Google
 

Wednesday, January 23, 2008

Playstation 2 (PS2) Game Console Emulators

With a Playstation 2 Game Console Emulator, you can bypass the need for the Game Console and play the games directly on your own PC.

Playstation 2 (PS2) Game Console Emulators
Game Console Emulator:
Let us understand what a Game Console Emulator is.

When you buy game software for Playstation 2, you need to own the Playstation 2 console in order to be able to play your purchased games.

But if you happen to have a Playstation 2 Game Console Emulator, you can bypass the need for the Game Console and play the games directly on your own PC.

So, basically, this is what a Game Console Emulator is - a program that mimics or emulates the hardware of the game console well enough to run any software meant only for that game console.

Emulators are created using a process called reverse engineering. Console Games for Emulators are distributed through CD or DVD ROMs. These contain a copy of the game or the copy of the game memory chip, and can be used on a PC with the help of an emulator.

You can use a Playstation 2 Game Console Emulator to play games designed for Playstation 2 on your personal computer, and you can also use the emulator to carry out the functions of one console on another console. This is called cross-console emulation.

With Playstation 2 Game Console Emulators, you can play older games or older versions of current games. Gamers also used emulators to modify existing games, translate them into different languages, and to develop brand-new games.

Disadvantages of Playstation Emulator
Yes, all this does seem too good to be true. I mean, think about it, a piece of software (sometimes available freely) that renders a piece of hardware worth around $1500 obsolete. But then, there are some factors that space the real McCoy from the others. Here are some of the disadvantages of the Playstation Emulator, or any Emulator for that purpose:
  • Remember that most Emulators just 'work' the game. All Game Consoles have various features like 'Shake', which add to the gaming experience - simply impossible to achieve on the Personal Computer.
  • Most emulators cannot give the graphic quality that an actual console would be able to.
  • All console games are built for consoles, as are their control keys. It is hell and beyond for a casual gamer to even adapt the keyboard controls to the controls of the gamepad, simply put, a playstation emulator may be a bad idea for the casual gamer, while it will be a boon to the hardcore gamer
Here are some Game Console Emulators for Playstation 2 (PS2):

PS2 Emu – This game console emulator was created by Roor, shunt and Scar_T. You need BIOS files to use it.

PCSX2 – Started by Shadow, linuzappz and saqib, and developed further by a host of other developers. This is an Opensource freeware, which means if you have the developers’ skills, you are welcome to pitch in, study the code and help improve it further.

The thing about the PCSX2 emulator is that you need to own a legal Playstation 2 console in the first place to be able to use it. The PCSX2 requires the BIOS of the Playstation 2 for its functioning and you can’t dump the BIOS off the Playstation 2 console and add it to the emulator if you don’t own a legal copy. Because that makes it illegal, see? Seriously. Sony owns Playstation 2 and keep in mind that they are not shy of waging war against emulation experts. It’s something of the lingering Japanese samurai spirit – or the desire the keep all their code to themselves. Whatever. Buy the legal console first, and, yes, also a Dual Core Processor and a high-end graphics card for your PC, if you don’t already have them.

You can play games like Final Fantasy X and Devil May Cry 3 on PCSX2.

PCSX2 v0. 9.2 is the latest PCSX2 emulator.

Legal Issues:
Emulators made their entry into the gaming world on a fun, lighthearted note. The people who created them did not have piracy on their minds and most of them still don’t. The main purpose usually is to be able to access and play as many different games as possible on PCs. And the way to go about making this possible is by freeing code from the shackles of proprietary hardware. Thanks to emulators, gamers are not restricted to specific proprietary hardware environments and have a greater choice of games to play.

Which sounds nice enough, but there are couple of problems with this freedom-loving outlook.

Most emulators required a copy of the game console BIOS in order to function. And this software is created and designed at enormous cost by the Game Console Making companies. It is their copyrighted property and, given the time and money they’ve put into it, they are not generally in the habit of making their proprietary software available for free and without the specialized hardware. This means that if the emulators must get the BIOS, they have to do it illegally – unless they buy the console first.

Another issue is that emulators have caught up in such a big way with the gaming community that many people are now questioning the need for specialized gaming platforms and dedicated gaming boxes in the first place. If you can emulate any game format on your PC, why spend money on a game console? Nowadays, with PCs catching up with game consoles as regards to graphics and sound capabilities, it is even easier to use and enjoy emulators effectively. So in short, emulators could render proprietary video game consoles technically superfluous. And this is the main gripe of the Game Console companies like Sony and Nintendo. It’s bad business for them.

