<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>כתבות בנושא IT - genie שירותי מחשוב לעסקים</title>
	<atom:link href="https://www.genie.co.il/en/tag/%D7%9B%D7%AA%D7%91%D7%95%D7%AA-%D7%91%D7%A0%D7%95%D7%A9%D7%90-it/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.genie.co.il/en/tag/כתבות-בנושא-it/</link>
	<description></description>
	<lastbuilddate>Tue, 18 Apr 2023 12:23:43 +0000</lastbuilddate>
	<language>en-US</language>
	<sy:updateperiod>
	hourly	</sy:updateperiod>
	<sy:updatefrequency>
	1	</sy:updatefrequency>
	

<image>
	<url>https://www.genie.co.il/wp-content/uploads/2021/05/fav-200x200.png</url>
	<title>כתבות בנושא IT - genie שירותי מחשוב לעסקים</title>
	<link>https://www.genie.co.il/en/tag/כתבות-בנושא-it/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>החלפת שרת – לא סיפור פשוט (בעיות נפוצות ודגשים בהחלפת שרתים)</title>
		<link>https://www.genie.co.il/en/replacing-server/</link>
		
		<dc:creator><![CDATA[Eyal]]></dc:creator>
		<pubdate>Thu, 03 Jan 2019 13:19:50 +0000</pubdate>
				<category><![CDATA[כתבות בנושא IT]]></category>
		<category><![CDATA[שירותי מחשוב]]></category>
		<category><![CDATA[שרתים]]></category>
		<guid ispermalink="false">http://erd-genie.ln3.tempurl.tk/?p=8355</guid>

					<description><![CDATA[<p>The server is a main player in everything related to the storage and maintenance of information in various institutions and organizations. Its importance to the organization is critical, if only due to the constant need for quick and smooth access to the databases found in it by various parties. The server is often required to simultaneously deal with a large number of access requests to the same databases. From this it can be concluded that such a server must be […]</p>
<p>The post <a href="https://www.genie.co.il/en/replacing-server/">החלפת שרת – לא סיפור פשוט (בעיות נפוצות ודגשים בהחלפת שרתים)</a> appeared first on <a href="https://www.genie.co.il/en">genie שירותי מחשוב לעסקים</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>The server is a main player in everything related to the storage and maintenance of information in various institutions and organizations. Its importance to the organization is critical, if only due to the constant need for quick and smooth access to the databases found in it by various parties. The server is often required to simultaneously deal with a large number of access requests to the same databases. From this it can be concluded that such a server must be reliable, strong and fast, in order to store the large amount of information, save it, and of course make it available for the benefit of the authorized employees of the organization at any time.</p>
<p class="clearfix">An average server should provide good performance for at least 4 years. After that, it will enter a period where it may experience malfunctions with a higher probability, and its reliability gradually decreases. The server&#039;s age may certainly be one of the considerations for its replacement. Additional reasons why the replacement of the server in the organization should be considered are: a problem of lack of volume for storage (due to the constant increase in the total volume of information of the organization), a problem of availability of the server in relation to the number of employees who need it (of course, as the number of users increases, the availability of the server decreases). The lack of availability is reflected in the fact that the flow of the information requested from him is slow and even tends to get stuck frustratingly.</p>
<p><img decoding="async" title="server" src="https://www.genie.co.il/wp-content/uploads/2019/01/server.jpg" alt="server" /></p>
<p>When you wake up and see her, one of the problems described, but natural, is to consider the possibility of changing the server. At the same time, understandable<br />
For everyone, the change of the server means first and foremost the complete unavailability of all information for all parties in the organization, for a necessary period of time during the change of servers. We try to reduce that time window as much as possible. Beyond the time required to carry out the replacement, during which, as mentioned, there is no access to information in the organization, one must take into account, related faults, which may occur due to the mismatch of the new server, as well as interface problems between the new server and external applications with which it is required to communicate. Often, the malfunctions in the new server arise from the peripheral equipment it needs for its current work. Thus, compatibility problems of the router, switch or modem, to the server, incorrect configuration settings, incompatibility in the software versions, etc., may further delay the continuation of the current work in the organization with the new server.</p>
<p>Due to the likelihood of the existence of those faults arising from the very act of replacing the server, and the difficulty of predicting the length of time that will be required until it is possible to return to work fully with the new server, it is advisable to seriously consider the necessity of its replacement and of course the effect of the replacement on the systems surrounding the server. For example, if the consideration for replacing the server arises due to a lack of storage volume, it is recommended to consider adding disks or replacing the old disks inside the server with disks with a larger storage volume. If the server falters, is slow, and tends to hang, it is recommended to carefully examine the integrity of its operating system and the integrity of the associated software installed on it, and make sure that no unnecessary software has been installed on it that burdens its activity. Sometimes updating a version of the server&#039;s management software or performing a downgrade and returning to the previous version (in case a version update was performed), can return the server to a normal work rate.</p><p>The post <a href="https://www.genie.co.il/en/replacing-server/">החלפת שרת – לא סיפור פשוט (בעיות נפוצות ודגשים בהחלפת שרתים)</a> appeared first on <a href="https://www.genie.co.il/en">genie שירותי מחשוב לעסקים</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>חשמל סטטי &#8211; גם זה יכול להזיק למחשב שלי?</title>
		<link>https://www.genie.co.il/en/static-electricity/</link>
		
		<dc:creator><![CDATA[Eyal]]></dc:creator>
		<pubdate>Thu, 03 Jan 2019 13:15:02 +0000</pubdate>
				<category><![CDATA[כתבות כלליות]]></category>
		<category><![CDATA[כתבות בנושא IT]]></category>
		<category><![CDATA[שירותי מחשוב]]></category>
		<guid ispermalink="false">http://erd-genie.ln3.tempurl.tk/?p=8352</guid>

