@Proxy for Reliable Proxy Sites

A consistent and dependable proxy site should have a regularly maintained database, and @Proxy succeeds at this, and provides even more benefits for the user If you are not familiar with this process, it is the easiest way that a computer user can access web sites that have been denied to you

A consistent and dependable proxy site should have a regularly maintained database, and @Proxy succeeds at this, and provides even more benefits for the user.

If you are not familiar with this process, it is the easiest way that a computer user can access web sites that have been denied to you. If you are working in an office, for example, it is very likely that sites not related to your work may be inaccessible. By using one of the links at @Proxy, you can overcome this obstacle.

Advantages of Anonymous Proxies

A proxy actually consists of two parts: the software and the server. To make it easier to understand, when you utilize one, your web browser interacts with the proxy server which connects with the web server. What does this mean? For the user, it connotes privacy, because the web server does not know which computer is accessing the site, nor the IP address.

What to Look for in a Proxy Site

There are several types of servers in the @proxy database. When choosing one, make sure that they have most, if not all of the following: first is that they have SSL or TLS tunnels, as it prevents any packet sniffers.

Some support only http protocols, but others can also access ftp, and https aside from http. Be sure that you get the proxy that meets your requirements. Of course, hiding of the IP address is a must, but you should also look for the capability to remove traces of cookies, banners, scripts, and other types of information.

How Web Sites are Blocked

There are several ways that a network (be it in an office or university) is able to restrict access to the Internet, the most common being a firewall or a web content filtering software. In the case of web filters, the programs make use of a database of banned sites, or have a lost of words that have been ?blacklisted?.

How Proxies Unblock Web Sites

However, regardless of whether it is a firewall or web content software, using any one of the software or servers on the database will allow access to them.

How do they work? The most important element of this tool is that it is not part of your network, and thus, not subject to the firewall and/or filter. Second, each proxy has a unique IP (Internet Protocol) address which you can access.

Basically, what will happen is that you will use the IP address of the proxy to access the web site. As it is not subject to any filter, you can then view the site completely. Your anonymity is therefore guaranteed, as the address that is used is that of the server.

As a computer user or network systems administrator, it is crucial that you know the different types of servers available so that the proper application can be utilized.

The Cache Server

As the name implies, part of the function of this server is to store frequently accessed web pages into their system, allowing for faster retrieval, and at the same ti8me, unclogging the bandwidth; havi9ng these files in the system will allow the network resources to get other files and documents, allowing for faster processing of data.

This feature is included in most anonymous servers, and most Internet service providers as well. To keep the contents updated and fresh, the stored files have expiry dates. There are also options open to the network authorities that allow them to decide which files should be kept or deleted.

Content Filter

Some specially designed proxies work like web content filters, using several tools to deny access to certain sites. These utilities include keyword blocking, DNS monitoring MIME viewing and restricting access. These are the types that are often used in corporate networks and also universities. Getting around these limitations is possible through the use of proxy software.

The difficulties that one can encounter with most of these servers is that they can be difficult to access (too much traffic) and the software may be incompatible with the operating system or network. Because @Proxy regularly updates its database of servers and applications, you can be guaranteed that the links provided are always working and accessible.

Peter Garant is writing articles about anonymous Proxies for a site about Proxies.

You Don’t Have to Hide Your Daughters After the HPV Vaccine

The thorny question weighs heavily on some parents’ minds: If their daughters get the human papilloma virus vaccine for protection against cervical cancer, will it cause them to be more sexually active?

The short answer: No. 

A study published online this week in the journal Pediatrics found no differences in birth control counseling, pregnancies or sexually trasmitted diseases among girls who did or did not get vaccine.

MORE: HPV Vaccine Benefits Those Who Do and Don’t Get the Shots

The roots of the controversy go back to 2006 when the Centers for Disease Control and Prevention first recommended the new vaccine for girls beginning at ages 11 to 12.

Parents and others protested that girls who were vaccinated would then become promiscuous. That concern stems partly from the mistaken belief that the vaccine protects against other sexually transmitted infections besides HPV; it does not.

“Other research studies have found [vaccinated] girls didn’t change their [sexual] behaviors,” lead author Robert Bednarczyk, a clinical investigator at the Kaiser Permanente Center for Health Research Southeast, Atlanta, told TakePart.

Yet, he says, ”Parents were still concerned.”

MORE: Quick Study: Getting More Sleep Helps Vaccines Do Their Job

Those previous studies were based on self-reported behavior. So, Bednarczyk and his team decided to look at the question from a different–and more objective–angle.

They evaluated medical records, tracking whether the girls had been tested for STDs or diagnosed with one, whether they had pregnancy testing or got pregnant, and whether they got birth control counseling. These are all factors related to and reflecting sexual activity, Bednarczyk says.

