Indeed, kalo dah name dealing with the virus, anyone will be upset made. Flash Disk is one of the intermediate medium used to develop the virus themselves. Namely through a file called autorun.inf. with the file, the virus will run when the flash is plugged into the computer and the end of the virus as chicken breed, which can nelor dimana2.
Now, with stetmen above, we can halt the spread of the virus through the flash disk. There are several ways to stop work at autorun virus, one of which is to disable the autorun settings on the computer. Here's one step:
1. Open the Registry Editor, by clicking the Start Menu> Run and type regedit and click OK
2. Find Location
KEY_CURRENT_USER \ Software \ Microsoft \ Windows \ CurrentVersion \ Policies \ Explorer
3. Create a new key (Right click> New> DWORD Value) give name: NoDriveAutoRun
4. Double-click to fill the value (data). Select Base: Decimal Value data and fill with a value of 67108863
5. If necessary, can also add the same value in
HKEY_LOCAL_MACHINE \ Software \ Microsoft \ Windows \ CurrentVersion \ Policies \ Explorer
6. Restart Computer
But by using the above, the propagation the virus is not stopped only until there. Let me give an example, for example if we have a flash disk infected with the virus, and we accidentally clicking on an existing virus within the flash disk, the computer as a result we are still contracted the virus while already in disable autorun (turned off).
So do not try to hurt us the second way, which prevents malicious files mengopykan virus to enter our flash disk kedalah. His stride is simple and fairly short.
1. Create a folder named "autorun.inf" in the flash disk, then change its status through the folder properties to be read only, or reply to more powerful change to the file system. (for number two, I've read like that, but I lack detailed explanation tau)
2. Actually, the above step is sufficient, but if you want more powerful, autorun.inf folder in the above, we create a new file named NiHauMa or any file that is Chainis code, because the virus does not recognize the use chainis vbscript code.
And if the above step is less powerful, you can download the program maker's proven autorun.inf. I love the name Ni aja ya. Flash Disinfector, yes it's called. Flash Disinfector is a small program that serves to remove the virus "autorun.inf" that many infected flash disk in Indonesia, even in the world. The way this program works is to replace the file "autorun.inf" in the flash disk with a folder "autorun.inf" created by Flash Disinfector. Then the file "autorun.inf" will be protected by Flash Disinfector, so the virus will not be able mendelete or replace the file.
Folder "autorun.inf" which made Flash Disinfector on-the-hidden and protected so can not be deleted by the virus or by another person, because it is considered by the Windows file system. Folder "autorun.inf" is also made in each "root" computer hard drives by Flash Disinfector netter. Want? I actually would not include too, but a slow connection, so temen-temen can nyari digugel. Welcome bergugling ria ...
This paper was sent in on Monday, February 23rd, 2009 at 10:34 and computer science fill below. You can continue to see the response from this paper through the RSS 2.0 feed. You can respond, or trackback from your site. Change this entry.
read more...
Label: komputer, tips komputer
Blogs are now an extremely popular and important part of the internet. Millions of people blog every day. As blogs have evolved over the years, so has the commenting system. Now anyone can make comments on a particular blog posting. As blog commenting has grown more popular, so has spam commenting. In this newsletter, we’ll go over why comments are a great form of feedback for your blog, how they help the credibility of your content, what spam comments are and how to prevent them from happening.
Comments – A great form of feedback
When blogs first came around, they were simply online journals. No one could post comments on a blog posting. That all changed in 1998 with OpenDiary, a site which allowed people to comment on blog postings. Now every blog, whether it is remotely or self-hosted, includes this option to comment.
Commenting is great because it allows real people to tell you what they think about your form. It gives you feedback on what you are doing right and what you may need to improve. Comments can be encouraging to you and motivate you to post more quality blog messages. Or they can be constructive criticism to make you work harder to get better at writing content.
Whatever the style of comment is, it is still very useful to your blog. High numbers of comments have the ability to make a blog look credible because they show that the blog is being read by a lot of people. That’s something that every blog owner wants, and comments help to let them know just how many people enjoy their content.
Bad comments
Unfortunately, spammers have now started to use comments as a way to spam. How do you know what a spam comment is? Well, a spam comment is a comment that only advertises another site or product. If the comment seems bland/generic with a cheap link thrown in, then it’s definitely a spam comment.
Here is an example of a typical spam comment:
“Hey, this site is really cool. Check out my really cool site at spamsite.com.”
Of course not all spam comments will be this blatant, but you get the point.
Fortunately for bloggers, as spam comments have grown, so has the ways to prevent it. Here are a couple ways that you can prevent spam comments from even being posted on your blog.
#1: Close off commenting on older blog posts
There are options for you to stop comments from being posted on any particular blog post. Lots of times, spammers will post comments in weeks or months old posts. So take away this opportunity from them to keep it from happening. Most blog hosters now offer this as a standard option in the tool panel. If one of your posts has been up for a couple weeks, close it up.
