Latest Posts

22.3.12

About Free Software

Hello everyone how are you ....?
After a long time I did not update this site, now I am back to share information with you all ..
OK. This time we will discuss the issue of free software, some of us who want to learn about computer burdened by the price of legal software is expensive. Maybe they do not know about the free software that does not cost money to get it but still legal.
Here is a definition of free software.

Free software, software libre or libre software is software that can be used, studied, and modified without restriction, and which can be copied and redistributed in modified or unmodified form either without restriction, or with restrictions that only ensure that further recipients have the same rights under which it was obtained and that manufacturers of consumer products incorporating free software provide the software as source code. The word free in the term free software refers to freedom (liberty) and is not at all related to monetary cost. The Free Software Foundation advises people to "avoid using terms like 'give away' or 'for free,' because those terms imply that the issue is about price, not freedom." Free software is generally available without charge but is not bound to such a restriction.
Fees are usually charged for distribution on compact discs and bootable USB drives, or for services of installing or maintaining the operation of free software. Development of large, commercially-used free software is often funded by a combination of user donations, corporate contributions, and tax money. The SELinux project at the United States National Security Agency is an example of a federally-funded free software project.
In practice, for software to be distributed as free software, the source code, a human-readable form of the program from which an executable form is produced, must be accessible to the recipient along with a document granting the same rights to free software under which it was published. Such a document is either a free software license or the release of the source code into the public domain.
The free software movement was conceived in 1983 by Richard Stallman to satisfy the need for and to give the benefit of software freedom to computer users. Stallman founded the Free Software Foundation in 1985 to provide the organizational structure to advance his free software ideas.
From 1998 onward, alternative terms for free software came into use. The most common are software libre, free and open source software (FOSS) and free, libre and open source software (FLOSS). The Software Freedom Law Center was founded in 2005 to protect and advance FLOSS. Commercial software may sometimes offer freedoms which are typical of free and open source software. Contrary to a popular misconception that software is either free or commercial, they are unrelated traits, since free software can be commercial and proprietary software can be non-commercial. One example of free commercial software is GNAT, an Ada compiler from the company AdaCore. It has been developed and is available commercially (i.e., against payment), but is free software because of its non-proprietary nature, with the source code publicly available. On the other hand, free software and proprietary software are opposite traits, and an application can be one or the other but never both, contingent upon the availability of the source code under certain minimum freedoms.
Free software, which may or may not be distributed free of charge, is distinct from freeware, which by definition does not require payment for use. The authors or copyright holders of freeware may retain all rights to the software; it is not necessarily permissible to reverse engineer, modify, or redistribute freeware.
Since free software may be freely redistributed, it is generally available at little or no cost. Free software business models are usually based on adding value such as applications, support, training, customization, integration, or certification. At the same time, some business models which work with proprietary software are not compatible with free software, such as those that depend on the user to pay for a license in order to lawfully use the software product.


read more...

6.7.10

Protect Ourselves In Public Hotspots

Many places of us find public hotspots in places such as malls, office area, campus, airports and others. Most of them even provide services for free hotspotnya.

What we need to provide is a laptop or other devices such as smartphones, which has been equipped with the ability to Wi-Fi, and then connect to the hotspot connections are available.

Free hotspot service is exciting because in addition to not need to spend money, we can also fill our free time when in place. But we never know how the security.

Below are five steps that we can do to protect ourselves when her merry hotspots in public places:

1. Set the device to Wi-Fi we do not automatically connect to a network without our consent. By doing this we will be 'aware' that we will be connected to a Wi-Fi hotspots.

2. Often times we turn the feature sharing (share) on our laptop, so when we are in the public hotspot should first turn off features that share.

3. If current hotspots where we're doing a business transaction or want to share sensitive information then use a VPN connection.

4. Use firewall software on our laptop either software firewalls also congenital Windows or third-party firewall software are widely available.

5. Avoid as much as possible to pay bills or shopping online when we're using a hotspot. And another is to use one additional hotspot using WPA2 security.
read more...

25.2.10

Using the internet without fear of trojans, malware, spyware, keylogger with Comodo Firewall + AntiVirus ...

A firewall is a part of a computer system or network that is designed to block unauthorized access while permitting authorized communications. It is a device or set of devices configured to permit, deny, encrypt, decrypt, or proxy all (in and out) computer traffic between different security domains based upon a set of rules and other criteria.

Firewalls can be implemented in either hardware or software, or a combination of both. Firewalls are frequently used to prevent unauthorized Internet users from accessing private networks connected to the Internet, especially intranets. All messages entering or leaving the intranet pass through the firewall, which examines each message and blocks those that do not meet the specified security criteria.

There are several types of firewall techniques:

Packet filter: Packet filtering inspects each packet passing through the network and accepts or rejects it based on user-defined rules. Although difficult to configure, it is fairly effective and mostly transparent to its users. It is susceptible to IP spoofing.

Application gateway: Applies security mechanisms to specific applications, such as FTP and Telnet servers. This is very effective, but can impose a performance degradation.

