Showing posts with label computer. Show all posts
Showing posts with label computer. Show all posts

Sunday, January 3, 2010


Usually after pressing the "Power" on your PC, you will have enough time to brew a cup of coffee or tea due to the length of time it takes to boot your computer. Especially if your PC has a myriad of applications that are automatically lit, perhaps in addition to coffee, you can all shower and make breakfast first.

Without an increase in hardware performance are significant, it is not much you can do to speed up boot Windows. But there are ways to speed up the time needed by the desktop to achieve the condition "ready to work". Let's look at some way below, either use the capabilities already available and applications from the outside.

When you install a new application on your computer these days, not a few who immediately made him a startup program; to check whether an upgrade or just to remind users that the application has been installed as an icon in the lower right of the PC such as chat applications like Yahoo , MSN, Skype, etc.




The problem comes when you install many applications are rarely used, but they still appear on the startup process, it is consuming CPU cycles, memory and time. The easy way to handle it is to delete applications that do not use. Remove All Startup Item

While many programs that can clean startup applications, you really can do it manually without using additional applications.

The best place, safest and most basic to start doing this is the program group "Startup" in the "Start Menu" Windows. Mouse to navigate the "Startup" and see what the program appears. Right-click on programs that do not need active at startup and select "delete".



After doing this process, it comes out the ultimate style. Windows also can automatically activate the program from other places. Click the Start Menu, select "Run" then type "msconfig" and press [ENTER] to enter into the Windows system configuration functions. Move to the tab "Startup" to see a more comprehensive list of anything that came on automatically. Look below displays.




The list does look complicated and confusing. What is "ctfmon" or "RTHDCPL"? Column "command" which sometimes includes the location of the application, sometimes also can provide clues about the contents of the application. As usual, Google has always been your friend in situations like this.

From here you can remove the check mark on the application that you do not want to turn on the startup process. Do not remove the check mark on the application that you do not understand, begin the application that you know and not used. For example, if you're not a heavy user of iTunes or Quicktime, but the actual application on the PC installed to use sometimes, you can remove the check mark on "QTTask" and "iTunesHelper" and both these applications will no longer appear automatically when you restart the computer.

You can turn back the application by visiting the "msconfig" and do the above procedure again. Using "msconfig" it takes a little courage and knowledge of Windows users. But there are still other ways to do the same process using third-party applications and application cleaning. Download the Windows Optimization Program

Actually there are many other applications that have the ability to manage "startup", but let us look at two of the best course.

CCleaner (which stands for "Crap Cleaner") can check your system for many things and get rid of excess. Click the "Tools", then the "Startup" to achieve it. As you can see, this application offers more information than "msconfig" at the top and can help provide an explanation for existing programs. You can disable and remove everything from startup using these buttons.





If you do not want to install other software to clean your system, System Explorer comes in a portable version with a "startup manager" feature-rich, complete with the registry, viruses and online talker even a Google search for the file name. On the tab "system", click the tab "startup" to see what came on automatically on your PC. Here is a look.





As you see, just right-click, you can directly to the registry editor or do a search on Google ProcessLibrary.com or for an application. In addition, the program maker and the file path is also included, offering more information about an application and what you can do to turn it off.

Ccleaner and SystemExplorer addition, there's more like alternati MZ Ultimate Tweaker and RegToy. Defer Application Startup Process

Surely not just one program only result in slow startup of your PC, but the cumulative result of all. You might check the startup list and realize that you do need them all. But you may not need them all to begin at the same time when you want to check email in Outlook or do a report in a hurry.

Application Startup Delayer can delay the process of "startup" applications ranging from 20 seconds, several minutes, even to the unit of hours so you can start to work while your PC to start all the startup programs gradually. If for example we do not need the Java Updater to start every time the PC is turned on, we can delay the startup of this program a few minutes after the PC boots.





Do not Believe the Myths

Lots of myths, misperceptions and instructions on how to speed up the PC boot process in circulation. You must be careful in sorting it out. If you learn more about online tips for optimizing Windows, you'll find a way of deleting paging gile, clean the registry, set to use the PC core manually and many other tips. Before you do, try to first check a very interesting article about the myth of optimization of Windows Lifehacker.

Saturday, January 2, 2010


a very good news that the Apple tablet computer just faster news in the market. Apple company itself has designed an ambitious target of full computer touch screen that will be named iSlate, that the product will be produced and sold to 10 million units in 2010 and 2011.kai-fu Lee is a former Google executive who he said is very close to the project apple tablet, claiming that the predictions are in put in this blog. because he never runs Google's operations in parts of China.

so far Apple is the company can not officially announced when the apple is the release tablets. a very wide speculation circulating in the market and on the Internet, companies that have been founded by Steve Jobs will make an official press conference about the new product on January 26 next.


a former Google executive added that Apple will sell tablets valued at under U.S. $ 1000. and even the device from Apple is expected to sail on the 10.1-inch multitouch with the 3-dimensional graphics and revealing as the iPhone is very large.


These targets seem aggressive enough for a product that has not been too familiar, but if anyone can do it, chances are it is Apple, "said Rob Enderle, an analyst at the Enderle Group speculated about a million unit sales target was.



We certainly are familiar with pictures that adorned the display icon Desktop (screen) we. If you want to change the size of the icon images found on the desktop, the following tips will explain the ways to do it. You can zoom in or out according to your desire.

Icon is the pictures that are on the desktop screen is very useful for us in the processing speed of a program / application. Suppose there Ms.Word icon, the icon is so we can just double click to executing applications Ms.Word, we do not need to go to Start - All Programs - Microsoft Office - Microsoft Office Word. Shorter and more efficient to be one reason.

If we want to resize the image icon on the desktop, the settings made through the Registry editor / regedit. Therefore, before performing these tips are strongly advised to make backups registry editor / backup registry editor. This is very useful to avoid the computer becomes an error / stuck due to a mistake in practice.

As for the steps to implement this trick is as follows:

Click Start - Run, then type: regedit

Going to the menu HKEY_CURRENT_USER \\ Control Panel \\ Desktop \\ WindowMetrics

In the right window, click on the menu 2X Shell Icon Size. In the box that appears, fill in the Value data corresponds to our wishes.

To see the results, Restart / Log Off the computer

Standard number is 32. We could enter a smaller number than 32 if you want to reduce the size of the icon, and vice versa, we include a larger number if you want to enlarge the size of the icon

This is useful if your desktop has a number of icons very much that it makes the desktop 'crammed' with icons. Changing the size of the icon becomes smaller may make the desktop look more neat and more pleasing to the eye of course.

