Thursday, 6 November 2014

Internet Explorer shortcut keys

Internet ExplorerBelow is a listing of all the major shortcut keys in Microsoft Internet Explorer. See the computer shortcut page if you are looking for other shortcut keys used in other programs.
Shortcut Keys Description
Alt + Left Arrow   Back a page.
Backspace    Back a page.
Alt + Right Arrow Forward a page.
F5 Refresh current page, frame, or tab.
F11 Display the current website in full screen mode. Pressing F11 again will exit this mode.
Esc Stop page or download from loading.
Ctrl + (- or +) Increase or decrease the font size, pressing '-' will decrease and '+' will increase.
Ctrl + Enter Quickly complete an address. For example, type computerspirit in the address bar and press CTRL + ENTER to get http://www.computerspirit.blogspot.com.
Ctrl + D Add a Favorite for the page currently opened.
Ctrl + I Display available bookmarks.
Ctrl + N Open New browser window.
Ctrl + P Print current page or frame.
Ctrl + T Opens a new tab.
Ctrl + F4 Closes the currently selected tab.
Ctrl + Tab Moves through each of the open tabs.
Spacebar Moves down a page at a time.
Shift + Spacebar Moves up a page at a time.
Alt + Down arrow Display all previous text entered in a text box or available options on drop down menu.
Alt + D Highlights the text in the address bar

Mozilla Firefox shortcut keys

FirefoxBelow is a listing of all the major shortcut keys in Mozilla Firefox. See the computer shortcut page if you are looking for other shortcut keys used in other programs.
Shortcut Keys Description
Alt + Home Open your home page.
Alt + Left Arrow Back a page.
Alt + Right Arrow Forward a page.
F5 Refresh current page, frame, or tab.
F11 Display the current website in full screen mode. Pressing F11 again will exit this mode.
Esc Stop page or download from loading.
Ctrl + (- or +) Increase or decrease the font size, pressing '-' will decrease and '+' will increase. Ctrl + 0 will reset back to default.
Ctrl + Enter Quickly complete an address. For example, type computerspirit in the address bar and press CTRL + ENTER to get http://www.computerspirit.blogspot.com.
Ctrl + Shift + Del Open the Clear Data window to quickly clear private data.
Ctrl + D Add a bookmark for the page currently opened.
Ctrl + I Display available bookmarks.
Ctrl + J Display the download window.
Ctrl + K or Ctrl + E Move the cursor to the search box.
Ctrl + N Open New browser window.
Ctrl + P Print current page or frame.
Ctrl + T Opens a new tab.
Ctrl + F4 or Ctrl + W Closes the currently selected tab.
Ctrl + Shift + T Undo the close of a window.
Ctrl + Tab Moves through each of the open tabs.
Spacebar Moves down a page at a time.
Shift + Spacebar Moves up a page at a time.
Alt + Down arrow Display all previous text entered in a text box and available options on drop down menu.

How can I protect myself while online? Verify data is encrypted

Computer securityWhen sending confidential information over the Internet such as usernames, passwords, or credit card numbers only send it securely. To verify this look for a small lock (Internet browser security lock) in the bottom right corner of your browser window or next to the address bar (as shown below). If visible, this lock should also be in the locked position and not unlocked.
Internet Explorer 7.0 secure address bar
Internet Explorer 7 secure address bar
We also suggest making sure the URL begins with https as shown above.
While the lock is in the lock position, data is encrypted, which helps anyone from understanding the data if it's intercepted. When no lock is visible or in the unlocked position all information is plaintext and if intercepted could be read. If a web page is not secure, such as an online forum, use a password you wouldn't use with protected sites such as your online banking website.

E-mail is not encrypted

Websites should not transmit confidential data over e-mail, such as passwords, credit card information, etc. E-mail is not encrypted and if intercepted by a third-party could be read.

Be aware of phishing scams

Familiarized yourself with phishing scams and techniques, which are used to trick you into divulging your account information. Online banking sites, Paypal, eBay, Amazon, and other popular sites that require logins are popular targets.

Use a safe password

Websites that store confidential data, such as an online bank site need to use strong passwords. Also, it is highly recommended that you use a different password for each website that requires a login. If you need help remembering your passwords consider using a password manager.

Use caution when accepting or agreeing to prompts

When prompted to install any program or add-on make sure to read and understand the agreement before clicking on the Ok button. If you do not understand the agreement or feel it is not necessary to install the program cancel or close the window.
Additionally, when installing any program watch for any check box that asks if it's ok to install a third-party program, toolbar, etc. These are never required and often cause more issues than good. Leave these boxes unchecked.

