<?xml version='1.0' encoding='UTF-8'?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><feed xmlns='http://www.w3.org/2005/Atom' xmlns:openSearch='http://a9.com/-/spec/opensearchrss/1.0/' xmlns:blogger='http://schemas.google.com/blogger/2008' xmlns:georss='http://www.georss.org/georss' xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr='http://purl.org/syndication/thread/1.0'><id>tag:blogger.com,1999:blog-6062689317046378893</id><updated>2024-08-29T17:17:46.013-07:00</updated><category term="Operating System"/><category term="NETWORKING"/><category term="BLOG"/><category term="Tips and tricks"/><category term="Utiliti"/><category term="Hacking"/><category term="Virus Spyware Spam"/><category term="HDD"/><category term="Maintenance"/><category term="Tex Editor"/><category term="ARTICLE"/><category term="BISNIS"/><category term="Browser"/><category term="Converter"/><category term="Download"/><category term="Hobbies"/><category term="Money"/><category term="Motherboard"/><category term="Compression Tool"/><category term="Facebook"/><category term="Kamus"/><category term="Software"/><title type='text'>Learning about Computer Blog</title><subtitle type='html'>Learning about anything what we know about computer such as programming,networking,operating system,and maybe tutorial,i hope will enjoy with my blog.thanks alot 4 u</subtitle><link rel='http://schemas.google.com/g/2005#feed' type='application/atom+xml' href='http://computerslearning.blogspot.com/feeds/posts/default'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6062689317046378893/posts/default?redirect=false'/><link rel='alternate' type='text/html' href='http://computerslearning.blogspot.com/'/><link rel='hub' href='http://pubsubhubbub.appspot.com/'/><link rel='next' type='application/atom+xml' href='http://www.blogger.com/feeds/6062689317046378893/posts/default?start-index=26&amp;max-results=25&amp;redirect=false'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><generator version='7.00' uri='http://www.blogger.com'>Blogger</generator><openSearch:totalResults>52</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><entry><id>tag:blogger.com,1999:blog-6062689317046378893.post-3415568024776686026</id><published>2010-10-25T09:17:00.001-07:00</published><updated>2010-10-25T09:17:02.319-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Facebook"/><title type='text'>Boost for Facebook 10.0.2 can enlarge your image in Facebook</title><content type='html'>&lt;p&gt;&lt;img src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjbaJ1W4MfD3eqp6BV4f_4NYDjpv1cF18ayt3cxPw5hwTECmYIMwccrgMMXWMRq_IIyCU6wCqAlWKi1mvbPHcskUj_yjg9FReCHcSIaLI3lA17S027NuYxaWNQSBRAj6fFuTugU-a-j4rul/&quot; width=&quot;290&quot; height=&quot;143&quot; /&gt; If you like and enjoy with the social networking “ Facebook “ ,I think you need to install this add ons for browser Firefox. This Script can enlarge your photos in facebook be full size and other faeture like : &lt;/p&gt;  &lt;p&gt;&amp;#160;&lt;/p&gt;  &lt;ul&gt;   &lt;li&gt;-Autopoke and EZPoke options &lt;/li&gt;    &lt;li&gt;-Auto-Refresh Home (beta) &lt;/li&gt;    &lt;li&gt;-Rollover image for each view in full size &lt;/li&gt;    &lt;li&gt;-Hundreds of Skins &lt;/li&gt;    &lt;li&gt;-Selectable Features - Use only what you want! &lt;/li&gt;    &lt;li&gt;-Quick Access icon in the status bar &lt;/li&gt;    &lt;li&gt;-Skins for school, sports and many others built in &lt;/li&gt;    &lt;li&gt;-Rollover all profile pic thumbnails &lt;/li&gt;    &lt;li&gt;-Auto-login and password is stored &lt;/li&gt;    &lt;li&gt;-One-click pokes &lt;/li&gt;    &lt;li&gt;-Download FB Videos &lt;/li&gt;    &lt;li&gt;-Move birthdays, pokes and events to top of homepage &lt;/li&gt;    &lt;li&gt;-Shorten FB window titles &lt;/li&gt;    &lt;li&gt;-Force https (beta) &lt;/li&gt;    &lt;li&gt;-Skin Banner &lt;/li&gt; &lt;/ul&gt;  &lt;p&gt;&amp;#160;&lt;/p&gt;  &lt;p&gt;We can install from this link&lt;a title=&quot;Click to Install&quot; href=&quot;http://goo.gl/lFOG&quot; rel=&quot;tag&quot; target=&quot;_blank&quot;&gt;http://goo.gl/lFOG&lt;/a&gt;&lt;/p&gt;  &lt;p&gt;&amp;#160;&lt;/p&gt;  &lt;p&gt;nb : this add ons only support for Firefox 3.5 and new facebook&lt;/p&gt;  &lt;p&gt;&amp;#160;&lt;/p&gt;  &lt;p&gt;enjoy it&lt;/p&gt;  </content><link rel='replies' type='application/atom+xml' href='http://computerslearning.blogspot.com/feeds/3415568024776686026/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://computerslearning.blogspot.com/2010/10/boost-for-facebook-1002-can-enlarge.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6062689317046378893/posts/default/3415568024776686026'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6062689317046378893/posts/default/3415568024776686026'/><link rel='alternate' type='text/html' href='http://computerslearning.blogspot.com/2010/10/boost-for-facebook-1002-can-enlarge.html' title='Boost for Facebook 10.0.2 can enlarge your image in Facebook'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjbaJ1W4MfD3eqp6BV4f_4NYDjpv1cF18ayt3cxPw5hwTECmYIMwccrgMMXWMRq_IIyCU6wCqAlWKi1mvbPHcskUj_yjg9FReCHcSIaLI3lA17S027NuYxaWNQSBRAj6fFuTugU-a-j4rul/s72-c" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6062689317046378893.post-8090502211199939670</id><published>2010-10-02T04:39:00.001-07:00</published><updated>2010-10-02T04:39:58.093-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Maintenance"/><title type='text'>Level of Repair Harddisk BadSector</title><content type='html'>&lt;p&gt;The hard disk is where the operating system and all computer programs are stored. Due to this, a correctly working drive is important in the operation of any PC.&lt;/p&gt;  &lt;p&gt;But since these drives are essentially merely an electro-mechanical devices, and like every other machine they can at last breakdown and fail. And then oops, without backups, all of your family footage, legal documents and critical emails are gone!&lt;/p&gt;  &lt;p&gt;There are 3 (three ) levels of file recovery for a dying or damaged drive :&lt;/p&gt;  &lt;p&gt;&amp;#160;&lt;/p&gt;  &lt;p&gt;1. &lt;strong&gt;Basic Level&lt;/strong&gt; : The drive is working ( your can hear it spin up but it won’t boot to Windows ) This typically suggests that some necessary Windows files have been comprised or damaged in some shape. You’ve got to choices…&lt;/p&gt;  &lt;p&gt;Use a Rescue CD : You can grab a bootable CD with hard drive utility software already installed on it. You can then make repairs or copy your files from your bad drive to a replacement. A good big name brand rescue CD for Windows is the “Ultimate Boot CD”.&lt;/p&gt;  &lt;p&gt;Move the Drive : if you do not have a technique of burning a rescue CD and do not desire to hang about for a copy to sent to you ; you can always move your bad drive and place it in another working desktop Computer .&lt;/p&gt;  &lt;p&gt;&amp;#160;&lt;/p&gt;  &lt;p&gt;2.&lt;strong&gt; Intermediate Level&lt;/strong&gt; : The drive works but you can not see the files you would like using the strategies above. You at about that point have to get out the massive guns. You’ll have to download and run an data recovery program like “Active UNDELTE”, “Recover My Files”, and so on. Both these programs are strong, trustworthy, and simple to use and won’t cost an arm or a leg to purchase. Both have tech support options if you want further help.&lt;/p&gt;  &lt;p&gt;&amp;#160;&lt;/p&gt;  &lt;p&gt;3. &lt;strong&gt;Advanced Level&lt;/strong&gt; : You have attempted everything above but you can not find that Last Will from Aunt Sue…&lt;/p&gt;  &lt;p&gt;At that point you have likely spent a couple of hours ( if not days ) without your Computer and invested just over a $100 in software if you used all the above products. Now, is the time for you to choose to either employ a pro level recovery application or chuck in the towel and take your drive to a recovery expert.&lt;/p&gt;  &lt;p&gt;If you’ve got the time but not a great deal of money ( understand that tough drive recovery services can cost hundreds or thousands of greenbacks ) then you can ratchet it up a bit and purchase a copy of the home version of &lt;strong&gt;EasyRecovery&lt;/strong&gt; from &lt;strong&gt;Ontrack.&lt;/strong&gt; Ontrack is one of the leading information recovery corporations in the world.&lt;/p&gt;  &lt;p&gt;But if time is more urgent and cash is no obstruction then bite the bullet and take your drive to a local PC shop that does recovery work. Or if that’s not possible then contact a giant service like Ontrack and ship your drive to them. Data recovery can be costly irrespective of who does it, so to be on the safe side and make file backups often and completely.&lt;/p&gt;  </content><link rel='replies' type='application/atom+xml' href='http://computerslearning.blogspot.com/feeds/8090502211199939670/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://computerslearning.blogspot.com/2010/10/level-of-repair-harddisk-badsector.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6062689317046378893/posts/default/8090502211199939670'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6062689317046378893/posts/default/8090502211199939670'/><link rel='alternate' type='text/html' href='http://computerslearning.blogspot.com/2010/10/level-of-repair-harddisk-badsector.html' title='Level of Repair Harddisk BadSector'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6062689317046378893.post-1615217397609034742</id><published>2010-06-02T07:22:00.001-07:00</published><updated>2010-06-02T07:22:50.356-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Hacking"/><category scheme="http://www.blogger.com/atom/ns#" term="NETWORKING"/><category scheme="http://www.blogger.com/atom/ns#" term="Tips and tricks"/><title type='text'>Open Facebook by IP ADDRESS</title><content type='html'>&lt;h3&gt;&lt;font size=&quot;2&quot;&gt;&lt;strike&gt;Someday we can login our facebook in My ofiice, so i try to do this&lt;/strike&gt;&lt;/font&gt;&lt;/h3&gt;  &lt;p&gt;&amp;#160;&lt;/p&gt;  &lt;p&gt;Facebook.com utilizes some but not all of the addresses in these ranges. Below are the most common active IP addresses for Facebook.com: &lt;/p&gt;  &lt;p&gt;&amp;#160;&lt;/p&gt;  &lt;ul&gt;   &lt;ul&gt;     &lt;ul&gt;       &lt;ul&gt;         &lt;li&gt;           &lt;div align=&quot;center&quot;&gt;69.63.176.13 &lt;/div&gt;         &lt;/li&gt;          &lt;li&gt;           &lt;div align=&quot;center&quot;&gt;69.63.181.15 &lt;/div&gt;         &lt;/li&gt;          &lt;li&gt;           &lt;div align=&quot;center&quot;&gt;69.63.184.142 &lt;/div&gt;         &lt;/li&gt;          &lt;li&gt;           &lt;div align=&quot;center&quot;&gt;69.63.187.17 &lt;/div&gt;         &lt;/li&gt;          &lt;li&gt;           &lt;div align=&quot;center&quot;&gt;69.63.187.18 &lt;/div&gt;         &lt;/li&gt;          &lt;li&gt;           &lt;div align=&quot;center&quot;&gt;69.63.187.19 &lt;/div&gt;         &lt;/li&gt;          &lt;li&gt;           &lt;div align=&quot;center&quot;&gt;69.63.181.11 &lt;/div&gt;         &lt;/li&gt;          &lt;li&gt;           &lt;div align=&quot;center&quot;&gt;69.63.181.12 &lt;/div&gt;         &lt;/li&gt;       &lt;/ul&gt;        &lt;li&gt;&lt;/li&gt;     &lt;/ul&gt;   &lt;/ul&gt; &lt;/ul&gt; Just as you can visit the Facebook home page by entering &lt;a href=&quot;http://mail.telkom.net/Redirect/www.facebook.com/&quot;&gt;http://www.facebook.com/&lt;/a&gt; into your browser, you can also enter http:// followed by any of the above addresses - for example   &lt;blockquote&gt;   &lt;p&gt;&lt;a href=&quot;http://69.63.176.13/&quot;&gt;http://69.63.176.13/&lt;/a&gt;&lt;/p&gt;    &lt;p&gt;&amp;#160;&lt;/p&gt; &lt;/blockquote&gt;  &lt;h5&gt;Acceptable Use of Facebook IP Adddress&lt;/h5&gt; If you cannot reach Facebook using &lt;a href=&quot;http://mail.telkom.net/Redirect/www.facebook.com/&quot;&gt;http://www.facebook.com/&lt;/a&gt;, your Internet provider may be blocking access to the site. Using an IP address based URL might bypass such restrictions.    </content><link rel='replies' type='application/atom+xml' href='http://computerslearning.blogspot.com/feeds/1615217397609034742/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://computerslearning.blogspot.com/2010/06/open-facebook-by-ip-address.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6062689317046378893/posts/default/1615217397609034742'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6062689317046378893/posts/default/1615217397609034742'/><link rel='alternate' type='text/html' href='http://computerslearning.blogspot.com/2010/06/open-facebook-by-ip-address.html' title='Open Facebook by IP ADDRESS'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6062689317046378893.post-1438627577079631780</id><published>2010-05-15T08:40:00.001-07:00</published><updated>2010-05-15T08:40:55.848-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="NETWORKING"/><title type='text'>5 Network Topology</title><content type='html'>&lt;p&gt;Computer network topologies can be categorized in the following categories.    &lt;br /&gt;&lt;/p&gt;  &lt;p&gt;Hybrid networks are the complex networks, which can be built of two or more above mentioned topologies. &lt;/p&gt;  &lt;p&gt;&amp;#160;&lt;/p&gt; &lt;a href=&quot;http://tinypic.com&quot; target=&quot;_blank&quot;&gt;&lt;img alt=&quot;Image and video hosting by TinyPic&quot; src=&quot;http://i41.tinypic.com/i4lmvk.jpg&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;   &lt;p&gt;&lt;b&gt;Bus Topology&lt;/b&gt;&lt;/p&gt;  &lt;p&gt;Bus topology uses a common backbone to connect all the network devices in a network in a linear shape. A single cable functions as the shared communication medium for all the devices attached with this cable with an interface connector. The device, which wants to communicate send the broadcast message to all the devices attached with the shared cable but only the intended recipient actually accepts and process that message. &lt;/p&gt;  &lt;p&gt;&amp;#160;&lt;/p&gt;  &lt;p&gt;Ethernet bus topologies are easy to install and don’t require much cabling and only a main shared cable is used for network communication. 10Base-2 and 10BaseT are two popular types of the Ethernet cables used in the Bus topology. Also, Bus network works with very limited devices. Performance issues are likely to occur in the Bus topology if more than 12-15 computers are added in a Bus Network. Additionally, if the Backbone cable fails then all network becomes useless and no communication fails among all the computers. Unlike in the Star topology in which if one computer is detached from a network then there is not effect on the other computers in a network. &lt;/p&gt;  &lt;p&gt;&amp;#160;&lt;/p&gt;  &lt;p&gt;&lt;b&gt;Ring Topology&lt;/b&gt;&lt;/p&gt;  &lt;p&gt;In ring Network, every computer or devices has two adjacent neighbors for communication. In a ring network, all the communication messages travel in the same directory whether clockwise or anti clockwise. Any damage of the cable of any cable or device can result in the breakdown of the whole network. Ring topology now has become almost obsolete.    &lt;br /&gt;FDDI, SONET or Token Ring Technology can be used to implement Ring Technology. Ring topologies can be found in office, school or small buildings. &lt;/p&gt;  &lt;p&gt;&amp;#160;&lt;/p&gt;  &lt;p&gt;&lt;b&gt;Star Topology&lt;/b&gt;&lt;/p&gt;  &lt;p&gt;In the computer networking world the most commonly used topology in LAN is the star topology. Star topologies can be implemented in home, offices or even in a building. All the computers in the star topologies are connected to central devices like hub, switch or router. The functionality of all these devices is different. I have covered the detail of each networking devices in the separate portion of my website. Computers in a network are usually connected with the hub, switch or router with the Unshielded Twisted Pair (UTP) or Shielded Twisted Pair Cables.&lt;/p&gt;  &lt;p&gt;As compared to the bus topology, a star network requires more devices &amp;amp; cables to complete anetwork. The failure of each node or cable in a star network, won’t take down the entire network&lt;/p&gt;  &lt;p&gt;as compared to the Bus topology.&lt;/p&gt;  &lt;p&gt;However if the central connecting devices such as hub, switch or router fails due to any reason,then ultimately all the network can come down or collapse.&lt;/p&gt;  &lt;p&gt;&amp;#160;&lt;/p&gt;  &lt;p&gt;&lt;b&gt;Tree Topology&lt;/b&gt;&lt;/p&gt;  &lt;p&gt;Tree topologies are comprised of the multiple star topologies on a bus. Tree topologies integrate multiple star topologies together onto a bus. Only the hub devices can connect directly with the tree bus and each Hub functions as a root of a tree of the network devices. This bus/star/hybrid combination supports future expandability of the computer networks, much better than a bus or star.&lt;/p&gt;  &lt;p&gt;&amp;#160;&lt;/p&gt;  &lt;p&gt;&lt;b&gt;Mesh Topology&lt;/b&gt;&lt;/p&gt;  &lt;p&gt;Mesh topology work on the concept of routes. In Mesh topology, message sent to the destination can take any possible shortest, easiest route to reach its destination. In the previous topologies star and bus, messages are usually broadcasted to every computer, especially in bus topology. Similarly in the Ring topology message can travel in only one direction i.e clockwise or anticlockwise. Internet employs the Mesh topology and the message finds its route for its destination. Router works in find the routes for the messages and in reaching them to their destinations.The topology in which every devices connects to every other device is called a full Mesh topology unlike in the partial mesh in which every device is indirectly connected to the other devices.&lt;/p&gt;  &lt;p&gt;&amp;#160;&lt;/p&gt;  &lt;p&gt;&lt;b&gt;note&lt;/b&gt;&lt;/p&gt;  &lt;p&gt;Topologies are the important part of the network design theory. A better network can be built if you have the knowledge of these topologies and if you know the difference between each topology. &lt;/p&gt;  </content><link rel='replies' type='application/atom+xml' href='http://computerslearning.blogspot.com/feeds/1438627577079631780/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://computerslearning.blogspot.com/2010/05/5-network-topology.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6062689317046378893/posts/default/1438627577079631780'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6062689317046378893/posts/default/1438627577079631780'/><link rel='alternate' type='text/html' href='http://computerslearning.blogspot.com/2010/05/5-network-topology.html' title='5 Network Topology'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="http://i41.tinypic.com/i4lmvk_th.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6062689317046378893.post-79445526048331128</id><published>2010-05-15T07:26:00.001-07:00</published><updated>2010-05-15T07:26:46.241-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="NETWORKING"/><title type='text'>Wireless Network Type</title><content type='html'>&lt;p&gt;&lt;strong&gt;Wireless Network Types&lt;/strong&gt;&lt;/p&gt;  &lt;p&gt;&lt;strong&gt;1. Wireless Local Area Networks (WLANS) &lt;/strong&gt;&lt;/p&gt;  &lt;p&gt;WLANS allow users in &lt;strong&gt;local area&lt;/strong&gt;, such as in a university or a library to form a network and gain wireless access to the internet. A temporary network can be formed by a small number of users without the need of access point; given that they do not need to access the resources. &lt;/p&gt;  &lt;p&gt;&amp;#160;&lt;/p&gt;  &lt;p&gt;&lt;strong&gt;2. Wireless Personal Area Networks (WPANS)&lt;/strong&gt;&lt;/p&gt;  &lt;p&gt;There are two current technologies for wireless personal network &lt;strong&gt;Bluetooth and Infra Red&lt;/strong&gt;. These technologies will allow the connectivity of personal devices &lt;strong&gt;within an area of 30 feet&lt;/strong&gt;. Infra Red requires a direct line and the range is less as compared to Bluetooth technology.&lt;/p&gt;  &lt;p&gt;&amp;#160;&lt;/p&gt;  &lt;p&gt;&lt;strong&gt;3. Wireless Metropolitan Area Networks (WMANS) &lt;/strong&gt;&lt;/p&gt;  &lt;p&gt;WMANS allow the connectivity of multiple networks in a metropolitan area such as building in a city. The network connectivity is &lt;strong&gt;the alternative of copper or fiber cabling. &lt;/strong&gt;&lt;/p&gt;  &lt;p&gt;&amp;#160;&lt;/p&gt;  &lt;p&gt;&lt;strong&gt;4. Wireless Wide Area Networks (WWANS)&lt;/strong&gt;&lt;/p&gt;  &lt;blockquote&gt;   &lt;p&gt;WWANS or Wireless Area Networks can be maintained &lt;strong&gt;over large areas&lt;/strong&gt; such as in different cities or between different countries, via multiple satellite systems or antenna sites. The types of system are called 2G systems.       &lt;br /&gt;The following table shows the range those different types of wireless network covers.       &lt;br /&gt;Network Meter       &lt;br /&gt;Personal Area Network&amp;#160;&amp;#160;&amp;#160;&amp;#160;&amp;#160;&amp;#160; 0&amp;#160; - 10       &lt;br /&gt;Local Area Network&amp;#160;&amp;#160;&amp;#160;&amp;#160;&amp;#160;&amp;#160;&amp;#160;&amp;#160;&amp;#160;&amp;#160;&amp;#160;&amp;#160;&amp;#160; 0 -&amp;#160; 100       &lt;br /&gt;Wide Are Network&amp;#160;&amp;#160;&amp;#160;&amp;#160;&amp;#160;&amp;#160;&amp;#160;&amp;#160;&amp;#160;&amp;#160;&amp;#160;&amp;#160;&amp;#160;&amp;#160;&amp;#160;&amp;#160; 0 -&amp;#160; 10000       &lt;br /&gt;Security in Wireless Networking       &lt;br /&gt;The following different types of security methods are available in the wireless networking.&lt;/p&gt; &lt;/blockquote&gt;  &lt;p&gt;&amp;#160;&lt;/p&gt;  &lt;p&gt;&lt;strong&gt;5. Wired Equivalent Privacy (WEP)&lt;/strong&gt;&lt;/p&gt;  &lt;p&gt;Wired Equivalent Privacy is intended to stop the interference of radio frequency that is signaled by unauthorized users and this security measure is most suitable for the small networks. There is not key management protocol and each key is entered manually into the clients that’s why this is very time consuming administrative task. The WEP security method is based on the RC4 encryption algorithm. In the WEP all the client computers and Access points are configured with the same encryption and decryption keys. &lt;/p&gt;  &lt;p&gt;&lt;strong&gt;&lt;/strong&gt;&lt;/p&gt;  &lt;p&gt;&lt;strong&gt;Service Set Identifier (SSID)&lt;/strong&gt;&lt;/p&gt;  &lt;p&gt;Service Set Identifier (SSID) acts a simple password by allowing WLAN network to be split up into different networks and each having a unique identifier. These identifiers are configured in the multiple access points. To access any of any networks, a computer is configured in such a way that each is having a corresponding SSID identifier for that network. If the SSID match between the two computers or networks then access is granted to each other. &lt;/p&gt;  &lt;p&gt;&amp;#160;&lt;/p&gt;  &lt;p&gt;&lt;strong&gt;Media Access Control filtering (MAC Access Control)&lt;/strong&gt;&lt;/p&gt;  &lt;p&gt;A list of the MAC addresses of the client computers can be inputted into an Access point and only those computers are granted to give the access to the network. When a computer makes a request, its MAC address is compared to the list of the MAC addresses to the Access point and based on this access permission granted to deny.    &lt;br /&gt;This is a good security method but it is mainly involved in the small wireless networks because there is more manual work is involved of entering the MAC address into the Access point. &lt;/p&gt;  &lt;p&gt;&amp;#160;&lt;/p&gt;  &lt;p&gt;&lt;strong&gt;Bluetooth&lt;/strong&gt;&lt;/p&gt;  &lt;p&gt;Bluetooth is a simple type of the wireless networking that operates in the digital devices, like mobiles phones, personal computers, PDA, Laptops, digital camera, MP3 players and other Bluetooth enabled devices to form a small network. In the Bluetooth technology eight devices can be connected to each other at the same time. Bluetooth can also be found in the headsets, hands-free kits, wireless keyboards and mouse. Bluetooth technology was invented by Ericsson in 1994 and after four years in 1998 some major mobile phone companies such as Nokia, Ericsson, Intel and Toshiba formed a group to promote this technology. &lt;/p&gt;  &lt;p&gt;Bluetooth technology falls in the category of personal area networking because it operates in the range of 30 to 300 feet. Bluetooth uses the radio waves technology, which is not very expensive and has low power consumption. Many different companies are intended to add the Bluetooth chip in their digital devices. Bluetooth technology is getting very popularity because of its low cost and portability. &lt;/p&gt;  &lt;p&gt;&amp;#160;&lt;/p&gt;  &lt;p&gt;&lt;strong&gt;The Future of Wireless Networking&lt;/strong&gt;&lt;/p&gt;  &lt;p&gt;WLANS wireless networking type is very popular in home networking and more than 20 percent homes with broadband internet are using WLANS and this number is increasing. In a general estimate worldwide hotspots have now reached more than 30,000 and will grow about 210,000 in the next few years. Most large hotels already offer Wi-Fi and the business travelers are willing to pay wireless access. 802.11 is the next Wi-Fi speed standard is set to offer bandwidth around 108Mbps and is still under development. With the speed of 70 Mbps and a range up to 30 miles, the 80216 standard, known as WiMAX is sure to get boost.&lt;/p&gt;  &lt;p&gt;&amp;#160;&lt;/p&gt;  &lt;p&gt;&amp;#160;&lt;/p&gt;  &lt;p&gt;&lt;strong&gt; Tips &amp;amp; Tricks&lt;/strong&gt;&lt;/p&gt;  &lt;ul&gt;   &lt;li&gt;     &lt;div align=&quot;left&quot;&gt;• When purchasing a wireless NIC card try to get one that is having external antenna. When you are out and using Wi-Fi enabled laptop, disable Microsoft file and sharing, which enables other computers in a network to access data and resources on your computer. In this way, your computer or laptop will be saved from hackers.        &lt;br /&gt;• If you are concerned about the interference from the other wireless access point set the AP and wireless computers to use a non-overlapping channel.         &lt;br /&gt;• Change the configuration interface password of the access point before you enable it.         &lt;br /&gt;• Only buy an access point that is having upgradeable capabilities. By this way you can take the advantage of security enhancements.         &lt;br /&gt;• Keep the access point up to date.&lt;/div&gt;   &lt;/li&gt; &lt;/ul&gt;  </content><link rel='replies' type='application/atom+xml' href='http://computerslearning.blogspot.com/feeds/79445526048331128/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://computerslearning.blogspot.com/2010/05/wireless-network-type.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6062689317046378893/posts/default/79445526048331128'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6062689317046378893/posts/default/79445526048331128'/><link rel='alternate' type='text/html' href='http://computerslearning.blogspot.com/2010/05/wireless-network-type.html' title='Wireless Network Type'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6062689317046378893.post-7374041368261074635</id><published>2010-05-14T11:24:00.001-07:00</published><updated>2010-05-14T11:24:51.960-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Compression Tool"/><category scheme="http://www.blogger.com/atom/ns#" term="Download"/><category scheme="http://www.blogger.com/atom/ns#" term="Software"/><title type='text'>Compress and decompress by KGB ARCHIVER</title><content type='html'>&lt;p&gt;&lt;strong&gt;KGB Archiver&lt;/strong&gt; is is the compression tool with unbelievable high compression rate. It surpasses even such efficient compression tool like 7zip and UHARC in terms of the abilities. Unfortunately although its powerful compression rate, it has high hardware requirements (I recommend processor with 1,5GHz clock and 256MB of RAM as an essential minimum). One of the advantages of KGB Archiver is also &lt;strong&gt;AES-256 encryption&lt;/strong&gt; which is used to encrypt the archives. This is one of the strongest encryptions known for human.&lt;/p&gt;  &lt;p&gt;&lt;strong&gt;&lt;/strong&gt;&lt;/p&gt;  &lt;p&gt;&lt;strong&gt;Make Compress&lt;/strong&gt;&lt;/p&gt;  &lt;p&gt;&amp;#160;&lt;/p&gt;  &lt;p&gt;&amp;#160;&amp;#160; 1. Open the KGB Archiver program.   &lt;br /&gt;&amp;#160;&amp;#160; 2. Choose Compress files from the options and click Next &amp;gt;.    &lt;br /&gt;&amp;#160;&amp;#160; 3. On the next window, you can change the directory location where you want to put the file, give a name to your new archive and add file(s) or directory. Press the Next &amp;gt; button when you finish.    &lt;br /&gt;&amp;#160;&amp;#160; 4. The program will then create the archive file for you and show a dialog box with some information when it has finish. &lt;/p&gt;  &lt;p&gt;&amp;#160;&lt;/p&gt;  &lt;p&gt;&lt;strong&gt;Extract a zip file &lt;/strong&gt;&lt;/p&gt;  &lt;p&gt;KGB Archiver 2 &lt;/p&gt;  &lt;p&gt;&amp;#160;&amp;#160; 1. Open the KGB Archiver program.   &lt;br /&gt;&amp;#160;&amp;#160; 2. Choose Decompress files from the options and click Next &amp;gt;.    &lt;br /&gt;&amp;#160;&amp;#160; 3. On the next window, choose your archive file and directory location where you want to put the file(s). You can extract all files on the archive by unchecking the Choose files to decompress option or extract selected file by checking the option and select the file(s).&lt;/p&gt;  </content><link rel='replies' type='application/atom+xml' href='http://computerslearning.blogspot.com/feeds/7374041368261074635/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://computerslearning.blogspot.com/2010/05/compress-and-decompress-by-kgb-archiver.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6062689317046378893/posts/default/7374041368261074635'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6062689317046378893/posts/default/7374041368261074635'/><link rel='alternate' type='text/html' href='http://computerslearning.blogspot.com/2010/05/compress-and-decompress-by-kgb-archiver.html' title='Compress and decompress by KGB ARCHIVER'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6062689317046378893.post-1976748831256174254</id><published>2010-04-12T07:46:00.000-07:00</published><updated>2010-04-12T07:47:58.466-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Hobbies"/><category scheme="http://www.blogger.com/atom/ns#" term="Utiliti"/><title type='text'>HJSplit</title><content type='html'>did you know about HJSPLIT..??
&lt;span style=&quot;font-weight:bold;&quot;&gt;HJSplit&lt;/span&gt; is a file splitter which enables you to split files of any type and size. Does not need to be installed. Just click on hjsplit.exe and the program starts. This program can even handle files which are larger than 10Gb!

