Saturday, February 28, 2009

Free Download Winstep Xtreme 8.11+ keygen

Among Windows 7's features, the taskbar overhaul is probably the feature in Microsoft's upcoming OS that has aroused the most interest.

So you've seen all those videos of the new Windows 7 Beta taskbar and you can't help but wish that the new "Superbar" was also available for Vista and XP? Well, you won't have to wait for Windows 7 anymore... Winstep Xtreme 8.11 has just been released, and brings with it the most interesting features of the new Windows 7 taskbar into the XP and Vista world!

IPB Image IPB Image


An integrated workspace environment, Winstep Xtreme is a powerful suite of applications that merge incredible usability and performance with breathtaking eye candy:

NeXuS is a multi-dock system, which as well as holding traditional bookmarked icons can also hold any combination of widgets, clocks, mail checkers, weather indicators and system performance meters within multiple levels of sub-docks.

WorkShelf is a tabbed dock, better suited for complex organizational duties like organizing documents, URLs, movies, work projects, applications, etc...

NextSTART is the menu system - and takes care of all your task management needs as well.

Winstep Start Menu Organizer cleans and organizes your Windows Start Menu.

FontBrowser is a bare-bones font browsing utility.

Winstep Xtreme also includes a pack of popular desktop widgets which can be displayed on the desktop, featured within the docks, placed within shelves or merged into the taskbar. Featured widgets include a speaking Atomic Clock, Recycle Bin, SSL POP3/IMAP Email Checker, Weather Monitor with 5 day forecast, CPU, Net and RAM Meters, and Wanda, the amazing 'fortune cookie' reader.

You can download Winstep Xtreme 8.11 +keygen from HERE

Winstep Website: http://www.winstep.net

source : indowebster.com

Tips for Overcoming Golden Ghost Virus

End - the end of this internet world by the emergence of local dikejutkan latest virus variants, the golden ghost.

For you are infected with this virus should be careful - careful as it will change the default Internet browser page to explore your site www.pl * YB * y.com (censor so safe:))

When this virus is grown locally with very rapidly. The virus not only local now only create duplicate files, menginfeksi data (ms office) and hide the file. But it is also menginfeksi executable file (exe). And distribution not only through flash, but is capable menginfeksi via email, can even chat through the media such as IRC and so on.

Golden Ghost virus created by using Visual Basic and compressed using UPX. This virus has the size of 1312 mb and using Windows media player icon to trick users.

There this feature - if you characterize the virus infected golden ghost:

1. show error message "16 bit MS-DOS subsystem" when the computer switched on and also appears every few minutes.

2. Change the name of the owner to "GoldenGhost"

3. Change the owner of the organization to "GoldenGost.Inc"

4. When booting the windows menu to appear "GoldenGhost Was Here"

5. Internet explorer home page changes to www.pl * YB * y.com

6. When the menu appears podići GoldenGhost was here and if selected the computer will restart.

7. Each time a user copy and paste the contents of text file, then the text will change to desahan "oohhh ... aughhhh ... yessss .. babbby ...!"

8. The virus will attempt to delete all files berekxtensi *. mov, *. wmv, *. 3gp, *. avi, *. mpg, *. mpeg in the flash disk.

The spread of the virus is classified as advanced as it is able to spread through IRC chat and media are trying to join to a number of channels such as Jakarta, Medan, malang, Bandung, Yogyakarta, Solo, Semarang with first connect to a server as follows:
punch.va.us.dal.net, rumble.fl.us.dal.net, mozilla.se.eu.dal.net, swiftco.wa.us.dal.net, haarlem.nl.eu.undernet.org, plasa.id.allnetwork.org.

once connected, will send the Golden Ghost pesan2 among others:
nick, free indonesian picture s * x, duble click url
nick, there's new info neh, marshanda, Agnes monica, Dian sastro, C i the interest rate b * gil, liat for the photos, double click url
indonesian artist nude, double click url
nick, indo artist magazine pl * YB * y, double click the URL
nick, like the artist magazine liat pl * y * YB indo, indonesian nick fr * rn * ep, double click url
ce indo nation, double click

so if you chat and find pesan2 is, it is not Rejeki, but disaster:)

but how to overcome if it is currently terlanjur "Rejeki" through the chat?

in fact update norman virus control can be overcome. even have a file that can improve the virus by diinjeksi golden ghost.
To get it, you can download here:

Download antivirus norman
Download Removal tool


Other related articles :


- Prevent the virus from active autorun.inf with USB Firewall


- Beware, virus attacks' Hopeless' in First Year


- 10 Tips for Securing Computer When Vacation


- Tips for Reducing Risks are Computer Virus


- 7 Step to eradicate virus' K0pL4xZ '


- 4 Step Virus Prevention Conficker



source : various sources

Inter Ready to Make MU suffering


Milan - Results enough to be good at Manchester United to make a pen Inter Milan midweek ago would make the Red Devils diunggulkan more in the second fight in the Old Trafford. However, MU is that the inconvenience will be at both meetings with the Nerazzuri Il.

In the fight that was held at the Giuseppe Meazza Wednesday (25/2/2009) dinihari WIT ago, MU throughout the match more pressing and Inter have a number of golden opportunities. However, an intensity champion Julio Cesar to make Champions 2008 is to be satisfied with the English back to the points only. That makes the MU is in the top of the wind on the second fight later on March 12.

At least the ones who said the former goalkeeper La Beneamata season 1994-1999, Gianluca Pagliuca. According to men age 42 years is indeed very difficult to beat MU in kandangnya, especially in the 2008/2009 season they are still not invincible in its headquarters.

However, with the quality and of the Inter coach, Jose Mourinho, it is obstruction dkk Cristiano Ronaldo will be able to be passed by jawara 16 times the Italian League.

"Inter will against most teams in Europe. Manchester are enjoying a great season. Try to see how they play," said Pagliuca to Radio Incontro the Goal dilansir.

