1. Registry is the result of the workings of OS Windows XP, by editing the registry because it means change the way you work Windows XP.
2. To avoid the problem, edit the Registry before, you should make a backup first.
Enable the Shutdown Event Tracker:
HKEY_LOCAL_MACHINE \ SOFTWARE \ Microsoft \ Windows \ CurrentVersion \ Reliability
Create a new DWORD Value, if not exist, and name ShutdownReasonUI.
Double-click ShutdownReasonUI and enter the number 1 in the Value Data.
Tips for Self-create the first to the Windows Login:
HKEY_LOCAL_MACHINE \ SOFTWARE \ Microsoft \ Windows \ CurrentVersion \ Explorer \ Tips
Create a String Value or some based on the continuation of the tips that have been there (for example, 50 and so on) and enter the form of text input tips as desired.
Senin, 01 Desember 2008
Minggu, 16 November 2008
Registry tricks on the windows
With some tricks you can hide the registry elemen system that has a security risk.
Hide the Device Manager: You want to prevent someone working on your PC to make changes through the Device Manager? In the registry editor search keywords' HKEY_CURRENT_USER \ Software \ Microsoft \ Windows \ Current-Version \ Policies \ System. There, add a new Dword value with the name 'NoDevMgrPage' and enter the value'1 '.
Disguise drives: Under the key 'HKEY_CURRENT_USER \ Software \ Microsoft \ Windows \ CurrentVersion \ Policies \ Explorer' create new Dword value with the name 'NoDrives'. To hide a drive completely, put a value hexadesimal 1, 2, 4, 8, 10 to drive A, B, C, D and E. To hide some of the drive, for example, C and D:, type in 'Hex 8 +4 = C'.
Hide the Device Manager: You want to prevent someone working on your PC to make changes through the Device Manager? In the registry editor search keywords' HKEY_CURRENT_USER \ Software \ Microsoft \ Windows \ Current-Version \ Policies \ System. There, add a new Dword value with the name 'NoDevMgrPage' and enter the value'1 '.
Disguise drives: Under the key 'HKEY_CURRENT_USER \ Software \ Microsoft \ Windows \ CurrentVersion \ Policies \ Explorer' create new Dword value with the name 'NoDrives'. To hide a drive completely, put a value hexadesimal 1, 2, 4, 8, 10 to drive A, B, C, D and E. To hide some of the drive, for example, C and D:, type in 'Hex 8 +4 = C'.
Rabu, 05 November 2008
Study Graphic Design
Definition of Graphic Design According to Slamet Riyanto: is a form of painting (picture), which applied to provide freedom to the designer (the designer) to choose, create, manage or appearance elements such as illustration, photo, writing, and the line above the surface with a purpose to be produced and communicated as a message. Images and signs that can be used typography or other media such as images or graphics fotografi.Desain generally applied in the world of advertising, packaging, film, and others.
According to Suyanto graphic design is defined as "the application of art and communication skills to the needs of business and industry." These applications can include advertising and selling products, creating a visual identity for the institution, products and companies, and environmental graphics, design, information and refine the visual messages in the publication.
Meanwhile, Jessica Helfand in the site http://www.aiga.com/ defines graphic design as a complex combination of words and images, figures and graphs, photographs and illustrations that requires a special mindset of an individual who can combine elements eleman this, so that they can produce something special, very useful, surprising or subversive or something easy to remember.
According to Danton Sihombing graphic design employs various elements such as markings, symbols, verbal descriptions of divisualisasikan through typography and images with good technique photography or illustration. Elements applied in the two functions, the device as a visual and communication devices.
According to Michael Kroeger visual communication (visual communication) is the training theory and concepts through visual terms by using colors, shapes, lines and juxtaposition (juxtaposition).
Warren Suyanto that sure in graphic design as a translation of ideas and places to
in order that some type of structural and visual.
While Blanchard defines graphic design as a communicative arts-related industry, art and the process produces a visual picture on all surfaces
Category Graphic Design
Graphic design divided into several categories:
1. Printing (Printing) for the design books, magazines, posters, booklets, leaflets, flyers,
pamphlets, advertising, and other similar publications.
2. Web Design: design for the web page.
3. Movies, including CD, DVD, CD multimedia for the campaign.
4. Identification (Logo), EGD (Environmental Graphic Design) is a design professional
which includes graphic design, architecture, design, industrial design, architecture and gardens.
5. Product design, Delivery and the like.
PROGRAM processors GRAPHIC / GRAFIS
Graphic design is divided into several categories of facilities to prepare any different, terrgantung on the needs and design goals
1. Applications Processors Layout (layout)
Often used for the creation of brochures, pamphlets, booklets, posters, and other similar. This program is able to manage the placement of text and image, taken from other programs (such as Adobe Photoshop), Example:
- Adobe FrameMaker
- Adobe In Design
- Adobe Pagemaker
- Corel Ventura
- Microsoft Publisher
- Quark Xpress
2. Applications Processors Vector / Line
This program is able to create an image of vectors / line so often referred to as the Illustrator program. All items produced some form of a combination of lines, either in the form of straight or curved lines. Example:
- Adobe Illustrator
- Beneba canvas
- CorelDraw
- Macromedia Freehand
- Metacreations Express
- Micrografx Designer
3. Application processing pixels / Picture
This program can be used to manipulate the image / photo manipulation (photo retouching). Objects that are considered to be a set of dots / pixels that have a certain density and color, for example, images. Figure in some of the images formed from a group that has a pixel density and a certain color. But this program can also prepare the text and lines, however seen as a collection of pixels. Objects are imported from the processor vectors / line, after processed by the program processing pixel / point will automatically be converted into pixel / point. Example:
- Adobe Photoshop
- Corel Photo Paint
- Macromedia Xres
- Metacreations Painter
- Metacreations Live Picture
- Micrografx Picture Publisher
- Microsoft Photo Editor
- QFX
- Wright Image
4. Applications Processors Film / Video
This program can be used to process film in various formats. Giving the title text (such as karaoke, text translation, etc.), can also be processed using this program. Giving special effects (special effect) as the sound of explosion, desingan bullet, waves, and others can also be made using this application. Example:
- Adobe After Effects
- Power Director
- Show Biz DVD
- Ulead Video Studio
- Element Premier
- Easy Media Creator
- Pinnacle Studio Plus
- WinDVD Creator
- Nero Ultra Edition
5. Multimedia Applications Processors
The application program is usually used to create a paper in the form of Multimedia promotion, company profiles, and the like and packed in the form of CD or DVD. These can include multimedia film / movie, animation, text, images, sound and the dirancan such a way so that the message was delivered interktif and more interesting. Example:
- Macromedia
- Macromedia Authorware
- Macromedia Director
- Macromedia Flash
- Multimedia Builder
- Ezedia
- Hyper Studio
- Ovation Studio Pro
- Macromedia Director
- Macromedia Flash
- Multimedia Builder
- Ezedia
- Hyper Studio
- Ovation Studio Pro.
According to Suyanto graphic design is defined as "the application of art and communication skills to the needs of business and industry." These applications can include advertising and selling products, creating a visual identity for the institution, products and companies, and environmental graphics, design, information and refine the visual messages in the publication.
Meanwhile, Jessica Helfand in the site http://www.aiga.com/ defines graphic design as a complex combination of words and images, figures and graphs, photographs and illustrations that requires a special mindset of an individual who can combine elements eleman this, so that they can produce something special, very useful, surprising or subversive or something easy to remember.
According to Danton Sihombing graphic design employs various elements such as markings, symbols, verbal descriptions of divisualisasikan through typography and images with good technique photography or illustration. Elements applied in the two functions, the device as a visual and communication devices.
According to Michael Kroeger visual communication (visual communication) is the training theory and concepts through visual terms by using colors, shapes, lines and juxtaposition (juxtaposition).
Warren Suyanto that sure in graphic design as a translation of ideas and places to
in order that some type of structural and visual.
While Blanchard defines graphic design as a communicative arts-related industry, art and the process produces a visual picture on all surfaces
Category Graphic Design
Graphic design divided into several categories:
1. Printing (Printing) for the design books, magazines, posters, booklets, leaflets, flyers,
pamphlets, advertising, and other similar publications.
