Showing posts with label information. Show all posts
Showing posts with label information. Show all posts

Wednesday, April 1, 2009

An Introduction to Virtualization

Introduction

Over the course of the past couple of months, the AnandTech IT team has been putting a lot of time into mapping out and clarifying the inner workings of several interesting forms of virtualization. The purpose of these articles was not primarily to cover "news" (however current the topic might be), but to create a sort of knowledge base on this subject at AnandTech, as we find many people interested in learning more about virtualization are met with a large amount of misinformation. Secondly, we believe a better knowledge on the subject will empower the people in control of their company's IT infrastructure and help them make the correct decisions for the job.

There's no denying that virtualization is changing company's server rooms all over the world. It is promoting both innovation and the preservation of aged applications that would otherwise not survive a migration to modern hardware platforms. Virtualization is completely redefining the rules of what can and cannot be done in a server environment, adding a versatility to it that is increasing with every new release. We believe that when making big changes to any existing system, the more information that is available to the people given that task, the better.

But what about desktop users?

While the above should make it clear why businesses are extremely interested in this technology, and why we have been digging so deep into its inner workings, we are also noticing an increased interest from the rest of our reader base, and have been flooded with questions about the how and why of all these different kinds of virtualization. Since we don't want to leave any interested people out in the cold, and the in-depth articles may seem a bit daunting to anyone looking to get an introduction, here is another article in our "virtualization series". In it, we will attempt to guide our readers through the different technologies and their actual uses, along with some interesting tidbits for regular desktop users.

"New" Virtualization vs. "Old" Virtualization

The recent buzz around the word "virtualization" may give anyone the impression that it is something relatively new. Nothing is further from the truth however, since virtualization has been an integral part of server and personal computing, almost from the very beginning. To keep using the single term "virtualization" for each of its countless branches and sprouted technologies does end up being quite confusing, so we'll try to shed some light on those.

How to Define Virtualization

To define it in a general sense, we could state that virtualization encompasses any technology - either software or hardware - that adds an extra layer of isolation or extra flexibility to a standard system. Typically, while increasing the amount of steps a job takes to complete, the slowdown is made up for with increased simplicity or flexibility for the part of the system affected. To clarify, the overall system complexity increases, in turn allowing the manipulation of certain subsystems to become a lot easier. In many cases, virtualization has been implemented to make a software developer's job a lot less aggravating.

Most modern day software has become dependent on this, making use of virtual memory for vastly simplified memory management, virtual disks to allow for partitioning and RAID arrays, sometimes even using pre-installed "virtual machines" (think of Java and .net) to allow for better software portability. In a sense, the entire point of an Operating System is to allow software a foolproof use of the computer's hardware, taking control of almost every bit of communication with the actual machinery, in an attempt to reduce complexity and increase stability for the software itself.

So if this is the general gist behind virtualization (and we can tell you it has been around for almost 50 years), what is this recent surge in popularity all about?

Baby Steps Leading to World-Class Innovations

Many "little" problems have called for companies like VMware and Microsoft to develop software throughout the years. As technology progresses, several hardware types become defunct and are no longer manufactured or supported. This is true for all hardware classes, from server systems to those old yet glorious video game systems that are collecting dust in the attic. Even though a certain architecture is abandoned by its manufacturers, existing software may still be of great (or perhaps sentimental) value to its owners. For that reason alone, virtualization software is used to emulate the abandoned architecture on a completely different type of machine.

A fairly recent example for this (besides the obvious video game system emulators) is found integrated into Apple's OS X: Rosetta. Using a form of real-time binary translation, it is able to change the behavior of applications written for the PowerPC architecture to match that of an x86-app. This allows a large amount of software that would normally have to be recompiled to survive an otherwise impossible change in hardware platforms, at the cost of some of its performance.

Hardware platforms have not been the only ones to change, however, and the changes in both desktop and server operating systems might force a company to run older versions of the OS (or even a completely different one) to allow the use of software coping with compatibility issues. Likewise, developers have a need for securely isolated environments to be able to test their software, without having to compromise their own system.

The market met these demands with products like Microsoft's Virtual PC and VMware Workstation. Generally, these solutions offer no emulation of a defunct platform, but rather an isolated environment of the same architecture as the host system. However, exceptions do exist (Virtual PC for the Mac OS emulated the x86 architecture on a PowerPC CPU, allowing virtual machines to run Windows).

Putting together the results of these methods has lead to a solution for the problem quietly growing in many a company's server room. While the development of faster and more reliable hardware was kicked up a notch, a lot of the actual server software lagged behind, unable to make proper use of the enormous quantity of resources suddenly available to it. Companies were left with irreplaceable but badly aging hardware, or brand new servers that suffered from a very inefficient resource-usage.

A new question emerged: Would it be possible to consolidate multiple servers onto a single powerful hardware system? The industry's collective answer: "Yes it is, and ours is the best way to do it."

Read More......

Recomended Specification For hackintosh

f you're planning to buy shiny new hardware components to build an Intel HackMac, this article might be of interest for you.

If you have an AMD machine like most InfiniteMac members, you have probably already been thinking about your next computer upgrade. AMD works, but unfortunately there are several problems that are critical, such as the dual core / mouse movement bug, which forces several X2 AMD users to disable their second core. But no matter if you have already gained experience or if you're completely new to OSx86, just read this small guide. At the end you'll know which components work fine.

An Intel HackMac Kit is a great choice for everybody who's open-minded for new knowledge and enthusiastic about Mac OS X Leopard on PC. The only requirements are basic and easy-to-learn skills regarding OSx86. For instance, if there's a mac update available, then you should know exactly what to do, or at least where you can search for help to make it work.

Chipset & Motherboard

The best choice for your future Hackintosh is Socket 775, Intel's latest desktop CPU socket.

