Thursday, December 30, 2010

Scientists Discover with 1,000 Processors Chip Inside

0 comments
What comes to your mind about the chip with 1,000 processors in it? It's not corny, it's true there are chips and scientists in Scotland who have made it.

Scientists from the University of Glasgow is claimed, chip they can make a PC 'run' 20 times faster. Of course this is an interesting finding considering the average PC has only a processor with two to four cores, or there is also the 16 cores.

Dr Wim Vanderbauwhede who led the research, called the chip-making field programmable gate array (FPGA) is mentioned, although super speed, the FPGA is capable of processing about five Gigabytes of data per second is not wasteful of energy because it supports environmentally friendly technologies as well as saving electricity.


What comes to your mind about the chip with 1,000 processors in it? It's not corny, it's true there are chips and scientists in Scotland who have made it.
Photobucket

Scientists from the University of Glasgow is claimed, chip they can make a PC 'run' 20 times faster. Of course this is an interesting finding considering the average PC has only a processor with two to four cores, or there is also the 16 cores.

Dr Wim Vanderbauwhede who led the research, called the chip-making field programmable gate array (FPGA) is mentioned, although super speed, the FPGA is capable of processing about five Gigabytes of data per second is not wasteful of energy because it supports environmentally friendly technologies as well as saving electricity.

"I believe this kind of processor types will commonly be used in the future and help increase the speed of computers," said Vanderbauwhede.

Vanderbauwhede also mentioned such a super chip that made his team are also being developed by manufacturers such as Intel's big chip makers.
(Detik/Daily Mail)
taken from ketok.com

Wednesday, December 22, 2010

Replace Windows, China to Make Own OS

0 comments
Two developer companies operating system (OS) in China, the China Standard Software (CSS) and National University of Defense Technology (NUDT), in collaboration presents OS local brand to challenge the dominance of Microsoft's Windows platform.

Both the CSS and NUDT are both respected OS developer in his native country, considering the development of widely used products that local consumers. This seems to be used as capital for both a strategy to launch the OS named NeoKylin.

CSS and determined NUDT Windows ejecting from his country and wants to NeoKylin used all over the country's economic sectors in China.

"This cooperation agreement has more meaning as a way of developing an environment that is domestic OS stronger for China," said a spokesman for CSS.

CSS is pembesut NeoShine Linux desktop series, which includes also the OS is intentionally created for use among government, business and personal computers. While NUDT, develop alternative KylinOS as security against foreign software such as Windows.

Two developer companies operating system (OS) in China, the China Standard Software (CSS) and National University of Defense Technology (NUDT), in collaboration presents OS local brand to challenge the dominance of Microsoft's Windows platform.
windows xp

Both the CSS and NUDT are both respected OS developer in his native country, considering the development of widely used products that local consumers. This seems to be used as capital for both a strategy to launch the OS named NeoKylin.

CSS and determined NUDT Windows ejecting from his country and wants to NeoKylin used all over the country's economic sectors in China.

"This cooperation agreement has more meaning as a way of developing an environment that is domestic OS stronger for China," said a spokesman for CSS.

CSS is pembesut NeoShine Linux desktop series, which includes also the OS is intentionally created for use among government, business and personal computers. While NUDT, develop alternative KylinOS as security against foreign software such as Windows.

CSS-made software and NUDT actually used computers in government offices in China. Although demikia Still, Microsoft's Windows still dominates the use of OS in the country.

Not yet known when this OS will glide in China, because the CSS and NUDT still keep it a secret. Meanwhile, Microsoft has not anyone willing to provide comments related to this.
(Detik/ComputerWorld)
taken from ketok.com

Secrets Increase Browsing Speed

0 comments
For users of Mozilla Firefox browser, the following tips can increase the speed of your Mozilla Firefox up to 25% to 40%.

1. Open your Mozilla Firefox and type "about: config" (without quotation marks) in the address bar and press enter. ing scroll down and look for entries like this:

network.http.pipelining
network.http.proxy.pipelining
network.http.pipelining.maxrequests

2. Change the settings above entries like below, dg way to double-click on the entries or left-click-enter the entries:

Set "network.http.pipelining" to "true" (defaults to false)

Set "network.http.proxy.pipelining"to be true

set "network.http.pipelining.maxrequests " values like "32". means it will make 32 requests at once.

3.klik-right (anywhere) -> select New-> Integer. type nglayout.initialpaint.delay on prefence name, then set the value to "0" (zero).



For users of Mozilla Firefox browser, the following tips can increase the speed of your Mozilla Firefox up to 25% to 40%.
mozilafirefox

1. Open your Mozilla Firefox and type "about: config" (without quotation marks) in the address bar and press enter. ing scroll down and look for entries like this:

network.http.pipelining
network.http.proxy.pipelining
network.http.pipelining.maxrequests

2. Change the settings above entries like below, dg way to double-click on the entries or left-click-enter the entries:

Set "network.http.pipelining" to "true" (defaults to false)

Set "network.http.proxy.pipelining"to be true

set "network.http.pipelining.maxrequests " values like "32". means it will make 32 requests at once.

