11.24.2008

Tips for Improving Performance of Windows Vista

Some of the windows vista users often complained about the sluggish performance of their PC or laptop after installing vista. As a result, users who do not rarely use the back switch Operating system Microsoft Windows XP.

However, there are various ways to improve the performance of windows vista. One way is by short menyetting Computer Management to obtain maximum performance.

Like This, Computerfreetips, improving the performance of Vista can be done with a brief to change the default settings and setting the disk mengkatifkan Advanced Performance, because Vista has not activate.

The first step you should do is right-click My Computer on the menu, then select Manage as in the following:



The process of the next, select the Device Manager and point your cursor to the choice of disk drives. On the menu will appear SATA disk under the Disk Drive.





Right-click, select properties to appear as follows:



To improve the performance of the computer, switch settings' Enable Advanced Performance 'and click' OK 'to activate your new settings and reset Restart your PC or laptop. This step is a little more to help improve the performance of Windows Vista you.

Nevertheless there are several ways to further increase the ability of the operating system launched since 2005. Vista users who have not had the opportunity to increase the memory capacity can also use the Windows ReadyBoost contained in the package of Windows Vista. Technique is a way of the use of memory by using the memory of the USB Flash Drive to add memory.

In addition, maintenance Hardware also affect the performance of Windows Vista, with the maintenance schedule, such as hard drives Disk Cleanup and Disk Defragmenter regularly the performance of Vista can terdongkrak. And there is a good idea to reduce your programs that are not too dipentingkan and disable features that can add to the memory Vista features such as eye Candy. (Okezone)


posted by: http://www.ketok.com/index.php?news_id=2903&start=0&category_id=17&parent_id=0&arcyear=&arcmonth=

Label:

BROWSER K- NINJA

world.jpg

Yesterday afternoon I finished writing poems to try the browser through google

who are trying new things I can

and it is not suspected

I find a browser that according to my new

I had also try

the result is sufficient cool browsing through the k-ninja

may already know a lot but there is not an if

I do not know that and

there may want to try please download here

when compared with mozilla I do not think also I los

Label:

NERO 9 ULTRA edition

ipy69t1.jpg

Nero 9 is the next generation most of the world's media and entertainment, digital home, which is believed to be integrated device fine series, showing a new edge functionality that made the puncture, which enjoy a simple digital media content.

downloadfile1.gif

Label:

Intel(8) ICH8M SATA AHCI Controoler - 2829

radarsync-banner.jpgIntel(R) IF This is a single file which includes the WinTV-PVR-150 driver for the WinTV-PVR-150 and WinTV-PVR-500, the driver update, middleware, video decoder and WinTV v6 applications. This file is larger than the individual pieces, but should be easier to install since it is in one file.

About Intel Corporation”Intel pushes the boundaries of innovation so our work can make people’s lives more exciting, fulfilling, and manageable.

And our work never stops. We never stop looking for the next leap ahead—in technology, education, culture, manufacturing,

and social responsibility. And we never stop collectively delivering better solutions with greater benefits for everyone.”Contact Intel CorporationPhone:(408) 765-8080Address:2200 Mission College Blvd.

Santa Clara, CA 95054-1549 USA

Label:

11.21.2008

Most Malicious Virus

A new virus has been found, and
classified by Microsoft as
The most damage!

The new virus was found on Sunday afternoon that
and by McAfee, and have not found
vaccine for mengalahkannya.
This virus damage from the Zero Sector
hard discs, which store function
the most important information.

The virus is running as follows:
This virus automatically will
sent to all the names in the list
your address with the title "A Card
To You "(Une carte Pour Vous,
or A Card For You);
So the virtual card is opened,
virus will freeze the computer
so that users must begin
again, if you press
ALT CTRL DEL command or to
restart, the virus that will damage the Zero
Boot sector of the hard disk, so
the hard disk will be permanently damaged.


According to CNN, the virus that in some
hours are causing panic in New
York. This warning has been received
by Microsoft's own employees. Do not
e-mail with the title "A
A virtual card for you "(Une carte
Virtuelle Pour Vous or A Virtual
Card For You).