					<description><![CDATA[<p>Static electricity discharges are a very common thing in our daily life. The human body transmits static electricity when we walk to our car, when we blow up a balloon or even when we open a door. These are few types that do not affect us much. Maybe we get a little scared, but we forget about it after a moment. If a static flash at this level that does not affect our body, what happens […]</p>
<p>The post <a href="https://www.genie.co.il/en/static-electricity/">חשמל סטטי &#8211; גם זה יכול להזיק למחשב שלי?</a> appeared first on <a href="https://www.genie.co.il/en">genie שירותי מחשוב לעסקים</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Static electricity discharges are a very common thing in our daily life. The human body transmits static electricity when we walk to our car, when we blow up a balloon or even when we open a door. These are few types that do not affect us much. Maybe we get a little scared, but we forget about it after a moment. If a static flash at this level does not affect our body, what happens inside our computer is a completely different story.</p>
<p>Every time we open the outer packaging of the computer, we must be aware of the static dangers that await us. As everywhere that creates friction, even inside our computer there are many particles that create friction, which in many cases are not even visible to the eye, and even they may cause a static market.</p>
<p><strong>How can we prevent this? Here are some steps that will help us:   </strong></p>
<p>First it was said that it is not a bad idea to purchase an anti-static strap. We place such a strap on our wrist and what it actually does is isolate the electric current from our body. Because the human body is also an electrical conductor. It is recommended that you follow the instructions for use before using any of these strips, but they can definitely help. The strips can be purchased at electrical and construction stores. If you know that you have a lot of work ahead of you in front of the open computer, even a small rug under the work area can help.</p>
<p>Of course, we know that these strips are not a very common thing, so even if you don&#039;t have them, it&#039;s not the end of the world. Let&#039;s assume your computer is grounded. You can also ground your personal body by keeping only one hand in contact with the iron frame that surrounds the computer from the inside. This frame obviously conducts electricity and placing both hands on it may cause the static shock to accelerate, so it is better to avoid it. Another important thing is to disconnect the power cable from the power source. It is even recommended to check if there is a small switch on the power supply and change it from active mode to inactive mode, but in any case it is recommended to remove the cable from the power source.<br />
Never work on an open computer while the computer is running!</p>
<p>If your computer is connected to a splitter to which other electrical devices are connected, it is highly recommended to disconnect it as well. If there is an on and off switch on the splitter, you can also change the switch to the off position. Another thing that will help your computer stay grounded is some kind of conductive connection from your computer to the ground, just like you do with cars, and even with the human body. Again, it is recommended that under this there be a rug or some object that is isolated from the floor.</p>
<p>The average person&#039;s body can absorb about 25,000 volts of static discharge. It sounds like a lot, but don&#039;t check yourself. It is very important to follow the rules when dealing with an open computer. This does not mean that a computer can absorb 25,000 volts. Such damage can significantly damage your computer! Your memory cards are the most sensitive parts to static discharges and can be significantly damaged resulting in many error messages and blue screens. Therefore, you must invest in preventive measures, your computer will thank you. If your computer is cold, try to bring it to room temperature. Static emissions are much more common in cold and dry weather. And the most important thing, do everything with moderate judgment and logic.</p>
<p>Successfully.</p><p>The post <a href="https://www.genie.co.il/en/static-electricity/">חשמל סטטי &#8211; גם זה יכול להזיק למחשב שלי?</a> appeared first on <a href="https://www.genie.co.il/en">genie שירותי מחשוב לעסקים</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Google יוצאת נגד שגיאות כתיב (ומנצחת)</title>
		<link>https://www.genie.co.il/en/google-spelling/</link>
		
		<dc:creator><![CDATA[Eyal]]></dc:creator>
		<pubdate>Thu, 03 Jan 2019 13:08:15 +0000</pubdate>
				<category><![CDATA[כתבות כלליות]]></category>
		<category><![CDATA[כתבות בנושא IT]]></category>
		<category><![CDATA[שירותי מחשוב]]></category>
		<guid ispermalink="false">http://erd-genie.ln3.tempurl.tk/?p=8349</guid>

					<description><![CDATA[<p>Google turned to an arbitration forum that serves as an alternative to a court and won - a body called &quot;The National Arbitration Forum&quot;, which serves as a legal alternative to courts, ruled in Google&#039;s favor after it was claimed that Sergey Gridsov, a resident of St. Petersburg, Russia, illegally established Laws of websites that take advantage of typing mistakes of surfers who want to reach the Google website. The web addresses of […]</p>
<p>The post <a href="https://www.genie.co.il/en/google-spelling/">Google יוצאת נגד שגיאות כתיב (ומנצחת)</a> appeared first on <a href="https://www.genie.co.il/en">genie שירותי מחשוב לעסקים</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Google appealed to an arbitration forum that serves as an alternative to a court and won - a body called &quot;The National Arbitration Forum&quot; (The National Arbitration Forum), which serves as a legal alternative to courts, ruled in Google&#039;s favor after it was claimed that Sergey Gridsov, a resident of St. Petersburg, Russia, illegally established Laws of websites that take advantage of typing mistakes of surfers who want to reach the Google website. The web addresses of the sites are: googkle.com, ghoogle.com.</p>
<p><strong><br />
Google Goes Against Spelling Errors (And Wins)</strong></p>
<p>A body called &quot;The National Arbitration Forum&quot;, which serves as a legal alternative to the courts, ruled in favor of Google after it claimed that Sergey Gridsov, a resident of St. to the Google website. The websites&#039; web addresses are googkle.com, ghoogle.com and gooigle.com.</p>
<p>Google was founded in September 1998 by two Stanford University graduates, and registered its domain name on the Internet about a year later. Gridsov, according to the claim, registered the names of his sites in December 2000 and January 2001.</p>
<p>The decision of the arbitrator, Paul Dorf, supports Google&#039;s claim that the incorrect addresses are part of a plan to infect surfers&#039; computers with hostile software that may cause the operating system to crash, delete important information and files, or open access routes into systems containing sensitive and important information.</p>
<p>Google&#039;s claim was submitted on May 11, and until the day the decision was made, Gridsov had not responded to the accusations, which allows the arbitrator to accept any unproven accusation by Google as true.</p>
<p>The AP News Agency contacted Gridsov last Friday, using the email address he registered when he purchased the URLs. In the response, which was not signed by Gridsov himself, the writer confirmed the claim that the URLs were intended to take advantage of surfers&#039; mistakes and thus gain great exposure more, but claimed in addition that there have never been any complaints about the functioning of the sites - and it is possible that new software that was installed on the sites, and which was supposed to be safe, is the cause of the complaints.</p>
<p>F-Secure, a Finnish company specializing in the detection and identification of hostile software, identified googkle.com as a problematic site in a message it published on April 26, more than two weeks before Google filed its complaint.</p>
<p>The attempt to &quot;ride on the success&quot; of popular websites is nothing new. One of the famous examples is the website whitehouse.com which published pornographic websites and products and was, of course, intended to take advantage of the mistakes of surfers who sought to reach the website Whitehouse.gov - the official website of the President of the USA.</p>
<p><strong>Typosquatting</strong><br />
The common name for the attempt to enjoy typing mistakes of surfers trying to reach popular sites is &quot;typosquatting&quot;. The exact definition, according to the website webopedia.com, is: &quot;Purchasing a domain name that is a variation of a popular domain name in the expectation that the site will gain exposure as a result of typing mistakes by surfers.&quot;</p>
<p>Being a site rated as one of the safest on the entire Internet, and considering the huge number of surfers the site attracts (about 66 million different surfers per month), Google has been a favorite target for typosquatting for a long time.</p>
<p>Needless to say, the Internet community is quite clearly divided into two - the owners of the websites that engage in typosquatting and see it as a legitimate business, and the owners of the original popular websites that oppose the phenomenon with all their might. The website www.tipz.net summarizes an article on the subject with the words: &quot;Those who engage in typosquatting are scavengers who feed on the crumbs that fall from the mouths of other animals. It may not be illegal, but it is certainly unacceptable.&quot;</p><p>The post <a href="https://www.genie.co.il/en/google-spelling/">Google יוצאת נגד שגיאות כתיב (ומנצחת)</a> appeared first on <a href="https://www.genie.co.il/en">genie שירותי מחשוב לעסקים</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Apple Macbook &#8211; חוות דעת וסקירה</title>
		<link>https://www.genie.co.il/en/apple-macbook/</link>
					<comments>https://www.genie.co.il/en/apple-macbook/#comments</comments>
		
		<dc:creator><![CDATA[Eyal]]></dc:creator>
		<pubdate>Thu, 03 Jan 2019 12:40:51 +0000</pubdate>
				<category><![CDATA[כתבות כלליות]]></category>
		<category><![CDATA[כתבות בנושא IT]]></category>
		<category><![CDATA[שירותי מחשוב]]></category>
		<guid ispermalink="false">http://erd-genie.ln3.tempurl.tk/?p=8346</guid>

