Network Configuration with NetSetMan Download

If you frequent the Internet connection in different places and with different configurations, we may often be bothered when I have to fiddle IP address (Internet Protocol), Subnet Mask, DNS, Gateway and others. To facilitate this, we can use NetSetMan.

To be able to connect to the internet at home, at school, at work or elsewhere sometimes the network settings (network) is not the same, and not infrequently we have to manually change the IP address. With NetSetMan free software, we can speed up all these processes, and stayed just one click to customize the network configuration on the site selected.

This software provides six settings (profiles) that can be set, for example, the first setting for connection at home, setting 2 for the office, setting 3 for the campus and so on. When we want to connect the internet we just choose the profile that we have set and click Activate. After setting off, we can close this application. In this way we do not need to manually change the IP address configuration.


Network Configuration with NetSetMan

Once we fill the IP address configuration, the data will automatically be stored (in the file setting.ini) and we can move this file or the backup separately. Several configurations can be set with NetSetMan among others:

  • Address IP (Internet Protocol)
  • Gateway
  • DNS Servers
  • WINS Server
  • IPv4 dan IPv6
  • WiFI management
  • Nama Komputer
  • Workgroup
  • DNS Domain/Suffix
  • Default Printer
  • Network Drives
  • NIC Status
  • SMTP Server
  • Hosts File Entries
  • Scripts (BAT, VS, JS, ..)

NetSetMan I have been using so far and very helpful and speed up when it should be connected in different places and each with an IP address that must be set manually. NetSetMan supports Windows 2000, XP, 2003, Vista, 2008 and Windows 7 (either for 32bit and 64bit).

Area Download

NetSetMan Full


Read More

Download Full Document ToGo android

 More info on Full Version Features…

• Word To Go includes rich formatting features including bold, italics, underline, font color, alignment, bulleted and numbered lists, tables, bookmarks, comments, footnotes, endnotes, track-changes, word count, find & replace, etc.

• Sheet To Go offers powerful data computation with support for 111 functions, cell, number and sheet formatting, row and column preferences, auto-fit options, freeze panes, sort, cut, copy, paste, undo, redo, charting, etc.

• Slideshow To Go allows you to effortlessly “flick” through slides, review notes, rehearse timing and make last minute modifications to presentations when on the go.

• PDF To Go provides high-fidelity viewing of important reference materials with options for page view, word wrap, auto-rotate, bookmarks, search, select and copy text, and more...

• Google Docs Support Download, view and edit your files from your Google Docs account directly in Docs To Go. Any changes you make can be saved and synchronized back to Google Docs so that you'll always have the most up-to-date version. You can even create new files in Docs To Go and upload them immediately to your account.

• Desktop Synchronization: Transfer your files from your Windows PC to your Android device over USB. Any edits made in either location will automatically sync and 100% of the original file formatting will be maintained via our Intact Technology.

• Total access with support for attachments, password-protected files, built-in file browser, memory card support, and new Live Folder for recently used documents
•  Localized in English, French, Italian, German, Spanish, Portuguese, Brazilian Portuguese, Japanese, Turkish, Russian, Polish, Czech and Arabic and traditional and simplified Chinese

Why choose Documents To Go?
• Full featured Documents To Go is not just a viewer, it's a complete solution with a full range of viewing AND editing features. Simply unlock premium features by purchasing the 'Full Version Key' from the Android Market.

• First to market Documents To Go is the first mobile Office suite for Android that supports editing of native Microsoft Word, Excel & PowerPoint files!

• Powered by InTact Technology. DataViz' acclaimed technology ensures all original file formatting is retained once a file has been edited on an Android device and then forwarded on.

• Send & receive attachments. Documents To Go is tightly integrated with Gmail and other e-mail applications like RoadSync for quick and easy native attachment downloading and sending.

• Native. Open Word and Excel files on your Android phone without any desktop or server conversion needed.


Document ToGo android Full Version White Keygen

From http://www.mediafire.com/
Read More

Free Download RegVac Registry Cleaner 5 Full Version

RegVac is a System Registry cleaner consisting a lot of different tools to clean up unnecessary registry entries and broken. This utility cleans your registry, history lists, recent lists and tips. RegVac Registry Cleaner also removes 27 of the most common stashes and allows you to add more locations for the clean up. RegVac Registry Cleaner found a key and a list of files that may be left over from deleted files, and then delete them. RegVac Registry Cleaner has 6 cleaners, 3 editors, and 7 tools that can clean the registry, speed up your computer, avoid computer crashes, and repair Windows and applications.

