<?xml version='1.0' encoding='UTF-8'?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><feed xmlns='http://www.w3.org/2005/Atom' xmlns:openSearch='http://a9.com/-/spec/opensearchrss/1.0/' xmlns:blogger='http://schemas.google.com/blogger/2008' xmlns:georss='http://www.georss.org/georss' xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr='http://purl.org/syndication/thread/1.0'><id>tag:blogger.com,1999:blog-7558658040908372012</id><updated>2024-12-19T10:27:45.053+07:00</updated><category term="Tips-trick"/><category term="Software"/><category term="File"/><category term="Folder"/><category term="Internet"/><category term="Virus"/><category term="Windows"/><category term="Batch File"/><category term="Hacks"/><category term="Laptop"/><category term="Tools"/><title type='text'>ERHAES INFO</title><subtitle type='html'>All of the Article Computer (PC / Laptop), Software, Hardware, Internet, Blog, Website, Design, Science, tutorials, tips, tricks, Tools, Hack, Crack, etc.</subtitle><link rel='http://schemas.google.com/g/2005#feed' type='application/atom+xml' href='http://erhaesinfo.blogspot.com/feeds/posts/default'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7558658040908372012/posts/default'/><link rel='alternate' type='text/html' href='http://erhaesinfo.blogspot.com/'/><link rel='hub' href='http://pubsubhubbub.appspot.com/'/><author><name>Blogger Sumut</name><uri>http://www.blogger.com/profile/08272678660051145080</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='27' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhnyfSz--nbthSKnMuUCPQD0xCbGvTB3LyGrqOG8a9tFyMfFdxUqPrLcYcz6Igl4HmPUVhcARJdHBEIkrQlcKMdniEJJCKZSvDooocOwjPqrYbl0yPYCIgM9txzX_V7Gw/s220/Hacker.jpeg'/></author><generator version='7.00' uri='http://www.blogger.com'>Blogger</generator><openSearch:totalResults>15</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><entry><id>tag:blogger.com,1999:blog-7558658040908372012.post-451813840237104360</id><published>2010-02-19T09:17:00.000+07:00</published><updated>2010-02-19T09:17:30.874+07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Batch File"/><title type='text'>Creating Batch File Program</title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjZyacN_w513g82N6q5pntnEJ5Qlu_y7UbJdHwnqeLpcsYd-RkEeEvsvecWu4wVCitJCw2DInaf5iYSGG6d5WExGW9eyLjsfcYOQDFXz9EhfGcRcHcnBQOqh2oT_AaLIh1RicfrtKwCr4w/s1600-h/cmdprompt.jpeg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjZyacN_w513g82N6q5pntnEJ5Qlu_y7UbJdHwnqeLpcsYd-RkEeEvsvecWu4wVCitJCw2DInaf5iYSGG6d5WExGW9eyLjsfcYOQDFXz9EhfGcRcHcnBQOqh2oT_AaLIh1RicfrtKwCr4w/s320/cmdprompt.jpeg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;Batch file program is a program that has the extension. bat, this program is made up of some combination of DOS commands. batch file program is a flexible program in terms of this program we can use to be a bad program nor may a useful program for windows operating system.&lt;br /&gt;
&lt;br /&gt;
in this article the author will only make a program that teaches fine. Let no-nonsense have now the author will make some programs that it hopes could be useful to readers.&lt;br /&gt;
please in follow !!.&lt;br /&gt;
&lt;span id=&quot;fullpost&quot;&gt;&lt;br /&gt;
&lt;br /&gt;
1. program to delete the file .tmp&lt;br /&gt;
==================================&lt;br /&gt;
@echo off&lt;br /&gt;
color 0a&lt;br /&gt;
title file eraser .tmp&lt;br /&gt;
echo Welcome To The Program To Delete The File .tmp&lt;br /&gt;
echo ================================================&lt;br /&gt;
echo.&lt;br /&gt;
echo.&lt;br /&gt;
:start&lt;br /&gt;
echo please enter the drive where you might want to delete the file .tmp ?&lt;br /&gt;
set /p &quot;choice=(C / D / E / F) =&gt; &quot;&lt;br /&gt;
if %choice%==C goto c&lt;br /&gt;
if %choice%==D goto d&lt;br /&gt;
if %choice%==E goto e&lt;br /&gt;
if %choice%==F goto f&lt;br /&gt;
apology letter sensitive&lt;br /&gt;
:c&lt;br /&gt;
c:&lt;br /&gt;
cd \&lt;br /&gt;
del /s *.tmp&lt;br /&gt;
pause&lt;br /&gt;
echo if you want to repeat this program again??&lt;br /&gt;
set /p &quot;try=(Y / N) =&gt; &quot;&lt;br /&gt;
if %try%==Y goto start&lt;br /&gt;
if %try%==N goto exit&lt;br /&gt;
:d&lt;br /&gt;
d:&lt;br /&gt;
del /s *.tmp&lt;br /&gt;
pause&lt;br /&gt;
echo if you want to repeat this program again??&lt;br /&gt;
set /p &quot;try=(Y / N) =&gt; &quot;&lt;br /&gt;
if %try%==Y goto start&lt;br /&gt;
if %try%==N goto exit&lt;br /&gt;
:e&lt;br /&gt;
e:&lt;br /&gt;
del /s *.tmp&lt;br /&gt;
pause&lt;br /&gt;
echo if you want to repeat this program again??&lt;br /&gt;
set /p &quot;try=(Y / N) =&gt; &quot;&lt;br /&gt;
if %try%==Y goto start&lt;br /&gt;
if %try%==N goto exit&lt;br /&gt;
:f&lt;br /&gt;
f:&lt;br /&gt;
del /s *.tmp&lt;br /&gt;
pause&lt;br /&gt;
echo if you want to repeat this program again??&lt;br /&gt;
set /p &quot;try=(Y / N) =&gt; &quot;&lt;br /&gt;
if %try%==Y goto start&lt;br /&gt;
if %try%==N goto exit&lt;br /&gt;
:exit&lt;br /&gt;
exit&lt;br /&gt;
================= CUT ==================&lt;br /&gt;
&lt;br /&gt;
please program on your copy of the Notepad.exe and save the form. bat, to run your lives to double click on the file .bat.&lt;br /&gt;
for the program may then I will discuss in a future article. make sure you keep up with this article&lt;br /&gt;
good luck .......!&lt;br /&gt;
&lt;/span&gt;</content><link rel='replies' type='application/atom+xml' href='http://erhaesinfo.blogspot.com/feeds/451813840237104360/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://erhaesinfo.blogspot.com/2010/02/creating-batch-file-program.html#comment-form' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/7558658040908372012/posts/default/451813840237104360'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7558658040908372012/posts/default/451813840237104360'/><link rel='alternate' type='text/html' href='http://erhaesinfo.blogspot.com/2010/02/creating-batch-file-program.html' title='Creating Batch File Program'/><author><name>Blogger Sumut</name><uri>http://www.blogger.com/profile/08272678660051145080</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='27' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhnyfSz--nbthSKnMuUCPQD0xCbGvTB3LyGrqOG8a9tFyMfFdxUqPrLcYcz6Igl4HmPUVhcARJdHBEIkrQlcKMdniEJJCKZSvDooocOwjPqrYbl0yPYCIgM9txzX_V7Gw/s220/Hacker.jpeg'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjZyacN_w513g82N6q5pntnEJ5Qlu_y7UbJdHwnqeLpcsYd-RkEeEvsvecWu4wVCitJCw2DInaf5iYSGG6d5WExGW9eyLjsfcYOQDFXz9EhfGcRcHcnBQOqh2oT_AaLIh1RicfrtKwCr4w/s72-c/cmdprompt.jpeg" height="72" width="72"/><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-7558658040908372012.post-9220550757295553137</id><published>2009-10-20T21:54:00.001+07:00</published><updated>2009-10-20T21:55:32.030+07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="File"/><category scheme="http://www.blogger.com/atom/ns#" term="Folder"/><title type='text'>How to Change a Folder Icon Windows</title><content type='html'>&lt;b&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;1.&lt;/span&gt;&lt;/b&gt; Right click on the folder and click on &lt;b&gt;Properties&lt;/b&gt;.&lt;br /&gt;&lt;br /&gt;&lt;b&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;2.&lt;/span&gt;&lt;/b&gt; Click on the &lt;b&gt;Customize&lt;/b&gt; tab. (See screenshot below)&lt;br /&gt;&lt;br /&gt;&lt;b&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;3. &lt;span style=&quot;color:blue;&quot;&gt;To Change the Folder Icon -&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;blockquote&gt;A) Click on the &lt;b&gt;Change Icon&lt;/b&gt; button.&lt;br /&gt;&lt;/blockquote&gt;&lt;blockquote&gt;&lt;blockquote&gt;&lt;a href=&quot;http://www.vistax64.com/attachments/tutorials/1008d1188294258-folder-icon-change-icon_properties.jpg&quot; rel=&quot;Lightbox_436249&quot; id=&quot;attachment1008&quot; target=&quot;_blank&quot;&gt;&lt;img title=&quot;icon_properties.jpg&quot; src=&quot;http://www.vistax64.com/attachments/tutorials/1008d1232211639t-folder-icon-change-icon_properties.jpg&quot; class=&quot;thumbnail&quot; alt=&quot;icon_properties.jpg&quot; style=&quot;margin: 2px;&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;/blockquote&gt;&lt;/blockquote&gt;&lt;blockquote&gt;B) Select a icon and click on &lt;b&gt;OK&lt;/b&gt; to apply. (See screenshot below)&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;b&gt;&lt;span style=&quot;color:#ff0000;&quot;&gt;NOTE:&lt;/span&gt;&lt;/b&gt; &lt;i&gt;Some common icon locations in Vista. &lt;/i&gt;&lt;ul&gt;&lt;li&gt;C:\Windows\System32\imageres.dll (Recommended one to use)&lt;/li&gt;&lt;li&gt;C:\Windows\System32\shell32.dll&lt;/li&gt;&lt;li&gt;C:\Program Files\Internet Explorer\iexplore.exe&lt;/li&gt;&lt;/ul&gt;&lt;/blockquote&gt;&lt;blockquote&gt;&lt;blockquote&gt;&lt;img title=&quot;Name:  Change_Folder_Icon.jpg Views: 18341 Size:  27.8 KB&quot; src=&quot;http://www.vistax64.com/attachments/tutorials/1004d1188294188-folder-icon-change-change_folder_icon.jpg&quot; alt=&quot;Name:  Change_Folder_Icon.jpg Views: 18341 Size:  27.8 KB&quot; style=&quot;margin: 2px;&quot; border=&quot;0&quot; /&gt;&lt;br /&gt;&lt;/blockquote&gt;&lt;/blockquote&gt;&lt;blockquote&gt;&lt;b&gt;&lt;span style=&quot;font-size:180%;&quot;&gt;&lt;span style=&quot;color:red;&quot;&gt;OR&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;C) Click on &lt;b&gt;Browse&lt;/b&gt; to choose a icon of your own. (See screenshot above)&lt;br /&gt;&lt;b&gt;&lt;span style=&quot;color:#ff0000;&quot;&gt;NOTE:&lt;/span&gt;&lt;/b&gt; &lt;i&gt;For the best icon size results, use a 256 bit .ico (Icon) file in Vista.