Showing posts with label cara. Show all posts
Showing posts with label cara. Show all posts

Wednesday, April 27, 2011

BitDefender Ranked first in 2011

On 10 Best Antivirus 2011 the position has not changed much from 10 Best Antivirus in 2010, there were the resource persons only A Few antivirus the which switch position or a freefall ride (emangnya use a Parachute). Well, here are the top 10 Best Antivirus 2011 Ordinary Humans get the which recently.

BitDefender Antivirus rated first there successfully defended his title the WHO for the 4th time in permission from the throne of the top 10 best antivirus in 2011 ... let's give a rousing applause for BitDefender Antivirus

please try this first ranking antivirus Free




Friday, April 22, 2011

Hack Registry Booster 2011





Once Installed Go To Task Manager And End The Process Of Uniblue
Then Go To Registry Editor
Open Run And Type regedit And Hit Enter You Will Taken To The Registry Editor
Select HKEY-CLASSES-ROOT
Then Find CLSID
Then Right Click On CLSID And Click On Find
Uncheck "Keys" And "Data" And Check " Match Whole String Only " And Type " FC " In The Search Then Click Find Next
It Will Take You To The Next Step
Under FC Right Click Then Click On New Then Click String Value
Name It License
Then Double Click It You Should See A New Window
In The Value Data Field Paste This Key
RB-0HR4N7-NWYFRE-WGVT8T-P2GVR7­-T50U22
Click Ok
Close Your Registry Editor
Start The Registry Booster And Boom You Have The Registered Version
Congrats You Just Saved Few Dollars For Yourself

I Hope I Helped You In Some Way

25 kinds of Registry Hack




 
1. Disable the windows key2. Disabling the search menu3. Hiding run4. Setting the hidden file systemand so on
1. Disable the windows key => HKEY_LOCAL_MACHINE \ SYSTEM \ CurrentControlSet \ Control \ KeyboardLayout
create a new binary file with a name Scandode Map0000 00 00 00 00 00 00 00 030008 03 00 00 00 00 00 5B E00010 00 00 5C E0 00 00 00 0300182. Disabling menu search => HKEY_CURRENT_USER \ Software \ Microsoft \ Windows \ CurrentVersion \ Policies \ Explorercreate a DWORD named NoFind file, change the value to 1

3. Hiding run => HKEY_CURRENT_USER \ Software \ Microsoft \ Windows \ CurrentVersion \ Policies \ ExplorerNoRun DWORD with the name of the file, change the value to 1

4. Setting the hidden file system => HKEY_CURRENT_USER \ Software \ Microsoft \ Windows \ CurrentVersion \ Explorer \ Advanceda new DWORD value named Hidden, change the value to 1

5. Set the file extension hidden => HKEY_CURRENT_USER \ Software \ Microsoft \ Windows \ CurrentVersion \ Explorer \ Advanceda new DWORD value named HideFileExt, change the value to 1

6. Hiding the folder options => HKEY_CURRENT_USER \ Software \ Microsoft \ Windows \ CurrentVersion \ Policies \ ExplorerDWORD value named NoFolderOptions, change the value to 1

7. Prevent access to drives C => HKEY_CURRENT_USER \ Software \ Microsoft \ Windows \ CurrentVersion \ Policies \ ExplorerDWORD value named NoViewOnDrive, change the value to 4

8. Men-Disable command prompt => HKEY_CURRENT_USER \ Software \ Microsoft \ Windows \ CurrentVersion \ Policies \ Microsoft \ Windows \ SystemDWORD value named DisableCMD, the value to 2

9. Prevent access to Regedit => HKEY_CURRENT_USER \ Software \ Microsoft \ Windows \ CurrentVersion \ Policies \ SystemDisableRegistryTools DWORD value with the name, the value to 1

10. Preventing access to Task Manager => HKEY_CURRENT_USER \ Software \ Microsoft \ Windows \ CurrentVersion \ Policies \ SystemDWORD value named DisableTaskMgr, the value to 1

11. Eliminate the ShutDown button => HKEY_CURRENT_USER \ Software \ Microsoft \ Windows \ CurrentVersion \ Policies \ ExplorerNoClose DWORD value with name, change the value to 1

12. Hidden All Programs from the Start Menu => HKEY_CURRENT_USER \ Software \ Microsoft \ Windows \ CurrentVersion \ Policies \ ExplorerNoStartMenuMorePrograms DWORD value with name, change the value to 1

13. Start up AplikasiRuns => HKEY_CURRENT_USER \ Software \ Microsoft \ Windows \ CurrentVersion \ Runnew String value named anything what, then change the value with the path or file nameto be run.

