Minggu, 20 April 2008

Internet Murah via GPRS

Linux dapat digunakan untuk mengakses Internet dengan modem berupa ponsel. Berikut ini petunjuk praktis koneksi via GPRS melalui salah satu operator GSM. Saat ini, biayanya hanya Rp25.000 per bulan dengan waktu tak terbatas.Internet telah menjadi tulang punggung penyebaran informasi yang sangat cepat. Proses pencerdasan kehidupan bangsa salah satunya dapat dilakukan melalui media ini. Berbagai macam pengetahuan tersedia hanya dengan melakukan aktivitas browsing pada berbagai situs yang menyediakan informasi ilmu pengetahuan yang bermanfaat. Terlepas dari ekses negatif yang ditimbulkan, Internet diyakini mampu menjembatani kesenjangan ilmu pengetahuan dari negara-negara maju dengan negara-negara berkembang.

Kendala yang dihadapi pemakai Internet di Indonesia adalah masalah koneksi dan biaya koneksi. Koneksi yang kurang reliabel dan biaya yang mahal adalah suatu masalah yang sulit dipecahkan, ibaratnya bagaikan pisau bermata dua atau yang lebih sadis lagi bagaikan 491 buah simalakama. Jika kita menginginkan koneksi yang lebih reliabel imbasnya pada biaya yang mahal begitu juga sebaliknya jika kita menginginkan koneksi yang murah,koneksi Internet kita kurang reliabel.

sumber: InfoLinux 07/2004

DOWNLOAD ARTIKEL LENGKAP (PDF):
  1. sri-gprs.zip

Internet Cepat via CDMA

Linux juga dapat digunakan untuk mengakses Internet melalui ponsel CDMA. Tutorial ini menunjukkan kemudahan setup dengan modus teks pada dua distro Linux, Gentoo dan Fedora.Dengan hadirnya layanan telepon wireless CDMA memungkinkan kita untuk memiliki akses Internet berkecepatan lumayan tinggi, dengan infrastruktur yang minim. Beberapa ponsel CDMA telah dilengkapi dengan kabel data USB untuk koneksi ke komputer. Pemilihan ponsel dengan kabel data yang mendukung sistem operasi GNU/Linux, agak sulit dikarenakan minimnya referensi.

Dengan googling kita bisa memperoleh informasi bahwa secara garis besar ada dua macam kabel data usb yang banyak digunakan handphone CDMA. Pertamayang true usb, yang berkomuniksai menggunakan usb protocol dari komputer ke handphone. Tipe kedua menggunakan serial-to-usb adapter yang built-in dalam kabel.

Sumber: InfoLinux 07/2004

DOWNLOAD ARTIKEL LENGKAP (PDF):
  1. kristiana-cdma.zip

Internet dengan HP CDMA

Zaman sekarang dibilang orang zaman internet. Apa-apa dari internet. Banyak yang bisa kita lakukan dengan internet. Misalnya, kita bisa surat-suratan sama teman kita di negara lain menggunakan email. Banyak penyedia account email gratis seperti gmail.com atau mail.yahoo.com yang nyediain kapasitas sampai bergiga-giga. Bagi yang mo nyari artikel tinggal search aja di google atau dari wikipedia. Mo belanja bisa di amazon atau di bhinneka. Bagi yang mo jualan via internet juga bisa.

Cara memasuki dunia maya pun macam-macam. Kita bisa pergi ke warnet. Ke tempat-tempat yang nyediain hotspot. Dari rumah pun bisa, tinggal colok kabel telepon. Bahkan dari HP pun bisa. Apalagi tarif internet dari operator-operator telepon makin murah aja.

Untuk itu ni artikel mo ngasih tau gimana caranya ya bisa konek ke internet dari HP.

DOWNLOAD ARTIKEL LENGKAP (PDF):
  1. Putra-Internet_HP_CDMA.pdf

Lindungi Data Penting Anda !