&lt;/i&gt;&lt;br /&gt;&lt;br /&gt;D) Navigate to where you have the icon saved. (See screenshot below)&lt;br /&gt;&lt;br /&gt;E) Select the icon and click on &lt;b&gt;Open&lt;/b&gt;.&lt;br /&gt;&lt;/blockquote&gt;&lt;blockquote&gt;&lt;blockquote&gt;&lt;a href=&quot;http://www.vistax64.com/attachments/tutorials/1007d1188294245-folder-icon-change-icon_browse.jpg&quot; rel=&quot;Lightbox_436249&quot; id=&quot;attachment1007&quot; target=&quot;_blank&quot;&gt;&lt;img title=&quot;icon_browse.jpg&quot; src=&quot;http://www.vistax64.com/attachments/tutorials/1007d1232211639t-folder-icon-change-icon_browse.jpg&quot; class=&quot;thumbnail&quot; alt=&quot;icon_browse.jpg&quot; style=&quot;margin: 2px;&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;/blockquote&gt;&lt;/blockquote&gt;&lt;blockquote&gt;F) Click on &lt;b&gt;OK&lt;/b&gt; to apply. (See screenshot from step 4 above)&lt;br /&gt;&lt;/blockquote&gt;&lt;b&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;4. &lt;span style=&quot;color:#0000ff;&quot;&gt;To Restore the Default Folder Icon -&lt;/span&gt;&lt;/span&gt;&lt;/b&gt; A) Click on the &lt;b&gt;Restore Defaults&lt;/b&gt; button. (See screenshot below step 3A)&lt;br /&gt;&lt;span id=&quot;fullpost&quot;&gt;&lt;br /&gt;&lt;/span&gt;</content><link rel='replies' type='application/atom+xml' href='http://erhaesinfo.blogspot.com/feeds/9220550757295553137/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://erhaesinfo.blogspot.com/2009/10/how-to-change-folder-icon-windows.html#comment-form' title='3 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/7558658040908372012/posts/default/9220550757295553137'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7558658040908372012/posts/default/9220550757295553137'/><link rel='alternate' type='text/html' href='http://erhaesinfo.blogspot.com/2009/10/how-to-change-folder-icon-windows.html' title='How to Change a Folder Icon Windows'/><author><name>Blogger Sumut</name><uri>http://www.blogger.com/profile/08272678660051145080</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='27' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhnyfSz--nbthSKnMuUCPQD0xCbGvTB3LyGrqOG8a9tFyMfFdxUqPrLcYcz6Igl4HmPUVhcARJdHBEIkrQlcKMdniEJJCKZSvDooocOwjPqrYbl0yPYCIgM9txzX_V7Gw/s220/Hacker.jpeg'/></author><thr:total>3</thr:total></entry><entry><id>tag:blogger.com,1999:blog-7558658040908372012.post-9187346221577716928</id><published>2009-10-20T21:26:00.004+07:00</published><updated>2009-10-20T21:35:16.091+07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="File"/><category scheme="http://www.blogger.com/atom/ns#" term="Folder"/><title type='text'>How to change folder icon color in Windows</title><content type='html'>&lt;p&gt;Are you a very organized person? Do you like to &lt;strong&gt;color-code all of your folders&lt;/strong&gt; at work or at &lt;a id=&quot;KonaLink0&quot; target=&quot;undefined&quot; class=&quot;kLink&quot; style=&quot;text-decoration: underline ! important; position: static;&quot; href=&quot;http://www.online-tech-tips.com/free-software-downloads/change-windows-folder-color/#&quot;&gt;&lt;span style=&quot;font-family:verdana;&quot;&gt;&lt;span class=&quot;kLink&quot; style=&quot;border-bottom: 1px solid orange;font-family:verdana;color:#000e00;&quot;  &gt;home&lt;/span&gt;&lt;/span&gt;&lt;/a&gt; by importance, etc? If you’re into visually organizing your paper work, then you might also be excited to know that you can do the same thing for all of your digital documents!&lt;/p&gt; &lt;p&gt;Imagine being able to &lt;strong&gt;change the icon color for folders&lt;/strong&gt; so that your Financial folder can be green (like &lt;a id=&quot;KonaLink1&quot; target=&quot;undefined&quot; class=&quot;kLink&quot; style=&quot;text-decoration: underline ! important; position: static;&quot; href=&quot;http://www.online-tech-tips.com/free-software-downloads/change-windows-folder-color/#&quot;&gt;&lt;span style=&quot;font-family:verdana;&quot;&gt;&lt;span class=&quot;kLink&quot; style=&quot;border-bottom: 1px solid orange;font-family:verdana;color:#000e00;&quot;  &gt;money&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;position: relative;&quot; class=&quot;preLoadWrap&quot; id=&quot;preLoadWrap1&quot;&gt;&lt;div style=&quot;position: absolute; z-index: 4000; top: -32px; left: -18px; display: none;&quot; id=&quot;preLoadLayer1&quot;&gt;&lt;img style=&quot;border: 0px none ;&quot; src=&quot;http://kona.kontera.com/javascript/lib/imgs/grey_loader.gif&quot; /&gt;&lt;/div&gt;&lt;/span&gt;&lt;/a&gt;) and your folder which has photos of family can be red (maybe love?). Well there is a really nifty little freeware program out there called &lt;strong&gt;&lt;a href=&quot;http://www.foldermarker.com/folder-marker-free.php&quot; target=&quot;_blank&quot; rel=&quot;nofollow&quot;&gt;Folder Marker&lt;/a&gt;&lt;/strong&gt; that you can use to easily change the color of any folder on your &lt;a id=&quot;KonaLink2&quot; target=&quot;undefined&quot; class=&quot;kLink&quot; style=&quot;text-decoration: underline ! important; position: static;&quot; href=&quot;http://www.online-tech-tips.com/free-software-downloads/change-windows-folder-color/#&quot;&gt;&lt;span style=&quot;font-family:verdana;&quot;&gt;&lt;span class=&quot;kLink&quot;  style=&quot;font-family:verdana;&quot;&gt;computer&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;.&lt;/p&gt; &lt;p&gt;You can also use it to &lt;strong&gt;change the&lt;/strong&gt; &lt;strong&gt;folder icon&lt;/strong&gt; to represent the state of that folder, for example if you have a folder with private data, you can change the icon to have a small lock appear.&lt;/p&gt; &lt;p align=&quot;center&quot;&gt;&lt;a href=&quot;http://www.foldermarker.com/folder-marker-free.php&quot; target=&quot;_blank&quot; rel=&quot;nofollow&quot;&gt;&lt;img src=&quot;http://www.online-tech-tips.com/wp-content/uploads/2008/03/folder-marker.png&quot; style=&quot;border: 0px none ;&quot; alt=&quot;folder marker&quot; border=&quot;0&quot; height=&quot;47&quot; width=&quot;265&quot; /&gt;&lt;/a&gt;&lt;/p&gt; &lt;p align=&quot;left&quot;&gt;Once you have installed Folder Marker onto your computer, you can markup folders in two ways. Firstly, you can simply launch the application, choose the folder you want to mark, and then pick the icon you want to replace for that folder.&lt;/p&gt; &lt;p align=&quot;center&quot;&gt;&lt;a href=&quot;http://www.online-tech-tips.com/wp-content/uploads/2008/03/change-folder-color.png&quot;&gt;&lt;img src=&quot;http://www.online-tech-tips.com/wp-content/uploads/2008/03/change-folder-color-thumb.png&quot; style=&quot;border: 0px none ;&quot; alt=&quot;change folder color&quot; border=&quot;0&quot; height=&quot;244&quot; width=&quot;261&quot; /&gt;&lt;/a&gt;&lt;/p&gt; &lt;p align=&quot;left&quot;&gt;You can choose from the Colors tab, the Main tab and User’s Icons. The Main tab basically has a set of icons corresponding to a certain state, such as High Priority, Planned Work, Private Files, Important Files, etc.&lt;/p&gt; &lt;p align=&quot;center&quot;&gt;&lt;a href=&quot;http://www.online-tech-tips.com/wp-content/uploads/2008/03/change-folder-icon-color.png&quot;&gt;&lt;img src=&quot;http://www.online-tech-tips.com/wp-content/uploads/2008/03/change-folder-icon-color-thumb.png&quot; alt=&quot;change folder icon color&quot; border=&quot;0&quot; height=&quot;116&quot; width=&quot;255&quot; /&gt;&lt;/a&gt;&lt;/p&gt; &lt;p align=&quot;left&quot;&gt;If you already have icons that you like or that you have created yourself, you can actually click on User’s icon and add them to Folder Marker. You can then mark folders with those customize icons. If you want to know &lt;strong&gt;&lt;a href=&quot;http://www.online-tech-tips.com/software-reviews/imagicon-convert-multiple-image-formats-jpg-bmp-png-into-windows-icons/&quot; target=&quot;_blank&quot;&gt;how to create your own icons in Windows&lt;/a&gt;&lt;/strong&gt;, you can check out an earlier post I had written about a program called ImagIcon. The program can assign icons to a folder from a wide array of file formats, including ICO, ICL, EXE, DLL, CPL or BMP.