gc

29 November 2007

How To Use the Group Policy Editor to Manage Local Computer Policy in Windows XP

This article describes how to use the Group Policy Editor to change local policy settings for the computer or for users of the computer.

Uses of Group Policy

In Microsoft Windows XP, you use Group Policy to define user and computer configurations for groups of users and computers. You create a specific desktop configuration for a particular group of users and computers by using the Group Policy Microsoft Management Console (MMC) snap-in. The Group Policy settings that you create are contained in a Group Policy Object (GPO), which is in turn associated with selected Active Directory containers, such as sites, domains, or organizational units (OUs). With the Group Policy snap-in you can specify policy settings for the following:

•Registry-based policies.
These include Group Policy for the Windows XP operating system and its components and for programs. To manage these settings, use the Administrative Templates node of the Group Policy snap-in.

•Security options.
These include options for local computer, domain, and network security settings.

•Software installation and maintenance options.
These are used to centrally manage program installation, updates, and removal.

•Scripts options.
These include scripts for computer startup and shutdown, and user logon and logoff.

•Folder redirection options.
These allow administrators to redirect users' special folders to the network. With Group Policy, you can define the state of users' work environment once and rely on the system to enforce the policies that you define.

How to Start the Group Policy Editor

To start the group policy editor, follow these steps.NOTE: You must be logged on to the computer using an account that has administrator privileges in order to use Group Policy Editor.

1.Click Start, and then click Run.

2.In the Open box, type mmc, and then click OK.

3.On the File menu, click Add/Remove Snap-in.

4.Click Add.

5.Under Available Stand-alone Snap-ins, click Group Policy, and then click Add.

6.If you do not want to edit the Local Computer policy, click Browse to locate the group policy object that you want. Supply your user name and password if prompted, and then when you return to the Select Group Policy Object dialog box, click Finish. NOTE: You can use the Browse button to locate group policy objects linked to sites, domains, organizational units (OU), or computers. Use the default Group Policy Object (GPO) (Local Computer) to edit the settings on the local computer.

7.Click Close, and then in the Add/Remove Snap-in dialog box, click OK.The selected GPO is displayed in the Console Root.

How to Use the Group Policy Editor
The Group Policy snap-in contains the following major branches:

•Computer Configuration
Administrators can use Computer Configuration to set policies that are applied to computer, regardless of who logs on to the computers. Computer Configuration typically contains sub-items for software settings, Windows settings, and administrative templates.

•User Configuration
Administrators can use User Configuration to set policies that apply to users, regardless of which computer they log on to. User Configuration typically contains sub-items for software settings, Windows settings, and administrative templates.To use the group policy editor, follow these steps:

1.Expand the GPO that you want. For example, Local Computer Policy.

2.Expand the configuration item that you want. For example, Computer Configuration.

3.Expand the sub-item that you want. For example, Windows Settings.

4.Navigate to the folder that contains the policy setting that you want. The policy items are displayed in the right pane on the Group Policy Editor snap-in.NOTE: If no policy is defined for the selected item, right-click the folder that you want and then on the shortcut menu that appears, point to All Tasks, and then click the command that you want. The commands that are displayed on the All Tasks submenu are context sensitive. Only those commands that are applicable to the selected policy folder appear on the menu.

5.In the Setting list, double-click the policy item that you want.NOTE: When you work with policy items in the Administrative Templates folder, click the Extended tab in the right pane of the MMC if you want to view more information about the selected policy item.

6.Edit the settings of the policy in the dialog box that appears, and then click OK.

7.When you are finished, quit the MMC.

Example

The following example illustrates the use of the Group Policy Editor to customize the Windows XP user interface. In this example, we will use the Group Policy Editor to temporarily remove the Turn Off Computer button from the Start menu. To do this, follow these steps:

1.Start the Group Policy Editor and open the Local Computer policy by using the steps provided in the How to Start the Group Policy Editor section of this article.NOTE: You can start the Group Policy Editor snap-in from the command line. This automatically loads the Local Computer GPO. To do this, follow these steps:

a. Click Start, and then click Run.
b. In the Open box, type Gpedit.msc, and then click OK.

