Rid your computer of the Conficker virus: "If you're struggling to beat back the Conflicker virus, this guide will help you cleanse your system and inoculate your computer against other Conflicker variants."
(Via Clippings.)
Rid your computer of the Conficker virus: "If you're struggling to beat back the Conflicker virus, this guide will help you cleanse your system and inoculate your computer against other Conflicker variants."
(Via Clippings.)
10 free security tools that actually work: "
Plenty of solid products are available to help you protect your system — and some of them don’t cost a dime. Here’s a list of some of the most popular and effective free tools for defending yourself against a variety of threats.
PC security is a hot industry, thanks to forces from the Dark Side. Your system, more than finances, will determine the tools you use to protect it. However, for the casual home or business computer, a number of free security products work well. Almost all of these products offer a paid version with more features, and many users eventually upgrade — which is why these companies can afford to offer free products.
Before you spend your hard-earned money on expensive security products, check out the following free tools.
Note: This article is also available as a PDF download.
Without doubt, AVG is probably the most popular, free, antivirus software. It protects your system against both viruses and spyware. Initially, the free version of AVG was stable and effective. As the Dark Side advances, AVG has fallen behind a bit, but, it is still a good product if you combine it with other products (specifically, #2 and #3). Don’t depend solely on AVG.
Malwarebytes fights malware — programs designed with malicious intent. Unfortunately, there’s no way to uninstall malware once it’s installed, because it doesn’t show up in the Control Panel. In addition, these files usually install helper programs that re-download then reinstall the malware if you delete it. Malware includes viruses, worms, rootkits, spyware, and trojans. As these products evolve, they are harder to detect and remove. Malwarebytes is one of the best programs, free or not, for detecting and removing malware.
Spyware tracks your Internet usage to create a marketing profile that is then sold, without your knowledge, to advertising companies. If you notice a new toolbar in your browser, most likely you’re being tracked by spyware. Sometimes, these programs hijack your browser homepage, forcing you to browse the Internet through their system. Although spyware isn’t inherently destructive, it usually affects performance. If your system suddenly slows down, chances are you’ve been infected. Spybot - Search & Destroy detects and removes spyware, which isn’t covered by many other anti-malware applications.
Note: A combination of #1, #2, and #3 provides adequate protection for most single-user systems. They’re easy to use and don’t require special technical knowledge.
Within the context of the market, WOT is a fairly new offering that adds security, via an add-in, for your browser. It will keep your system safe from online scams, identity, theft, spyware, spam, viruses, and suspect commerce sites. As WOT encounters suspect sites, it alerts you. Of course, you decide whether to continue or not, but at least you go into the transaction forewarned.
WinPatrol is a robust security monitor that alerts you to hijackings, malware attacks, and changes made to your system without your permission. Traditional security programs scan your hard drive, searching for specific threats. WinPatrol uses a heuristic (discovery) behavior to detect attacks and violations by taking snapshots of critical resources and alerting you to changes.
Most of us have at least one insecure program installed, which puts our systems at risk. Secunia Personal Software Inspector (SPI) scans your PC for insecure programs. It also keeps you informed of updates and patches for your installed programs.
This free utility from Microsoft performs a number of important security functions:
System administrators will appreciate Wireshark, a network protocol analyzer. Security features include, among other things:
Nmap is a network-mapping utility for network exploration and security auditing. Uses for Nmap include:
If you suspect your system has been infected and your current tools aren’t able to deal with it, try one of the following free online scan services:
In addition, you can test your firewall at ShieldsUP.
Get the key facts on a wide range of technologies, techniques, strategies, and skills with the help of the concise need-to-know lists featured in TechRepublic’s 10 Things newsletter, delivered every Friday. Automatically sign up today.
(Via Clippings.)
Taming an Airport Express WDS Network: "Apple earns enough goodwill with its usually beautiful design and usability that every now and then it gets away with murder. Case in point: the Airport Express. I recognize that many people are happy with their AE's. I've found that...
"
(Via OReilleyMac.)
You Are Not Worthy of This Car: "Feast your eyes on the Vulca S. Feast them really hard, because you're unlikely to see it again. At least not in this lifetime, and on your budget.
(Via Clippings.)
Is Reznor a digital-music visionary? Ask Lars Ulrich: "Metallica's drummer and onetime Napster basher says he wants to pick Reznor's brain about the band maybe leaving its music label. Wait, doesn't he hate tech?"
(Via Clippings.)
The top 10 peeves of a support tech: "
IT pro Becky Roberts discovered that in the support field, certain workplace aggravations seem to persist regardless of the industry or environment. See if your biggest annoyances match hers.
Note: This article originally published in 2005. It’s also available as a PDF download.
A classic example of this is the VP who constantly tells me that the T1 is down whenever he can’t browse the Web or log into SAP. Instead of describing the symptoms, the VP tells me, ‘The T1 is down; fix it.’ This type of behavior is doubly annoying. Not only does it complicate the troubleshooting process, but it is also often difficult to disabuse the user of his misconception, leaving him, in this instance, with a false impression of an unreliable T1.
As much as I like to share my knowledge and educate users, I don’t want to do so while I’m struggling to figure out exactly why Ethel can’t print. This is particularly irritating when dealing with an apparently insoluble problem, as the user’s probing questions, which I can’t answer, are a reminder of my incompetence.
This is the ‘What? World of Warcraft is installed on my computer? I have absolutely no idea how that could’ve happened’ phenomenon. In one instance, a summer intern from the local university MBA program called the help desk to complain that he couldn’t access the network. A quick survey of his computer revealed that it no longer contained any files beginning with the letter n. The intern vehemently denied having deleted any files whatsoever but eventually confessed that he didn’t have anything to do so he thought he’d delete all the files he didn’t recognize. Why he started with the letter n remains a mystery.
I dread problems that result in a call to the manufacturer’s tech support department. I will experiment, read manuals, Google the error message, and sacrifice chickens on the keyboard before I will call a tech support number for a problem I can’t resolve. My pride simply can’t handle answering the most basic questions: Have you checked that the printer is in fact plugged in and turned on? ARRRGGGH. Get me out of here. Please, please, please, put me straight through to your highest support level because I can guarantee that I have tried everything you are going to suggest at least three times. Oh wait, never mind, the power strip was turned off….
I understand and appreciate that part of the role of the purchasing department is to find the best possible price, but I do not appreciate it when they substitute what they consider to be an equivalent item because it is cheaper. One particularly irritating instance of this was an order I submitted for Kingston RAM for a Lexmark printer. When the RAM arrived, I failed to notice that it was Golden RAM instead of Kingston. It simply didn’t work. A quick check of the Lexmark documentation confirmed that Golden RAM was not acceptable, but as the RAM was now ‘used’ it could not be returned. The purchasing clerk had made the substitution on the advice of our VAR, as there was a special on the Golden RAM that made it a third of the cost of the Kingston RAM. This proved to be a very expensive attempt at cost savings.
We go to great lengths to minimize the junk mail being sent into the organization, but there seems to be little we can do to eliminate the jokes, photos, and movies being shared internally. Policies preventing or in some way restricting personal mail are of limited use unless mail is manually screened or spot checks are made. Merely using the corporate e-mail system for sending the occasional personal message is not a big deal, but when people start liberally using ‘Everyone’ or create folders for ‘Recipes,’ ‘Baseball,’ and ‘Boy Scouts,’ I tend to get a little annoyed.
During one particular job interview, my prospective new boss announced that he would hire only people who ‘eat, breath, sleep, and think computers 24/7.’ I stood up, shook his hand, and told him I was wasting his time and wished him luck. Not that there’s anything wrong with being computer-obsessed; it just so happens that I’m not. If I were, I would probably welcome having my peanut butter sandwich interrupted by, ‘Uh, every time I try to access the Internet, this message pops up and then the mouse freezes. What’s the deal?’ I’m more than happy to help people out. I just resent being asked at work where I’m a captive audience.
I find this situation especially irritating because in most cases, the user really didn’t have time to attend training or read the documentation — so it wouldn’t be fair of me to vent my frustration on the user. This is a symptom of the far bigger problem of expecting too much of too few employees. Instead of being irritated at these people, I find that they have my deepest sympathy, as they are usually the most overworked and pressured people in the organization.
This is extra annoying when the person in question is on a personal phone call with her husband to discuss plans for the weekend. I never know how long to wait. Leaving instantly would seem churlish, but once I have waited beyond a certain length of time, leaving and having to return a few minutes later simply increases the total time wasted. Fortunately, in all but the most intractable cases, treating the user as a used car salesperson by starting to walk away usually elicits a cooperative response.