&lt;/p&gt; &lt;p align=&quot;left&quot;&gt;The second way you can mark folders with these special icons is by simply right-clicking on them and navigating to the &lt;strong&gt;Mark Folder&lt;/strong&gt; menu! If this program didn’t have the option in the right-click context menu for changing the folder icon, I would not have recommended it, because having it makes it so much easier to use.&lt;/p&gt; &lt;p align=&quot;center&quot;&gt;&lt;a href=&quot;http://www.online-tech-tips.com/wp-content/uploads/2008/03/change-folder-icon.png&quot;&gt;&lt;img src=&quot;http://www.online-tech-tips.com/wp-content/uploads/2008/03/change-folder-icon-thumb.png&quot; style=&quot;border: 0px none ;&quot; alt=&quot;change folder icon&quot; border=&quot;0&quot; height=&quot;361&quot; width=&quot;449&quot; /&gt;&lt;/a&gt;&lt;/p&gt; &lt;p align=&quot;left&quot;&gt;And that’s it! You can now organize your folders in Windows in a visually appealing and recognizable way! Check out my My Documents folder after color coding and marking some of my folders:&lt;/p&gt; &lt;p align=&quot;center&quot;&gt;&lt;a href=&quot;http://www.online-tech-tips.com/wp-content/uploads/2008/03/folder-icons.png&quot;&gt;&lt;img src=&quot;http://www.online-tech-tips.com/wp-content/uploads/2008/03/folder-icons-thumb.png&quot; style=&quot;border: 0px none ;&quot; alt=&quot;folder icons&quot; border=&quot;0&quot; height=&quot;399&quot; width=&quot;382&quot; /&gt;&lt;/a&gt;&lt;/p&gt; &lt;p align=&quot;left&quot;&gt;Now I can easily see which are my secure folders, my important folders, my work folders, and so on! You can also use Folder Marker to change the folder icons for a group of folders at the same time! Just select multiple folders and right-click to get the Mark Folder option.&lt;/p&gt; &lt;p align=&quot;left&quot;&gt;Overall, Folder Marker is a great and free way to organize your folders in Windows by color coding them or changing the folder icon. Enjoy!&lt;/p&gt;&lt;br /&gt;&lt;span id=&quot;fullpost&quot;&gt;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;</content><link rel='replies' type='application/atom+xml' href='http://erhaesinfo.blogspot.com/feeds/9187346221577716928/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://erhaesinfo.blogspot.com/2009/10/how-to-change-folder-icon-color-in.html#comment-form' title='2 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/7558658040908372012/posts/default/9187346221577716928'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7558658040908372012/posts/default/9187346221577716928'/><link rel='alternate' type='text/html' href='http://erhaesinfo.blogspot.com/2009/10/how-to-change-folder-icon-color-in.html' title='How to change folder icon color in Windows'/><author><name>Blogger Sumut</name><uri>http://www.blogger.com/profile/08272678660051145080</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='27' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhnyfSz--nbthSKnMuUCPQD0xCbGvTB3LyGrqOG8a9tFyMfFdxUqPrLcYcz6Igl4HmPUVhcARJdHBEIkrQlcKMdniEJJCKZSvDooocOwjPqrYbl0yPYCIgM9txzX_V7Gw/s220/Hacker.jpeg'/></author><thr:total>2</thr:total></entry><entry><id>tag:blogger.com,1999:blog-7558658040908372012.post-1416947798985385135</id><published>2009-10-12T18:20:00.004+07:00</published><updated>2009-10-12T18:24:03.716+07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Internet"/><title type='text'>How do I change my IP address?</title><content type='html'>Every time we connect to the internet we get a certain IP address provided to us by our ISP(Internet Service Provider). This IP stays the same until we disconnect from the internet. So if you want to change your IP just disconnect and connect again.&lt;br /&gt;&lt;br /&gt;But the problems starts if you have a Cable/DSL router. Some ISP-s set those routers in a so called routing mode, so that the IP cannot be changed manually by user, but rather by the ISP himself after 24 hours. There are two way of changing your IP address when your router is in a routing mode. The first way is just to go to your router, plug it out and after a few seconds, plug it back in. But what if we don’t want to get up from our chairs and go to the router every time we want to change our IP and we all want to do it with a command from our pc? The procedure goes like this;&lt;br /&gt;&lt;span id=&quot;fullpost&quot;&gt;&lt;br /&gt;Open START&gt;RUN and type in cmd;&lt;br /&gt;&lt;br /&gt;In the command prompt type in ipconfig, push enter and a list of ip-s will be visible…&lt;br /&gt;&lt;br /&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg-pzOwxZSRhoPz0vlbvHbGpHRI6a7onSl6aK3hXWbUNeE5CU6MHCUgO6apnBnXO-tM85aFvPBqYlg4NaEfvIy3S3pDz7AN1QWVLrQWcf8F25PjUii8QopAHAqeZrHl08WxmxmKCp0Ccg0/s1600-h/ipconfig-150x150.gif&quot;&gt;&lt;img style=&quot;display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 150px; height: 150px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg-pzOwxZSRhoPz0vlbvHbGpHRI6a7onSl6aK3hXWbUNeE5CU6MHCUgO6apnBnXO-tM85aFvPBqYlg4NaEfvIy3S3pDz7AN1QWVLrQWcf8F25PjUii8QopAHAqeZrHl08WxmxmKCp0Ccg0/s320/ipconfig-150x150.gif&quot; border=&quot;0&quot; alt=&quot;&quot;id=&quot;BLOGGER_PHOTO_ID_5391672345841690322&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;In this list above the adapter is Local Area Connection. That is because the router is not wireless. If you use a wireless router, your adapter will be a Wireless. So, in this picture there are three IP addresses. The one we need is the default gateway. The default gateway is actually the IP of our router. We’ll just copy that IP and paste it into the address bar of your web browser(IE, Firefox etc…).&lt;br /&gt;&lt;br /&gt;Now we are actually trying to enter the router. There will be a welcome screen with a username and a password for entering the router. It is usually admin or user for the username and 0000 for the password but if that does not work, just google your router brand and you’ll easily find it(or contact your ISP for it). When you click OK, you are in the router. Here you can do all kinds of stuff, depending on which router you have. But the thing we need to find is the connect/disconnect button. It is probably under Status or a tab similar to that(it is different with every router). You just click the button and the router will do the thing he does every 24 hours. Now, just connect back and that’s it, you have a new IP address.&lt;br /&gt;&lt;/span&gt;</content><link rel='replies' type='application/atom+xml' href='http://erhaesinfo.blogspot.com/feeds/1416947798985385135/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://erhaesinfo.blogspot.com/2009/10/how-do-i-change-my-ip-address.html#comment-form' title='2 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/7558658040908372012/posts/default/1416947798985385135'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7558658040908372012/posts/default/1416947798985385135'/><link rel='alternate' type='text/html' href='http://erhaesinfo.blogspot.com/2009/10/how-do-i-change-my-ip-address.html' title='How do I change my IP address?'/><author><name>Blogger Sumut</name><uri>http://www.blogger.com/profile/08272678660051145080</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='27' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhnyfSz--nbthSKnMuUCPQD0xCbGvTB3LyGrqOG8a9tFyMfFdxUqPrLcYcz6Igl4HmPUVhcARJdHBEIkrQlcKMdniEJJCKZSvDooocOwjPqrYbl0yPYCIgM9txzX_V7Gw/s220/Hacker.jpeg'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg-pzOwxZSRhoPz0vlbvHbGpHRI6a7onSl6aK3hXWbUNeE5CU6MHCUgO6apnBnXO-tM85aFvPBqYlg4NaEfvIy3S3pDz7AN1QWVLrQWcf8F25PjUii8QopAHAqeZrHl08WxmxmKCp0Ccg0/s72-c/ipconfig-150x150.gif" height="72" width="72"/><thr:total>2</thr:total></entry><entry><id>tag:blogger.com,1999:blog-7558658040908372012.post-5593801212961775045</id><published>2009-10-08T23:38:00.002+07:00</published><updated>2009-10-08T23:39:20.475+07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Tips-trick"/><title type='text'>Protect Laptops from virus attacks</title><content type='html'>Laptops are designed to support mobility is actually more vulnerable to viruses, because most laptops are now equipped with WiFi, the ease of internet connection that makes the laptop quite susceptible to virus attacks.&lt;br /&gt;&lt;br /&gt;To clean a laptop from a virus infection is not as easy to clean a virus that attacks the PC desktop. For example if the PC desktop is infected with a virus and if severe enough antivirus installed on a PC is not able, usually off the hard drive and slave to it on a clean computer to be scanned. But these steps are not easy for laptops, because to take the hard drive in the laptop is not easy, even causing loss guarantee.