Send this message to all friends
you. I think that most of the
people, like my own, more
get a warning like this 25 times
than not at all.
CAUTION! Do not accept contacts "
pti_bout_de_ chou@hotmail.com. "This
a virus that will format the computer
you. Send this message to all
who is in the address list
you. If you do not
and one of your friends
enter in the address list,
your computer will also be affected.


posted by http://silviecantik.multiply.com
Indonesian
»
English
Translate


Label:

11.20.2008

Olimvus master v2.04 movee theatre plugin v2.03



Ease of use combined with clever functions make OLYMPUS Master 2 the perfect choice for all types of users from the beginner up to skilled users.




Label:

11.19.2008

Software Batik Fractal

How to make batik can now be learned more easily with the method of fractal batik.

Namely, make batik, with the help of a special software in the development of the motive-traditional Indonesian batik.

This unique software called JBatik. The letter 'A' taken from there the word 'Java', because the software was developed over the Java platform.

The group is the origin of Bandung, pixel People Project.

JBatik recently won a new Unesco in 2008 Award of Excellence as the 'Stamp of Approval' to ensure that their products have the highest quality at international level and the large potential to enter world markets.

Previously, the software earlier this achievement in the country with a whip award
Indonesia in the arena of ICT Awards 2008 in ketagori E-Tourism and E-CultureNancy Margried,

one pixel People Project members say, a number of obstacles they must travel before completing this software.

The main difficulty is how to connect mathematics formula with the formula-art design in a software package. "Hence to make this software must understand the art,
science and technology, "said the detikINET,
in the discussion via mobile phone.

Bill, go like this software?
No need to worry, because this software can be downloaded for free at their site, which is located in www.pxlpplproject.com. "What size about 1 Mb, but if the same source code is about 10 Mb," Nancy pungkas.

Label:

11.18.2008

More Confused

actually confused and want to write what the body are also tired because of lack of rest

am working all evening lecture course again afternoon working again

Alicante

This is my life. that should be going with the full awareness that not aware he later collide

actually there are many who want to write again but I also lazy

headaches, take the mouth, stomach hunger, the temperature feels very hot do not understand why bali feel more hot days only

what do you want to become one spot. The court may only tasty but also not. cold-cold realities it can be emotional, especially if this summer as I do so later he

I have something that looks like best is to sit silent with the thought that float

Label:

11.15.2008

Create Baground For your Flashdisk/folder

Congratulations all night
actually this is lazy to write karma did not have to write my

but after thinking long end is also possible to write about the folder baground

I love whom I have once I get bored with the name banground folder on the computer

you or you flasdisk

This was the solution

is not difficult. had impressed people easy

lakuin that you just copy the sufficient

[extshellfolderviews]
(BE098140-A513-11D0-A3A4-00C04FD706EC) = (BE098140-A513-11D0-A3A4-00C04FD706EC)
[(BE098140-A513-11D0-A3A4-00C04FD706EC)]
Atrributes = 1
Iconarea_image = Image.jpg
Iconarea_text = 01x012c071d
[. shellclassinfo]
Confirmfileop = 0

you paste in notepad

replace the word image with the name of the image that you want to make baground folder / flasdisk you continue
store with the name desktop.ini

do not forget (the image that you made baground must be in the folder that would give the baground)

if stored out does not change course folder refresh

juka still does not want to restart only komputerya

yups first only ok

he is tired

hopefully useful

Label:

Changing the status of Yahoo messenger

bored with the status of that?

tired of changing the status change?

liatkan continue to have the status of a friend who always ganta change?

was not possible by the thin you can,

whether I can make it like?

the answer can be ...

and to make it easy enough
with installing software ym8_nowplaying_v4.2

you only need to install on your computer

softwarenya download here

http://www.ziddu.com/download/950648/ym8_nowPlaying_v4.2.exe.html


after you install do not forget to restart too, can awaken you first
and click ok on the options that appear.

easy?


safe to try and do not forget to leave a koment make it ok

Label:

Camfrog Room Indonesia

yesterday, if yesterday I've already covered

This is also a far remote from seputaran yahoo I know I hobbies chating so if other people love it and we do not also strange taste.

