Saturday, May 23, 2009

UBCD for Windows version was 3:22 in the Release

One of the best tools to eradicate the virus, analyze, and improve the recovery system is a computer UBCD for Windows. And released after the previous version of 3:20, at this time UBCD for Windows have released a new version, the version that is 3:22. Of the various additional facilities and improvements (update) is quite a lot.

With the ability to booting from the CD-ROM, and various facilities provided, from the Anti Virus, antispyware, disk tools, Registry, Password tools, Recovery, CD Burning and other, with a window-based display, certainly is a distinctive advantage. And what additional improvements in this version?


Following changes (improvements and additional facilities) on the UBCD for Windows version 3:22:

  • Additional menu Booting Grup4DOS
  • Support UBUSB, with this feature is likely UBCD for Windows can be installed in Flahsdisk (USB Device), a very interesting facility. I have not try it out. But it was stated that the USB is too slow to UBCD4WinBuilder program, and can cause failure when making them.
  • VB + + 2005 Runtime, in need of some programs.
  • is already running. At the 3:20 version if you want to detect the USB, it must be installed before booting to the CD.
  • All Antivirus and Anti spyware definition updates on the date of 9 November 2008.
  • Update various software / programs with the latest version, namely: A-Squared, Auslogic DiskDefrag, AVG Free 7.5, CCleaner, CPU-Z, Defragger, DiskImg, DriveImage, Eraser, ExpressBurn, filezilla 3.1.3.1, Firefox 3.0.3, Foxit Reader, Free Commander, HijackThis, IDSuite, ImgBurn, IPSniffer, memtest, Notepad + +, nPOPuk, Opera, Recuva, RunScanner, SpeedFan, Spybot S & D, Stinger, Super antispyware, SysInfo, TestDisk, TrueCrypt, Unstoppable Copier, WUL, xplorer, VistaRD, and PE2USB.
  • Additional software GPU-Z, in order to detect detail VGA is used.
  • UBCD for windows on the computer and the problems that can be run anywhere (of course this will need to access / internet connection is reliable)
One of the best tools I Avira Personal Antivirus is because the antivirus is included, in addition to the ability to detect the virus is good, Avira in UBCD for Windows can be updated through the flash (manual update) and also seem to be online (my own I have not tried online).

Details about the various tools that are included and an explanation of each can be viewed here: http://www.ubcd4win.com/contents.htm.
To download, you can select different locations (mirrors) that are available here (256 MB) http://www.ubcd4win.com/downloads.htm

For which there is no connection / internet access fast enough, may be having difficulties downloading UBCD For Windows, because the size around 256 MB. So make sure search for an internet connection (cafe) that have access to fast enough to download this program. In addition to creating a UBCD for Windows Bootable CD, CD required Installasi Windows XP or Windows Server 2003. On the steps can be read in my previous article about How to Create Bootable CD UBCD4Win (ebsoft.web.id)

Help, Search Engine Optimization (SEO) for Beginners

Search Engine Optimization (SEO) is now possible for the foreigner does not have anymore, but for a new beginning-the beginning of the Internet world (like me) may still not very familiar with SEO. Well to make it easier to know and learn SEO, SEO master one of the world have made the instructions for us. Who else if not Google, which recently authorized through Webmaster Central blog has published a tutorial on Search Engine Optimization (SEO) Starter Guide. Following translation / summary of free

PDF documents can be downloaded from the google blog, and initially not to be published to the public, only for the internal, but also in the public release. Because it does not contain the secret-a secret SEO Google, but even so, this document is important enough for beginners, to optimize your web site / blog kita. SEO can be said a little ways to modify a part of our website, so that the strong influence to the users (readers) and performance in search engines such as Google, yahoo etc.. When successful mengoptimalisasi our website, then when a user searches for keywords, the website can appear in the results of early, so that the possibility opened by our website visitors to the greater.

Google says, though these instructions to optimize the search engines, but still suggest that a more important goal is for visitors to our website, so stay focused when writing for the visitors who take advantage or our website.

Here are some important point of the document are:
1. Create a page title (Title) Unique and precise

Title is located on the web page meta tags which is in between the tags . If we show any posts on search engines, then the title of which is in between the title tag will be in the title of search results.

Practical guidance for the definition title tag:
  • Describe accurately the content or the content page. Avoid titles that are not related to the content and use a title such as "Untilted" or "New Page 1" etc.
  • Create a unique title for each page, so make with the other pages.
  • Create a description of a clear and informative. If too long, Google will only display the part. So please do not subtract too long and the words do not matter.
2. Take advantage of (a) in the meta description tag "Description"
Description of a page, or provide summary information to Google and other search engines about whether the content of the page. This meta tag bisanya under the title, with examples of HTML code as follows:

Google may also use as a snippet of information, although google may also use in other parts of the page tesebut, such as the description on the web site Open Directory Project. Can be read on mengoptimalisasi meta tags "description" here is improving with snippets better description meta tags
Practical guidance for meta tag "Description"
  • Please be accurate summary document. Avoid tulisa such as:
  1. description that is not related to the content
  2. use the general description such as "This is a webpage" or "Page about baseball cards"
  3. only with the keyword (keywords)
  4. Copy and paste the entire contents of the document
  • Create a unique description for each page
3. Improve the structure of our website URL
By creating a good structure, not only simplify organize our website, but can also produce crawling by search engine better.
[On WordPress and the other, this structure is known as Permalink term, which can be arranged through the administrator page. Selengkpanya can also be read here Some tips after installing wordpress]

Petujuk practical to make the URL structure
  • Use the word in the URL, as this more user friendly to the user. Avoid:
  1. The structure that is too long
  2. words such as "page1.html"
  3. excessive keyword (repeated many times)
  • Create a simple structure. Avoid:
  1. too in the structure, eg dir1/dir2/dir3/dir4/dir5/dir6/page.html
  2. the name that is not related to the content
  • Provide a URL to go to the document. Avoid:
  1. Having the domain and sub domain (eg domain.com / page.htm sub.domain.com and / page.htm) that access to the same page
  2. Combining the version of the URL www. and non-www. in the internal link structure.
  3. Using capital letters
4. Create a site so easy to us in terms of Navigation
Navigation important website to help visitors quickly find the desired content. It also helps search engines understand what the important content from the web. Although results of google search provided up to the last level, but Google also considers the overall picture is.

One way to facilitate the search engine is to add XML Sitemap.
5. Content and offer a quality service
Practical guidance for content:
  • Write the text easy to read (easy-to-read)
  • Stay focused on the topics covered. If tulisa long, then split with the subtitles, the separator layout akan better.
  • Use language that is relevant.
  • Create content that is unique and quite new, so avoid the copy paste.
  • Create content that is focused for the user, not for search engines.
6. Write the text "Anchor" is better
Anchor text is that you can click on, the user views, which are placed between the HTML code and .

Anchor with a better, easier for the user and also for the search engines understand what a page in the link.
Practical guidance for Anchor
  • Choose a descriptive text. Avoid:
  1. common words such as "page", "article", "click here" etc.
  2. words that are not related to the link
  3. is the URL of the page (for most cases)
  • Write a concise text. Avoid the anchor for a long, even up to one paragraph.
  • Format a link so easy in the knowledge, distinguish between normal text and links.
  • Think about the anchor text that link to internal page we, as this also helps users and google to better navigate the web.
7. Use heading tags rightly
Heading tags are HTML tags that are used for the title or sub
titles, ranging from

until

. is the most important and decreased
kepentingannyan level until


8. Optimize the use of Image (picture)
One is to optimize the image with a description of the attribute "alt", this can be useful if the image does not appear, then there will be information / description of what tetnag image.

