Congratulations!

[Valid RSS] This is a valid RSS feed.

Recommendations

This feed is valid, but interoperability with the widest range of feed readers could be improved by implementing the following recommendations.

Source: http://lohancomputers.blogspot.com/feeds/posts/default?alt=rss

  1. <?xml version='1.0' encoding='UTF-8'?><rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/" xmlns:blogger="http://schemas.google.com/blogger/2008" xmlns:georss="http://www.georss.org/georss" xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr="http://purl.org/syndication/thread/1.0" version="2.0"><channel><atom:id>tag:blogger.com,1999:blog-6760749866032358928</atom:id><lastBuildDate>Fri, 08 Nov 2024 15:02:17 +0000</lastBuildDate><category>Kill Virus</category><title>Computer Zone</title><description></description><link>http://lohancomputers.blogspot.com/</link><managingEditor>noreply@blogger.com (Computer for Us)</managingEditor><generator>Blogger</generator><openSearch:totalResults>9</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6760749866032358928.post-396764251608155559</guid><pubDate>Thu, 01 Sep 2011 18:21:00 +0000</pubDate><atom:updated>2011-11-01T13:42:08.288+07:00</atom:updated><title>Make Money</title><description>Need a Loan&lt;br /&gt;gif is the process by which a borrower applies for a new loan, and a lender processes that application. Origination fee generally includes all the steps from taking a loan application through disbursal of funds (or declining the application). Loan servicing generally covers everything after disbursing the funds until the loan is fully paid off. Loan origination is a specialized version of new account opening for financial services organizations. Certain people and organizations specialize in loan origination, with mortgage brokers and other mortgage originator companies serving as a prominent example. A Loan Origination Fee Is Often required and this is one of the legal / approved fee required of borrowers mostly by UK lenders. No other fee is expected from the borrower a Borrower has paid for this fee because it covers the originating and conclusion of the loan application.&lt;br /&gt;&lt;br /&gt;There are many different types of loans. For more information on loan types, see the loan and consumer lending articles. Steps involved in originating a loan vary by loan type, various kinds of loan risk, regulator, lender policy, and other factors.&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;http://www.liberty-loan.com/?ref=lohan01/&quot;&gt;Direct Loans&lt;/a&gt; are loans from the federal government for students and their parents to help pay for the cost of highgifer education. They are low-interest to help people afford to go to college or other accredited institution. The money is borrowed from the United States Department of Education, though the borrower may deal with a private business rather than the Department of Education.&lt;br /&gt;&lt;br /&gt;With Direct Loans, even if the student changes schools, there is one contact for loan information. Each company that provides Direct Loan service has a convenient website to check on the status of the loan and repayment information. Direct Loans offer a variety of different repayment plans, so borrowers can find a plan that fits their needs. The repayment plan can be changed if circumstances change for the borrower.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;On the standard repayment plan, the borrower will pay a set amount each month. Payments are at least $50 per month, and the borrower will have up to 10 years to pay off the loan. This is a good option for borrowers who can afford a higher monthly payment.&lt;br /&gt;&lt;br /&gt;Extended Repayment&lt;br /&gt;&lt;br /&gt;The borrower must have more than $30,000 debt from Direct Loans for the extended repayment plan. There also must not be an outstanding balance after October 7, 1998. This payment plan gives the borrower 25 years to repay the loan. Payments are either fixed or graduated.