Behind of Bluetooth wireless device

Posted by Android On Senin, 19 September 2011 0 komentar

Bluetooth is the industry specification for personal area networks (personal area networks, or PAN) without wires. Bluetooth connects and can be used to perform the exchange of information between devices.

Spesification of Bluetooth devices was developed and distributed by the Bluetooth Special Interest Group. Bluetooth operates in 2.4 GHz frequency band using a frequency hopping traceiver capable of providing voice and data communication services in real time between bluetooth host-host with limited distance.weakness of this technology is a short range and low data transfer capability.


The presence of bluetooth makes a person no longer mess around with what cable, what color, heading nowhere, and must be plugged in where. The function of the interconnection between the equipment can be replaced by bluetooth chipset that is placed in a built-in electronic equipment related.

The name "Bluetooth" is derived from the name of the king at the end of ten centuries, Harald Blatand which in England is also called Harald Bluetooth. Connotation is not so far wrong, because according to mythology story, supposedly Bluetooth-haired and dark skinned. He likes to eat blueberries or strawberries, then it is worth when the tooth Blatand become bluish or blue tooth.

He is the king of Denmark who has managed to unite the tribes that previously fought, including the tribes of the area now called Norway and Sweden. Even the Scania region in Sweden, where bluetooth technology is found to also include territories. King's ability as a unifier is also similar to bluetooth technology now that can connect various devices such as personal computers and mobile phones.

While the Bluetooth logo comes from the German unification of the two letters which are analogous with the letter H and B (short for Harald Bluetooth), namely H (Hagall) and Runic letter (Blatand) which are then combined.

Beginning of Bluetooth is a wireless communication technology (without cable) that operate in the 2.4 GHz unlicensed frequency band ISM (Industrial, Scientific and Medical) using a frequency hopping transceiver is capable of providing voice and data communication services in real-time between bluetooth host-host with limited service reach distance (around 10 meters).

Bluetooth card that uses the IEEE 802.11 radio frequency standard with a limited range of services and lower ability to transfer data from card to Wireless Local Area Network (WLAN).

Bluetooth formation promoted by five large companies Ericsson, IBM, Intel, Nokia and Toshiba to form a Special Interest Group (SIG), which launched this project. In July 1999 document bluetooth specification version 1.0 was launched.

In December 1999 started again making bluetooth specification documents version 2.0 with the addition of four new promoters of 3Com, Lucent Technologies, Microsoft and Motorola. Currently, more than 1800 companies in various fields to join in a consortium as an adopter of bluetooth technology. Although the standard Bluetooth SIG is currently 'owned' by the promoter group but he is expected to become an IEEE standard (802.15).
READ MORE

Tips Buy Web Hosting

Posted by Android On Jumat, 22 Juli 2011 0 komentar
Web Hosting is one form of rental services on the Internet that allows a person online to the websites / web on the internet. The place is called the hosting of data storage, and usually measured in units of capacity in megabytes (Mb) up to terabytes (Tb) and have a connection to the internet so that data can be requested or accessed by users from all over the place simultaneously. So in short for web hosting is a web hosting or data storage from a web.

With the increasing number of companies that sell web hosting services make consumers confused in determining the choice. There are companies that offer hosting at a great price some are very cheap, there are limits there are also features that include unlimited versatile features, and much more to offer the lure to attract the attention of consumers. As consumers we must be extra careful not to be fooled by the outside appearance of the web hosting company. Here are tips to get the best web hosting, order of things that most need to prioritize.

Tips for Choosing Web Hosting

1. Service

Web hosting is a business-related services, and service means service. Of course you feel very upset if you have difficulty or even problems with the web hosting and then you try to contact Customer Support but no response. For that before buying web hosting, make sure you choose a web hosting company that has customer support that provide the best service.

2. Quality of Server and Network

Consumers who purchase web hosting would want a website and email is always accessible with a smooth, fast, and guaranteed data security. Before you purchase a hosting it is better if you do a check and recek for quality and speed of server access, and of course even better if your web hosting company is giving a trial or a trial account.

3. Rights to the Domain and Hosting You Buy

Goods you have purchased is yours entirely, and make sure you have full access rights over the domain and hosting. Currently there are still many companies that do not give full access rights over its domain, making it difficult if consumers want to move hosting let alone perform the domain transfer to another company.

4. Reliable and Professional Company

In choosing a web hosting company make sure you buy at a trusted because it involves data security and continuity of your business. And choose a responsible company and give warranty for the products it sells.

5. Price

In business services, the price is the last thing that can be used for comparison. Because the same price does not necessarily indicate the same quality. Adage says 'There is no way prices', most of it is true. You should be suspicious if there are companies that provide web hosting prices are very cheap especially with unlimited features. We know that the web hosting servers have restrictions, space (hard drive) has a limit, traffic / bandwidth have limits, and of resources of a computer / server has a limit. But do not close the possibility of good quality can be obtained at a cheap price, for that consumers should be more observant in choosing.
READ MORE

How to Make VPS

Posted by Android On Selasa, 12 Juli 2011 0 komentar

Nowadays a lot of which can be used to create a vpn server from starting a direct form of hardware up to the only form of application, from the expensive to the free.

OpenVPN is a VPN application is free (opensource) is quite reliable. Some sources say OpenVPN is in fact not the safest but if the data must be transferred between two or more networks are not too sensitive like more than enough moreover OpenVPN OpenVPN is also very easy to install.

Here I will just tell you about the installation steps OpenVPN on FreeBSD. Although probably could have used some of his tricks on Linux or * nix like any other OS.

Ok long story rather than let's start it.

First OpenVPN on FreeBSD can be found in the folder / usr / ports / security / openvpn, which is required usually lzo library lib but since I installed it through the ports, then all the dependencies will automatically be installed.

For installation please follow these steps (all performed by root)

cd / usr / ports / security / openvpn
make config
Make the build
make install clean

Performed the above steps so that you have a chance to see what happens at each step. Actually you can just change directory and typing make install clean immediately.

After the installation process goes wrong and no significant errors, then input the following line to / etc / rc.conf with your favorite text editor.

openvpn_enable = "YES"

Now we will create a config file to be placed in the folder / usr / local / etc / openvpn if the folder does not exist yet please make advance with the command

mkdir / usr / local / etc / openvpn

Then please move to the folder and start creating openvpn.conf file with your favorite text editor.

cd / usr / local / etc / openvpn
pico openvpn.conf

Now please enter the following sample config.

# Specify device
dev tun

# # The server and client IP Pool
server 10.8.0.0 255.255.255.0
ifconfig-pool-persist ipp.txt

# Certificates for VPN Authentication
ca / usr / local / etc / openvpn / keys / ca.crt
cert / usr / local / etc / openvpn / keys / server.crt
key / usr / local / etc / openvpn / keys / server.key
dh / usr/local/etc/openvpn/keys/dh1024.pem

# Routes to client
push "route 192.168.0.0 255.255.255.0"
# Compression VPN link
comp-lzo

keepalive 10 60
ping-timer-rem
persist-tun
persist-key

# Run OpenVPN as a daemon and drop privileges to user / group nobody user nobody
group nobody
daemon

Save the file above, and we continue with cerificates. Copy the script to create a certificate from the folder / usr / local / share / doc / openvpn manner as follows (examples copied it to the folder / home / giest please be replaced with your user).

cp-r / usr / local / share / doc / openvpn / easy-rsa / home / guest /
cd / home / guest / easy-rsa

After successfully copying easy-rsa scripts then please adan edit the vars file with your favorite editor and adjust purposes (without dieditpun no problems then you will be given only a few questions over and over again). Here are examples of parts that you need to edit.

export KEY_COUNTRY = ID
export KEY_PROVINCE = "ENGLAND"
export KEY_CITY = LONDON
export KEY_ORG = "GUEST-VPN"
export KEY_EMAIL = "admin@guest.org"

Then we moved from the FreeBSD default shell (usually tcsh) to sh or bash first. If you do not move the shell I guarantee you will not succeed in making certificates for openvpn.

To switch to sh or bash please type the following command.

sh

Once you move the shell follow the steps below.

. vars
NOTE: Pls you run. / Clean-all, I Will be doing a rm-rf on / usr / home / Guest / easy-rsa / keys
. / Clean-all
. / Build-ca
Generating a 1024 bit RSA private key
....................................++++++
..............++++++
writing new private key to 'ca.key'
-----
You are about to be asked to enter information That Will be incorporated
into your certificate request.
What you are about to enter is what is Called a Distinguished Name or a DN.
There are quite a Few fields but you can leave some blank
For some fields there Will be a default value,
If you enter '.,' Will the field be left blank.
-----
Country Name (2 letter code) [ID]:
State or Province Name (full name) [ENLAND]:
Locality Name (eg, city) [LONDON]:
Organization Name (eg, company) [GUEST-VPN]:
Organizational Unit Name (eg, section) []:
Common Name (eg, your name or your server's hostname) []:
Email Address [admin@guest.org]:

Ok as you can see you are required to answer some questions, but because previously I've edit the file vars so I can just hit enter to use the default answer.

Next is to build certificate and key follow the steps below

. / Build-key-server server
Generating a 1024 bit RSA private key
..........++++++
.................................................. ++++++
writing new private key to 'server.key'
-----
You are about to be asked to enter information That Will be incorporated
into your certificate request.
What you are about to enter is what is Called a Distinguished Name or a DN.
There are quite a Few fields but you can leave some blank
For some fields there Will be a default value,
If you enter '.,' Will the field be left blank.
-----
Country Name (2 letter code) [ID]:
State or Province Name (full name) [ENGLAND]:
Locality Name (eg, city) [LONDON]:
Organization Name (eg, company) [GUEST-VPN]:
Organizational Unit Name (eg, section) []:
Common Name (eg, your name or your server's hostname) []: SERVER
Email Address [admin@guest.org]:

Please enter the following 'extra' attributes
to be sent with your certificate request
A challenge password []: 123456
An optional company name []: ARSENAL
Using configuration from / usr / home / Guest / easy-rsa / openssl.cnf
Check That the request matches the signature
Signature ok
The Subject's Distinguished Name is as follows
countryName : P RINTABLE: 'ID'
stateOrProvinceName: P RINTABLE: 'ENGLAND'
localityName : RINTABLE: 'LONDON'
OrganizationName : RINTABLE: 'GUEST-VPN'
commonName : RINTABLE: 'SERVER'
emailAddress : IA5STRING: 'admin@guest.org'
Certificate is to be certified until July 12 18:04:29 2019 GMT (3650 days)
Sign the certificate? [Y / n]: y

1 out of 1 certificate requests certified, commit? [Y / n] y
Write out database with 1 new entries
Data Base Updated

See if we do not edit the file vars we need to answer that question once again. now we will build certificate and key for use by the client. I emulated this will make the client certificate for 2 only. if you have more than two clients please adjusted.

. / Build-key client1
Generating a 1024 bit RSA private key
.........++++++
....................................++++++
writing new private key to 'client1.key'
-----
You are about to be asked to enter information That Will be incorporated
into your certificate request.
What you are about to enter is what is Called a Distinguished Name or a DN.
There are quite a Few fields but you can leave some blank
For some fields there Will be a default value,
If you enter '.,' Will the field be left blank.
-----
Country Name (2 letter code) [ID]:
State or Province Name (full name) [ENGLAND]:
Locality Name (eg, city) [LONDON]:
Organization Name (eg, company) [GUEST-VPN]:
Organizational Unit Name (eg, section) []:
Common Name (eg, your name or your server's hostname) []: CLIENT1
Email Address [admin@giest.org]:

Please enter the following 'extra' attributes
to be sent with your certificate request
A challenge password []: 123456
An optional company name []: ARSENAL
Using configuration from / usr / home / Guest / easy-rsa / openssl.cnf
DEBUG [load_index]: unique_subject = "yes"
Check That the request matches the signature
Signature ok
The Subject's Distinguished Name is as follows
countryName: P RINTABLE: 'ID'
stateOrProvinceName: P RINTABLE: 'england'
localityName: P RINTABLE: 'london'
OrganizationName: P RINTABLE: 'GUEST-VPN'
commonName: P RINTABLE: 'CLIENT1'
emailAddress: IA5STRING: 'admin@guest.org'
Certificate is to be certified until July 12 18:10:43 2019 GMT (3650 days)
Sign the certificate? [Y / n]: y

1 out of 1 certificate requests certified, commit? [Y / n] y
Write out database with 1 new entries
Data Base Updated

To client2 just typing

. / Build-key client2

you should replace only the part

[Source] Common Name (eg, your name or your server's hostname) []: CLIENT2 [/ source]

If you do not make changes here the certificates and keys for the client to the two would not formed.

Next we build dh parameters with a command like the following

1. #. / Build-dh
2. Generating DH parameters, 1024 bit long safe prime, generator 2
3. This is going to take a long time
4.

ok now completed the process of making key right now you just exit back to your default shell with the command exit

Now copied keys folder to / usr / local / etc / openvpn with the command

cp-r keys / usr / local / etc / openvpn /

Before we start running the openvpn server we first prepare a file for the log. Please edit the file / etc / syslog.conf and add the following line at the bottom of the syslog.conf file.

! Openvpn
.* / Var / log / openvpn.log

then create the file and restart syslog openvpn.log ny

touch / var / log / openvpn.log
killall-HUP syslogd

Now we load the first module tun / tap tun device that could arise later.

kldload if_tun
kldload if_tap

if you find errors kldload: can not load if_tun: File exists mean tun or tap and it was too load so do not worry.

In order to tun and tap was loaded each time the boot please edit the file / boot / defaults / loader.conf then locate the following lines and change to YES

if_tap_load = "YES" # Ethernet tunnel software network interface
if_tun_load = "YES" # Tunnel driver (user process ppp)

Ok lah is now complete we are ready to run the OpenVPN server for the first time. To run OpenVPN please type the following command.

/ Usr / local / etc / rc.d / openvpn start

Next we check whether everything is ready or not we check first with the command ifconfig tun device

tun0: flags = 8051 mtu 1500
inet 10.8.0.1 -> 10.8.0.2 netmask 0xffffffff
Opened by PID 10147

If you've seen a display like the above means that the OpenVPN server is already successful path.

It remains to add the following rules for your pf.conf

# VPN Interface
vpn_if = "tun0"

# VPN Network
vpn_network = "10.8.0.0/24"

# NAT VPN connections
nat on $ ext_if from $ vpn_network to any -> ($ ext_if)

# Inbound VPN connections
pass in on $ ext_if proto udp from any to port 1194 keep state
pass quick on $ vpn_if


READ MORE

hosting tutorial for newbie

Posted by Android On Selasa, 05 Juli 2011 0 komentar


Hosting is a place or Internet service to create web pages that you created online and can be accessed by others. So, based on own experience of hosting, there is one thing to note in terms of renting a hosting for the site that we created, ie: note the true owner of the company's rental service provider hosting, about whether stable or not. Companies that are unstable, potentially aka "bankrupt" or going to close, more or less will cause instability of the sites we manage. For example it could cause problems of domain ownership, the problem of domain transfer process is complicated due to email "hostmaster" no man's land, and so on. Sure we'll hassle of having problems earlier. Therefore choose a company that is stable, although it may cost a little bit expensive. but we can avoide all risk with make own hosting a thome.

In this tutorial we will teach you make own hosting, what need for make it..?

PC for server specification.
ADSL modem with Internet connection Unlimited
XAMPP as Localhost

With the above assumptions infrastructure needs have been installed and an Internet connection Unlimited is the normal way we can make your own webhost with the help of XAMPP.

Now we begin to modify the modem configuration to make a pc that is connected to the adsl who we are as a server host needs as I mentioned above (www, ftp, telnet, etc.).

was logged into your Speedy ADSL Modem
speedy change in the modem connection, which was originally PPPoE / PPPoA (with user & password), Becoming Bridge Mode (without user & password)
Save your Modem Configuration. now to be able to get a dynamic ip from speedy, we switch to the connected PC with Speedy directly or connected through a hub.
open the Network Connection or by clicking Start - Settings - Control Panel - Network Connections
Then Make a PPP connection from your Windows to get a dynamic ip from speedy by clicking Create a new connections with your username and password Speedy
This will bring up Fields Username & Password, if you've followed the above correctly STEP 2, then the box that pops up will have been filled for his column username & password, now to do the connection, press CONNECT
When Speedy connection you two indicators will appear as shown below, and when the ipconfig via DOS, PC You Have 2 IP Address, which is Local IP (private IP) and IP from Speedy (public IP)

From the experiments above, your PC can now be made in servers that can be recognized the world directly, in the sense that can host many needs such as www, ftp, email, etc., for the above role is just as Bridging the modem (it has no IP and as a bridge your speedy internet connection)

Getting a dynamic DNS via DynDNS

DynDNS (Dynamic DNS) - www.dyndns.com is a provider for dynamic DNS and static IP as well as many Sub-Domain that can be used freely and FREE, in this article we will create a sub domain 'anda.subdomain.xxx' with subdomains are dozens of options already available in dyndns.com and periodically updating the domain to always recognize your speedy ip always change because it is dynamic, and supporting software.

Terms and How:

Your internet connection should already connected with your ISP
open this url in your browser: www.dyndns.com
or immediately wrote to create an account at: https://www.dyndns.com/account/create.html
do a confirmation via email before, and click on the url that is in it to activate your account.
when it is activated, your account will be activated immediately
dydns do log into the user + password before
click on the My Services located in upper right corner
menu, select Add Host Services (pl. circumference 1)
then click Add Dynamic DNS Host (pl. circumference 2)

A quick way to make by-pass numbers to 7-9 with a click / copy paste in browser: https://www.dyndns.com/account/services/hosts/dyndns/add.html

Example:

eg the hostname field: yourhost
then with the domain option: blogdns.net
some other setting? default (no change)
then click? Add Host

then the domain url address for your speedy is:

http://yourhost.blogdns.net/

NOTE:

Sub-Domain that you can make a sub-domain you forever
Sub-domains that you created earlier (http://yourhost.blogdns.net/) can not keep changing your ip on speedy unless you follow the last stage of which I will explain below, that will automatically update your dynamic ip with sub -domains at DynDNS
Updating DNS at DynDNS.com process

Updating DNS at DynDNS is very necessary, given ip Speedy you're a Dynamic IP (no IP)

In order to understand changes in the IP DynDNS always speedy, you need to update it regularly on his Web DynDNS, especially when the new modem at the switch, or other factors erosive change ip

To facilitate the process of Updating and updates AUTOMATICALLY, DynDNS has provided its support software provided by Free, which serves to lawyer-updatan automatically sub-domain with your speedy dynamic ip.

Follow the steps below and download the updater file:

https://www.dyndns.com/support/clients/ or here
extract is the file
install file
create groups
fill in your username and password there speedy, or click the Detect button to detect dialers account that you created above
then click OK until the application is closed, but be sure to try DynDNS icon is still there, wait a minute for about 5-10 seconds, to make connecting automatically DynDNS

enter the sub-domain that you created above with a choice of system DynDNS

Indicators:

Green tick you are successful
Check the yellow update process
Check your red failed
READ MORE

Get Free Access Internet WiFi

Posted by Android On Minggu, 26 Juni 2011 0 komentar

WiFi HotSpot As we know, hotspots or wireless internet access with standard 802.11b / g are not familiar stuff our ears, and when we go in public places like the Mall, Cafe, hotels and offices, with our easy to find the facility ..

Unfortunately not all providers offer wireless Internet facilities for free, or if free. extremely limited.
One of the protection used wireless service providers is to restrict Internet access based on MAC Address.
What is MAC Address?
In computer networking a Media Access Control address (MAC address) or Ethernet Hardware Address (EHA) or hardware address or adapter address is a quasi-unique identifier attached to most network adapters (NICs) ..
Okay so the conclusion MAC Address is a unique number that distinguishes each network device that is attached dikomputer us.
An example is the hotspot in hotel hilton. At hilton hotspot The Wireless Internet service providers, limiting the use of the Internet is free only for 3 hours, after that you can not access the Internet again, and would not be able to access again tomorrow. Type of protection used is MAC Address Filtering.
How to break through the protection with a MAC Address?

There is a very useful tool for anda.Tools was named K-MAC Download Dicini
With this tool you will be able to change your MAC-Address instantly and what does it mean? You can break the MAC Address Protection!. Each share of Internet access you run out in 3 hours, you need to do is change your MAC address, and do the connection.
I add more for info. WEP/WPA/WPA-2 cracking passwords using
programs are available in packages of OS backtrack
kismet
Kismet is a security tool that runs Linux, Kismet is used to eavesdrop on data traffic in the Internet network.
Aircrak-Aircrak-PTW PTW is a tool used to crack wireless protected. Each of these notebooks with different specs, so any way to use aircrack different.
One trick is also used to search for passwords which are used by someone to access hotspots that use prepaid cards.
Simple tool that prepared aja sih:
Software required:
1. Angry IP Scanner
2. Technitium MAC Address
Immediately wrote now to how:
# Find the location of the hotspot service provider, certainly in the area of ​​affordable hotspot network is ..
# Turn on your laptop, and also turn on your wireless network and see the wireless network system tray icon, then right click and select view avalible wireless network, and of course after that you must connect to a wireless hotspot your destination.
# After connect, right click the system tray and select status> choose details tab> look there ip given to us. Write down the ip.
# Open the program AngryIP Scanner 2.21 and enter the ip range that we will scan (ip data used were we) at the top. For example: 135.125.1.13 IP that we can then enter the ip in the first column of our range in accordance with an earlier but instead of ip numbers at the end of the first to be 135.125.1.1 and the second column write the same but the number one end was replaced with 255 to 135 125 .1.255. result is 135.125.1.1 to 135.125.1.255 and click start (red button).
# After scanning then we'll get a live ip data connected with these hotspots. after scanning is complete then see the ip of the living (alive hosts) blue right click on the live ip ip Right-click on the blue color was right click> show> mac address and there will be a code mac address (mac addresses sometimes there does not appear, select Just the other ip). Write down the mac address that we get.
# Open the program Technitium MAC Address v5 release 3 which we have prepared. There is a mac address field. well now just change the mac address with which we got earlier and press change mac id.
# Wait for our mac will be replaced and a temporary connection and connect again automatically disconnected itself.
# Go to the firefox web browser, or anything goes. Enjoy Free Internet.
One thing to remember is that our system is the transfer of passenger data to hack an account that we had.
It can outsmart the status of hotspot login page enter it (to account). For example status and so go there it looks prepaid card code number and we simply keep track of, then logout and log back into the hotspot's login page quickly enter the password earlier. This will make us can directly access the Internet without a ride again (because that make us prepaid card code) so if anyone wants to login to use the card (which had a code) when you log in using the card of course he can not enter because prepaid cards.
"Already logged".
How about it, interesting is not it?
But I suggest, as I do is to ride alone, because I do not want to go too far, like the way I Tell to log off and log in again will surely make the owner can not log in. Request permission directly is also a possibility that had not refused, the origin of his interests is urgent.
For Ip Scanning can also use the application Dude, download it here, to determine the condition of the computers connect to the hotspot. Can be tried too ya ..
Hmm, i have some usefull tools again, check it.
WEP and WPA KeyGenerator
Wireless Key Generator
run it live programs generate,, and coffee directly into the network key. ...
Or also you used this application "wifi password finder"
seach it self in search engine :D, all this is just for learning, as long as we are still able to use the legal why not wrote. And this can also be used by the hotspot owner, if in this way can still be used to break into. So it needs more security.
READ MORE