Nowadays, one knows which motherboards work nice for OSx86 use. We are in love with a series of motherboards built by Gigabyte. The Gigabyte GA-P35 motherboard variants with the Intel® P35 express chipset are our favourite ones. They are an excellent choice for fast and very reliable HackMacs. There are several different variants on the market, the cheaper ones don't include as much features as the more expensive variants. For example, most low cost models don't include Firewire. If you want your new system to have support for the widest range of features, then we gladly recommend the flagship of the GA-P35 series, the Gigabyte GA-P35-DS4. It supports Intel® Core™ 2 multi-core and 45nm processors and even DDR2 1066* memory for outstanding system performance. This indicates that it's a great choice for a future system. It also supports great graphics performance with a dual PCI-E x16 interface. Further, it has integrated SATA 3Gb/s with RAID function and features high speed Gigabit Ethernet and IEEE1394.

The Gigabyte GA-P35-DS4 works almost out out of the box with all the latest OSx86 releases out there. The only part that needs patching is the Audio, which is very easy to do.

The following variants of the GA-P35 and GA-EP35 series work very well. Make sure that you choose according to your requirements! If you aren't sure, GA-P35-DS4 is the greatest choice.

Gigabyte GA-P35-DS4
Gigabyte GA-P35-DS3

Gigabyte GA-P35C-DS3R

Gigabyte GA-P35-DS3R

Gigabyte GA-P35-DS3L

Gigabyte GA-P35-DS3P

Gigabyte GA-EP35-DS4

Gigabyte GA-EP35-DS3

Gigabyte GA-EP35C-DS3R

Gigabyte GA-EP35-DS3R

Gigabyte GA-EP35-DS3L

Gigabyte GA-EP35-DS3P

Processor

A great choice are Intel's latest desktop processors, Intel Core 2 Duo and Intel Core 2 Quad. They are very powerful, fast and reliable, just what we require for our new machine. Ask yourself how much performance you need. If you don't need maximum performance, you'll be fine with an Intel Core 2 Duo. Actually you can do almost everything, as long as you're not a power user. If you need extreme performance or if you just want your new system to be safe for the future, pick an Intel Core 2 Quad Processor.

They are screamers.

Intel Core 2 Duo

Intel Core 2 Duo E6750 2.66 GHz

Intel Core 2 Duo E8400 3.0 GHz

Intel Core 2 Quad

Intel Core 2 Quad Q6600 2.40 GHz

Intel Core 2 Quad Q9300 2.50 GHz

Intel Core 2 Quad Q9450 2.66 GHz

Graphics Card

No matter if you require top notch graphic performance or just a simple solution to provide Quartz Extreme & Core Image, many NVidia and ATI graphic cards work fine. The best solutions for OSx86 are currently provided by NVidia.

Some 512 MB variants don't seem to work without flashing the cards BIOS, please read the OSx86Project HCL before buying!

The following graphic cards are highly recommended.

GeForce 8800 GTX

GeForce 8800 GTS

GeForce 8600 GT

GeForce 7600 GT

GeForce 7300 GT

You can find the best deals to buy your graphic card at NewEgg and Buy.com, if you are located in the United States. If you are from Germany, you'll find the best deals at Amazon.de.

RAM

There is no specific RAM vendor that you have to choose, but make sure that it's DDR2 RAM.

I personally recommend Crucial. Maybe you'd like to consider a Crucial Ballistix 4GB DDR2 Kit, or a Crucial Ballistix 2GB DDR2 Kit. It's top notch RAM that'll work fine with the Gigabyte motherboard.

Case & Power Supply

Choose your favourite vendor for your case and power supply, but don't buy cheap ones. Case and Power are the most important things to keep your hardware cool and reliable, so make sure that you invest accordingly.

Addendum

Have fun with assembling and using your new machine. Please don't hesitate to add a comment with your new hardware specifications. We love to see new HackMacs and their happy users!

Finally, don't forget to buy your copy of Mac OS X Leopard, if you haven't done so yet! It's a nice and adorable box, I highly recommend it. And don't forget that it's a great piece of computer history. You will be glad to be able to look at it, when you have it in your cupboard after several years.

All thanks fly out to Apple for their incredible Mac OS X operating system. It helps us to enjoy our work every day and we truly love it at heart.

Read More......

How To Install Joomla

1. Download the Joomla Package, Unpack it.

2. Download the xampp and install it, start it. When the control panel of xampp
showing apache and mysql is running you can go to next step.......

3. Show your browser to "http://localhost" or "http://127.0.0.1", now you will see
the start page of xampp. Select your language, click the PhpMyAdmin from the left menu.

4. Create a database, lets name it "joomla".

5. Create a directory for joomla site in side the "htdocs" directory of joomla, lets name the directory "myjoomla" .

6. Copy all the unpacke joomla files inside the directory you have just created (myjoomla).

7. Show your browser to "http://localhost/myjoomla", now you will see the installtion page of joomla.

8. Click Next and enter the database details
Host name : localhost
Database name : joomla
User Name : root
Password : just lieve it empty

9. Click Next, enter you email and password for the backend administrator

10. Click next, Now it is almost complete, it says delete the installation directory, ok delete it which is in the myjoomla directory inside the "htdocs" directory.

11. Congratulation! ;Dit is done, show your browser to "http://localhost/myjoomla now you will see your joomla site.

Type rest of the post here

Read More......

iPC OSx86 Leopard 10.5.6 Intel AMD SSE2 SSE3, Public Beta Release

ISO Size on Disk: 4.15GB
Image capacity: 4.3GB (allowing 150MB of space for future expansion)
Compression: 3.3GB RAR compressed using WinRAR 3.7 at highest compression rate
DVD Base System: Mac OS X 10.5.4 9E25 Retail
Installed OS: Mac OS X 10.5.6 with AppleDecrypt.kext and Disabler.kext (every install)
Languages Included: Japanese, German, French, Spanish, Italian, Dutch, Danish, Finnish, Korean, Norwegian, Russian, Swedish, Brazilian Portuguese, Simplified Chinese, Traditional Chinese, Portuguese, Polish
Items removed from DVD for Single Layer Slimming: Boot Camp (doesn’t work on PCs), AdditionalSpeechVoices, Printer Drivers
Updates Included: Mac OS X 10.5.6 Combo Update, Java for Mac OS X 10.5 Update 2, Remote Desktop Client 3.2.2
DVD Bootloader: Chameleon 1.0.11
Default installed bootloader: Chameleon 1.0.12 PC_EFI v9
DVD Boot Kernel: Voodoo Kernel 9.5.0 Final Release
MD5 Hash of iPC_OSx86_Public_Beta.iso: 5eb1aaff70d1f5810cd62e9d075d812e



Type rest of the post here

Read More......