9. Efektifkan the use of robots.txt
Robots.txt file is a file that is intended for search engine whether they allowed mengakes or crawl certain pages of our website. This file is placed in the root directory our website. For example http://ebsoft.web.id/robots.txt

10. Understand the attribute "nofollow" for links
Set the value of the attribute "rel" with the "nofollow" will be to say that the google link that can not be written in the follow by google (does not affect the reputation of the link). If you'd like the link does not intend to increase the reputation of the address link, then use nofollow.
11. Promote the web in a way that properly

Some practical guidance to promote the website:
  • Create a blog about the content or services that are new.
  • Offline promotion
  • Knowing about the social media sites ..
  • If the form of business, add in Google's Local Business Center
  • Follow to the community related to the theme of our site
12. Take advantage of the features Google Webmaster Tools
Search Engines such as google's, provide free tools for webmasters, Google Webmaster Tools that help managers to control the web with google how to better interact with our website. This tool helps to analyze the various problems we are going. Besides Google and Yahoo also offer Microsof the same, namely Yahoo! Site Explorer and Live Search Webmaster Tools.

More information can also read this article in order Tips web / blog terindex with us either by Google

13. Take advantage of the Web Analytics service
To analyze web visitor traffic, the facility can be used such as google Google Analytics.

For more information, download the PDF document Jump Search Engine Optimization Starter Guide, which describes more detail about this, in 22 sheets (Translated and summarized independently by Ebta Setiawan)

Gmail comes with face and colors (themes) new

As one of the best free email service, Gmail currently provides a variety of colors and new faces (themes) officially. Previous already have themes, but the fans from gmail, not from your own Gmail. And just this week Gmail me-launching 30 new themes with a wide range of colors, background and style.
How do I view screenshots-this new look? Following the example of a new look at the switch in the gmail inbox.



Seen quite a few over the look interesting, and refreshing. A unique and interesting one is Themes Terminal, as if we are in front of computer Classic, with only two colors green and black, and a dam frame display text only.
If you gmail users, please login and open the menu Settings> Themes, select from 30 new themes that are provided. If you do not have a gmail account, create a new course soon, because gmail has several advantages compared to yahoo mail, one has access POP3 and IMAP for free, so it can integrate with the Client Email Application such as Mozilla Thunderbird, Microsoft Outlook, Outlook Express and others.

Applications with Outlook or Thunderbird, we need not be difficult to open the hard-to mengakes web, read and reply to email. Because if it is automatically connected to the Internet, have each new email will be directly stored in the computer we own, show that the information is new email and then can be accessed at any time even if offline. This saves bandwidth and speed up the internet.

Applications are in and how to support the POP3 settings can be seen in the page "Supported POP client list"

Anti Spyware Free Full-featured, Spyware Terminator

While this may be anti-virus alone is not enough to maintain and protect the Computer, especially when we often use the computer / laptop to our internet connection. Threat not only from the virus, but can also come from spyware, adware and pogram foreign programs from the internet that we do not know.
One way to increase protection is to install the computer anti-spyware, and one of the free with the ability to simply Spyware Terminator is complete. how the benefits of this software?


Spyware Terminator is a software which is provided free of charge to protect and eliminate various threats to computer security provide protection in real time from spyware, adware, trojan horses, keyloggers, browser hijacker and other malware threats.

What are the main features of Spyware Terminator:

  • Free Spyware Removal. Spyware Terminator will scan your computer to do a variety of threats, remove, and provide a full report.
  • Free Automatic Updates. Can download and install updates automatically.
  • Free Scheduled Scan. Ability to provide scan regularly with a certain time.
  • Free Antivirus Integration, Apyware terminator can be integrated with antivirus Clam Antivirus (ClamAV). So that it can also function as anti-virus.
  • Free Support. Not only free, but if you need support, they can ask either directly via email or the public forum provided.
  • Free for Personal & Commercial Use. This application is free for both personal / individual and for commercial / business, which is rarely given other similar applications
View the above capabilities, Spyware Terminator winner of several applications that have some limitations, such as features that are not up to full license. This application provides all the features that are free of charge and does not need to buy the pro version or the paid (paid version has a surplus can give access to the network administrator to manage and run the computers on the network from one place).

Is it only that the ability Spyware Terminator? Of course not, there are many other additional facilities, such as:
  • Customisasi scan the computer, either the drive or folder
  • List files that should not be ignored in the scan, quarantine the file or program that endanger
  • Restore the computer system (with the System Restore), which analyzes suspicious files, delete files / virus that can not be removed with the usual way.
  • Application guard, Internet and guard system guard. Which can be used to protect and protect access to system registry and other important windows. This is all in real time.
  • And many other
When this article was written, the latest version is 2.5.0.567, with improvements from previous versions. Download Spyware Terminator 2.5 (8.61 MB)
More information can visit the website of http://www.spywareterminator.com authorized (by ebsoft)

Check the rift in the computer security program with Secunia PSI

With so many software / programs that install on the computer, sometimes we are less concerned about the security of software. Because we may not know which program that allows security to be slit. One way this is the case with software-update the software used, but this may be making. How easy it is?
Secunia, one of the websites in the field of security, has provided free software to facilitate the user to check various security rift that may occur from many different software or programs that are installed on the computer. And on 25 November 2008 yesterday, after a journey through a very long time they release a final version of this software, the Secunia PSI (Personal Software Inspector).



Main features of what Secunia PSI?

General, Secunia PSI works examine various software (programs) that are installed in the computer security of the rift, the latest version (update), a program that allows security appear slit. More below:
  • Scan, scan to make the programs in the computer
  • Insecure Program, the program provides information that "less safe" and to provide information: a link or download the latest program the solution, add / remove programs, online reference, detail, and so forth.
  • End of Life, provides information on programs that do not support more vendor by the author. Along with the download link for the latest version or uninstall.
  • Patched, provide program information detected, but does not have any known security update (so may not require more attention)
  • Overview, provides information (general description) in the condition of the computer after the scan.
In addition, Secunia also check the Web browser plugins such as the Adobe Flash Player Adobe Acrobat Reader, Quick Time, and others.

At ZDNet, Secunia PSI included in the 10 Essential security tools, and in order no.1 in free software. So try and feasible in the collection. Application size is only around 521 KB and can be run on the platform Windows 2000, XP 32/64bit, and Vista 32/64bit. In order to run (Scan) then need to connect the internet. So if you use offline software will not be much useful.

Where is the Download this software?
Can be obtained through download.com site. Download Secunia PSI

Get Free License Safety Remove USB 4.0

Do you often experience problems when you want to remove the media such as USB Flash drive (Flashdisk), external hard drives, memory cards and so forth? Various ways to re-Eject Flahsdisk already tried, but often only to fail and always appears the message "The device 'Generic volume' can not be stopped right now. Try stopping the device again later. "
If the forces pull out the USB Flash drive directly, sometimes can be risky. So we be able to unlock a file that is being used (the USB) or the alternative use special tools, one is USB Remove Safety, which licenses products for free.
Remove the USB safely secure a way as the default tool windows "safely Remove Hardware". This program supports the connection, such as SATA, USB and FireWire. With this software, then the connected components in the computer will be displayed to one, and can be accessed by placing the mouse cursor on the icon of this program or right-click the program icon.


Facilities USB Remove Safety:

  • Ability hide components, thus, prevent the occurrence of an error-Eject a USB device.
  • Using a tool based on the vendor name / company name or volumem and allow me to rename the name of the tool.
Keyboard Shortcut, to make it easier to remove the USB Device.
  • Unique menu to stop / release Flashdisk (USB flash drive)
  • Provide facilities Autorun when inserting a USB flash drive
  • Informing us why USB can not be removed, and the solution
  • Provide information if there is a component that is connected or disconnected
  • Facilities Command Line to work automatisasi
  • Customisasi Icon in the systray


Adding a new version 4.0 features the following:

  • "Return device back" to pull out the USB again without first
  • Stopping the various media hot-swap, such as PCMCIA, FireWire, USB Silicon, Image and other SATA.
  • Hide the drive from the card reader slot that is empty.
  • Ability to Eject card reader / memory card
  • Management Drive letter
  • Explore to drive with the media file manager available.
  • Support for Mount (display) as the folder is not the drive.

Basically, this software is sold with the official price of about $ 20 (lifetime), and in order to release the latest version is version 4.0 beta 8, the SofetyRemove [http://safelyremove.com] to give free license for one year, including the upgrade program. The provision of a free license is only valid as of 27 Novemver 2008 to 3 December 2008. (Update: Extended until December 5, 2008)

How do I get one?