3.klik-right (anywhere) -> select New-> Integer. type nglayout.initialpaint.delay on prefence name, then set the value to "0" (zero).

4.Selesai. may also let you restart your computer more fresh ...!!!

By default Mozilla Firefox browser will make one request to a web page at a time. when enable pipelining it will make some pages in all. and will speed up page loading

Add FatestFox addon also browse the internet so you can more tightly again.

(trikatmgratis.blogspot.com)

Tuesday, December 14, 2010

PSP Phone Will Use Android OS

0 comments
Some photos and video that is expected is a mobile phone from Sony's PlayStation has been circulating on the internet in recent weeks. Some sources also reveal the specifications and capabilities of these devices. Sony Ericsson is expected to release a phone with the PlayStation brand is run with Android OS in February.

The first prototype of the PlayStation phone comes in late October yesterday. Indicates that the device is run by a 1GHz processor with 1GB of RAM and 1GB ROM memory, also reinforced by Google's Android OS. The device prototype was given the name of Zeus, but it is not clear which version to use.

Some photos and video that is expected is a mobile phone from Sony's PlayStation has been circulating on the internet in recent weeks. Some sources also reveal the specifications and capabilities of these devices. Sony Ericsson is expected to release a phone with the PlayStation brand is run with Android OS in February.

The first prototype of the PlayStation phone comes in late October yesterday. Indicates that the device is run by a 1GHz processor with 1GB of RAM and 1GB ROM memory, also reinforced by Google's Android OS. The device prototype was given the name of Zeus, but it is not clear which version to use.Photobucket

According to reports from the technology blog Engadget, several devices have been tested with Android 2.2 (Froyo), while others operated the new version 2.3 (Gingerbread).

Then, also according to Engadget, the PlayStation shown that mobile phones have microSD card slot, four-inch screen, and slide-out that resembles a PlayStation control pad, and others.

Overall, according to Engadget, the PlayStation phone device looks quite big and plastic bermaterikan, quite different from other Android phones Motorola kinds Droid Nexus S or X.

Until now, the Sony still deny the existence of the project from this phone. Maybe Sony will announce it officially at the Mobile World Congress in Barcelona in February.
(Okezone/PCWorld)
taken from ketok.com

Thursday, December 9, 2010

BlackBerry Onyx 2 Released in Indonesia

0 comments
One more option BlackBerry models entered in Indonesia. Teletama PT Artha Mandiri (TAM), one of three official distributors BlackBerry in Indonesia, bringing the BlackBerry Bold 9780 or Onyx 2.

"Onyx's first and second difference, once black, silver color dezel her. Onyx 2, dezel it was black," said Trisnawan Tjipto, Product Manager of PT TAM, during a press conference in Jakarta, Wednesday (8 / 12 / 2010). Onyx 2 has been introduced to the market since December 6, 2010 in a number of outlets in Jakarta TAM partners.

In addition, Onyx 2 comes with hardware and software specifications higher than the first version of Onyx. Onyx, among others, have been using the BlackBerry operating system OS 6. Memory capacity was 512 MB of RAM or two times larger than the first Onyx. The camera also has a 5 megapixel or higher than the 3.2 megapixel Onyx.

One more option BlackBerry models entered in Indonesia. Teletama PT Artha Mandiri (TAM), one of three official distributors BlackBerry in Indonesia, bringing the BlackBerry Bold 9780 or Onyx 2.Photobucket

"Onyx's first and second difference, once black, silver color dezel her. Onyx 2, dezel it was black," said Trisnawan Tjipto, Product Manager of PT TAM, during a press conference in Jakarta, Wednesday (8 / 12 / 2010). Onyx 2 has been introduced to the market since December 6, 2010 in a number of outlets in Jakarta TAM partners.

In addition, Onyx 2 comes with hardware and software specifications higher than the first version of Onyx. Onyx, among others, have been using the BlackBerry operating system OS 6. Memory capacity was 512 MB of RAM or two times larger than the first Onyx. The camera also has a 5 megapixel or higher than the 3.2 megapixel Onyx.

He said, Onyx 2 comes with two models, each with black and white. For black, Onyx 2 is sold at USD 4.899 million, while the white color USD 4.999 million. Each card is bundled with an offer prime Telkomsel BIS package subscription fee with unlimited subscription costs Rp 99,000 per month and a bonus discount of two months.
(kompas)

taken from ketok.com

Wednesday, December 8, 2010

Block Wikileaks, Paypal Hacker Attacked

0 comments
PayPal's decision to ban Wikileaks using online services to collect donations should be paid handsomely. Web site that provides online financial transaction services are under attack DDos (distributed denial of service) from hacker groups sympathetic to Wikileaks.

So far, PayPal's main service is not interrupted. The attack, which lasted for eight hours on Monday (6/12/2010) yesterday attacked the blog Paypalblog.com causing 75 percent access to the site disturbed.

Panda Security, a provider of Internet security solutions, reported that someone indeed launched a revenge operation against PayPal with a code of "Operation Avenge Assange". Posters are asking Internet users to attack a boycott of PayPal and was spread on the internet. It is unclear who is setting up this campaign of revenge and called himself "anonymous".


PayPal's decision to ban Wikileaks using online services to collect donations should be paid handsomely. Web site that provides online financial transaction services are under attack DDos (distributed denial of service) from hacker groups sympathetic to Wikileaks.Photobucket

So far, PayPal's main service is not interrupted. The attack, which lasted for eight hours on Monday (6/12/2010) yesterday attacked the blog Paypalblog.com causing 75 percent access to the site disturbed.

Panda Security, a provider of Internet security solutions, reported that someone indeed launched a revenge operation against PayPal with a code of "Operation Avenge Assange". Posters are asking Internet users to attack a boycott of PayPal and was spread on the internet. It is unclear who is setting up this campaign of revenge and called himself "anonymous".

Besides calling for the PayPal attack, the perpetrators of the poster also invited everyone to reproduce information on Wikileaks both with mirrors, CD, and even printed. He was also invited to disseminate information from Wikileaks via Twitter, MySpace, Facebook, and other social networking and state officials seeking comment about the information from Wikileaks and record comments. In fact, the poster who cited comments U.S. poet John Terry Barlow on opening a massive demonstration calling for freedom of disseminating information.

"The first serious infowar is now engaged. The field of battle is WikiLeaks. You are the Troops," said John Perry Barlowdi Twitter quoted in the poster. The point of serious information warfare has just happened with Wikileaks as an arena and you all are soldiers. (kompas)
taken from ketok.com

Tuesday, November 30, 2010

Mobile Android Wanted More Than iPhone

0 comments
A survey revealed even if the iPhone 4 in the sixth as the most wanted gadgets.

A survey conducted by mobile phone comparison site, Good Mobile Phone, find if almost all phones made by HTC, both Wildfire, Desire and Desire HD is ranked third as the most wanted phone on the site. While the iPhone 4 in the sixth.

"Right now HTC is trying to open the eyes of consumers to the existence of the mobile phone. Even those trying to take over the dominance of Apple's iPhone in the handset market," said Managing Director of Good Mobile Phone, Mark Owen.

According to him, the survey results are evidence if HTC started to lead to consumer demand for the smartphone business.

Even in the survey, Samsung and Nokia N8 Galaxy S is also still leading mobile phone as the most sought after by consumers, rather than the iPhone. Time position to 10, respectively filled by Blackberry Curve 8520, Samsung Tocco Lite, Blackberry and Sony Xperia X10 Torch Mini.

Apple iPhone 4 was not very popular in the eyes of shoppers. A survey revealed even if the iPhone 4 in the sixth as the most wanted gadgets.

A survey conducted by mobile phone comparison site, Good Mobile Phone, find if almost all phones made by HTC, both Wildfire, Desire and Desire HD is ranked third as the most wanted phone on the site. While the iPhone 4 in the sixth.

"Right now HTC is trying to open the eyes of consumers to the existence of the mobile phone. Even those trying to take over the dominance of Apple's iPhone in the handset market," said Managing Director of Good Mobile Phone, Mark Owen.

According to him, the survey results are evidence if HTC started to lead to consumer demand for the smartphone business.

Even in the survey, Samsung and Nokia N8 Galaxy S is also still leading mobile phone as the most sought after by consumers, rather than the iPhone. Time position to 10, respectively filled by Blackberry Curve 8520, Samsung Tocco Lite, Blackberry and Sony Xperia X10 Torch Mini.

Owen claimed to be surprised with the results of this survey. The reason, many respondents are not too concerned with the existence of the Apple iPhone. He said this is because the price is quite expensive bandrol and budling with operators to make the consumer back to buy the iPhone.

Today most Android handset equipped with the Android operating system. According to Gartner data, made by the Android platform that currently occupies the second position in the global handset operating system market. Android control approximately 25.5 percent marketshare while IOS iPhone only approximately 16.7 percent.
(Okezone/Telegraph)
taken from ketok.com

How free internet

0 comments
Free Internet tips Indosat

here's tips and tricks that are useful for us is how to free internet via pc using mobile phones that use SIM Card from indosat im3

1. Sign in your-freedom.net
2. Download the software here
3. Toll not to Rp.0, -
4. Dial-up using APN: indosatgprs or indosatmms,
username and password empty it should not be filled
5. Open YF>> Status>> Configuration


Free Internet tips Indosat

here's tips and tricks that are useful for us is how to free internet via pc using mobile phones that use SIM Card from indosat im3

