Ads Unit

Reinstall Your Mac OS X

Posted by Unknown on Tuesday, September 27, 2011

Although rare, there are times when it is necessary to reinstall your Mac OS X operating system. With all of the different installation options this process can seem overwhelming and complicated; this article should help you make sense of the entire installation process.

Note: The steps in this article apply for version of Mac OS X up to and including Leopard. Snow Leopard has a similar process but will "Archive and Install" by default. To preform an "Erase and Install" on Snow Leopard you must erase the drive using Disk Utility before running through the installer.

Please Follow these steps carefully to prevent loss of data if you are reinstalling.

Back Up Before You Reinstall

Before performing any type of reinstallation, be sure to back up your personal files. Even when using the Archive and Install feature there is always a chance of data loss.

1. Decide on a backup location.
  • External Hard Drive: this is the preferred method as a hard drive is capable of holding large amounts of data.
  • CDs/DVDs: this is only an option if the computer is currently bootable and has a disc burner. CDs and DVDs are limited in their capacity, however, they are readily available.
  • On-line Storage: if you have an FTP server or MobileMe account you may be able to back up your files on-line.
2. Decide what to backup.
  • Personal Files: your personal files are located in your home folder. These include documents, pictures, movies, etc..
  • Applications: it is generally not recommended that you back up applications, as people have a tendency to back up all of their applications including ones they no longer use. The reinstallation may be an opportunity to get rid of some of the unused applications, as you can easily reinstall them as they are needed.
  • System Files: system files should not be backed up as they will be reinstalled during this process.
3. Enable the Root user on your computer
  • Mac OS X 10.6 Snow Leopard
    • Open Directory Utility in /System/Library/CoreServices.
    • Click the padlock icon and enter your Administrator login.
    • Select the "Edit" menu, and choose Enable Root User.
    • Choose a password for the root user and click "OK".
  • Mac OS X 10.5 Leopard
    • From the Finder's Go menu, select Utilities.
    • Open the Directory Utility.
    • Enter your administrator password and click "OK".
    • Select the "Edit" menu, and choose Enable Root User.
    • Choose a Root user password and click "OK".
  • Mac OS X 10.4 Tiger and Earlier Versions
    • From the Finder's Go menu, select Utilities.
    • Open the NetInfo Manager Utility.
    • Find and click on the lock icon on the Manager window.
    • Enter an administrator password and click "OK".
    • Select the Security menu, and choose Enable Root User.
    • Choose a Root user password and click "OK".
4. Log out of your current account.  
  • Click on the Apple icon in the top left corner of the screen.
  • Select "Log off <account name>".
5. Log in as the Root user.
  • On the log in screen click "Other".
  • Enter "Root" as the new name.
  • Enter the password you created.
6. Using the Root user, drag the files and folders you decided to preserve to your backup location
  • Personal files can be located by opening "Macintosh HD" and clicking the "Users" folder.

Select an Install Type

Mac OS X has three main reinstall types. Before you proceed it is important that you understand the differences between each. Choose carefully which type you would like to perform.

Archive and Install

  • Available in Mac OS X 10.2 and later, an Archive and Install will automatically move existing system components to a folder called "Previous System". The Archive and Install will then proceed to reinstall Mac OS X.
  • The Archive and Install will also preserve user account information and personal files. however, before proceeding with usage of the computer all software updates will need to be completed unless you are on Snow Leopard in which case the updates are preserved.

Archive and Install (Not Preserving User & Network Settings)

  • Similar to the Archive and Install method, this option will move the existing system components to a "Previous System" folder; however, it also moves the user accounts and network settings to this location.
  • If you follow this type of installation, you will need to recreate your accounts and reconfigure your network settings; however, your personal files are preserved on the hard drive and can be retrieved.

Erase and Install 

  • The Erase and Install - as its name implies - will completely erase the contents of the hard drive before reinstalling Mac OS X.