The researchers looked at data on nearly 1,400 girls ages 11 to 12, who were members of the Kaiser Permanente health plan in Georgia during 2006 and 2007.

Of the total number, 493 girls received at least one of three doses of an HPV vaccine during the study period (the vaccine studied was Gardasil, which immunizes against four types of HPV). The other 905 received other vaccines, but not HPV. The girls were followed for up to three years.

MORE: Non-Medical Vaccination Exemption Rates Are Growing

No differences were found in the outcomes studied between the two groups. About 10 percent of the girls in each group exhibted one or more of the behaviors that the researchers tracked.

Bottom line? “The vaccine is safe, effective and not associated with increased sexual activity,” he says.

Despite the recommendation from the CDC, use of the vaccine has been slow to catch on, according to the researchers. By 2010, fewer than half of the girls eligible for the vaccine had received even one dose.

More than 12,000 new cases of cervical cancer are expected to be diagnosed this year, according to the American Cancer Society, and more than 4,000 women will die of it.

A study released earlier this month found that despite fears about serious side effects to the HPV vaccine, it is safe overall, with only minor reactions such as fainting and mild skin infections.

Have you debated about getting your son or daughter the HPV vaccine? Let us know in the comments.

Related Stories on TakePart:

• Op-Ed: In the Great Vaccine Debate, Parents’ Fears Should be Respected

• Ask Dr. Dave: Can You Get Diseases From a Toilet Seat?

• A Drop in Circumcision Rates Could Mean Billions in Healthcare Costs

Kathleen Doheny is a Los Angeles journalist who writes about health. She doesn’t believe inmiracle cures, but continues to hope someone will discover a way for joggers to maintain their pace.

Chat Roulette – An Internet Chat Phenomenon

I read about Chat Roulette in an article recently and it sounded like a very simple and novel idea.

Last night I powered up my laptop, opened up my browser, and typed in http://www.chatroulette.com and thought I would give it a whirl.

From what I had read, it sounded too good to miss, and it is definitely a good way to kill time, and depending on who else you meet it could be anything from boring to absolutely hilarious.

The concept of Chat Roulette is very simple…

You need to have a webcam to participate, the whole point being that you are given a one to one videochat opportunity with a person at random.

The Chat Roulette home page gives you some brief information and tips, in case you have problems getting it to work.  

It also tells you how to report anyone who is going anything appropriate – and there were a few last night.

But pretty much, you just need to click on the Play button and begin.

The top of the window has 3 buttons as follows:

Play – start the cameraReport (F2) – report someone who is offensiveStop – (F8) – turn the camera off

You also have options to Auto Reconnect and to only select people who have webcams (you can try Chat Roulette without a webcam).

Right, let’s press the Play button and see what happens…

You should see your webcam light go on, and see yourself on the lower of two video windows on the left of the screen.

The right side of the screen is a chat window, where you can see messages from your new videochat partner and also type your own messages.

A message should tell you that you are waiting for a random contact, and then their video window will open.

You never quite know what you will see, which is the fun of this unique site.

Mostly we just saw other people looking bored, occasionally someone with very little brain doing something they shouldn’t in front of the camera, so be warned… but we did see some absolute gems too.

I should add that if either you or the person you are seeing wants to move on, you/they just have to click on the Next button, or to press the F9 key.

I had my fiancee’s daughter sitting next to me on the couch when I started this up, and my fiancee on a chair the other side of me.

We all started laughing, and my fiancee quickly said “how do I do this?” and loaded it as well.

The three of us were in absolute hysterics at some of the people, and for a while it was just something totally different to do when you have time to kill.

The absolute best act last night on Chat Roulette was one person that my fiancee pulled up.

They had a sock puppet, which would move and wave, and pick up different buttons with words on them, like “wave” or “smile” etc.  The person doing this was brilliant.

A lot of the contacts I have to admit were quite boring and also bored, but you never know who you might meet, your future husband or wife maybe.

I can see some potential in this, for maybe practicing a stand up routine, for dressing up in costume and making people laugh etc.

Maybe over time there will be some cult figures on Chat Roulette who everyone hopes to connect with.

Everything is completely anonymous. Unless you say or type something about yourself, nobody knows anything about you, not even your IP address.

There is no registration process, you just load and hit the Play button.

If you want to see how much fun Chat Roulette can be, take a look at The 24 Best Chat Roulette Screenshots – some of these are just criminally funny.

Fast Company also has a good review of Chat Roulette with descriptions of some of the people that you might meet, or some of the things that you might see on there.?

 According to Wikipedia Chat Roulette was launched in November 2009 by Andrey Ternovskiy, who is a 17 year old student from Moscow and still in high school.

Chat Roulette quickly took off, and it’s popularity rocketed in February 2010 after it was featured on Good Morning America and in The New York Times and New York magazine.

So if you are in the mood for something different and crazy, just give Chat Roulette a whirl. It’s definitely different.

