Make disable zip folders

Make disable zip folders


By default, Windows Explorer displays the files as a zip berekstensi branch treeview.

The more there is a zip file in a folder or subfolder it will slow down when you open a folder or subfolder. To prevent this, you can make to disable. Do the following:
1.Masuk to DOS Prompt
2.Ketikkan: regsvr32 / u zipfldr.dll
3.Enter

Knowing IP Address Sender Email

Knowing IP Address Sender Email


When you read the email may only be visible date information, to, cc, bcc, subject and message. While every email sent to include certain information such as the complete message id, mailer, ip address, and so forth.

If you want to know the ip address of the email with the ISP that you can use the following tips.


Yahoo Mail:
Login to Yahoo Mail.
Choose one of the email you want to check.
Click on the link or Full Header, located in the bottom right.
Locate the "Received: from [...] by".
In the example below addressnya IP is 61.94.152.147.

MS Outlook Express:
Open the Outlook Express program.
Right-click on one of the email you want to check.
Click the Properties menu.
Click the Details tab.

If you already have information ip address then you can check the ISP that is used along with a city.

In the Serial Number missed MS Office 2000

In the Serial Number missed MS Office 2000

Every time you install MS Office 2000, you must always fill in the serial numbernya consists of dozens of characters. Now, rather than fuss over why it does not automatically contrived?

How open setup.ini file with Notepad, search on the [Options] and uncheck the USERNAME #.

[Options]
; If a value is present, the [Options] section gives the values of properties to apply to
; This installation. Specify them in the format:
; PropName = PropValue
; Remember to uncomment both the section name and the value names.
;
USERNAME = Your Name
PIDKEY = ABCDEFGHIJKLMNOPQRSTUVWXY

Enter your name in the USERNAME and write the serial number on the PIDKEY.

Save the file. From now on you will not need to fill in the serial number again when you install MS Office 2000

Disassemble Password Office 2000

Disassemble Password Office 2000

Password is a facility of the MS Office 2000 that is used to protect documents from people who do not have the right. This password is used to be very important if the document contains sensitive data.

Unfortunately the facility to be catastrophe if we forgot password. Not profit, but even that inconvenience. If so what is the solution?

Of course you need a password recovery program that can be used to dismantle the password is forgotten. One of them is the Advanced Office 2000 Password Recovery can be downloaded at the www.elcomsoft.com.

How Practical Keyboard Lock


Chris PC-Lock is a software that is simple, lightweight, and useful in maintaining security as long as you leave the computer. When the software is activated, all functions of the keyboard and mouse will not be active. Use Alt-Tab key, Ctrl-Alt-Tab, and Windows shortcut key combination also will not work at all.

During the active, the computer screen will display a screen saver or a static image that can be selected. To switch it back, you simply enter the password. Software that has four language options can also be activated automatically when the computer is idle (no activity) in the specified time.



He can also be active every time the PC is switched on. The software can work in almost all families of the operating system Microsoft Windows (Windows Server 95/98/Me/NT/2000/XP/2003), except Windows Vista.



Click here to download

COMPUTER VIRUS

ComputerVirus
With the large number of computer viruses and variants that are currently showing a reality that the more creative people who are not responsible, we know that the world's "Underground." The development of this motif ditenggarai with theft of personal data and hijack the computer owner's credit card.

As dilansir Newspaper Kompas, Wednesday 15 April 2006 as follows:
The number of viruses, worms, trojan, and malicious program (malware) that threatens the computer has been cut through one million species. Figures are the results of monitoring conducted [...] Symantec, the antivirus company, which reported in its annual report Internet Security Thread Report.

Symantec says the growth of malicious programs to increase still high. Growth occurred in a very big last year. The report states during the second semester of 2007 found 499,811 new malicious programs or up 136 percent from the same period the previous year.

Throughout 2007, Symantec detected 711,912 new malicious programs. Significantly, this increase the number of viruses and malware that Symantec has detected a type of 1,122,311. Almost two-thirds of the evil is made throughout the year 2007. Made some big virus to attack a computer with Microsoft Windows operating systems and more malicious variants of the virus infecting never before.

Symantec suspect that high-growth triggered by increasing criminal digital conducted professionally. The malicious program may recruit powerful programmer-programmer of the various forms of technical attack.

The motive of the attack is to steal personal data to hijack the computer owner's credit card and the like. Combination these factors cause the increase in the risk of threat to computer users who connect to the Internet. (BBC / Wah)

The risk of Viruses on the Computer

The risk of viruses on the computer
Only location where the risk of computer virus?
The virus can reach your computer through a variety of ways. Some of them are as follows.