&lt;br /&gt;&lt;br /&gt;Graduated Repayment&lt;br /&gt;&lt;br /&gt;Payment start low and increase every 24 months. Repayment will take up to ten years. This is good for those who expect to start working with a low income, but gradually increase income over time.&lt;br /&gt;&lt;br /&gt;Income Contingent Repayment&lt;br /&gt;&lt;br /&gt;This plan bases the monthly payment off of your adjusted gross income, family size and the amount of the loan. If loans are not paid off in 25 years, the monies unpaid will be discharged.</description><link>http://lohancomputers.blogspot.com/2011/09/make-money.html</link><author>noreply@blogger.com (Computer for Us)</author><thr:total>1</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6760749866032358928.post-1651965561956482458</guid><pubDate>Mon, 01 Aug 2011 22:58:00 +0000</pubDate><atom:updated>2011-08-02T06:07:00.089+07:00</atom:updated><title>Download Cheat PointBlank terbaru</title><description>&lt;a href=&quot;http://forum.gemscool.com/thread-371321-post-3039601.html#pid3039601&quot;&gt;CHEAT POINT BLANK PERHATIAN BUAT GM&lt;/a&gt;!!!!!!&lt;br /&gt;&lt;br /&gt;G sangat2 prihatin dengan cheater yg semakin banyak.. Malam ini contohnya g main hampir di setiap room ada cheater....&lt;br /&gt;&lt;br /&gt;Pertanyaan yg mau g ajukan:&lt;br /&gt;1. apa ga da solusi buat basmi cheater??&lt;br /&gt;2. apa aja yg udah diusahakan untuk ngebasmi sampah2 tersebut??&lt;br /&gt;&lt;br /&gt;Pesan untuk GM:&lt;br /&gt;Maaf lancang... tapi g bener2 kecewa sekali karna performance kalian yg ga mutu!!! kalo emang udah ga sanggup mending dibubarin... atau segera cari cara buat BASMI CHEATER...&lt;br /&gt;&lt;br /&gt;MOHON DIPERHATIKAN!!!! JANGAN SAMPAI GAME YG ADA HANYA DIMAINKAN OLEH CHEATER DAN GEMSCOOL TERKENAL SEBAGAI PENAMPUNGAN CHEATER.... TERIMA KASIH... &lt;br /&gt;&lt;br /&gt;PERHATIAN BUAT GM!!!!!!&lt;br /&gt;&lt;br /&gt;G sangat2 prihatin dengan cheater yg semakin banyak.. Malam ini contohnya g main hampir di setiap room ada cheater....&lt;br /&gt;&lt;br /&gt;Pertanyaan yg mau g ajukan:&lt;br /&gt;1. apa ga da solusi buat basmi cheater??&lt;br /&gt;2. apa aja yg udah diusahakan untuk ngebasmi sampah2 tersebut??&lt;br /&gt;&lt;br /&gt;Pesan untuk GM:&lt;br /&gt;Maaf lancang... tapi g bener2 kecewa sekali karna performance kalian yg ga mutu!!! kalo emang udah ga sanggup mending dibubarin... atau segera cari cara buat BASMI CHEATER...&lt;br /&gt;&lt;br /&gt;MOHON DIPERHATIKAN!!!! JANGAN SAMPAI GAME YG ADA HANYA DIMAINKAN OLEH CHEATER DAN GEMSCOOL TERKENAL SEBAGAI PENAMPUNGAN CHEATER.... TERIMA KASIH... &lt;br /&gt;&lt;br /&gt;KECEWA DENGAN GM POINT BLANK&lt;br /&gt;&lt;br /&gt;TOLONG YA MAS GM,SAYA ADA SARAN NIH,SEHARUSNYA GAME POINTBLANK DI STOP DULU UNTUK SEMENTARA,SETELAH CHITER BISA DIBASMI,GAME BISA DI BUKA LAGI.KALAU SAYA BUKAN HANYA KECEWA MAS gm,TAPI SANGAT SAKIT HATI,KOK BISA SEOLAH-OLAH GM DIPERMAINKAN CHITTER,&lt;br /&gt;TERKADANG SAYA MENULIS CACIAN KE CHITTER SEWAKTU MAIN GAME,CONTOHNYA: &quot;PAKAI CHEAT=aNAK PELACOR&quot;,NGECHIT=ANAK PEREX&quot;.DLL,&lt;br /&gt;BEGITUHLAH mAS gm KELUHAN SAYA,SEYOGYANYA ANDA SEMUANYA(PEJABAT2 GM pb) MEMPUNYAI JALAN KELUARNYA.&lt;br /&gt;THANKS&lt;br /&gt;ATAU SEHARUSNYA POINTBLANK DIHACK AJA,BIAR GEMSCOL BANGKRUT??MUNGKIN INI IDE YG BAGUS</description><link>http://lohancomputers.blogspot.com/2011/08/download-cheat-pointblank-terbaru.html</link><author>noreply@blogger.com (Computer for Us)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6760749866032358928.post-5686879291029049563</guid><pubDate>Sun, 03 Apr 2011 19:12:00 +0000</pubDate><atom:updated>2011-04-04T02:28:29.957+07:00</atom:updated><title>Optimasi Point Blank Mikrotik</title><description>OPTIMASI POINT BLANK MIKROTIK&lt;br /&gt;&lt;br /&gt;setting ip firewall Mangle &lt;br /&gt;&lt;br /&gt;&lt;br /&gt;ip firewall mangle&gt; add chain=forward disabled=no action=mark-connection new-connection-mark=all-connection passthrough=yes src-address=192.168.0.0/24&lt;br /&gt;ip firewall mangle&gt; add chain=forward action=mark-connection connection-mark=all-connection dst-port=39190-49100 