Kohjinsha ships dual-screen DZ notebook


Japanese PC maker Kohjinsha has taken its dual screen notebook concept it showed off at last month's CEATEC show and made it into a production PC. The DZ6HKE16E is the first of the DZ-series of notebooks, and comes with a 1.6GHz AMD Athlon Neo MV-40 CPU, 1GB of RAM. There is also an integrated ATI Radeon HD 3200 graphics chipsets to drive the two 10.1-inch displays, each with 1024x600 resolution and an LED backlight.

For storage, there is a 160GB hard drive preloaded with Windows 7 Home Premium and users can connect to the web over the Wi-Fi connection or gigabit Ethernet port. A 1.3-megapixel camera, Bluetooth 2.1 and a multi-card reader are integrated, while the battery is said to provide 4.5 hours of life on a full charge. The system weighs just over 4lbs. There are also three USB 2.0 ports onboard.

Prices start at the equivalent of $928 in Japan and the PC is now available. A release in North America is unknown.

Sources from: electronista

iBuyPower adds Core i7, Phenom II rigs for NewEgg

Gamer Supreme 979 SLC

iBuyPower this afternoon refreshed the ready-made gaming PCs it ships to NewEgg. All of the Gamer Extreme and Supreme models, ranging from the 922 SLC through to the 979 SLC, use an Asetek-made liquid cooling setup that lets them run coolly while also giving them some performance headroom. The 979 and its sibling 929 also adds the PC builder's own internal USB expansion, which supplies added power to the normally weak front USB ports and also supplies Bluetooth.

The 922 SLC as the relative budget model starts at $990 but still comes outfitted with a 2.8GHz Core i7, 4GB of RAM, a 500GB hard drive and a GeForce GT 220 for its graphics. A lone AMD model, the $1,550 559 SLC, centers on a 3.4GHz Phenom II, doubles memory and storage to 8GB and 1TB respectively, and upgrades the video to a GeForce GTX 295. An Intel alternative at the same price, the 919 SLC, opts for a 2.93GHz Core i7 and a Radeon HD 4890 instead.

At the very high end, the 929 SLC has just 6GB of memory but gets a 3.33GHz Core i7, GeForce GTX 285 video and Blu-ray at its $2,500 price point. The 979 SLC opts for two GeForce GTX 295 cards to provide four-way SLI, adds a DVD burner as a second optical drive, and uses a 128GB solid-state drive as a boot drive while turning to a 1.5TB disk for the brunt of its storage. All the extra features give the 979 a $4,000 price.
The complete line

Sources from:electronista

MS Office 2010 Beta is available for PC, Cell Phone and Browser


18 November 2009 Microsoft announced the product release version of MS Office 2010 Beta. For PC is 32 and 64bit versions and for Mobile Phone is available for Windows Mobile 6.5 phone.

"We are very pleased to announce the beta version for the 2010 version of Office, SharePoint Server, Visio, Project and Office Web Apps for business customers. Mobile Office 2010 also has reached beta milestone. Starting today customers can download the beta products with visiting http://www.microsoft.com/2010. "Said Kurt DelBene, Senior Vice President for Office Business Productivity Group Microsoft.

MS Office 2010 is also available in mobile version. MS Office users on PCs can now use mobile phonenya to perform the same function on the mobile phonenya. MS Office 2010 available for mobile phones that use Windows Mobile 6.5 phone. MS Office 2010 consists of a mobile version of Word, Excel, PowerPoint, OneNote and SharePoint

Sources from: KabarIT

Samsung STORY, HD External 2TB 3Gigabit / Secon

Samsung will soon launch a series of new external HD Samsung STORY using the eSATA interface. Samsung has launched the previous External HD 1.5 TB by using a USB 2.0 interface.

Samsung STORY eSATA storage capacity is increased to 2 TB, but also remain available sizes 1TB and 1.5 TB. Not only that, with the support eSATA interface, the process of data transver reach 3Gigabit/detik or six times faster than the predecessor series that uses USB 2.0

Electrical power needs for the latest Samsung STORY series is no longer just 0.1W to 2.5W as used in the previous series. HD is wrapped with a sporty aluminum body which is also used for Head Sink. Inside there is also Samsung Auto Backup software and a program for SafetyKey data encryption SecretZone and password protection. Samsung plans to sell it at the end of this month at a price of $ 299 for 2 TB capacity.

Source from:electronista

How to Bypass BIOS Passwords

BIOS passwords can add an extra layer of security for desktop and laptop computers. They are used to either prevent a user from changing the BIOS settings or to prevent the PC from booting without a password. Unfortunately, BIOS passwords can also be a liability if a user forgets their password, or changes the password to intentionally lock out the corporate IT department. Sending the unit back to the manufacturer to have the BIOS reset can be expensive and is usually not covered in the warranty. Never fear, all is not lost. There are a few known backdoors and other tricks of the trade that can be used to bypass or reset the BIOS

DISCLAIMER
This article is intended for IT Professionals and systems administrators with experience servicing computer hardware. It is not intended for home users, hackers, or computer thieves attempting to crack the password on a stolen PC. Please do not attempt any of these procedures if you are unfamiliar with computer hardware, and please use this information responsibly. LabMice.net is not responsible for the use or misuse of this material, including loss of data, damage to hardware, or personal injury.

Before attempting to bypass the BIOS password on a computer, please take a minute to contact the hardware manufacturer support staff directly and ask for their recommended methods of bypassing the BIOS security. In the event the manufacturer cannot (or will not) help you, there are a number of methods that can be used to bypass or reset the BIOS password yourself. They include:

Using a manufacturers backdoor password to access the BIOS

Use password cracking software

Reset the CMOS using the jumpers or solder beads.

Removing the CMOS battery for at least 10 minutes

Overloading the keyboard buffer

Using a professional service

Please remember that most BIOS passwords do not protect the hard drive, so if you need to recover the data, simply remove the hard drive and install it in an identical system, or configure it as a slave drive in an existing system. The exception to this are laptops, especially IBM Thinkpads, which silently lock the hard drive if the supervisor password is enabled. If the supervisor password is reset without resetting the and hard drive as well, you will be unable to access the data on the drive.

--------------------------------------------------------------------------------

Backdoor passwords

Many BIOS manufacturers have provided backdoor passwords that can be used to access the BIOS setup in the event you have lost your password. These passwords are case sensitive, so you may wish to try a variety of combinations. Keep in mind that the key associated to "_" in the US keyboard corresponds to "?" in some European keyboards. Laptops typically have better BIOS security than desktop systems, and we are not aware of any backdoor passwords that will work with name brand laptops.

WARNING: Some BIOS configurations will lock you out of the system completely if you type in an incorrect password more than 3 times. Read your manufacturers documentation for the BIOS setting before you begin typing in passwords

Award BIOS backdoor passwords:

ALFAROME ALLy aLLy aLLY ALLY aPAf _award AWARD_SW AWARD?SW AWARD SW AWARD PW AWKWARD awkward BIOSTAR CONCAT CONDO Condo d8on djonet HLT J64 J256 J262 j332 j322 KDD Lkwpeter LKWPETER PINT pint SER SKY_FOX SYXZ syxz shift + syxz TTPTHA ZAAADA ZBAAACA ZJAAADC 01322222
589589 589721 595595 598598

AMI BIOS backdoor passwords:

AMI AAAMMMIII BIOS PASSWORD HEWITT RAND AMI?SW AMI_SW LKWPETER A.M.I. CONDO

PHOENIX BIOS backdoor passwords:

phoenix, PHOENIX, CMOS, BIOS

MISC. COMMON PASSWORDS

ALFAROME BIOSTAR biostar biosstar CMOS cmos LKWPETER lkwpeter setup SETUP Syxz Wodj

OTHER BIOS PASSWORDS BY MANUFACTURER

Manufacturer Password
VOBIS & IBM merlin
Dell Dell
Biostar Biostar
Compaq Compaq
Enox xo11nE
Epox central
Freetech Posterie
IWill iwill
Jetway spooml
Packard Bell bell9
QDI QDI
Siemens SKY_FOX
TMC BIGO
Toshiba Toshiba

TOSHIBA BIOS

Most Toshiba laptops and some desktop systems will bypass the BIOS password if the left shift key is held down during boot

IBM APTIVA BIOS

Press both mouse buttons repeatedly during the boot

--------------------------------------------------------------------------------

Password cracking software

The following software can be used to either crack or reset the BIOS on many chipsets. If your PC is locked with a BIOS administrator password that will not allow access to the floppy drive, these utilities may not work. Also, since these utilities do not come from the manufacturer, use them cautiously and at your own risk.

