Sunday, January 28, 2007

Happy Birthday Farhan
Selamat ulang tahun yang ke 7 ya anakku tercinta. Semoga Jadi anak yang soleh,pintar dan berbakti kepada orangtua. Belajar yang rajin ya.Jangan suka usil ama Nasha lagi ya..... Kalo di mintain tolong ama ibu harus di bantuin ya... Ayah kangen banget sama kalian Ibu,Farhan dan Nasha. Doain ayah agar bisa pulang Lebaran tahun ini ya

Tuesday, January 23, 2007

Windows Vista is Coming?
Seberapa hebat sih Vista? Mengapa banyak dari kita penasaran untuk bisa menggunakan Windows Vista? Beberapa Versi Vista:
  1. Windows Vista Home Basic $199.00
  2. Windows Vista Home Premium $239.00
  3. Windows Vista Business $299.00
  4. Windows Vista Enterprise belum ada harga
  5. Windows Vista Ultimate $399.00
Dilihat dari sisi graphics memang lebih bagus dibandingkan dengan versi windows yang sekarang kita pergunakan. Yang jadi masalah mungkin adalah kompatibiliti hardware yang ada di PC kita, lalu driver, dan aplikasi yang akan di gunakan. Biar tidak penasaran apa kompie kita kompatibel untuk Vista silahkan test dulu dengan menggunakan Windows Vista Upgrade Advisor . Setelah di test hasilnya adalah Windows Vista Business yang kompatibel, harganya USD 299 ? Setelah saya coba ada beberapa masalah yang ditemui, seperti :
  • Modem ADSL yg tidak kompatibel dengan Vista
  • NVIDIA nForce Networking Controller

Ada yang tahu kapan tanggal pasti Windows Vista diluncurkan?

Friday, January 19, 2007

Cara install Mac OSX di Windows XP

Dulu kita beranggapan Mac OS hanya bisa di install di Apple hardware, namun seiring perkembangan jaman, Mac OS sdh bisa di install di hardware selain Apple. Begitu juga sebaliknya, Windows XP juga telah bisa di install di Mac. Jangan jangan nanti Mac dan Windows merger ? Bagaimana Pak Steve Jobs dan Pak Bill ? Kalo di gabungin kayaknya keren kali ye..... (Kok jadi ngelantur).... Tutorial ini di persembahkan ( kok jadi kayak lagu dangdut ? ) untuk teman2 di kaskus. Nah buat kita yang ingin nyobain Mac tapi nggak punya cukup uang untuk beli Apple Computer mendingan coba cara ini. Kenapa MAC OSX bisa di install di hardware selain Apple? Ini Jawabannya : x86 atau 80x86 adalah nama umum dari arsitektur mikroprosesor yang pertama kali dikembangkan dan diproduksi oleh Intel. Arsitektur x86 saat ini mendominasi komputer desktop, komputer portabel, dan pasar server sederhana. Keping Mikroposesor Intel Pentium 4; Seri Northwood Arsitektur ini dikenal dengan nama x86 karena prosesor-prosesor awal dari keluarga arsitektur ini memiliki nomor model yang diakhiri dengan urutan angka "86": prosesor 8086, 80186, 80286, 386, dan 486. Kerena nomor tidak bisa di-paten-kan, Intel dan manufaktur pesaingnya mulai mengunakan nama yang bisa dipatenkan misalnya Pentium untuk generasi-generasi lanjutan dari arsitektur ini, namun penggunaan istilah "x86" telah secara umum digunakan untuk menyebut semua prosesor dalam generasi ini. Arsitektur ini telah dua kali diperluas untuk mengakomodasi ukuran word yang lebih besar. Di tahun 1985, Intel mengumumkan rancangan generasi 386 32-bit yang menggantikan rancangan generasi 286 16-bit. Arsitektur 32-bit ini dikenal dengan nama x86-32 atau IA-32 (singkatan dari Intel Architecture, 32-bit). Kemudian pada tahun 2003, AMD memperkenalkan Athlon 64, yang menerapkan secara lebih jauh pengembangan dari arsitektur ini menuju ke arsitektur 64-bit, dikenal dengan beberapa istilah x86-64, AMD64 (AMD), EM64T atau IA-32e (Intel), dan x64 (Microsoft). Untuk Lebih lengkapnya baca di sini . Sebenarnya ada dua cara yang saya ketahui : 1. Dengan menggunakan Pear PC 2. Boot langsung ( yang akan saya beberkan disini ) Telah di coba di PC saya dengan spec:
  • Processor : Dual Core AMD Athlon 64X2 4600, 2470 MHz
  • Motherboard : Gigabyte GA-K8NF-9 / K8NF9 Ultra
  • RAM : 1.5 Gb
  • VGA Card : Sapphire Radeon X1300 LE 512 MB
  • Hard Disk : Maxtor 6L300R0 300 GB
  • DVD ROM : LG
  • Operating System : Windows XP Media Center Edition SP2
Dan laptop merk HP dengan spec :
  • Processor : Intel Centrino 1.8 MHz
  • HDD : 60 GB
  • RAM : 512 Mb
  • VGA : 64 Mb Shared
  • Operating System : Windows XP Home SP2

