00 Initial Pages.Qxd

Total Page:16

File Type:pdf, Size:1020Kb

00 Initial Pages.Qxd Fast Track to Freeware By Team Digit Almost everything we speak about here, we’ve provided on our CD/DVD for this month. Credits The People Behind This Book EDITORIAL Deepak Ajwani Editor Robert Sovereign-Smith Writer, Copy Editor Ram Mohan Rao Copy Editor Nimish Chandiramani Writer, Copy Editor Karmanya Aggarwal Writer Abey John Writer Srikanth R Writer Prakash Ballakoor Writer DESIGN AND LAYOUT Shivshankar Pillai, Vijay Padaya Layout Designers Sivalal S Layout and Cover Design Harsho Mohan Chattoraj Illustrator © Jasubhai Digital Media Published by Maulik Jasubhai on behalf of Jasubhai Digital Media. No part of this book may be reproduced, stored in a retrieval system or transmitted in any form or by any means without the prior written permission of the publisher. March 2007 Free with Digit. Not to be sold separately. If you have paid separately for this book, please e-mail the editor at [email protected] along with details of location of purchase, for appropriate action. Introduction No Strings Attached his little guide is indispensable, even though we’re saying it Tourselves! We simply must, because what we’ve put together here is a collection of freeware in all the categories of computer usage that matter, from an office suite to prank software you can use on a friend. It’s all there. Some amongst us have gone bad and prefer to pirate stuff, which we don’t like. We like our software either paid or free—and interestingly, there’s free stuff for almost everything you’d need to accomplish. Covered here are system tools, which affect every aspect of your computer; multimedia tools to play and manipulate your media files; software you’d use when connected to the Internet; applica- tions for your mobile phone; tools to increase your productivity, whether at work or at home; desktop enhancements and such; and developer tools. We’ve also thrown in a few free games, and a guide to where you can find entertainment online. Like we hinted at, the best thing about this guide is that you’ll want to install almost everything—unless you’re a pirate. Except for the chapter on “fun” software, every software we’ve covered here will be useful to most people. It’s not true in the software world that the best things come free, and we naturally have to admit that some freeware don’t per- form as well as their paid counterparts do. But that’s to be expect- ed, and the beauty of it, in fact, lies in the reverse assertion: some freeware are as good as their paid equivalents! Also, we should add that majority of what we present here is not “nagware,” software that prompts you to buy the full version. We’ve made a conscious effort to keep much of the nagware out, so you won’t feel any guilt pangs. We’ve made it simple for you—almost everything we speak about here, we’ve provided on our CD/DVD for this month, and some more— so you won’t need to download a thing. As you use these software, don’t forget to thank all those developers out there—if you can’t trace them and send them a postcard, a silent prayer of thanks will do! CONTENTS Chapter 1 Developer Tools 9 1.1 Integrated Development Environments 10 1.2 Other Tools 18 Chapter 2 Games 21 2.1 War§ow 22 2.2 KLUELESS 24 2.3 Nexuiz 26 2.4 Ac!dbomb 27 2.5 Area 2048 29 2.6 Neo Sonic Universe 31 Chapter 3 Multimedia 33 Chapter 4 System Tools 51 4.1 Clipboard Utilities 52 4.2 Windows Explorer Enhancements 53 4.3 Desktop Search Utilities 55 4.4 Privacy Tools 59 4.5 Anti-Spyware 60 4.6 File Recovery Tools 62 4.7 Partition Tools 64 4.8 Firewalls 65 4.9 Hardware Monitors 67 4.10 RAM Optimisers 68 4.11 Hard Disk Optimisers 68 4.12 An Encryption Utility 69 4.13 A Display Optimiser 70 4.14 Process Explorer 71 4.15 A System Tweaker: Fresh UI 72 Chapter 5 Internet Applications 73 5.1 Browsers 74 5.2 Download Managers 80 6 FAST TRACK 5.3 Internet Optimisers 82 5.4 Bandwidth Monitors 85 5.5 Offline Browsers 86 5.6 E-mail Clients 87 5.7 IM Clients 90 5.8 Anti-spam Applications 92 Chapter 6 Essentials 95 6.1 Opera 9.1 96 6.2 VLC Media Player 100 6.3 IrfanView 102 6.4 K-Lite Mega Codec Pack 104 6.5 Avast! Home Edition 4.7 105 6.6 Spybot Search & Destroy 1.4 107 6.7 ZoneAlarm 109 6.8 WinRAR 112 6.9 Winamp 5.32 116 6.10 Foxit Reader 2.0 Build 1316 117 Chapter 7 Commute Computing 119 7.1 Mobile Managers 120 7.2 Applications 129 7.3. Games 134 Chapter 8 Productivity