Be cautious where you're logging in from

Business
Your place of work can install key loggers or use other methods of monitoring the computer while online. Someone who has access to this information could read these logs and gather usernames and passwords. Also, do not store any passwords in your browser if your computer is shared with other coworkers.
Wireless network
When on a wireless network realize that all information being sent to and from your computer can be intercepted and read by someone nearby. Prevent this from happening by only logging into a secure network using WEP or WPA. If this is a home wireless network, make sure it is secure.
Friends house
Be concerned when logging into an account from a friends computer. A computer or network you are not familiar with could intentionally or unintentionally log usernames and passwords. Finally, when logging into any site on a friends computer never save the password information on their browser.

Be aware of those around you

While at work, school, library, or anywhere that has people around who could look at the monitor be cautious of anyone shoulder surfing. Someone could watch you type in your password, which would give them access to your account.
If you need everything displayed on the screen to remain private, consider a privacy filter for the display.

Update Internet browser plugins

Often many attackers find security vulnerabilities through browser plugins such as Adobe Flash. Make sure all installed Internet plug-ins are up-to-date.

Secure saved passwords

Make sure to store passwords and login information in a secure area. Never write login information on a sticky note or in a text file that is not encrypted.
To save your passwords we recommend using a password manager, which stores all login information and securely encrypts and password protects that information.
When saving password information in a browser, it may be visible by anyone who has access to your Internet browser. For example, without a master password setup in Firefox anyone can see all stored passwords.

Use a third-party service to confirm the safety and security of a page

We recommend the free Web of Trust (WOT) tool to verify the safety of all websites on the Internet.

Malwarebytes

Sometimes abbreviated as MBAM, which is short for Malwarebytes Anti-Malware is an excellent software utility program that is designed to scan your computer for any Malware and clean that malware if found. This program can be used in conjunction with your antivirus program and can help detect any threats to your computer that an antivirus program may have missed.
  • The official Malwarebytes' Anti-Malware web page can be found at: http://www.malwarebytes.org
  • How can I protect myself while online?

ROOT

1. Alternatively referred to as an admin, administrator, and gatekeeper, root is a superuser on a computer or network and has complete control. See our Administrator definition for a full explanation.
2. The root or root directory is also the highest level in a directory hierarchy. For example, in MS-DOS, the root or root directory of the primary hard drive would C:\. When working on a web page the root directory will be your home directory or your public_html directory.
  • MS-DOS help and support.
  • Users in the Microsoft recovery console can set the current directory to the system root directory by using the systemroot command.
3. Root is also an ability, effect, or spell in computer games that locks a target in place. For example, in the game World of Warcraft the Mage class has a spell called Frost Nova that freezes an enemy in place for a few seconds.

Monday, 3 November 2014

How much is 1 byte, kilobyte, megabyte, gigabyte, etc.?

Below is a list of each of the accepted disk drive space values. It is important to realize that not all manufacturers and developers use binary base 2. For example, a manufacturer may consider a gigabyte as 1,000,000,000 bytes and not 1,073,741,824 bytes. For this page we are listing all values in their base 2 values.
Note: All values are whole numbers, which means a GB shows it can only contain one 650MB CD, but 1GB could hold 1.5753... of a 650MB CD. Since we created this document to illustrate how much each value can contain in whole, no decimal values are shown. In other words, you can only fit one complete 650MB CD on a 1GB drive since two full 650MB discs exceed 1GB.
Tip: With the exception of a bit and a nibble, all values explained below are in bytes and not bits. For example, a Kilobyte (KB) is different than a Kilobit (Kb). When referring to storage, bytes are used, when referring to transmission speeds bits are used.

Bit

A bit is a value of either a 1 or 0 (on or off).

Nibble

A Nibble is 4 bits.

Byte

Today a Byte is 8 bits.
  • 1 character, e.g. "a" is one byte.

Kilobyte (KB)

A Kilobyte is 1,024 bytes.
  • 2 or 3 paragraphs of text.

Megabyte (MB)

A Megabyte is 1,048,576 bytes or 1,024 Kilobytes
  • 873 pages of plaintext (1,200 characters)
  • 4 books (200 pages or 240,000 characters)

Gigabyte (GB)

A Gigabyte is 1,073,741,824 (230) bytes. 1,024 Megabytes, or 1,048,576 Kilobytes.
  • 894,784 pages of plaintext (1,200 characters)
  • 4,473 books (200 pages or 240,000 characters)
  • 640 web pages (with 1.6MB average file size)
  • 341 digital pictures (with 3MB average file size)
  • 256 MP3 audio files (with 4MB average file size)
  • 1 650MB CD

Terabyte (TB)

A Terabyte is 1,099,511,627,776 (240) bytes, 1,024 Gigabytes, or 1,048,576 Megabytes.
  • 916,259,689 pages of plaintext (1,200 characters)
  • 4,581,298 books (200 pages or 240,000 characters)
  • 655,360 web pages (with 1.6MB average file size)
  • 349,525 digital pictures (with 3MB average file size)
  • 262,144 MP3 audio files (with 4MB average file size)
  • 1,613 650MB CD's
  • 233 4.38GB DVD's
  • 40 25GB Blu-ray discs

