Wednesday, June 18, 2008

10 Langkah Mudah Ngecrack WPA

Dalam Video Di Tunjukkan Menggunakan Distro Whax(one Of My favour)

Tuesday, June 17, 2008

DIVShare Got Hacked last night

I receive this this email from divshare:


Thanks for being a part of DivShare. Late last night we were alerted of a security breach that allowed a malicious user to access our database, which included user e-mail addresses and other basic profile information. No financial information has been accessed by any unauthorized parties. We have taken extreme measures to secure the site in the last 24 hours and are currently in the process of rolling out new security precautions, which is why many files were unavailable earlier today. We apologize for this inconvenience and for the oversights that allowed this security breach to take place. We take the security of all data and files very seriously and are embarrassed and regretful that an intrusion was allowed to take place on our watch.

Please rest assured that no financial information whatsoever has been compromised. While we are not aware of what data has actually been accessed or copied, the database included user e-mail addresses and other data you may have saved to your profile, such as your first name. We are not aware of any files being accessed without permission, but we recommend that you change your account password and the passwords on any private folders as a security precaution.
We can’t apologize enough for allowing this breach to take place. We know how important security is for all our members and their files, and we are taking every precaution available to ensure that this doesn’t happen again. We ask for your patience as we roll out new security upgrades in the coming days, and we pledge to keep your files and user information under the tightest security possible from here on out.
Please don’t hesitate to contact us at support@divshare.com with any questions or concerns.


You see what i mean? so change your pass now, if you are one of divshare member and use same pass for another account.


Firefox aims for download record

So far Mozilla has not said exactly when on 17 June the attempt to break the record will begin. Firefox first appeared in early 2004 and since then has steadily eroded Microsoft's hold on the web browsing world.

"There is actually no record for the greatest amount of software downloaded in one day, so for 24 hours from the moment we push the bits live, that's when the countdown starts," he said.
Mr Kim said Mozilla had no specific target for the number of downloads it would like to achieve on the day but racking up five million would be "awesome".
By comparison, Firefox 2.0 registered 1.6 million downloads on the day it was made available on 24 October, 2006. More than 1.3 million people have pledged to download the new version on 17 June.

WEB BROWSER STATS
  1. Internet Explorer - 83.27%
  2. Firefox - 13.76%
  3. Apple Safari - 2.18%
  4. Opera - 0.55%
  5. Netscape - 0.14%
Source: OneStat



Friday, June 13, 2008

Domain cost

You can register a .com domain name with several very reputable registrars for, say, $6.99/yr to $9.99/yr. Fees for registering the other possibilities, .info, .co.uk, .net, .org, .biz, .tv can range from $0.99 per year to whatever the registering company wants to charge.

But is it going to be worth it? And where do you stop with the combinations? .com, .co.uk, .info and then there's the 'do I add a dash ( - ) just-to-be-on-the-safe-side.com, .org, .biz' ? I would say, probably not. The .com brand is so widely known that most people will automatically type in a .com extension on any website they are trying to find.


Private Registration

This option will keep your private details, name, physical address and email address unavailable to anyone checking the ownership of your domain on "Whois". Internet law requires that all information about domain registration be publicly available and "Whois" maintains the databases that hold this information.

If you buy a private registration, your details will not be available to just anyone who wants to check your domain for specific ownership. There are many domain owners who don't think this is necessary but, on the other hand, private registration can help you avoid spam, crank emails and unwanted phone calls.

It is worth bearing in mind that any emails you send from the US that are commercial in nature, like:

i) Promoting a product or affiliation
ii) Suggesting that the reader visit your sales page
iii) Offering a discount for purchasing some product

are required, by the US Can-Spam Act, to have your correct, physical mailing address visible to your email recipients and the correct email address you sent the advertisement from, so this kind of defeats the object of private registration in some ways.

Protected Registration

This form of domain registration protects you from inadvertent expiration of your domain registration, including credit card expiration, failed billing or outdated contact information. It also makes it more difficult to accomplish most malicious domain transfers by Internet predators. Effectively, your domain would be held for you until you renewed the registration.

It can cost more than $25 a year for this service, depending on who you are using for this protection. If you are a small marketing venture, selling a piece of software, an affiliate product or an ebook on a niche product, you may not need this upsell. However, if later your domain starts making lots of money, and you decide that you do need it, you can easily add it.