Just open this link http://safelyremove.com/giveawayweekp.htm, and fill in your name (not just first name or call it) and email. After that click I want Lisence!, And should be in the range of less than 24 hours will be sent to license its email. Download Link USB Remove Safety can be seen underneath. Or download directly Safety Remove USB 4.0 version (2.7 MB)



The program in this download will be valid for 30 days, and after getting a license code via email, then we live enter its serial number through the menu Help> Enter License key, so that a full version and valid for one year.

By ebsoft.web.id Via Digital My life and Raymond.cc

Thursday, May 21, 2009

Options WordPress Plugins

For those of you who use wordpress to create a blog / web, is available wide range of categories that are very useful plugins. Start from the comments, admin, statistics, google, seo (search engine optimizations) and others. Although there are thousands of plugins, some plugins following the very useful and worth a try.

Advanced Admin Menus
If you often go to the admin panel and the page often to access the menus available, may be making enough (time), when must often move among the sub menu. Moreover, the connection with the pas-pasan, for loading the menu only occasionally have to wait long. With these plugins, the wordpress admin menu into the drop down menu, so time is cut access.

advanced-admin-menus


advanced-admin-menus
Uploader WordPress Plugin

Plugins this may be the first time should be added. When we want to add / upload a new plugin via FTP Client, then sometimes have to wait a long time, and in the previous plugins must extract it first. But sometimes FTP Client is not available (when possible in the cafe), so that difficult to add plugins. Wordpress plugins with this uploader, the process of adding plugins to be very easy. We live in the form of plugins download zip and upload directly through the menu "uploader wordpress plugins" in the admin panel, without having to zip the file mengextract. So that the program does not require additional process and upload any faster. This plugin is an artificial nation children, see http://ahlul.web.id
Uploader WordPress Plugin

Wordpress Plugin Uploader

All in One SEO Pack
One of the key number of visitors to blogs or web is how we in the popular web search engines - search engines such as google is. Indeed, we can do it manually so that the blog / website better known by our search engine, but with the plugin SEO (search Engine Optimization), the process becomes easier.

Counterize II
One of the features that owners want to know is the blog or web visitor statistics. Visitor statistics are very useful for the improvement and evaluation of our blog. In fact there are many statistics that the plugin is good, and one of them is Counterize II. This plugin provides enough statistical detail, such as the Hit Counter (Total hit, unique IP, today Unique, Unique hit), Graphic monthly visitors, the accumulation per month, halamn the most visited, keywords that visitors to our blog and so forth. To note is the use of capacity. If our web statistics high, the use of memory space will be big enough.

sample-counterize-ii

sample-counterize-ii

Akismet

This is the default plugin wordpress, but need to activate the key can be obtained free of charge with the first registration (can be seen in the Akismet Configuration menu). Akismet is very useful for menfilter comments just spam, ads and so forth. Results filternya be calculated very good, even though sometimes there are one or two who do not terfilter hundreds of spam messages.

Google Sitemaps

This plugin to generate XML-Sitemap of our blog, the format supported by Ask.com, Google, YAHOO and MSN Search. With the sitemap is very helpful search engine for blog mengindex us.

WordPress Automatic Upgrade

With the development wordpress quickly enough between one version with the next version, so to be more assured security blog so we should show the new version, the blog, we also updated. Moreover, still use very old version. But the update process with the FTP client often takes a long time, because the number of files that must be uploaded. With this plugin update process become easier and relatively fast, live follow the steps through the admin panel update, so we can blog is updated automatically.

Similar Posts

Plugin to show this article related to an article that is being opened. With algoritmanya and Customisasi configuration that is provided, the result is quite good.

That is just a few plugins it from thousands of plugins available. If you use another plugin which is very interesting and useful, please added to share

Freeware Recovery data (Portable Applications)

While this recovery is not that difficult anymore. Try us remember a few years ago, to recover the data, we may have to come to the computer technician or buying software that is not cheap, if there is not easy to operate it. Instead, many now appear even partial recovery software for free, until sometimes confused want to use the application in which:)

One thing is brisk, that many applications that are portable recovery (We live just copy and paste the file and can direct the way of a removable media such as flash disk, or do not need a special installation process), so that we can place it in the flash disk and taken to go - where. Here are some recovery software that is portable and free, so there is not one we prepare in our flash disk.

Recover Files
Recover Files is recovery software that can be used to restore data that has been lost, both from the Recycle Bin, network drive, compact flash card, portable drives, from the DOS window, from Windows Explorer and delete it by pressing the Shift key.
software recovery
Recover Files that have the benefits of small size (543 KB), the scan process is very fast, the view that a simple and easily understood and practical because only single exe only. This application is always running in Windows 95, 98, Me, NT, 2000, XP, 2003, Vista, and supports the format NTFS and FAT partitions.

Download here
Recuva - File Recovery
Recuva (pronounced "recover") is a freeware Windows utility to merestore files that are deleted from the computer, including from the Recycle bin, digital camera memory cards or MP3 players. Can also be caused due to computer crashes, viruses, and so forth. Recover files such as, the application is also only a single exe, just copy and paste the stay, the size is also small (494 KB), the process is also quick scan. To complete the look is not Recover files.


DataRecovery

DataRecovery is freeware made by the programmer TOKIWA (programmer from Japan) to recover an application that has been lost, such as deleted from the recycle bin. This application is only single exe, with a size around 400 KB and the view that simple. But the scan is also very fast.
Operating systems supported
  • Windows9x/Me/NT4.0/2000/XP/Vista
Main facilities
  • Mundukung format FAT12, FAT16, FAT32, NTFS
  • Undelete NTFS compressed files
  • Undelete EFS encrypted files
  • Facilities wipe out files, to delete a file that can not be more direcovery
  • Search a string of part / text in a file
More information View and download here

That only some are freeware data recovery. Recovery for other applications that are portable, can be seen here Portable Freeware Applications

Saturday, May 16, 2009

Speed Booting Windows Xp

Start Actual speed-up booting Windows Xp Computer depending on the hardware itself, but we can akali few (approximately five seconds faster. That is the change the registry settings / regedit a Computer, provided you do not have Hardisk Bad Sector_nya .'s how:
• Log in to regedit (from the Run menu type regedit, and press enter / ok)
• Search key HKEY_LOCAL_MACHINE \ SYSTEM \ ControlSet001 \ Control \ Session Manager \ Memory Management \ PrefetchParameters
• The right, click twice EnableFrefetcher, so Change number 5 (Defaulnya 3)
• Close - Restart Computer
• Experience the difference.

Unfortunately, the files stored in booting windows folder C: \ WINDOWS \ Prefetch, delete all the contents of the Prefetch folder, the hard drive so that you are not full of files podići that is less useful.

How to Install Windows XP

Must be in the install / reinstall windows xp:
Prepare Cd Install the Windows XP bootable (windows xp cd can podići / bootable).
If windows xp Cd not bootable then you will first need to install the 98 windows, and installing new windows xp ordinary (such as installing the program)
Remember and record serial numbernya.
Computer that you have cd roomnya
Backup data / documents according to what is important that you have the drive to C drive to another drive eg D.
Because all data / programs that have everything in the C drive will be lost, unless you merepair / improve the data / program that is on drive C will not be lost
Prepare Cd driver needed by your computer, such as driver motherboat, sound, and VGA card driver
If you are a cigarette smoker prepare beforehand so that no bosen, because the installation takes about half an hour (depending on the speed of your computer)
If you have not prayer, it is better because the first prayer is usually in front of the computer people will forget everything, and do not forget berdo'a so that the installation process is running as you want


