Thursday, October 28, 2010

Removing Impressions On Computer

You must have experienced when typing the word in google search box is the word the exit. If you're new to use computer or internet play, definitely confused how to eliminate them. After using the computer, we must leave a trail. If the trail is not too important, it would be safe. Very dangerous if the trail left by the things
very personal. Other people can open and do anything with information that we leave behind. Indeed, manually can be overcome. But, of course it will take a rather long. To save time, of course, need an application to clean up all the tracks that we leave behind after using the computer. One application that can be used for free is PrivacyMaster. This application able to clean the trail when we use windows and browsers (Internet explorer or firefox).
How to use:

Restoring Files Affected Virus

Files infected with the virus must be very annoying. For those just learning the computer, of course, will make it very panicky. Actually, the virus hides only the original files we, do not delete them. Files shown is the result of duplication created by the virus with the extensions that have been changed by it, while the original files changed its attributes into the file system so that it becomes super hidden. Although modified in the folder option to enable show hidden files and folders, but still not visible.


To view them, do the following:

  1. Open windows explorer.
  2. Click the Tools menu> Folder Options.
  3. Click the View tab. Remove the tick the Hide protected system files (Recommended).
  4. From the warning that appears, click Yes.
  5. Click OK.
  6. All files and folders are hidden viruses will be seen faintly; We can normalize all the files and folders are hidden by the virus,To restore the file, how: Remove virus with existing anti-virus, for example:

Instruction set on Computer Organization

The quintessential definition of a computer’s architecture is its “instruction set.” The actual list of things
the computer hardware can accomplish is the machine’s instruction set. Given the wide variety of computer
applications, and the sophistication of many applications, it can be surprising to learn how limited and primitive the instruction set of a computer is. Machine instructions include loading a CPU register from memory, storing the contents of a CPU register in memory, jumping to a different part of the program, shifting the bits of a computer word left or right, comparing two values, adding the values in two registers, performing a logical operation

Wednesday, October 27, 2010

About Computer Organization

Most computers today operate according to the “von Neumann architecture.” The main idea of the von
Neumann architecture is that the program to be executed resides in the computer’s memory, along with the
program’s data. John von Neumann published this idea in 1945. Today this concept is so familiar it seems self-evident, but earlier computers were usually wired for a certain function. In effect, the program was built into the construction of the computer. Think of an early calculator; for example, imagine an old hand-cranked mechanical calculator. The machine was built to do one well-defined thing. In the case of an old hand-cranked calculator, it was built only to add. Put a number in; crank it; get the new sum.

To subtract, the operator needed to know how to do complementary subtraction, which uses addition to
accomplish subtraction. Instead of offering a subtract function, the old calculator required the operator to add
the “ten’s complement” of the number to be subtracted. You can search for “ten’s complement” on Google to
learn more, but the point for now is that early computing devices

Algorithm to recognize familiar

DEFINITION OF AN ALGORITHM

An algorithm is a method for solving a class of problems. While computer scientists think a lot about
algorithms, the term applies to any method of solving a particular type of problem. The repair manual for your car will describe a procedure, which could also be called an algorithm, for replacing the brake pads. The turn-by-turn travel instructions from MapQuest could be called an algorithm for getting from one place to another.

EXAMPLE—DESIGNING A STAIRCASE
You may be surprised, as we were, to know that every staircase must be custom-designed to fit the circumstances of total elevation (total “rise”) and total horizontal extent (total “run”).

Tips and triks Fedora Core

When login forgot root password

  1. Sign in boot loader
  2. In Fedora Core. . . e type
  3. In the module. . . type e, and the end of the sentence type <space> 1, then enter
  4. In the module. . . type b
  5. In single user mode type password and enter a new password, then type exit

When login forgot password eliminated root and Linux single

  1. Sign in boot loader
  2. In Fedora Core. . . e type

Monday, October 25, 2010

More tips and triks on windows xp

4tatc and More tips and tricks on windows xp.