new-connection-mark=pb-connection passthrough=yes protocol=tcp src-address=192.168.0.0/24&lt;br /&gt;ip firewall mangle&gt; add chain=forward action=mark-connection connection-mark=all-connection dst-port=39190-49100 new-connection-mark=pb-connection passthrough=yes protocol=udp  src-address=192.168.0.0/24&lt;br /&gt;ip firewall mangle&gt; add chain=forward connection-mark=pb-connection action=mark-packet new-packet-mark=point-blank passthrough=no&lt;br /&gt;ip firewall mangle&gt; add chain=forward action=mark-packet new-packet-mark=all-packet passthrough=no&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Setting Queue tree&lt;br /&gt;&lt;br /&gt;queue tree&gt; add burst-limit=0 burst-threshold=0 burst-time=0 limit-at=0 max-limit=1M name=download parent=local priority=8&lt;br /&gt;queue tree&gt; add burst-limit=0 burst-threshold=0 burst-time=0 limit-at=0 max-limit=0 name=http-browsing parent=download  priority=8&lt;br /&gt;queue tree&gt; add burst-limit=0 burst-threshold=0 burst-time=0 limit-at=0 max-limit=0 name=point-blank-online parent=download priority=2&lt;br /&gt;&lt;br /&gt;this methods used Ip 192.168.0.0/24&lt;br /&gt; Good Luck&lt;br /&gt;source &lt;a href=&quot;http://feeds2.feedburner.com/AntivirusClinic&quot;&gt;here&lt;/a&gt;</description><link>http://lohancomputers.blogspot.com/2011/04/optimasi-point-blank-mikrotik.html</link><author>noreply@blogger.com (Computer for Us)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6760749866032358928.post-843965983582966762</guid><pubDate>Fri, 05 Jun 2009 13:46:00 +0000</pubDate><atom:updated>2009-08-11T03:45:44.599+07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Kill Virus</category><title>Kill Tati Love virus</title><description>to Kill Tati Love Virus,we can use Manual Proccess&lt;br /&gt;&lt;br /&gt;use task manager&lt;br /&gt;then Kill proccess tati.exe&lt;br /&gt;search in entire hardisk file.*scr (size 168 kb)&lt;br /&gt;then deleted it&lt;br /&gt;&lt;br /&gt;good luck............&lt;br /&gt;&lt;a href=&quot;http://akubisa.iblogger.org/stop-dreaming-start-action-aku-bisa.html&quot;&gt;Stop Dreaming Start Action&lt;/a&gt;</description><link>http://lohancomputers.blogspot.com/2009/06/hidden-folder-by-virus.html</link><author>noreply@blogger.com (Computer for Us)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6760749866032358928.post-822104897354641355</guid><pubDate>Tue, 03 Mar 2009 14:34:00 +0000</pubDate><atom:updated>2009-04-07T23:07:54.373+07:00</atom:updated><title>Virus Protection</title><description>Protect Your Computer&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Many Virus running by the internet access,from removable drive,disc and etc.Sometimes we had never know about it,but a virus never have a had mercy to us to stop the action(attack our Programs) you may believe it or not…..&lt;br /&gt;&lt;br /&gt;Many Big &lt;a href=&quot;http://www.zemax.com/&quot;&gt;Antivirus&lt;/a&gt; Company launch &lt;a href=&quot;http://www.tente.com/&quot;&gt;Antivus &lt;/a&gt;programs such as McAfee,Nod32,Kaspersky,Avast,Norton and etc.But is it enough to protect or Computer programs from Virus???You may answer it yourself.&lt;br /&gt;We should know that each Antivirus may have a weakness,yes it’s true.&lt;br /&gt;For example A antivirus can Kill Brontoks Virus,but it may can’t Kill others virus.From this case we know that Our Computers is still danger,so how to Resolved it????&lt;br /&gt;&lt;br /&gt;Virus make our program be slow and sometimes our &lt;a href=&quot;http://www.uti-report.com/&quot;&gt;progams&lt;/a&gt; couldn’t Run.