Login       My Wishlist
  My Cart
$0.00 / 0 items
Your Guide to Data Structures and Algorithms
International Access
Global Shipping Options Available
Home About Us News Our Blog Our Catalog My Cart My Account Track Shippment Contact Us
  Our Catalog


Macromedia Fireworks Mx Tutorial Guide

Macrodedia Fireworks now known as Adobe Fireworks is one of the best known and used graphic applications for web authoring for both beginners and professionals alike, its ease of use yet powerful system can create stunning sites from scratch.

In this tutorial we will show you how to use this fantastic program in a easy step by step visual based presentation to help ease the stresses of learning.

Because we are starting a new document you would click Fireworks File found under Create New this will create a new document, if you had previously made a document and saved it you could click one of the recent items to open it or click on the open icon to open an item not listed on the list shown.

Once have selected new file you will be shown this window above, please input the size you wish to have the work area for example on this its 900 * 500, and click ok, now you are presented with your work area where you can start designing your website or graphics.

At first when you load up the screen you will not be at full zoom, you can find out your zoom level by looking right at the top of the screen at it will says something like 66% , so now you probably have noticed all the button tools on the left hand side of the screen. Now we need to zoom in, to do this select the tool that looks like the image below then move your mouse pointer onto the work area, then right click you will have a menu appear, now select zoom in and do this until the top bar say 100%.

Now that you have the correct zoom level now we can begin to learn about graphics.

Now that this is selected move your mouse pointer over to the work area then click and drag the square to your desired size, you will now have a square in the default colour, you can change the colour by selecting the pointer that has a white centre at the top of the toolbar then selected the square you just made, now that you have done this you will see a menu appear at the bottom of the screen, on the left of the menu there will be an icon that looks like a paint bucket and a colour box next to it, click on the colour box then select the desired colour, to get even more colours while on the colour menu click on the sys colour picker.

If you remember back to when you selected the box from the toolbar, you may of seen an arrow next to the box, now select the box again but hold down your mouse button for a second and a drop down menu will appear, click on any shape you desire and stretch it out on the work area as you did with the box and repeat the colour steps until you feel comfortable with doing this.

Gradients |

As you have seen you have created shapes with a plain colour, but this will not always do, you may need to have a gradient colour on your images. To do this, follow these steps, firstly

1 Select the shape to have the gradient for example the square box

2 Next look at the bottom toolbar that has just appear and you will notice that it says Solid next to the colour box, click on this then go up to gradient, then a sub menu will come up offering you what type of gradient you would like to use, for this example click Linear which is at the top.

3 Now this is done your shape will have a gradient but it may not be in the direction or colours that you wanted so that is what we will focus on now, for the colours you will see that there is no longer the word Solid in the box instead it is Linear, which means Linear gradient, next to this is the colour box and also that has changed incorporating more than one colour into the shape, click on the colour box

4 Now you have selected it the menu above will appear, as you can see you have two colours blue and purple to change these simply click on the little box with the colour that you wish to change and select the colour you wish to have. You can add more colours in between if you wish this is done simply by clicking anywhere under the gradient bar and you will get another box to add colour too.

You can also use the preset colours just by clicking under the word present on the drop down menu then selecting the colour scheme you wish to have.

Now you have the colours you want you may want to change the direction of the gradient, to do this select the pointer tool at the top of the toolbar, this time use the one that is completely black, now you have done this select the shape, you will now see a line go through the shape, one end with a circle on it and the other with a square.

The side with the circle is where the gradient begins so if you wanted it to begin in the middle you would click hold down and drag it to the centre of the shape, or if you wanted it to start at the top you would drag the circle to the top, then when you have decided where you wish for it to start you will need to use the square tool, this is to set the direction of the gradient up down side to side or diagonal , and it also defines the length of the gradient, to do this click on the square and hold down and then move it around to get used to the feel of it, it moves all over the place, now for example if you wanted the gradient to go down instead of across you would of firstly moved the circle to the top and then dragged the square so it was facing straight down.

Down Gradient
Diagonal Gradient
Middle Centred Gradient

When you are finished with the gradient simply select the pointer at the top of the toolbar filled with white and then select on any blank area on the workspace, remember to practise with the different colours and gradient types.

