|
Post by Spider on Jul 7, 2008 14:03:34 GMT -5
[/b] Internet Explorer 8 to have Anti-Malware protection[/center] On Wednesday, Microsoft announced new security features within the upcoming release of Internet Explorer 8 Beta 2. The features are designed to combat the rising tide of drive-by downloads and malicious scripts contained within carefully crafted links embedded in e-mail and Web pages.
Most of the new features require systems to be running Windows Vista SP1 or Windows XP SP3.
Perhaps the most anticipated addition is Internet Explorer's new antimalware protection. Opera 9.5 and Firefox 3 both recently added antimalware protection. Safari has so far not announced plans for similar protection. Using mostly its own antimalware technology, Microsoft will block emerging threats by masking the entire IE 8 browser screen with a warning to users. The addition of malware protection to the existing antiphishing protection will be re-branded as the Microsoft SmartScreen filter.
IE 8 Beta 2 will have a Cross Site Scripting (XSS) filter, preventing scripts within a link from executing on the browser.
Previously announced features include highlighting domain names from the rest of the URL (so you can visually see that you are on eBay.com, not some other site), and extended verification SSL.
Using Data Execution Protection (DEP) within Windows XP SP3 and Windows Vista SP1, IE 8 will scan downloads and block any that it deems dangerous.
(Credit: Microsoft) IE 8 Beta 1 has already introduced several changes when handling ActiveX components. Components will be installed per user, which eliminates the need for everyone to have administrator privileges. In addition, you must acknowledge or opt-in for the component to run, eliminating drive-by downloads. Components will be per site and will only be available from site of origin. Finally, site developers can request killbits from Microsoft which can be sent via Windows Update to terminate risky or outdated components.
For developers, Microsoft is including improvements for better communication between the client browser and Web server. Cross Domain Requests (CDR) is a more secure way for the browser to pull data from other domains; and Cross Domain Messaging (XDM) is a more secure means for a browser to send a message across a domain. Microsoft says it is working with other browser vendors to standardize these.
The public Beta 2 for Internet Explorer is expected sometime in August 2008. See comments for further insight into IE 8 Anti-Malware. __ 'S' [/b][/size] [/center]
|
|
|
Post by Cobra on Jul 7, 2008 18:05:31 GMT -5
I run both IE 7 and FireFox. Just depends on what web pages I'm going too. I like what I have read of IE 8, I can't wait for it to come out.
|
|
|
Post by Spider on Jul 7, 2008 20:39:41 GMT -5
I run both IE 7 and FireFox. Just depends on what web pages I'm going too. I like what I have read of IE 8, I can't wait for it to come out. I have IE 7 also and am looking forward to IE 8 as well. Just curious .. Why do you run both types of browsers? __ 'S'
|
|
|
Post by Cobra on Jul 7, 2008 21:22:35 GMT -5
I like Explore best, but some pages load slow with it, especially if it has a lot of photo's on the page; FireFox loads pretty fast on the pages that IE loads slow on. My wife only uses FireFox and somehow got me to using it. We have DSL connection, but still on some pages Explore takes its on sweet time. Like I said, depending on what web sites I'm going too, depends on which browser I'll open.
|
|
|
Post by Spider on Jul 7, 2008 21:35:41 GMT -5
That's good to know ... I've never used FireFox myself but a lot of folks swear by it. Here's a link to FireFox, for those that want to know more about it. __ 'S'
|
|
|
Post by Spider on Jul 12, 2008 4:44:43 GMT -5
Globetrotting YouTube dancer shares his tech secretsBy: Greg Sandoval | 3 comments July 10, 2008Sure, the YouTube video "Where the Hell is Matt 2008" is clever and even inspirational, but what's been overlooked in all the hoopla over the clip is how technology has contributed to its popularity. Matt Harding first earned fame two years ago by filming himself dancing in exotic locales all over the world and posting the video montage to YouTube. Everyone from the The New York Times to National Public Radio has swooned over Harding's latest clip since it first appeared on YouTube three weeks ago. In less than a month, the video has been viewed more than 5 million times. While much of the mainstream press is just discovering Harding, he has been well known among the early adopter crowd for some time. His first installment of "Where The Hell Is Matt" was one of YouTube's earliest viral-video blockbusters. In an interview with CNET News, Harding, a former video-game developer, describes himself as a tech enthusiast and credits software, gadgets, and the Internet with helping to turn his videos into blockbusters. MORE ON MATT & THIS NEW TECHNOLOGY THAT U CAN PURCHASE FOR CHEAP__ 'S'
|
|
|
Post by Spider on Jul 17, 2008 20:41:10 GMT -5
Source
Five tips for better photo composition
Often, the difference between a good photograph and a great one . is how you compose the image in the camera's viewfinder. .. Here are five ways to instantly improve the composition of your photos.