"However it is important to Inter not penetrated in the second leg later on. I will make sure their representatives in the UK is suffering kandangnya own," connect the team with 39 caps Azzurri.

English clubs in the fight round of 16 in addition to all MU successfully achieve victory in the fight midweek ago. Liverpool, Chelsea and Arsenal defeated Real Madrid, Juventus and AS Roma, all through the score 1-0.

Results are disappointing for Italy because they are not representative of the three clubs that achieve victory. Pagliuca, but still save a great confidence that Nerazzuri, Il Lupi and La Vecchia Signora can go to the quarter final round.


"Three English teams showed their superiority. And our representatives can not print a score. However, I still believe at least two of the three clubs that can pass to the next round," the goalkeeper who retired at the end of the 2007 season.


Related Pages

- Drogba puts Chelsea in pole position

Translate by : Me

source : beritabola.com

Drogba puts Chelsea in pole position


Didier Drogba's early goal gave Guus Hiddink a win in his first home game since taking over at the Chelsea FC helm as last season's runners-up saw off a concerted Juventus fightback.

Contrasting form
It was a close-run thing at Stamford Bridge, with the Serie A giants pushing the hosts back in the second half as they sought to cancel out Drogba's slick 12th-minute strike. Yet they were unable to prevent a seventh successive away defeat in the UEFA Champions League knockout rounds, while Chelsea extended their unbeaten home record in the competition to 16 matches, including 13 victories.

Chelsea zip
Claudio Ranieri was given a warm reception by the home supporters on his return to the ground where he spent four years as manager between 2000 and 2004. He knew it would be the only act of generosity shown to him and his team: Chelsea's determination to go one better than last term's run to the final has been reignited by Hiddink's arrival. The London side made a habit of scoring early at home in two-legged ties last season and that was clearly their intention again as Salomon Kalou forced Gianluigi Buffon into a stretching save. Michael Ballack then fired another chance high and wide, while Drogba came close with a flying header.

Ivorian link-up
Chelsea had put down a marker, and when Frank Lampard's free-kick was inadequately dealt with Chelsea seized their opportunity, Kalou playing a clever pass through the heart of the defence where Drogba was lurking unmarked. One-touch control and an emphatic finish put the home team ahead. The Ivorian striker should have doubled the advantage soon after but nodded Lampard's corner well wide.

Bianconeri lift
Juventus had shown little in an attacking sense, but before half-time they enjoyed a purple patch that so nearly yielded an equaliser. First Alessandro Del Piero turned in a stinging drive from Tiago's pass which Petr Čech had to claw away. From the resulting corner Amauri and Giorgio Chiellini both failed to profit from presentable openings.

Marchionni endeavour
Juventus continued to commit bodies forward after the restart despite the risk of conceding a second, and as Chelsea picked up the pace again Ballack and Drogba both sent efforts off target. Juventus substitute Marco Marchionni was working hard to try and bring Amauri into the game and the visitors lived in hope of the vital away goal. It might have arrived on the hour when Čech flapped at a high ball but the goalkeeper was just about able to retrieve the situation.

Late warning
Juve were gaining momentum and Ranieri brought David Trezeguet into the fray with time ebbing away; with his first touch the forward sliced wide. It followed a rasping drive at the other end from Nicolas Anelka which Buffon was pleased to see pass the wrong side of his upright, and Čech was similarly grateful in added time when a low Pavel Nedvěd attempt was deflected centimetres wide with the keeper beaten. It is Chelsea, therefore, who will take the narrowest of advantages to Turin for the second leg on 10 March.


Other article :


- Inter Ready to Make MU suffering



source : uefa.com



Free Download Driver NVIDIA for Linux-x86_64-177.82-pkg2

For those who need NVdia Driver for the operating system Linux, especially Ubuntu.
Hopefully you can be useful for all

Can be Downloaded here

By : Me
source : indowebster.com

Free Download Sony Ericsson PC Suite_4.006.00_EN

This is the software for the user Ericson.Sony Sony Ericsson PC Suite_4.006.00_EN software is able to connect to the computer and to upload various files from computer to handphone.Instalasinya very easy, install Truss live connect, the driver does not need more

For the interested, please download here

by : Me
source : sonyericsson.com

Prevent Virus Autorun.inf make the Super Autorun

This technique will be described on the protection of the flash drive or a virus or program that will create the file Autorun.inf, simple program with Super Autorun. So it can be expected to reduce the spread of the virus.

I had doubts the effectiveness of this way, because it thinks it easy for viruses to change, delete, and create a new autorun.inf file.

Some of this information I can after reading one of any posts in the blog WinPowerTips. Indeed, with only the file autorun.inf to make it, even though the system hidden attribute will be easily overcome by the virus. But there is described with three levels and the result is not easy to delete the file and try to make the virus Autorun.inf file with the usual way will fail.

The following short explanation of the level 3 (stages) to prevent the virus to create / modify the Autorun.inf file:

1. Prevent the virus to create the autorun.inf file on how to create a folder Autorun.inf. Because if you already have this folder then the Autorun.inf file will not be made.

2. Prevent virus remove Autorun.inf folder (with the usual way) by adding Unicode files inside. This fact can make the virus or error programmernya close if not overcome with good.

3. Prevents users Removing Autorun.inf folder with the folder not terhapuskan. Such as Microsoft own explanation that sometimes we can not remove file / folder name if the name is invalid (disability).

Explanation about the length of each level, please visit the blog directly the IT Guy is. Because there are also many tips-other interesting tips.

However, with 3 levels itupun, if virusnya (the virus) and the jelly can still overcome the virus and can still create Autorun.inf file to transmit itself.

Super Autorun

Provided in the blog file vbs (visual basic script), to create Autorun.inf folders and folders that are not [easily] terhapuskan (phases 1 and 3) to phase 2 (make the file unicode) we have to create your own.

