Ads 468x60px

Pages

Kamis, 22 Agustus 2013

Simple Way Maintenance Your Computer

Maintenance Computer or Computer Care, especially the CPU will usually only be done after the complaint or damage, it is less precise. Computer maintenance should be performed regularly both on the CPU and the monitor. Actually there are some fundamental things that we often forget to do with how to care for a computer or a computer or a PC maintenance tips, which can cause damage to the computer.





Computer Hardware Maintenance section

The concentration of dust on the device in the CPU and Monitor. Especially on computers (PCs) are placed in open space. High dust concentrations will cause impaired peripheral connections on the socket. Also during the rainy season or the temperature of moist dust will absorb moisture and behaves like a conductor who can connect short (surge). It also resulted in an insulator layer on the PCB peeling causing corrosion on copper lines. If this happens, the computer maintenance will be more difficult because there is no way but to replace the peripherals.

Refrigeration, on several types of computers, especially older computers have a processor that is high enough temperature but has a way of cooling which I think is still lacking. Room temperature is ideal for the PC about 19 degrees Celsius


HardDisk space is not proportional. 80GB hard drive size is certainly not proportional if there are only 2 partitions each 40GB C and D. Whereas the use of System C is not more than 10 GB.

Installation of peripherals that are less fit or less sturdy. Usually this happens on a local PC assembly. Often means the installation of Motherboard or other peripherals with screws that are incomplete or less tight. This is often overlooked in how to care or computer maintenance tips. This can be fatal. How to install socket fitting, it also can be fatal.

Power Suply conditions.
It often escapes attention when we take care of the computer. On the use of long, most power supply will decrease power. Power Capacity Power Supply is inadequate and does not use Stavolt, also can damage your CPU componen. Frequent power drop / off or less power. This will cause the computer to suddenly die without process shutdown


Computer Maintenance Software section

Incompatibility of OS, Application, and the volume of data with computer specifications are used.
Frequent use of computers for heavy games. Running games on the PC will generate a lot of space-space fragment and temporary files that slow computer performance

The virus. The virus can lead to slow access to the computer and damage to systems or data. Even in extreme conditions can cause the computer to jam / hang. If its stuck there is no other way than pressing the Restart button on the CPU. This often occurs automatically when the CPU is often die without ShutDown process which means it will shorten the life of the computer hard drive in particular. Usually the virus is transmitted through the stick and the Internet. Besides the selection of inappropriate anti-virus also can affect computer performance.

By knowing the things above, to anticipate needs to be done to care for a computer or  computer / PC maintenance tips in total as follows:

Clean the dust on the motherboard and other peripherals on the inside of the CPU with a paint brush and small to medium-size angle and narrow crevices. Perform well on Power Suply by opening the casing / box power supply first and note the solder-solderannya whether to re-soldering. Or use a high pressure air (compressor) so that peripherals completely clean of dust.

Remove and reinsert the peripheral sockets. This is to ensure a perfect connection to the connectors periphera. just once every PC maintenance.
Remember, Do not use liquid cleaning Contact Cleaner in peripheral connector sockets because of the way is wrong. Fluid Contact Cleaner is very difficult (very long) dry and it makes dust stick easily.

Notice how the installation of motherboard and other peripherals is there a screw is still lacking or lax. Complete and tighten the screw-couplers.

Customize the OS and Applications with the specifications of the computer and do not store data on the hard drive is too big. This will aggravate the performance of your PC

Make a hard drive partition that is proportional. For example 80GB Hard Disk Space Used C with no more than 5GB would be better if we created 3 partitions with 10GB for C, 35GB to 35GB for D and E. Accordingly with access to the System and data loading will be faster.

Do not use the PC for heavy games unless your computer is designed for the Game. If its maniac game, just use the Playstation.

Use appropriate and always Antivirus Update, in the presence of antiviral always update will alleviate or tips on how to care for computer maintenance computer or PC.

Use Air Conditioning to the PC or if not possible can be compensated by way of mounting Coolling Fan Extras when the processor is too high a temperature above 36 degrees Celsius. This happens especially on old computers.

At certain times do Defragment Hard Drive to rearrange the order of the files to your computers performance easier. But not too often ..!

Perform Reinstalling the OS and applications when necessary. Reinstallation thoroughly once in a year its no exaggeration to refresh the entire system. especially if we want a system upgrade. (Eg from XP-SP1 to XP-SP2 or XP-SP3)

Perform the removal or Remove data or application in which if not effectively (never used)

Frequently cleaning the Temporary files, Prefetch files, Chokies files and junk files in the Recycle Bin.

1. The steps to clean Prefetch File:

Log Explorer - Go to C: / Windows / Prefetch - Select All (Ctrl-A) - Dell

2. The steps to clean Temporary Files:

Log Explorer - Go to C: / Windows / Temp - Select All (Ctrl-A) - Dell

After these two steps above do not forget to clean the garbage file2 in the Recycle Bin by right-click the Recycle Bin - click Empty Recycle Bin - Click Yes

3. As for cleaning Chokies files you can use CCleaner Software

CCleaner Freeware Software

4. Using Utility Software for repairing your computer registry

Chokies file2 will appear whenever we connect to the internet. The more we often connect to the internet ... its a good browse, download or upload, the more files Chokiesnya. If you connect to the internet every day, clean the file Chokies at least once or twice a week.

Always Backup the data were deemed important, you can copy and paste on the CD. this is to anticipate at any time if exposed to a virus attack or fatal damage to the Hard Drive

Complete with UPS so that if a sudden power failure there is still time to save data and shutdown the computer

Do not let your computer too long unused (never turned on at all in a long time). At least a minimum of every day the computer is started about 1 s / d 2 hours. This is to warm the inside of the CPU so that the air free from moisture.

Do not expose your computer from shock, vibration and pounding especially when the computer is on, this is very dangerous because it can cause fatal damage

Do not hesitate to call a computer technician to perform maintenance on your computer, if you feel unable to do so.

Maintenance Computer or Computer Treatment in the above can be carried out regularly according to the condition of the computer and its environment. Usually computers that require immediate treatment have symptoms such as access starts to slow down, frequent jams / hangs, often scanning the C drive every time the computer is turned on, blue screen memory, applications often error or do not go according to their functions, and other things that lead users begin to feel uncomfortable with computer performance.

With the computer how to care for a total and expected performance of our computers regularly will always excellent and durable
Read More..

Rabu, 21 Agustus 2013

Disable DCOM support


The Distributed Component Object Model, or DCOM, is yet another feature that was built into Windows that has caused a great deal of problems. Sure, it provides an acceptable programming interface for programmers who are trying to write network apps, but there are better ways to do that than to use a DCOM.

DCOM has presented quite a few problems in terms of security. Exploits have been discovered for it that have allowed an Internet worm to spread to hundreds of thousands of Windows machines worldwide. Additionally, a very small number of applications actually use DCOM. In all of my computing experience, I have only seen one application that used DCOM, and that was an inventory and store management software suite. Home and professional PC users probably will never even use an application that uses DCOM.

