<?xml version='1.0' encoding='UTF-8'?><rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/" xmlns:blogger="http://schemas.google.com/blogger/2008" xmlns:georss="http://www.georss.org/georss" xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr="http://purl.org/syndication/thread/1.0" version="2.0"><channel><atom:id>tag:blogger.com,1999:blog-2834877705017843849</atom:id><lastBuildDate>Thu, 26 Feb 2026 08:34:56 +0000</lastBuildDate><category>TipsTricks</category><category>News</category><category>Internet</category><category>Windows</category><category>Gadget</category><category>Blog</category><category>Free Download</category><category>Virus</category><category>Game</category><category>Multimedia</category><category>Social Network</category><title>technoblog</title><description></description><link>http://halotechno.blogspot.com/</link><managingEditor>noreply@blogger.com (Unknown)</managingEditor><generator>Blogger</generator><openSearch:totalResults>80</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2834877705017843849.post-502262442402674825</guid><pubDate>Fri, 15 Oct 2010 08:45:00 +0000</pubDate><atom:updated>2010-10-15T01:45:22.415-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">TipsTricks</category><title>How to speed up Youtube Streaming</title><description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiYNiZ4geodrcaGFvPFfiV-79k9S7FshB2GxJfvNtREEjKaKMJdlzdAod3H9hTICkPn4fmWUTTFYMtwkwrV8RTuiCWJIz0QJVpqHC-qW9ABV6t4pH0cYptBzrAUPiC6lyFhaEfs62TAcr_Z/s1600/youtube.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;193&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiYNiZ4geodrcaGFvPFfiV-79k9S7FshB2GxJfvNtREEjKaKMJdlzdAod3H9hTICkPn4fmWUTTFYMtwkwrV8RTuiCWJIz0QJVpqHC-qW9ABV6t4pH0cYptBzrAUPiC6lyFhaEfs62TAcr_Z/s320/youtube.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;When you want to view the video directly from the site on the internet would you think that is youtube. But if the connection when you see the video streaming youtube definitely slow then long, then you feel upset. Sometimes you even can only see in certain parts of minutes or seconds ...&lt;br /&gt;
&lt;br /&gt;
It is time to anticipate the problem. So, in post today I wanna share knowledge for you watch your favorite videos on youtube with ease.&lt;br /&gt;
&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
First, go to youtube site and select a video you want&lt;br /&gt;
&lt;br /&gt;
Second, at the end of the video url you add the code # t = 01-m29s.&lt;br /&gt;
Example: The original url is: http://www.youtube.com/watch?v=-42TwTFMHNU&lt;br /&gt;
&lt;br /&gt;
it will be http://www.youtube.com/watch?v=-42TwTFMHNU # t = 01-m29s.&lt;br /&gt;
Simak&lt;br /&gt;
Baca secara fonetik&lt;span id=&quot;fullpost&quot;&gt;&lt;/span&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;subscribe to my newest articles here&lt;/div&gt;</description><link>http://halotechno.blogspot.com/2010/10/how-to-speed-up-youtube-streaming.html</link><author>noreply@blogger.com (Unknown)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiYNiZ4geodrcaGFvPFfiV-79k9S7FshB2GxJfvNtREEjKaKMJdlzdAod3H9hTICkPn4fmWUTTFYMtwkwrV8RTuiCWJIz0QJVpqHC-qW9ABV6t4pH0cYptBzrAUPiC6lyFhaEfs62TAcr_Z/s72-c/youtube.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2834877705017843849.post-5208785538869880316</guid><pubDate>Fri, 15 Oct 2010 06:30:00 +0000</pubDate><atom:updated>2010-10-14T23:30:44.270-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">TipsTricks</category><title>3 Steps Opening Windows with Ubuntu Password</title><description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi-yU6cL3C-Uj9Nfu8uFzJPntGJB7QuJ0L2A1aZUg2-kZEWCkaONq1i3cW4XRBFcObkZOgLld8o6EuMJSDRcwTS3cetkc0N5r6QJI8Le5x8NmfFNLe6lb50uQt0J1Ki5JaSpHD26FLZA0v2/s1600/ubuntu+windows+password.PNG&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;217&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi-yU6cL3C-Uj9Nfu8uFzJPntGJB7QuJ0L2A1aZUg2-kZEWCkaONq1i3cW4XRBFcObkZOgLld8o6EuMJSDRcwTS3cetkc0N5r6QJI8Le5x8NmfFNLe6lb50uQt0J1Ki5JaSpHD26FLZA0v2/s320/ubuntu+windows+password.PNG&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;Forget is a problem commonly faced by mankind. If you forget your Windows login password, no way to recover it using the Ubuntu Linux operating system.&lt;br /&gt;
&lt;br /&gt;
The first thing to do is create a Live CD or Live USB stick Ubuntu Linux. Ubuntu Live will be used to boot into the system and perform the procedures required to dismantle the Windows password earlier.&lt;br /&gt;
&lt;br /&gt;
The easiest way to do that is by downloading and running UNetbootin. This simple application will download the selected Ubuntu version and install on the flash that you prepared.&lt;br /&gt;
&lt;br /&gt;
The second stage is to install Open Source utility called chntpw. This is done from Ubuntu by running Synaptic Package Manager.&lt;br /&gt;
&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
To be able to get chntpw, Synaptic Package Manager should be directed to look at storage applications Universe. This can be done by clicking the Settings menu&amp;gt; Repositories in Synaptic window. Then, check the option &#39;Community-maintained Open Source software (universe) &quot;and click Close.&lt;br /&gt;
&lt;br /&gt;
After that, click the Reload button and Synaptic will download the latest package information from the Universe. When finished, type chntpw on the Quick Search box.&lt;br /&gt;
&lt;br /&gt;
If it appears, check the box on the side chnptw writing, choose &#39;Mark for Installation&#39;. Then click Apply to install it.&lt;br /&gt;
&lt;br /&gt;
The third stage is to change the Windows password with chntpw.&lt;br /&gt;
&lt;br /&gt;
1. Mount the hard disk / drive that contains your Windows installation&lt;br /&gt;
2. Open the hard drive it (click on Places) and record labels drive that appears on the menu bar window file browser&lt;br /&gt;
3. Open a Terminal window (Applications&amp;gt; Accessories&amp;gt; Terminal)&lt;br /&gt;
4. Type the following command in Terminal:&lt;br /&gt;
cd / media&lt;br /&gt;
ls&lt;br /&gt;
5. Type: cd [label hard drive that you noted earlier]&lt;br /&gt;
6. type: cd WINDOWS/system32/config&lt;br /&gt;
7. To change the Administrator password, type the command: sudo chntpw SAM&lt;br /&gt;
8. You will see several commands that you can choose, the command is safest to create a password to be blank. Do this by pressing the number &#39;1 &#39;, then press&#39; y&#39; to confirm&lt;br /&gt;
9. Select &#39;2 &#39;to change the password to a particular word, but this has a greater risk of error&lt;br /&gt;
10. To change the passwords of other users (non-administrator), type the following command (from Terminal): sudo chntpw-u [user name]&lt;br /&gt;
&lt;span id=&quot;fullpost&quot;&gt;&lt;/span&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;subscribe to my newest articles here&lt;/div&gt;</description><link>http://halotechno.blogspot.com/2010/10/3-steps-opening-windows-with-ubuntu.html</link><author>noreply@blogger.com (Unknown)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi-yU6cL3C-Uj9Nfu8uFzJPntGJB7QuJ0L2A1aZUg2-kZEWCkaONq1i3cW4XRBFcObkZOgLld8o6EuMJSDRcwTS3cetkc0N5r6QJI8Le5x8NmfFNLe6lb50uQt0J1Ki5JaSpHD26FLZA0v2/s72-c/ubuntu+windows+password.PNG" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2834877705017843849.post-1011871129695797821</guid><pubDate>Tue, 05 Oct 2010 10:27:00 +0000</pubDate><atom:updated>2010-10-05T03:31:59.404-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">TipsTricks</category><title>7 Tips for Keeping Passwords</title><description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjcWy9PeQB_N8Hz3SgBXK7XWw1HpBWQehwoPK88mGxmlmpcXYptn74bHmfUfAnFqrTSJbSKeKTfl0-KdHQfWq5PS44ODzDuHj6Ftv3vWYtHZ_X09UhNYZoOR4EVRnFZmPBG1PSJwzl3FBwP/s1600/password.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;240&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjcWy9PeQB_N8Hz3SgBXK7XWw1HpBWQehwoPK88mGxmlmpcXYptn74bHmfUfAnFqrTSJbSKeKTfl0-KdHQfWq5PS44ODzDuHj6Ftv3vWYtHZ_X09UhNYZoOR4EVRnFZmPBG1PSJwzl3FBwP/s320/password.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;Passwords are secret codes that must be protected. Many negative things can happen when your password leak into the hands of others. Learn 7 tips to keep it brief.&lt;br /&gt;
&lt;br /&gt;
1. Not Using Default Password&lt;br /&gt;
The default password is the password that we can be the first time. This default password should indeed be quickly replaced because of very vulnerable. The reason, the default password can be easily searched on google search, even there are listed the name of a machine, type and default password with a magnificent plastered on some website creators vendors.&lt;br /&gt;
&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;br /&gt;
Sometimes administrators fear of forgetting to change-change the default password, so that an intruder can take over the system with default passwords.&lt;br /&gt;
2.Using No Password Hint&lt;br /&gt;
Sometimes we are afraid to forget the password that was our entry into the system / account, so we need to create a reminder if we forget the password. Now this is called password reminder Hint, if we create a password hint question with this then we can quickly recall these forgotten passwords.&lt;br /&gt;
&lt;br /&gt;
Likewise with the hackers, they&#39;ll experiment with us to guess the password in the password hint questions, gradually password will be predictable, if the questions listed in the password hint can be answered by the penebak password.&lt;br /&gt;
&lt;br /&gt;
3. Writing No Password&lt;br /&gt;
Owners are often afraid to forget your password with the password has been entered, so the owner would write different passwords user id and password into other media such as a notebook, notepad, Stickies (mac), password folders, books, mobile phones and other.&lt;br /&gt;
&lt;br /&gt;
It is also quite vulnerable to leaking. Why vulnerable? Because when a variety of equipment is lost, then all information about a user id and password are sooner or later will be known by the thief equipments / gadgets are missing.&lt;br /&gt;
&lt;br /&gt;
4.Using a Strong Password&lt;br /&gt;
Owner passwords often using a short password only, if it could be shorter than 3 characters then the user will give a short password. Fortunately this time the system provides a minimum password length of 6 characters and a maximum of 254 characters. The longer a password the stronger it will be the password security.&lt;br /&gt;
&lt;br /&gt;
Strong passwords can be created with a combination of numbers and letters and even a variety of other characters. Some admins are currently using a password that is long enough, coupled with encryption such as PGP key and others, so it is quite difficult to guess password.&lt;br /&gt;
&lt;br /&gt;
5.Always Change Password&lt;br /&gt;
Owners should periodically change your password for authentication password, the more frequent password changes, the better, because the more difficult the penebak password hacking account / your system. Changes to the password depends on the owner, could be a week, a month, three months, and others. Originally the owner does not forget the password that was changed earlier.&lt;br /&gt;
&lt;br /&gt;
6. Using No Same Password on &lt;a href=&quot;http://halotechno.blogspot.com/2010/09/log-in-with-multiple-usernames-with.html&quot;&gt;Multiple Accounts&lt;/a&gt;&lt;br /&gt;
Owners often forget and sometimes passwords frequently enough to create an account, so they each create a new account using the same user id and password are the same, this is very vulnerable and dangerous. Because these passwords through a single account, all accounts will be taken by the hacker.&lt;br /&gt;
&lt;br /&gt;
7. Using Password Management&lt;br /&gt;
To help recall the various passwords and various accounts, we are often very difficult, but not to worry because it has many current applications to help organize our passwords. This application can be downloaded for free from the internet and paid, so that regardless of our account and whatever we can with the password easy to remember and re-opened, of course, to open it with an encryption method as well.&lt;div class=&quot;blogger-post-footer&quot;&gt;subscribe to my newest articles here&lt;/div&gt;</description><link>http://halotechno.blogspot.com/2010/10/7-tips-for-keeping-passwords.html</link><author>noreply@blogger.com (Unknown)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjcWy9PeQB_N8Hz3SgBXK7XWw1HpBWQehwoPK88mGxmlmpcXYptn74bHmfUfAnFqrTSJbSKeKTfl0-KdHQfWq5PS44ODzDuHj6Ftv3vWYtHZ_X09UhNYZoOR4EVRnFZmPBG1PSJwzl3FBwP/s72-c/password.jpg" height="72" width="72"/><thr:total>1</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2834877705017843849.post-6596295395756102306</guid><pubDate>Thu, 23 Sep 2010 08:48:00 +0000</pubDate><atom:updated>2010-09-24T05:23:30.107-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">TipsTricks</category><title>Lock the Computer with a USB Flash Drive</title><description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEihnsUBuM3Sos0aXEBbaFkaXNizlVS0rNiVpMLhodMPDcyI5LD7DeLkW-LPhS7Ktkyih18-m92nt1DBlqKtAeaLuAacWrGJWlrGbWA3TQkVijAcaTbi23DnS3sUbgzYoci2VcNcBlig2vCB/s1600/lock+pc.jpeg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;320&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEihnsUBuM3Sos0aXEBbaFkaXNizlVS0rNiVpMLhodMPDcyI5LD7DeLkW-LPhS7Ktkyih18-m92nt1DBlqKtAeaLuAacWrGJWlrGbWA3TQkVijAcaTbi23DnS3sUbgzYoci2VcNcBlig2vCB/s320/lock+pc.jpeg&quot; width=&quot;276&quot; /&gt;&lt;/a&gt;&lt;/div&gt;We all are familiar with USB flash drive that also often called the flash disk. Apparently, the flash disk can not can only be used to store and carry files, but also can be used to lock the computer, with the help of an application called Predator. The concept is simple, that is when we pull out our flask disk, the computer is locked. Then when we plug the back flash disk, the computer will be used again.&lt;br /&gt;