A powerful cleanser of the other registry cleaners. Some of the tools in RegVac are not available anywhere else. Novice and Expert modes. Automation. Easy to use. Registry Backup, Pack, and Restore. Robo Vac is a bonus tool that with one click can clean up to four sections: Classes, Software, Stash, and File Lists. Robo Scrubber can be set to run on startup daily, weekly, biweekly, or monthly.

Performance obtained after using RegVac Registry Cleaner :

- Speed up your Computer
- Avoid Computer Crashes
- Get your Registry Sparkling Clean
- Repair Windows and Applications

Existing tools in RegVac Registry Cleaner

- System Configuration Utility
- Software Cleanup
- Registry Pack
- PC Optimizer
- Monitor
- Registry Backup
- Registry Restore

Click image below to get it ...

Read More

Extract the PDF document with a 7-PDF Split & Merge

With the application or software 7-PDF Split & Merge you can easily and quickly dismantle the PDF documents stored on your PC. Interesting application is also equipped with several options that you can use, such as breaking a PDF document based on the desired page or combine them into one of a number of PDF documents you have.


Mozilla Firefox 7


To split a PDF document into several sections or you can combine the two tabs that are available to access the tab "Split PDF File" and "Merge PDF Files". The second tab has a variety of configurations to choose from.

- Through the "Save program settings" you can quickly edit a PDF document in the same way.

- Through the website of manufacturer you can also download 7-PDF Split & Merge portable version for the store in flasdisk.

This application can be used in Windows XP/Vista/7

AREA DOWNLOAD

Download 7-PDF Split Merge

via http://www.mediafire.com/

sumber dedepurnama.blogspot.com whit translate
Read More

Download Free Resident Evil 3 Nemesis

game Resident Evil 3 Nemesis untuk PC, silahkan aja langsung di cek,,

Screenshot game Resident Evil 3 Nemesis :

Resident Evil 3 Nemesis
Resident Evil 3 Nemesis
Resident Evil 3 Nemesis
Resident Evil 3 Nemesis
Cara Install Resident Evil 3 Nemesis :
Karena file instalasi Resident Evil 3 Nemesis berbentuk image (.bin/.cue) maka sebelum melakukan instalasi saya mount dahulu file tersebut menggunakan DaemonTools Pro. Anda bisa mount file .bin nya atau .cue nya. Selanjutnya akan ada semacam drive virtual (lihat gambar), lalu klik 2 x setup.exe.


install resident evil 3

System Requirement :
  • Processor: Pentium 2 @ 233 MHz
  • Memory: 48 Mb
  • Hard Drive: 400 Mb free
  • Video Card: Bit Color @ 640x480 Resolution
  • Sound Card: DirectX Compatible
  • DirectX: 6.1
  • Keyboard
  • Mouse
  • DVD Rom Drive
Oiya, game bisa dimainkan dengan menggunakan keyboard atau joystik. Untuk menggunakan joystik, anda bisa melakukan setting dengan menekan tombol " F5 ", kemudian masuk ke tab "control".


Download

Resident Evil 3 Nemesis

For PC via mediafire.com :

Part1 | Part2 | Part3 ||

sumber : http://www.remo-xp.com/
Read More

Free Download Wireless Network Watcher

After searching I finally found this software. Incidentally in the house there is a Wi Fi, and I wanted to have software that can monitor who is connected to the network. It's nothing to fear there are not responsible for joining ..

Wireless Network Watcher is a software that works for displaying computer or other devices that connect to our network. All computers or devices connected in a network we will be shown its IP and MAC address, hardware manufacturers and computer name if any. So we will know whether a computer or other devices that belong to us or the property of others.

So for those of you who also need this software please download below.


Download Wireless Network Watcher

sumber : http://akhdian.net
Read More

15 Tools Ways Hackers Penetrate Homepage.

The way how a hacker to penetrate or infiltrate and destroy a site is as follows :

1. IP Spoofing
IP spoofing is also known as the Source Address Spoofing, namely forgery attacker's IP address so the IP address of the attacker considers the target is the IP address of the host in the network rather than from outside the network. Suppose the attacker has a type A 66.25.xx.xx IP address when the attackers do this type of attack the network that attacked the attacker will assume the IP is part of networknya 192.xx.xx.xx eg, IP type C.

IP Spoofing terjadi ketika seorang attacker  packet routing untuk mengubah arah dari data atau transmisi ke tujuan yang berbeda. Packet untuk routing biasanya di transmisikan secara transparan dan jelas sehingga membuat attacker dengan mudah untuk memodifikasi asal data ataupun tujuan dari data. Teknik ini bukan hanya dipakai oleh attacker tetapi juga dipakai oleh para security profesional untuk men tracing identitas dari para attacker

2. Attack FTP
One of the attacks carried out against the File Transfer Protocol is a buffer overflow attack caused by malformed command. The purpose of this attack the FTP server the average is to get a command shell or to perform Denial of Service. Denial Of Service attacks may eventually lead to a user or attacker to retrieve the resource in the network without authorization, while the command shell can make an attacker gain access to the server system and data files that eventually an anonymous attacker could create a root-acces who have the right full against a system even the network being attacked.

