2009-04-28

how to display the back regedit

It is very frustrating when we are exposed to computer viruses. Moreover, the virus makes the computer to become slow or sudden error. As the story of one of my friends where regedit, msconfig, task manager on his computer suddenly lost because of virus. How do I restore it?
Below how to restore it.
1. Open notepad from start menu.
2. Copy the code below.

[Version]
Signature=”$Chicago$”
Provider=Vaksincom

[DefaultInstall]
AddReg=UnhookRegKey
DelReg=del

[UnhookRegKey]
HKLM, Software\CLASSES\batfile\shell\open\command,,,”"”%1″” %*”
HKLM, Software\CLASSES\comfile\shell\open\command,,,”"”%1″” %*”
HKLM, Software\CLASSES\exefile\shell\open\command,,,”"”%1″” %*”
HKLM, Software\CLASSES\piffile\shell\open\command,,,”"”%1″” %*”
HKLM, Software\CLASSES\regfile\shell\open\command,,,”regedit.exe “%1″”
HKLM, Software\CLASSES\scrfile\shell\open\command,,,”"”%1″” %*”
HKLM, SOFTWARE\Classes\regfile\shell\edit\command,,,%SystemRoot%\system32\NOTEPAD.EXE %1
HKLM, SOFTWARE\Classes\regfile\shell\open\command,,,regedit.exe “%1″

[del]
HKCU, Software\Microsoft\Windows\CurrentVersion\Policies\System, DisableRegistryTools


3. Save this file to any extension provided with the Inf. This file can be stored anywhere. And
try to put on the desktop so that it is not difficult to find.
4. Run this file.
5. Restart the computer after running the file.

Keep in mind that this is only to restore regedit, msconfig, and task manager only, and not remove the virus. To remove the virus with anti-virus only. Hopefully useful.

2009-04-23

hackers become security consultant?

You know what the hacker? Hacker is someone who is learning, to analyze a computer device, be it hardware or software programs such as computer, administration and also other things, especially security. In addition, hackers can also create, modify, or even exploit the system's computer device.

Previously, a hacker is among the members of student organizations Tech Model Railroad Club in artificial Intelligence Laboratory Massachusetts Institute of Technology (MIT) in 1960. The student group is one of the pioneering development of computer technology and especially their work with a number of Mainframe computers. However, at this time, hackers have a negative view of the deeds that hackers cause damage such as changing the appearance of a web site, insert the virus code and so forth. The hackers use the midst of security has not been fixed by the software (bug). Although it looks different that done by hackers with the past now, but they still maintain a system of analyzing culture.

However, at this time can not be said hackers virtual villain who must fight in the book. The existence of the hacker can not be said for any loss technology. Thus hackers can be said is one of the key developments in the world. As the story of one of the hackers who penetrate this data on 1.3 million computers worldwide. He is Owen Thor Walker, New Zealand hacker origin. Precisely in the year 2007, the hacker by the name of fictitious AKILL is also evident damage to computer systems and entrance through a number of bank accounts and steal funds more than 1.3 billion dollars. At that time, the new Walker aged 18. He is also a search by FBI.

Finally, he was arrested and pleaded guilty on the crime that he do. However, the punishment that he received only a fine and banned the use of computer. Case was conducted by the court, because they fear will damage the great potential that is owned by Walker if he was in criminal law. Then, a group helping with the Walker pay fines and return the money so that they can claim on Walker revoked and he was released.

Now he be as a cyber security consultant by TelstraClear, the second-largest telecommunications company in the country, New Zealand. TelstraClear is the son of Australia's largest telecommunications company, Telstra. "We believe Walker has the ability to assist senior executives and customers understand the security threats that can attack their network," said TelstraClear spokesman Chris Mirams to the National Radio in Wellington, Wednesday 25 March 2009.

Mirams also said Walker had some counseling and providing advice to managers and security staff TelstraClear. Walker also participated in the program ad TelstraClear. "Walker tells what are the cyber criminals and how to fortify their networks from threats that," added Mirams.

Some of the many hackers send electronic mail to the company's computer system or the government so that the excess capacity of the mailbox and enter the system.
There are also other uses hacker techniques botnet, which is trying the computer and combine hundreds of computers in a kluster that have centralized control.

Then the hacker can use a combination of the computer to steal credit card information, manipulate stock trading, computer systems and destroy an industry.

Thank you have visited.




2009-04-18

lectures from youtube?

Lectures are usually held on a campus where lecturers teach the course material to students. But, if ever made an online lecture on the internet? Precisely in the countries the United States have started a course in EDU channel on YouTube. More than 100 universities in the United States including Stanford, MIT, Havard, Yale and UC Berkeley. Most of the universities are working together to provide specific information about the school as a virtual campus tour and other promotional materials.

Although the new phase, the existence of this channel EDU will open the opportunity that is every time the university began offering digital copies of the course online. So, those who do not have the money to pay for college can get the education. this is incredible ..

"There is great desire on the citizens of the world to improve the quality of himself, one of which is to learn things that they may not have learned or have not they know," said Obadiah Greenberg, Strategic Partnership Manager, such as YouTube VIVAnews quotation from TGDaily, 13 April 2009.

According to Greenberg, this online course trends have started to develop. Because the cost to go to a lecture often physically not affordable by people who can not afford or who live from hand to mouth, even some university tuition has reached 100 thousand U.S. dollars for four years, universities such as MIT OpenCourseWare has launched a program to bring most of the lectures their online and free. While this idea has spread wide, from MIT to YouTube now present.


Most of the university may not be ready to make a system such as the online lectures to the internet for various things, one of them is financial. However, the fact that the information era has changed the world, in the near future, campuses were forced to have to do it that. Now the technology not be imagined 10 years ago as the infrastructure to stream video lectures directly to every house in the world is available. And once the video lectures are recorded, the video will be available forever.

Government support is needed in this case. Given the knowledge at this time growing rapidly. And also for increased human resources, especially in developing countries. Hopefully this article useful to all.


Want to start studying? Please select the campus here.

2009-04-10

how to earn money from ziddu

Do you know how to make money from ziddu? Yes, you can be in addition to hosting files for free, you can also make money. How?

You must have an account in ziddu. If you do not already have an account, please list here. If you have registered, you will be required to upload your files. Please upload the files you what.
How many files can be stored in a Ziddu?
In this case Ziddu not make the rules of how many files you saved (uploaded), it can be unlimited. You can also upload multiple files at once with the facilities' Multi Upload '.

What type of file that can be saved?
All of the files can be stored here, including documents, songs (MP3), videos, and photos. Ziddu provides features folder, you can share files that you save (upload) in ziddu based on the desired category. In addition, ziddu also provides the album to store photos, songs, and videos.

How do you get paid?
Ziddu will pay you a minimum income after you reach 10 or $ 10,000 worth of the download time of one or several files. Can not use one IP only, if only because only one IP that you download the file, it will ziddu suspicious and block your account. Payment is made through paypal. Payments will be processed every 10 each month.

The advantage that we get in ziddu.
If you are someone who works as a remote and moved, sometimes you forget or do not bring flash. Solutions Ziddu file hosting such as this is right for you. You can put files that you often use in ziddu (if the file is confidential, you can use a password and zip-in), if ever forget, you only need to download on a computer that has Internet connection only.

In addition, Ziddu is also used to backup facilities for those who do not have a large storage space or as a backup (secondary backup) when the data in the backup accidentally damaged, lost or erased.

What ziddu have any affiliate programs?
Ziddu affiliate program also provides for the accounts. You will get a bonus of $ 0.1 if service Ziddu distribute to friends or other people. Bonus will be awarded after direct referral you upload at least one file.


hopefully useful.