Sunday, July 10, 2011

How to Speed ​​Up Browsing In Network

Speed ​​up browsing on the network that will be discussed this time that speed up browsing your computer when you access or open "My Network Places". My network places is useful to see other computers on the network that is connected through a LAN or local area network "as an example in which an office computer or resourcenya in sharing data. You need to know to display a computer or a resource shared by our computers through my network places can require considerable time, less than about 40 seconds or 1 minute and even more, depending on the specifications of each computer.

The cause of the length of time needed because the computer will do a "Scheduled Tasks " first performed prior to the destination computer resource on the share register on the computer. This process takes a long time to access my network places. But you can speed it up with a few settings from the registry editor. For now I apply the following way in Windows XP operating system, for other operating systems will follow.

How to speed up the process of network
Make a reduction in the time required by the system to check the scheduled tasks, by editing the following registry editor.

* Click the Start menu | Run | regedit typing | hit enter
* Open the key "HKEY_LOCAL_MACHINE | SOFTWARE | Microsoft | Windows | Current Version | explorer | remote computer | name space".
* Find a key {06277990-4C6A-11CF-8D87-00AA0060F5BF}, delete the key.
* Close the registry editor and restart your computer.

After your computer restarts, then you are able to do browsing on the network with a shorter time, because when you open My Network Places, the system is no longer to check the scheduled tasks.

Shortcut Ink overcome the virus, Microsoft, Applications and New Folder

Lately ,the users computer / Notebook / Laptop, especially those using Windows XP shortcut Inkdipusingkan virus by the presence of virus / malware which constantly make a duplicate folder or new folder microsoft, applications, music and more. Worse yet ... foder-folders can not be diDEL or if terDEL, if you click on a folder ..., then the folders appear again.
Tutorial below hopefully can help overcome the problems that her computer got a virus / malware shortcut folder ... lnk harry potter, microsoft, new folders and so on.
According to the hypothesis of how the virus / malware is as follows:

* Virus / malware this will put the files database.mdb, Thumb.db, Autorun.inf, shortcut folder harry potter .... Lnk, folder shortcut microsoft, new folders and shortcuts pd my document folder.
* Virus / Malware This will activate the file wscript.exe and Thumb.db file located in system32 folder, the folder window to run the file database.mdb on my document.
* Shortcut folders'd be associated with the file Thumb.db.
* If you open the shortcut folders before it will activate the wscript.exe file and folder shortcuts Thumb.db files that exist on your computer, Thumb.db file and the file autorun.inf in all drives C. If your computer is infected with the virus / malware is the entire C drive on your computer will have duplicate an existing shortcut folder on your computer, Thumb.db file and the file autorun.inf. It will also scan drives A, CD ROM, flash and your network as a medium for distributing viruses / malware. and will create a duplicate

There are 2 ways to mengDEL virus:

1. By using the updated antivirus.

Antivirus which can recognize the virus (I only had 3 antivirus), namely: 1. AVG: detected as VBS Worm. AVG will mengDEL all shortcut duplicate folders and files was the primary virus. 2. Norton Antivirus 2009: detected as VBS Runauto. Norton will mengDEL Thumb.db files in all drives C. You can mengDEL Autorun.inf file and folder shortcuts all the duplicates manually. 3. Avira Antivir Premium: DR/Agent.JP.4 detect it as malware. Antivir will mengDEL Thumb.db files on all drives C. You can mengDEL Autorun.inf file and folder shortcuts all the duplicates manually.

2. With the manual method.

1. Turn off System Restore.

2. Turn off the virus using tools CProcess wscript.exe / CurrProcess (you can DownLoad via google). Run CProcess, search the name wscript.exe process tab then right click and click the kill selected procesess.

3. Open windows explorer, click tools menu option, folder option, view, click show hidden files and folders, click / DEL, check the Hide extensions for known file types and Hide protected operating system files.Klik OK.

4. Go to your documents. DEL database.mdb file.

5. Click the Search button. Click All Files and Folders. in the All or part of the file name type: Thumb.db, pd click the Look in my computer. DEL all the files which have been found. Repeat the steps above and DEL all the files which are found again.

