PTC INDONESIA

Monday, August 2, 2010

PTC (pay per click) adalah dimana anda akan dibayar hanya dengan mengklik iklan dan anda akan dibayar langsung ke rekening bank anda . silahkan gabung dan memilih PTC Indonesia di banner di bawah ini.

Berikut Daftar PTC Indonesia Yang Terpercaya, klick dan daftar dan dapatkan yang terbaik.
Semua yang terkait dengan bisnis online harus masuk sini : :)

PTC LOKAL TERPERCAYA
IDR-CLICKIT - Klik disini untuk mendaftar
Idr Click


DBCLIX - Klik disini untuk mendaftar
Db Klick


VISTACLIX - PTC Baru Indonesia - Klik disini untuk mendaftar
klik aja deh


DFLASHLINX - Klik disini untuk mendaftar
klik aja deh


SENTRACLIX - PTC BARU Ayo Daftar Gan- Klik disini untuk mendaftar
Db Klick


KLIKAJADEH - Buat yang Gokil-gokil klik aja deh
klik aja deh


SIAPAKAYA - PTC Baru Indonesia - Klik disini untuk mendaftar
klik ptc


KLIKPTC - Klik disini untuk mendaftar
klik ptc


PUNDIBUX - Klik disini untuk mendaftar
pundi bux


Y-BUX - PTC Baru Indonesia - Klik disini untuk mendaftar (New)
pundi bux

PTC (Pay Per Click)

Sunday, August 1, 2010

PTC LUAR NEGERI + LOKAL

NEOBUX - PTC No 1 di Dunia - Instan Payment
NEOBUX




ONBUX - PTC No 1 di Dunia - Instan Payment
NEOBUX






IFBUX
IFBUX


INCRASEBUX
INCRASEBUX


CLICKSMY
INCRASEBUX


FOXBUX
INCRASEBUX


AXNBUX
INCRASEBUX




CLIXIL
IFBUX


VIPCLIX
IFBUX


ZPAYPAL
IFBUX


IDRCLIX - PTC Indonesia dibayar Dollar
IFBUX


SEDOBUX
INCRASEBUX


PALMBUX
IFBUX

How To Turn On Inbox Games in Windows Vista


How To Turn On Inbox Games in Windows Vista:
If the default titles are not fully installed

Windows Vista, ships with a range of pre-installed games. Users are undoubtedly familiar with such titles as Minesweeper, Solitaire, FreeCell, Spider Solitaire and Hearts. Windows Vista adds to these casual games such as Chess Titans and Mahjong Titans. However, even though these games ship as default components of the operating system, some users might notice that they are in fact missing or inaccessible. Microsoft explained that this scenario implied that the Inbox Games were not in fact fully installed on the platform. It is a situation that users of the Vista Business edition, for example, are more likely to come across, although other SKUs are not excluded from this. Resolving it is a matter of turning on Inbox Games.

Steps To Turn On Inbox Games:
  • Start Menu-->Control Panel -->Programs
  • And choose the "Turn Windows features on or off" option in the left hand side pane.
  • Turn off Games by clicking the box next to Games. This will remove the check from the box.
  • Select "OK".
  • Then Restart your System.

Turn On Inbox Games Using Commpand Prompt:
Performing this task will ensure that Games will be available on the Vista machine. But it's not the only way to do it. Users can also turn to command prompt.

Just type cmd in the search box.
Enter the following command and hit Enter:

Start /wait ocsetup InboxGames

“This will take several minutes to complete. Once the command is complete you will return to the command prompt. This command does not return a message. You will need to manually reboot the system to complete this method,”.

Linux Basic Commands

Saturday, July 31, 2010

For changing directory / to /etc

[root@pc1 /]# cd /etc

One step back /etc to /

[root@pc1 etc]# cd ..

