blogger Indonesia

Follow judhyns blog

How to make a computer faster: 6 ways to speed up your PC

By following a few simple guidelines, you can maintain your computer, help increase your PC speed, and help keep it running smoothly. This article discusses how to use the tools available in Windows 7, Windows Vista, and Windows XP Service Pack 3 to help make your computer faster, maintain your computer efficiently, and help safeguard your privacy when you're online.
Note: Some of the tools mentioned in this article require you to be logged on as an administrator. If you aren't logged on as an administrator, you can only change settings that apply to your user account.

1. Remove spyware, and help protect your computer from viruses

Spyware collects personal information without letting you know and without asking for permission. From the websites you visit to user names and passwords, spyware can put you and your confidential information at risk. In addition to privacy concerns, spyware can hamper your computer's performance. To combat spyware, you might want to consider using the PC safety scan from Windows Live OneCare. This scan is a free service that helps check for and remove viruses.
Download Microsoft Security Essentials for free to help guard your system in the future from viruses, spyware, adware, and other malicious software (also known as malware). Microsoft Security Essentials acts as a spyware removal tool and includes automatic updates to help keep your system protected from emerging threats.
The Microsoft Windows Malicious Software Removal Tool is another utility that checks computers running Windows 7, Windows Vista, Windows XP, Windows 2000, and Windows Server 2003 for infections by specific, prevalent malicious software, including Blaster, Sasser, and Mydoom, and helps remove any infection found.

2. Free up disk space

The Disk Cleanup tool helps you to free up space on your hard disk to improve the performance of your computer. The tool identifies files that you can safely delete and then enables you to choose whether you want to delete some or all of the identified files.
Use Disk Cleanup to:
  • Remove temporary Internet files.
  • Delete downloaded program files, such as Microsoft ActiveX controls and Java applets.
  • Empty the Recycle Bin.
  • Remove Windows temporary files, such as error reports.
  • Delete optional Windows components that you don't use.
  • Delete installed programs that you no longer use.
  • Remove unused restore points and shadow copies from System Restore.
Tip: Typically, temporary Internet files take the most amount of space because the browser caches each page you visit for faster access later.
To use Disk Cleanup:

3. Speed up access to data

Disk fragmentation slows the overall performance of your system. When files are fragmented, the computer must search the hard disk as a file is opened (to piece it back together). The response time can be significantly longer.
Disk Defragmenter (sometimes shortened to Defrag by users) is a Windows utility that consolidates fragmented files and folders on your computer's hard disk so that each occupies a single space on the disk. With your files stored neatly end to end, without fragmentation, reading and writing to the disk speeds up.
When to run Disk Defragmenter
In addition to running Disk Defragmenter at regular intervals (weekly is optimal), there are other times you should run it, too, such as when:
  • You add a large number of files.
  • Your free disk space totals 15 percent or less.
  • You install new programs or a new version of the Windows operating system.
To use Disk Defragmenter:
Running Disk Cleanup and Disk Defragmenter on a regular basis is a proven way to help keep your computer running quickly and efficiently. If you'd like to learn how to schedule these tools and others to run automatically, please read Speed up your PC: Automate your computer maintenance schedule.

4. Detect and repair disk errors

In addition to running Disk Cleanup and Disk Defragmenter to optimize the performance of your computer, you can check the integrity of the files stored on your hard disk by running the Error Checking utility.
As you use your hard drive, it can develop bad sectors. Bad sectors slow down hard disk performance and sometimes make data writing (such as file saving) difficult or even impossible. The Error Checking utility scans the hard drive for bad sectors and scans for file system errors to see whether certain files or folders are misplaced.
If you use your computer daily, you should run this utility once a week to help prevent data loss.

5. Learn about ReadyBoost

If you're using Windows 7 or Windows Vista, you can use ReadyBoost to speed up your system. A new concept in adding memory to a system, it allows you to use non-volatile flash memory—like a USB flash drive or a memory card—to improve performance without having to add additional memory.