During the course of my career, I have reported to an office manager who reported to a regional office VP; to an IT manager who reported to the CFO; to an IT manager who reported to another IT manager who reported to the CFO; to an IT manager who reported to a committee; and to a department head who wasn’t sure who he reported to. Whereas most departments know where they are positioned within a company, no one seems to quite know what to do with IT. All too often, the IT department is made into a subdivision of some other department, which then has unfair control over the IT resources. In other instances, each department or division has its own IT function, which may or may not have a well-defined relationship with corporate IT.
Okay, you know what bugs Becky — now it’s your turn. Do you face similar aggravations — or are you plagued by other issues? Feel free to jump in with your opinions and your own pet peeves.
(Via Clippings.)
Review: 3 disk-cleaning apps declutter your PC's hard drive: "After months and years, old file fragments and registry detritus can slow down your Windows PC. We tested three well-known disk cleaners against a well-used PC to see if they could help.
"
(Via Clippings.)
How to manage Macs: An expert guide for IT: "
Macs as desktops and servers are increasing their penetration in business, even in enterprises. Power users like Mac OS X's interface, bundled apps, and desktop and notebook hardware build quality. Application developers, marketers, and engineers appreciate the tool sets. Datacenter managers approve of Apple's Xserve reliability and versatility as a virtualization platform. But it's not all roses. IT managers, who ultimately must serve these communities' legitimate needs, are faced with some Mac-specific challenges.
The key to successful Mac management in the enterprise is recognition of its unique capabilities and knowing when not to treat it as just another Windows box.
[ Learn what's driving Macs into businesses. | Find out how to make Macs work as part of your business's IT infrastructure. ]
Fortunately, as the Mac has doubled its enterprise presence over the last two years, it's added new management options as well. Much of that growth occurred with Apple's Mac OS X 10.5 Leopard OS, but a good deal of the credit goes to third-party tool vendors.
Your management perspective informs your Mac management strategy
Your best bet for handling Macs depends on your enterprise management perspective. Most organizations fall into one of three: strictly controlling, flexible based on user capability, and application-centric rather than platform-centric. There's a Mac management strategy for each option.
A Windows-centric management philosophy often aims to control every desktop and server at a very fine-grained level, using Windows Group Policy Objects and unified management console. The Mac can play in this arena, but only with third-party tools.
Windows' strict management posture comes from the need to tightly enforce patch management and security policies to prevent virus and other intrusions, for which Windows has a famously large attack surface. The scope of vulnerability for Macs is demonstrably much smaller, and thus Macs don't necessarily require the same detailed control. (However, the Mac does have its own security issues that you should understand.) Many organizations can take a looser approach to management for their Macs.
Case in point: An information technologist at a major Southern California municipality notes, 'A small percentage of our users have Macs, but they're power users, in the sense that they're constantly reconfiguring their desktop environments. They authenticate to our network via Active Directory just like Windows users and access the Internet via the same Windows ISA server firewall, but we have less need to control their specific applications compared to Windows users.' It's not a perfect world, but a workable one.
The technologist continues, 'We bought anti-virus for Macs, but haven't had to deploy it because Macs aren't that vulnerable if configured correctly. We don't manage patches either, because users can self-manage and patches are less important to Macs from a security standpoint. We do have one issue with Mac FTP, which isn't compatible with our Windows ISA proxy; we have to route that traffic through a separate firewall.'
Another tactic is to become OS-agnostic and manage applications rather than platforms. Occam Networks, a manufacturer of fiber-to-the-home infrastructure components, sees this path ultimately rendering desktop parochialism moot. Ted Smith, the company's information systems architect, describes Occam's application management approach: 'We offer users their choice of desktop -- Mac, Unix, or Windows -- and let them customize it the way they see fit. We employ platform-agnostic application delivery using Citrix and Windows Terminal Services, in which applications reside in our datacenter, not on the desktop.
'Apps like finance, ERP, CRM, and sales run remotely, totally transparently to desktop users. There are fewer security issues because you're transporting all sensitive data over an encrypted tunnel. Who cares if a desktop blows up? Just give them a new one and they're back working where they left off,' says Smith.
There are management tool sets for each of these three management perspectives. But all require that you exert some effort to understand the Mac's unique capabilities to avoid managing them out of existence.
Windows-centric managers have rich tool sets from which to choose
The past two years have seen dramatic improvements to Mac OS X's Windows management interoperability. First, Mac OS X Leopard makes the Mac a player in the Windows Active Directory authentication scheme, via a plug-in that joins Macs to an ActiveDirectory domain using Windows-hosted credentials. Macs participate in standard SMB file sharing via built-in Mac OS X connectors, and Leopard's cross-platform Directory Utility lets Macs cache credentials the same way Windows clients do and participate in resilient multiple-domain controller ActiveDirectory forests.