Beragam alasan yang bisa dikemukakan mengapa melindungi data menjadi satu hal yang sangat penting, diantaranya adalah :

  • Melindungi supaya tidak ada orang lain yang bisa membuka file data Anda.
  • Melindungi data atau dokumen supaya orang lain hanya bisa melihat isi dokumen Anda, tidak bisa menambah atau pun memodifikasi data.
  • Melindungi file executable (file *.exe) dari serangan virus.
  • Mencegah orang lain menjalankan file executable. Dalam aplikasinya Anda bisa mencegah orang lain menjalankan game yang ada di komputer Anda atau mencegah orang lain menjalankan program yang cukup riskan untuk dijalankan oleh sembarang orang.
  • Mencegah orang lain membuat file atau folder baru pada folder yang telah Anda tentukan.
  • Menyembunyikan data Anda sehingga orang lain tidak dapat melihatnya walaupun setting pada Folder Options - View berada pada Show All Files.

Maka beruntunglah — dalam hal keamanan data — orang yang menggunakan sistem operasi Linux, Windows NT dan Windows 2000 karena ketiga sistem operasi tersebut mempunyai tingkat keamanan yang cukup tinggi. Bagaimana halnya dengan sistem operasi seperti Windows 95, 98 dan Windows ME ?

Tidak dapat dipungkiri sebagian besar pemakai perseorangan mengandalkan Win 9x dan ME untuk sistem operasinya. Mungkin termasuk Anda. Lalu bagaimanakah cara melindungi data penting Anda tanpa harus mengganti sistem operasi ?

Cara yang paling mudah adalah dengan menggunakan program proteksi yang banyak beredar di internet. Salah satunya adalah File Protector. Ada beberapa macam proteksi yang ditawarkan oleh software berukuran sekitar 80 Kb ini, yaitu :

  • Read Only : Mencegah terjadinya overwrite, modifikasi, append (penambahan data), mencegah rename (disable rename), dan mencegah penghapusan (disable delete) pada file atau directory yang diproteksi.
  • No Access :Sama dengan feature Read Only dengan beberapa tambahan untuk mencegah data Anda dibuka (disable open), dibaca (disable read), dan dieksekusi/dijalankan (disable execute).
  • Hidden :Memungkinkan Anda untuk menyembunyikan file atau directory.
  • Protect from virus : Mencegah dari serangan virus

Dengan interface yang sederhana, Anda dapat melakukan berbagai setting pada File Protector dengan sangat mudah bahkan untuk seorang pemula sekalipun.

Jika Anda tertarik menggunakannya silakan download programnya di http://mikkoaj.hypermart.net/. Setelah itu ekstrak file yang masih berbentuk ZIP tersebut ke sembarang folder. Untuk memulai proses install jalankan file install.exe. Setelah proses install selesai maka reboot komputer Anda.

DOWNLOAD SOFTWARE PENDUKUNG:
  1. Acrobat PDF Reader
  2. Download Full ArchiCAD Free Student & Teacher Version in your language with Tutorials!
  3. Data Entry Find Solutions for your Business. Free Reports, Info & Registration!

Menjahili orang lain dengan Netbus


NetBus merupakan backdoor yang berjalan di sistem operasi Windows 9x dan NT. Dengan Netbus tersebut banyak hal menyenangkan yang bisa Anda lakukan, diantaranya adalah :

1. Membuka dan menutup CD-ROM Drive.
2. Melakukan shut down, log off, reboot dan power off.
3. Mengontrol gerakan mouse dan keyboard.
4. Menutup program.
5. Mengirimkan pesan atau text.
6. Memata-matai komputer “korban”.
7. Mengarahkan komputer “korban” sehingga membuka URL tertentu.

Untuk menjalankan NetBus dibutuhkan 2 buah file, yaitu NetBus.exe dan Patch.exe (tapi nama file tersebut bisa saja diganti dengan nama yang lain). NetBus.exe merupakan file yang diletakkan di komputer kita, sedangkan Patch.exe diletakkan di komputer “korban”.

Ada beberapa cara untuk “menanam” file Patch.exe di komputer “korban”. Misalnya dengan mengirimkan sebagai attachment saat Anda mengirim email. Jika penerima email tersebut mengeksekusi file Patch.exe maka file tersebut akan ter-copy ke directory Windows ( pada komputer “korban”). Cara lain adalah (ini yang lebih asyik) letakkan file tersebut di semua komputer pada suatu warnet.

Jika berhasil Anda tinggal jalankan file NetBus.exe. Pada kolom Host name/IP Address isi dengan host name/ip address pada komputer si “korban”. Kalau Anda bingung, gunakan fasilitas Scan yang akan memeriksa komputer mana saja yang telah terdapat file Patch.exe. Selesai mengisi ip address klik tombol Connect. Tunggu beberapa saat. Jika koneksi berhasil tombol Connect akan berganti menjadi tombol Cancel dan setelah itu Anda bisa melakukan apa yang Anda sukai, termasuk menyadap password email orang lain.

