Maybe for Internet users hack is an unusual word We meet again. a lot of our friends affected by Either email hack, facebook, twiter or the other. in fact other people Could not hack it Either email, facebook, etc. twiter We Are not careless in using it. whose real name hack of the above networks is Very Difficult, but Because the website has passed the SSL (* existing lock at the bottom right image). usual picture of a lock That will from Arise if We access it with "https: / /" (* without the quotes). and Also Because the website is using servers located overseas. I myself have never Experienced Such thing as hack of the email, facebook, etc twiter. (* Hopefully no one envy / evil with me), many people WHO have complained to me saying he was in the hack facebook (* Because of my own as an OP Net). They explained They were the resource persons after having a lot of errors in usage, Because after taking over a lot of social services, WHO forget to logout, already so use it most of the tablets. understand a lot of services use Email, Facebook, twiter etc. are the fathers and the ladies really are clueless about computers. For that reason I have a solution That May be useful for you to solve problems of penghackan That Often occur in the world the big screen:
1. Get Used to delete cookies in your web browser you use frequently. how the way: Click on Edit -> select the Privacy tab -> Show Cookies -> Remove all cookies (* for mozilla in ubuntu) Click Tools -> Options -> Privacy -> Show Cookies -> Remove all cookies (* for mozilla on Windows Xp)
2. Do not forget to logout / exit after using the service Email, facebook, etc. twiter.
3. For Paypal users do not too Often Because if you frequently log on a different IP number will from have exposed limitations / on the freeze.
4. Distinguish Between imail password with the password of social media services like facebook, etc. twiter. Because Email is the center of all these social services.
5. Never menceklis on the caption "Keep me logged in", "Remember me", "Let me stay logged in" so to speak. Maybe this only if I share my friends there cans WHO Want to add please in the comments box.
Sunday, April 24, 2011
How to Choose PTC
Rather than not there is a new post I feel a lot better post about this PTC Tips least, I hope can help my friends who follow this PTC program and could be a solution for picking PTC (Paid To Click), where the scam (fake) and hopefully also be sharing each other fellow friends who follow this with PTC proram put his opinion in the coment box, more and more of this PTC program, the more also the only PTC-PTC'an aka SCAM but I'm not saying that all a SCAM. well on this occasion I will give you tips which PTC-bo'ongan Bo'ong only let's hope you just do not like me who have been exposed to the same victim-PTC PTC beginian kind, is not so little anymore Pay kesel already out (PO) .
Rather than continue to better direct shut keinti essentially yes, but this is my opinion and indeed the experience of my life,,, experience the same ex-tricked-PTC PTC is petty I do not get from everywhere, so if there is something wrong or want to add please boxed coment:
1. Usually the website a bit heavy to be opened, but I'm not saying that lightly that scam.
2. Usually there is not website advertising For example: in his ads display his own website.
3. Advertisement little can be said the same thing, usually only one
4. And this is the most important usually is not a scam if it is a sign of lock. For example: you try to add the s at http:// so https: / / example: there are websites http://neobux.com after added so https: / / neobux.com if the open is usually in the status bar there is a picture lock, but my 'm not saying there is not this just a scam that lock solution.
Maybe that's it from me because I am also still a cloud, so if there are friends as well that in lying to have more tricks you can add in the coment box, or friends have a PTC which have fulfilled the above criteria Sending Referrals let us mutual benefit.
Rather than continue to better direct shut keinti essentially yes, but this is my opinion and indeed the experience of my life,,, experience the same ex-tricked-PTC PTC is petty I do not get from everywhere, so if there is something wrong or want to add please boxed coment:
1. Usually the website a bit heavy to be opened, but I'm not saying that lightly that scam.
2. Usually there is not website advertising For example: in his ads display his own website.
3. Advertisement little can be said the same thing, usually only one
4. And this is the most important usually is not a scam if it is a sign of lock. For example: you try to add the s at http:// so https: / / example: there are websites http://neobux.com after added so https: / / neobux.com if the open is usually in the status bar there is a picture lock, but my 'm not saying there is not this just a scam that lock solution.
Maybe that's it from me because I am also still a cloud, so if there are friends as well that in lying to have more tricks you can add in the coment box, or friends have a PTC which have fulfilled the above criteria Sending Referrals let us mutual benefit.
Sunday, April 17, 2011
How to Remove a Virus
If you suspect you have a virus (or any other malware), you should take steps immediately. Sometimes such problems occur and system slow downs due to registry errors get a good registry cleaner and pc optimizer from Intel Directory . The following procedures work for most malware (except perhaps for completely new, unknown or unusually malignant strains). It is better to complete all steps, so you can be (reasonably) sure that all traces have been removed.
Signs to look out for (infections may cause one or several of the following):
Source : www.wikihow.com
Signs to look out for (infections may cause one or several of the following):
- Slow computer, and/or slow internet connection.
- Strange pop-ups or web browser redirections (beyond those expected from dodgy websites).
- Program failure, or inexplicable errors (even after a fresh install).
- System functions unavailable (eg: Control Panel, Task Manager, Internet Explorer).
- System giving a "RPC error", giving a window with a 30 second countdown to a restart.
- Excessive internet cap usage, i.e high internet traffic on your computer.
Steps
- Run your virus-scanner, but beware, many modern viruses can circumvent (or hide from) anti-virus programs. Quarantine anything suspicious.
- Make sure you are using a reputable antivirus. Some good free ones are Avira AntiVir, AVG, and Avast! NOD32 from Eset has the highest detection rate and lowest resource consumption, though it is not free.
- Install MalwareBytes Anti-Malware and update it. Don't scan for malware yet.
- Install Spy Bot[1] and update it. Don't scan for malware yet.
- Reboot into Safe Mode - Restart your computer and press F8 before Windows loads. Press F8 several times if you need to. Select Safe Mode from the resulting menu. Safe Mode disables much of the startup routine (including some common Malware hiding places).
- Run your Malware Scanners - Run both the scanners sequentially, deleting any references found.
- Enjoy your sanitised computer.
Tips
- If these steps are difficult to follow or impossible to achieve, please call a computer service professional.
- Booting in Safe Mode is especially important if the malware is difficult to remove normally.
- If this method fails to clean your computer, download HijackThis, run and save a log, and then post the log to a reputable security forum such as BleepingComputer or GeekstoGo.
How to Participate in Computer Security Day
Computer Security Day is held yearly on November 30th as a way of reminding all computer users that computer security and safety is an important personal and workplace responsibility.[1] This is a good day to do some basic security checks and to follow up anything you've been meaning to do for a while. This article presents some of the things that you might like to consider doing on Computer Security Day or any day when you're concerned about your computer's security.
Steps
- Read your workplace's computer security policy again. If your workplace has a policy, read it. Even if you've already read it before, it may have been updated, or you may have forgotten important parts of it Read it for a refresher.
- Check your computer station and office for security and safety issues. Looking around the area you work in can reveal a number of hazards that can be dealt with easily provided you follow through checking them methodically. Here are some suggested activities:
- Check the batteries in your computer room's smoke detectors. Update them if needed. Install them immediately if you have none.
- Check for fire extinguishers. Do you have them near your computing and server equipment in case of a fire?
- Place monitors, keyboard and other computer equipment on anti-slip mats where needed.
- Have you got anti-static features in place to prevent shocks? This is especially important if you work with the internal hardware.
- Have you got power surge protectors in place for all computers and related equipment? If not, buy some today and install them immediately.
- Check the security and safety of your computer hardware. Whenever you leave your room or office, can other people access or remove your computing equipment? If so, consider instituting practices that will prevent them from doing anything with your computer:
- Put computer security posters in the office or room to remind everyone of their security responsibilities.
- Use passwords to prevent unwanted access to computers.
- Attach computers to the wall or heavy equipment by means of locks in order to prevent them from being removed. This is especially important for laptops and notebooks.
- Clean the hardware and your desk zone. A cluttered workspace and messy office can be the cause of sloppy work practices in relation to confidential information and the more at ease everyone has become with leaving confidential information lying about, the harder it becomes to break the slack cycle. Jump on it now!
- Vacuum the computer keyboard and computer area to remove dust build-up. Wipe down the screens with anti-static wipes.
- Ensure that all dust, including chalk dust, is not covering or inside computers and related equipment. Also remove pet dander, especially if your cat has a habit of sleeping next to your computer as you work.
- Clean the heads on disk drives and other magnetic media drives.
- Clean the area around your computer to remove clutter and to ensure that you know where all confidential files, discs, memory sticks, and other related confidential information actually is. Store everything securely.
- Check for software and program vulnerabilities. Use the tools at hand to keep your computer software, applications, and programs in top shape.
- When did you last change your password? Do it today if you can't remember. Read How to choose a computer password that is hard to guess for more help.
- Do a virus sweep. Read How to remove a virus if you find one.
- Delete unneeded files. They use memory but also create clutter, making it both harder to find or spot problems, and providing more potential "gateways" for viruses to enter through. A regular clean up is cathartic.
- Get rid of your Adobe Flash cookies. Read How to delete Flash cookies for the instructions.
- Examine the audit files on your computers.
- Verify computer inventories. If you're running a business or you're in the part of the organization that's responsible for computers, use this day to take inventories.
- Update computer security training manuals. Plan to give mini computer security sessions to staff and other people on this day. Send or hand out the new manual to people who need it.
- Include all issues of privacy, use of social networking sites such as Facebook and Twitter in a workplace context, etc. Be sure to discuss ethics and accountability for workers using external websites and internal chat and wiki facilities.
- For those working from home or who use computers at home, read up on security concerns related to using social networking sites and change your settings to protect yourself.
- Read How to manage Facebook privacy options for more information.
- Know how to spot and avoid falling for online scams such as phishing, hoax emails, pretexting, etc. Teach members of your family, community, and coworkers how to spot these scams too.
- Back up your computer data. For every computer owned, back up the data. If you don't already back-up regularly, make today the day to draw up a plan to remind yourself to make regular back-ups, or use a program that will do this for you automatically.
- Develop a total recovery plan for all computer systems that might need one.
- Consider having several sources of back-up - online, cloud, USB sticks, hard drives, etc.
- Check that trouble logs are in place on each computer and are being used and followed up.
- Think security and safety when you're out and about. Carrying laptops, notebooks, and electronic data gadgets can lead you into trouble if you don't pay adequate attention. Things to do include:
- Never leave a laptop or other electronic gadget in open sight in a car. Always store out of sight, or preferably, take it with you. And lock your car, even if all you're doing is paying for gas.
- Remember to pick up your laptop, USB stick, or other electronic gadget after using it. Leaving it behind on a bar, in a cafe, or at someone else's house allows anyone access to the information on the item.
- Avoid carrying laptops and notebooks openly in places where mugging and pickpocketing is known. While this is mainly of concern when traveling, always keep your wits about you.
- Avoid placing open liquids such as soda or coffee near your computer. Spills can be very costly, not to mention dangerous to your data!
- Wipe clean old computers being donated to charity, schools, or the recycling depot at the tip. You don't want an unscrupulous person resurrecting your personal data.
- Read How to clean your computer to sell for more information.
Friday, April 15, 2011
Write a Letter Japan Ms. Inside. Word and Notepad (Kanji)
First, go to Control Panel and open Regional and Language Options. If for some reason you can not find it, you can run it via Start - Run
Then enter the command intl.cpl. From the window that appears go to the Formats tab (for Windows Vista and 7):
Click Format
Find Japanese (Japan) in the format.
When you see the difference in writing (not affecting the writing on all computers [permanent English]) {only in Notepad and Ms.Word}
Window Region and Language in Windows Vista and 7
After that look at the bottom right tools!
Tools EN will be in the fox by Jp
Well .. after that, click on tools 1x EN (left click) and select Jp | Japanese (Japan)
This image appears:
Jp Tools
Jp Tools, open the Notepad screen or Ms.Word
If you already write the name of * Watashi * I mean
Notepad
When finished, still in the Notepad application! press Alt + ~
Well the writing on the tools will change like this
Changed text
Well ... after that write back Watashi underneath! And the result ..
Make ...
NOTE:
-When writing kanji have also appeared! Check new again under the right tools. Is it brubah?
-For writing Kanji, can not in space 2x or more!
Then enter the command intl.cpl. From the window that appears go to the Formats tab (for Windows Vista and 7):
Click Format
Find Japanese (Japan) in the format.
When you see the difference in writing (not affecting the writing on all computers [permanent English]) {only in Notepad and Ms.Word}
Window Region and Language in Windows Vista and 7
After that look at the bottom right tools!
Tools EN will be in the fox by Jp
Well .. after that, click on tools 1x EN (left click) and select Jp | Japanese (Japan)
This image appears:
Jp Tools
Jp Tools, open the Notepad screen or Ms.Word
If you already write the name of * Watashi * I mean
Notepad
When finished, still in the Notepad application! press Alt + ~
Well the writing on the tools will change like this
Changed text
Well ... after that write back Watashi underneath! And the result ..
Make ...
NOTE:
-When writing kanji have also appeared! Check new again under the right tools. Is it brubah?
-For writing Kanji, can not in space 2x or more!
Thursday, April 7, 2011
How To Make Background Flasdisk
Overview of info for those who do not know .... who want variety its existing desktop look FlashDisk his picture or photo ...!!!
1.Prepare pictures or photos that you want to use into the background, then "rename" a picture or photograph to "cover", for example busby.jpg -> change to -> cover.jpg, ... how would all have tau -> right-click -> rename.
2.Copy code below and paste it in Notepad ..:
[ExtShellFolderViews]
{BE098140-A513-11D0-A3A4-00C04FD706EC} =
{BE098140-A513-11D0-A3A4-00C04FD706EC}
[{BE098140-A513-11D0-A3A4-00C04FD706EC}]
Attributes = 1
IconArea_Image = cover.jpg
IconArea_Text = 0xcc00aa
[. ShellClassInfo]
ConfirmFileOp = 0
3. then Save As .. with the name "desktop.ini" (without the quotes).
4.Copy 2 files before (cover.jpg + desktop.ini) into your FlashDisk.
5.Finish
Note: If the 2 files that you copy and paste it into the page desktop folder or drive in your windows explorer it will create the same effect as in the flash earlier.
may be useful.
1.Prepare pictures or photos that you want to use into the background, then "rename" a picture or photograph to "cover", for example busby.jpg -> change to -> cover.jpg, ... how would all have tau -> right-click -> rename.
2.Copy code below and paste it in Notepad ..:
[ExtShellFolderViews]
{BE098140-A513-11D0-A3A4-00C04FD706EC} =
{BE098140-A513-11D0-A3A4-00C04FD706EC}
[{BE098140-A513-11D0-A3A4-00C04FD706EC}]
Attributes = 1
IconArea_Image = cover.jpg
IconArea_Text = 0xcc00aa
[. ShellClassInfo]
ConfirmFileOp = 0
3. then Save As .. with the name "desktop.ini" (without the quotes).
4.Copy 2 files before (cover.jpg + desktop.ini) into your FlashDisk.
5.Finish
Note: If the 2 files that you copy and paste it into the page desktop folder or drive in your windows explorer it will create the same effect as in the flash earlier.
may be useful.
Subscribe to:
Posts (Atom)