Friday, February 1, 2008

Fighting Spam

How prevalent is Spam? According to Scott McAdams, OMA Public Affairs and Communications Department (www.oma.org):

“Studies show unsolicited or “junk” e-mail, known as spam, accounts for roughly half of all e-mail messages received. Although once regarded as little more than a nuisance, the prevalence of spam has increased to the point where many users have begun to express a general lack of confidence in the effectiveness of e-mail transmissions, and increased concern over the spread of computer viruses via unsolicited messages.”

In 2003, President Bush signed the “Can Spam” bill, in December of 2003 which is the first national standards around bulk unsolicited commercial e-mail. The bill, approved by the Senate by a vote of 97 to 0, prohibits senders of unsolicited commercial e-mail from using false return addresses to disguise their identity (spoofing) and the use of dictionaries to generate such mailers. In addition, it prohibits the use of misleading subject lines and requires that emails include and opt-out mechanism. The legislation also prohibits senders from harvesting addresses off Web sites. Violations constitute a misdemeanor crime subject to up to one year in jail.

One major point that needs to be discussed about this: spam is now coming from other countries in ever-greater numbers. These emails are harder to fight, because they come from outside our country’s laws and regulations. Because the Internet opens borders and thinks globally, these laws are fine and good, but do not stop the problem.

So what do you do about this? Her are the top 5 Rules to do to protect from spam.
Number 1: Do what you can to avoid having your email address out on the net.
There are products called “spam spiders” that search the Internet for email addresses to send email to. If you are interested, do a search on “spam spider” and you will be amazed at what you get back. Interestingly, there is a site, WebPoison.org, which is an open source project geared to fight Internet "spambots" and "spam spiders", by giving them bogus HTML web pages, which contain bogus email addresses

A couple suggestions for you:

a) use form emails, which can hide addresses or also b) use addresses like sales@company.com instead of your full address to help battle the problem.

c) There are also programs that encode your email, like jsGuard, which encodes your email address on web pages so that while spam spiders find it difficult or impossible to read your email address.

Number 2: Get spam blocking software. There are many programs out there for this. (go to www.cloudmark.com or www.mailwasher.net for example). You may also buy a professional version. Whatever you do, get the software. It will save you time. The software is not foolproof, but they really do help. You usually have to do some manual set up to block certain types of email.
Number 3: Use the multiple email address approach.
There are a lot of free email addresses to be had. If you must subscribe to newsletters, then have a “back-up” email address. It would be like giving your sell phone number to your best friends and the business number to everyone else.

Number 4: Attachments from people you don’t know are BAD, BAD, BAD.
A common problem with spam is that they have attachments and attachments can have viruses. Corporations often have filters that don’t let such things pass to you. Personal email is far more “open country” for spamers. General rule of thumb: if you do not know who is sending you something, DO NOT OPEN THE ATTACHMENT. Secondly, look for services that offer filtering. Firewall vendors offer this type of service as well.

Number 5: Email services now have “bulk-mail” baskets. If what you use currently does not support this, think about moving to a new vender. The concept is simple. If you know someone, they can send you emails. If you don’t know them, put them in the bulk email pile and then “choose” to allow them into your circle. Spam Blocking software has this concept as well, but having extra layers seems critical these days, so it is worth looking into.

Thursday, January 31, 2008

Fighting off Viruses: Advancements in Antivirus Software Suites

Protecting your computer from a virus is getting harder and harder each day. While it may border on the paranoid, it goes without saying that you can’t leave your guard down for one second. Even corporate giant Microsoft has found its own systems compromised on more than one occasion.

Remember the “good old days”, before the advent of the Internet and downloadable programs? Life was simple then in terms of computer viruses. With the primary way in which a virus could be transmitted being limited to floppy disks, the ability to catch and eradicate the virus was a lot easier. By today’s standards, it used to take quite a while before a virus was able to infect a computer and slow down the system. The antivirus software of that time was typically able to identify and eradicate viruses before they caused too much damage. Additionally, computer users were pretty savvy on how to protect themselves in terms of scanning all floppy disks before copying them to our desktop.

The Internet helped change all that. The Internet provided a conduit by which viruses could move from host to host with lightening speed. No longer could a computer user just worry about floppy disks as points of entry, but they now had to worry about email, email attachments, peer-to-peer file sharing, instant messaging, and software downloads. Today’s viruses can attack through multiple entry points, spread without human intervention, and take full advantage of vulnerabilities within a system or program. With technology advancing everyday, and the convergence of computers with other mobile devices, the potential of new types of threats also increase.

Protecting Your Computer
Luckily, the advancement of antivirus software has kept pace with current virus threats. Antivirus software is essential to a computer’s ability to fend off viruses and other malicious programs. These products are designed to protect against the ability of a virus to enter a computer through email, web browsers, file servers and desktops. Additionally, these programs offer a centralized control feature that handle deployment, configuration and updating.
A computer user should remain diligent and follow a few simple steps to protect against the threat of a virus:

1. Evaluate your current computer security system.
With the threat of a new generation of viruses able to attack in a multitude of ways, the approach of having just one antivirus software version has become outdated. You need to be confident that you have protected all aspects of your computer system from the desktop to the network, and from the gateway to the server. Consider a more comprehensive security system which includes several features including antivirus, firewall, content filtering, and intrusion detection. This type of system will make it more difficult for the virus to penetrate your system.
2. Only install antivirus software created by a well-known, reputable company.
Because new viruses erupt daily, it is important that you regularly update your antivirus software. Become familiar with the software’s real-time scan feature and configure it to start automatically each time you boot your computer. This will protect your system by automatically checking your computer each time it is powered up.
3. Make it a habit to always scan all new programs or files no matter from where they originate.
4. Exercise caution when opening binary, Word, or Excel documents of unknown sources especially if they were received during an online chat or as an attachment to an email.
5. Perform regular backups in case your system is corrupted. It may be the only way to recover your data if infected.

Recommended Antivirus Software

There are numerous applications available to consumers. With a little research, you can pick the program that is right for you. Many programs provide a trial version which allows you to download the program and test its abilities. However, be aware that some anti-virus programs can be difficult to uninstall. As a precaution make sure to set up a System Restore point before installing.

Here are a few programs which typically receive high marks in terms of cost, effectiveness, ease of use, and customer service.

The Shield Pro 2005™ provides virus protection and hacker security through ongoing support and updates. When a virus breaks out, The Shield Pro 2005™ promises to provide a patch within 2-3 hours and a fix for the virus within 5 hours. You can set your computer to update viruses weekly and run a complete virus scan.

BitDefender 9 Standard provides antivirus protection, as well as Peer-2-Peer Applications protection, full email protection, and heuristics in a virtual environment. This provides a new security layer that keeps the operating system safe from unknown viruses by detecting malicious pieces of code for which signatures have not been released yet.

Kaspersky Anti-Virus Personal 5.0 program is simple to install and use. The user only needs to choose from three levels of protection. It allows updates as frequently as every hour while promising not to disrupt your computer. The program also offers a two-tier email protection feature and round-the-clock technical support.

PC-cillin Internet Security combines antivirus security and a personal firewall—for comprehensive protection against viruses, worms, Trojans, and hackers. It also detects and removes spyware and blocks spam. It even guards against identity theft by blocking phishing and pharming attacks.

AVG Anti-Virus Free Edition is a free downloadable antivirus program that has received high marks for its reliability. In the past, free downloadable antivirus programs have been viewed skeptically because of issues relating to its reliability. However, AVG from Grisoft, remains one of the best-known free anti-virus programs available. While AVG can not be installed on a server operating system and there is no technical support, it still makes a good choice for many home computer users. The best part is that since it is free, you can try it with no further obligation necessary.

Wednesday, January 30, 2008

Department of Defense Crackdown on Security

The top commander of the department of Defense network operations just ordered a crackdown on security. According to a recent article by NetworkWorld on January 16,2006, Lt. General Charles Croom is quoted as saying, “The attacks are coming from everywhere and they’re getting better.” His talk was the keynote address at the Department of Defense Cyber Crime Conference held on January 9 - 14, 2005 in Clearwater, Florida. The event is sponsored by the Defense Cyber Crime Center and the Joint Task Force. Over 500 computer crime specialists from the FBI and the military attended the event.

The crackdown was related to a recent arrest of a “Computer Virus Broker” named Jeanson James Ancheta. On further investigation, a Department of Justice press release from Nov 3rd, 2005 offered the following information on this incident, “In the first prosecution of its kind in the nation, a well-known member of the “botmaster underground” has been indicted on federal charges for profiting from the use of “botnets” – armies of computers that are under the control of the botmaster and are used to launch destructive attacks or to send huge quantities of spam across the Internet.

Jeanson James Ancheta, 20, of Downey, California, was arrested this morning by special agents with the Federal Bureau of Investigation. Ancheta was indicted yesterday in two separate conspiracies, as well as substantive charges of attempting to cause damage to protected computers, causing damage to computers used by the federal government in national defense, accessing protected computers without authorization to commit fraud and money laundering.”
The press release goes on to describe more details of this scheme that clearly show why the

Deparment of Defense is so concerned (for more information go to:

http://www.usdoj.gov/criminal/cybercrime/anchetaArrest.htm )

“Ancheta had become an affiliate of several different advertising service companies, and those companies paid him a commission based upon the number of installations. To avoid detection by network administrators, security analysts and law enforcement, Ancheta would vary the download times and rates of the adware installations. When companies hosting Ancheta’s adware servers discovered the malicious activity, Ancheta redirected his botnet armies to a different server he controlled to pick up adware. To generate the roughly $60,000 he received in advertising affiliate proceeds, Ancheta caused the surreptitious installation of adware on approximately 400,000 compromised computers. Ancheta used the advertising affiliate proceeds he earned to pay for, among other things, the multiple servers used to conduct his schemes.

Ancheta used programs powerful enough to cause the infection of computers at the Weapons Division of the United States Naval Air Warfare Center in China Lake, as well as computers belonging to the Defense Information Systems Agency, a component of the United States Department of Defense. Both networks are used exclusively by the federal government in furtherance of national defense. After being arrested this morning at the FBI Field Office in Los Angeles, Ancheta was transported to United States District Court in Los Angeles. It is unclear if he will make his initial court appearance this afternoon or tomorrow. Ancheta is charged with two counts of conspiracy, two counts of attempted transmission of code to a protected computer, two counts of transmission of code to a government computer, five counts of accessing a protected computer to commit fraud and five counts of money laundering. Count 17 of the indictment seeks the forfeiture of more than $60,000 in cash, a BMW automobile and computer equipment that the indictment alleges are the proceeds and instrumentalities of Ancheta’s illegal activity.”

Some recent news. Ancheta pleaded guilty to charges of conspiring to violate anti-spam and computer misuse laws, and fraud and will serve from 4-6 years in prison, under the plea agreement - plus heavy fines.

Monday, January 28, 2008

Computer Viruses that Come a Callin’

Every day new computer viruses are created to annoy us and to wreck havoc on our computer systems. Below are ten viruses currently cited as being the most prevalent in terms of being seen the most or in their ability to potentially cause damage. New viruses are created daily. This is by no means an all inclusive list. The best thing you can do is to remain vigilant, keep your anti-virus software updated, and stay aware of the current computer virus threats.
Virus: Trojan.LodearA Trojan horse that attempts to download remote files. It will inject a .dll file into the EXPLORER.EXE process causing system instability.

Virus: W32.Beagle.CO@mmA mass-mailing worm that lowers security settings.

It can delete security-related registry sub keys and may block access to security-related websites.


Virus: Backdoor.Zagaban


A Trojan horse that allows the compromised computer to be used as a covert proxy and which may degrade network performance.
Virus: W32/Netsky-PA mass-mailing worm which spreads by emailing itself to addresses produced from files on the local drives.

Virus: W32/Mytob-GHA mass-mailing worm and IRC backdoor Trojan for the Windows platform.

Messages sent by this worm will have the subject chosen randomly from a list including titles such as: Notice of account limitation, Email Account Suspension, Security measures, Members Support, Important Notification.

Virus: W32/Mytob-EXA mass-mailing worm and IRC backdoor Trojan similar in nature to W32-Mytob-GH.

W32/Mytob-EX runs continuously in the background, providing a backdoor server which allows a remote intruder to gain access and control over the computer via IRC channels. This virus spreads by sending itself to email attachments harvested from your email addresses.

Virus: W32/Mytob-AS, Mytob-BE, Mytob-C, and Mytob-ER


This family of worm variations possesses similar characteristics in terms of what they can do. They are mass-mailing worms with backdoor functionality that can be controlled through the Internet Relay Chat (IRC) network. Additionally, they can spread through email and through various operating system vulnerabilities such as the LSASS (MS04-011).


Virus: Zafi-DA mass mailing worm and a peer-to-peer worm which copies itself to the Windows system folder with the filename Norton Update.exe.

It can then create a number of files in the Windows system folder with filenames consisting of 8 random characters and a DLL extension. W32/Zafi-D copies itself to folders with names containing share, upload, or music as ICQ 2005a new!.exe or winamp 5.7 new!.exe. W32/Zafi-D will also display a fake error message box with the caption "CRC: 04F6Bh" and the text "Error in packed file!". Virus: W32/Netsky-DA mass-mailing worm with IRC backdoor functionality which can also infect computers vulnerable to the LSASS (MS04-011) exploit.


Virus: W32/Zafi-B


A peer-to-peer (P2P) and email worm that will copy itself to the Windows system folder as a randomly named EXE file. This worm will test for the presence of an internet connection by attempting to connect to www.google.com or www.microsoft.com. A bilingual, worm with an attached Hungarian political text message box which translates to “We demand that the government accommodates the homeless, tightens up the penal code and VOTES FOR THE DEATH PENALTY to cut down the increasing crime. Jun. 2004, Pécs (SNAF Team)”

Saturday, January 26, 2008

Bluetooth And Apple

The new Apple powerbook G4 are among the first computers to offer Bluetooth technology 2.0+EDR. The 2.0+EDR technology, which still backwards compatible with 1.0, is up to three times faster than previous versions, offering maximum data rate transfers of up to 3 MBps. Being the first company to certify a system with 2.0+EDR, Apple continues to make great use of the Bluetooth technology.

Full support

In addition to the powerbook G4 portables, there are other Bluetooth enabled computers available from Apple, including the iBook, iMac G5, eMac, and the Power Mac G5.

Making life easier
When you turn the Bluetooth feature on, your Mac can easily perform a file transfer or even a synchronization. From the Bluetooth selectionmenu, you can choose to either send a file or browse devices, quickly and easily. Or, you can click the sync button in iSync to update your cell phone or Palm OS handheld.

The Mac and GSM/GPRS mobile phone with Bluetooth work to make each other more useful. By using iSync, you can keep your phone updated without having to type any info, as you can keep the information in the more manageable address book on your Mac instead.

You can also use your Bluetooth enabled Mac to print documents and digital images to select a printer that also supports the technology of Bluetooth. Or, you can also use a headset to talk to your friends during an iChat session.

Your Mac also has the ability to use Bluetooth technology to communicate with your Palm OS handheld. This way, you can perform a HotSync operation without using any cables. You can also send your business card or calendar events directly to someone else's handheld usingthe technology of Bluetooth.

The implementation of Bluetooth by Apple is the latest in a series of moves that have caused great shift in the computer industry. Apple established USB as the standard interface with the launching of the first Mac back in 1998.

Since then, Apple established the 802.11 wireless standard of networking with the launch of the iBook and AirPort in 1999. During 2003, Apple launched AirPort Extreme, which was based onthe new 802.11g high speed technology of wireless.

Now, Bluetooth helps to further strengthen the dominant position of the Mac in wireless communications, helping to preserve Apple's reputation for being the first to market with innovative technology that integrates right into the operating system.

Monday, January 21, 2008

Just what is Intelligent Explorer? For your safety, you really need to know

I recently hit, by mistake, what I thought was an Explorer upgrade option. It turned out to be a pop-up appearing legitimate but really was not. It uploaded a product called Intelligent Explorer on my machine. What a nightmare!

I did some research on the web and found messages like this one from a BullGuard Antivirus Forum,

"PLEASE HELP!!! I HAVE A SPYWARE, TROJAN AND HIJACKER ON MY COMPUTER. I HAVE RUN BULLGUARD, CWSHREDDER AND AD-AWARE. ALL HAVE PICKED UP THE VIRUSES AND SAID THAT THEY HAVE BEEN MOVED/REMOVED BUT WHEN I LOG ONTO THE INTERNET THAT DAMN INTELLIGENT EXPLORER TOOLBAR IS SHOWING"

Another message from spywareinfo Forum goes something like this:

"Hey I'm having issues with something called Internet explorer toolbar - Intelligent explorer. I can’t find a way to remove it from my comp and I really don’t want to reinstall windows. I've used spybot, ad-ware, and cw shredder but nothing seems to work."

It appears that Intelligent Explorer allows other software to be downloaded to your machine and this is where the problem occurs. What is even more remarkable is that by downloading Intelligent Explorer, their license grants them the right to install software add-ins on your computer at their will. Take a look at what the software license for Intelligent Explore says (go to http://www.ieplugin.com/terms.html to read it all):

"You grant to us the right, exercisable by us until you uninstall the Software or this agreement is otherwise terminated, to provide to you the Service of downloading and causing to be displayed advertising material on your computer, through ‘pop-up’ or other display while you use your browser. You acknowledge and agree that installation of the Software may automatically modify toolbars and other settings of your browser. By installing the Software you agree to such modifications."

The company, IBC incorporated, is incorporated in Belize. I really can't believe this license!


One end user found highly objectionable pop-up advertisements generated by this software bundled with Intelligent Explorer in the form of extreme pornography.

I have yet to break this.


Intelligent Explorer is a plug-in, which can create a new home page, as well as start up and endless loop of pop-ups. You can remove the view bar, but then starting up Internet Explorer will cause it to reappear. I asked some friends to help, and no one could tell me what to do.

This is what I did:

I bought a copy of a program called XoftSpy and it removed the software. It took two scans and a reboot to do it. This is not an advertisement for this product. They advertised it was free, which it was to run, but then I had to buy it to actually fix anything. It cost me $40 and I am sure that there are freeware products out there as well, but that is what ended the nightmare for me. Other spyware products I have seen out there include spybot, NoAdware, Spyware Eliminator, Pal Spyware Remover, and Spyware C.O.P.

Sunday, January 20, 2008

UNDERWATER DIGITAL CAMERA: CAPTURING MOMENTS UNDERWATER

Memories are created just about anywhere. And when I say anywhere, I mean that memories are even created underwater ?so the creation of underwater digital camera.

An underwater digital camera is not just used to capture underwater memories; some professional marine photographers also use underwater digital cameras in their business. Even marine biologists and scientists use underwater digital cameras to capture marine life and thus be able to study the life and properties of the marine life. But I think it is safe to assume that you, my reader, are neither a marine scientist nor a professional photographer. Like me, you are just some photo junkie who wants to capture underwater moments and just cant figure out how without ruining your cameras.

Please listen to me when I say that even waterproof cameras cannot withstand underwater photography. To be waterproof is to resist the water in certain levels, submerging in under the water to get the perfect shot is like throwing it out of the window expecting a pick-up truck to pass by and run over it.

Now if you're really serious about using an underwater digital camera to capture those wacky and funny moments underwater, I suggest that you buy specialty cameras.

There are rarely underwater digital cameras, as cameras are electronic and cannot withstand water and water pressure. The closest electronics has ever got to producing underwater digital cameras are producing underwater casings for digital cameras. These casing will turn your conventional digital camera into an underwater digital camera.

If you are shooting with your underwater digital camera, you need to take note of a few things to help you come up with the best images underwater.

Remember that as you farther under water, light diffuses. This means that your underwater digital camera will produce images darker than those images you took while on land ?this is because of the light diffusion the red spectrum seems darker. To avoid this, use white balance come up with natural colors. Also, pictures taken underwater will come up larger than pictures taken on land with the same zoom effect. Be sure to check your underwater digital camera viewfinder to check the right picture angle and size that you want.

