A homepage subtitle here And an awesome description here!

Selasa, 24 Januari 2012

Mozilla Firefox : how to create own browser skin


Creating a Skin for Firefox, there are three things you need to know: how to edit images, how to extract zip files, and how to modify CSS. Firefox uses standard GIF, PNG, and JPEG images for the buttons and CSS to style everything else in the interface.

A skin does not totally change the interface; instead, it just defines how the interface looks. You can't change what happens when the user right clicks on an image, but you can change the look of the right click menu (Make it blue with pink polka dots, for example). If you want to change the functionality of Firefox, you'll have to look into modifying the chrome, which is beyond the scope of this document.

Download the latest version of Firefox and install it. Be sure to install the DOM Inspector extension as well.

Extract Theme

While you can hypothetically begin with any theme already designed for Firefox, for the sake of consistency we'll speak as though everyone is editing the default Firefox theme. This is located in the file classic.jar found in the Firefox installation directory. A .jar file is in reality a renamed zip archive. Opening the .jar files in your archive manager of choice should result in the file being automatically detected as being a zip archive. However, if your application doesn't detect classic.jar as a standard zip archive, rename the file classic.zip and continue extraction.
Classic.jar locations

Linux: /usr/lib/MozillaFirefox/chrome/classic.jar or /usr/lib/firefox-*.*.*/chrome/classic.jar

Windows: \Program Files\Mozilla Firefox\chrome\classic.jar

For Mac OS X:

* Go to your applications folder
* Control click application icon(Firefox icon), choose Show Package Contents.
* Go to contents/MacOS/Chrome/classic.jar

Copy classic.jar to another easily accessible folder -- Classic is recommended -- extract the contents of that folder, being sure to maintain the directory structure.
Directories

Inside classic.jar is one directory, skin, as well as two files, preview.png and icon.png.

skin
skin simply contains another directory, classic which holds all the good stuff.
skin\classic
classic contains the following directories.
skin\classic\browser
browser contains all the toolbar icons, as well as the icons for the bookmark manager and the preferences window.
skin\classic\communicator
Doesn't do a whole lot and can typically be forgotten about promptly.
skin\classic\global
global contains almost all of the important CSS files that define the appearance of the browser. This is the most critical directory in a theme.
skin\classic\help
help contains all the files for theming the help dialog window.
skin\classic\mozapps
mozapps contains all the styles and icons for the browser peripherals, such as the extension manager or update wizard.

Install Your New Theme

Before you can see the changes you make to a Firefox theme (since live edits are restrictively difficult to set up) you must first learn how to repackage the classic theme to make it installable. For the sake of this discussion we will call your theme "My_Theme", though you can replace that with any name.
Copying The Necessary Files

The first step is to move all the files into the right directory structure. So create a new directory called My_Theme. Into this directory put the browser, global, communicator, help, and mozapps directories from above, as well as the icon.png and preview.png files. (Yes, this means that the structure of your new directory and classic.jar will be slightly different.)
Creating the Install Files
Contents.rdf

Make a copy of contents.rdf and place it in \My_Theme and open it up in your text editor. This file is a small XML Database which is used to describe the skin.

In the code search for all instances of "My_Theme" and replace them with the name of your theme.

The packages section lists which components of the browser you're modifying. If we also had skins for Chatzilla, we would need to add another line resembling the other ones and change it to point to Chatzilla. But this list includes everything that we changed, so just modify the blue text to point to match the name/version that you used in the sections before this.

Save the file and exit the text editor.
install.rdf

Make a copy of install.rdf and place it in the My_Theme directory, then open it up in your text editor. This file is a small XML database that describes the skin.


{Themes_UUID}
Themes_Version

The first section requires that you establish a UUID for your theme and that you give your theme a version number. Once you've done this, insert the information as above, and scroll down.

You will also have to update the minimum and maximum compatible versions for the target application (Firefox) in the following section:




{ec8030f7-c20a-464f-9b0e-13a3a9e97384}
Min_FF_Version
Max_FF_Version


Establishing both minimum and maximum compatible versions lets you avoid conflicts with versions of Firefox your theme wasn't designed for -- or wasn't tested on.

See Install Manifests for the reference information about the install.rdf file.
CSS Files

The CSS files in these directories tell the browser how to display the buttons and other controls, where to put the images, what border and padding it should put around them, and so on.

As an example, let's change the standard button.

Go into the global global directory and open button.css in your favorite text editor. Scroll down to button {. This section defines the normal button in its basic state (There is no mouse over it, it's not disabled, and it's not selected).

Change the background-color: to DarkBlue and the color: to White, and save the file.

more after I get done with some tests
Repackaging JAR

Now all you need to do is repackage a JAR file with the following directory structure, using your favorite archive manager to create a zip archive:

/browser/*
/communicator/*
/global/*
/help/*
/mozapps/*
/contents.rdf
/install.rdf
/icon.png
/preview.png


Make sure not to just zip up the My_Theme parent directory since that will cause the drag and drop install in the next section to fail without error messages. Once you have put the files in the zip folder, rename it to My_Theme.jar
Triggering the install from the web

To install the theme's JAR file directly from the web, you need to run some JavaScript

Optimize Adsense Keywords and Earning

Adsense from Google Adsense provides an easy opportunity for bloggers and webmasters to earn revenue from their hard work. To make significant money from your website or blog, the trick is to find the right way to deploy Adsense.

Simply cutting and pasting the Adsense code on to your web pages will not be enough. Try out variations of advert page placements and advert formats. To find the right layout that maximizes Adsense revenue usually takes a while.

One of the keys to a good Adsense click-through rate is to make sure that the ads served are relevant to your website visitors. if the goods and services offered by your advertisers are irrelevant then your visitors will not be interested in visiting their sites. make sure your content is relevant and is targeted at a narrow selection of related topics. Your meta tag keywords must reflect the content of your website.

There are numerous successful methods for increasingAdsense money. A great tip is to place the Adsense adverts on page ‘hotspots’. the top left of a web page is well known to be an effective zone on which to place advertisements. the reason for this is that we all read from top to bottom and from left to right.

Another excellent Google Adsense tip is to locate adverts on your pages with the highest traffic. decide which are the best pages by monitoring your web statistics and locating the main visitor entry pages.

Your Adsense ads should blend in with the rest of your web page. this generally makes the adverts seem like a natural part of your site, and will reassure your visitors and make the site look more professional. Adsense allow website developers with content centric websites to add a substantial revenue stream to their site by adding contextual advertising, which can generate revenue from few pennies a day to thousands of dollars per month.

Some of the websites like Iotaweb.org helps the visitors to search for keywords and key phrases which can produce high dollar contextual advertising. There are approximately 360 Google Adsense Top paying Keywords starting with letter A. Keywords on Google are sorted by highest average CPS. Some of the main keywords are: adverse credit remortgages, at call conference, angeles drug los rehab, at go and so on.

The formula for success is (# of Visitors) X (Click thru %) X (Ad value) = Income.

By what means ads can be created on Google? The process is simple, you create ads and choose keywords, which are words or phrases related your business. When a visitor searches on Google using one of your keywords, your ad may appear next to the search results. You are actually advertising to an audience or the visitor that’s already interested in you.

Visitors simply click your ad to make a purchase or learn more about your product. Actually you don’t even need a webpage to get started – Google helps in creating one for you free of cost.

One can find numerous keyword research tools. Keyword Country is considered to be the most comprehensive and most complete keyword research tool. It connects to major engines for keyword research including Google, MSN, Yahoo, ASK. It steals all the niche keywords that the industry happens to be focusing on.

Its software Google Adsense KeywordGoogle is one of the maximum earning search engines.

With this you can access to:

a) Most profitable High paying Keywords

b) Traffic building keywords

c) High CTR keywords

d) Thousands of Niche keywords from almost 600,000 markets online

e) Increase website traffic, build more content and study the behavior of keywords

Since your aim is to earn money, you have to be more specific in choosing the best keyword to attract organic traffic to earn money through your website. When we think of high paying keywords, the first thing that comes in our mind is CPC – Cost per Click. The maximum amount that an advertiser pays is termed as CPC. The more CPC of the keyword, the more will be the payout for the said keyword. Google has been the most accurate source of CPC.

All the website publishers and advertisers can use Google Adsense to advertise and earn money in return. Content can be advertised without much effort. You can display targeted Google ads on your website’s contents pages and earn valid clicks or impressions. One can utilize the Adsense; through which one can have access to Google’s advertiser’s network, and subsequently display your ads that are targeted to a particular audience which shows interest by knowing the most expensive keywords on the internet; you can create websites and web pages based on these keywords. On these web pages you can show expensive ads and sell your affiliates products or offers to earn money

Increase Visitor Traffic for your website

Increase website traffic is one of the most important point to grow up your site.If you have a website—especially one you want to monetize—this is undoubtedly a question you’ve asked yourself. Often, the single biggest impact on the level of web traffic your site gets is its search engine page ranking or SERP. Major search engines like Yahoo!, Google, Ask, and MSN, however, choose to add some intrigue to the pursuit of rising up the search engine results page (SERP) ladder by keeping the majority of their metrics a secret. The resulting effect leaves the webmaster and search community with the daunting task of sifting through rumors and experience to shorten the slog through massive amounts of trial and error needed to figure out what really works.

But fear not good people of the internet! There is hope on the horizon yet. Lucky for all of us there are more people with great ideas and ambition trying to solve the riddles than there are riddle masters holding us back. Thanks to these internet superheroes much of the mystery that shrouds effective search engine marketing has been lifted, and what we are left with is a much clearer picture of what works and what does not.

Choose the Right Blog Software, The right blog CMS makes a big difference. If you want to set yourself apart, I recommend creating a custom blog solution - one that can be completely customized to your users. In most cases, WordPress, Blogger, MovableType or Typepad will suffice, but building from scratch allows you to be very creative with functionality and formatting. The best CMS is something that's easy for the writer(s) to use and brings together the features that allow the blog to flourish. Think about how you want comments, archiving, sub-pages, categorization, multiple feeds and user accounts to operate in order to narrow down your choices. OpenSourceCMS is a very good tool to help you select a software if you go that route.

Host Your Blog Directly on Your Domain, Hosting your blog on a different domain from your primary site is one of the worst mistakes you can make. A blog on your domain can attract links, attention, publicity, trust and search rankings - by keeping the blog on a separate domain, you shoot yourself in the foot. From worst to best, your options are - Hosted (on a solution like Blogspot or Wordpress), on a unique domain (at least you can 301 it in the future), on a subdomain (these can be treated as unique from the primary domain by the engines) and as a sub-section of the primary domain (in a subfolder or page - this is the best solution).

Write Title Tags with Two Audiences in Mind, First and foremost, you're writing a title tag for the people who will visit your site or have a subscription to your feed. Title tags that are short, snappy, on-topic and catchy are imperative. You also want to think about search engines when you title your posts, since the engines can help to drive traffic to your blog. A great way to do this is to write the post and the title first, then run a few searches at Overture, WordTracker & KeywordDiscovery to see if there is a phrasing or ordering that can better help you to target "searched for" terms.

Participate at Related Forums & Blogs, Whatever industry or niche you're in, there are bloggers, forums and an online community that's already active. Depending on the specificity of your focus, you may need to think one or two levels broader than your own content to find a large community, but with the size of the participatory web today, even the highly specialized content areas receive attention. A great way to find out who these people are is to use Technorati to conduct searches, then sort by number of links (authority). Del.icio.us tags are also very useful in this process, as are straight searches at the engines (Ask.com's blog search in particular is of very good quality).

Tag Your Content, Technorati is the first place that you should be tagging posts. I actually recommend having the tags right on your page, pointing to the Technorati searches that you're targeting. There are other good places to ping - del.icio.us and Flickr being the two most obvious (the only other one is Blogmarks, which is much smaller). Tagging content can also be valuable to help give you a "bump" towards getting traffic from big sites like Reddit, Digg & StumbleUpon (which requires that you download the toolbar, but trust me - it's worth it). You DO NOT want to submit every post to these sites, but that one out of twenty (see tactic #18) is worth your while.

Launch Without Comments, There's something sad about a blog with 0 comments on every post. It feels dead, empty and unpopular. Luckily, there's an easy solution - don't offer the ability to post comments on the blog and no one will know that you only get 20 uniques a day. Once you're upwards of 100 RSS subscribers and/or 750 unique visitors per day, you can open up the comments and see light activity. Comments are often how tech-savvy new visitors judge the popularity of a site (and thus, its worth), so play to your strengths and keep your obscurity private.

Don't Jump on the Bandwagon, Some memes are worthy of being talked about by every blogger in the space, but most aren't. Just because there's huge news in your industry or niche DOES NOT mean you need to be covering it, or even mentioning it (though it can be valuable to link to it as an aside, just to integrate a shared experience into your unique content). Many of the best blogs online DO talk about the big trends - this is because they're already popular, established and are counted on to be a source of news for the community. If you're launching a new blog, you need to show people in your space that you can offer something unique, different and valuable - not just the same story from your point of view. This is less important in spaces where there are very few bloggers and little online coverage and much more in spaces that are overwhelmed with blogs (like search, or anything else tech-related).

Link Intelligently, When you link out in your blog posts, use convention where applicable and creativity when warranted, but be aware of how the links you serve are part of the content you provide. Not every issue you discuss or site you mention needs a link, but there's a fine line between overlinking and underlinking. The best advice I can give is to think of the post from the standpoint of a relatively uninformed reader. If you mention Wikipedia, everyone is familiar and no link is required. If you mention a specific page at Wikipedia, a link is necessary and important. Also, be aware that quoting other bloggers or online sources (or even discussing their ideas) without linking to them is considered bad etiquette and can earn you scorn that could cost you links from those sources in the future. It's almost always better to be over-generous with links than under-generous. And link condoms? Only use them when you're linking to something you find truly distasteful or have serious apprehension about.

Invite Guest Bloggers, Asking a well known personality in your niche to contribute a short blog on their subject of expertise is a great way to grow the value and reach of your blog. You not only flatter the person by acknowledging their celebrity, you nearly guarantee yourself a link or at least an association with a brand that can earn you readers. Just be sure that you really are getting a quality post from someone that's as close to universally popular and admired as possible (unless you want to start playing the drama linkbait game, which I personally abhor). If you're already somewhat popular, it can often be valuable to look outside your space and bring in guest authors who have a very unique angle or subject matter to help spice up your focus. One note about guest bloggers - make sure they agree to have their work edited by you before it's posted. A disagreement on this subject after the fact can have negative ramifications.

Eschew Advertising, Usually, I ignore adsense, but I also cast a sharp eye towards the quality of the posts and professionalism of the content when I see AdSense. That's not to say that contextual advertising can't work well in some blogs, but it needs to be well integrated into the design and layout to help defer criticism. Don't get me wrong - it's unfair to judge a blog by its cover (or, in this case, its ads), but spend a lot of time surfing blogs and you'll have the same impression - low quality blogs run AdSense and many high quality ones don't. I always recommend that whether personal or professional, you wait until your blog has achieved a level of success before you start advertising. Ads, whether they're sponsorships, banners, contextual or other, tend to have a direct, negative impact on the number of readers who subscribe, add to favorites and link - you definitely don't want that limitation while you're still trying to get established.

Go Beyond Text in Your Posts, Blogs that contain nothing but line after line of text are more difficult to read and less consistently interesting than those that offer images, interactive elements, the occasional multimedia content and some clever charts & graphs. Even if you're having a tough time with non-text content, think about how you can format the text using blockquotes, indentation, bullet points, etc. to create a more visually appealing and digestible block of content.

Cover Topics that Need Attention, In every niche, there are certain topics and questions that are frequently asked or pondered, but rarely have definitive answers. While this recommendation applies to nearly every content-based site, it's particularly easy to leverage with a blog. If everyone in the online Nascar forums is wondering about the components and cost of an average Nascar vehicle - give it to them. If the online stock trading industry is rife with questions about the best performing stocks after a terrorist threat, your path is clear. Spend the time and effort to research, document and deliver and you're virtually guaranteed link-worthy content that will attract new visitors and subscribers.

Pay Attention to Your Analytics, Visitor tracking software can tell you which posts your audience likes best, which ones don't get viewed and how the search engines are delivering traffic. Use these clues to react and improve your strategies. Feedburner is great for RSS and I'm a personal fan of Indextools. Consider adding action tracking to your blog, so you can see what sources of traffic are bringing the best quality visitors (in terms of time spent on the site, # of page views, etc). I particularly like having the "register" link tagged for analytics so I can see what percentage of visitors from each source is interested enough to want to leave a comment or create an account.

Use a Human Voice, Charisma is a valuable quality, both online and off. Through a blog, it's most often judged by the voice you present to your users. People like empathy, compassion, authority and honesty. Keep these in the forefront of your mind when writing and you'll be in a good position to succeed. It's also critical that you maintain a level of humility in your blogging and stick to your roots. When users start to feel that a blog is taking itself too seriously or losing the characteristics that made it unique, they start to seek new places for content. We've certainly made mistakes (even recently) that have cost us some fans - be cautious to control not only what you say, but how you say it. Lastly - if there's a hot button issue that has you posting emotionally, temper it by letting the post sit in draft mode for an hour or two, re-reading it and considering any revisions. With the advent of feeds, once you publish, there's no going back.

Archive Effectively, The best archives are carefully organized into subjects and date ranges. For search traffic (particularly long tail terms), it can be best to offer the full content of every post in a category on the archive pages, but from a usability standpoint, just linking to each post is far better (possibly with a very short snippet). Balance these two issues and make the decision based on your goals. A last note on archiving - pagination in blogging can be harmful to search traffic, rather than beneficial (as you provide constantly changing, duplicate content pages). Pagination is great for users who scroll to the bottom and want to see more, though, so consider putting a "noindex" in the meta tag or in the robots.txt file to keep spiders where they belong - in the well-organized archive system.

Implement Smart URLs, The best URL structure for blogs is, in my opinion, as short as possible while still containing enough information to make an educated guess about the content you'll find on the page. I don't like the 10 hyphen, lengthy blog titles that are the byproduct of many CMS plugins, but they are certainly better than any dynamic parameters in the URL. Yes - I know I'm not walking the talk here, and hopefully it's something we can fix in the near future. To those who say that one dynamic parameter in the URL doesn't hurt, I'd take issue - just re-writing a ?ID=450 to /450 has improved search traffic considerably on several blogs we've worked with.

Reveal as Much as Possible, The blogosphere is in love with the idea of an open source world on the web. Sharing vast stores of what might ordinarily be considered private information is the rule, rather than the exception. If you can offer content that's usually private - trade secrets, pricing, contract issues, and even the occasional harmless rumor, your blog can benefit. Make a decision about what's off-limits and how far you can go and then push right up to that limit in order to see the best possible effects. Your community will reward you with links and traffic.

Only One Post in Twenty Can Be Linkbait, Not every post is worthy of making it to the top of Digg, Del.icio.us/popular or even a mention at some other blogs in your space. Trying to over-market every post you write will result in pushback and ultimately lead to negative opinions about your efforts. The less popular your blog is, the harder it will be to build excitement around a post, but the process of linkbait has always been trial and error - build, test, refine and re-build. Keep creating great ideas and bolstering them with lots of solid, everyday content and you'll eventually be big enough to where one out of every 20-40 posts really does become linkbait.

Make Effective Use of High Traffic Days, If you do have linkbait, whether by design or by accident, make sure to capitalize. When you hit the front page of Digg, Reddit, Boing Boing, or, on a smaller scale, attract a couple hundred visitors from a bigger blog or site in your space, you need to put your best foot forward. Make sure to follow up on a high traffic time period with 2-3 high quality posts that show off your skills as a writer, your depth of understanding and let visitors know that this is content they should be sticking around to see more of. Nothing kills the potential linkbait "bump" faster than a blog whose content doesn't update for 48 hours after they've received a huge influx of visitors.

Create Expectations and Fulfill Them, When you're writing for your audience, your content focus, post timing and areas of interest will all become associated with your personal style. If you vary widely from that style, you risk alienating folks who've come to know you and rely on you for specific data. Thus, if you build a blog around the idea of being an analytical expert in your field, don't ignore the latest release of industry figures only to chat about an emotional issue - deliver what your readers expect of you and crunch the numbers. This applies equally well to post frequency - if your blog regularly churns out 2 posts a day, having two weeks with only 4 posts is going to have an adverse impact on traffic. That's not to say you can't take a vacation, but you need to schedule it wisely and be prepared to lose RSS subscribers and regulars. It's not fair, but it's the truth. We lose visitors every time I attend an SES conference and drop to one post every two days.

Build a Brand, Possibly one of the most important aspects of all in blogging is brand-building. As Zefrank noted, to be a great brand, you need to be a brand that people want to associate themselves with and a brand that people feel they derive value from being a member. Exclusivity, insider jokes, emails with regulars, the occasional cat post and references to your previous experiences can be off putting for new readers, but they're solid gold for keeping your loyal base feeling good about their brand experience with you. Be careful to stick to your brand - once you have a definition that people like and are comfortable with, it's very hard to break that mold without severe repercussions. If you're building a new blog, or building a low-traffic one, I highly recommend writing down the goals of your brand and the attributes of its identity to help remind you as you write.

Best of luck to all you bloggers out there. It's an increasingly crowded field to play in, but these strategies should help to give you an edge over the competition. As always, if you've got additions or disagreements, I'd love to hear them

Enable Internet Connection Firewall using VBScript

Windows Firewall helps to protect computers from unsolicited network traffic. The Windows Firewall APIs make it possible to programmatically manage the features of Windows Firewall by allowing applications to create, enable, and disable firewall exceptions.
Windows Firewall API is intended for situations in which a software application or setup program must operate with adjustments to the configuration of the networking environment in which it runs. For example, a service that needs to receive unsolicited traffic can use this API to create exceptions that allow the unsolicited traffic.
Windows Firewall API is designed for use by programmers using C/C++, Microsoft Visual Basic development system, Visual Basic Scripting Edition, and JScript development software. Programmers should be familiar with networking concepts such as stateful packet filtering, TCP/IP protocol concepts, and network address translation (NAT).
Windows Firewall API is supported on Windows XP with Service Pack 2 (SP2). For more specific information about which operating systems support a particular programming element, refer to the Requirements sections in the documentation.

[Internet Connection Firewall may be altered or unavailable in subsequent versions. Instead, use the Windows Firewall API.
The following VBScript code first determines if Internet Connection Sharing and Internet Connection Firewall are available on the local computer. If so, the code enumerates the connections on the local computer, and enables Internet Connection Firewall on the connection that is specified as a command line argument.


' Copyright (c) Microsoft Corporation. All rights reserved.

OPTION EXPLICIT

DIM ICSSC_DEFAULT, CONNECTION_PUBLIC, CONNECTION_PRIVATE, CONNECTION_ALL
DIM NetSharingManager
DIM PublicConnection, PrivateConnection
DIM EveryConnectionCollection

DIM objArgs
DIM con

ICSSC_DEFAULT = 0
CONNECTION_PUBLIC = 0
CONNECTION_PRIVATE = 1
CONNECTION_ALL = 2

Main( )

sub Main( )
Set objArgs = WScript.Arguments

if objArgs.Count = 1 then
con = objArgs(0)

WScript.Echo con

if Initialize() = TRUE then
GetConnectionObjects()

FirewallTestByName(con)
end if
else
DIM szMsg
szMsg = "Invalid usage! Please provide the name of the connection as the argument." & chr(13) & chr(13) & _
"Usage:" & chr(13) & _
" " + WScript.scriptname + " " + chr(34) + "Connection Name" + chr(34)
WScript.Echo( szMsg )
end if

end sub


sub FirewallTestByName(conName)
on error resume next
DIM Item
DIM EveryConnection
DIM objNCProps
DIM szMsg
DIM bFound

bFound = false
for each Item in EveryConnectionCollection
set EveryConnection = NetSharingManager.INetSharingConfigurationForINetConnection(Item)
set objNCProps = NetSharingManager.NetConnectionProps(Item)
if (ucase(conName) = ucase(objNCProps.Name)) then
szMsg = "Enabling Firwall on connection:" & chr(13) & _
"Name: " & objNCProps.Name & chr(13) & _
"Guid: " & objNCProps.Guid & chr(13) & _
"DeviceName: " & objNCProps.DeviceName & chr(13) & _
"Status: " & objNCProps.Status & chr(13) & _
"MediaType: " & objNCProps.MediaType