Ini hanya bisa berjalan kalo kompie kita menggunakan Windows XP SP2 ONLY

Persiapan

  1. Back Up semua data yang ada terlebih dahulu ( buat jaga-jaga )
  2. Install Everest versi apa aja, untuk mengecek kalo kompie telah SSE, SSE2, SSE3
  3. Acronis Disk Director Suite 10.
  4. Siapkan DVD MAC OSX 86 V 10.4.7

Installation

  1. Install Acronis OS Selector.
  2. Partisi HDD dengan menggunakan Acronis Disk Director Suite 10, buat partisi sebagai berikut (tergantung HDD )
  • Buat instalasi Mac 20 GB menjadi FAT 32 (LBA) dan active ( warna kuning )
  • Satu partisi lagi di format menjadi FAT 32 juga ( warna biru )

2. Restart.

3. Buka Acronis OS Selector dan masukkan DVD instalasi > klik > boot from DVD

4. Setelah restart akan muncul Interface Insatallation

5. Pilih > Disk Utility > Pilih partisi Mac yang telah dibuat sebelumnya > Erase > Mac OS extended ( Journaled ) > Erase

6. Continue > Agree > klik Destination > continue > Costumize ( kalo mau full instalation ) Klik Install

7. Enjoy

Dan setiap kali log in akan muncul Acronis OS Selector lalu silahkan pilih mau jalanin Windows XP atau MAC OSX

Di PC ditemukan beberapa masalah yang sebenarnya tidak terlalu mengganggu seperti :

  • Tidak bisa restart, jadi kalo mau balik ke windows harus pencet tombol restart.
  • USB Modem tidak dikenali, jadi kalo mau internetan harus cable LAN ( ethernet )
  • Pake keyboard biasa tidak ada tombol command nya :))

Dan di laptop masalahnya hanya di Wireless, jadi kalo mau internetan harus pake cable LAN.

Jika ingin dapat informasi lebih jelas klik disini. Gunakan Bit Comet untuk mendownload .

Semoga bermanfaat......