6.  Upgrade  to  Windows 7

If you try all the previous remedies and your computer still isn't as fast as you would like it to be, you may want to consider updating to Windows 7.
If the Windows 7 Upgrade Advisor determines that your computer can't run Windows 7 and you still have the need for speed, it might be time for a new computer. There are some great deals on new computers right now:

General Computer Maintenance Tips

  • Keep all of your working files in one folder. The My Documents folder is offered by Windows expressly for this purpose. The benefits of keeping all your files in one place are multiple. One, you know where all your files are, two, it's easy to back them all up at once, and three, your machine will run faster.
  • Don't put your personal files on the root of the C: drive. If you store a large number of files in the root folder, you could corrupt your disk file table which could lead to a "NTLDR is missing" error message when you boot the computer. Very bad. If you have personal files on the C: drive now, move them to the My Documents folder.
  • Uninstall programs that you are not using. But don’t just delete the program. Remove it correctly so you won’t cause Windows errors. Go to Start, Control Panel, Add or Remove Programs. Find the program you want to remove in the list, and click the Remove button.
  • If you download a zip file and expand it, delete the original zip file when you are done.
  • Store your hardware drivers and purchased software installer files off your hard drive. A flash drive works great for this purpose.
  • If you aren’t already using one, get a good surge protector and plug your computer and peripherals into it. If you live in an area with bad lightening storms, unplug you computer and peripherals during the storm.
  • Practice safe computing. Don't accept software or downloads for which you didn’t ask. Delete any suspicious email without opening it. And even if the email came from your best friend, don't open any email attachments with the following extensions: * .exe, .com, .vbs, .bat, .mdb, .reg, and .js

Scheduled Computer Maintenance Tips:

Daily computer maintenance tips
  • Update your anti-virus scan and anti-spyware definitions, if they aren’t being done automatically.
  • Back up any critical files that you have changed today to your flash drive.
Weekly computer maintenance tips:
  • Make sure your anti-virus and anti-spyware programs have been updated with the latest definitions, and run a full scan from both programs.
  • Reboot your computer. (If you shutdown your computer each night, disregard this tip). If you leave your computer on all the time, definitely do this. It will reset the RAM, and your computer will run much better and faster.
Monthly computer maintenance tips:
  • Clean up your temp files, your temporary internet files, and other junk files about once a month. To do this easily, you can either download my favorite program for cleaning, CCleaner or run the built-in Windows Disk Cleanup tool.
  • Ensure you have the latest Windows updates installed. Go to Internet Explorer, Tools, Windows Update. Click on the Custom button. (I always use the Custom button so I can check what’s going to be installed before it gets installed). Windows update may ask you to download and install the latest version of itself. Go ahead and do that, then click Close when it’s finished, and then Continue. It will then check again for real updates and offer those. Choose which updates you want to install. Uncheck the ones you don’t want to install.
  • Clean out your email, paying special attention to your Inbox and Sent box. The easiest way I’ve found is to sort your email box by size of the message, and delete the largest unneeded emails first.


Quarterly computer maintenance tips:
  • Change your passwords. (Yes, I know this is a pain, I hear you groaning. But it’s really a good idea to do this).
  • If you have a mouse with a roller ball (non-optical) clean it out. Use a Q-tip and some isopropyl alcohol to clean the ball and the internal rollers. Remove any caked on grease, oil, and dust that may have accumulated.
  • Check to see if you need to defragment your computer’s hard drive. To do this in Windows XP, go to Start, All Programs, Accessories, Systems Tools, Disk Defragmenter. Run an analysis first by clicking the Analyze button. Go do something else while it runs. Windows will tell you if it needs to be defragmented. If it does, click on the Defragment button, and again go do something else while your computer runs this.For Windows Vista, this computer maintenance tip is a little different: Go to Start, All Programs, and click on Accessories. Find Systems Tools, Disk Defragmenter and click on it. Vista will ask you for permission to continue. Click Continue. Vista doesn't give you the ability to choose to defragment, it just assumes you want to and presents a schedule to do so. You can stick with the suggested schedule, or modify it. If you want to kick off the defrag process immediately, click the Defragment Now button. It will then ask you which drive you want to defrag. Uncheck the drives you don't want to defrag, and then click OK.
  • Check all your computer cables and make sure they are plugged in tight, and not being pinched or pulled in a way that is damaging them.
  • Check your C: drive (hard disk) for disk errors. NOTE: please make sure you have a current backup of your files before you run a check disk command. (Also, do this immediately if you see a message stating that your Windows “volume is dirty”). To run a check disk manually on your C: drive, do this:
    1. Click Start, select Run.
    2. In the box, type cmd and click Ok. In the black DOS window, type: chkdsk c: /f (The /f command automatically fixes any errors encountered.
    3. Go to Start, Shutdown, and restart the computer. When the computer restarts, it will run chkdsk automatically. The Check Disk process could take over an hour, so schedule this when you have something else non-computer related to do. On rebooting the PC, you will see a window that shows the progress of the disk check. When it's finished,, it will boot back to the normal version of Windows.
Disclaimer included below. Opening your computer case could void your warranty, and expose you to possible electric shock. Please be careful.
6 month computer maintenance tips:
  • Go on dust patrol. FIRST, TURN OFF and UNPLUG your computer from the electrical socket. Blow out your keyboard with a compressed air can, and then turn it over and tap it with your hand a few times to shake out any other junk. Brush off the dust bunnies from your PC fan (and any other parts in the back of the PC). Also, open the computer case and GENTLY blow or vacuum out any dust in there, especially around the CPU chip (the big square chip on the mother board). MAKE SURE you touch something metal to ground yourself before you open the case and reach in there. Even the slightest static electricity zap can ruin a computer chip. This step is especially important if you live in a dusty place like Wyoming.
Annual computer maintenance tips:
  • Check to see if you have the latest hardware drivers loaded for your printer, monitor and other peripherals.
I hope these computer maintenance tips help your computer run better and faster.