Untuk mendapatkan NetBus Anda bisa mendownloadnya dari HackersClub.

Peringatan :
Gunakan artikel ini untuk menambah pengetahuan Anda. Jangan melakukan hal-hal yang dapat merugikan orang lain.

DOWNLOAD SOFTWARE PENDUKUNG:
  1. Acrobat PDF Reader
  2. Download Full ArchiCAD Free Student & Teacher Version in your language with Tutorials!
  3. Voice Recognition Find Solutions for your Business. Free Reports, Info & Registration!

Kamis, 17 April 2008

Tips Mencari Teman Chat Pada Yahoo! Messenger


Anak muda jaman sekarang memang sudah sangat berbeda dengan anak muda jangan dulu. Jaman sekarang sudah ada internet, MTV, Hard Rock, Planet Hollywood dan seabreg hiburan lainnya yang siap menemani 24 jam sehari. Internet bagi sebagian besar anak muda sekarang sudah menjadi barang yang tidak asing lagi dan bahkan mereka setiap hari bergelut dengan internet. Salah satu fasilitas yang paling banyak disukai oleh anak muda di internet adalah chatting. Chatting adalah suatu aktivitas komunikasi antar individu atau bahkan antar group di internet. Implementasi dari chatting ini juga sangat beragam di internet. Ada yang suka menggunakan media IRC (Internet Relay Chat), ICQ, Yahoo! Messenger, MSN Messenger dan mash banyak lagi bentuk komunikasi yang lain.

DOWNLOAD ARTIKEL LENGKAP (PDF):
  1. sony-ym.zip
DOWNLOAD SOFTWARE PENDUKUNG:
  1. Acrobat PDF Reader
  2. Download Full ArchiCAD Free Student & Teacher Version in your language with Tutorials!
  3. Cd Writer Find Solutions for your Business. Free Reports, Info & Registration!

Minggu, 23 Maret 2008

How to create and extract a ZIP File in Windows 95/98/2000

Windows 95/98/2000 does not have have built in ZIP file support. It is therefore necessary to use a 3rd party software to create and extract ZIP files. I will base this tutorial on a popular Zip utility, which has a free trial, called WinZip

Download the evaluation and install the software on your computer. When installing it, choose the classic interface and then just keep pressing the Next buttons and following the default options until the setup is complete. When it is done installing it will open the program. For now, simply close this program.

To create a ZIP file:

Right click on a file, folder, or selection of files and click on the WinZip menu option and then choose Add to name.zip. The name will change based on the files you are selecting to archive. If you choose to zip a folder or file name it will name the ZIP file the name of the file or folder. If you choose to zip a selection of files, it will name it based upon the name of the folder that selection is located. The image below shows the location of these menu items:



After selecting the Add to name.zip menu option, the files will be zipped and you should now see the new ZIP archive you just created.

To extract a ZIP file:

Right-click on a ZIP file and select the WinZip menu option and then select the appropriate extraction option. I suggest, to stay organized, that you choose the Extract to folder name, so that the archived files will be extracted into a folder that has the same name as the Zip file. I have selected that option in the image below.



After you select how you want the files extracted, WinZip will extract the files as directed.

As always, if you have any questions, please feel free to ask them in the computer help forums.


--
Lawrence Abrams
Bleeping Computer Basic Computer Utilities Tutorials
BleepingComputer.com: Computer Help & Tutorials for the beginning computer user.

How to remove a Trojan, Virus, Worm, or other Malware

How to remove a Trojan, Virus, Worm, or other Malware

Table of Contents


Dialers, Trojans, Viruses, and Worms Oh My!

If you use a computer, read the newspaper, or watch the news, you will know about computer viruses or other malware. These are those malicious programs that once they infect your machine will start causing havoc on your computer. What many people do not know is that there are many different types of infections that are categorized in the general category of Malware.

Malware - Malware is programming or files that are developed for the purpose of doing harm. Thus, malware includes computer viruses, worms, Trojan horses, spyware, hijackers, and certain type of adware.

