Welcome to my blog, hope you enjoy reading
RSS

Thursday 31 March 2011

SAFE POST IN SOCIAL NETWORK SITE



Because everyone can see, you must be careful in posting. Attitude or style is different from our talk when eating with parents, old friends, and more different with business associates. Our social network contains people from all walks of life. Therefore, there are important things to consider before you begin to build social networks, and create a strategy in order to be able to take the benefits without damaging career, marriage, or your friendship.

Where and What You Here For?
The first thing to consider is the nature of social networking sites you use. Sometimes the site is intended for professional and business relationships, while others are purely social. Post of the ordinary for people on Facebook or MySpace is not necessarily inappropriate in LinkedIn, even if you have the same person both sites. Think of it as follows: When common friends work together, your attitude may be different between the office and in restaurants or bars.
Sites like LinkedIn and Classmates.com have a more narrow purpose, while social networking sites more generally can be used for various purposes. Facebook can be used to communicate with family and friends who live far away, to communicate back with old school friends or work colleagues first, to interact with others in your work, to find work, or as a dating service. It is fine to do, but you will have difficulty if it will do all these things from one site.

Who is your target?
Social networks in general is a form of written communication. All writers know that the first rule of writing is knowing your target, because it not only affects what you write, but also how you write it down. If you use social networking sites as a place of public information will not really need to know who your target. For example, suppose you are using Twitter to announce new articles or posts on the blog's new, or to refer to articles that are considered important. Page Twitter may be open to all people, and also to update the line with your goals.

Not only do you post
Not only the posts of you who can cause problems. If you've just joined the social networking site, you may not realize that your friends can see some or all of which posted by your other friends, including the images that they post on their site that are tagged to you.
Posting of friends could inadvertently embarrass you. So, remember the old adage of be careful in choosing friends. Do not forget, it applies both ways: do well to post something that can treat your friends if your boss, spouse, or someone else read it.

Sensitive Material Can Be Boomerang
Many people use the status updates to tell what they were doing at the time. Others use it more than just a mini journal that says what they think of the events taking place, their personal lives, and so forth. Just like in "real world", you must be careful in expressing opinions, ratings, and comments, especially about politics, sex, and religion.
Those posts you about events in the workplace or even your excitement for what happens there, can get you in trouble or break the code of ethics. Be careful also in response to "cry" and complaints. If there are friends to post about the bad treatment their partners, showed sympathy may be the right thing. However, some time after repair, he may not remember your advice.

Do not post in Unstable Condition
We all know that driving under the influence of alcohol can cause harm. Posting when you're drunk too can be just as dangerous. While it is emotion, like anger, fear, or sad, or lack of sleep can affect your assessment, and it all can make you post things that are not desired.

Ready to Reject Requests or "Remove" Friends
Some people find it difficult to say no. However, if you accept all the requests coming, can be likened to a house you leave the door open, and now there are many people in your living room, view, and commenting on everything you do, and say. It's all back again to know your target. You also must have the courage to hurt people's feelings by rejecting requests from their friendship. Even more difficult to "remove" people who are on your friends list. Fortunately, most sites do not tell people when they are removed from the list of your friends. However, if you only object to the posting of them, for example, continued to shout about the political situation or the spread of religion, or maybe just posting dozens of sites that are not important, you may not need to remove them. Up for example, allows you to hide one's post. They can still see all your updates (unless, of course if they also hide you).

Are You Familiar with the settings and options
One of the most important thing to do when starting to use social networking sites is to know how to work and settings, and options to your configuration. You may be able to classify people into one group, and then control which items (of wall posts, posts of friends) that they could see on the basis of group or individual. When uploading images, you may be able to restrict who can see images or albums. You may be able to adjust if you want to be emailed when there are people who reply to those posts you or anyone to tag photos, so you will not be surprised later. You may be able to restrict all friends so as not to be posted on the wall or only a certain friend who could see the wall-posts. Social networking sites provide tools to maintain your privacy, so use it. However, do not forget that people who do not have access to capture or even photograph the monitor.

Should Using Alias​​?
You may need to consider whether the best way to avoid all the problems in social networks is to use an alias? You can create fake accounts and say whatever you want, and no one knew that it was you. However, this can reduce the primary goal of social networks, namely to know people, and allow them to get to know you.
Read More..

USING CHECK FOR ANALYZING DISK HDD



Although not as frequently as before, the file system and sector errors sometimes occur. Error can be caused by hardware problems, power failures or even a software error. Usually Windows 7 recognize hard disk problems and automatically schedule a disk check when the computer restarts.
However, if including a proactive person, you may want to monitor their own health status of your hard drive rather than wait for Windows 7 to recognize the problem. If so, you may be pleased to know that can use the Check Disk to analyze the hard drive every time. If it found a problem, you can use Check Disk to fix the problem.