After reading the article, I tried googling further information (details) about this, and finally, I try (inspired) to make the file a simple, small and easy to use anyone else associated with this. The result? Super Autorun

super-autorun

File size is only about 24 KB, no need to install the. Consistent with its name, aims to create a folder / file-specific, to prevent the virus (easily) create, modify or delete the file Autorun.inf. This file using additional special techniques, so that it can not be easily removed, or modified by direname virus. For unicode file, not included in this program.

Use Super Autorun

This program is very easy to use, run the live file, then select the drive that will be used as a target or choose "Select all drives" to select all drives, then click Create Autorun.inf, If you already have a file / folder Autorun.inf then this program will try immediately remove, and create new ones. If you are successful, please try to delete, rename, edit, open this folder in any way.

So essentially, this program will create Autorun.inf folders that are not easy to erase, or rename the modifications, so that viruses or other programs can not create file Autorun.inf.

In order to succeed, then the flash drive or to be made must bertipe NTFS. To Flashdisk, because the default Windows Explorer does not have the menu to format NTFS, I can read any posts before Tips Flashdisk format with NTFS file system

Download Super Autorun (24 KB)

Note: This technique is not to prevent the virus to duplicate itself flash, only to prevent the virus mambuat file Autorun.inf, so it does not spread to the computer without us. Perhaps the future can be combined with comprehensive protection creating dummy files protected with Super Autorun to protect the flash. If you want to delete the folder had autorun.inf, can use the software Unlocker

source : ebsoft.web.id
Friday, February 27, 2009

Re-install the Operating System With Fast

Re-install the operating system might often be done by many computer users. When the computer it is already "lemot" because of the many things that are not important, can be re-install it.

Installing the operating system does not take a moment. Yah, siapkanlah within 30 minutes - 1 hour. The length depends on the installation of hardware (read: processors, memory, and disk) that is used.

Actually reinstall the operating system does not always have to run so long. Do with the cloning of the disk, we need not be through a lengthy installation process. ita just need to copy the results of cloning and any PC operating bersistem again. So that the results of cloning as an operating system that is still fresh, do cloning shortly after you finish to install the operating system and drivers. Other programs should not be installed.

The core of the hard disk cloning is copying the entire hard drive contents to other media - to be another hard disk, CD, DVD, or external hard drive. Through cloning, you will get the contents of the CD-R with the exact content of hard disks.

We need to do some parangkat cloning. First is the software for cloning. One is that you can use Norton Ghost from Symantec. We also need a CD-writer, CD start-up, and 2 floppy diskette 1, 44 MB.

Save to CD
Since we will be doing the cloning of the operating system, the drive that contains the operating system that will dikloning - usually drive C. But, I can only operating system on another drive, for example, because there is more than one operating system in the PC.

On this tutorial, will do pcplus cloning of the C drive that contains the Windows operating system with the partition size of 400 MB.

Without ba bi bu again, let's start.
1. Run Norton Ghost by clicking the [Start]> [Program]> [Norton Ghost] [Norton Ghost].
2. You will see the view Ghost Basic. Select the first option, the [Backup].
3. Click [Next].
4. Select the Source option in the select drive C. Destination in the options select [Recordable CD or DVD]. After that, click [Next]> [OK].
5. Press the [Next], [Next] again, [Next] again. Then, click [Continue], click [Run Now], and the last one click [OK].
Windows will restart and Norton Ghost to do any back-up. Now you have 1 CD that is the image of your C drive. The contents of the CD is only 1 file that berekstensi GHO. You can not see the contents of the file without the assistance Ghost Explorer. With the help of Ghost explorer, you can view the files on the file in the GHO.

I Start-up Disk
We need a floppy start-up that results GHO image file can be used when we want to "re-install" the operating system. Start-up disk that form two 1.44 MB floppy diskette. We call the first diskette "floppy A", while the second disk we call the "floppy B".

Run Norton Ghost and click [Ghost Utilities]> [Norton Ghost boot wizard] [CD / DVD with ghost startup disk] [Next]> [Use PC-DOS] [Next] [Next] [Next]> [Next]> [OK]. Insert blank floppy disks to make CD / DVD start-up. Press [Start] to make a diskette format, then press [Close].

Floppy disks will be the next start-up disk. When the confirmation for the second disk appears, remove the floppy diskette and insert a B. Press [Start] to do the format and press [Close]. Wait until the process is finished, and press [Finish] to end.

Now you have a startup floppy disk 2. This disk will be used for booting the first time. Note that the second disk is related to one another. A diskette can not be run without the disk B, so is vice versa. B floppy disks can not be run without the floppy A.

"Install"
Why install it be in quotes? That's because we do not install the operating system. But, just copy the operating system that we installed previously.

Step by step this is done when we want to refresh the operating system again. We are doing is cloning from CD to hard disk.


In the BIOS, so that the Set is made from boot floppy diskette. Insert a floppy in the floppy drive. Follow the instructions on the monitor, if you are inserting floppy B, then enter the diskette B. You are prompted to insert a floppy and press return [Enter], and the last return you are required to enter the disk B.
Now you have entered a Norton Ghost.

To perform cloning from a CD to the hard disk, select [Local]> [Partition]> [from image]. Navigate to the CD-ROM containing the GHO file, and press [Open]. In the "Select source partition from image file", click [OK]. Then on the "Select local destination drive by clicking on the drive number", click [OK]. Select the drive that will dikloning, select drive C, press [OK] and press [Yes].

Cloning will run until reaching 100 percent. Press [Reset computer] to restart. Remove the diskette from the floppy drive and the BIOS Arrange to take your first booting from the hard disk.

Translate by : Me

source : komputertrik.wordpress.com

Free Download Kaspersky 2009 + update


The backbone of your PC’s security system, offering protection from a range of IT threats. Kaspersky Anti-Virus 2009 provides the basic tools needed to protect your PC. This easy-to-use solution provides complete antivirus protection that keeps you safe while your are online.