Installation process:
Enter the installer CD into the Windows Xp Cd your room.
Restar computer.
select podići room early to Cd
To change the initial booting to cd room you can go to the bios with the restart computer wait any posts ago Pres Del to enter setup, and you must press Del key on the keyboard. Automatic display monitor akan bios usually go blue, then you are looking for a sub menu memanagement podići (usually sub-feature advanced bios boot sequence).
If you Motherboat output for the initial booting to your cd room simply pressing F8 or F10 or F11, of course after you restart.
If you still do not understand ask your friend on that you know a little more about how to change the initial booting cd room.
And if your friend is also understanding that I have, you should close this article, and wash your feet and toothbrush and sleeping only.
After successfully booting process and then have any posts press any key to boot from cd, then you have to press one button on your keyboard (ie press enter), after the computer screen automatically become blue.
You will be on display window setup (setup window are any posts dipojok top left), waiting

screen appears and then the window xp setup (this paper are also on the top left corner). Is this your akan dihadaokan on options such as:
To setup window xp press ENTER
To repair installing winows xp recovery using ... ..., press R
To quit setup press ... ... ... F3
In the options you select the options that you press the top ENTER
Then anada faces on the screen window xp licenci agreement
On this screen you select / press F8
Then you are again on the screen windowxp setup process, Is there are also options such as:
To repair, press R
To continue, press ESC (escape)
In the options are the options that you select the second you press ESC.
Then you are exposed again on options, such as:
To setup, press ENTER
To create ... ...., Press C
To delete ... ...., D Press
In the options you select the options that you press the top ENTER
Then you will also be presented again at the options, such as:
To Continue, Press C
To Select Different ... .., Press ESC
In the options you select the options that you press the top C
Then there are more options, such as:
.......... NTFS (Quick)
... ... .. FAT (Quick)
... ... .. NTFS
FAT ... ... ..
... ... ... Confert to NTFS / FAT
... ... .. Leave No Change.
In the options, it's up to you to select which would depend on whether you want the system NTFS or FAT Sytem
But I usually use Sytem FAT, because the FAT system can be read on Windows 98.
So in the above options, select the option to use the two FAT System. Quick Tuliasan means that when you format drive C is the process Fast.
Then you dahadapkan more on options such as:
To format, Press F
To Select,] Press ESC
on the options you select the options that you press the top F
Then press ENTER, ENTER
You wait process.
Later at the time more or less in 33 minutes to the new windows will appear requesting the system Serial Number, Time and Area / Zone (at select area / zone select the area that is GMT +7 Jakarta) next
Wait Installation Process
Restart the Computer When you do not press anything until the installation is completed.
After the installation is finished, and then you install Drivernya.
Done

repair your own computer tricks

  • CPU Computer Off-out
In this case I ever mengalaminya and adaa several factors. Power supply may be because that is not strong, RAM, or VIRUS. If you die the first time, and so both have the same period of time then it is caused by a virus. If the uniform does not try to change RAMnya. If you can not try to replace the Power supplynya.
Image on the screen does not appear
For this case I ever try to re-install and remove the cable from the power supply to stavolt. And I do the same on the RAM. If you can not try to loose the cable and install the hard disk again.


  • Dead computer
Faktornya Power supply may be due to damage. Try to replace. Or because the motherboard fan is very dirty so it rotates slowly or does not rotate at all. Clean with a small brush. Try to see RAMnya. I never change, and eventually can RAMnya. Try to see the Power button on / off. Whether the cable is connected properly. Or loose cable from the key used to try and find the cable min and plus, if the light means there is a problem on the button. If you have tried all ways possible motherboardnya is damaged.
  • Can not enter windows
Most likely because VIRUS. If true then the virus because you need to do is backup your data first, and re-install.
  • CPU noise issue long
RAM because it is not appropriate installation. RAM, or damaged so that it does not mean that legible.

Wednesday, May 13, 2009

This is how you speed up Win XP

to start editing on the computer we are under this is the way how its editing :
  1. Use a hard disk that have a high-speed Ultra 133 examples
  2. Add memory if your RAM is less than 512mb
  3. Make sure your XP system running in NTFS not FAT 32. If mo liat how to see if the XP system in NTFS try double-click on My Computer continues to see the C drive on the right-click menu and select "properties". Now there can be seen whether the file system is FAT 32 or NTFS
  4. Non enable Peng "index" file is a slow working system. With a right click on your C drive and select 'properties' and then dispose of a check on "Allow Indexing Service to index this disk for fast file searching." Habis that apply and click the menu options appear on the action, select the "C: subfolders and files "If there is a warning do not worry select" Ignore All "only.


  5. Update the drivers and the computer you do not forget to also update your BIOS driver.
  6. Do not forget to run Disk Clean Up 3 months.
  7. In the device manager, double click on IDE ATA / atapi devices Controllers. Make sure you enable DMA on any drive that is connected to the Primary and Secondary controller.
  8. If the money is still there every 6 months to change the cable that connects the hard disk with the motherboard itself. Because sometimes the cable is too long may slow the way we work computer.
  9. Scan your computer from spyware. Spyware can slow the computer system drive. Many are free
  10. Eliminate programs that are less than your Windows start-up by using msconfig. I click Start in the bottom left, select the menu run. Then type msconfig and select the Start up tab and remove the check in the program less useful.
  11. Often you update Windows XP
  12. Do not install anti-virus program more than one. Sometimes installing anti-virus which can cause too much performance, so your XP disordered
  13. If you have a collection of fonts, do not try more than 500 types of fonts. What more and more fonts there, the slow performance of your computer
  14. Now one mistake often made is the one hard disk into two NTFS drive.Pada system would that if only one hard disk that is only one driver driver C:.
  15. Check your system RAM with the software - software that is used to Optimize RAM
  16. If you have a CD or DVD drive, once - you visit their website and search for updates so that they drive the performance of Cd or DVD drive still awake
  17. And the last is not only the floor of the house and cleaned disapu. But at least once a year clean your pc from the dust - dust. Go chasing its use continues to clear brush, and the cooling fan do not forget to join cleaned.

Sytem care tips and Accelerating workplace your Computer.

In day-to-day work with computers, sometimes with a different computer for a delay or even damage to the computer system so that it is the performance of the computer itself and employees or computer users. When the computer system a delay of several causes the need for cautious, among others:
  • Because the virus.
  • Because the device hardware.
  • Care System (software) that are less.


For the treatment of computer virus attacks could be installed with a free antivirus or paying as has been previously described in the article "Anti Computer Virus." there is provided a few website addresses to downloading. While the hardware for the device, how do I perawatanya tips and how-care rips computer is described in the previous article, see the "Tips Personal computer".
At the time this article I will discuss "Tips of the computer system", to note here is What if the computer hardware is ready but still need treatment in the system or software, especially here System on Windows XP or Vista. There are a few tips Sytem treatment such as the following:
  1. Try using the software Windows XP or Vista is genuine, not pirated because the original can always update to the Internet, so that when the leakage in the system windows can be closed with the update directly via the Internet.
  2. Anti virus either free or already paid in and install the update.
  3. Clean the trash-bin system with a computer program is not automatic manual assistance, the program is small but very good for taking care system, namely the Internet cokies delete, delete files used trough-like vessel. and can remove the most important remnant registry when installing the program baru.bisa also to un-install program. This program is: Clean Registry can be downloaded directly at http://www.download.com/ToniArts-EasyCleaner/3000-2094_4-10529179.html. After that install the computer and 2x click, select menu: Clean Registry, Unnecessary files, clear files, clear cokies, add / remove etc..
  4. When you're finished and then Install the program to accelerate the speed of hard drives and memory, the program. This is also a small but formidable function, many menu options are: clean error, fix error, system speed, disk speed etc..
This program name: Speeditup. Can be downloaded in http://www.speeditupfree.com/
After Install run the program with 2x click and select the menu is available.
Guaranteed your computer 300% faster.
Hopefully Success
Good Luck

Friday, May 8, 2009

To Warnet Mikrotik settings

This configuration for friends who may be quite difficult Mikrotik settings. To Warnet
ago lived in the copy and paste it in the terminal.
1. install a cd Mikrotik
  • dg cd boot Mikrotik
  • after a iso can boot linux, select a few packages that are required. (check only if all confused)


Just follow the step c press (Yes) (Yes)
after the restart, login: admin pass: (empty)
Is copy and paste the following just any posts;
BASIC _______________
system identity set name = warnet.beenet
user set admin password = free

ethernet____________________
interface ethernet enable ether1
interface ethernet enable ether2
Ethernet interface ether1 set name = intranet
Ethernet interface ether2 set name = internet

