23 November, 2007

Seminar dan Demo RT/RW Net : Internet Murah Untuk Rakyat

0 komentar

Free Image Hosting at www.ImageShack.us
STMIK MDP akan mengadakan ”Seminar dan Demo RT/RW Net : Internet Murah Untuk Rakyat ”. Acara yang akan diadakan pada tanggal 1 Desember 2007, bertempat di STMIK MDP Jl. Rajawali No.14 bakal menghadirkan Onno W.Purbo sebagai pembicara.

Adapun materi yang akan disampaikan adalah :

- Membangun RT/RW Net
- Konfigurasi dan Anggaran
- RT/RW Net via ADSL
- Teknologi Wireless Internet

serte demo ”Membuat sendiri antena wajanbolic ”,adalah kegiatan yang bertujuan Optimalisasi daya terima sinyal dari hotspot dengan modifikasi antena. Dimana pada kegiatan ini, akan diworkshopkan cara pembuatan antena dari wajan (wajanbolic) untuk dapat mendapatkan sinyal dari hotspot public yang jauhnya sampai -+ 6.5 Km.

Untuk Informasi dan Pendaftaran
Silahkan Hubungi Mega/Risti/Rika no.telp 0711-376400

Biaya Peserta

* Umum Rp. 100.000
* Mahasiswa Rp.80.000
* Mahasiswa Rp. 50.000*

Fasilitas

* Goodies Bag
* Buku RT/RW Net dan antena Wajanbolic karya terbaru Onno W Purbo
* Makan Siang


*tanpa buku RT/RWNet dan Antena Wajanbolic


PC Media AntiVirus (PCMAV) RC22 (December 2007)

0 komentar

PCMAV (PC Media Antivirus), The Most professional Anti-virus which has ability to protect and removed virus securely.

With Deep Clean and Smart Unhide system which help you clean up your PC from Virus/Trojan/Worm and recover your file.

With Active Check technology to protect you from unknown internet threads, and with Genetic Heuristic help you to detect unknown viruses or malware.

You can collaborate with Clamav Engine and definition.

DOWNLOAD : PC Media AntiVirus (PCMAV) RC22 (December 2007)


How to Search Torrents using Google

0 komentar

We all know that Google is the grand daddy of all search engines, but hardly few of us know that we can search Google for torrents only !! How this is done ? Simple, just follow the steps below

1. Google to http://www.google.com
2. Enter “filetype:torrent ” [Replace with torrents name]
3. Hit Search Button

Google and Yahoo Make Cool Tools

0 komentar

Is it hard to be a hacker? How do I become a hacker? I want to learn more about hacking! Those are the things that I often hear or see on forums. Somebody asked me the other day if I know how to hack a site and whether it’s hard or not. I’m no hacker, I’m just a journalist. However, Petko D. Petkov aka pdp is a world-renowned hacker who in his latest blog post describes how easy it can be for someone with just a bit of skill to hack into military and government sites - .mil and .gov that is.

He won’t give you the tools or tell you where to get them from, but he does explain how easy it is to exploit certain vulnerabilities. He says that the web is full of open CITRIX gateways and while he was performing some CITRIX testing he hacked a lot of GUIs and “played” around with .ICA files. What he found out is that two great tools hackers have at their disposal are Google and Yahoo that can be queried for public .ICA files. After employing this method he was presented with lots and lots of wide open services, some located on .gov and .mil sites. You don’t have to be a genius to tell that this is a bad thing! The .ICAs will give the hacker a lot of info and in cyberspace knowledge means power more than anywhere else!

And here is the most alarming part, as Mr. Petkov writes on his blog: “Just by looking into Google, I was able to find 114 wide open CITRIX instances: 10 .gov, 4 .mil, 20 .edu, 27 .com, etc… The research was conducted offline, therefore there might be some false positives. Among the services discovered, there were several critical applications which looked so interesting that I didn’t even dare look at them. With a similar success, attackers can perform just simple port scans for service port 1494.”

In the same post he hands out a lot of details to prove his concept. You may read it by clicking this link, but keep in mind that this knowledge is for you to better up your website, if it’s flawed, or in any case, you are not to use it for bad purposes.

Awesome Hidden Google Pages

0 komentar

There might be some rare human being around who has surfed Internet but hasn’t used Google in some way or the other. Still there are some great works of Google that are known but to a smaller community of people. They are worth looking. Today I came around a Google page where Google pays tributes to moms around the worlds. That made me search on for something more. Here is the compiled list. Worth a look for all the Google lovers/critics.

Google Moms
Google’s way of expressing love.

Rare Google Beta Logo
They really have improved.