Tools 141 Chapter 9 Fun Stuff 157 Chapter 10 Desktop Enhancements 173 10.1 Electronic Post-it Notes 174 10.2 Program Launchers 175 10.3 Virtual Desktops 176 10.4 Miscellaneous Applications 178 Chapter 11 Free Entertainment Online 181 11.1 Tools of the Trade 182 11.2 Copyright And Piracy 183 11.3 Content Sites 183 FAST TRACK 7 Developer Tools ot that programming itch? You couldn’t have had it at a better Gtime. Bar a few, most popular Integrated Development Environments (IDEs)—including Microsoft’s Visual Studio—have their own free versions. The Community wave is upon us, and software vendors are always looking to get the regular user into software development. There are also a bunch of tools to create your own installers and integrate with SourceForge (if you’re developing an open source project) as well. All you need is the talent! DEVELOPER TOOLS I FREEWARE 1.1 Integrated Development Environments If you’re building applications on complex platforms like C++, Java or .net, you could just use Notepad, but to get your work done faster, you’ll need an IDE. 1.1.1 Microsoft Visual Studio Express Editions In the spirit of encouraging bud- ding developers, Microsoft now releases its immensely powerful Visual Studio IDE free of cost as Visual Studio Express Editions, with the difference that instead of one suite for all platforms, you have to download a separate Express Edition for each lan- Nothing beats VCS if you’re a .net programmer guage you want to use. This month, you’ll find Visual C# Express Edition (we’ll call it VCS now) on our DVD. If you’re new to C#, you couldn’t ask for anything more. From the “starter kit” to the extensive documentation online and IntelliSense—the code-com- pletion engine—you’ll rarely, if ever, find yourself stuck in a bind. The default install comes with two starter kits— Fiddle with the starter applications to see what you can create Screensaver and Movie Collection. They’re fully-functional as is, so you can study the code for your own reference—it’s very well documented—or modify it to create your own customised application. Let’s mess with the Screensaver starter kit, for instance. 10 FAST TRACK DEVELOPER TOOLS FREEWARE I The following assumes you have Tip some basic knowledge of C#. To see all the files in your pro- Modifying Your Screensaver ject’s directory, use the Show All Let’s get started with a simple Files button in the Solution hack: changing the default Explorer—it’s the second one images in the screensaver. In from the left VCS’s Start page, click on Create (or File > New > Project) and select the ScreenSaver starter kit. You’ll see the project’s documentation page, which tells you how to use the project, get to the screensaver’s options and so on. We recommend giving this a good read—it also tells you which code file contains what and how the project itself is structured. The first thing you need to do is add (or remove) images in the project’s resources. In the Solution Explorer, expand Properties and double-click on Resources.resx to modify it. You’ll see a table with DefaultRSSText—ignore this for now. On the top left, you’ll find a button labelled Strings—click The graphical way to edit your project’s on the arrow next to it and resources. Resources.resx is actually just an XML file that points to the files— select Images. This is where you be they documents, icons or images can remove the two default images; use the Add Resource button and choose Add Existing File to add your own images. Now that you’ve changed the default images, you need to go change the code that calls it. Double-click on ScreenSaverForm.cs. You’re first taken to a blank Windows form—just right-click on this and select View Code (you can do the same from the Solution Explorer itself, instead of bothering with this). Go to the definition of LoadDefaultBackgroundImages()—this is the function that is called if you haven’t selected an image folder in the screensaver FAST TRACK 11 DEVELOPER TOOLS I FREEWARE options. You’ll see this code, which adds images from the project’s resources to the list of default images: backgroundImages.Add(Properties.Resources.SSaverBackground); Replace “SSaverBackground” with the name of your image— use one such line for each of your images. Voila! Obviously, there’s a lot more you can do—including adding support for multiple RSS Feeds, but the procedure is somewhat lengthy, and beyond the scope of this Fast Track.