Unlocking WinXP's setupp.ini
============================

WinXP's setupp.ini controls how the CD acts. IE is it an OEM version or retail? First, find your setupp.ini file in the i386 directory on your WinXP CD. Open it up, it'll look something like this:

ExtraData=707A667567736F696F697911AE7E05
Pid=55034000

The Pid value is what we're interested in. What's there now looks like a standard default. There are special numbers that determine if it's a retail, oem, or volume license edition. First, we break down that number into

Protocols Computer and Protocol Architecture

The transfer of a file between two computers.
There must be a data path between the two computers, either directly or via a communication network. But more is needed. Typical tasks to be performed are :
1. The source system must either activate the direct data communication path or inform the communication network of the identity of the desired destination system.
2. The source system must ascertain that the destination system is prepared to receive data.
3. The file transfer application on the source system must ascertain that the file management program on the destination system is prepared to accept and store the file for this particular user.
4. If the file formats used on the two systems are incompatible, one or the other system must perform a format translation function.

 It is clear that there must be a high degree of cooperation between the two computer systems. The exchange of information between computers for the purpose of cooperative action is generally referred to as computer communications. Similarly, when two or more computers are interconnected via a communication network, the set of computer stations is referred to as a computer network. Because a similar level of

Tips and triks Computer Science



Remove the Username and picture from Windows XP New Start Menu

The User account picture can be removed by turning off the Welcome Screen. Or, by switching to Windows Classic theme. Follow the method described in this article if you want to remove the username and picture from the Start Menu, without disabling the Welcome Screen and Windows XP Theme.
For those who want to remove the user name and user account picture from Start Menu, in order to have a blank blue panel at the top, try this:
Start Windows Explorer and go to this folder:

C:\Documents and Settings\All Users\Application Data\Microsoft\

Saturday, October 23, 2010

Tutorial how to Install Windows Vista

Before performing the installation of Windows Vista, should we check our specifications or Notebook computer first. For if our computer specs are not in accordance with the requirements of Windows Vista, the installation of windows vista that we do will be in vain.

Okay, specifications or Notebook computers are good in installing windows vista is as follows:
  1. Processor: Should the above 500 Mhz;
  2. Memory: 512 MB is already possible, but so easy to run Windows Vista should use memory that it's 1 GB and over;
  3. Hard Drive Capacity depends on what application program and how much that will be installed. Therefore, here I directly provide a way out, you should use a hard drive over 45 GB in size to drive the program;
  4. Type we need here the hard drive can be IDE and AHCI.

The fourth specification that is what we need to consider in our computer or notebook. If it has fulfilled the

Wednesday, October 20, 2010

Know Your Mandrake Linux Distibutions



Mandrake is a distro made in France that is considered most suitable for use by the users of Personal Computers (PC) in homes, because most easy to use and more user friendly than other distros. Windows users will not be difficult to adapt to Mandrake. The latest version of this module has been written is Mandrake 10.0, which has been developed in such a way that is

Saturday, October 9, 2010

The notion of informatics

Initially, the information conveyed through direct conversations, speeches, or chat. Then indormasi stored in benruk writings, graphics, or images, and conveyed indirectly. Storage is then evolved with the use of recordings suaram movies, and video. Rapid development of computer technology and its integration with the communication technology to produce management and transmission of information in large scale and high-speed and then enter the era of information (information age) that have a similar impact with the industrial revolution in the early 20th century.

Today many developed countries, especially the United States, has specializes in information processing for export. The development of traffic information reflects the role of informatics from time to time. Why science informatics or change information learned?

Understanding viruses on computers an laptops

In this article, i will write about, what is the virus? What adverse effects the virus on your computer or laptop? How does the virus work? The answer to that question i mentioned it in this article.

A virus reproduces, usually without your permission or knowledge. In general terms they have an infection phase where they reproduce widely and an attack phase where they do whatever damage they are programmed to do (if any). There are a large number of virus types. Viruses are a cause of much confusion and a target of considerable misinformation even from some virus "experts."

Outline and performance human-computer interaction

In the previous article has described the understanding and recognition of human-computer-interaction. At this time I will give a brief article about how the performance and the outline of the human-computer-interaction.
Perhaps many people are wondering, how does the performance and the outlines of the human-computer interaction? Let us consider carefully together with an outline list and following his performance.

  1. Outline the constructionist theory of perception and explain how it has influenced Human Computer Interaction designers.
  2. Outline the ecological theory of perception and explain how it has influenced Human Computer Interaction designers.

Friday, October 8, 2010

Introduction to human Computer Interaction

What the meaning of Human Computer Interaction?
Human–computer interaction is the study of interaction between people (users) and computers.
It is often regarded as the intersection of computer science, behavioral sciences, design and several other fields of study. Interaction between users and computers occurs at the user interface (or simply interface), which includes both software and hardware, for example, general-purpose computer peripherals and large-scale mechanical systems, such as aircraft and power plants.
"Human-computer interaction is a discipline concerned with the design,

Details of the test program in C programming language

On the last occasion, I've given the article how to make a simple program with C language, but then I have not provided details of the test program understanding about the commands that I use in making program. Therefore, in this article I will write down the details of the test program.

#include <stdio.h>
Tells C compiler to include the file "stdio.h" in this point of your C program before starting
compile step. This "include file” contains several definitions, declarations etc.

Full Tutorial Photoshop (in Indonesian)


Tutorial Photoshop Membuat obyek sederhana
Membuat segi empat

1. Pilih Rectangle Marquee Tool.
2. Drag-lah sehingga membentuk segi empat.
3. Untuk mewarnai segiempat tersebut gunakan Paint Bucket Tool. Caranya klik Paint Bucket Tool, lalu klik pada area segi empat tersebut (ditandai dengan garis putus-putus).  
4. Untuk membuat gambar seperti di bawah ini, caranya : seperti langkah 1 dan 2 di atas. Setelah itu klik menu Edit
> Stroke. Pada text box Widt Isi dengan (misalnya) 3. Klik OK.
   


Thursday, October 7, 2010

Create a blog/web-blog at Blogger.com

Hi guys,if today you still do not have their own web-blog, then immediately make it. Because with a blog or a web-blog we can pour our heart's content, a great ideas for making dishes, share knowledge, we can even make money through blogs. You do not need to be confused how do I create a blog and where we create a blog later. Okay, now I will give you the steps to create a free blog at blogger.com. If you watch carefully the steps to create a blog on blogger.com is well, then you can create your  own blog.

How to Add Gadget on my blog?

Welcome back my friends. At this time I will write an article about adding a gadget or a widget on your blog (Blogger). I wrote this article specifically to friends who do not know how to do add a gadget or a widget on Blogger.com. In this tutorial, other than telling me how to add the gadget, I will also explain what is the use of gadgets of every base that will be used.
To be able to add the gadget, you must first go to your blog via your blog accounts of each. Once you are logged into your blog, follow the 3 steps below that I show through pictures:

The Basics of Java Script

Preliminary
JavaScript was first introduced by Netscape in 1995. At first the language is called "LiveScript" that serves as a simple language for the browser Netscape Navigator 2. In those days a lot of criticism of this language because it is less safe, which impressed the development rush rush and no error messages in the show every time we make a mistake when preparing a program. Then, in line with being jealous of cooperation between Netscape and Sun (the developer programming language "Java") at the time, then Netscape gave the name "JavaScript" to the language on 4 December 1995.

Tuesday, October 5, 2010

History of Virus-Part 2

Elk Kloner 
In 1981, a program managed to become the first epidemic. This program is only attacking Floppy containing the Apple II operating system. This program will display a message at certain moments. 


It will of get on all your disks 
It will of infiltrate your chips 
Yes it's Cloner! 
It will of stick to you like glue 
It will from modify ram too 
Send in the Cloner! 


Programs created by a student named Richard Skrenta, called Elk Kloner. This program will be attached to the computer memory and when to find an uninfected floppy then this program will menularinya with the virus.

Set Haier C700 Smart Modem in Ubuntu 9.10


Welcome 4tatc all friends, here I will write an article about how to configure hp smart Haier C700 modem in ubuntu, I wrote this article because of my many friends who ask smart questions about the settings in ubuntu. Then I started to learn step by step and finally I found.

How do I set Haier C700 Smart Modem in Ubuntu 9.10?
To use Smart types Haier CDMA modem in Ubuntu 9.10 Karmic C700 Koala, follow these steps (copy-paste the commands here to the Terminal, the contents of the password when prompted):

Finding lost files on the computer



When the computer is infected with a virus, then the first solution is to restore the computer system. If you save a file or document of value to you in Drive C, then your data will be lost when you restore the system, because after the restore is done then your system will be back just like the first time you see your computer when you buy new.

Sunday, October 3, 2010

History of Viruses - Part I

In 1949 a creator of computer Automatic Computer Electronic Discrete variables (EDVAC), John Von Neuman reveals Theory and Organization Of Complicated Automata, a research mathematicians. At that time, Neuman thinking how to make a computer program that can make copies of itself. But these thoughts are not addressed by other math experts at the time, this is because the theory presented Neuman still considered far too difficult.