But I will be working on the problem is camfrog
yes camfrog is one of the media chat yahoo.

I camfrog have advantages compared with yahoo messenger or yazak
yazak little investigation also eventually I

yes yazak is one of the media chat yahoo also.

I want more of it yazak googling and download it or can also copy and paste the link in


http://www.yazakpro.com/yazak/

back again soamasalah camfrog investigation.
camfrog is overweight, we can see how other people without permits to these people ..
One more:
camfrog in the memakain camfrog very much ...

camfrog download at


http://www.download.com/camfrog/?part=dl-10265538&subj=dl&tag=button

and the cool room is 18
that there are server room I think there is a 5 / 6 room anak2 indo deh

how the influx also quite easy

we tinggbal register (which turned)

Sure sign in

click on the room list

click on the family filter is off

turn off the filter family

after the finish, there is just click deh 18

and join us live


I just try to survivors of good luck just



attention:
I purposely made the link can not click directly on-going so that you make your business copy and paste stuff you huwa ka kakaaka aakakk

Label: ,

How to Create a Blog

How do I create a blog?

Like email, create an account first in the free blog providers (grantor hosting / domain free blog).

The most popular is http://www.blogger.com. You have to get a little letter-technology

can also create an account in http://www.wordpress.com and http://blogsome.com. In addition to these two's

there are many free blog providers I know you can then.

Pentunjuk follow the step-by-step when registering.
After the register / sign-ups in http://blogger.com, you can start

post / mempublish

whatever you want on my blog: from the side, poetry, short story, writing seriously until I mad.

Label:

Download Video Youtube

I downloaded the video from the youtube

is indeed in a lot of writing about this

but there was not going if I write again

so that the contents of a blog from the blank he's ashamed

many people are already very advanced even in the affairs of the video downloads

and for them adahal that easy. iyalah easy going so they can

try that it can not be a very difficult job he


This was his tisp

yea vidoe download Downloader

This is the name of the software to download vidoe of the yea

and calm, you just think you need to find a confused media playernya

dilakuain that should only install video yea Downloader's

after that you can download the video that you like

and here also have provided the media after playernya so you can directly download the video play

ow that I know how downloadnya

he is:
http you just copy the video that I downloaded n-paste the video on YouTube Downloader

then click on the download

Maybe the wrong residence drinking coffee and eating a snack he


ow the same house yesterday, I think you make-you can download directly, but must copy

I paste from the blog he

Maybe the normal variations in the leaves little ha ha ha

yups hopefully useful but not the use of disalah

do not use the video download no-no
remember the law of pornography and forno action

I though you may not agree with it but still we must accept because we

can not change the law to accept the fact that so Alicante

This he http downloadnya



http://www.download.com/3001-2071_4-10801797.html?spi=f9d452346c1bd3dd417a6c1ea2a400d9&part=dl-10647340




or if you do not want to download and install, you can download video directly through here yea

http://ytde.com/

just click directly ...

yups of the first hopefully useful to all ...

Label:

11.14.2008

Yahoo Messenger Multi Id

Multi ID set aside often to chat client yahoo.Dengan official output using Multi ID you can open a chat client is not limited to yahoo. Thus, you can log in to the world with some yahoo ID at a time. And of course you can be online and chat with your friends with several at once, although with only one computer. This is also in use in the chat room. the objective is to prevent ourselves from the booter addition, we also can enliven a room we enter.

How can you use the Multi ID?
by googling or enter the site and anti-boot the boot we can get softwarenya
but with a little editing can also register our melakukanya ...

one thing I need I add, the use of Multi ID also means that you make your connection work. If the most you can use your own Disconnect from Yahoo. So sesuaikanlah with the size of the connection you have.

This was tipsnya:

1. click start

2. select the menu run

3. type regedit

4. search menu key
[HKEY_CURRENT_USER \ Software \ Yahoo \ Pager \ Test]

5. Click the right key in the Test select New> DWORD Value

6. rename the new value # 1 with the plural

7. Right-click select modify plural

8. replace the number 0 (zero) to 2 (two)

9. Click OK and close the register

and Multy en yahoo messenger is ready for use ...



