Showing posts with label operating system. Show all posts
Showing posts with label operating system. Show all posts

Tuesday, December 29, 2009



 many viruses are spread by the end of this year, there was even an expert in programming to know a virus that spreads the end of this year. This malware has changed in the hard disk image into a file which is very dangerous once the virus has even invaded the latest operating system from microsoft ie 7 window.

an expert analysis of antiviral vaksincom Indonesia has declared it has detected the circulation of a malicious program with Autorun.ATSJ name. that a virus or malware is a variant of the virus that has dominated autorun virus in Indonesia ranked the period November to December 2009. virus variants have been hidden in a file called images in the hard disk and make a duplicate which is actually a malicious program as well. even the duplicate files that are created will have an icon image attract enough attention so that users are able to deceive all users.



according to antivirus expertise that the file is malicious or virus created by the script in C via a software AutoIt version 3 and the compression with UPX program. features - traits the virus is to use the icon-sized pictures of about 353 KB, and extension. EXE and a type of "application".

a phenomenon in your computer get infected if the virus is as follows:
infect your computer when the victim, then the virus will cause two very strange process in the task manager once. processes running in task manager called Jview and Shimgvw and will appear in the task manager windows operating system. if it has run victims windows 7 operating system, the virus seems to run a function to turn off user account control feature (AUC). but the virus is not able to run on OS window 7. virus even has the main purpose of deadly a feature of the OS is windows 7 security features center. and consequently update and warning functions of the OS window will have a very serious problem at all.

some antivirus that will be killed by the virus as well as, Ansav guard, ESET (NOD32), norman security suite, and McAfee security center. even more unique is more the virus can kill a virus that runs locally on the taskmanager process or on star up, such as: Blastclnn.exe, blastclnnn.exe, newfolder.exe, and SSCVIHOST.exe. The main symptom that caused the most obvious is he has the ability to plow and duplicate all the existing image files in your hard drive. files that will be the main target of the virus files have the extension jpeg, bmp, png, and gif.

the virus will spread through a peripheral device is a USB flash drive. other than that he will spread itself through a local network if the victim computer has a share folder or share data in a local network. careful - careful with the virus that is very unique and cruel this year. My info may be useful this time. thanks.


Wednesday, December 2, 2009



on this day I have removed some posts that virtual world is very warm today and people looking at this is about google chrome os. actual information that was very warm so the conversation by the master and the expertise of this world is about the emergence of the Internet browser that has a very useful service to the master or person who likes surfing the internet called google chrome, but a new computer operating system that will shift the existence microsoft or window will even destroy the window on the world of technology, the operating system was called google chrome os that you may not know the OS is. even people in this world do not know how the installation or running the google chrome os. you do not wish, if google chrome os / GCO is cheap what ya free? I would answer yes, google chrome os is 100% free, so you do not need another headache to think about to find the money to buy the latest OS from google. google chrome is due to be launched formally later in the year 2010. Google had expected the OS will first attract the attention of everyone in the world. even google has not officially launched the google chrome os / GCO for its users, but at this point google has released a service other than google chromium OS is open source project, you can read directly from the google blog system to find out details about its release chromium OS open source project.

for you who want and eager to learn, or taste how it feels to use the OS chrome, there are several websites that have provided a special link to all of you who want to use google chrome os for free.

if you want to use 2 operating systems in 1 computer or a laptop or a multi-OS, you must download software to support google chrome os / GCO as in: virualbox or VMware Player, and for those of you who use Macs can use the VMware Fusion software, without any cost to download the software. I offer to you, if you want to boot your computer directly to the google chrome os, you can install google chrome os on USB flash disk, please download to my USB drive version:


notes for you:
maybe you can not installing my os google chrome is not responsible if damaged in a previous OS it all becomes your own responsibility, and you can do a search from google's own google chrome how to install the OS, which may be widely available in Internet.

This may just be that posting today, may be useful for you all. please read it completely to understand the information that is very warm at this time and do not forget to give your comment on my post this time.
very bright at night is a lot of information sharing that have blogs I visit I do not even believe in it all. Today I'd like to share your information to all, was the owner of google, and linux have been discussing about the operating system maker that google chrome will be launched in 2010 but this will not date and day determined by google itself. even the OS that he says the launch was not perfect right now and have not done as linux own safety because the owner's own google not google chrome OS launches this year. even the two sides were talking in all media, to wait for the perfect time to launch a prime os google chrome from google itself and google chrome os itself will not be on sale will buy but can be obtained free of charge or open source operating systems like linux it alone. This may simply be information that I found waiting for more information from us. Do not forget to visit here continue to get the latest information from my weblog.