1. Sign in your-freedom.net
2. Download the software here
3. Toll not to Rp.0, -
4. Dial-up using APN: indosatgprs or indosatmms,
username and password empty it should not be filled
5. Open YF>> Status>> Configuration
6. Connection Server, the address: wap3g.indosat.com @ ems .. your-freedom.de
Indosatmms: mmsc.indosat.com: 443/mms @ SERVER @ ems .. your-freedom.de
Port: 443
Connection Mode: HTTPS
Mark Socks4 / 5 DNS encryption re-keying the original SSL for HTTPS.
7. Account Information completed according to the time you register at your-freedom.net
8. Settings Proxy Address: 10.19.19.19
Port: 8080
9. Save and exit.
10. Ports: Web Proxy mark.
11. 127.0.0.1 browser proxy settings
customized Web Proxy port.

Tuesday, November 23, 2010

How to Keep Your Laptop and Screen in a Good Shape

0 comments
1. Keep your notebook in a open area that has a good air circulation during the power on. Store it in a well circulated area too.

2. Keep drinks and any liquids away from your notebook because short circuits by liquid destroy notebooks often. Also keep any food away from your notebook. Do not eat over because the crumbs go in the keyboard that cause the keys fail eventually. Wash your hands before using your notebook. Avoid leaving dirt and stains on the touchpad and keys.

3. Be careful with the LCD screen. It is especially vulnerable. Close the lid gently holding two sides. Make sure there is nothing left on the keyboard. Hold and lift your notebook by its base, not by its LCD screen. Avoid scratching and putting pressure on the LCD screen. If LCD screen is broken, you can easily replace the screen for about $50-100 from laptop screen company.

4. When bringing your notebook from colder place to warmer, do not turn it on immediately. Let it warm a few hours first. Do not leave your notebook unattended in a car...


1. Keep your notebook in a open area that has a good air circulation during the power on. Store it in a well circulated area too.

2. Keep drinks and any liquids away from your notebook because short circuits by liquid destroy notebooks often. Also keep any food away from your notebook. Do not eat over because the crumbs go in the keyboard that cause the keys fail eventually. Wash your hands before using your notebook. Avoid leaving dirt and stains on the touchpad and keys.

3. Be careful with the LCD screen. It is especially vulnerable. Close the lid gently holding two sides. Make sure there is nothing left on the keyboard. Hold and lift your notebook by its base, not by its LCD screen. Avoid scratching and putting pressure on the LCD screen. If LCD screen is broken, you can easily replace the screen for about $50-100 from laptop screen company.

4. When bringing your notebook from colder place to warmer, do not turn it on immediately. Let it warm a few hours first. Do not leave your notebook unattended in a car.

5. Do not disconnect the plug from the power socket by pulling on the power cord. Plug in external connectors and devices into their proper slots. Insert drives into their slots carefully, in right position, and at the correct angle. Try to keep the cord and all wires away from the floor and your legs.

6. Use a special case when you carry the notebook. Do not drop the notebook. Its internal parts are very fragile.

7. Clean your notebook regularly. Shut it down before cleaning. You may use an old tooth brush to rid of the dust in the area around the fan.

source : wikihow.com

Monday, November 22, 2010

How To Blog We crowded Visitors

0 comments
This time I will explain how to blog or web site we crowded dikunjung many people.

here's how:

1. Give comments on the blog posts of others and do not forget to also put your blog address in the comment. Maybe this is a good way for people visiting our blog in the long term.

2. Update your blog with the news that is being discussed so much at this point. Or update your blog by posting a lasting example of posts that contain tips and tricks

3. Discover new ideas for making the posting, make your post look more attractive than a person


This time I will explain how to blog or web site we crowded dikunjung many people.

here's how:

1. Give comments on the blog posts of others and do not forget to also put your blog address in the comment. Maybe this is a good way for people visiting our blog in the long term.

2. Update your blog with the news that is being discussed so much at this point. Or update your blog by posting a lasting example of posts that contain tips and tricks

3. Discover new ideas for making the posting, make your post look more attractive than a person


4. Consistent and Often - often to post articles useful and beneficial, because people who come to the blog we want to get something useful for them. Many archives of our posts on search engines that automatically likely our blog ranking top in the eyes of search engines

5. Clever promote your blog to various social networking sites like (facebook.com, myspace.com, twitter.com, plurk.com). Never be ashamed - ashamed or hesitant

Sunday, November 14, 2010

Quick Tricks For Google Adsense Accepted

0 comments
This time I will share tips for acceptable instant for google adsense

here's how:

1. Have Blog / Website with english settings.
2. Choose Themes Blog / Website interesting and much-loved.
3. We create a blog on Blogspot (since gmail came from google).
4. Create a post interesting articles or useful at least 15 posts.
6. Make sure your blog / website indexed in Google and other search engines.
7. Use email from gmail.com to sign up for email Adsense (since gmail came from google).
8. Use keywords Use the much sought after by people.

This time I will share tips for acceptable instant for google adsense

here's how:

1. Have Blog / Website with english settings.
2. Choose Themes Blog / Website interesting and much-loved.
3. We create a blog on Blogspot (since gmail came from google).
4. Create a post interesting articles or useful at least 15 posts.
6. Make sure your blog / website indexed in Google and other search engines.
7. Use email from gmail.com to sign up for email Adsense (since gmail came from google).
8. Use keywords Use the much sought after by people.

Avoid Blog / Website of:

1. Not enough pages.
2. Visitors are few.
3. Sites that are not in accordance with the policy (hackers, pornography, etc.).

Thursday, November 11, 2010

Free Download Adobe Reader 9

0 comments
Adobe Reader software is the global standard for electronic document sharing. It is the only PDF file viewer that can open and interact with all PDF documents. Use Adobe Reader to view, search, digitally sign, verify, print, and collaborate on Adobe PDF files.

* View, print, and search PDF files, including PDF Portfolios and PDF maps
* Author, store, and share documents, and share your screen, using Acrobat.com services
* Experience richer content and greater interactivity with native support for Adobe Flash technology
* Review documents using familiar commenting tools such as sticky notes, highlighting, lines, shapes, and stamps (When enabled by Acrobat Pro or Acrobat Pro Extended)
* Digitally sign PDF documents (When enabled by Acrobat Pro or Acrobat Pro Extended)




Adobe Reader software is the global standard for electronic document sharing. It is the only PDF file viewer that can open and interact with all PDF documents. Use Adobe Reader to view, search, digitally sign, verify, print, and collaborate on Adobe PDF files.

* View, print, and search PDF files, including PDF Portfolios and PDF maps
* Author, store, and share documents, and share your screen, using Acrobat.com services
* Experience richer content and greater interactivity with native support for Adobe Flash technology
* Review documents using familiar commenting tools such as sticky notes, highlighting, lines, shapes, and stamps (When enabled by Acrobat Pro or Acrobat Pro Extended)
* Digitally sign PDF documents (When enabled by Acrobat Pro or Acrobat Pro Extended)

taken from filehippo.com

click here for download

Free Download Google Chrome 9.0.570.0 Beta

0 comments
Google Chrome is a browser that combines a minimal design with sophisticated technology to make the web faster, safer, and easier.

One box for everything

Type in the address bar and get suggestions for both search and web pages.

Thumbnails of your top sites

Access your favorite pages instantly with lightning speed from any new tab.

Incognito mode

Don't want pages you visit to show up in your web history? Choose incognito mode for private browsing.


Google Chrome is a browser that combines a minimal design with sophisticated technology to make the web faster, safer, and easier.

One box for everything

Type in the address bar and get suggestions for both search and web pages.

Thumbnails of your top sites

Access your favorite pages instantly with lightning speed from any new tab.

Incognito mode

Don't want pages you visit to show up in your web history? Choose incognito mode for private browsing.

Safe browsing

Google Chrome warns you if you're about to visit a suspected phishing, malware or otherwise unsafe website.

taken from filehippo.com

click here for download

Friday, November 5, 2010

How Keeping Your Password

0 comments
1. Reproduction Using Default Password
The default password is the password that we can be the first time. This default password should indeed be quickly replaced because of very vulnerable. The reason, the default password can be easily searched on google search, even there are listed the name of a machine, type and default password with a magnificent plastered on some website creators vendors.

Sometimes administrators fear of forgetting to change-change the default password, so that an intruder can take over the system with default passwords.

2. Prohibited Use Password Hint
Sometimes we are afraid to forget the password that was our entry into the system / account, so we need to create a reminder if we forget the password. Now this is called password reminder Hint, if we create a password hint question with this then we can quickly recall these forgotten passwords.

Likewise with the hackers, they'll experiment with us to guess the password in the password hint questions, over time the password will be predictable, if the questions listed in the password hint can be answered by the Guess password...


Passwords are secret codes that must be protected. Many negative things can happen when your password leak into the hands of others. Learn 7 tips to keep it brief.

1. Reproduction Using Default Password
The default password is the password that we can be the first time. This default password should indeed be quickly replaced because of very vulnerable. The reason, the default password can be easily searched on google search, even there are listed the name of a machine, type and default password with a magnificent plastered on some website creators vendors.

Sometimes administrators fear of forgetting to change-change the default password, so that an intruder can take over the system with default passwords.

2. Prohibited Use Password Hint
Sometimes we are afraid to forget the password that was our entry into the system / account, so we need to create a reminder if we forget the password. Now this is called password reminder Hint, if we create a password hint question with this then we can quickly recall these forgotten passwords.

Likewise with the hackers, they'll experiment with us to guess the password in the password hint questions, over time the password will be predictable, if the questions listed in the password hint can be answered by the Guess password.

3. Writing banned Password
Owners are often afraid to forget your password with the password has been entered, so the owner would write different passwords user id and password into other media such as a notebook, notepad, Stickies (mac), password folders, books, mobile phones and other.

