Everything is in Here

Welcome to My Blog

Enjoy your reading


Google Search

Google is a more powerful tool than most people realize. You can get much more refined searches with Google’s built-in tools, advanced operators, and third-party extensions. You can also use it for some pretty cool stuff if you know the right tricks. Here are 10 of our favorite lesser known tricks and features.

10. Use Google to Search Certain Sites

If you really like a web site but its search tool isn’t very good, fret not—Google almost always does a better job, and you can use it to search that site with a simple operator. For example, if you want to find an old Lifehacker article, just type site:lifehacker.com before your search terms (e.g. site:lifehacker.com hackintosh). The same goes for your favorite forums, blogs, and even web services. In fact, it’s actually really good for finding free audiobooks, searching for free stuff without the spam, and more.

9. Find Product Names, Recipes, and More with Reverse Image Search

Top 10 Clever Google Search Tricks

Google’s reverse image search is great if you’re looking for the source of a photo, wallpaper, or more images like that. However, reverse image search is also great for searching out information—like finding out who makes the chair in this picture, or how do I make the meal in this photo. Just punch in an image like you normally would, but look at Google’s regular results instead of the image results—you’ll probably find a lot.

8. Get “Wildcard” Suggestions Through Autocomplete

Top 10 Clever Google Search Tricks

A lot of advanced search engines let you put a * in the middle of your terms to denote “anything.” Google does too, but it doesn’t always work the way you want. However, you can still get wildcard suggestions, of a sort, by typing in a full phrase in Google and then deleting the word you want to replace. For example, you can search for how to jailbreak an iphoneand remove one word to see all the suggestions for how to ____ an iphone.

7. Find Free Downloads of Any Type

Top 10 Clever Google Search Tricks

Ever needed an old Android app but couldn’t find the APK for what you were looking for? Or wanted an MP3 but couldn’t find the right version? Google has a few search tools that, when used together, can unlock a plethora of downloads: inurlintitle, and filetype. For example, to find free Android APKs, you’d search for -inurl:htm -inurl:html intitle:"index of" apk to see site indexes of stored APK files. You can use this to findAndroid apps, music files, free ebooks, comic books, and more. Check out the linked posts for more information.

6. Discover Alternatives to Popular Sites, Apps, and Products

Top 10 Clever Google Search Tricks

You’ve probably searched for comparisons on Google before, like roku vs apple tv. But what if you don’t know what you want to compare a product too, or you want to see what other competitors are out there? Just type in roku vs and see what Google’s autocomplete adds. It’ll most likely list the most popular competitors to the roku so you know what else to check out. You can also search for better than roku to see alternatives, too.

5. Access Google Cache Directly from the Search Bar

Top 10 Clever Google Search Tricks

We all know Google Cache can be a great tool, but there’s no need to search for the page and then hunt for that “Cached” link: just type cache: before that site’s URL (e.g.cache:http://lifehacker.com). If Google has the site in its cache, it’ll pull it right up for you. If you want to simplify the process even more, this bookmarklet is handy to have around. It’s great for seeing an old version of a page, accessing a site when it’s down, or getting past something like the SOPA blackout.

4. Bypass Paywalls, Blocked Sites, and More with a Google Proxy

Top 10 Clever Google Search Tricks

You may already know that you can sometimes bypass paywalls, get around blocked sites, and download files by funneling a site through Google Translate or Google Mobilizer. That’s a clever search trick in and of itself, but just like Google Cache, you can make the process a lot faster bykeeping a few URLs on hand. Just add the URL you want to visit to the end of the Google URL (e.g. http://translate.google.com/translate?sl=ja&tl=en&u=http://example.com/ and you’re good to go. Check out the full list of proxies, along with bookmarklets to make them even easier, here.

3. Search for People on Google Images

Top 10 Clever Google Search Tricks

Some people’s names are also real-world objects—like “Rose” or “Paris.” If you’re looking for a person and not a flower, just search for rose and add to &imgtype=facethe end of your search URL, as shown above. Google will redo the search but return results that it recognizes as faces!

Update: Reader unclghost kindly pointed out that we’re working with outdated information here—this trick is now built into Google’s UI! Just head to Search Tools > Type and you can choose from faces, photos, clip art, line drawings, and even animations. Thanks for the tip!

