Google AdSense

You Want to Get Information Or Newest Articles About Computer, click here.

Ban Mobil Juga Butuh Perhatian!
Ban your car sustain a heavy burden, and not wonder if the component that holds a very important role in the operating system your vehicle. The condition of the car tires determine comfort while driving, especially concerning the acceleration and braking. Therefore, maintenance on a car tire that requires special attention.

Another legendary sports car that was released in 2008 again this year. First appeared in 1992, have an two-car sport has experienced at least three renovation since made. Still rely on the design that is not much different from the first generation, Dodge re-launch of the fourth generation Viper.

Tips Mengatasi Kaca Berembun
When diguyur rain, we will automatically close the car window we meetings. Well, if we do not car AC works well when the rain, the glass window berembun often, due to differences in air pressure. As a result, the distance of approach to the future will run uninterrupted, because the glass front berembun.

BMW Concept X1, Si 'Sporty SUV'
BMW bakalan busy with the launch of a series of new product models in the next few years, including some of the latest version of the product was ranked the top sales, and the model that is new. One of the newest model is the type of SUV that is named X1 and at this time BMW has announced the concept of the products in detail and that will be displayed at the Paris Motor Show on this sunday.

Chevrolet Camaro, Melanjutkan 'Tradisi Pony Car'
Chevrolet Camaro is one example of the type of car pony car. Pony car itself is the type of car-oriented sport that started appearing since launch of the Ford Mustang in 1964. Although the original Camaro already own 40 years of age, but seems not intend Chevrolet discontinue this product.

Suzuki GSX1300R Hayabusa, Kembalinya Sang Elang
Suzuki GSX1300R or better known as the Hayabusa was called the fastest motorcycles in the world. Hayabusa own investigation in Japanese means' eagle '. Suzuki now turn back this legendary motor with a little touch that makes it a more dynamic look.

Aston Martin One-77, Dilepas Dalam Jumlah Terbatas
New also officially be on display at the Paris Motor Show in October, the Aston Martin One-77 has been ordered by about 100 collector cars. Say, the new car will be released later this year 2009 will be a car with the most expensive price to the present.

Honda CBR1000RR Generasi Ketiga
Honda CBR1000RR or more may be known as the Fireblade is included in the family literbike motor or motor with a capacity of 1000 cc engine approaching. Fireblade first generation start to appear in 2004 and in 2008 this generation to adopt many of the CBR600RR with technology improvements here and there.

Nissan 370Z, Promosi Lewat Game
There has never been a car manufacturer to introduce new products through their video games such as the Nissan 370Z Nissan product on it. Yes, the car can already 'tested' through the game Need for Speed: Undercover car even before the original was launched.

Lihat Gambar
Yamaha V-Max 2009
Wednesday, 24 December 2008 09:13
KapanLagi.com - Yamaha V-Max begin appearing in 1985 and the first since the appearance of almost no change in the generation-next generation. Motor design of John Reed is known as a motorcycle but with the energy of the bushes in the curve. And in 2009 this generation is more focus on this problem cornering.

Although often referred to as motor 'rhinoceros' alias less lincah in motor winding, but the fact is this is a legend as well as the Japanese motorcycle sales to reach the highest number. This number can not even digeser by removing the products that Honda X-4 as a rival Yamaha motor output this.


Samsung SGH-P250 is a tri-band GSM slider. It features 262k color TFT display, Wi-Fi, UMA, Music player, FM Radio and 1.3 MP camera.


Motorola MOTOSURF A3100 is a Windows Mobile 6.1 Professional smartphone with 2.8" QVGA touch display. It features personalized interface, Opera Mobile browser, global 3G, Wi-Fi, aGPS and 3-megapixel camera.

Nokia 6260



Nokia 6260 slide is a quad-band GSM slider phone with HSDPA support. It features HVGA (340x480) color display, 5MP camera, GPS, Wi-Fi, stereo Bluetooth, microSDHC card slot and Organizer.

LG KC560



LG KC560 is a tri-band GSM slider. It features 262k color QVGA display, 3 MP camera, Music player, FM Radio, stereo Bluetooth and Organizer.