Tuesday, January 16, 2007

Torrent

Torrent? Saya yakin sebagian dari kita sudah mengenal torrent apa itu torrent bukan? Torrent adalah sebuah teknologi Peer to peer atau file sharing yang diciptakan oleh Bram Cohen Walaupun belakangan ini di US Bit torrent sudah di tuntut oleh MPAA ( Motion Picture Association of America ) dengan alasan hak cipta, karena banyaknya beredar film- film anggotanya yang beredar tanpa hak cipta. Tapi yang namanya Internet siapa yang bisa ngatur, iya nggak? Cara kerja Torrent : Sebelum sebuah dokumen didistribusikan, program BitTorrent akan menganalisa dokumen tersebut dan seakan-akan membaginya menjadi pecahan-pecahan kecil. Semua informasi tentang ukaran asli dari dokumen dan berapa banyak pecahan yang terbentuk akan disimpan di dalam sebuah file jenis .torrent yang kecil dan mudah di-download lewat internet. Bagi pengguna komputer lainnya yang ingin mendapatkan file yang sama, mereka bisa menjalankan file .torrent tersebut dan secara cepat atau lambat dokumen yang sebenarnya bisa diperoleh tergantung jenis sambungan internet yang digunakan. Karena BitTorrent sudah membagi dokumen tersebut menjadi pecahan yang kecil, bagi pengguna komputer yang belum mendapatkan dokumen secara lengkap tetap bisa membantu mendistribusikannya. Dengan cara ini, pemilik dokumen yang asli tidak harus mengirim seluruh isi dokumen tersebut kepada semua pengguna yang menginginkannya. Cara ini sangat bermanfaat bagi organisasi ataupun perkumpulan yang sering membagi dokumen yang berukuran besar. Koneksi ? Kalau memungkinkan gunakan internet ADSL yang selalu on 24 jam ( di Indonesia ) berapa ya ? Karena biasanya untuk mendownload film atau software berukuran 700 Mb membutuhkan waktu kurang lebih 1 hari (sebenarnya tergantung seeder juga sih ). Makin banyak seeder makin cepat selesai downloadnya. Torrent Client : adalah software untuk mendownload file. Berikut ini beberapa torrent client yang sering di gunakan :

  1. Bit Comet My Favourite

Di bawah ini beberapa torrent site yang sering saya jadikan rujukan :

  1. Torrent Harvester Install dan masukkan kata kunci

Ada beberapa site yang mengharuskan kita untuk Register ( Gratis dan Bayar ) seperti Demonoid, Totrrent Tatty dsb. Dan masih banyak torrent site lainnya.

Tips

  1. Sebelum download, check jumlah Seeder dan Leecher.
  2. Baca comment yang ada.
  3. Hati- hati terhadap file yang di RAR atau ZIP kemungkinan minta password atau ada virus
  4. Batasi upload dari torrent client agar download bisa cepat
  5. Ini yang paling penting........apabila download sudah selesai jangan lupa UPLOAD at least 24 jam ( TAKE & GIVE )

