Categories
PC Guides

Few Major Advantages And Disadvantages With 64 Bit Computers

In our earlier article we have talked on the differences between 32 bit and 64 bit computers. If you have missed it you can go back and check it out from here.

Are in any doubt about which architecture your computer is running on? Open Control Panel and then click on System and Security. You can find a list most commonly starting with the Action Center (particularly in Win 8). Among them will be the System option, where you can get information about your computer, from RAM to processor speed.

On going through the differences between a 32-bit and 64-bit computers you must have understood how better a system running on 64-bit OS is better than a 32 bit OS system. But, that’s not the end of the discussion. The 64 bit OS has its share of drawbacks as well, though comparatively lower than the 32 bit OS. In this article we help you recollect several advantages without leaving out their negative shade.

Advantages of 64 bit Computers

More RAM More Speed:

The best thing about the 64 bit architecture is that you can rock more RAM, crossing the limited 4GB of RAM in 32 bit computers. At present the maximum sized RAM module available in the market can work with your 64 bit computer.

Also Read: How to increase the speed of your computer

Theoretically, the 64 bit architecture can hold a little over a mammoth 17 billion GB of RAM. But due to licensing issues modern day Windows Computers can hold a maximum of only 192 GB of RAM.

The Efficiency Skies High As Well:

Its not just the RAM thing, but the overall efficiency of all the processes only gets better. Have just updated your computer to the 64 bit architecture? Then great! there’s no better time to feel how better computing experience the 64 bit architecture gives.

This is particularly because of the 64 bit addressing scheme. Here entire RAM is used and  burden on system memory eases off. Hence only doubling your RAM will make you feel way more than just that, and its’ all because of the efficiency factor.

The Advanced Security Is The Killer Deal:

If the ability to rock more RAM or the heightened system efficiency wont turn you on, this might just do it. Yeah, your 64 bit processor protects you much better than the 32 bit. This is the main reason why more systems running on 32 bit are affected than the 64 bit ones.

The additional security features simply pays off. The hardware D.E.P and the Kernel Patch Protection protect the boot sector, which has become the more targeted zone in computers these days. Also the acceptance of only the digitally signed device drivers means that almost 0% driver-related infections can be achieved, which by the way is the biggest bonus.

Also Read: Increase the security of your computer using facial recognition

64 Bit Computers – Those Little Downsides

It does look amazing, isn’t it? But this is not it yet! The 64 bit architecture carries with it few disadvantages as well.

Finding Device Drivers Is A Pain:

We talked about the additional security benefits earlier isn’t it? Then here’s the drawback of this. Suppose if you have some device which you have purchased some years ago and want to use it now in your 64 bit computers, you have got a real problem mate. This is because finding the device drivers isn’t easy.

If it is just a small device, you bought around 2005 or something, its better you purchase something new. If at all the device is a really big hardware you wouldn’t want to throw away, unfortunately you have got no options left but to move onto a newer one.

This being the main bottleneck, there are several others similar. There are chances your motherboard, although supports a 64 bit processor, wouldn’t allow more than 4GBs of RAM. Sometimes the problem could be from the software. The 64 bit architecture doesn’t support software based on the earlier architectural schemes. Then all you can do is find an upgrade for that software or consider using something else, its not so good to say so, but there’s just no option left for you.  

Also Read: What to do if your computer is running really slow

Categories
PC Guides Security Web Guides

Cyber Security – A Growing Concern With Technological Developments

With the curtains drawing down on 2014, we enter into 2015 with advancements in many fields. But one such negative aspect which kept growing is the threat to cyber security. Shockingly, many of those who are currently using computers aren’t even aware about this term.

But the situation is now alarming. Simply, if you don’t take steps to keep your computer safe your computer and you can be subject to fraudulent activity on the Internet. All these activities relate to cases in which hackers, enter computers through trickery and then use it for malicious purposes. It can happen anytime and to anyone on a computer without protection.

Cyber Security - A Growing Concern With Technology Developments

Chances are that you may receive a deceptive e-mail stating about an “urgent matter” concerning your Facebook account or Google account. They could even be looking for personal information present in your computer (say credit card numbers or login information, private accounts) which they can use to gain monetary benefits or for simply exploiting your registered services.

Not just these, but they may get after your computer resources like your Internet connection, to increase bandwidth and infect other computers. Because the mantra is, the larger the number of computers behind which a hacker hides, the tougher is to find him. Thus, hiding their true location on the web means that initiating attacks without getting caught is a lot easier.