2. Web Design: design for the web page.
3. Movies, including CD, DVD, CD multimedia for the campaign.
4. Identification (Logo), EGD (Environmental Graphic Design) is a design professional
which includes graphic design, architecture, design, industrial design, architecture and gardens.
5. Product design, Delivery and the like.
PROGRAM processors GRAPHIC / GRAFIS
Graphic design is divided into several categories of facilities to prepare any different, terrgantung on the needs and design goals
1. Applications Processors Layout (layout)
Often used for the creation of brochures, pamphlets, booklets, posters, and other similar. This program is able to manage the placement of text and image, taken from other programs (such as Adobe Photoshop), Example:
- Adobe FrameMaker
- Adobe In Design
- Adobe Pagemaker
- Corel Ventura
- Microsoft Publisher
- Quark Xpress
2. Applications Processors Vector / Line
This program is able to create an image of vectors / line so often referred to as the Illustrator program. All items produced some form of a combination of lines, either in the form of straight or curved lines. Example:
- Adobe Illustrator
- Beneba canvas
- CorelDraw
- Macromedia Freehand
- Metacreations Express
- Micrografx Designer
3. Application processing pixels / Picture
This program can be used to manipulate the image / photo manipulation (photo retouching). Objects that are considered to be a set of dots / pixels that have a certain density and color, for example, images. Figure in some of the images formed from a group that has a pixel density and a certain color. But this program can also prepare the text and lines, however seen as a collection of pixels. Objects are imported from the processor vectors / line, after processed by the program processing pixel / point will automatically be converted into pixel / point. Example:
- Adobe Photoshop
- Corel Photo Paint
- Macromedia Xres
- Metacreations Painter
- Metacreations Live Picture
- Micrografx Picture Publisher
- Microsoft Photo Editor
- QFX
- Wright Image
4. Applications Processors Film / Video
This program can be used to process film in various formats. Giving the title text (such as karaoke, text translation, etc.), can also be processed using this program. Giving special effects (special effect) as the sound of explosion, desingan bullet, waves, and others can also be made using this application. Example:
- Adobe After Effects
- Power Director
- Show Biz DVD
- Ulead Video Studio
- Element Premier
- Easy Media Creator
- Pinnacle Studio Plus
- WinDVD Creator
- Nero Ultra Edition
5. Multimedia Applications Processors
The application program is usually used to create a paper in the form of Multimedia promotion, company profiles, and the like and packed in the form of CD or DVD. These can include multimedia film / movie, animation, text, images, sound and the dirancan such a way so that the message was delivered interktif and more interesting. Example:
- Macromedia
- Macromedia Authorware
- Macromedia Director
- Macromedia Flash
- Multimedia Builder
- Ezedia
- Hyper Studio
- Ovation Studio Pro
- Macromedia Director
- Macromedia Flash
- Multimedia Builder
- Ezedia
- Hyper Studio
- Ovation Studio Pro.
Label:
advertising,
business,
film,
industry,
information,
photo,
Web Design
Important terms in the World Virus
ITW (in the wild): Viruses that are outstanding, for example, through e-mail or the Internet
Zoo virus: Also called a virus lab, which developed in the lab to research the identification process better.
On Demand: In this process the user can start downloading a self-scanning process manually.
On Access: sex should be active themselves. For example, when users receive the email, the tool will be automatically reviewed.
Trojan / backdoor: destroyer program, which can masquerade as a normal program. Usually, users can not recognize them. Trojan allows hackers gain full access to the computer with the purpose of opening a "back door".
Worm: Unlike with viruses, worms only spread in the computer network. They reproduce themselves as much as possible to spread to other computers. For the worms are more likely to utilize the e-mail.
Polimorf virus: The virus is continually changing code, making it difficult to track.
Macro viruses: intruder in the form of macros is active in the file and associate themselves in other files.
Hoax: Virus "joke" that gave the report, false confusing to users, but not to cause damage in the affected PC.
Zoo virus: Also called a virus lab, which developed in the lab to research the identification process better.
On Demand: In this process the user can start downloading a self-scanning process manually.
On Access: sex should be active themselves. For example, when users receive the email, the tool will be automatically reviewed.
Trojan / backdoor: destroyer program, which can masquerade as a normal program. Usually, users can not recognize them. Trojan allows hackers gain full access to the computer with the purpose of opening a "back door".
Worm: Unlike with viruses, worms only spread in the computer network. They reproduce themselves as much as possible to spread to other computers. For the worms are more likely to utilize the e-mail.
Polimorf virus: The virus is continually changing code, making it difficult to track.
Macro viruses: intruder in the form of macros is active in the file and associate themselves in other files.
Hoax: Virus "joke" that gave the report, false confusing to users, but not to cause damage in the affected PC.
Senin, 03 November 2008
Saving data on the virus attack
Not only damage the hardware and malfunctions that can be dangerous to Windows. Many computer viruses are programmed in such a way so that they can damage the system by deleting files or change the configuration important. If you are such a virus, you must act quickly.
Isolate: First, disconnect all network connections or online. The best is to remove the cable or revoke the Access Point if you are in the WLAN. This way you can avoid the destroyer program that is not spread to other PC or sent to another user via e-mail.
LOT: If you have to install antivirus programs, then do the scanning to complete all the drives and files. Although painful, let the antivirus program to delete the files that infected, because often not possible to remove the virus without the rest of the EXE and DLL files. These files often can not fully functional and can even memprovokasikan crashes in Windows.
Cleanup: Only files such as documents from Word DOC files that can be cleaned perfectly with the antivirus program. This file is usually infected with the virus macro and can be cleaned to remove the existing macro. After that, copy the file to a safe place.
Format: After your card-file backups of all important, you should make the format the hard disk for security.
Booting from the CD: If not available, the virus scanner, run back to the computer using a diskette or CD. If not, then there is a risk the virus will spread. If not available boot media in a safe, make the media in the computer free of viruses. Caution: The function of a write protect the disk must be used.
Scanning in DOS: If the partition that has been formatted with FAT or FAT32, so now you can run antivirus programs for DOS and check drivenya. Software that is suitable for the "F-Prot Antivirus for DOS." This program is available free for home users.
Dismantle the hard disk: To NTFS partition this more difficult. If there is no antivirus program that has been installed, it is advisable to install a hard disk into the computer free of viruses that have an active antivirus programs. Then let the software that checks the hard disk and delete the infected files. In the infected hard disks to make sure that does not run programs or open files.
Isolate: First, disconnect all network connections or online. The best is to remove the cable or revoke the Access Point if you are in the WLAN. This way you can avoid the destroyer program that is not spread to other PC or sent to another user via e-mail.
LOT: If you have to install antivirus programs, then do the scanning to complete all the drives and files. Although painful, let the antivirus program to delete the files that infected, because often not possible to remove the virus without the rest of the EXE and DLL files. These files often can not fully functional and can even memprovokasikan crashes in Windows.
Cleanup: Only files such as documents from Word DOC files that can be cleaned perfectly with the antivirus program. This file is usually infected with the virus macro and can be cleaned to remove the existing macro. After that, copy the file to a safe place.
Format: After your card-file backups of all important, you should make the format the hard disk for security.
Booting from the CD: If not available, the virus scanner, run back to the computer using a diskette or CD. If not, then there is a risk the virus will spread. If not available boot media in a safe, make the media in the computer free of viruses. Caution: The function of a write protect the disk must be used.
Scanning in DOS: If the partition that has been formatted with FAT or FAT32, so now you can run antivirus programs for DOS and check drivenya. Software that is suitable for the "F-Prot Antivirus for DOS." This program is available free for home users.
Dismantle the hard disk: To NTFS partition this more difficult. If there is no antivirus program that has been installed, it is advisable to install a hard disk into the computer free of viruses that have an active antivirus programs. Then let the software that checks the hard disk and delete the infected files. In the infected hard disks to make sure that does not run programs or open files.
Langganan:
Komentar (Atom)
