Welcome to News Media Information

All the world news related to various activities such as sports news, football news, music news, computer news, hardware news, software news, brainware news, technology news, cell phones news, celebrities news, networking news, games news, online games news, movie news, article, health news and much more
Showing posts with label computer. Show all posts
Showing posts with label computer. Show all posts

United States President Barack Obama revealed that he had lifted some technology experts to join the team of telecommunications security adviser, and one person who had the honor to occupy that position is Dick Costolo, Chief Executive Officer (CEO) Twitter.

Dick Costolo elected along with other elected members of the team, as Vice President of Trustworthy Computing Scott Charney; Computer Security Company McAfee's president, David DeWalt, and Lisa Hook as Head of Global Communications Technology for technology firm Neustar. They will work together in the National Security Telecommunications Advisory Committee.

Also joining the team, Jamie Dos Santos, chairman of Terremark Worldwide group that maintains information technology and the federal government. This condition is an ideal composition for support in order to handle security problems in Barack Obama communications . And very proud when a President has a great team like them and will certainly be the envy of every country because the number of qualified human resources are successfully produced by the United States.

"I am proud to appoint a number of great men and women to fill this position. I am also grateful because they have agreed to donate their extraordinary talents to this government," Barack Obama said at a press conference at the White House.

"I can not wait to get to work with them for months and even years to come," he added, as quoted by the Straits Times on Saturday (05/28/2011).

After many instances of deviant behavior from its users, Facebook is finally using a software PhotoDNA to try to detect child pornography online.

The software was developed two years ago by Dartmouth College and Microsoft, which works based on the database of images of child pornography from the National Center for Missing and Exploited Children (NCMEC), the United States. Automatically upload photos to compare with the database, and any sign that appears to be the same.

"Traditionally, if the image is resized or edited in a way at all, blue print or digital signature of the photos that will be different, and it would be difficult or sometimes even impossible to find an image nearly identical," said Brad Smith, an interpreter Facebook speech, as reported by TG Daily, Wednesday (05/25/2011). But PhotoDNA, said the company, can detect the drawings even when they have been modified in this way.

Facebook is now planning to run the software on each photo was uploaded to their site, and will report the offending images either to NCMEC and the police. Computer science professor Hany Farid says it can scan images in just four milliseconds, which means users will not see a delay.

He said that the test can detect 99.7 per cent in real time, and have a false positive rate between one in two billion and one in ten billion.

"Perpetrators of child pornography problem in the world - and particularly in the United States - has really exploded with the advent of the internet," said Ernie Allen, president and CEO of NCMEC. "Twenty years ago we thought this problem had almost disappeared,"

He said that the beta testing of software in New Zealand have led to arrests. Microsoft also has succeeded in using technology to remove the 1000 image of cloud-based storage service SkyDrive since February.

Image : Twitter for I-Pod
Chief Technology Officer (CTO), Twitter, Greg Pass, leaving the microblogging site to continue his career elsewhere, as the news reported by Tech Crunch, Saturday (05/21/2011).

Prior positions CTO Twitter, Pass is a Vice President of Engineering popular microblogging site. The position was achieved after becoming the CTO and co-founder Summize, a startup that was acquired Twitter, in July 2008 ago, and eventually evolved into Twitter Search.

Although initially reluctant to make comments, Twitter has finally confirmed the news through its co-founder, Biz Stone, by his account, @ biz.

"Twitter Summize acquired three years ago, cofounder @ gregpass continue his career elsewhere. We are fortunate to have him for so long," that is written in Stone Twitter account.

On another occasion, a spokesman for Twitter, Sean Garrett, stating that, at this time the company has its headquarters in San Francisco, is not planning to seek a replacement Pass. Meanwhile, Pass own future can not be ascertained.

The development of computer networks at the moment is amazing with lots of connective tissue found in a variety of alternatives to facilitate users in selecting hardware support computer networking. One of them with WDS. What is WDS? WDS stands for Wireless Distribution System, which means that distribution systems are designed for Roaming Wireless hotspot environment.

If you need a software Enterprise Resource Planning (ERP), specifically in charge of Shopping Centers, like the Mall, it is not wrong if you try Dwidissa Applications Enterprise Resource Planning System.
This application is very user friendly and designed with an attractive appearance. This software has been implemented in Bandung Trade Centre, and runs well.
The module is built include:
1. Module System;
2. Sales Module;
3. Purchasing Module;
4. Inventory Module;
5. Cash and Bank Modules;
6. Accounting Module
For more details, we give an idea of ​​this software:
Sign Contract:


Sign Contract Facilities:
 Use of Facilities
 Sign Invoice Service Charge
Projections Report Claims
AP Aging Report
Revenue Summary Report
Consolidated Cash Flow
Bank Book Reports

Ledger Report
Journal Reports
Income Statement
If you are interested or need more information, you can send an email to:jankies@ymail.com

At this time with more and more links and documents circulating on the internet, it is very difficult to search for a topic or documents that we will find that corresponds to what we want. This can be understood considering the topic or are we looking for these titles will be easily found in almost all search engine providers because of the "same " topic. With so many topics generated from the search engine, of course, will take time, energy and our minds so that the resulting saturation.

In order to overcome these problems, we need to apply several methods that can facilitate and speed up the search in search engines like Google.com by:

    1. Determine the first topic or documents that we are looking for unbiased and takes a lot;
    2. The form of the topic or the document itself must be formatted in accordance with the correct spelling
    3. Information type of file or document topics are we looking for if this is the HTML, Word Processing (Doc, Docx, rtf), MS Xcell (Xls, xlsx), Adobe Portable Document Format (pdf), Ms Powerpoint (ppt), or text form (txt), so it will be more specific in the search later.

After preparing the above steps, the next is browsing to "Uncle" Google.com and start searching. As an example we will look for a topic or a document titled "Management Information System". Then we will file type search is a form of Adobe Portable Document Format (pdf), to accelerate the desired output on the Google search engine we enter the "management information system filetype: pdf" to make it more clear, can be viewed in the picture below :

To do this, take several steps including:
1. By using regedit: type regedit in the run and then go to HKEY_LOCAL_MACHINE \ SOFTWARE \ Microsoft \ Windows \ CurrentVersion \ Run, the registry is usually a virus attached to be used in calling him so that he could "shake and dance" interfere with our computer, if it has met the notice whether there is a registry key is considered strange, if there immediately just delete the registry key;
2. Utilizing the taskbar: Ctrl + Alt + Delete is a step to create processes that are active on our computers, well look at whether there are processes out of the ordinary, if there is then try to turn it off
3. Disable msvbvm60.dll: most viruses are made usually using visual basic, Well it could be turned off by disabling msvbvm60.dll, just rename the file so that the services can not vb active, while the location of the file usually in C: \ windows \ system32
4. store word documents in the form. rtf: although impressed complicated and a little troublesome, but this step is usually considered to be potent, it could minimize the spread of the virus, because the word macros will not be active in this mode
5. Utilizing safe mode: sometimes the virus can not be active in this mode, use safe mode to remove the files that are considered vulnerable
6. Turn off System Restore: this solution is good enough to worry about, because we can not restore our system. But most viruses save itself in the system restore which resulted in him can not be deleted.
7. if still going, then could be a reliable antivirus solution ...
8. Lastly of course continue to update information on the development of viruses with the often asked, browsing the Internet and other things that might be considered could provide a solution in overcoming the virus .....
Good luck hopefully useful ..

Folder Options you do not appear on the screen? Calm down! Do not panic, maybe it was caused by a virus that attacks your computer. Folder Options is one medium that is often used by the virus since folder option is one of the features of windows that can identify the virus so that its presence can be considered interfering with the virus on our computer.
With the increasingly rapid development of science and technology today, especially in the field of computer technology and particularly again in our beloved country, resulting in the rampant manufacture of local viruses in circulation by way of eliminating the folder option. In addition to the folder option, usually the virus also disable some Windows features to maintain its existence so that the "virus" could last longer on their computers. The features most often been shot including the folder options, run, and the registry, task manager and msconfig. So when these features can not be run then we can be sure your computer infected by a virus.
However, these features can actually be returned by way of setting up the registry, the easiest way that can be done even if the virus has disable the features as referred to by following these steps:
1. Open Notepad (select one of the easiest for you)
- Start> All Programs> Accessories> Notepad
- Win key + R> type notepad> enter (do if the virus has not disable run)
2. Copy and paste the text below in notepad
[HKEY_CURRENT_USER \ Software \ Microsoft \ Windows \ CurrentVersion \ Policies \ Explorer] "NoFolderOptions" = dword: 00000001
3. After that, save the file. File> Save or Ctrl + S.
In the file name written up to you, but ended with the writing. "Reg" [dot reg].
For example: example.reg or option.reg or something important ends. Reg
4. Run the file in a way you can double click. If there are warning click Yes and OK.
5. Last Log Off your computer (start> log off), then log in again.
6. See changes to the Tool menu, if successful then Folder Options that had been lost will be seen again.
Well maybe it's one of tips on "treatment" computer from any virus. Hope can provide benefits and increase knowledge. Good luck!

Currently, the flash is one of the most widely used media in spreading the virus. This can be understood considering the media is very easy to carry and easy to use that most live clep into the USB port it will automatically flash can be detected by windows.
But without us knowing it, a habit we incorporate flash to the computer randomly property of others, especially when frequent visits to the cafe could cause our computer virus because it usually will do the task windosw autoplay. Autoplay function is usually used by viruses to spread themselves which resulted in our computer infected by a virus carried by the storage media.
So to avoid the frequency or our habit of inserting the stick into any computer can be prevented by turning off the autoplay function is as follows:
* Click Start -> Run
* Then Type "gpedit.msc"
* Select Computer Configuration -> Administrative Templates until the display appears as follows:


* Then Select System, locate the file Turn Off Auto Play and double click
* Then check the option enabled and Turn Off Auto Play select All Drives so it looks like the image below
 * Then click OK, Close and restart

Another way to minimize the virus into the computer is to enable the Guest user and always login with the guest user.
Due to the Guest user then indirectly we will disable the function of the registry, because the virus will always infect this registry file and change the value in it.
You also can minimize the virus into the computer with anti virus always update regularly. Similarly, info and tips from me hopefully useful and can help .....

Though a little annoying, but sometimes this is very disturbing us when going to work or get into windows because the windows are often notified of the activation of which will soon expire. And to eliminate it are as follows:

1. Open regedit: RUN> REGEDIT
2. Navigate to the key HKEY_LOCAL_MACHINE \ SOFTWARE \ Microsoft \ Windows NT \ CurrentVersion \ WPAEvents
3.Cari string named OOBETimer
4.Double click. Then replace it with this FF D5 71 D6 8B 6A 8D 6F D5 33 93 FD
5.Right Click on WPAEvents (Regedit) and choose Permissions
6.Window will appear, click System and thugs all Deny on Listbox
7.Restart Your Computer

Share

Share |

Popular Posts

Shopping Info

Sponsor

Best Seller

Product Info

Categories

Stat

Visitor

pagerank

Rapid Site Check button