Running Check Disk
While checking the disk is essentially a command line tool, you do not have to open a command prompt to run it. In fact, you can run it from the computer. After the computer is open, simply right-click the hard drive that put before and select Properties. When the Properties dialog box appears, select the Tools tab. Furthermore, the panel Error-checking, click check now.
When User Account Control (UAC) appears, click Yes. After the UAC closing, you will see a dialog box check the disk. Usually, we check the Automatically fix file system errors and Scan for and attempt recovery of bad sectors and click Start. Windows 7 will schedule Check Disk to run at start-up and ask you to restart. Check Disk will fix the problems found. However, to run Check Disk in analysis mode, we need to use a combination of other settings.

Performing Basic Analysis
If you want to see your hard drive quickly circumstances, clear the check mark on both the Check Disk option and click Start. By doing so, Check Disk runs relatively fast and in read-only mode. Once completed, you will see a status message that tells what happens at each stage of the process and of course, a progress bar showing how long the process will continues.
When the process is complete, you will see a dialog box that contains a summary of the process. However, if you click the arrow See details, you'll see a fairly detailed report. As you can see, the process of checking the hard drive through three stages. In addition to displaying the report on screen, Check Disk also save the report in the Application log with the code of Chkdsk and Event ID 26212. Event log contains all statements and details of changes made ​​Check Disk.

Conducting Thorough Analysis
If you want to do a more thorough analysis of the hard disk, remove the check mark in the box Automatically fix file system errors and check the Scan for and attempt recovery of bad sectors and click Start. Checking process will be run in read-only mode which means that Check Disk only will examine and identify bad sectors, will not try to recover them.
After the operation is complete, Check Disk will save the report in the Application Log and display the report in the dialog box. As you can see, when doing a thorough analysis, Check Disk will perform the four stages of the examination.

Stages of Check Disk.
When you run Check Disk in fix mode and recovery, he made the five-stage process (the three main phases and two additional stages). However, when you run the basic analysis, Check Disk only runs three major stages. When you run a thorough analysis, Check Disk only runs three main stages and an additional second stage.
Phase 1: Check Disk checks each segment of data files in the Master File Table (MFT), which shows every file and directory on the volume. Phase 2: Check Disk to check the consistency of each index (directory) on the volume and verify every file and directory represented by the data file in the MFT. Check Disk also ensure that every file or subdirectory in each directory has the appropriate file data segment in the MFT. Check Disk then ensure that time and file size are in accordance with the list of available files. Stage 3: Check Disk examine every information security of each file and directory on the volume by verifying that each security information structure consistent. Stage 4 (optional): Check Disk verifies all clusters in use. Stage 4 is only executed when you select the Automatically fix file system errors. Stage 5 (optional): Check Disk verifies unused clusters. Stage 5 is run when you select Scan for and attempt recovery of bad sectors.
Read More..

Wednesday 30 March 2011

IS MY COMPUTER AFFECTED MALWARE?



A common symptom of malware infection is the home page hijacking, piracy search engines, advertising pop-ups, and system crashes.

Pembajakan Halaman Home
Home page hijacking is when malware changing the web browser home page and then lock it so it can not change it back to its original choice. Or, the home page can be changed, but additional malware to be installed shortly after we return home pages. For example, certain malware will allow us to change the home page to the URL option, but it was followed by the loss of the display screen and a great search toolbar that can not be turned off permanently.
It should be noted that there are also "Piracy" home page that was done intentionally, for example by computer suppliers, ISPs, and locked the office home page to the URL of their choice (to the company home page or support page.) Piracy like that usually we recognize and do not be classified as malware. Malware is often marked by a sudden change. We who was always able to change the home page, but suddenly can not anymore.

Hijacking Search Engine
One of the most popular forms of malware is hijacking the search engines. Suddenly we know search engines on the web browser to disappear, replaced by the search engines and foreign. Often the search engine settings no longer work or if it works, there is no option to choose a regular search engine. Another common symptom of malware is the emergence of a new toolbar that claims to provide web search services. It may appear at the top or bottom of the screen and often can not be turned off, either temporarily or permanently.

Pop-Up Ads
Pop-up ads can be a normal part of surfing the internet. However, pop-up ads that appear when the user is not actively surfing the web is not normal, nor is it a normal thing when there is so much advertising that appears to be a slow connection or computer to be silent or locked. Nor is it normal if there is a window pop-ups that fill the entire screen and can not be closed.