Now what&#39;s the use of a program like HJSplit? Think of a file of &lt;span style=&quot;font-weight:bold;&quot;&gt;20 Mb&lt;/span&gt;, and try to send this to a friend. Using email this does not succeed, it is simply too large, and how to put it onto a floppy? HJSplit will enable you to split the large file into smaller chunks, which can be much more easily sent and stored.

Of course HJSplit can join these split parts back together again, so that the original file is restored. HJSplit is very reliable, simple, small and easy to use. It does not need any installation or complicated DLLs, it just consists of one &#39;.exe&#39; file. This means that you can also run it directly from a floppy or CD-Rom.

YOU can Download here:

&lt;span style=&quot;font-weight:bold;&quot;&gt;http://hjsplit.en.softonic.com/downloAD&lt;/span&gt;</content><link rel='replies' type='application/atom+xml' href='http://computerslearning.blogspot.com/feeds/1976748831256174254/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://computerslearning.blogspot.com/2010/04/hjsplit.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6062689317046378893/posts/default/1976748831256174254'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6062689317046378893/posts/default/1976748831256174254'/><link rel='alternate' type='text/html' href='http://computerslearning.blogspot.com/2010/04/hjsplit.html' title='HJSplit'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6062689317046378893.post-6256316055141243152</id><published>2010-04-12T07:40:00.000-07:00</published><updated>2010-04-12T07:43:22.461-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Hobbies"/><title type='text'>watch TV by Internet</title><content type='html'>Satellite TV for PC ™ is the product of more than 7 years of dedicated research and development to create an easy-to-use computer program,that legally accesses thousands of television channels from all over the world and sends them to your computer through the internet!
Main Features:

• Movies: Channels of action… comedy… romance… and just about any genre you like! And foreign movies as well!

• Sports: Channels showing baseball, football, soccer, basketball, tennis, and racing! Channels like ESPN News, EuroSports TV, GameSports TV, WHL TV, Fox Network, and Sport Star. There are channels for just about any sport you can think of... ultimate fighting, martial arts, wrestling, and boxing!

• Music: The hottest music videos from all over the world! Some channels you should check out are Deejay TV, Festival TV, Ministry Of Sound, Party TV, and Club TV! And on top of that, you also have access to over 1,500 radio stations from around the world!

• Premium Channels: Channels, including Comedy Central, MTV Overdrive, Euro TV, Discovery Channel, Broadway Network, Game Network, MovieStat Network, National Geographic, Food Network, Rapture TV, Vintage Cartoons, Show TV…and even HDTV (high definition television) channels! These are channels you may be paying a lot of money for right now…but no longer have to!

• Kids Channels: Countless channels for your kids that show cartoons and movies all day long the whole family can enjoy!

• News, Weather And Politics: Hundreds of channels with the latest news, weather and politics from all over the country and the world… live and uncensored! There are countless channels of ABC, NBC, CBS, FOX and PBS affiliates all over the country and the world. This means if you’re from Texas but are visiting California, you can still tune in to your local favorite news station! And you’ll be more up to date than anyone you know…  because…especially.

you can hunting that software in search engine..</content><link rel='replies' type='application/atom+xml' href='http://computerslearning.blogspot.com/feeds/6256316055141243152/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://computerslearning.blogspot.com/2010/04/watch-tv-by-internet.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6062689317046378893/posts/default/6256316055141243152'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6062689317046378893/posts/default/6256316055141243152'/><link rel='alternate' type='text/html' href='http://computerslearning.blogspot.com/2010/04/watch-tv-by-internet.html' title='watch TV by Internet'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6062689317046378893.post-1122896183391257112</id><published>2010-03-23T12:46:00.000-07:00</published><updated>2010-03-23T12:47:31.736-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Browser"/><category scheme="http://www.blogger.com/atom/ns#" term="Tips and tricks"/><title type='text'>Tips Facebook</title><content type='html'>Below is a listing of our top 10 tips for the popular social networking website Facebook.
Hide users, games, polls, etc.
It quickly gets annoying seeing some users posts, game invites, polls, etc. Hovering your mouse to the right of the post and clicking the Hide button as shown below can hide any post. Once this button is pressed you&#39;ll be prompted with the option to hide that user or in the case of a Facebook application the option to hide that application from ever showing up on your profile.

To unhide someone or unblock an application click the Edit Options link in the bottom right corner of the news feed as shown below.

Greasemonkey and FB Purity
Although Facebook does not allow the ability to hide friends getting new friends messages, friends becoming fans of something, and some application messages they can still be hidden with browser add-ons. If you&#39;re running Mozilla Firefox, Chrome, Opera, or Safari we suggest installing the Facebook Purity add-on.
Facebook lite
In addition to all the tips mentioned above if the main Facebook page is still too much for you consider using Facebook lite, which is found at: http://lite.facebook.com/
Update your privacy settings
Click Account in the top right corner of the Facebook window and then click Privacy settings to adjust who is capable of seeing what on your Facebook profile. We highly recommend going through all the privacy settings to verify your privacy is properly protected.
Anything that is not set to friends only or friends of friends can be seen by anyone searching on the Internet.
Use the Facebook top bar for navigation

Knowing how to properly navigate is vital if you want to get the most out of Facebook. Below is a brief description of each of the available options in the top bar as shown above.
 Home (facebook logo) - Clicking this logo will take you to your wall (News Feed) that shows all friends recent posts. 
Friend requests - If any friend requests are waiting to be approved this icon will show a notification of how many friends are waiting for approval. This icon can also be clicked when you want to view any friend recommendations or search for friends on Facebook.
Messages - This section allows you to send and receive private messages between one or more people you&#39;re friends with.
Notifications - Any time a friend or Facebook application creates a new post you&#39;ll be notified in this section. Clicking this icon will show all recent notifications. If you wish to change what is capable of sending you notifications including any Facebook applications or games click the See All Notifications link at the bottom and check or uncheck what you want to be notified on.
Search - Finally, the search box in Facebook can be a powerful tool that can be used to quickly find any current friends or people on Facebook. In addition searching for terms such as a company name, product, sports team, music band, etc. will find fan pages and groups that can be joined.
Modify your account notifications
Keep your e-mail and/or your cell phone clean by updating or eliminate Facebook notifications or keep more up-to-date by adding new notifications. Facebook notifications can be added and removed by clicking Account link in the top right corner, then Account Settings, and then clicking the Notifications tab.
Top News and Most Recent

By default Facebook will display your wall postings in the News format, which means it only displays posts it believes are most relevant to you. These results are based on your past interaction with your friends. If you want to see every post made by all your friends that are not hidden click the Most recent link in the upper right section of your news feed as shown in the above picture example.
If you want to adjust who shows up manually click the Edit Options in the bottom right corner of your news feed.

View High School work friends
If you&#39;ve added your High School and/or previous Work locations to your profile, quickly see all classmates and co-workers on Facebook by clicking the link in your Info tab under your profile.
Quickly change profile picture
Your profile picture can be quickly changed to any other picture by visiting your profile, hovering the mouse over your current profile picture, and clicking the Change Picture link that appears in the top right corner of the picture.
Don&#39;t post private information on friend&#39;s walls on in comments
When you make a post on a friend&#39;s wall or in any of their comments realize that any of their friends are going to be able to see that post. If you wish for something to remain only between you and a friend send them a Facebook message instead.
Suggestions and random friend invites
As you get more friends on Facebook it will begin making friend, groups, and fan suggestions. These are suggestions made by Facebook and not your friends. Unless these are something you&#39;re interested in they can be ignored.
This same rule can be applied to people who may want to be your friend that you don&#39;t know. If you don&#39;t know someone don&#39;t accept his or her friend invite. Once someone becomes your friend they&#39;ll have access to any information your friends are capable of seeing.
Tag your Facebook friends in your photos
Always make sure to tag any of your Facebook friends that are in pictures you upload. However, never tag someone who is not in the picture. When someone is tagged in a photo that picture is automatically added to that persons profile and is a great way to share pictures with all friends.</content><link rel='replies' type='application/atom+xml' href='http://computerslearning.blogspot.com/feeds/1122896183391257112/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://computerslearning.blogspot.com/2010/03/tips-facebook.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6062689317046378893/posts/default/1122896183391257112'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6062689317046378893/posts/default/1122896183391257112'/><link rel='alternate' type='text/html' href='http://computerslearning.blogspot.com/2010/03/tips-facebook.html' title='Tips Facebook'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6062689317046378893.post-2605336841655524408</id><published>2010-03-23T12:40:00.000-07:00</published><updated>2010-03-23T12:42:12.908-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Operating System"/><category scheme="http://www.blogger.com/atom/ns#" term="Tips and tricks"/><title type='text'>No Bootable files in Harddisk</title><content type='html'>Hard disk drive does not have bootable files on it
It is possible that &lt;span style=&quot;font-weight:bold;&quot;&gt;command.com&lt;/span&gt; or another bootable file may be missing from the hard disk drive. Follow the below steps to possible resolve your issue.
Windows 95, Windows 98, and Windows ME users
1.Boot from a bootable floppy diskette. 
2.At the A:\&gt; type fdisk &lt;press enter&gt; 
3.If you receive a message no fixed disk present, read Hard Disk drive is bad or not connected properly. 
4.If you are able to get into fdisk, choose option 4 to display the partition information. In the partition information, if the System is listed as FAT16 or FAT32 then continue to step 5. If you have a message indicating no partitions defined, no information is on your hard disk drive and you will need to create a new partition. See our fdisk page for additional information. 
5.If you see FAT16 or FAT32 in fdisk press the ESC key until back at the A:\&gt; 
6.Once at the A:\&gt; type, sys c: &lt;press enter&gt; (only do this command if you are using the same operating system that this diskette was created on). 
7.This should return a message &#39;System Transferred&#39;, if you receive bad command or file name and have verified you have typed the command properly, you will need to obtain a bootable diskette with the file sys.com on it. 
8.If system was transferred successfully, reboot the computer and issue should be resolved. 
Windows 2000 and Windows XP users
1.Boot from either your ERD, your bootable Windows CD, or your bootable restore CD. 
2.Once boot attempt to repair Windows. If you&#39;re able to repair Windows remove the disks and reboot the computer. 