Anyways, there are many different threats to the security of your computer because there are many different ways a hacker can steal your information or infect your computer. Once entered the computer, the threat usually shows very few symptoms so they can survive undetected for a longer period, during which they strengthen themselves, spreading to different locations within the computer.

We have compiled a list of the different types of threats along with some recommended steps you can take to reduce these threats, using information from Symantec, a world leader in software contravention that helps customers protect their information, infrastructure and interactions.

Computer Threat # 1: [Vulnerabilities]

Vulnerabilities are simply the weaknesses which are developed in your computer mostly due to software. Any software, if not designed perfectly often contains some loopholes that are nothing but weaknesses to the overall security system of your computer. The other way round, vulnerabilities may also result due to inadequate computer settings.

Once a hacker happens to know of such vulnerabilities that are within your computer, he then plans and exploits your computer through these loopholes causing severe damage. Here, if the vulnerabilities are a resultant of faulty software design, companies announce vulnerabilities once they get to know of them and work towards speedy recovery of such bad sectors using patches or software upgrades.

Learn About The Various Vulnerabilities In Wi-Fi Networks here.

Computer Threat # 2: [Spyware]

Spyware is the malicious content downloaded from web pages, e-mail messages, and instant messaging applications mostly without the consent of the user. Most spyware often remains calm and tries to go unnoticed in the first few weeks, thus, hiding whatever it does in the computer from the user.

Spyware is mostly used by companies and other websites to track user behavior on the internet. The information of whether you are more of a sports loving person or online shopping person can be identified based on the sums of data collected by these spyware.

Learn A Lot More About Spyware here.

Computer Threat # 3: [Spam]

In a nutshell, spam is the e-version of junk mail. Spamming from a particular computer means sending unwanted messages, that too repeatedly, to a large number of recipients. Spamming can seriously be considered as a security threat.

This is because through spamming e-mails containing trojans, viruses or spyware can be distributed over large group of computers and thus there is sensitive personal information at stake.

Also See: How To Detect Scams, Phishing, Bots, Spams.

Computer Threat # 4: [Malware]

Malware is the combination of all viruses and trojans. Simply anything malicious on your computer can be termed as a malware (i.e. malicious + software = malware).

Destructive malware uses popular communication tools to spread, including worms sent through e-mails and instant messages, trojans entering through web pages and downloaded, infected direct connections between users. The malware will seek to exploit the vulnerabilities by entering in a quiet and simple way.

Learn More About What is Malware and How To Detect Malware –here

Computer Threat # 5: [Phishing]

Phishing is essentially an online fraud, and phishers are nothing more than technological scammers. They use spam, phishing web pages, emails and instant messages to target people. Then may then try to make people disclose sensitive information such as bank account information, credit card, or access to personal accounts.

 

Here’s How To Stay Protected:

• Keep updated software patches and security.

• Configure the security settings of the operating system, browser and security software.

• Installing a security solution such as AVG Internet Security to block threats that primarily focus on vulnerabilities.

• Do not accept or open dialogs suspected to contain errors within the browser.

• Spyware may enter your computer as part of a “free offer” – do not accept free deals.

• Always read carefully the ‘End User License Agreement’ when installing. Install and then be quick to cancel if any other “programs” than what you want are being installed as a part of the desired program.

• Scan your hard drive / memory for viruses regularly. It is much better if you have scheduled a scan at regular intervals.

• Anti-spyware programs like Ad Aware and / or SpybotSD can really help you in preventing any spyware intrusions. So, start using one.

 

Categories
PC Guides Security Web Guides

Here’s What You Missed About The Virtual Private Network (VPN)

Networking is surely a best form of information transfer among the connected devices, that too, without compromising security. When it comes to big businesses, with growth, they may have to spread beyond one roof into several branches. So a good networking model means that, such growth should not hamper the information transfer between the organization and employees. To facilitate this expansion, the latest technology being employed is the Virtual Private Network (VPN).

 341_adsl

What is a Virtual Private Network (VPN)?

A Virtual Private Network is a popular technology which uses a public network, like internet to connect between private networks. The private network of a business is accessed by the people working in that organization, using the internet, but through a secured connection. Though it’s on the internet, for everyone else it is encrypted data which almost makes no sense.

Before the adoption of the Virtual Private Network (VPN) technology, the interconnection between branch offices was done with leased lines. As the name suggests, these lines are leased by a telecommunication company to businesses, and the entire business forms one single WAN. With these leased lines, security wasn’t the issue but something else was; scalability and cost. For a business to spread to some new geographical location, the entire hardware was to be updated and improved to extend this WAN, a little further. This only means more money just for data sharing and it gets much more with further increase.