3. Finger Unix Exploits.
In the early days of Internet, Unix OS finger utility efficiently used to download information sharing among users. Due to demand information on the information this finger does not blame the rules, many system administrators leave this utility (finger) with a very minimal security, even with no security at all. For an attacker is invaluable utility for information on footprinting, including login names and contact information.

This utility also provides excellent information about user activity within the system, how long a user is in the system and how much users care system. Information generated from this finger can minimize Kracker efforts in penetrating a system. Personal information about users who raised the finger daemon is already enough for a atacker to do social engineering by using social skillnya to utilize the user to "tell" your passwords and access codes to the system.

4. Flooding & Broadcasting.
An attacker can reduce the speed of networks and hosts that are in it significantly by continuing to perform request / demand for an information from servers that can handle the classic attacks Denial of Service (DoS), send a request to a port called excessive flooding, sometimes this is also called spraying. The purpose of this second attack is the same that make network resource that provides information becomes weak and finally gave up.

Flooding Attacks by way depends on two factors: the size and / or volume (size and / or volume). An attacker can cause Denial Of Service by throwing large capacity files or large volumes of small packets to a system. In such circumstances the network server will face congestion: too much information requested and not enough power to push the data to run. Basically a large package which requires greater processing capacity, but it is not normal and the same small package in a large volume of resources will be spent in vain, and the resulting congestion

5. Fragmented Packet Attacks

Internet data is transmitted via TCP / IP can be further divided into packages that contain only the first packet whose contents form a major part of information (header / head) of TCP. Some firewalls will allow to process part of the packages do not contain information on the packet source address first, this will result in some type of system to crash. For example, the NT server will be a crash if the packets are broken up (fragmented packet) enough information to rewrite the first packet of a protocol

6. E-mail Exploits.
Peng-exploitasian e-mails occurred in five forms namely: Floods mail, manipulation commands (command manipulation), the attack rate of transport (transport-level attack), enter the various codes (inserting malicious code) and social engineering (utilizing socialization physically). E-mail attack could cause the system to crash, open and execute even rewriting applications or files also make access to command functions (command function).

7. DNS and BIND Vulnerabilities.
Recent news about the vulnerability (vulnerabilities) on the application Berkeley Internet Name Domain (BIND) in various versions illustrate the fragility of the Domain Name System (DNS), which is a crisis that is directed at the basic operation of the Internet (basic Internet operation).

8. Password Attacks.
Password is a common thing when we talk about security. Sometimes a user does not care about the pin number they have, such as online transaction in the cafe, even transact online at home was extremely dangerous if not equipped with security software such as SSL and PGP. Password security is one procedure that is very difficult to attack, an attacker may have many tools (technically or in social life) only to open something that is protected by a password.

9. Proxy Server Attacks.
One function of proxy servers is to speed up response time by bringing together processes from multiple hosts in a trusted network.

10. Remote Command Processing Attacks
Trusted Relationship between two or more host facilities provide information exchange and resource sharing. Similar to a proxy server, trusted relationships give all members equal access to power networks at one and the other system (the network).

11. Remote File System Attack.
The protocols for data transport (backbone of the Internet) is the level of TCP (TCP level) with a mechanism that has the ability to read / write (read / write) between the network and host. Attacker can easily get trace information from this mechanism to gain access to the directory file.

12. Selective Program Insertions
Selective Program Insertions are done when the attacker attacks put destroyer programs, such as viruses, worms and trojans (maybe the term is already familiar to you?) On the target system. Destroyer programs are often also called malware. These programs have the ability to damage the system, file destruction, theft of passwords to open up a backdoor.

13. Port Scanning.
Through port scanning an attacker could see the functions and how to survive a system from a variety of ports. A atacker can get access to the system through an unprotected port. example, scanning can be used to determine where the default SNMP strings in the open to the public, which means information can be extracted for use in remote command attack.

14. TCP / IP Sequence stealing, Passive Listening Port and Packet.
Interception TCP / IP Sequence stealing, Passive Listening Port and Packet Interception walk to collect sensitive information to access the network. Unlike active attack or brute-force attacks that use this method to have more stealth-like qualities.

15. HTTPD Attacks.
Vulnerabilities contained in HTTPD webserver or there are five kinds: buffer overflows, bypasses httpd, cross scripting, web code vulnerabilities, and the URL Floods.


sumber : http://www.i-dus.com/
Read More

Free Download Microsoft .NET Framework 4

Microsoft NET Framework or Microsoft Dot Net Framework is a component that can be added to the Microsoft Windows Operating System or integrated in Windows to complete the Windows System. NET Framework provides a large number of solutions on programs or software to meet program requirements or a new application that requires NET Framework.

