AMAZON

Tuesday, December 29, 2009

What is WIMAX ?

What Is WiMax?

WiMAX is a wireless digital communications system, also known as IEEE 802.16, that is intended for wireless "metropolitan area networks". WiMAX can provide broadband wireless access (BWA) up to 30 miles (50 km) for fixed stations, and 3 - 10 miles (5 - 15 km) for mobile stations. In contrast, the WiFi/802.11 wireless local area network standard is limited in most cases to only 100 - 300 feet (30 - 100m).

With WiMAX, WiFi-like data rates are easily supported, but the issue of interference is lessened. WiMAX operates on both licensed and non-licensed frequencies, providing a regulated environment and viable economic model for wireless carriers.

WiMAX can be used for wireless networking in much the same way as the more common WiFi protocol. WiMAX is a second-generation protocol that allows for more efficient bandwidth use, interference avoidance, and is intended to allow higher data rates over longer distances.

The IEEE 802.16 standard defines the technical features of the communications protocol. The WiMAX Forum offers a means of testing manufacturer's equipment for compatibility, as well as an industry group dedicated to fostering the development and commercialization of the technology.

WiMax.com provides a focal point for consumers, service providers, manufacturers, analysts, and researchers who are interested in WiMAX technology, services, and products. Soon, WiMAX will be a very well recognized term to describe wireless Internet access throughout the world. lintasberita

Intel WIMAX/WIFI

Intel® WiMAX/WiFi Link 5350 and Intel® WiMAX/WiFi Link 5150





The Intel® WiMAX/WiFi Link 5350 and Intel® WiMAX/WiFi Link 5150 are the family of IEEE 802.16e and 802.11a/b/g/n wireless network adapter that operates in the 2.5GHz spectrum for WiMAX and 2.4GHz and 5.0GHz spectra for WiFi. This adapter delivers up to 13Mbps¹ downlink and 3Mbps¹ uplink over WiMAX and up to 450Mbps Tx/Rx² over WiFi. This integrated module embedded in new Intel® Centrino® 2 processor technology notebooks provides flexible and convenient connectivity to both WiFi and WiMAX networks to enhance today's mobile lifestyle.
Product information

Get ready for the mobile revolution with WiMAX. WiMAX delivers rich broadband connectivity over a wide area to allow you to work, play, and stay connected in more places.

*
Learn more
http://download.intel.com/network/connectivity/products/wireless/318987.pdf
File type/Size: PDF 1.40MB
*
Download Intel® WiMAX/WiFi Link 5350 Product Brief
http://download.intel.com/network/connectivity/products/wireless/320663.pdf
File type/Size: PDF 553KB
*
Download Intel® WiMAX/WiFi Link 5150 Product Brief
http://download.intel.com/network/connectivity/products/wireless/320663_5150.pdf
File type/Size: PDF 703KB
*
Mobilize Your Internet Overview
http://download.intel.com/network/connectivity/products/wireless/mobilize-your-internet.pdf
File type/Size: PDF 1.22MB

Features and benefits
WiMAX - Broadband Internet on the go
IEEE 802.16e-2005 Wave 2 compliant. Mobile WiMAX release 1 Wave 2 system profile ready

* Broadband connectivity for rich Internet experience while on the go with open standards based WiMAX networks

Over-the-air provisioning, management and upgrade support

* Activate and stay connected on broadband with minimal effort

Secure broadband connectivity

* Peace of mind with secure access to critical information and applications when you need it

USB power optimization

* Stay connected longer

Quality of Service and Optimized Handover Support

* Enjoy better voice quality while on the move

Intel® PROSet Wireless WiMAX Connection Utility v1.0

* Scan for and securely connect to WiMAX networks

Wi-Fi Performance
Intel® WiMAX/WiFi Link 5350

* Enjoy fast file transfers and step up your productivity with Up to 450 Mbps of Bandwidth²
* Business and Home users can effortlessly tackle today's voice, video, and data applications and be prepared for multimedia applications of the future
* Wirelessly backup your entire system to a Server
* Stream High Definition (HD) video throughout the Home with Bandwidth to spare for other applications

Intel® WiMAX/WiFi Link 5150

* Up to 300 Mbps of Receive Bandwidth° results in a 5x Bandwidth increase° compared to legacy 802.11a/b/g solutions

Multiple Input Multiple Output (MIMO) technology

* Provides higher data rates compared to 802.11a/b/g solutions through the use of multiple antennas to transmit and receive data
* Helps ensure more consistent coverage throughout the enterprise and home resulting in a more enjoyable user experience

Up to 2x greater range¹

* Enable better wireless reception for greater bandwidth at farther distances
* Reduce the number of "dead zones", dropped data packets, and network re-connects, helping to dramatically improve connectivity throughout the home

Industry-leading power consumptionΦ

* Reduced WLAN power consumption results in longer platform battery life for greater utility, enjoyment, and convenience

Dual-band, quad-mode solution (802.11a/b/g/n)

* Operates in the 2.4 GHz and 5.0 GHz band resulting in maximum compatibility with today's installed base of legacy 802.11a/b/g networks in the enterprise and in the home
* Connect with confidence to the Internet via the millions of Wi-Fi hotspots around the world

Wireless support for Intel® Active Management Technology§

* Provides IT managers the capability to remotely discover, heal, and protect laptops regardless of the functional state of the operating system
* Manage and troubleshoot laptops even in a standby or hibernate state resulting in reduced on-site support cost

Intel® PROSet/Wireless Software± v.12.0

* Feature-rich and easy to use application that supports legacy and 802.11a/b/g/n features on Microsoft Windows XP* and Microsoft Windows Vista*
* Simplifies client deployments and enables remote management of wireless settings and profiles

Advanced security via 802.11iΦ

* Increased security via support of the Advanced Encryption StandardΦ (AES) block cipher technology ensures that enterprise and home networks are protected from unauthorized access and intrusion

PCI, CISP

* Retail (Credit Card Processing)

FIPS, FISMA

* Government standards: Federal Information Processing Standard and Federal Information Security Management Act

Interoperability
Connect with Intel® Centrino® processor technology program

* Maximum compatibility is ensured when using a laptop based on Intel® Centrino® processor technology and 3rd party access points (sometimes known as wireless routers) that have the Connect with Intel® Centrino® processor technology validated to provide optimum performance for today's mobile lifestyle

Cisco Compatible Extensions* v.4

* Helps prevent delays in VoIP calls when roaming between access points
* Enables improved network diagnostics to aid in IT management and troubleshooting lintasberita

Wednesday, October 28, 2009

TILE-Gx Processor Family

TILE-Gx Processors Family

The TILE-Gx™ processor family processor brings 64-bit multicore computing to the next level, enabling a wide range of applications to achieve the highest performance in the market. This latest generation processor family features devices with 16 to 100 identical processor cores (tiles) interconnected with Tilera's iMesh™ on-chip network. Each tile consists of a complete, full featured processor as well as L1 & L2 cache and a non-blocking switch that connect the tiles into the mesh. As with all Tilera processors, each tile can independently run a full operating system, or, multiple tiles taken together can run a multiprocessing OS like SMP Linux.


The TILE-Gx family processor slashes board real estate requirements and system costs by integrating a complete set of memory and I/O controllers, therefore eliminating the need for an external north bridge or south bridge. TileDirect™ technology provides coherent I/O directly into the tile caches to deliver ultimate low-latency packet processing performance. Tilera's DDC™ (Dynamic Distributed Cache) system for fully coherent cache across the tile array enables scalable performance for threaded and shared memory applications.

