Pages

Wednesday, November 23, 2011

How to configure Gmail With Microsoft outlook Express Step by Step

Outlook Express is easily the most popular Windows e-mail program. One reason for its popularity, of course, is that it is built into every Windows operating system. Outlook Express is easy to use and easy to upgrade.
Enabling POP
You can retrieve your Gmail messages with a client or device that supports POP, like Microsoft Outlook or Netscape Mail.
To enable POP in Gmail:
  • Sign in to Gmail.
  • Click Settings at the top of any Gmail page.
Click Forwarding and POP/IMAP


  • Select Enable POP for all mail or Enable POP for mail that arrives from now on.
  • Choose the action you'd like your Gmail messages to take after they are accessed with POP.
Configure your POP client* and click Save Changes
To set up your Outlook Express client to work with Gmail:
  • Open Outlook or Outlook Express.
  • Click the Tools menu, and select Accounts...
  • Click Add and then click Mail...

  • Enter your name in the Display name: field, and click Next.
  • Enter your full Gmail email address (username@gmail.com) in the Email address: field, and click Next.

Enter pop.gmail.com in the Incoming mail (POP3, IMAP or HTTP) server: field. Enter smtp.gmail.com in the Outgoing mail (SMTP) server: field.

  • Click Next.
  • Enter your Gmail username (including '@gmail.com') in the Account name: field. Enter your Gmail password in the Password field:, and click Next


  • Click Finish.
  • Highlight pop.gmail.com under Account, and click Properties.
  • Click the Advanced tab.
  • Fill in the following information:
1. Check the box next to This server requires a secure connection (SSL) under Outgoing Mail (SMTP).
2. Enter 465 in the Outgoing mail (SMTP): field.
3. Under Outgoing Mail (SMTP), check the box next to this server requires a secure connection (SSL).
4. Under Incoming mail (POP3), check the box next to this server requires a secure connection (SSL). The port will change to 995.
Return to the Servers tab, and check the box next to My server requires authentication.
Click
OK.
Congratulations! You're done configuring your client to send and retrieve Gmail messages.

Tuesday, November 22, 2011

What is Cloud Computing & How it works ?

Cloud computing is the delivery of computing as a service rather than a product, whereby shared resources, software, and information are provided to computers and other devices as a utility over a network (typically the Internet).



Layers
Once an internet protocol connection is established among several computers, it is possible to share services within any one of the following layers.


Client
A cloud client consists of computer hardware and/or computer software that relies on cloud computing for application delivery and that is in essence useless without it. Examples include some computers, phones and other devices, operating systems, and browsers.
Application
Cloud application services or "Software as a Service (SaaS)" deliver software as a service over the Internet, eliminating the need to install and run the application on the customer's own computers and simplifying maintenance and support.
Platform
Cloud platform services, also known as platform as a service (PaaS), deliver a computing platform and/or solution stack as a service, often consuming cloud infrastructure and sustaining cloud applications. It facilitates deployment of applications without the cost and complexity of buying and managing the underlying hardware and software layers. Cloud computing is becoming a major change in our industry, and one of the most important parts of this change is the shift of cloud platforms. Platforms let developers write certain applications that can run in the cloud, or even use services provided by the cloud. There are different names being used for platforms which can include the on-demand platform, or Cloud 9. It's your choice on what you would like to call the platform, but they all have great potential in developing. When development teams create applications for the cloud, they must build its own cloud platform.
Infrastructure
Cloud infrastructure services, also known as "infrastructure as a service" (IaaS), deliver computer infrastructure – typically a platform virtualization environment – as a service, along with raw (block) storage and networking. Rather than purchasing servers, software, data-center space or network equipment, clients instead buy those resources as a fully outsourced service. Suppliers typically bill such services on a utility computing basis; the amount of resources consumed (and therefore the cost) will typically reflect the level of activity.
Server
The servers layer consists of computer hardware and/or computer software products that are specifically designed for the delivery of cloud services, including multi-core processors, cloud-specific operating systems and combined offerings.

Deployment modelsCloud computing types

Public cloud

Public cloud describes cloud computing in the traditional mainstream sense, whereby resources are dynamically provisioned to the general public on a fine-grained, self-service basis over the Internet, via web applications/web services, from an off-site third-party provider who bills on a fine-grained utility computing basis.

Community cloud

Community cloud shares infrastructure between several organizations from a specific community with common concerns (security, compliance, jurisdiction, etc.), whether managed internally or by a third-party and hosted internally or externally. The costs are spread over fewer users than a public cloud (but more than a private cloud), so only some of the benefits of cloud computing are realized.

Hybrid cloud

Hybrid cloud is a composition of two or more clouds (private, community, or public) that remain unique entities but are bound together, offering the benefits of multiple deployment models. It can also be defined as multiple cloud systems that are connected in a way that allows programs and data to be moved easily from one deployment system to another.

Private cloud

Private cloud is infrastructure operated solely for a single organization, whether managed internally or by a third-party and hosted internally or externally.
They have attracted criticism because users "still have to buy, build, and manage them" and thus do not benefit from lower up-front capital costs and less hands-on management, essentially "[lacking] the economic model that makes cloud computing such an intriguing concept".


Architecture

Cloud architecture, the systems architecture of the software systems involved in the delivery of cloud computing, typically involves multiple cloud components communicating with each other over a loose coupling mechanism such as a messaging queue.

The Intercloud

The Intercloud is an interconnected global "cloud of clouds" and an extension of the Internet "network of networks" on which it is based.

Cloud engineering

Cloud engineering is the application of engineering disciplines to cloud computing. It brings a systematic approach to the high level concerns of commercialization, standardization, and governance in conceiving, developing, operating and maintaining cloud computing systems. It is a multidisciplinary method encompassing contributions from diverse areas such as systems, software, web, performance, information, security, platform, risk, and quality engineering.

Monday, November 21, 2011

How to Know if Your Computer is Infected with a Virus



No one wants to own a computer infected with a nasty virus. That's why it's very important to practice safe computing habits and to install reliable anti-virus software. You can avoid most malware just by paying attention and staying away from a few common traps. If your anti-virus software is up to date, you should be in pretty good shape.

But once in a while, computer viruses get beyond our defenses. Maybe our anti-virus software is out of date or has been compromised by a particularly clever bit of code. Perhaps we clicked on a link by accident and activated a virus. Or someone else used our computer and downloaded some malware by mistake.

Signs of a Computer Virus

Assuming your anti-virus software hasn't alerted you to the presence of a virus, here are some indicators of malware on your computer:

If your computer has become unstable, that's a sign that something's wrong. Some malware messes with important files that keep your computer running properly. That could cause your computer to crash. If your computer crashes when you try to run a specific application or open a particular file, that tells you that something has corrupted the data. It could be malware.

Does your computer seem to run much more slowly than it used to? This could be the result of malware as the malicious code begins to drain your computer's processing resources. If you aren't running a resource-heavy application but your computer is very slow, you might have a computer virus.

Strange messages indicating that you can't access certain drives on your computer are another sign that something is wrong. In a similar vein, applications that won't run or files that won't open may also be the result of infection. Other indicators include hardware (like printers) that no longer respond to commands. While none of these guarantee the presence of a virus, they do suggest that something is wrong with your machine.

If you notice that file sizes are fluctuating even if you aren't accessing those files, that's another sign of a computer virus. And finally, if you access menus and their appearance is odd or distorted, you could be the victim of a malware attack.

Friday, November 18, 2011

How Computer Addiction Works



Obsessively checking e-mail. Playing online games for 12 hours or more at a time. Placing more value on chat-room friends than real friends. Neglecting family, work and even personal health and hygiene. These are all symptoms of a new form of addiction that has surfaced only in recent years: computer addiction. In this article, we'll learn about computer addiction, why it's a problem -- and why some doctors disagree about whether it exists at all.Creating a single definition for computer addiction is difficult because the term actually covers a wide spectrum of addictions. Few people are literally addicted to a computer as a physical object. They become addicted to activities performed on a computer, like instant messaging, viewing Internet pornography, playing video games, checking e-mail and reading news articles. These activities are collectively referred to as Computer Mediated Communication(CMC). Computer addiction focused on Internet use is often called Internet Addiction Disorder (IAD).


The various types of computer addicts have different reasons for their habits. Obsessive chat room use or e-mailing might fill a void of loneliness, while excessive viewing of pornography might stem from relationship problems or childhood abuse. The matter is further complicated by the fact that a computer is a useful tool. It's not like heroin, for example -- there are many legitimate reasons why someone might spend hours using a computer.Even if someone uses a computer extensively for purely recreational purposes, that doesn't necessarily represent a real addiction any more than someone who spends hours working on a model train set, makingquilts or gardening is "addicted" to those activities. Even the agreed-upon definition of addiction itself has evolved over the decades and remains a matter of debate in the medical community. In fact, the American Medical Association and the American Psychiatric Association do not currently consider computer addiction a valid diagnosis, a controversy we'll discuss later.As a result of all these complications, any single definition of computer addiction is necessarily broad and a little vague. If the computer use is so pervasive that it interferes with other life activities, and if the user seems unable to stop using the computer to excess despite negative consequences, the problem might be a computer addiction.