Category Archives: windows

Improve Windows 7 Performance

Improve Windows 7 Performance

In this articel, I ll try explain about Improve Windows 7 Performance. This article suitable for you that using windows 7. Usually windows 7 is more faster and more lighter thant windows vista. However, if you feel that your windows 7 become slow, then it is time to Improve Windows 7 Performance.

There are several ways to Improve Windows 7 Performance.

Improve Windows 7 Performance in Booting

  1. Run ‘msconfig’ by type it on run box in start.
  2. Click tab ‘boot’, then click ‘advance options’.
  3. Check ‘number of processors’ and change the number bellow it into some number that match with your processor.
  4. Check ‘maximum memory’ and increase the number bellow it. In my case, I double the number.
  5. Click ‘OK’, then click ‘Apply’, then click ‘OK’.
  6. Restart you computer.

Improve Windows 7 Performance in Shutdown

  1. Run ‘regedit’ by type it on run box in start.
  2. Click on ‘HKEY_LOCAL_MACHINE’, then ‘SYSTEM’, then ‘CurrentControlSet’, then ‘Control’.
  3. In right side coloumn, double click on ‘WaitToKillServiceTimeOut’.
  4. Change the value into smaller number. Exp. 7000 that means 7 second.
  5. Close the window and restart.

Improve Windows 7 Performance in Using Application

  1. Right click on your desktop background.
  2. Chose ‘personalize’
  3. Set ‘Basic and High Contrast Theme’ for ‘Windows Classic’ or High contras type theme.
  4. Close the personalization window.

There is many other steps that can you use to Improve Windows 7 Performance. However, the above three steps are simple and need no additional programs to implement it. Hope this Improve Windows 7 Performance article will be useful for you.

 

http://septiadi.com/2011/03/29/improve-windows-7-performance/


Types of Dangerous Programs

Types of Dangerous Programs

There is many Types of Dangerous Programs out there in the internet. However there is only few people know what the Types of Dangerous Programs that may harm their computer. Most of them only know about Virus and sometime mistakenly call other Types of Dangerous Programs as Virus. Therefore, it would be best if in this time I explain about Types of Dangerous Programs.

Types of Dangerous Programs no 1 – Virus

In general, viruses are computer program which have the capability to replicate by inserting a different program into a file. Computer viruses can spread speedily around the files inside a laptop or computer, or maybe infect other files in your laptop or computer, either using a network or via the actions of the exchange of files. Some time in the past most viruses have the extension executable file (ending in COM or EXE). This virus can cause damage.

Types of Dangerous Programs no 2 – Trojan Horse

Trojan horse (Trojan horse) is actually not a virus in real terms, because the program does not have the capability to replicate itself to other programs. Even so, the program is no much less dangerous when in comparison with a computer virus. Trojan integrated in RATS (remote accessibility trojans), exactly where a pc may be managed by particular systems, even some trojans enabled so that you can open the computer that has been infected from afar. Trojan Horse is generally packaged in the type of a program that is attractive but has hidden additional purpose to complete the destruction. If the user run the program then instantly the system may be contaminated.

Types of Dangerous Programs no 3 – Worm

The worm can infect computers if the computer we use download packages from the web and do not have excellent security. Popular worm found on has extension executable program file (. EXE datau. SCR). The worm is normally easily spread by way of e-mail at the time of attachment (insert the data in E-mail). Its main function is to conduct attacks and spreads also as retrieve information and deliver e-mail silently and random. The worm generally doesn’t trigger severe damage however the harm brought on worms enough to annoy users since worm will duplicate by itself by instantly sending the file by way of an attachment to every single address inside the address book in your e-mail. However the worm attacks the mailserver is extremely harmful for the reason that the outbreak of the worm brings about the mailserver workload jumped dramatically to affect efficiency.

