Monday, 15 June 2009

Wireless keyboard with TrackPad

While many laptop users choose to use a USB mouse instead of the trackpad. Now PC users are even a trackpad with terbuilt-up on the key board. It is USB 2.4 GHz RF Wireless Entertainment Slim Keyboard with Touchpad Smart who has 18 hot keys and features high Precision Multi-Touch touchpad.

Keyboard with a price range of $ 69 has a dimension that is less than the conventional keyboard. Approximately ¾ unturan times normal. The most interesting of this keyboard is the multitouch trackpad is also a ten-key number pad ..


With multitouch, you can use a combination of fingers to control the computer during the time that you can find on the latest macbook. With two and three fingers at the same time we can do activities, scrolling, zooming, window switching, Tapping and many more.

Additional 18 hotkeys for instant melaunch the program through the keyboard to create the position of the keyboard as this complement HTPC (Home Theater PC) increasingly feel.


A choice to either Media Center PC HTPC (Home Theater PC) or PC to conventional employment. Although interesting, this is not a keyboard option for user who want to have a replacement mouse for gaming activities tentunya.
techpowerup.com

Wednesday, 10 June 2009

Kevin Mitnick, Hacker Legend

A knock sounded from the door of apartments, Kevin Mitnick opened the door and found dozens of FBI agents and other law enforcement is prepared to catch it. This is the end of the journey of a hacker who had buron in order to avoid imprisonment. Hackers during buronannya it has obtained legendary status, has even grown into a myth that is greater than himself

The arrest happened in 1995 that marked the beginning of the case of the most controversial arrest of the perpetrator of a cyber crime. Mitnick is a computer system on it reincarnate as America's Most Wanted Hacker.

Addictions Computers

Mitnick easy to learn with computer nongkrong at radioshack store or diperpustakaan general, family berduit not enough to have your own computer. Favorite on the computer until he developed adult.

In the period of 1990s, Mitnick easy entry exit system. But in the late 1980s, he actually wanted to leave hobynya and starts looking for a legitimate job. Unfortunately, before he can do that, in 1987 he caught the pass in a company's Santa Cruz Organization, a software company that mainly engaged in the operating system Unix. When the lawyer mitnik successfully reduce the alleged crime to be a lack of good action, Mitnick was the only ganjar 3 years probation.

Not until the return trip a year Mitnick case law. Gara-garanya a friend that he use the computer to other computers break Mitnick reported that it is the obligation of times dibobol Mitnick is owned by Digital Equipment Corporation. Each time you break the computer is taking mitnik code composer of the software. Code and then he learned that very seriously, sometimes found several weaknesses in it. Mitnick opportunity in a just claim to take the code from the compiler software that he or the like for him.

In the case of DEC Mitnick prisoners who get the more weight. When the call Mitnick has pengacaranya, 'addicted to the computer that can not be stopped'. He diganjar 1 year in prison.

Mitnick in prison get a bad experience. At that time the legend of Kevin Mitnick, or better known by the name of the fictitious' The Condor ', is the draw. Reputation as a
computer criminals are also increasingly membumbung beyond reality. Warden at Lompoc, where the prison is located Mitnick, Mitnick think infiltrate into the computer can only start with the voice and the phone. Hence
Mitnick is not only can not use the phone, he also spent many hours in the isolation room. No wonder then if he dikabarkan experienced little interference when a life sentence at Lompoc.

In 1989 Mitnick released from prison. He tried to find a formal job, but their status as former prisoners make Mitnick difficult to maintain employment. Finally, he worked as a
pendulang information office for private investigators office. Of course this Mitnick dragged back to the world in the gray and black. In the early 1990s, Mitnickpun searched by FBI again. This time the fear of the entry room isolation for years, decided to Mitnick blurred.

Hacking The Human Side

Expertise as a hacker Mitnick is not limited to purely technical kemapuan. It is purely on technical ability. He was a correct understanding of the security computer system that consists of aspects of the organization's policies, human resources, process involved and the technology used. Had he seoarang hero super kemapuannya main seoarang that Mitnick is a social science practice engginering aka social engineering. This is a technique to get important information, such as passwords, by using human weakness.

Ability Mitnick is best illustrated in the following story, the story itself dikisahkan Mitnick on a forum online Slasdot.org

"On one occasion, my friend by the one to get the number (phone) Sprint Foncard it. He said that will buy dinner if I can get that number. I will not refuse to eat well, so I berusahan by contacting the Customer Service and perpura ostensibly as a part of information technology. I ask the officer replied that if he had difficulty in sitem used. He is not, I ask that the system used to access customer data, I want to pretend to verify. He mentioned the name of the system. "

"After that I call back Costumer Service and connected with a different officer. I said that my computer is broken and I want to see a customer data. He said that the data is already berjibun question. What's your name? You work for who? Address where you are? Yah, like that. Because my little research, I draw up a name and place only. Failed. He says the phone will report on the security of the phone. "

"As I noted his name, my friend and sorang bring about a situation that will happen. I ask that friend to masquerade as' keamaman investigators' notes for a report from the Customer Service and speak with the officers before. As the 'investigators' he said to receive reports of people try to get the customer's personal information. After a phone interview earlier question, 'what investigators menyakan the requested information before the caller. Officials say the number Foncard.' investigators' to ask, how is the number? And the officer is to give the number. Oops. The case is finished "



I as a fugitive Mitnick berusahan as much as possible not to be caught. He often moved residence and always throw a variety of habits. Many ways he did so by not being pengejarnya. But he can not leave hobinya mengoprek computer network and internet. Perhaps even some expertise is used to obtain a new identity.

Legend Mitnick during in approximately two years, more and aggravate it menjelama as' Cyber Ninja 'which seems to break the computer with the Pentagon only television remote, a rumor that exceeds any fictional story.

Why Mitnick, in the case of a buron piercing machine, could become the most sought criminals? This is not separated from the role of mass media. In particular is a series of sensational articles from John Markoff published in the New York Times.

Markoff condemn Mitnick is like a terrorist. In a statement released after a long, Mitnick himself mentions that the image displayed Markoff like seoarang terrorist who tried to control the nuclear world. "I will be a fake Osama bin Mitnic," he said archly.

Markoff describes Mitnick as a death, can not be terminated and is eligible to become FBI fugitive ten large and other law enforcement. Article Mafkoff, which sometimes appears on the front page, the candidate most Mitnick pilot project on cyber crime. Mitnick then the future may be spelled out in the prison have also written saati.

During a buron Mitnick also continue to run aksinya. He break many big computer companies. Including Sun Microsystems. It uses, and maksutnya here is the account of a break in the online storage service to store the backup of the results aksinya. Mitnick does not actually work alone, but when caught he never said anyone colleagues.

One of the victims of Mitnick is T. Shimomura, a computer expert in any posts on the Internet some doubt kebersihannya. There are allegations that Shimomura was also a hacker who frequently perform illegal acts. One thing that many have approved Shimomura is the attitude seems arogan and want to appear as a hero in the story Mintick hunting.

Shimomura, Markoff and FBI shoulder shoulder to catch the fugitive. Guide's news sensasionalnya Mafkoff, Shimomura hacking ability and power of law to the FBI finally track Mitnick residence.

As the story usually tertangkapnya seoarang buron, Mitnick do ketledoran. Storage service that he has apparently use automated programs to fill mencek file saved. The owner of the account that is used to get Mitnick's warning system on the excess capacity. This is the beginning of the tertangkapnya Mitnick.