Additional:
0 plural values must not be replaced with 2, but will
10 can also be even in 1000
but if your computer charred smell I do not blame my


If there's so hopefully useful

Label: ,

yahoo invisible







This time we are still working on yahoo question again he2

I just hobbies

we often see our friends online, but that was in contact us

offline status this term is often called invisible

we also often use them to trick

orang2 that we do not want that to love our online

Hope that addres appear in the book he is offline

and there is little tips that make you want to mengintgai someone apaah he is correct or offline

only invisible.

how easy it is quite simple without the software classified or other trinket

we just have to use them with the brows

http://www.invisible-scanner.com

loadingnya completed after typing the name of the id we want to know off, or just invisible

insert column in the id here after the entry

it will come out en status of the actual ...

easy?

I try to hopefully benefit survivors.

Label: ,

11.13.2008

Download

This was a special orang2 I like the internet and was named the download / hunting files from the Internet.

good video, song, software, legal or illegal, etc.
rights rights


you live download n install a thin

I'm terinstgal 100% you only live ketikin's what you download pengan

The suitcase and a song download

I type the name of the band / or title penyanyinya players

Maybe the wrong click search ongkang2 live on the smell expect pages many options that you can download

n as long

See the link gbak can easily stay in the instruction must click tgapi business

the first copy paste kmudian Alicante

See small business folks need to process things I n the business he

so let's pemales Hwa ka akakakak kakkka


But too much so he ngomongnya

Maybe the plasticity though perhaps more ha ha ha

But he is the link

Download it's like I want it to save it in

he's the same

http://www.limeware.com/download/download.php?version=win


he is http download limeware

Label:

Edit HTML

see the sites that attract an ngiler hungry. clearly, and sometimes we have the right to see and can only hope, also asked in the heart, "when I can make the site the house eight nostalgic?" to control the web would not pause, take time. but if you know the basics of HTML, this may be a solution ... edit the HTML part by part. mean?
to see the source code of course we will see a lot of code that appear.
to make it difficult for us to know this column is a code which yes. may not be many people who learn through the HTML source code view. but this also be an alternative when viewing sites with a view apprehend and cool. point to be learned. but it was, only to see if the code from the default browser will be caused. not-yet if the site has a lot of content, the tension.
The easiest way is to use the platypus. mozilla firefox add on this to the developers who want to excavate the HTML code. if you possess basic HTML, this will certainly be easier
Do not forget to send comments

Label:

Making a Deterrent virus

Notes:
- The author is NOT responsible for the use and abuse of this article.
- Destination articles made ONLY for learning materials only.
- The use of the name, brand or logo only as REFERENCES EXEMPLARY, and only, meaning there is NOT promoting the party.
- Writer apologize when all / part of the contents of this article has been implied in other similar articles.

Main #
Now the presence of the virus makers (hereinafter abbreviated so-VM only) have created local stifling the computer user land. Can imagine from the many local virus is not a one-two that destroy data (particularly for office files; word, excel, etc ...). For the vendor's Anti Virus (hereinafter abbreviated to become only AV) of this phenomenon is the land business for their products. A NORMAN, who is now downloading the company's support of local consultants virus (VAKSIN.COM), Symantec, McAffe, NOD32, and so forth. By offering the software update definition AV fastest, most sensitive scanner engines, and the other is the secret to fishing the victims of the virus to buy and use their AV software. For the authors this is indeed their own rather burdensome considering the updated definition files or engine AV page must be through an internet connection. And how has no access at all? Consequently iyalah behind the introduction of new variants of the virus on the edges make AV already installed like 'Tiger Ompong'. If we make AV own how? with the definition of the database can be updated by us can even exchange with a friend? Can only, with the requirement would learn a few techniques pemograman.Pertama we must understand how to work a simple AV, basically have an AV software components:

1. Engine scanners, this is a major component in the AV identify a pattern of viruses. This engine can be grouped into static and dynamic. Static in this case can be called a specific pattern of certain files from a virus. Checksum is one example of this engine static. He survived in the dynamic behavior recognize the 'public' a virus. Heuristic become one example.

2. Database definition, be a reference from a virus pattern files. Engine static very dependent on this component.
3. Decompress or unpacking engines, special checks for files that terkompresi (*. avi, *. zip, etc.) or compression or packing for PE files such as UPX, Mew, etc..

Not infrequently the results of checks on suspect files virus yield false-positive and even false-negative (- false-positive means the file is considered clean by the AV thread, and false-negative means the file is 100% thread will be considered clean). All that can be caused by third-scanner got from the engine itself. Ex
in the case of Engine String example scanner (a scanner-Engine-string selection string of text file-based), when the rule applied 3 out of 5 (- when you find AV 3 from the list of categories of malicious string 5), the AV files that will provide a terindikasi thread positive. In fact file page does not cause harmful effects when running or executed. This kind of scanning errors commonly found for the files *. vbs, *. HTML, etc.. To use checksum engine is found in some local AV software. Checksum commonly used among CRC16, CRC32, MD5, etc.. Due to easy to implement. Engine is not without its own disability, work with a checksum to process byte-by-byte from a file with an algorithm particularly (- depending on the type of checksum used) so that a particular format of the file page. Example use CRC32 checksum and MD5:

* CalCrc = CRC32 (file_name_and_path)
* CalMD5 = MD5 (file_name_and_path)

But the content of the string calCrc is 7AF9E376, while for MD5nya is 529CA8050A00180790CF88B63468826A. Please note that if the virus implement routine change certain byte page virus from the body every time they use the checksum engine will be less than optimal because when 1 byte of the file changed the checksum will also change.

Let us learn to make a simple AV, which is needed:

1. Software Visual Basic 6.0

2. Pemograman little understanding of the Visual Basic 6.0
3. Sample files or clean the virus (- optional)

First #
Now we will learn to create a simple routine to:
- Selecting a file that will be checked
- Open the file in binary mode
- Processing for the byte to byte checksum

Open MS-Visual Basic 6.0 you, and make a class module and add a Form object with wonder, and CommonDialog Command Button. (CommonDialog Objects can be added by selecting Project -> Component or Ctrl-T and choose Microsoft's Common Dialog Control 6.0) Type the following code in the class module (we give the name of class module page clsCrc):

================= START HERE ====================

Private crcTable (0 to 255) As Long 'crc32

Public Function CRC32 (ByRef bArrayIn () As Byte, ByVal lLen As Long, ByVal Optional lcrc As Long = 0) As Long

'BArrayIn is a byte array from the file that read, lLen is the size or file size

As Long Dim lCurPos' Current position for the array bArrayIn Iterations
As Long Dim lTemp 'variable temp calculation results

If lLen = 0 Then Exit Function 'exit function if the file size = 0
lTemp = lcrc xor & HFFFFFFFF

For lCurPos = 0 To lLen
lTemp = (((And lTemp & HFFFFFF00) & H100) and & HFFFFFF) xor (crcTable ((lTemp and 255) xor bArrayIn (lCurPos)))
Next lCurPos

CRC32 = lTemp xor & HFFFFFFFF

End Function

Private Function BuildTable () As Boolean
Dim i As Long, x As Long, CRC As Long

Const Limit = & HEDB88320

For i = 0 To 255
CRC = i
For x = 0 to 7
And if CRC 1 Then
CRC = (((I & HFFFFFFFE CRC) 2) And & H7FFFFFFF) xor Limit
Else

CRC = ((CRC And & HFFFFFFFE) 2) And & H7FFFFFFF
End If
Next x
crcTable (i) = CRC
Next i
End Function

Private Sub Class_Initialize ()
BuildTable

End Sub

================= END HERE ====================

Then type the following code in the Command1_Click event:

================= START HERE ====================

As String Dim namaFileBuka, HasilCrc As String
Dim CCrc As New clsCrc ', being the object of a new class ClsCrc
As Long Dim calCrc
Dim tmp () As Byte 'array create the file that read

Private Sub Command1_Click ()

CommonDialog1.CancelError = True 'error when users click on the cancel CommonDialog
= CommonDialog1.DialogTitle "Read File" 'Caption commondialog

On Error Goto erorhandle 'label error handle

CommonDialog1.ShowOpen
namafilbuka = CommonDialog1.FileName
Open namafilbuka For Binary Access Read As # 1 'open the selected file with read access to the binary mode
ReDim tmp (LOF (1) - 1) As Byte 'declaration for re-arrays, Bugs Fixed # #
Get # 1, tmp ()
Close # 1

calCrc = UBound (tmp) 'retrieve the file size of the array
calCrc = CCrc.CRC32 (tmp, calCrc) 'countdown CRC

HasilCrc = Hex (calCrc) 'hexadesimal change to the format, because the results of the calculation of the CRC class is still a numeric
Text1.Text = HasilCrc 'results show
Exit Sub

erorhandle:
If Err.Number <> 32755 Then MsgBox Err.Description 'error number 32,755 are when users click on the cancel button when selecting files

================= END HERE ====================

Try to run your programs with the push above the F5 key, and then click Command1 to open the file and choose. But the program will display the CRC32nya.

Second #
The code above we can make a routine checks the files with the suspect virus between CRC32nya and compare the results of our own database of CRC. Algoritmanya is:
- Selecting a file that will be checked
- Open the file in binary mode
- Processing for the byte to byte checksum
- Open the database file
- Take the contents of the file line-by-line
- Identify checksum calculations with the checksum from the file

A database file format can be set, for instance:
- FluBurung.A = ABCDEFGH
- Diary.A = 12345678
FluBurung.A Where is the name of the virus and ABCDEFGH are Crc32nya. If we have the file format as above, then we need to read the file in sekuensial per line, and separate between the virus and Crc32nya name. In this case, which is a separator characters' = '.
Create a new module 1 (- given the name module1) and the contents of the code:

================= START HERE ====================

Public namaVirus As String, CrcVirus As String 'global variable declaration for the name of the virus and CRC Public pathExe as String' variable declarations EXE file storage location of our AV

Public Function cariDatabase (CRC As String, namaFileDB As String) As Boolean
As String Dim lineStr, tmp () As String 'variable to accommodate the contents of the file

Open namaFileDB For Input As # 1 'open the file with the input mode
Do
Line Input # 1, lineStr
tmp = Split (lineStr, "=") 'separate the contents of the file bedasarkan separator characters' ='
namaVirus tmp = (0) 'namavirus to enter the array of variables
CrcVirus tmp = (1) 'Crcvirus to enter the array of variables
If CrcVirus = CRC Then, when the CRC calculation match / match with a database
cariDatabase = True 'return value TRUE
Exit Do 'exit from the recurrence

End If
Loop Until EOF (1)
Close # 1
End Function

================= END HERE ====================

Then add 1 new item into the form, namely Command button2. and then type the following code into the listing Command2_Click event:

================= START HERE ====================
If Len (App.Path) <= 3 Then 'directory when it is the root directory

pathEXE = App.Path
Else
pathEXE = App.Path & ""
End If

CommonDialog1.CancelError = True 'error when users click on the cancel CommonDialog
= CommonDialog1.DialogTitle "Read File" 'Caption commondialog

On Error Goto erorhandle 'label error handle

CommonDialog1.ShowOpen

namafilbuka = CommonDialog1.FileName
Open namafilbuka For Binary Access Read As # 1 'open the selected file with read access to the binary mode
ReDim tmp (LOF (1) - 1) As Byte 'declaration to re-array Bugs Fixed # #
Get # 1, tmp ()
Close # 1

calCrc = UBound (tmp) 'retrieve the file size of the array
calCrc = CCrc.CRC32 (tmp, calCrc) 'countdown CRC

HasilCrc = Hex (calCrc) 'hexadesimal change to the format, because the results of the calculation of the CRC class is still a numeric
If cariDatabase (HasilCrc, pathEXE & "DB.txt") Then 'if the value is TRUE

MsgBox "The virus found:" & namaVirus' show message Box
End If
Exit Sub

erorhandle:
If Err.Number <> 32755 Then MsgBox Err.Description 'error number 32,755 are when users click on the cancel button when selecting files

================= END HERE ====================

AV simple features can be added to the feature process scanners, registry access, real-time protection (RTP) and others. To process scanner is basically the technique enumerasi all processes are running on the Operating System, and to find a location or the location of the file and make the process of scanning. Features access registry allows us to directly edit the Windows registry when access to the registry (Regedit) blocked by the virus. While the features of RTP AV enables us to run simultaneously with the Windows Explorer to mengscan directory or file that is we see or browse. For this third feature will be discussed further in the next article.

