Tuesday, November 30, 2010

Mobile Android Wanted More Than iPhone

0 comments
A survey revealed even if the iPhone 4 in the sixth as the most wanted gadgets.

A survey conducted by mobile phone comparison site, Good Mobile Phone, find if almost all phones made by HTC, both Wildfire, Desire and Desire HD is ranked third as the most wanted phone on the site. While the iPhone 4 in the sixth.

"Right now HTC is trying to open the eyes of consumers to the existence of the mobile phone. Even those trying to take over the dominance of Apple's iPhone in the handset market," said Managing Director of Good Mobile Phone, Mark Owen.

According to him, the survey results are evidence if HTC started to lead to consumer demand for the smartphone business.

Even in the survey, Samsung and Nokia N8 Galaxy S is also still leading mobile phone as the most sought after by consumers, rather than the iPhone. Time position to 10, respectively filled by Blackberry Curve 8520, Samsung Tocco Lite, Blackberry and Sony Xperia X10 Torch Mini.

Apple iPhone 4 was not very popular in the eyes of shoppers. A survey revealed even if the iPhone 4 in the sixth as the most wanted gadgets.

A survey conducted by mobile phone comparison site, Good Mobile Phone, find if almost all phones made by HTC, both Wildfire, Desire and Desire HD is ranked third as the most wanted phone on the site. While the iPhone 4 in the sixth.

"Right now HTC is trying to open the eyes of consumers to the existence of the mobile phone. Even those trying to take over the dominance of Apple's iPhone in the handset market," said Managing Director of Good Mobile Phone, Mark Owen.

According to him, the survey results are evidence if HTC started to lead to consumer demand for the smartphone business.

Even in the survey, Samsung and Nokia N8 Galaxy S is also still leading mobile phone as the most sought after by consumers, rather than the iPhone. Time position to 10, respectively filled by Blackberry Curve 8520, Samsung Tocco Lite, Blackberry and Sony Xperia X10 Torch Mini.

Owen claimed to be surprised with the results of this survey. The reason, many respondents are not too concerned with the existence of the Apple iPhone. He said this is because the price is quite expensive bandrol and budling with operators to make the consumer back to buy the iPhone.

Today most Android handset equipped with the Android operating system. According to Gartner data, made by the Android platform that currently occupies the second position in the global handset operating system market. Android control approximately 25.5 percent marketshare while IOS iPhone only approximately 16.7 percent.
(Okezone/Telegraph)
taken from ketok.com

How free internet

0 comments
Free Internet tips Indosat

here's tips and tricks that are useful for us is how to free internet via pc using mobile phones that use SIM Card from indosat im3

1. Sign in your-freedom.net
2. Download the software here
3. Toll not to Rp.0, -
4. Dial-up using APN: indosatgprs or indosatmms,
username and password empty it should not be filled
5. Open YF>> Status>> Configuration


Free Internet tips Indosat

here's tips and tricks that are useful for us is how to free internet via pc using mobile phones that use SIM Card from indosat im3

1. Sign in your-freedom.net
2. Download the software here
3. Toll not to Rp.0, -
4. Dial-up using APN: indosatgprs or indosatmms,
username and password empty it should not be filled
5. Open YF>> Status>> Configuration
6. Connection Server, the address: wap3g.indosat.com @ ems .. your-freedom.de
Indosatmms: mmsc.indosat.com: 443/mms @ SERVER @ ems .. your-freedom.de
Port: 443
Connection Mode: HTTPS
Mark Socks4 / 5 DNS encryption re-keying the original SSL for HTTPS.
7. Account Information completed according to the time you register at your-freedom.net
8. Settings Proxy Address: 10.19.19.19
Port: 8080
9. Save and exit.
10. Ports: Web Proxy mark.
11. 127.0.0.1 browser proxy settings
customized Web Proxy port.

Tuesday, November 23, 2010

How to Keep Your Laptop and Screen in a Good Shape

0 comments
1. Keep your notebook in a open area that has a good air circulation during the power on. Store it in a well circulated area too.

2. Keep drinks and any liquids away from your notebook because short circuits by liquid destroy notebooks often. Also keep any food away from your notebook. Do not eat over because the crumbs go in the keyboard that cause the keys fail eventually. Wash your hands before using your notebook. Avoid leaving dirt and stains on the touchpad and keys.

3. Be careful with the LCD screen. It is especially vulnerable. Close the lid gently holding two sides. Make sure there is nothing left on the keyboard. Hold and lift your notebook by its base, not by its LCD screen. Avoid scratching and putting pressure on the LCD screen. If LCD screen is broken, you can easily replace the screen for about $50-100 from laptop screen company.

4. When bringing your notebook from colder place to warmer, do not turn it on immediately. Let it warm a few hours first. Do not leave your notebook unattended in a car...


