Wednesday, October 29, 2008

We worked hard to come upon this respectable composition on cheap computers. Don't let these efforts go to vain; use it wisely.

Recommended cheap computers Items
CRU 7-Bay Enclosure - Storage enclosure - 7 bays


Connector Resources Unlimited (CRU) enclosures are designed to provide the most reliable solution for your data storage needs. Whether adding a hard disk drive, CD-ROM or any other storage or back-up device to your computer system, installation needs to be fast, easy and dependable. CRU enclosures come with easy-to-follow documentation and all the cabling you need to get your system up and running fast. CRU enclosures are constructed with metal or plastic chassis and have plastic bezels allowing a custom look, if desired. CRU's family of external enclosures for data storage devices cover the full range of sizes, from a small 3.5" model up to a seven-bay disk tower. CRU enclosures have UL, CSA, TUV and FCC certification. All have certified power supplies and are constructed to pass the requirements of all agencies.


Price: 397.32



Fellowes NEATO - Storage CD slim jewel case - capacity: 1 CD, 1 DVD - black, cle


Fellowes provides accessories for today's digital office and communication technologies, serving the needs of the office-based, home-based, and mobile worker. Fellowes offers a wide range of products designed to boost efficiency, comfort, and ease of use for the technology conscious consumer.


Price: 11.51



Samsung - Toner cartridge - 1 x black - 7000 pages


Samsung exemplifies technological determination and progressive ideals. From technology to business to the philanthropy, Samsung has become a world leader for which the possibilities are truly endless.


Price: 82.47



Epson - Print cartridge - 1 x yellow


This replacement yellow ink cartridge is for the Epson Stylus Color 3000 inkjet printer. It has a print life of 2100 pages.


Price: 48.07



Belkin - Patch cable - RJ-45 (M) - RJ-45 (M) - 7 ft - ( CAT 5e ) - green


What is a Category 5e patch cable? Think of it as the street that links the houses on your block and all the destinations in town. This cable is used to connect all the hardware destinations on a Local Area Network (LAN). The RJ45 Molded Cat 5e Patch Cable is perfect for use with 10/100 Base-T networks. Complete with RJ45 male-to-male connectors and snagless molded strain relief. PRODUCT FEATURES: Perfect in conjunction with 10 and 100 Base-T; 50 micron gold plated connectors to ensure a clean and clear transmission; Premium snagless-type molding to protect the connection; Exceeds the performance requirement of Category 5e.


Price: 3.94



McAfee Active VirusScan - License + 1st year PrimeSupport Priority Plus - 1 node


Safeguard your desktop computers and file servers. McAfee Active VirusScan automatically updates to help you stay one step ahead of the latest virus threats. Plus, McAfee ePolicy Orchestrator actively implements and enforces your protection. Integrate best-of-breed components, regardless of vendor, into a single, powerful, and flexible solution. Implement and enforce a proactive anti-virus policy that fits your business. Get clear, concise enterprise-wide reporting for continuing visibility, which ensures that all desktops and servers are updated and properly configured. Protect desktop computers from threats, and scan for viruses introduced via e-mail, Web browsers, CDs, and floppy disks. Depend upon the industry's leading virus detection and cleaning to safeguard your network, 24 hours a day. Detect infected files transmitted to and from your servers, and automatically clean, quarantine, or delete them. Viruses change weekly and even daily. The McAfee Security AutoUpdate patented incremental updating tool downloads the latest changes in the anti-virus database, whenever you are online. Your solutions will stay current, with minimal impact on network bandwidth.


Price: 14.14



Lexmark - Toner cartridge - 1 x cyan - 6600 pages


This toner cartridge is unique to this printer series. It is intended for use with Lexmark C510, C510n, C510dtn printers. It yields up to 6,600 pages at approximately 5% coverage. For a complete compatibility list please refer to the original manufacturer's web site.


Price: 208.62



Belkin - Network cable - RJ-45 (M) - RJ-45 (M) - 14 ft - UTP - ( CAT 5 ) - red


Having trouble finding the right cable for your PC system configuration? Let Belkin help you find the right cable for you. This LAN UTP Category 5 patch cable is designed for Ethernet 10Base T and Token Ring type 3 connection.