So why is it on your computer? DCOM was one of Microsofts attempts to please software developers. However, this attempt has clearly failed, and yet they still include it. The only thing that it has given to operating systems such as Windows XP is headlines in the newspapers about how some worm exploited it and has now infected thousands of PCs.

Disabling the Distributed Component Object Model is a good idea for most computing users. That is, it is for everybody except the rare few who actually have an application that the developers wrote using DCOM. To shut down DCOM and increase the security of your computer, follow these steps:

1. Gibson Research has come up with another cool utility to take care of Windows security shortcomings. This one is called DCOM bobulator and will help you disable DCOM on your computer. Visit www.grc.com/dcom/ and download a copy.

2. Start up DCOM bobulator and click the tab labeled DCOM bobulator Me!

3. Click the Disable DCOM button.

4. Click the Exit button and you are finished.

If you find that you are forced to use a program that needs DCOM, just run the utility again and click the Enable DCOM button on the DCOM bobulator Me! tab.
Read More..

BES Battle Encoder Shirase to limit the CPU load

Some operations such as a video format conversion are quite heavy for the processor that is used intensively and for very long periods. This situation has at least two unfortunate consequences: the first is that the cooling fans whirling climb speed making us regret the silence of Blackbird, the second is that you want to do anything else at the same time be very slow. BES (Battle Encoder Shirase) is a program that can be useful in these circumstances going to limit the percentage of processor utilization absorbed by one or more processes . Lightweight and portable, BES is released under the GNU General Public License Version 2 and is compatible with Windows 2000/XP
Read More..

Selasa, 20 Agustus 2013

Move Xp Hard Drive to New PC


Really easy. But this only works if the original motherboard and harddrive still work. so put it back together. for newbies.

go to control panel > double-click the system icon > hardware tab and click device manager button. find the IDE ATA/ATAPI CONTROLLERS and expand the tab. not the primary or secondary controller, but right-click the first controller. choose update driver. choose the option to install from a list or specific location. click next. now choose the (dont search. I will choose the driver to install) option. click next. now highlight the Standard Dual Channel Pci Ide Controller. click next. the Standard controller will install. now reboot. log in. the standard controller is completely installed. you can now shutdown the computer, remove your harddrive, and it will boot with the new motherboard. ive done this 24 times on 12 different computers. it works.
Read More..

Senin, 19 Agustus 2013

7 Essential Marketing Rules For Twitter



Most 7 Essential Marketing Rules For Twitter.

1: Planning Matters

One of the best metaphors for Twitter is that its a bar. Unlike Facebook where you know interact with friends, on Twitter you can engage with almost anyone. There are millions of simultaneous conversations happening on thousands of topics. It can be overwhelming. It can also be enlightening.

The open nature of Twitter is what makes it so compelling as a potential tool for business. However, businesses that think they can create an account and start marketing on Twitter (or: spewing sales pitches) are in for a rude awakening. Not only will that strategy fail, the Twitter community could turn on the company and create a public relations nightmare for the business.

Marketing isnt about pushing products. Its about understanding market needs, analyzing competition, identifying the positioning sweet spot, building awareness and credibility, developing and supporting a community of loyal customers and more. Twitter can be used for any or all of these marketing objectives. In fact, one of Twitters unique strengths is its discovery capabilities.

What do you want to accomplish? What are your goals and how will you know that youre successful or going the right direction? You can start Rule #2 before having these fully completed, but you need to have your Twitter objectives nailed down before you start tweeting.

2: Listen First
Remember how we said Twitter is like a bar? How would people react if you walked into a bar (or coffee shop or other public place for socializing) and you started shouting about whatever was on your mind? Best case theyd ignore you. More likely, youd be thrown out - and maybe never allowed back.

The same applies on Twitter. Dont spam. Relevance is essential. The Twitter community is judge and jury. It can be difficult to recover from a bad reputation so its best not to get one in the first place.

If youre just getting started on Twitter, be sure to listen (read) for a while before you start posting or replying. Theres nothing wrong with being a voyeur. Even if youre already on Twitter, take a step back and just listen once in a while. Do it on a fairly regular basis. Twitter is evolving quickly.

So what are you listening for?

- What are the hot topics, most popular links from tweets, or most popular users?
- What are the types of tweets that get re-tweeted most?
- What are the users in your industry or target audience tweeting about?

3: Find Your Voice
When you were listening in the previous rule, you certainly noticed many different styles of tweets. If you didnt, you should go back and listen harder.

While there is no right or wrong answer for what your Twitter style or voice should be, there are definitely considerations to make before you start tweeting. You need to make sure that your voice is appropriate for the objectives that you are trying to achieve and the image that you want to portray. You should document the characteristics of your chosen voice and why they are important - this is especially useful if you will have more than one person tweeting for your organization or if you plan to hire ghost writers.

So what are the characteristics that you need to consider? One way to think about the characteristics of your Twitter voice is to map out several vectors with different extremes on each end then decide where your ideal position would be on each vector. For example, do you want your Twitter stream to be fully automated or fully manual? Professional or casual? Its unlikely that youll be at either extreme, but the vector will allow you to easily visualize your voice.

4: Look Alive
Creating an account on Twitter and leaving the default profile photo and background is a sure-fire way to show Twitter users that youre not serious about Twitter or the Twitter community as a whole. There is no excuse for not investing in the small effort that it takes to create a rich profile page and profile photo.

Have a designer create something that integrates well with the Twitter profile page. The Whole Foods and Zappos examples below should give you some ideas. Look at your competitors and do something better! If you dont have the skills in-house, there are plenty of freelance designers that can create something totally custom without spending much. Of course youll want to complete the profile information and include a URL - consider a specific landing page on your website.

There are several couple schools of thought on profile photos. For businesses, more and more logos are showing up. In our opinion, logos are not in the right spirit. Twitter provides a unique way for businesses to deliver a human touch. Our recommendation is to use a good quality, properly formatted photo if you can. There are many articles on the topic. Do a quick search to get more information and suggestions.

Now youre ready to promote your presence on Twitter. Promote your Twitter user name on your website, in email signatures, direct mail pieces, business cards, etc. If you are tweeting regularly, consider displaying them on your website or blog. There are plenty of tools that make it easy.

5: Grow Your Flock
Several strategies exist to help grow your flock on Twitter. Some are a bit controversial. Well save those for later. Hopefully we dont need to explain the benefits of having a lot of followers. The real question is, "Are you attracting the followers you need to get to your goals?"

Rule #4 covered the first step. Letting your existing customers and partners know how to find you on Twitter will get you some followers. The second strategy is to follow companies and individuals within your industry and/or region. Some will follow you in return. But there are other benefits.

Many tools look at the relationships between users (whos following whom) and make recommendations based on that information. As a result, following users with certain characteristics can actually help you attract followers. Genuine engagement (Rule #6) is also key to gain followers and builds off of the users you follow. Another totally acceptable way to gain followers is to follow interesting people. If you find someone who tweets interesting things related to your business, see who she follows, and follow her.