i hope can usefull</content><link rel='replies' type='application/atom+xml' href='http://computerslearning.blogspot.com/feeds/2605336841655524408/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://computerslearning.blogspot.com/2010/03/no-bootable-files-in-harddisk.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6062689317046378893/posts/default/2605336841655524408'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6062689317046378893/posts/default/2605336841655524408'/><link rel='alternate' type='text/html' href='http://computerslearning.blogspot.com/2010/03/no-bootable-files-in-harddisk.html' title='No Bootable files in Harddisk'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6062689317046378893.post-6869109364342471829</id><published>2009-09-04T17:46:00.001-07:00</published><updated>2009-09-04T17:46:53.816-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Tips and tricks"/><title type='text'>Function F1-F12 on your keyboard</title><content type='html'>&lt;p&gt;Function for F1 until F12 on your keyboard&lt;/p&gt;  &lt;p&gt;&amp;#160;&lt;/p&gt;  &lt;p&gt;&lt;strong&gt;F1&lt;/strong&gt;&lt;/p&gt;  &lt;ul&gt;   &lt;li&gt;Almost always used as the help key, almost every program will open the help screen when this key is pressed. &lt;/li&gt;    &lt;li&gt;&lt;u&gt;Windows Key&lt;/u&gt; + F1 would open the Microsoft Windows help and support center. &lt;/li&gt;    &lt;li&gt;Open the &lt;u&gt;Task Pane&lt;/u&gt;. &lt;/li&gt;    &lt;li&gt;&lt;/li&gt; &lt;/ul&gt;  &lt;p&gt;&lt;strong&gt;F2&lt;/strong&gt;&lt;/p&gt;  &lt;ul&gt;   &lt;li&gt;In Windows commonly used to rename a highlighted icon or file. &lt;/li&gt;    &lt;li&gt;Alt + Ctrl + F2 opens a new document in &lt;u&gt;Microsoft Word&lt;/u&gt;. &lt;/li&gt;    &lt;li&gt;Ctrl + F2 displays the print preview window in Microsoft Word. &lt;/li&gt;    &lt;li&gt;&lt;/li&gt; &lt;/ul&gt;  &lt;p&gt;&lt;strong&gt;F3&lt;/strong&gt;&lt;/p&gt;  &lt;ul&gt;   &lt;li&gt;Often opens a search feature for many programs including Microsoft Windows. &lt;/li&gt;    &lt;li&gt;Shift + F3 will change the text in Microsoft Word from upper to lower case or a capital letter at the beginning of every word. &lt;/li&gt;    &lt;li&gt;&lt;/li&gt; &lt;/ul&gt;  &lt;p&gt;&lt;strong&gt;F4&lt;/strong&gt;&lt;/p&gt;  &lt;ul&gt;   &lt;li&gt;Open find window. &lt;/li&gt;    &lt;li&gt;Repeat the last action performed (Word 2000+) &lt;/li&gt;    &lt;li&gt;Alt + F4 will close the program currently active in Microsoft Windows. &lt;/li&gt;    &lt;li&gt;Ctrl + F4 will close the open window within the current active window in Microsoft Windows. &lt;/li&gt;    &lt;li&gt;&lt;/li&gt; &lt;/ul&gt;  &lt;p&gt;&lt;strong&gt;F5&lt;/strong&gt;&lt;/p&gt;  &lt;ul&gt;   &lt;li&gt;In all modern &lt;u&gt;Internet browsers&lt;/u&gt; pressing F5 will &lt;u&gt;refresh&lt;/u&gt; or reload the page or document window. &lt;/li&gt;    &lt;li&gt;Open the find, replace, and go to window in Microsoft Word. &lt;/li&gt;    &lt;li&gt;Starts a slideshow in PowerPoint. &lt;/li&gt;    &lt;li&gt;&lt;/li&gt; &lt;/ul&gt;  &lt;p&gt;&lt;strong&gt;F6&lt;/strong&gt;&lt;/p&gt;  &lt;ul&gt;   &lt;li&gt;Move the cursor to the &lt;u&gt;Address bar&lt;/u&gt; in &lt;u&gt;Internet Explorer&lt;/u&gt; and &lt;u&gt;Mozilla Firefox&lt;/u&gt;. &lt;/li&gt;    &lt;li&gt;Ctrl + Shift + F6 opens to another open Microsoft Word document. &lt;/li&gt;    &lt;li&gt;&lt;/li&gt; &lt;/ul&gt;  &lt;p&gt;&lt;strong&gt;F7&lt;/strong&gt;&lt;/p&gt;  &lt;ul&gt;   &lt;li&gt;Commonly used to spell check and grammar check a document in Microsoft programs such as Microsoft Word, Outlook, etc. &lt;/li&gt;    &lt;li&gt;Shift + F7 runs a Thesaurus check on the word highlighted. &lt;/li&gt;    &lt;li&gt;Turns on Caret browsing in Mozilla Firefox. &lt;/li&gt;    &lt;li&gt;&lt;/li&gt; &lt;/ul&gt;  &lt;p&gt;&lt;strong&gt;F8&lt;/strong&gt;&lt;/p&gt;  &lt;ul&gt;   &lt;li&gt;Function key used to enter the Windows startup menu, commonly use to get into Windows &lt;u&gt;Safe Mode&lt;/u&gt;. &lt;/li&gt;    &lt;li&gt;&lt;/li&gt; &lt;/ul&gt;  &lt;p&gt;&lt;strong&gt;F9&lt;/strong&gt;&lt;/p&gt;  &lt;ul&gt;   &lt;li&gt;Opens the Measurements toolbar in Quark 5.0. &lt;/li&gt;    &lt;li&gt;&lt;/li&gt; &lt;/ul&gt;  &lt;p&gt;&lt;strong&gt;F10&lt;/strong&gt;&lt;/p&gt;  &lt;ul&gt;   &lt;li&gt;In Microsoft Windows activates the &lt;u&gt;menu bar&lt;/u&gt; of an open application. &lt;/li&gt;    &lt;li&gt;Shift + F10 is the same as &lt;u&gt;right-clicking&lt;/u&gt; on a highlighted icon, file, or Internet link. &lt;/li&gt;    &lt;li&gt;&lt;/li&gt; &lt;/ul&gt;  &lt;p&gt;&lt;strong&gt;F11&lt;/strong&gt;&lt;/p&gt;  &lt;ul&gt;   &lt;li&gt;Full-screen mode in all modern Internet browsers. &lt;/li&gt;    &lt;li&gt;&lt;/li&gt; &lt;/ul&gt;  &lt;p&gt;&lt;strong&gt;F12&lt;/strong&gt;&lt;/p&gt;  &lt;ul&gt;   &lt;li&gt;Open the Save as window in Microsoft Word. &lt;/li&gt;    &lt;li&gt;Shift + F12 save the Microsoft Word document. &lt;/li&gt;    &lt;li&gt;Ctrl + Shift + F12 prints a document in Microsoft Word.      &lt;div class=&quot;wlWriterEditableSmartContent&quot; id=&quot;scid:0767317B-992E-4b12-91E0-4F059A8CECA8:15878d24-0215-4705-b6a2-489cb306d63d&quot; style=&quot;padding-right: 0px; display: inline; padding-left: 0px; float: none; padding-bottom: 0px; margin: 0px; padding-top: 0px&quot;&gt;Tag Technorati: {grup-tag}&lt;a href=&quot;http://technorati.com/tags/keyboard&quot; rel=&quot;tag&quot;&gt;keyboard&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/F1-F12+Keyboard&quot; rel=&quot;tag&quot;&gt;F1-F12 Keyboard&lt;/a&gt;&lt;/div&gt;   &lt;/li&gt; &lt;/ul&gt;  &lt;p&gt;&lt;font size=&quot;4&quot;&gt;&lt;strong&gt;&lt;a href=&quot;http://computerslearning.blogspot.com&quot; target=&quot;_blank&quot; rel=&quot;nofollow&quot;&gt;C.L&lt;/a&gt;&lt;/strong&gt;&lt;/font&gt;&lt;/p&gt;  </content><link rel='replies' type='application/atom+xml' href='http://computerslearning.blogspot.com/feeds/6869109364342471829/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://computerslearning.blogspot.com/2009/09/function-f1-f12-on-your-keyboard.html#comment-form' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6062689317046378893/posts/default/6869109364342471829'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6062689317046378893/posts/default/6869109364342471829'/><link rel='alternate' type='text/html' href='http://computerslearning.blogspot.com/2009/09/function-f1-f12-on-your-keyboard.html' title='Function F1-F12 on your keyboard'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6062689317046378893.post-6853328258908224370</id><published>2009-09-04T06:17:00.001-07:00</published><updated>2009-09-04T06:17:36.752-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Tips and tricks"/><title type='text'>Procedure update Bios</title><content type='html'>&lt;p&gt;All latest Motherboards today, 486/ Pentium / Pentium Pro etc.,ensure that upgrades are easily obtained by incorporating the system BIOS in a FLASH Memory component. With FLASH BIOS, there is no need to replace an EPROM component. Once downloaded, the upgrade utility fits on a floppy disc allowing the user to save, verify and update the system BIOS. A hard drive or a network drive can also be used to run the newer upgrade utilities. However, memory managers can not be installed while upgrading. &lt;/p&gt;  &lt;p&gt;Most pre-Pentium motherboards do not have a Flash BIOS. The following instructions therefore do not apply to these boards. If your motherboard does not have a Flash BIOS (EEPROM) you will need to use an EPROM programmer to re-program the BIOS chip. See your dealer for more information about this. &lt;/p&gt;  &lt;p&gt;Please read the following instructions in full before starting a Flash BIOS upgrade:    &lt;br /&gt;A. Create a Bootable Floppy (in DOS) &lt;/p&gt;  &lt;p&gt;•With a non-formatted disk, type the following: &lt;/p&gt;  &lt;p&gt;format a:/s &lt;/p&gt;  &lt;p&gt;•If using a formatted disk, type: &lt;/p&gt;  &lt;p&gt;sys a: &lt;/p&gt;  &lt;p&gt;This procedure will ensure a clean boot when you are flashing the new BIOS. &lt;/p&gt;  &lt;p&gt;B. Download the BIOS file &lt;/p&gt;  &lt;p&gt;•Download the correct BIOS file by clicking on the file name of the BIOS file you wish to download. &lt;/p&gt;  &lt;p&gt;•Save the BIOS file and the Flash Utility file in the boot disk you have created. Unzip the BIOS file and the flash utility file. If you don&#39;t have an &amp;quot;unzip&amp;quot; utility, download the WinZip for Windows 95 shareware/ evaluation copy for that one time use from _www.winzip.com or _www.pkware.com. Most CD ROMs found in computer magazines, have a shareware version of WinZip on them. &lt;/p&gt;  &lt;p&gt;•You should have extracted two files: &lt;/p&gt;  &lt;p&gt;Flash BIOS utility eg: flash7265.exe (for example) &lt;/p&gt;  &lt;p&gt;BIOS eg: 6152J900.bin (example) &lt;/p&gt;  &lt;p&gt;Use the latest flash utility available unless otherwise specified (either on the BIOS update page or in the archive file). This information is usually provided. &lt;/p&gt;  &lt;p&gt;C. Upgrade the System BIOS &lt;/p&gt;  &lt;p&gt;During boot up, write down the old BIOS version because you will need to use it for the BIOS backup file name. &lt;/p&gt;  &lt;p&gt;Place the bootable floppy disk containing the BIOS file and the Flash Utility in drive a, and reboot the system in MS-DOS, preferably Version 6.22 &lt;/p&gt;  &lt;p&gt;•At the A:&amp;gt; prompt, type the corresponding Flash BIOS utility and the BIOS file with its extension. &lt;/p&gt;  &lt;p&gt;For example: &lt;/p&gt;  &lt;p&gt;flash625 615j900.bin &lt;/p&gt;  &lt;p&gt;•From the Flash Memory Writer menu, select &amp;quot;Y&amp;quot; to &amp;quot;Do you want to save BIOS?&amp;quot; if you want to save (back up) your current BIOS (strongly recommended), then type the name of your current BIOS and its extension after FILE NAME TO SAVE: eg: a:\613J900.bin &lt;/p&gt;  &lt;p&gt;Alternatively select &amp;quot;N&amp;quot; if you don&#39;t want to save your current BIOS. Beware, though, that you won&#39;t be able to recover from a possible failure. &lt;/p&gt;  &lt;p&gt;•Select &amp;quot;Y&amp;quot; to &amp;quot;Are you sure to program?&amp;quot; &lt;/p&gt;  &lt;p&gt;•Wait until it displays &amp;quot;Message: Power Off or Reset the system&amp;quot; &lt;/p&gt;  &lt;p&gt;Once the BIOS has been successfully loaded, remove the floppy disk and reboot the system. If you write to BIOS but cannot complete the procedure, do not switch off, because the computer will not be able to boo, and you will not be given another chance to flash. In this case leave your system on until you resolve the problem (flashing BIOS with old file is a possible solution, provided you&#39;ve made a backup before) &lt;/p&gt;  &lt;p&gt;Make sure the new BIOS version has been loaded properly by taking note of the BIOS identifier as the system is rebooting. &lt;/p&gt;  &lt;p&gt;For AMI BIOS    &lt;br /&gt;Once the BIOS has been successfully loaded, remove the floppy disk and reboot the system holding the &amp;quot;END&amp;quot; key prior to power on until you enter CMOS setup. If you do not do this the first time booting up after upgrading the BIOS, the system will hang. &lt;/p&gt;  &lt;p&gt;BIOS Update Tips    &lt;br /&gt;note:     &lt;br /&gt;1.Make sure never to turn off or reset your computer during the flash process. This will corrupt the BIOS data. We also recommend that you make a copy of your current BIOS on the bootable floppy so you can reflash it if you need to. (This option is not available when flashing an AMI BIOS). &lt;/p&gt;  &lt;p&gt;2. If you have problems installing your new BIOS please check the following: &lt;/p&gt;  &lt;p&gt;Have you done a clean boot?    &lt;br /&gt;In other words, did you follow the above procedure for making a bootable floppy? This ensures that when booting from &amp;quot;A&amp;quot; there are no device drivers on the diskette. Failing to do a clean boot is the most common cause for getting a &amp;quot;Memory Insufficient&amp;quot; error message when attempting to flash a BIOS. &lt;/p&gt;  &lt;p&gt;If you have not used a bootable floppy, insure a clean boot either by &lt;/p&gt;  &lt;p&gt;a) pressing F5 during bootup &lt;/p&gt;  &lt;p&gt;b) by removing all device drivers on the CONFIG.SYS including the HIMEM.SYS. Do this by using the EDIT command. &lt;/p&gt;  &lt;p&gt;Have you booted up under DOS?    &lt;br /&gt;Booting in Windows is another common cause for getting a &amp;quot;Memory Insufficient&amp;quot; error message when attempting to flash a BIOS. Make sure to boot up to DOS with a minimum set of drivers. Important: Booting in DOS does not mean selecting &amp;quot;Restart computer in MS-DOS Mode&amp;quot; from Windows98/95 shutdown menu or going to Prompt mode in WindowsNT, but rather following the above procedure (format a: /s and rebooting from a:\). &lt;/p&gt;  &lt;p&gt;Have you entered the full file name of the flash utility and the BIOS plus its extension?    &lt;br /&gt;Do not forget that often you will need to add a drive letter (a:\) before flashing the BIOS. Example: when asked for file name of new BIOS file which is on your floppy disk, in case you&#39;re working from c:\ your will need to type a:\615j900.bin, rather than 615j900.bin only.&lt;/p&gt;  &lt;div class=&quot;wlWriterEditableSmartContent&quot; id=&quot;scid:0767317B-992E-4b12-91E0-4F059A8CECA8:2432adf8-f3f3-4786-9d9b-24b67787099a&quot; style=&quot;padding-right: 0px; display: inline; padding-left: 0px; float: none; padding-bottom: 0px; margin: 0px; padding-top: 0px&quot;&gt;Tag Technorati: {grup-tag}&lt;a href=&quot;http://technorati.com/tags/bios&quot; rel=&quot;tag&quot;&gt;bios&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/update+bios&quot; rel=&quot;tag&quot;&gt;update bios&lt;/a&gt;&lt;/div&gt;  </content><link rel='replies' type='application/atom+xml' href='http://computerslearning.blogspot.com/feeds/6853328258908224370/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://computerslearning.blogspot.com/2009/09/procedure-update-bios.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6062689317046378893/posts/default/6853328258908224370'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6062689317046378893/posts/default/6853328258908224370'/><link rel='alternate' type='text/html' href='http://computerslearning.blogspot.com/2009/09/procedure-update-bios.html' title='Procedure update Bios'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6062689317046378893.post-5341875933141122218</id><published>2009-08-31T08:30:00.001-07:00</published><updated>2009-08-31T08:30:10.497-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Browser"/><title type='text'>Feature Firefox 3.5.2</title><content type='html'>&lt;h5&gt;Top Features&lt;/h5&gt;  &lt;h6&gt;&lt;a href=&quot;http://www.mozilla.com/en-US/firefox/features/#private-browsing&quot;&gt;Private Browsing&lt;/a&gt;&lt;/h6&gt;  &lt;h6&gt;&lt;a href=&quot;http://www.mozilla.com/en-US/firefox/features/#private-browsing&quot;&gt;&lt;/a&gt;&lt;/h6&gt;  &lt;p&gt;new Surf the Web without leaving a single trace.&lt;/p&gt;  &lt;h6&gt;&lt;a href=&quot;http://www.mozilla.com/en-US/firefox/features/#password-manager&quot;&gt;Password Manager&lt;/a&gt;&lt;/h6&gt;  &lt;p&gt;Remember site passwords without ever seeing a pop-up.&lt;/p&gt;  &lt;h6&gt;&lt;a href=&quot;http://www.mozilla.com/en-US/firefox/features/#location-bar&quot;&gt;Awesome Bar&lt;/a&gt;&lt;/h6&gt;  &lt;p&gt;improved Find the sites you love in seconds (and without having to remember clunky URLs).&lt;/p&gt;  &lt;h6&gt;&lt;a href=&quot;http://www.mozilla.com/en-US/firefox/features/#super-speed&quot;&gt;Super Speed&lt;/a&gt;&lt;/h6&gt;  &lt;p&gt;new View Web pages way faster, using less of your computer’s memory.&lt;/p&gt;  &lt;h6&gt;&lt;img src=&quot;http://www.mozilla.com/img/tignish/firefox/performance-chart.png&quot; /&gt; &lt;/h6&gt;  &lt;h6&gt;&lt;a href=&quot;http://www.mozilla.com/en-US/firefox/features/#anti-phishing&quot;&gt;Anti-Phishing &amp;amp; Anti-Malware&lt;/a&gt;&lt;/h6&gt;  &lt;p&gt;improved Enjoy the most advanced protection against online bad guys.&lt;/p&gt;  &lt;h6&gt;&lt;a href=&quot;http://www.mozilla.com/en-US/firefox/features/#session-restore&quot;&gt;Session Restore&lt;/a&gt;&lt;/h6&gt;  &lt;p&gt;improved Unexpected shutdown? Go back to exactly where you left off.&lt;/p&gt;  &lt;h6&gt;&lt;a href=&quot;http://www.mozilla.com/en-US/firefox/features/#bookmarking&quot;&gt;One-Click Bookmarking&lt;/a&gt;&lt;/h6&gt;  &lt;p&gt;Bookmark, search and organize Web sites quickly and easily.&lt;/p&gt;  &lt;h6&gt;&lt;a href=&quot;http://www.mozilla.com/en-US/firefox/features/#customization&quot;&gt;Easy Customization&lt;/a&gt;&lt;/h6&gt;  &lt;p&gt;improved Thousands of add-ons give you the freedom to make your browser your own.&lt;/p&gt;  &lt;h6&gt;&lt;a href=&quot;http://www.mozilla.com/en-US/firefox/features/#tabs&quot;&gt;Tabs&lt;/a&gt;&lt;/h6&gt;  &lt;p&gt;improved Do more at once with tabs you can organize with the drag of a mouse.&lt;/p&gt;  &lt;h6&gt;&lt;a href=&quot;http://www.mozilla.com/en-US/firefox/features/#instant-id&quot;&gt;Instant Web Site ID&lt;/a&gt;&lt;/h6&gt;  &lt;p&gt;Avoid online scams, unsafe transactions and forgeries with simple site identity.&lt;/p&gt;  &lt;h6&gt;Instant Web Site ID&lt;/h6&gt;  &lt;p&gt;Want to be extra sure about a site’s legitimacy before you make a purchase? Click on a site favicon for an instant identity overview. Another click digs deeper: how many times have you visited? Are your passwords saved? Check up on suspicious sites, avoid Web forgeries and make sure a site is what it claims to be.&lt;/p&gt;  &lt;h6&gt;Private Browsing&lt;/h6&gt;  &lt;p&gt;new Sometimes it’s nice to go undercover. When this feature is enabled, you won’t leave a single browsing fingerprint behind for others to discover. You can slip in and out of private browsing mode quickly, so it’s easy to return to what you were doing before as if nothing ever happened (you can also browse privately all the time).&lt;/p&gt;  &lt;h6&gt;Forget This Site&lt;/h6&gt;  &lt;p&gt;new Having second thoughts about having visited a certain Web site? With this feature, you can remove every trace of that site from your browser—no questions asked!&lt;/p&gt;  &lt;hr /&gt;  &lt;h6&gt;Anti-Malware&lt;/h6&gt;  &lt;p&gt;improved Firefox protects you from viruses, worms, trojan horses and spyware. If you accidentally access an attack site, it will warn you away from the site and tell you why it isn’t safe to use. Firefox checks every part of a Web page before loading it to make sure nothing harmful is sneaking in the back door.&lt;/p&gt;  &lt;p&gt;&lt;img src=&quot;http://www.mozilla.com/en-US/img/tignish/features/anti-malware.jpg&quot; /&gt; &lt;/p&gt;  &lt;p&gt;&amp;#160;&lt;/p&gt;  &lt;h6&gt;Anti-Phishing&lt;/h6&gt;  &lt;p&gt;Shop and do business safely on the Internet. Firefox gets a fresh update of web forgery sites 48 times in a day, so if you try to visit a fraudulent site that’s pretending to be a site you trust (like your bank), a browser message—big as life—will stop you.&lt;/p&gt;  &lt;h6&gt;Parental Controls&lt;/h6&gt;  &lt;p&gt;Enforce parental control settings you’ve entered on Vista—stop unwanted downloads and more.&lt;/p&gt;  &lt;h6&gt;Clear Recent History&lt;/h6&gt;  &lt;p&gt;improved Clear all your private data or just your activity over the past few hours with a few quick clicks. You have full control over what to delete, and then your info is gone for good—on your own computer or the one at your local library. It’s that easy.&lt;/p&gt;  &lt;h6&gt;Customized Security Settings&lt;/h6&gt;  &lt;p&gt;Control the level of scrutiny you’d like Firefox to give a site and enter exceptions—sites that don’t need the third degree. Customize settings for passwords, cookies, loading images and installing add-ons for a fully empowered Web experience.&lt;/p&gt;  &lt;h6&gt;Add-ons&lt;/h6&gt;  &lt;p&gt;Firefox looks for a secure connection before installing or updating add-ons, 3rd party software, and &lt;a href=&quot;http://www.getpersonas.com/&quot;&gt;Personas&lt;/a&gt;.&lt;/p&gt;  &lt;h6&gt;Password Manager&lt;/h6&gt;  &lt;p&gt;We’ve seamlessly integrated this feature into your surfing experience. Choose to “remember” site passwords without intrusive pop-ups. Now you’ll see the “remember password” notification integrated into your view at the top of the site page.&lt;/p&gt;  &lt;h6&gt;&lt;img src=&quot;http://www.mozilla.com/en-US/img/tignish/features/password-manager.png&quot; /&gt; &lt;/h6&gt;  &lt;h6&gt;Anti-Virus Software&lt;/h6&gt;  &lt;p&gt;Firefox integrates elegantly with your antivirus software. When you download a file, your computer’s antivirus program automatically checks it to protect you against viruses and other malware, which could otherwise attack your computer.&lt;/p&gt;  &lt;h6&gt;Pop-Up Blocker&lt;/h6&gt;  &lt;p&gt;Banish pop-ups (and pop-under windows) from your surfing experience once and for all. Or, find a happy medium—choose to view blocked pop-ups or create an “allow” list of sites whose pop-ups you’re okay with seeing.&lt;/p&gt;  &lt;h6&gt;Automated Update&lt;/h6&gt;  &lt;p&gt;Our open-source security strategy lets us find—and fix—security issues in record time, making Firefox the safest way to surf. Install upgrades when you receive automatic notification or wait until you’re ready.&lt;/p&gt;  &lt;p&gt;&lt;strong&gt;&lt;font size=&quot;4&quot;&gt;&lt;a href=&quot;http://www.mozilla.com/products/download.html?product=firefox-3.5.2&amp;amp;os=win&amp;amp;lang=en-US&quot; target=&quot;_blank&quot; rel=&quot;license&quot;&gt;Download here 7.7 mb FIREFOX 3.5.2&lt;/a&gt;&lt;/font&gt;&lt;/strong&gt;&lt;/p&gt;  &lt;p&gt;&amp;#160;&lt;/p&gt;  &lt;div class=&quot;wlWriterEditableSmartContent&quot; id=&quot;scid:0767317B-992E-4b12-91E0-4F059A8CECA8:406f485c-2741-4d60-ad8b-a46b6231d72c&quot; style=&quot;padding-right: 0px; display: inline; padding-left: 0px; float: none; padding-bottom: 0px; margin: 0px; padding-top: 0px&quot;&gt;Tag Technorati: {grup-tag}&lt;a href=&quot;http://technorati.com/tags/browser&quot; rel=&quot;tag&quot;&gt;browser&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/firefox+3.5.2&quot; rel=&quot;tag&quot;&gt;firefox 3.5.2&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/feature+firefox&quot; rel=&quot;tag&quot;&gt;feature firefox&lt;/a&gt;&lt;/div&gt;  </content><link rel='replies' type='application/atom+xml' href='http://computerslearning.blogspot.com/feeds/5341875933141122218/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://computerslearning.blogspot.com/2009/08/feature-firefox-352.html#comment-form' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6062689317046378893/posts/default/5341875933141122218'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6062689317046378893/posts/default/5341875933141122218'/><link rel='alternate' type='text/html' href='http://computerslearning.blogspot.com/2009/08/feature-firefox-352.html' title='Feature Firefox 3.5.2'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6062689317046378893.post-3400213602358419248</id><published>2009-08-28T01:57:00.001-07:00</published><updated>2009-08-28T01:57:18.601-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Virus Spyware Spam"/><title type='text'>Remove spyware “vistamessage.exe”</title><content type='html'>&lt;p&gt;&lt;font size=&quot;5&quot;&gt;V&lt;/font&gt;istamessage.exe is a rare kind of spyware/walware. &lt;/p&gt;  &lt;p&gt;Much information is not available on the Internet about vistamessage. And most spyware/virus scanners do not detect it. However, it is definitely some kind of spyware or malware. If you get infected with vistamessage.exe, you may experience the following problems:    &lt;br /&gt;&lt;b&gt;1. System slowdown:&lt;/b&gt; You computer may become very slow. If you hit Ctrl-Alt-Delete, you can observe vistamessage.exe comsuming memory and CPU, thus causing the computer to slow down.     &lt;br /&gt;&lt;b&gt;2. Popups:&lt;/b&gt; Some users have also reported unwanted popups.     &lt;br /&gt;&lt;b&gt;&lt;/b&gt;&lt;/p&gt;  &lt;p&gt;&lt;b&gt;&lt;/b&gt;&lt;/p&gt;  &lt;p&gt;&lt;b&gt;&lt;/b&gt;&lt;/p&gt;  &lt;p&gt;&lt;font size=&quot;4&quot;&gt;&lt;b&gt;&lt;/b&gt;&lt;/font&gt;&lt;/p&gt;  &lt;p&gt;&lt;font size=&quot;4&quot;&gt;&lt;b&gt;Way to remove vistamessage.exe&lt;/b&gt;       &lt;br /&gt;&lt;/font&gt;&lt;/p&gt;  &lt;p&gt;1) Go to Start -&amp;gt; Run and type &amp;quot;&lt;strong&gt;MSCONFIG&lt;/strong&gt;&amp;quot;. The MSCONFIG dialog box with open up.     &lt;br /&gt;2) Go to &amp;quot;Startup&amp;quot; and uncheck &amp;quot;&lt;strong&gt;VistaMessage&lt;/strong&gt;&amp;quot;. (You can also do this using CCleaner.)     &lt;br /&gt;3) &lt;strong&gt;Restart&lt;/strong&gt; your computer.     &lt;br /&gt;4) Locate &amp;quot;vistamessage.exe&amp;quot; on your hardrive using Windows search and delete it.     &lt;br /&gt;5) Run a registry scan to remove references to this file in the registry. &lt;/p&gt;  &lt;p&gt;&amp;#160;&lt;/p&gt;  &lt;p&gt;how about now..is it your PC clean now from spyware ???&lt;/p&gt;  &lt;p&gt;goodluck&lt;/p&gt;  &lt;div class=&quot;wlWriterEditableSmartContent&quot; id=&quot;scid:0767317B-992E-4b12-91E0-4F059A8CECA8:22d4e341-7ccd-4d0e-aed1-21226845c625&quot; style=&quot;padding-right: 0px; display: inline; padding-left: 0px; float: none; padding-bottom: 0px; margin: 0px; padding-top: 0px&quot;&gt;Tag Technorati: {grup-tag}&lt;a href=&quot;http://technorati.com/tags/spyware&quot; rel=&quot;tag&quot;&gt;spyware&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/remove+spyware&quot; rel=&quot;tag&quot;&gt;remove spyware&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/vistamessage&quot; rel=&quot;tag&quot;&gt;vistamessage&lt;/a&gt;&lt;/div&gt;  </content><link rel='replies' type='application/atom+xml' href='http://computerslearning.blogspot.com/feeds/3400213602358419248/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://computerslearning.blogspot.com/2009/08/remove-spyware-vistamessageexe.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6062689317046378893/posts/default/3400213602358419248'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6062689317046378893/posts/default/3400213602358419248'/><link rel='alternate' type='text/html' href='http://computerslearning.blogspot.com/2009/08/remove-spyware-vistamessageexe.html' title='Remove spyware “vistamessage.exe”'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6062689317046378893.post-1128883049060738109</id><published>2009-08-27T07:02:00.001-07:00</published><updated>2009-08-27T07:02:25.071-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Virus Spyware Spam"/><title type='text'>Remove xlavra(trojan)</title><content type='html'>&lt;h4&gt;&lt;a href=&quot;http://www.myantispyware.com/2007/11/13/how-to-remove-xlavra-trojan-downloaderwin32agent-and-wintools-adware/&quot;&gt;remove xlavra (Trojan-Downloader.Win32.Agent) and Wintools adware&lt;/a&gt;&lt;/h4&gt;  &lt;p&gt;WinTools is an adware that adds a toolbar to your browser and generating annoying popups and balloon dialogs.&lt;/p&gt;  &lt;p&gt;Go to Start &amp;gt; Control Panel &amp;gt; Add or Remove Programs and remove the following programs, if found: WinTools, WhenU, SearchUpgrader&lt;/p&gt;  &lt;p&gt;Download &lt;a href=&quot;http://www.myantispyware.com/2005/12/05/hijackthis-your-first-tool-for-remove-homepage-hijackers/&quot;&gt;HijackThis&lt;/a&gt; and save the file to your desktop. Double click on the file for install.    &lt;br /&gt;Download &lt;a href=&quot;http://www.myantispyware.com/2005/12/21/ccleaner-crap-cleaner-is-a-freeware-system-optimization-and-privacy-tool/&quot;&gt;CCleaner&lt;/a&gt;. Double click on the file for install.    &lt;br /&gt;Download &lt;a href=&quot;http://swandog46.geekstogo.com/avenger.zip&quot;&gt;Avenger&lt;/a&gt; and unzip to your desktop.    &lt;br /&gt;Download &lt;a href=&quot;http://www.myantispyware.com/2006/04/13/smitfraudfix-free-tool-for-remove-desktop-hijack-malware/&quot;&gt;SmitfraudFix&lt;/a&gt; (by S!Ri) Extract the content (a folder named SmitfraudFix) to your Desktop.&lt;/p&gt;  &lt;p&gt;Reboot your computer in Safe Mode by doing the following:&lt;/p&gt;  &lt;blockquote&gt;   &lt;p&gt;1. Restart your computer     &lt;br /&gt;2. After hearing your computer beep once during startup, but before the Windows icon appears, press F8.      &lt;br /&gt;3. Instead of Windows loading as normal, a menu should appear      &lt;br /&gt;4. Select the first option, to run Windows in Safe Mode. &lt;/p&gt; &lt;/blockquote&gt;  &lt;p&gt;Start HijackThis. Click “Do a system scan only.” and put a checkmark next to the following items:&lt;/p&gt;  &lt;blockquote&gt;   &lt;p&gt;R3 – URLSearchHook: (no name) – {1C78AB3F-A857-482E-80C0-3A1E5238A565} – (no file)     &lt;br /&gt;O2 – BHO: (no name) – {87766247-311C-43B4-8499-3D5FEC94A183} – C:\PROGRA~1\COMMON~1\WinTools\WToolsB.dll      &lt;br /&gt;O3 – Toolbar: (no name) – {8B224779-3B0E-4FEA-8AE1-B66C20DD840F} – (no file)      &lt;br /&gt;O4 – HKLM\..\Run: [SearchUpgrader] C:\Program Files\Common files\SearchUpgrader\SearchUpgrader.exe      &lt;br /&gt;O4 – HKLM\..\Run: [VVSN] C:\Program Files\VVSN\VVSN.exe      &lt;br /&gt;O4 – HKLM\..\Run: [WinTools] C:\PROGRA~1\COMMON~1\WinTools\WToolsA.exe      &lt;br /&gt;O9 – Extra button: (no name) – {AFC3FA82-AD07-45cd-8B57-983435B9899E} – (no file)      &lt;br /&gt;O16 – DPF: {1D6711C8-7154-40BB-8380-3DEA45B69CBF} -      &lt;br /&gt;O20 – AppInit_DLLs: C:\WINDOWS\system32\sulimo.dat      &lt;br /&gt;O23 – Service: WinTools for IE service (WinToolsSvc) – Unknown owner – C:\Program Files\Common Files\WinTools\WToolsS.exe (file missing)&lt;/p&gt; &lt;/blockquote&gt;  &lt;p&gt;Now close all browser and other windows except for HijackThis, and click “Fix Checked” to have HijackThis fix the entries you checked.&lt;/p&gt;  &lt;p&gt;Open notepad and then copy and paste the lines below into it. &lt;/p&gt;  &lt;blockquote&gt;   &lt;p&gt;@echo off     &lt;br /&gt;sc stop WinToolsSvc      &lt;br /&gt;sc delete WinToolsSvc&lt;/p&gt; &lt;/blockquote&gt;  &lt;p&gt;Go to File &amp;gt; save as and name the file fixes.bat, change the Save as type to all files and save it to your desktop.   &lt;br /&gt;Double-click on fixes.bat file to execute it.&lt;/p&gt;  &lt;p&gt;Run Avenger.   &lt;br /&gt;Check the ‘Input script manually’ option. Click the Magnifying Glass icon. In the box that opens, copy,then paste the following text:&lt;/p&gt;  &lt;blockquote&gt;   &lt;p&gt;Files to delete:     &lt;br /&gt;C:\WINDOWS\xlavba3.exe      &lt;br /&gt;C:\WINDOWS\system32\sulimo.dat&lt;/p&gt;    &lt;p&gt;Folders to delete:     &lt;br /&gt;C:\Program Files\Common files\SearchUpgrader\      &lt;br /&gt;C:\Program FilesVVSN\      &lt;br /&gt;C:\PROGRA~1\COMMON~1\WinTools\&lt;/p&gt; &lt;/blockquote&gt;  &lt;p&gt;Then click on ‘Done’.   &lt;br /&gt;Click the Traffic Light icon to start the program.    &lt;br /&gt;Then press OK at the prompts to reboot your PC.&lt;/p&gt;  &lt;p&gt;Boot your PC in Safe Mode.&lt;/p&gt;  &lt;blockquote&gt;   &lt;p&gt;1. Restart your computer     &lt;br /&gt;2. After hearing your computer beep once during startup, but before the Windows icon appears, press F8.      &lt;br /&gt;3. Instead of Windows loading as normal, a menu should appear      &lt;br /&gt;4. Select the first option, to run Windows in Safe Mode&lt;/p&gt; &lt;/blockquote&gt;  &lt;p&gt;Open the SmitfraudFix folder and double-click smitfraudfix.cmd. Press the number 2 on your keyboard and the press the enter key to choose the option Clean (safe mode recommended).&lt;/p&gt;  &lt;p&gt;You will be prompted : “Registry cleaning – Do you want to clean the registry ?“; answer “Yes” by typing Y and press “Enter” in order to remove the Desktop background and clean registry keys associated with the infection.&lt;/p&gt;  &lt;p&gt;The tool will now check if wininet.dll is infected. You may be prompted to replace the infected file (if found); answer “Yes” by typing Y and press “Enter”.&lt;/p&gt;  &lt;p&gt;The tool may need to restart your computer to finish the cleaning process; if it doesn’t, please restart it into Normal Windows.&lt;/p&gt;  &lt;p&gt;Run CCleaner.&lt;/p&gt;  &lt;blockquote&gt;   &lt;p&gt;Click Analyze button. After scan your system, click Run Cleaner.&lt;/p&gt; &lt;/blockquote&gt;  &lt;p&gt;Reboot your PC.&lt;/p&gt;  &lt;p&gt;&lt;a href=&quot;http://www.myantispyware.com/2005/11/22/how-to-disable-system-restore-in-windows-me-or-windows-xp/&quot;&gt;Disable system restore&lt;/a&gt; to flush out infected restore points. Reboot your computer again. &lt;a href=&quot;http://www.myantispyware.com/2005/11/22/how-to-disable-system-restore-in-windows-me-or-windows-xp/&quot;&gt;Turn on Windows System Restore&lt;/a&gt;. After that click START &amp;gt; ALL PROGRAMS &amp;gt; ACCESSORIES &amp;gt; SYSTEM TOOLS &amp;gt; SYSTEM RESTORE. click on “create new restore point” &amp;gt; click on NEXT and follow the prompts.&lt;/p&gt;  &lt;p&gt;source:&lt;a title=&quot;http://www.myantispyware.com/categories/spywareadware-protection-and-removal/&quot; href=&quot;http://www.myantispyware.com&quot;&gt;http://www.myantispyware.com&lt;/a&gt;&lt;/p&gt;  &lt;div class=&quot;wlWriterEditableSmartContent&quot; id=&quot;scid:0767317B-992E-4b12-91E0-4F059A8CECA8:64e355b5-54e2-4cd4-acd3-50a141fb2e83&quot; style=&quot;padding-right: 0px; display: inline; padding-left: 0px; float: none; padding-bottom: 0px; margin: 0px; padding-top: 0px&quot;&gt;Tag Technorati: {grup-tag}&lt;a href=&quot;http://technorati.com/tags/spyware&quot; rel=&quot;tag&quot;&gt;spyware&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/remove+spyware&quot; rel=&quot;tag&quot;&gt;remove spyware&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/Trojan+XLAVRA&quot; rel=&quot;tag&quot;&gt;Trojan XLAVRA&lt;/a&gt;&lt;/div&gt;  </content><link rel='replies' type='application/atom+xml' href='http://computerslearning.blogspot.com/feeds/1128883049060738109/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://computerslearning.blogspot.com/2009/08/remove-xlavratrojan.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6062689317046378893/posts/default/1128883049060738109'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6062689317046378893/posts/default/1128883049060738109'/><link rel='alternate' type='text/html' href='http://computerslearning.blogspot.com/2009/08/remove-xlavratrojan.html' title='Remove xlavra(trojan)'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6062689317046378893.post-6230048051001871755</id><published>2009-08-27T06:59:00.001-07:00</published><updated>2009-08-27T06:59:05.530-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Virus Spyware Spam"/><title type='text'>Delete Pcsecuritylab.com Hijacker</title><content type='html'>&lt;h4&gt;&amp;#160;&lt;/h4&gt;  &lt;p&gt;Pcsecuritylab.com is a browser hijacker.    &lt;br /&gt;It may also change desktop wallpaper, shows message:&lt;/p&gt;  &lt;blockquote&gt;   &lt;p align=&quot;center&quot;&gt;&lt;em&gt;“Warning! SpyWare Threat Detected on Your PC! “&lt;/em&gt;&lt;/p&gt; &lt;/blockquote&gt;  &lt;p&gt;You will also periodically get fake security warning:&lt;/p&gt;  &lt;blockquote&gt;   &lt;p&gt;Your Security and Privacy are at risk: Spyware has been detected. Click HERE to remove it.&lt;/p&gt; &lt;/blockquote&gt;  &lt;p&gt;It automatically runs on every Windows startup. Pcsecuritylab.com is a very high security risk threat and should be removed immediately as to prevent harm to your computer and your privacy.&lt;/p&gt;  &lt;p&gt;Download &lt;a href=&quot;http://www.myantispyware.com/2005/12/05/hijackthis-your-first-tool-for-remove-homepage-hijackers/&quot;&gt;HijackThis&lt;/a&gt; and save the file to your desktop. Double click on the file for install.     &lt;br /&gt;Download &lt;a href=&quot;http://www.myantispyware.com/2005/12/21/ccleaner-crap-cleaner-is-a-freeware-system-optimization-and-privacy-tool/&quot;&gt;CCleaner&lt;/a&gt;. Double click on the file for install.     &lt;br /&gt;Download &lt;a href=&quot;http://swandog46.geekstogo.com/avenger.zip&quot;&gt;Avenger&lt;/a&gt; and unzip to your desktop.&lt;/p&gt;  &lt;p&gt;Open notepad and copy/paste the text in the quotebox below into it:&lt;/p&gt;  &lt;blockquote&gt;   &lt;p&gt;&lt;font size=&quot;2&quot;&gt;REGEDIT4&lt;/font&gt;&lt;/p&gt;    &lt;p&gt;&lt;font size=&quot;2&quot;&gt;[-HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{00000000-d9e3-4bc6-a0bd-3d0ca4be5271}]        &lt;br /&gt;[-HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{00000012-890e-4aac-afd9-eff6954a34dd}]         &lt;br /&gt;[-HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{029e02f0-a0e5-4b19-b958-7bf2db29fb13}]         &lt;br /&gt;[-HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{06dfedaa-6196-11d5-bfc8-00508b4a487d}]         &lt;br /&gt;[-HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{1adbcce8-cf84-441e-9b38-afc7a19c06a4}]         &lt;br /&gt;[-HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{2d7cb618-cc1c-4126-a7e3-f5b12d3bcf71}]         &lt;br /&gt;[-HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{51641ef3-8a7a-4d84-8659-b0911e947cc8}]         &lt;br /&gt;[-HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{53C330D6-A4AB-419B-B45D-FD4411C1FEF4}]         &lt;br /&gt;[-HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{54645654-2225-4455-44A1-9F4543D34546}]         &lt;br /&gt;[-HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{669695bc-a811-4a9d-8cdf-ba8c795f261e}]         &lt;br /&gt;[-HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{6abc861a-31e7-4d91-b43b-d3c98f22a5c0}]         &lt;br /&gt;[-HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{8ABA9A9C-8791-4d61-8D5B-BCC9448EA573}]         &lt;br /&gt;[-HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{944864a5-3916-46e2-96a9-a2e84f3f1208}]         &lt;br /&gt;[-HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{a4a435cf-3583-11d4-91bd-0048546a1450}]         &lt;br /&gt;[-HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{A6E432B4-D4C2-43B3-BF55-C364F8F7362A}]         &lt;br /&gt;[-HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{b8875bfe-b021-11d4-bfa8-00508b8e9bd3}]         &lt;br /&gt;[-HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{c2680e10-1655-4a0e-87f8-4259325a84b7}]         &lt;br /&gt;[-HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{c4ca6559-2cf1-48b6-96b2-8340a06fd129}]         &lt;br /&gt;[-HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{c5af2622-8c75-4dfb-9693-23ab7686a456}]         &lt;br /&gt;[-HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{ca1d1b05-9c66-11d5-a009-000103c1e50b}]         &lt;br /&gt;[-HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{d8efadf1-9009-11d6-8c73-608c5dc19089}]         &lt;br /&gt;[-HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{e690500e-1dd1-11b2-a943-9ecd016314d0}]         &lt;br /&gt;[-HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{e9147a0a-a866-4214-b47c-da821891240f}]         &lt;br /&gt;[-HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{e9306072-417e-43e3-81d5-369490beef7c}]         &lt;br /&gt;[HKEY_CURRENT_USER\software\microsoft\windows nt\currentversion\winlogon]         &lt;br /&gt;“Userinit”=”C:\\WINDOWS\\system32\\userinit.exe,”&lt;/font&gt;&lt;/p&gt; &lt;/blockquote&gt;  &lt;p&gt;Save this as &lt;strong&gt;Fix.reg&lt;/strong&gt; to your Desktop (remember to select Save as file type: All files in Notepad.).     &lt;br /&gt;Double-click on the&lt;strong&gt; Fix.reg&lt;/strong&gt;. When it asks if you would like to merge the information, press the Yes button and then the OK button when it is done.&lt;/p&gt;  &lt;p&gt;Start &lt;strong&gt;HijackThis&lt;/strong&gt;. Click “Do a system scan only.” and put a checkmark next to the following items:&lt;/p&gt;  &lt;blockquote&gt;   &lt;p&gt;O2 – BHO: (no name) – {12F02779-6D88-4958-8AD3-83C12D86ADC7} – (no file)      &lt;br /&gt;O8 – Extra context menu item: &amp;amp;Search – http://edits.mywebsearch.com/toolbar…p=ZJxdm186NJUS &lt;/p&gt; &lt;/blockquote&gt;  &lt;p&gt;Now close all browser and other windows except for HijackThis, and click “Fix Checked” to have HijackThis fix the entries you checked.&lt;/p&gt;  &lt;p&gt;&lt;strong&gt;Run Avenger&lt;/strong&gt;.     &lt;br /&gt;Check the ‘Input script manually’ option. Click the Magnifying Glass icon. In the box that opens, copy,then paste the following text:&lt;/p&gt;  &lt;blockquote&gt;   &lt;p&gt;&lt;strong&gt;Files to delete:&lt;/strong&gt;       &lt;br /&gt;C:\WINDOWS\system32\dpqaqlqx.bin       &lt;br /&gt;C:\WINDOWS\system32\stfv.bin       &lt;br /&gt;C:\WINDOWS\system32\vvgeowbv.exe       &lt;br /&gt;C:\WINDOWS\system32\ace16win.dll&lt;/p&gt;    &lt;p&gt;&lt;strong&gt;Folders to delete&lt;/strong&gt;:       &lt;br /&gt;C:\WINDOWS\system32\Mz15r       &lt;br /&gt;C:\WINDOWS\PerfInfo       &lt;br /&gt;C:\WINDOWS\McAfee.com       &lt;br /&gt;C:\Program Files\LimeWire       &lt;br /&gt;C:\WINDOWS\system32\acespy&lt;/p&gt; &lt;/blockquote&gt;  &lt;p&gt;Then click on ‘&lt;strong&gt;Done&lt;/strong&gt;’.     &lt;br /&gt;Click the Traffic Light icon to start the program.     &lt;br /&gt;Then press OK at the prompts to reboot your PC.&lt;/p&gt;  &lt;p&gt;&lt;strong&gt;Run CCleaner.&lt;/strong&gt;&lt;/p&gt;  &lt;blockquote&gt;   &lt;p&gt;Click Analyze button. After scan your system, click Run Cleaner.&lt;/p&gt; &lt;/blockquote&gt;  &lt;p&gt;Reboot your PC.&lt;/p&gt;  &lt;p&gt;source:www.myantispyware.com&lt;/p&gt;  &lt;div class=&quot;wlWriterEditableSmartContent&quot; id=&quot;scid:0767317B-992E-4b12-91E0-4F059A8CECA8:0c5fba4a-5e38-42fa-95f7-4f4de6681a5d&quot; style=&quot;padding-right: 0px; display: inline; padding-left: 0px; float: none; padding-bottom: 0px; margin: 0px; padding-top: 0px&quot;&gt;Tag Technorati: {grup-tag}&lt;a href=&quot;http://technorati.com/tags/spyware&quot; rel=&quot;tag&quot;&gt;spyware&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/remove+spyware&quot; rel=&quot;tag&quot;&gt;remove spyware&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/Pcsecuritylab.com+Hijacker&quot; rel=&quot;tag&quot;&gt;Pcsecuritylab.com Hijacker&lt;/a&gt;&lt;/div&gt;  </content><link rel='replies' type='application/atom+xml' href='http://computerslearning.blogspot.com/feeds/6230048051001871755/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://computerslearning.blogspot.com/2009/08/delete-pcsecuritylabcom-hijacker.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6062689317046378893/posts/default/6230048051001871755'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6062689317046378893/posts/default/6230048051001871755'/><link rel='alternate' type='text/html' href='http://computerslearning.blogspot.com/2009/08/delete-pcsecuritylabcom-hijacker.html' title='Delete Pcsecuritylab.com Hijacker'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6062689317046378893.post-7285918176973663750</id><published>2009-07-29T03:37:00.001-07:00</published><updated>2009-07-29T03:37:02.315-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="BISNIS"/><category scheme="http://www.blogger.com/atom/ns#" term="BLOG"/><title type='text'>Earn Money by MonsterBux</title><content type='html'>&lt;blockquote&gt;   &lt;p&gt;&lt;a href=&quot;http://monsterbux.com/?r=isk22&quot; target=&quot;_blank&quot; rel=&quot;license&quot;&gt;MonsterBux.com!&lt;/a&gt;&lt;/p&gt;    &lt;p&gt;Monsterbux until now isnot SCAM ,there is many people get paid..i already signed in..Do You ? &lt;/p&gt; &lt;/blockquote&gt;  &lt;p&gt;At MonsterBux.com, you get paid to click on ads and visit websites.    &lt;br /&gt;The process is easy! You simply click a link and view a &lt;a class=&quot;zem_slink&quot; title=&quot;Website&quot; href=&quot;http://en.wikipedia.org/wiki/Website&quot; rel=&quot;wikipedia&quot;&gt;website&lt;/a&gt; for &lt;strong&gt;20&lt;/strong&gt; seconds to earn money. You can earn even more by referring friends. You&#39;ll get paid &lt;b&gt;$0.01&lt;/b&gt; for each website you personally view and &lt;b&gt;$0.005&lt;/b&gt; for each website your referrals view. Payment requests can be made every day and are processed through &lt;b&gt;&lt;a class=&quot;zem_slink&quot; title=&quot;PayPal&quot; href=&quot;http://paypal.com/&quot; rel=&quot;homepage&quot;&gt;Paypal&lt;/a&gt;&lt;/b&gt; &amp;amp; &lt;b&gt;AlertPay&lt;/b&gt;. The minimum payout is &lt;b&gt;$10.00&lt;/b&gt;. GET PAID WITHIN 24 Business Hours with our New Payment System!&lt;/p&gt;  &lt;p&gt;&lt;strong&gt;Earnings Example&lt;/strong&gt;     &lt;br /&gt;� You click 20 ads per day = $0.1     &lt;br /&gt;� 20 referrals click 10 ads per day = $1     &lt;br /&gt;� Your daily earnings = $1.1     &lt;br /&gt;� Your weekly earnings = $7.7     &lt;br /&gt;� Your monthly earnings = &lt;b&gt;&lt;u&gt;$33&lt;/u&gt;&lt;/b&gt;     &lt;br /&gt;� Your total annual earnings = &lt;b&gt;&lt;u&gt;$396&lt;/u&gt;&lt;/b&gt;&lt;/p&gt;  &lt;p&gt;The above example is based only on 20 referrals and 10 daily clicks. Some &lt;a class=&quot;zem_slink&quot; title=&quot;Day&quot; href=&quot;http://en.wikipedia.org/wiki/Day&quot; rel=&quot;wikipedia&quot;&gt;days&lt;/a&gt; you will have more clicks available, some days you will have less. What if you had more referrals? What if there were more ads available? &lt;/p&gt;  &lt;p align=&quot;center&quot;&gt;&lt;strong&gt;&lt;font size=&quot;3&quot;&gt;&lt;a href=&quot;http://monsterbux.com/?r=isk22&quot; target=&quot;_blank&quot;&gt;&lt;font size=&quot;4&quot;&gt;Join here&lt;/font&gt;&lt;/a&gt; &lt;/font&gt;&lt;/strong&gt;&lt;/p&gt;  &lt;p&gt;&lt;strong&gt;&lt;font size=&quot;3&quot;&gt;nb: please check in other forum and milist about this &lt;a class=&quot;zem_slink&quot; title=&quot;Paid To Click&quot; href=&quot;http://en.wikipedia.org/wiki/Paid_To_Click&quot; rel=&quot;wikipedia&quot;&gt;PTC&lt;/a&gt;&lt;/font&gt;&lt;/strong&gt;&lt;/p&gt;  &lt;p&gt;&lt;/p&gt;  &lt;div class=&quot;wlWriterEditableSmartContent&quot; id=&quot;scid:0767317B-992E-4b12-91E0-4F059A8CECA8:dc09773a-8a75-4e3d-8ee9-b1db598d2010&quot; style=&quot;padding-right: 0px; display: inline; padding-left: 0px; float: none; padding-bottom: 0px; margin: 0px; padding-top: 0px&quot;&gt;Tag Technorati: {grup-tag}&lt;a href=&quot;http://technorati.com/tags/PTC&quot; rel=&quot;tag&quot;&gt;PTC&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/Paid+to+click&quot; rel=&quot;tag&quot;&gt;Paid to click&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/how+get+money+from+internet&quot; rel=&quot;tag&quot;&gt;how get money from internet&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/is+Monsterbux+scam+%3f&quot; rel=&quot;tag&quot;&gt;is Monsterbux scam ?&lt;/a&gt;&lt;/div&gt;  &lt;p&gt;&lt;/p&gt;  &lt;p&gt;&lt;/p&gt;  &lt;p&gt;&lt;/p&gt;  &lt;p&gt;&lt;/p&gt;  &lt;p&gt;&lt;/p&gt;  &lt;div class=&quot;zemanta-pixie&quot; style=&quot;margin-top: 10px; height: 15px&quot;&gt;&lt;a class=&quot;zemanta-pixie-a&quot; title=&quot;Reblog this post [with Zemanta]&quot; href=&quot;http://reblog.zemanta.com/zemified/86b36d8d-4d96-4fd0-ab7d-a8e834729feb/&quot;&gt;&lt;img class=&quot;zemanta-pixie-img&quot; style=&quot;border-right: medium none; border-top: medium none; float: right; border-left: medium none; border-bottom: medium none&quot; alt=&quot;Reblog this post [with Zemanta]&quot; src=&quot;http://img.zemanta.com/reblog_e.png?x-id=86b36d8d-4d96-4fd0-ab7d-a8e834729feb&quot; /&gt;&lt;/a&gt;&lt;/div&gt;  </content><link rel='replies' type='application/atom+xml' href='http://computerslearning.blogspot.com/feeds/7285918176973663750/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://computerslearning.blogspot.com/2009/07/earn-money-by-monsterbux.html#comment-form' title='2 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6062689317046378893/posts/default/7285918176973663750'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6062689317046378893/posts/default/7285918176973663750'/><link rel='alternate' type='text/html' href='http://computerslearning.blogspot.com/2009/07/earn-money-by-monsterbux.html' title='Earn Money by MonsterBux'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>2</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6062689317046378893.post-5890619201375444044</id><published>2009-07-17T11:00:00.001-07:00</published><updated>2009-07-17T11:00:49.993-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Hacking"/><category scheme="http://www.blogger.com/atom/ns#" term="NETWORKING"/><title type='text'>Bypass Blocked Web</title><content type='html'>&lt;p&gt;BYpass WEB FILTERING&lt;/p&gt;  &lt;p&gt;Did you had can access any web when you surfing …&lt;/p&gt;  &lt;p&gt;Lets pretend for a moment that the Internet is made up of 26 websites, A-Z. The web filter blocks your browser from accessing sites X-Z, but not sites A-W. Simply make the browser think you’re going to A-W. There are a variety of ways to do this:&lt;/p&gt;  &lt;p&gt;Proxy Servers: &lt;/p&gt;  &lt;p&gt;This is a list of http proxies. These sites may not be up forever, so you may need to search for “free http proxy” or “public proxy servers” or other similar terms.&lt;/p&gt;  &lt;p&gt;Proxy server lists:&lt;/p&gt;  &lt;ol&gt;   &lt;li&gt; http://www.aliveproxy.com&lt;/li&gt;    &lt;li&gt; http://www.multiproxy.org&lt;/li&gt;    &lt;li&gt; http://www.publicproxyservers.com/index.html&lt;/li&gt;    &lt;li&gt; http://www.tehbox.com/proxy&lt;/li&gt;    &lt;li&gt; http://www.proxz.com&lt;/li&gt;    &lt;li&gt; http://www.proxy4free.com/index.html&lt;/li&gt;    &lt;li&gt; http://free-proxies.com&lt;/li&gt; &lt;/ol&gt;  &lt;p&gt;Now that you have a list of proxies, you would open IE (internet explorer) and click on &lt;strong&gt;Tools &amp;gt; Internet Options &amp;gt; Connections &amp;gt; LAN Settings &amp;gt;&lt;/strong&gt; Advanced. Enter the address and port of one of the servers from the list in the proper area (http) and make sure the “use a proxy server for your LAN” option is selected. Remember to replace the proxy and port at your terminal to the original when you&#39;re done.&lt;/p&gt;  &lt;p&gt;*Note: Some proxies listed may not work, and this method may decrease your surfing speed. By trying various entries, you’ll find one that works, or works faster.&lt;/p&gt;  &lt;p&gt;The infamous translation trick:&lt;/p&gt;  &lt;p&gt;Go to a web page translation site and use their services to “translate a page to English” thus accessing the blocked page through their trusted site.&lt;/p&gt;  &lt;p&gt;You’ll notice that several translation sites are blocked, but by using less popular ones, this method can still be effective. Here is a list of some translation services. Again, these sites may not be up forever, so you may need to search for them.&lt;/p&gt;  &lt;ol&gt;   &lt;li&gt; http://babelfish.altavista.com&lt;/li&gt;    &lt;li&gt; http://world.altavista.com&lt;/li&gt;    &lt;li&gt; http://translation.langenberg.com&lt;/li&gt;    &lt;li&gt; http://freetranslation.com/web.thm&lt;/li&gt; &lt;/ol&gt;  &lt;p&gt;Url Scripting:&lt;/p&gt;  &lt;p&gt;Url scripting is the easiest method. It works on a select few web filters and is based on the same principal as the translation trick. By typing and address like “www.yahoo.com@www.restricted_site.com the filter will not go into effect as it recognizes the trusted site (in this case yahoo.com)&lt;/p&gt;  &lt;p&gt;Other tricks:&lt;/p&gt;  &lt;p&gt;Simply open the command prompt and type:&lt;/p&gt;  &lt;p&gt;Ping restricted.com ? restricted.com obviously being the restricted site&lt;/p&gt;  &lt;p&gt;At this point you can take down the IP address (ex. 216.109.124.73) and enter it into the browser. If access to the command prompt is also restricted, see “How to bypass restrictions to get to the command prompt.” If this article has been taken from information leak, then know that it involves anything from opening the browser, selecting view &amp;gt; source, then saving it as X.bat and opening it to opening a folder or browser and typing in the location of cmd.exe depending on the OS. I will not go into further, as this a completely different topic.&lt;/p&gt;  &lt;p&gt;Use https://restrictedsite.com as referring to it as a secured site may confuse the filter.&lt;/p&gt;  &lt;p&gt;Note: These are ancient methods that many new filters defend against, but still may be applicable in your situation. If not, a little history never hurt anyone.&lt;/p&gt;  &lt;p&gt;Web based Proxies:&lt;/p&gt;  &lt;p&gt;Another one of the easier, yet effective methods include web based proxies. These are simple in the fact that you just enter the restricted address and surf! Some of these have some restrictions, like daily usage limits, etc but you can also use another proxy (perhaps one that sucks, like a text only) to bypass their restrictions as well. Here is a list of some:&lt;/p&gt;  &lt;ol&gt;   &lt;li&gt;&lt;a href=&quot;http://proxify.com&quot;&gt;http://proxify.com&lt;/a&gt;&lt;/li&gt;    &lt;li&gt;&lt;a href=&quot;http://www.anonymizer.com/index.cgi&quot;&gt;http://www.anonymizer.com/index.cgi&lt;/a&gt;&lt;/li&gt;    &lt;li&gt;&lt;a href=&quot;http://www.guardster.com/&quot;&gt;http://www.guardster.com/&lt;/a&gt;&lt;/li&gt;    &lt;li&gt;&lt;a href=&quot;http://anonymouse.ws/anonwww.html&quot;&gt;http://anonymouse.ws/anonwww.html&lt;/a&gt;&lt;/li&gt;    &lt;li&gt;&lt;a href=&quot;http://www.the-cloak.com/login.html&quot;&gt;http://www.the-cloak.com/login.html&lt;/a&gt;&lt;/li&gt;    &lt;li&gt;&lt;a href=&quot;https://www.megaproxy.com/freesurf&quot;&gt;https://www.megaproxy.com/freesurf&lt;/a&gt;&lt;/li&gt;    &lt;li&gt;&lt;a href=&quot;http://www.anonymizer.ru&quot;&gt;http://www.anonymizer.ru&lt;/a&gt;&lt;/li&gt;    &lt;li&gt;&lt;a href=&quot;https://nadaily.com/cgi-bin/nph-proxyb.cgi&quot;&gt;https://nadaily.com/cgi-bin/nph-proxyb.cgi&lt;/a&gt;&lt;/li&gt;    &lt;li&gt;&lt;a href=&quot;http://www.userbeam.de/cgi-bin/nph-userbeam.cgi&quot;&gt;http://www.userbeam.de/cgi-bin/nph-userbeam.cgi&lt;/a&gt;&lt;/li&gt;    &lt;li&gt;&lt;a href=&quot;http://www.free2.surffreedom.com/nph-free.cgi&quot;&gt;http://www.free2.surffreedom.com/nph-free.cgi&lt;/a&gt;&lt;/li&gt; &lt;/ol&gt;  &lt;p&gt;Proxy Programs:&lt;/p&gt;  &lt;p&gt;There are many proxy programs that allow you to surf anonymously that are more or less based on the same topics we’ve covered here. I’ve added them just to cover the topic thoroughly:&lt;/p&gt;  &lt;ul&gt;   &lt;li&gt;&lt;a href=&quot;http://www.hotscripts.com/Detailed/28480.html&quot;&gt;http://www.hotscripts.com/Detailed/28480.html&lt;/a&gt;&lt;/li&gt;    &lt;li&gt;&lt;a href=&quot;http://www.inetprivacy.com/a4proxy/anonymous-grc.htm&quot;&gt;http://www.inetprivacy.com/a4proxy/anonymous-grc.htm&lt;/a&gt;&lt;/li&gt;    &lt;li&gt;&lt;a href=&quot;http://www.orangatango.com/home/index.ie.html&quot;&gt;http://www.orangatango.com/home/index.ie.html&lt;/a&gt;&lt;/li&gt;    &lt;li&gt;&lt;a href=&quot;http://www.steganos.com&quot;&gt;http://www.steganos.com&lt;/a&gt;&lt;/li&gt;    &lt;li&gt;&lt;a href=&quot;http://www.anonymization.net&quot;&gt;http://www.anonymization.net&lt;/a&gt; ? &lt;/li&gt;    &lt;li&gt;toolbar that requires admin rights to install&lt;/li&gt; &lt;/ul&gt;  &lt;p&gt;Making your own CGI proxy server:&lt;/p&gt;  &lt;p&gt;Making your own proxy server may come in handy, but I personally find that simply uploading a txt file/w a list of proxies to a free host makes for a much easier and headache free solution. If you don’t know PERL, there is code out there to help you set it up. Check out these sites for more info:&lt;/p&gt;  &lt;ul&gt;   &lt;li&gt;&lt;a href=&quot;http://httpbridge.sourceforge.net&quot;&gt;http://httpbridge.sourceforge.net&lt;/a&gt;&lt;/li&gt;    &lt;li&gt;&lt;a href=&quot;http://www.jmarshall.com/tools/cgiproxy&quot;&gt;http://www.jmarshall.com/tools/cgiproxy&lt;/a&gt;&lt;/li&gt;    &lt;li&gt;&lt;a href=&quot;http://www.manageability.org/blog/stuff/open-source-personal-proxy-servers-written-in-java/view&quot;&gt;http://www.manageability.org/blog/stuff/open-source-personal-proxy-servers-written-in-java/view&lt;/a&gt;&lt;/li&gt; &lt;/ul&gt;  &lt;p&gt;source : internet&lt;/p&gt;  </content><link rel='replies' type='application/atom+xml' href='http://computerslearning.blogspot.com/feeds/5890619201375444044/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://computerslearning.blogspot.com/2009/07/bypass-blocked-web.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6062689317046378893/posts/default/5890619201375444044'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6062689317046378893/posts/default/5890619201375444044'/><link rel='alternate' type='text/html' href='http://computerslearning.blogspot.com/2009/07/bypass-blocked-web.html' title='Bypass Blocked Web'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6062689317046378893.post-2040091018402619309</id><published>2009-07-09T00:39:00.001-07:00</published><updated>2009-07-09T00:39:47.786-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="BLOG"/><title type='text'>Multiple colomn footer for TurnOutMag Template</title><content type='html'>&lt;p&gt;Adding 4 colomn &lt;a class=&quot;zem_slink&quot; title=&quot;Page footer&quot; href=&quot;http://en.wikipedia.org/wiki/Page_footer&quot; rel=&quot;wikipedia&quot;&gt;footer&lt;/a&gt; for template TurnOutMag&lt;/p&gt;  &lt;blockquote&gt;   &lt;p align=&quot;justify&quot;&gt;Actually TurnOutMag Template is for wordpress&amp;#160; and now converted by &lt;a href=&quot;http://www.bloggertricks.com/&quot; target=&quot;_blank&quot; rel=&quot;license&quot;&gt;BloggerTrick&lt;/a&gt; so can use too in &lt;a class=&quot;zem_slink&quot; title=&quot;Blogger&quot; href=&quot;http://blogger.com/&quot; rel=&quot;homepage&quot;&gt;blogspot.com&lt;/a&gt; .&lt;/p&gt;    &lt;p&gt;The template comes with so many built in features including:      &lt;br /&gt;» Thumbnails on homepage (automatic)       &lt;br /&gt;» Two main columns on the Homepage (Mag style)       &lt;br /&gt;» Banner ad / &lt;a class=&quot;zem_slink&quot; title=&quot;AdSense&quot; href=&quot;http://www.google.com/adsense&quot; rel=&quot;homepage&quot;&gt;Adsense&lt;/a&gt; ready       &lt;br /&gt;» 468 x 60 px Banner ad on the header       &lt;br /&gt;» Three Columns       &lt;br /&gt;» Search Box       &lt;br /&gt;» &lt;a class=&quot;zem_slink&quot; title=&quot;Search engine optimization&quot; href=&quot;http://en.wikipedia.org/wiki/Search_engine_optimization&quot; rel=&quot;wikipedia&quot;&gt;SEO&lt;/a&gt; Optimized       &lt;br /&gt;» &amp;quot;Read More..&amp;quot; (automatic summarize)       &lt;br /&gt;» Featured Video&lt;/p&gt; &lt;/blockquote&gt; &lt;span class=&quot;fullpost&quot;&gt;   &lt;p&gt;But in this template not adding 4 colomn footer for this template.Only there is 2 sidebar at &lt;a class=&quot;zem_slink&quot; title=&quot;Relative direction&quot; href=&quot;http://en.wikipedia.org/wiki/Relative_direction&quot; rel=&quot;wikipedia&quot;&gt;right and left&lt;/a&gt; post.sO&amp;#160; i try to modif this one.&lt;/p&gt;    &lt;p&gt;Default if we want to add colomn footer ,we search this one..&lt;/p&gt;    &lt;p&gt;&amp;lt;div id=&#39;footer-wrapper&#39;&amp;gt;&lt;/p&gt;    &lt;p&gt;But in this template” NO”script just like it.&lt;/p&gt;    &lt;p&gt;&lt;strong&gt;Following This step carefully&lt;/strong&gt; :&lt;/p&gt;    &lt;p&gt;1.&amp;#160; Login to your &lt;a href=&quot;http://www.blogger.com/&quot; rel=&quot;license&quot;&gt;blogger&lt;/a&gt;.com&lt;/p&gt;    &lt;p&gt;2.&amp;#160; Go to “ Edit &lt;a class=&quot;zem_slink&quot; title=&quot;HTML&quot; href=&quot;http://en.wikipedia.org/wiki/HTML&quot; rel=&quot;wikipedia&quot;&gt;HTML&lt;/a&gt; “&lt;/p&gt;    &lt;p&gt;3.&amp;#160; Go and click “ Expand Widget Template ” &lt;/p&gt;    &lt;p&gt;4.&amp;#160; Before editting this template, you must backup your old template.&lt;/p&gt;    &lt;p&gt;5.&amp;#160; After that ,Go to &lt;a class=&quot;zem_slink&quot; title=&quot;Cascading Style Sheets&quot; href=&quot;http://en.wikipedia.org/wiki/Cascading_Style_Sheets&quot; rel=&quot;wikipedia&quot;&gt;CSS&lt;/a&gt; part ,and add this script&lt;/p&gt;    &lt;blockquote&gt;     &lt;p&gt;/* bottom        &lt;br /&gt;==========         &lt;br /&gt;*/ &lt;/p&gt;      &lt;p&gt;#bottom {        &lt;br /&gt;width: 975px;         &lt;br /&gt;position: relative;         &lt;br /&gt;clear:both;         &lt;br /&gt;margin: 0 auto;         &lt;br /&gt;color: #000000;         &lt;br /&gt;float: left;         &lt;br /&gt;background:#FFFFFF;         &lt;br /&gt;padding:0;         &lt;br /&gt;} &lt;/p&gt;      &lt;p&gt;#bottom_1 {        &lt;br /&gt;width: 300px;         &lt;br /&gt;float: left;         &lt;br /&gt;padding:0;         &lt;br /&gt;margin:0px 0px 0px 5px;         &lt;br /&gt;} &lt;/p&gt;      &lt;p&gt;#bottom_2 {        &lt;br /&gt;width: 150px;         &lt;br /&gt;float: left;         &lt;br /&gt;padding:0;         &lt;br /&gt;margin:0px 0px 0px 5px         &lt;br /&gt;} &lt;/p&gt;      &lt;p&gt;#bottom_3 {        &lt;br /&gt;width: 210px;         &lt;br /&gt;float: right;         &lt;br /&gt;padding:0;         &lt;br /&gt;margin:0px 0px 0px 5px         &lt;br /&gt;} &lt;/p&gt;      &lt;p&gt;#bottom_4 {        &lt;br /&gt;width: 300px;         &lt;br /&gt;float: right;         &lt;br /&gt;padding:0;         &lt;br /&gt;margin:0px 0px 0px 5px         &lt;br /&gt;}&lt;/p&gt;   &lt;/blockquote&gt;    &lt;p&gt;Or&amp;#160; put in that script before this script :&amp;#160; &lt;/p&gt;    &lt;p&gt;/** BEGIN footer **/      &lt;br /&gt;#footer {       &lt;br /&gt;&amp;#160;&amp;#160;&amp;#160; clear: both;       &lt;br /&gt;&amp;#160;&amp;#160;&amp;#160; background-color: #456069;       &lt;br /&gt;&amp;#160;&amp;#160;&amp;#160; color: #FFFFFF;       &lt;br /&gt;&amp;#160;&amp;#160;&amp;#160; font-family: Verdana;       &lt;br /&gt;&amp;#160;&amp;#160;&amp;#160; font-size: 0.9em;       &lt;br /&gt;}       &lt;br /&gt;&amp;#160;&amp;#160;&amp;#160; #footer a {       &lt;br /&gt;&amp;#160;&amp;#160;&amp;#160;&amp;#160;&amp;#160;&amp;#160;&amp;#160; color: #ffffff;       &lt;br /&gt;&amp;#160;&amp;#160;&amp;#160; }       &lt;br /&gt;&amp;#160;&amp;#160;&amp;#160; #footer p {       &lt;br /&gt;&amp;#160;&amp;#160;&amp;#160;&amp;#160;&amp;#160;&amp;#160;&amp;#160; padding: 15px 0;       &lt;br /&gt;&amp;#160;&amp;#160;&amp;#160;&amp;#160;&amp;#160;&amp;#160;&amp;#160; text-align: left;       &lt;br /&gt;&amp;#160;&amp;#160;&amp;#160;&amp;#160;&amp;#160;&amp;#160;&amp;#160; width: 975px;       &lt;br /&gt;&amp;#160;&amp;#160;&amp;#160;&amp;#160;&amp;#160;&amp;#160;&amp;#160; margin: auto auto;       &lt;br /&gt;&amp;#160;&amp;#160;&amp;#160; }       &lt;br /&gt;/** END footer **/&lt;/p&gt;    &lt;p&gt;&amp;#160;&lt;/p&gt;    &lt;p&gt;6. Find this script : &lt;/p&gt;    &lt;blockquote&gt;     &lt;p&gt;&amp;lt;!-- BEGIN footer --&amp;gt; &lt;/p&gt;      &lt;p&gt;&amp;lt;div id=&#39;footer&#39;&amp;gt;        &lt;br /&gt;&amp;#160;&amp;#160;&amp;#160; &amp;lt;p&amp;gt;Design by &amp;lt;a href=&#39;&lt;a href=&quot;http://www.wpthemedesigner.com/&#39;&quot;&gt;http://www.wpthemedesigner.com/&#39;&lt;/a&gt; target=&#39;_blank&#39;&amp;gt;ChiQ Montes&amp;lt;/a&amp;gt;. Converted to Blogger by &amp;lt;a href=&#39;&lt;a href=&quot;http://bloggertricks.com&#39;/&quot;&gt;http://bloggertricks.com&#39;&lt;/a&gt; target=&#39;_blank&#39;&amp;gt;Blogger Tricks&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;         &lt;br /&gt;&amp;lt;/div&amp;gt;         &lt;br /&gt;&amp;lt;!-- END footer –&amp;gt;&lt;/p&gt;   &lt;/blockquote&gt;    &lt;p&gt;&amp;#160;&lt;/p&gt;    &lt;p&gt;7. Put this script before &lt;strong&gt;&lt;font color=&quot;#ff00ff&quot;&gt;&amp;lt;!-- BEGIN footer --&amp;gt; &amp;lt;div id=&#39;footer&#39;&amp;gt;&lt;/font&gt;&lt;/strong&gt;&lt;/p&gt;    &lt;blockquote&gt;     &lt;p&gt;&amp;lt;div id=&#39;bottom&#39;&amp;gt; &lt;/p&gt;      &lt;p&gt;&amp;lt;b:section class=&#39;sidebar&#39; id=&#39;bottom_1&#39;/&amp;gt; &lt;/p&gt;      &lt;p&gt;&amp;lt;b:section class=&#39;sidebar&#39; id=&#39;bottom_2&#39;/&amp;gt; &lt;/p&gt;      &lt;p&gt;&amp;lt;b:section class=&#39;sidebar&#39; id=&#39;bottom_3&#39;/&amp;gt; &lt;/p&gt;      &lt;p&gt;&amp;lt;b:section class=&#39;sidebar&#39; id=&#39;bottom_4&#39;/&amp;gt; &lt;/p&gt;      &lt;p&gt;&amp;lt;/div&amp;gt;&lt;/p&gt;   &lt;/blockquote&gt;    &lt;p&gt;&amp;#160;&lt;/p&gt;    &lt;p&gt;8.&amp;#160;&amp;#160; Than preview and see to page elemen,if success you can &lt;strong&gt;SAVE&lt;/strong&gt; &lt;/p&gt;    &lt;p&gt;9.&amp;#160;&amp;#160; And if you still want to add colomn footer again before, just add below this script . &lt;/p&gt;    &lt;p&gt;&lt;strong&gt;before&lt;/strong&gt; :&lt;/p&gt;    &lt;blockquote&gt;     &lt;p&gt;&amp;lt;div id=&#39;footer&#39;&amp;gt;        &lt;br /&gt;&amp;#160;&amp;#160;&amp;#160; &amp;lt;p&amp;gt;Design by &amp;lt;a href=&#39;&lt;a href=&quot;http://www.wpthemedesigner.com/&#39;&quot;&gt;http://www.wpthemedesigner.com/&#39;&lt;/a&gt; target=&#39;_blank&#39;&amp;gt;ChiQ Montes&amp;lt;/a&amp;gt;. Converted to Blogger by &amp;lt;a href=&#39;&lt;a href=&quot;http://bloggertricks.com&#39;/&quot;&gt;http://bloggertricks.com&#39;&lt;/a&gt; target=&#39;_blank&#39;&amp;gt;Blogger Tricks&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;         &lt;br /&gt;&amp;lt;/div&amp;gt;&lt;/p&gt;   &lt;/blockquote&gt;    &lt;p&gt;&lt;strong&gt;After :&lt;/strong&gt;&lt;/p&gt;    &lt;blockquote&gt;     &lt;p&gt;&amp;lt;div id=&#39;footer&#39;&amp;gt;&lt;/p&gt;      &lt;p&gt;&lt;font color=&quot;#ff0080&quot;&gt;&lt;strong&gt;&amp;lt;b:section class=&#39;sidebar&#39; id=&#39;footer&#39; preferred=&#39;yes&#39;&amp;gt;&lt;/strong&gt;           &lt;br /&gt;&lt;/font&gt;&amp;#160;&amp;#160;&amp;#160; &amp;lt;p&amp;gt;Design by &amp;lt;a href=&#39;&lt;a href=&quot;http://www.wpthemedesigner.com/&#39;&quot;&gt;http://www.wpthemedesigner.com/&#39;&lt;/a&gt; target=&#39;_blank&#39;&amp;gt;ChiQ Montes&amp;lt;/a&amp;gt;. Converted to Blogger by &amp;lt;a href=&#39;&lt;a href=&quot;http://bloggertricks.com&#39;/&quot;&gt;http://bloggertricks.com&#39;&lt;/a&gt; target=&#39;_blank&#39;&amp;gt;Blogger Tricks&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;         &lt;br /&gt;&amp;lt;/div&amp;gt;&lt;/p&gt;   &lt;/blockquote&gt;    &lt;p&gt;10.&amp;#160; Done …Good luck…please leave your comment please..i need &lt;/p&gt;    &lt;p&gt;your opinion or your suggest…&amp;#160; &lt;/p&gt;    &lt;div class=&quot;wlWriterEditableSmartContent&quot; id=&quot;scid:0767317B-992E-4b12-91E0-4F059A8CECA8:b1717050-9c19-4baa-ab06-9bde1a341cde&quot; style=&quot;padding-right: 0px; display: inline; padding-left: 0px; float: none; padding-bottom: 0px; margin: 0px; padding-top: 0px&quot;&gt;Tag Technorati: {grup-tag}&lt;a href=&quot;http://technorati.com/tags/footer+TurnOutMag&quot; rel=&quot;tag&quot;&gt;footer TurnOutMag&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/change+template+TurnOutMag&quot; rel=&quot;tag&quot;&gt;change template TurnOutMag&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/add+4+colomn+template&quot; rel=&quot;tag&quot;&gt;add 4 colomn template&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/add+colomn+footer&quot; rel=&quot;tag&quot;&gt;add colomn footer&lt;/a&gt;&lt;/div&gt;    &lt;p&gt;     &lt;br /&gt;&amp;#160;&lt;/p&gt;    &lt;p&gt;&lt;/p&gt; &lt;/span&gt;  &lt;p&gt;&lt;/p&gt;  &lt;p&gt;&lt;/p&gt;  &lt;p&gt;&lt;/p&gt;  &lt;p&gt;&lt;/p&gt;  &lt;p&gt;&lt;/p&gt;  &lt;p&gt;&lt;/p&gt;  &lt;p&gt;&lt;/p&gt;  &lt;p&gt;&lt;/p&gt;  &lt;div class=&quot;zemanta-pixie&quot; style=&quot;margin-top: 10px; height: 15px&quot;&gt;&lt;a class=&quot;zemanta-pixie-a&quot; title=&quot;Reblog this post [with Zemanta]&quot; href=&quot;http://reblog.zemanta.com/zemified/21adb2a8-6f7e-4a47-8a52-e26f27ae3c2a/&quot;&gt;&lt;img class=&quot;zemanta-pixie-img&quot; style=&quot;border-right: medium none; border-top: medium none; float: right; border-left: medium none; border-bottom: medium none&quot; alt=&quot;Reblog this post [with Zemanta]&quot; src=&quot;http://img.zemanta.com/reblog_e.png?x-id=21adb2a8-6f7e-4a47-8a52-e26f27ae3c2a&quot; /&gt;&lt;/a&gt;&lt;/div&gt;  </content><link rel='replies' type='application/atom+xml' href='http://computerslearning.blogspot.com/feeds/2040091018402619309/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://computerslearning.blogspot.com/2009/07/multiple-colomn-footer-for-turnoutmag.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6062689317046378893/posts/default/2040091018402619309'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6062689317046378893/posts/default/2040091018402619309'/><link rel='alternate' type='text/html' href='http://computerslearning.blogspot.com/2009/07/multiple-colomn-footer-for-turnoutmag.html' title='Multiple colomn footer for TurnOutMag Template'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6062689317046378893.post-4496647873403549799</id><published>2009-06-26T03:26:00.001-07:00</published><updated>2009-06-26T03:26:35.087-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Hacking"/><category scheme="http://www.blogger.com/atom/ns#" term="Tips and tricks"/><title type='text'>New Bios Attack renders AV useless</title><content type='html'>&lt;h3&gt;&amp;#160;&lt;/h3&gt;  &lt;blockquote&gt;   &lt;p&gt;Only solution may be physically removing Bios chip, say researchers&lt;/p&gt;    &lt;p&gt;A new form of attack that installs a &lt;a class=&quot;zem_slink&quot; title=&quot;Rootkit&quot; href=&quot;http://en.wikipedia.org/wiki/Rootkit&quot; rel=&quot;wikipedia&quot;&gt;rootkit&lt;/a&gt; directly onto a computer&#39;s Bios system would render &lt;a class=&quot;zem_slink&quot; title=&quot;Antivirus software&quot; href=&quot;http://en.wikipedia.org/wiki/Antivirus_software&quot; rel=&quot;wikipedia&quot;&gt;anti-virus software&lt;/a&gt; useless, researchers have warned.&lt;/p&gt; &lt;/blockquote&gt; &lt;span class=&quot;fullpost&quot;&gt;   &lt;p&gt;Alfredo Ortego and Anibal Sacco of &lt;a href=&quot;http://www.coresecurity.com/&quot; jquery1246061534046=&quot;2153&quot;&gt;Core Security Technologies&lt;/a&gt; explained that the attack is possible against almost all types of common Bios systems in use today.&lt;/p&gt;    &lt;h4&gt;Advertisement&lt;/h4&gt;    &lt;p&gt;The researchers devised a 100-line Python script that could be flashed onto the Bios to install a rootkit. Because the Bios software activates before any other program on a computer when it starts up, normal anti-virus software would be unable to detect it.&lt;/p&gt;    &lt;p&gt;&amp;quot;We tested the system on the most common types of Bios,&amp;quot; said Ortega. &amp;quot;There is the possibility that newer types of &lt;a class=&quot;zem_slink&quot; title=&quot;Extensible Firmware Interface&quot; href=&quot;http://en.wikipedia.org/wiki/Extensible_Firmware_Interface&quot; rel=&quot;wikipedia&quot;&gt;Extensible Firmware Interface&lt;/a&gt; Bios may be resistant to the attack, but more testing is needed.&amp;quot;&lt;/p&gt;    &lt;p&gt;The attack is only possible if the attacker already has full administrative control of the target &lt;a class=&quot;zem_slink&quot; title=&quot;Personal computer&quot; href=&quot;http://en.wikipedia.org/wiki/Personal_computer&quot; rel=&quot;wikipedia&quot;&gt;PC&lt;/a&gt;, but this is possible through a standard virus infection. Once that is achieved, the &lt;a class=&quot;zem_slink&quot; title=&quot;Malware&quot; href=&quot;http://en.wikipedia.org/wiki/Malware&quot; rel=&quot;wikipedia&quot;&gt;malware&lt;/a&gt; operator would be able to flash a rootkit directly onto the Bios.&lt;/p&gt;    &lt;p&gt;Even if the initial virus was detected and removed, the computer would still be under &lt;a class=&quot;zem_slink&quot; title=&quot;Remote control&quot; href=&quot;http://en.wikipedia.org/wiki/Remote_control&quot; rel=&quot;wikipedia&quot;&gt;remote control&lt;/a&gt;. A full wipe of the hard drive and complete reinstallation of the &lt;a class=&quot;zem_slink&quot; title=&quot;Operating system&quot; href=&quot;http://en.wikipedia.org/wiki/Operating_system&quot; rel=&quot;wikipedia&quot;&gt;operating system&lt;/a&gt; would not remove it, the researchers warned.&lt;/p&gt;    &lt;p&gt;If a sophisticated rootkit was put onto the Bios it could be even more difficult for an administrator to debug the system, according to Ivan Arce, chief technology officer at &lt;a class=&quot;zem_slink&quot; title=&quot;Core Security&quot; href=&quot;http://www.coresecurity.com/&quot; rel=&quot;homepage&quot;&gt;Core Security&lt;/a&gt;.&lt;/p&gt;    &lt;p&gt;&amp;quot;You would need to reflash the Bios with a system that you know has not been tampered with,&amp;quot; he said. &amp;quot;But if the rootkit is sophisticated enough it may be necessary to physically remove and replace the Bios chip.&amp;quot;&lt;/p&gt;    &lt;p&gt;The attack vector is also usable against virtual systems, the researchers said. The Bios in &lt;a class=&quot;zem_slink&quot; title=&quot;VMware&quot; href=&quot;http://www.vmware.com/&quot; rel=&quot;homepage&quot;&gt;VMware&lt;/a&gt; is embedded as a module in main VMware executable, and thus could be altered.&lt;/p&gt;    &lt;p&gt;However, it is possible to protect against this attack by locking down the Bios chip from flash updates, either physically or by password-protecting the system against unauthorised changes.&lt;/p&gt;    &lt;p&gt;&amp;quot;The best approach is preventing the virus from flashing onto the Bios,&amp;quot; said Sacco. &amp;quot;You need to prevent flashing of the bios, even if it means pulling out jumper on motherboard.&amp;quot;&lt;/p&gt;    &lt;p&gt;source:&lt;a title=&quot;http://www.v3.co.uk/vnunet/news/2239320/bios-attack-renders-antivirus&quot; href=&quot;http://www.v3.co.uk/vnunet/news/2239320/bios-attack-renders-antivirus&quot;&gt;http://www.v3.co.uk&lt;/a&gt;&lt;/p&gt;    &lt;div class=&quot;wlWriterEditableSmartContent&quot; id=&quot;scid:0767317B-992E-4b12-91E0-4F059A8CECA8:30ae9a10-250a-40fb-8ba7-554afc690d00&quot; style=&quot;padding-right: 0px; display: inline; padding-left: 0px; float: none; padding-bottom: 0px; margin: 0px; padding-top: 0px&quot;&gt;Tag Technorati: {grup-tag}&lt;a href=&quot;http://technorati.com/tags/new+bios&quot; rel=&quot;tag&quot;&gt;new bios&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/attack+bios&quot; rel=&quot;tag&quot;&gt;attack bios&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/hacking+bios&quot; rel=&quot;tag&quot;&gt;hacking bios&lt;/a&gt;&lt;/div&gt; &lt;/span&gt;  </content><link rel='replies' type='application/atom+xml' href='http://computerslearning.blogspot.com/feeds/4496647873403549799/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://computerslearning.blogspot.com/2009/06/new-bios-attack-renders-av-useless.html#comment-form' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6062689317046378893/posts/default/4496647873403549799'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6062689317046378893/posts/default/4496647873403549799'/><link rel='alternate' type='text/html' href='http://computerslearning.blogspot.com/2009/06/new-bios-attack-renders-av-useless.html' title='New Bios Attack renders AV useless'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6062689317046378893.post-1712766387951254625</id><published>2009-06-24T06:27:00.001-07:00</published><updated>2009-06-25T03:50:00.230-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Motherboard"/><category scheme="http://www.blogger.com/atom/ns#" term="Tips and tricks"/><title type='text'>Step by step update Bios</title><content type='html'>&lt;blockquote&gt;   &lt;p&gt;Following this instruction carefully !