&lt;br /&gt;We better&lt;a href=&quot;http://affiliatetracking.com/keywordcountry/a/lohan01/e/10&quot;&gt; check our programs&lt;/a&gt; who runnings.Check it out by TASK MANAGER.You can see all programs Run by our &lt;a href=&quot;http://h20271.www2.hp.com/SMB-AP/cache/346630-0-0-102-121.html?JumpID=ex_R4176_ID/en/SMB/PSG/Google_Printer_compare--business-computer/sem/20081212&amp;tafcjnef=fy09?http://clickserve.dartsearch.net/link/click?lid=43000000158757402&quot;&gt;operating system&lt;/a&gt;.Check your start up on your operating system by klick RUN – Type msconfig,in the&lt;br /&gt;Startup you can disabled your unwanted programs may contain Virus such as CKVO,MKAVO etc.Always &lt;a href=&quot;http://affiliatetracking.com/keywordcountry/a/lohan01/e/10&quot;&gt;update&lt;/a&gt; your Antivirus Software ,and don’t try to use 2 or more Antivirus software,One &lt;a href=&quot;http://www.zemax.com/&quot;&gt;Antivirus&lt;/a&gt; Software is enough or your Operating system will be more slow.</description><link>http://lohancomputers.blogspot.com/2009/03/virus-protection.html</link><author>noreply@blogger.com (Computer for Us)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6760749866032358928.post-4607948682971704893</guid><pubDate>Thu, 12 Feb 2009 05:42:00 +0000</pubDate><atom:updated>2009-02-12T13:29:10.746+07:00</atom:updated><title>Autorun Virus</title><description>How to easy Kill Autorun virus &lt;br /&gt;&lt;br /&gt;&lt;br /&gt;    What&#39;s that,Body?I think you&#39;re all know about this,isn&#39;t it?If we have a removable disk(USB Flasdisk,Memory Card) a problem will be appear,sometimes maybe.Try to plug your Removable disk to your Computer,if in the autoplay dialog appear &quot;Run The Program&quot; DON&quot;T TRY to Klick OK,but Klicks Cancel,Because if you klick OK,the VIRUS from inside of The removable disk will Run automaticly,believe me people.If the kind of virus is a litle Damn Virus,it will be Ok,but if it&#39;s a Dangerous Virus you can be stress,Your computer may can restart ASAP.&lt;br /&gt;&lt;br /&gt;So,How to Kill it???&lt;br /&gt;&lt;br /&gt;    Ok Body,just straight to the topic now.After you cancel the autoply your removable disk,klick your Computer,then in the task bar klick TOOL-FOLDER OPTION-VIEW.then in the box HIDDEN files and Folder Choose SHOW HIDDEN FILES AND FOLDER.then UNMARK hide extensions for unknown file types and then UNMARK hide protected operating system files. Then Klick OK.&lt;br /&gt;    The last important is change your removable Disk name.then open it up by using right klick on your mouse(Explore).Then after opening your removable disk,you can see   &lt;br /&gt;the autorun files and .....exe files,just deleted both of files,then closed your removable disk.safely your removable disk,unplug it,then plug it again,I am sure in the autoply dialog won&#39;t appear Run the Program.&lt;br /&gt;Do you Understant People....&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Ok,Good Luck and Peace Our Computer from the Virus</description><link>http://lohancomputers.blogspot.com/2009/02/autorun-virus.html</link><author>noreply@blogger.com (Computer for Us)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6760749866032358928.post-2456419408448097732</guid><pubDate>Mon, 09 Feb 2009 08:33:00 +0000</pubDate><atom:updated>2009-02-09T16:12:33.966+07:00</atom:updated><title>Virus Vs Antivirus</title><description>&lt;span style=&quot;font-weight:bold;&quot;&gt;How to enable hidden Files&lt;/span&gt;&lt;br /&gt;&lt;br /&gt; &lt;br /&gt;       We know that many virus is running by the internet connection,it can be dangerous virus or a damn litle virus.But,two kind of virus was exactly dangerous for our windows operating system,So...,How to solved it??&lt;br /&gt;&lt;br /&gt;      Firstly,You have to enable your hidden file option(on the windows task bar)tool-folder   option-view-Hidden files and folder&lt;mark show hidden...&gt; then unmark HIDDEN EXTENSIONS FOR KNOWN FIE TYPES-unmark HIDE PROTECTED OPERATING SYSTEM FILES)If it can&#39;t done you may try ANSAV antivirus(you can download it in the antivirus Download bellow),how to use it??&lt;br /&gt;&lt;br /&gt;Enable show hidden files by Ansav Antivirus:&lt;br /&gt;&lt;br /&gt;Run Ansav ,then Klick Plugin - Hidden Revealer-select target to be reveal-then klick start.After the process finish,check it out,Your Hidden system file will be appear.&lt;br /&gt;&lt;br /&gt;Try it,Body...