Thursday 28 June 2012

What? A virus attack?


Viruses, Trojans and worms… computers too are vulnerable to infection and what’s alarming is it spreads fast. Geeta Padmanabhan on what protective measures can be taken
My system flashed several warnings. Then it locked up, went blank, started randomly, slowed down suddenly. One morning it crashed. Kaboom! Gone!
The mechanic started with a quiz. “Did you see strange error messages? Pop-up alerts about firewalls? Unsavoury pictures on the screen when you booted?” I nodded. He tickled the desktop a bit and announced, “Your system has a virus.” (Just one?) “Some people find new toolbars in the browser, new shortcuts on the desktop they didn't put there, new items in the system tray at the bottom of the screen.” (Note: new toolbars/shortcuts often come bundled with software you actually want; they may not be malicious — just annoying.)

DIFFERENT VIRUSES

 I needed computer wellness lessons. “Virus is a tiny program designed to infect a machine (files in the machine),” said an ethical hacker (EH).  “When the file is opened, it goes into memory, and infects all files opened. When an infected program is opened on another machine it infects all files in that machine also.” And yes, there are different virus types — those that infect only files, those that infect documents, excel files, boot record/partition and those smart hybrid ones which infect all the above. Classification is based on what they infect.
Then there are worms. These usually travel as a single file to infect machines, so the damage isn’t too much. (That’s kind!) The worm tags on to inbuilt communication mechanism (e-mail) to transmit itself using a weakness on a machine or through shares. Sometimes virus and worm marry. This couple is difficult to remove. Trojan (spyware) programs intercept private data — passwords, e-mails, files — it’s a Trojan war!
Most are innocent victims! “Ha, virus is created for fun by youngsters for bragging, to see it spread, it’s a high,” said EH. “Some are professional — to destroy rivals’ computers. Your computer is just a victim in this process.” What armoury do I have to fight it? “Invest in good antivirus software. It’s difficult to detect them manually.” He recommends Fprot and  Avast (avast.com). “You get a one-year home edition free once you register for Avast. Prevent Trojan (keylogger) from doing identity theft with keyscrambler personal edition (www.qfxsoftware.com)  along with antivirus software. This ensures safety of passwords of emails and net-banking.”
 Session II is with Samir Mody, Senior Manager — Threat Control Lab, K7 Computing. “A computer virus does covert actions such as stealing credit card information, sending spam,” he said. “Most computer viruses are developed for financial gain.” Great.

MALWARE AND SPYWARE

What are malware and spyware? “Malware is synonymous with computer virus. It is the superset of spyware which silently steals information like passwords, confidential data.” Watch out for any unusual behaviour — unknown process names, unusual network traffic — on the device, he said.
Giant companies fall victim to hackerazzi. An AP story tells us how international hackers ran an online advertising scam to take control of infected computers around the world. Hackers installed malicious software on the victim computers, which turned off antivirus updates. In an unusual move, FBI is encouraging users to visit http://www.dcwg.org   (till July 9) to check and fix the problem. According to a Russian anti-virus firm, more than half a million Apple computers have been infected with Flashback Trojan. It sent a unique ID to the intruder's control server to identify the infected machine. The criminals could then control the machine. Apple released its own “security update”.
F-Secure also posted instructions on how to confirm if a machine is infected and how to remove the Trojan. Apple isn’t safe?  “Anti-virus software, including K7 security products, will detect and clean up the infection automatically and without fuss,” Samir consoled. “This is not a plumbing, so don’t call local fix-it men. Maintain up-to-date anti-virus software to prevent malware infection in the first place. Be wary of and discard spam emails or social-networking messages (Facebook, Twitter) from unknown individuals or having dubious content. Refrain from clicking on links or opening attachments within such correspondence.”
 Don’t exchange memory-storage devices. Don’t use memory-storage devices on other computers. Avoid visiting websites of dubious repute. Avoid Internet Explorer as the default browser, Google Chrome and, to a lesser extent, Firefox are currently seen as less vulnerable to malware targeting. Operating systems like Linux (Ubuntu, Mint, etc.), due to their significantly smaller user base, are considered less likely to attract malware.
 My system is back in action. I scream “Virus!”  if it slows down one second.
 DEALING WITH VIRUSES
* On control panel, Security, if you can’t click/launch Windows Update, you probably have a virus.
* Many legitimate parts of Windows have virus-sounding names. Be careful when you do CTRL-ALT-DEL.
* Use multiple programs with multiple and varied virus definitions for better diagnosis.
* When you scan for viruses, be sure to turn off or disable any other security software. These programs can interfere with one another.
* Check out Safentrix.com.
* For Asian malware, read http://blog.k7computing.com/2011/11/malwasia-in-operation-since-1986-part-1/part-2/part-3 
Source : http://www.thehindu.com/ 27/06/2012