Business Registration

This level of domain registration keeps need-to-know information about your business in the Whois database. That information can include a map to your store, website photo, business description, phone number and links to vital pages of your website.

The vital information your customers might need to facilitate business deals with your business is visible to millions of searchers in the Whois domain name database.

Do you need it? That would depend on the nature and size of your business and your budget. This would be more of a marketing/budget decision. A small, start-up website selling one ebook would probably not need this additional service.

Buying expired domains

Creating a special brand for your business always involves spending a huge amount of money in active advertising and promotion. Further, advertizing a web portal to build a special brand around it is a time consuming task that demands hours of dedicated work. If you do not have these resources with you, you can always try and buy expired domain names that are capable of providing a corporate brand to the business. You can always create brand awareness, by choosing and buying an expired domain name that really carries and conveys the issue of what is the web portal all about and what it gives to its visitors.
Let us say that you have found a series of niche keywords on parenting keyword. Now, if you want to buy some expired domain names based on this special keyword, you will need to ensure that the chosen keyword can convey a distinctive and special corporate branding ability.
The selected expired domain name should not only have a good searching placement in many major search engines, it should also be memorable and easily recalled. To establish branding with the selected expired domain name, you may consider the following salient points:

a) Choosing a keyword that relates to everyday experience and feelings could be an intelligent thing. For example, BabyFeeding or BabyHealth can instantly create a good rapport between a mother and her child.

b) Choosing a keyword like MasterDegree will appeal to all those studious people, who wish to pursue their master degrees. Here, the selected keyword connects the inbuilt feelings of people with that of the expired domain name.

c) A keyword that is easily searchable is better than the one that is almost impossible to remember and search. For example, a keyword like MyFavoriteSoup is quite inferior to MySoup.

Establishing a brand and a corporate identity over your chosen expired domain is very difficult and time consuming. However, with careful planning and by applying your intelligence mind, you can buy an expired domain that will allow you to create a special brand and niche web portal.

Yahoo and his New partner: GOOGLE

Yahoo!'s efforts to revive takeover talks with Microsoft Corp. have reached a dead end, prompting the Internet pioneer to hire online search leader Google Inc. to handle some of its advertising sales.Yahoo! is trying to fend off a shareholder mutiny led by activist investor Carl Icahn, who has vowed to replace the company's board because of the way the directors handled the Microsoft negotiations.But Icahn has been hoping to engineer a sale to Microsoft, so some shareholders may be reluctant to support his attempted coup unless he can demonstrate that his slate of directors has a better turnaround plan than the current board.Icahn did not return phone calls seeking comment Thursday. The fate of Yahoo's board is to be determined at the company's August 1 annual meeting.
The news disclosed Thursday caused Yahoo! shares to plunge 10 percent as investors abandoned hope that Microsoft would renew a nearly five-month quest to buy the Sunnyvale, California-based company.

Thursday, June 12, 2008

World Cyber Games 2008 Begin


On 11 Juni 2008, The biggest competition will Begin At Jakarta Convention Center, with the PT. Telkomsel dan Samsung as the main sponcore, The winner will be send to the singapore on august. They wil playing game DoTA All Stars, HALO 3, Guitar Hero 3, Virtua Fighter 5, Need for Speed: Pro Street, dan FIFA 2008.
So are u interset?

Find A Proxy For Facebook

The number of web proxies is everyday increasing and more and more are being setup to earn revenues through advertisements. To search for proxies for websites like Facebook, you can use the search engines like Yahoo or Google. There are a number of websites offering these services and you can choose any of them as per your requirement. These proxies are Youtube and Facebook compatible and you can access any blocked site which is blocked by your school, university or company.

Proxies allow you to surf the internet with a high level of privacy, security and anonymity. When you access a website from the proxy server site, information like your browser type, location, operating system and IP address is eliminated and the proxy server website is recorded as the accessing computer instead of your computer. This helps you maintain the privacy, security and anonymity you desire, as it facilitates web browsing without your information being identified and bypasses the network filters and firewalls.
When you use a proxy server, your computer establishes connection with the proxy instead of the destination website, and thus the blocking or filtering firewall will be able to trace this connection only. Further this proxy server, which may be transparent or anonymous, will create a connection to the desired URL which you want to access such as Facebook.com, and retrieve that website, eliminating any trace of your computer.
The proxies allow users to browse through the Facebook website, profiles, post comments, blogs and surf the site for music. Sometimes, you may be required to use the IP address of the proxy (i.e. http://222.12.1.1), instead of the domain name, which can be retrieved by pinging the URL from command prompt.The process is very simple and convenient. You are not required to install or download any software to browse the blocked sites. All you have to do is type the desired URL (for example: www.facebook.com) on the main page and all connections and traffic to and from the destination URL is redirected via the proxy, making it look as if the traffic is evolving from the main proxy, thus bypassing the domain based URL filtering blocking system.
These proxies allow you to access any website without revealing your personal information, surf, download games and news, access online social networking websites and shopping sites, share videos, music, chat and a lot more.

