Thursday, December 30, 2010

How to improve your wireles access point security

It’s important to remember that a wireless signal is broadcast and accessible to anyone who has the technology to receive it. By default all traffic is encrypted that travels between the 2WIRE 2700HG-B and
any connected computer or wireless device. Encrypting the wireless traffic makes it more difficult for an unauthorized individual to extract information if your wireless signal is intercepted. The default type of encryption (WEP-Open) used by some wireless access points can be easily broken and decoded.

Data transmission through wireless channels are vulnerable to piracy. Anyone who is in the coverage area can access a wirelss network. In order not meudah hijacked another person, is required enkrispi to randomize the data sent on the wireless network. Wi-fi equipment are now providing sekurity technology options that can be used as needed.
What you have to do now is activate the security feature. following ways to activate it:
• Open your browser, then log into the IP access point.
• In the basic settings, go to wireless – wireless settings.
• Give a checklist on the options enabled wireless security
• On the security tyepe select the type of security that you want to use.
• At the security option, select the security model, if you do not want to elaborate just select Automatic.
• In the WEP Key format, specify the type of key that will be used, whether ASCII or Hexadecimal. Keuy in the form of letters to select ASCII.
• In the WEP Key field, enter the access point.
• Specify the encryption on the Key Type.
• Click Save to save it.
IT security needs to use a layered approach. While no single layer of security is enough to withstand every attack, each additional layer serves to further harden your system and discourage would-be attackers
and free-loaders. Here are six settings on your router which, if properly configured, will better protect your network, your computers, and your data.
1. Change the default password for the administrator account on your wireless router or access point. This is absolutely essential and should have been the very first thing you did after you unboxed it.
Don’t use a word in the dictionary or anything easily guessed.
2. Limit access to your wireless LAN by using MAC address filtering. A MAC address (also called the physical address) is an identifier unique to each network adapter. MAC address filtering involves looking up the MAC address of each device that will connect to the WLAN and adding them to a list in the router’s control panel. MAC addresses can be spoofed, so filtering shouldn’t be the only security method used.
3. Change your SSID (network name). A router’s default SSID (Service Set Identifier) can be used to identify your hardware, which could help a hacker determine the default administrator password (see step
1). A default SSID also suggests that the network was poorly configured, making it appear to be an easier target. Change it to something you and your family would recognize (your pet’s name, for example), but that’s not publicly identifiable (don’t use your name, your address, etc.).
4. Don’t disable SSID broadcasting Disabling SSID broadcasting will prevent casual browsers from finding your network, but it also means you will have to manually enter the name of your network on each device and your laptop will periodically ping your SSID. Not broadcasting your SSID does nothing to secure your network, it just makes it less obvious to your neighbors.
5. Use the strongest encryption form supported by your router and all of your other devices. The best choice is WPA2 with the “TKIP+AES” algorithm, which is the newest type of wireless encryption and
provides the highest level of encryption available. WPA2 has been available on most devices manufactured in the past few years. WPA-PSK, also called WPA-Personal, encryption is the next best, and 128-bit WEP is the weakest level of encryption and not very good, but better than nothing. Use a strong password, ideally a string of at 20+ random alpha-numeric characters.
6. Disable remote administration. The ability to remotely administer your WLAN router via the Internet should be turned off unless you absolutely need this. It is usually turned off by default, but it’s a good idea to check. The only downside to this is that you will have to physically connect a computer to the router in order to configure it, which isn’t necessarily a downside at all.
Hiding In the Network Access Point Wi-Fi
On the Wi-Fi access point SSID broadcast will make a regular basis, this feature is enabled for hot spots. Access points can be hidden to prevent people who do not want to know there is a wireless network in
your area.
To hide access points within the Wi-Fi in conducted in the following steps :
• Open the browser, then log into your ip access point
• In the basic settings, go to wireless – wireless settings.
• Checked uncheck the option Enable SSID Broadcast.
• Then click the save button.
Read More

how to upgrade computer memory

Is your computer performance has begun too low? Many things can cause the performance of a computer can be reduced significantly. Some causes include hard disk capacity is full, too many temporary files from the Internet, many computer viruses that attack your computer system, or computer memory may also exist in the system is not adequate when compared with the applications used on existing computers.
To overcome this, many ways that you can do to make your computer performance can return to normal. Some things you can try to restore performance your computer such as adding hard disk capacity perform regular antivirus scans, do the disk cleaning system, as well as upgrading computer memory that you currently use.

The easiest way to overcome this is to upgrade your computer memory. This is for several reasons, among them is much easier for you to do, quickly, and also can provide maximum results and also with a fairly low cost. But a few things you should consider before doing an upgrade of computer memory, such as:

  • Note the type of memory on your computer right now, whether the type DDR1, DDR2, or DDR3. This must be what you really pay attention because if something goes wrong in choosing the type of memory, usually often happens "Hang" on your computer.
  • The speed of memory you use should be the same, between the current memories with a memory that you will use to add the capacity of existing ones, such as cache memory with PC4300, PC 7200, and so on. If you combine two different types of speed cache memory that is, for example, put together with PC7200 and PC4300 then it can be ascertained it will not work, and your computer will go "hangs".
Read More

AMD FirePro V8750


AMD computer producers release their new products in the form of a dedicated video card for the professional segment, the AMD FirePro V8750. FirePro new model is based on RV770 graphics core, but with a capacity greater memory, which is about 2 GB of GDDR5. Digital content creation and high-class CAD solutions need a video card with high performance and affordable price. AMD FirePro V8750 provides high-class graphics performance with support for 2 GB of memory buffers, making a professional video card ever. AMD FirePro V8750 comes with the RV770-based core 55nm, with a speed of 750 MHz and 800 stream processors. This video card supports Shader Model 4.0 (DirectX 10.1) and Open GL 2.1. 256-bit memory bandwidth to work on the 115 GB / s and is useful to help the graphics professionals who require high performance. Support PCI Express 2.0 and two display ports, one DL-DVI output and output Stereoscopic makes this card is one with a complete cable connection. AMD FirePro V8750 video card makes it faster and easier for you to use. As for quality there is support for animation rendering process, whether it is for graphic design and architecture.
Read More

Wednesday, December 29, 2010

How To Fix An Overheating Laptop

The greatest threat for your laptop, except for your your coffee mug, is overheating. It can cause hardware failure and permanent damage. In this article I will introduce ways that you can prevent or fix an overheating laptop and thus improve the performance and the extend the lifespan of your laptop.

How Do You Know Your Laptop Is Overheating?

A sure sign that your notebook gets too hot is when your fan always runs at maximum speed. You may also experience reduced performance because the CPU cuts back its clock speed to escape heat pressure. Moreover, the fail safe software may trigger a sudden shutdown to prevent hardware damage.

What Causes Overheating?

In two words: insufficient cooling.

The reasons include dust blocking intake grills or exhaust ports, a clocked up fan, or a degenerated thermal grease (aka thermal compound) between the heat sink and the CPU.

How Can You Prevent or Fix an Overheating Laptop?

There are several hardware fixes that can cure overheating.

1. Fix Internal Cooling

The first and most important thing you need to do when your laptop is overheating, is to clean the fan/s that provide/s cooling to the CPU and graphics card. Over time they build up layers of dust and dirt that slow them down and block flow of air. Consult your laptop’s manual or manufacturer to find out how you can open the laptop to access and clean these parts.

Before you attempt to do any cleaning, however, follow these steps:

  • shut down the computer.
  • remove the battery.
  • unplug the power strip.
  • ground yourself

Carefully clean the fan/s with a cotton swab dipped in a drop of alcohol. Make sure the alcohol has completely evaporated before you reconnect the laptop to the power. You can also use a vacuum cleaner to remove the dust and dirt that clocks up the fan/s. To prevent damage to the fan, do not let it revolve in the wrong direction. If you want to use canned air to clean the fan, arrest the fan by holding it down.

Next, you can clean the exhaust port by sucking out air with a vacuum cleaner. The exhaust port usually sits on the side of the laptop. It’s the opening that blows out hot air.

The intake grills are small openings that allow air to be sucked into the laptop by the revolving fans. They can sit on the sides or at the bot

tom of your notebook. To clear the intake grills, spray them with canned air.

Finally, you can apply fresh thermal grease to the interface between the CPU and its heat sink. Again, please consult the laptop’s manual or ma

nufacturer to obtain instructions on how to disassemble these components.

2. Keep The Laptop On A Hard & Flat Surface

Most laptops suck in cooling air through their bottoms. If the laptop sits on an uneven surface like a blanket, pillow, or your lap, the flow of air into the laptop is disturbed. Subsequently, the cooling is not optimal, heat builds up, the surface becomes hot, the temperature of sucked in cooling air increases, and eventually the laptop overheats.

This scenario is easily avoided by keeping the laptop on a hard and flat surface. You can use something as simple as a tray or get a special laptop holder or lap stand.

3. Invest In A Laptop Cooler

Laptop coolers are meant to provide additional c

ooling. However, getting the wrong cooler can actually make the problem worse. Before you purchase a cooler, you need to understand the flow of air into and out of your laptop.

As mentioned above, most laptops suck in air for cooling from the bottom. This makes sense because warm air rises upwards. However, a cooler that sits underneath the laptop and sucks air away from it, does not contribute to laptop cooling and rather causes a more rapid overheating.

If your laptop has intake grills at its bottom, purchase a cooler that blows cool air upwards, i.e. into the laptop. You can also get a passive cooler that does not consume power and merely absorbs heat.

What Are Potential Software Fixes?

If none of the hardware fixes result in lasting improvements, you can also revert to software fixes that address the performance and power usage of your laptop. However, addressing excessive heat with a software fix means you give up performance in favor of preserving the hardware.

You can either reduce the brightness of your screen or reduce the CPU clock speed. In Windows, underclocking or undervolting is done in the BIOS, but can also be controlled through software tools. Consult the Undervolting Guide on the Notebook Review forum for more information about this procedure.

Read More

Microsoft Windows 7 SP1 Beta Invites being sent now

It really doesn’t seem any time at all since Windows 7 was released but Microsoft plans to release the public beta of Windows 7 SP1 and Windows Server 2008 R2 SP1 by the end of next month.

But it has already begun sending email invites to potential testers to join the technical beta, which is set to begin by end of June. Invites are being sent “based on the quality of feedback you have provided on previous Windows programs.” According to tech site Neowin, the email confirms that the beta will be available in English, German, Japanese, French and Spanish.

The company has already made it clear that SP1 will offer little in the way of new additions. It will be a combination of updates already available through Windows Update and a bunch of hotfix patches. However, SP1 for Windows and Windows Server 2008 R2 will deliver a rich user experience to remote users with the introduction of RemoteFX: “With Microsoft RemoteFX, users will be able to work remotely in a Windows Aero desktop environment, watch full-motion video, enjoy Silverlight animations, and run 3D applications – all with the fidelity of a local-like performance when connecting over the LAN.”

Read More

Multitouch Mouse of Microsoft

Can you over design something? Apparently not…Microsoft hasn’t said anything official as of yet, but it looks like the company is planning to release a version of the Arc mouse with multitouch input.

The evidence is extensive and fairly convincing. First, Microsoft has registered the domain “arctouchmouse.com”, which currently redirects to Bing. Several European retailers have started listing a “Microsoft Arc Touch Mouse” on their sites. The Redmond mostly software company was also known to be working on multitouch mouse concepts in their research division in 2009.

If this product does exist, what can we expect from it? Windows 7 does have multitouch functionality built right in, but most consumers don’t have the hardware to take advantage of it. Even if the Arc Touch is just a PC clone of the Apple Magic Mouse, it will allow PC users a new set of experiences without buying an expensive multitouch PC.

The listings we mentioned earlier are showing the Arc Mouse as selling for about $70. Assuming that is a PC Magic Mouse, would you take a chance at that price point?

Read More

IE9 + XP [ Never Going to Happen ]


It may be time to upgrade your OS, that is if you’re running XP and want to use the latest version of Internet Explorer (9). Now that the Internet Explorer 9 Beta is out, Microsoft are sharing a few more pieces of information about the final product.

One juicy tidbit they’ve dropped is that users of Windows XP are boned if they expected to be able to update to the latest and greatest Microsoft browser. According to Microsoft’s Ryan Gavin, the company won’t be adding IE9’s GPU acceleration to IE8, and IE9 won’t be available on XP.

During this Windows XP hate-fest, Microsoft reps also took the opportunity to talk up Windows 7. So the picture is clear, If you’re still on Windows XP, Microsoft is looking to leave you in the dust bit by bit. About 53% of global PCs are still on Windows XP, many of them in corporate settings. Much of the IE9 hardware acceleration is tied into DirectX 10, which is only officially available on Windows Vista and 7.













image via Reuters

By making this move, Microsoft is basically ceding a portion of the market to Firefox and Chrome. If users want advanced web features, that’s where they have to go. It’s not clear if development of any sort will continue on IE8. Still, using language like this just invites clever users to make IE9 run on whatever they want.

Read More

ATI Catalyst 10.9 [ Get it Now ]


If you haven’t already spotted this and carried out the upgrade, AMD has made available its ATI Catalyst 10.9 software suite, which you can download directly from AMD or access via your Steam account.

There are only a handful of performance improvements in the latest release, including double digit gains in Stalker: Call of Pripyat benchmark for HD 5700 and HD 5800 graphics cards owners, and single digit performance gains in The Chronicles of Riddick: Assault on Dark Athena for HD 4800, HD 5700, and HD 5800 owners.

Some new profiles have been added and updated (Aliens Vs Predator, Battlefield: Bad Company 2, F1 2010, Kane & Lynch 2), as well as a handful of resolved issues for Windows 7, Vista, and XP.


Driver Download

Release Notes (PDF)

Read More

Sunday, December 26, 2010

Software to speed up your PC while playing games

Game Booster is a free software that can be used to optimize the speed of your PC and play games faster.
You only need to run this software before running the game and click the Switch To button on the application Gaming Mode and after the play be sure to click on Back to Normal Mode.

Key Features Of Game Booster:
* Give more CPU and RAM for your game, to play games faster
* This stabilizes the performance of games and play games
* It does not provide extra load on your hardware
Note: Game Booster only supported on windows xp, vista and windows 7

DOWNLOAD HERE
Read More

Free software to restore files that are hidden by the virus

Because the virus eventually must learn to restore the data files or folders that have been lost or hidden. From the results of search on google, lucky I found the software to restore files that have been hidden.
If you have the same problem, following the software and use the procedure you can download it here.
Download here
Stay extract the file, then learn how the use of ordinances. Hopefully useful!

Or you can use change attrib download here
Read More

Eliminate Key Blacklist Kaspersky Internet Security 2010






For those of you who like the internet, so of course you need a safer kind of internet security, anti spyware and it kind of right?
Well one of them is Kaspersky Internet Security. In my opinion Kaspersky Internet Security is indeed powerful enough to control the threat that might damage your computer system. Inside there is also a feature to its Parental Control to control / limit what sites you can open. But the problem in this Kaspersky that is if we do not use original key, then this application will be blacklisted by Kaspersky, so the application can not update that might make you uncomfortable using it.

In my article will discuss how to overcome these problems.

Please follow his steps:

* Make sure you use Kaspersky Internet Security 2010
* Make sure you also to the internet tterhubung
* If your keys on the blacklist, delete these keys.
* After that will appear the windows activation wizard, close it
* Choose a setting, then select "Options" then unchek "enable self defense", then OK.
* Then exit Kaspersky from the taskbar (which is below, near the clock).
* Then exit Kaspersky from the taskbar (which is below, near the clock)
* Open run, type "regedit"
* Then navigate to HKEY_LOCAL_MACHINE \ SOFTWARE \ KasperskyLab \ protected \ AVP9 \ environment status.
* Find a product.
* Click 2x on product status and change manjadi Beta Release, then select OK.
* Exit the registry and then refresh the desktop.
* Activate Kaspersky, it will appear the windows activation.
* Select Activate beta license (To do this, make sure your computer is connected to the internet), click next. After that we will get a 30 day beta key

And this can be done repeatedly. If the key is up, then the steps above can be done again, and we will get a new key again.

* Turn it back on Enable self defense.
* Finish.

Hopefully this article can help you ..
Read More

Friday, December 24, 2010

New Gigabyte Motherboard Mainstay [Gigabyte X58A-UD9]

Gigabyte X58 market is being hit with a number of motherboards, the Gigabyte latest X58A-UD9. Not surprisingly, Gigabyte motherboard also market their own specific standards: DualBIOS, which allows for a backup BIOS protection; Hybrid Silent-Pipe 2 design for the conductance in the chipset and VRM heat so the fan is not needed (the connector is provided for cooling water), and hardware control IC for precision control voltage. Gigabyte penchant for the high number of phases also exist in the form of phase '24 'VRM (ability is currently not known). Also there is support for On / Off Charge, which allows the USB device will be powered by the USB port specified when the motherboard is turned off - Gigabyte to take advantage of this by providing 3x more power to the USB port of this.

The motherboard is obviously intended for fans who want to break the record for overclocking. No pricing information, but will most likely be more expensive than the EX58-Extreme, which is currently on the market the lowest priced 349 USD or 3 thousands of dollars. (via AnandTech)
Read More

How to connect a straight line and cross line







In
this article I will give a little explanation about the kinds of lan cable, hopefully can open horizons and help some people who really BLIND.


Equipment and media required:


1.
UTP Cable
2. RJ45 Connector
3. Crimping pliers
4. LAN Tester

5. Scissors

# Straight cable diagram
Function: Connecting a PC with a HUB / Switch.
The following diagram straight cables:
Order Edge A

1. White Orange
2. Orange
3. Green White
4. Blue
5. Blue White
6. Green
7. White Chocolate
8. Chocolate


Order Edge B

1. White Orange
2. Orange
3. Green White
4. Blue
5. Blue White
6. Green
7. White Chocolate

8. Chocolate


# Cross cable diagram
function:
1. Connecting a PC to PC directly without HUB / Switch.
2. Linking HUB / Switch with HUB / Switch.

The following diagram cross cables:

Order Edge A

1. White Orange
2. Orange
3. Green White
4. Blue
5. Blue White
6. Green
7. White Chocolate
8. Chocolate

Order Edge B

1. Green White
2. Green
3. White Orange
4. White Chocolate
5. Chocolate
6. Orange
7. Blue
8. Blue White


Read More

Tuesday, December 21, 2010

Key Basic Keyboard for Windows

CTRL+C (Copy)
CTRL+X (Cut)
CTRL+V (Paste)
CTRL+Z (Undo)
DELETE (Delete)
SHIFT+DELETE (Delete the selected item permanently without placing the item in the Recycle Bin)
CTRL while dragging an item (Copy the selected item)
CTRL+SHIFT while dragging an item (Create a shortcut to the selected item)
F2 key (Rename the selected item)

CTRL+RIGHT ARROW (Move the insertion point to the beginning of the next word)
CTRL+LEFT ARROW (Move the insertion point to the beginning of the previous word)
CTRL+DOWN ARROW (Move the insertion point to the beginning of the next paragraph)
CTRL+UP ARROW (Move the insertion point to the beginning of the previous paragraph)
CTRL+SHIFT with any of the arrow keys (Highlight a block of text)
SHIFT with any of the arrow keys (Select more than 1 item in a window or on the desktop, or select text in a document)

CTRL+A (Select all)
F3 key (Search for a file or a folder)
ALT+ENTER (View the properties for the selected item)
ALT+F4 (Close the active item, or quit the active program)
ALT+ENTER (Display the properties of the selected object)
ALT+SPACEBAR (Open the shortcut menu for the active window)
CTRL+F4 (Close the active document in programs that enable you to have multiple documents open simultaneously)
ALT+TAB (Switch between the open items)
ALT+ESC (Cycle through items in the order that they had been opened)

F6 key (Cycle through the screen elements in a window or on the desktop)
F4 key (Display the Address bar list in My Computer or Windows Explorer)
SHIFT+F10 (Display the shortcut menu for the selected item)
ALT+SPACEBAR (Display the System menu for the active window)
CTRL+ESC (Display the Start menu)
ALT+Underlined letter in a menu name (Display the corresponding menu)
Underlined letter in a command name on an open menu (Perform the corresponding command)
F10 key (Activate the menu bar in the active program)