Mitnick admitted that his careless because they do not suspect that the FBI, Shimomura, Markoff, and wireless phone service provider to work together so closely and integrated.

"Plans mobile searches in the database against the billing them to dial-up Internet service Netcom POP. This, as can be suspected, they can identify the area and call the number MIN (mobile identification number) that I use at that time. Because I often switch number , they observe any call data that occur in these locations. Then, with the tool Cellscope 2000 Shimomura, track the signal to my phone to the right location, "Mitnick menuturkan.

Two weeks before tertangkapnya Mitnick new move to Raleigh. New location less vigilant and make sure he track line to dial-up digunakannnya. Several hours before tertangkapnya Mitnick something new happens, tracking and control is being carried out on paths that use it. When he is trying to track the extent to which control has been done to whom dilbalik tracking, and he heard the door knocking. Mitnick opened the door and faced with dozens of FBI and U.S. Marshall.

Four Half Year swing

Mitnick arrested after caught with no possibility of collateral. He also never asked for the court. Approximately four years to spend it without any certainty. This is really frustrating to make Mitnick.

During the FBI in prison, he did not get the opportunity in the case. Mitnick even pengacaranya and I can not see the case as there is in the laptop and access for laptop Mitnick is considered dangerous. Mitnick dituding cruise missile can only make a start laptop or phone. Larangn is still valid even if pengacaranya use a modem and a laptop without any network capability.

Mitnick eventually dituding cause damage to hundreds of million dollar losses that Mitnick is not correct, because it seems that companies do not even report the disadvantaged loss in their annual reports.

Mitnick final agreement for recognition is guilty. Guilty in the case of piercing the computer and tapping phone lines. Mitnick surrender and follow it, the rewards years 4 years more time in prison is as mas custody. Total Mitnick punished dipenjara is 5 years, 4 years in the custody of float and the rest 1 year.

He was released in 2000 with the condition should not touch the computer or phone. In 2002 he could use a new computer but not connected to the Internet. New in 2003 he was using the Internet for the first time.

Since exempt Mitnic trying to improve his life. He write two books about hacking, other than that he also founded its own security consulting company. "Hacker is the only crime that expertise can be used again for something that unethical. I never see it in others, eg ethical robbery," said Mitnick.

Author: Antonius Fran Setiawan

Friday, 1 May 2009

Phishing attacks on Facebook

Phishing attacks on Facebook The Generalized Print E-mail


Image Name of Facebook as the largest social networking website in the world also did not escape the target of cyber criminals. Having previously managed to overcome the problem of the debate about their Terms of Service, this time Facebook Phishing problem. For two days today, some dangerous attacks provoked by the victim to a fake web site Facebook is reported to have occurred.
The signs of phishing on Facebook fairly easily recognizable. Users receive a message from the contact list that usually contains the words "Check this out". Then the perpetrator invited the victim to click on a link that will take them out of Facebook. On Thursday, Facebook users receive messages from FBStarter.com. Meanwhile on Wednesday the attack to come from BAction.net Facebook.

Facebook party claimed that the attacks stopped every few hours on each case. Facebook also stated that there is no certainty whether the attack of the two websites are related to each other or not.

Facebook have removed the URL from the member page and remove URLs in mail messages. For users who have been caught this phishing attack, the Facebook has reset their password. Facebook also encourage the user should not clicking on suspicious links and recommends that users who have become victims to immediately change the password.

Some time ago, phishing attacks also has begun intensively occurs in the virtual world. Some of these phishing attacks occur through popular IM such as Yahoo Messenger. Phishing is the process to obtain sensitive information such as usernames, passwords and even credit card details by pretending to be the owner of the website.

Usually the offender to lure victims into the website created similar to the original website. On the web page that, the perpetrator has put a username and password box and asked victims to fill the box. In fact the victim had given a username and password to the perpetrator.

Saturday, 7 March 2009

Turning on Registry Tricks

Turning on Registry Tricks

Turning on Registry Tricks

Registry is a role in the life of the windows .. ehm but how do if the registry Disable by Administrator ... especially exposed to the virus have been completed .. suffering ... I can do the windows ..
how to continue to turn back? I also do not know ... he neh .. xx just kidding.
simply copy the script below:

/ / Program regedit
/ / Name of Program: regedit.js
var vbCancel = 2;
vbYesNoCancel var = 3;
vbYes var = 6;
var vbNo = 7;
vbQuestion var = 32;
var vbInformation = 64;
Nathan var = WScript.CreateObject ( "WScript.Shell");
var pesan1 = "regedit Security Options: \ n \ n" +
"[Yes] to Disable regedit. \ N" +
"[No] to Enable regedit. \ N" +
"[Cancel] to Exit. \ N \ n" +
"[.:: Bolank::.] \ N \ n "+
"-> Disable regedit now?"
var a = natan.popup (pesan1, 0, "Security regedit", vbYesNoCancel +
vbQuestion);
if (a == vbYes)
(
natan.RegWrite ( "HKCU \ \ Software \ \ Microsoft \ \ Windows \ \ CurrentVersion" +
"\ \ Policies \ \ System \ \ DisableRegistryTools", 1, "REG_DWORD");
pesan2 = "regedit Disabled!"
natan.popup (pesan2, 0, "Security regedit", vbInformation);
)
else if (a == vbNo)
(
natan.RegWrite ( "HKCU \ \ Software \ \ Microsoft \ \ Windows \ \ CurrentVersion" +
"\ \ Policies \ \ System \ \ DisableRegistryTools", 0, "REG_DWORD");
pesan3 = "regedit Enabled!"
natan.popup (pesan3, 0, "Security regedit", vbInformation);)
else
(
natan.popup ( "Thank Kasih.Thank You.Danke.", 0, "Security regedit", vbInformation);
)


already in a copy .. then save with the name "regedit.js" without quotes two ...
how I continue?
ehm regedit.js search files on direktory where you save and then click 2x,

select "yes" to disable regedit.

select "no" to enable regedit.

continue to do if I cancel? you thought it out? heexx hee ..
that to cancel ..

try .. congratulations!

in the quotation from: http://www.yogyafree.net/magazine

Sunday, 1 March 2009

Registry Komputer

Registry computer

1. Restore the Lost Document folder in My Computer
Sometimes the virus hides the folder. Often we think that we have already deleted the folder. In fact, if the folder is only hidden, we can show it again through the registry.
HKEY_LOCAL_MACHINE> Software> Microsoft> Windows> Current Version> Explorer> DocFolderPaths
• Select the Edit menu> New> String Value and name in accordance with the username that is used in Windows (for example: Chippers).
• Double-click on the value and enter the path where you are Documents (for example, D: \ Documents).
2. Name Change Default Shortcut on Desktop Important
Default shortcuts are not reimbursed can use the rename. If you want to change the name to be unique, eg "Recycle Bin" to the "Trash" can be done den ¬ gan way as below.
HKEY_CURRENT_USER> Software> Microsoft> Windows> Current Version> Explorer> CLSID
Double-click on the default value in each subkey below:
• My Network Places:
(208D2C60-3AEA-1069-A2D7-08002B30309D)
• My Computer:
(20D04FEO-3AEA-1069-A2D8-08002B30309D)
• My Documents:
(450D8FBA-AD25-11DO-98A8-0800361B1103)
• Recycle Bin:
(645FF040-5081-101B-9F08-OOAA002F954E)
• Default IE Icon:
(871C5380-42AO-1069-A2EA-08002B30309D)

3. Lock the Taskbar
Taskbar on Windows by default located at the bottom of the Desktop. We can only put this Taskbar at the top or at the side of the Desktop. When we have it with man-Taskbar position, we can lock the taskbar is that the position does not move (shift).
HKEY_CURRENT_USER> Software> Microsoft> Windows> Current Version> Explorer> Advanced
• Double-click on TaskBarSizeMove enter the number 0 and the Value Data.
4. Hide System Tray
Is a system tray icon that appears in the small right down ¬ Desk top. System tray can not be hidden with the normal way. We can hide it by making modifications to the registry, is as below.
HKEY_LOCAL_MACHINE> Software> Microsoft> Windows> Current Version> Policies> Explorer
• If there is no Explorer key create a new DWORD Value and name NoTrayltemsDisplay.
• Double-click NoTrayltemsDisplay and enter the number 1 in the Value Data.
• To restore the System Tray enter a number from 0 to the Value Data

5. Desktop Create More Stable
Steps to optimize the performance of desktop as follows:
HKEY_CURRENT_USER> Software> Microsoft> Windows> Current Version> Explorer
• Create a new DWORD Value and name DesktopProcess.
• Double-click DesktopProcess and enter the number 1 in the Value Data.
6. Hide the Desktop Icon
Desktop Shortcut Icon on the speed when we open a file or application. However, if you have too many icon and you make a headache, you can hide the Shortcut Icon. The screen on the desktop wallpaper will only be visible only to its (empty). All icon is hidden but not removed. HKEY_CURRENT_USER> Software> Microsoft> Windows> Current Version> Policies> Explorer
• Add DWORD NoDesktop, give value: 1.
• Log Off to get results.

7. Disabling Right Click on the Desktop
Right-click on the Desktop icon to be done and the men-gaturtampilan Desktop. We can disable right-click on the Desktop when we do not want to change the appearance of the Desktop.
HKEY_CURRENT_USER> Software> Microsoft> Windows> Current Version> Policies> Explorer
• Create a new DWORD Value and name NoViewContextMenu.
• Double-click on NoViewContextMenu and enter the number 1 in the Value Data.

8. Eliminate Tab Screen saver
Screen saver allows our favorites can be modified by other penggu-na. Screen saver so that we secure from other users, just missing a tab-screen saver it.
HKEY_LOCAL_MACHINE> Software> Microsoft> Windows> Current Version> Policies> System
• Create a new DWORD Value and name NoDispScr-SavPage.
• Double-click NoDispScrSavPage and enter the number 1 in the Value Data.

9. Disable the Windows XP & Animation
Animation is visible at the time we minimize a window. Although the moment but still using the CPU resources. If we do not need a computer and want to work more quickly, we can turn off this feature and also reduced the burden of the processor. Animation can be in-disable the following way:
HKEY_CURRENT_USER> ControlPanel> Desktop> WindowMetrics
• Double-click on MinAnimate, enter the numbers 1 to turn off, or 0 to enable it again.
10. Remove from the My Computer Desktop
My Computer icon on the Windows version can not be certain dihilan-gkan. We can only removed it with the registry change as follows:
HKEY_CURRENT_USER> Software> Microsoft> Windows> Current Version> Policies> NonEnum
HKEY_LOCAL_MACHINE> Software> Microsoft> Windows> Current Version> Policies> NonEnum
• Create a new DWORD Value (if not already there) and name (20D04FEO-3AEA-1069-A2D8-08002B30309D).
• Double-click (20D04FEO-3AEA-1069-A2D8-08002B30309D) and enter 1 in the Value Data.

11. Information on the Windows Desktop Version
Want to know the version of Windows that we use? This information can be known with the registry change as follows.
HKEY_CURRENT_USER> ControlPanel> Desktop
• Create a new DWORD Value (if not already there) and name PaintDesktopVersion.
• Double-click PaintDesktopVersion and enter 1 in the value of data

12. Pop-up shows in the Description Explorer and Desktop Items
Pop-up ads or similar, while the very pro-lnternet (browsing). To prevent pop-ups that often appear, such as how to use the following.
HKEY_CURRENT_USER> Software> Microsoft> Windows> Current Version> Explorer> Advanced
• Create a new DWORD Value (if not already there) and name ShowlnfoTip.
• Double-click ShowlnfoTip and enter 1 in the Value Data.
13. Turn off the Desktop CleanUp Wizard
Desktop Wizard CleanUp will eliminate the old desktop icon. Icon so that you can not be removed by any other people who run CleanUp Wizard, you may need to disable these CleanUp Wizard.
HKEY_CURRENT_USER> Software> Microsoft> Windows> CurrentVersion> Explorer> Desktop> CleanupWiz
• Create a new DWORD Value and name NoRun.
• Double-click NoRun and enter the number 1 in the Value Data.
14. Remove from My Desktop Document
My Documents icon on the Windows version can not be certain in-delete. If we want, we can delete the registry change as follows:
HKEY_CURRENT_USER> Software> Microsoft> Windows> CurrentVersion> Explorer> CLSID> (450D8FBA-AD25-llDO-98A8-0800361-B1103)> ShellFolder
• Change the value in a key Attributes Oxf0500174.
• Press F5 to see the results.
15. Restrict Access Control Desktop Theme
Theme reflect the characters in the Windows user-puter cereal bowl. The scope of the theme that includes wallpaper, screen saver, sound, and so forth. If you do not like your favorite Windows Theme often changed people, amankan only. Perubah-stop access to a theme in the following ways:
HKEY_CURRENT_USER> Software> Microsoft> Windows> Current Version> Policies> System
• Create a DWORD Value, or some new name with the following:
o NoVisualStyleChoice - Disable the "Windows and buttons" style control
o NoColorChoice - Disable the "Color scheme" control NoSizeChoice - Disable the "Font size" control
• To activate the limits, enter the number 1 on each Value Data.

• To activate the default style, create a String Value and name SetVisualStyle.
• Double-click SetVisualStyle and enter the file path location. Ms-styles as desired.
16. On an Desktop Security
Even the view Desktop also can not be safe from the threat of spy-ware and viruses. To secure the Desktop from spyware and viruses that make possible conversion, do the following.
HKEY_LOCAL_MACHINE> SOFTWARE> Microsoft> Windows NT> CurrentVersion> Windows
• Create a new DWORD Value and name-SecureDesk top.
• Double-click SecureDesktop and enter the number 1 in the Value Data.
17. Changing the Active Desktop Background In Safe Mode
To distinguish between normal mode and safe mode, would better if we set the wallpaper that appears on the safe mode. Wallpapernya can also create your own, eg its "warning, you have a computer failure."
HKEY_CURRENT_USER> Software> Microsoft> lnternet Explorer> Desktop> SafeMode> General
• Double-click Wallpaper and enter the path and the desired location of the wallpaper in the Value Data.
Configuration tab hide Theme
One solution that does not change Windows Theme is de-ngan hide Theme configuration tab. Next tricks to hide the theme configuration tab in the Properties Dekstop.
HKEY_CURRENT_USER> Software> Microsoft> Windows> Current Version> Policies> Explorer
HKEY_LOCAL_MACHINE> Software> Microsoft> Windows> Current Version> Policies> Explorer
• Create a new DWORD Value (if not already there), and name NoThemesTab.
• Double-click NoThemesTab and enter the number 1 in the Value Data.

rangertox

Thursday, 26 February 2009

Game Developers Conference Reveals Keynote Speakers
San Francisco, Calif. – The Game Developers Conference revealed that Hideo Kojima and Satoru Iwata will both be providing keynote addresses at the upcoming event, as well as announced the the finalists for the Game Developers Choice Awards. New sessions on the ups and downs of working with physics for Little Big Planet, as well as lessons learned from the decline of Flagship Studios.




