tag:blogger.com,1999:blog-21293454342246525902024-03-04T22:35:16.230-08:00Cyber DropsAndroidhttp://www.blogger.com/profile/04147011145084815765noreply@blogger.comBlogger727125tag:blogger.com,1999:blog-2129345434224652590.post-44589263083846079122012-02-26T05:18:00.000-08:002012-03-07T19:53:54.739-08:00Sync Android Files from SD Card with Dropbox<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjFjW5VowMjvJY8lsZdZm9U-EfrDmrBKqKhUSrl7s8DJhVsay_TZoKgkMhGA8MT9VLWGQFOePvaNb4E4gA3ZVk-hqtxsBHAqLcpPBQ7unKGIFlIBmeoQto0lOZ8nEacEPQkcq13GutFDe06/s1600/android_splash.jpg"><img style="float:left; margin:0 10px 10px 0;cursor:pointer; cursor:hand;width: 200px; height: 182px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjFjW5VowMjvJY8lsZdZm9U-EfrDmrBKqKhUSrl7s8DJhVsay_TZoKgkMhGA8MT9VLWGQFOePvaNb4E4gA3ZVk-hqtxsBHAqLcpPBQ7unKGIFlIBmeoQto0lOZ8nEacEPQkcq13GutFDe06/s200/android_splash.jpg" border="0" alt="kartolo internet blog | file sync android dropbox"id="BLOGGER_PHOTO_ID_5713448632966836722" /></a><strong>Android dropbox</strong> app allows you to download and view your files in your Dropbox folder and also upload files to the server. <strong style="font-weight: normal;">Dropbox android</strong> apps is best suited for people who like to work on with the phone. If there is anything that we are unsatisfied with, it have to be the inability to sync your local files (in SD card) back to the server. When you open a file from your Dropbox folder in Android, the file will be downloaded to your SD card and you can then view/edit the file with a file manager. However, after you have made changes to the file, the <strong style="font-weight: normal;">Dropbox app</strong> does not automatically sync it back to the server. The only solution is to manually <strong>upload</strong> the file. This is definitely a bad <strong style="font-weight: normal;">file sync problem</strong> in android. A good solution to overcome this <strong style="font-weight: normal;">file sync</strong> problem is using an additional <strong style="font-weight: normal;">dropbox app</strong>, that is Dropspace. DropSpace is another great apps for <strong style="font-weight: normal;">Android Dropbox</strong>. DropSpace will allows you to create a link between<span class="fullpost"> a folder in SD card and a sub-directory in Dropbox. Once the link is created, it will auto sync the files from/to your Dropbox. Dropspace is free, just download it via android market.<br /><br /><a href="https://market.android.com/details?id=kr.pe.meinside.DropSpace">Download Dropspace Android App</a><br /><br />Step by Step<br /><br />Connect your Dropbox account to DropSpace.<br /><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhLwH2NfUz-vy2EjqvF8H57Kx-IxIXYccInFSAbQ5pW-zPv6xkX0xAlNZTc5SixDvcfMeNvNgtrnMkMXdkzZ1LMmWcHjPShQe_ep7cT58Vt3Jsfn8qyUcjkCYtp4vyLoQdDB87PkDKEgswa/s1600/1.png" style="font-size: 16px; font-family: Georgia, serif; "><img src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhLwH2NfUz-vy2EjqvF8H57Kx-IxIXYccInFSAbQ5pW-zPv6xkX0xAlNZTc5SixDvcfMeNvNgtrnMkMXdkzZ1LMmWcHjPShQe_ep7cT58Vt3Jsfn8qyUcjkCYtp4vyLoQdDB87PkDKEgswa/s320/1.png" border="0" alt="kartolo internet blog | file sync android dropbox" id="BLOGGER_PHOTO_ID_5713441052137463458" style="text-align: left;display: block; margin-top: 0px; margin-right: auto; margin-bottom: 10px; margin-left: auto; cursor: pointer; width: 312px; height: 320px; " /></a><br />Tap the “Manage Sync List” button to set up the sync.<br /><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjwE4fhsQi4_QM63yBlRB-tjNXBRYx6J_2xZ39p60MrsRWBjYndufCls3W9ZhUr2I_M-MiT7gzW7vUu2AVHZnLJhXjH9HBfAi0uLoTD2CZoIPgezNYNwg7av_QuIz4DVRA-x2ozE5D056c3/s1600/2.png" style="font-size: 16px; font-family: Georgia, serif; "><img src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjwE4fhsQi4_QM63yBlRB-tjNXBRYx6J_2xZ39p60MrsRWBjYndufCls3W9ZhUr2I_M-MiT7gzW7vUu2AVHZnLJhXjH9HBfAi0uLoTD2CZoIPgezNYNwg7av_QuIz4DVRA-x2ozE5D056c3/s320/2.png" border="0" alt="kartolo internet blog | file sync android dropbox" id="BLOGGER_PHOTO_ID_5713441054304782178" style="text-align: left;display: block; margin-top: 0px; margin-right: auto; margin-bottom: 10px; margin-left: auto; cursor: pointer; width: 226px; height: 320px; " /></a><br />Navigate to the directory on your SD card that you want to link and long tap on it to add to the sync list.<br /><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjvWjXJ5O7KjtIuuO_RiYIos8koJGxMdjdQzQvcFZ4kqjHr3bhSO5LA7Us6aIaAaAhRnvC5eeCYxh2HIi2MePlQDZypEzpLTOlAw4vnQH_TCjzZb6hhbywdp5XOABJPH1ajLZjtAmy35qV2/s1600/3.png" style="font-size: 16px; font-family: Georgia, serif; "><img src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjvWjXJ5O7KjtIuuO_RiYIos8koJGxMdjdQzQvcFZ4kqjHr3bhSO5LA7Us6aIaAaAhRnvC5eeCYxh2HIi2MePlQDZypEzpLTOlAw4vnQH_TCjzZb6hhbywdp5XOABJPH1ajLZjtAmy35qV2/s320/3.png" border="0" alt="kartolo internet blog | file sync android dropbox" id="BLOGGER_PHOTO_ID_5713441066207441842" style="text-align: left;display: block; margin-top: 0px; margin-right: auto; margin-bottom: 10px; margin-left: auto; cursor: pointer; width: 320px; height: 300px; " /></a><br />Next, it will show your Dropbox folder and you can do the same thing (long tap on the folder) to complete the sync configuration.<br />Lastly, go back to its main screen and tap the “Sync Now” to start the sync.<br /><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjPm5W6DVwPHQ2MW0OtsD9UDo8vmdvIXC3XUip591jo9atOvcSnFaJZ3NbRzEOTvW2tUSzC1sfV51u9XAzIATANbRW7kSUHeVdaPY1lt_1pnZK1AeN52oll44koqEZHLIfcdEcKjVzLtZiW/s1600/4.png" style="font-size: 16px; font-family: Georgia, serif; "><img src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjPm5W6DVwPHQ2MW0OtsD9UDo8vmdvIXC3XUip591jo9atOvcSnFaJZ3NbRzEOTvW2tUSzC1sfV51u9XAzIATANbRW7kSUHeVdaPY1lt_1pnZK1AeN52oll44koqEZHLIfcdEcKjVzLtZiW/s320/4.png" border="0" alt="" id="BLOGGER_PHOTO_ID_5713441069771734722" style="text-align: left;display: block; margin-top: 0px; margin-right: auto; margin-bottom: 10px; margin-left: auto; cursor: pointer; width: 320px; height: 198px; " /></a><br />By default, you have to manually tap the “Sync Now” button everytime you want it to perform a sync. However, you can set it as a service and get it to run at a regular interval. You can also configure whether to remove the remote files when the local files are deleted.<br /><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhVQZtuyBEqZwg0q6mUnqNbdZMqM8ZTwb3St1-uukFjVOthHGyU-H4y5Q9eA_oFFjnMrfphlSu14BYcjMzd_PGs5_sU5SEvPdaraQnnGsxRz3KCn0T_gTyHIzC7GbgXG6AYy00zDIHKnniK/s1600/5.png" style="font-size: 16px; font-family: Georgia, serif; "><img src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhVQZtuyBEqZwg0q6mUnqNbdZMqM8ZTwb3St1-uukFjVOthHGyU-H4y5Q9eA_oFFjnMrfphlSu14BYcjMzd_PGs5_sU5SEvPdaraQnnGsxRz3KCn0T_gTyHIzC7GbgXG6AYy00zDIHKnniK/s320/5.png" border="0" alt="kartolo internet blog | file sync android dropbox" id="BLOGGER_PHOTO_ID_5713441072693213810" style="text-align: left;display: block; margin-top: 0px; margin-right: auto; margin-bottom: 10px; margin-left: auto; cursor: pointer; width: 320px; height: 283px; " /></a><br /><br />Syncing notes to Dropbox<br /><br />If you want to create notes on your Android phone and have them synced to your Dropbox, You can use another additional <strong style="font-weight: normal;">dropbox app</strong>, Epistle. With Epistle, you can create simple notes and it will automatically synced to the Epistle folder in Dropbox. I have found this to be extremely handy, especially when I need to jot down some ideas while on the move.<br /><br /><a href="https://market.android.com/details?id=com.kooklab.epistle" style="font-family: Georgia, serif; font-size: 100%; font-style: normal; font-variant: normal; font-weight: normal; line-height: normal; ">Download Epistle Android App</a><br /><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgLdNJBrfO8PJDWiADz9RAuzeMvrZX2xcZnDZFydUT2qUz2SSwZdAxCrYZmsfPdmi82dhP2Zws6zNQ7HJ8QN82YKGHVi0PP-TWz7UpFRUVK2EgBn6fd85DIvopc9Kad6a7hhUDwulcoVodx/s1600/6.png"><img style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 201px; height: 320px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgLdNJBrfO8PJDWiADz9RAuzeMvrZX2xcZnDZFydUT2qUz2SSwZdAxCrYZmsfPdmi82dhP2Zws6zNQ7HJ8QN82YKGHVi0PP-TWz7UpFRUVK2EgBn6fd85DIvopc9Kad6a7hhUDwulcoVodx/s320/6.png" border="0" alt="kartolo internet blog | file sync android dropbox" id="BLOGGER_PHOTO_ID_5713446280278102786" /></a><br />Epistle also supports two-way <strong style="font-weight: normal;">file sync</strong>. That means, if you create a text file on your desktop and drop it into the Dropbox Epistle folder, it will show up in your Android phone as well. Until the <strong style="font-weight: normal;">android dropbox</strong> team implements the synchronization feature in their mobile apps, we will have to make use of the above android dropbox file sync method to get things done. They might not be the most complete feature of android <strong style="font-weight: normal;">dropbox app</strong>, but it will help you little.<br /><br />Just let me know if still have a problem :)<br /></span>Androidhttp://www.blogger.com/profile/04147011145084815765noreply@blogger.com0tag:blogger.com,1999:blog-2129345434224652590.post-65569084237989718162012-02-22T21:03:00.000-08:002012-03-07T19:53:54.881-08:00How to Make a Good Logo<a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjMy3fDKTvXDOlcYLnQDKMa1Ge5Vmk1mLTL1jkHl0Esrmih4Lgr_2APep2KElBBCkAlpmYmkI17moB4pH4PO_gzn3dbnkXy7KgMXn70RKH6oiAC0NPDssEySib76BnVQ9VxINUi9GIEia1T/s1600/logo+sample-4.jpg"><img style="float:left; margin:0 10px 10px 0;cursor:pointer; cursor:hand;width: 200px; height: 200px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjMy3fDKTvXDOlcYLnQDKMa1Ge5Vmk1mLTL1jkHl0Esrmih4Lgr_2APep2KElBBCkAlpmYmkI17moB4pH4PO_gzn3dbnkXy7KgMXn70RKH6oiAC0NPDssEySib76BnVQ9VxINUi9GIEia1T/s200/logo+sample-4.jpg" alt="kartolo internet blog - how to make a good logo" id="BLOGGER_PHOTO_ID_5712209633714336866" border="0" /></a>Create a <strong style="font-weight: normal;">good logos</strong> is an important thing for your blog design. Especially if you have a popular blog. You can <a href="http://kartolocyber.blogspot.com/2009/12/cara-meningkatkan-traffic-blog-full.html">increase blog traffic</a> by making a good logo. <strong style="font-weight: normal;">Make a good logo</strong> can attract your visitor to visit your blog/website again. Beside that, logo is the most important thing for you that have a company. A great <strong style="font-weight: normal;">company logo</strong> will make your <span style="font-style:italic;">company impression</span> look great too. A suitable brilliant logo will increase a good looking of your theme. So, pay attention to your blog logo everytime you post it in your template.<br /><br />This post is not about <strong style="font-weight: normal;">making a logo</strong> for your blog only, but you can use this trick for <strong style="font-weight: normal;">designing company logo</strong> too. Make a good logo will carves a good impression of your blog. <span class="fullpost">For example, logo with extreme graphics and colors will not matching your blog design, it will leaves a bad impression on the readers. Here are few things to keep in mind while designing your logo to make it the best.<br /><br /><span style="font-weight:bold;">1. Simple Design Looks The Best</span><br /><br />Simple logos look the best. Just the blog name and a short line describing your blog in the logo, occupying the minimum space can considered as a good logo. So keep your logo simple.<br /><br /><span style="font-weight:bold;">2. Use Easily Readable Fonts</span><br /><br />Do not use cartoonistic fonts unless your blog belongs to that niche. I suggest using simple bold fonts which can be read easily. Some of those fonts are Impact, Arial, etc. They are the basic ones available. You can alternatively download other fonts from various font sites.<br /><br /><span style="font-weight:bold;">3. Search For Ideas</span><br /><br />Before starting to design your blog logo always make sure you visit some other blogs for ideas. You may thus get many excellent design ideas.<br /><span style="font-weight:bold;"><br />4. Use .PNG Format</span><br /><br />I always use .PNG format for all my logos. They not look the best, but have many benefits too. When you keep the background transparent and store your logo in .GIF or .JPG format, the background in the image becomes black, but in .PNG format it doesn’t. Also I’ve noticed that .PNG images have a better shine and finishing. So I suggest you to use .PNG logos.<br /><span style="font-weight:bold;"><br />5. Make The Logo Stand Out</span><br /><br />Suppose you use Arial font in your blog, then don’t design your logo in the same font because there is a chance that your text, headings will look similar to your logo. This will reduce attraction. Choose a different font.<br /><br />I thing this is enough for the trick of <a href="http://kartolocyber.blogspot.com/2012/02/how-to-make-good-logo.html">how to make a good logo</a>, i hope you can understand and implement it. I will post the next trick about making a good logo later. Just feel free to ask if you have some questions about this post :)<br /></span>Androidhttp://www.blogger.com/profile/04147011145084815765noreply@blogger.com1tag:blogger.com,1999:blog-2129345434224652590.post-34392737695368038172012-02-20T20:27:00.000-08:002012-03-07T19:53:55.041-08:00About USB 3.0 Super Speed<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgzvoi9mx8MA8NNyXLaT-W97P_O7QDx3ff1P1Qa2KVT3El5qLesAZlZCWgL4v2lidQ-gTm4_YRm0XsaDot6kSslMy8bmnkW7DDdrvAEBykjr9VQX84XV8H6y75boVXA80T-XBBwXAaZiu0y/s1600/WSS-USB-74.jpg"><img style="float:left; margin:0 10px 10px 0;cursor:pointer; cursor:hand;width: 200px; height: 200px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgzvoi9mx8MA8NNyXLaT-W97P_O7QDx3ff1P1Qa2KVT3El5qLesAZlZCWgL4v2lidQ-gTm4_YRm0XsaDot6kSslMy8bmnkW7DDdrvAEBykjr9VQX84XV8H6y75boVXA80T-XBBwXAaZiu0y/s200/WSS-USB-74.jpg" border="0" alt="kartolo tech blog - about usb 3.0 super speed" id="BLOGGER_PHOTO_ID_5711445086113363090" /></a>Long ago, we got USB 1.1, then now we got USB 2.0 and the next we will get the USB 3.0. What is USB 3.0? and how fast is USB 3.0 SuperSpeed actually? what's the difference between them? Now, we will know it. All <strong style="font-weight: normal;">about USB 3.0</strong>. But, first we need to know the history of the USB(Universal Serial Bus).<br /><br /><h2>The History of the Universal Serial Bus (USB)</h2>The specification of the USB standard was started by 7 companies back in 1994: Compaq, DEC, IBM, Intel, Microsoft, NEC and Nortel. They wanted it to be easier to <span class="fullpost">connect devices to PC’s and agreed that the industry need a common standard. There have been multple releases of the standard over the years, but I will focus my review on the 3 most common used:<br /><br />- USB 1.1 Full-speed (1998)<br />- USB 2.0 Hi-Speed (2000)<br />- USB 3.0 SuperSpeed (2008)<br /><br />You might think that <a href="http://kartolocyber.blogspot.com/2012/02/about-usb-30-super-speed.html">USB 3.0</a> is kind of old since the standard was completed already back in 2008, but according to Wikipedia the first devices for USB 3.0 was presented in January 2010 and just like with USB 2.0 it took a while before supported devices was available for consumers.<br /><br /><h2>How fast is USB 3.0 SuperSpeed?</h2>According to the specification this is the <strong>maximum speed</strong> of the different versions of USB.<br /><br />USB 1.1 Full-speed - (12 Mbit/s or 1.8 MB/s)<br />USB 2.0 Hi-speed – (480 Mbit/s, or 60 MB/s),<br />USB 3.0 Superspeed – (5 Gbit/s or 625 MB/s)<br /><br /><h2>is USB 3.0 it really that fast in practice?</h2>Actually no. You are not going to copy files to an USB stick with 625 MB/s. The first reason is that the disk you would be copying from is most likely not able to read the data that quick and your USB stick is properly not able to write the data with that speed either. If you think about it you have properly never seen a USB 2.0 device being even close to a transfer of 60 MB/s.<br /><br />USB 3.0 is not as fast as the specification. It might let you think, but it is for sure a lot faster than USB 2.0 and you have something to keep in mind when buying new devices or a new motherboard. Just look after your friend that have bought it and try it yourself. This is the general transfer rate of USB 2.0 and USB 3.0 :<br /><br />USB 2.0 HiSpeed – 28 MB/sec.<br />USB 3.0 SuperSpeed – 76 MB/sec<br /><br />That's it <strong style="font-weight: normal;">about the USB 3.0</strong> super speed. Next, you may be interest with our previous article about <a href="http://kartolocyber.blogspot.com/2009/09/make-usb-power-injector-modem.html">how to make USB Power Injector Modem</a>. Just feel free to ask us if you have some question, just contact or comment below :)<br /></span>Androidhttp://www.blogger.com/profile/04147011145084815765noreply@blogger.com0tag:blogger.com,1999:blog-2129345434224652590.post-9532851450813395572012-02-09T21:56:00.000-08:002012-03-07T19:53:55.086-08:00Remove e-book PDF password<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEje_VnbYFssqCZ972j9nFi6i-u3QXdlH4Uon_Iu0PIRJ634HdjOp6cGbRe9kwEXyLMzXPMB6SeEKgFnKDTUCX4mpZEyyY41ujpjfvCUSpgyYdGmKIjEGCxayTjUZFET_F4yetFGVT7De4oE/s1600/pdf1.jpg"><img style="float:left; margin:0 10px 10px 0;cursor:pointer; cursor:hand;width: 225px; height: 225px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEje_VnbYFssqCZ972j9nFi6i-u3QXdlH4Uon_Iu0PIRJ634HdjOp6cGbRe9kwEXyLMzXPMB6SeEKgFnKDTUCX4mpZEyyY41ujpjfvCUSpgyYdGmKIjEGCxayTjUZFET_F4yetFGVT7De4oE/s320/pdf1.jpg" border="0" alt="kartolo blog - remove pdf password" id="BLOGGER_PHOTO_ID_5707392118893285586" /></a>You ever felt disappointed after downloading an e-book as the e-book you've downloaded have <strong style="text-align: left; ">password attached</strong> and you can't modify it? We must be annoyed when we have to type the password first before we open the PDF file. Sometimes we must use the bad ways to <strong style="text-align: left; ">remove the PDF password</strong>. And there are a few <strong style="text-align: left; ">PDF Password Remover Tool</strong> that can help use to remove PDF password. First, we must know the <span style="font-style:italic;">password protection</span> that attached, so we don't get me wrong.<h4>There are two types of protections in PDF which is,</h4><ul><li><span style="font-weight:bold;">User password</span> – Password to open the PDF file</li><li><span style="font-weight:bold;">Owner Password</span> – Password to print, copy, modify the PDF file</li></ul><span class="fullpost">If your e-book PDF file is protected with User Password, this trick will not work for you. This tool will not be able to recover and remove the password from the PDF.<br />However if the PDF file is using Owner Password, this tool will decrypt and remove the password so you can print, copy, and make changes to the document.