As well as gradients you can add other effects to your shape firstly patterns, this can be found on the menu where you select the gradient, but instead of going on gradient go on pattern and then choose the pattern you wish to use, if you want to use your own keep scrolling down to the bottom until you reach other then select it and browse for the pattern you wish to use.
Remember to select the shape first

As well as the gradient and patterns there is another option you can use, this is the textures menu, when you select the item you will seen a option that says texture select this and choose a texture.

By default the textures opacity is at 50%, this basically means how visible it is over your shape, to make it higher or lower click the arrow next to the opacity amount and hold it down and then drag it up or down to the desired opacity.

Practise with all the textures and opacities until you completely understand them

*note* if you select the image you can reduce the whole shapes opacity by sliding the shapes opacity meter up or down, this is found on the far right hand side of the menu after the shape has been selected.

If you have a square shape you can make this more rounded very simply, to do this select the shape then on the menu that appears below click and hold the rectangle roundness meter until it is at the roundness you want.


You can also add borders around your images to make it stand out more if you wish, there are many border types and I will explain how to use them.

When you have your image selected look down at the menu and find the border colour box, by default it will have a white background with a red line through it, select this then choose a colour, you can now see that you have a border around your shape.

You may also notice that next to in the number 1 has appeared, this is to indicate the size of the border, to make it bigger drag the menu slider up and down until you have the desired border width.

As well as the width you can also change the style of the border, select the border style selector as and select which style you wish to have, simple as that.

Font Styles

Text in your document is highly important you need to tell someone about what it is your service or website is about, you can download fonts from sites such as 1001 free fonts once downloaded put these fonts into the following C:/Windows/Fonts/ , ensure you press F5 in the directory to refresh the newly installed fonts and reopen Fireworks Mx.

To input text on the document click the icon that looks like the one below and then click on the document where you want it to be.

Now that you have selected the position on your page you will see a line flashing, now type in the text that you wish to appear. Once this is done select the pointer with the white bit in the centre, and then select the text by clicking it once, now you will get the menu at the bottom of the page.

There are many other options on the menu but these are the only ones we will look at for now as the others are more advanced.

The maximum size font on the slide menu is 96, so what do you do if you want it bigger, well simply all you need to do is where it says the size, type in a size that is bigger for example 200 or whatever you want.

You can also use the Scale tool which is found on the main toolbar to the left near the top,

Firstly select the text with your pointer, then select the tool icon above from the toolbar, after this is done you will notice a border around your text with squares on it, move your cursor over one of these squares then you will notice your cursor changes, now this has happened click hold and drag the text to your desired size, this is the easier method to get the correct size text that you want.

Practise with the different fonts styles until you feel comfortable with them and can easily use them without many errors.

Drop Shadows

Drop shadows can be used for text / images and pictures on the page.

To apply a drop shadow, select the item that you wish to use in this case a circle shape,

Then click on the plus icon next to the word effects, then you have a pop up menu appear, now go to the sub category shadow and glow and then finally click drop shadow, you will then be presented with this menu, there are several options, try playing around with them until you get the effect you want.

Corner Shape Tweaks

When you have a shape that you have made such as a rectangle, you can make the corner stand out a bit more, make a rectangle that is curved, this has previously been shown how to do, once this is done select the shape, then you will notice little square dots around the corners of the image, select one of them then you will get a warning message, click on the dont show again tick box then click ok. Now start to move the corners around until you have the shape you want, when you drag the corners, you probably will also notice small lines pointing out from the boxes, these are to add curves to the corners, try playing around with them until you get the effect you want.

Now that you have learnt all of this information it is time to put it into practise, as you can see below there is a very simple advert, it incorporates all the information that has been taught so you should be able to create it, if you get stuck look at the steps again.


Text To Speech Online

Text to speech or the also called speech synthesis is the artificial production of a human voice. This technology has many applications such as improving accessibility for disabled people allowing visually impaired people or people with reading difficulties to listen to written works on a home computer, providing new services or even in the entertainment field.

Most of the modern computer systems have text to speech modules that allow text seen on the screen to be converted into speech. Apart from the personal computer operation system modules there are much software available so it is a matter of choice which one should be used.

Of course when making a choice the quality of the speech synthesis should be taken into account. The quality of text to speech conversion is estimated by its similarity to a human voice, and by its ability to be understood.