Not my IP – a Free Solution to Mask IP Released by Privacy-Gateway

(PRWEB) April 23, 2009

The time is accelerating and software has to keep up with the new rhythm, too. In order to efficiently use the software solutions, users are required more and more experience. Experience is gained by studying and using the software solutions. And these actions eventually require time.

There is nothing wrong in acquiring more knowledge and experience, but the simplest and most efficient solutions can really help us focus on our primordial goals. This is the main philosophy that lies behind Not my IP. Privacy-Gateway released this solution aiming to be the simplest and most efficient way to hide IP.

Considering all dangers Internet users face online and analyzing the increasing numbers of identity thefts, Internet surfers must have near by an online privacy protection tool. All of us need solutions to hide IP in order to browse the web anonymously, without worrying that we might be victims of online identity thefts.

The simpler it is – the better it is! Internet users do not have to spend time learning complex strategies to achieve their purpose. They only want to hide IP. Is this too much they’re asking? “Not at all!” thought Privacy-Gateway when started developing Not my IP. Only press one button and the real IP is hidden. A new (fake) IP will guarantee users anonymous web surfing while hiding IP. What can be easier that this? And to make it even better, Not my IP uses an exclusive list of premium proxies in order to provide a new IP.

Convince yourself: download and install Not my IP. It’s FREE!

# # #

Most Amazing Explosions Caught on Film

Five of the biggest, most dramatic and most destructive man made explosions in history. Accidental or deliberate, in war, in peace, or for propaganda purposes, these explosions will never be forgotten.  Watch dramatic video of some of the biggest booms in history.

These videos include:

  • The largest nuclear blast ever
  • A Rocket Fuel Plant exploding
  • The biggest and deadliest war time mining operation where 10,000 German’s were killed
  • America’s biggest industrial accident ever
  • What happens when a Danish Fireworks Importer sets off a chain reaction

Rocket Fuel Plant Explosion, Shock Wave, and Earthquake

Henderson Nevada, May 1988, this rocket fuel plant went out with a big bang.  This is what Six Million Pounds of Rocket Fuel exploding looks like!

A distructive chain of events leading to this explosion started with the failure of an O-ring on the Challenger Space Shuttle in 1986. That O-ring failure lead to the distruction of the Challenger craft and the suspension of the space shuttle program by NASA.  However, the Nevada plant responsible for producing ammonium perchlorate, part of the solid state rocket fuel, continued to produce as before and the rocket fuel started to pile up.  

The accident investigators found that when this NASA supplying plant ran out of aluminum storage bins for fuel they switched to HDPE (a type of plastic) drums.  HDPE is not really dangerous on its own, nor is unconfined ammonium perchlorate dangerous on its own, but together the fuel and the plastic create a classic fuel+oxidizer scenario that burns much like a roman candle – a very hot and dangerous combination.

The investigators believe that welding spark ignited one of the poly drums filled with ammonium perhlorate. Once started, the fire spread from barrel to barrel rapidly and “since there were drums filled with ammonium perchlorate just about everywhere on the site, once started, the initial fire was unstoppable.”  

The barrel fire heated the large (sealed) aluminum bins filled with ammonium perchlorate. Heated sealed bins exploding spread the fire to other areas where more poly drums and aluminum bins were stored. The massive explosion was a football field sized area of aluminum bins stacked on top of each other, surrounded by the burning plastic drums throwing off heat which triggered a earthquake causing explosion of 6 million lbs of rocket fuel. 

The rocket fuel plant was obviously beyond destroyed, but the explosion, shockwave and earthquake caused enough damage to surrounding properties that a group of insurance companies sued the plant for $77 million in losses, on top of the $100 million in losses at the plant itself. [3917]  

 The chemical fire and subsequent explosions claimed two lives, injured 372 people.  No details on the effects on the adjoining marshmallow factory, but that must have been quite the marshmellow roast.

Hide Your IP Address for Privacy

Your IP address is your online ID, and when you surf the internet with your real IP, it doesn’t take much computer skill to see someone else’s IP. Would you show your driver’s license to just anyone? Probably not. So why would you let just anyone see your IP address? Though individual ‘hacks’ aren’t that common, ie specifically being targeted by a malicious user, there’s a lot to gain by hiding your IP address from your ISP.

When you connect to the internet with your real IP, all information gets passed through your ISPs network. They are able to view and record all kinds of information about your online activity; which sites you visit most frequently, what your email address is, which online communities you’re part of, what you download, and they of course can attach all this to your name and address.

While most people aren’t really concerned about who see what books they read and what they posted on their blog, there are times when there are more serious consequences that just ‘being embarrassed’. Privacy is often confused with trying to hide perversions from public, but there are more aspects to the situation.