Google Heart 1 & Google Heart 2
Google’s way of expressing love on valentines day.

Google’s Metaplex
Google’s way of saying “April fool”

Google Newsletter
You have read Google’s blog, but did you read this. It contains there progress from the day it was launched to till date.

Google’s Search Statistics For 9/11/01
… and there tribute. (a rather general one)

Google Zietgeist
What you see here is a cumulative snapshot of interesting queries people are asking – some over time, some within country domains, and some on Google.com – that perhaps reveal a bit of the human condition.

Google’s Help To Build Better Query
Some useful sets of tips from the makers themselves.

Google Doodles
Few more: UncleSam, Microsoft, Mac, Linux, BSD. Google remembers all.

Google’s Languages Which Only Google Can Understand (This Link Is For Ewmew Fudd)
More for you. Bork, Bork, Bork!, thlngan Hol, H4×0r, lgpay Atinlay. Did you understand any one of them? I did not.

Google’s Librarian Central Newsletter
They do take care of everyone.

And last a non Google page but worth a look.

How was that? I am sure many might have been new to you. Your Comments?

How to Delete Your Google Past Searches

0 komentar

Google is a search technology used by all of you and I bet you admit it. But if you’re a real Google fan you conducted thousands of searches on Google and your browser, no matter it is Internet Explorer, Firefox or any other application, remembers them all. If you want to test this, just go over to Google, click inside the search box and press the “A” key to write a word. If you ever searched Google for a word beginning with the “A” letter, then a drop-down list should appear showing your past queries made on Google. Because this list can become huge and provide numerous words and phrases, some of you might want to delete it but you don’t know how to do that. Well, this is what you should do in order to remove the past searches depending on your browser:

Internet Explorer 6 – Go to Tools / Internet Options / Content. Open the ‘Personal Information’ window and click on the ‘Clear Forms’ button located in the ‘AutoComplete’ area. Click OK and that’s all.

For Internet Explorer 7 go over to Tools / Internet Options and in the ‘General’ tab, press the ‘Delete’ button. Then, push the ‘Delete forms…’ button and hit Close.

If you’re a Firefox fan you must go to Tools / Options / Privacy / Saved Form Information and press the ‘Clear’ button. Please keep in mind that selecting multiple options will delete all of them such as ‘Browsing History’ or ‘Download History’.

For Safari all you need to do is go to ‘Preferences’ and hit ‘Autofill’. Click on the ‘Edit’ button from the ‘Other forms’ line, select Google.com and then hit ‘Remove’. That should be all.

In addition, you can download a separate application that is able to remove all the information stored on your computer and concerning the Google search engine.

Top 3 Free Product Key Finder Programs

0 komentar

if you're preparing to reinstall an operating system (for example, doing a clean install of Windows XP) or another program, you will need to find your copy of the software's product key (CD key). Normally this product key is located with the original manual or CD.

If you've lost your product key you can often find it in the registry but this can be very difficult to do. Luckily, there are many free key finder programs available to help.

Below are the top 3 free key finder programs.

1. Magical Jelly Bean Keyfinder


The Magical Jelly Bean Keyfinder program is a free utility that retrieves product keys from the registry. It also has the ability to change the product key for the Windows XP operating system if need be.

Advantages include very small size, ease of use, no installation required, instant display of product keys and multiple product key saving options.

Finds Keys for Operating Systems: Microsoft Windows 95, Windows 98, Windows ME, Windows NT4, Windows 2000, Windows XP, Windows Server 2003 and Windows Vista.

Finds Keys for Other Software: Microsoft Office 97, Office XP and Office 2003.
Magical Jelly Bean Keyfinder v1.51 Review

2. Winkeyfinder



The Winkeyfinder program is another free utility that retrieves product keys from the Windows registry.

Advantages include small program size, no installation required, and additional features such as a password generator and ability to change registered user information.

Finds Keys for Operating Systems: Microsoft Windows 98, Windows ME, Windows 2000, Windows XP and Windows Server 2003.

Finds Keys for Other Software: Microsoft Office 97, Office 2000 SP2, Office XP and Office 2003.

Winkeyfinder v1.72 Review

3. RockXP



RockXP is another free program that retrieves lost product keys from the registry.

Advantages include small program size, no installation required, and additional features such as a password generator and password retriever.

Finds Keys for Operating Systems:
Microsoft Windows XP.

Finds Keys for Other Software: Microsoft Office 2003 and Office 2007.

