blog this is me make to share my invention about internet exploration at every evening

Daftar

How to Protect Network



Because we do not use a router, to protect
network from outside intruders, we must inevitably
advantage in front of the eye. What steps
can you do? Follow the guidance.

• Disabling fi le sharing: one road that is used
by network intruders is through a fi le sharing facilities.
When the intruder had managed to enter, he could with
cation easily modify the contents of your computer. Thus
fi le's how to disable sharing. In the Local Area
Connection Properties on the General tab, delete
check File and Printer Sharing For Microsoft
Networks.
So what's the point made the network, if you can not do
fi le sharing. This is indeed a dilemma. But still there are options
you can do. First is the move
all the fi le that is shared to a computer that is not connected
directly to the Internet, then do fi le sharing of computer
them. The second is to move the modem to your computer
are not used to doing fi le sharing.

• Install fi rewall: as we said earlier, without a router,
rewall fi networks rely on software-based.
Therefore, you should install fi rewall in
host computer. A firewall is placed on the host computer
to protect the local network from intruders, and also
can restrict user rights on the local network. So every
messages that enter and exit through the fi rewall will be selected
in accordance with applicable security criteria. Firewall
can be implemented as software and hardware or
even a combination of both.
Lots of free rewall fi that you can download.
For example Sygate Personal Firewall, Ashampoo Firewall,
Outpost Firewall, and many others.

• Install the latest service pack: Service Pack is basically
a collection of various patches that patch the various gaps or
Windows bugs within a certain period of time. Therefore
that, if Microsoft had launched its latest service packs
for Windows, install it immediately.

• Turn off when not in use: but can save electricity,
turn off the wireless network card is not used
also can protect us from intruders. Because the network
ad-hoc, we can not hide the SSID. Wireless
network card will continue to emit the signal. When
This signal is captured by the intruder and he was interested in
to break, has been finished.

• Last is the method that issued the fees, aka
buy a router. If you want to feel safe in
in the network itself, it would not hurt you
buy a wireless router. The price is also something
affordable, ranging from 200 thousands to millions.

by:team Xpost
READ MORE - How to Protect Network

know svchost. exe and the function


recently a lot of virus that assault windows user. because almost servisan cpu team Xpost handle a large part because virus that cause windows soes error. and majority virus assault it at file system windows that named svchost. exe. here's criticism Xpost this know svchost. exe and the function.

initially, microsoft uses file. exe (executable) for service that walk at windows. because felted less efficient, microsoft then do renovation with change service a while ago from use files . EXE be file. DLL (dynamic link library).

dynamic link library (. dll) be file that can be called from file executable (. exe) also from file. etc other. this matter be felted more beneficial because character usually usable by several applications at the (time) of concurrent and only need one copy at memory or menyk. programmer can regulate so that service found on DLL be held to memory only when be need. when not be need so DLL be throwed away from memory.

thereby, so application whom you make can more save use memory. second profit, application is has modular. you can do application update whom you make without having to mengupdate file .EXE. thereby you enough enclose patches to your program without you must enclose entire applications. profit other size file .EXE be smaller because several program codes is put in file DLL.

if you see in taskmanager, you will watching many process by the name of svchost. exe


this matter is oftentimes is maked use by authors worm to do social engineer by give mother name worm by the name of same or resemble svchost. exe, on the chance of user will estimate that mother worm part from windows component. yes, oftentimes quandary user distinguishes svchost. exe property worm with svchost. exe property windows.

well. . from here you may be ask around. .
why sich kok there many process by the name of svchost. exe? ?

like this nich. . as within reason operating system, windows has a lot of service that must be called. such as those which at explain at beginning a while ago, each service of course must be run by a file executable. if entire service in such a way many that run by only a file executable, so sure risk will happen denominating failure service very tall.

to anticipate that thing, so service mengelompok-kelompokkan as according to the function. every file svchost. exe called to run group service different. for example svchost. exe first runs group service for audio, svchost. exe second run service firewalls, and other as it. because separations here's many found process by the name of svchost. exe

want tau service everything that walk at your windows and who run it? open windows command processor you. click [start] -> [Run] then type cmd


type command tasklist /svc then press enter. command will display process that is walking at your computer is alonging with service everything that called (if he run service certain). this command walks in windows xp and vista.

such a little explanation about svchost. exe, good useful.
successful greetings from we are team Xpost
READ MORE - know svchost. exe and the function

trik or manner avoid keylogger




in chance this team xpost want share about" trik avoid keylogger" , the purpose so that our activity is at computer not recorded by keylogger. not yet know keylogger? , keylogger software that functioned to register all user user movements or all that mengetikkan by the computer user, this software only walks moment" installed" at a computer.

furthermore about keylogger please read article"Open

well here Xpost has trik to avoid keylogger, like this its way:

1. open run in start windows/press shortcut windows+r
2. type in dialog run: " osk. exe" (without sign quote)s
3. so will appear tuh, on screen keyboard, osk that is in the place of keyboard, will live to click the font so be typed. osk this is in all windows, so caw takes care afraid if again play at warnet want masukkin important password, afraid there installed keylogger (usually at warnet naughty)
4. if caradiatas fail/run- -disable, step into folder c: windows/system32/osk. exe
5. guaranteed this manner is successful


successful greetings from we are team Xpost
READ MORE - trik or manner avoid keylogger

tips or manner so that pc or netbook you work well.




more progress it pekembangan period and technology that espoused the increasing of somebody office hours towards pc or computer and notebook, at will constitute that also a ware will experience work power depreciation because at will cause by age will wear and at this we shall give some ways so that pc or computer or notebook you can work well. next the review
there are some manner so that pc you can work well

1. ) to decrease a time boot system and increase system performance, use money whom you save without buy software defragmentasi - built-in windows defragmenter work well - and rather than computer equips with ultra-133 or serial ata hard drive with 8-mb cache buffer.

2. ) if pc has less than 512 mb louvre, add more many memories. this cheap relative and easy meng-upgrade that can dramatically increase system performance.

3. ) ascertain that windows xp use file system ntfs. if you not sure, here's manner to investigate: first, click double ikon my computer, click right at c: drive, then choose properties. furthermore, investigate file system type; if said fat32, so back-up important data whatevers. furthermore, click to begin, click to run, type cmd, then click ok. in prompt, type convert c: / fs: ntfs then press button enter. this process is may be needs a few moments; of vital importance that computer disturbed and free from virus. file system that used by bootable drive can fat32 or ntfs. i am very recommend to use ntfs by security superior, reliabilitas, and efficiency with menyk drive larger ones.

4. ) file deactivates pengindeksan. service pengindeksan mengekstraksi information from documents and another file in hard drive and creat a" keyword index is looked for. " such as those which can you conceive, this process can be very stress system.

the idea that user can look for word, phrase, or property a document, should they have hundreds or thousands document and doesn't know document file name whom they want. windows xp's built-in livelihood function still can do assorted livelihood kind without involve to index service. but rather longer. operating system must open every file at the (time) of be asked please look for what user look for.

majority person doesn't want fitur this livelihood. they are that do usually at environment companies big where thousands document is put in at least one server. but if you only a kind of system builder, majority the client little business and intermediate. and if clients doesn't want fitur this livelihood, i suggest to deactivate.

like this its way: first, click double ikon my computer. furthermore, click right at c: drive, then choose properties. sign erase ticks off" allow index service to index menyk this to look for file swiftly. " furthermore, apply change to" c: subfolder and file, " and click ok. if warning message or error appear (to like" access is denied" ), click button ignores all.

5. ) update pc chipset video and motherboard driver. also, update and configure bios. for furthermore information about manner configures bios you truly, see this article at my site.

6. ) empty the windows prefetch folder every three months or more. windows xp can" prefetch" data portions and application often used. this matter makes process load appear when called by user. that's fine. but along time, folder prefetch possible file reference load surplus and application not again used. at the time happen, windows xp will fritter time and delay system performance, with pra-beban they. bothing that important in this folder, and entire safes its contents to wiped off.

7. ) once a month, run menyk cleanup. like this its way: click twice ikon my computer. then click right in drive c: and choose properties. click button menyk cleanup - that just for on the right graph capacity pie - and wipe off all temporary files.