* Program and documents
Computer programs and documents can be also infected by the virus. When you men-sharing program or document before the colleagues you will, then this will make the spread of the virus will be more knowledgeable especially when spread over your office LAN or even over the Internet.
* Internet
You can download a program or document that has been infected with the virus from the internet. Cleft security on your computer can create a virus to treat it. The virus can be transmitted to your computer through the Internet automatically without you doing anything before.
* E-mail
E-mail you receive each day can bring the virus only through the attachment. Once you run a program or document in the attachment before, then your computer will be infected by the virus. Some even e-mail can contain a malicious script will run once you make a preview of the e-mail or read the contents of your e-mail.
* CD or diskette
Floppy disks can carry the virus in its boot sector. CD or floppy disks can also contain a program that has been infected by the virus.

The files are able diinfeksi by viruses?
The virus can hang himself in what is running on your computer. What are they? See only the following explanation.

* Program
Some viruses are able to menginfeksi computer program. If you run a program that has been infected with the virus before, the virus code will also be automatically executed the first time. Virus-type of this virus appear at earlier emergence of the virus in the computer world and until now is still a serious threat especially with the development of the Internet that is able to quickly distribute the program to the world.
* Documents
Word processing or spreadsheets, such as MS Word or MS Excel, often use macros mengotomatisasi for a job. Some macro viruses take advantage of this facility to spread itself to other documents. If you run a document containing a macro virus is, he will copy itself to the startup program to open the document and can eventually infect other documents that are still free from the virus.
* Boot sector
When you turn on the computer, the computer will access a disk on the part of the "boot sector" and will run a program that will start the operating system. At the beginning of the era-first computer virus, often area ditumpuki this boot sector with the virus code, so that when switched on the computer and access the boot sector, the virus code is automatically run well.

E-mail virus
Most e-mail virus is highly dependent of the user clicking on a document or program that is on the e-mail attachment. This will cause the virus to mem-forward before the infected document to an e-mail the other. Netsky virus as an example, is able to find files in your computer that contains an e-mail address (such as HTML files or files in the format EML), and will use e-mail program that is on your computer to send an infected document to address - e-mail addresses that have been acquired earlier. Some other viruses such as Sobig-F has not even need e-mail program on your computer to send e-mail, but they have their own SMTP engine to send e-mail. E-mail viruses can control your computer or even steal data. But the main target of this type of virus e-mail this will usually cause traffic e-mail that is very large and create a server crash.

Once again be careful of the attachment on your e-mail. Even with the extension attachment. Txt can also be dangerous because often there is still behind the extension, for example again. Vbs script that can contain viruses.

Can I infected with the virus only a read e-mail?
You do not need to open or run the program in an e-mail attachment to be infected with the virus. Some viruses, such as Kakworm and Bubbleboy, can menginfeksi your computer so you read the e-mail. They will look like e-mail message is normal but in fact contain a hidden script that will run once you open or read them (or can be through the preview pane, if you use Outlook with the version of Internet Explorer that match). This type of virus will change the settings on your computer and send the virus to other users via e-mail. The Microsoft has issued a patch for this problem. To find out what patch you need, then please visit the site http://windowsupdate.microsoft.com/. To keep track of security on the Windows operating system and application, please just follow the mailing list in their www.microsoft.com / TechNet / security / bulletin / notify.asp.

How do I set up a Computer

How do I set up a Computer

To be able to do so, you first need to be able to understand information in English is written in the electronic equipment and computer programs computer, if necessary, to prepare the English dictionary. English used in this case is quite simple and easily understood, with only a few know English grammar you can understand the meaning of the factory program and the operating system and application system.

In computer assembly, your hands should not be wet (sweating), and you can not hold the center of the IC chip including the processor and memory. Kortsluit sweat can cause a series of electronic motherboard when you turn it on. Hand grip on the center of the IC chip can damage the contents because your hands contain static electricity.

If necessary it will be better if at the time up, put your hands bracelet made of metal cable (cable that has been dikelupas skin) and is connected to the floor or ground (grounding), so that power from the hands you do not damage the IC chip, but forwarded to land.

An important component in the dibutuhan up a PC. To build a personal computer will be necessary electronic equipment, at least as follows:

1. Monitor screen, shaped like a television as a glass tube RGB. There is also a type of LCD screen (liquid cristal display), which only requires a little power. You can select a type of VGA, SVGA or LCD (this kind of completeness that many made on a standard personal computer at this time).