&lt;br /&gt;&lt;span id=&quot;fullpost&quot;&gt;&lt;br /&gt;There are many ways for a virus scan on my laptop which had already infected with the virus, could be a way to share a laptop to scan the computer / laptop that is clean and always have updated antivirus. Or if you have an external hard drive prior to backup your data and then restore your laptop ghost file, then install antivirus, and do not forget to update your antivirus with the latest updatean, only then scan your data back.&lt;br /&gt;&lt;br /&gt;Symptoms that arise in an infected laptop that has virus or spyware, is now turned on takes a long time to load. By the time used to work all the processes to be heavy and slow, as if the laptop’s performance decreased drastically. And when the laptop is connected to the internet, some sites inaccessible, can also always be directed to other sites that are not clear, the ads appear on the screen all of a sudden, could also emerge many pop-ups that guns are clear and very disturbing and degrade performance laptop itself.&lt;br /&gt;&lt;br /&gt;Like the saying “to protect it better than cure”, so the laptop should be protected from virus attack than to cure?&lt;br /&gt;&lt;br /&gt;If your laptop often interact with the virtual world, then the thousands of viruses likely will try to enter the laptop system. Indeed facilitate the spread of Internet viruses, especially today, a virus was able to spread itself to all existing computer networks in the real world in a matter of seconds.&lt;br /&gt;&lt;br /&gt;There are several steps to anticipate the virus attack. Anticipation is to prevent virus entry and infect your system.&lt;br /&gt;&lt;br /&gt;   1. Use a good antivirus and reliable. You can use the antivirus which is available free on the internet. Or reply is still doubtful with a free antivirus, can also use a paid antivirus.&lt;br /&gt;   2. When using paid antivirus, you should make sure that the antivirus has a representative in each country, This is quite important when there is a problem in his antivirus. Even anti-virus that has representatives in each country will be faster to update if there is a local virus attacks.&lt;br /&gt;   3. Make sure the operating system you use is always in a state update. Because the reality is always security holes discovered by hackers or virus creator itself. That’s what causes why the operating system should always be in a state update. Besides securing of a virus attack, operating system update will also make a laptop running in a stable condition.&lt;br /&gt;   4. Perform regular data backup. This will prevent you from losing important data when your laptop is still infected with the virus. If you frequently use a floppy, flash, external hard drive, the computer / laptop that is used by many people, always remember to do antivirus scanning on the storage media before you run it on your favorite laptop.&lt;br /&gt;   5. Beware of attachments / email attachment. Until now, an email attachment is the tool most preferred by virus makers to spread the virus product. Besides easy to deceive recipients, spread via email attachments are also going very fast. Do not ever open an email attachment before scanning with antivirus programs, even though the email came from your friend though.&lt;br /&gt;   6. Be careful when downloading free programs that are offered on the Internet. Always download from trusted sites based on review of many people. Perform scanning the installer program installed on your computer before.&lt;br /&gt;   7. While browsing, you should be wary of websites or distributed via the link messenger program.&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;</content><link rel='replies' type='application/atom+xml' href='http://erhaesinfo.blogspot.com/feeds/5593801212961775045/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://erhaesinfo.blogspot.com/2009/10/protect-laptops-from-virus-attacks.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/7558658040908372012/posts/default/5593801212961775045'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7558658040908372012/posts/default/5593801212961775045'/><link rel='alternate' type='text/html' href='http://erhaesinfo.blogspot.com/2009/10/protect-laptops-from-virus-attacks.html' title='Protect Laptops from virus attacks'/><author><name>Erhaes</name><uri>http://www.blogger.com/profile/17755384877510271490</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-7558658040908372012.post-580054164866398676</id><published>2009-10-08T23:21:00.002+07:00</published><updated>2009-10-08T23:27:07.704+07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Software"/><category scheme="http://www.blogger.com/atom/ns#" term="Tools"/><title type='text'>Software To Windows Registry Repair</title><content type='html'>You have computer problems? If so, there’sa good chance that can be resolved without a professional for the job. This is because much of the problems caused by the registration system. Each team has one. Saves all settings and files on your computer needs to function properly. Accumulates over time, then remove and place. What makes your computer slow.&lt;br /&gt;&lt;br /&gt;The registry is a part of all Windows computers. It serves as a center and stores all data needed by the team. When you install new programs or changes in the configuration stored in the registry. The new computers are not likely to sign the error in the registry for several months. But the old files will certainly avoid any unnecessary or damaged.&lt;br /&gt;&lt;span id=&quot;fullpost&quot;&gt;&lt;br /&gt;And what do you clean your registry?&lt;br /&gt;&lt;br /&gt;This is the easy part. All of this is that you have to do is download the software for Windows registry repair and running. What it does is scan the registry and scans all files you need anything else. Then, remove the space and living in freedom. Optimizing the registry can solve a lot of errors and speed up your computer.&lt;br /&gt;&lt;br /&gt;Some registry cleaners can be downloaded free. Others pay a small fee to activate it. But buying with the huge profits they can save many headaches. The team will be faster, not so many mistakes and will spend a lot happier!&lt;br /&gt;&lt;br /&gt;Software cleaning the Windows registry is very easy to use. In general, simply click on a button or two at work. The best registry cleaners a full backup of your data before deleting anything. This is important, just in case something is not required to be deleted from your computer. Just click on the Restore button.&lt;br /&gt;&lt;br /&gt;As you can see, there are many advantages to using the registry cleaning software for Windows, especially if you ever see any errors on your computer.&lt;br /&gt;&lt;br /&gt;Use &lt;a href=&quot;http://www.bestregistryrepairsoftware.net/registry/tips/windows-registry-repair-software.php&quot; target=&quot;_new&quot;&gt;Windows registry repair software&lt;/a&gt; today and remove all errors from your computer. Visit us for more info – &lt;a href=&quot;http://www.bestregistryrepairsoftware.net/&quot; target=&quot;_new&quot;&gt;http://www.BestRegistryRepairSoftware.net&lt;/a&gt;&lt;br /&gt;&lt;/span&gt;</content><link rel='replies' type='application/atom+xml' href='http://erhaesinfo.blogspot.com/feeds/580054164866398676/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://erhaesinfo.blogspot.com/2009/10/software-to-windows-registry-repair.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/7558658040908372012/posts/default/580054164866398676'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7558658040908372012/posts/default/580054164866398676'/><link rel='alternate' type='text/html' href='http://erhaesinfo.blogspot.com/2009/10/software-to-windows-registry-repair.html' title='Software To Windows Registry Repair'/><author><name>Erhaes</name><uri>http://www.blogger.com/profile/17755384877510271490</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-7558658040908372012.post-822266145347635196</id><published>2009-10-08T23:18:00.001+07:00</published><updated>2009-10-08T23:19:44.556+07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Tips-trick"/><category scheme="http://www.blogger.com/atom/ns#" term="Windows"/><title type='text'>How To Get Speed Up My Computer</title><content type='html'>How long do you want to be your team? If the initial velocity was good with you, the interview is exactly what you need to restore that kind of speed. The main reason for the decline in performance occurs because the registry has become too big to handle, too. By the way, you know what a file?