Tuesday, February 17, 2009

'1234 'Internet User Password Favorites

Think twice before choosing a password for the email, online bank account or ticket. Password that is not the shadow of any difference or is a victim of interesting information for the pirate, of a new U.S. states, such as AFP reported.

Analysis of statistics over 28,000 password that has not been recently stolen from a famous U.S. internet pages and was published on the Internet revealed that people often assume the password as a matter of less importance.

Survey that found that 16% use a computer user's first name as their password, or often their own name or the name of their children, so the publication of the Information Week.

Some other 14% rely on a combination of keyboard easiest to remember, such as'1234 'or'12345678'. 'QWERTY' password is the most popular among the users of English keywords. Similarly, AZERTY, for the people of Europe.

5% of the stolen password is the name television stars or popular subject among the young, such as' Hannah ', a name taken from the singer and television music events pelakon Hannah Montana. Password canal is' Pokemon ',' Matrix 'or' Ironman '

3% using a password which is the expression of attitude, like 'I do not care', 'whatever, or' No '.

There is also a password option sentimental, such as' iloveyou 'and of the,' ihateyou '.

Robert Graham of Errata computer security company Security, which analyzes and publishes a variety of conclusions, provide advice to the user's computer in order to provide better protection against breakthrough in lokamaya.

He recommends that computer users choose a password that is longer than eight characters or letters, with a capital letter and one symbol.

Read More......

Wednesday, February 4, 2009

6 Version for Windows 7

Microsoft recently announced that later, when released, Windows 7 will have six versions, from Starter to Ultimate. Name and function similar to the Windows Vista property.

Windows 7 Starter allows up to three applications at the same way, support the Home Groups, and include the "taskbar and JumpLists already improved." Home Groups are a simple way to allow multiple systems in a network that share the same media and other files, and printers. Jump Lists are a quick way to access files that are frequently used.

Windows 7 Home Basic does not limit the number of applications that run concurrently - may be as much as possible for your hardware configuration allows. Home Basic also includes thumbnail previews, supports "ad-hoc wireless networks and Internet connection sharing," the Windows Mobility Center (the version that already exists in several versions of Vista). Microsoft says, Home Basic version will be available only in "the market is growing."

Windows 7 Home Premium includes the Aero Glass GUI. Other features is support for the wider media, and to increase the Windows Media Center and streaming media. New feature here is To Play, which enables Windows 7 to the remote control network-connected media devices DLNA 1.5. Home Premium also supports multi-touch interface and include "a hand is better."

Windows 7 Professional including the ability to join in the offline domain features with Domain Join, and Location Aware Printing, which automatically select the printer to print your location, depending on the network which are connected at that time. Professional version also includes the "protection of network data backup and Encrypting File System is much higher."

Windows 7 Ultimate, and Windows 7 Enterprise features include a very similar - Enterprise version for larger scale companies who buy, Software Assurance Agreement-volume-based license from Microsoft. Both versions include the BitLocker encryption to internal and removable drives. Ultimate and Enterprise also including DirectAccess features, which allows the system connected to the Internet automatically and securely connected with the corporate network and let IT administrators to manage systems without having to logon to the VPN. BranchCache feature allows a system that is in the remote offices to access a data network that is d more quickly through the local data caching at the remote office location. (DirectAccess and BranchCache need a server running Windows Server 2008.) Windows 7 Ultimate and Enterprise AppLocker also includes features that allow IT administrators to create policies that control the software determines what can and can not be executed on the system user or user groups.

Unfortunately there is no definitive date about Windows 7. The price was not disclosed, but likely similar to the price structure of Vista.

Read More......

Firefox 3.1 Beta 3 Hold Back

For the second time, the presence of delay Mozilla Firefox 3.1 beta 3. Perhaps there is a bug in the JavaScript engine is a new browser.

Not yet clear whether this delay will affect the final schedule Firefox 3.1, which is promised will appear this quarter. According to the Firefox director Mike Beltzner, he can not let what they believe will go to 100 percent in the first quarter.

Wednesday, Mozilla notes have 18 bugs that are still to be repaired before they can progress with the Beta 3. "TraceMonkey team have 15 things that are obstacles first priority," he said referring to the JavaScript engine that was introduced years ago on the Mozilla Firefox 3.1. "Obstacles are 1 priority bug, which if not corrected will prevent dirilisnya Beta 3.

Firefox 3.1 has been delayed several times. Two weeks ago, announced Beta 3 will be present this day, February 2, or a week late from the previous schedule. Firefox 3.1 Beta 2, the latest release so far, be the beginning of December 2008.

Nah, can immediately Mozilla released Beta 3? Saingannya, Microsoft, has begun to release IE 8 RC1. Furthermore, Microsoft even provide add-on for Firefox browser which directly suggest what you're looking for when you start them. This movement is designed to integrate Microsoft Live Search, Microsoft search engine, in Firefox.

Read More......

Sunday, December 28, 2008

Acer aspire 6935, Entertainment Laptops











From the outside view Acer aspire 6935 it is visible normally. However, in the view that this is simply the ability of powerful laptop on the side of entertainment. Effects of the laptop entertainment is stronger with the buttons are provided for special media player to the left of the keyboard.

The outside of the laptop, given the color blue looks plain old bald except for the Acer logo is seen glaring at the center of this front. The effect of 'dark' is still maintained on the part of the laptop is a given color jet. This provides benefits in part because of Unsurprisingly, most often with hands so dirty, not easy.

Acer using the diagonal screen size of 16 inches with a 16:9 ratio in this laptop. This is not surprising because this laptop is designed to display the DVD format with the good. This screen has a resolution of 1366 x 768 pixels and looks quite sharp with a bright color although the viewing angle is slightly too narrow for the size of a multimedia laptop.