Online Business is this safe?

You might think that your internet business is safer than it actually is. Because we often can't see or tell that someone is trying to hack into our systems - until it's too late - it's easy to be blissfully ignorant and assume that everything is okay. That's why it pays to sit down and analyze your whole business to see how well protected it really is.

The steps you can take vary from the most basic to the more advanced, which you will probably need help to achieve. Make sure you have the right anti-virus and anti-spyware software in place to protect you and perform your updates and scans on a regular basis. Make sure you have a secure firewall as well, since this will also help protect your data. If you employ a lot of people it is wise to make sure they are aware of the need to protect the business in every possible way. Don't assume that everyone knows what to do because not everyone does. It only takes one person opening an infected attachment on an email to cause havoc and lose you business as a result.

There is something of an assumption that hackers are only after personal information, but that isn't always the case. Some businesses have been the victim of hackers who have used their systems to distribute spam emails by the thousands, for example. If this happened to you, you can bet it would effectively shut down your website until the problem was sorted. Pure Hacking helps protect your Internet security by providing world-class penetration testing and ethical hacking risk management services. For a free consultation, please visit Penetration Testing.



Tuesday, June 10, 2008

The New Route to an American War with Iran

Although American attempts to convince US and world opinion of active Iranian involvement in attacks on American forces in Iraq have scarcely been more successful than the Bush administration's constant refrain about Iran's nuclear threat, some incident, real or contrived, may occur which will be used by Bush and Cheney to justify air strikes on Iran.

Initially, limited air attacks on Iranian military targets may not prove to be unpopular in the United States. Outsiders rarely grasp that hostility to Iran's revolutionary Islamic government is almost as deep-seated in many parts of the United States as hatred of the American 'Great Satan' is among much of the Iranian people. This is hardly surprising given that the Islamic Republic of Iran is the only country in the world which has humiliated not one but two US presidents: Jimmy Carter over the Tehran hostages crisis in 1979-81 and Ronald Reagan in the Iran-Contra affair of 1986-7.

Even many Congressional Democrats would no doubt be ready to support limited air strikes on Iran if the Iranians could be plausibly linked to incidents in Iraq in which American personnel had been killed. Whatever their reservations about the Iraq war, both Democratic presidential contenders, Hillary Clinton and Barack Obama, have been noticeably bellicose in their comments about Iran.

Once air attacks on Iranian military targets have begun, they would no doubt become a regular occurrence. American and world opinion would quickly become used to them, familiarity soon blunting initial outrage in most quarters. Like the intermittent Anglo-American air campaign against Saddam Hussein's Iraq during the 1990s, the air strikes on Iran would eventually seem unremarkable. Even Operation Desert Fox in December 1998, a series of major air attacks on Iraq in retaliation for Saddam Hussein's expulsion of UN weapons inspectors, excited only limited international indignation.

Not only would people become used to air attacks on Iran, lessening likely hostile reaction to a shift to nuclear targets, but the attacks themselves would prepare the way for later strikes on nuclear sites by steadily destroying Iranian defences. Anti-aircraft batteries, radar systems, and command and control facilities would have to be destroyed to ensure the safety of US aircraft hitting IRGC 'terrorist bases' however 'limited' the initial air strikes were said to be.

Once Iranian defences have been sufficiently degraded and diplomatic attempts to curb Iran's nuclear ambitions have failed, as they probably will, the Bush administration can easily switch to attacking Iranian nuclear sites in the knowledge that such attacks will provoke a much reduced level of international outrage.

Although most scenarios see the excuse for US air attacks on Iran as being an incident in Iraq involving the deaths of US ground personnel caused by Iranian weapons and/or forces, a maritime incident might have advantages for the United States. The most feared Iranian retaliation in the event of an American attack on the country is an attack on tanker traffic in the Strait of Hormuz which would send world oil prices rocketing into the stratosphere.

If a maritime incident set off hostilities between the United States and Iran, American naval forces in the Gulf could immediately seek to repeat their success in Operation Praying Mantis back in April 1988. On that occasion US forces crushed Iranian naval power in less than twenty-four hours.

Most large surface units of Iran's navy are obsolete, but in recent years Iran obtained three Kilo class diesel attack submarines from Russia. US naval commanders have expressed concern about the threat posed by these vessels to Gulf shipping and they will no doubt welcome the opportunity to destroy them as soon as possible.

Of course the Iranians have so far done their best to avoid provoking the Americans. The arrest of the British naval boarding party in March was a local IRGC initiative and the incident was soon brought to a close by the Tehran government before the Americans could exploit their ally's difficulty as an excuse for war. If a suitable incident does not arise soon, Bush and Cheney may have to create one to justify their planned attack on Iran. Perhaps US naval vessels will be sent into Iranian territorial waters in the hope of provoking a violent response. This was what was done in the Gulf of Tonkin in 1964 and resulted in the famous 'incident' which led to full American participation in the Vietnam War. Will the American Congress and people fall for the same trick a second time?

Getting SSH Proxy to Work Under Vista

Download putty first. Then created the Dynamic Port Entry like so:



and grabbed a copy of FoxyProxy for Firefox so that your proxies do the right thing on demand. All is well, except you're constantly getting "Empty return from Server" or "The proxy server is refusing connections", and now you're starting to really think hard about installing XP. (Granted, you probably should, but let's assume that's not an option.)

Well, turns out that Vista is again being "helpful". (i have a long standing hatred of things that are "helpful" because they usually just get in the way. While this can be cathartic when driving steam rollers, it's often less so when you're working on software.)

First, the proxies. Chances are VERY good that this is enough to get you going: You need to use 127.0.0.1 as your localhost address rather than localhost.

This is because Vista "helpfully" configures IP6 above IP4. (IP6's version of "localhost" is "::1:", but i'm pretty sure that putty will choke on that.)

Change your Proxy Host Name and things should work just fine.

If not, you'll need to punch a hole through your local firewall for that port. (thanks to The Great FB who provided that tip). To do that, you'll need to go to your Control Panel (seriously, switch to classic view. You're not an idiot.), Windows Firewall, then click on the Allow a program through Windows Firewall on the left side. (this will bring up the Settings/Exceptions tab) and [Add port...] Name: Proxy ; Port number: 1080 (or whatever port you're using) ; (*) TCP ;[OK]

That got me online and hopefully you too.

Wi-Fi Hacking (NEW) Tool

Wi-Fi hackers have gotten more advanced and your private information is even more at risk. The recent Black Hat conference in Las Vegas featured a demonstration by Errata Security that detailed how a hacker can use new tools to steal your encrypted cookies and passwords and then control your online sessions.

Errata has combated this new hack threat with their own tools, Hamster and Ferret, which prevent attacks. It appears that the good guys are following closely behind the bad guys but they’re still slightly behind and all Wi-Fi users need to be careful.

Online Casino Sites

According to popular casino reviews sections, another recent trend is on its way to become a decisive factor in the classification of the best-ranking online casinos. Statistics show that this trend is getting momentum now and is currently spiraling.

Namely, the tendency is that female players on top online casinos comprise a substantial part of all online casino players. Besides, the point is that female players have been claiming their intention to be a factor on classy online gaming sites. Encouraged by the lower costs of broadband internet and greater access, women players are acknowledged to continuously spend more time online, respectively more time gambling than men. In tune with this current trend, online casinos are adapting to cater for the growing demographics of female players.

Top online casinos are becoming regular at providing attractive bonuses and campaigns like weekly Ladies Nights promotions. All of these offer huge prizes to attract women players focusing on particular games craps, video poker, roulette.

Casino reviews reveal that women are frequenting mainly casino sites which offer social networking. Having in mind the idea of bringing more women players to their sites, many of the top online casinos have developed Ladies Only forums.
Many of these online casino sites have even established educational portals where they have placed information which helps the new players to learn all about how to play online. Statistics shows that these best-ranking online gambling sites are regularly bringing out new attractions to draw players by putting forward high-value prizes, free games and different kinds of competitions.