Recommended publications
  • Die Kulturelle Aneignung Des Spielraums. Vom Virtuosen Spielen
    Alexander Knorr Die kulturelle Aneignung des Spielraums Vom virtuosen Spielen zum Modifizieren und zurück Ausgangspunkt Obgleich der digital divide immer noch verhindert, dass Computerspiele zu ge- nuin globalen Gütern werden, wie es etwa der Verbrennungsmotor, die Ka- laschnikow, Hollywoodikonen, Aspirin und Coca Cola längst sind, sprengt ihre sich nach wie vor beschleunigende Verbreitung deutlich geografische, natio- nale, soziale und kulturelle Schranken. In den durch die Internetinfrastruktur ermöglichten konzeptuellen Kommunikations- und Interaktionsräumen sind Spieler- und Spielkulturen wesentlich verortet, welche weiten Teilen des öf- fentlichen Diskurses fremd und unverständlich erscheinen, insofern sie über- haupt bekannt sind. Durch eine von ethnologischen Methoden und Konzepten getragene, lang andauernde und nachhaltige Annäherung ¯1 an transnational zusammengesetzte Spielergemeinschaften werden die kulturell informierten Handlungen ihrer Mitglieder sichtbar und verstehbar. Es erschließen sich so- ziale Welten geteilter Werte, Normen, Vorstellungen, Ideen, Ästhetiken und Praktiken – Kulturen eben, die wesentlich komplexer, reichhaltiger und viel- schichtiger sind, als der oberflächliche Zaungast es sich vorzustellen vermag. Der vorliegende Artikel konzentriert sich auf ein, im Umfeld prototypischer First-Person-Shooter – genau dem Genre, das im öffentlichen Diskurs beson- ders unter Beschuss steht – entstandenes Phänomen: Die äußerst performativ orientierte Kultur des trickjumping. Nach einer Einführung in das ethnologische
    [Show full text]
  • 06523078 Galih Hendro Martono.Pdf (8.658Mb)
    PANDUAN MIGRASI DARI WINDOWS KE UBUNTU TUGAS AKHIR Diajukan Sebagai Salah Satu Syarat Untuk Memperoleh Geiar Sarjana Teknik Informatika ^\\\N<£V\V >> ^. ^v- Vi-Ol3V< Disusun Oleh : Nama : Galih Hendro Martono No. Mahasiswa : 06523078 JURUSAN TEKNIK INFORMATIKA FAKULTAS TEKNOLOGI INDUSTRl UNIVERSITAS ISLAM INDONESIA 2010 LEMBAR PENGESAHAN PEMBIMBING PANDUAN MIGRASI DARI WINDOWS KE UBUNTU LAPORAN TUGAS AKHIR Disusun Oleh : Nama : Galih Hendro Martono No. Mahasiswa : 06523078 Yogyakarta, 12 April 2010 Telah DitejHha Dan Disctujui Dengan Baik Oleh Dosen Pembimbing -0 (Zainudki Zukhri, ST., M.I.T.) ^y( LEMBAR PERNYATAAN KEASLIAN TUGAS AKIilR Sa\a sane bertanda langan di bawah ini, Nama : Galih Hendro Martono No- Mahasiswa : 06523078 Menyatakan bahwu seluruh komponen dan isi dalam laporan 7'ugas Akhir ini adalah hasi! karya sendiri. Apahiia dikemudian hari terbukti bahwa ada beberapa bagian dari karya ini adalah bukan hassl karya saya sendiri, maka sava siap menanggung resiko dan konsckuensi apapun. Demikian pennalaan ini sa\a buaL semoga dapa! dipergunakan sebauaimana mesthna. Yogvakarta, 12 April 2010 ((ialih Hendro Martono) LEMBAR PENGESAHAN PENGUJI PANDUAN MIGRASI DARI WINDOWS KE UBUNTU TUGASAKHIR Disusun Oleh : Nama Galih Hendro Martono No. MahaMSwa 0f>52.'iU78 Telah Dipertahankan di Depan Sidang Penguji Sebagai Salah Satti Syarat t'nUik Memperoleh r>ekii Sarjana leknik 'nlormaUka Fakutlss Teknologi fiuiii3iri Universitas Islam Indonesia- Yogvakai .'/ April 2010 Tim Penguji Zainuditi Zukhri. ST., M.i.T Ketua Yudi Prayudi S.SUM.Kom Anggota Irving Vitra Paputungan,JO^ M.Sc Anggota lengelahui, "" ,&'$5fcysan Teknik liInformatika 'Islam Indonesia i*YGGYA^F' +\ ^^AlKfevudi. S-Si.. M. Kom, IV CO iU 'T 'P ''• H- rt 2 r1 > -z o •v PI c^ --(- -^ ,: »••* £ ii fc JV t 03 L—* ** r^ > ' ^ (T a- !—• "J — ., U > ~J- i-J- T-,' * -" iv U> MOTTO "liada 1'ufian sefainflffaft dan Jiabi 'Muhamadadafafi Vtusan-Tiya" "(BerdoaCzfi ^epada%u niscaya a^anjl^u ^a6u0ian (QS.
    [Show full text]
  • The Tweakguides Tweaking Companion Download Page, Or to the Main Tweakguides Page Without Seeking Written Permission
    WWW.TWEAKGUIDES.COM [Version 3.00 ‐ January 2006] T HE T WEAKG UIDES T WEAKING C OMPANION TABLE OF CONTENTS Table Table of Contents ........................................................................................................................................................... 2 of Copyright & Credits..................................................................................................................................................... 10 Contents Introduction................................................................................................................................................................... 11 Using this Guide .......................................................................................................................................................... 12 Basic Requirements ........................................................................................................................................................................................... 12 Different Versions of Windows ......................................................................................................................................................................... 12 Why is the Guide So Long? .............................................................................................................................................................................. 12 Recommended Software ..................................................................................................................................................................................
    [Show full text]
  • [Amok] S/N: 1299275 a Smaller Note 99 2.08 Firstname
    LETRA A A Real Validator 1.01 Name: ubique.daemon [AmoK] s/n: 1299275 A Smaller Note 99 2.08 FirstName: ViKiNG LastName: Crackz Company: private Street: ViKiNG Zip: 11111 City: Crackz Code: 19147950 Order: 97234397 A.I.D 2.1 s/n: AD6778-A2G0 A.I.D. 2.0.2 s/n: AD6778-A2G0T A+ Math 1.0 Name: (Anything) s/n: 8826829 A+ MathMAT 1.0.0 Name: TEAM ElilA s/n: 8826829 A-1 Image Screen Saver 4.1 s/n: B5K7ij49p2 A1 Text Finder 4.02 s/n: PCSLT3248034 ABCPager 1.6.4 Name: Sara s/n: 1DQDSSSSSSSS ABCPager Plus 5.0.5 Name: Sara s/n: M5N5SSSSSSSS Ability Office 2000 2.0.007 Name: Ben Hooks s/n: 12878044-01034-40997 Ability Office 2000 2.0.005 Name:Nemesis] Organization:TNT s/n: 15155445-37898- 08511 Ablaze Quick Viewer 1.6 Name: Hazard s/n: 81261184XXXXXXX Abritus Business 2000 3.02 Name/Company: (Anything) s/n: 1034-314-102 Abritus Business 2000 3.02 Name/Company: (Anything) s/n: 1034-314-102 Absolute Fast Taskbar 1.01 Name: (Anything) s/n: nxpwvy Absolute Security 3.6 Name: Evil Ernie 2K [SCB] s/n: GMKKRAPZBJRRXQP Absolute Security Pro 3.3 Name: C0ke2000 s/n: GPBKTCNKYZKWQPJ Absolute Security Standard 3.4 Name: Hazard 2000 s/n: ECHVNZQRCYEHHBB or Name: PhatAzz [e!] s/n: RBFXPLUMBPGDFYW Absolute Security Standard 3.5 Name: embla of phrozen crew s/n: LTPDTDMAEHNKNTR AbsoluteFTP 1.0 beta 6 Name: CORE/JES Company: CORE s/n: 00-00-000000 Exp: never Key: 1074 2875 9697 3324 3564 AbsoluteFTP 1.0 Final Name: CORE/JES Company: CORE s/n: 00-00-000000 Exp: Never Key: 1074 2875 9697 3324 3564 AbsoluteFTP 1.0 RC 11 Name: _RudeBoy_ Company: Phrozen Crew s/n: 02-01-
    [Show full text]
  • Introduction to Reconfigurable Computing
    Introduction to Reconfigurable Computing Introduction to Reconfigurable Computing Architectures, Algorithms, and Applications by Christophe Bobda University of Kaiserslautern, Germany A C.I.P. Catalogue record for this book is available from the Library of Congress. ISBN 978-1-4020-6088-5 (HB) ISBN 978-1-4020-6100-4 (e-book) Published by Springer, P.O. Box 17, 3300 AA Dordrecht, The Netherlands. www.springer.com Printed on acid-free paper All Rights Reserved c 2007 Springer No part of this work may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, photocopying, microfilming, recording or otherwise, without written permission from the Publisher, with the exception of any material supplied specifically for the purpose of being entered and executed on a computer system, for exclusive use by the purchaser of the work. To Lewin, Jan and Huguette for being so patient Foreword "Christophe Bobda’s book is an all-embracing introduction to the fundamentals of the entire discipline of Reconfigurable Computing, also seen with the eyes of a software developer and including a taxonomy of application areas. Reconfigurable Computing is a disruptive innovation currently going to com- plete the most important breakthrough after introduction of the von Neumann paradigm. On software to FPGA migrations a dazzling array of publications from a wide variety application areas reports speed-up factors between 1 and 4 orders of magnitude and promises to reduce the electricity bill by at least an order of magnitude. Facing the tcyberinfrastructure’s growing electricity con- sumption (predicted to reach 35–50% of the total electricity production by the year 2020 in the USA) also this energy aspect is a strategic issue.
    [Show full text]
  • Multiplayer Online Games Insecurity
    Multiplayer Online Games Insecurity [Re]Vuln Luigi Auriemma & Donato Ferrante Who? Donato Ferrante @dntbug Luigi Auriemma @luigi_auriemma ReVuln Ltd. – revuln.com – twitter.com/revuln – [email protected] 2 Who? ReVuln Ltd. – revuln.com – twitter.com/revuln – [email protected] 3 Agenda . Introduction Introduction on Multiplayer Games Security . Why games? . Possible scenarios . The market Finding Vulnerabilities . Game vulnerabilities . Welcome to the real world . What about the future? . Conclusion Considerations ReVuln Ltd. 4 Introduction . Games are an underestimated field for security . Number of online players: . 1,3,6,10,55,66,120,153,171,190,300,351,595,630,666,820,3003,5995,8778.. Number of online games . 1, 2, 3, 5, 8, 13, 21, 34, 55, 89, 144, 233, 377, 610, 987.. Think about games as possible attack vectors and players as possible targets… . You have thousands of attack vectors and millions of possible victims . Excellent and stealthy attack vector . Oh! Many games require Admin privs to run . Often because of anti-cheating solutions.. Thanks anti-cheating! :] ReVuln Ltd. 5 Why games? ReVuln Ltd. 6 Why games? . Two main entities/targets: Players Companies . Each of these targets has a different “attacker subset” . Mostly defined by interests.. ReVuln Ltd. 7 Why games? . Two main entities/targets: 1) Players 2) Companies Who wants to attack your game? Your roommate… Script Kiddies.. Rest of the world… He told you to stop wasting bandwidth! ReVuln Ltd. 8 Why games? . Two main entities/targets: 1) Players 2) Companies Who wants to attack your company? Script Kiddies.. Your competitors.. Others… They are everywhere ReVuln Ltd. 9 Why games? .
    [Show full text]
  • Bibliotekarstudentens Nettleksikon Om Litteratur Og Medier
    Bibliotekarstudentens nettleksikon om litteratur og medier Av Helge Ridderstrøm (førsteamanuensis ved OsloMet – storbyuniversitetet) Sist oppdatert 09.12.20 Mod (_dataspill) Forkortelse for “spillmodifikasjon” (“game modification”). Reglene, grafikken og/eller lyden i et dataspill forandres, altså modifiseres (Genvo 2002 s. 62). Aktiviteten kalles “modding”. En “ombygging” av et dataspill, vanligvis utført av fans og spredt over Internett. Mods gir ofte spillkarakteren flere nivåer og nye oppdrag å utfolde seg på og utføre. “In our understanding, the act of making mods is a practice that alters some game elements, and it comprises including something new in its structure or mechanics (add-ons), improving the game aesthetics, or even including new game levels and game contents.” (Oliveira m.fl. 2014) “In gaming, modification (mod) refers to the process of editing or changing the structure, syntax or code of a game. Modification is performed to change the operations of a game in par with the requirements, environment, or end result or experience. Modification is performed to allow a gamer to play a game different from its original released version. It is generally performed by end users or developers, and the modded version is considered as an unofficial version of the game. Typically, when a modification is applied to a game, the user or gamer can have better weapons, more game money, different background textures, stronger character health and any other characteristics specific to a game. Modification can be partial or total, or it may be used only to fix some bugs.” (https://www. techopedia.com/definition/3841/modification-mod; lesedato 08.11.16) “Modding, in the videogame world, is adding, altering, or purging content on a videogame, especially on the pc.