New feature from Google, "Google Wallet"

Posted by Android On Jumat, 27 Mei 2011 0 komentar

Google On 26 may 2011 in New York City office of Google, along with Citi, MasterCard, First Data and Sprint, Google gives a demo of Google Wallet, an application that will make your cell phone is your wallet. You will be able to tap, pay and save it using your cell phone is brought near a means of communication (NFC).

Google Wallet is an important part of Google's ongoing effort to improve business and consumer spending. It aims to make it easier for you to pay and save the goods you want, while the merchant provides more ways to offer coupons and loyalty programs to customers, as well as bridging the gap between online and offline commerce.

Because Google Wallet is a mobile application, it will do more than one function common Wallet or purse. You will be able to save your credit card, offers, loyalty cards and gift cards, but without the bulk. When you press to pay, your phone will automatically redeem the offers and get points for your loyalty. One day, even things like boarding pass, tickets, ID and keys can be storehttp://www.blogger.com/img/blank.gifd on Google Wallet.

Initially, Google Wallet will support Citi and Google Prepaid MasterCard Card, which can be used as payment. From the beginning, you will be able mnggunakan your phone to pay wherever MasterCard PayPass ada.Google Wallet will also sync with Google's offering, which you will be able through the NFC at participating merchants SingleTap ™, or by showing a barcode that you check out. Many traders who work to integrate the supply and loyalty programs with Google Wallet.

With Google Wallet , Google is building an open trade ecosystem, and we plan to develop an API that will allow integration with a number of partners. Initially, Google's Google will be compatible with the Nexus S 4G by Google, is available at Sprint. Over time, we plan to expand support for more phones.
To learn more please visit the Google web site Google in Google Wallet
This is just the beginning of what has been a great adventure into the future of mobile shopping.
READ MORE

Accelerate Internet Connection with Internet Speed Booster

Posted by Android On Senin, 23 Mei 2011 0 komentar

Internet Speed ​​Booster is an easy way to speed up your internet connection. With Internet Speed ​​Booster you can speed up your internet connection, utilize your memory, utilize your internet connection and change your windows settings. The main window consists of the following items: Speed ​​Booster, Net Pinger, Ram Booster and System Settings. Speed ​​Booster contais Wizard mode, Advanced mode, and Backup manager. Net Pinger contains settings Pingr. Ram Booster consists of Ram System status and configuration. System Settings contains Internet properties, System Settings, Modem Settings and Network Settings. To speed up your connection just choose one of the default connection settings and click the Optimize Now. In Backup manager every time you change your program settings will keep your old settings. You can select the backup file you want to restore or delete. PING utility helps you keep getting your modem connection is disconnected by the service provider. Most Internet Service Providers Disconnect users after a fixed period of modem activity. Ram Booster System Status option allows you to monitor your system resources. And you can optimize memory with one click. You can adjust the ram booster settings from Ram Configuration form Ram Booster. All the tools you need to be efficient on the Web! Improve and optimize your Internet connection speed with this set of tools. Net Pinger prevents you from being disconnected from your ISP. Speed ​​Booster how to optimize your PC to send and receive data over the Internet. RAM Booster allows you to free physical memory or RAM on your PC
To complete the writing of tricks internet connection, here I inform a program that can optimize your internet connection speed be it with a usb modem phone modem, or modem and other connections. This software is the Internet Speed ​​Booster, a free program developed by Onestopsoft. Internet Speed ​​Booster offers some functionality in it, namely the Speed ​​Booster, Net Pinger, Ram Booster and.

Speed ​​Booster.
Speed ​​Booster optimizes your Windows system function in terms of data transfer (upload and download). Optimization here is almost the same with some software that had previously informed me (TCPSpeed, TCP / IP Optimizer, FullSpeed, SpeedConnect, and some other software).
To optimize the speed of internet connections with Speed ​​Booster can be in two ways: the Wizard mode and Normal mode. In Wizard mode is already available optimalisasinya choice, we just select one and execute the Optimize Now button.
A second way to Normal mode, for this way, we will do the setup in a few steps (a total of 8 steps), start by selecting a type of Internet connection that we use. If we are confused fill it, do not worry, because this software will give you the option with the default answer, so stay just follow the process (unless we want to change it).

Net Pinger
Function Net Pinger is anticipating that the connection is lost (usually if you open a web page, and do not perform any activity within a certain time then the connection we would stop / cut off), Net Pinger is almost the same function as the Connection Keeper.
To enable Net Pinger, simply by checking the Enable Pinger, while for the choice of configuration (Configuration), we can choose the Automatic Mode (every one minute to ping), or Manual Mode (you set yourself how long the time interval to ping)

Ram Boosterhttp://www.blogger.com/img/blank.gif
From the name Ram Booster've seen that here serves to optimize memory usage in our PC. In the menu there are 2 Ram Booster menu options, namely the System status that indicates the use of our computer processor and memory in the form of real-time graph and the Ram Config governing the use (optimize) the existing resources automatically.

Internet Speed ​​Booster can be run automatically when you enter Windows and run it in the System tray (bottom right corner of the monitor), by selecting Settings. Mark Run Main Courses Pls Windows start-up and Run program in system tray.

download here

READ MORE

Tutorial Virtual Machine with Virtual box in your Windows

Posted by Android On Jumat, 20 Mei 2011 0 komentar
longtime kartolocyber wasnot update the article, some of us so busy in our study. okey, i'll write about virtual machine in Windows. Sometimes, there is a particular program that we want to run but is plagued with compatibility Operating System (OS). For example there are applications that we know first run on WinXP but now after a try again in Win7 not be opened (crash). Or even it could also have a special application we need to work, but teryata application can only run on Windows while Linux-based computer.

Of course, we can use the system to plant two Dual Booting OS in one computer. But sometimes this method is less practical because more needs to be prepared such as set partitioning, manage files, etc.. In addition, if one day we already do not need a second OS, then the uninstall process was not easy. All too often ended up reformatting, and that means set the partitions and file again.
Actually, there is one practical solution to this, that is by using VirtualBox. With VirtualBox, you can as if making a new computer ( virtual machine ) and install it with the OS you want (Guest OS). More great again, you can run both at the same time, moving from guest to host and vice versa with ease. If it does not need anymore, you just delete it (remove) the virtual machine without a complex process.

Well, in this article I will explain about how to create a virtual machine using VirtualBox. Because many things to be explained, for convenience, so I split them up into several sections, namely: Download & installl Virtual Box, Virtual Machine http://www.blogger.com/img/blank.gifSetup & Guest OS, and the last is the setting. In this example, I will install WinXP in a virtual machine that will be created. As for his own VirtualBox I run across operating systems Win7. So, the Guest OS and Host OS = WinXP = Win7. Here are the steps:
DOWNLOAD & INSTALL VirtualBox

First download the installer once its in here . Select according to the type of OS you use.



1. After that run its installer file. Click Next> when VirtualBox Setup Wizard appears.

2. Then you can choose the installation location. Click Next> to continue.

3.Choose anywhere you want a shortcut is created, then click Next>

4. Usually will appear warning that the connection to the network is disconnected while on during the installation process. Just click Next>.

5. Click Install to begin the installation process.

6. If UAC appears, click Yes.

7. Up here you've managed to install VirtualBox. Click Finish to run the VirtualBox program

VIRTUAL MACHINE SETUP

Next you need to do is make her a virtual machine. Click New on VirtualBox Manager to get started. You will be greeted by the New Virtual Machine Wizard. Click Next to continue. Here you will choose what type of OS you want to install as guest OS. In this example we will install WinXP. Click Next when done select the type of OS. You can determine how much memory (RAM) for the virtual machine later. Move the slider to the desired number, then click Next.For the first time, make sure you men-centang/contreng Boot Hard Disk and also select Create new hard disk, If so, click Next. Next you will go to the Create New Virtual Disk Wizard. Click Next to continue. You can choose whether the size of virtual hard disk later this magnitude can change or always remain. For savings should you choose a dynamically expanding storage. Click Next if you have selected. Here you can choose the location where the virtual hard disk will be created, it also determines the maximum size hard disk (hard disk maximum size). VirtualBox by default suggested size is 10 G. But you also can set smaller as long as you believe that size is sufficient for your needs later. Click Next. This is a Summary of the Create New Virtual Disk Wizard. Click Finish. It appears that you already have a virtual machine called WinXP, although it is still empty. Now the next task is to fill this virtual machine with the Guest OS. Double-click on the entry to start WinXP.
You will be greeted by First Run Wizard. Just click Next.Here you will select the media you will use as a source installation. In this example I use WinXP CD (bootable of course), which I enter into Drive E (DVD ROM). If so, click Next. This is a Summary of the First Run Wizard. It's good here you have prepared her to drive installer that you selected earlier. Click Finish to begin the installation process. Display WinXP installation will start out. Press Enter to continue. Select Format the partition using the NTFS file system, then press Enter. Please wait until the WinXP installation process is complete.
Congratulations, you now have a WinXP Guest OS on your virtual machine! Before you start "playing around" with this new virtual machine it's good to do some changes to the settings used to make you more comfortable in using it later. Some settings require the virtual machine in a non-active, some can only be done in the Guest OS Safe Mode. Thus, to present first shutdown the Guest OS you.

SETTING UP PROCCESS

This time will discuss about some important settings of your order the more comfortable in using your virtual machine. Make sure your virtual machine is turned off (powered off), then double-click to turn on and be prepared to press F8 as we will go into Safe Mode.