Both Leopard and its predecessor Mac OS X 10.4 Tiger support Apple's MP (Managed Preferences) architecture, which is akin to Windows GPO (Group Policy Object) scheme. Both MP and GPO let you centrally control what printers, file shares, and other resources users can access, as well as enforce common security policies such as automatic logout, password-protected screen savers, removable media restrictions, network and proxy configuration, application protection, software updates, and preference locking. Out of the box, however, MP and GPO don't communicate. And Mac OS X lacks support for one critical Microsoft information interface: the Windows DFS (Distributed File System).
That's where third-party tools come in. Two packages provide mapping services from GPO to MP: Thursby's ADmitMac and Centrify's DirectControl. Both have client-side components that replace Apple's Active Directory plug-in, and both supplant Apple's SMB file sharing with their own enhanced equivalents. DirectControl has a more straightforward mapping of GPO to MP, and it stores that mapping within AD itself, while ADmitMac keeps mappings in a non-ActiveDirectory file server. However, only ADmitMac's file sharing includes full support for Windows DFS, which is a key requirement in many enterprise environments. Thursby also offers DFS support in its lightweight Dave file-sharing utility.
GPO propagation is just one aspect of Windows-centric administration. Others include asset tracking, patch management, and OS image generation and deployment. Neither ADmitMac nor DirectControl address these, but other third-party products do. JAMF offers two client management suites: Casper and Recon. Casper performs hardware and software enumeration and tracking -- including software license and data encryption management -- as well as staged imaging and secure remote control. It sports a customer service portal for user self-administration, in addition to a centralized admin console with an iPhone interface. Recon is a stripped-down version of Casper, with just the asset tracking, centralized console, and iPhone components.
Avocent's LANDesk is another Windows-oriented management tool with Mac capabilities, focusing on asset tracking and OS deployment. LANDesk uses Mac OS X Server to spin out OS deployment images via Netboot or HTTP, and it can even deploy Windows OS images to Mac-hosted virtual machines. This capability is central to any platform-agnostic desktop strategy where application, rather than device, management is the goal. LANDesk lets you distribute standardized OS images pre-configured for centrally hosted applications, ? la Citrix.
Symantec is a less-known player in the Mac desktop asset tracking/deployment niche with its Altiris Client Management Suite, which hasn't seen significant Mac enhancement since 2007. The Altiris Inventory Solution for Mac performs hardware and software discovery and asset tracking, while its Deployment Solution performs OS imaging via Mac OS X Server in the same way LANDesk does. Its Management Agent for Mac provides remote script scheduling, software update management, and limited policy enforcement.
Managing Macs using native tools may be a better approach
For enterprises that don't feel the need for Windows-based management, Apple's native Mac OS X management tools offer nearly an equivalent level of control that can still integrate with Windows Active Directory authentication infrastructure. In this management model, you use Mac OS X's built in Active Directory plug-in for domain authentication and SMB support for file and printer sharing, but depend on Mac OS X's Open Directory and Managed Preferences (MP) architectures for policy enforcement. You run one or more instances of Mac OS X Server, which provides MP controls in its Workgroup Manager interface. You must manually synchronize user groups between ActiveDirectory and Open Directory, but then ActiveDirectory user accounts automatically populate their corresponding Open Directory groups.
Alternatively you can configure the Open Directory server as an ActiveDirectory 'stub,' which eliminates the group synchronization chore but limits your MP choices to those that have a corresponding ActiveDirectory policy.
Apple's Screen Sharing service provides a convenient remote control interface for Mac OS X support. Screen Sharing is essentially VNC under the covers, so you can readily share screens from a Windows box via free VNC clients such as TightVNC, although you lose some of Screen Sharing's fancier features like scaling and autoscrolling.
Similarly, Apple's Time Capsule provides a sophisticated centralized backup system, with users able to retrieve files at will through Mac OS X's powerful Time Machine graphical browser. Alternatively, traditional backup products support Macs as well: Symantec Backup Exec, which backs up xServe storage that in turn contains desktop backups, and EMC Retrospect, an end-to-end desktop backup product. The future, however, may belong to cloud backup tools like Jungle Disk, which saves to Amazon's Simple Storage Service.