RockXP v4.0 Beta Review

Important Product Key Finder Information

If your system was purchased with Microsoft Windows pre-installed, and you have not reinstalled it or upgraded it yourself, the key finders on this page will only find the generic product key that your computer manufacturer used to install the operating system. This product key will not work when attempting to reinstall Windows. In this case, you must use the unique product key that is on the sticker attached to your computer case.

Keep Windows operating data in main memory

0 komentar

Windows XP contains several tweakable memory settings in the registry, one of which is the DisablePagingExecutive registry key. This controls whether the operating system will transfer its essential driver and kernel files to the ‘virtual memory’ (the page file on the hard disk). It defaults to allowing this.

Obviously, transferring portions of the system to hard drive memory can considerably slow things down, and it appears that Windows XP does this periodically, whether or not the system is actually low on physical memory (RAM).

If you have 256MB of system memory or more, try this registry tweak to force Windows to keep its operating data in main memory:

Open Regedit.

Navigate to HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Session Manager\Memory Management.

Select the DisablePagingExecutive value to ‘1′

Microsoft .NET Framework 3.5

0 komentar

.NET Framework 3.5 builds incrementally on the new features added in .NET Framework 3.0. For example, feature sets in Windows Workflow Foundation (WF), Windows Communication Foundation (WCF), Windows Presentation Foundation (WPF) and Windows CardSpace. In addition, .NET Framework 3.5 contains a number of new features in several technology areas which have been added as new assemblies to avoid breaking changes. They include the following:

- Deep integration of Language Integrated Query (LINQ) and data awareness. This new feature will let you write code written in LINQ-enabled languages to filter, enumerate, and create projections of several types of SQL data, collections, XML, and DataSets by using the same syntax.
- ASP.NET AJAX lets you create more efficient, more interactive, and highly-personalized Web experiences that work across all the most popular browsers.
- New Web protocol support for building WCF services including AJAX, JSON, REST, POX, RSS, ATOM, and several new WS-* standards.
- Full tooling support in Visual Studio 2008 for WF, WCF, and WPF, including the new workflow-enabled services technology.
- New classes in .NET Framework 3.5 base class library (BCL) that address many common customer requests.

IMPORTANT:
* If you have installed earlier pre-release versions of .NET Framework 3.5, then you must uninstall them prior to running this installation by using Add or Remove Programs.

For more details on this release of the framework, see the following references:
http://msdn2.microsoft.com/en-us/vstudio/aa700830.aspx
http://msdn2.microsoft.com/en-us/netframework/default.aspx


Download : Microsoft .NET Framework 3.5

ATI Catalyst 7.11

0 komentar

The new Catalyst drivers from ATI for their video controllers.



This unified driver has been further enhanced to provide the highest level of power, performance, and reliability. The ATI CATALYST software suite is the ultimate in performance and stability.

This release note provides information on the latest posting of AMD's industry leading software suite, Catalyst™. This particular software suite updates both the AMD Display Driver, and the Catalyst™ Control Center. This unified driver has been further enhanced to provide the highest level of power, performance, and reliability. The AMD Catalyst™ software suite is the ultimate in performance and stability.

The Catalyst™ software suite 7.11 contains the following:
* Radeon™ display driver 8.432
* Multimedia Center™ 9.16 (Windows XP only)
* HydraVision™ (Windows XP only)
* HydraVision™ Basic Edition (Windows XP only)
* Remote Wonder 3.04 (Windows XP only)
* WDM Driver Install Bundle
* Southbridge/IXP Driver
* Catalyst™ Control Center Version 7.11

Download : ATI Catalyst 7.11 Display Driver
Download : ATI Catalyst 7.11 Control Center

November 2007 Security Releases ISO Image

0 komentar

This DVD5 ISO image file contains the security updates for Windows released on Windows Update on November 13th, 2007. The image does not contain security updates for other Microsoft products. This DVD5 ISO image is intended for administrators that need to download multiple individual language versions of each security update and that do not use an automated solution such as Windows Server Update Services (WSUS). You can use this ISO image to download multiple updates in all languages at the same time.

Important: Be sure to check the individual security bulletins at http://www.microsoft.com/technet/security prior to deployment of these updates to ensure that the files have not been updated at a later date.


This DVD5 image contains the following updates:
KB943460 / (MS07-061)

* Windows Server 2003 - 18 languages
* Windows Server 2003 for Itanium-based Systems - 4 languages
* Windows Server 2003 x64 Edition - 11 languages
* Windows XP - 24 languages

KB941672 / (MS07-062)

* Windows 2000 - 24 languages
* Windows Server 2003 - 18 languages
* Windows Server 2003 for Itanium-based Systems - 4 languages
* Windows Server 2003 x64 Edition - 11 languages

Download : November 2007 Security Releases ISO Image
Link :
MoreInfo & Other Languages...

