Monday, December 22, 2008

How to Control the iTunes 8 visualizer

0 comments
If you haven’t played around with the new iTunes 8 visualizer it’s well worth taking a few minutes to play with. It’s been updated, and has some interesting new effects. You can hit Command - T to display the visualizer, and Command-F to make it full screen.

Once you have it running, you can also bring up a list of available functions to help you play around with it. They are as follows:

? - Toggle help screen

M - Change mode
As far as I can tell there are 8 or 9 different patterns.

P - Change palette
Changes the colours used.

I - Display track info
Displays information about the current song.

C - Toggle auto-cycle (on by default)
Turns on or off automatically cycling through modes and colours.

F - Toggle freeze mode
Freezes the visualizer while the camera continues to pan around.

N - Toggle nebula mode
Turns on or off the clouds in the background.

L - Toggle camera lock
Holds the camera still while the visualizer continues.

Friday, December 19, 2008

Some features to decrease your iPhone battery life

0 comments

Depending on how they are configured, a few features may decrease your iPhone battery life. For example, the frequency with which you retrieve email and the number of email accounts you auto-check can both affect battery life. The tips below apply to an iPhone running iPhone 2.0 or later software and may help extend your battery life.

  • Minimize use of location services: Applications that actively use location services such as Maps may reduce battery life. To disable location services, go to Settings > General > Location Services or use location services only when needed.
  • Fetch new data less frequently: Applications such as Mail can be set to fetch data wirelessly at specific intervals. The more frequently email or other data is fetched, the quicker your battery may drain. To fetch new data manually, from the Home screen choose Settings > Fetch New Data and tap Manually. To increase the fetch interval, go to Settings > Fetch New Data and tap Hourly. Note that this is a global setting and applies to all applications that do not support push services.
  • Turn off push mail: If you have a push mail account such as Yahoo!, MobileMe or Microsoft Exchange, turn off push mail when you don’t need it. Go to Settings > Fetch New Data and set Push to Off. Messages sent to your push email accounts will now be received on your phone based on the global Fetch setting rather than as they arrive.
  • Auto-check fewer email accounts: You can save power by checking fewer email accounts. This can be accomplished by turning off an email account or by deleting it. To turn off an account, go to Settings > Mail, Contacts, Calendars, choose an email account, and set Account to Off. To remove an account, go to Settings > Mail, Contacts, Calendars, choose an email account, and tap Delete Account.
  • Minimize use of third-party applications: Excessive use of applications such as games that prevent the screen from dimming or shutting off or applications that use location services can reduce battery life.
  • Turn off Wi-Fi: If you rarely use Wi-Fi, you can turn it off to save power. Go to Settings > Wi-Fi and set Wi-Fi to Off. Note that if you frequently use your iPhone to browse the web, battery life may be improved by using Wi-Fi instead of cellular data networks.
  • Turn off Bluetooth: If you rarely use a Bluetooth headset or car kit, you can turn off Bluetooth to save power. Go to Settings > General > Bluetooth and set Bluetooth to Off.
  • Use Airplane Mode in low- or no-coverage areas: Because your iPhone always tries to maintain a connection with the cellular network, it may use more power in low- or no-coverage areas. Turning on Airplane Mode can increase battery life in these situations; however, you will be unable to make or receive calls. To turn on Airplane Mode, go to Settings and set Airplane Mode to On.
  • Adjust brightness: Dimming the screen is another way to extend battery life. Go to Settings > Brightness and drag the slider to the left to lower the default screen brightness. In addition, turning on Auto-Brightness allows the screen to adjust its brightness based on current lighting conditions. Go to Settings > Brightness and set Auto-Brightness to On.
  • Turn off EQ: Applying an equalizer setting to song playback on your iPhone can decrease battery life. To turn EQ off, go to Settings > iPod > EQ and tap Off. Note that if you’ve added EQ to songs directly in iTunes, you’ll need to set EQ on iPhone to Flat in order to have the same effect as Off because iPhone keeps your iTunes settings intact. Go to Settings > iPod > EQ and tap Flat.
  • Turn off 3G: Using 3G cellular networks loads data faster, but may also decrease battery life, especially in areas with limited 3G coverage. To disable 3G, from the Home screen choose Settings > General > Network and set Enable 3G to Off. You will still be able to make and receive calls and access cellular data networks via EDGE or GPRS where available.

