Are you in trouble with your computer!!!! Don't worry we will work for pulling it back in the perfect track.
Follow us on Twitter Subscribe to RSS Subscribe via Email
  • Enter Slide 1 Title Here

    This is slide 1 description. Go to Edit HTML of your blogger blog. Find these sentences. You can replace these sentences with your own words. This is a Blogger template by NewBloggerThemes.com...

  • Enter Slide 2 Title Here

    This is slide 2 description. Go to Edit HTML of your blogger blog. Find these sentences. You can replace these sentences with your own words. This is a Blogger template by NewBloggerThemes.com...

  • Enter Slide 3 Title Here

    This is slide 3 description. Go to Edit HTML of your blogger blog. Find these sentences. You can replace these sentences with your own words. This is a Blogger template by NewBloggerThemes.com...

Saturday, July 17, 2010

Unknown  /  Saturday, July 17, 2010  /  1 comment
SCSI port to USB
The full meaning of SCSI is Small Computer Systems Interface. It is called the father of today's modern USB technology. About 10 years ago SCSI was widely used device for connecting peripheral devices like scanner, camera, printer, etc. But now a days modern device USB has acquired all positions of SCSI. Universal Serial Bus is the bridge among computer hardware and portable devices.

The flexibility of use of USB port have reduced the popularity of SCSI ports. But if you have SCSI device you need not to throw it away. It is very easy to convert SCSI to USB. For converting SCSI to USB you only need an adaptor cable.

USB ports have taken the market completely with their advantages such that now a days all the external hardware of computer comes to the market equipped with USB ports.

Now a days camera, printers, hard drives, scanners, etc. use the standardized USB ports all over the world. The Universal Serial Bus port has significantly enhanced the plug and play capability. There has no need of restart computer after plug in or plug out from the computer. This is main point of attraction of USB ports.

The another most attractive feature of USB port is they provides power to the low energy consuming devices such as camera, cell phone, etc. This feature of USB port has brought revolution in the world of computer that there have no need of external power source. Now a days you can charge your phones, IPods and various other devices through Universal Serial Bus(USB) ports. And its another benefit is that you need not to install any drive for making any connections while using USB over SCSI ports.

Although many old computers have traditional Small Computer Systems Interface (SCSI) ports and they need not to destroy them. You can get all benefits of USB ports from your SCSI ports, only by using SCSI to USB converter. You have to buy a connector and insert one end of the connector cable into the SCSI port. By this way you can get the test of using USB through your SCSI port. You only need to connect the USB devices in to one end of the cable and enjoy the program. This is fantastic and very easy way of converting SCSI port to USB port.

Monday, July 12, 2010

Unknown  /  Monday, July 12, 2010  /  No comments
Protect Your PC form Malware

What is the basic difference between malware and a virus? While discussing general infection of computer, malware and viros come interchangeably. For removing malware and virus from computer right identification of application is very important. Malwares come to the computer in various form and do many kinds of problem i.e. damage computer, computer applications and the general use of computer.

What do malware do?


Malware is the short form of Malicious software. Malwares are designed of unauthorized access to the computer and do various forms of damage of computer.

Now a days there are various forms of malwares i.e. spyware, key loggers, malicious cookies, root kits, Adware, bandwidth hogging, malware, web hijackers, etc.

Normally a virus attacks computer and try to corrupt, damage or delete valuable data from computer. It also try to replicate and deliver copies to other computers, often try to send copies of itself through email program and try to sent infected email to all listed email address.

Trojan programs are also considered as virus, normally masquerade their harmful effect inside innocuous files like a video, mp3, a photo, even text files. Trojan may come via email and they remain hidden inside the email. While people try to open the file Trojan spread out the computer.

You should know that almost all infections have ability to mask themselves as well as their activities so as to not be picked up by removal software, either commercial or free. They will even go so far to protect themselves by leaving registry keys to regenerate executable files, if the executable file becomes deleted.

They can also generate new file in the temporary directories, also other folders and directories in the computer. Specially after restart computer they recreate and try to spread all over the computer. In this instance, removal must be done manually, through powering a computer and loading safe mode of windows, and individual deletion of the correct files and registry keys.

There have so many free and commercial internet security and anti-virus applications. All of them are not effective at removing virus and malware. Fortunately there have some specialize applications for removing malware. You should do update your anti-virus regularly for a malware free computer.

Search