(2/17/2009)












In newly announced sessions, developers of Mirror’s Edge will reveal the secrets of creating an authentic first-person perspective, Media Molecule will discuss the challenges of developing a game centered around creative gaming, and speakers from Disney Interactive, Activision, and others will talk about how to deal with the business of gaming in an increasingly volatile economic and technological environment.

Meggan Scavio, event director for the GDC, has confirmed sessions covering Dead Space, Little Big Planet, and the decline of the late Flagship Studios.

Metal Gear creator Hideo Kojima and president and CEO of Nintendo Satoru Iwata will extol their unconventional insights into game development in their keynote addresses, while the prestigious Game Developers Choice Awards honor the very best games released over the past year with the lists of nominees for this year’s ceremony.

The GDC Team and the advisory board is on a constant hunt for new and interesting content and sessions from the most experienced developers in the world. From managing a video game company in a volatile and changing economic and technological environment, to giving player a true first-person experience, to the ups and downs and developing one of the year’s biggest (little) games, each session will impart a unique lesson to participants.

For a full list of finalists for the Game Developers Choice Awards, check out http://www.gamechoiceawards.com/winners/index.htm#nom. Did your favorite game make the list?

For more information about the Iwata and Kojima Keynotes, check out
http://www.gdconf.com/conference/keynotes




Wednesday, 18 February 2009

Image Metrics Introduces Four Facial Animation Service Levels for Video Game, Film
Los Angeles - Image Metrics, a provider of facial animation services for the entertainment industry, has introduced four new facial animation service levels for film and game customers.

The four new service levels range from facial animation for background video game characters to photorealistic digital doubles for live-action movies. All offerings use Image Metrics’ proprietary facial animation technology to analyze an actor’s facial performance and transfer it with all of its subtleties and nuances to a 3D facial rig.

The service levels include:

Value: At roughly half the cost of standard facial animation, this service level uses Image Metrics’ proprietary technology to automatically generate high volumes of high-quality facial animation for secondary characters in games or for pre-visualization purposes.

Pro: Ideal for important in-game scenes and cutscenes, this service level offers more subtle facial movements on advanced games rigs as well as iterative cycles to help clients capture better performances.

Premium: This level provides greater creative control with pore-level analysis of facial movement and more fine-tuning of the performance. Including optional support for multi-camera performance capture, it is ideal for more budget-conscious film studios or VFX houses that need high quality CG faces for films, visual effects shots or television spots.

Elite: Image Metrics’ highest level of service takes advantage of the very best its technology-based service has to offer. From HD (and up) support to optional multi-camera performance capture, superior analysis detail to multiple creative iterations, this level gives quality-focused directors the freedom to create completely believable digital faces for their most important scenes.

For easy integration into customer pipelines, all service levels include a final output of animation curves that work with the leading 3D software applications. Ongoing customer service is also included in all service levels.
at www.cgw.com
Autodesk Takes 3D Design and Documentation to Next Level with AutoCAD 2010
San Rafael, Calif. - Autodesk Inc. has released AutoCAD 2010 software, the latest version of its design and documentation platform. Autodesk also announced the 2010 AutoCAD family of discipline-specific software and AutoCAD LT 2010 software for professional drafting and detailing.
(2/9/2009)
AutoCAD 2010 sports new capabilities designed to help users tackle challenging design problems, including free-form design tools, parametric drawing, and enhanced PDF support.



AutoCAD 2010 provides more power and innovation to help users document, communicate, explore, and customize design ideas, says a representative. With new free-form design tools, users can more easily explore ideas in 3D models to create virtually any shape.



AutoCAD 2010 now also supports 3D printing, for the production of physical 3D models and physical prototypes. New PDF import and underlay, enhanced publishing features, and constraint-based parametric drawing tools round out the new offering.



The latest release of AutoCAD LT 2010 professional 2D drafting and detailing software features PDF input and output enhancements, additional 2D drafting commands for viewing and editing drawings, and 2D drafting tools from AutoCAD to help increase productivity.

Autodesk Design Review 2010 software is available as a free download to users of any Autodesk product, including the AutoCAD 2010 family of products.

Product availability varies by country. Details and purchasing options will be accessible beginning March 24, 2009, at www.autodesk.com/autocad.
Independent Games Festival Student Showcase Finalists Revealed

San Francisco - The 2009 Independent Games Festival (IGF) has announced the 10 winners in the Student Showcase for its 11th annual awards, with games from three continents spanning ecological, paint-splattering, and fantasy exercise games to be shown at GDC this year. Chosen from a new record of 145 Student Showcase entries, these games will go on to compete for an overall Best Student Game prize, to be awarded at the IGF Awards Ceremony on the evening of March 25, 2009.
(1/22/2009)
Among the year's Student Showcase winners are: CMU's active play exercise-centered game Winds Of Orbis, quirky Danish first-person dishcleaning game Dish Washington, and ecological management puzzle game City Rain from Brazilian students.

Also honored are titles including USC's abstract painting game The Unfinished Swan and reality-manipulating sidescrolling shooter Zeit Squared.

All IGF finalist games will be exhibited at the IGF Pavilion at this year's Game Developers Conference. GDC, ThinkServices' annual conference dedicated to the art, science, and business of games, takes place March 23 through 27 at the Moscone Convention Center in San Francisco.

Each finalist in the IGF Student Showcase will receive a $500 travel stipend to help aid expenses for the trip to GDC 2009. The winner of the IGF Best Student Game Award will receive a special trophy and $2500 cash prize during the ceremony.

The Student Showcase games and game mods that will be considered for the 2009 Best Student Game Award are all highlighted on the IGF Web site, and the full list of finalists follows:
Tag: The Power Of Paint (DigiPen Institute Of Technology, Seattle)
Feist (Zurich University of the Arts, Switzerland)
Winds Of Orbis (Carnegie Mellon - Entertainment Technology Center, Pittsburgh)
Dish Washington (The National Academy of Digital, Interactive Entertainment, Denmark)
The Unfinished Swan (University of Southern California)
Where Is My Heart? (Universität Ulm, Germany)
The Color Of Doom (The Guildhall at SMU, Texas)
City Rain - Building Sustainability (Universidade Estadual Paulista, Brazil)
Kid The World Saver (University Of Southern California)
Zeit Squared (Technische Universität Berlin, Germany)
Hacker or Cracker

Hacker any posts in Eric Steven Raymond is "there is a community, a shared culture, of expert programmers and networking that Wizards Trough its history back decades to the firs time-sharing minicomputers and the earliesr ARPAnet experiment"

In other words, Raymon said, "the members of this culture originated the term 'hacker'." The hacker and then introduce the internet, create programs to UNIX operating systems can be used at this time. And the hackers are the ones who have been meritorious in the World Wide Web so that it can be enjoyed by all people around the world anywhere in the home he was connected to the internet.

More Raymon says "if you are on this community and if you have distribution inside, and then people recognize you as a hacker, then you are a hacker."

