Senin, 22 November 2010

0
How to Fix Bad Sector Hardisk

This article is a continuation of previous article on how to fix computer hard disk. In this article will discuss about how to fix bad sectors affected hard drive. Previous to check the condition of our hard drives can use several application programs like those mentioned in the article on how to check the condition of computer barked.

Bad sectors or bad blocks is the term used to refer to the damaged area on the hard disk. Bad Sector on this hard drive in general there are 2 kinds, namely physically bad sectors and bad sectors in the software. Bad sectors are physically occurs because of the hard drive keruksakan at the plate that can occur due to excessive dust disk, hard drive is dropped, exposed to the crunch and so forth. While the bad sector in software may occur when the disk is busy all of a sudden the computer off, for example due to power failure.

There are several application tools that we can use to improve the condition of the hard drive has bad sectors software ririskiky namely:
Using HDD Low Level Format Tool
Low level format program is a utility that serves to remove all partitions good information, and information data within the hard drive for bad sectors. After running the low level format the hard disk condition will really clean like the first time. So make sure the data needed previously backed-up first. Seeing functions, then not only used to fix bad sectors, low level format tool we can use to clean up the data that are very personal or confidential permanently.
Here are the steps to use HDD Low Level Format Tool:

   
1. Download HDD Low Level Format program on http://hddguru.com.
   
2. Install and run the program HDD Low Level Format tools so that the display appears as below:
   
3. Select the hard drive will be formatted, and then click Continue ..
   
4. Click the tab LOW-LEVEL FORMAT, click FORMAT THIS DEVICE
   
5. Wait until the finish, and normally the process will take a while so take time enough.
In addition to the hard drive (SATA, IDE or SCSI), HDD Low Level Format Tool can also format the flash.

0
How to Fix the flash 0 bytes

Actually the article about how to fix the flash that read 0 bytes has been much discussed, but because my own experience it just yesterday, so in this post I try to share the experience.

To fix the flash that read 0 bytes as in the picture below, I use the HP USB Disk Storage Format Tool. As the name implies this program is basically a tool to format the flash, here's how:

    1. Download HP USB Disk Storage Format Tool here
    2. Extract and install the HP USB Disk Storage Format Tool.
    3. Insert the flash to the computer's USB port
    4. Run the application of the HP USB Disk Storage Format Tool
    5. Specify the drive where the flash is read 0 bytes are inserted,
    6. Select the desired file system, flash is generally formatted with the FAT32 file system.
    7. Click Start to begin formatting the flash is.
    8. When the warning window appears, click Yes.

Praise be to use the program, which originally read Flashdisk 0 bytes successfully functioning again. Good luck ..

0
How to Turn off Computer FROM LONG DISTANCE

fOR shut down the computer remotely is very easy, even we do not need to use the application (software) additional. The trick is as follows:

    1. We must "get" them first to the target computer with an account / previlledge Administrator, how can the click start - run, type: \ \ nama_komputer_target, then press enter.
    2. Window will display connects to your computer, fill in your username and password.
    3. Then open a command prompt or it could be from the run menu, then type the command as below:
* to turn off the computer type:
       shutdown-s-f \ \ name_computer_target
     * to restart the computer type:
       shutdown-r-f \ \ name_computer_target
     * to cancel the shutdown or restart type:
       shutdown-a \ \ name_computer_target
     * to display special messages on the target computer before shutdown or restart type: shutdown-r-f \ \ name_computer_target-c "message"


 
Note:

    
* We can not enter the target computer if the target computer administrator password blank (not filled) or the condition of the active firewall.
    
* To disable the firewall, click Start-control panel-windows firewall, then check off the option (not recommended).
    
* Meanwhile, so we can get into computers in a network that password blank user accounts then we must mensettingnya first on a computer in the following manner:
          
o Log into the Group Policy window, click start-run, type: gpedit.msc
          
o and then select Computer Configuration / Windows Settings / Security Settings / Local Policies / Security Options
          
o Double click on Accounts: Limit local account use of blank passwords to console login only, then check the option to disable.

0
How to quick way to lock computer

If you're using a computer at work / office, you should lock (to lock) the computer when they wanted to leave. This is of course to prevent others who idly tamper with computers or the files we are doing.


There are several ways that you can use these weeks to lock the computer, including:

If your computer is a member of a Domain, then to lock the computer simply by pressing the CTRL + ALT + DEL and select Lock Computer button.

Meanwhile, if your computer is a member of the workgroup or not connected to the network, then to lock the computer we must do so by pressing the CTRL + ALT + DEL and the Task Manager window will open and we choose Shutdown menu - Lock Computer.
If your stand alone computer users or members of the Workgroup but want to lock the computer with the display menu, such as how no.1 when pressing CTRL + ALT + DEL, then we must set up the first, with use are as follows:

    
* Click Start - Control Panel
    
* Double-click User Accounts icon
    
* In the Pick a task option .. click "change the way users to log on or off".
    
* In the "Select the logon and logoff options" remove the checkmark on the option "Use the welcome screen"
    
* Click Apply Options.
    
* Now to lock the computer, you simply press the CTRL + ALT + DEL and press the "LOCK COMPUTER."
NB: by removing the checkmark on the option "Use the welcome screen" then the initial display window will also change that is not going to the emergence of the "welcome screen" that displays a list of users on the computer.

Update:
Delain way over there again the fastest way to lock the computer, by pressing the Windows key on the keyboard image and press L.
Rabu, 10 November 2010

0
How to Overcoming Virus worms

If your computer is infected by virus type WORM (which you receive through EMAIL or INTERNET), this virus will be spread again by sending EMAIL to all the address on your ADDRESS BOOK.

An easy way to prevent the spread of this virus:

In Outlook Express:

1. Click File and select New -> CONTACT.
2. On the menu name in the FIRST and LAST NAME column type "0000 " (zero zero zero zero).
3. EMAIL ADDRESS DO NOT fill anything, leave it blank.
4. Then click OK.
5. Make sure that this new email address is on the FIRST SEQUENCE. (in box contact the left, 0000 0000 is on top)
6. Done.

In Eudora:

1. Click Tools -> Address Book (press Ctrl and L simultaneously)
2. Click New.
3. In 0000 the contents of the columns First Name and Last Name in column contents 0000
4. E-mail address and the other just vacated.
5. Close the address book and then Save the address book.
6. Done.

If at some point your computer including WORM VIRUS INFECTION, this virus will send emails to all addresses, which of course the name "00000000 " is the first to be sent.
Automatic email delivery will stop (ERROR) because there is no his Email Address. At the same time you will KNOW that your computer have a virus, because the computer will give the message ERROR.
Senin, 08 November 2010

0
How to remove trojan virus

Trojan horse  etter known as Trojan in komputermalicious security software / malware) that can damage a system or network. The purpose of the Trojan was to obtain information from the target (passwords, user habits recorded in the system log, data, etc.), and control target (gain privileges on the target). refers to a form of suspicious software ( How it Works
Trojan different from other types of suspicious software such as computer viruses or worms because two of the following:

    
* Trojan is "stealth" (invisible and not seen) in its operations and are often shaped as if the program is a good program, while a computer virus or worm to act more aggressively by destroying the system or create a system to crash.
    
* Trojans controlled from another computer (computer attacker).
How to Spread
Use of the term Trojan or Trojan horses intended for insertion of malicious code and damage in a good program and useful, as on the Trojan War, the Spartan soldiers hiding inside the Trojan Horse that is intended as a dedication to Poseidon. Trojan Horse Trojan according to officials considered harmless, and allowed to enter the fort Trojan that can not be penetrated by Greek soldiers for more than 10 years of turbulent Trojan war.
Most Trojans now in the form of an executable file (*. EXE or *. COM in Windows and DOS operating system or program with a name that is often executed in the UNIX operating system, such as ls, cat, etc.) are incorporated into systems penetrated by a cracker to steal important data for the user (password, credit card data, etc.). Trojans can also infect the system when users download the application (often a computer game) from a source that can not be trusted in Internet network. These applications to have Trojan horse code that is integrated within itself and allow a cracker to be able to mess up the system in question.