RIGHT ARROW (Open the next menu to the right, or open a submenu)
LEFT ARROW (Open the next menu to the left, or close a submenu)
F5 key (Update the active window)
BACKSPACE (View the folder one level up in My Computer or Windows Explorer)
ESC (Cancel the current task)

SHIFT when you insert a CD-ROM into the CD-ROM drive (Prevent the CD-ROM from automatically playing)
CTRL+SHIFT+ESC (Open Task Manager)
CTRL+TAB (Move forward through the tabs)
CTRL+SHIFT+TAB (Move backward through the tabs)
TAB (Move forward through the options)
SHIFT+TAB (Move backward through the options)
ALT+Underlined letter (Perform the corresponding command or select the corresponding option)
ENTER (Perform the command for the active option or button)
SPACEBAR (Select or clear the check box if the active option is a check box)
Arrow keys (Select a button if the active option is a group of option buttons)
F1 key (Display Help)
F4 key (Display the items in the active list)
BACKSPACE (Open a folder one level up if a folder is selected in the Save As or Open dialog box)

RIGHT ARROW (Move to the right or to the beginning of the next line)
LEFT ARROW (Move to the left or to the end of the previous line)
UP ARROW (Move up one row)
DOWN ARROW (Move down one row)
PAGE UP (Move up one screen at a time)
PAGE DOWN (Move down one screen at a time)
HOME (Move to the beginning of the line)
END (Move to the end of the line)
CTRL+HOME (Move to the first character)
CTRL+END (Move to the last character)
CTRL+P (Print the current page or active pane)
ALT+Minus sign (-) (Display the window menu for the active console window)
SHIFT+F10 (Display the Action shortcut menu for the selected item)
F1 key (Open the Help topic, if any, for the selected item)
F5 key (Update the content of all console windows)

CTRL+F10 (Maximize the active console window)
CTRL+F5 (Restore the active console window)
ALT+ENTER (Display the Properties dialog box, if any, for the selected item)
CTRL+F4 (Close the active console window. When a console has only one console window, this shortcut closes the console)

Windows Logo (Display or hide the Start menu)
Windows Logo+BREAK (Display the System Properties dialog box)
Windows Logo+D (Display the desktop)
Windows Logo+M (Minimize all of the windows)
Windows Logo+SHIFT+M (Restore the minimized windows)
Windows Logo+E (Open My Computer)
Windows Logo+F (Search for a file or a folder)
CTRL+Windows Logo+F (Search for computers)
Windows Logo+F1 (Display Windows Help)
Windows Logo+ L (Lock the keyboard)
Windows Logo+R (Open the Run dialog box)
Windows Logo+U (Open Utility Manager)

Read More

Folder Password Protect Software Tools

Have a folder whose contents confidential files, private and abstinence in reading people?
(so curious about its contents hell is that??? until much for the secret)

Sure you want to protect my folder?
many software provider
But let not confused nyarinya ... posted this I'd love some alternative software for your choice .... so
so do not be confused ...

let's get started ....


1. Folder Lock 5.9.0




one of his greatness again this software is portable or can be installed also in removing the disk or external hard drive or flash ...
Cool flash we can lock
let no man can open ...
learning about how to password protects flash can be viewed here ..

link download here
Lisensi : Trial
Os suport : Windows NT/2000/XP/2003 Server/Vista/2008 Server



2. Free Folder Hider 10.7




link to download here

Lisensi : Free
Os suport : Windows 2000/XP/2003 Server/Vista






3. Folder Vault 2.0.24





The advantages
of this software is a feature Auto Lock, Shutdown PC, Erase recent documents history, Empty Recycle Bin, Clean Internet Explorer History, Clear IE Address Bar, Erase IE Temporary Files and Cookies, password to uninstall Folder Vault, and Hide from Add menu status Remove ....



Download Folder Vault 2.0.24 here


Lisensi : Trial
Os suport : Windows 2000/XP/2003 Server/Vista

Read More