&lt;br /&gt;
How to use the Predator is a very simple application. We just need to plug the flash disk, run the application Predator, and start working. When we need to leave the computer for a while, we just pull out our flash disk, and a keyboard and mouse will be locked. The computer screen will become dark. When we returned, we only need to plug the back flash disk that serves as the key before, and we can proceed with the work.&lt;br /&gt;
&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
Predator Applications can also be set to use a password when we will unlock the computer. As anticipated when the flash disk that serves as the main key is lost, we can make a spare key with flash disk, which can be used in an emergency.&lt;br /&gt;
&lt;br /&gt;
Predator Applications are available in paid versions and free versions. We can use it free of charge provided for personal use only. Unfortunately, this application can only be used on computers that use Windows operating systems only.&lt;br /&gt;
&lt;br /&gt;
For the technical you can visit: &lt;a href=&quot;http://www.montpellier-informatique.com/predator/en/index.php?n=Main.Pref1&quot;&gt;www.montpellier-informatique.com/predator/&lt;/a&gt;&lt;br /&gt;
&lt;span id=&quot;fullpost&quot;&gt;&lt;/span&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;subscribe to my newest articles here&lt;/div&gt;</description><link>http://halotechno.blogspot.com/2010/09/lock-computer-with-usb-dlash-drive.html</link><author>noreply@blogger.com (Unknown)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEihnsUBuM3Sos0aXEBbaFkaXNizlVS0rNiVpMLhodMPDcyI5LD7DeLkW-LPhS7Ktkyih18-m92nt1DBlqKtAeaLuAacWrGJWlrGbWA3TQkVijAcaTbi23DnS3sUbgzYoci2VcNcBlig2vCB/s72-c/lock+pc.jpeg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2834877705017843849.post-6438931560479555282</guid><pubDate>Fri, 17 Sep 2010 09:02:00 +0000</pubDate><atom:updated>2010-09-17T02:07:10.202-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">TipsTricks</category><title>Log in with Multiple Usernames with Multifox</title><description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiBeyUQ37Ze7XaD2JW8959_gZaKDQy2k5erBz2Ig3Hc_eYHWsfiHgl9Kd-01WfWp2VAII7SWNbkHAwqeaKBY8szAgRw79-4qRpwc2WI0LaokYIubeI37MpONH5NulbIP7bGCLldYAGXUqsY/s1600/multifox.png&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;192&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiBeyUQ37Ze7XaD2JW8959_gZaKDQy2k5erBz2Ig3Hc_eYHWsfiHgl9Kd-01WfWp2VAII7SWNbkHAwqeaKBY8szAgRw79-4qRpwc2WI0LaokYIubeI37MpONH5NulbIP7bGCLldYAGXUqsY/s320/multifox.png&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;If you have multiple accounts from services like Gmail or Twitter and you are using Firefox, you can only login using a username just in the same time. &lt;a href=&quot;http://br.mozdev.org/multifox/&quot;&gt;Multifox&lt;/a&gt; is a Firefox extension that allows Firefox to connect to a website using a different username. So if you have multiple Gmail accounts, you can open all your Gmail account simultaneously. Each window Firefox will be able to access any account without disturbing each other.&lt;br /&gt;
Here are some features of Multifox:&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
* Log will be stored in the same manner as ordinary window, even when you close the window or exit from Firefox.&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; * Profile and identity of each window is stored and can be used when Firefox is reopened.&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; * A new window that opens will have the same profile as the identity of their original window is opened.&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; * Multifox ranging from 2, because 1 is considered as a normal Firefox profile identity.&lt;br /&gt;
If you think this extension can help you, then you should immediately get it.&lt;br /&gt;
&lt;br /&gt;
Visit &lt;a href=&quot;http://br.mozdev.org/multifox/&quot;&gt;here&lt;/a&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;subscribe to my newest articles here&lt;/div&gt;</description><link>http://halotechno.blogspot.com/2010/09/log-in-with-multiple-usernames-with.html</link><author>noreply@blogger.com (Unknown)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiBeyUQ37Ze7XaD2JW8959_gZaKDQy2k5erBz2Ig3Hc_eYHWsfiHgl9Kd-01WfWp2VAII7SWNbkHAwqeaKBY8szAgRw79-4qRpwc2WI0LaokYIubeI37MpONH5NulbIP7bGCLldYAGXUqsY/s72-c/multifox.png" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2834877705017843849.post-3871533599484192752</guid><pubDate>Fri, 03 Sep 2010 09:12:00 +0000</pubDate><atom:updated>2010-09-03T02:25:55.400-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Gadget</category><category domain="http://www.blogger.com/atom/ns#">TipsTricks</category><title>4 Easy Steps to Upgrade Android with HTC Desire</title><description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEghKD20l1GGZ4fKXeJEV0TN2KFMTAVtt5Owds7qecWcsA9o-rQu_v_F_nLa_GoR5fZkdavm4R41z2GKqxcZDzZiRiEREd8JizjoSMCQaLn1uSG0hkWWe9QzqCr_g1DSIRcug3ONAgxdVWvj/s1600/android+froyo.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;320&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEghKD20l1GGZ4fKXeJEV0TN2KFMTAVtt5Owds7qecWcsA9o-rQu_v_F_nLa_GoR5fZkdavm4R41z2GKqxcZDzZiRiEREd8JizjoSMCQaLn1uSG0hkWWe9QzqCr_g1DSIRcug3ONAgxdVWvj/s320/android+froyo.jpg&quot; width=&quot;310&quot; /&gt;&lt;/a&gt;&lt;/div&gt;Although not yet widely available, but the Android 2.2 or Froyo was worth trying in some mobile phones. Call it that HTC has released it for Desire.&lt;br /&gt;
For U.S. territory Froyo upgrade for HTC Desire was released in August 2010. Whereas for the Asian region was released a few weeks longer.&lt;br /&gt;
By using the HTC you can enjoy Froyo Desire. Ways to do to switch to Froyo not difficult, here are the steps:&lt;br /&gt;
&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;br /&gt;
________________________________________&lt;br /&gt;
1. Check latest updatesUsers can check in advance what updates have been prepared by HTC. To do it just need to go to the Settings menu, then About Phone and then refer to the System Sotfware Updates. Wait a moment, the phone will check for latest updates.&lt;br /&gt;
&lt;br /&gt;
2. Backup filesBecause it will change the operating system, all the installation files, contact lists, as well as several other files that are on the internal memory will be erased. Therefore the backup files shall be done. For a list of contacts for example, users can synchronize your google account.&lt;br /&gt;
3. SD CardBefore performing the latest update, make sure there is enough space on the external memory used. Because, every file you download will first be placed on the SD card is available.&lt;br /&gt;
4. Prepare a smooth connection After checking the latest updates on the HTC server, users will be prompted to download a few files first before switching to Froyo. After that a new cell phone is ready for upgrading the operating system.&lt;br /&gt;
In order to smooth the installation process, users are advised to use the current connection like Wi-fi. The reason is, the file size that will be downloaded which is quite big, about 90MB.&lt;br /&gt;
After all donwload process is completed, users are now ready to migrate to Froyo. Wait a few moments, the phone will perform the installation automatically. Easy isn&#39;t it?&lt;div class=&quot;blogger-post-footer&quot;&gt;subscribe to my newest articles here&lt;/div&gt;</description><link>http://halotechno.blogspot.com/2010/09/4-easy-steps-to-upgrade-android-with.html</link><author>noreply@blogger.com (Unknown)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEghKD20l1GGZ4fKXeJEV0TN2KFMTAVtt5Owds7qecWcsA9o-rQu_v_F_nLa_GoR5fZkdavm4R41z2GKqxcZDzZiRiEREd8JizjoSMCQaLn1uSG0hkWWe9QzqCr_g1DSIRcug3ONAgxdVWvj/s72-c/android+froyo.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2834877705017843849.post-5174114332477200957</guid><pubDate>Thu, 01 Jul 2010 11:04:00 +0000</pubDate><atom:updated>2010-07-01T04:04:34.567-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Gadget</category><category domain="http://www.blogger.com/atom/ns#">TipsTricks</category><title>Secret Keys on Nokia N900</title><description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhUmD1EF9OVWPboBELM1J0YO0CVnDV0Bn_Qj8Yg4f6tQwgYzrGemsa9IJUWC-dYMtySfA3g7RdptFokqcSORZPQwkLv7G4QRKs25PhcLEPCpS1SGirwhgtfb7i3SYZ8wYz8WenmFXeoNlvu/s1600/Nokia-N900-Maemo.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;162&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhUmD1EF9OVWPboBELM1J0YO0CVnDV0Bn_Qj8Yg4f6tQwgYzrGemsa9IJUWC-dYMtySfA3g7RdptFokqcSORZPQwkLv7G4QRKs25PhcLEPCpS1SGirwhgtfb7i3SYZ8wYz8WenmFXeoNlvu/s200/Nokia-N900-Maemo.jpg&quot; width=&quot;200&quot; /&gt;&lt;/a&gt;&lt;/div&gt;Have you already tried Maemo found on the Nokia N900? Here are some tips about the secret button on the big screen mobile phone. For those who do not know, please try.&lt;br /&gt;
&lt;br /&gt;
These are some shortcuts that are divided to five categories:&lt;br /&gt;
&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Public Keys:&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; * Ctrl + Backspace: Turning to the previous tab&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; * Ctrl + C: Copy text&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; * Ctrl + V: Paste text&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; * Ctrl + X: Cut text&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; * Ctrl + A: Select all&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; * Ctrl + O: Open (if possible)&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; * Ctrl + N: Create a new item (if possible)&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; * Ctrl + S: Save (if possible)&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; * Ctrl + Z: Undo (if possible)&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; * Ctrl + Y: redo (if possible)&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; * Ctrl + F: Opens the search bar (if possible)&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; * Ctrl + Arrow Right: Pointer directly to the end of the sentence&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; * Ctrl + Left Arrow: Direct Pointer to the beginning of the sentence&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Web Browser button:&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; * Ctrl + N: Opens a new window&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; * Ctrl + R: Reload&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; * Ctrl + B: Open bookmarks&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; * Ctrl + D: Adding bookmarks&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Email / SMS:&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; * Ctrl + Enter: Send a message / email&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; * Ctrl + R: Reply to message / email&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