Anyways, thanks to the Internet, modern day businesses don’t have to go through all that. This migration from leased lines, led to the transformation to the Virtual Private Network technology.

 

Understanding VPN in Detail

For people who are new to networking and stuff, everything discussed till now must have been like Greek and Latin. Don’t worry at times we struggle too to get stuff into our minds. So, here’s breaking It up for you.

Consider you are on island with lots of islands around you, but nothing too close to walk. Now imagine there are a small boat and a submarine by the shore. Now, if you choose to travel from an island A to B through the boat, you are visible to everyone. Your identity is out there in the open and people can even see what you’re wearing, if you are wearing a hat or not and all of it.

If you chose to travel in a submarine, anyway you will reach the destination, plus without being identified. All this is just to create a better understanding about how a VPN actually works. Here, Internet is the ocean, the boat is any normal browsing session and the submarine is a secured route.

Just to show you the link between the considered example and the real world scenario, we take a step further and list the advantages the VPN carries with it.

  • Security
  • Scalability
  • Reliability

In either cases, i.e in our island example and the VPN technology, these attributes are all there. Both are very secure, can easily switch between islands, and certainly reliable.

Categories
Security Tech News

Everything About The Facial Recognition Systems You Need To Know

Facial Recognition, as soon as you come across this word your mind starts visualizing some security system scanning a face and identifying him/her but that’s limited to the movies. The real world scenario is a little different than that. With time and technology, facial recognition has now been on a high more than ever. Like most of us think, it isn’t only used for security purposes, nowadays; it has spread to variety of applications as well.

 

In this article you’ll get to know a lot about facial recognition systems, the different classes of facial recognition software. First let’s take a look at each of them separately:

 

Most of the current facial recognition systems work completely based on nodal points. These software marks the human face with 80 nodal points each measuring some variable (say width of nose, distance between eyes, cheek bone shape and so on). This data from each nodal point is stored as a faceprint within the database. Many of such faceprints are analyzed with the data from faces in an image or video keenly looking for nodal point matches.

 

However, this facial recognition system suffers from few major drawbacks. This is because basically these systems are not so good in identifying faces like humans can, when the conditions aren’t favorable (say lighting conditions etc.), they may well do below par than an average human can. What can be said is that the level of accuracy these systems exhibit isn’t up to the mark. In other words, these systems are less reliable.

 

Obviously, a better facial recognition system was needed and researchers could just provide that with the emerging 3D model facial recognition system. This method makes use of the 3D sensors to capture information about the facial features and structures. This 3D facial recognition system means that more distinctive features can be identified and stored. One of the other notable advantages is that we no longer have to bother about the lighting conditions or identification from a variety of angles.

 

Parallel to this 3D modeling facial recognition system, there is another which is primarily based on the visual details of the skin (say, skin tone or skin texture). This is a higher level of mathematical application where the patterns, spots and lines of person’s skin are arranged in the mathematical space and there you go, the computer does the rest.

 

Well all that said, facial recognition systems are more advantageous when employed for facial authentication than for identification. This is simply because, its too easy to trick computers using masks or disguises etc.

Also See: How To Improve Your Systems Security With Facial Recognition

Categories
PC Guides Tech News Technologies Web Guides

These Online Programming Competitions Are The Best

Internet in more than one ways has fast become the best tool for all class of people. Today, the web is a collection of almost everything; Entertainment, News, Study Resources you name it and it’s there online. This situation has almost developed a win-win situation for both companies and the masses.

Companies have already started taking advantage of online competitions to pick out the best among the crowd. There actually are a lot of websites these days where you can compete with pioneers in different fields, given you are eligible. This article highlights the best online programming competitions across the internet. So, if you are a programmer here’s where you get to check how good a programmer you are.

These Online Programming Competitions Are The Best

The Best Programming Competitions

 

  • ACM ICPC

The ACM International Collegiate Programming Contest (ICPC) is the most prestigious programming competition for college students, sponsored by IBM. After years from when it actually started, the ICPC has developed into the best contest that helps programmers showcase their potential in computer science.

It is known as one of the toughest programming contests on earth. You can check out a lot more information on this contest in its official website:

http://icpc.baylor.edu/

Initially you start in the regional level and once you clear them, you get to participate in world finals held in different continents each year.