It is also quite vulnerable to leaking. Why vulnerable? Because if the various equipment is lost, then all information about a user id and password are sooner or later will be known by the thief equipments / gadgets are missing.

4. Use a Strong Password
Owner passwords often using a short password only, if it could be shorter than 3 characters then the user will give a short password. Fortunately this time the system provides a minimum password length of 6 characters and a maximum of 254 characters. The longer a password the stronger it will be the password security.

Strong passwords can be created with a combination of numbers and letters and even a variety of other characters. Some admins are currently using a password that is long enough, coupled with encryption such as PGP key and others, so it is quite difficult to guess password.

5. always Change Password
Owners should periodically change your password for authentication password, the more frequent password changes, the better, because the more difficult the penebak password hacking account / your system. Changes to the password depends on the owner, could be a week, a month, three months, and others. Originally the owner does not forget the password that was changed earlier.

6. Do not Use Same Password on Multiple Accounts
Owners often forget and sometimes passwords frequently enough to create an account, so they each create a new account using the same user id and password are the same, this is very vulnerable and dangerous. Because these passwords through a single account, all accounts will be taken by the hacker.

7. Using Password Management
To help recall the various passwords and various accounts, we are often very difficult, but not to worry because it has many current applications to help organize our passwords. This application can be downloaded for free from the internet and paid, so that regardless of our account and whatever we can with the password easy to remember and re-opened, of course, to open it with an encryption method as well(detik)

taken from www.ketok.com

Tuesday, November 2, 2010

Free download CCleaner

0 comments
CCleaner is a freeware system optimization, privacy and cleaning tool. It removes unused files from your system - allowing Windows to run faster and freeing up valuable hard disk space. It also cleans traces of your online activities such as your Internet history. Additionally it contains a fully featured registry cleaner. But the best part is that it's fast (normally taking less than a second to run) and contains NO Spyware or Adware...


CCleaner is a freeware system optimization, privacy and cleaning tool. It removes unused files from your system - allowing Windows to run faster and freeing up valuable hard disk space. It also cleans traces of your online activities such as your Internet history. Additionally it contains a fully featured registry cleaner. But the best part is that it's fast (normally taking less than a second to run) and contains NO Spyware or Adware! :)

Cleans the following:

* Internet Explorer
* Firefox
* Google Chrome
* Opera
* Safari
* Windows - Recycle Bin, Recent Documents, Temporary files and Log files.
* Registry cleaner
* Third-party applications
* 100% Spyware FREE

(filehippo.com)

click here for download

New Search Engine, Blekko.com Released

0 comments
Search engines or search engine start Blekko.com released in beta on 1 November 2010. His presence becomes an alternative service in addition to Bing and Google. The project is supported with funding of 24 million U.S. dollars and began construction three years ago.

Blekko claims search engines are designed to eliminate spam that plural appears in search results by placing a sign slashtag or the slash in each search word. For example, / aikido, / beatles, / wow, / Twilight and / zen...

Search engines or search engine start Blekko.com released in beta on 1 November 2010. His presence becomes an alternative service in addition to Bing and Google. The project is supported with funding of 24 million U.S. dollars and began construction three years ago.

Blekko claims search engines are designed to eliminate spam that plural appears in search results by placing a sign slashtag or the slash in each search word. For example, / aikido, / beatles, / wow, / Twilight and / zen. Users can also make slashtag to note the topics that will be registered in Blekko, a follower slashtag already available, and view statistics for papers and data that have been crawled by Blekko. Not only that, Blekko also identifies how much data is written double or duplicate alias.

Blekko allows users to modify the column on the left as needed. Even open for users to make slashtag. Only, still requires to login first.

Blekko has been tested by 8,000 people who make different slashtag 3000. No fewer than 11 percent of existing users visited Blekko back every week.

Blekko CEO and founder Rich Skrenta Blekko Mike Markson did not have such lofty goals in the near future. However, they believe, when they built this site was visited one to two million visits per day it will be able to reap a profit.
(kompas)
taken in ketok.com

How to Keep Your Computer Clean and Safe

0 comments
Make sure that your computer's hard drive clean. There are a lot cleaner software such as CCleaner or TuneUp Utilities. This will help keep your computer.


Attempt was made to not download software from websites that strange or unclear. Make sure that the website is trusted, and even if you do something download - and feel useless - make sure you remove them from your computer...
Make sure that your computer's hard drive clean. There are a lot cleaner software such as CCleaner or TuneUp Utilities. This will help keep your computer.


Attempt was made to not download software from websites that strange or unclear. Make sure that the website is trusted, and even if you do something download - and feel useless - make sure you remove them from your computer.


Using a program to keep your computer clean is not the right idea. Using plenty of space and also can cause system errors. Instead of trying to use the tools that Windows has given you: Start> All Programs> Accessories> System Tools:


Run Disk Cleanup once a week to remove unnecessary (temporary files) files.


Run Disk Defragmenter to defrag your hard disk once a month (you do not need to over do it). Defragment after deleting some files and empty the Recycle Bin.


Defragment before installing a new program so they will not get fragmented in case there is a gap in the media when the hard drive will be installed.


Keeping your computer safe from viruses by ensuring that you are using a secure web browser. After all, prevention is better than cure. Research shows that Internet Explorer is more vulnerable and susceptible to attacks from hackers than other web browsers. Try using Firefox and McAfee Site Advisor add to it if you wish.


Use a good anti-virus (and you may use the internet security virus) and Windows firewall. Try Kaspersky Internet Security which seems safe. Do not download files from any website just because it may contain a virus, always scan your computer once a week and make sure anti-virus software up to date.

Thursday, October 28, 2010

How to Learn PHP Quickly

0 comments
One of the elements that separate professional websites from, although well designed, but amateur websites, is the backend code, unseen by most visitors. Programming code that runs in the background, and handles the functions of other professional sites, allowing to mail forms, logins, and other functions, controlled by programming scripts such as PHP, and JavaScript. Knowing how to utilize these tools and customize them to function within your site to function as you need them to....
One of the elements that separate professional websites from, although well designed, but amateur websites, is the backend code, unseen by most visitors. Programming code that runs in the background, and handles the functions of other professional sites, allowing to mail forms, logins, and other functions, controlled by programming scripts such as PHP, and JavaScript. Knowing how to utilize these tools and customize them to function within your site to function as you need them to.

Why Learn PHP?

The internet is full of freelance programmers who will be more than willing to create custom code for your sites, the only problem, is that you'll be hiring a stranger with no long-term interest in your site or it's future. By obtaining even a basic level of PHP, it's functions and how it works, you can not only save your site from potentially exposing your site's security and it's stability, but also level the playing field by gaining the knowledge of how to customize and enhance most aspects of your site, for yourself.

How Useful Is PHP

By being able to collect valuable data, run calculations and asses valuable other bits of data, PHP can become an integral and vital component to any webpage. While similar to HTML in some aspects, including is flexibility for creating pages as well as their content, creating simple, small fragments of code, when assembled, can allow multiple changes, across multiple pages or sites with simple and timely changes. Similar to how CSS pages can control content and layout of sites, PHP code can not only allow fast and sweeping changes to a site's layout or content, but it can also add new levels of functionality and customization that other HTML and other markup languages simply can't match.

What Do You Need to Learn?

Similar to other web languages, PHP requires no special tools or programs to be properly coded, instead simply a simple text editor is your most powerful tool. Some other tools available will warn you if and when your syntax is off or help you code by prompting for values or functions, but for the type of scripts needed for most web based applications, a simple text editor, such as notepad, is more than enough.

How To Get Started Learning

Being the second most popular web language, right behind HTML, PHP is not difficult to learn, nor find many training sites to start with. The only problem, is that most of the web based content found for free is either confusing, contradictory or assumes you have an acquired level of knowledge before starting. It is usually best to invest a little in your training, and get access to a fully serviced and professionally maintained service. Offering video tutorials, training packages and other testing options to make sure that you are progressing in your programming skills, are a key factor.

Finding good training is a challenge even in the best circumstances, so to help clear away some confusion and get you started in the right direction, you may want to visit PhP Training Blog to find some truly professional and reliable training sources.
by:John Kauri
http://www.goarticles.com/cgi-bin/showa.cgi?C=3528772

Monday, August 16, 2010

How to Make Articles Unique

0 comments
Do you own dozens of Private Label articles, and want to make them unique to escape search engine 'duplicate content' filters? Here's how to make your private label content unique - quickly and easily. It isn't rocket science, all you need is your word processor...and your wits!


1.Write a short introduction to the article, explaining what's in it and what your reader can expect to learn from it.

2.Half-way through the article, break the flow with a short editorial comment or a summary of what's been said until then, or 'preview' of what's coming.

3.At the end of the Private Label article, briefly summarize the primary message of the article, add a link to resources with more information or simply thank readers for visiting and invite them back.

4.The finished Private Label article will be completely unique, and significantly different from all other owners of the same content.



sourch:wikihow.com

Tuesday, August 10, 2010

How to Choose a Blog Host

0 comments
Building a blog website is facilitated by selecting a suitable hosting plan according to your needs and budgets. There are lots of hosting plans to choose from hosting providers, so be sure to read these steps to avoid the gimmicks.


1. Look for a company that is professional, reliable and responsible. It is important to sign up with one that has a 24-hour customer support line (for when your site goes down), and a money-back guarantee would be an excellent perk as well.

2. If your website used PHP or ASP, PERL, make sure the host supports it. Also, if you use .htaccess to monitor your traffic, your host

3. Be aware of how much disk space you’ll need. Most sites need less than 50 megabytes, but if you use lots of images and video and audio clips, you might need a little bit more space. You’ll also want to give yourself a bit of space for growth, or at least build this into your future goals.

