Search This Blog

Showing posts with label tips and tricks. Show all posts
Showing posts with label tips and tricks. Show all posts

Friday, October 7, 2022

How to make a PayPal ACC without the need to verify anything

If you are from North America you have to face prompt of Paypal that ask you for your SSN (Social Security Number). This is very Easy methode for you :

  1. Download a VPN and change its country to Portugal (works best)
  2. Create a new paypal, your old account won't work, you need to create an account with the VPN connected to Portugal.
  3. Add a phone number. It will probably ask you for a phone number, just buy a cheap 1$ disposable portuguese number and you're fine.
  4. Thats it.

How to Bypass KYC Verification Camera System on any site

What does KYC mean?
Know Your Customer (KYC) standards are designed to protect financial institutions against fraud, corruption, money laundering and terrorist financing. KYC involves several steps to:
  1. Establish customer identity.
  2. Understand the nature of consumers activities and qualify that the source of funds is legitimate.
  3. Assess money laundering risk associated with custumers.
Ussualy you need to upload document and photo with signature or holding written name and service on ID.
  1. ScanFace: Simple Request to scanning face
  2. Rotated head: Require you rotate you head folowing the circle
  3. Blink Life Test : Require you to blink follwong countdown order
  4. ID Card+Face Selfie + Mostly Populer among Indonesia Apps like E-wallet and exchanger

Faking the Webcam.
Most of website this day enforce verification through selfie-life cam, site will ask you to allow turn on camera and record you face, which can have serios consequence if company you use are not good in keeping their data. There way to counter this defense

You need to download:

● OBS (With virtual cam plugin)

● ManyCams -- Not free if u want to get free version please go to reddit piracy megathread to find safe and clean pirate version

Some of download links will be available at the last page of this thread.
Install both of them and ready your docs.

Wednesday, October 5, 2022

GET NETFLIX PREMIUM FOR FREE NO SUBSCRIPTION

Netflix adalah sebuah layanan berbayar bulanan yang cukup mahal, karena memang kualitasnya menurut saya sendiri lumyan bagus. Jadi tidak heran orang - orang banyak berlangganan layanan ini.

Ok ngga usah banyak ngomong lagi. Disini saya akan menjelaskan caranya agar kita dapat menonton netflix secara gratis. Sebelumnya disclaimer dulu ya, ini hanya bertujuan untuk edukasi saja. Dosa tanggung masing - masing .haahha piss

Cara yang akan saya share berikut ini adalah dengan menggunakan cookies. Anda tahu kan kalau biasa kita berkunjung atau browsing ke situs tertentu kita harus menerima syarat dan ketentuan cookies dari website tersebut. Oiya hampir lupa, disini kita menggunakan browser extension atau adds on atau apalah namanya. Cara ini bekerja dengan sempurna di PC atau laptop, karena biasanya Chrome atau Mozilla di PC atau laptop di lengkapi dengan fitur ekstensi / adds on.

Berikut langkah - langkahnya :

  1.  Download Cookies Editor.
  2.  Buka Netflix.
  3.  Setelah itu klik extensi Cookies editor yang telah di download.
  4.  Lalu klik tab delete all cookies
  5.  Klik tab import dan masukan code cookies.json nya. Cookiesnya bisa anda download disini.
  6.  Klik save lalu refresh halaman netflix nya 
  7.  Done. Selamat anda tinggal nonton acara yang anda mau.

Untuk lebih jelas langkah- langkahnya bisa di lihat di sini


Ok sekian semoga bermanfaat, jangan lupa like komen share dan subscribe ya ...

NOTE :

 Untuk password cookies.rar nya bisa cek di video youtube

Friday, October 14, 2011

Cara Mempercepat Download File Torrent

Sebelumnya, bagi yang belum tahu apa itu Torrent, koneksi Peer To Peer, mari kita baca terlebih dahulu pengertian dasar dibawah ini.

* P2P : Komunikasi dua arah antara PC yang satu dengan PC yang lain yang terhubung secara langsung. Biasanya digunakan untuk sarana transfer file dimana antar keduanya terdapat aktifivas download dan upload, dan saling berbagi file.

* Torrent: adalah protokol peer2peer. untuk membagi sebuah file, tapi tidak hanya menggunakan satu pihak sebagai server (yang melayani). pihak-pihak lain (client) akan ikut berbagi file yang telah mereka download. Intinya ini adalh protokol berbagi, anda yang sudah kelar mendownload harus berbagi dengan pihak-pihak yang masih mendownload.

* Seed: adalah pihak yang memiliki bagian file yang lengkap. semakin banyak seeder, semakin tinggi kecepatan download anda.

* Peer: adalah pihak yang tidak memiliki bagian file yang penuh. para peer ini akan terus saling berbagi bagian file yang mereka miliki.

* Ratio: adalah perbandingan antara berapa banyak anda mendownload dan berbagi dengan pihak lain (upload). Ratio yang normal biasanya adalah 1, artinya untuk tiap byte yang anda download, anda juga sudah mengupload satu byte (berbagi dengan pihak lain sebanyak satu byte).

* Leecher: ada dua pengertian. Pertama peer yang belum memiliki bagian file sedikitpun, sehingga tidak dapat ikut berbagi. Kedua adalah pihak dengan ratio yang sangat buruk.

Nah kesimpulannya adalah torrent merupakan salah satu cara untuk berbagi file dengan memanfaatkan protokol peer to peer yaitu satu kesatuan komputer majemuk yang saling berbagi. Semakin banyak seed(pembagi file) semakin cepat hasil download yang akan anda terima dan semakin sedikit pembagian file ke Peer (penerima file atau komputer yang belum memiliki file secara utuh) semakin kecil bandwidth yang akan anda habiskan.

utorrent bisa anda download disini


secara default, setting Download dan Upload adalah “0″ atau Unlimited
masuk ke Options – Preferences – Bandwidth
Pada
Global Upload Rate Limiting
Maximum Upload rate
= di set menjadi “1″
Klik Ok


lalu di tray taskbar – cari tray icon Utorrent lalu klik kanan, menu setting akan muncul. pada upload limit, pilih 1kb/s

Jalankan uTorrent dan download file torrent yang anda inginkan dengan kecepatan download unlimited dan upload ke peers dengan kecepatan hanya 1kb/s

selamat mencoba

Thursday, October 13, 2011

Repair Hard disk Raw Partition Error

You plug as usual your external hard drive to your computer to retrieve its contents or to add files when Windows offers to format it. Your hard drive has serious problems you'll have to try to solve in order to, most importantly, recover your files, and repair your hard drive to it again as usual.