Types of Dangerous Programs no 4 – Spyware

Spyware is really a software that secretly entered to the personal computer and retrieve critical data that we’ve got such an account and so on.. The first objective with the making of Spyware would be to search information from Online consumers and report the habits of an individual when using the internet. Spyware just isn’t really hazardous, due to the fact it only functioned to spy on one’s personal computer. Spyware is used as being a instrument to search individual data on a computer.

Types of Dangerous Programs no 5 – Adware

Adware actually functioned like a type of promotion or advertisement banners, but Adware is from time to time used to take the bandwidth, so the burden of internet connection is too great and finally make an web connection will become slow and disrupt the user when browsing / surfing the internet. Probably the most irritating thing when a kind of adware that infects our computers cannot be closed. Once a pop ad seems we close, soon will come more new pop. Pop-ups are ads that from time to time a little box pops as much as show the ad.

That is it the most common Types of Dangerous Programs. Similar with war strategy that better to know your enemy, knowing Types of Dangerous Programs will help you alot to overcome it.

 

http://septiadi.com/2011/03/23/types-of-dangerous-programs/


Comparison Between Windows and Linux

Comparison Between Windows and Linux

Because of many people still confuse about the differnce between Windows OS and Linux, I tried to give Comparison Between Windows and Linux. Many people already get familiar with Windows, therefore they dont know and dont familiar with linux. Both of them have its own strength and weakneses.

Lets just jump to Comparison Between Windows and Linux.

Comparison Between Windows and Linux Table.

Comparison Windows Linux
Type Close Source Open Source
Price High Very low and also several of them free
Kernel Low Update Fast Update
Security Lower security High Security
Defending Virus Low because too many virus High because little virus
Application Many application that most of them not free Little bit lower and most of them free
New Hardware Instalation Easy More difficult
User Friendly High because many people already familiar with it More difficult, however make it more costumizeable

If we see in above Comparison Between Windows and Linux table, we know that there is to many Linux advantages compare to Windows. Based on the quality of the OS, Linux is more stable. It is because Linux is Open Source OS, so many people participate in building Linux. Therefore Linux become a fast growing OS. Because of its fast growing, make it difficult to build virus for linux. As a result, the virus for linux is little.

On the other hand, windows also have its own benefit. Many popular software including games, are built for windows. That is the reason I prever Windows than Linux. However if you want save syetem, Linux is the answer.

It is depend to you, which one you prefer to use. Linux that has secure system and fast update or Windows that has many compatible popular software. I hope this Comparison Between Windows and Linux article will help you alot.

 

http://septiadi.com/2011/03/23/comparison-between-windows-and-linux/


History of Computer Virus

History of Computer Virus

In this post, Ill try to explain a little bit about History of Computer Virus.

A laptop or computer virus is often a self-replicating personal computer program composed to alter the way in which a computer operates, without having the permission or information of the user. In this case, it will be very frustating if virus is installed to your personal computer or laptop. As users, it is essential for us to know what the virus is to fight againt the virus. Therefore, I will give a little explanation about History of Computer Virus.

Elk Cloner is credited with being the first laptop or computer virus to come out “in the wild” – outdoors the single pc or lab exactly where it had been created. Written in 1982 by Rich Skrenta, it connected by itself for the Apple DOS 3.3 OS and spread by floppy disk. The first Pc virus was a boot sector virus called (c)Brain, produced in 1986 by two brothers, Basit and Amjad Farooq Alvi, Pakistan. The brothers reportedly produced the virus to deter pirated copies of software package they’d written.

Just before laptop or computer networks grew to become prevalent, most viruses spread on removable media, particularly floppy disks. Within the early days of the personal laptop or computer, several user frequently exchanged files on floppies. Some viruses spread by infecting software programs stored on these disks, whilst other people installed on their own in to the disk boot sector.

Conventional computer viruses emerged within the 1980s, driven from the spread of individual computer systems plus the resultant increase in BBS and modem use, and application sharing. Bulletin board driven software sharing contributed straight towards the spread of Trojan horse virus, and viruses had been composed to infect popularly traded software program. Shareware and bootleg application were equally common vectors for viruses on BBS’s.