Reinstall Mac OS X

  1. Insert your Mac OS X Install DVD or Installation Disc 1.
  2. Restart the computer and hold down the letter "C" as the computer starts up.
  3. Continue to hold down the letter "C" until you see a grey screen with an Apple and a small spinning gear.
  4. Select your language on the Welcome to the Mac OS X Installer screen and click "Continue".
  5. Click "Continue" on the following screen.
  6. After reading the Software License Agreement, click "Agree".
  7. Select the volume to which you are going to install. "Macintosh HD" is the default name.
  8. Click the "Options" button in the bottom corner of the window and select your installation type.
  9. Click "OK" and then "Continue". You will be presented with a confirmation window at which point you can click "Install" to proceed.

After the Installation

After any type of installation there are a number of steps you should take to bring the computer back to a usable state.

1. Connect to the internet and run Software Updates. 

  1. Click the Apple icon in the top left of the screen.
  2. Select "Software Update"
  3. Install all available updates.
2. Run a quick Repair Disk Permissions.
  1. From the Finder's Go menu, select Utilities.
  2. Open Disk Utility.
  3. Select "Macintosh HD" on the left hand side of the window.
  4. Click "Repair Disk Permissions" and allow the scan to complete.
3. Restore any files that you backed up to the location of your choosing.
4. Reinstall any software affected by the reinstall.

Things You'll Need

  • A location to backup important files.
  • Your Mac OS X Install & Restore CD/DVD or a retail OS X Installation Disc.

Tips

  • Although the Archive and Install is the preferred method, some third-party applications, such as Microsoft Office, may need to be reinstalled as a result.
  • Always complete any official Apple Software Updates after reinstalling the operating system.

Warnings

  • Before performing any type of reinstallation, always back up your files. Even when performing an Archive and Install, errors during the installation process could result in a loss of data.
  • When performing an Archive and Install, use the installation CD for the current version of the operating system that installed on the computer. For example: If your computer came with Mac OS X 10.4 (Tiger) but you upgraded to Mac OS X 10.5 (Leopard), Archive and Install using the Leopard CD's.

 source : WikiHow

More aboutReinstall Your Mac OS X

Mantain Your Laptop Battery

Posted by Unknown on Monday, September 26, 2011

If your laptop battery quickly broken? or your laptop's battery does not last long? maybe it happens because you are less able to care for your laptop battery. The following general advice should you do with your laptop battery.

  1. Don't incinerate or expose laptop battery to excessive heat, which may result in an exposure.
  2. Don't pierce, hit, step on, crush or abuse the battery .
  3. Don't modify or disassemble the laptop battery.
  4. Don't place battery for notebook in device for a long period of time if device is not being used.
  5. Don't expose laptop battery to water or other moist matters.
Source : WikiHow
More aboutMantain Your Laptop Battery

Wireless Network Solutions: Complete Coverage When You Need It The Most

Posted by Unknown on Wednesday, September 7, 2011

As a prominent company head, you realize the importance of your employees being mobile, as they are required to attend numerous meetings and meet with clients out of the office. Today, where everything is digitalised, it becomes very important that your employees are equipped with wireless technologies. Hire wireless network expert services and ensure your employees are always connected.

For the success of your firm it is very important that your employees create an impeccable first impression. How embarrassing would it be if one your efficient executives is on a lunch meeting with one of your prospective clients and when they switch on the laptop to demonstrate your company's success, they cannot even access the internet? Certainly, not making use of the advanced standards wireless network will earn your company negative points and this could even lead to you losing out on the account.

In your bid to increase the mobility of your employees you experiment with various hasty techniques for quick solutions. However, there are increased chances of them not working for you. An added problem with installing flawless wireless network is it requires implementation of multiple procedures that complement one another, making it an extremely time consuming and rather complicated process. So how do you decide which rigorous solution will best suit your business and get you in the good books of your prospective clients?

An ideal solution is to rope in the services of an expert wireless network service, as they will assure that the WLAN is designed to become an integral and a rather logical component that contributes to your solid network infrastructure. Also ensure they offer the updated standard boost along with other fully secured wireless networks that are easy to measure and managed remotely. Thus ensuring you get better return on your investment.

As you set out to look for a proficient service provider make sure they kit your network with a highly compliant and robust wireless platform. This will help support your business's high-bandwidth applications which will help provide your employees with greater mobility. Meanwhile, it also ensures they will be able to access high volume data at all times, thus enabling your employees to deliver enhanced presentations to your clients.