Introduction:

Unexpectedly, SMS messages have become the most popular mobile service. Who would have thought that people will write messages in a peculiar way on these small keyboards? Years later, phones are much more advanced and the variety is greater, but this service continues to hold the first place. So it should be
expected that developers will try to make it more user-friendly, shouldn’t it? Until recently, the availability of a full keyboard was something typical only for business phones, but manufacturers began to realize that the ordinary customers also like using SMS, e-mail and chat and QWERTY keyboards have made their way into every level of consumer devices.

Design:

Thanks to this, we have models like the Nokia E63. Based on the popular business smartphone E71, a full keyboard is now available to everyone. Its appearance is more casual, replacing the metal with a high-quality plastic. Hopefully, the build quality doesn’t suffer from this and is still very high-end. The colors are also more liberal and instead of the boring grey and black, here we find the fresher blue or red. The E63 has gotten a bit thicker and is now 13 mm, instead of the E71’s 10 mm. There is virtually no change in the other dimensions and as a whole the size is pretty decent for a QWERTY phone. Speaking of the keyboard, we have to mention that the keys are very handy, although a bit small. Unfortunately, once again, the bottom row of keys isn’t shifted to the right so you’ll have to get used to it in order to avoid mistakes. When it comes to buttons, we have to note the total lack of such on the sides – no volume rocker and no power
key.




If you are a fan of candybar designed cellphones and you like listening to FM radio, check out the two new devices from LG. The LG GB106 and GB110 are both considered entry-level models, but that doesn't mean that there are no features. The higher priced of the two, the GB106, has a 1.5 inch LCD screen, a VGA camera and a microSD card slot that will hold up to 2GB of additional memory. And it has a built in FM radio. The GB110 also has a 1.5 inch screen and a built in FM radio. While almost all of the cellphones currently on the market require the use of an earphone or headset to activate a FM tuner, both of these models have built in antennas and the radio will play through the phone's speakers. Both phones are expected to be out sometime this month although no specific date was announced. Pricing and carrier availability also has not been made public yet.

Re-install the operating system might often be done by many computer users. When the computer it is already "lemot" because of the many things that are not important, could be re-install it.

Installing the operating system does not take a moment. Yah, siapkanlah within 30 minutes - 1 hour. The length depends on the installation of hardware (read: processors, memory, and hard disk) that is used.

Actually reinstall the operating system does not always have to run so long. With the cloning of hard to do, we need not be through the installation process is long. ita just need to copy the results of cloning and any PC operating bersistem again. So that the results of cloning as an operating system that is still fresh, do cloning shortly after you finish to install the operating system and drivers. Other programs should not be installed.

The core of the hard disk cloning is copying the entire hard drive contents to other media - to be another hard disk, CD, DVD, or external hard drive. With cloning, you will get the contents of the CD-R exactly the content of the hard disk.

We need to do some parangkat cloning. First is the software for cloning. One is that you can use Symantec's Norton Ghost. We also need a CD-writer, CD start-up, 2 and 1 floppy disk, 44 MB.

Save to CD
Since we will be doing the cloning of the operating system, the drive that contains the operating system that will dikloning - typically drive C. But, I can only operating system on another drive, for example, because there is more than one operating system in the PC.

On this tutorial, pcplus will make the cloning of the C drive that contains the Windows operating system with the size of the partition of 400 MB.

Without ba bi bu again, let's start.
1. Norton Ghost run by clicking the [Start]> [Program]> [Norton Ghost] [Norton Ghost].
2. You will see the view Ghost Basic. Select the first option, namely [Backup].
3. Click [Next].
4. Source select options in select drive C. Destination options in select [Recordable CD or DVD]. After that, click [Next]> [OK].
5. Press the [Next], [Next] again, [Next] again. Then click [Continue], click [Run Now], and the last click [OK].
Windows will restart and Norton Ghost also perform back-up. Now you have the CD, which is 1 image of your C drive. The contents of the CD is only 1 file that berekstensi GHO. You can not see the contents of the file without the assistance Ghost Explorer. With the help of Ghost explorer, you can view files on the file in the GHO.

I Start-up Disk
We need a floppy start-up that results GHO image file can be used when we want "to re-install" the operating system. Start-up disk is a two 1.44 MB floppy diskette. Diskette first we call "floppy A", while the second diskette we call the "B floppy disks."

Run Norton Ghost and click [Ghost Utilities]> [Norton Ghost boot wizard] [CD / DVD disk with the startup ghost] [Next] [Use PC-DOS] [Next] [Next] [Next] [Next]> [OK]. Enter a blank floppy disks to make CD / DVD start-up. Press [Start] to make a disk format, then press [Close].

Floppy disks will be the next start-up disk. When the confirmation for the second diskette appear, remove the floppy disk and insert a B. Press [Start] to do the format and press [Close]. Wait until the process is finished, and press [Finish] to end.

Now you have a startup floppy disk 2. This disk will be used for booting the first time. Please note that the second disk is related to one another. A diskette can not run without the disk B, so is vice versa. B floppy disks can not be run without the floppy A.

"Install"
Why install it be in quotes? That's because we do not install the operating system. But, just copy the operating system that we had previously installed.

Step by step this is done when we want to re-invigorate the operating system. We are doing is the cloning of the CD to the hard disk.

In the BIOS, so Arrange boot from the floppy diskette is done. Insert a floppy in the floppy drive. Follow the instructions on the screen, if you are inserting floppy B, then enter the diskette B. You are prompted to insert a diskette, and press [Enter], and the last return you are requested to enter the disk B.
Now you have entered Norton Ghost.

To perform cloning from a CD to the hard disk, select [Local]> [Partition] [from image]. Navigate to the CD-ROM containing the GHO file, and press [Open]. In the "Select source partition from image file", click [OK]. Then in the "Select local destination drive by clicking on the drive number", click [OK]. Select the drive that will dikloning, select drive C, press [OK] and press [Yes].

Cloning will run until reaching 100 percent. Press [Reset computer] to restart. Remove the disk from the floppy drive and the BIOS Arrange to take your first booting from the hard disk.

Among the antivirus software and the like, made Kaspersky Lab may be the most powerful so far. At least that's the test results conducted by AV-Test.org and AV-Comparatives.org.

Kaspersky Anti-Virus 2009 and Kaspersky Internet Security 2009 to receive the highest value in some of the tests conducted by two laboratories is. Software-the software is more than 30 products, both for personal and corporate producers of various anti-virus, which is tested in a series of tests in August and September 2008.

Tests using as many as 1.1 million malware that spreads on the Internet in the last three months. More than 95 thousand unwanted programs that contain spyware and adware are also used for testing. Computers that are used to test bersistem Windows XP SP3.

In general, Kaspersky Internet Security 2009 to reach the best results obtained with the highest value in the category "On-demand malware detection", "On-demand spyware and adware detection," and "Response times to new threats."

According to AV-Test.org, Kaspersky Internet Security 2009 successfully obtained 98.4 percent of value to detect malware. To detect spyware and adware, the value is 98.3 percent. With results like that, the successful solution Kaspersky products from TrendMicro, McAfee, Eset, Dr. Web, Panda, and many other vendor.

On Agusut 2008, AV-Comparatives.org, antivirus laboratory renowned Austrian origin, the same test to test the effectiveness of various antivirus solutions in detecting malware. Tests involving the 16 anti-date data base with the 4 August 2008. Malware that is used to test this is a malware circulating before that date.

Test results showed that the Kaspersky Anti-Virus 2009 to obtain the highest value. Kaspersky detected 97.6 percent of all malware. Detection of worms, viruses, macro, script and dangerous to reach 97.9 percent. With these results, Kaspersky Anti-Virus 2009 was the highest certification-Advanced +. Kaspersky Anti-Virus 2009 also awarded "fast" from the experts AV-Comparatives.org.

For information, less than half of antivirus solutions that have been tested to obtain a certificate Advanced +. Microsoft, McAfee, F-Secure, Sophos, BitDefender, and Eset only obtain a certificate Advanced and Standard.