<br /><h2>PDF Password Remover Tool</h2><a href="http://www.pdf-technologies.com/pdf-library-password-recovery.aspx">PDF Password Remover Tool</a> is a freeware PDF password recovery that will decrypt the Owner Password and remove it from the PDF file. I’ve tested this software and it works perfectly.<br />If you want to remove the <span style="font-weight:bold;">User Password</span>, this tool will popup an alert saying ‘<span style="font-style:italic;">Cannot decrypt pdf file. Incorrect password.</span>’ as shown in the image below.<br /><img src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgc_UBYxS5UDJ350-J9OUXbVVgwco6W4525D8C8UNhvc7A2aq5VVbWLYzZVQJR4494cZNVvOWRUafXNPs_x9Qz_EkL7r9wSlb4Eu52Fo6nlwR_HhUhwMSsty7abDp4eEbUxV4MKaI8i0AZl/s400/pdf-password-remover-01.jpg" border="0" alt="kartolo blog - remove pdf password" id="BLOGGER_PHOTO_ID_5707390111523802402" style="color: rgb(0, 0, 238); text-decoration: underline; display: block; margin-top: 0px; margin-right: auto; margin-bottom: 10px; margin-left: auto; text-align: center; cursor: pointer; width: 400px; height: 298px; " /><br class="Apple-interchange-newline">But if the e-book PDF file is using <span style="font-weight:bold;">Owner Password</span>, the password removal software will able to remove it, and save a new copy which allows you to print, copy and modify the document content.<br /><img src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgXRAiJqgINQzC5x618WlFE_hXw7H7n72u52jlIvm1k9zvIdZP1nDLhSp_SHqgZrZHAsEZv_hmMcMpIwQyyuiS8RX2Vw8I8LbeMHFll5I6qpj04Pii8AvUTdNUoWudYktgP6YnIAw3ra5mL/s400/pdf-password-remover-02.jpg" border="0" alt="kartolo blog - remove pdf password" id="BLOGGER_PHOTO_ID_5707390115000656610" style="color: rgb(0, 0, 238); text-decoration: underline; display: block; margin-top: 0px; margin-right: auto; margin-bottom: 10px; margin-left: auto; text-align: center; cursor: pointer; width: 400px; height: 260px; " /><br class="Apple-interchange-newline"><strong>PDF Password Remover Tool</strong> is free for personal use. Please use this software to <strong style="font-weight: normal;">remove passwords from PDF files</strong> of yours. It was developed to help you recover PDF files in cases where you forget the owner passwords you once set and can no longer remember. Don't use this removal tool to infringe the PDF ebook copyright or etc. Read our other similar article about how to <a href="http://kartolocyber.blogspot.com/2009/03/word-doc-to-pdf.html">convert word doc to PDF file</a>. Hope this tutorial can solve your problem :)</span>Androidhttp://www.blogger.com/profile/04147011145084815765noreply@blogger.com0tag:blogger.com,1999:blog-2129345434224652590.post-45664289809256276782012-01-27T19:27:00.000-08:002012-03-07T19:53:55.141-08:00Scan Your Computer Online<a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhsDVS5RgOpOjKBx9vVMPNJRCqE_1dOLcmNGAmeyiMlYCzhZja0ZNBngiTe1xiObysCOd7gZ4aMntgdfRxvAfgKv2CdL-2mv8Tt7rgQmvu3weqc6C0yWoOK6sQYsHCf9lAJvMTBPteTYak8/s1600/online-virus-scanners.jpg"><img style="display: block; margin: 0px auto 10px; text-align: center; cursor: pointer; width: 320px; height: 212px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhsDVS5RgOpOjKBx9vVMPNJRCqE_1dOLcmNGAmeyiMlYCzhZja0ZNBngiTe1xiObysCOd7gZ4aMntgdfRxvAfgKv2CdL-2mv8Tt7rgQmvu3weqc6C0yWoOK6sQYsHCf9lAJvMTBPteTYak8/s320/online-virus-scanners.jpg" alt="scan computer online" id="BLOGGER_PHOTO_ID_5702542106275847778" border="0" /></a><br />The main risk about internet browsing is whether our machine is getting affected by virus or not. To stop this unwanted intrusion by any malware, all of us rely on installed anti-virus software. But unfortunately, some of this antivirus software might not work on your computer because some malware have attack your machine and you did not updated it regularly.<br /><br />To get around of this, you can scan your computer online with <strong style="font-weight: normal;">online antivirus scanner</strong>. Beside that, <strong style="font-weight: normal;">Online virus scanner</strong> can be a wise option if you don't trust your installed antivirus. Possibilities of missing some threats are always<br /><span class="fullpost"> there by standalone antivirus software and somehow enough to make you jump on second opinion. But you must be careful because they can turn out themselves to be some kind of malware. To help you in choosing your <strong style="font-weight: normal;">online antivirus scanner</strong>, we have some list of a <strong>trusted online antivirus scanner</strong> you can use. Some of them have a big name in security world.<br /><br /><span style="font-weight: bold;">Here is the top 10 Online AntiVirus Scanner To Try :<br /></span><br />1. <a href="http://housecall.trendmicro.com/">TrendMicro Housecall</a><br /><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjPE2j03w0yGs80wTN_XwTYworStuhLWsGst0ZiVeR8cmjWbtBbRVLHToKiFNOaNVfT0laXP1QYUD1AY9decIeDWb16MI1tOFo6TlI5NKjrG_HCW3Rz0b8LwaBMlkxWEPqbTEpnUidfT9mJ/s1600/1.jpg"><img style="display: block; margin: 0px auto 10px; text-align: center; cursor: pointer; width: 200px; height: 130px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjPE2j03w0yGs80wTN_XwTYworStuhLWsGst0ZiVeR8cmjWbtBbRVLHToKiFNOaNVfT0laXP1QYUD1AY9decIeDWb16MI1tOFo6TlI5NKjrG_HCW3Rz0b8LwaBMlkxWEPqbTEpnUidfT9mJ/s200/1.jpg" alt="" id="BLOGGER_PHOTO_ID_5702525441149513458" border="0" /></a>HouseCall is Trend Micro’s highly popular and capable on-demand scanner for identifying and removing viruses, Trojans, worms, unwanted browser plugins, and other malware. HouseCall 7 features an intuitive interface and the ability to perform fast scans that target critical system areas and active malware. It also leverages the Trend Micro Smart Protection Network to help ensure that scans catch the latest threats.<br /><br />FREE-Online-Virus-Scan-housecall1<br />2. <a href="http://www.eset.com/online-scanner">ESET Online Scanner</a><br /><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgztFGfuFUBRKjNN4Ryad5BjCvaEVlxGOul-TkssqbW_LWFV2craNJ-GOWqZg_QHS3NZv2d228f2-u1tsjBmjpu-eBZNl_01UGwBAj0I9cQzxaXiL-lPShWQE5gcvbIuByufSLDlM5gbH6W/s1600/2.png"><img style="display: block; margin: 0px auto 10px; text-align: center; cursor: pointer; width: 200px; height: 139px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgztFGfuFUBRKjNN4Ryad5BjCvaEVlxGOul-TkssqbW_LWFV2craNJ-GOWqZg_QHS3NZv2d228f2-u1tsjBmjpu-eBZNl_01UGwBAj0I9cQzxaXiL-lPShWQE5gcvbIuByufSLDlM5gbH6W/s200/2.png" alt="" id="BLOGGER_PHOTO_ID_5702525437791210002" border="0" /></a>ESET Online Scanner is a user friendly, free and powerful tool which you can use to remove malware from any PC utilizing only your web browser without having to install anti-virus software. ESET Online Scanner uses the same ThreatSense technology and signatures as ESET Smart Security/ESET NOD32 Antivirus, and is always up-to-date. Do not forget to take admin privileges to run ESET Online Scanner.<br /><br />3. <a href="http://www.pandasecurity.com/activescan/index/">Panda ActiveScan<br /></a><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhAx_vjw-k13FgTA37p_jbl3kAp5lOwLUpHCbkIC6yekDWhxX_BCy5YO-y0vssSaQfLvDrQkFNaT9P18J6NAGRY7Uql7s2KXJdntJOPjjja20tEBM6vuUGWZuZHvH4qoChOJk5kDxcA4iJa/s1600/3.jpg"><img style="display: block; margin: 0px auto 10px; text-align: center; cursor: pointer; width: 200px; height: 126px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhAx_vjw-k13FgTA37p_jbl3kAp5lOwLUpHCbkIC6yekDWhxX_BCy5YO-y0vssSaQfLvDrQkFNaT9P18J6NAGRY7Uql7s2KXJdntJOPjjja20tEBM6vuUGWZuZHvH4qoChOJk5kDxcA4iJa/s200/3.jpg" alt="" id="BLOGGER_PHOTO_ID_5702525445275776434" border="0" /></a>Panda ActiveScan allows both quick scan and full scan just on click. Hit scan now and follow up the instruction as given. This is the first time that you use ActiveScan 2.0 with Mozilla Firefox. For ActiveScan 2.0 to work you must download and install a plug-in.<br /><br />4. <a href="http://quickscan.bitdefender.com/">BitDefender QuickScan</a><br /><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhfk1neatf-y1_gotgxl5FYC1i5qq9AecOF_ytnU-LSzIp9wG0uid-bRb6dMCjt34ypIkk4UENYea-6vcWQymlHA9V-RAEATUWnAoWZbU5OXafpEuOvmS1X_endYiMNSLtXnrduKZMIl0OQ/s1600/4.jpg"><img style="display: block; margin: 0px auto 10px; text-align: center; cursor: pointer; width: 200px; height: 94px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhfk1neatf-y1_gotgxl5FYC1i5qq9AecOF_ytnU-LSzIp9wG0uid-bRb6dMCjt34ypIkk4UENYea-6vcWQymlHA9V-RAEATUWnAoWZbU5OXafpEuOvmS1X_endYiMNSLtXnrduKZMIl0OQ/s200/4.jpg" alt="" id="BLOGGER_PHOTO_ID_5702525449431992754" border="0" /></a>BitDefender is based on anti-malware technologies that doesn’t slow down your PC while scanning. Less than 60 seconds it provide you very fast scanning if your computer is infected. You can runs online from any Internet connected PC.<br />Notice the browser confirmation message and accept the plug-in installation by clicking ‘Allow’ on the bar above.<br /><br />5. <a href="http://www.f-secure.com/en_EMEA/security/tools/online-scanner/">F-Secure Online Scanner</a><br /><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg_cIW6BKYeActpcjzl9Me7Zq-vPnsGCkHTDIK-FVAv1jawDH2oT5Nej8MwYhDUDW2qnDxK52IUVZiubVH8yZ-oDLzmAYJuV6R_QZzvPLZNNwykXCbNEGWc5lebDUPgGCJc4yXlOggQTGdm/s1600/5.jpg"><img style="display: block; margin: 0px auto 10px; text-align: center; cursor: pointer; width: 200px; height: 99px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg_cIW6BKYeActpcjzl9Me7Zq-vPnsGCkHTDIK-FVAv1jawDH2oT5Nej8MwYhDUDW2qnDxK52IUVZiubVH8yZ-oDLzmAYJuV6R_QZzvPLZNNwykXCbNEGWc5lebDUPgGCJc4yXlOggQTGdm/s200/5.jpg" alt="" id="BLOGGER_PHOTO_ID_5702525445821385730" border="0" /></a>Online Scanner can help get rid of viruses and spyware causing problems on your PC. After running Online Scanner, you should make sure that you have an up-to-date security solution keeping your computer free of problems in the future.<br /><br />6. <a href="http://www.kaspersky.com/kos/eng/partner/default/pages/default/check.html?n=1288778855929">Kaspersky Online Scanner 7.0</a><br /><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgMSRhzlasLk7xFaWjycWMHSdIeUdlZs9H2P3Wt4SgozztJ_3iubf7vO6yrFNSxgntdUI8AJZ-sprYObNBPv_vrXBEe_LOIEgMbKuBjkzi7nK4I_DhoCHyvd_Z-DKOZx2BGSDcQXuaTP8yD/s1600/6.jpg"><img style="display: block; margin: 0px auto 10px; text-align: center; cursor: pointer; width: 200px; height: 148px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgMSRhzlasLk7xFaWjycWMHSdIeUdlZs9H2P3Wt4SgozztJ_3iubf7vO6yrFNSxgntdUI8AJZ-sprYObNBPv_vrXBEe_LOIEgMbKuBjkzi7nK4I_DhoCHyvd_Z-DKOZx2BGSDcQXuaTP8yD/s200/6.jpg" alt="" id="BLOGGER_PHOTO_ID_5702525931954057506" border="0" /></a>Kaspersky Online Scanner 7.0 does not require installation on your computer. It starts from the web site of Kaspersky Lab and runs in a browser window on your computer. You should notice the ’system information’ before start scanning.<br /><br /><br />Individual File Scanners<br /><br />7. <a href="http://www.virustotal.com/">VirusTotal</a><br /><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhpuMP-33UNoco_-aUyAHsLWrwAXL7oyRnHVcEvks4A1SJ1JACwLu-d-vwNB3e5jcW_CTKpg-smFssO4mDBqk1rYICNrJXVit8HyMHskMXi6pNFoqSh5IS1aGHMq77uFDe0dTCSn0QaNXMi/s1600/7.jpg"><img style="display: block; margin: 0px auto 10px; text-align: center; cursor: pointer; width: 200px; height: 135px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhpuMP-33UNoco_-aUyAHsLWrwAXL7oyRnHVcEvks4A1SJ1JACwLu-d-vwNB3e5jcW_CTKpg-smFssO4mDBqk1rYICNrJXVit8HyMHskMXi6pNFoqSh5IS1aGHMq77uFDe0dTCSn0QaNXMi/s200/7.jpg" alt="" id="BLOGGER_PHOTO_ID_5702525934631955538" border="0" /></a>Virustotal is a service that analyzes suspicious files and URLs and facilitates the quick detection of viruses, worms, trojans, and all kinds of malware detected by antivirus engines<br /><br />8. <a href="http://www.kaspersky.com/scanforvirus">Kaspersky File Scanner</a><br /><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj9TuYymIQI7t51hPxImwwmK1twYtMGWGhm0sOfG6Zxet-Bqj6Go7vs55maXPw8d1_XaHx2RYRjQXEIFey21HAWb6UlpVHSBkOBHivQZpfPO398UDOlpKPYK-a1LK7rmKXbDDZfIpINKomd/s1600/8.jpg"><img style="display: block; margin: 0px auto 10px; text-align: center; cursor: pointer; width: 200px; height: 92px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj9TuYymIQI7t51hPxImwwmK1twYtMGWGhm0sOfG6Zxet-Bqj6Go7vs55maXPw8d1_XaHx2RYRjQXEIFey21HAWb6UlpVHSBkOBHivQZpfPO398UDOlpKPYK-a1LK7rmKXbDDZfIpINKomd/s200/8.jpg" alt="" id="BLOGGER_PHOTO_ID_5702525937224104034" border="0" /></a>If you discover a suspicious file on your machine, or suspect that a program you downloaded from the Internet might be malicious, you can check the files here.<br /><br />Only one file or archive file (in zip, arj or similar format) of up to 1 MB can be checked at any one time. If the file is too large, a window with an error message will be displayed. Type the name of the file in the window at the top of this page, or find the file using ‘Browse’. Then click on ‘Submit’.<br /><br />9. <a href="http://virusscan.jotti.org/en">Jotti</a><br /><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgKJsEZZPoWx65BuqCSuLYXbBlsL2-4rvGOqyIrki07NHDsfrYHLIF1lXZixUX4AYuPRc9oTvIGOJa9-GaPrRiJzxGTDGoa_0kSXCI6Y3u9Ykn9wB79KkHdvH3qb-1IZU-IdAPgVEooZIo9/s1600/9.jpg"><img style="display: block; margin: 0px auto 10px; text-align: center; cursor: pointer; width: 200px; height: 150px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgKJsEZZPoWx65BuqCSuLYXbBlsL2-4rvGOqyIrki07NHDsfrYHLIF1lXZixUX4AYuPRc9oTvIGOJa9-GaPrRiJzxGTDGoa_0kSXCI6Y3u9Ykn9wB79KkHdvH3qb-1IZU-IdAPgVEooZIo9/s200/9.jpg" alt="" id="BLOGGER_PHOTO_ID_5702525941190933762" border="0" /></a>Jotti’s malware scan is a free online service that enables you to scan suspicious files with several anti-virus programs. Scanners used are Linux versions; detection differences with Windows versions of the same scanners may occur due to implementation differences. There is a 20MB limit per file.<br /><br />10. <a href="http://virscan.org/">VirScan</a><br /><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg9lP3s1jJFDl3jlGiY4pK7QOWOr8wa0KyzBrbJozZP7qFVAr6vv8sHszddGtNeVAQSICjRrgPzBHnCaKuw8tJfocrt6tlNg6K8g0P5UpWo8HpaPy9J3GFkoLzqohbCL06ZavYXHv66FoA1/s1600/10.jpg"><img style="display: block; margin: 0px auto 10px; text-align: center; cursor: pointer; width: 200px; height: 104px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg9lP3s1jJFDl3jlGiY4pK7QOWOr8wa0KyzBrbJozZP7qFVAr6vv8sHszddGtNeVAQSICjRrgPzBHnCaKuw8tJfocrt6tlNg6K8g0P5UpWo8HpaPy9J3GFkoLzqohbCL06ZavYXHv66FoA1/s200/10.jpg" alt="" id="BLOGGER_PHOTO_ID_5702525947432857010" border="0" /></a>VirSCAN.org is a FREE on-line scan service, which checks uploaded files for malware, using antivirus engines, indicated in the VirSCAN list. On uploading files you want to be checked, you can see the result of scanning and how dangerous and harmful/harmless for your computer those files are. It allows 20MB of any files or 20 files after Rar/Zip decompression files as well. VirSCAN can scan compressed files with password ‘infected’ or ‘virus’.<br /><br />That's the top 10 option you can use to scan your computer online. Whatever you use, make sure your computer performance is good enough to scan. And for you that using gmail, you can read my previous article about <a href="http://kartolocyber.blogspot.com/2010/10/email-security-with-gmails-security.html">email security</a>. Please, if you have some questions, just let me now :)</span>Androidhttp://www.blogger.com/profile/04147011145084815765noreply@blogger.com0tag:blogger.com,1999:blog-2129345434224652590.post-79050015192144912022012-01-27T18:55:00.000-08:002012-03-07T19:53:55.170-08:00Crack Wifi Network WEP Password with Backtrack Linux<a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhMK2FRDy-lrcrxzwbhw-Q-u6EXEGIwTUns78FS2A2V09mltMJRlk5cWgYl7DOkekDjuRo1RhUR9aN-OQkSMHXhDZFUtf9BNlovx4SG0RNy0cRnttmExpS0qYsQaIVVXkSUD6oZVNtUTw1V/s1600/BackTrack-5.png"><img style="display: block; margin: 0px auto 10px; text-align: center; cursor: pointer; width: 320px; height: 240px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhMK2FRDy-lrcrxzwbhw-Q-u6EXEGIwTUns78FS2A2V09mltMJRlk5cWgYl7DOkekDjuRo1RhUR9aN-OQkSMHXhDZFUtf9BNlovx4SG0RNy0cRnttmExpS0qYsQaIVVXkSUD6oZVNtUTw1V/s320/BackTrack-5.png" alt="backtrack 5 hacing" id="BLOGGER_PHOTO_ID_5702516156568157762" border="0" /></a><br /><strong style="font-weight: normal;">Cracking Wifi network</strong> is difficult for some peoples because now almost all of <strong style="font-weight: normal;">wifi network</strong> is well <strong>protected</strong>. Especially that protected with <strong>password</strong>. But, it doesn't mean <strong style="font-weight: normal;">cracking a wifi network</strong> is impossible. Now, i will show you how to <span style="font-weight: bold;">crack wifi network WEP Password</span> by using <span style="font-weight: bold;">backtrack linux</span> which is a popular for <a href="http://kartolocyber.blogspot.com/search/label/Hacking">hacking tool</a>. What will you need to do this? Check this out.<br /><br />Unless you’re a computer security and networking ninja, chances are you don’t have all the tools on hand to get this job done.<br /><br /><h2>Requirements</h2>- A compatible wireless adapter :This is the biggest requirement. You’ll need a wireless adapter that’s capable of packet injection, and chances are the one in your computer is not<span class="fullpost">.<br /><br />- A BackTrack 3 Live CD : We already took you on a full screenshot tour of how to install and use BackTrack 3, the Linux Live CD that lets you do all sorts of security testing and tasks. Download yourself a copy of the CD and burn it, or load it up in VMware to get started. (I tried the BackTrack 4 pre-release, and it didn’t work as well as BT3. Do yourself a favor and stick with BackTrack 3 for now.)<br /><br />- A nearby WEP-enabled Wi-Fi network : The signal should be strong and ideally people are using it, connecting and disconnecting their devices from it. The more use it gets while you collect the data you need to run your crack, the better your chances of success.<br /><br />- Patience with the command line: This is an ten-step process that requires typing in long, arcane commands and waiting around for your Wi-Fi card to collect data in order to crack the pasrword. Like the doctor said to the short person, be a little patient.<br /><h2>Cracking The WEP</h2>To crack WEP, you’ll need to launch Konsole, BackTrack’s built-in command line. It’s right there on the taskbar in the lower left corner, second button to the right. Now, the commands.<br /><br />First run the following to get a list of your network interfaces:<br /><blockquote>airmon-ng</blockquote><br />The only one I’ve got there is labeled ra0. Yours may be different; take note of the label and write it down. From here on in, substitute it in everywhere a command includes (interface).<br /><br />Now, run the following four commands. See the output that I got for them in the screenshot below.