Posted by
Lalu Lintas on Sunday, September 2, 2012

This paper only discusses the differences of RAM / Memory DDR1 / DDR2 / DDR 3, because of most of us as beginners often do not understand the difference, and even differences in shape where?
The physical differences between [...]
More about → The difference between DDR RAM 1 / DDR 2 and DDR 3
Posted by
Lalu Lintas on Friday, June 15, 2012

Overclocking, for some, seems too good to be true, but it is very possible (and sometimes fun) to do. However, overclocking can have its consequences. When done improperly, damage may result in your system, and in the worst [...]
More about → How To Make Overclocking a Computer
Posted by
Lalu Lintas on Thursday, May 31, 2012

Corsair, a memory device manufacturer or commonly known as RAM announced a new product made, ie 3GHz Dominator DDR3 Platinum.
This flagship product featuring fiur printed circuit board (PCB) new, cooler layer of internal [...]
More about → 3GHz Corsair Dominator DDR3 Memory Announces Platinum
Posted by
Lalu Lintas on Sunday, May 27, 2012

some manufacturers Windows Phone (WP) is testing Windows Phone device 8 in Australia,some sources have said at least three manufacturers that test your Windows Phone 8 in the State Kangaroo. Indicates that the site, [...]
More about → Windows Device Tested in Australia 8 Moderate
Posted by
Lalu Lintas on Tuesday, May 8, 2012

There are currently more than 100 million users of Max OS X in the entire world, the numbers would continue to grow as well as the malware continues to grow. Until now, Mac OS X malware, including Trojans such as Mac OS [...]
More about → 10 Safety Tips for Mac
Posted by
Lalu Lintas on Friday, March 30, 2012

Western Digital today announced the next generation of its product line of portable hard drive, My Passport, by offering a new design and 2TB capacities for the first time.
My latest Passport offers automated backup software [...]
More about → WD Launches First External Hard Drive 2TB Capacity
Posted by
Lalu Lintas

Log in a single protocol that is used to access your Facebook or Google, suffered a security flaw can be exploited by the fraudsters.
The researchers from Indiana University and Microsoft Research said that, they found [...]
More about → Log In method Vulnerable Attacks Google and Facebook