Saturday 30 July 2016

Why you should be happy when you face a Challenges/Problem in Your Carrier ? (i mean your professional skills i.e IT)




You should be happy and don't panic when you have got a new challenge/Computer problem, I mean when you are in ICT sector, cause is a part of improving of your skills and professional in technician, 
NB; Simple task/work drop your skills/professional.

Why life challenges are a source of growth

Do you know how self confidence is built?
 When a person manages to learn something new or when he manages to solve a certain life problems he feels confident about himself.
Now the question that most people ask is: why learning certain skills never add to my self confidence and why learning other skills can boost my confidence?
The answer is simple, only the skills that you are greatly in need of or the ones that will help you solve your important life problems will increase your self confidence.
Here is an example taken from the Solid Self confidence program. Lets suppose that you had a shyness problem, in such a case learning football might add a little to your self confidence but learning how to approach strangers will add a great deal of confidence to your personality.

So what does all this has to do with life challenges?
Because a problem is only considered a life challenge when it affects an important area of your life solving it will certainly add a great deal of confidence to you.
If you managed to deal with that tough life challenge you will feel that you are really confident and that you are not beatable.

Lack of life challenges and beliefs that wear out

Beliefs keep wearing out as the time passes because we always keep collecting new information. If you once succeeded or made a great achievement then after sometime you might start to believe that you only did it because you were lucky and not because you are really good.
If that situation persisted you might lose your self confidence on the medium or the long term. On the other hand, if you faced the life challenge and managed to deal with it you will renew your self confidence and you will reinforce your positive beliefs about yourself.

Friday 29 July 2016

Things begin to happen in Dodoma


The present utility infrastructure and set-up in Dodoma have created doubt as to whether the 43-year old decision to shift to the centrallylocated region could at this time around materialise.
According to some critics, the capital transfer would hit a technical snag especially after some ministries, including the Prime Minister’s Office explicitly declared to move permanently to the Capital City District, which is part of the semi-arid Dodoma region.
But the state water, telecom and electricity firms, which had been investing multi-billion dollars on infrastructures in Dar es Salaam, said they are well organised to counter any rising demand owing to population inflows.
The Tanzania Telecommunication Company Limited (TTCL) has told the ‘Daily News’ that the firm, which has received funding from the TIB Development Bank, will upgrade the national broadband network to enable data transfer from the current 40 GB to 200 GB by November this year.
“The expansion work has already started to increase the traffic capacity between Dar es Salaam and Dodoma. TTCL is working with equipment manufacturers, Huawei and Alcatel, to execute expansion works,” TTCL Chief Executive Officer, Dr Kamugisha Kazaura, said.
According to the TTCL boss, the firm will launch its 4G service in the new capital (designated) in November. It is also working to upgrade its IP-Network to allow sharing of large data and files from the current 1 GB to 10 GB.
An IP network is a communication network that uses Internet Protocol (IP) to send and receive messages between one or more computers.
The plan, according to TTCL, will help improve communications in the region. Energy and Minerals Minister Sospeter Muhongo made it clear in Dodoma that his ministry had resolved to upgrade the electricity infrastructure to provide better reliability and more resiliences, among other improvements.
Professor Muhongo announced the construction of Iringa-Dodoma-Singida- Shinyanga power line (backbone transmission line), linking the regions to the national grid, will be completed by October.
The 670-km stretch, with transmission capacity of 400kV, is now completed from Iringa to Dodoma and will be launched in September.
“The project, to cost 450 million US dollars, is being financed by the World Bank, Japan Development Agency, European Union, Korean Development Bank and the African Development Bank. At the completion of the project, Tanzania will be able to sell surplus electricity to Kenya and Zambia,” the minister said.
The Ministry of Water held a closed-door meeting with its key players in Dar es Salaam yesterday to deliberate on the best ways to reduce outages and provide the highest quality of service to the growing demand for the utility.
The Permanent Secretary in the Ministry of Water and Irrigation, Engineer Mbogo Futakamba, has reported that the ministry planned to expand the region’s water distribution network.
He said as it stands now, the capacity of the Dodoma water utility agency is to pump 61.5 million litres daily while production can go up to 72 million litres.
“Actual demand for water in Dodoma is 46 million litres but the authority has been pumping less than 40 million litres due to minimal demand and limited distribution networks,” Mr Futakamba explained.
The deep borehole drilled at Mzakwe in the region with the support of the Korean government is not enough. Plans are, therefore, underway to construct Farkwa Dam, which is situated 30 kilometres from Dodoma Municipality.
“We had conducted a feasibility study and it will take between 18 and 24 months for it to be complete. In addition, the government has so far compensated residents at a 60-hectare area to pave way for the construction of a sewerage facility,” the PS detailed.
He said while the construction of the dam will cost 520bn/-, talks are going on with a Chinese firm to support the construction of a sewerage system in the region.

How computers circut Boards made



A printed circuit board, or PCB, is a self-contained module of interconnected electronic components found in devices ranging from common beepers, or pagers, and radios to sophisticated radar and computer systems. The circuits are formed by a thin layer of conducting material deposited, or "printed," on the surface of an insulating board known as the substrate. Individual electronic components are placed on the surface of the substrate and soldered to the interconnecting circuits. Contact fingers along one or more edges of the substrate act as connectors to other PCBs or to external electrical devices such as on-off switches. A printed circuit board may have circuits that perform a single function, such as a signal amplifier, or multiple functions.
There are three major types of printed circuit board construction: single-sided, double-sided, and multi-layered. Single-sided boards have the components on one side of the substrate. When the number of components becomes too much for a single-sided board, a double-sided board may be used. Electrical connections between the circuits on each side are made by drilling holes through the substrate in appropriate locations and plating the inside of the holes with a conducting material. The third type, a multi-layered board, has a substrate made up of layers of printed circuits separated by layers of insulation. The components on the surface connect through plated holes drilled down to the appropriate circuit layer. This greatly simplifies the circuit pattern.
Components on a printed circuit board are electrically connected to the circuits by two different methods: the older "through hole technology" and the newer "surface mount technology." With through hole technology, each component has thin wires, or leads, which are pushed through small holes in the substrate and soldered to connection pads in the circuits on the opposite side. Gravity and friction between the leads and the sides of the holes keeps the components in place until they are soldered. With surface mount technology, stubby J-shaped or L-shaped legs on each component contact the printed circuits directly. A solder paste consisting of glue, flux, and solder are applied at the point of contact to hold the components in place until the solder is melted, or "reflowed," in an oven to make the final connection. Although surface mount technology requires greater care in the placement of the components, it eliminates the time-consuming drilling process and the space-consuming connection pads inherent with through hole technology. Both technologies are used today.
Two other types of circuit assemblies are related to the printed circuit board. An integrated circuit, sometimes called an IC or microchip, performs similar functions to a printed circuit board except the IC contains many more circuits and components that are electrochemically "grown" in place on the surface of a very small chip of silicon. A hybrid circuit, as the name implies, looks like a printed circuit board, but contains some components that are grown onto the surface of the substrate rather than being placed on the surface and soldered.

