Selasa, 23 September 2008

Computer Maintenance

You may not realize it, but your computer and your car have something in common: they both need regular maintenance. No, you don't need to change your computer's oil. But you should be updating your software, keeping your antivirus subscription up to date, and checking for spyware. Read on to learn what you can do to help improve your computer's security.


Getting started

Here are some basics maintenance tasks you can do today to start improving your computer's security. Be sure you make these part of your ongoing maintenance as well.

* Sign up for software update e-mail notices. Many software companies will send you e-mail whenever a software update is available. This is particularly important for your operating system (e.g., Microsoft VV!|VD0VV$® or Macintosh), your antivirus program, and your firewall.
* Register your software. If you still have registration forms for existing software, send them in. And be sure to register new software in the future. This is another way for the software manufacturer to alert you when new updates are available.
* Install software updates immediately.
When you get an update notice, download the update immediately and install it. (Remember, downloading and installing are two separate tasks.)
An ounce of prevention


A few simple steps will help you keep your files safe and clean.

* Step 1: Update your software
* Step 2: Backup your files
* Step 3: Use antivirus software and keep it updated
* Step 4: Change your passwords


Developing ongoing maintenance practices

Now that you've done some ground work, it's time to start moving into longer term maintenance tasks. These are all tasks that you should do today (or as soon as possible) to get started. But for best results, make these a part of a regular maintenance schedule. We recommend setting aside time each week to help keep your computer secure.

* Back up your files. Backing up your files simply means creating a copy of your computer files that you can use in the event the originals are lost. (Accidents can happen.) To learn more read our tips for backing up information.


* Scan your files with up to date antivirus software. Use your antivirus scan tool regularly to search for potential computer viruses and worms. Also, check your antivirus program's user manual to see if you can schedule an automatic scan of your computer. To learn more, read our tips for reducing your virus risk
.
* Change your passwords. Using the same password increases the odds that someone else will discover it. Change all of your passwords regularly (we recommend monthly) to reduce your risk. Also, choose your passwords carefully. To learn more, read our tips for creating stronger passwords
.

Making a schedule

One of the best ways to help protect your computer is to perform maintenance regularly. To help you keep track, we suggest making a regular "appointment" with your computer. Treat it like you would any other appointment. Record it in your datebook or online calendar, and if you cannot make it, reschedule. Remember, you are not only helping to improve your computer, you are also helping to protect your personal information.

Converting to NTFS

Converting to NTFS

Your hard drive must be formatted with a file system such as FAT, FAT32 or NTFS so that Windows can be installed on to it. This system determines how files are named, organised and stored on the drive. If you’re not using it already, NTFS (New Technology File System) is recommended for Windows XP because of the additional functionality it offers. If your PC came with Windows XP pre-installed then there’s a chance that you’re already using NTFS. If you’ve upgraded from Windows 98 or Windows Me you may still be using FAT or FAT 32. The option to change over to NTFS would have been available during the upgrade process. Don’t worry if you skipped this as it’s possible to convert at any time from within Windows XP without losing any data.

The recommended option
There are a number of features in Windows XP that will only work if the NTFS file system is present, which is why it’s suggested you make use of it. File and folder permissions, encryption and privacy options are just some of those you’ll be able to access. In particular, those of you who have set up user accounts will find NTFS invaluable. For instance, if you continue to use FAT or FAT32 anyone with physical access to the drive will be able to access the files and folders that are stored there. However, with NTFS you’ll be able to use a level of encryption (Professional Edition only) that will enable you to protect your data.

You’ll also find NTFS more reliable in that it’s more able to recover from disk errors than its FAT or FAT32 counterparts. A log of all disk activity is kept so should a crash occur, Windows XP can use this information to repair the file system when your PC boots up again. To find out what file system you’re using, open My Computer, right-click your main hard drive and choose Properties. Take a look at the General tab to see confirmation of the file system that’s in use.

Convert now
You can use the convert tool in Windows XP to change the file system on your hard disk from FAT or FAT32 to NTFS. The whole process is safe and your existing data won’t be destroyed. To begin, click Start -> Run, type cmd and press [Return]. At the command prompt type convert c: /fs:ntfs and press [Return] (where ‘c’ is the letter of the drive you’re converting). When you try and run the convert utility, it’s likely that Windows XP will be using your paging file so the process won’t be completed immediately. Therefore, you’ll see a brief message on screen informing you that the conversion will take place instead the next time Windows starts up. Having restarted, the Check Disk utility will run, the conversion will be performed automatically and you may find that your PC will reboot twice more.

The benefits
With your drive now running NTFS, it’s time to take advantage of the new options that are available. Having created a number of different user accounts you can now control the level of access that’s granted to individual users. For example, there are going to be certain files and folders that you’ll want some users to be able to access but not others. If you have Windows XP Professional Edition you can do this immediately.

Right-click any file or folder, choose Properties and select the Security tab. A dialog will be displayed showing the names of all your users. Alongside will be two columns which enable you to select levels of access for each of them, the permissions include Full Control, Modify, Read and Write. You can then check the appropriate box to determine whether or not to Allow or Deny a particular permission. For Windows XP Home Edition users, the Security tab won’t be immediately available. To access this option you’ll need to restart your PC, pressing [F8] until a menu appears. Next select Safe Mode and wait for Windows XP to start up. You can then set your options in the same way.

Another feature is NTFS compression. It’s quick and seamless as your file or folder is decompressed automatically when you access it. (Don’t confuse this with a Zip compression utility where the files need to be extracted before they can be accessed.) Although you may have used NTFS compression on a file or folder, there’s no way of telling just by looking at it. To remedy this, open My Computer, click Tools -> Folder Options and select the View tab. Under Advanced settings, scroll down and check the option ‘Show encrypted or compressed NTFS files in color’, then click Apply and OK. Take a look at your compressed items in My Computer and you’ll see the text label has changed from black to blue. Something else that’s exclusive to Professional Edition users is the Encrypting File System (EFS). You can use this to protect your important data so that no one else can read it. Your encrypted files and folders will only be accessible when you have logged into your user account succ

Senin, 22 September 2008

Joke IPTEK

 
Jika Anda merasa gaptek soal komputer, jangan kuatir. Bukan Anda saja
Yangmerasa demikian. Jim Cartlon, seorang jurnalis Wall Street Journal,
Baru-baru ini mengumpulkan keluhan dari para konsumen komputer Amerika.
Dan ternyata keluhan mereka jauh lebih "idiot" daripada yang Kita kira.
Berikut petikan keluhan2 konsumen itu :
 
1. Compaq pernah mempertimbangkan untuk mengubah perintah "Press ANY
Key" menjadi "Press ENTER Key" dikarenakan banyaknya telefon yang
Menanyakan letak tombol "ANY" di keyboard.
 
2. AST Technical Support menerima laporan konsumen karena kesulitan
Menggunakan mouse. Saat Techinal Support berkunjung, mereka menemukan
Mouse tersebut tidak bisa digunakan... Karena masih terbungkus rapi di
Dalam plastiknya. Penggunanya (seorang wanita) punya phobia (ketakutan)
Pada mouse (tikus) sehingga tidak berani mengeluarkannya dari dalam plastik.
<span class="fullpost">
3. Di tahun 1980-an, ketika disket masih berukuran besar, Teknisi Compaq
Pernah menerima keluhan seorang konsumen yang disketnya tidak terbaca
Oleh drive-disk komputer. Setelah diselidiki, ternyata konsumen itu
Sebelumnya memasukkan disket ke dalam mesin tik Dan mengetikkan label
Yang tertempel di disket itu.
 
4. Sebuah keluhan lain dari konsumen AST yang mengatakan disket mereka
Terkena virus yang sulit dibersihkan. Petugas AST meminta orang itu
Mengirimkan kopi disket yang terinfeksi itu untuk dipelajari. Beberapa
Hari kemudian, petugas AST menerima foto kopi disket dari konsumen tersebut.
 
5. Seorang konsumen DELL mengeluhkan kalau dia tidak dapat mengirimkan
Fax via komputer. Setelah diarahkan selama 40 menit lewat telepon,
Petugas DELL menemukan kalau konsumen itu mencoba mengefax via komputer
Dengan cara menempelkan kertas yang akan di fax di depan monitor.
 
6. Seorang konsumen DELL lain mengeluh karena keyboard yang digunakannya
Sudah tidak bisa berfungsi sejak dibersihkan. Ketika ditanya caranya
Membersihkan keyboard, dia menjelaskan, "Saya mencuci Dan menggosok
Semua bagian keyboard dengan sabun, lalu membilasnya dengan air, Dan
Menjemurnya. "
 
7. Seorang konsumen DELL marah besar karena tidak bisa menyalakan
Komputer yang baru dibelinya. "Semua sudah terpasang dengan baik. Tapi
Setiap kali saya tekan pedal kaki , tidak terjadi apa-apa." Setelah
Diselidiki ternyata "pedal kaki" yang dimaksud orang itu adalah : mouse.
 
8. Seorang lagi konsumen DELL marah besar karena komputer barunya tidak
Nyala. Dia menjelaskan semua sudah terpasang dengan benar, Dan ketika
Dia menunggu selama 20 menit, tidak terjadi apa-apa pada komputernya.
Ketika teknisi DELL menanyakan apakah "power switch" sudah dinyalakan,
Dia balik bertanya, "Power switch apa?"
 