					<description><![CDATA[<p>Apple Macbook opinion and review &quot;Apple&quot; announced the heartbreaking departure. Macbook laptop computer. Only a year later, Apple announced the updated version of the mobile, which can operate with the core2duo processor, developed by Intel. Let&#039;s start by looking at its design. Small, comes in two colors, black or white and once you look at it, your pupils will probably dilate. […]</p>
<p>The post <a href="https://www.genie.co.il/en/apple-macbook/">Apple Macbook &#8211; חוות דעת וסקירה</a> appeared first on <a href="https://www.genie.co.il/en">genie שירותי מחשוב לעסקים</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><strong>Apple Macbook opinion and review</strong><br />
&quot;Apple&quot; announced the heartbreaking departure. Macbook laptop computer. Only a year later, Apple announced the updated version of the mobile, which can operate with the core2duo processor, developed by Intel. Let&#039;s start by looking at its design. Small, comes in two colors, black or white and once you look at it, your pupils will likely dilate. He is undoubtedly extremely impressive. The thickness of the body of the Macbook is only 3.2 cm while its weight is one of the lowest on the market, only 2.7 kg.</p>
<p>Not long ago, &quot;Apple&quot; was injured with the heartbreaking exit. APPLE Macbook laptop computer. Only a year after its release, Apple brought the updated version of the mobile, which can operate with the core2duo processor, developed by Intel.</p>
<p>So let&#039;s start by exploring its design. Small, comes in two colors, black or white and once you look at it, your pupils will probably dilate. He is undoubtedly extremely impressive. The thickness of the body of the Macbook is only 3.2 cm, while its weight is only 2.7 kg. These features easily win the eyes of any user. After all, most of us are looking for a laptop as light as possible and as close and similar to a notebook as possible. The texture and the external case of the computer allows it to be kept from different temperature and pressure conditions which could allow a longer life of the computer.</p>
<p>The body of the mobile comes with refined silver finishes that make its design so elegant that you can&#039;t take your eyes off it. The weight factor comes thanks to the aluminum pad that wraps the computer.</p>
<p>We will open the Macbook and discover what many in the company describe - the scientific miracle of the Macbook. The keyboard, like the entire computer, is elegantly and quite simply designed. In addition to the standard and essential keyboard buttons, you can find only one more button on the keyboard, which is the computer&#039;s power button. Unlike most laptops on which you will find many other buttons with different functions. Depending on how you look at it, you can judge the Macbook as a fairly simple model or rather the opposite, inside a special model unlike any other.</p>
<p>On the upper side of the open computer we will see the 13.3 inch wide LCD screen, which allows us to see every picture perfectly and refined whenever we want. Visibility is extremely sharp and crystal clear. There is no doubt that the LCD screen takes a significant part in the sharp and clear image output, this is not surprising at all, when working through an LCD screen with a resolution of 1280 x 800 pixels. Regarding the design of the keyboard, you can look at it in two ways. Despite its simplicity, there is something very special about its appearance, something that simply inspires enthusiasm. The keyboard in appearance as well as in feeling gives the reaction feeling while pressing each of its keys, this factor can add to the special convenience of the computer. It might sound like we&#039;re praising the MacBook a little too much and we&#039;ve only just started the review, but that&#039;s just the way it is. The keyboard is exceptionally comfortable, and the mouse pad also responds in a balanced and fast way, but not special compared to other laptops.</p>
<p>From the exterior we will move a little to the interior parts. Even inside, the computer is not particularly disappointing. Let&#039;s start with the hard disk. In this computer we can find something that we may not be able to find in many other computers, a hard disk capable of holding over 250 GB. In most laptops today we can get them with 70-150GB of storage space, so there is no doubt that the hard disk of the MacBook is particularly impressive. So don&#039;t worry about the amount of material you want to store, the computer will do it for you. From the very beginning of the review, the savvy among us will be able to tell how powerful the new updated processor is in the updated model of the computer. The new processor from Intel, core2duo, with a size of 3MG, makes the Macbook one of the most powerful computers among all competitors.</p>
<p>The Macbook does not disappoint in the external connections either, it comes with a USB 2.0 input, and on top of that it also has a FireWire 400 input, which is a particularly convenient solution for many devices, especially in the field of music recording and connecting musical instruments to computer recording. Even the burner of the Macbook, we can say that it is one level above all competitors. The form burns at a speed of -24x, or when burning a double layer at a speed of 8x, which ensures the stability and safety of the disc burning. The computer has no moving parts, which results in a significant reduction in internal hardware failures. Another thing is the way to insert the CD. In most portable computers today, we will have to press a button that will take out the CD tray, we will have to pull it out a little, put the CD we want to play and then push the entire tray into the computer to start playing. The Macbook does not have the aforementioned CD tray at all. In the place where the CD tray is usually found, we can find a certain thin strip with a mark for inserting the CD. What we will have to do is simply push the CD into the aforementioned strip that will be sucked into the computer. When we want to take it out, we will press a button that will eject it.</p>
<p>This topic can be a particular problem. What to do? Not everything is rosy. In many cases, we encounter situations where our CD drive is stuck, and inside is a CD that is very important to us. All we have to do is simply take a small pin, and insert it into a small hole located under the CD tray (it was specially invented for such situations). Once we insert the pin, the pin pushes an internal button that pushes the CD tray out manually and then we can take out the CD easily. On the other hand, due to the fact that the Macbook does not have a CD tray, it also does not have the aforementioned hole. But many Apple fans believe that the computer and Apple products in general are reliable enough that there is nothing to worry about.</p>
<p>The standard MacBook computer comes with a 2.1 GHz processor or the slightly improved 2.4 GHz, and these figures are also particularly impressive for a laptop. The Macbook also comes with a Bluetooth 2.0 card, which is present in many new laptops today, but which, in addition to all the other options on the computer, adds a lot to the convenience.</p>
<p>Comparisons are a part of life, and the Mac operating system will have to stand up to comparison with Microsoft&#039;s leading operating systems, Windows Vista, Windows XP. Many Mac users claim that once you start using and getting used to the system you become addicted to it and it is difficult to go back to the previous systems.</p>
<p>The Mac operating system offers many customization options that will help you adapt your work and the system to your personal needs at a particularly high level, by offering many and varied features that leave Microsoft&#039;s operating systems far behind. Many of the Mac users explain how particularly comfortable the work interface is, and the whole point is to make the transition from the various Windows systems to the Mac system without being afraid of adapting to the changes.</p>
<p>The taskbar in the system is a taskbar that disappears regularly. Of course, we can also add the disappearing option in the Windows systems, but together with the various additions and changes in Mac, this is simply another factor to make everything &quot;cooler&quot;. Surfing the Internet was also noted as more successful than various Microsoft systems. Browsing is usually done faster and the sites look better and without problems.</p>
<p>Even in the fields of multimedia, the Mac system beats the various window systems. In a survey conducted among music editors and graphic designers in the United States, a majority was found who prefer to work with the Mac computers in this field, than with Microsoft&#039;s systems. The users explained that Apple&#039;s systems are simply more reliable and more stable than Microsoft&#039;s and also offer a wider range of options. And even for the normal user, Apple&#039;s computer proved to be more successful. The iTunes software has proven to be a new hit in the field of audio playback. In doing so, Mac meets the needs of each and every one of us.</p>
<p>In conclusion, Apple&#039;s Macbook computers have proven themselves on most levels and have also proven that they simply do not fall short in anything from Microsoft&#039;s various systems. Today, Apple&#039;s computers are still not distributed in the same way as other computers are distributed in Israel. Apple computers can be purchased in several networks in Israel, but their prices are very high, and the support offered by Apple in Israel is also not satisfactory. Compared to the United States where Apple broke the box office a long time ago and are able to offer the maximum support to their customers. But who knows? Maybe one day it will be like that in Israel too.</p><p>The post <a href="https://www.genie.co.il/en/apple-macbook/">Apple Macbook &#8211; חוות דעת וסקירה</a> appeared first on <a href="https://www.genie.co.il/en">genie שירותי מחשוב לעסקים</a>.</p>
]]></content:encoded>
					
					<wfw:commentrss>https://www.genie.co.il/en/apple-macbook/feed/</wfw:commentrss>
			<slash:comments>1</slash:comments>
		
		
			</item>
		<item>
		<title>כך משתמשים באינטרנט כאמצעי אכיפה</title>
		<link>https://www.genie.co.il/en/internet-laws/</link>
		
		<dc:creator><![CDATA[Eyal]]></dc:creator>
		<pubdate>Thu, 03 Jan 2019 12:35:55 +0000</pubdate>
				<category><![CDATA[כתבות כלליות]]></category>
		<category><![CDATA[כתבות בנושא IT]]></category>
		<category><![CDATA[שירותי מחשוב]]></category>
		<guid ispermalink="false">http://erd-genie.ln3.tempurl.tk/?p=8343</guid>

					<description><![CDATA[<p>Today in the USA they are learning and understanding how to utilize computerized technology also for use in traffic enforcement. A 20-year-old man living in the state of Rhode Island in the USA, drove under the influence of alcohol and ran over a woman who was seriously injured and hospitalized. The young man entered court proceedings, but was not in custody. A few weeks later, the young man went out with friends on Halloween disguised [...]</p>
<p>The post <a href="https://www.genie.co.il/en/internet-laws/">כך משתמשים באינטרנט כאמצעי אכיפה</a> appeared first on <a href="https://www.genie.co.il/en">genie שירותי מחשוב לעסקים</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Today in the USA they are learning and understanding how to utilize computerized technology also for use in traffic enforcement. A 20-year-old man living in the state of Rhode Island in the USA, drove under the influence of alcohol and ran over a woman who was seriously injured and hospitalized. The young man entered court proceedings, but was not in custody. Several weeks later, the young man went out with friends on Halloween disguised as a prisoner. Ironically, the young man did not think about the future results.</p>
<p><strong>Internet as a means of enforcement<br />
</strong>In the United States of the 21st century, they are learning how to use computer technology to enforce traffic laws. A young man was caught in Rhode Island in the United States by photos he posted online and brought to trial.</p>
<p>Joshua Lipton, a 20-year-old man who lives in the state of Rhode Island in the United States, drove under the influence of alcohol and ran over a woman. The woman was seriously injured and hospitalized. The young man entered court proceedings, but was not in custody. A few weeks later, the young man went to a party with friends on Halloween disguised as a prisoner. The young man with the ironic joke did not think about the future results.</p>
<p>Almost every child nowadays carries a camera with him to document moments in life and also just for fun. One of Joshua&#039;s friends took photos at the party completely spontaneously and published the photos on the social network Facebook. The site is used as a popular means of communication among teenagers and among a few adults. The photographer friend decided that he publishes the photos from the party on his Facebook page, when in fact all his friends on the network will be able to see the photos from the party.</p>
<p>The prosecutors in the young man&#039;s trial did their job properly, found the above-mentioned photos, and decided to use them as evidence that the boy is completely irresponsible and without conscience. The legal prosecutor presented the photos in court while explaining that the boy is a completely emotionless and conscientious person, capable of Going out to hang out after an injury as he did, while the victim, the victim of the accident, is lying injured in the hospital trying to recover and restore her life.</p>
<p>The judge in court accepted the testimony, and Lipton was sent to prison for two years. Social networks like Facebook and more are, as I mentioned, an excellent means of communication. There is no doubt that they also have many negative features, and you should always remember that the net is not a secure place and unfortunately there are many who use the net for bad purposes.</p>
<p>Many detectives and police agents today use these networks to solve crimes and mysteries by searching for information about a person. Even in the field of daily work, many employers will search social networks of one kind or another for information about an employee, in order to learn about their employees and find out things that they would not be able to find out on a daily basis, thus in many cases even deciding whether he is suitable for the job or not. Photos as published, are without a doubt unequivocal evidence for Judge Lipton that he could not escape from. This is a classic example of how much the web can surprise us. Obviously Lipton didn&#039;t want them to know about the aforementioned party at all, but in today&#039;s computerized world, where half of our lives are run according to his will, there are things that are a little difficult to prevent.</p>
<p>This case is not the only case in which pictures published on the Internet were used in order to reach a conviction in court. In other cases, the guilty were caught even after receiving the punishment when they break their promise and their punishment. So no doubt…<br />
Someone is always following us. This entire article is another point for thought, the Internet is a daily friend that in many cases we cannot live without, think carefully before you volunteer personal details to the network.</p><p>The post <a href="https://www.genie.co.il/en/internet-laws/">כך משתמשים באינטרנט כאמצעי אכיפה</a> appeared first on <a href="https://www.genie.co.il/en">genie שירותי מחשוב לעסקים</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>חטאים ברשת: דואר זבל</title>
		<link>https://www.genie.co.il/en/junk-mail/</link>
		
		<dc:creator><![CDATA[Eyal]]></dc:creator>
		<pubdate>Thu, 03 Jan 2019 11:33:31 +0000</pubdate>
				<category><![CDATA[כתבות בנושא אבטחת מידע]]></category>
		<category><![CDATA[דואר זבל]]></category>
		<category><![CDATA[כתבות בנושא IT]]></category>
		<category><![CDATA[שירותי מחשוב]]></category>
		<guid ispermalink="false">http://erd-genie.ln3.tempurl.tk/?p=8334</guid>

