Get Chitika | Premium

Link Xchange



Copy this code to ur blog, then i will give u backlink

j

Subscribe Now

Website counter

Latest Firefox 4.0 Launch Delayed

Written By Unknown on Tuesday, December 29, 2009 | 9:10 PM


Launching the latest version of Firefox 3.6, 3.7 and 4.0 is delayed from its original plan because Mozilla wants to minimize risk.
Unlike previous years, the current browser competition so tight. So Mozilla argues, if it does not take into account the risk of an upgrade, it could potentially lose market share.

Last year, Google has released Chrome for Windows followed by a beta version for Mac and Linux. Apple, aggressively promoting vigorous Safari. Microsoft was not to be outdone, the software giant updates into Internet Explorer (IE). Finally, Opera JavaScript engine to build more quickly.

The latest version of Firefox, version 3.6 is scheduled for late 2009 slide, but Mozilla has decided to postpone it until the first quarter of 2010. In addition, version 4.0 is planned for late 2010 also appeared to back the launch schedule in the first quarter of 2011.

Analyst of Pund-IT Charles King commented, this delay may be good news for Microsoft. As is known, the latest data mentioned Firefox 3.5 users have a percentage greater than users of IE 7 or 8. But the trend also shows the user transitions relatively rapidly to the browser over Microsoft's latest release of Windows 7.

"With the postponement of the latest version of Firefox, Microsoft has a gap to take back some market share," said King, as quoted by News Factor, Tuesday (29/12/2009).

"Everything will depend on how well Microsoft introduce and promote IE 8, how the differences and advantages compared with IE 7 and Firefox," he said.

9:10 PM | 0 comments | Read More

Firefox Mobile

Written By Unknown on Thursday, December 24, 2009 | 12:29 AM


Popular Firefox browser is almost ready to begin his first appearance in the mobile browser arena. Vice President who gave birth to the Mozilla project is Jay Sullivan says Firefox Mobile is through the various stages of testing and ready to be released before the end of 2009.

This time, Mozilla is no longer shy about giving leaks Firefox Mobile. Sullivan said one of the first unique mobile browser is Mozilla's is able bersinkronisasi with the desktop version of the Firefox browser or computer.

This means, all the pages that are opened on the desktop Firefox users will automatically be opened and viewed on a mobile version of Firefox.

"We ended office hours, you can leave the computer and still continue through the phone," Sullivan said as quoted from the Telegraph, Thursday (24/12/2009).

"This browser encrypt all the information and send it back through the 'cloud computing' between desktop and mobile versions," he explained.

If all goes according to plan, before the end of Sullivan's hope Firefox Mobile users can download the Nokia N900 via the Nokia Ovi Store. As was widely reported earlier, N900 will be the first mobile phone that can operate this browser.

Mozilla is trying to develop a browser to be used for the OS (Operating System. Firefox Mobile for Windows Mobile OS version was in the early testing stages and is expected to be completed in early 2010.

In addition Mozilla Firefox is also actively developing mobile versions of Android, but not yet certain when the development will be completed.

And what about mobile users with the iPhone OS platform? Apple iPhone users are happy to use Firefox on the desktop seems to still have to wait.

According to Sullivan, Apple is the platform 'exclusive' that has not been established when iPhone users can share in the ability to synchronize with the desktop version of Firefox mobile

12:29 AM | 0 comments | Read More

iPhone 4.0


The news about the new iPhone Operating System (OS), iPhone 4.0, actually come to the surface since the beginning of this year. Mentioned issues if the OS gress that will appear at the beginning of 2010.

It could be a living presence of this month, will be close to reality. The problem, a source at Apple said the company early last week the iPhone OS 4.0 is in testing stage, complete with the results feedbacknya trouble.

Quoted Apple Insider, Wednesday (23/12/2009), unfortunately the test results and report, is not known what the advantages of the most popular phones in the United States. This condition reflects that Apple wants to seal new product launches until the time comes.

IPhone lovers certainly worth waiting for the upgrade of the OS, is because these operating systems tested and compatible with the latest hardware for the iPhone. In fact, it could be the iPhone 4.0 will be present together with the latest generation iPhone, which is likely iPhone 4G.

Interesting to wait, if this brand-new OS will be present along with the most new iPhone. Company's own Steve Jobs, has big expectations to introduce new products at Apple's annual celebration exhibition, Worldwide Developer Conference

12:24 AM | 0 comments | Read More

Users Vista Moving to Windows 7

Written By Unknown on Friday, December 18, 2009 | 7:49 PM


Windows Vista users have migrated en masse to Windows 7. However, a large number of XP users are reluctant to survive and make the shift to the newest operating system.
InforWorld survey conducted in recent weeks found that Windows 7 now has about 4 percent market share of 20 thousand respondents surveyed, most of whom come from Vista users, so that makes XP still has the most loyal users. Ever since Vista was released three years ago, the User XP numbers remained stable at 30 percent.

Meanwhile, quoted from PC World, Monday (16/11/2009), another survey conducted NPD Group confirms that the popularity of Windows 7 continues to climb, rather than its predecessor, Vista. The survey found that Windows 7 has been upgraded to 234 percent compared to Windows Vista.

One of these operating systems managed to steal the attention because Windows 7 has a long beta cycle, and has received good feedback from various circles
7:49 PM | 0 comments | Read More

Safari is faster than Chrome

Written By Unknown on Saturday, December 12, 2009 | 1:24 AM

Safari 'run' faster than Firefox and Chrome now runs on Mac OS platforms.
Analysts from Computerworld, Gregg Keizer recently conducted a series of browser speed tests. According to him, Chrome is a new beta version released for Mac OS-based computers are still less rapidly with the Safari browser. Chrome ranked the second fastest of the four browsers tested on Mac computers.

"Chrome render the JavaScript 10 times faster than Opera 10.10 and almost twice as fast as Firefox 3.6 Beta 4, the Mac version of the open source browser Mozilla besutan a newly released," Keizer said, as quoted by TG Daily, Thursday (10/12 / 2009).

"However, Chrome can not match the speed of Safari 4.0.4, which Apple's browser besutan it had previously predicted 12 percent faster than Chrome beta for the Mac," he added.

Keizer asserts that Chrome currently classified as the fastest browser, only for the Microsoft Windows platform computers.

As is known, some time ago, exactly in September, Computerworld tested Chrome 3.0 on Windows computers. At that Chrome 3.0 easily beat all its competitors in terms of speed, including Safari that when it took second place

1:24 AM | 0 comments | Read More

Firefox Mobile


Firefox is a major player in the arena of desktop browser. But when he jumped into mobile devices, Mozilla has never made the leap in this area. All that will soon change with the presence of the first mobile version of Firefox which will be released later this year. Reportedly, the Nokia N900 series will be the first mobile phone that can operate the mobile Firefox browser. N900 that uses Linux-based Maemo OS is shipped with the Mozilla Gecko layout engine.

"Our target is to immediately release this browser. If all goes well, we will release it in a few weeks," said Vice President Mobile Mozilla Jay Sullivan, as quoted by Mashable, Friday (11/12/2009).

N900 owners can download the latest beta versions of these browsers by visiting Mozilla.com / m via their mobile phone. Nokia does not plan to ship with N900 Firefox Mobile, but at least for the moment the phone is open the door wide for the operation of Firefox Mobile in the body, including the next version of the Maemo OS that will be present in the third quarter of 2010.

The presence of the Mozilla browser on the phone besutan mentioned will make the website look the same as when users access it on the computer.

Mozilla is trying to develop a browser that can be used mobilenya for all platforms. The current version of Firefox Mobile for Windows Mobile OS was in the early testing stages. The development is expected to be completed in the first half year 2010.

Mozilla Firefox is also actively developing mobile versions of Android, but not yet certain when the development will finish

1:17 AM | 0 comments | Read More

80 Thousand Sites & Gagdet Use Facebook Connect

Written By Unknown on Wednesday, December 9, 2009 | 10:46 PM


More than 80 thousand sites and gadgets, including the iPhone and the Xbox, using Facebook Connect application. In addition, more than 60 million Facebook users to use this feature every day. Not only that achievement Facebook Connect painted, two-thirds of the 100 best sites in the United States using ComScore version introduced in December 2008, even half of the 100 global sites are also using Facebook Connect.

"Sites like Huffington Post and even the number of readers increased 500 percent, because it had used Facebook Connect, the" call Facebook? S Network Development Director Ethan Beard, told the New York Times, Thursday (10/12/2009).

"Facebook accommodate all the aspirations of msyarakat, to connect them wherever time and place with the technology," he added.

Added by Bread, now Facebook has grown rapidly in the field of third-party applications, even the number has reached 500 thousand applications. From it all, Bread melesatnya seems surprised by seepeti zynga social gaming and playdom also well developed.

10:46 PM | 0 comments | Read More

Seagate Produce Thin Hard Drive For laptops


Development company Seagate Technology hard drives plans to launch a new hard drive for laptops that 25 percent thinner than current models. Later, Seagate-made drives will have a size of up to 7-millimeter that will allow the laptop vendors to reduce the thickness of their computers. And as is known disk drives for laptops are usually either 9.5 millimeters high or 12.5 millimeters. Unfortunately, Seagate does not include details of how the capacity could be included in such a thin drive, because it is usually thicker drives typically offer a larger capacity.
"Finally, we now begin the qualification process of the industry's first hard disk drive with 2.5 inch size and high 7 millimeters," said the head of Seagate Technology Robert Whitmore, told PC World, Wednesday (9/12/2009).

"These new thin Drive is an OEM product that enables our customers to continue to reduce the thickness and weight of their notebook platform," he added.

Actually, about nine out of 10 netbook PCs have relied on the market drives with 9.5-mm high, with a thickness of 2.5-inch to 1.8-inches, but unfortunately most of these drives have cut the capacity penyimpananan.

Seagate drives are thin buataan officially scheduled to be announced on January 5, 2010, two days before the International Consumer Electronics Show which will begin in Las Vegas. not known to be price for Seagate these new products
10:37 PM | 0 comments | Read More

Avoiding Spam

Written By Unknown on Friday, December 4, 2009 | 8:42 AM

Here are some tricks that can be done to ward off spam invasion recommended by Symantec's.

Who should to do:

- Unsubscribe from legitimate mailing-list if you do not want to receive messages again. When registering to receive email, check out additional items whatever you want at the same time. Do not select the items you want.
- Selective in terms of sites where you register your email address.
- Avoid displaying your email address on the Internet. Consider alternative options-for example, use a separate address when registering at a particular mailing list, have several email addresses for many different purposes, or look for a disposable email service.
- By using the instructions provided by the administrator, report spam if you have the option to do so.
- Delete all spam
- Avoid clicking on suspicious links in emails or IM messages, because it could be connected to a fake site. We recommend to type a website address directly in the browser rather than trust the link in the message.
- Ensure that the operating system up to date, and use security software packages are comprehensive.
- Consider the anti-spam solution that has a good reputation for handling filtering throughout your organization.

Who should not to do:

- Opening an email attachment from an unknown. This appendix can infect your computer.
- Replying to spam. Usually forged email address, and reply to email spam will result - Fill out the form in a message requesting personal or financial information or passwords (passwords). Leading companies can not ask for your personal information via email. If you hesitate to contact the company through a trusted independent mechanism, such as by verifying the phone number or Internet address is known that you type into a new browser window (do not click on or cut and paste the link in the message).
- Buying products or services from spam messages.
- Open the spam message.
- Forward any virus warnings you receive by email. It could be a lie massages

8:42 AM | 0 comments | Read More

Cleaning Facebook Virus

A computer virus is utilizing the popularity of Facebook to attack the victim. Consider the ways to clean facebook Virus W32/Obfuscated.D2! Genr and Antispyware Security Tools - antispyware fake - that accompany the article Vaksincom following:

1.Disable system restore during the cleaning process
2.Disconect computer from the network / internet
3.Best use in "safe mode"
4.Install software "Unlocker" (download at FileHippo)
5.kill active virus process in memory, use the tools "Security Task Manager", please download these tools in Neuber.com

Turn off the virus with "security task manager"

6.Fix registry, to accelerate the process of repair registry please copy this script in notepad and save it with the name [repair.inf]. Execute the following manner:

a.right click [repair.inf]
b.click [install]

[Version]
Signature = "$ Chicago $"
Provider = Vaksincom

[DefaultInstall]
AddReg = UnhookRegKey
DelReg = del

[UnhookRegKey]
HKEY_LOCAL_MACHINE \ SOFTWARE \ Classes \ batfile \ shell \ open \ command ,,,"""% 1 ""% * "
HKEY_LOCAL_MACHINE \ SOFTWARE \ Classes \ comfile \ shell \ open \ command ,,,"""% 1 ""% * "
HKEY_LOCAL_MACHINE \ SOFTWARE \ Classes \ exefile \ shell \ open \ command ,,,"""% 1 ""% * "
HKEY_LOCAL_MACHINE \ SOFTWARE \ Classes \ piffile \ shell \ open \ command ,,,"""% 1 ""% * "
HKEY_LOCAL_MACHINE \ SOFTWARE \ Classes \ regfile \ shell \ open \ command,,, "regedit.exe"% 1 ""
HKEY_LOCAL_MACHINE \ SOFTWARE \ Classes \ scrfile \ shell \ open \ command ,,,"""% 1 ""% * "
HKEY_LOCAL_MACHINE \ SOFTWARE \ Microsoft \ Windows NT \ CurrentVersion \ Winlogon, Shell, 0, "Explorer.exe"
HKCU, Software \ Microsoft \ Internet Explorer \ Main, tart Page, 0, 'about: blank "
HKEY_LOCAL_MACHINE \ SOFTWARE \ Microsoft \ Windows NT \ CurrentVersion \ Winlogon, userinit, 0, "userinit.exe"

[del]
HKEY_LOCAL_MACHINE \ SOFTWARE \ Microsoft \ Windows \ CurrentVersion \ Run, reader_s
HKEY_LOCAL_MACHINE \ SOFTWARE \ Microsoft \ Windows \ CurrentVersion \ Run, 47543326
HKEY_LOCAL_MACHINE \ SOFTWARE \ Microsoft \ Windows \ CurrentVersion \ Run, PromoReg
HKCU, SOFTWARE \ Microsoft \ Windows \ CurrentVersion \ Run, reader_s
HKCU, Software \ Microsoft \ Windows \ CurrentVersion \ Policies \ System, EnableProfileQuota
HKEY_LOCAL_MACHINE \ SOFTWARE \ AGProtect
HKEY_LOCAL_MACHINE \ SOFTWARE \ 47543326
HKEY_LOCAL_MACHINE \ SOFTWARE \ Microsoft \ Windows NT \ CurrentVersion \ Network, UID
HKEY_LOCAL_MACHINE \ SOFTWARE \ Microsoft \ Windows \ CurrentVersion, Rlist
HKU,. DEFAULT \ Software \ Microsoft \ Windows \ CurrentVersion \ Explorer \ (43BF8CD1-C5D5-2230-7BB2-98F22C2B7DC6)
HKU,. DEFAULT \ Software \ Microsoft \ Windows \ CurrentVersion \ Explorer \ (8FFA689D-2C2B-2B2E-D865-74C04CA4EF06)

7. Remove files created by the virus by first showing tersebunyi files. Then delete the following files::

C: \ Documents and Settings \ All Users \ Application Data \ 47543326
C: \ Documents and Settings \ Elvina \ Start Menu \ Programs \ Security Tools.lnk
C: \ Documents and Settings \ Elvina \ Desktop \ Security Tools.lnk
C: \ Documents and Settings \ Elvina \ Application Data \ wiaservg.log
C: \ Documents and Settings \ Elvina \ Local Settings \ Temp \ *. tmp
C: \ WINDOWS \ Temp \ wpv311256600826.exe
C: \ WINDOWS \ Temp \ wpv411256806849.exe
C: \ Documents and Settings \% user% \ reader_s.exe
C: \ Documents and Settings \% user% \ Start Menu \ Programs \ Startup \ isqsys32.exe
C: \ WINDOWS \ system32 \ reader_s.exe
C: \ Windows \ system32 \ wbem \ proquota.exe
C: \ windows \ system32 \ sdra64.exe
C: \ Windows \ system32 \ lowsec
local.ds
user.ds
user.ds.lll

Note:
To remove the folder [C: \ Windows \ system32 \ lowsec] and [C: \ windows \ system32 \ sdra64.exe], use the tools "Unlocker" to separate the process system process windows (explorer.exe and svchost.exe), because the file will inject file [explorer.exe and svchost.exe] how:

* Right click on the file [C: \ windows \ system32 \ sdra64.exe] or the [C: \ Windows \ system32 \ lowsec]
* Then click menu "Unlocker"
* On Unlocker screen, select the option [delete]
* Then click the [OK]
* If the error message, in disregard it (click ok)


8.delete temporary files and temporary interet files, use the tools ATF-Cleaner.

9.for optimal cleaning and prevent re-infection, anti-virus scan with up-to-date. You can also use tools to clean with Norman Malware Cleaner or Malwarebytes Anti-Malware.

Consider also the earlier analysis by the virus Vaksincom Facebook:

* Virus Facebook: It's Fall, and Bitten Affected Dogs Appliances
* Identify Characteristics Facebook Email Virus Carrier


The author, Adang Jauhar Taufik, the analyst of Vaksincom antivirus.

8:32 AM | 0 comments | Read More

12 tips to avoid viruses


Some of the effects the virus is very diverse. There was the usual level category, meaning that only affect the performance of your computer system. At a higher level viruses can also delete important data you. Highly fatal, even viruses can damage your computer system. Computer connected to the network, could be a virus can turn your computer as a zombie computer (a computer-controlled by someone else).

This 12 tips for u :

1. E-mail is one way viruses spread most easily and most dangerous. Make sure you open the e-mail from sources that you make sure kebenaranya. If the e-mail that you get comes from sources that you do not know or did not come from the contact list you have, immediately delete the e-mail. Make sure the incoming SPAM list immediately evacuated. Do not even time to open it.
2. USB Flash Disk is the method most widely spread of the virus after an e-mail. So make sure you update anti-virus well before USB Flash Disk into your computer connected. Scan it before opening. How to open it also do the double click, but with the right click and select Open. This way is safer to avoid the viruses that enter through the autoruns included in USB Flash Disk.

3. Be careful to use e-mail program such as Microsoft Outlook client. Make sure the program is properly updated. If the operating system you use is pirated, I suggest you use e-mail client that its free and can be updated automatically, such as Mozilla Thunderbird or Pegasus.

4. Everyone must know the Internet is the largest source of spread of the virus in the world. Nearly 80% of viruses spread through the line. The following safety tips when you are done surfing the realm of the internet: - Do not click on pop-up window is displayed. For example a notification that you are the winner of a lottery or click several times to eat you'll win a lottery. Actually it is a malicious program that automatically send a trojan or spyware to your computer. - You can use the feature or program to atomatis block pop-ups that will be displayed. This feature is usually already included in the web browser you use.

5. Search engines like Google sometimes can not filter out sites that are considered as dangerous. For that you can install a program that can automatically detect sites that are not worth a visit or dangerous. Free program you can use the AVG Link Scanner. AVG Free program made it able to detect the sites google search results. If the site contains malicious viruses, it will display a warning or the site will be automatically blocked can not be opened.

6. Install anti-virus you can trust. No anti-virus should be paid, for home users / person you can use free anti-virus that is not less popular with paid anti-virus, such as Avira, AVG, Clamav, and others. Make sure you regularly update anti-virus to ensure that you install a virus able to withstand the increasingly developed kemampuanya.

7. Install anti-Spyware is also to prevent malware and spyware. Both these malicious programs can create other than a slow computer, can also mengahantarkan your computer as a zombie computer that can control the people out there. Some anti-spyware programs are quite popular free is Spyware Doctor, Spyware Terminator, etc.

8. Do not ever open an attachment that is included in the e-mail from unknown sources well. Although file attachments that are included are a rare file formats such as carrying the virus. Txt,. Jpeg,. Gif,. Bmp,. Tif,. Mp3,. Htm,. Html, and. Avi, but make sure you first scan.

9. Use a disk (CD / DVD) for mengimpan / backup of important data that are not easily infected with the virus. CD / DVD its only read only (only readable), but make sure before you moved into the disk, the data has been free of the virus. Karen if the virus data, it is useless to be stored on the disk.

10. Set the operating system you use to always perform regularly updated. This can reduce the risk of virus attacks from outside because the gap viral entry have been closed by updates that you do. But the update can only succeed if the operating system you are using is genuine. If not I suggest using a free operating system such as linux.

11. When you download programs from warez sites, make sure your anti-virus installed and updated properly. The files that come from these sites sometimes deliberately infiltrated by dangerous viruses.

12. Finally I suggest, do not visit sites that contain malicious viruses and malicious programs that can endanger your own computer, such as warez sites, crack, serial, porn, and others.

12 tips so you can do to secure your computer from virus attacks. One thing you need to understand "keep / care is better than cure". Good try.
8:15 AM | 0 comments | Read More

Microsoft Office 2010

Written By Unknown on Thursday, December 3, 2009 | 1:37 AM


Microsoft to make sure Office 2010 would be presented soon in June 2010, along with other related products.

According to a spokesman for Microsoft, as quoted by Yahoo Tech, Thursday (3/12/2009), Microsoft itself is hoping the software will be present in mid-2010. This notification is also included in the Starter Office Web site, which also says that the software is currently on probation (beta).

PCMag.com online technology site had also given her a preview for Office 2010, which is displayed in a beta state in November. The contents of Office 2010 includes updated versions of the applications Word, Excel, PowerPoint and other Office applications.

"After days of testing we do is intense, I was very impressed with the way Microsoft to update Office 2007. In my opinion, for this Beta version, is pretty good. But not too essential for anyone who has terlanjut using Office 2007, "said Edward PCMag examiners from Mendelson.

1:37 AM | 1 comments | Read More

Dell will test the operating system Google's Chromium


Dell will test the operating system Google's Chromium pinned on Inspiron Mini 10V. Chromium OS released earlier this month, a side project other than Chrome Google OS. This operating system itself runs on the Linux kernel, the code can be developed by anyone.

As is known, the expected Chrome OS many people will be introduced to the public at least until next year. While waiting for the OS, the company based in California's open code OS Chromium can be taken to anyone. And Dell became the first vendor who accepted the challenge through the Inspiron Mini 10V.

"Without the internet network connection, Chromium OS is not very interesting. Because of the strong network, a new user OS Chromium feels great," said Doug Anson, Dell's Linux Technology Strategist, as AFP reported on Tuesday (1/12/2009).

"Chromium OS is a small operating system, which makes it very simple and easy to navigate the Internet. It also makes the OS boot faster, about 12 seconds after pressing the power button," he added.

Nevertheless, Anson explains, netbook Chromium his OS has yet to be cast in a commercial to the consumer. Parties Dell is currently doing a series of tests, so that Chromium-based netbook OS to correct this or not thrown into the market.

According to Google, Chromium is the name of this project and not the name of the product. That is, Chromium can not come up with other names, including its API name. Chromium only use the word chrome base.

1:29 AM | 0 comments | Read More

Photo edit with BeFunky.com

To make a photo look more interesting you do not have to master the Photoshop software. All you need is an internet connection and Web sites that provide services like free photo.

One site that provides free photo if enough interest is BeFunky.com. As the name implies, with BeFunky.com you can process your photos that look more funky. There are quite a lot of choices that can effect the image you choose, such as old photos to create memorable images of classical, cartoonizer, etc

To use this service quite easy way:
- Once you enter the BeFunky.com site, click the Get Started button.
- Next you select the effect you want pictures. There are several options, such as old photos, pop art, cartoonizer, etc..
- If you want to process images in your computer, click the Browse button Files.
- After the image processing is complete, you can see the results. If you're satisfied with the results, you can click the Save button. If still not satisfied, you can try different effects by clicking the option on the left side effects.
Done.

1:18 AM | 0 comments | Read More

Hidden DOS Parameter


TRUENAME
Used to display the file path or directory
Syntax:
TRUENAME filename --

FDISK / STATUS
There's an easier way to view disk partition information. If usually we have to go first to FDISK and then choose option 4. So with FDISK / STATUS we can immediately saw the partition information. This command can at least shorten the steps of our work and reduce the risk of errors in FDISK. Note: This command will not work with DOS 3.30.

FDISK / MBR
The above command will write the master boot record on the hard disk without changing the partition table information. For the record, the writing on the master boot record (in this case) may cause some problems on some dual-boot programs. For those of you who have installed Linux and Windows on one hard disk and put LILO on the master boot record, you can remove LILO by the order. You can also remove viruses which attack the boot sector, by way of booting from a clean disk and FDISK / MBR.

SHELL = C: \ COMMAND.COM / P / F in (config.sys)
The above command runs "Fail" on the option "Abort, Retry, Fail" (More "Abort, Retry, Fail" appears usually when there is "trouble" at the time is at a DOS prompt).

VER / R
Display information about the DOS version is more complete

Format secret parameters
Determining the size of the cluster: format Drive: / z: ClusterSize * 2
Do not store information for unformat: format Drive: / u
Example:
Format d: / z: 8 will produce 4 kB cluster size Example:
Format d: / z: 32 will produce 16 kB cluster size

1:11 AM | 0 comments | Read More

IP Command


Below is the command associated with the network :

ipconfig / all
Displays the connection configuration information, such as Host Name, Primary DNS Type, Ethernet LAN Adapter.

ipconfig / displaydns
Displaying DNS Cache.

ipconfig / flushdns
Removing DNS Cache

ipconfig / release
"Removing" all connections IP Address.

ipconfig / renew

Creating a new IP address for a particular adapter.


ipconfig / registerdns
To refresh control and re-connection control register.

ipconfig / showclassid
Displays information DHCP Class.

ipconfig / setclassid
Changing DHCP Class ID

netconnections control
Displaying Network Connection.

ping
Example: ping-www.windows7holic.co.cc
Test connection to the site-www.windows7holic.co.cc.

tracert
IP Address Displays route information.

netstat
Displays information TCP / IP is currently active.

route
Displays local route.

hostname

Displays the name of the computer.

1:04 AM | 0 comments | Read More

DIR command


Below are some tips about the DIR command in MS DOS:

1. dir c:

This is the "base" that is used to display files and directories on drive C.

2. dir c: d:

Used to display files and directories on drive C and D.

3. dir / b / s

Used to display the directory and subdirectory to display the full path name.

4. dir / a

Used to show all files including the file system and hidden files (hidden).
To show all existing files on drive D using the following command: dir d: / a

5. dir / os

Used to display files and directories with the sequence starting from the file size to smallest file size with the largest. To reverse the order you can use the command: dir / os

You can change the parameter s on the above command with:

- N, the command dir / on: sequential names
- E, command dir / oe: sequential type of file
- D, the command dir / od: serial date

6. dir / p

To display the file and directory per "page".

For the other parameters of the dir command you can see her help with writing: dir /?

12:51 AM | 0 comments | Read More

Michael Jackson Beat Britney in Yahoo Search

Written By Unknown on Wednesday, December 2, 2009 | 9:47 AM


Michael Jackson's death made him the first rank Yahoo search topic this year. Jackson ended 'power' Britney Spears is for four consecutive years become the most searched artist on the internet. In fact, Jackson can beat the popularity of U.S. President Barack Obama a decline in the ranking of 10.

"Until June, when the news revealed Jackson's death, the topic of Obama's inaugural meet most web traffic," said analyst Yahoo Vera Chan was quoted as saying by the Telegraph, Wednesday (2/12/2009).

"When Michael Jackson was reported dead, traffic-related searches the superstar immediately jumped over popular topics other," he added.

Besides Michael Jackson, another popular search topics are meenmpati Twilight of the second order, which followed a row beruturut WWE (World Wrestling Entertainment), Megan Fox and Britney Spears ranked third, two and four. Japanese warriors cartoon Naruto ranked sixth and behind him followed by a reality show American Idol, Kim Kardashian, NASCAR (National Association for Stock Car Auto Racing) and Runescape

9:47 AM | 0 comments | Read More

Windows "black screen of death"


Microsoft denied the issue 'black screen of death' that hit Windows computers. They found no strong evidence to suggest that the latest security updates for Microsoft's troubled operating system (Operating System) Windows.

The term 'black screen of death' is a state where the computer screen suddenly died and dark after a user to log in. This problem is detected by the computer network security firm and UK-based internet, Prevx.

Prevx claims this change the registration of the Microsoft OS, namely the store databae configuration setting, causing an error on some computers. But Microsoft's own Prevx disagree. Such information is quoted from Reuters, Wednesday (2/12/2009).

"Microsoft has investigated reports stating that November security updates only affect the occurrence of changes in registration that caused the system error, such as the middle of busy consumers complained," said Microsoft spokesman Christopher Budd.

Budd said the Microsoft has found that the report was not accurate. According to him, a thorough investigation has shown none of the newly released update related to the issue of black screen of death.

9:35 AM | 0 comments | Read More

Radeon HD5950


AMD graphics card developer is rumored to be out its newest product, Radeon HD5950. The issue is also mentioned AMD will release it in the first semester of 2010.

TechTree launched on Monday (1/12/2009), the presence of Radeon HD5950 is to reduce the technology gap between the Radeon HD5870 and Radeon HD5850. Moreover, two weeks earlier, a company based in California launched Radeon HD5970 2GB as the fastest graphics card in the world.

In addition, the presence of the Radeon HD 5950 to offer a diverse selection of graphics cards are DirectX11 capable. Moreover, competitors, Nvidia step further in issuing these products in the line.

Radeon HD5950 will not differ much with the Radeon HD5970, because these cards still use the 2 pieces Cypress AMD GPU which is also installed on the Radeon HD5850. Not only that, the HD5950 will be pinned 1440 stream processors per GPU. Another similarity, Radeon HD5950 card is estimated to have low 650-675 MHz clock, and memory between 900 to 1,000 MHz.

Additional features are, the memory interface with 256-bit GDDR5 reaching 2GB memory per GPU him. Unfortunately, unknown details about the prices offered by AMD for this anyarnya product.

8:57 AM | 0 comments | Read More

Update Facebook From Sony PS3?

Written By Unknown on Saturday, November 14, 2009 | 11:02 PM


Access Facebook seems to be more widespread. Not only can be accessed via computers and mobile devices alone, thanks to the latest software, Facebook will be able to integrate with gaming device PlayStation 3 (PS3) Sony.

The news circulated after the latest PS3 pictures circulating in cyberspace. In the drawing, there is Facebook logo on the PS3 menu system.

This then led to speculation that Sony will cooperate with the social networking site Facebook. Thus, users can connect with Facebook, to update status while playing video games and enjoy other services offered by the PS3 features.

In addition to integration with Facebook features, Sony PS3 is also mentioned browsers will have the latest development results. The other, there will also devices that allow users to change the look of the PlayStation Network profile image. Such information is quoted from the Telegraph, Friday (13/11/2009).

When confirmed, the Sony official declined to comment on these rumors linked. But they promised would soon make an announcement about the integration of Facebook with the PS3.

11:02 PM | 0 comments | Read More

Future Game Console-Based Cloud Computing


Console games in the future will not rely solely on the hard drive for storage. Electronics giant Sony will develop platform console cloud computing (cloud computing).

Ken Kutaragi is, 'father' of the PlayStation console, has started a new development effort based on cloud computing. In addition, Sony Computer Entertainment has set up a new company Cyber Ai Entertainment Inc. last month. The company will focus on the latest networking technology to create a cloud computing for entertainment purposes.

As quoted from the Tech Tree, Sunday (15/11/2009), Kutaragi will focus on cloud computing network to serve the entertainment. Most likely this way may be somewhat similar to the Live gaming service that is displayed on the Game Developers Conference 2009 some time ago.

Kutaragi would expect to see a cloud computing-based console will combine the game with HD video services. However, the platform is unknown when this will soon be adopted, cloud computing menginggat rising popularity recently

10:51 PM | 0 comments | Read More

Britney Spears Twitter Hacked


The pop star, Britney spears, be a victim of hackers. In fact, hackers had written update on Twitter and MySpace's Spears.

As reported by China Daily, Saturday (14/11/2009), a hacker could write a message which claims that the singer known for his tembang Baby One More Time it was a devil worshiper.

Management Spears instantly delete a number of posts-posts that uploaded by hackers who broke into account.

Britney Spears was known to often use Twitter to greet his fans. Recorded, Spears has approximately 3.7 million followers.

Twitter is managed by the management Spears, but sometimes Kevin Federline's ex-wife was also frequently update their own status.

Result caused by hackers, Spears apologized for any messages written by hackers to all fans.

10:36 PM | 0 comments | Read More

Windows 7 'Inspired' from Mac OS


Microsoft is surprisingly admitted that the operating system that runs on the Mac is very attractive. Even their the latest operating system , Windows 7 is not directly inspired by these competitors.

"What we've tried to do with Windows 7 is that the traditional format or the format of a touch, indirectly inspired by the Mac's look and graphics," say Microsoft group manager Simon Aldous, who launched PCR, Friday (13/11/2009).

"One of the reasons why we were inspired, because many people say about Apple's Mac OS is fantastic, with stunning graphics, and easy to use. Therefore we are encouraged to beat," he added

However, Simon added, although the graphical Windows 7 much 'borrowed' from the Mac OS X graphics, graphics and technology that Microsoft brought far more stable than the Mac platform.

Unfortunately this is not the opinion of the technology columnist Walt Mossberg. The man who wrote a review about Windows 7 it says, besutan Microsoft's latest OS is as good as the Mac OS. Yet he admitted that he still preferred OS besutan Steve Jobs for everyday use.

"In my view, Snow Leopard still faster and reliable. This is because several applications built-in Apple still more complete, such as email, photo and video software. Windows 7 unable to compete about the technology," said Mossberg.

10:17 PM | 0 comments | Read More

Google Chrome For Mac OS


Google is rumored to be soon launched a beta version of Chrome browser for the Apple Mac platform, namely Chrome 4.0. Hopefully, this became another alternative for Mac users in the surf in cyberspace.

"Our team has worked hard to get the Chrome beta version for Mac to get ready. Please note, we've besutan Chrome works great on Windows and Linux," explained a Google spokesperson, told Vnunet, Friday (13/11 / 2009).

Nick Baum, Product Manager at Chrome Mac developers to add even have to wait, but in that period was not long before they will build a valuable experience to add mengoprek extension options.

"The sooner you switch, the more time you have experience in making our Beta version will be released in early December," Baum writes.

Despite this early December Chrome beta for Mac has been able to use. However, it is unknown what the advantages to be given Google's products, particularly they should be able to attract Mac users who already identical to Safari.

10:13 PM | 0 comments | Read More

1 year, 7 Million Computers Infected Conficker

Written By Unknown on Thursday, November 5, 2009 | 2:35 AM


computer network security researchers found, the virus Conficker has successfully infected approximately 7 million computers worldwide in just over one year.

Quoted by Computer World, Saturday (31/10/2009), researchers from the Shadow Server Foundation says it has managed to track down millions of computers around the world IP infected Conficker.

Tracking is successfully done by first tracking algorithm used by the virus and then they buried 'sinkhole' servers into the Internet domain name that visited the program. Conficker deemed to have been sent instructions to the various ways that the creators still can control the PCs there. But thanks to the help of 'sinkhole', the researchers could track down the infected machine.

"Although most computer users already know the virus Conficker but along with it also the virus continues to infect. Seven million computers in one year is quite rapid infection of this century," said co-founder Andre Shadowserver Foundation DiMino.

Conficker was first discovered in 2008 and immediately got the attention of Internet users, network security experts, and even the mass media. This worm has spread everywhere, especially to China and Brazil. Even software developers have created a dedicated agency to deal with this virus, with the name Conficker Working Group (CWG).

CWG found, Conficker more often use computers with Microsoft Windows systems as a vehicle. Once infected, users will not be able to download the Microsoft Malicious Software Removal Tool, the software is expected to treat the infection Conficker.

2:35 AM | 0 comments | Read More

Windows 7 profitable sales in Japan


It was not the United States who became the country's most lots sell Windows 7, but Jepang is the most profitable niche for Microsoft.

"Sales of our operating system is the latest, a Windows 7 have a fantastic sales in Japan. And the results are able to save the sale of pesonal computers (PCs) in the country," said Microsoft CEO Steve Ballmer, told PC World, Thursday (5 / 11 / 2009).

"We got a good response in Japan. This is a fantastic sales. Sales of Windows 7 in the first 10 days so much better, even than XP and Vista," he added.

Microsoft has a strong support for this new operating system, especially from corporate and individual PC users in Japan. Around 230 companies took part in the early adopter program that put Windows 7 on their hands prior to launch to the public. At the same time, approximately 670 new computers are also launched to coincide with the new operating system. As a result hardware sales have increased up to double digits thanks to Windows 7.

"I think it's pretty obvious when you look at hardware sales, where we have seen a growth of nearly 20 percent annually. And thanks to sales of Windows 7 faster hardware," Ballmer claims.
2:21 AM | 0 comments | Read More

Intel Optimize SSD Performance Windows 7

Written By Unknown on Monday, November 2, 2009 | 9:43 AM


Intel has launched a Solid State Drive (SSD) 34nm. SSD is working on X25-M SATA embedded into the operating system "warmest" debutants Microsoft, Windows 7. According to Intel, both optimization problems and the inclusion of the same update using the attributes of Windows 7 is known as the trim to ensure a high level of performance further.

"Trim is a part of the Windows ATA Command Data Set Management, an operating system synching of files to be memerlihatkan file deletion, however, this file is not deleted it," explained Intel over a statement.

Peter Hazen, a spokesman for Intel, adding that this firmware update will provide a significant performance improvement for 34nm SSD X25-M 160GB. Advantages include write speeds up to 100MB per second. In addition, the toolbox also offers system performance enhancements for users of Windows XP and Vista.

However, John Savil (from Windows ITPro) noted that only the Trim that will improve the performance of the file will be deleted.

"If you overwrite an existing file, then the Trim can not help and you will memeroleh the same performance with degradasinya write without the help of Trim," explained Savil.

9:43 AM | 0 comments | Read More

Assembling File Server with the Red Devils


If you do not want to be bothered and loose enough budget, then the NAS (Network Attached Storage) is one solution. However, if you want to use the old computer and unused hard disk, FreeNAS which is a variant of the FreeBSD operating system can dayagunakan. FreeNAS file you can download at www.freenas.org address in the form of an ISO file size of 46.6 Mega Bytes.

Uniquely, we FreeNAS can run as a Live-CD, aka do not need to be installed into the hard drive. If the PC motherboard to be used to support booting from a USB Flashdisk, FreeNAS is also ready to be installed in this popular media. If you are a photography and have pehobi store media type CF Card. This configuration steps:

Burn the ISO file to a CD

By default FreeNAS is distributed in the form of an ISO file, to be burned into a CD. Do not forget, we do not burn the FreeNAS ISO file as data, but as the ISO.

Priorities change Booting PC

The following steps we need to do because our computers will not boot from the hard disk, but from the CD contains the files that previously freeNAS we prepared. Shortly after the turn on the PC, press, press the Delete key to enter the BIOS settings (Basic Input-Output System). This button may vary, depending on your PC motherboard manufacturer. We recommend that you look at the PC motherboard's manual. Usually, booting priority configuration in the Settings or Anvanced the Boot tab. Go to the section, then change the priority of booting from the CD-ROM was first on. After that, save this configuration by going to the Exit and select Exit and Save Settings. Immediately insert the CD into the FreeNAS includes CD-ROM, the PC will soon be booting from the CD-ROM.

Initial Configuration

Initial configuration contains the steps of defining a local network that will use FreeNAS services.

1. The first step, we will activate the network card (ethernet) or LAN card. Type the number 1, then press Enter.

2. By default, FreeNAS will apply the existing network card in the computer with the label em. Choose one with which you want to FreeNAS network communications media. Navigate to the option OK, then press Enter. Card that has an active network will have a label Up.

3. Furthermore, you are given a bid to use a DHCP server (Dynamic Host Configuration Server) that facilitate the management of IP numbers and addresses in a local network FreeNAS. If you're already using DNS server for IP address numbers, point it to the option No. If no DNS server in the network, select Yes, and press Enter.

4. This option will not appear if you previously chose to use a DHCP server. IP addresses are used by FreeNAS server computers and computers FreeNAS server The access will be determined by the DHCP server. Fill in the IP number that will be used by FreeNAS server computer. Choose the number of unused IP on the network. Navigate to the OK option, and press Enter.

5. Fill in the subnet mask for the IP number we have just given. In this discussion, we use a class A IP number, the subnet mask in binary is 24 bits for three subnet octets in the front covered with a binary 1 (255.255.255.0). If you use a class B IP number, for example 192.168.XX, then its subnet mask in binary is 16 bit for two octet subnet on the front covered with a binary 1 (255.255.0.0). Navigate to the OK option, and press Enter.

6. If the local network connected to the outside (internet) through the gateway computer, fill in the IP number of the gateway computer. Navigate to the OK option, and press Enter.

7. If the local network using DNS server to manage IP addressing number, fill in its IP number. This option does not appear if you previously chose to use a DHCP server. Navigate to the OK option, and press Enter.

8. Translation bids will perform IP numbers used by FreeNAS server to form IP version 6. Just navigate to the OK option, and press Enter.

9. A moment later, the configuration of the IP number has been completed. If you choose to use a DHCP server, IP numbers used by the server will also be displayed freeNAS. Remember the IP numbers, because we will use to access the advanced configuration interface via a web browser. Press Enter to reboot FreeNAS.

10. If it appears FreeNAS screen, just press Enter.

11. Initial configuration has been completed.

Box 1: About RAID

RAID systems (Redundant Array of inexpensive Disks) is a mechanism for arranging the several disks to improve performance, better data access speed, the speed of data writing and reading speed data.

There are two main arranging the system in RAID, which is stripping and mirroring. The first system of storing pieces of data packets between a series of alternately hard disk (array) and the other one. While mirroring the system stores the same data on each hard drive series. Effectively stripping system to increase the speed of data access and write data, while mirroring the system ideal for data backup.

Actually there is one more system of arranging the disks in the RAID, which is JBOD (Just a Bunch Of Disks). Circuits simpannya combined disk capacity and is considered as one disk. This system is suitable for the purposes of data storage capacity of extra space.

Advanced Configuration

Advanced configuration steps are used to organize a series of RAID disk and set the rules for-expiry date. This advanced configuration can be done on any computer in the network FreeNAS.

1. Open a web browser, then fill IP numbers used by FreeNAS server computer and press Enter. Immediately perform advanced configuration interface FreeNAS.

2. The first step, we define the disk to be arranged in RAID. Click the Management sub-menu under Disks menu. On the Management tab, press the plus sign icon (plus).

3. Press the button on the Disks dropdown, then navigate to the first hard drive that is identified by a label ad0. Next, press the Add button.

4. On the Management tab, press again the plus sign icon (plus). Press the button on the Disks dropdown, then navigate to a second hard drive that is identified by a label ad2. Next, press the Add button.

5. After all the hard drives to be arranged in RAID defined, apply the configuration by pressing the Apply Changes button.

6. Now, we will format the hard disk-drive that we will cluster in RAID. Click the Format sub-menu under Disks menu. On the disk, press the dropdown button and navigate to the first hard disk (ad0). In the File System, press the dropdown button and select Software RAID. Click the Format button.

7. Back to the Disk, press the dropdown button and navigate to a second hard drive (ad2). In the File System, press the dropdown button and select Software RAID. Click the Format button.

8. After the disk-drive formatted to be strung together, we are now in a RAID series. Way, click the sub menu under the Software RAID Disks menu. Specify the desired type of RAID. In the first practice, we try to select raid1 with raid1 click the tab. Click the plus sign icon (plus).

9. Give any name in the RAID Name field. Put a check (tick) on the Members of This Volume to select the disk to be arranged in RAID. Similarly, to enable the option Create and Initialize RAID. If you are finished, click the Add button.

10. Do not forget to apply the RAID configuration by pressing the Apply Changes button.

11. Now, time to format the RAID set. Click the Format sub-menu under Disks menu. In the Disks, point to the RAID set we just created. In the File System, select UFS (GPT and Soft Updates). Give any entries in the Volume label and enable (check mark) on the option Do not Erase the MBR. Then, press the Disc Format.

12. Do not forget to apply the configuration by pressing the Apply Changes button.

13. We need to define a RAID mount point that can be accessed by members of the network (clients). For that, click the sub menu under the mount points Disks menu. To add the mount point, click the plus sign (plus).

14. In the Type section, navigate to Disk option. On the disk, navigate to the RAID set we just created. On the Partition, press the dropdown button and select EFI GPT. Click the dropdown button on the File System, select UFS. Give any name in the Name and Description field. If you are finished, click the Add button.

15. Do not forget to apply the configuration of the RAID mount point that we have already set with the click Apply Changes button.

16. The final step, we manage services Samba (CIFS / SMB) which is a file-sharing services between the family computer UNIX (including FreeBSD and Linux) with Windows computers. Press the sub menu CIFS / SMB under the Services menu. Open the Settings tab. In the Authentication section, if you want everyone to be able to access the FreeNAS server without a password, select Anonymous. Fill in the name of the FreeNAS server identifies the network on the NetBIOS name, so that later can be recognized by Windows computers. Specify workgroup where FreeNAS server will join. Fill in any labels on all Description section. Do not press the Save and Restart once.

17. Open Shares used tab. This section serves to establish the folders to be shared. Of course, the files will be more organized if the folders are sorted in a more-specific flder. In the Name, fill in the desired folder name. Give any entries in the Comment section. Press the button marked three points on the path, then navigate to the RAID mount point that we form. Do not put a check (tick) in the Read Only, unless you want to network members can only read and copy the files in the FreeNAS server. Put a check (tick) in the browseable so that this folder can be viewed by members of the network. If you are finished, click the Add button.

18. You can add a folder click the icon sharing with the plus sign (plus) and do step 17. Do not forget to apply the configuration folder sharing that we have already set with the click Apply Changes button.

19. Go back to the Settings tab, press the Save and Restart.

Changing RAID Types

What if you want to change the type of RAID? The first step is to backup all the files used in RAID is much older then, because changing the RAID will destroy all data. After that, the following steps:

1. Click the sub menu below mount points in the Disk menu. Management tab. Select the mount point, then remove with a click on the icon letter e (Erase).

2. Apply removal mount point with the click Apply Changes button.

3. Click the sub menu under the Software RAID Disk menu. Select the RAID, then click the icon to delete the letter e (Erase).

4. Return to Software RAID sub menu, click the type of RAID you want. As an example of this practice is JBOD. Then press the plus sign icon (plus).

5. In the Name RAID, RAID fill with new identities. Put a check (tick) on the hard disk will be arranged in the new RAID. Activate the Create option is Initialize RAID. When finished, click the Add button.

6. Apply the new RAID configuration with the click Apply Changes button.

7. The next step, follow steps 11-19, Advanced Configuration chapter.

FreeNAS server access from members Computer Network (Client)

Well, now we have FreeNAS server and have become active. It is time we move on a computer network members and try to plunge or copy files from the server made-in my self, this homemade alias.

1. Open the My Network Places box or click the Start button> Run. Fill in the FreeNAS server IP number, preceded two backslash sign (--), eg: - 10.15.38.235, then press the Enter key.

2. Try to copy (copies) files from the client computer hard disk and add (paste) into the FreeNAS server folder.

Box 2: Installing FreeNAS in Flashdisk or Disk

In addition to running as Live_CD, FreeNAS can also be installed into the USB or Harddrive Flashdisk. If you want to install to the hard disk, the disk used to install FreeNAS can not be used to store data. In other words, can not be arranged in RAID. So, you need a minimum of 3 hard drives.

1. Run FreeNAS as a Live-CD, after arriving at the configuration option (Setup) as in the discussion Initial Configuration, type the option number 9, then press Enter.