WScript.Echo(szMsg)
bFound = true
EveryConnection.EnableInternetFirewall
exit for
end if
next

if( bFound = false ) then
WScript.Echo( "Connection " & chr(34) & conName & chr(34) & " was not found" )
end if

end sub

function Initialize()
DIM bReturn
bReturn = FALSE

set NetSharingManager = Wscript.CreateObject("HNetCfg.HNetShare.1")
if (IsObject(NetSharingManager)) = FALSE then
Wscript.Echo("Unable to get the HNetCfg.HnetShare.1 object")
else
if (IsNull(NetSharingManager.SharingInstalled) = TRUE) then
Wscript.Echo("Sharing isn't available on this platform.")
else
bReturn = TRUE
end if
end if
Initialize = bReturn
end function

function GetConnectionObjects()
DIM bReturn
DIM Item

bReturn = TRUE

if GetConnection(CONNECTION_PUBLIC) = FALSE then
bReturn = FALSE
end if

if GetConnection(CONNECTION_PRIVATE) = FALSE then
bReturn = FALSE
end if

if GetConnection(CONNECTION_ALL) = FALSE then
bReturn = FALSE
end if

GetConnectionObjects = bReturn

end function


function GetConnection(CONNECTION_TYPE)
DIM bReturn
DIM Connection
DIM Item
bReturn = TRUE

if (CONNECTION_PUBLIC = CONNECTION_TYPE) then
set Connection = NetSharingManager.EnumPublicConnections(ICSSC_DEFAULT)
if (Connection.Count > 0) and (Connection.Count < 2) then
for each Item in Connection
set PublicConnection = NetSharingManager.INetSharingConfigurationForINetConnection(Item)
next
else
bReturn = FALSE
end if
elseif (CONNECTION_PRIVATE = CONNECTION_TYPE) then
set Connection = NetSharingManager.EnumPrivateConnections(ICSSC_DEFAULT)
if (Connection.Count > 0) and (Connection.Count < 2) then
for each Item in Connection
set PrivateConnection = NetSharingManager.INetSharingConfigurationForINetConnection(Item)
next
else
bReturn = FALSE
end if
elseif (CONNECTION_ALL = CONNECTION_TYPE) then
set Connection = NetSharingManager.EnumEveryConnection
if (Connection.Count > 0) then
set EveryConnectionCollection = Connection
else
bReturn = FALSE
end if
else
bReturn = FALSE
end if

if (TRUE = bReturn) then

if (Connection.Count = 0) then
Wscript.Echo("No " + CStr(ConvertConnectionTypeToString(CONNECTION_TYPE)) + " connections exist (Connection.Count gave us 0)")
bReturn = FALSE
'valid to have more than 1 connection returned from EnumEveryConnection
elseif (Connection.Count > 1) and (CONNECTION_ALL <> CONNECTION_TYPE) then
Wscript.Echo("ERROR: There was more than one " + ConvertConnectionTypeToString(CONNECTION_TYPE) + " connection (" + CStr(Connection.Count) + ")")
bReturn = FALSE
end if
end if
Wscript.Echo(CStr(Connection.Count) + " objects for connection type " + ConvertConnectionTypeToString(CONNECTION_TYPE))

GetConnection = bReturn
end function

function ConvertConnectionTypeToString(ConnectionID)
DIM ConnectionString

if (ConnectionID = CONNECTION_PUBLIC) then
ConnectionString = "public"
elseif (ConnectionID = CONNECTION_PRIVATE) then
ConnectionString = "private"
elseif (ConnectionID = CONNECTION_ALL) then
ConnectionString = "all"
else
ConnectionString = "Unknown: " + CStr(ConnectionID)
end if

ConvertConnectionTypeToString = ConnectionString
end function

Motherboard won't Booting fixed method

Motherboard won't work properly problem is most likely a software one and NOT a hardware problem. You should, of course, check that all the cooling fans are working (especially the ones on the processor and the video card) in case overheating is a problem. If you have two or more sticks of RAM which are from different manufacturers you could try using them one at a time in case a RAM mismatch is causing the problem. But other than that the only real way to see if it's a software or a hardware problem is to try running it with a fresh, clean installation of Windows.

Extra storage space is always worth having and they're quite inexpensive. Swap your current drive out, put the new one in, and load Windows onto it. If all runs fine you know for certain that the problem is in your original Windows installation. If not you've got a second hard drive to use once you track down the hardware problem and fix it!

if the machine won't start afterwards you've got clues to where the problem lies. Remove the recently added device or component and try again. If it still won't start have a good look inside to ensure you haven't dislodged or damaged some other component while you were working in there. Make sure everything is firmly in place.

When you make changes to the hardware of a PC you need to physically reset the CMOS memory, either by 'shorting' a jumper on the mainboard or by removing the CMOS battery and waiting several minutes at least before replacing it. A vast number of instances where machines won't start up are simply the result of changes made without resetting CMOS afterwards.



Modern ATX motherboards still have power running through them after Windows has been shut down! You must either switch off at the wall outlet or remove the power cord before opening it up to perform internal work. Damage to components can ensue if you make hardware changes when the motherboard is still receiving power.

Even without a hard drive fitted, your machine should run the Power On Self Test. If it doesn't, then it is either incorrectly assembled or it contains a faulty component. You should be getting the memory check, the device detection information, and perhaps an 'Operating System not found" message.

although PCs are quite easy to assemble, putting the whole thing together before trying it to see if it works is far from the ideal approach. If the entire PC is fully assembled, tracking down the reason for the failure can become a nightmare. The 'bare bones' approach is far better when assembling, and far better when troubleshooting. If your system is already fully assembled, go back several steps and try again.

The 'bare bones' PC contains only the following components:

- Motherboard
- Processor
- Processor heatsink/fan unit, connected to power
- A video card if there is no onboard video available
- One RAM module (unless the RAM is of a type which requires installing in pairs. 'Dual channel' RAM is NOT such a type!)
- The front panel connectors for Power Switch, Power LED and case speaker attached to the motherboard
- The ATX connector connected and supplying power to the motherboard. - The P4 power connector attached also if required. A molex connector attached to the display card if required.

That's it. Attach monitor and keyboard and see if it'll POST. Reset CMOS and try again if it doesn't. If you are building a new system stop at this point and try it out. If you're troubleshooting a fully assembled PC strip it back to this point and try!

If the PC won't POST in this configuration you need to determine why before proceeding:

*check power switch and LED connectors. If they are reversed the system won't start
* check that the processor is correctly fitted
* try a different RAM module
* ensure that the display card is correcxtly seated.
* get a technician to check it over if you can't locate the cause

Once the 'bare bones' system is operational, add other components one by one. Try starting the machine after every addition to check that it will still POST. This is the ONLY procedure by which you can adequately and effectively troubleshoot where a hardware problem lies.
'Other components' includes additional RAM modules, add in cards, drives, etc.
If your are troubleshooting a system which has already had Windows installed to a hard drive, add that drive last so that the system doesn't continually try to boot into Windows.
If you strike problems and need to post a new thread about your problem, include the following information:

* Identification details (make and model) of all components
* Full details of any onscreen error messages
* Full description of any BIOS 'beep' codes emitted through the internal speaker

Ramnit Virus Manual remove fixed


W32.Ramnit is a worm that infects .exe, .dll and .html files to reproduce and infect other systems. After infection, W32.Ramnit will hijack your browser to redirect you to a malicious domain. W32.Ramnit may also make contact with an anonymous third party through Internet Explorer exploits, allowing the remote attacker to violate your privacy and exert control over your computer. Many anti-malware programs have been unable to detect W32.Ramnit in some instances; severe infections can necessitate a complete system wipe to remedy the situation. Be cautious about worms like W32.Ramnit when on large networks or using removable media, and strive to delete W32.Ramnit quickly before it becomes too difficult to remove.

first things W32.Ramnit does is infect any .exe, .dll, or .html files W32.Ramnit can find. If you open these infected files, congratulations - now you've got W32.Ramnit, too! W32.Ramnit may also create concealed Autorun.inf files that are placed on various drives, including removable ones. Any computer that then accesses these drives will also get the W32.Ramnit worm.

Different versions of W32.Ramnit have been identified as a threat since January of 2010, and the worm is far from exterminated yet. Fortunately, indicators of W32.Ramnit's presence are sufficiently plain that you ought to see W32.Ramnit before it's been on your system too long. Deleting W32.Ramnit with sufficient quickness can mean the difference between your computer surviving without damage and your computer needing a complete hard drive wipe.

W32.Ramnit may also be detected under the slight variant names of W32.Ramnit.A and W32.Ramnit.B.

Backup Reminder: Always be sure to back up your PC before making any changes.


To remove W32.Ramnit, you must first stop any W32.Ramnit processes that are running in your computer'ds memory. To stop all W32.Ramnit processes, press CTRL+ALT+DELETE to open the Windows Task Manager. Click on the "Processes" tab, search for W32.Ramnit, then right-click it and select "End Process" key.

To delete W32.Ramnit registry keys, open the Windows Registry Editor by clicking on the Windows "Start" button and selecting "Run." Type "regedit" into the box and click "OK." Once the Registry Editor is open, search for the registry key "HKEY_LOCAL_MACHINE\Software\W32.Ramnit." Right-click this registry key and select "Delete."

Finally, to completely get rid of W32.Ramnit, you must manually remove other W32.Ramnit files. These W32.Ramnit files can be in the form of EXE, DLL, LSP, TOOLBAR, BROWSER HIJACK, and/or BROWSER PLUGIN. For example, W32.Ramnit might create a file like
%PROGRAM_FILES%\W32.Ramnit\W32.Ramnit.exe. Locate and remove these files

10 Best Tools Windows 7


Windows 7 not only attracted much attention from the press as a high-tech, but also there are many new interface changes, such as the redesigned taskbar, new file management features, libraries and others. Several tools have been enhanced which is then included with the OS. Here we discuss 10 of the best tools windows 7 which makes the job easier computing.

1. Action Center
Centralized management is hot in Windows 7 and gives you one-stop shopping site where you can take care of security, troubleshooting, and recovery, rather than searching for an applet for each part. Everything is combined in an easy to use Control Panel, where you get a maintenance and safety messages and can view performance information, change the UAC settings, and more.

This is a development from the Security Center in Windows Vista. It makes sense to combine the security settings, system maintenance, and recovery. Action Center has emerged as an icon in the system tray, which displays a red X symbol if there is a problem that needs you are looking for.

2. Problem Steps Recorder
One of the coolest new tool in Windows 7 is the Problem Steps Recorder (PSR), mainly to provide technical support to users of Windows. No matter how hard they try, but users often have problems to accurately describe their problem and steps they take before or after the experience. Sure, Remote Assistance can be a blessing in this situation. But we can not always connect to a user's computer in real time. That's when PSR come in handy.

Problem Steps Recorder is a type of software that records all actions keystrokes, mouse clicks, including screenshots etc. and save the sequence of events in an MHTML document pages. You can start by entering psr.exe PSR in the Start Search box via the command prompt option.

3. ISO burner
ISO image file is a file type that is often used to distribute software. In Windows 7, Microsoft included this as an answer to many users wish list for a long time. Now you do not need to download and install a third-party program to burn ISO files to disk. Suppose you want to create a bootable CD use this tool. This is a simple process: Once you've downloaded. ISO to your hard drive, simply double click and Windows 7 will open the Burn Disc Image dialog box to burn the disc.

4. Biometric device management
In previous Windows versions, biometric authentication and management of biometric devices (fingerprint sensor) required third party software that may or may not be well integrated with the OS. Now in Windows 7 already built in. Windows Biometric Framework, which gives developers the API that you can use to build biometrics into applications. Fingerprint sensor hardware makers, such as UPEK and AuthenTec, in cooperation with Microsoft on developing its framework. Biometric can be accessed through the Control Panel.

5. Credential Manager
Credential Manager is a new feature in Windows 7. This tool is similar in some ways premises password management features in Vista User Account but this is more sophisticated. You can manage the Windows credentials for the various computers that you are signed onto, certificate-based credentials, and others (for e-mail accounts, web accounts, etc.). This is all saved by default in Windows Vault.

Perhaps the best feature new in Credential Manager is the ability to backup anhttp://www.blogger.com/img/blank.gifd restore Vault. Microsoft recommends that you keep backing up on removable drives, such as flash drives, to back up if you experience a hardware failure. For more information, see Windows 7: Windows 7: Exploring Credential Vault Manager and Windows directly from the website.

6. Projection display and the Windows Mobility Center
If you give many presentations, you will be greeted by a new tool in Windows 7 that makes it easy for you to display projectors in the desktop Windows 7. Just press the Windows logo key + P and you will see a pop-up box where you can make the choice of presentation. The first is the default settings and displayed on computer screens only. The second clone display settings on the computer screen to the projector. A third setting to extend the desktop on both computer screen and projector, and the fourth displays only the settings through the projector and turn off the computer screen.

7. Text tuning and color calibration
Your computer might not work, but your screen is what you see throughout the day. If it does not look good, you do not get the most from your computing experience, and can even cause you eye strain. In Windows 7 there are two tools to customize the look to suit your preferences. You can access the ClearType Text Tuner from Control Panel or from the command (cttune.exe). If you have multiple monitors, you can adjust according to each monitor.

This tuning tool works much like the eye chart at the optometrist's office, and please you choose one that looks best for you. In addition to text tuner, Windows 7 provides color calibration tool. It can be accessed from the Control Panel or from the command line (dccw.exe). It helps you to adjust gamma, brightness, contrast, and color rendition on your monitor to display the best.

8. Disc Repair System
Actually, the Vista Service Pack 1 Beta already lets you easily create disc repair system with friendly graphical interface, but has been removed and re-released in the final in SP1. Windows 7 to improve this function. Just click [Start] and type [System Repair] in the Search box. Click [Create A System Repair Disc] to open the dialog box. To use the disc, please mesukkan in the drive and reboot the computer from the disk. (You may need to set the CD / DVD drive as primary boot device in BIOS) Then you will get a list of system recovery options, which include:

- Startup Repair
- System restore
- System image recovery
- Windows Memory Diagnostic
- Command prompt

9. Better backup utility
In previous Windows versions already include a backup utility, but this tool has been perfect significantly in Windows 7. Vista backup program is user friendly but not very flexible. Windows 7 provides more detailed control over what you want to backup. You can run the Backup And Restore from Control Panel or by typing a backup in the Search box on the Start menu. You can back up files to local hard disk, removable disk, DVD, or another computer on the network (origin diisinkan on the network). Then you can also choose to create a backup folder or individual libraries. You can also exclude certain folders when backing up.

10. PowerShell v2
Windows PowerShell (Figure P) is a shell command-line interface and scripting tools that make it easier for Windows administrators to automate tasks using cmdlets, which are commands that perform a single command, and scripts, which consists of several cmdlets for complex tasks , multi-step tasks. Earlier versions of Windows includes a command-line interpreter (command.com or cmd.exe), but PowerShell is much more powerful, also provided the UNIX environment, this command can automate nearly every function of the GUI.

PowerShell can be downloaded and run on Windows XP or Vista, but in Windows 7 is included in a built-in. PowerShell v2 adds about 240 new cmdlets, as well as APIs and new features, such as the ability to call the PowerShell scripts and cmdlets on remote computer. You can find out more about PowerShell on Microsoft's website.

Tutorial Virtual Machine with Virtual box in your Windows

i'll write about virtual machine in Windows. Sometimes, there is a particular program that we want to run but is plagued with compatibility Operating System (OS). For example there are applications that we know first run on WinXP but now after a try again in Win7 not be opened (crash). Or even it could also have a special application we need to work, but teryata application can only run on Windows while Linux-based computer.

Of course, we can use the system to plant two Dual Booting OS in one computer. But sometimes this method is less practical because more needs to be prepared such as set partitioning, manage files, etc.. In addition, if one day we already do not need a second OS, then the uninstall process was not easy. All too often ended up reformatting, and that means set the partitions and file again.
Actually, there is one practical solution to this, that is by using VirtualBox. With VirtualBox, you can as if making a new computer ( virtual machine ) and install it with the OS you want (Guest OS). More great again, you can run both at the same time, moving from guest to host and vice versa with ease. If it does not need anymore, you just delete it (remove) the virtual machine without a complex process.

Well, in this article I will explain about how to create a virtual machine using VirtualBox. Because many things to be explained, for convenience, so I split them up into several sections, namely: Download & installl Virtual Box, Virtual Machine http://www.blogger.com/img/blank.gifSetup & Guest OS, and the last is the setting. In this example, I will install WinXP in a virtual machine that will be created. As for his own VirtualBox I run across operating systems Win7. So, the Guest OS and Host OS = WinXP = Win7. Here are the steps:
DOWNLOAD & INSTALL VirtualBox

First download the installer once its in here . Select according to the type of OS you use.



1. After that run its installer file. Click Next> when VirtualBox Setup Wizard appears.

2. Then you can choose the installation location. Click Next> to continue.

3.Choose anywhere you want a shortcut is created, then click Next>

4. Usually will appear warning that the connection to the network is disconnected while on during the installation process. Just click Next>.

5. Click Install to begin the installation process.

6. If UAC appears, click Yes.

7. Up here you've managed to install VirtualBox. Click Finish to run the VirtualBox program

VIRTUAL MACHINE SETUP

Next you need to do is make her a virtual machine. Click New on VirtualBox Manager to get started. You will be greeted by the New Virtual Machine Wizard. Click Next to continue. Here you will choose what type of OS you want to install as guest OS. In this example we will install WinXP. Click Next when done select the type of OS. You can determine how much memory (RAM) for the virtual machine later. Move the slider to the desired number, then click Next.For the first time, make sure you men-centang/contreng Boot Hard Disk and also select Create new hard disk, If so, click Next. Next you will go to the Create New Virtual Disk Wizard. Click Next to continue. You can choose whether the size of virtual hard disk later this magnitude can change or always remain. For savings should you choose a dynamically expanding storage. Click Next if you have selected. Here you can choose the location where the virtual hard disk will be created, it also determines the maximum size hard disk (hard disk maximum size). VirtualBox by default suggested size is 10 G. But you also can set smaller as long as you believe that size is sufficient for your needs later. Click Next. This is a Summary of the Create New Virtual Disk Wizard. Click Finish. It appears that you already have a virtual machine called WinXP, although it is still empty. Now the next task is to fill this virtual machine with the Guest OS. Double-click on the entry to start WinXP.
You will be greeted by First Run Wizard. Just click Next.Here you will select the media you will use as a source installation. In this example I use WinXP CD (bootable of course), which I enter into Drive E (DVD ROM). If so, click Next. This is a Summary of the First Run Wizard. It's good here you have prepared her to drive installer that you selected earlier. Click Finish to begin the installation process. Display WinXP installation will start out. Press Enter to continue. Select Format the partition using the NTFS file system, then press Enter. Please wait until the WinXP installation process is complete.
Congratulations, you now have a WinXP Guest OS on your virtual machine! Before you start "playing around" with this new virtual machine it's good to do some changes to the settings used to make you more comfortable in using it later. Some settings require the virtual machine in a non-active, some can only be done in the Guest OS Safe Mode. Thus, to present first shutdown the Guest OS you.

SETTING UP PROCCESS

This time will discuss about some important settings of your order the more comfortable in using your virtual machine. Make sure your virtual machine is turned off (powered off), then double-click to turn on and be prepared to press F8 as we will go into Safe Mode.

Choose Safe Mode, then Enter twice.
After entering Safe Mode, click Yes to close the window notification.
In the VirtualBox menu, select Devices -> Install Guest Additions.
It would appear the Windows Explorer . Double-click VBoxWindowsAdditions.
You will be greeted by the VirtualBox Guest Additions Setup Wizard. Click Next> to continue.
Select the installation location and click Next>.
If you plan to run an application in the Guest OS that require Direct3D (games for example), then make sure the Direct3D Support selected. If you already click Install.
Guest Additions installation process was completed. Click OK.
Click Finish to restart and get into WinXP as normal.
Next we'll create a Shared Folders. Usefulness is as a place to exchange (transfer) files between Guest and Host. The trick is to select Devices -> Shared Folders.
Click the Add button on the right side of the window.
In the Folder Path, select Other.
Specify the folder where you want shared.
Then select Auto-mount that folder directly at-shared automatically at startup.
Rekapnya be seen here. You also can create more than one Shared Folders if you wish. Click OK to finish.
Shared Folders will only begin to be used if you have to restart. But for now the Guest OS shutdown before you because we will make changes in the last settings via VirtualBox Manager.
Click Settings on the menu VirtualBox Manager.
Select the System tab on the left. Well here you can make settings memory (RAM) and also the Boot Order. In order for fast booting, select Hard Disk as the Boot Order first priority.
Select the Display tab and you can change the amount of Video Memory (VGA Card) and also activate the Enable 3D Acceleration feature. Click OK if it is.
Next run the virtual machine again. After entering Windows, try running Explorer. It appears that the Shared Folders now can be accessed.
Applications that can not be opened in Win7 are now able to run.

an explanation of the technical steps to create a virtual machine and its installation with the Guest OS using VirtualBox. In this way, we seemed to have a "new computer" is ready to run. In the world of IT, many benefits to be gained by using this VirtualBox. A Java programmer who want to create a multi-platform applications, can use VirtualBox to test programs in various OS (Windows, Mac, Linux, FreeBSD, etc.).

Or someone who is studying to be a hacker, usually also will create a virtual machine to test the efficacy of scripts or artificial virus, without having to worry about major OS that is being used also infected. You can also experiment with VirtualBox it suits your needs

hosting tutorial for newbie



Hosting is a place or Internet service to create web pages that you created online and can be accessed by others. So, based on own experience of hosting, there is one thing to note in terms of renting a hosting for the site that we created, ie: note the true owner of the company's rental service provider hosting, about whether stable or not. Companies that are unstable, potentially aka "bankrupt" or going to close, more or less will cause instability of the sites we manage. For example it could cause problems of domain ownership, the problem of domain transfer process is complicated due to email "hostmaster" no man's land, and so on. Sure we'll hassle of having problems earlier. Therefore choose a company that is stable, although it may cost a little bit expensive. but we can avoide all risk with make own hosting a thome.

In this tutorial we will teach you make own hosting, what need for make it..?

PC for server specification.
ADSL modem with Internet connection Unlimited
XAMPP as Localhost

With the above assumptions infrastructure needs have been installed and an Internet connection Unlimited is the normal way we can make your own webhost with the help of XAMPP.

Now we begin to modify the modem configuration to make a pc that is connected to the adsl who we are as a server host needs as I mentioned above (www, ftp, telnet, etc.).

was logged into your Speedy ADSL Modem
speedy change in the modem connection, which was originally PPPoE / PPPoA (with user & password), Becoming Bridge Mode (without user & password)
Save your Modem Configuration. now to be able to get a dynamic ip from speedy, we switch to the connected PC with Speedy directly or connected through a hub.
open the Network Connection or by clicking Start - Settings - Control Panel - Network Connections
Then Make a PPP connection from your Windows to get a dynamic ip from speedy by clicking Create a new connections with your username and password Speedy
This will bring up Fields Username & Password, if you've followed the above correctly STEP 2, then the box that pops up will have been filled for his column username & password, now to do the connection, press CONNECT
When Speedy connection you two indicators will appear as shown below, and when the ipconfig via DOS, PC You Have 2 IP Address, which is Local IP (private IP) and IP from Speedy (public IP)

From the experiments above, your PC can now be made in servers that can be recognized the world directly, in the sense that can host many needs such as www, ftp, email, etc., for the above role is just as Bridging the modem (it has no IP and as a bridge your speedy internet connection)

Getting a dynamic DNS via DynDNS

DynDNS (Dynamic DNS) - www.dyndns.com is a provider for dynamic DNS and static IP as well as many Sub-Domain that can be used freely and FREE, in this article we will create a sub domain 'anda.subdomain.xxx' with subdomains are dozens of options already available in dyndns.com and periodically updating the domain to always recognize your speedy ip always change because it is dynamic, and supporting software.

Terms and How:

Your internet connection should already connected with your ISP
open this url in your browser: www.dyndns.com
or immediately wrote to create an account at: https://www.dyndns.com/account/create.html
do a confirmation via email before, and click on the url that is in it to activate your account.
when it is activated, your account will be activated immediately
dydns do log into the user + password before
click on the My Services located in upper right corner
menu, select Add Host Services (pl. circumference 1)
then click Add Dynamic DNS Host (pl. circumference 2)

A quick way to make by-pass numbers to 7-9 with a click / copy paste in browser: https://www.dyndns.com/account/services/hosts/dyndns/add.html

Example:

eg the hostname field: yourhost
then with the domain option: blogdns.net
some other setting? default (no change)
then click? Add Host

then the domain url address for your speedy is:

http://yourhost.blogdns.net/

NOTE:

Sub-Domain that you can make a sub-domain you forever
Sub-domains that you created earlier (http://yourhost.blogdns.net/) can not keep changing your ip on speedy unless you follow the last stage of which I will explain below, that will automatically update your dynamic ip with sub -domains at DynDNS
Updating DNS at DynDNS.com process

Updating DNS at DynDNS is very necessary, given ip Speedy you're a Dynamic IP (no IP)

In order to understand changes in the IP DynDNS always speedy, you need to update it regularly on his Web DynDNS, especially when the new modem at the switch, or other factors erosive change ip

To facilitate the process of Updating and updates AUTOMATICALLY, DynDNS has provided its support software provided by Free, which serves to lawyer-updatan automatically sub-domain with your speedy dynamic ip.

Follow the steps below and download the updater file:

https://www.dyndns.com/support/clients/ or here
extract is the file
install file
create groups
fill in your username and password there speedy, or click the Detect button to detect dialers account that you created above
then click OK until the application is closed, but be sure to try DynDNS icon is still there, wait a minute for about 5-10 seconds, to make connecting automatically DynDNS

enter the sub-domain that you created above with a choice of system DynDNS

Indicators:

Green tick you are successful
Check the yellow update process
Check your red failed

Accelerate Internet Connection with Internet Speed Booster


Internet Speed ​​Booster is an easy way to speed up your internet connection. With Internet Speed ​​Booster you can speed up your internet connection, utilize your memory, utilize your internet connection and change your windows settings. The main window consists of the following items: Speed ​​Booster, Net Pinger, Ram Booster and System Settings. Speed ​​Booster contais Wizard mode, Advanced mode, and Backup manager. Net Pinger contains settings Pingr. Ram Booster consists of Ram System status and configuration. System Settings contains Internet properties, System Settings, Modem Settings and Network Settings. To speed up your connection just choose one of the default connection settings and click the Optimize Now. In Backup manager every time you change your program settings will keep your old settings. You can select the backup file you want to restore or delete. PING utility helps you keep getting your modem connection is disconnected by the service provider. Most Internet Service Providers Disconnect users after a fixed period of modem activity. Ram Booster System Status option allows you to monitor your system resources. And you can optimize memory with one click. You can adjust the ram booster settings from Ram Configuration form Ram Booster. All the tools you need to be efficient on the Web! Improve and optimize your Internet connection speed with this set of tools. Net Pinger prevents you from being disconnected from your ISP. Speed ​​Booster how to optimize your PC to send and receive data over the Internet. RAM Booster allows you to free physical memory or RAM on your PC
To complete the writing of tricks internet connection, here I inform a program that can optimize your internet connection speed be it with a usb modem phone modem, or modem and other connections. This software is the Internet Speed ​​Booster, a free program developed by Onestopsoft. Internet Speed ​​Booster offers some functionality in it, namely the Speed ​​Booster, Net Pinger, Ram Booster and.

Speed ​​Booster.
Speed ​​Booster optimizes your Windows system function in terms of data transfer (upload and download). Optimization here is almost the same with some software that had previously informed me (TCPSpeed, TCP / IP Optimizer, FullSpeed, SpeedConnect, and some other software).
To optimize the speed of internet connections with Speed ​​Booster can be in two ways: the Wizard mode and Normal mode. In Wizard mode is already available optimalisasinya choice, we just select one and execute the Optimize Now button.
A second way to Normal mode, for this way, we will do the setup in a few steps (a total of 8 steps), start by selecting a type of Internet connection that we use. If we are confused fill it, do not worry, because this software will give you the option with the default answer, so stay just follow the process (unless we want to change it).

Net Pinger
Function Net Pinger is anticipating that the connection is lost (usually if you open a web page, and do not perform any activity within a certain time then the connection we would stop / cut off), Net Pinger is almost the same function as the Connection Keeper.
To enable Net Pinger, simply by checking the Enable Pinger, while for the choice of configuration (Configuration), we can choose the Automatic Mode (every one minute to ping), or Manual Mode (you set yourself how long the time interval to ping)

Ram Boosterhttp://www.blogger.com/img/blank.gif
From the name Ram Booster've seen that here serves to optimize memory usage in our PC. In the menu there are 2 Ram Booster menu options, namely the System status that indicates the use of our computer processor and memory in the form of real-time graph and the Ram Config governing the use (optimize) the existing resources automatically.

Internet Speed ​​Booster can be run automatically when you enter Windows and run it in the System tray (bottom right corner of the monitor), by selecting Settings. Mark Run Main Courses Pls Windows start-up and Run program in system tray.

download here

New feature from Google, "Google Wallet"


Google On 26 may 2011 in New York City office of Google, along with Citi, MasterCard, First Data and Sprint, Google gives a demo of Google Wallet, an application that will make your cell phone is your wallet. You will be able to tap, pay and save it using your cell phone is brought near a means of communication (NFC).

Google Wallet is an important part of Google's ongoing effort to improve business and consumer spending. It aims to make it easier for you to pay and save the goods you want, while the merchant provides more ways to offer coupons and loyalty programs to customers, as well as bridging the gap between online and offline commerce.

Because Google Wallet is a mobile application, it will do more than one function common Wallet or purse. You will be able to save your credit card, offers, loyalty cards and gift cards, but without the bulk. When you press to pay, your phone will automatically redeem the offers and get points for your loyalty. One day, even things like boarding pass, tickets, ID and keys can be storehttp://www.blogger.com/img/blank.gifd on Google Wallet.

Initially, Google Wallet will support Citi and Google Prepaid MasterCard Card, which can be used as payment. From the beginning, you will be able mnggunakan your phone to pay wherever MasterCard PayPass ada.Google Wallet will also sync with Google's offering, which you will be able through the NFC at participating merchants SingleTap ™, or by showing a barcode that you check out. Many traders who work to integrate the supply and loyalty programs with Google Wallet.

With Google Wallet , Google is building an open trade ecosystem, and we plan to develop an API that will allow integration with a number of partners. Initially, Google's Google will be compatible with the Nexus S 4G by Google, is available at Sprint. Over time, we plan to expand support for more phones.
To learn more please visit the Google web site Google in Google Wallet
This is just the beginning of what has been a great adventure into the future of mobile shopping

Get Free Access Internet WiFi


WiFi HotSpot As we know, hotspots or wireless internet access with standard 802.11b / g are not familiar stuff our ears, and when we go in public places like the Mall, Cafe, hotels and offices, with our easy to find the facility ..

Unfortunately not all providers offer wireless Internet facilities for free, or if free. extremely limited.
One of the protection used wireless service providers is to restrict Internet access based on MAC Address.
What is MAC Address?
In computer networking a Media Access Control address (MAC address) or Ethernet Hardware Address (EHA) or hardware address or adapter address is a quasi-unique identifier attached to most network adapters (NICs) ..
Okay so the conclusion MAC Address is a unique number that distinguishes each network device that is attached dikomputer us.
An example is the hotspot in hotel hilton. At hilton hotspot The Wireless Internet service providers, limiting the use of the Internet is free only for 3 hours, after that you can not access the Internet again, and would not be able to access again tomorrow. Type of protection used is MAC Address Filtering.
How to break through the protection with a MAC Address?

There is a very useful tool for anda.Tools was named K-MAC Download Dicini
With this tool you will be able to change your MAC-Address instantly and what does it mean? You can break the MAC Address Protection!. Each share of Internet access you run out in 3 hours, you need to do is change your MAC address, and do the connection.
I add more for info. WEP/WPA/WPA-2 cracking passwords using
programs are available in packages of OS backtrack
kismet
Kismet is a security tool that runs Linux, Kismet is used to eavesdrop on data traffic in the Internet network.
Aircrak-Aircrak-PTW PTW is a tool used to crack wireless protected. Each of these notebooks with different specs, so any way to use aircrack different.
One trick is also used to search for passwords which are used by someone to access hotspots that use prepaid cards.
Simple tool that prepared aja sih:
Software required:
1. Angry IP Scanner
2. Technitium MAC Address
Immediately wrote now to how:
# Find the location of the hotspot service provider, certainly in the area of ​​affordable hotspot network is ..
# Turn on your laptop, and also turn on your wireless network and see the wireless network system tray icon, then right click and select view avalible wireless network, and of course after that you must connect to a wireless hotspot your destination.
# After connect, right click the system tray and select status> choose details tab> look there ip given to us. Write down the ip.
# Open the program AngryIP Scanner 2.21 and enter the ip range that we will scan (ip data used were we) at the top. For example: 135.125.1.13 IP that we can then enter the ip in the first column of our range in accordance with an earlier but instead of ip numbers at the end of the first to be 135.125.1.1 and the second column write the same but the number one end was replaced with 255 to 135 125 .1.255. result is 135.125.1.1 to 135.125.1.255 and click start (red button).
# After scanning then we'll get a live ip data connected with these hotspots. after scanning is complete then see the ip of the living (alive hosts) blue right click on the live ip ip Right-click on the blue color was right click> show> mac address and there will be a code mac address (mac addresses sometimes there does not appear, select Just the other ip). Write down the mac address that we get.
# Open the program Technitium MAC Address v5 release 3 which we have prepared. There is a mac address field. well now just change the mac address with which we got earlier and press change mac id.
# Wait for our mac will be replaced and a temporary connection and connect again automatically disconnected itself.
# Go to the firefox web browser, or anything goes. Enjoy Free Internet.
One thing to remember is that our system is the transfer of passenger data to hack an account that we had.
It can outsmart the status of hotspot login page enter it (to account). For example status and so go there it looks prepaid card code number and we simply keep track of, then logout and log back into the hotspot's login page quickly enter the password earlier. This will make us can directly access the Internet without a ride again (because that make us prepaid card code) so if anyone wants to login to use the card (which had a code) when you log in using the card of course he can not enter because prepaid cards.
"Already logged".
How about it, interesting is not it?
But I suggest, as I do is to ride alone, because I do not want to go too far, like the way I Tell to log off and log in again will surely make the owner can not log in. Request permission directly is also a possibility that had not refused, the origin of his interests is urgent.
For Ip Scanning can also use the application Dude, download it here, to determine the condition of the computers connect to the hotspot. Can be tried too ya ..
Hmm, i have some usefull tools again, check it.
WEP and WPA KeyGenerator
Wireless Key Generator
run it live programs generate,, and coffee directly into the network key. ...
Or also you used this application "wifi password finder"
seach it self in search engine :D, all this is just for learning, as long as we are still able to use the legal why not wrote. And this can also be used by the hotspot owner, if in this way can still be used to break into. So it needs more security.

Tips Buy Web Hosting

Web Hosting is one form of rental services on the Internet that allows a person online to the websites / web on the internet. The place is called the hosting of data storage, and usually measured in units of capacity in megabytes (Mb) up to terabytes (Tb) and have a connection to the internet so that data can be requested or accessed by users from all over the place simultaneously. So in short for web hosting is a web hosting or data storage from a web.

With the increasing number of companies that sell web hosting services make consumers confused in determining the choice. There are companies that offer hosting at a great price some are very cheap, there are limits there are also features that include unlimited versatile features, and much more to offer the lure to attract the attention of consumers. As consumers we must be extra careful not to be fooled by the outside appearance of the web hosting company. Here are tips to get the best web hosting, order of things that most need to prioritize.

Tips for Choosing Web Hosting

1. Service

Web hosting is a business-related services, and service means service. Of course you feel very upset if you have difficulty or even problems with the web hosting and then you try to contact Customer Support but no response. For that before buying web hosting, make sure you choose a web hosting company that has customer support that provide the best service.

2. Quality of Server and Network

Consumers who purchase web hosting would want a website and email is always accessible with a smooth, fast, and guaranteed data security. Before you purchase a hosting it is better if you do a check and recek for quality and speed of server access, and of course even better if your web hosting company is giving a trial or a trial account.

3. Rights to the Domain and Hosting You Buy

Goods you have purchased is yours entirely, and make sure you have full access rights over the domain and hosting. Currently there are still many companies that do not give full access rights over its domain, making it difficult if consumers want to move hosting let alone perform the domain transfer to another company.

4. Reliable and Professional Company

In choosing a web hosting company make sure you buy at a trusted because it involves data security and continuity of your business. And choose a responsible company and give warranty for the products it sells.

5. Price

In business services, the price is the last thing that can be used for comparison. Because the same price does not necessarily indicate the same quality. Adage says 'There is no way prices', most of it is true. You should be suspicious if there are companies that provide web hosting prices are very cheap especially with unlimited features. We know that the web hosting servers have restrictions, space (hard drive) has a limit, traffic / bandwidth have limits, and of resources of a computer / server has a limit. But do not close the possibility of good quality can be obtained at a cheap price, for that consumers should be more observant in choosing.

How To Secure Your Computer on Public Network(Wireless Hotspot)

secure wireless network hotspot
Nowadays, many people got many benefits from the wireless network(hotspot) that've been installed in many place, especially the town square or coffee break place. It means that now internet is an easy thing to get. Now, we will speak about securing your pc or laptop on a wireless network location that called hotspot.

Public Wi-Fi hotspots seem to be available in more locations than ever before. If you move between them a lot or are just getting started, following these security precautions can help keep your machine safe and secure. For this article we look at security steps in Windows 7, but most of these tips and suggestions will work in XP, Vista, and even other operating systems as well.


Enable Your Firewall



Whether you use the Firewall built into Windows or a 3rd-party app like ZoneAlarm, make sure it’s enabled before signing on to a public hotspot. Click on Start then Control Panel, make sure View by large icons is selected then click Windows Firewall.

Then select Turn Windows Firewall on or off…

Then make sure it’s turned on under Home or Work and Public network location settings.

Turn Off All Sharing

File and folder sharing is a great feature in Windows 7 at home, but when you’re on a public network, you don’t want others to see your data. To turn it off, click on the Network icon in the Taskbar and select Open Network and Sharing Center.

Then click on the Change advanced sharing settings hyperlink.

Now make sure to Turn off file and Printer Sharing and Turn off Public folder sharing…make sure you save the changes when you’re done.

Use Correct Public Wi-Fi Connection

Rather than having to worry about changing your settings every time you log on to a Public Network. When you first connect to the Public Hotspot, Windows will ask you to select a location for the Network. For example here we want to connect to the local coffee shop Wi-Fi.

Make sure you choose Public Network…

This will automatically turn off File Sharing, Network Discovery, and Public Folder Sharing.

Use HTTPS Protocol

If you use regular HTTP protocol when connected to a public network, all of your text information can be easily found by an evil geek with a packet sniffer. You will want to use HTTPS (Hypertext Transfer Protocol Secure) or SSL wherever you can. For example you can set your Gmail and other Google services to always use https when connecting. Open your Gmail account settings, under the General tab scroll down to Browser connection and select Always use https. Again, make sure you click to Save Settings at the bottom of the page.

Then when you go to any Google services linked with that account, you will see https:// before the URL in the Address Bar.

It will work for any browser you’re using.

Another thing to check on your browser to ensure you’re using https is to look for the lock icon in the lower right corner of your browser.

Firefox Addons
If you’re using Firefox and don’t want to worry if Google services switch to https, then check out the OptimizeGoogle addon. Among other awesome ways it allows you to customize Google, you can set it to have all services use https when able.

Another handy Firefox addon from the EFF (Electronic Frontier Foundation) is HTTPS Everywhere. It will switch to https protocol for several major sites, and you can write your own rulesets with it as well.

Private VPNs

Even with using the addons above, not all sites you visit will be protected with SSL encryption. If you want to make sure you have extra protection, go through a VPN (Virtual Private Network). This `llows you to route your data traffic though a separate and secure network. There are several different free and subscription services that will do this for you but we’ll just take a look at a couple.
ProXPN is an easy to use VPN client. You need to create an account first, then download and install the client. After that log into your account and you’ll be connected to their secure VPN without worrying about traffic from your machine being on the hotspot.

They offer a free and premium version. We found that our connection could be slow at times using the free version, especially on multimedia sites. If you find you’re using Hotspots a lot, you might want to pay the $5/month for the premium version which did produce faster speeds, and ensures higher levels of encryption.

Hotspot Shield is another popular and easy to use VPN utility that runs in the background and creates the VPN automatically.

The biggest caveat is it will display ads and try to install crapware on your machine. Make sure to uncheck any crapware it tries to offer you.

While it will annoy you with ads, it is free and easy to use. If you only need to use it occasionally while at a Hotspot, it might be worth the ad annoyance.

Another thing you might want to consider is setting up your own VPN on your computer or on Windows Home Server. We’ll be writing up a full step by step tutorial on how to create your own VPN in the near future, so stay tuned.

Disable Wi-Fi When not in Use

If you’re not using your Wireless connection while you at a hotspot, simply turn it off. This can be hard to remember, and annoying if you’re constantly doing research online while working. But if you can plan your work around times when you don’t need to be online for good chunk of time, just turn it off. Click on the Wireless icon on the Taskbar right-click the network you’re connected to and Disconnect.

Windows Updates

Make sure you’re keeping your machine updated with the latest security fixes from Microsoft. In the geek community we all know the 2nd Tuesday of every month is called “Patch Tuesday”, when the team from Redmond send out the latest security fixes to plug holes and fix vulnerabilities in the OS, hardware drivers –including wireless patches, and other installed software like MS Office.

However, some vital patches might be released before then so make sure you’re receiving Automatic Updates. You don’t have to have them download and install automatically, but you can have Windows notify you when fixes are available and you can research if you want to add them or not. When in doubt, it’s usually best to just install the updates, and keep note of what they are so you can uninstall them if you find something isn’t working.

Update Antivirus Software

This should also go without saying, but keeping your Antivirus software is extremely important on all of your machines especially on a large public network where there can be a lot of malicious software lurking.

While this is microsoft security essentials, no matter what brand you use, make sure Real-time scanning is enabled.

Use Your Best Judgment

  • Get to know the folks who are operating the Wi-Fi Hotspot. Ask them the type of encryption they are using on the router and if they seem to know basic Wi-Fi security. If not, you might want to use a different location – especially if they have it wide open.
  • Don’t enter personal information connected to a Wi-Fi Hotspot unless you’re completely sure everything is safe and encrypted. If you need to do Internet Banking, wait until you’re at home or in the office.
  • Busy hotpots like at an airport or hotel can have a lot of people on it, who knows what their looking at, but there most certainly are some “bad guys”. Try to use smaller locations like at a library or coffee shop.
  • When in doubt, just don’t connect. If your online activity can wait, just hold off until you’re sure you’re on a secure network.
  • Make sure and follow the guidelines described above, if you just connect and leave everything open, there is only yourself to blame.
from : howtogeek.com