 

  • Top Coder

Top Coder is another such competitions which tests your mettle to the core. Considered to be a most sought out programming competition, Top Coder is one of the largest communities in itself. All the members of these communities work on industry related problems and win cash prizes and fame. There are a variety of fields you can compete in Top Coder, and win cool gift hampers and cash prizes.

The best and somewhat unique part about Top Coder is their rating system. Its members are constantly rated based on their success and the one best rated programmer is awarded as the best coder over time. So, simply with Top Coder the more you compete, the better placed you will be.

Check out more about Top Coder on its official website:

http://www.topcoder.com/

 

  • Google Code Jam

Of the many contests Google conducts every now and then, Google Code Jam is one prominent programming competition among them. It is a multi round competition and is open for all internationally. Google uses this competition to filter the most talented programmers and place them within its organization.

This competition is time based and the participants are expected to solve algorithmic puzzles and problems. Anyways, participants can use any programming languages, text editors and development software for their solutions. Most part of the competition is online but the finals is an onsite event, similar to the ACM ICPC.

The official website of this programming competition is:

https://code.google.com/codejam/

 

  • Microsoft Imagine Cup

Microsoft is not far beyond Google in picking out its employees through an international competition. This competition brings together programming minds from all corners of the world to find solutions for the toughest of problems. This competition is further divided based on fields and Software Design is one of the five major technology competitions.

This competition is a once-per-year event, while there are also monthly challenges, where participants are to write a given snippet of code using as less lines as possible.

Find out more about this competition on the official website:

http:// www.imaginecup.com/

Categories
PC Guides

Here’s About That Big Bead On Your Laptop Charger Cable

Believe it or not, you are surrounded with a whole lot of electromagnetic waves. Your Mobile Phone, Internet Data Card for that matter, every wireless device within your proximity, communicates through these waves. These are one set of waves, but they aren’t all.

You must have seen a lot of wires in and out of your computer. Most of us certainly know what each wire is meant for, but there’s something we have been missing out. It isn’t because it is invisible or something like the earlier mentioned set of energy waves, but let’s not brood over it. This is article will help you step forward in unraveling the mystery of the black bead present on your laptop charger cable. Yes, it isn’t only limited to your laptop chargers, but also the display connectors, and on other peripheral connectors have these on them.

 

Here’s About That Big Bead On Your Laptop Charger Cable
`

What Is This Bead?

This bead or lump is called a ferrite bead, or simply, a choke. This is the technical name for a electromagnetic wave bouncer. But now, why do you think a electromagnetic wave bouncer is of any use in these cables?

The answer lies in the basic principles of the current flow through a conducting wire. As current flows along a wire, there is an induced field perpendicular to the direction of the current flow. This is electromagnetic interference (EMI) and almost every electronic device during its operation produces EMI.

For example, when you connect a mobile phone to your computer, there is some disturbance observed on the monitor in the absence of the ferrite bead. This could appear smooth, but on the long run could completely damage both your mobile phone and PC. Due to this very reason, there always is a special unit in all electronic manufacturing companies which monitors EMI produced from different devices. If at all this EMI exceeds a certain limitation, there is notable degradation of performance of gadgets and it could also lead to medical complications.

 

What’s Inside That Bead?

If you’re thinking about any complicated circuitry which could decrease the EMI being produced, you are wrong. There’s simply nothing in this choke.  When cut open, this bead consists of a cylindrical ferrite rod, magnetic in nature. The magnetic nature of this ferrite rod is what absorbs all the EMI and dampens these waves from interfering with the other devices.

 

This black bead is generally located closer to the EMI source hence in laptop charger cables, it is located close to the end of cable. So, in a nutshell the bead at the end of your laptop charger is simply a EMI blocker which protects devices from getting damaged due to the EMI. That’s it.

Categories
Tech News Web Guides

Beamforming: This Simplest Approach Makes Your Wi-Fi Connection Faster

The Netgear R6300 AC1750 dual band gigabit 802.11ac router after one and half years from its launch, is now equipped with the latest firmware update (v1.0.2.68). This latest update means that this model (and the R6200, R6250 models) will now have improved wireless performance and a wider coverage area. Based on the Beamforming Technology, this update is capable of providing a 60% improved performance at a distance of 50feet (As per Netgear’s tests).

Beamforming: This Simplest Approach Makes Your Wi-Fi Much Faster

What Is Beamforming Technology?

Beamforming, is one of the most simplest approach where in which the router instead of broadcasting signals in all directions, does it in one specific direction. This means that there will no longer be any broadcasting hoping it would reach the target, but instead there will only be aiming the signal to a specific targeted device. Looks quite simple isn’t it?

Actually in the retail point of view it wasn’t. Due to this reason, the market was stuck with routers only capable of broadcasting in all directions, in spite of suffering several disadvantages like the RF interference and dead spots. Anyways, thanks to NETGEAR for already making it a reality. But let’s see how actually this Beamforming Technology could be implemented.

How Beamforming Works?

Firstly, take for instance a bulb which radiates light in all directions equally. And obviously as you move away from the bulb the intensity keeps on decreasing where at a point there is no light at all. This is the case every other router which doesn’t support Beamforming.

Now consider the light radiated is forced to travel along a particular channel, now a fixed point along the channel there is increased intensity than in the earlier case. This is basically how a device supporting Beamforming is expected to work.

To elaborate, the beamformer (the device that transmits) focuses the entire signal towards a beamformee (a client receiving device) thus enabling less interference thus establishing a stronger, faster and more reliable wireless communication.

What’s NETGEAR Beamforming+ About?

NETGAR has developed a full range of wireless routers and adapters based on the 802.11ac standard which come with the integrated BeamForming Technology. In the earlier routers Beamforming was offered as an optional feature but not much emphasis was given until all benefits surfaced.

This option could only be utilized when both the router and the client device supported beamforming. This anyway isn’t the case with the NEATGEAR Beamforming+ wireless routers, where the client device need not necessarily support Beamforming.

In a nutshell, Beamforming+ refers to the various products of NETGEAR which have implemented the Beamforming Technique; hence obtaining improved Wi-Fi performance across all the Wi-Fi devices specially designed to work in the 5Ghz band.

Netgear isn’t the only manufacturer which is implementing the Beamforming technique. It is now fast becoming a common feature being employed in almost all high-end routers.

Also See: Why your Wi-Fi is not as fast as expected.

Categories
PC Guides

This Is How The Computer Hardware And Software Interact

Although for using your computers you don’t really have to know how the hardware and software interact, but for all those computer enthusiasts, this is surely interesting enough. It is a common fact that there are a lot many differences between the hardware and software. But all these differences play their part in building up the interaction between the hardware and software. In this article we spare you all the technical extravaganza and help you understand how hardware and software interacts in the most plain English.

This Is How The Computer Hardware And Software Interact

Software :

The entire computer software can be broadly categorized into three types: Device Drivers, Operating System, and Application Software. Simply all these types encompass the totality of the programs present in your computer. Generally each and every program has its specific task to perform. For that matter, the entire program is a set of instructions that are written to alter the state of hardware. Before actually getting into how these instructions effect the hardware here’s something you need to understand about computer hardware.

Hardware :

The Monitor, Printer, Hard Drive, RAM, Graphic Card and all the other physical components which are connected to the computer (or) which can be physically touched is the computer hardware. Without hardware, software has no idea where to work on. Hence hardware and software run hand in hand for implementing whatever the user wants.

The Differences And The Interaction between Hardware And Software :

There are a lot many differences between the hardware and software. Including the nature, functionality and the ability to be changed again and again the software and hardware differ from each other in numerous ways. But ultimately they are useless in the absence of the other.

Once you perform programming, using some high-level programming language (eg. C, C# etc) the entire set of code you write is converted into 1s and 0s. This is taken care of by the compiler which converts written code into binary (1s and 0s) once the program follows a defined set of rules or the syntax. These 1s and 0s are simply the voltage levels which establish the control over all the electric circuits.

For example, consider a simple LED bulb connected to a battery supply and a small switch. Whenever this switch is closed the LED glows and once the switch is open the LED gets turned OFF. The bulb glows and gets turned OFF because of the variation in voltage levels in these instances. When the switch is closed the entire supply voltage is across the LED bulb due to which it glows and once the switch is open, the bulb isn’t supplied with the required voltage and hence it doesn’t work. This is how voltage levels control the LED bulb. The physical act of turning ON and OFF by opening and closing the LED bulb can be substituted by any other mechanism. This works fine until this mechanism actually is able to operate as per your requirement.

In case of computers, the entire hardware is supplied varying voltages due to which different components get activated at the same or different time instances and achieve a particular task. Finally all the binary data in a computer is nothing but the voltage level information, for which a particular task is assigned to be executed.

The entire sequence of events that occur for hardware and software interaction is under the control of OS. All the driver software help the OS to actually communicate with the hardware, so as to execute the application software.