2. Next, navigate to the option Istall 'Embedded' OS on HDD / Flash / USB ". Highlight the OK button and press Enter.

3. Navigate to the location of media files from FreeNAS, which is in the CD-ROM with the label known cd0. Highlight the OK button and press Enter.

4. Select the media where FreeNAS is installed. Choose USB flash which is known as a label or a hard disk da0 are recognized as ad0. Do not select the disk to be arranged in RAID and used as a place to store the data in the network. Highlight the OK button and press Enter.

5. After the installation finishes, restart your computer and change the first boot priority in BIOS to the medium used to install FreeNAS. Save the boot configuration and exit the BIOS. After the computer restarts, booting from the media would do a new install FreeNAS (Flasdisk USB, CF card, or hard disk).

Congratulations and enjoy creating your own file server

9:36 AM | 0 comments | Read More

Harddisk Problem Solution : Addressing the MBR Damage


In the disk, there is a file called the MBR (Master Boot Record). This file is located on the first byte and the first sector of your hard disk; really just the first. Understandably, this is the MBR marker disk presence. If the analogy, the MBR is like a map that leads the BIOS to find hard drive.

But many things can cause the MBR is damaged, such as a virus or accidentally formatted. If that happens, the operating system lost the signpost marked by the emergence of the message Operating System not found or missing operating system on the screen.

The solution of this problem is to restore the MBR file. The most common way is to make the process of recovery from the Windows CD. Way, boot to the Windows CD and select Repair (by pressing the R button) and enter the Recovery Console. After that, type fixmbr command to restore the MBR file.

For Windows Vista, the same concept although the procedure is slightly different. First, boot into Windows Vista DVD and select Repair Your Computer. When the System Recovery Options appears, select Command Prompt. After the Command Prompt window appears, type Bootrec.exe and press Enter.

If the Windows CD either gone anywhere, you can use the application of the Rescue Kit 9.0 Paragon Express artificial. This is a free application that has diverse functions, including restore the MBR. This application is bootable, meaning can be burned to a CD and a source of the boot process. When the system showed signs of loss of MBR, you have to do is boot to the CD containing this Rescue Kit. After that, select Corrector Boot menu, follow the procedures that have been determined, and the case lost MBR should have been resolved.
9:26 AM | 0 comments | Read More

Harddisk Problem Solution: Windows Damage


Cases around the hard drive more often than Windows on the hard disk is badly damaged so that we can not enter into it. In such cases, the only solution is to reinstall Windows. The problem, often in the hard disk or partition containing Windows is still there are many important files that must be saved. Then, how it?

Use a bootable applications, and can explore (browse) a file on disk is problematic. Again, you can use the Disk Rescue 9.0 Express, Very easy to use, you simply follow the wizard (the wizard) from the menu File Transfer Wizard. Unfortunately, this free version can not move these files to CD / DVD. So, you must copy the files to a flash or external hard drive.

Rescue Disk Express but can only work from the CD. If you prefer the process of the flash, use a portable Linux operating system that can boot from flash (live-USB). Almost all Linux distributions have a portable version, but it should be noted that the mounting process (introduction of hard disk contents) often must be done manually. Therefore, we recommend using Puppy Linux distributions because these distributions do the automatic mounting. Size Puppy Linux also only 100MB, so the fit on the flash is small size.

9:19 AM | 0 comments | Read More

Keeping Harddisk Healty


In all PATA and SATA hard drives on the market today, is already embedded features SMART (Self-Monitoring Analysis and Reporting Technology) that specifically detects the hard disk's health. In the SMART parameters were about 30 hard drives health, ranging from temperature, spin-out time, to seek error rate. From this data could be inferred if the hard disk on your PC is still healthy, or already ill.

To read this SMART data, we need specialized applications such as HD Tunes. The main functions of this application is measuring the speed of disk, but can be to read the SMART information, too. HD 15 Tunes will read SMART parameters, with 3 types of results, the current, worst, and the threshold. The definition of each outcome is:

· Current: current state of your hard disk

· Worst: the smallest number ever found in the previous generation hard drives

· Threshold: the limits below which shows the damaged hard drive

· Data: raw data from sensors or counters.

9:13 AM | 0 comments | Read More

How to Clean Conficker Virus


Virus Conficker is estimated that tens of thousands of computers already infected in Indonesia, and millions in the world. Conficker Symptoms The most common is the emergence of the message Generic Host Process Error every time a user connects his computer to the Internet. In addition, Conficker also known to cause the logged in username Active Directory locked because he bruteforce action.

If your computer is already infected with the virus now Conficker scourge of computer users around the world, not to worry. You are not alone because there are estimated to have 12 million infected computers around the world today. If the antivirus is still failing to overcome, there is a way membasminya even need a bit of hard work.

Consider the 7 steps eradicate the virus from Vaksincom Conficker following:

1. Decide who will clean your computer from the network / Internet. Turn off WiFi access when there and pull the ethernet cable from the LAN network.

2. Turn off system restore (Windows XP / Vista).

How select Start>> All Programs>> Accesories>> System Tools>> System Restore and then select the settings menu off for all partitions.

3. Turn off the active virus process in services. Use the removal tool from Norman to clean the virus is active. The program is available free of charge and can be downloaded at http://norman.com/support/support_tools/58732/en-us

4. Delete service svchost.exe implanted fake virus in the registry. You can search the registry manually.

5. Delete Task Schedule made by the virus. (C:-WINDOWS-Tasks)

6. Remove string registry created by the virus. To make it easier to use the registry script below. Copy this script and then install.

9:07 AM | 0 comments | Read More

Cleaning W32/Moonlight Virus


"Moonlight", so the worm type malware is named herself. Local worm actually been around since W32/Brontok or W32/Rontokbro era, but still exist until now. This is because variants that continue to emerge. In fact, there are many reports of AVI that computer users infected by this worm. Therefore, we were interested to discuss the issue of Moonlight at this time.

Characteristic
Made using the compiler W32/Moonlight mainstay vxer (term for malicious programmers) ie local VB6 (Visual Basic 6) and compressed using FSG packer PE programs. Original size of 324 KB, and after compressed to 144 KB. Its own identity using Windows XP folder icon standard.

Action (Payload)
When first run, W32/Moonlight.L will create the file "systear.dll" in a system directory, for example: "C:-WINDOWS-system32-systear.dll". This file is an initialization file so that the worm can identify himself and to mark the position where the worm has spread. After that, create a file of supporting Moonlight shaped dynamic link library (DLL) "moonlight.dll" in the Windows directory (example: "C:-WINDOWS-moonlight.dll") and extract the MIDI-formatted music files "onceinabluemoon.mid" to the Windows directory . After that, the worm makes a directory with a random name in Windows and System subdirectory in the format 'C:-WINDOWS-[random] ". Mean "[random]" here contains random names such as:

"C:-WINDOWS-FLR1S4G"
"C:-WINDOWS-system32-LDF6I7R"

Use a random name is probably intended to complicate the process of investigation and cleanup.
Then the worm will reproduce itself in the following places:
* C:-WINDOWS-[random]-service.exe
* C:-WINDOWS-[random]-smss.exe
* C:-WINDOWS-[random]-system.exe
* C:-WINDOWS-[random]-winlogon.exe
* C:-WINDOWS-lsass.exe
* C:-WINDOWS-system32-[random] - [random]. Cmd
* C:-WINDOWS-[random]. Exe
* C:-WINDOWS-system32-[random]. Exe
* C:-WINDOWS-[random] - [random]. Com

W32/Moonlight.L deliberately duplicate themselves with names similar to the Windows services such as innate "smss.exe", "service.exe" with the intention that the process is not easy to stop using the Windows Task Manager built. Keep in mind, the Task Manager will refuse to stop the process with the name include: "service.exe", "smss.exe", "system.exe", "winlogon.exe", and "lsass.exe".

Because the worm is made using VB6, and because each application requires VB6 runtime named "msvbvm60.dll", the worm is smart strategy to make the runtime file is not deleted or deleted (which makes the worm can not run). Way, by making backups of the runtime files to "C:-WINDOWS-system-msvbvm60.dll".
Another thing done is to make Moontime file named "MooNlight.txt" in the Windows directory (example: "C:-Windows-MooNlight.txt"). This file contains a message from the creators who called himself the nick "Lunalight" aka "Moonlight":

Endemic
W32/Moonlight.L dissemination is very similar to the worm aka W32/Brontok legendary W32/Rontokbro, by doubling itself to every directory with a name similar to the parent directory.