9. Berikut adalah tanya-jawab antara petugas Novell NetWire dengan
Seorang konsumen :
 
Penelepon : Hallo, dengan Tech Support?
Novell : Ya, bisa dibantu?
Penelepon : Tatakan gelas di PC saya patah. Apa mungkin saya bisa
Menggantinya?
Novell : Tatakan gelas ? Apakah itu hadiah saat Anda membeli komputer?
Penelepon : Tidak. Tatakan gelas ini sudah Ada di komputer saya. Dan
Ketika saya meletakkan gelas saya di atasnya, tatakan itu patah. Yang
Saya ketahui, di bagian depan tatakan itu Ada tulisan "CD-ROM, 16X".
 
 
</span>
FREE Animations for your email - by IncrediMail! Click Here!

Lindungi Anak Anda dari TV!

© 2005 Hak Cipta oleh Republika Online
 
Ada hasil penelitian yang cukup mengejutkan tentang pengaruh TV terhadap anak. Seperti dilansir oleh Situs Pemerhati Televisi Indonesia di www.geocities.com/kritikacaratv, sebuah hasil penelitian terkini di AS menyebutkan bahwa terlalu banyak menonton TV bisa menghambat pertumbuhan otak anak.
 
Hasil penelitian itu bahkan menyebutkan bahwa anak umur nol sampai dua tahun sebaiknya tidak menonton TV sama sekali. Alasannya, ''karena televisi, meskipun edutainment sekalipun, hanya memberikan rangsangan yang bersifat satu arah saja sehingga anak tidak bisa tercipta reaksi timbal balik,'' kata psikolog anak, Dra Mayke Tedjasaputra, seperti dikutip situs tersebut.
 
Dengan kata lain, terjadi semacam proses pembodohan pada diri anak-anak jika mereka terlalu banyak menonton televisi Di AS kini bahkan Ada sebutan 'kotak idiot' bagi TV karena pengaruh buruknya tersebut. Karena itu, anjuran 'Lindungi Anak Anda dari TV' cukup tepat untuk segera disampaikan kepada para orang tua Indonesia, agar anak-anak mereka tidak menjadi bodoh hanya gara-gara kebanyakan menonton TV. Apalagi, jika tayangan-tayangan yang ditonton tidak edukatif, bukan hanya pembodohan yang terjadi tapi juga perusakan kepribadian.
<span class="fullpost">
 
Anjuran itu perlu segera disebarluaskan, karena rata-rata orang tua Indonesia cenderung membiarkan anak-anak mereka duduk berjam-jam di depan TV. Beberapa hasil penelitian menyebutkan, anak-anak Indonesia rata-rata menghabiskan waktu 4-5 jam per Hari untuk menonton TV. Bahkan, pada Hari libur bisa sampai 10 jam dalam sehari. Alasan para orang tua umumnya pragmatis saja: anak-anak bisa diam Dan tidak pergi ke mana-mana jika sudah asyik di depan TV, sementara sang orang tua bisa menyuntuki kesibukannya sendiri tanpa terganggu oleh anak-anak.

Dari satu sisi, alasan itu memang cukup masuk akal. Tetapi, sebenarnya mengandung bahaya besar yang bisa mengancam masa depan anak, karena terjadinya proses pembodohan Dan perusakan kepribadian tadi. Sebab, dengan membiarkan anak banyak menonton TV berarti menyerahkan pertumbuhan mental Dan kecerdasan mereka kepada 'kotak idiot' itu.

Begitu besarnya pengaruh TV terhadap anak-anak, sampai-sampai pendiri organisasi Action for Children Television, Peggy Chairen, memperingatkan bahwa tidak banyak hal lain dalam kebudayaan Kita yang mampu menandingi kemampuan TV yang luar biasa untuk menyentuh anak-anak Dan mempengaruhi cara berpikir serta perilaku mereka.

Besarnya pengaruh itu, kata psikolog UI Prof Dr Fawzia Aswin Hadis, seperti dikutip situs di atas, karena anak-anak memang berada pada fase meniru. Anak-anak adalah imitator ulung, Dan karena itu akan cenderung meniru adegan yang ditonton di TV. Barangkali, masalahnya tidak mengkhawatirkan jika yang ditiru adalah adegan Dan perilaku yang positif.

Tapi, kenyataannya, justru bukan perilaku positif yang menarik bagi anak-anak Dan menebar di layar TV, namun malah yang negatif. Ketika meneliti film-film kartun Jepang Sailor Moon, Dragon Ball Dan Magic Knight Ray Earth, misalnya, Sri Andayani mendapati lebih banyak adegan anti sosial ketimbang adegan pro sosial (58,4% : 41,6%). Temuan diperkuat oleh studi YKAI yang mendapati adegan anti sosial lebih dominan (63,51 %). Adegan-adegan anti sosial pula yang banyak didapati pada film-film kartun anak-anak yang sedang populer saat ini, seperti Sponge Bob Square Pans Dan Crayon Sincan.

Kalangan orang tua di negara-negara maju seperti AS kini sudah mulai menyadari negatifnya pengaruh TV terhadap anak-anak, Dan karena itu mereka sudah mulai hati-hati. Sebuah survai yang dilakukan oleh Christian Science Monitor terhadap 1209 orang tua tentang seberapa kuat kekerasan TV mempengaruhi anak, menghasilkan 56% responden menjawab amat mempengaruhi. Sisanya, 26% menjawab mempengaruhi, 5% cukup mempengaruhi Dan 11% tidak mempengaruhi.

Kuatnya pengaruh acara TV terhadap anak, menurut Fawzia Aswin, juga ditentukan oleh besarnya waktu untuk menonton TV. Penelitian oleh Lembaga Pembinaan Dan Perlindungan Konsumen (LP2K) menemukan anak-anak di Semarang menonton TV selama 4 jam per Hari. Sedangkan Pudji Lestari (1996) mencatat anak Bogor menonton 3,13 hingga 4,65 jam per Hari. Padahal, menurut Murphy Dan Karen Tucker (produser acara anak-anak), sebaiknya anak menonton TV kurang dari dua jam per Hari.

Tayangan TV yang hampir selalu menampilkan efek sinar, gerak Dan suara secara bersamaan, menurut Mayke Tedjasaputra, juga berefek negatif bagi anak-anak. Sebab, seperti dikutip situs di atas, efek-efek itu tidak bisa selalu dilihat oleh anak dalam dunia nyata sehingga mempersulit penyesuaian dirinya terhadap lingkungan. Tampilan adegan yang tidak disajikan secara utuh dalam tayangan TV juga menyebabkan anak tidak bisa memperoleh gambaran yang utuh tentang suatu kegiatan atau benda. Sehingga, menurut Mayke, anak tidak memahami suatu hal secara menyeluruh.

Akibat lainnya, menurut Konsultan Tumbuh Kembang Anak dari Rumah sakit Cipto Mangunkusumo (RSCM) Dr Hartono Goenardi SpA, pertumbuhan sel-sel syaraf otak pada anak tidak bisa optimal. Demikian juga dengan tingkat pembentukan hubungan antar sel syarafnya (synaps). Padahal, dua sampai tiga tahun pertama merupakan periode emas pertumbuhan otak anak yang seharusnya tidak boleh disia-siakan.

Untuk memacu pertumbuhan otaknya, anak-anak harus secara aktif mendapatkan stimulasi atau rangsangan dengan memberikan nutrisi yang cukup Dan suasana yang menyenangkan, di antaranya dengan permainan-permainan yang sehat. Jadi, bukan dengan terus-menerus membiarkan mereka nonton televisi. Nah!
</span>
FREE Animations for your email - by IncrediMail! Click Here!

Info buat temen2 yang mau mudik ke Jawa

 
Info aja buat para pemudik dari Jabodetabek ke arah Jawa  Tengah/Timur

 

Tolong disampaikan ke temen2/milis motor yang akan mudik ke Jawa

Apabila memasuki kota Karawang ( Lampu merah pengadilan/perempatan kea rah tol Karawang Barat, )agar berhati2  karena petugasnya disiplin sekali :

 

  1. Jangan tertinggal dari rombongan / konvoi
  2. Pada saat lampu merah ambil jarak min 2 mtr dari lampu karena

Sekarang ada pengaspalan baru jadi garis putih hilang ( bila lurus lampu akan kena …. )

  1. Lengkap SIM/STNK/Helm, Lampu2,Sein dan Spion.
  2. Jangan terlalu ke kanan ( kalau memang tidak berniat belok kanan )

Maksudnya setengah jalan ke kiri.

  1. Jam rawan pukul 05.00 s/d 07.00 pagi.

 

Apabila melanggar salah satu di atas temen2 akan terkena tilang dan berkurang uang saku untuk beli bensin

 

 

 

 

Nih, Perlengkapan Buat Pemudik Motor

MOTOR PLUS/GT

Jaket selain warna cerah, upayakan leher terlindung dari terpaan angin

Kamis, 18/9/2008 | 06:43 WIB

Tantangan jalan mudik dengan sepedamotor cukup berat. Apalagi cuaca sepanjang perjalanan cukup terik, sehingga potensi dehidrasi sangat tinggi. Terlebih salah dalam mengenakan pakaian pelindung.

Penyesuaian pakaian untuk melakukan perjalanan jauh jadi mutlak. Tetap safety, tapi bisa mengeliminir potensi kepanasan dan dehidrasi. "Pakaian sesuai standar aman berkendara. Baik bikers maupun boncenger sama saja. Perlengkapan seperti jaket, kaus tangan, sepatu booth, helm dan celana panjang wajib," terang Asep Hendro, bos AHRS, rumah produksi baju-baju turing dan balap di depok, Jawa Barat.

Untuk melindungi badan, pakai jaket. Pilih bahan yang nyaman di badan dan lembut di kulit. Kalau bahannya bukan kulit, bisa ditambah pengaman di lengan dan pundak. Jangan lupa juga pakai bodi portector agar dada terlindung dari terpaan angin.

Jika mengangkut penumpang, juga dilengkapi pakaian pelindung. Malah badannya dikasih pelindung tulang belakang. "Baru AHRS yang bakal ngeluarin," promosi Asep Hendro, mantan pembalap motor itu.

Untuk jaket, pilih warna mencolok. Boleh juga hitam, tapi dikombinasi dengan yang lebih mencolok. Misalnya, merah, kuning dan putih. Selain kelihatan beda, dipakai siang hari tidak menyerap panas.

Kalau tetap menggunakan kelir gelap, sebisanya bahannya memendarkan atau memantulkan cahaya balik, yang bisa memancarkan cahaya saat gelap. Ini penting bagi bikers yang melakukan perjalanan malam atau dini hari.

Selain badan dan kepala, kaki juga perlu mendapat perlindungan. Gunakan sepatu yang ada haknya, tapi tidak tinggi. Perhatikan juga bawahnya jangan yang licin. Dan tinggi sepatu tetap di atas mata kaki.(Tining)

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Pemicu Kecelakaan di Jalur Mudik

AUTOBILD/DOK OTO

Pecah ban pinggirkan mobil di lokasi yang aman

Kamis, 18/9/2008 | 06:42 WIB

Kemacetan dan kecelakaan merupakan dua magnet kuat selama musim mudik lebaran. Angkanya meningkat drastis dibanding hari biasa. Pemicunya, bukan saja meningkatnya jumlah kendaraan. Dari data kepolisian, sumber penyebab utamanya factor manusianya sendiri.

Bisa karena ceroboh, lelah fisik atau sakit. Kalau sampai ini terjadi pada Anda, mimpi merayakan hari yang Fitri bersama sanak  saudara di kampong halaman pupus. Nah, agar Anda tidak mengalami nasib naas, perlu diketahui penyebab lain terjadinya kecelakaan.

1. Mengantuk (33%)
Ternyata, sepertiga dari kecelakaan diakibatkan mengantuk. Hal manusiawi yang dapat menimbulkan fatalitas ketika kita berkendara, apalagi perjalanan luar kota. "Rata-rata orang mengantuk karena mengemudi bukan di jam biologisnya," ucap Bintarto Agung, instruktur utama di Indonesia Defensive Driving Centre (IDDC). Bayangkan saja, misalnya pada pukul 22.00 biasanya kita sudah masuk ke tempat tidur, ketika mudik mungkin masih di tengah perjalanan. Ditambah keletihan mata karena lampu dari depan, efek mengantuk pun semakin menjadi.
Cara paling ampuh mengurangi risiko mengantuk adalah melakukan perjalanan sesuai jam biologis. Apabila tidak dimungkinkan, bawalah minimal satu orang yang bisa bergantian mengemudi. Pada kondisi normal, seseorang sebaiknya menyetir maksimal 100 km lalu bergantian. Bila tidak ada tenaga pengganti, sebaiknya istirahat 10-15 menit setiap 2 jam perjalanan.

2. Kurang antisipasi (28%)
Harus disadari, mengemudi mobil adalah pekerjaan yang menuntut 100% konsentrasi. Pada kecepatan 100 km/jam, mobil Anda dalam sedetik telah menempuh 36 meter. Reaksi dan refleks sigap sangat dibutuhkan, mengingat hitungan detik saja bisa berpengaruh pada nyawa kita.
Antisipasi yang harus dilakukan, Anda (sebagai pengemudi) mengingatkan anggota keluarga tidak boleh menggangu selama mengemudi. Bila membawa anak-anak, tempatkanlah di bangku belakang bersama orang dewasa lain yang bisa meladeni mereka.
Matikan juga telepon saat berkendara, atau mintalah pada anggota keluarga lain untuk menjawab atau membalas pesan di ponsel.
 
3. Pecah ban (20%)
 Rata-rata pengemudi bingung apa yang harus dilakukan saat mendadak pecah ban. Salah antisipasi mobil bisa melintir atau bahkan terguling.  Mengatasi pecah ban simpel saja. Terpenting, Anda tidak mengerem! Ini sangat penting, karena daya cengkeram ban yang tidak rata akan menyebabkan mobil melintir saat direm.
Jauh lebih baik angkat gas secara perlahan dan biarkan mobil melambat. Jangan lupa tahan setir agar tetap lurus serta tidak melakukan manuver menikung mendadak. Bila tips ini dilakukan, niscaya pecah ban tak perlu menjadi suatu petaka.
Untuk langkah preventif, pastikan kondisi ban Anda masih baik ketika berangkat. Setel juga tekanan ban 2-3 psi lebih tinggi dari rekomendasi karena mengangkut beban penuh. Ingat juga, tekanan lebih rendah justru memperbesar kemungkinan ban pecah.
 
4. Menyalip dari kiri (10%)
Padatnya arus lalu lintas membuat banyak pengendara tak sabar dan menyalip dari kiri. Terutama di jalan tol, saat mudik banyak mobil bermasalah dan menghentikannya di bahu jalan. Nah, mereka ini lantas menjadi sasaran empuk untuk ditabrak.
Bagi Anda yang terpaksa harus berhenti di bahu jalan, letakkan segitiga pengaman dalam jarak yang cukup jauh, sekitar 50 meter dari mobil. Dengan demikian, misalnya ada pengemudi bandel sekalipun, ia dapat terinformasi mengenai keberadaan mobil Anda di bahu jalan.

5. Ditabrak, selip, rem blong dan lainnya (9%)
Sekitar 9% penyebab lainnya berasal dari berbagai sebab. Seperti ditabrak mobil lain, tergelincir serta rem blong. Anda juga bisa mengantisipasi hal-hal tadi selama memperhatikan kiat-kiat mengemudi aman.
Pertama tentu saja memastikan mobil dalam kondisi sempurna. Sebaiknya bawa mobil ke bengkel resmi untuk pengecekan sebelum mudik.  Kemudian persiapkan fisik Anda untuk perjalanan jauh. Dan jangan lupa untuk selalu memantau spion secara berkala serta memandang jauh ke depan. Selalu gunakan jarak aman yang disarankan memakai hitungan 2-3 detik.  (Fitra Eri)

 

Mudik Ke Jawa Hindari Masuk Kota Karawang

KOMPAS/AGUS SUSANTO

Senin, 8/9/2008 | 16:02 WIB


KARAWANG, SENIN - Para pemudik yang akan melintasi jalur pantai utara (Pantura) Jawa Barat (Jabar), baik dari Jakarta maupun Bekasi, diprakirakan akan terganggu di lintasan Kabupaten Karawang. Penyebabnya, ada pelebaran jalan sepanjang lebih-kurang  8,5 Km di wilayah Kecamatan Klari-Kecamatan Cikampek, Kabupaten Karawang. Pengerjaraannya  dipastikan tidak bisa selesai sebelum Idulfitri (lebaran) 1429 Hijriyah.

"Melihat kondisi saat ini, tampaknya pelebaran jalan itu hanya kemungkinan kecil bisa selesai sebelum lebaran," kata Yuliansyah, Petugas Proyek Pelebaran Jalan wilayah Karawang Dinas Bina Marga Provinsi Jawa Barat, saat mengikuti paparan kesiapan jalan menghadapi lebaran, di Pemkab Karawang, Senin (8/9).

Hingga kini, kata dia, tahap pelebaran jalan itu masih pengerasan jalan atau penggantian pondasi jalan. Dengan demikian, para pemudik dari Jakarta atau Bekasi menuju Cirebon atau menuju jalur Pantura nantinya akan terganggu saat melintas di ruas jalan tersebut.
 
Sementara itu, Kepala Dinas Bina Marga Karawang, Yet Dimyati mengatakan, pada awalnya pihaknya menargetkan pelebaran jalan tersebut bisa selesai pada H-10 lebaran. Namun melihat kondisi yang ada, ternyata tidak memungkinkan.

Atas kondisi itu, pihaknya akan berusaha agar di sekitar ruas pelebaran jalan itu nantinya bisa tetap dilintasi kendaraan. "Jadi, walaupun pelebaran jalan itu tidak bisa selesai sebelum lebaran, tapi harus bisa dilewati oleh para pengendara pemudik," katanya.
 
Selain melakukan proyek pelebaran jalan di wilayah Klari-Cikampek, pihaknya sudah melakukan perbaikan jalan di sekitar jalur alternatif Pasar Johar-Cikalong, dalam rangka menghadapi lebaran mendatang. Perbaikan jalan itu dilakukan dengan cara penambalan sejumlah ruas jalan yang bolong atau rusak

Jalur alternatif Pasar Johar-Cikalong itu sendiri menghubungkan ke Kecamatan Jatisari Karawang hingga akhirnya ke jalur Pantura. Jalur yang satu ini bisa dilewati oleh para pemudik yang menggunakan sepeda motor untuk menuju jalur Pantura. 

 

FREE Animations for your email - by IncrediMail! Click Here!

