Halaman

Imam Ali Ibn Abi Thalib as

Barangsiapa yang rindu kepada surga, dia akan berpaling dari tuntutan hawa nafsunya.
Barangsiapa yang takut api neraka, dia akan menjauhi hal-hal yang terlarang.
Barangsiapa yang zuhud (tidak rakus) terhadap dunia, dia akan menganggap ringan suatu musibah
Barangsiapa yang bersiap-siap menghadapi kematian, dia akan bersegera melakukan kebaikan

Search




Showing posts with label Techno-Gadget. Show all posts
Showing posts with label Techno-Gadget. Show all posts

Tuesday, January 5, 2010

Updating Facebook status via Twitter

Updating Facebook status via Twitter

-- Review on "Twitter" and "Selective Tweets" applications on Facebook

Update all tweets to facebook using Twitter Apps
Ensure your twitter account is not protected. check your setting on (http://twitter.com/account/settings)









On Facebook, search for "Twitter" application (http://apps.facebook.com/twitter)
Go to application
Click "allow"













Enter your twitter username and password and click "login"











Click "allow twitter to update your facebook status"









Click "allow status update"











Test updating your status from your twitter account homepage

Now, you have the option to protect your twitter account.
go to your setting page and protect your twitter account.






Test updating your status from your twitter account homepage


Update selective tweets to facebook using Selective Tweets Apps
Selective means you don't want to send all your tweets to Facebook. So ensure you are not using any Twitter-to-Facebook apps such as Twitter Application (http://apps.facebook.com/twitter/)
You could simply remove any Twitter-to-facebook apps from your Application List.


















A bit different from Twitter Application, Selective Tweets would not work when your twitter account is protected. So ensure it is unprotected.
un-check the "Protect my tweets" checkbox and click save.









On facebook, search for "Selective Tweets"  application
Go to application
On "Your profile" tab, enter your twitter username and click "Save"







On "settings" tab, choose your preference and click "Save".












Test updating your status from your twitter account homepage

Then Test updating your status again from your twitter account homepage but this time put the hashtag #fb at the end. This one should update your facebook status.

At the end, it is your freedom to choose, to send all your tweets to facebook, send selective tweets, or keep your tweets on twitter !!!


Happy trying .....

Monday, December 21, 2009

3 ways to recover a corrupted Excel workbook

3 ways to recover a corrupted Excel workbook
Original source

It’s your worst Excel® nightmare: a damaged or corrupted workbook. This can happen for a variety of reasons – and the good news is that there is a variety of ways to retrieve your damaged file.

If a file is corrupted, Excel should normally perform an automated recovery. However, if that doesn’t work, there are a few other options you can try.

1. Recover or repair the file manually with Excel
The steps for manually recovering a workbook are quite simple.

1. Select “Open” from the File menu. In Excel 2007, click the Office button and select “Open”.
2. Using the Look In control, locate and specify the corrupted workbook.
3. From the Open button’s dropdown list, choose “Open and Repair”.
4. If this is your first attempt to manually recover the workbook, click “Repair” in the dialogue box that appears.

Usually Excel will be able to recover the entire file, but it doesn’t always work. If you’ve tried this process and you can’t recover the entire file, you can still at least recover your data. To do so, click “Extract Data” in step 4.

2. Use the last saved version
If the file becomes corrupted while you’re working in the workbook, DON’T save the file. Instead, revert to the last saved version of the file. Doing so without saving first should get rid of whatever was corrupting the file. Be forewarned – you could possibly lose some data, but if you’ve been regularly saving your work (as you should be!) this is a lot better than losing the entire file.

To revert to the last saved version:

1. Choose Open from the File menu. In Excel 2007, click the Office button and select Open.
2. Using the Look In control, locate and specify the corrupted workbook.
3. Click “Open”.

3. Try opening the file in another program
If Excel can’t open the corrupted workbook, there are several other programs you can use to try to open it. Microsoft Tools is one option:

1. From the Windows XP Start menu, choose All Programs.
2. Select Microsoft Office, then Microsoft Office Tools and Microsoft Office Application Recovery.
3. In the dialogue box that appears, choose Microsoft Office Excel.
4. Click “Recover Application”.

You can also try opening the workbook in Microsoft WordPad. The only caveat: WordPad will convert all the data into text, and it won’t recover formulas. However, it will at least restore your important data. It will also recover your VBA procedures (macros) – just search recovered text for “Sub” and “Function” to find them.

You may also be able to open the corrupted .xls file in Word, but again, the data is the only thing you’ll be able to recover - and even that may give you mixed results. So only try this as a last resort!

For more Excel troubleshooting tips and tricks, see the Microsoft Excel 2007 Core Skills class in the HP Learning Centre or visit the Microsoft Excel home page.

Microsoft and Excel are trademarks of the Microsoft group of companies.

Tuesday, December 1, 2009

Net file

  1. go to the machine where the shared folder is hosted
  2. open command prompt
  3. invoke command: Net File
Find certain opened shared-files:
net file | find /I "file-path-or-pattern" [> logfilepathname]

example:
net file | find /I "file_test.xls" > d:\net-file-pattern.log

the example above will list all shared files being used/opened with result pattern "file_test.xls" and write the list to d:\net-file-pattern.log


Win XP / 2003 comands

Win XP / 2003 comands
http://www.planet-orange.org/ultimate-windows-xp2000-command-list/

1.    at (windows XP/2000)
Scheduling utility.
2.    bootcfg (XP only)
This utility allows you to set up your boot options, such as your default OS and other loading options.
3.    cacls (XP, 2000, & NT4.0)
Changes the ACLs (security Settings) of files and folders. Very similar to chmod in Linux.
4.    comp (XP & 2000)
This utility is very similar to diff in Linux. Use the /? switch to get examples of command usage.
5.    contig (works with NT4.0 and newer)
A great defrag utility for NTFS partitions.
6.    control (XP only) - unpublished!
Allows you to launch control panel applets from the command line.
7.    control userpasswords2, for example will launch a helpful local user admin utility. defrag (XP only - NT4.0 and Win2k use contig)
Yes, XP comes with a command line disk defrag utility. If you are running Win2k or NT4.0 there is still hope. Contig is a free defrag program that I describe on the defrag page.
8.    diskpart (XP only)
Use this command to manage your disk partitions. This is the text version for the GUI Disk Manager.
9.    driverquery (XP only)
Produces a list of drivers, their properties, and their versions. Great for computer documentation.
10.    eudcedit (XP only) -unpublished!
Private Character editor. Yes with this program built into Windows XP you can create your own font!
11.    findstr
Find String - similar to Linux's Grep.
12.    fsutil (XP only) - unpublished!
This is a utility with a lot of capability. Come back soon for great examples.
13.    getmac (XP & 2000)
This command gets the Media Access Control (MAC) address of your network cards.
14.    gpresult (XP & 2000)
This generates a summary of the user settings and computer group policy settings.
15.    gpupdate (XP only)
Use this utility to manually apply computer and user policy from your windows 2000 (or newer) domain.
16.    ipconfig (XP, 2000 & NT4.0)
This handy tool displays IP settings of the current computer and much more.
17.    MMC (XP, 2000 & NT4.0) - Microsoft Management Console
This is the master tool for Windows, it is the main interface in which all other tools use starting primarily in Windows 2000 and newer systems.
18.    more
Utility used to display text output one screen at a time. Ex. more c:\windows\win.ini
19.    msconfig (XP only)
The ultimate tool to change the services and utilities that start when your Windows machine boots up. You can also copy the executable from XP and use it in Win2k.
20.    msinfo32 (XP &smp; 2000)
An awesome diagnostic tool. With it you can get a list of running processes, including the residing path of the executable (great for manually removing malware) and get detailed information about hardware and system diagnostics.
21.    narrator (XP only)
Turns on the system narrator (can also be found in accessibility options in control panel). Will allow your computer to dictate text to you.
22.    netsh (XP & 2000)
A network configuration tool console. At the 'netsh>' prompt, use the '?' to list the available commands and type "exit" to get back to a command prompt.
23.    netstat (XP)
A local network port tool - try netstat -ano.
24.    nslookup (all)
A DNS name resolution tool.
25.    openfiles (XP Only)
Allows an administrator to display or disconnect open files in XP professional. Type "openfiles /?" for a list of possible parameters.
26.    Pathping (XP & 2000)
A cross between the ping and traceroute utilities. Who needs Neotrace when you can use this? Type "pathping " and watch it go.
27.    recover (XP & 2000)
This command can recover readable information from a damaged disk and is very easy to use.
28.    reg (XP & 2000)
A console registry tool, great for scripting Registry edits.
29.    sc (XP & 2000)
A command line utility called the Service Controller. A power tool to make service changes via a logon/logoff or startup/shutdown script.
30.    schtasks (XP only)
A newer version of the AT command. This allows an administrator to schedule and manage scheduled tasks on a local and remote machines.
31.    secedit (XP & 2000)
Use this utility to manually apply computer and user policy from your windows 2000 (or newer) domain. Example to update the machine policy: secedit /refreshpolicy machine_policy /enforce
To view help on this, just type secedit.
NOTE: In Windows XP SP1 and news, this command is superceded by: gpupdate /force
32.    sfc (XP & 2000)
The system file checker scans important system files and replaces the ones you (or your applications) hacked beyond repair with the real, official Microsoft versions.
33.    shutdown (XP & 2000)
With this tool, You can shut down or restart your own computer, or an administrator can shut down or restart a remote computer.
34.    sigverif (XP only)
Microsoft has created driver signatures. A signed driver is Microsoft tested and approved. With the sigverif tool you can have all driver files analyzed to verify that they are digitally signed. Just type 'sigverif' at the command prompt.
35.    systeminfo (XP only)
Basic system configuration information, such as the system type, the processor type, time zone, virtual memory settings, system uptime, and much more. This program is great for creating an inventory of computers on your network.
36.    sysedit (XP/2000)
System Configuration File Editor. An old tool that was very handy for the Windows 9X days. msconfig is what you want to use now.
37.    tasklist (XP pro only)
Tasklist is the command console equivalent to the task manager in windows. It is a must have when fighting scumware and viruses. Try the command:
tasklist /svc
to view the memory resources your services take up.
38.    taskkill (XP only)
Taskkill contains the rest of the task manager functionality. It allows you to kill those unneeded or locked up applications.
39.    tree (XP & 2000)
An amazing experience everyone should try! This command will provide a 'family tree' style display of the drive/folder you specify.
40.    WMIC (XP & 2000)
Windows Management Instrumentation Command tool. This allows you to pull an amazing amount of low-level system information from a command line scripting interface.
41.    schtasks /? (XP)