Thursday, January 11, 2007

Alasan Amerika Nggak Nyerang Indonesia

Sebenarnya ini adalah rahasia Pentagon yg bocor rencananya abis Irak, Indonesia mau jadi sasaran berikutnya. Tapi Pentagon membayangkan jika AS terpaksa harus menyerang Indonesia, berapa kerugian yang harus di pikul pihak AS dan berapa keuntungan pihak Indonesia dari kehadiran tentara AS di sana. Begitu memasuki perairan daratan Indonesia, mereka akan di hadang pihak bea cukai karena membawa masuk senjata api dan senjata tajam serta peralatan perang tanpa surat izin dari pemerintah RI. Ini berarti mereka harus menyediakan "Uang Damai", coba hitung berapa besarnya jika bawaanya sedemikian banyak. Kemudian mereka mendirikan Base camp militer , bisa di tebak di sekitar base camp pasti akan di kelilingi tukang Bakso, Tukang Es kelapa, lapak VCD bajakan, sampai obral Rp.10000 3 Pcs. Belum lagi para pengusaha komedi puter bakal ikut mangkal di sekitar base camp juga. Kemudian kendaraan-kendaraan tempur serta tank -tank lapis baja yang di parkir dekat base camp akan di kenakan retribusi parkir oleh petugas dari dinas perpakiran daerah. Jika dua jam pertama perkendaraan dikenakan Rp. 10.000,- (maklum tarif orang bule),berapa yang harus di bayar AS kalau kendaraan & tank harus parkir selama sebulan. Sepanjang jalan ke lokasi base camp pasukan AS harus menghadapi para Pak Ogah yang berlagak memperbaiki jalan sambil memungut biaya bagi kendaraan yang melewati jalan tersebut. Dan jika kendaran tempur dan tank harus membelok atau melewati pertigaan mereka harus menyiapkan recehan untuk para Pak Ogah. Suatu kerepotan besar bagi rombongan pasukan jika harus berkonvoi, karena konvoi yang berjalan lambat pasti akan di hampiri para pengamen,pengemis dan anak-anak jalanan, ini berarti harus mengeluarkan recehan lagi. Belum lagi jika di jalan bertemu polisi yang sedang bokek, udah pasti kena semprit kerena konvoi tanpa izin. Bayangkan berapa uang damai yang harus dikeluarkan. Di base camp militer, tentara AS sudah pasti nggak bisa tidur, karena nyamuknya busettt, gede-gede kayak vampire. Malam hari di hutan yang sepi mereka akan di kunjungi para wanita yang tertawa dan menangis. Harusnya mereka senang karena bisa berkencan dengan wanita ini tapi kesenangan tersebut akan sirna begitu melihat para wanita ini punya bolong besar di punggungnya. Pagi harinya mereka tidak bisa mandi karena di sungai banyak di lalui "Rudal Kuning" yang di tembakkan penduduk setempat dari "Flying helicopter" alias wc terapung di atas sungai. Pasukan AS juga tidak bisa jauh-jauh dari pelaratan perangnya, karena di sekitar base camp sudah mengintai pedagang besi loakan yang siap mempereteli peralatan perang canggih yang mereka bawa. Meleng sedikit saja tank canggih mereka bakal siap dikiloin. Belum lagi para curanmor yang siap beraksi dengan kunci T-nya siap merebut jip-jip perang mereka yang kalau didempul dan cat ulang bisa di jual mahal ke anak-anak orang kaya yang pengen gaya-gayaan. Dan yang lebih menyedihkan lagi badan pasukan AS akan jamuran karenatidak bisa berganti pakaian. Kalau berani nekat menjemur pakaiannya dan meleng sedikit saja, besok pakaian mereka sudah mejeng di pasar Jatinegara di lapak-lapak pakaian bekas. Peralatan telekomunikasi mereka juga harus di jaga ketat, karena para bandit kapak merah sudah mengincar peralatan canggih itu. Dan mereka juga harus membayar sewa tanah yang di gunakan untuk base camp kepada para pemilik tanah. Di samping itu mereka juga harus minta izin kepada RT/ RW dan kelurahan setempat, berapa meja yang harus di lalui dan berapa banyak dana yang harus di siapkan untuk meng-Amplopi pejabat-pejabat ini. Para komandan pasukan AS ini juga akan kena tugas tambahan mengawasi para prajuritnya yang banyak menyelinap keluar base camp buat nonton dangdut di RW 06, katanya ada Inul di sana. Membayangkan ini semua akhinya Bush dan Rumsfield memutuskan untuk mundur.

Tuesday, January 9, 2007

Desktop Enhancement
Are you boring with your standard Windows interface?
Then you shoul try this
1. Flyakite OS ( FREE ) feel the Mac in your Windows
2. Talisman Desktop ( FREE to try 30 days ) Nice Graphics
3. Alien Ware Desktop ( FREE ) Alien ware is The Best PC and Laptop for gamers ( I wish I could have...)
4. XP Style Create your own desktop ( Free to try )
5. Stardock Full of features
ENJOY