Protect Your Computer From Hackers


What is a Hacker?
A Hacker is a computer expert who spends their time trying to find ways to break into other computer systems and/or computer software. They also try to find ways to make software act in ways it was not meant to do. The Hackers motives are usually to see if they can get into the system or not. For the most part, these Hackers are only a minor nuisance and don't cause too much trouble.

What is a Cracker?
A Cracker or Criminal Hacker is the same thing as a Hacker except that their motives are different than a Hackers motives. A Cracker breaks into a system or software for Criminal purposes. They may wish to steal something and / or they may wish to disrupt the system that they are in. Crackers are far worse than the regular Hacker.

Hackers and Crackers are a real problem in today's high tech society. If you don't take some steps to protect yourself from them, it will only be a matter of time until they cause you some trouble. Here are a few steps you can take to help protect you from Hackers and Crackers.

  1. Firewall: If you are using DSL or Cable then a firewall is a must. With DSL and Cable, your internet is on all the time. The Hackers run programs looking for computers connected to the internet by their IP address. Once found the evil hackers then try to find a way to break into your system. One of the things that the Firewall does is to mask your computer so that the Hacker's probe comes up negative. If you have Windows XP then you should activate the already included Firewall Program. If you don't have Windows XP then you can use a program similar to Zone Alarm.
  2. Anti Virus Software:
    1. Regular Anti Virus - Make sure you get yourself a good general purpose anti virus software and set it to automatically run every week. Keep your virus definitions up to date so it can always catch the newest viruses.
    2. Trojans: A Trojan virus is a program that installs other software on your system. They can also give the hacker other means to enter your system and do just about anything. Your general purpose aniti virus software will get some of these and some of them will need special anti Trojan software to get rid of them.
    3. Spyware: This little buggers are really common and easy to get infected with. Spyware is software that gets installed onto your computer without your knowledge or consent. Some are used for tracking and some are used to influence search results or cause all sorts of popups. If you have a lot of spyware on your system, it will start to slow down. The thing about spyware is that your regular anti virus software will NOT get them. I use FOUR different spyware programs to get rid of them all. It seems that NO one spyware removal software can get them all.
  3. Secure Passwords: Any passwords you need to use in relation to your System should be secure passwords. They should be at least eight to ten characters long with a combination letters and numbers with at least one special character. Don't use your name, god, your children's names or you pet's name.
  4. Careful with Emails: Many hackers send Virus's and Spyware in email attachments. Never open an email attachment from a stranger. Never open an email attachment that is an executable program unless you really trust the source. Sometimes hackers will send virus's through infected computers so you feel safe opening the attachment. Make sure you anti virus software also scans your incoming emails.
  5. Latest Patches for Your Operating System: Keep your operating system updated with the latest patches. Hackers are always looking for ways to exploit main stream operating system software. As soon as the manufacturer finds out about it, they release a fix or patch. If you don't update your system with these fixes, you could be vulnerable to hackers.
  6. Keep away from Cracked Software: You should keep away from cracked software for more than just the criminal or moral reasons. Crackers or Criminal Hackers obviously can't be trusted. They have been known to put Trojans and other malicious code into the cracked software. You think you are getting your software for free when you may be letting a hacker into your system. Be smart and pay for all your software.
  7. Test Computers Security: I found a website that will test your computer security for FREE. It's called Shields Up. It will test your internet connection, probe your ports and give you a report. It will give you an idea on how secure your connection is.
  8. Backup Sensitive Material: Regular backups of sensitive or important material should be part of your routine. If you have files, documents or photos on your system that you can't loose, then back them up. Save a copy to another computer or even better a CD / DVD.
By following some or all of the above steps, you can better protect yourself from Hackers and Crackers.