…&lt;/p&gt;    &lt;p&gt;Type 486/ Pentium / Pentium Pro etc.,ensure that upgrades are easily obtained by incorporating the system &lt;strong&gt;BIOS in a FLASH&lt;/strong&gt; Memory component. &lt;/p&gt; &lt;/blockquote&gt; &lt;span class=&quot;fullpost&quot;&gt;   &lt;p&gt;Motherboard With FLASH BIOS, there is no need to replace an &lt;strong&gt;EPROM&lt;/strong&gt; component. Once downloaded, the upgrade utility fits on a floppy disc allowing the user to save, verify and update the system BIOS. A hard drive or a network drive can also be used to run the newer upgrade utilities. However, memory managers can not be installed while upgrading. &lt;/p&gt;    &lt;p&gt;Most pre-Pentium motherboards do not have a Flash BIOS. The following instructions therefore do not apply to these boards. If your motherboard does not have a Flash BIOS (EEPROM) you will need to use an EPROM programmer to re-program the BIOS chip. See your dealer for more information about this. &lt;/p&gt;    &lt;p&gt;Please read the following instructions in full before starting a Flash BIOS upgrade:      &lt;br /&gt;&lt;strong&gt;A. Create a Bootable Floppy (in DOS) &lt;/strong&gt;&lt;/p&gt;    &lt;p&gt;&lt;strong&gt;With a non-formatted disk, type the following:&lt;/strong&gt; &lt;/p&gt;    &lt;p&gt;&amp;#160;&amp;#160;&amp;#160;&amp;#160;&amp;#160;&amp;#160;&amp;#160;&amp;#160;&amp;#160;&amp;#160;&amp;#160;&amp;#160;&amp;#160;&amp;#160; format a:/s &lt;/p&gt;    &lt;p&gt;&lt;strong&gt;If using a formatted disk&lt;/strong&gt;, type: &lt;/p&gt;    &lt;p&gt;&amp;#160;&amp;#160;&amp;#160;&amp;#160;&amp;#160;&amp;#160;&amp;#160;&amp;#160;&amp;#160;&amp;#160;&amp;#160;&amp;#160;&amp;#160;&amp;#160; sys a: &lt;/p&gt;    &lt;p&gt;This procedure will ensure a clean boot when you are flashing the new BIOS. &lt;/p&gt;    &lt;p&gt;&lt;strong&gt;B. Download the BIOS file &lt;/strong&gt;&lt;/p&gt;    &lt;p&gt;•Download the correct BIOS file by clicking on the file name of the BIOS file you wish to download. &lt;/p&gt;    &lt;p&gt;•Save the BIOS file and the Flash Utility file in the boot disk you have created. Unzip the BIOS file and the flash utility file. If you don&#39;t have an &amp;quot;unzip&amp;quot; utility, download the WinZip for Windows 95 shareware/ evaluation copy for that one time use from _www.winzip.com or _www.pkware.com. Most CD ROMs found in computer magazines, have a shareware version of WinZip on them. &lt;/p&gt;    &lt;p&gt;•You should have extracted two files: &lt;/p&gt;    &lt;p&gt;Flash BIOS utility eg: &lt;em&gt;&lt;strong&gt;flash7265.exe&lt;/strong&gt;&lt;/em&gt; (for example) &lt;/p&gt;    &lt;p&gt;BIOS eg: &lt;strong&gt;&lt;em&gt;6152J900.bin&lt;/em&gt;&lt;/strong&gt; (example) &lt;/p&gt;    &lt;p&gt;Use the latest flash utility available unless otherwise specified (either on the BIOS update page or in the archive file). This information is usually provided. &lt;/p&gt;    &lt;p&gt;&lt;strong&gt;C. Upgrade the System BIOS&lt;/strong&gt; &lt;/p&gt;    &lt;p&gt;During boot up, write down the old BIOS version because you will need to use it for the BIOS backup file name. &lt;/p&gt;    &lt;p&gt;Place the bootable floppy disk containing the BIOS file and the Flash Utility in drive a, and reboot the system in MS-DOS, preferably Version 6.22 &lt;/p&gt;    &lt;p&gt;•At the A:&amp;gt; prompt, type the corresponding Flash BIOS utility and the BIOS file with its extension. &lt;/p&gt;    &lt;p&gt;For example: &lt;/p&gt;    &lt;p&gt;flash625 615j900.bin &lt;/p&gt;    &lt;p&gt;•From the Flash Memory Writer menu, select &amp;quot;&lt;strong&gt;Y&lt;/strong&gt;&amp;quot; to &amp;quot;Do you want to save BIOS?&amp;quot; if you want to save (back up) your current BIOS (strongly recommended), then type the name of your current BIOS and its extension after FILE NAME TO SAVE: eg: a:\613J900.bin &lt;/p&gt;    &lt;p&gt;Alternatively select &amp;quot;&lt;strong&gt;N&lt;/strong&gt;&amp;quot; if you don&#39;t want to save your current BIOS. Beware, though, that you won&#39;t be able to recover from a possible failure. &lt;/p&gt;    &lt;p&gt;Select &amp;quot;&lt;strong&gt;Y&amp;quot;&lt;/strong&gt; to &amp;quot;Are you sure to program?&amp;quot; &lt;/p&gt;    &lt;p&gt;Wait until it displays &amp;quot;&lt;strong&gt;Message&lt;/strong&gt;: Power Off or Reset the system&amp;quot; &lt;/p&gt;    &lt;p&gt;Once the BIOS has been successfully loaded, remove the floppy disk and reboot the system. If you write to BIOS but cannot complete the procedure, do not switch off, because the computer will not be able to boo, and you will not be given another chance to flash. In this case leave your system on until you resolve the problem (flashing BIOS with old file is a possible solution, provided you&#39;ve made a backup before) &lt;/p&gt;    &lt;p&gt;Make sure the new BIOS version has been loaded properly by taking note of the BIOS identifier as the system is rebooting. &lt;/p&gt;    &lt;p&gt;&lt;strong&gt;For AMI BIOS&lt;/strong&gt;       &lt;br /&gt;Once the BIOS has been successfully loaded, remove the floppy disk and reboot the system holding the &amp;quot;END&amp;quot; key prior to power on until you enter CMOS setup. If you do not do this the first time booting up after upgrading the BIOS, the system will hang. &lt;/p&gt;    &lt;p&gt;&lt;strong&gt;BIOS Update Tips&lt;/strong&gt;       &lt;br /&gt;note:       &lt;br /&gt;1.&amp;#160;&amp;#160; Make sure never to turn off or reset your computer during the flash process. This will corrupt the BIOS data. We also recommend that you make a copy of your current BIOS on the bootable floppy so you can reflash it if you need to. (This option is not available when flashing an AMI BIOS). &lt;/p&gt;    &lt;p&gt;2.&amp;#160;&amp;#160; If you have problems installing your new BIOS please check the following: &lt;/p&gt;    &lt;p&gt;Have you done a clean boot?      &lt;br /&gt;In other words, did you follow the above procedure for making a bootable floppy? This ensures that when booting from &amp;quot;A&amp;quot; there are no device drivers on the diskette. Failing to do a clean boot is the most common cause for getting a &amp;quot;Memory Insufficient&amp;quot; error message when attempting to flash a BIOS. &lt;/p&gt;    &lt;p&gt;If you have not used a bootable floppy, insure a clean boot either by &lt;/p&gt;    &lt;p&gt;&lt;strong&gt;a)&lt;/strong&gt;&amp;#160; pressing F5 during bootup &lt;/p&gt;    &lt;p&gt;&lt;strong&gt;b)&lt;/strong&gt;&amp;#160; by removing all device drivers on the CONFIG.SYS including the HIMEM.SYS. Do this by using the EDIT command. &lt;/p&gt;    &lt;p&gt;&lt;strong&gt;Have you booted up under DOS?        &lt;br /&gt;&lt;/strong&gt;Booting in Windows is another common cause for getting a &amp;quot;Memory Insufficient&amp;quot; error message when attempting to flash a BIOS. Make sure to boot up to DOS with a minimum set of drivers. Important: Booting in DOS does not mean selecting &amp;quot;&lt;em&gt;Restart computer in MS-DOS&lt;/em&gt; Mode&amp;quot; from Windows 98/95 &lt;strong&gt;shutdown&lt;/strong&gt; menu or going to Prompt mode in WindowsNT, but rather following the above procedure (format&lt;strong&gt; a: /s and rebooting from a:\&lt;/strong&gt;). &lt;/p&gt;    &lt;p&gt;Have you entered the full file name of the flash utility and the BIOS plus its extension?      &lt;br /&gt;Do not forget that often you will need to add a drive letter (a:\) before flashing the BIOS. Example: when asked for file name of new BIOS file which is on your floppy disk, in case you&#39;re working from &lt;/p&gt;    &lt;p&gt;&lt;strong&gt;c:\ your will need to type a:\615j900.bin&lt;/strong&gt;, rather than 615j900.bin only.&lt;/p&gt;    &lt;p&gt;source: from other web &lt;/p&gt;    &lt;p&gt;publish again&lt;a title=&quot;http://computerslearning.blogspot.com&quot; href=&quot;http://computerslearning.blogspot.com/&quot; rel=&quot;nofollow&quot;&gt;http://computerslearning.blogspot.com/&lt;/a&gt; &lt;/p&gt;    &lt;br /&gt;&lt;/span&gt;  &lt;p&gt;&lt;/p&gt;  &lt;div class=&quot;wlWriterEditableSmartContent&quot; id=&quot;scid:0767317B-992E-4b12-91E0-4F059A8CECA8:d2d694d6-ac50-420f-b2a2-e9a6544fc5e7&quot; style=&quot;padding-right: 0px; display: inline; padding-left: 0px; float: none; padding-bottom: 0px; margin: 0px; padding-top: 0px&quot;&gt;Tag Technorati: {grup-tag}&lt;a href=&quot;http://technorati.com/tags/bios+update&quot; rel=&quot;tag&quot;&gt;bios update&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/step+by+step+update+bios&quot; rel=&quot;tag&quot;&gt;step by step update bios&lt;/a&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://computerslearning.blogspot.com/feeds/1712766387951254625/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://computerslearning.blogspot.com/2009/06/step-by-step-update-bios.html#comment-form' title='3 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6062689317046378893/posts/default/1712766387951254625'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6062689317046378893/posts/default/1712766387951254625'/><link rel='alternate' type='text/html' href='http://computerslearning.blogspot.com/2009/06/step-by-step-update-bios.html' title='Step by step update Bios'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>3</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6062689317046378893.post-2980546493349027971</id><published>2009-06-12T10:49:00.001-07:00</published><updated>2009-06-15T03:44:20.301-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Utiliti"/><title type='text'>ShortCut keyboard part3</title><content type='html'>&lt;p&gt;&lt;strong&gt;For Compatible keyboard that includes the Windows logo key and the Application key , you can use these keyboard shortcuts: &lt;/strong&gt;&lt;/p&gt;  &lt;p&gt;Display or hide the Start menu. &lt;strong&gt;WIN Key&lt;/strong&gt;    
Display the System Properties dialog box. &lt;strong&gt;WIN Key+BREAK &lt;/strong&gt;&lt;b&gt;    
&lt;/b&gt;Show the desktop. &lt;strong&gt;WIN Key+D&lt;/strong&gt;    
Minimize all windows.&lt;strong&gt; WIN Key+M &lt;/strong&gt;&lt;b&gt;    
&lt;/b&gt;Restores minimized windows. &lt;strong&gt;WIN Key+Shift+M&lt;/strong&gt; &lt;span class=&quot;fullpost&quot;&gt;    
Open My Computer. &lt;strong&gt;WIN Key+E&lt;/strong&gt;      
Search for a file or folder. &lt;strong&gt;WIN Key+F&lt;/strong&gt;      
Search for computers. &lt;strong&gt;CTRL+WIN Key+F&lt;/strong&gt;      
Display Windows Help. &lt;strong&gt;WIN Key+F1&lt;/strong&gt;      
Lock your computer if you are connected to a network domain, or switch users if you are not connected to a network domain. &lt;strong&gt;WIN Key+ L &lt;/strong&gt;&lt;b&gt;      
&lt;/b&gt;Open the Run dialog box. &lt;strong&gt;WIN Key+R&lt;/strong&gt;      
Open Utility Manager. &lt;strong&gt;WIN Key+U&lt;/strong&gt;&lt;/span&gt;    &lt;/p&gt;&lt;p&gt;&lt;strong&gt;accessibility keyboard shortcuts:&lt;/strong&gt;&lt;/p&gt;    &lt;p&gt;Switch FilterKeys on and off. &lt;strong&gt;Right SHIFT&lt;/strong&gt; for eight seconds      
Switch High Contrast on and off. &lt;strong&gt;Left ALT+left SHIFT+PRINT SCREEN&lt;/strong&gt;      
Switch MouseKeys on and off. &lt;strong&gt;Left ALT +left SHIFT +NUM LOCK&lt;/strong&gt;      
Switch StickyKeys on and off. &lt;strong&gt;SHIFT five times&lt;/strong&gt;      
Switch ToggleKeys on and off. &lt;strong&gt;NUM LOCK for five seconds&lt;/strong&gt;      
Open Utility Manager. &lt;strong&gt;WIN Key+U&lt;/strong&gt;&lt;/p&gt;    &lt;p&gt;&lt;strong&gt;shortcuts you can use with Windows Explorer:&lt;/strong&gt;&lt;/p&gt;    &lt;p&gt;Display the bottom of the active window. &lt;strong&gt;END &lt;/strong&gt;&lt;b&gt;      
&lt;/b&gt;Display the top of the active window. &lt;strong&gt;HOME &lt;/strong&gt;     
Display all subfolders under the selected folder. &lt;strong&gt;NUM&lt;/strong&gt; &lt;strong&gt;LOCK+ASTERISK&lt;/strong&gt; on numeric keypad (*)      
Display the contents of the selected folder. &lt;strong&gt;NUM LOCK+PLUS SIGN&lt;/strong&gt; on numeric keypad (+)      
Collapse the selected folder. &lt;strong&gt;NUM LOCK+MINUS SIGN&lt;/strong&gt; on numeric keypad (-)      
Collapse current selection if it&#39;s expanded, or select parent folder. &lt;strong&gt;LEFT ARROW&lt;/strong&gt;      
Display current selection if it&#39;s collapsed, or select first subfolder. &lt;strong&gt;RIGHT ARROW&lt;/strong&gt;&lt;/p&gt;    &lt;p&gt;&lt;a href=&quot;http://computerslearning.blogspot.com/&quot;&gt;http://computerslearning.blogspot.com&lt;/a&gt;&lt;/p&gt; &lt;p&gt;&lt;/p&gt;  &lt;p&gt;see&lt;/p&gt;  &lt;p&gt;&lt;a href=&quot;http://computerslearning.blogspot.com/2009/06/shortcut-keyboard-part-1.html&quot;&gt;part1&lt;/a&gt;&lt;/p&gt;  &lt;p&gt;&lt;a href=&quot;http://computerslearning.blogspot.com/2009/06/shortcut-keyboard-part2.html&quot;&gt;part2&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;http://computerslearning.blogspot.com/2009/06/shortcut-keyboard-part3.html&quot;&gt;part3&lt;/a&gt;
&lt;/p&gt;  &lt;div class=&quot;wlWriterEditableSmartContent&quot; id=&quot;scid:0767317B-992E-4b12-91E0-4F059A8CECA8:e2f3e718-4577-4faf-833a-0987a5d094b5&quot; style=&quot;margin: 0px; padding: 0px; display: inline; float: none;&quot;&gt;Tag Technorati: {grup-tag}&lt;a href=&quot;http://technorati.com/tags/shortcut&quot; rel=&quot;tag&quot;&gt;shortcut&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/shortcut+browser&quot; rel=&quot;tag&quot;&gt;shortcut browser&lt;/a&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://computerslearning.blogspot.com/feeds/2980546493349027971/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://computerslearning.blogspot.com/2009/06/shortcut-keyboard-part3.html#comment-form' title='2 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6062689317046378893/posts/default/2980546493349027971'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6062689317046378893/posts/default/2980546493349027971'/><link rel='alternate' type='text/html' href='http://computerslearning.blogspot.com/2009/06/shortcut-keyboard-part3.html' title='ShortCut keyboard part3'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>2</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6062689317046378893.post-144675303682070887</id><published>2009-06-12T10:25:00.001-07:00</published><updated>2009-06-15T03:29:05.906-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Utiliti"/><title type='text'>shortCut keyboard part2</title><content type='html'>&lt;p&gt;&lt;strong&gt;commands in your Run Box (Windows Key + R) or Start Run &lt;/strong&gt;&lt;/p&gt;  &lt;blockquote&gt;   &lt;p&gt;&lt;strong&gt;devmgmt.msc&lt;/strong&gt; = Device Manager      
&lt;strong&gt;msinfo32&lt;/strong&gt; = System Information      
&lt;strong&gt;cleanmgr&lt;/strong&gt; = Disk Cleanup      
&lt;strong&gt;ntbackup&lt;/strong&gt; = Backup or Restore Wizard (Windows Backup Utility)      
&lt;strong&gt;mmc &lt;/strong&gt;= Microsoft Management Console      
&lt;strong&gt;excel &lt;/strong&gt;= Microsoft Excel (If Installed)      
&lt;strong&gt;msaccess&lt;/strong&gt; = Microsoft Access (If Installed)      
&lt;strong&gt;powerpnt&lt;/strong&gt; = Microsoft PowerPoint (If Installed)      
&lt;strong&gt;winword&lt;/strong&gt; = Microsoft Word (If Installed)      
&lt;strong&gt;frontpg&lt;/strong&gt; = Microsoft FrontPage (If Installed) &lt;/p&gt; &lt;/blockquote&gt; &lt;span class=&quot;fullpost&quot;&gt;   &lt;blockquote&gt;     &lt;p&gt;      
&lt;strong&gt;notepad&lt;/strong&gt; = Notepad        
&lt;strong&gt;wordpad&lt;/strong&gt; = WordPad        
&lt;strong&gt;calc&lt;/strong&gt; = Calculator        
&lt;strong&gt;msmsgs&lt;/strong&gt; = Windows Messenger        
&lt;strong&gt;mspaint&lt;/strong&gt; = Microsoft Paint        
&lt;strong&gt;wmplayer&lt;/strong&gt; = Windows Media Player        
&lt;strong&gt;rstrui&lt;/strong&gt; = System Restore        
&lt;strong&gt;netscp6&lt;/strong&gt; = Netscape 6.x        
&lt;strong&gt;netscp&lt;/strong&gt; = Netscape 7.x        
&lt;strong&gt;netscape&lt;/strong&gt; = Netscape 4.x        
&lt;strong&gt;waol&lt;/strong&gt; = America Online        
&lt;strong&gt;control&lt;/strong&gt; = Opens the Control Panel        
&lt;strong&gt;control printers&lt;/strong&gt; = Opens the Printers Dialog &lt;/p&gt;   &lt;/blockquote&gt;    &lt;p&gt;&lt;strong&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;&lt;a href=&quot;http://computerslearning.blogspot.com/&quot; target=&quot;_blank&quot; rel=&quot;nofollow&quot;&gt;INTERNET BROWSER&lt;/a&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/p&gt;    &lt;p&gt;type in u&#39;re adress &quot;google&quot;, then press [Right CTRL] and [Enter]     
add www. and .com to word and go to it &lt;/p&gt;    &lt;p&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;strong&gt;For Windows XP&lt;/strong&gt;:&lt;/span&gt; &lt;/p&gt;    &lt;blockquote&gt;     &lt;p&gt;&lt;strong&gt;Copy&lt;/strong&gt;. CTRL+C        
&lt;strong&gt;Cut&lt;/strong&gt;. CTRL+X        
&lt;strong&gt;Paste&lt;/strong&gt;. CTRL+V        
&lt;strong&gt;Undo&lt;/strong&gt;. CTRL+Z        
&lt;strong&gt;Delete&lt;/strong&gt;. DELETE        
Delete selected item permanently without placing the item in the Recycle Bin. &lt;strong&gt;SHIFT+DELETE&lt;/strong&gt;        
Copy selected item. &lt;strong&gt;CTRL &lt;/strong&gt;while dragging an item        
Create shortcut to selected item.&lt;strong&gt; CTRL+SHIFT&lt;/strong&gt; while dragging an item        
Rename selected item.&lt;strong&gt; F2&lt;/strong&gt;        
Move the insertion point to the beginning of the next word. &lt;strong&gt;CTRL+RIGHT ARROW&lt;/strong&gt;        
Move the insertion point to the beginning of the previous word. &lt;strong&gt;CTRL+LEFT ARROW&lt;/strong&gt;        