Auto-following users based on them following you or using third-party tools (some listed below) is where you start to get into a gray area. Tools are already starting to show up that look at the ratio of followers to friends for ranking and other purposes. Its probably not a good idea to get your ratio completely out of whack. "Follow many but dont auto-follow everyone" is probably the best approach.

6: Engage Genuinely
Look before you leap when it comes to Twitter. You are embarking on a journey. It cant be viewed as a one-time event. You have to nurture and support your efforts. If your initial level of activity begins to wane, your followers will notice and will feel a sense of abandonment. Start with a comfortable, sustainable level of engagement. Engagement on Twitter is like the inverse of product pricing - its easy to drop prices and easy to increase Twitter engagement, but doing the reverse is exponentially more difficult.

To get started, use search.twitter.com or another Twitter search method to see who is talking about you, your brand or a keyword related to your industry. Read up and then engage when you have something informative to say. If you are looking for your user name you can only see your replies in Twitter if someone starts a tweet with @(your twitter name) but sometimes people will put @yourname in the middle of their tweet. By searching "to:yourname" it will find any tweets that included your user name.

Using common sense combined with Rules 1-5, you should be in pretty good shape. The more time you spend on Twitter, the more efficient and effective youll get. Below are some tips gathered from various Twitter users around the web on how to optimize your Twitter time and avoid potential Twitter landmines:

- Clients like Tweetdeck and Twhirl make it a lot easier to manage Twitter and make you more efficient.
- Understand and use direct messages (DM) (private), replies (public) and re-tweets (RT) correctly.
- You dont have to read every tweet or reply to every DM, but dont ignore them all either.
- Use URL shortening tools like TinyURL, tr.im and others for cleaner tweets and more characters for you.
- Comment on others tweets and re-tweet what others have posted to build your place in the community.

7: Track Your Results
Once you have everything in motion, youll want to keep an eye on things to track your progress and to determine whether it makes sense to spend more (or less) time on Twitter. You can easily go overboard with measurements. Here are our recommendations on the must haves and the nice to haves.

In Rule #1 you set your Twitter objectives. What do you need to measure to make sure youre headed in the right direction? These are your key performance indicators or KPIs. Once you know what your KPIs are, youll be able to figure out what tools you need.

For example, if your goal is to get visitors to your website and to sell a product, youll want to know how many visitors are coming to the site from Twitter, how many of those visitors buy your product and how your conversion rate compares to visitors from other sources. Web analytics tools from Yahoo, Google and others (see Resources below) can get this information for you. Obviously this is simplified. Youll likely have multiple goals and more KPIs for each goal, but its important to understand what metrics you really need and why they are important - what do they tell you and how can you use that information? Youll need to track your KPIs on a regular basis and use them to make adjustments to your strategy as needed.

Conclusion
Twitter is changing the way people communicate and search for information and it hasnt even scratched the surface in terms of its potential reach and influence.

Twitter can be used for fast, effective and inexpensive research, customer support, public relations, lead generation and more - but your efforts will almost certainly backfire if you dont follow the explicit and unspoken policies in this vibrant and rapidly growing community.

Whether you are self-employed, a small business owner, a multi-national corporation or a government agency - a high-tech company, a manufacturer or a coffee shop, Twitter provides huge opportunities and risks.

Tweamr provides the research and tools to help maximize the opportunities and minimize the risks. An expanded version of this article is available as a free download from Tweamr.com. The expanded version includes additional examples, links to tools and checklists for each rule that businesses can use to quickly and effectively implement a Twitter marketing strategy.

Aaron is a senior technology manager in the Silicon Valley and, in his free time, manages a blog on Twitter marketing, Tweamr.com.

Founded by two senior Silicon Valley technology marketing and engineering managers, Tweamrs mission is to help organizations of any size harness the massive potential of Twitter to achieve their goals through research and by delivering information and tools.

We recognized the disruptive impact that Twitter was having on communications and we know that it will become a standard component of marketing plans for companies of any size in every industry, globally.
Read More..

Clearing Recently Viewed Documents List


Windows XP monitors all of the files that you open on your computer so it can construct the recently opened document list. This is designed to allow you to easily open up files that you have been working on. All types of documents are listed in this list. Every time you open up a Word document or a digital image, an entry is created within the list. Although this feature exists, I never find myself using it and the only value that it adds to my computer is a privacy concern.

Clearing the recently opened document list every once in a while is a good idea, so your documents are kept confidential and your privacy high. Clearing the list is very easy. Just follow these steps:

1. Right-click on Start button and select Properties.

2. Then click on Customize button next to the Start Menu radio button.

3. Once the Customize Start Menu window appears, click the Advanced tab.

4. Under the Recent Documents section, click the Clear List button.

5. Once you have cleared the list, click the OK button to close the Customize Start Menu window.
6. Then, click OK once more to close Taskbar and Start Menu Properties.
Read More..

Learning Wireless Security WEP Methods

WEP is a first standard security & encryption used on wireless, WEP (Wired Equivalent Privacy) is a method of securing a wireless network, also called Shared Key Authentication. Shared Key Authentication is the authentication method that requires the use of WEP. WEP encryption uses a key that is inserted (by the administrator) to a client or access point. This key must match from a given access point to the client, with the inserted client to authenticate to the access point.

Here is the process of Shared Key Authentication :

  • Client has asked the association to the access point, this step is the same as the Open System Authentication.
  • Access point sends challenge text to the client in a transparent manner.
  • Client will provide a response by encrypting the challenge text using the WEP key and sends back to the access point.
  • Responded to an access point client response, the access point will perform encryption decrypt the response from the client to verify that the challenge text is encrypted using the WEP key as appropriate. In this process, the access point will determine whether the client has given the corresponding WEP key. If the WEP key provided by the client are correct, then the access point will respond positively and immediately to client authentication. But if the client entered the WEP key is incorrect, then the access point will respond negatively and will not be given a client authentication. Thus, the client will not be authenticated and not associated.
Data communication via the IEEE 802.11, Shared Key Authentication is more secure than it seems from the Open System Authentication, but in reality are not. Shared Key instead opened the door for intruders or crackers. It is important to understand two streets used by WEP. WEP can be used to verify the identity of the client during the process of shared key authentication, but can also be used to decrypt data sent by the client via the access point.

WEP has many flaws, among others:
  • The problem of weak keys, RC4 algorithm used can be solved.
  • WEP uses a static key.
  • Problem of initialization vector (IV) WEP.
  • Message integrity problem Cyclic Redundancy Check (CRC-32).
WEP consists of two levels, namely 64-bit key, and 128 bits. Actually, the secret key on a 64 bit WEP key is only 40 bits, while 24bit is an Initialization Vector (IV). Similarly, the 128 bit WEP key, secret key consists of 104bit.