14. Automatic Logon Startup => HKEY_LOCAL_MACHINE \ Software \ Microsoft \ Windows_NT \ CurrentVersion \ Winlogonnew String value named AutoAdminLogon, change the value to 1

15. Restrict certain programs => HKEY_CURRENT_USER \ Software \ Microsoft \ Windows \ CurrentVersion \ Policies \ Explorera new DWORD value named DisallowRun, change the value to 1a new key named DisallowRun, for example want to restrict Regedit create the value string with the name 1, and values ​​with the path

16. Ignoring changes in settings => HKEY_CURRENT_USER \ Software \ Microsoft \ Windows \ CurrentVersion \ Policies \ Explorera new DWORD value named NoSaveSetting, change the value to 1

17. Removing traces username => HKEY_LOCAL_MACHINE \ Software \ Microsoft \ Windows \ CurrentVersion \ Policies \ Systemdouble click on Don'tdisplaylastusername, change the value to 1

18. Creating an account is hidden => HKEY_LOCAL_MACHINE \ Software \ Microsoft \ Windows NT \ CurrentVersion \ Winlogon \ SpecialAccounts \ Userlista new DWORD value with anything what name, and change the value to 0 to hide

19. Manipulating the minimum password length => HKEY_LOCAL_MACHINE \ Software \ Microsoft \ Windows \ CurrentVersion \ Policies \ NetworkThe new binary value named MinPwdLenTo determine the number of password at least write down the password length after 0000eg, a password at least 9 characters, then write 09 0000

20. Removing Icons Control Panel => HKEY_CURRENT_USER \ ControlPanel \ don'tloadcreate a string value based on the following dataAccess.cpl = Accessbility OptionHdwwiz.cpl = Add HardwareAppwiz.cpl = Add / remove programsConsole.cpl = ConsoleTimedate.cpl = Date and timeDesk.cpl = DisplayFax.cpl = FaxInetcpl.cpl = Internet OptionsJoy.cpl = Game ControllersLiccpa.cpl = LicensingMain.cpl = MaouseMlcfg32.cpl = MailModem.cpl = Modem and PhoneNcpa.cpl = Network ConnectionsNetcpl.cpl = Network and dialup connectivityNwc.cpl = Netware clientOdbccp32.cpl = ODBC ConnectionDevapps.cpl = PC CardPorts.cpl = PortsTelephone.cpl = Phone and Modem OptionsPowercfg.cpl = Power OptionIntl.cpl = Regional and languageSticpl.cpl = Scanner and CamerSrvmgr.cpl = Server ManagerMmsys.cpl = Sound and audio devicesSapi.cpl = Speech PropertiesSysdm.cpl = SystemTweakyui = TweakUINusmgr.cpl = User Accountirprops.cpl = Wireless LinkWspcpl32.cpl = WSP ClientAdobe Gamma.cpl = Adobe GammaCpqmgmt.cpl = Compaq Insght Agentlgfxcpl.cpl = Inter Graphics TechnologyJpicpl32.cpl = Java pluginlightFrame.cpl = LightframeNmo.cpl = Nokia modem optionsMclconf.cpl = Nokia Connection managerS32LUCP1.cpl = Norton Live UpdateQuictime.cpl = QuickTimeAvscpa.cpl = Virus Scan
System options eg want to remove, then create the value string with the name sysdm.cpl and change the value to No.

21. Menonaktfifkan Active Desktop => HKEY_CURRENT_USER \ Software \ Microsoft \ Windows \ CurrentVersion \ Policies \ ExplorerNoActiveDesktop binary value with the name, value data as:0000 01 00 00 00

22. Access Lock Floppy Drive => HKEY_LOCAL_MACHINE \ Software \ Microsoft \ Windows NT \ CurrentVersion \ WinlogonAllocateFloppies string value with the name, change the value to 0 to hide the TSB account

23. Removing Shared Documents =>delete subykey {59031a47-3f72-44a7-89c5-5595fe6b30ee}

24. Disable writing in the flash => [HKEY_LOCAL_MACHINE \ SYSTEM \ CurrentControlSet \ Control \ StorageDevicePolicies]"WriteProtect" = dword: 00000001
Hacking the Registry with Batch FileBasic commands- REG ADD- REG DELETE- REG COPY- REG SAVE- REG LOAD- REG unload- REG QUERY- REG Compare- REG EXPORT- REG IMPORT
Code Structure
1. REG ADDREG ADD KeyName [/ v Value Name] [/ tType] [/ d Data] [/ f]Example syntax: Disabling Menu SearchREG ADD HKCU \ Software \ Microsoft \ Windows \ CurrentVersion \ Policies \ Explorer / v NoFind / t REG_DWORD / d 1 / f
Keyname => is the name of the key that will be targeted. Rootkey should be abbreviatedAbbreviations Rootkey- HKEY_CLASSES_ROOT => HKCR- HKEY_CURRENT_USER => HKCU- HKEY_LOCAL_MACHINE => HKLM- HKEY_USERS => HKU- HKEY_CURRENT_CONFIG => HKCC
Value to the registry => Used to add the name value to the registryType Value In Registry- String Value => REG_SZ- DWORD Value => REG_DWORD- Binary Value => REG_BINARYData => Used to determine the value of value/ F => Used to ignore the overwrite command, if there is a value or the same key
2. REG DELETE=> To remove the registry value specifiedREG DELETE KeyName [/ v Value Name | / va] / f[/ V Value Name | / va] => Used to delete the value, or by using the / va delete all values
3. REG COPYREG COPY keyname keyname 1 2 [/ s] [/ f]/ S command to copy all the keys along with keys that are insid

Saturday, April 16, 2011

How to restore Data Has Deleted

Cara mengembalikan Data Yang Telah Terhapus


It was also annoyed when the data is very important that we go away, which sometimes caused by a virus even erased accidentally deleted by our own. If in such circumstances a person who somehow would overcome the confusion, many alternative ways to solve the problem that we can see by the number of applications that can assist in overcoming these problems.

But the number of applications is still uncertain to be able to resolve the problem, there are many friends who are experiencing barriers / problems in running the application. In this case I want to give one possible solution after using it you can give thumbs up to the application of "SoftPerfect File Recovery"

"SoftPerfect File Recovery"is a useful application that is similar to most other applications is to find / recover data that has been erased on the computer, but for this application is a bit different from other applications. Where in the installation and use is easier and simple, especially in the search process the data that has been erased and the data search, we can easily find data based on the type or format of the data.



Once we find the files / data that we meant to me "Restorenya"by:

- right-click on the file that had been found and then select "Restore" then the file / data will reappear on your computer.

What do you think!?, very easy not to use it

Well, without waiting for a long time Soon you download the application "SoftPerfect File Recovery" in your favorite search engine

Norton Internet Security (2012)

Norton Internet Security (2012)




Norton Internet Security runs quietly in the background to detect and block today's complex
threats and to protect your identity when you buy, bank, or browse online. Friendly and efficient
product design helps minimize confusing security alerts and the decline could enter the road system
your online experience. Norton Internet Security provides essential protection from viruses, hackers,
spyware, spam and other privacy threats. A comprehensive set of security tools, Norton Internet Security
help keep you safe online as you surf and email, swap files, download programs, and chat. In addition
protect against viruses and unwelcome intrusions from the Internet

...Read more...