Five Best Malware Removal Tools


The internet—unfortunately—isn't a never-ending buffet of secure open-source software and Bollywood-style musicals starring LOLCats. There are people and organizations that delight in stealing your personal data, hijacking your computer, and making a general nuisance of themselves through malicious software. This week we're highlighting the top five tools for removing software with ill-intentions from you PC.

Spybot Search & Destroy (Windows, Freeware)

Spybot Search & Destroy has made quite a name for itself over the years, earning accolades from both general and computer-focused publications. Spybot Search & Destroy is the highest ranked freeware tool at 2Spyware.com, a website that ranks malware removal tools. In addition to scanning for malware, Spybot Search & Destroy also has a variety of additional functionality, including a botnet scanner, hosts-file modification (to keep malware from calling home), a secure file shredder, and a dummy code feature (it replaces malicious or questionable adware modules with inert code so the dependent program will keep functioning). As an added bonus Spybot Search & Destroy is compatible with every version of Windows dating back to Windows 95.

SUPERAntiSpyware (Windows, $30)

SUPERAntiSpyware is available as both a freeware and premium edition like Malwarebytes' Anti-Malware (see below), but the level of restrictions on the freeware edition are considerably higher. The free version is limited to basic on-demand scanning and malware removal. The premium version includes real-time scanning, registry protection, a scheduling service, auto-scan on startup, and 50 startup diagnostics to stop malware infections before they spread. One of SUPERAntiSpyware's strongest selling points is its high level of compatibility with other protection tools like Avira, Kaspersky, Symantec, and McAfee. In most cases it can be run along side other tools without any conflict.

ComboFix (Windows, Freeware)

ComboFix is just as spartan as the screenshot here makes it look. You download ComboFix, run it, and it takes care of the rest. The basic ComboFix process looks like this: It backs up your registry, checks to see if you have Windows Recovery Console installed, and then it goes to town on your system scanning away through 40+ stages. When it's done, ComboFix spits out a log file and lists all the malware it found, which ones it was able to remove, and which ones you'll have to use your Google-fu to look up how to remove manually. It isn't fancy, but it gets the job done and gives you a detailed report at the end to take to security forums for help if you need it.

Malwarebytes' Anti-Malware (Windows, $25)

Malwarebytes' flagship application Anti-Malware is a shareware malware-removal tool. The principle difference between the free and premium version of the application is real-time monitoring. If you don't need active scanning against threats, the free version uses the same database and does an admirable job ferreting out infections. Anti-Malware was, for example, one of the few malware removal tools that could detect and remove the Antivirus XP 2008, a spyware application that masqueraded as an antivirus app. The Anti-Malware installation includes another application from Malwarebytes called FileASSASSIN—a helpful tool for deleting files locked by Windows.

HijackThis (Windows, Freeware)

HijackThis stands alone in this Hive Five as being the least automated yet most likely to completely wreck your system if used incorrectly. HijackThis does a comprehensive scan of the state of your computer and reports back an enormous log file. The tool makes no judgement on whether or not an application, browser modification, or registry entry is malicious or not. It simply generates a list of things that could have been potentially altered or tampered with by spyware, malware, or other malicious programs. Advanced users can look over the log themselves and determine what needs to be pruned. If you're not comfortable doing that, your best bet is to take the log file to a popular security forum like BleepingComputer or SpywareInfoForum and ask their armies of knowledgeable volunteer malware slayers to comb over it for you. Alternately, while not a replacement for receiving expert help from people in the forums, HijackThis.de is a web-based HijackThis log reader which is updated nightly. You upload your log file, it scans the file for relevant entries and gives you links to articles on how to remove the malware found in the log.