Wednesday, December 17, 2008

How to Send Free SMS

0 comments

These tips may be deliberately loaded us this information useful, especially for who want to send SMS without the cost. Was easy. Here is how:

1. Log in to the following site: http://smscity.com

2. List (enter the correct number)

3. Type the number you get for validation

4. Can directly send SMS Free.

SMSCITY Features:

- Free SMS every day
- Owners can use the ad or not
- FREE determine whether the SMS sent from your phone number or other (anonimus)
- Can we went dancing outside the country
- Support all providers
- SMSnya directly to, the speed even faster than the normal SMS
- Can we know the SMS is received or not
- Can send SMS automatically according to the time we enter
- Can Send SMS and how it anytime
- Can send SMS in the group (many at once).

Monday, December 15, 2008

4 Tools Free Restores Deleted Files

0 comments

Never delete important files on the computer without accidentally? Cases such as this may never befall you, sometimes occurs because we hurried the middle or in the future.

However, do not worry, you can use special tools to restore the files overnight. Here are 4 tools that you can use to restore the files that were deleted. These tools can be downloaded for free on the Internet.

1. Undelete Plus
Among the applications for free circulation in the exterior to restore deleted files, Undelete Plus one that can be used. Its user interface (interface) very simple. You can restore files that were deleted easily with the file type, for example, the Application, GIF graphics, HTML Documents, PDF.

These tools operate on the operating system Windows 95, Windows 98, Windows Me, Windows NT, Windows 2000, Windows XP, Windows 2003 and Windows Vista. You can download the Undelete Plus: http://www.undelete-plus.com/

2. Restoration
Restoration is one of the application to restore the files that were deleted. Tools are also very easy to use and does not need to be installed on the computer. Simply download the tools at: http://www.snapfiles.com/get/restoration.html, the executable file and run it to restore the files that were deleted.

3. PC Inspector File Recovery
Although the user interface PC Inspector File Recovery is not so user friendly, application of this very powerful to detect and restore deleted files. After the scanning process, will be presented the files that were deleted in the folder tree structure (tree structure) to facilitate the search. Thus, you can easily find and select the files / folders that were deleted, and click on the icon and "save" to restore the files. These tools can be downloaded at: http://www.pcinspector.de/Sites/file_recovery/info.htm?language=1

4. Recuva
Recuva often referred to as "Recover". User interface is very simple. In basic mode, this tool will display a list of files that are deleted can be restored. If you change to advanced mode, the scanning process will be re-done and the option to display the information contains the list of files that were deleted. These tools can be downloaded at: http://www.recuva.com

Friday, November 7, 2008

2 telling moment that Firefox Tab Opening Closed

0 comments

In the FireFox browser, there are named the tab browsing feature where users can explore the Internet and open web pages in separate tabs in one window. So many do not need to open the window if you want to open so many sites full taskbar visible.

However, users often accidentally close a tab browser that actually still want to explore because there is important information in the unread, even planning to mem-bookmark site.

Do not worry, the developers have a web browser actually think this scenario and implement a feature where the tab is accidentally closed can be opened again. How very easy:

1. Click the History of the browser Firefox.
2. Select Recently Closed tabs, and then look for sites that you accidentally close yesterday.

Other ways that are more short again press the Ctrl + Shift + T on the keyboard, the browser tab you just closed can be opened again.

Welcome to try!

Friday, October 31, 2008

Security Code Nokia phone

0 comments

The following is the key to the secret key code that can run your own type in your phone's keypad hp that the Nokia brand, which both CDMA and GSM;

1. See the IMEI (International Mobile Equipment Identity)
By the way, press * # 0 6 #

2. See the version of the software, making softwre date and type of compression software
By the way, press * # 0 0 0 0 #
If not successful try * # 9 9 9 9 #

3. Viewing the status of call waiting
By the way, press * # 4 3 #

4. See the number / number of private number to contact your mobile phone
By the way, press * # 3 0 #

5. Showing phone number diverts all calls
By the way, press * 2 1 # #

6. See the number on the transfer of telephone callers because you do not answer (call divert on)
By the way, press * 6 1 # #