Sunday, June 8, 2008

Wireless Networks Are Everywhere

Where can you find the wireless networks, or electronic “highways,” to connect all of your devices? The answer is simple: everywhere. Wireless networks are an increasingly ubiquitous part of our existence.Satellite networks blanket the entire globe, touching just about everywhere that people live, and most places that they don’t (excepting only the North and South Poles). Closer to earth, terrestrial (ground-based) networks of all sorts cover homes, buildings, cities, and even wider areas. Wireless networks let you stay in contact, online, connected, entertained, and informed, no matter where you go.

Sunday, June 1, 2008

Spyware is one of the biggest threats

Spyware is one of the biggest threats to your privacy and the security of your data. It's also the number one cause of system slowdowns on computers because it uses precious system resources including RAM (memory) and hard drive space. Some Symptoms of Spyware, Adware, Malware Infection: The symptoms of a malware infection vary.
Spyware is one of the biggest threats to your privacy and the security of your data. It's also the number one cause of system slowdowns on computers because it uses precious system resources including RAM (memory) and hard drive space.

Malicious software may also shut down or disable your anti-virus program or your firewall program. It may prevent the normal activity of your anti-Spyware software. It may prevent you from accessing Task Manager or msconfig or regedit.
Adware programs may create new icons on the Windows desktop, task bar, or system tray. They may also create popup windows that you are unable to close. If your computer mysteriously dials the phone on its own, it may be infected with a porn dialing program.


Tuesday, May 13, 2008

Casino Reviews

Everyday, a bunch of casinos are making their way into the world of online casinos. Not every place in the globe has an in-house casino. Online casino gaming has opened the wonderful experience of casino gaming to people in the nook and corner of the world. Now, anyone can play and earn at a casino, no matter in which place of the world you are. You need not drive long to a casino to get that casino experience. Online casinos now give that real in-house effect with its many features like live chats, live dealers, the special casino effect sounds, dealer sounds, vivid graphics and much more. Get there and explore the amazing world of best online casinos.
There are hundreds of virtual casinos rated as top online casinos by the casino reviews articles available on the net. Those casinos offer a huge variety of appealing features and are getting more innovative in their desire to pull more online players.

Online casino games free have made the online gambling not only affordable but also easily accessible. With these free versions, the consumer requires no software as he can open the game easily and directly through browser window. This saves the labor of registration, fees as well as other expenses and thus makes the gaming fully a fun. Thus with free casino games gambling is like a video game that can be played anywhere anytime. In this way, the casino games can be spread throughout the world and can be played by those who have never touched the real casino table.


Friday, April 18, 2008

Tutorial john the ripper

Video ini hanya tutorial dasar tentang cara mendwonload serta menggunakan john the ripper sebagai pemecah password ;)


Sunday, April 13, 2008

Wireless gear

Wireless gear touches our lives in surprising ways. It’s not just computers and phones these days there’s wireless in everything from TVs and audio systems to planes, trains, and automobiles. To help you wrap your mind around the expanse of wireless, we take the time in this Part to lay out a vision of the wireless world. We talk
about where you find wireless and what flavor of wireless you can expect to find in each device and place. Then we spend some time looking at the nitty-gritty details about the standards and certifications — explaining key concepts like 802.11 and Wi-Fi — so that you’ll understand
exactly which pieces of wireless gear work together, and which don’t. We also review the pieces and parts that make up a wireless network. If you’ve already got a wireless network in place, you can skim through this quickly it’s always there for you to refer back to if you want. Finally, we review the equipment and services you need to connect your wireless networks to the Internet. Don’t underesti-mate the importance of this step — the value of your net-works increases exponentially as they are connected to other networks.

China as top carbon polluter

The research suggests the country's greenhouse gas emissions have been underestimated, and probably passed those of the US in 2006-2007.
Until now it has been generally believed that the US remains "Polluter Number One".

Next month's University of California report warns that unless China radically changes its energy policies, its increases in greenhouse gases will be several times larger than the cuts in emissions being made by rich nations under the Kyoto Protocol.

The researchers say their figures are based on provincial-level data from the Chinese Environmental Protection Agency.

Unlimited Bandwidth for Blogging

For recent years blogging is one of the most up-to-date things to do when people surf in the internet; almost everyone who in touch with internet such as teenagers, workers and school kids are familiar with blog. Blog is a tool to write their journal that you want and spread it to the world via internet. Not only that, the blog’s visitor could wrote comment about the blog’s entry they feel like commenting. It means, we can interract with blog owner for the article that we read.