Cmos password recovery tools 3.1
!BIOS (get the how-to article)
RemPass
KILLCMOS

--------------------------------------------------------------------------------

Using the Motherboard "Clear CMOS" Jumper or Dipswitch settings

Many motherboards feature a set of jumpers or dipswitches that will clear the CMOS and wipe all of the custom settings including BIOS passwords. The locations of these jumpers / dipswitches will vary depending on the motherboard manufacturer and ideally you should always refer to the motherboard or computer manufacturers documentation. If the documentation is unavailable, the jumpers/dipswitches can sometimes be found along the edge of the motherboard, next to the CMOS battery, or near the processor. Some manufacturers may label the jumper / dipswitch CLEAR - CLEAR CMOS - CLR - CLRPWD - PASSWD - PASSWORD - PWD. On laptop computers, the dipswitches are usually found under the keyboard or within a compartment at the bottom of the laptop.
Please remember to unplug your PC and use a grounding strip before reaching into your PC and touching the motherboard. Once you locate and rest the jumper switches, turn the computer on and check if the password has been cleared. If it has, turn the computer off and return the jumpers or dipswitches to its original position.

--------------------------------------------------------------------------------

Removing the CMOS Battery

The CMOS settings on most systems are buffered by a small battery that is attached to the motherboard. (It looks like a small watch battery). If you unplug the PC and remove the battery for 10-15 minutes, the CMOS may reset itself and the password should be blank. (Along with any other machine specific settings, so be sure you are familiar with manually reconfiguring the BIOS settings before you do this.) Some manufacturers backup the power to the CMOS chipset by using a capacitor, so if your first attempt fails, leave the battery out (with the system unplugged) for at least 24 hours. Some batteries are actually soldered onto the motherboard making this task more difficult. Unsoldering the battery incorrectly may damage your motherboard and other components, so please don't attempt this if you are inexperienced. Another option may be to remove the CMOS chip from the motherboard for a period of time.
Note: Removing the battery to reset the CMOS will not work for all PC's, and almost all of the newer laptops store their BIOS passwords in a manner which does not require continuous power, so removing the CMOS battery may not work at all. IBM Thinkpad laptops lock the hard drive as well as the BIOS when the supervisor password is set. If you reset the BIOS password, but cannot reset the hard drive password, you may not be able to access the drive and it will remain locked, even if you place it in a new laptop. IBM Thinkpads have special jumper switches on the motherboard, and these should be used to reset the system.

--------------------------------------------------------------------------------

Overloading the KeyBoard Buffer

On some older computer systems, you can force the CMOS to enter its setup screen on boot by overloading the keyboard buffer. This can be done by booting with the keyboard or mouse unattached to the systems, or on some systems by hitting the ESC key over 100 times in rapid succession.

--------------------------------------------------------------------------------

Jumping the Solder Beads on the CMOS

It is also possible to reset the CMOS by connecting or "jumping" specific solder beads on the chipset. There are too many chipsets to do a breakdown of which points to jump on individual chipsets, and the location of these solder beads can vary by manufacturer, so please check your computer and motherboard documentation for details. This technique is not recommended for the inexperienced and should be only be used as a "last ditch" effort.

--------------------------------------------------------------------------------

Using a professional service

If the manufacturer of the laptop or desktop PC can't or won't reset the BIOS password, you still have the option of using a professional service. Password Crackers, Inc., offers a variety of services for desktop and laptop computers for between $100 and $400. For most of these services, you'll need to provide some type of legitimate proof of ownership. This may be difficult if you've acquired the computer second hand or from an online auction.

DirectX explained

Ever wondered just what that enigmatic name means?

Gaming and multimedia applications are some of the most satisfying programs you can get for your PC, but getting them to run properly isn’t always as easy as it could be. First, the PC architecture was never designed as a gaming platform. Second, the wide-ranging nature of the PC means that one person’s machine can be different from another. While games consoles all contain the same hardware, PCs don’t: the massive range of difference can make gaming a headache.

To alleviate as much of the pain as possible, Microsoft needed to introduce a common standard which all games and multimedia applications could follow – a common interface between the OS and whatever hardware is installed in the PC, if you like. This common interface is DirectX, something which can be the source of much confusion.

DirectX is an interface designed to make certain programming tasks much easier, for both the game developer and the rest of us who just want to sit down and play the latest blockbuster. Before we can explain what DirectX is and how it works though, we need a little history lesson.

DirectX history
Any game needs to perform certain tasks again and again. It needs to watch for your input from mouse, joystick or keyboard, and it needs to be able to display screen images and play sounds or music. That’s pretty much any game at the most simplistic level.

Imagine how incredibly complex this was for programmers developing on the early pre-Windows PC architecture, then. Each programmer needed to develop their own way of reading the keyboard or detecting whether a joystick was even attached, let alone being used to play the game. Specific routines were needed even to display the simplest of images on the screen or play a simple sound.

Essentially, the game programmers were talking directly to your PC’s hardware at a fundamental level. When Microsoft introduced Windows, it was imperative for the stability and success of the PC platform that things were made easier for both the developer and the player. After all, who would bother writing games for a machine when they had to reinvent the wheel every time they began work on a new game? Microsoft’s idea was simple: stop programmers talking directly to the hardware, and build a common toolkit which they could use instead. DirectX was born.

How it works
At the most basic level, DirectX is an interface between the hardware in your PC and Windows itself, part of the Windows API or Application Programming Interface. Let’s look at a practical example. When a game developer wants to play a sound file, it’s simply a case of using the correct library function. When the game runs, this calls the DirectX API, which in turn plays the sound file. The developer doesn’t need to know what type of sound card he’s dealing with, what it’s capable of, or how to talk to it. Microsoft has provided DirectX, and the sound card manufacturer has provided a DirectX-capable driver. He asks for the sound to be played, and it is – whichever machine it runs on.

From our point of view as gamers, DirectX also makes things incredibly easy – at least in theory. You install a new sound card in place of your old one, and it comes with a DirectX driver. Next time you play your favourite game you can still hear sounds and music, and you haven’t had to make any complex configuration changes.

Originally, DirectX began life as a simple toolkit: early hardware was limited and only the most basic graphical functions were required. As hardware and software has evolved in complexity, so has DirectX. It’s now much more than a graphical toolkit, and the term has come to encompass a massive selection of routines which deal with all sorts of hardware communication. For example, the DirectInput routines can deal with all sorts of input devices, from simple two-button mice to complex flight joysticks. Other parts include DirectSound for audio devices and DirectPlay provides a toolkit for online or multiplayer gaming.

DirectX versions
The current version of DirectX at time of writing is DirectX 9.0. This runs on all versions of Windows from Windows 98 up to and including Windows Server 2003 along with every revision in between. It doesn’t run on Windows 95 though: if you have a machine with Windows 95 installed, you’re stuck with the older and less capable 8.0a. Windows NT 4 also requires a specific version – in this case, it’s DirectX 3.0a.

With so many versions of DirectX available over the years, it becomes difficult to keep track of which version you need. In all but the most rare cases, all versions of DirectX are backwardly compatible – games which say they require DirectX 7 will happily run with more recent versions, but not with older copies. Many current titles explicitly state that they require DirectX 9, and won’t run without the latest version installed. This is because they make use of new features introduced with this version, although it has been known for lazy developers to specify the very latest version as a requirement when the game in question doesn’t use any of the new enhancements. Generally speaking though, if a title is version locked like this, you will need to upgrade before you can play. Improvements to the core DirectX code mean you may even see improvements in many titles when you upgrade to the latest build of DirectX. Downloading and installing DirectX need not be complex, either.

Upgrading DirectX
All available versions of Windows come with DirectX in one form or another as a core system component which cannot be removed, so you should always have at least a basic implementation of the system installed on your PC. However, many new games require the very latest version before they work properly, or even at all.

Generally, the best place to install the latest version of DirectX from is the dedicated section of the Microsoft Web site, which is found at www.microsoft.com/windows/directx. As we went to press, the most recent build available for general download was DirectX 9.0b. You can download either a simple installer which will in turn download the components your system requires as it installs, or download the complete distribution package in one go for later offline installation.

Another good source for DirectX is games themselves. If a game requires a specific version, it’ll be on the installation CD and may even be installed automatically by the game’s installer itself. You won’t find it on magazine cover discs though, thanks to Microsoft’s licensing terms.

Diagnosing problems

Diagnosing problems with a DirectX installation can be problematic, especially if you don’t know which one of the many components is causing your newly purchased game to fall over. Thankfully, Microsoft provides a useful utility called the DirectX Diagnostic Tool, although this isn’t made obvious. You won’t find this tool in the Start Menu with any version of Windows, and each tends to install it in a different place.

