Ads Unit

Reinstall Your Mac OS X

Posted by Unknown on Tuesday, September 27, 2011

Although rare, there are times when it is necessary to reinstall your Mac OS X operating system. With all of the different installation options this process can seem overwhelming and complicated; this article should help you make sense of the entire installation process.

Note: The steps in this article apply for version of Mac OS X up to and including Leopard. Snow Leopard has a similar process but will "Archive and Install" by default. To preform an "Erase and Install" on Snow Leopard you must erase the drive using Disk Utility before running through the installer.

Please Follow these steps carefully to prevent loss of data if you are reinstalling.

Back Up Before You Reinstall

Before performing any type of reinstallation, be sure to back up your personal files. Even when using the Archive and Install feature there is always a chance of data loss.

1. Decide on a backup location.
  • External Hard Drive: this is the preferred method as a hard drive is capable of holding large amounts of data.
  • CDs/DVDs: this is only an option if the computer is currently bootable and has a disc burner. CDs and DVDs are limited in their capacity, however, they are readily available.
  • On-line Storage: if you have an FTP server or MobileMe account you may be able to back up your files on-line.
2. Decide what to backup.
  • Personal Files: your personal files are located in your home folder. These include documents, pictures, movies, etc..
  • Applications: it is generally not recommended that you back up applications, as people have a tendency to back up all of their applications including ones they no longer use. The reinstallation may be an opportunity to get rid of some of the unused applications, as you can easily reinstall them as they are needed.
  • System Files: system files should not be backed up as they will be reinstalled during this process.
3. Enable the Root user on your computer
  • Mac OS X 10.6 Snow Leopard
    • Open Directory Utility in /System/Library/CoreServices.
    • Click the padlock icon and enter your Administrator login.
    • Select the "Edit" menu, and choose Enable Root User.
    • Choose a password for the root user and click "OK".
  • Mac OS X 10.5 Leopard
    • From the Finder's Go menu, select Utilities.
    • Open the Directory Utility.
    • Enter your administrator password and click "OK".
    • Select the "Edit" menu, and choose Enable Root User.
    • Choose a Root user password and click "OK".
  • Mac OS X 10.4 Tiger and Earlier Versions
    • From the Finder's Go menu, select Utilities.
    • Open the NetInfo Manager Utility.
    • Find and click on the lock icon on the Manager window.
    • Enter an administrator password and click "OK".
    • Select the Security menu, and choose Enable Root User.
    • Choose a Root user password and click "OK".
4. Log out of your current account.  
  • Click on the Apple icon in the top left corner of the screen.
  • Select "Log off <account name>".
5. Log in as the Root user.
  • On the log in screen click "Other".
  • Enter "Root" as the new name.
  • Enter the password you created.
6. Using the Root user, drag the files and folders you decided to preserve to your backup location
  • Personal files can be located by opening "Macintosh HD" and clicking the "Users" folder.

Select an Install Type

Mac OS X has three main reinstall types. Before you proceed it is important that you understand the differences between each. Choose carefully which type you would like to perform.

Archive and Install

  • Available in Mac OS X 10.2 and later, an Archive and Install will automatically move existing system components to a folder called "Previous System". The Archive and Install will then proceed to reinstall Mac OS X.
  • The Archive and Install will also preserve user account information and personal files. however, before proceeding with usage of the computer all software updates will need to be completed unless you are on Snow Leopard in which case the updates are preserved.

Archive and Install (Not Preserving User & Network Settings)

  • Similar to the Archive and Install method, this option will move the existing system components to a "Previous System" folder; however, it also moves the user accounts and network settings to this location.
  • If you follow this type of installation, you will need to recreate your accounts and reconfigure your network settings; however, your personal files are preserved on the hard drive and can be retrieved.

Erase and Install 

  • The Erase and Install - as its name implies - will completely erase the contents of the hard drive before reinstalling Mac OS X.

Reinstall Mac OS X

  1. Insert your Mac OS X Install DVD or Installation Disc 1.
  2. Restart the computer and hold down the letter "C" as the computer starts up.
  3. Continue to hold down the letter "C" until you see a grey screen with an Apple and a small spinning gear.
  4. Select your language on the Welcome to the Mac OS X Installer screen and click "Continue".
  5. Click "Continue" on the following screen.
  6. After reading the Software License Agreement, click "Agree".
  7. Select the volume to which you are going to install. "Macintosh HD" is the default name.
  8. Click the "Options" button in the bottom corner of the window and select your installation type.
  9. Click "OK" and then "Continue". You will be presented with a confirmation window at which point you can click "Install" to proceed.

After the Installation

After any type of installation there are a number of steps you should take to bring the computer back to a usable state.

1. Connect to the internet and run Software Updates. 

  1. Click the Apple icon in the top left of the screen.
  2. Select "Software Update"
  3. Install all available updates.
2. Run a quick Repair Disk Permissions.
  1. From the Finder's Go menu, select Utilities.
  2. Open Disk Utility.
  3. Select "Macintosh HD" on the left hand side of the window.
  4. Click "Repair Disk Permissions" and allow the scan to complete.
3. Restore any files that you backed up to the location of your choosing.
4. Reinstall any software affected by the reinstall.

Things You'll Need

  • A location to backup important files.
  • Your Mac OS X Install & Restore CD/DVD or a retail OS X Installation Disc.

Tips

  • Although the Archive and Install is the preferred method, some third-party applications, such as Microsoft Office, may need to be reinstalled as a result.
  • Always complete any official Apple Software Updates after reinstalling the operating system.

Warnings

  • Before performing any type of reinstallation, always back up your files. Even when performing an Archive and Install, errors during the installation process could result in a loss of data.
  • When performing an Archive and Install, use the installation CD for the current version of the operating system that installed on the computer. For example: If your computer came with Mac OS X 10.4 (Tiger) but you upgraded to Mac OS X 10.5 (Leopard), Archive and Install using the Leopard CD's.

 source : WikiHow

More aboutReinstall Your Mac OS X

Mantain Your Laptop Battery

Posted by Unknown on Monday, September 26, 2011

If your laptop battery quickly broken? or your laptop's battery does not last long? maybe it happens because you are less able to care for your laptop battery. The following general advice should you do with your laptop battery.