The TILE-Gx processors are programmed in ANSI standard C and C++, enabling developers to leverage their existing software investment. Tiles can be grouped in clusters to apply the appropriate amount of horsepower to each application. Since multiple virtualized operating system instances can be run on the TILE-Gx simultaneously, it can replace multiple CPU and DSP subsystems for both the data plane and control plane.
Applications
Applications
Advanced Networking:

* Firewall & VPN
* Intrusion Detection & Prevention (IDS/IPS)
* Unified Threat Management (UTM)
* L4-7 deep packet inspection
* Network Monitoring & Forensics

Digital Video:

* Video transcoding/Transrating
* Videoconferencing MCU and endpoints
* Streaming IPTV and Video-on-Demand
* Video Post-Production processing

Wireless Infrastructure:

* Base Transceiver Station (BTS)
* Base Station Controllers (BSC)
* Wireless backbone gateways (GGSN, MGW )

Cloud Computing

* Web Applications (LAMP)
* Data caching (Memcached)
* Database Applications

Feature Enables

Massively Scalable Performance

• Array of 16 to 100 general-purpose processor cores (tiles)
• 64-bit VLIW processors with 64-bit instruction bundle
• 3-deep pipeline with up to 3 instructions per cycle
• 32K L1i cache, 32K L1d cache, 256K L2 cache per tile
• Up to 750 billion operations per second (BOPS)
• Up to 200 Tbps of on-chip mesh interconnect
• Over 500 Gbps memory bandwidth with four 64-bit DDR3 controllers


• 40 - 80 Gbps Snort® processing
• 40 - 80 Gbps nProbe
• H.264 HD video encode: dozens of streams of 1080p (baseline profile)
• 64+ channels of OFDM baseband receiver processing (wireless)

Power Efficiency


• 1.0 to 1.5GHz operating frequency
• 10 to 55W for typical applications
• Idle Tiles can be put into low-power sleep mode
• Power efficient inter tile communications


• Highest performance per watt
• Simple thermal management & power supply design
• Small System form factor
• Lowest operating cost

Integrated Solution


• Four DDR3 memory controllers with optional ECC
• Up to eight 10GbE XAUI interfaces; 2 Interlaken interfaces
• Three Gen2 PCIe interfaces, each selectable as endpoint or root complex
• Up to 32 GbE MAC interfaces
• Wire-speed mPIPE™ packet processing engine
• On-chip hardware encryption and compression(MiCA™)


• Reduces BOM cost - standard interfaces on-chip
• Dramatically reduced board real estate
• Up to 80 Gbps PCIe bandwidth
• Over 80 Gbps of packet I/O bandwidth
• Up to 40 Gbps VPN performance

Ease of Programming


• ANSI standard C / C++ compiler
• Advanced profiling and debugging designed for multicore programming
• Supports SMP Linux and virtualization
• TMC libraries for efficient inter-tile communication


• Run off-the-shelf C and C++ programs
• Leverage investment in existing code
• Standard multicore communication mechanisms
• Reduce debug and optimization time
• Faster time to production code




TILE-Gx100 TILE-Gx64 TILE-Gx36 TILE-Gx16
Number of Cores 100 64 36 16
Core Frequency 1.25, 1.5GHz 1.25, 1.5GHz 1.25, 1.5GHz 1, 1.25GHz
Network Interface 2x 40G Interlaken
8 XAUI, 32 SGMII 2x 40G Interlaken
6 XAUI, 24 SGMII --
4 XAUI, 16 SGMII --
1 XAUI, 12 SGMII
PCIe Two 8-lane
One 4-lane Two 8-lane
One 4-lane One 8-lane
Two 4-lane --
Three 4-lane
DDR3 Controllers 4 4 2 2
DDR3 Frequency 2133 MHz 1600 MHz 1600 MHz 1333 MHz
Package 45 x 45mm BGA 45 x 45mm BGA 35 x 35mm BGA 35 x 35mm BGA lintasberita

Wednesday, October 14, 2009

Remove Worm Vbs Cryf A Shemale by Cry

VBS/Cryf.A was created using visual basic scripting (not visual basic), first case happen on my cyber cafe on date 18 July 2009 it spreading from user flash disk and try to infected all PC in my network.

I’m not sure why so much Indonesian virus maker using lot of this VBS technique (maybe they know without msvbvm.dll VBS can executed on a lot target), Since I write about VBS article long long time ago (I forget maybe around year 2003-2005) in jasakom website with title “VBS sederhana yang berbahaya” many people has try to manipulate that simple code to become advanced code. Now I’m fell really stupid by share that Article to public…

How to know if you’re infected by this worm VBS/Cryf.A:

1.First time your computer turned on it will open web browser and show this pictures.



2. VBS/Cryf.A will change your web browser start page become:



3. There is folder “album bokep” (in Indonesian language this mean porn) in all folder.

4. VBS/Cryf.A will change your system properties become like this:



5. Change file type .lnk become “movie clip”



6. It will control your DVD/CD-rom by make it open and close to make you panic.

VBS/Cryf.A Master file:

VBS/Cryf.A has a master file called “drconfig.drv” with file size 218 KB, it already encrypted and little hard to read the code inside it.



On first time active it will called “svchost.vbs” then this vbs will executed this “drconfig.drv”. Then it will started created file list:

* %Drive%\Recycled\S-1-5-21-343818398-18970151121-842a92511246-500\Thumbs.db
o svchost.vbs
o desktop.ini
o drvconfg.drv
o SHELL32.dll
* %Systemroot%\windows
o appsys.exe
o Winupdt.scx
o appopen.scx
o Windowsopen.mht
o Windows.html
o Regedit.exe.lnk
o Help.htm
* %Systemroot%\Windows\system\svchost.exe
* %Systemroot%\WINDOWS\system32
o Svchost.dls
o Corelsetup.scx
o Appsys.dls
o Kernel32.dls
o Taskmgr.exe.lnk
* %Systemroot%\WINDOWS\system32\
o Winupdtsys.exe
o ssmarque.scr
* %Systemroot%\Program Files\FarStone\qbtask.exe
* %Systemroot%\Program Files\ACDsee\Launcher.exe
* %Systemroot%\Program Files\Common Files\NeroChkup.exe
* %Systemroot%\Program Files\ExeLauncher
* %ProgramFiles%\drivers\VGA\VGAdrv.lnk
* %Systemroot%\Documents and Settings\%user%\Desktop\Local Disk (C).dls

This virus will make some action to keep him stay in computers target:

* Disable Task Manager
* Disable Regedit
* Disable CMD (Command Prompt)
* Disable MSConfig
* Can’t change wallpapers

It will change your screensaver like this:



Spreading Technique and Social Technique:

VBS/Cryf.A spreading using 2 technique, One of them as like in my first Article using autorun.inf files, beside that this virus maker know how to using social technique to tricky mostly people out there using porn movie that actually virus.







This virus maker try to manipulate people with his another social technique, he will try to tell people their computers infected and give the removal tools, actually don’t open that website (www.dinamikasolusi.co.nr) this virus maker maybe using some technique as I write a long time ago by insert some virus into computer target using html code.





Enough, let’s started to remove this stupid Worm VBS/Cryf.A

HOW TO REMOVE WORM VBS/Cryf.A:

1. Kill active virus process in your background memory using currprocess, then kill all process with product name “Microsoft (r) Windows Script Host“



2. Block virus so it can not run for a while when we are in cleaning progress by:

Start -> Run -> Type “SECPOL.MSC” -> Click “software restriction policies” -> Click “additional rules” -> Right click on “additional rules” and choose “New Hash Rules”



In “File Hash” Click on Browse and choose which file you want to block (WSScript.exe) on “Security level” choose Disalllowed then click OK.




3. Fix registry by using this 3rd tools, download it from HERE…





* Shell Windows = explorer.exe
* UserInit Windows
o Windows NT/2000 = C:\WinNT\System32\userinit.exe,
o Windows XP/2003/Vista = C:\Windows\System32\userinit.exe,

4. Deleted Virus Master files and all files he’s created. To help you deleted it in easy way I recommended to use this tools ExplorerXP, Then deleted all files list bellow:

* %Drive%\Recycled\S-1-5-21-343818398-18970151121-842a92511246-500\Thumbs.db
o svchost.vbs
o desktop.ini
o drvconfg.drv
o SHELL32.dll
* %Drive%\Album BOKEP\Naughty America
* %systemroot%\windows
o appsys.exe
o Winupdt.scx
o appopen.scx
o Windowsopen.mht
o Windows.html
o Regedit.exe.lnk
o Help.htm
* %systemroot%\Windows\system\svchost.exe
* %systemroot%\WINDOWS\system32
o Taskmgr.exe.lnk
o CMD.exe.lnk
o Svchost.dls
o Corelsetup.scx
o Appsys.dls
o Kernel32.dls
o Winupdtsys.exe
o ssmarque.scr
* %systemroot%\Program Files\FarStone\qbtask.exe
* %systemroot%\Program Files\ACDsee\Launcher.exe
* %systemroot%\Program Files\Common Files\NeroChkup.exe
* %systemroot%\Program Files\ExeLauncher
* %ProgramFiles%\drivers\VGA\VGAdrv.lnk
* %systemroot%\Documents and Settings\%user%\Desktop\Local Disk (C).dls
* %Flash Disk%\Dataku Penting Jangan Dihapus.lnk

5. Showing back your files TaskMgr.exe, Regedt32.exe, Regedit.exe, CMD.exe, and Logoff.exe that hidden by virus:



*repeated on all files you want to shown back.

6. For maximum cleaning I recommended to scan using your best antivirus programs, in my case Norman antivirus can deleted all of this virus part.

7. When all step done and no virus found, deleted blocking rules we made:

Start -> Run -> Type SECPOL.MSC -> Click “Software Restriction Policies” -> Click “Additional Rules” -> Then Deleted Rules we have made.