Features :

Kaspersky Anti Virus 8.0 – is a new line of Kaspersky Labs products, which is designed for the multi-tiered protection of personal computers. This product is based on in-house protection components, which are based on variety of technologies for maximum levels of user protection regardless of technical competencies. This product utilizes several technologies, which were jointly developed by Kaspersky Labs and other companies; part of them is implemented via online-services.
Our products for home and home office are specifically designed to provide hassle-free and quality protection against viruses, worms and other malicious programs, as well as hacker attacks, spam and spyware.

During product preparation several competitor offerings were considered and analyzed - firewalls, security suites systems, which position themselves as proactive in defence and HIPS systems. Combination of in-hosue innovative developments and results from analysis gathered through the industry allowed to jump onto a new level of protection for personal users, whereby offering even more hardened and less annoying computer protection from all types of electronic threats – malicious programs of different types, hacker attacks, spam mailings, program-root kits, phishing emails, advertisement popup windows etc.

Essential Protection
* Protects from viruses, Trojans and worms
* Blocks spyware and adware
* Scans files in real time (on access) and on demand
* Scans email messages (regardless of email client)
* Scans Internet traffic (regardless of browser)
* Protects instant messengers (ICQ, MSN)
* Provides proactive protection from unknown threats
* Scans Java and Visual Basic scripts

Preventive Protection

* Scans operating system and installed applications for vulnerabilities
* Analyzes and closes Internet Explorer vulnerabilities
* Disables links to malware sites
* Detects viruses based on the packers used to compress code
* Global threat monitoring (Kaspersky Security Network)

Advanced Protection & Recovery
* The program can be installed on infected computers
* Self-protection from being disabled or stopped
* Restores correct system settings after removing malicious software
* Tools for creating a rescue disk

Data & Identity Theft Protection

* Disables links to fake (phishing) websites
* Blocks all types of keyloggers

Usability
* Automatic configuration during installation
* Wizards for common tasks
* Visual reports with charts and diagrams
* Alerts provide all the information necessary for informed user decisions
* Automatic or interactive mode
* Round-the-clock technical support
* Automatic database updates


To Download Clik HERE

By : Me

Source : .indowebster.com

ASUS Eee Top ET1602, The Computer Brief


Summary of trends in the PC dipelopori by Apple with the iMac product it presumably also tempt ASUS to join play. Although from the performance, the product has the ASUS Eee Top ET1602 can not be spelled out powerful, but at least if you only intend to explore the PC can connect to the internet and create office documents, this PC can accommodate your job.
ASUS Eee Top ET1602

View from the looks, Eee Top ET1602 this is indeed brief. Dibalut body with white, a PC with 16.6-inch screen of this could easily put you on the table without the need to seize too much space. Buffer placed on the back of the screen that also contains the innards of a PC is also quite robust and able to withstand the weight of a PC this good. Glance, this construction makes it look like the PC this photo frame.

There are some quite interesting things from this PC. The first is the screen that is equipped with a touchscreen feature. However, if you are not familiar with the features that are currently so this trend, ASUS is providing keyboard and mouse that is designed to match the PC unit itself. Unfortunately peranti second input is a little too small and a bit less comfortable when operated.

ASUS Eee Top ET1602

Because the processor dicangkokkan on the PC this is a 1.6Ghz Intel Atom N270, the performance clearly can not be equated with a PC that uses higher-speed processor. Can be spelled out, the ability Eee Top ET1602 is not far different with the netbook circulating in the market at this time. Memory capacity is also installed sufficient standard: 1GB. Fortunately ASUS still provide enough free space on your hard disk that is used (160GB).

Another thing that is interesting enough disediakannya six USB ports on this PC. At least you will not be lack of port while trying to connect this PC peranti that use USB connectivity. Ethernet connectivity has been installed on the PC even though this feature is vital as the DVD burner that can not be found even to this product.

ASUS Eee Top ET1602

In short, this PC can only accommodate light work only and will not be able to provide adequate performance if you intend to use it to 'fag'. But even so, Good Gear Guide the opportunity to test this product is still willing to give a high enough value even though that was about the reflective screen. Say, ASUS release of this product with the official price of U.S. $ 886 or about Rp9.750.000.

Specification: Processor: Intel Atom N270 1.6Ghz
Memory : 1GB
Chipset : --
VGA : Integrated
Screen : 15.6 inches (16:9) 1366 x 768 pixels
Hard Disk : 160GB, 5.400rpm
Optical Drive: N / A
Port : headphone Jack, Microphone Jack, RJ45, USB 2.0
Webcam : 1.3M pixel Web camera
Wireless : 802.11 n
Dimensions : --
Official Site : www.asus.com

source : kapanlagi.com

Free Download Chess3D.3.02 games


Relaxed from the moment working at the computer after the day's activities that we sometimes create stress and need it, sometimes the game play-in game lightweight computer can be a solution to reduce stress, if you like playing computer games such as I have games that you try this one
This game shows the 3-dimensional chess gem, look at the background that can change at will, this game supporting dual player with connections to the LAN or Internet connection, for this function you need a little work and especial study again, but if you can not play I think with the computer system is no less interesting.

To Download this game clik HERE

source : andisukry.blogspot.com

NASA satellite due to the Sea Near Antarctica Before tired Orbit

A U.S. satellite to monitor the global carbon dioxide emissions fell to the sea near Antarctica, on Tuesday, after failing to reach orbit, NASA says.

According to the outer body of the U.S., failure is a big disappointment for the science of climate.

Satellite was successfully launched from Vandenberg Pangkalan AU in California, with the Taurus XL rocket at 01:55 local time or 16:51 WIB, NASA said.

Mission of fatal error that occurred several minutes after launch when the skin such as the nose cone shells, which protect the satellite during launch, failed to separate completely.

"Indications show vehicle while the outer was not strong enough to reach orbit and fall to the sea close to Antarctica," said John Brunschwyler, program director of the Taurus rocket at Orbital Sciences Corporation, the rocket company based in Virginia, as reported AFP.

"The whole team was very disappointed, we were very surprised with the results of that," he said, while adding that 56 of 57 Taurus rocket was launched without any problems on decades ago.

