12.01.2008

soundtrack film cartoon jaman bahela

Setdah ,,, bener2 bingung mo mulai dari mana tuk jelasin postingan ini yang pasti postingan ini penulis buat karna request dari visitor yg jga teman penulis,, yg meminta untuk dipostingkan lagu2 soundtrack film cartoon lama, atau biasa penulis sebut film jaman bahela.

Mungkin ada sebagian pembaca yang masih ingat dengan film seperti megalomen, polimar, gavan, dan sejenisnya yang merupakan film kartun. Dan pada saat itu blm di putarkan di televisi,, maklum aja tv komersil baru ada di era 1990 an yaitu RCTI sebagai Program Televisi pertama. Sedangkan film - film ini beredar tahun 80 an.

Jadi deh nontonnya pake video yang saat itu pun masih menjadi sebuah barang yang sangat mewah dan masih jarang yang memiliki video kcuali tajir kondisi ini dimanfaatkan para pemilik video. Jadi yang mau nonton harus bayar dulu istilahnya sih bioskop kecil - kecilan.

Ternyata penggemar film - film tersebut masih banyak dan telah memiliki komunitas dengan sebutan Tokusatsu dan film - film kartun jadul tersebut banyak dicari, dan jadi obyek bisnis. Seperti pada website yang diberi nama TOKUSATSU Online Shop yang menjual berbagai jenis judul film kartun seperti ultraman, megalomen, kamen rider, dsb.

Dan untuk sedikit mengingat masa kecil, sekaligus sebagai penutup postingan ini, penulis mempersilahkan pembaca untuk mendowload lagu - lagu soundtrack film yang termasuk jadul tersebut secara gratis,, dan selamat bernostalgia


Selamat Download

Download Ost Gaban
Download Ost He Man
Download Ost Polimar
Download Ost Megalomen
Download Ost Popeye ( old version )
Download Ost Dragonball ( Romantic Version )
Download Ost Spiderman Original Version 1967
Download Ost Flinstone
Download Ost The Simpsons



posted by http://justice-seeker.blogspot.com

Label:

11.24.2008

Tips for Improving Performance of Windows Vista

Some of the windows vista users often complained about the sluggish performance of their PC or laptop after installing vista. As a result, users who do not rarely use the back switch Operating system Microsoft Windows XP.

However, there are various ways to improve the performance of windows vista. One way is by short menyetting Computer Management to obtain maximum performance.

Like This, Computerfreetips, improving the performance of Vista can be done with a brief to change the default settings and setting the disk mengkatifkan Advanced Performance, because Vista has not activate.

The first step you should do is right-click My Computer on the menu, then select Manage as in the following:



The process of the next, select the Device Manager and point your cursor to the choice of disk drives. On the menu will appear SATA disk under the Disk Drive.





Right-click, select properties to appear as follows:



To improve the performance of the computer, switch settings' Enable Advanced Performance 'and click' OK 'to activate your new settings and reset Restart your PC or laptop. This step is a little more to help improve the performance of Windows Vista you.

Nevertheless there are several ways to further increase the ability of the operating system launched since 2005. Vista users who have not had the opportunity to increase the memory capacity can also use the Windows ReadyBoost contained in the package of Windows Vista. Technique is a way of the use of memory by using the memory of the USB Flash Drive to add memory.

In addition, maintenance Hardware also affect the performance of Windows Vista, with the maintenance schedule, such as hard drives Disk Cleanup and Disk Defragmenter regularly the performance of Vista can terdongkrak. And there is a good idea to reduce your programs that are not too dipentingkan and disable features that can add to the memory Vista features such as eye Candy. (Okezone)


posted by: http://www.ketok.com/index.php?news_id=2903&start=0&category_id=17&parent_id=0&arcyear=&arcmonth=

Label:

NERO 9 ULTRA edition

ipy69t1.jpg

Nero 9 is the next generation most of the world's media and entertainment, digital home, which is believed to be integrated device fine series, showing a new edge functionality that made the puncture, which enjoy a simple digital media content.

downloadfile1.gif

Label:

Intel(8) ICH8M SATA AHCI Controoler - 2829

radarsync-banner.jpgIntel(R) IF This is a single file which includes the WinTV-PVR-150 driver for the WinTV-PVR-150 and WinTV-PVR-500, the driver update, middleware, video decoder and WinTV v6 applications. This file is larger than the individual pieces, but should be easier to install since it is in one file.

About Intel Corporation”Intel pushes the boundaries of innovation so our work can make people’s lives more exciting, fulfilling, and manageable.

And our work never stops. We never stop looking for the next leap ahead—in technology, education, culture, manufacturing,

and social responsibility. And we never stop collectively delivering better solutions with greater benefits for everyone.”Contact Intel CorporationPhone:(408) 765-8080Address:2200 Mission College Blvd.

Santa Clara, CA 95054-1549 USA

Label:

11.21.2008

Most Malicious Virus

A new virus has been found, and
classified by Microsoft as
The most damage!

The new virus was found on Sunday afternoon that
and by McAfee, and have not found
vaccine for mengalahkannya.
This virus damage from the Zero Sector
hard discs, which store function
the most important information.

The virus is running as follows:
This virus automatically will
sent to all the names in the list
your address with the title "A Card
To You "(Une carte Pour Vous,
or A Card For You);
So the virtual card is opened,
virus will freeze the computer
so that users must begin
again, if you press
ALT CTRL DEL command or to
restart, the virus that will damage the Zero
Boot sector of the hard disk, so
the hard disk will be permanently damaged.


According to CNN, the virus that in some
hours are causing panic in New
York. This warning has been received
by Microsoft's own employees. Do not
e-mail with the title "A
A virtual card for you "(Une carte
Virtuelle Pour Vous or A Virtual
Card For You).

Send this message to all friends
you. I think that most of the
people, like my own, more
get a warning like this 25 times
than not at all.
CAUTION! Do not accept contacts "
pti_bout_de_ chou@hotmail.com. "This
a virus that will format the computer
you. Send this message to all
who is in the address list
you. If you do not
and one of your friends
enter in the address list,
your computer will also be affected.


posted by http://silviecantik.multiply.com
Indonesian
»
English
Translate


Label:

11.20.2008

Olimvus master v2.04 movee theatre plugin v2.03



Ease of use combined with clever functions make OLYMPUS Master 2 the perfect choice for all types of users from the beginner up to skilled users.




Label:

11.15.2008

How to Create a Blog

How do I create a blog?

Like email, create an account first in the free blog providers (grantor hosting / domain free blog).

The most popular is http://www.blogger.com. You have to get a little letter-technology

can also create an account in http://www.wordpress.com and http://blogsome.com. In addition to these two's

there are many free blog providers I know you can then.

Pentunjuk follow the step-by-step when registering.
After the register / sign-ups in http://blogger.com, you can start

post / mempublish

whatever you want on my blog: from the side, poetry, short story, writing seriously until I mad.

Label:

11.13.2008

Edit HTML

see the sites that attract an ngiler hungry. clearly, and sometimes we have the right to see and can only hope, also asked in the heart, "when I can make the site the house eight nostalgic?" to control the web would not pause, take time. but if you know the basics of HTML, this may be a solution ... edit the HTML part by part. mean?
to see the source code of course we will see a lot of code that appear.
to make it difficult for us to know this column is a code which yes. may not be many people who learn through the HTML source code view. but this also be an alternative when viewing sites with a view apprehend and cool. point to be learned. but it was, only to see if the code from the default browser will be caused. not-yet if the site has a lot of content, the tension.
The easiest way is to use the platypus. mozilla firefox add on this to the developers who want to excavate the HTML code. if you possess basic HTML, this will certainly be easier
Do not forget to send comments

Label:

Making a Deterrent virus

Notes:
- The author is NOT responsible for the use and abuse of this article.
- Destination articles made ONLY for learning materials only.
- The use of the name, brand or logo only as REFERENCES EXEMPLARY, and only, meaning there is NOT promoting the party.
- Writer apologize when all / part of the contents of this article has been implied in other similar articles.

Main #
Now the presence of the virus makers (hereinafter abbreviated so-VM only) have created local stifling the computer user land. Can imagine from the many local virus is not a one-two that destroy data (particularly for office files; word, excel, etc ...). For the vendor's Anti Virus (hereinafter abbreviated to become only AV) of this phenomenon is the land business for their products. A NORMAN, who is now downloading the company's support of local consultants virus (VAKSIN.COM), Symantec, McAffe, NOD32, and so forth. By offering the software update definition AV fastest, most sensitive scanner engines, and the other is the secret to fishing the victims of the virus to buy and use their AV software. For the authors this is indeed their own rather burdensome considering the updated definition files or engine AV page must be through an internet connection. And how has no access at all? Consequently iyalah behind the introduction of new variants of the virus on the edges make AV already installed like 'Tiger Ompong'. If we make AV own how? with the definition of the database can be updated by us can even exchange with a friend? Can only, with the requirement would learn a few techniques pemograman.Pertama we must understand how to work a simple AV, basically have an AV software components:

1. Engine scanners, this is a major component in the AV identify a pattern of viruses. This engine can be grouped into static and dynamic. Static in this case can be called a specific pattern of certain files from a virus. Checksum is one example of this engine static. He survived in the dynamic behavior recognize the 'public' a virus. Heuristic become one example.

2. Database definition, be a reference from a virus pattern files. Engine static very dependent on this component.
3. Decompress or unpacking engines, special checks for files that terkompresi (*. avi, *. zip, etc.) or compression or packing for PE files such as UPX, Mew, etc..

Not infrequently the results of checks on suspect files virus yield false-positive and even false-negative (- false-positive means the file is considered clean by the AV thread, and false-negative means the file is 100% thread will be considered clean). All that can be caused by third-scanner got from the engine itself. Ex
in the case of Engine String example scanner (a scanner-Engine-string selection string of text file-based), when the rule applied 3 out of 5 (- when you find AV 3 from the list of categories of malicious string 5), the AV files that will provide a terindikasi thread positive. In fact file page does not cause harmful effects when running or executed. This kind of scanning errors commonly found for the files *. vbs, *. HTML, etc.. To use checksum engine is found in some local AV software. Checksum commonly used among CRC16, CRC32, MD5, etc.. Due to easy to implement. Engine is not without its own disability, work with a checksum to process byte-by-byte from a file with an algorithm particularly (- depending on the type of checksum used) so that a particular format of the file page. Example use CRC32 checksum and MD5:

* CalCrc = CRC32 (file_name_and_path)
* CalMD5 = MD5 (file_name_and_path)

But the content of the string calCrc is 7AF9E376, while for MD5nya is 529CA8050A00180790CF88B63468826A. Please note that if the virus implement routine change certain byte page virus from the body every time they use the checksum engine will be less than optimal because when 1 byte of the file changed the checksum will also change.

Let us learn to make a simple AV, which is needed:

1. Software Visual Basic 6.0

2. Pemograman little understanding of the Visual Basic 6.0
3. Sample files or clean the virus (- optional)

First #
Now we will learn to create a simple routine to:
- Selecting a file that will be checked
- Open the file in binary mode
- Processing for the byte to byte checksum

Open MS-Visual Basic 6.0 you, and make a class module and add a Form object with wonder, and CommonDialog Command Button. (CommonDialog Objects can be added by selecting Project -> Component or Ctrl-T and choose Microsoft's Common Dialog Control 6.0) Type the following code in the class module (we give the name of class module page clsCrc):

================= START HERE ====================

Private crcTable (0 to 255) As Long 'crc32

Public Function CRC32 (ByRef bArrayIn () As Byte, ByVal lLen As Long, ByVal Optional lcrc As Long = 0) As Long

'BArrayIn is a byte array from the file that read, lLen is the size or file size

As Long Dim lCurPos' Current position for the array bArrayIn Iterations
As Long Dim lTemp 'variable temp calculation results

If lLen = 0 Then Exit Function 'exit function if the file size = 0
lTemp = lcrc xor & HFFFFFFFF

For lCurPos = 0 To lLen
lTemp = (((And lTemp & HFFFFFF00) & H100) and & HFFFFFF) xor (crcTable ((lTemp and 255) xor bArrayIn (lCurPos)))
Next lCurPos

CRC32 = lTemp xor & HFFFFFFFF

End Function

Private Function BuildTable () As Boolean
Dim i As Long, x As Long, CRC As Long

Const Limit = & HEDB88320

For i = 0 To 255
CRC = i
For x = 0 to 7
And if CRC 1 Then
CRC = (((I & HFFFFFFFE CRC) 2) And & H7FFFFFFF) xor Limit
Else

CRC = ((CRC And & HFFFFFFFE) 2) And & H7FFFFFFF
End If
Next x
crcTable (i) = CRC
Next i
End Function