10 reasons how Google is losing control on Android




1/11    10 reasons how Google is losing control on Android
Despite making Android the biggest smartphone operating system, Google seems to have very little control over it. Android was meant to be open in the first place. No wonder this 'openness' is one of the primary attraction of OEMs and developers alike, however, this is starting to take toll on the end consumer experience.


Here are 10 reasons why consumers might feel Android is no more about Google anymore.

Only 7.5% users on latest Android M
2/11  Only 7.5% users on latest Android M

The next Android N is about to release this month but only 7.5% Android smartphone users are on Android Marshmallow. Majority of Android users are still on either Lollipop or KitKat. Surprisingly, there is a sizeable 21% people still using Android Jelly Bean. While hardware limitations of older devices are a prime concern, but can Google and the developer ecosystem afford fragmentation at such alarming levels?

Device makers decide Android upgrade release
3/11  Device makers decide Android upgrade release

Smartphone brands decide whether to upgrade a particular handset or not as per their time. Only Nexus devices can expect latest OS updates.


Most brands feel that instead of pushing out the latest Android upgrade, it is better to launch a new smartphone model with the latest Android version. Consumers are left hanging midway with very little choice.

Dominating Custom UIs

4/11  Dominating Custom UIs

Custom UI skins over Android have made stock Android OS smartphones rare. With custom skins, it doesn't really matter to end-users as to which Android version as they are actually using. Also, these proprietary UIs are sometimes buggy leaving a bad taste.
Nexus brand loosing sheen
5/11  Nexus brand loosing sheen

The last talked about Nexus smartphone would be the Nexus 5. In order to gain control, the Google Nexus initiative was a welcome move.However, the brand couldn't continue hold its position in the super competitve market.
Android Wear has generated little interest


6/11  Android Wear has generated little interest

Google tried to repeat its Android success with smartwatches as well. However, Android Wear is far from what people can actually call useful for the cost of the smartwatches.

While the platform has evolved, but it has a long way to go before it could actually attract masses.

Stock Android seems boring to most

7/11  Stock Android seems boring to most

One of the major reasons why smartphone brands had opted for custom UI skins is the fact that they wanted to differentiate their offerings.


The latest Android versions haven't really changed the look and feel of the operating system making it look boring overtime.

Android One flop
8/11  Android One flop

Applying the Nexus idea to low cost Android smartphones was a brilliant move to ensure quality and timely updates in low cost handsets. However, with all the Android One phone looking exactly the same and an improper online strategy took Android One nowhere.

Let's see what new Google has in stores for the second wave of Android One smartphones.

Anyone can create app
9/11  Anyone can create app

Terror outfits are making Android apps to propagate their ideas. While it took two days for Google to hunt and remove the Taliban app, reportedly there are several ISIS app still doing business as usual.
Security a big concern


10/11  Security a big concern
Staying secure on Android is a myth. The popularity of Android has attracted unwanted attention from the dark web. Malwares are waiting to take control over smartphones and it seems users are really on their own.
Very little privacy
11/11  Very little privacy

There is little control as far as what apps can do once installed on a particular smartphone. After granting permission to a particular app, users can just have faith on it while it gets access to personal data like photos, videos, contacts, messages, etc.

 

Thursday 28 July 2016

Global ICT Services : Examples



Global ICT Services : Examples


Global ICT services take some information from you, process it in some way and then return the outputs of this processing to you. Some example global ICT services are :

Examples of Global ICT Services
Secretarial
Services
A secretary anywhere in the world can receive rough notes or sound recordings of information by email or FAX and turn this into a professionally presented document which can be returned by email.
Bulk Data
Entry
Large volumes of data can be entered into computer databases in foreign countries and then sent to the UK. Workers in some countries will do this in return for lower wages than workers in the UK.
Web
Design
A plan describing the structure of a web site together with information to be contained on the web site can be collected in one country and emailed to a web designer in another country who can produce the web site.

Services like this which process information can be carried out anywhere in the world because the information can be transferred from the person purchasing the service to the person supplying the service very quickly using electronic methods such as email and FAX.


Ρίο: Πτώματα στα νερά που θα γίνουν οι αγώνες κολύμβησης και κωπηλασίας

Καλωσήρθατε στο Ρίο, μην ενοχλείστε από τα πτώματα. Μπορεί να ακούγεται σαν σενάριο από ταινία τρόμου, αλλά είναι όμως η πραγματικότητα. Μόλις λίγες μέρες πριν από την έναρξη των Ολυμπιακών Αγώνων στη Βραζιλία και στον θαλάσσιο χώρος όπου κολυμβητές και κωπηλάτες θα διαγωνιστούν επιπλέουν πτώματα. Οι εικόνες σοκάρουν και οι διοργανωτές λένε στους αθλητές «να κρατήσουν τα στόματά τους κλειστά».

Οι Αυστραλοί κωπηλάτες είναι αδύνατον να προπονηθούν σε έναν υδάτινο χώρο που είναι γεμάτος από σκουπίδια που επιπλέουν ακόμα και πτώματα. Η παραλία της Κόπα Καμπάνα όπου θα διεξαχθεί η μαραθώνια κολύμβηση είναι μολυσμένη και οι αθλητές φοβούνται για το δέρμα τους και την υγεία τους. Είναι απορίας άξιο πώς ένας αθλητής θα μπορέσει να βουτήξει σε τόσο βρόμικα νερά ή πώς θα διεξαχθούν οι αγώνες κωπηλασίας όταν επιπλέουν πτώματα και τεράστια αντικείμενα.

Περιβαλλοντολόγοι και επιστήμονες προειδοποιούν ότι οι αθλητές κινδυνεύουν από σοβαρές ασθένειες εξαιτίας του μολυσμένου νερού. Οι αρχές της Βραζιλίας από την πλευρά τους λένε ότι έχουν κάνει προσπάθειες να καθαρίσουν τα νερά. Βέβαια οι φωτογραφίες που κάνουν το γύρο του κόσμου αποδεικνύουν ότι είναι αδύνατον να κολυμπήσει άνθρωπος κάτω από τέτοιες συνθήκες υγιεινής.

