Headlines News :
Apply to be a Chitika Publisher!

Latest Post

CounterLanguage

English French German Spain Italian Dutch

Russian Brazil Japanese Korean Arabic Chinese Simplified
Google Translate Muhammad Afifudin Aziz
Free Twitter Followers
Showing posts with label ComputerZone. Show all posts
Showing posts with label ComputerZone. Show all posts

Mempercepat Copy Dengan Ultra-Copyer

Written By Unknown on Saturday, April 9, 2011 | 6:39 AM

Bagi para pengguna komputer, mengcopy file adalah proses yang sangat sering dilakukan. Sistem operasi Windows telah menyediakan fasilitas untuk mengcopy file sebagai fungsi standar. Masalahnya, fungsi copy

Hacking Rapidshare Pro

Written By Unknown on Thursday, April 7, 2011 | 8:16 AM

Halo teman,
Semua orang ingin account Rapidshare Premium pribadi tetapi tidak semua bisa membelinya. Jika Anda adalah salah satu dari orang-orang yang tidak mampu atau tidak mau meminta orang tua Anda untuk membeli Anda satu maka hanya ada 2 cara mendapatkan account premium Rapidshare. Pertama adalah untuk hack account premium Rapidshare

Mozilla: Cara Double Login Account

Written By Unknown on Saturday, March 26, 2011 | 7:16 AM

Hmm.,, terkadang jika kita akan membuka account di sebuah browser secara bersamaan memanglah tidak bisa,,,, misalnya kita Online bersama teman dan ingin membuka

Tips Tips Mnjaga Password

Written By Unknown on Friday, March 25, 2011 | 7:16 AM


Password merupakan kode-kode rahasia yang harus dijaga keamanannya. Banyak hal negatif yang dapat terjadi ketika password Anda bocor ke tangan orang lain. Simak 7 kiat singkat untuk menjaganya.

1. Tidak Menggunakan Default Password
Default password adalah password yang kita dapat pertama kali. Password standar ini sebaiknya memang harus cepat diganti lantaran sangat rentan. Pasalnya, default password dapat dicari dengan mudah di google search, bahkan di situ tercantum nama mesin, type dan default password terpampang dengan megah di beberapa situs vendor pembuatnya.

Terkadang administrator takut lupa dengan mengubah-ubah default password yang ada, sehingga seorang penyusup dapat mengambil alih sistem dengan default password.

2.Tidak Memakai Password Hint

Download Tune Up Utilities 2011 + Keygen


TuneUp Utilities 2011 adalah software untuk mengoptimalkan kinerja Komputer atau Laptop. TuneUp Utilities dapat membuat sistem operasi Windows lebih cepat, lebih nyaman dan lebih aman hanya dengan beberapa klik. Dan semua operasi yang dilakukan pada sistem operasi benar-benar aman, karena semua perubahan yang dipantau oleh TuneUp Rescue Center dan dapat dibatalkan kapan saja.
Semua kerja TuneUp Utilities dapat diakses melalui interface umum yang terbagi menjadi enam kategori. Perangkat lunak ini sangat membantu baik bagi pemula maupun yang ahli untuk membuat Windows memenuhi kebutuhan mereka dengan cara yang lebih baik, lebih mudah dan aman. Semua sistem penting dijelaskan dengan cara yang mudah dan dapat diaktifkan atau dinonaktifkan dengan klik dari mouse anda. TuneUp Utilities akan membuat perubahan yang diperlukan dalam registri atau file boot secara otomatis.
TuneUp Utilities secara otomatis menjalankan tugas-tugas pemeliharaan Komputer/Laptop Anda, membuat Anda mengetahui setiap masalah dan menawarkan solusi sederhana. Hal ini menjamin kinerja selalu yang terbaik. Sebuah komputer yang lambat dan berantakan adalah masa lalu untuk Anda. Anda juga dapat menggunakan TuneUp Utilities untuk menyesuaikan tampilan sistem Windows Anda. Klik dibawah ini untuk mendapatkan TuneUp Utilities 2011.


