Netbook and Windows 7
Should I upgrade the operating system of the netbook (notebook computer) is used on Windows 7 Starter? Completely as Starter version is cheap, low performance in the different versions of Windows 7. Starter commonly used in computers cheap, low hardware configuration.
The small question
It should be noted that all 32-bit version of Windows 7 requires a minimum hardware configuration similar. Microsoft also said that most netbook can run both Windows 7 Ultimate (the most advanced version). PC World tested the Lenovo IdeaPad S10-2 showed that the Starter version, but not much faster than the Home Basic and Home Premium. Test results also show, Home Basic, Home Premium to run a little faster, but more likely because Aero Glass graphical interface. In addition to not support Aero Glass, then the Starter missing a number of features such as ability export images to multiple screens at once, does not support DVD playback, Windows Media Center and the ability to personalize your desktop. According to Microsoft, the summary of these features to reduce cost and not affect handling performance. Therefore, if you're intending to upgrade Windows 7, select the appropriate version to configure netbook to get consistent performance.
COMPUTER NOT STARTING
Many readers often "blamed" for the virus (computer) system crash when "blue screen of death" (BSoD) or when a notification that no operating system exists on the hard hard, even notice the system has no hard drive at all.This concept came about in 1990 when the virus as Leonardo could cause the computer will not boot and can not access the data. Moreover, if the computer is infected with Leonardo (spread by floppy disk) was launched on March 6, the virus will wipe out all data on your hard drive. But with a number of knowledge and experience, users easily recover data. The creation of the malware (virus or malware in general) is the hobby of a number of savvy computer users (private hackers or hacker) with many different purposes (mostly bad). Hackers can use your computer to send spam, infect other malware into your computer, or even used as a "rear" to carry out attacks as denial of service (DDoS). More dangerous, you have control of your computer, hackers can easily steal the account password and credit card information. the opinion of many security experts and the experience of the writer shows If the computer can not boot it is not likely caused by malware. You can refer to the article "Computer does not boot" (ID: A1102_102) for more ways to troubleshoot your computer.
Many readers often "blamed" for the virus (computer) system crash when "blue screen of death" (BSoD) or when a notification that no operating system exists on the hard hard, even notice the system has no hard drive at all.This concept came about in 1990 when the virus as Leonardo could cause the computer will not boot and can not access the data. Moreover, if the computer is infected with Leonardo (spread by floppy disk) was launched on March 6, the virus will wipe out all data on your hard drive. But with a number of knowledge and experience, users easily recover data. The creation of the malware (virus or malware in general) is the hobby of a number of savvy computer users (private hackers or hacker) with many different purposes (mostly bad). Hackers can use your computer to send spam, infect other malware into your computer, or even used as a "rear" to carry out attacks as denial of service (DDoS). More dangerous, you have control of your computer, hackers can easily steal the account password and credit card information. the opinion of many security experts and the experience of the writer shows If the computer can not boot it is not likely caused by malware. You can refer to the article "Computer does not boot" (ID: A1102_102) for more ways to troubleshoot your computer.
Secure WiFi network
If not controlled, strangers (or any application) to access your WiFi network, make sure they will "steal" bandwidth; most recognizable signs of a slow-speed Internet access and the risk of stolen information, the data will occur if access to personal computers. Therefore, to enhance security for personal WiFi network, the first thing to do is make sure no one be accessed without your consent. Most routers (router) or access point mode support encryption like WEP, WPA or WPA2, you should consult the documentation accompanying the device options are used. The security settings for the WiFi network requires a password you create (as "healthy" as possible) to hackers or other users is difficult to predict. Of course, you must remember to enter the correct password for all devices, from desktops, laptops, smart phones, the first multimedia playback, format the hard drive or NAS supports network printer wire. Also, ways to limit the access of users are using the router's MAC address filtering. Each device will be available NSX assign a particular MAC address, simply enter the address to the list of allowed network connections. With machine running Windows, open the Command Prompt, type ipconfig / all, then press Enter. MAC address is the value in the "physical address". PC World 4 / 2011
If not controlled, strangers (or any application) to access your WiFi network, make sure they will "steal" bandwidth; most recognizable signs of a slow-speed Internet access and the risk of stolen information, the data will occur if access to personal computers. Therefore, to enhance security for personal WiFi network, the first thing to do is make sure no one be accessed without your consent. Most routers (router) or access point mode support encryption like WEP, WPA or WPA2, you should consult the documentation accompanying the device options are used. The security settings for the WiFi network requires a password you create (as "healthy" as possible) to hackers or other users is difficult to predict. Of course, you must remember to enter the correct password for all devices, from desktops, laptops, smart phones, the first multimedia playback, format the hard drive or NAS supports network printer wire. Also, ways to limit the access of users are using the router's MAC address filtering. Each device will be available NSX assign a particular MAC address, simply enter the address to the list of allowed network connections. With machine running Windows, open the Command Prompt, type ipconfig / all, then press Enter. MAC address is the value in the "physical address". PC World 4 / 2011
Tags: Technology