«Είναι σίγουρο πώς οι αθλητές που θα κολυμπήσουν σε αυτά τα νερά κινδυνεύουν να πάθουν σοβαρές μολύνσεις«, είπε γιατρός ολυμπιακής ομάδας ενώ οι αθλητές δηλώνουν αηδιασμένοι από τις συνθήκες και τις καταστάσεις που έχουν να αντιμετωπίσουν στις ολυμπιακές εγκαταστάσεις του Ρίο.

Φόβος για χάκινγκ σε αυτοκίνητα απο απόσταση

Τα αυτοκίνητα γίνονται όλο και πιο… εξωστρεφή. Η αυτόνομη τεχνολογία αλλά και τα συστήματα συνδεσιμότητας που ενσωματώνουν σημαίνει ότι «επικοινωνούν» με το περιβάλλον, στέλνοντας και λαμβάνοντας συνεχώς πληροφορίες.

Άρα θα είναι πιθανό να πέσουν θύματα ατόμων που έχουν τις γνώσεις και την υποδομή να επέμβουν στο λογισμικό των ηλεκτρονικών συστημάτων. Τους λεγόμενους χάκερς.

Οι αυτοκινητοβιομηχανίες προσπαθούν να θωρακίσουν τα αυτοκίνητα από κακόβουλες ενέργειες, πριν η αυτόνομη τεχνολογία περάσει σε πλήρη εφαρμογή στους δημόσιους δρόμους. Οι οδηγοί εκφράζουν πάντως σοβαρές ανησυχίες.

Σύμφωνα με το βαρόμετρο της εταιρείας παροχής συμβουλευτικών υπηρεσιών KPMG, το 82% όσων ερωτήθηκαν δήλωσαν ότι θα το σκεφτούν σοβαρά πριν αγοράσουν αυτοκίνητο μίας μάρκας η οποία έχει πέσει θύμα χάκερ. Σε ποσοστό 70% οι ιδιοκτήτες αυτοκινήτων ανησυχούν στο ενδεχόμενο το αυτοκίνητό τους να υποστεί επίθεση από χάκερ μέσα στην επόμενη πενταετία.


Τι θα γίνει όμως αν ένα αυτοκίνητο δεχτεί επίθεση από χάκερ; Το 41% δήλωσε ότι φοβάται πως κάποιος άλλος θα ελέγχει εξ αποστάσεως το αυτοκίνητο, ενώ το 25% ανησυχεί για την απώλεια οικονομικών πληροφοριών.

Στην έρευνα της KPMG απάντησαν και στελέχη αυτοκινητοβιομηχανιών, τα οποία σε ποσοστό 68% είπαν ότι δεν έχουν επενδύσει κεφάλαια στην προστασία δεδομένων τα τελευταία χρόνια, παρά το γεγονός ότι το 85% εξ αυτών παραδέχτηκε παραβίαση της ασφάλειας την τελευταία διετία.

Στην Ιαπωνία νομίζουν ότι τα κατοικίδιά τους βλέπουν τα Pokemon!

Από όταν το augmented reality παιχνίδι, Pokémon Go, κυκλοφόρησε στην Ιαπωνία την περασμένη Παρασκευή, ήμασταν σίγουροι ότι θα έβγαιναν τρελές ειδήσεις από εκεί!

Και δεν κάναμε λάθος! Στην Χώρα του Ανατέλλοντος Ηλίου λοιπόν, κάποιοι παίχτες πιστεύουν ότι τα κατοικίδια τους με κάποιο τρόπο μπορούν και βλ΄πεουν ή νοιώθουν τα Pokémon που εμφανίζονται δίπλα τους!

Δείτε τα τρελά tweets τους:







Φιμώνει όποιον τον αμφισβητεί -Δείτε σε ποια ΜΜΕ ρίχνει “μαύρο” ο Ερντογάν

Τρία πρακτορεία ειδήσεων, 16 τηλεοπτικοί σταθμοί και 45 ημερήσιες εφημερίδες, ανάμεσα σε άλλα μέσα ενημέρωσης, διατάχθηκαν να αναστείλουν τη λειτουργία τους, στην Τουρκία.

Συγκεκριμένα, με προεδρικό διάταγμα η τουρκική κυβέρνηση έκλεισε 3 πρακτορεία ειδήσεων, μεταξύ των οποίων είναι το πρακτορείο Τζιχάν,16 τηλεοπτικά κανάλια, 45 εφημερίδες (μεταξύ των οποίων και η Ταράφ), από τις οποίες οι 9 είναι εθνικές, 23 ραδιοφωνικούς σταθμούς, 15 περιοδικά και 29 εκδοτικούς οίκους.

Σύμφωνα με τη Hurriyet, τα πρακτορεία ειδήσεων που διατάχθηκαν να αναστείλουν τη λειτουργία τους είναι τα: Cihan, Muhabir haber και Sem haber, καθώς και οι τηλεοπτικοί σταθμοί: Barış, Bugün, Can Erzincan, Dünya, Hira, Irmak, Kanal 124, Kanaltürk, MC TV, Mehtap, Merkür, Samanyolu Haber, Samanyolu TV, SRT, Tuna Shopping, Yumurcak.

Τα ραδιόφωνα που διατάχθηκαν να αναστείλουν τη λειτουργία τους είναι: Aksaray Mavi, Aktüel, Berfin, Burç, Cihan, Dünya, Esra, Haber Radyo Ege, Herkül, Jest, Kanaltürk Radyo, Radyo 59, Radyo Aile Rehberi, Bamteli, Cihan, Fıkıh, Küre, Mehtap, Nur, Şimşek, Samanyolu Haber, Umut, Yağmur.

Ανάμεσα στις 45 εφημερίδες συγκαταλέγονται οι Bugün, Millet, Meydan, Özgür Düşünce, Taraf, Yarına Bakış, Yeni Hayat, Zaman, Today's zaman.

Επιπλέον, οι αρχές προσήγαγαν τον Αλί Μπουλάτς και τον Μουμτζαζέρ Τούρκονε, πολύ γνωστά ονόματα που αρθρογραφούσαν στην εφημερίδα «Ζαμάν».

Πριν από λίγο καιρό η κυβέρνηση είχε διορίσει επιτροπεία στην εν λόγω εφημερίδα, η οποία με το προεδρικό διάταγμα κλείνει οριστικά...

