Computer Tutorials | Infotech | Software | Games | Ebook | Tips & Trick Blogger


English | Avi | Xvid | 800?600 | 14fps | 4:3 | 1031Kbps | Mp3 352Kbps 22050Kbps | 1.4Gb
Genre: Video Training

Must-Have for Computer Users who are familiar or not with basic and advanced features of a desktop or a laptop!This is a computer training session that was produced by Chris Hardwick using desktop sharing software. This is geared for everyone, from the new computer user through the intermediate and advanced user. All training is done with a Windows system. There are seven lessons for a total of 3.5 hours. See contents on next page.

Get Favicon of Any Site

Do you Like Favicon of Your Friend Site ?

Wanna Favicon just do this:

Replace: with any other site name


Protect a Pen Drive with Rohos Mini Drive

The first thing we'll see how the method is to put a password to your pendrive.

What this program does is create a virtual partition on the pendrive, which is hidden until they run an executable file that is in the USB stick, and we asked a password to access the contents of the virtual partition.

This password is the one we have put to create a unit hidden in the pen, and that is what leaves the door open, leaving visible in Windows Explorer to our unit.

We will explain the process step by step to understand it better.

Create a hidden partition on a Pendrive:
* Once we have finished installing Rohos Mini Drive, open it and we went to set the USB key.

* It opens a window which will depart in 3 sections:

1: Path of the unity of origin Pendrive: Select the drive that corresponds to our memory stick.
2: Setting the partition to create the pendrive (leave the default)
3: Create password for Pendrive is the key we ask that the executable will create the pendrive in order to access their data.
* Once the program has finished creating the partition on the pendrive, appears in this image that shows the name of the new virtual disk (Disk F), which is the drive on which stores all content.

* Now click on disconnect and close the application.
* Open Pendrive and unity as we go beyond the data we had stored, an executable file called Rohos mini. If you execute it, we see an opening screen asking for the password to access the virtual drive F:

* By entering the password, look as it appears in Windows Explorer drive F, which is the virtual drive that we have to save protected documents created in the pendrive.

From here, every time you run your pen on any computer, only you can view the content of this unit using the password secret. So if someone grabs you borrowed your pen, you can not in any way accessing this information.

You can change the password from the program Rohos pendrive and also allows you to increase the capacity of the virtual drive, delete it, create backups, etc...

Download Rohos Mini Drive 1.19

S60 Programming A Tutorial Guide - Paul Coulton

Based on the authors' experiences in developing and teaching Symbian OS, this practical guide is perfect for programmers and provides a series of example-based scenarios that show how to develop Symbian applications. - Exercises walk the reader through the initial development of a console-based card game engine to a graphical user interface(GUI)-based, two player blackjack game operating over a Bluetooth connection between two mobile phones.

- Addresses how Symbian offers a number of different variants to allow for different user interfaces and screen savers - the most prevalent of these is S60
- Discusses how the move toward 3G technology has resulted in an increasing need for mobile application development for S60 devices.

Change Folder Background in Windows XP

Ever wanted to change background of image of some folders when you viewed them in your file browser? There is a simple hack available to do this.

We takes no responsibility if this method doesn’t work as expected or causes any damage to your computer or data so try at your own risk.

First Step:
- Open Explorer window and go to folder you want to customize.
- Click on Tools > Folder Options
- In the View tab under Advanced Settings check the radio button that says Show hidden files and folders.

Folder options dialog box in windows xp
Click Apply and then Ok.

Second Step:
- Now in the folder, right click and select Properties.
- Properties dialog box would appear. Click on Customize tab there under customize menu click on Change icon button and select an icon for your folder.
- Press Ok.

Third Step:
- Previous process should have created a “desktop.ini” file in your folder.
- Sometimes this file remain invisible so if you can’t see it don’t worry it is there.
- Open this file with Notepad if the file is invisible go to folder and manually type desktop.ini in the filename field to open it.
- Add these lines of code in your “desktop. ini” file


- In this code line IconArea_image tells your explorer window to display a background image. In this example we are using Greentone.bmp you can change it with your image and provide the path to that image.
- Save “desktop.ini” file.
- Refresh the folder.

Now u can see your favorite image in your desktop background.

Fresh RAM v5.0.0

One of the main conditions of comfortable work with computer is a fast response: applications should run in a second, files should be opened in a millisecond, most of functions should be performed immediately; and the fast response of the operative system in applications highly depends on the amount of free memory system can use.Fresh RAM is a software which can effectively improve the situation, optimizing the ways your system and applications are using memory, and, therefore, fastening entire work without any additional hardware expenses.

Fresh RAM has fast and complicated memory analysis algorithms under the hood; but the appearance of the software is simple, understandable and attractive: you always see the overall situation about your systemmemory , you can select analysis algorithm complexity (speed vs. effectiveness selection) and run optimizations; in a few minutes you’ll feel howfresh the air in your system is — all running things are running like a breeze! In addition, this application also includes several Microsoft Windows XP tweaks, which will help you optimize the performance of your computer.But that is not all!Fresh RAM takes memory optimization to the next level, and with version 5.0, we have also integrated customizable automatic memory optimization options as well as Process RAM Usage Identifier. The Process RAM Usage Identifier will help you understand which applications consume the mostmemory and how to control them, while the automatic memory optimization options will make sure that free memory is always available for when you need it the most.

Transfer Emails from One Gmail to Another Gmail Mailbox

If you have two gmail accounts and would like to stop using the old account, you probably will encounter the problem like how to import mails from the old gmail mailbox to another one. Gmail has provided a great feature that allows users to import emails from another mailbox so that you can still keep your important mails in the new gmail mailbox by following the below steps.

1. Login to old gmail account that you would like to transfer mails over to the new gmail account. Click on Setting, then choose Forwarding and POP/IMAP. Under POP Download section, select Enable POP from all mail. Click Save Changes button at bottom to save the setting.

2. Login to new gmail account. Click on Setting follow by Accounts. Under Get mail from other accounts section, click Add a mail account you own link.

3. At the pop up window, type your old gmail address and click Next Step button.

4. On the next screen, type the old gmail password, then select at POP server drop down list. Click Add Account button.

5. You will be asked if you want to send email from this new gmail mailbox using old gmail address. Tick Yes if you want to or else just tick No.

6. If you choose yes, then you will be requested to type your preference name for the old gmail address. If you would like to use old gmail address whenever reply an email from this new account, then click Specify a different “reply-to” address link and enter the old gmail address. Click Next Step button to proceed.

7. Click Send Verification button and gmail will send verification code to your old gmail account. This is to verify if you are the owner for old gmail account.

8. Go to your old gmail account, copy the verification code and paste it into the text box, then click Verify button.

Once you have completed all the above steps, your new gmail will start importing all mails from old gmail account. It will take some times to complete the mails transfer depending on your emails’ capacity.

Google's Body Browser is a Google Earth for Human Physiology

Google has mapped just about every traffic artery you could ever want to locate on Google Maps, but what if the thruway you’re looking for isn’t on any road atlas? To help you tell your axillary artery from your common carotid, Google has created a G-Maps-like search-able guide for the human body that lets you zoom, scroll, and search for every muscle, gland, nerve, bone, or organ in our common physiology.

As far as handy Web apps go, Body Browser is pretty neat; a sliding scroll bar allows you to peel away layers of the body, starting at the skin and moving down through the muscles and bone/organs to the cardiovascular and nervous systems. It allows you to zoom in tight (with nice resolution) to get the name of a specific bodily bit. Clicking on anything produces a handy label that identifies what you’re looking at.

Then there’s the search function of course, which allows you to locate any part of the body by just typing in the name. Like your usual Google search, the drop down is self-populating, so even if you’re not quite up to speed on the spelling of “anterior cruciate ligament,” the app will still help you find it. Perhaps best of all: no plug-ins. No Flash, no Java. The application runs right in any WebGL supported browser. It can still be a little cumbersome – if you’re not zoomed to exactly the right level in some cases (navigating the brain is a good example) it won’t always let you click on the right object – but overall it’s a pretty smooth experience.

Of course, not every browser is WebGL-enabled, but Chrome 9 Beta and Firefox 4 beta are, and both are available for download. Body Browser hasn’t landed in Google Labs just yet, but you can take it for a spin around your insides now through the Google Operating System blog. Barring that, you can get a somewhat rough tour via the video below


Copy Protect 1.1.0

Copy Protect is a copy protection software program that lets you prevent illegal copying of your media files. The program supports most audio, video, document and picture file formats. Copy Protect works by converting your media files into executable applications that run only in the drive they are made for.

A copy protected file is useless and won’t run if copied and executed from another drive or computer, thus preventing illegal distribution. Copy Protect applies hard-core patent pending technology which ensures complete copy protection of your files.

Download here

Create Personal Drive on PC (Windows Only)

If want to have your personal folder in My Computer

Do this :

Go to c drive
Create a new folder (ex: Test)
Now go to command prompt and type :

subst h: c:\Test

now go to My Computer and check it..........

To remove the drive :

Go to command prompt and type :

subst h: /d

3 Ways Protect Your USB Pen Drive From Virus

Do you use a Pen-Drive for transferring data across different systems in your office/network, then there is a high possibility of virus infections for transferring across with the pen-drive as a medium.Here are collection of freeware tools that you could as your first line of defense before using your pen drive on other systems.

1. USB Write Protector

This freeware application prevents write access to a USB drives. This will protect USB drives from viruses, malwares, spywares etc.Using this tool you can just copy data from your pendrive to the system but not copy data into the pen drive from the client system.Its only 190 KB and works with XP with SP2.


2. Portable Antivirus Solutions

# It is a standalone application, which means incase you want to copy a file to your pen drive, you will have to manually scan the file for infection using the tool.
# Update the virus signature from the regularly updated Virus Database directly from the USB.
# It also detects spyware.
# It takes about 25 MB after installation on to the USB drive.


Dr. Web CureIt

In case the file you want to copy into your USB pendrive is infected with a virus, drweb-cureityou can try to cure/clean the infection from the file using DR. Web CureIT, An anti-virus and anti-spyware utility and works on windows 95 to Vista.You cannot update its definitions but instead download a new Dr.Web CureIt! package


3. USB Firewall

USB Firewall automatically detects malicious autorun.inf file when an infected USB device is infected, you can also see what command are written in the autorun.inf file which launched the program and decide whether to let it run or delete the file and the file autorun.inf which launched it.

Disable Access to USB Flash Drive on PC

Step 1: Go to Start > Run > and type in regedit and press enter.

Step 2: Locate the following key:


Step 3: Now on the right side double click on the value called Start & set it value to 4 & click OK.

Thats it. You have succesfully disabled access to the usb flash drive.

When you need to use your usb flash drive just change the value of Start to

3.If you're too lazy or newbie just copy & paste these codes into a notepad file and save it with a .reg extension.

