Thursday, March 10, 2011

Speed up FireFox by allowing Multiple Pipeline Downloads!

    If you have a broadband connection (and most of us do), you can use pipelining to speed up your page loads; which is very cool to do. This allows Firefox to load multiple things on a page at one time, instead of one at a time (SLOW!) (by default, it’s optimized for dialup connections). Here’s how:
  • Now type “about:config” into the address bar and hit return. Type “network.http” in the filter field, and change the following settings (double-click on them to change them):
  • Now set “network.http.pipelining” to “true”
  • Now set “network.http.proxy.pipelining” to “true”
  • Now set “network.http.pipelining.maxrequests” to a number like 30. This will allow it to make 30 requests at once.
  • And also, right-click anywhere and select New-> Integer. Name it “nglayout.initialpaint.delay” and set its value to “0″. This value is the amount of time the browser waits before it acts on information it receives.

Tuesday, March 8, 2011

Linux 101 an Introduction to Free Computing


What is Linux, Free Software and Open Source?

Linux (also known as GNU/Linux) is a computer operating system, like Microsoft Windows or Apple Mac OS. Unlike those two, however, Linux is built with a collaborative development model. The operating system and most of its software are created by volunteers and employees of companies, governments and organizations from all over the world.
The operating system is free to use and everyone has the freedom to contribute to its development. This co-operative development model means that everyone can benefit. Because of this, we like to call it Socially Responsible Software, or Free Software. Closely related is the concept of Open Source Software. Together, Free and Open Source Software is collectively abbreviated as FOSS. This contrasts with the proprietary (or closed source) development model used by some software companies today.
Many of the principles behind FOSS are derived from the axiom of standing on the shoulders of giants, most famously used by Isaac Newton, which has guided scientific and industrial development for hundreds of years. Transparency of the code and development process means that it can be participated in and audited at all levels. Software is just another form of information, and people have the right to have full control over that information. In the same way that you are free to share your favorite books and recipes with your neighbor, you should also have the freedom to share and change software.
Linux has many other benefits, including speed, security and stability. It is renowned for its ability to run well on more modest hardware. Linux comes from the venerable UNIX family of operating systems, and so has been built from the ground-up with Internet-style networking and security in mind. Hence, viruses, worms, spyware and adware are basically a non-issue on Linux.
How can it cost nothing? Doesn't it cost money to make good software?
It can cost time and resources to produce good software, which are not synonymous with money. Many FOSS developers develop for fun; many others are paid for their time. Because the code is open, it is actively worked on by all sorts of individuals and organizations. Since development is shared, it can cost relatively little to work with FOSS. The savings made can be invested into creating better customization or into improving integration with existing systems and processes. When access to the source code is available, there are essentially no limitations to what can be achieved. Free Software is so named because of the freedom granted to the user.
FOSS makes it possible to leverage the skills and insights of a wide range of developers, thereby avoiding the constraints and limited viewpoints of a small, closed development team. Usable feedback can be received throughout the development process from users worldwide. Code and ideas from different programs can be melded together, creating interesting and powerful combinations whilst minimizing duplication of effort.
Many proprietary software packages are sold at far above the cost of their production. Microsoft Windows, for instance, has for many years been sold at at profit margin of 85 per cent. A mere 15 per cent is spent on marketing, packaging, shipping, and development of the product.
  • Software, like any information, is infinitely replicable. Despite this, many vendors like to price their proprietary software as if they are physical items. Through the enforcement of artificial scarcity and vendor lock-in, software prices can be kept artificially high. In contrast, FOSS promotes abundance and open standards.
If you think that the software that was installed on your computer was free, think again — they were no doubt factored into the cost of the computer. In fact, software can make up to a quarter of the cost of a modern computer.



So What Should A user expect to see differently?
Well SUPER GLAD you asked lets put in a Live CD (Can run Linux from your DVD/CD Drive with out touching anything on your hard Drive) and test out your first Flavor of Linux.





















Thanks to © Sridhar Dhanapalan 2007-2008. It is licensed under a Creative Commons Attribution-Share Alike 2.5 Australia Licence.
  • to Share — to copy, distribute and transmit the work
  • to Remix — to adapt the work
  • Under the following conditions:

  • Attribution — You must attribute the work in the manner specified by the author or licensor (but not in any way that suggests that they endorse you or your use of the work).
  • Share Alike — If you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.
  • With the understanding that:
  • Waiver — Any of the above conditions can be waived if you get permission from the copyright holder.
  • Public Domain — Where the work or any of its elements is in the public domain under applicable law, that status is in no way affected by the license.
  • Other Rights — In no way are any of the following rights affected by the license:
  • Your fair dealing or fair use rights, or other applicable copyright exceptions and limitations;
  • The author's moral rights;
  • Rights other persons may have either in the work itself or in how the work is used, such as publicity or privacy rights.
  • Notice — For any reuse or distribution, you must make clear to others the license terms of this work. The best way to do this is with a link to this web page.

Thursday, February 17, 2011

Coolest Two Player Game EVER!

Make my Head GROW!!!!!!!! player one uses the Arrow keys and player two uses 5,1,2,3 on the num pad   hold up for 1-2secs too smash your head and left right to slam into the boxes edge and try too knock your buddy off it is really addictive and you might actually end up pushing your friends IRL i know i usually do

Safe computing 101




Safe Computing 101
Online Safety Resource and Software Selection help

  1. Remember that thieves will stop at nothing to gain control of your system and of your online financial information in order to get your money into their accounts or to use your identity or using your good credit to take out loans that could end up costing you.

  1. Viruses aren't like they used to be now days they are mostly aimed at 1 of 2 things getting your information and passwords by using keystroke monitoring software or gaining control of your system to be used in a “bot attack” that virus writers use your computer and many others to overload a sites ISP crippling its functionality and to extort money from web administrators in exchange for a stop of the bot attack.

  1. But with the use of a few simple easy to remember rules your identity and personal information will be safe.
  • Never give your bank routing information online to anyone EVER!
  • Never give your ATM pin online EVER!
  • Use an online money service to spend online. These services have protections built in to keep online consumers safe (ie: Pay-Pal, Net Gold....)
  • Use and keep updated anti-virus and anti-malware software(NO! An unpaid Norton on your System does nothing and is leaving you vulnerable to attack)
  • Use a program that enters your passwords for you (ie:Multi-pass[free]...)
  • Make certain your passwords are separate for each website you use and that your passwords are unguessable.
  • Refrain from visiting adult sites. These are the most widely abused ports into your computer and often download tons of spyware onto your machine and that's how these “free”sites make money.

  1. BACK UP THE HARD DRIVE REGULARLY: Backing up files will not prevent exposure or damage from a virus but it can minimize the consequences. For example, a back up can be used to recover damaged or lost files. Also,back up can be used to get a computer up and running again quickly.

So Welcome to internets 1.2 beta and your not a newbie any more..

So Welcome to internets 1.2 beta and your not a newbie any more..
+Installed Mozilla Firefox
+Got a Gmail account
+Uninstantiated and disconnected
+Uninstalled all payed services
+Found the Free Alternative
+So Far So Good!