<br /><br /><blockquote>airmon-ng stop (interface)<br />ifconfig (interface) down<br />macchanger --mac 00:11:22:33:44:55 (interface)<br />airmon-ng start (interface)</blockquote><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjQbRbE8XY_H66iNfmCa5mthyk38h0bFzcaFzOTUX5Dcdc96ylQJAiy8AFFL7Q5NxLE-M41uWkug981M3ZLdk-DF7NEOLzEzOKBNeigExOolzOW_mkx9DQBrllYFPS1flejdrpPl95HMeTp/s1600/1.png"><img style="display: block; margin: 0px auto 10px; text-align: center; cursor: pointer; width: 320px; height: 240px+" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjQbRbE8XY_H66iNfmCa5mthyk38h0bFzcaFzOTUX5Dcdc96ylQJAiy8AFFL7Q5NxLE-M41uWkug981M3ZLdk-DF7NEOLzEzOKBNeigExOolzOW_mkx9DQBrllYFPS1flejdrpPl95HMeTp/s320/1.png" alt="cracking wifi network password backtrack" id="BLOGGER_PHOTO_ID_5702517376873017970" border="0" /></a><br /><br />If you don’t get the same results from these commands as pictured here, most likely your network adapter won’t work with this particular crack. If you do, you’ve successfully “faked” a new MAC address on your network interface, 00:11:22:33:44:55.<br /><br />Now it’s time to pick your network. Run:<br /><br /><blockquote> airodump-ng (interface)</blockquote><br /><br />To see a list of wireless networks around you. When you see the one you want, hit Ctrl+C to stop the list. Highlight the row pertaining to the network of interest, and take note of two things: its BSSID and its channel (in the column labeled CH), as pictured below. Obviously the network you want to crack should have WEP encryption (in the ENC) column, not WPA or anything else.<br /><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgXCGrn4vkCuT3HKybizzY_ZMpHSwVSNsCE8ERqDcWZz2yhWka64zVdM8xTHL8te8LmuXY8zd-OlyjQjutVVLv0rXLIELigWhQEfVtmo1HH6W_IRaEn15qRJSjOLrE9SiZMm-S3W-4MSTxS/s1600/2.png"><img style="display: block; margin: 0px auto 10px; text-align: center; cursor: pointer; width: 320px; height: 240px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgXCGrn4vkCuT3HKybizzY_ZMpHSwVSNsCE8ERqDcWZz2yhWka64zVdM8xTHL8te8LmuXY8zd-OlyjQjutVVLv0rXLIELigWhQEfVtmo1HH6W_IRaEn15qRJSjOLrE9SiZMm-S3W-4MSTxS/s320/2.png" alt="cracking wifi network password backtrack" id="BLOGGER_PHOTO_ID_5702516167318994658" border="0" /></a><br />Like I said, hit Ctrl+C to stop this listing. (I had to do this once or twice to find the network I was looking for.) Once you’ve got it, highlight the BSSID and copy it to your clipboard for reuse in the upcoming commands.<br /><br />Now we’re going to watch what’s going on with that network you chose and capture that information to a file. Run:<br /><br /><blockquote> airodump-ng -c (channel) -w (file name) --bssid (bssid) (interface)</blockquote><br /><br />Where (channel) is your network’s channel, and (bssid) is the BSSID you just copied to clipboard. You can use the Shift+Insert key combination to paste it into the command. Enter anything descriptive for (file name). I chose “yoyo,” which is the network’s name I$E2��m cracking.<br /><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhlLjBZJd2SkE8OkslWwWWsUJq5H45T7T9ZkWvzs2BcpW6OLNP4H5A4mSJ0k9I_zQpNvKQIf1rH5MdvT9WflfbpqasHw7ga8iLD4YPZe4tY7Ae_LJWjJ5mv2e8dLKyNZCGjBuUeUCyB4Ebe/s1600/3.png"><img style="display: block; margin: 0px auto 10px; text-align: center; cursor: pointer; width: 320px; height: 240px;" src="http://3.bp.blogspot.com/-61u-n8Q-iQo/TyNoP8E--wI/AAAAAAAAAzQ/Nc8xeH_RGvc/s320/3.png" alt="cracking wifi network password backtrack" id="BLOGGER_PHOTO_ID_5702516176215538434" border="0" /></a><br />You’ll get output like what’s in the window in the background pictured below. Leave that one be. Open a new Konsole window in the foreground, and enter this command:<br /><br /><blockquote> aireplay-ng -1 0 -a (bssid) -h 00:11:22:33:44:55 -e (essid) (interface)</blockquote><br /><br />Here the ESSID is the access point’s SSID name, which in my case is yoyo. What you want to get after this command is the reassuring “Association successful” message with that smiley face.<br /><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhzfN_f4q7dJxje0tKAm9v4vkItDlmGFlUB6Um0FD1OJUdKAY0h8hI4GpNxUPufa_oKIYVaL460eVd9h3jGOM0bxLCShrzUVnuIaASRiY6V38spYZGMw0qXtuP6quvhA-H2liqd-6CPwS-E/s1600/4.png"><img style="display: block; margin: 0px auto 10px; text-align: center; cursor: pointer; width: 320px; height: 240px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhzfN_f4q7dJxje0tKAm9v4vkItDlmGFlUB6Um0FD1OJUdKAY0h8hI4GpNxUPufa_oKIYVaL460eVd9h3jGOM0bxLCShrzUVnuIaASRiY6V38spYZGMw0qXtuP6quvhA-H2liqd-6CPwS-E/s320/4.png" alt="cracking wifi network password backtrack" id="BLOGGER_PHOTO_ID_5702516177729121378" border="0" /></a><br />You’re almost there. Now it’s time for:<br /><br /><blockquote> aireplay-ng -3 -b (bssid) -h 00:11:22:33:44:55 (interface)</blockquote><br /><br />Here we’re creating router traffic to capture more throughput faster to speed up our crack. After a few minutes, that front window will start going crazy with read/write packets. (Also, I was unable to surf the web with the yoyo network on a separate computer while this was going on.) Here’s the part where you might have to grab yourself a cup of coffee or take a walk. Basically you want to wait until enough data has been collected to run your crack. Watch the number in the “#Data” column you want it to go above 10,000. (Pictured below it’s only at 854.)<br /><br />Depending on the power of your network (mine is inexplicably low at -32 in that screenshot, even though the yoyo AP was in the same room as my adapter), this process could take some time. Wait until that #Data goes over 10k, though because the crack won’t work if it doesn’t. In fact, you may need more than 10k, though that seems to be a working threshold for many.<br /><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgeeAm_tgh8loP0wvAFnutRgZb01KbpwdbELpqidcyeTOpND9fPWdhsJYFURQkbZHSPy94BSAtSVF_tgBKLJatY4CuBjYT3KtNcdx-biGhnsLT8CGc_DhNtZu0I4fMSNlvIgjFab6zJZTKz/s1600/5.png"><img style="display: block; margin: 0px auto 10px; text-align: center; cursor: pointer; width: 320px; height: 240px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgeeAm_tgh8loP0wvAFnutRgZb01KbpwdbELpqidcyeTOpND9fPWdhsJYFURQkbZHSPy94BSAtSVF_tgBKLJatY4CuBjYT3KtNcdx-biGhnsLT8CGc_DhNtZu0I4fMSNlvIgjFab6zJZTKz/s320/5.png" alt="cracking wifi network password backtrack" id="BLOGGER_PHOTO_ID_5702516449116644290" border="0" /></a><br />Once you’ve collected enough data, it’s the moment of truth. Launch a third Konsole window and run the following to crack that data you’ve collected:<br /><br /><blockquote> aircrack-ng -b (bssid) (file name-01.cap)</blockquote><br /><br />Here the filename should be whatever you entered above for (file name). You can browse to your Home directory to see it; it’s the one with .cap as the extension.<br /><br />If you didn’t get enough data, aircrack will fail and tell you to try again with more. If it succeeds, it will look like this:<br /><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjEkuHbh8A8ZLtQYws_YtnfsjSTbz49cxvBvtcPTlUKjw08UhwX3bmdHN-MSieT4liVochD2XBIcPPjSk8DqK_5mXt77ChqlVBOF5TkpSpoCdDyBAi7hYQjiazSp67OY_CdmqqypwHmTsXd/s1600/6.png"><img style="display: block; margin: 0px auto 10px; text-align: center; cursor: pointer; width: 320px; height: 227px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjEkuHbh8A8ZLtQYws_YtnfsjSTbz49cxvBvtcPTlUKjw08UhwX3bmdHN-MSieT4liVochD2XBIcPPjSk8DqK_5mXt77ChqlVBOF5TkpSpoCdDyBAi7hYQjiazSp67OY_CdmqqypwHmTsXd/s320/6.png" alt="cracking wifi network password backtrack" id="BLOGGER_PHOTO_ID_5702516453655454882" border="0" /></a><br />The WEP key appears next to “KEY FOUND.” Drop the colons and enter it to log onto the network.<br /><br />I hope this trick about cracking wifi network will be useful for you. But don't use it too often, this is an illegal activities that harm each others. Just contact us if you have some questions to ask :)</span>Androidhttp://www.blogger.com/profile/04147011145084815765noreply@blogger.com0tag:blogger.com,1999:blog-2129345434224652590.post-85979819671755866572012-01-26T19:07:00.000-08:002012-03-07T19:53:55.277-08:00Accessing Our Data EverywhereAccess your data Anytime, Anywhere and from any device. That's something we want if we need our files in unexpected time. For example when we're traveling out of town or when we're on vacation. It can be done through Online Backup. Or usually called cloud storage. Cloud is something we can see anywhere and anytime. Just like the online backup works. There are a lot of online storage services that offer you many different features. Here are <a href="http://www.wpdesigner.com/cloud-storage/">top cloud storage</a> according to the famous WPDesigner. We may believe it or not.<span class="fullpost"><br /><br />The best 3 cloud providers this time is myPCBackup.com, Justcloud.com and zipcloud. The three of them are rated by their price,security, reliability, eaze-of-use, control panel and customer support. There is no doubt about how they work. It’ quite easy to use it. You just have to choose the files and folders you want to back up, and then they will work automatically for you. A lot of people have prove this. They lost their files and emails. But, because they use an online backup service, the data they are looking for has been restored in perfectly.<br /><br />Yes, there are also online backup services that available for free of charge. But this is not the rwise choice. The money we spend is nothing compared to our need for ease data access.</span>Androidhttp://www.blogger.com/profile/04147011145084815765noreply@blogger.com0tag:blogger.com,1999:blog-2129345434224652590.post-35069820480360888682012-01-26T17:41:00.000-08:002012-03-07T19:53:55.327-08:00Best Online Backup We Need to KnowBacking up your computer is an important thing to us who love to store data. There are many methods about backing up your computers data. The most ancient things is backing up our data and store it to our CD(Compact Disk) and DVD. Please forget about it, because now there is a new technology for backing up your data that called online backup. For a beginner in online backup, we may have trouble in choosing the perfect place to store our data. Don’t worry, the WPDesigner has been experienced in this. They already know the <a href="http://www.wpdesigner.com/online-backup/">top online backup</a>. The top 3 of them.<span class="fullpost"><br /><br />The 3 of them are myPCbackup.com, carbonite.com and mozy. There is no doubt about their reputation. Online backup is the safest and practical way of storing data, because you don’t require to have a physical drive like CD, DVD or external harddisk to restore your backups from. Even if your house or your office burns down, you can get a new computer, connect it to the internet and restore your files from another place, whenever and anywhere. That might not seem like a good things about your house is burns down. It’s just for emergencies.<br /><br />So, decide it immediately which one would you choose as your data storage. Just leave the old way that will bother you. The price we pay is worth with what we get.<br /></span>Androidhttp://www.blogger.com/profile/04147011145084815765noreply@blogger.com0tag:blogger.com,1999:blog-2129345434224652590.post-31411766241802527242012-01-20T22:19:00.000-08:002012-03-07T19:53:55.378-08:00Some SEO Trick You have to Avoid<a ohttp://www.blogger.com/img/blank.gifnblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjwf5EtUQW5tCpIbKPsYDI-tuDwf4TGD_1hjBigBKBAzcAqjEE2v5Zq5PANGyIGrQ5mNXC-pGbP6zGhDMbSrOC6njCCFiRd_rOJSoHv_NQ1XFifP5_dSgBw4QYYPLo0GhcfxKhNdCymFTeC/s1600/seo.gif"><img style="float:left; margin:0 10px 10px 0;cursor:pointer; cursor:hand;width: 298px; height: 320px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjwf5EtUQW5tCpIbKPsYDI-tuDwf4TGD_1hjBigBKBAzcAqjEE2v5Zq5PANGyIGrQ5mNXC-pGbP6zGhDMbSrOC6njCCFiRd_rOJSoHv_NQ1XFifP5_dSgBw4QYYPLo0GhcfxKhNdCymFTeC/s320/seo.gif" alt="wrong SEO tricks" id="BLOGGER_PHOTO_ID_5699972695035410338" border="0" /></a>After i write some SEO blogging tricks in my previous blog posts, i think it's time to discuss few common <strong style="font-weight: normal;">SEO (search engine optimization) little mistakes</strong> . This few wrong <strong style="font-weight: normal;">SEO tricks</strong> will down the visibility of your blog in search engine result page. Because, by doing the right SEO, will <a href="http://kartolocyber.blogspot.com/2010/09/backlink-quality-increase-page-rank.html">increase Google page rank</a> and <a href="http://kartolocyber.blogspot.com/2009/12/cara-meningkatkan-traffic-blog-full.html">increase traffic</a> to your blog/website. So you must avoid these SEO mistakes to make descent traffic to your blog or website.<br /><br />This are some SEO tricks that will make your site fall down from SERP :<span class="fullpost"><br /><br /><span style="font-weight: bold;">1. Hiding content inside images</span><br /><br />Some webmasters used to display their content inside the images. Search engines will not be able to read the content inside images.<br /><br /><span style="font-weight: bold;">2. Use excessive Java Script/AJAX</span><br /><br />Search Engines can’t understand JavaScript/Ajax. So chance to getting index is less with excessive number of Java script/AJAX. Use HTML/CSS instead of Java/AJAX.<br /><br /><span style="font-weight: bold;">3. Use Flash only websites</span><br /><br />Even though the Flash can make an exciting blog, search engines can’t read the content inside the flash. You can make up your blog by flash scripts but never add your content inside the flash scripts. Use HTML instead of flash.<br /><br /><span style="font-weight: bold;">4. Usage of Search engine friendly URLs rather than human friendly URLs.</span><br /><br />Don’t use unrelated URLs. Use appropriate URL which can describe your content. Don’t worry about the length of the URL<br /><br /><span style="font-weight: bold;">5. Use automated directory submission software</span><br /><br />Never use automated software for directory submission. They will consider them as spams. Your blog will get banned from those directories. Use manual submission as an alternative. Submit to well-established directories by using unique Titles and Descriptions. Then they will not consider as copies.<br /><br /><span style="font-weight: bold;">6. Link exchange programs</span><br /><br />This is a time wasting program. No value. You will get nothing. Other thing is your link will be removed after few days without informing you. I did this for this blog and got nothing.<br /><br /><span style="font-weight: bold;">7. Use the same meta title and meta description in every page of the blog</span><br /><br />Once you use same title and Meta descriptions for all the posts the search engines will consider all the posts as one post. Then your whole site will not index. So use different Meta tags for different posts. But never use inappropriate Meta descriptions. Place key words inside the content.<br /><br />8. Use unnecessary key words and usage of excessive key words<br /><br />Use less competitive keywords rather than using high competitive key words. Then you can get instant traffic from search engines. Use Google Adword key word tool to find appropriate key words<br /><br /><span style="font-weight: bold;">9. Usage of wrong key words</span><br /><br />Your key words should match with your content. Key words should summarize the content of your article.<br /><br /><span style="font-weight: bold;">10. Copying someone else’s content and paste it on your site</span><br /><br />Never do this, because your site will be penalized by search engines. If you blogging on blogger they will ban your blog as well<br /><br /><span style="font-weight: bold;">11. Poor quality content</span><br /><br />Your content should be high in quality. Low quality and duplicated content is penalizing by search engines and you will get nothing by just posting that type of content.<br /><br /><span style="font-weight: bold;">12. Poor site navigation</span><br /><br />Your content should be prominent rather than your ads. Pop-up windows should be avoided. Your navigation bar should give links to relevant content<br /><br /><span style="font-weight: bold;">13. Irrelevant links</span><br /><br />The links on your site should related to your content and those links should lead to the relevant page<br /><br /><span style="font-weight: bold;">14. Expectation of quick results</span><br /><br />SEO is not a quick way to increase traffic to your blog. You need to be patience in order to get results. Sometimes it takes weeks to months to get the desired effect. So you should have sustained motivation to work on SEO.<br /><br /><span style="font-weight: bold;">15. High loading time of the page</span><br /><br />Visitors don’t like to waste their time. So you must consider a good hosting plan to improve the loading time of your blog or website.<br /><br />These are the most common mistakes done by most of the bloggers and site owners. You have to learn and read that carefully. After that you just have to do the right <strong style="font-weight: normal;">SEO tricks</strong> and choose the right <strong>SEO tutorial</strong> for you to learn.<br /><br />Stay tune in my blog, i will give you the others <strong style="font-weight: normal;">SEO secret</strong> for you...<br /></span>Androidhttp://www.blogger.com/profile/04147011145084815765noreply@blogger.com0tag:blogger.com,1999:blog-2129345434224652590.post-54359634451900961732012-01-16T19:32:00.000-08:002012-03-07T19:53:55.440-08:00How To Secure Your Computer on Public Network(Wireless Hotspot)<a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj8PJKs1HCUUPvOeRP0YHw6IIXJMWZzAbd-eb7X9gcEHxy_XIqkwGbihnIxKETG5-5CCVq8GbCF3zwQCFIE8CNIuCj6Vi9Q36m0H-YDg4Iwe1f_csloAZHfXEEDysL0pJaR42496_ji_fci/s1600/students_with_laptop.jpg"><img style="display: block; margin: 0px auto 10px; text-align: center; cursor: pointer; width: 320px; height: 214px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj8PJKs1HCUUPvOeRP0YHw6IIXJMWZzAbd-eb7X9gcEHxy_XIqkwGbihnIxKETG5-5CCVq8GbCF3zwQCFIE8CNIuCj6Vi9Q36m0H-YDg4Iwe1f_csloAZHfXEEDysL0pJaR42496_ji_fci/s320/students_with_laptop.jpg" alt="secure wireless network hotspot" id="BLOGGER_PHOTO_ID_5698443999731599506" border="0" /></a><br />Nowadays, many people got many benefits from the wireless network(hotspot) that've been installed in many place, especially the town square or coffee break place. It means that now internet is an easy thing to get. Now, we will speak about <strong>securing your pc</strong> or laptop on a wireless network location that called hotspot.<br /><br />Public Wi-Fi hotspots seem to be available in more locations than ever before. If you move between them a lot or are just getting started, following these security precautions can help keep your machine safe and secure. For this article we look at security steps in Windows 7, but most of these tips and suggestions will work in XP, Vista, and even other operating systems as well.<br /><br /><h2>Enable Your Firewall</h2>Whether you use the Firewall built into Windows or a 3rd-party app like ZoneAlarm, make sure it’s enabled before <span class="fullpost">signing on to a public hotspot. Click on Start then Control Panel, make sure View by large icons is selected then click Windows Firewall.