2.Expand User Configuration (if it is not already expanded).

3.Under User Configuration, expand Administrative Templates.

4.Click Start Menu and Taskbar.

5.In the right pane, double-click Remove and disable the Turn Off Computer button.

6.Click Enabled, and then click Apply.

7.Click Start.Notice that the Turn Off Computer button is no longer displayed.

8.Select the Remove and disable the Turn Off Computer button Properties dialog box.

9.Click Not Configured, then click Apply, and then click OK.

10.Click Start.Notice that the Turn Off Computer button is again displayed on the Start menu.

11.Quit the Group Policy Editor snap-in.

27 November 2007

Universal Serial Bus (USB )

Q: What does USB stand for?
A: It stands for Universal Serial Bus

Q: What Is USB?
A: USB is a specification that allows computer peripherals to be attached to the outside of the computer. It eliminates the need to install cards into dedicated computer slots and reconfigure the system. USB is really an ultimate plug-n-play specification that no switches or jumpers are required to configure. One of the top benefits from USB is that users can install hardware without needing to reboot their computers. USB allows up to 127 devices to run at the same time on the bus, with hubs connecting to devices to the bus. The USB also provides a much higher transfer rates than the traditional RS-232 or parallel-port devices.

· One standard connector type - "one-size-fits-all."
· Hot insertion and removal - now you can attach and detach peripherals while your system stays up and running.
· Chain devices together - USB allows some peripherals to incorporate "hubs" that serve as connection points for other devices. This lets you use more than one USB-compatible device at a time.
· Automatic installation - when a USB-compatible peripheral is connected, PCs with USB automatically install and configure the necessary drivers and system resources.
· Separate power cord not required - most USB devices get their power through the USB bus (connection) itself, so only one cable is needed.
· Faster - USB transfers data 10 times faster than traditional serial ports.

Q: What devices support USB?
A: Almost any I/O (Input/Output) device can be used with USB. They include Mice, Keyboards, Joysticks, Scanners, Monitors, Zip Drives, Telephones, Cameras and Printers.

Q: What is USB 2.0 and will it replace the original?
A: USB 2.0 runs at a whopping 480 Mbps and features complete backward compatibility with the original USB. USB 2.0 will most likely not completely replace its predicator because, simply, a keyboard or mouse doesn’t need 480 Mbps bandwidth. While peripherals won’t utilize 2.0, it will be great for web cams, digital cameras, etc.

Q: How fast is USB?
A: USB is designed to run at 12 Mbps with a sub-channel running at 1.5 Mbps.

Q: I have Windows 95, Can I still use USB?
A: The original Windows 95 cannot use USB no matter whether you have USB or not. You need to have Windows 95 OSR 2.1 (Service Release). If not you can download the supplement for Windows 95B.

Q: Will I need special software to run USB with other Operating Systems?
A: No, what you need is Windows 95B ,Windows 98, Windows 2000, or MacOS 8.5 (found in iMac and G3 systems). The operating systems pretty much cover the software side. If you got a USB device, either the operating systems have the necessary drivers or the manufacturers ship with the required software/drivers for the hardware.

Q: I don't have USB, Can I add it to my PC?
A: You must have an available PCI slot to install USB PCI card. OS requirement is Windows 98 or Windows 95 OSR2.

Q: Is USB support stable?
A: Good question. USB is a relatively new specification, Windows 98 was really the first OS to have what Microsoft considered full USB support. Unfortunately while the majority of USB devices work fine, Windows 98 did have many USB related problems.

Monitor

The monitor is a television-like box except it is used in a computer for display. You can't use the computer at all without a monitor. The monitor is different from the television is many ways. It is flatter compared to the television. Television refreshes the screen by interlacing while the monitor is using non-interlaced functions. Monitors uses pixels to display, making it finer and better to display text.

Larger Resolution, Smaller Display

One thing you should know, since monitors measure by pixels, you should always set the resolution right. A larger resolution uses smaller pixels, making everything smaller but you have a larger view. The default is 640x480 but most prefer 800x600. For larger monitors, you can decide on 1024x800 or 1280x1024. Also remember, since there are more pixels, the higher the resolution, the slower the screen refreshes.

Decide On A Screen Filter

Although computer screens are just 30% of the radioactivity from the TV or less, you still might want to consider a screen filter. It helps filter up radioactivity. Never settle for a cheap screen filter. A lousy one won't filter the screen - it just darkens it. Always make sure that it won't make everything look dark. Some good screen filters provide a wire to clip it at the back of the casing to lose the radioactivity.

On the other hand, you should also make sure you don't need one. Here are a few points to guide you.
  • Your computer (& monitor) is placed under a bright place and can balance with the brightness of the monitor
  • Your monitor is anti-glare and non-reflective.
  • Your monitor produces little static and radioactivity.
  • Your monitor produces clear, crisp and not-too-bright images.
  • You won't have problems staring at the monitor for a long time.
    If your monitor fits that criteria, you can forget the screen filter.

Blink Your Eyes!


This is not actually a hardware tip, just to let you know how important it is to blink your eyes. Your eyes don't actually get strained staring at the monitor, just loses moisture and making the eyes dry. It has been proven that people staring at the monitor for a long time has the tendency to blink less than the normal rate. Make an effort to blink your eyes. If not, try eye moisture drops.


Degauss


Degauss is a very important function that helps you restore your monitor when colors are distorted or you noticed weird colors at the corners of your monitor. This is cause by magnetization that can be caused by jerking the monitor, shifting to a different direction or moving it across the globe (different magnetic field). The degauss control removes magnetization from your monitor.


Use the degauss control lightly. You should only degauss if you see color purity problems. Otherwise, don't use it. Too much degaussing stresses the circuitry components and overheats the large coil around the CRT. If possible, when the display clears up, shut down the monitor/computer for a while to let it cool down.


Take Control


When your monitor comes, modify the factory default setting of your monitor! Get more colors or brightness. And stretch the screen to the fullest! Although this may sound trivial, a lot of people just think it's alright to follow the original setting, losing valuable screen space, you will be surprised to know how much bigger you can stretch the screen. A bigger display is always better.

What is ADSL?

ADSL stand for asymmetric digital subscriber line, here asymmetric means data speed does not same in both directions (upload and download) and provides high speed on already exiting telephone lines and same time you can use internet and as well as your line for phone.

It is faster than DSL and but ADSL downstream speed (downstream rate ) is different with upstream speed (sending rate ). ADSL is much easier to install and provides much faster data transfer rate. ADSL support data upstream rate is 16 Kbps to 640 Kbps and data downstream rate is 1.5 to 9 Mbps. Normally ADSL and download and upload speed is averagely 10 time more than a normal dial up connection.

Your DSL connection to the Internet will always on, there is not need to dial your ISP each time to use internet and the main requirement for ADSL connection is modem. There are many option in modem hardware for example: USB ADSL Modem, PCI ADSL Modem, and ADSL Router, but mostly used USB Modem because easy to install.

For 1 or 2 computer the USB modem is best but for more than 3 computer you should use Ethernet ADSL modem. ADSL connections are more useful in applications like videoconferencing, to run online movies and upload and download heavy files. This connection is ideal for today business requirements.

What is Network?

A network or communication network is a system of interconnected communication devices that can communicate with one another and share information. Therefore computer network can be defined as:

A system in which more than one computers or large number of computers are interconnected together, communicate freely with one another and share information is called computer network.

A network can be internal to an organization or span the world by connecting itself to the internet. In computer network, network operating system is used that controls and co-ordinates the activities of computers that are connected to the network. The example of these operating systems are: windows NT, UNIX, and Novell etc.

Types of Network

Networks are of three types. These are:
  1. Local Area Network (LAN)
  2. Wide Area Network (WAN)
  3. Metropolitan Area Network (MAN)

Local Area Network
A local area network is a network system in which computers are interconnected in a limited geographical area, such as network of computers in college computer laboratory or network of computers in office building etc.

Wide Area Network
A wide area network is a network system that covers a large geographical area such as different cities of country or different countries of the world. In WAN telephone lines, satellites, microwave, fiber optic etc. are used as transmission media.

Metropolitan Area Network
A Metropolitan area Network is a network system that covers area of a single city. Usually, MAN connects more than one LANS in a city or town and covers a smaller geographical area than a WAN. The cable television, telephone companies or local corporations use MAN.

How to save data with backup regularly?

Back up regularly your data. It is important factor for you to get backup your files and folder on a regular basis. Because in this global network a computer can crash, a virus, or a hard drive failure can wipe out everything. Don't make this mistake, It depend upon you and your data importance but better technique is that back up everything at least once a week. But if you use your computer daily, it is best to back up important files daily and other data weekly.

Keep several backup copies of same backup. Never back up over a previous backup copy, always try to keep several copies over time so that if one time one back create problem you can user others.. Remember, a problem that is backed up will remain a problem when restored.

Easy way for backup using Be selective method. You don't have to do a total system backup of your system over time, If your are doing so, you are wasting your time. Just back up your important files, folder and photos. Backing up the entire hard drive is time-consuming, not practical, and should not be done. A backup of specific data files is the way to go. But a best technique is that first install your all computer program and system drivers then do a backup using any third party software (cloning software) like Norton ghost or others of your C drive once, this backup will help you to restore your all computer program in 15 min in case of any problem and do important data backup daily or weekly.

How to clean CD/DVD with care?

You can preserve the life of CD/DVD, if you handle and clean it properly, because dirty discs can create errors in reading or writing and soon discs will not work at all.


Follow the given steps to care and clean a CD/DVD :


  • Avoid to touching the writeable or data side of the CD/DVD.

  • Always hold your CD/DVD by its center hole or by the outer edges.

  • Keep away your discs from sunlight, heat and anything that may create scratch on the discs.

  • Always clean dust with a soft cloth or with a CD/DVD cleaning kit and avoid to clean with static cloth or harsh detergents.

  • Start work to clean from inside to outside in straight lines until the CD/DVD is clean.

  • Store your all discs vertically position and in dust free box.

19 Julai 2007

Free space to keep

How much free space should you maintain on your computer’s hard drive? Most experts recommend that at least 20% of the drive be kept available.

The extra space is used to store temporary files by applications you use, defragmentation programs, and new files and programs you’ll undoubtedly add as you use you computer.

When you can no longer keep at least 20% of your drive free, it’s time to think about upgrading a larger drive.

Access the BIOS

On the inside, every PC is built around the motherboard. The circuit board does not get much publicity, but it’s important, since every other component in your system attaches to it.


You can configure the way that your motherboard interacts with other components in your system by reading about your computer’s BIOS setup program, which is usually available by pressing Del or F2 as your computer boots up.


Spend some time reading about your motherboard in your computer’s documentation.

Getting around documents

Getting to the top or bottom of a document quickly is something that most Microsoft Word users need to do often.

Using the vertical scroll bar or the PageUp and PageDown keys will do the job, but they’re slow, especially with long documents.


Instead, to get to the top of the document, hold down the Ctrl key and tap Home. To get the bottom, hold down the Ctrl key and tap the End key.

Shift to delete

Ever want totally remove a file form your computer? In Windows, when you delete a file by pressing the Delete key, a copy pf your file is moved to the Recycle Bin.

Anyone who opens your Recycle Bin can easily see the files that you have deleted recently. To prevent files from being deleted to the Recycle Bin, select the file you wish to delete, hold down the Shift key, and then press Delete.


Remember that when you use this method to delete files, you will not to able to retrieve them from the Recycle Bin.

Get rid of dust

Dust is your computer worst enemy. Over time, dust will accumulate in your PC. The result will be both a dirtier environment and more heat inside your computer.

Every month or so, open up your PC case, and with a vacuum hose, gently suck out the dustballs that accumulate inside.

Try not to touch the fragile electronic components with the vacuum. Remember to vacuum the dust in the fan at the back of your PC as well.

When Flash cards die

You’re on holiday and you’re taken hundreds of photographs with your digital camera. Suddenly, it freezes and an error-message appears on screen. Your memory card is corrupted.

Don’t panic. Immediately remove your memory card from the camera (don’t even think of formatting it) and keep it in a safe place.

While your PC may not be able to read data from your card, data-recovery software can (try Google or go to
www.datarescue/photorescue/ ). In most cases, you can actually recover up to 90% of the photo on your dead memory card.

Take a break

When using a PC, it is easy to remain stuck at your screen for several hours at a time. Remaining completely still and not drinking water for extended periods of time (i.e “Economy class” syndrome) can result in deep vein thrombosis (DVT), where a blood clot forms in veins of your legs.

If you’re unlucky, this clot may dislodge itself and make its way to the arteries in your lungs or brain, resulting in death.

So take a break from World of Warcraft every hour or so for a drink – it may save your life.

Keep It Cool & Quiet

For most people, the standard cooler that comes with the computer is good enough. But for those who want a really quiet computer, it is worth looking at third-party cooler that keep the processor cooler and yet run quieter.


Two coolers that have recently gained recognition are Scthye Ninja SCNJ-IIOOP and the Zalman CNPS 9700 LED. However, users should make sure that the coolers are compatible with their processor and motherboard and will fit in their casing before purchasing one.

Keeping Tabs On Startup Programs

Q : What’s a good program to see what runs on my computer when I start it up? MSConfig just confuses me.

A : I used to recommend MsConfig, a configuration tool included in most version of Windows, but I can’t anymore. It offers next to zero guidance about the identity of each start-up component – you basically have to Google or guess to learn what each eight-character filename listed in MsConfig means.

If you run Windows XP, use Microsoft’s free Windows Defender (
www.microsoft.com/windowsdefender) instead. This antispyware program includes a System Explorer (available under its toolbar’s Tool icon) that list every start-up program, including its full name and creator, and lets you disable any of them. Altough Defender is still in beta testing, it’s been trouble-free in my use.

If you run an older version of Windows or you have problems that stymie Windows Defender, try SysInternals’ free Autoruns (
www.sysinternals.com/Utilities/Autoruns.html)

This program presents more technical data but remains relatively simple to operate : Select its “Everything” tab, then click checkboxes under the Autorun heading to disable unwanted startup programs. (you don’t need to do anything else to confirm your changes, just exit the program and restart at that point).

Microsoft itself thought well enough of Autoruns to buy SysInternals in July – LAT-WP

09 Jun 2007

Avira Personal Edition Classic



EVERY computer needs to have at least one good antivirus program. One decent option is Avira Personal Edition Classic (Avira) – a free antivirus application that is free for personal use.

It is a comprehensive and easy-to-use application that is designed to protect home users from threats like viruses, malware, adware and spyware.

It does most of the common antivirus tasks such as disk scanning, automatic virus definition scanning and rootkit removal.

Avira has a nice tabbed interface that keeps everything neat and in working order.












With the free personal edition, you get the basic computer scanning, virus quarantine features and update scheduler that you expect to get from any antivirus program.


We like how Avira constantly scans our computer for malicious programs while keeping a vigilant eye out for any suspicious activity conducted by programs in the system.

There is even scheduler function, which can be set to scan the computer at regular time intervals.

Avira also frequently updates its virus signatures to ensure up-to-date protection each time you log on. We also liked how Avira does not hog resources when it conducts real-time scanning of files.

Just in case if you do permit certain programs to conduct actions like accessing the Internet, you can set Avira to make exceptions.

In the event of a virus attack, Avira will give you the option to delete, block, repair or quarantine suspected files and programs.

The sole drawback to using Avira is the constant daily reminders to upgrade to the professional premium edition.

Still, the imbedded advertisement is a small price to pay for a great antivirus software if you are on a tight budget.

++++

www.free-av.com

Kruptos 2

By CHONG JINN XIUNG (Free apps for the security conscious, In.Tech, The Star 07 June 2007)

IF YOU own notebook or thumbdrive, chances are you are likely to be worried over the security of sensitive data stored on your devices.


With so many opportunities for a notebook to be stolen or a thumbdrive being misplaced, you are likely to need some form of protection.

File encryption is not an uncommon practice for mobile users with some notebooks possessing their own built-in encryption software.

Kruptos 2 is an easy-to-install application that helps encrypt your documents and files. The application is small (only 2.9MB) enough to fit on any thumbdrive, and can easily be installed on any desktop or notebook.

The application makes use of a Windows Explorer plug-in which allows you to encrypt/decrypt and shred on a standard Windows Explorer interface.


SECURE DATA: You can conduct projects on Kruptos 2 and encrypt multiple files or folders.


A simple right-click brings up the Kruptos option, allowing you to encrypt or decrypt files on the spot.

Sometimes, all it takes for an intruder to steal an important file is to look out for the relevant filename. Kruptos 2 is able to disguise filenames when files are encrypted while revealing the original any time you wish to view it.

The program has many customisable options to suit your needs, such as being able to automatically open a Word file, make some changes to the document and re-encrypt the file once you close it.

You can also produce self-extracting encrypted files (.exes) that contain encrypted files and software necessary to decompress the contents.

To decompress the contents of a self-extracting file, all you need is a password to unlock the file.

Just hitting the delete button and sending sensitive files to the recycling bin does not mean your data is completely destroyed. Someone can still go through the bin and recover your discarded information.

Kruptos 2 removes that risk by "shredding" them and removing all traces from your drive. Shredded files are destroyed to the point that they cannot be recovered by common undelete tools, the developers claim.

++++

www.kruptos2.co.uk

Access Manager

By CHONG JINN XIUNG (Free apps for the security conscious, In.Tech, The Star 07 June 2007)

IF YOU have one too many passwords that you need to keep hidden, but find that writing it on a piece of paper and keeping it under your pillow less than ideal, Access Manager can help do the remembering for you.

Access Manager is a software solution that keeps all your passwords in one list. In order to access all the passwords kept inside the application, users are required to enter a "Master Password."






Once you gain access, you can view and edit your passwords. Additionally, you can drag and drop passwords into webpages or other applications that require them.

Passwords are neatly arranged by username, passwords and passphrases. On the password window, you can choose a selected password to view and edit the information.

If you are worried that your passwords are too predictable, Access Manager can generate a random password and passphrase for you. However, most randomly generated passwords consist of long strings of letters and numbers.

If you are truly paranoid, you can even select an expiry date for your passwords and change them at regular time intervals – perfect for keeping passwords fresh and make it more difficult for hackers to crack.

In the event your hard disk should bite the dust, Access Manager has a feature that makes backup copies of your password database.

Backups can be made simultaneously to two separate locations. Even with backups you will still need to use your Master Password to unlock the database.

Access Manager can be copied over to any USB thumbdrive, memory card or removable hard disk to keep a completely portable, independent password management system.

++++

www.accessmanager.co.uk


07 Jun 2007

One egg, many baskets

Most PC users would probably agree that the data on their computers is more valuable than the hardware itself.

You can better preserve your data by simultaneously keeping at least two copies your backups on different forms of media (and in different locations if you're paranoid).

For example, you could back up your data on both a portable hard drive and a collection of DVD-Rs.

That way, should one form of backup fail, either through an accident or device failure, you can fall back an the other.