1. Apply the Rule of Thirds.
Apply the Rule of Thirds for a more interesting composition. . Imagine a grid drawn over the image. .. Position the focal point of your photo at the point ... where two lines intersect--anywhere but the middle. 2. Use lines to lead the viewer into the photo.
Lead your viewer into the image. . Use lines to lead the viewer's eye into the photograph. .. These can be fence lines, rows of light posts, stairs ... or a roadway leading into the scene. 3.Explore unique angles.
Find a way to position your subject from a different angle than just straight ahead. . Capture a portrait in a car mirror or a city streetscape reflected in a puddle of water or a shop window. 4. Get in close to the subject.
Your subject is usually more important than the background, so move in closer. . Use the camera's Macro feature so the subject remains in focus. .. (usually represented by a flower icon on a digital camera) 5. Get down low for children and animals.
Get down low when photographing children, small animals or even flowers. . (Get down to their level so you look at them and not down on them)
__ 'S'
|
|
|
Post by Spider on Jul 22, 2008 14:39:34 GMT -5
WinDirStat 1.1.2Professional Drive Analysis For Free [/color][/b] Identify how much disk space you're using with WinDirStat. Based on the Linux application KDirStat, this great piece of freeware offers you an informative visual display of your hard-drive usage. It can also analyze your local devices.
Depending on the size of your disk, the initial WinDirStat scan may take quite a while, so be prepared to go grab a cup of coffee for 5 to 10 minutes.
When you return, you'll see all of your files (for the drive or directory you decided to scan) displayed in a rainbow of colors.
WinDirStat assigns colors to each file type, such as MP3, ZIP, EXE, JPG, and so on.
By default, the files that take up the most space are colored blue, the second heftiest are red, and the third largest green.
After the first 10 color-labeled file types, the rest appear in gray-- but you can change these settings and colors through the Options menu.
Once you've identified where your disk space has gone, you can then more easily decide where you can save space.
WinDirStat is loaded with features for managing your files, such as the ability to automatically delete files without even bothering with the Recycle Bin.
It's one of those tools that you didn't know you needed until you started using it, but once installed, it's hard to imagine life without it __ 'S' [/size][/color][/center]
|
|
|
Post by Spider on Jul 28, 2008 13:27:43 GMT -5
There's a new search engine in CyberSpace A BIG new search engine is launching Monday (today) [Clic Logo and try it out] Developed and run by the husband-and-wife team of Stanford professor Tom Costello and former Google search architect Anna Patterson. It's pitched as bigger, faster, and better than Google's flagship search engine in pretty much every way. See video interview with Tom Costello. The service also displays images from Web results whenever possible. It all adds up to search results pages that are much more attractive, and useful, than Google's. 'Cuil' will launch on Monday, and in a refreshing (and gutsy) move, the site is just plain launching. There's no weasely "beta" tag applied to the service. Costello thinks it'll be good enough to use from day one. It won't, though, be as complete as Google. While Google has had failures in extending its brand (Froogle, Google Base), its collection of services that are affiliated with its mainstream search product (like Google Maps, Image Search, and desktop search) can make switching away from Google difficult for users. Costello realizes that 'Cuil' needs to layer in additional services, but as he said, the company has to start somewhere. Upshot: 'Cuil' is certainly worth trying out. And if you like services to put it in front of your face a browser toolbar, and widgets are coming soon. I'm definitely going to try it out. Who knows - It may be even better than Google. __ 'S
|
|
|
Post by Spider on Jul 31, 2008 12:26:44 GMT -5