					<description><![CDATA[<p>הגעתם בבוקר למשרד, מוקדם מהרגיל, כי אתם יודעים שבתיבת הדואר שלכם אמור לחכות אימייל חשוב לו אתם מחכים מספר ימים &#8211; המשך הפרויקט עליו אתם עובדים תלוי באימייל הזה. אתם פותחים את תיבת האימייל וכמה עשרות הודעות חדשות נשפכות על הרצפה. אחרי שאתם עושים קצת סדר בהררי ההודעות, מפנים אל סל המחזור כמה פרסומות, הצעות [&#8230;]</p>
<p>The post <a href="https://www.genie.co.il/en/junk-mail/">חטאים ברשת: דואר זבל</a> appeared first on <a href="https://www.genie.co.il/en">genie שירותי מחשוב לעסקים</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>You arrived at the office in the morning, earlier than usual, because you know that an important email should be waiting in your mailbox for which you have been waiting for several days - the continuation of the project you are working on depends on this email. You open your email inbox and several dozen new messages spill out onto the floor. After you sort out the mountains of messages, send to the recycle bin some advertisements, tempting offers, promotions, reports on websites for adults only and a number of miraculous ways to get rich overnight - you actually realize that the message you were waiting for is not in the mailbox at all. When you check the messages on the answering machine you will find an annoying message that the sender of the email could not send it because the box was blocked due to overload. Good Morning.</p>
<p>&quot;Spam&quot;, junk mail, is sending identical email messages to thousands (or millions) of recipients at the same time. The contents of the messages range from marketing or pornographic content to job offers, get-rich-quick methods, chain letters, and more. What all spam messages have in common is that the recipient of the message does not know the sender and never asked to receive the message.</p>
<p>Internet providers around the world as well as email service providers are fighting an uphill battle against spammers, and yet - the junk keeps coming. Why do spammers work so hard to send their messages? Why are they sabotaging, day after day, the effectiveness of one of the most common methods of communication in the world today? The reason is simple and not surprising - money. greed. Many believe that advertising by harassing email users works, and they are willing to pay a lot of money to get it.</p>
<p>Internet surfers are under a constant attack of spam - millions of spam messages are sent over the Internet every year. According to data from SpamCop.net, a site that deals with the fight against spam, in the last 12 months (September 2004 to September 2005) an average of 4.7 spam messages were reported every second, up to a peak of almost 29 messages per second in January. A total of 146,647,251 spam messages were reported to the site in the last year.</p>
<p>AOL data is much more serious and indicates 10 million spam messages each day (30% of total messages), all to people who never asked to receive them.</p>
<p>Where does all this junk come to our computers? From third world countries where enforcement and supervision are low? Not necessarily. 42.1% of the junk mail in 2004 actually came from the USA, while South Korea is in second place on the list of defendants with 13.4 percent, and the top five are completed by China, Canada and Brazil.</p>
<p>What can be done to eliminate spam? The answer is divided into two - the prevention phase, and the fight phase. The prevention step is short and simple - prevent at all costs from entering your email address on all kinds of websites that ask for it in order to register for free for any service. Create a new, free e-mail address for yourself on a site such as Hotmail or Gmail - and use it to register on the sites - you will be surprised to find out how quickly the spam messages will start to flood the new box. When the spam messages become unbearable - cancel the box and create a new one.</p>
<p>The struggle phase is more complex and requires more complex technological means. Most of the defensive work should be done by network administrators and ISPs using anti-spam software (<a title="Anti Spam" href="https://www.genie.co.il/en/anti-spam-cloud/">Anti Spam</a>) and mail-filters. New mail programs such as Outlook xp or 2003 provide convenient tools for organizing a list of spam senders and automatic identification of mail suspected as spam. But this is only passive defense.</p>
<p>Instead of fortifying yourself behind the walls and waiting for spam bombardments, there is also an active side to the war - reporting the spammers. By means of surfers&#039; reports on received spam messages, entities that fight against criminals can locate the source of the messages and report it to the Internet providers so that they block the mail senders. Certain entities even create &quot;blacklists&quot; of spammers so that mail server owners can help them in order to defend against spam attacks.</p>
<p>Undoubtedly the easiest way is to ignore the messages and hope that the flood of spam messages does not reach our mailbox.<br />
But, in order to fight the phenomenon, make it unprofitable for spam criminals and eliminate them once and for all - we must<br />
Surfers to join the fight for the future of e-mail and free communication.</p><p>The post <a href="https://www.genie.co.il/en/junk-mail/">חטאים ברשת: דואר זבל</a> appeared first on <a href="https://www.genie.co.il/en">genie שירותי מחשוב לעסקים</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>חטאים ברשת: גניבת רוחב פס</title>
		<link>https://www.genie.co.il/en/stealing-bandwidth/</link>
		
		<dc:creator><![CDATA[Eyal]]></dc:creator>
		<pubdate>Thu, 03 Jan 2019 11:04:42 +0000</pubdate>
				<category><![CDATA[כתבות בנושא אבטחת מידע]]></category>
		<category><![CDATA[כתבות בנושא IT]]></category>
		<category><![CDATA[שירותי מחשוב]]></category>
		<guid ispermalink="false">http://erd-genie.ln3.tempurl.tk/?p=8331</guid>

					<description><![CDATA[<p>פעמים רבות אנשים מבצעים פשעים מבלי להיות מודעים לחלוטין לדבר ביצוע העבירה. אחד המקרים הקלאסיים לעבירות כאלה הוא המקרה של גניבת רוחב פס. למעשה, אפשר לומר שרבים מבין בעלי האתרים מבצעים חטא זה, או לפחות ביצעו אותו בעבר. אוכלוסיית החוטאים מתחלקת לשתי קבוצות &#8211; בעלי האתרים חסרי הניסיון אשר אינם מודעים לבעייתיות שבמעשיהם, ובעלי האתרים [&#8230;]</p>
<p>The post <a href="https://www.genie.co.il/en/stealing-bandwidth/">חטאים ברשת: גניבת רוחב פס</a> appeared first on <a href="https://www.genie.co.il/en">genie שירותי מחשוב לעסקים</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Many times people commit crimes without being fully aware of committing the crime. One of the classic cases for such offenses is the case of bandwidth theft. In fact, it can be said that many of the website owners commit this sin, or at least have committed it in the past. The population of sinners is divided into two groups - the inexperienced website owners who are not aware of the problematic nature of their actions, and the website owners who are well aware of the consequences of their actions, but they prefer to hurt others in order to make a little profit for themselves.</p>
<p>So what exactly is &quot;bandwidth theft&quot;? First of all - this is theft. When a person takes something that does not belong to him, without permission and without the knowledge of the legal owner of the object. Just stealing. In order to clarify the essence of the offense, it is necessary to clarify a number of simple technical concepts.</p>
<p>Communication to the Internet is done over telephone lines or other communication cables. The data transfer speed on these cables is not infinite - each cable has a certain limit of data that it can transfer at a given time. If we try to transfer an amount of data greater than the cable&#039;s capacity, the data transfer speed will decrease. The data transfer rate at which a communication line can work is its &quot;bandwidth&quot;.</p>
<p>When we surf the Internet, our computer sends and receives information from websites. In order to allow the transmission of this information, and thus to allow access to their website, website owners must purchase a certain bandwidth from the Internet providers. That is, for a monthly fee, the provider allows the website to send and receive information in a certain volume. Let&#039;s say I purchased 3 GB per month for my website. This means that the total size of files (images, sound or downloadable files) moving to or from my site per month must be less than 3 GB.</p>
<p>What happens if the amount of data sent exceeds the allowed limit for that month? Here it depends on the policy of the Internet provider. Most ISPs just charge more for the exceptions. On rare occasions the internet providers will simply block the line until the beginning of the next month - which will effectively prevent any access to the website for several days. In short - if my site becomes more and more popular and many surfers come to it and download information, the bandwidth utilization increases, and I will have to pay more. So where is the problem?</p>
<p>Most website owners will be happy to pay more for a wider bandwidth, if this means that the site becomes popular - this popularity is, in most cases, their goal. But, no one wants to pay for bandwidth they don&#039;t use.</p>
<p>When we surf to a certain website that contains images, those images should be found on the server that contains the website, and reach our computer from there using the &quot;bandwidth&quot; of that website. Sometimes website owners prefer not to place images on their server, but to direct the surfers to identical or similar images that are on another server on the Internet. If the images are not really on the server of the site we are surfing to, but on the server of another site, the bandwidth of the other site will be used, without us having surfed to it at all. It is important to note that the surfers are not at all aware that the image is on another server! On the computer screen the image will look as if it is on the website we surfed to!</p>
<p>So what does all this mean? This means that website owners, in order to save on the utilization of their bandwidth, refer surfers to images hosted on other websites, without informing them that they are being redirected to another website, and without informing the other website that surfers are being redirected to. Those other sites are not getting the exposure they are interested in, but their bandwidth is being used up and at the end of the month they will have to pay the internet providers for it. This is theft for everything.</p>
<p>Although one small image will not have such a drastic effect on the bandwidth utilization of a certain site, when hundreds or thousands of surfers access the site every month - the effect may be very large.</p>
<p>One must differentiate between a link to an image or a file from another site (in fact - stealing its bandwidth), and a link to another web page, on another site (such as the links at the bottom of this article). Such a link refers the surfer to the other site knowingly, and the other site gets more exposure. This is perfectly fine, because in the end - every website owner wants more surfers to visit him. A website owner who is not interested in this, it is better for him to take the website off the network completely.</p>
<p>Linking to images, sound files, videos or downloadable files from other websites without their permission - is bandwidth theft and it costs other people a lot of money. What to do if you have a website and you want to put pictures or files on it? Upload the images and files to your server. Don&#039;t make someone else pay for you.</p><p>The post <a href="https://www.genie.co.il/en/stealing-bandwidth/">חטאים ברשת: גניבת רוחב פס</a> appeared first on <a href="https://www.genie.co.il/en">genie שירותי מחשוב לעסקים</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>חטאים ברשת: חלונות פופ-אפ</title>
		<link>https://www.genie.co.il/en/pop-ups/</link>
		