RSS Reader:&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; * Ctrl + R: Refreshing feeds&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Screenshots:&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; * Ctrl + Shift + P: Capturing the display screen&lt;span id=&quot;fullpost&quot;&gt; &lt;/span&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;subscribe to my newest articles here&lt;/div&gt;</description><link>http://halotechno.blogspot.com/2010/07/secret-keys-on-nokia-n900.html</link><author>noreply@blogger.com (Unknown)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhUmD1EF9OVWPboBELM1J0YO0CVnDV0Bn_Qj8Yg4f6tQwgYzrGemsa9IJUWC-dYMtySfA3g7RdptFokqcSORZPQwkLv7G4QRKs25PhcLEPCpS1SGirwhgtfb7i3SYZ8wYz8WenmFXeoNlvu/s72-c/Nokia-N900-Maemo.jpg" height="72" width="72"/><thr:total>3</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2834877705017843849.post-8754917465691054845</guid><pubDate>Thu, 01 Jul 2010 08:05:00 +0000</pubDate><atom:updated>2010-07-01T01:05:08.755-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Social Network</category><category domain="http://www.blogger.com/atom/ns#">TipsTricks</category><title>How to Inserting Video to Twitter</title><description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjXKfg9F_-_2VXwaBwLBghoZs-RdNokFePjTW-0UusJHLl7fXzA-Ttc3M-olfBL7xmOcwhv_2usKkM-OI58-qFFtx9jSt5Tz5jX8Cnnwqg-Knk9Eq0rRsWe-0L-OINadWfw-sW1UNAsIU51/s1600/tweetube.png&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;245&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjXKfg9F_-_2VXwaBwLBghoZs-RdNokFePjTW-0UusJHLl7fXzA-Ttc3M-olfBL7xmOcwhv_2usKkM-OI58-qFFtx9jSt5Tz5jX8Cnnwqg-Knk9Eq0rRsWe-0L-OINadWfw-sW1UNAsIU51/s320/tweetube.png&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;When talking about video on the internet, may not be separated from YouTube. One of Google&#39;s products is indeed remarkable. Anyone can upload any video into it and it&#39;s free too. No wonder if Google claims YouTube has not been entirely beneficial to Google&#39;s revenue. &lt;br /&gt;
&lt;br /&gt;
But apparently no problem for the user. Videos on YouTube can be shared with anyone. In Facebook, everyone can do it. Even the video can also be shared throughout the world via Twitter. &lt;br /&gt;
&lt;br /&gt;
Way, users stay open www.tweetube.com site. There, to include video, the first thing to do is to log in, by filling the username and password used to log into Twitter. &lt;br /&gt;
&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
Therefore, to be able to send video through tweetube, users must also be registered in advance in Twitter account. Tweetube itself is a multimedia provider, not just video, but also a place to share a picture, video, web cam, and the url. &lt;br /&gt;
&lt;br /&gt;
This site is connected with YouTube as the site of the world&#39;s largest video provider, On the next page, users will diminat to write the URL of the video in question, or when you still do not have a url, try to enter a keyword to search for rich video you want. &lt;br /&gt;
&lt;br /&gt;
By typing a keyword in the search, the user will get some videos that can be selected alternative. Automatically, the video will be screened prior to share. For those who have low bandwidth, may have to be patient to see it. But if not impatient, just click the Share This Video. &lt;br /&gt;
&lt;br /&gt;
Share Before clicking, the user can advance to comment in the fields. To then download it to the world-Share on Twitter.&lt;br /&gt;
&lt;br /&gt;
&lt;span id=&quot;fullpost&quot;&gt; &lt;/span&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;subscribe to my newest articles here&lt;/div&gt;</description><link>http://halotechno.blogspot.com/2010/07/how-to-inserting-video-to-twitter.html</link><author>noreply@blogger.com (Unknown)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjXKfg9F_-_2VXwaBwLBghoZs-RdNokFePjTW-0UusJHLl7fXzA-Ttc3M-olfBL7xmOcwhv_2usKkM-OI58-qFFtx9jSt5Tz5jX8Cnnwqg-Knk9Eq0rRsWe-0L-OINadWfw-sW1UNAsIU51/s72-c/tweetube.png" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2834877705017843849.post-4828315968587611923</guid><pubDate>Wed, 30 Jun 2010 10:35:00 +0000</pubDate><atom:updated>2010-06-30T03:35:52.682-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">TipsTricks</category><title>Chasing Sunset and Sunrise Through Google</title><description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgYkucNjtNNP7ShCSwlkUmKx168q7DDcuDFBfafZx_U5JUyurFNHGSc-5SiYEKcYBPE7hcsKdSvD2_Kar7SFanQ6UGykDEE2rygv5YUe1uP5pcRHNgeukDCkuSJTIQ_dTF9A8_eoI8YRIoH/s1600/sunset.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;67&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgYkucNjtNNP7ShCSwlkUmKx168q7DDcuDFBfafZx_U5JUyurFNHGSc-5SiYEKcYBPE7hcsKdSvD2_Kar7SFanQ6UGykDEE2rygv5YUe1uP5pcRHNgeukDCkuSJTIQ_dTF9A8_eoI8YRIoH/s320/sunset.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;Want to know when sunrise or sunset in an area? Google has a simple way to do that.&lt;br /&gt;
&lt;br /&gt;
When visiting an area, there are times when we need to know when sunrise and sunset time in that place. Considerable usefulness, for example to estimate when the time Fajr Maghrib ends and begins for the religion of Islam.&lt;br /&gt;
&lt;br /&gt;
Other functions, this will be very useful for those who want to do a photocall. Know when the sun sets to be used as the background will be helpful in making plans to go to the location.&lt;br /&gt;
&lt;br /&gt;
Now, via Google, it can be done by following these easy steps:&lt;br /&gt;
&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp;&amp;nbsp; 1. Go to Google.com&lt;br /&gt;
&amp;nbsp;&amp;nbsp; 2. Type in &quot;sunrise [city name]&quot; (without the quotes, replace [city name] with the desired city). Examples: &quot;Sunrise Jakarta&quot; will bring up 5:49 pm time information plus information from &#39;6 hours 58 minutes now &#39;at bottom&lt;br /&gt;
&amp;nbsp;&amp;nbsp; 3. For when the sun goes down, replace the &quot;sunrise&quot; with &quot;sunset&quot;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Like many other functions at Google, there are times when this function can only be accessed if the choice of language used on the Google site is English.&lt;br /&gt;
&lt;br /&gt;
Similar functions are also available for weather and time information in a particular area. Way, simply replacing the word &quot;sunrise&quot; or &quot;sunset&quot; with &quot;weather&quot; for the weather and &quot;time&quot; for time.&lt;br /&gt;
&lt;span id=&quot;fullpost&quot;&gt; &lt;/span&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;subscribe to my newest articles here&lt;/div&gt;</description><link>http://halotechno.blogspot.com/2010/06/chasing-sunset-and-sunrise-through.html</link><author>noreply@blogger.com (Unknown)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgYkucNjtNNP7ShCSwlkUmKx168q7DDcuDFBfafZx_U5JUyurFNHGSc-5SiYEKcYBPE7hcsKdSvD2_Kar7SFanQ6UGykDEE2rygv5YUe1uP5pcRHNgeukDCkuSJTIQ_dTF9A8_eoI8YRIoH/s72-c/sunset.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2834877705017843849.post-4564319300562510805</guid><pubDate>Fri, 25 Jun 2010 11:42:00 +0000</pubDate><atom:updated>2010-06-25T04:46:21.340-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Free Download</category><category domain="http://www.blogger.com/atom/ns#">TipsTricks</category><title>How to Download Videos from Any Site with Any File Formats</title><description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgVWv68KTlKlDH-JRXMfI3Yqpnnz56Z35PYtOo8-IX_2hiFoNG0qZBAvKIi4a2lnYhsVbAhm1ZMvDgs4fehHTkWI6SsDje9xYibhuMYGh72fVgLxopTaNlQtD2IxGEXUJxysWcEaudOn7cc/s1600/improveddailymotiondownloader.jpeg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;241&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgVWv68KTlKlDH-JRXMfI3Yqpnnz56Z35PYtOo8-IX_2hiFoNG0qZBAvKIi4a2lnYhsVbAhm1ZMvDgs4fehHTkWI6SsDje9xYibhuMYGh72fVgLxopTaNlQtD2IxGEXUJxysWcEaudOn7cc/s320/improveddailymotiondownloader.jpeg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;This time I will be sharing about how to download video from any site with a wide range of file formats. Maybe you are not satisfied watching video directly on your web browser, try downloading it by using the Improved Dailymotion Downloader. These applications can be installed plugin in web browser, Internet Explorer includes, Google Chrome, Firefox, and Opera. you can download video avi file format, mp3.3gp, or flv.&lt;br /&gt;
&lt;br /&gt;
This new application supports downloading videos from several sites, including dailymotion.com and break.com. in pengunaanya, offering users the choice of pause, resume, and cancel, each time you make a new video download.&lt;br /&gt;
&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
This application is equipped with auto-update feature which is the developer of a form of anticipation for the happening changes the HTML structure of a site at a later date. for any use of this application requires. NET Framework is installed on the user&#39;s operating system.&lt;br /&gt;
&lt;br /&gt;
To download the application click the download link below, with a 3.82 MB file size. hopefully useful and successful greeting ... &lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;http://www.ziddu.com/download/10438117/ImprovedDailyMotionDownloaderSetup.exe.html&quot;&gt;DOWNLOAD&lt;/a&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;subscribe to my newest articles here&lt;/div&gt;</description><link>http://halotechno.blogspot.com/2010/06/how-to-download-videos-from-any-site.html</link><author>noreply@blogger.com (Unknown)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgVWv68KTlKlDH-JRXMfI3Yqpnnz56Z35PYtOo8-IX_2hiFoNG0qZBAvKIi4a2lnYhsVbAhm1ZMvDgs4fehHTkWI6SsDje9xYibhuMYGh72fVgLxopTaNlQtD2IxGEXUJxysWcEaudOn7cc/s72-c/improveddailymotiondownloader.jpeg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2834877705017843849.post-6964714024955217673</guid><pubDate>Fri, 18 Jun 2010 10:51:00 +0000</pubDate><atom:updated>2010-06-18T03:53:12.876-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Gadget</category><category domain="http://www.blogger.com/atom/ns#">TipsTricks</category><title>5 Steps to Enable Video-Call Skype on N900</title><description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjifIUAYSE_Br2L9ekMwZFX-wSI09pzBnXfTBhvIdA5nj45W_xINC-Z12xL6w8KXKnQMIzTfe2sy5w0NEwOR0ocfOKCWQSizP3Om7IKDyPcpNPP33cWhBZPoPQ1po60aaSlp4JsEWcgqEg2/s1600/skype-N900.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;282&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjifIUAYSE_Br2L9ekMwZFX-wSI09pzBnXfTBhvIdA5nj45W_xINC-Z12xL6w8KXKnQMIzTfe2sy5w0NEwOR0ocfOKCWQSizP3Om7IKDyPcpNPP33cWhBZPoPQ1po60aaSlp4JsEWcgqEg2/s320/skype-N900.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&amp;nbsp;Latest firmware PR 1.2 Nokia N900 has attended a few moments ago. One function of this firmware is to enable a video call on Skype.&lt;br /&gt;
&lt;br /&gt;
As a result users can not only enjoy regular VoIP call service. Features video call can be made between devices Nokia N900 or N900 with a PC. Faithful Skype users of course mandatory menjajalnya.&lt;br /&gt;
Mode operation is quite easy. Users simply touch the camera button on the screen to activate the front camera N900, and complete.&lt;br /&gt;
Unfortunately the front camera not too light-sensitive N900. So the user must find enough light so that his face could be seen. When dijajal detikINET, light bright fluorescent office lights was not enough to make clear front camera N900.&lt;br /&gt;
Here are five easy steps to activate it:&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; * Enable Skype account on the N900. Go to Settings&amp;gt; VoIP and IM Accounts. Select &#39;New&#39; and &#39;Skype&#39;.&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; * The Skype account is ready, select Availability mode &#39;online&#39;.&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; * Go to the contact, and select one of our friends Skypenya account active. Make sure we enable Skype users friends latest version of Skype.&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; * Choose a Skype video-call.&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; * If we interact with users through N900 video call the other, he would be able to see us. We also can turn off the camera that appears, to hide our faces.&lt;br /&gt;
Welcome to video-call for free.&lt;div class=&quot;blogger-post-footer&quot;&gt;subscribe to my newest articles here&lt;/div&gt;</description><link>http://halotechno.blogspot.com/2010/06/5-steps-to-enable-video-call-skype-on.html</link><author>noreply@blogger.com (Unknown)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjifIUAYSE_Br2L9ekMwZFX-wSI09pzBnXfTBhvIdA5nj45W_xINC-Z12xL6w8KXKnQMIzTfe2sy5w0NEwOR0ocfOKCWQSizP3Om7IKDyPcpNPP33cWhBZPoPQ1po60aaSlp4JsEWcgqEg2/s72-c/skype-N900.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2834877705017843849.post-5940922181554226560</guid><pubDate>Thu, 27 May 2010 10:55:00 +0000</pubDate><atom:updated>2010-05-27T03:55:13.354-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">TipsTricks</category><title>8 Tips Using Nokia Ovi Store</title><description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhzIEyTrRLqva655BKqSeTgPHseyQHh3J6AGvuSRQJ99A6-GivXYrecV8gSzIuFTJ9nL2SBEQhvPMwKPI5NmjbHgxlrwWQl8uA86DkIIN6PmYg27IA1CVQBzE8FNXviRIkVUmgcsiY_D7_T/s1600/nokia-ovi-store-.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;146&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhzIEyTrRLqva655BKqSeTgPHseyQHh3J6AGvuSRQJ99A6-GivXYrecV8gSzIuFTJ9nL2SBEQhvPMwKPI5NmjbHgxlrwWQl8uA86DkIIN6PmYg27IA1CVQBzE8FNXviRIkVUmgcsiY_D7_T/s200/nokia-ovi-store-.jpg&quot; width=&quot;200&quot; /&gt;&lt;/a&gt;&lt;/div&gt;As we know, the Nokia Ovi Store became one of the best service owned by Nokia. Service is designed so that users do not switch to another phone. Ovi Store is basically created to unify all of the content to Nokia.&lt;br /&gt;