2. Get More Precise Time-Based Search Results

Top 10 Clever Google Search Tricks

You’ve probably seen the option in Google that lets you filter results by time, such as the past hour, day, or week. But if you want something more specific—like in the past 10 minutes—you can do so with a URL hack. Just add &tbs=qdr: to the end of the URL, along with the time you want to search (which can include h5 for 5 hours, n5 for 5 minutes, or s5 for 5 seconds (substituting any number you want). So, to search within th past 10 minutes, you’d add&tbs=qdr:n10to your URL. It’s handy for getting the most up-to-the-minute news.

1. Refine Your Search Terms with Advanced Operators

Top 10 Clever Google Search Tricks

Okay, so this isn’t so much a “clever use” than it is a tool everyone should have in their pocket. For everything Google can do, so few of us actually use the tools at our disposal. You probably already know you can search multiple terms with AND or OR, but have you ever used AROUND? AROUND is a halfway point between regular search terms (like white teeth) and using quotes (like "white teeth"). AROUND(2), for example, ensures that the two words are close to each other, but not necessarily in a specific order. You can tweak the range with a higher or lower number in the parentheses.

Similarly, if you want to exclude a word entirely, you can add a dash before it—like justin bieber -sucks if you want sites that only speak of Justin Bieber in a positive light. You can also use this to exclude other parameters—like excluding a site you don’t like (troubleshooting mac -site:experts-exchange.com).

sumber : http://lifehacker.com/top-10-clever-google-search-tricks-1450186165


The software and the Tracking of Kinect

The depth sensing hardware is the first feature that makes the Kinect special but without software it is just so much clever optics and processing. When Microsoft first released the Kinect it was very much Xbox and Microsoft applications only. It didn’t take long for the USB connection to be decoded and open source USB drivers appeared on the web. With these you could connect the Kinect to a Linux or Windows machine and access the raw data.

Only a few weeks later developing for Kinect became easier thanks to an open source initiative setup by PrimeSense the original designers of the Kinect hardware. All of the necessary APIs available as a project called OpenNI with drivers for Windows and Ubuntu.

The only problem is that the drivers that they supply are for their own reference hardware. However changing the driver is a matter of modifying configuration files and this has been done for the Kinect and this is explained

So how does Kinect track people?

There are two answers to this question. The old way and the new way designed by Microsoft Reasearch.

The new Microsoft way of doing things has significant advantages but at the moment only Microsoft have access to it. It has been promised that an SDK for the Kinect will be made available in the future and this might includes some “middleware” that does body tracking – or it might not.

Currently the only body tracking software that is available for general use is NITE from PrimeSense. This isn’t open source but you can use it via a licence key that they provide at the OpenNI website. This works in the way that all body tracking software worked until Microsoft found a better way so lets look briefly at its principles of operation.

The Nite software takes the raw depth map and finds a skeleton position that shows the body position of the subject. It does this by performing a segmentation of the depth map into objects and then tracks the objects as they move from frame-to-frame..

This is achieved by construct an avatar, i.e a model of the body that is being detected, and attempting to find a match in the data provided by the depth camera. Tracking is a matter of updating the match by moving the avatar as the data changes.

This was the basis of the first Kinect software that Microsoft tried out and it didn’t work well enough for a commercial product. After about a minute or so it tended to lose the track and then not be able to recover it. It also had the problem that it only worked for people whe were the same size and shape as the system’s developer – because that was the size and shape of the avatar used for matching.

sumber : http://www.i-programmer.info/babbages-bag/2003-kinect-the-technology-.html?start=1

History of Bitdefender

BitDefender is one of the best, if not the absolute premier product, among antivirus softwarefor personal computing defense. BitDefender’s legacy began in Romania in 1996. Before the product was known as BitDefender, it had the name AVX (Anti-Virus eXpert) and was the first product of its kind to feature an update system that required no input from the user. AVX would automatically download lists of new threats that were circulating through the online community, which kept the software up to date without bothering the user.

In 2001, AVX became BitDefender when it entered the international market and became available for download by anyone around the world. By 2003, the product began to move into areas other than virus protection when the company added a new proprietary system to the protective software’s already impressive array. This new system was known as MIDAS, or the Malware Intrusion Detection Advanced System. This branched out into protecting computers from harmful software that are not technically viruses.

Also in 2003, BitDefender became the first security application to feature anti-dialer software that blocked spyware that would access computers’ modems and dial up to remote connections without the user’s knowledge. These connections would allow hackers to access the computer and obtain the information it contained. The computer could also then be employed to violate other machines or send out harmful software to other users, making it appear as if the violated computer was the culprit, rather than tracing the destructive actions back to the hacker responsible.