Also, to avoid high internet bills and to maintain privacy it becomes very important that no one intercepts your Wi-Fi network. Nevertheless, attaining maximised security is not easy, especially with increasing incidences of hacking and data transferring by unauthorized sources. In order to control these illegitimate activities, it requires implementation of rigorous and complicated security procedures, making it a complex and an extremely time consuming task.

A reliable wireless network solutions provider understands the need for a secured network aptly and so, makes sure they deploy the latest technologies that will maximise your network's security. Also owing to their expansive experience, they are able to implement robust front line security measures for native TDM and Ethernet transmission on a single platform of your Point-to-Point and Point-to-Multipoint architectures flawlessly. Thus assuring that only authorized individuals and devices can access your company network securely.

So, to provide your employees with greater mobility and to see your business succeed beyond imagination, opt for a proficient and respectable wireless network solutions provider. Thus, ensuring Wi-Fi becomes an integral part of your network system, so that your executives get greater mobility and receive coverage securely when they most need it.

Article Source: ErzineArticles
More aboutWireless Network Solutions: Complete Coverage When You Need It The Most

How to Break a BIOS Password

Posted by Unknown

Have you ever been locked out of an old computer by a forgotten BIOS password? There's no need to get frustrated. It is relatively easy to bypass this safeguard.

STEPS
  1. Power off the computer and make sure that it is unplugged.
  2. Open up your computer case. You need physical access to the motherboard to complete this procedure.
  3. Find a circular, (mostly) silver metallic object on the motherboard. This is the CMOS battery. 
  4. CAREFULLY remove the CMOS battery, avoid touching it with your fingers, and leave it out for about 120 seconds. This will flush the CMOS memory which stores the BIOS password and all other configuration. (See Warnings) 
  5. Set the battery back into place and power on the computer. 
  6. The computer should then warn you that the CMOS configuration could not be found. You can either reconfigure it yourself or restore defaults. Restoring the default configuration should be fine. 
  7. You will notice that the BIOS password has been cleared and you can boot without it. You may reset the BIOS password to something else by going into the BIOS configuration and setting a new User Password (The Supervisor Password controls access to the BIOS, NOT the computer!)

