Saturday, October 11, 2008

4 langkah untuk membersihkan komputer dari virus

Setelah virus pada komputer Anda dapat menyebabkan komputer Anda untuk memperlambat, memasang iklan dan mengintai hati-hati, atau membiarkan hacker ke dalam komputer untuk mencuri informasi Anda. Mengetahui bagaimana untuk membersihkan Anda terinfeksi virus komputer adalah mudah. Berikut ini adalah beberapa tips untuk menunjukkan bagaimana Anda.

Segera setelah anda berpikir komputer Anda mungkin terinfeksi Anda harus putuskan komputer anda dari Internet dan apapun jaringan Anda mungkin pada komputer. Ini adalah untuk memastikan bahwa virus tidak menyebar ke komputer lain.

Jika Anda memiliki anti-virus program terinstall pastikan sudah diperbarui pertama kemudian menjalankan penuh sistem pencarian. Anti-virus tidak dapat mendeteksi virus jika program ini tidak diperbarui.

Beberapa program anti-virus akan mendeteksi virus, tetapi tidak akan mampu untuk menghapusnya. Jika ini kasusnya, anda dapat mendapatkan program yang berbeda dengan mendownload dari komputer yang tidak terinfeksi atau anda dapat pergi ke toko komputer lokal dan mendapatkan satu ada yang berbeda.

Sebagian besar anti-virus program akan meminta Anda untuk me-restart komputer Anda setelah selesai scanning. Setelah Anda restart komputer Anda menjalankan scan lain untuk memastikan bahwa virus hilang. Bila Anda me-restart komputer pastikan bahwa itu masih terputus dari Internet dan jaringan lainnya. Setelah Anda yakin bahwa virus hilang, kembali komputer.



Monday, March 31, 2008

Software Piracy

Software piracy is the unauthorized copying of software. Most retail programs are licensed for use at just one computer site or for use by only one user at any time. By buying the software, you become a licensed user rather than an owner. You are allowed to make copies of the program for backup purposes, but it is against the law to give copies to friends and colleagues.

Software piracy is all but impossible to stop, although software companies are launching more and more lawsuits against major infractors. Originally, software companies tried to stop software piracy by copy-protecting their software.

This strategy failed, however, because it was inconvenient for users and was not 100 percent foolproof. Most software now requires some sort of registration, which may discourage would-be pirates, but doesn’t really stop software piracy.



Thursday, March 27, 2008

SCSI (Small Computer System Interface)

It is the acronym for small computer system interface. Pronounce it skuzzy. SCSI is a parallel interface standard used by Apple Macintosh computers, PCs, and many UNIX systems for attaching peripheral devices to computers. Nearly all Apple Macintosh computers, excluding only the earliest Macs and the recent iMac, come with a SCSI port for attaching devices such as disk drives and printers.

SCSI interfaces provide for faster data transmission rates (up to 80 megabytes per second) than standard serial and parallel ports. In addition, you can attach many devices to a single SCSI port, so that SCSI is really an I/O bus rather than simply an interface. Although SCSI is an ANSI standard, there are many variations of it, so two SCSI interfaces may be incompatible. For example, SCSI supports several types of connectors.

While SCSI has been the standard interface for Macintoshes, the iMac comes with IDE, a less expensive interface, in which the controller is integrated into the disk or CD-ROM drive. Other interfaces supported by PCs include enhanced IDE and ESDI for mass storage devices and Centronics for printers. You can, however, attach SCSI devices to a PC by inserting a SCSI board in one of the expansion slots. Many high-end new PCs come with SCSI built in. Note, however, that the lack of a single SCSI standard means that some devices may not work with some SCSI boards.


Sunday, March 23, 2008

CD-RW (Compact Disk – ReWritable) disk

It is short for CD-ReWritable disk, a type of CD disk that enables you to write onto it in multiple sessions. One of the problems with CD-R disks is that you can only write to them once. With CD-RW drives and disks, you can treat the optical disk just like a floppy or hard disk, writing data onto it multiple times.

The first CD-RW drives became available in mid-1997. They can read CD-ROMs and can write onto today’s CD-R disks, but they cannot write on normal CD-ROMs. This means that disks created with a CD-RW drive can only be read by a CD-RW drive.

However, a new standard called MultiRead, developed jointly by Philips Electronics and Hewlett-Packard, will enable CD-ROM players to read disks create by CD-RW drives. Many experts believe that CD-RW disks will be a popular storage medium until DVD devices become widely available.


Monday, March 17, 2008

Warm Boot

Warm boot refers to restarting a computer that is already turned on via the operating
system. Restarting it returns the computer to its initial state. A warm boot is sometimes necessary when a program encounters an error from which it cannot recover.

On PCs, you can perform a warm boot by pressing the Control, Alt, and Delete keys simultaneously. On Macs, you can perform a warm boot by pressing the Restart button.

It is also called a soft boot. Contrast with cold boot, turning a computer on from an off position.


Saturday, March 15, 2008

Discussion Lists

If you participate in discussion lists, which allow advertising, or you maintain "Bulk Emailing Lists", please don’t make a pest of yourself. If your name is seen too often, then some people will NEVER join you. They will send unsubscribe requests. If you are on a

discussion list, people may unsubscribe or just ignore you. Make yourself a pest and you will defeat yourself. This is called loss of mind share. Another reason some people are tolerant of un-solicited e-mail is that all it takes is a couple of keystrokes and offending mail is gone.

If they do not like what the person is sending (such as, solicitation to visit or receive pornography) they are willing to write a polite email and ask to be deleted from their mailing list. I have never been refused. Perhaps Mr. Internet BEAR has a use after all.

One type of Bulk E-mail is acceptable for all occasions. This Bulk E-mail is one where a person has asked to be placed on the list. It is this type of e-mail whether it is a newsletter or a discussion list that has always been accepted on the Internet.



Saturday, March 1, 2008

E-mailing

E-mailing a person for the first time may be a little bit tricky. When posting to anyone for the first time, there are several things to keep in mind. One should keep in mind that one may be violating a person’s carefully guarded privacy or violating a personal or company or other rule someone thought up. Be polite.

And be prepared for a wide range of welcomes from friendly to outright rude and crude. On the other hand, you may be extending a hand of friendship, which will develop into a relationship for life.

In general, there are three types of e-mail communities as defined by economic pressure. In these groups, there are three types of individuals:

  1. Those who like to talk via email and will accept almost anything at least once and enjoy the Internet for personal reasons;
  2. Those who are online for business; entertainment is the least of what they want to get online;
  3. Those who may be a member online purely for their own reasons and do not want to
  4. be bothered by anyone except the privileged few they let in.


Thursday, February 28, 2008

Partition

To divide memory or mass storage into isolated sections. In DOS systems, you can partition a disk, and each partition will behave like a separate disk drive. Partitioning is particularly useful if you run more than one operating system. For example, you might reserve one partition for Windows and another for UNIX.

In addition, partitioning on DOS and Windows machines can improve disk efficiency. This is because the FAT system used by these operating systems automatically assigns cluster size based on the disk size: the larger the disk, the larger the cluster.

Unfortunately, large clusters can result in a wasted disk space, called slack space. There is an entire sector of the software industry devoted to building utilities that let you partition your hard disk.



Sunday, February 17, 2008

WYSIWYG (What You See Is What You Get)

Pronounce it WIZ-zee-wig. Short for what you see is what you get. A WYSIWYG application is one that enables you to see on the display screen exactly what will appear when the document is printed. This differs, for example, from word processors that are incapable of displaying different fonts and graphics on the display screen even though the formatting codes have been inserted into the file. WYSIWYG is especially popular for desktop publishing.

Note that the WYSIWYGness of an application is relative. Originally, WYSIWYG referred to any word processor that could accurately show line breaks on the display screen. Later WYSIWYGs had to be able to show different font sizes, even if the screen display was limited to one typeface. Now, a word processor must be able to display graphics and many different typefaces to be considered WYSIWYG. Still, some WYSIWYG applications are more WYSIWYG than others. For example, many desktop publishing systems print text using outline fonts (PostScript fonts, for example).