Move the insertion point to the beginning of the next paragraph. &lt;strong&gt;CTRL+DOWN ARROW&lt;/strong&gt;        
Move the insertion point to the beginning of the previous paragraph. &lt;strong&gt;CTRL+UP ARROW&lt;/strong&gt;        
Highlight a block of text. &lt;strong&gt;CTRL+SHIFT&lt;/strong&gt; with any of the arrow keys        
Select more than one item in a window or on the desktop, or select text within a document. SHIFT with any of the arrow keys        
Select all. &lt;strong&gt;CTRL+A&lt;/strong&gt;        
Search for a file or folder.&lt;strong&gt; F3&lt;/strong&gt;        
View properties for the selected item. &lt;strong&gt;ALT+ENTER&lt;/strong&gt;        
Close the active item, or quit the active program. &lt;strong&gt;ALT+F4&lt;/strong&gt;        
Opens the shortcut menu for the active window. &lt;strong&gt;ALT+SPACEBAR&lt;/strong&gt;        
Close the active document in programs that allow you to have multiple documents open simultaneously. &lt;strong&gt;CTRL+F4&lt;/strong&gt;        
Switch between open items. &lt;strong&gt;ALT+TAB&lt;/strong&gt;        
Cycle through items in the order they were opened. &lt;strong&gt;ALT+ESC&lt;/strong&gt;        
Cycle through screen elements in a window or on the desktop.&lt;strong&gt; F6         
&lt;/strong&gt;Display the Address bar list in My Computer or Windows Explorer.&lt;strong&gt; F4&lt;/strong&gt;        
Display the shortcut menu for the selected item. &lt;strong&gt;SHIFT+F10&lt;/strong&gt;        
Display the System menu for the active window. &lt;strong&gt;ALT+SPACEBAR&lt;/strong&gt;        
Display the Start menu. &lt;strong&gt;CTRL+ESC&lt;/strong&gt;        
Display the corresponding menu. &lt;strong&gt;ALT+Underlined letter&lt;/strong&gt; in a menu name        
Carry out the corresponding command. Underlined letter in a command name on an open menu        
Activate the menu bar in the active program&lt;strong&gt;. F10&lt;/strong&gt;        
Open the next menu to the right, or open a submenu. &lt;strong&gt;RIGHT ARROW&lt;/strong&gt;        
Open the next menu to the left, or close a submenu.&lt;strong&gt; LEFT ARROW&lt;/strong&gt;        
Refresh the active window. &lt;strong&gt;F5 &lt;/strong&gt;       
View the folder one level up in My Computer or Windows Explorer. &lt;strong&gt;BACKSPACE&lt;/strong&gt;        
Cancel the current task. &lt;strong&gt;ESC&lt;/strong&gt;        
&lt;strong&gt;SHIFT&lt;/strong&gt; when you insert a CD into the CD-ROM drive Prevent the CD from automatically playing. &lt;/p&gt;   &lt;/blockquote&gt;    &lt;p&gt;&lt;strong&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;FOR DIALOGS BOX&lt;/span&gt;&lt;/strong&gt;&lt;/p&gt;    &lt;blockquote&gt;     &lt;p&gt;To Press       
Move forward through tabs. &lt;strong&gt;CTRL+TAB&lt;/strong&gt;        
Move backward through tabs. &lt;strong&gt;CTRL+SHIFT+TAB&lt;/strong&gt;        
Move forward through options. &lt;strong&gt;TAB&lt;/strong&gt;        
Move backward through options. &lt;strong&gt;SHIFT+TAB&lt;/strong&gt;        
Carry out the corresponding command or select the corresponding option. &lt;strong&gt;ALT+Underlined letter&lt;/strong&gt;        
Carry out the command for the active option or button. &lt;strong&gt;ENTER&lt;/strong&gt;        
Select or clear the check box if the active option is a check box. &lt;strong&gt;SPACEBAR&lt;/strong&gt;        
Select a button if the active option is a group of option buttons. Arrow keys        
Display Help. &lt;strong&gt;F1         
&lt;/strong&gt;Display the items in the active list. &lt;strong&gt;F4         
&lt;/strong&gt;Open a folder one level up if a folder is selected in the Save As or Open dialog box. &lt;strong&gt;BACKSPACE&lt;/strong&gt; &lt;/p&gt;   &lt;/blockquote&gt;    &lt;p&gt;&lt;/p&gt;    &lt;p&gt;&lt;strong&gt;see :&lt;/strong&gt;&lt;/p&gt;    &lt;p&gt;&lt;strong&gt;part1 ,&lt;a href=&quot;http://computerslearning.blogspot.com/2009/06/shortcut-keyboard-part2.html&quot;&gt;part2&lt;/a&gt;, &lt;a href=&quot;http://computerslearning.blogspot.com/2009/06/shortcut-keyboard-part3.html&quot;&gt;part 3&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;    &lt;div class=&quot;wlWriterEditableSmartContent&quot; id=&quot;scid:0767317B-992E-4b12-91E0-4F059A8CECA8:cc4c7b7f-b904-4d1a-ae5b-9a0b6e715c63&quot; style=&quot;margin: 0px; padding: 0px; display: inline; float: none;&quot;&gt;Tag Technorati: {grup-tag}&lt;a href=&quot;http://technorati.com/tags/shortcut2&quot; rel=&quot;tag&quot;&gt;shortcut2&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/shortcut+part2&quot; rel=&quot;tag&quot;&gt;shortcut part2&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/shortcut+keyboard&quot; rel=&quot;tag&quot;&gt;shortcut keyboard&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/tips+n+trick+komputer&quot; rel=&quot;tag&quot;&gt;tips n trick komputer&lt;/a&gt;&lt;/div&gt; &lt;/span&gt;  &lt;p&gt;publish by &lt;a href=&quot;http://computerslearning.blogspot.com/&quot;&gt;http://computerslearning.blogspot.com&lt;/a&gt;&lt;/p&gt;</content><link rel='replies' type='application/atom+xml' href='http://computerslearning.blogspot.com/feeds/144675303682070887/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://computerslearning.blogspot.com/2009/06/shortcut-keyboard-part2.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6062689317046378893/posts/default/144675303682070887'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6062689317046378893/posts/default/144675303682070887'/><link rel='alternate' type='text/html' href='http://computerslearning.blogspot.com/2009/06/shortcut-keyboard-part2.html' title='shortCut keyboard part2'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6062689317046378893.post-1862029425598852539</id><published>2009-06-11T05:48:00.001-07:00</published><updated>2009-06-15T03:42:04.915-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Utiliti"/><title type='text'>SHORTCUT KEYBOARD part 1</title><content type='html'>&lt;p&gt;&lt;a href=&quot;http://computerslearning.blogspot.com/2009/06/shortcut-keyboard-part-1.html&quot;&gt;&lt;strong&gt;PART 1&lt;/strong&gt;  &lt;/a&gt;&lt;/p&gt;  &lt;p&gt;about many shortcut keyboard &lt;/p&gt;  &lt;blockquote&gt;   &lt;p&gt;&lt;strong&gt;Windows key + R&lt;/strong&gt; = Run menu &lt;/p&gt;    &lt;p&gt;&lt;strong&gt;cmd &lt;/strong&gt;= Command Prompt&lt;/p&gt;    &lt;p&gt;  
&lt;strong&gt;iexplore + &quot;web address&quot;&lt;/strong&gt; = Internet Explorer&lt;/p&gt;    &lt;p&gt;  
&lt;strong&gt;compmgmt.msc&lt;/strong&gt; = Computer Management&lt;/p&gt;    &lt;p&gt;  
&lt;strong&gt;dhcpmgmt.msc&lt;/strong&gt; = DHCP Management&lt;/p&gt;    &lt;p&gt;  
&lt;strong&gt;dnsmgmt.msc&lt;/strong&gt; = DNS Management&lt;/p&gt;    &lt;p&gt;  
&lt;strong&gt;services.msc&lt;/strong&gt; = Services&lt;/p&gt;    &lt;p&gt;  
&lt;strong&gt;eventvwr&lt;/strong&gt; = Event Viewer&lt;/p&gt;    &lt;p&gt;  
&lt;strong&gt;dsa.msc&lt;/strong&gt; = Active Directory Users and Computers&lt;/p&gt;    &lt;p&gt;  
&lt;strong&gt;dssite.msc&lt;/strong&gt; = Active Directory Sites and Services&lt;/p&gt;    &lt;p&gt;  
&lt;strong&gt;Windows key + E&lt;/strong&gt; = Explorer &lt;/p&gt; &lt;/blockquote&gt; &lt;span class=&quot;fullpost&quot;&gt; &lt;blockquote&gt;   &lt;p&gt;&lt;strong&gt;ALT + Tab&lt;/strong&gt; = Switch between windows &lt;/p&gt;    &lt;p&gt;&lt;strong&gt;ALT, Space, X&lt;/strong&gt; = Maximize window &lt;/p&gt;    &lt;p&gt;&lt;strong&gt;CTRL + Shift + Esc&lt;/strong&gt; = Task Manager &lt;/p&gt;    &lt;p&gt;&lt;strong&gt;Windows key + Break&lt;/strong&gt; = System properties &lt;/p&gt;    &lt;p&gt;&lt;strong&gt;Windows key + F&lt;/strong&gt; = Search &lt;/p&gt;    &lt;p&gt;&lt;strong&gt;Windows key + D&lt;/strong&gt; = Hide/Display all windows &lt;/p&gt;    &lt;p&gt;&lt;strong&gt;CTRL + C&lt;/strong&gt; = copy &lt;/p&gt;    &lt;p&gt;&lt;strong&gt;CTRL + X&lt;/strong&gt; = cut &lt;/p&gt;    &lt;p&gt;&lt;strong&gt;CTRL + V&lt;/strong&gt; = paste &lt;/p&gt;    &lt;p&gt;&lt;strong&gt;[Alt] and [Esc]&lt;/strong&gt; Switch between running applications &lt;/p&gt;    &lt;p&gt;&lt;strong&gt;[Alt] and letter&lt;/strong&gt; Select menu item by underlined letter &lt;/p&gt;    &lt;p&gt;&lt;strong&gt;[Ctrl] and [Esc&lt;/strong&gt;] Open Program Menu &lt;/p&gt;    &lt;p&gt;&lt;strong&gt;[Ctrl] and [F4]&lt;/strong&gt; Close active document or group windows (does not work with some applications) &lt;/p&gt;    &lt;p&gt;&lt;strong&gt;[Alt] and [F4]&lt;/strong&gt; Quit active application or close current window &lt;/p&gt;    &lt;p&gt;&lt;strong&gt;[Alt] and [-]&lt;/strong&gt; Open Control menu for active document &lt;/p&gt;    &lt;p&gt;&lt;strong&gt;Ctrl] Lft., Rt. arrow&lt;/strong&gt; Move cursor forward or back one word &lt;/p&gt;    &lt;p&gt;&lt;strong&gt;Ctrl] Up, Down arrow&lt;/strong&gt; Move cursor forward or back one paragraph &lt;/p&gt;    &lt;p&gt;&lt;strong&gt;[F1]&lt;/strong&gt; Open Help for active application &lt;/p&gt;    &lt;p&gt;&lt;strong&gt;Windows+M&lt;/strong&gt; Minimize all open windows &lt;/p&gt;    &lt;p&gt;&lt;strong&gt;Shift+Windows+M&lt;/strong&gt; Undo minimize all open windows &lt;/p&gt;    &lt;p&gt;&lt;strong&gt;Windows+F1&lt;/strong&gt; Open Windows Help &lt;/p&gt;    &lt;p&gt;&lt;strong&gt;Windows+Tab&lt;/strong&gt; Cycle through the Taskbar buttons &lt;/p&gt;    &lt;p&gt;&lt;strong&gt;Windows+Break&lt;/strong&gt; Open the System Properties dialog box &lt;/p&gt; &lt;/blockquote&gt;  &lt;p&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;&lt;u&gt;&lt;strong&gt;Acessability shortcuts&lt;/strong&gt;&lt;/u&gt; &lt;/span&gt;&lt;/p&gt;  &lt;blockquote&gt;   &lt;p&gt;&lt;strong&gt;Right SHIFT for eight seconds&lt;/strong&gt;........ Switch FilterKeys on and off. &lt;/p&gt;    &lt;p&gt;&lt;strong&gt;Left ALT +left SHIFT +PRINT SCREEN&lt;/strong&gt;....... Switch High Contrast on and off. &lt;/p&gt;    &lt;p&gt;&lt;strong&gt;Left ALT +left SHIFT +NUM LOCK&lt;/strong&gt;....... Switch MouseKeys on and off. &lt;/p&gt;    &lt;p&gt;&lt;strong&gt;SHIFT&lt;/strong&gt;....... five times Switch StickyKeys on and off. &lt;/p&gt;    &lt;p&gt;&lt;strong&gt;NUM LOCK&lt;/strong&gt;...... for five seconds Switch ToggleKeys on and off. &lt;/p&gt; &lt;/blockquote&gt;  &lt;p&gt;&lt;u&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;&lt;strong&gt;EXPLORER shortcuts&lt;/strong&gt; &lt;/span&gt;&lt;/u&gt;&lt;/p&gt;  &lt;blockquote&gt;   &lt;p&gt;&lt;strong&gt;END&lt;/strong&gt;....... Display the bottom of the active window. &lt;/p&gt;    &lt;p&gt;&lt;strong&gt;HOME&lt;/strong&gt;....... Display the top of the active window. &lt;/p&gt;    &lt;p&gt;&lt;strong&gt;NUM LOCK+ASTERISK&lt;/strong&gt;....... on numeric keypad (*) Display all subfolders under the selected folder. &lt;/p&gt;    &lt;p&gt;&lt;strong&gt;NUM LOCK+PLUS SIGN&lt;/strong&gt;....... on numeric keypad (+) Display the contents of the selected folder. &lt;/p&gt;    &lt;p&gt;&lt;strong&gt;NUM LOCK+MINUS SIGN&lt;/strong&gt;....... on numeric keypad (-) Collapse the selected folder. &lt;/p&gt;    &lt;p&gt;&lt;strong&gt;LEFT ARROW&lt;/strong&gt;...... Collapse current selection if it&#39;s expanded, or select parent folder. &lt;/p&gt;    &lt;p&gt;&lt;strong&gt;RIGHT ARROW&lt;/strong&gt;....... Display current selection if it&#39;s collapsed, or select first subfolder. &lt;/p&gt; &lt;/blockquote&gt;&lt;/span&gt;  &lt;div class=&quot;wlWriterEditableSmartContent&quot; id=&quot;scid:0767317B-992E-4b12-91E0-4F059A8CECA8:98836eaa-402d-4cbf-bf7e-9b90ef856535&quot; style=&quot;margin: 0px; padding: 0px; display: inline; float: none;&quot;&gt;Tag Technorati: {grup-tag}&lt;a href=&quot;http://technorati.com/tags/Shortcut+keyboard&quot; rel=&quot;tag&quot;&gt;Shortcut keyboard&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/keyboard&quot; rel=&quot;tag&quot;&gt;keyboard&lt;/a&gt;&lt;/div&gt;  &lt;a href=&quot;http://computerslearning.blogspot.com/2009/06/shortcut-keyboard-part-1.html&quot;&gt;part1&lt;/a&gt;  &lt;p&gt;&lt;a href=&quot;http://computerslearning.blogspot.com/2009/06/shortcut-keyboard-part2.html&quot;&gt;PART2&lt;/a&gt;&lt;/p&gt;    &lt;a href=&quot;http://computerslearning.blogspot.com/2009/06/shortcut-keyboard-part3.html&quot;&gt;part 3&lt;/a&gt;&lt;/span&gt;</content><link rel='replies' type='application/atom+xml' href='http://computerslearning.blogspot.com/feeds/1862029425598852539/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://computerslearning.blogspot.com/2009/06/shortcut-keyboard-part-1.html#comment-form' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6062689317046378893/posts/default/1862029425598852539'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6062689317046378893/posts/default/1862029425598852539'/><link rel='alternate' type='text/html' href='http://computerslearning.blogspot.com/2009/06/shortcut-keyboard-part-1.html' title='SHORTCUT KEYBOARD part 1'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6062689317046378893.post-6066384476404668350</id><published>2009-05-12T07:58:00.001-07:00</published><updated>2009-05-12T07:58:33.640-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="ARTICLE"/><category scheme="http://www.blogger.com/atom/ns#" term="BLOG"/><title type='text'>SEOQUAKE to see DoFollow OR NOT</title><content type='html'>&lt;blockquote&gt;   &lt;p&gt;If you want to know the other site what can make our site get backlink for get PR... I Think you must try this add-on for firefox... you can see who have BACKLINK or not... Yeah the name add ons is &lt;strong&gt;&lt;a href=&quot;https://addons.mozilla.org/en-US/firefox/addon/3036&quot; target=&quot;_blank&quot;&gt;Seoquake&lt;/a&gt; &lt;/strong&gt;you can download &lt;a blockquote=&quot;blockquote&quot;&gt;&amp;lt;=&amp;quot;&amp;lt;&amp;quot;&amp;gt;href=&amp;quot;https://addons.mozilla.org/en-US/firefox/addon/3036&amp;quot; target=&amp;quot;_blank&amp;quot;&amp;gt;here&lt;/a&gt; Beginner web masters and seos will find SeoQuake useful for estimating effectiveness and competitive ability of their SEO efforts. In the hands of professional SeoQuake will become a powerful and indispensable tool for analyzing optimization and promotion level of internet web-projects. SeoQuake can be distinguished from similar projects by a wide range of parameters available for analysis, simplicity of use and also a tool for creation of custom parameters. &lt;span class=&quot;fullpost&quot;&gt;SeoQuake consists of two functional parts. The first one is SeoBar. The second part is the computation of the parameters for search results and its inclusion into search engine result pages – SERPs – for the most popular search engines. SeoBar SeoBar can be described as an additional toolbar, which shows the values of selected parameters for the page currently opened in the browser window. Set of parameters shown by SeoBar is fully customizable by user. Inclusion of parameters in SERPs After submission of the query into the search engine user is presented with SERP with search results. SeoQuake shows values of the parameters for search results under each search result shown on SERP. Set of parameters shown is fully customizable by user. Loading of parameters can be handled in two different ways – simultaneously with the loading of the SERP or after SERP loading, by user demand. Ranking of the results by selected parameter in ascending/descending order and storing results in file are available features. Parameters While having a wide range of default parameters, SeoQuake also gives users the opportunity to create their own parameters and also group them into presets and switch between these presets on the fly, during the work. General set of parameters consists of such parameters as Google PR (Google PageRank of current page), Google Index (Number of indexed pages. Google version), Google link (Number of links, pointed to the current page. Google version (Except links from concerned domain)), similar parameters for many other search engines (Yahoo, MNS, Yandex, Rambler, Baidu) and some other miscellaneous parameters. There is also a tool for creation of custom parameters at user’s disposal. These parameters can be saved and used for future research, whatever it may be. All SeoQuake parameters can be turned on/off to be shown in SeoBar or on SERPs. Miscellaneous SeoQuake submits a query to search engine every time when it needs to obtain a value for a new parameter (that is not in a cache yet), defined by this search engine. Frequent use of big amount of the parameters may lead to the ban of user’s IP address from search engine. In this case, you will need to delete cookies or change proxy server. Full description of all SeoQuake functions and parameters can be found on official site of addon: http://www.seoquake.com/index-en.php Warning! Extension is using the advertisement block in results of search engines. Please, read Privacy Policy, before install &lt;a href=&quot;http://www.seoquake.com/policy.html&quot;&gt;http://www.seoquake.com/policy.html&lt;/a&gt; &lt;/span&gt;&lt;/p&gt;    &lt;p&gt;&lt;span class=&quot;fullpost&quot;&gt;Support : Mozilla Firefox 2.0 until 3.0 &lt;/span&gt;&lt;/p&gt;    &lt;div class=&quot;wlWriterEditableSmartContent&quot; id=&quot;scid:0767317B-992E-4b12-91E0-4F059A8CECA8:a468a077-4a4d-4bec-bb23-26bd4c99e695&quot; style=&quot;padding-right: 0px; display: inline; padding-left: 0px; float: none; padding-bottom: 0px; margin: 0px; padding-top: 0px&quot;&gt;Tag Technorati: {grup-tag}&lt;a href=&quot;http://technorati.com/tags/seo&quot; rel=&quot;tag&quot;&gt;seo&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/dofollow&quot; rel=&quot;tag&quot;&gt;dofollow&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/cek+do+follow&quot; rel=&quot;tag&quot;&gt;cek do follow&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/PR&quot; rel=&quot;tag&quot;&gt;PR&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/ALEXA&quot; rel=&quot;tag&quot;&gt;ALEXA&lt;/a&gt;&lt;/div&gt;&lt;/blockquote&gt;  </content><link rel='replies' type='application/atom+xml' href='http://computerslearning.blogspot.com/feeds/6066384476404668350/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://computerslearning.blogspot.com/2009/05/seoquake-to-see-dofollow-or-not.html#comment-form' title='2 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6062689317046378893/posts/default/6066384476404668350'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6062689317046378893/posts/default/6066384476404668350'/><link rel='alternate' type='text/html' href='http://computerslearning.blogspot.com/2009/05/seoquake-to-see-dofollow-or-not.html' title='SEOQUAKE to see DoFollow OR NOT'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>2</thr:total></entry></feed>