		<dc:creator><![CDATA[Eyal]]></dc:creator>
		<pubdate>Thu, 03 Jan 2019 09:53:20 +0000</pubdate>
				<category><![CDATA[כתבות בנושא אבטחת מידע]]></category>
		<category><![CDATA[כתבות בנושא IT]]></category>
		<category><![CDATA[שירותי מחשוב]]></category>
		<guid ispermalink="false">http://erd-genie.ln3.tempurl.tk/?p=8328</guid>

					<description><![CDATA[<p>אחד הדברים המרגיזים ביותר בהם גולש עשוי להתקל בעת שהוא גולש ברשת האינטרנט הוא חלונות הפופ-אפ. ישנם מספר סוגי של חלונות פופ-אפ וכולם, ללא יוצא מן הכלל, מציקים, מפריעים, וגורמים הרבה יותר נזק מאשר תועלת, גם לגולשים וגם לבעלי האתר. למרות שחלונות הפופ-אפ אינם נמנים על החטאים החמורים והמזיקים ביותר הקיימים ברשת האינטרנט, הם ללא [&#8230;]</p>
<p>The post <a href="https://www.genie.co.il/en/pop-ups/">חטאים ברשת: חלונות פופ-אפ</a> appeared first on <a href="https://www.genie.co.il/en">genie שירותי מחשוב לעסקים</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>One of the most annoying things a surfer may encounter while surfing the Internet is the pop-up windows. There are several types of pop-up windows and all of them, without exception, are annoying, disturbing, and cause much more harm than good, both to the surfers and to the website owners. Although the pop-up windows are not among the most serious and harmful sins that exist on the Internet, they are without a shadow of a doubt one of the most annoying that we encounter in our surfing king</p>
<p>The phenomenon is familiar to every surfer - new windows of the Internet browser, which suddenly &quot;pop&quot; on the screen, without anyone asking for them.</p>
<p>When we surf the net, we make our way through a tangle of bits of information, websites and links that can be extremely confusing. We want to easily get from place to place, we mainly want to get to where we wanted to go, and only there. The amount of sites on the Internet is huge, the sites compete with each other for the attention of the surfers and their money. When we finally entered a certain website, the website must be simple, clear and interesting so that we will be convinced to go deeper into it and return to it in the future. There is no better way than pop-up windows to convince surfers to do the opposite.</p>
<p>The pop-up windows are designed to advertise websites or products for purchase. The idea is simple - if the surfer has already reached my website, why not<br />
Throw him some small advertisement, give some exposure to the products I&#039;m trying to sell. Let&#039;s face it - no one<br />
Love those windows and no one reads what&#039;s on them. Most of us close the window even before its content is up, some of us<br />
The little one does not close the window but simply ignores it.</p>
<p>These windows are usually loaded with heavy graphics, which burdens our bandwidth and slows down the site&#039;s upload speed<br />
We wanted to surf. Sometimes, when entering the site, not one new window pops up, but two windows, three windows, or even more!<br />
The only thing the site surfer will decide, as a result of these advertisements, is to never return to this site.<br />
There are enough sites with similar content.</p>
<p>An even more annoying phenomenon is the pop-up windows that pop up when leaving the site. At the end of browsing, when you close the browser, an advertisement window suddenly opens. The climax is when when you close this window, another window opens, and another window, and so on. In extreme cases, the number of windows is so large that there is no choice but to turn off the computer.</p>
<p>The windows that open when entering the site are annoying but understandable, the pop-up windows when leaving the site are even more annoying<br />
but also clearly immoral. Imagine yourself entering a large shopping mall. Children waiting at the entrance<br />
Advertisement brochures for stores and products that can be purchased inside. After quite a few efforts, you finally manage to pass<br />
past them and go inside (you crumpled the leaflets, by the way, and threw them in the nearest bin). Annoying - but acceptable.<br />
When does the phenomenon become unbearable? When the children attack you again at the exit, they run after you to the car,<br />
They shout and throw the advertisement leaflets at you.</p>
<p>There are several other types. Pop-up windows that move to the background by themselves without hiding the website we surfed to - that&#039;s true<br />
Doesn&#039;t hurt the browsing experience, but still puts a strain on the bandwidth. There are windows that minimize themselves, and open too much<br />
A few minutes - just as annoying. Another and most annoying type is flash advertisements that open inside websites to them<br />
We browsed - they hide the site&#039;s content, they cannot be ignored, they are usually accompanied by annoying noises and are extremely difficult<br />
It is possible to find the X button to close them.</p>
<p>It is important to note that the phenomenon of pop-up windows is not a piracy crime. Sites that contain pop-up windows do so by choice.<br />
No one forces it on them. The owners of these sites are harming the enjoyment of the surfers and the popularity of their own website, since most surfers will avoid dealing with such windows at all costs.</p>
<p>A word to the website owners - the Internet should be a source of information and pleasure, not a source of frustration and nerves. Pop-up windows cause frustration and nerves - don&#039;t use them! If your site is hosted for free with a provider that requires pop-up windows, move the site to another location. If you want to advertise your products, don&#039;t do it through pop-up windows. There are enough legitimate (and much more effective) places to advertise on the Internet without boring the net on surfers.</p><p>The post <a href="https://www.genie.co.il/en/pop-ups/">חטאים ברשת: חלונות פופ-אפ</a> appeared first on <a href="https://www.genie.co.il/en">genie שירותי מחשוב לעסקים</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>25GB &#8211; זה לא בשמיים</title>
		<link>https://www.genie.co.il/en/25gb-online/</link>
		