Microsoft Word has a comment feature that can be accessed through the [Insert] [Comment]. With these features you can provide a note on the words, sentences, or paragraphs in the document you. Comments are the form of writing.

Did you know that actually you can also include a voice comment? Comments can be your own voice or sound from another source.

Before using this facility, you must set the recording source. How to manage them well.
1. Volume Control run through [Start]> [All Programs] [Accessories] [Entertainment] [Volume Control].
2. Click [Options]> [Properties].
3. Select [Recording] in the "Adjust volume for", then click [OK].
4. Check the [Select] under [Mic Volume] if you want to use the microphone. If the source of the sound coming from other places, check the box [Select] under [Stereo Mix].
5. Slide the button volume slider in accordance with the volume of the recording you want.
6. Close the window Record Control.

Now it's time to add your comment on the document. To do so.
7. Run Microsoft Word.
8. After the program opens, click [File]> [Open ...] and open a file that will give you a voice comment.
9. Right-click the mouse on the toolbar, then click the [Reviewing].
10. A toolbar "Reviewing" appears. Click the down arrow in the right position the toolbar. Then click the [Add or Remove Buttons] [Reviewing] [Insert Voice].
11. In the document that is open, place the cursor where you want to comment.
12. Click the icon [Insert Voice] on the toolbar.
13. A speaker icon and a picture window with a new recording titled "Sound Object in namafile.doc" will appear. Press the [Record] image of a red circle to start recording.
14. Speak to the microphone immediately after the key [Record] is pressed. To stop recording, click the [Stop]. Please note, the maximum recording time is 60 seconds or 1 minute.
15. Once you finish recording, close the window in namafile.doc Sound Object.

Windows Vista is equipped with antispyware, Windows Defender name. This application will automatically make a quick scan of the contents of the computer each morning. The goal is to ensure you can work safely on that day.

When detected a spyware, Windows Defender will be a window display a notice that stated that there were spyware on your system. Next, you can clean up spyware with one click [Remove].

However, not only can completely clean the spyware checks because the Windows Defender is a quick review of the examination not followed the entire hard disk. Therefore, when Windows Defender never display a warning of spyware, do a full examination of your system.

How:
1. Click the Start button, type Windows Defender in the search box and press [Enter].
2. Once Windows Defender is open, click the down arrow on the Scan button and select Full Scan.
3. Wait some time until the scan is complete.
4. Once completed, the results will be displayed. If your PC with spyware, the list will be displayed by Windows Defender. Review Items Click to find out what happened and how the solution.
5. In the Scan Results screen, all harmful software detected Windows Defender will be displayed. Click [Remove All], to clean up all the "garbage" spyware.

Tambahkan kemampuan khusus pada Windows XP Anda. Masukkan fungsi-fungsi penting Linux untuk menjadikan Windows XP Home Edition sekuat Windows XP Professional


Memegang kartu truf saat bermain kartu memang sangat menyenangkan, apalagi jika kartu truf-nya semua As. CHIP memiliki kartu-kartu truf ini dan akan membukanya di hadapan Anda. Akan kami tunjukkan bagaimana memainkan kartu truf ini untuk mengelola beberapa tampilan desktop dalam Windows XP, menjadi administrator melalui script, atau memanfaatkan pengelolaan hak akses seperti pada Windows XP Profesional. CHIP jamin, permainan kartu truf ini akan menggoyahkan pendapat para pengguna Linux yang fanatik sekalipun—mereka selalu menganggap bahwa Windows tidak dapat menandingi Linux.

Dalam boks di halaman berikutnya, CHIP juga mengungkap berbagai mitos dan fakta yang masih beredar seputar Windows XP. Dalam boks lainnya di akhir tulisan, CHIP menyisipkan beberapa trik ringan yang tergolong just for fun—tergantung sudut pandang Anda, bisa berguna bisa juga tidak sama sekail.