&lt;br /&gt;
According to official information received by Nokia the following are some tips related to the use of Ovi Store:&lt;br /&gt;
&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
1. Access https: / / store.ovi.com from your Nokia Device Browser&lt;br /&gt;
2. If you have, you can see some different menu view as: Recomended, Applications, Games, Audio &amp;amp; Video, And Personalisation&lt;br /&gt;
3. Each menu has a search field to help find the desired word. Suppose you want to look for social networking applications go to the menu &#39;Application&#39; and type &#39;Social networks&#39;.&lt;br /&gt;
4. To download an application, first select your nokia device type, and select &#39;Download&#39;. After that the application can begin to be installed (eg: select folder &#39;Installations&#39; on Nokia E71).&lt;br /&gt;
5. You can also give a brief review, related to the selected application on Ovi site store.&lt;br /&gt;
6. To get content from a different menu, select &#39;back&#39; up to the main menu.&lt;br /&gt;
7. To download the game for example, you simply just select the tab &#39;Games&#39;.&lt;br /&gt;
8. To buy an item, simply select the &#39;buy&#39; and input the Nokia anda.Jika not have an account, you can immediately apply. Payment can be made with credit cards globally.&amp;nbsp;&lt;span id=&quot;fullpost&quot;&gt; &lt;/span&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;subscribe to my newest articles here&lt;/div&gt;</description><link>http://halotechno.blogspot.com/2010/05/8-tips-using-nokia-ovi-store.html</link><author>noreply@blogger.com (Unknown)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhzIEyTrRLqva655BKqSeTgPHseyQHh3J6AGvuSRQJ99A6-GivXYrecV8gSzIuFTJ9nL2SBEQhvPMwKPI5NmjbHgxlrwWQl8uA86DkIIN6PmYg27IA1CVQBzE8FNXviRIkVUmgcsiY_D7_T/s72-c/nokia-ovi-store-.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2834877705017843849.post-6207903149683202954</guid><pubDate>Tue, 25 May 2010 10:31:00 +0000</pubDate><atom:updated>2010-05-25T03:31:38.335-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">TipsTricks</category><category domain="http://www.blogger.com/atom/ns#">Virus</category><title>Avoiding Viruses URL Shortening</title><description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEimHO3g3HvwtK0MrtrT09UA206DFzOqG8hX2JOp4rpMRRti0ImaDjGcTXqHv4oXxKgLjq0kgfqEwWCGZkmMlKuAFDJp-3b5Shl14ZPsnZbOggjxIQ9QOwbUrSNeJQPewtJUfDzXElbj4UnF/s1600/url-shortening.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;194&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEimHO3g3HvwtK0MrtrT09UA206DFzOqG8hX2JOp4rpMRRti0ImaDjGcTXqHv4oXxKgLjq0kgfqEwWCGZkmMlKuAFDJp-3b5Shl14ZPsnZbOggjxIQ9QOwbUrSNeJQPewtJUfDzXElbj4UnF/s200/url-shortening.jpg&quot; width=&quot;200&quot; /&gt;&lt;/a&gt;&lt;/div&gt;Despite the misleading applications currently offered in similar fashion, we&#39;ll see more variation in the future.&lt;br /&gt;
&lt;br /&gt;
Here are tips provided by Symantec to increase your vigilance in order not to get trapped by bervirus links, especially with the format of the usual URL-Shortening in Twitter:&lt;br /&gt;
&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;br /&gt;
1. Be careful what you click.&lt;br /&gt;
Avoid clicking on the URL that was posted by Twitter user unknown&lt;br /&gt;
&lt;br /&gt;
2. Use safe online habits.&lt;br /&gt;
Do not accept or open an error dialog from within a Web browser and keep the software and security patches up to date.&lt;br /&gt;
&lt;br /&gt;
3. Buy software from trusted sources.&lt;br /&gt;
Beware of ads that promote the security or performance tools that look a lot like the system alerts the Microsoft Windows standard.&lt;br /&gt;
&lt;br /&gt;
4. Apply protection.&lt;br /&gt;
Fill yourself with strong security software and updated to capture and prevent the downloading of malware.&lt;br /&gt;
&lt;br /&gt;
For more safe, it is recommended that you install Norton 2010 products proactively to protect your computer from spyware, viruses, worms, hackers, botnets or other security risks so that you can banish the digital dangers with advanced protection.&lt;span id=&quot;fullpost&quot;&gt; &lt;/span&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;subscribe to my newest articles here&lt;/div&gt;</description><link>http://halotechno.blogspot.com/2010/05/avoiding-viruses-url-shortening.html</link><author>noreply@blogger.com (Unknown)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEimHO3g3HvwtK0MrtrT09UA206DFzOqG8hX2JOp4rpMRRti0ImaDjGcTXqHv4oXxKgLjq0kgfqEwWCGZkmMlKuAFDJp-3b5Shl14ZPsnZbOggjxIQ9QOwbUrSNeJQPewtJUfDzXElbj4UnF/s72-c/url-shortening.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2834877705017843849.post-5243987477411638915</guid><pubDate>Fri, 07 May 2010 06:52:00 +0000</pubDate><atom:updated>2010-05-06T23:52:10.118-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">TipsTricks</category><title>Knowing the IP Address Email Sender</title><description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhiWqbWuOHsmpsGRrav57lU1EbIcRHUqOaTFua5X9s_VngUDz12Bd-7to1wzMcVpof7fSgAMFqedvRMC7fl5P5DSmv2EkMCvuAYlK5IM_USrnW5iH3d8nOU3GOhxugQ5ddGIYSbfAru7bcl/s1600/ip-address.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhiWqbWuOHsmpsGRrav57lU1EbIcRHUqOaTFua5X9s_VngUDz12Bd-7to1wzMcVpof7fSgAMFqedvRMC7fl5P5DSmv2EkMCvuAYlK5IM_USrnW5iH3d8nOU3GOhxugQ5ddGIYSbfAru7bcl/s1600/ip-address.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;When you read an email may be visible only date information, to, cc, bcc, subject and message. Yet every email sent must include the complete information such as message id, mailer, ip addresses, and so forth.&lt;br /&gt;
&lt;br /&gt;
If you want to know the ip address of email sender and the ISP that you used to read the following tips.&lt;br /&gt;
&lt;br /&gt;
Yahoo Mail:&lt;br /&gt;
&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp;&amp;nbsp; 1. Login to Yahoo Mail.&lt;br /&gt;
&amp;nbsp;&amp;nbsp; 2. Choose one that you want to check email.&lt;br /&gt;
&amp;nbsp;&amp;nbsp; 3. Click on the menu or Full Header link located at bottom right.&lt;br /&gt;
&amp;nbsp;&amp;nbsp; 4. Locate the &quot;Received: from [...] by&quot;.&lt;br /&gt;
&amp;nbsp;&amp;nbsp; 5. In the example below is the IP address 61.94.152.147.&lt;br /&gt;
&lt;br /&gt;
MS Outlook Express:&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp;&amp;nbsp; 1. Open the Outlook Express program.&lt;br /&gt;
&amp;nbsp;&amp;nbsp; 2. Right click on one of the emails that you want to check.&lt;br /&gt;
&amp;nbsp;&amp;nbsp; 3. Click the Properties menu.&lt;br /&gt;
&amp;nbsp;&amp;nbsp; 4. Click the Details tab.&lt;br /&gt;
&lt;br /&gt;
If you already get the ip address information then you can check the ISP that is used along with the city. You can read the INFO next time.&lt;span id=&quot;fullpost&quot;&gt; &lt;/span&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;subscribe to my newest articles here&lt;/div&gt;</description><link>http://halotechno.blogspot.com/2010/05/knowing-ip-address-email-sender.html</link><author>noreply@blogger.com (Unknown)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhiWqbWuOHsmpsGRrav57lU1EbIcRHUqOaTFua5X9s_VngUDz12Bd-7to1wzMcVpof7fSgAMFqedvRMC7fl5P5DSmv2EkMCvuAYlK5IM_USrnW5iH3d8nOU3GOhxugQ5ddGIYSbfAru7bcl/s72-c/ip-address.jpg" height="72" width="72"/><thr:total>1</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2834877705017843849.post-2225388364890020921</guid><pubDate>Wed, 05 May 2010 21:47:00 +0000</pubDate><atom:updated>2010-05-05T14:47:01.660-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Internet</category><category domain="http://www.blogger.com/atom/ns#">TipsTricks</category><title>Prevent Data Theft with Clear History</title><description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjcGOT_dyE3q5LeFEDSOOCVXqSkMp9yPD-JQERcpsV_nap2T6J2UCsabopFcHM9pMAPFSFeAN0Oy_DCXah8rOxH1YyMd1U2ZGSoDJIEp-74dz3RwVc-HxWojc8M2_q_mp3XXeu5jel0Oxv9/s1600/delete-history.png&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;320&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjcGOT_dyE3q5LeFEDSOOCVXqSkMp9yPD-JQERcpsV_nap2T6J2UCsabopFcHM9pMAPFSFeAN0Oy_DCXah8rOxH1YyMd1U2ZGSoDJIEp-74dz3RwVc-HxWojc8M2_q_mp3XXeu5jel0Oxv9/s320/delete-history.png&quot; width=&quot;250&quot; /&gt;&lt;/a&gt;&lt;/div&gt;Theft of data or personal information via computer and the Internet nowadays has become a business itself. Many people who seek our personal data is sometimes highly confidential nature to their advantage with a variety of purposes. But at least, we can slightly reduce the chances with one easy step that sometimes we often miss. Especially if we use ordinary computers are often used together with other people.&lt;br /&gt;
&lt;br /&gt;
The simplest way to protect our personal data is to delete the stored password in the browser and record our impressions when browsing the Internet.&lt;br /&gt;
&lt;br /&gt;
If you use Internet Explorer 7 browser, the way it is:&lt;br /&gt;
- Click Tools&amp;gt; Internet Options&lt;br /&gt;
- On the General tab on the menu that appears, click on the Delete Browsing history&lt;br /&gt;
- To clear all passwords once you type when logging into certain websites, or once you input the data into the form on a website for example, just click on each button there. Or if you want to remove the traces of your past, simply press the Delete all.&lt;br /&gt;
&lt;br /&gt;
If Firefox is your browser, your way is like this:&lt;br /&gt;
&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;br /&gt;
- Click on the Tools&amp;gt; Options then Privacy icon&lt;br /&gt;
- In addition to the Saved Passwords option, click the Clear button and then OK. After that all passwords are stored by the browser will be deleted.&lt;br /&gt;
&lt;br /&gt;
Remove traces of your browsing OperaKalau use Opera 9.6 browser way is:&lt;br /&gt;
- Click Tools&amp;gt; Delete Private Data&lt;br /&gt;
- On the menu that appears, click Delete. Or if you want to be more specific in your browser to delete the recording, click Detailed Options. After that put the check in the box whatever you want to delete. If you are, click Delete.&lt;br /&gt;
&lt;br /&gt;
Storing personal data is sometimes very useful when you often visit your favorite sites that require you enter your user ID and passoword. When you fill out the registration form on the site, or forums for example, if you ever fill out similar forms on other sites you will be ameliorated by the features of the browser. But this is also the problem. If the computer use is other people, troublesome business.&lt;span id=&quot;fullpost&quot;&gt;&lt;/span&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;subscribe to my newest articles here&lt;/div&gt;</description><link>http://halotechno.blogspot.com/2010/05/prevent-data-theft-with-clear-history.html</link><author>noreply@blogger.com (Unknown)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjcGOT_dyE3q5LeFEDSOOCVXqSkMp9yPD-JQERcpsV_nap2T6J2UCsabopFcHM9pMAPFSFeAN0Oy_DCXah8rOxH1YyMd1U2ZGSoDJIEp-74dz3RwVc-HxWojc8M2_q_mp3XXeu5jel0Oxv9/s72-c/delete-history.png" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2834877705017843849.post-1492403024416141272</guid><pubDate>Mon, 19 Apr 2010 10:25:00 +0000</pubDate><atom:updated>2010-04-19T03:25:14.866-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">TipsTricks</category><title>Disable Autorun on USB</title><description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj2crYh3YJVVPw3pz_qwX5okYIAQZf0KPNHdw6cI8og-8JBHwaNT9lXLj8bWltBcpLtbQRnMOiGQr7vk9wt9MPUoH1TZ0v6MWU1GWOgm3KNFcx7KdQq8bYCj_r-BNEPomf2Je60T81C0i0a/s1600/disable-auto-run--usb.png&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;320&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj2crYh3YJVVPw3pz_qwX5okYIAQZf0KPNHdw6cI8og-8JBHwaNT9lXLj8bWltBcpLtbQRnMOiGQr7vk9wt9MPUoH1TZ0v6MWU1GWOgm3KNFcx7KdQq8bYCj_r-BNEPomf2Je60T81C0i0a/s320/disable-auto-run--usb.png&quot; width=&quot;287&quot; /&gt;&lt;/a&gt;&lt;/div&gt;In a flash disc exposed to the virus usually (not always) there autorun.info file in which there is the command to run the virus program. Now, when the flash disc is inserted into the USB drive autorun feature was not in it will automatically disable the Windows will run the program in the background without a confirmation to the user.&lt;br /&gt;
&lt;br /&gt;
One way to reduce the risk of contracting the virus is to disable the autorun feature on the USB drive. There is no way is as follows:&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
Disable Auto Run on USB Drive&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp;&amp;nbsp; 1. Click the Start button - Run.&lt;br /&gt;
&amp;nbsp;&amp;nbsp; 2. Type gpedit.msc and press OK.&lt;br /&gt;
&amp;nbsp;&amp;nbsp; 3. Click on User Configuration - Administrative Templates - System.&lt;br /&gt;
&amp;nbsp;&amp;nbsp; 4. 2x click on Turn Off Autoplay.&lt;br /&gt;
&amp;nbsp;&amp;nbsp; 5. Click on the Enable option.&lt;br /&gt;