  1. Don't incinerate or expose laptop battery to excessive heat, which may result in an exposure.
  2. Don't pierce, hit, step on, crush or abuse the battery .
  3. Don't modify or disassemble the laptop battery.
  4. Don't place battery for notebook in device for a long period of time if device is not being used.
  5. Don't expose laptop battery to water or other moist matters.
Source : WikiHow
More aboutMantain Your Laptop Battery

Wireless Network Solutions: Complete Coverage When You Need It The Most

Posted by Unknown on Wednesday, September 7, 2011

As a prominent company head, you realize the importance of your employees being mobile, as they are required to attend numerous meetings and meet with clients out of the office. Today, where everything is digitalised, it becomes very important that your employees are equipped with wireless technologies. Hire wireless network expert services and ensure your employees are always connected.

For the success of your firm it is very important that your employees create an impeccable first impression. How embarrassing would it be if one your efficient executives is on a lunch meeting with one of your prospective clients and when they switch on the laptop to demonstrate your company's success, they cannot even access the internet? Certainly, not making use of the advanced standards wireless network will earn your company negative points and this could even lead to you losing out on the account.

In your bid to increase the mobility of your employees you experiment with various hasty techniques for quick solutions. However, there are increased chances of them not working for you. An added problem with installing flawless wireless network is it requires implementation of multiple procedures that complement one another, making it an extremely time consuming and rather complicated process. So how do you decide which rigorous solution will best suit your business and get you in the good books of your prospective clients?

An ideal solution is to rope in the services of an expert wireless network service, as they will assure that the WLAN is designed to become an integral and a rather logical component that contributes to your solid network infrastructure. Also ensure they offer the updated standard boost along with other fully secured wireless networks that are easy to measure and managed remotely. Thus ensuring you get better return on your investment.

As you set out to look for a proficient service provider make sure they kit your network with a highly compliant and robust wireless platform. This will help support your business's high-bandwidth applications which will help provide your employees with greater mobility. Meanwhile, it also ensures they will be able to access high volume data at all times, thus enabling your employees to deliver enhanced presentations to your clients.

Also, to avoid high internet bills and to maintain privacy it becomes very important that no one intercepts your Wi-Fi network. Nevertheless, attaining maximised security is not easy, especially with increasing incidences of hacking and data transferring by unauthorized sources. In order to control these illegitimate activities, it requires implementation of rigorous and complicated security procedures, making it a complex and an extremely time consuming task.

A reliable wireless network solutions provider understands the need for a secured network aptly and so, makes sure they deploy the latest technologies that will maximise your network's security. Also owing to their expansive experience, they are able to implement robust front line security measures for native TDM and Ethernet transmission on a single platform of your Point-to-Point and Point-to-Multipoint architectures flawlessly. Thus assuring that only authorized individuals and devices can access your company network securely.

So, to provide your employees with greater mobility and to see your business succeed beyond imagination, opt for a proficient and respectable wireless network solutions provider. Thus, ensuring Wi-Fi becomes an integral part of your network system, so that your executives get greater mobility and receive coverage securely when they most need it.

Article Source: ErzineArticles
More aboutWireless Network Solutions: Complete Coverage When You Need It The Most

How to Break a BIOS Password

Posted by Unknown

Have you ever been locked out of an old computer by a forgotten BIOS password? There's no need to get frustrated. It is relatively easy to bypass this safeguard.

STEPS
  1. Power off the computer and make sure that it is unplugged.
  2. Open up your computer case. You need physical access to the motherboard to complete this procedure.
  3. Find a circular, (mostly) silver metallic object on the motherboard. This is the CMOS battery. 
  4. CAREFULLY remove the CMOS battery, avoid touching it with your fingers, and leave it out for about 120 seconds. This will flush the CMOS memory which stores the BIOS password and all other configuration. (See Warnings) 
  5. Set the battery back into place and power on the computer. 
  6. The computer should then warn you that the CMOS configuration could not be found. You can either reconfigure it yourself or restore defaults. Restoring the default configuration should be fine. 
  7. You will notice that the BIOS password has been cleared and you can boot without it. You may reset the BIOS password to something else by going into the BIOS configuration and setting a new User Password (The Supervisor Password controls access to the BIOS, NOT the computer!)

LAPTOP

  1. Remember that laptops can be trickier, especially if it's a newer model. If it has a security chip on the motherboard forget about it. You either have to physically remove the chip or contact the mfg for the "master" password. If you can boot up off of a cd or floppy try any of these methods:
  2. Create a Win98SE bootable media "or anything that lets you boot into MS-DOS" and boot off of it.
  3. When the A:\> prompt appears type debug and press enter.
  4. You will then only see a "-".
  5. Type o 70 2E "include the spaces" and press Enter.
  6. Type o 71 ff "include the spaces" and press Enter.
  7. Type q and press Enter.
  8. Here are a list of common mfg backdoor passwords:
    • AWARD BIOS
      • AWARD SW, AWARD_SW, Award SW, AWARD PW, _award, awkward, J64, j256, j262, j332, j322, 01322222, 589589, 589721, 595595, 598598, HLT, SER, SKY_FOX, aLLy, aLLY, Condo, CONCAT, TTPTHA, aPAf, HLT, KDD, ZBAAACA, ZAAADA, ZJAAADC, djonet, %øåñòü ïpîáåëîâ%, %äåâÿòü ïpîáåëîâ%
    • AMI BIOS
      • AMI, A.M.I., AMI SW, AMI_SW, BIOS, PASSWORD, HEWITT RAND, Oder
  9. Other passwords you may try (for AMI/AWARD or other BIOSes) - LKWPETER, lkwpeter, BIOSTAR, biostar, BIOSSTAR, biosstar, ALFAROME, Syxz, Wodj gvs
  10. Dell XPS M1210 = xceaxn05
TIPS
  • If you looking for Sony PCG Series BIOS Master Password try this one: http://elektrotanya.com/?q=hu/content/sony-pcg-series-bios-master-password
  • Depending on the manufacturer of your motherboard, you may be able to use what it is called a "backdoor password" to bypass the password problem. Try looking at the external links for possible passwords.
  • Remember that passwords are Case Sensitive. The last two passwords in the AWARD BIOS list are in Russian.
  • Sometimes the bios reset jumper has a "handle" and is colored a bright color to make it easy to locate. Also, look in your case near the bottom. If it is a manufactured computer then it probably came with a little sticker with the jumpers and the location of the reset jumper.
  • If you're really stuck, the PC manufacturer can often give out a "reset password" if you can prove you are the owner. This works with Dell but they usually charge.
  • B. By Using Software:
  • I have found that BIOS/CMOS Password Recovery Tool is the most effective.:
  • BIOS/CMOS Password Recovery Tool is a program that works instantly to remove any lost or forgotten BIOS/CMOS password. Simply boot your PC to DOS and execute the program, and get access to forgotten BIOS/CMOS passwords in just seconds
  • If you want your bank account emptied and a virus installed, just go to the SCAM website:
  • BIOS/CMOS Password Recovery Tool Service: http://www.biospasswordrecovery.com/
  • Notice that they don't have any contact information (but happily says to go to the non-existent "Contact Us" page for an instant email if you have any trouble with their amazing software!) I really wish someone would prosecute the people who set up scams like that. Then again, since they rarely do prosecute, I should consider setting some up myself!
WARNINGS
  • In rare cases, the battery may be soldered into the motherboard and very difficult to remove. If this is true, you may need to find a jumper near the battery that achieves the same result. If you don't know which jumper it is, you CAN test them all. Unplug (really unplug, not just power off) the computer, and start a methodical change in all the jumpers positions, change one, count to ten, change it back, move on the next. After completing the lot of them (on older motherboards this could take a while) plug the PS back in, and boot up. You may risk damaging your computer with this procedure if you are not careful.
  • Some notebooks such as IBM's ThinkPad render useless when the BIOS password is being tried to reset.
  • Don't just start pulling jumpers on the motherboard. Make sure you know where it was and in what position in case anything goes wrong put it back.
  • If you turn your computer on and it makes strange noises / beeps, you should contact the vendor, manufacture, or a tech guy to fix it.
  • When a BIOS is locked with password, a checksum of that password is stored to a sector of the FlashROM - this is a chip on the motherboard of the laptop which also contains the BIOS and other settings. For most brands, this checksum is displayed after entering an invalid password for the third time. using this number a password can be calculated. Which is the reason this number is displayed and is the way the OEM tech support calculates a password. Dell laptops use the service tag.