Scareware
Scareware is a free fraud. He is also known as "rogue scanner" or "software trickster" whose purpose is to frighten people into buying or installing. Just like the Trojans, scareware deceive the user so unwittingly install the product. Scareware do scary tactics with display screen that says your computer is attacked attacked later claimed to be the solution to that problem.
Scareware using virus alerts and false system problems. False warnings that are often very convincing and will fool most people who see it. Example scareware is SystemSecurity that scare people by showing a blue screen showing Windows crashes with a window warning that urges us to fix the problem.

System Crash
System crashes always happen though now rarely than two years ago. A lot of things done to improve the stability of Internet Explorer. Kernel32.dll errors are usually caused by graphics card drivers are very rare now.
So, how to differentiate regular crashes and crashes malware? First, malware crashes often involve unusual filenames, for example djiofg982746.dll or may refer to the modules (files) are not known. Second, malware crashes can happen when you're not doing anything. Indeed, the PC can be turned on, but said nothing.
Read More..

Wednesday 16 March 2011

Autorun and AutoPlay



Autorun and AutoPlay term often used ambiguous. Autorun first introduced in Windows 95, while the newly introduced AutoPlay in Windows XP as a new feature that detects content such as image files, music, and video on a removable disk or the newly installed device. So, to say the AutoPlay is a part or one of the Autorun feature.

AutoPlay will automatically call the application to play or display the appropriate content making it easier for ordinary users to run files in various formats, from a different source devices such as USB flash disks, memory cards, mp3 players and so on. AutoPlay can be performed, although there is no autorun.inf in the root directory.
How to Handle the Windows AutoRun
From the moment you put the disk in the computer until the release of the AutoPlay window in front of you (if the conditions enable), is a process that consists of a series of instructions. To further understand how the Autorun works, following the translation process that occurs:

1. Windows Explorer will receive notification of the change in volume on the drive where the disk is inserted.
2. Autorun function put before, whether in the disable / enable. If the disabling condition to drive, then Windows Explorer will not process further. However, there is a bug since Windows 2000 to Windows 2008 Server, which still reads commands contained in the autorun.inf, although not displaying the AutoPlay or execute applications. This does not prevent malware attacks are waiting when the user double clicks or access the context menu made malware. There is a security update to fix this at http://support.microsoft.com/kb/967715
3. Checking whether there is any autorun.inf file in the main directory contained in the media.
4. Send message QueryCancelAutoPlay in the foreground application window, so that an application can be programmed to receive this message and respond to prevent AutoRun and AutoPlay.
5. Changing behavior double-click on the drive, and its context menu with the configuration contained in the autorun.inf.
6.Menambahkan icon and description on the drive, according as defined in autorun.inf.
7. Checking whether the Shift key pressed. If so, then the process will not continue, this does not apply to Windows Vista and later.
8. Furthermore, depending on the version of Windows, the media, and the instructions on the autorun.inf. Windows may display the AutoPlay, executing application instructions found on the Open or ShellExecute in autorun.inf, or does not perform any action.
Read More..

Autorun.inf is a Plain Text File



One of the main reasons for the creation of autorun function is to facilitate the installation of software for general users. Suppose you buy a software product on CD / DVD and want to do the installation, you simply insert the CD / DVD into your computer CD-ROM/DVD-ROM drive, it will show a step and display the installation program that is easily recognizable common user. Autorun introduced since the release of Windows 95.

On the CD / DVD automatically run a particular program, you will find a file named "autorun.inf" which is located on the main directory (root directory) CD / DVD. This file contains the instructions / commands to run the program. Not only that, the command contained in the autorun.inf also can serve to change the drive icon, or add the option / shortcut to the context menu (context menu popup menu that appears is context-sensitive applications through user interaction, such as right-click the drive / folders .) Special, autorun.inf file is a simple text file that can be created by anyone using a text editor such as NotePad. Here's one example of the contents of the autorun.inf file:

[Autorun]
Open = setup.exe
Icon = setup.exe, 0
Label = Installation Program

If the file autorun.inf on top along with the setup.exe file (the programs are launched), placed on a flash disk, and then installed on computers that enable AutoRun, then the AutoPlay will show a context menu that automatically exit.
Here's a brief description of the contents of the autorun.inf. The first line, the [autorun] is a section which must exist in the autorun.inf to function. A section contains certain commands. Examples of open, icons, labels. The meaning of each command are:

1. Open
As in the example open = setup.exe, this command is to determine what application is run when the disk is inserted in the drive. Syntax is open = [exepath \] exefile [param1 [param2 ...]]. So, you can define the path and parameters if necessary.