&lt;br /&gt;&lt;br /&gt;This is the central database where you always have your important files. Without registration, work on the computer is not. On the other hand, if you register flawed and full of errors that slow down your PC, the worst to bring a computer to crash. A record is always a dynamic team. It is no new files, because every time you install a command or delete the changes within the registry.&lt;br /&gt;&lt;span id=&quot;fullpost&quot;&gt;&lt;br /&gt;Well, if the speed of your computer, you must set the registry. This can be done with a registry cleaner. You can use this software at minimal cost and the cost is worth it, because it saves in time. Think of it as a car, if desired.&lt;br /&gt;Change your oil every 5000 miles, main bearing your car is damaged by contaminated oil.&lt;br /&gt;&lt;br /&gt;Even a registry cleaner help with disk failures and unnecessary or obsolete files. This will prevent the slow loading and freezing systems.&lt;br /&gt;&lt;br /&gt;With a registry cleaner, you do not clean in time. What you get is a software that can be used regularly to make sure your computer is always at optimum speed.&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;http://www.slow-computer-solution.com/&quot; target=&quot;new&quot;&gt;Click here&lt;/a&gt; for a free analysis to see which log files are slowing down your computer, and how quickly it is resolved&lt;br /&gt;&lt;/span&gt;</content><link rel='replies' type='application/atom+xml' href='http://erhaesinfo.blogspot.com/feeds/822266145347635196/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://erhaesinfo.blogspot.com/2009/10/how-to-get-speed-up-my-computer.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/7558658040908372012/posts/default/822266145347635196'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7558658040908372012/posts/default/822266145347635196'/><link rel='alternate' type='text/html' href='http://erhaesinfo.blogspot.com/2009/10/how-to-get-speed-up-my-computer.html' title='How To Get Speed Up My Computer'/><author><name>Erhaes</name><uri>http://www.blogger.com/profile/17755384877510271490</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-7558658040908372012.post-6496687211190312642</id><published>2009-10-08T23:15:00.002+07:00</published><updated>2009-10-08T23:18:07.251+07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Internet"/><category scheme="http://www.blogger.com/atom/ns#" term="Tips-trick"/><title type='text'>Tips to Speed up Internet Connection</title><content type='html'>Many sites are now using to install a quick connect to broadband, it is not surprising that more and more people are looking for faster Internet connections. However, very expensive to increase your connection speed … Therefore, it is great that there is something that you can use to immediately increase your Internet speed.&lt;br /&gt;&lt;br /&gt;You see it is really a major reason that the Internet seems slow for many people to go to … and has nothing to do with how “quickly” do-up connection. The problem with most Internet connections on the computer is actually a part of your system as a “registry” has been caused. The registry is a database of settings and information from your computer. A new all your downloads are stored in the registry, making it one of the most important and influential on your computer.&lt;br /&gt;&lt;span id=&quot;fullpost&quot;&gt;&lt;br /&gt;The problem with the registry because it is so important, repeatedly used by the crew. Every day is the edition of Windows and the opening 100 of the log file, which led, unfortunately, many of them must be stored in the wrong direction, that corrupt, damaged … Why slow down your internet? It is quite simple – because when you surf and do things with it, your browser is constant in the log files for the job. This means that if log files are always trying to corrupt you need more time for the files you need, you must exit the process.&lt;br /&gt;&lt;br /&gt;And that’s why most teams seem to have an Internet connection is slow. This is because your connection speed is slow – because your computer is slow to work with the browser. This is a big problem that nobody knows, because the registry to hide permanently … but easy with a tool called “Registry Cleaner” removed. The registry cleaner software tools are developed to the registry by scanning all the log files and fixing corrupted someone to clean. Who’s your Internet browser to quickly read each file you want, if it is running very fast. But whether online than walking speed, make sure that your registry cleaner so that the problem files, you bet.&lt;br /&gt;&lt;/span&gt;</content><link rel='replies' type='application/atom+xml' href='http://erhaesinfo.blogspot.com/feeds/6496687211190312642/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://erhaesinfo.blogspot.com/2009/10/tips-to-speed-up-internet-connection.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/7558658040908372012/posts/default/6496687211190312642'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7558658040908372012/posts/default/6496687211190312642'/><link rel='alternate' type='text/html' href='http://erhaesinfo.blogspot.com/2009/10/tips-to-speed-up-internet-connection.html' title='Tips to Speed up Internet Connection'/><author><name>Erhaes</name><uri>http://www.blogger.com/profile/17755384877510271490</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-7558658040908372012.post-6709561030023126736</id><published>2009-10-08T23:08:00.002+07:00</published><updated>2009-10-08T23:08:25.825+07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Virus"/><title type='text'>What is a Trojan horse?</title><content type='html'>He believes that everyone who was at school knows, “Trojan horse. It is a large wooden horse that the Greeks of the city in the Trojan War to penetrate. They have two men on horseback, so that if the Trojans to take in your town, they can come and destroy the place. Well, in the computer world, a Trojan horse does the same thing. This is probably explains its name.&lt;br /&gt;&lt;br /&gt;Trojan is a small program, which consists of two parts: the client and the server does not exist. Customer will receive an attacker to gain access to a computer. Server is installed on your computer (usually without your knowledge), when the infected file. If you have installed around the world access to your hard drive using a simple program. Unfortunately, this program is so simple that anyone, and this makes the chances of being reduced even more.&lt;br /&gt;&lt;span id=&quot;fullpost&quot;&gt;&lt;br /&gt;Now, we wonder, as the owner of the customer know if the program is installed on your computer. This could be your IP. Your IP-address is a unique number, to receive from the ISP as your Internet connection. Anyone with a Trojan customers to find your IP-address and find a computer. This person does not agree the same thing that you download the Trojan.&lt;br /&gt;&lt;br /&gt;Trojan horse can do a lot of fun (the pirate), but can cause serious harm to your computer. Open your DVD is no reason several times in a row. When you talk about the microphone, the attacker knows exactly what you are saying. An attacker can play audio files, images, messages in the victim, delete files, keyboard, and much more! If you’re really a bandit on your tail, the system is completely dead in minutes.&lt;br /&gt;&lt;br /&gt;Well, what can be done to make sure that you get a trojan horse? Well, best thing to do is use a good Anti-Virus installed. When you download a Trojan horse, by chance, you should inform the program and delete them. In addition, the creation of a “Trojan horse” is better to remove the right words. Be careful what you download to your hard drive. If you do not know where he is, or that the owner has not been opened. Een Zeer Beroemde paarden verspreiding van Trojaanse Middel van door and mailbijlagen. When you open it, you’re too late. Make sure that you know people before you open e-mail.&lt;br /&gt;&lt;br /&gt;The conclusion of this study is that it must be very careful with the program or open a file on your system. Make sure you know about the origin and if you agree. To absolutely no infection, install a decent anti-virus.&lt;br /&gt;&lt;/span&gt;</content><link rel='replies' type='application/atom+xml' href='http://erhaesinfo.blogspot.com/feeds/6709561030023126736/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://erhaesinfo.blogspot.com/2009/10/what-is-trojan-horse.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/7558658040908372012/posts/default/6709561030023126736'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7558658040908372012/posts/default/6709561030023126736'/><link rel='alternate' type='text/html' href='http://erhaesinfo.blogspot.com/2009/10/what-is-trojan-horse.html' title='What is a Trojan horse?'/><author><name>Blogger Sumut</name><uri>http://www.blogger.com/profile/08272678660051145080</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='27' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhnyfSz--nbthSKnMuUCPQD0xCbGvTB3LyGrqOG8a9tFyMfFdxUqPrLcYcz6Igl4HmPUVhcARJdHBEIkrQlcKMdniEJJCKZSvDooocOwjPqrYbl0yPYCIgM9txzX_V7Gw/s220/Hacker.jpeg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-7558658040908372012.post-4127107756181638523</id><published>2009-10-08T23:05:00.001+07:00</published><updated>2009-10-08T23:06:37.924+07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Virus"/><title type='text'>Removing Trojan Virus</title><content type='html'>Trojans are viruses evil sneak into your computer or switch to legitimate software, so. You might think that you download a new update for the product X, downloaded, but a Trojan horse virus. Once you have acquired the virus in your computer, you can use your computer to access a hacker!&lt;br /&gt;&lt;br /&gt;The hacker can then navigate through your files and will even see exactly what you are doing and what he wrote, while you’re online. This can be particularly dangerous for people who use online banking or other financial institution. Even after the attacker has finished mining through information and find what it) to format your computer (Delete want their tracks.&lt;br /&gt;&lt;span id=&quot;fullpost&quot;&gt;&lt;br /&gt;Sometimes they are trojan viruses are not intended to be used by hackers, but only by a person intentionally causes destruction INFACT developed. This type of trojan virus to hurt that programmed to your PC in any way.&lt;br /&gt;&lt;br /&gt;Trojan virus can be removed easily and quickly. Tout ce que vous avez à faire est de charger le Gestionnaire des tâches de votre système (généralement en appuyant sur Ctrl + Alt + Suppr), allez dans le processus de recherche et d’un processus qui semble suspect. For example, in my method, I open Firefox, I know it is legitimate, because I use Firefox. However, when I see and gsfgsgfgerg.exe no description for this accused, and that the Google search for ways to eliminate this virus.&lt;br /&gt;&lt;br /&gt;If you are unable to detect the virus in the process tree infected by the virus, are very advanced. For this type of virus that must find the Advanced Virus Remover.&lt;br /&gt;&lt;br /&gt;The best security suite I’ve seen so far is the workstation-based optimizer. It’s an all-in-one antivirus and security, which means it protects you against viruses and keep the machine running as smoothly as it did the day I bought it!&lt;br /&gt;&lt;/span&gt;</content><link rel='replies' type='application/atom+xml' href='http://erhaesinfo.blogspot.com/feeds/4127107756181638523/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://erhaesinfo.blogspot.com/2009/10/removing-trojan-virus.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/7558658040908372012/posts/default/4127107756181638523'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7558658040908372012/posts/default/4127107756181638523'/><link rel='alternate' type='text/html' href='http://erhaesinfo.blogspot.com/2009/10/removing-trojan-virus.html' title='Removing Trojan Virus'/><author><name>Blogger Sumut</name><uri>http://www.blogger.com/profile/08272678660051145080</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='27' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhnyfSz--nbthSKnMuUCPQD0xCbGvTB3LyGrqOG8a9tFyMfFdxUqPrLcYcz6Igl4HmPUVhcARJdHBEIkrQlcKMdniEJJCKZSvDooocOwjPqrYbl0yPYCIgM9txzX_V7Gw/s220/Hacker.jpeg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-7558658040908372012.post-4155059468921110970</id><published>2009-10-08T23:03:00.002+07:00</published><updated>2009-10-08T23:05:36.718+07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Hacks"/><title type='text'>Protect Internal Network From Hacker</title><content type='html'>Hacker all warnings based on their needs and sects want to use their network, but you can defeat the attack, an appropriate combination of tactics for security.&lt;br /&gt;&lt;br /&gt;The networks are equipped with daily attacks over the air, so you need a long-term protection. There is no doubt that the most common threats: First, viruses are small programs actually infiltrate your network and to deceive the computer, run it as an attachment to an e-mail tries electronically, starting immediately after the Open attached file and repeat the same car in their computer systems. Secondly, the Trojans running on the computer with the introduction of applications or files, useful and enabled the Trojans to the mediation of specific programs and start page also in control of your computer.&lt;br /&gt;&lt;span id=&quot;fullpost&quot;&gt;&lt;br /&gt;Thirdly, the worms are also working to replicate and extend start searching for vulnerabilities on your system, enter your system and are often hidden until the right time distribution of service attack (DDoS) Start. There is no doubt that these three types of attacks a serious threat to your business and personal data. Of course, you will not, or one of the operators that their networks, the vulnerabilities are denial of service. Therefore, we must first ensure that the safety of all devices in your enterprise, and the first step in the protection of these devices with the firewall, by ensuring a defense.&lt;br /&gt;&lt;br /&gt;But suffice it to spend hundreds of dollars for providing firewall, or that costs would be several thousand dollars to accomplish? In the walls, at least one test data engine (SPI), content packages that are being tested, equipped and given the right to access the network when you get rid of malicious software code.&lt;br /&gt;&lt;br /&gt;As the firewall is in use?&lt;br /&gt;&lt;br /&gt;Firewalls can also filter based on specific rules or improper movement of a data block incoming and outgoing. It can vary between the choice of Internet Protocol (IP) using, for example, to retain existing personnel and protocol network access to specific addresses on the Internet or e-mail from them. Firewalls can also block the movement of data within the network using a unique identifier based on the degree of access control (MAC). Many firewalls can control the data by using keyword filters or scope, and permit data for a particular location. Firewalls also allow the creation of more sophisticated data standards to complex.&lt;br /&gt;&lt;br /&gt;There is a better option than the firewall, which is equipped with an engine test packages (SPI), is the firewall, depending on the depth of data packets to the computer test (IPR ). It works great test engine (IPR) by examining the contents of the packet data, in addition to the advantage of examining the header packet will be provided by the firewall module in the examination of packets Data (SPI) is. The motors can deep packet inspection of data to detect when examining the contents of the package and prevent many types of attacks: denial of service, such as (DoS) and the cache of the eruption, and the attacks of the form, the Internet Protocol, plus a series of attacks by worms. Plus the cost of the firewall, such as combat, for example, security tools on the processing of applications with the intent, viruses, spyware and virtual private networks (VPN).&lt;br /&gt;&lt;br /&gt;See the firewall must be&lt;br /&gt;&lt;br /&gt;If the cost is cheaper for the firewall, the process is easy to do because the extra cost of offering more choice of courses, and we know that if the number of options available and the process is the preparation of These options increase the complexity, as recommended, we first learn to protect what works and what are the threats that try to stay away from you. This is considered an initial list of all services, users have access, like websites and email servers and FTP servers recommended and messaging services, and remote write access to data, because the barrier Firewall filter based on the description of the service port numbers (one way to get a particular service on a computer) through such services and the Internet Protocol address of the source or destination of data. Allow some examples of common data points, 80 of 23 services HTTP and FTP and Telnet service for 21 and 25 of the SMTP service.