is booting tap the "F8 key" continuously which should bring up the "Windows Advanced Options Menu" as shown below. Use your arrow keys to move to "Safe Mode with Networking" and press Enter key. Read more detailed instructions here: http://www.computerhope.com/issues/chsafe.htm


NOTE: Login as the same user you were previously logged in with in the normal Windows mode.

2. Download free anti-malware software from the list below and run a full system scan.
NOTE: in some cases the rogue program may block anti-malware software. Before saving the selected program onto your computer, you may have to rename the installer to iexplore.exe or winlogon.exe With all of these tools, if running Windows 7 or Vista they MUST be run as administrator. Launch the program and follow the prompts. Dont forget to update the installed program before scanning.

3. New threats appear every day. In order to protect your PC from such (new) infections we strongly recommend you to use ESET NOD32 Antivirus.


Associated Windows Risk Eliminator files and registry values:

Files:

In Windows XP:
  • C:Documents and Settings[UserName]Application Data[SET OF RANDOM CHARACTERS].exe
In Windows Vista/7:
  • C:Users[UserName]AppDataRoaming[SET OF RANDOM CHARACTERS].exe
Registry values:
  • HKEY_CURRENT_USERSoftwareMicrosoftWindows NTCurrentVersionWinlogon "Shell" = "%UserProfile%Application Data[SET OF RANDOM CHARACTERS]"
Share this information with other people:
Read More..

How To Repair Laptop Notebook Keyboard

This time the discussion was about how Service Keyboard Laptop/Notebook. This article we get from the experience of our friends. Accident damaged laptop keyboard HP Compaq branded this time. Lets find out together.


Prior to the discussion of How Service Keyboard Laptop/Notebook, we discuss some of the causes of defective first laptop/notebook keyboard, namely:
  • The keyboard is exposed to water
  • Due to dust
  • Due to the humid room.
The damage often occurs on laptop/notebook keyboard is one of the keys of the keyboard are not functioning or even laptop/notebook keyboard was broken it was moving on its own like there are pushing it down.

This occurs due to sticking to the second layer of carbon on flexible keyboard (due to a fungus or dirty) so that the keyboard keys can be pressed, or even can not be used at all.

Faulty keyboard characteristics are the repeated beeps sound when laptop is turned on.

Heres how the Service Keyboard Laptop/Notebook:

  • Prepare a small cutter which is still new (sharp)
  • Specify the keyboard keys are roughly problematic. In this case a broken tab button.
  • Take the keyboard keys are broken by tilting and grab a rubber imaginable underneath.
  • There are 2 rubber under a layer of carbon is circular. Ripped a third circle of carbon deposits.




  • Clean the carbon deposits between the two with a cutter that, by way of a swipe, but do not be too hard, just only remove dirt between the two layers of carbon. If its too hard carbon coating were feared lost.
  • The Keyboard is ready to try, and if it is OK, you may reattach the rubber buttons and keyboard.

Good Luck.


Read More..

First thing to do after installing Ubuntu 12 10 protect your privacy!

Protect your privacy!

By default Ubuntu 12.10 will record all your keystrokes / search terms when using the Unity Dash and send it to their servers and other third parties.

Personally I think this really sucks.

There can be no doubt that they anticipated many users will remain oblivious to this change / practice,  such users will therefore have their privacy compromised.

Even if it is out of their own ignorance, ie because these users did not read the manual, where privacy is concerned there needs to be solid boundaries.

Canonical Ltd relying on a unless you opt out style Legal Notice (see below) is just not good enough.

Searching in the dash -
Legal notice This search function is provided to you by Canonical Group Limited (Canonical). This legal notice applies to searching in the dash and incorporates the terms of Canonicals legal notice (and privacy policy).
Collection and use of data
When you enter a search term into the dash Ubuntu will search your Ubuntu computer and will record the search terms locally.
Unless you have opted out (see the “Online Search” section below), we will also send your keystrokes as a search term to productsearch.ubuntu.com and selected third parties so that we may complement your search results with online search results from such third parties including: Facebook, Twitter, BBC and Amazon. Canonical and these selected third parties will collect your search terms and use them to provide you with search results while using Ubuntu.
By searching in the dash you consent to:
the collection and use of your search terms and IP address in this way; and
the storage of your search terms and IP address by Canonical and such selected third parties (if applicable).
Canonical will only use your search terms and IP address in accordance with this legal notice and our privacy policy. Please see our privacy policy for further information about how Canonical protects your personal information. For information on how our selected third parties may use your information, please see their privacy policies.
Online Search
You may restrict your dash so that we don’t send searches to third parties and you dont receive online search results. To do this go to the Privacy panel and toggle the ‘Include online search results’ option to off. The Privacy panel can be found in your System Settings or via a dash search. For a current list of our selected third parties, please see www.ubuntu.com/privacypolicy/thirdparties.
Changes
Although most changes are likely to be minor, Canonical may change this legal notice from time to time, and at Canonicals sole discretion. Please check this page from time to time for any changes to this legal notice as we will not be able to notify you directly.
How to contact us
Please submit any questions or comments about searching in the dash or this legal notice by contacting us at the following address: Canonical Group Ltd, 5th Floor, Blue Fin Building, 110 Southwark Street, London, England, SE1 0SU.