The future of management may not revolve around the desktop
If Occam's Ted Smith is on the right track, desktop-oriented administration may be nearing the end of its life as a management strategy. Occam's application virtualization approach reduces desktop management chores to basic security and patch control, with application security and configuration residing in the datacenter. Desktops are little more than disposable terminals to those applications, with users free to tailor their individual workstation with personal productivity tools. Another possible future is full desktop virtualization, in which the user's access device is a mere thin client with the desktop stored and executed on a datacenter-resident virtual machine.
That future is still a few years distant, though, and Mac proliferation is not waiting for it. To service user demand for Macs in the near term, avoid treating the Mac as just another Windows box. By recognizing the Mac's unique advantages -- which is what draws users to it in the first place -- you'll be better positioned to select from the rich and growing palette of Mac management tools.
(Via InfoWorld RSS Feed.)
Hyper-V Licensing Considerations: "
It never ceases to amaze me just how quickly server virtualization went from being a novelty to being a technology that almost everybody uses. For decades a server could be defined as a physical computer that was running a server operating system, and possibly a set of applications. This rather simplistic definition meant that licensing for a server was also usually pretty simple. There were exceptions to every rule, but generally speaking, you needed a license for the server’s operating system, and for any applications that were running on the server. Sometimes you might also require client access licenses, but even that wasn’t all that difficult to figure out.
Licensing gets a little bit trickier when you throw server virtualization into the mix, because suddenly there are multiple operating systems to consider. Unfortunately, there is no one single standard licensing model for virtualized environments. Every virtualization software vendor has their own licensing model. Even so, I wanted to try to shed some light on some of the issues that you will encounter when licensing virtualized servers by talking about Microsoft’s licensing policies.
Believe it or not, there are some licensing provisions which actually allow you to run Windows Server 2008 for free! Well, not completely free. You still need a license. In many organizations though, the costs of the Client Access Licenses (CALs) far outweigh the cost of the server license, and there are situations in which Microsoft does not require you to purchase CALs for Windows Server 2008.
The general of thumb on Windows Server 2008 CALs is that if the server is only acting as a Hyper-V host machine, then you don’t have to purchase CALs for it. You are allowed to run support services on the server, such as failover clustering, but you can’t run any applications that aren’t specifically related to virtualization, or a CAL will be required. Furthermore, the virtual servers that are being hosted on the server must be running an operating system other than Windows Server 2008. If any of the virtual servers are running Windows Server 2008, then a CAL is required.
We’ve all been to the grocery store and seen those buy one get one free deals. In a way, Microsoft gives you a similar deal on server operating system licenses when you use virtualization. One of the main reasons for using virtual servers is to decrease costs. However, the costs could actually end up increasing if you had to pay for a server license for the host operating system and for each guest operating system. To help make virtualization affordable, Microsoft gives you the Windows Server 2008 Enterprise guest operating system for free when you purchase the server license for the host operating system (assuming that the host is running Windows Server 2008 Enterprise and Hyper-V).
Actually the deal is a little bit better than that. When you purchase a Windows Server 2008 Enterprise license, you are actually entitled to use that license for the host operating system, and for up to four virtual servers that are running on the host. That’s five licenses for the price of one!
Keep in mind, you still have to purchase CALs. Remember though that Microsoft’s licensing model allows you to purchase CALs on a per user basis. That means that as long as your user count remains steady, you don’t have to purchase any additional CALs just because you have added another Windows 2008 server (or virtual server) to the network.
The terms of the server license is even better if you are running Windows Server 2008 Datacenter edition. When you purchase a Datacenter Edition license, you are entitled to run an unlimited number of virtual server operating systems on the host server.
Microsoft has actually adapted the licensing requirements of many of their server products to virtualized environments. They have created a special web page at that provides you with all of the details. As you can see in Figure A, the page gives you a very quick, simple explanation of the licensing requirements for each product, but provides you with a link to more detailed information.
Figure A
Microsoft has adapted their licensing policies for many of their server products.
As you can see, determining your licensing obligations becomes a little bit trickier in a virtualized environment. Even so, you usually end up coming out ahead on the licensing costs if you do end up virtualizing.
(Via Petri IT Knowledgebase.)
Obama Sides With RIAA, Supports $150,000 Fine per Music Track: "The administration supports fines up to $150,000 per purloined music track. Weighing in for the first time in a Recording Industry Association of America file-sharing case, Obama takes the same position as his predecessor.
(Via Clippings.)
12 tips and free downloads for your laptop: "
Our colleagues over at What Laptop are in the middle of posting useful tips and Q&As for solving all sorts of common notebook and netbook problems, for beginner to more experienced users, so we've collated 12 of the best for your reading pleasure.