Conclusion #
No need to buy AV software is expensive to keep us from the threat of computer viruses, we can make them yourself with the features that are not less good. Indeed, there is imperfection in their own AV, but at least can be made from prevention of computer virus infection is rampant. AV software is complemented by simple engines scanners and static definition database. Not closed the possibility of AV software is improved in terms of more advanced engines scannernya.

Closing #
AV software development is simple Open-Source fully participate during the original name of the manufacturer. And a complete listing can be downloaded projects in http://www.geocities.com/emomelodicfreak/ProjekAV.zip

visit http://fikrul.co.cc/?p=35
if you want more info

Label: ,

Victoria outcry

I listen to you
Indeed, how I love yourselves
the hour feel sleepy tanpamu
all I will do the sake Haha
but why?
why!
tega why you leave me and replace me with another?
if less than all the love, pity, concern and sincerity that I give to?

I have not satisfied you have menyhakitiku?
I have not been satisfied to make it available?
beginikah caramu menghancurkanku?

I see here is going to shake the pine
Lyric is now no longer spirit
all very dark
looks like the sick cut knife
Haha amount you reply with the pain that now exist in Victoria
You love you use to destroy me


but why not
if this is indeed happy tale
I am willing, although now I'm very tortured.


I'm here let alone mourn this nasibku
I want to taste the life of this
today that all ended


Label: ,

How to lock folders

Applications folder or the software or the Lock Folder available on the internet, I better pay or free. This time we will lock the folder create folders with the Lock without using the software.
Open Notepad application that diwindows, Type Copy or Paste Text or the following script into Notepad:

@ ECHO OFF
if EXIST "MyFilesLocked" goto Warlock
if NOT EXIST MyFiles goto MDMYFILES
echo Mau Lock Folder MyFiles? (Y / N)
set / p "option =>"
%% if the option == y goto LOCK
if not choice%% y == goto END
: LOCK
ren "MyFiles" MyFilesLocked
attrib + h + s "MyFilesLocked"
cacls "MyFilesLocked" / p everyone: n / e
cls
echo MyFiles folder is locked ...
pause
goto End
: Warlock
Open the folder echo Mau MyFiles, Enter Password and press Enter ...
set / p "pass =>"
if NOT%% pass == angelica1988 goto file
cacls "MyFilesLocked" / p everyone: f / e
attrib-h-s "MyFilesLocked"
ren "MyFilesLocked" MyFiles
cls
echo Folder MyFiles Already open ...
pause
goto End
: File
The echo password!
pause
goto end
: MDMYFILES
md MyFiles
echo MyFiles folder is created
pause
: END
end

Click Select File and Save As File Name Being an ex Kunci.bat it and its Save As Type Select All Files.

Run (double click) File lock.bat that have been made, it will be automatically made a folder called "MyFiles." In this MyFiles folder where you store your data.

Next to stalemate and hide folders "MyFiles" Run the file again and will be out Kunci.bat reads: "How Lock Folder MyFiles? (Y / N)" type y to lock or n to cancel and press enter. But the folder "MyFiles" has been hidden and locked (can not be deleted, copied or rename)

If the folder is locked and you want to re-open the file again Run Kunci.bat and will be out reads: "Time to Open the folder MyFiles, Enter Password and press Enter ..." type your password and press enter.

Examples of the above is to create a folder with a name and password MyFiles is angelica1988, you can change the script above in accordance with the password you want.
Trick Lock Folder this (that can not be deleted, copied or rename) applies only in Windows 2000 and Windows XP



that would source visit click

http://fikrul.wordpress.com/2008/02/06/mengunci-folder-tanpa-software/ # comment-384

Label: