Saturday, July 18, 2009

Mematikan Komputer Otomatis Bagian III

Melanjutkan dua artikel sebelumnya, ok? Kali ini akan kita bahas cara menampilkan notice, alias peringatan sebelum kompi kita mati sendiri, sesuai jadwal. Let's go straight to the point yaw?
-seperti biasa siapkan notepadnya, lalu ketikkan msg * isi peringatan misalnya (Komputer anda akan mati dalam lima menit, simpan semua data anda sekarang !!!)
-setelah tulisan yang berisi isi pesan klik enter dan ketikkan ^Z
seperti ini:


-setelah itu simpan dalam format .bat, misalnya kasih nama aja notice.bat



-Lalu masukkan ke schecudle tasks seperti biasa, sesuai dengan waktu yang tertera pada pesan di notice tadi. Sesuaikan waktu pada schedule tasks dengan waktu jadwal mati kompi kita dikurangi lima menit. Ok jadi deh. Ntar akan muncul comment seperti ini:



Klik aja tombol ok untuk menghilangkan notice itu, dan komputer anda akan mati dalam lima menit sesuai jadwal yang telah anda tentukan sebelumnya. Ok sekian dulu ya??? Sampe ketemu di postingan berikutnya.

Monday, July 13, 2009

Ten Tips To Improve System Speed

1.Let PC boot, before the opening.


2.Refresh office after the closing of all applications. This deletes all files that are not the RAM.


3.Do not the size of the image file as wallpaper. Do not save the wallpaper on your PC, if you have little RAM (less than 64 MB).


4.Do not the background image with a lot of desktop shortcuts. Each shortcut on the desktop applications up to 500 bytes of RAM


5.Empty the trash regularly. The file is not on your hard drive until you empty the trash.


6.Delete temporary Internet files regularly.


7.Defragment your hard drive once every two months. This would allow more space on your hard drive and store files, so that your applications faster.

8.Always create two partitions on your hard drive. Install all the major publishers (like PSP, Photoshop, 3ds max, etc.) in the second partition. Windows uses all available methods of free space on drive C of the virtual memory if your computer is full of RAM. Hold the C drive vacuum possible.


9.When install the software, disable the option on the tray icon. , The Code of the icon on the RAM available, and also slow start your PC. In addition, the option for the application automatically when the PC starts. You can use this option later in the menu "Tools" or "Options" in your application.


10. Protect your PC against dust. Effect of dust, that the CPU fan for the day slowly and gradually heating so that your CPU and the effects on speed. With air to beat the dust from the CPU. Do not vacuum.


RAM is the working space (office) of the CPU, too empty and clear as possible!

El-Nino Affect Weather Worldwide

Government scientists on Thursday, the periodic warming of water in the tropical Pacific, at the time in the world, is back.

The Pacific has been in what is regarded as neutral, but forecasters at the National Oceanic and Atmospheric Administration said that the water temperature has risen by 1.8 degrees Celsius above normal over a narrow band in eastern equatorial Pacific, in June.

In addition, NOAA's Climate Prediction Center said tropical temperatures in other regions are also above normal, with readings warmer than usual, as far as 975 meters below the sea surface.

In general, El Nino conditions associated with increased rainfall in the east central and eastern Pacific and dry as normal conditions over northern Australia, Indonesia and the Philippines.

One summer, El Nino can lead to normal weather in the Intermountain regions of the United States and central Chile. In an El Nino years is rather Pacific hurricanes and fewer Atlantic hurricanes.

The meteorologists said expect that this El Nino continues to improve in the coming months and last winter over the years 2009-2010.



"Advanced Life Sciences climate allows us to warn of industry, governments and operators urgently to the climatic conditions of El Nino May, so that they can be taken into account in making decisions and, ultimately, the protection of lives, property and the economy", Board member Jane Lubchenco of NOAA said in a statement.

NOAA pointed out that the effects of El Nino are negative. For example, the Atlantic hurricanes and humidity for the dry regions of the southwest.

It can also be damaged drivers in winter storms in California and the increase in storms in the southern United States.


The warming of the sea can also contribute to a reduction in catches at sea on the west coast, and fewer fish can also affect food source for birds and marine mammals.

A study by researchers from Georgia Tech in May showing there are actually two types of El Nino, according to whether the warming is strongest in the eastern part of central or rest.

Although the current warming seems to be strong in the east of the form of a traditional, government forecasters were unable to them.

If the Georgia Tech study is correct, it is nature, that the phenomenon El NiƱo storms in the Atlantic and Caribbean. The form of the other, further west, appears to be at the Atlantic storms.

Computer Hacking

Hacker practice, the change of hardware and software for achieving the objectives of which are outside of its original creator. Persons involved in hacking, often referred to as hackers. Since the word "hack" has long been used to someone who is not competent in his profession, some hackers say that this term is offensive and should not be a recognition of the capacity.

Hackers most commonly in adolescents and young adults, but there are many elderly and hackers. Many fans of the pirate technology, like to learn more about how computers work, and hacker attacks, an art form. They are often the program at the level of expertise and skills in a particular program. For the individual, is for a hacker problem-solving powers of their application. It is an opportunity to develop their ability, not an opportunity to harm others.

Hackers are many autodidacts wonder that some of the companies within the framework of hackers of staff for technical support. People use their capacity in the security vulnerabilities of the company, so they quickly remedied. In many cases, this type of piracy on a computer to prevent identity theft and other serious crimes in connection with computer science.

Hackers can lead to the implementation of other technologies, such as skills for many Piracy toys. For example, a former hacker Dennis Ritchie and Ken Thompson, was to create on the UNIX operating system, in the 1970s. This system has a large influence on the development of Linux, a free Unix operating system. Shawn Fanning, the founder of Napster, is famous for services outside hackers hackers.

Compared to develop an interest in the intellectual curiosity to hackers, pirates have less noble motives. Hackers steal confidential information, change the financial data of enterprises, security against the code for access to the network is not valid, or that the damage referred to as "crackers." This kind of hacking, you can create a journey into the federal prison for more than 20 years.

If you are interested in your computer from hackers, the investment in firewall is recommended. There is also a good idea to regularly update the software. For example, Microsoft offers a free series of security patch for Internet Explorer.

Sunday, July 12, 2009

NASA Tests Space Internet


Many roads, the message on the Internet to create a strong and effective - and envy the people who work for the design of communication system at a distance to leave the spaceship Earth, so each year. After more than a decade, development, NASA has a run on the loans from the communication network, by 2011, the efficiency of data between Earth and a few probes, Rover, Orbit, spacecraft and exploration solar system - in fact authentic, for a cross-Internet. Tests to the International Space Station last May, the second of three tryouts key network technology, known as Delay Tolerant Network, or DTN, Minutes.

DTN newspaper, the Internet is in space by a series of obstacles to overcome, including the unusual length of time for packets between the various hops in the network, the intermittent nature of a network connection, Scrambling and a little sunlight.

"Communication is a very long delay, and they are variable, because the planets in orbit around the sun," said Vint Cerf, co-inventor of the Internet TCP / IP and the key to a group of computer The DTN work in 1998. In the ground, drag the package from source to destination in milliseconds. However, a simple course of the Earth to Mars takes at least 8 hours. A movement of celestial bodies means that the package immediately and must wait for the satellite-Hop, earth to heaven.

To send in the communication space is very different than in the world, where the surface topology of the Internet for us is obvious.

"What we do is not to say all the nodes that it is an amendment that happens," said Scott Burleigh, software engineer at NASA-Jet-Power Laboratory, Pasadena, California, a leading developer of DTN. "You can travel from A to B in this database is from 12:30 and ends with the sentence 3:30, and then you will not be able to return to the link ... to the next Tuesday.

Launching a test DTN in space last October, was successful. Code has been on the comet, Deep Impact probe study, to review the 2nd passage comet Hartley "We activated the software in the air and dozens of nodes around the Earth and let it alone run entirely by about a month, "said Burleigh. During the test, about 300 images that have stretched a short distance up to 24 million km. Although some errors were found, no packages, and no bit was damaged. The software is certainly not a reboot of the earth on the air. "The minutes may be less than the restoration of data and really good," said Keith Scott, Principal Engineer at the Mitra Corp., the Reston, Va., who has to DTN Burleigh and others.

DTN is the key to the technique as "store and forward." In fact, each node to hang, to data received, it can work with. On Earth, the data are stranded when there is a problem, and is again the source.

The second test, Kevin Gifford on the Payload Operations Control Center at the University of Colorado, Boulder, a computer onboard the ISS for the images to earth.

In the third trial, in early October and includes the Deep Impact probe, the safety engineers and a new protocol file transfer protocol. Then akan DTN "quite ready for Deep-Space Search," said Jay Wyatt, the NASA program, which coordinates the project. At that time, researchers hope that other space agencies also try.

Scott miter chairs a working group of the Consultative Committee for Space Data Systems, an international organization that recommends standards for space communications. You are taking into account the adoption of DTN. So Mission Mission, the network must develop a network of handsets on the planet and space stations.