Types of Trojans
Several types of Trojans in circulation include:

    
* Thieves password: Type Trojan can find passwords that are stored in the operating system (/ etc / passwd or / etc / shadow in the UNIX family of operating systems or file Security Accounts Manager (SAM) in Windows NT family of operating systems) and will send it to the original attacker. In addition, this type of Trojan is also able to fool the user to make an appearance as if he is a login screen (/ sbin / login in or Winlogon.exe UNIX operating system in Windows NT operating system) and wait for the user to enter a password and send it to attackers. Examples of this type is Passfilt Trojan that acts as if he is Passfilt.dll file originally used to add security passwords in the Windows NT operating system, but the abused becomes a password stealing program.
    
* Recording keystrokes (keystroke logger / keylogger): Type this Trojan will monitor all typed by the user and will send it to the attacker. This species differs with spyware, even though these two things do similar things (to spy on users).
    
* Remote Administration Tool (Remote Administration Tools / RAT): This type of Trojan allows attackers to take over full control to the system and do whatever they want from a distance, such as formatting a hard disk, steal or delete data, etc. . Examples of this are the Back Orifice Trojan, Back Orifice 2000, and SubSeven.
    
* DDoS Trojan or Zombie Trojans: This type of trojan is used to make an infected system in order to do a distributed denial of service attacks against target hosts.
    
* There is again a kind of Trojan that mengimbuhkan itself to a program to modify the workings of the program that diimbuhinya. Types of Trojan is called a Trojan virus.
Detection and Cleanup Checking Listening Port
Detecting the presence of a Trojan is an action that is somewhat difficult. The easiest way is to see which ports are open and are in a state of "listening", using such a specific utility Netstat. This is because many of the Trojan runs as a system service, and work in the background (background), so that the Trojan-Trojan is able to receive commands from remote attackers. When a transmission is UDP or TCP, but the transmission from the port (which is in a "listening") or an unknown address, then it can be used as guidelines are concerned that the system has been infected by a Trojan Horse.
Here is an example of using Netstat utility in Windows XP Professional

C: \> netstat-a-b
Active Connections

 
Proto Local Address Foreign Address State PID
 
TCP windows-xp: epmap 0.0.0.0:0 LISTENING 956
  
c: \ windows \ system32 \ WS2_32.dll
  
C: \ WINDOWS \ system32 \ RPCRT4.dll
  
c: \ windows \ system32 \ rpcss.dll
  
C: \ WINDOWS \ system32 \ svchost.exe
  
- Unknown component (s) -
  
[Svchost.exe]
 
TCP windows-xp: microsoft-ds 0.0.0.0:0 LISTENING 4
  
[System]
 
TCP windows-xp: 50 300 1908 0.0.0.0:0 LISTENING
  
[Oodag.exe]
 
TCP windows-xp: 1025 0.0.0.0:0 LISTENING 496
  
[Alg.exe]
 
TCP windows-xp: 1030 0.0.0.0:0 LISTENING 1252
  
[CcApp.exe]
 
UDP windows-xp: microsoft-ds *: * 4
  
[System]
 
UDP windows-xp: 4500 *: * 724
  
[Lsass.exe]
 
UDP windows-xp: isakmp *: * 724
  
[Lsass.exe]
 
UDP windows-xp: 1900 *: * 1192
  
c: \ windows \ system32 \ WS2_32.dll
  
c: \ windows \ system32 \ ssdpsrv.dll
  
C: \ WINDOWS \ system32 \ ADVAPI32.dll
  
C: \ WINDOWS \ system32 \ kernel32.dll
  
[Svchost.exe]
 
Windows-xp UDP: ntp *: * 1036
  
c: \ windows \ system32 \ WS2_32.dll
  
c: \ windows \ system32 \ w32time.dll
  
ntdll.dll
  
C: \ WINDOWS \ system32 \ kernel32.dll
  
[Svchost.exe]

Creating a Snapshot Alternatively you can use is to create a "snapshot" of all the program files (*. EXE, *. DLL, *. COM, *. VXD, etc.) and compare it over time with previous versions, in the computer is not connected to the network. This can be done by creating a checksum of all files the program (with the CRC or MD5 or other mechanisms). Because often Trojan included in the directory where the operating system is (\ WINDOWS or \ WINNT for Windows or / bin, / usr / bin, / sbin, / usr / sbin in the UNIX family), then that is suspect is the files are in that directory. Many files that can be suspected, especially the program files that have names similar to file a "doing good" (like "svch0st.exe", than it should be "svchost.exe", a file that is run by many operating system services Windows) can be suspected as a Trojan Horse. Antivirus The last way is to use an antivirus software, which features the ability to detect the Trojan, which combined with a firewall that monitors all incoming and outgoing transmissions. This method is more efficient, but more expensive, as most antivirus software is integrated with the firewall has a more expensive price than the above two ways (which tend to be "free"). Indeed, there are several devices for free, but still it takes time, effort and money to get it (download it from the internet).

 



 

 


 


 


 


0
Technology Publications

Trying to predict where technology, in general, will be in a number of years is probably more art than science. Whether it's consumer-or business-related, technology for the sake of technology is useless unless it addresses a real world problem or fills a specific need.
However, predictions are inevitable, so we decided to give it a go. There are two ways to approach predictions. The first is to use a strictly linear progression (i.e., in five years existing technologies will have advanced at the same rate as the preceding five years), or we can take the "where would we like to be" approach (i.e., in five years we should have 100Gb wireless Ethernet!). We also have to consider that advances in one technology generally depend on, and are influenced by, advances in connected technologies (what good is a 100Gb wireless Ethernet if the adapter is larger than the new wrist-watch-sized PDA, cell phone, or laptop device currently in use?). Finally, there is always the likelihood that a new, innovative technology will be introduced that has no precedent at all.
[ILLUSTRATION OMITTED]
Demand Just Gets Bigger
The one thing we can all agree on is that the demand for storage will simply continue to grow. By 2010, individual users requiring multiple terabytes of storage will be commonplace. Small to medium-size companies will have petabytes of data; large enterprises will have exabytes. What's after that ... zettabytes!?
Advances in disk hardware will address a portion of this increase. There will be multi-terabyte disks by 2010--possibly even petabyte disks. This would, by extension, lead to petabyte- and exabyte-scale RAID systems. Of course, all of this will need to be managed in a new way--old models will simply be swamped at this scale.
Storage Management Shifts
Storage management has already shifted away from individual application servers; storage area networks (SANs) have allowed administrators to move these functions. Given the number of application servers in even a medium-size company, it is not realistic to require that each application server manage its own storage. The application server (database, e-mail, web or other) should be used to perform its specific function, not general maintenance.
In SANs, storage management is also shifting away from individual storage systems. Similar to application servers, these RAID systems would become islands within the SAN and require administrators to manage them individually.
[ILLUSTRATION OMITTED]
These functions are now moving into the SAN itself, either through intelligent switches or appliances designed to provide a common layer of storage services across various application servers and storage systems within the SAN. By 2010, the move will be complete and storage management will use a distributed model wherein the SAN provides the storage services for the application servers.
Storage Subscriptions
Part of the value of moving storage management to the SAN, and away from the application servers, is that it relieves the application server from managing all aspects of its storage. But it's not enough to just move the disk out of the application server. The first step removed the need for the application server to manage mirrors and RAID levels for its LUNs. The next steps remove the need for the application server to be involved in backup and disaster recovery.
By 2010, changes in operating systems and server-based applications, coupled with standard interfaces for managing storage, will allow the application server to use storage in much the same way our homes use electricity. The application servers will be authorized to use a certain amount of storage from the SAN. If the server needs more storage, it will negotiate with the SAN for a temporary or short-term increase. If the server is not fully using its allotment, the SAN may negotiate to regain some of the excess. In either case, the administrator will not be required to make any changes to the environment. In an ideal world, all this will take place automatically and seamlessly, with no adverse impact to service.
Storage by Policy
Clearly it will not be feasible for administrators to manage these SANs as discrete elements. In the future, storage systems will use policies to determine exactly how storage resources should be used, how to identify which application servers have higher priority, and what level of protection each system needs. The storage system will automatically move data, route traffic and rebalance resources as needed to meet the objectives and priorities outlined in these policies. Today's basic multi-pathing and load-balancing model will transform into a dynamic, coordinated system that adapts not only to traffic changes, but delivers flexible QoS, while allowing administrators to specify when the needs of different systems or even whole departments change.
Backup, Backup, and More Backup!
Ten years ago, the biggest challenge in storage management was backup. Today, the biggest challenge in storage management is ... backup. Given the trend, there is no reason to believe that this will change by 2010. What will change is the model used to address the backup challenge.

0
Windows Phone 7 Review, Part 1 – Unboxing

At Windows 7 News we’ll always bring you the best and latest news so I’ve secured a review unit from Microsoft of a new Windows Phone and will be bringing you a complete in depth review of Microsoft’s new smartphone operating system over the next couple of weeks.
The handset I’ve been sent is the HTC Mozart which is the phone I have been looking to upgrade to myself when my own contract allows at Christmas.  I’m not going to concentrate too much on the hardware for these reviews as it’s primarily about the OS, but you’ll want some comments on the handset obviously.
I was thinking of getting this handset for myself primarily for the 8MP camera and xenon flash which none of the other first generation of Windows Phone 7 handsets have.  It will be interesting to put this to the test.
The handset itself is incredibly light.  It’s almost as if there’s nothing in there and you have a dummy unit, but it’s a real working phone.  The build quality is up to HTC’s usual high standards too, though they will have to all maintain this as they’ll have plenty of competition from other handset manufacturers.
 
Windows Phone 0771 400x300 Windows Phone 7 Review, Part 1 – 
Unboxing





In the box there’s not really a lot going on.  There’s a tiny little charger that comes in three parts, the plug, the charger and the USB cable.  This is an extremely good idea as it means you instantly have an international charger you only have to buy a new plug module for.  The USB cable itself is micro USB which plugs into the phone and regular USB at the other end.   The USB port is on the left so don’t buy this phone if you later want to use it with a speaker or desktop dock.
There’s also a pair of headphones and some manuals to help you get started but they’re quite small and, as you’d expect, not at all in depth.  I was hoping here that they wouldn’t be necessary and that setup on the phone would be a complete breeze.  Setting up the phone is something I’ll come to tomorrow.

The screen is of an excellent quality, very bright and clear though I have to say, also very prone to smudges and finger marks.  If this were my own phone though I’d be buying plastic screen protectors.  It remains to be seen how the touch interface will work with these.
There are volume controls on the left in a sensible location, a camera shutter button on the right, but in a place that’s not easy to hit with your hand when using the phone and a power button and 3.5mm headphone socket sit on the top.  The insides of the phone are also sensibly arranged.  Slide the bottom rear of the phone off and flip up a clip and the battery and SIM can just slide out.  I’ll be reporting later in the review, when the phone is being used as I’d more normally use a phone, about the battery life as this is very important: though it’s worth noting that OLED screens don’t use any power when displaying black and so keeping the default black theme for the phone will extend the general battery life.

Windows Phone 082 400x533 Windows Phone 7 Review, Part 1 – 
Unboxing          Windows Phone 113 400x533 Windows Phone 7 Review, Part 1 – 
Unboxing
Now I have to say here that I’ve been evangelising about this new operating system since February and looking forward to the phone’s delivery eagerly.  Sadly I only have it for a week or so as review handsets are much sought after (it was a struggle even getting this one so quick and I had to call in some favours at Microsoft to do so).  I know that whatever the result of my experience with Windows Phone it will be difficult for me to go back to my regular phone, but as that’s only an HTC Touch HD you should hardly be surprised.
I’m determined to deliver an unbiased review however and there are already a couple of areas I’m concerned out.  You can click on any of the photos to view them full-size.
Part two : Set-up will come tomorrow.
Mike Halsey
www.Windows7News.com
Windows Phone 7 Review, Part 1 – Unboxing, 7.3 out of 10 based on 4 ratings

Tip: Click here to run a free scan for common PC errors



VN:F [1.9.6_1107]
Rating: 7.3/10 (4 votes cast)
Category: Windows 7 News
Next Post: »» Prev Post: »»









Minggu, 07 November 2010

0
Optimize windows 7

For users of Windows 7 or Windows Vista and want to change the hidden settings that exist, can use the Ultimate Windows Tweaker. Free and portable tools are used to tweaking and optimization, so they can make the operating system becomes more rapid, stable and more secure with just a few clicks.

Ultimate Windows Tweaker will automatically detect whether the use of Windows is Windows Vista / Windows 7, so the choices that appear automatically adjusted. What are the features of this program?
 http://ebsoft.web.id/wp-content/uploads/2009/07/ultimate-windows-tweaker.png

System Information:
- Displays operating system information, version + build number, rating system, processor, RAM, computer and other descriptions.

Personalization
- Windows Explorer, various options related to the display / menu in Windows Explorer.
- Customize Start Menu, like to hide some menu items and more.
- Taskbar Appearance as Disable Aero Peek preview, lock taksbar, disable windows previews (thumbnails), remove some icons and other.

UAC & User Accounts
- Change some of the menu at the Welcome Screen
- Change the text effects on the Welcome Screen, as well as background
- Some settings in the User Account Control
System Performance
- Changing Tooltip display the actual value in milliseconds
- Improvement "Action Menu"
- Tweak for performance systems, such as non-respondins end auto applications, auto restart shell, Uload DLL from memory, and others.
- Optimization services, such as Disable Superfetch service, the Windows Security Center, Windows Time service, printer spooling, Tablet PC, Windows Update and Windows Aero user interface.
Security Settigs
- Administrative restriction, like disabled registry editor, command prompt, task manager, the MMC snap-ins, WinKey Control, System Restore, changing the color and appearance, Control Panel, and other autoplay.
- Windows Explorer Restriction: Disable folder options, eliminating the security tab, features CD burning and eliminate the default explorer menu contents.
- Windows Application Restriction, such as disabling the Windows media center, sound recorder, Windows Defender, Sidebar, error reportin and windows mobility center.
- Windows Update Settings
Network Tweaks
- Various tweaks on network
- Otimalisasi bandwidth
Internet Explorer
- Reset IE to default settings (defaut)
- General, such as changing judu window, the download directory and the other
- Various settings on the Tab and Advanced configuration
Additional Tweaks
- Displays a context menu for drives and folders are also files and folders.
- Various other tweaks, such as disable Hibernation, windows startup sound, pagefile, encryption and other.

Download
Ultimate Windows Tweaker v2, a Tweak UI for Windows 7 & Vista | The Windows Club (Size 139 KB zip, exe files about 345 KB)
This program can not be used to tweak Windows XP. If you want to customize some hidden settings, can use the TweakUI which can be downloaded from the page Microsoft PowerToys for Windows XP













 
Education & Technology | © 2010 by Agus Hockey | Supported by Tips, Trik, and Technology & WordPress Theme 2 Blog

Kiriman ini mengonfirmasi kepemilikan saya terhadap situs dan situs ini mematuhi kebijakan program dan Persyaratan dan Ketentuan AdSense.