7. See the number callers on the phone because it diverts outside the reach (call divert on)
By the way, press * # 6 2 #

8. See the number on the transfer of the callers because of busy phone (call divert on)
By the way, press * # # 6 7

9. Changing the logo on the service type nokia 3310 and 3330
By the way, press * # 6 7 7 0 5 6 4 6 #

10. Showing the status of the SIM clock
By the way, press * # 7 4 6 0 2 5 6 2 5 #

11. Switching to profile your phone profile
How to press the power button off without arrested

12. Changing the setting hp nokia to default or manufacturer
By the way, press * # 7 7 8 0 #

13. Conducting reset the timer mobile phone games and score nokia
By the way, press * # # 7 3

14. Viewing the status of call waiting
By the way, press * # 4 3 #

15. Viewing the code factory or factory code
By the way, press * # 7 7 6 0 #

16. Showing a serial number or serial number, making the date, the date of purchase, the last date of service, transfer of user data. To exit the phone must be reset again.
By the way, press * # 92702689 #

17. Security code to see your mobile phone
By the way, press * # 2 6 4 0 #

18. See ip address your hardware bluetooth
By the way, press * # 2 8 2 0 #

19. Activate the EFR with the best sound quality but the lavish energy batteries. To turn off using the same code.
By the way, press * # 3 3 7 0 #

20. EFR activate the sound quality but the lowest energy-efficient batteries. To turn off using the same code.
By the way, press * # 4 7 2 0 #

21. Towards the contents of phone book quickly in the mobile phone nokia
How serial number and press # example: 150 #

22. Switch the call to the number that it's correct to call all
By the way, press * * 2 1 * # Tax Goal

23. Switch the call to the number that it's correct to call the missed
By the way, press * * * 6 1 Tax Goal #

24. Switch the call to the number that it's correct for phone calls when you are busy
By the way, press * * * 6 7 Tax Goal #

Additional Information:
- Code diinput without a space
- There is a code nokia applicable only in certain types of

Tuesday, October 28, 2008

Shortcut to Shutdown, restart, and log off

0 comments
To accelerate the shutdown you can create shortcuts on the desktop. How:
1. Right-click an empty area on the desktop and select New - Shortcut.
2. In the command line type c: \ windows \ rundll32.exe users, exitwindows.
3. Click next and give the name of the shortcut.
4. Finally click Finish.

Shortcut to Restart

To accelerate the restart you can create a shortcut on the desktop.
Method 1:
1. Right-click an empty area on the desktop, select New - Shortcut.
2. In the command line type C: \ Windows \ RUNDLL.EXE user.exe, exitwindowsexec.
3. Click next and give the name of the shortcut.
4. Finally click Finish.

Method 2:
1. Run Notepad.
2. @ Type exit.
3. Save with the name restart.bat in the C: \
4. Run Windows Explorer, right-click and drag the file to your desktop.
5. On the menu that appears select Create Shortcut (s) Here.
6. Right-click the shortcut, select Properties.
7. Move to the Programs tab, give the check on the Close on Exit.
8. Click the Advanced button.
9. Mark pilhan MS-DOS mode, and delete options warn before Entering MS-DOS mode.
10. Click OK, and OK again to close the Properties dialog box.
Shortcut to Log Off

To accelerate the log off you can create shortcuts on the desktop. How:
1. Right-click an empty area on the desktop and select New - Shortcut.
2. In the command line type C: \ Windows \ RUNDLL.EXE shell32.dll, SHExitWindowsEx 0
3. Click next and give the name of the shortcut.
4. Finally click Finish

Monday, October 27, 2008

8 Step sharpshooter Avoiding Spam

0 comments

Symantec willing to share the eight-stroke steps to avoid spam and malicious programs that spread through e-mail. What are the steps?

1. Use security products for e-mail.
Use products that can protect networks from spam and viruses, but at the same time still allows e-mail for legitimate through. Norton 360 version 2.0 is the latest from Symantec security solutions for the all-in-one.
2. Use a spam filter.
After applying the software, security, Arrange filters needed. An easy way to memulanya is to address the purpose of filtering incoming e-mail (column I). Usually, the spam is not sent to the address you personally, so you can filter all the e-mail address is not aimed at you. Furthermore, if there is a valid e-mail that terfilter, set the filter back to get a specific address.
3. Learn how to e-mail secure.
Suspect e-mail that included, do not fill out the form in the e-mail that asks detailed personal or financial information or passwords. Remember that companies will never ask for such information through e-mail.
4. Ignore spam.
Do not answer e-mail spam that entry, this will only provoke more spam. Likewise, by clicking the link in the e-mail spam, including promises that will remove you from the list of e-mailnya. Delete e-mail without reading them suspicious.
5. Be careful with new tricks.
Many of the tricks of social engineering which often make users fall, whether by indirection or stroke, with the efforts of the user.
6. Use multiple e-mail address.
One for personal use only known family, our friends and colleagues. The other used the address to the mailing list. And one more question or for booking online.
7. Be careful sow your e-mail address.
Do not e-mail until you know the other party just because you distribute e-mail address is on the site can be viewed by the general public.
8. Do not forward.
forwarding like e-mail chain, wheeze or any kind of e-mail the other? According to Kimmyshoe II it should not be done because it can disrupt and impede the traffic and e-mail your network. Assuming the e-mail such as spam.

Birth Normal or With Operation? Let's Ask Computer!

0 comments
"What can I bring normal?" Questions are sometimes confused doctors make. Flooding can be, but the mother is struggling to be normal birth also ended in the operating table. Now the computer can determine.

now developed a software center in computers equipped with wireless sensors that can monitor the birth process and will give warnings to doctors when operating fault action should be done.

Further, it is said, because the action is an operating fault of the decision, so doctors sometimes also face dilemma situation where the birth process is full of risks, especially to define the operation.

However, with the development of software that are not mentioned his name, the decision is no longer a doctor will be confusing. Because, according to Jose, wireless sensor accurate enough to monitor parameters such as electrical activity of muscles in the uterus, which can also determine the strength and frequency of contraction.

Based on the monitor, the computer will predict whether the mother can bring their children to normal or should dilarikan immediately to the operating table.

Saturday, October 25, 2008

Stickers research, Changed Mobile phone to Credit Card

0 comments
Perhaps it is difficult to make people switch to mobile phones with the ability of electronic credit card. For it has developed a credit card sticker that can be placed on any mobile phone.

Inside a French company Contacless which can create sticker was on the phone to function as a credit card. Technology called MicroPass can be used for payment, ticketing and transportation as a sign of identification.

Charles Walton, Executive Vice President Inside contactless, adding that this is a safe and fun to make payment transactions. However cited from CNET, Friday (24/10/2008).

Although the idea is simple enough visible, the adoption credit card stickers this will be widely depending on how quickly banks, retailers and cellular phone companies will agree standards related. Another factor is how the community is ready to accept technology that combines mobile phone with a credit card.

MicroPass technology called a microprocessor using the base. Walton said the technology is based on open standards security. This is not like other proprietary technology, but in fact have a security risk.

10 Step Installation of Windows XP with USB

0 comments

Readers, this time, the existence of the laptop tiny middle captivate most computer users jinjing. How not? Although the specifications of a subnotebook not semumpuni notebook-sized notebook larger, the size and mini envisioned that can accommodate the needs of day-to-day berkomputer make subnotebook as one of the gadgets that are very attractive, in addition to a more affordable price, of course.

Now, one of the producers subnotebook to "streamline" its products is to negate the device optical drives, such as CD-ROM/RW or DVD-ROM/RW. The components that are used to access the CD or DVD chip is enough to commandeer space and resources.

As a consequence, the owners subnotebook can not access the CD or DVD in its subnotebook, or forced to purchase external optical drive, which still run via the USB port available.

One of the problems that arise from the lack of optical drives in the subnotebook is the difficulty when trying to install an application or operating system. Quite often users must copy the application or operating system in which you want to install the USB flash disk, or a colorful external optical drive and the installation as usual. But, of course, this is caused, not considering the many users of the public to know the installation procedure application or operating system via a flash disk, and the price of an external optical drive is not cheap.

Examples of cases, supposing we want to change the Xandros Linux operating system installed in the subnotebook Asus Eee PC with Windows XP, then we must install via the external optical drive. Perhaps not too dizzy to you that have enough funds to buy an external optical drive, but with how you want to economize, since the beginning with the purchase subnotebook?

Now, through this article the author would like to share tips to make the module installation of Windows XP to use the media USB flash disks, which would save costs and make more smart readers. The installation of this module can be implemented not only in the installation to the subnotebook only, but can also be applied on any computer that has the features for booting via USB.

"Easy! Just copy the file to a Windows XP installation disk flash!" It may be in your mind, but believe that to make the module installation of Windows XP is not easy. However, do not worry, because by following these steps, the process of module instalasi Windows XP did not too difficult.

Must be prepared that:

1. A computer equipped with an optical drive (CD or DVD) and a USB port that can work with both.
2. A USB flash disks with 1 or 2 GB.
3. Windows XP installation CD.
4. Applications module manufacturer installation (USB_PREP8 and PEtoUSB), which can be downloaded free through a link http://www.sendspace.com/file/7n781n
5. Do'a and courage!

Making steps:

1. Plug a USB flash disk to a USB port. Remember, remember the drive. Is the F:, G:, H:, and so forth.

2. When you are in the normal position (desktop), insert the Windows XP installation CD into the optical drive. If the computer running the installation process automatically, cancel it and close all the applications that run.

3. Download and extract the application of the author provided. Advice author, to extract the entire contents of a folder, like C: \ USB.

4. Next, open the folder where you unpack the installation of the application module manufacturer, this time we take the example C: \ USB.

5. Run the file named "usb_prep8.bat" on the monitor screen will appear Command Prompt window contains the various commands. If writing has appeared "Press any key to continue," press any key to confirm.

6. In the display window will appear PEtoUSB ask that you format your USB flash disks. No need to change any settings, click Start immediately to begin the process of the format. Answer confirmation according to your needs.

7. If completed, close the window PEtoUSB (do not close the Command Prompt window that was open when you run usb_prep8.bat), then the screen will appear the options from 0 to 5.

8. Use option 1 to choose the installation source files will be copied to the flash disk. Here, specify the drive where you save the installation of Windows XP. Select only the optical drive in which the existing Windows XP CD in it, or select the folder of your choice if you have copy of Windows XP installation files to specific folders.

9. Select option 3 to determine where you pierce the flash disk. If you flash disk in the drive F:, then type F and press ENTER. If the drive G: G and then type the press ENTER, so the next applicable to other drives.

10. Then select option 4 to start the process of installing the module that will be copied to the flash disk automatically. Answer any confirmation that appear with the Y or YES or OK or other forms of approval.

Done! Now you have a flash disk is ready for installation of Windows XP! Please make the settings in your BIOS subnotebook, and select Removeable Disk (or any other name) as the media first run when booting.

Given the technical installation is also available on the internet, you can also search for them via search engines. Se

Friday, October 24, 2008

5 Terms absolutely necessary Starting Online Dating

0 comments

Internet media is easy to become acquainted with new people. The great number of social networking sites and site specific search online dating friend also berhamparan.

Indeed, the few meetings that came from contacts on the internet in the Customize expire beautiful. But, I also get a little disappointment and even bad luck.

There are 5 absolutely necessary that issued the Internet Dating Examiner, as quoted detikINET, Thursday (28/8/2008). Intend to seek a date via the internet, please note well.

1. To start, avoidance using the original name and identity.

Provide personal information to people that you know not enough danger on the Internet. In the beginning may feel 'hoax' talk your opponent. But remember, many online predators evil and join in the search group of friends for dating the intention of the less well.

2. Use a public place that so many people to meet the first place.

Never 'take' in a private place such as home or office, for example. In the Internet, you may believe you both the recipient and can be trusted. But, when in reality these people are not as you expect, you should not be pursued giddy-up to pursue disrupting tranquility of your life.

3. Must be wary of false profile with a visible 'too good to be true'.

When you pair your online characteristics that give the exact figure you desire, it has become a characteristic you should be wary. Nowadays, people can find what you desire with easy when you have interfaces characteristic figure you desire on the internet.

4. Reproduction has' CEM-ceman 'online if you have a sweetheart in the real world.

Bermesraan online friends have indeed often become violent and experience that excite. Although only a relationship online, the relationship between the 'original' with your sweetie can fail when discovered. Consequently, vague lovers, friends online dating is also not clear rimbanya.

5. Never fraudulent site to register online dating when you are balanced, engaged and a serious relationship with someone.

Family life is often met with problems. However, starting a glance online dating sites to excite emotion is not a good way. Complete first and end the relationship with the good and wise, a new start work in the online dating site, if you feel lonely.

4 Stage Ways to expel fake drowning

0 comments


Currently there are 304 antivirus software detected the circulation of fake and menginfeksi thousands of computers in Indonesia. In addition to bring through, the virus can spread through e-mail to send false messages containing attachments.

Viruses act by providing a false message that resembles the Windows program, which seems to tell that in your computer, there are spyware / virus, and then install the antispyware program that is false 'XP AntiSpyware 2009.

To clean up, there are several steps that need to be done. This was how:

1. Disconnect the computer from the network will be cleaned.
2. Scan your computer using a removal tool. You can use the removal tool to clean up from Norman (you can download it here http://download.norman.no/public/Norman_Malware_Cleaner.exe

3. Remove string registry, which was created by the virus. To ease the registry can use the script below.

[Version]
Signature = "$ $ Chicago"
Provider = Vaksincom Oyee

[DefaultInstall]
AddReg = UnhookRegKey
DelReg = del

[UnhookRegKey]
HKLM, Software \ CLASSES \ batfile \ shell \ open \ command ,,,"""% 1 ""% * "
HKLM, Software \ CLASSES \ comfile \ shell \ open \ command ,,,"""% 1 ""% * "
HKLM, Software \ CLASSES \ exefile \ shell \ open \ command ,,,"""% 1 ""% * "
HKLM, Software \ CLASSES \ piffile \ shell \ open \ command ,,,"""% 1 ""% * "
HKLM, Software \ CLASSES \ regfile \ shell \ open \ command, "regedit.exe" "% 1"
HKLM, Software \ CLASSES \ scrfile \ shell \ open \ command ,,,"""% 1 ""% * "
HKCU, Software \ Microsoft \ Internet Explorer \ Main, Search Bar, 0
HKCU, Software \ Microsoft \ Internet Explorer \ Main, Search Page, 0
HKCU, Software \ Microsoft \ Internet Explorer \ Main, Start Page, 0
HKLM, SOFTWARE \ Microsoft \ Internet Explorer \ Main, Default_Search_URL, 0
HKLM, SOFTWARE \ Microsoft \ Internet Explorer \ Main, Search Page, 0
HKLM, SOFTWARE \ Microsoft \ Internet Explorer \ Main, Start Page, 0
HKLM, SOFTWARE \ Microsoft \ Internet Explorer \ Search, SearchAssistant, 0
HKLM, SOFTWARE \ Microsoft \ Security Center, AntiVirusDisableNotify, 0
HKLM, SOFTWARE \ Microsoft \ Security Center, FirewallDisableNotify, 0
HKLM, SOFTWARE \ Microsoft \ Security Center, UpdateDisableNotify, 0
HKLM, SOFTWARE \ Microsoft \ Windows NT \ CurrentVersion \ Windows, AppInit_DLLs, 0
HKLM, SOFTWARE \ Microsoft \ Windows NT \ CurrentVersion \ Winlogon, Shell, 0, "Explorer.exe"

[del]
HKCU, Software \ Microsoft \ Windows \ CurrentVersion \ Run, braviax
HKLM, SOFTWARE \ Microsoft \ Windows \ CurrentVersion \ Run, braviax
HKLM, SOFTWARE \ Microsoft \ Windows \ CurrentVersion \ Run, brastk
HKCU, Software \ Microsoft \ Windows \ CurrentVersion \ Explorer \ MountPoints2, (706ab86c-937e-11dd-a04c-000c290bc510)
HKLM, SOFTWARE \ Microsoft \ Windows NT \ CurrentVersion \ Image File Options Executions, Explorer.exe

Use a notepad, and then save with the name "Repair.inf" (use the Save As Type option to become All Files to avoid the mistakes). Run repair.inf with right-click and select install. Repair.inf should create a file on the computer clean, so that the virus is not active.

4. For optimal cleaning and prevent re-infection, should use the antivirus update and identify all the installation files with the virus this good.

6 Stage Installing Linux with USB

0 comments

In addition to Windows, Linux operating system also can be run from a USB (flash disk). Only in 5 minutes, you can install Linux from USB.

You can use tools called UNetbootin. To be able to install Linux from a flash disk, you must have flash disk capacity meinimal 1GB.

In addition to USB, make sure you set the desired Linux distribution, namely: Arch Linux, BackTrack, CentOS, CloneZilla, Damn Small Linux, Debian, Dream Linux, Elive, FaunOS, Fedora, Frugalware, Gentoo, Gujin, Kubuntu, Linux Mint, Mandriva , NetBSD, NTPasswr, openSUSE, Ophcrack, Parted Magic, PClinuxOS, Puppy Linux, SLAX, SliTaZ, Smart Boot Manager, Super Grub Disk, Ubuntu, Xubunu, Zenwalk.

For example, the installation of this time using a Linux distribution BackTrack 3, and Ubuntu 8.04.1 LTS, with Kingstone DataTraveler USB 2.0 1GB. The following step-by-step installation, as quoted detikINET from Softpedia, Friday (12/9/2008):

1. UNetbootin download, store on the desktop.

2. UNetbootin right-click on the desktop and select Properties.

3. Click the Permissions tab, check (v) in the box 'Allow executing the file as the program,' and then click Close.

4. Plug first USB port to the computer. This is very important because you will not be able to use USB if menancapkannya after you open the application UNetbootin.

5. Next, double click UNetbootin exe files that are downloaded overnight, and then type the password to open the application UNetbootin.

6. Select the version of Linux distribution, and that you want, and then select the type of installation and click Ok to start the installation.

Done! Reboot your computer and booting from a USB. Now you can use the Linux operating system your portable.

5 Most Popular Feature on Google

0 comments
here are many special features in the Google search engine that can help us find what we find. In between you may already know. In between you may already know.

Some of the features popular on Google, as quoted from Techdream, Friday (17/10/2008), is:

1. The calculation of simple mathematics. The Calculation of simple mathematics.
Google's search engine can do simple math calculations such as addition, multiplication, division or subtraction, as have the ability to function as a calculator. Google's search engine can do simple math Calculations such as addition, multiplication, division or subtraction, as have the ability to function as a calculator. Type the number you want to be counted along with calculations to sign in the box search engine, for example: 5 3 * 5, and press the Enter key or click the Search button on Google. Type the number you want to be counted along with Calculations to sign in the search box, for example: 5 3 * 5, and press the Enter key or click the Search button on Google.

2. Currency conversion. Currency conversion.
Currency conversion facility is also available in the Google search engine. Currency conversion facility is also available in the Google search engine. Just type the figures currency followed signs that want to convert from a certain currency to the desired currency in the search engine, for example: 100 USD in INR, and press Enter. Just type the figures currency followed Signs that want to convert from a certain currency to the desired currency in the search engines, for example: 100 USD in INR, and press Enter.

3. Viewing time in various cities around the world. Viewing time in various cities around the world.
You can find out the local time in a city or other countries. You can find out the local time in a city or other countries. Just type in the time [name of city / country] in the search box to find out easily with the local time in a city / country. Just type in the time [name of city / country] in the search box to find out easily with the local time in a city / country. The time in Barcelona. The time in Barcelona.

4. Conversion units. Conversion units.
In addition to functioning as a calculator, the Google search engine can also convert the sizePOST http://www.blogger.com/post-edit.do HTTP/1.1. In addition to functioning as a calculator, the Google search engine can also convert the size. For example: 100 inch in meters. For example: 100 inch in meters.

5. Check your spelling. Check your spelling.
Google also have the facilities to check spelling, good spelling for a word objects, such as names and places, which may not appear in the program or spell check dictionary standard. Google also have the facilities to check spelling, good spelling for a word objects, such as names and places, which may not appear in the program or spell check dictionary standard.

7 Step Cleanup Donald Duck Virus

0 comments

Donald Duck virus created using Visual Basic programming language and detected as VbWorm.QXE. One of the characteristics of this virus is the word "Duck Feather."

Duck Feather hide folders / subfolders in the flash disk, and is to duplicate files with the name of the folder / subfolder is to trick users. To clean up, see the following:

1. Should disconnect the computer that will be cleaned from the network (if connected to the Local Are Network / LAN).

2. Disable "System Restore" for a while during the cleaning process takes place (if using Windows ME / XP).

3. Turn off the virus that is active in memory, to turn the virus is to use tools such as the replacement taks manager procexp, then turn off the virus which has the icon "folder."

4. Repair the Windows registry that has been altered by a virus. To accelerate the process copy the script below in the program with a notepad and then save the name repair.inf. Run the file by:

* Click the right repair.inf
* Click on the Install

[Version]
Signature = "$ $ Chicago"
Provider = Vaksincom Oyee

[DefaultInstall]
AddReg = UnhookRegKey
DelReg = del

[UnhookRegKey]
HKLM, Software \ CLASSES \ batfile \ shell \ open \ command ,,,"""% 1 ""% * "
HKLM, Software \ CLASSES \ comfile \ shell \ open \ command ,,,"""% 1 ""% * "
HKLM, Software \ CLASSES \ exefile \ shell \ open \ command ,,,"""% 1 ""% * "
HKLM, Software \ CLASSES \ piffile \ shell \ open \ command ,,,"""% 1 ""% * "
HKLM, Software \ CLASSES \ regfile \ shell \ open \ command, "regedit.exe"% 1 ""
HKLM, Software \ CLASSES \ scrfile \ shell \ open \ command ,,,"""% 1 ""% * "
HKLM, SOFTWARE \ Microsoft \ Windows NT \ CurrentVersion \ Winlogon, Shell, 0, "Explorer.exe"
HKLM, SYSTEM \ ControlSet001 \ Control \ SafeBoot, AlternateShell, 0, "cmd.exe"
HKLM, SYSTEM \ ControlSet002 \ Control \ SafeBoot, AlternateShell, 0, "cmd.exe"
HKLM, SYSTEM \ CurrentControlSet \ Control \ SafeBoot, AlternateShell, 0, "cmd.exe"
HKLM, SOFTWARE \ Microsoft \ Windows \ CurrentVersion \ Explorer \ Advanced \ Folder \ SuperHidden, UncheckedValue, 0x00010001, 1
HKLM, SOFTWARE \ Microsoft \ Command Processor, AutoRun, 0,
HKLM, SOFTWARE \ Microsoft \ Windows \ CurrentVersion \ Explorer \ Advanced \ Folder \ Hidden \ SHOWALL, CheckedValue, 0x00010001, 1
HKLM, SOFTWARE \ Microsoft \ Windows \ CurrentVersion \ Explorer \ Advanced \ Folder \ Hidden \ SHOWALL, DefaultValue, 0x00010001, 2
HKCU, Software \ Microsoft \ Command Processor, AutoRun, 0,

[del]

HKCU, Software \ Microsoft \ Windows \ CurrentVersion \ Policies \ System, DisableRegistryTools
HKCU, Software \ Microsoft \ Windows \ CurrentVersion \ Policies \ System, DisableTaskMgr
HKCU, Software \ Microsoft \ Windows \ CurrentVersion \ Policies \ Explorer, NoFolderOptions
HKCU, Software \ Microsoft \ Windows \ CurrentVersion \ Policies \ Explorer, NOFind
HKCU, Software \ Microsoft \ Windows \ CurrentVersion \ Policies \ Explorer, NORun
HKCU, Software \ Microsoft \ Windows \ CurrentVersion \ Policies \ WinOldApp
HKLM, SOFTWARE \ Microsoft \ Windows NT \ CurrentVersion \ Image File Execution Options \ PAYXX.exe
HKCU, Software \ Microsoft \ Windows NT \ CurrentVersion \ Winlogon, Shell
HKLM, SOFTWARE \ Microsoft \ Windows \ CurrentVersion \ Explorer \ Advanced \ Folder \ Hidden \ HideFileExt
HKLM, SOFTWARE \ Microsoft \ Windows \ CurrentVersion \ Explorer \ Advanced \ Folder \ Hidden \ ShowFullPath
HKLM, SOFTWARE \ Microsoft \ Windows \ CurrentVersion \ Explorer \ Advanced \ Folder \ Hidden \ ShowFullPathAddress
HKLM, SOFTWARE \ Microsoft \ Windows \ CurrentVersion \ Explorer \ Advanced \ Folder \ Hidden \ SuperHidden
HKCU, Software \ Microsoft \ Windows \ CurrentVersion \ Policies \ Explorer, NoFolderOptions
HKCU, Software \ Microsoft \ Windows \ CurrentVersion \ Policies \ System, DisableRegistryTools


5. Find and delete duplicate files created by the virus. To accelerate the process should use the search function "of Windows Search" with the first display of hidden files.

If the Folder Options not appear, LogOff computer should first and then show hidden files. After the duplicate files found, delete the file that has the characteristics:

* Using the folder icon
* File size 53 KB
EXE extension *
* File Type "Application"


6. Show return the file / folder on the Flash Disk, which is hidden. To show the hidden files, you can use alternative tools such as bebarapa Batch File Utility or by using the ATTRIB command.

Here's how to display the files / folders are hidden by using the ATTRIB:

* Click the "Start"
* Click "Run"
* Type in "cmd" and press "Enter"
* Move the cursor position to drive Flash Disk
* Then type the game is really good-h-r / d and then press "enter"


7. For optimal cleaning to prevent infection and re-scan, the antivirus software up-to-date and have been able to detect the virus.
Your Ad Here
 
Copyright © Tips and Trick | Theme by BloggerThemes & simplywp | Sponsored by BB Blogging