Petabyte (PB)

A Petabyte is 1,125,899,906,842,624 (250) bytes, 1,024 Terabytes, 1,048,576 Gigabytes, or 1,073,741,824 Megabytes.
  • 938,249,922,368 pages of plaintext (1,200 characters)
  • 4,691,249,611 books (200 pages or 240,000 characters)
  • 671,088,640 web pages (with 1.6MB average file size)
  • 357,913,941 digital pictures (with 3MB average file size)
  • 268,435,456 MP3 audio files (with 4MB average file size)
  • 1,651,910 650MB CD's
  • 239,400 4.38GB DVD's
  • 41,943 25GB Blu-ray discs

Exabyte (EB)

An Exabyte is 1,152,921,504,606,846,976 (260) bytes, 1,024 Petabytes, 1,048,576 Terabytes, 1,073,741,824 Gigabytes, or 1,099,511,627,776 Megabytes.
  • 960,767,920,505,705 pages of plaintext (1,200 characters)
  • 4,803,839,602,528 books (200 pages or 240,000 characters)
  • 687,194,767,360 web pages (with 1.6MB average file size)
  • 366,503,875,925 digital pictures (with 3MB average file size)
  • 274,877,906,944 MP3 audio files (with 4MB average file size)
  • 1,691,556,350 650MB CD's
  • 245,146,535 4.38GB DVD's
  • 42,949,672 25GB Blu-ray discs

Zettabyte (ZB)

A Zettabyte is 1,180,591,620,717,411,303,424 (270) bytes, 1,024 Exabytes, 1,048,576 Petabytes, 1,073,741,824 Terabytes, 1,099,511,627,776 Gigabytes, or 1,125,899,910,000,000 Megabytes.
  • 983,826,350,597,842,752 pages of plaintext (1,200 characters)
  • 4,919,131,752,989,213 books (200 pages or 240,000 characters)
  • 703,687,443,750,000 web pages (with 1.6MB average file size)
  • 375,299,970,000,000 digital pictures (with 3MB average file size)
  • 281,474,977,500,000 MP3 audio files (with 4MB average file size)
  • 1,732,153,707,691 650MB CD's
  • 251,030,052,003 4.38GB DVD's
  • 43,980,465,111 25GB Blu-ray discs

Yottabyte (YB)

A Yottabyte is 1,208,925,819,614,629,174,706,176 (280) bytes, 1,024 Zettabytes, 1,048,576 Exabytes, 1,073,741,824 Petabytes, 1,099,511,627,776 Terabytes, 1,125,899,910,000,000 Gigabytes, or 1,152,921,500,000,000,000 Megabytes.
  • 1,007,438,183,012,190,978,921 pages of plaintext (1,200 characters)
  • 5,037,190,915,060,954,894 books (200 pages or 240,000 characters)
  • 720,575,937,500,000,000 web pages (with 1.6MB average file size)
  • 384,307,166,666,666,666 digital pictures (with 3MB average file size)
  • 288,230,375,000,000,000 MP3 audio files (with 4MB average file size)
  • 1,773,725,384,615,384 650MB CD's
  • 257,054,773,251,740 4.38GB DVD's
  • 45,035,996,273,704 25GB Blu-ray discs

How are you calculating the above values?

To calculate the above values is simple once you know the values of each of the above sizes. For example, in the above example we know that 1 gigabyte is equal to 1,024 Megabytes. Therefore to determine how many 4MB MP3 files are in a Gigabyte, we take 1,024 / 4 which equals 256 or 256 4MB MP3 files in one gigabyte.

software

Sometimes abbreviated as SW and S/W, software is a collection of instructions that enable the user to interact with a computer or have it perform specific tasks for them. Without software, computers would be useless. For example, without your Internet browser software you would be unable to surf the Internet or read this page and without a software operating system the browser would not be able to run on your computer. In the picture is a Microsoft Excel software box and an example of a software program.

How do you get software?

Software can be purchased at a local retail computer store or online, usually in a box that contains all the disks (floppy diskette, CD, DVD, or Blu-ray) required for the program, manuals, warranty, and other necessary documentation.
Software can also be downloaded to a computer over the Internet. Once downloaded, setup files can be run to start the installation of the program on your computer.
Free software
In addition to purchasing software, there are also millions of free software programs available that are broken into different types of categories.
  • Shareware or trial software is software that gives you a few days to try the software before you buy the program. After the trial time expires you'll be asked to enter a code or to register the product before you can continue to use it.
  • Freeware is completely free software that never requires payment as long as its not modified.
  • Open source software is like freeware but not only is the program given away, but the source code used to make the program is as well, allowing anyone to modify the program or view how it was created.

How is software created?

A computer programmer or several computer programmers write the instructions using a programming language that tell the software how to work. Once the program has been completed it is compiled into a language that the computer can understand.