Now that you've had a chance to look over the contenders for top malware killer, it's time to cast your vote and see who goes home with the crown. A note about the poll: the option for "Other" is missing from this week's poll. We understand that the best way to get rid of malware is to hit it with multiple tools until the infestation is good and dead, but we'd like you to cast your vote based on the best possible (single) tool for the job, not on the scorched earth policy of using them all. If you have an Other vote for a completely different malware-removal tool, we're happy to hear it in the comments.
This week's honorable mention goes to "Reformat" (as in your hard drive) as a last-ditch, foolproof solution to your malware problems. Apparently sometimes when you find a mouse in the kitchen the only way to be sure there aren't any more of them in the walls is to burn the whole house down. Have a malware horror story, a favorite tool, or a prevention tip you want to share? Sound off in the comments below.

How to Rescue Files Deleted by a Virus Scan

During the course of an anti-virus sweep, the anti-virus software will occasionally delete an application or system object that it suspects is malicious. Virus-prevention software is not perfect, and security software might determine that a piece of software is harmful or corrupt, even when it is not. The security software will then remove the suspected object. The reason behind this is that it is better to be safe than to be sorry. If you have lost a file or application you need during a virus scan, don't worry. There are several ways of restoring deleted files.

undefined.
Be Watchful During a Scan
The best method for restoring deleted files is to never delete them in the first place. Usually, your software will prompt you to specify how it should deal with possible infections. You will have the option to delete the suspected object, quarantine it or entirely remove it from the system.
Whenever you are prompted, check to see what the object in question is. It could be software you recognize as being safe. Even if you do not recognize the name, it is always better to put it into quarantine rather than remove it entirely. It will no longer be associated with anything, and will therefore be unable to harm your system if it is dangerous. Later, if you find something missing, you can check the quarantine folder.

Search for the Object
Sometimes the answer to restoring deleted files is simpler than you might expect. If the file has not been thoroughly removed, it might appear when you perform a basic search. Every Windows operating system has a search feature built into it. If you know the name of the object you are looking for, try typing it into the search box located on your computer. You might be surprised to discover that it is not gone entirely, but only moved from its previous location.
Check the Quarantine
Anti-virus software doesn't usually fully delete anything without authorization. Even if it says it has removed a threat, this often means that it has removed the threat from the stream of system operations. When restoring deleted files, the quarantine is the most likely place to find missing files.
Every anti-virus application will handle this differently. Many of the best anti-virus software applications simply have a folder named quarantine that you can accessed directly. Others give the quarantine folder a different name, and you must go through the steps required by your protection software to access files within that folder. Consult your software manufacturer about restoring deleted files or for quarantine information to determine its particular method.

Use Data-recovery Software
Data is almost never fully lost on a computer. It can be overwritten, but even then, it has not been destroyed. If none of the previous steps have helped in restoring deleted files, then you will need to dig a little deeper. A number of excellent file-recovery software applications can perform a deep scan on your computer to help you with restoring deleted files. Digital Rescue Premium, Advanced Disk Recovery and Recover My Files are all highly recommended. They are powerful scanners that allow you to find deleted objects and restore them within the software interface.

Consult a Professional
Many tech professionals can comb through your computer using a variety of techniques. Restoring deleted files is a large part of what they do with their time. They are specially licensed for data retrieval and employ advanced hardware and software techniques. This should be your last resort because it will be expensive. Expect to pay a minimum of $99. Check your phone book for data-recovery specialists, and then research the business as much as you can before you entrust them with your computer. Also look for those that guarantee recovery.
When it comes to restoring deleted files, the paramount thing to remember is to not panic. There are numerous failsafes in place to protect your data from accidental deletion. If you follow the steps above, you can be almost certain that your lost material will be recovered.
At TopTenREVIEWS We Do the Research So You Don’t Have To.™

Why Buy Antivirus Software?


Today, an unprotected computer isn’t just vulnerable, it’s probably already infected. New viruses, spyware, trojans, worms, and other malware are created every day. New threats are disguised to bypass other security measures, and specifically designed to catch you and your PC off guard.
The virus landscape has also changed; viruses that used to be annoying pranks have evolved into pernicious threats capable of not only destroying your computer, but stealing your information and identity.
The benefits of installing a basic security solution on your PC are obvious, but the cost in system slowdown used to make it tough to bear. Luckily, modern antivirus software haven’t just improved their level of protection, they’ve significantly improved resource efficiency and overall speed. You can have ultimate protection without giving up your resources. With advanced technologies and straightforward usability, antivirus software is more effective than ever, and doesn’t require constant maintenance from you. Say goodbye to annoying security warnings and noticeable slowdown; current antivirus programs deliver constant protection and can actually speed up your computer.
The last generation of antivirus software brought advanced heuristic detection into the mix. Continuing to improve, the current lineup of antivirus products often incorporate further developed proactive protection with better behavior checking and even file reputation analysis. Several of the software incorporate ‘in the cloud’ security and other advanced technologies to increase safety and convenience. From gamer modes, to battery saving settings, to integrated web link scanners; antivirus applications are more versatile and have upped the ante for features and functionality.
On this site you’ll find a side-by-side comparison of the best antivirus software, helpful articles on computer security, security tips and tricks, buying guides, videos, and comprehensive reviews to help you make an informed decision on which security software is right for you.
At TopTenREVIEWS We Do the Research So You Don’t Have To.™