Monday, January 8, 2007

10 things we should know about troubleshooting a slow PC
User complaints are minimal when new PCs are rolled out. They start up quickly, and programs seem to open in a snap. But over time, the user begins to notice that the system is slow or that it hangs up often. While the possible causes for system slowdown are endless, It had identified by experts 10 common troubleshooting areas we should examine first before suggested that it's time for an upgrade.
1. Spyware and viruses ( Hiiiiiiiii....) – Spyware and viruses pose a significant security threat, and they can also dramatically decrease computer performance. The first step when combating spyware should always be to scan the machine with updated spyware detection/removal and antivirus software. Use these applications to remove any detected infections. If the software scanners don't work, here are a few other steps to try. • Identify and end suspicious processes with Windows Task Manager. • Identify and disable suspicious services and startup items with the System Configuration Utility. • Identify and delete suspicious files. Note: If the above techniques fail, start Windows in Safe Mode and retry. • Identify/React Chart: Sober.P • Identify/React Chart: Mugly • Identify/React Chart: Maslan • Identify/React Chart: Zafi • Identify/React Chart: Sober.I/Sober.J • Identify/React Chart: Bagle.AZ (Beagle.AR Symantec) To remove spyware: • Identify and disable suspicious services with the Management Console. • Search and delete registry entries associated with suspicious services or startup items. • Install and use multiple spyware detection and removal utilities. Virus removal techniques depend heavily on the specific virus variant. You must therefore tailor your removal efforts to each virus. Here is a list of TechRepublic resources for removing common viruses and worms: • Identify/React Chart: Cabir • Identify/React Chart: Atak • Identify/React Chart: Anzae/Inzae • Identify/React Chart: Netsky • Identify/React Chart: Bofra • Identify/React Chart: Korgo.A (aka Bloodhound or Padobot) and variants • Identify/React Chart: Lovegate • Identify/React Chart: MyDoom • Identify/React chart: Bagle virus
2. Processor overheating – Modern processors generate a lot of heat. That’s why all processors require some sort of cooling element, typically a fan of some type. Machines used for gaming or other processor-intensive activities often use more sophisticated water cooling or refrigerant systems. When the processor temperature goes over spec, the system can slow down or run erratically. Modern motherboards can monitor the processor temperature and report it through the system BIOS. The processor fan may fail for several reasons: • Dust is preventing the fan from spinning smoothly. • The fan motor has failed. • The fan bearings are loose and “jiggling.” Often you can tell if there is a fan problem by listening and/or touching the computer. A fan that has loose bearings starts jiggling and vibrates the case, making a characteristic noise. You may barely notice the noise at first, and it’s common for even the experienced computer pro to overlook this change. But as time goes by, the sounds and vibrations will become so prominent that you’ll change the fan out just to stop the racket! You don’t always need to replace the fan. If it is covered with dust, you can often spray away the dust with compressed air. Note that even though you might get the fan running again, its life span has likely been reduced because of the overwork. You should keep an extra fan in reserve in case of failure. There are a number of software utilities that will track the temperature of your processor and case. If you want to try some of these utilities, check out CNET's Download.com and use the search term "temperature." 3.Bad RAM – Several situations can lead to a bad RAM relationship with a particular machine: • RAM has minor flaws that only appear on detailed testing. • RAM is overheating. In the “old days” of Fast Page RAM, buying new RAM for your computer was a pretty simple affair. You just needed to know what speed your motherboard supported and the maximum each slot would take. Today, there are many different speeds and types of RAM, and the better motherboards may be tolerant of using RAM that does not match the motherboard’s maximum specs. For example, your motherboard may support ECC RAM but will still work with non-ECC RAM, or may support both PC2700 and PC3200 DIMMs. But be aware that you may need to change BIOS settings and you may see performance decreases if you install RAM that is slower than the maximum spec. Minor flaws in RAM chips can lead to system slowdowns and instability. The least expensive chips often have minor flaws that will cause your system to slow down or Blue Screen intermittently. Although built-in mechanisms may allow the system to keep working, there is a performance hit when it has to deal with flawed RAM chips. • RAM timing is slower than optimal machine spec. In the past, no one worried about RAM chips getting hot, because they didn’t seem to generate much heat. But that’s changed with newer RAM types, especially SDRAM. To check for overheating, open your computer’s case, power down, and pull the plug out. Ground yourself and touch the plastic on one of your RAM chips. Ouch! They get pretty hot. If you find that your RAM chips are overheating, you should consider buying a separate fan to cool your memory. If your motherboard doesn’t support a RAM fan, you might be able to get enough additional cooling by installing a fan card that plugs into a PCI slot. You can also buy copper “heatspreaders” or RAM heatsinks that improve heat dissipation and help prevent problems caused by overheated RAM. Tip: Some motherboards will even allow you to mix speeds but will default to the slowest RAM installed.
4.Failing hard disk – There may be many signs of imminent failure before a hard disk finally gives up, depending on the type of failure (mechanical, electronic, logical or firmware failure). Some of these signs include: • Slow access times on the affected drive. • An increasing number of bad sectors when running scandisk and chkdsk. • Unexplained Blue Screens. • Intermittent boot failures. Detecting a failing hard disk can be tricky because the early signs are subtle. Experienced computer professionals can often hear a change in the normal disk spin (often manifested as a clicking or crunching noise or a high pitched whine). After the disk deteriorates further, you’ll see the system crawl to a standstill. Write processes will take a long time as the system tries to find good blocks to write to. (This will occur if you’re using a robust file system such as NTFS; other file systems will likely Blue Screen the computer.) You may get error messages such as “Windows delayed write failure” on Windows computers. When you notice the system slow down, run scandisk or chkdsk, depending on your operating system. If you notice a bad sector where a good sector existed earlier, that’s a clue that the disk is going bad. Back up the data on the disk and prepare for it to fail soon. Make sure you have a spare disk ready so you can replace it when it fails, or replace the disk as soon as you notice the early signs of failure. Disk noise and scandisk/chkdsk are your best indicators for identifying a failing drive that’s leading to a system slowdown. However, if you are managing a system remotely, or you can’t take the system down for a full chkdsk/R, you can use tools that monitor disk health, such as I use Everest Corporate Edition
