Selasa, 30 Maret 2010

Cara membuat poster menggunakan printer biasa







Membuat poster menggunakan printer biasa atau printer kecil seperti printer inkjet mungkin banyak orang berpikir itu tidak mungkin. Tetapi dengan “Easy Poster Printer” software Anda dapat melakukannya dengan mudah. Perangkat lunak ini dapat mencetak ukuran poster hingga 20 × 20 meter (max) Hanya dengan menarik dan drop gambar Anda ke dalam aplikasi atau membuka gambar kemudian klik cetak.

“Easy Poster Printer” dirilis sebagai freeware dan software ini dilengkapi dengan Windows Shell Extension yang memungkinkan Anda untuk melihat thumbnail poster di Windows Anda. Easy Poster Printer menggunakan teknologi terbaru dari Microsoft. NET, yang menjamin Anda kompatibilitas yang luas. Jadi, jika Anda menggunakan Windows XP, Anda harus menginstal Microsoft. NET 3.5 atau versi terbaru.

Bagaimana cara mencetak menggunakan aplikasi ini?

1. Buka poster atau drag dan drop ke dalam Poster Easy Printer.
2. Set dimensi, kualitas cetak dan kertas orientasi.
3. Klik print poster, Ok. Atau Anda dapat menyimpan proyek kemudian mencetaknya nanti.

Fitur dari Easy Poster Printer

* Membuat poster dari berbagai ukuran (maks 20 × 20 meter) dengan menggunakan printer biasa (A4 misalnya).
* Load, Hapus, Putar atau gambar poster Flip on the fly.
* Tentukan ukuran poster Anda dalam mm, cm, Inch atau bahkan halaman.
* Sesuaikan ukuran poster dengan menggunakan snap build in algoritma untuk ukuran atas atau bawah.
* Lihat poster Anda sebagai thumbnail pada Windows Explorer (hanya untuk windows Vista dan 7 ).
* Simpan format kustom Anda sendiri untuk lebih mudah reproduksi.
* Membuat kualitas tinggi poster dari gambar biasa (150-600 DPI)
* Gunakan Drag n Drop untuk kedua data-file dan file-file gambar.
* Ubah warna latar belakang
* Copy and Paste gambar langsung ke poster



http://www.gdsoftware.dk/getdownload.aspx?file=epp.zip

Senin, 29 Maret 2010

free recovery data untuk flash card, memory card





Kehilangan data pada flashdisk atau memori di handphone kita memang sangat menyebalkan dikarenakan virus atau format tanpa sengaja, apalagi kalau data tersebut sangatlah penting. Mungkin software gratis ini perlu di coba.

PC Inspector Smart Recovery 4.5






License model: Free
Limitations: Not available
Operating systems: Windows Me, Windows 98, Windows 95, Windows 2000, Windows NT, Windows XP
Additional requirements: Not available

Publisher's description:

PC Inspector Smart Recovery is a data-recovery program for Flash Card, Smart Media, Sony Memory Stick, IBM Micro Drive, Multimedia Card, and Secure Digital Card. The software will bring back deleted pictures from any digital camera media.




di sini

Minggu, 28 Maret 2010

download laptop repair video collection

download Magic windows Video Tutorial




Kumpulan tutorial dan trik pada windows bisa Anda peroleh di sini


23 Files / 2 hrs | 640 x 480 / 484 x 356 / 720 x 480 | XviD | MP3 - 128kbps | 102 MB

Magic windows Video Tutorial: Here you will find some magic with the Windows: How to make DVD-Rip, how to know admins password, lock any folder, free sms, download any video file from internet, remove windows xp screen, create thumbnail with photoshop, Make Windows Xp Start Faster, new xp color theme and even more!!

download
Magic windows Video Tutorial

Hacking – The Art of Exploitation 2ND Ed – Book CD




Bagi Anda yang memerlukan buku The Art of Exploitation edesi kedua, silahkan sedot di sini


Hacking – The Art of Exploitation 2ND Ed – Book CD | 488 pages | No Starch Press (January 11, 2008) | 1593271441 | English
Infomations
Hacking is the art of creative problem solving, whether that means finding an unconventional solution to a difficult problem or exploiting holes in sloppy programming. Many people call themselves hackers, but few have the strong technical foundation needed to really push the envelope.