&amp;nbsp;&amp;nbsp; 6. At the option Turn off Autoplay on, select All drives.&lt;br /&gt;
&amp;nbsp;&amp;nbsp; 7. Click OK.&lt;br /&gt;
&amp;nbsp;&amp;nbsp; 8. Done.&lt;br /&gt;
&lt;br /&gt;
Note: gpedit.msc is only available in Windows XP Professional.&lt;div class=&quot;blogger-post-footer&quot;&gt;subscribe to my newest articles here&lt;/div&gt;</description><link>http://halotechno.blogspot.com/2010/04/disable-autorun-on-usb.html</link><author>noreply@blogger.com (Unknown)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj2crYh3YJVVPw3pz_qwX5okYIAQZf0KPNHdw6cI8og-8JBHwaNT9lXLj8bWltBcpLtbQRnMOiGQr7vk9wt9MPUoH1TZ0v6MWU1GWOgm3KNFcx7KdQq8bYCj_r-BNEPomf2Je60T81C0i0a/s72-c/disable-auto-run--usb.png" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2834877705017843849.post-3017852525389950417</guid><pubDate>Fri, 16 Apr 2010 12:39:00 +0000</pubDate><atom:updated>2010-04-16T05:41:24.537-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">TipsTricks</category><title>Adding Thumbnails In Google Search Results</title><description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjwlHCrRqq9355E5fH6UFnDHEv3DE0SFatwXFtC-rU3aSvNhR8jSYMQFJX3qvduML_GaplMudoC8HwFuiKH9lfEHrZE3-gAXMLpbUC12HVhyphenhyphen0ZjjetUfE6RcN4eignxhZepSdRZ9k1zo05e/s1600/google%20thumbnail.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;309&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjwlHCrRqq9355E5fH6UFnDHEv3DE0SFatwXFtC-rU3aSvNhR8jSYMQFJX3qvduML_GaplMudoC8HwFuiKH9lfEHrZE3-gAXMLpbUC12HVhyphenhyphen0ZjjetUfE6RcN4eignxhZepSdRZ9k1zo05e/s320/google%20thumbnail.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;/div&gt;&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;/div&gt;When you do a search with Google or Yahooo then in the search results page will display links that match the keywords you type.&lt;br /&gt;
&lt;br /&gt;
By using the firefox addons named SearchPreview (or formerly known GooglePreview) You can add a thumbnail or small screenshoot search results from web interface.&lt;br /&gt;
&lt;br /&gt;
With the existence of these thumbnails will be little help to you if this link is quite interesting search results or not to visit.&lt;br /&gt;
&lt;br /&gt;
If you&#39;re interested, you can download and install SearchPreview from &lt;a href=&quot;https://addons.mozilla.org/en-US/firefox/addon/189&quot;&gt;this page&lt;/a&gt;.&lt;div class=&quot;blogger-post-footer&quot;&gt;subscribe to my newest articles here&lt;/div&gt;</description><link>http://halotechno.blogspot.com/2010/04/adding-thumbnails-in-google-search.html</link><author>noreply@blogger.com (Unknown)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjwlHCrRqq9355E5fH6UFnDHEv3DE0SFatwXFtC-rU3aSvNhR8jSYMQFJX3qvduML_GaplMudoC8HwFuiKH9lfEHrZE3-gAXMLpbUC12HVhyphenhyphen0ZjjetUfE6RcN4eignxhZepSdRZ9k1zo05e/s72-c/google%20thumbnail.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2834877705017843849.post-7611940918067960748</guid><pubDate>Fri, 16 Apr 2010 11:53:00 +0000</pubDate><atom:updated>2010-04-16T04:53:27.314-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">TipsTricks</category><title>Solving Problems in the BlackBerry Attachment</title><description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgOtMDH7d36pNuMvxjLZhlOn0oY0iROq1FtaTTIRCa0eHS1xPPrU80Zwd1qMsuD30-Hktl-U6Fq1zud_VxL6lXQP1loTJ1P2JLtnnB9TMtxA9HDAxgu8OSoV1_BrP2UezAbORsKat1PeGcl/s1600/BlackBerry+attachment.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgOtMDH7d36pNuMvxjLZhlOn0oY0iROq1FtaTTIRCa0eHS1xPPrU80Zwd1qMsuD30-Hktl-U6Fq1zud_VxL6lXQP1loTJ1P2JLtnnB9TMtxA9HDAxgu8OSoV1_BrP2UezAbORsKat1PeGcl/s1600/BlackBerry+attachment.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;Most users choose the BlackBerry because of its features valued support their daily activities. One of the most important is e-mail service, especially for the consumer business or mobile workers. However, some users are often frustrated when they can not open the attachment (attachment) on crucial e-mail he received.&lt;br /&gt;
&lt;br /&gt;
This problem could have happened to environmentally BlackBerry Desktop Manager, BlackBerry Device Software 4.0, the BlackBerry Internet Service 2.0, the number of BlackBerry smart phones. RIM Parties, through the BlackBerry Technical Solution Center, annunciate there are three things that cause these problems arise.&lt;br /&gt;
&lt;br /&gt;
Quoted from the official website VIVAnews BlackBerry, Thursday, January 29, 2009, the following points should be offered the resolution are as follows:&lt;br /&gt;
&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;1. BlackBerry attachment service is not installed on your BB.&lt;br /&gt;
Solution:&lt;br /&gt;
- Connect your BB to your computer.&lt;br /&gt;
- In the BlackBerry Desktop Manager, double-click Application Loader.&lt;br /&gt;
- Click Next.&lt;br /&gt;
- If asked for password, type the password you BB.&lt;br /&gt;
- Device Application Selection screen appears.&lt;br /&gt;
- Make sure you have selected the BlackBerry Attachment Service options.&lt;br /&gt;
- Click Next.&lt;br /&gt;
- Click Finish.&lt;br /&gt;
&lt;br /&gt;
2. Wireless service providers limit you to open an attachment on the BlackBerry Internet Service.&lt;br /&gt;
Solution:&lt;br /&gt;
- Contact telecom operators that provide wireless services on your BlackBerry.&lt;br /&gt;
&lt;br /&gt;
3. BlackBerry Desktop Manager If you have configured to use the BlackBerry Desktop Redirector, your smart phone will not be possible to view attachments on e-mail. BlackBerry Desktop Redirector is not designed to view e-mail attachments.&lt;br /&gt;
Solution:&lt;br /&gt;
- Uninstall the BlackBerry Desktop Manager first.&lt;br /&gt;
- Install the BlackBerry Desktop Manager again and select the BlackBerry Internet Service.&lt;br /&gt;
- Remove Desktop [CMIME] and Desktop [CICAL] from a book service (service books) on your BlackBerry.&lt;div class=&quot;blogger-post-footer&quot;&gt;subscribe to my newest articles here&lt;/div&gt;</description><link>http://halotechno.blogspot.com/2010/04/solving-problems-in-blackberry.html</link><author>noreply@blogger.com (Unknown)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgOtMDH7d36pNuMvxjLZhlOn0oY0iROq1FtaTTIRCa0eHS1xPPrU80Zwd1qMsuD30-Hktl-U6Fq1zud_VxL6lXQP1loTJ1P2JLtnnB9TMtxA9HDAxgu8OSoV1_BrP2UezAbORsKat1PeGcl/s72-c/BlackBerry+attachment.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2834877705017843849.post-904202406475214591</guid><pubDate>Mon, 12 Apr 2010 07:01:00 +0000</pubDate><atom:updated>2010-04-12T00:03:31.229-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">News</category><category domain="http://www.blogger.com/atom/ns#">TipsTricks</category><title>Change Phenom II X2 to X4 with One Button</title><description>&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhHHYSzHtqoyb-pU_y-dERpQSOUBhb_IgavnuJ8IpOFdBO0iwfjk2AjTp6j8XXbXiWZelt57J9XstkSmMvqIH51hVSje9tfd6pM0QEJU5ne5Ca1UcmTNV_G79BydyYhstR3bWg4pIHS5vT1/s1600/biounlocking.jpg&quot;&gt;&lt;img style=&quot;float:left; margin:0 10px 10px 0;cursor:pointer; cursor:hand;width: 200px; height: 95px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhHHYSzHtqoyb-pU_y-dERpQSOUBhb_IgavnuJ8IpOFdBO0iwfjk2AjTp6j8XXbXiWZelt57J9XstkSmMvqIH51hVSje9tfd6pM0QEJU5ne5Ca1UcmTNV_G79BydyYhstR3bWg4pIHS5vT1/s200/biounlocking.jpg&quot; border=&quot;0&quot; alt=&quot;&quot;id=&quot;BLOGGER_PHOTO_ID_5459142969421190338&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;Biostar Microtech Int&#39;l Corp., Launch a brand new motherboard with the brand name BIO-unlocking. This technology supports the ACC function berchipset AMD on the AMD 890GX motherboard made in recent Taiwanese manufacturers, the TA890GXE v5.2.&lt;br /&gt;BIO-unlocking this technology will also be compatible with the motherboard berchipset 890FX, 880G, and 870 series TA890FXE example, TA890GXB HD, HD TA880GB, TA880G HD, and TA870.&lt;br /&gt;Biostar mentioned, according to AMD&#39;s official announcement some time ago, namely AMD&#39;s new SB850 southbridge itself does not support the function of ACC. But Biostar research team successfully re-activate these functions and present it to the public.With BIO-unlocking designed to activate the ACC function on AMD processor, the user can unlock the extra cores on AMD processors. Thus, users will be able to enjoy higher performance without spending any additional fees.&lt;br /&gt;&lt;span id=&quot;fullpost&quot;&gt;&lt;br /&gt;For ease, users who did not understand the BIOS settings, can activate a third core or four cores on AMD X2 processor with a single button.&lt;br /&gt;When a new computer is turned on and the POST menu, users stay on the keyboard pressed the F3 key to make their X2 processors become &quot;X3&quot; or the F4 key to make the processor X2 or X3 processors they become &quot;X4&quot;.&lt;br /&gt;As is known, AMD sell their processors as Phenom or Athlon X2 or X3 if they find imperfections in one or two processor cores are true they consist of four units.&lt;br /&gt;To facilitate the users whether they have processor cores that can be switched off by AMD, Biostar logo displays CPU Level up if BIO-unlocking the core managed switch. Because, not all of X2 or X3 processors can be activated core AMD suspected of containing the problem.&lt;br /&gt;However, Biostar guarantee that BIO-technology capable of unlocking their present performance of the system is stable and smooth.&lt;/span&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;subscribe to my newest articles here&lt;/div&gt;</description><link>http://halotechno.blogspot.com/2010/04/change-phenom-ii-x2-to-x4-with-one_12.html</link><author>noreply@blogger.com (Unknown)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhHHYSzHtqoyb-pU_y-dERpQSOUBhb_IgavnuJ8IpOFdBO0iwfjk2AjTp6j8XXbXiWZelt57J9XstkSmMvqIH51hVSje9tfd6pM0QEJU5ne5Ca1UcmTNV_G79BydyYhstR3bWg4pIHS5vT1/s72-c/biounlocking.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2834877705017843849.post-5793298358167810294</guid><pubDate>Wed, 07 Apr 2010 06:59:00 +0000</pubDate><atom:updated>2010-04-06T23:59:31.731-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Virus</category><title>Computer Virus &quot;Life is Beautiful&quot; Threatening</title><description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi0Q0o5XcQXfWgA-IOePoqsEcl4MyCK0mNwrHq4WsN28_M8XVg6mpFwuYxWqpZy10HrX_BQsXBOicl3Ihds2cWWoVecRkL3wNN2pyikyve1SsdxOcSsW56zQvYrPG_7w85T8YqU1q3WAXEt/s1600-h/virus.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;186&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi0Q0o5XcQXfWgA-IOePoqsEcl4MyCK0mNwrHq4WsN28_M8XVg6mpFwuYxWqpZy10HrX_BQsXBOicl3Ihds2cWWoVecRkL3wNN2pyikyve1SsdxOcSsW56zQvYrPG_7w85T8YqU1q3WAXEt/s200/virus.jpg&quot; width=&quot;200&quot; /&gt;&lt;/a&gt;&lt;/div&gt;Software company, Microsoft and Norton, Tuesday (23/3/2010), informing the intrusion of new virus threats via electronic mail (e-mail) that damage the user&#39;s computer data internet services, like Yahoo, Hotmail, and AOL (American OnLine) .&lt;br /&gt;
The virus entered the electronic mail in the form of a program with a Power Point presentation &quot;Life is Beautiful&quot;. If you have received, immediately delete the file. Because if they are opened, will display a message on your computer screen the words: &quot;it is too late now, your life is no longer beautiful ....&quot; (Too late now, your life is not beautiful anymore).&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;As a result, you will lose all data on your computer. Not only that, people who send a &quot;virus&quot; that will also get access to your name, e-mail, and your password. AOL has been confirmed, while the antivirus software was not able to destroy the existing &quot;Life is Beautiful&quot;. This virus was created by a hacker who calls himself &quot;Life Owner&quot;.&lt;div class=&quot;blogger-post-footer&quot;&gt;subscribe to my newest articles here&lt;/div&gt;</description><link>http://halotechno.blogspot.com/2010/04/computer-virus-life-is-beautiful.html</link><author>noreply@blogger.com (Unknown)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi0Q0o5XcQXfWgA-IOePoqsEcl4MyCK0mNwrHq4WsN28_M8XVg6mpFwuYxWqpZy10HrX_BQsXBOicl3Ihds2cWWoVecRkL3wNN2pyikyve1SsdxOcSsW56zQvYrPG_7w85T8YqU1q3WAXEt/s72-c/virus.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2834877705017843849.post-5872581847886731</guid><pubDate>Tue, 06 Apr 2010 15:18:00 +0000</pubDate><atom:updated>2010-04-07T00:00:02.607-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">TipsTricks</category><title>Safety Tips Downloading the Cyber World</title><description>&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjCS7CxlCrrwTafc1ElkdmgIunMh725Dh4QSsfFY4qwYibc1MUdLdOgbF0_SKX5qwdxV_t00exRX2o5C4sk6TTPP6sWUGQDeYzQDNmH38wQ24K-u5dnHO0VV-dUYSDr8erwMeJYY0o-6zWr/s1600/download.jpg&quot; onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot;&gt;&lt;img alt=&quot;&quot; border=&quot;0&quot; id=&quot;BLOGGER_PHOTO_ID_5457044662760065250&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjCS7CxlCrrwTafc1ElkdmgIunMh725Dh4QSsfFY4qwYibc1MUdLdOgbF0_SKX5qwdxV_t00exRX2o5C4sk6TTPP6sWUGQDeYzQDNmH38wQ24K-u5dnHO0VV-dUYSDr8erwMeJYY0o-6zWr/s200/download.jpg&quot; style=&quot;cursor: pointer; float: left; height: 192px; margin: 0pt 10px 10px 0pt; width: 200px;&quot; /&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
