Apple MacBook Pro Spring 2010 (Core i7 2.66GHz, 4GB RAM, 500GB HDD, 15-inch)
Apple's 15-inch MacBook Pro keeps the same look and feel, but offers major internal changes, including an optional Intel Core i7 CPU, making it a very serious portable powerhouse.
Price: $2,053.19 - $2,199.00 (check prices)
Gateway NV7915u Editors' Choice - Gateway NV7915u
The Gateway NV7915u is a well-rounded, well-designed desktop replacement that
delivers mainstream performance at a budget price.
Sony Vaio Z series VPC-Z116GX/S
Sony's top-of-the-line 13-inch Vaio VPCZ116GX/S has a speedy Core i5 CPU, discrete graphics, a huge 256GB SSD, and a sky-high price to match.
Price: $2,264.99 (check prices)
Asus Eee PC 1005PR
A rare 10-inch system with an HD display, the Eee PC 1005PR also adds HD video playback
hardware for a well-priced step-up Netbook experience.
Price: $399.99 - $411.99 (check prices)
Toshiba Satellite E205-S1904 bundle
As one of the first laptops to feature Intel's Wireless Display technology, the Toshiba Satellite E205-S1904 is a slim, fast, and affordable package for mainstream users.
Tablet PC from DELL
Dell Latitude XT2 Tablet PC Touch Screen Laptop
Tap into the Future – With the Latitude XT2
The industry's first tablet PC with multi-touch screen technology has taken superb to a new level with the DellTM LatitudeTM XT2. The XT2 lets you use natural gestures like a pinch or tap for scrolling, panning, rotating, zooming and more.
* Innovative multi-touch responsive screen
* Dual-digitizer for low pressure, high touch accuracy
* New LCD-based wireless antenna design for excellent connectivity
A Touch Of Genius
The XT2 provides an outstanding tablet experience. A high-performance system designed with intuitive input capabilities including a capacitive multi-touch screen and pen, the Latitude XT2 can work the way you want. With just a stroke of your fingertips, you can:
* scroll through large web pages
* zoom in on graphics, photos or online maps
* enlarge emails to aid reading
* close your screen
* collaborate in real-time
* and more
Once you experience multi-touch on the XT2, your keyboard and touchpad may get lonely.
Small Tablet, Big Options
At just an inch thin with an ultra small power supply, the XT2 can comfortably go almost anywhere.
It also offers great features and plenty of flexible options.
* You can work for hours using the optional slim, high-capacity battery slice.
* You can work comfortably in either notebook PC mode or convert to tablet mode.
In tablet mode, you can use the multi-touch screen for exceptional efficiency and fingertip ease or utilize
the battery-free pen to write or draw as you would on a piece of paper.
In laptop mode, you still have the luxury of touch, but with the comfort of a full-sized keyboard with
dual-pointing – track stick and buttons.
* You can stay connected almost anywhere with the XT2's optional mobile broadband1 capabilities.
* If business takes you outdoors, the XT2 provides an exceptionally bright display option designed for
sunlit environments.
* You can also use optical drives or additional ports with the optional media base.
Simple To Manage
I think Dell understands that you don't have time to deal with technology that's complex and difficult to manage,so the XT2 is simple to use, cost-effective to own and pre-loaded with the tools you need including: the latest Intel vProTM processors for remote management,comprehensive security features and Dell ProSupport2 Mobility Services!!!
Tap into the Future – With the Latitude XT2
The industry's first tablet PC with multi-touch screen technology has taken superb to a new level with the DellTM LatitudeTM XT2. The XT2 lets you use natural gestures like a pinch or tap for scrolling, panning, rotating, zooming and more.
* Innovative multi-touch responsive screen
* Dual-digitizer for low pressure, high touch accuracy
* New LCD-based wireless antenna design for excellent connectivity
A Touch Of Genius
The XT2 provides an outstanding tablet experience. A high-performance system designed with intuitive input capabilities including a capacitive multi-touch screen and pen, the Latitude XT2 can work the way you want. With just a stroke of your fingertips, you can:
* scroll through large web pages
* zoom in on graphics, photos or online maps
* enlarge emails to aid reading
* close your screen
* collaborate in real-time
* and more
Once you experience multi-touch on the XT2, your keyboard and touchpad may get lonely.
Small Tablet, Big Options
At just an inch thin with an ultra small power supply, the XT2 can comfortably go almost anywhere.
It also offers great features and plenty of flexible options.
* You can work for hours using the optional slim, high-capacity battery slice.
* You can work comfortably in either notebook PC mode or convert to tablet mode.
In tablet mode, you can use the multi-touch screen for exceptional efficiency and fingertip ease or utilize
the battery-free pen to write or draw as you would on a piece of paper.
In laptop mode, you still have the luxury of touch, but with the comfort of a full-sized keyboard with
dual-pointing – track stick and buttons.
* You can stay connected almost anywhere with the XT2's optional mobile broadband1 capabilities.
* If business takes you outdoors, the XT2 provides an exceptionally bright display option designed for
sunlit environments.
* You can also use optical drives or additional ports with the optional media base.
Simple To Manage
I think Dell understands that you don't have time to deal with technology that's complex and difficult to manage,so the XT2 is simple to use, cost-effective to own and pre-loaded with the tools you need including: the latest Intel vProTM processors for remote management,comprehensive security features and Dell ProSupport2 Mobility Services!!!
Key Logger!!!!!
Track what others had in your computer using key logger!!! It tracks the keys one pressed in the keyboard for the installed system!!!
Keylogger offers special support for network activities. In its log, you can see a full list of visited web pages. Using time stamps, you can match the pages with the text that was typed or pasted from the Clipboard. Once it is clear what your child did on each site, it's up to you to allow or forbid the activity. You can use either Internet Properties or a dedicated firewall to block access to sites with questionable content!!!
some technical amenments:
Keystroke logging (often called keylogging) is the action of tracking (or logging) the keys struck on a keyboard, typically in a covert manner so that the person using the keyboard is unaware that their actions are being monitored. There are numerous keylogging methods, ranging from hardware and software-based approaches to electromagnetic and acoustic analysis.
These are software programs designed to work on the target computer’s operating system. From a technical perspective there are five categories:
* Hypervisor-based: The keylogger can theoretically reside in a malware hypervisor running underneath the operating system, which remains untouched. It effectively becomes a virtual machine. Blue Pill is a conceptual example.
* Kernel based: This method is difficult both to write and to combat. Such keyloggers reside at the kernel level and are thus difficult to detect, especially for user-mode applications. They are frequently implemented as rootkits that subvert the operating system kernel and gain unauthorized access to the hardware, making them very powerful. A keylogger using this method can act as a keyboard driver for example, and thus gain access to any information typed on the keyboard as it goes to the operating system.
* API-based: These keyloggers hook keyboard APIs; the operating system then notifies the keylogger each time a key is pressed and the keylogger simply records it. APIs such as GetAsyncKeyState(), GetForegroundWindow(), etc. are used to poll the state of the keyboard or to subscribe to keyboard events. These types of keyloggers are the easiest to write, but where constant polling of each key is required, they can cause a noticeable increase in CPU usage, and can also miss the occasional key. A more recent example simply polls the BIOS for preboot authentication PINs that have not been cleared from memory.
* Form Grabber based: Form Grabber-based keyloggers log web form submissions by recording the web browsing onSubmit event functions. This records form data before it is passed over the internet and bypasses https encryption.
* Packet analyzers: This involves capturing network traffic associated with HTTP POST events to retrieve unencrypted passwords.
Download HERE
Keylogger offers special support for network activities. In its log, you can see a full list of visited web pages. Using time stamps, you can match the pages with the text that was typed or pasted from the Clipboard. Once it is clear what your child did on each site, it's up to you to allow or forbid the activity. You can use either Internet Properties or a dedicated firewall to block access to sites with questionable content!!!
some technical amenments:
Keystroke logging (often called keylogging) is the action of tracking (or logging) the keys struck on a keyboard, typically in a covert manner so that the person using the keyboard is unaware that their actions are being monitored. There are numerous keylogging methods, ranging from hardware and software-based approaches to electromagnetic and acoustic analysis.
These are software programs designed to work on the target computer’s operating system. From a technical perspective there are five categories:
* Hypervisor-based: The keylogger can theoretically reside in a malware hypervisor running underneath the operating system, which remains untouched. It effectively becomes a virtual machine. Blue Pill is a conceptual example.
* Kernel based: This method is difficult both to write and to combat. Such keyloggers reside at the kernel level and are thus difficult to detect, especially for user-mode applications. They are frequently implemented as rootkits that subvert the operating system kernel and gain unauthorized access to the hardware, making them very powerful. A keylogger using this method can act as a keyboard driver for example, and thus gain access to any information typed on the keyboard as it goes to the operating system.
* API-based: These keyloggers hook keyboard APIs; the operating system then notifies the keylogger each time a key is pressed and the keylogger simply records it. APIs such as GetAsyncKeyState(), GetForegroundWindow(), etc. are used to poll the state of the keyboard or to subscribe to keyboard events. These types of keyloggers are the easiest to write, but where constant polling of each key is required, they can cause a noticeable increase in CPU usage, and can also miss the occasional key. A more recent example simply polls the BIOS for preboot authentication PINs that have not been cleared from memory.
* Form Grabber based: Form Grabber-based keyloggers log web form submissions by recording the web browsing onSubmit event functions. This records form data before it is passed over the internet and bypasses https encryption.
* Packet analyzers: This involves capturing network traffic associated with HTTP POST events to retrieve unencrypted passwords.
Download HERE
Automatic shutdown software
Its good to have an automatic shutdown timer application in your pc!! Here easy sleep is one such software which shut down the pc as per the sheduled time!!!
You can fall asleep while listening to your favorite music without having to worry about shutting down your computer!!!! Click here to Download.
The main features of this software are-
1.Diminuendo - Auto reduce the speaker's volume constantly (Unique Feature)
2. Run File - Run an EXE or Batch file on time (Unique Feature)
3. Auto ShutDown - Auto shuts down the system and power off the computer (your system must support the power-off feature)
4.Auto ReBoot - Shuts down the system and then restarts the system
5. Auto LogOff - Shuts down all running processes, then logs the user off
6.BlackScreen - Black your computer's screen. Save the monitor's life!
7.Load At System Start - You may set EasySleep starts with Windows system starts up
8.Minimize On Start - You may also set EasySleep keep minimize on start up
9.Hide to Systray - It may hide the main interface to the right corner of the system toolbar while minimized
You can fall asleep while listening to your favorite music without having to worry about shutting down your computer!!!! Click here to Download.
The main features of this software are-
1.Diminuendo - Auto reduce the speaker's volume constantly (Unique Feature)
2. Run File - Run an EXE or Batch file on time (Unique Feature)
3. Auto ShutDown - Auto shuts down the system and power off the computer (your system must support the power-off feature)
4.Auto ReBoot - Shuts down the system and then restarts the system
5. Auto LogOff - Shuts down all running processes, then logs the user off
6.BlackScreen - Black your computer's screen. Save the monitor's life!
7.Load At System Start - You may set EasySleep starts with Windows system starts up
8.Minimize On Start - You may also set EasySleep keep minimize on start up
9.Hide to Systray - It may hide the main interface to the right corner of the system toolbar while minimized
Subscribe to:
Posts (Atom)