More aboutHow to Break a BIOS Password

How to Build a Hackintosh

Posted by Unknown on Tuesday, September 6, 2011

A Hackintosh is a non-Apple computer which nevertheless runs OS X. You will need to buy a retail copy of OS X and breach your EULA as is your right under the legal doctrine of fair use.

STEPS
  1. Acquire OS X compatible hardware. If you want a netbook study the netbook compatibility database at BoingBoing 
  2. Purchase OS X retail for $29. 
  3. Partition a 8Gb thumb drive as Mac OS Extended filesystem type. 
  4. Copy the Install DVD image to your hard drive. 
  5. Restore the image to your thumb drive. 
  6. Install Chameleon and EFI bootloaders onto your thumb drive. 
  7. Tweak your BIOS. 
  8. Install OS X. 
  9. Study InsanelyMac, Lifehacker and OSx86 wiki for advice. 
  10. If you use a legitimate retail edition of OS X you should be able to install updates but check beforehand that they won't cause any incompatibilities.
More aboutHow to Build a Hackintosh

How To Enter Windows XP Safe Mode Using the System Configuration Utility

Posted by Unknown on Monday, September 5, 2011

Sometimes when troubleshooting a Windows XP issue, you need to enter Safe Mode. Typically, you would press the F8 key during the boot process to enter Windows XP Safe Mode but that can be very difficult in some cases depending on the problem you're having. 

This simple tip will get you into the Windows XP Safe Mode a whole lot easier using the System Configuration Utility, sometimes called "msconfig".

Here's How:
  1. Click on Start and then Run.
  2. In the text box in the Run window, type msconfig and click OK. This will open the System Configuration Utility program.
    Note: Do not make changes in the System Configuration Utility other than those outlined here to avoid causing serious system issues. This utility controls a number of startup activities other than those involved with Safe Mode.
  3. Click on the BOOT.INI tab located at the top of the System Configuration Utility window.
  4. Check the checkbox next to /SAFEBOOT and click OK.
  5. You will then be prompted to either Restart, which will restart the PC immediately, or Exit Without Restart, which will close the window and allow you to restart the PC manually.
  6. After the restart, the PC will automatically boot into Windows XP Safe Mode.
    Note: Windows XP will continue to boot into Safe Mode until the System Configuration Utility is configured to again boot normally.
  7. When your work in Safe Mode is complete, click on Start and then Run. Type msconfig in the text box and click OK.
    This will again open the System Configuration Utility program.
  8. Choose the Normal Startup radio button and click OK.
  9. You will then be prompted to either Restart, which will restart the PC immediately, or Exit Without Restart, which will close the window and allow you to restart the PC manually.
  10. After the restart, the PC will boot into Windows XP normally and will continue to do so.
 Source : about.com
More aboutHow To Enter Windows XP Safe Mode Using the System Configuration Utility

How to Become a Qualified and Professional Ethical Hacker

Posted by Unknown

In the last few decades, there's been an increasing demand for ethical hackers (also known as white hackers) as they protect the computer systems from dangerous intrusions.
Ethical hackers are technically skilled IT pros with a strong desire to solve problems and prevent malicious hackers from causing damage to network systems.
To be a professional ethical hacker you require motivation, dedication, initiative, self-education and formal training in ethical hacking.

STEPS

  1. Know about the pros and cons ! of different types of hackers, such as White Hat, Grey Hat and Black Hat hackers.
  2. Seek out job opportunities for ethical hackers. There are lucrative jobs available in government organizations, banks, financial institutions, military establishments and private companies.
  3. Analyze the basic requirements to become an ethical hacker. Try to find out the areas where will you need to work really hard.
  4. Decide the area where you would prefer to work primarily with hardware or software. Do not think of specializing in both the areas. Though knowledge of both is required but the decision will help you to know where to begin. You must be aware of every function, every component of computer on which you will have to work on. 
  5. Evaluate your strengths and interests and gain some programming knowledge such as C, or Java. These programming languages can be learned by taking formal programming courses and reading books. It will help you to read and write code. 
  6. Learn the UNIX operating system as it is regarded as the original operating system built by hackers. Also learn about Windows and Mac OS. 
  7. Take a professional course. There are a wide variety of courses available for IT security professionals in "Ethical Hacking” or “Internet Security” which would help you to expand your knowledge in ethical hacking. 
  8. Do the experiments on your own to know the actual happening of a situation. 
  9. Start experimenting with hardware and software to learn how to take control of the situations and how to prevent a computer from getting hacked. 
  10. Read on your own to know what are the areas where you need to improve and what need to be learned to refine your focus. Technology changes rapidly, and a good ethical hacker must be willing and eager to keep up with the new technological developments. 
  11. Get certified as it would help you to succeed in the vanguard of your profession. 
  12. Stay connected to the hacker community by sharing technical information and ideas.
TIPS

