Sponsored links

How to reset printer

Saturday, May 28, 2011

Resetting an HP laser printer

There is a technique known as cold resetting. It basically will set all your HP printer settings to the factory default levels. It is important to note that any settings made at the control panel of your printer are going to be reset. Hence, in case you happen to have a JetDirect card then even the IP address will be reset to the factory defaults. You can try to reset NVRAM. To do this, switch off your HP printer and then hold down the ‘Go’ key for around 20 seconds while switching the printer back on again.

- HP 1200 and 1100 models resetting: To do this, simply change the data by going into the service mode. This is applicable if your HP printer has a display panel. Otherwise you need to hold down the ‘Go’ button for around 5 seconds while the printer is switched on.

- HP 2100 printer resetting: You need to press the ‘job cancel’ key after switching off the printer. Then switch the printer on and only then release the key called ‘job cancel.’
Read more articles
Overview of Modern Printers and HP, Dell and Brother Printer Support
The Positive Side of Remanufactured Printer Toner Cartridges and Printer Cartridges
Online Tech Support for Printers – An Overview
Overview of Printers – Solving Dell Printer Repair Issues and Others

- HP 2200 printer resetting: Switch off your printer and then hold down the ‘Go’ key. Switch back the printer on while holding the ‘Go’ button till the light comes on. Then release the button.

- HP 6P and 5P models resetting: Switch off your printer and then press the ‘reset’ button and within 20 seconds switch on the printer back again.

Resetting a Dell printer

You can reset your Dell printer fairly easily by simply double-clicking on the ‘Reset Dell Printer’ icon. You can reach this icon by clicking on the folder ‘UAN’, then clicking on ‘System Utilities’ and you should find the icon. However, one word of caution – this method will function only if the USB cable has been directly connected from the PC to the printer.

Resetting a Lexmark printer
You will firstly need to switch off your printer. Then simultaneously press the RETURN and READY keys while switching the printer on. This will take you to the Diagnostics Mode. The display unit will show the message ‘Performing self test’. Choose ‘Maintenance count’. Reset the count to make it zero. Then select the RETURN key and go back Diagnostics Mode. Then you can reset the printer to go back to the normal mode.

Resetting Brother Printer
You need to keep pressing the DOWN or UP keys a couple of times till you see ‘Maintenance 99’ displayed on the display. Then hold down the ‘Set’ button to go to standby mode. Please note that if you press the exit key only after typing in a single digit then the machine goes to maintenance mode in initial stages.

Resetting Samsung printer
You need to press the following keys in quick succession – MENU # 1 9 3 4. Then you should see a message on your display saying ‘TECH.’ Then again select the MENU key followed by ENTER. The display will now show ‘TECH MODE.’ Then select the ‘<’ key two times. Your operator panel should show ‘NEW CARTRIDGE’. Then select ENTER. Now the panel will show [YES]. Select ENTER key again. You can exit from this mode by pressing MENU # 1 9 3 4 again one after another. Read more: http://www.articlesbase.com/hardware-articles/how-to-reset-your-printer-troubleshooting-for-resetting-your-hp-dell-lexmark-brother-or-samsung-printers-362933.html#ixzz1NRMfwAsi Under Creative Commons License: Attribution
Read More...

Ipod nano

Thursday, May 26, 2011

In this age in time, numerous men and women have been provided prompt entry to new music through the creation of mp3s and mp4s exclusively the iPod Nano. This digital media player was formally designed and copyrighted by the organization Apple. This iPod design was the successor of the iPod Mini which was between the incredibly first batch of mp3s released by its manufacturing provider. Previously considering that the Nano's introduction to the earth market, the consumers' specification requirements changed and advanced into far more difficult concepts, which is why this distinct design like several other iPods underwent cosmetic, application, and hardware improvements above the a long time and at this time, Apple is now serving the sixth era iPod Nano.
Water for Elephants


Ahead of the iPod Nano's up to date and present-day capabilities which are now what people are raving for, its noticeable attribute was its entire body dimensions. This songs gadget was incredibly thin and compact that you can have it with you wherever you go devoid of obtaining to be troubled about carrying an added load. Also, this product was also a hit to fitness lovers for the reason that they were presently in a position to jog and do aerobic exercising when listening to their favourite songs, all they necessary to purchases was an excess accessory which is an armband which homes the iPod securely and they're all set to go.

As stated earlier, the iPod Nano underwent particular changes in each era that went by. When the 2nd generation was released, customer demands enhanced by a outstanding proportion simply because this product was again lighter in bodyweight than the previous design in addition, other specs ended up enhanced like the human body substance, the exhibit settings, the battery daily life, and the storage measurements, and there were also extra capabilities like uncomplicated lookup solutions. Immediately after a couple of months, the 3rd generation Nano was released. This model was scaled-down in body dimensions but had a even larger display that all the prior versions. In this era, end users had been definitely in a position to check out total duration videos, and cover movement exhibit for each and every song or album was definitely attainable. Mainly because of this added feature, the battery daily life was all over again remodeled creating it previous for a lot more than 24 hrs of steady use. After one particular yr, Apple went back again to the previous iPod Nano form which was rectangular. This new generation iPod was provided two thumbs-up by critics for the reason that of its one particular of a variety characteristics which integrated the accelerometer that allowed music lovers to alter the music and the album cover by just shaking the gadget. The fifth generation Nano was aesthetically the exact as the former product but the most impressive attribute that it has which also surpassed even the other iPod models was it video taking capability. It was the initial iPod design with a developed-in digital camera.



The most up-to-date design which is the iPod Nano sixth generation became a great deal smaller than all the previous designs, but it now has the touchscreen ability for the reason that the full gadget is a screen. In conjunction with this, the extra functions in the other types like video clip taking capabilities, and voice recording talents were not introduced through to this newest Nano model.

Harry Potter and the Deathly Hallows, Part 1

Read More...

file Recovery 101

Wednesday, May 25, 2011

Digital storage device is a broad term for any type of electronic device that can have data saved onto it for later use. Common devices falling under this category are: USB flash drives, SD cards, XD cards, SSD drives, and hard drives. Chances are, if you own a computer, you own at least one of these devices. While we all would like to believe that these devices are 100% reliable, this is most certianly not the case. Unfortunately, when these devices break or fail, immediate panic ensues; this is largely due to the fact that most people have no idea what to do. Whether you ran over your flash drive, dropped your camera in the toilet, or you recieved one of the many terrifying error messages, stop hyperventalating and keep reading.

Step 1 - Is it Really Broken?

Physical damage and internal corruption of a device can happen in an endless number of ways, but understanding the potential problem can save you time and money. For a device that has been physically damaged or subjected to water, a simple analysis of the internal components can help determine the next step. If the outer casing is still intact, take a screwdriver or a razor and carefully remove it. Set the casing aside and inspect the now naked device for any signs of cracks, burns, or missing parts. If the device is a flash drive, there are 4 main components to look at in particular, the silver usb adapter that plugs into the computer, a green circuit board, a large black chip, and a smaller black chip. The large black chip is called the NAND chip, and this is the memory unit holding all of the data stored on the device. The smaller black chip is called the controller, and it works directly with the NAND chip in order to interpret the data stored on it. If there is any damage to these components, the help of a professional data recovery company is required; if the NAND chip is cracked or broken, say a little prayer for your drive and bury it in the backyard. If a device has been subjected to water, let it dry completely before attempting to plug it into a computer.
Read more articles

Restore Memory Card Pictures
How to get back deleted data from different storages media devices
Recover Deleted Digital Photos
File Recovery Questions & Answers

Internal corruption often appears in the form of error messages. The 2 most common messages include: "this device is not recognized," and "this device needs to be formatted." In the case of the latter message, NEVER reformat your device if it has important data on it; this will make the files impossible to recover.

Step 2 - Finding the Right Data Recovery Company:

The best place to go for data recovery service is the place with the most experience. Thankfully the internet allows us to see details about a particular website and/or company, making it easier to sort out the newbies from the veterans. It's generally safe to say a company that has been in business for over 5 years has a good understanding of their industry. Data recovery companies are like a fine wine, they only get better with age; they refine new techniques and acquire the latest technologies while the newer companies are left learning the ropes through trial and error.

While the age of a company in this industry is an important variable, doing a little research can also determine the quality and reputation of their services. Press articles and consumer testimonials can be deciding factors in choosing the right one. Referrals or commendations from federal agencies and huge corporations are good things to look for. If an organization like NASA trusts their stuff with a company, chances are it's a safe bet. A good example of this is the commendation given to the company eProvided Data Recovery for their support in recovering the mission data from the prototype Helios aircraft after it crash landed into the Pacific Ocean.

Pricing is, and forever will be, a factor in any kind of service. There are masses of data recovery companies out there that will try and lure you in with flat rate pricing. While this may seem attractive, you'll either be overpaying for a simple recovery that requires little work, or they wont recover your data if it takes too many hours of work. Data recovery works best with variable pricing; simple recoveries from a company like eProvided cost as little as $20, and they offer pricing options to fit any budget if the device requires more advanced methods of recovery.

Read More...

Virus And How To Handling

Tuesday, May 24, 2011


A. Understanding Viruses

Computer virus is a small program which is designed to be spread from one computer to another and disrupt / hinder the infected computer's operating system.computer virus can also damage or delete data and files from an infected computer.Then by using the computer email system computer virus will spread itself via e-mail list from that computer.

Computer viruses spread most easily through email. That is why it is important to not open an email attachment from someone you do not know unless an email from someone who did you expect / wait for email. Computer Viruses can be disguised / camouflaged as an attachment to an email in the form of image files, greeting cards, and can also masquerade as video files and even pdf file. The virus can also spread through downloads - download on the Internet. They are hidden in the files downloaded are as dark passenger.

In order to avoid computer viruses, it is important to always keep your computer from virus attacks the computer by using anti-virus software current. It is important also to have the most updated information about new computer virus threats, and you should always be vigilant and adhere to basic rules when browsing the Internet, do not download files from websites that are not clear and not open an email attachment from someone you do not know . Because, once your computer is infected with a computer virus, then the result can be fatal.

B. How Computer Viruses Work by Type

Virus is a computer program that has the ability to destroy files or damage a computer system. Viruses have many different types and has a way of working is different, the following types of viruses and how each virus:

1. Virus Files
This virus has infected the workings of an existing application or document on your computer. When an infected application is executed, the virus will spread by infecting files or documents accessed by the application.

2. Boot Sector Virus
This virus has a way of working that is infecting the hard disk boot sector (boot sector is an area in the hard drive is accessible when the computer is first turned on). If the boot sector virus is active, users will not be booting the computer normally.

3. E-mail Virus
This virus has a way of working that is spread via e-mail (usually in the form of attached files / attachments). The virus has a special characteristic of the extension. Scr,. Exe,. PIF, or. Bat. If the virus is active, it will transmit itself to the various e- mail addresses contained in the user's address book.

4. Multipartite Virus
This virus has a way of working that infects computer files on the hard disk boot sector as well. This type of virus will cause many problems because it causes a fatal damage.

5. Polymorphic virus
This virus has a unique way of working with this virus can change the code itself (change form) while spreading itself to other computers Virus type more difficult to detect because they have such properties.

6. Virus Beast (stealth virus)
This virus has a way of working that is he able to hide himself by making an infected file as if the file is not infected.

7. Macro Virus
This virus has a way of working which infect Microsoft Office applications, such as Word and Excel. Documents are usually infected by Macro Virus will modify the existing command in Microsoft Office such as the "Save" to spread itself when the command is run.


C. Kind Of Viruses and How Abatement

1. Virus: Storm Worm is a virus that emerged in 2006, the Storm Worm is a nickname that is given by the company in Finlanddia F-Secure, Strom This worm spreads via email with the title "230 dead as storm betters Europe" Storm worm is Trojan House is a program of several versions to make the bots or making computer into an automatic email spam, the Storm Worm accounted for 8% of all malware infections globally. Used Anti-virus: BitDefender Antivirus (www.bitdefender.com)

2. Virus: Leap-A/Oompa- A is a virus that attacks the Mac Os oprasi system capable of sending messages to all contacts you have in iChat, the virus has entered through iChat JPEG format, virus Leap-A or Oompa-A is not dangerous enough but in this age teryata anyone can create a virus that can penetrate even the Mac OS on a Mac Os Os have the concept of security through obscurity is sure that no virus will penetrate the system. Used Anti-virus: Kaspersky Anti-Virus (www.kaspersky.com)

3. Virus: Sasser and Netsky, Sasser virus, the virus is able to disable the Windows system can not be made until ShutDown process without the resources or the power supply at disconnect, the virus is not spread through email vvia but when the computer is infected with this virus there is a connection with another computer then the virus will run automatically and the computer does not have a virus which first became part attacked. Netsky, Netsky is a virus that spreads via email with a 22 Kb file attachment and Windows networks, when this attack will memyebabkan Netsky on DOS systems will experience an error. Sasser and Netsky is made by a 17-year-old son named Seven Jaschan, Anti Virus Used; Webroot Antivirus (www.webroot.com).

4. Virus: MyDome (Novarg). MyDome is a virus that spreads through email via this MyDome jam that spread through the media search engines (like Google) virus started spreading on 1 february 2004 last and DOS attack that both viruses spread on 12 february 2004, gara - gara this MyDome spread on search engines to U.S. SENATOR CHUCK Schumer asked for as soon as possible to make the National Virus Response Center. Used Anti-Virus: ESET NOD32 (www.eset.com).

5. Virus: SQL Slammer / Sapphire, SQL Slammer / Sapphire is starting to spread in January 2003 the virus spread rapidly through the internet. In 2003 the U.S. Bank ATM crashes, and cause the service 911 Seattle destroyed and Continental Airlines to cancel them because of an error checkin penerbanggan and ticketing, the viruses SQL Slammer / Sapphire has caused losses of $ 1Miliar. Used Anti virus: AVG Anti-Virus (www.avg.com)

6. Virus: Nimba, Nimba virus is spread in 2001 and spread very quickly, Nimba this virus is having targen server - a big server and make it a backdoor to the Os, the virus is spreading through the internet access ways, according to TruSecure CTO Peter Tippett Nimba virus only takes 22 minutes to get into the TOP teen sophisticated virus. Anti Virus: VIPRE Antivirus + Antispyware (www.vipreantivirus.com)

7. Virus: Code Red and Code Red II, the virus appeared in the summer of 2001, the virus is aimed at computer related to the White House then all computer virus Code Red and Code Red II will mengaccess to the White House web automatically and in unison, it will become overloaded or DDoS attack, Code Red and Code Red II attacks the OS Windows 2000 and NT. Anti-virus: F-Secure Anti-Virus (www.f-secure.com)

8. Virus: The Klez, a new virus attack in 2001, The Klez was attacked by Via Email, This virus can multiply and continue to send emails to all that exists in the address book. The Klez can also cause kumputer you can not operate normally and not to stop anti-virus. Anti Virus: Trend Micro (www.trendmicro.com)

9. Virus: Virus ILOVEYOU is the emergence of the Philippines in the form of worm, the virus spreads via email, this virus can make this a virus file and replicate by itself, this ILOVEYOU virus berjudulkan love letters from a secret admirer, his original file or the parent of this virus is LOVE-LETTER-FOR-YOU.TXT. vbs., VBS (Visual Basic Scripting), this is the ILOVEYOU virus creator Onel de Guzman of the Philippine Anti-Virus: McAfee VirusScan (www.mcafee.com)

10. Virus: Melissa virus was made in 1999 by David L. Smith, the virus is spread via email with a document "Here Is That document you asked for, do not show it to anybodey else." When you open a file that is then sent his This document will spread automatically. and can lead to replication of this virus automatically sends this document to 50 Top email address in your email. Anti-virus: Norton AntiVirus (www.symantec.com)
Read More...

Perkembangan Internet

Monday, May 23, 2011

Internet dikembangkan di Massachussets Institute of Technology (MIT) pada tahun 1962. Perkembangan berlanjut dengan dibentuknya Advanced Research Project Agency Network (ARPANET) pada tahun 1969, dimungkinkan karena terjadinya terobosan luar biasa di bidang teknologi. Internet mengkombinasikan komputerisasi dan teknologi komunikasi. Kedua aspek ini telah berkembang luar biasa dalam beberapa dekade ini. Pada tahun 1990, ARPANET telah beralih menjadi jaringan publik, dan terbuka untuk semua kalangan. ARPANET berkembang karena adanya aplikasi yang menyebar bebas, baik untuk perorangan maupun terhadap masyarakat secara umum. Internet bagaikan jaring laba-laba. Setiap titik pada jaring tersebut terhubungkan ke titik lainnya. Intranet adalah jaringan lebih kecil yang terdapat pada struktur yang lebih besar menggunakan protokol yang sama. Intranet dapat terhubungkan secara mudah ke internet karena protokol yang digunakan sudah terstandardisasi. Server adalah komputer skala besar yang menyimpan data dalam ukuran besar, dan menyediakan informasi bagi pengguna. Server-server ini saling terhubung satu sama lainnya. Bagi masyarakat awam, internet berarti suatu PC yang terhubung ke saluran telepon menggunakan modem. Internet Service Providers (ISP) menarik biaya untuk konektifitas yang disediakan ke internet. Search engine membantu kita mencari informasi yang kita butuhkan. Internet telah menjadi perangkat rumah tangga sehari-hari. Tapi apakah kegunaan internet selain untuk tranfer data dalam ukuran besar? Penggunaan internet paling dominan sekarang ini adalah untuk e-mail, yang berbiaya sangat kecil dibandingkan surat pos biasa. Orang-orang juga menggunakan internet untuk menelusuri dan mengumpulkan informasi. Aplikasi lain yang populer adalah dalam bentuk musik audio dan video. Penggunaan lain internet adalah e-commerce. E-commerce berarti segala kegiatan yang berhubungan dengan belanja secara online, penjualan tiket pesawat secara online, atau pun aplikasi perbankan online. Penulis mengatakan bahwa di masa yang akan datang internet akan berkembang lebih jauh dari sekedar jaringan internal planet bumi menjadi jaringan antar-planet, karena Mars dan bulan sudah menjadi habitat manusia pada tahun 2040. Jaringan antar-planet akan mempermudah manusia dalam transportasi material melewati jarak yang sangat jauh.
Read More...

Desain Dinding Hanging Quilts

Sunday, May 22, 2011

Apakah Anda ingin menghias kamar Anda untuk menambah keindahan kamar? Jika demikian, Anda harus memilih dinding buatan tangan menggantung selimut untuk menghias dinding kamar tidur Anda, lounge, dan ruang keluarga. Anda juga dapat membuat kerajinan tangan menggantung permadani untuk menonjolkan keindahan interior kamar tidur Anda. Pada saat yang sama, jika Anda menemukan kesulitan untuk membeli selimut menggantung kain dipasang dinding yang dapat digunakan untuk menghiasi dinding kamar, Anda dapat mencoba merancang sebuah selimut sendiri.

Untuk desain selimut buatan tangan untuk hiasan dinding Anda, Anda harus mengatur berbagai jenis alat dan bahan. Anda harus mengumpulkan memo kain longgar, benang untuk jahitan jahitan dan tekstur kain kain, jarum, papan, gunting, pin, dan lembaran kain dukungan. Anda harus mematuhi setiap langkah yang sangat hati-hati saat merancang tangan dibuat dinding menggantung permadani / penghibur. Secara umum, ukuran standar selimut wall hanging adalah sekitar 27 inci dengan 27 inci. Namun, jika Anda ingin membuat selimut untuk dinding dekorasi mandiri, Anda dapat mengubah pola dan ukuran selimut Anda sesuai keinginan Anda.

Pada awalnya, Anda harus mencuci lembaran kain sehingga tidak ada patch / bintik gelap pada sisi atas selimut. Kain dukungan adalah kain polos yang insulates bagian belakang penghibur / selimut. Anda harus menjahit lembaran kain polos dukungan baik di sepotong selimut untuk perlindungan ekstra. Ini sebenarnya melindungi permukaan selimut dari debu, karat, kelembaban, dan kelembaban. Kedua, Anda harus memilih pemotong putar / reng untuk memperbaiki woofs, dan gunting.

Kemudian dengan bantuan mesin pemotong rotary, Anda dapat membentuk kembali kain mengikis dengan memotong tepi dan garis jahitan lembar kain.

Pada langkah ketiga, Anda akan harus membuat pengaturan untuk desain blok. Biasanya wall hanging permadani penuh dengan 9 blok dalam berbagai ukuran dan warna. Anda harus mengukur sempurna dengan menguraikan diagram pada kertas biasa. Benar blok cukup besar perlu diambil akurat sehingga dinding Anda tergantung selimut / selimut akan dibuat lebih menarik dan rapi.

Anda harus emboss blok pada tekstur kain kain sempurna. Kontur dari persegi empat blok harus dijahit dengan baik melalui menjahit. Setiap blok harus tetap ke permukaan fabricsheet cara terorganisir. perlu jahit Blok harus dilakukan dengan hati-hati untuk menghindari blok yang tidak tepat merancang. Anda dapat juga memasukkan tambahan atau double seam lembar kain platted di antara lembar kain selimut atas dan backing kain. Hal ini akan bertindak sebagai fixture untuk mengencangkan dua sendi dengan cara yang lebih akurat. Batas blok berlapis harus disematkan dengan benar dan sistematis.

Setelah menyelesaikan sulaman, Anda harus memeriksa apakah ada loop longgar, goresan, cacat, dan jahitan kain unfitted longgar di permadani / selimut. Jika Anda menemukan benang longgar atau cacat dalam selimut, anda harus memotong atau memangkas bahwa hasil yang akan merusak estetikus dari selimut wall hanging.

Handcrafted wall hanging selimut juga ditemukan di toko-toko selimut online. Anda bisa mendapatkan dinding biaya-efektif dan menarik menggantung permadani di toko-toko selimut. Periksa situs yang berbeda untuk mengumpulkan informasi yang relevan tentang wall hanging selimut yang pasti akan meningkatkan estetikus keseluruhan kamar tidur Anda, lounge, atau ruang tamu.
Read More...