Bluetooth Headset Basics Bluetooth headsets, which offer a convenient and easy-to-use wireless connection between a headset and a Bluetooth-enabled cell phone, are now an "in" feature for frequent gabbers. To help you get familiar with Bluetooth, here's an overview of the technology and products. Bluetooth headsets have become must-have accessories for cell phone fanatics. The benefits of these hands-free, wireless devices are obvious, particularly in the wake of state and local laws that require the use of a headset while driving. And just as the number of headsets has exploded, the number of Bluetooth cell phones has increased as well. Integrated Bluetooth is now present in a broad range of cell phones--from high-end smartphones to low-end functional models. Of course, cell phone Bluetooth usage is not limited to just headsets. You can also use Bluetooth to stream music wirelessly, connect to the Web, transfer files, and more. Here are the basics you need to know ... Read more. ____________ __ 'S' [/color][/center]
|
|
|
Post by Spider on Aug 2, 2008 14:20:20 GMT -5
'TRY IT - YOU'LL LIKE IT' (clic logo)
Resnooze puts helpful nags in your e-mail
If you're wary of using silly things like calendars to keep track of to-dos and reminders, Resnooze is worth checking out .
This tool lets you schedule in weekly, daily, and monthly reminders to do something at a later date.
Every time you get said reminders delivered to your in-box there are three simple options to get rid of it, or be reminded yet again--either a week or month from then.
Used reminders are set up in a small queue where you can tweak their frequency or get rid of them entirely.
What's nice is that it will automatically register you for an account the first time you make a reminder, making it easy to come back later to add and remove planned reminders.
For now, Resnooze is limited to e-mail nags, so if you're looking for a more intrusive solution you might want to use Google or Yahoo's calendar tools, both of which include mobile SMS and instant-messaging reminders, although neither has the option to "snooze" a reminder for a later date.
To set reminders, you just drop in what you want to remember and at what frequency. Once it's been made, you can go back in and edit the dates. __ 'S'
|
|
|
Post by Spider on Aug 6, 2008 12:48:47 GMT -5
[Clic Pic] In-flight Wi-Fi to take off with Delta Delta Air Lines passengers will get Wi-Fi access on all domestic flights by the middle of next year, the company said Tuesday.
Several other airlines, including American Airlines, Virgin America and JetBlue, have announced similar in-flight Wi-Fi plans, but Delta's roll-out is among the most aggressive plans announced.
Delta Air Lines will begin offering Wi-Fi throughout its domestic fleet by mid-2009. Specifically, the Atlanta-based airline plans to outfit its domestic fleet of 330 aircraft with Wi-Fi, which amounts to around 60 percent of Delta's seats flown every day. The service won't be available aboard Delta's smaller aircraft, which typically seat 50 to 75 people.
The wireless service, which will allow people to connect to the Internet via Wi-Fi-enabled laptops, PDAs, or smartphones, will cost $9.95 on flights of three hours or less, and $12.95 on flights of more than three hours. The airline is partnering with Aircell, which also supplies in-flight Wi-Fi technology to other carriers, such as American Airlines and Virgin America.
Virgin America has said it will offer the Aircell Gogo service in the fall. And like Delta, it is already planning a massive roll-out. It hopes to have its entire fleet Wi-Fi-enabled by April 2009.
But other airlines are still testing the in-flight service and haven't yet announced plans for massive deployment. JetBlue has been testing a free Wi-Fi service since December on one plane that flies between New York City and San Francisco.
American Airlines, which announced its service more than a year ago, is currently testing the service. It expects to offer Wi-Fi on only 15 planes that fly its transcontinental routes later this year.
US Airways said it will offer Wi-Fi service on a trial basis on one Airbus aircraft in the fall. And Southwest Airlines is using a satellite-based service from Row44 to provide Internet access on four planes on a trial basis.