Considering that the mid-1990s, macro viruses have turn into widespread. Most of these viruses are written within the scripting languages for Microsoft program for instance Word and Excel. These viruses spread in Microsoft Workplace by infecting paperwork and spreadsheets. Because Phrase and Excel had been also accessible for Mac OS, most of these viruses had been in a position to spread on Macintosh computers too.

A personal computer virus may also be transmitted via instant messaging. A virus might deliver a web address hyperlink as an instant message to all of the contacts on an contaminated machine. If the recipient, thinking the website link is from a buddy (a trusted source) and follows the hyperlink towards the web page, the virus hosted in the web-site may well be able to infect this new computer and keep on propagating.

The latest species from the virus family will be the cross-site scripting virus. The virus emerged from investigation and was academically demonstrated in 2005. This virus utilizes cross-site scripting vulnerabilities to propagate. Considering that 2005 there happen to be several instances from the cross-site scripting viruses within the wild, most notable sites affected have already been MySpace and Yahoo.

That is it, a newbie explanation about History of Computer Virus. Hope this History of Computer Virus, will be useful for you.

A laptop or computer virus is often a self-replicating personal computer program composed to alter the way in which a computer operates, without having the permission or information of the user.

Elk Cloner is credited with being the first laptop or computer virus to come out “in the wild” – outdoors the single pc or lab exactly where it had been created. Written in 1982 by Rich Skrenta, it connected by itself for the Apple DOS 3.3 OS and spread by floppy disk. The first Pc virus was a boot sector virus called (c)Brain, produced in 1986 by two brothers, Basit and Amjad Farooq Alvi, Pakistan. The brothers reportedly produced the virus to deter pirated copies of software package they’d written.

Just before laptop or computer networks grew to become prevalent, most viruses spread on removable media, particularly floppy disks. Within the early days of the personal laptop or computer, several user frequently exchanged files on floppies. Some viruses spread by infecting software programs stored on these disks, whilst other people installed on their own in to the disk boot sector.

Conventional computer viruses emerged within the 1980s, driven from the spread of individual computer systems plus the resultant increase in BBS and modem use, and application sharing. Bulletin board driven software sharing contributed straight towards the spread of Trojan horse virus, and viruses had been composed to infect popularly traded software program. Shareware and bootleg application were equally common vectors for viruses on BBS’s.

Considering that the mid-1990s, macro viruses have turn into widespread. Most of these viruses are written within the scripting languages for Microsoft program for instance Word and Excel. These viruses spread in Microsoft Workplace by infecting paperwork and spreadsheets. Because Phrase and Excel had been also accessible for Mac OS, most of these viruses had been in a position to spread on Macintosh computers too.

A personal computer virus may also be transmitted via instant messaging. A virus might deliver a web address hyperlink as an instant message to all of the contacts on an contaminated machine. If the recipient, thinking the website link is from a buddy (a trusted source) and follows the hyperlink towards the web page, the virus hosted in the web-site may well be able to infect this new computer and keep on propagating.

The latest species from the virus family will be the cross-site scripting virus. The virus emerged from investigation and was academically demonstrated in 2005. This virus utilizes cross-site scripting vulnerabilities to propagate. Considering that 2005 there happen to be several instances from the cross-site scripting viruses within the wild, most notable sites affected have already been MySpace and Yahoo.

That is it, a newbie explanation about History of Computer Virus. Hope this History of Computer Virus, will be useful for you.

http://septiadi.com/2011/03/17/history-of-computer-virus/


Avoid Virus Infection Part 2

Avoid Virus Infection Part 2

Continuing our last post Avoid Virus Infection, we will talk about the second ways to Avoid Virus Infection. In this Avoid Virus Infection Part 2 post, the second step is talking about the way you browse your computer.

Second, Folder Tree

People usually browse from Explorer and double clicking any forlder to browse into the forlder. This can be dangerous. If there is a virus inside the folder that is double clicked by people, the virus can become active. Then how to browse if we cant double click? It is easy, you can browse using the “Folder Tree” in the left side of Explorer.

Folder Tree

Folder Tree

By browsing through Forlder Tree, You will Avoid Virus Infection.

Hope this Avoid Virus Infection Part 2 post is usefull for you.

Good Luck

Related Post:

Avoid Virus Infection

http://septiadi.com/2011/03/15/avoid-virus-invection-part-2/


Avoid Virus Infection

Avoid Virus Infection

Some said that it is better to maintaining than fixing. It is also happening in computing world. It is good to have an anti virus installed in your computer. However, sometime there are also the possibility that there is a virus infected and your anti virus dont recognize it. The update of an anti virus for a particular virus is released after the virus is born. In this case, there is a possibility that you are attacked by an anti virus before there is any fix for it.

There are several ways that you can used to Avoid Virus Infection.

First, Turn of autorun.

For Win 7:

  1. Run “Gpedit.msc” from run box.
  2. Browse to “Local Computer Policy > Computer Configuration > Administrative Templates > Windows Components > Autoplay Policies”.
  3. In the “setting” box, double click the “Turn off Autoplay”.
  4. Check the “enabled” radio button.
  5. Chose “All Drives” in “Options” box.
Turn Off Autoplay 7_1

Turn Off Autoplay 7_1

another method

  1. Run “Gpedit.msc” from run box.
  2. Browse to “Local Computer Policy > Computer Configuration > Administrative Templates > Windows Components > Autoplay Policies”.
  3. In the “setting” box, double click the “Default behavior for Autorun”.
  4. Check the “enabled” radio button.
  5. Chose “Do not execute any autorun commands” in “Options” box.
Turn Off Autoplay 7_2

Turn Off Autoplay 7_2

For XP:

  1. Run “Gpedit.msc” from run box.
  2. Browse to “User Configuration > Administrative Templates > System”.
  3. Double klik pada “Turn Off Autoplay”.
  4. Check the “enabled” radio button.
  5. Chose “All Drives” for “Turn Off Autoplay on”.
Turn Off Autoplay XP

Turn Off Autoplay XP

By turning off the autorun windows will not run any autorun from any drives. This will Avoid Virus Infection becuse several virus spread from drivers and triggered by autorun.

This all I share in Avoid Virus Infection. We will continue the second step in the next post.

Hopefully this first step is already usefull for you.

Good Luck

http://septiadi.com/2011/03/15/avoid-virus-infection/


Missing d3dx9_40.dll

Missing d3dx9_40.dll

It is happened last night. I just finish installing a game. When i start the game there is a warning that inform Missing d3dx9_40.dll. The warnings might varies such as “D3dx9_40.dll not found. Reinstalling might help fix this.”,”The file d3dx9_40.dll is missing”, etc. And I just know that this problems related to Directx.

I have tried restarting my laptop, and itwont work. The funny thing is, my Directx installed is directx 11, then d3dx9 files should be for directx 9 (if im not mistaken :D). Installing new directx just wont work for me. However I found, a solution for this problem.

These are the steps:

Frist, We download d3dx9_40.dll file directly from internet.

Second, People might say, that we just need to place the d3dx9_40.dll file into C:\Windows\system. However, that might be not a correct way. We need to find out the exact location where the windows system place the directx files. To find out, we need open explorer with the path C:\Windows.

Third, Start searching files that started with “d3dx”. Type it in search windows top right corner.

 

search_d3dx

search_d3dx

Fourth, After the result come out, analyze it.

result_d3dx

result_d3dx

If we see an example figure above we can asume that most of d3dx… files is placed in C:\Windows\System32.

Fifth, Place the d3dx9_40.dll into the right place. In this example it should be C:\Windows\System32.

Sixth, Try again the program.W

Well done, we just solve Missing d3dx9_40.dll problems.

Good luck.

http://septiadi.com/2011/03/02/missing-d3dx9_40-dll/