Kamis, 30 April 2009

Install A New Hard-disk

Running out of hard disk space, yet also want to keep all the files that are currently on the system in perfect order? Install an extra hard disk, and see your available space rise!

Firstly, make backups of your existing system files. You may never know when these may come in handy. If your current hard disk may go down the pan, you'll be glad to have something to start with again. Also, if you want to use all your data that is on this drive, back it up anyway; ready to be transferred to the new drive. Also, create a system disk for your PC. This can be created by going to Control Panel > Add/Remove Programs, and then the "System Disk" tab. The instructions should be there for you. "WHEN I INSTALLED MY EXTRA HDD I DDNT FOLLOW ANY OF THE ABOVE MENTIONED....INSTEAD JUST OPEANED THE CABINET AND LOOKED FOR THE WIRES AND CONNECTED THEM ...ANY ONE CAN TELL WHERE THE CORRECT WIRE GOES ..... THE MAIN THING IS TO MAKE SURE THAT THE BROAD THIN GRAY WIRE OR DATA CABLE SLOT WITH THE WORD 'P2' IS CONNECTED TO THE EXTRA HDD"

Once you are prepared on the software side, turn off your PC and open the case to your PC (Please take proper precautions at this point. Anti-static wristbands and other such devices should be used. If you don't have these, just make sure you are properly earthed, and know what you are going to do. Oh, and please turn off the PC properly. I don't want you dying on me, literally!). The hard disk is the metal box shaped thing that is either the size of the floppy drive or it could be the size of the CD-Rom drive. It should be easy to spot, because it might even say "Hard Disk" on it. At this point, look and see where you can put the new drive, and how you are going to connect it up. If there is no hard drive in there, then don't worry; I'll explain how to connect it up as well.

Look at the end of the HDD. It should have a load of sockets and pins for you to play around with. At one point, you should be able to see some pins with some jumpers attached, and a sticker on another side telling you what configuration of jumper positions means what to the computer. If you are attaching it to the same IDE cable as your existing drive, then set it to "Slave", otherwise, select "Master" and fit it as close to the start of the cable as possible (The start of the cable being where it's connected to the motherboard). This cable is an "IDE" cable, and can only be fitted two ways to the drive itself. Look for an indication as to which side pin number 1 is (Look for stickers again!) and insert the IDE cable in that socket and pins, with the red side as close to pin 1 as possible. Then, just fit it into the computer, as you would do any other drive (For the thickies, which means attaching it to the case using the mounting screws that should come with the PC. Before you do this though, note down the extra information on the top of the drive, usually the number of cylinders, heads, sectors, and any other information. Next, connect one of the power cables to the HDD (These are the 4 cable collections with connectors attached, which leads from the power supply unit), and close the PC case.

Next, you will have to mess with CMOS. Turn on the PC, and hit whatever key you are told to at the bootup to get to the CMOS menus. When in there, choose the relevant section (We can't say exactly, because there are many different CMOS set-ups around) and select "IDE Auto-detection". If the hard disk does not appear on it, then you will have to enter the information manually. Use the notes you collected from the top of the hard disk earlier to tell the computer what the hard disk is.

IMPORTANT:
Afterwards, insert the system disk("THE BACKUP DISK THAT CAN BE CREATED BY RIGHT CLICKING A DRIVE4R AND SELECTING FORMAT AND THEN THE CREATE BACKUP DISK OPT") prepared earlier and "Save" your editing of the CMOS and exit. The system disk should work instead of the original hard disk (Or if you are installing from scratch, then it will boot from the A: anyway).
Type "fdisk" at the dos prompt. This runs a program called, surprisingly, FDISK. Tell the computer which drive ie the harddisk is the new one (Please choose the correct one at this point. Make a mistake, and you really could be using those backups!), and then tell it what partitions you want (Don't worry about it, as there are full instructions while you are running the program). Once this is done, you can reset your PC (Except if this drive is being installed from scratch and is on it's own. If this is the case, then you can format the drive by typing "format c:" This will format the drive for you, but what's really good is if you type "format c: /s" instead, as this installs some important files at the same time. Then, just follow the instructions to install whatever OS you are going to use.)
If you are adding this drive as a second HDD, Go into Windows (Or any other OS, but the instructions may be different!) and then format from "My Computer" like you would a floppy disk. There you go: A newly installed hard disk, with minimum effort!....and dont take the risk of formatting any of the drives u know!!!! if in doubt contact me here or don't do at all........."SOD will not be held responsible for any data lost in this process"



HOW TO STOP SPAM VIA WINDOWS MESSENGER SERVICE

Below you'll find many ways (sorted in the most successful ratio first) to stop the Windows Messenger service, depending on your system environment, some may require more than one process. This service is available only on NT, 2K, XP & Server 2003. Administrator Login is REQUIRED

About The Messenger Service


* Messenger is a Windows Service that runs in the background
* Messenger is not the same as MSN Messenger or any other Instant Messaging Program
* Messenger does not facilitate two-way chatting
* Many Windows Programs, Firewalls, UPS and Antiviruses require the Messenger Service
* Antivirus and UPS software, among others, may not work if Messenger is disabled
* The Messenger Service is usually turned on by default in most Windows NT, 2K and XP systems


1. Manually

1. Example 1

1. Click Start, Run and enter the following command:
RunDll32 advpack.dll,LaunchINFSection %windir%\inf\msmsgs.inf,BLC.Remove
NOTE: This will prevent a long delay when opening Outlook Express if you have the Contacts pane enabled
2. To prevent this, click Start, Run and enter {REGEDIT} Go to:
HKEY_LOCAL_MACHINE\Software\Mcft\Outlook Express
3. Right click in the right pane and select New, Dword value
4. Give it the name Hide Messenger Double click this new entry and set the value to 2
5. End result should look EXACTLY like this:
System Key: [HKEY_LOCAL_MACHINE\SOFTWARE\Mcft\Outlook Express]
Value Name: Hide Messenger
Data Type: REG_DWORD (DWORD Value)
Value Data: (2 = remove messenger)

2. Example 2

1. Copy and paste the following to Run Command Bar in the Start Menu:
RunDll32.exe advpack.dll,LaunchINFSection
%windir%\inf\msmsgs.inf,BLC.Remove

3. Example 3

1. If Example 5 didn't work, then try this - Many users miss or don't know of it
2. Click on Start then go to RUN and type:
C:\WINDOWS\inf\sysoc.inf
3. Change:
msmsgs=msgrocm.dll,OcEntry,msmsgs.inf,hide,7
4. To:
msmsgs=msgrocm.dll,OcEntry,msmsgs.inf,7
5. Then use Add/Remove Windows Components to remove Messenger
NOTE: You can also prevent access to Windows Messenger using Group Policy or the Set Program Access and Defaults utility added by default in Windows XP SP1 and Windows 2000 SP3

4. Example 4

1. Open Windows Messenger
2. From the menu, select "Tools" then "Options" then "Preferences" tab
3. Uncheck "Run this program when Windows starts"
4. Open Outlook Express
5. From the menu, select "Tools" then "Options" then "General" tab
6. Uncheck the option to "Automatically log on", if it's there
7. Also in Outlook Express, select "View" then "Layout"
8. Uncheck the option to "display Contacts" - The program will open a connection and display a list of all Contacts on line if you do not
9. In "Startup Folder" make sure there is no entry there for Messenger
10. Open Norton Anti-Virus if you have it installed
11. Click "Options" then "Instant Messenger"
12. Unckeck "Windows Messenger (recommended"
NOTE: This list ought to work in disassociate MSN from Outlook Express, so that it'll only start up if you really want it to

5. Example 5

1. 2000

* Click Start-> Settings-> Control Panel-> Administrative Tools->Services
* Scroll down and highlight "Messenger"
* Right-click the highlighted line and choose Properties
* Click the STOP button
* Select Disable in the Startup Type scroll bar
* Click OK

2. XP Home

* Click Start->Settings ->Control Panel
* Click Performance and Maintenance
* Click Administrative Tools
* Double click Services
* Scroll down and highlight "Messenger"
* Right-click the highlighted line and choose Properties
* Click the STOP button
* Select Disable in the Startup Type scroll bar
* Click OK

3. XP Professional

* Click Start->Settings ->Control Panel
* Click Administrative Tools
* Click Services
* Double click Services
* Scroll down and highlight "Messenger"
* Right-click the highlighted line and choose Properties.
* Click the STOP button.
* Select Disable in the Startup Type scroll bar
* Click OK

4. Windows NT

* Click Start ->Control Panel
* Double Click Administrative Tools
* Select Services-> Double-click on Messenger
* In the Messenger Properties window, select Stop
* Then choose Disable as the Startup Type
* Click OK
NOTE: If you stop the service and don’t adjust the startup type, the Messenger service will start automatically the next time you reboot. Keep in mind that when you disable the Messenger service, you'll no longer receive messages about an attached UPS, and you won’t be notified of print job completion, performance alerts, or antivirus activity (from Windows) not the program you're using for those purposes.

6. Example 6

1. To disable receipt of messenger pop-ups, verify that your firewall disables inbound traffic on UDP ports 135, 137, and 138, and TCP ports 135 and 139. On a system connected directly to the Internet, you should also disable inbound traffic on TCP port 445. If the system you want to protect is part of a Win2K-based network with Active Directory (AD), don't block incoming traffic on port 445 - Mcft Knowledge Base Article - 330904
Code:
http://support.Mcft.com/default.aspx?scid=kb;en-us;330904

NOTE: You can use the firewall approach only if your system doesn't communicate with legacy systems that rely on NetBIOS name resolution to locate machines and shared resources. If, for example, you let users running Windows 9x share your printer or scanner, when you disable inbound NetBIOS traffic, users won't be able to connect to these shared resources. Regardless of the method you choose, you can stop messenger spam


2. Program

1. Example 1

NOTE: On Oct 15, 2003, Mcft releases Critical Security Bulletin MS03-043 warning users that the Windows Messenger Service running and exposed by default in all versions of Windows NT, 2000 and XP, contains a "Remote Code Execution" vulnerability that allows any not otherwise secured and protected Windows machine to be taken over and remotely compromised over the Internet
1. Shoot the Messenger
Code:
http://grc.com/files/shootthemessenger.exe


2. Example 2

1. Messenger Disable
Code:
http://www.dougknox.com/xp/utils/MessengerDisable.zip

NOTE: If you choose to uninstall Windows Messenger on a system with SP1 installed, you will receive an error message about "un-registering" an OCX file. This is normal, and doest not affect the removal process. Windows Messenger will still be removed

3. TEST

1. Example 1

1. Right-click "My Computer"
2. Select "Manage"
3. Under "System Tools" right-click on "Shared Folders"
4. Choose "All Tasks" and select "Send Console Message..."
5. If you recieve the following error message then the service has been disabled, otherwise confirm that you have disabled it or try another example
"The following error occured while reading the list of sessions from Windows clients:
Error 2114: The Server service is not started."