Kamis, 18 September 2008

STATEMEN INPUT - OUTPUT

1. PENGENALAN
COBOL atau Common Bussiness Oriented Language dikembangkan pada akhir tahun 1950-an awal tahun 1960-an.
Program Bahasa COBOL merupakan program terstruktur yang terdiri dari 4 divisi, yaitu :
1. IDENTIFICATION DIVISION
Identification division tidak mempunyai pengaruh terhadap proses program, hanya sebagai identifikasi saja, seperti :

IDENTIFICATION DIVISION.
PROGRAM-ID. NAMA PROGRAM.
AUTHOR. NAMA PROGRAMER.
INSTALLATION. NAMA INSTALASI.
DATE -WRITTEN . TANGGAL PROGRAM DIBUAT.
SECURITY SIFAT PROGRAM.

2. ENVIRONMENT DIVISION
Environment division terdiri dari 2 section, yaitu :
• Configuration Section, yang menjelaskan mengenai informasi computer yang digunakan.
• Input-Output, yang menerangkan peralatan-peralatan yang dipergunakan untuk memproses file baik media input dan output.

3. DATA DIVISION
Data division terdiri dari 4 section, yaitu :
• file section, untuk menjelaskan masing-masing file yang digunakan.
• Working-storage section, untuk pendeklarasian variable pada memory untuk data proses data output.
• Screen Section, untuk mendeklarasikan bentuk tampilan layer input maupun input.
• Linkage Section, untuk menerangkan data yang mempunyai hubungan dengan program lain.
• Report section, untuk menggambarkan bentuk laporan yang akan dicetak.



4. PROCEDURE DIVISION.
Pada procedure division menjelaskan instruksi-instruksi atau langkah-langkah program cobol.
Keempat divisi tersebut harus dituliskan pada pembuatan program cobol.
Dalam cobol mempunyai aturan-aturan tertentu mengenai kolom penulisan program, yaitu :
1. Kolom 1-6
Digunakan untuk memberikan nomor urut yang bersifat optional yaitu boleh dituliskan boleh tidak.
2. Kolom 7, bila diberi tanda :
• Hypen (-) sebagai tanda sambung dengan statement pada baris sebelumnya.
• Asterik (*) sebagai komentar.
• Slash (/) sebagai komentar yang akan dicetak mulai halaman baru teratas.
• Karakter D, maka apa yang ditulis pada baris tersebut dianggap sebagai komentar.





Senin, 15 September 2008

Digital Camera Guide

Digital Camera Guide

So, it's time for a digital camera huh? Well, buying one can be more than a little difficult. What types of features should you look for? Well, this guide will tell you that plus get you a little more familiar with what these cameras are capable of.

Megapixels
When it comes to megapixels, the more the better. I recommend a minimum of 2, but 3 or 4 is great. We did a test to see if a camera with 2.3 megapixels (actually 1.92 - 1600 x 1200) could produce a good quality 8x10.

Turns out it can, if you have the right paper and printer. We used HP Premium Plus photo paper with an HP 970 series printer and made a fantastic 8 x 10. Remember, I was a professional photographer before I got into computing, so I know a good print when I see it :-)

The resolution at 8x10 (we had to crop in to make the picture proportional to 8x10) was only 150 DPI. Most printers would not make a real good 8x10 at that resolution, but this one did. So, if you want to be sure you can get good 8 x 10s, you may want to go with a 3 megapixel camera or better (that gives you around 200 DPI at 8x10 size, still not quite the optimum 300 DPI, but it looks good with the right printer).


Optical vs Digital Zoom
You've probably noticed that most digital cameras have both a specification for digital and optical zoom. Pay the most attention to the optical zoom.

The optical zoom magnifies (zooms in) using glass. The digital zoom basically crops out the edge of the picture to make the subject appear closer, causing you to lose resolution or to get an interpolated resolution (i.e. the camera adds pixels). Neither of which help image quality.

Finally, make sure you get enough (optical) zoom. A 2x zoom isn't going to do much for you. A 3x is the average you'll find in most digital cameras will probably be good for most uses. More on lenses later.


Connection
How does the camera connect to your computer? If you have a USB port in your computer, you'll want a camera that can connect via USB as opposed to a slow serial connection.

On the other hand, if your computer doesn't have a USB port, is there a serial connector available for the camera you're looking at? If so, is it a special order and how long does it take to get it?


Storage
What does the camera use to store images with? If it uses a memory stick, make sure you consider buying additional sticks when you get your camera. A typical 8 meg memory stick that comes with a 2 megapixel camera only holds 5 or 6 images at the camera's best quality.

Some cameras use a 3.5 inch disk for storage. Be careful of these!
Although it may sound like a good idea, a 3 megapixel camera at high resolution produces a 1 meg file (compressed!). That's only 1 picture per disk.


Here's a few more things to look out for when trying to make your digital camera purchase.

Picture Formats
When you're trying to decide on which digital camera to get, check and see how many different picture formats it supports.

You want something that can produce both uncompressed (usually TIFF) and compressed (usually JPEG) images. I personally use the high quality JPEG setting on my camera for most of my shooting. TIFFs are just too big and the difference in quality is not ascertainable by mere mortals.

You also want to be able to shoot at a lower resolution than the camera's maximum. That way, If you're running short on memory, you can squeeze a few more shots on your memory stick.


Auxiliary Lens / Flash
This was a biggie for me. While a 3x zoom may work for the "average" user, I needed something that allowed me to do some wide angle work as well as have a good telephoto lens.

So, the camera I purchased a few months back was a Nikon Coolpix 990 (note that this isn't the only camera that can accept lenses). It has auxiliary lenses that screw into the filter ring on the front of the lens. I now have an ultra-wide fisheye lens plus a nice telephoto.

In addition to lenses, I wanted a good flash. The flash that is built into most of these cameras gives you a top range of 15-20 feet - at best. I wanted a camera that could take a powerful auxiliary flash (again, the Nikon isn't the only camera that fits this requirement, but I liked it better than the rest). If you need more reach than the small built in flash can deliver, then make sure you can attach an external flash to any camera you consider.

As an added bonus, if you get a camera that can take an external flash, you can place that flash on a bracket and eliminate red-eye.


Flash Distance
Speaking of flashes, make sure you check the distance the built in flash is good for. You don't want a camera with a wimpy flash that only travels a few feet (well, unless you can get an external flash for it as described above).


Battery Type
This may not sound important, but it is. Anyone who owns a digital camera can tell you they eat batteries the way a sumo wrestler eats at a buffet.

Make sure the camera can run on regular (or rechargeable) "AA" type batteries. You don't want a camera that eats through expensive lithium batteries every 10 shots or so.

One thing to remember about digital cameras, they do eat through batteries. I recommend getting some Nickel Metal Hydride rechargeable for it. I have some for mine and they have saved me a fortune.


Final Notes
Choosing a digital camera isn't easy. There's a huge selection out there and only you can determine which features you need.

For instance, if you shoot wildlife photos, a small 3x zoom probably isn't going to cut it (unless you can attach auxiliary lenses to it). If you shoot lots of close-ups, make sure the camera has some sort of macro capability. If you shoot big group photos indoors, an external flash may be necessary.

My advice is to make a list of things you want to be able to do with the camera then go to somewhere that can help you make a good purchase decision.

Finally, buy the BEST camera you can possibly afford. Or wait until the price drops on one with the type of features you want.

Cracking Zip Password Files

Cracking Zip Password Files

Tut On Cracking Zip Password Files..
What is FZC? FZC is a program that cracks zip files (zip is a method of compressing multiple files into one smaller file) that are password-protected (which means you're gonna need a password to open the zip file and extract files out of it). You can get it anywhere - just use a search engine such as altavista.com.
FZC uses multiple methods of cracking - bruteforce (guessing passwords systematically until the program gets it) or wordlist attacks (otherwise known as dictionary attacks. Instead of just guessing passwords systematically, the program takes passwords out of a "wordlist", which is a text file that contains possible passwords. You can get lots of wordlists at www.theargon.com.).
FZC can be used in order to achieve two different goals: you can either use it to recover a lost zip password which you used to remember but somehow forgot, or to crack zip passwords which you're not supposed to have. So like every tool, this one can be used for good and for evil.
The first thing I want to say is that reading this tutorial... is the easy way to learn how to use this program, but after reading this part of how to use the FZC you should go and check the texts that come with that program and read them all. You are also going to see the phrase "check name.txt" often in this text. These files should be in FZC's directory. They contain more information about FZC.
FZC is a good password recovery tool, because it's very fast and also support resuming so you don't have to keep the computer turned on until you get the password, like it used to be some years ago with older cracking programs. You would probably always get the password unless the password is longer than 32 chars (a char is a character, which can be anything - a number, a lowercase or undercase letter or a symbol such as ! or &) because 32 chars is the maximum value that FZC will accept, but it doesn't really matter, because in order to bruteforce a password with 32 chars you'll need to be at least immortal..heehhe.. to see the time that FZC takes with bruteforce just open the Bforce.txt file, which contains such information.
FZC supports brute-force attacks, as well as wordlist attacks. While brute-force attacks don't require you to have anything, wordlist attacks require you to have wordlists, which you can get from www.theargon.com. There are wordlists in various languages, various topics or just miscellaneous wordlists. The bigger the wordlist is, the more chances you have to crack the password.
Now that you have a good wordlist, just get FZC working on the locked zip file, grab a drink, lie down and wait... and wait... and wait...and have good thoughts like "In wordlist mode I'm gonna get the password in minutes" or something like this... you start doing all this and remember "Hey this guy started with all this bullshit and didn't say how I can start a wordlist attack!..." So please wait just a little more, read this tutorial 'till the end and you can do all this "bullshit".

We need to keep in mind that are some people might choose some really weird passwords (for example: 'e8t7@$^%*gfh), which are harder to crack and are certainly impossible to crack (unless you have some weird wordlist). If you have a bad luck and you got such a file, having a 200MB list won't help you anymore. Instead, you'll have to use a different type of attack. If you are a person that gives up at the first sign of failure, stop being like that or you won't get anywhere. What you need to do in such a situation is to put aside your sweet xxx MB's list and start using the Brute Force attack.
If you have some sort of a really fast and new computer and you're afraid that you won't be able to use your computer's power to the fullest because the zip cracker doesn't support this kind of technology, it's your lucky day! FZC has multiple settings for all sorts of hardware, and will automatically select the best method.

Now that we've gone through all the theoretical stuff, let's get to the actual commands.

--------------------------------------------------------------------------------
Bruteforce
--------------------------------------------------------------------------------


The command line you'll need to use for using brute force is:

fzc -mb -nzFile.zip -lChr Lenght -cType of chars

Now if you read the bforce.txt that comes with fzc you'll find the description of how works Chr Lenght and the Type of chars, but hey, I'm gonna explain this too. Why not, right?... (but remember look at the bforce.txt too)

For Chr Lenght you can use 4 kind of switches...

-> You can use range -> 4-6 :it would brute force from 4 Chr passwors to 6 chr passwords
-> You can use just one lenght -> 5 :it would just brute force using passwords with 5 chars
-> You can use also the all number -> 0 :it would start brute forcing from passwords with lenght 0 to lenght 32, even if you are crazy i don't think that you would do this.... if you are thinking in doing this get a live...
-> You can use the + sign with a number -> 3+ :in this case it would brute force from passwords with lenght 3 to passwords with 32 chars of lenght, almost like the last option...

For the Type of chars we have 5 switches they are:

-> a for using lowercase letters
-> A for using uppercase letters
-> ! for using simbols (check the Bforce.txt if you want to see what simbols)
-> s for using space
-> 1 for using numbers


Example:
If you want to find a password with lowercase and numbers by brute force you would just do something like:

fzc -mb -nzTest.zip -l4-7 -ca1

This would try all combinations from passwords with 4 chars of lenght till 7 chars, but just using numbers and lowercase.

*****
hint
*****

You should never start the first brute force attack to a file using all the chars switches, first just try lowercase, then uppercase, then uppercase with number then lowercase with numbers, just do like this because you can get lucky and find the password much faster, if this doesn't work just prepare your brain and start with a brute force that would take a lot of time. With a combination like lowercase, uppercase, special chars and numbers.


--------------------------------------------------------------------------------
Wordlis
--------------------------------------------------------------------------------

Like I said in the bottom and like you should be thinking now, the wordlist is the most powerfull mode in this program. Using this mode, you can choose between 3 modes, where each one do some changes to the text that is in the wordlist, I'm not going to say what each mode does to the words, for knowing that just check the file wlist.txt, the only thing I'm going to tell you is that the best mode to get passwords is mode 3, but it takes longer time too.
To start a wordlist attak you'll do something like.

fzc -mwMode number -nzFile.zip -nwWordlist

Where:

Mode number is 1, 2 or 3 just check wlist.txt to see the changes in each mode.
File.zip is the filename and Wordlist is the name of the wordlist that you want to use. Remember that if the file or the wordlist isn't in the same directory of FZC you'll need to give the all path.

You can add other switches to that line like -fLine where you define in which line will FZC start reading, and the -lChar Length where it will just be read the words in that char length, the switche works like in bruteforce mode.
So if you something like

fzc -mw1 -nztest.zip -nwMywordlist.txt -f50 -l9+

FZC would just start reading at line 50 and would just read with length >= to 9.

Example:

If you want to crack a file called myfile.zip using the "theargonlistserver1.txt" wordlist, selecting mode 3, and you wanted FZC to start reading at line 50 you would do:

fzc -mw3 -nzmyfile.zip -nwtheargonlistserver1.txt -f50





--------------------------------------------------------------------------------
Resuming
--------------------------------------------------------------------------------

Other good feature in FZC is that FZC supports resuming. If you need to shutdown your computer and FZC is running you just need to press the ESC key, and fzc will stop. Now if you are using a brute force attack the current status will be saved in a file called resume.fzc but if you are using a wordlist it will say to you in what line it ended (you can find the line in the file fzc.log too).
To resume the bruteforce attack you just need to do:

fzc -mr

And the bruteforce attack will start from the place where it stopped when you pressed the ESC key.
But if you want to resume a wordlist attack you'll need to start a new wordlist attack, saying where it's gonna start. So if you ended the attack to the file.zip in line 100 using wordlist.txt in mode 3 to resume you'll type

fzc -mw3 -nzfile.zip -nwwordlist.txt -f100

Doing this FZC would start in line 100, since the others 99 lines where already checked in an earlier FZC session.


Well, it looks like I covered most of what you need to know. I certainly hope it helped you... don't forget to read the files that come with the program

Kamis, 11 September 2008

Beep Code Error

After repeated requests for beep codes i have decided to post them here maybe they could be pinned

Standard Original IBM POST Error Codes
Code Description

1 short beep System is OK
2 short beeps POST Error - error code shown on screen No beep Power supply or system board problem Continuous beep Power supply, system board, or keyboard problem Repeating short beeps Power supply or system board problem
1 long, 1 short beep System board problem
1 long, 2 short beeps Display adapter problem (MDA, CGA)
1 long, 3 short beeps Display adapter problem (EGA)
3 long beeps 3270 keyboard card
IBM POST Diagnostic Code Descriptions
Code Description
100 - 199 System Board
200 - 299 Memory
300 - 399 Keyboard
400 - 499 Monochrome Display
500 - 599 Colour/Graphics Display
600 - 699 Floppy-disk drive and/or Adapter
700 - 799 Math Coprocessor
900 - 999 Parallel Printer Port
1000 - 1099 Alternate Printer Adapter
1100 - 1299 Asynchronous Communication Device, Adapter, or Port
1300 - 1399 Game Port
1400 - 1499 Colour/Graphics Printer
1500 - 1599 Synchronous Communication Device, Adapter, or Port
1700 - 1799 Hard Drive and/or Adapter
1800 - 1899 Expansion Unit (XT)
2000 - 2199 Bisynchronous Communication Adapter
2400 - 2599 EGA system-board Video (MCA)
3000 - 3199 LAN Adapter
4800 - 4999 Internal Modem
7000 - 7099 Phoenix BIOS Chips
7300 - 7399 3.5" Disk Drive
8900 - 8999 MIDI Adapter
11200 - 11299 SCSI Adapter
21000 - 21099 SCSI Fixed Disk and Controller
21500 - 21599 SCSI CD-ROM System



AMI BIOS Beep Codes
Code Description

1 Short Beep System OK
2 Short Beeps Parity error in the first 64 KB of memory
3 Short Beeps Memory failure in the first 64 KB
4 Short Beeps Memory failure in the first 64 KB Operational of memory
or Timer 1 on the motherboard is not functioning
5 Short Beeps The CPU on the motherboard generated an error
6 Short Beeps The keyboard controller may be bad. The BIOS cannot switch to protected mode
7 Short Beeps The CPU generated an exception interrupt
8 Short Beeps The system video adapter is either missing, or its memory is faulty
9 Short Beeps The ROM checksum value does not match the value encoded in the BIOS
10 Short Beeps The shutdown register for CMOS RAM failed
11 Short Beeps The external cache is faulty
1 Long, 3 Short Beeps Memory Problems
1 Long, 8 Short Beeps Video Card Problems

Phoenix BIOS Beep Codes
Note - Phoenix BIOS emits three sets of beeps, separated by a brief pause.

Code Description
1-1-3 CMOS read/write failure
1-1-4 ROM BIOS checksum error
1-2-1 Programmable interval timer failure
1-2-2 DMA initialisation failure
1-2-3 DMA page register read/write failure
1-3-1 RAM refresh verification failure
1-3-3 First 64k RAM chip or data line failure
1-3-4 First 64k RAM odd/even logic failure
1-4-1 Address line failure first 64k RAM
1-4-2 Parity failure first 64k RAM
2-_-_ Faulty Memory
3-1-_ Faulty Motherboard
3-2-4 Keyboard controller Test failure
3-3-4 Screen initialisation failure
3-4-1 Screen retrace test failure
3-4-2 Search for video ROM in progress
4-2-1 Timer tick interrupt in progress or failure
4-2-2 Shutdown test in progress or failure
4-2-3 Gate A20 failure
4-2-4 Unexpected interrupt in protected mode
4-3-1 RAM test in progress or failure>ffffh
4-3-2 Faulty Motherboard
4-3-3 Interval timer channel 2 test or failure
4-3-4 Time of Day clock test failure
4-4-1 Serial port test or failure
4-4-2 Parallel port test or failure
4-4-3 Math coprocessor test or failure
Low 1-1-2 System Board select failure
Low 1-1-3 Extended CMOS RAM failure

All About Spyware

There are a lot of PC users that know little about "Spyware", "Mal-ware", "hijackers", "Dialers" & many more. This will help you avoid pop-ups, spammers and all those baddies.

What is spy-ware?
Spy-ware is Internet jargon for Advertising Supported software (Ad-ware). It is a way for shareware authors to make money from a product, other than by selling it to the users. There are several large media companies that offer them to place banner ads in their products in exchange for a portion of the revenue from banner sales. This way, you don't have to pay for the software and the developers are still getting paid. If you find the banners annoying, there is usually an option to remove them, by paying the regular licensing fee.

Known spywares
There are thousands out there, new ones are added to the list everyday. But here are a few:
Alexa, Aureate/Radiate, BargainBuddy, ClickTillUWin, Conducent Timesink, Cydoor, Comet Cursor, eZula/KaZaa Toptext, Flashpoint/Flashtrack, Flyswat, Gator, GoHip, Hotbar, ISTbar, Lions Pride Enterprises/Blazing Logic/Trek Blue, Lop (C2Media), Mattel Brodcast, Morpheus, NewDotNet, Realplayer, Songspy, Xupiter, Web3000, WebHancer, Windows Messenger Service.

How to check if a program has spyware?
The is this Little site that keeps a database of programs that are known to install spyware.

Check Here: http://www.spywareguide.com/product_search.php

If you would like to block pop-ups (IE Pop-ups).
There tons of different types out there, but these are the 2 best, i think.


Try: Google Toolbar (http://toolbar.google.com/) This program is Free
Try: AdMuncher (http://www.admuncher.com) This program is Shareware

If you want to remove the "spyware" try these.
Try: Lavasoft Ad-Aware (http://www.lavasoftusa.com/) This program is Free
Info: Ad-aware is a multi spyware removal utility, that scans your memory, registry and hard drives for known spyware components and lets you remove them. The included backup-manager lets you reinstall a backup, offers and multi language support.

Try: Spybot-S&D (http://www.safer-networking.org/) This program is Free
Info: Detects and removes spyware of different kinds (dialers, loggers, trojans, user tracks) from your computer. Blocks ActiveX downloads, tracking cookies and other threats. Over 10,000 detection files and entries. Provides detailed information about found problems.

Try: BPS Spyware and Adware Remover (http://www.bulletproofsoft.com/spyware-remover.html) This program is Shareware
Info: Adware, spyware, trackware and big brotherware removal utility with multi-language support. It scans your memory, registry and drives for known spyware and lets you remove them. Displays a list and lets you select the items you'd like to remove.

Try: Spy Sweeper v2.2 (http://www.webroot.com/wb/products/spysweeper/index.php) This program is Shareware
Info: Detects and removes spyware of different kinds (dialers, loggers, trojans, user tracks) from your computer.
The best scanner out there, and updated all the time.

Try: HijackThis 1.97.7 (http://www.spywareinfo.com/~merijn/downloads.html) This program is Freeware
Info: HijackThis is a tool, that lists all installed browser add-on, buttons, startup items and allows you to inspect them, and optionally remove selected items.


If you would like to prevent "spyware" being install.
Try: SpywareBlaster 2.6.1 (http://www.wilderssecurity.net/spywareblaster.html) This program is Free
Info: SpywareBlaster doesn`t scan and clean for so-called spyware, but prevents it from being installed in the first place. It achieves this by disabling the CLSIDs of popular spyware ActiveX controls, and also prevents the installation of any of them via a webpage.

Try: SpywareGuard 2.2 (http://www.wilderssecurity.net/spywareguard.html) This program is Free
Info: SpywareGuard provides a real-time protection solution against so-called spyware. It works similar to an anti-virus program, by scanning EXE and CAB files on access and alerting you if known spyware is detected.

Try: XP-AntiSpy (http://www.xp-antispy.org/) This program is Free
Info: XP-AntiSpy is a small utility to quickly disable some built-in update and authentication features in WindowsXP that may rise security or privacy concerns in some people.

Try: SpySites (http://camtech2000.net/Pages/SpySites_Prog...ml#SpySitesFree) This program is Free
Info: SpySites allows you to manage the Internet Explorer Restricted Zone settings and easily add entries from a database of 1500+ sites that are known to use advertising tracking methods or attempt to install third party software.

If you would like more Information about "spyware".
Check these sites.
http://www.spychecker.com/
http://www.spywareguide.com/
http://www.cexx.org/adware.htm
http://www.theinfomaniac.net/infomaniac/co...rsSpyware.shtml
http://www.thiefware.com/links/
http://simplythebest.net/info/spyware.html

Usefull tools...
Try: Stop Windows Messenger Spam 1.10 (http://www.jester2k.pwp.blueyonder.co.uk/j...r2ksoftware.htm) This program is Free
Info: "Stop Windows Messenger Spam" stops this Service from running and halts the spammers ability to send you these messages.

----------------------------------------------------------------------------
All these softwares will help remove and prevent evil spammers and spywares attacking your PC. I myself recommend getting "spyblaster" "s&d spybot" "spy sweeper" & "admuncher" to protect your PC. A weekly scan is also recommended

Free Virus Scan
Scan for spyware, malware and keyloggers in addition to viruses, worms and trojans. New threats and annoyances are created faster than any individual can keep up with.
http://defender.veloz.com// - 15k


Finding . is a Click Away at 2020Search.com
Having trouble finding what you re looking for on: .? 2020Search will instantly provide you with the result you re looking for by drawing on some of the best search engines the Internet has to offer. Your result is a click away!
http://www.2020search.com// - 43k


Download the BrowserVillage Toolbar.
Customize your Browser! Eliminate Pop-up ads before they start, Quick and easy access to the Web, and much more. Click Here to Install Now!
http://www.browservillage.com/ - 36k

Basic Guide Internet

The Internet is a computer network made up of thousands of networks worldwide. No one knows exactly how many computers are connected to the Internet. It is certain, however, that these number in the millions.

No one is in charge of the Internet. There are organizations which develop technical aspects of this network and set standards for creating applications on it, but no governing body is in control. The Internet backbone, through which Internet traffic flows, is owned by private companies.

All computers on the Internet communicate with one another using the Transmission Control Protocol/Internet Protocol suite, abbreviated to TCP/IP. Computers on the Internet use a client/server architecture. This means that the remote server machine provides files and services to the user's local client machine. Software can be installed on a client computer to take advantage of the latest access technology.

An Internet user has access to a wide variety of services: electronic mail, file transfer, vast information resources, interest group membership, interactive collaboration, multimedia displays, real-time broadcasting, shopping opportunities, breaking news, and much more.

The Internet consists primarily of a variety of access protocols. Many of these protocols feature programs that allow users to search for and retrieve material made available by the protocol.

COMPONENTS OF THE INTERNET

--------------------------------------------------------------------------------

WORLD WIDE WEB
The World Wide Web (abbreviated as the Web or WWW) is a system of Internet servers that supports hypertext to access several Internet protocols on a single interface. Almost every protocol type available on the Internet is accessible on the Web. This includes e-mail, FTP, Telnet, and Usenet News. In addition to these, the World Wide Web has its own protocol: HyperText Transfer Protocol, or HTTP. These protocols will be explained later in this document.

The World Wide Web provides a single interface for accessing all these protocols. This creates a convenient and user-friendly environment. It is no longer necessary to be conversant in these protocols within separate, command-level environments. The Web gathers together these protocols into a single system. Because of this feature, and because of the Web's ability to work with multimedia and advanced programming languages, the Web is the fastest-growing component of the Internet.

The operation of the Web relies primarily on hypertext as its means of information retrieval. HyperText is a document containing words that connect to other documents. These words are called links and are selectable by the user. A single hypertext document can contain links to many documents. In the context of the Web, words or graphics may serve as links to other documents, images, video, and sound. Links may or may not follow a logical path, as each connection is programmed by the creator of the source document. Overall, the Web contains a complex virtual web of connections among a vast number of documents, graphics, videos, and sounds.

Producing hypertext for the Web is accomplished by creating documents with a language called HyperText Markup Language, or HTML. With HTML, tags are placed within the text to accomplish document formatting, visual features such as font size, italics and bold, and the creation of hypertext links. Graphics and multimedia may also be incorporated into an HTML document. HTML is an evolving language, with new tags being added as each upgrade of the language is developed and released. The World Wide Web Consortium (W3C), led by Web founder Tim Berners-Lee, coordinates the efforts of standardizing HTML. The W3C now calls the language XHTML and considers it to be an application of the XML language standard.

The World Wide Web consists of files, called pages or home pages, containing links to documents and resources throughout the Internet.

The Web provides a vast array of experiences including multimedia presentations, real-time collaboration, interactive pages, radio and television broadcasts, and the automatic "push" of information to a client computer. Programming languages such as Java, JavaScript, Visual Basic, Cold Fusion and XML are extending the capabilities of the Web. A growing amount of information on the Web is served dynamically from content stored in databases. The Web is therefore not a fixed entity, but one that is in a constant state of development and flux.

For more complete information about the World Wide Web, see Understanding The World Wide Web.

E-MAIL
Electronic mail, or e-mail, allows computer users locally and worldwide to exchange messages. Each user of e-mail has a mailbox address to which messages are sent. Messages sent through e-mail can arrive within a matter of seconds.

A powerful aspect of e-mail is the option to send electronic files to a person's e-mail address. Non-ASCII files, known as binary files, may be attached to e-mail messages. These files are referred to as MIME attachments.MIME stands for Multimedia Internet Mail Extension, and was developed to help e-mail software handle a variety of file types. For example, a document created in Microsoft Word can be attached to an e-mail message and retrieved by the recipient with the appropriate e-mail program. Many e-mail programs, including Eudora, Netscape Messenger, and Microsoft Outlook, offer the ability to read files written in HTML, which is itself a MIME type.

TELNET
Telnet is a program that allows you to log into computers on the Internet and use online databases, library catalogs, chat services, and more. There are no graphics in Telnet sessions, just text. To Telnet to a computer, you must know its address. This can consist of words (locis.loc.gov) or numbers (140.147.254.3). Some services require you to connect to a specific port on the remote computer. In this case, type the port number after the Internet address. Example: telnet nri.reston.va.us 185.

Telnet is available on the World Wide Web. Probably the most common Web-based resources available through Telnet have been library catalogs, though most catalogs have since migrated to the Web. A link to a Telnet resource may look like any other link, but it will launch a Telnet session to make the connection. A Telnet program must be installed on your local computer and configured to your Web browser in order to work.

With the increasing popularity of the Web, Telnet has become less frequently used as a means of access to information on the Internet.

FTP
FTP stands for File Transfer Protocol. This is both a program and the method used to transfer files between computers. Anonymous FTP is an option that allows users to transfer files from thousands of host computers on the Internet to their personal computer account. FTP sites contain books, articles, software, games, images, sounds, multimedia, course work, data sets, and more.

If your computer is directly connected to the Internet via an Ethernet cable, you can use one of several PC software programs, such as WS_FTP for Windows, to conduct a file transfer.

FTP transfers can be performed on the World Wide Web without the need for special software. In this case, the Web browser will suffice. Whenever you download software from a Web site to your local machine, you are using FTP. You can also retrieve FTP files via search engines such as FtpFind, located at /http://www.ftpfind.com/. This option is easiest because you do not need to know FTP program commands.

E-MAIL DISCUSSION GROUPS
One of the benefits of the Internet is the opportunity it offers to people worldwide to communicate via e-mail. The Internet is home to a large community of individuals who carry out active discussions organized around topic-oriented forums distributed by e-mail. These are administered by software programs. Probably the most common program is the listserv.

A great variety of topics are covered by listservs, many of them academic in nature. When you subscribe to a listserv, messages from other subscribers are automatically sent to your electronic mailbox. You subscribe to a listserv by sending an e-mail message to a computer program called a listserver. Listservers are located on computer networks throughout the world. This program handles subscription information and distributes messages to and from subscribers. You must have a e-mail account to participate in a listserv discussion group. Visit Tile.net at /http://tile.net/ to see an example of a site that offers a searchablecollection of e-mail discussion groups.

Majordomo and Listproc are two other programs that administer e-mail discussion groups. The commands for subscribing to and managing your list memberships are similar to those of listserv.

USENET NEWS
Usenet News is a global electronic bulletin board system in which millions of computer users exchange information on a vast range of topics. The major difference between Usenet News and e-mail discussion groups is the fact that Usenet messages are stored on central computers, and users must connect to these computers to read or download the messages posted to these groups. This is distinct from e-mail distribution, in which messages arrive in the electronic mailboxes of each list member.

Usenet itself is a set of machines that exchanges messages, or articles, from Usenet discussion forums, called newsgroups. Usenet administrators control their own sites, and decide which (if any) newsgroups to sponsor and which remote newsgroups to allow into the system.

There are thousands of Usenet newsgroups in existence. While many are academic in nature, numerous newsgroups are organized around recreational topics. Much serious computer-related work takes place in Usenet discussions. A small number of e-mail discussion groups also exist as Usenet newsgroups.

The Usenet newsfeed can be read by a variety of newsreader software programs. For example, the Netscape suite comes with a newsreader program called Messenger. Newsreaders are also available as standalone products.

FAQ, RFC, FYI
FAQ stands for Frequently Asked Questions. These are periodic postings to Usenet newsgroups that contain a wealth of information related to the topic of the newsgroup. Many FAQs are quite extensive. FAQs are available by subscribing to individual Usenet newsgroups. A Web-based collection of FAQ resources has been collected by The Internet FAQ Consortium and is available at /http://www.faqs.org/.

RFC stands for Request for Comments. These are documents created by and distributed to the Internet community to help define the nuts and bolts of the Internet. They contain both technical specifications and general information.

FYI stands for For Your Information. These notes are a subset of RFCs and contain information of interest to new Internet users.

Links to indexes of all three of these information resources are available on the University Libraries Web site at /http://library.albany.edu/reference/faqs.html.

CHAT & INSTANT MESSENGING
Chat programs allow users on the Internet to communicate with each other by typing in real time. They are sometimes included as a feature of a Web site, where users can log into the "chat room" to exchange comments and information about the topics addressed on the site. Chat may take other, more wide-ranging forms. For example, America Online is well known for sponsoring a number of topical chat rooms.

Internet Relay Chat (IRC) is a service through which participants can communicate to each other on hundreds of channels. These channels are usually based on specific topics. While many topics are frivolous, substantive conversations are also taking place. To access IRC, you must use an IRC software program.

A variation of chat is the phenomenon of instant messenging. With instant messenging, a user on the Web can contact another user currently logged in and type a conversation. Most famous is America Online's Instant Messenger. ICQ, MSN and Yahoo are other commonly-used chat programs.

Other types of real-time communication are addressed in the tutorial Understanding the World Wide Web.

MUD/MUSH/MOO/MUCK/DUM/MUSE
MUD stands for Multi User Dimension. MUDs, and their variations listed above, are multi-user virtual reality games based on simulated worlds. Traditionally text based, graphical MUDs now exist. There are MUDs of all kinds on the Internet, and many can be joined free of charge. For more information, read one of the FAQs devoted to MUDs available at the FAQ site at

Rabu, 10 September 2008

Arisan

Arisan Bulan ini hari sabtu atau minggu

tempat di giant, bekasi cyber park or rmh gw.
please confirm
m@men

Selamat Berpuasa

Selamat Menuanaikan Ibadah Puasa 1429 H

Dengan Segenap Hati saya mengucapkan Marhaban Ya ramadhan, Selamat Berpuasa Moga Ibadah Kita diterima Allah swt. amin

Senin, 08 September 2008

36 Graphics E-book adress

36 Graphics & Design Ebooks

Maya, Photoshop, Macromedia, Bryce, Digital Photography, & more....

Download with FlashGet

f*p://195.135.232.80/Books/design/8.books.Maya.[by.KiN_www.netz.ru].rar
f*p://195.135.232.80/Books/design/A.Short.Course.in.Digital.Photography.[by.KiN_www.netz.ru].rar
f*p://195.135.232.80/Books/design/Adobe.Creative.Suite.Keyboard.Shortcuts.[by.KiN_www.netz.ru]_3,1.MB.rar
f*p://195.135.232.80/Books/design/Adobe.Photoshop.CS.in.10.Simple.Steps.or.Less.(2004).[by.KiN_www.netz.ru]_7,84 MB.rar
f*p://195.135.232.80/Books/design/Adobe.Photoshop.Tutorial.7.Day.Course.html.a.[28.84.MB_www.netz.ru].rar
f*p://195.135.232.80/Books/design/Advanced.3D.Photorealism.Techniques[9,76.MB_RUS_www.netz.ru].rar
f*p://195.135.232.80/Books/design/Bill.Flemming.Advanced.3D.Photorealism.Techniques.[RUS].[by.KiN_www.netz.ru]_9,75 MB.rar
f*p://195.135.232.80/Books/design/Bryce.5.Manual.[by.KiN_www.netz.ru_4.01MB].rar
f*p://195.135.232.80/Books/design/Corel.103.tutorials.RUS.[by.KiN_www.netz.ru].rar
f*p://195.135.232.80/Books/design/Designing Secure Web-Based Applications for Windows 2000.zip
f*p://195.135.232.80/Books/design/DHTML.Weekend.Crash.Course[by.KiN_www.netz.ru].rar
f*p://195.135.232.80/Books/design/Digital.Photography.Hacks.[by.KiN_www.netz.ru]_11,76.MB.rar
f*p://195.135.232.80/Books/design/How.To.Do.Everything.With.Illustrator.[by.KiN_www.netz.ru]_30,58.MB.rar
f*p://195.135.232.80/Books/design/How.To.Do.Everything.With.Photoshop.7.[by.KiN_www.netz.ru]_9,8 MB.rar
f*p://195.135.232.80/Books/design/How.To.Draw.Anime.Photoshop.Coloring.Tips.[by.KiN_www.netz.ru]_773 kB.rar
f*p://195.135.232.80/Books/design/How.To.Draw.Manga.Photoshop.Techniques.[by.KiN_www.netz.ru]_343 kB.rar
f*p://195.135.232.80/Books/design/How.To.Use.Adobe.Photoshop.7.[by.KiN_www.netz.ru]_14,66 MB.rar
f*p://195.135.232.80/Books/design/HTML.4.01.Weekend.Crash.Course[by.KiN_www.netz.ru].rar
f*p://195.135.232.80/Books/design/HTML.Complete.Course.[by.KiN_www.netz.ru]_26,79.MB.rar
f*p://195.135.232.80/Books/design/Learn.How.To.Draw.[by.KiN_www.netz.ru]_1,61.MB.rar
f*p://195.135.232.80/Books/design/Learn.HTML4.In.a.Weekend.[by.KiN_www.netz.ru]_11,02.MB.rar
f*p://195.135.232.80/Books/design/Learning.Macromedia.FlashMX.2004[658.kB_www.netz.ru].rar
f*p://195.135.232.80/Books/design/Macromedia.Dreamweaver.4.Bible[8,86.MB_www.netz.ru].rar
f*p://195.135.232.80/Books/design/Macromedia.Dreamweaver.MX.2004.Web.Application.Recipes[6,5.MB_www.netz.ru].rar
f*p://195.135.232.80/Books/design/Macromedia.Flash.MX.2004.ActionScript.Reference.Guide.rar
f*p://195.135.232.80/Books/design/Macromedia.Flash.MX.2004.Using.Components.rar
f*p://195.135.232.80/Books/design/Macromedia.Flashmx.Actionscript.Reference.Guide.2004[2,66.MB_www.netz.ru].rar
f*p://195.135.232.80/Books/design/Macromedia.Flashmx.Using.Components.2004[979.kB_www.netz.ru].rar
f*p://195.135.232.80/Books/design/Macromedia.Press.Macromedia.Dreamweaver.MX.Dynamic.Applications.[10.46.MB_www.netz.ru].rar
f*p://195.135.232.80/Books/design/New.Riders.Photoshop.7.Power.Shortcuts.[by.KiN_www.netz.ru]_3,5 MB.rar
f*p://195.135.232.80/Books/design/NewRiders.MacromediaDreamweaverMx2004WebApplicationRecipes(6,5MB_www.netz.ru).rar f*p://195.135.232.80/Books/design/PhotoShop.&.Illustrator.Tutorial.[14.37.MB_www.netz.ru].rar
f*p://195.135.232.80/Books/design/Photoshop.6.Bible.[13.95.MB_www.netz.ru].rar f*p://195.135.232.80/Books/design/Photoshop.75.tutorial.RUS.[by.KiN_www.netz.ru].rar
f*p://195.135.232.80/Books/design/Photoshop.CS.Tips.and.Tricks.[by.KiN_www.netz.ru].rar
f*p://195.135.232.80/Books/design/Photoshop.Rus.4-18[6.5Mb,_www.netz.ru].rar

23 Way to Xp Speed

Since defragging the disk won't do much to improve Windows XP performance, here are 23 suggestions that will. Each can enhance the performance and reliability of your customers' PCs. Best of all, most of them will cost you nothing.
1.) To decrease a system's boot time and increase system performance, use the money you save by not buying defragmentation software -- the built-in Windows defragmenter works just fine -- and instead equip the computer with an Ultra-133 or Serial ATA hard drive with 8-MB cache buffer.

2.) If a PC has less than 512 MB of RAM, add more memory. This is a relatively inexpensive and easy upgrade that can dramatically improve system performance.

3.) Ensure that Windows XP is utilizing the NTFS file system. If you're not sure, here's how to check: First, double-click the My Computer icon, right-click on the C: Drive, then select Properties. Next, examine the File System type; if it says FAT32, then back-up any important data. Next, click Start, click Run, type CMD, and then click OK. At the prompt, type CONVERT C: /FS:NTFS and press the Enter key. This process may take a while; it's important that the computer be uninterrupted and virus-free. The file system used by the bootable drive will be either FAT32 or NTFS. I highly recommend NTFS for its superior security, reliability, and efficiency with larger disk drives.

4.) Disable file indexing. The indexing service extracts information from documents and other files on the hard drive and creates a "searchable keyword index." As you can imagine, this process can be quite taxing on any system.

The idea is that the user can search for a word, phrase, or property inside a document, should they have hundreds or thousands of documents and not know the file name of the document they want. Windows XP's built-in search functionality can still perform these kinds of searches without the Indexing service. It just takes longer. The OS has to open each file at the time of the request to help find what the user is looking for.

Most people never need this feature of search. Those who do are typically in a large corporate environment where thousands of documents are located on at least one server. But if you're a typical system builder, most of your clients are small and medium businesses. And if your clients have no need for this search feature, I recommend disabling it.

Here's how: First, double-click the My Computer icon. Next, right-click on the C: Drive, then select Properties. Uncheck "Allow Indexing Service to index this disk for fast file searching." Next, apply changes to "C: subfolders and files," and click OK. If a warning or error message appears (such as "Access is denied"), click the Ignore All button.

5.) Update the PC's video and motherboard chipset drivers. Also, update and configure the BIOS. For more information on how to configure your BIOS properly, see this article on my site.

6.) Empty the Windows Prefetch folder every three months or so. Windows XP can "prefetch" portions of data and applications that are used frequently. This makes processes appear to load faster when called upon by the user. That's fine. But over time, the prefetch folder may become overloaded with references to files and applications no longer in use. When that happens, Windows XP is wasting time, and slowing system performance, by pre-loading them. Nothing critical is in this folder, and the entire contents are safe to delete.

7.) Once a month, run a disk cleanup. Here's how: Double-click the My Computer icon. Then right-click on the C: drive and select Properties. Click the Disk Cleanup button -- it's just to the right of the Capacity pie graph -- and delete all temporary files.

8.) In your Device Manager, double-click on the IDE ATA/ATAPI Controllers device, and ensure that DMA is enabled for each drive you have connected to the Primary and Secondary controller. Do this by double-clicking on Primary IDE Channel. Then click the Advanced Settings tab. Ensure the Transfer Mode is set to "DMA if available" for both Device 0 and Device 1. Then repeat this process with the Secondary IDE Channel.

9.) Upgrade the cabling. As hard-drive technology improves, the cabling requirements to achieve these performance boosts have become more stringent. Be sure to use 80-wire Ultra-133 cables on all of your IDE devices with the connectors properly assigned to the matching Master/Slave/Motherboard sockets. A single device must be at the end of the cable; connecting a single drive to the middle connector on a ribbon cable will cause signaling problems. With Ultra DMA hard drives, these signaling problems will prevent the drive from performing at its maximum potential. Also, because these cables inherently support "cable select," the location of each drive on the cable is important. For these reasons, the cable is designed so drive positioning is explicitly clear.

10.) Remove all spyware from the computer. Use free programs such as AdAware by Lavasoft or SpyBot Search & Destroy. Once these programs are installed, be sure to check for and download any updates before starting your search. Anything either program finds can be safely removed. Any free software that requires spyware to run will no longer function once the spyware portion has been removed; if your customer really wants the program even though it contains spyware, simply reinstall it. For more information on removing Spyware visit this Web Pro News page.

11.) Remove any unnecessary programs and/or items from Windows Startup routine using the MSCONFIG utility. Here's how: First, click Start, click Run, type MSCONFIG, and click OK. Click the StartUp tab, then uncheck any items you don't want to start when Windows starts. Unsure what some items are? Visit the WinTasks Process Library. It contains known system processes, applications, as well as spyware references and explanations. Or quickly identify them by searching for the filenames using Google or another Web search engine.

12.) Remove any unnecessary or unused programs from the Add/Remove Programs section of the Control Panel.

13.) Turn off any and all unnecessary animations, and disable active desktop. In fact, for optimal performance, turn off all animations. Windows XP offers many different settings in this area. Here's how to do it: First click on the System icon in the Control Panel. Next, click on the Advanced tab. Select the Settings button located under Performance. Feel free to play around with the options offered here, as nothing you can change will alter the reliability of the computer -- only its responsiveness.

14.) If your customer is an advanced user who is comfortable editing their registry, try some of the performance registry tweaks offered at Tweak XP.

15.) Visit Microsoft's Windows update site regularly, and download all updates labeled Critical. Download any optional updates at your discretion.

16.) Update the customer's anti-virus software on a weekly, even daily, basis. Make sure they have only one anti-virus software package installed. Mixing anti-virus software is a sure way to spell disaster for performance and reliability.

17.) Make sure the customer has fewer than 500 type fonts installed on their computer. The more fonts they have, the slower the system will become. While Windows XP handles fonts much more efficiently than did the previous versions of Windows, too many fonts -- that is, anything over 500 -- will noticeably tax the system.

18.) Do not partition the hard drive. Windows XP's NTFS file system runs more efficiently on one large partition. The data is no safer on a separate partition, and a reformat is never necessary to reinstall an operating system. The same excuses people offer for using partitions apply to using a folder instead. For example, instead of putting all your data on the D: drive, put it in a folder called "D drive." You'll achieve the same organizational benefits that a separate partition offers, but without the degradation in system performance. Also, your free space won't be limited by the size of the partition; instead, it will be limited by the size of the entire hard drive. This means you won't need to resize any partitions, ever. That task can be time-consuming and also can result in lost data.

19.) Check the system's RAM to ensure it is operating properly. I recommend using a free program called MemTest86. The download will make a bootable CD or diskette (your choice), which will run 10 extensive tests on the PC's memory automatically after you boot to the disk you created. Allow all tests to run until at least three passes of the 10 tests are completed. If the program encounters any errors, turn off and unplug the computer, remove a stick of memory (assuming you have more than one), and run the test again. Remember, bad memory cannot be repaired, but only replaced.

20.) If the PC has a CD or DVD recorder, check the drive manufacturer's Web site for updated firmware. In some cases you'll be able to upgrade the recorder to a faster speed. Best of all, it's free.

21.) Disable unnecessary services. Windows XP loads a lot of services that your customer most likely does not need. To determine which services you can disable for your client, visit the Black Viper site for Windows XP configurations.

22.) If you're sick of a single Windows Explorer window crashing and then taking the rest of your OS down with it, then follow this tip: open My Computer, click on Tools, then Folder Options. Now click on the View tab. Scroll down to "Launch folder windows in a separate process," and enable this option. You'll have to reboot your machine for this option to take effect.

23.) At least once a year, open the computer's cases and blow out all the dust and debris. While you're in there, check that all the fans are turning properly. Also inspect the motherboard capacitors for bulging or leaks. For more information on this leaking-capacitor phenomena, you can read numerous articles on my site.


Following any of these suggestions should result in noticeable improvements to the performance and reliability of your customers' computers. If you still want to defrag a disk, remember that the main benefit will be to make your data more retrievable in the event of a crashed drive.