An underwater digital camera with its built-in flash will produce marine show phenomenon. It is a phenomenon wherein your pictures come out as blurry and with white particles floating above it, to avoid this phenomenon it is advisable to use external flash for your underwater digital camera.

Before using your underwater digital camera, submerge the camera in the water first for several seconds then check if there are leaks through the case. Make sure that no grain of sand or piece of hair is stuck in between the seal to make sure that water will not permeate the case and thus wet your camera in the process. It is also advisable to put silica gel or two inside the case of your underwater digital camera as long as they don disturb the camera operation. (Silica gel will keep the moisture from forming inside your camera case.)

Most underwater digital cameras come with optional lenses. Don't be afraid to add these lenses to your underwater digital camera kit. Macro lenses will help you capture small things without getting too close and startling your subject.

Also, remember to always wash of salt when you're used it under salt water. If the salts are not washed off, in time they will crystallize; act as sands and cause leaks for your camera case. In cases when sands seem to get into the case, they are better washed off with streams of water.

Check out Sony, Nikon and Canon website for available underwater cases for your digital cameras.

Monday, January 14, 2008

SONY DIGITAL CAMERA: EMBRACING PERFECTION

Known for producing quality electronics, Sony is also one of the pioneers and the best producers of digital camera. Truly using a Sony digital camera is embracing perfection with its many features exclusive to a Sony digital camera.

Indeed, one of the best ways to capture your memories forever is thru photos and what better to do it than with a Sony digital camera. Photos are used to remember or when we reminisce of the wonderful times of our lives. And only vivid and detailed photos can help us bring back all those memories. And quality photos are exactly what a Sony digital camera offers to its consumers.

Equipped with the best optics and imaging technology available, the Sony digital camera line ensures its consumers that a Sony digital camera will only capture more detail, more color and more brightness imaginable.

Every Sony digital camera has an exclusive Sony technology that enhances photo capturing experience. Armed with the Real Imaging Processor (RIMP), any Sony digital camera allows high digital processing that reduces picture noise and delivers smoother and more detailed images. The RIMP is an intelligent Sony digital camera technology that allows faster shooting time, swifter burst shooting and almost simultaneous processing of your images (enables immediate display of your image) for your Sony digital camera.

All Sony digital cameras are furnished with Carl Zeiss lens. Carl Zeiss lenses are world renowned for their quality brilliance, outstanding accuracy of colors and enhanced definition with almost zero distortion. With a Carl Zeiss lens, flawless imaging is truly embracing perfection with a Sony digital camera.

Sony has its own Cyber-shot line of digital camera for all photo fanatics out there. One of the lower ends of their Cyber-shot series of the Sony digital camera is the DSC-L1. The L1is a 4.1 mega pixel camera with a 3x optical zoom and plays MPEG Movie Vx. It is also supplied with a Vario Tessar lens from the Carl Zeiss line.

A higher version of the L1 is the Sony Cyber-shot DSC-P200. Almost same in all respect with the L1 expect this baby is a 7.2 mega pixel Sony digital camera.

For those who are serious in their craft, the right Sony digital camera for you id the Cyber-shot DSC-F828. Designed for professional photographers, the F828 has a 28-200mm equivalent of a Carl Zeiss Vario Sonnar lens, which makes it excellent for action and low-light shots. An 6 mega pixel Sony digital camera, it is outfitted with 7x optical zoom and a 1.8 inch LCD screen where you can review the pictures that you just took. The DSC F828 has a four color system that includes RGB+emrald colors and enables night shot/night framing system. The F828 even allows manual exposure, zoom and manual focus controls for your customization needs.

For the younger and trendier generation, the Sony Cyber-shot DSC-M1 is the right Sony digital camera for you. The M1 is a digital camera and a camcorder in one. It can record either up to five seconds MPEG 4 playback or unlimited video recording, depending on your preferred setting. Shooting with 30 frames per second, it is 5.1 mega pixel camera with a 640 x 480 maximum pixel resolution. It has 3x optical zoom and 2x digital zoom.

Very lightweight at only 6.5 oz. the M1 is very portable and is only 2x1.1x4.5 inches (dimensions). A USB 2.0 compatible and with PictBridge support, the M1 makes file transferring from your Sony digital camera to your computer as easy as taking pictures.

Available with accessories such as wrist strap, docking station and a 32MB memory Stick Duo, the M1 comes with an expansion slot that lets you upgrade up to 512MB of memory for further picture taking or video playback. It even has a built in features such as stereo surround, built-in mic and a 2.5inch TFT active matrix LCD display.

Check out Sony's website at www.sony.com to look for other available Sony digital camera models that will fit you and your lifestyle.

Sunday, January 13, 2008

OLYMPUS DIGITAL CAMERA: PROFESSIONAL CAMERAS GO DIGITAL

Olympus has always been known to produce quality cameras, either point and shoot or professional cameras. However, these days Olympus has joined the digital scene by producing their own line of digital cameras.

Olympus digital cameras are best known for producing DSLR cameras. These digital cameras are the kind that professional photographers use in their craft. Although this is for a fact, this company has also produced their own line of point and shoot Olympus digital cameras.

First up is an Olympus digital camera called the MJU-mini. A 4.0 mega pixel Olympus digital camera, it is cute, portable and can capture great pictures. Also, a tough Olympus digital camera, it is made with a metal frame and known for its solid weight - this is great because hands get too shaky when a camera is too light. With 2x digital zoom, a 5.8-11.6mm Olympus lens, this baby is your best bet for your personal Olympus digital camera.

Another personal Olympus digital camera is the MJU 500, obviously the higher version of the MJU-mini. the MJU 500 is a 5.0 mega pixel Olympus digital camera that is easy to use and one favored by consumers who are looking for a digital camera within this particular price range. (The MJU 500 is around $400-$500). The first notable feature of the MJU 500 is its large 2.5-inch HyperCrystal LCD screen. With its 160-degree wide view range, this large LCD screen enables its users to view subjects at extreme angles (though it does not feature the flip or rotate like other LCD screens from other digital cameras). Made from durable lightweight metal with rubber gaskets in its interior and weighing only 3.0 lbs., the MJU 500 is also weatherproof. Meaning that this Olympus digital camera can withstand a few splashes here and there. (Note: it is weatherproof and not waterproof, there is a big difference between the two - splashes and not water). The MJU 500 of the Olympus digital camera line, introduces an alternative design apart from the curvy MJU series with its new flat surface and smooth and round edges. It is so compact, with its 3.9 x 2.2 x 1.2 inches dimension, it can easily fit in your handbag or the back pocket of your pants (just be careful not to sit on it). This Olympus digital camera also features 23 shooting modes, one of which will enable its users to shoot in consecutive sequences and just choose the best one later. Another one of its many features is its ability to record and playback those videos and sounds. It has an expandable memory card slot, but when you buy the package, you would have to settle with temporarily with the 32MB xD card that comes with the package. this fashionable Olympus digital camera comes in two colors - silver and blue.

for a professional Olympus digital camera, the Olympus 5300 is the right DSLR for you. it is the first 8-mega pixel camera out in the market. with a 7-14mm lens, it gives the equivalent of a 14-28mm lens. also, a first for this Olympus digital camera is its side-swing mirror that doesn't need a pentaprism, giving you a smaller and sleeker camera. another unique feature is the Super Sonic Wave Filter (SSWF) that shakes off the dusts in your sensor, this way dust can never accumulate in your camera. with features like four exposure modes and 14 scene modes, this USB 1.1 compatible Olympus digital camera is one of the best DSLR cameras in the market.

another Olympus digital camera is the Olympus CaMedia C-70. It is also a small and compact digital camera but equips a 7.0 mega pixel camera that gives you power and portability at the same time. Packed with 5x optical zoom and, it start up fast and auto focus even quicker than most digital cameras in the market. It has a 2.0-inch LCD screen, a xD picture card slot and furnished with a 7.9-39.5mm Olympus lens that has 5x optical zoom. The CaMedia C-70 is the perfect choice for high quality shots, good features, great build and excellent portability.

Visit Olympus' website at www.olympus.com to look for other Olympus digital cameras and other Olympus products available in the market.

Tuesday, January 8, 2008

Samsung cellular phone, a basic phone

Cellular phones are now getting to be a necessity in this modern society. This is not how they foresee the cellular phone future some years back. Luckily, manufacturers are quick to recognize the booming cellular phone industry. Thus, they are able to answer the growing demands for this functional toy. Additionally, the introduction of various functional features for cellular phones by huge cellular phone companies makes cellular phones more a need to perform specialized tasks. Because of this, the use of a cellular phone is getting to be a requirement for business executives in going about their various tasks as they go about their business. However, not everybody needs these special functions, some only needs cellular phones for basic use like sending and receiving calls. If you do not require these high technology functions, buying a cellular phone for basic use may only be what is necessary. Some cellular phones are for basic use including Samsung cellular phones. It is more reasonable to buy basic cellular phone models if you do not need to play with your cellular phone and Samsung cellular phone may be what is the best for your.

Samsung cellular phones are generally of good design. They have wide and clear display, which is beneficial especially for sending and receiving text messages. Samsung cellular phones have good battery life compared to other cellular phone units. As already mentioned, these cellular phones are good cellular phones for basic use. Samsung cellular phones have beautiful designs; you may be pleased to choose one among the various models that will fit your need. You will not despair buying a cellular phone from Samsung if you only require the basic features; beauty of the product is thus a bonus. However, if you are looking for functional cellular phones more than the basic sending and receiving calls and text messages, Samsung cellular phone is not the one for you. People who want to play and require so many functions and features will not enjoy a the cellular phone from Samsung.

Some basic complaints encountered with Samsung cellular phone, which happens only to very few users, are choppy calls and scratchy and distorted volume generation. This only happens to very few users, and to ensure you will not experience this in a Samsung cellular phone, you may ask the recommendation of the friendly Samsung staff.

Some who endeavor to find functionality in a Samsung cellular phone give it a nickname ery good yet slightly bad phone. It is very good because the designs are superb and the battery life is good. Slightly bad because some high-tech features fail in Samsung cellular phone, precisely it is a cellular phone for basic use.

Do not expect Samsung cellular phone for other features rather than the basic ones, no picture transfer, no internet communication and some phone do not support blue tooth usage. Not a techy choice indeed. Some people who buy this phone feel that with the superb design, it should include additional feature and functionalities. The company is on its way to developing the phone you require, researches and product development are now on the drawing board.

For some who could not wait, buying Samsung cellular phone is still a neat choice because the designs are upbeat and beautiful. The added bonus is that the battery life is longer than other cellular phones. Enjoy the basic functions and beautiful designs with Samsung cellular phones.

Sunday, January 6, 2008

Downloading a Free Podcast

Its easy to find and download a free podcast. The best way to find free podcasts is probably to check a podcast directory. A podcast directory is a listing of many, sometimes thousands of different podcasts. The podcast directory will usually organize the podcasts by topic and genre, making it easy to find the type of podcast that is sought. In addition, podcast directories often allow the visitors to comment on the podcasts listed, and provide a list of the favorite podcasts on the site, making it easy for users to find the best podcasts available. These podcast directories can be used to browse through, introducing users to many different podcasts they otherwise would not have found.

Once a podcast has been found that interests the user, it is necessary to download the free podcast. The vast majority of podcasts will be free, but there will be a few that may cost a small amount of money. The process to subscribe to and download the podcasts is the same in either case. First, a podcast client needs to be found and installed. There are many free podast clients available, all providing a slightly different user interface and range of options. They come with many different names, such as Podscape, or Nimiq, and searching for 'free podcast client' or something like it will turn up many possibilities. When the podcast client has been installed, inputting the feed address will allow the podcast to be downloaded. The podcast client will check the address given for a small, machine readable file called an RSS file. This file will contain information about the podcasts, perhaps some text about the individual episodes, as well as the location of the episode file. Once the podcast client has been located the file referred to in the RSS feed, it will be downloaded and stored on the users computer until the want to view it.

Sometimes, of course, access to a personal computer is not available, but it is still necessary to check a certain podcast. Fortunately, many podcast directories offer built in podcast readers in the site. Not only do they often show each recent episode that is available, they may also offer a way to view or listen to those podcast episodes from within the site. By using the viewer contained within the site, it is no longer necessary to even download the podcast episodes. However, the ability to move and share the episodes after downloading is one of the wonderful things about podcasting. The files can be placed on almost and media player, ranging from iPods to the new Play Station Portable. This flexibility is one of the reasons podcasts have succeeded, despite other technologies like streaming music and video. The desire of consumers to have control over technology cannot be over estimated.

Thursday, January 3, 2008

NIKON DIGITAL CAMERA: DIGITAL SLR CAMERAS

Nikon is a camera brand, best known for producing SLR camera. As with the boom of digital cameras all over the world, Nikon joined the bandwagon by producing what they make best, thus the new era of the Nikon digital camera was born - digital SLR.

One of the best in DSLR, the Nikon digital camera called Nikon D70 is 6-mega pixel Nikon digital camera. Coated with polycarbonate over its stainless steel chassis, this Nikon digital camera is furnished with a 50mm AF Nikkor lens that can combine with an 18-70mm kit lens and still be portable enough to be carried around. It has a 200-1600 ISO effective speed range, great for taking pictures both in the shade and under the sun. and why won't it be?! With its three frames per second continuous shooting rate and its 1/8000 second shutter speed, taking pictures is as easy as clicking away and having fun. this Nikon digital camera is supported with a Flash card.

Another SLR from Nikon is the Nikon Coolpix 8800. An 8-mega pixel Nikon digital camera, the Coolpix 8800 has a compact body. Furnished with a 1.8 inch flip-out and swivel LCD, this baby is surely first rate SLR. This Nikon digital camera features an image stabilizer system to reduce camera shakes particularly on long shots since this gadget can zoom up to 10x (optical zoom) and can focus to up to 3cm in macro mode with its 35-350mm lens. Key controls are very user-friendly, with modes such as sensitivity, image size/quality and white balance - found directly with the mode dial. The image output quality is the middle name of this Nikon digital camera, with great detail rendition, color fidelity and saturation. a rather exceptional feature of the 8800 is the continuous shooting modes, where users can choose 1.2 or 2.3 frames per second. A bit bulky to carry around, the 8800 is perfect for shooting action and sports shots. The 8800 works with a Compact Flash card for storing up your images.

Another digital SLR from Nikon is the Nikon D50. A 6.1 mega pixel Nikon digital camera, this gadget has 7 varied modes to shoot from using its AF-S DX Zoom Nikkor 18-55mm lens. These modes are Auto, Portrait, Landscape, Close Up, Sports, Night Portrait and Child. To see the images that you took, this Nikon digital camera is furnished with a 2.0 inch LCD screen. How fast can this camera shoot? It has 2.5 frames per second and with uninterrupted shooting of up to 137 frames per second. This Nikon digital camera is not too bad, especially for novice photographers. This package also includes a software for touching up, editing and sharing your pictures. The software even enables you to burn your images to VCD or DVD format.

One of the first point and shoot Nikon digital cameras is the Nikon Coolpix 4800. A four mega pixel Nikon digital camera, the old school designed 4800 is equipped with a 1.8 inch LCD screen for viewing your pictures. The 4800 is an 8.3x zoom Nikon digital camera with 6-50mm Nikkor Ed lens that zooms quickly and has continuous auto focusing (a feature where your lens is always trying to keep your pictures sharp). It also allows users to shoot, record and playback short movie clips with its assist and excellent scene modes - meaning that includes providing outlines for portraits (for tweaking purposes), exposure and sensitivity settings. These features are very helpful especially for novice photographers that want to try their hands at photography. Along with that, it comes with a 13.5MB SD card and the Li-on battery pack.

Remember to check out Nikon's website at www.nikon.com.sg or www.nikonusa.com to see the latest Nikon digital cameras.

Wednesday, January 2, 2008

Nokia cellular phones, most wanted cellular phones

Nokia being a finish firm is surprisingly gaining 20% cellular phone penetration in the United States. This success is due to the two major business concentration of the company. The two business concentrations are Nokia cellular phones and cellular phone network infrastructure. Those two make up 90% of Nokia's revenue. The company gains this success because of their commitment to quality, and their quest to provide consumers with innovative design Nokia cellular phones.

Nokia is narrowly focusing on Nokia cellular phone and cellular phone infrastructure because the company sees significant growth potential in the mobile telephone industry. Nokia is poised on giving landline telephony greater challenge in the coming years. It has started and is fast becoming a threat. Although admittedly, among the three major players in the United States mobile phone industry, Nokia, with its Nokia cellular phones and cellular phone infrastructure抯, can fulfill this goal because of their strong commitment to revolutionize the bile phone industry. Bigger may be the other players but Nokia's focus on cutting edge technology to help developing countries do without land-base communications and gain speedy communication the mobile phone usage, may be possible. However, Nokia cellular phones and its exceptional technological design are facing greater challenge with respect to the fast-paced developments in the cellular phone industry. Nokia is also facing pricing challenge, more specifically, because of the downward global economic condition.

These challenges, however, the company continues to focus on superior technology for its Nokia cellular phones and cellular phone infrastructure. These business areas brought their company to the stock market map and Nokia is committed to continue providing innovative technology for as long as possible. Although, they believe the economic assessments that the economic condition may not require the superior technology of their Nokia cellular phone to help them secure profitable business in the coming years, they continue to refine the technological advantages of their products because it is a commitment they stand for. This assurance will surely please consumers who love the functional features of Nokia cellular phones.

This endeavor of the company to ensure technological advancement for their Nokia cellular phones and cellular phone infrastructure ensures the consumers that even with the proliferation of cellular phone in the market; one will always find the most functional and technologically advanced products in Nokia. One may actually get all the benefits of effective and speedy communication with Nokia cellular phones and its cellular phone infrastructure.

Choose the best and most efficient when you need mobile cellular phones, if you know Nokia抯 promise of great technological developments, you will get all the benefits and more. This is because aside from the functional features, beautiful designs are coming out of Nokia plants to suit everybody's needs for Nokia cellular phones.

Finally, Nokia cellular phones recommend users to follow telephone etiquette. This will help ensure the even while using cellular phone, keeping in mind telephone etiquette keeps you respectable. You will not bother churchgoers by turning off your phone in a place of worship. Avoid talking aloud in public in order to avoid creating nuisance and annoying people around. This is a good recommendation for cellular phone users. You do not need to flaunt your cellular phone, because Nokia cellular phones have their own personality, high-tech and functional, no need for you to brag about it.

Tuesday, January 1, 2008

A Dream Home That’s No Longer a Dream

Who hasn’t dreamed of redesigning their current home or building their dream home? Unfortunately, for many of us, the cost of hiring an architect just isn’t in our budget. Now with the help of Home Designer Pro 7.0, we can easily do it ourselves.

Chief Architect, Inc. is a leading developer of 3D architectural home design software for consumers, home enthusiasts, builders, designers, and architects. In January 2006, they were recognized as the fastest growing publisher in the home design and gardening software category for 2005, making it the number one growing home design and gardening software publisher.

Better Homes and Gardens software product reviewers give it two thumbs up for ease of use. You can quickly jump-in and begin by using their pre-designed room feature or start from scratch and define your own rooms. When you are finished outside, take a quick spin outside and try your hand at either landscaping or deck design.

If you are thinking about designing your dream home from the ground up, the project-cost estimator budgeting tools provides you with a realistic idea of what you can expect to pay and the materials you will need to do the job. Then, you can easily add-in or change features with a simple click of the mouse.

The software suite is loaded with additional features including the ability:

• to create a virtual walk-through of your house
• to design and visualize using 3-D models
• to use a complete set of CAD tools to detail your designs
• to choose from a library of more than 4,300 design items
• to select 1,500 sample home plans
• to review 30 training videos with "how to" information

Not sure which of the BHG products are right for your needs? No problem. BHG provides a comprehensive comparison matrix on their website at http://www.homedesignersoftware.com/pdf/Land-vs-Base-vs-Suite-vs-Deluxe-Pro.pdf. Now, you can easily locate which of their six home design products are right for you. Depending on your needs, you can expect to pay between $59 and $149.