Good try.

Right-click function is a very good way to learn some of the hidden functions of Windows. Want more? Try you start exploring the Control Panel application and find some useful techniques. And there's more command-line application in the folder Windows' System32. But, none could compare to the Registry.

Registry complete with various useful settings to improve performance, improve security holes, and even change the fundamental basis of Windows to work better. Although very sophisticated look, you still need to be careful in using it because it is not just a feature that helps but also many pitfalls.

If not careful, you are actually adding to the problem of solving it. For that, below there are 20 hacks for you to try to make your PC better. Good luck!!

1. Increase Security
Someone who does not want can easily take your data with the USB if he managed to access your PC physically. If you're using Windows XP2 or later, there is a simple way to prevent it.

Navigate to "HKLM \\ SYSTEM \\ CurrentControlSet \\ Control \\ StorageDevi cePolicies", create a DWORD value called "WriteProtect" and set the value "1". You will be able to read the USB drive, but can not move the data into it again.

2. Control UAC
Full Vista's User Account so often led to warnings that eventually turned off by the user. But, sometimes it makes them miss features that are useful as protection mode for IE. You can control it how to disable the warning for the administrator, so you do not need to interfere, but the UAC still working on the background and you can still get its features.

To do this, go to "HKLM \\ Software \\ Microsoft \\ Windows \\ CurrentVersion \\ Po licies \\ System \\ ConsentPromptBehaviorAdmin", and set the value to "0". To return to normal conditions, set the value to "2".

3. Change Owner

Install Windows on your PC and you'll be prompted to enter a name, which will then be stored as the registered owner (WinVer run to see this on your system). If you buy a secondhand computer, you may want to change the name of the owner with his own name.  there's no other way than with the Registry.
br\u003e Go to the "HKLM \\ SOFTWARE \\ Microsoft \\ WindowsNT \\ CurrentVers ion" and will see two sentences "RegisteredOwner" and "RegisteredOrganization". Double-click on them to change.

4. Sort the files by True
Sort the file name in Explorer can become a problem. Initial settings, he would put "File_v2.txt" before "File_v15.txt", and sequences that are not ASCII, but it looks more reasonable. But, what if "v" refers to the version number, and should "File_v15.txt" in the previous order? At this time, initial system Explorer can not work at all.

To return the ASCII sort order based on the usual, go to "HKLM \\ Software \\ Microsoft \\ Windows \\ CurrentVersion \\ Po licies \\ Explorer", create a DWORD value called "NoStrCmpLogical" and set the value to "1". Delete the code if you want to go back to the initial conditions of the standard Explorer.

5. Troubleshoot Startup
If Windows takes too long to start up and shut down, he probably was having an issue. To find out what was happening back in "HKLM \\ SOFTWARE \\ Microsoft \\ Windows \\ CurrentVersion \\ Po licies \\ System", create a DWORD value called "verbosestatus" and set the value to "1". Restart your PC and Windows will tell you what is happening.

6. Organize Folder Types
Vista's explorer will intelligently choose the type of folder you based on its contents. However, this means your download folder will turn into the music folder if you downloaded some MP3. To fix this, go into the "HCU \\ Software \\ Classes \\ LocalSettings \\ Software \\ Micro soft \\ Windows \\ Shelf", delete the subkey "Bags" and create new ones at the same location.

Make a key called "AllFolders" under Bags, and other key named "Shell" at the bottom again. Then click her to open the "HCU \\ Software \\ Classes \\ LocalSettings \\ Software \\ Micro soft \\ Windows \\ Shell \\ Bags \\ AllFolders \\ Shell". Right-click on the right panel, select 'New | String Value "and call it" FolderType ". Then, double click on FolderType and set the value to "NotSpecified". You still can change the type of folder, but Vista will not change automatically. (If you need assistance, please click here)

7. Encryption Easily
Some versions of Windows allows you to encrypt files, although the process is a bit strange. You must right-click on the file, select "Properties", press the button "Advanced, check" Encrypt contents to secure data ", and press" OK "as much as 2x.

For a more simple way, go to "HKLM \\ SOFTWARE \\ Microsoft \\ Windows \\ Current \\ Version \\ E Xplorer \\ Advanced" create a DWORD called "EncryptionContextMenu" and set the value to "1". Now you simply right-click on the file and select "Encrypt".

8. Fast Folder Access
Quick access to folders bring it on the Start Menu, type "REGEDIT" in the "Run", go to "HKCR \\ Folder \\ shellex \\ ContextMenuHandlers", right-click "ContextMenuHandlers" and click "New | Key".

Type "and press [Enter]. Now, hold [Shift], right-click on a folder, and select" Pin to Start Menu ".

9. Accelerate Time copy
Vista gives a high priority for your soundcard, so you need to get a free audio of the problem no matter what your PC is a process. Because it can slow the process of copying the network.

To fix this, go to "HKLM \\ SOFTWARE \\ Microsoft \\ WindowsNT \\ CurrentVersion \\ Multimedia \\ SystemProfile". Try to set the "NetworkThrottlingIndex" became more 10 to 50 or 60 is quite effective, then reboot and test your network speed. For more information, click here.

10. Fix Listing Drive
If Explorer no longer displays your DVD drive, go to "HKLM \\ System \\ CurrentControlSet \\ Control \\ Class \\" and delete settings "UpperFilters" or "LowerFilters". These tips usually works, but sometimes can fail if the relevant application was problematic from the beginning. If the program stops working, see if there are updates, then reinstall.

11. Access to the Fast Display Settings
Just right-click on the desktop of Windows Vista is not enough to take you directly to the display settings menu. Windows 7 was prepared to fix this. But, for now you can do so by going to "HKCR \\ Directory \\ Background \\ Shell", right-click "Shell", select "New | Key" and called the "Display Settings".

Double-click "(Default)" there the right panel and enter the "Display Settings" in the Value Data box. Now, right-click "Display Settings" on the left panel, select "New | Key" again, and call this function as "command".

Double-click the Default value of new functions and enter the following text: "rundll32 shell32.dll, Control_RunDLL DESK.CPL, @ 0.3". Click "OK" and right-click on the desktop to see the option to display the new settings.

12. Live Messenger Multiple Log-In
Normally, Windows Live Messenger (WLM) only allows you to enter into only one account at a particular time. To make more than one, go to "HKLM \\ Software \\ Microsoft \\ WindowsLive \\ Messenger", create a DWORD value named "Multiple Instances" and set the value to "1". To restore to its original state, simply delete the value.