LAPTOP

  1. Remember that laptops can be trickier, especially if it's a newer model. If it has a security chip on the motherboard forget about it. You either have to physically remove the chip or contact the mfg for the "master" password. If you can boot up off of a cd or floppy try any of these methods:
  2. Create a Win98SE bootable media "or anything that lets you boot into MS-DOS" and boot off of it.
  3. When the A:\> prompt appears type debug and press enter.
  4. You will then only see a "-".
  5. Type o 70 2E "include the spaces" and press Enter.
  6. Type o 71 ff "include the spaces" and press Enter.
  7. Type q and press Enter.
  8. Here are a list of common mfg backdoor passwords:
    • AWARD BIOS
      • AWARD SW, AWARD_SW, Award SW, AWARD PW, _award, awkward, J64, j256, j262, j332, j322, 01322222, 589589, 589721, 595595, 598598, HLT, SER, SKY_FOX, aLLy, aLLY, Condo, CONCAT, TTPTHA, aPAf, HLT, KDD, ZBAAACA, ZAAADA, ZJAAADC, djonet, %øåñòü ïpîáåëîâ%, %äåâÿòü ïpîáåëîâ%
    • AMI BIOS
      • AMI, A.M.I., AMI SW, AMI_SW, BIOS, PASSWORD, HEWITT RAND, Oder
  9. Other passwords you may try (for AMI/AWARD or other BIOSes) - LKWPETER, lkwpeter, BIOSTAR, biostar, BIOSSTAR, biosstar, ALFAROME, Syxz, Wodj gvs
  10. Dell XPS M1210 = xceaxn05
TIPS
  • If you looking for Sony PCG Series BIOS Master Password try this one: http://elektrotanya.com/?q=hu/content/sony-pcg-series-bios-master-password
  • Depending on the manufacturer of your motherboard, you may be able to use what it is called a "backdoor password" to bypass the password problem. Try looking at the external links for possible passwords.
  • Remember that passwords are Case Sensitive. The last two passwords in the AWARD BIOS list are in Russian.
  • Sometimes the bios reset jumper has a "handle" and is colored a bright color to make it easy to locate. Also, look in your case near the bottom. If it is a manufactured computer then it probably came with a little sticker with the jumpers and the location of the reset jumper.
  • If you're really stuck, the PC manufacturer can often give out a "reset password" if you can prove you are the owner. This works with Dell but they usually charge.
  • B. By Using Software:
  • I have found that BIOS/CMOS Password Recovery Tool is the most effective.:
  • BIOS/CMOS Password Recovery Tool is a program that works instantly to remove any lost or forgotten BIOS/CMOS password. Simply boot your PC to DOS and execute the program, and get access to forgotten BIOS/CMOS passwords in just seconds
  • If you want your bank account emptied and a virus installed, just go to the SCAM website:
  • BIOS/CMOS Password Recovery Tool Service: http://www.biospasswordrecovery.com/
  • Notice that they don't have any contact information (but happily says to go to the non-existent "Contact Us" page for an instant email if you have any trouble with their amazing software!) I really wish someone would prosecute the people who set up scams like that. Then again, since they rarely do prosecute, I should consider setting some up myself!
WARNINGS
  • In rare cases, the battery may be soldered into the motherboard and very difficult to remove. If this is true, you may need to find a jumper near the battery that achieves the same result. If you don't know which jumper it is, you CAN test them all. Unplug (really unplug, not just power off) the computer, and start a methodical change in all the jumpers positions, change one, count to ten, change it back, move on the next. After completing the lot of them (on older motherboards this could take a while) plug the PS back in, and boot up. You may risk damaging your computer with this procedure if you are not careful.
  • Some notebooks such as IBM's ThinkPad render useless when the BIOS password is being tried to reset.
  • Don't just start pulling jumpers on the motherboard. Make sure you know where it was and in what position in case anything goes wrong put it back.
  • If you turn your computer on and it makes strange noises / beeps, you should contact the vendor, manufacture, or a tech guy to fix it.
  • When a BIOS is locked with password, a checksum of that password is stored to a sector of the FlashROM - this is a chip on the motherboard of the laptop which also contains the BIOS and other settings. For most brands, this checksum is displayed after entering an invalid password for the third time. using this number a password can be calculated. Which is the reason this number is displayed and is the way the OEM tech support calculates a password. Dell laptops use the service tag.


More aboutHow to Break a BIOS Password

How to Build a Hackintosh

Posted by Unknown on Tuesday, September 6, 2011

A Hackintosh is a non-Apple computer which nevertheless runs OS X. You will need to buy a retail copy of OS X and breach your EULA as is your right under the legal doctrine of fair use.

STEPS
  1. Acquire OS X compatible hardware. If you want a netbook study the netbook compatibility database at BoingBoing 
  2. Purchase OS X retail for $29. 
  3. Partition a 8Gb thumb drive as Mac OS Extended filesystem type. 
  4. Copy the Install DVD image to your hard drive. 
  5. Restore the image to your thumb drive. 
  6. Install Chameleon and EFI bootloaders onto your thumb drive. 
  7. Tweak your BIOS. 
  8. Install OS X. 
  9. Study InsanelyMac, Lifehacker and OSx86 wiki for advice. 
  10. If you use a legitimate retail edition of OS X you should be able to install updates but check beforehand that they won't cause any incompatibilities.
More aboutHow to Build a Hackintosh

How To Enter Windows XP Safe Mode Using the System Configuration Utility

Posted by Unknown on Monday, September 5, 2011

Sometimes when troubleshooting a Windows XP issue, you need to enter Safe Mode. Typically, you would press the F8 key during the boot process to enter Windows XP Safe Mode but that can be very difficult in some cases depending on the problem you're having. 

This simple tip will get you into the Windows XP Safe Mode a whole lot easier using the System Configuration Utility, sometimes called "msconfig".