    [Show full text]
  • Shooter-Spiele
    Kein anderes Computerspiel-Genre wird in der Öffentlichkeit so kontrovers diskutiert wie Shooter-Spiele. In der politischen und pädagogischen Rhetorik ist seit einiger Zeit sogar von ›Killerspielen‹ die Rede. Dieser Band will einen Beitrag zum Verständnis dieser umstrittenen Spielformen leisten. Dabei geht es den hier versammelten Aufsätzen nicht allein um die Frage der möglichen ›Wirkungen‹ gewalthaltiger Spiele wie etwa Doom, Quake, Half-Life, GTA oder Counterstrike. Es geht darüber hinaus auch um die wissenschaftliche Analyse konkreter Spielformen, um Einsichten in die Ästhetik populärer Spiele sowie um die Frage nach den Diskursen, Aus- drucksformen und sozialen Gemeinschaften, die Shooter als Phänomene Shooter. Eine Multidisziplinäre Einführung Eine Multidisziplinäre Shooter. der zeitgenössischen audiovisuellen Kultur kennzeichnen. Damit gibt der Band einen Einblick in die Vielfalt aktueller Ansätze der Computerspiel- forschung und macht dadurch die Konturen eines noch jungen Forschungs- Matthias Bopp / Rolf F. Nohr / Serjoscha Wiemer (Hg.) feldes anschaulich. Berücksichtigt werden beispielsweise, pädagogische, psychologische, kunst- und kulturwissenschaftliche, enthnologische, dis- Shooter kursanalytische und medientheoretische Zugangsweisen. Eine Multidisziplinäre Einführung Bopp / Nohr / Wiemer Bopp / Nohr / Medien' Welten LIT Matthias Bopp / Serjoscha Wiemer / Rolf F. Nohr Shooter Shooter_Endversion.indd 1 05.05.2009 13:14:39 Medien ’ Welten Braunschweiger Schriften zur Medienkultur, herausgegeben von Rolf F. Nohr Band 12 Lit Verlag Münster/Hamburg/Berlin/London Lit Shooter_Endversion.indd 2 05.05.2009 13:14:55 Matthias Bopp / Serjoscha Wiemer / Rolf F. Nohr (Hg.) Shooter. Eine multidisziplinäre Einführung Lit Shooter_Endversion.indd 3 05.05.2009 13:14:55 Bucheinbandgestaltung: Tonia Wiatrowski / Rolf F. Nohr unter Verwendung einer Werbe- anzeige des Spiels Keeney´s Anti-Aircraft Machine Gun © J.H.
    [Show full text]
  • A Task-Based Study of Literacy Ecologies for Digital Composing
    Working in Patches, Groups, and Spaces: A Task-Based Study of Literacy Ecologies for Digital Composing Dissertation Presented in partial fulfillment of the requirements for the degree doctor of philosophy in the Graduate School of The Ohio State University By Julia Ann Voss, B.A., M.A. Graduate Program in English The Ohio State University 2013 Dissertation Committee: Beverly J. Moss, Advisor Harvey J. Graff Cynthia L. Selfe i Copyright by Julia Voss 2013 i Abstract Digital literacy learning has become a fundamental, mainstream concern for teachers and researchers because of the increasingly central roles played by writing in digital environments and multimodal composing in twenty-first century literacy and literacy instruction. Digital composing draws on many of the processes that apply to print composing (planning, drafting, revising, et cetera), but its medium makes additional technical and rhetorical demands on composers which print-based models of the composing process do not fully address. This study describes a process-based approach to group digital composing tasks that accounts for access to digital literacy resources, methods for sharing task responsibilities between group members, and workspaces for digital composing. The material resources (including hardware, software, and physical/virtual workspaces) and intellectual resources (the functional literacy skills to operate these material resources and the rhetorical sensibilities concerning design, mode, and audience according to which composers create digital texts) digital composing relies on recommend approaching digital composing tasks in terms of component parts, while situating these components within complex literacy ecologies. The case studies of student and faculty digital composing groups featured in this study focus on how groups approached and worked through their tasks.