1. Keep your notebook in a open area that has a good air circulation during the power on. Store it in a well circulated area too.

2. Keep drinks and any liquids away from your notebook because short circuits by liquid destroy notebooks often. Also keep any food away from your notebook. Do not eat over because the crumbs go in the keyboard that cause the keys fail eventually. Wash your hands before using your notebook. Avoid leaving dirt and stains on the touchpad and keys.

3. Be careful with the LCD screen. It is especially vulnerable. Close the lid gently holding two sides. Make sure there is nothing left on the keyboard. Hold and lift your notebook by its base, not by its LCD screen. Avoid scratching and putting pressure on the LCD screen. If LCD screen is broken, you can easily replace the screen for about $50-100 from laptop screen company.

4. When bringing your notebook from colder place to warmer, do not turn it on immediately. Let it warm a few hours first. Do not leave your notebook unattended in a car.

5. Do not disconnect the plug from the power socket by pulling on the power cord. Plug in external connectors and devices into their proper slots. Insert drives into their slots carefully, in right position, and at the correct angle. Try to keep the cord and all wires away from the floor and your legs.

6. Use a special case when you carry the notebook. Do not drop the notebook. Its internal parts are very fragile.

7. Clean your notebook regularly. Shut it down before cleaning. You may use an old tooth brush to rid of the dust in the area around the fan.

source : wikihow.com

Monday, November 22, 2010

How To Blog We crowded Visitors

0 comments
This time I will explain how to blog or web site we crowded dikunjung many people.

here's how:

1. Give comments on the blog posts of others and do not forget to also put your blog address in the comment. Maybe this is a good way for people visiting our blog in the long term.

2. Update your blog with the news that is being discussed so much at this point. Or update your blog by posting a lasting example of posts that contain tips and tricks

3. Discover new ideas for making the posting, make your post look more attractive than a person


This time I will explain how to blog or web site we crowded dikunjung many people.

here's how:

1. Give comments on the blog posts of others and do not forget to also put your blog address in the comment. Maybe this is a good way for people visiting our blog in the long term.

2. Update your blog with the news that is being discussed so much at this point. Or update your blog by posting a lasting example of posts that contain tips and tricks

3. Discover new ideas for making the posting, make your post look more attractive than a person


4. Consistent and Often - often to post articles useful and beneficial, because people who come to the blog we want to get something useful for them. Many archives of our posts on search engines that automatically likely our blog ranking top in the eyes of search engines

5. Clever promote your blog to various social networking sites like (facebook.com, myspace.com, twitter.com, plurk.com). Never be ashamed - ashamed or hesitant

Sunday, November 14, 2010

Quick Tricks For Google Adsense Accepted

0 comments
This time I will share tips for acceptable instant for google adsense

here's how:

1. Have Blog / Website with english settings.
2. Choose Themes Blog / Website interesting and much-loved.
3. We create a blog on Blogspot (since gmail came from google).
4. Create a post interesting articles or useful at least 15 posts.
6. Make sure your blog / website indexed in Google and other search engines.
7. Use email from gmail.com to sign up for email Adsense (since gmail came from google).
8. Use keywords Use the much sought after by people.

This time I will share tips for acceptable instant for google adsense

here's how:

1. Have Blog / Website with english settings.
2. Choose Themes Blog / Website interesting and much-loved.
3. We create a blog on Blogspot (since gmail came from google).
4. Create a post interesting articles or useful at least 15 posts.
6. Make sure your blog / website indexed in Google and other search engines.
7. Use email from gmail.com to sign up for email Adsense (since gmail came from google).
8. Use keywords Use the much sought after by people.

Avoid Blog / Website of:

1. Not enough pages.
2. Visitors are few.
3. Sites that are not in accordance with the policy (hackers, pornography, etc.).

Thursday, November 11, 2010

Free Download Adobe Reader 9

0 comments
Adobe Reader software is the global standard for electronic document sharing. It is the only PDF file viewer that can open and interact with all PDF documents. Use Adobe Reader to view, search, digitally sign, verify, print, and collaborate on Adobe PDF files.

* View, print, and search PDF files, including PDF Portfolios and PDF maps
* Author, store, and share documents, and share your screen, using Acrobat.com services
* Experience richer content and greater interactivity with native support for Adobe Flash technology
* Review documents using familiar commenting tools such as sticky notes, highlighting, lines, shapes, and stamps (When enabled by Acrobat Pro or Acrobat Pro Extended)
* Digitally sign PDF documents (When enabled by Acrobat Pro or Acrobat Pro Extended)




Adobe Reader software is the global standard for electronic document sharing. It is the only PDF file viewer that can open and interact with all PDF documents. Use Adobe Reader to view, search, digitally sign, verify, print, and collaborate on Adobe PDF files.