9 Tips to Help You Become a Computer Technician



Getting your first job as an entry level computer technician can be difficult.  This is especially true for someone with no experience.  The job market for computer techs is very crowded and there are lots of new people trying to get in.  Before you decide to enter the market yourself, you need to gain a competitive edge.  In this article, I would like to share with you 9 tips that will help you gain some experience and set yourself apart from the crowd.

Learn Where to Find the Answers

Being a good tech doesn’t necessarily mean knowing all the answers but it does mean knowing where to find them.  Google is your best friend.  Study the Google Cheat Sheet and learn how to effectively use operators.  For example, putting quotes around a specific error message and searching for it will usually lead you to articles on how to fix it.

Build a Computer

If you want to be a computer tech then you need to learn how to build a computer from the ground up.  Even if you don’t have the money, put one together with any spare parts you can find.  And be sure to install Windows on it after it’s up.  You will be doing a lot of this when you finally do become a tech.  For step by step instructions, check out How to Build a Computer.

Break Your Computer

No, not physically, but feel free to destroy your Windows installation and then attempt to repair it.  I learn the most when I have hands on experience with troubleshooting problems and so will you.  Just make sure you have your recovery disks and a good backup first.

Get Your A+ Certification

The CompTIA A+ Certification is one of the most widely sought after certifications for entry level tech jobs.  Many IT recruiters look at this certification as validation that you at least know the basics of being a computer technician.  To become A+ Certified, you must pass two exams which cost around $160 a piece but it is well worth it.  Check out Cramsession.com for free study guides and training material.

Go to School

I can’t stress this one enough.  Even if you don’t want to go into a four year program, at least look into a tech school.  Most offer two year programs and have lots of hands on experience.  And if you don’t want to get a degree then at least take a class or two.  Any education is better than none.  For help with finding a school, check out CollegeBoard.com.

Work for Free

That’s right, for free with no strings attached.  Volunteer whenever the opportunity is available whether it be at a school or your friends house.  Not only will you need the hands on experience, but you will also need something to put on your resume.  And you never know, one of these opportunities could eventually turn into a job.

Create an “ATS Friendly” Resume

Lots of IT recruiters add resumes to an ATS (Applicant Tracking System) and then search through all of them using specific keywords.  The use of keywords in your resume will increase the chances of your resume showing up when they do a search.  Check out 10 Ways to Tweak Your Tech Resume for more help.  Also check out 5 Articles That Will Help You Write An Impressive Tech Resume.

Study

And while you have some free time, feel free to study.  Read tech books, tech blogs, tech news, and anything else you can get your hands on.  Study your acronyms and know what they mean.  Don’t be caught off guard when someone asks you what TCP/IP stands for in an interview.  Check out The Tech Terms Computer Dictionary for a full list

Wednesday 27 July 2016

Τροπολογία-πρόκληση: Απεριόριστες δαπάνες για τα ταξίδια της κυβέρνησης

Θύελλα αντιδράσεων για το απεριόριστο όριο των δαπανών στα κυβερνητικά ταξίδια.

H τροπολογία με γενικό αριθμό 592 και ειδικό αριθμό 113 της 27.7.2016 η κυβέρνηση ΣΥΡΙΖΑ - ΑΝΕΛ κατήργησε το όριο στις κρατικές δαπάνες για τα πρόσωπα που συνοδεύουν τον Πρόεδρο της Δημοκρατίας , τον πρωθυπουργό και τους υπουργούς Εξωτερικών, Οικονομικών και Εθνικής Άμυνας σε επίσημα ταξίδια και προέβλεψε ότι αυτοί οι συνοδοί θα δικαιούνται να μένουν σε ξενοδοχείο ίδιας κατηγορίας με τον κρατικό αξιωματούχο που συνοδεύουν.

Πρακτικά αυτό σημαίνει πως για τις αποστολές, εντός και εκτός επικράτειας και για όσους συνοδεύουν τον πρωθυπουργό και τον πρόεδρο της Δημοκρατίας δεν ισχύει το ανώτατο όριο των 60 ημερών κατ' έτος που προβλεπόταν σε προηγούμενη διάταξη. Παράλληλα, αν ο εκάστοτε υπουργός διαμένει σε ξενοδοχείο πέντε αστέρων, τότε και όσοι συμμετέχουν στην εν λόγω αποστολή θα μείνουν σε πεντάστερο ξενοδοχείο, δημιουργώντας πρόσθετη δημοσιονομική επιβάρυνση.

Η τροπολογία - πρόκληση κατατέθηκε χθες, Τετάρτη, με την αιτιολογία του... επείγοντος και στελέχη της αξιωματικής αντιπολίτευσης συνέδεσαν τη ρύθμιση με το ταξίδι του πρωθυπουργού Αλέξη Τσίπρα και του υπουργού Άμυνας, Πάνου Καμμένου, στην Πάρο, την προσεχή Παρασκευή. 

Όπως κατήγγειλαν στελέχη της αντιπολίτευσης στη συγκεκριμένη αποστολή θα μετέχουν συνολικά 54 άτομα, αριθμός τουλάχιστον εντυπωσιακός αν λάβει κανείς υπόψη ότι σκοπός του ταξιδιού είναι τα εγκαίνια του νέου αεροδρομίου του νησιού.

27 Tips to Getting Started in IT/Things to know before getting into information technology (it)



We all have a friend or two making a killing in IT. How many friends have you caught up with on Facebook with big houses and nice cars thanks to their Network and Security Admin jobs? Have you ever thought you could have a career like that, if you just knew where to start? If you have, then PrepLogic’s 27 Tips to Getting Started in IT is for you. We’ve put together a really useful list of 27 things you can do to get started in IT.

1. Determine Your Personal Interests
You want to be happy in your career, right? There are many specialties to choose from in IT. Which one would suit you? Figure out your own interests first, and then work towards fulfilling those interests professionally.

2. Set a Career Goal
Once you know what you want, consider how you’d like to achieve it. Do you have an interest in management, or would you prefer to work in the field? Perhaps you’d like to be an entrepreneur or a freelance technician. Determine an “end game” for your career, and develop a strategy to hit that goal.

3. Get Involved in the Web Community
Forums, blogs and social networking sites are a great way to find out about IT firsthand. You can soak in a lot of information from articles and message boards on sites like searchnetworking, slashdot, computerworld, sadikhov, itnews, and infoworld. These sites can provide you with info about your career, or give you new ideas about potential opportunities.

4. Target Entry Level Jobs
Before you can work your way up, you have to know where to start. There are many names for entry-level positions in IT, but here are some of the most common:
  • Desktop Support Technician
  • IT Technician
  • In-store technician
  • At-home technician
  • End User Support Technician
  • Help Desk
When you’re starting out, expect to see the terms technician, support and help a lot, because these are the roles you will fill. By knowing the entry-level positions, you’ll know what the requirements you’ll need to meet are.

5. Learn Stuff!
The most important element of an IT career is having the skill to perform your job. Those skills are learned through experience and training. For most people, training comes first. You’ll want to undergo a training program that teaches you the skills that you’ll need for the entry level positions you want. Some of the most important skills you’ll need to learn include:
  • Hardware and Software
  • Networking
  • Routing and Switching
6. Find a Training Source and Stick to it
Learning new skills can be a chore for many IT beginners. We suggest making the learning process as simple and uncomplicated as possible. One way to do that is to find a source for training, and then stick to it. Too often, beginning IT techs will make matters difficult by going on a search for training every time a new skill must be learned. A better idea is to find a reputable, reliable source for training and hit them up when it’s time to start a new program.

7. Build a Foundation of Skills in Hardware and Software
When you’re getting started, we recommend building a foundation of entry-level skills that will be applicable to many jobs. Having a strong command and understanding of contemporary hardware and software is essential. But what skills do you need? A great resource is the Computing Technology Industry Association (CompTIA). You can use the requirements for their A+ certifications as a checklist for the hardware and software skills you need. Some of them include:
  • CPUs/Processors
  • ROM and RAM
  • Drives/System Devices
  • Power Supply
  • Operating Systems
  • Security
  • Troubleshooting
8. Build a Foundation of Skills in Networking
Another commonly required talent is networking. In any size organization, the transfer of information between users and systems is crucial. There’s always a demand for a skilled tactician who can offer reliable and effective networking skills. According to CompTIA’s requirements for the Network+ certification, here are some of the basics you must know:
  • Topologies
  • OSI Model
  • Ethernet Basics
  • TCP/IP
  • IP Addressing
  • DHCP
  • Encryption/Authentication
  • Wireless
  • Remote Connections
9. Build a Foundation of Skills in Routing / Switching
Connecting your network to the outside world is just as important as internal networking; maybe more so. To get your start in IT, have a plan in place to acquire skills in routing, switching and other external networking concepts. Cisco offers the CCNA certification to validate your skills in this area. Training programs for the CCNA include vital concepts you need to know, including:
  • WAN Concepts/Configuration
  • Shared Networking
  • IP Routing Concepts
  • Static IP Routing/Dynamic Routing
  • LAN Devices
  • Ethernet Switch Configuration
  • Router Security
  • Network Address Translation
  • Virtual Private Networks
10. Mix the Right Formula of Education, Experience and Credentials To be an attractive candidate for most IT positions, you must possess the right mix of education, experience and credentials. Fall short in any of those areas, and you’re less likely to get a job. Few companies want to hire academic-only candidates with no real world experience or IT certifications. Likewise, a technician with years of experience who hasn’t bothered to acquire any professional certifications will have more career trouble than one who is certified.

At this point in your career, you can compensate for your lack of experience with IT certifications. Certifications show more relevance and timeliness than most academic IT training and they illustrate your commitment to your profession. They also show that you possess the skills that your potential employer wants.

11. Build Your Online Presence Carefully
Using resources like LinkedIn, Facebook and Twitter to get ahead professionally is a smart idea. But there still isn’t a lot of research on the long term results of online social and professional networking. Be cautious when using these resources. Don’t let them backfire on you. Make sure you’re discreet about things you want to keep personal and don’t let info that can harm you become public. Plus, we recommend limiting your accounts. Choose one service and focus your attention on it, rather than trying to maintain multiple accounts. An out of date profile can be just as damaging as an embarrassing party photo.

12. Never Be Finished with Your Education
Having multiple certifications is key in being valuable to employers, but having the latest and most-up-to-date certifications is just as important. This is a dynamic and constantly changing field. To be successful in IT, you need to know the cutting edge technologies. Continuing to learn and expand your resume not only makes you marketable when searching for a job, but staying current makes you more capable and valuable to your employer.

13. Create a Resume, Keep it Updated
The key to an effective resume is to meet your needs by meeting your employer’s needs. When a potential employer first looks at your resume it has to show who you are and what you can do quickly. They’re looking at hundreds (maybe thousands of resumes), and the first step is to weed out the bad ones. A resume that’s clear, concise and up to date allows your employer to see your experience/credentials at first glance. That makes the employer’s job easier, and makes it more likely you make the cut for the next round. Make sure that any IT Certifications that you currently hold (like MCITP certification, Cisco certification, a+ certification) are clearly displayed on your resume. These certifications will help you stand out from the crowd.

14. Create Your Own Network, Gain Referrals
They say the trick to getting ahead in the business world isn’t what you know, it’s who you know. Well, that’s not entirely true. In this field, you need to know your stuff. But knowing the right people can help you get your foot in the door, or get your resume moved to the top of the pile.

Build relationships with everyone you meet, whether in a business or social setting. Attend trade shows, strike up conversations at parties, and don’t be afraid to ask friends to introduce you to people who might be helpful. Get your name out there any way you can.

15. Chart a Course of Achievements
As you’re starting out on your career path, you’re going to need a game plan. Once you’ve determined your ultimate goal, set shorter-term checkpoints along the way. Your starting target might be to get your first certifications, and your second might be to find that entry-level job. Breaking your journey down into smaller chunks not only makes your goal seem less overwhelming, but it also serves as a roadmap to keep you on track as you progress. From a certification perspective, many new professionals in the IT industry begin with the CompTIA A+ certification, working up from there to the Network+ and Security+ certifications from CompTIA.

16. Get Access to Technology
Hands-on training is essential to your education. To reinforce and truly make sense of everything you learn, it’s important to have access to the technology you’ll be learning about in order to practice and become more comfortable with your new skills. For example, computers with various operating systems would be useful in studying for your A+ certification, and a Cisco router or switch would be helpful in preparing for your CCNA.

17. Make the Most Out of the Least - Find Technology Cheap
While getting access to the technology you’ll be using is important, you don’t have to spend a fortune to do so. Older PCs can be picked up for a bargain at garage sales and flea markets. Check out online marketplaces such as eBay and Craigslist for good deals on all sorts of used equipment, from computers to routers to servers.

18. Get Professional Career Advice
Many colleges and universities offer career counseling to their students. If you’re not a student, there are still avenues available for you. Professional career development counselors specialize in helping others find and advance their jobs. Check your phone book or local job fairs for listings of career counselors in your area. The National Career Development Association (ncda.org), whose members hold master’s degrees in counseling or related fields, offers a list of local accredited counselors who can help you along your path.