    [Show full text]
  • This Month In
    This month in Features PCUG News & Services 8 Quake World 6 Membership Notes Andrew Clayton prepares us to be fragged Mike Burke with information for new members 12 Grolier Multimedia 27 Group Notices A review by Alan Tebb ACT Alive, Quiz Night and The Stuffers 15 Gloria’s Gaddings 28 Software Library News Gloria Robbins’ travels Phil Trudinger reviews a selection of software 16 CD ROM Column 36 The Internet Project Nick Thomson reviews recent CDs Iain Gould reports 20 Take Control 38 Internet Project Application John Saxon goes a step further Get connected with TIP 22 Corel Ventura 7 39 Member Services Ted Monaghan looks at DTP software Details of services available to members only 34 Qool URLs 39 Notice of Special Meeitng Jim Hume selects the best of the web Change is in the wind 40 What’s News? 42 Special Interest Groups Jim Hume keeps up with the latest Where the real action is 43 Training News Profile Low cost training for members 2 Editorial Information 44 Vendor Discounts How to contribute to Sixteen Bits Membership has its privileges 3 Contact Information 46 Members’ Ads How to contact us Check here first for bargains 4 Editorial 46 PCUG Membership Darrell Burkey The official membership form 4 President’s Letter 47 Help Directory Ann Byrne Stuck? Call the experts 5 Letters 48 Calendar From our readers... What’s on next month Advertiser & Product Information Inside Front Panther Publishing 7 InterACT Technology Group 9 Bettowynd, Sustance Pty Ltd, L&S Associates 11 Hi Micro, AB&T Systems 13 Software Shop, Creative Impulse 15 Spirit
    [Show full text]
  • Error:The Highly Unreliable Times
    Error:The Highly Unreliable Times This Week Updated 07/15/07 Version 0.0.0.14 Issue 3 Contact Us, Home, About Us, our Radio Show YOUR ADD HERE! The People or companies who wrote these articles can be found by clicking on the Title of the article if you have an Internet connection. Computer Rescue 1-208-750-5628 From The Editor Justin Breithaupt LEADING STORY PAYPAL WON'T PROTECT YOU! I am putting this story out because many of you don't know what you are getting into by using Paypal. Most people think they are protected by Paypal from Fraud no matter what. Here is a quote from Paypal's user agreement. “11.3 Qualification Requirements. In order to qualify for coverage under the Seller Protection Policy, you must meet the following requirements: a. You must have a Verified Business or Verified Premier Account at the time of the transaction, b. The transaction must be between a US, UK or Canadian buyer and a US, UK or Canadian seller, c. The payment must be listed as "Seller Protection Policy Eligible" on the "Transaction Details" page, or cleared by PayPal through Payment Review, d. You must accept a single payment from one PayPal Account for the purchase, e. You must not charge a surcharge for accepting PayPal, f. You must ship the purchased item to the address listed on the "Transaction Details" page, and that address must be identified as a Confirmed Address, g. You must ship the item to the buyer within 7 Days of receiving payment, h.
    [Show full text]
  • Computer Game Modding, Intermediality and Participatory Culture
    Computer Game Modding, Intermediality and Participatory Culture Olli Sotamaa University of Tampere, Finland [email protected] Introduction Artistic freedom. Do what you want. But just make sure that the money ain't gone. The Jam, All Mod Cons The lines by Paul Weller captured a moment in time in the late 70’s but interestingly they also reveal something of the dynamics of 21st century mod scene. And today, I’m not talking about kids wearing smart suits and riding fancy scooters but gamer-made modifications of computer games that are celebrated as a new medium for artistic innovation and simultaneously successfully used as a marketing strategy for new retail titles. The ways modding1 phenomenon links together media production and consumption clearly go beyond the simple oppositions of co- optation and resistance. In a larger scale a growing number of literature has lately identified the need for a closer integration of studies of media production and consumption. In obtaining a profound picture of the meanings attached to artefacts and media texts neither processes of production nor forms of consumption should be privileged. (du Gay et. al. 1997, Deacon 2003) In case of contemporary digital media defined as “interactive” and “multilinear”, all this sounds somewhat obvious. Take virtual worlds or mobile communication, active users and user communities constantly construct new ways of interpreting, using and manipulating the media environment. In context of computer games the involvement of the player becomes a fundamental feature: the result of the game is not determined beforehand but it is highly dependent on the skills and creativity of the player.
    [Show full text]