Wednesday, October 28, 2009

Gmail account security tips

Gmail account security tips: "Posted by Sarah Price, Online Operations Strategist

As part of National Cyber Security Awareness Month, we recently posted about how to pick a smart password. Having a strong password goes a long way in helping to protect your data, but there are a number of additional steps you can take to help you keep your Gmail account secure:

1. Remember to sign out. Especially when using a public computer, be careful to sign out of your Google account when you're finished. Just click the 'Sign out' link at the top right corner of your inbox. If you're using a public or shared computer and want to be extra thorough, you can also clear the browser's cache, cookies and history. Then, completely close the browser. On your personal computer, you can also lock your computer with a password-protected screensaver if you need to step away momentarily. Learn the best ways to lock your screen in Windows or in Mac OS X. Forgot to sign out? Open up a new Gmail session on another computer and use Gmail's remote sign out feature to close any sessions that might still be open elsewhere.

2. Be careful about sending certain sensitive information via email. Once you send an email, you're no longer in control of the information it contains. The recipients, if they so choose, could forward the email or post its contents in a public place. Even if you know and trust the people you're emailing, that information may become exposed if their accounts become compromised or they get a virus on their machines. As a rule of thumb, should you need to provide a credit card number or financial account number to respond to a message, provide it over the phone or in person — not over email. And never share your password with anyone. Google does not email you to ask you for your password, your social security number, or other personal information — so don't send it!

3. Enable 'Always use HTTPS.' Any time you visit a webpage, your computer needs to send and receive information across the Internet. HTTPS is used to encrypt data as it is transmitted between computers on the Internet, so look for the 'https' in the URL bar of your browser to indicate that the connection between your computer and Gmail's servers is encrypted. We use HTTPS on the Gmail login page, and you can choose to protect your entire Gmail session with HTTPS as well. HTTPS can make your mail slower, so we let you make the choice for yourself. Open Settings and choose 'Always use HTTPS' on the General tab if you want to turn it on.

4. Be wary of unexpected attachments.To help protect you from viruses and malware, Gmail automatically scans every attachment when it's delivered to you, and again each time you open a message. Attachments you send are also scanned. That said, no system is foolproof, so if you happen to get an email from a friend with an attachment you didn't expect, don't be afraid to ask the sender what it is before you decide whether to open it.

5. Make sure your account recovery information is up-to-date. Your account recovery information helps you regain access to your account if you ever forget your password, or if someone gains access to your account without your permission. We currently offer several paths to account recovery. Every Gmail user must select a security question and answer — be sure to choose a combination that is easy for you to remember, but hard for others to guess or come across by investigating. Don't choose a question like "What is my favorite color?" as others may easily guess the answer. We also encourage you to provide a secondary email address and/or a mobile phone number, so we can send you a link to reset your password if you lose access to your account.

You can find additional security tips for Gmail in our Help Center. Learn more about protecting your computer, website, and personal information by checking out our security series on the Google blog or visiting http://www.staysafeonline.org.


source: http://gmailblog.blogspot.com/2009/10/gmail-account-security-tips.html


Monday, May 18, 2009

How do I post via email?

The Mail-to-Blogger feature turns any email account into a blog-posting application. In Settings | Email you can create a Mail-to-Blogger address which you will use to send posts via email to your blog:

Settings | Email tab

To post to your blog via email, you need to configure your Mail-to-Blogger email address in Settings | Email:

The format of the email address is username.secretword@blogger.com. Note that this email address must be kept secret. Otherwise, anyone who gets it will be able to post as you.

Also be sure to specify whether or not you prefer your email posts to publish automatically. If this option is not checked, then your posts will be saved on your account but will not appear on your blog until you log in to Blogger.com and publish them yourself.

Once you have saved your Settings, you can send email to your blog. The subjects of your email letters will be the titles of your posts, and the body of the emails will be the posts themselves. To include an image in your post, you can attach an image to you your email.

Notes:

  • Sometimes email programs append text to the bottom of each sent message; to make sure this cruft doesn't get posted to your blog, put #end at the end of your post.
___________________________

Sample of posting by email to this blog

Friday, May 15, 2009

What Google knows about you

What Google knows about you

Google may know more about you than your mother does. Got a problem with that?

May 11, 2009 12:00 PM ET

Computerworld - "Google knows more about you than your mother."

Kevin Bankston, senior staff attorney at the Electronic Frontier Foundation, recently made that statement to this reporter. A few years ago, it might have sounded far-fetched. But if you're one of the growing number of people who are using more and more products in Google's ever-expanding stable (at last count, I was using a dozen), you might wonder if Bankston isn't onto something.

It's easy to understand why privacy advocates and policymakers are sounding alarms about online privacy in general -- and singling out Google in particular. If you use Google's search engine, Google knows what you searched for as well as your activity on partner Web sites that use its ad services. If you use the Chrome browser, it may know every Web site you've typed into the address bar, or "Omnibox."

It may have all of your e-mail (Gmail), your appointments (Google Calendar) and even your last known location (Google Latitude). It may know what you're watching (YouTube) and whom you are calling. It may have transcripts of your telephone messages (Google Voice).

It may hold your photos in Picasa Web Albums, which includes face-recognition technology that can automatically identify you and your friends in new photos. And through Google Books, it may know what books you've read, what you annotated and how long you spent reading.

Technically, of course, Google doesn't know anything about you. But it stores tremendous amounts of data about you and your activities on its servers, from the content you create to the searches you perform, the Web sites you visit and the ads you click.

Google, says Bankston, "is expecting consumers to trust it with the closest thing to a printout of their brain that has ever existed."

How Google uses personal information is guided by three "bedrock principles," says Peter Fleischer, the company's global privacy counsel. "We don't sell it. We don't collect it without permission. We don't use it to serve ads without permission." But what constitutes "personal information" has not been universally agreed upon.

Quote:
[Google] is expecting consumers to trust it with the closest thing to a printout of their brain that has ever existed.
Kevin Bankston, senior staff attorney, EFF


Google isn't the only company to follow this business model. "Online tools really aren't free. We pay for them with micropayments of personal information," says Greg Conti, a professor at the U.S. Military Academy at West Point and author of the book Googling Security: How Much Does Google Know About You? But Google may have the biggest collection of data about individuals, the content they create and what they do online.

It is the breathtaking scope of data under Google's control, generated by an expanding list of products and services, that has put the company at the center of the online privacy debate. According to Pam Dixon, executive director at the World Privacy Forum, "No company has ever had this much consumer data" -- an assertion that Google disputes.

Opacity vs. transparency

Critics say Google has been too vague in explaining how it uses the data it collects, how it shares information among its services and with its advertisers, how it protects that data from litigators and government investigators, and how long it retains that data before deleting or "anonymizing" it so that it can't be tracked back to individual users.

"Because of Google's opacity as to how it is using that data, and a lack of fundamental information rights [that] users have, [privacy] becomes a very thorny question," says Dixon.


Tuesday, January 13, 2009

Sybase protocol driver failed

Error Message:
---------------------------
Warning
---------------------------
[SYBASE][ODBC Sybase driver][Sybase]ct_connect(): user api layer: internal Client Library error: Read from the server has timed out.[SYBASE][ODBC Sybase driver][Sybase]ct_connect(): network packet layer: internal net library error: Net-Lib protocol driver call to connect two endpoints failed


Possible Cause:
Usually caused by an open client problem. This is conectivity problem.

Resolution:
use dsedit to check the connection string for the desired server entry.
if the server does not exist, add the connection info

OR

Check sybase open client location
go to environtment system variable
check on the value of variable SYBASE
or

go to command prompt
type: echo %SYBASE%

open %SYBASE%\INI\sql.ini
add conection entry for the desired server
[SybaseASEName]
query=protocol,hostname,sybase_port_number_on_hostname
master=protocol,hostname,sybase_port_number_on_hostname

example :
sybase server instance name is : local_001
hostname for local_001 is server_001
port number used for sybase in server_001 is 5000
protocoll used is WINSOCK (NLWNSCK)

the entry is as follow:
[local_001]
query=NLWNSCK,server_001,5000
master=NLWNSCK,server_001,5000


Thursday, November 6, 2008

Messenger Berbasis Web

Messenger Berbasis Web, Alternatif Buat Chatting
CBN Tag: Hot Topic
Wed, 05 Nov 2008 11:04:00 WIB

Internet makin dibutuhkan dan makin mudah pula mengaksesnya. Apalagi sekarang ini makin banyaknya mal, cafe maupun sekolah yang sudah menyediakan akses Internet dengan menggunakan layanan WiFi gratis. Jadi kalau punya notebook atau ponsel yang sudah tersedia WiFi, Anda tinggal klik lalu bisa langsung mengakses internet.

Salah satu fasilitas di Internet yang paling banyak disukai saat ini adalah instant Messenger atau sering disebut chatting. Sebagai salah satu fasilitas untuk aktivitas komunikasi antar individu atau bahkan antar grup di Internet, implementasi dari chatting ini juga sangat beragam di Internet, seperti MSN, Yahoo! Messenger, Google Talk dan masih banyak lagi bentuk komunikasi yang lain.

Instant Messenger yang paling terkenal untuk chatting adalah Yahoo Messenger yang merupakan aplikasi tambahan dari server Yahoo. Banyaknya pengguna Yahoo Messenger dikarenakan banyak fitur-fitur yang bisa dimanfaatkan, seperti add a contact yang memudahkan untuk mengingat siapa saja dan apa aja ID yang teman-teman kita miliki. Send File, merupakan fitur pendukung yang memudahkan untuk mengirim file ke teman. Dengan cara klik action, pilih Send File, kemudian pilih file yang mau dikirim terus klik open, maka file pun akan terkirim.

Cukup mudah, jadi tidak perlu lagi mengirim file menggunakan email atau sebagainya yang mungkin akan menghabiskan sedikit waktu pada saat kita melakukan komunikasi dengan teman, karena sudah dipermudah oleh Yahoo itu sendiri.

Ada lagi fitur Call Computer yang memudahkan melakukan percakapan melalui jaringan Internet dengan gratis, sehingga memudahkan komunikasi tanpa harus menulis satu persatu lagi. Namun fitur ini membutuhkan bandwidth yang cukup besar dalam penggunaannya.

Selain itu fitur webcam juga membutuhkan bandwidth yang besar karena kesanggupannya menunjukkan gambar berikut sound. Webcam bisa digunakan kalau hardwarenya sudah tersedia, sehingga kita bisa melihat seperti apa rupa orang yang chatting dengan kita dan aktifitas yang sedang dilakukannya.

Ada juga Conference, sebuah fitur yang memudahkan kita untuk melakukan chatting secara bersama-sama atau lebih dari satu orang. Dengan Conference bisa melakukan diskusi bersama, maupun mencari permasalahan dan menemukan pemecahan masalahnya secara bersama-sama.

Sedangkan aplikasi yang menarik adalah Audibles dan Emoticon, merupakan aplikasi berbentuk gambar animasi yang bisa dikirim ke lawan bicara kita. Animasi yang tersedia juga beragam bentuknya, banyak pilihan animasi yang lucu-lucu dan menyebalkan yang bisa dipilih sesuai keinginan kita. Dan masih banyak lagi fitur-fitur yang tersedia di Yahoo, bisa dilihat setelah selesai menginstal Yahoo Messenger dan sudah daftar serta login.

Install cara mudah

Namun yang jadi permasalahan adalah apabila kita menggunakan komputer yang belum terinstal Instant Messenger, biasanya pada komputer kantor maupun warnet. Padahal saat itu kita ingin melakukan chatting dengan kawan kita. Untuk mendownload file dan menginstalnya, tentu membutuhkan waktu agak lama, bisa jadi teman yang ingin ngobrol dengan kita terlanjur sign out karena tak sabar menunggu.

Tapi jangan khawatir, Yahoo punya messenger berbasis web yang memudahkan kita tetap bisa melakukan chatting walaupun komputer yang kita gunakan tidak tersedia aplikasi Yahoo Messenger. Jadi cukup manfaatkan versi webnya di alamat webmessenger.com, kita tidak perlu lagi membuang waktu dengan menginstal aplikasi instant messenger pada komputer.

Karena berbasis web, penggunaannya seperti melakukan browsing. Anda cukup buka Internet browser, masuk ke alamat layanan, login dengan account username dan password, lalu Anda sudah bisa melakukan chatting. Layanan kirim pesan praktis ini juga bisa menjadi solusi jika jalur Instant Messenger diblokir oleh administrator jaringan di tempat kita bekerja.

Sebagai solusi praktis untuk chatting, fasilitas standar yang terdapat di program Yahoo Messenger juga tersedia di web messenger, walaupun tak semua opsi setting dan plugin tersedia tapi pilihan emoticon, pilihan huruf, hingga fasilitas view untuk menampilkan teman yang sedang offline dan online tetap tersedia.

Tidak hanya Yahoo Messenger, tapi hampir semua layanan Instant Messenger seperti MSN dan Google Talk pun memiliki layanan messaging berbasis web.

Dalam mengakses versi berbasis web dapat ditemui dimasing-masing layanan di webmessenger.msn.com dan www.google.com/talk/#. Fiturnya hampir sama dengan Yahoo Messenger, tersedia hanya yang standar, namun ini pun sudah memadai. Sebetulnya selain layanan resmi dari masing-masing instant Messenger, kita masih bisa menggunakan layanan lain atau dari pihak ketiga. Biasanya layanan ini menyediakan fasilitas akses kebanyak layanan. Salah satunya dan yang terpopuler adalah Meebo, yang beralamat di Meebo.com.

Dengan Meebo kita bisa mengakses jalur chatting beraneka layanan dalam satu website dan bisa menggunakan beberapa account chatting sekaligus, tapi semuanya bisa dipantau dari satu jendela di dalam web browser. Mebbo sendiri menyediakan kanal untuk chatting antar sesama pengguna Meebo. Selain Meebo, masih banyak layanan alternatif lain dari layanan Instant Messenger berbasis web, seperti yang dikutip dari Unipdu ada beberapa pilihan yang bisa kita gunakan seperti:

1. eBuddy (http://www.ebuddy.com)
Dengan menggunakan ebuddy ini, Anda bisa chatting dengan teman-teman Anda dengan menggunakan versi web dan mobile-nya. eBuddy ini sangat ringan dan mudah digunakan. Saat ini eBuddy juga mendukung Yahoo!Messenger.

2. KooIIM (http://www.koolim.com)
IM berbasis web ini dapat membantu Anda untuk terkoneksi dengan inbox email Anda seperti jaringan-jaringan Instant Messenger popular lainnya seperti Meebo juga.

3. ILoveIM (http://www.iloveim.com)
ILoveIM ini merupakan salah satu layanan Instant Messenger lain berbasis web yang dapat membantu anda untuk terkoneksi dengan account Instant Messenger Anda dengan disertai sedikit iklan untuk mendukung layanannya tetapi tidak terlalu mengganggu.

4. Goowy (http://www.goowy.com)
Goowy lebih dari hanya sekedar klien IM berbasis web tetapi juga menawarkan layanan e-mail, kalender, berita, RSS, storage file gratis, dan banyak lagi dalam satu tempat.

5. IMunitive (http://www.imunitive.com/index.html)
Imunitive merupakan salah satu alernatif seperti Meebo dengan dukungan platform IM yang hampir sama tetapi tidak mendukung Jabber. Salah satu situs layanan IM berbasis web yang perlu Anda datangi.

6. RadiusIM (http://www.radiusim.com)
Layanan Instant Messenger berbasis web ini memiliki integrasi dengan Google Maps yang berarti Anda bisa melihat teman-teman yang sedang chat dengan anda berasal dari kota atau daerah mana. Layanan ini yang kita butuhkan.

7. IMO (http://imo.im/)
Dengan menggunakan layanan ini, Anda bisa log in ke banyak jaringan chat Instant Messenger popular pada waktu yang sama. Selain itu kelebihannya layanan ini berbasis web, jadi sangat mempermudah Anda.

8. Mabber (http://www.mabber.com/)
Mabber memiliki kelebihan yaitu dapat Anda gunakan baik pada web atau ponsel. Mabber mendukung platform IM seperti AIM, ICQ, MSN Messenger, Yahoo Messenger dan Google Talk. Selain itu Mabber mempunyai widget chatbox untuk diletakkan di website atau blog anda. Jadi Anda bisa chatting lewat website atau blog Anda.

9. Plugoo (http://plugoo.com)
Plugoo merupakan kumpulan Instant Messenger terkenal yang disatukan pada sebuah widget atau aksesori web/blog sehingga Anda bisa terhubung dengan pengunjung-pengunjung situs Anda dari Instant Messenger lain seperti AIM, MSN, Yahoo, Gtalk, ICQ dan Jabber.

10. SNIMMER (http://www.snimmer.com)
Anda bisa chat langsung dengan MSN, Yahoo, AOL, ICQ, Gtalk dan memperbanyak teman baru dengan membuat profil Anda dengan disertai foto.

Sumber: Majalah Biskom

Monday, August 11, 2008

WriteProtect USBStorageDevice on WinXP SP2

Read Only access (WriteProtect) to any usb storage device on Microsoft Windows XP SP2

** open Registry Editor
** look for or create new key:
      HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\StorageDevicePolicies
** look for or create new DWORD value: WriteProtect
** put value: 1

Rollback
** put value: 0 (zero)

Info
** Other usb devices (non storage devices) are not affected

Wednesday, July 16, 2008

Wireless-G Pantau Rumah Melalui Internet

Wireless-G Pantau Rumah Melalui Internet

CBN Tag: Hobbies
Fri, 11 Jul 2008 09:08:00 WIB

Kasus pencurian dan perampokan rumah semakin sering terjadi. Diperlukan berbagai peranti keamanan yang bisa membantu pemilik rumah, toko, hotel atau lainnya untuk melindungi hartanya. Untunglah, kini semakin banyak tersedia peranti elektronik yang berfungsi sebagai pengaman. Salah satunya, Wireless-G, yang memungkinkan pemilik mengecek kondisi rumah dari jauh.

Kamera video Wireless-G Internet WVC54GCA diproduksi oleh vendor Linksys. Dengan alat ini, pengguna diklaim dapat mengecek kondisi rumah dan barang-barang miliknya dari mana pun dan kapan pun.

Tak seperti webcam, yang hanya bekerja jika terkoneksi dengan PC (personal computer), WVC54GCA dijanjikan dapat bekerja tanpa terkoneksi dengan PC, sementara tetap terkoneksi internet. Sehingga alat ini dapat diakses dimanapun penggunanya berada melalui web browser dan koneksi internet.

Yang menarik adalah kamera ini juga disertai dengan 'security mode', yang akan mengirimkan pesan berupa video klip pendek termasuk audio kepada pengguna, segera setelah kamera mendeteksi adanya gerakan. Artinya, jika sesuatu terjadi di rumah, pengguna akan dapat mengetahui secepatnya.

Wireless-G WVC54GCA kini tersedia melalui distributor lokal dan VAR (Value-Added resellers) dengan kisaran harga ritel sebesar Rp 1,2 juta. Dengan harga yang relatif terjangkau Link sys membantu anda untuk mengamankan rumah.

Sumber: SuaraMerdeka - CBN

Wednesday, February 6, 2008

config.nt - error message when trying to run a program in Windows 2000

config.nt The system file is not suitable for running MS-DOS and Microsoft Windows applications - error message when trying to run a program in Windows 2000
http://support.microsoft.com/kb/889506

-SYMPTOMS-
When you try to run a program on a Microsoft Windows 2000-based computer, you may receive the following error message:
config.nt The system file is not suitable for running MS-DOS and Microsoft Windows applications. Choose 'Close' to terminate the application.

-CAUSE-
This issue may occur if all the following conditions are true:
• You try to run a 16-bit program.
• You have installed the MS04-032 Security Update for Microsoft Windows.
• You have disabled 8.3 file name creation for the NTFS file system.
When you run a 16-bit program on Windows 2000, the program runs in the Microsoft Windows NT Virtual DOS Machine (NTVDM). The NTVDM is a multithreaded process that simulates a 16-bit Windows environment where 16-bit Windows-based programs can be run as separate threads. The NTVDM uses the TMP system variable to find a location to run the program. Typically, the TMP system variable is set to C:\WINNT\Temp. This folder uses the 8.3 file-naming format when new files are created, instead of using long file names.

After the MS04-032 Security Update for Microsoft Windows is installed, the NTVDM uses the TMP user variable instead of the TMP system variable. If 8.3 file name creation is disabled on your computer, the TMP user variable uses long file names.

-WORKAROUND-
To work around this issue, follow these steps:
1. Click Start, point to Settings, and then click Control Panel.
2. Double-click System, click the Advanced tab, and then click Environment Variables.
3. In the User variables for User_Name list, click TMP, and then click Edit.
4. In the Variable value box, type c:\winnt\temp, and then click OK three times.

Alternatively, type the path of any folder that does not use long file names in the Variable Value box.
5. Close Control Panel.
Note To work around this issue for many users, you can use the PathMan.exe utility to update the TMP user variable by using a logon script. PathMan.exe is included in the Microsoft Windows 2000 Server Resource Kit. For more information about PathMan.exe, click Tools Help in the Windows 2000 Server Resource Kit, expand Computer Management Tools, and then click PathMan.exe.

-MORE INFORMATION-
When 8.3 file name creation is disabled, the NtfsDisable8dot3NameCreation registry entry has a value of 1. This registry entry is in the following registry subkey:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\FileSystem
Because many 16-bit programs cannot use long file names, we recommend that you do not disable 8.3 file name creation on computers that run 16-bit programs.

For additional information about the MS04-032 Security Update for Microsoft Windows, click the following article number to view the article in the Microsoft Knowledge Base:
840987 (http://support.microsoft.com/kb/840987/) MS04-032: Security update for Microsoft Windows

Wednesday, November 7, 2007

UNIX - Search and Replace in vi editor

This is about as complicated as it gets in vi, since search and replace sytnax is taken from the UNIX sed (stream editor) command.

>> Global search and replace --> :1,$ s/old/new/g

In english, this means:
From 1 to $ (end of file)
substitute
occurrences of "old"
with occurrences of "new"
globally (i.e., all instances of "old")

I won't go into details on using sed in this section (see the UNIX sections on sed and regular expressions), but you can easily change the range to search and replace from by changing "1" and "$" to your needs.

Registry entries ** LAN Settings button on Internet Options->Connections tab **

HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings

Registry entries ** Hidden Run and Clock **

HKEY_Current_User\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer

Tuesday, November 6, 2007

Registry entries ** Connection Tab Settings on Internet Options **

Warning:
Be sure to make a backup copy of the registry prior to making any changes to it.
Use the Registry Editor at your own risk.

To restore the Connection tab to the Internet Options, follow the procedure outlined below:

1. Go to Start>> Run. Type in: regedt [Enter] or click OK.
2. Navigate to the following registry key:

HKEY_CURRENT_USER\Software\Policies\Microsoft\Internet Explorer\Control Panel

3. Single left click the Control Panel key to open its contents in the right pane.
4. In the right pane, double click the entry titled: NameTab
5. Change the DWORD value from 1 (one) to 0 (zero).
6. Exit the registry editor and restart Internet Explorer.

related link: http://www.5starsupport.com/info/ietechinfo.htm#connection-tab

Sybase - ReCreating SYB_BACKUP server

01. Stop Backup Service. i.e. Sybase SQLServer_[ASE]_BS.
02. Remove Backup Server using Server Config ($SYBASE\ASE-12_5\BIN\SYCONFIG.exe).
03. Remove file "Run_[ASE]_BS.bat". Or renamed it to "Run_[ASE]_BS.bat.orig".
04. Remove Backup Server mapping from master..sysservers using sp_dropserver SYB_BACKUP command.
05. Stop SQL Service i.e. Sybase SQLServer_[ASE].
06. Restart Machine.
07. Start SQL Service. Backup service is still exist in the "Services" window.
08. Remark Backup Server entries in $SYBASE\ini\SQL.ini or delete them.
09. Create Backup Server using Server Config.
10. Check SQL.ini. There should be new entries created for Backup Server. Ping it using DSEDIT utility ($SYBASE\OCS-12_5\BIN\DSEDIT.exe).
11. Insert SYB_BACKUP server into master..sysservers table by running below script. Must be 'sa' or user with 'sa_role' to run it.
12. Test Dump master DB.
13. When failed, excalate the issue.

Related Links :
www.sybase.com
www.sypron.nl

Terms :
ASE stands for Adaptive Server Enterprise. It is practically the Sybase Server Instance

Command line to: Lock Desktop; Log Off; Reboot; and Shutdown

# Lock Desktop #
%WinDir%\system32\rundll32 %WinDir%\system32\user32.dll,LockWorkStation

# Log Off #
%windir%\System32\Shutdown.exe -l -t 5 -c "Logging off from system in 5 seconds"

# Reboot #
%windir%\System32\Shutdown.exe -r -t 10 -c "Rebooting system in 10 seconds"

# Shutdown #
%windir%\System32\Shutdown.exe -s -t 10 -c "Shutting down system in 10 seconds"

# Abort #
%windir%\System32\Shutdown.exe -a

Wednesday, March 29, 2006

Sybase - Bind tempdb

Sybase - Bind tempdb
  • bind a tempdb to a particular application / program
    sp_tempdb 'bind','AP','','DB','TEMPDB4'
  • bind a tempdb to a particular login name
    sp_tempdb 'bind','LG','','DB','TEMPDB2'

Wednesday, March 8, 2006

UNIX - tar files with pattern

UNIX : tar files with pattern

tar xvf /dev/rmt/0 `tar tf /dev/rmt/0 grep 'pattern'`

example:
tar xvf /dev/rmt/0 `tar tf /dev/rmt/0 grep 'DT.040306.TM.180323'`

Subscribe

Enter your email address:

Delivered by FeedBurner