Powered by Blogger.
RSS
Showing posts with label tips and trik. Show all posts
Showing posts with label tips and trik. Show all posts

How To Secure Twitter and Your Facebook Account

Lately deprivation user name and password email accounts, social networking sites and other social media by way of fraud (phishing) gathering popularity. In fact, according to data from Symantec's Spam & Phishing Report November 2010, phishing crime up 80 percent over the previous month.

Generally, players spread links that are made in such a way that is not obvious to the recipient in various networking or social media. If the victim clicks on the link, then the perpetrator can easily steal personal data of victims, including user name and password.

Here are some tips suggested by Symantec, to avoid for a Twitter account, Facebook, or your email is not snatched by another person who is not interested.

What should be done:
- Unsubscribe from mailing list if you no longer wish to receive messages from these mailing lists.
- When signing up to receive email, also check out additional items whatever you want along with your email.
- Selection of sites strictly proper anywhere you tell us your email address.
- Do not preach your email address in cyberspace. Consider alternative options-for example, use a different email address when registering at a particular mailing list, use multiple email addresses for different purposes, or create a disposable email account.
- Follow the instructions provided by the administrator, report the spam if there is an option to do so.
- Delete all spam.
- Avoid clicking on suspicious links in emails or IM messages, because it could be connected to a fake site. Manually type the website address directly in his column in the browser more secure than believed in the link in the message.
- Ensure that the operating system is always updated with the latest updates, and use a qualified security software.

Which should not do:
- Opening an email attachment from an unknown. This attachment can infect your computer.
- Reply to spam. Usually forged email address, and reply to email spam spam spam will result in another.
- Fill out the form in a message requesting personal or financial information or passwords (passwords). Companies are not bona fide customers may ask for personal information via email. If in doubt, contact the company concerned through other mechanisms such as customer contact service contacts.
- Open the message spam.
- Buying products or services from spam messages.
- Forward any virus warnings you receive via email. It may be that this is a hoax (hoax).
READ MORE - How To Secure Twitter and Your Facebook Account

  • Digg
  • Del.icio.us
  • StumbleUpon
  • Reddit
  • RSS

How to Deleting Files That Could Not Removed

You are trying to uninstall an application and after conducting the process there are still remaining files, you try to delete it and it turns out the file can not be removed, windows gives an error message stating that the file is still being used by the system


What should be done, we can restart the computer and then load the dos mode, and delete them, but it is taking too long, these reviews you may be able to make another solution for this problem

Click Start -> Run, then type taskmgr and hit enter, after the Windows Task Manager appears look for explorer.exe and select it, then press the End Process



Then go into dos mode, by clicking the Start menu -> Run, type cmd then enter, look for files to be deleted, how to delete a file in dos mode, say the files are deleted terlatak on drive C: in the MyData folder with the file name filetemp . exe, then the way he is:

- Type cd \ press enter
- Typing cd mydata press enter
- Type del filetemp.exe press enter
- Type exit

You are now back in windows, well now we have to do is re-run explorer.exe, how:

Click Start -> Run, type taskmgr and hit enter, then click File -> New Task (Run. ..), then type expolorer.exe click OK, then Windows Explorer can be used again, good luck.
READ MORE - How to Deleting Files That Could Not Removed

  • Digg
  • Del.icio.us
  • StumbleUpon
  • Reddit
  • RSS

Protecting Confidential Data Only With Right Click

You have data or confidential files and want to send the file to another person who is entitled to receive files or data, what happens if the file falls into the wrong hands ... wahhh dangerous dong, like in the movies nih.

Perhaps the following ways can help you in securing the data or files that are confidential, so that if falls into the wrong hands you do not need to worry, because the file could not be read or used, let's follow the review

First you must download a tool that is used to encrypt and decrypt data, click here to download it.

Once you download a copy of his file to a folder, for example here I meletakkanya on drive D on the folder you sure, so the paths will be like this D: \ Confident \ EncDec.exe

The above items need to be concerned because we include additional options into the context menu, by modifying the registry, copy the script below

Windows Registry Editor Version 5.00

[HKEY_CLASSES_ROOT \ * \ shell]

[HKEY_CLASSES_ROOT \ * \ shell \ Decrypt]

[HKEY_CLASSES_ROOT \ * \ shell \ Decrypt \ Command]
@ = "D: \ \ Confident \ \ EncDec \" / d \ "\"% 1 \ ""

[HKEY_CLASSES_ROOT \ * \ shell \ Encrypt]

[HKEY_CLASSES_ROOT \ * \ shell \ Encrypt \ Command]
@ = "D: \ \ Confident \ \ EncDec \" / e \ "\"% 1 \ ""

Open notepad, click Edit -> Paste in notepad, note on pink script, you change according to the folder where you store the tools EncDec.exe

Then save it with name encdec.reg, make sure at the time to store them on the options you select Save as type All Files, then click Save

Double-click the file encdec.reg we just created to run the script in it, try opening windows explorer and select a file, then right-click context menu then on there was an additional option that is Encript and Decript, if not already appear try restarting your computer

Well now let's try, here I will try to encrypt a file that I think is the secret, say the name of the file is contained therein Rahasia.txt pin code for my ATM card, say like that then, I do encryption by right-clicking Rahasia.txt files, and select Encript, consider going to create a new file that has been encrypted with the name RahasiaEn.txt you try to open the file, right yah so we can not read it anymore, well now you can send files RahasiaEn. txt file to another person who is entitled to know the information is in the file, remember the file being sent is a file encryption

Well now how to keep people who are entitled to the file can read the files again?

People who would receive it also must have the same tools as you have and do the same steps as we discussed above, then the recipient files stay right click and select the file RahasiaEn.txt Decript, it will create a new file with RahasiaEnDe.txt name, and the file is the result of decryption can be read or at execution

The use is not limited to the text file, you can use it for other files, such as image files, executables, or any other type of file

If you liked this article, do not forget to comment dong: D

Good luck.
READ MORE - Protecting Confidential Data Only With Right Click

  • Digg
  • Del.icio.us
  • StumbleUpon
  • Reddit
  • RSS

Healthy position in front of Computer

When we use the computer and sometimes we feel tired, pain in particular section hands, or eyes feel tired, it can be caused because we are one in the set position of our limbs.
Maybe it is better we start now swap the computer or the position of our body when using a computer, especially if we use it regularly and long enough to use. How does such a healthy position? Here are some tips that we can apply:
BODY POSITION:



Body in an upright position in front of the computer and visibility between the eyes and the monitor about 45-70cm.

2. Location of position Computers



For the user's desktop computer, adjust the position of the keyboard, monitor, and mouse so that we can get a suitable position for your body as in Figure 1.

3. Use of Mouse



When using the mouse keep your wrists are in a position does not hang or lower than the mouse. Try to keep the parallel position between the wrist and the mouse. Position your fingers try to keep it straight when 'idle'.


4. Keyboard Usage




As in the use of a mouse, when using the keyboard try to keep it aligned as shown in the picture.
READ MORE - Healthy position in front of Computer

  • Digg
  • Del.icio.us
  • StumbleUpon
  • Reddit
  • RSS

Secrets of sleep snoring and tips on how to eliminate

According to reliable data, snoring suffered by one out of five adults. The cause of snoring vary. Could be due to anatomical abnormalities of the nose (septum deviation), the blockage by polyps, or allergies that causes mucus membranes swell so the patient must breathe through the mouth. Snoring can also be experienced by children, and usually due to enlarged tonsils and adenoids in the back of the nose. What is clear, it indicates the occurrence of snoring is obstruction in the respiratory tract when a person is sleeping. The sound of snoring coming from the air effort to bypass the narrowed air channel it.
As for the process, during sleep, muscle-including respiratory muscles, become more relaxed than when awake. In some people the situation is not a problem. But in some people, especially the elderly, the muscles relax making airway narrowing and lead to blockage.
The above conditions is exacerbated if the patient again in supine sleeping position, so the tongue falls back limp. So such a blockage occurs bottle neck. Vibration due to air turbulence in the soft part of the pharynx because of the negative pressure in the way of breathing during sleep that appear as snoring.
As an illustration, in the United States is estimated 10-30% of adults snore. Of that amount, 5% of U.S. residents have the habit of loud snoring during sleep indicates that there are serious health problems. Most of the 5% of the population were male sex, age over 40 years, and have excess weight.
Impaired concentration and a tendency to be forgetful is due to low quality and quantity of sleep. Behavioral changes such as irritability, angry, aggressive, suspicious, anxious, and depression often accompanies chronic sleep disorders.
Based on the above, to say the snoring is an important indication of the existence of breathing disorders during sleep.
Treatment can still be pursued. The first step of course is finding out what the cause. For that you can consult with a physician. If it is a result of the tonsils, can be treated with surgery. Meanwhile, if it's because the problem of obesity, the weight loss of 10% was to relieve your breathing during sleep. This is shown by the frequency of stoppage of breath is less and less, sleep more soundly and reduced sleepiness during the day. It is recommended that the snorer does not consume alcoholic beverages despite low levels, especially the two hours before bedtime.
Alcohol breath press center in the brain, so that the more severe snoring. Sleeping pills also result as bad as alcohol for the snorer. While drugs for relieving anxiety, headache or flu is often found to interfere with breathing during sleep.
If the stoppage of breath caused by smoking or allergies, then quit smoking or keep out allergens. If snoring is only due to the closed road pernafasa by the tongue relaxes and falls back, then adjust your sleeping position (imitate the way the Prophet slept the position of the body tilted to the right). Do not sleep on their backs because it will cause a limp tongue fall backwards.
Lately a lot to offer the products to counteract the snoring of a 'foreign drugs' such as pillows worth hundreds of thousands of drug-and swallow. Drug swallow the latter is said to be imported from the U.S., although made of natural materials, but must be careful usage.
Most importantly, you need to find the cause of snoring. Is it because of blockage of the airways due to sleeping position, or because of other things. There should also note that drugs have side effects or not.
Moreover, in taking it, need to be asked for a more effective way of life. It is said that drugs that are included in this new category of food supplement effective when consumed 30-60 minutes at bedtime. For people with weight below 55 kg, enough to swallow a pill a day. However, for a weight of 55 kg, need 2 pills a day. The impact of the pill will be visible after 14-21 days eaten. Highly recommended to stay away from fatty foods approximately 4 hours before bedtime.
So if your parents snore, does that kind of first detection of mild or severe. After that just try to look at the symptoms dab healing steps. We recommend that you consult with your doctor to obtain the best solution.
 
So ... from the statement above we can conclude that the way to reduce snoring sleep are as follows:
 
Snoring occurs because of our airway obstruction, linked by the tongue (especially in the elderly, the tongue often fell because his muscles are weak start.)
The principle is to prevent the collapse of the tongue overcome them down: - SIDE SLEEPER -
Do not use the pillow is too high in the head, if necessary, use a pillow on his shoulder, so that the position of our head a little gaze upward.
 
Hopefully useful.
READ MORE - Secrets of sleep snoring and tips on how to eliminate

  • Digg
  • Del.icio.us
  • StumbleUpon
  • Reddit
  • RSS

How to Check the Use of Identity in the Maya World

     
 To enroll in services that exist in cyberspace, each user needs to identity or who is often called user ID. This identity is usually not always be your real name, but can also use the nick (nickname) or a pseudonym.

For some, the nickname is a distinctive identity for itself, like the ID card number. For users like this, at every site he lists, he uses the same user ID. In addition to convenience, the reputation of a nick or a unique user ID can be built, in the desired direction of the owner's nickname.The problem, at this site that provides various services in number more and more. A user may have forgotten whether he had ever registered in Yahoo, Gmail, Facebook, or WordPress, for example. Rather than struggling to remember, simply use the services Usernamecheck to search anywhere you have registered.
It is very easy. Visit the site at www.usernamecheck.com Usernamecheck and enter a nick or a user ID that you normally use. So automatically, within minutes he would mention it anywhere in question nickname ever enrolled. If you believe you have never registered a user ID on a particular site, it could be other people who use them.Easy right?
Usernamecheck currently able to trace to 68 service sites for looking up the user ID that you mean.
READ MORE - How to Check the Use of Identity in the Maya World

  • Digg
  • Del.icio.us
  • StumbleUpon
  • Reddit
  • RSS

Changing Views of Opera

Are you bored with the standard view of your Opera browser is so-so alone? If you answer "Yes", just try visiting the Opera community site is located at http://my.opera.com/community/customize/skins. There are available a number of skin-skin that you can choose. Please download the skin-skin is approximately the interesting for you to use.If you do the download with another browser, just save the file to a folder that you can set yourself. Or if you want to direct, just save the downloaded file into the folder C: \ Documents and Settings \ user name \ Application Data \ Opera \ Opera \ profile \ skin. When finished downloading, close Opera and then open again.
Now, to be able to use these skins way is as follows.• Click on the Tools> Appearance ...• On the skins tab, choose Show installed skins• Click on the model you want to use skin
If you use Opera browser, it will automatically download the skin of your choice. When the download is complete, the software will automatically ask if you would use these skins. If yes, then the skin will be immediately implemented. From the menu earlier Appearance You can also download other skin-skin for Opera. The trick is:
• Click on Find more skins• Select the skin you want to use, then click Download
The download will soon walk, when you're done, click Yes if you want to directly apply these skins.
READ MORE - Changing Views of Opera

  • Digg
  • Del.icio.us
  • StumbleUpon
  • Reddit
  • RSS