Tool: Deskman.exe
Many Windows users who feel envious view KDE Linux desktop where some can be managed at once. With the help of one of the tools of the PowerToys for XP, Virtual Desktop Manager (VDM), you can also manage up to four in the Windows desktop. Good again, for it is almost required of system resource.


Enter 'Deskman.exe' in the field in search www.microsoft.com and you will be up to the PowerToys page. In the blue in the bottom right, click on the link 'Deskman.exe' under the 'Virtual Desktop Manager' to download the tool. After the installation is finished, display the context menu by clicking on the taskbar right. Select the 'Toolbars | Desktop Manager'.

In your taskbar icon will appear to a four-and-image box next to it and there are four numbered buttons indicate the number-four desktop. To save the desktop to the VDM, click one of benomor icon and then click the icon. From now on you can view these by clicking on the desktop icon or by pressing the earlier key combination Ctrl + Tax. Do the same procedures for other third desktop.
Tip: To change the desktop background image, right-click the icon VDM and select 'Configure Desktop Images'. Replace with the usual result is that even confusing.

There are no viruses on the PC can be detected with the virus portable applications in the flash disk (UFD). Useful to secure the UFD from the virus and eradicate the virus.

Computers can be infected with the virus via a USB flash disk (UFD). But, from where the virus originated in the UFD. From the computer that is infected, of course. For example computers in the cafes. So, also prevent entry of virus into the UFD. To do is to scan the computer to which you want to dicoloki UFD.

We can run a portable anti-anti-virus stored in the UFD, need not be installed on the computer to be able to run. With antivirus, the computer will be scanned. Hmm ... indeed, does not need a little time, if apalgi computer files that have very many. But, as is the fact that in the IT world upside-proportionate comfort with security.

That we need is a portable anti-virus, such as AntivirX, ClamWin can be downloaded from the www.clamwin.com. We also need to create a file that way automatically when the UFD dicolok. The file will run antivirus on the UFD. This is similar to the way files are often automatically be on the installation CD program.

Open Notepad and type the command-line below.

1. [autorun]
2. Open = antivirus.exe
3. Action = Open Portable Anti Virus!
4. Icon = icon.ico
5. Label = Your_Name

If you are, save with the name autorun.inf. So that it does not TXT file, change the Save as Type to be [All Files].

Here is a brief explanation of the commands in the file autorun.inf earlier.

The command "Open" is a command to open the antivirus. Open followed by the command file is running antivirus. So, replace "antivirus.exe" in order that the file name that is used antivirus. For example, the file name antivirusnya "antivirx.exe" the command to "Open = clamwin.exe". Then, if the file is in another folder, for example AntivirX 1.0 folder, the command is changed to "Open AntivirX = 1.0-clamwin.exe".

The command "Action" is useful to show the expressions on the dialog box when antivirus will run. The following command can be replaced with the words of others.

The command "Icon" work to change the standard UFD icons that appear in Windows Explorer. Enggak have specific functions that are associated with antivirus, the icon is only beautify the course. Of course there must be a file icon is also in the UFD. Name of the file in the example "icon.ico" be replaced in accordance with the icon of the file name is used.

Finally, the "Label" function ntuk give the name of the UFD. Just as the "Icon", this command also enggak related to the prevention of entry of the virus.

Autorun.inf file attributes that made it to "Read-Only" can be read-only, can not be changed. If it can not be changed, meaning that the virus will not be able to modify the file. To do so, right-click the file, then click [Properties]. In the Attributes section, check the [Read-Only].

The following is the use of UFD to detect the virus in the computer.

1. UFD enter but do not open the flash disk on the computer. UFD has not been opened, the virus in the computer will not go into flash disk, or vice versa.
2. Run the road automatically by clicking the button [OK] on the dialog box that appears. Portable anti-virus that will run on the UFD.
3. Virus scan on the computer, especially in the C:-Windows-System32.
4. If you have reported the existence of anti-virus, do not hesitate, it is true bervirus computer.
5. Then please clean the machine. If not, I just pull it dicolok the UFD.

Toshiba Driver Search All Series ..... Click the Download

Search All Series Driver Ecer ..... Click the Download

Newer Posts Home