Pages

Your Ad Here

Introduction to New Acer Touch

Introducing to new product from acer….. the acer touch. You can Command your digital lifestyle by just touching the screen,user can control  screen and use applications in ways you never dreamed possible.
Acer touch come in two type  of computer
First is All-in-One PC or Consumer Desktops PC
It come with model Aspire® Z5600 it is features next-generation touch-screen* technology and no-compromise performance in a space-saving all-in-one PC design. Experience the satisfaction of finer, more intuitive control of your social network and favorite entertainment.
                                              
The second one is Touch screen notebook
It come with model  Aspire® 5738
This model family is your ticket to high-def cinematic fun and powerful mobile performance. Riveting action and realistic audio give you a theater-like experience. Complementing the brilliant performance is the dazzling glow of the Acer® Gemstone notebook design, sure to capture attention wherever you go. The Aspire 5738PG with a multi-touch screen offers multimedia control with fingertip precision to keep you in touch with your media, your web, your life. The drag-and-drop function lets you easily listen to your favorite music, play a photo slideshow or enjoy the latest videos. The Aspire 5738DG with the TriDef 3D screen is a 3D notebook that will take your breath away. Put on the sporty and stylish 3D polarized glasses that come with the notebook and you’re ready for a visual feast. Play games, watch movies and view photos—all in 3D.
 
 

What is Computer forensics(Cont)

Computer forensics is a branch of forensic science pertaining to legal evidence found in computers and digital storage media. Computer forensics is also known as digital forensics.

The goal of computer forensics is to explain the current state of a digital artifact. The term digital artifact can include a computer system, a storage medium (such as a hard disk or CD-ROM), an electronic document (e.g. an email message or JPEG image) or even a sequence of packets moving over a computer network. The explanation can be as straightforward as "what information is here?" and as detailed as "what is the sequence of events responsible for the present situation?"

The field of computer forensics also has sub branches within it such as firewall forensics, network forensics, database forensics and mobile device forensics.

There are many reasons to employ the techniques of computer forensics:

  • In legal cases, computer forensic techniques are frequently used to analyze computer systems belonging to defendants (in criminal cases) or litigants (in civil cases).
  • To recover data in the event of a hardware or software failure.
  • To analyze a computer system after a break-in, for example, to determine how the attacker gained access and what the attacker did.
  • To gather evidence against an employee that an organization wishes to terminate.
  • To gain information about how computer systems work for the purpose of debugging, performance optimization, or reverse-engineering.

Special measures should be taken when conducting a forensic investigation if it is desired for the results to be used in a court of law. One of the most important measures is to assure that the evidence has been accurately collected and that there is a clear chain of custody from the scene of the crime to the investigator---and ultimately to the court. In order to comply with the need to maintain the integrity of digital evidence, British examiners comply with the Association of Chief Police Officers (A.C.P.O.) guidelines. These are made up of four principles as follows:-

  1.  No action taken by law enforcement agencies or their agents should change data held on a computer or storage media which may subsequently be relied upon in court.
  2. In exceptional circumstances, where a person finds it necessary to access original data held on a computer or on storage media, that person must be competent to do so and be able to give evidence explaining the relevance and the implications of their actions.
  3. An audit trail or other record of all processes applied to computer based electronic evidence should be created and preserved. An independent third party should be able to examine those processes and achieve the same result.
  4. The person in charge of the investigation (the case officer) has overall responsibility for ensuring that the law and these principles are adhered to.

How to monitor your voltages, fan speeds and temperatures in computers


something interest here.  i have try using SpeedFan software.It  is a program that monitors voltages, fan speeds and temperatures in computers with hardware monitor chips. SpeedFan can even access S.M.A.R.T. info and show hard disk temperatures.
SpeedFan supports SCSI disks too. SpeedFan can even change the FSB on some hardware (but this should be considered a bonus feature).
SpeedFan can access digital temperature sensors and can change fan speeds accordingly, thus reducing noise.
SpeedFan can find almost any hardware monitor chip connected to the 2-wire SMBus (System Management Bus (trademark belonging to SMIF, Inc.), a subset of the I2C protocol) and works fine with Windows 9x, ME, NT, 2000, 2003, XP and Windows Vista. It works with Windows 64 bit too.
SpeedFan can handle:
  • almost any number of South Bridges
  • almost any number of hardware monitor chips
  • almost any number of hard disks
  • almost any number of temperature readings
  • almost any number of voltage readings
  • almost any number of fan speed readings
  • almost any number of PWMs

try it. just go to this filehippo to download or just go to official website


MORE IMPORTANT THING IS IT IS FREEWARE!!!

How to Install Flash Player for firefox on Ubuntu

Here is a tips on how to install Flash Player for Firefox web browser under Ubuntu Linux

First, close all running Firefox.
Open the terminal (shell prompt)

Install Flash Player For Ubuntu Linux

Type the following command to install flash player:

$ sudo apt-get install flashplugin-nonfree


Now flash player should be working. Visit youtube or any other site to view flash content.
Your Ad Here