When the download, of course we are in a state connected to the Internet. Means open the possibility to receive the various problems that arise on the Internet. Both infected with viruses or spam, to use the copyright issues on the internet.&lt;br /&gt;
According to Wikipedia, of all the viruses that circulated in duniaa, mostly intended to attack a Windows-based operating system, even GNU / Linux.&lt;br /&gt;
Nearly 95 percent of the virus is a computer virus bebasis Windows, the remaining two percent against linux with kernel version below 1.4 (and Unix, as the source of Linux, of course). One per cent of attacking Mac OS 9, Mac OS X (tiger, leopard). While attacking the remaining two percent of other operating systems like FreeBSD, OS / 2 operating system, IBM and Sun.&lt;br /&gt;
Here are some tips for a secure way to download on the internet:&lt;br /&gt;
&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
1. To prevent the problem of the use of copyright in cyberspace, it is better if you use the programs open cource (freeware) spread quite a lot on the internet. Terminology, if one is free for what we have to infringe the copyright works of others. So, use programs that have been deliberately distributed free by the manufacturer.&lt;br /&gt;
2. But if you really need a program that is shareware, see to be able to buy a license legally.&lt;br /&gt;
3. To prevent the presence of viruses, spyware, malware and so on, it is suggested that you be more careful in selecting files to be downloaded extension, especially extension file.exe.&lt;br /&gt;
Normally on windows, extension exe files from the virus is like any ordinary program. Because the virus in nature ex-ecutable (. Exe). The goal of course to run a virus embedded in the. Exe file without the knowledge of its users.&lt;br /&gt;
4. If you get files from official website of the risk of transmission of a computer small enough.&lt;br /&gt;
5. If you do not get the file from the official website it is recommended that you select the files with extensions such as ZIP or RAR compression. These files are compressed files that have been more alert to the security file. Besides the small size of the file that will certainly make the download process becomes faster.&lt;br /&gt;
6. The most powerful way to prevent the virus into your computer when downloading is to install an antivirus program.&lt;div class=&quot;blogger-post-footer&quot;&gt;subscribe to my newest articles here&lt;/div&gt;</description><link>http://halotechno.blogspot.com/2010/04/safety-tips-downloading-cyber-world.html</link><author>noreply@blogger.com (Unknown)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjCS7CxlCrrwTafc1ElkdmgIunMh725Dh4QSsfFY4qwYibc1MUdLdOgbF0_SKX5qwdxV_t00exRX2o5C4sk6TTPP6sWUGQDeYzQDNmH38wQ24K-u5dnHO0VV-dUYSDr8erwMeJYY0o-6zWr/s72-c/download.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2834877705017843849.post-5213057361312665155</guid><pubDate>Mon, 29 Mar 2010 10:31:00 +0000</pubDate><atom:updated>2010-03-30T15:06:36.688-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">TipsTricks</category><category domain="http://www.blogger.com/atom/ns#">Windows</category><title>Tips Making  XP be Licensed</title><description>&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgcyhih3bkALGJ_c_7N0h59M4Nb7yr5MXvoP_xyOS9dRaUfmu7Fbo4vZpfuZip9ow_yZ6IV96gp3qFzV1APryPU99frwrIQIBt5tTyYJYRggnn_9BwIGKKB8AVEth_TFI6YIj3-hQzjSyBB/s1600/xp.jpeg&quot;&gt;&lt;img style=&quot;margin: 0pt 10px 10px 0pt; float: left; cursor: pointer; width: 127px; height: 89px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgcyhih3bkALGJ_c_7N0h59M4Nb7yr5MXvoP_xyOS9dRaUfmu7Fbo4vZpfuZip9ow_yZ6IV96gp3qFzV1APryPU99frwrIQIBt5tTyYJYRggnn_9BwIGKKB8AVEth_TFI6YIj3-hQzjSyBB/s200/xp.jpeg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5454551726974091474&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;This tutorial seems to be beneficial to the insurer or computerized Answer corporate IT / IT Manager / IT Systems Administrator, as well as co-Warnet, Schools, Colleges and others who intend to legalize the OS was Windows XP.&lt;br /&gt;This guide is intentionally designed to legalize the Windows XP operating system proportionally, rather than piracy. So this guide is to make OS Wndows XP on a number of our PCs before using the Installer from a variety of versions and should be legalized or make it legal in accordance with Volume License Key (VLK) owned.&lt;br /&gt;So to use this stage to legalize OS Windows XP, need VLK licensing official who also purchased legally. However, this can be done in the context of cracking or use the serial number (SN) VLK circulating on the Internet.&lt;br /&gt;Therefore, here are some steps that must be lived to legalize your Windows XP operating system:&lt;br /&gt;1. Open the link and download the Microsoft Genuine Windows Genuine Advantage Tool.&lt;br /&gt;2. Run application legitcheck.hta we have downloaded it.&lt;br /&gt;3. After installation is complete, if your PC was detected as the OS is not genuine, aka pirated, proceed to the next stage.&lt;br /&gt;4. Furthermore, we can use the Tools for Windows XP Menganti SN SN VLK us with our already using Key Finder Tool, KeyReader, XP Key Reader, OOBE registry settings manually, and others. Here or here&lt;br /&gt;5. We can check the results of SN VLK pengantian what if it was successful or not using the Microsoft Genuine Advantage Diagnostic Tool can be downloaded here&lt;br /&gt;6. After the check with&#39;ve looked GENUINE MGADT we continue to run the tool again and the result ... LEGITCHECK.HTA OS Windows XP we have Valid.&lt;div class=&quot;blogger-post-footer&quot;&gt;subscribe to my newest articles here&lt;/div&gt;</description><link>http://halotechno.blogspot.com/2010/03/tips-making-xp-be-licensed.html</link><author>noreply@blogger.com (Unknown)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgcyhih3bkALGJ_c_7N0h59M4Nb7yr5MXvoP_xyOS9dRaUfmu7Fbo4vZpfuZip9ow_yZ6IV96gp3qFzV1APryPU99frwrIQIBt5tTyYJYRggnn_9BwIGKKB8AVEth_TFI6YIj3-hQzjSyBB/s72-c/xp.jpeg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2834877705017843849.post-6786526726595729099</guid><pubDate>Fri, 26 Mar 2010 12:39:00 +0000</pubDate><atom:updated>2010-03-30T01:07:25.500-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">TipsTricks</category><title>10 safety tips on Twitter</title><description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjjFC5ikeAqAlSWhNYu0EwDXs79vA_QADTbpvD94J3UPwYkSspA91OUgWa_8iwK5syu9YaIP5cxLzYEhpnbk73rC9xS9VBAr-e4qI19tZ-sj4x87vWIsgfqBZxJRLQ2D1hx6xTfUgDCycCZ/s1600-h/twitter.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;177&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjjFC5ikeAqAlSWhNYu0EwDXs79vA_QADTbpvD94J3UPwYkSspA91OUgWa_8iwK5syu9YaIP5cxLzYEhpnbk73rC9xS9VBAr-e4qI19tZ-sj4x87vWIsgfqBZxJRLQ2D1hx6xTfUgDCycCZ/s200/twitter.jpg&quot; width=&quot;200&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;span class=&quot;long_text&quot; id=&quot;result_box&quot;&gt;&lt;span onmouseout=&quot;this.style.backgroundColor=&#39;#fff&#39;&quot; onmouseover=&quot;this.style.backgroundColor=&#39;#ebeff9&#39;&quot; style=&quot;background-color: white;&quot; title=&quot;ReadWriteWeb.com 
melaporkan di awal tahun 
ini menunjukkan bahwa Indonesia adalah negara pengguna Twitter nomor 
enam terbesar di dunia.&quot;&gt;ReadWriteWeb.com reported  earlier this year  showed that Indonesia is a Twitter user state sixth  largest in the  world. &lt;/span&gt;&lt;span onmouseout=&quot;this.style.backgroundColor=&#39;#fff&#39;&quot; onmouseover=&quot;this.style.backgroundColor=&#39;#ebeff9&#39;&quot; style=&quot;background-color: white;&quot; title=&quot;Di
 sisi lain, pesatnya perkembangan Twitter di Tanah Air sendiri 
memperlebar pintu ancaman bagi para hacker (peretas) atau kriminal dalam
 bentuk apapun di dunia maya.&quot;&gt;On the other hand, rapid  growth of  Twitter in his own homeland threat widens the door for the  hacker  (hackers) or criminal in any form in cyberspace. &lt;br /&gt;
&lt;/span&gt;&lt;span onmouseout=&quot;this.style.backgroundColor=&#39;#fff&#39;&quot; onmouseover=&quot;this.style.backgroundColor=&#39;#ebeff9&#39;&quot; style=&quot;background-color: white;&quot; title=&quot;Salah satu ancaman yang biasa 
datang dari Twitter adalah ancaman 
phising, yaitu upaya mengelabui pengguna untuk masuk ke dalam situs 
berbahaya.&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;long_text&quot; id=&quot;result_box&quot;&gt;&lt;span onmouseout=&quot;this.style.backgroundColor=&#39;#fff&#39;&quot; onmouseover=&quot;this.style.backgroundColor=&#39;#ebeff9&#39;&quot; style=&quot;background-color: white;&quot; title=&quot;Salah satu ancaman 
yang biasa datang dari Twitter adalah ancaman 
phising, yaitu upaya mengelabui pengguna untuk masuk ke dalam situs 
berbahaya.&quot;&gt;One of the common threat  comes from Twitter is the threat  of phishing, which attempts to trick  users into dangerous sites. &lt;/span&gt;&lt;span onmouseout=&quot;this.style.backgroundColor=&#39;#fff&#39;&quot; onmouseover=&quot;this.style.backgroundColor=&#39;#ebeff9&#39;&quot; style=&quot;background-color: white;&quot; title=&quot;Situs phising 
bertujuan untuk memancing 
korban agar memberikan data-data yang terdapat pada sebuah halaman Web, 
termasuk password dan alamat-alamat email dalam daftar kontak.&quot;&gt;Phishing  site aims to  lure victims to provide the data contained on a Web page,  including  passwords and email addresses in your contacts list.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&amp;nbsp; &lt;span class=&quot;long_text&quot; id=&quot;result_box&quot;&gt;&lt;span onmouseout=&quot;this.style.backgroundColor=&#39;#fff&#39;&quot; onmouseover=&quot;this.style.backgroundColor=&#39;#ebeff9&#39;&quot; style=&quot;background-color: white;&quot; title=&quot;Situs phising bertujuan untuk 
memancing 
korban agar memberikan data-data yang terdapat pada sebuah halaman Web, 
termasuk password dan alamat-alamat email dalam daftar kontak.&quot;&gt; &lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;long_text&quot; id=&quot;result_box&quot;&gt;&lt;span onmouseout=&quot;this.style.backgroundColor=&#39;#fff&#39;&quot; onmouseover=&quot;this.style.backgroundColor=&#39;#ebeff9&#39;&quot; style=&quot;background-color: white;&quot; title=&quot;Selanjutnya, 
data-data itu disalahgunakan 
sebagai upaya mencari keuntungan para pelakunya (phisers).&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;long_text&quot; id=&quot;result_box&quot;&gt;&lt;span onmouseout=&quot;this.style.backgroundColor=&#39;#fff&#39;&quot; onmouseover=&quot;this.style.backgroundColor=&#39;#ebeff9&#39;&quot; style=&quot;background-color: white;&quot; title=&quot;Selanjutnya, 
data-data itu disalahgunakan 
sebagai upaya mencari keuntungan para pelakunya (phisers).&quot;&gt;Furthermore,  the data  were misused in an attempt to find the perpetrators profit  (phisers). &lt;/span&gt;&lt;span onmouseout=&quot;this.style.backgroundColor=&#39;#fff&#39;&quot; onmouseover=&quot;this.style.backgroundColor=&#39;#ebeff9&#39;&quot; style=&quot;background-color: white;&quot; title=&quot;Carding 
(penyalahgunaan kartu kredit) dan spam adalah beberapa contohnya.&quot;&gt;Carding  (misuse of credit  cards) and spam are a few examples. &lt;br /&gt;
&lt;/span&gt;&lt;span onmouseout=&quot;this.style.backgroundColor=&#39;#fff&#39;&quot; onmouseover=&quot;this.style.backgroundColor=&#39;#ebeff9&#39;&quot; style=&quot;background-color: white;&quot; title=&quot;Modus operandinya, 
pihak-pihak tidak bertanggung jawab itu 
berpura-pura menjadi teman Anda.&quot;&gt;Modus operandi, the  parties were  irresponsible to pretend to be your friend. &lt;/span&gt;&lt;span onmouseout=&quot;this.style.backgroundColor=&#39;#fff&#39;&quot; onmouseover=&quot;this.style.backgroundColor=&#39;#ebeff9&#39;&quot; style=&quot;background-color: white;&quot; title=&quot;Setelah mendapatkan
 password dari akun Anda, ia mengirimkan pesan-pesan pribadi (Direct 
Message) kepada follower Anda tersebut.&quot;&gt;After getting the  password  from your account, he sent a personal message (Direct Message)  to the  follower you are. &lt;br /&gt;
&lt;/span&gt;&lt;span onmouseout=&quot;this.style.backgroundColor=&#39;#fff&#39;&quot; onmouseover=&quot;this.style.backgroundColor=&#39;#ebeff9&#39;&quot; style=&quot;background-color: white;&quot; title=&quot;Biasanya, pesan 
tersebut sudah berisi link yang bila dibuka akan 
menggiring pengguna ke halaman Web situs phising.&quot;&gt;Usually, the message   already contains a link that when opened will lead users to a phishing   site&#39;s web pages. &lt;/span&gt;&lt;span onmouseout=&quot;this.style.backgroundColor=&#39;#fff&#39;&quot; onmouseover=&quot;this.style.backgroundColor=&#39;#ebeff9&#39;&quot; style=&quot;background-color: white;&quot; title=&quot;Hal ini sudah 