Choose Safe Mode, then Enter twice.
After entering Safe Mode, click Yes to close the window notification.
In the VirtualBox menu, select Devices -> Install Guest Additions.
It would appear the Windows Explorer . Double-click VBoxWindowsAdditions.
You will be greeted by the VirtualBox Guest Additions Setup Wizard. Click Next> to continue.
Select the installation location and click Next>.
If you plan to run an application in the Guest OS that require Direct3D (games for example), then make sure the Direct3D Support selected. If you already click Install.
Guest Additions installation process was completed. Click OK.
Click Finish to restart and get into WinXP as normal.
Next we'll create a Shared Folders. Usefulness is as a place to exchange (transfer) files between Guest and Host. The trick is to select Devices -> Shared Folders.
Click the Add button on the right side of the window.
In the Folder Path, select Other.
Specify the folder where you want shared.
Then select Auto-mount that folder directly at-shared automatically at startup.
Rekapnya be seen here. You also can create more than one Shared Folders if you wish. Click OK to finish.
Shared Folders will only begin to be used if you have to restart. But for now the Guest OS shutdown before you because we will make changes in the last settings via VirtualBox Manager.
Click Settings on the menu VirtualBox Manager.
Select the System tab on the left. Well here you can make settings memory (RAM) and also the Boot Order. In order for fast booting, select Hard Disk as the Boot Order first priority.
Select the Display tab and you can change the amount of Video Memory (VGA Card) and also activate the Enable 3D Acceleration feature. Click OK if it is.
Next run the virtual machine again. After entering Windows, try running Explorer. It appears that the Shared Folders now can be accessed.
Applications that can not be opened in Win7 are now able to run.

an explanation of the technical steps to create a virtual machine and its installation with the Guest OS using VirtualBox. In this way, we seemed to have a "new computer" is ready to run. In the world of IT, many benefits to be gained by using this VirtualBox. A Java programmer who want to create a multi-platform applications, can use VirtualBox to test programs in various OS (Windows, Mac, Linux, FreeBSD, etc.).

Or someone who is studying to be a hacker, usually also will create a virtual machine to test the efficacy of scripts or artificial virus, without having to worry about major OS that is being used also infected. You can also experiment with VirtualBox it suits your needs.
READ MORE

10 Best Tools Windows 7

Posted by Android On Minggu, 08 Mei 2011 0 komentar

Windows 7 not only attracted much attention from the press as a high-tech, but also there are many new interface changes, such as the redesigned taskbar, new file management features, libraries and others. Several tools have been enhanced which is then included with the OS. Here we discuss 10 of the best tools windows 7 which makes the job easier computing.

1. Action Center
Centralized management is hot in Windows 7 and gives you one-stop shopping site where you can take care of security, troubleshooting, and recovery, rather than searching for an applet for each part. Everything is combined in an easy to use Control Panel, where you get a maintenance and safety messages and can view performance information, change the UAC settings, and more.

This is a development from the Security Center in Windows Vista. It makes sense to combine the security settings, system maintenance, and recovery. Action Center has emerged as an icon in the system tray, which displays a red X symbol if there is a problem that needs you are looking for.

2. Problem Steps Recorder
One of the coolest new tool in Windows 7 is the Problem Steps Recorder (PSR), mainly to provide technical support to users of Windows. No matter how hard they try, but users often have problems to accurately describe their problem and steps they take before or after the experience. Sure, Remote Assistance can be a blessing in this situation. But we can not always connect to a user's computer in real time. That's when PSR come in handy.

Problem Steps Recorder is a type of software that records all actions keystrokes, mouse clicks, including screenshots etc. and save the sequence of events in an MHTML document pages. You can start by entering psr.exe PSR in the Start Search box via the command prompt option.

3. ISO burner
ISO image file is a file type that is often used to distribute software. In Windows 7, Microsoft included this as an answer to many users wish list for a long time. Now you do not need to download and install a third-party program to burn ISO files to disk. Suppose you want to create a bootable CD use this tool. This is a simple process: Once you've downloaded. ISO to your hard drive, simply double click and Windows 7 will open the Burn Disc Image dialog box to burn the disc.

4. Biometric device management
In previous Windows versions, biometric authentication and management of biometric devices (fingerprint sensor) required third party software that may or may not be well integrated with the OS. Now in Windows 7 already built in. Windows Biometric Framework, which gives developers the API that you can use to build biometrics into applications. Fingerprint sensor hardware makers, such as UPEK and AuthenTec, in cooperation with Microsoft on developing its framework. Biometric can be accessed through the Control Panel.

5. Credential Manager
Credential Manager is a new feature in Windows 7. This tool is similar in some ways premises password management features in Vista User Account but this is more sophisticated. You can manage the Windows credentials for the various computers that you are signed onto, certificate-based credentials, and others (for e-mail accounts, web accounts, etc.). This is all saved by default in Windows Vault.

Perhaps the best feature new in Credential Manager is the ability to backup anhttp://www.blogger.com/img/blank.gifd restore Vault. Microsoft recommends that you keep backing up on removable drives, such as flash drives, to back up if you experience a hardware failure. For more information, see Windows 7: Windows 7: Exploring Credential Vault Manager and Windows directly from the website.

6. Projection display and the Windows Mobility Center
If you give many presentations, you will be greeted by a new tool in Windows 7 that makes it easy for you to display projectors in the desktop Windows 7. Just press the Windows logo key + P and you will see a pop-up box where you can make the choice of presentation. The first is the default settings and displayed on computer screens only. The second clone display settings on the computer screen to the projector. A third setting to extend the desktop on both computer screen and projector, and the fourth displays only the settings through the projector and turn off the computer screen.

7. Text tuning and color calibration
Your computer might not work, but your screen is what you see throughout the day. If it does not look good, you do not get the most from your computing experience, and can even cause you eye strain. In Windows 7 there are two tools to customize the look to suit your preferences. You can access the ClearType Text Tuner from Control Panel or from the command (cttune.exe). If you have multiple monitors, you can adjust according to each monitor.

This tuning tool works much like the eye chart at the optometrist's office, and please you choose one that looks best for you. In addition to text tuner, Windows 7 provides color calibration tool. It can be accessed from the Control Panel or from the command line (dccw.exe). It helps you to adjust gamma, brightness, contrast, and color rendition on your monitor to display the best.

8. Disc Repair System
Actually, the Vista Service Pack 1 Beta already lets you easily create disc repair system with friendly graphical interface, but has been removed and re-released in the final in SP1. Windows 7 to improve this function. Just click [Start] and type [System Repair] in the Search box. Click [Create A System Repair Disc] to open the dialog box. To use the disc, please mesukkan in the drive and reboot the computer from the disk. (You may need to set the CD / DVD drive as primary boot device in BIOS) Then you will get a list of system recovery options, which include:

- Startup Repair
- System restore
- System image recovery
- Windows Memory Diagnostic
- Command prompt

9. Better backup utility
In previous Windows versions already include a backup utility, but this tool has been perfect significantly in Windows 7. Vista backup program is user friendly but not very flexible. Windows 7 provides more detailed control over what you want to backup. You can run the Backup And Restore from Control Panel or by typing a backup in the Search box on the Start menu. You can back up files to local hard disk, removable disk, DVD, or another computer on the network (origin diisinkan on the network). Then you can also choose to create a backup folder or individual libraries. You can also exclude certain folders when backing up.

10. PowerShell v2
Windows PowerShell (Figure P) is a shell command-line interface and scripting tools that make it easier for Windows administrators to automate tasks using cmdlets, which are commands that perform a single command, and scripts, which consists of several cmdlets for complex tasks , multi-step tasks. Earlier versions of Windows includes a command-line interpreter (command.com or cmd.exe), but PowerShell is much more powerful, also provided the UNIX environment, this command can automate nearly every function of the GUI.

PowerShell can be downloaded and run on Windows XP or Vista, but in Windows 7 is included in a built-in. PowerShell v2 adds about 240 new cmdlets, as well as APIs and new features, such as the ability to call the PowerShell scripts and cmdlets on remote computer. You can find out more about PowerShell on Microsoft's website.
READ MORE

New Feature in technology HDMI V.1.4

Posted by Android On Minggu, 10 April 2011 0 komentar


Technology HDMI 1.4 cables now could make you transfer Internet data in the same cable when currently transfers only video and audio data. with this solves problems for people who have an awful time connecting devices to the web and each other in the living room. I use powerline Internet adapters, which connect my DSL broadband line to my living room via power sockets. Wireless doesn’t work so well in my home. So right now, you have to switch cables from one game console to another whenever you use them. It’s a hassle.

HDMI connects devices such as Blu-ray player to a TV set with no loss in the high-definition video quality. All new TVs have the HDMI connectors, as do many other video appliances. HDMI is keeping up with the times. About 24 percent of all consumer electronics devices will require Ethernet in 2009. With more devices connected to the Internet, this new connector means that you will be able to access your content via the Internet on more of your future home devices. The Ethernet connection enables a variety of new applications, such as the ability to play a video on a Blu-ray player on any web-connected TV in your home.

Audio Return Channel so you can connect your stereo to your TV and have it play music on your TV set, even as you get rid of a cable. And HDMI 1.4 has Automatic Content Enhancement, which optimizes the settings on your TV to fit whatever movie or video you’re playing. It also has 3-D support and support for higher resolution video of 4,000 x 2,000 pixels. And another new feature is a complete color palette that allows you to connect almost any HD digital still camera and show the pictures with the highest viewing quality on your TV. Sometimes TVs don’t have the breadth of color to display still pictures well.

one more another feature is the Micro HDMI connector. This connector is about the size of a mini universal serial bus (USB) connector. It can likely be built into cell phones in the future to let you play back high-definition video recorded with a cell phone camera on a TV. I recently saw a demonstration of that at Broadcom’s offices in Sunnyvale, Calif. It looked pretty cool.

READ MORE

Windows Installer 5 on Microsoft Windows 7

Posted by Android On Rabu, 09 Maret 2011 0 komentar

Windows Installer 5.0 is available for both Microsoft Windows 7 and Windows Server 2008 R2. With Windows Installer 5.0, setup developers can use Windows Installer 5.0 to author a single installation package capable of either per-machine installation or per-user installation of the application.Beginning with Windows Installer 5.0, a package can be authored to secure new accounts, Windows Services, files, folders, and registry keys. The package can specify a security descriptor that denies permissions, specifies inheritance of permissions from a parent resource, or specifies the permissions of a new account. For information, see Securing Resources. The Windows Installer 5.0 service can enumerate all components installed on the computer and obtain the key path for the component.

Windows Installer 5.0 has been released with, and require Windows Server 2008 R2 or Windows 7. Versions earlier than Windows Installer 5.0 were released with Windows Server 2008, Windows Vista, Windows Server 2003, Windows XP, and Windows 2000.

Windows Installer 4.5 was available as a redistributable for Windows Vista RTM and Service Pack 1, Windows XP Service Pack 3 and earlier, Windows Server 2008 RTM/SP1, and Windows Server 2003 SP1 and SP2.

unlike Windows Installer 5, Windows Installer 4.5 does not support some features that enable a single installation package to be installed in either the per-machine or per-user installation context.Moreover, Windows Installer 4.5 does not support some services configuration options that can enable a package to customize the services on a computer.It also does not support some features that enable the Windows Installer to secure new accounts, Windows Services, files, folders, and registry keys.

Get Windows 7 and enjoy the new capabilities in Windows Installer 5.Note that windows 7 free download is available for students of schools enrolled in MSDN AA (Microsoft Developer Network Academic Alliance) program and free Windows 7 upgrade is available for buyers of windows vista.