Code to Disable access to the usb mass storage drive :
Windows Registry Editor Version 5.00


Code to Enable access to the usb mass storage drive :
Windows Registry Editor Version 5.00


[FSC] Naild - RELOADED (PC Game)

Nail'd is a racing game that is all about eschewing boring realism for over the top arcade fun. It's a racer that challenges everything from player reflexes through to the rules of physics. Riding on ATVs and motocross bikes with powerful boost controls, players will race down near-vertical courses of incredible jumps, stunts and obstacles. The brutal challenge of the Yosemite National Park is but one of the places they'll learn the meaning of verticality. Nail'd's single-player campaign features various configurable modes and races including Tournament, Time Attack and Quick Event. The multi-player mode allows players to compete head to head in a range of race-types with multiple mutators, locally or online. Earned points will determine a player's position on leader boards and based on the player's performance and ability to pull off stunning feats of speed and glory during each race, they'll unlock exciting new components to customize their vehicle.

* Different classes compete simultaneously on the same track
* Multiplayer - up to 12 players
* Extensive Online options - leaderboards, achievements
* Unique original soundtrack that brings across the vibe of the game, from members renowned bands such as Deftones, Fear Factory, Hatebreed or Static X, created specifically for nail'd
* 14 unforgettable tracks in 4 exciting locations

System Requirements:
o OS: Windows XP (with SP3)or Windows Vista (with SP1)
o Processor: Intel Pentium 4 3.2 Ghz, Intel Pentium D 2.66 Ghz, AMD Athlon 64 3500 or better
o Memory: 1 GB Windows XP / 2 GB Windows Vista
o Graphics: 256 MB DirectX 10.0? compliant video card or DirectX 9.0c? compliant card with Shader Model 3.0 or higher
o DirectX?: DirectX 9.0c or greater
o Hard Drive: 4GB
o Sound: DirectX 9.0c Compatible Sound Card

Install Note:
1. Unrar
2. Burn or mount the image
3. Install the game, use the keygen when asked for serial
4. Run the activator found in /crack
5. Play the game

Chat through CMD

What you need to chat through CMD? You need your friend's IP Address and Command Prompt.

Steps chat through CMD :

1. Open Notepad and write this code :

Quote:@echo off
set /p n=User:
set /p m=Message:
net send %n% %m%
Goto A

2. Save this as "Messenger.Bat".

3. Open command prompt

4. Drag bat file over to Command Prompt and press Enter

5. This should came up

6. Now, type the IP Address of the computer you want to contact and press enter
You will see something like this:

7. Now all you need to do is type your message and press Enter.


Second Copy v8.0.3.0

Second Copy - an excellent program, designed for and intended for automation of data backup. It can backup your files on different drives, directories or networked computers. Second Copy checks the source files for changes and automatically updates the backup as needed. After a simple setup program running in the background and requires no user intervention. After installation, you'll always have your important data in the specified location!

Set a Video as Desktop Background

Do you want to set a Video as your desktop background instead of wallpaper?

Its very simple to impress your buddies by doing so... If you want set a video background, just follow this simple steps:

1. First of all you need a VLC player installed in your OS to perform this task. If not than download the VLC player from internet and install it.

2. Run VLC media player,go to Settings >> preferences >> Interface >> Main interfaces, then click on wxWidgets. Remove the tick on "Taskbar" and put a tick on "Systray icon".

3. Now go to Video >> Output Modules >> DirectX. On the bottom right put a tick on advanced options check box. You will now see some options. Put a tick on "Enable Wallpaper Mode".

4. Now, select playlist and put a check or tick on "Repeat current item".

5. Press the Save button. Now close the Vlc player and run it again (to save the settings permanently).

6. Now play any video you would like to set as Wallpaper. Right click on the video and click on "Wallpaper". The video would be set as your wallpaper!

Tux Walk 1.0

File Name: Tux Walk 1.0
Author: Zamaan's Software
Size: 2348 KB
Date Added: June 5, 2006

Have the Linux Penguin, Tux, walk around on your windows desktop! He is a little desktop pet that will keep you entertained by doing funny things.

Rohos Mini Drive 1.19

Rohos Mini Drive creates hidden and encrypted partition on the USB flash drive memory. You work with the files on the hidden partition without opening a special program. Those who have megabytes of sensitive files on the USB drive and seriously concerned with a data security, cannot imagine their USB stick without the hidden volume that is created using this tool.

Main Features:
* Creates a virtual encrypted partiton volume (disk) within a USB flash drive free space
* Automatically detects your USB stick config and creates encrypted partition
* Program does not require installation to work with encrypted partiton on a guest computer. You can start it right from USB drive
* Encrypted partition is protected by password
* Encryption is automatic and on-the-fly
* Encryption algorithm: AES 256 bit key lenght. NIST approved.
* Rohos Disk Browser to open encrypted partition without having Admin rights
* Virtual Keyboard - to protect your encrypted disk password from a key logger
* Autorun Folder. Saved program’s/file’s shortcut will automatically start/open up upon disk connection
* The limit of encrypted partition size is 2 GB

System requirements:
* Windows 2000/XP/2003/Vista
* USB 1.1/2.0 port
* USB flash drive or U3 Smart flash drive with 1 Mb or more free space

3 Ways to Open .PSD Files without Installing Adobe Photoshop

.PSD extension file stands for Photoshop Document and is related to the Adobe Photoshop application. The .PSD file works only in the Adobe Photoshop as it stores many imaging options available in Photoshop.

So if you like editing the images but do not want to spend lots of bucks on the software then this tip is surely for you and also because the following tools do not occupy huge memory as compared to Adobe Photoshop.

Method 1:

We have written about this image editor before and it is a really cool image editor. But by default this can not edit the .PSD files. For that you will be requiring a plug-in that will make this tool to open and edit the .PSD files.
• First download and install Paint.NET
• Now download the psdplugin, unzip and copy the PhotoShop.dll to the “FileTypes” folder in the Paint.NET directory. By default it should be in C:\Program Files\Paint.NET\FileTypes.
Now you can open PSD files.

Download Paint.NET

Method 2:

IrfanView is a small, free and fast image viewer/converter that can open .PSD files easily.

Download IrfanView

Method 3:

GIMP standing for GNU Image Manipulation Program is a free image retouching tool that supports .PSD files by default.

Download GIMP

Avast Internet Security v5.0.594 + CRACK VALID Till 2020

Core and detection

Image Antivirus and anti-spyware engine
State of the art scanning engine provides reliable protection against viruses, spyware and other forms of malicious software.

Real time anti-rootkit protection
Unique "on access" technology checks all kernel-mode drivers that the operating system is loading for signs of rootkit behavior. This enables even unknown rootkits to be detected and stopped before they can do any damage.

Image avast! Sandbox
Enables potentially exploitable programs (such as web browsers) and/or suspicious executables to be run in a safe, virtual environment. The avast! Sandbox is unique as it runs on both 32 and 64bit platforms.

avast! Community IQ
Most samples we process come from sensors deployed throughout the avast! community in the Behavior shield and anti-rootkit modules. This is a unique source of data made possible only thanks to our huge user base. Most of the collected samples are analysed by a number of automated processes and only a small fraction of the samples need to be processed manually by our virus analysts.

Image Code emulator
When a suspicious executable is encountered (during both on-demand and on-access scanning), avast! is able to emulate the program’s code in an isolated environment. The code emulator is used for two purposes. First, it is used for generic unpacking. Secondly, it is used in the heuristics engine. Technically, this is done using dynamic translation, a method much faster than traditional emulation techniques.

Image Heuristics engine
Starting with version 5.0, avast! features a new heuristics engine designed to proactively detect malware undetectable with normal definitions. The heuristics engine is able to cover both binary (executable) and script malware.

Potentially unwanted programs detection
5.0, avast! now detects potentially unwanted programs, such as remote admin tools and commercial key loggers. Custom rules can be set for dealing with these types of programs.

Additional Protection

Silent Firewall

The firewall enables you to control incoming and outgoing traffic from your computer. Protection is based on heuristic and behavioral analysis, and a white list of known safe applications. There are three network settings which can be changed depending on the type of connection.

New comprehensive SPAM and fraudulent message filter. It works as a plug-in to MS Outlook and a generic POP3/IMAP4 proxy for other email clients.


Boot-time scanner
Allows you to scan your computer for infections before the operating system has started and before a virus can be activated (32-bit operating systems only).

Command-line scanner
Enables you to run a scan directly from the command line.

Wake-up for scan
Microsoft Windows is woken from sleep or hibernation mode, performs a scheduled scan, then returns back to sleep mode.

Scheduled scanning
Allows users to define the scan time and files to be scanned.

Image avast! Intelligent Scanner
Can reduce the number of required file scans by up to 80% through a white list of proven safe applications. Files identified as safe are not rescanned unless they change.


Image Behavior Shield
Monitors activity on your computer using a number of sensors (file system, registry and network based) and reports/blocks any suspicious behavior.

Behavioral Honeypots
avast! sensors identify and monitor suspicious file activity on selected computers, automatically submitting files to the Virus Lab for additional analysis.

File System Shield
Real-time scanning of opened/executed files.

Mail Shield
Scans all incoming/outgoing e-mails for malware. For MS Outlook, a special plug-in is used. Other email clients are protected by a generic POP3/IMAP4/SMTP proxy. New in version 5, the proxy also supports scanning of SSL communication (,, ….)

Web Shield
Scans all visited web pages and checks all files, pages and java scripts downloaded from the internet. Thanks to the Intelligent Stream Scan feature, the Web shield doesn't slow down your web browsing.

P2P Shield
Checks files downloaded using P2P programs. - ABC, Ares, Azureus, BearShare, Bit Torrent, BitComet, BitLord, BitPump, CZDC++, Direct Connect, eDonkey, eMule, iDC++, iMesh, Kazaa, Kceasy, LimeWire, Morpheus, Opera's DC++, Overnet, Qtrax, Shareaza, SoulSeek, StrongDC++, uTorrent, Vuze, WinMX, Winny2, Zultrax.

IM Shield
Checks files downloaded while using instant messaging or “chat” programs. - AIM (AOL Instant Messenger), Gadu-Gadu, gaim/Pidgin, Google Talk, ICQ, IM2 Messenger, Infium, Miranda, mIRC, MSN/Windows Messenger, Odigo, PalTalk Messenger, Psi Jabber Client, QIP, QQ, SIM, Skype, Tlen, Trillian, WengoPhone, XFire, Yahoo! Messenger.

Network Shield
Provides protection against network-based viruses. The module has two main components: a URL blocker, designed to block malicious URLs (as defined by the Virus Lab), and a lightweight intrusion-detection system.

Script Shield
Detects malicious scripts hidden in internet web pages and prevents them from running and hijacking or potentially causing damage to your computer (Internet Explorer only, 32-bit only).


Smart virus definition updates
Incremental updating system minimizes the size of regular update files.

Image Fast application of updates
New format for the virus definition file speeds up application of updates into avast! 5.0 and reduces demand on CPU/memory, resulting in uninterrupted computer use.
New format for the virus definition file means faster updates and reduces demand on CPU/memory, resulting in uninterrupted computer use.


Image New Silent/Gaming Mode
New Silent/Gaming Mode automatically detects full-screen applications and disables pop-ups and other on-screen notifications without degrading security.

Optimized for latest Intel Core i7 CPUs
Critical sections of the avast! scanning engine code have been optimized to deliver unrivaled performance on the latest Intel chips.

CPU optimization

Image Multi-threaded scanning optimization
avast! runs faster on new multi-core CPUs. A new avast! feature allows the splitting of large individual files between cores, accelerating the scanning process.

Green computing
Reduced demands on the disk drive result in lower energy consumption.


avast! iTrack
Real-time graphic scanning reports.
Image Graphical user interface
Easy to navigate graphical interface.

Automatic processing
Infected files are processed automatically without requiring user instructions.

System requirements
* Processor Pentium 3, 128 MB RAM, 100 MB of free hard disk space
* Microsoft Windows XP/Vista/7 (32/64 bit)

Make Firefox Really Fast

Fast loading web pages while surfing the Internet may have more to do with your web browser settings[/URL] and preferences than your Internet connection speed.
Try these easy Firefox tweaks and you’ll see that you’re surfing the Internet from 3 to 30 times faster!

To get started, open your Firefox web browser. In the address/location bar type [about:config] and then press your Enter key. (NOTE: DON’T TYPE THE BRACKETS.)

Tweak #1:

In the Filter bar type [network.http.pipelining]. Then, double-click on this line under Preference Name in order to change the value from false to true.

Tweak #2:

In the Filter bar type [network.http.pipelining.maxrequests]. Then, double-click on this line under Preference Name and change the value from 4 to a higher number anywhere from 10 to 30. I set mine to 30.

Tweak #3:

In the Filter bar type [network.http.proxy.pipelining]. Then, double-click on this line under Preference Name in order to change the value from false to true.

Tweak #4:

In the Filter bar type [network.dns.disableIPv6]. Then, double-click on this line under Preference Name in order to change the value from false to true.

Tweak #5:

In the Filter bar type [plugin.expose_full_path]. Then, double-click on this line under Preference Name in order to change the value from false to true.

Tweak #6:

In the Filter bar type []. Now, you are going to create a new Preference Name with an Integer Value. To do this, right-click on this line under Preference Name and select New, then Integer.

In the New Integer value box type in [nglayout.initialpaint.delay] and click OK. Then in the Enter Integer value box type [0] (that’s a zero) and click OK.

Tweak #7:

In the Filter bar again type []. Now, you are going to create another new Preference Name with an Integer Value. To do this, right-click on this line under Preference Name and select New, then Integer. In the New Integer value box type in [content.notify.backoffcount] and click OK. Then in the Enter Integer value box type [5] and click OK.

Tweak #8:

In the Filter bar again type []. Now, you are going to create another new Preference Name with an Integer Value. To do this, right-click on this line under Preference Name and select New, then Integer. In the New Integer value box type in [ui.submenuDelay] and click OK. Then in the Enter Integer value box type [0] (that’s a zero) and click OK.

Now, close your web browser and restart it. You’ll see how much faster web pages are loading. I sure did.
Let me know if these tweaks increase your Internet browsing speed. Know of any other tweaks or tricks? Let me know and I’ll add them.

Menangkal NetCut dengan Anti NetCut 2.0

Aplikasi NetCut barangkali sudah pernah dengar dengan aplikasi hack-nya. Memang sebenarnya NetCut bukan aplikasi software Hacking, tetapi kebanyakan Software NetCut digunakan untuk melakukan kejahatan, salah satunya untuk mengambil bandwidth disaat orang lain berada di area hotspot, walaupun juga mereka beralasan cuma iseng doang.

Anda yang gemar berinternet di area hotspot tidak perlu kawatir dengan ulah atau kemampuan dan kelebihan NetCut, karena ada penangkal aplikasi NetCut ini yang bisa Anda install dan Anda gunakan ketika merasa khawatir terserang NetCut di area hotspot. Salah satu aplikasi yang bisa untuk menangkal dari serangan NetCut adalah dengan menggunakan Anti NetCut. Dengan Anti NetCut jaringan hotspot yang Anda pakai akanlebih aman, karena jika para orang iseng menggunakan NetCut, Anda sudah siap sedia menangkalnya dengan Anti NetCut.

Untuk download software-nya silahkan klik

CorelDRAW Graphics Suite X5

Creativity and power come together in CorelDRAW Graphics Suite X5. With increased speed, more accurate color control, enhanced vector illustration tools and new Web capabilities, it’s a must-have for any designer. Get going quickly with new professionally designed templates and learning materials. Find graphics, fonts and images on your computer faster than ever with new Corel® CONNECT™. Re-purpose and share your creations anywhere with expanded file compatibility. Then output everywhere, from Web banners and animations, to logos, custom signs and more.


* More speed with new multi-core support
* More rich content and professional templates
* More learning tools, video tutorials and expert tips
* More compatibility, with support for over 100 file formats
* More color control and consistency
* More Web capabilities, including Flash animation support
* More output options for print, Web, digital signs and more

What's Included:

CorelDRAW® X5
Intuitive vector illustration and page layout software

Professional image-editing application specifically designed for use in a graphics workflow

Corel® PowerTRACE™ X5
Bitmap-to-vector file conversion tool

One-click screen capture utility

Full-screen browser that lets you search digital content from the suite, your PC or your local network

Supporting applications:

Barcode wizard, Duplexing wizard, Bitstream® Font Navigator®, SWiSH miniMax™ 2*, PhotoZoom Pro 2*


10,000 high-quality clipart and digital images, 2,000 vehicle templates, 1,000 high-resolution digital photos, 1,000 OpenType® fonts, including 75 Windows Glyph List 4 (WGL4) fonts and 10 engraving fonts, 350 professionally designed templates


Online guidebook (hard cover, full-color, printed Guidebook available with the box version), Quick-reference card, Help files

part01 | part02 | part03 | part04 | part05 | part06

Avira Premium Security Suite | FULL VERSION

Complete Security Suite with virus scanner, AntiAdware, AntiSpyware, AntiDialer, email protection (POP3), Personal Firewall, AntiSpam, proactive AntiPhishing, RescueCD, backup, WebGuard and more. Extremely high performance and detection capacity by using the latest technology, directly from Avira Labs. The Security Suite offers protection from both known and unknown threats, using world leading Heuristics to give you the maximum protection.

Do you surf on the Internet, make online purchases, communicate by email, or make bank transactions on your PC? The Avira Premium Security Suite reliably protects you and has an extra firewall as well as an anti-spam and a backup function in addition to the award-winning virus protection.


* AntiVir stops all types of viruses
* AntiAd/Spyware eliminates ad/spyware
* AntiPhishing proactive protection against phishing
* AntiRootkit against hidden rootkit threats
* AntiDrive-by prevents against downloading viruses when surfing
* MailGuard enhanced email protection
* WebGuard protection against malicious websites
* RescueSystem create a bootable rescue CD
* QuickRemoval eliminate viruses at the push of a button
* NetbookSupport for laptops with low resolution
* AHeADTechnology detects even unknown viruses by their profiles
* AntiVirProActiv detects unknown viruses by their behavior patterns NEW!
* GenericRepair automatic repair of your PC NEW!
* ExpressInstallation install Avira in just 5 clicks NEW!
* AviraSupport there for you in person when questions arise
* AntiBot prevents dangerous bot networks
* BackupSystem configurable data backup solution
* AntiSpam filters out unwanted emails
* FireWall protection against hackers
* GameMode uninterrupted game play
* ParentalControl block websites unsuitable for children

System requirements:

Windows XP (32 or 64 Bit), SP2
Windows Vista (32 Bit or 64 Bit), SP1
Windows 7 (32 Bit or 64 Bit)
Windows 2000, SP4 and Update Rollup 1

Bersihkan RAM Tanpa Merestart Komputer

Terkadang, komputer kita menjadi lambat setelah beberapa lama dipakai. Apalagi kalau sebelumnya yang kita jalankan adalah program-program yang berat, seperti Adobe Photoshop, Corel Draw, atau sehabis kita bermain games.

Kemungkinan itu terjadi karena masih ada bekas data yang tersimpan dalam RAM, sehingga komputer kita pun jadi lambat. Salah satu cara untuk membersihkan RAM adalah dengan merestart komputer terlebih dahulu. Tapi ada cara lain tanpa kita harus merestart komputer kita.

Caranya sebagai berikut :
1. Klik kanan mouse di desktop, pilih New -> Shortcut.
2. Ketik "%windir%\system32\rundll32.exe advapi32.dll,ProcessIdleTasks" (tanpa tanda petik) pada kolom isian yang muncul.
3. Klik Next.
4. Beri nama shortcut tersebut "rundll32.exe" atau apa saja sesuai keinginan kamu.
5. Klik Finish.
6. Jalankan.

“Club Cooee” News Chatting 3D

Pernah ngga ngebayangin kalau kamu bisa langsung berhadapan dengan teman chatting kamu? Mengobrol langsung sambil bertatap muka? Tanpa webcame apalagi kopi darat. Nah, kalau memang ingin seperti itu kamu bisa langsung register ke Club Cooee.

Apa itu Club Cooee?

“Club Cooee” adalah Virtual 3D berbasis klien Messenger yang membuatmu bisa chatting dengan orang-orang dari seluruh dunia. Kamu juga dapat mengundang teman-temanmu yang lain dengan menginvite mereka dari email. Hanya dengan mendownload 3MB chatworld client, kamu dapat chatting di aplikasi yang menyerupai dunia nyata.

Sebenarnya aplikasi seperti ini udah lama ada di game-game online. Hanya saja CC lebih menitikberatkan pada chatting dan bukan permainan belaka. Namun, cara-cara yang digunakan dalam club cooe ini ngga jauh berbeda dengan game online, karena dengan bergabung di dalamnya kita bisa mengumpulkan point yang disebut dengan CC (singkatan dari Cooee Cash) dan CP (Cooee Point). Jadi dengan mengajak teman-teman yang belum bergabung dan meng add para pengguna CC lainnya, poinmu akan terus bertambah.

Lalu ketika memiliki banyak CC/CP, poin-poin itu bisa digunakan untuk membeli berbagai perlengkapan. Seperti baju, sepatu, celana, tas, dan berbagai aksesoris dan aplikasi lain yang disediakan untuk membuatmu penampilanmu lebih menarik.

Layaknya aplikasi IM lainnya di Club Cooee juga terdapat Room yaitu ruangan virtual tempat mengobrol dengan teman-teman. Bedanya, di Club Cooee roomnya lebih real, karena benar-benar berbentuk seperti ruangan rumah dimana pemilik kamar bisa menambahkan item atau mendekorasinya dengan segala macam perabotan rumah tangga. Perabotan tersebut dapat dibeli menggunakan CC. Selain room pribadi juga ada global room yang disebut dengan International Lobby, room regional, cafe/bar, atau tempat-tempat umum lainnya. Keren kan??

Untuk daftar siLakan klik disini.

Virus Zombie Serang Jutaan Ponsel di China

Menurut media pemerintah Cina, CCTV dan Xinhua, jutaan ponsel di China telah diserang virus "Zombie". Zhou Yonglin, seorang pejabat Pusat Koordinasi Jaringan Komputer Darurat Nasional, mengatakan bahwa "pada minggu pertama bulan September, hampir 1 juta ponsel di negara itu terinfeksi virus". Dan meskipun penyedia telekomunikasi mengatakan telah mengambil langkah-langkah untuk mengurangi jumlah pesan yang terinfeksi, Zou Shihong, seorang ahli telekomunikasi di Beijing University of Post and Telecommunications, mengatakan kepada CCTV bahwa virus update mungkin mulai mengirim pesan yang lebih sedikit, sehingga sulit bagi kalangan pengguna untuk melihat adanya aktivitas mencurigakan.

Sebagaimana diketahui, virus "Zombie" ini melekat pada aplikasi keamanan, yang kemudian mentransmisikan rincian kartu SIM pengguna ke server yang dikontrol oleh sekelompok kecil hacker. Para hacker akan mengirim pesan atau membuat panggilan telepon yang berisi link-link ditunggangi-virus untuk games dan software, kata CCTV.

Penerima yang mengklik (mengikuti) link tersebut akan menemukan ponsel mereka terinfeksi, sementara pada saat yang sama menyediakan "click through" untuk link itu sendiri, yang biasanya diterjemahkan ke dalam pembayaran untuk pihak yang mempublikasikan link.

CCTV mengatakan bahwa kesalahannya mungkin terletak pada distributor perantara bukan pada pengembang permainan atau software yang sebenarnya yang muncul dalam iklan.

Facebook Plans to Trademark the Word "Face"

Hoping to finally launch Sorry, Charlie, you're too late: Facebook may have just won the rights to the word "face."

The social-networking giant was just given a green light in its efforts to trademark the word "face." The company's efforts have moved Facebook's pursuit of face past the opposition period, according to the U.S Patent and Trademark Office, and a "Notice of Allowance" has been issued. And it looks like the application will be approved, Neil Friedman, a partner at law firm Baker and Reynolds who regularly practices trademark law, told

"At the end of the day, will they have protection in this space? Yes," Friedman said.

A trademark may help Facebook throw the book at the competition -- and Facebook faces a wealth of it., the world's largest domain name registrar, told that it has 53,000 domain names containing the word "face" in its databases. The company estimated that the Internet has 89,000 domain names containing the word "face" just in the .com world.

So put on a happy face, Facebook, that trademark may need to be put to use.

Angelina Jolie Hates Thanksgiving, Refuses to Celebrate, Report Says
Texas Teacher Suspended for Allegedly Spanking First-Graders
Military Pegs Hourly Air Force One Cost at $181G, as Obama Sets Travel Record
America's 10 Most Expensive Colleges
Derailed: Why High-Speed Trains Haven't Caught On in the U.S.

A trademark can cover a variety of things, from the audible jingle in T-Mobile commercials to words or phrases, letters or numbers -- even something pictoral like the Nike swoosh, Friedman explained. Even a color. In Facebook's case, the trademark would cover "telecommunication services, namely providing online chat rooms and electronic bulletin boards for transmission of messages among computer users in the field of general interest and concerning social and entertainment subject matter, none primarily featuring or relating to motoring or to cars."

Cars? What could that mean? A spokesman for Facebook declined to comment on the trademark pursuit, but Friedman has a theory: "My guess is that they've been rejected by somebody that has face already for something related to cars," he said.

The unusual patent may be probably partly explained by its history: The social network picked up a trademark application originally filed in 2005 by U.K. company, run by British company called CIS. Tech news site Engadget explains that the original application covered everything from festival planning to dating services to text message systems -- though that doesn't explain the car thing.

Around October of 2008 CIS filed to split the various categories into separate applications -- one of which was for online chat rooms. That application was taken over by Facebook on November 7, and on November 17 Facebook officially swapped in its attorney.

This doesn't mean that Facebook has won the battle for the word just yet, however. The company must first pay an issue fee, and submit a statement explaining how it uses the word face. Besides, Friedman noted, there are several other trademarks already filed that use the world face.

"In this category, there are already 34 other trademark applications that have a face component," he told "There's one for streaming video on the Internet -- mymusicface. And there's facefirst for monitoring security of others," for example.

"If someone else were using face by itself, yes, they'd be able to block that. But in the real world, that will have to be taken on a case by case basis," Friedman told

So Facebook won't be able to block all other faces -- because Mark Zuckerberg doesn't have the very first face.

Other prominent faces: Apple's newly launched video conferencing service Facetime may be the most high profile service to feel the brunt of Facebook's patent, though it may not be covered by the trademark. (Apple has filed its own trademark application for Facetime, though its efforts have been rejected.) And Facebook has already filed suit against a pornography company with the similar name FacePorn.

The company's efforts are also interesting in light of the current litigation surrounding the other half of the its name -- the "book" part, that is.

Facebook has been embroiled in a spate of trademark-fueled litigation in recent months, most recently a back and forth with parody site Lamebook. The company has also sued Teachbook and Placebook in an effort to protect its identity following the social network's astronomical rise in popularity in recent years.

Of course, the trademark for Face is nothing new. Facebook has already trademarked "Like" and "Wall." So watch what you say the next time you visit corporate headquarters -- a slip of the tongue could lead to a lawsuit.


Collection of drivers for Windows 2000/XP/2003/Vista/7 x32/x64

Collection of drivers for operating systems Windows 2000/XP/2003/Vista/7 x32/x64 with the latest updates.
Year: 2010
Developer: driverpacks
Platform: Windows 2000/XP/2003/Vista/7
Language: English and Russian

Windows 2000/XP/2003 x86:
DP Chipset wnt5 x86-32 1011
DP CPU wnt5 x86-32 1005
DP Graphics A wnt5 x86-32 1009
DP Graphics B wnt5 x86-32 1009
DP Graphics C wnt5 x86-32 1009
DP Graphics Languages wnt5 x86-32 1009
DP Graphics PhysX wnt5 x86-32 1009
DP LAN wnt5 x86-32 10111
DP MassStorage wnt5 x86-32 1010
DP Runtimes wnt5 x86-32 1008
DP Sound A wnt5 x86-32 1009
DP Sound B wnt5 x86-32 1009
DP WLAN wnt5 x86-32 1009

Windows Vista / 7 x86:
DP Audio wnt6-x86 1007
DP CableModem wnt6-x86 1001
DP CardReaders wnt6-x86 1001
DP Chipset wnt6-x86 10071
DP Gaming wnt6-x86 1001
DP Graphics A wnt6-x86 1007
DP Graphics B wnt6-x86 1007
DP Graphics Mobile wnt6-x86 1007
DP LAN wnt6-x86 1003
DP MassStorage wnt6-x86 1003
DP Modem wnt6-x86 1001
DP Monitors wnt6-x86 1001
DP Touchpad Mouse wnt6-x86 1003
DP TVcard wnt6-x86 1001
DP Webcam wnt6-x86 1001
DP WLAN wnt6-x86 10071

Windows Vista / 7 x64:
Cardreaders x64 911
DP Audio wnt6-x64 1007
DP Chipset wnt6-x64 10071
DP Graphics A wnt6-x64 1007
DP Graphics B wnt6-x64 1007
DP Graphics Mobile wnt6-x64 1007
DP LAN wnt6-x64 1003
DP MassStorage wnt6-x64 1003
DP Touchpad Mouse wnt6-x64 1003
DP WLAN wnt6-x64 10071
Gaming x64 812
Misc x64 911
Monitors x64 911

1000 Greatest Windows Hidden Secret & Tips

Over 1000 of the most useful tips for Windows XP compiled and collected in one handy pocket guide. Essential advice compiled from the only official Windows XP magazine ...

* 25 instant troubleshooting solutions
* 60 suggestions for better digital photos
* 250 expert hints to boots Windows XP
* 300 tips for Microsoft Office XP
* And 450 more PC tricks inside!

Download here

The PrintShop Pro Photo 21 Final

The PrintShop Pro Photo 21 | 402.19 MB Genre: Graphics & Design

Enhanced photo quality printing and new borderless print features mean your projects will have the refined look you want! Everything you need to create premium print and photo projects17,500+ Project Templates including all new Ipod Tattoos! 320,000+ images&graphics PLUS!

part01 | part02 | part03 | part04

The Harry Potter and the Deathly Hallows Part 1 PC

The Harry Potter and the Deathly Hallows Part 1 videogame is packed from start to finish with action and combat. Players will be on the run, fighting for survival on a desperate and dangerous quest to locate and destroy Voldemort's Horcruxes, engaging with Death Eaters and Snatchers in epic battle sequences at every turn. To amplify the action, players will encounter ferocious creatures from the previous films in addition to the adversaries Harry faces in the seventh film. They will need to muster their most powerful magic against relentless assaults from all sides. There are no more lessons, no more training. This time the danger is real. It's time for players to fight for their lives.

Razor 1911 proudly presents:
Harry Potter and the Deathly Hallows, Part 1
(C) Electronic Arts
Date: 2010-11-16
Game Type : Action
Size: 1 DVD
Protection: Serial+DVD-Check

Motorola v.s Microsoft

The relationship between Motorola and Microsoft increasingly heated only. After Motorola sued Microsoft for the second time, now turn back the handset vendors that require the software giant.

In the claim submitted to the court the South Florida area and Western Wisconsin, United States, Motorola claims that Microsoft has committed an offense against 16 of his patent.

If yesterday Microsoft said that Motorola's attempt to reap royalties that make no sense for Microsoft technology available on the Xbox gaming device, the Motorola behind pointed out that the PC and Microsoft server software, Windows Mobile software and the Xbox actually has been using his patent. Such information is quoted from ABC News on Thursday (11/11/2010).

The lawsuit is an endless stream. Last month, Microsoft sent a lawsuit against Motorola, claiming that the Android smartphone vendors made by U.S. mobile home has been violated nine patents Microsoft.

Deputy General Counsel of Microsoft, Horacio Gutierrez said he was not surprised with a counter lawsuit filed by Motorola. Today, as said by him, Microsoft is studying the lawsuit and immediately file any further action.

Selteco Photo Lab (Ver 4.0.5)

Acquire, enhance and publish digital graphics... Key features: Acquire images from scanners, digital cameras, web or screen Rotate, resize, crop images Adjust brighness, contrast, levels, gamma, saturation or color temperature Optimize images for the Web and export in GIF or JPEG format Create multilayer graphics using bitmap and text objects Support for PSD, BMP, TIFF, GIF, JPEG and WMF formats.

Selteco Photo Lab is an image editor suitable for:
- Opening, zooming and viewing photos
- Adjusting contrast, saturation
- Removing red-eye
- Resizing and cropping pictures
- Applying artistic effects to images

Key features:
• Import and edit photos
• Rotate, resize, crop or flip images
• Remove unwanted background
• Make and save screenshots
• Copy and save images from a Web site
• Enhance brightness, contrast, levels, gamma, saturation, sharpness or color temperature
• Optimize images for the Web, reduce colors, change JPEG quality
• Add text, layers and cliparts
• Supports PSD, BMP, TIFF, GIF, JPEG and WMF formats

System Requirements
- IBM PC or compatible, Pentium 350 MHz or faster
- Windows Vista/XP/2000/Me/98
- 32MB
- 8MB disk space
- 16-bit color display or higher