<?xml version='1.0' encoding='UTF-8'?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><feed xmlns='http://www.w3.org/2005/Atom' xmlns:openSearch='http://a9.com/-/spec/opensearchrss/1.0/' xmlns:blogger='http://schemas.google.com/blogger/2008' xmlns:georss='http://www.georss.org/georss' xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr='http://purl.org/syndication/thread/1.0'><id>tag:blogger.com,1999:blog-5318459668492336726</id><updated>2024-09-08T07:33:42.810+07:00</updated><category term="Computer"/><category term="Jokes"/><category term="Linux"/><category term="Love"/><category term="Business"/><category term="Games"/><title type='text'>Uncle Jack76&#39;s Blog</title><subtitle type='html'>blog for fun and share knowledge to other people</subtitle><link rel='http://schemas.google.com/g/2005#feed' type='application/atom+xml' href='http://uncle-jack76.blogspot.com/feeds/posts/default'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5318459668492336726/posts/default?redirect=false'/><link rel='alternate' type='text/html' href='http://uncle-jack76.blogspot.com/'/><link rel='hub' href='http://pubsubhubbub.appspot.com/'/><author><name>Uncle Jack</name><uri>http://www.blogger.com/profile/02111713531394122319</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjp0p5ig5lmwAWjB0E6ptlhGwBoW2kcH-yQkK7D6MR_E0ycrdWpHuah7ViUIgp70r0ggdqQ4TyRfJ1QeWrk810-JYl6nkK-qc_vB6Q-5BfkZvJb5uWuoWqFfvEilvywwis/s220/100x100px.jpg'/></author><generator version='7.00' uri='http://www.blogger.com'>Blogger</generator><openSearch:totalResults>24</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><entry><id>tag:blogger.com,1999:blog-5318459668492336726.post-3057598028133267606</id><published>2009-03-14T13:40:00.001+07:00</published><updated>2009-03-14T13:41:41.067+07:00</updated><title type='text'>Tips And Tricks For Your New Laptop</title><content type='html'>You were extra good this year and got a new laptop ... so that you can work from home (oh, joy!). Here are three ways that you can also have some fun with your laptop in 2008. Tip 1: Watch HDTV on your laptop, Tip 2: Transfer YouTube videos to your HDTV , Tip 3: Watch DVDs on a long flight.&lt;br /&gt;&lt;br /&gt;&lt;span class=&quot;fullpost&quot;&gt;&lt;br /&gt;&lt;span style=&quot;font-weight:bold;&quot;&gt;Tip 1&lt;/span&gt;: Watch HDTV on your laptop&lt;br /&gt;Did you know that you can watch your favourite TV shows without a TV? With the right accessories, you can watch high-definition television on a laptop.&lt;br /&gt;&lt;br /&gt;There are many portable high-def tuners, receivers, and antennas available for laptops. Also, you can usually find plenty of HDTV content choices on the road. A common misconception is that high-def signals are available only via cable and satellite transmissions. However, all free-to-air TV stations in Australia are now broadcasting HD signals. This excludes cable favourites such as The Comedy Channel and National Geographic, but at least you can get your HD Sunrise fix.&lt;br /&gt;&lt;br /&gt;The NetComm Banksia Digital HD USB TV Tuner, Elgato EyeTV DTT Stick and the ComPro VideoMate U3 DVB-T Stick cost between AU$100 and AU$200 and offer an array of DVR functionality. You may want to check signal availability in your area before purchasing one. Like when you&#39;re dealing with old-fashioned rabbit ears, signal strength varies depending on topography and atmospheric conditions.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight:bold;&quot;&gt;Tip 2&lt;/span&gt;: Transfer YouTube videos to your HDTV&lt;br /&gt;You could watch Internet video on a tiny laptop monitor. But why not hook up your laptop to your state-of-the-art HDTV and watch that ridiculous YouTube video in the living room?&lt;br /&gt;&lt;br /&gt;There are many options for connecting your laptop to your HDTV, but you may be limited by outputs and inputs. Unless your laptop was specifically built for home theater use, it probably doesn&#39;t have multiple ways to output a video signal to an external display such as your HDTV.&lt;br /&gt;&lt;br /&gt;Look at your laptop video card and match up the best connection option that both the display and the laptop share. DVI is becoming more common (replacing analog VGA); it&#39;s your best bet for a high-quality connection (that is, HDMI connections on your HDTV). S-Video is another likely option; it appears as a single, black, four-pin cable. It is a few rungs below DVI in terms of quality, but it&#39;s far from the worst. The bottom rung in terms of video quality belongs to the composite-video connection (the yellow cord, usually accompanied by the red and white audio jacks).&lt;br /&gt;&lt;br /&gt;If you are restricted to a composite-video connection on your laptop, you may prefer to upgrade your laptop if you plan on watching a lot of Internet videos on your TV. Consider a Windows Media Center laptop, such as the Toshiba Qosmio G30. Standard component cables (red, green, and blue) are common with HDTVs, but they&#39;re limited to higher-end home theater laptops and PCs.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight:bold;&quot;&gt;Tip 3&lt;/span&gt;: Watch DVDs on a long flight&lt;br /&gt;Imagine that you have an eight-hour flight with only your laptop and a few DVDs to pass the time. Unfortunately, you can&#39;t get enough juice out of the battery to cover your journey.&lt;br /&gt;&lt;br /&gt;The powers that be have heard your anguished cries of boredom and have implemented a useful new feature in current-generation laptops. Shell programs allow you to play DVDs and music CDs and to browse media files, saving battery life and skipping the hassle of booting up the OS each time you want to watch a movie or listen to some music. Check with your laptop&#39;s manufacturer to see if it offers a proprietary shell program for playing CDs and DVDs.&lt;br /&gt;&lt;/span&gt;</content><link rel='replies' type='application/atom+xml' href='http://uncle-jack76.blogspot.com/feeds/3057598028133267606/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://uncle-jack76.blogspot.com/2009/03/tips-and-tricks-for-your-new-laptop.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5318459668492336726/posts/default/3057598028133267606'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5318459668492336726/posts/default/3057598028133267606'/><link rel='alternate' type='text/html' href='http://uncle-jack76.blogspot.com/2009/03/tips-and-tricks-for-your-new-laptop.html' title='Tips And Tricks For Your New Laptop'/><author><name>Uncle Jack</name><uri>http://www.blogger.com/profile/02111713531394122319</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjp0p5ig5lmwAWjB0E6ptlhGwBoW2kcH-yQkK7D6MR_E0ycrdWpHuah7ViUIgp70r0ggdqQ4TyRfJ1QeWrk810-JYl6nkK-qc_vB6Q-5BfkZvJb5uWuoWqFfvEilvywwis/s220/100x100px.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5318459668492336726.post-3996009900465374319</id><published>2009-03-14T13:31:00.001+07:00</published><updated>2009-03-14T13:34:18.692+07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Computer"/><title type='text'>External Laptop Battery</title><content type='html'>An external laptop battery could be the perfect solution for those who must use the very mobile conveniences of the laptop, but need the power availability of the larger desktop models. With technology and business on the go growing by leaps and bounds, business men and women (or anyone who has come to depend upon the extreme conveniences of these travel computers) are discovering the challenges that come with being dependent upon mobile networks. The reality of having technology, business, personal information, clients, and files at the one&#39;s fingertips at all times has developed an new style of commercial industry. More businesses than ever before have employees and subcontractors that are no longer in office, but on the road, working from home, or taking care of business while flying to new clients and countries around the world.&lt;br /&gt;&lt;br /&gt;And so, the business world has changed. But, the challenges of having access to business systems twenty-four-seven has emerged and company tasks cannot be accomplished when that gold old constant computer companion has died for lack of battery power. But, never fear, there has been a response to the need for mobile light-weight, additional power and the result is the external notebook computer battery.&lt;br /&gt;&lt;span class=&quot;fullpost&quot;&gt;&lt;br /&gt;Work and play today equate to work and play on the go. This is a reality of the culture that we live in. As companies continue to expand to world wide enterprises and productions increase to meet the needs of many societies, combining office tasks and travel are necessary. The demands upon technology are high, however. Not only do we need technology to be lighter and easier to manage on an airplane or in the back of a taxi cab, but we need it to accomplish more, know more, file more, and offer more running time. Initially, manufacturers attempted to make better batteries that would last longer, and some have been successful. But, now the external laptop battery is the device that is providing the best solution. Anyone who uses a laptop daily will want to investigate the different models that are available on the market and discover that the amazing external notebook computer battery can add valuable work time by added uninterrupted power.&lt;br /&gt;&lt;br /&gt;The new models of external power offer the same mobility that the latest laptop computers are offering. Some of the external laptop battery options available are less than one-half inch thick and weigh less than two pounds. These models will fit into almost any computer case and become part of the necessary accessories that users will need at all times. External notebook computer battery packs can be charged apart from the computer, giving the user the ability to charge in another location. Most of the models on the market will adapt to several of the major manufacturer&#39;s models, as well. Different batteries advertise different power times, but most have a run time of five hours with some boasting an eight hour continuous run time. Run time will also depend upon what types of programs are being used on the computer. Programs that require more power, such as games, can drain a battery of power. And with the length of some international flights, additional run time offered from an external source could come in very handy.&lt;br /&gt;&lt;br /&gt;Some computer manufactures offer external laptop battery packs as an option with certain models. There are also several manufacturers that make external batteries adaptable to most computers. There are some of these power sources that also come with car adapters, so batteries can be charged without an electrical outlet source. These power sources can usually be used with DVD players, cell phones, electronic games, and cell phones. Those wanting to find a way to extend the running time of their computers can begin price comparison shopping online where many of these power sources are advertised.&lt;br /&gt;&lt;br /&gt;When looking for the right power source to extend computer running time, it may be wise to talk to others who have experience in electronics and accessories. As with any new device that enters the market, there are usually a few bugs to work out and the prices come down as the instrument is produced by more manufactures. The Bible, God&#39;s Word of wisdom to man, explains that getting the counsel of experts will always lead to making wise decisions and choices. Take time and to not only price-compare when shopping for external notebook computer battery packs, but speak with salesmen and the manufacturer of the laptop, as well.&lt;br /&gt;&lt;br /&gt;Consumers will want to also beware of cheaper batteries that are available through the Internet. Poor quality external laptop battery sources do exist in this competitive market. When a battery is as much as thirty percent cheaper than comparable models on the market, consumer may want to assume that the piece has been assembled with cells that do not meet UL standards. Check for UL standards before buying any battery power source.&lt;br /&gt;&lt;/span&gt;</content><link rel='replies' type='application/atom+xml' href='http://uncle-jack76.blogspot.com/feeds/3996009900465374319/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://uncle-jack76.blogspot.com/2009/03/external-laptop-battery.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5318459668492336726/posts/default/3996009900465374319'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5318459668492336726/posts/default/3996009900465374319'/><link rel='alternate' type='text/html' href='http://uncle-jack76.blogspot.com/2009/03/external-laptop-battery.html' title='External Laptop Battery'/><author><name>Uncle Jack</name><uri>http://www.blogger.com/profile/02111713531394122319</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjp0p5ig5lmwAWjB0E6ptlhGwBoW2kcH-yQkK7D6MR_E0ycrdWpHuah7ViUIgp70r0ggdqQ4TyRfJ1QeWrk810-JYl6nkK-qc_vB6Q-5BfkZvJb5uWuoWqFfvEilvywwis/s220/100x100px.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5318459668492336726.post-307459399943986715</id><published>2009-02-14T01:34:00.002+07:00</published><updated>2009-02-14T01:39:37.741+07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Computer"/><title type='text'>Find, Remove and Prevent Spyware, Internet Intruders, and Pop-Ups</title><content type='html'>&lt;span style=&quot;font-weight: bold;&quot;&gt;Spyware&lt;/span&gt; is one of the most typical Internet intruders. Spyware, is any product that employs a user&#39;s Internet connection in the background without their knowledge, and gathers/transmits info on the user or their behavior. Many spyware products will collect referrer info (information from your web browser which reveals what URL you linked from), your IP address (a number that is used by computers on the network to identify your computer), system information (such as time of visit, type of browser used, the operating system and platform, and CPU speed.) Spyware products sometimes wrap other commercial products, and are introduced to machines when those commercial products are installed.&lt;br /&gt;&lt;br /&gt;Trojans, also known as RATS (remote access Trojans), is another type of Internet intruder. Like the horse of old, a trojan carries with it an unexpected surprise. Trojans do not replicate like a virus, but they do leave behind a program that can be contacted by another computer. From there, they can do just about anything. While it&#39;s possible a trojan can be used to take control of a computer, the most common trojans are dialer programs. Dialers are used without your knowledge to make international or premium calls (900-type numbers) from your PC. That&#39;s more than an annoyance; it can get expensive.&lt;br /&gt;&lt;br /&gt;Trojans are most often hidden in games and other small software programs that unsuspecting users download then unknowingly execute on their PCs. Two common trojans are known as Back Orifice and SubSeven.&lt;br /&gt;&lt;br /&gt;Adware is software that displays advertisements to computer users. Some of the most strict definitions of adware include applications that are sponsored for their free use. For example, Gator is one adware that collects users information in exchange for its free use.&lt;br /&gt;&lt;span class=&quot;fullpost&quot;&gt;&lt;br /&gt;Spyware&#39;s Symptoms&lt;br /&gt;&lt;br /&gt;Spyware, trojans and adware contact other computers, and each of them is program of its own, therefore they use system resources such as CPU cycles, memory and an Internet connection.&lt;br /&gt;&lt;br /&gt;Slower Computer Speed&lt;br /&gt;&lt;br /&gt;There are several reasons your computer may be running slow, but if you use it on a regular basis, then you&#39;re familiar with their normal speed. Older computers tend to run slower. Some applications cause computers to run slower. Computers are machines, they do not have moods. A sudden change in how your computer is running could be a sign of spyware or adware.&lt;br /&gt;&lt;br /&gt;E-Mail Symptoms&lt;br /&gt;&lt;br /&gt;If you&#39;re getting a lot of bounced back mail and see evidence of e-mails being sent without your knowledge, then it&#39;s possible that trojan spamware has found its way onto your computer. Spamware is a trojan that can turn your computer into a spam launching pad and create headaches for unknowing computer users, especially if a virus is sent. Even if your computer is not being used to send spam, trojans can steal a copy of your e-mail address book and send it back to a spammer.&lt;br /&gt;&lt;br /&gt;Abnormal Behaviors&lt;br /&gt;&lt;br /&gt;Victims of some trojans report CD drives opening and shutting, or programs opening and closing.  These are all signs a program may be up to no good in the background.&lt;br /&gt;&lt;br /&gt;Offline Symptoms&lt;br /&gt;&lt;br /&gt;Keyboard loggers can capture passwords and user names, so if the bank, brokerage or credit card accounts you access online appear to have been tampered with, your computer may be a place to start looking for clues. User names and passwords to e-mail and Web-based applications are also vulnerable.&lt;br /&gt;If you have any reason to believe someone is interested in tracking what you do online, scan for spyware regularly.&lt;br /&gt;&lt;br /&gt;Pop-Up Advertisements&lt;br /&gt;&lt;br /&gt;If the following signs are present, it might be an indication that you are infected with Adware or spyware.&lt;br /&gt;&lt;br /&gt;-- Ads pop-up on your desktop or over offline applications such as a word processor&lt;br /&gt;-- Ads pop-up when you visited a Web site or open a new Web page.&lt;br /&gt;-- Pop-ups appear after you visited hacker sites or pornographic sites.&lt;br /&gt;-- The pop-up ads are targeting on terms you have searched recently .&lt;br /&gt;&lt;br /&gt;Locating Internet Intruders on Your PC&lt;br /&gt;&lt;br /&gt;To locate Internet intruders, your first stop should be the Add/Remove Programs section of your Windows Control Panel (Start Menu --&gt; Settings --&gt; Control Panel). You should also check the Windows Start-Up Folder (C:\Documents and Settings\All Users\Start Menu) to see if any programs have been added.&lt;br /&gt;&lt;br /&gt;Evidence of spyware infestations can also be found in your computer&#39;s registry. It is recommended that only experienced computer users change the registry, and there are registry editors available that help makes changes when they are needed. There are also registry monitors that keep track of which applications are accessing your computer&#39;s registry.&lt;br /&gt;&lt;br /&gt;Removal of Internet Intruders&lt;br /&gt;&lt;br /&gt;One of the first things you should do if you find a trojan or spyware on your computer is disconnect it from the Internet. It is probably not enough to just close a browser session; you should pull the phone line out of the wall or disconnect the modem so your computer is not connected to any network.