Overview of the views we can Raymon that one definition of a hacker are not evil as we think about this. Yes, if they can enter into our computer (through the Internet) because they can take in knowledge. However, if there are people who enter illegally and then into our computer and then "steal and make random" our data, they are a cracker. And they can be a hacker in the world of difference. With the line, they are all experts in information technology, and working seriously on.

However, to avoid confusion, a key word in this problem, according to Raymon is the difference between them; a Hacker is one who built the system, while even a cracker "destroy". (How to become a hacker, Eric S. Raymond, 2001).

When a hacker term trend as a crime that frightening? Not because "sin" in the hollywood film expert deflect the term hacker and cracker this. Many of the themes the film hackers in the form of a "crushing system information" that should be applied to the meaning of a cracker.

A film such as the Net (1995), Take Down (1999). Movies are the theme for his hacker cracker.

And interpretation of mistake before, until now the term hacker is still dibiaskan with the term cracker. Confusion is not only happening in Indonesia alone, even outside negeripun the views of both the same as that.

Term hackers appear in the early 1960s among members of the student organization's Tech Model Railroad club in artificial Intelligence Lab Masschusetts Institute of technology (MIT). The term hacker was initially positive to mention means a member who has expertise in the field of computers and able to make progranm computer with better rather than the previous (Understand characteristics Hacker Community: Case Study on the Indonesia Hacker Community, Donny BU, M. Si)

BECOME A Hacker

Perhaps a glimpse of the definition above is enough to restrict far the role of a hacker and cracker that. This will not lift the hacker and the early history began guilty. But more on drip difficult if we learn how to become hackers. Or more specific, we can become a hacker?

In any posts How to Become a Hacker, Eric Steven Raymon said that a hacker is not easy the suspected. The first step to becoming a hacker must take a minimum of 5 existing programming languages. He mentions programming languages C / C + +, Java, Perl, Python & LISP. In addition, the program is able to interact with the HTML to be able to build a communication network with the Internet. Above all the basic science that is "mandatory" if we owned the interest to become a hacker sincere. Because basically a Hacker is the mastery of reading and writing code.

What code? Because the computer that we run every day at its core is comprised of different code instructions quite complex.

In addition to control over the programming language, we must also have adequate provision in the English language to be able to exchange thoughts with the hacker community from around the world. This is not prohibited because, in general, they (community members) have a code of ethics apart on open-source code or program that can open and processed especial by others. Example, the code in Linux that flare introduce recently has the concept of open source and therefore can be owned by the public as free software.

Back on the issues above, to be a hacker for the purpose of sharing knowledge in information technology, or in a wider sense to facilitate the computer in the future, it should not be scared. Instead, knowledge must be translated and equally so dug into the terintegral in the Lika-coil cyber world. Provided that we are not stuck on the negative behavior so that to be a cracker sitem break the secret of others.

START A Struggle

When we intend themselves to be more familiar with the hacker world, then some provision other than those mentioned above, the control of programming languages, html and the English language, seems intent also must be equipped with a basic attitude and orientation of our initial goal to become a hacker. Instead of being an expert is good programming, even if not properly be stuck on the negativ behavior that is not only harming people but boomerang. I wonder, if just in case you become a cracker and you are like other people to open the secret, then, do not hope that you can easily walk to other countries. Because, said several sources, your name is on the "black list" as cyber criminals?

On the side of this interesting to see in one hand, we need a sophisticated technology that often appear in seconds, the other side is stuck on worry fear pattern "wrong" that result in Patal. However, as a gesture, we stand on the agreement, that learning languages is offered by Eric Steven Raymon above, is a good thing. Because the find, at least we can get a solution to make the program useful for other people. And if this is done, believe, you are a hacker.

Monday, 16 February 2009

tips and tricks

Hidden user login in the menu
Filed under: tips and tricks

sometimes we want our presence once / user account on the PC does not want to know the people usil, who always try-try to enter the area acount with how we try password, how do we hide the user from the user switch.

I open start> run> type regedit>
HKEY_LOCAL_MACHINE \ SOFTWARE \ Microsoft \ WindowsNT \
CurrentVersion \ Winlogon \ SpecialAccounts \ UserList

create a new DWORD Value, enter the user name you want to get rid of (hidden)

then automatically a user account that you have not shown Is login, then how to display it again, you simply press the button
ctrl + Alt + del and typing their own user + password. OKE guest ..!
and that with the requirement if there is a user who is still active, Alt + ctrl + del does not follow, you must first disable all users or restart your computer, this moment can be used


in the copy and paste from

topengdigital.blogsome.com
Overcoming Virus Tutorial
Filed under: tips and tricks, tutorials

paste copied from http://www.oprekpc.com/

PART 1: CAPITAL BASIS
1. Alternative ways to Running Program

Generally, we click the program icon in the start menu or the desktop to run certain programs. But the programs do not all utilities are available in the start menu or the desktop. These programs (for example REGEDIT.EXE, CMD.EXE) usually run through the Start menu> Run. What can we do if the menu does not Run in the start menu? Here are some alternatives to run certain programs in a manner that is' not normal ':

a. Use Windows Explorer

Run Windows Explorer, locate the file you want to run the program in the folder C: \ Windows or C: \ Windows \ System or C: \ Windows \ System32. Then double click on the file program.

b. Use Command Prompt (CMD.EXE)

= Click Start> Programs> Accessories> Command Prompt, or run CMD.EXE first way above.

= Type the name of the program who want to run and press enter.

C: \ Documents and Settings \ mr. orche!> regedit

c. Using a Batch File

Notepad = Run through start menu or through Windows Explorer.
= Type the name of the program who want to run, for example, "regedit" (without quotation marks).
= Save the file using the extension. Bat, for example, "TES.BAT".
= Run the file. Bat through Windows Explorer (double click).

d. Using Task Manager (TASKMGR.EXE) (Windows XP)

= Press Ctrl + Alt + Del.
= Click the button [New Task ...] on the Applications tab.
= Type the name of the program, and press enter.

e. Use the File Browser ACDSee

= Run from the Start Menu ACDSee.
= Find the file you want to run in the file browser window.
= Double-click on the file program.

2. Alternative ways of Registry Operations

If you can not run regedit, registry operations can still be done with some of the following alternatives:

Alternative 1: Using the Reg

1. Run Command Prompt (CMD.EXE).

2. To see a list of key and value, use the command QUERY lokasikey Reg.
Example:
Reg QUERY HKLM \ Software \ Microsoft \ Windows \ CurrentVersion \ Policies \ Explorer
Reg DELETE HCU \ Software \ Microsoft \ Windows \ CurrentVersion \ Policies \ Explorer

3. DELETE namakey type Reg / V namavalue to delete a certain value.

Example:
Reg DELETE HKLM \ Software \ Microsoft \ Windows \ CurrentVersion \ Policies \ Explorer / V NoRun
Reg DELETE HKCU \ Software \ Microsoft \ Windows \ CurrentVersion \ Policies \ Explorer / V NoFolderOptions

Note:

= Abbreviated name should be root, HKCR for HKEY_CLASSES_ROOT, HKLM for HKEY_LOCAL_MACHINE, HKEY_CURRENT_USER to HKCU, HKU to HKEY_USERS, and so on.

For name = key that contains a space, name key diapit with double quotation marks.

= To find out more operating procedure using Reg, type "Reg /?" Without the quotes.