Because there is a space that must be provided to the buttons, the media player would not want to position the keyboard so slightly shift to the right. For those who are not used, this may be the position of the keyboard rather disrupt, but overall, the construction of the key on the keyboard make this quite comfortable and lower productivity while typing.

However, the most interesting that the media is a key player on the left of the keyboard. Button-key touch-sensitive with this design be very interesting. However, it is not only an attractive appearance, because the functional buttons is also working with the good and responsive.

The video quality will not be complete without balanced with adequate audio quality. And in this side, Acer aspire 6935 is also quite reliable. Acer even install sub-Woofer placed on the tube, which also functions as a hinge of the laptop. The sound quality is even a good place to start when the volume increased.

Acer laptop entrust the heart of this on the Intel Core 2 Duo P8400 2.26GHz, which is assisted by working with 4GB RAM DDR2. There is a 320GB hard disk with a speed of 7,200 rpm play installed on this laptop. In short, the laptop is powerful enough to use for heavy jobs and entertainment functions. And for that, Trusted Reviews provide value 9 of 10 for products that are sold with the price of 910 Pounds Sterling, or approximately Rp 16,000,000 this.

Specifications:
Processors: Intel Core 2 Duo P8400 2.26GHz
Memory: DDR2 4GB
Chipset: Intel Centrino2
VGA: Nvidia 9600M GT 512MB
Screen: 16 "WUXGA
Hard Disk: 320GB 7200 rpm
Optical Drive: Blu-ray ROM
Port: ExpressCard, 6-in-1 card reader, USB 2.0, HDMI, infrared, VGA, Microphone, Line-in, Modem, Ethernet
Webcam: 1.3 megapixel
Wireless: Draft-N Wi-Fi
Dimensions: 385 x 275 x 39.3 ~ 42.6mm
Official Site: www.acer.co.uk

Read More......

Acer aspire M7720, the First Core Processors With i7




Acer is one of the producers of products that the PC was first adopted in the Intel Core i7 products. This means that Acer aspire M7720 has the latest technology in the PC world. However, it is not only a mainstay of this product. Acer installing chassis with a number of functions and features that also quite interesting.

Color jet with a touch of orange color in some places, adding that strong impression. What is clear, not just the appearance of visible only reliable because the PC contains the latest technology from Intel, which is guaranteed to provide reliable performance while energy efficient.

Intel's latest technology, this is called a "drastic a transition from the previous technology. First, there is no longer the front side bus, because Intel is now using the memory controller, which was installed directly in the prosesornya. In addition, the system is now using three-channel memory and not two as previously.

I7 920 Core processors that are used Acer aspire M7720 is a Quad-core processor that uses Hyper-Threading technology. This means that, in the virtual you have up to eight processors that work simultaneously. Each core work with the speed of 2.66GHz, but this speed can be derived in accordance with needs. Even this system can be shut core processor that is not required, so do not squander resources.

To support the performance of the processor, the Acer install 3Gb of DDR3 RAM and VGA card ATI Radeon HD4850. Save space provided is quite roomy. Acer install the hard disk capacity of 750GB. With the mix of specifications such as this, clearly Windows Vista Home Premium as the operating system can work freely with no answer.

Another thing that is interesting enough shelves provided connect external SATA drives in the future. This eases the process of installation of additional hard disk because you never again have to unload chassis to do so. This chassis also provide a backup of the key functions to create a backup of the system directly from the key.

What is more interesting is the media provided the key player in the PC chassis is so you can easily manage the media player functions without the need to access the menu in the software. A rather strange fact is not disediakannya indicators of the hard disk that can be 'mandatory' on a PC.

In general, Acer aspire M7720 is a performance that is reliable and therefore Good Gear Guide gives 4 out of 5 stars for this product. Unfortunately, there has been no information about the selling price of this product attractive.

Specifications:
Processors: Intel Core i7 920
Memory: 3Gb DDR3
Chipset: Intel X58
VGA: ATI Radeon HD4850
Screen: --
Hard Disk: 750GB
Optical Drive: Blu-ray ROM
Port: DVI output, Firewire, Line In, Line-out, RJ45, USB 2.0
Webcam: --
Wireless: --
Dimensions: --
Official Site: http://global.acer.com

Read More......

Friday, December 26, 2008

Track Santa Claus Through Mobile

In cooperation with the North American Aerospace Defense Command (NORAD), on Christmas 2008 Google map to bring back tracking Santa Claus in the way Christmas night. This time, Santa Claus can also be tracked via mobile phone.

As quoted detikINET from CNET, on Wednesday (24/12/2008), travel Santa will be included in Google Map map displayed on the site Noradsanta.org. In addition, users can download the Google Earth KML files to show Santa in Google Earth.

New features that are displayed for 2008 is tracking Santa via mobile phone, namely through the application Google Maps for Mobile. In addition, the user melacaknya can Twitter through '@ noradsanta'.

Tracking Santa is a part of the tradition of NORAD in progress for more than 50 years. This tradition started from a misprint Santa hotline phone number a campaign Department Store into the emergency hotline of the military.

Read More......

5 Most Popular Feature on Google

There are many special features in the Google search engine that can help us find what we find. In between you may already know.

Some of the features popular on Google, as quoted from Techdream, Friday (17/10/2008), is:

1. The calculation of simple mathematics.
Google's search engine can do simple math calculations such as addition, multiplication, division or subtraction, as have the ability to function as a calculator. Type the number you want to be counted along with calculations to sign in the box search engine, for example: 5 3 * 5, and press the Enter key or click the Search button on Google.

2. Currency conversion.
Currency conversion facility is also available in the Google search engine. Just type the figures currency followed signs that want to convert from a certain currency to the desired currency in the search engine, for example: 100 USD in INR, and press Enter.

3. Viewing time in various cities around the world.
You can find out the local time in a city or other countries. Just type in the time [name of city / country] in the search box to find out easily with the local time in a city / country. The time in Barcelona.

4. Conversion units.
In addition to functioning as a calculator, the Google search engine can also convert the size. For example: 100 inch in meters.

5. Check your spelling.
Google also have the facilities to check spelling, good spelling for a word objects, such as names and places, which may not appear in the program or spell check dictionary standard.

Read More......

7 Step Removing Virus' K0pL4xZ '

Virus "K0pL4xZ" that are detected as VBWorm.QTT take computer users, particularly those that have a lot of Office files, by changing the file type icon and Microsoft Office.

However, for, the virus is not to destroy files Office. The virus is created by using Visual Basic. So that the chance the virus, putting it by using the icon "Windows Media Player Classic" with the type of application files (exe). To clean up, follow these steps:

1. Disconnect the computer that will be cleaned from the network (LAN).
2. Turn off "System Restore" during the cleaning process.
3. Turn off the virus is active in memory. Use the tools to turn KillVB process in memory. Please downlod tools are in: http://www.compactbyte.com/brontok/killvb.zip

4. Fix registry that has been altered by a virus. To expedite the repair process registry copy the script under this program in notepad, then store with the name "Repair.inf." Run the file by:

- Click the right repair.inf
- Click Install

[Version]
Signature = "$ $ Chicago"
Provider = Vaksincom Oyee

[DefaultInstall]
AddReg = UnhookRegKey
DelReg = del

[UnhookRegKey]
HKLM, Software \ CLASSES \ batfile \ shell \ open \ command ,,,"""% 1 ""% * "
HKLM, Software \ CLASSES \ comfile \ shell \ open \ command ,,,"""% 1 ""% * "
HKLM, Software \ CLASSES \ exefile \ shell \ open \ command ,,,"""% 1 ""% * "
HKLM, Software \ CLASSES \ piffile \ shell \ open \ command ,,,"""% 1 ""% * "
HKLM, Software \ CLASSES \ regfile \ shell \ open \ command, "regedit.exe"% 1 ""
HKLM, Software \ CLASSES \ scrfile \ shell \ open \ command ,,,"""% 1 ""% * "
HKLM, SOFTWARE \ Microsoft \ Windows NT \ CurrentVersion \ Winlogon, Shell, 0, "Explorer.exe"
HKLM, SYSTEM \ ControlSet001 \ Control \ SafeBoot, AlternateShell, 0, "cmd.exe"
HKLM, SYSTEM \ ControlSet002 \ Control \ SafeBoot, AlternateShell, 0, "cmd.exe"
HKLM, SYSTEM \ CurrentControlSet \ Control \ SafeBoot, AlternateShell, 0, "cmd.exe"
HKLM, SOFTWARE \ Classes \ exefile, application
HKCU, Software \ Microsoft \ Internet Explorer \ Main, the start page, 0, "about: blank"
HKCU, Software \ Microsoft \ Internet Explorer \ Main, Search Page, 0, "about: blank"
HKLM, SOFTWARE \ Microsoft \ Windows \ CurrentVersion \ Explorer \ Advanced \ Folder \ HideFileExt, UncheckedValue, 0x00010001, 0
HKLM, SOFTWARE \ Microsoft \ Windows \ CurrentVersion \ Explorer \ Advanced \ Folder \ SuperHidden, UncheckedValue, 0x00010001, 1
HKLM, SOFTWARE \ Microsoft \ Windows NT \ CurrentVersion, RegisteredOrganization, 0, "Organization"
HKLM, SOFTWARE \ Microsoft \ Windows NT \ CurrentVersion, RegisteredOwner, 0, "Owner"
HKLM, SOFTWARE \ Classes \ txtfile, FriendlyTypeName, 0, "@ C: \ Windows \ system32 \ notepad.exe, -469"
HKLM, SOFTWARE \ Classes \ Word.Document.8, "Microsoft Word Document"
HKLM, SOFTWARE \ Classes \ Word.Document.8 \ DefaultIcon, "C: \ Windows \ Installer \ (90110409-6000-11D3-8CFE-01500 48383C9) \ wordicon.exe, 1"
HKLM, SOFTWARE \ Classes \ PowerPoint.Show.8, "Microsoft PowerPoint Presentation"
HKLM, SOFTWARE \ Classes \ PowerPoint.Show.8 \ DefaultIcon, "C: \ Windows \ Installer \ (90110409-6000-11D3-8CFE-015 0048383C9) \ pptico.exe, 1"
HKLM, SOFTWARE \ Classes \ Excel.Sheet.8, "Microsoft Excel Worksheet"
HKLM, SOFTWARE \ Classes \ Excel.Sheet.8 \ DefaultIcon, "C: \ Windows \ Installer \ (90110409-6000-11D3-8CFE-01500483 83C9) \ xlicons.exe, 1"
HKLM, SOFTWARE \ Classes \ Access.Application.11, "Microsoft Office Access Application"
HKLM, SOFTWARE \ Classes \ Access.Application.11 \ DefaultIcon, "C: \ Windows \ Installer \ (90110409-6000-11D3-8CFE-01 50048383C9) \ accicons.exe, 1"
HKCU, Software \ Microsoft \ Windows \ CurrentVersion \ Explorer \ Advanced, Hidden, 0x00010001, 1
HKCU, Software \ Microsoft \ Windows \ CurrentVersion \ Explorer \ Advanced, HideFileExt, 0x00010001, 0
HKCU, Software \ Microsoft \ Windows \ CurrentVersion \ Explorer \ Advanced, ShowSuperHidden, 0x00010001, 1
HKLM, SOFTWARE \ Microsoft \ Windows \ CurrentVersion \ Explorer \ Advanced \ Folder \ SuperHidden, WarningIfNotDefault, 0, "@ shell32.dll, -28964"