2. Example 2

1. Click Start then "Run"
2. Type in {cmd.exe}
3. Type in net send 127.0.0.1 hi
4. If you get a popup "hi" message, then confirm that you have disabled it or try another example

4. IF YOU INSIST

1. If you insist on keeping Windows Messenger, then I'd recommend Messenger Manager - "Allows you to keep your messenger service running, as is intended and needed by Windows. This ensures that vital system errors and notifications may be sent informing you of Important System Events"
Code:
http://www.sellertools.com/default.asp?i=MessageManager3.htm

2. However, as a replacement to Windows Messenger remote control feature, I'd recommend this free tool Virtual Network Computing - "It is a remote control software which allows you to view and interact with one computer (the "server") using a simple program (the "viewer") on another computer anywhere on the Internet. The two computers don't even have to be the same type, so for example you can use VNC to view an office Linux machine on your Windows PC at home"
Code:
http://www.realvnc.com/download.html



RESULTS WILL VARY
No matter how good your systems may be, they're only as effective as what you put into them.

HACKING TECHNIQUES

1) CALLBACK UNITS: Callback units are a good security device, But with most phone systems, it is quite possible for the hacker to use the following steps to get around a callback unit that uses the same phone line for both incomming and out going calls:First, he calls he callback unit and enters any authorized ID code (this is not hard to get,as you'll see in a moment). After he enters this ID, the hacker holds the phone line open - he does not hang up. When the callback unit picks up the phone to call the user back, the hacker is there, waiting to meet it. The ID code as I said, is simple for a hacker to obtain, because these codes are not meant to be security precautions.The callback unit itself provides security by keeping incomming calls from reaching the computer. The ID codes are no more private than most telephone numbers. Some callback units refer to the codes as "location identification numbers," and some locations are used by several different people,so their IDs are fairly well known.I've been told that, in some cases,callback ubits also have certain simple codes that are always defined by default. Once the hacker has entered an ID code and the callback unit has picked up the phone to re-call him,the hacker may or may not decide to provide a dial tone to allow the unit to "think" it is calling the correct number. In any event, the hacker will then turn on his computer, connect with the system - and away he goes.If the however, the hacker has trouble holding the line with method,he has an option: the intercept. The Intercept: Holding the line will only work with callback units that use the same phone lines to call in and to call out.Some callback units use different incoming and outgoing lines, numbers 555-3820 through 555-3830 are dedicated to users' incoming calls, and lines 555-2020 through 555-2030 are dedicated to the computers outgoing calls.The only thing a hacker needs in order to get through to these systems is a computer and a little time - he doesn't even need an ID code. First,the hacker calls any one of the outgoing phone lines, which, of course, will not answer.Sooner or later, though, while the hacker has his computer waiting there, listening to the ring, an authorized user will call one of the incomming lines and request to be called back. It will usually be less than an hours wait, but the hacker's computer is perfectly capable of waiting for days, if need be. The callback unit will take the code of the authorized user, hang up, verify the code, and pick up the phone line to call back.If the unit tries to call out on the line the hacker has dialed, the hacker has his computer play a tone that sounds just like a dial tone.The computer will then dial the number given that matches up with the user's authorized ID. After that,the hacker can just connect his computer as he would in any other case.If he is really serious,he will even decode the touch tones that the mainframe dialed,figure out the phone number of the user the system was calling, call the person, and make a few strange noises that sound as though the computer called back but didnt work for some reason. 2) TRAPDOORS AS A POSSIBLILITY I haven't heard of this happening, but i think it is possible that a callback modem could have a trapdoor built into it.Callback modems are run by software, which is written by programmers.An unscrupulous programmer could find it very easy to slip in an unpublicized routine, such as, "if code =*43*, then show all valid codes and phone numbers." And such a routine, of course, would leave security wide open to anyone who found the trapdoor.The obvious protection here, assuming the situation ever arises, is simply an ethical manufactorer that checks its software thoroughly before releasing it. A trapdoor is a set of special instructions embedded in the large program that is the operating system of a computer.A permanent, hopefully secret "doorway", these special instructions enabe anyone who knows about them to bypass normal security procedures and to gain access to the computer's files.Although they may sound sinister, trapdoors were not invented by hackers, although existing ones are certainly used by hackers who find out about them.

3) THE DECOY One of the more sophisticated hacking tools is known as the decoy, and it comes in three versions.The first version requires that the hacker have an account on the system in question. As in my case,the hacker has a low-security account,and he tries this method to get higher-security account.He will first use his low-security account to write a program that will emulate the log-on procedures of the systems in questions. This program will do the following: *- Clear the terminal screen and place text on it that makes everything look as if the system is in charge. *- Prompt for, and allow the user to enter, both an account name and a password. *- Save that information in a place the hacker can access. *- Tell the use the account/password entries are not acceptable. *- turn control of the terminal back over to the system. The user will now assume that the account name or password was mistyped and will try again...this time (scince the real operating system is in control) with more success.You can see a diagram of the way these steps are accomplished ___________________ | Clear Terminal | | screen | |____________________| || _________||_________ | Print Compuserve | | Computer | |_____ Network ______| || _________||_________ | Print "ENTER | | PASSWORD" |______ |____________________| | || | _________||_________ | | PASSWORD ENTERED? |__NO__| |____________________| ||_YES _________||_________ | SAVE PASSWORD | | INFORMATION | |____________________| || _________||_________ | PRINT "LOGIN | | INCORRECT | |____________________| || _________||_________ | LOG OFF/RETURN | | CONTROL TO | | OPERATING SYSTEM | |____________________| 4) CALL FORWARDING Many people use call forwarding by special arrangement with the phone company.When a customer requests call forwarding, the phone company uses its computer to forward all the customers incomeing calls to another number. Lets say, for example, that you want calls that come to your office phone to be forwarded to your home phone: A call from you to the phone company,some special settings in the phone companys computer, and all calls to your office will ring at your home instead.This little bit of help from the phone company is another tool used by hackers. Lets say you thought that the computer you were hacking into was being watched-because the sysop might have seen you and called the fed's and your sort of bugged by this nagging feeling that they will trace the next hacker that calls, just call the phone company and ask for call forwarding, pick a number, (ANY NUMBER) out of the phone book and have your calls forwarded to that number,Hea,Hea, the number you picked is the one that will be traced to, not yours, so you could be hacking away,they think that they have traced you, but actually the number you had your calls forwarded too. they enter chat mode and say (YOUR BUSTED!!!!, WE'VE TRACED YOUR PHONE NUMER THE FEDS ARE ON THE WAY!!), You could reply (Hea, SURE YA DID! I'D LIKE TO SEE YA TRY AND GET ME! GO AHEAD!) ,that wont seem very important to them at the time, but it will sure piss them off when they bust the wrong guy! 5) RAPID FIRE Memory-location manipulation can be helpful, but there is another, more powerful,possibility, in some cases: the Rapid-fire method.To understand how this methos works, you have to know something about the way operationg systems work.When a user enters a command, the operating system first places the command in a holding area, a buffer, where it will sit for a few millionths of a second.The system looks at the command and say's "Does this person really have authorization to do this, or not?" Then, the command sits there a few thousandths of a second while the system runs off to check the user's authorization.When the system comes back to the command, it will have one of two possible answers: "OK, GO AHEAD," or "SORRY, GET PERMISSION FIRST." Once you are on a system that handles things this way, you can

Selasa, 28 April 2009

Cara Membackup Blog

Setelah mengalami kejadian hilangya blog yang kemarin itu, ternyata baru tahu betapa pentingnya untuk membackup blog kita. Setelah mutar-mutar akhirnya nemu juga layanan untuk membackup blog kita, yaitu di blogbackuponline. Dengan layanan ini kita bisa dengan mudah membackup blog kita disana secara gratis. Tapi layanan ini hanya memberikan space sebesar 5 MB (kok sedikit ya).Tapi jangan khawatir walopun cuma 5 MB tapi aku rasa cukup untuk membackup data-data blog kita. Jika kita memposting rata-rata perpostingan itu 1000 karakter, maka itu cukup untuk membackup sampai 5000 postingan, lumayan kan. Tapi untuk yang versi FREE alias gratis kita tidak bisa membackup data berupa gambar dan video. Kita hanya bisa membackup artikel-artikel postingan kita saja.

Gimana? tertarik untuk membackup datamu? Caranya cukup mudah, yaitu:

1. Buka website https://www.blogbackuponline.com dan daftarkan diri kamu disana. Setelah mendaftar kamu akan mendapatkan kiriman email untuk mengaktifkan account km.
2. Kalo sudah aktif login ke website tersebut. Setelah login maka segera registrasikan alamat blogmu yaitu dengan cara mengklik tombol "Start Registering Your Blog".
3. Masukkan alamat blog km dalam kotak yang disediakan, kemudian klik tombol "Register Blog"
4. Setelah itu maka tunggulah proses backupnya. setelah itu pilih tombol "Start Full Backup", Selesai deh.

Trus caranya mengembalikan data kita gimana?
Untuk yang versi bayar, sangat mudah dan bisa dilakukan secara otomatis dengan memencet menu restore. Tapi untuk yang versi GRATIS, kita hanya bisa mendapatkan data-data postingan kita. Caranya masuk ke "Dashboard" trus klik tombol "Manage" setelah itu pilih menu "Content". Nha disitulah semua data-data postinganmu berada. Giamna lumayan kan, daripada harus mengetik ulang ampe membuat tangan gempor mending tinggal copy paste aja. Lagian apa kita ingat semua isi postingan kita? ya to?

OK Selamat Mencoba..........

diambil dari http://trik-tips.blogspot.com




Cara Membuat Website di 000webhost

Seperti yang sudah dijelaskan pada artikel sebelumnya ,000webhost merupakan layanan webhosting gratis yang top abis. Dengan memakai layanan webhosting ini kamu bisa membuat web yang support database. Sedangkan untuk keperluan blog km bisa mengupload file2 kamu seperti gambar, animasi, suara dll untuk digunakan di dalam blogmu. Tapi dalam ketentuan mereka, kita tidak boleh hanya menaruh file-file kita di hosting tersebut tanpa membuat webnya, jika tidak maka account kita akan dihapus. Nha pada tutorial kali ini, akan aku coba jelaskan sedikit tentang bagaimana cara membuat web di 000webhost. Mungkin tutorial kali ini akan menjadi pengalaman baru bagi yang belum pernah membuat website, karena website itu sedikit beda dibanding dengan blog.
OK kita mulai aja tutorialnya.