Apart for the text to speech modules that the modern computer operation systems have and the similar software available, there are many online text to speech resources. They are useful to people who are not able to use their home computer or who do not have the required modules installed. Some of the online speech synthesis services are paid but there are some which are free or with free trials.

The online text to speech website has the same or even more options compared to the integrated services. You can choose the type of the voice male or female and usually there is more than one voice available per gender. This is great as this way you can pick up the voice that you understand the best. The voice level and the speed of talking can also be adjusted.

The online text synthesis services also feature a variety of languages. Obviously the English language is the most popular but there are many websites that offer a vast variety of language options. This is great news so people of any nationality can benefit from the online services.

When choosing an online text to speech program you should check what it can read. Some programs can only read the text from the internet browser or the text from specific text processing programs such as Word. The best option is to get a program that reads from as many sources as possible. Some programs are able to perform dictionary look ups, have magnifying glass tool, translation tool. Some text to speech programs have the option to record the text read. This is a great option since all that is on the screen can be recorded in an MP3 format and listened later.


Use Dating Services to Find a Special Someone

In our modern society, dating doesn't have to involve going out anymore. You can "date" someone via email, instant messenger, chat rooms, telephone, and web cams. Maybe the night club or bar scene is not your idea of a quality meeting place. You could meet new people everyday using various dating services. Dating services put you in touch with millions of diverse people from anywhere in the world. Posting a profile and doing a simple search will yield numerous candidates. The dating sites of today are much more accurate at matchmaking, due to the advances in search technology.

Free dating services are available to you on the Internet. With the popularity of Internet dating sites, it is tough to know where to start and which one is right for you. A very helpful web site is the "Free Dating Service". It offers a dating directory full of the best and most popular dating sites available. You can find a brief summary of each site, as well as real user reviews to assist you in making the right choice. Try several that are listed in order to maximize your results in finding that someone special. Everyone has a match out there, you just need to go to the dating web site and find that special someone. Use caution when using dating sites. Unfortunately, there are people you do not want to be involved with. Get to know a person before committing to a more serious relationship.

If you have been in the dating scene for a while, you may recognize a pattern or preference in a certain type of person. This could apply to various basic things such as ethnicity or religion. Most dating services offer the option of browsing by such special categories to accommodate to your needs and make your search for a new mate as easy as can be. If you feel that you fit into a specialty category, you can also use this feature to post your profile to appeal to someone that could be looking for you. Remember, when posting your profile, you are not only using it to match in your search, but are also the target of someone else's search!

In addition to finding a new friend or person to go out with, dating services offer other helpful resources. On some web sites, you can find many things that range from flirting tips to innovative date ideas. For someone new to using dating services, you might start by reading a guide to creating a better profile. If you are skeptical to using an online service, you could read real user testimonials. There is a variety of helpful reading material right at your fingertips. All you need to do is take the time to read the material and learn about a topic that you are interested in.


Spyware & Adware The War against it

Spyware and Adware are not only an ever-increasing nuisance for computer users everywhere, but also a booming industry.

According to Webroot Software, Inc., the distribution of online advertisements through spyware and adware has become a whopping $2 billion industry.

The aggressive advertising and spying tactics demonstrated by some of these programs, require an equally aggressive response from a seasoned eradicator. Sunbelt Software is such a company. A leader in Anti-Spyware, Anti-Spam, Network Security and System Management tools, they gave consistently remained on the cutting-edge of anti-spyware programming since 1994.

So you might be asking:

Why do I feel as if somebody watching me?

According to the National Cyber Security Alliance, spyware infects more than 90% of all PCs today. These unobtrusive, malicious programs are designed to silently bypass firewalls and anti-virus software without the users knowledge.

Once embedded in a computer, it can wreak havoc on the systems performance while gathering your personal information. Fortunately, unlike viruses and worms, spyware programs do not usually self-replicate.

Where Does It Come From?

Typically, spyware originates in three ways. The first and most common way is when the user installs it. In this scenario, spyware is embedded, attached, or bundled with a freeware or shareware program without the users knowledge. The user downloads the program to their computer.

Once downloaded, the spyware program goes to work collecting data for the spyware authors personal use or to sell to a third-party. Beware of many P2P file-sharing programs. They are notorious for downloads that posses spyware programs.

The user of a downloadable program should pay extra attention to the accompanying licensing agreement. Often the software publisher will warn the user that a spyware program will be installed along with the requested program.

Unfortunately, we do not always take the time to read the fine print.

Some agreements may provide special opt-out boxes that the user can click to stop the spyware from being included in the download. Be sure to review the document before signing off on the download.

Another way that spyware can access your computer is by tricking you into manipulating the security features designed to prevent any unwanted installations. The Internet Explorer Web browser was designed not to allow websites to start any unwanted downloads. That is why the user has to initiate a download by clicking on a link. These links can prove deceptive.

For example: a pop-up modeled after a standard Windows dialog box, may appear on your screen. The message may ask you if you would like to optimize your Internet access. It provides yes or no answer buttons, but, no matter which button you push, a download containing the spyware program will commence. Newer versions of Internet Explorer are now making this spyware pathway a little more difficult.

Finally, some spyware applications infect a system by attacking security holes in the Web browser or other software. When the user navigates a webpage controlled by a spyware author, the page contains code designed to attack the browser, and force the installation of the spyware program.

What Can Spyware Programs Do?

Spyware programs can accomplish a multitude of malicious tasks. Some of their deeds are simply annoying for the user; others can become downright aggressive in nature.

Spyware can:

Monitor your keystrokes for reporting purposes.
Scan files located on your hard drive.
Snoop through applications on our desktop.
Install other spyware programs into your computer.
Read your cookies.
Steal credit card numbers, passwords, and other personal information.
Change the default settings on your home page web browser.
Mutate into a second generation of spyware thus making it more difficult to eradicate.
Cause your computer to run slower.
Deliver annoying pop up advertisements.
Add advertising links to web pages for which the author does not get paid. Instead, payment is directed to the spyware programmer that changed the original affiliates settings.
Provide the user with no uninstall option and places itself in unexpected or hidden places within your computer making it difficult to remove.

Examples of Spyware

Here are a few examples of commonly seen spyware programs:

(Please note that while researchers will often give names to spyware programs, they may not match the names the spyware-writers use.)

CoolWebSearch, a group of programs, that install through holes found in Internet Explorer. These programs direct traffic to advertisements on Web sites including coolwebsearch This spyware nuisance displays pop-up ads, rewrites search engine results, and alters the computer host file to direct the Domain Name System (DNS) to lookup preselected sites.

Internet Optimizer (a/k/a DyFuCa), likes to redirect Internet Explorer error pages to advertisements. When the user follows the broken link or enters an erroneous URL, a page of advertisements pop up.

180 Solutions reports extensive information to advertisers about the Web sites which you visit. It also alters HTTP requests for affiliate advertisements linked from a Web site. Therefore the 180 Solutions Company makes an unearned profit off of the click through advertisements theyve altered.

HuntBar (a/k/a WinTools) or Adware.Websearch, is distributed by Traffic Syndicate and is installed by ActiveX drive-by downloading at affiliate websites or by advertisements displayed by other spyware programs. Its a prime example of how spyware can install more spyware. These programs will add toolbars to Internet Explorer, track Web browsing behavior, and display advertisements.

How Can I Prevent or Combat Spyware?

There are a couple things you can do to prevent spyware from infecting your computer system. First, invest in a reliable commercial anti-spyware program. There are several currently on the market including stand alone software packages such as Lavasofts Ad-Aware or Windows Antispyware. Other options provide the anti-spyware software as part of an anti-virus package.

This type of option is offered by companies such as Sophos, Symantec, and McAfee. Anti-spyware programs can combat spyware by providing real-time protection, scanning, and removal of any found spyware software. As with most programs, update your anti virus software frequently.

As discussed, the Internet Explorer (IE) is often a contributor to the spyware problem because spyware programs like to attach themselves to its functionality.

Because of this, many users have switched to non-IE browsers. However, if you prefer to stick with Internet Explorer, be sure to update the security patches regularly, and only download programs from reputable sources. This will help reduce your chances of a spyware infiltration.

And, When All Else Fails?

Noticed I said when and not if? As spyware is growing in destruction and it covers easily more than 90% of the computers (thats you and me, 9 in 10!), the only solution you may have is backing up your data, and performing a complete reinstall of the operating system!


The Benefits Of Canvas Laptop Bags

Laptop computer bags come in all sizes, patterns, and styles. Designers understand that people from all walks of life use laptops and have done their best to offer everyone a stylish way to transport their computer. Those looking for a versatile bag that is affordable, great looking and easy to care for will love canvas laptop bags. These durable, lightweight bags are available in a variety of colors and patterns, so even the pickiest of shoppers can find a bag to suit their taste.

Canvas laptop bags are the perfect way to carry your computer. Bags that are made of leather and other materials are often expensive and difficult to care for. Spending a lot of money on cleaning a leather bag that was expensive to begin with is frustrating, so most people look for an alternative choice. Though some love the look of leather, others are willing to forgo the materials for something that is more economical.

Laptop computer bags made of canvas are also very stylish. The benefit to carrying a canvas bag is the variety of styles from which you can choose. Instead of being stuck with black or brown, you have the option of choosing canvas laptop bags in every color of the rainbow. Some even feature decorative patterns and designs. If you are unable to find exactly what you want, you can use fabric dye, transfers, or paint to create a one-of-a-kind style. The bags provide a great deal of versatility, which is a lot more fun that being stuck with a boring leather bag.

Another thing that makes a canvas laptop bag is how easy it is to carry. Most are very lightweight, so the only weight on your should is that of the computer and any books and accessories you stash in the bag. Leather bags are often bulky and heavy. Computer cases made of plastic or hard materials are difficult to carry and weight down your should. Canvas laptops bags are considered one of the healthiest and least physically damaging bags on the market. Too many people these days are lugging around bags that are damaging their posture and their neck and shoulder muscles. Canvas bags offer protection from many business and travel related injuries.

Canvas laptop computer bags usually feature adjustable straps, making it easy to carry your bag no matter your height or strength. Shorter straps are handy for carrying a bag just below your armpit. This enables you to place your forearm and hand under the bag and support some of the computer's weight. A longer strap is ideal for when you are carrying more than one bag. This frees up space along your side and hip for the multiple items you need with you.

Most of the canvas laptop bags on the market come with a variety of pockets, enabling you to organize your computer accessories, work-related documents, and other paraphernalia. The laptop computer bags are great for busy executives, students, and people who work outside of a traditional office environment. Moving your laptop computer, pens, notebooks, manuals, and other materials from place to place is easy when you carry them in a canvas laptop computer bag.


Get Identity Theft Help!

Identity theft crimes are not new, but they have become more pervasive in the past decade. One of the most insidious forms of white-collar crime, identity theft is a federal offense under the Identity Theft and Assumption Deterrence Act. It occurs when someone deliberately assumes your personal identity to impersonate you in a legal sense. There are people out there who are malicious and want to mess your life simply because they can. Businesses and financial institutions that lose $52.6 billion each year are under tremendous pressure from consumers to tackle this problem.

Last year, identity fraud crimes topped the list of complaints reported to the Federal Trade Commission (FTC), the leading governmental agency offering identity theft help, for the fourth consecutive year. The FTC collects complaints about identity theft from consumers who have been victimized. Although the FTC does not have the authority to bring criminal cases, it can offer identity theft help by providing information to assist the victims in resolving the financial and other problems that can result from this crime. As additional identity theft help, the FTC also refers victims complaints to other appropriate government agencies and private organizations for further action. The support of these knowledgeable resources expedites recovery, while enhancing your peace-of-mind.

Accurate and up-to-date information is the most critical element to minimize risk. For this reason, Federal Trade Commission recently launched an identity theft help web site called annualcreditreport where all consumers are eligible for a free copy of their credit reports. In order to effectively respond to suspected ID fraud you should place an identity theft alert in one of the three consumer reporting agencies and that agency will notify the other remaining two. These agencies are: Equifax at 1-800-525-6285, TransUnion at 1-800-397-3742 and Experian at 1-800-680-7289. These credit reporting agencies can also be found online.

The ID Theft Clearinghouse managed by the FTC is a tool designed to coordinate law enforcement efforts in the United States. But, in the end, local law enforcement agencies like the police and district attorney end up dealing with most identity fraud cases. If you have been a victim of identity fraud, it's these local agencies that will mostly likely offer identity theft help.

It would also be a good idea to study some of the different methods of identity theft so that you can effectively combat them. Do things like shredding your important documents with any account information or identifying information.


Privacy Policy / Terms of Service
© 2018 - algoritmica.org. All Rights Reserved.