[del]
HKCU, Software \ Microsoft \ Windows \ CurrentVersion \ Policies \ Explorer, NoFolderOptions
HKCU, Software \ Microsoft \ Windows \ CurrentVersion \ Policies \ System, DisableRegistryTools
HKCU, Software \ Microsoft \ Windows \ CurrentVersion \ Policies \ System, DisableTaskMgr
HKCU, Software \ Microsoft \ Windows \ CurrentVersion \ Policies \ System, DIsablecmd
HKCU, Software \ Microsoft \ Internet Explorer \ Main, Window Title
HKLM, SOFTWARE \ Microsoft \ Windows \ CurrentVersion \ policies \ Explorer, NoFolderOptions
HKLM, SOFTWARE \ Microsoft \ Windows \ CurrentVersion \ policies \ System, DisableRegistryTools
HKLM, SOFTWARE \ Microsoft \ Windows \ CurrentVersion \ policies \ System, DisableTaskMgr
HKLM, SOFTWARE \ Policies \ Microsoft \ Windows NT \ SystemRestore
HKCU, Software \ Microsoft \ Windows \ CurrentVersion \ Run, System
HKCU, Software \ Microsoft \ Windows \ CurrentVersion \ Policies \ ActiveDesktop
HKCU, Software \ Microsoft \ Windows NT \ CurrentVersion \ Winlogon, shell
HKCU, Software \ Policies \ Microsoft \ Windows \ System, DisableCMD
HKLM, SOFTWARE \ Microsoft \ Windows \ CurrentVersion \ Explorer \ Advanced \ Folder \ HideFileExt, WarningIfNotDefault
HKLM, SOFTWARE \ Microsoft \ Windows NT \ CurrentVersion \ Run, Haha
HKLM, SOFTWARE \ Classes \ exefile, FriendlyTypeName

5. Delete the file "C: \ Windows \ desktop.ini" (the file which function to change the icon into the Windows Control Panel icon). Use a dos prompt to delete the file.

6. Find and delete files parent virus in the Hard Disk and Flash Disk with the first show hidden files. To accelerate the search function use the "Search Windows."

Here are some master file that will be made by Koplaxz:

* C: \ Documents and Settings \% user% \ Start Menu \ Programs \ Startup

Winhelp.exe

* C: \ Documents and Settings \% user% \ Start Menu \ Programs

Hellloo_Gheea.exe

* C: \ Documents and Settings \% user% \ My Documents

Jangan_Dihapus_Apalagi_Dibuka.exe

* C: \ Documents and Settings \% user% \ Start Menu

Koplaxz Kudo Shop.exe

* C: \ Documents and Settings \% user% \ Start Menu \ Programs

Exe Hellloo_Gheea ..

* C: \ Windows

TourWindowsXP.exe

svchost.exe

Kudo.com

command32.pif

KopLaXz@KudoShop.exe

* C: \ F4HM1_KudO_M4n4j3r.exe
* C: \ G0d3G.exe
* C: \ Ghe@_i_miss_u.3gp.exe (All Drive)
* C: \ K0pL4xZ.exe
* C: \ K 0 P L 4 X Z.exe
* C: \ KopLaXz@KudoShoP.exe (All Drive)
* C: \ R0n13G4N_G3Ndut_S3xY.exe
* C: \ R3eve5.exe
* C: \ K0pL4xZ @ KudoShop (All Drive)

folder.htt

msvbvm60.dll

K0pL4xZ.exe

* C: \ K0pl4xZ @ KudoShop \ K0pL4xZ.exe
* C: \ [space] Windows \ System_FriendZ_KopLaXz32

F4HM1_KudO_M4n4j3r.exe

G0d3G.exe

K 0 P L 4 X Z.exe

R0n13G4N_G3Ndut_S3xY

R3eve5.exe

* C: \ [space] Windows \ Zx4Lp0K.html
* C: \ Windows \ system32 \ smkn2majalengka.scr
* C: \ Windows \ system32 \ PCMAV.exe
* C: \ Windows \ system32 \ Asholest.exe
* C: \ Documents and Settings \% user% \ SendTo \ KoPLaXzKudo (e-mail). Exe
* C: \ Autorun.inf (all drives)
* C: \ Desktop.ini (all drives)
* C: \ A Letter Ghe @ 4. Txt (all drives)
* C: \ K0pL4xZ@kUdO_5h0P.txt
* C: \ Documents and Settings \ All Users \ Desktop \ A Letter Ghe @ 4. Inf file
* C: \ Windows \ desktop.ini


Then delete the file parent virus that has characteristics:

* Icon "Windows Media Player" clasic / 3GP Video Format
* The size of 31 KB
* Extension EXE, PIF, COM and SCR
* Type the file "Application"


Delete the following files:

* C: \ Autorun.inf (the root of each drive: c: \ or D: \)
* C: \ Desktop.ini (the root of each drive: c: \ or D: \)
* C: \ A Letter Ghe @ 4. Txt (the root of each drive: c: \ or D: \)
* C: \ K0pL4xZ@kUdO_5h0P.txt (the root of each drive: c: \ or D: \)
* C: \ K0pL4xZ @ KudoShop (in the root drive and Flash Disk)
* C: \ Documents and Settings \ All Users \ Desktop \ A Letter Ghe @ 4. Inf file
* C: \ [space] WINDOWS
* C: \ [space] Windows \ Zx4Lp0K.html


7. For optimal cleaning and prevent re-infection, a scan by using anti-virus up-to-date.

Read More......

4 Tools Free Restores Deleted Files

Never delete important files on the computer without accidentally? Cases such as this may never befall you, sometimes occurs because we hurried the middle or in the future.

However, do not worry, you can use special tools to restore the files overnight. Here are 4 tools that you can use to restore the files that were deleted. These tools can be downloaded for free on the Internet.

1. Undelete Plus
Among the applications for free circulation in the exterior to restore deleted files, Undelete Plus one that can be used. Its user interface (interface) very simple. You can restore files that were deleted easily with the file type, for example, the Application, GIF graphics, HTML Documents, PDF.

These tools operate on the operating system Windows 95, Windows 98, Windows Me, Windows NT, Windows 2000, Windows XP, Windows 2003 and Windows Vista. You can download the Undelete Plus: http://www.undelete-plus.com/

2. Restoration
Restoration is one of the application to restore the files that were deleted. Tools are also very easy to use and does not need to be installed on the computer. Simply download the tools at: http://www.snapfiles.com/get/restoration.html, the executable file and run it to restore the files that were deleted.

