Category: Computers Page 1 of 1698

Which tld

Which TLDWhich … domain (TLD) to … Clare Lawrence 10th March 2003 Clare is the CEO of Discount Domains Ltd a leading UK Domain name … … am often asked this …

Which TLD

Which top-level domain (TLD) to choose?

By Clare Lawrence 10th March 2003 Clare is the CEO of Discount Domains Ltd a leading UK Domain name registration service.

I am often asked this question. Is it possible that search engines such as google give preference to the .com TLD? Or are TLD’s all treated equally?

As a test I picked a random phrase “Technical services” and did a search on Google.com.

The results:

1. .org 2. .com 3. .com 4. .net 5. .co.uk

Trying the phrase again using Google.co.uk (I am UK based) .

The results.

1 .net 2 .co.uk 3 .com 4 .co.uk 5 .org

Hopefully these results show that there is no preference given by search engines.

However there are far more .com domains out there than other TLD – users will be more likely to key in your domain name and add the .com extension themselves out of habit.

If your market place is local then your regional TLD can be helpful, this is because a lot of Search engines and Directories such as Google and Yahoo – offer the user a choice of “Search the web” or “Search locally e.g. UK”

Having a local TLD can therefore be a benefit.

Directories

Some directories will use your TLD to categorise the geographic content of your site, and therefore exclude a site from inclusion solely because it does not match their local market.

The Open Directory (Dmoz) lists sites by both regional and market segments as Google uses the Open Directory in part for its indexing – your choice of TLD will have a bearing on whether your site is selected in a local search e.g. Searching Google.co.uk for UK domain name registrars will bring up our site www.discountdomainsuk.com because it is UK based.

The TLD can therefore have some bearing on how a site will be indexed.

Keywords in your domain name

Search engines such as Google do give some preference to keywords within a domain name, and the first keyword in the description and Title tags, so if your site’s domain name is www.searchenginedirectory.biz, your site will most likely fair better in searches for search engines than ones without keywords in the name.

If you do use keywords in your domain name – remember to be careful of trademark issues.

A good source of recent discussions on this topic is Webmasterworld:- www.webmasterworld.com/forum3/16719.htm

You might also want to keep an eye on Google Answers http://answers.google.com , this is a paid service where researchers answers questions on a range of topics including search engines.

If your preferred TLD domain name has been taken by a rival then it is clearly still worth using a different TLD particularly your own regional one.

Duplicate domains

Be careful of having duplicate content on different domain names, as this is seen as “spamming” by Google and can lead you to being penalised or even banned on Google.

Google’s quality guidelines specifically state – Don’t create multiple pages, sub-domains, or domains with substantially duplicate content.

You can however register multiple domain names and use a 301 redirect. Such redirects are recognised as being completely valid.

Protecting your Brand

If you are building a brand it is often good practice to purchase all the TLD’s for your name, once a domain name is registered it can’t be transferred without your permission. If you add web-forwarding to each one of the domain names other than your main site then what ever your customers enters as a TLD they will still find you.

This will also help to protect you against unscrupulous rivals who may register a domain name with the intention of capturing traffic from your site.

Looking for more advice?

We have built up an article bank on our site – many from the leading specialists in each field, please feel free to browse them www.discountdomainsuk.com/glossary.php. The articles cover domain names, web hosting, SEO (Search engine optimisation), e-marketing and much more.

Conclusion

There is no evidence that any preference is given to TLD by search enginesArticle Search, though your choice of TLD name may be influenced by your plans for it.

Source: Free Articles from ArticlesFactory.com

ABOUT THE AUTHOR

Clare Lawrence is CEO of Discount Domains Ltd – A leading UK provider of

Domain name registration services. Please feel free to re-publish this article provided this reference box remains together with a hyperlink to http://www.discountdomainsuk.com










Source: Free Articles from ArticlesFactory.com

ABOUT THE AUTHOR

Clare Lawrence is CEO of Discount Domains Ltd – A leading UK provider of

Domain name registration services. Please feel free to re-publish this article provided this reference box remains together with a hyperlink to http://www.discountdomainsuk.com

Transcendental function programming

… and chess have much in … who delve deep into the … of chess will have … that a single move can alter the entire game. The … go deep. Each …

Programming and chess have much in common.

Those who delve deep into the mysteries of chess will have discovered that a single move can alter the entire game. The ramifications go deep. Each subsequent move (or “ply” in the jargon) is conditional upon what went before, and the great chess-masters of this world pride themselves in being able to evaluate several ply of consequences.

The elegance of a game of chess is estimated from the efficiency by which the player heads towards his goal. No move must be wasted. There must be no hesitation. There must be no turning back to correct an error. In the final stages – the deeper ply – one sees the reasoning behind the earlier, seemingly trivial moves.

Then the game is over. There is a glow of satisfaction, but nothing more. Perhaps, however, there are books written for the guidance of others – that they also may know the feeling of achievement. Yet in the final analysis it is a GAME. Passions may be aroused, devotees may consider it to be a religion, a philosophy, the highest accomplishment of human intellect – and still it is a game.

Machine code programming has all these facets – and delivers a PRODUCT as its goal. It is a game and an industry combined.

The programming of the transcendental functions involves the use of mathematics. There are various polynomials for the creation of sine, cosine, tangent, the logarithm and antilogarithm. Slavish obedience to set rules may well deliver a working product – but is it the BEST?

Can you become a chess master by memorising a book?

Let us consider the McLaurin-Taylor polynomial for the natural antilogarithm. Do you take 1, then add the argument X? Do you now multiply the X by the X and divide by 2 before adding it on? Do you multiply X by X by X, divide by 2, divide by 3, and also add on? Is this the best?

Horner’s rule says you can PRE-divide a large number such as 1 00000000 00000000 00000000 00000000 in binary (FFFFFFFF in Hex, 4294967296 in decimal) by 2, by 3 and so on, and build it into your code. Then the machine does not have to waste time creating constants. The rule also says that you start at the end of the polynomial and work backwards. So if you multiply the last coefficient by X, and add on the penultimate before multiplying again, the last will have X-squared in it whilst the penultimate will have X. So it costs only one addition and one multiplication per term.

But is that the BEST? That depends upon your processor.

Every time you add something to a logarithm it is like multiplying the antilogarithm. Some processors will multiply quickly, others not. So the trick of SHIFTING a number is a good substitute for multiplication. Copy the number. Shift it right. Add the number you first thought of. You have multiplied by ONE-AND-A-HALF without multiplying.

So you can create table of logarithms of one-and-a-half, one-and-a-quarter, one-and-an-eighth and so on. From these you can build an antilogarithm algorithm that differs from McLaurin-Taylor.

And what happens when the number of shifts exceeds half the number of bits in the mathematics? Eureka! an unexpected move! Check Mate.

The program has terminated in only a quarter of the expected time!

Books have been written about chess. Rather fewer have been written about transcendental machine-code mathematics. These things are commercial. They are closely-guarded trade secrets.

I had spent some years developing the most exquisite tricks, and was prepared to write the definitive manual on the subject. However, the British government stole everything from me – leaving me only with the memory of many an elegant “game”.

What should I do? Should I continue to hide my knowledge? No. I hastily put down in writing as many salient points as I could remember. Perforce, these are just summaries of the techniques involved. There was no time to dwell upon detail. However, those who need to know the reasoning behind the inner core of floating point, and have time to delve and ponderFree Reprint Articles, may well find this page to be a treasure-trove of programming ideas.

The algorithms can be seen at http://www.wehner.org/fpoint/

Charles Douglas Wehner

Article Tags:
00000000 00000000

Source: Free Articles from ArticlesFactory.com

ABOUT THE AUTHOR

Born in 1944, Charles Wehner was involved in the design of computers in 1962 before becoming a design engineer and technical author in photoelectrics, nucleonics and radar.










Article Tags:
00000000 00000000

Source: Free Articles from ArticlesFactory.com

ABOUT THE AUTHOR

Born in 1944, Charles Wehner was involved in the design of computers in 1962 before becoming a design engineer and technical author in photoelectrics, nucleonics and radar.

Php in the command line

There’s a single line you can add to your web host’s control panel that will … archive your … CLOSELY AND YOU’LL HEAR THE … run commands in DOS? You’ve used a shell. A

There’s a single line you can add to your web host’s control panel that will automatically archive your content.

LISTEN CLOSELY AND YOU’LL HEAR THE OCEAN

Ever run commands in DOS? You’ve used a shell. A “shell” in the computer world is a place where you enter commands and run files by name rather than clicking around different windows.

Most web hosts let you operate a shell remotely. This means that you can type commands in window on your computer, that are actually run on your web host, thousands of miles away.

I’d like you to log in to your shell now. If you can’t do it by going in to DOS and typing “telnet your.domain.here”, your web host probably uses “SSH” — a secure shell. You’ll have to ask your host how you can log in to the shell, they might tell you to download a program called “PuTTY” and give instructions how to use it.

If you can’t login to your shell, or aren’t allowed, you’ll just have to sit back and watch what I do.

Now that you’re logged in, type: echo hi

On the next line will be printed hi

Try this: date +%Y

This prints the current year. That’s 2004 for me.

So what if we combined the two? Try: echo date +%Y

Well, that doesn’t work, because the computer thinks you’re trying to echo the TEXT “date +%Y” instead of the actual COMMAND. What we have to do here is surround that text in what are called “back quotes”. Unix will evaluate everything enclosed in back quotes (by evaluate, I mean it’ll treat that text as if it were entered as a command.)

Your back quotes key should be located on the upper-left corner of your keyboard, under the Esc button.

PIPE DOWN, OVER THERE…

Type this in: echo `date +%Y`

Gives us “2004”. You could even do something like this: echo `dir`

Which puts the directory listing all on one line.

But now, we put our newfound knowledge to good use. Unix has another neat feature called piping, which means “take everything you would normally output to the screen here, and shove it whatever file I tell you to.” So say I had something like this:

echo “hey” > test.txt

Now type “dir” and you’ll see a new file, test.txt, that wasn’t there before. View it off the web, or FTP it to your computer, do whatever you have to, to read the file. It should contain the word “hey”.

Likewise, dir > test.txt would store the directory listing into “test.txt”.

HERE TODAY, GONE TOMORROW

But say we wanted that text file to be named according to the current date. You already have the pieces to figure all that out, if you think about it. Type: date –help to get a listing of all the possible ways to represent the date. The ones you want to represent the year, month and day are %Y, %m, and %d (capitalization *is* important here).

This is what you want: echo `date +%Y%m%d.html`

Running this today, January 8th, 2004, results in: 20040108.html

I’ve just echoed this year, followed by this month and this day, with an “.html” at the end. This will be our output file.

Now, to pipe it: echo “hey” > `date +%Y%m%d.html`

If this sort of thing were to run every day, it would save “hey” to a file called 20040108.html today, and tomorrow to a file called 20040109.html, then 20040110.html, and so on.

The easy part now, is figuring out what you want archived. I use wget, which takes an option to store the output file, so we don’t need to use piping. Here’s an example of how to use wget to save the page “http://www.google.com” to a file representing today’s date:

wget http://www.google.com –output-document=`date +%Y%m%d.html`

PUT IT TOGETHER

And now, to setup your crontab. I won’t explain how crontabs work, just that they’re the equivalent of the Windows Task Scheduler, which automatically run a particular command at a given date and time. The following will save http://www.google.com to a different filename every day.

0 0 * * * wget http://www.google.com –output-document=`date +%Y%m%d.html` > /dev/null

Keep in mind that if you want to put it in a special directory, just put the path in, i.e. change what’s in the “output document” parameter to: `date +/home/user/wwwroot/your.host/%Y%m%d.html`

I’ve piped the output to /dev/null because wget saves the file for us, and there’s no reason to do anything else with the output.

Tip: Pipe your cron jobs to /dev/null if you aren’t doing anything with the output, because some hosts e-mail you the results and no one needs an extra piece of useless e-mail every day.

Just change http://www.google.com to the page of your choice. However it’s important to know that the “archive” you’re taking will only be a snapshot of that page on a particular day.

What I mean by that is, if you’re archiving a blog page every day, this archiver won’t archive that page on a particular day, it’ll just be archiving what was there at that time. So it’s not useful for everything, but it’s good if you have access to a page that changes constantly, once a day, whose results you’d like to store.

Add that line above into your crontab file. These days every host has a control panel so there should be a place in there to add cron jobs. If you’d like the archiver to run at a time other than midnight, or if it should run weekly, monthly, or whatever, try this tool I’ve made for you:

http://www.robertplank.com/cron

I’ve designed it the same way Task Scheduler is setup, you can enter a certain time, run only on weekdays, run only on certain days of the week. Anything you want.

This tip doesn’t take care of everything… for example, wget won’t save the images on a page unless they’re referenced by full URLs. In the next installment of this article series I’ll be showing you how you can use PHP to make up for some of the things wget can’t do (like grabbing images).

Here’s my solution: http://www.jumpx.com utorials/commandline/get.zip

It’s not the most perfect script in the world, but it should do what you want most of the time. If you’d like to delve into what it does, I’ve added comments within so you can see what it does. I’ve commented all the functions and a few of the important parts of the code.

ARGUMENTS (NOT THE SHOUTING KIND)

But wait, you want to use it in a crontab, which is run from the command line. You can’t just do something like:

php get.php?url=http://www.google.com

Because it’ll try looking for a *file* named all that, complete with the question mark and all. So what if you have ten different URLs to grab off ten different crontabs, but you only want one script.

How would you do all that? It’s a long brutal ordeal so prepare yourself. Ready?

php get.php url=http://www.google.com

Yeah, that’s all there is to it. PHP’s pretty cool like that, it takes the arguments after the file name and stores them in the same array you’d check anyway.

One thing you might notice is that every time you run PHP from the command line, it gives you something like this:

Content-type: text/html
X-Powered-By: PHP/4.3.3

your output here…

Those first couple of lines are the HTTP headers. But we’re not using HTTP (not loading it from a browser), so in the command line it’s better to call php with the “-q” option, like this:

php -q get.php url=http://www.google.com

The “q” stands for quiet, and will refrain from giving you the HTTP headers. If you’re just piping the script to /dev/null (to nothing) in a crontab, it doesn’t really make a difference but you should try to make this a habit when running PHP from the command line.

That’s enough for you to at least get started. If you still feel liking poking about with the things PHP can do in the command line, you can try prompting a user for keyboard input, like this:

$data = fopen(“php://stdin”, “rb”);

while (1==1) {
$chunk = fread($data, 1);
if ($chunk == “
” || $chunk == “
“) break;
$input .= $chunk;
}
fclose($data);

echo “Hello $input!
“;

?>

Remember, that only works when PHP is run from the shell.

If you have PHP installed in Windows on a local machine of yours, you can also see what happens when you try to read (and write) to filehandles like “COM1:” and “LPT1:” … yep, you guessed itFind Article, the serial port and printer port. If PHP isn’t installed on the computer you’re using now then don’t bother. But it is possible to use PHP to print and interact with your peripherals as well.

You’re welcome.

Article Tags:
Command Line, Back Quotes

Source: Free Articles from ArticlesFactory.com

ABOUT THE AUTHOR

Robert Plank is the creator of Lightning Track, Redirect Pro, Rotatorblaze, and others.
An easy way to display the content saved by this article’s script is explained in chapters 15 and 16 of his book, “Simple PHP”: http://www.simplephp.com
You may reprint this article in full in your newsletter or web site.










Article Tags:
Command Line, Back Quotes

Source: Free Articles from ArticlesFactory.com

ABOUT THE AUTHOR

Robert Plank is the creator of Lightning Track, Redirect Pro, Rotatorblaze, and others.
An easy way to display the content saved by this article’s script is explained in chapters 15 and 16 of his book, “Simple PHP”: http://www.simplephp.com
You may reprint this article in full in your newsletter or web site.

Setting up an internet connection

Setting Up An Internet … loss of sanity and … KimmerI know so many people who seem to have a lot of problems when they try setting up an Internet … Some are unfortu

Setting Up An Internet Connection
Without loss of sanity and privacy
Robb Kimmer

I know so many people who seem to have a lot of problems when they try setting up an Internet connection. Some are unfortunate enough to have been the victim of the endless and tedious free CDs that we all receive in our post now and again, or that fall off the front of a magazine, or that we have idly picked up from a local shop counter. The last thing you should do is use one of those to get connected. Really, you should know better! 99% of the CDROM will be stuffed with advertising rubbish and spy-ware that gums up our computers and makes us vulnerable to the advertisers on the Internet. This type of product should be banned, in my opinion. Not only is a CDROM totally unnecessary to get us connected, it is a downright infringement of our privacy. Not to mention the fact that it will impregnate your computer with registry entries and files that will make it virtually impossible to remove without a complete re-installation of your operating system. Watch out for the spam e-mail that you will receive as soon as you log on the World Wide Web, if you have installed the CDROM software.

Besides all this, you will be trapped into using a particular web site as a search point and, to make matters worse, you will find that the software has modified your web browser with all sorts of home-page advertising and a silly spinning logo up at the top right where the Microsoft or Netscape logo used to be. You can remove it, but it does require a registry edit, and that means strong coffee and trembling knees, even for the stout-hearted. You can create your own logo for your web browser. Make something original and pleasing to sooth the stressful wait while those unnecessarily large web pages load.

How can you avoid all this hassle? Simple DIY. Everything you need to set up a connection to the Internet is right there in your operating system. It doesn’t matter which operating system. All the current Microsoft Windows™ operating systems have the necessary software installed ready for you to configure it and get connected. All flavours of Linux have the same type of setup and so does AppleMac’. The principles are all the same, but the method varies from vendor to vendor.

For this article I am going to set out the method for getting an Internet connection set up on a Windows XP Pro™ operating system. The rules and actions for Windows XP™ Home and Windows 2000 Professional™ are pretty much the same. Windows™ ‘95/’98 and Me are very similar and so, to some extent, is Windows™ NT4 Workstation. I am not going to include Windows™ servers as it is unlikely that you would be using a server operating system in a home environment. Plus, you should not set-up an Internet connection of this sort on a network server. Server connections must be secure and protected. The configuration process is far more complex and beyond the home or casual user.

Remember, we are going to do this without any ISP CDROM disks or a safety net. Just hang on tight and follow the instructions carefully and meticulously. You can’t do any great damage and if you do get into a knot, it is fairly easy to back up by simply deleting the connection. Frustration is going to be the big demon in all matters concerning configuring computer services.

What you need:

You must have a computer! It must be running and you must have one of the Microsoft Windows™ operating systems, mentioned previously. You will need a modem, internal or external, (external is best as it is easier to reset if required. An internal modem reset will need a complete computer shutdown), or an ISDN TA, (terminal adapter, needed to connect to your ISDN2e box that BT fitted). The modem/TA will be plugged into the computer via a USB or Serial port connection. You should have the correct cables and connectors supplied with your modem/TA. Look carefully at the instructions and plug everything in. Power up the modem/TA and you should see it do a power-on-self-test. Basically, all the lights on the modem/TA will flash on and off and then settle down to a power-on light and a light that indicates it’s default bandwidth, (probably 56K for a modem).

Now comes the tricky bit. You have to install the modem/TA software connection to the computer. It may be that it has already been installed by your operating system’s Plug and Play technology. That is, when you plugged it in and powered it up, the operating system recognised it and displayed a message telling you it had found the new hardware and was installing the supporting software for you. If it is successful, that will save you the hassle of doing it manually. If it doesn’t you will have to go to Start>Settings>Control Panel>Add/Remove Hardware and double click on the icon. This will launch the Add/Remove Hardware Wizard. Microsoft operating systems are full of Wizards. They are supposed to be helpful? I leave you to judge that one. Once your new hardware has been detected, and providing it is a well known bit of kit and is fairly new, you should have no real hassles other than, possibly, having to supply a disk which contains the ‘drivers’ for the hardware. The drivers are code which the operating system needs to act as a translator between the CPU (computer processing unit, the computer chip) and the modem/TA internal software. Once the drivers are loaded/installed you will be told all is well. If you are having problems finding a driver for your modem/TA from the list in the hardware wizard, locate the Universal drivers and load a 56K driver. It should work fine. You can download a specific driver from the vendor’s web site when we have you up and running further down this page.

Now you have the modem/TA installed it’s a good idea to run a quick diagnostic test to make sure it is working and there are no software problems. Go to Start>Settings>Control Panel>Modems in most Windows™ operating systems. In Windows XP™ the route is a bit more convoluted. You may have to navigate to the Printers and Other Hardware>Phone and Modem Options (!). Once you have found the modem icon or the appropriate icon, double click it and choose the Modems Tab. Then choose Properties and then Diagnostics Tab. You will see a button that is labelled Query Modem. Click it and the system will send a message to interrogate the modem/TA. Lights will flash on the unit and you should see a lot of strange text flow into the box on the screen. That’s it. As long as you get the text everything is fine. No text and you may have to re-install the driver or the hardware. Other information may be available in this dialog box. Such as, the port that the modem is connected to. If it’s a Serial/Com port, say Com 1, and you are having a problem, try setting it to COM 2 and try running the diagnostics again. It usually works second time around. It is possible to set both ports as a connection. You can also choose to turn off the modem/TA speaker if you don’t want to hear that strange squawking sound that a modem/TA makes when it is conversing with the modem at the ISP.

Now you have a working modem/TA you are ready to configure the connection to your ISP.

Connecting up:

First, make sure that there is no other application running on your computer. Check the Task bar. If you see another application, right click it and Close.

You will need to have your ISP dial-up number, account username and password to hand. If you don’t know what these are, just telephone the ISP and they will give you this information. If they say something about not needing it because their CDROM does it all for you automatically, tell them that you want it anyway. Don’t get into a discussion about the configuration of the Internet connection. They won’t understand what you are talking about. Just palm them off with some guff and get the information you want. After all, you only need them to give you access to the Internet/WWW, after that, you don’t need them at all. Your ISP is a simple ‘gateway’ to the Internet, that’s all. They have little else, other than advertising, to offer.

Now we have all the information, grab a quick coffee and then get settled to do the business! Lock the door and ignore all requests for access other than those from angels bearing drinks and snacks. Priorities dear reader, priorities.

With all things ‘computer’ there is always a dozen different ways and routes to achieve the same result. I am going to set out just one way of doing the job. There are others, but I am going to show you the easiest and most practical method.

Right click on the Desktop icon named Network Neighbourhood or My Network Places. Choose Properties and you will see the Create New Connection icon or the New Connection icon. Double click it and a connection Wizard will start.

Now that you have the Wizard on the screen, choose Connect To The Internet. This will lead on to a dialog box that will ask you if you want to Choose From A List Of Service Providers, Use The CD I Got From An ISP or Set Up My Connection Manually. Choose Manually. Next you will be probably be asked which kind of connection you have. Choose to connect using a Modem. This will also be the choice for your ISDN terminal Adapter (TA). You will then be asked which modem you want to use (if you have more than one connected to your computer). You will probably only have one, so select that one. You will be asked to type the name of your ISP or the name of this connection. It’s the same thing. So type something that you will recognise when you want to make a connection. Now you will have to type in the telephone number that your ISP gave you. Just type it right in without any spaces or hyphens. Next you will be presented with a dialog box that will ask you to enter the username and password for the connection. These are your Internet account details that your ISP gave you. Fill in the boxes and make any other choices that are presented to you. If you are using XP uncheck the Firewall checkbox. If you want to use the Microsoft software Firewall, leave the box checked. However, there are far better and more effective Firewall programs to use than the built in software that Microsoft provides. But, the choice is yours. Now you will be at the end of the Wizard and you may be asked if you want a shortcut on your Desktop. Make the choice and click on the Finish button.

Great! If all has configured properly it’s time to test your handiwork. Go to your Desktop and right-click on Network Neighbourhood or My Network Places. Choose Properties and you will see the connections that are currently setup on your computer. You probably only have this one. If you are on a network you will see your Local Area Network connection icon too. Double click on the icon named with the title you gave it during the configuration. The connection box will appear. Make sure that all is as it should be and click Dial. There will be a slight delay and then you will hear the modem dialling out to your ISP. If you muted the modem/TA speaker, you will be able to check that things are happening by watching the LEDs flashing on the front of the modem/TA unit. You will have a bit of a wait while the modems talk to each other and then you should get authenticated onto the ISP’s system. Once that is done you will see a message at the bottom right of your screen that tells you that you are connected and what bandwidth you have been allocated. Start your browser and enjoy.

Notice that your browser is unaltered, you don’t have to go to a special web page and you can use any search engine you like. You won’t have any spy-ware lurking in your system and your ISP will have no control over you and your activities at all.

Just to whet your appetite (but beware)…

If you have a small network at home or at your office, you can configure one computer to provide an Internet connection for all the others and set it up to dial up on demand when someone on another computer starts their web browser. This process is called Internet Connection Sharing and Demand Dialling. Quite a mouthful, but not difficult to set up. However, there are a couple of technical details that you will need to understand concerning protocols. So, be careful if you find yourself trying this out. You may end up losing the connections to your other computers and ruining the network connectivity. To be quite honest, ICS is not a particularly efficient method of multiple Internet connectivity. There are far easier and less fraught ways of providing that kind of service.

Get yourself a PopUp killer and a decent firewall. I suggest Zone Alarm Pro for the firewall. I also suggest that you get a copy of AdAware. It will protect you from spy-ware and other nasties that the bad guys will try and sneak into your operating system when you are on the Web. You can set your browser security to resist cookies and Java. But, that will severely restrict your experience and will stop all the fun animations and the like. So, don’t be too restrictive, just get the right software to protect you, then you can free-up your browser and see and experience all the fantastic stuff that is out there in Web-Land. You can obtain all these applications by entering their names into a search engine, say Google for instanceScience Articles, and you will receive a list of URLs to contact where you can download the Shareware versions to try before you buy.

Source: Free Articles from ArticlesFactory.com

ABOUT THE AUTHOR

Robb Kimmer is an experienced networks system engineer and IT instructor. He has worked for over 14 years in the IT industry in both the UK and USA. He is a member of the British Computer Society Elite Group. Robb writes for several magazines and you can get more information about him on the WWW.










Source: Free Articles from ArticlesFactory.com

ABOUT THE AUTHOR

Robb Kimmer is an experienced networks system engineer and IT instructor. He has worked for over 14 years in the IT industry in both the UK and USA. He is a member of the British Computer Society Elite Group. Robb writes for several magazines and you can get more information about him on the WWW.

Windows xp and 2000 speed up

Top speed Win2000 / XP Always wanted if you could do that … extra to add more speed to you windows 2000 or XP..Then here is an article for you. You can speed up the whole system if you can get

Top speed Win2000 / XP
Always wanted if you could do that something extra to add more speed to you windows 2000 or XP..

Then here is an article for you. You can speed up the whole system if you can get rid of some of the unnecessary services running in the background.

Just follow the instruction of how to go about it and I bet you will be more happy with your windows 2000 / XP box 🙂

What we are going to do is:

Change the startup type of a few unneeded services from Automatic to Manual.

To begin => open the Control Panel => open the Administrative Tools folder => double click the Services tool.

When you see the Services window, set the View to Detail if it isn‘t already.

Click the Startup Type column header to sort the services by Startup Type.

When you do so, all the Services that start automatically will appear at the top of the list.

Now as you run through the list of services on your system whose Startup Type setting is set to Automatic, look for the services listed in Table A and check the conditions. These services are good candidates to be set to a Manual Startup Type.

Table A: Services that can be changed to Manual Startup Types.

Set the following services to manual mode IF

[If you are using your computer as a stand alone personal computer then in all probability most of the conditions are fulfilled ]

DHCP Client You‘re not connecting to a specific DHCP server on your local network
Distributed Link Tracking Client You‘re not connected to a Windows 2000 domain
DNS Client You‘re not connecting to a specific DNS server on your local network
FTP Publishing Service You don‘t need your system to act as an FTP server
IIS Admin Service You don‘t need your system to act as an WWW server
IPSEC Policy Agent You‘re not connected to a Windows 2000 domain
Messenger You‘re not connected to a Windows 2000 domain
Remote Registry Service You don‘t remotely access the Registry of other systems on your local network
RIP Service You don‘t need your system to act as a router
RunAs Service You don‘t use any applications that run as an alias
World Wide Web Publishing Service You don‘t need your system to act as an WWW server

If you find a match and think that your system doesn‘t need that particular service, right-click on the service and choose the Properties command from the shortcut menu. When you see the Properties dialog box for that service, click the Startup Type drop down list and select Manual. Then click OK. As you change the Startup Type for any service, take note of the service‘s name. That way you‘ll have a record of which services you changed and can change them back if you need to.

Note: I also offer few utilities for FREE to download from my personal site which u might find very useful. PLease mail me at : ttaabbiisshh@hotmail.com for the download site address..

Last changed: 01/18/2004Find Article, 21:38:38

Article Tags:
Windows 2000 Domain, Windows 2000, Startup Type, Client You‘re, Local Network, 2000 Domain, Don‘t Need

Source: Free Articles from ArticlesFactory.com

ABOUT THE AUTHOR

MBA (Telecom management) presently enrolled
BTech (Mechatronics)2002










Article Tags:
Windows 2000 Domain, Windows 2000, Startup Type, Client You‘re, Local Network, 2000 Domain, Don‘t Need

Source: Free Articles from ArticlesFactory.com

ABOUT THE AUTHOR

MBA (Telecom management) presently enrolled
BTech (Mechatronics)2002

Installing new software is risky

When you get a new computer, you’ll want to install yourfavorite software and get everything running just the way youwant it to. Then you’ll likely add some new stuff, possibly over a period of the next couple of months. Beyond this point,hesitate to add more. Here’s why.

When you get a new computer, you’ll want to install yourfavorite software and get everything running just the way youwant it to. Then you’ll likely add some new stuff, possibly over a period of the next couple of months. Beyond this point,hesitate to add more. Here’s why.

Shared Library Files

Many software firms use DLL (Dynamic Linked Libraries) indeveloping programs. They are kind of like a tool box from whichthe programmer chooses the one needed. Even though the programbeing created may need only a couple of “tools” from this DLL,using them saves programming time, which is expensive. This is a safe and efficient procedure, for the code in the library is well tested and will run reliably.

Other software developers use the same library. Some DLLsare used in many programs. For you, this means less disk spacerequired on your system, for only one copy of the library isneeded.

You also benefit in that you pay less for the software and it runs reliably. It’s hard to see anything negative in such a procedure. Or in software using any other shared procedures.For example, you might have several programs that use a common routine that is part of connecting your system to the Web over a phone line.

All About Versions

Most companies developing software will use the latestversion of a DLL. It contains changes and enhancements over earlier ones. Thus differences exist between them.

This is true of different versions of other software. Thelatest version of IE (Internet Explorer), for example, containschanges and enhancements over the previous one. Migrating from the current version to the latest, can mean installing whatamounts to almost a new program.

The Catch In Upgrading Or Installing Software

When you install an upgrade or a new piece of software, anyDLLs used will also be installed. Windows makes the rules inthis. An older version of a DLL is not allowed to overwrite alater one. But a newer one IS allowed to overwrite an older one. Here’s how things can go wrong.

Suppose you have a program call SPLAT, another called SPRANG,and a third call SPUNK. Suppose they all use a DLL called STUFF. If you upgrade SPUNK, and the upgrade includes a new version ofSTUFF, then quite suddenly SPLAT and SPRANG may not run properly. That is, they are now forced to use a version of STUFF theprogrammer had not planed for.

While it’s quite likely a new DLL will run just fine witholder programs, it may not. If your older programs won’t runwell enough to suit your needs, you may be forced to upgrade tolater versions. Unfortunately, this may not solve the problem if the older DLL is still in use.

A Horror Story

I personally do not install upgrades unless literally forced to do so. (And I do not install new software except when absolutely required.) Some time back while using an earlier version of IE, I was forced to upgrade. The results were disastrous.

I first tried upgrading IE to the latest version, 5.5. But I never could get it to run. I dropped back to version 5.1, which ran, but unpredictably.

My system became unstable. Lots of memory collisions (GPFs)that crashed some program maybe two dozen times a day. Even IEwas not running properly and became the program most likely tocrash. Other stuff was happening that required restarting thecomputer 5-6 times each day. If you have been there, you knowhow much this slows you down.

Further, several of the programs I use routinely, such asEudora, began failing with troubling regularity. And two wouldno longer run at all.

My only option was to retire a perfectly good computer lessthan two years old and buy a new one. Then install all thelatest software all at once. This meant chucking some stuff I liked, then hunting up replacements. Both time consuming and tedious.

So What Went Wrong?

I have no idea, really. But the most likely cause of thisfailure was in overwriting one or more DLLs with later versionsrequired by IE that my other software could not handle. That is,my other programs were designed to run on the previous versions,not the latest.

What This Means To You

If you are a casual user of your computer, and load upsomething new about once a month, the chances are you will neverface the problem described above. The worst that is likely tohappen is that as new software is added, older programs do notrun in quite the same way.

If you are a serious computer user, and depend upon one as an integral part of your business, take the position you won’tupgrade or install new software unless you are absolutely forcedto do so.

My tale is not an isolated case. All heavy users ofcontemporary PCs have had this experience, even if not quite so severe.

If you need a program, by all means install it and go. But be hesitant in playing the gameComputer Technology Articles, “I think I’ll try this.” Why risk it?

Article Tags:
Other Software

Source: Free Articles from ArticlesFactory.com

ABOUT THE AUTHOR

Bob McElwain
Want to build a winning site? Improve one you already
have? Fix one that’s busted? Get ANSWERS. Subscribe
to “STAT News” now! mailto:join-stat@lyris.dundee.net
Web marketing and consulting since 1993
Site:
Phone: 209-742-6349

Bob McElwain
Want to build a winning site? Improve one you already
have? Fix one that’s busted? Get ANSWERS. Subscribe
to “STAT News” now! mailto:join-stat@lyris.dundee.net
Web marketing and consulting since 1993
Site:
Phone: 209-742-6349

The trials and tribulations of a confused computer

During a recent period of the fretted PC … realize that I took my computer for … the high tech machine would never let me downand I wasnever further from the truth. Just

During a recent period of the fretted PC breakdown,I
came
to realize that I took my computer for granted.I
thought the high tech machine would never let me down
and I was
never further from the truth. Just when I thought
things were going smoothly,”BANG”,I was in deep
trouble.

Home-based businesses should be aware that computer
down time can and will mess up your schedule.After only
a week,I was behind and a bit discouraged to say the
least. I was lucky enough to be able to fix my pc
myself,but this isn’t always the case. Sometimes it
takes an expert to bail you out and it can be costly.
Professionals charge $50.00 per hour,and up, to find
and correct problems. It may be wise to stash a bit in
the bank for such an occasion.

I found backing up your files is of the utmost
importance.
Store your important pieces on floppy or Cd-Rom.
Do not wait too long and be sure to format those
floppies.
I stored information on a floppy and found after I was
back to normal, the floppy was no good and would not
open my files.
Never store a program on a floppy, it will not work
properly when you try it. Programs must be reinstalled.
A good example is Aureate Group Mail or something you
downloaded online.
If you have an opt-in list,that can be saved to floppy.

Think you know your computer? Take a look at its
contents. Go to my computer, C drive, Wow,I was amazed
at the contents and the worst of it was I did not know
what everything was.
Another great place to see the internal contents of
your computer is the Control Panel, Go to my
computer,control panel,system, and device manager. This
place is a maze of high tech content. Do not change
anything unless you know what you are doing. The
results can be disastrous.
I have had my share of problems with down time,ranging
from installing anew Cd-rom, to blowing dust from my
tower. Yes, dust is a common culprit! Fans get clogged
with dust quickly,and the result is overheated
components and leads to computer failure.I blow out the
dust using a vacuum cleaner and also being careful not
to disturb delicate parts.

PC problems sometimes develop from a loose connection.
It may be a cord or a circuit board within the tower.
Gently pushing in a loose connection may solve a
problem.

Booting into the safe mode is a safe way to fix
problems.
When booting, after the start up screen,pressing Ctrl,
puts the pc in this mode with internet access, and many
programs disabled, so the problem can be found and
corrected.

Running disc cleanup, scandisk and defragmenter
regularly is a must.
Keep your recycle bin emptied, and the cache of your
browsers cleaned.

Downloading too many programs and files can be a
hazard. Games the kids like to play require alot of
hard drive with their special effects,graphics and
colors.

Updating programs help out alot and often results in
faster load time, and keeps up with technology.
Windows updates are included in the start menu. Many
programs have updates files included.
Another important update is the antivirus software. New
viruses are discovered every day and your antivirus
program needs to cover new and potentially harmful
viruses. This is another great way to lose important
data and wipe out your whole system.

Email is the culprit for unwanted viruses. Never open
an email if you do not know where/who it is from and
beware of attachments. Always
scan your mail before opening,if your unsure of the
content….DELETE IT!

Starting from scratch is not fun and may take several
days to accomplish. Reloading programs back into the
computer is time consuming and usually requires
technical assistance. Check your warranty for
additional information. If you are out of warranty, you
may have to pay for repairs.

Additional hardware cause problems too, such as a
backup unit for power outages,scanners, and printers.
Be sure to service these often,check for wear and
upgrade when needed.

I have an additional comment for those of you that want
to save money, be aware those universal ink printer
refills for any printer may not work for your printer.
I thought I was saving money and the results were a
damaged printer,thus repairs. In my case, not only did
I get ink all
over my hands, ink leaked into my printer from the
cartridge and caused the damage. You are much better
off paying for the cartridge that goes with the
printer, than trying to save money and end up paying 3
times the cost in repairs.
Last but not least….again…NeverScience Articles, ever think your
computer is not vulnerable to sickness..Some never
recover!

Source: Free Articles from ArticlesFactory.com

ABOUT THE AUTHOR

Donna Sweat
Publisher/Editor
Dee’s Helpful Info.
Endless Mts.Home Business
New Albany,PA.18833
http://www.homebiz.pa.32668.com










Source: Free Articles from ArticlesFactory.com

ABOUT THE AUTHOR

Donna Sweat
Publisher/Editor
Dee’s Helpful Info.
Endless Mts.Home Business
New Albany,PA.18833
http://www.homebiz.pa.32668.com

The single least expensive yet most valuable way to upgrade your computers performance

Is your computer not what it used to be? I betwhen you bought it, it was top of the line, … Well, I can almost … it’s not … the current rate of … it …

Is your computer not what it used to be? I bet
when you bought it, it was top of the line, wasn’t
it? Well, I can almost guarantee it’s not anymore!
At the current rate of development, it probably
lacked the most modern advances by the time you
got it out of box.

If you’re like me, you can’t buy a new computer
everytime some new feature is released. But there
is a way to quickly triple your clockspeed (that means
how fast it runs).

How? Upgrade the RAM. RAM stands for Random Access
Memory, and to make a long story short, the more you
have, the faster your computer runs. It also makes
multi-tasking much easier. Doubling the RAM in your
PC can triple the speed of your computer.

You can get 256 MB of RAM for about 40 bucks. A couple
of places online are crucial.com and kingston.com.
Crucial even has an onsite configurator that will tell
you EXACTLY what your computer uses.

And don’t be afraid of installation. I had never
installed ANYTHING before, and I had it installed in
under 5 minutes!

So upgrade your computerBusiness Management Articles, and enjoy!

Source: Free Articles from ArticlesFactory.com

ABOUT THE AUTHOR

Dennis Eppestine holds degrees in Business Administration
and Engineering, and operates his own website at
http://www.products4profits.com










Source: Free Articles from ArticlesFactory.com

ABOUT THE AUTHOR

Dennis Eppestine holds degrees in Business Administration
and Engineering, and operates his own website at
http://www.products4profits.com

Cure for illegal operations sydrome

“You have … an ILLEGAL … the program will be shut down!” But I didn’t do … Really, I was just sitting here. :-(You did update Windows, … have the current drivers for a

“You have performed an ILLEGAL OPERATION,
the program will be shut down!” But I didn’t do anything!
Really, I was just sitting here. 🙁

You did update Windows, right?
And have the current drivers for all of your other hardware and
software, don’t you? How important is it? Well if you are
experiencing a lot of crashes this may just be the cure. Very
few people understand what happens in Windows when you install
new software and hardware. Since Bill Gates wants to be the
boss, obviously he put everything into Windows to make it work
with Microsoft products.

Now all the other companies that sell you things have to make
theirs for the Gates configuration. Some are not too good at it
and some are just careless. For those you get the Blue Screen of
Death. Ever see this one?

“You have performed an ILLEGAL OPERATION, the program will be
shut down!”? Then a whole bunch of numbers and stuff even a
Geek may not understand.

Well it is really a simple matter of shared files not getting
along in your Puter. One says “I am going to decide how this
operation is done” and the other one says “no you’re not!”
So the one with the newest info may win but you get blamed for
it because the program didn’t do it the “Gates Way” and the
result is that the program could not start.

Now you get a new program out of the box, put it on your Puter
and guess what? The program probably has a whole ton of updates
available to make it get along with Windows. Windows has a whole
bunch of new updates to screw with the other companies but “You
performed an ILLEGAL OPERATION”. Feel a little insulted? I do.
Then there are some companies that really don’t want your Puter
to cooperate with Windows. They want a piece of the Giant and
guess who pays for it? Yup, we do.

I won’t mention any names but AOL and Netscape are 2 of the
biggest offenders. After that comes Real Player and a list a
mile long. But let’s not make the problem too simple. Several
companies are out to get each other and at your expense. Yeah,
right. They tell you it is someone else that is the cause and
that company swears that it is another one. So here you are
caught in the middle and nobody has bothered to tell you that
something as simple as downloading the latest updates and
drivers just might solve the problems they are busy blaming each
other for.

Here are a couple of solutions for you. First try and find out
what all your hardware is. Printers are easy, the name and model
are on the front. But what about your CD ROM, Audio System, and
monitor? A lot of times, they just don’t have that information
available. Yup even keyboards can have updated drivers. Drivers?
Updates? Hardware? Software?.

All of your Hardware runs with Drivers. You can find out the
model information and a lot more about them from the “Control
Panel”. From your START button find SETTINGS, click on that then
CONTOL PANEL. Once in the CONTROL PANEL scroll down to
SYSTEM and double click. The first window will give you the
information on the maker of the Puter and Processor plus how
much Memory you have installed and the version of Windows
you have.

Next click on the DEVICE MANAGER tab. You will see a listing of
the DEVICES in your Puter. By clicking the + beside each item you
can see what you need to find out what the product is. You don’t
need to open the SYSTEM DEVICES unless you are just curious. Now
you get to play detective. Go get em, Columbo!

In most cases you can just do a search for the manufacturer and
go straight to their site. Drivers will usually be found under
SUPPORT and should have download and installation instructions.
You should check for updates at least every 6 to 8 weeks if not
more often. Software updates are not as hard. Most of the
programs have a link in the Help menu to go to their site and
some even have an update link.

But before you start updating 3rd party software
(Not Microsoft), you should get the latest updates for your
version of Windows. Hey, guess what? Gates made this one easy!

Click on the START button then go up near the top of the column
and you will see Windows Update. Sheer genius! Just click it.
You will have to be connected to the Internet first. When the
browser opens just click on the Products Updates and your Puter
will be searched for what needs to be updated. From there it is
only a matter of following pretty simple instructions (simple?
from Microsoft?). It really is pretty easy to do.

One more little thing before I leave you with all this
confusion. I use a program for all my Software that isn’t
Microsoft from ZDNet called, you guessed it, Updates.
http://updates.cnet.com
There is a small download and then it will search your hard ‘
drive and give you a report of all available updates for your
software then the option to download the updates. Best of all
it is FREE! Subscribe, download the program, get your
updates and they will e-mail you a reminder to keep up with
them.

Your life will be a lot easier and maybe you won’t see so many of
“The Blue Screen of Death” or “You have performed an ILLEGAL
OPERATIONFree Web Content, the program will be shut down!” Cause ya didn’t. It
ain’t your fault.

Article Tags:
Have Performed, Illegal Operation, Shut Down

Source: Free Articles from ArticlesFactory.com

ABOUT THE AUTHOR

Mike Smith, of CM/YMTC,
http://cmymtc.com, is an experienced site designer, writer,
and master in Ebook and Ezine creation and marketing.
His affordable products give the Ebusiness owner
every tool to be successful. Share in the profits
with his Affiliate programs –
http://www.makemoneyhowto.com/clkbnksale1.htm
http://www.cmymtc.com/adsalespage.htm










Article Tags:
Have Performed, Illegal Operation, Shut Down

Source: Free Articles from ArticlesFactory.com

ABOUT THE AUTHOR

Mike Smith, of CM/YMTC,
http://cmymtc.com, is an experienced site designer, writer,
and master in Ebook and Ezine creation and marketing.
His affordable products give the Ebusiness owner
every tool to be successful. Share in the profits
with his Affiliate programs –
http://www.makemoneyhowto.com/clkbnksale1.htm
http://www.cmymtc.com/adsalespage.htm

Warning do not buy a computer until you read this

On a perfect summer day in 1997, life as I knew it … forever. I lost all trust in the human race, andfelt my life was over — but I vowed to seek vendetta inthe most violent way. Yes, the tas

On a perfect summer day in 1997, life as I knew it was
changed forever. I lost all trust in the human race, and
felt my life was over — but I vowed to seek vendetta in
the most violent way. Yes, the taste of blood was in my
mouth…

Okay, so maybe it wasn’t quite as melodramatic as all that
– but I sure was seething mad.

I had been ripped off to the tune of $2800 by a scam artist
who “sold” me a Gateway laptop over the Internet.

I’d tell you the details, but they’re just too painful to
relive. And frankly, I feel more than a little embarrassed
for being conned.

After that distasteful experience, I embarked on a personal
crusade not only to expose the deceptive sales practices in
the computer industry, but also to scour the globe for the
best computer deals in the world.

I voraciously read computer manuals, specs, ads — and
scrutinized anything that even remotely resembled a PC. My
brain became the Geiger counter for computer-buying
information.

As a result, I’ve become the Head Purchasing Manager for a
worldwide non-profit organization consisting of 7000+
members – in charge of purchasing computer equipment for
overseas branches in South Korea, Russia, the Philippines,
China, Japan, Indonesia, Malaysia, and Europe.

But I’m getting ahead of myself. Flashback to 1997.

Back then, I learned quite a few things about
computer-buying that very few people on this planet know
about. I’m going to reveal some sneaky — and in some
instances, illegal — things that computer vendors do to
bilk you out of your hard earned cash.

1) Bait and Switch – Computer vendors generally resort to
any means to get you to their website or store first. The
most common way is to lure you there with the promise of
the lowest prices. When you fall for the bait, and visit
their website or store, you’ll find that their prices are
higher than they advertised. They feed you the story that
the advertised price was last week’s price, or that price
doesn’t include this component or that peripheral. Vendors
do this because, in the highly competitive business of
computer sales, this is sometimes the only way they get a
shot at showing you their wares. Then, they do the usual
song-and-dance routine: “But while you’re here, have I got
a deal for you…” hoping you won’t go looking elsewhere.

2) Bankruptcy Routine – This trick consists of opening a
‘new’ computer outlet, selling product for a few months,
shipping only a portion of the orders, and then declaring
bankruptcy and taking most of the customer’s money. The
people who do this are real crooks, and typically engage in
this practice many times.

3) Opportunistic Pricing – This is something very few
people know about. Mail order companies change their prices
and specifications regularly. They have a complex pricing
policy where they employ experts whose only job is to
determine exactly how much the market will be willing to
pay for a specific model.

4) Delayed Shipments – Some firms charge your credit card,
and ship your order within a week — but since it is a
legal requirement that the goods are shipped to you within
30 days, it could take all of 30 days before your goods
leave their warehouse. And you may not be able to cancel
your order. They are, of course, earning interest on your
money.

5) Shared Memory – As a cost cutting measure, some systems
are designed for the video card to share memory with the
system itself and not to have its own dedicated memory.
Therefore a system with 64 MB RAM advertised with a 4 MB
card has only 60 MB of free RAM after the video card’s
requirements. On budget systems, this is common but you
should be told about it. You could end up buying a computer
that has 64 MB of RAM and then find that you only really
have 58 MB — and you can’t run a program that needs 64MB.

6) What You See Isn’t What You Get – As the components that
go into a machine are numerous and constantly changing, you
may find that the machine you receive is rarely the exact
machine you ordered. These differences are caused by the
frequent non-availability of various components.
Additionally, some big name mail order firms’ sales reps
get into the habit of “forgetting” what price they gave you
for the equipment you asked for – and, as a result, you get
sent a system that’s missing parts that you wanted.

Now, before you go running to the first “reputable”
computer store thinking it’s your safest bet, you have to
know that those big players also have a slew of deceptive
practices up their sleeves. Furthermore, they go to great
lengths to hire professional salespeople. Quite frankly,
unless you’re one of the small percentage of people who
possess computer-buying savvy, you are putty in the hands
of trained computer salespeople. They know exactly how to
manipulate you, entice you, allay your fears and, most
importantly, close the deal. How about you – are you a
trained computer buyer?

Do you know for instance….

…what day of the week it’s best to buy a computer to get
the best prices?

…the closely-guarded tactic to saving at least $500 on your
next computer purchase?

…what advertised feature you should never pay a single dime
for when buying a computer?

…when it’s OK to buy “clones” or generic brands?

…why you should beware of advertisements that scream “Free
Printer”, “Free Scanner” and “Free Software”?

My friend, Mark Joyner, and I reveal those secrets for free
in another article located here:

http://www.roibot.com k_cbsr.cgi?cbsrfreecontent

I don’t want you thinking there are no happy endings in the
world of computer buying. It’s absolutely mind-blowing what
astronomical margins some firms make on PCs, and how
incredibly simple it is for buyers to get huge discounts on
those prices – if they know how.

Epilogue: I have a recent success story of my own to tell.
I just bought myself a new laptop — a beautiful IBM
Thinkpad T20 with all the bells and whistles at about $1400
below listed price!

All I can say isFree Web Content, beating the computer bullies at their own
game is the best revenge.

Source: Free Articles from ArticlesFactory.com

ABOUT THE AUTHOR

Helen Cho is the author of “Computer Buying Secrets
Revealed!”, the only book of its kind that shows how anyone
can save at least $500 on their next computer purchase:
http://www.roibot.com/tk_cbsr.cgi?cbsrfreecontent










Source: Free Articles from ArticlesFactory.com

ABOUT THE AUTHOR

Helen Cho is the author of “Computer Buying Secrets
Revealed!”, the only book of its kind that shows how anyone
can save at least $500 on their next computer purchase:
http://www.roibot.com/tk_cbsr.cgi?cbsrfreecontent

Page 1 of 1698

Powered by WordPress & Theme by Anders Norén