Price: 10.94



Samsung - Toner cartridge - 1 x magenta - 5000 pages


Samsung exemplifies technological determination and progressive ideals. From technology to business to the philanthropy, Samsung has become a world leader for which the possibilities are truly endless.


Price: 98.97



Seiko - Labels - 2 in x 2.36 in - 220 pcs.


Seiko Instruments SmartLabels are available in a variety of sizes, types and styles so you can label just about anything! There are labels for floppy disks, video cassettes, name tags, 35mm slides, and more! These ZIP Disk Labels are designed for labeling ZIP disks or 3.5" Diskettes.


Price: 8.80



Targus Mobile 70 Universal Auto/Air Adapter - Power adapter - car / airplane ( e


At just 7.5 ounces, Targus Mobile 70 Universal Auto/Air Adapter is lightweight, compact and ideal. Power your mobile devices wherever you go, in your car, on an airplane, boat or RV.


Price: 74.12



Cables to Go - Display extender - HD-15 (M) - HD-15 (F) - 10 ft


Don't let the wrong-sized cable hold you back. CTG's VGA extension cables let you run video presentations without the bulky CPU in the way. These cables, each one fully molded, allow you to move your monitor away of the system. The easy-to-use thumbscrews, designed for fast and easy connection, make quick positioning easier than ever. These cables are perfect for inserting a switchbox or multiplexor between your VGA card and monitor. Each cable is foil shielded to protect your short cable runs from electromagnetic interference. Count on CTG for affordable, reliable solutions!


Price: 8.99



Digi - Serial cable ( DTE ) - RJ-45 (M) - DB-25 (M) - 4 ft


RJ-45 to DB-25 cable adapters can be purchased from Digi. These adapters consist of a Digi 10-pin RJ-45 plug connected through a two- or four-foot cable to a DTE-configured DB-25 male connector. You can use DB-25 modem cables with the adapters for longer cable runs. Because these adapters use the standard Digi 10-pin RJ-45 plug and DB-25 connector configurations, they provide full modem support (Ring Indicator and Data Carrier Detect are available only on 10-pin RJ-45 connectors).


Price: 10.85



Cisco Catalyst 3560-24PS SMI - Switch - 24 ports - EN, Fast EN - 10Base-T, 100Ba


The Cisco Catalyst 3560 Series switches is a line of fixed configuration, enterprise-class, IEEE 802.3af and Cisco prestandard Power over Ethernet (PoE) switches in Fast Ethernet configurations that provide availability, security, and quality of service (QoS) to enhance network operations. The Catalyst 3560 is an ideal access layer switch for small enterprise wiring closets or branch office environments that are using their LAN infrastructure for the deployment of new products and applications such as IP telephones, wireless access points, video surveillance, building management systems, and remote video kiosks. Customers can deploy network-wide intelligent services, such as advanced QoS, rate limiting, access control lists, multicast management, and high-performance IP routing - while maintaining the simplicity of traditional LAN switching. Embedded in the Catalyst 3560 is the Cisco Cluster Management Suite (CMS) Software, which allows users to simultaneously configure and troubleshoot multiple Cisco Catalyst desktop switches using a standard Web browser. Cisco CMS Software provides configuration wizards that greatly simplify the implementation of converged networks and intelligent network services. The Catalyst 3560 Series can provide a lower total cost of ownership (TCO) for deployments that incorporate Cisco IP phones and Cisco Aironet wireless LAN access points, as well as any IEEE 802.3af-compliant end device. Power over Ethernet removes the need for wall power to each PoE-enabled device and eliminates the cost for additional electrical cabling that would otherwise be necessary in IP phone and wireless LAN deployments. Maximum power availability for a converged voice and data network is attainable when a Catalyst 3560 Switch is combined with the Cisco Redundant Power System 675 (RPS 675) for seamless protection against internal power supply failures and an uninterruptible power supply (UPS) system to safeguard against power outages.


Price: 2683.82



OKI - Serial adapter - RS-232 - serial - serial


This easy-to-install serial interface adapter provides 19, 200 bps transfer rate and features ready/busy and x-on/x-off protocols.