Preapring Windows PE to Boot from a USB Thumb Drive

0 komentar

These steps will take you through preparing a USB ram drive (thumb drive, pen drive, or how ever you care to refer to it) so that you may use it to boot your Windows PE image without the need of a hard drive (or bootable CD/DVD). These steps assume you have already generated your Windows PE folder structure where you would typically burn it to an ISO image.

1) Run diskpart from command prompt running as administrator (right click the command prompt icon and choose “Run As Administrator”)

2) Type the command: list disk to see the available disks and note the one that represents your USB thumb drive

3) Select the disk: select disk # where # is the disk you determined in the above step

4) Now that the proper disk is selected, prepare it with the clean command by typing clean

5) Now create a partition on the clean drive by typing: create partition primary

6) Select the new partition by typing: select partition 1

7) Set the partition as active by typing: active

8 ) Format the partition as FAT32 by typing: format fs=fat32

9) Assign the new partition by typing: assign

10) Type exit to quit diskpart

Now you are ready to copy the files. The location from which you want to copy the files is the folder created which would normally serve as the contents of your ISO file. For example: c:\images\winpe\iso

Typically this file will contain three folders and a file: directories: boot, EFI, and source. file: bootmgr. Simply copy these files to the prepared USB thumb drive root and you are ready to go!

With the RAM drive inserted, you will either need to go into the computer’s BIOS settings at boot up and arrange the boot order to place the USB drive above the system hard drive. Alternatively most systems have a “Boot Menu” keystroke such as F12 which will let you choose the device to which you want to boot.

19 November, 2007

Intel Core 2 Extreme QX9650 review: First look at Penryn

0 komentar



By Steven Walton on November 19, 2007
Editor: Julio Franco
Manufacturer: Intel
Post/read user's feedback

Today we have in our hands the latest Intel Core 2 Extreme quad-core processor, and I know what you are thinking but no, this is not yet another extremely expensive processor featuring the same four cores with only a speed bump over the last QX6850 we looked at last time. Hmm, ok so I told a bit of a white lie there, as this is still an extremely expensive processor, but it’s not just another in a chain of speed bumps. The new Core 2 Extreme QX9650 represents Intel’s new flagship processor technology which until now was mainly known by its code-name “Penryn”, manufactured on a 45nm design process, adding fifty new SSE4 instructions, among other things.

Now, the actual QX9650 processor and other Penryn quad-cores have received its own codename which is “Yorkfield” and because this particular processor belongs to the Extreme line up, its complete name is Yorkfield XE. Similarly, future dual-core CPUs based on Penryn will go by the code-name “Wolfdale” once they are released. To complete the equation you should know that Yorkfields are really two Wolfdale chips stuck together. This is the same as with previous Kentsfield quad-core processors which in reality were just two Conroe chips stuck together in one package. This may be a bit confusing but when time to buy comes, it's important being able to identify each different core version and know what advantages one generation of chips has over another, ultimately making the better buying decision.


Intel "Penryn" processors incorporate 410 million transistors for each dual core chip,and 820 million for each quad core chip. The original Intel Pentium Processor only has 3.1 million transistors.

The Core 2 Extreme QX9650 is the first of many products to be released using the Penryn architecture. Like the previous Core 2 Extreme QX6850, the QX9650 also works at 3.0GHz but adds a number of enhancements. Perhaps the most prominent, Intel's 45nm High-k metal gate silicon technology, which is claimed to be an industry's first, featuring transistors with reduced current leakage designed to decrease power consumption while also accommodating for increased clock speeds. This is a big deal considering Intel has used the conventional silicon-oxide technique since 1960.

Besides the apparent die shrink, the Penryn architecture features a faster Radix-16 divider, faster OS primitive support, improved store forwarding, split load cache enhancements, enhanced virtualization technology and enhanced dynamic acceleration technology. While all of these may sound nice in paper, in real-life terms what we do know is that this newer Core 2 architecture is faster and more efficient. We were able to observe power consumption levels that are significantly lower as well as operating temperatures. These are all aspects that we will uncover in this review, but for now let me just say that when heavily overclocked the QX9650, it produced stress temperatures that were comparable to a dual-core Conroe processor operating at its default frequency.

When we move on to benchmarking the QX9650, it will extremely easy to spot the differences and advantages Penryn offers today because the QX9650 and the QX6850 (65nm Kentsfield) both operate at 3.0GHz and use the same front side bus speeds, so we will be putting them head to head for comparison. Also to note, the QX9650 does receive a L2 cache boost at 12MB versus only 8MB found in the QX6850.