8. Restart your computer then re-scanned again to make sure there is no left part of worm VBS/Cryf.A, then use updated antivirus to prevent it coming back again.

Have a nice day, GBU :D lintasberita

Friday, September 25, 2009

Avira AntiVir Premium 8.1.00.331

Avira AntiVir Premium 8.1.00.331

Avira AntiVir Premium enhances the comprehensive protection of the Avira AntiVir Personal - Free Antivirus with important security and configuration functions and protects you against viruses, worms, Trojans, ad/spyware, dialers, bots and dangerous drive-by downloads.

Premium functions:
- Low system resources used;
- Control Center for monitoring, administering and controlling the entire program;
- Central configuration with user-friendly standard and advanced options and ontext-sensitive help;
- Scanner (On-Demand Scan) with profile-controlled and configurable search for all known types of virus and malware;
- Guard (On-Access Scan) for continuous monitoring of all file access attempts;
- MailGuard (POP3- and SMTP-Scanner) for the permanent checking of emails for
viruses and malware. Checking of email attachments is included;
- Exclusive download server for faster updates;
- User-defined update intervals;
- Phishing and Rootkit Protection.

NEW: Version 8 offers:
- An enhanced interface graphical interface,
- A modularized AV-search engine for improved scan performance,
- An integrated failsafe security system, and SMTP support for AntiVir MailGuard,
- NEW modules: WebGuard and Rescue System.

Download:
Code:
http://rapidshare.com/files/125867033/Avira_AntiVir_Premium_8.1.00.331.www.legendaryhackerz.com.rar

pass:
Code:
http://www.legendaryhackerz.com lintasberita

Spyware Doctor 6.0 Final

Spyware Doctor 6.0 Final


[Image: g33agydbxjfiq25gef0v.jpg]

Spyware Doctor Tools:
- Spyware & Adware Scanner Keylogger
- Guard Popup
- Blocker Phishing
- Protector Real Time
- Protection Browser
- Guard Spyware Cookie
- Guard Malware
- Immunizer

Spyware Doctor Key Features:
• Comprehensive Malware Protection
Spyware Doctor provides protection against identity theft, stealthy spyware, aggressive adware, browser hijackers, malicious ActiveX objects, malware Trojans, tracking cookies, keyloggers, dialers, and other malware. The optional anti-virus module also protects your computer from viruses, worms, Trojan horse threats, and other malicious infections.
• Constant Real-time Protection
Through its unique OnGuard feature Spyware Doctor provides constant protection against malware. OnGuard works by blocking both known and unknown malware threats before they can install and cause any harm to a computer. OnGuard constantly monitors for malicious behavior involving spyware processes, tracking cookies, malicious ActiveX objects, browser hijackers, keyloggers, Trojans and more.
• Advanced Detection and Removal Technology
- By running an Intelli-Scan™, Full Scan or Custom Scan, Spyware Doctor will inspect the computer for all types of spyware and virus1 infections. Spyware Doctor is top rated by industry experts as being extremely effective in removing particularly nefarious threats such as rootkits and keyloggers2.
- The unique Intelli-Scan™ feature is specifically designed to hunt swiftly and kill active running spyware threats in as little as 3 minutes3, attributed to the intuitive and patent-pending spider scanning technology. This new technology works intelligently by using a combination of signature and behavioral scanning techniques to quickly and effectively identify internet threats.
• Protection against zero-day threats - Behavioral Heuristic Detection
Spyware Doctor delivers effective zero day protection against rootkits and keyloggers (in both scanning and OnGuard real-time areas) by monitoring for suspicious behavior and blocking applications that exhibit signs of malicious activity.
• Advanced Rootkit Detection
Spyware Doctor is capable of detecting and removing hidden processes and files associated with complex threats and rootkits. Using behavioral techniques, rootkits and other items that attempt to hide themselves deep in the computer operating system are effectively detected and removed.
• Works silently in the background with low CPU usage
When in monitoring mode Spyware Doctor has been designed to work silently in the background, with little impact to the end user, threats are blocked and removed without any system impact, while only a small alert window is displayed to advise the user it has been protected against an attack. When running a scan, the CPU Priority settings allow users to lower the priority of the scanning in order to reduce CPU usage and impact to the computer while in use. Selecting this option may increase scan time but will ease CPU usage when other applications are running at the same time.
• Automatic and silent Smart Updates
Frequent updates to detect and guard computers against new threats and viruses as well as provide enhancements to Spyware Doctor are automatically installed and downloaded through the Smart Update function. Threat signatures are updated every business day or within hours of a high risk malware outbreak to protect you from the latest online threats.
• Most internationally awarded anti-spyware product
Spyware Doctor is consistently awarded editors choice and top rating by numerous internationally recognized and respected industry publications, making Spyware Doctor the most internationally awarded anti-spyware product.

Additional Add-ons:
• Virus Protection
Available as an optional add-on to Spyware Doctor, the anti-virus component provides protection against all kinds of viruses, worms, Trojan horse threats, and other malicious infections to ensure complete protection against internet threats. It is recommended to install the anti-virus add-on if there is no other virus protection on the computer.
• Email Protection
Email Guard provides protection against, and instantly removes, spyware and viruses being sent or received via e-mails. All popular e-mail applications (such as Outlook Express™ & Netscape® Mail and Thunderbird) that use POP, IMAP or SMTP are supported by Email Guard.
• Internet Browsing Protection
Site Guard provides advanced protection against potential malicious websites and phishing attacks where dangerous site are masquerading as legitimate e-Commerce sites. Site Guard will detect malicious websites and block access to them, ensuring the computer cannot be infected.
Designed for Windows® Vista™ 32-bit, XP and 2000.

What's New in Spyware Doctor 6.0 :
• Latest protection from unknown threats
- Spyware Doctor now has Behavior Guard, providing you with the latest pro-active behavioral-based technology against zero-day (never seen before) threats. Built on the award-winning ThreatFire technology, Behavior Guard has been seamlessly incorporated into Spyware Doctor to offer you leading protection. This new technology protects you when some anti-virus products give up! Read more about behavior-based protection.
• Improved detection capabilities:
- Spyware Doctor has been enhanced to improve detection effectiveness. In particular, each individual signature created in the threat database is optimized so that it is capable of detecting multiple variations of malware threats (threat variants) while maintaining minimal system resource usage (memory footprint).
• Swift clean-up for heavily infected computers:
- Spyware Doctor is able to detect and remove threats on heavily infected computers faster and easier than ever before. Sometimes your computer is so highly infected that you may find yourself unable to install or run security software except when in the ‘safe mode’ of Windows.
- In these cases, malware consumes computer resources so resulting in lengthy scanning and removal times. is now armed with the technology to scan in safe mode faster and more effectively by forcing your computer to take a higher priority over the scan than the malware and other software attempting to run on your system.
• Improved Hacker Defense :
- Further improvements have been included to enhance our own defense against malware threats attempting to interfere with the effectiveness of Spyware Doctor . Our hacker defense system means you can rest assured that your computer system has the most comprehensive protection while ensuring that malware threats don’t impede on the functionality or effectiveness of Spyware Doctor.
- The new hacker defense utilizes a particular feature available in Windows Vista (known as ASLR) to make it difficult for hackers to exploit or gain control over Spyware Doctor .
• Other enhancements:
o Support for Windows Security Centre in Windows Vista Service Pack 1
o The real-time protection module is now referred to as Intelli Guard®
o Enhanced error reporting to assist with diagnosis of program crashes (hackers!).

Download | 15012 KB
Code:
http://rapidshare.com/files/124461078/Spyware_Doctor_6.0.0.354_updatable.rar lintasberita

BitDefender Antivirus 2009

BitDefender Antivirus 2009 Build 12.0.10 Final(32Bit)

[Image: lqsi2q0z3immmt8d1h60.jpg]

A professional antivirus program including security features
BitDefender Antivirus 2009 was designed to be provide advanced proactive protection against viruses, spyware, phishing attacks and identity theft, without slowing down your PC.

BitDefender AntiVirus 2009 - Superior Proactive Protection from Viruses, Spyware, and other e-Threatsthat wont slow you down!
BitDefender provides security solutions to satisfy the protection requirements of today's computing environment, delivering effective threat management to home and corporate users. BitDefender Antivirus is a powerful antivirus and antispyware tool with features that best meet your security needs. Ease of use and automatic updates make BitDefender Antivirus an install and forgetproduct.

BitDefender a global provider of award-winning antivirus software and data security solutions, has launched BitDefender 2009 its new line of security solutions providing state-of-the-art proactive protection from todays most damaging viruses, spyware, hackers, spam, phishing attacks, and other common Internet security threats.


Features:


· Confidently download, share and open files from friends, family, co-workers and even total strangers!
Improved: Scans all web, e-mail and instant messaging traffic for viruses and spyware, in real-time
Proactively protects against new virus outbreaks using advanced heuristics

· Protect your identity: shop, bank, listen, watch privately and securely
Blocks attempted identity theft (phishing)
Improved: Prevents personal information from leaking via e-mail, web or instant messaging

· Guard your conversations with top-of-the line encryption
Instant Messaging Encryption

· Play safe, play seamlessly!

Improved: Reduces the system load and avoids requesting user interaction during games

· Get fine-tuned performance from your computer !
Uses few system resources
Laptop mode prolongs battery life
Improved: Scans all web, e-mail and instant messaging traffic for viruses and spyware, in real-time
Proactively protects against new virus outbreaks using advanced heuristics

· Family network protection
Manage the security of your home network from a single location. BitDefender software from other computers in the network can be remotely configured, while tasks such as scans, backups tune-ups and updates can be run on-demand or scheduled to run during off-hours.

· Hassle Free Hourly Updates
Hourly updates ensure that you are protected against the latest threats without pushing a button. Lost program files are not a problem either. In the rare event of file damage due to PC problems, BitDefender automatically repairs and updates itself.

Download | 53859 KB
Code:
http://rapidshare.com/files/139859604/BitDefender_12.0.10_ByMechoDownload.rar
pass: mechodownload lintasberita

Friday, September 11, 2009

How To Clean An Infected Computer

How To Clean An Infected Computer....


Cleaning an infected computer today has become harder than ever. To effectively clean your system you must first learn a little about what you are trying to get rid of and what tools you need to get the job done. I'm going to try to give you some of the background, followed by the basics of getting rid of these pests.

Today there are a variety of things that can infect your computer such as viruses, worms, trojans and spyware. I refer to all of them as malware since that word seems to best describe them and covers both viral and spyware related issues. I find it best to use a multi-pronged approach to fighting malware, so I use several software programs to find and get rid of them. Hopefully, by giving you a little of the background, you will be able to learn what tools to use and when to use them so that you may clean your computer of the malware you may encounter.

Viruses were the first computer bugs, and anti-virus (AV) software was made specifically to detect and get rid of these. Worms are a little different than viruses, which is one reason why AV software has had a harder time catching them. Next came trojan horses, usually just called trojans. These are very different than both viruses and worms. They actually take advantage of the weaknesses that are inherent in AV software. For one, most trojans actually try to hide from being detected by AV software. They also work "smarter" by creating hidden copies of themselves so that when they do get detected and cleaned, they can re-infect the computer with the hidden copy right after the AV software cleans the original infection. Basically, trojans are AV software's worst nightmare simply because AV software wasn't designed to specifically go after this type of threat. Today, AV software is much better at detecting all types of malware. With the release of AVG 8.x.xxx... it now combines both an antivirus with an antispyware scan to help users fight both viral and spyware related issues.

Spyware isn't a new breed of malware. It is simply a combination of various computer exploits and they utilize various combinations of scripts, trojans and worms. Currently they take advantage of trojans the most since they are harder to detect and clean properly. Anti-spyware (AS) software was created specifically for detecting and cleaning this type of malware, so when it comes to trojans and some worms, AS or a combined AV/AS software is much better equipped to fight these than the AV only types of software such as the earlier versions of AVG.

A new varient of spyware is the Rogue type of malware software. This type of software pretends to be useful utils like antispyware, antivirus, hard drive and/or registry cleaning utilities but really their only goal is to sell you their useless software or to install other spyware onto your system. They do this by falsely stating you are infected by something or have other issues that could affect the performance of your system. They usually are installed using the "drive by installation" method that happens when you may visit various malicious websites, often installing without your knowledge.

There is also another type of detection that AVG and most good AS softwares will detect and they are only detected because of their potential security risk if a user was unaware of their existance. AVG calls this type of software Potentially Unwanted Programs ( PUPs )... others may refer to them as hacktools, riskware, or simply "not-a-virus". These are normally very useful utilities.. but since they can also be used for harm, AVG and other utils will detect them so the user is aware of their existance. Examples of these are utilities to recover forgotten passwords, forgotten software keys ( like the Windows install key ), IP scanners, remote control software and a variety of similar utils. If you have any of these installed or on your system, you will want to exclude them from detection with whichever utility you are scanning for malware with... or at the very least do not have them removed when you are cleaning the system up. Remember that these are not malware and do not do damage to your system BUT if you are unaware of their existance, it could be a sign that a hacker may have placed them on your system to do harm. A quick rule of thumb, if you are aware of their existance leave them on your system... if not quarantine them and check out what they really are later.

I suppose I should also cover one last subject before moving on to the cleanup steps... Tracking Cookies. AVG as well as most antispyware utils do detect these and each has a specific but different list of the ones they will find. These ARE NOT MALWARE.. they can do no harm or damage to your system. They do however represent a potential invasion of your privacy since they can be used to track your internet browsing habits. So unless you have setup your browser to block them or use a specialized utility to do that... you will always find these detected. So do not be alarmed by their presence.. clear them if you want ( I always clear mine )... but also understand that they will likely return the next time you happen to visit a website that may use them.

First, you will need to get some software programs to help you. The following programs are what I use personally. Not only do I trust them, but they are also free for personal use. The companies that provide the free software, also provide software that they sell for use in a commercial environment. Usually, the free versions are just as good but simply don't have as many of the extra features which make the commercial versions even more attractive to use.

Anti-Spyware Software

For Windows 98 & later

• Spybot S&D - You can find it at [www.spybot.info] Latest version is v1.6.2.46

( NOTE: When installing Spybot, I recommend that you disable the option for TeaTimer which is enabled by default so it doesn't affect your cleaning efforts. If you wish you can enable it later but do so only after you finish cleaning the system. )

For Windows 2000, Windows NT, Windows XP & Vista only

• MalwareByte's Anti-Malware - You can find it at [www.malwarebytes.org] Latest version is v1.34

Anti-Virus Software

For Windows 2000, Windows XP (inc. 64bit version) & Vista (inc. 64bit version)

• AVG Technologies Free Edition - You can find it at [free.grisoft.com] - English version, [gratis.avg.it] - Italian version, [free.avg.de] - German version, [gratuit.avg.fr] - French version, [free.avg.com] - Japanese version, [free.avg.com] - Brazilian Portuguese version, [free.avg.com] - Dutch version, [free.avg.com] - Latin America Spanish version, [free.avg.com] - Polish version, [free.avg.es] - Spanish version, [free.avg.com] - Portuguese version, [free.avg.cz] - Czech version, [www.avg.com.tr] - Turkish version, [www.avg.in] - Indian (English) version, [www.avgkorea.com] - Korean version & [www.avgtaiwan.com] - Taiwanese version Latest version is v8.5.387

First you will want to download each of the above programs and then install them. After you install them, you MUST update them so you will have the latest protection. If you don't update these programs and you are infected with the latest parasites, you will not be able to effectively detect and clean them from your computer, so remember to update, update, update. Most if not all of the definition files for these utils are now updated daily.

Now that you have downloaded, installed and updated all of the above utils... Print this article so you can refer to it later and disconnect your computer from the internet. This is an important step and will remove one way that a malware may use to re-infect your computer.

With the release of AVG 8.x now combining both antivirus and antispyware into one product, I have now switched from scanning with it last, to scanning with it first since it now detects more malware than any of the others. I also use the different AS software packages in a specific order so that I go after the tougher problems first and the easiest ones last.

Turn off System Restore

• WinME and WinXP have a cool feature called System Restore. It is used to restore your computer to an earlier configuration in case of a problem. The only problem is that it wasn't made with malware in mind, and often it can't tell the difference between an infected file and a good file, so it can as easily restore an infected file if it had been in a protected area, effectively re-infecting your computer right after you have cleaned it. Because of this, it is recommended to turn off System Restore before you test, and when you're done, turn it back on so you are still protected from standard computer problems.

• For WindowsME

Click Start, Settings, and then click Control Panel.
Double-click the System icon. The System Properties dialog box appears.

NOTE: If the System icon is not visible, click "View all Control Panel options" to display it.

Click the Performance tab, and then click File System.
Click the Troubleshooting tab, and then check Disable System Restore.
Click OK. Click Yes, when you are prompted to restart Windows.

• For WindowsXP

Click Start.
Right-click the My Computer icon, and then click Properties.
Click the System Restore tab.
Check "Turn off System Restore" or "Turn off System Restore on all drives."
Click Apply.
When turning off System Restore, the existing restore points will be deleted. Click Yes to do this.
Click OK.