6. Click the Search button. Click All Files and Folders. pd the All or part of the file name type: Autorun.inf, pd click the Look in my computer. DEL all the files which have been found. Repeat the steps above and DEL all the files which are found again.

7. In step 6 is actually a virus is gone or no longer active but there was still some duplicate shortcut folder dbwt by virus / malware earlier.

8. If you want to remove it also, you have to be careful at all between the shortcuts that dbuat by the virus with the default Windows shortcut. The hallmark of the shortcut folders created by a virus that is when we pointed to that folder will display a link from the shortcut that is in the direction windows/system32. That's who we should DEL shortcut.

9. How to locate a folder shortcut is: Click the Search button. Click All Files and Folders. pd the All or part of the file name type: *. lnk, pd click the Look in my computer. You should choose based on the characteristics of a shortcut folder created by the above virus.

10. FOR can mengDEL registry created by the virus using HijackThis tool. (Can Download via google). Click Scan system only and looking at the HKCU \ ... \ ... database.mdb, HKLM \ ... \ .... who associated with windowsxp cd (I forget the name of its length, as well as to who is sometimes there are sometimes not), also HKCU \ ... \ .... disableregedit = 1. click the button fixed.

11. Now restart your computer. Actually, if we do not mengDEL registry before (step 10) is not a problem, but at the time of restarting windows dialog box will appear 2 distinguished the first point that we find a file database.mdb DEL earlier, the latter asked for the windows xp cd. click Ok aja has no problem. Then we'll probably regedit disabled by the virus. It is also not problematic if you do not often brain-tweaking the windows registry. Method To counteract the virus came back.
This virus works if you click the new folder shortcut harry potter, microsoft. After we click the shortcut folder then he will find a file which is located in the folder wsript.exe windows system32 folder. wscritp.exe active with the virus will start spreading. So the key for active virus is pd file wscript.exe. For that we have to turn off the road merename_nya wscript.exe.

The way is:

1. Open windows explorer, click tools menu option, folder option, view, click show hidden files and folders, click / DEL and check the Hide extensions for known file types and Hide protected operating system files.Klik OK.

2. Open the folder C: \ Windows \ system32 \ dllcache. Folder is a collection of backup files from the files in the System32 folder. Find the file wsript.exe then right-click rename for example a wscriptx.exe. Then BKA C: \ Windows \ system32, locate the file wsript.exe then right-click rename such a wscriptx.exe too.

may be useful for you all ^ _ ^

NB: use the latest smadav also, artav or artav installer / artav latest portable & esetNOD32 Norman malware cleaner is the latest and updated.
Noteworthy is: Use antivirus must alternately / should not be installed simultaneously, (Install after scans on Uninstall)

How to Install Windows 7 and Windows XP from the flash

In general to install windows xp windows 7 and we use the cd / dvd as bootingnya. But it would be a big problem, if the DVD RW or a laptop computer is broken. If the DVD RW is damaged we certainly will not be able to boot windows from cd / dvd. Solution.? Use the DVD RW external, to install windows 7 or windows. That means the first, second way is to use flash as a boot windows 7 or windows xp, and this is the easiest way. We will use the second way.

Stage of preparation to install windows 7 or windows XP from the flash.

* Applications WinToFlash,

* Flash 1 GB (For booting Windows XP)

* Flash 4 GB (To boot windows 7)


How to Make booting Windows 7 And Windows XP With flash

1. Please download WinToFlash, by clicking the download link above. Extract the files then open WinToFlash.exe -> Accept

2. The following display appears, click the check mark -> click Next

3. Insert the Windows XP boot CD or boot of Windows 7.

You can borrow a friend's computer to boot windows xp and windows 7 is

4. Plug the flash 1 GB (If you make a boot Windows XP), flash 4 GB (If you make a boot windows 7)

5. Back to WinToFlash. In the field of Windows file path to specify where the position of the cd boot windows Xp or Windows 7, and on the field determine where the position of the USB flash drive counterparts, click Next. See picture.