For example, if you think you (for a woman) or your girlfriend/wife (for a man) are pregnant, you may be frequently searching for information about this on the internet. Now if your ISP can see that your searching for this information, it’s not a big deal. But what if your employer was able to get a hold of this information? If it’s being recorded somewhere, who’s to say that they can’t with the right connections?

And what happens if you get sick? Having a cold or the flu isn’t a big deal, but if you catch something more serious – AIDS or other STDs and search for information on the internet, is it the right of your ISP to be able to pin that information on you? Wouldn’t you like a bit of privacy?

And what about all those advertising companies who would just love to have a peek at what you bought online, what movies you watched last month, and what you do in your spare time. They’d just love to build a ‘buyers profile’ of you to try to sell you more stuff you don’t really need. Do you want to give them this power?

So you can see the advantages of having a bit of privacy online. This can done when you hide your IP address. You can hide IP address on a Mac, Windows, Linux, iOS, Android, and other smartphones/computer systems. There are a number of ways to do this, but proxies and virtual private networks are probably the most popular.

How To View Private Facebook Profiles

If you want to know how to view private facebook profiles, there are a few things that you can do to make this dream a reality. Whatever your reason for wanting to view a private facebook profile, the task can be completed, but not without a little ingenuity.

The first thing that you are going to have to do to know how to view a private facebook profile, is to ask yourself why you are wanting to do this. If someone has a facebook profile that is private, the best thing that you can do is add them as a friend. By doing this you will be able to see everything about their facebook profile that you want to. If you want to know how to view a private facebook profile because the person will not add you as a friend, there is a way around this.

What you are going to have to do is make a profile or organization profile of your own that does not indicate who you are. Once you do so you are going to have to add a lot of people on it and get it active so it looks as much like a real profile as possible. When this is accomplished, you are going to have to attempt to re add the person you are wanting to view. This is the only way that you can view their profile, so the best thing to do is make your new profile about something that the person you are trying to add might be interested in or make a friend profile of someone that they might know. This is the best way to view private facebook profiles and this is the only way. If you want to know how to view private facebook profiles, this is how to do it.

Improving Home Office Technology: How to Become a Tech-savvy Person's Guide

From software shortcuts to office design brainstorms, here’s how to do more–often without spending more. In today’s age of technology, there are many who are often left clueless in the jargon of computer programmers. However, following these special tips will help make sense out of all that and be on your way to a healthy and knowledgeable computer relationship.

To make finding the solutions you need even easier–time is money, after all–we’ve focused the spotlight on 10 home office technology categories: data protection and storage; Internet use; Web browsing; hardware and peripherals; communications tools; presentations; core applications; tech support; office design; and business travel.

Along with tips and tricks, you’ll find some suggestions for tools to add to your home office utility belt. Whatever your business, we guarantee these insider’s shortcuts and undocumented secrets will help you do everything better, smarter, and faster than before.

Disaster-Proof Your Data

Dangers to your critical files lurk around every corner, but there’s no need to suffer a data loss if you follow our advice for safeguarding your files and tightening your PC security. These following tips are must-do’s to ensure protection for your PC.

1 Build a backup plan. The first rule of thumb for backup is “just do it.” But to make things simpler, separate items that don’t change (like last year’s tax documents) from folders of dynamic data such as client invoices, contact management files, and open projects. Now you can back up static files just once, and schedule weekly (or even daily) backups for folders in constant use.

2 Zip and fly. Before backing up, use a compression utility like WinZip (800-242-4775, www.winzip.com; $29) or ZipMagic (800-645-3649, www.mijenix.com; $39) to combine related items and reduce the number of floppies, Zip disks, or tapes you need to store your data.

3 Double up and double-check. Always make a second copy of critical files on a separate tape or disk. This way, if your first attempt is corrupt or incomplete, you won’t be left in the lurch. Then attempt to restore at least one particular file before you put away the backup media. If you can restore it without errors, your backup is probably reliable.

4 Tune up often. Installing bug fixes, software patches, and updated drivers is essential to keep your system running smoothly. Save yourself the time and hassle of searching through multiple Web or FTP sites by automatically updating these items once a month using CyberMedia’s Oil Change (310-581-4700, www.cybermedia.com; $39.95 for a one-year subscription).

5 Store files offsite. If storing critical files in a safety deposit box seems inconvenient, garage key data with an Internet storage company like @Backup (800-344-2000, www.atbackup.com) or Atrieva (888-287-4382, www. atrieva.com). Some online backup services will even send you a CD-ROM copy of your data for an additional fee.

6 Snoop-proof your passwords. Tired of racking your brain for hackerproofpasswords, only to have to write them down so you don’t forget? Install a shareware utility like Password Manager from Celebrity Consulting (available at www.shareware.com; free to try, $14.95 to keep) which will generate random passwords and keep them safe from snoops.

7 Foil prying eyes. Eudora Pro 4.0 (Qualcomm, 800-238-3672, www.eudora.com; $59) users can take advantage of a plug-in version of PGP Keys to scramble important e-mail documents for safe sending. RSA SecurPC (800-732-8743, www. securid.com; $59) lets you password-protect and encrypt selected files, or even your entire hard disk.

8 Delete files for good. Dumping items from the Recycle Bin doesn’t mean they’re gone forever. A file shredding utility like Karmadrome’s Without a Trace (available at www.hotfiles.com; freeware) permanently wipes sensitive files from disk so they won’t fall into the wrong hands.

9 Inoculate against disease. If you spend time on the Internet or swap files with clients or coworkers, install an antivirus program now, and use it to scan both your hard disk and foreign disks. Symantec’s Norton AntiVirus 4.0 Deluxe (800-441-7234, www.symantec.com; $70) offers weekly virus definition updates–a great feature.

10 Beware of attachments. Because macro viruses can lurk in Microsoft Word and Excel documents, and all sorts of other nastiness may be concealed within executable files, you should automatically screen attachments with an antivirus program before saving them to your hard disk. Better yet, delete any from senders you don’t recognize.

11 Chat and hide. The IP address of your PC can be a give away to hackers. If you chat or send instant messages over the Web, hide your IP address from others by turning off file sharing Via TCP/IP. Under the Network control panel in Windows 95/98, Click the File and Print Sharing button, then turn off access To your files.

12 Size it up. When shopping for backup hardware, the best option is a device that can store your entire hard disk on one tape or cartridge with a bit of wiggle room left. Alternatively, partition your hard disk into multiple drives or organize data into chunks that will comfortably fit onto your favorite removable media.

Harness the Internet

The Web offers an overwhelming wealth of information for home-based workers–sometimes too much. Here are some suggestions to make your future Internet experiences more streamlined and successful.

13 Find the perfect provider. Internet service providers (ISPs) are a dime a dozen, but they aren’t created equally. The List (www.thelist.com) is the perfect way to see all your local providers, compare their offerings (do they have a sufficient number of modems? do they have toll-free support?), and decide which one offers you the best value.

14 Increase your speed. The current high-speed modem standard is V. 90, which is compatible with both K56Flex and X2. Depending on your modem and your ISP, you may get a performance boost if you update your 56Kbps modem to V. 90. The information-laden 56k.com site (www.56k.com) will point you in the direction of nearly every V. 90 upgrade available.

15 Turbocharge your searches. Single-engine search sites such as www.altavista.digital.com or www.lycos.com used to be the best way to find information on the Web. Not any more. Your best bet these days is a meta-search tool like Copernic 98 (www.copernic.com; $29.95), which takes information from all the top search engines and feeds you the best results, or MetaCrawler (www.metacrawler. com), which does it for free.

16 Focus your queries. Regardless of the search engine you use, your results are only as good as the query you make. Most engines let you conduct an advanced search by stringing together phrases using AND, OR, and NOT (often referred to as Boolean operators). Check your search engine’s help area to see if it supports these, and learn how to use them.

17 Speed in the FastLane. Waiting for graphics to load is a huge waste of time. Spectrum’s new FastLane proxy service (www.Spectruminfo.com; $4.95/month) lets you set up your browser to receive all graphics from the Web compressed to one-third of their original size, resulting in significantly faster page loading.

18 Stay connected. Hate getting tossed offline by your ISP for being idle? Don’t let your provider think you’ve stepped away–keep your Internet connection running by playing audio over the Internet via Real-Audio (www.real.com; free) or music via Imagine Radio (www.Imagineradio.com; free).

19 Track a package. An AWOL FedEx shipment can damage any working relationship. But the carrier’s home page (www.fedex.com) can help you find it in a flash. Better yet, sign up for FedEx interNetShip service so you can ship online to more than 160 countries without having to hand write airbills, call for a pickup, or install additional software.

20 Promote your Web site. The Submit It! Resource Center (www.submit-it.com) offers dozens of free tips for marketing your home page. If you want to skip the do-it-yourself route, send two URLs to more than 400 search engines, directories, what’s new sites, and award sites using the Submit It! service ($60 one-time fee).

Brush Up Your Browser Skills

Whether you prefer browsing the Web with Microsoft Internet Explorer (IE) or Netscape Communicator, we’ve found ways to make them work harder for you.

21 Keep up-to-date. Stave off security problems and performance issues by keeping your browser current. To see if you have the latest version, visit www.browsercheck.com. If not, in IE 4.x, go to Help/Product Updates (or visit windowsupdate.microsoft.com); in Netscape Communicator or Navigator, click on Help/Software Updates to visit Smart Update at www.Netcenter.com.

22 View multimedia. Not everything online is made up of HTML. To see and hear online extras, you need plugins like Shockwave (www.macromedia.com) and Real-Audio. Want to check which ones you’ve already got installed in Netscape Communicator? Choose Help and then select About Plug-ins.