Go to previous working directory

[root@pc1 /]# cd -

Go to current login user home directory

[root@pc1 etc]# cd ~

Show the contents of /etc in single color

[root@pc1 ~]#  dir  /etc

Show the contents of /etc in different colors with nature of contents

[root@pc1 ~]#  Ls  /etc

create a folder on root partition

[root@pc1  ~]#  mkdir  /disk

Create a folder in /disk

[root@pc1  ~]#  mkdir  /disk/dir

Create multiple folder in multiple directories with single command

[root@pc1  ~]#  mkdir  /etc/dir1 /var/dir2 /usr/dir3

Create multiple folder in same directory

[root@pc1  ~]#  mkdir  dir1 dir2 dir3

Copy a file in directory

[root@pc1  disk]#  cp  file dir

Copy a file from /disk/file and paste it in /disk/dir/

[root@pc1  disk]#  cp  /disk/file /disk/dir

Copy a directory with –r option

[root@pc1  disk]#  cp  -r  dir  dir2

Copy a file from /disk/file and paste it in /etc with myfile name

[root@pc1  disk]#  cp  /disk/file  /etc/myfile

Remove a file

[root@pc1  disk]#  rm file

Remove a file with forcefully option

[root@pc1  disk]#  rm –f  file

Remove a directory with out –r option and you face will an error

[root@pc1  disk]#  rm dir

Remove a directory with –r option

[root@pc1  disk]#  rm  -r  /disk

Remove a directory with forcefully option

[root@pc1  disk]#  rm  -rf  dir

Move /etc/dir1 to /disk/ with different name

[root@pc1  disk]#  mv  /etc/dir1  /disk/mydir

Rename the folder name mydir to dir

[root@pc1  disk]#  mv  /disk/mydir  /disk/dir

Rename the file name with myfile

[root@pc1  disk]#  mv file myfile

Read a file page by page with less command

[root@pc1  disk]# less  /etc/grub.conf

Read a file page by page with more command

[root@pc1  disk]# more  /etc/qrub.conf

Read first ten lines of grub.conf

[root@pc1  disk]# head  /etc/grub.conf

Read last ten lings of grub.conf

[root@pc1  disk]# tail  /etc/grub.conf

Read first 12 lines with –n option

[root@pc1  disk]# head  -n  12  /etc/grub.conf

Read last 11 lines with –n option

[root@pc1  disk]# tail  -n 11  /etc/grub.conf

Copy the contents of /etc/grub.conf in /disk/file

[root@pc1  disk]# cat  /etc/grub.conf > /disk/file

Append the contents /etc/mtab in /etc/file

[root@pc1  disk]# cat  /etc/mtab >>  /disk/file

Merging tow commands with pipe sign output of the first command is input of second command

[root@pc1  disk]# cat  /etc/squid/squid.conf I more

Count the total lines of squid.conf

[root@pc1  disk]# cat  /etc/squid/squid.conf I wc  -L

Show only spool words in squid.conf

[root@pc1  disk]# cat  /etc/squid/squid.conf  I grep  spool

Flush the contents of file

[root@pc1  disk]# cat  /dev/null  >  /var/log/messages
  

25 Most Interesting Computer Facts

Here is a collection of 25 Most Interesting Computer Facts featuring Funny Computer Facts,I nternet facts,virus facts and more Computer Fun Facts.

1. 80% of all pictures on the internet are of naked women
2. Another name for a Microsoft Windows tutorial is 'Crash Course'!
3. Bill Gates house was designed using a Macintosh computer.
4. By the year 2012 there will be approximately 17 billion devices connected to the Internet.
5. Domain names are being registered at a rate of more than one million names every month.
6. E-mail has been around longer than the World Wide Web.
7. For every 'normal' webpage, there are five porn pages.
8. In the 1980s, an IBM computer wasn't considered 100% compatible unless it could run Microsoft Flight Simulator*.
9. MySpace reports over 110 million registered users. Were it a country, it would be the tenth largest, just behind Mexico.
10. One of every 8 married couples in the US last year met online.
11. The average 21 year old has spent 5,000 hours playing video games, has exchanged 250,000 e-mails, instant and text messages and has spent 10,000 hours on the mobile phone.
12. The average computer user blinks 7 times a minute, less than half the normal rate of 20.
13. The first banner advertising was used in 1994.
14. The first computer mouse was invented by Doug Engelbart in around 1964 and was made of wood.
15. The first domain name ever registered was Symbolics.com.
16. The world's first computer, called the Z1, was invented by Konrad Zuse in 1936. His next invention, the Z2 was finished in 1939 and was the first fully functioning electro-mechanical computer.
17. There are approximately 1,319,872,109 people on the Internet.
18. There are approximately 1.06 billion instant messaging accounts worldwide.
19. While it took the radio 38 years, and the television a short 13 years, it took the World Wide Web only 4 years to reach 50 million users.
20.70% of virus writers work under contract for organized crime syndicates.
21.A program named “Rother J” was the first computer virus to come into sight “in the wild” — that is, outside the single computer or lab where it was created.
22.The worst MS-DOS virus ever, Michelangelo (1991) attacked the boot sector of your hard drive and any floppy drive inserted into the computer, which caused the virus to spread rapidly.
23.A virus can not appear on your computer all by iself. You have to get it by sharing infected files or diskettes, or by downloading infected files from the Internet.
24. Country with the highest percentage of net users is Sweden (75%).
25. The first popular web browser was called Mosaic and was released in 1993.

Conficker Worm Detailed Information & Free Removal Tools

Conficker Worm Detailed Information & Free Removal Tools
Worm:Win32/Conficker.A is a worm that infects other computers across a network by exploiting a vulnerability in the Windows Server service (SVCHOST.EXE). If the vulnerability is successfully exploited, it could allow remote code execution when file sharing is enabled.

How Conficker Virus Installs in Windows?

This worm searches for the Windows executable 'services.exe' and will inject itself into it.
This worm copies itself to the Windows system folder as .dll where is a 5-8 character lowercase alphabetic name such as 'nxyme.dll'.
The worm adjusts the file time of the dropped DLL worm copy to the same as the system's kernel32.dll file time to mask forensic evidence of infection time. The registry is modified to execute the dropped DLL worm copy as a service.

Adds value: "DisplayName"
With data: "0"
To subkey: HKLM\SYSTEM\CurrentControlSet\Services\vcdrlxeu
Adds value: "ServiceDll"
With data: "\nxyme.dll"
To subkey: HKLM\SYSTEM\ControlSet001\Services\vcdrlxeu\Parameters

Once a machine has been infected the worm will patch the exploited function via a simple code hook in order to prevent re-infecting a machine it has already compromised. The worm opens and listens for connection attempts on a randomly chosen port between 1024 and 10000 and bypasses Windows firewall using APIs. The worm also stops the Internet connection sharing service.

It Spreads Via...

Networked Computers
Win32/Conficker.A copies itself into memory and begins propagating to random IP addresses across a network by exploiting a vulnerability in the Windows Server service (SVCHOST.EXE). If the vulnerability is successfully exploited, the worm instructs the target computer to download a copy of the worm from the host computer via HTTP protocol using the random port opened by the worm.
The worm uses the following URLs to determine the computer's geographic location:
getmyip.org
getmyip.co.uk
checkip.dyndns.org
Win32/Conficker.A avoids infecting Ukrainian located computers.


Payloads

1.Creates HTTP Server
The worm opens a random port between 1024 and 10000 and acts like a web server (HTTP server). If the remote machine is exploited successfully, the victim will connect back to the http server and download a worm copy.

2.Resets System Restore Point
The worm may call an API function to reset the computer's system restore point, potentially defeating recovery using system restore.

3.Downloads Files
If the date is after November 25, 2008, this worm will build a URL in the following format and attempt to download a file from it:
/search?q=%d&aq=7
If the date is after December 1, 2008 Win32/Conficker.A will attempt to download a file 'loadadv.exe' from the domain 'trafficconverter.biz'.

How to install Monitorix in Ubuntu

Sunday, June 6, 2010

Monitorix is a free, open source, lightweight system monitoring tool designed to monitorize as many services as possible. At this time it monitors from the CPU load and temperatures to the users using the system. Network devices activity, network services demand and even the devices’ interrupt activity are also monitored, and more. The current status of any corporate server with Monitorix installed can be accessed via a web browser.

It has been designed to be used under production UNIX/Linux servers, but due its simplicity and small size you may also use it to monitor embedded devices. 

Read more at Ubuntugeek.com 

Resetter Printer Samsung Type ML

Saturday, May 1, 2010

Samsung Laser Printer ML-1640 / ML-2240
Type your user ML Printers Samsung ML 1640 or 2240? This is a printer in its class Cheapest Printers (Laser Jet), in addition to cheap printer is also famous for recalcitrant and reliable daily operational
But if ever see your printer suddenly could not use the printer and Led Lights blink red? This happens if After Consumption reached 2100 pages / toner is not detected (Toner Invalid), so the red LED lights on - again and again ..

Here, you do not need to be confused, all the problems in your printer must have the solution. namely by means of reset or re-in Flash.

Please Download your Samsung Printer resetter appropriate type below
Download Resetter Samsung ML-2240
Download Resetter Samsung ML-1640


Actually, there are also other ways to open the back of the Printer Cover. and connect the PIN 1 and 4 at the foot of a small IC with the processor in addition to a small cable. but the way is a little complicated if a try is still advisable to lay a better way to reset the software above. guaranteed success. . Hopefully Helpful.

Banner


readbud - get paid to read and rate articles