2. Icon
Determine what the icon will appear on the drive, replace the standard drive icon shown in Windows Explorer. Syntax are icon = iconfilename [, index, where iconfilename can be a file icon (*. ico) or executable files that contain icons. If it says icon = setup.exe, 0, it means that the icon was taken from the resource icon contained in the file setup.exe. Amgka index 0 indicates the first icon (because they may be there are some icons in the resource file.)

3. Label
Syntax is pretty simple: label = text, where text is a string that represents the drive appear in Windows Explorer.
Read More..

Know the System Restore in Windows 7



This feature already exists in previous versions of windows. However, on windows vista and windows 7 it is increasingly improved their ability. Its main function is to restore the system to its original position, after the event of damage or crash. Unlike previous Windows versions, on Windows 7 might return the system to its original position better than ever.

You must have a first, at least one point for a restore point to go to the restore point. How to make it, right click "Computer ", select "Properties", then "System Protection", and select the "Create".
To continue the restore process, right-click Computer, select "Properties", then "System Protection", and "System Restore", then click "Next". Select the restore point you want.
Try also click the new button "Scan for affected programs. " Its main function is to perform the scanning process. The scanning process is intended to find out what programs and drivers should be deleted or recover the restore point you will choose.
Read More..

Protecting Privacy on Facebook



How to block peeper from your personal profile? Facebook has a lot of privacy controls, and continue to change it.

Fortunately, Facebook now put most of their privacy settings in one place, under the link account. We'll see how to take full control over your profile, applications, contact details, and posting on the wall.

Create Friends List
Friends Lists allow us to filter the content more easily. The quickest way to make the list: Click on Home on the main menu bar, then click the friends on the left sidebar. You will see a list on the Create button at the top of the page. Enter a name for your list, such as "Work" or "Schools", and select friends who want to enter into the list.

Adding People to the List of Existing
If there are people who have not entered when the first list is created, you can select and add them. Click Account, then click Edit Friends All Friends. You will see a list of all your friends, with the Add to List on each side. You can also add new friends to the list when they invite or accept invitations.

Protect Status Update
By default, Facebook has four levels of privacy: Friends, Friends and Networks, Friends of Friends, and Everyone. All you can see on your facebook page, from wall to post photos, restricted to one group. But, you also can make an exception by using the list.
Open up your profile, and go to the Wall. Type status updates, but before the post, click the Privacy button. Such as the padlock button with an arrow beside it. Select Customize. Hide this from the box, type the name of the list. Click Ok and your update will be hidden all the people on that list.

Hide Post's Wall
To hide a wall post from a list, go to Account, Privacy Settings. On the Sharing on Facebook, click customize settings. There are three entries that affect the post wall, namely Posts by me, Can see wall posts by Friends and Can comment on posts can be filtered based on the list. Click on privacy drop down next to an item, and select customize. Type a name in the box Hide this list from.

Preventing Spam Notification
There are few things more disturbing than the application to your spam automatically every time they update. If there is an update notification Mafia Wars Farmville or other person appears in your feed point your cursor to the top post. A mark "X" will appear. When clicked, you will be given the option to hide all the posts of the respective application.

Do not Tag Embarrassing Photos
You can not prevent people to tag photos of you who are drunk while dancing on the table, but you can prevent others from seeing the tag. Open again the Privacy Settings, and select Profile Information. On the Photos and videos I'm tagged in, select custom, then select the Only Me, from the menu Make this visible.

Never Seen
Is someone you do not like to find you on Facebook, and send a friend request? This can be prevented if you remove yourself from searches. In the Privacy Settings, go to Search. You can set so that only friends now are able to find you.

Hide Your Profile of Search Engine
What if your old enemy is more persistent, and he used Google to find your facebook profile? Do not worry. On the Privacy Settings page, click Edit your settings in the Applications and Websites that exist at the bottom. Click Edit Settings, next to public search. Uncheck the box Enable public search. Wait for a few days, and your facebook profile will disappear from search engines.

Application Block Annoying
Some applications, including applications that are installed by your friends only, using pictures and even your profile data in its update. Stop them access to your information by going to Edit your settings in the Applications and Websites. Important setting here is the info accessible through your friends. List of available data is a bit scary, but do not worry, remove the check mark on each application that bother you, and your information will remain protected.

Hide Your Contact Details
You can hide the details of specific contact from a list of certain people. For example, if you do not want your business partners see your house number, first make friends Lists contain the people you wish to exclude. In the sharing on facebook, click Customize Settings. Select Other phone, and Customize to hide your number from the list.
Read More..