&lt;br /&gt;&lt;br /&gt;There is no doubt that the surest way of a checklist for access to services has begun to generate a block of data traffic, then return after the separation of services to the neighborhood after another, like data traffic on port 25, if these data are subject to the Internet Protocol address in your e-mail address on your network. In the service of order on the internal network of computers outside the network, such as, for example, need access to the web server or mail server to create more complex rules of the proposal. You can see if the firewall, if used, to leave the neutral zone DMZ to connect these services, thus isolating the services open to external networks to internal network, but the firewall does not have an outlet for the neutral demilitarized zone , area, they will be granted if the contract for execution of work, a process in which all movements data service runs in a particular direction of Internet protocol inside. For those who fear that the issue of developing rules for the description of firewalls, it is said that activities are not only difficult, as you will quickly learn to be a simple set of rules, they learn quickly execute complex rules, but if they keep their fear of creating standards for description, use of specialists.&lt;br /&gt;&lt;/span&gt;</content><link rel='replies' type='application/atom+xml' href='http://erhaesinfo.blogspot.com/feeds/4155059468921110970/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://erhaesinfo.blogspot.com/2009/10/protect-internal-network-from-hacker.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/7558658040908372012/posts/default/4155059468921110970'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7558658040908372012/posts/default/4155059468921110970'/><link rel='alternate' type='text/html' href='http://erhaesinfo.blogspot.com/2009/10/protect-internal-network-from-hacker.html' title='Protect Internal Network From Hacker'/><author><name>Blogger Sumut</name><uri>http://www.blogger.com/profile/08272678660051145080</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='27' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhnyfSz--nbthSKnMuUCPQD0xCbGvTB3LyGrqOG8a9tFyMfFdxUqPrLcYcz6Igl4HmPUVhcARJdHBEIkrQlcKMdniEJJCKZSvDooocOwjPqrYbl0yPYCIgM9txzX_V7Gw/s220/Hacker.jpeg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-7558658040908372012.post-7004268987214497871</id><published>2009-10-08T23:02:00.001+07:00</published><updated>2009-10-08T23:03:03.902+07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Software"/><title type='text'>USB data file retrieval</title><content type='html'>USB drives are the better solvent of changing big amount of data by one and only computer to additional on the additional hand charge per unit of data departure has also exaggerated due to wrong handling of pen drives. If you want to go back all your erased data from USB drives then world leader Recoverybull.com in the area of data retrieval offers you USB drive data retrieval software system to go back all your lost data by versatile capacitance and brands of pen drive.&lt;br /&gt;&lt;span id=&quot;fullpost&quot;&gt;&lt;br /&gt;USB drive data undelete computer program go back all deleted and arranged data stored in your pen drive. Before floppy disks or DVD/CD comprised the mode to transfer data from one PC to a different but USB drives bears witness to be additional higher-ranking then these computer storage intermediate since of their compact shape and size, they function faster and can accommodate many data. In general users of pocket drive store their useful document, image, audio, video clips and music files since of its portability feature on the other hand rate of data departure accepts also modified due to wrong device addressing, besmirched file system, software system/computer hardware misfunction, viral infection, incorrect remotion from personal computer, system of rules loser or extra departure causes.&lt;br /&gt;&lt;br /&gt;Hitch drive data relieve application program restores deleted xls, ppt, wav, bmp, doc, exe, pdf, gif, musical instrument digital interface, jpg, mov, mp3 and early exchangeable file types to user conditioned locating with no change. Memory stick data recovery software is a read only program and is useable with simple functionality offers trailer of all recovered data before saving it.&lt;br /&gt;&lt;br /&gt;USB drive retrieval program retrieves erased data from corrupted and logically dashed storage stick, jump drive, pocket drive, thumb drive, pen drive, key drive, geek stick, flash drive, USB drive, handy drive, magic stick, pocket drive, smart media etc. Software is fully automatised and authentic to go back and repair respective blades of pen drive like Jet flash, Kingmax, SanDisk, Kingston, Generic, Lexar, Corsair, Crucial, Super flash, Transcend, Sony, Viking etc available in different contents letting in 512MB, 1GB, 4GB, 16GB, 32GB and even higher capacity drives. Some of the advance features of this software are:&lt;br /&gt;&lt;br /&gt;* Safe and assure pen drive data retrieval application provides GUI functionality.&lt;br /&gt;* Easy to install USB drive file recovery software works with all Windows operating system like Vista, XP, 2003, 2000, ME, NT and 98.&lt;br /&gt;* Software convalesces data point* even if DRIVE NOT FORMATTED subject matter is exposed on your computing machine.&lt;br /&gt;&lt;br /&gt;I am a company congressman and fully gratified with this application program to go back my text file, picture, sound, video recording clips and music files stored in any pen drive.&lt;br /&gt;&lt;/span&gt;</content><link rel='replies' type='application/atom+xml' href='http://erhaesinfo.blogspot.com/feeds/7004268987214497871/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://erhaesinfo.blogspot.com/2009/10/usb-data-file-retrieval.html#comment-form' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/7558658040908372012/posts/default/7004268987214497871'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7558658040908372012/posts/default/7004268987214497871'/><link rel='alternate' type='text/html' href='http://erhaesinfo.blogspot.com/2009/10/usb-data-file-retrieval.html' title='USB data file retrieval'/><author><name>Blogger Sumut</name><uri>http://www.blogger.com/profile/08272678660051145080</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='27' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhnyfSz--nbthSKnMuUCPQD0xCbGvTB3LyGrqOG8a9tFyMfFdxUqPrLcYcz6Igl4HmPUVhcARJdHBEIkrQlcKMdniEJJCKZSvDooocOwjPqrYbl0yPYCIgM9txzX_V7Gw/s220/Hacker.jpeg'/></author><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-7558658040908372012.post-2043751033257757995</id><published>2009-10-08T22:57:00.002+07:00</published><updated>2009-10-08T22:58:40.711+07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Laptop"/><category scheme="http://www.blogger.com/atom/ns#" term="Tips-trick"/><title type='text'>Increasing Laptop Speed</title><content type='html'>Speed of the laptop, and simple, high-speed computing. We were all there. That the land on their car tires. As we surf on our team every day, through applications, or simply the Internet, the computer responsible for memory often. How to solve this:&lt;br /&gt;&lt;span id=&quot;fullpost&quot;&gt;&lt;br /&gt;1. Hard Good Ol ‘Drive Tools tab:&lt;br /&gt;&lt;br /&gt;    * Go to the icon of your hard drive in My Computer, right-click the hard drive and select Properties.&lt;br /&gt;&lt;br /&gt;    * the General tab, the pie, you will see Disk Cleanup. Select it and you’ll see a selection of files. Select all except compression. (I have not heard of file compression good, because the CPU when it needs to use to decompress.)&lt;br /&gt;    * If the cleaning is finished and if you want the computer for 20 minutes to an hour, go to “Tools” (still in Disk Properties) and select “Disk Defragmenter.” The option of reorganizing your files so that no loss of time to jump across the disk. (This happens when you remove the differences between files, software and training.)&lt;br /&gt;&lt;br /&gt;2. Try to use the PC number Tune-Up@LargeSoftware.com there because he  can actually pick up all files and malicious or unwanted software from surfing the Internet.&lt;br /&gt;&lt;br /&gt;3. The increased RAM (chip random access memory). Yes, you hear me add RAM to your laptop! Surprisingly, not so difficult. Just find what type of memory modules that you need for your specific card system RAM. Back on the laptop. To find the right words. Add or replace and boom, you’re a Marshmallow “electronic” my friend.&lt;br /&gt;&lt;/span&gt;</content><link rel='replies' type='application/atom+xml' href='http://erhaesinfo.blogspot.com/feeds/2043751033257757995/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://erhaesinfo.blogspot.com/2009/10/increasing-laptop-speed.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/7558658040908372012/posts/default/2043751033257757995'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7558658040908372012/posts/default/2043751033257757995'/><link rel='alternate' type='text/html' href='http://erhaesinfo.blogspot.com/2009/10/increasing-laptop-speed.html' title='Increasing Laptop Speed'/><author><name>Blogger Sumut</name><uri>http://www.blogger.com/profile/08272678660051145080</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='27' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhnyfSz--nbthSKnMuUCPQD0xCbGvTB3LyGrqOG8a9tFyMfFdxUqPrLcYcz6Igl4HmPUVhcARJdHBEIkrQlcKMdniEJJCKZSvDooocOwjPqrYbl0yPYCIgM9txzX_V7Gw/s220/Hacker.jpeg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-7558658040908372012.post-464249892896640449</id><published>2009-10-08T22:26:00.001+07:00</published><updated>2009-10-08T22:27:55.647+07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Software"/><title type='text'>Good of Language Translation Software</title><content type='html'>Rotating spherical Article Digital Object assumed to historical rates. Nearly 1.5 million of millions of people are now online and contribute to its content on the Internet. Because of the exponential growth of the creative content and the statistical distribution of the existence of the generation of new opportunities Language translation services. At the same time, the absolute mass of the article, the next step to create an insurmountable obstacle to the limits of translation of the manual of arms single language.&lt;br /&gt;&lt;br /&gt;&lt;span id=&quot;fullpost&quot;&gt;&lt;br /&gt;This is an exception to adapt to the theory of human communication, and slows the rate at which the world can be transferred. In a world very competitory, where hundreds of thousands of businesses that support equality, they have the best marketing agreement the companies that support accepted selective information, the dynamics in a building in marketing. The proof of the correct data is an exception.&lt;br /&gt;&lt;br /&gt;From business intelligence to business and results of the prognostication business analysis in turn essential for the proper functioning of all businesses, large and small. If a party to find a needle in a haystack, “These results allow companies to sift facts from large amounts of data to extract relevant information and stores this information for actions that you can do.&lt;br /&gt;&lt;br /&gt;But given the global nature of the approach and analysis of information on new markets, most information in foreign languages, making it difficult to analyze applications in just a few languages to penetrate.&lt;br /&gt;Using translation software language to a result that can produce the result value of money in almost all buyers in almost real time. All information, regardless of the original language, he may, with a BI application / from Google Analytics predicts analyzed.&lt;br /&gt;&lt;br /&gt;Software translation errors are large and can quickly reach the control scheme of a zone retail sales for understanding, for the best results for the integrated section and amorphous. The integration of translation software will evaluate the predictive analytics and business intelligence solutions:&lt;br /&gt;&lt;br /&gt;(May 1) end-users effectively findings and analysis of public opinion in multiple languages and markets&lt;br /&gt;&lt;br /&gt;(2) The increase in customers in exchange for marketing and sales through re-submit accurate monitoring of the market on a regional basis&lt;br /&gt;&lt;br /&gt;Labor (3) as a force multiplier, allowing end users to use BI ROI with the multi-language support, the main result of the band&lt;br /&gt;&lt;br /&gt;Land of translation products of the software on the authentic art, based on statistics and technology in organizations in many sectors and at all levels of government put in place in the world. These are the results of the translation for organizations, large amounts of information must be designed to be in one or more languages to be translated at high speed and high precision. The productions are designed by the anchor for easy integration into virtually any application. The possibility for each operation of this software is designed to meet the needs of customers and allow easy installation of large volumes of translation.&lt;br /&gt;&lt;/span&gt;</content><link rel='replies' type='application/atom+xml' href='http://erhaesinfo.blogspot.com/feeds/464249892896640449/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://erhaesinfo.blogspot.com/2009/10/good-of-language-translation-software.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/7558658040908372012/posts/default/464249892896640449'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7558658040908372012/posts/default/464249892896640449'/><link rel='alternate' type='text/html' href='http://erhaesinfo.blogspot.com/2009/10/good-of-language-translation-software.html' title='Good of Language Translation Software'/><author><name>Erhaes</name><uri>http://www.blogger.com/profile/17755384877510271490</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-7558658040908372012.post-5590512172439369762</id><published>2009-10-08T21:48:00.008+07:00</published><updated>2009-10-08T22:59:23.376+07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Tips-trick"/><category scheme="http://www.blogger.com/atom/ns#" term="Windows"/><title type='text'>Tips For Windows XP Full Performance</title><content type='html'>It has really crossing, simply across time, Windows XP acts really slow. Affording big application program*, as if games or graphics programs seems to be always. And if you would like to create a spreadsheet or articulate can accept virtually minutes to open the program. Here are some tips to improve the performance of Windows XP.&lt;br /&gt;&lt;br /&gt;&lt;span id=&quot;fullpost&quot;&gt;&lt;br /&gt;&lt;b&gt;The team was loaded with spyware&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;The first thing I recommend is not getting rid of spyware, which is currently making your computer slow. People often do not realize, but the Internet can harm your computer. Maybe you think you can save, because things do not download, but not always so. Spyware spy on you and through the Internet. These data are advertisers that pop-ups or e-mail.&lt;br /&gt;&lt;br /&gt;And worse, when the installation of malicious software. Malware is spyware, but dangerous. Clothing Malware personal data such as numbers of credit cards and passwords.&lt;br /&gt;&lt;br /&gt;Thus, investing primarily in connection with the performance team is a program to remove spyware. Make sure that the spyware program that is able to decide to remove the malicious software.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;b&gt;Restore the registry in Windows XP&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;Second step towards a faster Windows XP to restore the registry. The registry is a global database containing information about the programs on your computer witch. Currently, there are many programs on the market, clean and errors in the Microsoft Windows registry can be solved.&lt;br /&gt;&lt;br /&gt;Damage the Windows registry can be slower, but it could be worse. May have paid a man to repair the computer with a good amount of money because the home team can not run. Ein Scan der jede Registrierung Mal, wenn Sie dieses Problem zu Dränpflug.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;b&gt;Correcting erros Rundll&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;Another common method to improve the efficiency of Windows XP to get rid of rundll error. This is the key to maintain the speed of the DLL file in the Windows registry and performance of your computer.&lt;br /&gt;&lt;br /&gt;In some cases, the error can be defined in Windows Rundll failure are related “and” Blue Screen of Death. It is not advisable to restore a rundll error. Using the software registry repair can help. But make sure that the market for dozens of programs that not only fix the registry, but the injury is the opposite.&lt;br /&gt;&lt;/span&gt;</content><link rel='replies' type='application/atom+xml' href='http://erhaesinfo.blogspot.com/feeds/5590512172439369762/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://erhaesinfo.blogspot.com/2009/10/tips-for-windows-xp-full-performance.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/7558658040908372012/posts/default/5590512172439369762'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7558658040908372012/posts/default/5590512172439369762'/><link rel='alternate' type='text/html' href='http://erhaesinfo.blogspot.com/2009/10/tips-for-windows-xp-full-performance.html' title='Tips For Windows XP Full Performance'/><author><name>Blogger Sumut</name><uri>http://www.blogger.com/profile/08272678660051145080</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='27' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhnyfSz--nbthSKnMuUCPQD0xCbGvTB3LyGrqOG8a9tFyMfFdxUqPrLcYcz6Igl4HmPUVhcARJdHBEIkrQlcKMdniEJJCKZSvDooocOwjPqrYbl0yPYCIgM9txzX_V7Gw/s220/Hacker.jpeg'/></author><thr:total>0</thr:total></entry></feed>