View more ......

AddThis Social Bookmark Button

Sunday, January 20, 2008

Defend Your Computer- Please!

Defending against viruses, crackers, spyware, Trojans and so forth is essential for anyone using the Internet. The number of security problems continues to escalate and this article discusses the measures that everyone should take to defend their computer.


(Since this article was written, I have added a whole new Web site, surfthenetsafely.com, that is devoted entirely to Internet safety.)

It may seem repetitious to keep writing about computer security but, quite frankly, an awful lot of people either don't understand the problems or just ignore the subject. If the only damage that resulted was to those who took no precautions, that would be one thing. However, all of us are affected. For example, the whole Internet suffers from the much heavier load caused by all the traffic generated by worms being spread from those who get infected from carelessness or ignorance. I have seen one estimate that on some days half of all e-mail is worm related. Everybody has to waste time getting rid of the worm-carrying messages that pile up in the mail boxes. (And that is in addition to all the spam, which is another subject.) I get tired of receiving virus mail from infected people who happen to have my name in their address book and from their friends and friends of friends who got infected in turn. Even more irritating is the mail that goes out from these infected systems purporting to be sent by me, some of which is then bounced to me as undeliverable. For a while I was appearing to be a big tout for a Japanese porno shop. It can be virtually impossible to find out who the infected people are without having access to ISP logs. Sometimes these machines stay infected for months and keep on mailing out one virus-laden message after another under many different names. Somebody with a dial-up account at the now defunct ISP Nerc bombarded me (and many others no doubt) for months using a host of faked names. From the e-mail headers, I could get a time stamp and their various IP addresses (which of course were temporary) but Nerc refused to do anything about it.

Another problem to us all is that sometimes important web sites are brought down by malicious attacks that make use of Trojan horses planted on the machines of unwitting PC users. Even those who are careful can get caught because new worms and Trojans seem to come out every day and the malware authors are getting more and more clever at using tricks to get people to open infected mail. In addition, hackers are using Internet connections that are poorly guarded to plant Trojan horses directly on machines through open ports.

That was the bad news. The good news is that a typical home user can defend his or her computer with some straightforward precautions. The first line of defense is common sense. It utterly baffles me why otherwise intelligent people click on e-mail attachments from strangers who write in broken English. In fact, these days you should never click on any attachment, no matter what the source, unless you know for sure what it is. The source of e-mail is easily faked. That attachment from Aunt Matilda may be something she doesn't even know has been sent. She may have a Trojan horse. Send her an e-mail asking about it before opening. Or call her on your cell phone. Maybe you can help her clean up her computer. If dear old straitlaced Dad who is 85 years old suddenly sends you an e-mail about pictures of nubile young girls, alarm bells should go off and I don't mean about Dad. Anything that is out of character should be treated as a possible worm or Trojan. Also note that Microsoft and other software companies never send patches or updates by attaching them to e-mail.

In a related area, never give account numbers, passwords, or other sensitive personal information in reply to any e-mail. Such information should only be entered on secure web sites. Internet service providers, banks, stock brokers, and the like do not ask for personal information to be sent by e-mail. A scam technique called "phishing" is growing whereby various e-mail tactics are used to inveigle credit card numbers and account passwords out of gullible PC users. More information on "phishing" is available on another page.

Anti-virus programs

Vigilance and good judgment will avoid many problems but we also need to have some software guardians. Most people know that anti-virus software is a necessity and most computers come with some form of anti-virus program already installed. (By the term "virus" I will be referring to any type of malware including viruses, worms and Trojan horses.) All the major programs check e-mail as well as scanning your system. However, new viruses appear every day and anti-virus programs are only as good as their database or definitions of viruses. A program can't recognize a new virus unless it has been kept up to date. Anti-virus programs contain update features and these are automatic in the newer major programs. However, the big vendors like Symantec and McAfee no longer give unlimited free updates but start to charge after some initial period ranging from 3 months to 1 year. Very often people do not subscribe to the new updates and let their protection lapse. This leaves the computer open to any new virus that comes along. Personally, I am not keen on having to pay $15 or $20 a year to Symantec either but all things considered it is a relatively small operating cost. An alternative is one of the free programs like Grisoft's AVG. In the past, Symantec's Norton has always seemed to get much better reviews for efficacy against infection than the freebies but a recent review by the magazine PC World indicates that there are several free programs that now provide acceptable levels of protection. PC World also has a download site. I have no personal experience with it, but I have seen quite a few favorable comments about the AVG program. One way or another, however, it is essential to use an updated anti-virus program.