Berikut Link Downloadnya :


Serial Number :

Username: supervergil

Organization: DOUBLE

SN: NB1X2B-NJ53FN-H7E7MK-4ANWFY-JTVPVB-X3NEJH

Source: http://z a i n u l c r 7 [dot] blogspot [dot] c o m

Efek Hujan (Daun Love Salju) Menarik Blog

Written By Unknown on Thursday, March 17, 2011 | 6:28 AM

  • · Login terlebih dahulu ke Blog Anda
  • · Kemudian masuk ke
  • · Pengaturan > Template > Edit HTML
  • · Jangan lupa backup terlebih dahulu template anda, yang belum tahu klik di sini
  • · Setelah itu di halaman HTML, cari kode <head> di bagian atas
  • · nah setelah itu copy kode berikut tepat di bawah tags <head>
Untuk Efek Salju
<script src=’http://devil32.co.cc/titip/snow.js’ type=’text/javascript’>
</script>

Internet, Mesin Mata-Mata Terhebat Dunia

London – Pendiri situs pembocor rahasia WikiLeaks Julian Assange memperingatkan, internet merupakan mesin terhebat mata-mata di dunia yang pernah dibuat. Seperti apa?
Saat berbicara dengan mahasiswa University of Cambridge Inggris, mantan hacker (peretas) ini mengklaim, internet, terutama jejaring sosial seperti Facebook, dapat memberi jangkauan yang lebih besar dalam

Tracking E-ail Dengan Mozilla ThunderBird

Written By Unknown on Wednesday, March 16, 2011 | 9:42 PM

Berikut ini adalah contoh pelacakan atas pengirim email yang dikirimkan dari Account email @GMAIL ke email @YAHOO.CO.ID dengan mengunakan email Client Mozilla ThunderBird. Jika mengunakan email Client yang lain ( Outlook, Evolution, TheBat, dll ), silahkan di Explore sendiri karena tidak terlalu jauh berbeda. Tahapan yang kita lakukan untuk melihat ASAL SEBUAH KIRIMAN EMAIL adalah dengan memanfaatkan fitur MESSAGE SOURCE.

Pertama yang harus kita lakukan adalah melakukan setting email Client seperti biasanya hingga SENT dan RECEIVE email berfungsi dengan NORMAL.


Kedua : Buka atau klik email yang akan di analisa lalu klik menu VIEW terus pilih Message Source, seperti gambar dibawah ini.

12 Free Keylogger & PC Monitor Win7

Written By Unknown on Tuesday, March 15, 2011 | 9:40 PM


Spoofing, spying and keylogging are the words that are always been associated with the hackers and cyber criminals. Based on them, security vendors have specifically tailored their security software. On the contrary to the popular concept, keyloggers are used as a tool to find out what other users do on your computer in your absence, be it at home or office. It is designed for the hidden computer monitoring and to record the activities done at the computer. It logs the sites that are visited, records the key strokes that are typed and when scheduled it takes the screen shot of Windows. Rather it gives you a complete handy solution as parental controls to track your childs behaviour in your absence and check your office employees time wasting attitude. Here’s a list of 12 best free keyloggers for Windows 7. Have a look.

Revealer Keylogger Free Edition
Free and reliable keylogger monitoring tool that logs everything that is typed on your computer, it records every keystroke including passwords and conversations (one side only) in common instant messengers. It’s a simple and very light software with a user friendly interface. It runs in the background saving system resources, no button or icon is present in the Windows Task Bar to ensure invisibility. Revealer Keylogger is surely the easiest and faster way to record keyboard inputs. There is almost nothing to configure, in fact everything is configured internally with the best settings.

Ultimate Keylogger Free
Ultimate Keylogger Free Edition is a free popular all-round monitoring solution. It runs in the background and monitors all typed keystrikes, applications, passwords, clipboard, email, and visited websites’ URLs. You can view the reports as HTML files. Ultimate Keylogger will help you to find out, what exactly took place in the system. You will be able to find out what your children search in the internet, and to check them. You can perform the full control of the computers of your company or enterprise. You will always know about all actions performed by the employees or other people on the computers of your company.

BlackBox Security Monitor
BlackBox Security Monitor is a handy and powerful tool for security monitoring. It is designed to collect information from multiple computers and report it to one central location – on the computer where BlackBoxSecurity Monitor is installed.
Get alerts on programs launched, Web sites visited, keywords detected in Web searches, E-Mails, Web Mails, Instant Messenger conversions, total network traffic etc..


Refog Free Keylogger
Refog Free Keylogger is an opportunity for you to be a good parent and keep an eye on your children. And isn’t it wonderful that your parental duty will cost you nothing this time. Refog Free Keylogger can look after your children without them even noticing. Even technically minded children won’t detect the key logger when it runs in a stealth mode. Refog Free Keylogger removes all the shortcuts and can be accessed only through a hot key combination. Running unobtrusively from the moment the system boots, Refog Free Keylogger keeps track of all typed or pasted text. You can set it to monitor only selected applications or everything that is done in the system.

Super WinSpy
WinSpy is a program designed that helps you find out what’s been done on your computer. With Super WinSpy, You can find out exactly what others have done on your computer , including what web sites they have been, what text, images, movies they have seen. and also what files they opened/saved, what kind of search they have done and what they ran at the start menu. Double click the displayed item will directly open or link to the file or the URL stored on your computer.

Personal Keylogger
The Personal Keylogger application was designed to be a small tool that will allow you to secretly record all keystrokes and other input. All specific instructions are explained in the application. To use this program, you have to agree with the disclaimer shown inside. To exit it and recieve your logs, you will need to enter in your keycode. If you have forgotten your keycode, you will need to restart the computer.

NextGen AntiKeylogger Free
NextGen AntiKeylogger is the next generation anti-keylogger program that protects your data from all types of keylogging programs both known, unknown or being developed right now. NextGen AntiKeylogger uses unique method of protection. It intercepts keystrokes at the lowest possible level, encrypts them and sends via its own protected path directly into the protected application. Thus, by using its own encrypted keystrokes path, NextGen AntiKeylogger defeats all types ofsoftware keyloggers. Moreover, unlike anti-keyloggers which are based on proactive protection, NextGen AntiKeylogger has no false-positives. It works out-of-the-box, requiring no additional configuration! Even inexperienced user can use it. In fact it takes only a few clicks to install NextGen AntiKeylogger. Nevertheless, experienced users will find options they may wish to tune up! NextGen AntiKeylogger Free will provide basic protection free of charge, protecting Internet Explorer, Mozilla Firefox and Apple Safari.

Romaco Keylogger
Romaco Keylogger is a small and easy to use tool that can log all key-presses that are made while it is running, and display them to you in its window. It automatically exports the logged text to a text file every 5 minutes, or manually. It can be hidden at the click of a button, and recalled by vigorously pressing one of the least used keys on the keyboard, the break key.

PyKeylogger
PyKeylogger is an easy-to-use and simple keylogger written in python. It is primarily designed for backup purposes, but can be used as a stealth keylogger, too. It does not raise any trust issues, since it is a short python script that you can easily examine. It is primarily designed for personal backup purposes, rather than stealth keylogging. Thus, it does not make explicit attempts to hide its presence from the operating system or the user. That said, the only way it is visible is that the process name shows up in the task list, so it is not immediately apparent that there is a keylogger on the system.

Koom Keylogger
Koom Keylogger is a simple application which helps users to monitor their PC’s activity. Koom’s insides work by hooking the keyboard, whilst copying any textual data that is entered. The user beforehand specifies a password, that when typed, will trigger Koom to stop and display all the recorded data. This ridiculously simple interface allows swift configuration and deployment, essential to covert keylogging. Koom attempts to strip the concept of a keylogger down to the bare rudiments, ridding flashy animations and hefty price tags, the program doesn’t try to install or make an icon on your desktop, because you can just open it straight of the web or save it locally. Our developers made a special effort to conceal the keylogging process from prying Ctrl+Alt+Delete’s, but if for some reason you forget your password; the program can be terminated from the ‘processes’ tab on the task manager, under ‘Koom.exe’.

Heretic Macro
Heretic is a powerful tool that is able to record user events, such as mouse clicks and keys, into a C/Java-like script, and play that script either once or repeatedly. It has many commands for dynamic pixel-based botting, window based botting, and static botting/macro-ing (i.e. key presses, mouse clicks, mouse moves, and pauses).

Keylogger Douglas
Keylogger Douglas is a totally freeware application which will allow you to spy and monitor any PC from anywhere. Also it takes very few system resources so it causes no suspicious slowdowns.


sources:–
http://www[dot]learnthisblog[dot]co[dot]cc/2010/02/12-free-keyloggers-pc-monitor-tools-for[dot]html 
http://www[dot]learnthisblog[dot]co[dot]cc/2010/02/12-free-keyloggers-pc-monitor-tools-for[dot]html

Tips Cara Log In Aman Email Bebas Hacker

Written By Unknown on Tuesday, March 8, 2011 | 9:38 PM

Setiap kita hendak membuka email sebaiknya kita harus waspada dan berhati-hati untuk tidak sembarangan login di sembarang tempat tanpa mempehitungkan aspek keamanan. Keteledoran bisa saja mengakibatkan password anda dapat diketahui oleh orang lain baik yang berpengalaman maupun yang tidak berpengalaman. Biasanya para hacker/cracker alamat email yang telah berhasil mendapatkan password dan masuk ke dalam email korban akan membaca email pribadi, menghapus email, mengganti setting, mengirim email jahat, bahkan mengganti password dan juga bisa jadi mendelete alamat email anda untuk selama-lamanya. Untuk itulah kita harus berhati-hati dalam menjaga kerahasiaan password alamat e-mail kita.
Ada beberapa hal yang perlu diperhatikan untuk menjaga passwod kita tidak diketahui oleh orang lain :

1. Ganti passwod email anda dengan yang sulit ditebak
Hindari pemakaian password yang pendek dan merupakan kata-kata umum yang terdapat pada kamus, baik kamus bahasa Indonesia maupun bahasa Inggris. Biasanya hacker email akan mencoba satu persatu kata-kata yang berada di kamus untuk membuka email kita. Sebaiknya menggunakan password yang terdiri dari 6 karakter atau lebih. Lebih panjang lebih baik, namun jangan sampai kita lupa dengan password kita sendiri. Kemudian selipkan atau masukkan karakter-karakter yang bukan huruf atau angka ke dalam password kita. Bisa juga dengan mengkombinasikan huruf besar dan kecil pada password.

Fastnet Internet Speed 10 Mbps Unlimited

Written By Unknown on Monday, February 14, 2011 | 6:56 AM

Fastnet Internet Unlimited dengan Speed kecepatan 1.5 Mpbs sampai 10 Mbps. Koneksi Internet tercepat saat ini di Indonesia dan Lebih Murah dari Speedy.
Dapat info dari Vpatrickd yang baru nyambung koneksi internet Fastnet, menurut pengalamannya, koneksi Fastnet lebih cepat dan lebih murah dari Speedy. Berikut sejumlah produk layanan koneksi dari Fastnet:

Product Name Speed in kbps Cable Modem Instalation Fee Price
(excluding VAT) 


* FastNet Express, kecepatan maksimum 1,5 Mbps, dengan harga Rp335.000,00 per bulan
* FastNet SOHO, kecepatan maksimum 1.500 Kbps, dengan harga Rp695.000,00 per bulan (untuk pelanggan kantor/usaha kecil)

freesmsc - free sms - free sms center

Written By Unknown on Sunday, January 16, 2011 | 12:12 AM

This is free amsc update 2011

This is the latest free sms center.
please try, we wait for his report.
for questions please expressed in comments field

 This is the number that update januari 2011

+393358840000025

Working instant on O2 UK, and Vectone NL
i think this working on indonesial provider such as: indosat, im2, telkomsel, 3, axis, ect.

free smsc telkomsel still work

This is the latest free sms center, especialy for telkomsel - indonesia
please try on another cell phone provider, we wait for his report.
for questions please expressed in comments field

this is free SMSC number update january 2011

How to change the SMSC on any Iphone

Want to change SMSC on Your Iphone ?

to use the SMSC iPhone
lately many are asking how do I change sms center on the iphone.
Well this is the way how to change ssms center on iphone


Step 1 - Checking what number is set as your SMS service centre number
Launch your iPhone keypad and type *#5005*7672# Press Call
You will get a response that tells you the number that has been set as your SMS service
Centre number. In all probability, that number is missing or is wrong.


New Computer for Better Performance

Written By Unknown on Wednesday, January 12, 2011 | 7:17 AM


Hi..guys..the picture below is my wish list personal computer : Cryo Extreme. Why? because this PC have all the specification that will support my work as Graphic and Web Designer. This PC is great especially usage for CAD, Drawing & Design. I just want to change my old PC soon because mine is not capable  again for my work..



Computer technologies are growing faster, if you want to always up to date with new software and games, you must always change your hardware every 2-4 years. In one year there are so many new software and game launched, and it was always makes curious

to try the new game or new software that are released. For me, I wish I can buy a faster PC so I can work much faster than before. I believe the software that I use like Photoshop, CorelDraw, Macromedia, etc will work much faster if I using more  sophisticated computer like the picture above .
This also applies to operating system and software that are always being developed.
If you are still using Windows Vista (or Windows XP), now Microsoft have already release new Windows operating system that is Windows 7 Beta. And off course new operating system usually require more advance hardware.

Change Registry for more rapid, attractive, and efficient

AUTOCLOSE MANIPULATION PROGRAM Not Responding This manipulation serves to close the program Not Responding automatically. HKEY_USERS, Default \ control panel \ Desktop Value Name: AutoEndTasks Data Type: String Value Data: 0 = display, 1 = hide 
MANIPULATION DEVICE MANAGER TAB The purpose of this manipulation is to conceal the Device Manager computer so that others can not see it. HKEY_CURRENT_USER, Software \ Microsoft \ Windows \ curre ntVersion \ Policies \ System Value Name: NoDevMgrPage Data Type: DWORD Value Data: 0 = display, 1 = hide 


MANIPULATION TAB CHANGE PASSWORD When your computer is on, other people get to change the password kompie loe. Therefore, use this manipulation to make hide Tab Password Change the password can be changed loe kagak anyone else. HKEY_CURRENT_USER, Software \ Microsoft \ Windows \ curre ntVersion \ Policies \ System Value Name: NoPwdPage Data Type: DWORD Value Data: 0 = display, 1 = hide 

Forgot Password Winrar Download

Winrar + Pass
You download a file, after you finish downloading, then you open the file, but it turns out the file via password protection. The problem you do not know the password file, probably because you forgot to record the password file, or indeed on the site does not list what's the password!

Well for those who experience the problem, do not worry, try the following steps

Case in point:

==> Unknown:

     * I have finished to download a file called "Internet Download Manager 5.19.rar."
     * Files that have the password but I do not know what the password

Problems in Windows Explorer

Pttp://x7computerzone.blogspot.com/2011/01/you-may-experience-problems-in-windows.htmlThe problems that the "Symptoms" section describes are specific to security update 908531 (security bulletin MS06-015) and can be prevented by installing the new version of security update 908531 (security bulletin MS06-015) that was released on April 25, 2006. This update is available from Windows Update, from Microsoft Update, and from Automatic Updates if the identified third-party Component Object Model (COM) controls are installed. This new update is also available from the Microsoft Download Center.

Microsoft Update Windows
If you have the new update and are still experiencing a problem that resembles the one that this article describes, it may be a different problem. To troubleshoot similar problems, please see the "Similar problems and solutions" section.

If you cannot install the new version of security update 908531 (MS06-015) that was released on April 25, 2006, see the "Steps to resolve this problem" section for instructions on how to manually add the HP Share-to-Web software or the NVIDIA

tracking Service JustSpotted and Twitter Separated

Written By Unknown on Tuesday, January 11, 2011 | 11:57 PM

 Microblogging giant Twitter on Friday announced that they are cutting the chord of celebrity tracking platform JustSpotted off from Twitter. According to Twitter, they are cutting the chord of JustSpotted off from a series of "tweets" that may possibly be added up to give the whereabouts of the stars.

JustSpotted will initiate in the next week probably Tuesday and it will be launched with an online Map that precisely locates celebrity sightings and locations lively. It uses updates from social networking domains like Twitter, location based check-in facility like Four Square and Facebook.

A theme should not make your system out of tune


Every one of us wants to make our screen look stylish, jazzy and something that reflects our own style. This is how the concept of theme comes in to picture. Find out all about Windows 7 themes and get one for yourself.

There are millions of Windows 7 themes floating on the internet and most of us double click them without prior thinking but wait, you might run into some risks. If you do not carefully understand which themes and what you are downloading, it would create trouble in your work.

The two types of themes in broad terms :

 
Support : Creating Website | Johny Template | Mas Template
Copyright © 2011. ComputerZone - All Rights Reserved
Template Created by Creating Website Published by Mas Template
Proudly powered by Blogger