terjadi dengan skala yang cukup luas di 
Twitter bulan lalu.&quot;&gt;This is already happening  on a scale large enough  at Twitter last month. &lt;br /&gt;
&lt;/span&gt;&lt;span onmouseout=&quot;this.style.backgroundColor=&#39;#fff&#39;&quot; onmouseover=&quot;this.style.backgroundColor=&#39;#ebeff9&#39;&quot; style=&quot;background-color: white;&quot; title=&quot;&amp;quot;Hanya dalam 
waktu empat tahun, popularitas Twitter 
meningkat pesat di seluruh dunia. Peningkatan ini menjadikan Twitter 
sebagai sasaran empuk para penjahat dunia maya,&amp;quot; kata Ema Linaker, 
AVG Global Head of Online Engagement dalam keterangan yang diterima 
VIVAnews, Selasa 23 Maret 2010.&quot;&gt;&quot;Only in four years, the  popularity of  Twitter increases rapidly around the world. The increase  was made  Twitter as an easy target cyber criminals,&quot; said Ema Linaker,  AVG  Global Head of Online Engagement in a statement received VIVAnews,   Tuesday, March 23, 2010. &lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;a href=&quot;&quot; name=&quot;more&quot;&gt;&lt;/a&gt;&lt;span class=&quot;long_text&quot; id=&quot;result_box&quot;&gt;&lt;span onmouseout=&quot;this.style.backgroundColor=&#39;#fff&#39;&quot; onmouseover=&quot;this.style.backgroundColor=&#39;#ebeff9&#39;&quot; style=&quot;background-color: white;&quot; title=&quot;&amp;quot;Hanya dalam waktu empat 
tahun, popularitas Twitter 
meningkat pesat di seluruh dunia. Peningkatan ini menjadikan Twitter 
sebagai sasaran empuk para penjahat dunia maya,&amp;quot; kata Ema Linaker, 
AVG Global Head of Online Engagement dalam keterangan yang diterima 
VIVAnews, Selasa 23 Maret 2010.&quot;&gt;&lt;/span&gt;&lt;span onmouseout=&quot;this.style.backgroundColor=&#39;#fff&#39;&quot; onmouseover=&quot;this.style.backgroundColor=&#39;#ebeff9&#39;&quot; style=&quot;background-color: white;&quot; title=&quot;&amp;quot;Sifat Twitter
 yang memang amat terbuka memudahkan para 
penjahat ini untuk mencari korban. Sudah saatnya para pengguna mengambil
 langkah-langkah pencegahan dan perlindungan dari ancaman ini,&amp;quot; 
jelas Ema.&quot;&gt;&quot;The nature of Twitter  which is very open it easier for  criminals to find victims. It is time  for the users to take preventive  measures and protection from these  threats,&quot; explained Emma. &lt;/span&gt;&lt;span onmouseout=&quot;this.style.backgroundColor=&#39;#fff&#39;&quot; onmouseover=&quot;this.style.backgroundColor=&#39;#ebeff9&#39;&quot; style=&quot;background-color: white;&quot; title=&quot;Ia kemudian 
memberikan sepuluh tips penggunaan 
Twitter secara aman di blognya.&quot;&gt;He then gives ten tips on  the safe use  of Twitter in their blogs. &lt;br /&gt;
&lt;/span&gt;&lt;span onmouseout=&quot;this.style.backgroundColor=&#39;#fff&#39;&quot; onmouseover=&quot;this.style.backgroundColor=&#39;#ebeff9&#39;&quot; title=&quot;1.&quot;&gt;1. &lt;/span&gt;&lt;span onmouseout=&quot;this.style.backgroundColor=&#39;#fff&#39;&quot; onmouseover=&quot;this.style.backgroundColor=&#39;#ebeff9&#39;&quot; title=&quot;Batasi 
pembicaraan Anda&quot;&gt;Limit your conversation &lt;/span&gt;&lt;span onmouseout=&quot;this.style.backgroundColor=&#39;#fff&#39;&quot; onmouseover=&quot;this.style.backgroundColor=&#39;#ebeff9&#39;&quot; style=&quot;background-color: white;&quot; title=&quot;Penggunaan 
Twitter yang mudah seringkali membuat
 para pengguna dengan gampang mem-posting tweet tentang lokasi dan 
kegiatan mereka.&quot;&gt;Use Twitter to easily  often making the user with easy  to post and tweet about the location of  their activities. &lt;/span&gt;&lt;span onmouseout=&quot;this.style.backgroundColor=&#39;#fff&#39;&quot; onmouseover=&quot;this.style.backgroundColor=&#39;#ebeff9&#39;&quot; style=&quot;background-color: white;&quot; title=&quot;Komentar-komentar 
ringan yang diberikan sebagai tanggapan 
dari tweet tersebut lama-kelamaan bisa digunakan untuk mengetahui jadwal
 kegiatan dan rencana harian pengguna itu.&quot;&gt;Minor comments given in   response to the tweet that could eventually be used to determine the   schedule and plan activities that users daily. &lt;/span&gt;&lt;span onmouseout=&quot;this.style.backgroundColor=&#39;#fff&#39;&quot; onmouseover=&quot;this.style.backgroundColor=&#39;#ebeff9&#39;&quot; style=&quot;background-color: white;&quot; title=&quot;Para 
penjahat bisa memanfaatkan situasi ini untuk menjadikan pengguna 
tersebut korban berikutnya.&quot;&gt;The criminals could use  this situation to  make the user&#39;s next victim. &lt;br /&gt;
&lt;/span&gt;&lt;span onmouseout=&quot;this.style.backgroundColor=&#39;#fff&#39;&quot; onmouseover=&quot;this.style.backgroundColor=&#39;#ebeff9&#39;&quot; title=&quot;2.&quot;&gt;2. &lt;/span&gt;&lt;span onmouseout=&quot;this.style.backgroundColor=&#39;#fff&#39;&quot; onmouseover=&quot;this.style.backgroundColor=&#39;#ebeff9&#39;&quot; style=&quot;background-color: white;&quot; title=&quot;Berhati-hatilah membuka link&quot;&gt;Be careful opening the  link &lt;/span&gt;&lt;span onmouseout=&quot;this.style.backgroundColor=&#39;#fff&#39;&quot; onmouseover=&quot;this.style.backgroundColor=&#39;#ebeff9&#39;&quot; style=&quot;background-color: white;&quot; title=&quot;Waspadailah 
tiap-tiap link yang Anda dapatkan.&quot;&gt;Beware of each link that  you get. &lt;/span&gt;&lt;span onmouseout=&quot;this.style.backgroundColor=&#39;#fff&#39;&quot; onmouseover=&quot;this.style.backgroundColor=&#39;#ebeff9&#39;&quot; style=&quot;background-color: white;&quot; title=&quot;Umumnya, pelaku 
menggunakan layanan pemendekan URL di Twitter 
(contohnya, bit.ly), sehingga sulit untuk mengetahui apakah situs itu 
dapat dipercaya atau tidak.&quot;&gt;Generally, players use a  URL shortening  service on Twitter (for example, bit.ly), making it  difficult to know  whether the site can be trusted or not. &lt;/span&gt;&lt;span onmouseout=&quot;this.style.backgroundColor=&#39;#fff&#39;&quot; onmouseover=&quot;this.style.backgroundColor=&#39;#ebeff9&#39;&quot; style=&quot;background-color: white;&quot; title=&quot;Jika meragukan
 link tersebut, sebaiknya jangan dibuka.&quot;&gt;If you doubt the link,  you  should not be opened. &lt;br /&gt;
&lt;/span&gt;&lt;span onmouseout=&quot;this.style.backgroundColor=&#39;#fff&#39;&quot; onmouseover=&quot;this.style.backgroundColor=&#39;#ebeff9&#39;&quot; title=&quot;3.&quot;&gt;3. &lt;/span&gt;&lt;span onmouseout=&quot;this.style.backgroundColor=&#39;#fff&#39;&quot; onmouseover=&quot;this.style.backgroundColor=&#39;#ebeff9&#39;&quot; style=&quot;background-color: white;&quot; title=&quot;Waspadailah 
timeline dan inbox Anda&quot;&gt;Timeline and watch your  inbox &lt;/span&gt;&lt;span onmouseout=&quot;this.style.backgroundColor=&#39;#fff&#39;&quot; onmouseover=&quot;this.style.backgroundColor=&#39;#ebeff9&#39;&quot; style=&quot;background-color: white;&quot; title=&quot;Bila Anda mulai 
mendapatkan pesan-pesan yang mencurigakan atau 
teman-teman Anda mulai men-tweet atau mengirimkan pesan-pesan berbau 
spam, sebaiknya Anda pastikan terlebih dahulu apakah akun rekan Anda 
telah menjadi sasaran hacker.&quot;&gt;When you start getting  messages  suspicious or your friends start to tweet or sending messages  smell  spam, you should first make sure whether your partner account has  been  the target of hackers. &lt;br /&gt;
&lt;/span&gt;&lt;span onmouseout=&quot;this.style.backgroundColor=&#39;#fff&#39;&quot; onmouseover=&quot;this.style.backgroundColor=&#39;#ebeff9&#39;&quot; title=&quot;4.&quot;&gt;4. &lt;/span&gt;&lt;span onmouseout=&quot;this.style.backgroundColor=&#39;#fff&#39;&quot; onmouseover=&quot;this.style.backgroundColor=&#39;#ebeff9&#39;&quot; style=&quot;background-color: white;&quot; title=&quot;Berpikirlah 
sebelum tweet&quot;&gt;Think before you tweet &lt;/span&gt;&lt;span onmouseout=&quot;this.style.backgroundColor=&#39;#fff&#39;&quot; onmouseover=&quot;this.style.backgroundColor=&#39;#ebeff9&#39;&quot; style=&quot;background-color: white;&quot; title=&quot;Tweet Anda 
dapat dibaca oleh semua orang di 
seluruh dunia.&quot;&gt;Tweet you can read by all  people around the world. &lt;/span&gt;&lt;span onmouseout=&quot;this.style.backgroundColor=&#39;#fff&#39;&quot; onmouseover=&quot;this.style.backgroundColor=&#39;#ebeff9&#39;&quot; style=&quot;background-color: white;&quot; title=&quot;Bahkan setelah
 dihapus pun
 tweet Anda masih tetap dapat dilihat dengan menggunakan mesin pencari.&quot;&gt;Even  after your tweet was  deleted, can still be seen by using the search  engine. &lt;/span&gt;&lt;span onmouseout=&quot;this.style.backgroundColor=&#39;#fff&#39;&quot; onmouseover=&quot;this.style.backgroundColor=&#39;#ebeff9&#39;&quot; style=&quot;background-color: white;&quot; title=&quot;Pikirkanlah 
baik-baik apa yang hendak Anda tulis, karena dampak tulisan Anda mungkin
 akan lebih jauh dari yang Anda perkirakan.&quot;&gt;Think carefully what you   want to write, because the impact of your writing will probably further   than you thought. &lt;br /&gt;
&lt;/span&gt;&lt;span onmouseout=&quot;this.style.backgroundColor=&#39;#fff&#39;&quot; onmouseover=&quot;this.style.backgroundColor=&#39;#ebeff9&#39;&quot; title=&quot;5.&quot;&gt;5. &lt;/span&gt;&lt;span onmouseout=&quot;this.style.backgroundColor=&#39;#fff&#39;&quot; onmouseover=&quot;this.style.backgroundColor=&#39;#ebeff9&#39;&quot; title=&quot;Jangan lekas 
percaya&quot;&gt;Do not hastily believe &lt;/span&gt;&lt;span onmouseout=&quot;this.style.backgroundColor=&#39;#fff&#39;&quot; onmouseover=&quot;this.style.backgroundColor=&#39;#ebeff9&#39;&quot; style=&quot;background-color: white;&quot; title=&quot;Anda tidak 
selalu tahu siapa saja follower Anda 
di Twitter.&quot;&gt;You do not always know  who your follower on Twitter. &lt;/span&gt;&lt;span onmouseout=&quot;this.style.backgroundColor=&#39;#fff&#39;&quot; onmouseover=&quot;this.style.backgroundColor=&#39;#ebeff9&#39;&quot; title=&quot;Jangan mudah 
percaya 
dan berteman dengan orang-orang yang tidak terlalu Anda kenal.&quot;&gt;Do not  easily believe in  and make friends with people who are not too you  know. &lt;/span&gt;&lt;span onmouseout=&quot;this.style.backgroundColor=&#39;#fff&#39;&quot; onmouseover=&quot;this.style.backgroundColor=&#39;#ebeff9&#39;&quot; title=&quot;Anda tidak 
akan tahu jika ia mempunyai niat buruk.&quot;&gt;You will not know if he  has  bad intentions. &lt;br /&gt;
&lt;/span&gt;&lt;span onmouseout=&quot;this.style.backgroundColor=&#39;#fff&#39;&quot; onmouseover=&quot;this.style.backgroundColor=&#39;#ebeff9&#39;&quot; title=&quot;6.&quot;&gt;6. &lt;/span&gt;&lt;span onmouseout=&quot;this.style.backgroundColor=&#39;#fff&#39;&quot; onmouseover=&quot;this.style.backgroundColor=&#39;#ebeff9&#39;&quot; title=&quot;Pastikan 
aplikasi pihak ketiga Anda aman&quot;&gt;Make sure your  third-party  applications secure &lt;/span&gt;&lt;span onmouseout=&quot;this.style.backgroundColor=&#39;#fff&#39;&quot; onmouseover=&quot;this.style.backgroundColor=&#39;#ebeff9&#39;&quot; style=&quot;background-color: white;&quot; title=&quot;Ada ratusan 
aplikasi yang dapat Anda gunakan di 
Twitter.&quot;&gt;There are hundreds of  applications that you can use in  Twitter. &lt;/span&gt;&lt;span onmouseout=&quot;this.style.backgroundColor=&#39;#fff&#39;&quot; onmouseover=&quot;this.style.backgroundColor=&#39;#ebeff9&#39;&quot; style=&quot;background-color: white;&quot; title=&quot;Sebelum Anda 
menggunakan aplikasi, pastikan bahwa aplikasi-aplikasi tersebut aman.&quot;&gt;Before  you use the  application, make sure that applications are safe. &lt;/span&gt;&lt;span onmouseout=&quot;this.style.backgroundColor=&#39;#fff&#39;&quot; onmouseover=&quot;this.style.backgroundColor=&#39;#ebeff9&#39;&quot; style=&quot;background-color: white;&quot; title=&quot;Carilah 
aplikasi-aplikasi yang banyak dibahas di situs-situs 
terpercaya.&quot;&gt;Find the applications  that a lot of discussion on trusted  sites. &lt;/span&gt;&lt;span onmouseout=&quot;this.style.backgroundColor=&#39;#fff&#39;&quot; onmouseover=&quot;this.style.backgroundColor=&#39;#ebeff9&#39;&quot; style=&quot;background-color: white;&quot; title=&quot;Ingat bahwa 
aplikasi-aplikasi ini sering membutuhkan password dan username Anda.&quot;&gt;Remember  that these  applications often require a password and your username. &lt;br /&gt;
&lt;/span&gt;&lt;span onmouseout=&quot;this.style.backgroundColor=&#39;#fff&#39;&quot; onmouseover=&quot;this.style.backgroundColor=&#39;#ebeff9&#39;&quot; title=&quot;7.&quot;&gt;7. &lt;/span&gt;&lt;span onmouseout=&quot;this.style.backgroundColor=&#39;#fff&#39;&quot; onmouseover=&quot;this.style.backgroundColor=&#39;#ebeff9&#39;&quot; title=&quot;Gunakan 
password yang berbeda&quot;&gt;Use a different password &lt;/span&gt;&lt;span onmouseout=&quot;this.style.backgroundColor=&#39;#fff&#39;&quot; onmouseover=&quot;this.style.backgroundColor=&#39;#ebeff9&#39;&quot; title=&quot;Ada baiknya 