1. Bagi yang belum punya account di 000webhost silahkan daftar http://www.000webhost.com/102920.html. Bagi yang sudah punya, silahkan login di account webhost kamu.
. Bagi yang baru mendaftar maka akan langsung disuguhi form pendaftaran yang salah satu isinya adalah kita disuruh untuk memasukkan domain yang kita inginkan. Ada 2 pilihan domain yang akan kita pakai, yg pertama yaitu dengan menggunakan domain yang sudah kita beli (biasanya nama domainnya "www.domain.com" / "www.domain.net" dll) , yang kedua yaitu dengan menggunakan sub domain gratisan yang dari webhosting tsb (biasanya nama domainnya "www.domain.net78.net" ato "www.domain.890m.com" dll). Pilihan tersebut ada pada kolom "I want to host my own domain" dan "or, I will choose your free subdomain"



Iklan: Bagi yang ingin beli domain silahkan beli di dodoldomain.com, murah lho.

3. Kemudian isikan data2 yang diminta di kolom2 yang lain, trus klik tombol "Create My Account"
4. Kemudian masuk ke "Enter Control Pannel".
5. Pada dasarnya ada dua pilihan dalam pembuatan website ini, yaitu dengan membuat sendiri webnya kemudian kita upload atau dengan menggunakan fasilitas "Website Builder" yang ada. Jika kamu sudah mahir dan pintar bikin web maka "Upload" file adalah pilihan yang tepat. Tapi jika kamu belum bisa membuat web sendiri, maka pilihlah "Website Builder", karena dengan fasilitas ini kita bisa membuat web tanpa harus mendesain terlebih dahulu, kita tinggal memilih template yang disediakan kemudian isi dengan menu2 dan konten yang kita inginkan.


6. Untuk "website builder" disana nanti sudah ada petunjuknya, silahkan diikuti.
7. Kalo sudah jadi jadi webnya silahkan dicek dengan mengetikkan alamat domain / URL kamu di browser. Nha seperti itu lah tampilan webmu.

"CARA UPLOAD FILE DI 000WEBHOST"

Berikut ini akan dijelaskan cara menguplaod file di 000webhost.

1. Login di 000webhost.
2. Kemudian klik link "Go to CPanel"



3. Kemudian pilih "File Manager" (lihat gambar no.5 diatas).
4. setelah itu klik link "Public Html"



5. Untuk upload file klik pada tombol "Upload"
6. Kemudian nanti akan muncul tombol2 seperti "Browse", Klik tombol tersebut kemudian cari file yg ingin diupload. Jika sudah lalu klik tombol/icon "Centang/Cek".
7. Klik tombol "Back" (gambar panah ke kiri) untuk kembali ke menu sebelumnya dan melihat apakah file yang km upload tadi sudah ada atau belum.
8. Kamu bisa mengupload file2 gambar, suara, video, html, php, javascript dll.
9. Untuk mendapatkan link gambar atau file yg lain, misal untuk keperluan membuat float image (gambar sonic yg dipojok), banner, atau yg lain caranya yaitu km klik kanan pada link "open" (di deretan file gambar tersebut) kemudian pilih "copy link location" (bagi yg menggunakan Mozilla). Nha link yg km copy itulah URL atau alamat gambar yg bisa kamu gunakan untuk mengganti misal gambar sonic yang ada di "float image".





Cara membuat Form "Email Subscriber" / "Berlangganan Lewat Email"

Seperti yang kamu lihat, disebelah kanan blog ini ada sebuah kotak yang berisi kotak untuk mengisikan alamat email dan sebuah tombol yang ada tulisan "Berlangganan Trik Baru". Nha dalam trik dan tips kali ini kita akan belajar kelompok tentang bagaimana membuat kotak tersebut. Oh ya, perlu dijelasin dulu nih apa fungsi dari form tersebut. Form tersebut fungsinya adalah untuk mempermudah para pembaca blog kita agar bisa berlangganan atau mendapatkan info terbari postingan kita melalui email mereka. Jadi jika memposting artikel baru maka para pelanggan/pembaca yang sudah memasukkan email mereka melalui form tersebut akan secara otomatis mendapatkan kiriman email yang berisi postingan terbaru kita. Mudeng ra? wes pokoke ngono lah.
Beginilah cara membuat form "Email Subscriber" tersebut :

1. Kunjungi situs ini : http://www.feedburner.com
2. Saat pertama kali datang kamu akan langsung disodori kotak untuk mengisikan alamat feed blogmu yang akan dibakar :D
3. Biasanya alamat feed blog kamu seperti ini http://NAMABLOGMU.blogspot.com/feeds/posts/default , ganti tulisan NAMABLOGMU dengan nama alamat blogmu.
3. Isikan nama feed blogmu tadi dalam kotak yang disodorkan tersebut, jika blogmu itu isinya hanya video2 maka beri tanda centang pada kotak "I am a podcaster", jika tidak ya gak usah dicentang. Kemudian klik tombol "next"
4. Setelah itu kamu akan disodori lagi dengan form pendaftaran, isikan data2 yg diperlukan disana, trus klik tombol "Activate Feed"
5. Nha kalo berhasil nanti akan ada informasi "Congrats! your ......".
6. Dibawahnya akan ada tombol "Next" dan link "Skip directly to feed management" kali ini pilih yang link "Skip directly to feed management", sebenarnya lewat tombol "next" bisa sih tapi biar seru kita lewat jalan lain aja.
7 Kemudian nanti akan ada beberapa menu, kali ini pilih menu "Publicize"
8. Setelah itu disebelah kiri akan muncul beberapa menu. PIlih menu "Email Subscriptions".
9. Kemudian klik tombol "Activate"
10. Nha setelah itu nanti akan ada beberapa kotak yang berisi kode2. Nha kalo km pinginnya yang berbentuk form maka pilih kode yang ada di kotak "Subsciption Form Code".
11. Copy kode yang ada dalam kotak tadi, trus klik tombol "Save" untuk mengaktifkan layanan tersebut.
12. Cara pasangnya, Login ke blogger, pilih "layout --> Add a Gadget --> HTMl/Java Script" nha paste kode yang sudah kamu copy tadi disana.

Sekarang coba dilihat blogmu, udah ada kan form untuk "Email Subscriber".

Trus kalo mo nampilin jumlah reder yang berlanganan gini caranya :
- Login ke feedburner kemudian pilih feed blogmu
- Trus masuk ke menu "Publicize --> FeedCount" nha disitu scriptnya yang harus km copy dan pasang di blogmu.

diambil dari http://trik-tips.blogspot.com




Cara Membuat Read More / Baca Selengkapnya di Blogger

Biasanya postingan terbaru akan ditampilkan dihalaman utama blog. Namun jika postingan kamu terlalu panjang maka hal tersebut akan membuat penuh halaman utama. Jika kamu ingin supaya postingan kamu yang ditampilkan dihalaman utama cuma abstraksinya saja kemudian ada sebuah link Read More / Baca Selengkapnya untuk melihat selengkapnya maka ikutilah langkah-langkah berikut :





1. Buka menu Layout kemudian pilih Edit HTML.

2. Kasih tanda cek (centang) pada cekbox "expand widget template"

3. Cari kode berikut di Template blog kamu (tempatnya kira-kira pada 1/4 bagian bawah kode hmtl) :







kalo dah ketemu maka dibawahnya ada kode ini :









4. Kalau sudah ketemu, Ganti kode yang ini

menjadi seperti ini :







Tulisan "Read More....." itu bisa kamu rubah, misalnya jadi "Baca Selengkapnya".



5. Simpan hasil pengeditan.

6. Kemudian pilih menu Setting lalu pilih Formatting

7. Pada kotak Post Template isikan kode berikut:









8. Kemudian Simpan.

9. Ketika memposting, kan disana ada 2 tab pilihan tuh, yang "Compose" dan "Edit Html", Nha km pilih Yang "Edit HTML", Maka secara otomatis akan tampak kode seperti berikut :









10. Letakkan abstraksi posting atau artikel yang akan ditampilkan dihalama utama (sebelum tulisan "Redmore") diatas kode ini : sementara sisanya yaitu keseluruhan posting letakkan di antara kode dan

11. Ini yang paling penting diantara semua proses diatas yaitu ..... Selesai.....



Diambil dari http://trik-tips.blogspot.com









Minggu, 26 April 2009

Speed Dial up HP CDMA Smart

Mungkin Banyak yang ragu untuk menggunakan HP Smart, banyak pertanyaan cept gak sih.?, sering putus-putus gak sih ? so masih banyak lagi pertanyaa yang timbul. disini saya sedikit sharing pengalaman saya menggunakan HP smart sebagai modem.
untuk kecepatan standar gprs yaitu 230, 4 Kbps , yah lumayan lah kan gratis 6 bulan kalau hanya untuk YM an atawa Facebook mah masih bisa, untuk HP smart ini memang sinyalnya belum stabil jadi kadang cepet kadang lambat tergantung sinyal. tapi kalau mau cepat dan dijamin cepat antara jam 1 - 5 pagi.
ini gambaran hasil speed test di speedtes.net
untuk local - Jakarta hasilnya seperti ini :



untuk yang Interlocal - singapore hasilnya seperti ini :





So jangan pada nyesel belakangan, pikir masak2 masak dahulu ,.. kalau gw bilang sih lumayan kan gratis 6 Bulan, Ok bro sekian dulu postingannya.

Sabtu, 25 April 2009

Judi & Gambling di Internet.

Onno W. Purbo

Terlepas dari masalah moral baik atau tidaknya judi & gambling di Internet. Saya coba menulis kenyataan yang ada tentang judi & gambling di Internet – bukan berarti saya meng-encourage para pembaca untuk melakukan online gambling tersebut. Bagi penjudi-nya sendiri masalahnya nanti di masalah kepercayaan & fairness dari game yang dilakukan. Bayangkan penyelenggara casino akan tahu semua data kartu kredit yang kita miliki … padahal yang ada dikepala kita umumnya penyelenggara casino bukan orang yang bermoral “baik”.

Apakah Online Gambling? Yang biasa juga di sebut sebagai Internet gambling biasanya terjadi karena peletakan taruhan pada kegiatan sport atau kasino melalui Internet. Kadang-kadang juga digunakan untuk tempat iklan di Internet bagi taruhan sport lewat telepon. Online game yang sesungguhnya sebetulnya jika seluruh proses baik itu taruhannya, permainannya maupun pengumpulan uangnya melalui Internet. Hal ini biasanya untuk tipe-tipe game seperti lotere, bingo, keno.

Apakah Internet Casino? Adalah situs di Internet dimana kita bisa bermain casino game seperti blackjack untuk memperoleh keuntungan keuangan. Secara umum Internet casino ada tiga jenis, yaitu, ada yang menyediakan program client yang gratisan untuk di download, ada yang menyediakan JAVA script yang harus di download untuk bermain dan yang terakhir program casino terpusat di server menggunakan HTML.

Dimanakah lokasi mereka? Menarik untuk dilihat ternyata umumnya secara fisik internet casino berada di luar Amerika Serikat & di luar Indonesia. Mereka berada di Curacao, St. Kitts, Grenada, Republik Dominika, Gibraltar, Kepulauan Cook dan melaporkan diri ke pemerintah lokal. Tetapi mereka (casino offshore) ini di operasikan dari US – walaupun secara fisik server casino-nya berada di negara lain. Kenapa justru negara-negara kecil ini mengijinkan judi / gambling? Ternyata karena mereka membutuhkan dana / uang untuk kemakmuran negara mereka dari pajak perjudian …. Wah wah repot juga memang.
Dalam semua kasus internet gambling, anda para penjudi akan diharuskan untuk melakukan deposit dimuka sebelum anda dapat melakukan gambling online. Hal ini berarti anda harus melakukan transfer uang ke online casino sejumlah uang melalui Western Union, Moneygram, kartu kredit, money order, wire tranfer dll. Semua casino beroperasi menggunakan account sistem dimana semua uang akan di ambil dan dimasukan ke account anda sebagai penjudi. Banyak operator casino yang juga memungkinkan anda mentransfer kembali seluruh account anda ke kartu kredit anda.

Untuk menjamin keamanan bagi para penjudi biasanya negara pemberi lisensi mewajibkan penyelenggara casino untuk men-deposit sejumlah uang kemenangan yang umumnya diterima oleh pemenang, kalau-kalau nanti pada suatu saat penyelenggara gagal memberikan uang tersebut ke pemenang maka akan diambil dari deposit lisensi penyelenggaraan judi tersebut. Hal keamanan lain yang perlu dilakukan adalah data-data kartu kredit dll semua harus diletakan di server Internet yang aman dari pencuri data. Secara legal pemberi lisensi akan mengharuskan penggunaan secure server, secara teknologi yang namanya maling dimana-mana cukup pandai.

Masalah yang perlu diperhatikan yang lain adalah masalah fairness … program gambling yang dibuat harus yakin bahwa tidak berbuat curang. Harus ada ahli software yang menjamin bahwa program gambling tersebut akan melakukan tindakan yang fair. Ini yang berat karena mungkin saja programmer akan memprogram supaya hanya sebagian kecil yang akan dimenangkan peserta – jadi bandar yang akan selalu untung.



Dimana saja lokasi Online Gambling di Internet? Ada beberapa tempat dimana kita bisa mencari daftar lokasi-lokasi online gambling di Internet seperti di http://www.wheretobet.com/ , http://www.gambling.com/. Sedangkan bagi penggemar judi sport bisa melihat di http://www.thesportsdaily.com/. Untuk HTML Casino yang cukup baik ada di http://www.starluck.com. Sedang JAVA Casino yang jujur dan bisa di percaya antara lain adalah http://www.vipsports.com dan http://www.fairdealsports.com. Sedang contoh lotere di Internet adalah http://www.pluslotto.com.

Kalau menurut pendapat saya secara pribadi – apapun yang dilakukan oleh para penjudi, yang pasti untung adalah bandar-nya.



Konsep Linux dan Open Source Menapak Bisnis Open Source

Penulis: I Made Wiryana dan Fade2Blac *

detikcom - Bielefeld (Jerman), Berita kejatuhan nilai saham RedHat di Nasdaq yang sempat dimuat di detikcom tempo hari cukup membuat kaget banyak pihak. Bahkan beberapa orang melalui e-mail kepada penulis bertanya; apakah ini akhir era bisnis Linux? apakah benar bisnis model open source ini hanyalah trend musiman? bentuk lain dari dotcomers? apakah bisnis model open source hanyalah sekedar tesis tanpa bukti nyata? bagaimana nasib Linux di masa depan? Artikel ini bermaksud untuk memberikan sudut pandang yang berbeda dan mencoba melengkapi berita Nilai Saham RedHat Ambruk, Bisnis Open Source Tidak Mungkin? http://www.detik.com/net/2000/12/05/2000125-060648.shtml pada Selasa (5/12/2000).

Ada beberapa hal yang perlu diperhatikan pada berita tersebut, antara lain fluktuasi saham RedHat. Fluktuasi harga saham adalah hal yang biasa dan belum tentu menampilkan kinerja asli dari perusahaan tersebut. Seringkali bisa disebabkan oleh sentimen pasar, atau kondisi pasar global saat itu. Hal ini dibahas secara lebih komprehensif pada situs . Sedangkan polemiknya pada situs .

Saat memasuki IPO di Nasdaq, RedHat menjual sahamnya dengan harga USD 14 per lembar dan sempat melambung hingga USD 151 per lembar dan kini mencapai sekitar USD 5-6. Memang itu terjadi di satu tahun berbarengan dengan boom-nya bisnis dotcom dan bisnis high tech lainnya. Jadi perubahan harga ini juga akibat pasar secara global. Hingga bisa dikatakan faktor overvalue lebih berperan dalam hal ini. Runtuhnya beberapa saham dotcom menyebabkan juga runtuhnya kepada para pemain baru di bidang TI. Ini juga menyebabkan pada turunnya harga saham RedHat.

Sedangkan mengenai informasi penutupan kantor cabang RedHat, sebetulnya RedHat dalam minggu-minggu ini memutuskan untuk menutup 3 kantor cabangnya, di San Fransisco, Newberry (Inggris), dan Cagnes (Perancis). Kantor ini tadinya adalah milik perusahaan yang diakuisi oleh RedHat. Penutupan kantor ini sebetulnya akibat redundasi dan tidak diakibatkan oleh kondisi keuangan RedHat karena saat ini mereka masih memiliki cash sekitar USD 320 juta . Di daerah San Fransisco sendiri masih beroperasi 3 kantor RedHat. Penutupan salah satu kantor cabang adalah hal yang wajar dalam sebuah perusahaan.





Linux - apakah itu?

Onno W. Purbo

Tidak kenal maka tidak sayang, begitu kata pepatah. Pada kesempatan ini saya mencoba memperkenalkan Linux. Tampak pada gambar adalah tampilan layar dari Corel Linux yang menjalankan Kool Desktop Environment (KDE), tampak mirip dengan Windows dan cukup user friendly.

Linux pada dasarnya adalah sistem operasi seperti Windows & DOS yang beroperasi di PC. Seperti juga Windows yang mempunyai banyak versi ada Windows 3.11, 3.12, 95, 98, Millenium Edition, NT, 2000 dll, pada Linux kita juga mengenal banyak sekali distribusi Linux ada RedHat, Caldera, SuSE, Mandrake, Best Linux, Easy Linux bahkan ada distribusi Linux versi Indonesia yaitu Linux Merdeka. Memang berbeda dengan Windows / DOS yang semuanya di buat oleh satu perusahaan yaitu Microsoft, berbagai distribusi Linux ini dikembangkan oleh banyak kelompok orang / perusahaan dibelakangnya.

Perbedaan yang paling fundamental antara Windows & Linux terutama dimasalah Hak Cipta-nya. Windows adalah ilegal / melanggar hukum jika kita mengcopy / membajak CD-nya untuk diperdagangkan. Pada Linux memang perangkat lunak tersebut bebas / gratis bisa diperoleh di internet, dapat dicopy ke CD dengan bebas, semua tanpa ada konsekuensi pelanggaran terhadap hukum. Karena Linux memang menggunakan hak cipta publik yang dikenal sebagai GNU Public License (GPL). Penjelasan lebih detail tentang GPL bisa dibaca di http://www.gnu.org. Prinsip dasar dari GPL berbeda dengan hak cipta yang biasa digunakan oleh banyak orang termasuk Undang-Undang Hak Cipta yang di kembangkan di Indonesia, GPL pada dasarnya berusaha memberikan kebebasan seluas-luasnya bagi si pencipta perangkat lunak untuk mengembangkan kreasi perangkatnya dan menyebarkannya secara bebas di publik. Tentunya dalam penggunaan GPL ini kita masih diikat dengan norma, nilai dan etika – misalnya tidak etis jika kita mengambil software GPL kemudian mengemasnya menjadi sebuah software lain dan mengaku-ngaku bahwa software tersebut adalah buatan kita.
Dengan menggunakan GPL software Linux dapat digunakan secara cuma-cuma di seluruh dunia, bahkan source code (listing program) Linux terbuka dan dapat diperoleh secara cuma-cuma di Internet tanpa perlu membajak. Dengan maraknya isu pembajakan software di Indonesia oleh BSA dll, maka ada baiknya dipertimbangkan penggunaan Linux pada PC anda daripada membeli / tepatnya mencuri Windows dipasaran. Bagi sebagian besar orang di Indonesia mungkin akan terlalu mahal kalau mengambil Linux di Internet karena biaya pulsa telkom yang mahal, CD Linux banyak bisa diperoleh di toko komputer, kalau anda ke Jakarta coba mampir ke Mangga dua & Glodok bisa memperoleh CD Linux dalam banyak versi yang di jual seharga Rp. 20-30.000 / CD. Biasanya untuk instalasi minimal cukup menggunakan satu (1) buah CD saja, akan tetapi jika kita menginginkan untuk bereksperimen dan mengembangkan banyak hal dengan Linux ada baiknya membeli beberapa CD Linux yang berlain-lainan.

Untuk aplikasi jaringan & server seperti Internet sebetulnya Linux mempunyai kemampuan di atas Windows karena memang pada dasarnya Linux berkembang dari komunitas Internet. Banyak sekali aplikasi yang dapat digunakan di Linux untuk mendukung jaringan Internet baik sebagai pengguna biasa (e-mail, Web, chatting, mendengarkan lagu MP3 dll), memang pada aplikasi end user Internet Windows berusaha keras untuk menyaingi apa yang ada di Linux terutama terlihat sekali dengan Media Player versi 7 yang ada di WindowsME.

Windows cukup kalah telak di aplikasi server terutama untuk Internet, aplikasi Webserver, proxy server, firewall, mail server, Samba dll cukup kompleks dan memposisikan Linux cukup berada di muka dibandingkan Windows. Pada aplikasi server umumnya X-Windows tidak lagi digunakan di Linux, oleh karena itu Linux biasanya lebih hemat resources (memory & harddisk) di bandingkan Windows.

Sialnya Linux cukup kalah telak dari Windows untuk aplikasi Office-nya, saya harus mengakui bahwa Microsoft Office termasuk tool yang sangat enak untuk bekerja di PC untuk menyiapkan presentasi, tulisan, laporan, agenda dll. Memang komunitas Linux berusaha keras untuk mengejar ketinggalannya dengan mengembangkan StarOffice yang dimotori oleh Sun Microsystems agar dapat digunakan secara cuma-cuma di atas Linux.




Salah satu kelebihan utama Linux adalah dukungan dari komunitas Linux yang tersebar dalam berbagai mailing list / tempat diskusi melalui e-mail di Internet. Melalui mailing list tersebut seseorang yang mengalami kesulitan dalam menggunakan Linux akan dapat dengan mudah memperoleh bantuan dari orang yang lain. Prinsip gotong royong terasa sangat kuat di komunitas penguna Linux. Tempat mangkal para pengguna Linux di Indonesia terletak di http://www.linux.or.id, tentunya masih ada tempat mangkal lainnya adapun tempat diskusi mereka cukup banyak dan dapat di subscribe menggunakan e-mail seperti di linux-setup@linux.or.id (tempat nongkrong newbie, membahas instalasi dsb.), linux-admin@linux.or.id (administrasi sistem, network, users, groups), linux-aktivis@linux.or.id (diskusi mengenai keorganisasian Linux Indonesia dan pemasyarakatan Linux) & kursus-linux@egroups.com (tempat kursus Linux virtual di Internet).





Kamis, 23 April 2009

How To Create A New Indentity

By The Walking Glitch
Courtesy of the Jolly Roger!

You might be saying, "Hey Glitch, what do I need a new identity for?"
The answer is simple. You might want to go buy liquor somewhere, right?
You might want to go give the cops the false name when you get busted
so you keep your good name, eh? You might even want to use the new
identity for getting a P.O. Box for carding. Sure! You might even
want the stuff for renting yourself a VCR at some dickless loser of a
convenience store. Here we go:
Getting a new ID isn't always easy, no one said it would be. By following
these steps, any bozo can become a new bozo in a coupla weeks.

STEP 1

The first step is to find out who exactly you'll become. The
most secure way is to use someone's ID who doesn't use it themselves.
The people who fit that bill the best are dead. As an added bonus they
don't go complaining one bit. Go to the library and look
through old death notices. You have to find someone who was born about
the same time as you were, or better yet, a year or two older
so you can buy booze, etc. You should go back as far as you can for the
death because most states now cross index deaths to births so people
can't do this in the future. The cutoff date in Wisconsin is 1979, folks
in this grand state gotta look in 1978 or earlier. Anything earier there
is cool. Now, this is the hardest part if you're younger. Brats that
young happen to be quite resilient, takin' falls out of three story windows
and eating rat poison like its Easter candy, and not a scratch or
dent. There ain't many that die, so ya gotta look your ass off. Go
down to the library and look up all the death notices you can,
if it's on microfilm so much the better. You might have to go through
months of death notices though, but the results are well worth it.
You gotta get someone who died locally in most instances: the death
certificate is filed only in the county of death. Now you go down to
the county courthouse in the county where he died and get the
death certificate, this will cost you around $3-$5 depending on the state
you're in. Look at this hunk of paper, it could be your way to
vanish in a clould of smoke when the right time comes, like right after
that big scam. If You're lucky, the slobs parents signed him up with
social security when he was a snot nosed brat. That'll be another piece
of ID you can get. If not, thats ok too. It'll be listed on the death
certificate if he has one. If you're lucky, the stiff was born
locally and you can get his birth certificate right away.

STEP 2

Now check the place of birth on the death certificate, if it's in
the same place you standing now you're all set. If not, you can mail
away for one from that county but its a minor pain and it might
take a while to get, the librarian at the desk has listings of where
to write for this stuff and exactly how much it costs. Get the Birth
cirtificate, its worth the extra money to get it certified
because thats the only way some people will accept it for ID. When yur
gettin this stuff the little forms ask for the reason you want it,
instead of writing in "Fuck you", try putting in the word "Geneology".
They get this all the time. If the Death certificate looks good for
you, wait a day or so before getting the certified birth certificate
in case they recognize someone wanting it for a dead guy.

STEP 3

Now your cookin! You got your start and the next part's easy.
Crank out your old Dot matrix printer and run off some mailing labels
addressed to you at some phony address. Take the time to check your
phony address that there is such a place. Hotels that rent by the month
or large apartment buildings are good, be sure to get the right zip
code for the area. These are things that the cops might notice that
will trip you up. Grab some old junk mail and paste your new lables
on them. Now take them along with the birth certificate down to the library.
Get a new library card. If they ask you if you had one before say that
you really aren't sure because your family moved around alot when
you were a kid. Most libraries will allow you to use letters as a form
of ID when you get your card. If they want more give them a sob story
about how you were mugged and got your wallet stolen with all your
identification. Your card should be waiting for you in about two weeks.
Most libraries ask for two forms of ID, one can be your trusty Birth
Certificate, and they do allow letters addressed to you as a second
form.

STEP 4

Now you got a start, it isn't perfect yet, so let's continue. You should
have two forms of ID now. Throw away the old letters, or better yet
stuff them inside the wallet you intend to use with this stuff.
Go to the county courthouse and show them what nice ID you got and get
a state ID card. Now you got a picture ID. This will take about two weeks
and cost about $5, its well worth it.

STEP 5

If the death certificate had a social security number on it you can go
out and buy one of those metal SS# cards that they sell.
If it didn't, then you got all kinds of pretty ID that shows exactly
who you are. If you don't yet have an SS#, Go down and apply for one,
these are free but they could take five or six weeks to get,
Bureaucrats you know... You can invent a SS# too if ya like, but the motto
of 'THE WALKING GLITCH' has always been "Why not excellence?".


STEP 6

If you want to go whole hog you can now get a bank account in your new
name. If you plan to do alot of traveling then you can put alot
of money in the account and then say you lost the account book. After
you get the new book you take out all the cash. They'll hit you
with a slight charge and maybe tie-up your money some, but if you're
ever broke in some small town that bank book will keep you from being
thrown in jail as a vagrant.

ALL DONE?

So kiddies, you got ID for buying booze, but what else? In some towns
(the larger the more likely) the cops if they catch you for something
petty like shoplifting stuff under a certain dollar amount, will just
give you a ticket, same thing for pissing in the street. Thats it!
No fingerprints or nothing, just pay the fine (almost always over $100)
or appear in court. Of course they run a radio check on your ID, you'll
be clean and your alter-ego gets a blot on his record.
Your free and clear. Thats worth the price of the trouble you've gone
through right there. If your smart, you'll toss that ID away if this
happens, or better yet, tear off your picture and give the ID to someone
you don't like, maybe they'll get busted with it.
If you're a working stiff, here's a way to stretch your dollar. Go to work
for as long as it takes to get unemployment and then get yourself fired.
Go to work under the other name while your getting the unemployment.
With a couple of sets of ID, you can live like a king. These concepts
for survival in the new age come to you compliments of THE WALKING GLITCH.
First release of this phile 7/7/88.

Getting Money out of Pay Phones

by the Jolly Roger

I will now share with you my experiences with pay telephones. You will discover
that it is possible to get money from a pay phone with a minimum of effort.
Theory: Most pay phones use four wires for the transmission of data and
codes to the central office. Two of them are used for voice (usually red and
green), one is a ground, and the last is used with the others for the
transmission of codes.
It is with this last wire that you will be working with. On the pay phone that
I usually did this to, it was colored purple, but most likely will be another
color.
What you will do is simply find a pay phone which has exposed wires, such that
one of them can be disconnected and connected at ease without
fear of discovery. You will discover that it is usually a good idea to
have some electrical tape along with you and some tool for cutting this
tape.
Through trial and error, you will disconnect one wire at a time starting with
the wires different than green and red. You do want a dial tone during
this operation.
What you want to disconnect is the wire supplying the codes to the telephone
company so that the pay phone will not get the 'busy' or 'hang-up' command.
Leave this wire disconnected when you discover it.
What will happen: Anytime that someone puts any amount of money into the pay
phone, the deposit will not register with the phone company and it
will be held in the 'temporary' chamber of the pay phone.
Then, (a day later or so) you just code back to the phone, reconnect the wire,
and click the hook a few times and the phone will dump it all out the shute.
(What is happening is that the 'hangup' code that the phone was not
receiving due to the wire being disconnected suddenly gets the code and
dumps its' 'temporary' storage spot.)
You can make a nice amount of money this way, but remember
that a repairman will stop by every few times it is reported broken and
repair it, so check it at least once a day.
Enjoy and have fun.. Many phones I have done this to, and it works
well with each..
-= Exodus =-