In 2004, there were several advancements to BitDefender, including anti-spam technology and the release of LinuxDefender, which is security software for Linux operating systems and servers. The year 2004 also saw the inclusion of update pushing added in to the package. This meant that rather than having to wait for a scheduled update for new protection to become available, new threat-detection protocols would be instantly pushed onto computers for instant protection the minute it was available. The application also came out ahead of other software of its kind with the fastest reaction time to viral threats.

By 2005, BitDefender was launching its ninth generation of products. Its Internet Security Package was labeled as one of the most comprehensive solutions on the planet. It contained anti-spyware, anti-spam, firewall protection and parental controls along with its already impressive protection against common threats.

In 2007, the company released a fully mobile component to protect smartphones and PDAs from intrusion by hazardous software.

In 2008, BitDefender linked with SOS Online Backup to provide a solution to data-loss prevention. The same year saw the release of Security Suite for Business, which helped small and growing businesses by providing an affordable, comprehensive solution to most online threats. Total Security 2009 was also released that year, which was lauded as the best product for proactive security.

Total Security 2010 came out in 2009 and included the application’s QuickScan feature that provides superior protection against online threats without causing severe slowdown of running computer systems or requiring significant bandwidth usage.

BitDefender has come a long way from its beginnings in just a decade. Its current iteration, Antivirus Pro 2011, is the most complete software suite for personal security available today. In the competitive and complicated world of computer security, BitDefender has managed to stay ahead of the curve with continual innovations and superior, intelligent design

sumber : http://anti-virus-software-review.toptenreviews.com/the-history-of-bitdefender.html

Cloud Device

A Cloud Device is a real-world device that is augmented with a cloud-based virtual representation of itself. The virtual device in the cloud stays in sync and connected with the physical device, and provides powerful capabilities in a way that even simple physical devices can take advantage of. For example, making a simple temperature sensor device into a Cloud Device gives the simple temperature sensor the ability to make sense of its temperature data, to learn over time, and to interact with users or other systems.

A Cloud Device delivers organized storage (historical data), device-specific processing (using our proprietary Lua scripting engine), eventing & alerting (use external conditions to qualify device data states) and graphical user interfaces (rich dashboards or mobile application environments can be attached to the connected device type). We’ve integrated these features for each individual connect device with our overall Internet of Things Platform framework. This framework enables businesses to setup rules for managing ownership, access, sharing and billing to deliver the power of Cloud Devices to their customers.

Turning your connected device into a Cloud Device is like turning your paper-based scheduling book into a shared online calendar. For real-world data, it is an ideal Internet of Things solution, allowing simple microprocessors in household appliances or industrial applications to become powerful sources and uses of real-time data that increase their benefit to users and businesses.

By allowing your customers to easily connect their device to the Internet, you are providing a powerful out-of-the-box experience with your product and brand. The connected device owner’s process of gaining anywhere access to the capabilities of the Cloud Device is a perfect opportunity to establish an ongoing relationship with your customers.

Cloud Devices can be natively managed by the device management tool Exosite has created. Whether it is a single device or many connected devices in complex configurations, the full life-cycle features of our Device Management Portal are available for device OEMs, fleet-managers, regional oversight, and end-users. For example, deploying over-the-air software updates via the cloud – to one device, or to groups of connected devices – is an off-the-shelf feature of the system.

sumber : http://exosite.com/cloud-device/

About Razer

Founded in San Diego, California by our CEO Min-Liang Tan, and President Robert “Razerguy” Krakoff, Razer began in a tiny shared office with a couple other gamers. Today, we have grown to hundred employees worldwide with offices in nine cities including San Francisco, Hamburg, Seoul, Shanghai, and Singapore.

Our vision from the very beginning was to be the world’s greatest gaming brand and we’ve set out to achieve that by designing the best gaming products that any gamer has ever used.

We design our products based on three fundamental tenets: technology, ergonomics, and validation from the very best professional gamers. World class scientists and engineers develop cutting edge technology in-house or with partners, design products with extensive human interfacing studies and then test the hell out of them in field with pro-gamers before launch.

No other gaming hardware company boasts dedicated gaming user interface R&D labs, and our technology and designs are incubated in three design facilities located in California, Singapore and Shenzhen.

We tell it like it is: some can pretend to co-develop products with professional gamers, but gamers don’t develop technology; scientists and engineers do (and ours just happen to be passionate gamers too). That said, feedback from professional gamers who use our products in high-level tournaments is invaluable to us. It is how we iterate, refine, and perfect our designs over and over again. That’s how a Razer product is built from the ground up. No marketing BS and no hype.

Not only do we work with the very best in the eSports scene, we believe in helping the community grow. We were one of the pioneers back in the early days of competitive gaming, and to this day continue to sponsor top cyber athletes and international teams with aspirations of epic glory and ever-increasing prize money. They in turn give back to Razer by testing and validating our products.

The people that work here at Razer are just like you – gamers. Some amateur, some ex-professionals, all in it for the love of gaming. Just ask our CEO, who will happily lay the smack down on you in Quake Live or our President, who has over ten level 80’s on his local server. Hell, he will even take you on a raid in the middle of the work day.

We are the same gamers who are told by the suits that we need adult supervision and a professional CEO or management team to tell us how to run this company. And we’re the same gamers who tell the suits exactly where to shove it because we like doing what we do – and we do it on our own terms.

We are the same gamers who are told by the suits that we need adult supervision and a professional CEO or management team to tell us how to run this company. And we’re the same gamers who tell the suits exactly where to shove it because we like doing what we do – and we do it on our own terms.

We hope our passion for gaming speaks to you like it does to us, through our products and the competitive edge we bring to your game.

For Gamers. By Gamers.
Team Razer

sumber : http://www.razerzone.com/about-razer

History of Norton Antivirus

A look at the history of Symantec’s signature security products – Norton AntiVirus, Norton Internet Security, and Norton 360 – begins when home computing was still in its infancy and the Internet as we know it today was still a dream in the minds of its developers. It can even be traced back to one man.

Peter Norton was a computer genius from the beginning, starting his career working on big mainframes (and some smaller computers) for aerospace companies such as Jet Propulsion Laboratory and Boeing. After he was laid off during cutbacks in the West Coast aerospace industry, Norton switched his focus to programming for personal computers. (He was one of the first people to own an IBM PC when it was introduced in 1981.)

It didn’t take Norton long to find a need in the industry, and he began to develop a program that could help “undelete” a file. With that one computer and $30,000, he began Peter Norton Computing and by 1982, he developed Norton Utilities. By 1985, with his company booming, Norton published “The Peter Norton Programmer’s Guide to the IBM PC.” The cover featured Norton with a crossed-arm pose on the front, which became a registered trademark and a symbol on all Norton products until 2001.

By 1990, with his company bringing in $5 million in revenues, Norton agreed to a merger with Symantec. Because of Norton’s well respected reputation with the public and within the industry alike, Symantec kept the name for its consumer arm.

Norton AntiVirus

In 1995, Norton AntiVirus was launched (along with Norton Navigator and Norton Utilities) on the same day that Microsoft launched Windows 95. This strategy allowed Symantec to market Norton AntiVirus as providing protection for Windows users since Day 1 of that product.

One of the most important steps in Norton’s history was the 1997 launch of the Symantec Antivirus Research Center in four locations: Santa Monica, Calif.; Leiden, Holland; Tokyo, and Sydney. These locations not only serve as a research center to research and develop against worldwide viral malware threats, but also to provide 24-7 protection against security risks. This concept has now developed into Symantec Security Response.

Symantec with its Norton AntiVirus truly flexed its muscles when the infamous Melissa virus was launched in 1999. Within 28 reports through the Scan and Deliver feature, the SARC had a detection and repair utility available to its customers.

Norton Internet Security

Also in late 1999, Symantec launched its first version of Norton Internet Security. This was a first of its kind: a program that offered online privacy security as well as Internet security. Although Norton AntiVirus may be Symantec’s most recognizable name, Norton Internet Security has gone on to become its best-selling product.

In 2000, Symantec teamed with Brightmail Inc. (which it would later acquire) to provide antispam features to itsantivirus products. This was another important step for Symantec, as they continue to follow cybercriminals onto the platforms they choose to launch their latest attacks.

As the 2000s rolled on, so did the widespread popularity of using the Internet. However, this caused some problems as a generation of youths who grew up with computers was finding dangers on the Internet, and usually without the knowledge of parents, many of whom were not as up-to-date with the new technology. In 2003, I-SAFE America and Symantec teamed up during Internet Safety Month to raise awareness to parents, children, and teachers about online dangers.

And although many people consider the term “phishing” a relatively new term, Symantec was an early member of the Anti-Phishing Working Group, an industry group dedicated to stopping and educating the public about the types of fraud, identity theft, and other online scams. As these types of attacks have risen in frequency, Symantec has included protection against them in their Norton products.

Norton 360

Then by 2007, Symantec recognized the need to produce an all-in-one Norton product, something that combined antivirus, firewall, antispam, anti-phishing, intrusion protection, tune-up, and back-up features. It would basically be something that combined the best security features of Norton Antivirus and Norton Internet Security, PC performance features of Norton Utilities, as well as the backup and restore features of Norton Ghost and Norton Save & Restore. Because it brings everything in a full circle, Symantec called this product Norton 360.

Norton 360 was so well received, that it was awarded the Editor’s Choice Award by CNET for its top pick in its category.

Beyond the box

Both Peter Norton Computing and Symantec, from their beginnings, have been dedicated to producing software that solves problems for computer users everywhere. Symantec is now in a position to help more than just its subscribers of Norton AntiVirus, Norton Internet Security, and Norton 360.

Norton has also developed Norton Online Family, which was originally launched for free in 2009 as a future replacement for the parental control Add-On Pack for Norton Internet Security and norton 360. However, Symantec made the decision to provide this service free for anyone (not just Norton subscribers) with the thought that no parent should have to do without some online safety measure.

With the latest versions that are Norton AntiVirus 2014, Norton Internet Security 2014, and Norton 360 Version 2014, subscribers have a wide variety of options to make sure they have the security protection they need.

sumber : http://www.nortonadvisor.com/products-norton/norton-security-products-history.html

About Akismet

What is Akismet?

Akismet is a hosted web service that saves you time by automatically detecting comment and trackback spam. It’s hosted on our servers, but we give you access to it through plugins and our API.

How can I use Akismet?

There are a couple of ways:

The easiest is through pre-built plugins. WordPress is our most popular plugin, but there are over 20 others to choose from.

The other way you can access Akismet is through our API. The API gives you direct access to the Akismet service. In fact, it’s what all of the plugins are built on.

Whether you use a plugin or the API, you’ll first need toregister an API key with us. The API key is a string of letters and numbers that acts like a username/password, allowing you to login to the Akismet service. You should never give your API key to anyone, as this will give them access to your account.

How does it work?

Each time a new comment, trackback, or pingback is added to your site it’s submitted to the Akismet web service which runs hundreds of tests on the comment and returns a thumbs up or thumbs down. As a result, you don’t have to waste your time sorting through and deleting spammy comments from your blog.

5 things every blogger should know about spam

1. Web spam is different from email spam.

Email spammers want you to buy their product. You are the target of the ad contained in each email spam you receive. Comment/web spammers want your readers to buy their product. You (the blogger, author, moderator) are not the target.

2. Web spammers are social engineers.

Email spammers write messages to get your attention. Comment spammers write messages to escape your attention. They want you to believe they are real bloggers, real people, writing real comments, so you’ll approve the comment and publish it on your site. They use flattery, appeal to your good nature, and simply lie in order to convince you to give them the benefit of the doubt.

3. Web spammers are basically advertising on your blog..

..and they’re keeping all of the profits. They’re not even asking your permission first. Right now someone is offering to sell links from your blog to anyone willing to pay a few dollars (or a few cents). If your blog is well known, it may even be listed by name, with backlinks for sale at a set price.

4. It’s all about the backlinks.

Web spammers are selling links from your blog to their clients. They do this to game the search engines and trick your readers into visiting dubious web sites. Their clients are sometimes seemingly harmless, but are often peddling fake pills, porn, scams and malware. Sometimes they’ll use “buffer sites” – that is, innocent looking web pages intended to disguise the fact that they’re really advertising something more sinister.

5. Spammers employ humans.

Not all spam is delivered by spambots. Spammers are increasingly using humans to write and post comments by hand. Typically they are exploiting low-paid workers in internet cafes, schools and factories. Sometimes they are viral marketers paid to promote a new product. Either way they are trying to exploit your blog for their profit – and hoping to do it without you noticing.

How can Akismet help?

Akismet monitors millions of blogs and forums, watching the methods and tricks used by spammers in real time. We know all about their spambots, comment factories, buffer sites and social engineering tricks. Akismet will use this knowledge to warn you when a spammer – automated or human – tries to sneak a spam comment past you. So if you notice a comment in your spam folder from someone you don’t know, or linking to a web site you’ve never seen before, take a good look at it before you hit the Unspam button: in all likelihood, Akismet put it there for a reason.

sumber : http://akismet.com/how/

Microsoft Outlook

Microsoft Outlook functions in many roles including email client, contact manager and group scheduler. Although the number of available features increases when used in conjunction with Microsoft Exchange Server, this type of connection is not necessary to take advantage of the many features of Microsoft Outlook 2010.

Email Management

Microsoft Outlook allows you to organize your email accounts how you see fit. Customize your messages by changing the font or by adding a signature, stationery or background to your messages. Organize incoming messages into folders, both automatically and manually, and color-code messages from specific senders and those concerning a related topic. Check messages for spelling and grammar mistakes before sending, and choose whether to send a message immediately or to delay delivery. When used with Microsoft Exchange Server, others can grant you access to their mailboxes and you can allow others access to your mailbox.

Contact Management

Manage your personal and business contacts using the contact management feature included as part of Microsoft Outlook. Add new contacts manually or import them from email messages and electronic business cards. Organize your contacts into groups, add photos to contacts and select how Outlook lists the contacts from within the Contacts folder and the customized contact groups. For example, choose whether to list contacts by first name or by last name. Also, create and share electronic business cards.

Schedule Management

The calendar feature included with Microsoft Outlook is a scheduling management tool that allows you to track appointments and other uses of time, as well as receive alerts as meeting times approach. Change the appearance of your calendar, change the time zone associated with your calendar and add additional calendars. Modify your calendar to reflect your workweek and to reflect the start and end of your workday. When used with Microsoft Exchange Server, you can share calendar access with others.


Microsoft Outlook provides the opportunity to archive selected content both manually and automatically. By creating these archive files, you create a backup of your crucial information. Archive files may be organized for data retention.


Besides the typical password protection provided, Microsoft Outlook also helps to protect your data in other ways. Outlook automatically blocks the receipt of attachments containing certain file types to prevent your system from potentially harmful files, and you can add or remove file types to the block list. Outlook also delivers messages considered possible spam to a special folder. You then review the folder contents to determine the legitimacy of each message. In addition, you can configure Outlook to block the automatic download of photos within email messages. This protects against potential malware attacks and may prevent the accidental viewing of offensive images.

sumber : http://yourbusiness.azcentral.com/microsoft-outlook-features-20440.html

About Video Formats

The world of video formats can be pretty confusing, but there are only a few things you reallyneed to know. First, it’s important to note that a video format is more than just its file extension. Extensions like AVI are not, in fact, video codecs—they’re containers. A container is the file format which can use multiple different codecs—such as DivX or x264—to compress a certain standard of video—such as MPEG-4 or H.264, respectively—into a hard-drive friendly amount of space. Here’s what you need to know about both codecs and containers, and what that means for the videos you rip yourself.

What Is a Codec?

Most of the video you’ll come across is compressed, meaning its been altered to take up less space on your computer. For example, a regular Blu-Ray disc usually takes up around 30 or 50GB of space—which is a lot for a normal person to download or store on their hard drive. So, we compress movies to make them more manageable, usually with some loss in video quality.

A codec compresses and decompresses data. It interprets the video file and determines how to play it on your screen. Your computer comes with many codecs pre-installed, though you caninstall codec packs for wider support, or a program like VLC or PotPlayer (which we prefer to codec packs). Some examples include:

  • FFmpeg (which includes formats like MPEG-2, the format in which DVDs are stored, and MPEG-4, which is the video format Apple uses in the iTunes store)
  • DivX, which works with a certain type of MPEG-4 file, and was often used to rip DVDs in the pre-HD era
  • XviD, an open source version of DivX, popular among movie pirates
  • x264, which compresses H.264 videos (Also known as MPEG-4 AVC), and is very popular for high definition videos

There are a lot of different codecs out there, and it can get really confusing with all the different versions of MPEG standards. These days, you really only need to concern yourself with a few—which we’ll talk about in a couple minutes.

What Is a Container?

A container is, essentially, a bundle of files. Usually a container consists of a video codec and an audio codec, though it can also contain things like subtitles. Containers allow you to choose one codec for your video and one for your audio, which is nice—that way, you can choose to use the high-quality DTS audio, or compress your audio to something like MP3 for even more space savings. It just gives you a bit more control over how you record your videos or rip your movies. Popular containers include:

  • AVIP
  • Matroska (which uses the extension MKV)
  • MP4 (which has been popularized by Apple in the iTunes Store—note that this can also come with the M4V extension, but the container is the exact same)P
  • MOV (which was created by Apple)

The main difference between different containers is not only the codecs they support but what other features they support—like subtitles or chapters. These days, MKV is an extremely popular container, mainly because it supports nearly any video codec under the sun, as well as a ton of extra features (plus it’s open source).

So Which Should You Use?

These days, you’ll only really come across a few different codecs and containers as you browse the web for video. DivX and XviD (DivX’s open source counterpart) are popular for standard-definition videos, like ripped DVDs, but are mostly outdated, so I wouldn’t use them to rip your own DVDs. Handbrake, our favorite DVD ripper and video encoder, supports three video codecs (which you can see under the “Video” tab) and two containers (which you’ll find under “Output Settings”). H.264, which Handbrake uses by default, will give you the best quality, though if you don’t care about quality, MPEG-4 will probably compress faster. As for containers, both MKV and MP4 support high quality H.264 video, but in general we prefer MKV for almost everything, since it has a few more extra features, supports higher quality audio, and is open source. The one downside of MKV is that it isn’t as well supported by certain programs and devices. So, if you’re putting these videos on your iPad, Apple TV, or Xbox 360, for example, you’ll want to go with the more widely supported MP4. If you’re watching them in VLC, PotPlayer, XBMC, or another video player that supports MKV, then MKV is the way to go.

That’s a lot of information to throw at you in a few paragraphs, but like we said—despite how big and confusing the world of video is, a lot of those codecs are outdated, and you only really need to concern yourself with a few. If you want a more detailed comparison, check out Wikipedia’s Comparison of Video Codecs, Comparison of Container Formats, and its entry on MPEG for more info on all the different variations of the MPEG standards of video compression.

sumber : http://lifehacker.com/5893250/whats-the-difference-between-all-these-video-formats-and-which-one-should-i-use

7-zip Compression Program

The main features of 7-Zip

  • High compression ratio in 7z format with LZMA and LZMA2 compression
  • Supported formats:
    • Packing / unpacking: 7z, XZ, BZIP2, GZIP, TAR, ZIP and WIM
    • Unpacking only: ARJ, CAB, CHM, CPIO, CramFS, DEB, DMG, FAT, HFS, ISO, LZH, LZMA, MBR, MSI, NSIS, NTFS, RAR, RPM, SquashFS, UDF, VHD, WIM, XAR and Z.
  • For ZIP and GZIP formats, 7-Zip provides a compression ratio that is 2-10 % better than the ratio provided by PKZip and WinZip
  • Strong AES-256 encryption in 7z and ZIP formats
  • Self-extracting capability for 7z format
  • Integration with Windows Shell
  • Powerful File Manager
  • Powerful command line version
  • Plugin for FAR Manager
  • Localizations for 79 languages


7-Zip works in Windows 7 / Vista / XP / 2008 / 2003 / 2000 / NT / ME / 98. There is a port of the command line version to Linux/Unix.

On 7-Zip’s Source Forge Page you can find a forum, bug reports, and feature request systems.

Compression ratio

We compared 7-Zip with some of the leading archivers.

FILE SETS: Mozilla Firefox 1.0.7 for Windows and Google Earth 3.0.0616 for Windows after full installation.

Archiver Mozilla Firefox Google Earth
161 files
15,684,168 bytes
115 files
23,530,652 bytes
Compressed size Ratio Compressed size Ratio
7-Zip 4.23 (7z format) 4621135 100% 6109183 100%
WinRAR 3.50 5021556 109% 6824892 112%
CABARC 5.1 5131393 111% 7434325 122%
WinZip 10.0 beta (maximum-PPMd) 5277118 114% 8200708 134%
7-Zip 4.23 (zip format) 6222627 135% 8909446 146%
WinZip 10.0 beta (maximum-portable) 6448666 140% 9153898 150%

Compression ratio results are very dependent upon the data used for the tests. Usually, 7-Zip compresses to 7z format 30-70% better than to zip format. And 7-Zip compresses to zip format 2-10% better than most of other zip compatible programs.

sumber : http://www.7-zip.org/