Ads 468x60px

Pages

Kamis, 22 Agustus 2013

Simple Way Maintenance Your Computer

Maintenance Computer or Computer Care, especially the CPU will usually only be done after the complaint or damage, it is less precise. Computer maintenance should be performed regularly both on the CPU and the monitor. Actually there are some fundamental things that we often forget to do with how to care for a computer or a computer or a PC maintenance...
Read More..

Rabu, 21 Agustus 2013

Disable DCOM support

The Distributed Component Object Model, or DCOM, is yet another feature that was built into Windows that has caused a great deal of problems. Sure, it provides an acceptable programming interface for programmers who are trying to write network apps, but there are better ways to do that than to use a DCOM.DCOM has presented quite a few problems in terms...
Read More..

BES Battle Encoder Shirase to limit the CPU load

Some operations such as a video format conversion are quite heavy for the processor that is used intensively and for very long periods. This situation has at least two unfortunate consequences: the first is that the cooling fans whirling climb speed making us regret the silence of Blackbird, the second is that you want to do anything else at the same...
Read More..

Selasa, 20 Agustus 2013

Move Xp Hard Drive to New PC

Really easy. But this only works if the original motherboard and harddrive still work. so put it back together. for newbies.go to control panel > double-click the system icon > hardware tab and click device manager button. find the IDE ATA/ATAPI CONTROLLERS and expand the tab. not the primary or secondary controller, but right-click the first...
Read More..

Senin, 19 Agustus 2013

7 Essential Marketing Rules For Twitter

Most 7 Essential Marketing Rules For Twitter.1: Planning MattersOne of the best metaphors for Twitter is that its a bar. Unlike Facebook where you know interact with friends, on Twitter you can engage with almost anyone. There are millions of simultaneous conversations happening on thousands of topics. It can be overwhelming. It can also be enlightening.The...
Read More..

Clearing Recently Viewed Documents List

Windows XP monitors all of the files that you open on your computer so it can construct the recently opened document list. This is designed to allow you to easily open up files that you have been working on. All types of documents are listed in this list. Every time you open up a Word document or a digital image, an entry is created within the list....
Read More..

Learning Wireless Security WEP Methods

WEP is a first standard security & encryption used on wireless, WEP (Wired Equivalent Privacy) is a method of securing a wireless network, also called Shared Key Authentication. Shared Key Authentication is the authentication method that requires the use of WEP. WEP encryption uses a key that is inserted (by the administrator) to a client or access...
Read More..

Minggu, 18 Agustus 2013

Securing XP

1. NTFS Partition.2. Disable Error Reporting3. Disable Automatic Updates (only if your XP copy is pirated)4. Disable "Recent Documents" Viewed5. Setup XP Firewall6. Setup screensaver password7. Setup BIOS password8. Setup "AfterBios" login password9. Account Modifications-Rename Admin Account-Disable Guest Account-Disable Help_Assistant Account-Disable...
Read More..

Top 10 Tips To Improve System Speed

1.Let your PC boot up completely before opening any applications.2.Refresh the desktop after closing any application. This will remove any unused files from the RAM.3.Do not set very large file size images as your wallpaper. Do not keep a wallpaper at all if your PC is low on RAM (less than 64 MB).4.Do not clutter your Desktop with a lot of shortcuts....
Read More..

How to use pen drive as RAM

Yes with some modified settings you can use your pen drive as a RAM1) Connect your pen drive to your PC [pen drive should be at least 1 GB or if you having 4 GB then its better]2) Allow PC what he is supposed to do,let system to detect pen drive.3) After your PC finished with its detection work,you have to do some little4) Right click on the My Computer...
Read More..

Sabtu, 17 Agustus 2013

Configuring Windows firewall

Configuring the firewall to allow certain programs to work through it is not always the best thing to do, because it will expose your computer more to the outside world and increase your risk of getting infected with something. However, in the short term or for an application that you must use, you can make it work through the firewall. In the original...
Read More..

History C

Before C + + is created, there is the C programming language created by Brian W. Kerighan and Dennis M. Ritchie about the year 1972. Ten years later, C + + was created by Bjarne Stroustrup, Bell Laboratories, AT & T, in 1983. This language is compatible with the language of his predecessor, C. At first C + + called "a better C". Before finally...
Read More..

Xp Hidden APPS

To run any of these apps go to Start > Run and type the executable name (Eg. charmap.exe).WINDOWS XP HIDDEN APPS:1) Character Map = charmap.exe (very useful for finding unusual characters)2) Disk Cleanup = cleanmgr.exe3) Clipboard Viewer = clipbrd.exe (views contents of Windows clipboard)4) Dr Watson = drwtsn32.exe (Troubleshooting tool)5) DirectX...
Read More..

Speed Up Internet

Your computer slow down when you browse your local area network and connect to other computers that are sharing data? One of the most common causes of this slowdown is a feature of Windows Explorer that looks for scheduled tasks on remote computers. This effort can take some time on some computers and can really slow down your browsing. The window...
Read More..

Jumat, 16 Agustus 2013

Array in PHP

In many Web applications, often we need a variable that can store multiple values at once in an organized manner, so that next time we can recover these values with ease and in a regular and well organized. No, not the database that I mean, as I was talking to a variable, and the database is not a variable. Why is this so important? Because in most...
Read More..

Max Windows XP Speed

Following this step for windows xp max speed1.) Following is a registry containing a few registry modifications, which are completely safe and can increase the performance of Windows. Just download the attached ZIP file, extract it and then run the file:Tweak Windows XPRestore Default Settings (Use this file if you want to restore default Windows settings)2.)...
Read More..

Removing Stored User Name and Password in Mozila Firefox

When you visit a Web site that requires authentication or attempt to connect to remote computers, you are given the option to save your password so that the next time you visit the page or attempt to access a remote resource, you do not have to reenter your password. This feature can be a huge convenience, especially if you access a particular Web...
Read More..

Kamis, 15 Agustus 2013

Burn image Files

How to Burn image Files with Nero?1. Install Nero.2. Insert Blank CD.3. Open it, choose what is the storage type you gonna use to burn the image, or is a CD or a DVD.4. Go to Copy and Backup > Burn Image to Disc.5. Choose the image you want to burn > Next.6. Do...
Read More..

Hard Drives not opened directly

Image via WikipediaThis type of problem occurs when you authorize some programs (while downloading files from the internet without knowing what will it do), which will try to amend your system files. They maliciously entered and then over write your system files to run such programs at start-up. Even if you found the program & delete it, which...
Read More..

How to Watch Satellite TV on PC

In today’s digital world, technology has continued to grow and advance. This is what adds a new dimension to the world of entertainment. Technology has its major impact on the world of entertainment. Watch TV online right on your personal computer or laptop which has made it quite easier over the recent years. Free TV online is a reality which has...
Read More..

Learning SDL Simple DirectMedia Layer

Simple DirectMedia Layer (SDL) library is a free cross-platform multimedia, written in C, which creates an abstraction layer on top of various software platforms, graphics and sound and thus can control the video, digital audio, CD-ROM drive, sound, string, load sharing of objects, timer and network.This abstraction allows programmers to write multimedia...
Read More..

Saying no to Encrypted Web Pages in Internet Explorer

If you manage your finances or shop online, then you have probably had experience with using secure Web connections, otherwise known as SSL. These secure connections encrypt the data that is transferred from a Web server to your computer. Once the data gets to your computer, your browser has a special key that decrypts the information and displays...
Read More..

Rabu, 14 Agustus 2013

Clearing visited Web sites history

Internet Explorer, by default, is configured to record all of the Web sites that you visit for a 30-day period. If you are concerned about your privacy, your browsing history should be cleaned frequently and history settings configured best for privacy. Doing so will ensure that any user of your computer will not be able to easily see what you have...
Read More..

Facebook for all according to Vodafone

The Blue Vodafone aims to fulfill a very specific task: to allow mobile access to Facebook in the most immediate way possible, even to those who are unaccustomed to using a smartphone. The price of 79 euros including VAT appear to be targeting this product especially to the young, the Blue Vodafone is indeed the solution for Facebook currently cheaper...
Read More..