* View, print, and search PDF files, including PDF Portfolios and PDF maps
* Author, store, and share documents, and share your screen, using Acrobat.com services
* Experience richer content and greater interactivity with native support for Adobe Flash technology
* Review documents using familiar commenting tools such as sticky notes, highlighting, lines, shapes, and stamps (When enabled by Acrobat Pro or Acrobat Pro Extended)
* Digitally sign PDF documents (When enabled by Acrobat Pro or Acrobat Pro Extended)

taken from filehippo.com

click here for download

Free Download Google Chrome 9.0.570.0 Beta

0 comments
Google Chrome is a browser that combines a minimal design with sophisticated technology to make the web faster, safer, and easier.

One box for everything

Type in the address bar and get suggestions for both search and web pages.

Thumbnails of your top sites

Access your favorite pages instantly with lightning speed from any new tab.

Incognito mode

Don't want pages you visit to show up in your web history? Choose incognito mode for private browsing.


Google Chrome is a browser that combines a minimal design with sophisticated technology to make the web faster, safer, and easier.

One box for everything

Type in the address bar and get suggestions for both search and web pages.

Thumbnails of your top sites

Access your favorite pages instantly with lightning speed from any new tab.

Incognito mode

Don't want pages you visit to show up in your web history? Choose incognito mode for private browsing.

Safe browsing

Google Chrome warns you if you're about to visit a suspected phishing, malware or otherwise unsafe website.

taken from filehippo.com

click here for download

Friday, November 5, 2010

How Keeping Your Password

0 comments
1. Reproduction Using Default Password
The default password is the password that we can be the first time. This default password should indeed be quickly replaced because of very vulnerable. The reason, the default password can be easily searched on google search, even there are listed the name of a machine, type and default password with a magnificent plastered on some website creators vendors.

Sometimes administrators fear of forgetting to change-change the default password, so that an intruder can take over the system with default passwords.

2. Prohibited Use Password Hint
Sometimes we are afraid to forget the password that was our entry into the system / account, so we need to create a reminder if we forget the password. Now this is called password reminder Hint, if we create a password hint question with this then we can quickly recall these forgotten passwords.

Likewise with the hackers, they'll experiment with us to guess the password in the password hint questions, over time the password will be predictable, if the questions listed in the password hint can be answered by the Guess password...


Passwords are secret codes that must be protected. Many negative things can happen when your password leak into the hands of others. Learn 7 tips to keep it brief.

1. Reproduction Using Default Password
The default password is the password that we can be the first time. This default password should indeed be quickly replaced because of very vulnerable. The reason, the default password can be easily searched on google search, even there are listed the name of a machine, type and default password with a magnificent plastered on some website creators vendors.

Sometimes administrators fear of forgetting to change-change the default password, so that an intruder can take over the system with default passwords.

2. Prohibited Use Password Hint
Sometimes we are afraid to forget the password that was our entry into the system / account, so we need to create a reminder if we forget the password. Now this is called password reminder Hint, if we create a password hint question with this then we can quickly recall these forgotten passwords.

Likewise with the hackers, they'll experiment with us to guess the password in the password hint questions, over time the password will be predictable, if the questions listed in the password hint can be answered by the Guess password.

3. Writing banned Password
Owners are often afraid to forget your password with the password has been entered, so the owner would write different passwords user id and password into other media such as a notebook, notepad, Stickies (mac), password folders, books, mobile phones and other.

It is also quite vulnerable to leaking. Why vulnerable? Because if the various equipment is lost, then all information about a user id and password are sooner or later will be known by the thief equipments / gadgets are missing.

4. Use a Strong Password
Owner passwords often using a short password only, if it could be shorter than 3 characters then the user will give a short password. Fortunately this time the system provides a minimum password length of 6 characters and a maximum of 254 characters. The longer a password the stronger it will be the password security.

Strong passwords can be created with a combination of numbers and letters and even a variety of other characters. Some admins are currently using a password that is long enough, coupled with encryption such as PGP key and others, so it is quite difficult to guess password.

5. always Change Password
Owners should periodically change your password for authentication password, the more frequent password changes, the better, because the more difficult the penebak password hacking account / your system. Changes to the password depends on the owner, could be a week, a month, three months, and others. Originally the owner does not forget the password that was changed earlier.

6. Do not Use Same Password on Multiple Accounts
Owners often forget and sometimes passwords frequently enough to create an account, so they each create a new account using the same user id and password are the same, this is very vulnerable and dangerous. Because these passwords through a single account, all accounts will be taken by the hacker.

7. Using Password Management
To help recall the various passwords and various accounts, we are often very difficult, but not to worry because it has many current applications to help organize our passwords. This application can be downloaded for free from the internet and paid, so that regardless of our account and whatever we can with the password easy to remember and re-opened, of course, to open it with an encryption method as well(detik)

taken from www.ketok.com

Tuesday, November 2, 2010

Free download CCleaner

0 comments
CCleaner is a freeware system optimization, privacy and cleaning tool. It removes unused files from your system - allowing Windows to run faster and freeing up valuable hard disk space. It also cleans traces of your online activities such as your Internet history. Additionally it contains a fully featured registry cleaner. But the best part is that it's fast (normally taking less than a second to run) and contains NO Spyware or Adware...


CCleaner is a freeware system optimization, privacy and cleaning tool. It removes unused files from your system - allowing Windows to run faster and freeing up valuable hard disk space. It also cleans traces of your online activities such as your Internet history. Additionally it contains a fully featured registry cleaner. But the best part is that it's fast (normally taking less than a second to run) and contains NO Spyware or Adware! :)

Cleans the following:

* Internet Explorer
* Firefox
* Google Chrome
* Opera
* Safari
* Windows - Recycle Bin, Recent Documents, Temporary files and Log files.
* Registry cleaner
* Third-party applications
* 100% Spyware FREE

(filehippo.com)

click here for download

New Search Engine, Blekko.com Released

0 comments
Search engines or search engine start Blekko.com released in beta on 1 November 2010. His presence becomes an alternative service in addition to Bing and Google. The project is supported with funding of 24 million U.S. dollars and began construction three years ago.

Blekko claims search engines are designed to eliminate spam that plural appears in search results by placing a sign slashtag or the slash in each search word. For example, / aikido, / beatles, / wow, / Twilight and / zen...

Search engines or search engine start Blekko.com released in beta on 1 November 2010. His presence becomes an alternative service in addition to Bing and Google. The project is supported with funding of 24 million U.S. dollars and began construction three years ago.

Blekko claims search engines are designed to eliminate spam that plural appears in search results by placing a sign slashtag or the slash in each search word. For example, / aikido, / beatles, / wow, / Twilight and / zen. Users can also make slashtag to note the topics that will be registered in Blekko, a follower slashtag already available, and view statistics for papers and data that have been crawled by Blekko. Not only that, Blekko also identifies how much data is written double or duplicate alias.

Blekko allows users to modify the column on the left as needed. Even open for users to make slashtag. Only, still requires to login first.

Blekko has been tested by 8,000 people who make different slashtag 3000. No fewer than 11 percent of existing users visited Blekko back every week.

Blekko CEO and founder Rich Skrenta Blekko Mike Markson did not have such lofty goals in the near future. However, they believe, when they built this site was visited one to two million visits per day it will be able to reap a profit.
(kompas)
taken in ketok.com

How to Keep Your Computer Clean and Safe

0 comments
Make sure that your computer's hard drive clean. There are a lot cleaner software such as CCleaner or TuneUp Utilities. This will help keep your computer.


Attempt was made to not download software from websites that strange or unclear. Make sure that the website is trusted, and even if you do something download - and feel useless - make sure you remove them from your computer...
Make sure that your computer's hard drive clean. There are a lot cleaner software such as CCleaner or TuneUp Utilities. This will help keep your computer.


Attempt was made to not download software from websites that strange or unclear. Make sure that the website is trusted, and even if you do something download - and feel useless - make sure you remove them from your computer.


Using a program to keep your computer clean is not the right idea. Using plenty of space and also can cause system errors. Instead of trying to use the tools that Windows has given you: Start> All Programs> Accessories> System Tools:


Run Disk Cleanup once a week to remove unnecessary (temporary files) files.


Run Disk Defragmenter to defrag your hard disk once a month (you do not need to over do it). Defragment after deleting some files and empty the Recycle Bin.


Defragment before installing a new program so they will not get fragmented in case there is a gap in the media when the hard drive will be installed.


Keeping your computer safe from viruses by ensuring that you are using a secure web browser. After all, prevention is better than cure. Research shows that Internet Explorer is more vulnerable and susceptible to attacks from hackers than other web browsers. Try using Firefox and McAfee Site Advisor add to it if you wish.


Use a good anti-virus (and you may use the internet security virus) and Windows firewall. Try Kaspersky Internet Security which seems safe. Do not download files from any website just because it may contain a virus, always scan your computer once a week and make sure anti-virus software up to date.
Related Posts Plugin for WordPress, Blogger...

About Me

My photo
This my complete profile thank you for coming to my blog nice article on this blog useful for you

Followers

 

info-infokom. Copyright 2008 All Rights Reserved Revolution Two Church theme by Brian Gardner Converted into Blogger Template by Bloganol dot com