1. Clean and speed up your laptop OS
It's all too easy to fill your laptop's hard drive with files and applications, and the more software you add the slower it's likely to run. Traces of programs are even left behind after you've uninstalled them, potentially slowing your laptop further. Thankfully, it's easy to spruce things up using an application called CCleaner.
Read on to discover how to download and use it.
2. Protect your laptop's data
Due to the portable nature of laptops and netbooks, the data it holds is unfortunately always at risk of both theft and loss. While it's impossible to keep your laptop 100% safe at all times, you can ensure that your data is kept safe, even if your laptop is stolen or lost, by encrypting it. One particularly easy free solution you can use is TrueCrypt.
Read on to discover how to download and use it.
3. Help your laptop run cooler
While the fantastic mobility of laptops makes them great for working on the sofa or on in bed, it's always important to make sure your laptop has adequate ventilation, to avoid overheating.
Read on to find out how to keep ventilation clear.
4. Help your battery live longer
When running a laptop at home from mains power, many users leave the battery plugged in at all times, so that it's always fully-charged for when they want to hit the road.
Find out why this is a bad idea and what you should do instead.
5. Change your netbook screen font size
While the compact size of netbooks makes them ideal for regular travel use, their tiny screens can often be awkward to use, when reading multiple pages of text or browsing the internet.
Find out how to change default font sizes.
6. Speed your laptop up
Most laptops that are brand new come with loads of software pre-installed – a lot of it trial-only, and many applications that you may not even use. The more software you install, the longer it'll take your laptop to start up, but with Autoruns, a free third-party app, it's a simple process to speed things up.
Read on to discover how to download and use it.
7. Clean a dirty laptop
The first thing you need to do is shut it down and unplug the power lead. It may be wise to remove the battery as well. To clean the chassis, a damp, but not wet cloth should be enough to remove most dirt and grime.
Read on for how to clean the keyboard and screen.
8. Clone your laptop's drive
'I have a laptop that's three years old and the hard drive is rapidly filling up. I would like to fit a higher capacity drive and I've looked at various online retailers and know the type of drive I need to buy. However, as there is a lot of data on it, is there any way to transfer the contents of my new hard drive directly onto the new one, without reinstalling Windows?'
There certainly is. Read on for how.
9. How to upgrade your notebook's memory
Your laptop manual will normally tell you how much memory you can fit, and what type and speed you need to use. However, if you don't have that to hand, a very useful tool is Crucial's memory advisor, at www.crucial.com/uk.
Find out more about memory upgrading.
10. How to get spare laptop parts
'The DVD drive on my Asus laptop has stopped working and it no longer shows up in My Computer. It's been troublesome for a while and I think it's finally given up the ghost. Is there anyway to replace the drive, or do I need to get one from Asus?'
Read What Laptop's advice on where to get replacement drives
11. Recover files from a damaged hard drive
Hard drives can fail without warning, although you'll normally receive some advanced notice, usually in the form or strange noises, or problems when reading or writing files. You can try downloading a program from www.ontrackdatarecovery.co.uk, called Verifile, which will tell you if any of your files are actually recoverable.
12. Use RAID drives in your laptop
'I have bought a new Acer Laptop, which has two 320GB hard drives. When I enter the BIOS and create a RAID set and set it to striping I see the two drives as 320GB each. However, when I then install Windows Vista, it shows only one drive with a capacity of about 700GB. Why don't I see two drives, and can I use a partitioning program to split this large drive into two?'
Read on for What Laptop's solution.
Thanks to What Laptop - head over to whatlaptop.co.uk for daily laptop previews and info.
Related Stories
(Via Clippings.)
New wonder pants burn body fat by magic: "
We've seen many novel uses of cutting-edge technology, from bicycles powered by fuel cells to tiny wind turbines for personal use, but surely none as odd as the latest underwear that helps its wearer lose weight.
The magical garments are the product of research at Japanese materials firm Teijin and are built on the company's expertise in nanotechnology.
Industrial material
Teijin's Nanofront fibre is made of strands that are just 700 nanometres thick – that's 7,500 times thinner than a human hair. Ordinarily, it's used in precision polishing cloths for industrial mirrors and the like.
Aside from making the underwear miraculously soft, the Nanofront also rubs the skin in such a way that it creates imperceptible friction that actually burns subcutaneous fat.
2010 launch
Teijin says tests have shown that wearing garments made of the fibre for 40 consecutive days cuts overall body fat and can reduce waist size by 'several centimetres'. There's no word on whether or not that's the same pair for 40 days in a row.
If all goes well, the new wonder pants could be on sale by next summer.
Related Stories
(Via Clippings.)
The beginner's guide to coding: "
You don't learn to ride a bike by reading books. No one can become a pilot by listening to someone else talk about plane journeys they've been on. Instead, we learn by doing, by trying, by failing and - most importantly - by succeeding. Because when you feel like you're winning, you get confidence in your skills and know that you can do anything.
Programming your computer is no different: it might seem hard, confusing or perhaps even boring, but it isn't. In fact, programming is hugely rewarding, because you exercise complete control over your computer. You can make it do things the way you want them to happen. And, if you're good, it can also lead to a whole new career.
This tutorial will teach you programming by making you program. Along the way you'll learn some theory, you'll learn some jargon, but most importantly you'll write your own program. More specifically, you'll write your own game. Even more specifically, you'll write your own super-cool game for Linux. Excited yet? You should be. Let's not hang around any more - it's time to get started...
Related Stories
(Via Clippings.)
Know your neighborhood: Thirteen sites: "If you're looking for a restaurant to try out tonight or you just want to find some local events, these sites are perfect for finding offerings in your area."
(Via Clippings.)
Take it back: GMail gets 'Undo Send' Labs feature: "Google launches the Omega 13 for e-mail: a way to recall messages within five seconds after pressing 'send.'"
(Via Clippings.)
Local news is dying. This is why you should care: "
We used to get a whole bunch of local newspapers: two freesheets and a slightly more serious paper that cost about 50p. Now, though, the freesheets don't pop through the letterbox any more and the paid-for paper is about as good as you'd expect from a tiny team who don't have the resources or the time they need to do their jobs. The property ads that used to pay the bills have moved online.
People selling sofas are sticking them on eBay. Car ads? eBay or Autotrader.co.uk. In the short term that's good news for us, because we can look for a house, a second-hand sofa or an old banger in seconds, and we can compare different items or go shopping at three in the morning. But in the long term it's terrible, terrible news.
Charles Arthur blogs about a typically daft example of local planning, where a town centre makeover is killing local businesses. In the old days, the local newspaper would have raised the alarm, co-ordinated a campaign and made the powers that be see sense. Now, the daft plan just goes ahead - largely because our attention is elsewhere.
As Arthur writes, quoting a commenter on another blog: 'You know about the iPhone getting cut and paste, and you've got an opinion about the new Facebook UI. Now tell us how much you know what's being done with your money a mile down the road.' We can tell you the names of key staff from any tech firm you can imagine. Our local MP? Er… Euro MP? Um… councillors? Ahh…
You can only care about what you know
It's not an either/or thing: knowing about the latest tech from across the pond doesn't mean you don't care about what's happening in your town. But you can only care about things you know about. We could fill an entire website listing the dumb decisions our local worthies have made over the last few years, and in each case we only found out about them after they'd already been carved in stone.
As the rush to go online leaves local newspapers understaffed or simply puts them under, who's going to tell you what's going on? Who's investigating the dodgy deals, conflicts of interest, corruption and flat-out insanity that so often occurs in local government? They've got our money.
Who's ensuring they spend it wisely? Who's watching racist, corrupt or plain stupid officials to ensure that they aren't using anti-terror powers against ordinary residents, or fiddling with figures to hide incompetence, or investing the Council Tax in bad banks?
Blogs? Not in our neck of the woods. They're not sitting in meetings, wading through minutes or filing Freedom of Information requests; their readers are scattered far and wide, so they may not have any local visitors at all; and what they do is often good, but it's reactive, not proactive.
They're responding to stories others have found and more often than not, they're going after national, not local, issues. Facebook groups, petitions and the various other ways people campaign about things online? Typically single-issue and completely ineffective.
What's worrying is that as we lose local newspapers - and we are losing them - we're losing something important: the ability to make local officials accountable for their actions. That used to be local newspapers' job. Now they're dying, who's going to take their place?
Because while iPhones and UIs are interesting, the things that will really change your life are being decided in a building an awful lot closer to home.
-------------------------------------------------------------------------------------------------------
You might also like Windows 7: designed for a world in the cloud
Sign up for the free weekly TechRadar newsletter
Get tech news delivered straight to your inbox. Register for the free TechRadar newsletter and stay on top of the week's biggest stories and product releases. Sign up at http://www.techradar.com/register
Related Stories
(Via TechRadar: All latest feeds.)