• For Win Vista

1. Open System by clicking the Start button , clicking Control Panel, clicking System and Maintenance, and then clicking System.
2. In the left pane, click System Protection. If you are prompted for an administrator password or confirmation, type the password or provide confirmation.
3. To turn on System Protection for a hard disk, select the check box next to the disk, and then click OK.


Carefully Look at Windows Add/Remove programs for suspicious programs

• Many of the spyware threats actually install into your system just like a regular program. Many may appear to be utilities that you may think are helpful but in reality aren't. Look for add-an toolbars, while toolbars like those provided by Google, MSN, Yahoo and other are great utils, there are many more that aren't and if in doubt check it out to see if ones you have are parasitic. Another common exploit are the Search helpers, WinTools, Gator products, IE Helper, Comet Cursor and many others just to name a very few. Peer-to-Peer (P2P) programs are another common source for these and even the ones that doen't come with spyware themselves are a high security risk that may lead to your system being infected or to spread infections like these. Remove all suspicious programs, if you accidentaly remove the wrong item, you may always re-install them later.

Run Disk Clean-Up

• This actually comes with Windows and has been installed by default since Windows 98. You can find it by clicking the Start Button and then going to Programs / Accessories / System Tools / Disk Clean-up. I recommend selecting all of its options except the ones for Office Setup Files and Compress Old Files if you have them. While you may select those if you wish, they aren't as important. This will clean up all of the temporary files so your testing will go faster, and may also delete any spyware that may hiding there if the spyware isn't already running. To clear systems that have System Restore you will need to select the second tab and click the button for clearing this.

Run AVG 8.x.xxx

• Most antivirus programs, including AVG, by default have their settings to only scan executable files in an attempt to speed up looking for infections. While most of the time this is just fine, the newest threats that can infect your computer have started getting sneaky on how they hide their files making it easier for them to reinfect your system if your antivirus program detected and removed their executable file. To help also detect these "backup" files that the infection leaves on your system, you should in my opinion, make a couple of changes to what your AVG scans during these tests from just executable files to all files.

• To change AVG's settings during a scan, open AVG's User Interface.
Click the Computer scanner tab, then under the Scan whole computer area, select Change scan settings. Unselect Scan infectable files only and select all other checkmarks with the Automatically heal/remove infections and Scan for Tracking Cookies as options I'll let you decide if you want enabled or not.

• Now AVG will scan all of the files when you scan your computer. This will take longer to complete, but I feel it is a small price to pay for the added security it provides.

Run MalwareByte's Anti-Malware

• Select to perform a Full Scan and then click the Scan button. This is another specialized util that not only targets Rogue spyware but other malware as well. This currently targets malware and rogues from 931+ vendors ( the malware authors ). The malware that is targeted in this category is very actively being updated by their authors because of the potential they have for making money. As with all antispyware utils, update this often and before each use to help give you the edge in fighting these malware.

Run Spybot Search and Destroy

• When you run it, it will automatically select all the spyware that it finds, if there is something you don't want to get rid of for some reason, deselect it and then let Spybot fix all of the rest of the problems that it finds. This program also will ask to restart your computer so it can test again if it has problems removing something, so let it.

• Run the scans again in Safe Mode. This will keep many of the parasites from loading and being able to hide from your protection software. To access Safe Mode on most versions of Windows, start tapping the [F8] key after you first start or restart your system, start tapping it before you ever see a Windows Splash Screen and continue until you get the Menu where you may select it from the list. On WinNT, this is called VGA mode and on Win2k you actually start tapping just after the first splash screen shows. For Detailed instructions see Restarting Your Computer in Safe Mode

These procedures should have cleaned most cases of infection that you will find. Yes I said MOST because there are some infections that are very hard to detect and remove. Generally, if you have one of these, you will need the assistance of an expert to help you get rid of it.

When you believe you are finished, remember to turn System Restore back on if you had turned it off.

I recommend testing for parasites as often as you can, probably at least once a month if not more. The sooner you catch them, the less damage they can do to your computer, and the less chance of a hacker finding your sensitive information such as checking account info, passwords, etc.

Windows Tip

Windows itself, by default, hides certain files, system folders or file extentions from the user to make it easier to navigate. If you are having to find an infected file or just one you are looking for, this can cause you to not find it. If you wish you may change this to show all of the files on your computer.

Open your My Computer icon (Either from your desktop or the Start Menu)
Click the Tools menu and select Folder Options(on older systems it may be in the View menu)
Select the View tab and scroll through the Advanced settings
Enable or disable the following (using a checkmark to enable)

enable - Show hidden files and folders
disable - Hide extentions for known file types
disable - Hide protected operating system files (WinME and WinXP only)

Now click Apply and Ok

For Win Vista info. see this link [www.howtogeek.com].

How to find an embedded infection

AVG 8 Free now detects infections in areas that it was unable to before. The most notable are ones embedded inside of archives. Since AVG can't determine if you created the archive or if it was a parasite that created it, they leave these alone so you may have a chance to recover uninfected files from the archive and then you simply delete the archive when done. Infections that are inside of an archive aren't a direct threat to your system unless the file gets extracted to allow it to run. Grisoft has chose this method because it is safer for your data that the archive may contain.

For someone that is new to looking for these embedded infections, it can be a little confusing with the way that AVG will list the file because it also must include the archive file name that contains it in the full path/filename. The following is an example that I made up to highlight the info so you will know which filename to look for so you may either extract files and or delete the correct file. I will color code these for you, but AVG will not.

AVG will give you a name like...

C:\Windows\Temp\InfectedArchive.cab:\InfectedFile.exe

The location of the file is in C:\Windows\Temp
The archive that contains the infection is InfectedArchive.cab
And the actual infected file inside of the archive is InfectedFile.exe

Note the ":\" that seperates the archive from the file it contains.
After you have recovered any files inside of the archive that you may want to keep (other than the infected one that is) just simple delete the whole archive.. in this example the file to delete would be InfectedArchive.cab

It looks harder than it really is.. just remember the file you want to look for is named just before the last ":\"

Most of the time, you won't have any files to recover inside of the archives. The only time this isn't true is if it is an archive that you had created yourself. If you didn't create it.. just delete and move on. lintasberita

Tuesday, September 8, 2009

Anti Virus Smadav

Keep Care Your PC with Smadav 6.3 | Update Smadav
Joe Engressia, Tuesday, September 8, 2009

smadavlogo.jpgDownload Anti Virus Smadav Rev 6.3 September 2009

This is the awaited, SmadAV Rev 6.3 2009 For those who have not already and download previous Anti virus SmadAV Rev 6 2009. Smadav parties have done some bug fixes & false alarm on the revision this time. When you find a bug or LOCAL NEW VIRUS that has not been detected Smadav Rev 6 2009, please report them immediately on this site www.smadav.net. So, for ALL USERS SMADAV recommended the ROUTINE / EVERY DAY visit to this site to download the latest revision Smadav Rev 6.3 2009.


Included in Smadav rev 6.3 2009 Engine :

Eradicating more than 100 last local virus on Agustus 2009
The Viruses are album bokep, yuyun, fullhouse, sandra dewi, mbah surip, etc.
Scanner
Super Fast and became the fastest in the WORLD (Can be your own).
Smart Protection
It has smart protection that is better than smadav Rev 6
Registry Cleaner
Smadav Rev 6.3 2009 has supported Windows Vista
Cleaner
Not only remove but also Clearing (Heal) document from the virus.
Protector
Protect your computer from virus attacks at any time, you will feel safe.
Update
now, You can update via Internet or off line as well as AVG, Avira.
Intelligence
A Smadav like "The Virus Exterminator" is on your computer.
Portable
Smadav can be used in Windows ME/2000/NT/XP/Vista. No need to install.
SmadLock Flashdisk
Once locked with Smadav, Your USB flash will be safe to go everywhere without fear of virus infection. Features the latest in the WORLD

Related Link to Download Smadav :

* Download Smadav 6.3 2009
http://www.smadav.net/smadav63.zip

* Download The Last Update Smadav 2009
http://tolearnfree.blogspot.com/search/label/Anti Virus lintasberita

Clean Virus With Avast

avast! Virus Cleaner - free virus removal tool

avast! Virus Cleaner is available free for every user. This tool will help you remove selected worm infections from your computer.
Free virus & worm removal tool

If, despite all the security measures you take, your computer gets infected by a virus or worm, it is necessary to disinfect your system somehow. While for some viruses the only 100% reliable method of disinfection is restoring your system from backups, for many common infections this is not really necessary and the virus/worm can be removed quite easily.

Removing the infection
The worms often schedule themselves to be run automatically when you start your operating system; some of them even register themselves to be run when any other application is started. Removing such a worm is not as simple as deleting it - when you just delete the worm file, your operating system might not be able to start your applications (such as Explorer) any more.

So, in order to properly remove the worm from your computer, it is often necessary to make additional fixes in your system registry, delete the links from your Startup Folder etc. Here the avast! Virus Cleaner comes - it will find and remove selected worms from your computer, as well as fix the registry and startup items to make sure your system will work correctly after the disinfection.

Many worms - when activated - create additional working files on your hard disk. Even though these files alone are harmless, they are useless and they should not be there. When avast! Virus Cleaner detects and removes a known worm from your computer, its working/temporary files are removed as well. The same applies for worm-specific registry entries etc.

List of known worms
avast! Virus Cleaner is currently (in version 1.0.211) able to identify and remove the following worm families:

* Win32:Badtrans [Wrm]
* Win32:Beagle [Wrm] (aka Bagle), variants A-Z, AA-AH
* Win32:Blaster [Wrm] (aka Lovsan), variants A-I
* Win32:BugBear [Wrm], including B-I variants
* Win32:Ganda [Wrm]
* Win32:Klez [Wrm], all variants (including variants of Win32:Elkern)
* Win32:MiMail [Wrm], variants A, C, E, I-N, Q, S-V
* Win32:Mydoom [Wrm] (variants A, B, D, F-N - including the trojan horse)
* Win32:Nachi [Wrm] (aka Welchia, variants A-L)
* Win32:NetSky [Wrm] (aka Moodown, variants A-Z, AA-AD)
* Win32:Nimda [Wrm]
* Win32:Opas [Wrm] (aka Opasoft, Opaserv)
* Win32:Parite (aka Pinfi), variants A-C
* Win32:Sasser [Wrm] (variants A-G)
* Win32:Scold [Wrm]
* Win32:Sinowal [Trj] - variants AA, AB
* Win32:Sircam [Wrm]
* Win32:Sober [Wrm], variants A-I, J-K
* Win32:Sobig [Wrm], including variants B-F
* Win32:Swen [Wrm], including UPX-packed variants
* Win32:Tenga
* Win32:Yaha [Wrm] (aka Lentin), all variants
* Win32:Zafi [Wrm] (variants A-D)

Disinfection process in detail
By default, avast! Virus Cleaner does all the work automatically. When you start it and press the "Start scanning" button, the following will be done:

1. The operating system memory will be scanned, and if any known worm is found, the worm process is terminated - thus avoiding further spreading. If it is not possible to terminate the worm process (it could happen e.g. with Nimda worm that uses a fake library to run inside other processes), the worm will be deactivated in memory to stop its spreading.
2. Your local hard disks will be scanned.
3. The "startup items" (such as the system registry, Startup Folder(s), etc.) will be scanned. References to worms found in memory or on disk will be removed or fixed.
4. Infected files, identified in point 2, will be removed or fixed (as needed).
5. Additional working/temporary files created by the identified worms will be removed.
6. If restarting the computer is needed to finish the disinfection process (e.g. when a file could not be removed because it was currently in use, or if the deactivated worm process is still present), the user is notified and asked whether the restart should be done immediately.

avast! Virus Cleaner - Main Window

For experienced users, various command-line arguments can be used to customize the program behavior. The list of command-line arguments will be displayed when started with /? parameter. Note: the command-line arguments are intended for experienced users only! Changing the default parameters may result in incomplete disinfection that may render your operating system nonfunctional, as noted above.

Important notes

1. During the scanning process, it is highly recommended not to start any applications. As already pointed out, some worms will start automatically when any other application is started. Running worm processes are terminated/deactivated only during the first phase of the avast! Virus Cleaner scanning; if you activate the worm again in the middle of the scanning process (by starting another application, such as Notepad, Explorer, ...), the worm will probably not be removed from your computer!
2. Turn off any resident (on-access) antivirus protection before running avast! Virus Cleaner. avast! Virus Cleaner has to access the infected files to be able to identify and remove them. The resident protection, however, might not permit it - and the worm could not be removed from your computer! Do not forget to activate the resident protection again after avast! Virus Cleaner has finished the disinfection.
3. avast! Virus Cleaner should be used in case you know or suspect that your computer is infected. It is not meant as an antivirus solution for everyday use! Use e.g. avast! 4 Home/Professional to protect your computer.
4. To work correctly, the Cleaner requires administrator privileges when running on Windows NT/2000/XP/2003 operating systems. On an infected computer, however, it might not be wise to log in as a privileged user (administrator) - it may help the worm to spread even further. Therefore, you can start avast! Cleaner as a restricted user and enter the administrator login name and password directly into an avast! Virus Cleaner dialog; in such a case, the Cleaner will be run with the privileged user access rights - however, the privileged user will not be actually logged on, and none of his/her startup files will be processed.

Solving other problems
If you have deleted a virus or worm file associated to a vital file type - and now you cannot run your applications anymore, avast! Virus Cleaner may help you as well. All you have to do is run avast! Virus Cleaner "somehow". If, for example, only the association for .EXE files has been corrupted, you may run the avast! Virus Cleaner by renaming it to a .COM file. The other extensions you may try are .SCR, .BAT, .PIF (on Windows NT/2000/XP/2003, you may try .CMD as well). If none of these extensions works (Windows is still reporting "Cannot find 'xyz.exe'" when you try to start the tool), you can use avast! Virus Cleaner itself as a replacement for the missing file. However, you have to know the name of the missing file to do that; if you know it, just rename the avast! Virus Cleaner file to the missing name (and move it to the corresponding folder, if necessary). Now, starting any application should bring up avast! Virus Cleaner instead. As soon as it starts, it detects that some of the vital file associations are corrupted, reports the problem and allows you to fix it immediately.
avast! Virus Cleaner Free Download
http://www.avast.com/eng/down_cleaner.html

Please download the free avast! Virus Cleaner tool from this page.
The latest version is 1.0.211, built on 11.5.2007. lintasberita

Thursday, August 20, 2009

Make Money Online

How to Make Money Online

Welcome to one of the few “make money online” websites that actually encourages you to slow down and plan out your online journey.

The goal of this website is to explain exactly how to make money online, and how you can earn money by just signing up and reviewing products. I’ll be talking about the two ways I’ve earned money online — no theory, just actual instructions. Specifically, I’ll teach you how to:

* Make Money Fast With Project Payday.

* Build a Money-Making Website.

No, you don’t have to be a computer genius or have vast technical knowledge. If you have email, then you have the “technical” skills required to make money online — you don’t have to be a “geek” to earn money on the Internet. Plus, I’ve made it easier by writing completely free instructions guiding you every step of the way.

Quick-Start Guide to Making Money Online

Though there are thousands of websites dealing with earning money online, there are really only 2 ways to make money online that I endorse. If you want a small amount of money quickly, go with the first method. If you want a long-term full-time income, go with the second method.

Method 1: Project Payday

If your goal is to make a few hundred in a relatively short time-frame, then trying to make money fast is your best bet, which is why I’ve partnered with them to help you build an instant income. In an economy like what we’re seeing now, businesses are simply dying to get new customers.

They’re so desperate to advertise that they’re willing to give you an “incentive” just to check out their offers. Most of these websites are slanted in the business’ favor. However, there are a few websites that are now offering you free incentives. You sign up, you DON’T pay anything, and you can make a few hundred dollars.

Project Payday is a great example of this — and it’s free. You won’t get rich, but you can make $2,500 or so per month if you’re willing to check out the products. Again, it’s free — don’t pay any website to do this, considering you can sign up to Project Payday for free.

Note: if you do what they say and you can’t make money, let them know. They’ll give you $100 free as a guarantee.

Method 2: Build a Website Business

That said, out of the thousands of “online opportunities” out there, the best way to make money online is with your own website. This is how I earn my income online. This, however, isn’t good if you need quick money, or want to get rich quick. Building a website takes a ton of planning, a ton of work, and a ton of time.

It can take up to a year before you see a full-time income. It took me about 6 months. But it’s also a passive income.

I can stop working right now and go to the pool, but my websites will all still be up and earning an income from advertisements — my business makes money without me now. That’s the biggest pull. To learn more about building a website, read to the end of this page, or check out my 1o-step website plan.
How to Pick and Choose a Program

When it comes to picking out a way to make money, remember that you’re trying to make money, not spend money. In other words, only pick a project that guarantees that you’ll make money, and is free to sign up. Otherwise, make very, very sure you trust a program before giving them a red cent.

Thousands have learned this the hard way.

Don’t be a statistic. Sign up to learn more about a project before you spend money — if you ever do. Become acquainted with other similar programs before making a decision.

Check out free programs like Project Payday before “paid” programs. Ten minutes of research can save you hours of headache, and let you choose the right program so you can actually make money rather than get burned.
Making Money Online With a Website

The vast majority of this website is about starting your own website. The reason is simple: it’s the best way to make money online. Anyone can do it, it’s a passive income, and you can get started instantly. It’s not a job; it’s a business.