Note: "Make sure the contents of the flash had been fellow to move, because the flash will be formatted"

6. Windows License Agreement appears, check the I Accept ..., click continue.

7. The process of copying the boot from the CD / DVD to the flash will be running, wait until finished.

8. Beres, flash is ready to be used as a boot.

How to Install Windows XP With flash

1. Plug the flash that already contains the Windows XP boot, then turn on the computer.

2. Log into the BIOS by pressing F2 when the new computer is turned on, change the primary boot with flash (USB-HDD), if the flash has been in plug, there will appear the name of our flash, click F10 to save the settings.

3. Two options will appear when the computer or laptop to boot via flash. First, select 1. .. TEXT SETUP, press Enter, then do the installation as usual.

4. After the computer restarts, Select 2. .. Gui mode, press enter.

Remember ..! Gui Mode

5. If the computer restarts again, select the Gui Mode ..

6. Continue installation as usual.

7. Please unplug the flash, after a desktop computer or laptop open

E-COMMERCE SECURITY USING SECURE ELECTRONIC TRANSACTIONS

Technological developments have changed the way we think about shopping for a more effective, efficient and energy saving. We no longer need to spend time and effort to get to the store, memilih2 goods, and queuing at the cashier. Now we can relax in front of the computer, select the item from the global markets of goods, pay with credit cards and after a few days things have come our message.
In practice, shopping on the web requires a connection to the Internet and a browser that supports secure electronic transactions, such as Microsoft Internet Explorer and Netscape Navigator. Which indicates a retailer's web site is safe or not is a special mark that appears in the status bar at the bottom of the browser screen. In IE, the sign that appears are locked padlock sign in the right corner of the status bar. While users of Netscape Navigator, will see a key in the left corner of the status bar. If these signs appear, it means you are tar-connect on a secure server. However, because the standard used for secure connection is relatively new, yet all cybershop using this standard.
Microsoft and Netscape, in cooperation with a company credit card (Visa and MasterCard), as well as internet security companies (such as VeriSign), has made ​​a special encryption standards that make transactions via the web to be very safe. In fact, Visa and MasterCard provide 100% security guarantee to users that use credit cardnya e-com.Mereka can do so because they develop the SET (Secure Electronic Transaction).

SET (Secure Electronic Transaction)
SET is the Secure Electronic Transaction protocol developed by Visa and MasterCard specifically to enable secure credit card transactions on the Internet. Using digital certificates to verify the identity of all parties involved in the purchase and encrypt credit card information before sending it on the Internet.
Components for the SET Protocol
• Card Holder Application, also known as digital wallets, organized by the online consumer and package digital signature and credit card information to ensure its identity and its protection of financial information through a complex encryption system.
• Merchant Server Component is product verification conducted by the merchant to process card payments online.
• Payment Gateway component is held by an acquiring bank or trusted third parties who receive and process verification of the merchant and customer payment information and filter them to the appropriate financial institution.
• Component Certificate Authority, usually run by a financial institution, is a trusted agent that issued the digital certificate and is responsible for ensuring that all users of digital certificates really secure and reliable customers.
SET mechanism

Standard encryption used in e-commerce at present is SET (Secure Electronic Transaction). Besides being used for payment by credit card, SET is also used for payment with the smartcard. By using the SET, the confidentiality of customer information (as the name and card number) can be maintained. SET can also keep the autotentifikasi or identity of the seller and the customer, so it can not be misused by anyone.
SET uses a special cryptographic called asymmetric cryptography to guarantee the security of a transaction. Asymmetric cryptography is also called by the name of the Public-Key Cryptography. This encryption uses two keys / key (ie code), a key used to encrypt the data, and other key to decrypt the data. The two keys are mathematically linked with a specific formula, so that the data has been encrypted by one key can only be decrypted using a key partner.
Each user has two keys, namely puclic key and private key. Users can freely distribute a public key. Because of the special relationship between the two keys, users and anyone who receives the public key received assurance that the data has been encrypted with a public key and sent to the user can only be decrypted by private key. Security is assured for the user to maintain the confidentiality of private keys. This key pair must be created specifically by the user. The algorithms typically used to manufacture key is the RSA algorithm (named after the initials of the author, namely: Rivest, Shamir, and Adleman).
That is, a party e-commerce managers that use SET, should make a special key partner for the web. The public key will be deployed, and this is usually done through the dissemination of a web browser. The public key is included for free to every web browser, and have been available if the browser is installed. Private key, public key pair for the pair is held by the manager of e-com.
If buyers use a browser to send a form of transaction, the buyer will use a public key that has been available on the web browser. Other people who do not have the private key partner, will not be able to decrypt the form data sent with the public key. After the data up to the manager of e-com, the data will be decrypted using the private key. That is, only the manager of e-com could get that data in the form of the truth, and identity data and customer credit card numbers will not fall into unauthorized hands.