This article will focus on those malware that are considered viruses, trojans, worms, and viruses, though this information can be used to remove the other types of malware as well. We will not go into specific details about any one particular infection, but rather provide a broad overview of how these infections can be removed. For the most part these instructions should allow you to remove a good deal of infections, but there are some that need special steps to be removed and these won't be covered under this tutorial.

Before we continue it is important to understand the generic malware terms that you will be reading about.

Adware - A program that generates popups on your computer or displays advertisements. It is important to note that not all adware programs are necessarily considered malware. There are many legitimate programs that are given for free that display ads in their programs in order to generate revenue. As long as this information is provided up front then they are generally not considered malware.

Backdoor - A program that allows a remote user to execute commands and tasks on your computer without your permission. These types of programs are typically used to launch attacks on other computers, distribute copyrighted software or media, or hack other computers.

Dialler - A program that typically dials a premium rate number that has per minute charges over and above the typical call charge. These calls are with the intent of gaining access to pornographic material.

Hijackers - A program that attempts to hijack certain Internet functions like redirecting your start page to the hijacker's own start page, redirecting search queries to a undesired search engine, or replace search results from popular search engines with their own information.

Spyware - A program that monitors your activity or information on your computer and sends that information to a remote computer without your knowledge.

Trojan - A program that has been designed to appear innocent but has been intentionally designed to cause some malicious activity or to provide a backdoor to your system.

Virus - A program that when run, has the ability to self-replicate by infecting other programs and files on your computer. These programs can have many effects ranging from wiping your hard drive, displaying a joke in a small box, or doing nothing at all except to replicate itself. These types of infections tend to be localized to your computer and not have the ability to spread to another computer on their own. The word virus has incorrectly become a general term that encompasses trojans, worms, and viruses.

Worm - A program that when run, has the ability to spread to other computers on its own using either mass-mailing techniques to email addresses found on your computer or by using the Internet to infect a remote computer using known security holes.


How these infections start

Just like any program, in order for the program to work, it must be started. Malware programs are no different in this respect and must be started in some fashion in order to do what they were designed to do. For the most part these infections run by creating a configuration entry in the Windows Registry in order to make these programs start when your computer starts.

Unfortunately, though, in the Windows operating system there are many different ways to make a program start which can make it difficult for the average computer user to find manually. Luckily for us, though, there are programs that allow us to cut through this confusion and see the various programs that are automatically starting when windows boots. The program we recommend for this, because its free and detailed, is Autoruns from Sysinternals.

When you run this program it will list all the various programs that start when your computer is booted into Windows. For the most part, the majority of these programs are safe and should be left alone unless you know what you are doing or know you do not need them to run at startup.

At this point, you should download Autoruns and try it out. Just run the Autoruns.exe and look at all the programs that start automatically. Don't uncheck or delete anything at this point. Just examine the information to see an overview of the amount of programs that are starting automatically. When you feel comfortable with what you are seeing, move on to the next section.

How to remove these infections

We have finally arrived at the section you came here for. You are most likely reading this tutorial because you are infected with some sort of malware and want to remove it. With this knowledge that you are infected, it is also assumed that you examined the programs running on your computer and found one that does not look right. You did further research by checking that program against our Startup Database or by searching in Google and have learned that it is an infection and you now want to remove it.

If you have identified the particular program that is part of the malware, and you want to remove it, please follow these steps.

  1. Download and extract the Autoruns program by Sysinternals to C:\Autoruns

  2. Reboot into Safe Mode so that the malware is not started when you are doing these steps. Many malware monitor the keys that allow them to start and if they notice they have been removed, will automatically replace that startup key. For this reason booting into safe mode allows us to get past that defense in most cases.

  3. Navigate to the C:\Autoruns folder you created in Step 1 and double-click on autoruns.exe.

  4. When the program starts, click on the Options menu and enable the following options by clicking on them. This will place a checkmark next to each of these options.

    1. Include empty locations

    2. Verify Code Signatures

    3. Hide Signed Microsoft Entries

  5. Then press the F5 key on your keyboard to refresh the startups list using these new settings.

  6. The program shows information about your startup entries in 8 different tabs. For the most part, the filename you are looking for will be found under the Logon or the Services tabs, but you should check all the other tabs to make sure they are not loading elsewhere as well. Click on each tab and look through the list for the filename that you want to remove. The filename will be found under the Image Path column. There may be more than one entry associated with the same file as it is common for malware to create multiple startup entries. It is important to note that many malware programs disguise themselves by using the same filenames as valid Microsoft files. it is therefore important to know exactly which file, and the folder they are in, that you want to remove. You can check our Startup Database for that information or ask for help in our computer help forums.