#2: Take advantage of software offered to prevent comment spam
If you host your own blog using WordPress, you can use an option in that software to prevent spam. Even if you aren’t using WordPress, you can still use other Spam comment blocking software like Spam Karma, Akismet, and Bad Behavior. While these aren’t 100% effective, they have proven to be quite effective in preventing spam from happening.
#3: Take a look at your settings and see what can be tweaked to toughen your protection
Lots of blogs now have settings to help prevent spam. If you already have a spam blocker on in your blog and are still experiencing spam, take a closer look at the settings to see if there’s anything that can be tweaked to make your protection stronger. However, if you do this, you should closely monitor your posts to make sure legit comments aren’t being blocked out. If they are, you might have to lighten up a bit.
#4: Regularly read your blog comments
Be sure to keep an eye on your comments. Even the best software or setting can’t prevent everything, so you will have to occasionally manually remove comments on your own.
By applying the above principles, you can ensure that your blog is full of only good, quality comments, which will help your credibility tremendously.
Comments are a great form of communication between yourself and your readers. They help the credibility of your blog!
author len hutton
read more...
Label: komputer, tips komputer
In the beginning Windows' registry consisted of two files totalling around 5mb in size. Today it consists of at least 12 files with the Software file itself being 30mb or bigger in size. As the size of the registry has exploded, so has the trash and clutter in it. It may seem like a daunting task, but cleaning the registry properly can fix system problems, speed your computer up, and make it run more efficiently.
I have spent many years developing and refining thousands of procedures to do just that. I could share these methods of hunting down the trash with you and let you find them and delete them by hand, but if you were to sit down at your computer right now and work nonstop, you would still be busy with them a week from now when the next issue of Ray's Computer Tips arrives. By then your registry would have new clutter and you would have to start all over again.
To make registry cleaning easier on everyone, I wrote a program called RegVac Registry Cleaner (http://regvac.com/regvac.htm) to perform those procedures. It has been so successful that several companies have asked me to model their registry cleaners after RegVac and even more have copied processes that first debutted in RegVac.
The first place RegVac cleans is the HKEY_CLASSES_ROOT section (the Classes Vac in RegVac does this). This section contains settings for the classes of Windows. Think of a huge box full of snakes and you will get an idea of how complicated and interwoven it is. It is so complicated that many registry cleaners bypass it or simply perform surface scans of it. RegVac uses over a hundred processes to follow each tentacle of each class deep into this area and make sure that they abide by the rules.
Next RegVac validates the entries in 22 lists with 7 different methods (the FilesList Vac does this). This is a minor part of RegVac but the bulk of most other registry cleaners even though they usually do not clean all 22 lists.
Another part of RegVac, the Software Vac, which is unique to RegVac, finds old software sections in the registry and provides a way to remove that software's entire branch. Other registry cleaners only remove a few entries in this area often leaving huge portions of the registry that do nothing but take up space and get in the way.
Even more trash can be discovered in hundreds of stashes used to store data you will never use. Most registry cleaners do not even touch these. The Stash Vac lists these stashes and lets you go through and select which ones to empty out. Please use caution when using the Stash Vac because some of the items listed there may be important. For example, one folder in the Stash Vac lists places where data for international keyboards are stored. You probably will never use the data for Bulgarian keyboards, so you can remove it, but if you live in the US you may experience problems after removing the United States 101 keyboard. The items that you can safely remove are usually obvious.
Last but not least, when cleaning the registry, you should look for broken links to files on the computer (this is what the Bad Link Vac does). If a file is referenced in the registry but it does not exist on your hard drive, that is a good indicator that something is wrong. Many programmers start out writing a registry cleaner thinking all it has to do is check for these broken links and remove them. In fact, that is all many registry cleaners do.
Even though that is all they do, they often don't do it correctly. If you check the results of such scans, you will find out that many of the broken links are really good links. I spent several months refining this part of RegVac so that as far as I know it is 100% accurate. Despite this, please realize that some software enter broken links in the registry and require them to be there in order for them to run. RegVac skips the ones it knows about, but you still need to be careful with this part of RegVac.
RegVac has six more tools that clean even more areas: the Add/Remove Editor, the System Config Utility, the OpenWith Editor, the AutoComplete Editor, the Junk Keys Editor, and Registry Backup, Pack, and Restore.
Many of you already use RegVac but if you don't, you can downloaded a free 30 day trial of RegVac at http://regvac.com/regvacz.exe. For more information about RegVac Registry Cleaner go to http://regvac.com/regvac.htm. If you like RegVac, you can purchase it for only $29.95. All future updates are free.
Keep the Windows registry clean and running smoothly with RegVac Registry Cleaner.
read more...
Label: komputer, tips komputer