<a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="http://www.howtogeek.com/wp-content/uploads/2010/08/sshot20100820220345.png"><br /></a><br />Then select Turn Windows Firewall on or off…<br /><a href="http://www.howtogeek.com/wp-content/uploads/2010/08/sshot20100820220002.png"><img style="display: block; margin: 0px auto 10px; text-align: center; cursor: pointer; width: 417px; height: 321px;" src="http://www.howtogeek.com/wp-content/uploads/2010/08/sshot20100820220002.png" alt="" border="0" /></a><br />Then make sure it’s turned on under Home or Work and Public network location settings.<br /><a href="http://www.howtogeek.com/wp-content/uploads/2010/08/sshot20100819233456.png"><img style="display: block; margin: 0px auto 10px; text-align: center; cursor: pointer; width: 547px; height: 345px;" src="http://www.howtogeek.com/wp-content/uploads/2010/08/sshot20100819233456.png" alt="" border="0" /></a><br /><h2>Turn Off All Sharing</h2> <p>File and folder sharing is a great feature in Windows 7 at home, but when you’re on a public network, you don’t want others to see your data. To turn it off, click on the Network icon in the Taskbar and select <em>Open Network and Sharing Center</em>.</p> <p><img style="background-image: none; border-width: 0px; padding-left: 0px; padding-right: 0px; display: inline; padding-top: 0px;" title="sshot-2010-08-20-[17-02-55]" alt="" src="http://www.howtogeek.com/wp-content/uploads/2010/08/sshot20100820170255.png" class="lazyLoad" border="" height="272" width="435" /></p> <p>Then click on the <em>Change advanced sharing settings</em> hyperlink.</p> <p><img style="background-image: none; border-width: 0px; padding-left: 0px; padding-right: 0px; display: inline; padding-top: 0px;" title="sshot-2010-08-20-[17-04-56]" alt="" src="http://www.howtogeek.com/wp-content/uploads/2010/08/sshot20100820170456.png" class="lazyLoad" border="" height="232" width="430" /></p> <p>Now make sure to Turn off file and Printer Sharing and Turn off Public folder sharing…make sure you save the changes when you’re done.</p> <img style="background-image: none; border-width: 0px; padding-left: 0px; padding-right: 0px; display: inline; padding-top: 0px;" title="sshot-2010-08-20-[17-08-37]" alt="" src="http://www.howtogeek.com/wp-content/uploads/2010/08/sshot20100820170837.png" class="lazyLoad" border="" height="494" width="593" /><br /><h2>Use Correct Public Wi-Fi Connection</h2> <p>Rather than having to worry about changing your settings every time you log on to a Public Network. When you first connect to the Public Hotspot, Windows will ask you to select a location for the Network. For example here we want to connect to the local coffee shop Wi-Fi.</p> <p><img style="background-image: none; border-width: 0px; padding-left: 0px; padding-right: 0px; display: inline; padding-top: 0px;" title="sshot-2010-08-17-[15-56-00]" alt="" src="http://www.howtogeek.com/wp-content/uploads/2010/08/sshot20100817155600.png" class="lazyLoad" border="" height="552" width="390" /></p> <p>Make sure you choose Public Network… </p> <p><img style="background-image: none; border-width: 0px; padding-left: 0px; padding-right: 0px; display: inline; padding-top: 0px;" title="sshot-2010-08-17-[16-02-21]" alt="" src="http://www.howtogeek.com/wp-content/uploads/2010/08/sshot20100817160221.png" class="lazyLoad" border="" height="420" width="549" /></p> <p>This will automatically turn off File Sharing, Network Discovery, and Public Folder Sharing.</p> <img style="background-image: none; border-width: 0px; padding-left: 0px; padding-right: 0px; display: inline; padding-top: 0px;" title="sshot-2010-08-20-[17-24-23]" alt="" src="http://www.howtogeek.com/wp-content/uploads/2010/08/sshot20100820172423.png" class="lazyLoad" border="" height="418" width="604" /><br /><h2>Use HTTPS Protocol</h2> <p>If you use regular HTTP protocol when connected to a public network, all of your text information can be easily found by an evil geek with a packet sniffer. You will want to use HTTPS <em>(Hypertext Transfer Protocol Secure) or SSL</em> wherever you can. For example you can set your Gmail and other Google services to always use https when connecting. Open your Gmail account settings, under the General tab scroll down to Browser connection and select <em>Always use https</em>. Again, make sure you click to Save Settings at the bottom of the page.</p> <p><img style="background-image: none; border-width: 0px; padding-left: 0px; padding-right: 0px; display: inline; padding-top: 0px;" title="sshot-2010-08-20-[17-38-40]" alt="" src="http://www.howtogeek.com/wp-content/uploads/2010/08/sshot20100820173840.png" class="lazyLoad" border="" height="352" width="460" /></p> <p>Then when you go to any Google services linked with that account, you will see https:// before the URL in the Address Bar.</p> <p><img style="background-image: none; border-width: 0px; padding-left: 0px; padding-right: 0px; display: inline; padding-top: 0px;" title="sshot-2010-08-20-[17-43-35]" alt="" src="http://www.howtogeek.com/wp-content/uploads/2010/08/sshot20100820174335.png" class="lazyLoad" border="" height="171" width="461" /></p> <p>It will work for any browser you’re using.</p> <p><img style="background-image: none; border-width: 0px; padding-left: 0px; padding-right: 0px; display: inline; padding-top: 0px;" title="sshot-2010-08-20-[18-06-09]" alt="" src="http://www.howtogeek.com/wp-content/uploads/2010/08/sshot20100820180609.png" class="lazyLoad" border="" height="142" width="383" /></p> <p>Another thing to check on your browser to ensure you’re using https is to look for the lock icon in the lower right corner of your browser.</p> <img style="background-image: none; border: 0px none; padding-left: 0px; padding-right: 0px; display: inline; padding-top: 0px;" title="sshot-2010-08-23-[20-22-32]" alt="" src="http://www.howtogeek.com/wp-content/uploads/2010/08/sshot20100823202232.png" class="lazyLoad" border="" height="183" width="291" /><br /><p><strong>Firefox Addons</strong></p> <p>If you’re using Firefox and don’t want to worry if Google services switch to https, then check out the <a href="http://www.optimizegoogle.com/">OptimizeGoogle addon</a>. Among other awesome ways it allows you to customize Google, you can set it to have all services use https when able.</p> <p><img style="background-image: none; border-width: 0px; padding-left: 0px; padding-right: 0px; display: inline; padding-top: 0px;" title="sshot-2010-08-20-[18-52-35]" alt="" src="http://www.howtogeek.com/wp-content/uploads/2010/08/sshot20100820185235.png" class="lazyLoad" border="" height="221" width="429" /></p> <p>Another handy Firefox addon from the EFF <em>(Electronic Frontier Foundation)</em> is HTTPS Everywhere. It will switch to https protocol for several major sites, and you can <a href="https://www.eff.org/https-everywhere/rulesets">write your own rulesets</a> with it as well. </p> <p><img style="background-image: none; border-width: 0px; padding-left: 0px; padding-right: 0px; display: inline; padding-top: 0px;" title="sshot-2010-08-20-[18-12-11]" alt="" src="http://www.howtogeek.com/wp-content/uploads/2010/08/sshot20100820181211.png" class="lazyLoad" border="" height="327" width="612" /></p><h2>Private VPNs</h2> <p>Even with using the addons above, not all sites you visit will be protected with SSL encryption. If you want to make sure you have extra protection, go through a VPN <em>(Virtual Private Network). </em>This `llows you to route your data traffic though a separate and secure network.<em> </em>There are several different free and subscription services that will do this for you but we’ll just take a look at a couple. </p> <p>ProXPN is an easy to use VPN client. You need to create an account first, then download and install the client. After that log into your account and you’ll be connected to their secure VPN without worrying about traffic from your machine being on the hotspot.</p> <p><img style="background-image: none; border-width: 0px; padding-left: 0px; padding-right: 0px; display: inline; padding-top: 0px;" title="sshot-2010-08-21-[23-04-22]" alt="" src="http://www.howtogeek.com/wp-content/uploads/2010/08/sshot20100821230422.png" class="lazyLoad" border="" height="489" width="585" /></p> <p>They offer a free and premium version. We found that our connection could be slow at times using the free version, especially on multimedia sites. If you find you’re using Hotspots a lot, you might want to pay the $5/month for the premium version which did produce faster speeds, and ensures higher levels of encryption.</p> <p><img style="background-image: none; border-width: 0px; padding-left: 0px; padding-right: 0px; display: inline; padding-top: 0px;" title="sshot-2010-08-17-[03-28w-10]" alt="" src="http://www.howtogeek.com/wp-content/uploads/2010/08/sshot201008170328w10.png" class="lazyLoad" border="" height="226" width="523" /></p> <p>Hotspot Shield is another popular and easy to use VPN utility that runs in the background and creates the VPN automatically. </p> <p><img style="background-image: none; border-width: 0px; padding-left: 0px; padding-right: 0px; display: inline; padding-top: 0px;" title="sshot-2010-08-17-[03-34-27]" alt="" src="http://www.howtogeek.com/wp-content/uploads/2010/08/sshot20100817033427.png" class="lazyLoad" border="" height="262" width="480" /></p> <p>The biggest caveat is it will display ads and try to install crapware on your machine. Make sure to uncheck any crapware it tries to offer you.</p> <p><img style="background-image: none; border-width: 0px; padding-left: 0px; padding-right: 0px; display: inline; padding-top: 0px;" title="sshot-2010-08-17-[03-27-25]" alt="" src="http://www.howtogeek.com/wp-content/uploads/2010/08/sshot20100817032725.png" class="lazyLoad" border="" height="427" width="541" /></p> <p>While it will annoy you with ads, it is free and easy to use. If you only need to use it occasionally while at a Hotspot, it might be worth the ad annoyance.</p> <p><img style="background-image: none; border-width: 0px; padding-left: 0px; padding-right: 0px; display: inline; padding-top: 0px;" title="sshot-2010-08-17-[03-32-37]" alt="" src="http://www.howtogeek.com/wp-content/uploads/2010/08/sshot20100817033237.png" class="lazyLoad" border="" height="455" width="613" /></p> <p>Another thing you might want to consider is setting up your own VPN on your computer or on Windows Home Server. We’ll be writing up a full step by step tutorial on how to create your own VPN in the near future, so stay tuned.</p> <img style="background-image: none; border: 0px none; padding-left: 0px; padding-right: 0px; display: inline; padding-top: 0px;" title="sshot-2010-08-23-[19-25-56]" alt="" src="http://www.howtogeek.com/wp-content/uploads/2010/08/sshot20100823192556.png" class="lazyLoad" border="" height="450" width="640" /><br /><h2>Disable Wi-Fi When not in Use</h2> <p>If you’re not using your Wireless connection while you at a hotspot, simply turn it off. This can be hard to remember, and annoying if you’re constantly doing research online while working. But if you can plan your work around times when you don’t need to be online for good chunk of time, just turn it off. Click on the Wireless icon on the Taskbar right-click the network you’re connected to and Disconnect. </p> <p><img style="background-image: none; border-width: 0px; padding-left: 0px; padding-right: 0px; display: inline; padding-top: 0px;" title="sshot-2010-08-21-[20-40-25]" alt="" src="http://www.howtogeek.com/wp-content/uploads/2010/08/sshot20100821204025.png" class="lazyLoad" border="" height="392" width="378" /></p><h2>Windows Updates</h2> <p>Make sure you’re keeping your machine updated with the latest security fixes from Microsoft. In the geek community we all know the 2nd Tuesday of every month is called “Patch Tuesday”, when the team from Redmond send out the latest security fixes to plug holes and fix vulnerabilities in the OS, hardware drivers –including wireless patches, and other installed software like MS Office. </p> <p><img style="background-image: none; border: 0px none; padding-left: 0px; padding-right: 0px; display: inline; padding-top: 0px;" title="sshot-2010-08-23-[19-31-55]" alt="" src="http://www.howtogeek.com/wp-content/uploads/2010/08/sshot20100823193155.png" class="lazyLoad" border="" height="320" width="509" /></p> <p>However, some vital patches might be released before then so make sure you’re receiving Automatic Updates. You don’t have to have them download and install automatically, but you can have Windows notify you when fixes are available and you can research if you want to add them or not. When in doubt, it’s usually best to just install the updates, and keep note of what they are so you can uninstall them if you find something isn’t working.</p> <p><img style="background-image: none; border-width: 0px; padding-left: 0px; padding-right: 0px; display: inline; padding-top: 0px;" title="sshot-2010-08-20-[22-43-09]" alt="" src="http://www.howtogeek.com/wp-content/uploads/2010/08/sshot20100820224309.png" class="lazyLoad" border="" height="450" width="500" /></p><h2>Update Antivirus Software</h2> <p>This should also go without saying, but keeping your Antivirus software is extremely important on all of your machines especially on a large public network where there can be a lot of malicious software lurking.</p> <p><img style="background-image: none; border-width: 0px; padding-left: 0px; padding-right: 0px; display: inline; padding-top: 0px;" title="sshot-2010-08-19-[23-42-34]" alt="" src="http://www.howtogeek.com/wp-content/uploads/2010/08/sshot20100819234234.png" class="lazyLoad" border="" height="230" width="565" /></p> <p>While this is microsoft security essentials, no matter what brand you use, make sure Real-time scanning is enabled.</p> <img style="background-image: none; border: 0px none; padding-left: 0px; padding-right: 0px; display: inline; padding-top: 0px;" title="sshot-2010-08-23-[19-34-54]" alt="" src="http://www.howtogeek.com/wp-content/uploads/2010/08/sshot20100823193454.png" class="lazyLoad" border="" height="365" width="551" /><br /><h2>Use Your Best Judgment</h2><br />- Get to know the folks who are operating the Wi-Fi Hotspot. Ask them the type of encryption they are using on the router and if they seem to know basic Wi-Fi security. If not, you might want to use a different location – especially if they have it wide open.<br /><br />- Don’t enter personal information connected to a Wi-Fi Hotspot unless you’re completely sure everything is safe and encrypted. If you need to do Internet Banking, wait until you’re at home or in the office.<br /><br />- Busy hotpots like at an airport or hotel can have a lot of people on it, who knows what their looking at, but there most certainly are some “bad guys”. Try to use smaller locations like at a library or coffee shop.<br /><br />- When in doubt, just don’t connect. If your online activity can wait, just hold off until you’re sure you’re on a secure network.<br /><br />- Make sure and follow the guidelines described above, if you just connect and leave everything open, there is only yourself to blame.<br /><br />from : howtogeek.com</span>Androidhttp://www.blogger.com/profile/04147011145084815765noreply@blogger.com0tag:blogger.com,1999:blog-2129345434224652590.post-595154778665338322011-09-19T21:52:00.000-07:002012-03-07T19:53:55.614-08:00Behind of Bluetooth wireless device<a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhIf1Uq5fY5-N9-T5-x3uEClgoqgno8RTg9Os4cEIEPU9IrOibZg198Hu0MRd8RaVbY0V2Nt5h6dpplPKk2Q9VrUjZOiHPWuY4eCOzFp9iVSOhViKR3ytIRwvzBOBXjh6ik9Nde3U-tEaD2/s1600/bluetooth-icon.png"><img style="float:left; margin:0 10px 10px 0;cursor:pointer; cursor:hand;width: 200px; height: 200px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhIf1Uq5fY5-N9-T5-x3uEClgoqgno8RTg9Os4cEIEPU9IrOibZg198Hu0MRd8RaVbY0V2Nt5h6dpplPKk2Q9VrUjZOiHPWuY4eCOzFp9iVSOhViKR3ytIRwvzBOBXjh6ik9Nde3U-tEaD2/s200/bluetooth-icon.png" border="0" alt=""id="BLOGGER_PHOTO_ID_5654301499855265954" /></a><br />Bluetooth is the industry specification for personal area networks (personal area networks, or PAN) without wires. Bluetooth connects and can be used to perform the exchange of information between devices.<br /><br />Spesification of Bluetooth devices was developed and distributed by the Bluetooth Special Interest Group. Bluetooth operates in 2.4 GHz frequency band using a frequency hopping traceiver capable of providing voice and data communication services in real time between bluetooth host-host with limited distance.weakness of this technology is a short range and low data transfer capability.<br /><br /><span class="fullpost"><br />The presence of bluetooth makes a person no longer mess around with what cable, what color, heading nowhere, and must be plugged in where. The function of the interconnection between the equipment can be replaced by bluetooth chipset that is placed in a built-in electronic equipment related. <br /><br />The name "Bluetooth" is derived from the name of the king at the end of ten centuries, Harald Blatand which in England is also called Harald Bluetooth. Connotation is not so far wrong, because according to mythology story, supposedly Bluetooth-haired and dark skinned. He likes to eat blueberries or strawberries, then it is worth when the tooth Blatand become bluish or blue tooth.<br /><br />He is the king of Denmark who has managed to unite the tribes that previously fought, including the tribes of the area now called Norway and Sweden. Even the Scania region in Sweden, where bluetooth technology is found to also include territories. King's ability as a unifier is also similar to bluetooth technology now that can connect various devices such as personal computers and mobile phones.<br /><br />While the Bluetooth logo comes from the German unification of the two letters which are analogous with the letter H and B (short for Harald Bluetooth), namely H (Hagall) and Runic letter (Blatand) which are then combined.<br /><br />Beginning of Bluetooth is a wireless communication technology (without cable) that operate in the 2.4 GHz unlicensed frequency band ISM (Industrial, Scientific and Medical) using a frequency hopping transceiver is capable of providing voice and data communication services in real-time between bluetooth host-host with limited service reach distance (around 10 meters).<br /><br />Bluetooth card that uses the IEEE 802.11 radio frequency standard with a limited range of services and lower ability to transfer data from card to Wireless Local Area Network (WLAN).<br /><br />Bluetooth formation promoted by five large companies Ericsson, IBM, Intel, Nokia and Toshiba to form a Special Interest Group (SIG), which launched this project. In July 1999 document bluetooth specification version 1.0 was launched.<br /><br />In December 1999 started again making bluetooth specification documents version 2.0 with the addition of four new promoters of 3Com, Lucent Technologies, Microsoft and Motorola. Currently, more than 1800 companies in various fields to join in a consortium as an adopter of bluetooth technology. Although the standard Bluetooth SIG is currently 'owned' by the promoter group but he is expected to become an IEEE standard (802.15).<br /></span>Androidhttp://www.blogger.com/profile/04147011145084815765noreply@blogger.com0tag:blogger.com,1999:blog-2129345434224652590.post-84416932602496689702011-07-22T16:14:00.000-07:002012-03-07T19:53:55.736-08:00Tips Buy Web HostingWeb Hosting is one form of rental services on the Internet that allows a person online to the websites / web on the internet. The place is called the hosting of data storage, and usually measured in units of capacity in megabytes (Mb) up to terabytes (Tb) and have a connection to the internet so that data can be requested or accessed by users from all over the place simultaneously. So in short for web hosting is a web hosting or data storage from a web.<br /><br />With the increasing number of companies that sell web hosting services make consumers confused in determining the choice. There are companies that offer hosting at a great price some are very cheap, there are limits there are also features that include unlimited versatile features, and much more to offer the lure to attract the attention of consumers. As consumers we must be extra careful not to be fooled by the outside appearance of the web hosting company. Here are tips to get the best web hosting, order of things that most need to prioritize.<br /><span class="fullpost"><br />Tips for Choosing Web Hosting<br /><br />1. Service<br /><br />Web hosting is a business-related services, and service means service. Of course you feel very upset if you have difficulty or even problems with the web hosting and then you try to contact Customer Support but no response. For that before buying web hosting, make sure you choose a web hosting company that has customer support that provide the best service.<br /><br />2. Quality of Server and Network<br /><br />Consumers who purchase web hosting would want a website and email is always accessible with a smooth, fast, and guaranteed data security. Before you purchase a hosting it is better if you do a check and recek for quality and speed of server access, and of course even better if your web hosting company is giving a trial or a trial account.<br /><br />3. Rights to the Domain and Hosting You Buy<br /><br />Goods you have purchased is yours entirely, and make sure you have full access rights over the domain and hosting. Currently there are still many companies that do not give full access rights over its domain, making it difficult if consumers want to move hosting let alone perform the domain transfer to another company.<br /><br />4. Reliable and Professional Company<br /><br />In choosing a web hosting company make sure you buy at a trusted because it involves data security and continuity of your business. And choose a responsible company and give warranty for the products it sells.<br /><br />5. Price<br /><br />In business services, the price is the last thing that can be used for comparison. Because the same price does not necessarily indicate the same quality. Adage says 'There is no way prices', most of it is true. You should be suspicious if there are companies that provide web hosting prices are very cheap especially with unlimited features. We know that the web hosting servers have restrictions, space (hard drive) has a limit, traffic / bandwidth have limits, and of resources of a computer / server has a limit. But do not close the possibility of good quality can be obtained at a cheap price, for that consumers should be more observant in choosing.<br /></span>Androidhttp://www.blogger.com/profile/04147011145084815765noreply@blogger.com0tag:blogger.com,1999:blog-2129345434224652590.post-1895701742372770522011-07-12T04:56:00.000-07:002012-03-07T19:53:55.850-08:00How to Make VPS<a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiuMEaKgHh1EzrtIXKUpBGeOWB2UTaN4UP17yn-IqllCVm7nYyjofe7Q_aU_cASkodhx7iMpXDjS1MkFT48JI-okdLT77GXtNzoD38BJ7Al1XElhEX85p2FTywkBknSWTWowVU_TH59l032/s1600/vps.jpg"><img style="float:left; margin:0 10px 10px 0;cursor:pointer; cursor:hand;width: 120px; height: 200px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiuMEaKgHh1EzrtIXKUpBGeOWB2UTaN4UP17yn-IqllCVm7nYyjofe7Q_aU_cASkodhx7iMpXDjS1MkFT48JI-okdLT77GXtNzoD38BJ7Al1XElhEX85p2FTywkBknSWTWowVU_TH59l032/s200/vps.jpg" border="0" alt=""id="BLOGGER_PHOTO_ID_5628437377390166242" /></a><br />Nowadays a lot of which can be used to create a vpn server from starting a direct form of hardware up to the only form of application, from the expensive to the free.<br /><br />OpenVPN is a VPN application is free (opensource) is quite reliable. Some sources say OpenVPN is in fact not the safest but if the data must be transferred between two or more networks are not too sensitive like more than enough moreover OpenVPN OpenVPN is also very easy to install.<br /><br />Here I will just tell you about the installation steps OpenVPN on FreeBSD. Although probably could have used some of his tricks on Linux or * nix like any other OS.<br /><br />Ok long story rather than let's start it.<br /><br />First OpenVPN on FreeBSD can be found in the folder / usr / ports / security / openvpn, which is required usually lzo library lib but since I installed it through the ports, then all the dependencies will automatically be installed.<br /><span class="fullpost"><br />For installation please follow these steps (all performed by root)<br /><br />cd / usr / ports / security / openvpn<br />make config<br />Make the build<br />make install clean<br /><br />Performed the above steps so that you have a chance to see what happens at each step. Actually you can just change directory and typing make install clean immediately.<br /><br />After the installation process goes wrong and no significant errors, then input the following line to / etc / rc.conf with your favorite text editor.<br /><br />openvpn_enable = "YES"<br /><br />Now we will create a config file to be placed in the folder / usr / local / etc / openvpn if the folder does not exist yet please make advance with the command<br /><br />mkdir / usr / local / etc / openvpn<br /><br />Then please move to the folder and start creating openvpn.conf file with your favorite text editor.<br /><br />cd / usr / local / etc / openvpn<br />pico openvpn.conf<br /><br />Now please enter the following sample config.<br /><br /># Specify device<br />dev tun<br /><br /># # The server and client IP Pool<br />server 10.8.0.0 255.255.255.0<br />ifconfig-pool-persist ipp.txt<br /><br /># Certificates for VPN Authentication<br />ca / usr / local / etc / openvpn / keys / ca.crt<br />cert / usr / local / etc / openvpn / keys / server.crt<br />key / usr / local / etc / openvpn / keys / server.key<br />dh / usr/local/etc/openvpn/keys/dh1024.pem<br /><br /># Routes to client<br />push "route 192.168.0.0 255.255.255.0"<br /># Compression VPN link<br />comp-lzo<br /><br />keepalive 10 60<br />ping-timer-rem<br />persist-tun<br />persist-key<br /><br /># Run OpenVPN as a daemon and drop privileges to user / group nobody user nobody<br />group nobody<br />daemon<br /><br />Save the file above, and we continue with cerificates. Copy the script to create a certificate from the folder / usr / local / share / doc / openvpn manner as follows (examples copied it to the folder / home / giest please be replaced with your user).<br /><br />cp-r / usr / local / share / doc / openvpn / easy-rsa / home / guest /<br />cd / home / guest / easy-rsa<br /><br />After successfully copying easy-rsa scripts then please adan edit the vars file with your favorite editor and adjust purposes (without dieditpun no problems then you will be given only a few questions over and over again). Here are examples of parts that you need to edit.<br /><br />export KEY_COUNTRY = ID<br />export KEY_PROVINCE = "ENGLAND"<br />export KEY_CITY = LONDON<br />export KEY_ORG = "GUEST-VPN"<br />export KEY_EMAIL = "admin@guest.org"<br /><br />Then we moved from the FreeBSD default shell (usually tcsh) to sh or bash first. If you do not move the shell I guarantee you will not succeed in making certificates for openvpn.<br /><br />To switch to sh or bash please type the following command.<br /><br />sh<br /><br />Once you move the shell follow the steps below.<br /><br />. vars<br />NOTE: Pls you run. / Clean-all, I Will be doing a rm-rf on / usr / home / Guest / easy-rsa / keys<br />. / Clean-all<br />. / Build-ca<br />Generating a 1024 bit RSA private key<br />....................................++++++<br />..............++++++<br />writing new private key to 'ca.key'<br />-----<br />You are about to be asked to enter information That Will be incorporated<br />into your certificate request.<br />What you are about to enter is what is Called a Distinguished Name or a DN.<br />There are quite a Few fields but you can leave some blank<br />For some fields there Will be a default value,<br />If you enter '.,' Will the field be left blank.<br />-----<br />Country Name (2 letter code) [ID]:<br />State or Province Name (full name) [ENLAND]:<br />Locality Name (eg, city) [LONDON]:<br />Organization Name (eg, company) [GUEST-VPN]:<br />Organizational Unit Name (eg, section) []:<br />Common Name (eg, your name or your server's hostname) []:<br />Email Address [admin@guest.org]:<br /><br />Ok as you can see you are required to answer some questions, but because previously I've edit the file vars so I can just hit enter to use the default answer.<br /><br />Next is to build certificate and key follow the steps below<br /><br />. / Build-key-server server<br />Generating a 1024 bit RSA private key<br />..........++++++<br />.................................................. ++++++<br />writing new private key to 'server.key'<br />-----<br />You are about to be asked to enter information That Will be incorporated<br />into your certificate request.<br />What you are about to enter is what is Called a Distinguished Name or a DN.<br />There are quite a Few fields but you can leave some blank<br />For some fields there Will be a default value,<br />If you enter '.,' Will the field be left blank.<br />-----<br />Country Name (2 letter code) [ID]:<br />State or Province Name (full name) [ENGLAND]:<br />Locality Name (eg, city) [LONDON]:<br />Organization Name (eg, company) [GUEST-VPN]:<br />Organizational Unit Name (eg, section) []:<br />Common Name (eg, your name or your server's hostname) []: SERVER<br />Email Address [admin@guest.org]:<br /><br />Please enter the following 'extra' attributes<br />to be sent with your certificate request<br />A challenge password []: 123456<br />An optional company name []: ARSENAL<br />Using configuration from / usr / home / Guest / easy-rsa / openssl.cnf<br />Check That the request matches the signature<br />Signature ok<br />The Subject's Distinguished Name is as follows<br />countryName : P RINTABLE: 'ID'<br />stateOrProvinceName: P RINTABLE: 'ENGLAND'<br />localityName : RINTABLE: 'LONDON'<br />OrganizationName : RINTABLE: 'GUEST-VPN'<br />commonName : RINTABLE: 'SERVER'<br />emailAddress : IA5STRING: 'admin@guest.org'<br />Certificate is to be certified until July 12 18:04:29 2019 GMT (3650 days)<br />Sign the certificate? [Y / n]: y<br /><br />1 out of 1 certificate requests certified, commit? [Y / n] y<br />Write out database with 1 new entries<br />Data Base Updated<br /><br />See if we do not edit the file vars we need to answer that question once again. now we will build certificate and key for use by the client. I emulated this will make the client certificate for 2 only. if you have more than two clients please adjusted.<br /><br />. / Build-key client1<br />Generating a 1024 bit RSA private key<br />.........++++++<br />....................................++++++<br />writing new private key to 'client1.key'<br />-----<br />You are about to be asked to enter information That Will be incorporated<br />into your certificate request.<br />What you are about to enter is what is Called a Distinguished Name or a DN.<br />There are quite a Few fields but you can leave some blank<br />For some fields there Will be a default value,<br />If you enter '.,' Will the field be left blank.<br />-----<br />Country Name (2 letter code) [ID]:<br />State or Province Name (full name) [ENGLAND]:<br />Locality Name (eg, city) [LONDON]:<br />Organization Name (eg, company) [GUEST-VPN]:<br />Organizational Unit Name (eg, section) []:<br />Common Name (eg, your name or your server's hostname) []: CLIENT1<br />Email Address [admin@giest.org]:<br /><br />Please enter the following 'extra' attributes<br />to be sent with your certificate request<br />A challenge password []: 123456<br />An optional company name []: ARSENAL<br />Using configuration from / usr / home / Guest / easy-rsa / openssl.cnf<br />DEBUG [load_index]: unique_subject = "yes"<br />Check That the request matches the signature<br />Signature ok<br />The Subject's Distinguished Name is as follows<br />countryName: P RINTABLE: 'ID'<br />stateOrProvinceName: P RINTABLE: 'england'<br />localityName: P RINTABLE: 'london'<br />OrganizationName: P RINTABLE: 'GUEST-VPN'<br />commonName: P RINTABLE: 'CLIENT1'<br />emailAddress: IA5STRING: 'admin@guest.org'<br />Certificate is to be certified until July 12 18:10:43 2019 GMT (3650 days)<br />Sign the certificate? [Y / n]: y<br /><br />1 out of 1 certificate requests certified, commit? [Y / n] y<br />Write out database with 1 new entries<br />Data Base Updated<br /><br />To client2 just typing<br /><br />. / Build-key client2<br /><br />you should replace only the part<br /><br />[Source] Common Name (eg, your name or your server's hostname) []: CLIENT2 [/ source]<br /><br />If you do not make changes here the certificates and keys for the client to the two would not formed.<br /><br />Next we build dh parameters with a command like the following<br /><br /> 1. #. / Build-dh<br /> 2. Generating DH parameters, 1024 bit long safe prime, generator 2<br /> 3. This is going to take a long time<br /> 4.<br /><br />ok now completed the process of making key right now you just exit back to your default shell with the command exit<br /><br />Now copied keys folder to / usr / local / etc / openvpn with the command<br /><br />cp-r keys / usr / local / etc / openvpn /<br /><br />Before we start running the openvpn server we first prepare a file for the log. Please edit the file / etc / syslog.conf and add the following line at the bottom of the syslog.conf file.<br /><br />! Openvpn<br />.* / Var / log / openvpn.log<br /><br />then create the file and restart syslog openvpn.log ny<br /><br />touch / var / log / openvpn.log<br />killall-HUP syslogd<br /><br />Now we load the first module tun / tap tun device that could arise later.<br /><br />kldload if_tun<br />kldload if_tap<br /><br />if you find errors kldload: can not load if_tun: File exists mean tun or tap and it was too load so do not worry.<br /><br />In order to tun and tap was loaded each time the boot please edit the file / boot / defaults / loader.conf then locate the following lines and change to YES<br /><br />if_tap_load = "YES" # Ethernet tunnel software network interface<br />if_tun_load = "YES" # Tunnel driver (user process ppp)<br /><br />Ok lah is now complete we are ready to run the OpenVPN server for the first time. To run OpenVPN please type the following command.<br /><br />/ Usr / local / etc / rc.d / openvpn start<br /><br />Next we check whether everything is ready or not we check first with the command ifconfig tun device<br /><br />tun0: flags = 8051 mtu 1500<br />inet 10.8.0.1 -> 10.8.0.2 netmask 0xffffffff<br />Opened by PID 10147<br /><br />If you've seen a display like the above means that the OpenVPN server is already successful path.<br /><br />It remains to add the following rules for your pf.conf<br /><br /># VPN Interface<br />vpn_if = "tun0"<br /><br /># VPN Network<br />vpn_network = "10.8.0.0/24"<br /><br /># NAT VPN connections<br />nat on $ ext_if from $ vpn_network to any -> ($ ext_if)<br /><br /># Inbound VPN connections<br />pass in on $ ext_if proto udp from any to port 1194 keep state<br />pass quick on $ vpn_if<br /><br /><br /></span>Androidhttp://www.blogger.com/profile/04147011145084815765noreply@blogger.com0tag:blogger.com,1999:blog-2129345434224652590.post-24532104214966057442011-07-05T22:28:00.000-07:002012-03-07T19:53:56.044-08:00hosting tutorial for newbie<a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg_M7wa_NO5BGLJ5dWzTyu5JBSrW5FtSHg93RZYtxiXBwFNHSmI9b_bYG5THs_FZqebBZck2zIqaMBstGoTrE5tCt4aQ043aUEsUJvx72I4Ggu_rCdGgIpvQGxcDShbvygXY-C7RiqXift-/s1600/Free-Web-Hosting.jpg"><img style="float:left; margin:0 10px 10px 0;cursor:pointer; cursor:hand;width: 163px; height: 145px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg_M7wa_NO5BGLJ5dWzTyu5JBSrW5FtSHg93RZYtxiXBwFNHSmI9b_bYG5THs_FZqebBZck2zIqaMBstGoTrE5tCt4aQ043aUEsUJvx72I4Ggu_rCdGgIpvQGxcDShbvygXY-C7RiqXift-/s200/Free-Web-Hosting.jpg" border="0" alt=""id="BLOGGER_PHOTO_ID_5626113674205311602" /></a><br /><br />Hosting is a place or Internet service to create web pages that you created online and can be accessed by others. So, based on own experience of hosting, there is one thing to note in terms of renting a hosting for the site that we created, ie: note the true owner of the company's rental service provider hosting, about whether stable or not. Companies that are unstable, potentially aka "bankrupt" or going to close, more or less will cause instability of the sites we manage. For example it could cause problems of domain ownership, the problem of domain transfer process is complicated due to email "hostmaster" no man's land, and so on. Sure we'll hassle of having problems earlier. Therefore choose a company that is stable, although it may cost a little bit expensive. but we can avoide all risk with make own hosting a thome.<br /><br />In this tutorial we will teach you make own hosting, what need for make it..?<br /><span class="fullpost"><br />PC for server specification.<br />ADSL modem with Internet connection Unlimited<br />XAMPP as Localhost<br /><br />With the above assumptions infrastructure needs have been installed and an Internet connection Unlimited is the normal way we can make your own webhost with the help of XAMPP.<br /><br />Now we begin to modify the modem configuration to make a pc that is connected to the adsl who we are as a server host needs as I mentioned above (www, ftp, telnet, etc.).<br /><br />was logged into your Speedy ADSL Modem<br /> speedy change in the modem connection, which was originally PPPoE / PPPoA (with user & password), Becoming Bridge Mode (without user & password)<br /> Save your Modem Configuration. now to be able to get a dynamic ip from speedy, we switch to the connected PC with Speedy directly or connected through a hub.