  7. Once you find the entry that is associated with the malware, you want to delete that entry so it will not start again on the next reboot. To do that right click on the entry and select delete. This startup entry will now be removed from the Registry.

  8. Now that we made it so it will not start on boot up, you should delete the file using My Computer or Windows Explorer. If you can not see the file, it may be hidden. To allow you to see hidden files you can follow the steps for your operating system found in this tutorial:

    How to see hidden files in Windows

  9. When you are finished removing the malware entries from the Registry and deleting the files, reboot into normal mode as you will now be clean from the infection.


How to protect yourself in the future

In order to protect yourself from this happening again it is important that take proper care and precautions when using your computer. Make sure you have updated antivirus and spyware removal software running, all the latest updates to your operating system, a firewall, and only open attachments or click on popups that you know are safe. These precautions can be a tutorial unto itself, and luckily, we have one created already:

Simple and easy ways to keep your computer safe and secure on the Internet

Please read this tutorial and follow the steps listed in order to be safe on the Internet. Other tutorials that are important to read in order to protect your computer are listed below.

Understanding Spyware, Browser Hijackers, and Dialers

Understanding and Using Firewalls

Safely Connecting a Computer to the Internet

Using Spybot - Search & Destroy to remove Spyware from Your Computer

Using Ad-Aware SE to remove Spyware & Hijackers from Your Computer

Using SpywareBlaster to protect your computer from Spyware, Hijackers, and Malware

Using IE-Spyad to enhance your privacy and Security


Conclusion

Now that you know how to remove a generic malware from your computer, it should help you stay relatively clean from infection. Unfortunately there are a lot of malware that makes it very difficult to remove and these steps will not help you with those particular infections. In situations like that where you need extra help, do not hesitate to ask for help in our computer help forums. We also have a self-help section that contains detailed fixes on some of the more common infections that may be able to help. This self-help section can be found here:

Spyware & Malware Self-Help and Reading Room


--
Lawrence Abrams
Bleeping Computer Spyware & Malware Removal Series
BleepingComputer.com: Computer Help & Tutorials for the beginning computer user.

procesor

Whitepapers and eBooks
Intel eBook: Managing the Evolving Data Center
IBM Whitepaper: Enterprise Information Integration: Deployment Best Practices for Low-Cost Implementation
Intel Clients PDF: Improve Security and Control of your PCs
Microsoft Article: Managing Virtual Machines with Microsoft System Center
Intel Mobility PDF: Wireless Technologies and e-Learning--Bridging the Digital Divide
Avaya Article: How to Begin Developing with Avaya's Event Processing Language
Intel Multi-Core PDF: Comparing Multi-Core Processors for Server Virtualization
Avaya Article: Deep Dive--Event Processor Offers Familiar Tools for Creating Event-Driven SOA Apps
Intel Whitepaper: A Methodology for Threading Serial Applications (PDF)
HP eBook: Storage Networking , Part 1
F5 Whitepaper: Deploying SharePoint 2007? BIG-IP LTM with WebAccelerator Can Speed it up by 8x
Quest Whitepaper: Improving Oracle Database Performance Using Real-Time Visual Diagnostics
ServerWatch.com Article: Tip of the Trade--IP Address Management
Avaya Article: Event Processing Demands Real-Time Response for Communications-Enabled Business Applications
ITChannelPlanet.com Article: Enterprise Fixed-Mobile Convergence Can Be Lucrative
StoreVault Whitepaper: Introduction to Networked Storage
Intel Article: Transitioning Software to Future Generations of Multi-Core
Oracle eBook: Implementing Business Intelligence in Your Organization

Hoovers Article: Boost Employee Morale without Breaking the Bank
SAP Whitepaper: A Corporate Guide to Better Decisions Through IT
Microsoft Article: Solving Data Center Complexity with Microsoft System Center Configuration Manager 2007
IBM Whitepaper: Transforming Legacy Apps into SOA
Internet.com eBook: All About Botnets
Intel Article: 8 Simple Rules for Designing Threaded Applications
Symantec Whitepaper: E-Mail Discovery--Worst-Case Scenarios Versus Best Practices
Ipswitch Whitepaper: Secure File Transfer In the Era of Regulatory Compliance
Symantec Whitepaper: A Unified, Proactive Approach to Endpoint Security
Intel Whitepaper: Best Practices for Developing and Optimizing Threaded Applications
Symantec Whitepaper: Emerging Trends in Fighting Spam
Microsoft Partner Program Article: How to Market Your Technology Solutions
Avaya Article: Opening Telephony to Microsoft Developers
Symantec Whitepaper: Best Practices for IM Archiving & Compliance
Intel Article: The Challenges of Developing Multithreaded Processing Pipelines
Symantec Article: Guarding the Corporate Gateway
MORE WHITEPAPERS, EBOOKS, AND ARTICLES
Webcasts
Intel Video: Foundations of Parallel Programming, Part One
Microsoft Web Seminar: Windows Mobile 6.0 Training for ISV Developers
IBM Webcast: Asset Reuse Strategies for Success--Innovate Don't Duplicate!
HP Video: Page Cost Calculator
HP Webcast: Storage Is Changing Fast - Be Ready or Be Left Behind
Epicor Webcast: Requirements to Consider When Looking at ITSM Tools

Intel Video: Three Must-Knows for Parallelism
Microsoft Partner Program Video: The Secrets to Partner Success
Rational Asset Manager: Succeed with Asset-based Development
Microsoft Silverlight Video: Creating Fading Controls with Expression Design and Expression Blend 2
MORE WEBCASTS, PODCASTS, AND VIDEOS
Downloads and eKits
Red Gate Download: SQL Backup Pro and free DBA Best Practices eBook
Red Gate Download: SQL Compare Pro 6
IBM eKit: IBM Rational Systems Development Solution
IBM eKit: Rational Asset Manager
IBM Developer Kit: Web 2.0

IBM Download: Data Studio v1.1
NXPowerLite: Desktop Edition Software Trial
Iron Speed Designer Application Generator
Symantec IM Detection Utility
MORE DOWNLOADS, EKITS, AND FREE TRIALS
Tutorials and Demos
Intel Servers/Workstations Demo: Dual-Core Intel Itanium 2 Processor
Flash Demo: IBM Information Server Blade
HP Demo: StorageWorks EVA4400
IBM Demo: Adding Security to your Web Services Digital Signatures
IBM Demo: Deployment Tracking with Rational ClearQuest and ClearCase

IBM Overview Video: Next Generation Data Warehousing
IBM Tutorial: Intro to XML User Interface Language (XUL) Development
Microsoft How-to Article: Get Going with Silverlight and Windows Live
MORE TUTORIALS, DEMOS AND STEP-BY-STEP GUIDES

dual core

All About Dual-Core Processors

Dual-core refers to a CPU that includes two complete execution cores per physical processor. It combines two processors and their caches and cache controllers onto a single integrated circuit (silicon chip). It is basically two processors, in most cases, residing reside side-by-side on the same die.

Dual-processor, Dual-core, and Multi-core: Keeping it straight
Dual-processor (DP) systems are those that contains two separate physical computer processors in the same chassis. In dual-processor systems, the two processors can either be located on the same motherboard or on separate boards. In a dual-core configuration, an integrated circuit (IC) contains two complete computer processors. Usually, the two identical processors are manufactured so they reside side-by-side on the same die, each with its own path to the system front-side bus. Multi-core is somewhat of an expansion to dual-core technology and allows for more than two separate processors.

Taking Advantage of Dual-core Technology
A dual-core processor has many advantages especially for those looking to boost their system's multitasking computing power. Dual-core processors provide two complete execution cores instead of one, each with an independent interface to the frontside bus. Since each core has its own cache, the operating system has sufficient resources to handle intensive tasks in parallel, which provides a noticeable improvement to multitasking.

Complete optimization for the dual-core processor requires both the operating system and applications running on the computer to support a technology called thread-level parallelism, or TLP. Thread-level parallelism is the part of the OS or application that runs multiple threads simultaneously, where threads refer to the part of a program that can execute independently of other parts.

Key Terms To Understanding Dual-core

dual-core
Dual-core refers to a CPU that includes two complete execution cores per physical processor.

CPU
Abbreviation of central processing unit, and pronounced as separate letters. The CPU is the brains of the computer. Sometimes referred to simply as the processor or central processor, the CPU is where most calculations take place.

processor
Short for microprocessor or CPU.

integrated circuit
Another name for a chip, an integrated circuit (IC) is a small electronic device made out of a semiconductor material.