NIS also allows you to automatically block annoying banner ads and pop-up window, make the parent siteblocking options for restricting access to certain web sites, and selectively determine, if any,Java applets and ActiveX controls should be allowed to download and run on your computer. EnjoyInternet with award-winning protection!
Key Technologies:Anti VirusAnti-RootkitBot ProtectionNorton Safe WebSmart FirewallNEW! 2 SONAR Behavioral ProtectionNEW! Norton Systems InsightNEW! Norton AntiSpam Insight NetworkNEW! Download Norton InsightNEW! Norton Threat InsightSpyware ProtectionIdentity ProtectionPulse UpdatesNetwork MonitoringParental ControlsVulnerability ProtectionNEW! Professional Strength AntiSpamNEW! Norton File Insight
Key Benefits:NEW threat Provide a clear explanation and performance provide greater insight into the downloadapplications and files by telling you where they came from, if they are trustworthy, and how theyaffect your PC's resources and performanceNEW Identify insecure Web site right on the search results you Warning you from malicious Web sites andsuspicious sellers so you can surf and shop online with confidenceImproved! Stops online identity theft, viruses, spyware, bots and more Guards your PC, onlineactivities, and your identity against all types of Internet threatsImproved! Stop attacks before they get on your PC Proactively blocks hackers and preventmalicious software from downloading to your computer when you surf the webUsing intelligence-driven Norton Insight Network for faster, fewer, shorter scans detect and removemalicious software with the shortest scan time of each security product
Norton Internet Security 2011 Features:
Intelligent ProtectionImproved! Norton Protection System provides a variety of security layers that work together to provideInternet threats comprehensive protectionNEW! Norton Safe Web to identify websites that are not safe and dangerous right in your search resultsImproved! Norton IdentitySafe offers one-click log-in and automatic form filling to prevent key loggersfrom stealing your information while you typeNEW! Norton IdentitySafe On-the-Go lets you access the most up-to-date log-in and password on everyNorton Internet Security 2010 PC protectedanti-phishing technology Industry-leading authenticate a secure site and protects you from visiting web sites that are not secure and fraudNEW! Analyze downloads, files and applications and notify you if they are trustworthy before you install and useImproved! Vulnerability protection guard security holes in your operating system, application, browser and browser plug-insImproved! Detects and removes even the most difficult to find and cookies Firefox Internet ExplorerfSmart Firewall stops hackers and make intelligent security decisions for youNEW! Parental Controls provides insight into online activity of your children so you can teach them a good internet habits and help them stay safeImproved! Norton Bootable Recovery Tool repair, restore and boots highly infected, the PC unbootableNEW! Professional-strength anti-spam protection using the same technology as large enterprises to effectively block a lot of unwanted email
Enginee for SpeedImproved! Proven fastest, light security suite for protection that will not slow you down, get in your way, or swallowing of system resources. More InfoImproved! Norton Insight scan files only at risk of fewer, shorter scans, and scanning the fastest time in the industry. More InfoIt will not slow you down when you download, copy, or edit files, or install the application. More Info
Combat today's rapid-fire attackNEW! Norton Insight Network using Symantec's global security network to provide real-time protection fromLatest-breaking threatsNEW! 2 SONAR (Symantec Online Network for Advanced Response) uses an online intelligence and proactive monitoringto detect and stop new threatsPulse Update norton provide quick mini update every 5 to 15 minutes for local protection up-to-the-minute onlatest threatsPrevents bots from taking control of your PCFinding and removing rootkitPrevents Internet worms from getting on your PCTells you which application processes are running on your PC safe and riskyNorton Bootable Recovery Tool provide a level of deep cleaning for heavily infected PC
Provide information on threats, download and filesNEW! Download Norton Insight warns you download malicious before you install and useNEW! Threats Norton Insight notify you if a threat is detected, the threat of trying to carry out what actionson your system, and how Norton Internet Security threats are eliminatedNEW! Norton File Insight tells you where your files and applications come from, if they trusted, and how they mightaffect the speed of your PC
Helps keep your PC running at top speedNEW! Norton System Insight helps you improve and maintain your PC performance and applicationNEW! Automatic and optimization of on-demand applications enhance application performanceNEW! Norton System Insight gives you an overview of recent events on your PC such as installing, downloading,scanned and threats are detected, so you can see what events might have influenced the performance of your PCNEW! Norton System Insight resource usage graph helps you determine what's causing your PC to slow downNEW! Tells you how your files and applications impact your PC's performance
Protection without interferenceSmart Scheduler scans and other tasks only if your PC is idleAutomatically switch to Silent Mode (no alerts, updates or scan) when watching movies or playing games in full screen modeNEW! Automatic delay in updating the products and other tasks if you watch TV or burn CD / DVDNEW! Power Saver Settings help extend battery life by delaying the portable PC power-intensive activities until your computer is plugged in
Additional FeaturesNEW! Monthly Report tells you what Norton Internet Security has been done in the last month to protect you and your PCFree 24x7 support by phone, email, live chat or online knowledge base .**Automatically scans email and IM to infectionMap and monitor the wireless network at home so you can see everything connected to the visitor is not even valid as the next PCAutomatic downloads of protection updates and new product features as available during the period of serviceWith Norton Automated Update Services your annual subscription can be automatically renewed for the protection of disturbed
Why Choose Norton Internet Security: 

* Improved! Stops online identity theft, viruses, spyware, bots and more Guards your PC, online activities, and youridentity against all types of Internet threats 
* Improved! Stop attacks before they get on your PC Proactively blocks hackers and prevent malicious software fromdownload onto your computer when you surf the web
 * NEW! Provide a clear threat and an explanation of performance Provide greater insight into downloading applications and filesby telling you where they came from, if they are trustworthy, and how they can affect your PC's resources and performance
 * NEW! Identify insecure Web site right on the search results you Warning you from malicious Web sites and sellers so suspiciousYou can surf and shop online with confidence 
* Using intelligence driven Norton Insight Network for faster, fewer, shorter scans detect and remove malicious softwarewith the shortest scan time of each security product
Supported Operating Systems: 

* Microsoft Windows XP with Service Pack 2 or later Home / Professional / Media Center 
* Microsoft Windows Vista (32-bit and 64-bit) Starter / Home Basic / Home Premium / Business / Ultimate* Microsoft Windows 7 (32-bit and 64-bit) Starter / Home Basic / Home Premium / Professional / Ultimate

  

http://www.filesonic.com/file/104517101/Norton.Internet.Security.2010.Directddl.ws.rar
OR :
http://www.fileserve.com/file/FDRyhJn

Understanding Registry

Understanding RegistryRegistry is the main control center on windows operating system. the registry have a lot of information about the software, hardware, and configuration of computer systems. But behind the functionality of the registry, it turns out the registry can be utilized for the process of hacking. Hacking is an art of hacking the registry using the registry as a medium for mengeksploitasisuatu windows operating system. In pstingan this time you will learn a lot about hacking the windows registry and the various consequences which can be taken to be manipulated.

Each root key contains sorts - kind keyyang used as a reference for the Windows operating system in configuring all the software installed in the Windows operating system.
In general, the Registry is divided into 2 elements, namely Hive and Values ​​Entries. Hive is the main branch in the registry yangdigunakan operating system to handle a particular operating system. While the Values ​​entry is the value entered on a key. For more details about
<b>STRUCTURE Windows Registry</b>
If you have managed to open the registry editor, first impressions in the show by the Registry editor window is the display 5 different key rot.&nbsp;</span>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjaxWZIrUgBpdCeXEmU-uMSJgVefcdhIQI8m60jeQkijRipXcFT2NW5avhGA9UUHTgZPtt-zaJiPQIZytTZhIFpGlVjwG8Yr2AcNq4Zd2Bx6ONlD3n9w1-TpmT3NaWcWwXZiBeOKAGXjll_/s1600/3.JPG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjaxWZIrUgBpdCeXEmU-uMSJgVefcdhIQI8m60jeQkijRipXcFT2NW5avhGA9UUHTgZPtt-zaJiPQIZytTZhIFpGlVjwG8Yr2AcNq4Zd2Bx6ONlD3n9w1-TpmT3NaWcWwXZiBeOKAGXjll_/s1600/3.JPG" /></a></div>
Each root key contains sorts - kind keyyang used as a reference for the Windows operating system in configuring all the software installed in the Windows operating system.
In general, the Registry is divided into 2 elements, namely Hive and Values ​​Entries. Hive is the main branch in the registry yangdigunakan operating system to handle a particular operating system. While the Values ​​entry is the value entered on a key.Hive and Values ​​entries, you can read the next chapter.