13. Clear Menu-Menu
You have to uninstall an application, but instead he left you a gift in the form of icons that are not useful. To fix this, go to "HKCR \\ *" and "HKCR \\ Directory". Dilate his panel, then select "shellex \\ ContextMenuHandlers" and see the various buttons on the bottom, which relate to orders you do not want.

On the PC, the function "HKCR \\ * \\ shellex \\ ContextMenuHandlers \\ 7-Zip" context menu related with 7-Zip, for example, to delete, click the "Delete" on the left panel. But be careful, you should delete only if it is 100% sure on the right menu.
14. Accelerate Back-Up
Features of Windows XP NTCBACKUP improve performance by maintaining a list of system files if he knows you will not be possible to make a back-up. Add the files and folders that you want yourself and get better results again.

See the list at "HKLM \\ SYSTEM \\ CurrentControlSet \\ Control \\ BackupResto re \\ FileNotToBackup".

15. Change the Default Installation Folder
Most of the default installation is a Program Files folder, but if you want to change it, go to "HKLM \\ SOFTWARE \\ Microsoft \\ Windows \\ CurrentVersio n", change "ProgramFilesDir" into the folder and reboot your choice

16. Changing Drive Name
Adding a memory card reader and the Explorer will often stop the computer folders that have names similar drives. ( "Removable Drive D:", "Removable Drive E:", and so on), making it difficult to distinguish.

You can handle the "HKLM \\ SOFTWARE \\ Microsoft \\ Windows \\ CurrentVersion \\ Ex plorer". Make a button with the letter of the drive (for example "G"), and inside it create another new key named "DefaultLabel". Double-click on the entered value, give the name "CompactFlash" (or whatever you want it), and click "OK". Restart Explorer or press [F5] and see the changes. Drive G: will be read as "CompactFlash (G".

17. Wipe the Page File
Windows stores memory pages on the paging file for your work. It all sounds good, until someone managed to access your system, find the files, and even add or reduce something you do not want.

To fix this, go to "HKLM \\ SYSTEM \\ CurrentControlSet \\ Control \\ SessionMana ger \\ MemoryManagement", set the value "ClearPageFileAtShutdown" to 1 and reboot. Windows will delete all files on the page when it is turned off. It extends the duration and processes, but improve safety.

18. Crash on Cue
Blue screen crash usually bring bad news, but sometimes you may want to bring it up to test the Windows error reporting for example. Apparently Registry tricks can help you even for this one thing.

Navigate to "HKLM \\ SYSTEM \\ CurrentControlSet \\ Services \\ i8042prt \\ P arameters", create a DWORD called "CrashOnCtrlScroll" and set the value to 1. Reboot your computer, and crashes to just hold [Ctrl] right and press [Scroll Lock] twice. When finished, make sure that you immediately remove these commands.

19. Save CPU Time
A standard PC usually has several programs that want to use processor capacity at the same time, and Windows will allocate each period of CPU time a "quantum" a move to the next program. By default, this is usually very short, so the PC will be responsive, but sometimes this means that Windows will make the time to move between these processes.

The solution? You can try what Windows Server do. Set the system to use a longer quantem. Set "HKLM \\ SYSTEM \\ CurrentControlSet \\ Control \\ PriorityCon Control \\ Win32PrioritySepartion" to 16 (hex).

Quantum older means less turnover among the programs so much less time is wasted. You may notice that lag in games or video playback will be more subtle. But, if you find other problems, simply return the value to be Win32PrioritySeparation original value of 26.

20. Disable Autorun
Autorun feature of Windows is one of the potential security risk because it runs the code automatically when you connect a removable device that is in the PC. If indeed, it can be manually set it, it would be safe to turn off the feature.

In some systems, it can only be done through the Registry. Go to "HKLM \\ SOFTWARE \\ Microsoft \\ WindowsNT \\ CurrentVersion \\ IniFileMapping" and create a button named "Autorun.inf".

Friday, January 1, 2010


maybe now a lot of very dangerous viruses that cause very severe problems even to spread very quickly and very inconvenient time. W32/Smalltroj.VPCG virus is a malicious program is currently looking for more victims on the Internet at the end of this year. This new virus will block access to several security websites and other websites that have been specified by way of transfer to the IP number 209.85.225.99 which is Google's public IP.

every time users to try to access certain websites, including websites or anti-virus security, so that appears not on the website but the website wants to www.google.com.

This 9 step following to clean W32/Smalltroj.VPCG the potion has a vaksincom:
1. Turn off System Restore during the cleaning process take place.

2. Decide who will clean your computer from the network or the Internet.

3. Change the name of the file [C: \\ Windws \\ system32 \\ msvbvm60.dll] to prevent the virus active again.

4. Perform cleaning by using the Tools Windows Live CD Mini PE. This is due to some rootkit files masquerading as services and drivers difficult to stop. Please download the software at the address http://soft-rapidshare.com/2009/11/10/minipe-xt-v2k50903.html

Then boot the computer using software Mini PE Live CD. After that deleting some files parent virus by:

l Click the [Mini PE2XT]
l Click the [Programs]
l Click the [File Management]
l Click the [Windows Explorer]
l Then delete the following files:

o C: \\ Windows \\ System32
§ wmispqd.exe
§ Wmisrwt.exe
§ qxzv85.exe @
§ qxzv47.exe @
§ secupdat.dat
o C: \\ Documents and Settings \\% user% \\% xx%. exe, where xx is a random character (example: rllx.exe) with a file size of 6 kb.
o C: \\ windows \\ system32 \\ drivers
§ Kernelx86.sys
§% xx%. Sys, where xx is a random character who has a size of 40 KB (example: mojbtjlt.sys or cvxqvksf.sys)
§ Ndisvvan.sys
§ krndrv32.sys
o C: \\ Documents and Settings \\% user% \\ secupdat.dat
o C: \\ Windows \\ inf
§ Netsf.inf
§ netsf_m.inf
 
5. Delete the registry created by the virus, by using the "Avas! Registry Editor", how:

l Click the [Mini PE2XT]
l Click the [Programs]
l Click the [Registry Tools]
l Click [Avast! Registry Editor]
l If the confirmation screen appears Kelik button "Load ....."
l Kemudain delete registry: (see figure 6)

Ø HKEY_LOCAL_MACHINE \\ software \\ microsoft \\ windows \\ currentvers
     on \\ Run \\ \\ ctfmon.exe
Ø HKEY_LOCAL_MACHINE \\ system \\ ControlSet001 \\ Services \\ kernelx86
Ø HKEY_LOCAL_MACHINE \\ system \\ CurrentControlSet \\ Services \\ kernelx86
Ø HKEY_LOCAL_MACHINE \\ system \\ CurrentControlSet \\ Services \\ passthru
Ø HKEY_LOCAL_MACHINE \\ SOFTWARE \\ Microsoft \\ WindowsNT \\ CurrentVersion \\ Image File Execution Options \\ ctfmon.exe
Ø HKEY_LOCAL_MACHINE \\ software \\ microsoft \\ Windows NT \\ CurrentVersion \\ winlogon

ü Change the string value to be Userinit = userinit.exe,
Ø HKEY_LOCAL_MACHINE \\ SYSTEM \\ CurrentControlSet \\ Services \\ SharedAccess \\ Parameters \\ FirewallPolicy \\ DomainProfile \\ AuthorizedApplications \\ List
ü% windir% \\ system32 \\ wmispqd.exe =% system% \\ wmispqd.exe: *: enabled: UPnP Firewall
Ø HKEY_LOCAL_MACHINE \\ SYSTEM \\ CurrentControlSet \\ Services \\ SharedAccess \\ Parameters \\ FirewallPolicy \\ DomainProfile \\ AuthorizedApplications \\ List
ü% windir% \\ system32 \\ wmispqd.exe =% system% \\ wmispqd.exe: *: enabled: UPnP Firewall
Ø HKEY_LOCAL_MACHINE \\ SYSTEM \\ CurrentControlSet \\ Services \\ SharedAccess \\ Parameters \\ FirewallPolicy \\ StandardProfile \\ AuthorizedApplications \\ List
ü% windir% \\ system32 \\ wmispqd.exe =% system% \\ wmispqd.exe: *: enabled: UPnP Firewall
Ø HKEY_LOCAL_MACHINE \\ system \\ ControlSet001 \\ Services \\% xx%
Ø HKEY_LOCAL_MACHINE \\ system \\ CurrentControlSet \\ Services \\% xx%

Note:
% xx% showing random characters, this key is made to run the file. SYS which has the size of 40 KB which is in the directory [C: \\ Windows \\ system32 \\ drivers \\]

6. Restart the computer, restore the remaining registry that changed by the virus to copy the following script in notepad and then save with the name repair.inf. Execute the following manner: right-click repair.inf | click install

             [Version]

Signature = "$ Chicago $"
Provider = Vaksincom

[DefaultInstall]
AddReg = UnhookRegKey
DelReg = del

[UnhookRegKey]

HKEY_LOCAL_MACHINE \\ SOFTWARE \\ Classes \\ batfile \\ shell \\ open \\ command ,,,"""% 1 ""% * "

HKEY_LOCAL_MACHINE \\ SOFTWARE \\ Classes \\ comfile \\ shell \\ open \\ command ,,,"""% 1 ""% * "

HKEY_LOCAL_MACHINE \\ SOFTWARE \\ Classes \\ exefile \\ shell \\ open \\ command ,,,"""% 1 ""% * "

HKEY_LOCAL_MACHINE \\ SOFTWARE \\ Classes \\ piffile \\ shell \\ open \\ command ,,,"""% 1 ""% * "

HKEY_LOCAL_MACHINE \\ SOFTWARE \\ Classes \\ regfile \\ shell \\ open \\ command,,, "regedit.exe"% 1 ""

HKEY_LOCAL_MACHINE \\ SOFTWARE \\ Classes \\ scrfile \\ shell \\ open \\ command ,,,"""% 1 ""% * "

HKEY_LOCAL_MACHINE \\ SOFTWARE \\ Microsoft \\ Windows NT \\ CurrentVersion \\ Winlogon, Shell, 0, "Explorer.exe"

HKEY_LOCAL_MACHINE \\ software \\ microsoft \\ ole, EnableDCOM, 0, "Y"

HKEY_LOCAL_MACHINE \\ SOFTWARE \\ Microsoft \\ Security Center, AntiVirusDisableNotify, 0x00010001, 0

HKEY_LOCAL_MACHINE \\ SOFTWARE \\ Microsoft \\ Security Center, FirewallDisableNotify, 0x00010001, 0

HKEY_LOCAL_MACHINE \\ SOFTWARE \\ Microsoft \\ Security Center, AntiVirusOverride, 0x00010001, 0

HKEY_LOCAL_MACHINE \\ SOFTWARE \\ Microsoft \\ Security Center, FirewallOverride, 0x00010001, 0

HKEY_LOCAL_MACHINE \\ SYSTEM \\ ControlSet001 \\ Control \\ LSA, restrictanonymous, 0x00010001, 0

HKEY_LOCAL_MACHINE \\ SYSTEM \\ ControlSet002 \\ Control \\ LSA, restrictanonymous, 0x00010001, 0

HKLM, SYSTEM \\ CurrentControlSet \\ Control \\ LSA, restrictanonymous, 0x00010001, 0

HKEY_LOCAL_MACHINE \\ SOFTWARE \\ Microsoft \\ Windows \\ CurrentVersion \\ Explorer \\ Advanced \\ Folder \\ SuperHidden, CheckedValue, 0x00010001, 0

[del]

HKCU, Software \\ Microsoft \\ Windows \\ CurrentVersion \\ Policies \\ System, DisableRegistryTools

HKCU, Software \\ Microsoft \\ Windows \\ CurrentVersion \\ Policies \\ System, DisableCMD

HKCU, Software \\ Microsoft \\ Windows \\ CurrentVersion \\ Policies \\ Explorer, NoFolderOptions

HKEY_LOCAL_MACHINE \\ SOFTWARE \\ Microsoft \\ Windows \\ CurrentVersion \\ Run, ctfmon.exe

HKEY_LOCAL_MACHINE \\ SYSTEM \\ ControlSet001 \\ Services \\ kernelx86

HKEY_LOCAL_MACHINE \\ SYSTEM \\ ControlSet002 \\ Services \\ kernelx86

HKLM, SYSTEM \\ CurrentControlSet \\ Services \\ kernelx86

HKLM, SYSTEM \\ CurrentControlSet \\ Services \\ mojbtjlt

HKEY_LOCAL_MACHINE \\ SYSTEM \\ ControlSet001 \\ Services \\ mojbtjlt

HKEY_LOCAL_MACHINE \\ SYSTEM \\ ControlSet002 \\ Services \\ mojbtjlt

HKEY_LOCAL_MACHINE \\ SYSTEM \\ ControlSet001 \\ Services \\ Passthru

HKEY_LOCAL_MACHINE \\ Software \\ Policies \\ Microsoft \\ Windows NT \\ SystemRestore

HKEY_LOCAL_MACHINE \\ SOFTWARE \\ Policies \\ Microsoft \\ Windows \\ windowsupdate, DoNotAllowXPSP2

HKEY_LOCAL_MACHINE \\ SOFTWARE \\ Policies \\ Microsoft \\ Windows \\ windowsupdate

HKEY_LOCAL_MACHINE \\ SOFTWARE \\ Microsoft \\ Windows NT \\ CurrentVersion \\ Image File Execution Options \\ ctfmon.exe

7. Delete temporary files and temporary Internet files. Please use the tools ATF-Cleaner. Download these tools in http://www.atribune.org/public-beta/ATF-Cleaner.exe addresses.