5. BIOS settings – One often-ignored culprit of system slowdown is the machine’s BIOS settings. Most people accept the BIOS settings as they were configured in the factory and leave them as is. However, slowdowns may occur if the BIOS settings do not match the optimal machine configuration. Often you can improve machine performance by researching your motherboard’s optimal BIOS settings—which may not be the same as the factory defaults. There is no centralized database of optimal BIOS settings, but a simple Web search on your motherboard name and BIOS as keywords should yield the correct settings. You may also be able to increase performance by updating or “flashing” your BIOS. Check with your motherboard’s vendor for the software and instructions to do this.
6.Disk type/controller compatibility – You’ve just purchased a new UDMA-100 disk drive, and it doesn’t seem any faster than any of the other drives in your machine. You do some benchmark testing, and the new disk tests the same as the other drives in your system. So what’s the problem? It could be that your motherboard doesn’t support the UDMA 100 specification. Check your manual to determine what type of IDE interface it supports. If the motherboard only supports UDMA 33 or 66, then your UDMA 100 throttles down for backwards compatibility. You can get around this problem by installing a PCI UDMA 100 add-on card and plugging the new drive in to that interface. Another potential problem may be the cable type you are using. UDMA 66+ drives require a different cable than older drive types. The drive may not work at all with the old cable type. Aged cables will break down over time, especially if they are tightly folded and the temperature of the case remains consistently high. It’s always worthwhile to change out the drive cable to see if performance improves. Also keep in mind that over the course of a year to 18 months, hard disk technology improves so that performance of newer disks is substantially greater (and so are disk capacities). Replacing older disks, even if they are not at risk of failure, can give you a big performance boost. New Serial ATA (SATA) disks are faster than old Parallel ATA types.
7.Windows services – Many Windows services are enabled by default. Many of these services, however, are not required for your machine to run properly. You should review the services running on your Windows 2000/Windows XP computer and disable those that you don’t need. One way to see what services are running is to use the Services applet found in the Administrative Tools menu. Right-click My Computer and select Manage. Important information contained in the Services console includes the service Name, Status, and Startup Type. You can get more details on a service by double-clicking on it to bring up the service's Properties. You can stop the service by clicking the Stop button. If you are sure that you don’t need the service, click the down arrow in the Startup Type drop-down list box and set the service to Disabled. If you are not sure if you need the service, change the Startup Type to Manual. Then you’ll have the option of manually starting the service if you find that you need it. Another way of controlling which services start is using the msconfig utility. Open the Run dialog box and type msconfig in the Open text box. The Essential column shows services Microsoft considers essential to running the computer. However, note that many required services are not defined as essential in the System Configuration Utility window. You can prevent a service from starting at bootup by unchecking the check box to the left of the service. One service that is well known for slowing down Windows 2000/Windows XP systems is the Indexing Service. This service indexes the content of each hard disk and makes it easier for the Search utility to find files. Unless you are running a Web site that uses the indexing service, you may want to disable it to improve performance.
8. Runaway processes – Runaway processes take up all of the processors' cycles. The usual suspects are badly written device drivers, and legacy software installed on a newer operating system. You can identify a runaway process by looking at the process list in the Windows Task Manager. Any process that takes almost 100 percent of the processing time is likely a runaway process. There are exceptions to this rule. On a smoothly running system, the System Idle Process should be consuming the majority of the processor cycles most of the time. If any other process were to take up 98 percent of the processor cycles, you might have a runaway process. If you do find a runaway process, you can right-click the process and click the End Process command. You may need to stop some processes, such as runaway system services, from the Services console. If you can’t stop the service using the console, you may need to reboot the system. Sometimes a hard reboot is required.
9. Disk fragmentation – As files are added, deleted, and changed on a disk, the contents of the file can become spread across sectors located in disparate regions of the disk. This is file fragmentation. Some older operating systems, such as Windows NT, don’t have a built-in defrag utility; you must obtain a third-party solution, such as Executive Software’s Diskeeper. Disk fragmentation can significantly slow down your machine. The disk heads must move back and forth while seeking all the fragments of a file. A common cause of disk fragmentation is a disk that is too full. You should keep 20 percent to 25 percent of your hard disk space free to minimize file fragmentation and to improve the defragmenter’s ability to defrag the disk. Thus, if a disk is too full, move some files off the drive and restart the defragmenter. In Windows XP, you can use the defrag.exe command line tool to schedule defragmentation on a regular basis.
10. Background applications – Have you ever visited an end-user’s desktop and noticed a dozen icons in the system tray? Each icon represents a process running in either the foreground or background. Most of them are running in the background, so the users may not be aware that they are running 20+ applications at the same time. This is due to applications starting up automatically in the background. Look first for such programs in the Startup folder in the Start menu. Many applications place components in the Startup folder to run in the background. Some of these, such as the Microsoft Office Findfast, can really chew up processor and disk time and noticeably slow down a system. Review each of the entries in the Startup folder and delete any that are unnecessary. Not all programs that run at startup appear in the Startup folder. Another place to look is the following registry keys: HKEY_ LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run and HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\RunOnce In Windows XP, run msconfig and check the Startup tab to view startup programs. You can uncheck the boxes to keep individual programs from running at startup.
Data compiled from

File Sharing
Here we go again............
Do you like to download songs,movies or games?
Here is my favourite tools
A very useful and powerful and unlimited files to download, but......at least you must have 24 hours internet connection to finish big file download, like DVD movies ( 4Gb ), Software or Games etc.
A common used by most of us to download songs or clips ( not my favourite actually )
Save and watch You Tube from your computer ( Cool )
But after all.......
Bear in mind mostly what you donwload is copyrighted...
( you know what I mean )

How To Hack Your Registry

Hi Guys......... Here some tutorials how to make your computer safer and faster Let's start for Registry . What is Registry? In computing, the Windows registry is a database which stores settings and options for the operating system for Microsoft Windows 32-bit versions, 64-bit versions and Windows Mobile. It contains information and settings for all the hardware, operating system software (and most of non-operating system software too), users, and preferences of the PC and so on. Whenever a user makes changes to "Control Panel" settings, or file associations, system policies, or installed software, the changes are reflected and stored in the registry. The Windows Registry was introduced to tidy up the profusion of per-program INI files that had previously been used to store configuration settings for Windows programs. These files tended to be scattered all over the system, which made them difficult to keep track of. For more details Just click this link http://en.wikipedia.org/wiki/Windows_registry One of Microsoft’s goals in creating Windows XP was to make a more secure operating system ( I hope so,compare to Linux or Mac) Unfortunately, because security and functionality are often at odds, XP out of the box is not as secure as it can be. You can make your Windows XP computer more secure by tweaking a few registry settings—but as always, take care when editing the registry. An incorrect modification could render your system unusable. We recommend that you back up the registry before trying these edits.

1.Disable hidden administrative shares

Even if you haven’t shared any of your files or folders, an administrator (or anyone who knows a valid username and password for an account you’ve given administrative privileges) can remotely access your data by using the hidden administrative shares that XP creates by default. There is an administrative share for every drive on your system, but it doesn’t show up in the network browse list (My Network Places) because it has been marked as hidden by appending a dollar sign ($) to the end of the drive letter. You can delete these shares, but XP will just grow them back the next time you reboot. To prevent this, disable administrative shares by performing the following registry edit: 1. In your registry editor, navigate to HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\lanmanager\parameters. 2. In an empty portion of the right details pane, right-click and select New DWORD Value. 3. Rename the new value AutoShareWks. 4. Double-click the new value and enter 0 in the Value Data field

2. Don’t show the last logon name

If you’ve elected to use the standard logon dialog box instead of the Welcome joined to a domain, XP tries to be helpful by displaying the account name computer; you only have to type in the password. However, this is a security of the information needed to log on. Why make it easier? Of course, you administrator account and disabled the guest account so a hacker won’t next step is to disable the display of the last logged-on user. Here’s how: 1. In your registry editor, navigate to: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\ 2. In an empty portion of the right details pane, right-click and select 3. Rename the new value dontdisplaylastusername. 4. Double-click the new value and enter 1 in the Value Data field.

3. Control what applications a user can run If you’re sharing an XP computer with someone else and you’re the administrator, you can restrict the other user(s) to running only applications you specify. This can be particularly useful when sharing the computer with a young family member or if your computer must be used by guests. Here’s the procedure: 1. In your registry editor, logged on with the account you want to restrict, navigate to: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer. 2. In an empty portion of the right details pane, right-click and select New DWORD Value. 3. Rename the new value to RestrictRun. 4. Double-click the new value and enter 1 in the Value Data field. (You can modify this to allow all applications to run by changing the value to 0). 5. Create a new subkey named RestrictRun. 6. Create a new string value for each application you want to allow. Name each string value as a consecutive number. 7. Set the Value Data for each string value as the name of an application you want to allow (this should be the executable program name, such as explore.exe for Windows Explorer). 8. Reboot the computer to apply the change. Warning Don’t apply this policy to yourself or you may not be able to run the programs you need to in order to administer the computer—and if you can’t run the registry editor, you won’t be able to change the policy.

4. Disable saved password for dialup networking

It’s handy for users not to have to enter their passwords each time they start a dialup networking session, but it can also be a security risk to have Windows save the password, since anyone else can start a session, too. To disable the saved password function for DUN, do the following: 1. In your registry editor, navigate to: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\RasMan\Parameters. 2. If the entry DisableSavePassword doesn’t already exist, right-click in an empty portion of the right details pane and select New DWORD Value. 3. Rename the new value to DisableSavePassword. 4. Double-click the new value (or if it already existed, just double-click it now) and enter 1 in the Value Data field to prevent Windows from saving the DUN password. If you want to enable saving of passwords later, you can do so by setting the value to 0.

Thanks to techrepublic.com

I hope this information useful...... Dubai 114 Production

Tuesday, January 2, 2007

Selamat Menempuh Hidup Baru

Selamat Menempuh Hidup Baru Wally dan Vilia
Acara berlangsung di Ritz Carlton Dubai pada tanggal 1 December 2006. Thanks ya Vilia atas kepercayaannya menjadikan gw Videographer
Semoga bahagia selalu,punya anak namanya Vini, Vidi, Vici