Price: 76.87



IOGEAR Intelligent KVM Cable - Keyboard / video / mouse (KVM) cable - DB-15, 6 p


The IOGEAR PS/2 to USB Intelligent KVM cable connects USB computers to PS/2 KVM switches without any adapters. It supports multiple OS such as Windows, Mac, and Sun Solaris. There is no software installation required, just plug the PS/2 end of the cable into your existing PS/2 KVM and plug the USB end of the cable into your USB computer.


Price: 29.97



Cables to Go FlexUSB - USB adapter - 4 pin USB Type A (M) - 4 pin USB Type A (F)


The FlexUSB Adapter from Cables To Go is the perfect solution for connecting your USB devices to you laptop, PC, or Mac. Notebook work areas often have limited space such as airline tray tables, small coffee shop tables, or a person's lap. All of these scenarios limit the user's ability to effectively connect one or multiple USB devices. With the FlexUSB adapter, you no longer need to worry about inconvenient locations or awkward orientation of your USB ports. The FlexUSB Adapter is a patent-pending, flexible adapter that allows USB devices to plug into an open USB port from any angle. With +/- 90 horizontal and vertical hinges, you can connect your USB devices in a position most convenient for you. The FlexUSB Adapter utilizes ratcheting positions for stability so your device will stay in the position you put it. Get your FlexUSB Adapter today and be on your way to simplifying your connections!


Price: 12.47



OKI Pacemark 4410 - Printer - B/W - dot-matrix - A2 - 288 dpi x 144 dpi - 18 pin


The Pacemark 4410 is simply the most reliable, powerful and durable forms printer in its class. Stand-alone or shared by a workgroup, this heavy-duty impact printer can tackle your most demanding forms workflow and then some. The exceptional performance of the Pacemark 4410 is perfectly suited to applications requiring high volume, including long, unattended print runs, general data processing, invoices, billing and financial statements, inventory reports, banking transaction logs, and accounting reports. Everything about the Pacemark 4410 says "convenience" - right down to the 2-line, backlit LCD display panel. And that extends to the printer's sensor-driven paper handling: stock thickness is read and adjustments made automatically, so there's no need for user intervention - and media moves smoothly through the machine. Two paper paths (front and rear) let you load two forms simultaneously: continuous-form stock, including single- and multi-part, card stock, envelops and labels. And the paths can be selected through the printer software that's included or via the front panel.


Price: 3180.66



McAfee PortalShield for Microsoft SharePoint Server - License + 1st year PrimeSu


McAfee PortalShield for Microsoft SharePoint Server provides content security for all documents, files, Web content, and document stores. McAfee PortalShield provides comprehensive protection from viruses, enterprise policy management and graphical reporting, secure content management, lower total cost of ownership. With PortalShield, users of Microsoft SharePoint are able to securely access, find and share the information they need to be productive in business, regardless of the physical location of information on the portal. PortalShield's capabilities go beyond traditional anti-virus and content security solutions to protect Microsoft SharePoint servers by detecting, cleaning and removing viruses, as well as searching for banned content within the documents that are stored in SharePoint workspaces, a capability not available with traditional anti-virus or content security solutions.


Price: 8.86



Minicom CAT5 RS-232 Extender - Serial port extender - 9 pin D-Sub (DB-9) - RJ-45


The CAT5 RS-232 Extender is a low cost, hardware-based solution providing remote access and control of any RS-232 protocol device. With regular RS-232 devices you are limited to an immediate area of control. The CAT5 RS-232 Extender extends control to over 1000m/3, 300 ft. This provides you with a tremendous amount of flexibility in your topology. Now you can place RS-232 devices in any location you want and control them remotely. The RS-232 Extender also provides full duplex transmission and is compatible with all RS-232 protocols. The system itself is composed of two units both made of sturdy metal casing: Local Unit and Remote Unit.


Price: 157.03



The Best cheap computers Articles on Wine
Basic Computer Maintenance



We get asked all the time what things you can do to prolong the life of your system and keep it running in top shape. We have put together a short list of our favorite tips to help you maximize that investment of yours. Use these tips to keep your system cool, running fast, and lasting longer.


