Wednesday, April 8, 2009
Aglare Music Converter Platinum 6.4
Aglare Music Converter Platinum is designed for the ones who like to enjoy nice music a lot. It is an all-in-one audio converter for converting all popular video and audio files to MP3, AAC, AC3, AMR, M4A, OGG and WAV audio formats. It supports converting AVI, WMV, MPEG, MP4, ASF, VOB, 3GP, iPhone, MOV and FLV video to audio formats, and supports converting between popular audio formats, such as MP3, AAC, AC3, AMR, M4A, OGG and WAV. It owns all the functions of Aglare audio converter series, which is a necessary audio tool for most music lovers.
Key Features:
Aglare Music Converter Platinum is an all-in-one audio conversion tool.
Convert between popular audio files such as MP3, AAC, AC3, AMR, M4A, OGG and WAV.
Support converting video files to audio formats.
The audio converter supports batch conversion.
You can get the output formats you want with excellent quality.
Minimum Requirements:
CPU: 733 Mhz Pentium II or higher .
Memory: 64 MB RAM or higher.
Disk Space: 20 MB free hard drive space.
Operating System: Windows /98/ME/NT/2000/XP/2003 Server/Vista
Program is full version 100% working and I was tested. Download it here.
Labels:
Multimedia Tools
Tuesday, March 17, 2009
FLV Converter
As we know, the video shown on the internet is mostly with the FLV format. Because the FLV format has a size that is relatively small when compared with the other video format, and the main video is FLV format can be played online, the other video format can not. Flash video can be played online, can also be downloaded. And download the video file has the extension FLV.
Many a player can be used to play the video with FLV extension, including a FLV player, Klite Codec Pack, and more. I usually use Klite Codec Pack for playing video files, especially video files FLV. I choose this player because it has facilities to play almost any type of video format. But from experience I have experienced, some FLV files can not be played with Klite. Indeed, it sometimes makes me annoyed if capacity large files, because the need for the long time to download. After several tries, I finally find the way that the FLV file can not be played with Klite player is not useless. Yeah ... Conversion is the solution.
I use Portable FLV Converter to convert FLV files. Deliberately selected because it easily, and does not need to install to use it. Simply click 2 times, the program can be used. Here is the view menu :
You can download here :
To use the program above is very simple, you click on "Add Files", then click "Convert" and wait until the process is complete. But before that, the first set of conversion by choosing the option that exists.
Congratulations to convert FLV file.
Many a player can be used to play the video with FLV extension, including a FLV player, Klite Codec Pack, and more. I usually use Klite Codec Pack for playing video files, especially video files FLV. I choose this player because it has facilities to play almost any type of video format. But from experience I have experienced, some FLV files can not be played with Klite. Indeed, it sometimes makes me annoyed if capacity large files, because the need for the long time to download. After several tries, I finally find the way that the FLV file can not be played with Klite player is not useless. Yeah ... Conversion is the solution.
I use Portable FLV Converter to convert FLV files. Deliberately selected because it easily, and does not need to install to use it. Simply click 2 times, the program can be used. Here is the view menu :
You can download here :
To use the program above is very simple, you click on "Add Files", then click "Convert" and wait until the process is complete. But before that, the first set of conversion by choosing the option that exists.
Congratulations to convert FLV file.
Labels:
Video Tools
Thursday, March 5, 2009
Computer Virus Causes Flood Shortcut
At the time of virus are incessant Conficker the internet network of the world, there is a local virus (Indonesia), which does not want to lose the strength of the performance. This virus was found accidentally, while visiting in a place, the owners complained because many computer shortcut on the computer.
Observed that after a lot of files scattered in every shortcut that folder existing in the computer, such as Microsoft Ink, and also the shortcut to the file name as the folder name that exists on the computer. Finally, with the immediate complaint directly analyzed further and made the way the virus attacks.
Norman Virus Control to detect this virus as Worm:PIF/Starter.A. The characteristics of the virus is :
1. In the My Documents folder, there is a file called database.mdb, and in fact this is the parent file.
2. There is a file Autorun.inf, Thumb.db, Microsoft.Ink in each driver, the folder and subfolders on the flash to the second.
3. Make a duplicate of each file folder with the extension. Ink, a maximum of 5 the first name of the folder, for example, if the C:\ Windows then there are only 5 will be used first names only. And apply to subfolders in the second.
4. Turn off the function registry file :
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\system]
"DisableRegistryTools"=dword:00000001
5. Adding value in the registry
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run]
"Explorer"=Wscript.exe//e:VBScript \"C:\Documents And Settings\Administrator\My Documents\Database.mdb\"
[HKEY_LOKAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run]
"WinUpdate"="Wscript.exe/e:VBScript\"C:\Windows\:Microsoft Office
6. Update for Windows XP.sys \ ""
For the last script that this is only likely to lead on the script, but in practice we have to delete them. If the computer at the time of logon, it will get the error message. That make us become infuriated many shortcuts are created by the virus. And the terrible virus that is exactly how it does not then the virus will return again and again. Therefore, there are several ways that should be done to combat the virus that causes this :
1. Turn off the proces of WSCRIPT file located in C:\Windows\System32, by using tools such as CProcess, HijackThis or can also use the TaskManager from windows.
2. Previous first turn off System Restore process
3. After turning off the WScript process, the next is to delete or rename the file so it will not be used (temporarily) by the virus again. As a note, if we change the name of the file WScript.exe is, will be automatically copied in the folder, because it must be sought where the other file WScript.exe. There are usually at c:\Windows\ $NtServicePackUninstall$, c:\Windows\ServicePackFiles\i386. Unlike other VBS virus, we can change from VBS file to Notepad using Open with, the virus has an extension MDB which means Microsoft Access files. So Wscript will run the file DATABASE.MDB as though he is a vbs file (smart virus). Wscript.exe //e:VBScript \"c:\Documents and Settings\Administrator\My Documents\database.mdb\"
4. Delete the files in the parent c:\Documents and Settings\\My Documents\database.mdb, so that every time the computer run will not load the file. And do not forget we are also open msconfig, disable the run command.
5. Now we will delete the file Autorun.inf, Microsoft.INF and Thumb.db with the click Start, click Run, type CMD, moved to the drive to be cleaned, for example, drive c:\. So who should do is type in c:\del Microsoft.inf /s means that this command will delete all files Microsof.inf in all folder on drive c. If you want to move to another drive, you just only rename the drive to live, for example d:\del Microsoft.inf /s.
6. For Autorun.inf files, type c:\del autorun.inf /s /ah /f which means that this command will delete the file autorun.inf in all the folders on drive c. (syntax /ah /f is used as the file using the attrib RSHA). Similarly to file thumb.db also do the same.
7. To delete a file than 4 file, we must search for it using the Search files with the extension .ink and 1KB size. In the "More Advanced Options", make sure the option "Search system folders" and "Search hidden files and folders" both have been active.
8. Please be careful, not all the shortcut files or file size of 1KB INK is a virus, we can distinguish it from the icon, size and type. To shortcut that was created virus, the icon always use the icon "folder" with a 1KB size of type "Shortcut". While the correct folder should not have "size" and "Type" is "File Folder".
Source : Komputek Edisi 612
Observed that after a lot of files scattered in every shortcut that folder existing in the computer, such as Microsoft Ink, and also the shortcut to the file name as the folder name that exists on the computer. Finally, with the immediate complaint directly analyzed further and made the way the virus attacks.
Norman Virus Control to detect this virus as Worm:PIF/Starter.A. The characteristics of the virus is :
1. In the My Documents folder, there is a file called database.mdb, and in fact this is the parent file.
2. There is a file Autorun.inf, Thumb.db, Microsoft.Ink in each driver, the folder and subfolders on the flash to the second.
3. Make a duplicate of each file folder with the extension. Ink, a maximum of 5 the first name of the folder, for example, if the C:\ Windows then there are only 5 will be used first names only. And apply to subfolders in the second.
4. Turn off the function registry file :
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\system]
"DisableRegistryTools"=dword:00000001
5. Adding value in the registry
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run]
"Explorer"=Wscript.exe//e:VBScript \"C:\Documents And Settings\Administrator\My Documents\Database.mdb\"
[HKEY_LOKAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run]
"WinUpdate"="Wscript.exe/e:VBScript\"C:\Windows\:Microsoft Office
6. Update for Windows XP.sys \ ""
For the last script that this is only likely to lead on the script, but in practice we have to delete them. If the computer at the time of logon, it will get the error message. That make us become infuriated many shortcuts are created by the virus. And the terrible virus that is exactly how it does not then the virus will return again and again. Therefore, there are several ways that should be done to combat the virus that causes this :
1. Turn off the proces of WSCRIPT file located in C:\Windows\System32, by using tools such as CProcess, HijackThis or can also use the TaskManager from windows.
2. Previous first turn off System Restore process
3. After turning off the WScript process, the next is to delete or rename the file so it will not be used (temporarily) by the virus again. As a note, if we change the name of the file WScript.exe is, will be automatically copied in the folder, because it must be sought where the other file WScript.exe. There are usually at c:\Windows\ $NtServicePackUninstall$, c:\Windows\ServicePackFiles\i386. Unlike other VBS virus, we can change from VBS file to Notepad using Open with, the virus has an extension MDB which means Microsoft Access files. So Wscript will run the file DATABASE.MDB as though he is a vbs file (smart virus). Wscript.exe //e:VBScript \"c:\Documents and Settings\Administrator\My Documents\database.mdb\"
4. Delete the files in the parent c:\Documents and Settings\
5. Now we will delete the file Autorun.inf, Microsoft.INF and Thumb.db with the click Start, click Run, type CMD, moved to the drive to be cleaned, for example, drive c:\. So who should do is type in c:\del Microsoft.inf /s means that this command will delete all files Microsof.inf in all folder on drive c. If you want to move to another drive, you just only rename the drive to live, for example d:\del Microsoft.inf /s.
6. For Autorun.inf files, type c:\del autorun.inf /s /ah /f which means that this command will delete the file autorun.inf in all the folders on drive c. (syntax /ah /f is used as the file using the attrib RSHA). Similarly to file thumb.db also do the same.
7. To delete a file than 4 file, we must search for it using the Search files with the extension .ink and 1KB size. In the "More Advanced Options", make sure the option "Search system folders" and "Search hidden files and folders" both have been active.
8. Please be careful, not all the shortcut files or file size of 1KB INK is a virus, we can distinguish it from the icon, size and type. To shortcut that was created virus, the icon always use the icon "folder" with a 1KB size of type "Shortcut". While the correct folder should not have "size" and "Type" is "File Folder".
Source : Komputek Edisi 612
Wednesday, February 25, 2009
Recognize a Variety Digital Music File Format (Part.2)
Hallo Blogger. This time I will again discuss a variety of digital music file format, which is the continuation of any posts on my part 1 ago.
OGG VORBIS
Ogg Vorbis is the only file format that is open and free. Other formats that I have previous research generally patented and developer of software tools or hard to pay a license for a product that can play the file associated with the format.
In terms of quality, excess Ogg Vorbis is a high quality at low bitrate compared to other formats. Popular software, Winamp and portable MP3 player pioneer Rio has been supporting this format in the newest model. Despite this strong support tools for this format are still rare.
REAL AUDIO
Is one format which is found in the low bitrate. Real Audio format from this service is usually used in streaming audio. At the bitrate up to 128 kbps, Real Audio using MPEG AAC standards.
MIDI
One audio format that is more suitable for the sound generated by the Synthesizer or other electronic tools, but not suitable for the conversion from analog as it does not sound too accurate. Files with this format is small and the last is often used in mobile phones as a ringtone.
Source : Komputek 542 Edition
OGG VORBIS
Ogg Vorbis is the only file format that is open and free. Other formats that I have previous research generally patented and developer of software tools or hard to pay a license for a product that can play the file associated with the format.
In terms of quality, excess Ogg Vorbis is a high quality at low bitrate compared to other formats. Popular software, Winamp and portable MP3 player pioneer Rio has been supporting this format in the newest model. Despite this strong support tools for this format are still rare.
REAL AUDIO
Is one format which is found in the low bitrate. Real Audio format from this service is usually used in streaming audio. At the bitrate up to 128 kbps, Real Audio using MPEG AAC standards.
MIDI
One audio format that is more suitable for the sound generated by the Synthesizer or other electronic tools, but not suitable for the conversion from analog as it does not sound too accurate. Files with this format is small and the last is often used in mobile phones as a ringtone.
Source : Komputek 542 Edition
Labels:
Audio Info
Tuesday, February 24, 2009
Recognize a Variety Digital Music File Format (Part.1)
As the process of digitizing the analog recording music, songs, or digital music format has a wide range. We all know because the computer has the latest tehnologi various compression.
MP3
Stands for MPEG, Audio Layer3. MP3 format to be most popular in digital music. MP3 popularity was due to the size of the file is small but has a sound quality that does not lose the audio CD. This format was developed and patented by Fraunhofer Institute.
With bitrate 128 kbps, MP3 files are of good quality. However, MP3 Pro, MP3 format offers the quality of the same bitrate only half of the MP3. MP3 Pro is compatible with MP3. MP3 player can play MP3 Pro files, but the sound quality is not as well as the player that supports MP3 Pro.
WAV
It is the defacto standard sound in Windows. Results ripping from a CD originally recorded in this format before converted to other formats. But now this phase is often skipped. Files in this format are usually not compressed and so are large.
AAC
Stands for Andvance Audio Coding. This format is the standard Motion Picture Experts Group (MPEG) standards since MPEG-2 is applied in 1997. Sample rate is offered until 96 kHz, or twice the MP3. This format is used on the Apple online music store to its iTunes. The quality of music in this format is quite good even at low bitrate.
iPod, portable digital music player from Apple is famous equipment that supports this format.
WMA
One of the formats offered by Microsoft Windows Media Audio (WMA) preferred the online music vendors is because support for Digital Rights Management (DRM).
DRM is a feature to prevent the piracy of music, it is feared that the music studio at this time. Excess WMA not only that. The quality of music offered WMA format better than the MP3 format. Tests conducted Extremetech.com site indicates that this format is also better quality than the AAC format.
This format is quite popular. Software and hardware tools generally support the latest format. But not as much as MP3 support, despite it can be changed in the future.
... to be continued in part.2. Happy Blogging.
Source : Komputek 542 Edition
MP3
Stands for MPEG, Audio Layer3. MP3 format to be most popular in digital music. MP3 popularity was due to the size of the file is small but has a sound quality that does not lose the audio CD. This format was developed and patented by Fraunhofer Institute.
With bitrate 128 kbps, MP3 files are of good quality. However, MP3 Pro, MP3 format offers the quality of the same bitrate only half of the MP3. MP3 Pro is compatible with MP3. MP3 player can play MP3 Pro files, but the sound quality is not as well as the player that supports MP3 Pro.
WAV
It is the defacto standard sound in Windows. Results ripping from a CD originally recorded in this format before converted to other formats. But now this phase is often skipped. Files in this format are usually not compressed and so are large.
AAC
Stands for Andvance Audio Coding. This format is the standard Motion Picture Experts Group (MPEG) standards since MPEG-2 is applied in 1997. Sample rate is offered until 96 kHz, or twice the MP3. This format is used on the Apple online music store to its iTunes. The quality of music in this format is quite good even at low bitrate.
iPod, portable digital music player from Apple is famous equipment that supports this format.
WMA
One of the formats offered by Microsoft Windows Media Audio (WMA) preferred the online music vendors is because support for Digital Rights Management (DRM).
DRM is a feature to prevent the piracy of music, it is feared that the music studio at this time. Excess WMA not only that. The quality of music offered WMA format better than the MP3 format. Tests conducted Extremetech.com site indicates that this format is also better quality than the AAC format.
This format is quite popular. Software and hardware tools generally support the latest format. But not as much as MP3 support, despite it can be changed in the future.
... to be continued in part.2. Happy Blogging.
Source : Komputek 542 Edition
Labels:
Audio Info
Thursday, February 19, 2009
Facing attacks Virus Tips W32/Conficker.DV
If you experience one or more of the symptoms below:
Login username in Active Directory (AD) Windows locked repeatedly. So even if already locked (lock) and opened by the administrator, but it is locked again. Computers get an error Generic Host Process. Computers can not access certain websites such as www.microsoft.com, www.symantec.com, www.norman.com, www.clamav.com, www.grisoft.com, and www.avast.com www.eset.com with the message "Address not Found" but if these sites accessible from the IP address can be accessed. And other sites does not mean that there is interference.
Update anti-virus definitions disrupted because access to anti-virus sites on the block. Many applications do not function properly. In particular applications that utilize the network and use port 1024 to port 10000.
Please be careful, because you have been infected with the virus that are handed around the world. You need not be ashamed because your computer is not only the infected, but also the computer department of defense even though France and the UK were infected by this virus.
If you experience one or more of the symptoms below:
Login username in Active Directory (AD) Windows locked repeatedly. So even if already locked (lock) and opened by the administrator, but it is locked again. Computers get an error Generic Host Process. Computers can not access certain websites such as www.microsoft.com, www.symantec.com, www.norman.com, www.clamav.com, www.grisoft.com, and www.avast.com www.eset.com with the message "Address not Found" but if these sites accessible from the IP address can be accessed. And other sites does not mean that there is interference.
Update anti-virus definitions disrupted because access to anti-virus sites on the block. Many applications do not function properly. In particular applications that utilize the network and use port 1024 to port 10000.
Please be careful, because you have been infected with the virus that are handed around the world. You need not be ashamed because your computer is not only the infected, but also the computer department of defense even though France and the UK were infected by this virus.
If you are curious about who actually makes this virus, we do not have accurate data. But if viewed from a few sites that have forums and anti-virus is the first time information about this virus infection, it can be said that the virus came from China or Russia.
Norman Security Suit detect new virus variants as W32/Conficker.DV, while other anti-virus to detect as Win32.Kido.CG(Kaspersky),32.Downadup.B(Symantec),W32.Downadup.AL(F-Secure), W32.Conficker.B (Microsoft), W32.Conficker.A(CA,Sophos and McAfee), Worm_Downadup.AD(Trend Micro) and W32/Conficker.C (Panda).
The File Virus
Virus Conficker.DV have the file compressed via UPX. Virus file size 126kb. Viruses that enter the file is an image (gif, jpeg, bmp, png). While the file is generally an active form of "dll" (dynamic link library).
Dll files and this is the active file is in svhost.exe (Windows Server Service) to make back the spread of the virus. The virus will also copy the file "[% random name%].tmp" folder in the% WINDOWS% \ system32 (eg 01.tmp or 06.tmp). After using the file, then delete the virus file.
Symptoms / Virus Effect
If W32/Conficker.DV already infected, the virus will cause symptoms / effects below :
- If the previous variants off the service "Workstation, Server and Windows Firewall / Internet Connection Sharing (ICS)", then this time the virus tries to disable some services and disabled, namely: wscsvc: Security Center, wuauserv: Automatic Updates, Bits: Background Intellegent Transfer Service, ERSvc: Error Reporting Service, WerSvc; Windows Error Reporting Service (Vista, Server 2008), WinDefend: Windows Defender (Vista, Server 2008)
- The virus tries to make changes in the system Windows Vista / Server 2008 using the command: "netsh interface tcp set global autotuning = disabled"
With this command, the windows auto tuning will be disabled. Windows Auto Tuning is one of the features of Windows Vista and Server 2008 which is very useful to improve the performance when trying to access the network.
- The virus tries to download and execute files (bmp, gif, jpeg, png), which was then signed in the temporary internet
- The virus will check for internet connection and download files to adjust the date after January 1, 2009
- The virus will create a firewall rule on the gateway to create a local network from outside attack and get connected address external IP address of infected through a variety of ports (1024 to 10000)
- The virus will create a service with the following characteristics, in order to run automatically at start-up windows
Virus Cleaning :
1. Disconnect the computer that will be cleared from the network or the Internet
2. Turn off system restore (Windows XP or Vista)
3. Turn off the virus is active in the services. Use the removal tool from Norman to clean the virus is active
4. Remove bogus svchost.exe service added virus in the registry. You can search manually in the system registry
5. Delete Task Schedule is created by the virus ( c:\Windows\Task)
6. Remove the registry string is created by the virus. To make it easier you can use a registry script below :
[Version]
Signature="$Chicago$"
Provider=Vaksincom Oyee
[DefaultInstall]
AddReg=UnhookRegKey
DelReg=del
[UnhookRegKey]
HKCU, Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced, Hidden, 0x00000001,1
HKCU, Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced, SuperHidden, 0x00000001,1
HKLM, SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Folder\Hidden\SHOWALL, CheckedValue, 0x00000001x1
HKLM, SYSTEM\CurrentControlSet\Services\BITS, Start, 0x00000002,2
HKLM, SYSTEM\CurrentControlSet\Services\ERSvc, Start, 0x00000002,2
HKLM, SYSTEM\CurrentControlSet\Services\wscsvc, Start, 0x00000002,2
HKLM, SYSTEM\CurrentControlSet\Services\wuauserv, Start, 0x00000002,2
[del]
HKCU, Software\Microsoft\Windows\CurrentVersion\Applets, dl
HKCU, Software\Microsoft\Windows\CurrentVersion\Applets, ds
HKLM, Software\Microsoft\Windows\CurrentVersion\Applets, dl
HKLM, Software\Microsoft\Windows\CurrentVersion\Applets, ds
HKLM, SYSTEM\CurrentControlSet\Services\Tcpip\Parameters, TcpNumConnections
7. