This is default featured slide 1 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions..

This is default featured slide 2 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions..

This is default featured slide 3 title

Welcome in TH3 professional security

This is default featured slide 4 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions..

This is default featured slide 5 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions..

Tuesday, June 26, 2012

Facebook just switched your default e-mail address



Whether you've noticed or not, you have a new primary e-mail address listed as your Facebook contact, and most likely it's an address you've never used.

The social-networking site has quietly replaced your default e-mail addresses such as Gmail and Yahoo! with your @Facebook.com address, an e-mail service option the company launched a few years ago and synced with Timeline in April.

"As we announced back in April, we've been updating addresses on Facebook to make them consistent across our site," a Facebook spokesperson told Mashable. "In addition to everyone receiving an address, we're also rolling out a new setting that gives people the choice to decide which addresses they want to show on their Timelines."

Mashable.com: Facebook quietly tests shareable ad units

First spotted on Saturday by blogger Gervase Markham, the e-mail address you once listed as your point of contact is now hidden in the site's database and your assigned @Facebook.com address is highlighted for friends to see.
Former Facebook prez talks IPO mess
Can Facebook make money from ads?
Facebook: Is now the right time to buy?
Former Facebook prez talks IPO mess
Can Facebook make money from ads?
Facebook: Is now the right time to buy?

If you ever changed your Facebook vanity URL, that serves as the prefix of your Facebook e-mail address (i.e. Facebook.com/John.Smith would be John.Smith@Facebook.com). For those that never added a vanity URL, Facebook has assigned numbers to serve as your email account name.

Mashable.com: Facebook's facial-recognition acquisition raises privacy concerns

When users send an e-mail to your Facebook.com address, it pops up in your Facebook inbox. However, some users have experienced issues with receiving messages through Facebook, since some of them end up in an "Other Messages" folder that few people know about.

Although members have been slow to embrace their Facebook email address, the move may be a part of an effort to remind and encourage users to use it more.

If you want to switch your e-mail contact information back to what it was, it's easy to do. Visit your Timeline or profile page and select "About" under your contact information. You can then hide your Facebook email address from the contact page and elect to highlight another e-mail address.

Mashable.com: Friendthem plans to sue Facebook for 'find friends nearby' feature

"Ever since the launch of Timeline, people have had the ability to control what posts they want to show or hide on their own Timelines, and today we're extending that to other information they post, starting with the Facebook address," the Facebook spokesperson added.

What do you think of your Facebook e-mail address? Will you use it? Let us know your thoughts in the comments.

You lied and said he discovered the hack through the system.ini file

In several forums and popular sites usually draws my attention a very strange subject, a detection device is infiltrated
Even more bizarre in the subject find many of those who believe and it is shown through system.ini file by
  The reaction of visitors to this subject. The flaw lies in the spread of this topic among the pioneers of social networking such as the spread like wildfire, making the number of the pioneers of the Internet in real danger, Flaeugd thing as a hack discovered by the discovery of some of the values ​​added to the file in question, Yes we can during the year 2006 or Trojan virus adds some values ​​to this file but american it does not apply to every Trojan
There are many of the Trojans and that of this file, and therefore your trust in such topics to make you a real danger. It also does not have such thing as the discovery of viruses or Trojan programs without all these things are the things that have no basis of knowledge. Yes it can be applied to a kind of Trojan or virus, but how many Trojans and viruses around the world? If that's the case why there are programs to protect tallk constantly? But why there are companies that spend big dollars Malayer to protect their networks from attack Petrojanat, if it was simple to this degree? The strange thing is that you find many of the sites circulating topic with confidence. No defect in the movement of the object and try drafting your way, but the disadvantage is borne only understand what

The arrest of a Russian hacker 22 years old managed to penetrate a computer 6000000

The Russian police arrested a young man at the age of 22 years, managed to configure the network botnets and wide, with 6 million computers could this hacker penetrated by Trojan of its programming. Trojan from which the user was able to steal more than $ 4.5 million dollars from various bank accounts and credit cards managed by Alasala breakthrough for the duration of these computers, which are mostly residents of the cities of the Russian
The police managed to arrest the young man after the track to its effects on the Internet for a long time before determining the place of residence, and attack him for throwing. Captured and directed to a fair trial

Friday, June 22, 2012

Trojan aimed at printers and fall ill, go mad

Company Symantec found trojan cause 'mad printers "and it is full of printed pages  force until the amount of paper in the printing, the company monitored the activity of this Trojan in countries of the world, but countries that were most affected are the United States and India
Experts Symantec rated the Trojan as a kind of Milicenso, a Trojan sneak to the device through the implementation of an attack back door backdoor, as they said that there are several ways to hit this type of Trojan, may be by opening the compressed files contain this Trojan and be attached with the mail random Web, or download the software fake video codecs

MasterCard denies penetration Reckz0r data customers

A few days before we had we published the news of penetration of 79 bank by hacker Rakazhor, which in turn confirmed that he had hacked data clients both MasterCard and also visa Card, New in the case that the company MasterCard has denied that he had received a violation of its informational, and that the data published by the not contain any data related to payment information. According to this reporter one site, "Bessie World," that after contact with some of the victims found that the data published by the hacker is finished

Validity of 7 years. It is also after the research has been detected that the data published by this hacker found published a week ago by another group, which said it had looted this data from a data center Israeli (see photo) Thus, the hypothesis of a breakthrough Rakazhor company MasterCard has become fade, especially after the verification the identity of the hacker. To be placed again that the probability of hacker Rakazhor only child hacker knew very well how to bring the spotlight to him

Pirates UGNazi group claims responsibility for Twitter stopped yesterday

Suffered many of the surfers Twitter yesterday from the cessation of the site for more than 50 minutes, where the subject of a number of sites news sites yesterday, but it is after the company twitter fixes the problem, confirmed that the damage caused by a technical fault led to a halt destruction of the site, which is impossible with him browsing and access to Twitter. However, the hacker group called the
Confirmed responsibility for the attack blocking service on Twitter yesterday, although a spokesman denied UGNazi
. The name of a company Twitter, stressing that the site was stopped for output only a technical fault and not attack blocking service
Of the strongest groups hacker managed to penetrate where a number of groups are classified UGNazi
Sites of interest as a U.S. Intelligence and the location of the famous Cold Flair

9500 malicious site is discovered every day by google

Doubt that the Web has become full of sites harmful threat to the security of Internet users and is growing day by day the Google announced that through the analysis of the data collected over the past five years thanks to the service "net Brows" provided to identify malicious sites have been able to discover about 9,500 malicious Web site every day
He said one of the speakers in the name of the security team for Google that these sites are either a for spreading malware, viruses, or as sites dedicated to the application of phishing attacks as sites "phishing



The collapse of the government websites and Israeli security today

Servers were all government websites and security both day to complete paralysis, led to the stoppage of the work of these sites for a period of time of not too many, making browsing  not access the sites mentioned.
According to the website "News One", which included this stop, mossad site as well as the Israeli army site added to the site of the General Security Service
While the announcement issued by the office of Israeli Prime Minister suggesting that the sites that stopped, due to a technical fault has not been announced for details. He also did not declare any group of any hackers adopt electronic attack can be a result of the stop e-government Web sites and Israeli security

Penetration site of the Ministry usa of Defense by a group wikiboat

A few weeks ago a group hacker wiki bot itself to the world through the overthrow of several popular sites, and today the group has the location of the overthrow of the U.S. Defense Department and the Pentagon, one of the sites believing strongly in the virtual world. Where deliberately
The group immediately after penetration of the site database published several phone numbers and names, addresses and e-mail to several employees. So be a wiki bot may view the world's attention to it in the second carried out by a blow from the group of the month, which was established in March

Monday, June 18, 2012

Try Page 360 FREE on Sun's iPad app

This summary is not available. Please click here to view the post.