NASA Flight Director, Chuck Dovale, calling it a failure as a "big disappointment" in the scientific community. (*)

Translate by : Me
source : antara.co.id

6 Steps eradicate the virus attacks the Yahoo Messenger


Coutsonif.A virus attacks that threaten the user's Yahoo Messenger and Skype should at alert. This virus spreads by sending itself to all contacts in the address of the application from the infected computer.

Message at a glance like a message in general. But do not click the link to a given, though sent by your friend. The message was not sent by your colleagues, but by viruses that have infected computer to your colleagues.

Well, if already infected, then it will automatically create a random file name with the extension. Tmp and. Exe that will be stored in the directory [C: \ Documents and Settings \% username% \ Local Settings \ Temp] with the name of the different .

If you are like this, the user can only pasrah beraktifitas calm and not on the internet again. Moreover, can-do reputation is damaged because of allegedly spreading the virus as well. For the friends of the recipient of a suspect who deliberately harm themselves with send me its virus.

So, before the incident occurred. There are 6 well you see how right to eradicate destructive virus that attacks the good name of a chat application such as this dilansir Vaksincom:

1. Disable 'System Restore' during the cleaning process.
2. Disable Windows autorun, so the virus can not be activated automatically when the access to the drive / flash disk.

* Click the 'start'
* Click 'run'
* Type 'GPEDIT.MSC', without quotes. Then the screen will display 'Group Policy'
* In the 'Computer Configuration and User Configuration,' click 'Administrative templates'
* Click the 'System'
* Right click on 'Turn On Autoplay', select 'Properties'. Then the screen will appear 'on Tun Autoplay propeties'
* In the tabulation 'Settings', select' Enabled '
* In the 'Tun off Autoplay on' select 'All drives'
* Click 'Ok'


3. Turn off the virus, use the tools' security task manager 'and delete the file [sysmgr.exe, vshost.exe, winservices.exe, *. tmp]
Just a note,. Tmp files that have indicated an extension TMP [example: 5755.tmp]. Right-click on the file and select 'Remove', select the option 'Move files to Quarantine.

4. Repair registry that has been modified by the virus. To speed up the process of elimination, please copy the script below on the notepad program and save it with the name repair.inf. Run the file in the following manner: repair.inf Right-click, and select install.

[Version]
Signature = "$ Chicago $"
Provider = Vaksincom Oyee


[DefaultInstall]
AddReg = UnhookRegKey
DelReg = del


[UnhookRegKey]

HKLM, Software \ CLASSES \ batfile \ shell \ open \ command ,,,"""% 1 ""% * "
HKLM, Software \ CLASSES \ comfile \ shell \ open \ command ,,,"""% 1 ""% * "
HKLM, Software \ CLASSES \ exefile \ shell \ open \ command ,,,"""% 1 ""% * "
HKLM, Software \ CLASSES \ piffile \ shell \ open \ command ,,,"""% 1 ""% * "
HKLM, Software \ CLASSES \ regfile \ shell \ open \ command,,, "regedit.exe"% 1 ""
HKLM, Software \ CLASSES \ scrfile \ shell \ open \ command ,,,"""% 1 ""% * "
HKLM, SOFTWARE \ Microsoft \ Windows NT \ CurrentVersion \ Winlogon, Shell, 0, "Explorer.exe"
HKCU, SessionInformation, ProgramCount, 0x00010001, 3
HKCU, AppEvents \ schemes \ Apps \ Explorer \ BlockedPopup \. Current,,, "C: \ WINDOWS \ media \ Windows XP Pop-up Blocked.wav"
HKCU, AppEvents \ schemes \ Apps \ Explorer \ EmptyRecycleBin \. Current,,, "C: \ Windows \ media \ Windows XP Recycle.wav"
HKCU, AppEvents \ schemes \ Apps \ Explorer \ Navigating \. Current,,, "C: \ Windows \ media \ Windows XP Start.wav"
HKCU, AppEvents \ schemes \ Apps \ Explorer \ SecurityBand \. Current,,, "C: \ WINDOWS \ media \ Windows XP Information Bar.wav"

[del]

HKLM, SOFTWARE \ Microsoft \ Windows \ CurrentVersion \ Run, Microsoft (R) System Manager
HKCU, Software \ Microsoft \ Windows \ CurrentVersion \ Run, help bMaxUserPortWindows Service
HKLM, SYSTEM \ CurrentControlSet \ Services \ TCPIP \ Parameters, MaxUserPort

5. Remove virus file below:
C: \ vshost.exe [all drives]

C: \ autorun.inf [all drives]

C: \ RECYCLER \ S-1-5-21-9949614401-9544371273-983011715-7040 \ winservices.exe

C: \ Documents and Settings \% username% \ Local Settings \ Temp

A415.tmp [random]

034.exe [random]

Lady_Eats_Her_Shit - www.youtube.com

C: \ WINDOWS \ system32 \ sysmgr.exe

C: \ WINDOWS \ Temp \ 5755.tmp

C: \ windows \ system32 \ crypts.dll

C: \ windows \ system32 \ msvcrt2.dll

6. For optimal cleaning and prevent re-infection, please use the antivirus can detect and eradicate this virus up to date. You can also download tools in Norman Malware Cleaner http://download.norman.no/public/Norman_Malware_Cleaner.exe

Ardhi Suryadhi
source : detikinet

Wednesday, February 25, 2009

9 free antivirus programs for Windows


Keeping your Windows computer virus-free doesn't have to cost you a lot of money. Heck, it doesn't need to cost you any money. There are plenty of good options available for those of you on the hunt for free antivirus software.

Wait - free? Don't companies like Norton make a good business out of selling antivirus protection? Why would someone give it away? Developers of free antivirus solutions like Avast and AVG are counting on a couple of things. First, that you'll like the free offering enough to want to buy an upgraded version of their product. Second, that if enough home users talk about how much they love it that their "computer guy" at work might want to use it on the company's systems.

The free options listed after the break offer the same kind of protection as the boxed software you can buy at the store.

Two things to keep in mind:

First, as with other free software, some of the developers ask for support in the form of a toolbar install. They're all optional, so make sure to un-tick the checkboxes during the install if you don't want the toolbar.

Second, a number of the developers offer a non-free version on the free version's download page via a service called TrialPay. The totally free version is normally on the left, the TrialPay offer on the right - make sure you're clicking the link you actually want.

Avast Home Free


I see Avast's little blue sphere in a lot of system trays, and with good reason: it's one of the most recommended free Windows antivirus options. One nice thing about Avast is that the installer only installs the antivirus program – there's no toolbar or anything else to dodge. Definitions update automatically, scans can be scheduled, and the boot-time scan tool does a good job at uprooting even stubborn infections.

You do need to register for a product key, though Avast will never email you anything other than the confirmation message.

Get it from: Avast | FileHippo | Softpedia



AVG Free


AVG has been a popular free antivirus option for Windows users for a number of years. It provides solid protection against viruses and other malware, and there's no registration required. Virus definition updates are automatic, and scheduled scanning is supported. Version 8 ships with the optional AVG Security Toolbar, which may be a good idea for some users. It provides security ratings for known websites and provides a little added protection in your browser – a place some users desperately need it.

Be sure to watch for the toolbar install and opt out if you don't want it. Also pay attention on the download page: free link on the left, TrialPay on the right.


Get it from: Download.com | FileHippo | Softpedia


Avira AntiVir


Avira's offering is third on the list alphabetically and that's where it falls popularity wise on Download.com, just behind AVG and Avast. It's rated highly for fast and accurate scanning, and is easy on system resources. AntiVir's simple interface and solid protection make it a good choice for novice users.

One bothersome aspect is the nag screen that appears periodically to remind you about Avira's paid product. Also, on Avira's download page look on the left side for the completely free link - the right side is a TrialPay offer.

Get it from: Avira | FileHippo | Softpedia



BitDefender


Another lesser-known (but solid) option is BitDefender. In addition to virus and malware defense, BitDefender also includes a privacy protection feature that monitors web traffic and outbound mail for possible breaches. Its scanning engine is fairly speedy and detection rates are on par with more well-known software.

The download page is a bit like Avira's, so make sure you don't use the TrialPay offer on the right unless you really want to. The free download is on the left side.

Get it from: BitDefender | FileHippo | Softpedia



ClamWin


Unlike other programs on this list, Clam is not a realtime virus scanner, meaning it won't notify you the instant an infected file gets saved to your hard drive. Because of this shortcoming, ClamWin is probably not a good choice for novice users. It does, however, support scheduled scans and integrates with Windows Explorer so you can manually right-click and scan files. It also integrates with Microsoft Outlook and can remove infected attachments automatically.

You can get on-access protection with ClamWin by integrating it with WinPatrol or Spyware Terminator.

Get it from: ClamWin | FileHippo | Snapfiles



Comodo Internet Security


Comodo's free antivirus application comes as part of their Internet Security suite. Comodo's firewall software has always been very well-respected, but you can choose to only install the antivirus during the install if you prefer. It's a solid performer, with good scanning speed and detection rates, and few false positives.

Like AVG, Comodo packages a toolbar (called safe surf). It'll also prompt you to change your homepage, so just make sure to uncheck the boxes if you want to opt out.

Get it from: Comodo | Download.com | Softpedia



PC Tools Antivirus


PC Tools are the same people that produce Spyware Doctor, one of the most popular anti-spyware applications around (though not my personal choice). Its interface is simple and easy to understand for novice users, though advanced users are likely to be frustrated by the lack of more sophisticated options that are available in other free programs. Scheduled scanning is supported, as are automatic definition updates.

Get it from: PC Tools



Rising Antivirus


Even with the regal lion face logo, Rising hasn't garnered a lot of respect yet. Still, those who do use it seem very pleased with the protection it provides and also report that it's easy on system resources. A complete scan with Rising is a bit more sluggish than with more popular options, but most of you probably run scheduled scans when you're AFK anyway – so it's not a big downside.

It's regarded as a good choice for non-technical users.

Get it from: Rising AV | Snapfiles | Softpedia



Spyware Terminator


Spyware Terminator isn't an antivirus program on its own, but you can choose to integrate ClamWin during the setup process. Unlike installing Clam on its own, pairing the two applications provides realtime virus protection. It's regarded as a very good anti-spyware application, though reviews are mixed on its ability to handle antivirus duties.

As with AVG and Comodo, a toolbar install will be offered during the setup process.

Get it from: Spyware Terminator | FileHippo | Softpedia



If you're not sold on the idea of free antivirus and are looking to test drive some paid options, there are plenty available for download. Just about every major developer of antivirus software offers at least a 30 day trial of their product. Here are three solid choices you can take for a test drive.


Eset NOD32


NOD32 is the choice of a number of Download Squad crew members. It's very well-respected by system admins and technicians and one of the best programs available to protect your PC from infection. Downloading the current version gets you 30 days to try it out.

If you're so inclined, you can download beta versions or release candidates as well - and you'll get up to 6 months of free protection.


Kaspersky


Another option held in high regard by experienced users, the Kaspersky scanning engine is licensed by a number of other companies that provide antivirus software. Trial versions last 30 days.


Trend Micro


Trend has been a truster choice in coporate environments for a long time, though their PC Cillin software for consumers isn't as popular as some other tites. It's still a solid choice and provides good protection. Again, 30 days to try it out.



Other related articles :


- Prevent the virus from active autorun.inf with USB Firewall


- Beware, virus attacks' Hopeless' in First Year


- 10 Tips for Securing Computer When Vacation


- Tips for Reducing Risks are Computer Virus


- 7 Step to eradicate virus' K0pL4xZ '


- 4 Step Virus Prevention Conficker


source : downloadsquad.com

Watercooler Notebooks

Is your laptop often excessive heat? How to make your laptop become more of a cold right now you use? Here is a guide to create a radiator on a laptop you may be able to make reference to your laptop.

IMG_8847.JPG
IMG_8845.JPGIMG_8847.JPG


Disclaimer


Loud warning: If you sabotage something in this experiment it was your own fault, because in this experiment, as you know is basically the electronic mix with water as you know they feud with each other.
For those of you who will continue to step in a more then please continue to step 2, if you are not yet convinced then consider carefully to apply in your laptop.


Prepare laptop


Prepare a laptop, look first if you do not have it (pinjem neighbor, father, etc.). In this experiment using a compaq presario 700 laptop that overheated. Some of the methods can be done easily, it is easier if you have a larger fund to buy better equipment.


Preparation


  • Pipe: Here, use 3 / 16 ID vinyl pipe
  • Pipe again: Here, use 5 / 16 ID
  • Pump: This is the pump power supply with it.
  • Radiator: Here, use the add-on transmission cooler from the car
  • Fan: The ... Here, using two (2) fan with a heat control
  • Reservoir
  • Power supply: 13.5 v Here the PSU to 12V PSU fan and pump funtuk.

IMG_8345.JPG


Loading Laptops


Read the author's guide for how to do, or just loading what you can poke

IMG_8353.JPG


Prepare the cooling block & Modif


Most laptops have integrated cooler cpu block / heat sink. Unloading the part and look how the water can go to the part. Compaq has a copper pipe at the top, cut the part and the lower cut. Then in hilangkanbagian. Then modify the part to look like in the picture.
IMG_8595.JPG

IMG_8595.JPG IMG_8597.JPG


Play Audio


Find a way how to play the pipe exit. Usually get in the cut, find a safe way to avoid a cut.

IMG_8359.JPG


Place the tool on the back of the screen


Open up your monitor screen scree (carefully lcd is very dangerous) and then drill some holes. enter zip mounting or cable tie for the trans cooler holes through it.

IMG_8582.JPG


Place the Radiator and Fan


Then take the radiator using a cable tie or zip. Then place the gasket on the top of the radiator fan on each, this will help move air to and from the place you want. Then install the fan in the place where you want and make sure that does not move with the round clip or cable tie or anything so permanent.
IMG_8589.JPG


Connect the other


Now the radiator has been installed and then attach the pipe and reservoir double stick tape or anything that strong, and then attach the cable-the cable.

pray

Fill with water (use distilled water). lihatlah apakah ada yang bocor. see if there is a leak. Fix leaks (if any) and reset the stack. Place the cooling system with no leakage for 24 hours before you turn on your system (powering up). Some of the reservoir continues to leak, if you feel the same ha, make sure not too much air pressure in it.

IMG_8593.JPG

Source: http://www.instructables.com

7 Steps for deracinate Virus: ' Conficker '

Virus' Conficker.DV 'using the distribution method that is different from preceding. With canggihnya, the virus tried to access the network using a slit windows' Default Share '(ADMIN $ \ system32) with the administrator password.

In addition 'Conficker.DV' also create a file on removable media such as flash, hard drive and card reader to save the file hidden on the root drive.

While the action the same as preceding, that is trying mengexploitasi MS08-067 security cleft or Windows, or Windows Server Service SVCHOST.exe. Many users are not infected because of the Automatic Updates feature and do not patch Windows MS08-067.

If you are like this, see step 7 short of the virus analyst Adi Saputra Vaksincom to eradicate the virus' Conficker.DV 'received detikINET, Wednesday (28/1/2009):

1. Disconnect the computer that will be cleared from the network / internet.
2. Turn off system restore (Windows XP / Vista).
3. Turn off the virus is active in the services. Use the removal tool from Norman to clean the virus is active. If you do not have, can be downloaded at the site norman.
4. Delete the service svchost.exe fake virus on ditanamkan registry. You can search manually in the registry.
5. Delete Task Schedule is created by the virus. (C: \ WINDOWS \ Tasks)
6. Remove the registry string is created by the virus. To facilitate the registry can use the script below:

[Version]
Signature = "$ Chicago $"
Provider = Vaksincom Oyee

[DefaultInstall]
AddReg = UnhookRegKey
DelReg = del

[UnhookRegKey]
HKCU, Software \ Microsoft \ Windows \ CurrentVersion \ Explorer \ Advanced,
Hidden, 0x00000001, 1
HKCU, Software \ Microsoft \ Windows \ CurrentVersion \ Explorer \ Advanced,
SuperHidden, 0x00000001, 1
HKLM,
SOFTWARE \ Microsoft \ Windows \ CurrentVersion \ Explorer \ Advanced \ Folder \ Hidden \ SHOWALL,
CheckedValue, 0x00000001, 1
HKLM, SYSTEM \ CurrentControlSet \ Services \ Bits, Start, 0x00000002, 2
HKLM, SYSTEM \ CurrentControlSet \ Services \ ERSvc, Start, 0x00000002, 2
HKLM, SYSTEM \ CurrentControlSet \ Services \ wscsvc, Start, 0x00000002, 2
HKLM, SYSTEM \ CurrentControlSet \ Services \ wuauserv, Start, 0x00000002, 2

[del]
HKCU, Software \ Microsoft \ Windows \ CurrentVersion \ applets, dl
HKCU, Software \ Microsoft \ Windows \ CurrentVersion \ applets, ds
HKLM, SOFTWARE \ Microsoft \ Windows \ CurrentVersion \ applets, dl
HKLM, SOFTWARE \ Microsoft \ Windows \ CurrentVersion \ applets, ds
HKLM, SYSTEM \ CurrentControlSet \ Services \ TCPIP \ Parameters, TcpNumConnections

Use notepad, then save with the name 'repair.inf', then 'Save As Type' to 'All Files' so that the error does not occur. Repair.inf run with the right click, then select install.

Meanwhile, for the active file on startup, you can mendisable through 'msconfig' or can be manually mendelete on the string: 'HKLM, SOFTWARE \ Microsoft \ Windows \ CurrentVersion \ Run'

7. For cleaning the virus W32/Conficker.DV optimally and prevent re-infection, you should use and update anti-virus that is able to detect this virus with both your computer and the patch with the official patch from Microsoft to prevent re-infection.

Other related articles :


- Prevent the virus from active autorun.inf with USB Firewall


- Beware, virus attacks' Hopeless' in First Year


- 10 Tips for Securing Computer When Vacation


- Tips for Reducing Risks are Computer Virus


- 7 Step to eradicate virus' K0pL4xZ '


- 4 Step Virus Prevention Conficker




source : detikinet.com


Free Download Mac OS X Leopard Transformation Pack for XP + keygen


Mac OS X Leopard Transformation Pack will transform your Windows XP user interface to Mac OS X Leopard alike looks that everyone will never notice it’s the same old. The installation of Mac OS X Leopard transformation pack that changes some of the windows component and get Mac OS X 10.5 Leopard mods on your XP operating system.

The windows component includes explorer.exe, shell32.dll, xpsp2res.dll, mydocs.dll, and msgina.dll. However, it’s advisable to create a system restore point before installing the transformation from Windows XP to Mac OS X Leopard GUI interfaces. Meanwhile, this Mac OS X Leopard transformation pack is workable on Win XP Service Pack 2 English version

Important Notes by the Author:
* Please make backup before replace your system files.
* These files can only work in Windows XP SP2 (English version ONLY).
* Only do in SAFE MODE

http://rapidshare.com/files/176199290/Windows_XP_To_Mac_OS_X_Leopard.rar

http://w15.easy-share.com/1702956874.html
Wednesday, February 11, 2009

Later in July waiting Ancelotti, Chelsea


Milan - Chelsea seems to be official by Guus Hiddink, despite it is not full and only until the summer. Consequently, 'The Blue' can be fixed later menggaet Carlo Ancelotti's AC Milan, who also gave green light.

Post dipecatnya Luiz Felipe Scolari, Chelsea are looking for a new manager. Name Ancelotti is still tied up to now contract with Milan also took called perhaps because the owner Roman Abramovich London club was mengincarnya.

Hiddink is in the process come up with the Chelsea hot seat. But the Dutch man still bound Timnas contract with Russia so that will only work in double Stamford Bridge, it is reported until the next summer season only.

After short-term contract with Hiddink, the possible move to Chelsea will Ancelotti, manager of disuka Abramovich. Chance is enough to open their own because Milan was the case.

"If the position is still open in Chelsea in July next, I think he'll consider," said Milan director Umberto Gandini in The Sun, Wednesday (11/2/2009).
(dtc / KRS / din)

translate by : Me
source : beritabola.com

7 Interesting Tips for Window 7

Here are some tips for you so that you are more familiar and can understand more about the performance of Windows 7.

Here are some tips to its:

1. MP3 song in order to remain intact

Windows 7 has a weakness in Windows Player 12 because it has a bad bug. This bug will automatically add the missing metadata, including album art. The problem this can cause the file is not intact anymore.

To fix, install updatenya from the Microsoft site.


2. Right click
* Right click on the blank to set the desktop resolution screen, so no need to display the settings first.
* Right-click on the Explore icon in the taskbar, to access the public folder system that is used as Documents, Pictures, and other more quickly.
* If do not want to use Internet Explorer and want to move from taksbar, just right-click on the IE icon, select "Unpin this program from the taskbar", then install another browser.


3. Shortcut (shortcut) on the keyboard

* Alt + P: menampikan To view or hide Explorer window
* Windows Logo + G: Showing the gadget in front of other windows-windows
* Windows Logo + + (plus key): Zoom in
* Windows Logo + - (minus key): Zoom out
* Windows Logo + Up: increase the size of window
* Windows Logo + Down: the window size
* Windows Logo + Left: Moving toward the left side of the screen
* Windows Logo + Right: Moving towards the right side of the screen
* Windows Logo + Home: Meminimize / merestore window other than the current


4. Set the UAC (User Account Control)

Irritated with the number of 'warning' (alert) as in Windows Vista? Arrange the following steps: Start -> Control Panel -> Change User Account Control Settings.


5. Cakram Digital Writing

Windows 7 finally provides a service to mem-'burn 'ISO file directly to CD or DVD form. To memudahkannya, live double-click on the file, select the drive with a blank disc and click Burn.


6. Access video faster

Right-click on the Start menu, then go to Properties -> Start Menu -> Customize, and set the video options on the "Display as a link." Can now access the folder with the short video.


7. For Flickr

Have an account on Flickr? To accelerate the opening, visit the site I Started Something, then its download Connector, and select Open. With this, "Flickr Search 'will be added in the Searches folder, can also find photos on the desktop. Easy right?


Other related articles :

- Windows 7 will be in a free by Microsoft
- How to Change the Windows 7 Default Control Panel View
-
How to Customize the View in the Services Window in Windows 7
-
Free Windows 7 Transformation Pack Download
- Free Windows 7 Themes For Vista and XP
- 20 New Features of Windows 7
- Free Download UxTheme Patch for Windows 7

translate by: Me
source: detikinet.com

Search for Files With Super Finder



Windows operating system include the facility to search the files in the folder or drive. Search for "simple" facilities are adequate, but the search for a text to a file located in the facility less reliable.

For example like this, for example, you never write a MS Word document, but you forget the name of the file. By using the Windows search facility you can not find the file the document.

Therefore you need to help other utilities, the Super Finder. For the above example, the Super Finder can easily find the file in MS Word as long as you can still remember the specific word or phrase in the document.

Super Finder has some interesting features, among others:

* Search for files based on a certain date
* Search for files based on file attributes (archive, read only, system, hidden)
* Search for files based on file size
* The file search is relatively fast
* Search text, unicode, and hexadecimal
* Searching with wildcards
* Etc.


Download: http://freesoftland.sytes.net/dc/download.php?id=6
by: Lutfi
Source : klik-kanan.com