Other major airlines--including Northwest Airlines, United Airlines, and AirTran Airways--have not announced plans to offer in-flight Wi-Fi, according to the Associated Press.
Airlines have been talking about offering in-flight broadband for years. But so far the service hasn't really caught on. Boeing first offered the service called Connexion, which debuted in 2004 on a few international carriers including Lufthansa, SAS, All Nippon Airways, Japan Airlines, and Singapore Airlines.
Boeing canceled the service in 2006 when the company was unable to find business among domestic airlines. A big problem with Connexion was that the entire system was bulky and weighed around 400 pounds, making it nearly impossible for it to be used on smaller domestic planes.
The Aircell Wi-Fi technology is much easier and cheaper to deploy. But with fuel prices at all-time highs, it's difficult to say whether airlines will find wireless broadband services lucrative enough to spend the necessary capital to upgrade their plans with routers and power outlets for passengers.
__ 'S'
|
|
|
Post by Spider on Aug 8, 2008 12:52:51 GMT -5
Clic Pic for Comments & ArticleMuch ado about the iPhone's 'Kill Switch'Posted by Tom Krazit | 48 comments The discovery of a "kill switch" inside the iPhone 2.0 software prompted much consternation and little fact-finding. Apple's iPhone "kill switch" has prompted much hand-wringing, despite the fact that no one knows exactly what it does. Jonathan Zdziarski, an independent iPhone developer and author, recently discovered a URL while poking around inside the iPhone 2.0 software that downloads a list of "malicious" applications every so often to the iPhone, as noted by Ben Wilson at our sister site iPhone Atlas. Several outlets quickly seized on this detail as proof that Apple is poised to remotely disable any application running on the iPhone that it finds unpalatable. Before we get into the ways in which Apple might use the blacklist, let's remember that we don't know a damn thing about how this actually works. "All we know is that the iPhone downloads a list of malicious URLs," Zdziarski said in an e-mail exchange Thursday morning. "For all we know, it could trigger world war 3, or it could cause some computer somewhere to spit out recipes for buttermilk pancakes." There are several explanations for what Apple might be up to. One possibility is that Apple could use this function as a sort of recall notice for applications that were discovered to be malicious or potentially harmful after making it through the initial screening process. Apple is requiring developers to sign their iPhone applications so that the authors can be tracked, and is vetting every single iPhone application before it is distributed through the App Store. But if Apple later realizes it has to revoke a developer's signature because that developer created a malicious app that slipped through the cracks, that would only prevent new installations of that application. It wouldn't do anything to help the users who have already downloaded that application, but a recall notice (and a refund) would indeed be helpful if the initial round of quality control fails. Another possibility is that Apple could use this service like an antivirus application, which periodically downloads a list of known Trojans, malware, or other malicious applications and alerts the user. This is perhaps a little more far-fetched at this point, since Apple controls the iPhone development process so tightly, but perhaps one day they plan to open up the process more broadly to where iPhone applications can be distributed through something other than the App Store. Larry Dignan at ZDnet points out that Apple could have included this function as a nod to enterprise customers who might want tight control over what applications are installed on their handsets. Many corporate IT shops don't even allow people to install unapproved applications on their PCs, and you can bet those folks would want to control what gets installed on one of their iPhones. All iPhone applications are supposed to pass through the App Store, but what it something malicious slips through the cracks? And, of course, there is the possibility that Apple could use this blacklist to disable any applications that it decides are violations of its (or its carrier partners') terms of service, or ones that compete with current or future Apple applications. This theory is not entirely the work of paranoid conspiracy theorists, as Apple's tight-fisted control over the iPhone development process chafes many developers who might be tempted to strike out on their own with applications that go after Apple's core businesses, such as iTunes. Zdziarski noted that any "truly malicious software is going to find a way to burrow deeper into the iPhone's operating system so that a simple mechanism like this wouldn't affect it... so really the only type of applications this could effectively kill off are applications that are annoying to Apple, but not malicious. That certainly calls for a lot more concern." But the thing is, we just don't know. Until Apple explains why it has included this function, or an application appears on the blacklist and is wiped from someone's phone, it's all just the usual leaping to conclusions on a sleepy day in August. __ 'S'
|
|
|
Post by Spider on Aug 26, 2008 12:52:31 GMT -5
[Clic Pic for:] [Article, Links & Comments] Stealing Wi-Fi: If you can, you shouldn'tBy: Matt Asay | 30 commentsThere are lots of things in life that I can do, but there is a more constrained number of things that I should do. This post on Lifehacker about how to steal Wi-Fi access reminded me of one more "can but should not" item to add to the list. Apparently, someone figured out a way to trick Wi-Fi networks at airports with a "?.jpg" addition to URLs. The access-gaining trick works only on those networks that "allow images to go through without a redirect," but that's not really the point. It's similar to adding Boingo Wireless' URL suffix for free iPhone access on standard connections to get 15 minutes of free Wi-Fi. In both cases, it's theft, plain and simple. Some will use the rationalization that "Wi-Fi is overpriced and so people should steal it." This reminds me of the old argument that I should be able to download any songs off LimeWire that iTunes didn't allow me to buy. Shame on those artists for not letting me buy songs in a way convenient for and preferable to me! I've come to see that I was wrong. Yes, I do think all media should be available for purchase online, and at reasonable pricing. Just as I think Wi-Fi should be ubiquitous. But somehow, stealing it doesn't seem like the right way to get to that conclusion. The fact that we can doesn't mean that we should.
__ 'S'
|
|
|
Post by Spider on Sept 1, 2008 14:46:41 GMT -5
__ 'S'
|
|
|
Post by Spider on Sept 11, 2008 5:04:52 GMT -5
Cell phone etiquette 101 Have you ever experienced a cell phone user whom you wanted to pack up and ship to Miss Manners? Or have you ever witnessed a person on a cell phone do something so completely rude that you stop in your tracks? I have, and it continues to intrigue me just how polarizing cell phones can be. Sure, almost everyone has one, but they can drive even their most loyal users crazy. I think it makes perfect sense that cell phones are continually cited in studies that say good manners have gone out of the window. You don't need a sociology degree to see just how handsets have changed how we relate to each other; and I'm not talking about their positive effects (though indeed there are some). Rather, I'm talking about how you can put a cell phone in an otherwise courteous person's hand and then watch how that person loses all awareness of the people around him. Let me emphasize that I'm no luddite. I think cell phones are great and serve a very useful purpose. But just as people hide behind email to avoid face-to-face communication, it's amazing how some cell phone users think a handset makes them so much more important than everyone else. Here's some extreme behavior I've seen and be sure to share your own experiences and advice, as well. Be nice to the person behind the counterLast week I was waiting in line to order lunch behind a man blabbing away on his phone. When he got to the counter, he handed the cafe employee a piece of paper with his order and said, "I'm on an important call." So is it just me or is that completely rude? Doesn't the person behind the lunch counter deserve just an ounce of respect? I think so. Next time Mr. Important, hang up or at least put your caller on hold. Take it outsideI'm also in favor of taking your phone outside, or at least away from the table, when you get a call in a restaurant. No one around you, much less your tablemates, care to hear what you have to say. That is, unless you're guiding someone to your table in a cavernous eatery. And if it's really important, you could always text. But even that has a limit, as well. Use your inside voiceI'm always fascinated how people's voices (me included) automatically go up a few decibels when they get on a cell phone. I can understand when you're using your phone in a crowd, near a construction site, or next to your local airport runway, but it happens even in quiet rooms. I just don't get it. You're welcomeHave you ever held the door for someone who's been on the phone without them acknowledging your presence? It happened to me last week. Remember folks: Even though you're on the phone you still exist in this world to other people. Drive to distractionI know I'll open a whole can of worms here but please, when you're driving with a phone use a headset. And whatever you do, don't text while driving. Yikes. Yes, they're talking to youI don't pay $10 to hear your cell phone ring during a movie so turn it off. But if you absolutely have to keep your phone on, please turn it on vibrate. And please don't start talking until after you've left the theater. It's just being polite. The same goes for weddings, funerals, and other milestone events. Every time I went to my college's graduation, they'd ask people to turn off their phones before the ceremony. And every time, someone's phone would ring and they'd slink out of the building. Remember that when they ask you to turn off your phone, they're talking to you. Work out your body, not your mouthI don't care how important you think you are, the gym is no place for a cell phone. Don't talk when you're doing cardio and don't take up space on equipment so you can sit and catch up the latest dish. If you're bored while you spin, read a magazine. Not in the bathroomDon't use your phone in a public restroom. That's just gross. Remember the people around youIf you're out with a group of friends, it's fine to answer the phone for a few minutes. Just don't make that conversation more important than the one you're already having. Granted, I know I'm throwing stone from a glass house, but be courteous and keep it to a limit. Bluetooth geeksI've made no secret of the fact that I think wearing a Bluetooth headset when you're not talking on the phone just make you look like a geek. That's why I'm saying it again here. __ 'S' [/color]
|
|
|
Post by Spider on Sept 18, 2008 2:06:44 GMT -5
Clic Pic for SourceWi-Fi safety tips By: Doug Clist, CNET Contributor Laptops now outsell desktops, and more and more locations are offering free public Wi-Fi networks. Yet there are no formal recommendations on how one should secure a wireless laptop on a public wireless network. Here's are some known problems with wireless laptop security and some suggested solutions. Evil twin attacks.An "evil twin attack" is when someone surreptitiously places a more powerful wireless access point close to your laptop, causing it to connect to them rather than to the intended access point. Now all your personal data is flowing through the rogue access point laptop before it accesses the Internet in what's called a man-in-the-middle attack. And there's now the possibility of mobile devices such as smart phones also conducting evil twin attacks as well. Good behavior counts.By and large, security experts are all on record stressing that good behavior in public places matters most. The surfing that you do online in a public wireless environment should not be what you surf at home on a much more secured wired connection. For example, don't check your bank balance online, despite what that Bank of America ad says, or type in your credit card to order flowers online while sitting in an Internet cafe. What is considered safe are Virtual Private Networks (VPN) tunnels into a corporate environment. VPN encrypts the data back and forth, so that even if a criminal hacker were eavesdropping, they would have to first break the encryption to get the data--and who has time for that when the guy across the room isn't using VPN? But even this isn't totally secure, as criminals could capture your clear user ID, then decrypt your password access to the VPN; most companies use one of a handful of VPN services that are well-known to criminal masterminds. Some suggestions.The problem is that Microsoft designed Windows XP and Windows Vista to be convenient, especially when connecting via wireless, but convenience in the security world often carries a high price. Of course, it goes almost without saying that you should always have a suite of security applications including antivirus, antispam, and antispyware, as well as a personal firewall installed on your laptop. But to avoid having your laptop connect to the first access point that looks attractive, try these maneuvers: 1) Use a wireless broadband card.Rather than use a public cafe's open wireless, get a wireless broadband account and use your laptop to connect to 3G networks via cell modem. Overall wireless broadband accounts are more secure--it's harder to hack into a cellular call--and, in some cases, more reliable than public 802.11 wireless. 2) Change your home or office default router name.Don't make your laptop vulnerable in the first place. To do this, access your home or office router's firmware (usually this requires typing a specific address into a browser's address bar), then change the default SSID (Linksys, D-Link, Netgear, or the like) to something original (for example, UpUpAndBeyond, or something similar). While you're at it, change the router's default admin ID and password, and enable some form of encryption (WEP, WPA, or WPA2). 3) Disable the Windows networking automatic connect feature.Don't let your laptop connect just anywhere. To do so, right-click your current wireless network connection, click Properties, then click the Wireless Networks tab. Here you'll see a box with all of the last known connections you've made. After each, if it says "automatic," highlight and click properties, then select the connection tab for that network. Uncheck the box labeled "Connect when this network is in range." The downside is that the next time you fire up your laptop, you won't be connected right away. Instead, you should see a list of available wireless networks. It'll cost you a few seconds to choose one and connect to the right network, but at least you'll know what you're connecting to. 4) Set a MAC address for the routers you know.This won't help with random, open public wireless networks the physical address of which you won't necessarily know, but it will help with home and office connections, particularly if you live or work in a crowded area. Again, if you haven't changed your SSID, how do you know if the Linksys router you're connecting to from the front of your apartment is the one in the back of your apartment, or your neighbor's next door? 5) Turn off the ad hoc connections option.This should already be disabled with most default Windows XP and Vista installations, but you should check anyway. __ 'S' [/color]
|
|
|
Post by Spider on Sept 19, 2008 12:12:37 GMT -5
See Video(1 minute 53 seconds)
Flickr's Handlebar Cameras If you see a purple Yahoo bike on the road, smile for the camera! As part of a new publicity campaign, Flickr has tricked out 20 bikes worldwide with GPS and Wi-Fi-enabled cameras that document the view from the handlebars once every minute. Those photos are then instantly uploaded to a Flickr photo stream.