Circuit-level gateway: Applies security mechanisms when a TCP or UDP connection is established. Once the connection has been made, packets can flow between the hosts without further checking.

Proxy server: Intercepts all messages entering and leaving the network. The proxy server effectively hides the true network addresses.

A firewall is a dedicated appliance, or software running on a computer, which inspects network traffic passing through it, and denies or permits passage based on a set of rules.

It is a software or hardware that is normally placed between a protected network and an unprotected network and acts like a gate to protect assets to ensure that nothing private goes out and nothing malicious comes in.

A firewall's basic task is to regulate some of the flow of traffic between computer networks of different trust levels. Typical examples are the Internet which is a zone with no trust and an internal network which is a zone of higher trust. A zone with an intermediate trust level, situated between the Internet and a trusted internal network, is often referred to as a "perimeter network" or Demilitarized zone (DMZ).

A firewall's function within a network is similar to physical firewalls with fire doors in building construction. In the former case, it is used to prevent network intrusion to the private network. In the latter case, it is intended to contain and delay structural fire from spreading to adjacent structures.

Comodo Firewall is one of the many software firewalls available, I myself use this software and the results are quite satisfactory, Comodo firewall to work pretty good although there are also shortcomings. Comodo Firewall has many advantages such as the display is user friendly, easy configuration, there are anti keyloger, parental control features, the automatic update feature, and most importantly this software for free. besides that, there are also disadvantages here are a few weaknesses of this software: Comodo Firewall takes a lot of memory usage, and quite disturbing defensenya notification if a new use of this software.

if you want try this software download here


read more...

Playing the Game with Virtual Graphic Cards

we who have a low PC specifications we will definitely confusion if we want to play game that needs a powerful VGA or require the addition of a capable graphics card. if the condition was already like that we remember the name “virtual graphics card”, This is a misnomer, for a built in or on board Graphics's Card. This is where Graphics's Card is built into the Main or Motherboard as a Graphics's controller chip and sharing the on board RAM. These are for entry level systems or Servers. If you want proper performance get a good Graphics's Card, you won't be glad you did until you see someone's system with out one.

3DAnalyze is a powerful application that allows to play many DirectX based games using video hardware officially unsupported and theoretically unable to run these; in this guide I'will show you how to install and configure 3D-Analyze main settings, depending on the title you want to play.

First let me explain link among video cards generations and supported Microsoft DirectX versions. This point is crucial for us because changing DirectX versions also hardware compatibilty requests change.

DirectX 5.0 and 6.0 Compliant Cards

This category contains video cards made from 1995 to 1999. For example all 3dfx cards, most video cards from Intel, SiS and S3 Graphics.

DirectX 7.0 Compliant Cards

This category includes video cards made from 1999 to 2001. Main features of this generation are: hardware units for Transform and Lightning (T&L) computation, and Bump Mapping support. For example you can think to Radeon 7000, GeForce, GeForce 2, and GeForce 4 MX cards.

DirectX 8.0 Compliant Cards

This category contains graphics controllers made from 2001 to 2003: these have hardware support for pixel and vertex shader up to version 1.3. Ex. GeForce 3, and GeForce 4.

DirectX 8.1 Compliant Cards

This category includes some video cards, mainly by ATI, made from 2001 to 2003 and with hardware support for pixel and vertex shader up to version 1.4. For example Radeon 8500, Radeon 9000, Radeon 9150, Radeon 9250, and XGI volari v3 belong to this set.

DirectX 9 Compliant Cards

This category contains video cards made since 2003. Main features of this generation are: hardware units for pixel and vertex shader up to version 2.0. For example you can think to Radeon 9x00, Radeon Xx00, Radeon X1x00, GeForce 5x00, GeForce 6x00, GeForce 7x00, and XGI Volari V5/V8.

if you want to try using this software you can download it here


read more...

22.2.10

Need maximum speed for firefox?? Try this!!

In the Internet world we certainly familiar with the web browser, there are so many kinds of web browsers available. One of the most popular is the mozilla firefox. We often feel we have a web browser using less than maximum performance, here I have a little knowledge to maximize the performance of mozilla firefox.

type the following URL in your mozilla firefox browser ->> about: config
Discover the following config:

* Browser.history_expire_days_min change the value to 10 (default: 90)

* Browser.sessionhistory.max_total_viewers change the value to 1 (default: -1)

* Network.http.max-connections change the value to 100 (default: 30)

* Network.http.max-connections-per-server change the value to 20 (default: 15)

* Network.http.max-persistent-connections-per-server change the value to 8 (default: 6)

* Network.http.pipelining change it to true (default: false)

* Network.http.proxy.pipelining change * to true (default: false)

* Network.http.pipelining.maxrequests change it to 8 (default: 4)

* Network.http.request.max-start-delay change it to 0 (default: 10)

* network.prefetch-next ganti menjadi false (default: true)

read more...

21.2.10

what antivirus you have used are working properly ?

Sometimes we like to doubt, whether the antivirus is working properly or not, there is a way to test it, consider how:
1. Copy paste the following code into Notepad
X5O!P%@AP[4\PZX54(P^)7CC)7}$EICAR-STANDARD-ANTIVIRUS-TEST-FILE!$H+H*
2. Text should be in a state of Horizontal, turn off Word Wrap on the system you Notepad

3. Then last Notepad Save As, Save As Suppose its name is checkantivirus.com it is an example only, the name can be anything you guys wrote up, an important extension to. Com
4. Some time after you Save the file to your extensions. Com The Antivirus will detect the file as viruses, And When You Do not detect AntiVirus Anything That You Should At AntiVirus Update the virus database, or Replace it with the AntiVirus Over Response.
5. Do not Worry, File What Did You Make Safe, Even if detected as viruses by AV, Text Code All My Love Is Above Standard Text that is used by the developers in particular by the Anti Virus EICAR (European Institute for Computer Anti-Virus Research).
What is EICAR...
EICAR, the European Institute for Computer Antivirus Research, was founded in 1991 as an organization aiming to further antivirus research and improving development of antivirus software. Recently, EICAR has furthered its scope to include the research of malicious software (malware) other than computer viruses and extended work on other information security topics like content security, Wireless LAN security, RFID and information security awareness.

read more...

The easy way to do Blocking Pornography and other dangerous sites

Most of us do not know that OpenDNS has a feature to filter out content based on categories that we expect, in fact it is better to do than rely on software - software such as NetNanny, Cyber Patrol, SurfWatch, CYBERsitter etc..
More because:

We do not need additional software do not need to make a purchase, do not need to download and install special on our PC.

We do not need additional hardware for our squid, do not need to add hard drives do not need to add RAM or a special PC for this.

We do not need to add thousands of Porn Site in the Cache Proxy pornlist us and to update the list every day.

The most important thing is we do not need to sacrifice speed of our internet connection accessibility.

OpenDNS has a service control Caches largest in the world who support the Network and hardware high-capacity, so they are able to resolv very quickly and well.
All you have to do is to change DNS settings on your PC.
OpenDNS capable of blocking access to pornographic sites, and also on phissing domain - domains that we set our biases and trust that our goal of blocking 95% will succeed because OpenDNS to work with St. Bernard Software (a company's Internet filtering Content). Which St. Bernand iGuard Service as one of their products is one - the only system that uses 100% human to review the millions of sites if the site is considered illegal or not.

To use the OpenDNS service you only need to register a user account and it's free and it is so easy to do (go to site search www.opendns.com the link "SIGN IN"). After you register a username and password fill out the email with verfikasi will go into your account email. Click the link in the email that you will be able to use this OpenDNS service.

After you register at OpenDNS Login to Click "Network Tab"
By default your IP address will be detected by this control Open site you need to do hanyalan add labels to your Public IP Address, for example "warnetku" or "office" make sure you also consult the official owner of the IP address (usually your ISP). Then click the "ADD THIS NETWORK". If your IP Address settings are detected.

If you have added your Static Ip Address next thing is to click the "SETTING" to configure filtering. You do bloking biased against porn sites, illegal sites, or sites that SARA will you set yourself.
If Open DNS accidentally Blocking of sites do you hope to stay open, you can go to the link "whitelist" to add your site's domain is expected to remain open is like "youtube.com".
For Dynamic Public IP Address

If you have a Public IP Address or kept changing dynamic or DHCP you a little extra step you must take. The bottom line when your connection is lost for some reason and you are connected again with a different IP address that we need to notify to OpenDNS (do not need the manual of course).

1. Log in to your OpenDNS account. https: / / www.opendns.com / dashboard / signin
2. Sign in to SETTINGS tab, then click "Set Up a Dynamic IP".
3. Check the "Enable dynamic IP update" and then click the Apply button.
4. Register yourself in the DNS-O-Matic account. https: / / www.dnsomatic.com/create/
5. After the completion list and then you have to login to the DNS-O-Matic. https: / / www.dnsomatic.com/account/
6. Click Drop Down Menu and select the OpenDNS from the existing list. You will see the status of "Waiting for first update".
7. Download DNS-O-Matic Updater http://dnsomatic.marc-hoersken.de/files/download.zip
8. Extract and run DNSoMaticupdate.exe
9. Enter the DNS-O-Matic username and password and click Refresh. DNS-O-Matic Updater will shrink in the tray bar. O Right-click the icon and select "Enable Autostart".
DNS-O-Matic Updater will start automatically once Windows on reboot. DNS-O-Matic Updater, will do check your IP address every 10 min. If the DNS-O-Matic Updater detected that your ip has changed and he will make updates to the DNS-O-Matic and DNS-O-Matic to notify changes IP Address you to OpenDNS. You will see a notification box that says "Update process was successful, and your network preferences are applied."
You can make modifications to the Linux server and your Mikrotik to adopt it easily so you can customize for your purposes, or to install OpenDNS one by one on your client PC.
read more...