The easiest way to use it is to open the Start Menu’s Run dialog, type in dxdiag and then click OK. When the application first loads, it takes a few seconds to interrogate your DirectX installation and find any problems. First, the DirectX Files tab displays version information on each one of the files your installation uses. The Notes section at the bottom is worth checking, as missing or corrupted files will be flagged here.

The tabs marked Display, Sound, Music, Input and Network all relate to specific areas of DirectX, and all but the Input tab provide tools to test the correct functioning on your hardware. Finally, the More Help tab provides a useful way to start the DirectX Troubleshooter, Microsoft’s simple linear problem solving tool for many common DirectX issues.

Cara Menambah Backlink dan Page Ranking

Link Berantai, tepatnya. Jika Anda ingin menambah Backlink di Blog atau Web Anda, tidak ada salahnya Anda mencoba yang satu ini, karena untuk mengikutinya tidak ada biaya sepeserpun. Bahkan selain menambah Backlink, Anda sekaligus juga bisa beriklan. Hanya menampilkan link sebelum anda..
Untuk mengikuti Arisan ini, hanya satu syarat yang dibutuhkan, yaitu KEJUJURAN.

Lakukan semua langkah-langkah yang dicantumkan di bawah ini, dan Copy-Paste Postingan di bawah mulai dari
------ Copy mulai di sini ------sampai dengan ---- SELESAI ----.


------ Copy mulai di sini ------

Mohon baca baik-baik lalu terapkan dengan benar....
Sebuah filosofi mengatakan "Honesty is The Best Policy (Kejujuran adalah politik/strategi terbaik)", inilah yang akan kita buktikan....apakah konsep kejujuran bisa kita olah menghasilkan traffic dan popularity yang lebih hebat dari konsep rumit para expert webmaster atau pakar SEO..?...
Saya yakin bisa asal konsep ini di jalankan dengan benar...,bila ini di terapkan pada web anda sesuai ketentuan maka:
-Web anda akan kebanjiran traffic pengunjung secara luar biasa hari demi hari, tanpa perlu repot-repot memikirkan SEO atau capek-capek promosi keberbagai tempat di dunia internet.
-Web anda akan kebanjiran backlink secara luarbiasa hari demi hari, tanpa perlu repot-repot berburu link keberbagai tempat di dunia internet.
Yang perlu anda lakukan adalah ikuti langkah-langkah berikut :

a.) Buat posting artikel seperti posting saya ini, atau copy-paste posting ini. Beri Judul terserah anda (sebab itu merupakan SEO buat blog anda sendiri ).
b.) Anda hanya perlu meletakkan Link-Link di bawah ini pada postingan anda.

1. http://www.bayipertama.blogspot.com/
2. http://www.barumenikah.blogspot.com/
3. http://www.invest77.com/
4. http://www.pabrikweb.blogspot.com/
5. http://www.brokerlink.info/
6. http://zona-usaha.blogspot.com/
7. http://oce-modifblog.blogspot.com/
8. http://eko-wijayanto.blogspot.com/
9. http://dorara-marii.blogspot.com/
10.http://comtech-new.blogspot.com

c.) Anda harus mengunjungi kesetiap blog yang ada didaftar atas sekarang juga (1x saja sudah cukup)
(supaya tidak lupa)

PERATURAN :
1. Sebelum anda meletakkan Link-Link di atas di dalam postingan blog anda, silahkan anda hapus Link nomor 1, Sehingga link no 1 hilang dari daftar link dan setiap link akan naik 1 level ke atas. Yang tadinya no 2 naik menjadi no 1, yang tadinya no 3 menjadi no 2, yang tadinya no 4 menjadi no 3 dan seterusnya. Setelah itu masukkan Link anda pada urutan Paling bawah ( nomor 10 ).
2. Dilarang Merubah Urutan daftar link
Jika blogger yang ikut dalam konsep ini berhasil di duplikasi oleh blogger lain yang akan bergabung, misalnya 5 blogger yang bergabung maka Backlink yang anda dapat adalah
Ketika posisi anda 10, jumlah backlink = 1
Posisi 9, jml backlink = 5
Posisi 8, jml backlink = 25
Posisi 7, jml backlink = 125
Posisi 6, jml backlink = 625
Posisi 5, jml backlink = 3.125
Posisi 4, jml backlink = 15.625
Posisi 3, jml backlink = 78.125
Posisi 2, jml backlink = 390.625
Posisi 1, jml backlink = 1.953.125
Dan semua Dari kata kunci yang anda inginkan, bayangkan jika itu berhasil dari segi SEO anda sudah mendapat 1.953.125yang entah dari mana asalnya yang tersebar di mana-mana. Belum lagi jika ada yang mengunjungi blog anda dari Link List di atas secara otomatis anda mendapat traffic blog juga.
Ingat Anda harus memulai dari urutan paling bawah ( no 10 ) agar hasil backlink anda Maksimal, Jangan salahkan saya jika anda tidak menjalankan konsep ini dengan benar dan Link anda tiba-tiba berada pada urutan no 1 dan menghilang pada Link daftar. Jadi mulai lah pada urutan paling akhir.( no 10 ).
ingat kunjungi 10 blog yang ada dalam daftar yang anda terima sekarang juga (supaya tidak kelupaan)

Bisakah kita berbuat tidak fair atau tidak jujur menyabotase konsep ini, misalnya "menghilangkan semua link asal" lalu di isi dengan web/blog kita sendiri...?....Bisa, dan konsep ini tidak akan menjadi maksimal untuk membuktikan Kejujuran adalah strategi/politik terbaik.....Tapi saya yakin bahwa kita semua tak ingin menjatuhkan kredibilitas diri sendiri dengan melakukan tindakan murahan seperti itu...

---- SELESAI ----

Catatan:
- Sekali lagi saya ingin mengingatkan, KEJUJURAN Anda sangat diharapkan untuk berjalannya Arisan Backlink ini.
- Kunjungilah semua alamat yang tertera di atas, meskipun hanya 5 detik.
- Hati-hati dalam memasang Link-link ( yang berjumlah 10 buah Link), karena dengan banyaknya Link yang dipasang, bisa saja Anda keliru/tertukar dalam pemasangannya.
- Anda bisa menambah sedikit basa-basi sebelum/sesudah postingan yang harus di Copy-Paste.

Letakkan link anda di urutan paling bawah! (No.10)
Jadi setiap org yang memposting urutan berada di bawah, jika link anda diletakkan di atas kerugian tetap di anda sendiri karena link anda akan hilang jika artikel di sebarkan lagi, tentu percuma anda mengikuti program ini. Jadi urutkan dengan benar.

1. http://www.bayipertama.blogspot.com/

2. http://www.barumenikah.blogspot.com/
3. http://www.invest77.com/
4. http://www.pabrikweb.blogspot.com/
5. http://www.brokerlink.info/
6. http://zona-usaha.blogspot.com/
7. http://oce-modifblog.blogspot.com/
8. http://eko-wijayanto.blogspot.com/
9. http://dorara-marii.blogspot.com/
10.http://comtech-new.blogspot.com/

source from: dorara-marii
thanks to dorara

Firefox Speed Tweaks


Yes, firefox is already pretty damn fast but did you know that you can tweak it and improve the speed even more?

That's the beauty of this program being open source.
Here's what you do:
In the URL bar, type “about:config” and press enter. This will bring up the configuration “menu” where you can change the parameters of Firefox.

Note that these are what I’ve found to REALLY speed up my Firefox significantly - and these settings seem to be common among everybody else as well. But these settings are optimized for broadband connections - I mean with as much concurrent requests we’re going to open up with pipelining… lol… you’d better have a big connection.

Double Click on the following settins and put in the numbers below - for the true / false booleans - they’ll change when you double click.

Code:
browser.tabs.showSingleWindowModePrefs – true
network.http.max-connections – 48
network.http.max-connections-per-server – 16
network.http.max-persistent-connections-per-proxy – 8
network.http.max-persistent-connections-per-server – 4
network.http.pipelining – true
network.http.pipelining.maxrequests – 100
network.http.proxy.pipelining – true
network.http.request.timeout – 300


One more thing… Right-click somewhere on that screen and add a NEW -> Integer. Name it “nglayout.initialpaint.delay” and set its value to “0”. This value is the amount of time the browser waits before it acts on information it receives. Since you’re broadband - it shouldn’t have to wait.

Now you should notice you’re loading pages MUCH faster now!

A Basic Guide the Internet


The Internet is a computer network made up of thousands of networks worldwide. No one knows exactly how many computers are connected to the Internet. It is certain, however, that these number in the millions.

No one is in charge of the Internet. There are organizations which develop technical aspects of this network and set standards for creating applications on it, but no governing body is in control. The Internet backbone, through which Internet traffic flows, is owned by private companies.

All computers on the Internet communicate with one another using the Transmission Control Protocol/Internet Protocol suite, abbreviated to TCP/IP. Computers on the Internet use a client/server architecture. This means that the remote server machine provides files and services to the user's local client machine. Software can be installed on a client computer to take advantage of the latest access technology.

An Internet user has access to a wide variety of services: electronic mail, file transfer, vast information resources, interest group membership, interactive collaboration, multimedia displays, real-time broadcasting, shopping opportunities, breaking news, and much more.

The Internet consists primarily of a variety of access protocols. Many of these protocols feature programs that allow users to search for and retrieve material made available by the protocol.

COMPONENTS OF THE INTERNET

WORLD WIDE WEB
The World Wide Web (abbreviated as the Web or WWW) is a system of Internet servers that supports hypertext to access several Internet protocols on a single interface. Almost every protocol type available on the Internet is accessible on the Web. This includes e-mail, FTP, Telnet, and Usenet News. In addition to these, the World Wide Web has its own protocol: HyperText Transfer Protocol, or HTTP. These protocols will be explained later in this document.

The World Wide Web provides a single interface for accessing all these protocols. This creates a convenient and user-friendly environment. It is no longer necessary to be conversant in these protocols within separate, command-level environments. The Web gathers together these protocols into a single system. Because of this feature, and because of the Web's ability to work with multimedia and advanced programming languages, the Web is the fastest-growing component of the Internet.

The operation of the Web relies primarily on hypertext as its means of information retrieval. HyperText is a document containing words that connect to other documents. These words are called links and are selectable by the user. A single hypertext document can contain links to many documents. In the context of the Web, words or graphics may serve as links to other documents, images, video, and sound. Links may or may not follow a logical path, as each connection is programmed by the creator of the source document. Overall, the Web contains a complex virtual web of connections among a vast number of documents, graphics, videos, and sounds.

Producing hypertext for the Web is accomplished by creating documents with a language called HyperText Markup Language, or HTML. With HTML, tags are placed within the text to accomplish document formatting, visual features such as font size, italics and bold, and the creation of hypertext links. Graphics and multimedia may also be incorporated into an HTML document. HTML is an evolving language, with new tags being added as each upgrade of the language is developed and released. The World Wide Web Consortium (W3C), led by Web founder Tim Berners-Lee, coordinates the efforts of standardizing HTML. The W3C now calls the language XHTML and considers it to be an application of the XML language standard.

The World Wide Web consists of files, called pages or home pages, containing links to documents and resources throughout the Internet.

The Web provides a vast array of experiences including multimedia presentations, real-time collaboration, interactive pages, radio and television broadcasts, and the automatic "push" of information to a client computer. Programming languages such as Java, JavaScript, Visual Basic, Cold Fusion and XML are extending the capabilities of the Web. A growing amount of information on the Web is served dynamically from content stored in databases. The Web is therefore not a fixed entity, but one that is in a constant state of development and flux.

For more complete information about the World Wide Web, see Understanding The World Wide Web.

E-MAIL
Electronic mail, or e-mail, allows computer users locally and worldwide to exchange messages. Each user of e-mail has a mailbox address to which messages are sent. Messages sent through e-mail can arrive within a matter of seconds.

A powerful aspect of e-mail is the option to send electronic files to a person's e-mail address. Non-ASCII files, known as binary files, may be attached to e-mail messages. These files are referred to as MIME attachments.MIME stands for Multimedia Internet Mail Extension, and was developed to help e-mail software handle a variety of file types. For example, a document created in Microsoft Word can be attached to an e-mail message and retrieved by the recipient with the appropriate e-mail program. Many e-mail programs, including Eudora, Netscape Messenger, and Microsoft Outlook, offer the ability to read files written in HTML, which is itself a MIME type.

TELNET
Telnet is a program that allows you to log into computers on the Internet and use online databases, library catalogs, chat services, and more. There are no graphics in Telnet sessions, just text. To Telnet to a computer, you must know its address. This can consist of words (locis.loc.gov) or numbers (140.147.254.3). Some services require you to connect to a specific port on the remote computer. In this case, type the port number after the Internet address. Example: telnet nri.reston.va.us 185.

Telnet is available on the World Wide Web. Probably the most common Web-based resources available through Telnet have been library catalogs, though most catalogs have since migrated to the Web. A link to a Telnet resource may look like any other link, but it will launch a Telnet session to make the connection. A Telnet program must be installed on your local computer and configured to your Web browser in order to work.

With the increasing popularity of the Web, Telnet has become less frequently used as a means of access to information on the Internet.

FTP
FTP stands for File Transfer Protocol. This is both a program and the method used to transfer files between computers. Anonymous FTP is an option that allows users to transfer files from thousands of host computers on the Internet to their personal computer account. FTP sites contain books, articles, software, games, images, sounds, multimedia, course work, data sets, and more.

If your computer is directly connected to the Internet via an Ethernet cable, you can use one of several PC software programs, such as WS_FTP for Windows, to conduct a file transfer.

FTP transfers can be performed on the World Wide Web without the need for special software. In this case, the Web browser will suffice. Whenever you download software from a Web site to your local machine, you are using FTP. You can also retrieve FTP files via search engines such as FtpFind, located at /http://www.ftpfind.com/. This option is easiest because you do not need to know FTP program commands.

E-MAIL DISCUSSION GROUPS
One of the benefits of the Internet is the opportunity it offers to people worldwide to communicate via e-mail. The Internet is home to a large community of individuals who carry out active discussions organized around topic-oriented forums distributed by e-mail. These are administered by software programs. Probably the most common program is the listserv.

A great variety of topics are covered by listservs, many of them academic in nature. When you subscribe to a listserv, messages from other subscribers are automatically sent to your electronic mailbox. You subscribe to a listserv by sending an e-mail message to a computer program called a listserver. Listservers are located on computer networks throughout the world. This program handles subscription information and distributes messages to and from subscribers. You must have a e-mail account to participate in a listserv discussion group. Visit Tile.net at /http://tile.net/ to see an example of a site that offers a searchablecollection of e-mail discussion groups.

Majordomo and Listproc are two other programs that administer e-mail discussion groups. The commands for subscribing to and managing your list memberships are similar to those of listserv.

USENET NEWS
Usenet News is a global electronic bulletin board system in which millions of computer users exchange information on a vast range of topics. The major difference between Usenet News and e-mail discussion groups is the fact that Usenet messages are stored on central computers, and users must connect to these computers to read or download the messages posted to these groups. This is distinct from e-mail distribution, in which messages arrive in the electronic mailboxes of each list member.

Usenet itself is a set of machines that exchanges messages, or articles, from Usenet discussion forums, called newsgroups. Usenet administrators control their own sites, and decide which (if any) newsgroups to sponsor and which remote newsgroups to allow into the system.

There are thousands of Usenet newsgroups in existence. While many are academic in nature, numerous newsgroups are organized around recreational topics. Much serious computer-related work takes place in Usenet discussions. A small number of e-mail discussion groups also exist as Usenet newsgroups.

The Usenet newsfeed can be read by a variety of newsreader software programs. For example, the Netscape suite comes with a newsreader program called Messenger. Newsreaders are also available as standalone products.

FAQ, RFC, FYI
FAQ stands for Frequently Asked Questions. These are periodic postings to Usenet newsgroups that contain a wealth of information related to the topic of the newsgroup. Many FAQs are quite extensive. FAQs are available by subscribing to individual Usenet newsgroups. A Web-based collection of FAQ resources has been collected by The Internet FAQ Consortium and is available at /http://www.faqs.org/.

RFC stands for Request for Comments. These are documents created by and distributed to the Internet community to help define the nuts and bolts of the Internet. They contain both technical specifications and general information.

FYI stands for For Your Information. These notes are a subset of RFCs and contain information of interest to new Internet users.

Links to indexes of all three of these information resources are available on the University Libraries Web site at /http://library.albany.edu/reference/faqs.html.

CHAT & INSTANT MESSENGING
Chat programs allow users on the Internet to communicate with each other by typing in real time. They are sometimes included as a feature of a Web site, where users can log into the "chat room" to exchange comments and information about the topics addressed on the site. Chat may take other, more wide-ranging forms. For example, America Online is well known for sponsoring a number of topical chat rooms.

Internet Relay Chat (IRC) is a service through which participants can communicate to each other on hundreds of channels. These channels are usually based on specific topics. While many topics are frivolous, substantive conversations are also taking place. To access IRC, you must use an IRC software program.

A variation of chat is the phenomenon of instant messenging. With instant messenging, a user on the Web can contact another user currently logged in and type a conversation. Most famous is America Online's Instant Messenger. ICQ, MSN and Yahoo are other commonly-used chat programs.

Other types of real-time communication are addressed in the tutorial Understanding the World Wide Web.

MUD/MUSH/MOO/MUCK/DUM/MUSE
MUD stands for Multi User Dimension. MUDs, and their variations listed above, are multi-user virtual reality games based on simulated worlds. Traditionally text based, graphical MUDs now exist. There are MUDs of all kinds on the Internet, and many can be joined free of charge. For more information, read one of the FAQs devoted to MUDs available at the FAQ site at

Bit Torrent Tutorials

The first things you need to know about using Bit Torrent:
-- Bit Torrent is aimed at broadband users (or any connection better than dialup).
-- Sharing is highly appreciated, and sharing is what keeps bit torrent alive.
-- A bit torrent file (*.torrent) contains information about the piece structure of the download (more on this later)
-- The method of downloading is not your conventional type of download. Since downloads do not come in as one
big chunk, you are able to download from many people at once, increasing your download speeds. There may be
100 "pieces" to a file, or 20,000+ pieces, all depending on what you're downloading. Pieces are usually small (under 200kb)
-- The speeds are based upon people sharing as they download, and seeders. Seeders are people who constantly
share in order to keep torrents alive. Usually seeders are on fast connections (10mb or higher).

In this tutorial, I will be describing it all using a bit torrent client called Azureus. This client is used to decode the .torrent files into a useable format to download from other peers. From here on out, I will refer to Bit Torrent as BT.

Which BT client you use, is purely up to you. I have tried them all, and my personal favorite is Azureus for many reasons. A big problem with most BT clients out there, is that they are extremely CPU intensive, usually using 100% of your cpu power during the whole process. This is the number one reason I use Azureus. Another, is a recently released plug-in that enables you to browse all current files listed on suprnova.org (the #1 source for torrent downloads).

Before you use the plug-in, take a look at /http://www.suprnova.org, and browse the files. Hold your mouse over the links, and you'll notice every file ends in .torrent. This is the BT file extension. Usually, .torrent files are very small, under 200kb. They contain a wealth of information about the file you want to download. A .torrent file can contain just 1 single file, or a a directory full of files and more directories. But regardless, every download is split up into hundreds or thousands of pieces. The pieces make it much easier to download at higher speeds. Back to suprnova.org. Look at the columns:

Added Name Filesize Seeds DLs (and a few more which aren't very useful.)

I'll break this down.
Added: Self explanitory, its the date the torrent was added.
Name: Also self explanitory.
Filesize: Duh
Seeds: This is how many people are strictly UPLOADING, or sharing. These people are the ones that keep .torrent files alive. By "alive", I mean, if there's no one sharing the .torrent file, no one can download.
DLs: This is how many people currently downloading that particular torrent. They also help keep the torrent alive as they share while they download.

It's always best to download using a torrent that has a decent amount of seeders and downloaders, this way you can be assured there's a good chance your download will finish. The more the better.

Now that you should understand how torrent files work, and how to use them, on to Azureus!
First, get JAVA! You need this to run Azureus, as java is what powers it. Get Java here: /http://java.sun.com/j2se/1.4.2/download.html
Next, get Azureus at: /http://azureus.sourceforge.net
Next, get the Suprnovalister plugin from /http://s93732957.onlinehome.us/storage/suprnovalister.jar

Install Java JRE before you do ANYTHING.

Install Azureus, and then in the installation folder, create 2 more folders. ./Plugins/suprnovalister (For example, if you installed Azureus to C:\PROGRAM FILES\AZUREUS, create C:\PROGRAM FILES\AZUREUS\PLUGINS\SUPRNOVALISTER). Next, put the suprnovalister.jar file that you downloaded, in that folder.

Load up Azureus, and if you want, go through the settings and personalize it.

The tab labeled "My Torrents" is the section of Azureus you need the most often. That lists all your transfers, uploads and downloads. It shows every bit of information you could possibly want to know about torrents you download.

In the menu bar, go to View > Plugins > Suprnova Lister. This will open up a new tab in Azureus. Click on "Update Mirror". This will get a mirror site of suprnova.org containing all current torrent files available. Once a mirror is grabbed, choose a category from the drop-down box to the left and click "Update". Wah-lah, all the available downloads appear in the main chart above. Just double click a download you want, and bang its starting to download. Open the "My Torrents" tab again to view and make sure your download started.

After your download has finished, be nice, and leave the torrent transferring. So people can get pieces of the file from you, just as you got pieces from other people.

Alternatively, if you don't want to use the plugin... you can just head to suprnova.org and download files to any folder. Then go to File > Open > .torrent File in Azureus.

This should about wrap it up for the Bit Torrent Tutorial. If you guys think of anything I should add, or whatnot, just let me know and I'll check into it.


Central processing unit

The Central Processing Unit (CPU) or processor is the portion of a computer system that carries out the instructions of a computer program, and is the primary element carrying out the computer's functions. This term has been in use in the computer industry at least since the early 1960s (Weik 2007). The form, design and implementation of CPUs have changed dramatically since the earliest examples, but their fundamental operation remains much the same.

Early CPUs were custom-designed as a part of a larger, sometimes one-of-a-kind, computer. However, this costly method of designing custom CPUs for a particular application has largely given way to the development of mass-produced processors that are made for one or many purposes. This standardization trend generally began in the era of discrete transistor mainframes and minicomputers and has rapidly accelerated with the popularization of the integrated circuit (IC). The IC has allowed increasingly complex CPUs to be designed and manufactured to tolerances on the order of nanometers. Both the miniaturization and standardization of CPUs have increased the presence of these digital devices in modern life far beyond the limited application of dedicated computing machines. Modern microprocessors appear in everything from automobiles to cell phones and children's toys.


History :
Computers such as the ENIAC had to be physically rewired in order to perform different tasks. These machines are often referred to as "fixed-program computers," since they had to be physically reconfigured in order to run a different program. Since the term "CPU" is generally defined as a software (computer program) execution device, the earliest devices that could rightly be called CPUs came with the advent of the stored-program computer.

The idea of program computer was already present in the design of J. Presper Eckert and John William Mauchly's ENIAC, but was initially omitted so the machine could be finished sooner. On June 30, 1945, before ENIAC was even completed, mathematician John von Neumann distributed the paper entitled "First Draft of a Report on the EDVAC." It outlined the design of a stored-program computer that would eventually be completed in August 1949 (von Neumann 1945). EDVAC was designed to perform a certain number of instructions (or operations) of various types. These instructions could be combined to create useful programs for the EDVAC to run. Significantly, the programs written for EDVAC were stored in high-speed computer memory rather than specified by the physical wiring of the computer. This overcame a severe limitation of ENIAC, which was the considerable time and effort required to reconfigure the computer to perform a new task. With von Neumann's design, the program, or software, that EDVAC ran could be changed simply by changing the contents of the computer's memory.[1]

While von Neumann is most often credited with the design of the stored-program computer because of his design of EDVAC, others before him, such as Konrad Zuse, had suggested and implemented similar ideas. The so-called Harvard architecture of the Harvard Mark I, which was completed before EDVAC, also utilized a stored-program design using punched paper tape rather than electronic memory. The key difference between the von Neumann and Harvard architectures is that the latter separates the storage and treatment of CPU instructions and data, while the former uses the same memory space for both. Most modern CPUs are primarily von Neumann in design, but elements of the Harvard architecture are commonly seen as well.


EDVAC, one of the first electronic stored program computers.

As a digital device, a CPU is limited to a set of discrete states, and requires some kind of switching elements to differentiate between and change states. Prior to commercial development of the transistor, electrical relays and vacuum tubes (thermionic valves) were commonly used as switching elements. Although these had distinct speed advantages over earlier, purely mechanical designs, they were unreliable for various reasons. For example, building direct current sequential logic circuits out of relays requires additional hardware to cope with the problem of contact bounce. While vacuum tubes do not suffer from contact bounce, they must heat up before becoming fully operational, and they eventually cease to function due to slow contamination of their cathodes that occurs in the course of normal operation. If a tube's vacuum seal leaks, as sometimes happens, cathode contamination is accelerated. See vacuum tube. Usually, when a tube failed, the CPU would have to be diagnosed to locate the failed component so it could be replaced. Therefore, early electronic (vacuum tube based) computers were generally faster but less reliable than electromechanical (relay based) computers.

Tube computers like EDVAC tended to average eight hours between failures, whereas relay computers like the (slower, but earlier) Harvard Mark I failed very rarely (Weik 1961:238). In the end, tube based CPUs became dominant because the significant speed advantages afforded generally outweighed the reliability problems. Most of these early synchronous CPUs ran at low clock rates compared to modern microelectronic designs (see below for a discussion of clock rate). Clock signal frequencies ranging from 100 kHz to 4 MHz were very common at this time, limited largely by the speed of the switching devices they were built with.

Discrete transistor and Integrated Circuit CPUs :
The design complexity of CPUs increased as various technologies facilitated building smaller and more reliable electronic devices. The first such improvement came with the advent of the transistor. Transistorized CPUs during the 1950s and 1960s no longer had to be built out of bulky, unreliable, and fragile switching elements like vacuum tubes and electrical relays. With this improvement more complex and reliable CPUs were built onto one or several printed circuit boards containing discrete (individual) components.

During this period, a method of manufacturing many transistors in a compact space gained popularity. The integrated circuit (IC) allowed a large number of transistors to be manufactured on a single semiconductor-based die, or "chip." At first only very basic non-specialized digital circuits such as NOR gates were miniaturized into ICs. CPUs based upon these "building block" ICs are generally referred to as "small-scale integration" (SSI) devices. SSI ICs, such as the ones used in the Apollo guidance computer, usually contained transistor counts numbering in multiples of ten. To build an entire CPU out of SSI ICs required thousands of individual chips, but still consumed much less space and power than earlier discrete transistor designs. As microelectronic technology advanced, an increasing number of transistors were placed on ICs, thus decreasing the quantity of individual ICs needed for a complete CPU. MSI and LSI (medium- and large-scale integration) ICs increased transistor counts to hundreds, and then thousands.
CPU, core memory, and external bus interface of a DEC PDP-8/I. made of medium-scale integrated circuits

In 1964 IBM introduced its System/360 computer architecture which was used in a series of computers that could run the same programs with different speed and performance. This was significant at a time when most electronic computers were incompatible with one another, even those made by the same manufacturer. To facilitate this improvement, IBM utilized the concept of a microprogram (often called "microcode"), which still sees widespread usage in modern CPUs (Amdahl et al. 1964). The System/360 architecture was so popular that it dominated the mainframe computer market for the decades and left a legacy that is still continued by similar modern computers like the IBM zSeries. In the same year (1964), Digital Equipment Corporation (DEC) introduced another influential computer aimed at the scientific and research markets, the PDP-8. DEC would later introduce the extremely popular PDP-11 line that originally was built with SSI ICs but was eventually implemented with LSI components once these became practical. In stark contrast with its SSI and MSI predecessors, the first LSI implementation of the PDP-11 contained a CPU composed of only four LSI integrated circuits (Digital Equipment Corporation 1975).

Transistor-based computers had several distinct advantages over their predecessors. Aside from facilitating increased reliability and lower power consumption, transistors also allowed CPUs to operate at much higher speeds because of the short switching time of a transistor in comparison to a tube or relay. Thanks to both the increased reliability as well as the dramatically increased speed of the switching elements (which were almost exclusively transistors by this time), CPU clock rates in the tens of megahertz were obtained during this period. Additionally while discrete transistor and IC CPUs were in heavy usage, new high-performance designs like SIMD (Single Instruction Multiple Data) vector processors began to appear. These early experimental designs later gave rise to the era of specialized supercomputers like those made by Cray Inc.

source : WIKIPEDIA or LINK

Borderlands Review



Fun combat and a steady flow of rewards make this journey a massively enjoyable one, especially with some fellow mercenaries along for the ride.

The Good:
Satisfying gunplay.Tons of weapons, shields, and helpful items.Four unique and equally fun-to-play characters. Distinct, appealing artistic style. Great system of rewards.
The Bad :
Lonelier, slower-paced for a solo player. Massively unsatisfying "climax" Lackluster loot sharing system.


On the hostile, bandit-ridden planet of Pandora, there is one thing that draws off-world attention: The Vault. This mysterious alien structure is rumored to hold treasures of fantastic power and wealth, and so it attracts fortune-seeking corporations and individuals alike. In Borderlands, you are one such individual, but the satisfaction of unlocking the Vault's secrets pales in comparison to the rollicking good time you'll have on your way there. Borderlands is all about the journey, not the destination, and like most trips, this one is much better when you have some friends along for the ride. Solo players can still have a good time, because the bloody and entertaining combat is paired well with rewarding loot and engaging experience systems. But Pandora is a lonely place for a solitary mercenary, and lone wolves will find the pace deliberate and the friendly characters too few and far between. Those who take advantage of the four-player online cooperative mode will experience the game as it's meant to be played. The pleasing rhythm of killing enemies, gathering loot, and cashing in is punctuated by fighting bosses, completing quests, and leveling up. As a solo merc, this rhythm is slow and methodical, but as a team, the pace quickens to an invigorating clip and pretty soon you've spent hours having a riotously rewarding time.


The world of Pandora has a dusty, run-down feel, yet it manages to be vibrant and eye-catching at the same time. The art style features black-line borders and a colorful palette that give the game a not-quite-comic, not-quite-cel-shaded look. It takes some getting used to, and its technical execution is less-than-perfect . Yet what Borderlands lacks in precision it more than makes up for in style, and hours into the game you'll still be appreciating the thoughtful design touches that bring this world to life. Though the different environments occasionally feel too similar, there is enough distinct detail to keep them from blurring together. Your vanquished enemies also do their part to keep things visually interesting by dying in a variety of gruesome and entertaining ways. Bodies explode, limbs fly off, and burning enemies occasionally disintegrate from the ground up until only the mask of their face is left hanging in midair. It sounds (and is a bit) horrifying, but when the mask drops comically to the floor and finally burns up, don't bother stifling that chuckle. The art design resonates well with Borderlands' irreverent sense of humor, and the game is playful without feeling too goofy.

You travel through this world as one of four characters, each with a unique look and attitude. You don't really get to appreciate the character designs if you play solo because you have no AI teammates, but you do hear frequent quips that give you a little bit of character-specific flavor. The most important difference between characters is the action skill, which is a special ability that can give you an edge in combat. The Hunter can release a vicious bird of prey, the Soldier can throw down an automatic turret flanked by shields, the Siren can turn invisible and speedy, damaging all enemies in the vicinity, and the Berserker flies into a damage-resistant rage and delivers brutal punches to his enemies. You unlock these abilities after playing for a short while, and not only are they all fun to use, but each one can be customized in a couple of strategically distinct ways. You can tweak and upgrade your ability by investing skill points in appropriate skills. So, for example, upgrading the Hunter's bird of prey not only can increase the amount of damage it does, but can make it attack multiple targets, steal health from them, slow them down for easy sniping, and cause them to drop more loot. Expanding your action skill makes you more deadly in combat, and it's one of the most rewarding parts of leveling up. Killing enemies, finishing quests, and completing in-game bonus challenges earn you experience points, which in turn earn you a new level. Leveling up boosts your overall fortitude and grants you a precious skill point to use however you see fit.

You can also spend your skill points on other improvements, and each character has three different skill trees that highlight different tactics and abilities. So the Soldier can essentially become the team medic by developing the skills that allow him to shoot teammates to regenerate their health and that make his turret create a healing radius. Or he could choose to become more deadly, increasing his turret damage and combat rifle performance. Though your weapon proficiency improves based on how much you use a given weapon type, different characters have skills that favor different types of guns, so it's to your advantage to play to your character's strengths. The Berserker can certainly become proficient with the sniper rifle, but his melee-focused action skill and preference for rocket launchers make him a better choice for wading into the fray. Though the branching skill trees offer intriguing ways to specialize, your initial character choice has the biggest impact on how you'll go through the game. Fortunately, each character is fun and deadly in his own way, so you can't choose poorly, and you'll probably want to experience what each one has to offer. Playing cooperatively allows you to enjoy and benefit from the other characters' abilities, something you don't get to appreciate when playing solo, unless you start a new game.


Expanding your abilities and leveling up is one of the main ways that Borderlands consistently rewards you. Loot is another. Loot can be found in containers, dropped by enemies, or given to you as a quest reward. It includes money, ammo, shields, mods that boost and alter your grenades, mods that boost your skills, and, of course, guns. Guns are classified in familiar categories: pistols, submachine guns, shotguns, combat rifles, sniper rifles, rocket launchers, and so on. Each class feels distinct, and the shooting mechanics are well tuned and satisfying, which makes it fun to blast baddies. Base damage, clip size, fire rate, accuracy, and bullet spread are just some of the variables within each class, and some guns have more exotic features, like bladed pistols that increase melee damage or a shotgun that also shoots rockets. They can also do elemental damage, which comes in a variety of flavors that put a special kind of hurt on and can even do damage over time. Equip an incendiary gun if you want to burn flesh, or a corrosive gun if you want to deal extra damage to creatures with tough hides.
You will come across a huge number of guns in your travels, though most are only good for selling back to the many vending machines around Pandora. However, you will continually find better guns throughout your journey, and because a sweet gun or awesome shield could be be found on the remains of any human or animal and in any inanimate storage container, you'll spend a lot of time searching and picking things up. There is a lot of stuff to pick up in Borderlands, and it can be a bit unsettling when you realize just how much of the game you might have to spend looking down at the ground, pressing a button to grab your loot. Initially, it feels like you're looking down and pressing a key far too often. But as you progress, you'll become a more proficient loot-grabber, and you won't be bothered by the action. You'll even grow to love the sight of a battlefield littered with the tiny towers of light that seem to proclaim, "Grab me!" Watching your loot fly towards you and hearing it lodge in your inventory is satisfying, though there is another kink in the works. You can hold the reload key to pick up all the ammo and money nearby (something you'll want to do often), but if you hold the button while looking at a gun, you'll immediately equip it. This can cause you to equip some bogus guns if you're not careful, but this is quickly remedied and rarely too bothersome. You can compare guns within your inventory, and if you've used up your limited space, you can check the specs on a fallen gun easily and drop one from your inventory if you like.


Vending machines supply a wide variety of goods to the intrepid mercenaries of Pandora.


Unfortunately, dropping items is also the only way you can give them to your teammates, and there's no way to exchange ammo or money. If teammates are using the same type of gun, this can lead to some problematic ammo shortages, which is another reason to play to your character's strengths. This can also lead to disputes over who gets that fancy new shotgun, so it's best to have a gentleman's agreement in place over how to handle these issues. Borderlands allows you to resolve disputes by melee attacking a friendly player and challenging him to a duel. If your teammate melees you back, a colored dome pops up and the two of you fight to the death. The loser doesn't actually die, just loses some health, and there's no way to put a wager on the match, so the victor doesn't necessarily receive the spoils. As long as you're playing with a respectful group, you should be able to avoid loot-hoggers and the like, but it's still a bit disappointing that there isn't a better way to pool and equally distribute your collective resources. Still, joining other players online is easy, even if you all have characters at different levels. Borderlands does a good job of adjusting enemy difficulty to accommodate more players, though the larger the level gap, the easier it will be for higher level players, and the tougher it will be for lower level players. It's worth noting that the story-related missions--that is, the ones you have to perform in sequence--reflect the host's progress, and players who are behind the host may not get credit for completing certain missions.

Having some friends on your side makes things a lot more pleasant, given that about 99 percent of life on Pandora is your enemy. Human enemies range from bandits that are smart enough to wear shields and take cover to psychos that light themselves on fire and sprint toward you, screaming about rending your flesh from your bones. The local wildlife is universally hostile and includes skags (toothy dog-beasts), spiderants (armored insect monsters), rakks (raggedy death bats), and scythids (wriggling prehistoric grubs). Every type of enemy appears in various incarnations, ranging from young and weak to badass and on fire. These variations are generated anew during each encounter, so even when you kill a clutch of enemies in that same gully for the fourth time, it will be a different bad-guy loadout. You'll fight hundreds of each enemy type throughout the game, and the fact that groups are varied goes a long way toward staving off repetition. The two-seater vehicles also offer some locomotive variety, and many of the areas are much more fun to traverse on four wheels than on two legs. You can conjure the lone vehicle type from the many Catch-a-Ride stations. The touchy handling takes some getting used to, and you can run into some exaggerated physics problems when crashing into rocks. However, there's nothing quite like vehicular homicide to stave off bandit-killing fatigue. In or out of a vehicle, the simple act of killing enemies is pretty fun, and since you're constantly reaping loot and experience rewards, even repeated encounters have some incentive attached to them.

The combined incentives of killing enemies, gathering loot, cashing in, and leveling up are the main driving forces in Borderlands. The various quests you undertake cover a good variety of motivations, but most follow the pattern mentioned in the previous sentence. The 1 percent of life on Pandora that isn't your enemy will often have quests for you, though only a handful of characters are voice-acted. Of these, there are a few standouts, including the bumpkin car-rental mogul and the borderline sociopathic archaeologist, but for the most part Borderlands offers precious little in the way of non-player character contact. This makes playing solo a lonely experience. Though the action is still satisfying and the world is still interesting, solo players will have a slower-paced adventure in which the flashes of comedy also serve to underscore how sparse those flashes are. The main story is thin and the final encounter is pointless and thoroughly unsatisfying, so anyone hoping Borderlands will deliver a climactic conclusion is almost certainly going to be disappointed.

After you uncover the secrets of the Vault, you are once again set loose into Pandora, where you are free to quest on and remember why you enjoyed your previous hours with the game. Borderlands has tens of hours of quests to fulfill, and you'll likely find yourself enticed back to explore new skills, find new guns, and kill more enemies. Though the core action doesn't change drastically over the course of the game, it is woven together in such a way that once it ensnares you, you'll want nothing more than to plunge into Pandora at any chance you get. Combat is satisfying, and upgrading your skills and equipment is engaging. The constant stream of loot and experience is rewarding, and sharing it with some friends makes the experience that much richer and more exciting. Despite its hostile (albeit stylish) environment, Pandora is a great planet to visit if you want to shoot some stuff. Just be sure to bring some friends along for the ride.


Source : GAMESPOT or LINK



Dragon Age: Origins Review



Incredible storytelling, great characters, and exciting battles are just a few of the things that make this fantasy role-playing game so extraordinary.


When was the last time you felt totally lost in a fantasy gameworld? When was the last time you played a game with such a well-crafted and enjoyable story that you knew you’d remember it for a long, long time? Dragon Age: Origins is that kind of game, so rich and involving that you are powerless to resist its wiles and whims, so touching and triumphant that your mind and heart will be moved. In the fictional land of Ferelden, you meet memorable characters and fight for a cause you believe in, and it's this backdrop that makes developer BioWare's newest role-playing game so extraordinary. Dragon Age is more than a well-crafted story, however: It's a lengthy, intricate, and thoroughly entertaining adventure that's easy to fall in love with.

Dragon Age's plot, which deals with the impending invasion of a horde of demonic creatures called the darkspawn, isn't where the story's biggest surprises lie. The shocks, the joys, and the disappointments spring from the repartee among a number of remarkable characters; they lurk within books of lore and stories of martyrs; and they burst forth during spine-tingling moments when you must choose from a selection of difficult choices that affect the tale's direction--and the way your associates interact with you. Ferelden is a colorful and fascinating kingdom that takes enough cues from well-known fantasy tropes to be familiar, but bends enough conventions to feel original. Dragon Age features dwarves, but their caste-based society and the social paragons that rise above it twist the norms enough to keep you intrigued. Mages remain under the constant watch of templars, a restriction that doesn't sit well with those who view such policing as virtual slavery. The role of religion in human circles is of particular note. Chantries provide refuge to those worshiping the all-powerful Maker, and chanters recite the holy word near their houses of prayer. But lest this world sound too serious, don't despair: One such disciple slides food references into her chant, and a few dwarves warn you not to fall into the sky. Small, humorous touches like this are plentiful. Even if you aren't the literary sort, Dragon Age may inspire you to read every note, every character bio, and every creature description, thanks to the richness of the world and the consistency with which it's presented.

You'll learn even more from the companions who join you, and you'll grow to care about them on your quest for glory. There's Morrigan, the cynical apostate mage bound to your cause for reasons that become clear only late in the journey; Sten, the strong, silent type who isn't so quick to reveal his innermost thoughts; and Zevran, a darkly mischievous would-be assassin with a wild streak and a playful disregard for the law. There are others too, including Alistair, a wisecracking, vaguely insecure member of the Grey Wardens, an elite group of champions that recruits you early on. Great dialogue and fantastic voice acting make these characters leap off the screen as if they were real friends, and the way they interact with one another feels authentic. Morrigan and Alistair banter about the role of templars in the lives of mages, and the sweetly devout Leliana tries to communicate with your trusty canine cohort in some amusing exchanges. You may even develop a romance (or two) before all is said and done. The course of love isn't always a smooth one, though it can be a bit steamy, in a PG-13 sort of way.



