Custom Search

Friday, January 16, 2009

Dangerous Threat For Your Computer

Dangerous Threat For Your Computer

Sans Institute is training nonprofit organization and professional verification in the field of computer security. List which they release that, according to Alan Paller, head Sans Institute, can assist organization which wish to protect computer.

Every year his(its, more or less, there is 2000 weakness of software found. Unknowingly which weakness very menaces, organizations can be busy protects its(the computer.

Read More Please Download
Ancaman Berbahaya Bagi Komputer Anda
Dangerous Threat for Your Computer

Source :
http://www.pusatartikel.com/article/komputer/hacking/20-ancaman-komputer-paling-berbahaya.html
http://computerandsafety.blogspot.com/2009/01/dangerous-threat-for-your-computer.html

Revision : By zams

Tuesday, January 13, 2009

Makes Logins to apply Cpanel

Documents License:
Copyright © 2006-2008 Ilmuwebsite.com

Documents in Ilmuwebsite.Com can be applied, modified and propagated freely for purpose of non commercial ( nonprofit), on condition that doesn't vanish or changes writer attribute and statement of copyright figured in in every documents. Is not enabled re-does writing, except getting permission beforehand from Ilmuwebsite.Com You have ever sees logins display logins like upper? If have ever, possibly you are vexed how to make it. To make logins as in upper, Its way hardly easy. The key lays in Header. Header in PHP has function which a lot and can be choose. Well, I will explain way of making it.
File create by the name of index.php then typed script following :


READ MORE PLEASE DOWNLOAD ARTICLE
PHP LEARNING

Wednesday, January 7, 2009

HACKER

Written by rich
Wednesday, 30 April 2008 17:02

Hacker is man who is studying science about expansion of computer a period of which kana to come them also can analyze, even when they wish it, they can make, modifies, or even exploits computer software or computer hardware like computer program or operating system.

Other administration and things, especially security and safety.

Terminology hacker to emerge in the early of year 1960 between the member of student organizations Tech Model Railroad Club in Intelligential Artificial Laboratory Massachusetts Institute of Technology (MIT). Group of the student is one of development pioneer of computer technology and they with my number of mainframe computers. Said hacker first time his emerges with positive meaning to call a member having expertise in the field of computer and can make better computer program compared to which has been designed together.

Then in the year 1983, hacker analogy increasingly grows to call someone who is having obsession to comprehend and masters computer system. The reason is, in the year for the first time of FBI catch criminal group of computer The 414s being based on in Milwaukee AS. 414 is local area code of they. Group that is then is called as the hacker expressed is guilty to leaking 60 fruit of computer, from computer property of finite cancer central Memorial Sloan-Kettering of computer property of National Laboratory Los Alamos1 from the perpetrator gets impenetrability because its testimonial, while 5 other perpetrator gets penalization of probation.

Hacker during this has negative connotation because its(the actions resulting loss of certain party(side like changing display a web site, inserts pl p2 etc. viruses codes Hacker applies security and safety gaps which has not been improve repaired by software maker (bug). But during then, and some present hacker factions, still maintaining analyzing culture of system in this reason usually the hackers is divided to to become 2 faction White Hat Hackers and Black Hat Hackers, where function and work done by it to differ in.

White hat hacker is information technology term in English referring to hacker that is ethically shows a weakness in a computer system. White hat in general more focused its(the action to how protecting a system

Black hat hacker is information technology term in English referring to hacker that is they infiltrating computer system safety without permission, generally with a view to access computers connected to the network. Cracker term submitted by Richard Stallman to refer to peretas in this meaning.

Hacker Figure

Dennis M.Richie Dennis borns in Bronxiville, New York at 9 September 1941. He is have a title BSc in area Physical and title PhD Mathematical in Harvard University. At 1967, one year before his(its doctoral thesis, s(he hangs on to coattail its(the father to work in Bell Laboratories. He then cooperates with Ken Thompson in writing operating system UNIX, first operating system of is earning easily is applied in various computer types. To yield such operating system, s(he and Ken makes perfect programming language B masterpiece Ken, and then yields language C, applied to write UNIX.

Interconnected subject is eye study network computer and eye study security and safety computer.

Does that thing can happened in real world? That thing can happened in real world,

Tuesday, January 6, 2009

Way Of Making Search Engine

Before all I will give soybean cake is that Search Engine well for which has known Let's say has not known it.

Search Engine is a search engine data by using keyword. Enough simple isn't it the explanation.

Of course the existing of Search Engine doesn't deflect getting out of internet user because besides can assist us in looking for soybean cake about a thing which we have not known or looks for thing soybean cake is wishing we to investigate, with keyword (Keyword) which we are typing at column provided by search engine

Something unable to understand ……………..?

So after understanding altogether the things intended with search engine we continue

Ok which we debate would now is how to make search engine to emerge screen by your website or your Blog. Pays attention to carefully

download scrit here

This is script search engine

1.Its input how to into website

In setting web site there are assorted of its(the input way to be depended from at server web host which we use definitive script is upper must be input in editing HTML and you ready to copy its(the code is then paste at content its the HTML change RENAME YOUR BLOG by the name of your web or blog . Numeral 30 showing box length more and more it’s the number hence increasingly it’s the text box length

2. Its input blog how to

Logins to blogger always click Layout always chooses page elements isn't it many articles Add a page elements link click and accommodates where its(the place putting search engine

Then at emerging new screen chooses HTML/JavaScript then copy/paste script/code to in column content.

Change text RENAME YOUR BLOG by the name of your blog. Number30 showing box length (text box) more and more its(the number hence increasingly it’s the text box length

Monday, January 5, 2009

speedup pc


If your computer very slowly, even to step into just windows you must waitting at the same time pour boiling water into a cup of hot coffee and waiting at the same time drink its, that is true very is annoying because if hasty work do not be executed better because use the this computer, effect too the long duration for a booting process at the your computer maybe a cup of your coffee which your make have finished for you drink and you started do anything for a waiting booting process. Its really inconvenience work.

With hardware support like that possibility work awaiting you to be done will be pursued.

There is a way to increase speed at computer which you use maybe one its way is upgrade your hardware exist in the computer. But it’s for upgrading your computer requiring which money of, but without existence of the improvement your hardware performance which significant, it’s true not many which you Can do that to quicken Windows boot..

Besides way of the there is a way of simple other and do not cost money which many to quicken time required by desktop in reaching condition " quickly process ". Let us correct reading some ways hereunder, both for using ability which it’s true have made available and application from outside..
you have install a new program at computer which is wearing at once that's mentioned program of the input enter into tray system or there is in startup program (windows start menu) that is true made so by all its maker of that Because possible the software owner wishing its program can be seen by when startup or just for checked its just program update like when you install yahoo messenger or antivirus program.

If merely one or two such install a just program like that might not will having an effect on many to speed of booting at your computer. But when you install program which seldom be used but the program enter in course of startup, hence will happened stricture of capacities in cycle usage of CPU and memory. This matter of diffraction generate crash at computer or program become very long process.

Easy way overcome such a computer, following its steps :

Click Start à Run à type msconfig select startup tabs, hence will go out box dialogued by Ms Config such as those which seen hereunder.