Sunday, May 8, 2011

tips and tricks to increase bandwidth

For those who like berinternetan, maybe it's a complete ga while surfing if we do not download anything, be it articles, videos, and mp3 files. Often we also find there are times when the cafe, or our personal computers slow to download a file. Apart from the problems that may be found on the download server, it turns out we can also speed up the process of downloading these files. There are various kinds of software downloader to speed up the download process, but here I will give useful tips that, God willing, to accelerate the download process without using the downloader software.


[ad # ads468x60] Many people do not know that 20% of the total bandwidth used by windows to check the situation from the internet. So to get back 20% of these steps is

1. START-> RUN
2. Type gpedit.msc
3. After logging group policy select the computer configuration -> Administrative Templates -> Network -> QoS packet scheduler -> limit reservable bandwidth

# You can see non-configured, see the Explain, explain 20% of these problems.
# Back to the settings, select enabled and replace 20 with 0

source :www.rismaka.net

Instalation Joomla Tutorial

Copy source code from the installer Joomla SPANEL

Please copy the source Joomla from the File menu -> Installer. Paste the file on the www domain / subdomain which we will install the Joomla application. How:

1. After the Installer page please select / check the available source Joomla menu and click Edit -> Copy
2. Click the File menu -> Manage Files
3. Entrance (click) to the directory: sites -> namadomain / namasubdomain -> www
4. Please paste the source Joomla earlier in directory www. Point your mouse to the menu Edit -> Paste


NOTE: If the version of Joomla does not comply with your wishes, please download the version of Joomla that you want in http://www.joomla.org/download.html and uploaded to the www directory domain / subdomain where Joomla will be installed


Prepare database

Before you start installing Joomla, you first prepare a new database that will be used. Here are the steps:

1. SPANEL From the main menu, select menu Database -> MySQL
2. Select Add Database, and then fill in Database Name, Database Username and Password (minmal kombiniasi 8 characters with letters and numbers, eg: qwert1234)
3. Click the Add button


Customize Joomla Requirements

Joomla Error Display requires configuration and Global Registration become inactive (disable). You can switch off from the php.ini file. For reference making the php.ini file in SPANEL can you see on T: Bagaimana_mengedit_php.ini_saya_sendiri. In the php.ini file, please add the line: display_errors = off and change register_global be register_global = off


The installation process

The installation process is done via a web browser. Please access the domain / subdomain where Joomla will be installed (mial: http://namadomainAnda.com).

1. Click the NEXT button. In step insallation Pre-Check you'll see a description is no configuration.php writable. You can ignore this because the system will inform the contents of the Joomla configuration.php file at the end of the installation later. Click the NEXT button again
2. The next stage you will be taken to the page Opera-licensing Joomla (read if necessary). Then click the NEXT button
3. At the next stage is the stage setup adjustment. Please fill in the configuration database in accordance with the database that you created earlier in step Preparing the database above. To please you select the Database Type mysql and to please fill Hostname localhost. When you are after, click the NEXT button
4. The next step is konfigruasi FTP. Please Select Yes, and for FTP User and FTP Password SPANEL enter your username and password. While untu fill FTP root path: / sites / namadomainAnda.com / www (easy just click the button Autofind FTP path). If so, click the NEXT button
5. Next is the Main configuration for your website. Content according to your wishes.
6. Click the Install Sample Data button if you want to install is included with the examples given article Joomla (this is easier in the manufacturing process and other articles.) But, if you want really clean install without any data from Joomla, then this step can be ignored. Then click NEXT
7. Next is the removal process in SPANEL installation directory. Go to www directory domain / subdomain you from the File menu -> Manage Files. Click on the directory of sites -> namadomain / subdomainAnda -> www. Select (check) the installation folder and then point the mouse to the File menu -> Delete Selected Files

source :kb.masterweb.net

Tutorial Instalation Clean Up

install CleanUp! Before, please take the time to read as follows:

* Please make a backup of your hard disk before running CleanUp! for the first time. Please make a backup of your hard disk before running CleanUp! For the first time.
If you're not sure how to do this, see the CleanUp! FAQs. If you are not sure how to do this, see the CleanUp! FAQ. Try Carbonite for free by clicking on the link below. Try CARBONITE free by clicking the link below.
While every effort has been made to ensure that CleanUp today! Is bug-free, because different amounts of hardware and software configurations around, it is impossible to guarantee that he will make a mistake-free on a particular system. As a result, it is strongly recommended That you make a backup of all files before running CleanUp Important! for the first time, or before Trying an upgraded version of CleanUp! . As a result, it is strongly recommended that you back up all important files before running CleanUp! For the first time, or before attempting the upgrade version of CleanUp.
* If you have never before Used CleanUp! , Then please take the time to read the "Introduction to CleanUp!" If you have never used CleanUp!, So please take the time to read the "Introduction to CleanUp!" section of the Help file. part of the Help file. This describes in detail what files and settings are "cleaned" Pls you run CleanUp! . This explains in detail what files and settings "cleaned up" when you run CleanUp!. Be sure That nothing here conflicts with your use of your computer. Ensure that there is no conflict here with the use of your computer.
For example, CleanUp! attempts to delete files from Various temporary directories (including download directories / caches), as well as emptying the Recycle Bins. For example, CleanUp! Trying to delete files from various temporary directories (including download directories / caches), and also empty the Recycle Bins. If you make a habit of saving files That you wish to keep in any of these places, then note That They Will Be deleted Pls CleanUp! is run. If you make a habit of storing files you want to save in this place, then notice that they will be deleted when CleanUp! Executed. Note Considered That it is generally poor practice to use temporary folders or the Recycle Bin to store files you intend to keep. Note that is generally considered poor practice to use a temporary folder or the Recycle Bin to store files you intend to continue.
* If you are upgrading from an Earlier version of CleanUp! , Read the "What's New" section of the Help file to see what new features have been added. If you are upgrading from previous versions of CleanUp read!, The "What's New" section of the Help files to see what new features have been added.
* Remember, there is NO WARRANTY with this software. Remember, there is NO WARRANTY with this software.

BY downloading CleanUp! BY DOWNLOAD CleanUp! Indicate YOU THAT YOU ACCEPT THE TERMS AND CONDITIONS OF BOTH THE WARRANTY AND THE LICENSE agreements. SIGNS THAT YOU ACCEPT THE TERMS AND CONDITIONS YOU ARE BOTH THE WARRANTY AND LICENSE AGREEMENT.

Having read and checked the above, you cans install CleanUp! as follows: After reading and checking the above, you can install the following CleanUp! As:
1. 1. From the Following list of download files and locations, select the newest version for your Operating System and click on the link to download. From the list below to download the file and location, select the latest version for your Operating System and click on the link to download. When prompted to save or open the file, choose to open the file from its current location. When prompted to save or open the file, choose to open a file from current location. (Alternatively, you cans save it to disk then run the program later.) (Alternatively, you can save it to disk and then run the program later.)
2. 2. The installation program will from walk you through the rest of the installation. The installation program will guide you through the rest of the installation.

Once setup is complete you will from be Able to run CleanUp! from the icon placed under your Start menu. After setup is complete you will be able to run CleanUp! From the icons are located under your Start menu.

Note That since CleanUp! is freeware, you cans copy of any of the files downloaded from above and pass along to your friends Them and colleagues (see license for details). Note that since CleanUp freeware! Is, you can copy all the files downloaded from above and pass them along to friends and colleagues (see license for details.) The files even fit on a single 3.5 "(1.44MB) floppy disk! [Note That you cans Also install CleanUp! On a flash drive or utilities CD if you prefer.] The files even fit on a single 3.5" (1 , 44 MB) floppy disk [Note that you can also install CleanUp! In a flash drive or CD utility if you want.]!


source :www.stevengould.org