2. Motherboard (mainboard), can be selected from the type of motherboard that is capable of controlling the processor at 486 or processor of different types of Pentium (Pentium 90, Pentium 100, Pentium 133, Pentium 166 MMX, Pentium 200 Mhz, 233 Pentium MMX, Pentium Celeron, or the latest type of the Pentium II-class). The more you select the type of the latest processor, the more expensive cost you must remove it. Processor type AT 486, Pentium 90 s.d. 233 Pentium MMX is a type of old and the manufacturer has not produced anymore, but you can get in scraps with the market price is quite cheap. Choose a seller of goods that can be used to guarantee that the goods are still good and you can see the evidence.

3. Memory RAM (random access memory), which can be selected according to the type that matches the motherboard you have. There are several types of RAM and you can ask the shop to the type of RAM to match the motherboard you will buy. Among other types of RAM EDO RAM, SIM RAM, SDRAM with the capacity that varies from 4 MByte muai, 8 MByte, 16 MByte per fruit. Memory function while the program saves the application and operating system files as well as working for a computer operated. The large size of the used computer you a feel of your raft at the time are typing or drawing.

4. Flopy drive and the cord, you can choose a common standard and installed on the PC is currently the Flopy type of 3.5-inch drives with a capacity of 1.4 MByte.

5. Hardisk following cord, you can select the type of hard drive to your needs ranging from 1 GByte capacity, to 2.3 GByte 10 GByte. Hardisk have two types of species that is the type of SCSI and IDE. SCSI type usually used in a computer server. But the development of the technology at this time allows IDE type of IDE hard drives used in a server.

How Computer Work A

How Computers Work A

THE brief computer work as follows. Data entered by the user through the computer keyboard (letters and numbers) or the mouse and scanner (graphical data / image) to the CPU. The data submitted to the software application to be processed in the processor and displayed on the screen. When the votes that appear on screen is in conformity with the desire computer users before, then the user will instruct the computer to save the results of work in the media (floppy or hard drive) or order a computer to print through a printer.

In the CPU, occurred in the communication data is the data submitted to the application program immediately forwarded to the operating system. Program by the operating system, data is converted into machine language that can be understood by the electronic equipment found on the computer so that the screen can show what is desired by the user or the computer before you can communicate with the printing equipment (printer) and told the printer to print a file the desired user's computer.

Submit tips to Directory


Directory is a site that contains a "collection" link, which are grouped in different categories. To register our site directory is one way to increase PageRank. There are thousands in the directory is ready "to receive" our site. To subscribe to many directory one by one would need extra patience. Two programs or services under this we can make it easy for us to submit your site to the directory.


digiXMAS Submitter

digiXMAS Submitter is a desktop-based application. To be able to use this program we must first register here then please download the program here. Once you've finished downloading and installing, we can login with the user name and password that we get the time of registration.

the next step to stay fill the data a site that will register our comprehensive URL, Title, Description, Your Name and email.
Unfortunately for the free version we can only register our site to 150 directory, it is PR 0. But it's still bearable than not at all

www.DirZap.com

We can register to our site through the directory service created by DirZap.com. Directory on the list DirZap enough. At the time of the process submit, it will go from PR 3.

Change the Windows XP Display

Bored with the look of Windows XP you? Now you can change the look of Windows XP as Windows Vista, Mac OS, FlyakiteOSX, Fedora or Ubuntu. Software which is called the Transformation Pack will change the total look of Windows XP you.


To change the view is quite simple. You download the software-software below (in accordance with the view that you want) and install the software.

Vista Transformation Pack
FlyakiteOSX
Fedora Transformation Pack
Mac OS Transformation Pack

Make disable Autorun on USB
In the flash disc is exposed to the virus that is usually (but not always) there is a file autorun.info in which there is a command to run the virus program. Well, flash when the disc is inserted to the USB drive autorun feature is not in the then-disable Windows will automatically run the program in the background without any confirmation to the user.

One way to reduce the risk of the virus is infected with mendisable autorun feature on the USB drive. There also is the following:



1.Click Start - Run.
2.Type gpedit.msc and press OK.
3.Users click on the Configuration - Administrative Templates - System.
4.2x click on Turn Off Autoplay.
5.Click on the Enable option.
6.At the option Turn off Autoplay on, select All drives.
7.Click OK.
8.Done.

Note: gpedit.msc only on Windows XP Professional.