Related Webopedia Categories:
Microprocessors

Even without a multithread-enabled application, you will still see benefits of dual-core processors if you are running an OS that supports TLP. For example, if you have Microsoft Windows XP (which supports multithreading), you could have your Internet browser open along with a virus scanner running in the background, while using Windows Media Player to stream your favorite radio station and the dual-core processor will handle the multiple threads of these programs running simultaneously with an increase in performance and efficiency.

Today Windows XP and hundreds of applications already support multithread technology, especially applications that are used for editing and creating music files, videos and graphics because types of programs need to perform operations in parallel. As dual-core technology becomes more common in homes and the workplace, you can expect to see more applications support thread-level parallelism.

Intel & AMD Dual-core Desktop Processors
The Intel Pentium Processor Extreme Edition 840 running at 3.2 GHz and Intel 955X Express Chipsets are being built into computers that are now entering the market. This is Intel's first desktop dual-core product supporting Hyper-Threading Technology. Processor features include the following:

  • Hyper-Threading Technology: Enables you to run multiple demanding applications at the same time.
  • Intel Extended Memory 64 Technology: Provides flexibility for future applications that support both 32-bit and 64-bit computing.
  • Dual-Core: Two physical cores in one processor support better system responsiveness and multi-tasking capability than a comparable single core processor. [Source: Intel Dual-core Desktop Processor]

AMD also announced its line of desktop dual-core processors, the AMD Athlon 64 X2 processor family. The initial model numbers in the new family include the 4200+, 4400+, 4600+ and 4800+ (2.2GHz to 2.4GHz).The processors are based on AMD64 technology and are compatible with the existing base of x86 software, whether single-threaded or multithreaded. Software applications will be able to support AMD64 dual-core processors with a simple BIOS upgrade and no substantial code changes. [Source: AMD Dual-core Desktop Processor]

Both companies have also announced or released dual-core processors for servers and workstations as well.

Did You Know...
"If we assume that the number of transistors per processor core remains relatively fixed, it is reasonable to assume that the number of processor cores could follow Moore's Law, which states that the number of transistors per a certain area on the chip will double approximately every 18 months."
[Source: Intel Software network/Dev]

internet connection

How to use Internet Connection Sharing

To use Internet Connection Sharing to share your Internet connection, the host computer must have one network adapter that is configured to connect to the internal network, and one network adapter or modem that is configured to connect to the Internet.

On the host computer

On the host computer, follow these steps to share the Internet connection:
1.Log on to the host computer as Administrator or as Owner.
2.Click Start, and then click Control Panel.
3.Click Network and Internet Connections.
4.Click Network Connections.
5.Right-click the connection that you use to connect to the Internet. For example, if you connect to the Internet by using a modem, right-click the connection that you want under Dial-up.
6.Click Properties.
7.Click the Advanced tab.
8.Under Internet Connection Sharing, select the Allow other network users to connect through this computer's Internet connection check box.
9.If you are sharing a dial-up Internet connection, select the Establish a dial-up connection whenever a computer on my network attempts to access the Internet check box if you want to permit your computer to automatically connect to the Internet.
10.Click OK. You receive the following message:
When Internet Connection Sharing is enabled, your LAN adapter will be set to use IP
address 192.168.0.1. Your computer may lose connectivity with other computers on
your network. If these other computers have static IP addresses, it is a good idea to set them
to obtain their IP addresses automatically. Are you sure you want to enable Internet
Connection Sharing?
11.Click Yes.
The connection to the Internet is shared to other computers on the local area network (LAN). The network adapter that is connected to the LAN is configured with a static IP address of 192.168.0.1 and a subnet mask of 255.255.255.0

To view a video about how to configure the host computer for Internet Connection Sharing, click the Play button (Play     button) on the following Windows Media Player viewer:

http://support.microsoft.com/servicedesks/ShowMeHow
/3061261.asx

Note To view this video, you must use Windows Media Player 7.0 or later.