Dial M for money The phone app that withdraws cash hits UK





FORGETTING your wallet on a big night out need never be a problem again.



Related Stories

Roaming phone price cut joy

BRITS abroad to avoid web mobile phone ‘bill shock’ thanks to price war
Pay in High St on your mobile
Dad launches app to help find missing children
Bird ‘saved from death by app’
Thieves: You’re under iRest
Facebook app spies on texts


From today The Royal Bank of Scotland is letting customers withdraw money from a cash machine — using their mobile phone rather than a card.

All you need is the bank’s GetCash app and you can take out up to £100 of your money at a time.

It’s a first for any UK bank and RBS hope the innovation will be the first step towards cardless ATMs.

The 2.4million customers who already have the RBS banking app on their phone will be able to use the GetCash option from today.

They can access their money at 8,000 RBS, NatWest and Tesco ATMs around the country — after requesting and receiving a secret six-digit pin which is only valid for three hours.

The GetCash app can also be used to give money to a friend or relative — by sending a secure text containing a pin.

They can then use this to withdraw money from a participating cash point.

Ben Green, head of mobile at NatWest and RBS, said: “This has never been done anywhere in the UK, and yet it’s a really simple and secure way to help our customers get cash whenever and wherever they need it.

“We’ve heard countless stories from customers who have left their wallet behind or parents who need a quick way to send money to their children immediately.”

NatWest, part of RBS Group, say they are certain the app is not open to abuse by fraudsters.

A spokesman said: “We have spent loads of time making sure the security on this is very, very tight.

“To get on the banking app itself you have to have a six-digit pincode.

“If you put in the pin wrong a number of times it will lock you out. If you don’t use the banking app for a period of time it will time out and can’t be accessed.

“If there are any cases of fraud — just as with going to an ATM if someone gets hold of your card — then we refund.”

The app can be accessed using iPhones and iPads plus Android and BlackBerry smartphones.

It can also be used to check balances, transfer money and to find your nearest ATM.

                                             How it works
App-y to help ... banking app works on a range of phones


 1. Log on to the RBS banking app using your PIN.                                  

2. Choose the GetCash option. Type in amount you wish to withdraw.

3. You will be sent a unique six-digit pin.

4. Go to one of 8,000 participating cash points.

5. Press “Enter” on ATM.

6. Follow the prompts for “Emergency cash” and enter cash code and the amount you requested.

7. If the details are correct the money will be issued – up to £100 a time.

8. Use GetCash as many times as you want – so long as you don’t go over your daily withdrawal limit.

Warning of a security loophole on the new Hotmail Protect yourself now

Protection professionals warn of a new wrinkle on hotmail, but did spend some few months to detect more than a gap in the e-mail alternative. The gap the new present in hotmail located this time in profile user hotmail on Windows for live Messenger, this warns professionals protection profiles open, and then you immediately shut your profile on Windows for live fully to protect against this vulnerability the new, which did not spread on the face of widely among hackers that it's still privat
How close the profile on Windows Messenger live?
The first thing after you are logged on profile click on the top right of the page


Then thrown fresh center of the page and click on Method marked in red


Then select a special, and so you have to protect yourself from the gap on the new hotmail









Friday, June 15, 2012

Google now can warn you in the event of an attack on a government-backed electronic mail Gmail

Google says that now that they can warn users when you feel an attack Google's systems supported by governments through its intelligent and able to differentiate between attacks and regular attacks by a group or groups backed by the government, through Adhar warning users to calculate the

The deputy chief engineer of information security Google's Eric Gross, it is possible for users to ask how do we know whether some of the cyber attacks against users of Gmail state-backed or not, but we can not disclose accurate information about it, fearing it could be use it by the attackers, but we rely as well as reports on the victims of the hack.
  Google and keep this new system, you may have jumped a big step forward with respect to the mail service Gmail, especially the security aspect and proov once again it's the first company par excellence

Programmer to launch an electronic attack South Korea and North Korea's government was involved in the matter

The police recently arrested games programmer from North Korea, the programming of games built with Spaaoir, the latter used by the accused in stolen personal information of more than 100,000 scope of southern South Korea. Add to that the bomber had managed to form a network of victims of a wide use in launching denial of service attacks on a number of government positions and economic development of South Korea, most recently South Korea Airport site.
Where after interrogation the accused de 39 years old, was discovered he was working with a cell programmers urges the direct supervision of the Office of General of the Republic of surveys of North Korea.
This is not the first time discovers the involvement of the North Korean government to launch cyber attacks on South Korea, where in 2008, was the victim of an attack email targeted military command to South Korea, in 2009, launched a North Korean attack blocking service violently targeted government websites to South Korea ...
While said security expert from South Korea, said such attacks that target strong and South Korea by North Korea is in the development of advanced and durable backed attack on both Russia and America

Penetration leads to leakage of information users of Twitter

Was leaked about 10 thousand username Twitter by a team of penetration is not known, continue to Altndeim World Anonymous, that was in last Saturday where it was published a file on the site Pastebin contains 10 thousand user name of Mgrdan on Twitter who use the application TweetGif, while said a spokesperson for the company that Twitter passwords are still secure and that the hack happened to TweetGif application has nothing to do Bonizthm

Samsung plans to launch its own Facebook

Plans Samsung to launch social networking of their own, competition and similar service Facebook, the service will be available on all electronic devices that support Internet access, has launched the Samsung on the project name Samsung Facebook, one of the officials at Samsung confirmed to the Korea Times that the service will be available in the first quarter of next year, and added that it comes in order to expand services, the Samsung in the field of social media across different electronic devices

Wednesday, June 13, 2012

New web domains could include .sex, .app and .pizza

Move over .com -- it might have to compete with suffixes such as .sex, .app and .fail and after the body in charge of website domain names unveiled some 2,000 applications for new ones Wednesday.

The US-based Internet Corporation for Assigned Names and Numbers (ICANN) revealed details of 1,930 requests for new web address endings, ranging from the general (.shop) to the highly specialised (.motorcycles).

Many of the requests are from large companies such as Apple, Mitsubishi and IBM -- with Internet giant Google alone applying for over 100, including .google, .YouTube, and .lol -- Internet slang for "laugh out loud".

"This is an historic day for the Internet and the two billion people around the world that depend on it," ICANN president and CEO Rod Beckstrom said at a press conference in London unveiling the list.

California-based ICANN says the huge expansion of the Internet, with around two billion users around the world, half of them in Asia, means new names are essential.

There are currently just 22 generic Top-Level Domains, or gTLDs, in use, including .com.

Beckstrom said ICANN hoped the first of the new suffixes to be live by the first quarter of 2013, but warned that evaluating all of the applications could take around 20 months.

"We're standing at the cusp of a new era of online innovation -- innovation that means new businesses, new marketing tools, new jobs, new ways to link communities and share information," Beckstrom said.

"But let me stress that these are just applications. They are not yet approved, and some of them may not be. None of them will enter the Internet until they've undergone a rigorous, objective and independent evaluation."

A total of 911 organisations from North America paid the $185,000 (150,000 euro) fee to lodge an application, along with 675 from Europe and 303 from the Asia-Pacific region.

Just 17 applications for new suffixes were received from African applicants, while 24 requests came from Latin America and the Caribbean.

ICANN said 66 of the proposals were linked to geographical locations -- such as .nyc, .miami and .paris -- while others relate to industries, such as .insurance.

The sought after suffix is .app, with 13 applicants including Google and Amazon.

In cases where several organisations have applied for the same domain, so-called "community-based applications" -- those from bodies representing several groups, such as trade associations -- will take precedence.

Where no community-based application is involved, ICANN will encourage applicants to "come to some kind of teaming arrangement", Beckstrom said.

Failing this, the domain name will be auctioned off -- which could lead to a bidding war in cases where big companies such as Google and Amazon are vying for the same domain, such as .books and .blog.

The Vatican has applied for .catholic, while a Turkish company has requested .islam.

Four firms have applied for for .pizza, six for .baby and three for .basketball.

ICANN, which began taking applications in January, also revealed that 116 of the claims are for what it termed "internationalised domain names" -- addresses that are not in the Latin alphabet.

On top of the registration fees, maintaining a suffix will cost $25,000 annually. ICANN has raised $352 million in application fees -- which Beckstrom defended, saying they only just allowed the company to break even.

ICM Registry, which runs the freshly established domain .xxx, hopes to add other online red-light districts ending in .sex, .porn or .adult.

Dubai-based web hosting firm Directi, meanwhile, has spent around $30 million applying for new domains, including .law, .bank and .doctor.

kjl/dk/txw

Amazon on Tuesday released its music player app for iPhone and iPod touch, a move that expands the reach of the Internet retail giant for Apple users.

The Cloud Player app allows customers to stream or download music stored in Amazon accounts to the iPhone or iPod touch, play music that is already stored on their device, and manage or create playlists.

Amazon, a big rival to Apple's iTunes, will not be selling music through the app but will allow its customers to manage and listen on Apple hardware.

"Customers tell us that they want access to all of their music, wherever they are, and on all of the devices they use," said Steve Boom, vice president of digital music for Amazon.

"By bringing Cloud Player to iPhone and iPod touch, we now have the most widely compatible cloud playback solution available, giving our customers the ability to buy once and enjoy their music everywhere."

Amazon is also selling its own tablet computer, the Kindle Fire, in a challenge to the market-leading iPad from Apple. But Kindle sales are believed to be slipping after a sales surge last year, according to analysts. Amazon does not provide sales data for the Kindle.

Some reports say Amazon is readying an expansion of its app store to more international markets and the Android platform in a more direct challenge to Apple and Google.

Friday, June 8, 2012

Production of larger OLED display flexible full-color

Announced the center of the display flex (FDC) at Arizona State University that he manufactures the largest OLED display flexible full-color, with a Screen Size 7.4 inches and has manufactured using transistors of thin oxide, according to the makers of the screen, the choice of material industry makes it viable for commercial production, because the manufacturers can be used as lines of current production for the production of these screens instead of purchasing new production equipment, is worth mentioning that the center of the display flex at the University of Arizona work side by side with scientists in the laboratories of military research in this project for the production of the screen, so that the soldiers were wearing on their sleeves in what can be be called the computer forearm

Germany announces military unit specialized in electronic warfare

Secret military unit that specializes in electronic warfare now present in the German army, as the German government. Unity and that is configured in 2006 now that she is able to develop their skills to wage wars, Electronic, and defend its network information confidentiality against the enemy. This unit is also information warfare, is not the first in the world after the United States in the formation of the U.S. Army special electronic, as well as China. As it seeks some other countries are also towards the formation of specialized units in the defense electronic warfare launched. Especially that which has become a trend experienced by the countries of the world aspires towards a "digital data", posing with him as well as secure and protect this data from any external attack.

"World War I arms race and World War 3 will be racing towards the formation of the armies of electronic

Wednesday, June 6, 2012

Google warns of a violent attack could target users gmail

Google warns users of potential danger receiving, without specifying the time or the time, which was published this warning in Google Code, and may also display my small message telling the user the possibility of an attack on user accounts, so Google is looking forward to a violent attack on the accounts of Gmail users either by posting or publishing Maloyr forged links pages on a large scale. It is not the first time were exposed to Google's violent attack, in the year 2009 by some hackers in collaboration with the Chinese government to launch an attack on includes 200 goals strategically sensitive data for several U.S. companies. This is why Google has warned that if the arrival of any alert box to imports such as a change password or activation of the safety steps ... Or something to do with your private information enter your email and not try to ignore access to it

Hackers penetrate one million pasword particular social network users linkedn

One million pasword been hacked, particularly users of social network famous for Link Eden, Albasordat which hackers managed to get a million which is a hash Basord. The hackers obtained publish the file on the Internet, with a number of works of the attackers to break Albasordat for private accounts, web users unanimous Link Eden. The company and to the extent of writing this report to give any explanation about the circumstances that made the hackers have access to this vast amount of Albasordat. While a working group called for the site to users Astbmal Basordathm old