Many of these systems, however, use corresponding bit-mapped fonts to display documents on a monitor. What you see on the display screen, therefore, is not exactly what you see when you print out the document. In addition, standard laser printers have a resolution of at least 300 dpi, whereas even the best graphics monitors have resolutions of only 100 dpi. Graphics and text, therefore, always look sharper when printed than they do on the display screen. And colors often appear differently on a monitor than they do when printed out.



Saturday, February 9, 2008

Internet address

Internet address
It is an Internet address. While you are in your browser (which you are probably in now) you will see a section at the top of the page that is titled “location”. If you type in the address of someone’s web page and hit enter, your browser will take you to that page. However the address you type in the location bar must be an exact match.

Load
It means download and upload. If someone asks how long did the page take to load? He/She is referring to the time it takes a page to appear on your screen. If a web page is loading slowly it means that it’s taking a long time to fully appear on your screen. You can often scroll through a page and look at the parts that have loaded while the rest of the page continues to load. Also, you can usually click a link on the page you are loading and link to another page without waiting for the current page to fully load.

Once you access to the Internet you are online. Often people will say they are online meaning they have access to the Internet and have an e-mail address, but may not necessarily be connected to the Internet at that moment.

What you need while surfing the web. Some web pages seem to take forever to fully appear on your screen - [Patience].


Tuesday, February 5, 2008

Selecting Items by Access Key or by Name

Most dialog box controls, menu titles, and menu items have underlined access keys. You can press ALT along with the access key to activate the control or menu anywhere within the active window. If an item doesn't have an underlined character, its access key is the first character in its name.

Access keys can sometimes be used without the ALT key for choosing controls or menu items. Use access keys without ALT to select items from an open menu. You can choose a dialog box control by typing its access key alone, except when the focus is on an edit box, a list box, or another control that expects typed characters. Therefore, using the ALT is a more reliable method.

Choosing controls in this way normally activates them, except when more than one item has the same access key. In that case, it will navigate to the next item assigned that key, but will not activate it. You must then press ENTER to activate it.

Within a list box, list view, tree view, or on the desktop, you can select an item by typing the first one or more characters in its name. You can begin typing a new name by pausing, and in some cases by pressing BACKSPACE. Pressing the same character more than once at the beginning of a name will select the next item beginning with that character.


Tuesday, January 29, 2008

Newsgroups

Also called Usenet, they are groups that often have nothing to do with news. Newsgroups are a worldwide system of ongoing discussion groups among people on the Internet who share a mutual interest.

There are a large number of newsgroups available. Discussion is not in real time; it is done through leaving messages and reading messages that other people have left. If you can think of a subject you can probably find a Newsgroup for it.

If you have an interest in a subject, the Newsgroups are well worth your time. To learn how to use Newsgroups, just check out the help section of your browser.

Word Of Caution: Never give your real (permanent) E-Mail address in the Newsgroups.


Tuesday, January 22, 2008

Spam (or Spamming)

spam
It is generally agreed that Spam is unwanted email. Many believe that Spammers are abusers of the email system.

Spam is an ugly word that is over used and means any unsolicited e-mail, one e-mail or dozens or hundreds of thousands. Many individuals do not mind a little of it. They are afraid of missing an opportunity to meet a new friend or of finding a useful service or business opportunity. Other individuals make studies of what is said on these e mails. One can really get an education on ad writing from these e-mails.

Still others even sign up for the mailing lists or participate in an activity, which makes them a target for unsolicited mails. Still other individuals do “Unsolicited Bulk E-mail” and know the cost is to receive "Unsolicited Bulk E-mail” in return. It is one cost of doing “Unsolicited Bulk E mail." If you participate in discussion lists, which allow advertising, or you maintain "Bulk E- mailing Lists", please don’t make a pest of yourself. If your name is seen too often, then some people will NEVER join you. They will send unsubscribe requests. If you are on a discussion list, people may unsubscribe or just ignore you. Make yourself a pest and you will defeat yourself. This is called loss of mind share.

Another reason some people are tolerant of un-solicited e-mail is that all it takes is a couple of keystrokes and offending mail is gone. If they do not like what the person is sending (such as, solicitation to visit or receive pornography) they are willing to write a polite email and ask to be deleted from their mailing list.

I have never been refused. Perhaps Mr. Internet BEAR has a use after all. One type of Bulk E-mail is acceptable for all occasions. This Bulk E-mail is one where a person has asked to be placed on the list. It is this type of e-mail whether it be a newsletter like this one or a discussion list that has always been accepted on the Internet.



Sunday, January 13, 2008

What is Cookie

A "cookie" is an Internet site’s way of keeping track of you. It’s a small program built into a web page you might visit. Typically you won’t know when you are receiving cookies. Ideally a cookie could make your surfing easier by identifying you, tracking sites you visit, topics you search, and get a general feel for your preferences. This can make surfing easier, faster, more personal, and more efficient. It can also be used to collect your e-mail address for marketing (spamming) purposes.

You can set your browser to warn you before you accept cookies or not accept them at all. Check your (advanced) browser settings. Keep in mind that some secure sites, such as stock trading sites, won’t work if you don’t accept their cookies.

First Party Cookies is an Cookies from the site you are visiting.

Third Party Cookies is Cookies from a different site than the one you are visiting. For example, on About.com if there is a Double-click add on the page there is probably also a Double-click cookie.

Session Cookies. Temporary cookies used as long as you are accessing a site. For example, when you log onto About.com a session cookie is created. Each time you visit another About.com forum or post a message it uses this session cookie. Without this session cookie you would have to log in each time you post a message or visit another forum.



Friday, January 11, 2008

Turn off keyboard repeat trick

We enabled a keyDown and keyUp listener but we wanted to have a key stay pressed and navigated through the menu and then when the keyUp is triggered to close the device connection. But we ran into an issue with the key repeat trigging the keyDown event. So after some looking we found out that you can turn off keyboard repeat.

Here is how in Win XP:
1. Setting > Control Panel > Accessibility > Options
2. Filter Keys check the 'Use FilterKeys'
3. Click Settings button
4. Filter options select 'Ignore quick keystrokes and slow down repeat rate'
5. Click settings
6. Select 'No keyboard repeat'
7. Click 'OK'
8. Notification Uncheck 'Beep when keys pressed or accepted'
9. Click 'OK'
10. Click 'Apply'
11. Click 'OK'

Now you can hold a key down and have the keyDown event trigger and navigate while holding it down and then the keyUp event will trigger when you let go of the key.



Saturday, January 5, 2008

Windows Explorer keys

The Windows Explorer displays the contents of a computer, drive or directory. The Windows logo key+E opens the Windows Explorer at any time, and it can also be started  from Programs on the Start menu. It normally has two panes, the left pane  showing a tree view of your folders, and the right pane showing  the contents of one folder. If you across multiple monitors please read expand the taskbar.

Windows Explorer can also show a single-pane, without the tree view. In this case it normally hides the toolbar unless you explicitly turn it on using the View menu. The same information is can be accessed using the My Computer icon from the desktop, and in the standard Open and Save As dialog boxes.

In the View menu offers a choice of icon displays. The Large Icons view displays the  contents of a drive or directory as large icons in horizontal rows. The Small Icons view displays the same information in small icons in horizontal rows. The List menu item displays directories and files as small icons in vertical columns. The Details view displays files as a single column of icons with multiple columns of information about each file.

Files and folders can be moved or copied by using the Cut, Copy, and Paste commands from the Edit menu or by shortcut keys. Moving a program icon does not change the performance of the program. Deleting a program icon does not delete all the files associated with the program, so install or delete programs using the Add/Remove Programs option in Control Panel.