<br /> open the Network Connection or by clicking Start - Settings - Control Panel - Network Connections<br /> Then Make a PPP connection from your Windows to get a dynamic ip from speedy by clicking Create a new connections with your username and password Speedy<br /> This will bring up Fields Username & Password, if you've followed the above correctly STEP 2, then the box that pops up will have been filled for his column username & password, now to do the connection, press CONNECT<br /> When Speedy connection you two indicators will appear as shown below, and when the ipconfig via DOS, PC You Have 2 IP Address, which is Local IP (private IP) and IP from Speedy (public IP)<br /><br />From the experiments above, your PC can now be made in servers that can be recognized the world directly, in the sense that can host many needs such as www, ftp, email, etc., for the above role is just as Bridging the modem (it has no IP and as a bridge your speedy internet connection)<br /><br />Getting a dynamic DNS via DynDNS<br /><br />DynDNS (Dynamic DNS) - www.dyndns.com is a provider for dynamic DNS and static IP as well as many Sub-Domain that can be used freely and FREE, in this article we will create a sub domain 'anda.subdomain.xxx' with subdomains are dozens of options already available in dyndns.com and periodically updating the domain to always recognize your speedy ip always change because it is dynamic, and supporting software.<br /><br />Terms and How:<br /><br /> Your internet connection should already connected with your ISP<br /> open this url in your browser: www.dyndns.com<br /> or immediately wrote to create an account at: https://www.dyndns.com/account/create.html<br /> do a confirmation via email before, and click on the url that is in it to activate your account.<br /> when it is activated, your account will be activated immediately<br /> dydns do log into the user + password before<br /> click on the My Services located in upper right corner<br /> menu, select Add Host Services (pl. circumference 1)<br /> then click Add Dynamic DNS Host (pl. circumference 2)<br /><br />A quick way to make by-pass numbers to 7-9 with a click / copy paste in browser: https://www.dyndns.com/account/services/hosts/dyndns/add.html<br /><br />Example:<br /><br /> eg the hostname field: yourhost<br /> then with the domain option: blogdns.net<br /> some other setting? default (no change)<br /> then click? Add Host<br /><br />then the domain url address for your speedy is:<br /><br />http://yourhost.blogdns.net/<br /><br />NOTE:<br /><br /> Sub-Domain that you can make a sub-domain you forever<br /> Sub-domains that you created earlier (http://yourhost.blogdns.net/) can not keep changing your ip on speedy unless you follow the last stage of which I will explain below, that will automatically update your dynamic ip with sub -domains at DynDNS<br /> Updating DNS at DynDNS.com process<br /><br />Updating DNS at DynDNS is very necessary, given ip Speedy you're a Dynamic IP (no IP)<br /><br />In order to understand changes in the IP DynDNS always speedy, you need to update it regularly on his Web DynDNS, especially when the new modem at the switch, or other factors erosive change ip<br /><br />To facilitate the process of Updating and updates AUTOMATICALLY, DynDNS has provided its support software provided by Free, which serves to lawyer-updatan automatically sub-domain with your speedy dynamic ip.<br /><br />Follow the steps below and download the updater file:<br /><br /> https://www.dyndns.com/support/clients/ or <a href="http://www.download.com/DynDNS-Updater/3000-2381-10405775.html?part=dl-DynDNSUpd&subj=dl&tag=button">here</a> <br /> extract is the file<br /> install file<br /> create groups<br /> fill in your username and password there speedy, or click the Detect button to detect dialers account that you created above<br /> then click OK until the application is closed, but be sure to try DynDNS icon is still there, wait a minute for about 5-10 seconds, to make connecting automatically DynDNS<br /><br />enter the sub-domain that you created above with a choice of system DynDNS<br /><br />Indicators:<br /><br /> Green tick you are successful<br /> Check the yellow update process<br /> Check your red failed<br /></span>Androidhttp://www.blogger.com/profile/04147011145084815765noreply@blogger.com0tag:blogger.com,1999:blog-2129345434224652590.post-62891771204909866592011-06-26T21:15:00.000-07:002012-03-07T19:53:56.311-08:00Get Free Access Internet WiFi<a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEghf7FxeGpWEDXLrqTqN6Qa3_oiTGmF8BNdz6VJJMIHm8D4VAMmJfh1rYIR-udjdF7b7QjoKnhRk_41rt3A8_i5HW0CAcmiv1hRd_1Z5NJIndgPf3ItP8Qxt6INdoNcHjR1iz0_4mERaLoT/s320/free_wifi_laptop-704912.jpg"><img style="float:left; margin:0 10px 10px 0;cursor:pointer; cursor:hand;width: 225px; height: 186px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEghf7FxeGpWEDXLrqTqN6Qa3_oiTGmF8BNdz6VJJMIHm8D4VAMmJfh1rYIR-udjdF7b7QjoKnhRk_41rt3A8_i5HW0CAcmiv1hRd_1Z5NJIndgPf3ItP8Qxt6INdoNcHjR1iz0_4mERaLoT/s320/free_wifi_laptop-704912.jpg" border="0" alt="" /></a><br />WiFi HotSpot As we know, hotspots or wireless internet access with standard 802.11b / g are not familiar stuff our ears, and when we go in public places like the Mall, Cafe, hotels and offices, with our easy to find the facility ..<br /><br />Unfortunately not all providers offer wireless Internet facilities for free, or if free. extremely limited.<br />One of the protection used wireless service providers is to restrict Internet access based on MAC Address.<br />What is MAC Address?<br />In computer networking a Media Access Control address (MAC address) or Ethernet Hardware Address (EHA) or hardware address or adapter address is a quasi-unique identifier attached to most network adapters (NICs) ..<br />Okay so the conclusion MAC Address is a unique number that distinguishes each network device that is attached dikomputer us.<br />An example is the hotspot in hotel hilton. At hilton hotspot The Wireless Internet service providers, limiting the use of the Internet is free only for 3 hours, after that you can not access the Internet again, and would not be able to access again tomorrow. Type of protection used is MAC Address Filtering.<br />How to break through the protection with a MAC Address?<br /><span class="fullpost"><br />There is a very useful tool for anda.Tools was named K-MAC Download Dicini<br />With this tool you will be able to change your MAC-Address instantly and what does it mean? You can break the MAC Address Protection!. Each share of Internet access you run out in 3 hours, you need to do is change your MAC address, and do the connection.<br />I add more for info. WEP/WPA/WPA-2 cracking passwords using<br />programs are available in packages of OS backtrack<br />kismet<br />Kismet is a security tool that runs Linux, Kismet is used to eavesdrop on data traffic in the Internet network.<br />Aircrak-Aircrak-PTW PTW is a tool used to crack wireless protected. Each of these notebooks with different specs, so any way to use aircrack different.<br />One trick is also used to search for passwords which are used by someone to access hotspots that use prepaid cards.<br />Simple tool that prepared aja sih:<br />Software required:<br />1. <a href="http://www.angryip.org/w/Download">Angry IP Scanner</a><br />2. <a href="http://tmac.technitium.com/">Technitium MAC Address</a><br />Immediately wrote now to how:<br /># Find the location of the hotspot service provider, certainly in the area of affordable hotspot network is ..<br /># Turn on your laptop, and also turn on your wireless network and see the wireless network system tray icon, then right click and select view avalible wireless network, and of course after that you must connect to a wireless hotspot your destination.<br /># After connect, right click the system tray and select status> choose details tab> look there ip given to us. Write down the ip.<br /># Open the program AngryIP Scanner 2.21 and enter the ip range that we will scan (ip data used were we) at the top. For example: 135.125.1.13 IP that we can then enter the ip in the first column of our range in accordance with an earlier but instead of ip numbers at the end of the first to be 135.125.1.1 and the second column write the same but the number one end was replaced with 255 to 135 125 .1.255. result is 135.125.1.1 to 135.125.1.255 and click start (red button).<br /># After scanning then we'll get a live ip data connected with these hotspots. after scanning is complete then see the ip of the living (alive hosts) blue right click on the live ip ip Right-click on the blue color was right click> show> mac address and there will be a code mac address (mac addresses sometimes there does not appear, select Just the other ip). Write down the mac address that we get.<br /># Open the program Technitium MAC Address v5 release 3 which we have prepared. There is a mac address field. well now just change the mac address with which we got earlier and press change mac id.<br /># Wait for our mac will be replaced and a temporary connection and connect again automatically disconnected itself.<br /># Go to the firefox web browser, or anything goes. Enjoy Free Internet.<br />One thing to remember is that our system is the transfer of passenger data to hack an account that we had.<br />It can outsmart the status of hotspot login page enter it (to account). For example status and so go there it looks prepaid card code number and we simply keep track of, then logout and log back into the hotspot's login page quickly enter the password earlier. This will make us can directly access the Internet without a ride again (because that make us prepaid card code) so if anyone wants to login to use the card (which had a code) when you log in using the card of course he can not enter because prepaid cards.<br />"Already logged".<br />How about it, interesting is not it?<br />But I suggest, as I do is to ride alone, because I do not want to go too far, like the way I Tell to log off and log in again will surely make the owner can not log in. Request permission directly is also a possibility that had not refused, the origin of his interests is urgent.<br />For Ip Scanning can also use the application Dude, download it <a href="http://www.techspot.com/downloads/3383-the-dude.html">here</a>, to determine the condition of the computers connect to the hotspot. Can be tried too ya ..<br />Hmm, i have some usefull tools again, check it.<br /><a href="http://www.soroban.co.uk/wepkeygen.htm">WEP and WPA KeyGenerator</a><br /><a href="http://www.softpedia.com/get/Network-Tools/Misc-Networking-Tools/Wireless-key-generator.shtml">Wireless Key Generator</a><br /> run it live programs generate,, and coffee directly into the network key. ...<br />Or also you used this application "wifi password finder"<br />seach it self in search engine :D, all this is just for learning, as long as we are still able to use the legal why not wrote. And this can also be used by the hotspot owner, if in this way can still be used to break into. So it needs more security.</span>Androidhttp://www.blogger.com/profile/04147011145084815765noreply@blogger.com0tag:blogger.com,1999:blog-2129345434224652590.post-82841191363489399052011-05-27T03:50:00.000-07:002012-03-07T19:53:56.438-08:00New feature from Google, "Google Wallet"<a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="http://androidandme.wpengine.netdna-cdn.com/wp-content/uploads/2011/05/Google_Wallet_Event.jpg"><img style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 630px; height: 299px;" src="http://androidandme.wpengine.netdna-cdn.com/wp-content/uploads/2011/05/Google_Wallet_Event.jpg" border="0" alt="" /></a><br />Google On 26 may 2011 in New York City office of Google, along with Citi, MasterCard, First Data and Sprint, Google gives a demo of Google Wallet, an application that will make your cell phone is your wallet. You will be able to tap, pay and save it using your cell phone is brought near a means of communication (NFC).<br /><br />Google Wallet is an important part of Google's ongoing effort to improve business and consumer spending. It aims to make it easier for you to pay and save the goods you want, while the merchant provides more ways to offer coupons and loyalty programs to customers, as well as bridging the gap between online and offline commerce.<br /><span class="fullpost"><br />Because Google Wallet is a mobile application, it will do more than one function common Wallet or purse. You will be able to save your credit card, offers, loyalty cards and gift cards, but without the bulk. When you press to pay, your phone will automatically redeem the offers and get points for your loyalty. One day, even things like boarding pass, tickets, ID and keys can be storehttp://www.blogger.com/img/blank.gifd on Google Wallet.<br /><br />Initially, Google Wallet will support Citi and Google Prepaid MasterCard Card, which can be used as payment. From the beginning, you will be able mnggunakan your phone to pay wherever MasterCard PayPass ada.Google Wallet will also sync with Google's offering, which you will be able through the NFC at participating merchants SingleTap ™, or by showing a barcode that you check out. Many traders who work to integrate the supply and loyalty programs with Google Wallet.<br /><br />With Google Wallet , Google is building an open trade ecosystem, and we plan to develop an API that will allow integration with a number of partners. Initially, Google's Google will be compatible with the Nexus S 4G by Google, is available at Sprint. Over time, we plan to expand support for more phones. <br />To learn more please visit the Google web site Google in <a href="http://www.google.com/wallet/">Google Wallet</a><br />This is just the beginning of what has been a great adventure into the future of mobile shopping.<br /></span>Androidhttp://www.blogger.com/profile/04147011145084815765noreply@blogger.com0tag:blogger.com,1999:blog-2129345434224652590.post-35979625738323004262011-05-23T15:02:00.000-07:002012-03-07T19:53:56.566-08:00Accelerate Internet Connection with Internet Speed Booster<a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="http://1.bp.blogspot.com/_ToollR7TtzE/Sv1XBf6UxEI/AAAAAAAAA0Q/XXXyv0rTGHA/s200/speed+booster.JPG"><img style="float:left; margin:0 10px 10px 0;cursor:pointer; cursor:hand;width: 200px; height: 148px;" src="http://1.bp.blogspot.com/_ToollR7TtzE/Sv1XBf6UxEI/AAAAAAAAA0Q/XXXyv0rTGHA/s200/speed+booster.JPG" border="0" alt="" /></a><br />Internet Speed Booster is an easy way to speed up your internet connection. With Internet Speed Booster you can speed up your internet connection, utilize your memory, utilize your internet connection and change your windows settings. The main window consists of the following items: Speed Booster, Net Pinger, Ram Booster and System Settings. Speed Booster contais Wizard mode, Advanced mode, and Backup manager. Net Pinger contains settings Pingr. Ram Booster consists of Ram System status and configuration. System Settings contains Internet properties, System Settings, Modem Settings and Network Settings. To speed up your connection just choose one of the default connection settings and click the Optimize Now. In Backup manager every time you change your program settings will keep your old settings. You can select the backup file you want to restore or delete. PING utility helps you keep getting your modem connection is disconnected by the service provider. Most Internet Service Providers Disconnect users after a fixed period of modem activity. Ram Booster System Status option allows you to monitor your system resources. And you can optimize memory with one click. You can adjust the ram booster settings from Ram Configuration form Ram Booster. All the tools you need to be efficient on the Web! Improve and optimize your Internet connection speed with this set of tools. Net Pinger prevents you from being disconnected from your ISP. Speed Booster how to optimize your PC to send and receive data over the Internet. RAM Booster allows you to free physical memory or RAM on your PC<br />To complete the writing of tricks internet connection, here I inform a program that can optimize your internet connection speed be it with a usb modem phone modem, or modem and other connections. This software is the Internet Speed Booster, a free program developed by Onestopsoft. Internet Speed Booster offers some functionality in it, namely the Speed Booster, Net Pinger, Ram Booster and.<br /><span class="fullpost"><br />Speed Booster.<br />Speed Booster optimizes your Windows system function in terms of data transfer (upload and download). Optimization here is almost the same with some software that had previously informed me (TCPSpeed, TCP / IP Optimizer, FullSpeed, SpeedConnect, and some other software).<br />To optimize the speed of internet connections with Speed Booster can be in two ways: the Wizard mode and Normal mode. In Wizard mode is already available optimalisasinya choice, we just select one and execute the Optimize Now button. <br />A second way to Normal mode, for this way, we will do the setup in a few steps (a total of 8 steps), start by selecting a type of Internet connection that we use. If we are confused fill it, do not worry, because this software will give you the option with the default answer, so stay just follow the process (unless we want to change it).<br /><br />Net Pinger<br />Function Net Pinger is anticipating that the connection is lost (usually if you open a web page, and do not perform any activity within a certain time then the connection we would stop / cut off), Net Pinger is almost the same function as the Connection Keeper. <br />To enable Net Pinger, simply by checking the Enable Pinger, while for the choice of configuration (Configuration), we can choose the Automatic Mode (every one minute to ping), or Manual Mode (you set yourself how long the time interval to ping)<br /><br />Ram Boosterhttp://www.blogger.com/img/blank.gif<br />From the name Ram Booster've seen that here serves to optimize memory usage in our PC. In the menu there are 2 Ram Booster menu options, namely the System status that indicates the use of our computer processor and memory in the form of real-time graph and the Ram Config governing the use (optimize) the existing resources automatically. <br /><br />Internet Speed Booster can be run automatically when you enter Windows and run it in the System tray (bottom right corner of the monitor), by selecting Settings. Mark Run Main Courses Pls Windows start-up and Run program in system tray.<br /><br />download <a href="http://www.4shared.com/file/DZlnrGLb/ossnsb.html">here</a><br /><br /></span>Androidhttp://www.blogger.com/profile/04147011145084815765noreply@blogger.com0tag:blogger.com,1999:blog-2129345434224652590.post-12544955031494214912011-05-20T03:24:00.000-07:002012-03-07T19:53:56.677-08:00Tutorial Virtual Machine with Virtual box in your Windowslongtime kartolocyber wasnot update the article, some of us so busy in our study. okey, i'll write about virtual machine in Windows. Sometimes, there is a particular program that we want to run but is plagued with compatibility Operating System (OS). For example there are applications that we know first run on WinXP but now after a try again in Win7 not be opened (crash). Or even it could also have a special application we need to work, but teryata application can only run on Windows while Linux-based computer.