February 4, 2009

Flash Drive defrag?

Q:
I have accumulated several flash drives over the years and I was just wondering if I should ever defragment them. I know we have to do it for our hard drives, but are flash drives the same? Please explain!

A:
Wow, what an excellent question! I know several of you use flash drives, so this is one that's going to help a lot of you out. I'm going to start today by saying you're absolutely right when you said we all what is cialis need to defrag our hard drives on a regular basis. That's a given. But when you think about doing the same for flash drives, it turns into a completely different situation. So, come along with me as we delve into the world of flash drives and defrags!

The simple answer to today's question is: you should never defrag a flash drive. Does that surprise some of you? Well, let me explain! Let's first talk a little about hard drives. The files you have stored on your hard drive are usually saved in several little pieces, often in groups of 512 bytes. Now, those chunks of data are usually never placed next to each other or even remotely close to each other. Therefore, your files are generally spread out all over your hard drive, which is why defragging is so important.

The whole defrag process is done through a read/write head that rearranges your files and places them back together for you. That way, when you need to access a certain file, everything is put back together and your computer doesn't have to work as hard to find what you're looking for. Defragging simply helps speed up your system when you need to open a certain file. Yep, that's why it's so vital that you defrag on a regular basis (at least once a month or so).

On the other hand, flash drives do not have a read/write head, so if you were to defrag one, you wouldn't get any extra performance benefits from it whatsoever. Basically, without a read/write head, flash drives don't have to work any harder to find your files. Your files can be laid out in any order and your flash drive will still be just as fast when finding them for you. Still not convinced? Then keep reading!

Another reason why you should never defrag a flash drive is because flash memory wears out over time. Basically, the more you write (saving files, etc.) to your flash drive, the shorter its lifespan will be. And since defragging is a huge write process, every time you do it, you're adding thousands of extra writes to your device that just aren't necessary. So, if you've been continuously defragging your flash drives, you should stop. If you want your flash drive to last you a long while, simply stop the defrags. You won't get any benefit from it and you'll just end up with a broken down flash drive for no reason at all. Go and defrag your hard drive instead!

Permalink • Print • Comment

Plagiarism Checker

I know this Web site will certainly come in handy for me as a student, but it's also very beneficial for teachers who want to check whether or not the work their students have turned in is plagiarized.

It’s really easy to use too! All you have to do is copy and paste the assignment into the text box and click on the Check the Paper button. It will then process the paper, checking it against its database.

Please note that it's only intended to accurately scan whole papers, not sentences or partial paragraphs. It will tell you if the document isn’t long enough and it gives you the option to go back if the paper doesn’t meet the parameters it was set up for.

Once it processes the paper, it will show you where in the text it could be plagiarized. Check it out!

http://www.dustball.com/cs/plagiarism.checker/

what is cialis used for

Permalink • Print • Comment

Key Logging

Q:
What exactly is keystroke logging? I've heard it mentioned in your tips before, but I'm not quite sure what it is. Please explain!

A:
Oh, sure, I can do that! You're right, we have mentioned keystroke logging in many of our security tips before, but we've never really gone over what it is by itself. It's very important for all computer users to understand what all is involved with keystroke logging, so I'm glad you asked. I'm sure you're not the only one who has been wondering about it either. So, without further ado, let's have a discussion about keystroke logging!

Basically, keystroke logging (also known as keylogging) is a method used to capture and record user keystrokes. It's often thought of in a negative sense, but it can be used for good as well. For example, keylogging can be used to track down certain computer system errors, to research how users what is cialis professional interact with certain systems and it can even be used to check on employee productivity for certain tasks. Keylogging is also useful in law enforcement, as it provides a way to unlock passwords and encryption keys.

Of course, keystroke logging is also a method used by hackers to get into another user's computer and steal information. That's the type we talk about the most in our computer tips, because we want to keep you safe at all times. There's really not that much to it though. If you have an antivirus program, a good firewall and some type of anti-spyware software on your computer, you'll be safe from keystroke loggers. Those types of applications can stop keystroke loggers in their tracks so that your information stays protected.