I Thought I Saw A Bunny Wabbit

The main enemy of your computer is heat. Heat will destroy a computer given a high enough temperature or a long enough duration. When you machine is nice and new, heat shouldn't be a problem is a well designed system. Well, if it isn't a problem when you bought it, why is it a problem now? The answer are two simple words: dust bunnies


Those pesky dust bunnies will multiply in the sanctity of your computer case like real rabbts in the wild. The dust will build up on the components and cooling fins trapping in heat. Now I know that now self respecting computer stud wants to ask the wife to borrow the dust buster, heaven knows you might get trapped into cleaning something else while you are at it. In our book, the best cleaning is to take the machine outside, remove the side panel, and use a good air compressor or canned air to clean off all of the components. Be sure and use the little straw to get deep into the power supply. More power supplies are lost every year to dust buildup than any other cause. Before putting the cover back on, check all the cards and RAM to make sure it is seated well.


Do The Defrag

When do you defragment your drive? This is an age old question that I will put to rest right here and now. You do NOT need to defragment your drive every day, nor every week, and many people don't need to even do it once a month. It really just depends on how much your use your system. We reecommend a defragmentation about once a month. In an upcoming article, we will actually show you how to automate this process.


Backup

Enough said. If you are not backing up your data on a regular basis, then paint your face, put on a funny wig and a rubber nose and hang out with Bozo, cause a fool you are. Read this sentance carefully: your hardrive will die someday...period. It is only a matter of when. how often should you back up? That depends again, how far back to you want to go when your hard drive dies and all of your data is gone? Every business should be backing up their data monday through friday, preferably with the ability to go back to any day's backup for at least two weeks.


Whose got the power?

One of the most overlooked problems that will reduce a perfectly good computer to a pile of rubble in no time flat is the quality of the power coming into the system. If the power fluctuates up and down even a small amount, it puts a tremendous strain on the power supply to filter it and deliver clean power to the system components. At minimum you want a good surge suppressor. I am not talking about the $2.99 hardware store specials, I am talking about a good quality, brand name (like Belkin) surge suppresor. If you spend less than $20 on it, it is not providing adequate protection. If you really want ensure good quality power to your system, invest in even a small battery backup system. A small UPS will smooth out the power spikes and drops end deliver smooth, consistent power to your system.

About the Author


Kerry Garrison is the Director of Technical Services for Tech Data Pros, a southern California IT Consulting firm, and is the publisher of The Geek Gazette and VOIPSpeak.net.

Twelve Key Questions You Need to Ask About Your Computer Security for Your Home or Business


Security technology is only a part of an overall security plan. If you own a small business or a home-based business, or if you've been tasked with implementing security at your organization, developing a comprehensive security plan should be a very important part of your overall security strategy. Get the information you need to get started on the right track! In the computer/internet security game, the best move is one of Prevention! Prevention! Prevention!

With that in mind, here are the twelve questions you need to be asking, or, at least, be thinking about if you're serious about preventing or stopping security risks, threats, and attacks:

1. Do I have a solid security policy or strategy?

If you don't, begin immediately to get sample security plans, policies, and best practices for your business and/or home.

2. Where would I go for key information and news on keeping your information private?
Search the internet for managed security services. Ask if they provide a free computer test to assess your pc's level of vulnerability. Ask if they provide the latest tips to keep your privacy and protect your personal information and that of your business. Or simply - ask me.

3. Does my disaster recovery plan include redundant back-up and data recovery systems?
Understand what a good data back up system is and how to best recover from a disaster.

4. Do I know how to create safe passwords?

Learn how to write virtually un-crackable passwords.

5. How do I train my employees or family members to be secure?

Get all leading research on what to teach about security.

6. What do I do if my employees are my biggest security risk?

Learn all about social engineering and insider hacking.

7. What or who is a hacker?

A person who uses and/or creates software technology to break into the computers of individuals, businesses, government, and organizations for personal gain is known as a hacker. Often after he, she, or they hack into a computer, they can control it secretly by remote, making it a "zombie computer".

8. How does he (or she or they) break into home and business computers?

If they don't have the break-in software, they can buy it off the black market, or create it, themselves. With this technology, they use their malicious software to look for holes in the computers of their targeted victims.

