Search This Blog

Thursday, November 3, 2011

Adding Memory to Your Computer

Your computer will lag behind and you want to give it a boost? Add them to memory.

By increasing the RAM on your computer's hard drive, which is slower, be less stressed when you open multiple windows or tabs at the same time,
when you manipulate large files when you launch your software when you play, etc. .

In the end, then you will reap improved performance of your computer and a greater working comfort. Whether to improve the performance of a desktop,
a laptop or netbook, adding memory is accessible to everyone.

Just as a first step to check the type and characteristics of the memory used by your computer to see which modules you must buy (DDR, DDR2, DDR3 SO-DIMM, ...) and how much memory you can add. The number of memory connector on the laptop is indeed limited. The manufacturer is Crucial to this analysis tool free online that will automatically give you this information.

Then, by a simple trapdoor under your laptop and your netbook and directly into the housing of your computer, you can easily add your new module and extend
the capacity of RAM your computer.

All you need to finally verify that the module is properly recognized by your computer and Windows.

Find memory compatible with your computer:

With the Crucial manufacturer's online scan tool, you can easily find the type of memory your computer's speed, but also the quantity that you can add.
~So open Crucial site and click the Scan button on my system under Tools Crucial System Scanner.
~Check the box By checking this box and clicking ... and click Scan my system.
~In the dialog box that appears, click Run.
~Allow the program to then make changes to your computer by clicking Yes.
~Your browser is then open to a page showing the results of the analysis. The amount of memory installed, the type and number of free sites are listed. Here,
two memory locations are present which is already used by a module 2GB
~Information on the system manufacturer and model of motherboard are also shown.
~Fill out the form with the information: the manufacturer of your computer or your motherboard in the case of a PC assembler, the range and the model name.
Click Search.
~The service presents you with the recommended memory module for your computer.
~Below, the characteristics of your computer or your motherboard are shown. We learn here that the maximum amount of memory is 4GB
~In our case, we have a site made by 2GB of memory, 1 free slot and 4 GB may not be exceeded. The 2GB module is therefore proposed.

Windows, Linux and the limit of 3 GB:

Most operating systems like Windows or Linux are available in two versions: 32-bit and 64 bit. The difference between the two? The 32-bit Windows or
Linux knows how to use a maximum between 3 and 3.5 GB of memory (depending on your device: graphics card, sound card ... which require a memory area).

The 64-bit version has virtually no limit (Family Premium Windows 7 handles for example up to 16GB of memory).

Note that to use a 64 bit system, only the processor must be compatible 64-bit. Currently, almost all processors on the market are 64-bit,
32-bit processors is at least anecdotal. The Intel Core 2 Duo, Core 2 Quad, Core i7, Core i5, i3 Core, or AMD Athlon 64 X2, AMD Phenom X2/X3/X4/X6
are all built on a 64-bit architecture.

If you have a 32bit system, so there is virtually no interest in going beyond 3 GB of memory.

If you want to go beyond, turn to a 64 bit system. Note that the box of Windows 7 offers two versions: 32 and 64 bit and you can install the one you want. Also,
be aware that it is not possible to update a 32-bit Windows for 64-bit version. You will need to perform a full installation.

Adding memory to your Desktop:

Installing a new memory module in a computer is fairly simple and accessible to everyone. Here is how:
~ Unplug all cables and open the box.
~ Locate the slots for memory cards.
~ Spread the lugs memory locations.
~ Insert the memory module in an open location (right next to one used), making sure to align the notches on the card with the connector.
Keyed to two thirds of the bar and the connector allows you to put the card in the right direction.
~ Firmly press the memory module: the lugs just block the card. Make sure they are well adjusted.
~ Your memory modules are properly placed. Close the PC case and reconnect all cables.
~ Turn on your computer. From the start, the new strip and detected and the overall amount of memory your computer is updated.
~ Windows also recognizes the new amount of memory available.
~ Windows Vista and Windows 7, Windows Experience Index should also be updated.

Add memory to your laptop:

To add your new memory module in your laptop, it's very simple.
~ Turn off your first laptop, unplug it and remove the battery.
~ Turn your computer.
~ Using a small screwdriver, remove the screws from the plate called RAM, or CM. Please consult the documentation for your computer to know where
the memory modules.
~ If you replace a memory module, spread carefully and clamps at each end of the connector of the memory module until the module so.
Then remove the module from the connector.
~ Then install the new memory module. Align the notch on the edge of the module with the guide pin located in the connector slot.
Slide the module firmly into the slot at an angle of 45 degrees, then slide it down until you hear click.
~ Then store the cache memory and screws. Insert the battery in its bay, connect the adapter to your computer and restart your computer.
~ At startup, the computer detects the additional memory and automatically updates the system configuration information. Press any key (F1 in our case)
to continue booting.
~ To check the amount of memory installed, click the right mouse button on the My Computer icon on the desktop and choose the Properties command.
~ In the window that appears, the amount of memory recognized by Windows is displayed.

Add memory to its netbook:

Installing the new memory module is very simple and will take about ten minutes. At first, you must remove the memory module already installed,
which occupies this unique position in the netbook.
~ Shut down your Netbook.
~ Unplug it and disconnect all USB devices connected to it.
~ Close it and return it.
~ Locate the small door giving access to memory. This usually involves a small token of memory or memory includes an indication.
~ Remove the screws using a small screwdriver.
~ Remove the lid of the trap. The memory module appears.
~ Remove the clips at both ends of the memory module.
~ It rises.
~ Carefully remove the memory module.
~ Now that the site is free, you can install your new memory module. Take your new memory module.
~ I ntroduce him to his location, taking care to coding.
~ Push the memory module, while leaving the ramp.
~ Then press on down.
~ The mounting clips on the ends are then slipped into their sockets and lock the memory module.
~ Replace the lid and close it with its screw.
~ Turn your netbook, open it and start it. Note that you can reconnect if the battery is not charged enough.
~ The netbook starts normally.
~ Go to System Properties (right click on My Computer then Properties command). The 2 GB of RAM are well recognized.

Useful Run Command Shortcut

* Accessibility Controls : access.cpl
* Add Hardware Wizard : hdwwiz.cpl
* Add/Remove Programs : appwiz.cpl
* Administrative Tools : control admintools
* Automatic Updates : wuaucpl.cpl
* Bluetooth Transfer Wizard : fsquirt
* Calculator : calc
* Certificate Manager : certmgr.msc
* Character Map : charmap
* Check Disk Utility : chkdsk
* Clipboard Viewer : clipbrd
* Command Prompt : cmd
* Component Services : dcomcnfg
* Computer Management : compmgmt.msc
* Date and Time Properties : timedate.cpl
* DDE Shares : ddeshare
* Device Manager : devmgmt.msc
* Direct X Control Panel (If Installed)* : directx.cpl
* Direct X Troubleshooter : dxdiag
* Disk Cleanup Utility : cleanmgr
* Disk Defragment : dfrg.msc
* Disk Management : diskmgmt.msc
* Disk Partition Manager : diskpart
* Display Properties : control desktop
* Display Properties : desk.cpl
* Display Properties (w/Appearance Tab Preselected) : control color
* Dr. Watson System Troubleshooting Utility : drwtsn32
* Driver Verifier Utility : verifier
* Event Viewer : eventvwr.msc
* File Signature Verification Tool : sigverif
* Findfast : findfast.cpl
* Folders Properties : control folders
* Fonts : control fonts
* Fonts Folder : fonts
* Free Cell Card Game : freecell
* Game Controllers : joy.cpl
* Group Policy Editor (XP Prof) : gpedit.msc
* Hearts Card Game : mshearts
* Iexpress Wizard : iexpress
* Indexing Service : ciadv.msc
* Internet Properties : inetcpl.cpl
* IP Configuration (Display Connection Configuration) : ipconfig
/all
* IP Configuration (Display DNS Cache Contents) : ipconfig
/displaydns
* IP Configuration (Delete DNS Cache Contents) : ipconfig /flushdns
* IP Configuration (Release All Connections) : ipconfig /release
* IP Configuration (Renew All Connections) : ipconfig /renew
* IP Configuration (Refreshes DHCP & Re-Registers DNS) : ipconfig
/registerdns
* IP Configuration (Display DHCP Class ID) : ipconfig /showclassid
* IP Configuration (Modifies DHCP Class ID) : ipconfig /setclassid
* Java Control Panel (If Installed) : jpicpl32.cpl
* Java Control Panel (If Installed) : javaws
* Keyboard Properties : control keyboard
* Local Security Settings : secpol.msc
* Local Users and Groups : lusrmgr.msc
* Logs You Out Of Windows : logoff
* Microsoft Chat : winchat
* Minesweeper Game : winmine
* Mouse Properties : control mouse
* Mouse Properties : main.cpl
* Network Connections : control netconnections
* Network Connections : ncpa.cpl
* Network Setup Wizard : netsetup.cpl
* Notepad : notepad
* Nview Desktop Manager (If Installed) : nvtuicpl.cpl
* Object Packager : packager
* ODBC Data Source Administrator : odbccp32.cpl
* On Screen Keyboard : osk
* Opens AC3 Filter (If Installed) : ac3filter.cpl
* Password Properties : password.cpl
* Performance Monitor : perfmon.msc
* Performance Monitor : perfmon
* Phone and Modem Options : telephon.cpl
* Power Configuration : powercfg.cpl
* Printers and Faxes : control printers
* Printers Folder : printers
* Private Character Editor : eudcedit
* Quicktime (If Installed) : QuickTime.cpl
* Regional Settings : intl.cpl
* Registry Editor : regedit
* Registry Editor : regedit32
* Remote Desktop : mstsc
* Removable Storage : ntmsmgr.msc
* Removable Storage Operator Requests : ntmsoprq.msc
* Resultant Set of Policy (XP Prof) : rsop.msc
* Scanners and Cameras : sticpl.cpl
* Scheduled Tasks : control schedtasks
* Security Center : wscui.cpl
* Services : services.msc
* Shared Folders : fsmgmt.msc
* Shuts Down Windows : shutdown
* Sounds and Audio : mmsys.cpl
* Spider Solitare Card Game : spider
* SQL Client Configuration : cliconfg
* System Configuration Editor : sysedit
* System Configuration Utility : msconfig
* System File Checker Utility (Scan Immediately) : sfc /scannow
* System File Checker Utility (Scan Once At Next Boot) : sfc
/scanonce
* System File Checker Utility (Scan On Every Boot) : sfc /scanboot
* System File Checker Utility (Return to Default Setting) : sfc
/revert
* System File Checker Utility (Purge File Cache) : sfc /purgecache
* System File Checker Utility (Set Cache Size to size x) : sfc
/cachesize=x
* System Properties : sysdm.cpl
* Task Manager : taskmgr
* Telnet Client : telnet
* User Account Management : nusrmgr.cpl
* Utility Manager : utilman
* Windows Firewall : firewall.cpl
* Windows Magnifier : magnify
* Windows Management Infrastructure : wmimgmt.msc
* Windows System Security Tool : syskey
* Windows Update Launches : wupdmgr
* Windows XP Tour Wizard : tourstart
* Wordpad : write

How to Recover from System Crash

When a Blue Screen Occurs, you'd better be prepared for the worst. If you absolutely must have a backup of your documents,
your setup and your software, some settings in Windows can also make a difference if a problem occurs.

We advise you to reap that your computer is working properly to collect the maximum information about your hardware and software.
You will necessarily need to know the configuration of your equipment. Regarding software, if you have lost your serial numbers,
it's time to get to not be blocked if you ever need to reinstall Windows.

You absolutely must also configure your system to facilitate the diagnostic work and repair that you should carry in case of failure seriously.

Study hardware configuration:
Do you know exactly what components and devices are installed in your computer? Certainly not all ... But if you have a problem,
and want to determine its origin, it is essential to know your setup in detail. This information will be very useful, whether on a discussion forum or
the hotline for a hardware manufacturer.
~ Download Sisoft Sandra Lite from here and Install it on your system.
~ When this is done, run it by double-clicking for example on its icon on the desktop.
~ Open the Tools tab.
~ Double click on the Create Report.
~ Double click on the Next button.
~ Uncheck all boxes except Overview of the computer. Click Next.
~ In the section Benchmarks, uncheck all the boxes and click Next.
~ Do the same for headings and Software Support and double click on the Next button.
~ Scroll Distribution and choose Print and Fax.
~ Click the Browse button and click Next.
~ Select your printer and click on the button Print.
~ The report is then printed. Put it somewhere safe.

Get the serial numbers of programs:
If you need to reinstall your system, you will need the serial numbers of your programs. You have their installation CD but can not get their hands on the documentation containing the serial number. Do not worry, you have a second chance thanks to the software Advisor.
This free little program will allow you to find,
on your PC, the serial number of some of your software.
~ First of all you'll need to download Advisor and install it on your system.
~ Once installation is complete, it examines your system. After a few seconds, a web page appears.
~ In the section Software Licensing, serial numbers for software you have installed are displayed. Print the page and put it somewhere safe.

Save the system from getting crashed:
You can ask Windows to record in an event log, time and exact date of crashes occurring on your system. Next computers,
this setting can be enabled or not be.
To activate, you must edit the registry.

~ Click Start, then Run.
~ Enter regedit in the Open text box and click the OK button.
~ Pull the key from HKEY_LOCAL_MACHINE, SYSTEM, CurrentControlSet, Control, CrashControl.
~ Create a new value called LogEvent (unless it already appears in the right frame of the window). Just click on the Edit menu, New, DWORD Value,
and name the value LogEvent.
~ Double-click on the latter, then enter 1 in the text box data value. Click OK.
~ Then close the Registry Editor and restart your computer for the change is applied.

Save the user environment after a crash:
In most crashes, you can also save all information from the user environment: user profile, permissions, etc.. in an event log.
This information can be used to investigate the causes of a problem.
Once again, it is necessary to modify the registry to enable this setting.
~ Click Start, then Run.
~ Enter regedit in the Open text box and click the OK button.
~ Pull the key from HKEY_LOCAL_MACHINE, SYSTEM, CurrentControlSet, Control, CrashControl.
~ Pull down the Edit menu, and click DWORD Value.
~ Name the new value UserEnvDebugLevel.
~ Double-click it to edit it. Select the category Hexadecimal Base.
~ Enter 10002 in the Value data field. Click OK.
~ Finally close the registry editor, then restart your computer for the change to take effect.

Saving the memory in case of crash:
When your system fails, you can create an image of the memory of your system that you can use to find the cause of the error.
You can choose between several types of memory dumps.
Complete memory: The full memory dump records the entire contents of memory before the system shuts down without explanation. Its size is equivalent to the amount of RAM installed on your computer, which you must add 1 Mo. It is therefore worth a lot of disk space to store this image. So if you have 512 MB of RAM, will dump a 512 + MB or 513 MB
Kernel memory: The kernel memory dump records only the memory allocated to the kernel of Windows XP, hardware, operating systems and programs executed by the system. It therefore excludes the memory allocated to software executed by users. The backup process on the hard disk and is accelerated in the event of a crash. The size of the kernel memory dump is approximately one third of the total amount of RAM installed on your computer. This type of image is most interesting, since it is much smaller than the complete memory dump, and it neglects only the memory areas that do not appear to have any relation with the problem.
Memory Dump: Finally, the memory dump records the minimum information necessary to identify the cause of the crash. The memory dump saves in less than 64 KB: the stop message and parameters, the list of drivers loaded, the process context, information on the process stopped, the information on thread that stopped.
The memory dump can be useful if you have limited disk space. But you have less chance of finding the cause of errors in the examination, because of the lack of information retrieved.

To set the type to create memory dump during a crash, you must change the system settings.
~ Click the right mouse button on My Computer, then choose Properties.
~ In the System Properties dialog box that opens, click the Advanced tab.
~ Then click the Settings button under Startup and Recovery.
~ Pull down list then Writing debug information, then select the type of image you want to create in a crash, Kernel memory, for example, and click OK.

Install the Recovery Console:
The Windows Recovery Console is designed to help you recover the system if your computer does not start properly or does not start at all.
The Recovery Console can be executed directly by starting your computer from the Windows XP CD. You can also install it on your computer for easier access.
Insert your Windows XP CD in your drive.
~Then click the Start button, then Run.
~Then enter in the Open text box the following command: E: \ i386 \ winnt32.exe / cmdcons where E: is the drive letter in which your Windows XP CD.
~Confirm the installation of the Recovery Console by clicking the Yes button in the dialog box that appears.
~If you are connected to the Internet, the installer tries to download the Recovery Console from the Microsoft website. Press ESC to install directly from your Windows XP CD.
~After a few seconds, a message appears to indicate that the Recovery Console is installed. Click OK, then restart your computer.
~When you next start the computer, Recovery Console will be added to Windows startup menu.

Improving the functionality of the Recovery Console:
By default, access to all drives and all folders on your hard drive and the diskette are not allowed in the Recovery Console. Only the folder where Windows is available.

To change this and allow you to access all folders on your hard drive and all your readers, which is convenient to perform a backup last minute of your sensitive documents, you need to change local security setting.
~Open the Control Panel by clicking Start, Settings, then Control Panel.
~Switch to Classic View if you're not there already, then double-click the Administrative Tools folder.
~Then double-click on Local Security Policy tool.
~In the Security Settings section, scroll element Local Policies, then click the Security Options folder.
~In the right frame of the window, double-click the policy Recovery Console: Allow floppy copy and access to all drives and folders.
~Click the Enabled option in the dialog box that appears, then confirm with OK. You can then close the Local Security Settings window.

Uses of DD Command

Linux provides a DD command which is the powerful UNIX utility. It makes use of Linux kernel makefiles to make boot images.
DD can be used to copy data from one device to another or from one location to another.
Administrator is the only person having rights to execute DD command. You can use the below DD command in Linux operating
system which will help you in various ways.