The attacks on WEP weaknesses include:
  • The attack on the weaknesses of the initialization vector (IV), often called the FMS attack. FMS stands for the name of the three inventors of the IV weakness Fluhrer, Mantin, and Shamir. This attack was done by collecting a weak IV as much as possible. The more weak IV is obtained, the sooner discovered the key that is used.
  • Getting a unique IV data obtained through the packet to be processed for WEP key cracking process more quickly. This method is called chopping attack, first discovered by h1kari. This technique only requires a unique IV thus reducing the need for IV are weak in WEP cracking.
Both of the above attacks require considerable time and packet, to shorten the time, the hackers usually do traffic injection. Traffic Injection is often done by collecting the ARP packet and then sends back to the access point. This resulted in the collection of initial vectors is easier and faster. Unlike the first and second, to attack traffic injection, required specification of tools and applications that start rarely found in stores, ranging from chipsets, firmware version, and versions of drivers, and not infrequently have to do patching of drivers and applications.
Read More..

Minggu, 18 Agustus 2013

Securing XP

1. NTFS Partition.
2. Disable Error Reporting
3. Disable Automatic Updates (only if your XP copy is pirated)
4. Disable "Recent Documents" Viewed
5. Setup XP Firewall
6. Setup screensaver password
7. Setup BIOS password
8. Setup "AfterBios" login password
9. Account Modifications
-Rename Admin Account
-Disable Guest Account
-Disable Help_Assistant Account
-Disable Support Account
10. Install a virus scanner.
11. Change Login Screen (default shows usernames)
12. Disable Remote Registry (and other services)
13. Disable/Change Auto-Search settings in IE.

1. NTFS Partition.
Be sure to install XP onto an NTFS partition so that you (the admin) can take advantage
of file permissions. You want this option so that "you" can decide who reads, writes,
executes what files.

If you didnt install XP onto an NTFS partition. Convert It. To convert to NTFS follow
the instructions below.

Open a command prompt and type "convert c: /FT:NTFS /v"
This command will convert your c: partition from FAT to NTFS in verbose mode.

2. Disable Error Reporting.
we dont want microsoft to know everytime we fuck up. especially if we didnt pay for winxp.

control panel > performance and maintenance > system > advanced > error reporting (disable all) right click "my computer" > manage > services and applications > services > " stop and disable" Error Reporting.

3. Disable automatic updates.
To update, they must know what we have. thats a NO NO!

NOTE: DO THIS ONLY IF YOUR COPY OF XP IS PIRATED!! I suggest "auto update" if your copy of XP is legal. If your copy is pirated then i suggest that you stay updated with the latest fixes and patches manually.

control panel > performance and maintenance > system > automatic updates (disable updates)

right click "my computer" > manage > services and applications > services > " stop and disable" Automatic Updates.

4. Disable "Recent Documents" Viewed.
Quit listing most recent documents opened under the start button.

control panel > appearance and themes > task bar and start menu > start menu >
customize > advanced

remove the checkmark next to "List my most recently opened documents".

5. Setup XP Firewall.
Before this change, i scanned my xp box and found it to have many ports wide open. After this change, I found nothing and xp logged the attempts in c:windowspfirewall.log.

control panel > network connections > right click "local area connection" > properties
> advanced > check the box under "Internet Connection Firewall" then choose "settings".

Services Tab - leave all unchecked unless there is a service you are running that people
must be able to access.

Logging Options - Log everything.

ICMP - I left all these unchecked for the time being. (allowing nothing)

(this does not protect you from "Spy Ware". This only stops traffic from coming into
your win-xp box (not all traffic). It does not stop traffic from going out.) If you
need to stop traffic from going out and need a more secure firewall then download a real
firewall like "zone alarm or black ice".

6. Setup screensaver password.
Setting a screensaver password incase you leave some of that secret pr0n open when you walk away.

right click on the desktop > properties > screen saver > check the box next to " On
Resume, Password Protect."

If you dont have a password set on your user account, you can do so in control panel >
user accounts > change account.

7. Setting a BIOS password.
We dont want anyone rebooting the computer or trying to sneak into our pr0n while we are away at school or work.

I cant explain to one how this is done due to the differences between all computers and
how the BIOS settings are entered. If you know what Im talking about then do it. If you
dont know what Im talking bout then learn how to do it. A screensaver password is useless
unless you setup a BIOS password.

8. Setting up the "AfterBios" password.
Sometimes bios passwords are easily cracked. This password will add extra local login security incase your bios pass is crax0red. I dont know bout you but i love having to type in 3 passwds and a username to login to my box.

Start > run > type "syskey" > choose "update" > choose "Password Startup" > enter a
password and choose ok.
9. Renaming and Disabling Accounts for adminstrator, guest, help_assistant and support.
Right click my_computer > manage > local users and groups
rename administrator account
disable guest account
disable help_assistant account
disable support account

10. Install Virus Protection.
Install a virus scanner. Your firewall might protect your system from unwanted hackers but
what about an unwanted virus or trojan?. I recommend installing a virus scanner such as
"Nortons" or "McAfee".

11. Change Default Login Screen.
Xp uses the "welcome screen" by default. This screen has the names of all accounts on the
system so that the user only has to click on their name and type a password. Come on now....
We arent that damn lazy. If we change this screen to the normal login, then prying eyes
will have to know a username and password to get in. Follow the instruction below to change
this.

control panel > user accounts > change the way users log on or off

uncheck the box next to "Use Welcome Screen" and choose "apply options".

12. Disable Remote Registry.right click "my computer" > manage > services and applications > services > " stop and disable" Remote Registry.

NOTE: disable any services running in this area that you arent using.

13. Disable/Change Auto-search in Internet Explorer.
This is not really a security risk but it is important to some people that prefer to keep their internet surfing to themselves and away from microsoft.

Open Internet Explorer > Click the "search" button > click the "customize" button > click
"autosearch settings" > FOLLOW INSTRUCTIONS BELOW...

DISABLE: In the "When Searching" drop down menu, select "Do not search from the address bar". > click "ok" > "ok". Type an invalid address in your address bar and see if it
takes you to the msn search page or if it gives a "page not found" error. In this
case, the "page not found" error is what we want.

CHANGE: If you wish not to disable, but you wish to change it to your favorite "google.com"
search page. Instead of following the "DISABLE" instructions, follow the instructions
below. Choose "Google Sites (or whatever you prefer)" from the "choose a search provider
to search from address bar" drop down menu > click "ok" > "ok"
Read More..

Top 10 Tips To Improve System Speed

1.Let your PC boot up completely before opening any applications.

2.Refresh the desktop after closing any application. This will remove any unused files from the RAM.

3.Do not set very large file size images as your wallpaper. Do not keep a wallpaper at all if your PC is low on RAM (less than 64 MB).

4.Do not clutter your Desktop with a lot of shortcuts. Each shortcut on the desktop uses up to 500 bytes of RAM

5.Empty the recycle bin regularly. The files are not really deleted from your hard drive until you empty the recycle bin.

6.Delete the temporary internet files regularly.

7.Defragment your hard drive once every two months. This will free up a lot of space on your hard drive and rearrange the files so that your applications run faster.

8.Always make two partitions in your hard drive. Install all large Softwares (like PSP, Photoshop, 3DS Max etc) in the second partition. Windows uses all the available empty space in C drive as virtual memory when your Computer RAM is full. Keep the C Drive as empty as possible.

9.When installing new Softwares disable the option of having a tray icon. The tray icons use up available RAM, and also slow down the booting of your PC. Also disable the option of starting the application automatically when the PC boots. You can disable these options later on also from the Tools or preferences menu in your application.

10. Protect your PC from dust. Dust causes the CPU cooling fan to jam and slow down thereby gradually heating your CPU and affecting the processing speed. Use compressed air to blow out any dust from the CPU. Never use vacuum.

RAM IS THE WORKING AREA (DESKTOP) OF THE CPU, KEEP IT AS EMPTY AND UNCLUTTERED AS POSSIBLE!
Read More..

How to use pen drive as RAM


Yes with some modified settings you can use your pen drive as a RAM

1) Connect your pen drive to your PC [pen drive should be at least 1 GB or if you having 4 GB then its better]

2) Allow PC what he is supposed to do,let system to detect pen drive.

3) After your PC finished with its detection work,you have to do some little

4) Right click on the My Computer and select the properties

5) Goto advanced and then performance setting then advanced then

6) Select pen drive and click on custom size " Check the value of space available "

7) Enter the same in the Initial and the Max columns

" You just used the memory of the PenDrive as a Virtual Memory "

8) Now restart your pc and enjoy your fast and super system
Read More..

Sabtu, 17 Agustus 2013

Configuring Windows firewall


Configuring the firewall to allow certain programs to work through it is not always the best thing to do, because it will expose your computer more to the outside world and increase your risk of getting infected with something. However, in the short term or for an application that you must use, you can make it work through the firewall. In the original version of the firewall, the only possibility was to specify a port number to open. Now, it is much easier to make an application work though the firewall. Instead of typing in a port number, users can just select the program on their computer that they want to have accessed through the firewall.

This capability makes the firewall configuration much more user-friendly. Additionally, in Service Pack 2, Microsoft left in the old way to open up the firewall manually by entering in a port number, so that users still have total control if they really want it. The end result of these two methods is the same; the only difference is the ease of use for less experienced Windows XP users.

Using the new feature to open up holes in the firewall is pretty cool. Follow these steps to open up the firewall for a specific application:

1. Open up Network Connections again by clicking the Start Menu and selecting Run. Then, type firewall.cpl in the box and click OK.

2. When the Windows Firewall settings window loads, click the Exceptions tab.

3. You will see a list of all of the different exceptions that are currently enabled, as signified by the check in the box. By default, a few applications will be enabled. I recommend that you uncheck all of the entries unless you use them. If not, then you are just taking an unnecessary risk by leaving those doors open.

4. If you want to add an application to the exception list so that it will be able to accept connections and data from the outside world, such as an Instant Message program that wants to receive files from other users, just click the Add Program button.

5. Select the name of the program from the list or click the Browse button on the Add a Program window to select the executable of the application that you want to open to the world.

6. When you are finished selecting the program that you want to be able to access through the firewall, click OK and it will appear on the list.

7. Now that the program is on the list, just check the box next to the name to open up the firewall for the application.

8. Click OK to activate your new firewall settings.

Windows Firewall also includes settings on how you want your computer to respond when several different standard Internet messages are sent to it. For example, one setting you can specify is the ping command, which is a network command used to estimate turnaround time between sending data to a computer and receiving a response. All of these settings are found on the Advanced tab by clicking the Settings button under the ICMP section. The screen is pretty straightforward. If you want your computer to have a stealth presence on the Web, as I mentioned earlier, you should uncheck all of the entries listed on the ICMP tab.
Read More..

History C

Before C + + is created, there is the C programming language created by Brian W. Kerighan and Dennis M. Ritchie about the year 1972. Ten years later, C + + was created by Bjarne Stroustrup, Bell Laboratories, AT & T, in 1983. This language is compatible with the language of his predecessor, C. At first C + + called "a better C". Before finally called C + +. This designation is given by Rick Mascitti in the summer of 1983. As for the + + operator comes from the name of raising the language C.

Privileges in C + + is that this language supports object-oriented programming (OOP: Object Oriented Programming). But still, C + + is a programming language that is a hybrid, not pure object-oriented language. Therefore, the C programming in the early stages can change lanes to C + + step by step.

Tujuan utama pembuatan bahasa pemrograman C++ adalah untuk meningkatkan produktivitas pemrograman dalam membuat aplikasi. Selain itu, C++ juga dapat mengurangi kekompleksitasan, terutama pada program besar yang terdiri dari 10.000 baris atau lebih.
Read More..

Xp Hidden APPS


To run any of these apps go to Start > Run and type the executable name (Eg. charmap.exe).

WINDOWS XP HIDDEN APPS:

1) Character Map = charmap.exe (very useful for finding unusual characters)

2) Disk Cleanup = cleanmgr.exe

3) Clipboard Viewer = clipbrd.exe (views contents of Windows clipboard)

4) Dr Watson = drwtsn32.exe (Troubleshooting tool)

5) DirectX diagnosis = dxdiag.exe (Diagnose & test DirectX, video & sound cards)

6) Private character editor = eudcedit.exe (allows creation or modification of characters)

7) IExpress Wizard = iexpress.exe (Create self-extracting / self-installing package)

8) Microsoft Synchronization Manager = mobsync.exe (appears to allow synchronization of files on the network for when working offline. Apparently undocumented).

9) Windows Media Player 5.1 = mplay32.exe (Retro version of Media Player, very basic).

10) ODBC Data Source Administrator = odbcad32.exe (something to do with databases)

11) Object Packager = packager.exe (to do with packaging objects for insertion in files, appears to have comprehensive help files).

12) System Monitor = perfmon.exe (very useful, highly configurable tool, tells you everything you ever wanted to know about any aspect of PC performance, for uber-geeks only )

13) Program Manager = progman.exe (Legacy Windows 3.x desktop shell).

14) Remote Access phone book = rasphone.exe (documentation is virtually non-existant).

15) Registry Editor = regedt32.exe [also regedit.exe] (for hacking the Windows Registry).

16) Network shared folder wizard = shrpubw.exe (creates shared folders on network).

17) File siganture verification tool = sigverif.exe

18) Volume Contro = sndvol32.exe (Ive included this for those people that lose it from the System Notification area).

19) System Configuration Editor = sysedit.exe (modify System.ini & Win.ini just like in Win98! ).

20) Syskey = syskey.exe (Secures XP Account database - use with care, its virtually undocumented but it appears to encrypt all passwords, Im not sure of the full implications).

21) Microsoft Telnet Client = telnet.exe

22) Driver Verifier Manager = verifier.exe (seems to be a utility for monitoring the actions of drivers, might be useful for people having driver problems. Undocumented).

23) Windows for Workgroups Chat = winchat.exe (appears to be an old NT utility to allow chat sessions over a LAN, help files available).

24) System configuration = msconfig.exe (can use to control starup programs)

25) gpedit.msc used to manage group policies, and permissions
Read More..

Speed Up Internet


Your computer slow down when you browse your local area network and connect to other computers that are sharing data? One of the most common causes of this slowdown is a feature of Windows Explorer that looks for scheduled tasks on remote computers. This effort can take some time on some computers and can really slow down your browsing. The window with which you are browsing the network may appear to freeze momentarily, as the system is waiting for a response from the remote computer.

Windows XP: Speeding Disk Access

Although this problem is a complex one, the solution is very simple. Instead of having to wait for the remote scheduled tasks, which is useless information to anyone who is not a system administrator remotely configuring scheduled tasks, you can disable this feature.

In order to do this, you will have to change the System Registry and delete a reference to a key so that this feature will not be loaded. To do this, follow these steps:

1. Open up the Registry Editor by clicking the Start Menu and selecting Run. Then type regedit in the text box and click the OK button.

2. Once the Registry Editor has loaded, expand the HKEY_LOCAL_MACHINE key.

3. Next, expand Software and then Microsoft.

4. Locate Windows and expand that as well.

5. You will want to be editing the main system files, so expand CurrentVersion.

6. Because this feature is a feature of the Windows component known as Explorer, expand the Explorer key.

7. Next, you will want to modify the remote computer settings, so expand the RemoteComputer key and then expand the NameSpace key to show all of the features that are enabled when you browse to a remote computer.

8. In the NameSpace folder you will find two entries. One is "{2227A280-3AEA-1069-A2DE-08002B30309D}" which tells Explorer to show printers shared on the remote machine. The other, "{D6277990-4C6A-11CF-8D87-00AA0060F5BF}," tells Explorer to show remote scheduled tasks. This is the one that you should delete. This can be done by right-clicking the name of the key and selecting Delete.

Tip:
If you have no use for viewing remote shared printers and are really only interested in shared files, consider deleting the printers key, "{2227A280-3AEA-1069-A2DE-08002B30309D}", as well. This will also boost your browsing speed.

Once you have deleted the key, you just need to restart and the changes will be in effect. Now your network computer browsing will be without needless delays.
Read More..

Jumat, 16 Agustus 2013

Array in PHP

In many Web applications, often we need a variable that can store multiple values at once in an organized manner, so that next time we can recover these values with ease and in a regular and well organized. No, not the database that I mean, as I was talking to a variable, and the database is not a variable. Why is this so important? Because in most cases we only need a store of value as well-organized, and the database is very expensive to do so. Think about connections, queries, and so on that will slow down the process when we use the database. This is where we need the array, a type of variable that can store multiple values at once even in different types of well-organized. Thus, in any programming language including PHP course you will always find an array as one of the types of variables. array is powerful.

What and Why

Arrays in PHP are a special type of variable, because the array we can access a set of values using a single variable name. The mechanism is arranged in the form of accessing the mapping of a set of values to a set of keys or indices. For example, the array variable $programer can map 1, 2 and 3 respectively to the "aaaaaa" "bbbbbb" and "cccccc, so it can be expressed as:

$programmer[1] = "aaaaaa";
$programmer[2] = "bbbbbb";
$programmer[3] = "cccccc";

where the expression 1, 2 and 3 is the index, while "aaaaaa" "bbbbbb" and "cccccc" are values.

$programmer_1 = "aaaaaa";
$programmer_2 = "bbbbbb";
$programmer_3 = "cccccc";
$cracker_1 = "dddddd";
$cracker_2 = "eeeeee";
$cracker_3 = "ffffff";

If we needed to print six of these data, it can be used in the following ways:

print "Name Programmer No 1: $programmer_1 <br>";
print "Name Programmer No 2: $programmer_2 <br>";
print "Name Programmer No 3: $programmer_3 <br>";
print "Name Cracker No 1: $cracker_1 <br>";
print "Name Cracker No 2: $cracker_2 <br>";
print "Name Cracker No 3: $cracker_3 <br>";

This method may be effective but unfortunately far from efficient. Why? because if the amount of data programmer and cracker on top of up to tens or even hundreds, then imagine how much you have to type the command. Not to mention, the webserver must do the parsing of hundreds of lines that will slow down the whole process. With an array, you can do better on the effective and efficient. 900 For example, a data programmer and cracker. How short, simple, but powerful. In addition, many PHP functions to manipulate arrays make the variable type is very helpful to our work in creating web applications. You simply perform the iteration as follows:

for ($k=0;$k<900;$k++)
{
print "Nama hacker ke $k: $hacker[$k] <br>";
}

for ($k=0;$k<900;$k++)
{
print "Nama cracker ke $k: $cracker[$k] <br>";
}

We will discuss some PHP functions to manipulate arrays in the next section.

Read More..

Max Windows XP Speed

Following this step for windows xp max speed

1.) Following is a registry containing a few registry modifications, which are completely safe and can increase the performance of Windows. Just download the attached ZIP file, extract it and then run the file:

Tweak Windows XP

Restore Default Settings (Use this file if you want to restore default Windows settings)

2.) Right-click on Desktop and select Properties, Now in the new window goto Appearance tab and click on Effects button. Now in the new opened window uncheck the following options:

a.) Use the following transition effect for menus & tooltips.
b.) Show shadows under menus.
c.) Show window contents while dragging. (you may remain this option checked as I hv in my screenshot. It depends upon ur choice.)
d.) Use the following method to smooth edges of screen fonts. You may select “Standard” for this. I hv selected “Clear Type” coz I hv a TFT, it doesnt work properly for CRT monitors.

3.) Right-click on My Computer icon on Desktop and select Properties (or press key + key), now goto Advanced tab in new window and click on Settings button in Performance section:

Now disable all unnecessary options in Visual Effects tab, you can remain following options enabled according to your requirements:

a.) Show window contents while dragging.
b.) Smooth edges of screen fonts.
c.) Use common tasks in folders (If u use the left side pane in My computer, I don’t use it.)
d.) Use drop shadows on icon labels on the desktop. (to make the desktop icons label transparent.)
e.) Use visual styles on windows and buttons. (If u use XP themes.)

4.) Open Tools -> Folder Options and click on View tab:

Now uncheck following options:

a.) Automatically search for network folders & printers.
b.) Display file size information in folder tips.
c.) Display simple folder view in Explorer’s Folders list.
d.) Show encrypted or compressed NTFS files in color.
e.) Show pop-up description for folder and desktop icons.
f.) Use simple file sharing.

Other options don’t affect the system performance. You can enable/disable them according to your requirements.

5.) Right-click on My Computer icon on Desktop and select Manage (You can also open it by typing services.msc in RUN and press Enter). Now goto Services & Applications -> Services. Here you can set a few unnecessary services to Manual, which will not start with windows and will decrease the boot time and will increase system performance. Please follow the following tutorial to know about which services can be safely set to MANUAL:

Windows XP Services that can be Safely set to MANUAL

6.) Type msconfig in RUN and press Enter. Now goto Startup tab and deselect the unnecessary entries, which you don’t want to start automatically with Windows, e.g. you can disable VGA driver utility, Sound Card utility, etc to speed up the startup time and to increase system performance.

7.) Open Sound & Audio Devices in Control Panel (or type mmsys.cpl in RUN), goto Sounds tab and select No Sounds in Sound Scheme section. Or you can remain some of your favorite sounds but set Exit Windows, Start Windows, Windows Logoff, Windows Logon to (None).

8.) For more options/tips-n-tricks, you can use TweakUI, Tuneup Utilities 2006 and gpedit.msc (Windows XP Professional built-in tool).
Read More..

Removing Stored User Name and Password in Mozila Firefox


When you visit a Web site that requires authentication or attempt to connect to remote computers, you are given the option to save your password so that the next time you visit the page or attempt to access a remote resource, you do not have to reenter your password. This feature can be a huge convenience, especially if you access a particular Web site or resource frequently. The downside to this convenience is the potential for horrible security and privacy problems. Essentially, you are taking the password off all of the sites and resources for which you saved a password. Anyone who has physical access to your computer can get in using your username and password, even if they do not know your password.

1. Open Mozila Firefox.

2
. C
lick on Tools -> options -> Security -> Seved Passwords -> Show Passwords -> Yes.

3. The Stored User Names and Passwords window will load, showing you a list of all of the accounts that are saved on your computer.

4. To remove a saved password, select the account on the list and click the Remove
button.

5. Repeat the previous steps for any other accounts that you want to remove.

6. When you are finished, just click Close.

You can also use the Stored User Names and Passwords window to add more user names and passwords to your computer.
Read More..

Kamis, 15 Agustus 2013

Burn image Files

How to Burn image Files with Nero?

1. Install Nero.

2. Insert Blank CD.

3. Open it, choose what is the storage type you gonna use to burn the image, or is a CD or a DVD.

4. Go to Copy and Backup > Burn Image to Disc.

5. Choose the image you want to burn > Next.

6. Done.
Read More..

Hard Drives not opened directly

Image of a Western Digital 250Gb SATA Hard Dri...Image via Wikipedia
This type of problem occurs when you authorize some programs (while downloading files from the internet without knowing what will it do), which will try to amend your system files. They maliciously entered and then over write your system files to run such programs at start-up. Even if you found the
program & delete it, which is creating all this mess. It will remain their after the deletion of such files (programs).
You need to thorough check on the system because it would might spread the virus to the whole system and damage your data, precious files & programs (Installed at your PC). It is also possible due to the virus, which is directing you to open such program, which will corrupt your computers hard drives or the directories of the drives.
In order to make your PC safer, faster & work smoother youll need an Anti-virus program to be installed properly. Youll also need some other security softwares like Anti-spyware, internet security, Anti-phishing and more relevant to your needs. Try to install compatible Anti-virus software bundled with other utilities which will protect your PC and personal data & identity.
Suggestion: Try to run the software "Ace utilities" or like wise, which will show you the running programs (start-up)and try to un-check the programs which are not required at start-up. I will add some more suggestions if you will Mention the OS and your system (PC make & model) clearly in the comments. So, I will guide you to solve the computer problem with Hard Drives or else.
Enhanced by Zemanta
Read More..

How to Watch Satellite TV on PC



In today’s digital world, technology has continued to grow and advance. This is what adds a new dimension to the world of entertainment. Technology has its major impact on the world of entertainment. Watch TV online right on your personal computer or laptop which has made it quite easier over the recent years. Free TV online is a reality which has brought a new wave to the world of entertainment.





This is recognized as a PC or computer TV card, in short PCTV card. Here are two types obtainable in the market for sale. One requires you to really install it within your PC while the extra can be just plugged into the USB port of the PC. With most people acquiring the high speed internet connection over broadband, individuals have been given the option to entertain themselves while in workstations or in leisure. Just imagine, you dont need any wiring, no hardware installation to get started with free TV channels online





The PCTV card uses your PC infrastructure to decode the satellite TV signals consequently that you can create to watch satellite TV on computer. With the help of the easy and simple downloading instructions, you can easily start with the free entertainment. The satellite TV signals are basically termed as Free-To-Air or FTA TV signals. Satellite TV stations show their TV programs via FTA which are unencrypted for public viewing, if you have broadband connection, you just need to follow the easy to download instructions which will just takes minutes to get you started with the satellite TV over PC.





Though, in order to watch satellite TV on computer, please take note of the PC hardware and OS necessities and compatibility of these cards with your PC. After the installation of the PCTV software in your own computer, you will get one well-organized and a user-friendly interface on the window, including various small menus as well as control buttons all around it.





The satellite television software is a lot compatible to all the Windows versions, UNIX and LINUX to list a few, it is favored that your PC is using a least Pentium II 333 MHz processor and your OS should perfectly be either Windows ME, 98, 2000 or XP. Extra peripherals that can enhance your viewing knowledge are a superior sound card, video graphics card, speakers and PC theatre scheme.





Cable TV tends to be nicely-received in built-up areas considering that it is not affected by terrains and weather. Nevertheless, in places wherever cable know-how has not arrived at, this sort of as rural areas or some suburban districts, satellite TV is their selection. In actuality, you can set up a satellite dish program to observe satellite Television on your Television from any element of the earth so it has a around the world appeal. Exactly where you can have World Wide Web entry, you can watch satellite TV on PC easily.





No monthly bills or membership fee is charged and you can work from any part of the world, while on a move, or while relaxing as long as you have the Internet access.



Visit More Info..... http://www.satellitedirect.com

Read More..

Learning SDL Simple DirectMedia Layer

Easy Learn Computer - SDL
Simple DirectMedia Layer (SDL) library is a free cross-platform multimedia, written in C, which creates an abstraction layer on top of various software platforms, graphics and sound and thus can control the video, digital audio, CD-ROM drive, sound, string, load sharing of objects, timer and network.

This abstraction allows programmers to write multimedia applications once and run on many operating systems: the official version supports Linux, Windows, BeOS, MacOS and Mac OS X, FreeBSD, OpenBSD, BSD / OS, Solaris, IRIX, and QNX source code, but does not offer official support for Windows CE, AmigaOS, Dreamcast, Atari, NetBSD, AIX, OSF/Tru64, RISC OS, and SymbianOS.

The history.
Sam Lantinga created the library, originally released in early 1998, while working for Loki Software. It occurred to him when he took the application from Windows to Macintosh. He used to bring Doom SDL under BeOS (see the Doom source ports). Some other free libraries seem to be working with SDL, OpenAL, and SMPEG it.

The library has a link to almost any existing programming language from the euphoria of the popular C + +, Perl, Python (via pygame), Pascal conosiuti less like or pliable. That and the fact that it is licensed under the LGPL, SDL is a common choice for multimedia applications.