23 Connect quickly. Save yourself a step by setting up your Windows 95/98 system to automatically dial your ISP whenever you try to access Web pages with Internet Explorer 4.x or Netscape Communicator. Run the Internet Connection Wizard to set up a brand-new connection, or if you have an existing dial-up configuration, input your ISP’s settings on the Connections tab in Windows 95′s Internet Control Panel.

24 Beat browser bloat. Netscape Communicator Suite and IE 4.x are hard-disk hogs, but they don’t need to be. If all you do is browse, download only Netscape Navigator instead of the full Communicator suite to save disk space. With IE, delete the folder on your hard disk called Internet Explorer 4.0 Setup, which contains 12MB of files you don’t need.

25 Cache in on repeat visits. Browsers store recently viewed Web pages and graphics in a disk area called cache. If you visit the same sites repeatedly, increasing your cache to 5MB allows more saved pages to load from your hard disk, instead of downloading from the Web. Change your cache size in Netscape Communicator by Selecting Preferences under the Edit menu. Double-click Advanced and select Cache. In IE 4.x, go to View, then Internet Options. On the General tab, select Temporary Internet File Settings. Adjust the slider bar at the bottom to the desired cache level.

26 Nix hostile applets. If you’re concerned about rogue Java or ActiveX applets wreaking havoc on your PC, adjust your browser’s security settings to disable these features. In Netscape Communicator, select Edit/Preferences, click the word Advanced, and disable Java and JavaScript. In the latest versions of IE, select View/Internet Options, then click the Advanced tab. Under Java VM, deselect “Java JIT compiler enabled.”

27 Get double vision. Opening two browser windows lets you read one page while waiting for the second to load. In either Navigator or Internet Explorer, open a second browser window (or more) by typing Ctrl-N. If you want to follow a link, but don’t care to leave the page you’re looking at, right-click the link in question and select “Open in new window.”

28 Save surf time. Both Communicator and IE 4.x allow you to surf Web sites offline via your much faster hard disk. In IE, right-click the page and select Add To Favorites. Under “Would you also like to subscribe to this page?” select “Yes, notify me of updates and download the page for offline viewing.”

29 Explore from anywhere. Why go to a search site to scan the Web when you can conduct searches directly from the Net-site box in Communicator’s toolbar? Simply type in a phrase of two words or more and press Enter. Navigator automatically executes a search with Magellan, Yahoo, Lycos, Infoseek, or Excite. If you want to search on just one word, type a plus sign and a space before the word.

30 Right-click shortcuts. In older versions of Navigator, right-clicking a link brings up a menu where you can add the link to your bookmarks, open the link in a new window, save the linked page as an HTML file on your hard disk, or create a Windows 95 shortcut. With Communicator, you can also right-click anywhere on a page to set it as your wallpaper, view its HTML source, or see document info for that page. The functions are similar in Internet Explorer 4.0.

31 Button up bookmarks. In just a few steps, you can turn favorite bookmarks into handy toolbar buttons. In Communicator, click the Bookmarks button and choose Edit Bookmarks, then drag individual bookmarks or an entire folder of bookmarks into the Personal Toolbar Folder. In IE 4.x, choose Favorites, then Organize Favorites. Select a folder or individual link, click Move, and place it in the Links folder.

32 Fast forward. Forget double-, triple-, or quadruple-clicking the Back button to return to a particular Web page. One click of the down arrows on IE’s Back and Forward buttons reveals a list of recently visited pages. Simply scroll down and select the one you want to revisit. In Netscape Communicator, click and hold the Forward or Back button to see a similar list.

Shift Your Hardware Into Maximum Overdrive

You paid a pretty penny for the hardware that runs your business, so make the most of it. These tips and tricks will help get you more for your money.

33 Utilize OSB. Save space and cabling hassles by using peripherals that connect to your PC’s USB ports. USB devices can be daisy-chained together and many don’t require separate power connections. For a list of USB peripherals, visit Intel’s USB support site (www.intel.com/ design/usb).

34 Customize clicks. Mice are powerful peripherals if you take, the time to set them up properly. Depending on the type of mouse you have, you can use its many buttons to enhance viewing, slow the speed of the cursor, and more. To see what options are available, go to the Mouse control panel in Windows 95/98. For more comfortable mousing, consider a pointer with a wheel like the Microsoft IntelliMouse (www.microsoft.com; $59.95) or Logitech’s Cordless Wheel Mouse (www.logitech.com; $59.95).

35 Maximize multitasking. Save precious desk space (and a bit of cash) by using a multifunction unit, such as the Hewlett-Packard LaserJet 3100 (800-527-3753, www.hp. com; $699), which rolls faxing, scanning, copying, and printing into one.