Firewalls

The second piece of defensive software that everybody should have is a firewall. Firewalls keep uninvited visitors from the Internet from accessing your computer. They also keep an eye on which programs on your computer try to make Internet connections. Unless they had a broadband Internet connection, I used to tell people that they probably did not need a firewall. However, hacking has reached the point where everyone, even those with dial-up connections, needs a firewall. My firewall keeps a log of attempts to probe my computer and once in a while I check it out of curiosity. The attempts are unceasing and come from all over the world. (I know because I look up some of the IPs.) Even my wife's dial-up AOL account is probed all the time. Many of these probes are not malicious but I see no reason to take chances on the good will of all these strangers.

The present version of Windows XP has half a firewall built in. Unfortunately, it monitors only incoming traffic and therefore is of no help in warning about programs on your computer that call up Internet sites without telling you. Also, note that that you have to specifically enable it. (Service Pack 2 turns it on by default.). I recommend a more robust program. If you want to, you can go for one of the commercial suites that include a firewall together with a variety of other programs. However, there are several very good free programs. I like and use ZoneAlarm but there are other good choices. The magazine PC World has a good discussion of firewalls.

Spyware and Trojan removers

Previously not quite as important but becoming more and more necessary is separate software specifically for removing spyware and other Trojans. This function is included in the better commercial suites. Good anti-virus programs should stop most Trojans but won't help with spyware. A firewall will warn you if something on your system tries to call out and alert you to many Trojans and spyware. However, if you download and install a lot of programs or you want another line of defense, you should get a separate program specifically for detecting and cleaning out Trojans and spyware. There are at least two good free programs, AdAware and Spybot Search and Destroy. For additional information on spyware go here.

Proper defense of your computer also involves some configuring of the system and regular application of security patches. I will discuss these measures next.

Windows Update

For a variety of reasons the Windows operating system has been far from optimum in the area of security. A large number of security holes have been found over the years. As time goes on, Microsoft plugs these holes but new ones keep being discovered. Microsoft has been issuing patches with numbing frequency. Windows XP comes with a feature that provides for downloading and installing this constant flow of updates but it has its problems. There is no room here to go into all the details but Window Update does not always work correctly (for just one example, see this link). Nor is it always as current as it should be. Not only that, but sometimes the patches break things and have to be re-patched. Another problem is that dial-up connections can be too slow for practical downloading of some patches. Microsoft has made a free CD available that contains the new service pack 2 for Windows XP.

Windows Update problems or no, there really isn't a good alternative for the average PC user. All critical updates should be applied, either from a CD or by downloading. To guard against problems from installing a patch, be sure to create a System Restore point before any installation. If something goes awry with an installation, then you can at least get back to where you started. The update feature has settings that will allow downloads to be automatic but dial-up users should probably configure the system to ask first before downloading. They can then be prepared for a long process if the file is large. Windows Update can be configured by going to Control Panel-Performance and Maintenance-System and clicking the tab "Automatic Updates". You can then choose from these options:

  • "Notify me before downloading any updates and notify me again before installing them on my computer" (best for dial-up)
  • "Download the updates automatically and notify me when they are ready to be installed"
  • "Automatically download the updates and install them on the schedule that I specify"

(Note: Installing SP2 modifies the above procedure for configuring updates.)

Configure System Settings

One line of defense against malware attachments in e-mail is to watch the file extensions carefully. So once more, I urge that the setting be made that allows file extensions to show. If you can see the extension, you can be aware when a file is of a type that is potentially dangerous.

Depending on what software you use for reading e-mail there may be other settings that help with guarding against attachments. If you use Outlook Express as your e-mail client, a tutorial showing how to make a variety of security settings is here.

Internet Explorer has a variety of security settings. Unfortunately, the defaults are not always the safest and some tweaking can make your system more secure. There are too many possible settings to go into here but here is a step-by-step procedure that gives many details.

Computer experts also suggest that you not use an account with administrative privileges for your routine activities. Rather, they suggest that you set up and use a separate account with limited rights. Then if a virus does get into your system, the damage it can do is limited.

Is the Internet Safe?

There are so many warnings and alarms about malware and other problems that some people wonder if it is safe to use the Internet at all. If the average PC user takes the precautions we have been discussing, there should be little cause to worry. Common sense alone will keep you out of many problems and the other measures we have discussed will protect you against the more subtle ones. The Internet is a wonderful thing and should be used to its fullest. Just don't be careless. If enough people take proper security measures, the chain reactions that we get from malware won't get started.

View more ......

AddThis Social Bookmark Button

Shortcuts and tips for using Internet Explorer 7

Some shortcuts and ways to better configure Internet Explorer 7 (IE7) are given

A previous page gave some tips for using Internet Explorer 6. Most of the tips given for IE6 apply to IE7 as well but there are some new features in IE7 that require a different approach. Some of the changes are the addition of tabs, new security features, and a somewhat different interface.

Shortcuts for tabs

Here are some shortcuts specific to IE7. Note that the keyboard shortcuts given in Table I of the previous page apply to both IE6 and IE7. Table I gives shortcuts related to the use of tabs.

Table I. Shortcuts for using tabs in IE7
Action Result

Ctrl+click

Opens a link in a tab . New tab stays in background

Ctrl+Shift+click

Opens a link in a tab . New tab is in the foreground
Ctrl+t Opens a blank tab in the foreground
Ctrl+Tab Switches between tabs
Ctrl+Shift+Tab Switches between tabs in reverse order
Ctrl+w Closes current tab

Ctrl+Alt+F4

Closes other tabs

Ctrl+q

Open Quick Tabs (thumbnail views)
Ctrl+n (where n is an integer from 1-8) Opens nth tab

Click a link with the mouse wheel

Opens a link in a tab . New tab stays in background .

Click a tab with the mouse wheel

Closes the tab

Drag and drop tabs

If you prefer a particular order for your tabs and end up with an arrangement you don't like, it's very easy to sort the tabs into whatever order suits you. Simply use the mouse to drag the a tab into its desired position and drop it there.

Shortcuts for menus

Table II gives some shortcuts for using the menus in the new IE7 interface. Note that the Menu Bar is no longer displayed in the default setting. Functions from the Menu Bar are available in other ways. If desired, the Menu Bar itself can be toggled on and off or restored from the new Tools menu.

Table II. Keyboard shortcuts for menus in IE7
Keyboard Action Result
Alt Toggles the Menu Bar
Alt+m

Opens the Home menu

Alt+j Opens the RSS menu
Alt+p Opens the Print menu
Alt+o Opens the Tools menu
Alt+l Opens the Help menu
Ctrl+f Opens the Find dialog box

Multiple home pages

Figure 1. Configuring Internet Options setting for home pages
Configuring Internet Options setting for home pages

A new feature of IE7 is the ability to have the browser open with several home pages displayed as tabs. If you routinely visit several sites every time you go online, this can be a nice convenience. Naturally, however, the more home pages, the slower the browser will open. Figure 1 shows the setting in Tools-Internet Options where home pages can be entered.

Figure 2. Home menu
Home menu

There is also a menu obtainable from the Command Bar icon called "Home" (Figure 2) or by entering the keyboard shortcut Alt+m mentioned in Table II. Additional home pages can then be configured in the dialog box obtained from clicking "Add or change home page..." The dialog box that will then open is shown in Figure 3.

Figure 3. Dialog box for home page change
Dialog to change home page

Security and the Information Bar

Internet Explorer 7 has a number of new security measures built in. When IE7 detects a possible security situation, it will display a message in what Microsoft calls the "Information Bar". There are a variety of messages and one example is shown in Figure 4.

Figure 4. Example of Information Bar message
Example of Information Bar message

There are two keyboard shortcuts that can be used with the Information Bar. These are given in Table III.

Table III. Shortcuts for the Information Bar
Keyboard action Result
Alt+n Puts focus on Information Bar
Spacebar Clicks the Information Bar

Zoom options

With the use of higher resolution settings now common, it is sometimes desirable to zoom on a page to make text and graphics larger. Using the "Control" key together with the "plus" or "minus" keys can be used to increase or decrease the size of objects on a Web page display. Thus the keyboard combination "Ctrl+" will increase the size of objects in 10% steps. Similarly, the combination "Ctrl-" will decrease the size.

Another zoom function can be found at the far right of the status bar at the bottom of the browser window. A drop-down menu is available with a variety of different zoom settings.

View more ......

AddThis Social Bookmark Button

Using a Customized Privacy Import File to Manage Cookies in Internet Explorer

A number of settings for controlling cookies are provided in Internet Explorer 6 (IE6). These settings are accessed through the Internet Explorer menu entry Tools-Internet Options-Privacy. The standard settings are well-known but the advanced capability for importing customized settings seems to have remained more or less in obscurity. Probably this is because most discussion of the subject has focused on specialized technical aspects with complex rules. If, instead, we keep the rules simple, customized settings will be relevant to more systems. I believe there is much to be said for a version of a privacy preferences file aimed at the average PC user and I will discuss how to go about this.

Advantages of a Customized Privacy Import File

Although it is not for everyone, I believe that many PC users would find the kind of cookie control available from a simple version of a custom file to be very useful. The specific advantage emphasized in this article comes from the ability to force cookies to be what are called "session" cookies. That is, a cookie is accepted for whatever length of time that the browser is open but is deleted as soon as the browser is closed. The cookie never gets stored on the hard drive. This procedure overcomes two problems encountered when using standard IE6 cookie controls. First, simply blocking cookies is impracticable because so many sites insist that cookies be allowed or they refuse to function properly. Instead of blocking cookies, you can accept the cookie temporarily. This satisfies the Web site and the cookie is then discarded when you are finished browsing. A number of commercial cookie blockers work this way. The second advantage is an improvement over the procedure of blocking third-party cookies while allowing first-party cookies. Many first-party cookies are now used for advertising and tracking purposes. Forcing all cookies into session cookies keeps these off your machine.

In addition to the ability to force all cookies into temporary session cookies, custom files allow for controls tailored for several types of security zone and for individual Web sites. However, average PC users tend to make little use of configuring different zones and sites and to keep the complexity down, I will concentrate on the settings for the Internet Zone. This zone is by far the most important for average PC users and will be sufficient for many. More details on the structure and creation of a privacy file are given here. Experienced computer users can consult the original Microsoft paper on customized settings or make use of the large assortment of customized privacy files put together by Eric Howes. This same author also has a very extensive discussion of using privacy files.

Example of a Customized Privacy Import File

As already mentioned, the file given here applies to the Internet zone. The Internet zone covers all Web sites except those sites that you have specifically added to other zones. The file will preserve any old cookies but will force new first-party cookies to be session only. It blocks third-party cookies. The contents of the file can be viewed here where more details on how to create a privacy file are given. A copy of the file in zipped format can be downloaded here. After unzipping, the file can be read in Notepad. Also, assuming that IE6 is your associated application for XML files, double-clicking will open it in IE6 for reading. The actual installation of the file is discussed in the next section.

Using a Customized Privacy Import File

Importing a customized privacy file is a simple process. First, make sure that you already have whatever cookies that you wish to keep for such purposes as logins, passwords, etc. The custom settings that we are going to use will preserve these old cookies but will not allow new cookies to be saved. If you wish to check your cookies, they are kept in a folder called "cookies".They are in the folder \Documents and Settings\{Username}\cookies\ In Windows XP, and in older systems they are in \Windows\cookies\. It may be simpler to use one of the free cookie viewers, such as the one from Karen Kenworthy.

Just to be on the safe side, you may want back up your Registry or do a system restore point before importing any new settings. If you are familiar with Regedit, you can just back up the Registry key
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings

To import the file, open the Internet Explorer menu Tools-Internet Options-Privacy. The figure below shows the dialog box. Click the button "Import".

The usual type of dialog box for choosing a file will appear as shown below. Select the XML file that you wish to use and click "open".

A message box (below) will appear indicating a successful importation. Click "OK".

If you do not like the settings, you can return to the default configuration. Open the Internet Explorer menu Tools-Internet Options-Privacy again (Figure below). It will appear somewhat different and the "Default" button is no longer grayed out. Click this button and then click "OK". The settings will revert to those of the first figure above.

View more ......

AddThis Social Bookmark Button