19. Think One Step Ahead
Always be preparing to take the next step. Plan ahead, and take your future goals into consideration. Get the training that will help you now, as well as help take you to the next level in your career aspirations. Keep your eyes out for opportunities that will help you progress to where you want to be in the future.

20. Make Vertical Moves
Similarly, make sure the moves you make are actually productive. Whether it’s switching employers or moving to a new department within the same company, your goal is to climb the career ladder, not to move horizontally and stay on the same level. Don’t waste time and energy on a move that isn’t a step up.

21. Get an Internship
Sometimes it feels like a catch-22: it’s hard to find a job without experience, but how are you supposed to get experience without a job? The answer may lie in an internship. While they’re generally unpaid, companies are often willing to take on inexperienced workers in exchange for hands-on experience and, hopefully, job recommendations later on. School career counselors are often able to help find internships for students, and job hunting sites like Monster and CareerBuilder, as well as Craigslist, have an option to search for internships.

22. Join a Professional Society
A professional society provides you with built-in networking opportunities. Groups like the Association of Information Technology Professionals (AITP) and the American Society for Information Science & Technology (ASIS&T) have chapters across the United States, including student-specific chapters at many universities. Professional societies generally hold regular chapter meetings, which are a great place to get tips and advice, find out about the latest trends and help grow your personal and professional network.

23. Read Job Listings and Postings for Ideas - Give Them What They Ask For
You know you need education and training to get a good career in IT. But what certifications should you get as you prepare for your job hunt? Check the job listings. If you notice a trend, then you know where to begin. Are there more job openings for MCSEs? Do more employers in your area want someone with their CCNA certification? Employers are telling you what they want through their job postings. Listen to what they’re asking for and deliver it.

24. Improve Your Interview Skills
When it comes to interviews, practice makes perfect. Have a friend do a mock-interview with you. Not only will the practice make you feel more comfortable, but with help you’ll be able to target areas that need work.

A web search can provide you with lists of commonly asked interview questions. Plus, don’t forget to learn all you can about the company you’re interviewing with, and be prepared with your own questions.

25. Improve Your Soft Skills
People skills are an essential part of your job. It goes without saying that you need working knowledge of technology for a successful career in IT. After all, the basic role of your job will be working with hardware and software. However, it’s important to remember that a good deal of your duties will involve working with other people, whether they’re other IT professionals, customers or co-workers in other departments. In fact, even vendors realize the importance of these “soft skills”: CompTIA has even made them a graded portion of their A+ certification.

26. Find a Mentor
One of the best ways to gain experience and get your feet wet in the IT field is by working with someone who has already been there. Many large companies offer formal mentoring programs in which an entry-level worker is paired with an industry veteran to teach them the ropes. But if you’re still looking for that first job, or your company doesn’t offer such a program, there are other ways of finding mentors. Keep in touch with former bosses or supervisors from internships with whom you have built a relationship. Professional societies also offer an opportunity to meet more experienced workers and cultivate a mentor-mentee relationship.

27. Get Your IT Certification
Certifications are an essential key to getting work in the IT field. Not only do they compensate for lack of working experience, but they prove to hiring managers that you’re skilled in the areas they’re looking for. IT certification training can be done on your own time, and can be done in months or even weeks instead of the years you would spend in a traditional classroom setting. An IT certification may look like a simple piece of paper, but in reality it can be the key that opens the door to your new career. Certifications vary depending on the career path that you have chosen. Those interested in pursuing a career in networking may be interested in a Cisco certification such as the ccna certification or the ccnp certification from Cisco. Others looking to pursue careers built around Microsoft technologies may want to pursue certifications like the MCITP certification.

More Help for Your Career
You probably have more questions about your own career. Give PrepLogic a call for the answers. Our training specialists have helped thousands of people become well-paid, successful IT professionals and we can help you too. Call PrepLogic at 1-800-418-6789 today for more information about training, IT certifications, careers and special offers. Thanks for reading our 27 Tips to Getting Started in IT.

FUNNY: Must watch....!!!!!! Exam cheating technology in japan


HOW TO USE WHATSAPP WITHOUT MOBILE NUMBER?



I wrote step by step instructions on How to use Whatsapp without phone number. Here we go.
    • If you are already using Whatsapp account after verifying your phone number, take all the data backup and uninstall it.
    • Now, download Whatsapp and install it again on your phone.
    • We all know that Whatsapp asks us to provide our mobile number to verify the account. But, what is our main aim is skipping the step and use Whatsapp without verifying the mobile number.
    • Therefore, we have to perform the trick in this step.
    • Change your network settings to “flight mode”. In some mobile it may name “Airplane Mode”.
    • Turn it on and go to Whatsapp installation tab.
    • There enter your mobile number and click OK. But, you will not get any verification code because you turned on flight mode on your phone.
    • So, Verification is not completed means your mobile number is not verified.
    • Now, Whatsapp asks you to verify through an alternative way. Here, you have to choose “verify through SMS” option and enter your email address.
    • Click submit and immediately tap on cancel option. You have to perform this action within a few seconds. (Very Important Step)
    • Your authorization process ends in the last step.
    • Now you have to create a spoof message. You can create it using Spoof Text Message if you are an android user. If you are iPhone user, you can use Fake a Message application.
    • Install any of the above according to your phone operating software.
    • Now, go to Outbox, copy the message details and send it to a fake number.
    • You can use below details in order to perform this false verification step.
    • To:+447900347295
          From: + (country code) (mobile number)
          Message: Your e-mail address
  • Now, a false verification message will be sent to the fake number and that is how you completed the verification process without any mobile number.
    •  

Watch this.......When teacher leave the exam room...they are very disturb...very funny


HOW TO CONNECT TWO COMPUTERS USING USB CABLE (You can share a files from one Pc to another)


Connecting two computers using a USB cable is a practical way of transferring and sharing data quickly. Although the process is simple and straightforward, you must make sure to use a USB networking cable,
also called USB-to-USB bridged cable. These USB cables are equipped with a small chip in the middle that allows the connected computers to communicate with each another. General USB cables that do not have this circuitry will not work and can even damage your computer's USB ports.


Step 1:
Turn on the two computers you wish to
connect via the USB cable. Install the CD
driver on both computers. This driver is
generally provided by the USB cable
manufacturer. Follow the installations
wizard until completed.

Step 2:
Connect one end of the USB networking
cable to the USB port of one computer.
Connect the other end of the cable to the
other computer's USB port.

Step 3:
Launch the recently installed software on
both computers. Both computers will
detect the connection with one another.