36 Tune into PCTV. Stay on top of industry trends and business news with your PC by installing a TV tuner card. One good choice: ATI’s All-in-Wonder Pro (905-882-2600, www.atitech.ca; $299 for 8MB version), which combines a TV tuner with a high-performance 3D graphics accelerator and capture functions for video editing. Warning: “General Hospital” can be habit-forming.

37 Dock it. If you’re out of the office more than you’re in, a laptop with a docking station makes a lot of sense. One to consider: Micron’s TransPort Trek2 266 (800-209-9686, www. micronpc.com; $3,500 with docking station and Executive Desktop package).

38 Recycle that doorstop. Don’t throw out that 486 or older Pentium system-turn it into a dedicated device. Some options: Build a fax server, set it up as an e-mail autoresponder, or convert it into a server for your home network.

39 Trim the FAT. Hard drives running Windows 3.1 and 95 use a file system called FAT, which wastes lots of disk space. If you don’t use Windows 95 version OSR2, the best way to get that space back is to partition giant drives down to 1GB increments using a product like PartitionMagic (800-379-2566, www.powerquest.com; $70).

40 Spiff up printouts. Smudged, streaked ink-jet printouts are net to be tolerated. You can clean any Hewlett-Packard or other ink-jet cartridge using a cotton swab and distilled water (Evian will do in a pinch). Just remove the ink cartridge and wipe off the area around the nozzle plate.

41 Enter the flicker-free zone. If your monitor is giving you eyestrain, it might be due to a too-low refresh rate. To reduce flicker, go to the Settings tab in the Display control panel, click Advanced, then use the Adapter tab to reset the refresh rate. Refer to your monitor’s manual for the appropriate refresh rate for the resolution you most often use. If this doesn’t do the trick, it may be time for a more powerful (4MB) graphics card.

42 Conserve consumables. Taking time out to replace printer ink or toner is a necessary home office hassle. But you can cut down on consumables by reducing the printer’s DPI setting to draft or toner-saver mode. Check your printer’s control panel to see if this is an option.

43 Find the features. You might not have to make that next trip to the local print shop. Your laser printer probably can perform a variety of different tasks you never ask it to do, such as printing on transparencies, labels, envelopes, and lightweight card stock. And color ink-jets can often create T-shirt iron-ons and other specialty items.

Increase Your Communications Savvy

Using your land line is still the best way to order pizza, but e-mail, faxes, PDAs, and cell phones are better suited for many tasks–especially when you have our insider tips to guide you.

44 Jump from AOL to POP3 e-mail. For the ultimate electronic messaging flexibility, ditch America Online and sign up for a POP3 e-mail account through a local or national ISP. You’ll be able to take advantage of more powerful e-mail management utilities with POP3 mail, including Eudora Pro 4.0, and your new ISP will probably give more reliable Internet access to boot.

45 Send mail from the Web your way. To default to Eudora e-mail instead of Internet Explorer’s mail client when using mail to Web links, select View/Options, click the Programs tab, and select Eudora Pro in the Mail field. Navigator users should download the Mailto Watcher add-on utility (available at www.eudora.com) that allows you to intercept Navigator mailtos even when Eudora is not running simultaneously.

46 File it quickly. At a minimum, most e-mail clients allow you to build custom folders for sorting messages into categories as they arrive. But to harness the full potential of Eudora, you need to develop filters that will transfer messages into specific folders automatically. The easiest way to do this is to select any Eudora 4.0 message and choose Special/Make Filter. By default, this will create a filter guiding future messages into a folder with the sender’s name. When you’re through fine-tuning the action, click the Create Filter button to finish the job.

47 Hotlink your hot news. In Eudora, you can quickly turn important text or an embedded graphic into a hotlink to a related Web site. Select the desired element in your message and click Make Hyperlink button on the formatting toolbar. Then type in the complete URL and click OK.

48 Redirect-don’t forward. Got an e-mail from a client that’s better addressed by your partner? In Eudora, select the message and pick Message/Redirect from the toolbar. A copy of the message appears with the original sender’s address in the From field, including any attachments. Complete the recipient’s address and click Send.

49 Get the fax, ma’am. Eudora Pro 4.0 also accepts a plug-in version of JFAX Personal Telecom (888-GET-JFAX, www.jfax.com). For $12.50 per month you receive a local, private phone number in the Jfax.com city of your choice where people can send faxes and voice messages that are then forwarded to your e-mail inbox. If you don’t want to go the plug-in route, try Symantec’s standalone WinFax Pro 8.0 (800-441-7234, www.symantec.com; $99.95).

50 Instantly communicate. To stay in touch even when you’re online, get connected instantly via Internet messaging systems. Consider America Online’s Instant Messenger (www.aol.com; free), which is built in to Netscape Communicator, or Activerse’s Ding! (www.activerse.com; free).