IP ADDRESS_______________
ip address add interface = internet address = XXXXX (from ISP)
ip address add interface = intranet address = 192.168.0.1/24

route_______________
ip route add gateway = XXXXX (from ISP)

dns___________
ip dns set primary-dns = XXXXX (ISP's) 2 secondary-dns = XXXXX (from ISP)

nat & firewall filter standar_______________
ip firewall nat add action = Masquerade chain = srcnat
ip firewall filter add chain = input connection-state = invalid action = drop
ip firewall filter add chain = input protocol = UDP action = accept
ip firewall filter add chain = input protocol = ICMP action = accept
ip firewall filter add chain = input in-interface = intranet action = accept
ip firewall filter add chain = input in-interface = internet action = accept

dhcp server______________________________________
ip dhcp-server setup
dhcp server interface: intranet
dhcp address space: 192.168.0.0/24
gateway for dhcp network: 192.168.0.1
addresses to give out: 192.168.0.2-192.168.0.254
dns servers: XXXXX (from ISP), XXXXX (from ISP)
lease time: 3d

web proxy_________________________
ip web-proxy
set enabled = yes
set src-address = 0.0.0.0
set port = 8080
set hostname = "proxy-apaaja"
set transparent-proxy = yes
set parent-proxy = 0.0.0.0:0
set cache-administrator = "silahkan.pannggil.operator"
set max-object-size = 4096KiB
set cache-drive = system
set max-cache-size = unlimited
set max-ram-cache-size = unlimited

bikinredirect port to transparant proxy__________________________
/ ip firewall nat add chain = dstnat protocol = tcp dst-port = 80 action = redirect to-ports = 8080
/ ip firewall nat add chain = dstnat protocol = tcp dst-port = 3128 action = redirect to-ports = 8080
/ ip firewall nat add chain = dstnat protocol = tcp dst-port = 8080 action = redirect to-ports = 8080

PCQ ________________________
/ ip firewall mangle add chain = forward src-address = 192.168.169.0/28 action = mark-connection new-connection-mark = client1-cm
/ ip firewall mangle add connection-mark = client1-cm action = mark-packet new-packet-mark = client1-pm chain = forward
/ queue type add name = downsteam-pcq kind = pcq pcq-classifier = dst-address
/ queue type add name = Upstream-pcq kind = pcq pcq-classifier = src-address
/ queue tree add parent = intranet downsteam queue = pcq-packet-mark = client1-pm
/ queue tree add parent = internet queue = pcq-Upstream packet-mark = client1-pm

simple queue______________________________
queue simple add name = units-01 target-addresses = 192.168.0.11
queue simple add name = units-02 target-addresses = 192.168.0.12
queue simple add name = units-03 target-addresses = 192.168.0.13
queue simple add name = units-04 target-addresses = 192.168.0.14
queue simple add name = units-05 target-addresses = 192.168.0.15
queue simple add name = units-06 target-addresses = 192.168.0.16
queue simple add name = units-07 target-addresses = 192.168.0.17
queue simple add name = units-08 target-addresses = 192.168.0.18
queue simple add name = units-09 target-addresses = 192.168.0.19
queue simple add name = units-10 target-addresses = 192.168.0.20
queue simple add name = xbilling target-addresses = 192.168.0.2

BLOX SPAM____________________________
/ ip firewall filter add chain = forward dst-port = 135-139 protocol = tcp action = drop
/ ip firewall filter add chain = forward dst-port = 135-139 protocol = UDP action = drop
/ ip firewall filter add chain = forward dst-port = 445 protocol = tcp action = drop
/ ip firewall filter add chain = forward dst-port = 445 protocol = UDP action = drop
/ ip firewall filter add chain = forward dst-port = 593 protocol = tcp action = drop
/ ip firewall filter add chain = forward dst-port = 4444 protocol = tcp action = drop
/ ip firewall filter add chain = forward dst-port = 5554 protocol = tcp action = drop
/ ip firewall filter add chain = forward dst-port = 9996 protocol = tcp action = drop
/ ip firewall filter add chain = forward dst-port = 995-999 protocol = UDP action = drop
/ ip firewall filter add chain = forward dst-port = 53 protocol = tcp action = drop
/ ip firewall filter add chain = forward dst-port = 55 protocol = tcp action = drop

Spam techniques scare

One of the most frustrating at the time we operate on the Internet is the number of spam in e-mail that we receive. If you are active in the various mailing list & communicate using e-mail at the Internet level spam revenues could reach more than 20% of the e-mail messages. Here are some practical tips that can be used to flush the e-mail spam using a software-free software that can be taken from the Internet. For Windows users,
Favorite software that can be used is secretmaker that can be taken from http://www.secretmaker.com in the download section or sometimes like there are in http://www.download.com. How to install secretmaker such as how to install the software in Windows is very simple & ordinary. That we need to look at is to operate some protection prepared by secretmaker of spam & worms, spyware & intruder, profiling & tracking, and the last evidence betray & protection. If all possible protection facilities in the switch because it will really help protect the computer you not only from spam, but also from various pop-up as we do browsing on the Internet. My advice, do not operate the computer on the Internet without secretmaker.

Tool that does not lose its interest in a special deal for a spam in the e-mail is spamfu http://spamfu.net. SpamFu basically a proxy server for e-mail that will analyze the e-mail messages using SpamAssassin which is often used in Linux. Installation spamfu with the installation of other software in Windows. A slightly confusing configuration software is a client such as Eudora, Outlook Express etc.. The most important is the need to set the username to be username: machine-pop-ISP, is the pop server that was should be machine-pop-ISP into localhost / 127.0.0.1.

For those of you who truly paranoid with the virus through e-mail, you should use a software-software that text mode client. I use Windows on the PC-pine that can be taken from http://www.washinton.edu/pine/ for both Windows and for Linux.

For those of you who use Linux, then the defense techniques that can be made more complex again. Indeed, most of the software in need of defense can take the free on the Internet. Spam Defense is available in Red Hat Fedora Core 4 is SpamAssassin. SpamAssassin software can be installed directly in at the time of installation of Red Hat Fedora Core 4. Indeed can not be directly used, we need to change the file / etc / procmailrc. Sample content procmailrc file can be taken in http://spamassassin.apache.org/full/3.0.x/dist/procmailrc.example.

If you simply configure the Linux Server experts. It is a good idea to read the read-MailScanner can be integrated with the Postfix SMTP server, SpamAssassin, and clamav. So that all mail that contains viruses & spam akan buang at first. This technique should be used at the ISP level. MailScanner can take in free or in the http://www.mailscanner.info http://www.sng.ecs.soton.ac.uk/mailscanner/. Anti virus clamav are able to take in the free http://www.clamav.net. For Windows users who want to use clamav recommend taking the version of Windows in its http://www.clamwin.com

Hopefully this paper can be useful to reduce the spam attacks on your computer. Akan better ISP if you also install a spam defense.

Load-balancing & Fail-over in Mikrotik

Condition: ISP where we use the Administrator to work as more than a gateway to connect to the Internet. All services must be able to serve Upstream & downstream. Because the case will be different when one of them can only serve downstream, for example, if using VSAT DVB One-way. For this case dimisalkan ISP has 2 routes to the Internet. One access to DSL (256 Kbps) and the other using the Wireless (512 Kbps). With the ratio of the DSL: Wireless = 1:2.
That will be done:


  1. Using all channels available to the gateway load-balancing techniques.
  2. Making one of them as back-up techniques with the fail-over
OK, let us just start eksperimennya:
  1. IP address for access to the LAN: > / Ip address add address = 192.168.0.1/28 interface = LAN
  2. IP address for access to the DSL: > / Ip address add address = 10.32.57.253/29 interface = DSL
  3. IP address for access to the Wireless: > / Ip address add address = 10.9.8.2/29 interface = WIRELESS
  4. Define the gateway and rasionya each: > / Ip route add gateway = 10.32.57.254,10.9.8.1,10.9.8.1
2. In the case of techniques to fail-over. Assumed that the main route through Wireless with DSL lines as a back-up when the primary path can not be passed. To check whether the main path can be passed or not, use the ping command.
> / Ip firewall mangle add chain = prerouting src-address = 192.168.0.0/28 action = mark-routing new-routing-mark = SUBNET1-RM
> / Ip route add gateway = 10.9.8.1 routing-mark = SUBNET1-RM check-gateway = ping
> / Ip route add gateway = 10.32.57.254
3. Good Luck!