20 Facebook apps to try: "Are you tired of using Facebook online? Then turn to these desktop clients, which will give you most of the functionality of the site without forcing you to head to the Web."
(Via Clippings.)
In Depth: 10 essential tips for recovering lost files: "
Do you need us to tell you to back up your data? Hopefully not, but it doesn't matter how diligent you are, data loss can still occur if you're unlucky.
Perhaps a hard drive will have a problem, or a memory card will corrupt. Or maybe you've just deleted a file you simply didn't want to.
The key thing is to be prepared, so read on for our collection of essential tools and tips to give you a fighting chance of recovering lost, deleted and even corrupted data.
1. Build your recovery toolkit
The best time to install recovery tools on your PC is before you lose any data. Here is a choice of four free tools worth installing now which will be able to help you if something goes wrong: Recuva, PC Inspector File Recovery, SoftPerfect File Recovery and Undelete Plus.
2. Install to USB flash drive
Don't want programs cluttering up your hard drive, or already lost data on a drive? Fear not, Undelete Plus can be downloaded to and run directly from a flash drive; similarly, a portable version of Recuva can also be downloaded - extract the contents of the zip file directly to your flash drive.
3. File deletion
So long as the file hasn't been shredded with a secure data deletion tool, it may be recoverable. That's because the file itself isn't deleted even after emptying (or bypassing) the Recycle Bin; instead, the first few bytes are altered to tell Windows that the space used by the file is now available for writing to. The rest of the file is left intact until it's overwritten with fresh data.
4. Pick the right search
Most tools offer a variety of different searches depending on the nature of your data loss. Recuva uses a wizard that lets you look for specific file types - it's a quick search, so worth trying even if you suspect the lost data will prove hard to find.
5. Deep searches
File recovery tools offer more thorough (and much slower) search option that scans the drive cluster by cluster - this is useful for finding data from lost drives or partitions, but can also winkle out deleted files that don't show up under less intensive searches.
6. Data recovery outside Windows
Can't boot into Windows? You could recover your data simply by plugging the drive into another PC. Failing that, use a bootable rescue disc that gives you access to your files: try a Linux live CD or create your own BartPE disc here - you should be able to run data recovery tools from your flash drive in BartPE if necessary.
7. Recover data from CDs/DVDs
Data recovery from CD or DVD requires different tools, whether the problem is virtual or physical. Start with the free Unstoppable Copier, but if it doesn't work, try the free version of ISOBuster or check out CDRoller (US$29.50) instead.
8. Recover images from memory cards
You can even recover lost, deleted and corrupt photos from memory cards, so long as the card itself is visible in Windows. The trial version of Zero Assumption Recovery features fully functional image-recovery tools and enables you to preview your images before recovering them.
9. Recover corrupt files
You may recover the file, but find it's been damaged somehow. If this is the case, you may need to invest in third-party software such as PC Tools File Recovery (£29.95) or Recover My Files (£35). Both support a wide range of file formats, and the trial allows you to preview the results before you commit to a purchase.
10. Be prepared to pay
If your data is irretrievable, or your drive is physically damaged, ask yourself if it's worth the hundreds of pounds it'll cost to have the drive examined and any recoverable data retrieved by a data recovery specialist such as Ontrack.
-------------------------------------------------------------------------------------------------------
You might also like 10 really useful free Windows system tools
Sign up for the free weekly TechRadar newsletter
Get tech news delivered straight to your inbox. Register for the free TechRadar newsletter and stay on top of the week's biggest stories and product releases. Sign up at http://www.techradar.com/register
Related Stories
(Via TechRadar: All latest feeds.)
GrandCentral To (Finally) Launch As Google Voice. It's Very, Very Good. (Leena Rao/TechCrunch): "
Leena Rao / TechCrunch:
GrandCentral To (Finally) Launch As Google Voice.' It's Very, Very Good.' —' GrandCentral, a phone management service that first launched in 2006 and was acquired by Google for $50+ million in 2007, hasn't been in the news much lately.' Other than a few good natured jabs at their marketing gimmicks and coverage of outages, that is.
(Via Clippings.)
5 Steps to A Big Picture Approach to Virtualization: "In the current economic climate, organizations are cutting IT projects that are unable to show a strong return on investment within twelve months. But buoyed by the prospect of increased efficiency, lower costs, quick return on investment, and a more flexible model to align with primary business functions, virtualization is one of the IT projects getting almost universal buy-in from CIOs.
"
(Via Clippings.)