Back on the other side, there are two types of keystroke logging: hardware and software based. Hardware loggers come in three different types. First, there are the devices that are attached to the keyboard cable. They're inline devices and they're very easy to install, but they're also easily detected. Secondly, there are the devices that can be installed inside an actual keyboard. They're rather difficult to install, but once they're in, they're almost impossible to detect. Thirdly, there are replacement keyboards that already have the key logger built in. Those are obviously the easiest to work with and the logger is very hard to detect.

The software loggers are basically set up to see how users interact with different software programs on a computer. Like I said before, they can be used to keep track of how an employee is performing and so on. There are several different types of software keylogging, including local machine software keyloggers, remote access software keyloggers, wireless keylogger sniffers and acoustic keyloggers. They're all used for different tasks and they all provide different results.

As you can see, keystroke logging is used in a variety of ways and while it's used for both positive and negative aspects, it's a useful procedure. There's probably a lot more technical jargon I could bog you down with in terms of keystroke logging, but I think you get the gist. Everything you really need to know about keystroke logging is discussed above. I hope you now have a better understanding of what keystroke logging is and you can go out and tell your friends all about it. It's a great dinner table topic, don't you think?!

Permalink • Print • Comment

Securing Your E-mail

Did you know that when you send an e-mail, it's not secure? I'm sure you've heard people say you should never send personal information, such as credit card numbers, social security numbers and sensitive files through e-mail, but do you know why? Well, today, I'm going to explain all of that and give you options for sending e-mails that are safe for sensitive data. Here we go!

Let's first talk about why it's not safe to send a regular e-mail with sensitive data. When you send an e-mail, the information inside is sent just as you see it. The actual text you type is sent across the Internet. When something goes across the Internet, it doesn't just go from point A to point B. It actually goes through an average of six to 10 computers before it reaches its destination. Most of the time, the e-mail will be delivered without anyone seeing it, but there's always the chance a bad person could intercept the e-mail and read the contents. Since the e-mail isn't scrambled or encrypted, it's very easy to read and your information could be stolen.

Now that you understand the troubles of unencrypted e-mails, let's discuss e-mail encryption. When an e-mail is encrypted, it's scrambled using a special "secret key." The key can be used to descramble the e-mail and it's only known by the computer receiving the message. E-mail encryption is great! It secures e-mail so that no one can read it. It's nearly impossible to steal and it makes it so that very sensitive data can be sent in an e-mail with no worries. There is one problem though: if encrypting e-mail was simple, everyone would be doing it. Unfortunately, there are a couple requirements when it comes to e-mail encryption.

1.) You must be using an e-mail client, such as Outlook Express, MS Outlook, Thunderbird, etc. No Web based e-mail programs support e-mail encryption.

2.) In order to send an encrypted e-mail to someone, the person you're sending it to needs to have already shared their key with you. (Don't worry, I'll explain that more if you keep reading!)

Now, I understand that number 2 may have thrown you off a bit, so here's how it works. Like I said earlier, e-mail is encrypted with a special key that only the recipient can unscramble. That means, in order to send an encrypted e-mail, the person you're sending the usa cialis e-mail to needs to have an encryption key installed. That's why hardly anyone encrypts their e-mail. To have truly safe e-mail communication, both people sending and receiving the e-mail need to have an encryption key.

So, how can you get a key and how do you use it?

Well, here's the good news: getting an e-mail encryption key is free and easy! If you get a key, people can then send you encrypted e-mails if they're sending the e-mail using Outlook Express, Outlook or Thunderbird. Here's how to do it:

1.) First, head on over to this Web site.

2.) Once you're there, choose the option to get your free certificate.

3.) Fill out the form to get your certificate. Also, make sure you use the correct e-mail address and choose the high-grade size.