READ MORE

Ramnit Virus Manual remove fixed

Posted by Android On Selasa, 08 Maret 2011 0 komentar

W32.Ramnit is a worm that infects .exe, .dll and .html files to reproduce and infect other systems. After infection, W32.Ramnit will hijack your browser to redirect you to a malicious domain. W32.Ramnit may also make contact with an anonymous third party through Internet Explorer exploits, allowing the remote attacker to violate your privacy and exert control over your computer. Many anti-malware programs have been unable to detect W32.Ramnit in some instances; severe infections can necessitate a complete system wipe to remedy the situation. Be cautious about worms like W32.Ramnit when on large networks or using removable media, and strive to delete W32.Ramnit quickly before it becomes too difficult to remove.

first things W32.Ramnit does is infect any .exe, .dll, or .html files W32.Ramnit can find. If you open these infected files, congratulations - now you've got W32.Ramnit, too! W32.Ramnit may also create concealed Autorun.inf files that are placed on various drives, including removable ones. Any computer that then accesses these drives will also get the W32.Ramnit worm.

Different versions of W32.Ramnit have been identified as a threat since January of 2010, and the worm is far from exterminated yet. Fortunately, indicators of W32.Ramnit's presence are sufficiently plain that you ought to see W32.Ramnit before it's been on your system too long. Deleting W32.Ramnit with sufficient quickness can mean the difference between your computer surviving without damage and your computer needing a complete hard drive wipe.

W32.Ramnit may also be detected under the slight variant names of W32.Ramnit.A and W32.Ramnit.B.

Backup Reminder: Always be sure to back up your PC before making any changes.


To remove W32.Ramnit, you must first stop any W32.Ramnit processes that are running in your computer'ds memory. To stop all W32.Ramnit processes, press CTRL+ALT+DELETE to open the Windows Task Manager. Click on the "Processes" tab, search for W32.Ramnit, then right-click it and select "End Process" key.

To delete W32.Ramnit registry keys, open the Windows Registry Editor by clicking on the Windows "Start" button and selecting "Run." Type "regedit" into the box and click "OK." Once the Registry Editor is open, search for the registry key "HKEY_LOCAL_MACHINE\Software\W32.Ramnit." Right-click this registry key and select "Delete."

Finally, to completely get rid of W32.Ramnit, you must manually remove other W32.Ramnit files. These W32.Ramnit files can be in the form of EXE, DLL, LSP, TOOLBAR, BROWSER HIJACK, and/or BROWSER PLUGIN. For example, W32.Ramnit might create a file like
%PROGRAM_FILES%\W32.Ramnit\W32.Ramnit.exe. Locate and remove these files.

READ MORE

Motherboard won't Booting fixed method

Posted by Android On Jumat, 25 Februari 2011 0 komentar

Motherboard won't work properly problem is most likely a software one and NOT a hardware problem. You should, of course, check that all the cooling fans are working (especially the ones on the processor and the video card) in case overheating is a problem. If you have two or more sticks of RAM which are from different manufacturers you could try using them one at a time in case a RAM mismatch is causing the problem. But other than that the only real way to see if it's a software or a hardware problem is to try running it with a fresh, clean installation of Windows.

Extra storage space is always worth having and they're quite inexpensive. Swap your current drive out, put the new one in, and load Windows onto it. If all runs fine you know for certain that the problem is in your original Windows installation. If not you've got a second hard drive to use once you track down the hardware problem and fix it!

if the machine won't start afterwards you've got clues to where the problem lies. Remove the recently added device or component and try again. If it still won't start have a good look inside to ensure you haven't dislodged or damaged some other component while you were working in there. Make sure everything is firmly in place.

When you make changes to the hardware of a PC you need to physically reset the CMOS memory, either by 'shorting' a jumper on the mainboard or by removing the CMOS battery and waiting several minutes at least before replacing it. A vast number of instances where machines won't start up are simply the result of changes made without resetting CMOS afterwards.



Modern ATX motherboards still have power running through them after Windows has been shut down! You must either switch off at the wall outlet or remove the power cord before opening it up to perform internal work. Damage to components can ensue if you make hardware changes when the motherboard is still receiving power.

Even without a hard drive fitted, your machine should run the Power On Self Test. If it doesn't, then it is either incorrectly assembled or it contains a faulty component. You should be getting the memory check, the device detection information, and perhaps an 'Operating System not found" message.

although PCs are quite easy to assemble, putting the whole thing together before trying it to see if it works is far from the ideal approach. If the entire PC is fully assembled, tracking down the reason for the failure can become a nightmare. The 'bare bones' approach is far better when assembling, and far better when troubleshooting. If your system is already fully assembled, go back several steps and try again.

The 'bare bones' PC contains only the following components:

- Motherboard
- Processor
- Processor heatsink/fan unit, connected to power
- A video card if there is no onboard video available
- One RAM module (unless the RAM is of a type which requires installing in pairs. 'Dual channel' RAM is NOT such a type!)
- The front panel connectors for Power Switch, Power LED and case speaker attached to the motherboard
- The ATX connector connected and supplying power to the motherboard. - The P4 power connector attached also if required. A molex connector attached to the display card if required.

That's it. Attach monitor and keyboard and see if it'll POST. Reset CMOS and try again if it doesn't. If you are building a new system stop at this point and try it out. If you're troubleshooting a fully assembled PC strip it back to this point and try!

If the PC won't POST in this configuration you need to determine why before proceeding:

*check power switch and LED connectors. If they are reversed the system won't start
* check that the processor is correctly fitted
* try a different RAM module
* ensure that the display card is correcxtly seated.
* get a technician to check it over if you can't locate the cause

Once the 'bare bones' system is operational, add other components one by one. Try starting the machine after every addition to check that it will still POST. This is the ONLY procedure by which you can adequately and effectively troubleshoot where a hardware problem lies.
'Other components' includes additional RAM modules, add in cards, drives, etc.
If your are troubleshooting a system which has already had Windows installed to a hard drive, add that drive last so that the system doesn't continually try to boot into Windows.
If you strike problems and need to post a new thread about your problem, include the following information:

* Identification details (make and model) of all components
* Full details of any onscreen error messages
* Full description of any BIOS 'beep' codes emitted through the internal speaker.

READ MORE

Sejarah berdirinya joomla

Posted by Android On Selasa, 08 Februari 2011 0 komentar
Apa itu cms joomla, cms joomla adalah sebuah paket web instant yang bias anda langsung nikmati seperti halnya cms-cms lainnya, sebelumnya cms joomla bukan bernama joomla melainkan bernama “mambo” yang di buat pada tahun 2000 oleh Rice Studio, formely Miro yang ketika itu membangun source CMS. Setahun setelah itu mambo melisensikannya menjadi 2 licensi, dengan salah satunya adalah Open source yang lebih dikenal sebagai “Mambo Site Server”.

Pada tahun 2002 “Mambo site server” diberi nama ulang menjadi “Mambo Open source” dan pada tahun 2003 hak ciptanya di publikasikan ke Open Source Community pada tahun 2003, dan pada tahun 2005 versi komersial mambo di beri nama ulang “Jango” dan pendirinya tetap Rice Studio, Formely Miro perusahaan NonProfit tetap sebagai Pendirinya.

Tidak lama setelah peluncuran “Jango” group utama dari para developer meluncurkan kepada public Mambo Open Source kepada public untuk diberikan kepada para peminat jenis cms ini, dan kemudian sebuah organisasi NonProfit yang bernama Open Souce Matter mengambil alih project ini Mambo Open source.

Dan pada tahun 2005 terjadi perpecahan didalam pendiri project pengembangan mambo opensource, dan pada saat itu pimpinan tim utama pengembang mambo Andrew eddie pada bulan agustus 2005 memilih meninggalkan mambo, dan kemudian meulis surat umum pengunduran dirinya di sebuat situs communitas mambo di mamboserver.com, dan selanjutnya pengembang membuat situs opensourcematters.com yang digunakan untuk mendistribusikan informasi kepada pengembang, desain web dan komunitas.

Pada 17 September 2005 Joomla pertama kali di luncurkan dan dipublikasikan dengan versi awal joomla 1.0.0 yang mirip dengan mambo 4.5.2.3, nama joomla itu sendiri di ambil dari kata Swahili yang artinya “bersama-sama” dan pada tahun 2007 versi joomla 1.5.x joomla baru membuat perbedaan yang cukup jauh dengan mambo  namun tetap support dan kompetible dengan mambo, dan joomla juga memperkenalkan Model View Controllernya, dengan perubahan ini para developer pengembang joomla dan component bisa lebih mengembangkan  joomla menjadi lebih powerfull.


READ MORE

Tutorial membuat script anak alay

Posted by Android On Rabu, 02 Februari 2011 0 komentar

Ada apa dengan judul nya aneh pasti bukan tapi memang itu kenyataannya kali ini saya akan memberikan tutorial membuat script anak alay.. untuk iseng2 aja ya haha.

Set wshShell =wscript.CreateObject("WScript.Shell")
do
wscript.sleep 100
wshshell.sendkeys "{CAPSLOCK}"
wshshell.sendkeys "{NUMLOCK}"
wshshell.sendkeys "{SCROLLLOCK}"
loop

1. Copy code diatas ke notepad
2. save dengan extensi *vbs
3. jalanin
4. Sekarang coba buat ngetik Ahii..hii..hiii
efek code ini adalah: Lampu keyboard ane kedap-kedip terus klu ane ngetik hurufnya GEDE kecil- GEDE kecil.



uia klu mau balikin teken "Ctrl + Alt + Del" (taksmanager)
End prosess di "wscript.exe"

sElaMaT mEncObA
READ MORE

Free download MODUL CISCO BAHASA INDONESIA

Posted by Android On 0 komentar

Oke kali ini saya akan menyajikan sebuah ebook yang sangat berguna dan bermanfaat bagi kalian semua dalam belajar cisco, tidak perlu bisa bahasa inggris dalam mempelajari ebook ini karena ebook ini dalam bahasa indonesia dan anda bisa mendownloadnya secara langsung dan free hanya di tutorial dan software

DOWNLOAD EBOOK CISCO
READ MORE

Tutorial modifikasi 30 Regedit

Posted by Android On 0 komentar
Kali ini blog tutorial dan software akan memberikan anda tutorial mengedit regedit anda.. dan sudah pernah saya terapkan pada komputer dirumah.. selamat mencoba

1. Tampilan Lama Fungsi Search

HKEY_CURRENT_USER\Software\Microsoft\Windows\Curre ntVersion\Explorer\CabinetState
Klik menu Edit > New > String Value dan beri nama UseSearchAsst. Double klik UseSearchAsst dan masukkan angka 1 pada Value Data.

2. Menyembunyikan Menu Find

HKEY_CURRENT_USER\Software\Microsoft\Windows\Curre ntVersion\Policies\Explorer
Klik menu Edit > New > DWORD Value dan beri nama NoFind. Trus double klik pada DWORD Value tersebut dan berikan angka 1 agar aktif. Restart komputer.

3. Menyembunyikan Menu Run

HKEY_CURRENT_USER\Software\Microsoft\Windows\Curre ntVersion\Policies\Explorer
Buat DWORD Value baru dan beri nama NoRun. Double klik dan berikan angka 1 sebagai Value Data.

4. Login Otomatis

HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon
Double klik AltDefaultUserName dan masukkan username account yang dipilih. Double klik AutoAdminLogon dan masukkan angka 1 pada Value Data. Buat sebuah DWORD Value baru dan beri nama DefaultPassword. Double klik DefaultPassword dan masukkan password account yang dipilih pada Value Data.

5. Menyembunyikan Menu My Pictures Dari Start Menu

HKEY_CURRENT_USER\Software\Microsoft\Windows\Curre ntVersion\Explorer\Advanced
Double klik pada Start_ShowMyPics dan masukkan angka 0 pada bagian Value Data.

6. Memunculkan Menu Administrative Tools

HKEY_CURRENT_USER\Software\Microsoft\Windows\Curre ntVersion\Explorer\Advanced
Double klik pada StartMenuAdminTools dan berikan angka 1 pada Value Data.

7. Memperkecil Icon Start Menu

HKEY_CURRENT_USER\Software\Microsoft\Windows\Curre ntVersion\Explorer\Advanced
Double klik pada Start_LargeMFUIcons dan masukkan angka 1 pada Value Data.

8. Menghilangkan Username Pada Start Menu

HKEY_CURRENT_USER\Software\Microsoft\Windows\Curre ntVersion\Policies\Explorer
Pilih Edit > New > DWORD Value dan beri nama NoUserNameInStartMenu. Double klik NoUserNameInStartMenu dan masukkan angka 1 pada Value Data.

9. Mencegah Perubahan Menu Start

HKEY_CURRENT_USER\Software\Microsoft\Windows\Curre ntVersion\Policies\Explorer
Buat sebuah DWORD Value baru dan beri nama NoChangeStartMenu. Double klik NoChangeStartMenu dan masukkan angka 1 pada Value Data.

10. Mengubah Nama Default Shortcut Penting Di Desktop

HKEY_CURRENT_USER\Software\Microsoft\Windows\Curre ntVersion\Explorer\CLSID
Double klik pada default value pada masing-masing subkey:
My Network Places:
{208D2C60-3AEA-1069-A2D7-08002B30309D}
My Computer:
{20D04FE0-3AEA-1069-A2D8-08002B30309D}
My Documents:
{450D8FBA-AD25-11D0-98A8-0800361B1103}
Recycle Bin:
{645FF040-5081-101B-9F08-00AA002F954E}
Default IE Icon:
{871C5380-42A0-1069-A2EA-08002B30309D}
Masukkan nama sebagai pengganti deault.

11. Menyembunyikan Icon Di Desktop

HKEY_CURRENT_USER\Software\Microsoft\Windows\Curre ntVersion\Explorer\Advanced
Double klik pada HideIcons dan masukkan angka 1 pada Value Data.

12. Menyembunyikan Semua Icon Pada Desktop

HKEY_CURRENT_USER\Software\Microsoft\Windows\Curre ntVersion\Policies\Explorer
Buat sebuah DWORD Value baru dan beri nama NoDesktop. Double klik pada NoDesktop dan masukkan angka 1 pada Value Data.

13. Membuat Desktop Lebih Stabil

HKEY_CURRENT_USER\Software\Microsoft\Windows\Curre ntVersion\Explorer
Buat sebuah DWORD Value baru dan beri nama DesktopProcess. Double klik DesktopProcess dan masukkan angka 1 pada Value Data.

14. Menghilangkan Info Tip Pada Icon Folders Di Desktop

HKEY_CURRENT_USER\Software\Microsoft\Windows\Curre ntVersion\Explorer\Advanced
Double klik pada FolderContentsInfoT ip dengan angka 0.

15. Mengunci Taskbar

HKEY_CURRENT_USER\Software\Microsoft\Windows\Curre ntVersion\Explorer\Advanced
Double klik pada TaskBarSizeMove dan masukkan angka 0 pada Value Data.

16. Menonaktifkan Klik-kanan Pada Desktop

HKEY_CURRENT_USER\Software\Microsoft\Windows\Curre ntVersion\Policies\Explorer
Buat sebuah DWORD Value baru dan beri nama NoViewContextMenu. Double klik pada NoViewContextMenu dan masukkan angka 1 pada Value Data.

17. Merubah Waktu Delay Membuka Menu

HKEY_CURRENT_USER\Control Panel\Desktop
Double klik pada MenuShowDelay dan ubah angka milidetik yang semula 400 menjadi angka lain. Semakin kecil semakin cepat.

18. Merubah Ukuran Icon Di Desktop Dan Start Menu

HKEY_CURRENT_USER\Control Panel\Desktop\WindowMetrics
Double klik pada Shell Icon Size dan ubah angka 32 menjadi angka lainnya, misalnya 10.

19. Merubah Warna Windows

HKEY_CURRENT_USER\Control Panel\Colors
Double klik Window dan masukkan kombinasi warna RGB.

20. Mengganti Warna Teks Dalam Windows

HKEY_CURRENT_USER\Control Panel\Colors
Double klik WindowText dan masukkan kombinasi warna RGB.

21. Menghilangkan Tanda Anak Panah Pada Icon Shortcut

HKEY_CLASSES_ROOT\Inkfile
HKEY_CLASSES_ROOT\piffile
Rubah nama IsShortcut menjadi IsShortcuts.

22. Mengubah Tombol Kiri Menjadi Tombol Kanan Pada Mouse

HKEY_CURRENT_USER\Control Panel\Mouse
Double klik pada SwapMouseButtons dan berikan angka 1 pada Value Data.

23. Merubah Kecepatan Repeat Rate Keyboard

HKEY_CURRENT_USER\Control Panel\Keyboard
Double klik KeyboardSpeed dan masukkan nilai yang diinginkan. Semakin tinggi angkanya, maka semakin cepat Repeat Rate-nya.

24. Status Bar Pada Notepad

HKEY_CURRENT_USER\Software\Microsoft\Notepad
Double klik StatusBar dan masukkan angka 1 pada Value Data.

25. Memperkecil Ukuran Thumbnail Untuk Windows Explorer

HKEY_CURRENT_USER\Software\Microsoft\Windows\Curre ntVersion\Explorer
Pilih menu Edit > New > Binary Value dan beri nama ThumbnailSize. Double klik ThumbnailSize dan masukkan angka 20 pada Value Data.

26. Menyembunyikan Drive

HKEY_CURRENT_USER\Software\Microsoft\Windows\Curre ntVersion\Policies\Explorer
Pilih Edit > New > DWORD Value dan beri nama NoDrives. Double klik NoDrives dan tentukan drive mana yang ingin disembunyikan pada Value Data. Kombinasi angka pada Value Data sebagai berikut:
A: 1
B: 2
C: 4
D: 8
E: 16
F: 32
G: 64
H: 128
I: 256
J: 12
K: 1024
L: 2048
M: 4096
Semua: 67108863

27. Menampilkan kartu musuh (game hearts)

HKEY_CURRENT_USER\Software\Microsoft\Windows\Curre ntVersion\Applets
Klik menu Edit > New > Key dan beri nama Hearts. Klik menu Edit > New > String Value dan beri nama ZB dan isikan angka 42 pada Value Data. Buka game Hearts pada Start Menu > All Programs > Games. Setelah memasukkan nama pemain, tekan kombinasi tombol berikut: Ctrl+Shift+Alt+ F12 dan semua kartu akan terbuka.

28. Mempercepat Proses Shutdown Windows XP

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Contro l
Double klik WaitToKillServiceTi meout dan ubah nilainya menjadi lebih rendah dari 2000.

29. Menonaktifkan Fungsi AutoRun

HKEY_CURRENT_USER\Software\Microsoft\Windows\Curre ntVersion\Policies\Explorer
Double klik NoDriveTypeAutoRun dan masukkan angka 95 pada Value Data.

30. Mematikan Secara Otomatis Program Not Responding

HKEY_USERS\.DEFAULT\Control Panel\Desktop
Double klik AutoEndTasks dan masukkan angka 1 pada Value Data.

100% Work pda Win XP
READ MORE

Tips dan cara telp gratis lokal dan interlokal

Posted by Android On 0 komentar

kali ini tutorial dan software akan memberikan tips dan triks dalam menelpon gratis melalui telp rumah.. dan telp coin... tapi jika gagal mohon maaf mungkin anda kurang beruntung.. tapi tidak ada salahnya anda mencoba.. hanya di tutorial dan software.

I. Trik telphon gratis Lokal (dalam kota)

Fasilitas dan cara yang digunakan:
Telphone umum koin yang masih hidup
Pencet angka 1551 <— catatan: angka 1 terakhir di pencet lama hingga ada nada “tut/nit/nada sela lainnya”
Bila tanda itu telah bunyi baru tekan nomor yang dituju ( nomor telphone lokal)
dan anda akan mendapatkan sambungan langsung dari telkom ke no telp yang dituju, maka anda bisa bicara sepuas bibir anda.

note: UNTUK NOMOR LOKAL YANG TIDAK BISA DIHUBUNGI BIASANYA
DIKARENAKAN:
TERLALU BANYAK NOMOR YANG KEMBAR
TERLALU BANYAK ANGKA DOMINAN BESAR MISAL 8997896/89868789/ dll
DAN BILA TELEPHONE YANG DITUJU BELUM TERPASANG
TELKOM SEDANG KENA TROUBLE Laughing.gif

II. TRIK TELEPHONE GRATIS INTERLOKAL (LUAR KOTA)

Fasilitas dan cara yang digunakan:
Telphone rumah, kantor atau wartel tipe B (sangat dianjurkan)
Telphonelah seperti kita menelephone biasa ke NOMOR TUJUAN LUAR KOTA (khusus luar kota)
Bicaralah sepuas hati dan sebengkak bibir anda
Bila telah selesai percakapan …

PERHATIKAN TRIK INI:
TRIK 1.
SEBELUM ANDA MENUTUP TELEPHON, KETIKLAH NOMOR TUJUAN PERSIS SEPERTI NOMOR YANG DITUJU PERTAMA misal: tujuan 021888555000 -> bila telah selesai ketikan 021888555000 lagi
JANGAN PAKAI TOMBOL RADIAL, KARENA SERING GAGAL

TRIK 2.
SEPERTI CARA TRIK PERTAMA TADI CUMAN KITA RUBAH NOMOR TUJUAN AKHIR misal: tujuan 021888555000 -> bila telah selesai ketikan 031545552222 (BEDA NOMOR TUJUAN)
JANGAN PAKAI TOMBOL RADIAL, KARENA SERING GAGAL
CATATAN: HATI² DALAM MELAKUAKN AKSI INI KARENA SANGAT MERUGIKAN LAIN PIHAK. JANGAN SEKALI² GUNAKAN WARTEL TIPE A UNTUK MELAKUKAN
TRIK II TELEPON GRATIS KE LUAR KOTA KARENA AKAN KELIHATAN PADA KOMPUTER BILLING OPERATOR D DAN PASTI ANDA DICURIGAI KARENA PULSA AKAN HILANG BEGITU SAJA DARI LAYAR MONITOR OPERATOR WARTEL.
JANGAN SERING² MENGGGUNAKAN TRIK INI, KARENA AKAN
MERUGIKAN “PIHAK LAIN”

===========================================
READ MORE

Tutorial Unlock HP Cdma flexi Haier C6000

Posted by Android On 0 komentar
Pernahkah terpikir di pikiran anda ingin unlock hp tipe flexi CDMA Haier C6000 oke kali ini blog tutorial dan software akan memberikan caranya bagaimana agar anda bisa unlock hp flexi anda agar bisa di pasangi kartu cdma


Handphone CDMA Haier C6000 memang dibundel dengan paket Flexi. Namun siapa sangka HP ini bisa dipake buat kartu yang lain? Dengan begitu kita bisa pilih-pilih kartu sesuka kita. Apalagi bagi pengguna internet, dengan kombinasi kartu yang tepat, HP ini bisa jadi alternatif nge-net murah.

Sebelumnya, Anda perlu membuka kunci (baca= unlock) HP ini biar bisa dipasangkan dengan kartu CDMA selain Flexi. Ternyata produsen Haier cukup berbaik hati dengan menyertakan kode unlock ini dalam versi C6000. Caranya gampang banget, ikuti langkah-langkahnya berikut ini.

Sebelumnya, pastikan kondisi batre HP Anda masih dalam kondisi cukup.
Ketik “*32#00#” (tanpa tanda kutip) dan akhiri dengan tombol Dial
Pilih opsi “Minlock Off”
Restart HP dan selanjutnya Anda sudah bisa gunakan kartu CDMA lain.

Selanjutnya Anda tinggal pilih provider yang Anda suka. Saya dengar, StarOne punya paket Internet murah. Saya yakin Anda sendiri sudah punya pilihan tersendiri. Namun, terlepas dari itu semua, HP ini patut dipertimbangkan sebagai prasarana alternatif koneksi akses internet via HP. Selain harganya murah, dengan kombinasi kartu perdana yang tepat kita ga perlu jauh-jauh ke warnet hanya untuk sekedar mengakses internet.
READ MORE

Tutorial Unlock Hp Esia Huawei C2061

Posted by Android On 0 komentar
Apakah anda bosan memakai operator esia dan ingin berpindah haluan ke operator CDMA lainnya, berikut ini adalah tutorial bagaimana unlock hp esia hanya di tutorial dan software

add Notes: Me restore Default Setting :

Kode : # # 2 5 8 7 4 1

Kemudia tekan send : berfungsi untuk me Restore Default work 100%

(kembali ke setingan pabrikan awal)

Kode : # # 4 1 2 3 6 5

Kemudia tekan send : berfungsi untuk masuk ke

Debug Screen

System Test

S/W Version

Setelah berada di dalam pilih Sytem Test lalu pilih 5, pada saat ditanya SPC kode

Ketik : 0 0 0 0 0 0

Setelah itu terserah mau di apakan dengan NAM Programmingnya.

UnLock HP Huawei C2601 (Bundle Esia Rp.199.000,-)

Hanya untuk versi firmware 3 Agustus 2007
Lihat versi huawei caranya :

Menu > Setting > Phone Setting > Lihat, bila ada tanggal 3 Agustus 2007, berarti Ok
UnLock Security

- Masukan Kartu yang igi anda pakai missal flexi

- Hidupkan HP

- Bila muncul pesan “MIN diluar jangkauan” berarti Hp anda belum bisa di Unlock

- Bila muncul pesan “silahkan masukan SID yang valid” berarti bisa di Unlock

- Ketik ##412365 (ini emergency code), kemudian tekan CALL

- Pilih SYSTEM TEST

- Kemudian pilih NAM PROGRAMING

- Masukan SPC Code : 000000

- Kemudian selanjutnya tekan OK saja hingga muncul SID .. isi 10496 (ini bila menggunakan kartu flexi)

- Bila menanyakan SID kembali, hapus SID yang ada, kemudian isi SID nya dengan : 000000

- Tekan OK hingga ada menu 1.COMPLETE 2.CONTINUE, pilih COMPLETE

OK sekarang Hp.anda sudah memakai Flexi
READ MORE

Tutorial menyambung kabel USB dengan kabel UTP

Posted by Android On 0 komentar
Kali ini tutorial dan software akan memberikan anda sebuah tutorial yang mungkin nantinya anda bisa menggunakannya jika suatu saat anda membutuhkannya, dan sangat cocok bagi anda yang ingin membuat kabel USB berukuran puaaaaaaaaaaaannnnnnnnnjanggggggggg hehe.. oke ini dia tutorialnya:
Skema sambungan kabel USB dan UTP
Bahan yang diperlukan :
1. Kabel UTP
2. Kabel USB
3. Selotip
4. Pipa kecil

Urutannya :
(UTP) Putih Biru -> Putih (USB)
(UTP) Hijau -> Hijau (USB)
(UTP) Orange+Putih Orange -> Merah (USB)
(UTP) Putih Hijau+Biru+Putih Coklat+Coklat -> Item (USB)

Pertama - tama ikat sementara kabel UTP yang akan digunakan agar tidak mengganggu dalam proses penyambungan kabel USB nantinya (lihat gambar dibawah)
 Potong kabel USB menjadi dua dan bentuklah seperti gambar dibawah
 Pisahkan dan kelompokkan kabel UTP menjadi 4 bagian yang nantinya disambung dengan kabel USB. Bagian-bagian ini adalah :

- Putih Hijau
- Hijau
- Putih Orange , Orange
- Biru, Putih Biru, Coklat, Putih Coklat

Masukkan pipa kecil yang akan digunakan sebagai penguat kabel seperti gambar berikut
 Sambungkan kabel UTP dengan kabel USB dengan penyambungan sebagai berikut (lihat gambar) :

USB / UTP
=====================
Putih / Putih Hijau
Hijau / Hijau
Merah / Putih Orange , Orange
Hitam / Biru, Putih Biru, Coklat, Putih Coklat

 Rekatkan pipa kecil dengan kabel UTP agar sambungan kabel UTP dan USB ini kuat dan tidak mudah dimasuki air seperti gambar berikut

Oke sekian tutorial dari saya
READ MORE

Free download ebook 1000 Bestever Great Hacking Tutorials

Posted by Android On Selasa, 01 Februari 2011 0 komentar

Oke kali ini tutorial dan software akan memberika lagi sebuah kumpulan ebook hacking namun dalam bahasa inggris.. bagi anda yang ingin mendownloadnya bisa klik link di bawah ini
DOWNLOAD EBOOK 1000 Bestever Great Hacking Tutorials

Daftar isi:
Create Bootable XP SP integrated CD,Create One-click Shutdown & Reboot Shortcuts
Creating a Board aka Forum on your own PC
Creating Universal Ghost Usb Boot Disk And Cd
Data Capacity of CDs [Tutorial]
Debug, Learn how ***** windows
Delete An undeletable File
Delete Files From The Recent File List In Windows
Digital Camera Guide
Digital Faq -learn Everything About Digital, Capture, Edit, Burning and more
Digital Photo Id Cards, Greate Info
Direct Link To Any Page You Want To In
Directx Explained
Disable Compression On Xp, NTFS partition, Disk Cleanup
Disable The Send Error Report, to Microsoft
Disable Windows Logo Key
Discover New Music You'll Probably Love
Download Free Music legally,, legally
Download from a paypal site without paying a penny!
Download From Ftpz, Using Ftp Search Sitez
Download Mp3's Without Using Filesharing
Download Music And Video With ,edia Player9, quick and easy!
...and much more!!!
Includes the following:
Create Bootable XP SP integrated CD,Create One-click Shutdown & Reboot Shortcuts
Creating a Board aka Forum on your own PC
Creating Universal Ghost Usb Boot Disk And Cd
Data Capacity of CDs [Tutorial]
Debug, Learn how ***** windows
Delete An undeletable File
Delete Files From The Recent File List In Windows
Digital Camera Guide
Digital Faq -learn Everything About Digital, Capture, Edit, Burning and more
Digital Photo Id Cards, Greate Info
Direct Link To Any Page You Want To In
Directx Explained
Disable Compression On Xp, NTFS partition, Disk Cleanup
Disable The Send Error Report, to Microsoft
Disable Windows Logo Key
Discover New Music You'll Probably Love
Download Free Music legally,, legally
Download from a paypal site without paying a penny!
Download From Ftpz, Using Ftp Search Sitez
Download Mp3's Without Using Filesharing
Download Music And Video With ,edia Player9, quick and easy!

Download Timeframes
Dual Boot After The Fact
Dvd Copying-ripping Definitions
DVD Regions Information
Dvd-9 to Dvd+r Dl, Double Layer To Double Layer, 1-1 copies
Easily Disconnect-reconnect From Broadband
Easily Find Serial Numbers On Google, easy to do and works like a charm
Ebay Hack*****tip
General Keyboard Shortcuts
Get In Windows 2000 As Administrator
Get the Most Out of Your DVD Recorder
Get The Music You Want To Hear
Get unlimited bandwidth from your host for free
Getting A 1gb China Account
Getting Counter-strike Source To Work
getting movies, mp3,games using google
Getting older programs to run on Windows XP
Getting started with Linux for nOObs!
Go to Windows updates anonymously
Google ***** Search
Google secrets
Google Tips & Tricks, (utilizing search engine)
Graffiti On Walls 4 Adobe Photoshop Cs 8.0
Guide For Getting Free Stuff
Guide to IIS Exploitation
Guide to Slipstreaming Service Pack 2
Hard drive Gone Bad
Hardware Firewall
How To Add An Option To Print, the Contents of a Folder!
How To Add Your Own Windows Tips
How to Back Up the Registry
How To Backup Ps2 Games
HOW TO BLOCK PEOPLE ON WINMX WHO SHARE NOTHING
How To Block Websties Without Software, block websites
How To Boot Xp Faster (updated)
How to build a black box
how to burn quicker in windows xp
How to Bypass BIOS Passwords
How To Bypass Web Filters, tutorial
HOW TO CAPTURE STREAMING MEDIA
How To Change A Cmos Battery
How to change the serial number used in Windows XP, Valid for XP Corporate
How To Change Thumbnail Size And Quality
How to clear Bios info 2
How to clear Bios info
How To Convert File System, fat - fat32 to ntfs
How To Copy A Dvd Which Will Play On A X Box
How to copy songs from your iPod to your PC
How To Customise Your start Button
How To Delete Those Persistent Nasty Files
How To Directly Go To Inbox, Write Msg, w , no need for
How to find MP3's real quickly
How To Find Serial Numbers On Google
How to fix corrupted files in XP
How to fix Windows Installer problem
How To Get A Free I-pod Or Flat Screen Tv, check it out
HOW TO GET ANY WINDOWS PASSWORD
How to Get someones ISP password, Get free internet
How To Get Top Ranking, Search Engines
How To Hack Windows Xp Admin Passwords
How to hack-change your Windows XP Boot Screen
how To Hide Yourself From Network Users, and give access to only specific users!
How To Make An Animted Logo
How To Make Free Phone Calls
How to make key generators
How To Make Perfect Copies Of Maxis The Sims Discs, CloneCD Style!
How To Make XP Go Faster
How To make your own Radio Station 2
How To Make Your Own Radio Station
How to Remove DRM Protection for Video Files
How To Remove Ms Java Vm And Install Sun Java
How To Remove Signin Details Of Msn Passport
How To Remove The Default Admin$ Shares
How to remove the Links folder in IE Favorites
How to Remove WinXP Splash and See Operations
How To Rename Extensions With Ease, with a Renamer.bat file!
How to Rename File Extensions
How To Rename Multiple Files In Winxp
How To Restrict Login Hours Allowed
How to safeguard your files when computer crashes
How to save Windows xp updates
how to search google forlinks
How To See Hidden Files, Using Dos
How To Set search For All Files In Winxp
How to set up a http server running from you computer
How To Set Up A Proxy In get, As Requested
How to set up a server with Apache , PHP , MySQL , Perl , phpMyAdmin
How To Set Up Direct Connect
HOW TO SET UP FTP SERVER
How To Set Up Proxies In Your Browser
How To Set Zone Alarm Settings!, Fix for ZA ports
How To Setup Your Own Dns (Domain Name Server)
How To Speed Up A Slow Computer
How To Speed Up Http Requests On Internet Explorer, as above
How To Stop Spam
How to swear in all languages
How To Unload Cached Dll Files To Free Memory
How to Use and How to Chain Multiple Proxies!
How To Use File Compression In Windows Xp
How To Use Google To Download Mp3's, and applications.....
How To Use Newsgroups
How To Use You Gmail With Msn Messenger
How-to Get Videos And Dvds Onto Your Sony PlayStation Portable (PSP) for free
HOWTO Change Windows XP Home to Windows XP Pro
Important Faqs For Sp2
Improve Doom 3's Performances!!, simple but efficient trick for every1
Improve your dialup modem preformance
Increase XP Folder Settings
Insert Your Serial For Office 2k, auto install office
Install A New Hard-disk
Install Xp From Dos
Installing Apache on Windows
Installing Gentoo Linux, Amazing step by step tutorial
Installing IIS On Windows Xp Pro
Installing Slackware Linux
Instructions For Removal Of Advertising In Msn Messenger
Ip Address Structure, Expilinatin OF IP Address {A short way}
Irc How To Downlaod From, How to downlaod from IRC
Irc Servers On nix, For people who want to start own IRC net
Keep Files Private
Keep Folders Hidden
Keyboard Shortcuts Result in Excel 2000 - Movement
Keyboard Shortcuts, Microsoft Word
Keyboard Shortcuts, must read
Kill Microsoft Instant Messenger
Lamination Tips, Its a Fast TUT......
Leet Way To Get Your Ip In Windows Xp
Linking Your Xbox To Your Computer
Linux Howto's
List Of Sites Not To Go To
Little help for anonymous mailer
Lots Of Windows Xp Tips, Take A Look!
Lyrics With Google
Make A Autorun File For Ur Cd
Make A Batch File To Clean UR PC!!, All In One!!
Make A Roughly 16 Hour Video Dvd
Make Acrobat Reader 6 load faster.txt 0.42 kB
Make Dvd Iso From Suse 9.2 5 Cds Iso, Linux mode and Windows mode ISO creation
Make Mp3 Files Smaller Without Losing Quality
Make Your Own Ringtones For Phone, also logos, wallpaper, etc
Make Your Pc Faster, Guaranteed
MakeXPgoFaster
making a .cue file, in notepad
Making A .txt Executable Server
Making Bootable Floppy Disk to Boot into Windows
Making Cd Version Of Doom3 Into Dvd Version
Making Web Page Fonts Consistent and Uniform
Manage Saved Ie Passwords
Mastering The Windows XP Registry
Maximize Dial-up Modem Settings
Microsoft's Really Hidden Files, Reveled Hidden files
mIRC Not Just Another Chat Client, Download Anything You Want Almost
mIRCcommands
Misc Linux Tips & Tricks
Missing Administrator Account
Secret Codes
Modify .exe Files And ***** A Program
More Hacking/A beginners guide to Hacking UNIX
More Hacking/A *****ing Tutorial/C101-90.000
More Hacking/A *****ing Tutorial/C101-90.001
More Hacking/A *****ing Tutorial/C101-90.002
More Hacking/A *****ing Tutorial/C101-90.003
More Hacking/A *****ing Tutorial/C101-90.004
More Hacking/A *****ing Tutorial/ED!SON.NFO
More Hacking/A Guide to Internet Security- Becoming an Ueber*****er
More Hacking/A Guide to the Easiest Hacking there is
More Hacking/A List Of Some OF The Most Useful UNIX Hacking Commands
More Hacking/A Small Guide to Hacking
More Hacking/A UNIX Hacking Tutorial
More Hacking/Almost Everything You Ever Wanted To Know About Security
More Hacking/An Indepth Guide in Hacking UNIX and the concept of Basic
More Hacking/An Introduction to Denial of Service
More Hacking/An Introduction to the Computer Underground
More Hacking/Basic Networking
More Hacking/BBS Crashing Techniques
More Hacking/BRUTE- A brute approach to hacking Unix passwords
More Hacking/Closing the Net
More Hacking/Compression and *****s for Dummies
More Hacking/Computer Bulliten Boards and the Law
More Hacking/Computer Chrime - Current Practices, Problems and Proposed So
More Hacking/Computer eMail and Privacy
More Hacking/Computer Hackers News Articles
More Hacking/Computer Rights vs First and Forth Amentment Right
More Hacking/Computer Security
More Hacking/Computer Security_2
More Hacking/Computer Viruii
More Hacking/Computerized Governmental Database Systems Containing Persona
More Hacking/COPS and Robbers-Unix System Security
More Hacking/Copyright Guides for Photographers
More Hacking/Crash Course in X Windows Security
More Hacking/Crime and Puzzlement
More Hacking/Cultural Formations in Text-Based Virtual Realties
More Hacking/Cyberspace and the Legal Matrix- Laws or Confusion
More Hacking/Dark Angel's Phunky Virus Writing Guide
More Hacking/Defamation Liability of Computerized Bulliten Board Operators
More Hacking/Dept of Treasury Letter
More Hacking/Electronic Bulliten Boards and 'Public Goods' Explainations
More Hacking/Electropolos - Communication and Comunity on IRC
More Hacking/Ethload User's Guide
More Hacking/Formulating A Company Policy on Access to and Use and Disclos
More Hacking/Free Speech in Cyberspace
More Hacking/Gender Issues in Communications
More Hacking/Government Computer Security Techniques
More Hacking/HACKDICT
More Hacking/Hacker Test
More Hacking/Hackers A-Z
More Hacking/Hackers Who Break into Computer Systems
More Hacking/Hacking Bank Of America's Home Banking System
More Hacking/Hacking Compuserve Infomation Service
More Hacking/Hacking Faq
More Hacking/Hacking GTE Telemail
More Hacking/Hacking IRC - The Definitive Guide
More Hacking/Hacking PC-Pursuit Codes
More Hacking/Hacking Techniques
More Hacking/Hacking TRW
More Hacking/Hacking TYMNET
More Hacking/Hacking Unix System V's
More Hacking/Hacking Wal-Mart Computers
More Hacking/Hacking Webpages
More Hacking/How the Traditional Media Clasifications Fail to Protect
More Hacking/How to crash AOL
More Hacking/How to dial out of a UNIX System
More Hacking/How to find Security Holes
More Hacking/How to get a Shell in 24 hours
More Hacking/How to Hack UNIX System V
More Hacking/How to login to a C.B.I. System
More Hacking/How to send ICQ Bombs
More Hacking/Information of Hacking AngelFire Websites
More Hacking/Introduction to Denail of Service
More Hacking/IP addressing, and gaining IP's
More Hacking/IP Addressing
More Hacking/ISSN Numbers- An Introduction
More Hacking/Junk Mail- How Did They All Get My Address
More Hacking/LENROS~1
More Hacking/LENROS~2
More Hacking/MEMETICS
More Hacking/MINDVOX
More Hacking/MORRIS~1
More Hacking/NEIDOR~1
More Hacking/NFS Tracing
More Hacking/Nightline- FBI,Privacy,and Proposed Wire-Tapping Legislation
More Hacking/NY_2'S Guide to Obtaining An IP Address
More Hacking/Organizational Analysis in Computer Science
More Hacking/PGP Startup Guide
More Hacking/Presumed Guilty
More Hacking/Raising Hell with Unix
More Hacking/Remarks of the President and Vice President to Silicon Valley
More Hacking/RIGGSB~1
More Hacking/RIGGS_~1
More Hacking/RIGHTS~1
More Hacking/RIVERA
More Hacking/Security holes
More Hacking/Seisure Warrent Documents for Ripco BBS
More Hacking/Site Security Handbook
More Hacking/SJ-DEC~1
More Hacking/SJ-RESP
More Hacking/SMTP-Simple Mail Transfer Protocol
More Hacking/Summary of FBI Computer Systems
More Hacking/SUNDEVIL
More Hacking/SUPREM~1
More Hacking/TCP packet fragment attacks against firewalls and filters
More Hacking/Telenet-The Secret Exposed
More Hacking/The Basics of Hacking- Introduction
More Hacking/The Baudy World of the Byte Bandit-A Postmodernist Interpretation
More Hacking/The Constitution in Cyberspace
More Hacking/The *****ing Manual
More Hacking/The Electronic Communication Privacy Act of 1986 - A Laymans
More Hacking/The Greatest Hacker of all time
More Hacking/The Hacker's League
More Hacking/The Inner Circle Book's Hacking Techniques
More Hacking/The Lamahs-Guide to Pirating Software on the Internet
More Hacking/The M.M.C. Guide to Hacking, Phreaking, Carding
More Hacking/The National Information Infrastructure-Agenda for Action
More Hacking/The Newbies Handbook- ' How to beging in the World of Hacking
More Hacking/The Newbies-User's Guide to Hacking
More Hacking/The Pre-History of Cyberspace
More Hacking/The Price of Copyright Violation
More Hacking/The REAL way to hack RemoteAccess
More Hacking/The Secret Service, UUCP,and The Legion of Doom
More Hacking/the UNIX operating system (Berkley 4.2)
More Hacking/Theft of Computer Software-A National Security Threat
More Hacking/Thoughts on the National Research and Education Network
More Hacking/Tips on Starting Your Own BBS.1
More Hacking/undocumented DOS commands
More Hacking/UNIX Computer Security Checklist
More Hacking/UNIX Use and Security - By the Prophet
More Hacking/UNIX Use and Security From The Ground Up
More Hacking/UNIX- A Hacking Tutorial.SIR
More Hacking/Viruii FAQ
More Hacking/Virus-Trojan FAQ
More Hacking/What Files are Legal for Distribution on a BBS
More Hacking/What To Look For In A Code Hacking Program
More Hacking/What To Look For In A Code Hacking Program
More Hacking/What You Should Know About Computer Viruses
More Xp Tips and tricks make your computer more faster
Moving and Removing the Start Button
Msn Messenger & Gmail
My Bookmarks, long list of tutorials
Myth about WPA ( How it is done ), Windows Product Activation Technique
Your Own Home Server - Introduction
...and much more!!!
READ MORE