Special concession/facilities to Central Government Employees working in Kashmir Valley in attached/subordinate offices or PSUs falling under the control of Central Government.


F.No.18016/3/2011-Estt.(L)
Government of India
Ministry of Personnel, P.G. & Pensions
(Department of Personnel and Training)
New Delhi, the 27th June, 2012.
OFFICE MEMORANDUM
Subject : Special concession/facilities to Central Government Employees working in Kashmir Valley in attached / subordinate offices or PSUs falling under the control of Central Government.

The undersigned is directed to refer to this to this Department’s O.M. No.18016/3/2012-Estt.(L) dated 27th January, 2011 on the subject mentioned above and to state that it has been decided to extend the package of concession/incentives to Central Government employees working in Kashmir Valley for a further period of one year w.e.f.01.01.2012 upto 31.12.2012. The revised package of incentives is as per annexure.
2. The package of incentives is uniformly applicable to all Ministries/Departments and PSUs under the Government of India and they should ensure strict adherence to the rates prescribed in the package. The concerned Ministry/Department may ensure implementation and monitoring of the package in conformity with the approved package, and therefore, all Court cases in which verdicts are given contrary to the package would have to be contested by the Ministries/Departments concerned.
Encls : As above.
sd/-
(Zoya C.B.)
Under Secretary to the Govt. of India
ANNEXURE to DOPT’s O.M. No 18016/3/2011-Estt.(L) dtd 27th June, 2012.
DETAILS OF PACKAGE OF CONCESSIONS/FACILITIES TO CENTRAL GOVERNMENT EMPLOYEES WORKING IN KASHMIR VALLEY IN
ATTACHED/SUBORDINATE OFFICES OR PSUs FALLING UNDER THE CONTROL OF CENTRAL GOVERNMENT.
[Kashmir Valley comprises of ten districts namely, Anantnag, Baramulla, Budgam, Kupwara, Pulwama, Srinagar, Kulgam, Shopian, Ganderbal and Bandipora]
I. ADDITIONAL H.R.A. AND OTHER CONCESSIONS:
(A) Employees posted to Kashmir Valley:
(i) These employees have an option to move their families to a selected place of their choice in india at Government expense. T.A. for the families allowed as admissible in permanent transfer inclusive of transportation of personal effects, lump-sum payment for packing etc.
(ii) Departmental arrangements for stay, security and transportation to the place of work for employees.
(iii) HRA as for Class ‘Y’ city applicable for employees exercising option at
(1). Such employees will be eligible for drawing the normal HRA as well at their place of posting provided Departmental arrangement is not made for his/her stay.
(iv) The period of temporary duty extended to six months. For period of temporary duty daily allowance at full rate is admissible, apart from departmental arrangements for stay, security and transportation.
(B) Employees posted to Kashmir Valley who do not wish to move their families to a selected place of residence:
A per diem allowance of Rs.l0/- is paid for each day of attendance to compensate for any additional expense in transportation to and from office etc. This will be in addition to the transport allowance, which the employee is otherwise eligible for under Ministry of Finance order No. 2l(2)/2008-E.II(B) dated 29.08.2008.
II. MESSING FACILITIES:
Messing Allowance to be paid to the employees of a uniform rate of Rs. 15/- per day by all Departments, or in lieu messing arrangements to be made by the Departments themselves. This rate of allowance will have to be adhered to uniformly by all the Ministries/Departments with effect from 01.07.1999. The slightly higher rate of Rs.25.50/- adopted by the Department of Telecom and Posts and allowed to be continued as a special case by the Department of Personnel in consultation with the Ministry of Finance, would, however, continue to be paid at the said rate.
III. PAYMENT OF MONTHLY PENSION TO PENSIONERS OF KASHMIR VALLEY:
Pensioners of Kashmir Valley who are unable to draw their monthly pensions through either Public Sector Banks or PAO treasuries from which they were receiving their pensions, would be given Pensions outside the Valley where they have settled, in relaxation of relevant provisions.
NOTE :- 1. The package e of concession/facilities shall be admissible in Kashmir Valley comprising of ten districts namely, Anantnag, Baramulla, Budgam, Kupwara, Pulwama, Srinagar, Kulgam, Shopian, Ganderbal and Bandipora.
2. The package of concessions/facilities shall be admissible to Temporary Status Casual labourersworking in Kashmir Valley in
terms of Para 5(1) of the Causal Labourers (Grant of Temporary Status and Regularization) Scheme of Government of India, 1993.
3. The benefit of additional HRA admissible under the Kashmir Valley package shall be admissible to all Central Government employees posted to Kashmir Valley irrespective of whether they are natives of Kashmir Valley, if they choose to move their families any where in India subject to the conditions governing the grant of these allowances.
4. The facilities of Messing Allowance and Per Diem Allowance shall also be allowed to natives of Kashmir Valley in terms of the Kashmir Valley package.
sd/-
(Zoya C.B)
Under Secretary to the Govt. of India
Source: www.persmin.nic.in
[http://circulars.nic.in/WriteReadData/CircularPortal/D2/D02est/18016_3_2011-Estt-L-27062012.pdf]
Courtesy : http://centralgovernmentemployeesnews.in/