4. Determine your bandwidth needs. This is done by a simple formula: page size (including clips and graphics) multiplied by page views per month. So, if you have 2000 hits to your main page that is 1 megabyte every month,then that is 2000 MB or 2 gigs per month.

5. Find out how many domains you can have. If you want to have multiple domains, make sure that your host will allow them. Multiple domains are a good idea if someone mistypes your URL.


sourch:wikihow.com

Sunday, August 1, 2010

How to Connect Your PS3 to a Wireless Mobile Broadband Connection Using Wi Fi

0 comments
1. Google "PS3 Media Server"

Ads by Google
Outdoor WiFi Beam Forming
GoNet Systems WiFi smart anttenna BST Combined with Dual radio Mesh
www.gonetworks.com


2.Download the latest version from the top link listed. The website should be a sub domain of blogspot.


3.Install the software and unless you know what you are doing just set up all defaults.


4.Share the folder(s) n your computer that you want to be able to access with your PS3.


5.Now make sure that your wireless is ON in both your router, and your PS3.


6.Add your WiFi connection to the PS3 under Settings (most likely this has already been done if you've owned your PS3 for some time.)


7.Search for media servers under Audio/Video and your should see PS3 Media Server as one of the options.


8.Select PS3 Media Server and browse it like you would on your computer.


9.If the file is supported by your PS3 then it will just play it, if the file is not supported (it will say bad date, or file is corrupted or something along those lines) the PS3 Media Server has on the fly transcoding which recodes your video or audio file on the fly into a format the PS3 can read/play. (Just select transcoded at the top the folder in which the file exists.)


source:wikihow.com

Thursday, July 29, 2010

How to Get Dial up Internet Access

0 comments
1
Buy a computer that has a modem or add a modem to your existing computer. Most Internet service providers require at least an Intel 386 processor (or a Macintosh of any vintage) and a 14.4-Kbps modem. Most new computers will easily satisfy these requirements.

2

Make sure your modem is properly installed, and connect it to the near-est phone jack using a phone cord.

3
Look on your computer's desktop for an icon that bears the name of an Internet service provider. If you find one, double-click on the icon and follow instructions to install the software and activate your account.

4
If you can't find an icon and you use Windows, open the Start menu and choose Settings, then Control Panel. In the window that appears, double-click the Internet Options control panel. Click the Connections tab, then click the Setup button at the top of the window.

5
On a Mac, look for the Internet Setup Assistant in the Apple menu.

6
If your computer doesn't come with Internet software, look in the yellow pages under "Internet" for Internet service providers in your area.

7
Look for special offers from large, commercial ISPs on television, in newspapers and in the mail.

8
Contact a provider and request installation software.

9
Once you've received the software, follow the instructions on the pack-age to install the program and set up your account.



source:http://www.wikihow.com/

Sunday, July 25, 2010

How to Advertise Your Freewebs Site Free

0 comments
With "Over 20 million websites and counting" at Freewebs, it's hard to make your stand out. So, why not advertise? Here are some free and safe ways to advertise your site.

Steps:

go to google search website advertising for free, click on the 1st link, and follow instructions

edit Orally (Actually Talk to People)

1
What better way to spread the word about anything other than to tell people about it for real! If you have other people who use freewebs, then you can probably convince them to advertise your site if you advertise theirs.

1
On almost any account to a pet site I know of, there is no rule against talking about YOUR site. Just post it in the forums or chat a few times (But do not do it so many times you're spamming).


1
You could, if you have a talent for drawing, make pictures for your site. Include codes so people can use them as free advertisement for you. People WILL do it, if they like it. You can also make banners, avatars, and GlitterText.

Ads by Google
Top Quality Free Traffic
Here You Can Get Top Quality Traffic For Your Website For Free
www.TrafficWitch.com
TKO Advertising
Sign Up For Free And Receive Free Advertising
www.tkoads.info
We pay you £5 today
High conversion. Quick Payouts. Join up today, Earn £30 per sale
www.uk-cheapest.co.uk

edit Tips

* You can only use Methos 3 if people know about your site. So, use the other two methods first.

Ads by Google
1,000 One Way Links $9.99
Get 1,000 backlinks for only $9.99. Money Back Guarantee. Fast Delivery
www.TheBacklinkBuilders.com
* It might take time for your site's advertisement to grow if you use Method 1, but don't get too worried about it. It is the most standard type of advertisement.
* Remember, some websites DO have rules about advertising your site, if it's in the terms of service, don't advertise your site.


source:http://www.wikihow.com/
Related Posts Plugin for WordPress, Blogger...

About Me

My photo
This my complete profile thank you for coming to my blog nice article on this blog useful for you

Followers

 

info-infokom. Copyright 2008 All Rights Reserved Revolution Two Church theme by Brian Gardner Converted into Blogger Template by Bloganol dot com