Antivirus Software: What to Look For

All security software is not created equal. Like all consumer products, antivirus software has the good, the bad, and the mediocre. The choices for antivirus protection are many and varied. Although we haven’t reviewed each and every product available, we feature the absolute best antivirus software available today from a number of providers (including big-hitters, lesser-knowns, and new-comers), and compare them so you can match your needs with the right software.
Remember when it really comes down to it, effectiveness and usability can either make or break antivirus software. Security programs are only as good as their level of protection, and if you can’t figure out how to use it, you won’t. Our top-ranked antivirus software combine optimal security with user-friendly features and tools.
Below are the criteria TopTenREVIEWS uses to evaluate and compare antivirus software:
Scope of Protection
While most security solutions tout “multi-layered” protection, “360 degree” defense and/or even “100%” security, some are certainly more thorough than others. The best antivirus solutions will include traditional protection from viruses, worms, Trojans and spyware, but should also include defense from keyloggers, phishing scams, email-borne threats and rootkits. While antivirus programs are by no means full-blown internet security suites, they should protect from as many threats on as many fronts as they can.
Effectiveness
Antivirus is specifically designed to protect your computer, so if it doesn’t do that well, what good is it? All the features, bells and whistles, or sleek interface can’t make up for poor performance. We look at results from the industry-standard security software testers and professional security organizations to find the most effective software available and evaluate overall effectiveness. In general, our highest ranked programs are also the most effective.
Ease of Installation and Setup
Security software shouldn’t be a chore to install, and should have you protected as soon as possible. From download to install, to the first scan; implementing antivirus software should be quick and easy.
Ease of Use
Antivirus software is complex stuff, but shouldn’t require a degree in computer security. The best security programs have all the features security experts want, but are just as easily used by a beginner. Everyday computer users want a security solution that they can install and forget about; software that doesn’t require constant maintenance or have annoying interruptions. The best antivirus software is flexible enough to do exactly what you want to (even if that means running by itself).
Features
A well-rounded feature set takes a security solution from good to great. More than bells and whistles, added features provide security, usability and performance benefits.
Updates
Security software is only as good as its latest update. Viruses are being identified and added to signature databases all the time, so it’s important that your virus definition list updates accordingly. Modern antivirus software are equipped with automatic updates that perform regularly enough that you get faster updates that don’t slow down your system. The best security providers even “push” updates to you as soon as they’re available.
Help & Support
The best software doesn’t require reading an in-depth manual to use, but still has one available. For specific questions, troubleshooting, and additional help, the best antivirus manufacturers provide superior product support online and off. Additional support for software may come in the form of assistance over the phone, email, live chat, or through a number of additional resources (knowledgebase, FAQs, tutorials).
A well-balanced antivirus solution is effective, efficient, and easy to use. Combining all the right features with a usable interface; our top antivirus software choices deliver the best security and usability without a serious investment in time, money, or system resources.

Best Speaker For Computer

After the input stage, the left and right signals are passed to a two-stage parametric EQ built around U3-B (for left) and U3-C (for right). Each parametric EQ uses an op-amp gyrator to simulate an inductor in an LC-series resonant circuit. The series circuit has two access points for either attenuation or boost, and the access points are realized by two different capacitors. C105 and C106, for example, are the boost and attenuation points for the first parametric EQ band for the left channel. If only C106 is used (and C105 is not stuffed), the resonant circuit forms a voltage-divider in combination with the series resistor R105 (10kΩ), and the resonant frequency is attenuated. Conversely, if only C105 is used, the feedback is reduced, resulting in a boost at the resonant frequency. If neither of the capacitors is used, then the band is disabled.

The resonant frequency, f0, can be calculated using the equation:
f0 = 1/(2 × π × √(L0 × C0))
Where:
L0 = R108 × C107 × R107
C0 = C105
And the Q is:
Q0 = √(L0/(C0 × R0²))
A third EQ band is added that realizes a shelving filter and only needs an RC: one capacitor (C113 for boost; C114 for attenuation) and one resistor (R111).

As a stereo Class D IC, the MAX9736 also features two integrated op amps at the input. Available to use for general filtering, in this reference design those op amps are used to build a second-order highpass filter for the left/right channels. The op amps have their negative inputs and outputs accessible, so a multiple-feedback inverting filter configuration is used. C116/C216 are for blocking the DC-input voltage to reduce output offset.

Power Stage

The design features three channels of speaker power amplification. A MAX9736B is configured in stereo mode to drive the left and right speakers, and can provide 2 × 11W into 4Ω. For the third channel, a MAX9736A is configured as a mono subwoofer amplifier.

In mono mode, the two Class D outputs of the MAX9736A are connected in parallel to allow for higher output power. In mono mode the subwoofer channel can deliver 30W into 4Ω (VDD = 19V). The input stage for the subwoofer channel is the same as that used for the left and right channels. After the input stage, the left and right signals are then summed using U5-B to create the mono subwoofer channel. R303 is used to set the subwoofer channel gain at the summing amp.

To enable a maximally flat response down to very low frequencies, the system is configured with a sixth-order filtered alignment for the subwoofer. This approach means that the fourth-order highpass response of the vented speaker is supplemented with a second-order electrical highpass in the active circuitry. U5-C is used to realize the noninverting Sallen-Key, second-order highpass filter for the subwoofer.

This system requires a high Q, which leads to 13dB of boost at 40Hz. To avoid overloading the speaker and amplifier, the Sallen-Key filter is set up to act as a sliding highpass; the filter acts dynamically as the amplifier output reaches its limit. The value of input resistor R305 is designed to reduce automatically (using the opto-coupled FET, U7) to a value so that the filter Q is lowered to 0.5, resulting in no boost at all.

The peak output voltage of the subwoofer amplifier, U2, controls the signal to the opto-FET. D6 and C16 form a peak detector, which senses the output peak level with a fast attack time. The operating threshold for the peak detector can be adjustable or fixed, depending on whether R7 is stuffed or R8/R9 are stuffed. The LED D5 turns on when this control circuit is active.


Figure 2. Simulation results of the dynamic bass boost from the subwoofer channel. The Q of the highpass filter is reduced while the cutoff frequency is also increased, as the subwoofer level approaches its limit.

The two op amps built into the MAX9736A are configured into a fourth-order lowpass subwoofer filter that complements the highpass filter used for the left/right channels.

J1 is the power-supply input connector chosen to be a standard laptop-type coaxial socket. A typical laptop power supply has an average output voltage of around 19V and serves as a good power source for the docking system. After some filtering through C1 and C2, the voltage is labeled PVDD and D1 is set to light blue when power is attached.

A simple reset circuit (through U6) is used to create a mute signal on power-up and power-down for both amplifier chips. This step avoids output transient noises due to input circuitry settling. The mute control threshold is programmed to approximately 10V with the R3 and R4 resistor-divider.

The MAX9736 features a filter-less modulation method which eliminates the need for bulky inductor-based filters. Only simple ferrite beads (L100 to L301) are required at the output.

Speakers and Physical Enclosure

The loudspeaker used for the subwoofer is a 5in-diameter model from Tymphany, part 830945, with a 4Ω nominal impedance and a resonance frequency of 47.4Hz. The 2in loudspeakers used for the left and right channels are model 830970, also from Tymphany. These loudspeakers have 4Ω nominal impedance and a resonance frequency of 147.5Hz.

A low f3 of 35Hz is targeted for the acoustic system, so a sixth-order alignment is used. That alignment includes a second-order highpass filter within the active crossover. The overall system is housed in a single box enclosure with the three loudspeakers, tuned port, and circuit PCB. The subwoofer is mounted as down-firing to minimize the box size and to help increase efficiency by compression loading. The resulting box volume is approximately 3.79l and the vented port is tuned to 54Hz. The outside overall box dimensions are approximately 355mm x 180mm x 120mm. The speaker crossover equalization is designed as a fourth-order Linkwitz-Riley at 250Hz; the speaker equalization for the satellites consists of a parametric EQ with f = 500Hz, gain = +6dB, Q = 0.5, and a shelving filter with f3 = 3.8kHz and a gain of +5.8dB. Figure 3 shows the system's response.