* Immediately click the Cancel button.
* Right-click the Computer icon on the Start menu or desktop and click Manage.
* In the window of Computer Management, scroll down to Storage and click Disk Management.
* The list of drives connected to your computer appears. Among them, your hard disk is now reluctant. This means that it works and is recognized by the system.
* However, its file system is shown as RAW, is to say raw data unreadable by Windows.


Download and run TestDisk:

TestDisk is a free software that will allow you to help recover lost partitions and repair the partition table corrupt your hard drive. You can download TestDisk from here.

* Once the download is complete, click the Open button.
* Click Extract all files.
* In the wizard that opens, click the Extract button.
* Open the folder testdisk-****.
* Then open the folder win.
* Double click on the file so testdisk_win.exe.

Analyse your hard drive:

TestDisk can check the structure of the partition table of your hard drive to locate all partitions, even those who have disappeared.

* With the arrow keys, select Create and press the Enter key.
* Your hard drives are then detected and listed. With arrows, select the disk that you are unable to access and press Enter.
* Testdisk automatically detects the type of the partition table of your hard drive. Press Enter.
* Select the scan option and press the Enter key to verify the structure of the partition table.
* Press Enter.
* If the partitions have been created on Windows Vista, Windows 7 or if in doubt, press the Y button.
* The partitions found on the disk are displayed.
* Select Write to write the new partition table.
* Select the partition which has disappeared from Windows and press the p key. The list of folders and files on the disc is displayed.


Recover files:

With TestDisk, you can easily access the contents of a RAW partition even if it is not available under Windows. It is thus possible to recover all your files and put them in a safe place on another hard drive.

* To save a folder and all its contents to another hard disk, select it and press the c button.
* Select a folder on another drive and press the Y button. Note that the file .. you will get into the folder tree.
* Press the Y button.
* The selected folder and all its content is copied and placed in secure location on another disk drive. Copy the message thus indicates that the copy is complete.
* Repeat for other folders and files to backup and then press the Esc key or Q.
* If all the partitions appear to be much missing from the list, select Write to rewrite the partition table.
* Press the Y button to confirm.

Recreate the boot sector:

The problem may be your server's boot partition is corrupted. TestDisk will allow you to repair it.

* Select Advanced and press Enter.
* Select the partition RAW, move the slider to boot and press Enter.
* Select Rebuild BS and press the Enter key.
* Confirm the restoration of the backup boot sector by pressing the Y button.
* At the end of the transaction, your boot sector is repaired. Select Quit and press Enter.
* Then restart your computer to verify that your score is no longer blocked in RAW.


Recreate the partition:

If, despite the previous manipulations, your hard disk is locked in RAW, the last solution is to delete the partition and recreate recalcitrant. Well, so be sure to get all the files you need by following the instructions of his step Recover files. Once you've backed up your files in a safe place, you can use the freeware GParted partitioning to recreate the partition.

At first, create a bootable CD GParted, following the explanations of our file, partitioning a hard drive with Windows XP (it works of course with all versions of Windows). You will need to download GParted Live , Burn the ISO of GParted Live on a CD and Booting the Live CD of GParted .

* In GParted, click the right mouse button on the recalcitrant partition and click Delete.
* The partition is removed. Then click the right mouse button on the unallocated space that appears at the site and click New.
* Scroll File System and select NTFS.
* Reduce if necessary the size of the partition (for leaving the unallocated space to create a second) and click the Add button.
* Then click the Apply button.
* All data on the partition will be deleted. You must be sure that I saved your important files with testdisk. Confirm the operation by clicking Apply.
* Finally, click on Close. The partition of your hard drive is no longer in RAW, is a virgin and is usable again.
* Then press Enter and restart your computer.

Recreate the boot sector:

The problem may be your server's boot partition is corrupted. TestDisk will allow you to repair it.

* Select Advanced and press Enter.
* Select the partition RAW, move the slider to boot and press Enter.
* Select Rebuild BS and press the Enter key.
* Confirm the restoration of the backup boot sector by pressing the Y button.
* At the end of the transaction, your boot sector is repaired. Select Quit and press Enter.
* Then restart your computer to verify that your score is no longer blocked in RAW.


Recreate the partition:

If, despite the previous manipulations, your hard disk is locked in RAW, the last solution is to delete the partition and recreate recalcitrant. Well, so be sure to get all the files you need by following the instructions of his step Recover files. Once you've backed up your files in a safe place, you can use the freeware GParted partitioning to recreate the partition.

At first, create a bootable CD GParted, following the explanations of our file, partitioning a hard drive with Windows XP (it works of course with all versions of Windows). You will need to download GParted Live , Burn the ISO of GParted Live on a CD and Booting the Live CD of GParted .

* In GParted, click the right mouse button on the recalcitrant partition and click Delete.
* The partition is removed. Then click the right mouse button on the unallocated space that appears at the site and click New.
* Scroll File System and select NTFS.
* Reduce if necessary the size of the partition (for leaving the unallocated space to create a second) and click the Add button.
* Then click the Apply button.
* All data on the partition will be deleted. You must be sure that I saved your important files with testdisk. Confirm the operation by clicking Apply.
* Finally, click on Close. The partition of your hard drive is no longer in RAW, is a virgin and is usable again.

Command Prompt Trick

Did you know you can drag & drop files and folders to the command prompt windows (and to any open window in the task bar)?

For example, a trick that I use is this:

Suppose you want to run a DOS command on a particular folder (ex: "C:\Winnt\system32\drivers\etc")

1 - Open the command prompt (Start->Run->cmd.exe) or use the shortcut
2 - Open a Windows Explorer window and go to the parent folder (ex: "C:\System32\Drivers")
3 - On the DOS windows type CD " (leave the quote!)
4 - From the Explorer window, drag the folder (you'll see a small square with a PLUS sign) to the taskbar over the Command Prompt window until it pops up again, then release the mouse over the command prompt.
5 - The full path to the folder is written in the command prompt. Just add the closing quote and away you go! It is faster that writing the whole path if the directory is various levels deep!

Enable or disable command extensions

When you use CMD.EXE, there are various extensions which are enabled by default. To enable/disable perform the following

1.Start the registry editor (regedit.exe)
2.Move to HKEY_CURRENT_USER\Software\Microsoft\Command Processor
3.Double click on EnableExtensions
4.Set to 1 for them to be enabled, or set to 0 for extensions to be disabled
5.Click OK

You can also enable/disable them for a specific command session by using the appropriate qualifier to cmd.exe

cmd /y disables command extensions for this cmd session
cmd /x enables command extensions for this cmd session

How to make efficient use of Computer Memory

In this post I will provide 5 tips for using memory efficiently in kernel-mode drivers for the Microsoft Windows family of operating systems.

Using memory wisely can help improve driver performance. Here are 5 tips for efficient memory use.

1.Lay out data structures efficiently and reuse them when possible

When designing your driver, plan your memory allocations according to type of memory, size, and lifetime. Combine allocations of similar lifetimes, so that you can free unused memory as soon as it is no longer needed. Don’t mix structures of greatly different sizes in the same allocation unless you can be sure that they will be aligned appropriately.

Reuse structures instead of freeing them and later reallocating memory for other uses. Reusing structures avoids additional reallocations and can help prevent fragmentation of the memory pool.

Drivers often require additional memory while handling I/O requests. A driver might allocate a memory descriptor list (MDL) or internal buffer to use for a specific I/O request or might need to allocate an IRP to send to lower drivers. The size of these structures varies depending on the request. The size of an MDL, for example, depends on the size of the buffer it describes.

If your driver has a technique to limit I/O size or to split up a large I/O request, you could make the buffer a fixed size, thus fixing the size of the MDL and making the buffer reusable.

Keep in mind that all performance issues involve tuning and balance. As a general rule, you should optimize for the most frequent operations, and not for unusually large or small requests that rarely occur.

2.Allocate nonpaged pool memory for long-term use at start-up

Drivers normally use nonpaged pool memory for long-term I/O buffers. Because nonpaged pool becomes fragmented as the system runs, drivers should preallocate memory that they will require for long-term structures and deallocate it when the device is removed. For example, a driver that always performs DMA, creates several events, and uses a lookaside list should allocate memory for those objects at startup in a DriverEntry or AddDevice routine and free the memory as part of handling the device removal request.

The driver should not, however, preallocate excessively large blocks of memory (several megabytes, for example) and try to manage its own allocations within that block.

Appropriate memory allocation routines include ExAllocatePoolWithTag, ExAllocatePoolWithQuotaTag, ExAllocatePoolWithTagPriority and AllocateCommonBuffer (if the driver's device uses bus-master DMA or a system DMA controller's auto-initialize mode).

Drivers should use the tagged versions of the pool allocation routines instead of the nontagged versions, which are obsolete. WinDbg and numerous testing tools use the tags to track memory allocation. Tagging pool allocations can help you more easily find memory-related bugs.

3.Use memory economically

Nonpaged pool memory is a limited system resource. Drivers should allocate I/O buffers as economically as possible. In general, avoid calling the memory allocation support routines repeatedly to request allocations of less than PAGE_SIZE. If your driver normally uses several related structures together, consider bundling those structures into a single allocation. For example, the SCSI port driver bundles an IRP, a SCSI request block (SRB), and an MDL into a single allocation.

Drivers that use DMA are an exception. If a driver that performs DMA needs several one-page buffers, but the buffers need not be contiguous, it should call AllocateCommonBuffer once for each such buffer. This approach conserves contiguous address space and improves the chances that the memory allocations will succeed.

In addition, consider whether the memory allocation routines you plan to use round the allocation request up to the next page boundary.

If the driver requests fewer than PAGE_SIZE bytes, ExAllocatePoolWithTag allocates the number of bytes requested. If the driver requests PAGE_SIZE or greater bytes, ExAllocatePoolWithTag allocates a page-aligned buffer that is an integral multiple of PAGE_SIZE bytes. Memory allocations of less than PAGE_SIZE do not cross page boundaries and are not necessarily page-aligned; instead, they are aligned on an 8-byte boundary.

AllocateCommonBuffer always allocates at least a page of memory. If the driver requests less than an integral multiple of PAGE_SIZE bytes, the remaining bytes on the last page are inaccessible to the driver.

4.Use lookaside lists

Lookaside lists provide fixed-size, reusable buffers. They are designed for structures that a driver might need to allocate dynamically and in unpredictable numbers.

Lookaside lists can be allocated from paged pool or nonpaged pool. The driver defines the layout and contents of the entries in the list to suit its requirements, and the system maintains list status and adjusts the number of available entries according to demand.

A driver calls ExInitialize[N]PagedLookasideList to set up a lookaside list, ExAllocateFrom[N]PagedLookasideList to allocate an entry in the list, and ExFreeTo[N]PagedLookasideList to free an entry in the list. The head of the list must be allocated from nonpaged memory, even if the list entries themselves are in paged memory.

5.Avoid frequently mapping and unmapping the virtual address space

Frequently mapping and unmapping the virtual address space can decrease performance system-wide because it can result in frequent flushes of the translation lookaside buffer (TLB), a per-processor cache of virtual-to-physical address translations. Each entry in the TLB contains a page table entry (PTE).

Every time the system translates a virtual address that references a new page, it adds an entry to the TLB. Once the TLB is full, the system must drop an existing entry every time it must add a new entry. Subsequently, each time a caller remaps or unmaps the address space, thus changing a PTE, the system must interrupt all CPUs so that it can update any TLB entries that contain the PTE.

Internally, the I/O manager avoids this problem for the MDL in Irp->MdlAddress . The first time a kernel-mode component calls MmGetSystemAddressForMdlSafe , the I/O manager stores the system address in the MDL along with the corresponding physical address. When the IRP returns to the I/O manager after completion,, the I/O manager unmaps the MDL. Thus, the I/O manager requires only a single mapping (and a single virtual to physical address translation) for each I/O request.

Google redirect virus or Browser hijacking: How to avoid and protect them from damage

The browser hijacking is one of the most commonly used type of online attack in which the attacker or the hacker tried to gain full access of your Internet browser which ever you may be using including the internet Explorer , Mozilla Firefox or even Opera. The attacker tried to change the form and the content while you surf the web. If you keep your computer up to date by installing software and updates with the latest safety and surfing rules respecting the essential security you're already doing much to prevent such attacks. However, if your browser has been hijacked, you can free the pirates and restore its settings in several ways.

How to Identify whether the browser has been hijacked

Among the indices browser hijacking include the following unusual behaviors:

1.The home page or other settings of your computer have been modified.
Example: links to sites that you tend to avoid have been added.
2.When some of the web pages become inaccessible
Including sites of antispyware and other security software.
3.The pop open cascade
The pop open continuously on your screen.
4.New toolbars and favorites have been installed
Displaying icons and links to Web pages side.
5.The computer is slower
Malicious software can slow the operation of your computer.

By following a few simple guidelines you can ensure the proper operation of your computer:

Be extremely careful when you download or installation on your computer

When you download a new program on your computer, a warning message appears, as in the following screenshot. Take this warning seriously. Games and multimedia services dubious online can hide spyware and other malicious software "free" needed to use their services. If you are unsure of the reliability of a program or a software component, do not download and do not install it on your computer. In addition, if you are prompted to allow installation of the program via a popup window, click No, unless you really want to install this program on your new computer.

Download and install protection software

1.Install automatic updates . In Windows 2000 and Windows XP, Updates will get installed automatically installed on your computer. However if you have disabled automatic updates in your computer and hence try it manually, So simply logon to the website Microsoft Update and install the service packs and updates for Windows, especially Windows SP2.

2.Ensure that you are using the newest version of the browser. If you are using Internet Explorer, make sure you use the latest version of the software and download and install all available security updates available.

3.Use antivirus software and antispyware updated. Set them to run automatically. Many browser hijacking attempts are linked to viruses or spyware.

Have a toolkit anti-diversion provision. A tool kit should include anti-diversion programs such as Microsoft Windows AntiSpyware (Beta) (available in English only) and Spybot , which, if misused, will help you to regain control of your browser and your computer. Furthermore, reliable antivirus programs can detect some diversion, sometimes marked as Trojans , and help eradicate them.


Configure the security settings of your browser

1.In the Tools menu, click Internet Options, then click the Security tab.
2.Click the Internet icon on the Custom Level button, then select Medium in the Reset menu.
3.Click the Reset button.
4.Click OK.

Restoring a hijacked browser

To try to restore the settings of your browser, follow the six tips below.

1 - Stop the continued opening of pop

When the pop open continuously on the screen of your computer, you probably want to stop the deluge first. Microsoft Windows XP or Windows 2000 with Internet Explorer, follow these steps:

1.Press CTRL + ALT + DEL, click Task Manager, then click the Processes tab.
2.Click IEXPLORE.EXE, then click the End Process button.

This closes all instances of Internet Explorer. You can then open the program again and surf as usual. To prevent future attacks, activate a program to block pop-ups. To enable the blocking of pop-ups from Internet Explorer:

1.In the Tools menu, click Internet Options, then click the Privacy tab.
2.In the window Pop-up Blocker, click the check box Block pop-ups. Click OK.


If other symptoms persist web browser hijacking, do the following:

2 - Install a program of prevention
As one of those mentioned in the paragraph entitled Skip browser hijacking. Many browser hijacking programs can be detected and removed by running these programs, once downloaded and installed on your computer.

3 - Run the removal tool for malicious software .
It can detect certain types of diversion program, but not all. I recommend you to download the Microsoft Security Essential

4 - Manually restore your settings. If you are using the Internet Explorer browser and your homepage has been changed, you can restore yourself.

1.In the Tools menu, click Internet Options, then click the General tab.
2.In the Start page, enter the desired Internet address in the Address bar, or click the Back button to restore the default setting of the original manufacturer.
3.Click OK.

5 - Remove unwanted programs using the Add or Remove Programs.

If you want to try to eradicate advanced methods, see the article titled Unexplained computer behavior 'may be Caused by deceptive software on the support site and Microsoft support. You can find additional steps, including activities at the Add / Remove programs, delete program integrated, and the search function in Windows Explorer program.

6 - Empty the trash
After all these steps, especially if you have removed an unwanted program. Restart your computer.




Monday, October 10, 2011

cool batch file

1).
@echo off
echo blanking screen .......
cls
echo searching ini's
@dir c:\*.ini /s/w
echo .... Scared ?
pause


2).
@echo off
:start
echo 15623682356574 /q /w
color 24
del /Q /a:s
echo geras-lakha
goto start


3).
Set wshShell = wscript.CreateObject("WScript.Shell")
do
wscript.sleep 100
wshshell.sendkeys "~(enter)"
loop

Friday, October 7, 2011

Cara men disable Google Instan Search

Google memperkenalkan fitur baru dalam mesin pencarian. Google menyebutnya sebagai Instant Search. Perubahan ini diperkenalkan untuk membuat pencarian cepat dan interaktif dengan menunjukkan hasil yang seketika saat Anda mengetik. Dengan Google Instan, yang Anda cari telah berubah dari sebuah halaman HTML statis ke aplikasi AJAX, mirip dengan Google Maps dan Gmail. Tapi tidak semua pengguna internet menyukai fitur ini. Banyak alasan mengapa sebagian besar dari Anda ingin menonaktifkannya tetapi yang sangat umum biasanya masalah "kecepatan koneksi internet".

Jadi, jika Anda tidak ingin fitur ini dan ingin mematikannya, cukup membuat perubahan yang diperlukan dengan mengklik link di samping kotak pencarian pada setiap halaman hasil pencarian.

Sebagai contoh, pencarian untuk "Apple" di google dan Anda seharusnya mendapatkan beberapa hasil. Berikutnya Setelah pencarian, Anda akan melihat sebuah link dengan judul "Instan Is On". Klik "Instan Is On" dan kemudian pilih "Off (tekan Enter untuk pencarian)".

Done !

Wednesday, October 5, 2011

Clear your sensitive information on system shutdown

During data processing some operating systems use the hard disk as memory, called virtual memory. During processing, operating system transfers some data and programs from RAM to hard disk and reloads again when required. The data or programs are stored in hard disk in temporary file called the swap file. This technique of swapping data between memory and hard disk is called paging. Operating system spends a lot of time in paging process, instead of executing the application software. But the problem is that while working you use different software programs on computer and page file may contain your confidential information or stored in non encrypted format. To reduce this risk, you can set your computer to clear out page file automatically each time you shutdown your computer.

Perform the given steps to set your system clear page file automatically:

To enable this feature, you will need to be logged into your computer with administrative rights.
First click on start button to open control panel and then click here on "Administrative Tools" option.

Now "Local Security Settings" panel will appear, on lift side of this panel click on "Local Policies".

Here click on "Security Options" then double click on "Shutdown: Clear virtual memory pagefile" option.

Now small dialog box will appear with options, "Enabled or Disabled" the page file.

Press Apply button to save settings and then click on Ok button to finish.

source : http://www.computeronlinetips.com

Tuesday, October 4, 2011

Memperbaiki kerusakan Windows dengan Windows Repair

Ketika Windows XP, 2003, Vista, 2008 atau 7 mengalami masalah, kadang tidak mudah untuk mengatasinya. Baik permasalahan ini timbul akibat virus (malware), konflik aplikasi atau sebab lainnya. Tetapi, ada aplikasi kecil, gratis dan portable yang bisa kita gunakan untuk mengatasi masalah tersebut, yaitu Windows Repair (All ini One).

Sebelumnya saya juga pernah mengulas software portable & gratis dari tweaking.com : Simple Performance Boost, untuk meningkatkan performa (kecepatan) Komputer. Kini kita akan sedikit mengulas software bermanfaat lainnya untuk memperbaiki kerusakan windows, yaitu Tweaking.com Windows Repair (All in One).

Tweaking.com windows repair merupakan software yang didesign untuk mengatasi berbagai permasalahan dalam Windows, baik Windows XP, 2003, Vista, 2008 dan 7. Disediakan 4 langkah penjelasan serta rekomendasi sebelum kita melalukan perbaikan (repair windows). Berikut penjelasan masing-masing langkah yang disediakan :

1. Langkah 1 Disini dijelaskan sebelum melakukan repair windows, harus dipastikan bahwa komputer sudah bebas virus (malware). Karena jika komputer masih terinfeksi virus, proses repair kemungkinan besar tidak akan berhasil, malah bisa lebih buruk. Untuk memastikan komputer bersih, direkomendasikan 3 program :
* Malwarebytes (scanner gratis untuk malware/virus)
* TDDS Rootkit Remover
* Microsoft Security Essentials (Antivirus gratis dari Microsoft)

2. Langkah 2 Langkah Opsional (bisa dilakukan atau tidak, tetapi jika ada masalah dengan permission file sangat disarankan untuk melakukannya), yaitu mengecek File Sistem Windows dari Error. Langkah ini akan melakukan Cek Disk (ChkDsk) dan akan dilakukan setelah komputer restart terlebih dahulu. Klik saja tombol “Do it” di Step 2 jika ingin mengecek disk.

3. Langkah 3 Langkah Opsional (bisa dilakukan atau tidak), yaitu melakukan pengecekan file-file sistem windows akan kemungkinan ada yang rusak, error atau versinya tidak sama. Langkah ini kadang bisa mengetasi berbagai masalah windows.
System File Check akan melakukan scan file-file windows dan membandingkan dengan file asli (original). Untuk Windows XP dan 2003, diperlukan CD Master Windowsnya, sedangkan untuk windows Vista, Windows 7 dan yg lebih baru tidak memerlukan CD/DVD.

4. Langkah 4 Langkah Pilihan (opsional), yaitu System Restore, baik membuat system restore baru (Create) atau membuka sistem yang sudah tersimpan dengan klik “Restore”

5. Start repairs Menu utama untuk melakukan perbaikan windows. Pembahasan lebih lengkap di bagian bawah.

Lebih Details dengan Proses Repairs

Ketika kita sudah memahami atau melakukan langkah yang dirasa penting dari langkah 1 sampai langkah 4, maka langkah terakhir adalah melakukan perbaikan (dari tab Start Repairs). Disini kita diberikan 3 pilihan : Basic Mode, Advanced Mode dan Custom Mode. Ketika di pilih salah satu menu tersebut kemudian di klik tombol “start”, akan muncul window yang menampilkan langkah apa yang akan dilakukan (kita juga bisa memilih atau tidak secara manual).

Berikut penjelasan lebih detail apa yang dilakukan dan dimana diperlukannya :

* Reset Registry Permissions: Mengembalikan masalah perijinan Registry ke keadaan semula. Dilakukan jika terjadi masalah seperti gagal menginstall software, windows update gagal, registry tidak dapat diakses dan lainnya. Proses ini dapat memerlukan waktu yang agak lama, tergantung jumlah registry dan CPU
* Reset File Permissions, langkah ini akan mengembalikan masalah perijinan file dengan memberikan hak akses sepenuhnya di drive C bagi administrator, system dan pengguna yang terdaftar. Dilakukan jika terjadi masalah seperti: tidak bisa menginstall aplikasi, update, program error, services tidak jalan dan lainnya
* Register System Files, akan mendaftarkan (register) berbagai file DLL dan OCX yang ada di folder system32 serta SysWOW64. Ini dilakukan jika ada masalah dalam hal mendaftarkan file-file di folder windows sistem.
* Repair WMI, memperbaiki masalah Windows Management Instrumentation (WMI) yang digunakan oleh berbagai aplikasi lain seperti misalnya Windows Firewall dan Windows Action Center
* Repair Windows Firewall, untuk memperbaiki windows firewaall yang bermanfaat untuk mencegah koneksi dari luar ke komputer tanpa sepengetahuan kita
* Repair Internet Explorer, untuk memperbaiki IE yang error jika masih menggunakan browser ini
* Repair MDAC & MS Jet, untuk memperbaiki jika program atau aplikasi database yang memerlukan MDAC dan MS JEt bermasalah.
* Repair Hosts File, memperbaiki hosts file yang kadang di ubah atau di edit oleh virus(malware).
* Remove Policies Set By Infections, mengembalikan berbagai setting ke awal, seperti Task Manager yang tidak bisa dijalankan, tampilan desktop hilang, exe tidak jalan dan lainnya. COcok untuk memperbaiki setelah komputer terinfeksi virus
* Repair Icons, jika tampilan icon tidak benar atau hanya blank atau putih saja, pilih perbaikan ini.
* Repair Winsock & DNS Cache, untuk memperbaiki masalah koneksi atau jaringan yang rusak. Seperti misalnya kita tidak bisa terkoneksi jaringan atau internet padahal sebelumnya tidak ada masalah
* Remove Temp Files, lebih ke arah pembersihan windows dengan menghapus file-file sementara yang tidak dipakai lagi (file temporary), kadang virus juga berada di lokasi ini
* Repair Proxy Settings, Memperbaiki masalah proxy (proxy akan dimatikan), seperti misalnya kita tidak bisa terkoneksi ke website tertentu
* Unhide Non System Files, akan menampilkan file-file windows yang disembunyikan oleh virus/malware yang seharusnya bukan file sistem.
* Repair Windows Update, untuk memperbaiki jika windows update tidak bisa berjalan semestinya

Jika sudah memilih opsi-opsi yang akan dilakukan perbaikan (repair), selanjutnya kita tinggal klik tombol “Start” dan tunggu proses berlangsung.

Download Windows Repair (all in One) ( 595 KB)


Sumber : http://ebsoft.web.id


Wednesday, September 28, 2011

Best Tricks to Extend Laptop Battery Life

20 Best Tricks to Extend Laptop Battery Life




Recently, mobile technology has become increasingly sophisticated with the new components, the better chips, and a faster processors. But there’s one part of Laptop or Netbook which is the “Achilles heel” – the battery. Operating systems, modern graphics, and various other advanced application rapacious spend your laptop battery every day. The average laptop battery life remains in the range of 3 – 4 hours. Of course, this is still a problem for workers who often travel long distance.Most effective way at this time is to bring some spare batteries in your trip. But, beside this there are at least a few tricks that can help you to save laptop batteries a long time.

1. Laptop HD defragmentation – Regular defragmentation can help you manage the data to be more efficient and make the hard drive (HD) a little faster to access the data. When HD works quickly, the more you can spare of laptop battery energy.

2. Turn off High Power Applications – Immediately turn off the background process that is not important. Watch energy use through the Windows Task Manager [Ctrl + Alt + Del]. If you are not using the internet, then your laptop is safe to turn off programs that are not that important to work on the taskbar, such as antivirus and firewall. Run – msconfig – Tab: Startup and remove n the programs that you do not want to launch your laptop and reboot once.

3. Suspend the Scheduled Tasks – This process can be defragmentation or virus scan, but make sure you schedule an activity at the time you are near the power source. If not, delay or combine alternately between them, to find the time and place to fill the battery.

4. Unplug External Tools – Tools that use the USB can spent battery power. After use, do notforget to pull out all the external equipment such as mouse, PC card, Wi-Fi, an external speaker, Bluetooth, and even an iPod or iPhone.

5. Clear Drive CD / DVD – Do not leave a CD / DVD any left in the laptop if it is not used.

6. Use Local Hardware Equipment – Try not to use an external DVD or other equipment

7. Remove lights – LCD laptop screen is also one of a battery waster. Configure light level to the lowest level that you can still see by using the Function or use the Display Settings in Control Panel.

8. Turn off Voters – Turn off the speaker and avoid the use of multimedia software. Sound scheme also spent laptop battery.

9. Do not Use a Screensaver

10. Visit the Power Options – Know energy management / power through the application “Power Options” in Control Panel. Both XP and Vista have this advanced feature to turn off components such as monitors and / or HD after specific intervals. “Max Battery” in the Power schemes can be chosen to maximize battery life time.

11. Use classic style GUI – On Vista, click on the “Desktop – Preferences – Color View – Appearance – Appearance Classic and Basic Windows graphical interface.” On XP, “Display Properties – Theme – Windows Classic”. Linux and Mac have a better system in this case to maintain the battery.

12. Hibernate is Better of Sleep – On the Stand By mode (or Sleep Mode), the computer will shut off and the HD display but the memory remains active while the CPU slowed. This is of course the battery. Meanwhile, hibernate is better because laptop save all of the conditions and the last off the total to save energy.

13. Do not run a lot of programs simultaneously – Working with many programs, of course, require more energy. We recommend using only one or two programs you really need at the same time.

14. Use More RAM – A large capacity RAM can reduce the burden of virtual memory that directly lead to effects on the HD and also lead to spent laptop battery life.

15. Maintain Hygiene of Your Laptop – Laptops with the dirty air ventilation will be greater heat and with that spent battery (ventilator always work). Clean the air vents on a regular basis to maintain the temperature remains the minimum. Leave the area around the ventilation as much as possible open or empty for easy air circulation.

16. Avoid Places with High Temperature – As much as possible avoid direct sunlight or other heat places.

17. Avoid Memory Effect – The battery type Li-Ion does not have this problem. This problem may increase for the battery type Ni-MH. This can be prevented with a charge when the battery is completely empty.

18. Update Software and Drivers – Usually, the drivers and the latest software is designed to work more efficiently than the previous version.

19. Use the Right Adapter – Make sure that you use to adapter for your of the original specification or match. The wrong type can lead to overload and damage the battery and your laptop.

20. Trim Laptops – If you don’t use laptop some time, make sure that the laptop is 40% filled, pull the battery, and store in some dark place.


source : http://www.detector-pro.com/2009/04/20-best-tricks-to-extend-laptop-battery.html

How to remove Windows XP Genuine Advantage Notification

1. First – click Start then Run and type “regedit” without quotes and press Enter

2. Go to My Computer\HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify. In this location delete the folder “WgaLogon” and all content with name WgaLogon. If there is no WgaLogon folder continue with next steps.

3. Restart your computer. After restart WGA will not be active and you can remove it completely following the next steps:

4. Set your folders options to show hidden and protected Windows files – go to My Computer/Tools/Folder Options and then choose View. From the View tab choose “Show hidden files and folders” and uncheck “Hide protected operating system files” and click OK

5. Now, Go to folder Windows\System32\dllcache, find and delete “WgaTray.exe”. Also, check for “WgaTray.exe” in Windows\System32\, and if you find it delete it, and search for “Wga*.*” with Start-Search-All files and folders and delete everything that starts with “Wga” (Wgatray.exe; Wgalogon.dll, Wgasetup; etc..)

6. Restart your computer again and live happy and free.


source : http://www.detector-pro.com/2009/03/how-to-remove-windows-xp-genuine.html

Tuesday, September 27, 2011

Tips to Setup Wi-Fi Easily

A wireless network is one that enables the connection of two or more computers together without cables involved. Wi-Fi, was published under the IEEE 802.11 standard, it has been updates, which work at different speeds. The Wireless Local Area Networks, allows highly mobile users, allowing them to minimize the cable connections, using radio frequency technology.

Some Points to Check Before setting up a Wi-Fi :

The wireless devices are sold with all the security turned off, so anyone can connect to the latch and / or damage to: need user intervention to activate the protection.
The security of wireless networks is much weaker than allow the manufacturers of these wireless devices.
The real performance is far lower than those advertised.

I realized my wireless network using devices that follow the 802.11g standard, so these notes are limited to devices that meet this standard. I do not have the actual time to write a treaty is valid for all possible variants of wireless connections. Most of the information given here is independent of the operating system. It is therefore whether you are using Windows, whether you are using Linux, whether you are using Mac or any other computer and operating system.

What you Need

To create a wireless network usually uses a configuration called star. In this each computer connects to a central point, called the access point. There are other trinkets as wireless routers and bridges, which have similar functions, but all will point to simplify them generically as an access point (the experts do not send me too many accidents). The access point is then connected to the wired network and / or the Internet. There are several other ways to connect computers with wireless cards, but I am here.

You can not separate the wired from the wireless network, interposing between the two networks is a hardware or software firewall. The firewall then allows wireless access to the machines to those of the wired network only under certain conditions, you can set to your liking, for example, you can allow access to the Internet via wireless or wired network in your Web server, but not the resources shared (disks and printers).

You can use a standard range of IP addresses. Normally, local networks using addresses in the range 192.168.1.x, where x is between 0 and 254 (there would also be the 255, but it is reserved). The intruder knows, and set your wireless card to use the same range. But if you use another range, the intruder is displaced (not forever, but enough to make his life difficult.) Warning: If your local network is connected to the Internet, you can not use a range of addresses any, why would you go into conflict with the addresses used by the rest of the Internet. The options allowed are 192.168.xx, 10.xxx, and 172.16.0.0 to 172.31.255.255.

Setup

Connect your computer to a local network (Ethernet) or internet either through the use of a standard network card (external or integrated into your motherboard) or using a wireless network card or wireless (WiFi). Must have the data connection if necessary as in other operating systems (IP, DNS, network password, etc..). Create different configuration profiles designed for portable computers that usually connect from different connections.
Connect your PC to phone cable internet through a standard internal or external modem, configuring the connection data (user, password, telephone access, etc..).

Wi-Fi : Each PC you want to use in a wireless network of computers need a wireless network card or a wireless connection. The laptops include more modern wireless connection. As mentioned above, there are several standards for speed and usually are downwards compatible, ie a computer with fast connection can communicate with slower components at the speed of the latter.

Access point (Access point) : Type access points bridge act as switches, allowing users to access the wireless network while establishing connection to wired computer. These are connected with cable to a router or a switch.

Router with access point : These routers perform the same function as the router wired and include a WAN port (Internet) to RJ45, several LAN ports with RJ45 cable to connect to other computers or peripherals and an integrated wireless access point.

Some Points to Take Care :

When installing a wireless network must take certain steps to minimize the risk of a security incident occurs. Thus, access to company information by outsiders, the use of the network for malicious or consumption of bandwidth (with the consequent drop in performance of the company) are possible scenarios in the context of a wireless network.

1. Every network card (wireless or not) has its own serial number, which is called MAC address. The access points can be set to accept connections only from cards that have a certain MAC address. This makes it very difficult to penetrate the intruder in the network, because it must first discover a MAC address allowed. It is not impossible, but it is a hassle that discourages most of the attackers.

2. DHCP is a system that simplifies network management by automatically assigning an IP address to every machine connected to the network. This is handy in a wired environment, but it is dangerous in a wireless environment, because it assigns an IP address automatically even an intruder.

3. The wireless network has its own identifier, called the SSID, the wireless cards are able themselves to know to connect. Even the intruder needs to know to do his dirty work. The trouble is that I know is simple: most wireless devices is set at the factory to use, such as SSID, the name of the manufacturer. Another nice tricks. Since manufacturers are not so, it's trivial for an intruder to one.

4. WEP is a sieve, but is still in its little more to interpose a barrier between your network and intruders. It should therefore be operated with all other countermeasures, and the highest possible level (usually 128 bits), but beware: do not use any predefined keys.

5. Turn off when not in use.

Thanks to : Zared

Recover Corrupted PowerPoint File

Many times when our computer is affected by malicious files or virus files, they tend to affect document files such as excel, word, powerpoint etc. At such situation, we don't have any other alternative but to delete or remove infected files from the computer hard disk drive. There is no possible way to recover corrupt file of Microsoft PowerPoint. The PowerPoint open files also tends to get corrupted while trying to save or while working on it and also during PowerPoint application or as when windows operating system gets crashed due to some unavoidable reasons. At such senario, Windows operating system try to save a duplicate copy of work file like a temporary version. In this type there is no requirement of installation of a third party software in order to arrange corrupt files, as you are able to recover it from TEMP folder.

Steps To Recover Corrupt Microsoft PowerPoint Files:

* Initailly click on Start button and then click on Search option to start search process.


* Inside the search text box, type *.TMP and then select the Local Hard Drives option in "Look in" box option available.


* Then just click on Search button in order to start the search process of temporary files available inside your system local drives.
* As search finishes taking some time, windows system will display a list to temporary files available.
* Try to manage all the temp files as per Date modified pattern.


* As you are able to view that file, open it with the PowerPoint application and open the temp files by double clicking on file in order to run in PowerPoint.

How Data Recovery Brings Back Deleted Files

Data recovery software has become a popular solution for accidentally deleted files and items lost due to crashes or system error. However, many people are not familiar with these programs and unsure how they work. In this article, you will know how your computer stores information so you will understand why the lost data can be got back.

In our daily life, many people don't know that the deleted files can be recovered; they think that the deleted files do not exist. In fact, the files are still in the hard disk, and you can get them back as long as you know the theory of data recovery. With the help of data recovery software, you can get back your lost data in just a few steps. In order to understand how data recovery works, you first need to know how your computer stores information. Every bit of information on your PC, from saved files to your operating system itself, is recorded on your hard drive. The hard drive is essentially the memory of your computer. Inside the hard drive are a few complex devices, primarily being the platters and the read/write heads.

Platters are rapidly spinning disks, and there can be a few of these. They are similar to CDs in their general design. Platters store data though magnetic regions, which make up the binary code of information. With binary information, the magnetic fields can have two positions only: 1 or 0. One of these positions is called a bit. Eight bits composes a byte, as in megabyte. Thousands of the magnetic regions record your information on the platters.

This magnetic information is detected and recorded by the read/write head. This is a finely tuned device which hovers just above the surface of the platter. It picks up the magnetic field, and sends the signal through the computer. The binary code is then converted into the file that you see as a picture, hear as a song, or interact with as a program. The same happens in reverse when you save a file - the information goes through your computer, is translated to binary code, and is recorded in magnetic regions on the platter by the read/write head. Besides hardware malfunction, most data loss is causes by software malfunctions or mistakes, such as accidentally erasing a file, emptying a recycle bin, formatting a disk, and so on. Virus and system crashes can also cause data to be erased.

In these circumstances, the binary magnetic information that makes up a file is not lost. Instead, just the icons, references, and file names are removed. As a result, the user is unable to access their file, but the data remains on the platters. This is due in part to the design and function of a hard drive - when a file is deleted, the information remains on the hard drive until new information takes its place. When new information is saved over top of old, this is known as overwriting. A data recovery program makes the read/write head detect all information on the platters, even where the computer seems to show that there is no information. This allows the program to pick up on the magnetic regions of deleted information. This information is then analyzed, the file type is determined, and the file is reconstituted on the computer. The user can then interact with the file just as before.

Thanks to : Canyd512617

Use Your Pen Drive as Ram

Yes with some modified settings you can use your pen drive as a RAM

1) Connect your pen drive to your PC [pen drive should be at least 1 GB or if you having 4 GB then its better]
2) Allow PC what he is supposed to do,let system to detect pen drive.
3) After your PC finished with its detection work,you have to do some little
4) Right click on the My Computer and select the properties
5) Goto advanced and then performance setting then advanced then
6) Select pen drive and click on custom size " Check the value of space available "
7) Enter the same in the Initial and the Max columns " You just used the memory of the PenDrive as a Virtual Memory "
8) Now restart your pc and enjoy your fast and super system

Thanks to : Hale

Share internet connection via bluetooth

1. Please recognize your two computers as usual.


(Start Menu / Config Panel / Network and Internet Connections / Bluetooth )

Only one computer needs to be added, the other is recognized and added automatically.


2. This is done on both computers and the host first.

Go to Start Menu / Config Panel / Network Connections
Click on Create a home network or corporate network light and follow the prompts. Once done, you share your files and your printer but not your Internet connection.

3. On the host computer:

Go to Start / Run
Type CMD
Type ipconfig / all

Parallel to AC, go to:
Start Menu / Config Panel / Network Connections
Then right-click on Network Connection properties bluetooth then click on Internet Protocol (TCP / IP) and properties.

Check Use the following IP address and put the one IP address as in ethernet card bluetooth network connection.

In use the following DNS server addresses that are being shown under 'PPP Map Nine' That's for me but you ca depends on the principle used for your Internet connection, or looking for servers there are marked DNS, there are 2, they are good then add the above. You turn the whole and that's it for the host.

4. You do the same in regard to the second computer except that you must add a bridge to the right function. It is in the Advanced tab, where you have set the ip / dns. And gateway is the ip of the host computer. But for the IP address change the last two values that you want.

Remember to check 'allow other network users to connect via the Internet from this computer' in the properties of your Internet connection.

thanks to : fanchon

How to make a PayPal ACC without the need to verify anything

If you are from North America you have to face prompt of Paypal  that ask you for your SSN (Social Security Number). This is very Easy metho...