8. Restore back to the host file in Windows that has been changed by the virus. You can use tools Hoster, please download at the following address http://www.softpedia.com/progDownload/Hoster-Download-27041.html

Click the [Restore MS Hosts File], to restore the Windows hosts file.

9. For optimal cleaning and prevent re-infection, anti-virus scan with up-to-date and was able to detect this virus. You can also use Norman Malware Cleaner, please download at the following address http://www.norman.com/support/support_tools/58732/en.

Wednesday, December 30, 2009


a company licensed HDMI technology (high-definition multimedia) which LCC is a company that is a duty as responsible for the development of the quality of HDMI in the future. with Related with it they have now been introduced HDMI version 1.4 specification that will use a 3D format.

this caused a growing demand in the industry need a high specification in every - every device or enhancement in use. in January 2010 will be the title of the HDMI consortium, which will discuss issues such 3D format. but the information about the date of implementation was still in the know and the public informed.


as the standard HD connectivity globally, HDMI consortium was to understand the needs of technology on the market today.

new format of HDMI will be applied also in the broadcasting industry in addition to gaming and Blu-ray. associated with the digital broadcasting industry later this format will be used such devices set-top wall of the currently developed in the technology marketplace.


Sunday, December 27, 2009


I as a young technology observers from Indonesia that the technology in the world is growing rapidly this year. even there is a breakthrough that you might not expect it but the expertise and technology experts that it is a challenge that must be completed and in the future try to but it was the find and was in error, and it worked. asus has found a very unique breakthrough lifeline asus fans. a factory of Taiwan has released a motherboard that allows users to overclock via phone or mobile phone. but before many of the skills that overclock with a variety of ways but still managed but now companies in Taiwan have made the latest breakthrough very unique handphone or mobile use to overclock quickly and easily.


the technology already introduced in the motherboard they are still based on Intel chipsets that p55 republic of gamers (ROG) maximus extreme III. That's the motherboard that will use mobile phones or mobile phones to overclock. as previously or asus ROG motherboard with the Extreme III series is maximus asus also has offered a variety of new features and previous also more advanced as well as, four-way CrossFire, ROG connect and overclocking features other supporting increasingly sophisticated. But before it ROG connect the ever introduced in the previous row as the motherboard III maximus, maximus formula and III Gene. ROG connect with users can monitor and perform tuning their main system through a notebook or netbook with only USB only, which look a lot like a racing car technician.


ROG even connect it has a more sophisticated service and different from the others. ROG has a new feature that is unique once called RC bluetooth. RC Bluetooth allows users to overclocking via bluetooth via phone or mobile phone. RC bluetooth with the user can monitor the status of their systems and hardware can change the meter that has been provided wirelessly from your phone or PDA with bluetooth media alone. can race other than the user's computer, the feature can perform standard functions such as Bluetooth stereo music player, Skype instant messages, even you can access your internet through your Bluetooth mobile phone, and you can sync your phone or PDA. ROG even these have been used to design motherboards with easy example would be, for you to change its mode dial located on the rear panel of your PC Input / Output to switch between Bluetooth modes for overclocking and standards. hopefully useful yes.


Tuesday, December 22, 2009

is now increasingly widespread technology in use in life. want to do something must use the current technology. a few days ago there was an expert who can make a very cool software and a smile that can measure yourself. by using 3D mapping technology surface test results are very accurate at all, although people in the measure are not facing the camera or even a little spoiled as long as people look on his face but do not look behind it. scale given for the software until the 0% to 100%.


This addition to the software has other features that you can you can use to check directly with the several faces at once. for the process time of less than 0044 seconds (using a PC with a Pentium 4 processor 3.2 GHz. with a file size of just 46 Kb, can be installed on mobile devices.

sorry if there is no link to download because I forgot the link, I apologize to you all.

Monday, December 21, 2009



Your chance to work in offices with computer network systems, must each - each computer in use must have a name or IP address. the actual system as you all network users in the office or where you are, you can use the service as well as possible just to communicate between computers. can you imagine if you space your work with your friend's study apart but still within a network, you must have if your friend needs to SMS or call a friend even ordered.

with the network system is provided by the company to use the best and useful for your work. and you are in one network can communicate, communication as well as chat on facebook and yahoo messenger so you can save your credit.

you want to try the service, follow these steps - the steps below:

1. you must go into the control panel first



2. then you find the administrative tools and then direct you to the service alone, you try perhatiakan example image below.




3. you click 2 times on the option "Messenger" will display a window picture windows as below.


4. then you disable the option Automatic and then make you click ok. then when it's finished will return to the previous page, click again option "Messenger" then you click the option "Start".


5. then you wait until the process is complete, when it's finished you do it this way on your target computer. means that the computer must connect to the same settings in your computer and make sure you know the username and ip address of your target computer. after the above stages you have to do it right and good, it's time to start chatting with your friends with satisfaction and without cost. open command prompt and then when it appears you are typing messages to be sent to your friend. example "hello friend".



Sunday, December 20, 2009


maybe you Infections with a very sophisticated processor and high technology industries in the market in the world. you may not believe this but it's all I've tried on my own computer. if you are interested in tips and trick me this time? want to know, follow the steps - from my simple steps, as follows:

1. you open the RUN
2. then you type regedit in the RUN box earlier.
3. if you can go to regedit then follow the perbagian folder as below:
regedit --- HKLM ---  Hardware --- description --- System --- CentralProcessor --- 0 --- ProcessorNameString

when you get processornamestring, you can change the name processornamestring your liking. pentium how you want it to or whatever you want to give any names. tips and tricks that I use this time only mode on the computer or just display it all. but it can be made to the show style to others.





