Figure 3. Total system simulated response shows maximally flat down to 40Hz.

The mechanical drawings included in this document are copies of those used to construct the prototype model. The prototype was built using 1/4in clear acrylic plastic and assembled with drilled/tapped screws and acrylic adhesive. A consumer product version might be constructed using a more cost-effective material such as wood, MDF, ABS, etc.

Computer Hacking


Ever since the movie Sneakers, I have been fascinated by computer hacking. I love the idea of being able to break into a system, steel file information, and cover up my tracks flawlessly. I suppose that it is a pretty classic fantasy, but with a new twist. Everyone dreams of being a ninja of some sort. The difference is that a computer hacker unlike, say, a spy, ninja, terrorist, or some other romantic figure, gets to rely totally on his mental skills. Computer hacking doesn't require you to fire guns, out run your adversaries, or purchased complex espionage equipment. A computer hacker can rely totally on his wits and his computer system.

Of course, my aspiration to have a career as a computer hacker met up with reality sometime in my late teens. I realized that computer hacking didn't have a lot of realistic possibilities unless I wanted to spend my entire life on the run or move to Russia. I needed to think of some more constructive way to indulge my penchant for breaking into high-tech systems.

I decided to take a cue from Sneakers and become a computer security expert. The main characters who go around hacking computers to test out company security in the movie are actually part of a real profession. Many former computer hacking experts go into security as a way to get legitimate. By becoming anti-hackers, they can stay out of trouble while still doing what they love – investigating security loopholes and systems. Granted, it is not as glamorous, but it is every bit as intellectually rewarding and challenging. Computer network security is a constantly expanding field, filled with new challenges on a daily basis. Good computer hackers never run out of work, and they make a mint doing their job.

Once I got into computer hacking, I found out that things were even better than I expected. I got to spend a lot of my time actually trying to hack computers for corporations. Sometimes, an assignment would just require me to spend hours trying to investigate and exploit potential security vulnerabilities. I would actually be paid to be a hacker! The only stipulation, of course, was that I would have to clean up the security hole afterwards. That was something I was happy to do.

Years later, I'm glad I got into network security instead of computer hacking. Many of my friends are facing criminal charges from hack jobs they pulled off for fun, while I'm doing well. I still get to try to detect vulnerable passwords, break into locked systems, and do all that other stuff, but now I do it for a living instead of as a dangerous hobby. I think this is a much better choice.

Wireless Internet Service

As someone who works on the go, I find wireless Internet service to be a necessity. Wireless Internet for laptops allows me to go to my favorite coffee shop, meet with clients, and be able to access web-based reports and charts anytime I need to. This is no small convenience considering how wired our company is right now.

I live in Portland Oregon, which is a pretty wired town. There are wireless Internet services in many of the major cafés, and most of the downtown is within easy reach of a node. This is a great luxury, but it isn't common to all of my clients. No matter how popular wireless Internet service becomes, it still has failed to provide free access for everyone. Many nodes are password protected, and many areas of the city fall outside of free wireless networks.

Interestingly enough, the business I work in has to pay for its own wireless Internet service. It is on the edge of downtown, so you would think that the city's free WiFi services would cover it, but this just isn't the case. The problem is that buildings can still disrupt wireless transmitters. A lot of the reception is blotchy, and moving 10 feet in one direction or another can disrupt or improve your services.

This is a big reason why, if you need dependable wireless Internet service, you should buy it yourself. If you only need to occasionally check e-mail, you can probably sniff wireless routers in your neighborhood. If you need uninterrupted connectivity, however, there is no substitute for dedicated Internet service.

If you setup your own wireless Internet service for your business, however, you face some difficult decisions. One of the most difficult ones is whether or not to make it secure and how best to secure it. It may seem obvious to many old-fashioned business types to not allow access to wireless Internet services, but you'd be surprised how many businesses do nowadays. The philosophy is, if you aren't using up all your bandwidth you should allow other people to have access to it too. That way, they will let you have access to their bandwidth, and everyone will be able to connect all over town.

The problems with this philosophy are obvious. Unsecured wireless Internet service is a liability to say the least. It is easy for anyone passing by to spy on traffic, potentially learning business trade secrets. Needless to say, you should make sure to have a top-of-the-line security expert configure your network.

Folow me on

Popular Posts

feed

PR Check

activesearchresults

judhyn's blog

 

http://www.judhyn.blogspot.com | |