my reflection

blog this is me make to share my invention about internet exploration at every evening

Daftar

Enhance PC Security




A lot of annoying things that can happen to our computer. For example there are people who either deliberately or accidentally deleting important files we. Or change the various configurations in Windows. In addition it could have other people see your files confidential. Such events are very likely to occur when your computer is a computer "general". That is a lot of other people who helped put on, for example a friend, sister or brother. Remember, a beginner (in computer terms) are usually very happy to try everything on the computer. Well, to avoid the things that we do not want that happening on our computer you can try a variety of the following steps:

1. BIOS password
The first time you have to put a password on your BIOS. Why? Because the BIOS there are facilities to enable and disable some of our computer resources. Although there is an easy way to penetrate this password, but at least it will slow down the intruder ....

2. Make sure the boot only from hard drive.
In your BIOS, make sure the settings for booting from the hard disk only. In other words, disable booting from a floppy disk facility, CD-ROM, or other media.

3. Disable Start-up Menu
With the startup menu to disable it so other people (including us) can only boot from Windows (can not boot to a DOS Prompt). How, in the config.sys file add: Switches = / F / N to CONFIG.SYS. At the top of the autoexec.bat file add:
@ CTTY NUL
@ BREAK OFF
@ ECHO OFF
Being at the very end of the autoexec.bat file add: CTTY CON

4. Disable Boot Key
The point is to prevent accidental button and F5 F8 during boot. By pressing F8 will display the start-up menu. How to disable: Open msdos.sys file located in the main directory (C: \) with Notepad. Then replace the Bootkeys Bootkeys = 1 = 0.

5. Hide the icon in the Control Panel
In the Control Panel there are various facilities to do the settings / configuration on our computer. For example setting of passwords, printers, desktop themes, etc.. Well if you do not want anyone else who wants to change your computer settings, you can perform the following actions, namely hiding the icon in Control Panel. The trick, first open the file control.ini contained in the folder c: \ windows \ control.ini (if your windows folder with another name, please adjusted). Then under the section [do not load] please do not enter the facility you want to show. For example to hide the icon password please write "password.cpl = no". To hide the Desktop Settings icon, write "desk.ini = no", and so on. To view the *. cpl file list you can see in c: \ windows \ system.

6. Protect with Software
With software protection can vary its shape. First encryption. By performing encryption (encryption) of others will find it hard to open files that are encrypted. At the time we are required to encrypt a password, which password will also be used to perform decryption. That way people who do not know the password will not be able to open the file and will not know its contents. Examples of software used to perform encryption is Cryptext, PGP, etc.. In addition to the encryption there are other ways to secure our files, that is by using the software Win-Secure It and Folder Guard. With our software can hide files / folders, prevent the execution of the program, preventing deletion (delete), etc.. Files that have been hidden (hidden) will not be visible in Windows Explorer even if the option Show All Files enabled. Preventing others to execute / run the program becomes very important if you have the software to configure on Windows, such as Winboost, Tweak UI, the Start Menu Changer, and so on.

7. When you include paranoid
With the six steps on your computer already has a decent level of security (certainly not bad for a hacker). But when you include paranoid or really scared your computer diisengin others you can continue the next step. That was the delete or rename files that include the category of "dangerous" when running, such as FDISK.EXE, FORMAT.EXE, etc..
READ MORE - Enhance PC Security

How to Create Bootable USB Drive




USB (Universal Serial Bus) drive has become a device that is often used for backing up data, shifting the function floppy disks, CDs and ZIP disks. USB drives are not only cheap but also very practical, durable, and can have a fairly large storage capacity. For we do not anticipate when the computer can boot, we should have a bootable disk. Bootable disk can be mengindarkan us of our inability to access the computer because of boot problems. By using a bootable USB drive, we can even solve problems faster booting.


Here are the steps to create a bootable USB drive:
1. Insert your USB drive into one USB port on your computer

2. Click the "Start" button at the bottom left on your computer screen

3. Type "cmd" in the RUN window to open a command prompt

4. Type "disk parts" into a command prompt and press Enter. After that type "list disk" and press Enter again.

5. Determine which of the disks that display the list of which is a USB drive. (For example, 4GB USB drive, then the option with 4GB size that you need to see). Record the number that identifies your USB drive it in the paper.

6. Type the following command into the command prompt to format on a USB drive.

"Select the disk A," replace "A" with the number you get in step 5 earlier. Press Enter
"Clean." Press Enter
"Create Partition Memory." Press "Enter."
"Select Partition A." Press "Enter."
"Format FS = NTFS." Press "Enter."
"Assign." Press "Enter."
"Exit." Press "Enter."

7. Insert the installation CD of Windows XP or Vista you. Your computer will read the installation CD, and a window will appear on the screen. List of all drives will be displayed there. Look for the letter which is a symbol of the CD-ROM and a USB drive. Take note of these letters in the paper.

8. Type the following command into the command prompt:

"B: CD boot," replace "B" letter which is the symbol of the CD-ROM. Press "Enter."
"CD boot." Press "Enter."
"Bootsect.exe/NT60 C:," replace "C" with the letter which is a symbol of the USB Drive. Press "Enter."

9. Copy the boot information from the installation CD to a USB drive by entering the following command into the command prompt:
"Xcopy c: *.* / s / e / f B: /," replace "B" letter which is the symbol of the CD-ROM and replace "C" with the letter which is a symbol of the USB drive. Press "Enter."

Let the computer to copy data from the installation CD to a USB drive.

10. Unplug the USB drive from the USB port, replace the lid, and give the label "bootable" with markers. Save the USB drive it in a safe place. Remove your Windows installation CD and return it to its place.
READ MORE - How to Create Bootable USB Drive

How to manually eradicate the virus in the computer



Eradicate the virus is not detected by antivirus on the computer. Usually this type of local virus2 who must wait some time tuk bs kebaca antivirus, antivirus providers jg coz humans who need time to make updates Exterminate virus2 tuk who continue to roam it.
Here's how the manual or call the command with Windows tuk Exterminate virus
The first step with deadly virus who are running in memory
• How, to show the Windows Task Manager by pressing Ctrl + Alt + Del
• Go to the tab "Processes", then click the "User Name" to sort the files that are processed in memory.
• Turn off all suspicious EXE file as a virus in the computer memory that we have previously sorted based on the "User Name". Do not turn off file the category "System", "Local Service", and "Network Service", because it can make our system Hang or Freeze.
Second Stage with Disable Virus on Startup
• The trick with using the MSCONFIG command, click Start menu> Run> msconfig
• window will display "System Configuration Utility". Then select the tab "Startup"
• In the startup window will pop up any application program that will run when the computer first loading the first time, so choose which one is activated and is not, in this case as a suspicious applications that the virus component is not enabled (disable) or by not menconteng check box, step should simply select "Disable All" and enable (enable) return the desired startup if the virus has been eradicated.
The third stage is to remove files from a computer virus
• How to use the facility "Search" in Windows, click Start menu> Search
• Then find the EXE file the virus (virus samples: Tati.exe) known name from the first and second steps (memory or startup).
• The file is usually located in the System32 or another folder in Windows. Once found, delete, or delete the file. Some of the events to delete these files need to move the first folder and then delete or move ever jg after the file could not be didelete then restarting the computer solution and then delete.
The fourth stage is to remove the virus from the System Registry
• This is the last step by using the command REGEDIT, select Start> Run> regedit
• Will perform the Registry Editor window and select menu "Edit" select "Find" (Ctrl + F)
• Input file name that we want to delete the virus (Tati.exe), then select "Find Next". Once found virus files, delete all the registry that contains the components of the virus.
• Repeat this step to look for other viruses file2.
• When finished restart the computer, finish
READ MORE - How to manually eradicate the virus in the computer

Notebook Screen Dead






There are a lot of people ask me, my laptop after falling really dark, or the laptop suddenly dark or like totally dead. What actually happened ...? Let's learn together .....


Cause Laptop Screen Dark or Off:

1. VGA chipset
2. flexible cable
3. Inverter / plyback on television
4. LCD

So if dark or dead there are several possibilities, we can keep track of vga first. Its distinctive feature is try connecting the vga out with an external LCD monitor or the dark when there is a possibility chipset vga yg damaged.

Meanwhile, when lit, there is a possibility lcd, inverter, or a flexible cable. To test must use an identical or the same dikanibalkan typenya. Such as inverters, lcd or flexible.

If we look at a picture of a thin or as shadows on the LCD, then that might be damaged is the LCD backlight (CCFL), an inverter or flexibelnya.

So dark conditions or die is not necessarily have to replace the LCD.

may be useful
READ MORE - Notebook Screen Dead

Quick Open Applications




Description of problem:
Netbooks are small to make the PC a bit complicated if you want to run applications that are stored in a somewhat hidden. A more practical way is to register the file / application to the registry, so that Windows will immediately recognize the name of the program on the call and immediately executes it.

solution:
Here are the steps:
1. Run Registry Editor by typing "regedit".
2. Go to the subkey:
HKEY_LOCAL_MACHINE \ Software \ Microsoft \ Windows \ CurrentVersion \ App Paths
3. Create a new subkey with the name you want, for example aplikasiku.exe
4. Double-click the data string is named (Default) and enter its value to the location of the file or application, for example D: \ master \ files \ app.exe.

For the results, typing "my application on the Run menu or the Command Prompt, and observe what happens.
READ MORE - Quick Open Applications