  • Always work within the law and never try to break it.
  • Never do it just for money.
  • Always keep learning new things.
  • Keep you focus intact in your job.
  • Don’t do it just for fun.
  • Zeal to learn new things
  • Enjoy your work
More aboutHow to Become a Qualified and Professional Ethical Hacker

How to Run Windows On a Mac

Posted by Unknown on Saturday, September 3, 2011

Not sure how to run Windows on your Mac? Here you will find helpful tips to efficiently run Windows on Mac OS X 10.5 or later. 


STEPS
  1. Turn on your Mac and log into your account.
  2. Go to the Utilities folder located under "Applications" or type "Boot Camp Assistant" into spotlight search.
  3. Launch Boot Camp Assistant.
  4. Click Continue.
  5. Decide how much space you want for your Windows partition. You can divide space equally between Mac OS and Windows, give Windows 32GB, or assign space manually using the slider.
  6. Then click Partition.
  7. Insert your 32-Bit or 64-Bit Windows XP, Windows Vista, or Windows 7 DVD into your drive and click Start Installation.
  8. Your Mac will restart and launch the Windows installer. Click continue/next. *For Windows XP click Enter then press F8*
  9. If prompted for product key enter it or leave it blank (you can enter it later).
  10. When presented with a list of partitions, select the one labeled BOOTCAMP.
  11. Format that partition and click continue.
  12. The installation process will begin. Your Mac may restart several times.
  13. Once Installation is finished and you have created a user account, insert you Mac OS X install DVD to install all of the Boot Camp drivers necessary for a smooth Windows-Mac environment.

TIPS
  • When you turn on your Mac, hold down the option key to select whether you want to boot into Mac OS X or Windows.
  • There are some Macs that can run 64-Bit versions of Windows. They are: MacBook Pro (13-inch, Mid 2009), MacBook Pro (15-inch, Early 2008) and later, MacBook Pro (17-inch, Early 2008) and later, Mac Pro (Early 2008) and later.
  • Backup important information prior to installing Windows via Boot Camp.
  • These steps require a Intel Mac, otherwise you won't have the setup app.
WARNINGS

  • You must use the Mac OS X install DVD that came with your Mac. Do not use another Mac's install DVD or a retail copy of Mac OS X. If you do, you will experience frequent crashes while under Windows.
  • Only Macs from 2009 or later support 64-Bit Windows. Do not attempt to install 64-Bit Windows on Macs that are from 2008 or earlier.
YOU MUST HAVE :
  1. Mac OS X 10.5 or Later
  2. 32-Bit or 64-Bit Windows XP, Windows Vista, or Windows 7 install DVD
Source : WikiHow
More aboutHow to Run Windows On a Mac

How to Find a Lost iPhone

Posted by Unknown

Losing an iPhone isn't just about the expense involved, which is considerable enough. It's also about the personal data, your iTunes account, and your photos, and all the hours you've already spent perfecting its contents to the way you want them. And it's never pleasant to lose a gadget. Here are some ways to find your lost iPhone again.




STEPS

Use MobileMe. This is the most direct route as it doesn't require borrowing someone else's phone to download an app. You do, however, need access to a computer.

Use "Find My iPhone" via MobileMe. This is a free app, although you must have a subscription to MobileMe or an iPhone 4, iPad or iPod Touch 4G with the most recent iOS 4.2 updates, where the Find My iPhone feature of MobileMe is now free of charge. This method works on the built-in GPS chips, and can also be used to locate a lost iPad or iPod (via Wi-Fi in the case of the iPod Touch).[1] You'll need to have MobileMe configured on your iPhone, and the Location Services feature will need to have been turned on on the lost iPhone (go to "Settings", then "General", then "Location Services").
              
  • Install the Find My iPhone application on another iPhone, an iPod Touch, or an iPad. Ask a family member or a friend to use their i-gadget if you don't have any other devices you can access.
  • Sign in to the Find My iPhone app using your MobileMe name and password. The application locates your iPhone; it will also show you the location of your phone on a map.
  • Set a display message or make your iPhone play a sound. The sound can be used to draw the attention of the person who has your phone, enabling them to check the message you're sending (it lasts for 2 minutes). Send a message with information on how to return the phone. This will show up on your iPhone's screen.
  • Lock your phone remotely. This way, other people cannot use your phone without knowing the passcode.
  • Wipe your phone of all personal information remotely. Doing this will get rid of all your personal texts, phone history, contacts, etc. permanently. Since this is a pretty drastic option, only use this feature if you don't think you'll be able to get your phone back.
Install an application on your iPhone called "If Found". If Found lets you create a background wallpaper that shows your contact details that lets an honest finder contact you by another means (such as your home phone). Naturally, you'll need to add this before you have the misfortune of losing your phone but it makes it very simple for even a non-iPhone owning person who finds your phone to find a way to get in touch with you without having to scroll through your data and maybe never work out who you are. (Note that you need to purchase If Found but the cost is minimal.)








Use iHound. This is a free program that alerts you the moment your iPhone is plugged into a computer. This means that you'll receive an email letting you know that your tracked iPhone has been located, along with a detailed report on where it is being used. This is a good additional measure for where the iPhone gets turned off but is later plugged in to change or upload software, etc.

  • iHound lets you sound an alarm to help you find the iPhone in case it's slipped down the back of sofa, etc.
  • iHound lets you use geofencing location alerts. These are alerts and check-ins that work automatically with Facebook, Foursquare, or Twitter when you arrive at locations.
Use iLocalis. This lets you log in to the website to find your missing iPhone. You can also log in and send yourself a message. If the sim card has been changed, you'll also be able to get the thief's new phone number. This software requires a jailbroken iPhone.