<br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgHJTo6xe4zQGPYuumsK0rvexhcfc3ZCmUY6PKztFJ25pvKF1Nr6cBe7WULUEHwcnqnnkm_w-xBSBrvjOwKLyhMVRlKGEYhyGG31YvDm_TtMujp-C3fHR_JtzIK7dhkdyEjnerMA3ML-D4/s1600/index.jpeg"><img style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 225px; height: 225px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgHJTo6xe4zQGPYuumsK0rvexhcfc3ZCmUY6PKztFJ25pvKF1Nr6cBe7WULUEHwcnqnnkm_w-xBSBrvjOwKLyhMVRlKGEYhyGG31YvDm_TtMujp-C3fHR_JtzIK7dhkdyEjnerMA3ML-D4/s1600/index.jpeg" border="0" alt="" /></a><br />Of course, we can use the system to plant two Dual Booting OS in one computer. But sometimes this method is less practical because more needs to be prepared such as set partitioning, manage files, etc.. In addition, if one day we already do not need a second OS, then the uninstall process was not easy. All too often ended up reformatting, and that means set the partitions and file again.<br />Actually, there is one practical solution to this, that is by using VirtualBox. With VirtualBox, you can as if making a new computer ( virtual machine ) and install it with the OS you want (Guest OS). More great again, you can run both at the same time, moving from guest to host and vice versa with ease. If it does not need anymore, you just delete it (remove) the virtual machine without a complex process.<br /><br />Well, in this article I will explain about how to create a virtual machine using VirtualBox. Because many things to be explained, for convenience, so I split them up into several sections, namely: Download & installl Virtual Box, Virtual Machine http://www.blogger.com/img/blank.gifSetup & Guest OS, and the last is the setting. In this example, I will install WinXP in a virtual machine that will be created. As for his own VirtualBox I run across operating systems Win7. So, the Guest OS and Host OS = WinXP = Win7. Here are the steps:<br />DOWNLOAD & INSTALL VirtualBox<br /><span class="fullpost"><br /> First download the installer once its in <a href="http://www.virtualbox.org/wiki/Downloads">here </a>. Select according to the type of OS you use.<br /><br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="http://blog.fastncheap.com/wp-content/uploads/2011/04/00.download.png"><img style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 588px; height: 414px;" src="http://blog.fastncheap.com/wp-content/uploads/2011/04/00.download.png" border="0" alt="" /></a><br /><br />1. After that run its installer file. Click Next> when VirtualBox Setup Wizard appears.<br /><br />2. Then you can choose the installation location. Click Next> to continue.<br /><br />3.Choose anywhere you want a shortcut is created, then click Next><br /><br />4. Usually will appear warning that the connection to the network is disconnected while on during the installation process. Just click Next>.<br /><br />5. Click Install to begin the installation process.<br /><br />6. If UAC appears, click Yes.<br /><br />7. Up here you've managed to install VirtualBox. Click Finish to run the VirtualBox program<br /><br /><span style="font-weight:bold;">VIRTUAL MACHINE SETUP</span><br /><br />Next you need to do is make her a virtual machine. Click New on VirtualBox Manager to get started. You will be greeted by the New Virtual Machine Wizard. Click Next to continue. Here you will choose what type of OS you want to install as guest OS. In this example we will install WinXP. Click Next when done select the type of OS. You can determine how much memory (RAM) for the virtual machine later. Move the slider to the desired number, then click Next.For the first time, make sure you men-centang/contreng Boot Hard Disk and also select Create new hard disk, If so, click Next. Next you will go to the Create New Virtual Disk Wizard. Click Next to continue. You can choose whether the size of virtual hard disk later this magnitude can change or always remain. For savings should you choose a dynamically expanding storage. Click Next if you have selected. Here you can choose the location where the virtual hard disk will be created, it also determines the maximum size hard disk (hard disk maximum size). VirtualBox by default suggested size is 10 G. But you also can set smaller as long as you believe that size is sufficient for your needs later. Click Next. This is a Summary of the Create New Virtual Disk Wizard. Click Finish. It appears that you already have a virtual machine called WinXP, although it is still empty. Now the next task is to fill this virtual machine with the Guest OS. Double-click on the entry to start WinXP.<br />You will be greeted by First Run Wizard. Just click Next.Here you will select the media you will use as a source installation. In this example I use WinXP CD (bootable of course), which I enter into Drive E (DVD ROM). If so, click Next. This is a Summary of the First Run Wizard. It's good here you have prepared her to drive installer that you selected earlier. Click Finish to begin the installation process. Display WinXP installation will start out. Press Enter to continue. Select Format the partition using the NTFS file system, then press Enter. Please wait until the WinXP installation process is complete. <br />Congratulations, you now have a WinXP Guest OS on your virtual machine! Before you start "playing around" with this new virtual machine it's good to do some changes to the settings used to make you more comfortable in using it later. Some settings require the virtual machine in a non-active, some can only be done in the Guest OS Safe Mode. Thus, to present first shutdown the Guest OS you.<br /><br /><span style="font-weight:bold;">SETTING UP PROCCESS</span><br /><br />This time will discuss about some important settings of your order the more comfortable in using your virtual machine. Make sure your virtual machine is turned off (powered off), then double-click to turn on and be prepared to press F8 as we will go into Safe Mode.<br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="http://blog.fastncheap.com/wp-content/uploads/2011/04/28.start-xp-again.png"><img style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 588px; height: 440px;" src="http://blog.fastncheap.com/wp-content/uploads/2011/04/28.start-xp-again.png" border="0" alt="" /></a><br />Choose Safe Mode, then Enter twice.<br />After entering Safe Mode, click Yes to close the window notification.<br />In the VirtualBox menu, select Devices -> Install Guest Additions.<br />It would appear the Windows Explorer . Double-click VBoxWindowsAdditions.<br />You will be greeted by the VirtualBox Guest Additions Setup Wizard. Click Next> to continue.<br />Select the installation location and click Next>.<br />If you plan to run an application in the Guest OS that require Direct3D (games for example), then make sure the Direct3D Support selected. If you already click Install.<br />Guest Additions installation process was completed. Click OK.<br />Click Finish to restart and get into WinXP as normal.<br />Next we'll create a Shared Folders. Usefulness is as a place to exchange (transfer) files between Guest and Host. The trick is to select Devices -> Shared Folders.<br />Click the Add button on the right side of the window.<br />In the Folder Path, select Other.<br />Specify the folder where you want shared.<br />Then select Auto-mount that folder directly at-shared automatically at startup.<br />Rekapnya be seen here. You also can create more than one Shared Folders if you wish. Click OK to finish.<br />Shared Folders will only begin to be used if you have to restart. But for now the Guest OS shutdown before you because we will make changes in the last settings via VirtualBox Manager.<br />Click Settings on the menu VirtualBox Manager.<br />Select the System tab on the left. Well here you can make settings memory (RAM) and also the Boot Order. In order for fast booting, select Hard Disk as the Boot Order first priority.<br />Select the Display tab and you can change the amount of Video Memory (VGA Card) and also activate the Enable 3D Acceleration feature. Click OK if it is.<br />Next run the virtual machine again. After entering Windows, try running Explorer. It appears that the Shared Folders now can be accessed.<br />Applications that can not be opened in Win7 are now able to run. <br /><br />an explanation of the technical steps to create a virtual machine and its installation with the Guest OS using VirtualBox. In this way, we seemed to have a "new computer" is ready to run. In the world of IT, many benefits to be gained by using this VirtualBox. A Java programmer who want to create a multi-platform applications, can use VirtualBox to test programs in various OS (Windows, Mac, Linux, FreeBSD, etc.).<br /><br />Or someone who is studying to be a hacker, usually also will create a virtual machine to test the efficacy of scripts or artificial virus, without having to worry about major OS that is being used also infected. You can also experiment with VirtualBox it suits your needs.<br /></span>Androidhttp://www.blogger.com/profile/04147011145084815765noreply@blogger.com0tag:blogger.com,1999:blog-2129345434224652590.post-57261573411326174002011-05-08T09:01:00.000-07:002012-03-07T19:53:56.790-08:0010 Best Tools Windows 7<a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiYwUKrQ7mM5Gs3EE9Pr4TtQsiPosNNcEQ1gvorCzzhMlpmJX-7pHcw9Lg0YeKDDYrxOu8ov2wdItLaPzmYCrcGvVSiU2wBTdolI8Cbb2b45WjuH5sANI3wie2-I1EPYsORoyl2GBnRwEHR/s1600/windows_7.jpg"><img style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 390px; height: 390px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiYwUKrQ7mM5Gs3EE9Pr4TtQsiPosNNcEQ1gvorCzzhMlpmJX-7pHcw9Lg0YeKDDYrxOu8ov2wdItLaPzmYCrcGvVSiU2wBTdolI8Cbb2b45WjuH5sANI3wie2-I1EPYsORoyl2GBnRwEHR/s1600/windows_7.jpg" border="0" alt="" /></a><br />Windows 7 not only attracted much attention from the press as a high-tech, but also there are many new interface changes, such as the redesigned taskbar, new file management features, libraries and others. Several tools have been enhanced which is then included with the OS. Here we discuss 10 of the best tools windows 7 which makes the job easier computing.<br /><br />1. Action Center<br />Centralized management is hot in Windows 7 and gives you one-stop shopping site where you can take care of security, troubleshooting, and recovery, rather than searching for an applet for each part. Everything is combined in an easy to use Control Panel, where you get a maintenance and safety messages and can view performance information, change the UAC settings, and more.<br /><br />This is a development from the Security Center in Windows Vista. It makes sense to combine the security settings, system maintenance, and recovery. Action Center has emerged as an icon in the system tray, which displays a red X symbol if there is a problem that needs you are looking for.<br /><span class="fullpost"><br />2. Problem Steps Recorder<br />One of the coolest new tool in Windows 7 is the Problem Steps Recorder (PSR), mainly to provide technical support to users of Windows. No matter how hard they try, but users often have problems to accurately describe their problem and steps they take before or after the experience. Sure, Remote Assistance can be a blessing in this situation. But we can not always connect to a user's computer in real time. That's when PSR come in handy.<br /><br />Problem Steps Recorder is a type of software that records all actions keystrokes, mouse clicks, including screenshots etc. and save the sequence of events in an MHTML document pages. You can start by entering psr.exe PSR in the Start Search box via the command prompt option.<br /><br />3. ISO burner<br />ISO image file is a file type that is often used to distribute software. In Windows 7, Microsoft included this as an answer to many users wish list for a long time. Now you do not need to download and install a third-party program to burn ISO files to disk. Suppose you want to create a bootable CD use this tool. This is a simple process: Once you've downloaded. ISO to your hard drive, simply double click and Windows 7 will open the Burn Disc Image dialog box to burn the disc.<br /><br />4. Biometric device management<br />In previous Windows versions, biometric authentication and management of biometric devices (fingerprint sensor) required third party software that may or may not be well integrated with the OS. Now in Windows 7 already built in. Windows Biometric Framework, which gives developers the API that you can use to build biometrics into applications. Fingerprint sensor hardware makers, such as UPEK and AuthenTec, in cooperation with Microsoft on developing its framework. Biometric can be accessed through the Control Panel.<br /><br />5. Credential Manager<br />Credential Manager is a new feature in Windows 7. This tool is similar in some ways premises password management features in Vista User Account but this is more sophisticated. You can manage the Windows credentials for the various computers that you are signed onto, certificate-based credentials, and others (for e-mail accounts, web accounts, etc.). This is all saved by default in Windows Vault.<br /><br />Perhaps the best feature new in Credential Manager is the ability to backup anhttp://www.blogger.com/img/blank.gifd restore Vault. Microsoft recommends that you keep backing up on removable drives, such as flash drives, to back up if you experience a hardware failure. For more information, see Windows 7: Windows 7: Exploring Credential Vault Manager and Windows directly from the <a http://www.blogger.com/img/blank.gifhref="http://www.neowin.net/news/main/09/03/07/windows-7-exploring-credential-manager-and-windows-vault">website</a>.<br /><br />6. Projection display and the Windows Mobility Center<br />If you give many presentations, you will be greeted by a new tool in Windows 7 that makes it easy for you to display projectors in the desktop Windows 7. Just press the Windows logo key + P and you will see a pop-up box where you can make the choice of presentation. The first is the default settings and displayed on computer screens only. The second clone display settings on the computer screen to the projector. A third setting to extend the desktop on both computer screen and projector, and the fourth displays only the settings through the projector and turn off the computer screen.<br /><br />7. Text tuning and color calibration<br />Your computer might not work, but your screen is what you see throughout the day. If it does not look good, you do not get the most from your computing experience, and can even cause you eye strain. In Windows 7 there are two tools to customize the look to suit your preferences. You can access the ClearType Text Tuner from Control Panel or from the command (cttune.exe). If you have multiple monitors, you can adjust according to each monitor.<br /><br />This tuning tool works much like the eye chart at the optometrist's office, and please you choose one that looks best for you. In addition to text tuner, Windows 7 provides color calibration tool. It can be accessed from the Control Panel or from the command line (dccw.exe). It helps you to adjust gamma, brightness, contrast, and color rendition on your monitor to display the best.<br /><br />8. Disc Repair System<br />Actually, the Vista Service Pack 1 Beta already lets you easily create disc repair system with friendly graphical interface, but has been removed and re-released in the final in SP1. Windows 7 to improve this function. Just click [Start] and type [System Repair] in the Search box. Click [Create A System Repair Disc] to open the dialog box. To use the disc, please mesukkan in the drive and reboot the computer from the disk. (You may need to set the CD / DVD drive as primary boot device in BIOS) Then you will get a list of system recovery options, which include:<br /><br />- Startup Repair<br />- System restore<br />- System image recovery<br />- Windows Memory Diagnostic<br />- Command prompt<br /><br />9. Better backup utility<br />In previous Windows versions already include a backup utility, but this tool has been perfect significantly in Windows 7. Vista backup program is user friendly but not very flexible. Windows 7 provides more detailed control over what you want to backup. You can run the Backup And Restore from Control Panel or by typing a backup in the Search box on the Start menu. You can back up files to local hard disk, removable disk, DVD, or another computer on the network (origin diisinkan on the network). Then you can also choose to create a backup folder or individual libraries. You can also exclude certain folders when backing up.<br /><br />10. PowerShell v2<br />Windows PowerShell (Figure P) is a shell command-line interface and scripting tools that make it easier for Windows administrators to automate tasks using cmdlets, which are commands that perform a single command, and scripts, which consists of several cmdlets for complex tasks , multi-step tasks. Earlier versions of Windows includes a command-line interpreter (command.com or cmd.exe), but PowerShell is much more powerful, also provided the UNIX environment, this command can automate nearly every function of the GUI.<br /><br />PowerShell can be downloaded and run on Windows XP or Vista, but in Windows 7 is included in a built-in. PowerShell v2 adds about 240 new cmdlets, as well as APIs and new features, such as the ability to call the PowerShell scripts and cmdlets on remote computer. You can find out more about PowerShell on <a href="http://www.microsoft.com/windowsserver2003/technologies/management/powershell/default.mspx">Microsoft's website</a>.<br /></span>Androidhttp://www.blogger.com/profile/04147011145084815765noreply@blogger.com0tag:blogger.com,1999:blog-2129345434224652590.post-38901922781963423912011-04-10T01:59:00.000-07:002012-03-07T19:53:56.903-08:00New Feature in technology HDMI V.1.4<a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjQmy7pOnsh2q_W8Bf_NW8F86XwBMecRgAsnF6Uj24tEQwzKhqa_nW70vHP3rcTWmjtOaRr03uemlp-UMPGBL6T6XLPe4F4eGFhyphenhyphen_kqpGaxxdDKxGl0CO3Ndmu2cmFJdwZ28wGbth2o1kIv/s1600/87a86_diagram-hdmi-1.4-tx-lg.jpg"><img style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 400px; height: 175px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjQmy7pOnsh2q_W8Bf_NW8F86XwBMecRgAsnF6Uj24tEQwzKhqa_nW70vHP3rcTWmjtOaRr03uemlp-UMPGBL6T6XLPe4F4eGFhyphenhyphen_kqpGaxxdDKxGl0CO3Ndmu2cmFJdwZ28wGbth2o1kIv/s400/87a86_diagram-hdmi-1.4-tx-lg.jpg" border="0" alt=""id="BLOGGER_PHOTO_ID_5593884058965037442" /></a><br /><br />Technology HDMI 1.4 cables now could make you transfer Internet data in the same cable when currently transfers only video and audio data. with this solves problems for people who have an awful time connecting devices to the web and each other in the living room. I use powerline Internet adapters, which connect my DSL broadband line to my living room via power sockets. Wireless doesn’t work so well in my home. So right now, you have to switch cables from one game console to another whenever you use them. It’s a hassle.<br /><span class="fullpost"><br />HDMI connects devices such as Blu-ray player to a TV set with no loss in the high-definition video quality. All new TVs have the HDMI connectors, as do many other video appliances. HDMI is keeping up with the times. About 24 percent of all consumer electronics devices will require Ethernet in 2009. With more devices connected to the Internet, this new connector means that you will be able to access your content via the Internet on more of your future home devices. The Ethernet connection enables a variety of new applications, such as the ability to play a video on a Blu-ray player on any web-connected TV in your home.<br /><br />Audio Return Channel so you can connect your stereo to your TV and have it play music on your TV set, even as you get rid of a cable. And HDMI 1.4 has Automatic Content Enhancement, which optimizes the settings on your TV to fit whatever movie or video you’re playing. It also has 3-D support and support for higher resolution video of 4,000 x 2,000 pixels. And another new feature is a complete color palette that allows you to connect almost any HD digital still camera and show the pictures with the highest viewing quality on your TV. Sometimes TVs don’t have the breadth of color to display still pictures well.<br /><br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="http://venturebeat.com/wp-content/uploads/2009/05/hdmi-4.jpg"><img style="float:left; margin:0 10px 10px 0;cursor:pointer; cursor:hand;width: 407px; height: 100px;" src="http://venturebeat.com/wp-content/uploads/2009/05/hdmi-4.jpg" border="0" alt="" /></a>one more another feature is the Micro HDMI connector. This connector is about the size of a mini universal serial bus (USB) connector. It can likely be built into cell phones in the future to let you play back high-definition video recorded with a cell phone camera on a TV. I recently saw a demonstration of that at Broadcom’s offices in Sunnyvale, Calif. It looked pretty cool.<br /><br /></span>Androidhttp://www.blogger.com/profile/04147011145084815765noreply@blogger.com0tag:blogger.com,1999:blog-2129345434224652590.post-60815228463994785982011-03-09T14:56:00.000-08:002012-03-07T19:53:57.037-08:00Windows Installer 5 on Microsoft Windows 7<a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="http://lh6.ggpht.com/_Gdv8jAZFTE4/TOuMcvFQ3fI/AAAAAAAAAGM/cdDrLINRDQ0/mengatasi-memperbaiki-windows-installer-error.jpg"><img style="float:left; margin:0 10px 10px 0;cursor:pointer; cursor:hand;width: 204px; height: 204px;" src="http://lh6.ggpht.com/_Gdv8jAZFTE4/TOuMcvFQ3fI/AAAAAAAAAGM/cdDrLINRDQ0/mengatasi-memperbaiki-windows-installer-error.jpg" border="0" alt="" /></a><br />Windows Installer 5.0 is available for both Microsoft Windows 7 and Windows Server 2008 R2. With Windows Installer 5.0, setup developers can use Windows Installer 5.0 to author a single installation package capable of either per-machine installation or per-user installation of the application.Beginning with Windows Installer 5.0, a package can be authored to secure new accounts, Windows Services, files, folders, and registry keys. The package can specify a security descriptor that denies permissions, specifies inheritance of permissions from a parent resource, or specifies the permissions of a new account. For information, see Securing Resources. The Windows Installer 5.0 service can enumerate all components installed on the computer and obtain the key path for the component.<br /><span class="fullpost"><br />Windows Installer 5.0 has been released with, and require Windows Server 2008 R2 or Windows 7. Versions earlier than Windows Installer 5.0 were released with Windows Server 2008, Windows Vista, Windows Server 2003, Windows XP, and Windows 2000.<br /><br />Windows Installer 4.5 was available as a redistributable for Windows Vista RTM and Service Pack 1, Windows XP Service Pack 3 and earlier, Windows Server 2008 RTM/SP1, and Windows Server 2003 SP1 and SP2.<br /><br />unlike Windows Installer 5, Windows Installer 4.5 does not support some features that enable a single installation package to be installed in either the per-machine or per-user installation context.Moreover, Windows Installer 4.5 does not support some services configuration options that can enable a package to customize the services on a computer.It also does not support some features that enable the Windows Installer to secure new accounts, Windows Services, files, folders, and registry keys.<br /><br />Get Windows 7 and enjoy the new capabilities in Windows Installer 5.Note that windows 7 free download is available for students of schools enrolled in MSDN AA (Microsoft Developer Network Academic Alliance) program and free Windows 7 upgrade is available for buyers of windows vista.<br /><br /></span>Androidhttp://www.blogger.com/profile/04147011145084815765noreply@blogger.com0tag:blogger.com,1999:blog-2129345434224652590.post-18264941460128933312011-03-08T15:03:00.000-08:002012-03-07T19:53:57.274-08:00Ramnit Virus Manual remove fixed<a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgz3tViR0R2mB9JFS2xJlaEozOjqjZ8puCPSLY6zWb1tRglsg8DkyOqdGSs2acoaz7VwbKPwFpBsZ8hG488NwPk91TeJKW6v5i_FmR9biCO1XWpHapsU7lnBV-rVpNZPBxmkdSkrzrDYxix/s1600/Computer-Virus-2-istock.jpg"><img style="float:left; margin:0 10px 10px 0;cursor:pointer; cursor:hand;width: 320px; height: 212px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgz3tViR0R2mB9JFS2xJlaEozOjqjZ8puCPSLY6zWb1tRglsg8DkyOqdGSs2acoaz7VwbKPwFpBsZ8hG488NwPk91TeJKW6v5i_FmR9biCO1XWpHapsU7lnBV-rVpNZPBxmkdSkrzrDYxix/s320/Computer-Virus-2-istock.jpg" border="0" alt=""id="BLOGGER_PHOTO_ID_5581849957848604194" /></a><br />W32.Ramnit is a worm that infects .exe, .dll and .html files to reproduce and infect other systems. After infection, W32.Ramnit will hijack your browser to redirect you to a malicious domain. W32.Ramnit may also make contact with an anonymous third party through Internet Explorer exploits, allowing the remote attacker to violate your privacy and exert control over your computer. Many anti-malware programs have been unable to detect W32.Ramnit in some instances; severe infections can necessitate a complete system wipe to remedy the situation. Be cautious about worms like W32.Ramnit when on large networks or using removable media, and strive to delete W32.Ramnit quickly before it becomes too difficult to remove. <br /><span class="fullpost"><br />first things W32.Ramnit does is infect any .exe, .dll, or .html files W32.Ramnit can find. If you open these infected files, congratulations - now you've got W32.Ramnit, too! W32.Ramnit may also create concealed Autorun.inf files that are placed on various drives, including removable ones. Any computer that then accesses these drives will also get the W32.Ramnit worm.<br /> <br />Different versions of W32.Ramnit have been identified as a threat since January of 2010, and the worm is far from exterminated yet. Fortunately, indicators of W32.Ramnit's presence are sufficiently plain that you ought to see W32.Ramnit before it's been on your system too long. Deleting W32.Ramnit with sufficient quickness can mean the difference between your computer surviving without damage and your computer needing a complete hard drive wipe.<br /> <br />W32.Ramnit may also be detected under the slight variant names of W32.Ramnit.A and W32.Ramnit.B. <br /><br />Backup Reminder: Always be sure to back up your PC before making any changes.<br /><br /><br />To remove W32.Ramnit, you must first stop any W32.Ramnit processes that are running in your computer'ds memory. To stop all W32.Ramnit processes, press CTRL+ALT+DELETE to open the Windows Task Manager. Click on the "Processes" tab, search for W32.Ramnit, then right-click it and select "End Process" key.<br /><br />To delete W32.Ramnit registry keys, open the Windows Registry Editor by clicking on the Windows "Start" button and selecting "Run." Type "regedit" into the box and click "OK." Once the Registry Editor is open, search for the registry key "HKEY_LOCAL_MACHINE\Software\W32.Ramnit." Right-click this registry key and select "Delete."<br /><br />Finally, to completely get rid of W32.Ramnit, you must manually remove other W32.Ramnit files. These W32.Ramnit files can be in the form of EXE, DLL, LSP, TOOLBAR, BROWSER HIJACK, and/or BROWSER PLUGIN. For example, W32.Ramnit might create a file like<br />%PROGRAM_FILES%\W32.Ramnit\W32.Ramnit.exe. Locate and remove these files.<br /><br /></span>Androidhttp://www.blogger.com/profile/04147011145084815765noreply@blogger.com0tag:blogger.com,1999:blog-2129345434224652590.post-2913703676078758892011-02-25T03:13:00.000-08:002012-03-07T19:53:57.515-08:00Motherboard won't Booting fixed method<a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiLLRcZUj2A9vIHHDXXAkWVD3Y1NhgsamFwi61JBLnKOg2CxFnVX0HWy664t7EzIx2exS2UjkklSIwRN3Ckca4J8HAxi6-77eCFasBZiF-gx63emBR1gRHptX3ip0OYB2j4W-rmdDOh4Vud/s1600/images.jpeg"><img style="float:left; margin:0 10px 10px 0;cursor:pointer; cursor:hand;width: 259px; height: 194px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiLLRcZUj2A9vIHHDXXAkWVD3Y1NhgsamFwi61JBLnKOg2CxFnVX0HWy664t7EzIx2exS2UjkklSIwRN3Ckca4J8HAxi6-77eCFasBZiF-gx63emBR1gRHptX3ip0OYB2j4W-rmdDOh4Vud/s320/images.jpeg" border="0" alt=""id="BLOGGER_PHOTO_ID_5577587524461371202" /></a><br />Motherboard won't work properly problem is most likely a software one and NOT a hardware problem. You should, of course, check that all the cooling fans are working (especially the ones on the processor and the video card) in case overheating is a problem. If you have two or more sticks of RAM which are from different manufacturers you could try using them one at a time in case a RAM mismatch is causing the problem. But other than that the only real way to see if it's a software or a hardware problem is to try running it with a fresh, clean installation of Windows.<br /><br />Extra storage space is always worth having and they're quite inexpensive. Swap your current drive out, put the new one in, and load Windows onto it. If all runs fine you know for certain that the problem is in your original Windows installation. If not you've got a second hard drive to use once you track down the hardware problem and fix it!<br /><br />if the machine won't start afterwards you've got clues to where the problem lies. Remove the recently added device or component and try again. If it still won't start have a good look inside to ensure you haven't dislodged or damaged some other component while you were working in there. Make sure everything is firmly in place.<br /><br />When you make changes to the hardware of a PC you need to physically reset the CMOS memory, either by 'shorting' a jumper on the mainboard or by removing the CMOS battery and waiting several minutes at least before replacing it. A vast number of instances where machines won't start up are simply the result of changes made without resetting CMOS afterwards.<br /><br /><span class="fullpost"><br /><br />Modern ATX motherboards still have power running through them after Windows has been shut down! You must either switch off at the wall outlet or remove the power cord before opening it up to perform internal work. Damage to components can ensue if you make hardware changes when the motherboard is still receiving power.<br /><br />Even without a hard drive fitted, your machine should run the Power On Self Test. If it doesn't, then it is either incorrectly assembled or it contains a faulty component. You should be getting the memory check, the device detection information, and perhaps an 'Operating System not found" message.<br /><br />although PCs are quite easy to assemble, putting the whole thing together before trying it to see if it works is far from the ideal approach. If the entire PC is fully assembled, tracking down the reason for the failure can become a nightmare. The 'bare bones' approach is far better when assembling, and far better when troubleshooting. If your system is already fully assembled, go back several steps and try again.<br /><br />The 'bare bones' PC contains only the following components:<br /><br />- Motherboard<br />- Processor<br />- Processor heatsink/fan unit, connected to power<br />- A video card if there is no onboard video available<br />- One RAM module (unless the RAM is of a type which requires installing in pairs. 'Dual channel' RAM is NOT such a type!)<br />- The front panel connectors for Power Switch, Power LED and case speaker attached to the motherboard<br />- The ATX connector connected and supplying power to the motherboard. - The P4 power connector attached also if required. A molex connector attached to the display card if required.<br /><br />That's it. Attach monitor and keyboard and see if it'll POST. Reset CMOS and try again if it doesn't. If you are building a new system stop at this point and try it out. If you're troubleshooting a fully assembled PC strip it back to this point and try!<br /><br />If the PC won't POST in this configuration you need to determine why before proceeding:<br /><br />*check power switch and LED connectors. If they are reversed the system won't start<br />* check that the processor is correctly fitted<br />* try a different RAM module<br />* ensure that the display card is correcxtly seated.<br />* get a technician to check it over if you can't locate the cause<br /><br />Once the 'bare bones' system is operational, add other components one by one. Try starting the machine after every addition to check that it will still POST. This is the ONLY procedure by which you can adequately and effectively troubleshoot where a hardware problem lies.<br />'Other components' includes additional RAM modules, add in cards, drives, etc.<br />If your are troubleshooting a system which has already had Windows installed to a hard drive, add that drive last so that the system doesn't continually try to boot into Windows.<br />If you strike problems and need to post a new thread about your problem, include the following information:<br /><br />* Identification details (make and model) of all components<br />* Full details of any onscreen error messages<br />* Full description of any BIOS 'beep' codes emitted through the internal speaker.<br /><br /></span>Androidhttp://www.blogger.com/profile/04147011145084815765noreply@blogger.com0tag:blogger.com,1999:blog-2129345434224652590.post-91155753950670400742011-02-08T18:31:00.000-08:002012-01-11T21:07:01.193-08:00Sejarah berdirinya joomla<div class="separator" style="clear: both; text-align: center;"><a href="http://1.bp.blogspot.com/_sAv9cP5D-sg/TE_Ym1EUopI/AAAAAAAAATY/WnZ2GD4fe6U/s1600/1.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="218" src="http://1.bp.blogspot.com/_sAv9cP5D-sg/TE_Ym1EUopI/AAAAAAAAATY/WnZ2GD4fe6U/s320/1.jpg" width="320" /></a></div><div align="justify" class="MsoNormal" style="text-align: justify;">Apa itu cms joomla, cms joomla adalah sebuah paket web instant yang bias anda langsung nikmati seperti halnya cms-cms lainnya, sebelumnya cms joomla bukan bernama joomla melainkan bernama “mambo” yang di buat pada tahun 2000 oleh Rice Studio, formely Miro yang ketika itu membangun source CMS. Setahun setelah itu mambo melisensikannya menjadi 2 licensi, dengan salah satunya adalah Open source yang lebih dikenal sebagai “Mambo Site Server”.</div><div align="justify" class="MsoNormal" style="text-align: justify;"><br /></div><div align="justify" class="MsoNormal" style="text-align: justify;">Pada tahun 2002 “Mambo site server” diberi nama ulang menjadi “Mambo Open source” dan pada tahun 2003 hak ciptanya di publikasikan ke Open Source Community pada tahun 2003, dan pada tahun 2005 versi komersial mambo di beri nama ulang “Jango” dan pendirinya tetap Rice Studio, Formely Miro perusahaan NonProfit tetap sebagai Pendirinya.</div><div align="justify" class="MsoNormal" style="text-align: justify;"><br /></div><div align="justify" class="MsoNormal" style="text-align: justify;">Tidak lama setelah peluncuran “Jango” group utama dari para developer meluncurkan kepada public Mambo Open Source kepada public untuk diberikan kepada para peminat jenis cms ini, dan kemudian sebuah organisasi NonProfit yang bernama Open Souce Matter mengambil alih project ini Mambo Open source.</div><div align="justify" class="MsoNormal" style="text-align: justify;"><br /></div><div align="justify" class="MsoNormal" style="text-align: justify;">Dan pada tahun 2005 terjadi perpecahan didalam pendiri project pengembangan mambo opensource, dan pada saat itu pimpinan tim utama pengembang mambo Andrew eddie pada bulan agustus 2005 memilih meninggalkan mambo, dan kemudian meulis surat umum pengunduran dirinya di sebuat situs communitas mambo di mamboserver.com, dan selanjutnya pengembang membuat situs opensourcematters.com yang digunakan untuk mendistribusikan informasi kepada pengembang, desain web dan komunitas.</div><div align="justify" class="MsoNormal" style="text-align: justify;"><br /></div><div align="justify" class="MsoNormal" style="text-align: justify;">Pada 17 September 2005 Joomla pertama kali di luncurkan dan dipublikasikan dengan versi awal joomla 1.0.0 yang mirip dengan mambo 4.5.2.3, nama joomla itu sendiri di ambil dari kata Swahili yang artinya “bersama-sama” dan pada tahun 2007 versi joomla 1.5.x joomla baru membuat perbedaan yang cukup jauh dengan mambo namun tetap support dan kompetible dengan mambo, dan joomla juga memperkenalkan Model View Controllernya, dengan perubahan ini para developer pengembang joomla dan component bisa lebih mengembangkan joomla menjadi lebih powerfull.<br /><br /><br /></div>Androidhttp://www.blogger.com/profile/04147011145084815765noreply@blogger.com0tag:blogger.com,1999:blog-2129345434224652590.post-69011413335373606162011-02-02T09:00:00.000-08:002012-01-11T21:07:01.193-08:00Tutorial membuat script anak alay<div class="separator" style="clear: both; text-align: center;"><a href="http://3.bp.blogspot.com/_sAv9cP5D-sg/TUmNrePPNgI/AAAAAAAAApI/4c0AJ2IvfCs/s1600/1.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="320" src="http://3.bp.blogspot.com/_sAv9cP5D-sg/TUmNrePPNgI/AAAAAAAAApI/4c0AJ2IvfCs/s320/1.jpg" width="209" /></a></div><br />Ada apa dengan judul nya aneh pasti bukan tapi memang itu kenyataannya kali ini saya akan memberikan tutorial membuat script anak alay.. untuk iseng2 aja ya haha.<br /><br /><blockquote>Set wshShell =wscript.CreateObject("WScript.Shell")</blockquote><blockquote>do</blockquote><blockquote>wscript.sleep 100</blockquote><blockquote>wshshell.sendkeys "{CAPSLOCK}"</blockquote><blockquote>wshshell.sendkeys "{NUMLOCK}"</blockquote><blockquote>wshshell.sendkeys "{SCROLLLOCK}"</blockquote><blockquote>loop</blockquote><br />1. Copy code diatas ke notepad<br />2. save dengan extensi *vbs<br />3. jalanin<br />4. Sekarang coba buat ngetik Ahii..hii..hiii<br />efek code ini adalah: Lampu keyboard ane kedap-kedip terus klu ane ngetik hurufnya GEDE kecil- GEDE kecil.<br /><br /><br /><br />uia klu mau balikin teken "Ctrl + Alt + Del" (taksmanager)<br />End prosess di "wscript.exe"<br /><br />sElaMaT mEncObAAndroidhttp://www.blogger.com/profile/04147011145084815765noreply@blogger.com0