9/25/2008

cara manipulasi kapasitas flash disk

Fake USB FlashDisk 1GB, ... , 32GB, 64GB, 128BG
These two days I've been working on some USB FlashDisks / FlashDrives / Flash Disk / Flash Drive / Pen Drive ... , by request of a friend.
These Flashdrives where came from CHINE and last I've know they are FAKE, FAKED SIZE, FAKE SIZED , I mean they were 16MB but shown 1GB or 64MB and shown 32GB.

So Here I'm with some information for you to detect these fake flash drive and never buy them, I've seen them every where: ebay, amazon, some chinese web sites, ... just beware of HUGE size flashdrive with low price specially from CHINE.

First how indicate:

As mentioned here http://forums.hardwarezone.com/showthread.php?t=1642158 you have to copy alot of files (just like musics or picture) and copy them back to you hard disk check them all (you can use thumbnail view) and beware of the caching feature in Windows or you can also "Safe Remove" the disk and attach it again and check file names and you'll see some "00000 thing name" (you may see some aother things but not the original). The amount of files needed to do so depend on what really that one is, I mean is it really 16MB? so you need 17MB of files. but as I see they will use 16-128MB so you can simply use 130MB files and you'll see if it is allright or FAKE.

So the most import part is WHAT THE **** IS THAT THING, REALLY.

So I searched the web and found some usefull utils, and I'll tell the names and if you couldn't find them just leave me a message and I'll see what can I do for you.

First you need to identify the actual CHIP, YES THEY CAN RENAME IT (after you can too!), for this you can use a utility called USBVIEW.EXE this application will give you the Vendor and Product ID (idVendor, idProduct) and you can search for them in the Web, mine was 0x1043 0x8006, 0x8012 mean iCreate, you can refere http://www.linux-usb.org/usb.ids for Vendor and Product IDs.

If yours is iCreate too, so this is bad news, because as you can see in http://www.icreate.com.tw/e/icreate_e.htm and http://www.icreate.com.tw/e/soc_i512x.htm this company make "Configurable VID, PID, Vendor name, Product name, Product revision, and USB serial number" chips which is BAD, i mean **** YOU iCreate, by making this chips iCreate let other hackers do their work and make SONY MICRO VAULT 32GB, 64GB, 128GB.

The good news is if have iCreate there are some utilities that let you make the FlashDrive useable, I meant 16MB flashdrive useable, there is no workaround to let you have 128MB useable flashdrive, I mean fully useable.
These utilties are also made by iCreate and there are the things that those hacker company use to **** you by selling you 128GB flashdrives.
You can checkout http://www.22b324.com/ and http://www.22b324.com/down.php?nowmenuid=30189, just let the google translate it for you (The english site is under construction) and download I5xxx utils:

* iFormat: some versions works on some chip numbers, so try i5122 or 5128, i5022, ... if it closed automatically (just the GUI will be hidden but the iFormat2.exe is in task manager) means you hit the wrong utility. This utility use for formatting the drive and password protecting it, but for me this (format) worked after PDx8, PDx16 which I'll introduce later.

* PortFree Production Program , PDx8 and PDx16: for i5022 I used the PortFree Production Program 3.27 and for i51xx I used PDx16 goto options and just select the "LOW LEVEL FORMAT / LLF" this application will be used to Format the FlashDisk and this will make the Size REAL, for me: 1GB -> 16MB , 32GB -> 64MB. The PDx16 will take a minute or two to open and work, this is very slow, but this will work.

** Note that there are all work under Windows Server 2003 or maybe Windows XP, these will not work under Windows Vista. So If you want to test these FlashDrive NEVER use WINDOWS VISTA. **

** I also found an application name "System Information Veiwer - SIV" which you use to see the Vendor name of USB FLASH DRIVEs, but I mentioned that this is very large, I always want a software to see the MEMORY/ CPU BUS SPEED and this will work like a charm.

So these are what I've found, Tell me if you know more.

************************
Update #1: I've uploaded some useful (mentioned above) utilities in Windows Live SkyDrive, hope these will help you identify if someone sold you FAKE USB DRIVE:



Update #2: I've just found out that the SIV has its own web site so I'll remove my link (and also the file) and here the original link http://rh-software.com/ sorry that delete this from my SkyDrive but I always said that you have to download from the origin (if there is some).
************************
Thanks,
Sadjad Bahmanpour

9/24/2008

Cara Menghapus Password MMC (MultiMedia Memory Card)

Cara Menghapus Password MMC (MultiMedia Memory Card)


Ada seseorang yang menanyakan kepada saya via email Bagaimana Cara Menghapus Password MMC (Multi Media Card) di handphonenya karena lupa passwordnya dan MMC tidak bisa diakses atau dihapus passwordnya. Agak menggelikan karena kenapa tidak menanyakannya kepada pakar handphone atau MMC saja. Mungkin karena beberapa postingan saya terdahulu menyangkut password dan removable drive/media seperti halnya MMC.