jika password yang Anda gunakan di 
tiap akun jejaring sosial berbeda.&quot;&gt;It is better if the  password you  use in each different social networking accounts. &lt;/span&gt;&lt;span onmouseout=&quot;this.style.backgroundColor=&#39;#fff&#39;&quot; onmouseover=&quot;this.style.backgroundColor=&#39;#ebeff9&#39;&quot; style=&quot;background-color: white;&quot; title=&quot;Misalnya, akun
 Facebook dan Twitter tidak memakai password yang 
sama.&quot;&gt;For example, Facebook and  Twitter accounts do not use the same  password. &lt;/span&gt;&lt;span onmouseout=&quot;this.style.backgroundColor=&#39;#fff&#39;&quot; onmouseover=&quot;this.style.backgroundColor=&#39;#ebeff9&#39;&quot; style=&quot;background-color: white;&quot; title=&quot;Bila
 Anda ingin lebih aman, ciptakan e-mail berbeda untuk akun-akun jejaring
 sosial Anda.&quot;&gt;If you want more secure,  create a different e-mail  accounts for your social network. &lt;/span&gt;&lt;span onmouseout=&quot;this.style.backgroundColor=&#39;#fff&#39;&quot; onmouseover=&quot;this.style.backgroundColor=&#39;#ebeff9&#39;&quot; style=&quot;background-color: white;&quot; title=&quot;Meskipun sulit, 
langkah ini cukup ampuh untuk membuat Anda aman di dunia maya.&quot;&gt;Although  difficult, this  step is powerful enough to make you safe in  cyberspace. &lt;br /&gt;
&lt;/span&gt;&lt;span onmouseout=&quot;this.style.backgroundColor=&#39;#fff&#39;&quot; onmouseover=&quot;this.style.backgroundColor=&#39;#ebeff9&#39;&quot; title=&quot;8.&quot;&gt;8. &lt;/span&gt;&lt;span onmouseout=&quot;this.style.backgroundColor=&#39;#fff&#39;&quot; onmouseover=&quot;this.style.backgroundColor=&#39;#ebeff9&#39;&quot; title=&quot;Perhatikan 
pengaturan login&quot;&gt;Note the login settings &lt;/span&gt;&lt;span onmouseout=&quot;this.style.backgroundColor=&#39;#fff&#39;&quot; onmouseover=&quot;this.style.backgroundColor=&#39;#ebeff9&#39;&quot; title=&quot;Periksalah 
pengaturan browser yang Anda 
gunakan.&quot;&gt;Check your browser  settings to use. &lt;/span&gt;&lt;span onmouseout=&quot;this.style.backgroundColor=&#39;#fff&#39;&quot; onmouseover=&quot;this.style.backgroundColor=&#39;#ebeff9&#39;&quot; style=&quot;background-color: white;&quot; title=&quot;Pastikan bahwa 
informasi Anda, baik username atau 
password, tidak terekam jika Anda sedang menggunakan komputer bersama.&quot;&gt;Make  sure that your  information, either username or password, not recorded  if you are using a  shared computer. &lt;br /&gt;
&lt;/span&gt;&lt;span onmouseout=&quot;this.style.backgroundColor=&#39;#fff&#39;&quot; onmouseover=&quot;this.style.backgroundColor=&#39;#ebeff9&#39;&quot; title=&quot;9.&quot;&gt;9. &lt;/span&gt;&lt;span onmouseout=&quot;this.style.backgroundColor=&#39;#fff&#39;&quot; onmouseover=&quot;this.style.backgroundColor=&#39;#ebeff9&#39;&quot; title=&quot;Waspadai 
serangan phising&quot;&gt;Beware of phishing  attacks &lt;/span&gt;&lt;span onmouseout=&quot;this.style.backgroundColor=&#39;#fff&#39;&quot; onmouseover=&quot;this.style.backgroundColor=&#39;#ebeff9&#39;&quot; title=&quot;Berhati-hatilah atas usaha-usaha untuk 
mendapatkan informasi pribadi Anda melalui Tweet ataupun Direct 
Message.&quot;&gt;Beware of attempts to  obtain your personal information  through a Tweet or Direct Message. &lt;br /&gt;
&lt;/span&gt;&lt;span onmouseout=&quot;this.style.backgroundColor=&#39;#fff&#39;&quot; onmouseover=&quot;this.style.backgroundColor=&#39;#ebeff9&#39;&quot; title=&quot;10.&quot;&gt;10. &lt;/span&gt;&lt;span onmouseout=&quot;this.style.backgroundColor=&#39;#fff&#39;&quot; onmouseover=&quot;this.style.backgroundColor=&#39;#ebeff9&#39;&quot; title=&quot;Biasakan untuk
 selalu logout&quot;&gt;Get used to always logout &lt;/span&gt;&lt;span onmouseout=&quot;this.style.backgroundColor=&#39;#fff&#39;&quot; onmouseover=&quot;this.style.backgroundColor=&#39;#ebeff9&#39;&quot; style=&quot;background-color: white;&quot; title=&quot;Latihlah diri Anda untuk 
membiasakan logout tiap kali ingin 
keluar dari Twitter.&quot;&gt;Train yourself to get  logged out every time you  want to get out of Twitter. &lt;/span&gt;&lt;span onmouseout=&quot;this.style.backgroundColor=&#39;#fff&#39;&quot; onmouseover=&quot;this.style.backgroundColor=&#39;#ebeff9&#39;&quot; title=&quot;Terlebih lagi 
pada ponsel Anda.&quot;&gt;Even more on your phone. &lt;/span&gt;&lt;span onmouseout=&quot;this.style.backgroundColor=&#39;#fff&#39;&quot; onmouseover=&quot;this.style.backgroundColor=&#39;#ebeff9&#39;&quot; style=&quot;background-color: white;&quot; title=&quot;Bila Anda memiliki
 aplikasi Twitter, pastikan Anda selalu log out setelah Anda 
menggunakannya.&quot;&gt;If you have a Twitter  application, make sure you  always log out after you use it.&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;long_text&quot; id=&quot;result_box&quot;&gt;&lt;span onmouseout=&quot;this.style.backgroundColor=&#39;#fff&#39;&quot; onmouseover=&quot;this.style.backgroundColor=&#39;#ebeff9&#39;&quot; style=&quot;background-color: white;&quot; title=&quot;Situs phising bertujuan untuk 
memancing 
korban agar memberikan data-data yang terdapat pada sebuah halaman Web, 
termasuk password dan alamat-alamat email dalam daftar kontak.&quot;&gt;  &lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span id=&quot;fullpost&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;subscribe to my newest articles here&lt;/div&gt;</description><link>http://halotechno.blogspot.com/2010/03/10-safety-tips-on-twitter.html</link><author>noreply@blogger.com (Unknown)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjjFC5ikeAqAlSWhNYu0EwDXs79vA_QADTbpvD94J3UPwYkSspA91OUgWa_8iwK5syu9YaIP5cxLzYEhpnbk73rC9xS9VBAr-e4qI19tZ-sj4x87vWIsgfqBZxJRLQ2D1hx6xTfUgDCycCZ/s72-c/twitter.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2834877705017843849.post-5668808673579915876</guid><pubDate>Mon, 22 Mar 2010 11:12:00 +0000</pubDate><atom:updated>2010-03-22T04:12:28.375-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">TipsTricks</category><title></title><description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgn0B6_DN1MbQdQhvSUC0plhV4jtVhyphenhyphenF0hu7-soDzQMo5sSqVqcTGecakbsa3284JFzQOHtO-oeFyQKV3e46Sr1D0Zm24ZmPpoaebYBbSul0-ewS63XEte8cM8zvflXw5JfFlQgOl4lUaYu/s1600-h/twitter%20change.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;122&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgn0B6_DN1MbQdQhvSUC0plhV4jtVhyphenhyphenF0hu7-soDzQMo5sSqVqcTGecakbsa3284JFzQOHtO-oeFyQKV3e46Sr1D0Zm24ZmPpoaebYBbSul0-ewS63XEte8cM8zvflXw5JfFlQgOl4lUaYu/s200/twitter%20change.jpg&quot; width=&quot;200&quot; /&gt;&lt;/a&gt;&lt;/div&gt;Sure you want to be different with other people&#39;s twitter. Therefore, do not use the setting provided. To personalize, use of personal images.&lt;br /&gt;
&lt;br /&gt;
To change the twitter account profile, users are welcome to click the Devices menu, then click the tab design.&lt;br /&gt;
&lt;br /&gt;
Still on the same page at the bottom, click the Change Background Image, then the additional option will appear. Here, live click Choose File.&lt;br /&gt;
&lt;br /&gt;
Then, do not be surprised if you change your Twitter background as you wish.&lt;br /&gt;
&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;br /&gt;
&lt;span class=&quot;long_text&quot; id=&quot;result_box&quot;&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Anda bisa melihat perbedaannya.&quot;&gt;You can see  the difference. &lt;/span&gt;&lt;span title=&quot;Hebatnya, personalisasi ini bisa 
dilakukan berkali-kali.&quot;&gt;Amazingly, this personalization can be done  many times. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Gunakan gambar yang sesuai resolusi monitor.&quot;&gt;Use the appropriate  picture resolution monitors. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Misalnya, jika menggunakan laptop, biasanya 
menggunakan resolusi 1280x800.&quot;&gt;For example, if using a laptop, usually  using a resolution of 1280x800. &lt;/span&gt;&lt;span title=&quot;Sedangkan pada PC 
biasa, gunakan resolusi 1024x768.&quot;&gt;While the personal computer, use a  resolution of 1024x768. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Tujuannya, agar gambar latar anda tidak bertumpuk, 
jadi hanya satu gambar utuh.&quot;&gt;The goal, so that your background images  do not overlap, so only one image intact.&lt;br /&gt;
&lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Setelah mengganti 
background imej, anda bisa mengubah warna desain akun twitter anda, 
mengubah teks, link, sidebar, dan garis batas.&quot;&gt;After changing a  background image, you can change the color of your twitter account  design, change text, links, sidebar, and the borderline. &lt;/span&gt;&lt;span title=&quot;Caranya, tinggal klik Change design Colors di sebelah Change 
Background Image.&quot;&gt;Way, can click on Change design at the next Change  Colors Background Image.&lt;br /&gt;
&lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Jangan lupa, setelah melakukan perubahan, 
klik Save Changes.&quot;&gt;Do not forget, after making changes, click Save  Changes.&lt;/span&gt;&lt;/span&gt;&lt;span id=&quot;fullpost&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;subscribe to my newest articles here&lt;/div&gt;</description><link>http://halotechno.blogspot.com/2010/03/sure-you-want-to-be-different-with.html</link><author>noreply@blogger.com (Unknown)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgn0B6_DN1MbQdQhvSUC0plhV4jtVhyphenhyphenF0hu7-soDzQMo5sSqVqcTGecakbsa3284JFzQOHtO-oeFyQKV3e46Sr1D0Zm24ZmPpoaebYBbSul0-ewS63XEte8cM8zvflXw5JfFlQgOl4lUaYu/s72-c/twitter%20change.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2834877705017843849.post-8345905949959786339</guid><pubDate>Mon, 15 Mar 2010 07:47:00 +0000</pubDate><atom:updated>2010-03-15T00:52:15.274-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">TipsTricks</category><title>Choosing Your Nokia By Name</title><description>&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiWhm5v9kvJZxtU-TNwHU4U4PgqRl67tT74tUxL0Izxq_jp4IxePJyU6MMJQkFeS1fjatbcJ2aTUHZdud1FhMMvrhaL2eh4mlKyhb-mf3hu0zD7_SPwvOrq9yL834Vz6ptF2YbHWcZd1szM/s1600-h/Nokia-C5.JPG&quot;&gt;&lt;img style=&quot;float:left; margin:0 10px 10px 0;cursor:pointer; cursor:hand;width: 200px; height: 162px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiWhm5v9kvJZxtU-TNwHU4U4PgqRl67tT74tUxL0Izxq_jp4IxePJyU6MMJQkFeS1fjatbcJ2aTUHZdud1FhMMvrhaL2eh4mlKyhb-mf3hu0zD7_SPwvOrq9yL834Vz6ptF2YbHWcZd1szM/s200/Nokia-C5.JPG&quot; border=&quot;0&quot; alt=&quot;&quot;id=&quot;BLOGGER_PHOTO_ID_5448765022211419570&quot; /&gt;&lt;/a&gt;&lt;br /&gt;Nokia began introducing a naming standard for smart phone range. What kind of naming scheme is and how potential users can use it to select your Nokia phone?&lt;br /&gt;&lt;br /&gt;Nokia, as quoted from Nokia Conversations, Monday (8/3/2010), began using the standard scheme in classifying their smartphone range. Starting now, smartphone Nokia will have four categories to choose from.&lt;br /&gt;&lt;br /&gt;The fourth category is C, X, E and N. Then, each series will be numbered 1 to 9 after the letter.&lt;br /&gt;&lt;br /&gt;These tips are simple, 1 indicates the phone with the functions and the lowest price range. This row will be increased to the phone with the prefix 9 indicating &#39;high caste&#39; with the function and value.&lt;br /&gt;&lt;br /&gt;As for the letter, here&#39;s the short explanation: &lt;br /&gt;&lt;span id=&quot;fullpost&quot;&gt;&lt;br /&gt;* Series C will display the range of mobile phones with limited functionality at the very core capabilities.&lt;br /&gt;    * Series E will display a range of mobile phone users focus on business and productivity.&lt;br /&gt;    * Series X is the Nokia phone that has the primary purpose of entertainment and social.&lt;br /&gt;    * Series N will be mobile phones Nokia&#39;s most sophisticated.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Thus, can be concluded that the smartphone Nokia will order from the ranks of C1 to N9. Although not all combinations of numbers and letters will be present as a product on the market. Some of that has been announced, including Nokia C5, X5 and X3.&lt;br /&gt;&lt;br /&gt;Remember also that the categorization is here only applies to the range of smartphones. It is unclear whether the same guidelines can be used in the Nokia range of non-smartphone. &lt;br /&gt;&lt;/span&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;subscribe to my newest articles here&lt;/div&gt;</description><link>http://halotechno.blogspot.com/2010/03/choosing-your-nokia-by-name.html</link><author>noreply@blogger.com (Unknown)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiWhm5v9kvJZxtU-TNwHU4U4PgqRl67tT74tUxL0Izxq_jp4IxePJyU6MMJQkFeS1fjatbcJ2aTUHZdud1FhMMvrhaL2eh4mlKyhb-mf3hu0zD7_SPwvOrq9yL834Vz6ptF2YbHWcZd1szM/s72-c/Nokia-C5.JPG" height="72" width="72"/><thr:total>0</thr:total></item></channel></rss>