Firewall to router Mikrotik

To secure the traffic of the Mikrotik router virus and excess ping the firewall can use the following script. First make the address-list "ournetwork" which contains the IP address of the radio, IP LAN and WAN IP or other IP that can be trusted
In the following example is the radio IP address = 10.0.0.0/16, IP = 192.168.2.0/24 LAN and WAN IP = 203.89.24.0/21 and other IP that can be trusted = 202.67.33.7
To create the address-list can use the sample script as follows to stay in compliance with your network configuration.
Create skrtip following use notepad and copy-paste to console Mikrotik
/ Ip firewall address-list
add list = ournetwork address = 203.89.24.0/21 comment = "Datautama Network" \
disabled = no
list = ournetwork add address = 10.0.0.0/16 comment = "IP Radio" disabled = no
list = ournetwork add address = 192.168.2.0/24 comment = "LAN Network" disabled = no
Then copy-paste the following script on the console Mikrotik
/ Ip firewall filter
add chain = forward connection-state = established action = accept comment = "allow \
established connections "disabled = no
add chain = forward connection-state = related action = accept comment = "allow \
related connections "disabled = no
add chain = virus protocol = UDP dst-port = 135-139 action = drop comment = "Drop \
Messenger Worm "disabled = no
add chain = forward connection-state = invalid action = drop comment = "drop invalid \
connections "disabled = no
add chain = virus protocol = tcp dst-port = 135-139 action = drop comment = "Drop \
Blaster Worm "disabled = no
add chain = virus protocol = tcp dst-port = 1433-1434 action = drop comment = "Worm" \
disabled = no
add chain = virus protocol = tcp dst-port = 445 action = drop comment = "Drop Blaster \
Worm "disabled = no
add chain = virus protocol = UDP dst-port = 445 action = drop comment = "Drop Blaster \
Worm "disabled = no
add chain = virus protocol = tcp dst-port = 593 action = drop comment ="________" \
disabled = no
add chain = virus protocol = tcp dst-port = 1024-1030 action = drop comment ="________" \
disabled = no
add chain = virus protocol = tcp dst-port = 1080 action = drop comment = "Drop MyDoom" \
disabled = no
add chain = virus protocol = tcp dst-port = 1214 action = drop comment ="________" \
disabled = no
add chain = virus protocol = tcp dst-port = 1363 action = drop comment = "ndm requester" \
disabled = no
add chain = virus protocol = tcp dst-port = 1364 action = drop comment = "ndm server" \
disabled = no
add chain = virus protocol = tcp dst-port = 1368 action = drop comment = "screen cast" \
disabled = no
add chain = virus protocol = tcp dst-port = 1373 action = drop comment = "hromgrafx" \
disabled = no
add chain = virus protocol = tcp dst-port = 1377 action = drop comment = "Cichlid" \
disabled = no
add chain = virus protocol = tcp dst-port = 2745 action = drop comment = "Bagle Virus" \
disabled = no
add chain = virus protocol = tcp dst-port = 2283 action = drop comment = "Drop Dumaru.Y" \
disabled = no
add chain = virus protocol = tcp dst-port = 2535 action = drop comment = "Drop Beagle" \
disabled = no
add chain = virus protocol = tcp dst-port = 2745 action = drop comment = "Drop \
Beagle.C-K "disabled = no
add chain = virus protocol = tcp dst-port = 3127 action = drop comment = "Drop MyDoom" \
disabled = no
add chain = virus protocol = tcp dst-port = 3410 action = drop comment = "Drop Backdoor \
OptixPro "disabled = no
add chain = virus protocol = tcp dst-port = 4444 action = drop comment = "Worm" \
disabled = no
add chain = virus protocol = UDP dst-port = 4444 action = drop comment = "Worm" \
disabled = no
add chain = virus protocol = tcp dst-port = 5554 action = drop comment = "Drop Sasser" \
disabled = no
add chain = virus protocol = tcp dst-port = 8866 action = drop comment = "Drop Beagle.B" \
disabled = no
add chain = virus protocol = tcp dst-port = 9898 action = drop comment = "Drop \
Dabber.A-B "disabled = no
add chain = virus protocol = tcp dst-port = 10000 action = drop comment = "Drop \
Dumaru.Y, it's also because in didisable often used for VPN or \
webmin "disabled = yes
add chain = virus protocol = tcp dst-port = 10080 action = drop comment = "Drop \
MyDoom.B "disabled = no
add chain = virus protocol = tcp dst-port = 12345 action = drop comment = "Drop NetBus" \
disabled = no
add chain = virus protocol = tcp dst-port = 17300 action = drop comment = "Drop Kuang2" \
disabled = no
add chain = virus protocol = tcp dst-port = 27374 action = drop comment = "Drop \
SubSeven "disabled = no
add chain = virus protocol = tcp dst-port = 65506 action = drop comment = "Drop PhatBot, \
Agobot, Gaobot "disabled = no
add chain = forward action = jump jump-target = virus comment = "jump to the virus \
chain "disabled = no
add chain = input connection-state = established action = accept comment = "Accept \
established connections "disabled = no
add chain = input connection-state = related action = accept comment = "Accept related \
connections "disabled = no
add chain = input connection-state = invalid action = drop comment = "Drop invalid \
connections "disabled = no
add chain = input protocol = UDP action = accept comment = "UDP" disabled = no
add chain = input protocol = ICMP limit = 50/5s, 2 action = accept comment = "Allow \
limited pings "disabled = no
add chain = input protocol = ICMP action = drop comment = "Drop excess pings" \
disabled = no
add chain = input protocol = tcp dst-port = 21 src-address-list = ournetwork \
action = accept comment = "FTP" disabled = no
add chain = input protocol = tcp dst-port = 22 src-address-list = ournetwork \
action = accept comment = "SSH for secure shell" disabled = no
add chain = input protocol = tcp dst-port = 23 src-address-list = ournetwork \
action = accept comment = "Telnet" disabled = no
add chain = input protocol = tcp dst-port = 80 src-address-list = ournetwork \
action = accept comment = "Web" disabled = no
add chain = input protocol = tcp dst-port = 8291 src-address-list = ournetwork \
action = accept comment = "winbox" disabled = no
add chain = input protocol = tcp dst-port = 1723 action = accept comment = "PPTP-server" \
disabled = no
add chain = input src-address-list = ournetwork action = accept comment = "From \
Datautama network "disabled = no
add chain = input action = log log-prefix = "DROP INPUT" comment = "Log everything \
else "disabled = no
add chain = input action = drop comment = "Drop everything else" disabled = no
Effect of script above is:
Mikrotik
  1. router can only be accessed by FTP, SSH, Web and Winbox from that defined in the IP address-list "ournetwork" that it can not be accessed from any place.
  2. Port-port which is often used in the virus blocks the virus so that traffic can not be missed, but it needs to if there is difficulty accessing the user service must be checked at a certain chain = "virus" if the port is needed by the user terblok firewall.
  3. Packet limited to avoid excess ping.
In addition to note is: should a new user and password with the full group and then disable admin user, this is to minimize risk in your Mikrotik hack people.

DHCP Server under Ubuntu 5:10

DHCP or the representative of the Protocol, Dynamic Host Configuration. Dynamic is actually a word can represent everything. If we are already familiar in the Linux Networking may be able to easily understand the meaning and purpose in it? DHCP Server.
I was originally still apply for pengalamatan Static Address in the office where I work. But with the growing number of PC, and to improve security. Finally, the DHCP can be a very good alternative. With DHCP Admin does not need to set one at a computer user with a static address. Let DHCP-Server that provides an address in accordance with the given range. From the side, of course, security configuration is more secure, because users will not be able to change the IP manually, and if the user deliberately alter IP then it will not be able to communicate with the network. Try following the tutorial I describe the configuration of my life. The levels are for BASIC Users like me. The packages needed are:
-Operating System: Ubuntu Breezy Badger 5:10
- DHCP Server: DHCP3
Phase Installasi and Configuration
If you already have a Ubuntu box then you need to do is simply install the DHCP package only. I use DHCP the DCP is version 3. to install run the following command:
# Sudo apt-get install dhcp3-server
wait until the process is complete, then edit the configuration file dhcp3-server in the directory / etc / default / to run the command:
# Sudo Vi / etc/default/dhcp3-server
Find the line that contains interfaces = "" then change to:
Interfaces = "eth0" (or Ethernet depending on where you will use, but if there is only 1 ethernet then type the default eth0)
Next stages of change is that there is a dhcpd.conf file in the directory / etc/dhcp3, by running the following command:
# Sudo Vi / etc/dhcp3/dhcpd.conf
Find the command line:
# Option definitions common to all supported networks ...
option domain-name "example.org";
option domain-name-servers ns1.example.org, ns2.example.org;
default-lease-time 600;
max-lease-time 7200;
Then change to:
# Option definitions common to all supported networks ...
# option domain-name "example.org";
# option domain-name-servers ns1.example.org, ns2.example.org;
# default-lease-time 600;
# max-lease-time 7200;
Then search again the following command line:
# A slightly different configuration for an internal subnet.
# subnet 10.5.5.0 netmask 255,255,255,224 (
# Range 10.5.5.26 10.5.5.30;
# Option domain-name-servers ns1.internal.example.org;
# Option domain-name "internal.example.org";
# Option routers 10.5.5.1;
# Option broadcast-address 10.5.5.31;
# Default-lease-time 600;
# Max-lease-time 7200;
#)
And change them to:
# A slightly different configuration for an internal subnet.
subnet 192.168.0.0 netmask 255.255.255.0 (# subnet is a range of IP which you use, in the example I use a range of IP Class C
range 192.168.0.1 192.168.0.254; # Range is a range of IP addresses used in the example I use a range of IP class C address with the range 1-254)
option domain-name-servers 202.188.0.133, 202.188.1.5; DNS # that you use, commas to enter secondary DNS
option domain-name "micokelana.com" # Name of the DHCP Server
option routers 192.168.0.1; # It is the gateway we need to connect to the internet
option broadcast-address 192.168.0.255; # It is the address for the Broadcast
default-lease-time 600;
max-lease-time 7200;
)
If you want every user to get a fixed IP, for example, user 1 will get a fixed IP 192.168.0.2, then you must add the following command:
Find the line:
# Fixed IP addresses can also be hosts for Specified. These addresses
# Should not also be listed as being available for dynamic assignment.
# Hosts for which fixed IP addresses have been Specified can boot using
# BOOTP or DHCP. Hosts for which no fixed address is Specified can only
# Be Booted with DHCP, unless there is an address range on the subnet
# To which a BOOTP client is connected which has the dynamic-bootp flag
# Set.
# (host Fantasia
# Hardware ethernet 08:00:07:26: c0: a5;
# Fixed-address fantasia.fugue.com;
#)
Then you can configure the network in accordance with your place, I give the following examples:
User1 host (
hardware ethernet 08:00: FE: 26: c0: a5; # type the MAC Address User1
fixed-address 192.168.0.2; # IP address User1
)
With so Users will always have 1 IP 192.168.0.2
Do not forget to save the configuration that you created, and then restart the DHCP Server with the command:
Sudo # / etc / init.d / dhcp-server restart
The next step to adjust your stay and the number of computers on the network configuration that you create. And to experiment you can observe each line in the dhcpd.conf file, the overall configuration files are provided an explanation for the slightly less

Reference:
http://www.ubuntulinux.org
http://www.linuxhomenetworking.com

Wednesday, May 6, 2009

Freeware hardware Diagnostics tools

One application that is required when installing the operating system (Microsoft Windows, Linux) is the Driver. Application / software is working to set up and connect the various application systems with the hardware, so the job became available hardware optimized. If a driver does not install the hardware, most likely performance of the computer becomes very slow. For example after installing Windows Xp, and there is no driver Video (VGA) to open the display will appear at a snail's pace, especially for graphics work. Some of the standard hardware already provided in the operating system, such as CDROM, Keyboard, Mouse, and more. However, the drivers for the motherboard chipset, Graphics Card (VGA), Network Card must be installed most of its own. To make sure that after installing the Operating System, Driver CD is included when buying a motherboard.

But sometimes that has a computer for a long time, or the driver CDnya akan there is no difficulty to install the required drivers. Can only find on the Internet, but what you want to search? sometimes we do not know the type hardwarenya. So one of the tips to know the hardware in the computer system we are with the software that can detect the type of hardware. One of the software and a very good free version available is Everest. Used this software called AIDA32 which also can be downloaded and are still good enough to use. Everest has advantages compared to similar software, which usually can only be detected from the registry or, if already installed drivernya. Everest is able to detect low-level hardware-nya, so that even if not yet installed drivernya, we can know the type / types of hardware installed.

everest home edition

Besides the ability to detect harware information based on low-level hardware, these tools have great facilities, such as:

  • DirectX information including Direct3D acceleration features
  • Diagnostics module to simplify troubleshooting
  • Memory benchmarking
  • Web links: IT portals, software and driver downloads
  • Manufacturer links: product information, driver and BIOS download
  • Hardware information database more than 38,000
  • Information overclock
  • No need installation, so it is portable.
View the facilities provided, then this software is very useful, especially for those who often improve PC / computer hardware, for who want to update the driver and the computer, as well as software utilities that one may be very necessary.

To Download the Everest can be opened here:
  • Http://www.softpedia.com/progDownload/Everest-Home-Edition-Download-16369.html
To Download AIDA32 (old version of Everest) can be opened here:
  • Http://majorgeeks.com/download181.html
  • Http://www.softpedia.com/progDownload/AIDA-Download-6969.html

Tuesday, May 5, 2009

USB Flash drive (Flashdisk) suddenly not detected / error

Recently I Flashdisk USB 2 GB size that is suddenly not detected, in Windows Explorer only detect Removable Drive, when trying to open the message only appears that we are prompted to enter the disk drive or a message appears Please insert a disk into drive M: , when Flashdisk already installed.
Also surprised to see it, does not seem to remember the past in the loose by force. The only really be used for copying files from CD to the 2-chip Notebook friend.



I simply try to check Flashdisk, because the data contain a rather large, and some quite important. Following the steps that I can usually try and solve the problem.

1. Try in the computer / USB port other

Sometimes a problem like this only happens on our own course, so it needs to be tested in another computer. Because here there is one computer and labtop friend, so I try to live there, but the results naught, but only detect as a Removable Drive, so the message is opened only appear as above. Similarly when the tide in the other USB port.

2. Format in the windows Explorer

Actually do not want in the format, because it is concerned with data that is in it. But as in some computer can not be detected and Alhamdulillah some data is still stored on the hard drive, I try to format with the standard Windows format. the result is still the same, also has not been successful.

3. Using the HP USB Disk Storage Format Tool

Previous two steps do not work, then simply open a browser and search for information via google. In some places to read that some people can overcome this problem by using this free software, HP USB Disk Storage Format Tool. Although the design specifically for USB HP, but this can also be used for the other.

After I try, even the software that it does not detect the existence of Flashdisk, so it is not successful. If you want to try Download HP USB Format tool (1.98 MB) can be read in PCWorld

4. Try with Ubuntu Linux 8:10

The way I try next Flashdisk install the operating system on Ubuntu Linux 8:10. With this CD we can run Ubuntu directly from CD (without installing the Hardisk).

Once signed in to Ubuntu, it detected a Flahsdisk, but accompanied with a sign that there is something wrong. And indeed, when trying to open it does not respond there is nothing, even when trying to format also can not.