Private Sub Class_Initialize ()
BuildTable

End Sub

================= END HERE ====================

Then type the following code in the Command1_Click event:

================= START HERE ====================

As String Dim namaFileBuka, HasilCrc As String
Dim CCrc As New clsCrc ', being the object of a new class ClsCrc
As Long Dim calCrc
Dim tmp () As Byte 'array create the file that read

Private Sub Command1_Click ()

CommonDialog1.CancelError = True 'error when users click on the cancel CommonDialog
= CommonDialog1.DialogTitle "Read File" 'Caption commondialog

On Error Goto erorhandle 'label error handle

CommonDialog1.ShowOpen
namafilbuka = CommonDialog1.FileName
Open namafilbuka For Binary Access Read As # 1 'open the selected file with read access to the binary mode
ReDim tmp (LOF (1) - 1) As Byte 'declaration for re-arrays, Bugs Fixed # #
Get # 1, tmp ()
Close # 1

calCrc = UBound (tmp) 'retrieve the file size of the array
calCrc = CCrc.CRC32 (tmp, calCrc) 'countdown CRC

HasilCrc = Hex (calCrc) 'hexadesimal change to the format, because the results of the calculation of the CRC class is still a numeric
Text1.Text = HasilCrc 'results show
Exit Sub

erorhandle:
If Err.Number <> 32755 Then MsgBox Err.Description 'error number 32,755 are when users click on the cancel button when selecting files

================= END HERE ====================

Try to run your programs with the push above the F5 key, and then click Command1 to open the file and choose. But the program will display the CRC32nya.

Second #
The code above we can make a routine checks the files with the suspect virus between CRC32nya and compare the results of our own database of CRC. Algoritmanya is:
- Selecting a file that will be checked
- Open the file in binary mode
- Processing for the byte to byte checksum
- Open the database file
- Take the contents of the file line-by-line
- Identify checksum calculations with the checksum from the file

A database file format can be set, for instance:
- FluBurung.A = ABCDEFGH
- Diary.A = 12345678
FluBurung.A Where is the name of the virus and ABCDEFGH are Crc32nya. If we have the file format as above, then we need to read the file in sekuensial per line, and separate between the virus and Crc32nya name. In this case, which is a separator characters' = '.
Create a new module 1 (- given the name module1) and the contents of the code:

================= START HERE ====================

Public namaVirus As String, CrcVirus As String 'global variable declaration for the name of the virus and CRC Public pathExe as String' variable declarations EXE file storage location of our AV

Public Function cariDatabase (CRC As String, namaFileDB As String) As Boolean
As String Dim lineStr, tmp () As String 'variable to accommodate the contents of the file

Open namaFileDB For Input As # 1 'open the file with the input mode
Do
Line Input # 1, lineStr
tmp = Split (lineStr, "=") 'separate the contents of the file bedasarkan separator characters' ='
namaVirus tmp = (0) 'namavirus to enter the array of variables
CrcVirus tmp = (1) 'Crcvirus to enter the array of variables
If CrcVirus = CRC Then, when the CRC calculation match / match with a database
cariDatabase = True 'return value TRUE
Exit Do 'exit from the recurrence

End If
Loop Until EOF (1)
Close # 1
End Function

================= END HERE ====================

Then add 1 new item into the form, namely Command button2. and then type the following code into the listing Command2_Click event:

================= START HERE ====================
If Len (App.Path) <= 3 Then 'directory when it is the root directory

pathEXE = App.Path
Else
pathEXE = App.Path & ""
End If

CommonDialog1.CancelError = True 'error when users click on the cancel CommonDialog
= CommonDialog1.DialogTitle "Read File" 'Caption commondialog

On Error Goto erorhandle 'label error handle

CommonDialog1.ShowOpen

namafilbuka = CommonDialog1.FileName
Open namafilbuka For Binary Access Read As # 1 'open the selected file with read access to the binary mode
ReDim tmp (LOF (1) - 1) As Byte 'declaration to re-array Bugs Fixed # #
Get # 1, tmp ()
Close # 1

calCrc = UBound (tmp) 'retrieve the file size of the array
calCrc = CCrc.CRC32 (tmp, calCrc) 'countdown CRC

HasilCrc = Hex (calCrc) 'hexadesimal change to the format, because the results of the calculation of the CRC class is still a numeric
If cariDatabase (HasilCrc, pathEXE & "DB.txt") Then 'if the value is TRUE

MsgBox "The virus found:" & namaVirus' show message Box
End If
Exit Sub

erorhandle:
If Err.Number <> 32755 Then MsgBox Err.Description 'error number 32,755 are when users click on the cancel button when selecting files

================= END HERE ====================

AV simple features can be added to the feature process scanners, registry access, real-time protection (RTP) and others. To process scanner is basically the technique enumerasi all processes are running on the Operating System, and to find a location or the location of the file and make the process of scanning. Features access registry allows us to directly edit the Windows registry when access to the registry (Regedit) blocked by the virus. While the features of RTP AV enables us to run simultaneously with the Windows Explorer to mengscan directory or file that is we see or browse. For this third feature will be discussed further in the next article.

Conclusion #
No need to buy AV software is expensive to keep us from the threat of computer viruses, we can make them yourself with the features that are not less good. Indeed, there is imperfection in their own AV, but at least can be made from prevention of computer virus infection is rampant. AV software is complemented by simple engines scanners and static definition database. Not closed the possibility of AV software is improved in terms of more advanced engines scannernya.

Closing #
AV software development is simple Open-Source fully participate during the original name of the manufacturer. And a complete listing can be downloaded projects in http://www.geocities.com/emomelodicfreak/ProjekAV.zip

visit http://fikrul.co.cc/?p=35
if you want more info

Label: ,

Victoria outcry

I listen to you
Indeed, how I love yourselves
the hour feel sleepy tanpamu
all I will do the sake Haha
but why?
why!
tega why you leave me and replace me with another?
if less than all the love, pity, concern and sincerity that I give to?

I have not satisfied you have menyhakitiku?
I have not been satisfied to make it available?
beginikah caramu menghancurkanku?

I see here is going to shake the pine
Lyric is now no longer spirit
all very dark
looks like the sick cut knife
Haha amount you reply with the pain that now exist in Victoria
You love you use to destroy me


but why not
if this is indeed happy tale
I am willing, although now I'm very tortured.


I'm here let alone mourn this nasibku
I want to taste the life of this
today that all ended


Label: ,

How to lock folders

Applications folder or the software or the Lock Folder available on the internet, I better pay or free. This time we will lock the folder create folders with the Lock without using the software.
Open Notepad application that diwindows, Type Copy or Paste Text or the following script into Notepad:

@ ECHO OFF
if EXIST "MyFilesLocked" goto Warlock
if NOT EXIST MyFiles goto MDMYFILES
echo Mau Lock Folder MyFiles? (Y / N)
set / p "option =>"
%% if the option == y goto LOCK
if not choice%% y == goto END
: LOCK
ren "MyFiles" MyFilesLocked
attrib + h + s "MyFilesLocked"
cacls "MyFilesLocked" / p everyone: n / e
cls
echo MyFiles folder is locked ...
pause
goto End
: Warlock
Open the folder echo Mau MyFiles, Enter Password and press Enter ...
set / p "pass =>"
if NOT%% pass == angelica1988 goto file
cacls "MyFilesLocked" / p everyone: f / e
attrib-h-s "MyFilesLocked"
ren "MyFilesLocked" MyFiles
cls
echo Folder MyFiles Already open ...
pause
goto End
: File
The echo password!
pause
goto end
: MDMYFILES
md MyFiles
echo MyFiles folder is created
pause
: END
end

Click Select File and Save As File Name Being an ex Kunci.bat it and its Save As Type Select All Files.

Run (double click) File lock.bat that have been made, it will be automatically made a folder called "MyFiles." In this MyFiles folder where you store your data.

Next to stalemate and hide folders "MyFiles" Run the file again and will be out Kunci.bat reads: "How Lock Folder MyFiles? (Y / N)" type y to lock or n to cancel and press enter. But the folder "MyFiles" has been hidden and locked (can not be deleted, copied or rename)

If the folder is locked and you want to re-open the file again Run Kunci.bat and will be out reads: "Time to Open the folder MyFiles, Enter Password and press Enter ..." type your password and press enter.

Examples of the above is to create a folder with a name and password MyFiles is angelica1988, you can change the script above in accordance with the password you want.
Trick Lock Folder this (that can not be deleted, copied or rename) applies only in Windows 2000 and Windows XP



that would source visit click

http://fikrul.wordpress.com/2008/02/06/mengunci-folder-tanpa-software/ # comment-384

Label: