blog this is me make to share my invention about internet exploration at every evening

Daftar

Tampilkan postingan dengan label freeware. Tampilkan semua postingan
Tampilkan postingan dengan label freeware. Tampilkan semua postingan

How to Create Bootable USB Drive




USB (Universal Serial Bus) drive has become a device that is often used for backing up data, shifting the function floppy disks, CDs and ZIP disks. USB drives are not only cheap but also very practical, durable, and can have a fairly large storage capacity. For we do not anticipate when the computer can boot, we should have a bootable disk. Bootable disk can be mengindarkan us of our inability to access the computer because of boot problems. By using a bootable USB drive, we can even solve problems faster booting.


Here are the steps to create a bootable USB drive:
1. Insert your USB drive into one USB port on your computer

2. Click the "Start" button at the bottom left on your computer screen

3. Type "cmd" in the RUN window to open a command prompt

4. Type "disk parts" into a command prompt and press Enter. After that type "list disk" and press Enter again.

5. Determine which of the disks that display the list of which is a USB drive. (For example, 4GB USB drive, then the option with 4GB size that you need to see). Record the number that identifies your USB drive it in the paper.

6. Type the following command into the command prompt to format on a USB drive.

"Select the disk A," replace "A" with the number you get in step 5 earlier. Press Enter
"Clean." Press Enter
"Create Partition Memory." Press "Enter."
"Select Partition A." Press "Enter."
"Format FS = NTFS." Press "Enter."
"Assign." Press "Enter."
"Exit." Press "Enter."

7. Insert the installation CD of Windows XP or Vista you. Your computer will read the installation CD, and a window will appear on the screen. List of all drives will be displayed there. Look for the letter which is a symbol of the CD-ROM and a USB drive. Take note of these letters in the paper.

8. Type the following command into the command prompt:

"B: CD boot," replace "B" letter which is the symbol of the CD-ROM. Press "Enter."
"CD boot." Press "Enter."
"Bootsect.exe/NT60 C:," replace "C" with the letter which is a symbol of the USB Drive. Press "Enter."

9. Copy the boot information from the installation CD to a USB drive by entering the following command into the command prompt:
"Xcopy c: *.* / s / e / f B: /," replace "B" letter which is the symbol of the CD-ROM and replace "C" with the letter which is a symbol of the USB drive. Press "Enter."

Let the computer to copy data from the installation CD to a USB drive.

10. Unplug the USB drive from the USB port, replace the lid, and give the label "bootable" with markers. Save the USB drive it in a safe place. Remove your Windows installation CD and return it to its place.
READ MORE - How to Create Bootable USB Drive

How to manually eradicate the virus in the computer



Eradicate the virus is not detected by antivirus on the computer. Usually this type of local virus2 who must wait some time tuk bs kebaca antivirus, antivirus providers jg coz humans who need time to make updates Exterminate virus2 tuk who continue to roam it.
Here's how the manual or call the command with Windows tuk Exterminate virus
The first step with deadly virus who are running in memory
• How, to show the Windows Task Manager by pressing Ctrl + Alt + Del
• Go to the tab "Processes", then click the "User Name" to sort the files that are processed in memory.
• Turn off all suspicious EXE file as a virus in the computer memory that we have previously sorted based on the "User Name". Do not turn off file the category "System", "Local Service", and "Network Service", because it can make our system Hang or Freeze.
Second Stage with Disable Virus on Startup
• The trick with using the MSCONFIG command, click Start menu> Run> msconfig
• window will display "System Configuration Utility". Then select the tab "Startup"
• In the startup window will pop up any application program that will run when the computer first loading the first time, so choose which one is activated and is not, in this case as a suspicious applications that the virus component is not enabled (disable) or by not menconteng check box, step should simply select "Disable All" and enable (enable) return the desired startup if the virus has been eradicated.
The third stage is to remove files from a computer virus
• How to use the facility "Search" in Windows, click Start menu> Search
• Then find the EXE file the virus (virus samples: Tati.exe) known name from the first and second steps (memory or startup).
• The file is usually located in the System32 or another folder in Windows. Once found, delete, or delete the file. Some of the events to delete these files need to move the first folder and then delete or move ever jg after the file could not be didelete then restarting the computer solution and then delete.
The fourth stage is to remove the virus from the System Registry
• This is the last step by using the command REGEDIT, select Start> Run> regedit
• Will perform the Registry Editor window and select menu "Edit" select "Find" (Ctrl + F)
• Input file name that we want to delete the virus (Tati.exe), then select "Find Next". Once found virus files, delete all the registry that contains the components of the virus.
• Repeat this step to look for other viruses file2.
• When finished restart the computer, finish
READ MORE - How to manually eradicate the virus in the computer