4.) An e-mail will then be sent to you. That e-mail will have directions on how to use the certificate. Click on the button to install the certificate.

5.) After the certificate is installed, you'll have the ability to digitally sign e-mails. That means you can send e-mails to people and they'll know for sure it's coming from you. After you send someone a signed e-mail, they can then send encrypted e-mails to you as well.

Okay, I'm almost done! The last part of this is how to actually sign and encrypt the e-mail. In Outlook Express, when you write a new e-mail, you should see a button that says Sign. Just click on that button and then send your e-mail like normal. If you have a signature from the person you're sending to, just press Encrypt and the e-mail will be protected.

Now, I know some of you are saying, "What do I do? I want to encrypt an e-mail to someone who doesn't have a certificate." Well, there's a way to do that too, but you'll have to wait until tomorrow. In tomorrow's newsletter, I'll show you a free download to use with Outlook Express or Outlook that will allow you to send encrypted e-mails to anyone. So, until tomorrow, stay safe out there, my friends!

As you probably remember, yesterday, I wrote about how you can secure your e-mail using a security certificate (you can read that tip here if you missed it). That process required both parties to be using an e-mail client, such as Outlook Express or MS Outlook. Well, today, I'll talk about another method of e-mail encryption that allows you to send secure e-mails to anyone if you're using Outlook Express. The best part about this method is that while you still have to be using an e-mail client, the recipient can be using any program and they can still read the e-mail by going to a secure link through the provider of the program. Let's check it out!

The program is called Comodo SecureEmail and it's completely free! All you need to do is install Comodo SecureEmail, use the wizard to get an e-mail certificate and start sending out secure e-mails. When you send a secure e-mail to a person who doesn't have the correct requirements, they'll be directed to a Web site where they can read your e-mail securely and safely.

To learn more about SecureEmail and download it for yourself, simply go here. Enjoy!

Permalink • Print • Comment

LCD Zoom

Has this ever happened to you? You take an amazing shot with your digicam, it looks great on the camera's LCD monitor and you think you have a real winner. However, when you get back home, you're disappointed when you discover it wasn't quite as sharp as it looked on the LCD screen. Is there a way to have averted this tragedy? You bet there is!

Most (not all, but most) digital cameras have a "zoom" feature for their LCD screens. By "zooming in" on various areas of your image, you can tell if it's sharp or not.

Looks good small:

But maybe not so great enlarged:

Usually, the procedure works like this:

You set the camera to "review" mode, so you can look over the images you just shot. Most cameras will have a magnifying glass symbol somewhere near a button you press to zoom in. It may even be integrated into your camera's zoom lens function (for example, in "review" mode, you press the "zoom" button you use for the lens to zoom in on the image).

Once you start zooming, you can probably "scroll" around the image using a dial or set of buttons on the back of your camera. To determine exactly how your camera's zoom and scroll features work, it's probably a good idea to check your owner's manual.

Now, here's the trick. LCD screens on digital cameras tend to be a little less than perfect. They usually give a false sense of color, contrast and even sharpness. So, as you zoom in, you may find that the image looks a bit on the soft side when it's really not or it may seem sharp when it's anything but.

My advice is to leave your images on street value of cialis your card the next time you download them onto your computer. Find a few that are really sharp and print them out to be sure. Now, turn your camera on and take a good look at those pictures. Zoom in, zoom out, scroll around. Get a feel for how your camera's LCD monitor displays a sharp photo.

Let me tell you, the first time I had my new digicam, I was zooming in and thought every image I was taking was soft. I was on a trip and it was more than a little frustrating. It was only after I arrived home and started looking over the images on my computer that I got a feel for how my camera's LCD screen shows sharpness. Now, when I take a picture, I can zoom in and right away, I know if the image is sharp or soft. It was just a matter of getting myself "calibrated" to it. Give it a shot for yourself!

Permalink • Print • Comment
« Previous PageNext Page »
Made with WordPress and Semiologic • Sky Gold skin by Denis de Bernardy