The uses of DD command are as follows:
~ If you want to take the backup data from one hard disk to another hard disk within the same system. The command is given below:
Code:
# dd if=/dev/sda of=/dev/sdb
~ In this “if” specifies input file name and “of” specifies the file where the data has to be copied. If you mention source device in target device and vice versa then you might loss all your data.
~ If you want to restore the hard disk with the image file of another hard disk then use the following command:
Code:
# dd if=hdadisk.img of=/dev/hdb
~ To copy the data from the floppy into the image format you need to type the following command:
Code:
# dd if=/dev/fd0 of=myfloppy.img
In the input file specify the name of floppy location and in output give the name of floppy image file.
~Type the below command to read data from one location and write it to another location. The command is given below:
Code:
dd if= of= bs= ("USUALLY" some power of 2, and usually not less than 512 bytes (ie, 512, 1024, 2048, 4096, 8192, 16384, but can be any reasonable whole integer value.) skip= seek= conv=< conversion >
~ If you want to remove CD, DVD or USB from the system then type the below command. This command will rescue it from the system.
Code:
ddrescue -b 2048 -d -e 20 -r 300 -v /dev/hdc /home/sam/dvd.iso log.txt
~ You can backup a partition. For taking the backup you need to specify the partition name in input file and then specify the path or image file where you want to take backup. The dd command for taking backup is given below:
Code:
# dd if=/dev/hda1 of=~/partition1.img
~You can create an iso file from the source file. So we can enter the CD or DVD and create an iso file from the data contained in them. The dd command for creating iso is given below:
Code:
# dd if=/dev/cdrom of=tgsservice.iso bs=2048
Thus dd command reads one block at time, executes it and writes to the targeted output file.

How to Add subtitles to your home made videos

You filmed your vacation and you want to add subtitles to your video to showcase places you have visited for example,
to provide additional information to sound and image, or to translate foreign dialogue.

Movie Maker software, which is built into Windows XP, Windows Vista and you can install in Windows 7 for free ,
you can easily perform the editing of your videos. It also allows you to add subtitles that are embedded directly to your video.
Thus, whatever the medium and the software with which you watch your movie, the subtitles will be displayed and legible.

You can view your subtitles between two clips in the form of a transition or directly involved in a clip.
To define the appearance of the subtitle, you need to use the timeline table. And for a perfect result, you can customize the font,
size and color of subtitles.

Importing a movie:

Open Windows Movie Maker built into Windows XP and Windows Vista. You'll find it in the Start menu.
~ Run Windows Movie Maker by clicking the Start button, click All Programs, then clicking on the shortcut Windows Movie Maker.
~ In the software window that opens, click the Task button to bring up the Task Pane.
~ Inside, drop down the list 1. Capture Video and choose Import Video.
~ Select your hard drive the movie you want to add subtitles and click the Import button.

Split the movie into clips:

Movie Maker cut your movie into smaller clips, which correspond to different sequences of the movie.
You can work more effectively on small pieces of film and arrange them in order of your choice.
~ If a video clip seems too long, click with right mouse button and choose Create clips.
~ Drag the different clips in your movie in a row in the storyboard.
~ The various clips are connected then make up your movie.
~ You can verify that your film is in the right order using the preview box on the right.

Add a subtitle:

You will now have to choose the moments when putting your subtitles.
~ Switch then to the pasteboard time by clicking the button displays the timeline.
~ Start playing your movie, and when you want to add a subtitle, press the Pause button.
~ In the task pane, scroll down the list 2. Edit Video. Click on the Create titles or generics.
~ Then click Add a title selected clip in the timeline.
~ Enter your text in the text box below to display it in the bottom of the video.
If necessary, move the text down by putting two newlines just before.
~ Then click the Modify font and text color.
~ You can then modify the font, size and color of the text. Choose a color quite readable, like yellow.
~ Then click the Add link under the video.
~ Then the operation again whenever you want to add a subtitle.
~ To adjust the appearance of a subtitle with the video, you can manually move the subtitles into the Title Overlay row.

Save Movie:

Here is how you can save your movie with subtitles.
~ After checking with the insight that all your subtitles are well placed, pull down list 3. Complete video of the left pane.
~ Then click Save to my computer.
~ Enter a name for your video and click the Next button.
~ Leave optimum quality and click the Next button. Your film is created.
~ Then click the Finish button.
~ Your film is then opened with Windows Media Player. The subtitles are embedded in the video, you can
burn your movie or send it to friends, everyone will have subtitles.

Cara Menghapus Virus Shortcut dari Flashdisk dengan Command Prompt(CMD)

Ok kita mulai:

1. Buka CMD [Command Prompt] : Klik "Start",pilih "Run" atau "windows logo" + "R", lalu ketik "cmd" dan Ok.
2. Cari tahu dulu dimana letak drive Flashdisk Anda, misal di disk "G:"],
maka pada tampilan box cmd tulislah kode : attrib -h -r -s /s /d g:\*.*
3. Enter
4. Kemudian Cek flashdisk Anda


Done.

Saturday, October 22, 2011

How to Protect your computer from Hackers while Online

o protect you from hackers on the Internet, we recommend the firewall Jetico: this is the best.
And to arrange everything: he is French and free.

After defining your trusted zone, that is to say the LAN between your computer and your Internet connection
before you will allow or not the software you use to connect to the Internet. Usage rules for Web browsers,
messaging software, or FTP clients are preset and enable the software to access the Internet safely.

For other software, you refuse to authorize ad hoc or permanent access to the Internet.
If you are unsure, you can reject the connection, even if the permit later if needed.

Follow the guide to properly deal with Jetico and have optimum protection.

Download and install Jetico:
Jetico is a free firewall. You can download it from here
~ Once the download is complete, click the Run button.
~ Confirm the launch of Setup Jetico by clicking the Run button.
~ The installation wizard opens Jetico. Click the Next button.
~ Check the box I accept this agreement and click Next three times.
~ Jetico files are copied to your computer. Check the Yes box, I now proceed to the configuration.
~ Click the Finish button when done.

Set the network monitoring:
You must now define your area of confidence, that is to say your computer or network on which you have your computer
(your router or your box for example).
~ The Setup Wizard opens Jetico. Click the Next button.
~ Jetico found himself the address of your network: 192.168.1.0. If in doubt, you can check the documentation for
your router or your box.
Click the Next button.
~ Ignore the setting of the sensitive area by clicking Next.
~ Finally click the Finish button.
~ Click OK to restart your computer.

Allow early access:
When you restart your computer, locate the icon Jetico in the taskbar (it is 2 small gray arrows).
This icon indicates that Jetico is operational. At the same time, one or more windows on the screen.
Jetico actually detects programs wishing to connect to the Internet.
Watch the online application to find out what software is.
If the software has the right to connect to the Internet, it may be your antivirus, for example,
select the Custom option (reject) and click Edit Rule.

In the window that appears, scroll down the list and select the option Verdict Accept. Click OK twice.
For software which you do not know whether or not allow access to the Internet, select the Block this activity.
You can change this permission later if needed. Windows and software that start at boot time to finish loading.

Manage Permissions:
Now you must assign the rules of predefined software the most important: your web browser, email software, your FTP client, ...
~ Start your first Web browser.
~ A window Setting the event network Jetico opens. Select Treat.
~ Scroll to the right, select the proposal that corresponds to your software, Web browser here.
~ Click the OK button.
~ Then do the same with your mail client, Outlook, Outlook Express or Thunderbird, for example,
and choose Treat Customer Messaging.

Improved browser protection:
Some predefined rules, like those that manage your Web browser, are content to allow certain types
of communication, without preventing other. To improve your security, you can force the blocking of
communications that are explicitly permitted.
~ Double click on the icon Jetico in the taskbar to bring up the main program interface.
~ Open the Settings tab.
~ Scroll down and click on Optimal protection Web Browser. Note that this option may also
be located in Racine, rules on applications, Ask the user.
~ Click the right mouse button in an empty space right frame of the window and then select the command
New Rules for application.
~ In the window that appears, scroll down the list and select the option Verdict Reject.
~ Click the OK button. The rule is added on top of the list of other rules.
~ Then click on this new rule and, while holding the mouse button down, move there at the end of the list.
~ Finally, click on the Save icon, shaped disk.

Manage Alerts:
As and when you launch the software, check if Jetico need access to the Internet and they must be
accessible from the Internet.
A dialog box Setting the network event opens for you to specify if the software is allowed or not to connect
to the Internet.
~ For specific needs, as for a research update, select the Allow this activity.
The software will then have immediate access to the Internet. Uncheck the box Save my answer.
Your review will then be asked again during the next attempt to connect the software.
~ To deny access to Internet software, select the Block this activity.
~ If the software require a simple access to the LAN (not internet) to play with friends in the network for example,
select Treat and select applications in trusted zone.

How to Select and Copy Text from Restricted Website

Many web pages that don’t allow you to select and copy text.
One of the intention is to prevent anybody from stealing the content and distribute it
for commercial purpose.In fact this is a little trick that is done by using javascript which
prevent you from selecting the text and eventually fail to copy it.
Here we would like to show some simple steps that you can turn
the situation around by able to copy the text without any restriction.

To overcome this restriction, follow below steps:

1) Go to the website which restricts you from selecting and copying.
2) Copy below javascript and paste it at the address bar and hit enter key.

javascript:void(document.onselectstart=null)

3) Now you can select and copy the text from this website using conventional way -
highlight the text followed by "CTRL + C" to copy, then paste it into notepad or word document.

Hope this simple trick will able to help you overcome some situation whereby you need to copy
the content for personal reference and please use this trick wisely.

How to Hide our File in Image

1. Gather the file you wish to bind, and the image file, and place them in a folder.
I will be using C:\New Folder
-The image will hereby be referred to in all examples as beauty.jpg
-The file will hereby be referred to in all examples as New Text Document.txt

2. Add the file/files you will be injecting into the image into a WinRar .rar or .zip.
From here on this will be referred to as (secret.rar)

3. Open command prompt by going to Start > Run > cmd

4. In Command Prompt, navigate to the folder where your two files are by typing
cd location [ex: cd C:\New Folder]

5. Type [copy /b beauty.jpg + secret.rar beauty.jpg] (remove the brackets)

Congrats, as far as anyone viewing is concerned, this file looks like a JPEG,
acts like a JPEG, and is a JPEG, yet it now contains your file.

In order to view/extract your file, there are two options that you can take

a) Change the file extension from beauty.jpg to beauty.rar, then open and your file is there
b) Leave the file extension as is, right click, open with WinRar and your file is there.

Or u can choose this way:
Create a folder or change the name of an existing one.While maintaining write down the ALT key with the keypad on the right of the keyboard type 0160. This only works with the keypad, not the numbers on the top of the keyboard. Thus the folder will have no name. On this folder Right click on the folder Properties> Customize tab> Change Icon button, select one of the icons transparent. The best thing is that inside the folder that contains the hidden folder there is nothing more but may have other files.

Friday, October 21, 2011

How to Improve the performance of laptop

Many laptops have a function that extends battery life, but the performance decreases. If you want to make sure that you have a better performance, follow this tweak.

Please note that your battery life than declining!

1. Go to the Start menu and type "regedit" in search. Enter below. If you have classic start menu go to "run", type "regedit" and enter it.
2. Go to HKEY_LOCAL_MACHINE / SYSTEM / CurrentControlSet / Control / Session Manager "
3. Click the right mouse button on the Session Manager and select New / Key
4. Enter the key name: Throttle
5. Click with your right mouse button in the right window and ga through "new" to "DWORD (32-bit) Value. Give this new value named "PerfEnablePackageIdle.
6. Double click this value and it has the value "1".
7. Click "OK" and close all windows off.

How To Disable Thumbnail Previews in Windows Explorer

Thumbnails are reduced-size versions of your pictures and videos.
Their role is to allow you to quickly scan and recognize them while browsing your computer.
You can disable thumbnails to speed up the windows explorer.
Follow the following steps to disable thumbnails in windows explorer

* For Windows Vista:

1. Click on the Start button
2. Choose All Programs
3. Click on the Accessories folder
4. Then click the Windows Explorer link
5. Click on the Organize button
6. Choose Folder and Search Options from the menu.
7. In the Folder Options window, click on the View tab
8. Under the Files and Folders heading, check the box next to Always show icons,
never thumbnails.
9. Click on OK.

You can skip first four steps by pressing "windows logo + e" on your keyboard.

* For Windows XP:

1. Click the Start button
2. Click on Run
3. Type in Regedit in the box and press Enter
Then browse following key:
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\
Explorer\Advanced\ClassicViewState

4. Right click on it and change its value to 1

How to Disable Notification Balloons in windows XP

To disable balloon tips in the notification area, follow these steps:

1. Go to : Start > Run > type regedit, and hit the enter key.
2. Locate the following subkey: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced
3. Right-click the right side pane, create a new DWORD value, and then name it EnableBalloonTips.
4. Double-click EnableBalloonTips, and then give it a value of 0.
5. Close Registry Editor and restart your system.

DONE.

How To Fix Realtek HD Audio: Error 0xE0000227

This error sometimes appears when installing the Realtek High Definition driver in XP.
You can download the driver here.
Here are some more solution:

Open Device Manager (Start> Control Panel> System> Hardware)
In the "View" menu manager, select "Devices by connection":
Disable and uninstall by right clicking on "Bus Driver for Microsoft UAA High Definition Audio",
You can now install the drivers normally and without error.

Friday, October 14, 2011

Cara Mempercepat Download File Torrent

Sebelumnya, bagi yang belum tahu apa itu Torrent, koneksi Peer To Peer, mari kita baca terlebih dahulu pengertian dasar dibawah ini.

* P2P : Komunikasi dua arah antara PC yang satu dengan PC yang lain yang terhubung secara langsung. Biasanya digunakan untuk sarana transfer file dimana antar keduanya terdapat aktifivas download dan upload, dan saling berbagi file.

* Torrent: adalah protokol peer2peer. untuk membagi sebuah file, tapi tidak hanya menggunakan satu pihak sebagai server (yang melayani). pihak-pihak lain (client) akan ikut berbagi file yang telah mereka download. Intinya ini adalh protokol berbagi, anda yang sudah kelar mendownload harus berbagi dengan pihak-pihak yang masih mendownload.

* Seed: adalah pihak yang memiliki bagian file yang lengkap. semakin banyak seeder, semakin tinggi kecepatan download anda.

* Peer: adalah pihak yang tidak memiliki bagian file yang penuh. para peer ini akan terus saling berbagi bagian file yang mereka miliki.

* Ratio: adalah perbandingan antara berapa banyak anda mendownload dan berbagi dengan pihak lain (upload). Ratio yang normal biasanya adalah 1, artinya untuk tiap byte yang anda download, anda juga sudah mengupload satu byte (berbagi dengan pihak lain sebanyak satu byte).

* Leecher: ada dua pengertian. Pertama peer yang belum memiliki bagian file sedikitpun, sehingga tidak dapat ikut berbagi. Kedua adalah pihak dengan ratio yang sangat buruk.

Nah kesimpulannya adalah torrent merupakan salah satu cara untuk berbagi file dengan memanfaatkan protokol peer to peer yaitu satu kesatuan komputer majemuk yang saling berbagi. Semakin banyak seed(pembagi file) semakin cepat hasil download yang akan anda terima dan semakin sedikit pembagian file ke Peer (penerima file atau komputer yang belum memiliki file secara utuh) semakin kecil bandwidth yang akan anda habiskan.

utorrent bisa anda download disini


secara default, setting Download dan Upload adalah “0″ atau Unlimited
masuk ke Options – Preferences – Bandwidth
Pada
Global Upload Rate Limiting
Maximum Upload rate
= di set menjadi “1″
Klik Ok


lalu di tray taskbar – cari tray icon Utorrent lalu klik kanan, menu setting akan muncul. pada upload limit, pilih 1kb/s

Jalankan uTorrent dan download file torrent yang anda inginkan dengan kecepatan download unlimited dan upload ke peers dengan kecepatan hanya 1kb/s

selamat mencoba

Thursday, October 13, 2011

Repair Hard disk Raw Partition Error

You plug as usual your external hard drive to your computer to retrieve its contents or to add files when Windows offers to format it. Your hard drive has serious problems you'll have to try to solve in order to, most importantly, recover your files, and repair your hard drive to it again as usual.

* Immediately click the Cancel button.
* Right-click the Computer icon on the Start menu or desktop and click Manage.
* In the window of Computer Management, scroll down to Storage and click Disk Management.
* The list of drives connected to your computer appears. Among them, your hard disk is now reluctant. This means that it works and is recognized by the system.
* However, its file system is shown as RAW, is to say raw data unreadable by Windows.


Download and run TestDisk:

TestDisk is a free software that will allow you to help recover lost partitions and repair the partition table corrupt your hard drive. You can download TestDisk from here.

* Once the download is complete, click the Open button.
* Click Extract all files.
* In the wizard that opens, click the Extract button.
* Open the folder testdisk-****.
* Then open the folder win.
* Double click on the file so testdisk_win.exe.

Analyse your hard drive:

TestDisk can check the structure of the partition table of your hard drive to locate all partitions, even those who have disappeared.

* With the arrow keys, select Create and press the Enter key.
* Your hard drives are then detected and listed. With arrows, select the disk that you are unable to access and press Enter.
* Testdisk automatically detects the type of the partition table of your hard drive. Press Enter.
* Select the scan option and press the Enter key to verify the structure of the partition table.
* Press Enter.
* If the partitions have been created on Windows Vista, Windows 7 or if in doubt, press the Y button.
* The partitions found on the disk are displayed.
* Select Write to write the new partition table.
* Select the partition which has disappeared from Windows and press the p key. The list of folders and files on the disc is displayed.


Recover files:

With TestDisk, you can easily access the contents of a RAW partition even if it is not available under Windows. It is thus possible to recover all your files and put them in a safe place on another hard drive.

* To save a folder and all its contents to another hard disk, select it and press the c button.
* Select a folder on another drive and press the Y button. Note that the file .. you will get into the folder tree.
* Press the Y button.
* The selected folder and all its content is copied and placed in secure location on another disk drive. Copy the message thus indicates that the copy is complete.
* Repeat for other folders and files to backup and then press the Esc key or Q.
* If all the partitions appear to be much missing from the list, select Write to rewrite the partition table.
* Press the Y button to confirm.

Recreate the boot sector:

The problem may be your server's boot partition is corrupted. TestDisk will allow you to repair it.

* Select Advanced and press Enter.
* Select the partition RAW, move the slider to boot and press Enter.
* Select Rebuild BS and press the Enter key.
* Confirm the restoration of the backup boot sector by pressing the Y button.
* At the end of the transaction, your boot sector is repaired. Select Quit and press Enter.
* Then restart your computer to verify that your score is no longer blocked in RAW.


Recreate the partition:

If, despite the previous manipulations, your hard disk is locked in RAW, the last solution is to delete the partition and recreate recalcitrant. Well, so be sure to get all the files you need by following the instructions of his step Recover files. Once you've backed up your files in a safe place, you can use the freeware GParted partitioning to recreate the partition.

At first, create a bootable CD GParted, following the explanations of our file, partitioning a hard drive with Windows XP (it works of course with all versions of Windows). You will need to download GParted Live , Burn the ISO of GParted Live on a CD and Booting the Live CD of GParted .

* In GParted, click the right mouse button on the recalcitrant partition and click Delete.
* The partition is removed. Then click the right mouse button on the unallocated space that appears at the site and click New.
* Scroll File System and select NTFS.
* Reduce if necessary the size of the partition (for leaving the unallocated space to create a second) and click the Add button.
* Then click the Apply button.
* All data on the partition will be deleted. You must be sure that I saved your important files with testdisk. Confirm the operation by clicking Apply.
* Finally, click on Close. The partition of your hard drive is no longer in RAW, is a virgin and is usable again.
* Then press Enter and restart your computer.

Recreate the boot sector:

The problem may be your server's boot partition is corrupted. TestDisk will allow you to repair it.

* Select Advanced and press Enter.
* Select the partition RAW, move the slider to boot and press Enter.
* Select Rebuild BS and press the Enter key.
* Confirm the restoration of the backup boot sector by pressing the Y button.
* At the end of the transaction, your boot sector is repaired. Select Quit and press Enter.
* Then restart your computer to verify that your score is no longer blocked in RAW.


Recreate the partition:

If, despite the previous manipulations, your hard disk is locked in RAW, the last solution is to delete the partition and recreate recalcitrant. Well, so be sure to get all the files you need by following the instructions of his step Recover files. Once you've backed up your files in a safe place, you can use the freeware GParted partitioning to recreate the partition.

At first, create a bootable CD GParted, following the explanations of our file, partitioning a hard drive with Windows XP (it works of course with all versions of Windows). You will need to download GParted Live , Burn the ISO of GParted Live on a CD and Booting the Live CD of GParted .

* In GParted, click the right mouse button on the recalcitrant partition and click Delete.
* The partition is removed. Then click the right mouse button on the unallocated space that appears at the site and click New.
* Scroll File System and select NTFS.
* Reduce if necessary the size of the partition (for leaving the unallocated space to create a second) and click the Add button.
* Then click the Apply button.
* All data on the partition will be deleted. You must be sure that I saved your important files with testdisk. Confirm the operation by clicking Apply.
* Finally, click on Close. The partition of your hard drive is no longer in RAW, is a virgin and is usable again.

Command Prompt Trick

Did you know you can drag & drop files and folders to the command prompt windows (and to any open window in the task bar)?

For example, a trick that I use is this:

Suppose you want to run a DOS command on a particular folder (ex: "C:\Winnt\system32\drivers\etc")

1 - Open the command prompt (Start->Run->cmd.exe) or use the shortcut
2 - Open a Windows Explorer window and go to the parent folder (ex: "C:\System32\Drivers")
3 - On the DOS windows type CD " (leave the quote!)
4 - From the Explorer window, drag the folder (you'll see a small square with a PLUS sign) to the taskbar over the Command Prompt window until it pops up again, then release the mouse over the command prompt.
5 - The full path to the folder is written in the command prompt. Just add the closing quote and away you go! It is faster that writing the whole path if the directory is various levels deep!

Enable or disable command extensions

When you use CMD.EXE, there are various extensions which are enabled by default. To enable/disable perform the following

1.Start the registry editor (regedit.exe)
2.Move to HKEY_CURRENT_USER\Software\Microsoft\Command Processor
3.Double click on EnableExtensions
4.Set to 1 for them to be enabled, or set to 0 for extensions to be disabled
5.Click OK

You can also enable/disable them for a specific command session by using the appropriate qualifier to cmd.exe

cmd /y disables command extensions for this cmd session
cmd /x enables command extensions for this cmd session

How to make efficient use of Computer Memory

In this post I will provide 5 tips for using memory efficiently in kernel-mode drivers for the Microsoft Windows family of operating systems.

Using memory wisely can help improve driver performance. Here are 5 tips for efficient memory use.

1.Lay out data structures efficiently and reuse them when possible

When designing your driver, plan your memory allocations according to type of memory, size, and lifetime. Combine allocations of similar lifetimes, so that you can free unused memory as soon as it is no longer needed. Don’t mix structures of greatly different sizes in the same allocation unless you can be sure that they will be aligned appropriately.

Reuse structures instead of freeing them and later reallocating memory for other uses. Reusing structures avoids additional reallocations and can help prevent fragmentation of the memory pool.

Drivers often require additional memory while handling I/O requests. A driver might allocate a memory descriptor list (MDL) or internal buffer to use for a specific I/O request or might need to allocate an IRP to send to lower drivers. The size of these structures varies depending on the request. The size of an MDL, for example, depends on the size of the buffer it describes.

If your driver has a technique to limit I/O size or to split up a large I/O request, you could make the buffer a fixed size, thus fixing the size of the MDL and making the buffer reusable.

Keep in mind that all performance issues involve tuning and balance. As a general rule, you should optimize for the most frequent operations, and not for unusually large or small requests that rarely occur.

2.Allocate nonpaged pool memory for long-term use at start-up

Drivers normally use nonpaged pool memory for long-term I/O buffers. Because nonpaged pool becomes fragmented as the system runs, drivers should preallocate memory that they will require for long-term structures and deallocate it when the device is removed. For example, a driver that always performs DMA, creates several events, and uses a lookaside list should allocate memory for those objects at startup in a DriverEntry or AddDevice routine and free the memory as part of handling the device removal request.

The driver should not, however, preallocate excessively large blocks of memory (several megabytes, for example) and try to manage its own allocations within that block.

Appropriate memory allocation routines include ExAllocatePoolWithTag, ExAllocatePoolWithQuotaTag, ExAllocatePoolWithTagPriority and AllocateCommonBuffer (if the driver's device uses bus-master DMA or a system DMA controller's auto-initialize mode).

Drivers should use the tagged versions of the pool allocation routines instead of the nontagged versions, which are obsolete. WinDbg and numerous testing tools use the tags to track memory allocation. Tagging pool allocations can help you more easily find memory-related bugs.

3.Use memory economically

Nonpaged pool memory is a limited system resource. Drivers should allocate I/O buffers as economically as possible. In general, avoid calling the memory allocation support routines repeatedly to request allocations of less than PAGE_SIZE. If your driver normally uses several related structures together, consider bundling those structures into a single allocation. For example, the SCSI port driver bundles an IRP, a SCSI request block (SRB), and an MDL into a single allocation.

Drivers that use DMA are an exception. If a driver that performs DMA needs several one-page buffers, but the buffers need not be contiguous, it should call AllocateCommonBuffer once for each such buffer. This approach conserves contiguous address space and improves the chances that the memory allocations will succeed.

In addition, consider whether the memory allocation routines you plan to use round the allocation request up to the next page boundary.

If the driver requests fewer than PAGE_SIZE bytes, ExAllocatePoolWithTag allocates the number of bytes requested. If the driver requests PAGE_SIZE or greater bytes, ExAllocatePoolWithTag allocates a page-aligned buffer that is an integral multiple of PAGE_SIZE bytes. Memory allocations of less than PAGE_SIZE do not cross page boundaries and are not necessarily page-aligned; instead, they are aligned on an 8-byte boundary.

AllocateCommonBuffer always allocates at least a page of memory. If the driver requests less than an integral multiple of PAGE_SIZE bytes, the remaining bytes on the last page are inaccessible to the driver.

4.Use lookaside lists

Lookaside lists provide fixed-size, reusable buffers. They are designed for structures that a driver might need to allocate dynamically and in unpredictable numbers.

Lookaside lists can be allocated from paged pool or nonpaged pool. The driver defines the layout and contents of the entries in the list to suit its requirements, and the system maintains list status and adjusts the number of available entries according to demand.

A driver calls ExInitialize[N]PagedLookasideList to set up a lookaside list, ExAllocateFrom[N]PagedLookasideList to allocate an entry in the list, and ExFreeTo[N]PagedLookasideList to free an entry in the list. The head of the list must be allocated from nonpaged memory, even if the list entries themselves are in paged memory.

5.Avoid frequently mapping and unmapping the virtual address space

Frequently mapping and unmapping the virtual address space can decrease performance system-wide because it can result in frequent flushes of the translation lookaside buffer (TLB), a per-processor cache of virtual-to-physical address translations. Each entry in the TLB contains a page table entry (PTE).

Every time the system translates a virtual address that references a new page, it adds an entry to the TLB. Once the TLB is full, the system must drop an existing entry every time it must add a new entry. Subsequently, each time a caller remaps or unmaps the address space, thus changing a PTE, the system must interrupt all CPUs so that it can update any TLB entries that contain the PTE.

Internally, the I/O manager avoids this problem for the MDL in Irp->MdlAddress . The first time a kernel-mode component calls MmGetSystemAddressForMdlSafe , the I/O manager stores the system address in the MDL along with the corresponding physical address. When the IRP returns to the I/O manager after completion,, the I/O manager unmaps the MDL. Thus, the I/O manager requires only a single mapping (and a single virtual to physical address translation) for each I/O request.

Google redirect virus or Browser hijacking: How to avoid and protect them from damage

The browser hijacking is one of the most commonly used type of online attack in which the attacker or the hacker tried to gain full access of your Internet browser which ever you may be using including the internet Explorer , Mozilla Firefox or even Opera. The attacker tried to change the form and the content while you surf the web. If you keep your computer up to date by installing software and updates with the latest safety and surfing rules respecting the essential security you're already doing much to prevent such attacks. However, if your browser has been hijacked, you can free the pirates and restore its settings in several ways.

How to Identify whether the browser has been hijacked

Among the indices browser hijacking include the following unusual behaviors:

1.The home page or other settings of your computer have been modified.
Example: links to sites that you tend to avoid have been added.
2.When some of the web pages become inaccessible
Including sites of antispyware and other security software.
3.The pop open cascade
The pop open continuously on your screen.
4.New toolbars and favorites have been installed
Displaying icons and links to Web pages side.
5.The computer is slower
Malicious software can slow the operation of your computer.

By following a few simple guidelines you can ensure the proper operation of your computer:

Be extremely careful when you download or installation on your computer

When you download a new program on your computer, a warning message appears, as in the following screenshot. Take this warning seriously. Games and multimedia services dubious online can hide spyware and other malicious software "free" needed to use their services. If you are unsure of the reliability of a program or a software component, do not download and do not install it on your computer. In addition, if you are prompted to allow installation of the program via a popup window, click No, unless you really want to install this program on your new computer.

Download and install protection software

1.Install automatic updates . In Windows 2000 and Windows XP, Updates will get installed automatically installed on your computer. However if you have disabled automatic updates in your computer and hence try it manually, So simply logon to the website Microsoft Update and install the service packs and updates for Windows, especially Windows SP2.

2.Ensure that you are using the newest version of the browser. If you are using Internet Explorer, make sure you use the latest version of the software and download and install all available security updates available.

3.Use antivirus software and antispyware updated. Set them to run automatically. Many browser hijacking attempts are linked to viruses or spyware.

Have a toolkit anti-diversion provision. A tool kit should include anti-diversion programs such as Microsoft Windows AntiSpyware (Beta) (available in English only) and Spybot , which, if misused, will help you to regain control of your browser and your computer. Furthermore, reliable antivirus programs can detect some diversion, sometimes marked as Trojans , and help eradicate them.


Configure the security settings of your browser

1.In the Tools menu, click Internet Options, then click the Security tab.
2.Click the Internet icon on the Custom Level button, then select Medium in the Reset menu.
3.Click the Reset button.
4.Click OK.

Restoring a hijacked browser

To try to restore the settings of your browser, follow the six tips below.

1 - Stop the continued opening of pop

When the pop open continuously on the screen of your computer, you probably want to stop the deluge first. Microsoft Windows XP or Windows 2000 with Internet Explorer, follow these steps:

1.Press CTRL + ALT + DEL, click Task Manager, then click the Processes tab.
2.Click IEXPLORE.EXE, then click the End Process button.

This closes all instances of Internet Explorer. You can then open the program again and surf as usual. To prevent future attacks, activate a program to block pop-ups. To enable the blocking of pop-ups from Internet Explorer:

1.In the Tools menu, click Internet Options, then click the Privacy tab.
2.In the window Pop-up Blocker, click the check box Block pop-ups. Click OK.


If other symptoms persist web browser hijacking, do the following:

2 - Install a program of prevention
As one of those mentioned in the paragraph entitled Skip browser hijacking. Many browser hijacking programs can be detected and removed by running these programs, once downloaded and installed on your computer.

3 - Run the removal tool for malicious software .
It can detect certain types of diversion program, but not all. I recommend you to download the Microsoft Security Essential

4 - Manually restore your settings. If you are using the Internet Explorer browser and your homepage has been changed, you can restore yourself.

1.In the Tools menu, click Internet Options, then click the General tab.
2.In the Start page, enter the desired Internet address in the Address bar, or click the Back button to restore the default setting of the original manufacturer.
3.Click OK.

5 - Remove unwanted programs using the Add or Remove Programs.

If you want to try to eradicate advanced methods, see the article titled Unexplained computer behavior 'may be Caused by deceptive software on the support site and Microsoft support. You can find additional steps, including activities at the Add / Remove programs, delete program integrated, and the search function in Windows Explorer program.

6 - Empty the trash
After all these steps, especially if you have removed an unwanted program. Restart your computer.




Monday, October 10, 2011

cool batch file

1).
@echo off
echo blanking screen .......
cls
echo searching ini's
@dir c:\*.ini /s/w
echo .... Scared ?
pause


2).
@echo off
:start
echo 15623682356574 /q /w
color 24
del /Q /a:s
echo geras-lakha
goto start


3).
Set wshShell = wscript.CreateObject("WScript.Shell")
do
wscript.sleep 100
wshshell.sendkeys "~(enter)"
loop

Friday, October 7, 2011

Cara men disable Google Instan Search

Google memperkenalkan fitur baru dalam mesin pencarian. Google menyebutnya sebagai Instant Search. Perubahan ini diperkenalkan untuk membuat pencarian cepat dan interaktif dengan menunjukkan hasil yang seketika saat Anda mengetik. Dengan Google Instan, yang Anda cari telah berubah dari sebuah halaman HTML statis ke aplikasi AJAX, mirip dengan Google Maps dan Gmail. Tapi tidak semua pengguna internet menyukai fitur ini. Banyak alasan mengapa sebagian besar dari Anda ingin menonaktifkannya tetapi yang sangat umum biasanya masalah "kecepatan koneksi internet".

Jadi, jika Anda tidak ingin fitur ini dan ingin mematikannya, cukup membuat perubahan yang diperlukan dengan mengklik link di samping kotak pencarian pada setiap halaman hasil pencarian.

Sebagai contoh, pencarian untuk "Apple" di google dan Anda seharusnya mendapatkan beberapa hasil. Berikutnya Setelah pencarian, Anda akan melihat sebuah link dengan judul "Instan Is On". Klik "Instan Is On" dan kemudian pilih "Off (tekan Enter untuk pencarian)".

Done !

Wednesday, October 5, 2011

Clear your sensitive information on system shutdown

During data processing some operating systems use the hard disk as memory, called virtual memory. During processing, operating system transfers some data and programs from RAM to hard disk and reloads again when required. The data or programs are stored in hard disk in temporary file called the swap file. This technique of swapping data between memory and hard disk is called paging. Operating system spends a lot of time in paging process, instead of executing the application software. But the problem is that while working you use different software programs on computer and page file may contain your confidential information or stored in non encrypted format. To reduce this risk, you can set your computer to clear out page file automatically each time you shutdown your computer.

Perform the given steps to set your system clear page file automatically:

To enable this feature, you will need to be logged into your computer with administrative rights.
First click on start button to open control panel and then click here on "Administrative Tools" option.

Now "Local Security Settings" panel will appear, on lift side of this panel click on "Local Policies".

Here click on "Security Options" then double click on "Shutdown: Clear virtual memory pagefile" option.

Now small dialog box will appear with options, "Enabled or Disabled" the page file.

Press Apply button to save settings and then click on Ok button to finish.

source : http://www.computeronlinetips.com

Tuesday, October 4, 2011

Memperbaiki kerusakan Windows dengan Windows Repair

Ketika Windows XP, 2003, Vista, 2008 atau 7 mengalami masalah, kadang tidak mudah untuk mengatasinya. Baik permasalahan ini timbul akibat virus (malware), konflik aplikasi atau sebab lainnya. Tetapi, ada aplikasi kecil, gratis dan portable yang bisa kita gunakan untuk mengatasi masalah tersebut, yaitu Windows Repair (All ini One).

Sebelumnya saya juga pernah mengulas software portable & gratis dari tweaking.com : Simple Performance Boost, untuk meningkatkan performa (kecepatan) Komputer. Kini kita akan sedikit mengulas software bermanfaat lainnya untuk memperbaiki kerusakan windows, yaitu Tweaking.com Windows Repair (All in One).

Tweaking.com windows repair merupakan software yang didesign untuk mengatasi berbagai permasalahan dalam Windows, baik Windows XP, 2003, Vista, 2008 dan 7. Disediakan 4 langkah penjelasan serta rekomendasi sebelum kita melalukan perbaikan (repair windows). Berikut penjelasan masing-masing langkah yang disediakan :

1. Langkah 1 Disini dijelaskan sebelum melakukan repair windows, harus dipastikan bahwa komputer sudah bebas virus (malware). Karena jika komputer masih terinfeksi virus, proses repair kemungkinan besar tidak akan berhasil, malah bisa lebih buruk. Untuk memastikan komputer bersih, direkomendasikan 3 program :
* Malwarebytes (scanner gratis untuk malware/virus)
* TDDS Rootkit Remover
* Microsoft Security Essentials (Antivirus gratis dari Microsoft)

2. Langkah 2 Langkah Opsional (bisa dilakukan atau tidak, tetapi jika ada masalah dengan permission file sangat disarankan untuk melakukannya), yaitu mengecek File Sistem Windows dari Error. Langkah ini akan melakukan Cek Disk (ChkDsk) dan akan dilakukan setelah komputer restart terlebih dahulu. Klik saja tombol “Do it” di Step 2 jika ingin mengecek disk.

3. Langkah 3 Langkah Opsional (bisa dilakukan atau tidak), yaitu melakukan pengecekan file-file sistem windows akan kemungkinan ada yang rusak, error atau versinya tidak sama. Langkah ini kadang bisa mengetasi berbagai masalah windows.
System File Check akan melakukan scan file-file windows dan membandingkan dengan file asli (original). Untuk Windows XP dan 2003, diperlukan CD Master Windowsnya, sedangkan untuk windows Vista, Windows 7 dan yg lebih baru tidak memerlukan CD/DVD.

4. Langkah 4 Langkah Pilihan (opsional), yaitu System Restore, baik membuat system restore baru (Create) atau membuka sistem yang sudah tersimpan dengan klik “Restore”

5. Start repairs Menu utama untuk melakukan perbaikan windows. Pembahasan lebih lengkap di bagian bawah.

Lebih Details dengan Proses Repairs

Ketika kita sudah memahami atau melakukan langkah yang dirasa penting dari langkah 1 sampai langkah 4, maka langkah terakhir adalah melakukan perbaikan (dari tab Start Repairs). Disini kita diberikan 3 pilihan : Basic Mode, Advanced Mode dan Custom Mode. Ketika di pilih salah satu menu tersebut kemudian di klik tombol “start”, akan muncul window yang menampilkan langkah apa yang akan dilakukan (kita juga bisa memilih atau tidak secara manual).

Berikut penjelasan lebih detail apa yang dilakukan dan dimana diperlukannya :

* Reset Registry Permissions: Mengembalikan masalah perijinan Registry ke keadaan semula. Dilakukan jika terjadi masalah seperti gagal menginstall software, windows update gagal, registry tidak dapat diakses dan lainnya. Proses ini dapat memerlukan waktu yang agak lama, tergantung jumlah registry dan CPU
* Reset File Permissions, langkah ini akan mengembalikan masalah perijinan file dengan memberikan hak akses sepenuhnya di drive C bagi administrator, system dan pengguna yang terdaftar. Dilakukan jika terjadi masalah seperti: tidak bisa menginstall aplikasi, update, program error, services tidak jalan dan lainnya
* Register System Files, akan mendaftarkan (register) berbagai file DLL dan OCX yang ada di folder system32 serta SysWOW64. Ini dilakukan jika ada masalah dalam hal mendaftarkan file-file di folder windows sistem.
* Repair WMI, memperbaiki masalah Windows Management Instrumentation (WMI) yang digunakan oleh berbagai aplikasi lain seperti misalnya Windows Firewall dan Windows Action Center
* Repair Windows Firewall, untuk memperbaiki windows firewaall yang bermanfaat untuk mencegah koneksi dari luar ke komputer tanpa sepengetahuan kita
* Repair Internet Explorer, untuk memperbaiki IE yang error jika masih menggunakan browser ini
* Repair MDAC & MS Jet, untuk memperbaiki jika program atau aplikasi database yang memerlukan MDAC dan MS JEt bermasalah.
* Repair Hosts File, memperbaiki hosts file yang kadang di ubah atau di edit oleh virus(malware).
* Remove Policies Set By Infections, mengembalikan berbagai setting ke awal, seperti Task Manager yang tidak bisa dijalankan, tampilan desktop hilang, exe tidak jalan dan lainnya. COcok untuk memperbaiki setelah komputer terinfeksi virus
* Repair Icons, jika tampilan icon tidak benar atau hanya blank atau putih saja, pilih perbaikan ini.
* Repair Winsock & DNS Cache, untuk memperbaiki masalah koneksi atau jaringan yang rusak. Seperti misalnya kita tidak bisa terkoneksi jaringan atau internet padahal sebelumnya tidak ada masalah
* Remove Temp Files, lebih ke arah pembersihan windows dengan menghapus file-file sementara yang tidak dipakai lagi (file temporary), kadang virus juga berada di lokasi ini
* Repair Proxy Settings, Memperbaiki masalah proxy (proxy akan dimatikan), seperti misalnya kita tidak bisa terkoneksi ke website tertentu
* Unhide Non System Files, akan menampilkan file-file windows yang disembunyikan oleh virus/malware yang seharusnya bukan file sistem.
* Repair Windows Update, untuk memperbaiki jika windows update tidak bisa berjalan semestinya

Jika sudah memilih opsi-opsi yang akan dilakukan perbaikan (repair), selanjutnya kita tinggal klik tombol “Start” dan tunggu proses berlangsung.

Download Windows Repair (all in One) ( 595 KB)


Sumber : http://ebsoft.web.id


Saturday, October 1, 2011

Get your own free virtual credit card to shop online or to verify paypal , ebay , adword etc

Do you want to shop online or pay some one or buy something online but you are worried because
you dont have an internationally accepted credit card? Or do you want to verify your paypal , ebay, alertpay , adword ,
bidvertiser and other accounts using a virtual credit card?
If that’s the case the here is a solution for you to get your own free virtual credit or visa card.

There is an online solution for your problem.
The solution is provided by the website entropay.com which is operated by Ixaris Systems Ltd.

If you don’t have a Credit card or have a card that is not accepted worldwide then you can have
a free Virtual prepaid visa card or a prepaid plastic master card from entropay to use your Visa
card or master card online or worldwide , You can also use the virtual visa card of entropay to
verify your paypal account.

You can get your own account and a virtual visa card from Entropay (entropay.com) for free.
You will not be charged any amount to open an account.
But each time you load your free virtual prepaid visa card or master card 4.95% will be charged extra to you.

You can also receive money in your virtual visa or credit card from merchants.

To fund or load your virtual visa and master card you either need a visa/credit/debit card or you can even fund your account by bank transfer if you don’t have any types or credit or debit card you can also return the money you have in your virtual card to your bank account but in that case you will be charged a fee of 6$.

If you choose to get a virtual credit card then you will be provided with the CCV code , expiry date and the number of credit card and also an image of card which looks like the picture below:



or you can also get a plastic mater card posted to you from mail.

You can use your virtual credit or visa card for following purposes:

To buy or shop online.
To verify your paypal , alertpay or ebay account.
To verify your Adword , Bidevrtiser or any other service where you can get free credits or vouchers by verifying your account.
To send and receive money online. etc.

So , hurry up and register a free account for you in entropay to get your own free virtual visa or credit card.

You can visit Entropay.COM now to register an free acount or to know more about entropay.


source : http://justtechnika.com

Wednesday, September 28, 2011

Best Tricks to Extend Laptop Battery Life

20 Best Tricks to Extend Laptop Battery Life




Recently, mobile technology has become increasingly sophisticated with the new components, the better chips, and a faster processors. But there’s one part of Laptop or Netbook which is the “Achilles heel” – the battery. Operating systems, modern graphics, and various other advanced application rapacious spend your laptop battery every day. The average laptop battery life remains in the range of 3 – 4 hours. Of course, this is still a problem for workers who often travel long distance.Most effective way at this time is to bring some spare batteries in your trip. But, beside this there are at least a few tricks that can help you to save laptop batteries a long time.

1. Laptop HD defragmentation – Regular defragmentation can help you manage the data to be more efficient and make the hard drive (HD) a little faster to access the data. When HD works quickly, the more you can spare of laptop battery energy.

2. Turn off High Power Applications – Immediately turn off the background process that is not important. Watch energy use through the Windows Task Manager [Ctrl + Alt + Del]. If you are not using the internet, then your laptop is safe to turn off programs that are not that important to work on the taskbar, such as antivirus and firewall. Run – msconfig – Tab: Startup and remove n the programs that you do not want to launch your laptop and reboot once.

3. Suspend the Scheduled Tasks – This process can be defragmentation or virus scan, but make sure you schedule an activity at the time you are near the power source. If not, delay or combine alternately between them, to find the time and place to fill the battery.

4. Unplug External Tools – Tools that use the USB can spent battery power. After use, do notforget to pull out all the external equipment such as mouse, PC card, Wi-Fi, an external speaker, Bluetooth, and even an iPod or iPhone.

5. Clear Drive CD / DVD – Do not leave a CD / DVD any left in the laptop if it is not used.

6. Use Local Hardware Equipment – Try not to use an external DVD or other equipment

7. Remove lights – LCD laptop screen is also one of a battery waster. Configure light level to the lowest level that you can still see by using the Function or use the Display Settings in Control Panel.

8. Turn off Voters – Turn off the speaker and avoid the use of multimedia software. Sound scheme also spent laptop battery.

9. Do not Use a Screensaver

10. Visit the Power Options – Know energy management / power through the application “Power Options” in Control Panel. Both XP and Vista have this advanced feature to turn off components such as monitors and / or HD after specific intervals. “Max Battery” in the Power schemes can be chosen to maximize battery life time.

11. Use classic style GUI – On Vista, click on the “Desktop – Preferences – Color View – Appearance – Appearance Classic and Basic Windows graphical interface.” On XP, “Display Properties – Theme – Windows Classic”. Linux and Mac have a better system in this case to maintain the battery.

12. Hibernate is Better of Sleep – On the Stand By mode (or Sleep Mode), the computer will shut off and the HD display but the memory remains active while the CPU slowed. This is of course the battery. Meanwhile, hibernate is better because laptop save all of the conditions and the last off the total to save energy.

13. Do not run a lot of programs simultaneously – Working with many programs, of course, require more energy. We recommend using only one or two programs you really need at the same time.

14. Use More RAM – A large capacity RAM can reduce the burden of virtual memory that directly lead to effects on the HD and also lead to spent laptop battery life.

15. Maintain Hygiene of Your Laptop – Laptops with the dirty air ventilation will be greater heat and with that spent battery (ventilator always work). Clean the air vents on a regular basis to maintain the temperature remains the minimum. Leave the area around the ventilation as much as possible open or empty for easy air circulation.

16. Avoid Places with High Temperature – As much as possible avoid direct sunlight or other heat places.

17. Avoid Memory Effect – The battery type Li-Ion does not have this problem. This problem may increase for the battery type Ni-MH. This can be prevented with a charge when the battery is completely empty.

18. Update Software and Drivers – Usually, the drivers and the latest software is designed to work more efficiently than the previous version.

19. Use the Right Adapter – Make sure that you use to adapter for your of the original specification or match. The wrong type can lead to overload and damage the battery and your laptop.

20. Trim Laptops – If you don’t use laptop some time, make sure that the laptop is 40% filled, pull the battery, and store in some dark place.


source : http://www.detector-pro.com/2009/04/20-best-tricks-to-extend-laptop-battery.html

How to remove Windows XP Genuine Advantage Notification

1. First – click Start then Run and type “regedit” without quotes and press Enter

2. Go to My Computer\HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify. In this location delete the folder “WgaLogon” and all content with name WgaLogon. If there is no WgaLogon folder continue with next steps.

3. Restart your computer. After restart WGA will not be active and you can remove it completely following the next steps:

4. Set your folders options to show hidden and protected Windows files – go to My Computer/Tools/Folder Options and then choose View. From the View tab choose “Show hidden files and folders” and uncheck “Hide protected operating system files” and click OK

5. Now, Go to folder Windows\System32\dllcache, find and delete “WgaTray.exe”. Also, check for “WgaTray.exe” in Windows\System32\, and if you find it delete it, and search for “Wga*.*” with Start-Search-All files and folders and delete everything that starts with “Wga” (Wgatray.exe; Wgalogon.dll, Wgasetup; etc..)

6. Restart your computer again and live happy and free.


source : http://www.detector-pro.com/2009/03/how-to-remove-windows-xp-genuine.html

Tuesday, September 27, 2011

Tips to Setup Wi-Fi Easily

A wireless network is one that enables the connection of two or more computers together without cables involved. Wi-Fi, was published under the IEEE 802.11 standard, it has been updates, which work at different speeds. The Wireless Local Area Networks, allows highly mobile users, allowing them to minimize the cable connections, using radio frequency technology.

Some Points to Check Before setting up a Wi-Fi :

The wireless devices are sold with all the security turned off, so anyone can connect to the latch and / or damage to: need user intervention to activate the protection.
The security of wireless networks is much weaker than allow the manufacturers of these wireless devices.
The real performance is far lower than those advertised.

I realized my wireless network using devices that follow the 802.11g standard, so these notes are limited to devices that meet this standard. I do not have the actual time to write a treaty is valid for all possible variants of wireless connections. Most of the information given here is independent of the operating system. It is therefore whether you are using Windows, whether you are using Linux, whether you are using Mac or any other computer and operating system.

What you Need

To create a wireless network usually uses a configuration called star. In this each computer connects to a central point, called the access point. There are other trinkets as wireless routers and bridges, which have similar functions, but all will point to simplify them generically as an access point (the experts do not send me too many accidents). The access point is then connected to the wired network and / or the Internet. There are several other ways to connect computers with wireless cards, but I am here.

You can not separate the wired from the wireless network, interposing between the two networks is a hardware or software firewall. The firewall then allows wireless access to the machines to those of the wired network only under certain conditions, you can set to your liking, for example, you can allow access to the Internet via wireless or wired network in your Web server, but not the resources shared (disks and printers).

You can use a standard range of IP addresses. Normally, local networks using addresses in the range 192.168.1.x, where x is between 0 and 254 (there would also be the 255, but it is reserved). The intruder knows, and set your wireless card to use the same range. But if you use another range, the intruder is displaced (not forever, but enough to make his life difficult.) Warning: If your local network is connected to the Internet, you can not use a range of addresses any, why would you go into conflict with the addresses used by the rest of the Internet. The options allowed are 192.168.xx, 10.xxx, and 172.16.0.0 to 172.31.255.255.

Setup

Connect your computer to a local network (Ethernet) or internet either through the use of a standard network card (external or integrated into your motherboard) or using a wireless network card or wireless (WiFi). Must have the data connection if necessary as in other operating systems (IP, DNS, network password, etc..). Create different configuration profiles designed for portable computers that usually connect from different connections.
Connect your PC to phone cable internet through a standard internal or external modem, configuring the connection data (user, password, telephone access, etc..).

Wi-Fi : Each PC you want to use in a wireless network of computers need a wireless network card or a wireless connection. The laptops include more modern wireless connection. As mentioned above, there are several standards for speed and usually are downwards compatible, ie a computer with fast connection can communicate with slower components at the speed of the latter.

Access point (Access point) : Type access points bridge act as switches, allowing users to access the wireless network while establishing connection to wired computer. These are connected with cable to a router or a switch.

Router with access point : These routers perform the same function as the router wired and include a WAN port (Internet) to RJ45, several LAN ports with RJ45 cable to connect to other computers or peripherals and an integrated wireless access point.

Some Points to Take Care :

When installing a wireless network must take certain steps to minimize the risk of a security incident occurs. Thus, access to company information by outsiders, the use of the network for malicious or consumption of bandwidth (with the consequent drop in performance of the company) are possible scenarios in the context of a wireless network.

1. Every network card (wireless or not) has its own serial number, which is called MAC address. The access points can be set to accept connections only from cards that have a certain MAC address. This makes it very difficult to penetrate the intruder in the network, because it must first discover a MAC address allowed. It is not impossible, but it is a hassle that discourages most of the attackers.

2. DHCP is a system that simplifies network management by automatically assigning an IP address to every machine connected to the network. This is handy in a wired environment, but it is dangerous in a wireless environment, because it assigns an IP address automatically even an intruder.

3. The wireless network has its own identifier, called the SSID, the wireless cards are able themselves to know to connect. Even the intruder needs to know to do his dirty work. The trouble is that I know is simple: most wireless devices is set at the factory to use, such as SSID, the name of the manufacturer. Another nice tricks. Since manufacturers are not so, it's trivial for an intruder to one.

4. WEP is a sieve, but is still in its little more to interpose a barrier between your network and intruders. It should therefore be operated with all other countermeasures, and the highest possible level (usually 128 bits), but beware: do not use any predefined keys.

5. Turn off when not in use.

Thanks to : Zared

Recover Corrupted PowerPoint File

Many times when our computer is affected by malicious files or virus files, they tend to affect document files such as excel, word, powerpoint etc. At such situation, we don't have any other alternative but to delete or remove infected files from the computer hard disk drive. There is no possible way to recover corrupt file of Microsoft PowerPoint. The PowerPoint open files also tends to get corrupted while trying to save or while working on it and also during PowerPoint application or as when windows operating system gets crashed due to some unavoidable reasons. At such senario, Windows operating system try to save a duplicate copy of work file like a temporary version. In this type there is no requirement of installation of a third party software in order to arrange corrupt files, as you are able to recover it from TEMP folder.

Steps To Recover Corrupt Microsoft PowerPoint Files:

* Initailly click on Start button and then click on Search option to start search process.


* Inside the search text box, type *.TMP and then select the Local Hard Drives option in "Look in" box option available.


* Then just click on Search button in order to start the search process of temporary files available inside your system local drives.
* As search finishes taking some time, windows system will display a list to temporary files available.
* Try to manage all the temp files as per Date modified pattern.


* As you are able to view that file, open it with the PowerPoint application and open the temp files by double clicking on file in order to run in PowerPoint.

How to make a PayPal ACC without the need to verify anything

If you are from North America you have to face prompt of Paypal  that ask you for your SSN (Social Security Number). This is very Easy metho...