		<dc:creator><![CDATA[Eyal]]></dc:creator>
		<pubdate>Thu, 03 Jan 2019 09:46:51 +0000</pubdate>
				<category><![CDATA[כתבות כלליות]]></category>
		<category><![CDATA[כתבות בנושא IT]]></category>
		<category><![CDATA[שירותי מחשוב]]></category>
		<guid ispermalink="false">http://erd-genie.ln3.tempurl.tk/?p=8324</guid>

					<description><![CDATA[<p>As part of its cloud services, Microsoft decided to surprise us all and give everyone 25GB of online storage for free, no money. The new service from the Windows Live series is called SkyDrive, or in free translation - Internet drive. So what is it anyway and why do you need it? The service allows you to save files (a kind of DiskOnKey), only you don&#039;t have to carry it, and even better [...]</p>
<p>The post <a href="https://www.genie.co.il/en/25gb-online/">25GB &#8211; זה לא בשמיים</a> appeared first on <a href="https://www.genie.co.il/en">genie שירותי מחשוב לעסקים</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>As part of its cloud services, Microsoft decided to surprise us all and give everyone 25GB of online storage for free, no money. The new service from the Windows Live series is called SkyDrive, or in free translation - Internet Drive.</p>
<p class="clearfix"><strong>So what is it anyway and why do you need it?<br />
</strong>The service allows you to save files (a kind of DiskOnKey), only you don&#039;t have to carry it, and even better, you don&#039;t have to pay for it, the service is completely free. The only thing needed to save to SkyDrive is an available internet connection.</p>
<p><img fetchpriority="high" decoding="async" src="https://www.genie.co.il/wp-content/uploads/2019/01/windows_sky.jpg" alt="windows sky" width="538" height="395" /></p>
<p>There is a maximum limit of 50MB for a single file, other than that feel free to upload whatever your heart desires there, photos, music, videos, documents and the sky is the limit. In addition there is an option to share certain folders such as the favorites folder or the documents folder, or any folder you decide to create in this nice thing. Keep in mind that uploading files to the Internet takes quite a bit of time in Israel, the Internet infrastructure in Israel is usually not symmetrical, so our upload speed is much lower than the download speed. I still find the service much more useful than sending files to myself by email or using Gpace and the like. Please note , those who do not have a Live ID (a Windows Live account such as the messenger&#039;s) will have to fill out a short questionnaire and at the end will be able to use the desired service.</p><p>The post <a href="https://www.genie.co.il/en/25gb-online/">25GB &#8211; זה לא בשמיים</a> appeared first on <a href="https://www.genie.co.il/en">genie שירותי מחשוב לעסקים</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>מי מפחד מ vista</title>
		<link>https://www.genie.co.il/en/vista-intro/</link>
		
		<dc:creator><![CDATA[Eyal]]></dc:creator>
		<pubdate>Thu, 03 Jan 2019 09:30:55 +0000</pubdate>
				<category><![CDATA[כתבות כלליות]]></category>
		<category><![CDATA[כתבות בנושא IT]]></category>
		<category><![CDATA[שירותי מחשוב]]></category>
		<guid ispermalink="false">http://erd-genie.ln3.tempurl.tk/?p=8318</guid>

					<description><![CDATA[<p>Author: Zvi Fried What they didn&#039;t say about it: that it&#039;s slow, that it&#039;s cumbersome, that it&#039;s unstable, that it&#039;s Microsoft&#039;s biggest failure - and yet there are some strange people who decided to install and use it, I&#039;m one of them. After a whole month with Vista, it is very difficult to go back to work on XP, and the reasons for this are many and varied. Before I continue, it is important for me to emphasize that […]</p>
<p>The post <a href="https://www.genie.co.il/en/vista-intro/">מי מפחד מ vista</a> appeared first on <a href="https://www.genie.co.il/en">genie שירותי מחשוב לעסקים</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Author: Zvi Fried</p>
<p>What they didn&#039;t say about it: that it&#039;s slow, that it&#039;s cumbersome, that it&#039;s unstable, that it&#039;s Microsoft&#039;s biggest failure - and yet there are some strange people who decided to install and use it, I&#039;m one of them.</p>
<p>After a whole month with Vista, it is very difficult to go back to work on XP, and the reasons for this are many and varied.</p>
<p>Before I continue it is important for me to emphasize that vista is not suitable for every computer, the computer must be</p>
<p>Even more powerful than Microsoft recommends so that the user can enjoy excellent performance.</p>
<p><strong>So how do I know if Vista is right for me?</strong></p>
<ul>
<li>I have a new laptop - most of which today come with Vista Build-in.</li>
<li>I have a powerful desktop computer (PC) at home.</li>
</ul>
<p>Vista was built more intelligently for mobile devices that have become so common in recent years.</p>
<p><strong>electricity use -</strong> In Vista they have improved the power consumption (critical for users of laptops), and you can choose between three working modes:<br />
Economical, balanced, and maximum performance.</p>
<p><strong>Bitlocker –</strong> This feature knows how to encrypt the hard disk, very effective for CEOs who store sensitive information on the laptop -<br />
Available in Enterprise and Ultimate versions only.</p>
<p><strong>wireless network -</strong> The connection is made easily and simply, you can choose one of three security modes:</p>
<p><strong>*public -</strong> If I&#039;m sitting in a cafe - maximum security.</p>
<p><strong>*Working -</strong> If I am at my workplace - less secure than a public situation.</p>
<p><strong>*Home -</strong> If I am connected to my home network, the least secure.</p>
<p><strong>AERO –</strong> The famous graphical interface whose biggest advantage is beauty, and its biggest disadvantage is a reduction in performance,<br />
Therefore, it is highly recommended to buy a separate video card (with independent processor and memory) to enjoy high performance.<br />
Not available in the Home Basic version.</p>
<p><strong>Gadgets -</strong> All kinds of cool software that sits on the side of the screen like the famous Vista clock, notes, calendar, weather forecast, and countless other gadgets that can be downloaded from Microsoft&#039;s website. Comfortable and fun.</p>
<p><strong>Media Center –</strong> Amazing software where you can enjoy movies\photos\music, you can purchase a special remote control, connect the computer<br />
Screen in the living room and enjoy comfort and home entertainment in the style of the 2000s.</p>
<p>This feature is available in Home Premium and Ultimate versions.<br />
<strong><br />
Bottom line:</strong> Vista is a more secure, more enjoyable operating system that is not suitable for every computer.</p>
<p>Its interface is more user-friendly and much more inviting.<br />
So before you ask the technician to downgrade to XP, think twice.</p><p>The post <a href="https://www.genie.co.il/en/vista-intro/">מי מפחד מ vista</a> appeared first on <a href="https://www.genie.co.il/en">genie שירותי מחשוב לעסקים</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Windows 7 &#8211; מערכת ההפעלה מבית מיקרוסופט</title>
		<link>https://www.genie.co.il/en/windows7-intro/</link>
		
		<dc:creator><![CDATA[Eyal]]></dc:creator>
		<pubdate>Thu, 03 Jan 2019 09:17:45 +0000</pubdate>
				<category><![CDATA[כתבות בנושא IT]]></category>
		<category><![CDATA[שירותי מחשוב]]></category>
		<guid ispermalink="false">http://erd-genie.ln3.tempurl.tk/?p=8314</guid>

					<description><![CDATA[<p>Obviously, already when they finished marketing Windows Vista, the big brains of Microsoft started developing a new operating system. First it was distributed under the name Windows Vienna, but for some reason they decided to change its name to Windows. Microsoft confirms that during 2010, two versions of the software will be launched - 32 and 64 bit. The official features of the operating system are still […]</p>
<p>The post <a href="https://www.genie.co.il/en/windows7-intro/">Windows 7 &#8211; מערכת ההפעלה מבית מיקרוסופט</a> appeared first on <a href="https://www.genie.co.il/en">genie שירותי מחשוב לעסקים</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Obviously, already when they finished marketing Windows Vista, the big brains of Microsoft started developing a new operating system. First it was distributed under the name Windows Vienna, but for some reason they decided to change its name to Windows. Microsoft confirms that during 2010, two versions of the software will be launched - 32 and 64 bit. The official features of the operating system have not yet been revealed, but nevertheless Microsoft gives us many hints in order to develop our curiosity about the new product.</p>
<p>At Microsoft, they have already produced the temporary version of the new operating system, the &quot;pre-beta&quot; version is already available to developers, the company announced, and a new Office suite will also be launched together with it and will be a competition to the new Google Docs. Windows Vista has sold around 180 million copies to date, but has also received harsh and unsatisfactory reviews. On the other hand, Microsoft promises that Windows 7 is the solution to all problems and is the operating system that will revolutionize the world of computers. Windows 7 will be characterized by a much simpler operation of the features on the computer, and will allow any user to understand and operate the system simply. Also, they say in Microsoft, that they have also taken care of many defect problems that have resulted in dissatisfaction among Windows users.</p>
<p class="clearfix">Microsoft held a special conference for professional developers where it presented the future launch. The conference was attended by about 6,000 professional developers who came to be impressed. Julie Larsen-Green, the vice president demonstrated the experience of the simple use of the system. One of her most prominent examples was a simple and extremely fast connection between two home computers as well as listening to music files on one computer even though they are stored on the other computer at home. The task bar on the desktop has also been renovated, yes in its design as well as in its features and now it offers access to programs with a higher frequency of use to the user. The programs appear in the taskbar according to the user&#039;s level of need.</p>
<p><img decoding="async" src="https://www.genie.co.il/wp-content/uploads/2019/01/windows_7.jpg" alt="windows 7" /></p>
<p>At the conference, said Steven Sinofsky, one of the leaders of the development team of the new operating system, whose goal is to make the operating system comfortable and personalized for each and every user. In addition, Sinofsky also apologized for the problems with the current Windows Vista operating system, and assured that the company listens, accepts and deals with user reviews. An example of the solution to the &quot;small and annoying flaws&quot; mentioned by Vista users, the removal of user action controls. We are all familiar with the warning thing that has become hated by many Vista users.</p>
<p>This feature in the new operating system will allow you to ignore these warnings and continue normal work. It is important to note that Sinofsky presented these features on a very simple laptop from Lenovo, with a memory volume of only one gigabyte, when his aim was obviously to show that Windows 7 is suitable for working with any computer, even computers with fairly old technical specifications, compared to Windows Vista, one of the main claims was that the system is only suitable for modern computers.</p>
<p>Of course, the version presented now is only the experimental version, as they called it in the company, a &quot;pre-beta&quot; version for developers only. Logically, it can be concluded that the system still lacks many significant features. Microsoft emphasizes the success of the new system. In addition, they also guarantee system support for Intel and AMD multicore processors.</p>
<p>But with all the promises we can&#039;t really be sure that the new system will really come out in two years as promised. A good example is the Vista system. First, the name of the system was Windows Longhorn, and after some time the name was changed to what we know today as Windows Vista. In 2001, Microsoft announced that the system would also be launched within three years, which didn&#039;t exactly work out. The production process continued for another 3 years and the system was only launched in January 2007. So don&#039;t expect too much for 2010. Microsoft is also aware of this, so many sources claim that the name change is already progress and an attempt to meet the schedule this time.</p>
<p><strong>So is there anything to look forward to?</strong> There always is.</p><p>The post <a href="https://www.genie.co.il/en/windows7-intro/">Windows 7 &#8211; מערכת ההפעלה מבית מיקרוסופט</a> appeared first on <a href="https://www.genie.co.il/en">genie שירותי מחשוב לעסקים</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>מה עושים שאין דואר אלקטרוני מוגדר כברירת מחדל</title>
		<link>https://www.genie.co.il/en/no-outlook-default-mail-client-error/</link>
		
		<dc:creator><![CDATA[Eyal]]></dc:creator>
		<pubdate>Thu, 03 Jan 2019 08:54:45 +0000</pubdate>
				<category><![CDATA[כתבות בנושא IT]]></category>
		<category><![CDATA[דואר אלקטרוני]]></category>
		<category><![CDATA[שירותי מחשוב]]></category>
		<guid ispermalink="false">http://erd-genie.ln3.tempurl.tk/?p=8308</guid>

					<description><![CDATA[<p>Guide to solving a problem where there is no default e-mail The problem: the current e-mail client cannot fulfill the message transfer request The solution: the guide deals with the solution to the problem encountered when a file repeatedly pops up saying that there is no default e-mail client or that the current e-mail client cannot fulfill the message forwarding request. The solution to the problem is possible [...]</p>
<p>The post <a href="https://www.genie.co.il/en/no-outlook-default-mail-client-error/">מה עושים שאין דואר אלקטרוני מוגדר כברירת מחדל</a> appeared first on <a href="https://www.genie.co.il/en">genie שירותי מחשוב לעסקים</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><strong>Guide to solving the problem that there is no email set as a default</strong></p>
<p>The problem: The current mail client cannot fulfill the message forwarding request<br />
The solution: The guide deals with the solution to the problem encountered when a file repeatedly pops up saying that there is no default e-mail client or that the current e-mail client cannot fulfill the message transfer request. The solution to the problem is possible with the help of Microsoft Office Outlook.</p>
<p><strong>in the first level:</strong>  We need to open the Microsoft Office Outlook software and set it as our default client.</p>
<p><strong>In the second level: </strong>We must go to the start menu and write in the search menu below the word &quot;regedit&quot; and navigate there.</p>
<p><strong>In the third stage:</strong> After the &quot;regedit&quot; software has opened, we must select: HKEY_LOCAL_MACHINE\SOFTWARE\Clients\Mail\Microsoft Outlook and delete it (of course only after we have made a sure backup, by right-clicking the mouse and exporting).</p>
<p><strong>In the fourth step: </strong>We must open Microsoft Office Outlook, access the Help menu and select the Office Diagnostics program or in English &quot;Office Diagnostics&quot;.<br />
Let it run until it detects and resolves all issues.</p>
<p>Successfully.</p><p>The post <a href="https://www.genie.co.il/en/no-outlook-default-mail-client-error/">מה עושים שאין דואר אלקטרוני מוגדר כברירת מחדל</a> appeared first on <a href="https://www.genie.co.il/en">genie שירותי מחשוב לעסקים</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>