Cleaning and prevention
Fairly easy to clean, you need to do is run the AVI (Antivirus Info Computer) that has been bundled into one DVD inherent in this magazine. Run, and do checks to each location and storage media connected to your computer. Keep in mind, do not do any activity during the review process. For prevention we recommend you to install the AVI as a guard to prevent your computer infected by this worm again.

AVI 2.0.4.9 Changelog:
* Improved buffer overflow bug that caused crashes when AVI to update online.
* Improved compatibility bug with Windows Vista / 7.
* Improved access violation bug that caused crashes AVI while scanning.
* Improvement of detection of some Windows system files 7.

8:57 AM | 0 comments | Read More

November 16, Last Day Microsoft Office Accounting


The world's largest software producer Microsoft plans to attract Microsoft Office products in mid-November Accountingnya later because it is no longer sold in the market.
Along with the development of increasingly rapid technological, product-as well as other Microsoft products that are not considered attractive anymore. One of them is Microsoft Office Accounting software. For this one product, Microsoft will start the withdrawal in several regions such as North America and England.

Not just one product to be withdrawn but all the products Microsoft Microsoft Office Accounting derivative will no longer be any Microsoft produced, such as Office Accounting Express, Office Accounting Standard, Office Accounting Professional, Office Accounting Professional Plus, Office Accounting 3-user, and Small Business Accounting .

"After a long evaluation in the last few years, we decided to no longer offer these accounting software," said the Microsoft was quoted as saying by Arstechnica, Saturday (31/10/2009).

According to Microsoft, free templates in the other Office System, which is used by Excel and Dynamics was able to meet the accounting needs of Office users.

Site Microsoft Office Small Business presented with links to free templates for small business such as invoices, expenses, time sheets, budget and much more. In addition small businesses will also be assisted by the Small Business Center to complete the accounting work.

Although these new measures will be carried out in the next few weeks, but Microsoft promises to help the Office Accounting customers who want to migrate. Even Microsoft displacement warranty for 5 years.

"For those who want to restore the Office Accounting software, before 30 days of purchase, you can visit the Microsoft site that provided for a re-activation key," said the Microsoft

8:31 AM | 0 comments | Read More

Reliability Intel Core i5 and i7


Intel Core processor family I5, and two new processor series Intel Core i7 Nehalem microarchitecture will bring the latest to the mainstream desktop.
Intel Core formerly code-named? Lynnfield? is a chip built on Nehalem micro-architecture and is designed for users who require reliable performance for digital media, gaming, and heavy applications other. Intel Core processor with Intel P55 express chipset has the latest available to the users of today.

All processors free of lead and halogens and is equipped with a turbo boost technology. The top line of Core i7 processors are also supported by Intel ® Hyper-Threading. Combination of both provides an absolute intelligence on the computer when needed and the optimal efficiency when the computer battery is not too full.

The latest chipset design that brings a revolutionary change since the discovery of the PCI bus in the early 1990s and became a reference for the computer format in 2010. Intel P55 Express Chipset will be the basis of the motherboard components around the world.

Latest Core i7 processor and the I5 is the first Intel processor that integrates 16-lane PCI Express graphics ports and 2 two-channel memory controller that allows all inputs and outputs is set by a chip that Intel P55 Express Chipset. Intel Chipset previously requiring two separate chips. A Direct Media Interface (DMI) to connect the processor with the latest chipset. Chipset supports 8 PCI Express 2.0 x1 Ports (2.5GT / s) for the device to be flexible. In addition chipset also supports 6 SATA 3 Gb / s ports with Intel Matrix Storage Technology provides RAID levels 0/1/5/10. USB 2.0 up to 14 ports can be added to the chipset that is integrated with USB 2.0 Hub Matching Rate and Intel High Definition Audio to get the quality of premium digital sound. This new processor is the first to use the Land Grid Array package (LGA) 1156 and socket technology.

Mobile processor Intel Core i7 latest, with the addition of PM55 Express Chipset, to deliver the best experience for gaming laptop is intense, digital media, photos, music, business applications and multi-threaded software are demanding more high speed in the process. The chip also increases the overall performance when using the application simultaneously.

"With powerful features such as Intel Turbo Boost Technology, Intel Hyper-Threading Technology and features Intel processors has revolutionized pc laptops, providing performance when you need it and energy efficiency when you do not use it," said Budi Wahyu Jati, Country Manager, Intel Indonesia Corporation.

Intel Core i7 previous mobile code-named? Clarksfield? using the Intel Turbo Boost Technology that can increase the clock speed of the processor by 75 percent to compensate for the work load and give the best performance in applications with high thread-multi-threaded using power from Intel's Hyper-Threading Technology. Latest mobile processor Intel Core i7 is equipped with two-channel memory support DDR3 1333 MHz and a full 1 x16 or 2 x8 PCI Express 2.0 graphics.

Laptops with mobile processor Intel Core i7 Extreme Edition supports Intel Extreme Memory Profiles (Intel XMP), and Intel Extreme Tuning Utility, this advanced tool enables users to perform Overlock and make your laptop sound to be clear for outstanding performance and optimization of the battery. In addition, Intel PM55 Express Chipset, the sophisticated workstations and gaming specific laptops that can support features such as Intel Matrix Storage Technology, Intel High-Definition Audio, and increased I / O interface.

8:24 AM | 0 comments | Read More

Proxy Pro 7 Compatible with Windows 7

Written By Unknown on Friday, October 30, 2009 | 11:09 AM


Proxy Network announced the latest generation of remote desktop software they besutan, Proxy Pro 7. This new software also supports the Windows operating system version 7 and 32-bit 64-bit.

"All customers and partners around the world is very pleased with the presence of Windows 7. We work hard to bring the proxy pro-7 as a remote desktop solution, with full remote control and remote management capabilities that fit with Windows 7," said Proxy Networks CEO Andy Kim , as quoted by Red Orbit, Friday (30/10/2009).

In addition, Proxy Pro 7 also supports other operating systems such as Macintosh and Linux. Target, this software can run on servers with standard VNC, but does not require additional software to support remote access from the PROXY Pro 7.0.

"Proxy Pro is the preferred choice of hundreds of schools, colleges and other educational organizations. Now, with Macintosh and Linux support, we can help them expand their reach to the entire community, both on campus and at home," said Nicole Omsted, Senior Sales Manager for Proxy Networks.

Using Proxy Pro 7 has a very easy tool to use for users, and can automatically install and easy



11:09 AM | 0 comments | Read More

Translators Applications Help Through iPhone Camera

Written By Unknown on Thursday, October 29, 2009 | 10:35 PM


If you are iPhone users and was lost in foreign countries, Babelshot application may be useful to translate a foreign language that you do not understand.

Launched Yahoo Tech, Thursday (29/10/2009), Codium Labs buatah application will enable the integrated camera on the iPhone to print the image of a text and then translated automatically.


This application is able to translate the various languages from various countries, including Indonesia, Africa, Albanian, Catalan, Croatian, Chechnya, Danish, Dutch, English, Estonian, Finnish, French, Galician, German, Hungary, Iceland, Itallia, Latvia, Lithuania, Malaysia , Maltese, Norwegian, Polish, Portuguese, Romanian, Slovak, Slovenian, Spanish, Swahulli, Tagalog, and Turkish.

Besides able to translate from a text imaging, this application can translate the language by typing text into the iPhone screen. In the process of typing, the iPhone and iPod users can translate text in the above, plus several other languages such as Arabic, Belarusian, Bulgarian, China, Greek, Hebrew, Indian, Japanese, Korean, Macedonian, Persian, Russian, Serbia, Thailand, Ukraine , and Vietnam.

To get the maximum translation of the image of his text had to be maximal. It is therefore strongly recommended to use the iPhone camera is reportedly 3GS has a better focus. In addition, users must be in good condition online with wifi and cellular networks to get the translation quickly.
10:35 PM | 0 comments | Read More