Uh oh--this can't be healthy.

Relationships must be nurtured; in the world of Dragon Age, love doesn't develop at first sight. Rather, you must improve your standings with available party members by giving them gifts and fulfilling quests in ways that please them. Doing so opens more dialogue options and may even reward you with unexpected gifts beyond the private pleasures of your tent. Your personal relationships aren't all you need to worry about when facing a difficult decision, however. On significant quests, you'll encounter complex choices that force you to weigh the risks against the rewards, even as you try to stay true to your own vision of your character. Are werewolves heartless killers, or is there a method to their madness? Should you wholeheartedly embrace a political candidate, or will some unexpected information have you playing double agent--or just killing the opposition? Such open-ended quests have become staples in many similar RPGs, but few make these decisions feel so momentous. The anxiety that results when you encounter important choices is a result of superb writing and character development: When you care about your destiny, decisions have more weight

Even Dragon Age's initial moments present important decisions that affect how your adventure plays out. You'll customize your own avatar's look from a variety of presets, but more importantly, you'll choose a race and class. The choices may seem initially limited, but your options eventually expand. Later, you can choose up to two subclasses once you reach the necessary level requirements, and there are a few different means of unlocking additional skill trees. Your initial race and class choices don't just determine the kinds of skills and spells you will have access to, however; they influence how the first few hours of the game progress. You will experience one of six different "origin stories" that follow the events that lead you to the elite Grey Wardens. Every origin story leads to the same place, but that doesn't mean you leave these events behind for good. Characters you met early on will cross your path again, and crucial moments of your origin story will continue to haunt you. The varied origin stories not only provide plenty of replay value, but allow you to see familiar characters from a different angle. A prisoner you meet within a dank dungeon may not have much impact on you if you are playing as a Dalish elf, but if you play as a human mage, this encounter is a bittersweet reunion.

You aren't a lone adventurer, however. You can take up to three companions along with you, and eventually you will meet more willing (or unwilling, as the case may be) darkspawn slayers. You can switch out party members back at your camp or in other friendly areas. Party members you don't use will remain at camp, though they thankfully level up even when you don't take them along. Your comrades aren't just AI-controlled henchmen; you can take full control of any party member at any time, though how you do so depends on the platform. PC owners get the most versatile and rewarding experience in this regard. You can zoom the camera in to a close third-person view when exploring and conversing with non-player characters, or pull the camera back to a tactical view, which makes it a breeze to quickly and easily micromanage every spell and attack, in true Baldur's Gate tradition. On consoles, you always view the action from behind a single character, and you use a shoulder button to switch among them. It's a great way of experiencing the buzz of battle, though occasional pathfinding quirks are more apparent in the console versions, simply because you experience the action from a single perspective at a time, rather than while managing four characters simultaneously.

If you've played a BioWare fantasy RPG in the past, you'll feel right at home with the combat system. By clicking on your target or pressing the attack button, you don't just swing a sword, but you approach your target and queue up your attack. Once your party has gained access to a good number of spells, stances, and skills, battlefields explode with bright colors and raucous sound effects, and it's a lot of fun to switch back and forth between party members, managing your abilities and taking advantage of various spell combos to wreak havoc. There are dozens of different types of enemies to slice up, from giant spiders and darkspawn, to ghosts and walking trees, to demons and, of course, dragons. Allies will join you in the biggest battles, and the best of these, particularly those toward the end of the game, are thrilling. On the PC, they're particularly challenging, and many battles benefit from frequent pausing and tactical thinking, so that you can queue up attacks across your entire party. The same battles on consoles are noticeably easier.

Nevertheless, the Xbox 360 and PlayStation 3 versions have their challenges, and no matter which platform you choose, you can customize your cohorts' AI behavior to be more effective in battle. Using the tactics menu, you can set characters up to drink potions when their health gets low; have Morrigan cast helpful crowd-control spells when enemies are clustered together; and program sturdier characters to draw enemies' ire when more vulnerable party members are under attack. As you level up, you will earn additional tactics slots, allowing you to implement even more intricate actions. You can also apply basic behaviors to your team members, making them more aggressive or defensive, and you can switch them around on the fly if an experimental custom tactic isn't working as you intended. When things come together as you plan--such as when Morrigan freezes a hurlock in place and Alistair smashes it to smithereens--battles are even more rewarding.

All of these elements coalesce wonderfully, making for a memorable and exciting adventure that keeps you on the move. The flow of loot and pace of leveling are both highly satisfying, and because you have four active characters to consider (in addition to others back at the camp), you spend a lot of time poring over armor and weapon choices. The tempo is even quicker than the Dungeons & Dragons games that preceded Dragon Age, thanks to important tweaks that minimize downtime. For example, you do not need to rest between encounters to replenish your health and recharge your spells. Instead, health and stamina are replenished quickly once the skirmish ends, allowing you to string encounters together without unwanted breaks in between. Should a party member fall during battle, he or she will be resuscitated once the battle has ended, albeit with a stat penalty applied (though it can be cured with an injury kit). These factors, and more, give Dragon Age an excellent sense of forward direction.

All the spells, tactics, and skills sound like a lot to organize, but the interface does a great job of helping you keep track of things. The PC interface is brilliant, letting you browse through your inventory and tweak your quickbars quickly and easily. The console versions do a surprisingly great job as well, making it simple to sort through your quests, and to queue up actions while battle is paused. One particularly useful feature is the ability to identify inventory items as trash and sell them all with a single button press once you're back in town. There are some console-specific interface irritations that could have been cleaner, however. For example, identifying new codex (that is, lore) entries can be troublesome, because the list doesn't scroll down until your highlight cursor reaches the bottom of the window. As a result, you can't always distinguish new entries from old ones, which is an issue that doesn't plague the fantastic PC interface. The consoles' radial menu, on the other hand, is an excellent way of letting you access every battle skill, and it works somewhat like the similar interface in Mass Effect--albeit with a few more layers.

The differences between versions aren't limited to the interface. Dragon Age doesn't look amazing on the PC, but it's an attractive game nonetheless. Zooming from an isometric view to a third-person perspective is slick, and while environments don't hold up quite as well when viewed up close, they're consistently lovely when viewed from above. On the flip side, the Xbox 360 version looks positively disappointing. Textures are highly compressed and colors are washed out, though the upside is that this version maintains a smoother frame rate than on the PlayStation 3, where things might get jittery when swiveling the camera around. The PlayStation 3 version features higher-quality textures than those on the Xbox 360, better color saturation, smoother facial animations, and shorter load times. Minor visual hiccups, like corpses that disappear and reappear, are a bit more common on the PS3, however. The PC version is the superior experience, but if you're choosing between the two console releases, the PlayStation 3 has the upper hand. Some minor glitches are shared between the console versions, however, such as rare occasions when the soundtrack or voice-overs disappear. We also ran into a few quest malfunctions that could be replicated on all three platforms, though they were relatively minor and did not interfere with the progress of the main quest.

No matter which version you choose, however, there are plenty of audiovisual details to note. In many ways, Dragon Age looks and sounds like other high-fantasy games, but while the towers, forest paths, and underground caverns are what you've seen before, the art style is attractive, and a few sights, such as an underground dwarven city, are particularly eye-catching. Character models don't exhibit Mass Effect-level expressiveness, but they look good and animate smoothly enough. Also of note are the splatters of blood that appear on your party members after battle. It's a nice idea, but the splotches look like they've been splashed across you with a paintbrush. The crimson stains are a cool thematic touch, however, because blood plays an important role in Dragon Age. The sound effects are excellent, console glitches notwithstanding, and the soundtrack, while typical for a fantasy game, swells and murmurs at all the right moments.

Few games are this ambitious, and even fewer can mold these ambitions into such a complete and entertaining experience. You might spend 50 or more hours on your first play-though, but there are so many paths to follow, so many details to uncover, and so many ways to customize your party that you'll want to play again as soon as you finish the first time. PC owners even get an extra dash of depth via the downloadable toolset, which lets you create new levels, spells, skills, and even cutscenes. But any way you slice it, here's the fantasy RPG you've been waiting for, the one that will keep you up late at night, bleary-eyed, because you have to see what happens next. Like the best fiction, Dragon Age will sweep you up in its world, so much so that when you're done, you'll want to experience it all over again.



Source : GAMESPOT or LINK




Related Posts Plugin for WordPress, Blogger...