Shortcut to hibernate

To quickly put your PC into hibernation mode, you can create a shortcut icon on the desktop.
Right click on the desktop, select new and then shortcut. In the text box type "rundll32.exe PowrProf.dlI SetSuspendState."

Click the next button and type in the name for this shortcut icon and then click the finish button.
Don't forget to change the generic icon image to reflect the shortcut's function. Right click on the icon, choose Property and click the Change Icon button. Choose the icon that you like and press save.

If the shortcut doesn't work, you probably need to enable the PC's hibernation function. To do so, go to the Control Panel. Find and double click on Power options.

Click on the hibernate tab, tick the Enable Hibernate checkbox and click the apply button.

Create a startup disk

IN WINDOWS XP, you can easily create a bootable floppy disk.


Just place a blank disk in the drive, right-click the floppy disk drive icon in My Computer, and then click Format on the shortcut menu.


In the "Format options" section, check the box next to "Create an MS-DOS startup disk," and then click Start.


In a few minutes, you will have a bootable startup disk.

Go on, scratch the creativity itch

Scratch is a creativity tool from the MIT Media lab that firms abstract programming concepts like recursion into snap-together puzzle pieces.

It is like a multimedia sandbox, where children eight and tip are welcomed as media producers, following the same philosophical blueprint that inspired software projects like Logo and Squeak.

Since it was introduced, demand for Scratch, which is available as a 36MB download, has swamped the Massachusetts Institute of Technology's servers.

The demand is helped by the price: Free with registration. The four years of development costs were covered by Intel and the National Science Foundation.

Scratch's drag-and-drop programming technique demands experimentation and the software's programmable objects, called sprites, can take on the form of your pet (log in a maze, or haiku words that self-narrate when clicked.

There is already an array of projects on the Scratch site that can be downloaded, modified and reposted, demonstrating that Scratch is as much about social networking as programming.

Future versions are in the works for mobile phones and portable computers, while the current download works fine on Macintosh OS X and Windows Vista, giving a free digital toolkit for anyone with a creative itch to scratch. - New York Times Special Features

For more information, logon http://scratch.mit.edu

05 Jun 2007

Make Vista Look Good

Is the graphics card in your PC Vista ready? Microsoft Windows Vista operating system draws heavily on the graphics subsystem in a computer. Without an adequate graphics card, you won’t get the some of the fanciest new features of the interface. Your graphics card should have at least 64MB of the dedicated memory – 128 MB is better. Any graphic card made over the past couple of years with enough memory should run Vista just fine.
Nusantara,Malay,Melayu,Malays name=keywords xoops weblog, site, web wallpaper, windows, TV9, TV3, tmnet, net, tm TM technology, teknologi,software, smas, swish, terbuka, sumber Sinar.FM, sinarmaya, sinar, script, agama, sekolah sekolah, enhanced, sms sms, SMS, Nasional Klasik RTM2, phpnuke,RTM1, programming, percuma, portal, phptriad, phpdev, Postnuke, PHPBB, PHP-Nuke, php, PHP, petua, opensource, open, NTV7, nuke, mysql, mawi,MySQL,melayu, muar, malay, mp3, MP3, lesen, peribadi, laman famili, linux, keluarga, komputer, komuniti, koleksi, komen, java iklan, islam, interaktif, interactive, hosting murah, host, hosting, Hitz.FM, headlines, hackers, hacker, guru, gpl, games, game, free flash, firework, domain, free, forum, foto, fantastico, design, extreme, domain,era.fm, downloads, download, DOS, dreamweaver, database, computer, community, comments, cms, cikgu cikgu, comment, cheap utama, berita, bulletin, bluehyppo bluehyppo, blogs, blog, ASP.net, ASP, ani, asmawi, Malaysia, apache, Audio, Kembara, Music, Muzik, Songs, Lagu, Lyrics, Lirik, Singapore, Singapura, Malaysia, Indonesia, Ebiet, Melayu, Media,Hamlau,RealMedia,Hamlau,Real