9. To what extent might my home or business computers be vulnerable to hackers, hacker's tools, viruses, etc.?

You will never know unless you take the time to test your computer to see what holes are open, by what back doors (up to 65,000 portals) are malware entering your computer.

10. What is "drive-by hacking"?

Because wireless Internet access points have become popular for homes and businesses, home and business computers have now become a major target for hackers. In this new phenomenon, called "dive-by hacking", hackers simply take their laptop computers in their cars and drive through business parks or residential neighborhoods remotely scanning for open wireless networks.

11. Would I know if someone tries to hack into my computer?

Depending on the security measures you have on your computer and the sophistication of the hacker's software program, you might or might not be aware. Using keylogging programs, these cybercriminals can secretly see and record every keystroke you enter on your computer, thereby gaining access to all your private and personal information.

12. I have all the security measures, anti-virus, anti-spyware, and firewall I need. Can I still be hit by hackers and other pc-disabling attacks, risks, and threats?

Again, depending on the security measures you have on your computer and the sophistication of the hacker's software program, your computer or computers might or might not be compromised. Remember: Cybercriminals are superintelligent criminals! They somehow always seem to stay one step ahead of authorities and anti-cybercriminal software.

Obviously if you have to ask these questions, then you need to take immediate steps to plug the holes and cover the gaps.

So, here are some steps you can take immediately to implement, increase, or improve your present security measures:

* Learn all you can about hackers and the tools and methods they use to invade your privacy and cause problems. Subscribe to a comprehensive source of Internet security research, news and information for small and mid-sized businesses and organizations, or other professionals, that want to increase their level of security and build on their current technologies and efforts.

* Take advantage of the research already done. Get access to information about the leading topics in the security field, including hackers and hacker tools, viruses, data back up, writing good passwords, government and legal issues, protecting from insider hacking - and more.

* Stay current with important security news developments. Work with a managed security firm that maintains an entire library of the most beneficial news articles, white papers and other links that you can use to maintain an excellent awareness of cyber-security issues on an ongoing basis.

* Need help creating a security plan for your organization or business? Take advantage of professional security consulting and training both by telephone consulting or on-site visits. Get vulnerability assessments, employees training, security implementation, and much more.

Because cyberpredators and other cybercriminals are becoming smarter and more sophisticated in their operations, they are real threats to your personal security and privacy. Your money, your computer, your family, and your business are all at risk.

These cybercriminals leave you with three choices :

1. Do nothing and hope their attacks, risks, and threats don?t occur on your computer.

2. Do research and get training to protect yourself, your family, and your business.

3. Get professional help to lockdown your system from all their attacks, risks, and threats.

Remember: When you say "No!" to hackers and spyware, everyone wins! When you don't, we all lose!

? MMVII, Etienne A. Gibbs, MSW, The Internet Safety Advocate and Educator

Resources Box:
Etienne A. Gibbs, Independent Internet Security Advocate and Educator
, consults with individuals, small business owners, and home-business entrepreneurs regarding online protection against spyware, viruses, malware, hackers, and other pc-disabling cybercrimes. For more information, visit SayNotoHackersandSpyware.com/.



Headlines on cheap computers
Where does all the computer power go: cloud computing

Wed, 29 Oct 2008 00:05:23 GMT
I excerpt from some of the articles: " CORPORATE IT: Where the cloud meets the ground " This is Microsoft's new data centre in Northlake, a suburb of Chicago, one of the world's most modern, biggest and most ...

AFP - Low cost Internet phone revolution beckons for India

Fri, 22 Aug 2008 07:00:00 GMT
August 22, 2008 -- NEW DELHI (AFP) — Battle lines are being drawn after India's telecoms regulator called for full-blown telephone services via the Internet,...

1 Comments:

At 6:03 AM, Anonymous Anonymous said...

Aw, thіs was а very nice post. Finding the time and aсtual effort to create a rеally good аrticlе…
but whаt cаn I sаy… I hesitate a lοt and never manаge to
get anything done.

Here is my page Http://Vipshoppingalert.Com

 

Post a Comment

<< Home