Saturday, October 31, 2009

Tag Technorati: {grup-tag},,
in this post I wanted to share my knowledge of command - the command in linux operating system that is less in interest by many people because it is less familiar but linux is really the same as DOS (disk operating system). but many people say, how do I install a program on linux OS? My answer was very relaxed really easy when we only installation program or application in linux we have to go first to the Comman Prompt or if the windows (DOS). we install the program with the command - the command or with the text. mouse or move the mouse we will no longer work but we are using the keyboard in penginstall is because we use words. so many people who say linux is hard to use once it is not. I want to give a glimpse of the command line is as follows:
Glance Command Line
Just as when we type the command in DOS command line or Linux command line is typed at the prompt and terminated by pressing the Enter key on your keyboard to execute the order.
Command line is a more efficient way to do any work. Therefore, Linux users still rely on this method to work. Beginners should also be aware of and at least once this use command line because one day the knowledge of these commands can be very necessary.
The following will explain some basic commands that may later be used primarily by beginners. Attention: knowledge of the commands that others will soon increase as you progress mastering this Linux operating system.
Explanation of each command will be shortened course and to find out more detail the functions of a command, you can see the manual, for example, by typing man command:
man is the command to display the manual of a command. The way to use it is to type man followed by the command we want to know the manual usage.
Example:
$ Man ls
The above command is used to show how to use the ls command in full.
Command-Linux Basic Commands
As a guide you, here's a list in alphabetical order. Actually, you can just press tab twice to see all possible commands that can be used. Suppose you want to know what the command begins with the letter a, then you just type a then press tab twice!
According Command Alphabetical List
\x26 Adduser alias bg cd cat chgrp chmod chown cp fg halt find grep gzip hostname login logout kill less ls man mkdir more mesg passwd mount mv pwd rm rmdir tail su shutdown umount talk tar unzip the wall who unalias xhost + xset zip
\x26
Command \x26 used to run commands on the back (background) Example:
Command \x26 used behind the other commands to run in the background. What is the street in the background? background road means we allow the system to execute the command itself without our participation, and free the shell / command prompt can be used to run other commands.
See also:
Please see also the bg and fg commands.
adduser
Adduser command is used to add users.
Usually only done by root to add users or new-account. After this command can be continued with the passwd command, the command to create a password for the user. Example:
# Adduser udin
# Passwd udin
Note that all commands that require root access, I have written here by using the sign #, to help you distinguish that the command does not need root access.
If you run the adduser command, you will be asked to enter a password for the user you created. Fill in the password for the new user twice with the same words.
alias
Used to provide another name from a command. For example if you want the ls command can also type the command dir executed with, then make like follows:
$ Alias dir = ls
If you like the colorful display, try experimenting with the following command:
$ Alias dir = ls-ar-color: always
To see the commands have any other name then, just type the alias alone (without argument). See also command unalias.
bg
To force a process is suspended (suspend) to run in the background. Suppose you're running a command in the foreground (without ending the order \x26) and a shell when you need it so you can pause the command with Ctrl-Z and then typing bg command to run the background. In this way you have to free the shell but still maintaining the old command running in the background.
See also command fg.
cat
Displays the contents of a file on the screen. Example:
$ Cat / name / of / file
cd
Change Directory or to move the directory and I think you will have no difficulty using this command because of how similar its use cd command in DOS.
chgrp
This command is used to change the group ownership of files or directories. For example to give permission to the group or groups in order to access a file. Writing syntax is as follows:
# Chgrp
chmod
Used to add and subtract users permission to access files or directories. You can use the numeric system of coding or letter coding system. There are three types of permissions / permits that can be changed as follows:
1. r for read,
2. w for write, and
3. x for execute.
By using the letter coding, you can change the permissions on the above for each u (user), g (group), o (other) and a (all) by only giving the plus sign (+) to add the permission and the minus sign (-) to revoke licenses.
For example to give permission to read and execute files coba1 the owner and group, the command is:
$ Chmod ug + rx coba1
To revoke such permits:
$ Chmod ug-rx coba1
By using a numeric coding system, the permissions for user, group and the other is determined by using a combination of numbers, 4, 2 and 1, where 4 (read), 2 (write) and 1 (execute).
For example to give permission to read (4), write (2) and execution (1) file coba2 to the owner, his orders are:
$ Chmod 700 coba2
Another example, to give permission to read (4) and write (2) coba3 files to a user, please read (4) only to the group and the other, the command is:
$ Chmod 644 coba3
Caution: If you are hosting on Linux based servers, this command is very important for your data security. I recommend all the directories you need not write in chmod 100 (if the Apache way as the current user (you)) or in chmod 501, if the Apache way as www-data or nobody (other users).
chown
Changing the user ID (owner) of a file or directory
$ Chown
cp
To copy a file or copy. For example to copy file1 to file2:
$ Cp
fg
Restoring a process that is stopped while (suspend) to run again in the foreground. See also the bg command above.
find
To find where the location of a file. This command will find files in accordance with the criteria you specify. The syntax is the command itself followed by the beginning of the directory name search, then the file name (can use wild cards, meta characters) and the last to determine how the search results will be displayed. For example to search for all files ending in. Doc in the current directory and display the results on the screen:
$ Find. -name *. doc-print
Example results:
. / public / docs / account.doc
. / public / docs / balance.doc
. / public / docs / statistics / prospek.doc
. / public / docs / statistics / presconf.doc
grep
Global regular expresion is parse or grep commands to find files containing text with the criteria you specified.
Format command:
$ Grep
For example to search for files containing text in the current marginal directory:
$ Grep marginal
diferent.doc: Note: the words used in the marginal area in economics prob.rtf: the function of marginal and marginal cost function if the function prob.rtf: if the marginal cost and marginal result is known then the total cost
gzip
This is a free version of the GNU zip compression functionality is to compress a file. The syntax is very simple:
$ Gzip
However you can give certain parameters if you need a file compression better, please see its manual page. See also the tar file, unzip and zip.
halt
This command can only be run by super user/You must log in as root. This command to tell the kernel to turn off the system or shutdown.
hostname
To display the host or domain name system and can also be used for host name setting system.
Example usage:
[user @ localhost mydirectoryname] $ hostname
localhost.localdomain
kill
This command will send a signal to a process that we set. The aim is to stop the process. Writing format:
$ Kill
PID is a number that will process the stop. Do not know where the PID process would be killed? Try experimenting with the command:
ps aux | grep
less
Functions such as command more.
login
To log into the system by entering a login ID or can also be used to switch from one user to another user.
logout
To get out of the system.
ls
Displays the contents of a directory as the dir command in DOS. You can use several options available to set the display on the screen. When you run this command without any options will be displayed throughout nonhidden files (files without the leading dot) in the alphabet and a broad-screen fill in the fields. Option-He does display all the files / all including hidden files (files with the prefix a dot) with the long format.
man
To display the manual page or text that explains in detail how to use a command. This command is very useful if you occasionally forget or do not know the functions and how to use a command.
$ Man
mesg
This command is used by the user to give permission to another user terminal display screen messages. For example you are in a position mesg y so other users can display a message on your screen to write or talk.
$ Mesg y or mesg n
Use mesg n if you do not want to be bothered with the display messages from other users.
mkdir
Make a new directory, the same as in DOS md command. a
more
Mempaging page, as well as less
mount
This command will mount the filesystem to a directory or mount-point specified. Only the superuser can run this command. To see what filesystems mount-pointnya and then, type the mount command. This command can you learn in the chapter on the filesystem. See also the command umount.
$ Mount
/ dev/hda3 on / type ext2 (rw)
none on / proc type proc (rw)
/ dev/hda1 on / dos type vfat (rw)
/ dev/hda4 on / usr type ext2 (rw)
none on / dev / pts type devpts (rw, mode = 0622)
mv
To move files from one location to another. If the second argument will be a directory mv will move the files to that directory. If the second argument is the name of the file the first file will overwrite the second file. Be in error if you enter more than two arguments except the last argument in the form of a directory.
passwd
Used to change the password. You will always be asked to fill in your old password and then be asked to fill in new password twice. Password consisting of at least six characters and contain at least one character.
pwd
Print working directory, or to display the name of your current directory where it was located.
rm
To delete a file and by default, rm does not remove directories. Use with caution, especially with this command option-r which can recursively delete entire file.
Once again: Be careful with this command!
rmdir
To remove an empty directory.
shutdown
This command to turn off the system, such as the halt command. On some systems you can stop the computer with the command shutdown-h now and restart the system with the command shutdown-r now or in combination with the Ctr-Alt-Del.
su
To login as a different user. If the user ID is not included then the computer thinks you want to login as a super user or root. If you are not root and other users have the password then you must enter the correct password. But if you are root then you can login as another user without the user knowing the password.
tail
Displaying 10 lines of a file. Default line shown is 10 but you can decide yourself how many rows you want displayed:
$ Tail
talk
To hold a conversation through a terminal. Input from the terminal you will be copied in other user terminals, so the opposite.
tar
Store and extract files from media such as tape drives or hard disk. Archive file is often referred to as tar files. Sintaknya as follows:
$ Tar
Example:
$ Tar-czvf namaFile.tar.gz / name / directory / *
The above command is used to include all the contents of the directory, and then compressed with tar format and in zipped with gzip, which produces a file named namaFile.tar.gz
$ Tar-xzvf namaFile.tar.gz
The above command to extract the files namaFile.tar.gz
umount
Is the reverse of the mount command, which is to unmount the filesystem from the mount-pointnya. After this command to be executed directory mount-point no longer be used.
# Umount
unalias
In contrast to the alias command, this command will cancel an alias. So to cancel the alias dir as has been exemplified above, use the command:
$ Unalias dir
unzip
Used to extract or compress files that describe the zip. syntax simple and will extract the files you specify:
$ Unzip
See also the commands gzip and unzip it.
wall
Sending messages and displays them in each user terminal being logged. This command is useful for the superuser or root to give a warning to all users, such as notification that the server will shut down for a moment longer.
# Wall Dear, everyone ... .. immediately save your work, I'll turn off the server 10 minutes.
who
To show who was logged. This command will display information about the login name, terminal type, login time and remote hostname for each user who was logged. For example:
$ Who
root ttyp0 May 22 11:44
flory ttyp2 May 22 11:59
pooh ttyp3 May 22 12:08
xhost +
This command is used to grant access or remove access (xhost -) host or user to a server X.
xset
This command to set some option in the X Window as a bell, mouse speed, fonts, screen saver parameters and so forth. For example the sound of the bell and the speed of your mouse can be set using this command:
$ Xset b
$ Xset m
zip
This command will create and add files to the zip archive file. See also command gzip and unzip it.

Tuesday, October 20, 2009

Tag Technorati: {grup-tag},,

for the users anti-virus avg heart seemed to be having this day guard, because the AVG antivirus AVG release we have not only the 9.0 version of AVG is paying 9, but they now have release most recent edition of AVG Free 9.0 or you can download for free and updates are free.

the AVG 9.0 is certainly a lot of new features have been added to complement the reliability of their anti-virus is. for the fans AVG anti-virus, AVG 9.0 you deserve try to deal with the emerging viruses in cyberspace or the internet.

avg 9.0 to 3 compatible operating system most recent version of windows xp, windows vista, windows 7. if you want to download  please click here!


if there is a problem with how to install the latest avg 9.0, please comment or contact me here !!!

Monday, October 19, 2009

 
Tag Technorati: {grup-tag}

before I give lessons or insights to you all about making the password in the flash, I thank you very much for you because it has been faithfully visiting my blog. but you should never tired of dwelling or to communicate in my place this very simple because I will give a very broad perspective of the technology world. I do not want to talk here because it will take a very long time if I told here, we immediately headed to the scene at once. post this time I want to share knowledge on how to make flash password without buying the software, but I will give knowledge about the script that I have learned, is as follows:
1. Open Notepad
(Here's how: Start _ All Programs_Accessories_Notepad or entered in notepaddan RUN then type Enter) and then copy and paste the following script code into notepad

on error goto 0
Dim s, quest, sd, m, winpath, fs
set sd = CreateObject ( "WScript.Shell")
set fs = CreateObject ( "Scripting.FileSystemObject")


set winpath = fs.getspecialfolder (0)
Set s = WScript.CreateObject ( "WScript.Shell")
do while my quest = ""
quest = InputBox ( "Enter a PASSWORD, if you enter the wrong password, the computer is going
http://www.alexa-com.co.cc !!!"," ShutDown")
if quest = "" then
m = MsgBox ( "Sorry you have not entered a password ...!", 0 +0 +48,"
http://www.alexa-com.co.cc ")
end if
loop
if quest = "
WRITE THE PASSWORD HERE 'then
s.run "shutdown-a"
sd.run winpath \x26 "\\ explorer.exe / e, / select," \x26 Wscript.ScriptFullname
else
s.run "shutdown-s-t 0"
end if



WRITE THE PASSWORD HERE your own locker, it is as a place of your password. Use of capital letters is very influential. I suggest using numbers that have been remembered by rote.
then save as a name with "passwordlock.vbs" without the quotes, before the save as sure select all files.
2. when you finish above.
then open Notepad again, to automatic settings after the flash is included in the computer.
copy and paste the following script code into notepad.