Wednesday, December 16, 2009

increasing number of technologies that spread in the market, the more confused users of technology. even today there is the most expensive keyboard in the world, who can buy anything. want to know what kind of keyboard, see below:

1. happy hacking keyboard HP Japan, PFU LTD LTD ¥ 525,000 PFU of Ishikawa, Japan. an affiliate of Fujitsu is producing Happy hacking keyboard professional HP Japan, who in order to create a keyboard Handcoated Lacquer Urushi. this keyboard cover with many times with a special brush made of virgin hair, and then powder with gold dust. computer keyboard price amounted to ¥ 525,000 or about U.S. $ 4440. keyboard example below:




2. 2000-IS-DT, 2000-IS-PM Stealth Computer $ 2,200.00
want to fight with your keyboard! stealth computer makes this device aims to reduce the risk to a failure in a very dangerous area once, in 2000-IS-DT and 2000-IS-PM comes sealed non-corrosive stainless steel with optical isolated barriers ensure NEMA (National Electrical Manufacturers Association) 4 times the protection. What other keyboard has a temperature range of -40 F to 194 F (-40 C to 90 C)? stealth makes a lot of expensive steel NEMA keyboard, but this one is like the most expensive in the world.
example keyboard:



3. TouchStream LP, $ 1500 + Fingerworks
mystical time the keyboard was originally retailing for $ 340 but because the finger works have been purchased and no longer produce the keyboard. touchstream record in the major conditions have started to sell at prices increase dramatically and so fantastic in the market. you can find on ebay, if you do not mind spending your money on these computer accessories.
example keyboard:



4. Executive Keyboard, Maltron £ 550.00
Ergonomic keyboard produces Maltron they want to reduce the pressure on the fingers, wrists, and arms while typing. This is one of those new models are made with Perspex, Stainless-Steel and Polycarbonate key.
example keyboard:




5. Dual Handed Ergonomic 3D, Maltron £ 375.00, £ 435.00
Get Maltron Qwerty keyboard, Maltron or Dvorak layouts! There is also, in the UK United States, British English, French, German, Norwegian / Norsk and Sweden. In italics, the key to match the finger movements and the key to more fingers hidden. Getting a trackball on your crazy 3d keyboard will cost an additional £ 65.
example keyboard:




6. Professional II ™, Datahand $ 675.00
What if the keyboard can be customized to fit the size and shape of each person's hand? We have Datahand! Unique finger and thumb typing switch to change modes is different.
example keyboard:



7. Keyless ergonomic keyboard, orbiTouch $ 399.00
OrbiTouch keyless ergonomic keyboard creates a keystroke when you slide the two holes in one of their respective changed forward position. You type the different characters by sliding the hole to create the letters and numbers. The orbiTouch keyless ergonomic keyboard also has a unique Mouse, so move the complete hole, giving you the ability of mouse and keyboard with comfortably.
example keyboard:





8. Comfort Keyboard, Comfort Keyboard Systems $ 349.00
The Comfort Keyboard is separated into three parts, which can be adjusted easily and locked into place. The Comfort Keyboard also features complete key reprogramming and programmed "rest time indicator", which reminds users to take a break?
example keyboard:




9. Wireless Entertainment Desktop 8000, Microsoft's $ 249
This keyboard, which is also known as the Ultimate Keyboard, because it features a magnetic dock with the May 4 USB ports. Ultra-slim ergonomic design is influenced by inspiration from Cadillac and BMW car interior. Aluminum makes this keyboard quite attractive.
example keyboard:



10. Optimus keyboard, Art Lebedev Studio $???
We could not complete the list without OLED Keyboard keyboard. We've heard rumors it will cost $ 1200, but OLED screens actually keyboard a in the list of the most expensive keyboard at the time of production? So far, there is only 3d rendering, but it has been reported a working model will debut at CeBIT later this month.
example keyboard:



 keyboard on keyboard ataslah the most expensive in the world and even many people who can not afford it. I hope this post useful.

Sunday, December 13, 2009

a small laptop or mini computer that can be carried anywhere by the user. many laptop brands that spread and are sold in the industrialized world, and even laptops have also pirated. laptop that I found in my life this is the laptop that is rare in the find and in use by the people. usually people use accer laptop, asus, compaq, and much more. but this laptop different from others, he has a very interesting aspect for you as well as, body slender laptop, the laptop is not too big like a laptop but he's usually not a notebook yes. remember! I even have different operating systems at all with other laptops. This laptop is very strange that he's operating system is not in use recognize. but the specs are the same laptop accer laptop, compaq laptop, and even this very specifications huge. He has bluethout, infared, wifi, camera resolution is quite good and almost the same as Apple laptops specifications.

try laptop but unfortunately the laptop was bought abroad. and answer questions from my laptop is using what operating system?

Do not forget to answer questions from me, you can give your answer in the comments alone. thanks so much for your participation. may be useful for you all.
hackers do you know what? hacker is an expert in the field of computers and programming. and do you know who the most ruthless hackers and sadistic around the world? want to know, anyone? come follow me below:

some hacker - hackers in the world's most sadistic and cruel is as follows:

1. Jonathan James
He is a native American, when he was 16 years old he was sent to prison for doing his behavior in cyberspace. department defense sites in the United States by breaking him. he at that time only said it was only a challenge for him and is a pleasure. NASA is also affected by the to ignorant him, James had stolen software on NASA's estimate for $ 1.7 million U.S. dollars. thus forced NASA to shut down the server and the system. because of his behavior, he also can not touch the computer for 10 years. but he now has on the right path and make a security company in the computer field.

2. Andrian Lamo
I do not know the origin because he did not mention where the original, but he has a record of its own, that he had broken into NEW YORK TIMES to get personal info and a few security number and he never broke into the Microsoft. and he was finally in a fine of $ 65,000 U.S. dollars. This time he was a speaker at a seminar.

3. Kevin Mitnick
This is the legend of a most ruthless hackers around the world, he really - really an expert in the world of hacking. behavior in ever done in cyberspace, as follows:
- Use Los Angeles bus transfer system for getting a free ride.
- To fool the FBI.
- Hacking into the DEC system (Digital Equipment Corporation).
- Get position administrator in one of IBM computers in order that he can win in gambling, because the admin who have the IBM laptop.
- Hacking motorola, NEC, Nokia, Sun Microsystems and Fujitsu Siemens System and many more, act more extraordinary.

4. kevin Poulsen
He is also known as Dante's dark, he'd do piercing in the FBI database. other than that he also had the entire line phone hacking station because he was very adept in the world of hacking through the phone lines. This time he became a senior editor at Wired News, and he never managed to catch the 744 people sex bidders through myspace profiles.

5. Karl Koch
He came from Hannover Germany calling computer FUCKUP (First Universal Cybernetic-Kinetic Ultra-Micro Programmer). He made several successes in to hack at the 1985-1988 period. He is also a successful crack cocaine addict.he several U.S. military systems and to hack a U.S. nuclear energy center in the era of cold war and the results hacking sold to the KGB (Soviet Secret Agent). He was found dead in 1988, according to the info he burned his own body, but who knows this is a high-level conspiracy between the U.S. and Soviet cold war.

That's the face - the face of a hacker's most cruel and sadistic world, and my actions have put there.

Saturday, November 14, 2009



This time I wanted to share the knowledge about the connection speed in firefox that is widely used by you, but I had previously posted about the software of your Internet connection speed is used netscream but this post for additional browsing software that uses firefox. very very simple way is as follows:





pipelining on the book type filter. to network.http.pipelining you change the value to True, and to raise the value to network.http.pipelining.maxrequests 8. now you type books max connections on the filter. network.http.max-connections to raise the value to 96, and for network.http.max-connections-per-server raises the value to 32.

the above is a very simple way that I have ever tried on my computers and laptops that have been held and the people who fix computers and laptops. good luck, may be useful for you all.

Thursday, November 12, 2009


sorry to all because I forgot to post because I used a lot of time to school and doing the work not completed on this day. This evening I took time to post that is useful for the software you are about learning to type with 10 fingers quickly. you live alone software download that I have provided for you with a full version without having to buy and it was not softwre trial. This actually make you all but this is special for the newbie or novice computer, and you may also want to learn a little typing.

typing software free download 10 fingers

Please download your heart's for sale or for courses in typing a friend. good luck would be useful for you who have not nimble fingers to type 10 must be after using the software must be able to beat me and master - the master others. thank you so much for the support.

Thursday, November 5, 2009

Saturday, October 31, 2009

Tag Technorati: {grup-tag},,
in this post I wanted to share my knowledge of command - the command in linux operating system that is less in interest by many people because it is less familiar but linux is really the same as DOS (disk operating system). but many people say, how do I install a program on linux OS? My answer was very relaxed really easy when we only installation program or application in linux we have to go first to the Comman Prompt or if the windows (DOS). we install the program with the command - the command or with the text. mouse or move the mouse we will no longer work but we are using the keyboard in penginstall is because we use words. so many people who say linux is hard to use once it is not. I want to give a glimpse of the command line is as follows:
Glance Command Line
Just as when we type the command in DOS command line or Linux command line is typed at the prompt and terminated by pressing the Enter key on your keyboard to execute the order.
Command line is a more efficient way to do any work. Therefore, Linux users still rely on this method to work. Beginners should also be aware of and at least once this use command line because one day the knowledge of these commands can be very necessary.
The following will explain some basic commands that may later be used primarily by beginners. Attention: knowledge of the commands that others will soon increase as you progress mastering this Linux operating system.
Explanation of each command will be shortened course and to find out more detail the functions of a command, you can see the manual, for example, by typing man command:
man is the command to display the manual of a command. The way to use it is to type man followed by the command we want to know the manual usage.
Example:
$ Man ls
The above command is used to show how to use the ls command in full.
Command-Linux Basic Commands
As a guide you, here's a list in alphabetical order. Actually, you can just press tab twice to see all possible commands that can be used. Suppose you want to know what the command begins with the letter a, then you just type a then press tab twice!
According Command Alphabetical List
\x26 Adduser alias bg cd cat chgrp chmod chown cp fg halt find grep gzip hostname login logout kill less ls man mkdir more mesg passwd mount mv pwd rm rmdir tail su shutdown umount talk tar unzip the wall who unalias xhost + xset zip
\x26
Command \x26 used to run commands on the back (background) Example:
Command \x26 used behind the other commands to run in the background. What is the street in the background? background road means we allow the system to execute the command itself without our participation, and free the shell / command prompt can be used to run other commands.
See also:
Please see also the bg and fg commands.
adduser
Adduser command is used to add users.
Usually only done by root to add users or new-account. After this command can be continued with the passwd command, the command to create a password for the user. Example:
# Adduser udin
# Passwd udin
Note that all commands that require root access, I have written here by using the sign #, to help you distinguish that the command does not need root access.
If you run the adduser command, you will be asked to enter a password for the user you created. Fill in the password for the new user twice with the same words.
alias
Used to provide another name from a command. For example if you want the ls command can also type the command dir executed with, then make like follows:
$ Alias dir = ls
If you like the colorful display, try experimenting with the following command:
$ Alias dir = ls-ar-color: always
To see the commands have any other name then, just type the alias alone (without argument). See also command unalias.
bg
To force a process is suspended (suspend) to run in the background. Suppose you're running a command in the foreground (without ending the order \x26) and a shell when you need it so you can pause the command with Ctrl-Z and then typing bg command to run the background. In this way you have to free the shell but still maintaining the old command running in the background.
See also command fg.
cat
Displays the contents of a file on the screen. Example:
$ Cat / name / of / file
cd
Change Directory or to move the directory and I think you will have no difficulty using this command because of how similar its use cd command in DOS.
chgrp
This command is used to change the group ownership of files or directories. For example to give permission to the group or groups in order to access a file. Writing syntax is as follows:
# Chgrp
chmod
Used to add and subtract users permission to access files or directories. You can use the numeric system of coding or letter coding system. There are three types of permissions / permits that can be changed as follows:
1. r for read,
2. w for write, and
3. x for execute.
By using the letter coding, you can change the permissions on the above for each u (user), g (group), o (other) and a (all) by only giving the plus sign (+) to add the permission and the minus sign (-) to revoke licenses.
For example to give permission to read and execute files coba1 the owner and group, the command is:
$ Chmod ug + rx coba1
To revoke such permits:
$ Chmod ug-rx coba1
By using a numeric coding system, the permissions for user, group and the other is determined by using a combination of numbers, 4, 2 and 1, where 4 (read), 2 (write) and 1 (execute).
For example to give permission to read (4), write (2) and execution (1) file coba2 to the owner, his orders are:
$ Chmod 700 coba2
Another example, to give permission to read (4) and write (2) coba3 files to a user, please read (4) only to the group and the other, the command is:
$ Chmod 644 coba3
Caution: If you are hosting on Linux based servers, this command is very important for your data security. I recommend all the directories you need not write in chmod 100 (if the Apache way as the current user (you)) or in chmod 501, if the Apache way as www-data or nobody (other users).
chown
Changing the user ID (owner) of a file or directory
$ Chown
cp
To copy a file or copy. For example to copy file1 to file2:
$ Cp
fg
Restoring a process that is stopped while (suspend) to run again in the foreground. See also the bg command above.
find
To find where the location of a file. This command will find files in accordance with the criteria you specify. The syntax is the command itself followed by the beginning of the directory name search, then the file name (can use wild cards, meta characters) and the last to determine how the search results will be displayed. For example to search for all files ending in. Doc in the current directory and display the results on the screen:
$ Find. -name *. doc-print
Example results:
. / public / docs / account.doc
. / public / docs / balance.doc
. / public / docs / statistics / prospek.doc
. / public / docs / statistics / presconf.doc
grep
Global regular expresion is parse or grep commands to find files containing text with the criteria you specified.
Format command:
$ Grep
For example to search for files containing text in the current marginal directory:
$ Grep marginal
diferent.doc: Note: the words used in the marginal area in economics prob.rtf: the function of marginal and marginal cost function if the function prob.rtf: if the marginal cost and marginal result is known then the total cost
gzip
This is a free version of the GNU zip compression functionality is to compress a file. The syntax is very simple:
$ Gzip
However you can give certain parameters if you need a file compression better, please see its manual page. See also the tar file, unzip and zip.
halt
This command can only be run by super user/You must log in as root. This command to tell the kernel to turn off the system or shutdown.
hostname
To display the host or domain name system and can also be used for host name setting system.
Example usage:
[user @ localhost mydirectoryname] $ hostname
localhost.localdomain
kill
This command will send a signal to a process that we set. The aim is to stop the process. Writing format:
$ Kill
PID is a number that will process the stop. Do not know where the PID process would be killed? Try experimenting with the command:
ps aux | grep
less
Functions such as command more.
login
To log into the system by entering a login ID or can also be used to switch from one user to another user.
logout
To get out of the system.
ls
Displays the contents of a directory as the dir command in DOS. You can use several options available to set the display on the screen. When you run this command without any options will be displayed throughout nonhidden files (files without the leading dot) in the alphabet and a broad-screen fill in the fields. Option-He does display all the files / all including hidden files (files with the prefix a dot) with the long format.
man
To display the manual page or text that explains in detail how to use a command. This command is very useful if you occasionally forget or do not know the functions and how to use a command.
$ Man
mesg
This command is used by the user to give permission to another user terminal display screen messages. For example you are in a position mesg y so other users can display a message on your screen to write or talk.
$ Mesg y or mesg n
Use mesg n if you do not want to be bothered with the display messages from other users.
mkdir
Make a new directory, the same as in DOS md command. a
more
Mempaging page, as well as less
mount
This command will mount the filesystem to a directory or mount-point specified. Only the superuser can run this command. To see what filesystems mount-pointnya and then, type the mount command. This command can you learn in the chapter on the filesystem. See also the command umount.
$ Mount
/ dev/hda3 on / type ext2 (rw)
none on / proc type proc (rw)
/ dev/hda1 on / dos type vfat (rw)
/ dev/hda4 on / usr type ext2 (rw)
none on / dev / pts type devpts (rw, mode = 0622)
mv
To move files from one location to another. If the second argument will be a directory mv will move the files to that directory. If the second argument is the name of the file the first file will overwrite the second file. Be in error if you enter more than two arguments except the last argument in the form of a directory.
passwd
Used to change the password. You will always be asked to fill in your old password and then be asked to fill in new password twice. Password consisting of at least six characters and contain at least one character.
pwd
Print working directory, or to display the name of your current directory where it was located.
rm
To delete a file and by default, rm does not remove directories. Use with caution, especially with this command option-r which can recursively delete entire file.
Once again: Be careful with this command!
rmdir
To remove an empty directory.
shutdown
This command to turn off the system, such as the halt command. On some systems you can stop the computer with the command shutdown-h now and restart the system with the command shutdown-r now or in combination with the Ctr-Alt-Del.
su
To login as a different user. If the user ID is not included then the computer thinks you want to login as a super user or root. If you are not root and other users have the password then you must enter the correct password. But if you are root then you can login as another user without the user knowing the password.
tail
Displaying 10 lines of a file. Default line shown is 10 but you can decide yourself how many rows you want displayed:
$ Tail
talk
To hold a conversation through a terminal. Input from the terminal you will be copied in other user terminals, so the opposite.
tar
Store and extract files from media such as tape drives or hard disk. Archive file is often referred to as tar files. Sintaknya as follows:
$ Tar
Example:
$ Tar-czvf namaFile.tar.gz / name / directory / *
The above command is used to include all the contents of the directory, and then compressed with tar format and in zipped with gzip, which produces a file named namaFile.tar.gz
$ Tar-xzvf namaFile.tar.gz
The above command to extract the files namaFile.tar.gz
umount
Is the reverse of the mount command, which is to unmount the filesystem from the mount-pointnya. After this command to be executed directory mount-point no longer be used.
# Umount
unalias
In contrast to the alias command, this command will cancel an alias. So to cancel the alias dir as has been exemplified above, use the command:
$ Unalias dir
unzip
Used to extract or compress files that describe the zip. syntax simple and will extract the files you specify:
$ Unzip
See also the commands gzip and unzip it.
wall
Sending messages and displays them in each user terminal being logged. This command is useful for the superuser or root to give a warning to all users, such as notification that the server will shut down for a moment longer.
# Wall Dear, everyone ... .. immediately save your work, I'll turn off the server 10 minutes.
who
To show who was logged. This command will display information about the login name, terminal type, login time and remote hostname for each user who was logged. For example:
$ Who
root ttyp0 May 22 11:44
flory ttyp2 May 22 11:59
pooh ttyp3 May 22 12:08
xhost +
This command is used to grant access or remove access (xhost -) host or user to a server X.
xset
This command to set some option in the X Window as a bell, mouse speed, fonts, screen saver parameters and so forth. For example the sound of the bell and the speed of your mouse can be set using this command:
$ Xset b
$ Xset m
zip
This command will create and add files to the zip archive file. See also command gzip and unzip it.
Subscribe to RSS Feed Follow me on Twitter!