__ 'S'
[/color][/center]
|
|
|
Post by Spider on Sept 25, 2008 18:38:24 GMT -5
Source Better portraits with your point-and-shoot camera By: Doug Clist, CNET Contributor It is one thing to take a picture of a person, and another to snap a portrait. A good portrait has the ability to convey the subjects' state of emotion, and possibly even reveal a hint about their thoughts. Here are five simple tips for better portraits, so gather your friends and family members for a fun shoot.
1) Depth of field If your camera has manual controls for setting aperture, adjust it to about F3.5 or below. This creates a shallow depth of field which causes blur background while keeping the subject sharp. This focuses the viewer's attention straight to the subject. If your camera doesn't have manual controls, try scrolling through the scene modes--generally there will be a portrait mode which optimizes the camera's settings for taking pictures of people.
2) It's all about the communication If your subject is too tense, the picture will probably reflect it. Unless that is the effect you want, you'll have to talk to the person in front of your lens and loosen them up. Crack a joke or talk about the weather. If you know the person well, chat about things that interest him/her. They will start to relax and that's the moment you start snapping.
3) Level it Get to the eye level of your subject. For children, squat down to take pictures of them. If your adult subject is sitting down, then you need to sit or kneel in order to his/her eye level, too. This makes them more relaxed since they don't have to raise or lower their head to look at you, which may look unnatural (and make your subject uncomfortable).
4) It's in your eyes They say the window to a person's soul is through the eyes, and this is especially true for portraiture. Try to fix your camera's focus on the subjects' eyes as this creates a more appealing picture than focusing on their noses or ears. If your point-and-shoot has only one focus point, frame the eyes within the focusing box, half-press the shutter to focus (don't remove your finger yet) and then reframe your shot before pressing the shutter button down fully.
5) Environment If your subject lives in an interesting environment, use wide-angle lens to capture the surroundings in your shot. This will give your viewers a better understanding of the subject and create a more visually interesting picture as well. But don't try to cram every item available into the shot--this may clutter the image and draw attention away from the person you want to portray.
___________________
__ 'S'
|
|
|
Post by Spider on Oct 24, 2008 12:29:02 GMT -5
The Gmail team, which recently announced Gmail for Mobile 2.0 and autoreplies, is at it again on Friday with the introduction of Gmail emoticons.
"The black-and-white days of text-based e-mails have had their day," Darren Lewis, Gmail engineer, said in a blog post. "Following the evolutionary path blazed by colored labels, we present, in all their technicolor glory, emoticons in your mail."
Emoticons have been available on Google Chat for quite some time, but this is the first time they've made an appearance on Gmail. Besides obvious gestures like smiling or winking, the new emoticons will enable users to input images of hugs and kisses instead of "XOXO" and pictures of drinks, cake, or exclamation points to help them get their points across better.
Although the announcement was made to add functionality to Gmail, Lewis did say that all the emoticons made available in this release that weren't already offered on Google Chat have been added "for your enjoyment."
__ 'S' [/b][/size]
|
|