[Autorun]
shellexecute = wscript.exe passwordlock.vbs
action = FLASHDISK completed CODE


you can change the word "completed FLASHDISK CODE" according to the words of your own desires pearls.
after that do storage as the first file, but in the File name write "autorun.inf" without the quotes, before the save as sure select all files.
Then move the two files you created earlier (autorun.inf and passwordlock.vbs) into your flash.
last step please autorun.inf and hidden passwordlock.vbs made earlier.
How to hidden: right click on each autorun.inf and then select Properties passwordlock.vbs check the box on the sign is hidden. done. . . .
@ info
- support with windows XP.
- Please do not forget the password itself (spicy sweet love not responsible for their own password error)
you please comment on this post!

Friday, October 16, 2009


Tag Technorati: {grup-tag},
This post is for learners to all of you as possible at the time your computer by viruses or disable the master disable your computer can handle it all, so you do not have to call a computer technician in your village or town. because now a lot of new viruses that spread on the internet so we must be - the heart with a virus. virus spreads in Internet anti-virus is also spread on the Internet. so the master  virus or the antivirus makers competing each other but most of the virus that makes the antivirus experts in order that he made anti-virus can do much in cyberspace. but I will deal with only the virus scrips, manipulate script or a disable right click, which is as follows:


Entered into the Registry editor (must be logged in as administrator) click start -\x3e Click RUN -\x3e type Regedit -\x3e click OK 
� Go to HKEY_CURRENT_USER \\ Software \\ 
Microsoft \\ Windows \\ CurrentVersion \\ Policies \\ Explorer 
� In the blank area sebeleh right: right click -\x3e New -\x3e DWORD value -\x3e give name NoViewContextMenu

� Double click on the Value NoViewContextMenu and give the value of data 1 -\x3e click OK

� Re-start the computer 

Normalize again, repeat the steps - the steps above, then delete or give the value 0 in the Value data DWORD NoViewContextMenu.

Saturday, August 8, 2009

This time I will give my experience in working in the computer and play in the network, but in this post I will provide a very valuable lesson to you. because in this lesson I will give you a thing to fix all the computer systems or programs from the original windows xp or vista and also the other operating systems, such as this example: regestry, task manager, folder options, and many more. in this post I called with the name of covered slit - slit from microsoft that has been damaged by a virus, spam, crack or the other. actually to cover the slit - slit is very easy to cover it all, namely how to download the file from me or the other. but others will not have a file by that because I posting article I have been careful and I practical  in my computer and kepda computer - the computer people I have been correct.
simple way as follows:
1. Visit the Microsoft

2. Download the file from Microsoft below.

3. After the download is complete run the file immediately. MSI to disable the ActiveX control. To restore the initial settingan, download and execute files. MSI from the 'Workaround Disable' it.

Below is a list of the operating system that Microsoft is extremely vulnerable:








Saturday, June 6, 2009


Have tried Windows 7? master steps quickly computer with Windows 7, so that the performance of the operating system that is still testing it can be more steady.

1. MP3 song in order to remain intact

Windows 7 has a weakness in Windows Player 12 because it has a bad bug. This bug will automatically add the missing meta data, including album art. The problem this can cause the file is not intact anymore.

To fix, install updates from the Microsoft site.

2. Right click the The magic
• Right-click on the blank to set the desktop resolution screen, so no need to display the settings first.
• Right-click on the Explore icon in the task bar, to access the public folder system that is used as Documents, Pictures, and other more quickly.
• If do not want to use Internet Explorer and want to move from task bar, just right-click on the IE icon, select "Unpin this program from the task bar, and then install another browser.

3. Shortcut (shortcut) on the keyboard
• Alt + P: show To view or hide Explorer window
• Windows Logo + G: Showing the face of the gadget-windows windows other
• Windows Logo + + (plus key): Zoom in
• Windows Logo + - (minus key): Zoom out
• Windows Logo + Up: increase the size of window
• Windows Logo + Down: the window size
• Windows Logo + Left: Moving toward the left side of the screen
• Windows Logo + Right: Moving towards the right side of the screen
• Windows Logo + Home: minimize / restore window other than the current

4. Set the UAC (User Account Control)

Irritated with the number of 'warning' (alert) as in Windows Vista? Arrange the following steps: Start -> Control Panel -> Change User Account Control Settings.

5. Digital Writing

Windows 7 to finally provide the service 'burn 'ISO file directly to CD or DVD form. To easily, live double click on the file, select the drive with a blank disc and click Burn.

6. Access video faster

Right-click on the Start menu, then go to Properties -> Start Menu -> Customize, and set the video options on the "Display as a link." Can now access the folder with the short video.
7. For Flick
Have an account on Flick? To accelerate the opening, visit the site I Started Something, and its download Connector, and select Open. With this, "Flick Search 'will be added in the Searches folder, can also search for images via the desktop. Easy right?
Subscribe to RSS Feed Follow me on Twitter!