Oke, Mohon Maaf bila saya tidak menjawab melalui email, namun saya post ke Blog saya ini saja, sekalian sebagai informasi bagi siapa saja yang membutuhkannya via internet. Kebetulan beberapa tahun yang lalu (lupa kapan) saya dapat informasi cara penghapusan password pada MMC dari seorang Rekan saya di Solo yang gemar utak-atik Handphone (Selamat pagi Bung Rochmat! saya share ilmu Anda ke publik!).

Bila Anda menjumpai MMC Anda hanya terbaca oleh handphone Anda, tapi tidak bisa dibaca menggunakan handphone lain atau bahkan Card Reader karena proteksi password, ikuti langkah-langkah berikut:

  1. Dari handphone Anda, browse file dengan masuk ke Explorer (bila tidak ada internal explorer, install third party explorer.FE, selek Q dan sejenis nya).
  2. Buka C/system, dan cari file yang bernama: “MMCSTORE”,
  3. Copy file “MMCSTORE” tersebut ke Komputer dengan teknik “Send To” (PC),
  4. Buka File “MMCSTORE” yang telah Anda copy dengan Text Editor misal: Windows Notepad,
  5. Lihat pada bagian akhir teks dari file “MMCSTORE” di dalam Notepad window; Itulah Password MMC Anda,
  6. Terakhir, Buka MMC apps remove password dengan dengan Password yang telah Anda temukan tersebut.

Catatan:
Teknik ini mungkin saja tidak berlaku pada semua jenis MMC atau Handphone yang dikarenakan makin beragamnya jenis Mobile Device dan Teknis Operasional Mobile Device beserta Operating System di dalamnya, serta Pen-gupdate-an Operating System dan Teknis-Teknis Operasional oleh Vendor Mobile Device Operating System.

Selamat Mencoba



Cara Mem-password Flashdisk Anda

Diawali dengan sebuah pertanyaan :

“Mengapa saya harus mem-password flashdisk saya?”
Jawabannya tentu saja untuk mengamankan data pribadi Anda dari tangan-tangan jahil yang tidak bertanggung jawab (uhuk… uhukkkk…).

Catatan : dengan menggunakan software berikut ini, Anda bebas menentukan apakah flashdisk secara keseluruhan atau hanya beberapa folder penting di dalam flashdisk yang ingin Anda lindungi.


Langkah pertama yaitu mengunduh (eeeehhhhhmmmm…) atau bahasa gaulnya men-download software “Folder Protector” yang bisa kalian download disini lockdir.exe Lalu simpan di PC atau di flashdisk Anda.




Lalu klik “Protect Another”. Silahkan pilih folder apa yg ingin Anda lindungi dengan password. Anda juga bisa melindungi flashdisk Anda secara keseluruhan dengan cara memilih namanya (misal : “Kingston”). Setelah itu masukkan password yang Anda inginkan. Lalu klik “Protect”.

Mudah sekali bukan?



9/21/2008

Security Suite 2008

Tidak diragukan lagi bahwa PC yang terkoneksi ke Internet membutuhkan perlindungan. Personal firewall dua arah memblokir serangan hacker dan menjaga program agar koneksi Internet tidak disalahgunakan adalah cara terbaik mencegah eksploitasi berbasis Internet dan download yang dikendalikan dari jarak jauh.

Antivirus dan antispyware mencegah penjahat internasional mencuri informasi pribadi atau menggunakan bot untuk menyertakan komputer dalam armada zombie mereka. Selain fitur inti, semua suite menyertakan beberapa bentuk spam filtering dan parental control. 

Sementara itu, beberapa firewall meminta user membuat keputusan keamanan. Efektivitas bervariasi dalam perlindungan spyware dan spam filtering. Tetapi untuk masalah tingkatan, semuanya masih dalam level yang sama. Menambahkan fitur bonus baru adalah cara terbaik untuk membuat suite yang dimiliki untuk masuk level terkemuka.

Selain itu, backup adalah bentuk mewah pengamanan data penting. Jika komputer rusak oleh beberapa pihak luar dan tidak ada security suite yang mampu mencegahnya, user masih bisa memperbaikinya. Setelan performa (pembersihan file yang tidak dibutuhkan, defragging disk) adalah bonus populer lainnya. Norton 360 dan OneCare dari Microsoft telah menyertakan kemampuan ini. Tetapi tidak semua backup dibuat sama. Performa yang ditawarkan sering kali berjumlah banyak dan digunakan untuk keperluan integrasi ke dalam operating system.

Di lain pihak, makin banyak rumah dan jaringan kantor kecil yang menggunakan layanan nirkabel. Hal ini membuka ancaman nirkabel. Vendor keamanan pun melancarkan pendekatan keamanan Wi-Fi, termasuk pendeteksian penyerang Wi-Fi dan memperingatkan jika jaringan nirkabel tidak diamankan dengan tepat. Inilah area menarik dan salah satu yang harus dikembangkan. Sementara itu, berbicara mengenai produk keamanan, berikut informasi internal yang telah bergulir seputar masalah ini.

BitDefender Total Security 2008
Suite ini menyertakan modul firewall, antivirus, antispyware penting, parental control, dan perlindungan spam efektif. Versi ini menambahkan modul backup penuh fitur dan perangkat peningkat sistem, menempatkannya berhadapan langsung dengan Norton 360 dari Symantec dan Windows Live OneCare Microsoft. Keseluruhan user interface baru membuat produk ini mudah digunakan bahkan bagi pemula dalam bidang keamanan komputer. Hanya perlu klik satu tombol untuk memperbaiki masalah. Produk tersebut kini menyertakan pendeteksi jaringan Wi-Fi yang tidak aman dan mengeluarkan notifikasi jika komputer baru terkoneksi ke jaringan nirkabel.

CA Internet Security Suite
Tawaran terbaru CA dilengkapi dengan 7 modul keamanan yang tidak terintegrasi seperti mayoritas suite. Perlindungan antispyware dan antivirus masih terpisah, dan keduanya dibutuhkan untuk pembersihan menyeluruh sistem yang ada. Edisi ini menambahkan fitur backup terbatas dan fitur antiphishing sederhana. Sejumlah modul memiliki bug yang dirancang CA akan diperbaiki Oktober mendatang. Perlindungan spam ketat berbasis whitelist tidak tersedia jika user memiliki e-Mail dalam volume besar. Antispyware dinilai memiliki performa yang lebih baik dibanding tahun lalu dan firewall-nya pun lebih kuat. Tetapi user mungkin lebih baik mematikan suite yang lebih terintegrasi dan lebih efektif seperti Norton Internet Security 2008.

Kaspersky Internet Security 7.0
Suite ini melengkapi perlindungan keamanan dengan menambahkan parental control. Produk ini pernah menunda penyertaannya sehingga hanya memiliki semua komponen dasar. Seperti Norton Internet Security 2007, modul antispam dan parental control tidak seefektif kelompok inti antivirus, antispyware, dan firewall. Ketiganya menawarkan perlindungan solid, tetapi hanya jika menampilkan sejumlah setelan keamanan di atas nilai standar. Parental control anyar membutuhkan beberapa pengerjaan. Penjadwalan aneh dan tidak fleksibel serta filter-nya mengontrol setiap URL yang dikunjungi setiap user.

Norton Internet Security 2008
Symantec tetap meningkatkan kemampuan produk berlabel Norton Internet Security. Edisi 2008 ini menambahkan Identity Safe yang menyimpan dan menjaga Informasi pribadi dan password. Teknologi BrowserDefender terbarunya mampu mempertahankan diri dari serangan berbasis Web. Peta jaringan baru menawarkan pengawasan jarak jauh instalasi NIS 2008 lainnya. Jika user mengalami masalah, tersedia bantuan (termasuk live chat) jika telah terintegrasi. Firewall-nya tajam dan suite ini sangat bagus dalam uji coba antimalware. Namun antispam dan parental control yang diinstal melalui paket add-on terpisah dan masih lemah.

Panda Internet Security 2008
Pada gambaran awalnya, Panda Internet Security 2008 terlihat mirip model tahun lalu. Namun, terdapat beberapa tambahan dalam suite ini. Pemindai on-demand virus dan spyware menggunakan teknologi baru bernama MegaDetection dengan nilai tertinggi dalam uji coba pembersihan dan pemblokiran spyware. Untuk pertama kalinya, peringatan keamanan Wi-Fi terbaru hadir jika ada komputer anyar yang terkoneksi ke jaringan. Perlindungan spam dan parental control masih menjadi titik lemah bagi suite ini. Solusi backup terbaru ini memungkinkan user melakukan backup file penting ke drive lokal atau jaringan dan secara opsional mengarsipkan ke CD/DVD.

Membuat Folder Tanpa Nama

saya ingin membagi sebuah trik yang pada umumnya jarang diketahui orang. Awalnya saya ngeliat satu folder temen saya ga ada namanya. Saya bingung tuh! Kok bisa yak? Nah, kemudian saya ditantang temen deh, gimana cara ngebikinnya..Sempet muter-muter otak. Nge-rename biasa, kemudian menghapus nama folder ga bisa juga. Akhirnya saya dikasih tau deh caranya sama temen saya...

Nah, saya mau tanyain dulu nih sama temen-temen semua, kira-kira bagaimana caranya? Coba buat sebuah folder tanpa nama! Kalau bisa, saya ucapkan selamat. Kalau belum bisa juga dan akhirnya menyerah, silakan melihat triknya.

Ternyata triknya cukup sederhana loh! gak percaya? Gini nih...

Pertama, klik kanan folder yang namanya mau diilangin. Kemudian klik rename.

Kedua, tekan dan tahan tombol Alt, kemudian tekan angka 0160 pakai Numpad, tombol-tombol angka yang ada di sebelah kanan keyboard standar. Numlock jangan lupa diaktifin dulu.

Udah, gitu doank kok! Sederhana kan? sekarang folder tersebut sudah tidak ada namanya!

Langkah Melindungi 'Data Rahasia' di Situs Web

Dalam sebuah hosting atau web server, seringkali ditemui banyak folder-folder. Kebanyakan berupa folder penyimpanan Content Management System (CMS) atau aplikasi dan plugins.

Namun, adakalanya juga seorang user menyimpan data dalam folder di web server atau hosting. Tujuannya, untuk berbagi file dengan orang lain.

Misalnya, Anda meletakkan dalam folder Data_Rahasia. Kemudian link atau URL lokasinya dibagi ke orang lain agar bisa diunduh. Alamatnya adalah www.webanda.com/Data_Rahasia/.

Fenomena yang (sayangnya) kerap dilakukan di situs 'pelat merah' ini sebenarnya sangat beresiko. Bisa jadi, dengan bantuan mesin pencari, data yang kita simpan diambil oleh orang yang tidak diharapkan.

Untuk mencegah hal itu, ada sebuah cara yang bisa digunakan. Hanya dengan membuat sebuah file sederhana. Sebuah file yang lazim dikenal dengan nama .htaccess.

Dengan file .htaccess, maka file dalam folder penyimpanan tidak bisa dibuka melalui browser. Hanya bisa dibuka menggunakan aplikasi File Transfer Protocol (FTP) atau melalui fitur File Manager dalam control panel hosting.

Berikut ini langkah-langkahnya:

Pertama, membuat file .htaccess.

* Bukalah aplikasi editor teks yang biasa Anda pakai.
* Pengguna Windows bisa menggunakan Notepad, pengguna Linux bisa menggunakan Text Editor atau perintah vi dalam console mode. Sedangkan pengguna Mac bisa menggunakan TextEdit.

* Isikan baris-baris perintah ini:

AuthType Basic
AuthName “Test .htaccess”
Require user test

* Simpan file ini dengan nama .htaccess. Jika tidak diizinkan oleh sistem operasi Anda menyimpan file bernama .htaccess, simpan saja dalam nama yang lain.


Kedua, upload file .htaccess dalam folder yang ingin Anda lindungi.

* Dalam hal ini di www.webanda.com/Data_Rahasia/.
* Upload biasanya dilakukan menggunakan FTP.
* Setelah selesai, ubah nama file menjadi .htaccess.

Voila! Folder Anda (www.webanda.com/Data_Rahasia/) sudah tidak bisa diakses sekarang. 

Sumber : detikinet.com

Memulihkan Data Terhapus

TAK sengaja menghapus file dari komputer? Atau ingin melihat gambar-gambar di USB flash drive yang telah dihapus anak? Bagaimana jika foto bagus di kamera digital yang belum ditransfer itu tidak sengaja terhapus? Tenang saja!

Di bidang forensik komputer, memulihkan data yang dihapus atau dirusak dari komputer merupakan pekerjaan mudah asalkan hardisk masih dalam kondisi baik. Jadi, jangankan cuma file, surat rahasia dari pejabat yang sudah dihapus, data yang telah diformat pun masih bisa “dihidupkan” kembali.

Kini seiring kemajuan perangkat lunak (software) dan makin terbukanya kebebasan berbagi pengalaman melalui internet, pekerjaan memulihkan data tidak lagi pekerjaan berat. Seorang anak sekolah dasar asal memiliki software untuk memulihkan data, hanya dengan beberapa kali klik, bisa mendapatkan kembali file yang terhapus.

Pada sistem operasi Windows, ketika file dihapus, sebenarnya file itu tidak langsung hilang. Windows bahkan menyediakan fasilitas Recycle Bin yang bisa memulihkan (restore) file yang telah dihapus.

Bagaimana jika file di recycle bin itu sudah dihapus permanen? Jawabannya tetap sama: file masih tetap bisa dipulihkan. Pekerjaan memulihkan file yang telah dirusak atau dihapus ini termasuk pekerjaan “forensik” yang mengasyikkan dan bisa dibilang mudah.

Mengasyikkan karena dengan proses itu kita berharap-harap cemas untuk mendapatkan banyak file berarti. Dikatakan mudah karena sekarang ini sudah tersedia banyak tools, terutama software yang mudah didapatkan, baik gratis maupun berbayar.

Pekerjaan memulihkan data ini sudah lama ditekuni, bukan saja oleh para pencari bukti kriminal, tapi juga teknisi komputer. Bagi teknisi komputer, memulihkan data ini sama mudahnya seperti meng-install software yang sehari-hari mereka lakukan.

Banyak yang tidak tahu bagaimana memulihkan file yang telah dihapus dari recycle bin karena Windows sendiri memberi tahu kalau sudah dihapus dari recycle bin berarti sudah dihapus permanen. Sebenarnya, ketika file dihapus dari recycle bin, Windows hanya memberi tahu kalau ruang disk yang dipakai file tadi bisa digunakan kembali. Jika ruangan kosong itu ditimpa file baru, kemungkinan memulihkan file memang lebih berat, tapi tetap masih bisa diatasi oleh software berbayar.

“Software” gratis

Hanya dengan mengandalkan mesin pencari, misalnya Google, dengan mengetikkan kata kunci, seperti “free recovery data”, akan muncul banyak alternatif perangkat lunak yang bisa digunakan. Salah satu yang ditemukan adalah Undelete Plus (www.undelete-plus.com).