Notebook Screen Dead






There are a lot of people ask me, my laptop after falling really dark, or the laptop suddenly dark or like totally dead. What actually happened ...? Let's learn together .....


Cause Laptop Screen Dark or Off:

1. VGA chipset
2. flexible cable
3. Inverter / plyback on television
4. LCD

So if dark or dead there are several possibilities, we can keep track of vga first. Its distinctive feature is try connecting the vga out with an external LCD monitor or the dark when there is a possibility chipset vga yg damaged.

Meanwhile, when lit, there is a possibility lcd, inverter, or a flexible cable. To test must use an identical or the same dikanibalkan typenya. Such as inverters, lcd or flexible.

If we look at a picture of a thin or as shadows on the LCD, then that might be damaged is the LCD backlight (CCFL), an inverter or flexibelnya.

So dark conditions or die is not necessarily have to replace the LCD.

may be useful
READ MORE - Notebook Screen Dead

Quick Open Applications




Description of problem:
Netbooks are small to make the PC a bit complicated if you want to run applications that are stored in a somewhat hidden. A more practical way is to register the file / application to the registry, so that Windows will immediately recognize the name of the program on the call and immediately executes it.

solution:
Here are the steps:
1. Run Registry Editor by typing "regedit".
2. Go to the subkey:
HKEY_LOCAL_MACHINE \ Software \ Microsoft \ Windows \ CurrentVersion \ App Paths
3. Create a new subkey with the name you want, for example aplikasiku.exe
4. Double-click the data string is named (Default) and enter its value to the location of the file or application, for example D: \ master \ files \ app.exe.

For the results, typing "my application on the Run menu or the Command Prompt, and observe what happens.
READ MORE - Quick Open Applications

Improving safe mode trouble


Safe Mode is one of the first way to overcome the problematic windows. When a computer problem as viruses, software installation, is incompatible with certain programs, or other problems, usually we can fix by going into Safe Mode. But what if we can not get into Safe Mod ... e?



Not a few viruses that damage the Windows Safe Mode to prevent us get into safe mode and remove the virus or fix it from there. When we can not get into Safe Mode, then it could be a problem, because the first step to repairing or analyze windows can not be done. (See also Safe Mode, Benefits and Uses)

If you experience something like that, now we can use a small and simple software (for free and also portable) to fix safe mode, Safe Mode Fixer (SMFixer). This software will meperbaiki Windows Safe Mode to be active again.

Its use is easy, because it's software (tool) has only three buttons, namely: Fix, Help and Exit. To fix the safe mode just click Fix, then the computer will restart immediately, and when it restarts press F8 key (can be several times to make sure we can get into Safe Mode menu option).



After fi press the FIX, the computer will automatically restart, so save first if we are working on a document or writing important data before performing repairs with SMFixer.

As a note, because this software is a software security (security) associated with the file system, registry systems and applications (processes) currently running, then the application must run with administrator permissions. Several other security software may also block these applications, such as Avira, so if you do not succeed, it is advisable to turn off security software such as Antivirus and Firewall first.

Safe Mode Fixer download or SMFixer on Softpedia (112 KB, Windows XP, Vista and 7
READ MORE - Improving safe mode trouble

Creating animated wallpaper in blackgrond on windos 7




If you are wondering how to make the background on the screen moves, follow the steps below:



Download Dream Scene Activator (download link at end of article).



Extract the files you have downloaded using WinZip, WinRar or 7zip.





Copy the file Windows 7 DreamScene Activator.exe to the desktop.



Right-click the file and select Run as administrator.



Enable DreamScene with Dream Scene click the Enable button.



Find a video file to MPEG or WMV format to serve as the background. If not, you can download a sample file special animated wallpapers (there downlload links at the end of the article).





Right-click the video file and select Set as Desktop Background.



Done.
READ MORE - Creating animated wallpaper in blackgrond on windos 7

CPU slow service


Yesterday there was a consumer who complained to his computer, his complaint like this:
1. computer very slow when login windows.
2. if you save the file on the desktop after the restart missing.
3. programs often re-installed windows and often broken.


How to slow CPU Service and Frequently Damaged Windows:

The first thing I did was reformat and install windows again. Test my computer all day and it turns out there's no problem. The next day when computers would be sent to the home consumer, the computer I test again and found the windows will not boot at all with black screen after exiting the BIOS menu.

Wow maybe the memory is damaged and damage the program. Then the memory / RAM I test with a test ram in linux ubuntu boot menu and it turns out the RAM no problem.

Then I suspect the hard drive, then try to format my hard drive using the old way is with the DOS format command. And indeed did permasalahnnya on this disk. This hard drive has bad sectors are very small so it does not look damaged and bad sectornya it evenly.

Problems met and eventually I replaced the hard drive and then install it again and so far, and the goods are ready to send ......

Indeed, today I often ignore such cases. If before I install a computer with Windows damage, usually a step I do is:

1. Check RAMnya (check RAM use of linux)
2. Check the hard drive (use the old DOS version format / use HDD Regenerator)

Thus my experience, good luck .....
READ MORE - CPU slow service

May I installed in one computer over an antivirus



If we as users who serves as "important people", ie people who always call other people because a lot of things coming from us, mainly because as a store important files, such as an office employee ... not a member of the board .... or as a student / students who have the files that are useful for learning tasks kelanc ... Aran / college ... the preservation and maintenance of files from loss and should be pursued as possible .... let's not grumpy because of files that should be printed or submitted to the boss / leader / lecturer lost erased or damaged because of the "curse Hacker" through the spell of virus is ....



In addition to mandatory frequently present on the internet in order to update the Antivirus, we must also always keep an eye on the health condition of the computer system on a PC / Laptop us, lest we corrupt the file's because "vilified as a terrorist " by AV we reply have long entrenched in our hard drive ... as often happens in Avira (especially for Avira which expired / out of date alias rarely updated).



It often happens, to a certain virus is not detected by antivirus pride we ... but as soon as we stick inserted into a PC / Laptop others reportedly mmengandung virus ... Usually when this happens "I" must be embarrassed and "you know?! How come?" then assume that we are not a good AV and switch to AV as yours friends ....



If we "love" to get rid of AV long so trust us even though it "does not sejagoan" AV's been our friend, then there is no harm in our "collection" only AV's on my hard drive. What is important at the time he was active not crash / clash with other AV activity that can lead to hanging "in my life" power on button is pressed or AV let us regards as "an intruder / intruders" or malware or whatever who is considered to be virus ... who subsequently killed / quarantine / diremove by AV stronger ...



So that we can collect a lot of AV with SAFE, then one way is ... AV's enable it 1-2 from the Start Up (from the computer / laptop is turned on> and if we insert the flash FD have people turned out by an active AV was cleared .. and we still do not believe / the utmost liver, then the AV is not enabled automatic reply that we are enabled to scan the FD today ... but before we disable the AV is active ... this way we are not wasteful of RAM used by the AV that is not necessarily a virus ... .

good luck from the team xpost
READ MORE - May I installed in one computer over an antivirus

Change the file format online


When working with using a computer, we face a variety of file types. Sometimes, we need to change the format of a file to another format. For example, we may need to change the file with. Doc format to format. Pdf. Indeed there are a lot of software that can help us. But what often becomes a problem is when we need to change the format of a file quickly, but we do not have the software to change it, and we do not have much time to look for altering software earlier.

We can change the format of a file by simply using a web browser only, because the file format converter is now available online, namely Zamzar.com. This website can help us convert various file formats like. Doc,. Pdf,. Rtf,. Txt,. Ppt,. Html,. Docx, and much more. In addition to the document file, this website also can help us change the format for image files, such as bmp, gif, ico, png, and so on. This website can even help us to change the format of video, audio, and compression type.

Zamzar.com help us to do all the earlier file format conversion fast, easy, and free.
Klik Here
READ MORE - Change the file format online

Software Protected folders to protect important files


If you often work using a computer that is also used by others, such as computers in the office, or on campus, you need to be careful. If you keep your important files on that computer, you must ensure that your files are safe. Try and imagine if suddenly you lost due to deleted files by other users. Surely this will be very troublesome.

To secure your files in a computer that is used by many people, you can use the application Protected Folder. As the name implies, this application protects your files or folders. Protection is quite sophisticated, by creating a file or folder you become invisible, and can not be accessed or modified by other users.

This application is very easy to use. Protected Folder works like a safe. You can just drag and drop to put files or folders you want to keep in the safe was. Once you put a file or folder that you want to protect in the Protected Folder, no other user can see it. This course can help you to protect your privacy, prevent data theft, prevent loss of data, and so on.

Protected Folder application may be used on computers that use the Windows 7 operating system, Vista, and XP. You can also use this application on Windows Server 2008 and 2003. To be able to use this application Protected Folder, you should at least have a computer with a processor speed of 300 MHz, 256 MB RAM and 30 MB hard disk space. Protected Folder Applications are available in various languages​​, including English, Arabic, French, German, Korean, Russian, and many more. Unfortunately, this application has not supplied in the Indonesian language version. But if you use a computer often enough, you will have no difficulty in using this application.
Download software
READ MORE - Software Protected folders to protect important files

Protect your computer with comodo internet security


If you frequently work using a computer, however you will save a lot of important files on your computer. And if you frequently use these computers to access the internet, you should be extra careful. There are so many threats on the internet that can harm your important files. Your computer can be attacked by viruses while you're exploring the virtual world, and you will not even notice it. To protect your computer from all dangers that exist on the internet, you should use a good Internet security applications. Internet security application that will either prevent the entry of viruses, spyware and other dangerous things.

There are so many internet security applications that you can use. One is the application of Comodo Internet Security. Perhaps the internet security application that one is quite foreign to our ears. However, internet security applications it offers enough protection features are worth a try.

Applications Comodo Internet Security provides protection from viruses, spyware, rootkits, bots, and other types of attacks. In addition to detecting viruses and other harmful things, this application can also eliminate all threats that are found to maintain the security system and your valuable files. Comodo Internet Security applications also have the ability to prevent installation of malware on your computer. As we know, a type of malware is a malicious application that can steal important data and disrupt your computer's performance. Applications Comodo Internet Security also provides a very useful feature, namely Auto Sandbox Technology ™.

When you work using a computer, you may often find files that are not clear what its function. For security reasons your computer, you can try to run the file in sanbox provided by Comodo Internet Security. If you find that the file is a file that contains malicious or virus, your computer will remain safe.

Comodo Internet Security applications can be used on computers that use the Windows 7 operating system, Vista, or XP SP2. Computer proficiency level also must have a minimum of 128 MB RAM and 350 MB hard disk space. If you think that you have to spend lots of money to buy Comodo Internet Security application, you are wrong. You can download and use applications Comodo Internet Security Pro 2011 for free for 1 year.

If you want to get the internet security application that you can use for free forever, you can download a free version of Comodo Internet Security. But, like many internet security applications that you can find on the internet, free version of Comodo Internet Security application provides only the features that are fundamentally alone.

To get more information and download the application Comodo Internet Security, you can visit its official website here
READ MORE - Protect your computer with comodo internet security

Caring for your computer or use winutilitiy leptop


Package programs is a reliable free multifunctional applications in enhancing and improving the performance of Microsoft Windows operating system your pet.

WinUtilities can be the best collection of free you to increase the performance of Windows systems, improve system security, optimize system performance, and customize the Windows screen appears a personal taste.

This application program has some features that you can use, such as Registry Cleaner, which is capable of handling a variety of registry 'junk'; Registry Optimizer, has in the defragmented reliability and improve performance of system performance, making the system runs fast and stable.

In addition to the above program, there are also several other programs, including some tools that can clean up those files 'junk' found in your favorite hard drive. All that you can have for free.

File size: 8.35 MB (freeware)
Sistem operasi: Windows 2000/XP/Vista/7
Download

greetings from our successful team Xpots
READ MORE - Caring for your computer or use winutilitiy leptop

Ebook tutorial windows 7

Windows 7 which is the latest operating system from Microsoft offers many advantages when compared to Windows Vista or Windows XP. You previously used an older version of Windows may need additional references to better understand about Windows 7. One source of referrals that you choose is a free ebook Windows 7 Power Users Guide is written by Mike Halsey.

This ebook consists of 174 pages and 16 chapters, in which are described on the ins and outs of Windows 7. Discussion ranging from how to install Windows 7 (both new install or upgrade from Windows XP or Windows Vista, network configuration, maintenance, tweaking down to how to fix common errors that appear.

You do not need this ebook to learn confused because this ebook explains in detail step by step which is equipped with a screen shoot and a variety of quick tips.

If you are interested in reading and studying the ebook you can download here.

Details of books:

Copyright: Mike Halsey, www.theLongClimb.com (Standard Copyright License)
Edition: First Edition
Publisher: Mike Halsey, www.theLongClimb.com
Publication Date: May 6, 2011
Language: Bahasa Indonesia
Number of Pages: 174
File Format: PDF
File Size: 24.2 MB
READ MORE - Ebook tutorial windows 7

One computer for open 2 YM account ID


Those who have 2 ID YM and Mo opened Together ni how:
1. go to start-> run-> regedit
2. go to HKEY_CURRENT_USER-> Software -> Yahoo -> pager -> Test
3. Right-click test
4. select New -> DWORD value
5. continue boxed right you will see "New Value # 1" -> rename "New Value # 1" so "Plural"
6. right-click the plural, modify, insert 1

try opening a YM u 2 seeds


hopefully useful ...

greetings from our successful team Xpost
READ MORE - One computer for open 2 YM account ID

System docking for windows


Computer users who use many applications at work often face difficulties, because to run an application and switch from one application to another is tedious. To simplify things, they could use additional interface Dock. Dock is an additional interface that provides an easy way to run and switch between multiple applications with ease.

Winstep Nexus is an excellent docking system, but currently only available for Windows operating systems only. Nexus is the Dock which makes working with multiple applications becomes very easy, and even feel more comfortable. We can access the applications, folders, and documents that often we use them with just a click away. Nexus is available in two versions, namely Winstep Nexus (free) and Nexus Ultimate.

Here are some features of Winstep Nexus:

* Displays a list of applications currently in use in the Dock that can be arranged with the grouping, filtering, and icon customization.
* Display system tray icon in the Dock as an individual or group.
* Securities vague and interesting color effects on the background of the Dock.
* Monitor active connections and bandwidth usage by the Net Meter module
* Some mouse over effects, such as zoom, swing, bounce, and so forth.

There are still many features of Winstep Nexus that has not been mentioned above. To learn more, would be better if you immediately try it out. You can download Winstep Nexus on his official website http://www.winstep.net/

greetings from our successful team Xpost
READ MORE - System docking for windows

Hidden IP via add ons


sometimes you necessary make ip address you are not seen, by your computer network security. if you want ip address you are not seen, you can use switchproxy. add-on to firefox this make possible you to observe and replaced from several setting proxy different easily. you also can use add-on this as anonymizer to protect your computer from outside party disturbance.

we all know that use more than one proxy by usually very tire because we must then menerus observe all. with switchproxy you can regulate all proxy you use considerably easy. add-on this also prepare fitur to tuck, edit, and or wipe off proxy with a few click. to use a proxy, you only necessary choose from existing list and click apply.

fitur anonymizer that provided by switchproxy use several fruits proxy at random change in certain international. fitur this is very be of benefit to people who wants to protect their computer from hacker and or other party.

next manner to make ip address you are not seen by using switchproxy:

first matter necessary you do of course mengunduh and meng-install add-on switchproxy this.

after add-on this is -install, click button add, then choose anonymous from existing configuration choice, and click next.

hide ip address with switchproxy

at window next, you can add list proxy that want you use either through manual and or use proxy list. you then can give name for this configuration to make easy use furthermore, then click save.

you can look for list free proxy from this yard.open

to begin to hide ip address you, you must choose myproxy from toolbar, then click apply. now ip address you latent. very easy not?

successful greetings from we are team Xpost
READ MORE - Hidden IP via add ons

Tips and trik font unique handphone more interesting


who seeh not demen ngeliat the handphone come up to interesting! even less kalo also interesting depth its contents? inner beauty gitu looh! atao kalo term feminim" may be" can adopted proverb" come up pretty outside also in" . handphone interestings to make us more feel comfortable and more pd. well. . one of them make font handphone as according to our wish. its way, use software easy gdr creator product smart-mobile. application makes symbian series 60 this make possible us to change font in destop handphone, character sms up to in task handphone pothouse. although this software uses language tutor thai, but its use enough easy because equiped tool simple. explanation next will explain a little about editing process font handphone symbian.



1. in menu display, we can replaced font you like so that be seen to come up difference with your friend handphone. for example for icon display in handphone menu, be changed with font comic. so click browse in tab right on. in display under this, we be be admitted to change display font so that can size can be accustommed. note: size font standart use size 8.

2. click in ttf font and will appear file fonts that you will choose, for example comic.

3. for menu message we also can replaced it. note: when do we do send message to handphone other not menstall with font gdr, so the font display is font standard.

4. then click to like be picture and be seen the work process, we also can see in priview fonts what fonts we choose matching with the one which we have desired.

5. editing font also can be done in display tool pothouse in option.

6. latest editing in icon name at your handphone folder. note: if font you too big, so the font will be cut so that not can kebaca fully. another deficit, if use font king sized or common known with format kapital, so handphone sail will be seen full. on the contrary, if wear font atypical, may simply that the font not shall can be read. the result, save the result in folder that you have determined. second step: application install chance a word sis then result easy gdr a while ago copy to c: /system / font then restart your handphone. note: comic. gdr font bew. don't forget to install application font remover to your handphone, because if this application not menstall so font in handphone change.


congratulation berkreasi. . ! !

successful greetings from we are team xpost
READ MORE - Tips and trik font unique handphone more interesting

Manner protects Flaskdisk with USB Write Protect v1.10




today i share tool little but has benefit big enough. do you ever experience case write protected in USB especially flashdisk? ? if ever, don't pass this article.

write protect be where are we not keep data from computer to flashdisk or another storage media. besides can not data transfer from pc to usb, file at save at usb even also becoming not can at delete/cut. because flashdisk we are write protect, automatic virus infection from computer even also can be minimized. bener not sob? ? hehehe

this application nameds USB Write Protect v1.10 has portable. friend blogger only necessary copy and paste USB Write Protect v1.10 to flashdisk that want friend blogger key.


support os:
windows, win98,2000, xp, vista, also windows 7

update (16112010):
to enable tool USB Write Protect v1.10 this, click right usb write protect v1.10 then run administrator axis. a while ago i also try this software when at used at computer (not flashdisk), our computer the result so can not send file to flashdisk (computer data so safe, not there origin copy-paste, , hehe)
after use this software, don't forget at restart to feel the effect.

Download software
READ MORE - Manner protects Flaskdisk with USB Write Protect v1.10

sofware registry life

Tool ringan dan kecil ini dapat Anda manfaatkan dalam meningkatkan kinerja dari sistem operasi Windows dengan memperbaiki kesalahan, defragment, dan membersihkan registry Windows dari file-file yang mengganggu kinerja sistem.

Tidak seperti tool freeware lainnya yang mirip, tool ini menawarkan sesuatu yang berbeda dalam hal membersihkan registry Windows dari 'file sampah' dan mengoptimalkan sistem, karena kesemuanya dilakukan didalam satu tool, yaitu Registry Life.

Fitur-fitur dari Registry Life memiliki kemampuan membersihkan dengan melakukan scan secara keseluruhan dari permasalahan yang terdapat pada sistem dan kemudian memperbaikinya dalam sekejap, untuk lebih mengoptimalkan sistem.

File size: 3.62 MB (freeware)
Sistem operasi: Windows 2000/XP/Vista
READ MORE - sofware registry life