Rather than merely showing how to run existing exploits, author Jon Erickson explains how arcane hacking techniques actually work. To share the art and science of hacking in a way that is accessible to everyone, Hacking: The Art of Exploitation, 2nd Edition introduces the fundamentals of C programming from a hacker’s perspective.

The included LiveCD provides a complete Linux programming and debugging environment–all without modifying your current operating system. Use it to follow along with the book’s examples as you fill gaps
in your knowledge and explore hacking techniques on your own. Get your hands dirty debugging code, overflowing buffers, hijacking network communications, bypassing protections, exploiting cryptographic weaknesses, and perhaps even inventing new exploits. This book will teach you how to:

Program computers using C, assembly language, and shell scripts

Corrupt system memory to run arbitrary code using buffer overflows and format strings
Inspect processor registers and system memory with a debugger to gain a real understanding of what is happening
Outsmart common security measures like nonexecutable stacks and intrusion detection systems
Gain access to a remote server using port-binding or connect-back shellcode, and alter a server’s logging behavior to hide your presence
Redirect network traffic, conceal open ports, and hijack TCP connections
Crack encrypted wireless traffic using the FMS attack, and speed up brute-force attacks using a password probability matrix
Hackers are always pushing the boundaries, investigating the unknown, and evolving their art. Even if you don’t already know how to program, Hacking: The Art of Exploitation, 2nd Edition will give you a complete picture of programming, machine architecture, network communications, and existing hacking techniques. Combine this knowledge with the included Linux environment, and all you need is your own creativity.


download link :

Hotfile
Hacking – The Art of Exploitation 2ND Ed

Kamis, 25 Maret 2010

100 theme windows7 free download




100 Themes For Windows 7

Anda membutuhkan tema-tema pada windows7? bisa di download di sini



100 Themes For Windows 7
These are Windows 7 Formatted Themes, Just Double Click on the one you want to install, it does the rest for you...

download link :

- http://netload.in/dateimrwAjsHwjC.htm

- http://rapidshare.com/files/362497149/100.Themes.For.Windows.7.rar

- http://sharingmatrix.com/file/2300897/100.Themes.For.Windows.7.rar

Senin, 22 Maret 2010

how to Secure Yourself from Hackers & Hijackers





Secure Yourself from Hackers & Hijackers
Amankan komputermu dari Hackers & Hijackers

Di sini akan saya bagikan sedikit tips dan trik untuk melindungi dari serangan hacker pada sistem operasi Windows. Kalau tidak tahu artinya coz di tulis dalam bahasa Inggris, so translate aja yah..hehhe




Hackers and Browser Hijacking is one area of the Net that affects everyone at some stage.

In addition to having third party utilities such as SpyBot, Anti Virus scanners and firewalls installed there are some changes that can be made to Windows 2000/XP. Below are some details to make your system safer from hackers and hijackers.

Some of these tips require editing of the Registry so it is wise to either backup the registry and/or create a Restore Point.
1. Clearing the Page File at Shutdown
Windows 2000/XP paging file (Sometimes called the Swap File) can contain sensitive information such as plaintext passwords. Someone capable of accessing your system could scan that file and find its information. You can force windows to clear out this file.

In the registry navigate to HKEY_LOCAL_MACHINESYSTEMCurrentControlSetControlSe ssion ManagerMemory Management and add or edit the DWORD ClearPageFileAtShutdown. Set it to 1.

Note that when you do this, the system will take much longer to shut down: a system with a really big Page File (! Gig or more) may take a minute or two longer.

2. Disable the POSIX and OS/2 Subsystem.

Windows 2000 and XP come with little-documented subsystems it at allow compatibility with UNIX and OS/2 systems These rues systems are enabled by default but so rarely used that they are best off bring disabled completely to prevent possible service hijackings.

To disable these subsystems, open the registry and navigate to HKEY LOCAL MACHINESYSTEMCurrentControlSetControlSession ManagerSubSystems. Delete the subkeys Os2 and Posix. then reboot.


3. Never leave default passwords blank.
On installation, Windows 2000 sets up an Administrator account with total system access and prompts for a password. Guess what: by default, it allows that password to be blank. If a user doesn't want to type a password, he can simply click Next and the system will be an open door for anyone who wants to log on. Always opt for a password of some kind when setting up the default account on a machine.

4. Disable the Guest account
Windows XP comes with a Guest account that's used for limited access, but it's still possible to do some damage with it. Disable it completely if you are not using it. Under Control Panel, select User Accounts, click on Guest Account and then select Turn Off the Guest Account.

5. Install Windows In a different directory.
Windows usually installs itself in the WINDOWS directory. Windows NT 4 0 and 2000 Will opt for WINNT. Many worms and other rogue programs assume this to be the case and attempt to exploit those folders files. To defeat this install Windows to another directory when you're setting it up - you can specify the name of the directory during setup. WINDIR is okay; so some people use WNDWS - A few (not that many) programs may not install properly if you install Windows to another folder but t hey are very few and they are far between

6. Fake out hackers with a dummy Administrator account
Since the default account in Windows 2000 is always named Administrator, an enterprising hacker can try to break into your system by attempting to guess the password on that account. It you never bothered to put a password on that account, say your prayers.

Rather than be a sucker to a hacker, put a password on the Administrator account it you haven't done so already. Then change the name of the Administrator account. You'll still be able to use the account under its new name, since Windows identifies user accounts by a back-end ID number rather than the name. Finally, create a new account named Administrator and disable it. This should frustrate any would -be break-ins.

You can add new accounts and change the names of existing accounts in Windows 2000 through the Local Users and Groups snap in. Right-click on My Computer, select Manager, open the Local Users and Groups subtree, look in the Users folder and right-click on any name to rename it. To add a new user, right-click on the containing folder and select New User. Finally, to disable an account, double-click it, check the Account is disabled box and click OK.

Don't ever delete the original Administrator account. Some programs refuse to install without it and you might have to log in under that account at some point to setup such software. The original Administrator account is configured with a security ID that must continue to be present in the system.

7. Set the Hosts file to read-only to prevent name hijacking.

This one's from (and to a degree, for) the experts. The HOSTS file is a text file that all flavors of Windows use to hold certain network addresses that never change. When a network name and address is placed in HOSTS, the computer uses the address listed there for that network name rather than performing a lookup (which can take time). Experts edit this file to place their most commonly-visited sites into it, speeding things up considerably.

Unfortunately hijackers and hackers also love to put their own information into it - redirecting people from their favorite sites to places they don't want to go. One of the most common entries in HOSTS is local host which is set 1770.0.1. This refers to the local machine and if this entry is damaged the computer can behave very unpredictably.

To prevent HOSTS from being hijacked, set it to read-only. Go to the folder %Systemroot%system32driversetc, right-click on HOSTS, select Properties check the Read-Only box and click OK. If you want to add your own entries to HOSTS, you can unprotect it before doing so, but always remember to set it to read-only after you're done.

8. Turn off unneeded Services
Windows 2000 and XP both come with many background services that don't need to he running most of the time: Alerter, Messenger, Server (If you're running a standalone machine with no file or printer shares), NetMeeting Remote Desktop Sharing, Remote Desktop Help Session Manager (the last two if you're not using Remote Desktop or NetMeeting), Remote Registry, Routing and Remote Access (if you're not using Remote Access), SSDP Discovery Service, Telnet, and Universal Plug and Play Device Host.
A good resource and instruction on which of these services can be disabled go to /http://www.blkviper.com/WinXP/


9. Disallow changes to IE settings through IE
This is another anti hijacker tip. IE can be set so that any changes to its settings must be performed through the Internet icon in the Control Panel, rather than through IE's own interface. Some particularly unscrupulous programs or sites try to tamper with setting by accessing the Tools, Options menu in IE. You can disable this and still make changes to IE's settings through the Control Panel.

Open the Registry and browse to HKEY_CURRENT_USER SoftwarePoliciesMicrosoftInternet ExplorerRestrictions. Create or edit a new DWORD value named NoBrowserUptions and set it to 1 (this is a per-user setting). Some third-party programs such as Spybot Search And Destroy allow you to toggle this setting.

You can also keep IE from having other programs rename its default startup page, another particularly annoying form of hijacking. Browse to HKEY.CURRENT USERSoftwarePolicies MicrosoftInternet ExploreControl Panel and add or edit a DWORD, Homepage and set it to 1.


10. Disable simple File Shares.
In Windows XP Professional, the Simple File Sharing mode is easily exploited, since it抯 a little too easy to share out a file across your LAN (or the NET at large). To turn it off, go m My Computer, click Tools, Folder Option and the View tab, and uncheck Use Simple file sharing (Recommended). Click OK. When you do this you can access the Security tab in the Properties window for all folders; set permissions for folders; and take ownership of objects (but not in XP Home)

Semoga membantu

Rabu, 17 Maret 2010

400000 Universal Windows Drivers 2010




Kumpulan driver-driver motherboard, soundcard, VGA dan lain-lain ada di sini

400000 Universal Windows Drivers 2010 free download 3.1 GB



o more CDs for every hardware you have. Just install the DVD and update all the drivers on your PC.This collection contains software drivers for over 400,000 hardware components from brands such as Dell, HP, Compaq, IBM, Sony, Toshiba, Panasonic, as well as hardware component manufacturers Intel, 3Com, VIA, nVidia, ATI, SoundMAX, and many more!

Download links: 400000 Universal Windows Drivers 2010

Torrent Turbo Booster 3.1.3.0







Torrent Turbo Booster is a recent plug-in designed to improve the functionality of probably the most popular P2P file sharing application around ? Torrent programs. This tool comes equipped with modern technology that aims at getting your download speed way up so you can grab the files you want so badly much quicker than you?ve been used to. Movies, music, games, applications, you name it - uTorrent Turbo Booster will deliver at a fast pace. It will be there doing its job in the background without upsetting any other activity you might perform on your computer.

download

100 Hacking Tools In 1(2010)





Anda pengen belajar hacking atau belum memiliki tool-tool hacking? sekumpulan software dan tutorial ini bisa anda miliki dan free download 100 Hacking Tools In 1(2010)





silahkan anda download 100 Hacking Tools In 1(2010) pada link di bawah ini :

Hotfile
http://hotfile.com/dl/24152671/c8bcc95/Best_Hacking_Tools_-_100_in_1_2010.rar.html

Uploading
http://uploading.com/files/1b1fm32f/Best_Hacking_Tools_-_100_in_1_2010.rar/

Filefactory
http://www.filefactory.com/file/a193bb0/n/Best_Hacking_Tools_-_100_in_1_2010.rar

Kamis, 11 Maret 2010

Free download service manual laptop




Di sini Anda bisa download service manual laptop dan gratis :

ACER

Acer aspire 1300 download Acer aspire 1400 download
Acer aspire 2000 download Acer aspire 3630/travelmate 2430 download
Acer aspire 5720/5720G download
Acer aspire 3100 download
Acer aspire 5100 download
Acer aspire 5110 download
Acer aspire one download
Acer extensa 2000 download
Acer extensa 2500 download
Acer travelmate 310 download
Acer travelmate 650 download
Acer travelmate 730 download
Acer travelmate 8100 download
Acer travelmate c300 download
Acer travelmate c100 download c110 download
Acer travelmate 200 download c210 download
Acer travelmate 220 download c260 download
Acer travelmate 270 download c290 download
Acer travelmate 330 download 340 download
Acer travelmate 350 download 420 download
Acer travelmate 430 download 505 download
Acer travelmate 510 download 520 download
Acer travelmate 610 download 620 download
Acer travelmate 7100 download 7300 download

SONY vaio

Sony VGN-A download Sony VGN-FS download
Sony VGN-AR download Sony VGN-N download
Sony VGN-AX download Sony VGN-S download
Sony VGN-B download Sony VGN-SZ download
Sony VGN-BX download Sony VGN-T download
Sony VGN-C download Sony VGN-TX download
Sony VGN-FE download Sony VGN-U download
Sony VGN-FJ download Sony VGN-UX download

Free download service manual printer




hey all... saya mau bagikan beberapa service manual printer neh, tinggal di download service manual printer kemudian di baca.

CANON

Pixma iP3000 download
Pixma iP4200 download
Pixma iP5200 download

EPSON

Epson DFX 8500 download
Epson Stylus Photo 890 download
Epson Stylus Photo 1280 download
Epson Stylus Pro 1290 download
Epson Stylus Pro 9600 download
Epson Stylus Pro 7600 download

HP

Laserjet 1500 download
Laserjet 2500 download
Laserjet 4500,4550 download
Laserjet 4600 download
Laserjet 5500,5550 download
Laserjet 1200 download
Laserjet 1320 download

Senin, 08 Maret 2010

monitor LG lampu power kedip-kedip






Untuk seri seri LG seperti yang nampak pada gambar memang sering sekali mengalami permasalahan lampu kedip-kedip dan tidak ada tampilan pada layar. oups...jangan kuatir mungkin langkah ini bisa membantu

1.Buka tutup monitor dan chasing pada PCB,lepas baud2nya.
2.Liat komponen-komponen pada mesin PCB, cek, apa ada komponen yang telihat tidak baik seperti elco2 yang kembung, terutama pada elco2 sekitar trafo switching AC matic. jika terlihat baik2 saja, coba cek tegangan +5v pada rangkain sekunder travo..biasanya ini yang bermasalah, dimungkinkan karena tegangan +5v yang berubah karena elco kering.
3.Coba ganti elco tersebut, kapasitas 1000/10v.
4.Nyalakan monitor LG lagi, gimana? apakah nyala normal? kalau tidak juga periksa tegangan +B pada pin 2 flyback. Apa tegangan 90-110v masuk dan di tester tidak berubah-rubah? kalau berubah rubah coba cek transistor mosfet IRF630 dan transistor horisontal output.
5.Kalau ternyata transistor konslet/short, ganti transistor tersebut dan nyalakan kembali.
6.Berhasil dan ternyata monitor bisa normal kembali, kemudian tutup dipasang lagi.

Selamat mencoba, semoga membantu

Selasa, 02 Maret 2010

reset epson T50/T60 tanpa eror 21000068




Ketika kita mereset printer T50/60 dengan menggunakan software, terkadang akan muncul error 21000068 yang tidak dapat kita atasi, tp jangan kuatir brow... kita bisa mereset seri ini, tp cara ini tidak direkomendasikan bagi pemula, palagi kalau dah pegang solder langsung gemetaran...hheheheh
Ini tips dari Jagdish Rathore (India) dan aku telah diberikan izin untuk mempublikasikan di blog ini

1. Matikan printer, dan kemudian di buka baud2 dan tutupnya.
2. Buka PCB mainboard, kamu dapat melihat sebuah 8-pin CMOS IC. Itu limbah tinta Epson counter IC dan ditemukan pada semua printer epson.



3. Solder pin no 1,2,3,4 dengan kawat tembaga seperti ditampilkan di gambar. lalu nyalakan printer selama "20 detik"



4. Setelah 20 detik matikan printer dan lepas solder kawat dari no pin 1,2,3,4 (kembali dalam kondisi asli)
5. sekarang printer sudah di reset. kalau jadi ditutup yang bener ya bro!!

Catatan: Metode ini tidak dianjurkan untuk pemula jadi anda harus memahami apa yang Anda lakukan.Semua masalah yang disebabkan oleh tutorial ini bukan tanggung jawab kami. Gunakan tutorial ini sebagai risiko Anda sendiri.
 

About Me

Baturaden, Purwokerto, Central Java, Indonesia

gagakhitam.co.cc Copyright © 2010 Powered by google