OSX 10.6 - Snow Leopard Review

>> Monday, August 31, 2009

Its now, good time for to share our review product its OSX 10.6 - Snow Leopard. Right off the bat, its fast. Very fast. A clean installation took about 13 minutes from start to finish, which is a world of difference from the hour or so that a clean 10.5 Leopard install takes. Installation of Snow Leopard is dead simple and (according to Apple) up to 45 percent faster than Leopard using a newly designed installer that asks only one question during the process. On our test machine, the process took about an hour, including two automatic restarts.This has been potentially attributed to the significant reduction in the size of core applications (Snow Leopard’s Mail application is under 100mb, whereas 10.5’s was nearly 300mb). Other theories involve a removal of PowerPC support freeing up space and speeding up the install time. Other than the actual time involved, there are very few differences between the 10.5 and 10.6 installation processes in the current build.

New Technologies & Feature
Apple says a few new technologies in Snow Leopard make it worthy of the upgrade alone, with several features that Apple says will boost performance. Because all new Macs come with 64-bit multicore processors, multiple GBs of RAM, and high-powered graphics processing units, all the major applications in Snow Leopard--including the Finder--have been rewritten in 64-bit to take full advantage of the hardware. (The 64-bit technology allows application developers to allocate more memory to complete tasks so that the software runs faster and more smoothly.)
Leopard includes a number of user UI improvements intended to make working with Mac OS X easier and more efficient. Expose, Apple's system for visually finding the window you want on a cluttered desktop, used to be relegated to the Function keys on your keyboard. Snow Leopard now makes Expose accessible from the Dock; just click and hold on a Dock icon to see thumbnails of all the open windows in that application. And include for Safari 4, but it offers a couple of new features when running in Snow Leopard. Safari 4 already includes Top Sites for viewing all your favorite sites as thumbnails for easy access and full history search, which lets you view your history in a Cover Flow-like interface.

You Can Purchase in here

OSX 10.6 - Snow Leopard Review READ MORE, For Complete Article

Something Requirements Public Relations In the Era of Social Media

>> Sunday, August 30, 2009

Public Relations (PR) is a profession that has awakened decades ago. Science homework to the already arranged so good and steady, and taught at various universities, both in the Department of Communication, as well as in special schools to the PR's like the London School of Public Relations. However, studies have established that now must be updated because of the emergence of social media phenomena like Facebook, Twitter, Plurk, and so on.

The Internet makes the work contemporary practitioners of change is remarkable. Public relations today is not only related to expertly influencers, including the media, but also required to articulate directly related to the consumer. And we all know, the character of virtual consumers certainly are not the same as the character of journalists, media or the media industry, or the character of the medium and other influencers.

Consumers who join the social media that do not need a sweet language and style of formal press releases. All they need is a company spokesperson who understands their needs and also respond to their complaints as quickly as possible. Consumers also need a PR practitioner who can interact directly with them and make conversation. Of course, this is not an easy task. Moreover, the practitioner must "talk" as brand personality represents.

Why so? For free consumer shouting on the Internet. Disappointing product or defect was not easily covered by the tactics of traditional PR. We can not just threaten and silence them. Even the attempt to silence will lead to resistance against a more tightly, and even received support from other consumers who feel a similar experience.

Not only consumer behavior change with social media. and also have the potential to make a lot of public relations headache is the medium speed of change in social media. Three years ago Friendster was rampant in Indonesia. But since the year Facebooklah the phenomenon. If the previous Microblogging Plurk dominate in Indonesia, now Twitter's turn to another cherished.

Now, a dizzying PR professionals, consumer behavior in each of these new media were also different, depending on the features of the flagship. What is to be done, practitioners should also be racing against the hardness rate of growth of online media in this media soial.

Not surprisingly it is the job trends for public relations positions, especially in consulting and agency, added the qualifier "familiar with social media and online media".

If you want to keep shining in the world of PR today, I recommend to immediately have the competence in three areas below:

Communication
This ability must, of course. But it should be emphasized that communication competence possessed the ability to open just to make press releases and dealing with the media. Communication here is the ability to write Internet-style, casual language, a revolution written oral communication. A communication capability is not only able to write a good, but able to interact with consumers.

Marketing
The practitioner in the end should also understand the marketing concepts. When the PR should relate directly to the consumer, so the science must be expanded with marketing knowledge. The concept of 4P (if you can actually until 7P) should be further understood, making it easier to communicate with consumers. In the era of social media, what the hell, the line between PR and Marketing roles increasingly blurred.

PR practitioners now must also be able to analyze, where the Internet medium in which they must terjuni. They would not want to learn about trends in consumer behavior Online, and how to approach them.

Technology
PR practitioners must eventually be updated with the latest technology. They must keep abreast of technological developments. If the trend now is Twitter, then they should jump into it let me know how it actually Twitter. What can be done, whatever application is in Twitter that can support their work.

PR practitioners must also learn Facebook. PR should understand what the difference Profile Page, Fans Page, Groups, and Causes on Facebook, including monitoring the very rapid development. Facebook Fans Page for example, continue to experience changes and improvements to bermanaaf brand communications. At the same time, practitioners also need to understand application for Facebook which is growing very fast. By understanding this technology, public relations practitioners are expected to understand the implications of these new applications to companies and brands handled.

The third ability, I believe, must manifest themselves in contemporary public relations practitioner and the future.

Source : Virtual.co.id blog

Something Requirements Public Relations In the Era of Social Media READ MORE, For Complete Article

5 Reasons For People To Learn Computer

Pursue the computer world is exciting. The world was limited to the fingertips. Gap business computers around the world who also has a diversity of color. Young and old until the children were enamored made.

Computer technology wrestle not as complicated as you might imagine, knowing carannya origin. Meyerap pekembangan technology does not require extraordinary IQ level. See it, now many people who suddenly become adept at using the computer.

This is a proof that the application of the computer has a universal language that every sophistication anyone can apply. Problems for ordinary people is the problem of English as its introduction. But those who do not understand the English language was at first a lot of experts in the computer world.

5 reasons why people desperately willing to learn computer:

1. Personal Brand Image. Because you are interested in computer technology and be able to help solve the problems your colleagues work, your name will be easily recognized in a new environment.
2. Self Award. All people need this, one way to get the highest award honorable manner is one of the master computer expertise. Like Blog Fatih Suud which already has several awards and many fans of the articles he wrote.
3. Great Income. For those who have mastered the computer, the standard salary-related professions generally larger computer than other professions. An example is Mr. Nukman with virtual kosultan
4. The Business Opportunity Area. Computers have many branches of expertise and have a very large market opportunity.
5. Multi-function devices. Controlling and have the same computer has several entertainment devices and has a device capable finished office tasks.

5 Reasons For People To Learn Computer READ MORE, For Complete Article

Coolpix S1000pj Camera Integral With Projektor

>> Saturday, August 29, 2009

Ever imagined in your mind, if a projector can be integrated with a camera?. It is possible, because a company Nikon has succeeded in integrating a projector into the camera. Only in one hand, you can enjoy the two functions of the camera. Not only it can use the camera for the photos or record an important moment for you, even you can use a projector to display the results of a photo or video.

Camera Coolpix named S1000pj it, can display 40-inch wide screen with VGA resolution at a maximum distance of 2 meters. With the light level (brightness) 10 lumens. Equipped with a 'remote control' that wireless can be used to operate the projector, and so the shutter release. In addition, this camera is equipped with LCD monitor 2.7-inch wide high resolution of 12.1 megapixels with a 5x optical zoom Nikkor. ISO settings up to 6400 and can take 10 shots every time the shutter is pressed with automatic storage. With the power consumption far more efficient, the batteries on this projector is said to last for one hour to run the slideshow. In addition, various effects can be so nice slideshow of the projectors 'built-in' it.

As quoted from dpreview, Thursday (06/08/2009). Mark Pekelharing, Product Line Manager Nikon Europe Cosumer Products states, "The launch of this unique camera aimed at photo enthusiasts wherever they were. This is the first Nikon camera in the world that can project the image, "he claimed," This product is made so that users can take pictures at the same time presenting their images, with a 'built-in projector is easy. Now sharing photos and video can be done easily and fun. "

Other features found on this camera are as follows:
  • High resolution with anti-reflection coated cover
  • 16 styles in a variety of fast optimal settings for taking pictures
  • D-lighting
  • Zoom Off
  • Automatic Sorting and function of your favorite images
  • 4 movies with sound modes
  • The function of time-zone for penyettingan time in various locations
  • Internal memory reaches 36 MB in memory only support SD / SDHC memory card. Meanwhile, Multi Media Card (MMC) are not compatible with this camera.
  • High speed USB connectivity
Truly an amazing technology. With features such exciting and interactive wrapped into one in a camera in one hand. No harm for you lovers of photos to have this camera. Make your life much more pleasant with a moment immortalized on this camera. And you can make the people in your area come to enjoy.

With funding of U.S. $ 430, you can enjoy all the features found in the Nikon S1000pj Coolpix camera which merged with projector. A price worth with what is given from this Nikon.

Coolpix S1000pj Camera Integral With Projektor READ MORE, For Complete Article

Robots And Culture

Ever watch the movie called I, Robot or a movie that's been a while like Robocop? Of course, this writing is not to promote the film, but rather to see how a country like the United States introduced the robots in the future to the community or its people. Why so, since at least the movies or the media made also reflects the dreams or hopes of a society or people. Because a proverb says, what we do today is our dream yesterday.

In both the film described how the robot becomes the enemy of the people and violate the rule of law written by a robot Isaac Asimov's famous Asimovnya law. Now the behavior of a country that introduced the technology can not be separated from the culture of the country.

The term robot was first introduced by a national Chekoslowakia named Karel Capek (1890-1938) in 1920, comes from the local language robota which means slave or manual labor. That's where the term is used in place of mechanical slaves term used to help humans work. That's why Western countries often view the robot with negative shades of perspective.

Another case in Japan, people have an interest in robots that have the status as an idol star. As the World Expo in 2005 which then Perf. Aichi, pavilion, pavilions that highlight the performance robots that could talk, running, singing, dancing and playing instruments musical instruments, draw interest visitors remarkable even for the visitors must be willing to queue for hours to watch it. The legend, not enough time day or two to get into all pavilionnya.

Also on events the other, people flocked go hand in hand with his family robot exhibitions in various places, asking the experts to get a brief explanation of the robot. And has become a common thing in Japanese society to see parents and their children pose with the robot as a moment of memories.

This all can not be separated from any difference in perspective and how to introduce the robot to the community. Look at the example of the influence cases manga (comic) about a cartoon robots as legendary and best-loved Astro Boy Tetsuwan Atom or-kun (kun calls for children), an animated film depicting a robot form of a boy's age school children who friendly with humans, might be the best example as the cause of different approaches of the robot between Western countries and Japan .. But it's not only that, the cause, because according to their cultural roots, love of Japan to the robot also return to their past in the Edo period (1603-1867). The statement was made by Yoji Umetani, an expert on domestic robots from sakura.

Robots And Culture READ MORE, For Complete Article

Magnet Made From Plastics

Research the use of plastics to replace metal materials become known especially since the discovery of electrically conducting plastic, which then delivers Prof. Shirakawa won the Nobel prize in chemistry in 2000. Another study is the possibility of electrolyte and the plastic becomes a magnet. From England reported the discovery of a plastic magnet, as reported by New Scientist magazine.

British scientists have developed the first plastic magnet at £ äunia. Breakthrough will greatly benefit in arithmetic and medicine.

In the past, the magnet is always made of metal material. Then in 2001, a team of chemical scientists United States (U.S.) from the University of Nebraska-Lincoln (UNL) shows the possibility to make plastic magnets.

However, plastic magnets they make, and plastic magnets made after other still has many weaknesses. The magnet is only working at a very low temperature, so not suitable for everyday products.

Latest plastic magnet developed by the University of Durham (UD) using organic materials is elektroaktif first magnet working at room temperature.

As early tests, scientists used to take pieces of iron placed on the laboratory bench.

The magnet is a polymer-a-molecule circuits made using two components, called Pani and TCNQ, and have the materials mengadung unusual electricity.

Typically, the magnetic properties of electrons generated by the parallel spin. In plastic materials, which is almost the same effect obtained by align-patikel deliberately pertikel electrified called free radicals.

At first, these plastic materials showed only few signs of a magnet.

After three months of failure, the researchers had to give up, until they decided to test the final polymer sample.

They feel surprised to find these plastics have developed into a magnet, as reported in New Scientist magazine.

Although the magnetic effects produced weaker when compared with the magnetic material made of metal, but the researchers feel confident if the plastic material can be developed into a magnet.

"The reaction of polymer has not reached 100% and the magnetic force vary depending on the materials used. As we increase the efficiency, the total strength would be increased ", said Naveed Zaidi, chairman of the research team.

Plastic magnet is a material commonly used to cover computer hardware, and can be used to increase disk storage capacity.

Magnet Made From Plastics READ MORE, For Complete Article

Blackberry Connection Speed Test

>> Thursday, August 27, 2009

Are You want to know speed connectivity upload and download speed 3G or GPRS on your Blackberry? PC users may reply easy to find websites that provide Speedtest services, but for mobile phone users, especially blackberries may be somewhat difficult.
Here we have tips Create BlackBerry users please try Speedtest from Xtreme Labs to find out how fast the connection BIS BlackBerry Internet Service?

In comparison the American average speed reached 167.53 uploading Kbits / s and average speed downloads 841.4 Kbits / s, so you can compare the speed of your living area connection with the American connection speed.

Please try the service from Xtreme Labs Speedtest by downloading the application HERE via your BlackBerry browser.

Blackberry Connection Speed Test READ MORE, For Complete Article

Create Email With Variations Domain

>> Wednesday, August 26, 2009

Bored with the usual email domain only (yourname@gmail.com, yourname@yahoo.com)? average yes we have berdomain email from Google, yahoo, or msn. But for anyone who wants a little different from the others, I have a pretty good info for you.

You make your email yourname@europe.com. without you bought the domain? hmm .. Unfortunately not and I can email it for free. Not just one domain only, as will make your email would be presented at 250 different domains and interesting. There you can freely choose the best email names you like. Even if you are a programmer or a consultant will be more attractive and look professional if you have an email names are like yourname@consultant.com yourname@programmer.net or not? Curious to try it too? you can visit the website here.

Actually the web is the same function as yahoo mail or gmail, but that sets it apart is the selection of domain names that we can use. The following list of domain names provided by mail.com:

General
mail.com
usa.com
email.com
consultant.com
consultant.com
popstar.com
mail.org
europe.com
myself.com
post.com
cheerful.com
usa.com
earthling.net

Jobs
accountant.com
adexec.com
allergist.com
alumnidirector.com
archaeologist.com
bartender.net
brew-master.com
chef.net
chemist.com
clerk.com
columnist.com
consultant.com
contractor.net
counsellor.com
count.com
deliveryman.com
diplomats.com
doctor.com
dr.com
engineer.com
execs.com
financier.com
fireman.net
footballer.com
gardener.com
geologist.com
graphic-designer.com
hairdresser.net
instructor.net
insurer.com
journalist.com
lawyer.com
legislator.com
lobbyist.com
mad.scientist.com
minister.com
monarchy.com
optician.com
orthodontist.net
pediatrician.com
photographer.net
physicist.net
politician.com
popstar.com
presidency.com
programmer.net
publicist.com
radiologist.net
realtyagent.com
registerednurses.com
repairman.com
representative.com
rescueteam.com
salesperson.net
scientist.com
secretary.net
socialworker.net
sociologist.com
songwriter.net
teachers.org
teacher.com
technologist.com
therapist.net
tvstar.com
umpire.com
worker.com
Hobbies
artlover.com
bikerider.com
birdlover.com
catlover.com
collector.org
comic.com
cutey.com
disciples.com
doglover.com
elvisfan.com
fan.com
fan.net
gardener.com
hockeymail.com
madonnafan.com
musician.org
petlover.com
reggaefan.com
rocketship.com
rockfan.com
thegame.com

Countries
africamail.com
americamail.com
arcticmail.com
asia.com
asia-mail.com
australiamail.com
brazilmail.com
chinamail.com
dutchmail.com
europe.com
europemail.com
germanymail.com
indiamail.com
irelandmail.com
israelmail.com
italymail.com
japan.com
koreamail.com
mexicomail.com
pacific-ocean.com
pacificwest.com
polandmail.com
russiamail.com
safrica.com
samerica.com
scotlandmail.com
singapore.com
spainmail.com
swedenmail.com
swissmail.com
usa.com
Cities/States
alabama.usa.com
alaska.usa.com
arizona.usa.com
arkansas.usa.com
berlin.com
california.usa.com
colorado.usa.com
connecticut.usa.com
dallasmail.com
delaware.usa.com
delhimail.com
dublin.com
florida.usa.com
georgia.usa.com
hawaii.usa.com
idaho.usa.com
illinois.usa.com
indiana.usa.com
iowa.usa.com
kansas.usa.com
kentucky.usa.com
london.com
louisiana.usa.com
madrid.com
maine.usa.com
maryland.usa.com
massachusetts.usa.com
michigan.usa.com
minnesota.usa.com
mississippi.usa.com
missouri.usa.com
montana.usa.com
moscowmail.com
munich.com
nebraska.usa.com
nevada.usa.com
newhampshire.usa.com
newjersey.usa.com
newmexico.usa.com
newyork.usa.com
northcarolina.usa.com
northdakota.usa.com
nycmail.com ohio.usa.com
oklahoma.usa.com
oregon.usa.com
paris.com
pennsylvania.usa.com
rhodeisland.usa.com
rome.com
sanfranmail.com
singapore.com
southcarolina.usa.com
southdakota.usa.com
tennessee.usa.com
texas.usa.com
tokyo.com
torontomail.com
utah.usa.com
vermont.usa.com
virginia.usa.com
washington.usa.com
westvirginia.usa.com
wisconsin.usa.com
wyoming.usa.com

Fun/Miscellaneous
2die4.com
activist.com
alumni.com
amorous.com
been-there.com
bigger.com
caress.com
cheerful.com
cliffhanger.com
comic.com
comfortable.com
count.com
couple.com
cyberdude.com
cybergal.com
cyber-wizard.com
dbzmail.com
disciples.com
disposable.com
doramail.com
doubt.com
earthling.net
fastermail.com
feelings.com
graduate.org
hackermail.com
hilarious.com
homosexual.net
hot-shot.com
hour.com
howling.com
humanoid.net
iname.com
indiya.com
innocent.com
inorbit.com
instruction.com
kittymail.com
keromail.com
linuxmail.org
loveable.com
mailpuppy.com
mcdull.net
mcmug.org
mindless.com
mobsters.com
monarchy.com
nastything.com
nightly.com
nonpartisan.com
null.net
outgun.com
playful.com
poetic.com
reborn.com
reincarnate.com
revenue.com
rocketship.com
royal.net
sailormoon.com
saintly.com
seductive.com
sister.com
sizzling.com
skim.com
snakebite.com
soon
.com
surgical.net
techie.com
tempting.com
toke.com
toothfairy.com
tvstar.com
uymail.com
wallet.com
webname.com
weirdness.com
who.net
whoever.com
winning.com
witty.com
writeme.com
yours.com

Religion/Philosophy
angelic.com
atheist.com
minister.com
muslim.com
oath.com
orthodox.com
priest.com
protestant.com
reborn.com
religious.com
saintly.com

Asian Pop stars
aaronkwok.net
andylau.net
athenachu.net
hk.popstarmail.org
hsuchi.net
kellychen.com
leehom.net
leonlai.net
louiskoo.com
nicholastse.net
nicolastse.com
sammimail.com
vivianhsu.net
wongfaye.com
zhaowei.net

Create Email With Variations Domain READ MORE, For Complete Article

The Most Dangerous Celebrity In Cyberspace?

>> Tuesday, August 25, 2009

Who is the most dangerous celebrity in cyberspace? According to Internet security company McAfee, hollywood actress Jessica Biel is the name of the riskiest celebrity in internet searches this year, displacing the position of Brad Pitt.

For 3 consecutive years, has surveyed MacAfee popular celebrities are most dangerous internet users. Earlier in the year 200Rata Penuh8, Brad Pitt sitting on one position. Meanwhile, in the year 2007, Paris Hilton won the title.

Biel is known as the most dangerous celebrity in the realm of cyberspace because of the fans who wish to find something about themselves, 20 percent of exposed risk online threats like spyware, adware, spam, phishing or virus.

"The cyber criminals take advantage of celebrity names to lure surfers seeking the latest news, screensavers, ringtones and sites that offer free downloads, but in fact full of malicious programs," the statement reported by Reuters that McAfee.

Being runner-up position in the list of McAfee's latest is a top singer Beyonce Knowles Jennifer Aniston followed in third place. Beautiful star Megan Fox and Angelina Jolie also entered the top 10 positions.

The Hollywood starlet was also a lot through the list like Miley Cyrus, Ahsley Tisdale and Twiligth movie star, Robert Pattinson and Kristen Stewart. While president of the United States, Barack Obama 'only' to position 34.

Source : Detikinet in indonesian language

The Most Dangerous Celebrity In Cyberspace? READ MORE, For Complete Article

Twitter Playing Into The Trend In Toilet

Microblogging Twitter account has now become a way of life. In the bathroom too, many people are still updating twitternya.

A study conducted in England. As quoted from the Telegraph, Monday (24/8/2009) the researchers wanted to know what makes a home for long in the toilet. A total of 2,000 people became an object of research.

More than 34 percent admitted to text when urinating. As many as 33 percent even talk on the phone. Browsing the Internet becomes the choice of activity 7 percent of respondents.

Unlike last year, now there is a new activity undertaken, ie 'play-twit' aka twitter posts. Although elected by the new 1 percent of the respondents, but is expected, this figure will continue to rise.

Dr Simon Gabe one of the researchers went on to explain that for too long in the toilet was not good for health. too long in the toilet can make a person infected with diseases such as diarrhea and dysentery.

Beware! Do not get because played-twit, you instead get a variety of diseases.

Source : Detikinet

Twitter Playing Into The Trend In Toilet READ MORE, For Complete Article

The Secret Behind CD's

>> Monday, August 24, 2009

CD media is no longer curiosities. Many people who often played with pieces of CDs for various purposes. There is a photograph in the studio and the results stored on the CD image, there are songs that make the album and the results stored on the CD, there is also a film and the results are also stored on CDs.

CD-ROM An acronym for Compact Disc - Read Only Memory. CD-ROM disc is silver. Manufacturing process is by putting a layer of plastic that has been illuminated by a laser beam. The laser beam will form a pit (hole) micro-sized, very small. The holes will form a line of code in the form of data content. Once a hole is created, it can not be closed again. Then the plastic layer will be covered again by the liquid plastic that is useful as a protector and reflectors. All that the process is carried out gradually in a printing machine. Tools CD-ROM mold looks like a cookie cutter and making analogies are also very similar. More details download here with indonesian language.

Source : http://ilmukomputer.org

The Secret Behind CD's READ MORE, For Complete Article

Marvel Hero On PSP Go

If Apple with the iPhone and iPod Touch it will allow users to experience a lot of entertainment, Sony also will treat service users with the tools of his PSP Go which allows users to access hundreds of comics like Marvel.

Services that will be released in December later called The Digital Reader. As the name implies, the service will serve as tools e-book reader.

Sony has established cooperation with ngetop publisher Marvel. With this partnership, Go PSP users are welcome to download the comics Marvel output, directly to the PSP Go her. So they will be able to read the comic pages per page, or zoom in-frame per frame.

Quoted from the Telegraph, Sunday (23/8/2009), a number of titles have been waiting to read the gamers. Call it Spider-Man, X-men, Fantastic Four, Star Trek, Iron Man, etc..

PSP Go, the plan will be marketed from October 1 in the UK later with 150 pound sterling price. This console has a more slender body and lighter than 'kakak' her, PSP console is now in circulation.

Marvel Hero On PSP Go READ MORE, For Complete Article

Best Antivirus Real Free

Antivirus is free to search many people, especially those who are avoiding a sweeping examination or pirated software. The bill offers antivirus protection and a more comprehensive customer care. This is a list of antivirus and update his address. Update as necessary each day pop-virus new virus.

Best Antivirus Free
This free antivirus list sorted by popularity on Softpedia.

1. Avira AntiVir PersonalEdition Classic
Avira anti-virus software offers a complete and free. This software also includes protection against viruses, trojans, backdoor programs, worms, and others.
Download Avira AntiVir PersonalEdition Classic
Update Virus Definition latest Avira AntiVir PersonalEdition Classic
2. AVG Free Edition
The AVG Equipped with resident shield, email scanner, anti virus / trojan. Not heavy on the computer running.
Download AVG Free Edition
Update Virus Definition latest AVG

3. PCclear Antispyware with Free Antivirus
PCclear antispyware is Free Antivirus with equipped free anti-spyware, active registry protection & X, and sweeping history.
Download PCclear Antispyware with Free Antivirus
PCClear Site

4. Avast Home Edition
Avast Home Edition offers anti-virus, worm, trojan, boot-time scanner, a screen saver feature antivirus scaner make this work as a screen saver.
Download Avast Home Edition
Update Virus Definition latest Avast Home Edition

5. Gucup Antivirus (GAV)
Gucup antivirus capable men-virus and malware scan. Can detect the virus in a ZIP or rar file. created by AtmaJaya University of Yogyakarta Indonesia.
Download Gucup Antivirus
Gucup Antivirus Website

6. BitDefender Free Edition
BitDefender antivirus is also a free anti-spyware offering updates every hour.
Download BitDefender Free Edition
Update Virus Definition latest Bit Defender

7. RemoveIT Pro
RemoveIT Pro is a free anti-virus also detect and remove Spyware, Malware, Worm, Trojan and Adware.
Download RemoveIT Pro
Website RemoveIT Pro

8. Comodo AntiVirus
Comodo AntiVirus offers complete antivirus protection tehadap anti spyware, trojans, and other malware. Plus email scanning feature and worm blocker.

Tips :
  • Always update the antivirus program (virus definition and engine) in order to avoid new viruses. If possible updates every week or at least every month.
  • Do not install more than one antivirus in a system, because it will slow down the system.
  • Many viruses that icon just like ordinary files (eg like Microsoft Word or JPG), when the file is a virus and have the extension EXE (executable). To avoid this, open Windows Explorer, Tools -> Folder Options -> View. Check the option Show Hidden Files and folders, uncheck the option Hide Extensions for Known Files Type, uncheck the option Hide Protected Operating System Files.
  • Be careful opening EXE or COM files from the Internet or another computer. Always scan files received from outside the computer, let alone downloaded from the Internet.
  • List of top ranked anti-virus on the number of downloads on Softpedia. The most common antivirus download is a popular antivirus and believed many people (plus a good advertising). The above list is not sorted by performance.

Best Antivirus Real Free READ MORE, For Complete Article

Download YM Version 9 Complete

Yahoo Messenger is a chat program that is very popular, and I also use almost every day in order not to lose communication with my friends. Yesterday, when I logged on to Yahoo Messenger version 8, there is a message that appears before I upgrade I become a version of YM 9.
I suggested to go download the installer http://messenger.yahoo.com Yahoo Messsenger version 9. The file small, only 427kb, but when installed, failed more or not be finished. So what solution? Installer Yahoo Messenger http://messenger.yahoo.com obtained from a small installer is run when the installer will download a complete file.
Then why do not we download the complete installer file now? There can download a complete installer file here (version 9.00.2034, size 14.5 MB):



download Yahoo Messenger full version Via Yahoo Server (OR)
download Yahoo Messenger full version Via Softpedia Server

By using the installer file is complete before, guaranteed installation process will run smoothly without the connection dropping out of fear, because the way the installation will continue despite an internet connection to drop out. Yahoo Messenger 9 is already a final version (not beta) and free.


Download YM Version 9 Complete READ MORE, For Complete Article

Download Canon imageCLASS D340

>> Sunday, August 23, 2009

Software/Application/PC Requirements : Windows XP, Windows XP, Windows 2000, Windows 98, Windows ME.

Setup Sheet

  • Setting up the machine
  • Installing CARPS Software

Basic Guide
  • Document and paper handling
  • Making copies
  • Printing with CARPS Software
  • Maintenance
  • Troubleshooting feed and copy issues

Printer Guide
  • Installing CARPS software
  • Printer Properties
  • Troubleshooting Printer Driver issues

Download Canon imageCLASS D340 Manuals here

Download Canon imageCLASS D340 READ MORE, For Complete Article

Download Dell Laser MFP 1815dn Driver for Vista

Software/Application/PC Requirements : Windows XP, Windows Vista 32bit and 64bit

Dell Laser MFP 1815dn Windows Vista Driver Installation

  • Download the driver file to your harddisk, e.g. c:/
  • Double-click the downloaded driver file to run it.
  • The Self-Extracting window appears and prompts you to extract or unzip to C:/DELL/DRIVERS/RXXXXXX (XXXXXX being the filename of the Dell driver).

Write down this path so the executable (I.e. Setup.exe) file can be found later.
  • The Self-Extractor window appears.
  • Click OK.
  • After completing the file extraction, if the Self-Extractor window is still open, close it.
  • Browse to the directory where you have extracted the driver files. Run SETUP.EXE
  • Follow the on-screen installation instructions.
  • You will be able to install use the scan and print(PCL, PS and SPL) drivers after this.

Applications Available in the Setup
  1. You can find all the installers for the following applications under /app/ folder, after you have extracted the driver file. Fax: Dell PC Fax application
  2. NetScan: Network Scan application
  3. PSU: Dell Printer Setting Utilities
  4. SetIP: Dell SET IP Version 2.04EN Application
  5. SM: Dell Printer Status Monitor Utility.
Download Dell Laser MFP 1815dn Driver for Vista : here

Download Dell Laser MFP 1815dn Driver for Vista READ MORE, For Complete Article

Download Canon i560 Printer Driver

Software/Application/PC Requirements : Windows XP, Windows Vista, Windows XP, Windows 2000, Windows 98, Windows ME.

Chapters in Canon i560 printer manual:

  1. Printer Parts and Their Function
  2. Useful Printing Techniques
  3. Printing Media
  4. Checking the Status of the Printer
  5. Troubleshooting
  6. Appendi
You can download canon i560 printer driver manual : Here

Download Canon i560 Printer Driver READ MORE, For Complete Article

Download Canon MultiPASS Mp730 Driver

Software/Application/PC Requirements: Windows XP, Windows Vista, Windows XP, Windows 2000, Windows ME, Windows 98.

Notes for Canon MultiPASS Mp730 Driver Installation

  1. Some USB hubs may experience problems with MP Drivers. If this happens, connect the device directly to the USB port on the PC or change the USB port that the device is connected to.
  2. When you connect the device to your PC, the drive that relates to the Card Reader may not appear in Windows Explorer.
  3. This behavior can occur if you map a network drive to the next available drive letter after the local volumes and CD-ROM drives have been assigned drive letters. If you experience this problem, you should assign the network drive to any other drive letters and reboot your PC.
  4. When working with very large files, Windows may run low on virtual memory and not function properly. In this case, please refer to your Windows documentation on how to increase your virtual memory setting.
You Can Download : Here

Download Canon MultiPASS Mp730 Driver READ MORE, For Complete Article

Driver HP Laserjet 4000

Software/Application/PC Requirements : Windows XP, Windows Vista, Windows XP, Windows 2000, Windows 98, Windows ME, MacOS.

The newer version of the service manual for HP Laserjet 4000 (4000/4000T/4000N/40000TN) and 4050 models, can find these 8 chapters:
  1. Chapter 1: Printer Description
  2. Chapter 2: Service Approach
  3. Chapter 3: Printer Operation
  4. Chapter 4: Printer Maintenance
  5. Chapter 5: Function Information
  6. Chapter 6: Removing and Replacing Parts
  7. Chapter 7: Trouble Shooting
  8. Chapter 8: Parts and Diagram.
Download HP Laserjet 4000 Service Manuals Here

Driver HP Laserjet 4000 READ MORE, For Complete Article

Download Driver Canon ip1000

All drivers are FREE to download.
Canon PIXMA iP1000 Printer

Applies to:
Canon PIXMA iP1000 Printer
Software/Application/PC Requirements:
Windows XP, Windows XP, 2000
Author:
Canon
File Name:
ip1000xp180en.exe
File Size:
6.39MB
Driver Date:
March 2006
Driver Version:
Ver1.80

Download Canon iP1000 Printer Driver : here

Download Driver Canon ip1000 READ MORE, For Complete Article

Yahoo Messenger Latest, Release

Want to try the latest version of Yahoo Messenger? Version of Yahoo Messenger 10 Pre-Alpha Version (Version 10.0.0.331)? Not much I can say about this pre alpha version of this, apart from the view point of a slightly different and feature Y! Updates and also a choice of languages that can be selected directly from Yahoo Messenger windows without our must download separately.

Not many new features can be found in this Pre-alpha version of Yahoo Messenger 10 but there are few major changes which you can easily spot after installing, check out below tentative list.

Features on Yahoo Messenger 10 Pre Alpha:
Multi Language Supported (No need to download and Install Yahoo messenger other language separately, Language Chooser available inside in), Y!updates (Update Friends Status), New Appearance, Pingbox, Emoticons, and many more (just commonly had in other version of ym).

For more details, please visit the Yahoo Messenger 10 Pre-Alpha Version Download via rapid
via 4Shared : Download

Yahoo Messenger Latest, Release READ MORE, For Complete Article

PS3 Slim, Release

>> Saturday, August 22, 2009

PS3 Slim has a sexy body size 33 percent smaller, 36 percent lighter and has 120 gb hard disk.

Playstation 3 will be released on 1 September and the PS3 price is 299 USD in the United States (3 million)
The ability, variants PS3 is the same, but using the 45nm Cell processor which is smaller and more energy efficient in the PS3 version was 60nm. New Slim PS3 this will be installed with Firmware version 3.0. PS3 still sold in the original version 2 and 160 Gb 80 Gb with price $ 299 and $ 399.
So if you like the PS3 will choose tipis2 Slim and the body more like a solid and sturdy PS3 can still choose the old version.

PS3 Slim, Release READ MORE, For Complete Article

Computer Latest Asus

Asus is preparing new products all-in-one desktop PC which is a desktop computer with monitor, CPU and multimedia facilities integrated into the device so that a concise and beautifully displayed in the table for.

This product will be strengthened by Ion NVIDIA graphics processors and Intel Atom 330 processor, 2GB memory and 250 gb hard drive and do not forget the DVD writer.

Monitornya sized 20 inch LCD with a maximum resolution of 1600 × 900 with a HDMI port. Note that while the price is 598 Euro, or approximately 8.5 million and will be launched in Europe first.

Computer Latest Asus READ MORE, For Complete Article

Nexian G900 Review

Design
Glance, especially when given a bag cover, similar to G900 BlackBerry Javelin. It is not surprising there are some people who gave the name NexBerry, or Nexian style BlackBerry.
G900 use Qwerty keyboard as input. For those who have large fingers may be a bit troublesome because of pressing the button feels a bit small. To lock the keyboard, just click a button, and click the button *. How to open the same.
Signal is only found 2 in the special button in the button, the home button (image house) and the Messages button (illustrated envelope). Messages that referred to here is a Text message, MMS and Chat. Home button also functions as the left menu. But to go to the main menu, we usually have to click the navigation. 4-way navigation so shortcuts to applications, this can be set back from the Settings> Phone setup> Dedicated key.

Doubles as a GSM mobile phone, 2 button Nexian up call. Easily recognized because there is a number 1 and 2 on the call button. How bertelepon turns ordinary course: simply click the number keys on the keyboard, then click the button the desired call. An important note from the phone function is probably the Black list which can block up to 5 numbers and Background sound that can be a background sound while bertelepon. Use the key to a number slightly different when pengetikan SMS. We have to use alt key first to display the numbers.

Capacity and connectivity
MicroSD slot is hidden behind the Battery, at the bottom left. In the package given the Vision-On MicroSD 1GB.
Mini USB port is located under the body. This duty, 3-in-1 between the rechargeable Battery, headset and data transfer. When connect to PC via data cable, USB config options give Mass storage, Webcam and COM port. For storage, G900 read as 2 drives, one from the internal memory and one from the MicroSD.

Cameras
Behind the body, the camera will find us in the top right. No lights, no mirror. Also not seen the camera key, so we have to go to the main menu first. Left-right navigation is used to set the EV, top-down to zoom, and center for the snap. This is true for the Camera and Video recorder. Camera settings to be calculated fully. Images can dijepret the maximum Image size 640x480. While the video resolution is not given the option. Settings on the Video recorder are standard.
All other settings can be quickly use keypad. Just a small note, in the Camera, the 0 key can be used to snap photos. But in the Video recorder, the 0 key does not have similar functions. Interestingly, Image Viewer can make a slide show from the collection of images. Can even set the Type of play (Auto (Once), Auto (Repeat), Manual), Speed (Medium, Fast, Slow), Effect (No effect, Fade in, Split, Random), BGM (Off, Select from the files ), Horizontal view and Sound (Off, Music 1-3). Video on the player, either the top-down navigation is not enabled. Left-right navigation is used to fast forward and backward, while the middle to Play / Pause.

Radio and Other Entertainment
Speaker is in the back of the body, in the top left. Because there is no volume button, the button dipakailah another adjustment to the sound of the keys - and +. This is used in the Video player, Audio player, and FM radio. G900 is a radio, a new active as usual when the headset is connected. We can record radio broadcasts with just the squeeze navigation. But when the fear behind, just set the recording automatically with Schedule FM record. There are 4 schedule that we can prepare. Java support also allows us to install various other Java-based applications, including games. This sizeable increase the time to spare.

Nexian G900 Review READ MORE, For Complete Article

Tips Expand Online Network

According to comScore's latest data (the device industry to measure the online users) more than 600 million people become active users of social networks, blogs and photo sites.

Meanwhile, research conducted by Synovate for Microsoft with the subject of the age of 15-24 years in Asia, shows that Asian young people to spend time on average almost 5 hours (4.8 hours) per day for online only.

However, if you have not yet joined this trend, ie, entry into social networks, following a few tips that can help to 'social butterfly' (like the jump between the social network) or a 'star' in online social association.

Selective
There are many social network and you may not all be involved, such as Facebook, Ning, LinkedIn, Twitter, De.li.cious, Flickr, and Picasa Web. Ask yourself: What I want from this event? Do I want to add a friend? Do I want to promote the works of creation or music? Do I just want to have a medium to share ideas? If you want to achieve all the goals above, you may need to consider the big social networks such as Windows Live home page, Facebook, MySpace or Friendster.

Focus
If you should decide to participate in more than one social network, will rush to check the one at the latest every day and definitely exhausting. Therefore, focus on one.

Who are you?
Is happy to install profiles' face 'in the name. Can install a self-image and self-written profile in detail. However, if the identity grossly excessive, this will attract the cyber-stalkers. Smart set and maintain information about who you want to show. Create privacy settings are good.

Stay On
Make sure that you deal with friends regularly, for example, took part in the discussion online, or you update the status also participated in giving opinions from time to time. You certainly do not want to lag in the association world online. One thing that is important, never meet your friends with links, messages, comments and content - because you will be labeled as' spammers'.

Have Fun!
Related in the social network online is fun. So, make everything into a simple! Combining social network is a very good beginning. However, in the end is a matter of adding friends, socialize and share the same interests.

Source : Kompas.com

Tips Expand Online Network READ MORE, For Complete Article

Speed Up, Performance Of Windows

In this technique, we will make efforts to improve the performance windowsdengan speed StarUp windows, and can also improve the performance of the windows that we use. how are entered into the control panel, choose the system icon. after the dialog box appears click the performance tab. and in the press section performance file system. there we do some of the options that can be especial diotak here kitai akan discuss some ways saja.yang first select the hard disk.
we should do here is to slide read_head full optimization. but we often do a lot of multitasking. should be turned off only. because the computers that we use.

Then we select the tab CD-rom, we should do here is: move suplemental cache sizemenjadi large.dengan dilakaukan this way, can save more time diperluklan CD. we can also set the Optimize Access pattern for choosing the Quad-speed hiogher.

and the last is through the removable disk tab, give the check to enable write behind caching on all removable drives.

Speed Up, Performance Of Windows READ MORE, For Complete Article

Left Click On Mouse, Problem

Here is how we can change the function from the key that we use. as the default is usually the computer using the left mouse button. but when a frequently used because the key often maset or damaged, although the mouse does not cost too much, it's good we use what is the function key with the left button becomes the right side, as well as vice versa. although the key right we also need to use the menu command, but not as often as the left button. how to change are:
open the control pane, click mause, after the mouse poperties contact dialog appears, select the tab buttons, and the mark on the Apply or ok. since then press Apply or Ok button mause means we are now is the right.

Left Click On Mouse, Problem READ MORE, For Complete Article

Clean Virus DEADLOCK, manually

>> Thursday, August 20, 2009

Be a positive message with the words that inspire patriotism. But, be happy, sweet words that brought a new local computer virus called Deadlock. See the message below.

Free our country from Terrorism Indonesia, anarchist, and KKN (collusion, corruption & nepotism) in the Kubu Government of the Republic of Indonesia (Civil, military & police) and the catch, and fight Penjarakan? Without exception. Clean us from Portitusi Affairs, Social Gambling and Crime. Merdekakan ourselves from poverty, misery and injustice! Democratic Party together? SBY & Boediono, Indonesia Joint Building Fair, & Makmur Sejahtera

Atas Nama Bangsa Indonesia (Top Names of Indonesia)
Pangerant Deadlock (Prince DEADLOCK)

I'm Everyone, No one but
I'm Everything, but nothing
I'm Everywhere, but nowhere

If your computer suddenly displays an image by displaying the message (see image 1), you are advised to immediately take action. The computer you already attacked the virus is active and off.

The virus will display the message in the desktop has been taken over. Usually this message appears only in the time specified. Along with the emergence of this message and all files on all drives will be deleted, including the program and the Windows file system.

For clean virus deadlock from your computer with manual. so follow intruction below :

1. Disable [System Restore] during the cleaning process. Enter the menu Start>> Control Panel>> System>> System Restore>> Select turn off
2. Turn off the virus active in memory, use Task Manager replacement tools, such as Process Explorer, and then turn off the process that has the name mysql.exe and apache.exe

Please download these tools on the following url: here

3. So that this virus can not be active again should block the file before the execution can not be registered with the Software Restriction Policies. This feature only exists on the computer with the operating system Windows XP Professional / Windows Server 2003/Windows Vista and Windows Server 2008, the following manner:

- Click the [Start]
- Click the [Run]
- In the RUN dialog box, type the command SECPOL.MSC and click the [OK] button
- After the screen appears the Local Security Settings, right-click on Software Restriction Policies menu and click Create New Policies
- At the Software Restriction Policies menu, click Additional Rules
- Right-click on Additional Rules and select New Hash Rule ..., then the display appears akan New Hash Rule
- In the column hash files click the Browse button and navigate to the directory [C:-Windows-system32-apache.exe]
- Then click the button [Open]
- In the column-level select Security [Disallowed]
- In the description column should be filled or emptied only
- Click [Apply]
- Click [Ok]

Note:
If your computer is not installed Windows XP Professional/2003 Server/Vista/2008 skip this step.

4. Delete the registry string is modified by the virus. To speed up the process of repairing copy the script below on the notepad program and save it with the name repair.inf then run the file with the
- Right-click the file repair.inf
- Click [Install]

[Version]
Signature="$Chicago$"
Provider=Vaksincom

[DefaultInstall]
AddReg=UnhookRegKey
DelReg=del

[UnhookRegKey]
HKLM, Software-CLASSES-batfile-shell-open-command,,,"""%1"" %*"
HKLM, Software-CLASSES-comfile-shell-open-command,,,"""%1"" %*"
HKLM, Software-CLASSES-exefile-shell-open-command,,,"""%1"" %*"
HKLM, Software-CLASSES-piffile-shell-open-command,,,"""%1"" %*"
HKLM, Software-CLASSES-regfile-shell-open-command,,,"regedit.exe "%1""
HKLM, Software-CLASSES-scrfile-shell-open-command,,,"""%1"" %*"
HKLM, SOFTWARE-Microsoft-Windows NT-CurrentVersion-Winlogon, Shell,0, "Explorer.exe"
HKLM, SYSTEM-ControlSet001-Control-SafeBoot, AlternateShell,0, "cmd.exe"
HKLM, SYSTEM-ControlSet002-Control-SafeBoot, AlternateShell,0, "cmd.exe"
HKLM, SYSTEM-CurrentControlSet-Control-SafeBoot, AlternateShell,0, "cmd.exe"
HKCU, Software-Microsoft-Windows-CurrentVersion-Policies-Explorer, NoDriveTypeAutoRun,0x000000ff,255
HKLM, SOFTWARE-Microsoft-Windows-CurrentVersion-policies-Explorer, NoDriveTypeAutoRun,0x000000ff,255


[del]
HKCU, Software-Microsoft-Windows-CurrentVersion-Run, apache
HKLM, Software-Microsoft-Windows-CurrentVersion-Run, mysql

5. Remove the main virus file in the directory

- C:-Windows-system32-apache.exe
- C:-Windows-system32-mysql.exe

6. For optimal cleaning and prevent re-infection, install and use anti-virus scan with a up-to-date.

You can also use Norman Malware Cleaner, please download the tools at the following address here

Note:
If your computer is infected Deadlock can not do this booting Windows with the error message appears NTLDR Is Missing re-install should do, while for the data that have been removed, please use your recovery with the recovery software as GetData Back / Easy Recovery / Recovery My Files, but this will not guarantee all data will be saved.

Clean Virus DEADLOCK, manually READ MORE, For Complete Article

Donation For This Site

>> Tuesday, August 18, 2009

Best Wishes From Bestechno Admin

Honestly from my heart that this website is not campany's property or foundation's one, because i created this website as my effort to always inform about news of technology to all of you, without deny that i have self-interest to get revenue from bussines online.
The revenue from this bussines would not for my loves and fishes however a certain degree from this revenue is to help a lot of people who are starting their effort because they certainly need enough nominal capital. This is the configuration of my social responsibility to the people around me.
I include banner donation in side post with expectation to make all of the readers know about the purpose of my website, and willing to give contribution to this website. At this time I'm learning english language, later my article would be understood by all of you.
Actually, at this time I'm not able to give salary to official employee to translate my article. And I have plane that I would use that revenue to make a good screen's website, and make a team of news writer in English language.
I Could not give evidence directly, because of the sophistication technology at this time, all of the data could be manipulated in order to be more valid. Therefore in this web I beg of your willingness and believe that this is not deception. At this time, i need your belief, and I will try as useful as possible to run this bussines that appropriate with my goals.
If you are still doubting with my goals you should not give donation to me. Believe that i would try as well as I could to be a responsible person and always consistent.

Express From My Heart :
Start From The Small.
Start From The Self.
Start From This Time.


Thanks For Your Trust
Best Regards
Bestechnoadmin

Donation For This Site READ MORE, For Complete Article

Customize Power Switch Windows7

By default Windows7, showing a Shutdown button on the start menu, this button as the button's Shortcut Shot down if the computer will then click Shut down immediately. Not a few people who want to expand the menu next to it to press this button and the computer immediately shut down. o..oow!
To overcome that we can change the key (shortcut) with the shutdown action, such as the Switch User, Log Off, Lock, Restart, Sleep and Hibernate. Right-click on the Start button - and then Properties.

On the Power button action select the action that will fit in this example I try to select Lock.

Customize Power Switch Windows7 READ MORE, For Complete Article

Crypt Above Marilyn Monroe For Sale

>> Monday, August 17, 2009

Go to the block location of a grave with the price like mad at the auction site eBay. Yes, until the last bid is made about 10 bids and latest price of U.S. $ 700,100.00


Grave that was so expensive because it is very close to the grave is well-Hollywood, Marilyn Monroe. Those who are interested in the rest forever next to Monroe in the pocket can dive-in to mewujudkannya.

Of course, only very rich people who are able to be grave. special grave is located in the Westwood Village Memorial Park in Los Angeles, United States.

"Here is a once in a lifetime opportunity and into Eternity to spend your eternal days directly above Marilyn Monroe. This famous crypt in the Westwood cemetery in West Los Angeles currently occupied above Marilyn Monroe is being vacated so as to make room for a new resident . Spending Eternity next to Marilyn Monroe is too sweet to pass up ", recently quoted by Hugh Heffner, who has reserved his place in Eternity next to her. The lucky bidder will be deeded a piece of real estate that he or she will make their last address. And below you will be Marilyn Monroe. In fact the person occupying the address right now is looking down on her face "the noise in the eBay ad to attract attention. Interested?

with this auction Duration: 10 days, and until I write this Time left: 7 days 23 hours 14 mins

Crypt Above Marilyn Monroe For Sale READ MORE, For Complete Article

BlackBerry Takes High Security

>> Saturday, August 15, 2009

NOT many people are aware, the program has been eye-eye (spyware) that reside on mobile phones. The spy can come in various forms of software or other applications that you did not previously suspected.

One detective was mid-July came to Etisalat customers. Plans in the United Arab Emirates is about the new software that they update. Software that comes Etisalat SMS that says, can make the BlackBerry more optimal performance. SMS is promising upgrade from 2G BlackBerry into 3G.

Since SMS is outstanding, Etisalat get 300 complaints from around 145,000 subscribers. Their rate, not the software that add power connection, but even making power Battery terbuang useless.

Etisalat own berkilah, software and technical errors have only occurred in a small handset. Etisalat also provides instruction guide improvements.

Customer complaints that berbuntut long. Later Research in Motion (Rim), manufacturer of BlackBerry, the software that's not to strengthen Etisalat BlackBerry connect, but spyware! That is one of the suspicious type of application (malware).

This application collects information on the infected user's mobile phone, monitor the user while browsing, monitor important data, and send to the spyware.

Previous users of the PC and the notebook is "familiar" with the spyware. Even though the code and different characteristics, "to play" in the mobile phone spyware is almost the same.

Do not download source

Rim of the results of research, software is made SS8 Networks Inc. based in California. How it works, the detective send all messages to two servers, the BlackBerry and spyware. According to research Hermis PT Consulting, despite already merasuki handset customers servers this detective work failed. Because the failed experiment to allow parent detective happened so many times to make batere weak.

The failure is because Etisalat does not provide the advanced kunjung to spyware. There are four commands that awaited, ie, start, stop, version, and Bckp. If the start command is processed, as many as 145,000 BlackBerry subscribers Etisalat will lose privacy.

Rim is a hurry to make the latest applications for Etisalat users affected by spyware. To other BlackBerry users, so the rim does not hit-download software that are not made or recommended by the rim.

Spyware is different from the virus that menginfeksi handset via e-mail, and file the entry via the Internet or bluetooth. Spyware is embedded in the phone manually. That is, customers who want to enter the software.

Of course, this software does not reveal a palpable himself as a detective. The spy in terbungkus neat games, antivirus, antispyware and even in software. "They usually do not appear when viewed with the commands as they often explore hidden or concealed," said Director of IT Security Consulting Hermis, Sheran Gunasakera.

Spyware can not only detect early name of the software kamuflasenya. "Do not be tempted original message pop up that appears suddenly when you are browsing," Sheran supplement.

Let the fort for the smart sophisticated antispionase

If searching using the search engine on the internet, you will find many products antispy or sequence detector spy. They also average antivirus. But remember, the source of the very few trusted and most non-free applications.

One of the means of detection is Hermis spy Spy Detect made PT Hermis Consulting. Interestingly, this free application. "We want to build awareness or alertness for BlackBerry users in Indonesia," said Executive Director of PT Hermis Consulting Redmer Schukken. Son of a taxi company Bluebird sejatinya this is the information technology consultant.

According Schukken, early detection is useful to make the user feel secure BlackBerry. His eyes if eyes nongol in the mobile phone, they can hijack your money in the bank (m-banking facilities) and various other data theft.

If you want to try, please download the www.hermisconsulting.com. Hermis akan open all the programs supplied preformatted and hidden. "To delete, click delete to stay," said Schukken. To improve the quality of detection, the user must continue to update spy detector.

In addition to artificial Australia, many options antispy applications. Just a F-secure, McAfee VirusScan Mobile, Airscanner Mobile Antivirus.

How to give a tip of telling select detector spy. First, please download the application from the official site only, not from blogs or other sites. Previously, you had to learn the site to ensure the validity of their data.

Second, make sure that the program is quite popular and can be trusted. "Like doctors, anti-spyware should also have a good experience," he said. Third, find the reference from magazines or other reliable source that test Reliability and validity of the program.

Fourth, after the download, legal obligation to update. For, many new bergentayangan spyware. "If there is an expert, the application can be tested in the virtual machine and be impressions, and operating code programs," he said.

Fortunately the service also do not stay silent. Indosat, for example, will be launched according to plan the security system called i-Guard BlackBerrynya for customers, this month Indosat. With i-Guard, Indosat BlackBerry customers will have the ability memback fill-up and return of personal data wirelessly, to track the location of a BlackBerry device. Also fill the back of the personal data remotely in case of loss or theft

BlackBerry Takes High Security READ MORE, For Complete Article

Create Variations Title in WordPress Blog

In the title bar (title bar) browser, the blog title is displayed in front of the title of the article while in the background. We can exchange the position. The goal is what? So that the title of the article appears in the search engines so that people easily find the article.

This trick can only be used by bloggers who have their own web host, not use wordpress.com. The first step, of course, login to your blog. After that, open the file header.php in the template that is used. Search code " < /title> ". Delete the code between <> and < /title >< /title>< !- - title- >. Replace with this code. If you are, save the file header.php.

';
bloginfo ( 'name');
echo '-';
bloginfo ( 'description');
echo '';
)
?>

Create Variations Title in WordPress Blog READ MORE, For Complete Article

Make a Views Interest for Date on WordPress

In an article in the blog, the date is displayed as plain text. If you want you can modify the appearance of an article loaded with charts so that more interesting. Next we will learn how to create a button on a blog for the 3 simple steps.

The first step here. Type in this code in the single.php file. Precisely in the location where you want to display the date.

< div class="post-date" >
< div class="month" >
< div class="day" >
< !-- div-- >

The next step, make the background. You need an image processing program, such as Photoshop. Make a background image design your own.

After that, set the style. This step requires a little knowledge of CSS and depends on individual taste can be due to the background image is different. However, basically you just create a class in the css file with Notepad or other editor you prefer. Here's the code.

. post-date (
float: left;
display: inline;
margin: 0 10px 0 0;
background: url (images / date_button_template.gif) no-repeat;

Part "date_button_template.gif" is the name of the file for your background image. The "images /" is a folder containing the file date_button_template.gif. If you use a picture with the name latar.gif in the folde picture, the code changed so that "image / latar.gif".

Make a Views Interest for Date on WordPress READ MORE, For Complete Article

How To Distinguish A Visitor Comment And Comment The Blog Author

The blog has many visitors, have a lot of the commentator. We sometimes difficult to distinguish where the visitor comments and comments which the author intended the blog to respond to the comments of others.

There are ways to make a comment with a different author comments, that is, give the author's comments highlight the article. Here's how.

1. Change us to add style "authcomment" in the css
Add the following class:
. authcomment (
background-color: # B3FFCC! important;
)
2. Edit comments.php file to add a little code.
Comments.php files usually have a content as following:

  • " id = "comment ...

    Change as follows:
  • echo $ oddcomment;
    ?> "Id =" comment ...

    That's it. Now we will have different colors to make a comment so that we can be with the comments from visitors, although may be using the same username.

    How To Distinguish A Visitor Comment And Comment The Blog Author READ MORE, For Complete Article
  • Create Search Engine in Blogger

    Search Engine on blogger facilitate visitors search for articles in a blog. Perhaps there is some way that I already do so. But this time we make it a little different, with the Flat Button Flat Texbox Style and Style.

    How to make it follow the steps below:
    1. Login to your blogger account. In the Template, select the Page Element> Add a Page Element> HTML / JavaScript

    Type in this code:





    If you are, keep.

    2. The second step, select Edit in the Template HTML.

    Type the code below in the CSS code in the blogger. Precisely the code after the (body, ending with a).

    . buttonreset (
    color: # 333;
    background-color: # f3f3f3;
    border: 1px solid # 999;
    padding: 1px;
    )

    . buttonsubmit (
    color: # 333;
    background-color: # f3f3f3;
    border: 1px solid # 999;
    padding: 1px;
    )

    . textinput (
    color: # 333;
    background-color: # ffffff;
    border: 1px solid # 999;
    padding: 1px;
    )

    If you are, save and see the results.

    Create Search Engine in Blogger READ MORE, For Complete Article

    Set Schedule Published Articles on Blogger

    This information for you all : blogger's mania
    There are interesting features of the Scheduled Posts blogger.com. With the facilities we Scheduled Posts be simple in a posting schedule.

    Whenever we want dipost article, the system will automatically do so. Enggak need begadang. Suppose we want any posts at this time publish in the next week. I only live set posting time.

    How to setting Scheduled Posts:
    1. Log in to http://draft.blogger.com/
    2. Login If not, please log in first.
    3. Post on the page select "Options Posing" or "Post Options" referring to the post date and time that we want.
    4. Please set the date and time when we will be posting.

    When we press the button Publish automatically akan posting our scheduled and will be published according to the time already set. If you want to stop the scheduling save lives just as the draft.

    Set Schedule Published Articles on Blogger READ MORE, For Complete Article

    Mozilla Firefox is Always Update Version Released

    Remarkable process of development on the version of Firefox from day to day. Imagine us without aware, at any time will have the latest version of Firefox. Not only in a matter of annual or even monthly, but this is in the weekly count. It looks really interesting from what has been implemented by the Mozilla version of Firefox so it will appear each time the presence of the latest version of Firefox. And this of course there will be many versions issued for this.

    News that are warm-scrolling on the warm days ago that the emergence of Firefox 3.5.2 is a patch version of the alpha version of Firefox 3.6 is successor recorded for launch in November 2009 to come.
    The Mozilla said that Firefox 3.6 Alpha includes the improvement in speed to the TraceMonkey JavaScript engine, startup speed tweaks and some changes that door. With the code name 'Namoroka, Firefox 3.6 is based on Gecko 1.9.2, the upgrade is still in the development of a Mozilla rendering engine is.

    Firefox director Mike Beltzner says that the Mozilla developers have to choose whether to follow FireFox 3.5 (previous version) will be a release, or upgrade maintenan a massive and comprehensive. And usually a company decision less changes for the time scale of a (short).

    Namoroka become an additional release, that the success of Firefox 3.5. Added that it will improve the performance of startup companies in the browser, open a new tab and load the page in the bookmark. It also will add support for features in the Windows 7 as' Aero Peak 'which allows users to see the desktop behind the windows open.

    Mozilla Firefox is Always Update Version Released READ MORE, For Complete Article

    Over the Quick Windows 7, XP, or Vista Browser For Performance?

    Apple Safari still run faster on Windows XP, when compared with Windows Vista and Windows 7. Opera, relatively quickly using the same operating system is the third.

    Similarly Firefox, Windows XP still held, although strictly be pursued by Windows 7. And when a unique ditest using IE 8 browser performance using the three Windows operating system, is very fast.

    Graphic image below is a test speed of the browser compared to the OS made by Betanews site:

    Over the Quick Windows 7, XP, or Vista Browser For Performance? READ MORE, For Complete Article

    Tips Avoiding 'Stalker' On Social Networking Sites

    Internet, especially social networking sites such as Facebook is to provide a very great impact for human life. But behind it all, with all the ease of ditawarkannya, the virtual world is becoming increasingly vulnerable to the presence of the stalker (penguntit) is increasingly free to move.

    With the site jejeraing social and micro blogging like twitter and plurk, stalker now able to detect the behavior of prospective victims. Of course you have the friend request of those who do not you know? Or perhaps you are after, it appeared that the person is betingkah strange quasi know and like. Therefore, some tips to avoid the threat of self penguntit the obsesif this may be useful.

    Edit Friend List
    With the constant self info displayed on the news feed Twitter and Facebook all the time this is at once to give a sign that stalkers are welcome! All information can be consumed by people not known this from the photo albums, the latest activity, history of education dam working, and others. Although the mean to provide information that is old is able to contact you. However, would that you choose certain people are able to follow the development of aktivitasmu.

    Things that you need to do is do the settings on your Facebook. How, click Facebook.com / privacy to create an exclusive group that has privileges to access the profile, image, and status updates. If MySpsce through, you can create a private profile settings meny under "Account Settings". For users of Twitter, see a box called "Protect My Updates" in halamanmu. With setting such as this, only to be "followers" who can read the activity on the status of your feed.

    Do not become a status-freak
    Many people who always give him the information which was and is doing what. For example "While eating in Ragusa with boyfriend", or "Duh tomorrow to Bali, easy way to do smth pake apa ya?", And others. Things like this clearly shows that you're very excited that mengumbar personal information to people. Stalker is the king! Therefore, begin to limit themselves to not always provide information about yourself gambling. Start bermawas self!

    Googling Each Day
    Make a Google Alert that will help you to signify someone who is penguntit. Log in to your Google.com / alerts and enter your name and phone number. With this feature, Google will provide notifications every time there is someone who is googling your name and phone number. This facility provides information about who is looking for information about yourself.

    Feel Free to Disconnect
    Penah Do not hesitate to break off the internet. With GPS, Google Earth, and wikimap that allows other people to know posisimu, stalker akan pergerakanmu easier to detect. Therefore, do not hold yourself to Always online. Therefore, do not ever hesitate to decide on the Internet network and the BlackBerry mobile phone each time not used.

    Tips Avoiding 'Stalker' On Social Networking Sites READ MORE, For Complete Article

    Be Careful If Receive E-mail Update Browser IE7

    Alert by e-mail titled "Internet Explorer 7" from the claim that Microsoft Featured Offers, a Microsoft service. An e-mail spam infection try a computer with malicious programs.


    E-mail spam is to use the subject "Internet Explorer 7" and the message does not explain anything other than a link titled "Download the latest version!" any posts, and a "mailing about this" referring to the Microsoft service.

    The user to click the download link will be redirected to a fake browser page, which will then download a file 'update.exe' size of 136KB. Executable file is then akan infection victim computer and download the malware.

    Tactics such as the spread of this malicious program also previously been used to trap the user e-mail, ie, the masquerade as a file photo naked Angelina Jolie artists where the file is actually malware.

    Tactics such as that apparently is quite popular to use. Last week, for example, Adobe issued a warning about the existence of the malware that masquerade as the installer plug-in Flash.

    To be safe, warn the user to download an update file browser IE7 from Microsoft site or service through the Windows update

    Be Careful If Receive E-mail Update Browser IE7 READ MORE, For Complete Article

    The Victory Bing Bang Team, Indonesia

    ABOUT INAICTA 2009

    INAICTA 2009 the place of competition and innovation kretivitas copyrighted information technology and telecommunications national third year. Total prize INAICTA for 2009 is Rp 1 billion and represents a winner in the international event.

    Winning is not the last word to the Big Bang. After the Imagine Cup level sweep the world in 2009, they still want to continue to perjuangannya. The desire is terlontar by David Samuel, the Big Bang Indonesia, a new home from Cairo, where the organization Imagine Cup 2009 event.

    "The research we will continue to proceed. Because of our ability is limited, so further research needs to be able to help other problems," said David.

    Works of David and colleagues, Moses (Malaria Endemic Observation and Surveillance System), this is not without obstacles. According to David, the main obstacle in this research is Moses medical problems. They are not with medical backgrounds, many have to ask the doctors and medical experts in the field of endemic disease.

    Moses is indeed impressive. Useful addition to speed handling of the disease malaria in isolated areas, this tool also offers a technology solution. This technology combines hardware and software in one product.

    "We can try to develop this application, because it is not perfect," said David. According to him, he and colleagues still go back to save the dream wave red and white flag in the Imagine Cup next year.

    According to the plan, this annual event will be held in Poland in 2010, with the same theme. David and colleagues will be back fighting at the event.

    At this time, they strive to continue to develop this so that Moses can be integrated with the health agencies. The goal is to help monitor and oversee the development of diseases and dangerous.

    Imagine Cup, according to David, is one of the annual event that opened their eyes. Many problems in the vicinity, which is actually the simple things that can be solved. But sometimes we feel we do not need to complete.

    "Ajang also provide the opportunity for the youth of Indonesia to be able to meet and compete with friends from other countries, thereby providing a very valuable lesson for us," said David.

    "We just hope we can help solve the problem that, with the ability to improvise that we have this. We love Indonesia!," David firmly.

    Source : Detikinet

    The Victory Bing Bang Team, Indonesia READ MORE, For Complete Article

    Kaspersky Lab In The IDC Top 100 Provider Software Package

    >> Thursday, August 13, 2009

    Rank "Worldwide Packaged Software Revenue by Top 100 Vendors" was published by IDC in the "Worldwide Software 2009-2013 Forecast Summary" after learning the software package of income in the year 2008 and the market share of the proportionally. IDC study analyzes the income received from the provider of the software package software sales during the period 2006-2008 and examine how income changed in 2008 compared with year ago.
    Kaspersky Lab successful entry in the IDC Top 100 Provider Software Package in the world. Kaspersky Lab is the only Russian company to enter into the list.

    Kaspersky Lab shows the best annual growth rate of more than 121 percent than the nearest competitor and nearly 47 percent growth 17 times faster than the average of the other.

    According to IDC terminology, the software package is ready to use and available through retail, rental or other services, regardless of physical media, and superior in perinstalled and customized software.

    Kaspersky Lab also successfully entered in the top 50 ranking for the IDC "Worldwide System Infrastructure Software Revenue". Pemeringkatan is made to primary producers, manufacturers of the system infrastructure software according to their income in the year 2008.

    Kaspersky Lab show yearly growth in the second-largest in the list with a growth rate of income, almost 18 times greater than average.
    IDC study analyzing more than 1,000 manufacturers of major global software.

    Kaspersky Lab In The IDC Top 100 Provider Software Package READ MORE, For Complete Article

    Internet Technology On Mobile BMW 7-series

    The long development of the Internet can be applied not only on the mobile phone, but in the near future this allows you to not need a phone that can berinternetan if just to visit favorite websites when you drive a BMW 7-series. The 7-Series is the manufacturer's hot selling car in the UAE. The new model, fifth generation was recently launched and is available across the Middle East. The automotive manufacturer announced yesterday that its models will come pre-installed with internet technology, called BMW-Online.
    From the first type you can enjoy full Internet Access dasboard on this car or the passenger rear DVD screens. The manufacturer has made sure that the display on the dashboard can be accessed only while the car is Parked.
    Depending on engine variant, the model retails for Dh450, 000 for the 750Li and Dh370, 000 for the 740Li. A growing trend towards technology can be seen in all of the manufacturer's different series, to improve performance and competitive edge.

    Source : gulfnews.com

    Internet Technology On Mobile BMW 7-series READ MORE, For Complete Article

    Office Applications On Mobile Phones

    Microsoft and Nokia will establish cooperation in the provision of Office applications on mobile phones. Later, the phone-Nokia mobile phone output dipaket possible direct applications such as Word, Excel, Powerpoint and the mobile version and online access.

    The Alliance is planned to be announced Wednesday (12 / 8) morning U.S. time, or this afternoon. Cooperation that will be exclusive to Stephen Elop, Microsoft business division heads and Kai Oistamo, executive vice president of Nokia.

    Microsoft still refused explains in detail the form of cooperation. However, this step is likely to rival Google's use to start the market incentive to provide the Office with Google Docs. Microsoft is planning to open a similar service when Microsoft launched Office 2010, the latest version, next year.

    Office Applications On Mobile Phones READ MORE, For Complete Article

    How To Maintain Computer Equipment

    Treatment For Keyboard
    Keyboard protected from dust, can be coated with plastic.
    Periodically clean the keyboard with a computer with a special fluid to use cloth or a fine brush.
    Do not put food and drink near the keyboard to avoid spillage on the keyboard.
    Never poke button keyboard with a screwdriver during demolition. This will cause the button broken hinges.

    Mouse Treatment
    Type of the optical mouse does not need a heavy treatment, except to keep the mouse in order not to get wet or lost cable.
    Type of mouse balls require extra-care, because in between the ball allows the entry of dust or dirt. Should periodically at the bottom of the roller mouse is removed and cleaned of dirt that has been cause. Select the hard material for a mouse pad, such as plastic. Do not use cloth because it will make it easier for dust and dirt stick to.

    Treatment For Scanner
    Must be diligent to clean the sensor with glass tissue.
    Close the glass sensor with a thin plastic to avoid dust attached to the glass.
    Never leave the position on the scanner glass sensor cover is open.
    Avoid placing food or drink on the scanner cover

    Treatment For Floppy Disk
    Clean the floppy disk at least once a week using a cleaning disk (disk cleaner). But too often do not use floppy disks because this cleaning can result in head quickly thin floppy disk.
    Never open the disk on the LED indicator on the floppy disk is still up.

    How to keep the CD / DVD-Rom and the fragment CD / DVD
    Clean the CD / DVD-Rom at least once a month by using the fragment CD / DVD-Cleaner.
    Do not insert fragment CD / DVD that has scratches in CD / DVD-Rom.
    Do not use too often fragment CD / DVD loot (especially film).
    Usually enwrap CD and DVD or kotaknya with plastic to avoid dust and dirt that causes scratches on the CD and DVD chip.
    Never accumulate bits CD and DVD into one. But separate them with kotaknya respectively.

    How To Maintain Computer Equipment READ MORE, For Complete Article

    My Rank



    Update News

    Get the latest update of this site via email, Enter your email address:

    We Don't Use Your Email For Spam Activity.

    Link Banner

    Copy Code Below, Insert Into Your Technology Site And Bestechno Team Can Review Your Web

      © Blogger templates Palm by Ourblogtemplates.com 2008

    Back to TOP