Mugabe: 'Severe' punishment for loyalists after criticism

Zimbabwean President Robert Mugabe sings the national anthem before addressing the Zimbabwe National Liberation War Veterans Association, at the party headquarters, in Harare, Wednesday, July, 27, 2016. Zimbabwe's 92-year-old president on Wednesday said the longtime loyalists who turned against him last week should face "severe" punishment, and he vowed to stay in power for "a long time." (AP Photo/Tsvangirayi Mukwazhi) The Associated Press

HARARE, Zimbabwe (AP) — Zimbabwe's 92-year-old president on Wednesday said the longtime loyalists who turned against him last week should face "severe" punishment, and he vowed to stay in power for "a long time."
President Robert Mugabe made his first public response to a scathing statement by veterans of the country's 1970's liberation war. They called him dictatorial, manipulative and egocentric.
The Zimbabwe National Liberation War Veterans Association long had been quick to defend Mugabe, even with violence.
Mugabe demanded new leadership for the association, claiming Western countries have infiltrated it.
"We have ordered an investigation to identify authors of the statement. ... The punishment will be severe," he said to thousands of supporters at the ruling ZANU-PF party's headquarters in the capital, Harare.
Mugabe insisted he will not step down.
"As long as the party still wants me to serve, if I still have the energy and still have the life, I will continue," he said.
The surprise revolt by Mugabe's aging corps of loyalists comes after nationwide anti-government protests organized through social media. Many in Zimbabwe are frustrated by a rapidly deteriorating economy, a currency crisis and corruption.
One protest organizer, pastor Evan Mawarire, is now staying in neighboring South Africa after Mugabe accused him of being sponsored by the West.
The veterans' criticism has unsettled Mugabe, said Eldred Masunungure of the University of Zimbabwe's political science department.
"This is a result of his failure to hand over power. The succession war is driving towards a tipping point," Masunungure said.
The veterans accuse Mugabe of dumping them for a more youthful group associated with his wife, Grace, whose political power has dramatically increased in the past two years.
Copyright 2016 The Associated Press. All rights reserved. This material may not be published, broadcast, rewritten or redistributed.

Google Races to Catch Up in Cloud Computing


When it comes to cloud computing, Google is in a very unfamiliar position: seriously behind.
Google is chasing Amazon and Microsoft for control of the next generation of business technology, in enormous cloud-computing data centers. Cloud systems are cheap and flexible, and companies are quickly shifting their technologies for that environment. According to analysts at Gartner, the global cloud-computing business will be worth $67 billion by 2020, compared with $23 billion at the end of this year.
“The world’s biggest maker of computer servers is making machines just for these guys,” said John Lovelock, a cloud analyst at Gartner. “It’s the nexus of things like big data, social networks and mobility, and the next big thing, which is artificial intelligence.”
For Google, a loss in cloud computing would be a rare misstep for a company that revolutionized media with its advertising business, and then made the world’s leading smartphone operating system.
A victory for Google, however, could change how we work, turning advanced computing into an everyday utility that we use to run factories, interact in virtual reality or read one another’s emotions. Given Google’s track record, it’s worth considering the prospect.
But it will be an uphill climb.
Amazon Web Services, which began its cloud product a decade ago, remains the leader. The company took in $2.6 billion, 9 percent of Amazon’s sales, in the first quarter of 2016. Profits from the service made up 56 percent of Amazon’s operating income. Those numbers may well be higher when Amazon reports its second-quarter earnings on Thursday.
Microsoft styled itself a cloud company, too, and the company said last week that revenue from Azure, its cloud business, which was founded in 2010, rose 100 percent over the last year. Cloud technology also figures in crucial businesses like Office 365.
In contrast, Google Cloud Platform does not even figure in the earnings reports of Alphabet, Google’s parent company. That has to sting, since the company owns perhaps the largest network of computers on the planet, spending close to $10 billion a year to handle services like search, Gmail and YouTube.
Google is moving rapidly to change things. Three announcements it made last week show how it hopes to gain ground on Amazon Web Services and Azure.
First, the company said it has used artificial intelligence to cut the power use in its data centers 15 percent, a huge decrease considering how efficient these data factories were already.
Power is probably the largest single cost for all three of the cloud companies. Google is almost certain to use its savings to reduce prices, much the way it won in search advertising by figuring out its competitors’ costs, then undercutting them.
That ability to find energy efficiency may be a powerful tool to sell to others over Google Compute. Mustafa Suleyman, the head of applied artificial intelligence at the company’s DeepMind subsidiary, said the techniques could be used at power plants, refineries and other big industrial systems.
“This certainly gives Google an edge,” he said. “Other people focused on narrow problems. We’ve focused on the widest possible problem.”
Google also released for public use ways to transcribe and analyze recorded speech for things like meaning, emotional content and whether a speaker was happy or sad. An outside company that worked on the project — Google would not say which one — used it to analyze over two billion minutes of customer service calls. It works in 80 languages, Google said.
At the same time, the company moved its customers on the United States West Coast from a data center in Iowa to facilities in Oregon. Google’s network, which it claims is larger than the internet, can send the equivalent of 375 hours of video a second.
A move like that only makes sense when a company wants to offer the kind of split-second performance needed for virtual reality or instantaneous customer interactions over networks of cellphones and sensors.
At a recent conference at Amazon Web Services for software developers, an executive from iRobot, which makes the Roomba vacuuming robot, talked about using the cloud to map homes and human behavior in houses with potentially “hundreds” of connected devices. Doing something like that would require instantaneous connections.
Can faster networks, lower prices and lots of artificial intelligence put Google ahead? Amazon’s lead seems to give it an edge for at least the next couple of years, as its cloud branch has perfected a method of developing hundreds of new cloud features annually. Yet while the company appears to have some basic artificial intelligence features, called machine learning, it seems to have little in the way of speech recognition or translation.
Mr. Lovelock, the Gartner analyst, predicted that Google would offer businesses the insights it has gained from years of watching people online. “Amazon views the customer as the person paying the bill, while Google believes the customer is the end user of a service,” he said. And Microsoft is promoting itself as the company that has products customers already know and use.
“Everyone has to play to the strengths the market already sees they have,” Mr. Lovelock said.

Wireless keyboards 'easy' to snoop on



Information typed on a wireless keyboard can be easily intercepted, a cybersecurity research firm has warned.
San Francisco-based Bastille said keyboards transmitted what was being typed in "clear text", making it possible for attackers to listen in on from up to 76m (250ft) away.
The firm said affected keyboards could not be updated and should be replaced.
In total, the researchers found 12 different companies producing vulnerable keyboards.
None of the firms had taken measures to warn users or rectify the issue in future products, Bastille said.