51 Smile for the camera. You work at home and your colleagues work in an office, so you see each other only when you travel, right? Wrong–if you start using a Net conferencing program. Just attach a small video camera to your monitor, load the software, and you’ll be able to meet with clients all over the world. One to try: Connectix QuickCam VC (800-9505880, www.connectix.com; $129).

52 Collaborate in cyberspace. If video conferencing seems too involved and instant messaging not powerful enough, try an Internet collaboration tool instead. Microsoft NetMeeting arrives preinstalled on many Windows 98 systems, or can be downloaded as part of or in addition to IE 4. With Net-Meeting, you can gather together groups of people to chat, share files and applications, draw on a digital whiteboard, and even transmit audio and video.

53 Speed up file exchanqes. Mac users should try a compression utility like Stuffit Deluxe 4.5 (800-656-5443, www.aladdinsys.com; $80) to shrink large files down to size before sending them in an e-mail, and combine groups of small files for easy transmission.

These 53 tips will hopefully help you turn into a tech savvy person with knowledge!

How to hide your online status on Facebook

One thing great about Facebook can sometimes be the bane of Facebook. When you are connected online, you are put into direct access of all who know you or have known or might want to know you better. Facebook has this great feature of showing when you are online. So if a friend, colleague, or online virtual realm companion is on at the same time, they can instant message you in the Facebook world. This instant message is immediate and pops up letting you know that Peek-A-Boo, they can see you and wants to talk or say hello. This is great, right? Right?

The drawback to all this wonderful attention is when you might want to be left alone. You could be painstakingly attempting to properly categorize each of your Facebook friends into some type of group or sub-group. Better yet, you are probably busily concentrating your cranial efforts on one of many Facebook Online games such as Kidnap, Who’s Got the Biggest Brain, Geo-Challenge, Word Challenge, and Super Sudoku. Perhaps, you are engaged in other conversations in the ubiquitous world of YoVille. Whatever the reason, you may want the fact that you are online to be unknown to others.

Fortunately, like most things, Facebook makes this easy.

On the bottom right hand corner of your Facebook interface, there are several items of note. There is a list of people who are now currently on-line at the same time as you or who were recently online. To the right of that is a list of notifications that will detail many different nuances that have happened while you were gone or even while you were there. These notifications are fun to browse through so it’s worth taking some time to go through the long list. Most folks only look at their requests and they are missing this great list. To the right of the notifications, is an icon that looks like the top of a shooting target. It will have either a green dot next to it, or a red dot. The green dot indicates that you are online and visible by everyone of your friends who is also on-line. The red dot indicates that you are offline. If you are green and you would like to be offline, click on this area and it will indicate that ‘You are Online’ and next to this text is a link that says ‘Go Offline’.

Click on this and the fact that you are online is no longer something privy to those around you. So enjoy that online game, wander aimlessly in your virtual world, or catch up on that friend categorization. Once you want to go back, just click on this area again where it will now say that ‘You are Offline’ followed by a link that says ‘Go Online’. You know what to do.

One item of note is that if you take yourself Offline, you won’t be able to see others who are Online. What is fair is fair but is in contrast to other online status icons such as those found in Yahoo and MySpace.

Hide The IP Address – Change Your IP To Surf Anonymously And Protect Yourself

Before I became familiar with basic computer concepts, I came across the question on why I need to hide my IP address. I researched a bit about the IP address and it turns out that this particular data is a very important to identify my computer in relation to internet transactions. The IP address is used to locate every connected device online. The data is used by internet service providers or ISPs so that they can control the services they offer to their clients. Webmasters can also access the same information so that they can determine the location of their visitors for research purposes.

But I also found startling information that pushed me to look for ways to hide my IP address. The IP or Internet Protocol can also be used by hackers to remotely monitor others even without notification. This means hackers can take a look at my financial transactions online and even get inside my hard drive and steal other important information. I have to hide my IP address or else my credit card number and other personal information is stolen.

Options to Hide the IP Address

I found two methods that can help to hide this very sensitive information from hackers: the first method is to use proxy websites. Using this online tool is very simple since I just need to place the URL of the website I want to visit in their interface. The internet protocol in the computer is replaced with a dummy data so that hackers will not know that I am online.

Unfortunately, using proxy websites have a lot of disadvantages. It cannot support Flash (video streaming) and website loading is very slow because there are too many people sharing the same dummy data. I can surf anonymously but the experience is disappointing.

The second option to surf anonymously is to use an application that can hide the IP address even before the browser is opened. These applications run in the background without any form of intrusion. This means I can surf online and visit any website I want without any lag but with added security.

If you are constantly online or you own a business that actively uses the internet for business purposes, use tools that will protect your internet protocol. This is a must since a single attack could result to long term damage to your personal information. Repairing and restoring your personal data is possible but it could take years and will require funds. Better protect your data now rather than suffer serious financial consequences.