For additional information about how to obtain Windows Media Player version 7.1, click the following article number to view the article in the Microsoft Knowledge Base:
299321 (http://support.microsoft.com/kb/299321/) Description and availability of Windows Media Player 7.1

On the client computer

To connect to the Internet by using the shared connection, you must confirm the LAN adapter IP configuration, and then configure the client computer. To confirm the LAN adapter IP configuration, follow these steps:
1.Log on to the client computer as Administrator or as Owner.
2.Click Start, and then click Control Panel.
3.Click Network and Internet Connections.
4.Click Network Connections.
5.Right-click Local Area Connection, and then click Properties.
6.Click the General tab, click Internet Protocol (TCP/IP) in the This connection uses the following items list, and then click Properties.
7.In the Internet Protocol (TCP/IP) Properties dialog box, click Obtain an IP address automatically (if it is not already selected), and then click OK.

Note You can also assign a unique static IP address in the range of 192.168.0.2 to 192.168.0.254. For example, you can assign the following static IP address, subnet mask, and default gateway:
   IP Address      192.168.0.2
Subnet mask 255.255.255.0
Default gateway 192.168.0.1
8.In the Local Area Connection Properties dialog box, click OK.
9.Quit Control Panel.
To view a video about how to confirm the LAN adapter IP configuration, click the Play button (Play button) on the following Windows Media Player viewer:




Note To view this video, you must use Windows Media Player 7.0 or later.

For additional information about how to obtain Windows Media Player version 7.1, click the following article number to view the article in the Microsoft Knowledge Base:
299321 (http://support.microsoft.com/kb/299321/) Description and availability of Windows Media Player 7.1
To configure the client computer to use the shared Internet connection, follow these steps:
1.Click Start, and then click Control Panel.
2.Click Network and Internet Connections.
3.Click Internet Options.
4.In the Internet Properties dialog box, click the Connections tab.
5.Click the Setup button.

The New Connection Wizard starts.
6.On the Welcome to the New Connection Wizard page, click Next.
7.Click Connect to the Internet, and then click Next.
8.Click Set up my connection manually, and then click Next.
9.Click Connect using a broadband connection that is always on, and then click Next.
10.On the Completing the New Connection Wizard page, click Finish.
11.Quit Control Panel.
When you now start Microsoft Internet Explorer, the client computer will try to connect to the Internet by using the host computer's shared Internet connection.

To view a video of how to configure the client computer to use the shared Internet connection, click the Play button (Play     button) on the following Windows Media Player viewer:




Note To view this video, you must use Windows Media Player 7.0 or later.

For additional information about how to obtain Windows Media Player version 7.1, click the following article number to view the article in the Microsoft Knowledge Base:
299321 (http://support.microsoft.com/kb/299321/) Description and availability of Windows Media Player 7.1


Troubleshooting

When you turn on Internet Connection Sharing on the host computer, the host computer's LAN adapter is automatically assigned the IP address of 192.168.0.1. Therefore, one of the following situations may occur:
IP address conflict
Each computer on the LAN must have a unique IP address. If more than one computer has the same IP address, an IP conflict occurs, and one of the network adapters turns off until the conflict is resolved. To resolve this conflict, configure the client computer to automatically obtain an IP address, or assign it a unique IP address.
Loss of network connectivity
If your network is configured with a different IP address range than Internet Connection Sharing uses, you will lose network connectivity with the host computer. To resolve this issue, configure the client computers to automatically obtain an IP address, or assign each client computer a unique IP address in the range of 192.168.0.2 to 192.168.0.254.



REFERENCES

For additional information about Internet Connection Sharing, click the following article numbers to view the articles in the Microsoft Knowledge Base:
234815 (http://support.microsoft.com/kb/234815/) Description of Internet Connection Sharing
308552 (http://support.microsoft.com/kb/308552/) Description of the Network Setup Wizard in Windows
308021 (http://support.microsoft.com/kb/308021/) Resources for troubleshooting Internet Connection Sharing in Windows XP
308006 (http://support.microsoft.com/kb/308006/) Troubleshooting Internet Connection Sharing in Windows XP
310563 (http://support.microsoft.com/kb/310563/) Description of Internet Connection Sharing in Windows XP



APPLIES TO
Microsoft Windows XP Professional
Microsoft Windows XP Home Edition


Keywords:
kbhowto kbenv kbarttypeshowme kberrmsg kbhowtomaster kbtshoot KB306126


Provide feedback on this article

Did this article help you solve your problem?
Yes
No
Partially
I do not know yet

Strongly Agree






Strongly Disagree

987654321
The article is easy to understand
The article is accurate
Additional Comments:

To protect your privacy, do not include contact information in your feedback.