5. Through Disk Management

Back to the windows, trying to find more information through the internet, get information to format the disk through Management (Right-click My Computer> Manage, and select Disk Management). This also did not work out, then another way (through the Disk Management) to change the drive letter Flashdisk, the original M: replaced the other. In the Forum are many owners of flash write that it was successful.
So I try, with the right-click Drive F: (my flash), the menu and then select Change Drive Letter and Path for M: I try to drive X. after that the windows had a Disk Error message appears, but the drive can be changed into X:, then I try to open it. This is still not successful.

6. Utilizing Flashdisk Warranty

Because the various ways previously not work out, finally I try to search Nota Flashdisk this purchase. There Lifetime written warranty, so I finally decided to return to its stores, hoping to direct the new change.


In fact the shop does not directly, but the company sent to the author, the new holiday and a new process early in January. Indeed, he will be replaced new, but new petengahan around January. It seems there is no other options that are better, so I just agree. In fact there are still other ways, such as in the default format with the software if there is a flash, although it is also a small possibility of success if the various steps above does not work. Hopefully, this experience can be useful for the reading, and indeed we should not rely only on the flash storage for data is very important, because it can only flash suddenly damaged or dead.

EXE files can not run

A friend had some problems with the file type EXE (Applications). All or most Windows EXE files can not run, always run the show "Open With ..." or it can be with the right-click and choose "run as ..". While the computer is scanned for viruses and have been cleared.

Problems like that are certainly disrupt, because we are not able to open almost any computer program. This is often caused by a virus or can also have damage to the windows system. If you or your friend ever experienced, try the following tips to improve it.

For additional information, the Association of the file (File Association) in the windows stored in the registry (database can be as various windows and applications in the install), so if the settings in the registry is broken, then could only files (not only EXE ) can not be executed. Exe files for which can not run, try a few tips to improve.

1. Check list Setting File Types

The first thing that needs to be tested is to check the list of types of files. From Windows Explorer open Tools> Folder Options and then select the File Types tab and click the New button and fill in the File Extention EXE, and then click the Advanced button and select Application and click OK. If the Restore button appears, then click it.

If this step does not work, then try the next step or the other.

2. Download Registry Fix
If the registry is damaged, it can use one of the registry fix (file / tools to repair the damage type of the file in the registry) following (if one does not work, try the other):

* Type. Reg, download here (EXE File Association Fix)
* Type. COM, download here (EXE File Association Fix)
* Type. BAT, download here (Association to restore the files in windows Xp to default condition / early).

after the download, run with a double click the file, if the file. Reg and executed successfully, a confirmation window will appear as follows:

Just click the Yes button. If it does not appear, or appear a message that the registry editor has been disabled or appears to "open with .." then try to use the file that bertipe COM or BAT. If the file types above also does not work, then need to try other ways.

3. Using System Restore facility
If the Restore Point facility is active, the windows with the condition to restore the previous condition can usually fix this problem. But sometimes this feature is not activated at this time because it often digs into the virus. In addition, programs or applications that are installed after the date of the Restore Point, usually can not run again (alias must be installed in the back). To access the restore point, open from the Start Menu All Programs> Accessories> System Tools select System Restore. Read also the article on System Restore here

4. Use avast! Virus Cleaner
Although this tool is only used for killing some virus-specific, see the explanation on the site, this tool can also detect if a file important Association damaged, it will be fixed. In addition, this tool will also make the virus-virus scan is often menginfeksi computer. Because this bertipe EXE file, the possibility also can not run in the windows with issues such as the above. Alternatively, rename this file with other file types, for example:. COM,. SCR,. CMD or can also be tested with. BAT or. PIF

Download here avas! virus Cleaner

Open the Command Prompt Tips :
Command Prompt can be very useful in situations such as above, for example, run the file COM, BAT, open the registry editor or copy-men (me-rename) files. Merename to file with the command prompt, the command can be used as follows:

ren file_1.exe file_1.scr (akan me-rename file_1.exe be file_1.scr)
copy file_1.exe file_1.com (akan file_1.exe to copy and produce file_1.com)

If Command Prompt can not be open through the Accessories menu. There are tips that can be done to open the Command Prompt. Do the following:

  1. Open Task manager (Ctrl + Alt + Del)
  2. Mouse over to the File Menu> New Task (Run ...)
  3. Click the New Task (Run ...), while pressing the Ctrl key
  4. Should be shown Command Prompt

If you have any input or any other means please added, may be more complete repair of the Association EXE file. (http://ebsoft.web.id)

Reference
http://filext.com/faq/broken_exe_association.php
http://windowsxp.mvps.org/exefile.htm
http://www.dougknox.com/xp/file_assoc.htm

How do I upgrade the BIOS?

BIOS (Basic Input / Output System) is a simple system in which Chip Motherboard duty to recognize and prepare the hardware / computer hardware when the PC switched on, such as Hardisk, Processor, Floppy Disk, Memory, DVD Rom and the other. If all the wrong Operating System (such as Windows, Linux) run the new start

If your computer is running smoothly, or does not have a problem, it does not need to upgrade (update) the BIOS on our machines. Because it is very risky for those who not, if inadvertently computer can not be operated even more;). But there are some things that cause the BIOS must be upgraded, for example:
  • When switched on the computer, suddenly stopped before entering the operating system. But you should also read this article.
  • Computers have been long enough, and we install the new hardware is not detected properly, for example, we replace the new processor. Because the BIOS is often not recognize the processor.
  • BIOS is broken, both shown with the message or not. For example invalid BIOS, BIOS etc. corrupted.
  • BIOS fails to detect the hardware, such as hardiks, CD-ROM drive, VGA and other
  • Want to [slightly] better optimize the performance of computer (hardware)
  • The vendor's motherboard recomendasi
If the BIOS on the computer is broken, it can not run the automatic operating system such as Windows Xp, for example. Some things that can cause damage to the BIOS, for example:
  • Turn off the computer without shutdown, power or sudden death (without UPS)
  • Viruses are
  • Error to upgrade the BIOS. For example, the computer died when the process of upgrading, BIOS does not match the type of motherboard etc..

How to upgrade BIOS Computers?

To upgrade the BIOS, you need 2 files, first file itself and the BIOS Flash Memory Writer utility, that is to upgrade the software (flash) the BIOS, for example AFLASH.EXE, and other AWD816a.EXE. Usually the BIOS file with the extension 001, or other BIN, sengan size of less than 512 KB. For most of the BIOS upgrade should be done through DOS or MS-DOS, even though at this time also have many vendors that provide software-based Windows.

Who needs to find a file is the BIOS and Flash Writer is right, because if it does not match, the computer can not bakalan the possibility of living longer. But if the type is correct, the possibility always successful, except death or the computer power off when BIOS flash is running. In general, the BIOS flash lasts only a few seconds only. Less than 30 seconds. To make a flash BIOS, after the entry into DOS, type the name of Flash Writer, for example, to AWD816a.EXE

C: \ ADW816a

So usually there is a description how pemakaiannya. Follow the command, make sure to also membackup the old BIOS, it can be done with a flash file writer also. Description that is displayed may be different. If still in doubt, should be asked to know more. Or can also be read in the motherboard manual.

How do I determine the type of motherboard?
There are several ways to determine the type of motherboard is owned, among others:
  • See the user guide is included when buying a motherboard
  • Display the beginning of the computer on, usually displayed or type series motherboard
  • Viewing the motherboard directly (open the computer case), there are usually written motherboard brand and type.
Where is the Download and Flash BIOS Utility is?

If the motherboard including our popular, the vendor usually has to provide downloads and BIOS Flash Utility it, such as MSI, Gigabyte and the like. Here are some links to download the motherboard BIOS and drivers that can be used as reference:
  • ASUS Motherboards here
  • ECS Web Site here
  • GIGABYTE Motherboards here
  • Micro Star International (MSI) motherboard here
  • Place DriverStock download various drivers
If your motherboard does not have a web site to download the official driver, tried to search via www.google.com, type in the type followed by a word such as the motherboard BIOS, download the BIOS and the like. For example "BIOS P4VP-MX" or "Download BIOS P4VP-MX".