.NET Framework is the key to a program that works for Microsoft, and intended to be used by applications created for the Windows platform. So sometimes, there are applications that can not be executed because we do not have Microsoft Net Framework on Operating Systems that we have.


.NET Framework is usually considered as a platform, which is a program or application that is integrated for the development and execution of each type of programming language and libraries, to cooperate with one another in order to build and run Windows-based applications, so they are easy to create, manage , distribute, and integrate with other networked systems.

Microsoft NET Framework 4
NET Framework 4 is compatible with applications built with previous versions of NET Framework 1, 2, 3. Except for some changes made to improve security, standards compliance, accuracy, reliability, and performance.

.NET Framework version 4 support in Windows 7, Windows Server 2003 R2; Windows Server 2003 SP2, Windows Server 2008 R2; Windows Server 2008 SP2, Windows Vista SP 2, Windows XP SP3, Windows Server 2003 SP2, Windows Vista SP1 or later new. Click below to get .NET Framework version 4

Download .NET Framework 4
Read More

Fixing HDD Bad Sector

When important data on your hard drive has been successfully saved, the next step is to overcome or fix bad sector hard drive there. While not all bad sectors can be improved (especially if it's why physical damage), to bad sectors that light, we can overcome with one of the following ways:

  • Scan Disk Using the default Windows tools. To drive in addition to the operating system (eg drive D:, E: etc.), we can just right-click the driver via Windows Explorer> Properties and from the Tools tab, the Error-checking click Check Now ..
  • Other than through the Windows Explorer we can also directly through the command prompt (DOS) memalui command ChkDsk /R X: (please replace the X with the drive that you want to fix / check if there are bad sectors it).
  • Full format of the drive (remember, when a full format, then the data in it will be lost and may not be in recovery again), either through windows or by software such as Easeus Partition Master. With software such as EASEUS process faster
  • When the Scandisk or Full format also can not remove bad sectors, we can use the Low Level Format (effect data will not be in recovery again). Low level format with this software can only be for a single hard disk, not per drive, so that the entire contents of hard drives will be in the "putihkan" aka really dikosongi again.
  • Using the software "advanced" DOS-based, such as Active Kill Disk, HDAT2, DiskWipe, MHDD and so on. For those not familiar with disk problems, may need to guide the more familiar use of such software.
  • Using the software maker built the hard drive. Can be checked directly on the website such as hard drive makers Seagate, Western Digital, Maxtor, Hitachi, Samsung and others.

In this way, two PCs are my important data service successful in recovery. For a desktop computer hard drive, with a full format of plain bad sectors can be lost, while untul notebook hard drive, due to bad sectors seem quite severe and very much, finally not be repaired anymore, so it must be replace with a new hard drive.
When some ways above the hard drive still remains defective or there are bad sectors, the possibility of hard drive damage is severe (could be damage to the surface / physical), and it seems like it should be replace with a new hard drive. Hopefully the above tips can help some who are experiencing problems or bad sectors as additional information for us, if any input, questions about this issue please be submitted via the comments or direct email.
Read More

Secure the data on the HDD

One of the biggest challenges when hard drives (there are bad sectors) is to save data or documents therein. Moreover, typically users rarely perform data backups to other media such as CDs or DVDs. To facilitate the rescue process (recovery) of existing data on the hard drive, plug the hard drive on another computer. Provided the hard disk is still detected, the possibility of data recovery can still be performed.

When the disk is mounted on another computer and it is detected, use recovery software that we can get on the internet. A good one is Easeus Data Recovery Wizard. With this software I was able to save data from the hard drive is already quite severe. Other software that we can use is MiniTool Data Recovery Wizard.

If no other computer or laptop, can we try to save the data through a medium such as a bootable CD / USB (Live CD) which contains a utility or program that can be used to check and rescue (recovery) data. Today many that we can use, such as Ultimate Boot CD, UBCD4Win, System RescueCD, Wondershare Live CD, Mini PE, Ubuntu Linux CDs and the like.
If the hard drive no longer detected when installed on another computer, then the recovery process is not an easy job. Because the possibility of having to open the hard drive and requires skill and special equipment. I myself have never been to such a recovery.
Read More

Free Webcam 7 PRO Download

Webcam 7 PRO 0.9.9.12 Build 34121 | webcam 7 is a powerful webcams and network cameras monitoring, recording and streaming software for private and professional use. it offers unique features and unequaled ease of use to let you manage multiple video sources on the samecomputer. It is the ideal tool to secure your goods and keep an eye on them remotely from your phone or over internet.


Webcam 7 is a brand new product based on webcamXP.
The user interface is the same however it offers exciting enhancements such as :
Flash Video (FLV) audio and video streaming (high frame rate for low bandwidth)
MJPEG recording with audio support.
This version is ideal for putting live webcam on your web page and is robust for 24/7 broadcasting. Supports a single video source.

Webcam 7 Free is the basic product for home-users. It lets you to stream via HTTP, Windows Media or to upload via FTP/FTPS or HTTP/HTTPS Post. It also lets you add overlays / watermarks over your video streams and the basicfeatures such as capturing or recording at fixed interval. This version is ideal for putting live webcam on your web page and is robust for 24/7 broadcasting. Supports a single video source.

Webcam 7 Private is already more advanced and beside the multiple video sources support is also offers the possibility to filter by IP and to manage who can access your video streams smartly. You can limit users in view time and don't have to worry about your privacy. Supports up to 5 video sources.


Webcam 7 PRO is the most advanced version of the software. It has all the features of the Privateversion and supports and includes the motion detector (optical and/or acoustic detectors), the advanced alerts manager, the ability to log traffic to files and the digital video recorder (permanent recording). It's the perfect solution for advanced security purposes at low cost. Supports unlimited number of video sources.

It is now available for beta testing and you can install it even if webcamXP is already installed, it will use its own settings, the only part in common is the IP Camera Directshow filter.
If you have a webcam XP license issued less than 2 years ago then you are entitled to use webcam 7 PRO. a free single source mode and the PRO trial mode are also enabled.


Supported devices:
  • usb webcams (WDM driver required)
  • tv, analog or multi-input capture cards (WDM driver required)
  • ip cameras (JPEG/MJPEG/MPEG4)
  • Windows Media streams (ASF)
  • local video files (AVI/WMV/MP4/MOV/...)

Supported streaming modes:
  • still jpeg images for low-tech devices
  • flash client (compatible with most operating systems and handheld devices)
  • javascript clients (MJPEG or JPEG PUSH)
  • Windows Media streaming


Additional key features:
  • run as service new !
  • local and remote pan and tilt control (Logitech Orbit, Creative LiveMotion! and IP cameras).
  • supports FTP/FTPS and HTTP/HTTPS Post
  • motion detector (optical or acoustic) with many possible ways to handle alerts (local recording, ftp, http post, launch external applications)
  • advanced users manager to grant limited or unlimited access.
  • overlay editor supporting picture in picture, animated gifs, alpha-blending and text editor.
  • DVR (permanent recording deleted after X hours)
WebCam 7 Pro

Thx to : http://sofwergratis.blogspot.com/
    Read More

    Bieber, BlackBerry Improve RI-Canada Ties

    VIVAnews – Canadian Ambassador to Indonesia Mackenzie Clugston acknowledged being satisfied to see the bettering trade and economic relations between his countries and Indonesia. He reckoned that the enhanced bilateral ties were due to two factors, BlackBerry and Justin Bieber.

    "Indonesia is our biggest trading partner in Southeast Asia, and two-way trade and investment continue to expand. Canada continues to supply two items of utmost importance to Indonesians’ daily lives – wheat for noodles and Blackberries," said Clugston, referring to Canadian smartphone product which is popular among Indonesia’s cellphone users.

    Clugston made the statement on the occasion of commemorating 144th Canada Day on July 1, 2011. The celebration took place in a hotel in Jakarta, Thursday evening.

    Clugston said that those two products contributed to the increasing Indonesia-Canada trade relation. “The trade volume of the two countries up to now is more or less US$2.2 billion. Indonesia gained surplus, Canada gained revenues of about US$1 billion while Indonesia US$1.2 billion,” said Clugston answering VIVAnews' question.

    The ambassador that has been posted in Jakarta for more than two years also said that some Canadian companies--industrial, financial and service have already steady business in Indonesia. “Indonesia represents a growing market for Canada’s goods, service and investment. A lot of our companies have come to Indonesia and employed tens of thousands of Indonesians,” said Clugston.

    The two countries also nourish partnership in other sectors, including anti-terrorism, state administration, human rights, pluralism and poverty reduction. "New projects in the past year are focussing on areas such as helping Indonesians in Sulawesi restore mangroves and improve the livelihoods of farmers," said Clugston.

    He also reminded that the bilateral ties were recently enhanced through the visit of two Canadian high-rank officials to Indonesia. They are Finance Minister Jim Flaherty and Agriculture Minister Gerry Ritz. Along with Indonesian officials, they talked about enhancing the bilateral ties in financial service and agricultural industry.

    Yet, there was another visit of a person who is more charming. " And who can forget Justin Bieber? We expect many more in the coming months," said Clugston, referring to the teenage star who held a concert in Sentul recently.
    Read More

    Tips For Android Phone's Battery Long Lasting

    Classical problems which are frequently encountered by owners of smart phones, including the Battery Android drop or quickly exhausted. No matter what operating system you are using the problem is running out of batteries every day which is always a constraint, especially if the phone is connected to the internet.

    For those users of Android phones, here are some tips you can do to save your battery Android smart phones:

    1. Close all applications that are not used with the Back button
    2. Uninstall unnecessary applications. Because there are few applications that will perform automatic updates without us knowing it.
    3. If the push e-mail address is not required, turn off the Auto Sync feature in the settings Android. And if that is needed to synchronize manually, the trick is to go to Settings - Wireless & Networks - Mobile Networks, and then unmark the "Data Traffic"
    4. Turn off WiFi when not in use. On Android phones, even though you've closed the application, but Wifi is still able to walk and not be seen. And that's what makes the battery run out quickly. To ensure the application is closed, go to Settings - Application and select the applications you want on the lid or turn off
    5. Turn off the widget that does not need to save baterai. go to Sound & Display Settings, and then uncheck the Orientation, and the Animation set to "no animation". Do not forget to adjust the screen timeout value to shut down quickly and the screen backlight level on the Android smart phone.
    6. Download and install applications for Android Battery Manager. One of the applications that you can use is a Juice Defender in the Android Market. This application provides a wide selection of settings, ranging from normal, aggressive, for extreme accommodation to keep your android mobile phone batteries remain alive.
    Read More

    Classic Menu For Office 2007 | Ubitmenu Downoad

    Ubitmenu : Classic Menu for Office 2007 / Office 2010 - To be honest, when first installing office 2007 a little startled to see his new menu display. Imagine, a menu found on the Office 2007 is completely different 100% from the previous version of Office 2003. Therefore we must learn from scratch again to get to know the menus found in Office 2007.

    For those of you who use Office 2007 or Office 2010 but want to display its menu like Office 2003, there is one Add-ins that can make the menu at the ofice office 2003 2007 / 2010 office name is UbitMenu. UbitMenu able to add a menu that looks similar to Office 2003 either in Microsoft Word, Microsoft Excel and Microsoft PowerPoint.

    UbitMenu you can download for free, but for personal use or for the trial version only. To use the agency or office should pay for the license. UbitMenu file is not too large, only about 336 KB.

    Who are interested, please direct to the provider sites in http://j.gs/402913/ubitmenu.

    Hopefully with this menu, you do not spin. But surely we must also learn to display a new menu that is on Office 2007 or 2010.
    Read More

    Antivirus for the iPad, iPhone and Android

    To protect consumers in a variety of locations, platforms, devices and digital experiences, presenting Symantec Norton Internet Security and Norton Anti Virus 2012. The product is claimed to support mobile devices and tablets, both the Android platform and the IOS.

    "The last few years, the number of devices, platforms and applications explode, the need to be protected from cyber crime too great," said Janice Chaffin, Group President of Symantec's Consumer Business Unit, in Jakarta, 22 September 2011.

    Norton AntiVirus and Norton Internet Security 2012, Chaffin claims, offers the security that goes beyond the traditional Internet security, namely the ability to find your laptop or your Android device is lost or stolen.

    "Norton Security 2012 is also equipped with security locks, including Identy Norton Safe in The Cloud that protects personal and financial information," said Chaffin. "He was also able to maintain the security of the web fake, can store passwords in clouds, and can be accessed from any PC that has been installed Norton Security 2012," he said.


    Security when users download from the internet is provided by feature Download the Insight that checks each file to be downloaded. With Sonar, users can monitor the applications that run rapidly to mendetekasi suspicious behavior and disable it.

    This product supports Microsoft Windows XP, Vista, and Windows 7 and are available at retailers and online stores Norton. For protection for a year for three PCs, the charge is Rp420 thousand. As for a PC, the tariff is 150 thousand.
    Read More

    Download Simple Performance Boost

    Simple Performance Boost is an application or software designed to Improve Performance of Windows and most secure way to tweak your system to improve speed and stability of your Windows. Windows setup using the default configuration. By fine tuning your Windows setup can improve the speed and snappiness of your Windows operating system.
    This tweak is safe and proven software that does not cause side effects on other programs that exist in your windows. Every tweak just give a small performance boost. But they all add speed, so much the performance of Windows that you will get.


    Simple Performance Boost can run on Windows XP, 2003, Vista, 7, 8, 2008
    There are 4 view (tab) provided: Welcome, General Tweaks, Tweaks Networking & Service and Visual Tweaks. Start of Welcome, we can just click Next, Next to the end and kQ Apply Tweak it, after that restart and see how the optimization that we get. But here are some general explanation of each tab are available:
    1. Welcome, contains only preliminary only, and the "Open Backup File Location" to restore the settings to a previous state through a data backup that was made.
    2. General Tweaks, contains various general optimization, from memory, the Boot / Shutdown, files or hard disk optimization, as well as some other optimizations. Illustrate the details of each option can be found at the bottom when the cursor / mouse is moved on the option.
    3. Networking Tweaks: contains the optimization associated with the network (network). Service Tweaks: contains optimization service windows such as: disable pengindex activate the search (which just worsens the performance of the system), help services, and other
    4. Visual Tweaks: unbiased optimization-related problems or the effects of display windows. If you want high performance and does not require a display and a variety of effects here is optimization.

      sumber : http://dedepurnama.blogspot.com
      Read More

      Selecting the Best Antivirus (av-comparatives test)

      After a long time yet to review comparison antivirus, now I will review a variety of the latest antivirus test results conducted by the institute pengetest antivirus, av-comparatives. In the test this time included also several free antivirus, so it can be used as a factor in choosing which is best.

      A recent test av-comparatives.org by 2011 this is the on-demand test, which is a direct test by performing a virus scan of various samples (malware) that many previously circulated. This test was last updated on 27 September 2011, so it is still up to date.
      Antivirus participating in the test as follows:


      * Avast! Free Antivirus 6.0
      * AVG Anti-virus Free Edition 10.0
      * AVIRA Antivir Personal 2.10
      * BitDefender AntiVirus Plus 2012
      * EScan Anti-Virus 11.0
      * ESET NOD32 Antivirus 5.0
      * F-Secure Anti-Virus 2011
      * G DATA AntiVirus 2012
      * K7 TotalSecurity 11.1
      * Kaspersky Anti-Virus 2012
      * Kingsoft AntiVirus 2010.2.10.1
      * McAfee AntiVirus Plus 2011
      * Microsoft Security Essentials 2.1
      * Cloud Panda Antivirus 1.5
      * PC Tools Spyware Doctor with Antivirus 8.0
      * Qithoo 360 Antivirus 2.0
      * Sophos Anti-Virus 9.7
      * Symantec Norton Anti-Virus 2012
      * Trend Micro Antivirus Titanium 2012 +
      * Trustport Antivirus 2012
      * Webroot Spy Sweeper with AntiVirus 7.0

      Unlike the previous test, this time some free product (free edition) participated in this test that allows us to compare where the best free antivirus. Free antivirus that participated were: Avast, AVG, Avira, Panda and the MSE (Microsoft). Test av-comparatives this time using a sample of malware (viruses, worms, trojans, and the like) as much as 206,043 a widely circulated within one month earlier.
      Read More

      Ayam Betutu - Balinese Cuisine

      Each region has different traditions and cultures of other regions. Similarly, Bali. Bali is known as a major tourist destination of domestic tourists and foreign countries, has a lot of uniqueness. Adi noble culture has attracted many people from various parts of the world to come visit him.

      Betutu chicken is one that is unique among the various unique Balinese dimilik, Chicken Betutu Is it ...? Is a food / cuisine typical of the island.


      How do I make it ...?

      material:

      * 1 tail (1 ½ kg) of chicken
      * 100 gr young cassava leaves, boiled until soft, squeeze, cut into pieces
      * 5 tablespoons oil, for sauteing
      * Banana leaves / aluminum foil for wrapping

      Spices that are:

      * 7 5 red chilies and cayenne
      * 5 pieces of pecans, toasted
      * 10 pieces of red onion
      * 1 teaspoon shrimp paste
      * 5 pieces of garlic
      * 1 tablespoon coriander, toasted
      * 1 ½ tbsp lemon grass, finely sliced
      * 2 rounded teaspoon pepper
      * 1 tbsp chopped galangal
      * ½ teaspoon nutmeg
      * 2 tsp turmeric chopped
      * 4 kaffir lime leaves
      * 2 tsp chopped ginger
      * 2 tsp chopped kencur
      * Salt and sugar according to taste

      How to Make:

      * Stir-fry ground spices until fragrant and dry. Remove and let cool. Divided into two parts.
      * Mix one part spice with cassava leaves. Enter in the body cavity of chicken, pin hole with a toothpick.

      Rub the remaining seasoning on the chicken surface and under skin.
      * Wrap in several layers of banana leaves, tied tightly with rope. Bake in hot oven 180 ° C, for 2-3 hours until cooked.
      * Remove, cut into wedges and serve.

      Note: before baking, can also be steamed first ± 45 minutes, then baked for 1 hour.

      Betutu is the pride of Balinese cuisine. Usually made ​​of duck wrapped in banana leaf, then wrapped again with stem nut so tightly. Duck planted in a hole in the ground and covered with coals for 6-7 hours until cooked.
      Read More

      10 resep atau tips hidup sukses dan bahagia

      Apakah makanan saja ada tipsnya ? apakah sakit saja dapat resep dari dokter ? nah kalau ia hiduppun ada resep dan tipsnya..... bagaimana kita menjalani hidup agar bisa sukses dan baghagia dari tantangan tentu harus ada kemauan yang pasti berikut ini saya kasi 10 resep hidup sukses yang saya dapat dari link blog teman.


      1. Bersyukurlah atas hari ini. “Just to be alive is a grand thing,” kata Agatha Christie, salah satu novelis detektif terkemuka. Jauhkanlah perasaan depresi dan sedih tanpa juntrungan. Jalani setiap hari dengan hati penuh syukur.
      2. Belajarlah seakan-akan Anda akan hidup selamanya, hiduplah seakan-akan Anda akan mati besok. Mohanda Gandhi pernah berkata demikian, “Live as if you were to die tomorrow, learn as if you were to live forever.” Belajar terus, upgrade diri terus dengan berbagai cara baik yang memerlukan effort maupun effortlessly.
      3. Setiap ketrampilan pasti ada penggunanya. Allah Menciptakan Semua MakhlukNya  dengan Hak. Semua Makhluk YG Dia Ciptakan Pasti memiliki Hikmah Tersendiri. Cobalah untuk mencari, apa Hikmah kita ada didunia ini , Cobalah berusaha untuk berguna bagi Orang lain, Kapanpun dan dimanapun. Itu Hikmah Yang sebenarnya.
      4. Bukalah jalan sendiri, orisinil. Ralph Waldo Emerson pernah bilang, “Do not go where the path may lead, go instead where there is no path and leave a trail.” Jangan latah mengikuti orang lain, dengar kata hati dan ikutilah jalan yang belum kelihatan.
      5. Belajar mencintai apa yang Anda punyai, bukan berangan-angan akan apa yang Anda tidak miliki. Use whatever you have at hand, impian hanya akan menjadi nyata kalau Anda menggunakan instrumen yang kasat mata saat ini juga. ilmu psikologi bilang ada dua cara kita mendapatkan kebahagiaan. Pertama dengan cara mendapatkan apa yang kita inginkan, kedua dengan menginginkan apa yang kita dapati.
      6. Lihat apa yang kelihatan dan lihat apa yang belum kelihatan.Gunakan visi dan misi untuk mengenal apa yang Anda tuju. Seringkali, apa yang belum kelihatan adalah blue print untuk sukses Anda. Begitu kelihatan, ia akan menjadi semacam deja vu.
      7. Nikmati hidup dan bersiap-siaplah dalam menyongsong hari baru. Setiap hari adalah hari baru. Bangunlah tiap pagi dengan hati yang penuh ingin tahu akan apa yang akan Anda alami hari itu. Be excited, be courageous to start the day.
      8. Semakin banyak Anda memberi, semakin banyak Anda akan menerima. The more you give, the more you get in return. Dalam marketing, ini mungkin disebut sebagai taktik public relations atau publicity. Namun, dalam kehidupan sehari-hari, ini juga berlaku tanpa diselipi dengan iming-iming tertentu. Perumpamaan orang-orang yang menafkahkan apa yang dimilikinya di jalan Allah adalah serupa dengan sebutir benih yang menumbuhkan tujuh bulir, pada tiap-tiap bulir seratus biji. Allah melipat gandakan (ganjaran) bagi siapa yang Dia kehendaki. Dan Allah Maha Luas (karunia-Nya) lagi Maha Mengetahui[2:261].
      9. Jadilah guru atau penasihat bagi diri sendiri. What would Oprah do? sering-seringlah melakukan refleksi dan kontemplasi. Terus membenahi diri.
      10. Saya eksis dengan maupun tanpa tubuh saya. Setidak-tidaknya sekali  sehari, ingatkan diri sendiri bahwa hidup ini bukanlah untuk selamanya. Maka berbuatlah terbaik pada saat ini juga. Jangan tunggu-tunggu lagi. “Just do it,” kata Cher di Farewell Concertnya  beberapa tahun yang lampau. I do my best every chance I have. Berbuatlah terbaik di setiap kesempatan, karena itu mungkin yang terakhir.
      sumber : http://kopisusu.wordpress.com
        Read More

        Tetap Berkarya

        Tetap berkarya dalam hidup.... tidak ada yang gagal hanya saja gagal adalah kunci kesuksesan yang tertunda sementara waktu...


        Semangatkan hidup ini dengan rasa percaya diri
        Read More