Software Undelete Plus ini sebenarnya tidak gratis, tapi dibanderol dengan harga 29,95 dollar AS. Hanya, saat dikunjungi, perangkat lunak tersebut sedang memberi penawaran gratis untuk kepentingan individual yang nonprofit. Di pengumuman situs Undelete Plus disebutkan, penawaran gratis itu terbatas waktunya, tapi tidak disebutkan sampai kapan berlaku.

Selain gratis, hebatnya file instalasi software ini hanya sebesar 851 kb. Dengan besaran file kurang dari 1 MB dan fungsi yang begitu bermanfaat, tak bisa dimungkiri perangkat lunak ini banyak mendapatkan penghargaan dari berbagai lembaga. Perlu disampaikan juga, software-software serupa biasanya memiliki ukuran file hingga ratusan MB sehingga susah untuk diunduh dari Indonesia.

Selain berjalan normal untuk memulihkan file yang telah dihapus di komputer, software ini juga bisa digunakan untuk menghidupkan kembali file-file di USB flash drive atau di compact flash yang digunakan kamera digital.

10 most expensive domain

This summary is not available. Please click here to view the post.



Opera telah merilis versi terbarunya. Dengan versi terbarunya yaitu Opera 9.5. “beautifully engineered”
New browser engine

Dengan Opera 9.5 The fastest browser in the world dan lebih cepat dari browser standard tercepat. Opera 9.5 Cara tercepat untuk loading web page, start up lebih cepat.

  • Lebih cepat 2x dari Opera 9.2 dalam merender JavaScript dan HTML
  • Lebih cepat dalam menangani third party plug-ins
  • Lebih cepat pada saat start up
  • Superior support untuk Web standards.

untuk donload silahkan klik disini

9/11/2008

ALL About Spyware

There are a lot of PC users that know little about "Spyware", "Mal-ware", "hijackers", "Dialers" & many more. This will help you avoid pop-ups, spammers and all those baddies.

What is spy-ware?
Spy-ware is Internet jargon for Advertising Supported software (Ad-ware). It is a way for shareware authors to make money from a product, other than by selling it to the users. There are several large media companies that offer them to place banner ads in their products in exchange for a portion of the revenue from banner sales. This way, you don't have to pay for the software and the developers are still getting paid. If you find the banners annoying, there is usually an option to remove them, by paying the regular licensing fee.

Known spywares
There are thousands out there, new ones are added to the list everyday. But here are a few: Alexa, Aureate/Radiate, BargainBuddy, ClickTillUWin, Conducent Timesink, Cydoor, Comet Cursor, eZula/KaZaa Toptext, Flashpoint/Flashtrack, Flyswat, Gator, GoHip, Hotbar, ISTbar, Lions Pride Enterprises/Blazing Logic/Trek Blue, Lop (C2Media), Mattel Brodcast, Morpheus, NewDotNet, Realplayer, Songspy, Xupiter, Web3000, WebHancer, Windows Messenger Service.

How to check if a program has spyware?
The is this Little site that keeps a database of programs that are known to install spyware.
Check Here: http://www.spywareguide.com/product_search.php 

If you would like to block pop-ups (IE Pop-ups).
There tons of different types out there, but these are the 2 best, i think.

Try: Google Toolbar (http://toolbar.google.com/) This program is Free
Try: AdMuncher (http://www.admuncher.com) This program is Shareware

If you want to remove the "spyware" try these.
Try: Lavasoft Ad-Aware (http://www.lavasoftusa.com/) This program is Free
Info: Ad-aware is a multi spyware removal utility, that scans your memory, registry and hard drives for known spyware components and lets you remove them. The included backup-manager lets you reinstall a backup, offers and multi language support.

Try: Spybot-S&D (http://www.lavasoftusa.com/) This program is Free
Info: Detects and removes spyware of different kinds (dialers, loggers, trojans, user tracks) from your computer. Blocks ActiveX downloads, tracking cookies and other threats. Over 10,000 detection files and entries. Provides detailed information about found problems.

Try: BPS Spyware and Adware Remover (http://www.bulletproofsoft.com/spyware-remover.html) This program is Shareware
Info: Adware, spyware, trackware and big brotherware removal utility with multi-language support. It scans your memory, registry and drives for known spyware and lets you remove them. Displays a list and lets you select the items you'd like to remove.

Try: Spy Sweeper v2.2 (http://www.webroot.com/wb/products/spysweeper/index.php) This program is Shareware Info: Detects and removes spyware of different kinds (dialers, loggers, trojans, user tracks) from your computer. The best scanner out there, and updated all the time.

Try: HijackThis 1.97.7 (http://www.spywareinfo.com/~merijn/downloads.html) This program is Freeware Info: HijackThis is a tool, that lists all installed browser add-on, buttons, startup items and allows you to inspect them, and optionally remove selected items.

If you would like to prevent "spyware" being install.
Try: SpywareBlaster 2.6.1 (http://www.wilderssecurity.net/spywareblaster.html) This program is Free Info: SpywareBlaster doesn`t scan and clean for so-called spyware, but prevents it from being installed in the first place. It achieves this by disabling the CLSIDs of popular spyware ActiveX controls, and also prevents the installation of any of them via a webpage.

Try: SpywareGuard 2.2 (http://www.wilderssecurity.net/spywareguard.html) This program is Free Info: SpywareGuard provides a real-time protection solution against so-called spyware. It works similar to an anti-virus program, by scanning EXE and CAB files on access and alerting you if known spyware is detected.

Try: XP-AntiSpy (http://www.xp-antispy.org/) This program is Free Info: XP-AntiSpy is a small utility to quickly disable some built-in update and authentication features in WindowsXP that may rise security or privacy concerns in some people.

Try: SpySites (http://camtech2000.net/Pages/SpySites_Prog...ml#SpySitesFree) This program is Free Info: SpySites allows you to manage the Internet Explorer Restricted Zone settings and easily add entries from a database of 1500+ sites that are known to use advertising tracking methods or attempt to install third party software.

If you would like more Information about "spyware".
Check these sites.
http://www.spychecker.com/ 
http://www.spywareguide.com/ 
http://www.cexx.org/adware.html 
http://www.theinfomaniac.net/infomaniac/co...rsSpyware.shtml 
http://www.thiefware.com/links/ 
http://simplythebest.net/info/spyware.html 

Usefull tools...
Try: Stop Windows Messenger Spam 1.10 (http://www.jester2k.pwp.blueyonder.co.uk/j...r2ksoftware.htm) This program is Free
Info: "Stop Windows Messenger Spam" stops this Service from running and halts the spammers ability to send you these messages.

----------------------------------------------------------------------------
All these softwares will help remove and prevent evil spammers and spywares attacking your PC. I myself recommend getting "spyblaster" "s&d spybot" "spy sweeper" & "admuncher" to protect your PC. A weekly scan is also recommended

Free Virus Scan
Scan for spyware, malware and keyloggers in addition to viruses, worms and trojans. New threats and annoyances are created faster than any individual can keep up with. http://defender.veloz.com//  

Finding . is a Click Away at 2020Search.com
Having trouble finding what you re looking for on: .? 2020Search will instantly provide you with the result you re looking for by drawing on some of the best search engines the Internet has to offer. Your result is a click away! http://www.2020search.com//  

Download the BrowserVillage Toolbar.
Customize your Browser! Eliminate Pop-up ads before they start, Quick and easy access to the Web, and much more. Click Here to Install Now! http://www.browservillage.com/  

23 Ways To Speed WinXP, Not only Defrag

Since defragging the disk won't do much to improve Windows XP performance, here are 23 suggestions that will. Each can enhance the performance and reliability of your customers' PCs. Best of all, most of them will cost you nothing.
  1. To decrease a system's boot time and increase system performance, use the money you save by not buying defragmentation software -- the built-in Windows defragmenter works just fine -- and instead equip the computer with an Ultra-133 or Serial ATA hard drive with 8-MB cache buffer.
  2. If a PC has less than 512 MB of RAM, add more memory. This is a relatively inexpensive and easy upgrade that can dramatically improve system performance.
  3. Ensure that Windows XP is utilizing the NTFS file system. If you're not sure, here's how to check: First, double-click the My Computer icon, right-click on the C: Drive, then select Properties. Next, examine the File System type; if it says FAT32, then back-up any important data. Next, click Start, click Run, type CMD, and then click OK. At the prompt, type CONVERT C: /FS:NTFS and press the Enter key. This process may take a while; it's important that the computer be uninterrupted and virus-free. The file system used by the bootable drive will be either FAT32 or NTFS. I highly recommend NTFS for its superior security, reliability, and efficiency with larger disk drives.
  4. Disable file indexing. The indexing service extracts information from documents and other files on the hard drive and creates a "searchable keyword index." As you can imagine, this process can be quite taxing on any system. The idea is that the user can search for a word, phrase, or property inside a document, should they have hundreds or thousands of documents and not know the file name of the document they want. Windows XP's built-in search functionality can still perform these kinds of searches without the Indexing service. It just takes longer. The OS has to open each file at the time of the request to help find what the user is looking for. Most people never need this feature of search. Those who do are typically in a large corporate environment where thousands of documents are located on at least one server. But if you're a typical system builder, most of your clients are small and medium businesses. And if your clients have no need for this search feature, I recommend disabling it. Here's how: First, double-click the My Computer icon. Next, right-click on the C: Drive, then select Properties. Uncheck "Allow Indexing Service to index this disk for fast file searching." Next, apply changes to "C: subfolders and files," and click OK. If a warning or error message appears (such as "Access is denied"), click the Ignore All button.
  5. Update the PC's video and motherboard chipset drivers. Also, update and configure the BIOS. For more information on how to configure your BIOS properly, see this article on my site.
  6. Empty the Windows Prefetch folder every three months or so. Windows XP can "prefetch" portions of data and applications that are used frequently. This makes processes appear to load faster when called upon by the user. That's fine. But over time, the prefetch folder may become overloaded with references to files and applications no longer in use. When that happens, Windows XP is wasting time, and slowing system performance, by pre-loading them. Nothing critical is in this folder, and the entire contents are safe to delete.
  7. Once a month, run a disk cleanup. Here's how: Double-click the My Computer icon. Then right-click on the C: drive and select Properties. Click the Disk Cleanup button -- it's just to the right of the Capacity pie graph -- and delete all temporary files.
  8. In your Device Manager, double-click on the IDE ATA/ATAPI Controllers device, and ensure that DMA is enabled for each drive you have connected to the Primary and Secondary controller. Do this by double-clicking on Primary IDE Channel. Then click the Advanced Settings tab. Ensure the Transfer Mode is set to "DMA if available" for both Device 0 and Device 1. Then repeat this process with the Secondary IDE Channel.
  9. Upgrade the cabling. As hard-drive technology improves, the cabling requirements to achieve these performance boosts have become more stringent. Be sure to use 80-wire Ultra-133 cables on all of your IDE devices with the connectors properly assigned to the matching Master/Slave/Motherboard sockets. A single device must be at the end of the cable; connecting a single drive to the middle connector on a ribbon cable will cause signaling problems. With Ultra DMA hard drives, these signaling problems will prevent the drive from performing at its maximum potential. Also, because these cables inherently support "cable select," the location of each drive on the cable is important. For these reasons, the cable is designed so drive positioning is explicitly clear.
  10. Remove all spyware from the computer. Use free programs such as AdAware by Lavasoft or SpyBot Search & Destroy. Once these programs are installed, be sure to check for and download any updates before starting your search. Anything either program finds can be safely removed. Any free software that requires spyware to run will no longer function once the spyware portion has been removed; if your customer really wants the program even though it contains spyware, simply reinstall it. For more information on removing Spyware visit this Web Pro News page.
  11. Remove any unnecessary programs and/or items from Windows Startup routine using the MSCONFIG utility. Here's how: First, click Start, click Run, type MSCONFIG, and click OK. Click the StartUp tab, then uncheck any items you don't want to start when Windows starts. Unsure what some items are? Visit the WinTasks Process Library. It contains known system processes, applications, as well as spyware references and explanations. Or quickly identify them by searching for the filenames using Google or another Web search engine.
  12. Remove any unnecessary or unused programs from the Add/Remove Programs section of the Control Panel.
  13. Turn off any and all unnecessary animations, and disable active desktop. In fact, for optimal performance, turn off all animations. Windows XP offers many different settings in this area. Here's how to do it: First click on the System icon in the Control Panel. Next, click on the Advanced tab. Select the Settings button located under Performance. Feel free to play around with the options offered here, as nothing you can change will alter the reliability of the computer -- only its responsiveness.
  14. If your customer is an advanced user who is comfortable editing their registry, try some of the performance registry tweaks offered at Tweak XP.
  15. Visit Microsoft's Windows update site regularly, and download all updates labeled Critical. Download any optional updates at your discretion.
  16. Update the customer's anti-virus software on a weekly, even daily, basis. Make sure they have only one anti-virus software package installed. Mixing anti-virus software is a sure way to spell disaster for performance and reliability.
  17. Make sure the customer has fewer than 500 type fonts installed on their computer. The more fonts they have, the slower the system will become. While Windows XP handles fonts much more efficiently than did the previous versions of Windows, too many fonts -- that is, anything over 500 -- will noticeably tax the system.
  18. Do not partition the hard drive. Windows XP's NTFS file system runs more efficiently on one large partition. The data is no safer on a separate partition, and a reformat is never necessary to reinstall an operating system. The same excuses people offer for using partitions apply to using a folder instead. For example, instead of putting all your data on the D: drive, put it in a folder called "D drive." You'll achieve the same organizational benefits that a separate partition offers, but without the degradation in system performance. Also, your free space won't be limited by the size of the partition; instead, it will be limited by the size of the entire hard drive. This means you won't need to resize any partitions, ever. That task can be time-consuming and also can result in lost data.
  19. Check the system's RAM to ensure it is operating properly. I recommend using a free program called MemTest86. The download will make a bootable CD or diskette (your choice), which will run 10 extensive tests on the PC's memory automatically after you boot to the disk you created. Allow all tests to run until at least three passes of the 10 tests are completed. If the program encounters any errors, turn off and unplug the computer, remove a stick of memory (assuming you have more than one), and run the test again. Remember, bad memory cannot be repaired, but only replaced.
  20. If the PC has a CD or DVD recorder, check the drive manufacturer's Web site for updated firmware. In some cases you'll be able to upgrade the recorder to a faster speed. Best of all, it's free.
  21. Disable unnecessary services. Windows XP loads a lot of services that your customer most likely does not need. To determine which services you can disable for your client, visit the Black Viper site for Windows XP configurations.
  22. If you're sick of a single Windows Explorer window crashing and then taking the rest of your OS down with it, then follow this tip: open My Computer, click on Tools, then Folder Options. Now click on the View tab. Scroll down to "Launch folder windows in a separate process," and enable this option. You'll have to reboot your machine for this option to take effect.
  23. At least once a year, open the computer's cases and blow out all the dust and debris. While you're in there, check that all the fans are turning properly. Also inspect the motherboard capacitors for bulging or leaks. For more information on this leaking-capacitor phenomena, you can read numerous articles on my site.

Following any of these suggestions should result in noticeable improvements to the performance and reliability of your customers' computers. If you still want to defrag a disk, remember that the main benefit will be to make your data more retrievable in the event of a crashed drive.

9/09/2008

Top MP3 Manca

Beatsteaks - Shut Up & Stand

Weezer - O

Incubus - I Miss You

Orkestr NKO SSSR - Krasnaya Moskva

Will Smith - Wild Wild West

Powerman 5000 - Free

A Tribe Called Quest - God Lives Through

Sugababes Ft. Sting - Shape Of My Heart

DELERIUM feat SARAH MCLACHLAN - Silence

Tose Proeski - Life is... (MKD

New Kids On The Block - Happy Birthday

R Downey And V Shepard - White Christmas

Bruce Lee - Enter The Dragon Theme

Mary J. Blige - Dance For Me

Simple Minds - Don't You Forget About Me

Barbara Streisand - Silent Night 4 Christmas

Kelly Rowland - Stole

Jimi Hendrix - Purple Haze

One Republic - Apologize

Three 6 Mafia 8 Ball Mjg Young Buck - Stay Fly

Beastie Boys - Shadrach

Darude - Sandstorm

Enrique Englesias - Maybe

Eagles - One of These Nights

Norah Jones - Don`t Know Why

Journey - Don T Stop Believing

Godfather - Italian Violin

Christmas - Wham-last

Lionel Richie - All Night Long

Muse - Supermassive Black Hole

Daddy Yankee Ft. Zion Y Lennox - Yo Voy

Michael Bublé - Song For You

Kenny Rogers - Through the Years

Joss Stone - Super Duper Love

Lloyd ft Ashanti - South Side

Snow Patrol - Chasing Cras [remix]

Sugababes - Hole In The Head

Zach Tison - White Trash Christmas

The Killers - Smile Like You Mean It

Busta Rhymes - Pass The Courvoisier Part Ii (club Mix)

Fatboy Slim - Smells Like Teen Spirit (remix)

Foo Fighters - Learn To Fly

Within Temptation - Angels

Paris Hilton - Screwed (excerpt)

Sade - By Your Side

Notorious Big - Big Papa

Berlin - Take My Breath Away

Bee Gees - To Love Somebody

Blue - Guilty

Tears For Fears vs. Evanescence - Shout-Going Under

Final Fantasy X - Lee Soo Young

Busted - What I Go To School For

Stevie Wonder - Isn't she Lovely

Jason Sturges - Jekyll And Hyde

Norah Jones - Shoot The Moon

Natasha Bedingfield - If You`re Gonna Jump

Jimi Hendrix - Christmas Medley

South Park - Timmy

Phantom Planet - California

Britney V Prodigy ( Jirob Remix ) - Britney V Prodigy

Audio Bullys Feat. Nancy Sinatra - Shot You Down 

SASH - Stay 

Oasis - Champagne Supernova

Nelly - Must Be The Money 

Eagles - There's a Hole in the World Tonight

Roxette - Milk And Toast And Honey 

Benny Benassi - Satisfaction (radio) 

Outkast - Hey Ya 

Natasha Bedingfield - Unwritten 

Spice Girls - Wannabe (Video) 

Savage Garden - The animal song 

The Game - New York 

Paul Van Dyk - Another Way 

Baby Bash - Sugar Suger mp3 

Massive Attack - 100th Window- FULL ALBUM 

Vangelis - Chariots Of Fire (main theme) 

Pet Shop Boys - Pet Shop Boys Megamix 

Keane - Somewhere Only We Know 

Jessica Simpson Ft Nick Lachey - Where You Are 

Aboriginal Christmas - have yourself a merry little ch... 

Led Zepplin - Stairway To Heaven 

Richie Valens - La Bamba 

Daft Punk - Around The World 

Soulja - Amandla 

Prodigy - Smack My Bitch Up 

Alicia Keys - Goodbye 

VILLAGE PEOPLE, The - YMCA 

Bob Sinclar - World Hold On 

Xzibit, Ciara, Jay-Z, Biggie - mister X Remix Party 41 

Slipknot - Spit It Out 

Sami Yusuf (www.Sarzamin.org) - 14_ Mother (Turkish) 

Klaus Badelt/arr. Ted Ricketts - Pirates of the Caribb... 

Snoop Dogg Ft Lil Uno B - Vato Remix 

Edwin Starr - War 

Destiny's Child - Independent Woman

Chingy Ft. Jermaine Dupri - Dem Jeans

Oasis - Stop Crying Your Heart Out 

Khia - My Neck My Back (dirty Version) 

Emmylou Harris - Evangeline 

Untuk lebih lengkapnya silahkan kujungi website di bawah ini. semua lagu-lagu manca terbaru dan yang paling banyak di download oleh orang juga tersedia disitu.

http://www.kohit.net/ <<<<>

Semoga membantu :D

Twitter Delicious Facebook Digg Stumbleupon Favorites More