Showing posts with label Trik. Show all posts
Showing posts with label Trik. Show all posts

Wednesday, April 27, 2011

10 Best Antivirus in 2012


Old taste do not love a human being updated information on world best antivirus, last year had a post about the best antivirus 2010. Given the years have changed the posting of the 10 Best Antivirus in 2010 already passed so now We replace its news about the 10 Best Antivirus 2011. No different from last year 2011, ordinary people continue to use as source 10 ToptenReviews.com Antivirus is the best in 2011. Not much different from previous years the best antivirus in 2011 based on Several Important points who've ordinary people never posted here and here please please refer to there
On 10 Best Antivirus 2011 the position has not changed much from 10 Best Antivirus in 2010, there were the resource persons only A Few antivirus the which switch position or a freefall ride (emangnya use a Parachute). Well, here are the top 10 Best Antivirus 2011 Ordinary Humans get the which recently.
BitDefender Antivirus rated first there successfully defended his title the WHO for the 4th time in permission from the throne of the top 10 best antivirus in 2011 ... let's give a rousing applause for BitDefender AntivirusRated second is still overshadowed by Kaspersky Anti-Virus the which is Apparently Unable to overtake BitDefender to take permission from the rank 1 in the top 10 best antivirus in 2011. To note Kaspersky Anti-Virus for the 4th time it was also only Able to reach posis to-2 this year.
The third statistic is Webroot AntiVirus is still stalking the two competing anti-virus on it.
As if not to be outdone by its Rivals Norton AntiVirus also meramikan world of the best antivirus World wide with a fourth position for the second time
The next statistic is ESET NOD32 Antivirus to be satisfied to survive in the fifth position in 2011 for the second time. :Login to positions of six AVG Anti-Virus is still entrenched in a position like this for the 2nd time.
Log in seven positions of the WHO in 2010 yesterday at the occupied by F-Secure Anti-Virus seems a to be satisfied was thrown from a list of 10 best antivirus in 2011 this. G DATA AntiVirus is a new occupant in the top 10 best antivirus 2010, managed to go up one trip and sure to be in a position 7 for this year 2011. Good job: D
Further there keposisi Continue Successful repair Avira AntiVir position from 2010 yesterday ranked ninth Ditahun now ride a 2011 trip to position 8. Again applause for Avira AntiVir donk: D
Continue the next 10 best antivirus positions of our 2011 arrival of new residents WHO sped straight into the sequence 9 is VIPRE Antivirus. Still not safe can kelempar wkwkwkwkwkwwkwk later .... : D
Go to the order of the most bloated or caretaker or something, there's Trend Micro Titanium is Apparently still like to keep this position. : D
he 10 best antivirus in 2010.Well, the best antivirus on the computer / pc, a laptop, you are there in one Ordinary Man Who has been Mentioned above, if there are survivors deh ...: D
Do not forget the ordinary people congratulate new year: DHopefully this article useful,Keep smileKeep n touch 'Happy blogging: D

Friday, April 22, 2011

25 kinds of Registry Hack




 
1. Disable the windows key2. Disabling the search menu3. Hiding run4. Setting the hidden file systemand so on
1. Disable the windows key => HKEY_LOCAL_MACHINE \ SYSTEM \ CurrentControlSet \ Control \ KeyboardLayout
create a new binary file with a name Scandode Map0000 00 00 00 00 00 00 00 030008 03 00 00 00 00 00 5B E00010 00 00 5C E0 00 00 00 0300182. Disabling menu search => HKEY_CURRENT_USER \ Software \ Microsoft \ Windows \ CurrentVersion \ Policies \ Explorercreate a DWORD named NoFind file, change the value to 1

3. Hiding run => HKEY_CURRENT_USER \ Software \ Microsoft \ Windows \ CurrentVersion \ Policies \ ExplorerNoRun DWORD with the name of the file, change the value to 1

4. Setting the hidden file system => HKEY_CURRENT_USER \ Software \ Microsoft \ Windows \ CurrentVersion \ Explorer \ Advanceda new DWORD value named Hidden, change the value to 1

5. Set the file extension hidden => HKEY_CURRENT_USER \ Software \ Microsoft \ Windows \ CurrentVersion \ Explorer \ Advanceda new DWORD value named HideFileExt, change the value to 1

6. Hiding the folder options => HKEY_CURRENT_USER \ Software \ Microsoft \ Windows \ CurrentVersion \ Policies \ ExplorerDWORD value named NoFolderOptions, change the value to 1

7. Prevent access to drives C => HKEY_CURRENT_USER \ Software \ Microsoft \ Windows \ CurrentVersion \ Policies \ ExplorerDWORD value named NoViewOnDrive, change the value to 4

8. Men-Disable command prompt => HKEY_CURRENT_USER \ Software \ Microsoft \ Windows \ CurrentVersion \ Policies \ Microsoft \ Windows \ SystemDWORD value named DisableCMD, the value to 2

9. Prevent access to Regedit => HKEY_CURRENT_USER \ Software \ Microsoft \ Windows \ CurrentVersion \ Policies \ SystemDisableRegistryTools DWORD value with the name, the value to 1

10. Preventing access to Task Manager => HKEY_CURRENT_USER \ Software \ Microsoft \ Windows \ CurrentVersion \ Policies \ SystemDWORD value named DisableTaskMgr, the value to 1

11. Eliminate the ShutDown button => HKEY_CURRENT_USER \ Software \ Microsoft \ Windows \ CurrentVersion \ Policies \ ExplorerNoClose DWORD value with name, change the value to 1

12. Hidden All Programs from the Start Menu => HKEY_CURRENT_USER \ Software \ Microsoft \ Windows \ CurrentVersion \ Policies \ ExplorerNoStartMenuMorePrograms DWORD value with name, change the value to 1

13. Start up AplikasiRuns => HKEY_CURRENT_USER \ Software \ Microsoft \ Windows \ CurrentVersion \ Runnew String value named anything what, then change the value with the path or file nameto be run.

14. Automatic Logon Startup => HKEY_LOCAL_MACHINE \ Software \ Microsoft \ Windows_NT \ CurrentVersion \ Winlogonnew String value named AutoAdminLogon, change the value to 1

15. Restrict certain programs => HKEY_CURRENT_USER \ Software \ Microsoft \ Windows \ CurrentVersion \ Policies \ Explorera new DWORD value named DisallowRun, change the value to 1a new key named DisallowRun, for example want to restrict Regedit create the value string with the name 1, and values ​​with the path

16. Ignoring changes in settings => HKEY_CURRENT_USER \ Software \ Microsoft \ Windows \ CurrentVersion \ Policies \ Explorera new DWORD value named NoSaveSetting, change the value to 1

17. Removing traces username => HKEY_LOCAL_MACHINE \ Software \ Microsoft \ Windows \ CurrentVersion \ Policies \ Systemdouble click on Don'tdisplaylastusername, change the value to 1

18. Creating an account is hidden => HKEY_LOCAL_MACHINE \ Software \ Microsoft \ Windows NT \ CurrentVersion \ Winlogon \ SpecialAccounts \ Userlista new DWORD value with anything what name, and change the value to 0 to hide

19. Manipulating the minimum password length => HKEY_LOCAL_MACHINE \ Software \ Microsoft \ Windows \ CurrentVersion \ Policies \ NetworkThe new binary value named MinPwdLenTo determine the number of password at least write down the password length after 0000eg, a password at least 9 characters, then write 09 0000

20. Removing Icons Control Panel => HKEY_CURRENT_USER \ ControlPanel \ don'tloadcreate a string value based on the following dataAccess.cpl = Accessbility OptionHdwwiz.cpl = Add HardwareAppwiz.cpl = Add / remove programsConsole.cpl = ConsoleTimedate.cpl = Date and timeDesk.cpl = DisplayFax.cpl = FaxInetcpl.cpl = Internet OptionsJoy.cpl = Game ControllersLiccpa.cpl = LicensingMain.cpl = MaouseMlcfg32.cpl = MailModem.cpl = Modem and PhoneNcpa.cpl = Network ConnectionsNetcpl.cpl = Network and dialup connectivityNwc.cpl = Netware clientOdbccp32.cpl = ODBC ConnectionDevapps.cpl = PC CardPorts.cpl = PortsTelephone.cpl = Phone and Modem OptionsPowercfg.cpl = Power OptionIntl.cpl = Regional and languageSticpl.cpl = Scanner and CamerSrvmgr.cpl = Server ManagerMmsys.cpl = Sound and audio devicesSapi.cpl = Speech PropertiesSysdm.cpl = SystemTweakyui = TweakUINusmgr.cpl = User Accountirprops.cpl = Wireless LinkWspcpl32.cpl = WSP ClientAdobe Gamma.cpl = Adobe GammaCpqmgmt.cpl = Compaq Insght Agentlgfxcpl.cpl = Inter Graphics TechnologyJpicpl32.cpl = Java pluginlightFrame.cpl = LightframeNmo.cpl = Nokia modem optionsMclconf.cpl = Nokia Connection managerS32LUCP1.cpl = Norton Live UpdateQuictime.cpl = QuickTimeAvscpa.cpl = Virus Scan
System options eg want to remove, then create the value string with the name sysdm.cpl and change the value to No.

21. Menonaktfifkan Active Desktop => HKEY_CURRENT_USER \ Software \ Microsoft \ Windows \ CurrentVersion \ Policies \ ExplorerNoActiveDesktop binary value with the name, value data as:0000 01 00 00 00

22. Access Lock Floppy Drive => HKEY_LOCAL_MACHINE \ Software \ Microsoft \ Windows NT \ CurrentVersion \ WinlogonAllocateFloppies string value with the name, change the value to 0 to hide the TSB account

23. Removing Shared Documents =>delete subykey {59031a47-3f72-44a7-89c5-5595fe6b30ee}

24. Disable writing in the flash => [HKEY_LOCAL_MACHINE \ SYSTEM \ CurrentControlSet \ Control \ StorageDevicePolicies]"WriteProtect" = dword: 00000001
Hacking the Registry with Batch FileBasic commands- REG ADD- REG DELETE- REG COPY- REG SAVE- REG LOAD- REG unload- REG QUERY- REG Compare- REG EXPORT- REG IMPORT
Code Structure
1. REG ADDREG ADD KeyName [/ v Value Name] [/ tType] [/ d Data] [/ f]Example syntax: Disabling Menu SearchREG ADD HKCU \ Software \ Microsoft \ Windows \ CurrentVersion \ Policies \ Explorer / v NoFind / t REG_DWORD / d 1 / f
Keyname => is the name of the key that will be targeted. Rootkey should be abbreviatedAbbreviations Rootkey- HKEY_CLASSES_ROOT => HKCR- HKEY_CURRENT_USER => HKCU- HKEY_LOCAL_MACHINE => HKLM- HKEY_USERS => HKU- HKEY_CURRENT_CONFIG => HKCC
Value to the registry => Used to add the name value to the registryType Value In Registry- String Value => REG_SZ- DWORD Value => REG_DWORD- Binary Value => REG_BINARYData => Used to determine the value of value/ F => Used to ignore the overwrite command, if there is a value or the same key
2. REG DELETE=> To remove the registry value specifiedREG DELETE KeyName [/ v Value Name | / va] / f[/ V Value Name | / va] => Used to delete the value, or by using the / va delete all values
3. REG COPYREG COPY keyname keyname 1 2 [/ s] [/ f]/ S command to copy all the keys along with keys that are insid

20 Hack Registry untuk Tingkatkan Kinerja PC

Right-click function is an excellent way to learn some of the hidden functions of Windows. Want more? Try to get you started exploring the application of the Control Panel and find some useful techniques. And there's more applications folder Command Line in Windows' System32. But, none can match the Registry.

Registry is equipped with a variety of settings that are useful to enhance performance, improve security holes, and even change the fundamental basis of Windows to work better. Although it looks very sophisticated, you still need to be careful in using it because it is not just a feature that helps but also many pitfalls.

If not careful, you are actually adding to the problem than solve it. To that end, below there are 20 hack that you can try to make your PC better. Good luck!

1. Increase Security
    Someone who does not want can easily take your data with the USB if he managed to access your PC physically. If you're using Windows XP2 or later, there is a simple way to prevent it.

Go to "HKLM \ SYSTEM \ CurrentControlSet \ Control \ StorageDevicePolicies", create a DWORD value called "WriteProtect" and set the value "1". You will be able to read the USB drive, but could not move the data into it again.


2. Control UAC
    Vista's User Account Control is very often led to warnings that ultimately turned off by the user. But, sometimes it makes them miss the useful features such as modes of protection for IE. You can control how to disable the warning for the administrator, so you do not need to be disturbed, but the UAC still working on the background and you can still get the features.

To do this, go to "HKLM \ Software \ Microsoft \ Windows \ CurrentVersion \ Policies \ System \ ConsentPromptBehaviorAdmin", and set the value to "0". To return to normal conditions, set the value to "2".


3. Change Owner
    Install Windows on your PC and you'll be prompted to enter a name, which is then stored as the registered owner (run WinVer to see this on your system). If you buy a used computer, you may want to change the name of the owner with his own name. Hmm .. there's no other way than with the Registry.
br> Go to the "HKLM \ SOFTWARE \ Microsoft \ Windows NT \ CurrentVersion" and will see two sentences "RegisteredOwner" and "RegisteredOrganization". Double-click on them to change.


4. Sorting Files by True
    Sort the file name in Explorer can become a problem. Initial setup, he would put "File_v2.txt" before "File_v15.txt", and it is not a sequence of ASCII, but it looks more reasonable. But, what if the "v" refers to the version number, and should "File_v15.txt" on the order of the previous? At this time, the initial system Explorer can not work at all.

To restore the normal sort of ASCII, go to "HKLM \ Software \ Microsoft \ Windows \ CurrentVersion \ Policies \ Explorer", create a DWORD value called "NoStrCmpLogical" and set the value to "1". Delete the code if you want to go back to the initial conditions of the standard Explorer.


5. Troubleshoot Startup
    If Windows takes too long to start up and shut down, chances are he was having an issue. To find out what is going back in. "HKLM \ SOFTWARE \ Microsoft \ Windows \ CurrentVersion \ Policies \ System", create a DWORD value called "verbosestatus" and set the value to "1". Restart your PC and Windows will tell you what is happening.


6. Organize Folder Types
    Explorer of Vista would be smart to choose the type of folder you based on its contents. However, this means your download folder will turn into the music folder if you downloaded a few MP3s. To fix this, go into "HCU \ Software \ Classes \ LocalSettings \ Software \ Microsoft \ Windows \ Shelf", delete the subkey "Bags" and create a new one at the same location.

Create a key named "AllFolders" under Bags, and other key named "Shell" at the bottom again. Then click her to open the "HCU \ Software \ Classes \ LocalSettings \ Software \ Microsoft \ Windows \ Shell \ Bags \ AllFolders \ Shell". Right click on the right panel, select 'New | String Value "and call it" FolderType ". Then, double click on FolderType and set the value to "NotSpecified". You still can change the type of folder, but Vista will not change automatically.

Saturday, April 16, 2011

How to restore Data Has Deleted

Cara mengembalikan Data Yang Telah Terhapus


It was also annoyed when the data is very important that we go away, which sometimes caused by a virus even erased accidentally deleted by our own. If in such circumstances a person who somehow would overcome the confusion, many alternative ways to solve the problem that we can see by the number of applications that can assist in overcoming these problems.

But the number of applications is still uncertain to be able to resolve the problem, there are many friends who are experiencing barriers / problems in running the application. In this case I want to give one possible solution after using it you can give thumbs up to the application of "SoftPerfect File Recovery"

"SoftPerfect File Recovery"is a useful application that is similar to most other applications is to find / recover data that has been erased on the computer, but for this application is a bit different from other applications. Where in the installation and use is easier and simple, especially in the search process the data that has been erased and the data search, we can easily find data based on the type or format of the data.



Once we find the files / data that we meant to me "Restorenya"by:

- right-click on the file that had been found and then select "Restore" then the file / data will reappear on your computer.

What do you think!?, very easy not to use it

Well, without waiting for a long time Soon you download the application "SoftPerfect File Recovery" in your favorite search engine