Dongle

"We went into a bunch of big box stores and purchased wireless keyboards," said Ivan O'Sullivan, Bastille's chief research officer.
"We were shocked to find that two-thirds transmitted all of their data in clear text, no encryption.
"We did not expect to see this. We didn't think it would be in clear text. Hackers can intercept all the keystrokes from your keyboard up to 250 feet away. Through glass, walls, floors."
The keyboards affected used radio signals to transmit what the user was typing. By using a cheap, USB-powered radio antenna, the research team was able to follow what was being typed. They could also control the keyboard, inserting their own keystrokes.

'Get a wired keyboard'

Researcher Marc Newlin said a busy office could be targeted as it was trivial to isolate the signals of individual keyboards.
But he said he did not know if hackers were exploiting the weakness.
"We have no evidence to suggest that," he told the BBC. "It's completely passive so there's no way for a victim to know."
To solve the problem, Bastille recommended using keyboards using Bluetooth to connect to a computer, rather than radio. Or alternatively, "just get a wired keyboard".
Many of the devices tested would remain vulnerable, said Bastille, because it was not possible to update the firmware that keeps them operating.
The company praised Logitech, Dell and Lenovo for using higher-end chips in their wireless keyboards that had stronger security.
The research on wireless keyboards complements work Bastille did earlier in 2016 on wireless mice. It found that attackers could spoof poorly protected signals letting them use PCs as if they were sitting in front of them.

Tech company accuses US Navy of software piracy, seeks $596 million damages


A $596 million lawsuit claims that the U.S. Navy has engaged in software piracy.
The suit against the U.S. Government, filed by Bitmanagement Software, alleges that the Navy copied and installed the company’s virtual reality software on hundreds of thousands of computers for which it does not have a license.
In 2011 and 2012 Bitmanagement agreed to license its BS Contact Geo software to the Navy on “a limited and experimental” basis, according to court documents. The Navy was authorized to install the software on just 38 computers for testing, trial runs and integration with other Navy systems, the documents say.
To facilitate testing and “in preparation for the large scale licensing desired by the Navy” Bitmanagement removed the control mechanism that tracked and limited use of the software. The Navy decided that it would deploy the software on a larger scale and began negotiations for the purchase of “numerous” additional licenses, according to the suit, which was filed July 15.
“While those negotiations were ongoing, however, and without Bitmanagment’s advance knowledge or consent, the Navy installed BS Contact Geo software onto hundreds of thousands of computers,” the documents say. “Bitmanagement did not license or otherwise authorize these uses of its software, and the Navy has never compensated Bitmanagement for these uses of Bitmanagement’s software.”

The lawsuit alleges that the software has been deployed on at least 558,466 Navy computers and says it is likely that unauthorized copying has taken place on an even larger scale.
BS Contact Geo enables the visualization of geographic information, according to Berg, Germany-based Bitmanagement. The software lets users visualize a “virtual military base,” according to court documents.
“It is extremely concerning to us that the Navy duplicated and deployed our proprietary commercial computer software without first agreeing to a software license agreement,” said Bitmanagement, in a statement emailed to FoxNews.com.  “We regret that it became necessary to initiate legal action in order to preserve our right to be paid for our software.  Nonetheless, we will continue to seek a mutually beneficial resolution that both compensates us for our software while supporting the operations of our valued customer.”

5 common computer problems you can fix yourself


Computers always act up at the worst times. You're in the middle of a major report or playing your best game ever and -- pffft.
Often, users get so frustrated that they needlessly go out and buy a new computer or pay for a computer repair. With a cool head and a little know-how, however, it's easy to fix the most common computer problems. In fact, the solutions I recommend below are free.


1. Speed up a sluggish PC
Computers slow down over time -- that's normal.
If your PC is fairly new and it's slow, remove the pre-installed programs, or bloatware, that came with it. PC Decrapifier will remove trial programs and other junk in a snap.

To give an older PC a speed boost, break out the CCleaner. This tool looks through Windows, Web browsers and other third-party programs for unwanted clutter and gets rid of it. CCleaner can also scan and fix errors in Windows' registry. Just make sure you allow it to backup the registry before making changes.
Grab Duplicate Cleaner to remove duplicate files that might be clogging up the system. But, limit your file hunt to the Documents area of your computer. You don't want to accidentally delete important system files.
In your cleaning process, you might find programs you no longer need. Windows' built-in uninstaller has a tendency to leave fragments scattered around your hard drive. You can remove those fragments efficiently with Revo Uninstaller.


2. The Blue Screen of Death
Thankfully, Windows' dreaded "Blue Screen of Death" is getting to be a rare event, but it still occurs. When it does, it isn't very helpful in helping you hunt down the problem.
The problem can often be traced to bad memory modules. Memory is cheap and buying extra RAM capacity is usually worth it for the performance boost. You can find out what kind of memory your computer takes with this scanner.
It's not difficult to remove and install memory modules. You'll find video tutorials at all the major online memory stores.
Just remember to ground yourself when you open your computer. You don't want to fry sensitive electronics with static electricity.


3. The zombie spyware plague
A message pops up on your screen repeatedly, telling you to buy a security program. It happens so often that you can't get any work done.
Your gut tells you that this is a rip-off, and your gut is correct. The message is adware that found its way on to your system, probably through an online ad for a "free" security scan you clicked on.
If you do download - and often pay for - the security program, you'll end up with fraudware. No matter how many times you run the program it will always find the same problems and keep trying to get more money out of you.
Before you buy any security software, make sure it's real. Use this site to stay current on fake antivirus programs.
Once you have fraudware, running a real antivirus program probably won't help. To stop the pop-ups, you must run an anti-spyware program. There are a number of good ones -- I'd start with Ad-Aware. You can find that and more legitimate free security software in my Security Center.


4. SD card stuck in CD/DVD slot
This is one for the Mac people. If you're distracted or pre-occupied, it's annoyingly easy to shove an SD camera card into an iMac's superdrive. The two slots are right next to each other on the right side of the computer.
You don't have to take the machine apart or ship it to a service center. The fix is easy. Cut an L-shape out of cardboard to use as a fishing hook. Slide it in and pull out the SD card.


5. Network issues
If your wireless network is dead, your router, cable or DSL modem probably crashed. It happens. Reboot the gadgets by unplugging them for 30 seconds, then plugging them back in. That usually solves the problem.
If your signal is weak or the connection is slow or drops out, there are a few tricks you can try to improve your home Wi-Fi, such as the beer-can antenna booster