There are a lot of myths about websites, blogging and making money online in general. Check out my article How Websites Make Money Online to learn more about how websites actually make money.
Who Can Make Money Online?

Absolutely anyone can make money online. It’s an old myth that you have to be a “computer geek” to own a website, or have to be a genius to make money with a free program like Project Payday. Those days are over. If you can do email, then you can set up your own website.

That said, making money online with a website isn’t for everyone. You have to be willing to look ahead, make plans, and work hard. If you just want to slap a blog together, write a few things to put on it, and then forget it ever existed, you’re probably best sticking with Project Payday.

Project Payday is free, so there isn’t any risk. But starting a website costs anywhere from $100 to $300. This is still dirt cheap considering you’re starting a business, but if you aren’t willing to work at it, it’s just a waste.

Making money online isn’t about “getting rich quick”. If that’s what you’re after, it’s not possible. After all, if we could all get rich quick and easily, then we’d all be rich.

That said, you can achieve almost any online income goals if you’re willing to plan well and work hard. If anything, making money with a website is an anti-get-rich-quick scheme because you’ll have to work hard at it for a long period of time. It just takes a good plan and a strong work ethic.
What’s The Best Way to Make Money Online?

If the above sounds discouraging, don’t lose heart. Starting a website was the best financial decision of my life — so much that I’ve made this page a part of my financial planning website. I think everyone right now should at least try to start a website. Bill Gates once said:

“This is a fantastic time to be entering the business world, because business is going to change more in the next 10 years than it has in the last 50.”

As I’ve described above, the best way to make money online is with a website. A website only has to be created once, and it exists indefinitely. That means rather than getting paid “by the hour” or “by the day” you get paid forever. Work once, earn forever.

That’s why, in a nutshell, making money online has grown to extraordinary popularity in the past few years. It let’s anyone build a passive income online.
What Should I Do Now?

To help you in the website department, I wrote an article that details every step you’ll need to take to build a money-making website. It will hold your hand throughout the entire process. It’s called the ten-step plan. So what should you do right now? One of two things:

* Sign up for Project Payday. Sign up for Project Payday to make money to get started. After you make money with the program, make sure to come back to put your money to good use.

* Start up your website. When you buy your hosting and domain (you buy them together at the same time), make sure to come back here and keep reading.

Before you keep reading, I want to say something personal: the biggest mistake I made when trying out making money online for myself was that I waited nearly an entire year before I finally acted. I don’t even want to think about how much money I wasted by not being decisive. Wasting time is wasting money.

Before you get up from the computer, promise yourself to make a single real step towards making money online. I’ve received dozens of emails from people who said they’ve made this page their “home” page in order to constantly remind them to take action and actually start making money online, rather than put it off.

So take action… otherwise, you’ll hate yourself in 12 months. So either sign up for Project Payday or build a website like the ones I’ve built. Congratulations on your decision to make money online, and good luck! lintasberita

Make Money

Blogging for DollarsHow do bloggers make money?
By Michael AggerPosted Wednesday, Oct. 1, 2008, at 6:28 PM ET

Professional blogger. Click image to expand.Professional bloggers face pressure to produce quantity over qualityLast week, the blog search engine Technorati released its 2008 State of the Blogosphere report with the slightly menacing promise to "deliver even deeper insights into the blogging mind." Bloggers create 900,000 blog posts a day worldwide, and some of them are actually making money. Blogs with 100,000 or more unique visitors a month earn an average of $75,000 annually—though that figure is skewed by the small percentage of blogs that make more than $200,000 a year. The estimates from a 2007 Business Week article are older but juicier: The LOLcat empire rakes in $5,600 per month; Overheard in New York gets $8,100 per month; and Perez Hilton, gossip king, scoops up $111,000 per month.
Print This ArticlePRINTDiscuss in the FrayDISCUSSEmail to a FriendE-MAILGet Slate RSS FeedsRSSShare This ArticleRECOMMEND...Single PageSINGLE PAGE
Yahoo! BuzzFacebook FacebookPost to MySpace!MySpaceMixx MixxDigg DiggReddit RedditDel.icio.us del.icio.usFurl FurlMa.gnolia.com Ma.gnoliaSphere SphereStumble UponStumbleUponCLOSE

With this kind of cash sloshing around, one wonders: What does it take to live the dream—to write what I know, and then watch the money flow?

From the perspective of someone who doesn't blog, blogging seems attractive. Bloggers such as Jason Kottke ($5,300/month) and the Fug girls ($6,240/month) pursue what naturally interests them without many constraints on length or style. While those two are genuine stars of the blogging world, there are plenty of smaller, personal blogs that bring in decent change with the Amazon Associates program (you receive a referral fee if someone buys a book, CD, etc. via a link from your blog) and search ads from Google. (The big G analyzes your site and places relevant ads; you get paid if people click on them.) Google-ad profiteering is an entire universe in and of itself—one blogger by the name of Shoemoney became famous (well, Digg-famous) when he posted a picture of himself with a check from Google for $132,994.97 for one month of clicks.

Blogs with decent traffic and a voice are also getting snapped up by blog-ad networks, which in turn package them as niche audiences to advertisers. On Blogads, advertisers can choose the "Blogs for Dudes!" hive or the "Jewish Republican Channel." Federated Media groups blogs into subjects such as "Parenting" and "News 2.0"; there is also a boutique network for blogs that don't want to cover themselves with ads called The Deck. These networks present blogs as "grassroots intellectual economy" and describe their audiences as loyal, engaged, and likely to see ads as not just ads, but useful bits of information. This may be a comfort to squeamish indie bloggers since it hints that putting ads on your site is not selling out but helping out.

While monetizing your blog may be easier than ever, all of this comes with an ever-present hammer: the need to drive traffic. This month, the writer/blogger/productivity thinker Merlin Mann opened a window onto his angst with an anniversary post. Mann is best-known as the creator of the Hipster PDA (index cards clipped together by a binder clip)* and his Inbox Zero talk (turn your e-mail into actions). In a post titled "Four Years," Mann sketches out how his site, 43 Folders, grew from a personal dumping ground for his "mental sausage" into a full-featured destination for productivity nerds and life-hackers. In 2005, he experienced a key transition:

At some point that year, 43f became the surreal and unexpected circus tent under which my family began drawing an increasing amount of its income. This was weird, but it was also exactly as gratifying as it sounds. Which is to say, "very." But, my small measure of something like success did not go unnoticed. In fact, the popularity of small blogs like 43 Folders contributed to the arrival of a gentrifying wagon train of carpetbaggers, speculators, and confidence men, all eager to pan the web's glistening riverbed for easy gold. And, brother, did these guys love to post and post and post.

Mann's problem was especially acute. His income was partially dependent on advertising, and ads are sold on a cost-per-impression basis. That is, the more traffic you have, the more ads you can sell (and also the more chances that someone will click on one of the Google ads or affiliate links on your site). But a site that teaches you how to streamline your tasks and free your time yet constantly shovels new posts, lists, and information at you is oxymoronic—and also kind of moronic.

Mann could have overlooked this contradiction, but he chose instead to live his advice. Declaring an end to "productivity pr0n," Mann has promised fewer, better posts and rolled out a new mission statement: "43 Folders is Merlin Mann's website about finding the time and attention to do your best creative work." The further irony here is that Mann's less-is-more strategy may prove to be more profitable. The usability guru Jakob Nielsen has long recommended that experts "write articles, not blog postings," with the idea that demonstrating expertise is the best way to distinguish yourself from Internet amateurs and ultimately persuade someone to pay you for your insights. In Mann's case, that might mean less ad revenue but more speaking engagements.

Once a blog hobbyist goes pro, he or she faces a daily pressure to churn out new material. In the wrong mind, that can lead to top-10 lists, recycled ideas, half-baked notions, lots of viral videos, and a general increase in information pollution. Is there any way out of this scenario? In 2005, Jason Kottke announced that he had quit his job to blog full-time and asked his readers to become "micropatrons" at a suggested rate of $30. He received $39,900 from 1,450 people but abandoned the experiment after a year. Kottke is vague about the reasons why he swore off micropatronage, but he suggests that he was worried that people wouldn't donate year after year. In order to build a bigger audience and potential new donors, he would have had to do some of the cheesy things to drive traffic (i.e., "Top Five Best" posts) and/or become a cult of personality (overshare, start flame wars, social network relentlessly). These days, he accepts ads as part of the Deck network.

The bloggers at the vanguard of the post-quality-vs.-post-quantity debate are those who work for Nick Denton's Gawker media. This year, Denton introduced a new pay system that gave his bloggers a base salary and also paid them a quarterly bonus based upon the amount of page views their items receive. Or to oversimplify, they were being paid by popularity. (To follow the complicated ins and outs of the "blogonomics" of the Gawker pay structure, read Felix Salmon's Portfolio blog.) The memo explains the decision as an effort to reward and encourage more original, scoopy items, but, as Denton's writers and ex-writers quickly pointed out, there's not an obvious correlation between quality and page views. Despite a few exceptions, such as the Tom Cruise Scientology video, no one can predict a Web hit.

Do we get the blogs we deserve? We vote by click, after all. Perhaps we shouldn't look at all those top 10 lists and Britney Spears photos. Successful blogs, such as Zen Habits, tend to balance the more fast-food type posts with longer, more complex ideas that will presumably keep readers coming back—although there are plenty of people who make a living posting dubious crap. Perhaps the escape route out of a hit-driven blogosphere is all of our newfound "friends." The Internet has always been very good at counting page views but not so great at assigning value to what's actually in those pages. Facebook, FriendFeed, StumbleUpon, and the sharing feature of Google Reader have their annoying, nudgy aspects, but they allow us to rely on one another to sort out what is interesting and worthy. Put it on a T-shirt: Friends Don't Let Friends Read Bad Content. lintasberita

Wednesday, July 1, 2009

All you Need to Know About Laptop Batteries

All you Need to Know About Laptop Batteries

Laptop batteries allow you to work on your computer even while you're on the go. Whenever you need to access information from your computer, a battery will grant you the ability to be efficient in whatever you do. However, a battery can only do so much. A lot of people find that their battery lives shorten as time goes by eventually causing their notebooks to run slower than usual.

While a laptop battery's deterioration is inevitable, there are many ways by which you can help prolong the life of your battery. Understanding how it works and what can make your battery "age" faster is one of them. The technicalities surrounding a laptop battery do not really take rocket science smarts to understand.

Lithium ion

If you have a later model laptop, you'll probably find your battery is a Lithium ion or LiON. This is a type of battery that is common to newer notebooks because it's relatively lighter than its predecessors. It's also much more efficient and production costs are minimal which is why manufacturers have managed to introduce this to the market.

For those who are searching for a replacement battery, you're better off with LiON. Not only is it more environment-friendly, it is also has a longer runtime.

Memory effect

You may encounter this term on older types of laptop batteries such as the nickel cadmium and nickel metal hybrid. The memory effect basically causes a battery to hold less charge. Lesser charge means lesser energy. For your laptop, that means lesser runtime. It usually happens when you tend to leave your battery plugged onto the charger long after it has been fully charged. Conversely, it also caused by undercharging and charging before the battery is fully drained.

Shallow cycling

Shallow cycling is when you charge your laptop battery without allowing it to reach full charge status. While there are instances when this cannot be avoided, it's always best to allow for ample time for your battery to charge up before disconnecting it from the charger. Shallow cycling leads to the rapid deterioration of your battery's ability to hold charges. It is one of the primary causes of memory effect which was discussed above.

Cycle life

Laptop batteries have a finite lifespan. Over time, their efficiency and storage capacity are diminished which can affect your unit's overall performance. Cycle life refers to the number of charge and discharge cycles before your battery starts to deteriorate. On the average, rechargeable batteries can go from 500 to 1200 cycles before their nominal capacity goes below 80% of its initial capacity. lintasberita

The Secret to Battery Computer Notebook

The Secret to Battery Computer Notebook

Here are a few basics of what this broad subject has to offer up to any individual who wants to know more about it.

When most people think of battery computer notebook, what comes to psyche is regularly basic information that's not particularly interesting or beneficial. But there's a lot more to battery computer notebook than just the basics.

The little notebook computer or processor is tailor made for business. It's the improve communication tool. It's the improve record care tool. It's the improve presentation tool. And if that wasn't enough, all of the above is neatly packaged into a small portable automaton that can be full anywhere and everywhere.

For any range business, small to method to jumbo, the notebook computer is steadily becoming an vital tool for business.

In the introduction, we saw how this subject can be beneficial to anyone. We will continue by explaining the basics of this topic.

Savvy commerce people know acquiring the right tools is an important feature in determining the triumph or profitability of any company. Therefore, along with the recurrent outfitting of your crowd or commerce - total consideration should be given to choosing your notebook computers.

Business owners should be awake that notebook technology is varying at a blistering pace. Every two living or so, there is a entire new generation of notebooks and notebook technology to consider. Notebooks are receiving smaller, faster, and better connected. They are also offering performance that is matching or almost matching their desktop rivals.

Major reasons why, for the first time in history, notebook computers are outselling their bigger cousins, desktop computers. topic buying, no doubt, drama a significant part in all those sales. Large corporate organizations are export notebooks for their companies, sales people and employees. It makes for a more competitive group in a very competitive world.

But how do you prize a good dealings notebook computer? What's the criteria for judging a good machine? What's the right mainframe or notebook for your circle or sales staff?

Here are some important factors any commerce should think when trade a notebook computer or processor for their company. broad factors that determine a good commerce notebook. think these...

Portability

Perhaps, the most significant feature and the focal reason you're trade a notebook computer is portability. You can take it anywhere. You can take your records, reports, presentations or food where ever they basic to be. For the commerce traveler or 'road warrior', the notebook computer is an central tool for their business.

When trade their notebook of choice, these 'road warriors' look at the portability of their notebook. mass and substance are very important. They want something that's light and small, yet pungent enough to do the job. They will maybe look in the Ultra-Portable and lean and Light classes of notebooks to make their choice.

Notebooks in those categories are regularly well under 5 pounds, around 10 by 14 inches in range and approximately an shuffle thick. Small enough to confuse in a suitcase or slip comfortably under your arm. They won't drain your energy even if you have to lug it around all day!

Battery Life

You also have to look for a notebook computer that will last long enough to get the job done. You want sufficient battery life for those long even trips. Fortunately, battery life is increasing, you can now get up to 5 or more hours on high trait notebooks. Buy the premier numbered cubicle battery, and buy any voluntary built-in battery extras that will improve battery life.

Is everything making sense so far? If not, I'm reliable that with just a little more reading, all the truth will decrease into place.

Connectivity

You want something that's calm to unite to the Internet so connectivity is another important factor. Being in devoted contact with all your employees can be a determining part in your choice of notebooks. Communication is vital. Most high class notebooks come with Wi-Fi (Wireless Fidelity) connections, many have a tri-mode 802.11a/b/g wireless system.

Some newer models, like the Sony's New Ultra-Portable VAIO VGN-T350P, are raising the bar, it has the world's first 'Built-in Cellular Modem'. You can use your sect call to join to the Internet. This may be a great advantage because finding a 'Hot Spot' in some parts of the world can still be difficult.

Performance

You requisite to judge the performance direct of your dealings computer. Can it sell all your company's demands, can it sell heavy graphics, charts, diagrams, spreadsheets, etc. restraint out the RAMâ€"senior RAM will be better for graphics and video. It's usually agreed that you requisite at slightest 256MB for Windows XP and Mac OS X. You will only requisite 128MB for other operating systems in Windows or Mac.

Most notebooks come with lots of storeroom space, 60-80 GIG hard drives are common. outside drives are also available if you basic extra space.

Other tasks may be important to your line of business. For example, if you basic to take notes in the field, i.e. genuine estate agents, engineers, doctors or checkup personnelâ€"then a schedule or a convertible capsule may be a better choice for your company.

Sturdiness

This is important if you want a notebook for a lot of highway work or trade traveling. Your notebook should be energetic or ruggerized to be able to take a good pounding. Many notebooks have some tale sturdiness skin such as IBM's Active Protection usage which is intended to picket the hard drive from falls and spills for those accident flat notebook users in your company.

Security

Living in today's world we basic safeguards and defense measures in place to shield your crowd records and files. Not to mention, to shield against the theft of your notebook computer itself. Along those same lines your notebook computer should have advanced defense features. Many notebooks such as the IBM/Sonoma ThinkPad series contain an integrated fingerprint scanner for biometric authentication that uses an Embedded safety Subsystem and Password Manager.

Image/Style

At first glance this may appear like a superficial exchange point, but not really. In today's problem world, likeness or fashion does consider and contribute to your button line. Sad but true! You want a notebook computer that matches the likeness of your company.

There is one to fit your needs, you have a full range of styles of notebooks to desire from, whether it be conservative black or glowing race car red. Most businesses are ultra-conservative (nature of the beast) and should prize a notebook along those conservative lines, other businesses may want to promote a sharper or cooler picture such as in fashion, creative arts, harmony industry...

Take time to think the points presented above. What you learn may help you overcome your hesitation to take action.

What you have learned while reading this informative article, is knowledge that you can keep with you for a lifetime. lintasberita