Those that for whatever reason remain unaware of this change / practice, the legal notice serves to protect Canonical Ltd, allowing them to legally exploit such users.

Ask yourself, why does Canonical Ltd choose to collect data by default?

Answer, because they know the vast majority, if not all users would never optionally choose to submit data that may potentially compromise their privacy.

The "unless you opt out" approach never goes down well with anyone, it is a commercial practice that causes nothing but headaches and controversy, Verizon anyone??

If you would like to opt out and prevent Ubuntu 12.10 collecting / sending your data to Canonical Ltd and their partners, run the Privacy application and change the settings.


 

As stated in the Ubuntu 12.10 Legal Notice, turn off the setting, "Include online search results"

Well played Canonical Ltd!
Read More..

Securekeeper Spyware Removal How to Get Rid of This Malicious Program Now

SecureKeeper, also known as Secure Keeper, is one of many rogue antispyware programs that is promoted by the use of Trojan viruses, which is still one of the most dangerous computer threats that exists. These Trojan viruses pretend to be video or flash updates that are necessary, but they will install SecureKeeper instead. These viruses then configure SecureKeeper to start automatically and wreak havoc on any computer that it is installed on. Like other rogue spyware removal programs, the cleaner will run thoroughly and then tell you that you have a laundry list of viruses, spyware threats, and other malicious threats. However, it will go on to inform you that you need to purchase the program in order to remove the threats that are present on your computer.
Here are a few things to remember when it comes to dealing with programs like SecureKeeper. 


  • If you already have antivirus and antispyware software installed and in use (from Norton, Computer Associates, WebRoot, or other companies), then you should be well taken care of. This rogue program and others like it are just out to scam you into buying something that you dont need. Click on the X in the upper right corner to close scam pages, or use the Windows Task Manager to close them. Then, run your own antispyware and antivirus software removal tools. It is important that you have both antispyware and antivirus software installed on your computer for complete protection.
  • Windows comes with a firewall, a malicious software removal tool, and other security features. Make sure that they are enabled to work and updated and you will not have as many problems with rogue programs like SecureKeeper.
  • If you are not sure about any screens that pop up on your computer, do not click on them. That is the worst thing that you can do. Instead, ignore these popups and run a security scan to determine if your computer has been compromised.
  • Manual removal of SecureKeeper is very detailed and needs to be done right in order to completely remove the spyware. Be especially careful when modifying and deleting Windows registry entries.
To remove SecureKeeper, you can install a legitimate antispyware program that will detect and delete all associated malicious files. Update the threat database of the antispyware program before running a scan. This automatic removal process is recommended over the manual process of removing SecureKeeper. If you have proper antivirus and antispyware protection in place, you can lower or eliminate your chance of having to deal with future spyware infections.


Article Source: http://EzineArticles.com/3315969
Read More..

5 Tips to Help You Choose the Right Laser Printer Scanner

In the past, a laser printer scanner was only used in the office, but more manufacturers are making ones suitable for home use since advancing technology allows them to be smaller and more affordable. Laser printer scanners are faster and have more functions than in the past, so whether you are looking for one for your home or your business, you have many to choose from. Here are a few things you may want to think about before making your purchase.
What functions besides scanning do you need? Most all-in-one, or multifunction printers, as they are called, also copy and fax. Well, only some fax and most copy. If you need to fax, look carefully to be sure the printer you are considering has a faxing function. When copying, some printers require a computer to be connected to them, and some can copy on their own. If copying often, it is much more convenient to have the latter option since it is faster and less headache.
Know what you need to print before looking for a printer. While scanners dont vary too much, printers do. Several factors should influence which printer you choose. Will you print in color or only in black and white? If you plan to print in color, the price of the laser printer increases significantly. And laser printers are known for not being able to print great photos and other graphics that need shading, so if you plan to print these types of documents, you many want to think about getting an inkjet multifunction printer instead.

How much will you print? An office printer may need to print 1000 pages a day while a home office printer might get used only every other day. Printing speed varies, so be sure to know your needs and how fast the printer you are considering prints.
Know the weight and size of the printer you will purchase. No matter how or where you use the printer you want to be able to move it and fit it in the space you have. For home use, make sure it will fit on your desk and that you can carry it yourself. Office use printers may require a dedicated table or space and a dolly to move them.
Look around for a good deal. The multifunction printer market is very competitive, and there are often sales. All the major makers, such as Dell, Lexmark, HP, Canon, Brother, and Panasonic sell via their websites and their dealers, both online and in physical stores. You should find one at a discount. Prices vary depending on the features of the printer and range from about 120 USD to over 5000 USD.
Convenient and multifunctional a laser printer scanner is a great choice for both home and office. They offer many variations in speed, functions and price. Know ahead of time what you want so you will get one that is a great value but also meets all your needs.


Article Source: http://EzineArticles.com/6920329
Read More..

Fedora 15 KDE How to upgrade to KDE 4 7

As a Fedora KDE user we sometimes have to wait that bit extra for KDE updates, nonetheless the efforts by the Fedora KDE team are much appreciated.

My Fedora 15 KDE 4.7 Desktop

I no longer use openSUSE, it has gone too sour for my liking and is surrounded by a lot of negativity. I am one of those who believe the negative energy of others can have a big impact on ones well being and since giving openSUSE the boot I have been feeling much better.

The how to...

The steps for upgrading KDE to version 4.7 was originally brought to my attention by browsing the Fedora Forum, see the post by ah7013. I have modified the steps slightly as those of us who installed Fedora KDE from the Live CD do not have wget installed.

Please note, KDE 4.7 is not in the Fedora 15 stable repository and the guide  will install KDE 4.7 from a repository created by Rex Dieter, a valued member of the Fedora KDE team.

Open a terminal and run the following commands,

cd /etc/yum.repos.d
su -c yum install wget
su -c wget http://repos.fedorapeople.org/repos/rdieter/kde47/fedora-kde47.repo
su -c yum update

Please reboot your system.

Enjoy KDE!

Read More..

How to Convert InputStream to Byte Array in Java 2 Examples

Sometimes we need to convert InputStream to byte array in Java, or you can say reading InputStream as byte array, In order to pass output to a method which accept byte array rather than InputStream. One popular example of this, I have seen is older version of Apache commons codec, while converting byte array to hex string. Though, later version of same library do provide an overloaded method, to accept InputStream. Java File API provides excellent support to read files like image, text as InputStream in Java program, but as I said, sometime you need  need String or byte array, instead of InputStream . Earlier we have seen 5 ways to convert InputStream to String in Java , we can use some of the techniques from there while getting byte array from InputStream in Java. If you like to use Apache commons library, which I think you should, there is a utility class called IOUtils, which can be used to easily convert InputStream to byte array in Java. If you don't like using open source library for such kind of thinks, and like to write your own method, you can easily do so by using standard Java File API. In this Java tutorial we will see examples of both ways to convert InputStream to byte array in Java.
Read more »
Read More..

5 ways to check if String is empty in Java examples

String in Java is considered empty if its not null and it’s length is zero. By the way before checking length you should verify that String is not null because calling length() method on null String will result in java.lang.NullPointerException. Empty String is represented by String literal “”. Definition of empty String may be extended to those String as well which only contains white space but its an specific requirement and in general String with white space are not considered as empty String in Java. Since String is one of the most frequently used class and commonly used in method arguments, we often needs to check if String is empty or not. Thankfully there are multiple ways to find if String is empty in Java or not. You can also count number of characters in String, as String is represented as character arrayand decide if String is empty or not. If count of characters is zero than its an empty String. In this Java String tutorial we going to see 5 ways to find if any String in Java is empty or not. Here are our five ways to check empty String :
Read more »
Read More..

How to get environment variables in Java Example Tutorial

Environment variables in Java
There are two ways to get environment variable in Java, by using System properties or by using System.getEnv(). System properties provides only limited set of predefined environment variables like java.classpath, for retrieving Java Classpath or java.username  to get User Id which is used to run Java program etc but a more robust and platform independent way of getting environment variable in Java program on the other hand System.getEnv() method provide access to all environment variables inside Java program but subject to introduce platform dependency if program relies on a particular environment variable. System.getEnv() is overloaded method in Java API and if invoked without parameter it returns an unmodifiable String map which contains all environment variables and there values available to this Java process while System.getEnv(String name) returns value of environment variable if exists or null. In our earlier posts we have seen How to get current directory in Java and  How to run shell command from Java program and in this Java tutorial we will see how to access environment variable in Java.

How to get environment variables in Java - Example

How to get value of environment variable in Java - example tutorialHere is a quick example on How to get environment variable in Java using System.getEnv() and System.getProperty(). Remember System.getEnv() return String map of all environment variables while System.getEnv(String name) only return value of named environment variable like JAVA_HOME will return PATH of your JDK installation directory.

/**
 * Java program to demonstrate How to get value of environment variables in Java.
 * Dont confuse between System property and Environment variable and there is separate
 * way to get value of System property than environment variable in Java, as shown in this
 * example.
 *
 * @author Javin Paul
 */


public class EnvironmentVariableDemo {  

    public static void main(String args[]){
   
      //getting username using System.getProperty in Java
       String user = System.getProperty("user.name") ;
       System.out.println("Username using system property: "  + user);
   
     //getting username as environment variable in java, only works in windows
       String userWindows = System.getenv("USERNAME");
       System.out.println("Username using environment variable in windows : "  + userWindows);
   
     
     //name and value of all environment variable in Java  program
      Map<String, String> env = System.getenv();
        for (String envName : env.keySet()) {
            System.out.format("%s=%s%n", envName, env.get(envName));
        }

    }
     
}

Output:
Username using system property: harry
Username using environment variable in windows : harry
USERPROFILE=C:Documents and Settingsharry
JAVA_HOME=C:Program FilesJavajdk1.6.0_20
TEMP=C:DOCUME~1harryLOCALS~1Temp


Getting environment variable in Java – Things to remember
Java is platform independent language but there are many things which can make a Java program platform dependent e.g. using a native library. Since environment variables also vary from one platform to another e.g. from windows to Unix you need to be bit careful while directly accessing environment variable inside Java program. Here are few points which is worth noting :

1) Use system properties if value of environment variable is available via system property e.g. Username which is available using "user.name" system property. If you access it using environment variable directly you may need to ask for different variable as it may be different in Windows  e.g. USERNAME and Unix as USER.

2) Environment variables are case sensitive in Unix while case insensitive in Windows so relying on that can again make your Java program platform dependent.

3) System.getEnv() was deprecated in release JDK 1.3 in support of using System.getProperty() but reinstated again in JDK 1.5.

Thats all on how to get environment variable in Java. Though you have convenient method like System.getEnv() which can return value of environment variable, its better to use System.getProperty() to get that value in a platform independent way, if that environment variable is available as system property in Java.

Other How to tutorials from Javarevisited Blog
Read More..

How to get current URL parameters and Hash tag using JQuery and JavaScript

While dealing with current URL, many time you want to know what is the current URL path, What are the parameters, and what is the hash tag on URL. Hash tag is pretty important, if you are implementing tab structure using HTML and JQuery. To avoid confusion, let's take an example of URL: http://javarevisited.blogspot.com/2013/01/top-5-java-programming-books-best-good.html#ixzz2PGmDFlPd, in this example ixzz2PGmDFlPd is hash tag. Now, both JavaScript and JQuery provides convenient way to retrieve current URL in form of window.location object. You can use various properties of window.location JavaScript object e.g. window.location.href to get complete URL, window.location.pathname to get current path, and window.location.hash to get hash tag from current URL. If you like to use JQuery then you can get window.location as JQuery object and retrieve relevant properties using attr() function. If you are absolutely new in JQuery, and unaware of power of one of the most popular JavaScript framework, Head First JQuery is a good starting point. Being a fan of head first book, I always approach a new technology by an Head first title, it helped to learn a lot in short time, without spending time in trivial examples. By the way, In this web tutorial, we are going to retrieve current URL and hash tag using JavaScript and JQuery.
Read more »
Read More..

Spring Framework Tutorial How to call Stored Procedures from Java using IN and OUT parameter example

Spring Framework provides excellent support to call stored procedures from Java application. In fact there are multiple ways to call stored procedure in Spring Framework, e.g. you can use one of the query() method from JdbcTemplate to call stored procedures, or you can extend abstract class StoredProcedure to call stored procedures from Java. In this Java Spring tutorial, we will see second approach to call stored procedure. It's more object oriented, but same time requires more coding. StoredProcedure class allows you to declare IN and OUT parameters and call stored procedure using its various execute() method, which has protected access and can only be called from sub class. I personally prefer to implement StoredProcedure class as Inner class, if its tied up with one of DAO Object, e.g. in this case it nicely fit inside EmployeeDAO. Then you can provide convenient method to wrap stored procedure calls. In order to demonstrate, how to call stored procedures from spring based application, we will first create a simple stored proc using MySQL database, as shown below.
Read more »
Read More..