Sunday, July 10, 2011

How to Speed ​​Up Browsing In Network

Speed ​​up browsing on the network that will be discussed this time that speed up browsing your computer when you access or open "My Network Places". My network places is useful to see other computers on the network that is connected through a LAN or local area network "as an example in which an office computer or resourcenya in sharing data. You need to know to display a computer or a resource shared by our computers through my network places can require considerable time, less than about 40 seconds or 1 minute and even more, depending on the specifications of each computer.

The cause of the length of time needed because the computer will do a "Scheduled Tasks " first performed prior to the destination computer resource on the share register on the computer. This process takes a long time to access my network places. But you can speed it up with a few settings from the registry editor. For now I apply the following way in Windows XP operating system, for other operating systems will follow.

How to speed up the process of network
Make a reduction in the time required by the system to check the scheduled tasks, by editing the following registry editor.

* Click the Start menu | Run | regedit typing | hit enter
* Open the key "HKEY_LOCAL_MACHINE | SOFTWARE | Microsoft | Windows | Current Version | explorer | remote computer | name space".
* Find a key {06277990-4C6A-11CF-8D87-00AA0060F5BF}, delete the key.
* Close the registry editor and restart your computer.

After your computer restarts, then you are able to do browsing on the network with a shorter time, because when you open My Network Places, the system is no longer to check the scheduled tasks.

Shortcut Ink overcome the virus, Microsoft, Applications and New Folder

Lately ,the users computer / Notebook / Laptop, especially those using Windows XP shortcut Inkdipusingkan virus by the presence of virus / malware which constantly make a duplicate folder or new folder microsoft, applications, music and more. Worse yet ... foder-folders can not be diDEL or if terDEL, if you click on a folder ..., then the folders appear again.
Tutorial below hopefully can help overcome the problems that her computer got a virus / malware shortcut folder ... lnk harry potter, microsoft, new folders and so on.
According to the hypothesis of how the virus / malware is as follows:

* Virus / malware this will put the files database.mdb, Thumb.db, Autorun.inf, shortcut folder harry potter .... Lnk, folder shortcut microsoft, new folders and shortcuts pd my document folder.
* Virus / Malware This will activate the file wscript.exe and Thumb.db file located in system32 folder, the folder window to run the file database.mdb on my document.
* Shortcut folders'd be associated with the file Thumb.db.
* If you open the shortcut folders before it will activate the wscript.exe file and folder shortcuts Thumb.db files that exist on your computer, Thumb.db file and the file autorun.inf in all drives C. If your computer is infected with the virus / malware is the entire C drive on your computer will have duplicate an existing shortcut folder on your computer, Thumb.db file and the file autorun.inf. It will also scan drives A, CD ROM, flash and your network as a medium for distributing viruses / malware. and will create a duplicate

There are 2 ways to mengDEL virus:

1. By using the updated antivirus.

Antivirus which can recognize the virus (I only had 3 antivirus), namely: 1. AVG: detected as VBS Worm. AVG will mengDEL all shortcut duplicate folders and files was the primary virus. 2. Norton Antivirus 2009: detected as VBS Runauto. Norton will mengDEL Thumb.db files in all drives C. You can mengDEL Autorun.inf file and folder shortcuts all the duplicates manually. 3. Avira Antivir Premium: DR/Agent.JP.4 detect it as malware. Antivir will mengDEL Thumb.db files on all drives C. You can mengDEL Autorun.inf file and folder shortcuts all the duplicates manually.

2. With the manual method.

1. Turn off System Restore.

2. Turn off the virus using tools CProcess wscript.exe / CurrProcess (you can DownLoad via google). Run CProcess, search the name wscript.exe process tab then right click and click the kill selected procesess.

3. Open windows explorer, click tools menu option, folder option, view, click show hidden files and folders, click / DEL, check the Hide extensions for known file types and Hide protected operating system files.Klik OK.

4. Go to your documents. DEL database.mdb file.

5. Click the Search button. Click All Files and Folders. in the All or part of the file name type: Thumb.db, pd click the Look in my computer. DEL all the files which have been found. Repeat the steps above and DEL all the files which are found again.

6. Click the Search button. Click All Files and Folders. pd the All or part of the file name type: Autorun.inf, pd click the Look in my computer. DEL all the files which have been found. Repeat the steps above and DEL all the files which are found again.

7. In step 6 is actually a virus is gone or no longer active but there was still some duplicate shortcut folder dbwt by virus / malware earlier.

8. If you want to remove it also, you have to be careful at all between the shortcuts that dbuat by the virus with the default Windows shortcut. The hallmark of the shortcut folders created by a virus that is when we pointed to that folder will display a link from the shortcut that is in the direction windows/system32. That's who we should DEL shortcut.

9. How to locate a folder shortcut is: Click the Search button. Click All Files and Folders. pd the All or part of the file name type: *. lnk, pd click the Look in my computer. You should choose based on the characteristics of a shortcut folder created by the above virus.

10. FOR can mengDEL registry created by the virus using HijackThis tool. (Can Download via google). Click Scan system only and looking at the HKCU \ ... \ ... database.mdb, HKLM \ ... \ .... who associated with windowsxp cd (I forget the name of its length, as well as to who is sometimes there are sometimes not), also HKCU \ ... \ .... disableregedit = 1. click the button fixed.

11. Now restart your computer. Actually, if we do not mengDEL registry before (step 10) is not a problem, but at the time of restarting windows dialog box will appear 2 distinguished the first point that we find a file database.mdb DEL earlier, the latter asked for the windows xp cd. click Ok aja has no problem. Then we'll probably regedit disabled by the virus. It is also not problematic if you do not often brain-tweaking the windows registry. Method To counteract the virus came back.
This virus works if you click the new folder shortcut harry potter, microsoft. After we click the shortcut folder then he will find a file which is located in the folder wsript.exe windows system32 folder. wscritp.exe active with the virus will start spreading. So the key for active virus is pd file wscript.exe. For that we have to turn off the road merename_nya wscript.exe.

The way is:

1. Open windows explorer, click tools menu option, folder option, view, click show hidden files and folders, click / DEL and check the Hide extensions for known file types and Hide protected operating system files.Klik OK.

2. Open the folder C: \ Windows \ system32 \ dllcache. Folder is a collection of backup files from the files in the System32 folder. Find the file wsript.exe then right-click rename for example a wscriptx.exe. Then BKA C: \ Windows \ system32, locate the file wsript.exe then right-click rename such a wscriptx.exe too.

may be useful for you all ^ _ ^

NB: use the latest smadav also, artav or artav installer / artav latest portable & esetNOD32 Norman malware cleaner is the latest and updated.
Noteworthy is: Use antivirus must alternately / should not be installed simultaneously, (Install after scans on Uninstall)

How to Install Windows 7 and Windows XP from the flash

In general to install windows xp windows 7 and we use the cd / dvd as bootingnya. But it would be a big problem, if the DVD RW or a laptop computer is broken. If the DVD RW is damaged we certainly will not be able to boot windows from cd / dvd. Solution.? Use the DVD RW external, to install windows 7 or windows. That means the first, second way is to use flash as a boot windows 7 or windows xp, and this is the easiest way. We will use the second way.

Stage of preparation to install windows 7 or windows XP from the flash.

* Applications WinToFlash,

* Flash 1 GB (For booting Windows XP)

* Flash 4 GB (To boot windows 7)


How to Make booting Windows 7 And Windows XP With flash

1. Please download WinToFlash, by clicking the download link above. Extract the files then open WinToFlash.exe -> Accept

2. The following display appears, click the check mark -> click Next

3. Insert the Windows XP boot CD or boot of Windows 7.

You can borrow a friend's computer to boot windows xp and windows 7 is

4. Plug the flash 1 GB (If you make a boot Windows XP), flash 4 GB (If you make a boot windows 7)

5. Back to WinToFlash. In the field of Windows file path to specify where the position of the cd boot windows Xp or Windows 7, and on the field determine where the position of the USB flash drive counterparts, click Next. See picture.

Note: "Make sure the contents of the flash had been fellow to move, because the flash will be formatted"

6. Windows License Agreement appears, check the I Accept ..., click continue.

7. The process of copying the boot from the CD / DVD to the flash will be running, wait until finished.

8. Beres, flash is ready to be used as a boot.

How to Install Windows XP With flash

1. Plug the flash that already contains the Windows XP boot, then turn on the computer.

2. Log into the BIOS by pressing F2 when the new computer is turned on, change the primary boot with flash (USB-HDD), if the flash has been in plug, there will appear the name of our flash, click F10 to save the settings.

3. Two options will appear when the computer or laptop to boot via flash. First, select 1. .. TEXT SETUP, press Enter, then do the installation as usual.

4. After the computer restarts, Select 2. .. Gui mode, press enter.

Remember ..! Gui Mode

5. If the computer restarts again, select the Gui Mode ..

6. Continue installation as usual.

7. Please unplug the flash, after a desktop computer or laptop open

E-COMMERCE SECURITY USING SECURE ELECTRONIC TRANSACTIONS

Technological developments have changed the way we think about shopping for a more effective, efficient and energy saving. We no longer need to spend time and effort to get to the store, memilih2 goods, and queuing at the cashier. Now we can relax in front of the computer, select the item from the global markets of goods, pay with credit cards and after a few days things have come our message.
In practice, shopping on the web requires a connection to the Internet and a browser that supports secure electronic transactions, such as Microsoft Internet Explorer and Netscape Navigator. Which indicates a retailer's web site is safe or not is a special mark that appears in the status bar at the bottom of the browser screen. In IE, the sign that appears are locked padlock sign in the right corner of the status bar. While users of Netscape Navigator, will see a key in the left corner of the status bar. If these signs appear, it means you are tar-connect on a secure server. However, because the standard used for secure connection is relatively new, yet all cybershop using this standard.
Microsoft and Netscape, in cooperation with a company credit card (Visa and MasterCard), as well as internet security companies (such as VeriSign), has made ​​a special encryption standards that make transactions via the web to be very safe. In fact, Visa and MasterCard provide 100% security guarantee to users that use credit cardnya e-com.Mereka can do so because they develop the SET (Secure Electronic Transaction).

SET (Secure Electronic Transaction)
SET is the Secure Electronic Transaction protocol developed by Visa and MasterCard specifically to enable secure credit card transactions on the Internet. Using digital certificates to verify the identity of all parties involved in the purchase and encrypt credit card information before sending it on the Internet.
Components for the SET Protocol
• Card Holder Application, also known as digital wallets, organized by the online consumer and package digital signature and credit card information to ensure its identity and its protection of financial information through a complex encryption system.
• Merchant Server Component is product verification conducted by the merchant to process card payments online.
• Payment Gateway component is held by an acquiring bank or trusted third parties who receive and process verification of the merchant and customer payment information and filter them to the appropriate financial institution.
• Component Certificate Authority, usually run by a financial institution, is a trusted agent that issued the digital certificate and is responsible for ensuring that all users of digital certificates really secure and reliable customers.
SET mechanism

Standard encryption used in e-commerce at present is SET (Secure Electronic Transaction). Besides being used for payment by credit card, SET is also used for payment with the smartcard. By using the SET, the confidentiality of customer information (as the name and card number) can be maintained. SET can also keep the autotentifikasi or identity of the seller and the customer, so it can not be misused by anyone.
SET uses a special cryptographic called asymmetric cryptography to guarantee the security of a transaction. Asymmetric cryptography is also called by the name of the Public-Key Cryptography. This encryption uses two keys / key (ie code), a key used to encrypt the data, and other key to decrypt the data. The two keys are mathematically linked with a specific formula, so that the data has been encrypted by one key can only be decrypted using a key partner.
Each user has two keys, namely puclic key and private key. Users can freely distribute a public key. Because of the special relationship between the two keys, users and anyone who receives the public key received assurance that the data has been encrypted with a public key and sent to the user can only be decrypted by private key. Security is assured for the user to maintain the confidentiality of private keys. This key pair must be created specifically by the user. The algorithms typically used to manufacture key is the RSA algorithm (named after the initials of the author, namely: Rivest, Shamir, and Adleman).
That is, a party e-commerce managers that use SET, should make a special key partner for the web. The public key will be deployed, and this is usually done through the dissemination of a web browser. The public key is included for free to every web browser, and have been available if the browser is installed. Private key, public key pair for the pair is held by the manager of e-com.
If buyers use a browser to send a form of transaction, the buyer will use a public key that has been available on the web browser. Other people who do not have the private key partner, will not be able to decrypt the form data sent with the public key. After the data up to the manager of e-com, the data will be decrypted using the private key. That is, only the manager of e-com could get that data in the form of the truth, and identity data and customer credit card numbers will not fall into unauthorized hands.