5 Quick Tips to Longer Batter Life



Low Battery
If you own a mobile phone then you’ve probably been in a situation where your mobile phone dies from a lack of battery charge. This can be rather frustrating - especially if you are in a place where you are unable to charge your battery. There are some measures you can take when using your mobile device that can help preserve your battery power.

1) Avoid Keeping the phone in Vibration Mode:


The method of notification for phone calls can use a significant amount of battery power. This is mainly true for when you set your mobile phone to vibrate. Vibrating will use more power than just having the phone ring. An even larger battery drain is when your phone is set to both vibrate and ring. If you are using this setting, go for the ring-only option as it will use less battery power.

2) Avoid enabling multiple apps in the background:


Another serious battery drain is when you are using multiple apps at one time. Maybe times even though you are not using a particular app, you didn’t close it when you finished. Therefore, it is running in the background sucking power from your battery. 

3) Disable Push to Notification Apps:


Many apps issue what are known as push notifications. These messages instantly tell you if you have new messages, tweets, etc. While they might be helpful, they do use a significant amount of your battery’s power. See if you wait and just check your information manually. If so, then turning off push notifications would be a good move towards your goal of battery preservation.

4) Don't Let the Battery Die - Charge Frequently:


In order to make your battery last longer, do not allow it to die between charging. It is best to charge your phone more frequently. By charging it more often for shorter time frames, you are actually increasing the life of the lithium-ion battery used in the phone. Always charge your phone before it dies. 

5) Use of Black Background:


It is recommended that using a black screen on AMOLED screens consumes less battery charge. Using a black theme is highly recommended in that case. Set a black background in the browser settings as well.

Courtesy : satirur.blogspot.in

Saturday 23 June 2012

10 Most Useful Microsoft Word 2010 Tips & Tricks


Microsoft Word 2010 is one of our favorite text editors. With such a big array of features, Microsoft Office Word 2010 can look complicated. There are many hidden tricks and shortcuts that make text editing easier. Here are some tips I think will help you when you are using Microsoft Word 2010.

1. Vertical Selection Of Text
Normally, we select a character, a word, a sentence or a paragraph. All these selections are horizontal selections. Sometimes you may need to select vertically. For example, if your text has numbers in the beginning, you may want to select only the numbers to delete them at one go (see figure).

To select text horizontally, press ALT and click to drag and make a selection. Remember to release ALT key before releasing mouse else it will open the Research dialog. Check out the different uses of vertical selections and let us know what all you did with this feature.
2. Default Line Spacing
The default line spacing in Microsoft Word 2010 is 1.15 against 1 in Microsoft Word 2003. Microsoft changed the line spacing to make your text more readable. If you want the default line spacing as 1, follow this procedure:
1.    While on the Home tab, right click on the Normal quick style button and select Modify
2.    In the Format list that appears, select Paragraph
3.    Under spacing, change the line spacing from 1.15 to 1
4.    Click OK
5.    Check the box against “New documents based on this template”
6.    Click OK

3. Changing The Default Save Location
By default, MS Word opens Documents folder when you press CTRL+S for first time. If you think this is irritating you, you can change the default file location to some other place where you normally store your documents.
1.    Click on File
2.    Click on Options
3.    Click Advanced in the left side of the window that appears
4.    In the right part of the window, scroll down to the button that says “File Locations”
5.    Select Documents and click on Modify
6.    In the Save File dialog box that appears, enter or select the new path and click on OK to close the Save File dialog box.
7.    Click OK to close the window.

4. Change Default Font
The default font for new documents in MS Word 2010 is Calibri. Though the font is good for online viewing, it creates problems when printing. You may be using Times New Roman or Arial for print jobs. One method is to change the font manually each time after you have typed the document. But then, it would involve formatting the document again. Another method is to change the default font.
1.    Right click on the Normal quick style button on Home tab.
2.    Click Modify
3.    In the dialog box that appears, click on Format… to open the drop down menu and select Font
4.    In the Font dialog box, select the font you wish to use with every document.
5.    Make any other changes you wish such as font size etc
6.    Click OK
7.    Click to select “New documents based on this template”
8.    Click OK to close the Modify dialog box.


5. Move Rows Of Text In Table
Sometimes when you are working on the table, you may want to move one or more rows in the table up or down without having to change the table formatting. One method is copy pasting but that risks formatting.
Another method is using ALT+SHIFT+UP arrow key to move entire row up. Similarly, to move the entire row down, use ALT+SHIFT+DN arrow key. Note that you have to select the row before you can move it using the ALT+SHIFT+Arrow keys. This method makes sure the formatting is not disturbed.

 Visit : http://mrsupport.blogspot.in/ for latest Technology News
6. Quickly Change Line Spacing
Sometimes need arises that you have to change line spacing among different paragraphs. Here are the shortcut keys:
CTRL + 1 –> Change line spacing to 1
CTRL + 2 –> Change line spacing to 2
CTRL + 5 –> Change line spacing to 1.5
Note that you just need to place the cursor on the paragraph that needs to be styled. You need not select the paragraph.
7. Quickly Adding Borders to Paragraphs
If you wish to add borders to some paragraph, you can use the Borders and Shading dialog box. However, if your need is just to add bottom border to text/paragraph, you can do it by adding three special characters and hitting Enter.
Press – (hyphen) three times and press Enter to draw an underline border of 3/4 points
Press _ (underscore) three times and press Enter to draw an underline border of 1.5 points
Press ~ (tilde) three times and press Enter to draw a zigzag underline border
Press * (asterisk) three times and press Enter to draw a dotted underline border
Press = (equal to) three times and press Enter to draw a double underline border
8. Find Special Formatting
You can find text that is specially formatted. For example, you can find highlighted text or text whose font is Times New Roman. You can also search for bold text or italics. There are many more options when you use the Find option.
1.    Press CTRL+F to open the Find pane. In Word 2010 it appears to the left side of the window.
2.    Click on the down facing triangle next to magnifying glass and click on Advanced Find…
3.    In the Find dialog box that appears, click on More.
4.    You can see plenty of options under Format.
5.    When you select anything, it appears under the “Find What” textbox. When you click Find Next without entering anything in the “Find What” text box, it searches for the format you have selected. For example, you can select Font and in the Font dialog box, select a font and its properties (bold, italics etc).


9. Merging Formatting When Pasting Across Documents
When you copy anything from another document and paste it in the current document, you will want the copied text to match the formatting of the current document. While you can manually format each time you copy text from other documents to the current one, you can also set the default paste to merge formatting so that the text copied from other sources acquires formatting of current document.
1.    To set the default formatting, click on the down facing triangle below Paste on Home tab
2.    Click Set Default Paste
3.    In the window that appears, Select Merge Destinations in: 1: When Pasting in Same Document and 2: When Pasting between Documents.
4.    Click OK to close the window

10. Copy Only Formatting
Sometimes you may want to apply an already existing formatting from one part of your document to another part. You have the Format Painter for the purpose. Using the Format Painter can be irritating when dealing with long documents.  Here is another method that is easier to use.
Press CTRL+SHIFT+C instead of CTRL+C. This will copy only the formatting and leave the text.
Move to the destination where the formatting is to be applied. Select the text to which formatting is to be applied. Press CTRL+SHIFT+V to paste the formatting to the selection.
Above are some Microsoft Word 2010 tips and tricks that make your working on the editor easy. If you have anything to share, please use the comments section.

Friday 22 June 2012

Tips To Protect and Secure Your Privacy On Twitter


Twitter is one of the most popular and addictive social networking sites today, apart from Facebook. Originally thought of as a micro blogging site, Twitter soon turned out to be a site where people started to share everything – from what they eat to what they think, their habits, their obsessions, their ups and their downs, what they are doing, what they intend to do and more. You can look at the timeline of any person and get to know many facts about him or her.

Is Protecting Your Tweets A Good Idea?

So how do you go about protecting your privacy on a site so seductive!? These tips that will help you stay secure and protect your privacy while using Twitter.

One of the methods to protect your privacy on Twitter is to protect your tweets. You can protect your tweets by visiting Settings. This way, people who are not following you cannot read your tweets. You also get to select who all can follow you. If you want to interact with limited people and with people whom you know, you can go ahead and protect your tweets.

But protecting your tweets is not a good idea as you may miss upon on followers. People, in general, do not like following people with protected tweets. Also, if you represent a service or business, you need to keep the tweets in public domain so that others can see how you treat others. In other words, keeping your tweets open means you have nothing to hide from others – and this attitude brings in more followers.

Protecting Your Privacy

Protecting your tweets is not a good idea, unless you wish to interact with limited people. If you want more followers and wish to have more people for interaction, it is recommended that you do not protect your tweets.

Then how do you protect your privacy? Here are some tips:

Be careful while tweeting. Do not share personal information such as phone numbers and email addresses on Twitter.
Though the geo tagging feature (see image above) is useful, use it only when you want your friends to know where you are when tweeting. Do not enable it for all tweets.
If you are linking Twitter to other social networking sites, know that Twitter can cross post to those social networking sites. Tweet in mind keeping the fact. If you do not want Twitter to cross post, revoke access to Twitter from other social networking sites.
When uploading pictures, make sure they do not contain any kind of personal information. People can use these pictures to trackback your location and other details.
Understand that other people can always retweet your tweets. Do not tweet anything that others can manipulate for their own needs.
Under Settings, you may also to unceheck Let other find me by my email address.
Make sure that the Always use HTTPS box is checked.
If you want, you can also Block any user. To do so, visit his Profile page and click on the Block item from the drop-down menu of his Person icon.

The bottom line is that there are no specific rules to stay safe on Twitter. You have to stay secure on your own – by staying careful when tweeting.

Go here, if you’d like to know what to do if you are Locked out of Twitter or if your account is compromised.

Wednesday 20 June 2012

How to Take Good Care of Your Laptop Computer




It is important to take care of your laptop to keep it in good shape; prevention is always better than cure. There are a number of easy things that you can do to keep your laptop in great shape; following these easy steps will help to ensure that it lasts longer and will need less maintenance. As an added bonus, many of the steps will also maintain your laptop’s speed.

Keep liquids away from your laptop. As tempting as it might be to drink coffee, soda, water or any other liquid near your laptop, accidents can happen all too easily. Spilled liquids may damage the internal components or cause electrical injury to the laptop. Short circuits can corrupt data or even permanently destroy parts. The solution is very simple: Keep your drinks away from your computer. Even if you’re careful, someone else might bump into your desk or you. Or you can use a cup with a cover on it, so even if it does spill, the liquid doesn’t go any where!

Having an available antivirus software would help. Even if you know what you download, it may contain a virus that can lead to a circuit error in your system hardware or slowness in the software.

Keep food away from your laptop. Don’t eat over your laptop. The crumbs can go down between the keys in the keyboard and provide an invitation to small bugs. The crumbs can also irritate the circuitry. Worse, it makes the laptop look dirty if there are crumbs and food stains on it.

Always have clean hands when using your laptop. Clean hands make it easier to use your laptop touchpad and there will be less risk of leaving dirt and other stains on the computer. In addition, if you clean your hands before use, you will help reduce wear and tear on the coating of the laptop caused by contact with sweat and small particles that can act upon the laptop’s exterior underneath your wrists and fingers.

Protect the LCD display monitor. When you shut your laptop, make sure there are no small items, such as a pencil or small ear-phones, on the keyboard. These can damage the display screen when shut; the screen will scratch if the item is rough. Close the lid gently and holding from the middle. Closing the lid using only one side causes pressure on that hinge, and over time can cause it to bend and snap.

Hold and lift the computer by its base, not by its LCD display (the screen). If you lift it by the screen part alone, you could damage the display or the hinges attaching it to the base. The display is also easily scratched or damaged by direct pressure – avoid placing pressure on it.

Don’t pull on the power cord. Tugging your power cord out from the power socket rather than putting your hand directly on the plug in the socket and pulling can break off the plug or damage the power socket. Also, if you have the power point near your feet, avoid constantly bumping into the plug or you could loosen it and eventually break it.

Don’t roll your chair over the computer cord. Stick the cord onto your desk with tape or a special computer cord tie which can be easily undone when you’ve finished using the laptop. Always try to keep most of the cord away from the floor or your legs; sometimes you can be so engrossed in what you’re doing that you move your legs and forget the cord is there.

Plug in accessory devices into their proper slots. Always look at the symbols on the laptop carefully before inserting devices. Jamming a phone line into an Ethernet port or vice versa could damage the sockets, making it impossible to use them again. It is very important to observe this step.

Handle any removable drives with care. Floppy drives or CD drives that have been removed from your laptop can easily get crushed, dropped or pressed if you are careless. Put them straight into a bag or a storage box/case for safe keeping if you are not putting them back into the laptop.

Insert drives into their slots carefully and at the correct angle. Pushing the wrong drive into a socket, or at an angle, or even upside down can jam it.

Check to see if labels are affixed securely before inserting media into your laptop computer. Media such as CDs, DVDs or floppy disks should not have any loose label parts that might jam inside the laptop drive. Never insert undersized CDs, as these can damage the disk player permanently.

Don’t expose your laptop to rapid temperature fluctuations. When bringing your laptop indoors during winter, don’t turn it on immediately. Instead, let it warm to room temperature first. This will avoid any potential for damage to the disk drive from condensation forming inside the machine. Avoid heat from sunlight as well.

Don’t leave your laptop in a car. Not only do the insides of cars experience large temperature swings that could damage a laptop, but a laptop (or laptop bag) is an inviting target for a smash and grab thief.

Have the unit cleaned once a year to remove internal dust. Get this done by a computer professional. If dust accumulates, the system cannot cool itself correctly. Heat can destroy the motherboard.

Avoid placing heavy materials, such as books, on top of your laptop and keyboard. This can push the LCD screen into the keyboard, and will eventually damage it. Also, the CD-ROM insert will also be squished and, eventually, will break.

Use a properly-sized laptop case. Whatever you use to carry your laptop around in, be it a case, a bag or something you have made yourself, make sure that it it large enough to contain the laptop. This will avoid scratching, squeezing or even potentially dropping it.

Look into getting a laptop bag. Many breaks happen because of laptops being dropped or bumped. A bag greatly reduces the risk of damage.

Use and store in a well-circulated area. When you are using your laptop, do so in a place that has a constant air-circulation. Lots of people ruin their laptop by using it in an enclosed area and thus making the laptop overheat. It also helps if you store it in a well circulated area.

Use an old tooth brush to clean the area around the exhaust fan screen. If that gets plugged up, air flow is diminished and overheating can most certainly occur.

Try and keep the laptop on a flat surface. This prevents damage to the laptop. This step can be hard, particularly if you are going out with your laptop, but if there is a flat surface available to put your laptop on then do so.

Don’t use your laptop on the bed. Repeated use of the laptop on the bed will cause the fans to suck up the dust and further debris which lies in the bed, ultimately blocking the fan. Refrain from this by using the laptop somewhere else than the bed.

Warning
  • Avoid putting your laptop on a carpet. The air vents on the back of the laptop help air to travel in and out. Anything which blocks the air vents is preventing hot air from escaping and only invites it back in again, which can result in overheating; leading to excessive lag and potential damage. 
  • Be aware of the “no excess” or “zero excess” of some laptop insurance companies; while it appears to be free of excess, you may have to pay again for the year in full to restart your insurance after a claim. 
  •  Pets (like parrots that fixate on clicking, shiny objects) and children should be supervised when within a close proximity of your laptop. 
  • If you are not going to use the laptop or the computer for the next two hours, better shut it down. The energy it takes to start it up is far lesser than the energy it will take if the laptop is running continuously. 

Tuesday 19 June 2012

Microsoft Announces Surface Tablets

Microsoft today unveiled Tablet PCs – Surface for Windows RT and Surface for Windows 8 Pro built to be the ultimate stage for Windows OS.




Surface tablet for Windows 8 RT running on NVidia’s ARM processor, and surface for Windows 8 Pro, running on Intel’s Ivy Bridge (using the i5 core) weighs 676 grams and is 9.3 mm thick..
Using a 10.6-inch ClearType HD display, Microsoft tablets includes USB 2.0, Micro HD, and microSD options for connectivity. It comes with 2×2 MIMO antennas which gives the strongest WiFi capability.Both Tablets has a multitouch keyboard and a trackpad and will come with either 64 gigabytes or 128 GB of storage.
Microsoft Surface is designed to seamlessly transition between consumption and creation, without compromise. It delivers the power of amazing software with Windows and the feel of premium hardware in one exciting experience. Surface Tablet has edges angled at 22 degrees, a natural position for the PC at rest or in active use, letting the hardware fade into the background and the software stand out.
The 3 mm Touch Cover of Surface Tablets represents a step forward in human-computer interface. Using a unique pressure-sensitive technology, Touch Cover senses keystrokes as gestures, enabling you to touch type significantly faster than with an on-screen keyboard. It will be available in a selection of vibrant colors.
Surface for Windows RT :
•OS: Windows RT
•Light(1): 676 g
•Thin(2): 9.3 mm
•Clear: 10.6” ClearType HD Display
•Energized: 31.5 W-h
•Connected: microSD, USB 2.0, Micro HD Video, 2×2 MIMO antennae
•Productive: Office ‘15’ Apps, Touch Cover, Type Cover
•Practical: VaporMg Case & Stand
•Configurable: 32 GB, 64 GB
Surface for Windows 8 Pro :
•OS: Windows 8 Pro
•Light(1): 903 g
•Thin(2): 13.5 mm
•Clear: 10.6” ClearType Full HD Display
•Energized: 42 W-h
•Connected: microSDXC, USB 3.0, Mini DisplayPort Video, 2×2 MIMO antennae
•Productive: Touch Cover, Type Cover, Pen with Palm Block
•Practical: VaporMg Case & Stand
•Configurable: 64 GB, 128 GB
The retail pricing of bothe Tablets will be announced closer to availability and is expected to be competitive with a comparable ARM tablet or Intel Ultrabook-class PC. OEMs will have cost and feature parity on Windows 8 and Windows RT.