Check local police stations and lost property stations in the vicinity of where you lost your iPhone. You might be pleasantly surprised to find that someone has handed in your phone, and even if they haven't, leave your details as there may be a delay in processing or turning in. The amount of lost items not ever collected from police or lost-property is enormous – just visit police auctions!
  • Think laterally. Although you may have lost your iPhone in one borough or suburb, a person finding it might use a police station of a borough or suburb nearest to their own home, especially if in a hurry or not able to locate the one where they found the phone. Ask how you can check stations outside your area as well.
Use social media. You never know - letting people know via Twitter or Facebook that your phone's gone missing may return dividends if someone who follows your pages or has befriended you online stumbles across it. It's a long shot but friends of friends of friends are sometimes a good way to find something lost.
  • You can use Twitter to keep a track of your iPhone. Create an account just for your iPhone and a separate email address of its own. Protect the Twitter account so that only you, or a limited number of people such as your spouse or business partner, can see the account. Then set up your iPhone to tweet in on a regular basis. Install a program called "FindMe"; it will be able to use the tweets to this Twitter account to tell you the GSM tower's cell ID, as well as the latitude and longitude using Google maps. 
Take good care of your iPhone and try not to lose it again. Losing an iPhone and never retrieving it again is an expensive and potentially personally exposing experience. Do your best to avoid losing it again by following these suggestions:
  • Always double-check that you have your iPhone on you before leaving any place - cafes, restaurants, business meetings, other people's houses, museums, the opera, etc. Just get into a habit of looking for it before you leave.
  • Keep your iPhone somewhere safe at all times. Losing the iPhone is easier if you haven't been careful about where you keep it. Bags that let the contents fall out easily, pockets that tip when you move, and leaving it unattended while swimming or doing laps around the track, etc., are ways of asking for trouble. Secure the iPhone in a good carrying item or lock it up when you're pursuing outdoor or sporting activities, so that you don't need to worry about it.

Source : WikiHow
More aboutHow to Find a Lost iPhone

How to Jailbreak an iPhone 4 I.O.S 4.2.1 With Greenpoison

Posted by Unknown on Thursday, September 1, 2011

Prerequisite :  -Have this iDevice : Iphone 4 with firmware 4.2.1.
Download Greenpoison here

 

 STEPS

  1. Unzip the archive gp_win_rc5_b2.zip
  2. Connect the iPhone and switch off it.
  3. Click Prepare to jailbreak DFU.
  4. Follow the procedure:-Press 2 seconds on the button Power. 
  5. Then without releasing(leaving) the button to power,  maintain the button home during 10 seconds.-Then relaunch the button Power and remain  press on the button home during 15 seconds.
  6. If the Ready to jailbreak message appears, then  click to Jailbreak
  7. The jailbreak start, the screen becomes quite white 2 seconds then writings on a black background appear.
  8. Click Quit at the end.
  9. When the menu of the iPhone reappears, look for the Loader application and  install Cydia

TIPS

If the Try Again message appears then you are not correctly spent in mode(fashion) DFU. Put out(switch off) the iPhone and restart.

WARNINGS

As usual, there is a risk of having to restore if Jailbreak happens badly. It is  very important to make a complete saving of the iDevice before beginning the manipulation.

Source : WikiHow
More aboutHow to Jailbreak an iPhone 4 I.O.S 4.2.1 With Greenpoison

Kartu Lebaran

Posted by Unknown

Untuk ArlojiSapi.
Selamat Hari Raya Idul Fitri 1432H...
Minal Aidzin Walfaidzin...
Mohon Maaf Lahir dan Batin..



Maaf,aku ga ikut bukber kemarin...
aku nyesel ga ikut... T.T
More aboutKartu Lebaran

What Is a CMS Website?

Posted by Unknown on Tuesday, August 23, 2011

CMS stands for Content Management System. These systems are designed to allow people who aren't familiar with web design to operate a website easily, without worrying about all the complicated coding that typically goes into designing a great website.
Open source CMS programs are the most popular because they can be downloaded completely free and the most popular systems have tons of templates, extensions and themes that make them more functional.

One of the more popular content management systems being used right now is WordPress, often just called WP. This system is incredibly easy to use and there are thousands of themes from many different designers that are easily modified for different functional uses and aesthetic looks. Another popular system is Linux, though there are many designers who no longer see the value in that CMS.

What makes a CMS website different from a website designed from scratch by a professional designer is the ease of use. You don't have to know a lot of HTML code in order to operate a website designed with a CMS. There is a convenient "backend" where all of the administrative duties take place. The best CMS programs make this are very easy to use so anyone with basic knowledge of the system can maintain a website and keep it functional.

The "frontend" is the actual website viewed by visitors to the site. This is the end of the website you see when you search for a website and click to check a CMS website out. This is the product of all the work that goes on behind the scenes in the backend. The site administrator can create new content and plug it in at the backend so it is displayed on the frontend. It starts in the back but the final product is displayed in the front.

It is the actual process of putting that fresh content into the backend that makes a CMS website so much easier to operate for those who don't know a lot about website design. A good CMS will allow the administrator to add bold, italics and other design features to the content without actually playing with code. The backend is well designed so administrators with minimal web design experience can put in new content, add features, and keep the front end fresh and appealing without getting into the mess of coding.

A CMS website also makes life easier for web designers. They can create interesting, functional websites that their clients love in much less time than they would otherwise spend coding the website from scratch. Clients are often happier with websites built on a CMS because they can do more for themselves and aren't always paying a designer to do minor tweaks and fix problems they encounter. They enjoy being able to manage their website without the constant need to ask for a professional's help.

Many people do set up their own CMS websites by using pre-designed templates and themes on the more popular content systems, but it is always best to have a professional modify the design so it is more unique. Another reason to modify is to make sure it has all the functionality you need from your website. A professional can take a basic template or theme and turn it into a beautiful website that makes visitors want to hang around for awhile.
More aboutWhat Is a CMS Website?

Flash Design Can Make a Website Look Appealing

Posted by Unknown on Sunday, August 21, 2011

In this busy world of ours, all of us have very little time. And this seems to be true on the Internet as well. In fact, on the Internet, most people seem to be in a great hurry.
According to estimates, you just have a couple of seconds to capture the attention of a visitor to your website and please him or her. If you cannot achieve this almost instantly, the person is going to go back to the search engine, and will probably never return to your website anymore. So, it is really important that you do something special on your website, so that the visitor is captivated, and is compelled to stay back. But what can you do? Flash design can be the answer.

There are just two things at the top of a website that captures the attention of a visitor. A compelling image and a Headline. Display an attractive image, and you can be sure that the visitor will stop for a moment and take a look. But, you can do better than this. Why not make a flash movie play on load, when the person visits the page? Of course, a movie, which is just a compilation of several images, will be far more attractive than just a single image. And since you can include several images in this movie, you can be sure that the impact will be much better. The person may stop, and watch the entire movie play. The images in the movie will give him/her an idea about your business, and the products or services you are offering.

But do ensure that the flash movie loads quickly. Because if it doesn't, you will probably lose the visitor. This is really very important. The flash design must take this into account. This is really very important. If you have an expert designer working for your project, you can be sure that the person can create an appealing flash intro design, and yet, make it load quickly.

There was a time when websites with flash fared poorly at the search engine ranking pages for popular keywords. This happened because the search engine robots could not crawl through the flash file in the coding. And so, the Internet marketers always used to advise their clients not to have these flash files. If the website had flash in the Home page, it was strongly advised to remove it. But those days are now long gone. Today, the robots are much smarter. They can efficiently read these files, and so, websites that have flash files in the Home page can achieve high search engine ranks too. Thus, there are absolutely no reasons for not wanting flash.

Select a professional company to get your flash presentation prepared expertly. Ask them for their experience, ask for a few sample websites that they have worked on, and take a closer look to form your own opinion. Ask for the cost and how long they will take to do the job. If you are happy with everything, you can proceed to place your order.
More aboutFlash Design Can Make a Website Look Appealing

Using Flash Technology in Business Website to Attract Visitors

Posted by Unknown on Saturday, August 20, 2011

One of the most sought-after technologies in web development is Flash technology. This particular technology has brought a big change in the web world wherein attractive and impressive features have been introduced on the websites.

While considering the current scenario, websites are playing a major role in attracting and engaging the online visitors. Businesses are utilizing the power of their website to improve their potential to a great extent. Some businesses are also functioning virtual storefronts to help their target audience to make sale and purchase of their products and services.

Under such scenario, there is a need to make your website look different from others without compromising with the quality of content and other related factors. To give a competitive edge, Flash has been highly used in websites to give an element of interactivity to web pages. This has helped in engaging the target market to stay longer on the website as well as to entice them to return back for more information.

Many web development companies have started to offer flash development services wherein flash developers have capability to animate all contents like images, texts, illustrations etc of a website. The best part of using flash technology is that it doesn't require any software to be installed to run the website and doesn't take time in loading web pages. It has been noticed that a user spends more time over flash site in comparison to a HTML page for seeking information online.

The website owners have been using animation to grab attention of visitors by improving the graphic content. They are also combining audio, audio-video and 3D graphic features to create an interactive element for enticing the visitors online. Apart from animated and interactive features, you can also integrate sound within the website to engage the users for a longer time. This feature is very limited in other websites and can act as a feature to attract more visitors towards the website.

If you have plans to design a new site or redesign the existing site, you can take flash development services from a reliable web development company. With the growing demand, there are various companies that have established a full-fledged team to provide you quality solutions within a specific time period. You can do a quick search online to look for the best web development company that can help you to shortlist the best option for your company within your budget.

More aboutUsing Flash Technology in Business Website to Attract Visitors

How to Backup Your Mobile Phone Contacts Via Bluetooth

Posted by Unknown on Wednesday, August 17, 2011

It all depends on which mobile phone you have. There are some which can't be backed up, and others which are really easy.

STEPS

  1. Install your Bluetooth hardware and its drivers. Download the latest versions if necessary.
  2. Install the software provided by the mobile phone manufacturer. If you don't have a CD, you can download it fairly easily from the internet. Make sure you know the make and model number of your mobile phone to make your job easier.
  3. Switch on Bluetooth on your mobile phone and make sure that it can be seen by other devices.
  4. If you are using Windows XP, click on your start menu, go to control panel, then Bluetooth devices.
  5. Click on Add device and after it finishes the search, select your mobile phone.
  6. It might ask you for something called a passcode. Here, you can select any one of the options in the list. I usually prefer proceeding without a passcode.
  7. If you have selected to use a passcode, enter the same code on your mobile when asked.
  8. Once this is finished, you have successfully paired your computer and phone.
  9. Now run the mobile phone software you installed. Depending on the software, you will see options to either backup or sync your phone.

TIPS

  • Make sure your phone supports Bluetooth.
  • Make sure your computer is Bluetooth enabled.
  • Always download latest versions of drivers and software. It makes the whole thing easier
  • Bluetooth range is limited, so ensure that the phone is not far away from the computer.
  • Most lower end phone models offer no connectivity at all. Avoid these if you plan to connect it to your computer.
  • If you plan to use a passcode, remember what it is during the procedure
Source : wikihow
More aboutHow to Backup Your Mobile Phone Contacts Via Bluetooth

Norton Mobile Security protects your Android phone

Posted by Unknown on Tuesday, August 16, 2011

The app, which comes in lite and premium versions, protects against malware, phishing, theft and spam.

 

Computerworld - Worried by the spate of news stories about malware targeting Android phones and tablets? There's a way to get some peace of mind: Symantec's just-released Norton Mobile Security, which promises the same type of security for Android devices that its big brother counterpart offers for PCs. (The app was previously available as a beta.)
Norton Mobile Security comes in free and for-pay versions. The free version (which Symantec labels Lite) includes an anti-malware module and an anti-theft module that lets you remotely lock an Android device if it's lost or stolen. 



Norton Mobile Security

The for-pay version of Norton Mobile Security offers a suite of protective apps.
The malware scan is simple and straightforward. You can scan manually or have Norton scan on a daily, weekly or monthly schedule. You can also scan your SD card -- an option that's turned off by default because it may slow down your system during the scanning operation. On my Droid X, it took 15 seconds to scan normally, and one minute and 56 seconds to scan the SD card as well -- not, in my opinion, a significant difference, and a small price to pay for more complete protection.
The anti-theft lock of the free version is simple to set up. You create a password, and if you lose your phone or if it's stolen, you just send a text message to it from any phone with the word "lock" followed by your password. The phone will then be locked, and can only be unlocked when your password is entered.


For an annual fee of $29.99, you get a variety of additional features, including anti-phishing capabilities and the ability to remotely locate and wipe data from your device, remotely lock your device's SD card (as opposed to just the data in the phone itself) and block SMS messages and phone calls. (Note: In order to get the for-pay version, you have to first download the Lite version from the Android Market and then pay to upgrade.)

Remotely wiping your device, locking the SD card and remotely locating your device in the for-pay version all work like the remote lock version in the free version. You send a text message to the device with a command (for example, "locate" followed by the password) and the app does your command. 

If you need to locate your device, a text message with a link is sent back to the phone from which you're sending the text. Click the link to see the location in Google Maps. Keep in mind, though, that the location will only be as precise as your lost phone's location capabilities. So, for example, if you've got GPS turned off, the phone will find its location via triangulation techniques, which is much less precise.

You can also block SMS messages and phone calls from numbers you specify -- which, in a world in which text messaging spam is becoming increasingly common (and annoying) is a very useful feature. The process is quite simple and comes with a robust set of tools. You can enter the numbers you want to block by typing them in manually, selecting them from your contacts or (most useful of all) selecting them from your call log or SMS log. This last option is probably the most satisfactory, because it lets you block spam phone calls and texts right after you receive them.
Norton Mobile Security




Norton Mobile Security can remotely lock your Android device.
When you get a call from your blocked list , it is sent straight to your voicemail. When someone from the blocked list sends a text, it simply doesn't get to you. You can review logs of all blocked calls and SMS messages and -- if you decide you've made a mistake -- you can also easily unblock calls.
The Web protection feature, also in the for-pay version, will block you from phishing sites and sites known to harbor malware. You have the option of overriding the block when you try to visit a site, although that override will last for only 30 minutes. And it works only with the built-in Android browser, not with third-party browsers such as Dolphin.

Is it worth it? 
Do you need Norton Mobile Security -- and if so, is it worth upgrading to the $30-per-year version rather than staying with the free Lite version?

Given that malware is increasingly targeting Android, you should have an anti-malware blocker such as Norton Mobile Security on your device. The free remote lock capabilities are also useful. 

Note that Symantec isn't the only company offering these types of services. An existing product called Lookout offers a similar set of features. It has a free version that includes anti-malware protection, data backup and a phone finder that makes a siren-like noise. The for-pay version ($2.99 a month or $29.99 a year) adds remote wipe and lock along with privacy and anti-phishing features. Because the free version of Lookout doesn't include the remote lock, between the two, I'd opt for Norton.

But is it worth paying $30 a year for the premium version of Norton? That's a more difficult call. As of yet, phishing hasn't been a serious problem for Android devices, so it's not clear whether that justifies the extra cost. Remote wipe will make you feel more secure, but given that you can remotely lock your phone with the free version, it doesn't add significant extra protection. And remote locate is only as useful as the location capabilities of your phone. The SMS and phone blocker are useful, but that depends on whether you've been targeted with spam (and how many of your callers you're trying to avoid). So it's really up to you as to whether all that adds up to a worthwhile $30 per year.

However, one thing is clear: In an increasingly unsafe world for mobile devices, the free version of Norton Mobile Security is a no-brainer.

 Source : www.computerworld.com

More aboutNorton Mobile Security protects your Android phone

How to Clear Temporary Internet Files on Android Devices

Posted by Unknown on Monday, August 15, 2011

From time to time you may feel the need to clean up temporary internet files, browsing history, or cookies on your Android device to free up memory from cached information from internet browsing. To do so follow these steps:


1. Open the Internet
Open the Internet.
open the internet
2. Press the menu button. Select more.


Press the menu button.
press menu button

3. Select settings.

Select settings.
select setting

  4. Scroll to privacy configuration. Select clear cache.

Scroll to privacy configuration.
scroll to privacy configuration




5. Press OK.


Press OK.
press OK

Tips :

From the same screen you can clear your cookies and history.


Source : www.wikihow.com
More aboutHow to Clear Temporary Internet Files on Android Devices

How to Maximize the Speed of Your Internet Connection

Posted by Unknown on Saturday, August 13, 2011

This article describes how to speed up your Internet connection without use of web accelerators, and is geared towards Windows and Internet Explorer.

  • Check to see if faster internet connections are in your area. Fiber optic and cable internet tend to be faster than DSL and Dial-Up.
  • Do some basic maintenance on your PC. Run Disk Defrag, a scan disk, a virus scan, a malware scan, and clear your recycle bin. An unusually slow Internet connection experience is often the only sign that your computer is infected with viruses or other malware. Delete old files and temporary files. Never allow the free space on your C: drive to be less than 10% of the total size or twice the installed RAM (which ever is larger). A well maintained PC will operate much better than a PC that has never had any maintenance. Google or your local computer repair store should be able to help you with this if you don't know how or you can use any good system cleaner and PC optimizer tool for free such as  freeware Ccleaner or Wise Registry Cleaner and Wise Disk Cleane or purchase something. 
  • Reset Your Home Network. Sometimes restarting (or unplugging and replugging the electric power on) your home network or your router -- if you have one -- will drastically increase the speed of your connection. 
  • Check your home network equipment in general. If you have multiple computers sharing a connection, make sure all the computers are physically connected to a router or switch, and not just to a hub. Hubs are "dumb", low-level equipment, while routers are capable of prioritizing and directing traffic effectively.
  • Optimize your cache or temporary Internet files. These files improve your Internet connection performance by not downloading the same file over and over. When a web site puts their logo graphic on every page your computer only downloads a new one when it changes.
    • Caution: If you delete the temporary files (graphics and such), they must be downloaded again when you go to that site. If you disable the cache (loaded software, data), then it must be downloaded every time you view the page that uses it. This can be fixed by opening Internet Explorer, clicking on "Tools" at the top and choosing "Internet Options". On the General tab, click the "Settings" button next to Temporary Internet Files. Set a check mark for newer versions to handle downloading new versions "Automatically". Set the amount of disk space to use to 2% of your total harddisk size or 512 MB, which ever is smaller. On Firefox, click "Tools" then "Options," and go to the privacy tab. Then click on the Cache tab within this to set it to automatic.
  • If you are using a Wireless router, make sure it doesn't conflict with a cordless phone or wireless camera. Wireless routers come in three varieties; 802.11 b, g, and n (2.4Ghz) or 802.11 a (5.8Ghz) If you are using a 2.4Ghz Cordless phone and 2.4Ghz Wireless router then your Internet connection speed will slow while you use the cordless phone. The same is true of wireless security cameras. Check on your phone and camera, if it's 900Mhz then it's fine. If it says 2.4Ghz or 5.8Ghz then it could be the cause of your slow connection speed while they're in use.
  • Call your Internet service provider (ISP). Sometimes you just have bad service. They can usually tell if your connection is substandard without having a technician come to your home. Just be nice and ask.
  • Upgrade your computer. If your computer is slow, it doesn't matter how fast your Internet connection is, the whole thing will just seem slow. You can only access the Internet as fast as your PC will allow you to.
  • Upgrade your router/firewall equipment. Specifically, look into any speed specifications (many older routers are not capable of transmitting to/from the internet faster than 10 Mbps, even though the local ports transmit in 100 Mbps). Also, older routers may be underpowered, so that even though the theoretical speed is 10 Mbps, the processor on the router is too weak to reach maximum speed.
  • Upgrade your router firmware. Check the manufacturer's web site for firmware downloads for your router. Compare this with your version, and upgrade if necessary. Most routers have web interfaces for managing this, check for any labels on your router specifying default address, username and password.
  • Replace your old cable modem. Any solid-state electronics will degrade over time due to accumulated heat damage. Your broadband modem will have a harder and harder time 'concentrating' on maintaining a good connection as it gets older (signal to noise ratios will go down, and the number of resend requests for the same packet will go up). An after-market cable modem as opposed to a cable-company modem will frequently offer a better connection.
  • Often your connection speed is slow because other programs are using it. To test if other programs, such as anti-virus and other updates, are accessing the Internet without your knowing, Click Start, Click Run. Type "cmd" (without quotes). Type "netstat -b 5 > activity.txt". After a minute or so, hold down Ctrl and press C. This has created a file with a list of all programs using your Internet connection. Type activity.txt to open the file and view the program list.
  • Try pressing Ctrl-Alt-Delete simultaneously and open up the Task Manager. Go to the process menu and close those processes that may be stealing your valuable bandwidth. (NOTE: Closing processes with unknown filenames may cause known programs to not function properly). There is a column with the User Name, and if that is "System", you'd better leave it alone until you stop using the program that needs it. But if the User is your own login name, then it is not crucial to the operating system, but may be needed by other programs, however you may experiment. Often the system will not allow closing of -- or will reopen -- needed system programs.
  • After you have tried some of this try your connection again and see if it's running any faster. If it is better you may need to close those extras each time you restart your system until you set the startup list to not open them anymore.
  • If you are using satelite internet, your internet connection might be altered because of wind (vibrations) and electrical activity in/among clouds, heavy snow, or rain and lightning, static, or other electrical interference.

TIPS

Call your ISP and have them verify all of your TCP/IP settings if you are concerned. Ask them to verify that your Proxy settings are correct.

Don't expect dial up or moderate speed service to be fast. The Internet is primarily geared towards Broadband Connections, which is about 512kbs or higher Sometimes, you have to wait a little.

Download programs that make browsing faster: 

  1. Loband.org is a browser inside of a browser that loads web pages without the images.
  2. Firefox and Opera both have options to disable images.
  3. In Firefox, you can also use extensions such as NoScript that let you block scripts and plug-ins that would otherwise slow things down a lot.
  4. If you are using Internet Explorer or Firefox, try downloading Google Web Accelerator. It is meant to speed up broadband connections, but it can also slow your Internet connection. Try enabling it and disabling it and see when your Internet connection runs faster.
  5. If you are using Firefox, download the Fasterfox extension and Firetune.
  6. Reduce the amount of programs running that use your Internet connection (Instant Messengers, RSS Feeders, and MS Applications set to send Internet data)
  7. Google Accessible is designed to search pages in order of how clean they are of junk. This will bring up pages that are usually not only easy to read, but are quick to load.


Upgrade your RAM by getting more and/or faster memory. This will not only improve your regular computer use, but it will affect the speed of your Internet connection because your computer works faster.

Use the Stop button to stop loading pages once you've gotten or seen what you want.
Some times malware on your computer can eat up your bandwidth. Make sure you have an up-to-date malware protection program.

Most Internet Providers have flaky DNS servers (no citation necessary, it's a given) - so, instead of using those provided by your ISP, switch your DNS servers to use those of OpenDNS. OpenDNS is far faster, and more reliable, simply using 208.67.222.222 and 208.67.220.220 as your domain name servers will speed up most flaky DNS problems (may even speed up your networking since OpenDNS has large caches).

Look into running your own local DNS server on your network. Some newer routers may include their own nameserver, otherwise, check into AnalogX.com's FastCache program, it works great to hold commonly accessed domain names in the "cache" so that the IP addresses do not have to be looked up everytime you navigate to a new page.

Keep current, updated anti-spyware, anti-virus and firewall programs, but you can have too many toolbars trying to verify and block the same sites. This may interfere with each other, creating conflicts. Use trusted download sites such as Freeware.com, Majorgeeks.com, ZDNet.com, and Adobe.com, Mozilla.com, Real.com and such which do a scan/check for problems in programs before posting them. Use the well-known sites for utility, shareware and freeware, then the programs are very likely to be safe, free programs.

Avoid offbrand, lesser known, free-/share-ware software download-sites which "might be good", but should be checked, as best you can, as unknown ones might contain "unwanted or bad add-ons" such as viruses that may damage computers and disrupt software:
  
  • Advertising-ware (adware),
  • Spyware-trackers (often just report clicks on ads to get paid, or popup their own ads for selling something), or
  • Contain untrusted tracking-cookies,
  • Backdoor/trojan (hidden) programs, that could steal account info, identity.

WARNINGS 

Viruses and malware can often use up your bandwidth and slow down your Internet connection. Make sure you have protection against this. Many ISP's will provide software for this. Make sure your anti-virus and malware scanners are up-to-date.

Bypassing the router will leave you more vulnerable to attacks because you no longer have the built-in firewall from your router protecting you.

Watch out for scams that may popup or be found on websites that claim to check your computer or Internet to tell you how much faster it could go, for free. They are often only a scanner to report "problems", but will usually not fix them until you (pay to) register the software or get the pro-version for their promised "remedy".

Only download from the well-known free-/share-ware sites, then you may avoid programs that might do harm on your computer and/or other computers on your local network.

Source : www.wikihow.com
              
More aboutHow to Maximize the Speed of Your Internet Connection