9 Basic Features You Should Consider Before Buying Your Next Laptop

Written by Ed Cordova


Continued from page 1

6. RAM, or Random Access Memory: This isrepparttar Short Term Memory of you computer. How much does a laptop need? The simple answer is about 32 megabytes, or MB, of RAM, but 64 is highly recommended. This is due torepparttar 147745 fact that laptops are difficult to upgrade. Because of this, you might as well get more then you’ll currently need, and look ahead.

7. The "brain" otherwise known asrepparttar 147746 CPU: The Central Processing Unit contains allrepparttar 147747 programs run on a computer. At least 233 MHz in processing speed for a laptop is suggested. There are many types of CPU's but just make surerepparttar 147748 laptop you choose has one.

8. Modems: The modem allows you to accessrepparttar 147749 Internet. This is important ifrepparttar 147750 laptop will be used to surfrepparttar 147751 Web, and send email. There are two primary types of modems used with laptops. There’srepparttar 147752 Internal modem, andrepparttar 147753 PC card-based modem. Internal modems are easier to hook up, and they’re becoming more and more common. PC card-based modems stick out of a computer. Their advantage is that they can be replaced if upgrades to a faster one are needed.

9. Ports: Ports are whererepparttar 147754 peripherals are applied, such as microphones, cameras, and extra memory. What type of ports do most laptops have? Currently, all laptops feature a serial, a parallel, an infrared, and a universal serial bus (USB) port. The reason why there’re so many different types of ports is becauserepparttar 147755 peripheral equipment corresponds with different types of ports.

That's it. Those arerepparttar 147756 9 basics that you should consider when purchasing your next laptop. Utilizingrepparttar 147757 above information, you’ll be able to makerepparttar 147758 most informed decisions when acquiring a laptop with suitable features that meet all your needs.

Ed Cordova is a computer enthusiast whose passion for computers, be they desktops, or laptops, has lead him to create About Computers.


Wireless Network Security

Written by Lawrence Andrews


Continued from page 1

Block anonymous Internet requests or pings.

On each computer having wireless network card, network connection properties should be configured to allow connection to Access Point Networks Only. Computer to Computer (peer to peer) Connection should not be allowed.

Enable MAC filtering. Deny association to wireless network for unspecified MAC addresses. Mac or Physical addresses are available through your computer device network connection setup and they are physically written on network cards. When adding new wireless cards / computer torepparttar network, their MAC addresses should be registered withrepparttar 147700 router /access point.

Network router should have firewall features enabled and demilitarized zone (DMZ) feature disabled.

You can test your hardware and personal firewalls using Shields Up test available at http://www.grc.com

All computers should have a properly configured personal firewall in addition to a hardware firewall.

Update router/access point firmware when new versions become available.

Locate router/access point away from strangers so they cannot resetrepparttar 147701 router/access point to default settings.

Locate router/access point inrepparttar 147702 middle ofrepparttar 147703 building rather than near windows to limit signal coverage outsiderepparttar 147704 building.

While none ofrepparttar 147705 measure suggested above provides full protection as counter measures exist, a collection of suggested measures will act as a deterrent against attacker when other insecure networks represent easier targets.

The author of this article ia a software developer, consultant and author of numerous books. Visit his site for more infomation about the Top Spyware Removal Software.


    <Back to Page 1
 
ImproveHomeLife.com © 2005
Terms of Use