The Art of Carding

by the Jolly Roger

Obtaining a credit card number: There are many ways to obtain the
information needed to card something.
The most important things needed are the card number and the expiration
date. Having the card-holders name doesn't hurt, but it is not essential.
The absolute best way to obtain all the information needed is by trashing.
The way this is done is simple. You walk around your area or any other
area and find a store, mall, supermarket, etc., that throws their
garbage outside on the sidewalk or dumpster. Rip the bag open and see
if you can find any carbons at all. If you find little shreds of
credit card carbons, then it is most likely not worth your time to tape
together. Find a store that does not rip their carbons at all or only in half.
Another way is to bullshit the number out of someone. That is call them
up and say "Hello, this is Visa security and we have a report that
your card was stolen." They will deny it and you will try to get it out
of them from that point on. You could say, "It wasn't stolen? Well what
is the expiration date and maybe we can fix the problem....
Ok and what is the number on your card?......Thank you very much and
have a nice day." Or think of something to that degree.
Another way to get card numbers is through systems such as TRW and CBI,
this is the hard way, and probably not worth the trouble, unless you are
an expert on the system. Using credit card numbers posted on BBS's is
risky. The only advantage is that there is a good chance that other
people will use it, thus decreasing the chances of being the
sole-offender. The last method of getting numbers is very good also.
In most video rental stores, they take down your credit card number
when you join to back-up your rentals. So if you could manage to steal
the list or make a copy of it, then you are set for a LONG time.
Choosing a victim: Once you have the card number, it is time to make the
order. The type of places that are easiest to victimize are small
businesses that do mail order or even local stores that deliver.
If you have an ad for a place with something you want and the order number
is NOT a 1-800 number then chances are better that you will succeed.
Ordering: When you call the place up to make the order, you must have
several things readily at hand.
These are the things you will need: A name, telephone number, business
phone, card number (4 digit bank code if the card is MasterCard),
expiration date, and a complete shipping and billing address.
I will talk about all of these in detail. A personal tip: When I call
to make an order, it usually goes much smoother if the person you are
talking to is a woman. In many cases they are more gullible than men.
The name: You could use the name on the card or the name of the person
who you are going to send the merchandise to. Or you could use the name
on the card and have it shipped to the person who lives at the drop
(Say it is a gift or something).
The name is really not that important because when the company verifies
the card, the persons name is never mentioned, EXCEPT when you have a
Preffered Visa card. Then the name is mentioned. You can tell if you
have a Preffered Visa card by the PV to the right of the expiration
date on the carbon. Nophone all day long waiting for the company to call
(Which they will), then the phone number to give them as your home-phone
could be one of the following: A number that is ALWAYS busy, a number
that ALWAYS rings, a payphone number, low end of a loop (and you will wait
on the other end), or a popular BBS.
NEVER give them your home phone because they will find out as soon as
the investigation starts who the phone belongs to. The best thing would
be to have a payphone call forward your house
(via Cosm The business number: When asked for, repeat the number you
used for your home phone.
Card number: The cards you will use will be Visa, Mastercard, and
American Express. The best is by far Visa. It is the most
straight-forward. Mastercard is pretty cool except for the bank code.
When they ask for the bank code, they sometimes also ask for the bank
that issued it. When they ask that just say the biggest bank you know of
in your area. Try to avoid American Express. They tend to lead full
scale investigations. Unfortunately, American Express is the most popular
card out. When telling the person who is taking your call the card
number, say it slow, clear, and with confidence.
e.g. CC# is 5217-1234-5678-9012. Pause after each set of four so you
don't have to repeat it.
Expiration date: The date must be at LEAST in that month. It is best
to with more than three months to go.
The address: More commonly referred to as the 'drop'. Well the drop
can range from an abandoned building to your next door neighbors
apartment. If you plan to send it to an apartment building then be
sure NOT to include an apartment number. This will confuse UPS or postage
men a little and they will leave the package in the lobby.
Here is a list of various drops: The house next door whose family is on
vacation, the apartment that was just moved out of, the old church that
will be knocked down in six months, your friends house who has absolutely
nothing to do with the type of merchandise you will buy and who will
also not crack under heat from feds, etc..
There are also services that hold merchandise for you, but personally
I would not trust them. And forget about P.O. Boxes because you need
ID to get one and most places don't ship to them anyway.
Other aspects of carding:Verifying cards, seeing if they were reported
stolen.
Verifying cards: Stores need to verify credit cards when someone purchases
something with one. They call up a service that checks to see if the
customer has the money in the bank.
The merchant identifies himself with a merchant number. The service
then holds the money that the merchant verified on reserve. When the
merchant sends in the credit card form, the service sends the merchant
the money. The service holds the money for three days and if no form
appears then it is put back into the bank. The point is that if you
want to verify something then you should verify it for a little amount
and odds are that there will be more in the bank.
The good thing about verification is that if the card doesn't exist or
if it is stolen then the service will tell you. To verify MasterCard
and Visa try this number. It is voice:1-800-327-1111 merchant code is
596719.
Stolen cards: Mastercard and Visa come out with a small catalog every
week where they publish EVERY stolen or fraudulantly used card.
I get this every week by trashing the same place on the same day.
If you ever find it trashing then try to get it every week.
Identifying cards: Visa card numbers begin with a 4 and have either 13
or 16 digits. MasterCard card numbers begin with a 5 and have 16 digits.
American Express begins with a 3 and has 15 digits. They all have the
formats of the following:

3xxx-xxxxxx-xxxxx American Express
4xxx-xxx-xxx-xxx Visa
4xxx-xxxx-xxxx-xxxx Visa
5xxx-xxxx-xxxx-xxxx MasterCard
Gold cards: A gold card simply means that credit is good for $5000.
Without a gold card, credit would be normally $2000.
To recognize a gold card on a carbon there are several techniques:
American Express-none.
Visa-PV instead of CV.
Note-When verifying a PV Visa, you have to have the real name of the
cardholder.
Mastercard-An asterix can signify a gold card, but this changes depending
when the card was issued.
I am going to type out a dialog between a carder and the phone operator
to help you get the idea.
Operator: "Over-priced Computer Goods, may I help you?"
Carder: "Hi, I would like to place an order please."
Operator: "Sure, what would you like to order?"
Carder: "400 generic disks and a double density drive."
Operator: "Ok, is there anything else?"
Carder: "No thank you, that's all for today."
Operator: "Ok, how would you like to pay for this? MasterCard or Visa?"
Carder: "Visa."
Operator: "And your name is?"
Carder: "Lenny Lipshitz." (Name on card)
Operator: "And your Visa card number is?"
Carder: "4240-419-001-340" (Invalid card)
Operator: "Expiration date?"
Carder: "06-92."
Operator: "And where would you like the package shipped to?"
Carder: "6732 Goatsgate Port. Paris,texas,010166."
Operator: "And what is your home telephone number?"
Carder: "212-724-9970" (This number is actually always busy)
Operator: "I will also need your business phone number in case we have
to reach you."
Carder: "You can reach me at the same number. 212-724-9970"
Operator: "O.K. Thank you very much and have nice day."
Carder: "Excuse me, when will the package arrive?"
Operator: "In six to seven days UPS."
Carder: "Thanks alot, and have a pleasant day."
Now you wait 6-7 days when the package will arrive to the address which
is really a house up for sale. There will be a note on the door
saying, "Hello UPS, please leave all packages for Lenny Lipshitz in the
lobby or porch. Thanks alot, Lenny Lipshitz" (Make the signature half-way
convincing)

Still as DANGEROUS as ever............. Exodus

Rabu, 15 April 2009

Create An Ftp Server On Your Pc With Serv-u

Requirements:
Serv-U
No-IP.com Website

Quote:
Step 1. Getting a static IP address.
Get a static address for your FTP server. You will want to do this as opposed to using your IP address for several reasons. First, it’s easier keeping up-to-date. Imagine having to change all of your setting every time your IP changed. With No-IP, the No-IP service runs in background on your computer and updates your current IP address with your FTP server’s URL (for example, you get ftp://rkchoolie.serveftp.com). Second reason, you don’t want your IP address posted out there for everyone to see.

1. Go to www.No-IP.com to create a new user account.
2. Fill in the information that is required and the click Register button.
3. Your account has now been created and your account password has been emailed to you.
4. Check your email mailbox and wait for the mail that contains your password
5. Go back to www.No-IP.com and type your email address and password to login to your account.
6. Once in your account, click on Add a host in the left menu
7. Type in the Hostname you want (example: rkchoolie) and pick a Domain from the list (example: ftpserve.com)
8. Check Allow Wildcards and click the Submit button
9. You now have your static address (example: rkchoolie.serveftp.com)
10. Click on your OS link in the Dyn-Update Client in the bottom right menu and follow links to download the client
11. Once downloaded, install the software and type in your email address and password when asked.
12. Finally tick the checkbox near your static address.

You now have a static web address .


Quote:
Step 2. Installing and setting the FTP server
1. Install Serv-U 4.0.
2. Start Serv-U and use the wizard to setup your ftp.
3. Click next until you're asked for an IP address, leave it blank and then click next.
4. Type the domain name you've just registered above (example: preacher.serveftp.com) in the domain name field and then click Next.
5. You are asked if you want to allow anonymous access, select No and then click next.
6. You are then asked to create a named account, check yes and then click next.
7. Type in the user name you wish for this account (example: Harrie) and click next.
8. Type a password for this account (example: $p3c1aL). For security reasons, try to create a password with some letters, numbers and special characters. Then click next.
9. You will then be asked for the Home directory of the account you just created. Select the directory and then click next.
10. Select yes to lock this account to the Home directory. You want to do this so that the user can not go any further up that his home directory. Click next.
11. The account is now set so click finish.

Quote:
Step 3. Configuring user accounts
1. In the left tree-menu, select the account you've just created and then click on the General tab.
2. Check Hide ‘Hidden’ Files.
3. Check Allow only and enter the number one in the box.
4. Set the Max. download speed to what ever you want. If this is an account that many will be using, set it low to save on your bandwidth. I usually have mine set between 10 – 20. If you leave it blank, users will be able to download from you at full bandwidth.
5. Set the Max no. of users to how many you want to be able to log on at one time. This depends on your connection speed but try these (56 - 1, ISDN - 3, ADSL or cable - 5-6 users.)
6. Now, click on the Dir Access tab.
7. You should see the home folder in there. Highlight it and make your permissions.
8. If you only want users to be able to download check only Read, List, & Inherit.
9. If you want users to be able to upload, but to only one particular folder but not download, click the add button and then select that folder. Now highlight the folder and set these permissions on that folder. Check Write, Append, List, Create, & Inherit. Once you have made the permissions click on the up arrow that is located at the bottom right-hand corner. You want this special upload folder to be list first, before the home folder.
10. If there is a folder that you don’t want anyone to have access to, but it is inside the home folder, then click the add button and then select that folder. Now highlight the folder and make sure that all checkboxes are left. Once you have made the permissions click on the up arrow that is located at the bottom right-hand corner. You want this no access folder to be listed at the very top.
11. There are many other different sets of permissions you can play with. I just covered your basics.
12. Your server is now set!
13. Try logging on with the username and password and see if it works.



How To Make An Animted Logo, the easy way

Things you will need:
QUOTE
1. Photoshop or Paintshop (any versions)
2. Xara3D 5.xx
3. Jasc animation shop 3.xx
4. DUH!! A pic you want as a logo LOL

Things you MIGHT need:
1. a computer
2. Internet connection
3. consciousness
4. corn on the cob

Here they are for your convinience:
Adobe Photoshop CS v8.0 thanx to TheCollector
http://www.shareordie.com/index.php?showto...85&hl=Photoshop

Jasc Paint Shop Pro 9.0 Retail thanx to arclite
http://www.shareordie.com/index.php?showto...&hl=Jasc&st=100

Xara3D 5.02 thanx to Zabref
http://www.shareordie.com/index.php?showtopic=6512&hl=XARA

Jasc Animation Shop 3.11 thanx to sev7en
http://www.shareordie.com/index.php?showtopic=34928&hl=


Steps:
1. Using your photo editor fix/touch up you pic/logo to your liking….too easy(example bellow)
user posted image

2. Save it some where easy to find, for example “C:\pictures” or “C:\Windows\thecenterofhell\system\system32\system64\system128\???” although I don’t recommend the second one.

3.Open Xara3D 5.xx, press “Alt+T” or click on the “T” button on the LEFT PANEL erase all of the text in the window that pops up then press ok.
user posted image
user posted image

4. Press “Alt+U” or click on the yellow “U” surrounded in gray on the LEFT PANEL, check the “button” box and select a desire button type and leave this option window open you will need it again.
user posted image

5. Press the “At+X” or click the black “X” on the LEFT PANEL, click “load texture” in the pop up window, find the picture you made/adjusted and highlight it then click open or just double-click it. Use the “size, x, y, angle” sliders to adjust the picture or “texture” and in the “button options” windows use the “stretch, corners”(corners, only if using this option you can adjust) to adjust the button size.
user posted image

6. Press “Alt+A” or click the black “A” on the LEFT PANEL with what looks like to me is a half-halo with an arrow tip!? Anyway, here is a quick rundown on what the options here do: (BY THE WAY TO ACTIVATE OR “PREVIEW ANIMATION” PRESS “Ctrl+spacebar”).
user posted image


A. Frames per cycle: This is the number of frames for each complete cycle through the animation sequence. The greater the number of frames the smoother the animation. The drawback is that the file is bigger - this is a big disadvantage for web graphics. You may need to try different values to get the best results.
B. Frames per second: The animation speed. Slow speeds can give jerky movement. High speeds can also give jerky movement as the program displaying the animation may not be able to keep up. Again you may need to try different values.
C. Pause: This pauses the first frame before continuing the rest of the animation. Type in a value in centiseconds (1/100ths of a second) - a 2 second pause is 200 cs. Note that this applies only to the first frame; use Frames per cycle and Frames per second to control the overall speed of the animation.
D. Loop Value: Unchecked is Infinite, Any other value see for yourself. Lmao
E. Loop: This lets you specify how many times the animation should repeat itself. Note that some browsers take any value other than 1 to mean 'loop forever'. Therefore, your animation either plays once or forever.
F. Style: This controls the type of animation:
Rotate 1 rotates all the text as one; Rotate 2 rotates each character. (Buttons have a single Rotate option.) Rotate text/Rotate lights - select whether you want the text to rotate or the lights or both. You cannot rotate the shadow as this would create very large files. Direction - selects the direction of rotation.

Swing options: Swing 1 swings all the text as one; Swing 2 swings each character. (Buttons have a single Swing option.) Angle - how much you want the heading to swing.

Pulsate options: Pulsate 1 pulsates all the text as one; Pulsate 2 pulsates each character. (Buttons have a single Pulsate option.) Minimum text size - how far back to pulsate the text. Shrink+Grow & Grow+Shrink - only have an effect if you Pause the animation. These options select the starting point for the animation (maximum or minimum.)

Fade options: Fade in - the heading emerges from the background color. Fade out - the heading merges into the background color. SO AFTER PICKING ONE………………..


7. On the top left go to FILE>>>EXPORT ANIMATION or press “Ctrl+Shift+X” and save in desired location.
user posted image

8. When the next window pops up (Export as animated gif save location then options): Experiment with each one to get it right, but remember the SoD rules about Siggys and Avatars.
user posted image
user posted image



Because Animated GIFs can be quite large, you may find that a 16 or 32 color, optimized palette per frame, produces the best results for the smallest file size. However you might need to experiment.
Dithering always makes GIFs look better, but also makes them larger. When outputting at 256 colors you may find that there is no need to turn dithering on.
Current Window Size lets you export just the area surrounding the text (Crop on) or the entire window area (Crop off.)
User Defined lets you specify the dimensions of the bitmap.


How to Linux boot

How Linux boots

As it turns out, there isn't much to the boot process:

1. A boot loader finds the kernel image on the disk, loads it into memory, and starts it.
2. The kernel initializes the devices and its drivers.
3. The kernel mounts the root filesystem.
4. The kernel starts a program called init.
5. init sets the rest of the processes in motion.
6. The last processes that init starts as part of the boot sequence allow you to log in.

Identifying each stage of the boot process is invaluable in fixing boot problems and understanding the system as a whole. To start, zero in on the boot loader, which is the initial screen or prompt you get after the computer does its power-on self-test, asking which operating system to run. After you make a choice, the boot loader runs the Linux kernel, handing control of the system to the kernel.

There is a detailed discussion of the kernel elsewhere in this book from which this article is excerpted. This article covers the kernel initialization stage, the stage when the kernel prints a bunch of messages about the hardware present on the system. The kernel starts init just after it displays a message proclaiming that the kernel has mounted the root filesystem:

VFS: Mounted root (ext2 filesystem) readonly.

Soon after, you will see a message about init starting, followed by system service startup messages, and finally you get a login prompt of some sort.

NOTE On Red Hat Linux, the init note is especially obvious, because it "welcomes" you to "Red Hat Linux." All messages thereafter show success or failure in brackets at the right-hand side of the screen.

Most of this chapter deals with init, because it is the part of the boot sequence where you have the most control.
init

There is nothing special about init. It is a program just like any other on the Linux system, and you'll find it in /sbin along with other system binaries. The main purpose of init is to start and stop other programs in a particular sequence. All you have to know is how this sequence works.

There are a few different variations, but most Linux distributions use the System V style discussed here. Some distributions use a simpler version that resembles the BSD init, but you are unlikely to encounter this.

Runlevels

At any given time on a Linux system, a certain base set of processes is running. This state of the machine is called its runlevel, and it is denoted with a number from 0 through 6. The system spends most of its time in a single runlevel. However, when you shut the machine down, init switches to a different runlevel in order to terminate the system services in an orderly fashion and to tell the kernel to stop. Yet another runlevel is for single-user mode, discussed later.

The easiest way to get a handle on runlevels is to examine the init configuration file, /etc/inittab. Look for a line like the following:

id:5:initdefault:

This line means that the default runlevel on the system is 5. All lines in the inittab file take this form, with four fields separated by colons occurring in the following order:
# A unique identifier (a short string, such as id in the preceding example)
# The applicable runlevel number(s)
# The action that init should take (in the preceding example, the action is to set the default runlevel to 5)
# A command to execute (optional)

There is no command to execute in the preceding initdefault example because a command doesn't make sense in the context of setting the default runlevel. Look a little further down in inittab, until you see a line like this:

l5:5:wait:/etc/rc.d/rc 5

This line triggers most of the system configuration and services through the rc*.d and init.d directories. You can see that init is set to execute a command called /etc/rc.d/rc 5 when in runlevel 5. The wait action tells when and how init runs the command: run rc 5 once when entering runlevel 5, and then wait for this command to finish before doing anything else.

There are several different actions in addition to initdefault and wait, especially pertaining to power management, and the inittab(5) manual page tells you all about them. The ones that you're most likely to encounter are explained in the following sections.

respawn

The respawn action causes init to run the command that follows, and if the command finishes executing, to run it again. You're likely to see something similar to this line in your inittab file:

1:2345:respawn:/sbin/mingetty tty1

The getty programs provide login prompts. The preceding line is for the first virtual console (/dev/tty1), the one you see when you press ALT-F1 or CONTROL-ALT-F1. The respawn action brings the login prompt back after you log out.

ctrlaltdel

The ctrlaltdel action controls what the system does when you press CONTROL-ALT-DELETE on a virtual console. On most systems, this is some sort of reboot command using the shutdown command.

sysinit

The sysinit action is the very first thing that init should run when it starts up, before entering any runlevels.

How processes in runlevels start

You are now ready to learn how init starts the system services, just before it lets you log in. Recall this inittab line from earlier:

l5:5:wait:/etc/rc.d/rc 5

This small line triggers many other programs. rc stands for run commands, and you will hear people refer to the commands as scripts, programs, or services. So, where are these commands, anyway?

For runlevel 5, in this example, the commands are probably either in /etc/rc.d/rc5.d or /etc/rc5.d. Runlevel 1 uses rc1.d, runlevel 2 uses rc2.d, and so on. You might find the following items in the rc5.d directory:

S10sysklogd S20ppp S99gpm
S12kerneld S25netstd_nfs S99httpd
S15netstd_init S30netstd_misc S99rmnologin
S18netbase S45pcmcia S99sshd
S20acct S89atd
S20logoutd S89cron

The rc 5 command starts programs in this runlevel directory by running the following commands:

S10sysklogd start
S12kerneld start
S15netstd_init start
S18netbase start
...
S99sshd start

Notice the start argument in each command. The S in a command name means that the command should run in start mode, and the number (00 through 99) determines where in the sequence rc starts the command.

The rc*.d commands are usually shell scripts that start programs in /sbin or /usr/sbin. Normally, you can figure out what one of the commands actually does by looking at the script with less or another pager program.

You can start one of these services by hand. For example, if you want to start the httpd Web server program manually, run S99httpd start. Similarly, if you ever need to kill one of the services when the machine is on, you can run the command in the rc*.d directory with the stop argument (S99httpd stop, for instance).

Some rc*.d directories contain commands that start with K (for "kill," or stop mode). In this case, rc runs the command with the stop argument instead of start. You are most likely to encounter K commands in runlevels that shut the system down.

Adding and removing services

If you want to add, delete, or modify services in the rc*.d directories, you need to take a closer look at the files inside. A long listing reveals a structure like this:

lrwxrwxrwx . . . S10sysklogd -> ../init.d/sysklogd
lrwxrwxrwx . . . S12kerneld -> ../init.d/kerneld
lrwxrwxrwx . . . S15netstd_init -> ../init.d/netstd_init
lrwxrwxrwx . . . S18netbase -> ../init.d/netbase
...

The commands in an rc*.d directory are actually symbolic links to files in an init.d directory, usually in /etc or /etc/rc.d. Linux distributions contain these links so that they can use the same startup scripts for all runlevels. This convention is by no means a requirement, but it often makes organization a little easier.

To prevent one of the commands in the init.d directory from running in a particular runlevel, you might think of removing the symbolic link in the appropriate rc*.d directory. This does work, but if you make a mistake and ever need to put the link back in place, you might have trouble remembering the exact name of the link. Therefore, you shouldn't remove links in the rc*.d directories, but rather, add an underscore (_) to the beginning of the link name like this:

mv S99httpd _S99httpd

At boot time, rc ignores _S99httpd because it doesn't start with S or K. Furthermore, the original name is still obvious, and you have quick access to the command if you're in a pinch and need to start it by hand.

To add a service, you must create a script like the others in the init.d directory and then make a symbolic link in the correct rc*.d directory. The easiest way to write a script is to examine the scripts already in init.d, make a copy of one that you understand, and modify the copy.

When adding a service, make sure that you choose an appropriate place in the boot sequence to start the service. If the service starts too soon, it may not work, due to a dependency on some other service. For non-essential services, most systems administrators prefer numbers in the 90s, after most of the services that came with the system.

Linux distributions usually come with a command to enable and disable services in the rc*.d directories. For example, in Debian, the command is update-rc.d, and in Red Hat Linux, the command is chkconfig. Graphical user interfaces are also available. Using these programs helps keep the startup directories consistent and helps with upgrades.

HINT: One of the most common Linux installation problems is an improperly configured XFree86 server that flicks on and off, making the system unusable on console. To stop this behavior, boot into single-user mode and alter your runlevel or runlevel services. Look for something containing xdm, gdm, or kdm in your rc*.d directories, or your /etc/inittab.

Controlling init

Occasionally, you need to give init a little kick to tell it to switch runlevels, to re-read the inittab file, or just to shut down the system. Because init is always the first process on a system, its process ID is always 1.

You can control init with telinit. For example, if you want to switch to runlevel 3, use this command:

telinit 3

When switching runlevels, init tries to kill off any processes that aren't in the inittab file for the new runlevel. Therefore, you should be careful about changing runlevels.

When you need to add or remove respawning jobs or make any other change to the inittab file, you must tell init about the change and cause it to re-read the file. Some people use kill -HUP 1 to tell init to do this. This traditional method works on most versions of Unix, as long as you type it correctly. However, you can also run this telinit command:

telinit q

You can also use telinit s to switch to single-user mode.

Shutting down

init also controls how the system shuts down and reboots. The proper way to shut down a Linux machine is to use the shutdown command.

There are two basic ways to use shutdown. If you halt the system, it shuts the machine down and keeps it down. To make the machine halt immediately, use this command:

shutdown -h now

On most modern machines with reasonably recent versions of Linux, a halt cuts the power to the machine. You can also reboot the machine. For a reboot, use -r instead of -h.

The shutdown process takes several seconds. You should never reset or power off a machine during this stage.

In the preceding example, now is the time to shut down. This argument is mandatory, but there are many ways of specifying it. If you want the machine to go down sometime in the future, one way is to use +n, where n is the number of minutes shutdown should wait before doing its work. For other options, look at the shutdown(8) manual page.

To make the system reboot in 10 minutes, run this command:

shutdown -r +10

On Linux, shutdown notifies anyone logged on that the machine is going down, but it does little real work. If you specify a time other than now, shutdown creates a file called /etc/nologin. When this file is present, the system prohibits logins by anyone except the superuser.

When system shutdown time finally arrives, shutdown tells init to switch to runlevel 0 for a halt and runlevel 6 for a reboot. When init enters runlevel 0 or 6, all of the following takes place, which you can verify by looking at the scripts inside rc0.d and rc6.d:

1. init kills every process that it can (as it would when switching to any other runlevel).

# The initial rc0.d/rc6.d commands run, locking system files into place and making other preparations for shutdown.
# The next rc0.d/rc6.d commands unmount all filesystems other than the root.
# Further rc0.d/rc6.d commands remount the root filesystem read-only.
# Still more rc0.d/rc6.d commands write all buffered data out to the filesystem with the sync program.
# The final rc0.d/rc6.d commands tell the kernel to reboot or stop with the reboot, halt, or poweroff program.

The reboot and halt programs behave differently for each runlevel, potentially causing confusion. By default, these programs call shutdown with the -r or -h options, but if the system is already at the halt or reboot runlevel, the programs tell the kernel to shut itself off immediately. If you really want to shut your machine down in a hurry (disregarding any possible damage from a disorderly shutdown), use the -f option.

Selasa, 14 April 2009

What is Overclocking?

What is Overclocking?
Overclocking is a cool way of making your CPU, video card (monitor card), 3D accelerator and some other kinds of hardware run faster and give better performance for free! (Intel's worst nightmare! MWHAHAHAHAHA!!!)
During this tutorial I will teach you how to overclock your CPU, but you can use this information to overclock other kinds of hardware on your PC.
Now, your CPU speed is based on two factors - your BUS(2) speed and your clock speed (mine is 1 second per second... just kidding. I don't mean a standard clock, like one you can tell time out of. Read on and you'll understand).
Example: The BUS speed on older computers (let's take a Pentium I 166MHZ(3) as an example) is about 66MHZ. 166, the CPU speed, divided by 66, the BUS speed, gives you about 2.5, meaning your clock speed is about 2.5.
Simple, huh? BUS speed X clock speed = CPU speed.

Now, what exactly is overclocking and how do I do it?

Materials The little booklet you were supposed to received together with your CPU.


A screwdriver (better be a Philips screwdriver).

A metal plier with a rubber/plastic handle or a bunch of fingers (better be your fingers... oh, and when I said a bunch of fingers, I've meant at least 5, all of them attached to a living hand (better be yours). Undeads are also welcome).

A calculator / a brain.

A) Open your computer using your trusty screwdriver.
B) Look at the little booklet you have and find the part about the jumpers(4) board and read.
C) Use the plier or the fingers to change the jumpers array so you will receive the clock speed you are interested in. Oh yeah, and try not to step on your CMOS chip(5) or on your Cache chip(6).

Note: newer CPUs are "Clock Locked", meaning you cannot change their clock speed, but you can still change their BUS speed... ;)
Changing the BUS speed is similar to changing the clock speed (read the part on your booklet about the jumpers).

How Dangerous is This Whole Thing?
Well, you CAN fry your modem, but it all depends on you.
If you screw up and step on things, spill coffee over your computer or overclock your CPU too much (see Advanced Tips), don't come back crying to me.

Possible Side Effects: Your computer won't start: this probably means you have overclocked your computer too much. Lower your CPU speed a bit and then try again.

Your OS won't start (or crash very frequently) or your computer will reboot itself randomly etc': open your computer, find the jumper that changes the CPU Voltage (the CPU Voltage is usually something that fits into this pattern: 2.x, when x can be any number) and increase the voltage a bit on every time.
Remember to increase your CPU Voltage as little as you can. The maximum is "VOLT 2.30". If your computer still gives you problems then do a little less overclocking and it should be fine.


Overclocking your CPU might increase it's temperature and decrease it's life span. Don't worry about that, experts claim that during the year 2,000 we will replace our CPU once every 6 months and this will become more frequent during the years so you've got nothing to worry about.

How to Avoid these Side Effects: Attach another fan or a "Heat Sink" to your CPU. It shouldn't cost much (a couple of bucks, maybe) and the outcomes would amaze you (For example: using a device that cools your CPU to -20 Celsius degrees you can turn a Celeron 300A into a 633MHZ CPU)

Place your computer where you won't block it's air ways.

There are programs like CPUIdle (URL(7) to download: http://www.geocities.com/SiliconValley/Monitor/6990/cpuidle.zip) that can shut down your CPU while it's not in use. These actions can decrease the temperature of your CPU, and it can even increase your CPU's life span. Note: CPUIdle only works on Windows, since it is "Built-In" on other OSs (see CPUIdle's documentations).

Statistically Speaking, How Safe is this?
Very safe. Out of tens of thousands of overclockers in the world, only a very few got some of their hardware fried up (and who says it's because of the overclocking anyway?), and those guys didn't listen to the safety warnings (they overclocked their CPU too much, increased the CPU Voltage too much etc').

Is it Worth the Trouble?
DUH!!! Of course it is! Do the math yourself.

More Info on Speeding Up Your Computer
Try the "Modem Speedup" section at blacksun.box.sk

How do I Overclock My 3D Accelerator?
Overclocking 3D accelerators is pretty much like overclocking CPUs, only you have to take one factor into consideration... your CPU speed.
You see, the speed your 3D accelerator works depends on your CPU. The 3D accelerator cannot work faster than the CPU, since some vital 3D calculations are done by it, hence the accelerator cannot continue without these calculations.
If your CPU's speed is lower than 400MHZ, I advise you not to overclock your 3D accelerator. Go overclock your CPU and then overclock your 3D card!! HAHAHA!!

Newbies Corner CPU - Central Processing Unit. A little chip that does all of your calculations (besides graphical calculations, which are mostly done by video cards or 3D accelerators, but they all work according to a "blueprint" given to them by the CPU).


BUS - BUSsed aren't yellow and they don't have a sing saying "school BUS" beside them.
BUSses are little electronic connections which send out electric pulses from different pieces of hardware on your computer to other pieces of hardware.
Without the BUSses your CPU, sound/monitor/modem cards, RAM chip etc' won't be able to communicate with each other.


MHZ - Mega Hertz. To make a long story short, this is the speed of your CPU.


Jumpers - they're inside your computer, they look like tiny little plastic squares and they usually have 2 or more little metal pieces which send electricity from one side to the other (unless they're broken).
They are usually sitting there next to each other. Oh yeah, and they taste bad, so don't try eating any of those.


CMOS Chip - Complementary Metal Oxide Semiconductor. The little chip that stores some of your computer's most basic configuration.


Cache Chip - when your CPU feels like accessing a memory segment, it can either read it from the RAM chip(8) or from the cache chip.
The cache chip is much faster than the RAM chip, which usually has the speed of 66MHZ (at the time this tutorial was written).
The cache chip works this way:
A) Your CPU wants to access some kind of data which is not stored on your Hard Drive, on a CD, on a diskette etc' (read section 8 of the Newbies Corner first). Common sense says it should head to the RAM chip, right?
B) No, sir! First the CPU looks up that data on the cache chip. The cache chip is much faster than the RAM chip and it is located closer to the CPU, and it contains the most recent pieces of data the CPU retrieved from the RAM chip.
C) If the data was found on the cache chip, hurray! The CPU may now proceed with it's actions. Final outcome: the CPU saved a lot of time.
D) If the data was not found on the cache chip, the CPU will head off to the RAM chip. Final outcome: the CPU wasted very very little time.
Note: while your RAM can contain 32MB (MegaBytes), 64MB, 128MB (currently not present on any home PC) or 256MB (see 128MB), but the cache size will vary from 256K to 516K, when 1024K = 1MB (again, this info is relevant to the time this tutorial was written).
Note 2: if you played around a little with your Internet browser and found out that your browser has it's own cache memory, let me explain.
Your browser has what is called "Disk Cache" - it caches Internet files (HTML files, pictures etc') on your hard drive so next time you will access those files it will only have to check if there is a newer version of them, and if not it will load them from the cache. If there is a newer version of these files they will be redownloaded and the disk cache will be updated. It is possible to disable the disk cache or limit it to a specific space (Example: don't cache anymore than 30MB. Example2: don't cache at all).
Note 3: several Operating Systems have disk cache too, which is similar to your browser's disk cache (but has nothing to do with the net. Well, most of the time...).


URL - Universal Resource Locator - an Internet address.


RAM Chip - a chip that stores data which is not saved on your hard drive, CDs, diskettes etc' (temporary data used by programs and/or games).


Flames - the action of flaming someone (send him angry mail about things he has done, opinions he has etc' which you do not agree with).