Windows XP Home to use this way:

- Run the registry editor (regedit)
- Go to HKEY_CURRENT_USER \ Software \ Microsoft \ Windows \ CurrentVersion \ Policies \ Explorer
- Add a new key "NoDriveTypeAutoRun" with the type DWord Value
- Change the value of the "NoDriveTypeAutoRun" to "df" (without quotation marks)

Transmission Control Protocol (TCP)
Transmission Control Protocol (TCP) support network in the transport layer. Transmission Control Protocol (TCP) provides a secure connection-oriented services. Connection-oriented, as a client and the server must open a connection before data is transmitted. TCP is determined by RFC 793, and TCP 1122 is as follows:

* Through reliability.
* Data from the new flow of packages.
* Flow Control.

TCP is based on service in the IP network layer to get data from the host. Given the fact that intellectual property is not reliable when it comes to the quality or delivery of communications, TCP should take precautions to ensure that messages are promptly and correctly ("Federal Express"?).
TCP message format

The format of TCP header is as follows:
Source port number (16 bit)
Destination port number (16 bit)
Number (32 bit) - The byte of data that the first byte of this package represents.
Confirmation number (32 bits) - contains the following sequence number that the sender expects to receive confirmation of the sequence number plus 1 (plus the number of bytes received in the last report?). This number is used only when the flag ACK.
Length header (4 bits) - length header from 32-bit words, are needed in the field of options for a variable length.
Reserved (6 bits)
URG (1 bit) - The urgent pointer valid.
ACK (1 bit) - If the number of valid acceptance.
PSH (1 bit) - these high priority to its implementation.
RST (1 bit) - to restore the connection.
SYN (1 bit) - occurs when the connection will be established and the number will be the first serial number issued by the host in this regard.
END (1 bit) - The transmitter sends data.
The size of the window (16 bits) - the maximum number of bytes that the recipient agree.
TCP control (16 bit) - calculated on the TCP-header, and TCP pseudo-header.
Time Index (16 bit) - it is only valid if the URG bit. Urgent a way to transfer information in case of emergencies on the other side of communication. It should be added to the sequence of numbers at the bottom of the segment to generate a number of the last byte of urgent data.
Options (variable length)
Header, followed by the data. TCP data is full duplex

Tips : Save web proxy cache file Mikrotik


Tips: Save web proxy cache file Mikrotik

Tips to speed up browsing access and download the video on the client computer using a web-proxy server Mikrotik.

One of the functions of webproxy is to save the pages with content from the results of browsing the web proxy cache memory, so that when the client to request> 1 on the same page, the request will be diambilkan from the memory cache by the server without having to load from the outside network (internet) so that access the Internet rather fast. To save the files such as video, images and other files you want, such as *. exe *. zip etc. we can use this script on the server Mikrotik.


/ Ip web-proxy cache

add url = "\ \. flv \ $. zip \ $. exe \ $. jpg \ $. gif \ $. bmp \ $. tiff \ $. png \ $" action = allow comment = "Save File Cache" disabled = no

add url = "http * youtube * * get_video" action = allow comment = "Save Cache Pages" disabled = no

Hide process in linux XH

XH (XHide) process faker, a software on the Linux OS that serves to hide or change the name on the linux process or in other words "masquerade name Process." How XH this program is doing on the remote software / process goals, and change the name of the process according fake process that we inputkan.

XHide - Process faker, by Schizoprenic Xnuxer Research (c) 2002

Options:
s-string Fake process name
Application-d Run as daemon / system (optional)
-u uid [: gid] Change UID / GID, use another user (optional)
-p filename Save PID to filename (optional)

Example:. / Xh-s "klogd-m 0"-d-p test.pid. / Egg bot.conf


Other examples on how to use:
. / xh-s "/ usr / local / apache / bin / httpd-k start-DSSL" / usr / bin / egg bot.conf

The format of this command is:
. / xh-s "name / process / fictitious / fake" / the / exekusi / program / speaker

Software XH (XHide) still has a weakness, namely the manipulation / fake process that is run is to add a fake name in the process space characters follow a very long process and the name of the original. However, this software is quite tolerable for a particular purpose, that require us to change the name on the linux process. : D

XH please download here

Create Shortcut To Hibernate

Create Shortcut To Hibernate

Hibernate in Windows is one of the features that attract. With hibernate on the back when you open the computer, Windows will not start the process of booting from the start, but more directly to the position in which all applications and documents that the last time you open.

To activate hibernate from the menu can Turn Off Computer, press the Shift key and click on the menu Hibernate.