</description><link>http://lohancomputers.blogspot.com/2009/02/virus-vs-antivirus.html</link><author>noreply@blogger.com (Computer for Us)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6760749866032358928.post-1375108435831875212</guid><pubDate>Sat, 31 Jan 2009 14:51:00 +0000</pubDate><atom:updated>2009-03-17T04:59:01.874+07:00</atom:updated><title>Viruses</title><description>&lt;p&gt;&lt;b style=&quot;&quot;&gt;&lt;span style=&quot;font-size: 14pt;&quot;&gt;Computer Virus&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;  &lt;p&gt;A &lt;b&gt;computer virus&lt;/b&gt; is a &lt;a href=&quot;http://astore.amazon.com/httphenriemul-20&quot; title=&quot;Computer program&quot;&gt;computer program&lt;/a&gt; that can copy itself and infect a computer without the permission or knowledge of the user. The term &quot;virus&quot; is also commonly but erroneously used to refer to other types of malware,adware and&lt;a href=&quot;http://astore.amazon.com/httphenriemul-20&quot; title=&quot;Spyware&quot;&gt; spyware&lt;/a&gt; programs that do not have the reproductive ability. A true virus can only spread from one computer to another when its host (some form of executable &lt;a href=&quot;http://astore.amazon.com/httphenriemul-20&quot; title=&quot;Code&quot;&gt;code&lt;/a&gt;) is taken to the target computer, for instance because a user sent it over a network or the Internet, or carried it on a removable medium such as a &lt;a href=&quot;http://astore.amazon.com/httphenriemul-20&quot; title=&quot;Floppy disk&quot;&gt;floppy disk&lt;/a&gt;, &lt;a href=&quot;http://astore.amazon.com/httphenriemul-20&quot; title=&quot;Compact Disc&quot;&gt;CD&lt;/a&gt;, or &lt;a href=&quot;http://astore.amazon.com/httphenriemul-20&quot; title=&quot;USB flash drive&quot;&gt;USB drive&lt;/a&gt;. Viruses can increase their chances of spreading to other computers by infecting files on a &lt;a href=&quot;http://astore.amazon.com/httphenriemul-20&quot; title=&quot;Network file system&quot;&gt;network file system&lt;/a&gt; or a file system that is accessed by another computer. &lt;o:p&gt;&lt;/o:p&gt;&lt;/p&gt;  &lt;p&gt;Viruses are sometimes confused with &lt;a href=&quot;http://astore.amazon.com/httphenriemul-20&quot; title=&quot;Computer worm&quot;&gt;computer worms&lt;/a&gt; and &lt;a href=&quot;http://astore.amazon.com/httphenriemul-20&quot; title=&quot;Trojan Horse (Computing)&quot;&gt;Trojan horses&lt;/a&gt;, which are technically different. A worm can spread itself to other computers without needing to be transferred as part of a host, and a Trojan horse is a program that appears harmless but has a hidden agenda. &lt;st1:City w:st=&quot;on&quot;&gt;&lt;st1:place w:st=&quot;on&quot;&gt;Worms&lt;/st1:place&gt;&lt;/st1:City&gt; and Trojans, like viruses, may cause harm to either a computer system&#39;s hosted data, functional performance, or networking throughput, when they are executed. Some viruses and other malware have symptoms noticeable to the computer user, but most are surreptitious. This makes it hard for the average user to notice, find and disable and is why specialist anti-virus programs are now commonplace.&lt;o:p&gt;&lt;/o:p&gt;&lt;/p&gt;  &lt;p&gt;Most personal computers are now connected to the Internet and to &lt;a href=&quot;http://astore.amazon.com/httphenriemul-20&quot; title=&quot;Local area network&quot;&gt;local area networks&lt;/a&gt;, facilitating the spread of malicious code. Today&#39;s viruses may also take advantage of network services such as the &lt;a href=&quot;http://astore.amazon.com/10aba-20&quot; title=&quot;World Wide Web&quot;&gt;World Wide Web&lt;/a&gt;, &lt;a href=&quot;http://feeds2.feedburner.com/blogspot/jhDO&quot; title=&quot;E-mail&quot;&gt;e-mail&lt;/a&gt;, &lt;a href=&quot;http://astore.amazon.com/10aba-20&quot; title=&quot;Instant Messaging&quot;&gt;Instant Messaging&lt;/a&gt; and &lt;a href=&quot;http://astore.amazon.com/10aba-20&quot; title=&quot;File sharing&quot;&gt;file sharing&lt;/a&gt; systems to spread, blurring the line between viruses and worms. Furthermore, some sources use an alternative terminology in which a virus is any form of self-&lt;a href=&quot;http://astore.amazon.com/multiehenrie-20&quot; title=&quot;Malware&quot;&gt;replicating malware.&lt;/a&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/p&gt;</description><link>http://lohancomputers.blogspot.com/2009/01/viruses.html</link><author>noreply@blogger.com (Computer for Us)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6760749866032358928.post-7491242209847331410</guid><pubDate>Sat, 31 Jan 2009 13:58:00 +0000</pubDate><atom:updated>2009-01-31T21:22:06.842+07:00</atom:updated><title>Computer History</title><description>&lt;span class=&quot;mw-headline&quot;&gt;&lt;font size=&quot;5&quot;&gt;&lt;span style=&quot;font-weight: bold; font-style: italic;&quot;&gt;History of computing&lt;/span&gt;&lt;/font&gt;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;p&gt;It is difficult to identify any one device as the earliest computer, partly because the term &quot;computer&quot; has been subject to varying interpretations over time. Originally, the term &quot;computer&quot; referred to a person who performed numerical calculations (a human computer&lt;a href=&quot;http://en.wikipedia.org/wiki/Human_computer&quot; title=&quot;Human computer&quot;&gt;&lt;/a&gt;), often with the aid of a mechanical calculating devices&lt;span style=&quot;text-decoration: underline;&quot;&gt;.&lt;/span&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/Mechanical_calculating_device&quot; title=&quot;Mechanical calculating device&quot; class=&quot;mw-redirect&quot;&gt;&lt;br /&gt;&lt;/a&gt;&lt;/p&gt; &lt;p&gt;The history of the modern computer begins with two separate technologies - that of automated calculation and that of programmability.&lt;/p&gt; &lt;p&gt;Examples of early mechanical calculating devices included the&lt;span style=&quot;text-decoration: underline;&quot;&gt; abacus&lt;/span&gt;, the slide rule and arguably the astrolable and the Antiklthera mechanism (which dates from about 150-100 BC).Hero of Alexandria&lt;a href=&quot;http://en.wikipedia.org/wiki/Hero_of_Alexandria&quot; title=&quot;Hero of Alexandria&quot;&gt;&lt;/a&gt;(c. 10–70 AD) built a mechanical theater which performed a play lasting 10 minutes and was operated by a complex system of ropes and drums that might be considered to be a means of deciding which parts of the mechanism performed which actions and when.&lt;sup id=&quot;cite_ref-2&quot; class=&quot;reference&quot;&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/Computer#cite_note-2&quot; title=&quot;&quot;&gt;&lt;span&gt;&lt;/span&gt;&lt;/a&gt;&lt;/sup&gt; This is the essence of programmability.&lt;/p&gt; &lt;p&gt;The &quot;castle clock&quot;, an Astronomical clock invented byAl-Jazari in 1206, is considered to be the earliest Programable analog computer.It displayed the&lt;span style=&quot;text-decoration: underline;&quot;&gt; Zodiac&lt;/span&gt;, the solar andLunar orbits, acrescent moo&lt;span style=&quot;text-decoration: underline;&quot;&gt;n&lt;/span&gt;-shaped po&lt;a href=&quot;http://en.wikipedia.org/wiki/Pointer_%28computing%29&quot; title=&quot;Pointer (computing)&quot;&gt;&lt;/a&gt;inter travelling across a gateway causing automatic door to open every hour and five robotic musicians who play music when struck by levers operated by a camshaft attached to a water wheel. The length of day and night &lt;a href=&quot;http://en.wikipedia.org/wiki/Night&quot; title=&quot;Night&quot;&gt;&lt;/a&gt;could be re-programmed every day in order to account for the changing lengths of day and night throughout the year.&lt;sup id=&quot;cite_ref-Ancient_Discoveries_3-1&quot; class=&quot;reference&quot;&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/Computer#cite_note-Ancient_Discoveries-3&quot; title=&quot;&quot;&gt;&lt;span&gt;&lt;/span&gt;&lt;/a&gt;&lt;/sup&gt;&lt;/p&gt; &lt;p&gt;The end of the Midle Ages saw a re-invigoration of European mathematics and engineering, and&lt;span style=&quot;text-decoration: underline;&quot;&gt;Wihelm Schickard&#39;s&lt;/span&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/Wilhelm_Schickard&quot; title=&quot;Wilhelm Schickard&quot;&gt;&lt;/a&gt; 1623 device was the first of a number of mechanical calculators constructed by European engineers. However, none of those devices fit the modern definition of a computer because they could not be programmed.&lt;/p&gt; &lt;p&gt;In 1801,Joseph Marie Jacquard made an improvement to the txtile loom that used a series of Punched paper cards as a template to allow his loom to weave intricate patterns automatically. The resulting Jacquard loom was an important step in the development of computers because the use of punched cards to define woven patterns can be viewed as an early, albeit limited, form of programmability.&lt;/p&gt; &lt;p&gt;It was the fusion of automatic calculation with programmability that produced the first recognizable computers. In 1837,Charles Babbage was the first to conceptualize and design a fully programmable mechanical computer that he called &quot;The Analytical Engine &quot;.&lt;sup id=&quot;cite_ref-6&quot; class=&quot;reference&quot;&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/Computer#cite_note-6&quot; title=&quot;&quot;&gt;&lt;span&gt;&lt;/span&gt;&lt;span&gt;&lt;/span&gt;&lt;/a&gt;&lt;/sup&gt;Due to limited finances, and an inability to resist tinkering with the design, Babbage never actually built his Analytical Engine.&lt;/p&gt; &lt;p&gt;Large-scale automated data processing of punched cards was performed for the U.S cencus in 1890 by &lt;span style=&quot;text-decoration: underline;&quot;&gt;tabulating machines&lt;/span&gt; designed by &lt;span style=&quot;text-decoration: underline;&quot;&gt;Herman Hollerith&lt;/span&gt; and manufactured by the computing tabulating recording corporation, which later became &lt;span style=&quot;text-decoration: underline;&quot;&gt;IBM&lt;/span&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/IBM&quot; title=&quot;IBM&quot;&gt;&lt;/a&gt;. By the end of the 19th century a number of technologies that would later prove useful in the realization of practical computers had begun to appear: the&lt;span style=&quot;text-decoration: underline;&quot;&gt; punchedcard&lt;/span&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/Punch_card&quot; title=&quot;Punch card&quot; class=&quot;mw-redirect&quot;&gt;&lt;/a&gt;, &lt;span style=&quot;text-decoration: underline;&quot;&gt;Boolean Algreba&lt;/span&gt;, the &lt;span style=&quot;text-decoration: underline;&quot;&gt;vacuum tube&lt;/span&gt; (thermionic valve) and the teleprinter.&lt;/p&gt; &lt;p&gt;During the first half of the 20th century, many scientific computing needs were met by increasingly sophisticated&lt;span style=&quot;text-decoration: underline;&quot;&gt; analog computers&lt;/span&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/Analog_computer&quot; title=&quot;Analog computer&quot;&gt;&lt;/a&gt;, which used a direct mechanical or electrical model of the problem as a basis for&lt;span style=&quot;text-decoration: underline;&quot;&gt; computation&lt;/span&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/Computation&quot; title=&quot;Computation&quot;&gt;&lt;/a&gt;. However, these were not programmable and generally lacked the versatility and accuracy of modern digital computers.&lt;/p&gt;</description><link>http://lohancomputers.blogspot.com/2009/01/computer-history.html</link><author>noreply@blogger.com (Computer for Us)</author><thr:total>0</thr:total></item></channel></rss>

If you would like to create a banner that links to this page (i.e. this validation result), do the following:

  1. Download the "valid RSS" banner.

  2. Upload the image to your own server. (This step is important. Please do not link directly to the image on this server.)

  3. Add this HTML to your page (change the image src attribute if necessary):

If you would like to create a text link instead, here is the URL you can use:

http://www.feedvalidator.org/check.cgi?url=http%3A//lohancomputers.blogspot.com/feeds/posts/default%3Falt%3Drss

Copyright © 2002-9 Sam Ruby, Mark Pilgrim, Joseph Walton, and Phil Ringnalda