With http://www.thoughts.com, blogging is very easy and simple, and there are lot of blog services in the internet. Some sites provide not only blog but also upload videos and photos where we could upload our favorite photos. We could also chat in thoughts forum, or community forum, where people choose topic for the day or the week and discuss it in real time.

Blogging is a very unique way to connect with people around the world. We were able to know there are others who share a similar way of think or way of life with us. We could also share our thoughts and knowledge in thoughts forum. Hopefully we will gain more information, and in some way, it good to shape our mind.

Using Domains Expired To Make Online Profits

If you have a series of domains expired at your disposal, you can earn some decent income by using the power of expired domain names. One of the best ways to earn a simple income is to sell it straightaway to an interested buyer. But, with this option, you may not really earn a large income. So, you will need to devise a strategy that will provide you an opportunity to earn more income. One of the most preferred ways of earning small incomes by using domains expired, is to park it with a parking service. Parking service provides you a facility, where you can create a simple web page to host your expired domain name. When online surfers click on your page, they will navigate to other useful web site that can provide very good services, sell excellent products or provide useful online information. For very successful click, you can earn a small income and when pooled, this can be a very big source of income to you.

Other simple methods include registering your domains expired with convenient PPC and affiliate engines that provide a tiny share of income that arises out of successful sales or clicks. You can also use a good expired domain name to build a web site, develop it with good content and later sell them at premium rates to any interested parties. These are some of the simple methods that allow you to use the hidden power of domains expired to make a large pool of income. If you are careful enough in using your expired domains, you can earn a hefty profit and a sustained residual form of income.

Thursday, April 10, 2008

Domain in science

Domain is the distinguished part of an abstract or physical space where something exists, is performed, or valid. For example, we may talk about: domain of interest, domain of activity. This concept is used in every branch/sector/field of human activity.

In biology, domain (also superregnum, superkingdom, or empire) is the top-level taxon of organisms in scientific classification, higher than a kingdom. Domain (or its synonyms) is the most inclusive of these biological groupings

In mathematics, a domain of a k-place relation L ⊆ X1 × … × X'k is one of the sets X'j, 1 ≤ j ≤ k
and can define to as:
In abstract algebra, a domain is a ring with 0 ≠ 1 such that ab = 0 implies that either a = 0 or b = 0 (the zero-product property). That is, it is a nontrivial ring without left or right zero divisors.

But ussualy we know domain as :
The address of a site, without the protocol, path, page or other items attached. For example, microsoft.com is a domain, however, a full URL could be http://www.microsoft.com/stuff/page.html



Saturday, January 12, 2008

Backup Your file

First Choose what device you will use to back up your data. The most common devices to back up data have been tape drives, zip drives and flash drives. More recently, CDRW drives (CD read/write drives) are being used for backups. Your decision will be based on how much data you need to back up, what devices you already have that could be used for backups, and whether or not you can purchase a new backup device.

The least expensive devices are Iomega zip drives and disks. Zip disks come in 250MB and 100MB sizes. You must buy a zip drive designed for 250MB disks to use 250MB disks. All zip drives can work with 100MB zip disks. Zip drives come with software for backing up data to zip disks or you can copy the folder that all your data is under ("My Documents" or "Documents and Settings" to a zip disk if it will all fit.

CDRW drives can be used like a 650MB floppy disk when using CDRW disks and packet writing software that comes with the drive. The disks you create will be readable only on other CDRW drives or CDR/DVD drives that support the multi-thread standard. All drives capable of reading CDRW disks require software to be installed that supports reading CDRW disks. You should use software that supports the UDF standard (most current CDRW packet writing software does) when writing files on your CDRW drive and install UDF reader software on computers with multithread CD or DVD drives that you want to read CDRW disks. Drives with early implementations of multithread may not be able to read CDRW disks even with UDF reader software installed. Free UDF readers are available from Ahead Software and Roxio. CDRW drives may come with backup or disaster recovery software but you should look carefully at the software bundled with a CDRW drive before purchasing it.

Unlike the previous devices, tape drives are designed specifically for backing up data. They hold more data, 4GB to more than 40GB, and require running a backup program both to backup or restore files. A tape drive cannot be used like a large floppy disk. Windows 95/98/ME does not come with backup software so you must use the software, if any, that comes with the tape drive, or purchase backup software. Windows NT has a backup program that works with most SCSI tape drives. Windows 2000/XP has a backup program that works with any removable media that can be written to from within Windows (e.g. zip, jaz, CDRW) and most tape drives. Tape is the least expensive media for very large amounts of data.