8. ) in device manager, click double in idea ata / roof controllers device, and ascertain dma activate to every drive you have been continued to controller base and intermediate. do this with click double in primary idea channel. then click tab continuation arrangement. ascertain fashion transfer menyet to" dma if available" for second device 0 and device 1. then repeat this process with secondary idea channel.

9. ) upgrade pengkabelan. as hard-drive increase technology, pengkabelan rules to achieve this performance increases to be tighter. ascertain to use 80-wire ultra-133 cable at all of your idea ware truly konektor that is given for adaptation master / slave / motherboard sockets. a ware must present at the end of cable; will connect one drive to konektor in the middle of signal ribbon cable will causes problem. with ultra dma hard drive, this signal problem will prevent trip from performance in the maximum potential. also, because basically this cable supports" cable chooses, " location each drive in important cable. for this reason, cable designeds so that position drive clear explicit.

10. ) erase all spyware from computer. use free program likes adaware by lavasoft or spybot search destroy. after this program is installed, ascertain to investigate and downloaded update before begin your livelihood. find a certain good program can be throwed away safely. every free software that wants spyware to run will not again functioned after spyware a part wiped off; if your customer is genuinely wants program although contain spyware, enough install it to return. for furthermore information hits spyware wipe off to visit pros web news page.

11. ) erase all programs unnecessary and / or item from windows startup routine use utilitas msconfig. like this its way: first, click to begin, click to run, type msconfig, and click ok. click tab startup, then sign erase ticks off every item doesn't want to begin when windows begins. not sure what item? visit wintasks process library. full known system process, application, with reference spyware and explanation. or swiftly identify them with look for file name uses google or web search engine other.

12. ) erase all programs unnecessary or is not used from add / remove programs part control panel.

13. ) kill every and all animations unnecessary, and deactivate desktop mobile. even, for optimal performance, kill all animations. windows xp offered many different arrangements at this region. next manner do it: first click in ikon system in control panel. furthermore, click in tab advanced. choose button settings located in under performance. don't worry to play with options on the market here, will like anything you can change will change reliability from computer - only responsive.

14. ) if your customer is pleasant advanced user edits registri they, try several registry tweak performance on the market at tweak xp.

15. ) visit site update windows microsoft regularly, and men-download all updates that tagg critical. download also optional update that wanted.

16. ) software customer update anti-virus weekly, even daily, just like. ascertain them has only one anti-virus software package is installed. mixing software anti-virus manner certain to spell disaster for performance and reliability.

17. ) ascertain has less than 500 kinds font install in their computer. more and more font they have, more slower system will be. temporary windows xp handle font far efficienter than windows previous version, too much font - that is, anything more than 500 - asa tax system.

18. ) don't partisi hard drive. windows xp with file system ntfs walk efficienter in one partisi big. data bot more safe in partisi apart, and formatting to repeat never need to install to repeat operating system. reason same one who offered to use partisi valid for to use folder inste. for example, than put all datas in drive d: , put in a folder nameds" d drive. " you will achieve organization same benefit that offered partisi apart, but without system performance degradation. also, your free space will not be limitted by size partisi, but be limitted by size from entire hard drive. this means you are unnecessary to change size partisi whatever, forever. task that can consume time and also can cause to lost it data.

19. ) investigate louvre system to ascertain to operate truly. i suggest to use free program that is called memtest86. will download will make bootable cd or diskette (you choice), will run test 10 ekstensif in memory pc automatically after you boot to menyk you will make. let all tests walks until at least three via from 10 tests finished. if program finds error, kill and pull computer, wipe off memory stick (with your assumption has more than one), and run test again. remember, bad memory, but only replaced.

20. ) if pc has cd or dvd recorder, investigate drive producers web site for update firmware. in a few case, you can meng-upgrade recorder for speed quicker. best from all, it's free.

21. ) deactivate service unnecessary. windows xp load many services your customer is big possibility. to determine service whom you can deactivate for your client, visit site black viper for windows configuration xp.

22. ) if you be fed up with one windows window explorer struck and then take remainder os you downwards with that thing, then follow tip this: open my computer, click tools, then folder options. now is clicking in tab view. gulir downwards to" folder window launches in course of apart, " and activate this option. you must reboot your engine for this choice operative.

good useful: )
successful greetings from we are team Xpost
READ MORE - tips or manner so that pc or netbook you work well.

trik accessing only with calculator



you are wearing public computer and want to accessing internet but at computer not installed browser? don't be panic, bothing;there is no root rattan even also so, still many roads aims rome. . . correct reading trik under this chekidot. . .

tips trik short this is that is accessing web with calculator, lah kok bisa…? ? ? of course can. windows really very curious this soft apparatus has a lot of secret may be we don't know. may be at article furthermore i shall try share secret exercise and unique matters at has windows besutan miliuner bill gates this. but here i only discuss exercise accessings only with calculator capital.
not other calculator can be made successor browser. . here you are step by step make calculator can at make browser.

1. open calculator as usual. then, click menu help-> help topics

2. at menu “help topics”, click question mark (? ) at part leftest on “title bar”. choose “jump to url”.

3. web address contents that agan access. for example, http: /www. google. com

4. and, come up web yard agan typing a while ago. please web access as usual.
hahaha, really so unique we can make use windows load calculator usually we use just for count, but at the opposite of this calculator plainness can we make alternative browser.

successful greetings from we are team Xpost
READ MORE - trik accessing only with calculator

lethal manner all services remote



at trik previous, you have detected manner to mamati access remote. but access that deaden that just for remote desktop.
service remote other like remote registry for example, mobile permanent and make registry can be regulated from a distance.

if not want service remote, you can lethal service all at once will decrease windows load.

here you are its way:

1. click" start" then type" services. msc"
2. after window service opened, you will see line progam that walk at background in columns name, description, status, startup type and logarithm on axis.
3. will click right program the arrangement will be changed, then click" properties" . before change arrangement, read formerly explanation exist in description so that you can detect program status, wanted or not. to detect the connection with program other, click [ dependencies ].
4. click column startup type so that appear three choices: " automatic" , " manual" and " menyable" .
5. kill service next: remote registry, netmeeting remote desktop sharing, remote desktop help session manager, remote access auto connection manager, remote procedure call (rpc) locator, routing and remote access.
6. after all programs finished regulated, enclosing services and restart computer.

successful greetings from we are team Xpost
READ MORE - lethal manner all services remote

distinguish computer that installed key logger


more day more and more a account at plough, and that make team we delve this case, . . .
and obvious after at careful that make that account at plough undercommunication SDM (human resource) less pays. . .
and more many people want internets access so quite a few appear tenancy service or penyedian internet (warnet = internet cafe), and menyinilah person location launches action with the skill manipulates computer with a tool that named key logger, why do i say key logger, because really not may be a account be be enterred off hand will pass via will give way web because perusahan account certain will charter their web watchmans. . .
so this is me study manner detects difference a computer that installed key logger that is: . . . . .
simple aja. . . . . . . . . . . . . . .
and easy so detect that warnet where we play mempasangin trap like kgb key logger,
enough press combination keyboard next:

ctrl + shift + (press all fonts exist in keyboard)
otherwise there activity at sail so computer menghadapan you are clean

easy kan

to study please download his software

expressly i don't enclose link downloads because more and more one who misuse this software, hope to know because team we want to creat world safe and peace. . .

successful greetings from we are team Xpost
READ MORE - distinguish computer that installed key logger

chase away ignoramus lethally Remote Desktop


at postingan this is us study access remote computer from long distance. for that want long distance access, fitur this is very attractive. on the contrary, fitur this also can be misused one who irresponsible to restrain your computer from long distance. well when are you not want facilities remote, or you use amplikasi remote third party, kill rdc standart windows load.
like this its way:

1. click" start" then click right menu computer and click" properties"
2. at window system that display operating system information alongs with hadware he, click menu advaced system setting exist in part tesk.
3. moment window system properties opened, activate tab" remote"
4. look at box remote deskop that reside in part under. afterwards, choose radio button" don't allow connections to this is computer"
5. press ok to keep change whom you do. . .

successful greetings from lab xpost
READ MORE - chase away ignoramus lethally Remote Desktop