3. PC Inspector File Recovery
Although the user interface PC Inspector File Recovery is not so user friendly, application of this very powerful to detect and restore deleted files. After the scanning process, will be presented the files that were deleted in the folder tree structure (tree structure) to facilitate the search. Thus, you can easily find and select the files / folders that were deleted, and click on the icon and "save" to restore the files. These tools can be downloaded at: http://www.pcinspector.de/Sites/file_recovery/info.htm?language=1

4. Recuva
Recuva often referred to as "Recover". User interface is very simple. In basic mode, this tool will display a list of files that are deleted can be restored. If you change to advanced mode, the scanning process will be re-done and the option to display the information contains the list of files that were deleted. These tools can be downloaded at: http://www.recuva.com/

-detik-

Read More......

Thursday, December 25, 2008

To stop the QoS Accelerating 'Browsing'

QoS named full Quality of Service provided with the goal to make sure your network works well. But the reality is not so useful, but that can take up to 20% of your bandwidth. You can try and see the difference when QoS is disabled.

If you use Windows XP Professional, the following steps off the QoS:
- Click Start, then Run.
- Type "gpedit.msc" in the field, and press enter.
- In the Local Computer Policy, click the plus sign in the Computer Configuration, then click again on the Administrative Templates.
- Click on the plus sign and select Network QoS Packet Scheduler.
- On the right-hand box, double-click on Limit Reservable Bandwidth.
- On the Settings tab, select Enabled.
- In the Bandwidth Limit%, replace the contents so 0%. (Do not leave empty the contents)
- Click OK.

If you use Windows Home Edition, follow these steps:
- Click Start and then select Settings.
- Select Control Panel, and open Network Connections
- Right-click on Local Area Connection and select Properties.
- On the General tab, check the lost QoS.

Read More......

Set 'Browser Add-ons' With' Service Pack 2 '


If you have not installed Service Pack 2 for Windows XP, this will be the other reason why it should do. SP2 will give you more control in detail for the add-ons in Internet Explorer, which will help you take control of your browser and remove spyware from attack.

Facilities that secretly and tersamar such as a toolbar, spyware can enter the Internet Explorer, hijack your browser, and overwhelm you with ads and all the activities you when online. Even add-ons that are officially eliminated so difficult to have one installed on your system.

To set this add-ons, first make sure that Service Pack 2 you have one installed. And run Internet Explorer, go the Tools menu, select Internet Options, and click the Programs tab.

Click on Manage Add-ons and you may be given a long list of add-ons that disrupt lumayan. Look one by one on the list, click anywhere that looks suspicious, and then select Disable.

Not be a problem for a little aggressive in men-disable add-ons, including Browser Helper Objects and Browser Extensions, because it's easy to enable back later when you need it.

Of course for a more extreme again, you may consider uninstall Internet Explorer and switch to alternative browsers such as Mozilla Firefox. Handling this will limit your use of the many spyware and virus threat.

kapanlagi

Read More......

Overcome the 'Error' In the Word From the 'Template Files'


Sometimes the problems that arise when we run the Microsoft Word toolbar, such as lost, often hangs suddenly or can freaks react Word also caused because the file is corrupted template. Word when run will automatically call the normal templates and other additional functions in the startup folder.

To address the following steps:

1. Start the Word template but without any call. How to run Word from the Start menu> Run and type winword.exe / a and press enter. Do not forget there must be a space before / a. Word will be run without calling a global template, and other additional functions and the Normal.dot. If the issue is resolved means the problem lies in the Normal.dot file, and proceed to step number two. If the problem is still there, only to immediately step number 7.

2. Close Word.

3. Use the Windows feature to find the Normal.dot file. Click on the blank on the taskbar and press F3 to display the Search window. Make sure you find the primary hard drive and includes Subfolders tercentang. Type the name of Normal.dot on the line and click the Search button.

4. Depending on your version of Windows, Normal.dot may be located in a folder that is hidden.

5. If found, rename Normal.dot so Normal.old.

6. Run back Word. When you delete or rename your Normal.dot file Word will then create a new file based on the standard settings. If the issue is resolved then the problem because your damaged Normal.dot file. If still not continue to step to seven.

7. If the problem lies not in the normal template, then the problem is the global template and other additional functions. To go to your Word startup folder. Usually there are at C: \ Documents and Settings \ username \ Application Data \ Microsoft \ Word \ Startup.

8. Move all the contents of the folder.

9. Close Word and try again enter one by one the contents of the startup folder. Word then run again, the test whether there is an error and then closed again. Repeat for the other contents of the startup folder. If the error it appears, you will know where the additional functions into the causes of these errors and could install it again.

Read More......

Recognize Variety UPS



Power Supply Uninteruptible or better known as UPS, for some people, this term may sound familiar. However, people often only know two types of UPS that is most easily found in the market. Both types are the type of UPS and standby UPS type online. In fact, UPS has several other advantages and disadvantages of each.

American Power Conversion (APC), a global leader in critical power services and cooling services are also popular with UPSnya products, provide information and tips about multiformity UPS so users can better identify and select the UPS in accordance with their needs.

Standby
Standby UPS type is the type used by the user's home to be with their PC. Transfer Switch has been set to take the AC input (direction) as the main source of power, while the resources taken from the backup battery or inverter (at the time the main source of power off). UPS equipment is able to perform like this against interference filtrasi power and flow management, in addition to the benefits for users of the design of an efficient, small size and cost that must be regarded issued cheap.

Line Interactive
UPS is the type most often used on small business units, web developers, and a number of servers that are in the government department. This is because in addition to having a high level of reliability, this type also has the ability to adjust the voltage is quite good. The inverter (Battery charger from the modifier to AC) is always connected to the output of the UPS system. In normal circumstances, will make the inverter Battery. Meanwhile, in the electricity off, Transfer Switch will close and drain power from the Battery to the UPS output. Position the inverter is always connected to the output filter to provide additional resources. This makes this type of UPS with lots of servers used for electricity and conditions that are not too good.

Double Conversion Online
This type is the most common for UPS power with more than 10kVA. This type has similarities with the type Standby. Just type a main source of energy that lies in the inverter, not the AC power source. On this type, the main electricity supply dissolution will not trigger the switch because of the transfer of AC electric current at the entrance to the input of the Battery which provides power to the inverter is located at the output. Therefore, when the flow of AC power is lost, the flow of energy will be transferred immediately without taking a rest when the diversion occurs. UPS is the type of performance above average. This type can be said to a picture of an ideal UPS, type unfortunately this heat is high enough.

Delta Conversion Online
UPS is a diagram of Double Conversion technology (Double Conversion) that terah updated and is available with power 5kVA to 1.6MW. Have a similarity with the type Double Conversion, using this type of inverter for the supply voltage. When power supply is lost, this type do the same type with Double Conversion.

Suppose a package should only be transmitted from the floor 4 to 5 floors. Delta Conversion technology to save energy in a way to deliver the package according to the differences in the starting point and end point only. Delta Conversion has two functions, the first is to control the characteristics of the input power. Meanwhile, the second function is to control the flow of direct input to the process of charging the battery system. Things to remember this is the type of energy that minimize terbuang. In addition, it has a high compatibility of the various types of generators and reduce the need for the use of cables.

In the end, all of the UPS mentioned above have their purpose and no one type of any type that can be the most 'ideal'. We must be able to recognize the needs and the right environment where the UPS will be put before deciding what type to use.

Refers to the categorization discussed previously, the table below will make it easier to see in which type fits your needs.

UPS Type: Standby
The advantages: low cost, high efficiency, compact design
Disadvantages: The battery still in use when the power off; not suitable for use on the 2kVA
Description: Most suitable for personal users

UPS Type: Line Interactive
Excellence: High Reliability, high efficiency, good voltage adjustment
Disadvantages: Not suitable for use on the 5kVA
Description: Type of UPS is the most frequently used in the condition of electricity that is not stabilized

UPS Type: Double Conversion On-Line
The advantage: the voltage adjustment is very good, easy to connect in parallel
Disadvantages: Low efficiency; expensive price for the type of power under 5kVA
Description: close to the ideal image of UPS, but the heat is high enough.

UPS Type: Delta Conversion On-line
The advantage: the voltage adjustment is very good, high-efficiency
Disadvantages: Not suitable for use under 5kVA
Description: high efficiency to extend life cycle when the device is used on a large system

Read More......

Nokia integrate System Sign-in at the Ovi

Nokia realize the many obstacles that occur in accessing the Internet, including the use of multiple accounts to access the site.

To that end, Nokia is finally making a service that combines all incoming access to many sites, one in the roof, Ovi.com.

During a year later, Nokia has purchased dozens of companies engaged in Internet services, including the purchase price of USD8, 1 billion for the acquired company Navteq navigation. This is done to Nokia still retains the top of the world mobile phone market and the power of the Internet era.

Finnish handset vendor origin is also combine each have access to services in a single integrated service called Ovi.com. Even to visit each of the existing service, Nokia users do not need to use additional username or password. This is done to ease the user to access all the Internet service owned by Nokia in Ovi.

"We have to unite to sign-in system in our Ovi, so that our users more comfortable and has experience in a different berinternet," said Nokia spokesman, as quoted by Reuters on Monday (22/12/2008).

Nokia expects, in the year 2011 they are able to produce as much revenue USD2, 79 billion from Internet service, particularly focusing on the navigation service, music, games, messaging and media. This means that Nokia will compete directly with Google, Apple and Yahoo.

Unfortunately, Nokia does not provide definitive data how many internet users that they have, it is reported that as much revenue has recorded 115 million euros since July to September this year

okezone

Read More......

Wednesday, December 24, 2008

Logitech Illuminated Keyboard, Pas Create Day in the Night


When you include people who spend more time working with the computer, you will need the input devices such as mouse and keyboard that provide comfort when you work. And when you include people who often work at night, be it Logitech Illuminated Keyboard is indeed fit for you.

Logitech keyboard display production this interesting. From the side, the keyboard was very thin with a curved shape to the right in the space provided for the wrist rest. Soft texture of the stucco space at the bottom of the range is key keyboard feels quite comfortable in the base wrists and not make the pain even though this should be using this keyboard for long enough time.


Seen from the key layout, the keyboard is actually very simple. Not many buttons beside the four buttons in the top row of the array NUM key pad. The fourth button is working to access functions from the keyboard backlight, which can be light in the dark. Some function for the media player and Web browser had merged with the key functions of the organization that is in the top row of the keyboard.

Construction of each key on the keyboard is also quite good, so convenient to keep a long time. Level ergonomis board productivity, the key is to make your time typing is not experiencing a decline. In addition, the keyboard is almost no beeps when used so that people will not disturb the other when you have to work overtime until late at night even.

Backlight function keyboard has four levels that can be set according to taste. With so you can still feel comfortable and undisturbed even though using the keyboard in different lighting conditions. When the conditions are really dark, you can lower the intensity backlight, so you can still see the location of each of the keyboard without having to feel interfere with the light is too bright.

May be a little strange is the construction of the bottom row of buttons that made a little higher than the key line in the other. Not clear why this progression is made higher than the array of other functional and the construction is also not too much effect on the level of the entire range ergonomis button on the keyboard.

With a variety of considerations, Logitech Illuminated Keyboard this is the keyboard can be reliable, especially if you frequently work at night need comfort and adequate time to interact with the computer. For the keyboard that is sold with the price of 57 Pounds Sterling, or equivalent to Rp 1 million, the value Trusted Reviews 8 of 10.

Specifications:
Connectivity Technology: wired
Interface: USB
Key / Button Function: E-mail, Multimedia, Internet browsing
Features: Backlit, Palm rest, PerfectStroke
System Requirements: Microsoft Windows Vista / XP
Dimension: 18:03 "7:56 x" x 0:37 "
Official site: www.logitech.com

kapanlagi

Read More......

Tuesday, October 14, 2008

Slide Show Wizard

What it is: This wizard helps you create a slide show of your digital pictures. When you're done, you can put your slide show on the Web so that your family and friends can view it.
How to use: Launch the Wizard from the Start Menu under All ProgramsPowertoys for Windows XPSlide Show Wizard. Follow the steps of the wizard to select and arrange your pictures, choose from a few simple options, and then save a Web-ready HTML slide show to a folder.

Read More......
 
Template design by Amanda @ Blogger Buster