SDL itself is very simple: It only works as a wrapper that provides a lightweight, multi-platform support for 2D operations on pixels, sound, file access, event handling, timers, threads, and much more. It is often used as a supplement to the OpenGL graphics output settings and provide input mouse and keyboard, which is beyond the scope of OpenGL.

The library is divided into several subsystems, such as video nominees (both surface and function to handle OpenGL), Audio, CD-ROM, joystick and timer subsystem. Apart from the basic low-level support, there are several libraries that provide additional functionality official support. These include the "standard library" provided on the official website and incorporated into official documentation:

* SDL_image - support for multiple image formats
* SDL_mixer - complex audio functions, especially for sound mixing
* SDL_net - network support
* SDL_ttf - support for TrueType font rendering
* SDL_rtf - Render simple Rich Text Format

SDL has the word "layer" in the title because it really is a wrapper function through a specific operating system. The main goal of the SDL is to provide a common framework to access this feature.
For the SDL is designed as a bunch of source code is divided into separate modules for each operating system in order to make calls to the underlying operating system. When SDL is compiled, the correct form selected for the appropriate operating system.

In Microsoft Windows, SDL provides a wrapper for DirectX, which in turn is a wrapper for the driver. DirectX version 5 using SDL, but SDL 1.2 (current stable release) requires DirectX 7 by default. Sam Lantinga has begun plans to use DirectX 8 in future releases of SDL [1].

On the X11 platform, including Linux, SDL Xlib is used to communicate with X11 graphics for the event.

In Mac OS X uses Quartz SDL.

Subsystem and syntax.

The syntax of the SDL is based on the function, all transactions made in the SDL run by passing parameters to functions. Special facilities are also used to store specific information that you need to use SDL. There are different SDL subsystems to characterize the function below:

* The video subsystem, events and threads - this provides management functionality for video, multi-threading, and events.
* Audio subsystem - provides audio capability.
* Timer Subsystem
* Subsystem joystick
* CD-ROM Subsystem
Read More..

Saying no to Encrypted Web Pages in Internet Explorer


If you manage your finances or shop online, then you have probably had experience with using secure Web connections, otherwise known as SSL. These secure connections encrypt the data that is transferred from a Web server to your computer. Once the data gets to your computer, your browser has a special key that decrypts the information and displays it on your computer. During this process, when the file is decrypted, it is saved in the Temporary Internet Files
directory so that the browser can display it.

This default appears to be harmless because the Web page is only saved on your computer. If no one has remote access to your computer, the data would be safe, right? Not necessarily, because your data is now vulnerable to anyone who has physical local access to your computer. If that person is clever and lucky enough, he or she can sort through your Temporary Internet Files directory to find confidential information, such as your online banking information. All of this information is saved by default on your hard drive for anyone to look at. They do not even need to know your password or even log into your account on the banks Web site, because a snapshot of the Web page is stored locally on your computer.

What can you do to protect your computer from this vulnerability besides setting up better computer security such as complex passwords? There is a cool feature of Internet Explorer that you just have to turn on that will eliminate the problem completely. Simply called Do Not Save Encrypted Pages to Disk, this feature, when enabled, will solve your problems. To enable it, follow these steps:

1. Open Internet Explorer.

2. Click Tools and select Internet Options.

3. Then, select the Advanced tab.

4. Scroll down through the list toward the bottom of the window until you see the Security section.

5. Locate Do Not Save Encrypted Pages to Disk, and check the box to the left of it.

6. Click OK to save and activate your changes.

Now you will no longer have to worry about pages that were encrypted being saved to your drive for anyone who has access to your computer to see.
Read More..

Rabu, 14 Agustus 2013

Clearing visited Web sites history


Internet Explorer, by default, is configured to record all of the Web sites that you visit for a 30-day period. If you are concerned about your privacy, your browsing history should be cleaned frequently and history settings configured best for privacy. Doing so will ensure that any user of your computer will not be able to easily see what you have been doing. Keep in mind, however, that if you get rid of the browser history, you will eliminate the ability to use the history to go back to Web sites for which you might have forgotten the URL.

That use is really the only reason I can think of that makes the browser history useful. If you can live without that convenience, then follow these steps to clear your history from your PC:

1. Open up a copy of Internet Explorer by using either the icon on the desktop or on the Start panel.

2. Once Internet Explorer is open, click the Tools menu bar item and select Internet Options.

3. Then, just click the Clear History button.

4. Your history will now be cleared. Because you still have Internet Options open on your screen, adjust the amount of days that your browsing history is stored.

5. As mentioned earlier, the default setting for this value is normally 30 days. Highlight the number in the days to keep pages in history box and type in 0 to maximize your privacy.

6. Then, click OK to save your changes and exit the Internet Options screen.

After you have cleared your browser history and modified the history setting, your privacy will be much easier to protect.
Read More..

Facebook for all according to Vodafone

The Blue Vodafone aims to fulfill a very specific task: to allow mobile access to Facebook in the most immediate way possible, even to those who are unaccustomed to using a smartphone. The price of 79 euros including VAT appear to be targeting this product especially to the young, the Blue Vodafone is indeed the solution for Facebook currently cheaper than available today. The messaging is typically the ideal ground for this model, which has a QWERTY keyboard is fairly effective. Blue is the result of a joint development between Vodafone Italy and Facebook, that developed in a phone fully integrated with the structure and functions of the popular social networks.

Your profile is available just turned the phone and it remains visible on the home screen. The operating system, in Italian, is the owner, you can only install applications in Java.
The frame is compact, despite the full keyboard, and the materials are robust. The thickness of only 12 mm makes it possible to easily carry the phone in his trouser pockets. The keyboard is well designed, has rows of spaced keys and typing is fast enough. A programmable button can be associated with different functions. Just below the display is a small optical trackpad for navigation help.

The Blue Vodafone keeps its promises: the use of Facebook is very intuitive and the hardest part is probably the inclusion of your username / password the first time you turn on your phone. The notifications of status updates and messages are automated, or you can configure the programmable key to do the update manually.

Apart from the simplicity and cost, the Blue Vodafone has other advantages. Indeed, it has very limited features and functionality. The lack of 3G connectivity and Wi-Fi is felt much, making the viewing of streaming video (often found on the pages of their friends) very difficult. The camera returns 2 Mpixel color washed out and lacking contrast, the videos are recorded at low resolution and framerate low. For Web browsing is the Opera Mini browser, but only 200 MHz processor makes a lot of trouble with complex pages. He is better with music, thanks to the integrated MP3 player, FM radio and the ability to add a Micro SD card on which to store the songs.

The lack of advanced sensors and connectivity (Bluetooth is present and the only micro-USB port, but lacks the data cable in the package) is reflected positively on the life of the battery, you can easily gain the day of use.
The Blue Vodafone may just be good to those who only plan to use Facebook, check emails and listen to music, for all others it is better to spend a few tens of euros more and adopt the Smart, a real Android smartphone offered far more powerful and complete always from Vodafone to 99 Euro VAT included.
Read More..