Here's How:
  1. Click on Start and then Run.
  2. In the text box in the Run window, type msconfig and click OK. This will open the System Configuration Utility program.
    Note: Do not make changes in the System Configuration Utility other than those outlined here to avoid causing serious system issues. This utility controls a number of startup activities other than those involved with Safe Mode.
  3. Click on the BOOT.INI tab located at the top of the System Configuration Utility window.
  4. Check the checkbox next to /SAFEBOOT and click OK.
  5. You will then be prompted to either Restart, which will restart the PC immediately, or Exit Without Restart, which will close the window and allow you to restart the PC manually.
  6. After the restart, the PC will automatically boot into Windows XP Safe Mode.
    Note: Windows XP will continue to boot into Safe Mode until the System Configuration Utility is configured to again boot normally.
  7. When your work in Safe Mode is complete, click on Start and then Run. Type msconfig in the text box and click OK.
    This will again open the System Configuration Utility program.
  8. Choose the Normal Startup radio button and click OK.
  9. You will then be prompted to either Restart, which will restart the PC immediately, or Exit Without Restart, which will close the window and allow you to restart the PC manually.
  10. After the restart, the PC will boot into Windows XP normally and will continue to do so.
 Source : about.com
More aboutHow To Enter Windows XP Safe Mode Using the System Configuration Utility

How to Become a Qualified and Professional Ethical Hacker

Posted by Unknown

In the last few decades, there's been an increasing demand for ethical hackers (also known as white hackers) as they protect the computer systems from dangerous intrusions.
Ethical hackers are technically skilled IT pros with a strong desire to solve problems and prevent malicious hackers from causing damage to network systems.
To be a professional ethical hacker you require motivation, dedication, initiative, self-education and formal training in ethical hacking.

STEPS

  1. Know about the pros and cons ! of different types of hackers, such as White Hat, Grey Hat and Black Hat hackers.
  2. Seek out job opportunities for ethical hackers. There are lucrative jobs available in government organizations, banks, financial institutions, military establishments and private companies.
  3. Analyze the basic requirements to become an ethical hacker. Try to find out the areas where will you need to work really hard.
  4. Decide the area where you would prefer to work primarily with hardware or software. Do not think of specializing in both the areas. Though knowledge of both is required but the decision will help you to know where to begin. You must be aware of every function, every component of computer on which you will have to work on. 
  5. Evaluate your strengths and interests and gain some programming knowledge such as C, or Java. These programming languages can be learned by taking formal programming courses and reading books. It will help you to read and write code. 
  6. Learn the UNIX operating system as it is regarded as the original operating system built by hackers. Also learn about Windows and Mac OS. 
  7. Take a professional course. There are a wide variety of courses available for IT security professionals in "Ethical Hacking” or “Internet Security” which would help you to expand your knowledge in ethical hacking. 
  8. Do the experiments on your own to know the actual happening of a situation. 
  9. Start experimenting with hardware and software to learn how to take control of the situations and how to prevent a computer from getting hacked. 
  10. Read on your own to know what are the areas where you need to improve and what need to be learned to refine your focus. Technology changes rapidly, and a good ethical hacker must be willing and eager to keep up with the new technological developments. 
  11. Get certified as it would help you to succeed in the vanguard of your profession. 
  12. Stay connected to the hacker community by sharing technical information and ideas.
TIPS

  • Always work within the law and never try to break it.
  • Never do it just for money.
  • Always keep learning new things.
  • Keep you focus intact in your job.
  • Don’t do it just for fun.
  • Zeal to learn new things
  • Enjoy your work
More aboutHow to Become a Qualified and Professional Ethical Hacker

How to Run Windows On a Mac

Posted by Unknown on Saturday, September 3, 2011

Not sure how to run Windows on your Mac? Here you will find helpful tips to efficiently run Windows on Mac OS X 10.5 or later. 


STEPS
  1. Turn on your Mac and log into your account.
  2. Go to the Utilities folder located under "Applications" or type "Boot Camp Assistant" into spotlight search.
  3. Launch Boot Camp Assistant.
  4. Click Continue.
  5. Decide how much space you want for your Windows partition. You can divide space equally between Mac OS and Windows, give Windows 32GB, or assign space manually using the slider.
  6. Then click Partition.
  7. Insert your 32-Bit or 64-Bit Windows XP, Windows Vista, or Windows 7 DVD into your drive and click Start Installation.
  8. Your Mac will restart and launch the Windows installer. Click continue/next. *For Windows XP click Enter then press F8*
  9. If prompted for product key enter it or leave it blank (you can enter it later).
  10. When presented with a list of partitions, select the one labeled BOOTCAMP.
  11. Format that partition and click continue.
  12. The installation process will begin. Your Mac may restart several times.
  13. Once Installation is finished and you have created a user account, insert you Mac OS X install DVD to install all of the Boot Camp drivers necessary for a smooth Windows-Mac environment.

TIPS
  • When you turn on your Mac, hold down the option key to select whether you want to boot into Mac OS X or Windows.
  • There are some Macs that can run 64-Bit versions of Windows. They are: MacBook Pro (13-inch, Mid 2009), MacBook Pro (15-inch, Early 2008) and later, MacBook Pro (17-inch, Early 2008) and later, Mac Pro (Early 2008) and later.
  • Backup important information prior to installing Windows via Boot Camp.
  • These steps require a Intel Mac, otherwise you won't have the setup app.
WARNINGS

  • You must use the Mac OS X install DVD that came with your Mac. Do not use another Mac's install DVD or a retail copy of Mac OS X. If you do, you will experience frequent crashes while under Windows.
  • Only Macs from 2009 or later support 64-Bit Windows. Do not attempt to install 64-Bit Windows on Macs that are from 2008 or earlier.
YOU MUST HAVE :
  1. Mac OS X 10.5 or Later
  2. 32-Bit or 64-Bit Windows XP, Windows Vista, or Windows 7 install DVD
Source : WikiHow
More aboutHow to Run Windows On a Mac

How to Find a Lost iPhone

Posted by Unknown

Losing an iPhone isn't just about the expense involved, which is considerable enough. It's also about the personal data, your iTunes account, and your photos, and all the hours you've already spent perfecting its contents to the way you want them. And it's never pleasant to lose a gadget. Here are some ways to find your lost iPhone again.




STEPS

Use MobileMe. This is the most direct route as it doesn't require borrowing someone else's phone to download an app. You do, however, need access to a computer.

Use "Find My iPhone" via MobileMe. This is a free app, although you must have a subscription to MobileMe or an iPhone 4, iPad or iPod Touch 4G with the most recent iOS 4.2 updates, where the Find My iPhone feature of MobileMe is now free of charge. This method works on the built-in GPS chips, and can also be used to locate a lost iPad or iPod (via Wi-Fi in the case of the iPod Touch).[1] You'll need to have MobileMe configured on your iPhone, and the Location Services feature will need to have been turned on on the lost iPhone (go to "Settings", then "General", then "Location Services").
              
  • Install the Find My iPhone application on another iPhone, an iPod Touch, or an iPad. Ask a family member or a friend to use their i-gadget if you don't have any other devices you can access.
  • Sign in to the Find My iPhone app using your MobileMe name and password. The application locates your iPhone; it will also show you the location of your phone on a map.
  • Set a display message or make your iPhone play a sound. The sound can be used to draw the attention of the person who has your phone, enabling them to check the message you're sending (it lasts for 2 minutes). Send a message with information on how to return the phone. This will show up on your iPhone's screen.
  • Lock your phone remotely. This way, other people cannot use your phone without knowing the passcode.
  • Wipe your phone of all personal information remotely. Doing this will get rid of all your personal texts, phone history, contacts, etc. permanently. Since this is a pretty drastic option, only use this feature if you don't think you'll be able to get your phone back.
Install an application on your iPhone called "If Found". If Found lets you create a background wallpaper that shows your contact details that lets an honest finder contact you by another means (such as your home phone). Naturally, you'll need to add this before you have the misfortune of losing your phone but it makes it very simple for even a non-iPhone owning person who finds your phone to find a way to get in touch with you without having to scroll through your data and maybe never work out who you are. (Note that you need to purchase If Found but the cost is minimal.)








Use iHound. This is a free program that alerts you the moment your iPhone is plugged into a computer. This means that you'll receive an email letting you know that your tracked iPhone has been located, along with a detailed report on where it is being used. This is a good additional measure for where the iPhone gets turned off but is later plugged in to change or upload software, etc.

  • iHound lets you sound an alarm to help you find the iPhone in case it's slipped down the back of sofa, etc.
  • iHound lets you use geofencing location alerts. These are alerts and check-ins that work automatically with Facebook, Foursquare, or Twitter when you arrive at locations.
Use iLocalis. This lets you log in to the website to find your missing iPhone. You can also log in and send yourself a message. If the sim card has been changed, you'll also be able to get the thief's new phone number. This software requires a jailbroken iPhone.







Check local police stations and lost property stations in the vicinity of where you lost your iPhone. You might be pleasantly surprised to find that someone has handed in your phone, and even if they haven't, leave your details as there may be a delay in processing or turning in. The amount of lost items not ever collected from police or lost-property is enormous – just visit police auctions!
  • Think laterally. Although you may have lost your iPhone in one borough or suburb, a person finding it might use a police station of a borough or suburb nearest to their own home, especially if in a hurry or not able to locate the one where they found the phone. Ask how you can check stations outside your area as well.
Use social media. You never know - letting people know via Twitter or Facebook that your phone's gone missing may return dividends if someone who follows your pages or has befriended you online stumbles across it. It's a long shot but friends of friends of friends are sometimes a good way to find something lost.
  • You can use Twitter to keep a track of your iPhone. Create an account just for your iPhone and a separate email address of its own. Protect the Twitter account so that only you, or a limited number of people such as your spouse or business partner, can see the account. Then set up your iPhone to tweet in on a regular basis. Install a program called "FindMe"; it will be able to use the tweets to this Twitter account to tell you the GSM tower's cell ID, as well as the latitude and longitude using Google maps. 
Take good care of your iPhone and try not to lose it again. Losing an iPhone and never retrieving it again is an expensive and potentially personally exposing experience. Do your best to avoid losing it again by following these suggestions:
  • Always double-check that you have your iPhone on you before leaving any place - cafes, restaurants, business meetings, other people's houses, museums, the opera, etc. Just get into a habit of looking for it before you leave.
  • Keep your iPhone somewhere safe at all times. Losing the iPhone is easier if you haven't been careful about where you keep it. Bags that let the contents fall out easily, pockets that tip when you move, and leaving it unattended while swimming or doing laps around the track, etc., are ways of asking for trouble. Secure the iPhone in a good carrying item or lock it up when you're pursuing outdoor or sporting activities, so that you don't need to worry about it.

Source : WikiHow
More aboutHow to Find a Lost iPhone

How to Jailbreak an iPhone 4 I.O.S 4.2.1 With Greenpoison

Posted by Unknown on Thursday, September 1, 2011

Prerequisite :  -Have this iDevice : Iphone 4 with firmware 4.2.1.
Download Greenpoison here

 

 STEPS

  1. Unzip the archive gp_win_rc5_b2.zip
  2. Connect the iPhone and switch off it.
  3. Click Prepare to jailbreak DFU.
  4. Follow the procedure:-Press 2 seconds on the button Power. 
  5. Then without releasing(leaving) the button to power,  maintain the button home during 10 seconds.-Then relaunch the button Power and remain  press on the button home during 15 seconds.
  6. If the Ready to jailbreak message appears, then  click to Jailbreak
  7. The jailbreak start, the screen becomes quite white 2 seconds then writings on a black background appear.
  8. Click Quit at the end.
  9. When the menu of the iPhone reappears, look for the Loader application and  install Cydia

TIPS

If the Try Again message appears then you are not correctly spent in mode(fashion) DFU. Put out(switch off) the iPhone and restart.

WARNINGS

As usual, there is a risk of having to restore if Jailbreak happens badly. It is  very important to make a complete saving of the iDevice before beginning the manipulation.

Source : WikiHow
More aboutHow to Jailbreak an iPhone 4 I.O.S 4.2.1 With Greenpoison

Kartu Lebaran

Posted by Unknown

Untuk ArlojiSapi.
Selamat Hari Raya Idul Fitri 1432H...
Minal Aidzin Walfaidzin...
Mohon Maaf Lahir dan Batin..



Maaf,aku ga ikut bukber kemarin...
aku nyesel ga ikut... T.T
More aboutKartu Lebaran