Alternative 2: Using the file. Reg
1. Run Notepad and type the following as examples:

New format (WinXP):
Windows Registry Editor Version 5:00
[HKEY_CURRENT_USER \ Software \ Microsoft \ Windows \ CurrentVersion \ Policies \ Explorer]
"NoFolderOptions" = dword: 00000000

Old format (Win9X/NT):
REGEDIT4
[HKEY_CURRENT_USER \ Software \ Microsoft \ Windows \ CurrentVersion \ Policies \ Explorer]
"NoFolderOptions" = dword: 00000000

2. Save the file with the extension. Reg, and then double-click on the file. Reg that has been saved.

Description:

= The first line, "Windows Registry Editor Version 5:00" or "REGEDIT4", is a basic rule to mark the file registry.

= Second line, "[HKEY_CURRENT_USER \ Software \ Microsoft \ Windows \ CurrentVersion \ Policies \ Explorer]" indicates the location of registry key, where the list value with the value of the data mentioned below will be stored.

= Third line, "NoFolderOptions" = dword: 00000000, mentioning the name and its value data to the desired value is. In the example this means that the change / provide valuable data on the value 0 is called "NoFolderOptions".

= File regedit that a format with WinXP (new format) or long format (Win9X/NT), both can be used for Windows XP, but the old format can be used only for Windows 9X/NT.

Alternative 3: Using a Startup Disk (only valid for Win9x)
This is the most difficult, and may be the only effective way to restore registry when the system has been paralyzed terlanjur at all.

1. Boot using the Startup Disk
a. Enter the Startup Disk floppy drive to Win95/98.
b. Restart (make sure the configuration settings in the BIOS boot sequence to floppy disks).

2. Go to the directory (folder) C: \ Windows
A: \> C:
C: \> CD WINDOWS

3. Perform the export of data to the registry file. Reg key specific to the desired
Format command:
Regedit / E namakey namafilereg

Example:
Regedit / E HKEY_CURRENT_USER \ Software \ Microsoft \ Windows \ CurrentVersion \ Policies \ Explorer TES.REG

If the key contains spaces, use quotation marks:
Regedit / E "HKEY_CURRENT_USER \ Software \ Microsoft \ Windows \ CurrentVersion \ Policies \ Explorer" TES.REG
3. Back issue Folder Options Menu in Windows Explorer

Some of the viruses need to hide the files so that a particular user (the computer) does not recognize the virus and the virus is more difficult to remove, by creating a hidden file. Is still hidden files can be viewed by the user if the settings in the Folder Options option 'Show hidden files and folders' is enabled. Sometimes the very day removed by the virus to ensure the virus files are not visible. To hide the Folder Options menu, how to most easily and most commonly applied by the virus is to change the registry settings, insert the value "NoFolderOptions" is worth 1. To display the Folder Options menu again, this value should be removed, or changed the value to "0".

= To change these settings Folder Options, click the Tools menu> Folder Options in Windows Explorer.

Value = NoFolderOptions in the registry are one or two locations below:

HKEY_LOCAL_MACHINE \ Software \ Microsoft \ Windows \ CurrentVersion \ Policies \ Explorer

HKEY_CURRENT_USER \ Software \ Microsoft \ Windows \ CurrentVersion \ Policies \ Explorer

Value can be removed by using the regedit program, or by typing the following command in the Command Prompt:

Reg DELETE HKEY_LOCAL_MACHINE \ Software \ Microsoft \ Windows \ CurrentVersion \ Policies \ Explorer / V NoFolderOptions

Reg DELETE HKEY_CURRENT_USER \ Software \ Microsoft \ Windows \ CurrentVersion \ Policies \ Explorer / V NoFolderOptions
4. Display the Run Menu

Delete value "NoRun" or change the value to be 0 using the registry operation (see sample registry operation to display the Folder Options menu at the top). Value "NoRun" is the key:

HKEY_CURRENT_USER \ Software \ Microsoft \ Windows \ CurrentVersion \ Policies \ Explorer
5. Display the Find Menu

Delete value "NoFind" or change the value to be 0 using the registry operation (see sample registry operation to display the Folder Options menu at the top). Value "NoFind" are on the key:

HKEY_CURRENT_USER \ Software \ Microsoft \ Windows \ CurrentVersion \ Policies \ Explorer
6. Enable regedit

Sometimes regedit can not be started because the registry settings to disable by the virus. To restore, delete the value "DisableRegistryTools" or change the value to be 0 by using the Command Prompt (for WinXP), or by creating a file. Reg (only for Win9x).
7. Create files with the Hidden Atributnya Change Through Command Prompt

Hidden file (hidden) can appear without play Folder Options, but turn off the hidden attribute on the file. Hidden file attribute can only be changed in the Windows Explorer Folder Options settings if possible hidden files displayed. Alternative is to change the attributes of the file through the Command Prompt. To see a list of hidden files via Command Prompt, use the command "DIR / AH". Then use the attrib command followed by the parameter attribute to be changed. The following example can be used to turn off the hidden attribute, read only, and the system at once, on all active files in the directory:

Attrib-r-s-h *.*
8. Search for File Through Command Prompt

a. View a list of files / folders that are in the current folder:

DIR *.*

b. View a list of files / folders that are in the current folder, including file / folder hidden:

DIR *.* / A "A" stands for "ALL"

c. View a list of files (not including the folder) that is located in the current folder:

DIR *.* / AD "D" stands for "DIRECTORY", "-" means that the exception

d. View a list of folders (not including the file) that is located in the current folder:

DIR *.* / AD "D" stands for "DIRECTORY"

e. View a list of files / folders hidden:

DIR *.* / AH "H" stands for "HIDDEN"

f. View a list of files / folders based on the series name:

DIR *.* / ON for files and folders, "O" means "ORDER BY", "N" means "NAME"
DIR *.* / AD / ON only for the folder
DIR *.* / A-D / ON to file only
DIR *.* / A-DH / ON for any hidden files
DIR *.* / ADH / ON for the only hidden folder

g. View a list of files / folders based on the ordinal type (extension)

Way similar to pengurutan by name, only "/ ON" replaced with "/ OE".

h. View a list of files based on size of order

Way similar to pengurutan by name, only "/ ON" replaced with "/ OS".
For detailed information about the rules of use DIR command, type "DIR /?" And press enter.
9. The suspected death

The process is a program that runs in the background (background program), does not have a form because it is not possible to interact with the user. With different application programs which are visible because they had to interact with the user. The virus is usually made in such a way so that when the virus is running does not appear at all, it is only a process. File virus that is running normally can not be deleted because the process is running. Usually the virus is a new file can be deleted after the process is terminated. List of application programs and processes that are running can be viewed using the Windows Task Manager (TASKMGR.EXE) simply by pressing the keys Ctrl + Alt + Del. After the Windows Task Manager window appears, we can select the "Applications" to view a list of the application; or the "Processes" to see the process list. Another option is "Performance", "Networking", and "Users".
To stop the application program is running, select the name of the application from the list, then click "End Task". To stop the process that is running, select the name of the process and then click the "End Process". If the Windows Task Manager can not run, we still can see and stop the process that is running from the Command Prompt with a program called "TASKLIST.EXE" to see the process list, then call the program "TASKKILL.EXE" to stop the process.

Example:
TASKLIST
TASKKILL / F / IM Notepad.exe / IM MSPAINT.EXE
TASKKILL / F / PID 1230 / PID 1253 / T

Description:
The parameter "/ F" which means "FORCE" will cause the process is stopped by force.
The parameter "/ IM" means "IMAGE (NAME)". This means that the process will be stopped is the process by the name of the parameter after the "/ IM".
The parameter "/ T" means "TREE" and cause all the branch is also terminated.
_________________BAGIAN 2: Triggers midst actively VIRUS

Virus program that copied to the computer clean of viruses that cause the computer is not contagious. The virus has become active and start work when the program executed by the user, for example, when clicked twice through Windows Explorer. So the first time the virus infection to your computer caused by the user himself. Once given the opportunity, the virus can freely make the schedule according to the desired on the author. By looking at your midst that can be triggered actively virus, we will more easily find the nest and then hiding the virus meringkusnya.
1. Registry

Registry provides a facility that allows programs on their own prior to the start menu appears. This facility is provided for application programs, but many used by the virus. Registry settings can be viewed and manipulated using the default Windows program regedit (Run, regedit). The structure consists of the five root (HKEY_CLASSES_ROOT, HKEY_CURRENT_USER, HKEY_LOCAL_MACHINE, HKEY_USERS, and HKEY_CURRENT_CONFIG), each root has many branches called the key. Each key can contain multiple key and / or value. Management structure in the file, root can diidentikkan with the drive, a folder with the identical key and value associated with the file. Like a folder, key can not load data, it can only load key and value. Registry data that may affect the overall behavior of the system loaded in value. To know the structure of the registry is more clear, run regedit. Be careful to run regedit, because a procedure can cause total paralysis system!

a. Key "Run"

Key "Run" is made to accommodate the list of programs that will run the system shortly before the start menu is active. In the registry, this key can be found in several places, namely on:
Key = "HKEY_CURRENT_USER \ Software \ Microsoft \ Windows \ CurrentVersion"
Key = "HKEY_LOCAL_MACHINE \ Software \ Microsoft \ Windows \ CurrentVersion"
= Some of the key in the key "HKEY_USERS"

If one or more of the registered user in User Accounts (Control Panel> User Accounts), then the root HKEY_USERS there will be some key that holds the settings for each user. Some of the key also contains the key "Software \ Microsoft \ Windows \ CurrentVersion", and the key may also include "Run".

b. Value "Shell" and "Userinit" key in the "Winlogon"

Value "Shell" and the value "Userinit" key in the "Winlogon" can provide the same effect-effective for virus-value with the stored key in the "Run". Generally, data for the second value is:

Shell = "Explorer.exe"
Userinit = "C: \ WINDOWS \ system32 \ userinit.exe,"

Key "Winlogon" in:
Key = "HKEY_CURRENT_USER \ Software \ Microsoft \ Windows NT \ CurrentVersion"
Key = "HKEY_LOCAL_MACHINE \ Software \ Microsoft \ Windows NT \ CurrentVersion"
= Some of the key in the key "HKEY_USERS"

In addition to key and value mentioned above, it is still possible for many key / value that can be used by the virus, although it may not be effective, and this author has never been found.
If the value is found suspicious, do an adequate analysis before deciding to remove them. Do not delete the original!

2. Start Menu and Desktop

a. Start> Programs> Startup

Folder "Startup" in the start menu is provided for programs to be run automatically by Windows when the process is finished booting. The virus can take advantage of this folder to actively trigger the virus by creating a shortcut in it, or make a duplicate with the virus in it. Virus Brontok folder using the initial version of the file called "EMPTY.PIF" DOS image program.

b. Link / Shortcut

Files link or shortcut (file berekstensi. "LNK" and. "PIF") that are in the start menu or desktop at work as a "shortcut" to a program to facilitate the user to run the program. Files such as this, because it is not really the program, generally is small, not more than 4KB. This file can be manipulated so that the virus does not refer to the program that should, but be deflected to the virus program. To know the shortcut to be deflected or not, right-click on the shortcut file, click "Properties", then see the description of the "Target".

File shortcut can also be removed only by the virus was replaced by the virus program icon is created with the shortcuts of the original file. Cases such as this rare, but it never happened. If this happens, generally the size of the files' shortcut 'is more than 4KB. But the size of the file "shortcut" is not a guarantee that a file has been manipulated virus into the program. To check the contents must be viewed using a Hex Editor. Unfortunately, only certain people, especially the ever-learn programming or electronics engineering, digital program that you can understand the Hex Editor. Files generally have a shortcut arrow, unless the file is viewed in the start menu. If we see the start menu folder contents using Windows Explorer, all original file shortcut (not the folder) will have a arrow. If no image panahnya, possibly (not guarantee) the file is not a shortcut shortcut beneran.

3. Task Scheduler

View Control Panel> Scheduled Tasks to see a list of periodic schedules that have been scheduled in the system. The virus sometimes make the schedule here to run a virus program from a particular location. Delete Scheduled task harmful only.

4. AUTOEXEC.BAT

Each booting, the computer will check the file C: \ AUTOEXEC.BAT and run the commands in it, if any. Of course this profitable opportunity program and application program virus. Check the contents, and delete command or harmful to the virus file. If not sure of the result of this, the AUTOEXEC.BAT file can be copied first, so if there is anything that is not desired, can be restored as the overwrite AUTOEXEC.BAT file with the copies that have been made. To disable one or more commands in the AUTOEXEC.BAT file can be added the word "REM" (without quotation marks).

5. Take a transfer program

The virus can also take over the program as follows:

a. Change the name of the application programs are often used by users. For example WINWORD.EXE (Microsoft Word) changed to WINWORD1.EXE.

b. Make a duplicate of virus with the name of the program frequently used by users. In this example, create a duplicate with the virus name WINWORD.EXE.

c. When the user intends to run the application (Microsoft Word), and the user actually runs the virus program, virus program and then calls the original application program that has been renamed (WINWORD1.EXE).

This strategy is implemented by d2/Decoil leaf virus, with the take over the program Winamp. To investigate, check out the programs available in shortcutnya start menu or the desktop. Virus programs generally small, between 30KB to 300KB, while the application is usually relatively large size (more than WINWORD.EXE size 8.000KB, EXCEL.EXE larger than 6.000KB). Date of the making of the program can also be used to determine whether a program is original or not, even though the file is actually a date can be changed easily.

6. Possible midst Other
a. ?
PART 3: STEP-STEP Overcoming VIRUS

This section does not discuss practical steps to deal with virus-virus which is found, because the virus actually has a job, attack strategies, attack and level removal techniques (how to) their own. By serving as the following can be expected to understand concepts of how the virus, so it can be applied to a variety of viruses that same basic strategy. Views of how to work virusnya, actually there are many types of virus that does not follow the ways described here, because the way it works is different. What's covered here is how to overcome common type of virus that is easily made and is outstanding in many of Indonesia, to penetrate to remote areas that do not have internet network. Virus-virus like this is not difficult for the programmer who created the ability slightly above average programmer.

For this type of virus as described above, the general steps to address them are as follows:
1. Stop the process that suspicious

Most of the processes in the process is the process that you run the system (Windows) or a program that we are deliberately run. If we terlanjur kill the process that is part of the system, sometimes the computer will shutdown itself with notice and countdown before. Sometimes the virus is easily recognized because the name is odd (eg "sempalong" or "exploration" in the Brontok virus). But the virus often does not use the name that appears at a glance, familiar, so that the user presume that process is the process of the operating system, but actually work with the names used by the system, eg lExplorer (LEXPLORER, not iexplorer, with the letter "i "large). In fact, many also use the name that exactly matches the name of a process executed by the system, so that we can not distinguish the virus and the only system based on the name.

The names of the default Windows itself is common among "SVCHOST.EXE", "SPOOLSV.EXE", "SERVICES.EXE", "WINLOGON.EXE", "LSASS.EXE", "CRSS.EXE", "EXPLORER" , "System", "System Idle Process". These names are usually always there, even if the computer is not running any programs. Sometimes the virus also uses the names on this not-so stop by the user. Unless "SVCHOST.EXE", generally the default system name is not identical. If for example there are two processes to the same "SERVICES.EXE", may be one of them is a process executed by the virus.

If we see the process through the list of Command Prompt with a program called "TASKLIST.EXE", we can also see the Process ID (PID) of each process. In the Windows Task Manager, PID is not displayed. If there is some chance that the same process and part of the process is the process of virus, then I will be more likely to suspect that the process PID is greater as the virus, based on the assumptions and logic that the PID is given a unique and series, and the virus is executed part of the process after the system is run.
2. Remove / change the file name as a suspected virus

We can remove a suspicious file that is located in the system (the default folder in Windows) if we believe will not cause a more serious problem. But not sure if it will, it is better to simply change the file name or extension only, eg "Sempalong.exe" changed to "Sempalonk.exe" or "Sempalong.ex_".

Problems that may arise:

>> File not found a suspicious

Virus that is designed well, of course, not easy to find, as they may apply one or a combination of some of the following tricks:
1. attribute files are hidden virus

> Folder Options Change the settings so that hidden files are still displayed.

> If the file is done using the search facility Search, make sure the options "Search system folders", "Search hidden files and folders" and "Search subfolders" in the menu "More advanced options" is enabled (checked).

> If the file is done with the search command "DIR" through the Command Prompt, use the parameter "/ AH" to show hidden files.

> If necessary, enable the non-hidden attribute on all files in a folder by typing "attrib-r-h-s *.*" in the Command Prompt.
2. Folder Options settings are set so that hidden files are not visible (default setting is the default Windows does not show hidden files)

> Change settings Folder Options.
3. Folder Options menu in Windows Explorer is removed

> Munculkan Folder Options menu again.
4. virus using the file extension other than. "EXE"

Please note that this kind of virus does not always berekstensi. "EXE". So we can only find a file "*. EXE" to find the virus, the virus while others use the same extension for effective virus, such as the extension. "COM" (MS DOS Application). "PIF" (Shortcut to msdos programs) ,. "SCR" (Screen Saver). "BAT" (MS-DOS Batch File),. "LNK (Shortcut)."

>> Suspicious file can not be removed / in-rename

This can occur if the file is a file running programs. If this happens, stop the process before the file came from the program. If necessary, use TASKLIST and TASKKILL to kill suspected processes.

>> We thought terkecoh because the files are not virus

File viruses may be a certain kind of face document, typing text notepad, or even folders. Remember that each program has its own icon. This means that the program has full freedom in determining the icons of programs that dibuatnya, Brontok virus sebebas select the icon / image folder.

The virus can appear in different names, faces / icons, type, size, and date of birth. Fourth is the nature of this file can be used to facilitate the search files, but also very easy for viruses masquerade. The only guidance is a safe file extension (eg. "EXE", ". COM," or. "SCR"). File extension with a different file type (eg "Microsoft Word Document", "Text Document", "File Folder"). Type that is displayed in Windows Explorer can be easily manipulated by the virus so that it allows multiple extension file name has the same type.
3. Disable virus triggered actively

Check the midst of actively allows virus and delete or restore as it should, if found harmful manipulation.
4. Remove duplicate file virus

If the virus in the system (on drive C:) is clean, also looking at the data and the folder in another drive. Delete all the files as a virus that is believed.
5. Restore system

Restore registry settings that have been manipulated to make the virus aksinya, for example: re-enable regedit, back munculkan Folder Options menu, Folder Options configuration that allows the user to identify the characteristics of the file, and so forth.
_________________
I'm just like a pill .. Instead of makin 'you better, I keep makin' you ill.
Microsoft Windows7

last person to be talking a lot, because this is the operation system that will replace Windows Vista. Many spread the news on the internet, said that Windows7 will be faster than the preceding. Finally Windows7 ultimate series Beta can be downloaded in a few links on the Internet for free, you only have to be patient because the size of the file will take the rather old.

CHIP spend to re-install the OS into Windows7 MSI Wind U100. System OS is perceived more slowly from WindowsXP, but it feels faster than Windows Vista. Have some improvements on windows7 that make it more simple from the windows vista. Problems still haunt windows7 driver, but you can use a diver for WindowsXP. Concerning the view even though there are still some changes to windows Vista, the light is in the taskbar grouping, which was using the icon and text, it is only the icon and have the view that this clear. When CHIP attempt to use daily for brousing, writing review, watch movies and so on.
Image
With these specifications, Windows7 can walk quite well.

Image
This is the latest display in the taskbar grouping functions and can run smoothly.
quoted from www.chip.co.id

Discuss in CHIP Forum

Sunday, 15 February 2009

Ramones
From Wikipedia, the free encyclopedia
(Redirected from The Ramones)
Jump to: navigation, search
This article is about the band. For their self-titled debut album, see Ramones (album).
Ramones
Ramones performing in Oslo, Norway, on August 30, 1980
Ramones performing in Oslo, Norway, on August 30, 1980
Background information
Origin Forest Hills, Queens,
New York, USA
Genre(s) Punk rock
Years active 1974–1996
Label(s) Sire
(US, 1976–1992; UK, 1976-1984)
Philips
(Europe, 1976-1977)
Beggars Banquet
(UK, 1985-1987)
Radioactive
(US, 1992–1996)
Chrysalis
(UK, 1992–1996)
Associated acts Tangerine Puppets, Sniper, Dust, The Voidoids, Uncle Monk
Former members
Dee Dee Ramone
Johnny Ramone
Joey Ramone
Tommy Ramone
Marky Ramone
Richie Ramone
Elvis Ramone (Clem Burke)
C.J. Ramone

The Ramones were an American rock band often regarded as the first punk rock group.[1][2] Formed in Forest Hills, Queens, New York, in 1974,[2] all of the band members adopted stage names ending with "Ramone", though none of them were actually related. They performed 2,263 concerts, touring virtually nonstop for 22 years.[2] In 1996, after a tour with the Lollapalooza music festival, the band played a farewell show and disbanded. A little more than eight years after the breakup, the band's three founding members—lead singer Joey Ramone, guitarist Johnny Ramone, and bassist Dee Dee Ramone—were dead.[3]

The Ramones were a major influence on the punk rock movement both in the United States and Great Britain, though they achieved only minor commercial success. Their only record with enough U.S. sales to be certified gold was the compilation album Ramones Mania.[4] Recognition of the band's importance built over the years, and they are now regularly represented in many assessments of all-time great rock music, such as the Rolling Stone lists of the 50 Greatest Artists of All Time[5] and 25 Greatest Live Albums of All Time,[6] VH1's 100 Greatest Artists of Hard Rock,[7] and Mojo's 100 Greatest Albums.[8] In 2002, the Ramones were voted the second greatest rock and roll band ever in Spin, trailing only The Beatles.[9] On March 18, 2002, the Ramones—including the three founders and drummers Marky and Tommy Ramone—were inducted into the Rock and Roll Hall of Fame.[2][10]

Saturday, 31 January 2009