&lt;br /&gt;&lt;br /&gt;Spyware and Adware Scanning Software&lt;br /&gt;&lt;br /&gt;The easiest way to find and remove spyware and adware is with scanning software. Anti-spyware software is not the same as anti-virus software, although some anti-virus packages will detect some known spyware programs. The good news is that some of the most functional anti-spyware and anti-adware software is free.&lt;br /&gt;&lt;br /&gt;Anti-spyware software works in much the same way as anti-virus software. It scans your computer&#39;s hard drive and looks for files associated with known spyware and adware programs. After the scan, the software usually displays or quarantines potential problems and allows users to decide what should be removed. As mention earlier, definitions vary and your tolerance to certain advertising-related cookies may be high.&lt;br /&gt;&lt;br /&gt;Like anti-virus software, anti-spyware software relies on databases of known rogue programs that must be updated. Regardless of which anti-spyware package you decide to use, make sure you understand how and when it updates so you are protected against the newest pests. Also check any type of spyware or adware removal programs with the spyware databases. A program called SpywareNuker claims to be a removal program, but has been reported to be spyware itself.&lt;br /&gt;&lt;br /&gt;Some anti-spyware software may specialize in locating only keyloggers, for example, so read the features before you use it.&lt;br /&gt;&lt;br /&gt;Other Removal Options&lt;br /&gt;&lt;br /&gt;You can always check the Add/Remove Programs section of Windows to see if any adware or spyware is listed. Some of the quasi-legitimate adware programs may include uninstallers, but malicious pests do not.&lt;br /&gt;&lt;br /&gt;Blocking Pop-Up Ads&lt;br /&gt;&lt;br /&gt;One way to avoid the potential danger lurking behind pop-up ads is to install software that blocks them. Many ISPs offer tools to stop pop-ups from appearing. The Mozilla browser does not allow pop-ups. The Google Toolbar also blocks pop-up ads.&lt;br /&gt;&lt;br /&gt;There are numerous programs that block pop-ups. Before installing them, research the developer and the company to make sure they are legitimate. Also be sure to note how they effect your system. Some pop-up blockers may discourage new windows, such as instant messages being sent to you, from opening.&lt;br /&gt;&lt;br /&gt;Windows Messenger Pop-Ups&lt;br /&gt;&lt;br /&gt;One relatively new form of pop-up that has been annoying Internet users with potentially dangerous effects is spam being sent using the Windows Messaging feature in Windows XP. This is not the instant messaging software that is used by millions of computer users, but rather an administrative tool that is meant to be used by systems administrators to contact users.&lt;br /&gt;&lt;br /&gt;While there are utilities that claim to stop such pop-ups, the Windows Messenger feature is relatively easy to disable. To disable the Windows Messenger in Windows XP:&lt;br /&gt;&lt;br /&gt;In Windows XP --&gt; Control Panel --&gt; Administrative Tools. Double-click Services. Double-click&lt;br /&gt;&lt;br /&gt;Messenger. In the Startup type list, choose Disabled. Click Stop, and then click OK. &lt;br /&gt;&lt;br /&gt;Safe E-Mailing&lt;br /&gt;&lt;br /&gt;You probably know that opening spam or any e-mail from persons unknown or with an unexpected attachment is unwise. In addition to viruses, RATS and other programs can be present in e-mail attachments. Web sites advertised in unsolicited e-mail can try to plant dialers or other types of pests on your computer.&lt;br /&gt;&lt;br /&gt;If you use Outlook or Outlook Express for your e-mail, there are some settings you can adjust to make your e-mail safe from spyware and viruses. The Preview Pane, which lets you view an e-mail while keeping your mailbox on the screen, has been a cause of concern among e-mail users, especially if you have scripting or ActiveX enabled. By automatically opening e-mails, there are reports of viruses spreading, such as the KAK-Worm. Malicious content like the KAK-Worm exploits security holes in the software, so enabling or disabling the Preview Pane is not the ultimate issue. Keeping up with patches and security fixes is a better long-term solution.&lt;br /&gt;&lt;br /&gt;To disable the Preview Pane in Outlook, click on the View menu. For more information on securing Outlook and Outlook Express, read this: http://www.tames.net/security/oesettings.htm&lt;br /&gt;&lt;br /&gt;Safe Surfing&lt;br /&gt;&lt;br /&gt;Be careful what you download. Read all dialogue boxes carefully and close anything that looks suspicious. When closing dialogue boxes or pop-up advertisements, be sure to use the proper &quot;X&quot; to close the window. The Web is full of ads that feature mock &quot;Xs&quot; or &quot;Close&quot; or &quot;OK&quot; buttons within the ad. Clicking on them actually clicked on the ad itself. If you&#39;re not sure how to safely close a window that has opened in your browser, right click on the window in your Windows Taskbar (usually at the bottom of your display) and click on &quot;Close.&quot;&lt;br /&gt;&lt;br /&gt;Some ads that appear online attempt to pass themselves off as security alerts or messages from tech support (these are called FUIs, or Fake User Interface, ads). If you&#39;re using a computer within an organization, communicate with your tech support staff if you&#39;re unsure whether a message is legitimate, and familiarize yourself with how tech support communicates with the computer users in your organizations.&lt;br /&gt;&lt;/span&gt;</content><link rel='replies' type='application/atom+xml' href='http://uncle-jack76.blogspot.com/feeds/307459399943986715/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://uncle-jack76.blogspot.com/2009/02/find-remove-and-prevent-spyware.html#comment-form' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5318459668492336726/posts/default/307459399943986715'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5318459668492336726/posts/default/307459399943986715'/><link rel='alternate' type='text/html' href='http://uncle-jack76.blogspot.com/2009/02/find-remove-and-prevent-spyware.html' title='Find, Remove and Prevent Spyware, Internet Intruders, and Pop-Ups'/><author><name>Uncle Jack</name><uri>http://www.blogger.com/profile/02111713531394122319</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjp0p5ig5lmwAWjB0E6ptlhGwBoW2kcH-yQkK7D6MR_E0ycrdWpHuah7ViUIgp70r0ggdqQ4TyRfJ1QeWrk810-JYl6nkK-qc_vB6Q-5BfkZvJb5uWuoWqFfvEilvywwis/s220/100x100px.jpg'/></author><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5318459668492336726.post-3660815087368838197</id><published>2009-02-10T23:58:00.000+07:00</published><updated>2009-02-10T23:59:50.306+07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Jokes"/><title type='text'>Lawyers on a Jury</title><content type='html'>A trial had been scheduled in a small town, but the court clerk had forgotten to call in a jury panel. Rather than adjourning what he thought was an exceptionally simple case, the judge ordered his bailiff to go through the courthouse and round up enough people to form a jury. The bailiff returned with a group of lawyers.&lt;br /&gt;&lt;br /&gt;The prosecutor felt that it would be an interesting experiment to try a case before a jury of lawyers, and the defense counsel had no objection, so a jury was impaneled. And the trial went very quickly — after only an hour of testimony, and very short closing arguments, both sides rested. The jury was then instructed by the judge, and was sent back to the jury room to deliberate.&lt;br /&gt;&lt;span class=&quot;fullpost&quot;&gt;&lt;br /&gt;After nearly six hours, the trial court was concerned that the jury had not returned with a verdict. The case had in fact turned out to be every bit as simple as he had expected, and it seemed to him that they should have been back in minutes. He sent the bailiff to the jury room, to see if they needed anything.&lt;br /&gt;&lt;br /&gt;The bailiff returned, and the judge asked, “Are they close to reaching a verdict?” The bailiff shook his head, and replied, “You’re honor, they’re still doing nomination speeches for the position of foreman.”&lt;br /&gt;&lt;/span&gt;</content><link rel='replies' type='application/atom+xml' href='http://uncle-jack76.blogspot.com/feeds/3660815087368838197/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://uncle-jack76.blogspot.com/2009/02/lawyers-on-jury.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5318459668492336726/posts/default/3660815087368838197'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5318459668492336726/posts/default/3660815087368838197'/><link rel='alternate' type='text/html' href='http://uncle-jack76.blogspot.com/2009/02/lawyers-on-jury.html' title='Lawyers on a Jury'/><author><name>Uncle Jack</name><uri>http://www.blogger.com/profile/02111713531394122319</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjp0p5ig5lmwAWjB0E6ptlhGwBoW2kcH-yQkK7D6MR_E0ycrdWpHuah7ViUIgp70r0ggdqQ4TyRfJ1QeWrk810-JYl6nkK-qc_vB6Q-5BfkZvJb5uWuoWqFfvEilvywwis/s220/100x100px.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5318459668492336726.post-3094541340934383187</id><published>2009-02-10T23:52:00.001+07:00</published><updated>2009-02-10T23:55:32.014+07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Jokes"/><title type='text'>Girlfriend 1.0 Software</title><content type='html'>Last year, my friend upgraded his GirlFriend 3.1 to GirlFriendPlus1.0 (marketing name: Fiancee1.0).&lt;br /&gt;&lt;br /&gt;Recently he upgraded Fiancee1.0 to Wife1.0, and it’s a memory hogger! It has taken all his space; and Wife1.0 must be running before he can do anything. Although he didn’t ask for them, Wife1.0 came with Plug-Ins such as MotherInLaw and BrotherInLaw. These too slow down the system and cause a slow drain on the resources and well-being of the computer.&lt;br /&gt;&lt;br /&gt;Some features I’d like to see in the upcoming GirlFriend4.0:&lt;br /&gt;&lt;br /&gt;1. A “Don’t remind me again” button.&lt;br /&gt;&lt;br /&gt;2. Minimize button.&lt;br /&gt;&lt;br /&gt;3. Shutdown feature - An install shield feature so that Girlfriend4.0 can be completely uninstalled if so desired (so you don’t lose cache and other objects).&lt;br /&gt;&lt;span class=&quot;fullpost&quot;&gt;&lt;br /&gt;I tried running Girlfriend 2.0 with Girlfriend 1.0 still installed; they tried using the same I/O port and conflicted. Then I tried to uninstall Girlfriend 1.0, but it didn’t have an uninstall program. I tried to uninstall it by hand, but it put files in my system directory.&lt;br /&gt;&lt;br /&gt;Another thing that sucks–in all versions of Girlfriend that I’ve used is that it is totally “object orientated” and only supports hardware with gold plated contacts.&lt;br /&gt;&lt;br /&gt;Bug warning&lt;br /&gt;Wife 1.0 has an undocumented bug. If you try to install Mistress 1.1 before uninstalling Wife 1.0, Wife 1.0 will delete MSMoney files before doing the uninstall itself. Then Mistress 1.1 will refuse to install, claiming insufficient resources.&lt;br /&gt;&lt;/span&gt;</content><link rel='replies' type='application/atom+xml' href='http://uncle-jack76.blogspot.com/feeds/3094541340934383187/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://uncle-jack76.blogspot.com/2009/02/girlfriend-10-software.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5318459668492336726/posts/default/3094541340934383187'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5318459668492336726/posts/default/3094541340934383187'/><link rel='alternate' type='text/html' href='http://uncle-jack76.blogspot.com/2009/02/girlfriend-10-software.html' title='Girlfriend 1.0 Software'/><author><name>Uncle Jack</name><uri>http://www.blogger.com/profile/02111713531394122319</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjp0p5ig5lmwAWjB0E6ptlhGwBoW2kcH-yQkK7D6MR_E0ycrdWpHuah7ViUIgp70r0ggdqQ4TyRfJ1QeWrk810-JYl6nkK-qc_vB6Q-5BfkZvJb5uWuoWqFfvEilvywwis/s220/100x100px.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5318459668492336726.post-4859554492772295879</id><published>2009-02-09T10:33:00.001+07:00</published><updated>2009-02-09T10:38:51.842+07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Computer"/><title type='text'>Protect your Wi-Fi from unauthorized access</title><content type='html'>Computers are connected through wired or wireless media. In wired media STP or UTP cables and devices like hub, switches, routers etc. are used. Now a days people are opting for wireless networking more than wired networking. In wireless networking radio waves and microwaves are used to attach computers. Wireless network also called Wi-Fi network. The first wireless card was 802.11b but the standard are upgraded day by day. In companies, universities, libraries, hotels, airports wireless network are more in demand and more feasible than the wired network. Telecommunication network is a bigger network in wireless networking eg. Mobile Phones. There are many wireless devices that are used like wireless Access Point, Wireless LAN Cards, Wireless Adapters, Wireless Routers etc. There are many types of wireless networking like Wireless PAN, Wireless LAN, Wireless MAN etc.&lt;br /&gt;&lt;span class=&quot;fullpost&quot;&gt;&lt;br /&gt;The wireless network has many advantages as compare to wired networking, there is no need to put cables across the walls of homes and offices, it helps maintaining the beauty and cost/time incurred on drilling/repairing the walls is saved. We also save cost incurred on network cables, it is less time consuming and requires less technical support, easy to set up than wired media. It is accessible anywhere within its range, hence you need not to find a network I/O to get connected, take your laptop within the range of the wi-fi network and access the internet or other resources.&lt;br /&gt;&lt;br /&gt;The only problem of a wi-fi network is its limited range and larger networks are affected by weather as well. If you want to setup wi-fi for a large area say college campus etc. you have to add in more access points.&lt;br /&gt;&lt;br /&gt;If you are planning to setup a wi-fi network at your home or office, you must address the security issues as someone may intrude into your network and access your valuable information or may send emails using your IP. In the recent incidences, terrorists used the Wi-Fi network of neighbors to communicate with each other and sent threatening emails to people. Hence, ensure that your Wi-Fi is fully secured and nobody else is using it except you.&lt;br /&gt;&lt;br /&gt;You can protect your network with firewalls, proxy, VPN and WEP key etc. In WEP (Wired Equivalent Privacy) we give a security code that secures our network and unauthorized person can not access the network. WEP comes with 64bit, 128bit , WPA-PSK, WPA–TKIP security features. For better security, keep changing your WEP key and administrator password, router password regularly, filter out the MAC address and use firewalls at every computer in a network and lock all the folders and make access lists. Access list provided extra level security while giving instructions to routers and filter the MAC addresses. Switch off the routers and other devices when not in use. But the above securities measures can not be implemented in the public areas like libraries, hotels, airports etc.&lt;br /&gt;&lt;/span&gt;</content><link rel='replies' type='application/atom+xml' href='http://uncle-jack76.blogspot.com/feeds/4859554492772295879/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://uncle-jack76.blogspot.com/2009/02/protect-your-wi-fi-from-unauthorized.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5318459668492336726/posts/default/4859554492772295879'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5318459668492336726/posts/default/4859554492772295879'/><link rel='alternate' type='text/html' href='http://uncle-jack76.blogspot.com/2009/02/protect-your-wi-fi-from-unauthorized.html' title='Protect your Wi-Fi from unauthorized access'/><author><name>Uncle Jack</name><uri>http://www.blogger.com/profile/02111713531394122319</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjp0p5ig5lmwAWjB0E6ptlhGwBoW2kcH-yQkK7D6MR_E0ycrdWpHuah7ViUIgp70r0ggdqQ4TyRfJ1QeWrk810-JYl6nkK-qc_vB6Q-5BfkZvJb5uWuoWqFfvEilvywwis/s220/100x100px.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5318459668492336726.post-5951009909244184996</id><published>2009-02-07T01:24:00.000+07:00</published><updated>2009-02-07T01:25:44.699+07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Computer"/><title type='text'>5 Easy Tips To Keep Your Computer Running Smooth And Safe</title><content type='html'>There are various ways to streamline computer performance and functionality. I will show you five very helpful methods that I have learned in the field to help keep your computer running great. Some are free but there are some which will require a small investment which is well worth the cost. I have provided some links at the bottom of this article to help you decide what tools to invest in. This article is for Windows 2000/XP users only&lt;br /&gt;&lt;span class=&quot;fullpost&quot;&gt;&lt;br /&gt;1. Cleanup your startup menu- This is perhaps the fastest way to improve overall performance and startup speed. To do this, go to the run command line in the start menu and type in msconfig. Please ONLY use the startup tab at the top!! Go through the list of startup programs and disable messengers, updaters, and applications that are not used at all times ie. (quick time task, winzip, Ituneshelper). The rule of thumb here is disable what you know you don&#39;t need and don&#39;t touch anything you do not understand or recognize, they are most likely drivers and system files.&lt;br /&gt;&lt;br /&gt;2. Run a disk defragment- If you notice that your applications are taking a long time to load or are not running as smooth as your used to run a disk defragment. This will basically organize your hard drive to run more efficiently. To run, go to your start menu, program files, accessories, system tools, Disk Defragmenter. Click the analyze button to see if you need to defragment and if you do, click the defragment button. Please note, while running this utility you should not make any system changes including saving and deleting files, installing and/or uninstalling programs or moving files on your hard drive. It is best to just start it and let it run. It can take up to 5 hours depending on the size of the drive and the amount of fragmentation in the volume. This is easiest to start before you go to bed.&lt;br /&gt;&lt;br /&gt;3. Use anti-virus- I can&#39;t stress this enough, if you are on the internet you need anti-virus. Not only will it protect you from attacks but it will actively scan any files you open and will stop most viruses BEFORE they infect you computer. You will have to purchase this for your computer and I have provided some helpful links to good anti-virus programs. These should be set to be running at all times through the settings of the anti-virus program and updated weekly if not daily.&lt;br /&gt;&lt;br /&gt;4. Run spy-bot scans regularly- Spy bots are not the same as viruses. A virus is aimed to infect and deter your computer from running correctly. Spy bots can steal your information, passwords, logins, and are typically malicious in intent. I consider these more dangerous than viruses because they can literally steal your identity without you knowing it and open the door to automatically download viruses to your computer. I have also provided links for effective spy bot removal tools. These should be run twice a month.&lt;br /&gt;&lt;br /&gt;5. Registry Cleaners- A little known tool for making a huge performance increase to your computer is running a registry cleaner regularly. Basically what these do is remove any unnecessary piece of your registry left behind from either updating your software, removing a program or deleting program directories. By doing this it will help your computer find the correct paths it needs to run the commands given to it and help avoid &quot;confusion&quot; by removing &quot;broken pieces&quot; in the registry.&lt;br /&gt;&lt;/span&gt;</content><link rel='replies' type='application/atom+xml' href='http://uncle-jack76.blogspot.com/feeds/5951009909244184996/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://uncle-jack76.blogspot.com/2009/02/5-easy-tips-to-keep-your-computer.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5318459668492336726/posts/default/5951009909244184996'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5318459668492336726/posts/default/5951009909244184996'/><link rel='alternate' type='text/html' href='http://uncle-jack76.blogspot.com/2009/02/5-easy-tips-to-keep-your-computer.html' title='5 Easy Tips To Keep Your Computer Running Smooth And Safe'/><author><name>Uncle Jack</name><uri>http://www.blogger.com/profile/02111713531394122319</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjp0p5ig5lmwAWjB0E6ptlhGwBoW2kcH-yQkK7D6MR_E0ycrdWpHuah7ViUIgp70r0ggdqQ4TyRfJ1QeWrk810-JYl6nkK-qc_vB6Q-5BfkZvJb5uWuoWqFfvEilvywwis/s220/100x100px.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5318459668492336726.post-1992361870821258452</id><published>2009-02-07T01:21:00.000+07:00</published><updated>2009-02-07T01:22:49.939+07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Computer"/><title type='text'>Backup Solutions For the Home User</title><content type='html'>For any home user there are many reasons to backup your data. In case of hard drive failure, fire, flood, computer crashes etc. There are also many ways to preserve your data with different types of backup solutions.&lt;br /&gt;The easiest and most inexpensive way to backup data such as pictures, home movies, or financial data is to burn the files to a DVD. That way, in case of data loss or if you have to rebuild your computer, you just simply put in your DVD with the data on it and copy it back to where it should be. If you do not have a DVD burning program, they typically cost about $30. With that you will be able to choose what data goes on each DVD and can be a much easier way to organize your data. There are various backup programs on my site. I can&#39;t stress enough though, once the data is backed up please move the discs off site from your home. If there is a fire you will lose the data on both the computer and your backups. If you cannot find a place to put them away from home, buy a DATA fire safe. They cost a couple hundred dollars, but if you try to put a dollar amount on your data the price is well worth the investment.&lt;br /&gt;&lt;span class=&quot;fullpost&quot;&gt;&lt;br /&gt;If you do not like burning DVDs or you just have too much data to copy. I highly recommend purchasing an attachable drive bay with as much space as you need. A drive with anywhere from 500GB to 1TB will cost anywhere from $150 to $300 depending on the size of the drive. Once the data is copied over, you need to find a way to protect it in case of disaster. You can put it in a fire proof safe or possibly at a trusted person&#39;s house. Keep in mind though if you are adding data regularly you will want to backup at least once a week. To avoid copying the same data twice, use a program similar to AllWay Sync, it will read both sides of data, compare them and only copy the changes. &lt;br /&gt;Another solution which makes it easy to save data offsite is by using an online backup solution. These sites can be found by searching for a remote offsite backup solution. They will charge you a monthly fee typically and can be very expensive depending on how much data you have. There is also the argument of them having access to your data which is something I personally do not like. &lt;br /&gt;In the end, the choice is up to you. I highly recommend some type of backup solution and I have personally suffered the consequences of not doing so. I lost all of me wedding pictures and the first four months worth of pictures of my son because my hard drive crashed&lt;br /&gt;&lt;/span&gt;</content><link rel='replies' type='application/atom+xml' href='http://uncle-jack76.blogspot.com/feeds/1992361870821258452/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://uncle-jack76.blogspot.com/2009/02/backup-solutions-for-home-user.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5318459668492336726/posts/default/1992361870821258452'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5318459668492336726/posts/default/1992361870821258452'/><link rel='alternate' type='text/html' href='http://uncle-jack76.blogspot.com/2009/02/backup-solutions-for-home-user.html' title='Backup Solutions For the Home User'/><author><name>Uncle Jack</name><uri>http://www.blogger.com/profile/02111713531394122319</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjp0p5ig5lmwAWjB0E6ptlhGwBoW2kcH-yQkK7D6MR_E0ycrdWpHuah7ViUIgp70r0ggdqQ4TyRfJ1QeWrk810-JYl6nkK-qc_vB6Q-5BfkZvJb5uWuoWqFfvEilvywwis/s220/100x100px.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5318459668492336726.post-7203060185522892877</id><published>2009-01-27T22:07:00.002+07:00</published><updated>2009-01-27T22:13:29.329+07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Computer"/><title type='text'>The History Of Laptop Computers</title><content type='html'>Have you ever wondered where the sleek new portable PC&#39;s of today came from? How did they get so small, and so fast? It&#39;s true that modern notebook computers have undergone many changes throughout the years.&lt;br /&gt;&lt;br /&gt;In this article I will attempt to put together a rough history and timeline based on the laptop computer. I say rough because no one can really put a finger on who developed the first mobile computer. Anyways, let&#39;s get started!&lt;br /&gt;&lt;br /&gt;Computer buffs may not know who created the first laptop, but most will agree that Alan Kay of the Xerox Palo Alto research center was the first to come up with the idea of the portable PC in the 1970&#39;s. Kay envisioned a portable computer much like the ones found today &#39; Something small and lightweight that anyone could afford.&lt;br /&gt;&lt;span class=&quot;fullpost&quot;&gt;&lt;br /&gt;Some say that the first notebook that was actually built in 1979 by William Moggridge who was with Grid Systems Corp. It featured 340 kilobytes of memory, a folding screen, and was made of metal (magnesium). This was hardly like the laptop computers found today, but it was a start.&lt;br /&gt;&lt;br /&gt;Arguably, the next mobile computer produced was in 1983 by Gavilan Computers. This laptop featured 64 &#39; 128 megabytes of memory, a touchpad mouse, and even a portable printer. Weighing in at 9 pounds without the printer, this computer was actually only a few pounds heavier than notebooks found today.&lt;br /&gt;&lt;br /&gt;Gavilan later failed largely due to their computer being incompatible with other computers &#39; Mainly because the Gavilan laptop used their own operating system.&lt;br /&gt;&lt;br /&gt;Apple Computers introduced the apple IIc model in 1984, but it wasn&#39;t all that much better than what Gavilan had produced a year earlier. It did feature an optional LCD panel which had on impact on later notebooks.&lt;br /&gt;&lt;br /&gt;Finally in 1986 a true laptop was created by IBM called the IBM PC Convertible. I say &#39;true&#39; because unlike a few of the others, this laptop didn&#39;t have to be setup everywhere. And unlike the others it featured two modern 3.5 inch floppy drives, and space for an internal modem! Also found on the Convertible was an LCD screen and basic applications the user could use to create word documents, and schedule appointments.&lt;br /&gt;&lt;br /&gt;Maybe most interesting was that the IBM PC Convertible sold for $3500! Of course you would be hard pressed to find that price tag on any laptop these days &#39; (They have gone way down).&lt;br /&gt;&lt;br /&gt;Since the late 80&#39;s many manufacturers have come forward to produce new machines that are even faster and more powerful than their previous counterparts. These days the buyer has a lot of choice, and laptops are faster than ever.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-style: italic;&quot;&gt;source&lt;/span&gt;: http://blogcomputers.cn/426838-The-History-Of-Laptop-Computers.html&lt;br /&gt;&lt;/span&gt;</content><link rel='replies' type='application/atom+xml' href='http://uncle-jack76.blogspot.com/feeds/7203060185522892877/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://uncle-jack76.blogspot.com/2009/01/history-of-laptop-computers.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5318459668492336726/posts/default/7203060185522892877'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5318459668492336726/posts/default/7203060185522892877'/><link rel='alternate' type='text/html' href='http://uncle-jack76.blogspot.com/2009/01/history-of-laptop-computers.html' title='The History Of Laptop Computers'/><author><name>Uncle Jack</name><uri>http://www.blogger.com/profile/02111713531394122319</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjp0p5ig5lmwAWjB0E6ptlhGwBoW2kcH-yQkK7D6MR_E0ycrdWpHuah7ViUIgp70r0ggdqQ4TyRfJ1QeWrk810-JYl6nkK-qc_vB6Q-5BfkZvJb5uWuoWqFfvEilvywwis/s220/100x100px.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5318459668492336726.post-1920433319475563585</id><published>2009-01-27T16:11:00.008+07:00</published><updated>2009-01-27T16:37:15.933+07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Linux"/><title type='text'>File Sharing With Samba on Fedora 8</title><content type='html'>This article will show you how to share folder from fedora 8 system to windows desktop.&lt;br /&gt;Use all commands with root&lt;br /&gt;&lt;br /&gt;1.First you must install nautilus-share&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;yum install nautilus-share&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;2.After installation is completed, type the following command&lt;br /&gt;* &lt;span style=&quot;font-weight: bold;&quot;&gt;mkdir /usr/local/samba/lib/usershares –p&lt;/span&gt;&lt;br /&gt;* &lt;span style=&quot;font-weight: bold;&quot;&gt;chgrp yourusername /usr/local/samba/lib/usershares&lt;/span&gt;&lt;br /&gt;        ( change yourusername with your valid user name)&lt;br /&gt;* &lt;span style=&quot;font-weight: bold;&quot;&gt;chmod 1770 /usr/local/samba/lib/usershares&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;3.Backup your /etc/samba/smb.conf&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;cp /etc/samba/smb.conf /etc/samba/smb.conf.orig&lt;/span&gt;&lt;br /&gt;&lt;span class=&quot;fullpost&quot;&gt;&lt;br /&gt;4.Open  /etc/samba/smb.conf with your text editor&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;gedit /etc/samba/smb.conf&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;5.Find the lines that says [global], and after this line add the following lines&lt;br /&gt;     &lt;span style=&quot;font-weight: bold;&quot;&gt;usershare path = /usr/local/samba/lib/usershares&lt;/span&gt;&lt;br /&gt;           &lt;span style=&quot;font-weight: bold;&quot;&gt;usershare max shares = 10 #&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;6.Restart samba&lt;br /&gt;    &lt;span style=&quot;font-weight: bold;&quot;&gt; service smb restart&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;7.Log out your &lt;a href=&quot;http://uncle-jack76.blogspot.com/2009/01/computer-hardware.html&quot;&gt;computer&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;8.Open nautilus, and right click the folder you wish to share and click Sharing     Options. Give a            share name and hit OK. You have now shared the folder.&lt;br /&gt;&lt;br /&gt;9.In Windows, goto Start--&gt;Run and type&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;\\fedora_system_name\share_name&lt;/span&gt;&lt;br /&gt;      (Replace fedora_system_name with your Samba server machine&lt;br /&gt;   name and share_name with the name of the share you mentioned&lt;br /&gt;   in the sharing options.)&lt;br /&gt;&lt;br /&gt;10.In &lt;a href=&quot;http://uncle-jack76.blogspot.com/2009/01/linux.html&quot;&gt;Linux&lt;/a&gt;. goto Nautilus and in the location bar type&lt;br /&gt;    &lt;span style=&quot;font-weight: bold;&quot;&gt;  smb://fedora_system_name/share_name&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;</content><link rel='replies' type='application/atom+xml' href='http://uncle-jack76.blogspot.com/feeds/1920433319475563585/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://uncle-jack76.blogspot.com/2009/01/file-sharing-with-samba-on-fedora-8.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5318459668492336726/posts/default/1920433319475563585'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5318459668492336726/posts/default/1920433319475563585'/><link rel='alternate' type='text/html' href='http://uncle-jack76.blogspot.com/2009/01/file-sharing-with-samba-on-fedora-8.html' title='File Sharing With Samba on Fedora 8'/><author><name>Uncle Jack</name><uri>http://www.blogger.com/profile/02111713531394122319</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjp0p5ig5lmwAWjB0E6ptlhGwBoW2kcH-yQkK7D6MR_E0ycrdWpHuah7ViUIgp70r0ggdqQ4TyRfJ1QeWrk810-JYl6nkK-qc_vB6Q-5BfkZvJb5uWuoWqFfvEilvywwis/s220/100x100px.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5318459668492336726.post-440269188009532880</id><published>2009-01-22T19:11:00.003+07:00</published><updated>2009-01-22T19:14:26.437+07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Linux"/><title type='text'>How to Install Webmin in Debian &amp; Ubuntu</title><content type='html'>Webmin is a web-based interface for system administration for Unix. Using any browser that supports tables and forms (and Java for the File Manager module), you can setup user accounts, Apache, DNS, file sharing and so on.&lt;br /&gt;&lt;br /&gt;Webmin consists of a simple web server, and a number of CGI programs which directly update system files like /etc/inetd.conf and /etc/passwd. The web server&lt;br /&gt;and all CGI programs are written in Perl version 5, and use no non-standard Perl modules.&lt;br /&gt;&lt;br /&gt;Installing Webmin in Debian&lt;br /&gt;&lt;br /&gt;#apt-get install webmin webmin-core&lt;br /&gt;&lt;br /&gt;After the installation If you want to access webmin from any machine in your network edit the /etc/webmin/ miniserv.conf file change the “allow” option&lt;br /&gt;&lt;br /&gt;allow=127.0.0.1 to allow=0.0.0.0&lt;br /&gt;&lt;br /&gt;If you want to restrict webmin for only your network you can do in this allow option&lt;br /&gt;&lt;br /&gt;Once you change this and save your file and restart the webmin using following command&lt;br /&gt;&lt;br /&gt;#/etc/init.d/webmin restart&lt;br /&gt;&lt;br /&gt;Go to your browser and type:- https://ipaddress:10000 and you can login using the debian linux root as username and password for root.&lt;br /&gt;&lt;br /&gt;If you ou need any webmin modules for your applications you can download from here&lt;br /&gt;&lt;span class=&quot;fullpost&quot;&gt;&lt;br /&gt;Update Webmin online from your machine&lt;br /&gt;&lt;br /&gt;Click on Webmin Configuration under webmin tab from here click on Upgrade Webmin and select the Latest version from www.webmin.com option now click on upgrade webmin button this will start the webmin upgrade from webmin site&lt;br /&gt;&lt;br /&gt;Downloading http://www.webmin.com/download/webmin-1.290.tar.gz ..&lt;br /&gt;Downloading http://easynews.dl.sourceforge.net/sourceforge/webadmin/webmin-1.290.tar.gz (10324511 bytes) ..&lt;br /&gt;Received 1024 bytes (0 %)&lt;br /&gt;Received 1033216 bytes (10 %)&lt;br /&gt;Received 2065408 bytes (20 %)&lt;br /&gt;Received 3097600 bytes (30 %)&lt;br /&gt;Received 4130816 bytes (40 %)&lt;br /&gt;Received 5163008 bytes (50 %)&lt;br /&gt;Received 6195200 bytes (60 %)&lt;br /&gt;Received 7227392 bytes (70 %)&lt;br /&gt;Received 8260608 bytes (80 %)&lt;br /&gt;Received 9292800 bytes (90 %)&lt;br /&gt;Received 10324511 bytes (100 %)&lt;br /&gt;.. Download complete.&lt;br /&gt;No package signature verification done.&lt;br /&gt;&lt;br /&gt;Running setup.sh script to upgrade Webmin .. Please wait a minute until it is complete before continuing.&lt;br /&gt;&lt;br /&gt;Other available options&lt;br /&gt;&lt;br /&gt;From local file&lt;br /&gt;From uploaded file&lt;br /&gt;From ftp or http URL&lt;br /&gt;&lt;br /&gt;Installing Webmin from latest .deb package&lt;br /&gt;&lt;br /&gt;You can download latest .deb from here&lt;br /&gt;&lt;br /&gt;#wget http://prdownloads.sourceforge.net/webadmin/webmin_1.290.deb&lt;br /&gt;&lt;br /&gt;#dpkg --install webmin_1.290_all.deb&lt;br /&gt;&lt;br /&gt;the install will be done automatically to /usr/share/webmin, the administration username set to root and the password to your current root password. You should now be able to login to Webmin at the URL http://localhost:10000/&lt;br /&gt;&lt;br /&gt;Installing Webmin in Ubuntu&lt;br /&gt;&lt;br /&gt;You can use the above procedure but if you want to install latest version you can download from webmin site download section&lt;br /&gt;&lt;br /&gt;Prerequisites&lt;br /&gt;&lt;br /&gt;Perl 5 interpreter and libnet-ssleay-perl&lt;br /&gt;&lt;br /&gt;#apt-get install perl5 libnet-ssleay-perl&lt;br /&gt;&lt;br /&gt;Now you need to download the latest webmin from the above downloadlink&lt;br /&gt;&lt;br /&gt;Download ‘webmin-1.290.tar.gz’ (at the time of writing) to some location in your machine ex:- /usr/local/src&lt;br /&gt;&lt;br /&gt;#wget http://prdownloads.sourceforge.net/webadmin/webmin-1.290.tar.gz&lt;br /&gt;&lt;br /&gt;#cd /usr/local/src&lt;br /&gt;&lt;br /&gt;#tar xzvf webmin-1.290.tar.gz&lt;br /&gt;&lt;br /&gt;#cd webmin-1.290&lt;br /&gt;&lt;br /&gt;#sh setup.sh&lt;br /&gt;&lt;br /&gt;This will start the installation and now it will prompt for several questions answer them as follows&lt;br /&gt;&lt;br /&gt;Config file directory [/etc/webmin]:&lt;br /&gt;Leave as default, or change as you wish&lt;br /&gt;&lt;br /&gt;Log file directory [/var/webmin]:&lt;br /&gt;Leave as default, or change as you wish&lt;br /&gt;&lt;br /&gt;Full path to perl (default /usr/bin/perl):&lt;br /&gt;Leave as default, or change as you wish&lt;br /&gt;&lt;br /&gt;Operating system:&lt;br /&gt;Enter ‘6′&lt;br /&gt;&lt;br /&gt;Version:&lt;br /&gt;Enter ‘6′&lt;br /&gt;&lt;br /&gt;Web server port (default 10000):&lt;br /&gt;&lt;br /&gt;This is where you can start to make webmin more secure then the standard install you get with apt-get, Synaptic, or RPM. Leave as default or change it to what ever port you want.&lt;br /&gt;&lt;br /&gt;Login name (default admin):&lt;br /&gt;&lt;br /&gt;It is ‘admin’, so you can leave it as that, or put in any name that you like.&lt;br /&gt;&lt;br /&gt;Login password:&lt;br /&gt;&lt;br /&gt;By creating the user above and giving it a password, you have now made it so you will not need to log into webmin with root.&lt;br /&gt;&lt;br /&gt;Password again:&lt;br /&gt;&lt;br /&gt;enter your password again&lt;br /&gt;&lt;br /&gt;If you did not install ‘libnet-ssleay-perl’ you will get the following message:&lt;br /&gt;&lt;br /&gt;‘The Perl SSLeay library is not installed. SSL not available.’ You can continue with the install, but it would be more secure if you install sslrelay.&lt;br /&gt;&lt;br /&gt;Use SSL (y/n):y&lt;br /&gt;&lt;br /&gt;Choose yes here&lt;br /&gt;&lt;br /&gt;Start Webmin at boot time (y/n):y&lt;br /&gt;&lt;br /&gt;select here y&lt;br /&gt;&lt;br /&gt;At this point it is going to configure things, install things, and create things…&lt;br /&gt;&lt;br /&gt;It will then tell you that you can log in to https://hostname:10000 and to accept the certificate.&lt;br /&gt;&lt;br /&gt;Webmin User Password Change&lt;br /&gt;&lt;br /&gt;If you want to change root password in webmin use this included Perl script:&lt;br /&gt;&lt;br /&gt;# /usr/share/webmin/changepass.pl /etc/webmin root&lt;br /&gt;&lt;br /&gt;If you want to install any standard modules you can download from here&lt;br /&gt;&lt;br /&gt;If you want to install third party modules you can download from here&lt;br /&gt;&lt;/span&gt;</content><link rel='replies' type='application/atom+xml' href='http://uncle-jack76.blogspot.com/feeds/440269188009532880/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://uncle-jack76.blogspot.com/2009/01/webmin-is-web-based-interface-for.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5318459668492336726/posts/default/440269188009532880'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5318459668492336726/posts/default/440269188009532880'/><link rel='alternate' type='text/html' href='http://uncle-jack76.blogspot.com/2009/01/webmin-is-web-based-interface-for.html' title='How to Install Webmin in Debian &amp; Ubuntu'/><author><name>Uncle Jack</name><uri>http://www.blogger.com/profile/02111713531394122319</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjp0p5ig5lmwAWjB0E6ptlhGwBoW2kcH-yQkK7D6MR_E0ycrdWpHuah7ViUIgp70r0ggdqQ4TyRfJ1QeWrk810-JYl6nkK-qc_vB6Q-5BfkZvJb5uWuoWqFfvEilvywwis/s220/100x100px.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5318459668492336726.post-8865013887988152410</id><published>2009-01-20T01:37:00.004+07:00</published><updated>2009-01-20T22:52:26.407+07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Computer"/><title type='text'>How to locked down keys on keyboard without installing any software</title><content type='html'>&lt;p style=&quot;margin-bottom: 0in;&quot;&gt;To prevent person that fad with our computer (especially laptop) when we&#39;re  &lt;/p&gt; &lt;p style=&quot;margin-bottom: 0in;&quot;&gt;leaving our workshop, can be done by pressing keys   on keyboard.  &lt;/p&gt; &lt;p style=&quot;margin-bottom: 0in;&quot;&gt;This trick is very simple, only by pressing secret  keys on keyboard we can  &lt;/p&gt; &lt;p style=&quot;margin-bottom: 0in;&quot;&gt;locked down our keyboard and avoid person&#39;s hand that fad.  &lt;/p&gt; &lt;p style=&quot;margin-bottom: 0in;&quot;&gt;Keyboard must have Fn or Turbo key (usually keyboard on  &lt;/p&gt; &lt;p style=&quot;margin-bottom: 0in;&quot;&gt;laptop), and its trick is very easy only by press Fn key and F11 at the same time  &lt;/p&gt; &lt;p style=&quot;margin-bottom: 0in;&quot;&gt;keyboard will automaticly locked . And if you wants to activate it just press the same keys again.  &lt;/p&gt; &lt;p style=&quot;margin-bottom: 0in;&quot;&gt;Hopefully good for you  &lt;/p&gt; &lt;p style=&quot;margin-bottom: 0in;&quot;&gt;&lt;br /&gt;&lt;/p&gt; &lt;p style=&quot;margin-bottom: 0in;&quot;&gt;&lt;br /&gt;&lt;/p&gt;</content><link rel='replies' type='application/atom+xml' href='http://uncle-jack76.blogspot.com/feeds/8865013887988152410/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://uncle-jack76.blogspot.com/2009/01/how-to-trick-keys-on-keyboard-without.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5318459668492336726/posts/default/8865013887988152410'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5318459668492336726/posts/default/8865013887988152410'/><link rel='alternate' type='text/html' href='http://uncle-jack76.blogspot.com/2009/01/how-to-trick-keys-on-keyboard-without.html' title='How to locked down keys on keyboard without installing any software'/><author><name>Uncle Jack</name><uri>http://www.blogger.com/profile/02111713531394122319</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjp0p5ig5lmwAWjB0E6ptlhGwBoW2kcH-yQkK7D6MR_E0ycrdWpHuah7ViUIgp70r0ggdqQ4TyRfJ1QeWrk810-JYl6nkK-qc_vB6Q-5BfkZvJb5uWuoWqFfvEilvywwis/s220/100x100px.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5318459668492336726.post-2073823567243607728</id><published>2009-01-20T00:28:00.003+07:00</published><updated>2009-01-20T22:22:49.931+07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Business"/><title type='text'>Severally tips to do research on Internet carries on business</title><content type='html'>Internet in this era is not a new things again, even have constituted subject requirement for some people.&lt;br /&gt;This Internet utility is prodigious, depend on person that utilizes it. There is that utilizes as medium of communication&lt;br /&gt;among friend or kinsfolk, there is also that utilizes to amusement medium, and there is also that utilizes as suggest as to look for newses&lt;br /&gt;or informations for schooled stationary,college even office. Between a lot of it that Internet utility one of it is subject to be carry on&lt;br /&gt;carry on business online ala or Internets so-called ordinary carry on business. Have a lot of going person Internet carries on business this. There is that successful and available that don&#39;t.&lt;span class=&quot;fullpost&quot;&gt;&lt;br /&gt;To reach success in Internet carries on business to need done by riset market, this trick will help you to recognize condition of market with every consideration.&lt;br /&gt;It momentously really because fruitfulness businessman was determined by science its to market that is targetted.&lt;br /&gt;Before blasting off one product available better you answer many questions hereunder which recommended by &lt;a href=&quot;http://www.jokosusilo.com/2009/01/15/inilah-6-cara-meriset-pasar-agar-bisnis-internet-anda-berjalan-lebih-lancar/#more-669&quot;&gt;Joko Susilo&lt;/a&gt;:&lt;br /&gt;&lt;br /&gt;1. &lt;span style=&quot;font-weight: bold;&quot;&gt;What appreciative your product sell?&lt;/span&gt;&lt;br /&gt; Recognize your product sell point. What is your product can give joy on prospective buyer?         Making easy they do duty assignment? Or gives them new experience?&lt;br /&gt;&lt;br /&gt;2. &lt;span style=&quot;font-weight: bold;&quot;&gt;Uniqueness what does your product have? &lt;/span&gt;&lt;br /&gt; If your product have typical something that doesn&#39;t be had by other product, that is its                 uniqueness. Utilize that uniqueness to entice buyer candidate.&lt;br /&gt;&lt;br /&gt;3. &lt;span style=&quot;font-weight: bold;&quot;&gt;How many competitor for product and a sort service?&lt;/span&gt;&lt;br /&gt; Play by play previously if product who will sell that have there are many competitor or not. If     really have had competitor that a lot of, try to sell product that haven&#39;t a lot of its competitor.&lt;br /&gt;&lt;br /&gt;4. &lt;span style=&quot;font-weight: bold;&quot;&gt;Get what extent market target that you drawns a bead on?&lt;/span&gt;&lt;br /&gt; Measure market target extent you carefully. Fathom a meaning, what is you acceptable                 product extensive society or just circle particular? What is you product can be marketted to         over the world or only at Indonesia? What acceptable all age or just stripling? What needed by     woman or even man?&lt;br /&gt;&lt;br /&gt;5. &lt;span style=&quot;font-weight: bold;&quot;&gt;How is market comment on product or you service? &lt;/span&gt;&lt;br /&gt; Do market test-driving. Upon do market test-driving reassures properly response of buyer         candidate. Even no surety, good response big figure its society yen. If you get to respond that     lovely, you shall smart bring off it.&lt;br /&gt;&lt;br /&gt;6. &lt;span style=&quot;font-weight: bold;&quot;&gt;Strategy what do you will utilize to defeat you competitor? &lt;/span&gt;&lt;br /&gt; If you find your competitor,it&#39;s not necessarily to run. Their dealing with strategy. Chance for     businessman initiate will make a abode openended even observable difficult. You just have to     make ready strategy in point.&lt;br /&gt;&lt;br /&gt;There is 6 tips for market research. Try this 6 tips,hopefully can help you.&lt;/span&gt;</content><link rel='replies' type='application/atom+xml' href='http://uncle-jack76.blogspot.com/feeds/2073823567243607728/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://uncle-jack76.blogspot.com/2009/01/severally-tips-to-do-research-on.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5318459668492336726/posts/default/2073823567243607728'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5318459668492336726/posts/default/2073823567243607728'/><link rel='alternate' type='text/html' href='http://uncle-jack76.blogspot.com/2009/01/severally-tips-to-do-research-on.html' title='Severally tips to do research on Internet carries on business'/><author><name>Uncle Jack</name><uri>http://www.blogger.com/profile/02111713531394122319</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjp0p5ig5lmwAWjB0E6ptlhGwBoW2kcH-yQkK7D6MR_E0ycrdWpHuah7ViUIgp70r0ggdqQ4TyRfJ1QeWrk810-JYl6nkK-qc_vB6Q-5BfkZvJb5uWuoWqFfvEilvywwis/s220/100x100px.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5318459668492336726.post-8921893900937864157</id><published>2009-01-19T23:47:00.001+07:00</published><updated>2009-01-19T23:47:45.405+07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Jokes"/><title type='text'>The Trolly</title><content type='html'>A small child cried shouted while running went round among supermarket shelves.&lt;br /&gt;&quot;Uuuuuu.... uuuu.... uuuu.... where&#39;s my trolly?&quot; Where&#39;s my trolly? He screamed.&lt;br /&gt;The head of the Shop Assistant came to approach him with the friendly smile.&lt;br /&gt;&quot;What is it in your trolly, son ?&quot; Ask the Head of the Shop Assistant.&lt;br /&gt;&quot;It&#39;s empty, Mam.&quot; that&#39;s nothing at all...&lt;br /&gt;&quot;Oh, if it empty, took the other trolly that you liked for its substitute.&quot; said The Shop Assistant.&lt;br /&gt;&quot;I Did not want it, Mam.&quot; Must the trolly encouraged that earlier.&lt;br /&gt;&quot;The trolly was just the same, son.&quot; See this trolly. What is the difference with your trolly that was lost? Take this....&quot; said The Head of the Shop Assistant.&lt;br /&gt;&quot;It won&#39;t be the same, Mam.&quot; That trolly was pushed by my mom. If I can find the trolly, definitely I could meet my mom.</content><link rel='replies' type='application/atom+xml' href='http://uncle-jack76.blogspot.com/feeds/8921893900937864157/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://uncle-jack76.blogspot.com/2009/01/trolly.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5318459668492336726/posts/default/8921893900937864157'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5318459668492336726/posts/default/8921893900937864157'/><link rel='alternate' type='text/html' href='http://uncle-jack76.blogspot.com/2009/01/trolly.html' title='The Trolly'/><author><name>Uncle Jack</name><uri>http://www.blogger.com/profile/02111713531394122319</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjp0p5ig5lmwAWjB0E6ptlhGwBoW2kcH-yQkK7D6MR_E0ycrdWpHuah7ViUIgp70r0ggdqQ4TyRfJ1QeWrk810-JYl6nkK-qc_vB6Q-5BfkZvJb5uWuoWqFfvEilvywwis/s220/100x100px.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5318459668492336726.post-3878729368738194930</id><published>2009-01-17T23:40:00.011+07:00</published><updated>2009-01-20T22:28:19.225+07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Games"/><title type='text'>World of Warcraft: Wrath of the Lich King</title><content type='html'>The Good&lt;br /&gt;&lt;br /&gt;* Hundreds of interesting and varied quests&lt;br /&gt;* Death knight class is a lot of fun to play&lt;br /&gt;* Great-looking environments&lt;br /&gt;* Dungeons are now accessible to all players&lt;br /&gt;* Your actions have an impact on the world around you.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;The Bad&lt;br /&gt;&lt;br /&gt;* Some character and item models are recycled&lt;br /&gt;* No content for new players.&lt;br /&gt;&lt;br /&gt;Four years and well beyond 10 million subscriptions after the release of World of Warcraft, Blizzard&#39;s phenomenally successful massively multiplayer online role-playing game is barely recognizable as the same game that sold almost a quarter of a million copies in its first 24 hours. The game has been in a near-constant state of evolution since 2004, and up until last month, the steady flow of new features and improvements had all been patched in for free, with only one exception: the Burning Crusade expansion pack that&#39;s required to play Wrath of the Lich King. The recently released second expansion pack doesn&#39;t boast as many back-of-the-box bullet points as its predecessor, and it doesn&#39;t offer anything for new players, but if you&#39;re still playing WOW or you&#39;re looking for an excuse to get back into it, this thrilling new adventure is not to be missed.&lt;span class=&quot;fullpost&quot;&gt;&lt;br /&gt;&lt;br /&gt;All of the new content in Wrath of the Lich King comes with a character-level requirement. You can&#39;t play the new death knight hero class until one of your existing characters reaches level 55, and you can&#39;t attempt any quests in the new Northrend continent until you&#39;re at level 68. The most significant exception to this rule would have been the new inscription-crafting profession, but that ended up being patched in shortly before the expansion&#39;s release alongside new talents for every character class in the game, an Xbox Live-style achievements system, barbershops, an extremely useful in-game calendar, and numerous user-interface improvements. There&#39;s new content for low-level players, but you don&#39;t need the expansion pack to get it.&lt;br /&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh63C5Z0AvZhd1e1xxwyvu8Q95SieBrTHZo9DEB63WT1I7djCFgHLCCkmP1lkSAC6UuLI7Ru3vBhyuYpbpz8mtV2KL1kSzZfusXX9BWEB2eMFaYzxLYu4zIv8SFJtLN-hryxK75M9IoDEot/s1600-h/wow1.jpg&quot; onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot;&gt;&lt;img alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5292304718236001394&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh63C5Z0AvZhd1e1xxwyvu8Q95SieBrTHZo9DEB63WT1I7djCFgHLCCkmP1lkSAC6UuLI7Ru3vBhyuYpbpz8mtV2KL1kSzZfusXX9BWEB2eMFaYzxLYu4zIv8SFJtLN-hryxK75M9IoDEot/s320/wow1.jpg&quot; style=&quot;margin: 0px auto 10px; cursor: pointer; display: block; height: 101px; text-align: center; width: 180px;&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;Regardless of where you choose to start your Wrath of the Lich King adventure, it&#39;ll quickly become apparent that considerable effort has gone into making the new content compelling. There are still plenty of fetch quests, and there&#39;s certainly no shortage of non-player characters looking for heroes to kill a certain number of whichever species or faction they have a beef with. Liberally sprinkled in among those genre requisites, though, are some quite different challenges that not only add some much-needed variety but, in some cases, also do a great job of immersing you in Warcraft&#39;s rich lore. Previously, WOW relied on you reading the briefings that bookend quests for its storytelling, but in Wrath of the Lich King, it&#39;s often the quests themselves that get the job done along with a handful of in-game cutscenes. You might go into the expansion not knowing your Arthas from your elbow, but after questing in Northrend for a while, you&#39;ll inevitably gain some understanding of just why the world of Warcraft needs so many heroes.&lt;br /&gt;&lt;br /&gt;Playing through the death knight&#39;s starting area also exposes you to some interesting Warcraft lore, and doing so is recommended even if you have no intention of playing the new class beyond that point. It&#39;s only fair to warn you that death knights can be tough to put down, though; not only are they very powerful and fun to play, but they also start at level 55, they get a free epic mount, and they&#39;re fully decked out with great-looking blue (rare) gear by the time they leave their starter area at level 58 or so. It&#39;s unfortunate that you need to gain another 10 levels playing through Burning Crusade content before you can accept any quests in Northrend, but the death knight is such a powerful class with so little downtime that you can get through it relatively quickly. Players sticking with their nonhero classes will almost certainly feel compelled to tell you that your new death knight is overpowered at some point, and they&#39;re right, at least as far as leveling and questing is concerned. The death knight is also one of the more complex classes to play well, and unfortunately it&#39;s too soon to comment on how they fare in player-versus-player scenarios.&lt;br /&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgnLJko2t2dvLR1Zu4BtK6mu1f5QbhqrovxpCo1CNsZtmrWL0-u1Y9MLqJn2hL4_rDfKfkJqY7gndIobF4GiI_8GvXXmva9D6peO9TfQ6hk4-c0CgTBDFQkFNWBcvJNTR7Q_uXOZzEynRTh/s1600-h/wow2.jpg&quot; onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot;&gt;&lt;img alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5292305399367256050&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgnLJko2t2dvLR1Zu4BtK6mu1f5QbhqrovxpCo1CNsZtmrWL0-u1Y9MLqJn2hL4_rDfKfkJqY7gndIobF4GiI_8GvXXmva9D6peO9TfQ6hk4-c0CgTBDFQkFNWBcvJNTR7Q_uXOZzEynRTh/s320/wow2.jpg&quot; style=&quot;margin: 0px auto 10px; cursor: pointer; display: block; height: 99px; text-align: center; width: 178px;&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;When your death knight or one of your preexisting characters reaches level 68, you need to get yourself to Northrend as soon as possible. Not only is the new continent epic in scale and more impressive-looking than any of the game&#39;s previous locales, but it&#39;s also bursting with hundreds of quests to complete for the numerous new races and factions that you&#39;ll encounter there. To give you some idea of just how many quests there are in Wrath of the Lich King, you need to complete at least 875 of them to unlock the questing achievements scattered across all eight of Northrend&#39;s major regions. There&#39;s so much new content that you could conceivably level two characters from 70 to 80 without having to repeat many of the same quests, though some of them are so good that you&#39;ll want to.&lt;br /&gt;&lt;br /&gt;New in Wrath of the Lich King are numerous quests in which you complete objectives at the controls of a mount or vehicle. Quest-specific rides include dragons, mammoths, airplanes, bipedal mechs, and even a giant. The controls are slightly different for all of them, but they&#39;re never complicated and they&#39;re always clearly displayed onscreen as soon as you climb aboard. Another gameplay mechanic that&#39;s used frequently in new quests is phasing, which lets you see areas of the world differently from other players. Similar to how the world appears in gray scale when you die and have to run back to your corpse as a ghost, phasing quests often apply some kind of visual filter to the environment and let you interact with NPCs in different ways. Wrath of the Lich King takes this idea to a whole new level. By completing certain quests, you trigger dramatic changes to the environment that are the same for all players who have completed said quest, but for players who have yet to do so, the world still exists in its original form. Whether this is achieved though technical wizardry or just straight-up magic is unclear, but its integration is seamless, and it&#39;s incredibly satisfying to feel like your actions are having a significant impact on the world around you.&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhHUYRbs66nSqFhyiJ8jJsyx3i3yPjuCkBmp1zRjKo3Wo_i7HezInXekr2kman70ed-Gh7dY8F9VbEwFgQIg_GBdkbR6VSdrxBYgRA0rIqL_aEsrPUgIIXl0DtGLvMy2J5nLsSmaO_3c4jV/s1600-h/wow3.jpg&quot; onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot;&gt;&lt;img alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5292305942956164642&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhHUYRbs66nSqFhyiJ8jJsyx3i3yPjuCkBmp1zRjKo3Wo_i7HezInXekr2kman70ed-Gh7dY8F9VbEwFgQIg_GBdkbR6VSdrxBYgRA0rIqL_aEsrPUgIIXl0DtGLvMy2J5nLsSmaO_3c4jV/s320/wow3.jpg&quot; style=&quot;margin: 0px auto 10px; cursor: pointer; display: block; height: 100px; text-align: center; width: 180px;&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;However, not every quest in Wrath of the Lich King is so fulfilling, mostly because the vast majority of them simply aren&#39;t challenging. When accepting a quest, you rarely have to question if you can complete it; you just need to figure out when you can fit it into your jam-packed hero schedule. There are quests for which you need to group up with other players, but even these aren&#39;t nearly as challenging as similar offerings in the pre-Lich King game. It&#39;s no secret that Blizzard wants to make content that&#39;s accessible to the vast majority of WOW players rather than just to those in elite raiding guilds, and in this regard the new expansion is undoubtedly a success, but at times the new content feels a little too easy. There are a dozen new dungeons designed for five players, and every one of them can be beaten in about an hour by a reasonably good group. To get your hands on the best loot dropped by bosses, though, you need to play through those same dungeons on the heroic difficulty setting, which makes all of the enemies tougher and is available only to players who have hit the new level-80 cap.&lt;br /&gt;&lt;br /&gt;In addition to the heroic-difficulty dungeons, there are a handful of larger &quot;raid&quot; dungeons for groups of 10 and 25 players that are designed to cater to more experienced players. The challenge ramps up considerably in raid dungeons, and if that&#39;s still too easy for you, there are achievements you can unlock by, for example, defeating bosses in less than three minutes, with a small group, or without letting a single player die. Some of the achievements in Wrath of the Lich King come with tangible rewards such as titles and tabards, and a few of the most challenging ones earn you mounts that can&#39;t be obtained any other way. So if you&#39;re an elitist, don&#39;t worry, there are still plenty of opportunities for you to distinguish yourself from the crowd.&lt;br /&gt;&lt;br /&gt;If you&#39;re more interested in player-versus-player encounters than in quests and dungeons, Wrath of the Lich King has you covered, too. There are a number of PVP-oriented quests scattered throughout the world for which you can earn experience, honor, and gold on a daily basis. There&#39;s also a new attack-and-defend battleground that incorporates siege weapons, and then there&#39;s the icing on the PVP cake: Wintergrasp. Large enough to support battles between hundreds of players simultaneously, Wintergrasp is a region that exists solely so that the Horde and Alliance can fight for control of a large fortress in a battle that rages for up to 40 minutes every three hours or so. The goal for the attackers is to knock down the walls of the fortress using siege weapons, get inside the keep, and activate a titan orb (read: large glowing ball) within the 40-minute time limit. The goal for the defending faction is to stop them. When enough players show up to make the battle worthwhile, it&#39;s arguably the most fun you can have in Wrath of the Lich King. Unlike traditional WOW battlegrounds, Wintergrasp is designed in such a way that even players who haven&#39;t reached level 80 yet can contribute, and if your faction is underrepresented on the battlefield, you&#39;ll automatically receive a buff that keeps things competitive.&lt;br /&gt;Besides being a blast, there are plenty of incentives for participating in the battle for Wintergrasp. The faction that controls the fort gains exclusive access to rare-item vendors and to a small one-boss raid dungeon. Furthermore, while your faction controls Wintergrasp, every dungeon boss in the expansion will drop Stone Keeper&#39;s Shards, a form of currency that can be used to purchase powerful items, in addition to their regular loot. A similar feature was introduced in the Burning Crusade expansion, but the associated PVP goal wasn&#39;t as fun, the shards dropped in only a handful of dungeons, and the items that you could exchange the shards for weren&#39;t nearly as desirable.&lt;br /&gt;Among the usual assortment of rare items, epic items, and exclusive PVP mounts that you can exchange your shards for, you&#39;ll find a number of items that look identical to armor and weapons that you might have used in 2004 but that are actually very different. These &quot;heirloom&quot; items are unique not only because they bind to your account rather than to an individual character, allowing them to passed around, but also because they can be used at any level and their stats scale appropriately. Heirlooms are a great idea for anyone who has a high-level character and is looking to start a new one, though it&#39;s unfortunate that they look so dated and generic alongside newer items.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;In fact, the look of most of the non-epic armor pieces and weapons in Wrath of the Lich King is disappointing. If you&#39;ve spent any amount of time acquiring good gear in Burning Crusade, then you&#39;re probably heading into Northrend wielding a wonderfully ornate weapon or two and dressed to kill. That gear will likely last you for a few levels, but inevitably you&#39;ll have opportunities to upgrade it as you progress. Is that sword made from two pieces of stone held together with string really more powerful than your blade that looks like it belongs in the hand of a god, though? Yes it is. Armor items in Northrend have a similarly improvised feel, and to make matters worse, it&#39;s entirely possible for you to upgrade them several times en route to level 80 without ever getting an item that looks different or that isn&#39;t the exact same model with slightly different coloring.&lt;br /&gt;The armor and weapons are an acquired taste at best, but there&#39;s no disputing the fact that their design is very much in keeping with the rugged nature of Northrend itself. The continent&#39;s harsh environments are inhabited by half-giant warriors, woolly mammoths, and plenty of other creatures whose appearances suggest that they&#39;re well-equipped to survive there. A few of the models are recycled and showing their age, but as always, the quality of the animation breathes life into them and makes their rudimentary geometry easy to ignore. Northrend&#39;s environments are more epic and detailed than any that have appeared in World of Warcraft previously, but it&#39;s the believability of the behavior of the characters and creatures that makes them really come to life. For example, bears have always featured in World of Warcraft, and they don&#39;t look any different now than they did four years ago. Nevertheless, it&#39;s only in Wrath of the Lich King that they&#39;ve learned to fish for salmon and to be protective of cubs. Similarly, herds of animals can be fascinating to watch; males will fight each other and are the first to respond to any threat from players, whereas females and their young will flee at the slightest hint of danger.&lt;br /&gt;Adding significantly to the appeal of even Northrend&#39;s most foreboding environments is an original soundtrack that, when appropriate, is every bit as grand as the scenery. Having an orchestra play alongside a male voice choir in the background while you ride on a fire-breathing dragon high above the snow-capped mountains of Dragonblight feels truly epic, and the rustic Celtic-sounding fiddle track that plays in the less fantastical Grizzly Hills region as you round up horses or hunt for bears is equally appropriate and even more impressive.&lt;br /&gt;&lt;br /&gt;If you&#39;re in a position to enjoy what Wrath of the Lich King has to offer, then let&#39;s be honest, you&#39;re probably doing so already. The expansion&#39;s launch was successful enough that players on high-population servers had to wait for hours at a time to log on, and the most common complaints were simply that some quests were difficult to complete because so many players were trying to do them simultaneously. The queues are mostly a thing of the past, and now that things have settled down Northrend is an absolute joy to explore. If you&#39;re not level 68 yet, we suggest you double your efforts and hop on a boat or a zeppelin there as soon as possible.&lt;br /&gt;&lt;span style=&quot;font-style: italic;&quot;&gt;source : &lt;a href=&quot;http://www.gamespot.com/pc/rpg/worldofwarcraftwrathofthelichking/review.html&quot;&gt;http://www.gamespot.com/pc/rpg/worldofwarcraftwrathofthelichking/review.html&lt;/a&gt;&lt;/span&gt;&lt;/span&gt;</content><link rel='replies' type='application/atom+xml' href='http://uncle-jack76.blogspot.com/feeds/3878729368738194930/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://uncle-jack76.blogspot.com/2009/01/world-of-warcraft-wrath-of-lich-king.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5318459668492336726/posts/default/3878729368738194930'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5318459668492336726/posts/default/3878729368738194930'/><link rel='alternate' type='text/html' href='http://uncle-jack76.blogspot.com/2009/01/world-of-warcraft-wrath-of-lich-king.html' title='World of Warcraft: Wrath of the Lich King'/><author><name>Uncle Jack</name><uri>http://www.blogger.com/profile/02111713531394122319</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjp0p5ig5lmwAWjB0E6ptlhGwBoW2kcH-yQkK7D6MR_E0ycrdWpHuah7ViUIgp70r0ggdqQ4TyRfJ1QeWrk810-JYl6nkK-qc_vB6Q-5BfkZvJb5uWuoWqFfvEilvywwis/s220/100x100px.jpg'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh63C5Z0AvZhd1e1xxwyvu8Q95SieBrTHZo9DEB63WT1I7djCFgHLCCkmP1lkSAC6UuLI7Ru3vBhyuYpbpz8mtV2KL1kSzZfusXX9BWEB2eMFaYzxLYu4zIv8SFJtLN-hryxK75M9IoDEot/s72-c/wow1.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5318459668492336726.post-4934120508411724033</id><published>2009-01-16T16:00:00.004+07:00</published><updated>2009-01-19T23:11:42.258+07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Business"/><title type='text'>The Secrets of Top Producers</title><content type='html'>&lt;h2&gt;&lt;span style=&quot;;font-family:Arial;font-size:100%;&quot;  &gt;By &lt;span style=&quot;color:black;&quot;&gt;Garrison Wynn &lt;/span&gt;    &lt;/span&gt;&lt;/h2&gt;&lt;div style=&quot;background: white none repeat scroll 0% 50%; -moz-background-clip: -moz-initial; -moz-background-origin: -moz-initial; -moz-background-inline-policy: -moz-initial; margin-left: 0in; margin-right: 0in; margin-top: 0in; text-indent: 0.25in;&quot; align=&quot;left&quot;&gt;&lt;span style=&quot;;font-family:Arial;font-size:100%;&quot;  &gt;    &lt;b&gt;&lt;span style=&quot;font-weight: normal;color:black;&quot; &gt;Contrary to     popular belief, the most successful salespeople were not those who     made the most phone calls or were the best presenters and closers.    &lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;background: white none repeat scroll 0% 50%; -moz-background-clip: -moz-initial; -moz-background-origin: -moz-initial; -moz-background-inline-policy: -moz-initial; margin-left: 0in; margin-right: 0in; margin-top: 0in; text-indent: 0.25in;&quot; align=&quot;left&quot;&gt;&lt;span style=&quot;;font-family:Arial;font-size:100%;&quot;  &gt;    &lt;span style=&quot;color:black;&quot;&gt;There seemed to be no common ground with     best practices. We saw many top producers who had low closing ratios     but set ten times more appointments and made more money than their     competitors by being in front of more people. &lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;background: white none repeat scroll 0% 50%; -moz-background-clip: -moz-initial; -moz-background-origin: -moz-initial; -moz-background-inline-policy: -moz-initial; margin-left: 0in; margin-right: 0in; margin-top: 0in; text-indent: 0.25in;&quot; align=&quot;left&quot;&gt;&lt;span style=&quot;;font-family:Arial;font-size:100%;&quot;  &gt;    &lt;span style=&quot;color:black;&quot;&gt;Also, we saw many number-one salespeople     who could not cold-call or even work their referrals that well. They     went where their customers were: to networking meetings, golf     courses, and so forth. They met face to face with fewer people but     were very successful. &lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;background: white none repeat scroll 0% 50%; -moz-background-clip: -moz-initial; -moz-background-origin: -moz-initial; -moz-background-inline-policy: -moz-initial; margin-left: 0in; margin-right: 0in; margin-top: 0in; text-indent: 0.25in;&quot; align=&quot;left&quot;&gt;&lt;span style=&quot;;font-family:Arial;font-size:100%;&quot;  &gt;    &lt;span style=&quot;color:black;&quot;&gt;We saw people who managed their time well     and many who did not, but who made up for it by what we can only     refer to as “wasting their time with the right people.” &lt;b&gt;    &lt;span style=&quot;font-weight: normal;&quot;&gt;What they had in common went     beyond best practices. They focused on their strengths and were more     competitive by getting better at what they already did well. &lt;/span&gt;    &lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;red&quot; style=&quot;background: white none repeat scroll 0% 50%; -moz-background-clip: -moz-initial; -moz-background-origin: -moz-initial; -moz-background-inline-policy: -moz-initial; margin-left: 0in; margin-right: 0in; margin-top: 0in; text-indent: 0.25in;&quot; align=&quot;left&quot;&gt;&lt;span style=&quot;;font-family:Arial;font-size:100%;&quot;  &gt;    &lt;b&gt;&lt;i&gt;&lt;span style=&quot;font-weight: normal;color:black;&quot; &gt;Wynnism:     The key to success is doing very little of what you do badly. &lt;/span&gt;    &lt;/i&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;background: white none repeat scroll 0% 50%; -moz-background-clip: -moz-initial; -moz-background-origin: -moz-initial; -moz-background-inline-policy: -moz-initial; margin-left: 0in; margin-right: 0in; margin-top: 0in; text-indent: 0.25in;&quot; align=&quot;left&quot;&gt;&lt;span style=&quot;;font-family:Arial;font-size:100%;&quot;  &gt;    &lt;span style=&quot;color:black;&quot;&gt;We found a group we called the     strugglers—people who work very hard to produce average results.     They seemed to focus all their strength in areas where they just     didn’t have any. We saw them working on their shortcomings over and     over again, hoping for a different result.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;background: white none repeat scroll 0% 50%; -moz-background-clip: -moz-initial; -moz-background-origin: -moz-initial; -moz-background-inline-policy: -moz-initial; margin-left: 0in; margin-right: 0in; margin-top: 0in; text-indent: 0.25in;&quot; align=&quot;left&quot;&gt;&lt;span style=&quot;;font-family:Arial;font-size:100%;&quot;  &gt;    &lt;b&gt;&lt;span style=&quot;font-weight: normal;color:black;&quot; &gt;As it turns     out, hope is not a strategy. The difference is that the top     producers used their strengths to improve a weakness. &lt;/span&gt;    &lt;/b&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;red&quot; style=&quot;background: white none repeat scroll 0% 50%; -moz-background-clip: -moz-initial; -moz-background-origin: -moz-initial; -moz-background-inline-policy: -moz-initial; margin-left: 0in; margin-right: 0in; margin-top: 0in; text-indent: 0.25in;&quot; align=&quot;left&quot;&gt;&lt;span style=&quot;;font-family:Arial;font-size:100%;&quot;  &gt;    &lt;b&gt;&lt;i&gt;&lt;span style=&quot;font-weight: normal;color:black;&quot; &gt;Wynnism:     If you do nothing but focus on your weaknesses, you will ultimately     feel weak. &lt;/span&gt;&lt;/i&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;background: white none repeat scroll 0% 50%; -moz-background-clip: -moz-initial; -moz-background-origin: -moz-initial; -moz-background-inline-policy: -moz-initial; margin-left: 0in; margin-right: 0in; margin-top: 0in; text-indent: 0.25in;&quot; align=&quot;left&quot;&gt;&lt;span style=&quot;;font-family:Arial;font-size:100%;&quot;  &gt;    &lt;b&gt;&lt;span style=&quot;font-weight: normal;color:black;&quot; &gt;We did,     however, uncover seven beyond-best practices that we believe may be     the keys to sales success. &lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;&lt;ol&gt;&lt;li&gt;    &lt;br /&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;background: white none repeat scroll 0% 50%; -moz-background-clip: -moz-initial; -moz-background-origin: -moz-initial; -moz-background-inline-policy: -moz-initial; margin-bottom: 12pt; margin-left: 0.25in; margin-top: 0pt;&quot; align=&quot;left&quot;&gt;&lt;span style=&quot;;font-family:Arial;font-size:100%;&quot;  &gt;     &lt;span style=&quot;color:black;&quot;&gt;They explain the value of their      service clearly in about 20 seconds. &lt;/span&gt;&lt;/span&gt;     &lt;/div&gt;&lt;/li&gt;&lt;li&gt;    &lt;br /&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;background: white none repeat scroll 0% 50%; -moz-background-clip: -moz-initial; -moz-background-origin: -moz-initial; -moz-background-inline-policy: -moz-initial; margin-bottom: 12pt; margin-left: 0.25in; margin-top: 0pt;&quot; align=&quot;left&quot;&gt;&lt;span style=&quot;;font-family:Arial;font-size:100%;&quot;  &gt;     &lt;span style=&quot;color:black;&quot;&gt;They develop simple and easy to      maintain organizational processes that create client care.     &lt;/span&gt;&lt;/span&gt;     &lt;/div&gt;&lt;/li&gt;&lt;li&gt;    &lt;br /&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;background: white none repeat scroll 0% 50%; -moz-background-clip: -moz-initial; -moz-background-origin: -moz-initial; -moz-background-inline-policy: -moz-initial; margin-bottom: 12pt; margin-left: 0.25in; margin-top: 0pt;&quot; align=&quot;left&quot;&gt;&lt;span style=&quot;;font-family:Arial;font-size:100%;&quot;  &gt;     &lt;span style=&quot;color:black;&quot;&gt;They are able to stay persistent      because they have clearly defined outcomes. &lt;/span&gt;&lt;/span&gt;     &lt;/div&gt;&lt;/li&gt;&lt;li&gt;    &lt;br /&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;background: white none repeat scroll 0% 50%; -moz-background-clip: -moz-initial; -moz-background-origin: -moz-initial; -moz-background-inline-policy: -moz-initial; margin-bottom: 12pt; margin-left: 0.25in; margin-top: 0pt;&quot; align=&quot;left&quot;&gt;&lt;span style=&quot;;font-family:Arial;font-size:100%;&quot;  &gt;     &lt;span style=&quot;color:black;&quot;&gt;They spend approximately 50% of their      time building relationships with top customers. &lt;/span&gt;&lt;/span&gt;     &lt;/div&gt;&lt;/li&gt;&lt;li&gt;    &lt;br /&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;background: white none repeat scroll 0% 50%; -moz-background-clip: -moz-initial; -moz-background-origin: -moz-initial; -moz-background-inline-policy: -moz-initial; margin-bottom: 12pt; margin-left: 0.25in; margin-top: 0pt;&quot; align=&quot;left&quot;&gt;&lt;span style=&quot;;font-family:Arial;font-size:100%;&quot;  &gt;     &lt;span style=&quot;color:black;&quot;&gt;They leverage existing relationships      by being a solutions provider. &lt;/span&gt;&lt;/span&gt;     &lt;/div&gt;&lt;/li&gt;&lt;li&gt;    &lt;br /&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;background: white none repeat scroll 0% 50%; -moz-background-clip: -moz-initial; -moz-background-origin: -moz-initial; -moz-background-inline-policy: -moz-initial; margin-bottom: 12pt; margin-left: 0.25in; margin-top: 0pt;&quot; align=&quot;left&quot;&gt;&lt;span style=&quot;;font-family:Arial;font-size:100%;&quot;  &gt;     &lt;span style=&quot;color:black;&quot;&gt;They survey their customers to find      out what services they like best and then focus their offering      in those areas. &lt;/span&gt;&lt;/span&gt;     &lt;/div&gt;&lt;/li&gt;&lt;li&gt;    &lt;br /&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;background: white none repeat scroll 0% 50%; -moz-background-clip: -moz-initial; -moz-background-origin: -moz-initial; -moz-background-inline-policy: -moz-initial; margin-bottom: 12pt; margin-left: 0.25in; margin-top: 0pt;&quot; align=&quot;left&quot;&gt;&lt;span style=&quot;;font-family:Arial;font-size:100%;&quot;  &gt;T&lt;span style=&quot;color:black;&quot;&gt;hey manage expectations and emotions      by setting those expectations and making sure their customers      feel heard. &lt;/span&gt;&lt;/span&gt;    &lt;/div&gt;&lt;/li&gt;&lt;/ol&gt;&lt;div style=&quot;background: white none repeat scroll 0% 50%; -moz-background-clip: -moz-initial; -moz-background-origin: -moz-initial; -moz-background-inline-policy: -moz-initial; margin-left: 0in; margin-right: 0in; margin-top: 0in; text-indent: 0.25in;&quot; align=&quot;left&quot;&gt;&lt;span style=&quot;;font-family:Arial;font-size:100%;&quot;  &gt;&lt;i&gt;Read other articles and learn more     about &lt;/i&gt;&lt;/span&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;i&gt;        &lt;a href=&quot;http://www.myarticlearchive.com/author/wynn.htm&quot;&gt;Garrison Wynn&lt;/a&gt;.&lt;/i&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;background: white none repeat scroll 0% 50%; -moz-background-clip: -moz-initial; -moz-background-origin: -moz-initial; -moz-background-inline-policy: -moz-initial; margin-left: 0in; margin-right: 0in; margin-top: 0in; text-indent: 0.25in;&quot; align=&quot;left&quot;&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;i&gt;source : http://www.myarticlearchive.com/articles/7/255.htm&lt;br /&gt;&lt;/i&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;background: white none repeat scroll 0% 50%; -moz-background-clip: -moz-initial; -moz-background-origin: -moz-initial; -moz-background-inline-policy: -moz-initial; margin-left: 0in; margin-right: 0in; margin-top: 0in; text-indent: 0.25in;&quot; align=&quot;left&quot;&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;i&gt;&lt;br /&gt;&lt;/i&gt;&lt;/span&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://uncle-jack76.blogspot.com/feeds/4934120508411724033/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://uncle-jack76.blogspot.com/2009/01/secrets-of-top-producers.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5318459668492336726/posts/default/4934120508411724033'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5318459668492336726/posts/default/4934120508411724033'/><link rel='alternate' type='text/html' href='http://uncle-jack76.blogspot.com/2009/01/secrets-of-top-producers.html' title='The Secrets of Top Producers'/><author><name>Uncle Jack</name><uri>http://www.blogger.com/profile/02111713531394122319</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjp0p5ig5lmwAWjB0E6ptlhGwBoW2kcH-yQkK7D6MR_E0ycrdWpHuah7ViUIgp70r0ggdqQ4TyRfJ1QeWrk810-JYl6nkK-qc_vB6Q-5BfkZvJb5uWuoWqFfvEilvywwis/s220/100x100px.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5318459668492336726.post-4053395236121706912</id><published>2009-01-16T00:27:00.006+07:00</published><updated>2009-01-20T21:52:35.756+07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Love"/><title type='text'>True Love</title><content type='html'>&lt;center&gt;   by Patricia Annette Roden   &lt;/center&gt;    &lt;br /&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;pre&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;Look into my eyes and you will seeMy love for you is.. endlessly.&lt;br /&gt;No doubts of you clutter my mindOnly trust and faith you will find.&lt;br /&gt;No one else was meant for meThe love we share will last eternally.&lt;br /&gt;You fill my days with happiness and laughterAnd I&#39;ll cherish you for ever after.&lt;br /&gt;To spend one more day of my life with you.&lt;br /&gt;Would make all my hopes and dreams come true&lt;/span&gt;.&lt;/span&gt;&lt;/pre&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://uncle-jack76.blogspot.com/feeds/4053395236121706912/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://uncle-jack76.blogspot.com/2009/01/true-love-poem.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5318459668492336726/posts/default/4053395236121706912'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5318459668492336726/posts/default/4053395236121706912'/><link rel='alternate' type='text/html' href='http://uncle-jack76.blogspot.com/2009/01/true-love-poem.html' title='True Love'/><author><name>Uncle Jack</name><uri>http://www.blogger.com/profile/02111713531394122319</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjp0p5ig5lmwAWjB0E6ptlhGwBoW2kcH-yQkK7D6MR_E0ycrdWpHuah7ViUIgp70r0ggdqQ4TyRfJ1QeWrk810-JYl6nkK-qc_vB6Q-5BfkZvJb5uWuoWqFfvEilvywwis/s220/100x100px.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5318459668492336726.post-5554216371203119874</id><published>2009-01-16T00:19:00.006+07:00</published><updated>2009-01-19T23:12:18.722+07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Love"/><title type='text'>I love the way you laugh</title><content type='html'>&lt;div  style=&quot;margin-bottom: 0pt; margin-top: 0pt;color:red;&quot;&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;by Rod    Duckwitz&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0pt; margin-top: 0pt;&quot;&gt;&lt;/div&gt;&lt;div&gt;I love the way you laugh,&lt;/div&gt;&lt;div&gt;I love the way you smile,&lt;/div&gt;&lt;div&gt;You have a way of warming up a room&lt;/div&gt;&lt;div&gt;With your beauty, wit, and style&lt;/div&gt;&lt;div&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;I love to hear your voice,&lt;/div&gt;&lt;div&gt;I love to hear you sing,&lt;/div&gt;&lt;div&gt;Your heart can turn a simple song&lt;/div&gt;&lt;div&gt;Into such a magic thing&lt;/div&gt;&lt;div&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;I love the way you give a hug,&lt;/div&gt;&lt;div&gt;I love the way you kiss,&lt;/div&gt;&lt;div&gt;The passion in your lips&lt;/div&gt;&lt;div&gt;Fills my heart with joy and bliss&lt;/div&gt;&lt;div&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;I love to have you in my arms,&lt;/div&gt;&lt;div&gt;I love to hold you tight,&lt;/div&gt;&lt;div&gt;I love to listen to you breathe&lt;/div&gt;&lt;div&gt;As I hold you through the night&lt;/div&gt;&lt;div&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;I love you every moment,&lt;/div&gt;&lt;div&gt;I&#39;ve loved you from the start,&lt;/div&gt;&lt;div&gt;Won&#39;t you be my Valentine&lt;/div&gt;&lt;div&gt;And fill my open heart&lt;br /&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://uncle-jack76.blogspot.com/feeds/5554216371203119874/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://uncle-jack76.blogspot.com/2009/01/i-love-way-you-laugh.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5318459668492336726/posts/default/5554216371203119874'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5318459668492336726/posts/default/5554216371203119874'/><link rel='alternate' type='text/html' href='http://uncle-jack76.blogspot.com/2009/01/i-love-way-you-laugh.html' title='I love the way you laugh'/><author><name>Uncle Jack</name><uri>http://www.blogger.com/profile/02111713531394122319</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjp0p5ig5lmwAWjB0E6ptlhGwBoW2kcH-yQkK7D6MR_E0ycrdWpHuah7ViUIgp70r0ggdqQ4TyRfJ1QeWrk810-JYl6nkK-qc_vB6Q-5BfkZvJb5uWuoWqFfvEilvywwis/s220/100x100px.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5318459668492336726.post-4759164082057659614</id><published>2009-01-16T00:16:00.005+07:00</published><updated>2009-01-20T22:37:21.398+07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Love"/><title type='text'>How to French Kiss</title><content type='html'>&lt;span style=&quot;;font-family:Arial;font-size:100%;color:black;&quot;   &gt;This is a guide to basic kissing, i.e. you learn the basics and get the basics right, then experiment and try different styles and more advanced techniques.&lt;br /&gt;&lt;br /&gt;The basics&lt;br /&gt;&lt;br /&gt;1. Brush your teeth, get a good bath, nicely groomed and clean and fresh, before meeting the other person.                   There&#39;s nothing worse than kissing the rear end of a garbage truck&lt;br /&gt;&lt;br /&gt;2. Get into a comfortable position - you can&#39;t kiss if your back feels like                   it&#39;s gonna break. Suggestion - Sit side by side on a comfy sofa.&lt;br /&gt;&lt;br /&gt;3. Hold your lover , firmly but gently - don&#39;t cause pain. Suggestion would be to hold the shoulders, the neck or gently on the side of the face, one side or both sides.&lt;br /&gt;&lt;br /&gt;4. Move your faces closer. Don&#39;t bump noses. Suggestion would be the guy angle his face slightly so you                   don&#39;t bump noses.&lt;br /&gt;&lt;br /&gt;5. Kiss gently, normal closed lips kissing, and close your eyes. Closing your eyes increases the sensations you feel, and also sets the mood.&lt;br /&gt;&lt;br /&gt;6. Continue kissing gently. Get comfortable with simple closed lips, lip-to-lip kissing before going anywhere else.&lt;span class=&quot;fullpost&quot;&gt;&lt;br /&gt;&lt;br /&gt;7. If fine till here, tentatively, slowly and lightly draw your tongue across the other                   person&#39;s lips.&lt;br /&gt;&lt;br /&gt;8. Chances are from here, if the other person lightly parts her tongue, slowly explore the other                   person&#39;s tongue in a light licking motion.&lt;br /&gt;&lt;br /&gt;9. The tongue has a very sensitive surface, which is why tongue to tongue is the                   essence of french kissing.&lt;br /&gt;&lt;br /&gt;10. After you&#39;ve tried lightly licking the other person&#39;s tongue, you can try sucking on it, wrestling with it ( see if you can hold it to the floor of her mouth ) and other things like that.&lt;br /&gt;&lt;br /&gt;11. Explore the other areas of the mouth. Especially the roof of the mouth. Lightly lick, or tickle the area with your tongue.&lt;br /&gt;&lt;br /&gt;12. Don&#39;t bite. whatever you do, don&#39;t bite.&lt;br /&gt;&lt;br /&gt;13. Don&#39;t swing your tongue round and round like a windmill. Explore                   lightly, don&#39;t drill your way through.&lt;br /&gt;&lt;br /&gt;14. Breathe through your nose. Breathe through your nose. I say again, breathe through your nose.&lt;br /&gt;&lt;br /&gt;15. Follow so far? You can lightly use your hands too, lightly rubbing the other person. Suggestions, along the waist, along the back, the arms, especially the inside of the arm, the neck, maybe running your fingers through her hair. Again, don&#39;t cause pain.&lt;br /&gt;&lt;br /&gt;16. Continue kissing.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-style: italic;&quot;&gt;Source&lt;/span&gt; : http://www.theromantic.com/kissing/frenchkiss.htm&lt;/span&gt;</content><link rel='replies' type='application/atom+xml' href='http://uncle-jack76.blogspot.com/feeds/4759164082057659614/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://uncle-jack76.blogspot.com/2009/01/how-to-french-kiss.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5318459668492336726/posts/default/4759164082057659614'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5318459668492336726/posts/default/4759164082057659614'/><link rel='alternate' type='text/html' href='http://uncle-jack76.blogspot.com/2009/01/how-to-french-kiss.html' title='How to French Kiss'/><author><name>Uncle Jack</name><uri>http://www.blogger.com/profile/02111713531394122319</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjp0p5ig5lmwAWjB0E6ptlhGwBoW2kcH-yQkK7D6MR_E0ycrdWpHuah7ViUIgp70r0ggdqQ4TyRfJ1QeWrk810-JYl6nkK-qc_vB6Q-5BfkZvJb5uWuoWqFfvEilvywwis/s220/100x100px.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5318459668492336726.post-4011438213942811612</id><published>2009-01-15T00:08:00.003+07:00</published><updated>2009-01-19T23:13:20.512+07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Linux"/><title type='text'>Enabling Numlock in GDM</title><content type='html'>Install numlockx using apt-get, aptitude or Synaptic&lt;br /&gt;In Gutsy, edit /etc/gdm/Init/Default. For older versions of ubuntu edit /etc/X11/gdm/Init/Default instead.&lt;br /&gt;&lt;br /&gt;Find the line&lt;br /&gt;&lt;br /&gt;exit 0&lt;br /&gt;&lt;br /&gt;Add the following code above that line&lt;br /&gt;&lt;br /&gt;if [ -x /usr/bin/numlockx ]; then&lt;br /&gt;/usr/bin/numlockx on&lt;br /&gt;fi</content><link rel='replies' type='application/atom+xml' href='http://uncle-jack76.blogspot.com/feeds/4011438213942811612/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://uncle-jack76.blogspot.com/2009/01/enabling-numlock-in-gdm.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5318459668492336726/posts/default/4011438213942811612'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5318459668492336726/posts/default/4011438213942811612'/><link rel='alternate' type='text/html' href='http://uncle-jack76.blogspot.com/2009/01/enabling-numlock-in-gdm.html' title='Enabling Numlock in GDM'/><author><name>Uncle Jack</name><uri>http://www.blogger.com/profile/02111713531394122319</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjp0p5ig5lmwAWjB0E6ptlhGwBoW2kcH-yQkK7D6MR_E0ycrdWpHuah7ViUIgp70r0ggdqQ4TyRfJ1QeWrk810-JYl6nkK-qc_vB6Q-5BfkZvJb5uWuoWqFfvEilvywwis/s220/100x100px.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5318459668492336726.post-683845753587960343</id><published>2009-01-14T23:03:00.003+07:00</published><updated>2009-01-19T23:13:42.313+07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Jokes"/><title type='text'>Accident</title><content type='html'>&lt;div class=&quot;MsoNormal&quot;&gt;One day the motorcycle accident in front of the house of Doctor Michael, who was very famous because of the expert to cured. The person who fell from the motorcycle was helped by a Police. Then the dialogue happened: &lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;police: “Wow… sir you are very lucky fell exact in front of the house of Doctor Michael who was famous that, so I might not very busy brought you to the hospital. Wait a moment Sir! I’m calling Doctor Michael…” &lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;And then the person who fell from the motorcycle said to the police… &lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;People: “Wow… you are luckier than me Officer,you  might not very busy called Doctor Michael, because me myself was Doctor Michael…” &lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;police : “!!!???&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://uncle-jack76.blogspot.com/feeds/683845753587960343/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://uncle-jack76.blogspot.com/2009/01/accident.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5318459668492336726/posts/default/683845753587960343'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5318459668492336726/posts/default/683845753587960343'/><link rel='alternate' type='text/html' href='http://uncle-jack76.blogspot.com/2009/01/accident.html' title='Accident'/><author><name>Uncle Jack</name><uri>http://www.blogger.com/profile/02111713531394122319</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjp0p5ig5lmwAWjB0E6ptlhGwBoW2kcH-yQkK7D6MR_E0ycrdWpHuah7ViUIgp70r0ggdqQ4TyRfJ1QeWrk810-JYl6nkK-qc_vB6Q-5BfkZvJb5uWuoWqFfvEilvywwis/s220/100x100px.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5318459668492336726.post-3601827583658285542</id><published>2009-01-14T21:33:00.001+07:00</published><updated>2009-01-19T23:14:04.334+07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Jokes"/><title type='text'>crocodile</title><content type='html'>&lt;p class=&quot;MsoNormal&quot;&gt;Ancient in England, when the time landlord had the hunter&#39;s strong dogs, this a person who had the dog high only 30cm. When he went for a walk, he met Sir Graham that had the big and hair-raising bulldog dog. “Hai, stranger,” said Sir Graham, ” your dog was very small! ” the Person answered,&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot;&gt;“O yeah, ok, if your dog could overcome my dog in 15 seconds, you were given by me 1000 slivers of gold. ” And they pitted their dog. After 10 seconds, blood was scattered everywhere. The bulldog was destroyed. And the person accepted 1000 slivers of gold from the owner of the bulldog. After going for a moment, he met Sir John that had the cross-bred dog herder and the wolf. This time then he challenged the wolf dog with time 20 seconds and the bet 5000 slivers of gold.&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot;&gt;The dog hereder that was destroyed in 15 seconds. When he will go, Sir John suggested him to meet the king who had the strongest dog throughout the kingdom. Then the foreigner then met the King and challenged his dog with the bet 10000 slivers of gold. Again and again the opposing dog was destroyed. Most surprised-surprised, the king asked,” Very amazing, what dog is this and how you trained him? ” the Foreigner answered, “Oh, his exercise just so-so, and his race then I was personally more unclear. But if I wasn’t wrong, before his tail was cut off and given ears, his name is crocodile.&lt;/p&gt;</content><link rel='replies' type='application/atom+xml' href='http://uncle-jack76.blogspot.com/feeds/3601827583658285542/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://uncle-jack76.blogspot.com/2009/01/crocodile.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5318459668492336726/posts/default/3601827583658285542'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5318459668492336726/posts/default/3601827583658285542'/><link rel='alternate' type='text/html' href='http://uncle-jack76.blogspot.com/2009/01/crocodile.html' title='crocodile'/><author><name>Uncle Jack</name><uri>http://www.blogger.com/profile/02111713531394122319</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjp0p5ig5lmwAWjB0E6ptlhGwBoW2kcH-yQkK7D6MR_E0ycrdWpHuah7ViUIgp70r0ggdqQ4TyRfJ1QeWrk810-JYl6nkK-qc_vB6Q-5BfkZvJb5uWuoWqFfvEilvywwis/s220/100x100px.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5318459668492336726.post-8122075489194571746</id><published>2009-01-13T21:34:00.018+07:00</published><updated>2009-01-22T19:45:58.298+07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Computer"/><title type='text'>Computer hardware</title><content type='html'>&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; text-align: justify;&quot;&gt;&lt;b&gt;-Motherboard&lt;/b&gt;&lt;b&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;/div&gt;&lt;ul style=&quot;text-align: justify;&quot; type=&quot;disc&quot;&gt;&lt;li class=&quot;MsoNormal&quot; style=&quot;line-height: normal;&quot;&gt;&lt;b&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/Motherboard&quot; title=&quot;Motherboard&quot;&gt;&lt;span style=&quot;color:blue;&quot;&gt;Motherboard&lt;/span&gt;&lt;/a&gt;&lt;/b&gt; - It is the &quot;body&quot; or mainframe of the      computer, through which all other components interface.&lt;o:p&gt;&lt;/o:p&gt;&lt;/li&gt;&lt;li class=&quot;MsoNormal&quot; style=&quot;line-height: normal;&quot;&gt;&lt;b&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/Central_processing_unit&quot; title=&quot;Central processing unit&quot;&gt;&lt;span style=&quot;color:blue;&quot;&gt;Central      processing unit&lt;/span&gt;&lt;/a&gt; (&lt;/b&gt;CPU&lt;b&gt;)&lt;/b&gt;      - Performs most of the calculations which enable a computer to function,      sometimes referred to as the &quot;backbone or brain&quot; of the      computer. &lt;o:p&gt;&lt;/o:p&gt;&lt;/li&gt;&lt;ul type=&quot;circle&quot;&gt;&lt;li class=&quot;MsoNormal&quot; style=&quot;line-height: normal;&quot;&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/Computer_fan&quot; title=&quot;Computer fan&quot;&gt;&lt;span style=&quot;color:blue;&quot;&gt;Computer fan&lt;/span&gt;&lt;/a&gt; -       Used to lower the temperature of the computer; a fan is almost always       attached to the CPU, and to the back of the case, also known as the       &#39;muffin fan&#39;.&lt;o:p&gt;&lt;/o:p&gt;&lt;/li&gt;&lt;/ul&gt;&lt;li class=&quot;MsoNormal&quot; style=&quot;line-height: normal;&quot;&gt;&lt;b&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/Firmware&quot; title=&quot;Firmware&quot;&gt;&lt;span style=&quot;color:blue;&quot;&gt;Firmware&lt;/span&gt;&lt;/a&gt;&lt;/b&gt; is loaded from the Read only memory eg. &lt;a href=&quot;http://en.wikipedia.org/wiki/ROM&quot; title=&quot;ROM&quot;&gt;&lt;span style=&quot;color:blue;&quot;&gt;ROM&lt;/span&gt;&lt;/a&gt;      run from the &lt;a href=&quot;http://en.wikipedia.org/wiki/Basic_Input-Output_System&quot; title=&quot;Basic Input-Output System&quot;&gt;&lt;span style=&quot;color:blue;&quot;&gt;Basic      Input-Output System&lt;/span&gt;&lt;/a&gt; (BIOS) or in newer systems &lt;a href=&quot;http://en.wikipedia.org/wiki/Extensible_Firmware_Interface&quot; title=&quot;Extensible Firmware Interface&quot;&gt;&lt;span style=&quot;color:blue;&quot;&gt;Extensible      Firmware Interface&lt;/span&gt;&lt;/a&gt; (EFI) compliant&lt;o:p&gt;&lt;/o:p&gt;&lt;/li&gt;&lt;li class=&quot;MsoNormal&quot; style=&quot;line-height: normal;&quot;&gt;Internal &lt;a href=&quot;http://en.wikipedia.org/wiki/Computer_bus&quot; title=&quot;Computer bus&quot;&gt;&lt;span style=&quot;color:blue;&quot;&gt;Buses&lt;/span&gt;&lt;/a&gt; - Connections to various internal      components. &lt;o:p&gt;&lt;/o:p&gt;&lt;/li&gt;&lt;ul type=&quot;circle&quot;&gt;&lt;li class=&quot;MsoNormal&quot; style=&quot;line-height: normal;&quot;&gt;&lt;b&gt;Current&lt;/b&gt;       &lt;o:p&gt;&lt;/o:p&gt;&lt;/li&gt;&lt;ul type=&quot;square&quot;&gt;&lt;li class=&quot;MsoNormal&quot; style=&quot;line-height: normal;&quot;&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/Peripheral_Component_Interconnect&quot; title=&quot;Peripheral Component Interconnect&quot;&gt;&lt;span style=&quot;color:blue;&quot;&gt;PCI&lt;/span&gt;&lt;/a&gt;        (being phased out for graphic cards but still used for other uses)&lt;o:p&gt;&lt;/o:p&gt;&lt;/li&gt;&lt;li class=&quot;MsoNormal&quot; style=&quot;line-height: normal;&quot;&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/PCI_Express&quot; title=&quot;PCI Express&quot;&gt;&lt;span style=&quot;color:blue;&quot;&gt;PCI Express&lt;/span&gt;&lt;/a&gt;        (PCI-E)&lt;o:p&gt;&lt;/o:p&gt;&lt;/li&gt;&lt;li class=&quot;MsoNormal&quot; style=&quot;line-height: normal;&quot;&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/Universal_Serial_Bus&quot; title=&quot;Universal Serial Bus&quot;&gt;&lt;span style=&quot;color:blue;&quot;&gt;USB&lt;/span&gt;&lt;/a&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/li&gt;&lt;li class=&quot;MsoNormal&quot; style=&quot;line-height: normal;&quot;&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/FireWire&quot; title=&quot;FireWire&quot;&gt;&lt;span style=&quot;color:blue;&quot;&gt;FireWire&lt;/span&gt;&lt;/a&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/li&gt;&lt;li class=&quot;MsoNormal&quot; style=&quot;line-height: normal;&quot;&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/HyperTransport&quot; title=&quot;HyperTransport&quot;&gt;&lt;span style=&quot;color:blue;&quot;&gt;HyperTransport&lt;/span&gt;&lt;/a&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/li&gt;&lt;li class=&quot;MsoNormal&quot; style=&quot;line-height: normal;&quot;&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/Intel_QuickPath_Interconnect&quot; title=&quot;Intel QuickPath Interconnect&quot;&gt;&lt;span style=&quot;color:blue;&quot;&gt;Intel        QuickPath&lt;/span&gt;&lt;/a&gt; (expected in 2008)&lt;o:p&gt;&lt;/o:p&gt;&lt;/li&gt;&lt;/ul&gt;&lt;li class=&quot;MsoNormal&quot; style=&quot;line-height: normal;&quot;&gt;&lt;b&gt;Obsolete&lt;/b&gt;       &lt;o:p&gt;&lt;/o:p&gt;&lt;/li&gt;&lt;ul type=&quot;square&quot;&gt;&lt;li class=&quot;MsoNormal&quot; style=&quot;line-height: normal;&quot;&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/Accelerated_Graphics_Port&quot; title=&quot;Accelerated Graphics Port&quot;&gt;&lt;span style=&quot;color:blue;&quot;&gt;AGP&lt;/span&gt;&lt;/a&gt;        (Obsolete graphic card bus)&lt;o:p&gt;&lt;/o:p&gt;&lt;/li&gt;&lt;li class=&quot;MsoNormal&quot; style=&quot;line-height: normal;&quot;&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/Industry_Standard_Architecture&quot; title=&quot;Industry Standard Architecture&quot;&gt;&lt;span style=&quot;color:blue;&quot;&gt;ISA&lt;/span&gt;&lt;/a&gt;        (obsolete in PCs, but still used in industrial computers)&lt;o:p&gt;&lt;/o:p&gt;&lt;/li&gt;&lt;li class=&quot;MsoNormal&quot; style=&quot;line-height: normal;&quot;&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/VESA_Local_Bus&quot; title=&quot;VESA Local Bus&quot;&gt;&lt;span style=&quot;color:blue;&quot;&gt;VLB&lt;/span&gt;&lt;/a&gt; VESA        Local Bus (outdated)&lt;o:p&gt;&lt;/o:p&gt;&lt;/li&gt;&lt;/ul&gt;&lt;/ul&gt;&lt;li class=&quot;MsoNormal&quot; style=&quot;line-height: normal;&quot;&gt;External Bus Controllers - used to connect to external      peripherals, such as printers and input devices. These ports may also be      based upon expansion cards, attached to the internal buses.&lt;o:p&gt;&lt;/o:p&gt;&lt;/li&gt;&lt;/ul&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; text-align: justify;&quot;&gt;&lt;a href=&quot;http://www.blogger.com/post-edit.g?blogID=5318459668492336726&amp;amp;postID=8122075489194571746&quot; name=&quot;Power_supply&quot;&gt;&lt;/a&gt;&lt;b&gt;-Power supply&lt;/b&gt;&lt;b&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/b&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; text-align: justify;&quot;&gt;A case contro, and (usually) a cooling fan, and supplies power to run the rest of the computer, the most common types of power supplies are mechanic shed (old) but the standard for PCs actually are ATX and Micro ATX.&lt;span class=&quot;fullpost&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; text-align: justify;&quot;&gt;&lt;a href=&quot;http://www.blogger.com/post-edit.g?blogID=5318459668492336726&amp;amp;postID=8122075489194571746&quot; name=&quot;Video_display_controller&quot;&gt;&lt;/a&gt;&lt;b&gt;-Video display controller&lt;/b&gt;&lt;b&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; text-align: justify;&quot;&gt;Produces the output for the &lt;a href=&quot;http://en.wikipedia.org/wiki/Visual_display_unit&quot; title=&quot;Visual display unit&quot;&gt;&lt;span style=&quot;color:blue;&quot;&gt;visual display unit&lt;/span&gt;&lt;/a&gt;. This will either be built into the motherboard or attached in its own separate slot (PCI, PCI-E, PCI-E 2.0, or AGP), in the form of a &lt;a href=&quot;http://en.wikipedia.org/wiki/Graphics_card&quot; title=&quot;Graphics card&quot;&gt;&lt;span style=&quot;color:blue;&quot;&gt;graphics card&lt;/span&gt;&lt;/a&gt;.&lt;o:p&gt;&lt;/o:p&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; text-align: justify;&quot;&gt;&lt;a href=&quot;http://www.blogger.com/post-edit.g?blogID=5318459668492336726&amp;amp;postID=8122075489194571746&quot; name=&quot;Removable_media_devices&quot;&gt;&lt;/a&gt;&lt;b&gt;-Removable media devices&lt;/b&gt;&lt;b&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;/div&gt;&lt;ul style=&quot;text-align: justify;&quot; type=&quot;disc&quot;&gt;&lt;li class=&quot;MsoNormal&quot; style=&quot;line-height: normal;&quot;&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/CD&quot; title=&quot;CD&quot;&gt;&lt;span style=&quot;color:blue;&quot;&gt;CD&lt;/span&gt;&lt;/a&gt; (compact disc) - the most common type of      removable media, inexpensive but has a short life-span. &lt;o:p&gt;&lt;/o:p&gt;&lt;/li&gt;&lt;ul type=&quot;circle&quot;&gt;&lt;li class=&quot;MsoNormal&quot; style=&quot;line-height: normal;&quot;&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/CD-ROM&quot; title=&quot;CD-ROM&quot;&gt;&lt;span style=&quot;color:blue;&quot;&gt;CD-ROM Drive&lt;/span&gt;&lt;/a&gt; - a device       used for reading data from a CD.&lt;o:p&gt;&lt;/o:p&gt;&lt;/li&gt;&lt;li class=&quot;MsoNormal&quot; style=&quot;line-height: normal;&quot;&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/CD_recorder&quot; title=&quot;CD recorder&quot;&gt;&lt;span style=&quot;color:blue;&quot;&gt;CD Writer&lt;/span&gt;&lt;/a&gt; - a       device used for both reading and writing data to and from a CD.&lt;o:p&gt;&lt;/o:p&gt;&lt;/li&gt;&lt;/ul&gt;&lt;li class=&quot;MsoNormal&quot; style=&quot;line-height: normal;&quot;&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/DVD&quot; title=&quot;DVD&quot;&gt;&lt;span style=&quot;color:blue;&quot;&gt;DVD&lt;/span&gt;&lt;/a&gt; (digital versatile disc) - a popular      type of removable media that is the same dimensions as a CD but stores up      to 6 times as much information. It is the most common way of transferring      digital video. &lt;o:p&gt;&lt;/o:p&gt;&lt;/li&gt;&lt;ul type=&quot;circle&quot;&gt;&lt;li class=&quot;MsoNormal&quot; style=&quot;line-height: normal;&quot;&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/DVD-ROM&quot; title=&quot;DVD-ROM&quot;&gt;&lt;span style=&quot;color:blue;&quot;&gt;DVD-ROM Drive&lt;/span&gt;&lt;/a&gt; - a       device used for reading data from a DVD.&lt;o:p&gt;&lt;/o:p&gt;&lt;/li&gt;&lt;li class=&quot;MsoNormal&quot; style=&quot;line-height: normal;&quot;&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/DVD&quot; title=&quot;DVD&quot;&gt;&lt;span style=&quot;color:blue;&quot;&gt;DVD Writer&lt;/span&gt;&lt;/a&gt; - a device used for both reading       and writing data to and from a DVD.&lt;o:p&gt;&lt;/o:p&gt;&lt;/li&gt;&lt;li class=&quot;MsoNormal&quot; style=&quot;line-height: normal;&quot;&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/DVD-RAM&quot; title=&quot;DVD-RAM&quot;&gt;&lt;span style=&quot;color:blue;&quot;&gt;DVD-RAM Drive&lt;/span&gt;&lt;/a&gt; - a       device used for rapid writing and reading of data from a special type of       DVD.&lt;o:p&gt;&lt;/o:p&gt;&lt;/li&gt;&lt;/ul&gt;&lt;li class=&quot;MsoNormal&quot; style=&quot;line-height: normal;&quot;&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/Blu-ray_Disc&quot; title=&quot;Blu-ray Disc&quot;&gt;&lt;span style=&quot;color:blue;&quot;&gt;Blu-ray&lt;/span&gt;&lt;/a&gt; - a      high-density optical disc format for the storage of digital information,      including high-definition video. &lt;o:p&gt;&lt;/o:p&gt;&lt;/li&gt;&lt;ul type=&quot;circle&quot;&gt;&lt;li class=&quot;MsoNormal&quot; style=&quot;line-height: normal;&quot;&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/BD-ROM&quot; title=&quot;BD-ROM&quot;&gt;&lt;span style=&quot;color:blue;&quot;&gt;BD-ROM Drive&lt;/span&gt;&lt;/a&gt; - a device       used for reading data from a Blu-ray disc.&lt;o:p&gt;&lt;/o:p&gt;&lt;/li&gt;&lt;li class=&quot;MsoNormal&quot; style=&quot;line-height: normal;&quot;&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/BD-RE&quot; title=&quot;BD-RE&quot;&gt;&lt;span style=&quot;color:blue;&quot;&gt;BD Writer&lt;/span&gt;&lt;/a&gt; - a device used       for both reading and writing data to and from a Blu-ray disc.&lt;o:p&gt;&lt;/o:p&gt;&lt;/li&gt;&lt;/ul&gt;&lt;li class=&quot;MsoNormal&quot; style=&quot;line-height: normal;&quot;&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/HD_DVD&quot; title=&quot;HD DVD&quot;&gt;&lt;span style=&quot;color:blue;&quot;&gt;HD DVD&lt;/span&gt;&lt;/a&gt; - a high-density      optical disc format and successor to the standard DVD. It was a      discontinued competitor to the Blu-ray format.&lt;o:p&gt;&lt;/o:p&gt;&lt;/li&gt;&lt;li class=&quot;MsoNormal&quot; style=&quot;line-height: normal;&quot;&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/Floppy_disk&quot; title=&quot;Floppy disk&quot;&gt;&lt;span style=&quot;color:blue;&quot;&gt;Floppy disk&lt;/span&gt;&lt;/a&gt; - an      outdated storage device consisting of a thin disk of a flexible magnetic      storage medium. Used today mainly for loading RAID drivers.&lt;o:p&gt;&lt;/o:p&gt;&lt;/li&gt;&lt;li class=&quot;MsoNormal&quot; style=&quot;line-height: normal;&quot;&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/Zip_drive&quot; title=&quot;Zip drive&quot;&gt;&lt;span style=&quot;color:blue;&quot;&gt;Zip drive&lt;/span&gt;&lt;/a&gt; - an      outdated medium-capacity removable disk storage system, first introduced      by Iomega in 1994.&lt;o:p&gt;&lt;/o:p&gt;&lt;/li&gt;&lt;li class=&quot;MsoNormal&quot; style=&quot;line-height: normal;&quot;&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/USB_flash_drive&quot; title=&quot;USB flash drive&quot;&gt;&lt;span style=&quot;color:blue;&quot;&gt;USB flash drive&lt;/span&gt;&lt;/a&gt;      - a flash memory data storage device integrated with a USB interface,      typically small, lightweight, removable, and rewritable.&lt;o:p&gt;&lt;/o:p&gt;&lt;/li&gt;&lt;li class=&quot;MsoNormal&quot; style=&quot;line-height: normal;&quot;&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/Tape_drive&quot; title=&quot;Tape drive&quot;&gt;&lt;span style=&quot;color:blue;&quot;&gt;Tape drive&lt;/span&gt;&lt;/a&gt; - a      device that reads and writes data on a magnetic tape, used for long term      storage.&lt;code&gt;&lt;span class=&quot;fullpost&quot;&gt;&lt;/code&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/li&gt;&lt;/ul&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; text-align: justify;&quot;&gt;&lt;a href=&quot;http://www.blogger.com/post-edit.g?blogID=5318459668492336726&amp;amp;postID=8122075489194571746&quot; name=&quot;Internal_storage&quot;&gt;&lt;/a&gt;&lt;b&gt;-Internal storage&lt;/b&gt;&lt;b&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; text-align: justify;&quot;&gt;Hardware that keeps data inside the computer for later use and remains persistent even when the computer has no power.&lt;o:p&gt;&lt;/o:p&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;/div&gt;&lt;ul style=&quot;text-align: justify;&quot; type=&quot;disc&quot;&gt;&lt;li class=&quot;MsoNormal&quot; style=&quot;line-height: normal;&quot;&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/Hard_disk&quot; title=&quot;Hard disk&quot;&gt;&lt;span style=&quot;color:blue;&quot;&gt;Hard disk&lt;/span&gt;&lt;/a&gt; - for      medium-term storage of data.&lt;o:p&gt;&lt;/o:p&gt;&lt;/li&gt;&lt;li class=&quot;MsoNormal&quot; style=&quot;line-height: normal;&quot;&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/Solid-state_drive&quot; title=&quot;Solid-state drive&quot;&gt;&lt;span style=&quot;color:blue;&quot;&gt;Solid-state drive&lt;/span&gt;&lt;/a&gt;      - a device similar to hard disk, but containing no moving parts and stores      data in a digital format.&lt;o:p&gt;&lt;/o:p&gt;&lt;/li&gt;&lt;li class=&quot;MsoNormal&quot; style=&quot;line-height: normal;&quot;&gt;&lt;a href=&quot;http://en.wikipedia.org/w/index.php?title=RAID_array_controller&amp;amp;action=edit&amp;amp;redlink=1&quot; title=&quot;RAID array controller (page does not exist)&quot;&gt;&lt;span style=&quot;color:blue;&quot;&gt;RAID array controller&lt;/span&gt;&lt;/a&gt; - a device to manage      several hard disks, to achieve performance or reliability improvement in      what is called a RAID array.&lt;o:p&gt;&lt;/o:p&gt;&lt;/li&gt;&lt;/ul&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; text-align: justify;&quot;&gt;&lt;a href=&quot;http://www.blogger.com/post-edit.g?blogID=5318459668492336726&amp;amp;postID=8122075489194571746&quot; name=&quot;Sound_card&quot;&gt;&lt;/a&gt;&lt;b&gt;-Sound card&lt;/b&gt;&lt;b&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; text-align: justify;&quot;&gt;Enables the computer to output sound to audio devices, as well as accept input from a &lt;a href=&quot;http://en.wikipedia.org/wiki/Microphone&quot; title=&quot;Microphone&quot;&gt;&lt;span style=&quot;color:blue;&quot;&gt;microphone&lt;/span&gt;&lt;/a&gt;. Most modern computers have sound cards built-in to the motherboard, though it is common for a user to install a separate sound card as an upgrade. Most sound cards, either built-in or added, have surround sound capabilities.&lt;o:p&gt;&lt;/o:p&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; text-align: justify;&quot;&gt;&lt;b&gt;-Random Access Memory (RAM)&lt;/b&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; text-align: justify;&quot;&gt;There&#39;s too much &quot;stuff&quot; on your computer&#39;s hard disk to use it all at the same time. During the average session sitting at the computer, you&#39;ll probably use only a small amount of all that&#39;s available. The stuff you&#39;re working with at any given moment is stored in random access memory (often abbreviated RAM, and often called simply &quot;memory&quot;). The advantage using RAM to store whatever you&#39;re working on at the moment is that RAM is very fast. Much faster than any disk. For you, &quot;fast&quot; translates to less time waiting and more time being productive.&lt;br /&gt;&lt;br /&gt;So if RAM is so fast, why not put everything in it? Why have a hard disk at all? The answer to that lies in the fact that RAM is volatile. As soon as the computer is shut off, whether intentionally or by an accidental power outage, every thing in RAM disappears, just as quickly as a light bulb goes out when the plug is pulled. So you don&#39;t want to rely on RAM to hold everything. A disk, on the other hand, holds its information whether the power is on or off.&lt;o:p&gt;&lt;/o:p&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; text-align: justify;&quot;&gt;&lt;o:p&gt; &lt;/o:p&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; text-align: justify;&quot;&gt;&lt;i&gt;Source&lt;/i&gt; :*Wikipedia&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; text-align: justify;&quot;&gt;               *Alan Simpson at &lt;a href=&quot;http://www.coolnerds.com/Newbies/Hardware/hardware.htm&quot;&gt;&lt;span style=&quot;color:blue;&quot;&gt;http://www.coolnerds.com/Newbies/Hardware/hardware.htm&lt;/span&gt;&lt;code&gt;&lt;/span&gt;&lt;/code&gt;&lt;/a&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;text-align: justify;&quot;&gt;&lt;o:p&gt; &lt;/o:p&gt;&lt;/div&gt;&lt;/span&gt;</content><link rel='replies' type='application/atom+xml' href='http://uncle-jack76.blogspot.com/feeds/8122075489194571746/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://uncle-jack76.blogspot.com/2009/01/computer-hardware.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5318459668492336726/posts/default/8122075489194571746'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5318459668492336726/posts/default/8122075489194571746'/><link rel='alternate' type='text/html' href='http://uncle-jack76.blogspot.com/2009/01/computer-hardware.html' title='Computer hardware'/><author><name>Uncle Jack</name><uri>http://www.blogger.com/profile/02111713531394122319</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjp0p5ig5lmwAWjB0E6ptlhGwBoW2kcH-yQkK7D6MR_E0ycrdWpHuah7ViUIgp70r0ggdqQ4TyRfJ1QeWrk810-JYl6nkK-qc_vB6Q-5BfkZvJb5uWuoWqFfvEilvywwis/s220/100x100px.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5318459668492336726.post-8003694502306370286</id><published>2009-01-13T21:24:00.006+07:00</published><updated>2009-01-19T23:14:53.650+07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Linux"/><title type='text'>LINUX</title><content type='html'>&lt;h2&gt;History&lt;/h2&gt;&lt;div class=&quot;thumb tright&quot;&gt;&lt;div class=&quot;thumbinner&quot; style=&quot;width: 308px;&quot;&gt;&lt;table style=&quot;border: 0pt none ; margin: 0pt; padding: 0pt; background: transparent none repeat scroll 0% 50%; -moz-background-clip: -moz-initial; -moz-background-origin: -moz-initial; -moz-background-inline-policy: -moz-initial; width: 304px;&quot; cellspacing=&quot;0&quot;&gt;&lt;tbody&gt;&lt;tr&gt; &lt;td class=&quot;thumbimage&quot; style=&quot;margin: 0pt;&quot;&gt;&lt;a class=&quot;image&quot; href=&quot;http://en.wikipedia.org/wiki/File:Richard_Matthew_Stallman_cropped.jpeg&quot; title=&quot;Richard Stallman, left, founder of the GNU project, and Linus Torvalds, right, creator of the Linux kernel&quot;&gt;&lt;img alt=&quot;Richard Stallman, left, founder of the GNU project, and Linus Torvalds, right, creator of the Linux kernel&quot; src=&quot;http://upload.wikimedia.org/wikipedia/commons/thumb/f/f4/Richard_Matthew_Stallman_cropped.jpeg/150px-Richard_Matthew_Stallman_cropped.jpeg&quot; border=&quot;0&quot; height=&quot;191&quot; width=&quot;150&quot; /&gt;&lt;/a&gt;&lt;/td&gt; &lt;td style=&quot;border: 0pt none ; margin: 0pt; padding: 0pt; width: 2px;&quot;&gt;&lt;br /&gt;&lt;/td&gt; &lt;td class=&quot;thumbimage&quot; style=&quot;margin: 0pt;&quot;&gt;&lt;a class=&quot;image&quot; href=&quot;http://en.wikipedia.org/wiki/File:Linus_Torvalds_cropped.jpeg&quot; title=&quot;Richard Stallman, left, founder of the GNU project, and Linus Torvalds, right, creator of the Linux kernel&quot;&gt;&lt;img alt=&quot;Richard Stallman, left, founder of the GNU project, and Linus Torvalds, right, creator of the Linux kernel&quot; src=&quot;http://upload.wikimedia.org/wikipedia/commons/thumb/7/71/Linus_Torvalds_cropped.jpeg/150px-Linus_Torvalds_cropped.jpeg&quot; border=&quot;0&quot; height=&quot;191&quot; width=&quot;150&quot; /&gt;&lt;/a&gt;&lt;/td&gt; &lt;/tr&gt;&lt;tr style=&quot;vertical-align: top;&quot;&gt; &lt;td colspan=&quot;3&quot; style=&quot;border: 0pt none ; margin: 0pt; padding: 0pt;&quot;&gt;&lt;div class=&quot;thumbcaption&quot;&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/Richard_Stallman&quot; title=&quot;Richard Stallman&quot;&gt;Richard Stallman&lt;/a&gt;, left, founder of the &lt;a class=&quot;mw-redirect&quot; href=&quot;http://en.wikipedia.org/wiki/GNU_project&quot; title=&quot;GNU project&quot;&gt;GNU project&lt;/a&gt;, and &lt;a href=&quot;http://en.wikipedia.org/wiki/Linus_Torvalds&quot; title=&quot;Linus Torvalds&quot;&gt;Linus Torvalds&lt;/a&gt;, right, creator of the &lt;a href=&quot;http://en.wikipedia.org/wiki/Linux_kernel&quot; title=&quot;Linux kernel&quot;&gt;Linux kernel&lt;/a&gt;&lt;/div&gt;&lt;/td&gt; &lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;/div&gt;&lt;/div&gt;The &lt;a href=&quot;http://en.wikipedia.org/wiki/Unix&quot; title=&quot;Unix&quot;&gt;Unix&lt;/a&gt; operating system was conceived and implemented in the 1960s and first released in 1970. Its wide availability and &lt;a href=&quot;http://en.wikipedia.org/wiki/Porting&quot; title=&quot;Porting&quot;&gt;portability&lt;/a&gt; meant that it was widely adopted, copied and modified by academic institutions and businesses, with its design being influential on authors of other systems.&lt;br /&gt;The &lt;a href=&quot;http://en.wikipedia.org/wiki/GNU_Project&quot; title=&quot;GNU Project&quot;&gt;GNU Project&lt;/a&gt;, started in 1984 by &lt;a href=&quot;http://en.wikipedia.org/wiki/Richard_Stallman&quot; title=&quot;Richard Stallman&quot;&gt;Richard Stallman&lt;/a&gt;, had the goal of creating a &quot;&lt;i&gt;complete Unix-compatible software system&lt;/i&gt;&quot;&lt;sup class=&quot;reference&quot; id=&quot;cite_ref-gnu_announce_6-0&quot;&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/Linux#cite_note-gnu_announce-6&quot; title=&quot;&quot;&gt;[7]&lt;/a&gt;&lt;/sup&gt; made entirely of &lt;a href=&quot;http://en.wikipedia.org/wiki/Free_software&quot; title=&quot;Free software&quot;&gt;free software&lt;/a&gt;. The next year Stallman created the &lt;a href=&quot;http://en.wikipedia.org/wiki/Free_Software_Foundation&quot; title=&quot;Free Software Foundation&quot;&gt;Free Software Foundation&lt;/a&gt; and wrote the &lt;a href=&quot;http://en.wikipedia.org/wiki/GNU_General_Public_License&quot; title=&quot;GNU General Public License&quot;&gt;GNU General Public License&lt;/a&gt; (GNU GPL) in 1989. By the early 1990s, many of the programs required in an operating system (such as libraries, &lt;a href=&quot;http://en.wikipedia.org/wiki/Compiler&quot; title=&quot;Compiler&quot;&gt;compilers&lt;/a&gt;, &lt;a href=&quot;http://en.wikipedia.org/wiki/Text_editor&quot; title=&quot;Text editor&quot;&gt;text editors&lt;/a&gt;, a &lt;a href=&quot;http://en.wikipedia.org/wiki/Unix_shell&quot; title=&quot;Unix shell&quot;&gt;Unix shell&lt;/a&gt;, and a windowing system) were completed, although low-level elements such as &lt;a href=&quot;http://en.wikipedia.org/wiki/Device_driver&quot; title=&quot;Device driver&quot;&gt;device drivers&lt;/a&gt;, &lt;a href=&quot;http://en.wikipedia.org/wiki/Daemon_%28computer_software%29&quot; title=&quot;Daemon (computer software)&quot;&gt;daemons&lt;/a&gt;, and the &lt;a href=&quot;http://en.wikipedia.org/wiki/Kernel_%28computer_science%29&quot; title=&quot;Kernel (computer science)&quot;&gt;kernel&lt;/a&gt; were stalled and incomplete.&lt;sup class=&quot;reference&quot; id=&quot;cite_ref-gnu_history_7-0&quot;&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/Linux#cite_note-gnu_history-7&quot; title=&quot;&quot;&gt;[8]&lt;/a&gt;&lt;/sup&gt; Linus Torvalds has said that if the GNU kernel had been available at the time (1991), he would not have decided to write his own.&lt;sup class=&quot;reference&quot; id=&quot;cite_ref-8&quot;&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/Linux#cite_note-8&quot; title=&quot;&quot;&gt;[9]&lt;/a&gt;&lt;/sup&gt;&lt;br /&gt;&lt;a href=&quot;http://www.blogger.com/post-edit.g?blogID=5318459668492336726&amp;amp;postID=8003694502306370286&quot; id=&quot;MINIX&quot; name=&quot;MINIX&quot;&gt;&lt;/a&gt;&lt;br /&gt;&lt;h3&gt;-MINIX&lt;/h3&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/MINIX&quot; title=&quot;MINIX&quot;&gt;MINIX&lt;/a&gt;, a Unix-like system intended for academic use, was released by &lt;a href=&quot;http://en.wikipedia.org/wiki/Andrew_S._Tanenbaum&quot; title=&quot;Andrew S. Tanenbaum&quot;&gt;Andrew S. Tanenbaum&lt;/a&gt; in 1987. While source code for the system was available, modification and redistribution were restricted (that is not the case today). In addition, MINIX&#39;s &lt;a href=&quot;http://en.wikipedia.org/wiki/16-bit&quot; title=&quot;16-bit&quot;&gt;16-bit&lt;/a&gt; design was not well adapted to the &lt;a href=&quot;http://en.wikipedia.org/wiki/32-bit&quot; title=&quot;32-bit&quot;&gt;32-bit&lt;/a&gt; design of the increasingly cheap and popular &lt;a class=&quot;mw-redirect&quot; href=&quot;http://en.wikipedia.org/wiki/Intel_386&quot; title=&quot;Intel 386&quot;&gt;Intel 386&lt;/a&gt; architecture for personal computers.&lt;br /&gt;In 1991 while attending the &lt;a href=&quot;http://en.wikipedia.org/wiki/University_of_Helsinki&quot; title=&quot;University of Helsinki&quot;&gt;University of Helsinki&lt;/a&gt;, Torvalds began to work on a non-commercial replacement for MINIX &lt;sup class=&quot;reference&quot; id=&quot;cite_ref-9&quot;&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/Linux#cite_note-9&quot; title=&quot;&quot;&gt;[10]&lt;/a&gt;&lt;/sup&gt; which would eventually become the &lt;a href=&quot;http://en.wikipedia.org/wiki/Linux_kernel&quot; title=&quot;Linux kernel&quot;&gt;Linux kernel&lt;/a&gt;. In 1992, Tanenbaum posted an article on &lt;a href=&quot;http://en.wikipedia.org/wiki/Usenet&quot; title=&quot;Usenet&quot;&gt;Usenet&lt;/a&gt; claiming Linux was obsolete. In the article, he criticized the operating system as being &lt;a href=&quot;http://en.wikipedia.org/wiki/Monolithic_kernel&quot; title=&quot;Monolithic kernel&quot;&gt;monolithic&lt;/a&gt; in design and being tied closely to the x86 architecture and thus not portable, as he described &quot;a fundamental error.&quot;&lt;sup class=&quot;reference&quot; id=&quot;cite_ref-deb_10-0&quot;&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/Linux#cite_note-deb-10&quot; title=&quot;&quot;&gt;[11]&lt;/a&gt;&lt;/sup&gt; Tanenbaum suggested that those who wanted a modern operating system should look into one based on the &lt;a href=&quot;http://en.wikipedia.org/wiki/Microkernel&quot; title=&quot;Microkernel&quot;&gt;microkernel&lt;/a&gt; model. The posting elicited the response of Torvalds, which resulted in a well known debate over the microkernel and monolithic kernel designs.&lt;sup class=&quot;reference&quot; id=&quot;cite_ref-deb_10-1&quot;&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/Linux#cite_note-deb-10&quot; title=&quot;&quot;&gt;[11]&lt;/a&gt;&lt;/sup&gt;&lt;br /&gt;Linux was dependent on the MINIX &lt;a href=&quot;http://en.wikipedia.org/wiki/User_space&quot; title=&quot;User space&quot;&gt;user space&lt;/a&gt; at first. With code from the GNU system freely available, it was advantageous if this could be used with the fledgling OS. Code licensed under the GNU GPL can be used in other projects, so long as they also are released under the same or a compatible license. In order to make the Linux kernel compatible with the components from the GNU Project, Torvalds initiated a switch from his original license (which prohibited commercial redistribution) to the GNU GPL.&lt;sup class=&quot;reference&quot; id=&quot;cite_ref-11&quot;&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/Linux#cite_note-11&quot; title=&quot;&quot;&gt;[12]&lt;/a&gt;&lt;/sup&gt; Developers worked to integrate GNU components with Linux to make a fully functional and free operating system.&lt;sup class=&quot;reference&quot; id=&quot;cite_ref-gnu_history_7-1&quot;&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/Linux#cite_note-gnu_history-7&quot; title=&quot;&quot;&gt;[8]&lt;/a&gt;&lt;/sup&gt;&lt;br /&gt;&lt;a href=&quot;http://www.blogger.com/post-edit.g?blogID=5318459668492336726&amp;amp;postID=8003694502306370286&quot; id=&quot;Commercial_and_popular_uptake&quot; name=&quot;Commercial_and_popular_uptake&quot;&gt;&lt;/a&gt;&lt;br /&gt;&lt;h3&gt;-Commercial and popular uptake&lt;/h3&gt;Today Linux distributions are used in numerous domains, from &lt;a href=&quot;http://en.wikipedia.org/wiki/Embedded_system&quot; title=&quot;Embedded system&quot;&gt;embedded systems&lt;/a&gt; to &lt;a href=&quot;http://en.wikipedia.org/wiki/Supercomputer&quot; title=&quot;Supercomputer&quot;&gt;supercomputers&lt;/a&gt;,&lt;sup class=&quot;reference&quot; id=&quot;cite_ref-12&quot;&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/Linux#cite_note-12&quot; title=&quot;&quot;&gt;[13]&lt;/a&gt;&lt;/sup&gt;&lt;sup class=&quot;reference&quot; id=&quot;cite_ref-13&quot;&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/Linux#cite_note-13&quot; title=&quot;&quot;&gt;[14]&lt;/a&gt;&lt;/sup&gt; and have secured a place in &lt;a href=&quot;http://en.wikipedia.org/wiki/Server_%28computing%29&quot; title=&quot;Server (computing)&quot;&gt;server&lt;/a&gt; installations with the popular &lt;a href=&quot;http://en.wikipedia.org/wiki/LAMP_%28software_bundle%29&quot; title=&quot;LAMP (software bundle)&quot;&gt;LAMP&lt;/a&gt; application stack.&lt;sup class=&quot;reference&quot; id=&quot;cite_ref-14&quot;&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/Linux#cite_note-14&quot; title=&quot;&quot;&gt;[15]&lt;/a&gt;&lt;/sup&gt; Use of Linux distributions in home and enterprise desktops has been rapidly expanding and now claims a significant share of the desktop market.&lt;sup class=&quot;reference&quot; id=&quot;cite_ref-15&quot;&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/Linux#cite_note-15&quot; title=&quot;&quot;&gt;[16]&lt;/a&gt;&lt;/sup&gt;&lt;sup class=&quot;reference&quot; id=&quot;cite_ref-16&quot;&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/Linux#cite_note-16&quot; title=&quot;&quot;&gt;[17]&lt;/a&gt;&lt;/sup&gt;&lt;sup class=&quot;reference&quot; id=&quot;cite_ref-17&quot;&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/Linux#cite_note-17&quot; title=&quot;&quot;&gt;[18]&lt;/a&gt;&lt;/sup&gt;&lt;sup class=&quot;reference&quot; id=&quot;cite_ref-18&quot;&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/Linux#cite_note-18&quot; title=&quot;&quot;&gt;[19]&lt;/a&gt;&lt;/sup&gt;&lt;sup class=&quot;reference&quot; id=&quot;cite_ref-19&quot;&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/Linux#cite_note-19&quot; title=&quot;&quot;&gt;[20]&lt;/a&gt;&lt;/sup&gt;&lt;sup class=&quot;reference&quot; id=&quot;cite_ref-20&quot;&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/Linux#cite_note-20&quot; title=&quot;&quot;&gt;[21]&lt;/a&gt;&lt;/sup&gt;&lt;sup class=&quot;reference&quot; id=&quot;cite_ref-21&quot;&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/Linux#cite_note-21&quot; title=&quot;&quot;&gt;[22]&lt;/a&gt;&lt;/sup&gt;&lt;br /&gt;Linux distributions have also become popular with the newly founded &lt;a href=&quot;http://en.wikipedia.org/wiki/Netbook&quot; title=&quot;Netbook&quot;&gt;netbook&lt;/a&gt; market, with many devices such as the &lt;a class=&quot;mw-redirect&quot; href=&quot;http://en.wikipedia.org/wiki/Eee_pc&quot; title=&quot;Eee pc&quot;&gt;ASUS Eee PC&lt;/a&gt; and &lt;a href=&quot;http://en.wikipedia.org/wiki/Aspire_One&quot; title=&quot;Aspire One&quot;&gt;Acer Aspire One&lt;/a&gt; shipping with customized Linux distributions pre-installed.&lt;br /&gt;&lt;a href=&quot;http://www.blogger.com/post-edit.g?blogID=5318459668492336726&amp;amp;postID=8003694502306370286&quot; id=&quot;Current_development&quot; name=&quot;Current_development&quot;&gt;&lt;/a&gt;&lt;br /&gt;&lt;h3&gt;-Current development&lt;/h3&gt;Torvalds continues to direct the development of the kernel. Stallman heads the Free Software Foundation, which in turn supports the GNU components. Finally, individuals and corporations develop third-party non-GNU components. These third-party components comprise a vast body of work and may include both kernel modules and user applications and libraries. Linux vendors and communities combine and distribute the kernel, GNU components, and non-GNU components, with additional package management software in the form of &lt;a href=&quot;http://en.wikipedia.org/wiki/Linux_distribution&quot; title=&quot;Linux distribution&quot;&gt;Linux distributions&lt;/a&gt;.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;For complete article can be found at Wikipedia</content><link rel='replies' type='application/atom+xml' href='http://uncle-jack76.blogspot.com/feeds/8003694502306370286/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://uncle-jack76.blogspot.com/2009/01/linux.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5318459668492336726/posts/default/8003694502306370286'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5318459668492336726/posts/default/8003694502306370286'/><link rel='alternate' type='text/html' href='http://uncle-jack76.blogspot.com/2009/01/linux.html' title='LINUX'/><author><name>Uncle Jack</name><uri>http://www.blogger.com/profile/02111713531394122319</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjp0p5ig5lmwAWjB0E6ptlhGwBoW2kcH-yQkK7D6MR_E0ycrdWpHuah7ViUIgp70r0ggdqQ4TyRfJ1QeWrk810-JYl6nkK-qc_vB6Q-5BfkZvJb5uWuoWqFfvEilvywwis/s220/100x100px.jpg'/></author><thr:total>0</thr:total></entry></feed>