Tomorrow the formal protocol IPv6

The countdown to the sixth edition of the work of the Internet protocol 6 or what has become known as "IP Version 6" has announced the adoption of the global Internet on 6 June as the date for the beginning of work the new protocol after the end of all tests
This decision comes after that is about IP addresses of the currently used version 4 and will finish on the major Internet companies to adopt the new protocol as
AT & T, Akamai, Comcast, Free, Cisco mais aussi Facebook, Google, Microsoft et Yahoo

And to indicate all the operating systems and modern web browsers support the new protocol for a long time and which is supposed to be the transition process is remarkable for Internet users

Microsoft Launches Urgent Update for all versions of windows to reduce the gap security benefits Maloyr flame

The company yesterday launched Microsoft urgent security update in all versions of Windows, they use to patch a gap in Flim New malware attack man in the attack East. Malware and dangerous, which is the subject of time of making an American and Israeli targets countries in the Middle East, led by Iran, will try after injecting himself one of the computers to deceive other computers with the Windows operating system that the computer that has been injected is a protocol Web Proxy Autodiscovery, which will make other computers, which are found fooled by the fact that the same network that carries computer malware is through a proxy server plays the role of mediator between him and adding to the server that Windows Althdatat. Which is impossible to a large extent the fact that Microsoft rely on the certification system security, which can not accept any update until after the examination of his testimony, the security and make sure the source before acceptance, the manufacturers of malware had discovered a vulnerability in the infrastructure of the Hhadat private security Pmakrosvet which makes malware certificates using the private security Pmakrosvet making malware injects itself in other computers and simply requesting updates from servers Microsoft. It remains to indicate that patching the security company which has Microsoft throw yesterday, but does not function if you do not have malware injected itself in your computer. Download the update from here

Launch the final version of Firefox 13

Finally, after a month of launching the beta version was launched the final version of Firefox 13, as soon as you ran the browser sixteen immediately changes the new, as is evident in the image have been added the pages visited recently when you open a new page as in the browser chrome , Featured in this release is the adoption of a protocol SPDY of Google as the default protocol for browsing, if you are interested in the experience of the new version you can download it by clicking here for users of Windows, or here for Mac users

Monday, June 4, 2012

The United States and Israel factory Stuxnet and corrupted Israel has to plan

Issued The New York Times report in-depth about the virus Stuxnet confirms that the United States of America and Israel are designed virus Stuxnet in order to sabotage the centrifuges in the Iranian nuclear reactors, and that by issuing specific commands to control devices responsible for setting the rotation speed of the centrifuge, virus was targeting facility Natanz nuclear isolated from all external networks, which make the process of penetration difficult, but can laptops and memory cards move between the Internet and network Natanz own, and in 2010 succeeded virus Stuxnet escape from the facility Natanz using laptop to a staff and as soon as it relates to the Internet by the virus to disseminate information globally, contrary to what was designed for him, and started investigations about who's hacked to encode the virus, the fingers of accusation were all directed towards the Israelis that they who lose amended design the virus, and when asked by U.S. President Barack Obama during a meeting special except for the two modified virus Stuxnet, Vice President Biden answered an angry voice: they inevitably Israelis, I have a lot Tmado, after the leak done by the virus Stuxnet, was found to code Stuxnet and dismantled by security experts

Facebook flops in technical problems and the probability of involvement Anonymous group in order

Perhaps you noticed some problems inevitably to browse our site Facebook in recent days, in fact, that I am not alone to suffer, but many users around the world have expressed their displeasure after the interruptions that occur in the site during short periods through the Tother Facebook account. Which leave several doubts in the probability of a site under attack from a group Anonymous World, which was confirmed by the group through calculated on Twitter

@ YourAnonNews
"Looks like good old FaceBook is having packet problems ...," "Oh yeah ... RIP Facebook a new sound of tango down bit *** Sfah words,"

Although denied the official spokesman for the firm for Facebook likelihood of any attack on its servers by any party, but he stressed that the company's technicians are still Ezgen to identify the source of the problem, despite official spokesman confirmed that the problem Seetmrsdh and reform within the next few hours

google Confirm their e-mail service disruption Gmail again

Confirmed Google Inc. on the U.S. for a problem today in its postal service electronic "Jimaal" and had a long impact on some users and the estimated number of users who encountered the problem j about 400 thousand user served by e-mail Jimaal and the same problem occurred several times in the past few days
The signal immediately after the problem started Thakiqathaa Google to find out the kinks that the system was back to normal

Lady gaga Moreover, the number of first subscriber 25 million people on twitter

Some that topped the album, the highest rates of sales across the world Here is the singer "Lady Gaga" recorded Ashaa in the history of famous social networking site "Twitter" saluting the site announced that "Lady Gaga" is the first person to exceed the number of Mtabaah on the site "Twitter" threshold of 25 million people
Has declared "Twitter" the names of 10 persons Syndicate follow-up through its network of social and all of them international celebrities hailed came after the Lady Gaga Almoghai "Justin Bieber" and who follow him more than 22 million people, followed by "Katy Perry" and "Rihanna" and "Britney Spears "and" Shakira "and" Taylor Swift "Alris followed by Barack Obama with 16 million subscribers and Kim Kardashian to 14.8 joint

Friday, June 1, 2012

Fundamentals of the supply of age Batara

Yes many of us use computers and mobile use would also be periodically, and perhaps betrayed a lot of battery in a state of teaching a lesson or a job offer or work on a specific program or .. Etc..
Can maintain your battery life to extend for a longer period. System and for Windows there is also where some of the steps or actions have a purpose to help to increase as well.
In this article I will discuss some of the things that would increase in battery life, and work on them for a long time. And addressing the steps for Windows, which gives it to take those measures.

First, the fundamentals of the battery life is to keep areas clean plug in the battery as much as possible, the battery on the time of use corrode and rust it limits the connection. Turn off machine and remove the battery, and use the cotton soft and a little alcohol or cleaning materials of others influential with the Electronics and clear the chips plug in the battery and the connectors of electricity (which helps to delivery better) then Dry the battery well and make sure of it and enter and delivery of electricity , use this method every two months or three months.

Second, pass the electric current of the battery correctly. And charge the battery spoke to offer you the opportunity, unlike the older generation of batteries are rechargeable such as batteries based on nickel (NiMH), lithium-ion batteries modern can be recharged in part over and over again without any adverse effects, but you should avoid draining the battery charging lithium in full. Consult the manual of your computer to get more specific tips for shipping, do not start using the power adapter or battery charger not approved by the manufacturer of your device.

Third, use of nickel must make absolutely sure that the full-drained and then re-shipped (once a month to three months) to improve its ability to maintain at the shipment for a longer period and last for a specific job.

Fourth: The latest laptops use lithium batteries that do not need to drain to improve their capacity. To drain the battery, NiMH, then just run your computer and cut connected to a power source external, and to leave the computer turned on, to speed up things, you can start many of the applications and make the brightness of the screen at the top level and ignore all the strategies for energy saving listed below, after the battery drain completely, then Full battery recharge. This may take up to 12 hours.

Fourth: Alterbd, the cooling device is very Zerora factor which is why in a duck in the case of unavailability correctly. Always try to provide adequate cooling and air and natural during use. And maintained the cooling vents of the device and not doing Bsdha appeared.

Fifth: Windows. Windows has provided backing solid incumbent some things for this purpose. In order to improve the functioning of the battery and work on the period of the longest and that of some of the commands provided by the terms of the reduction of the light screen Zerora because employment situation very clearly, or the status of surface maximum may be exchange larger (sharp as a base exchange in the power house) and to stop some of the orders of It will also provide the increase was longer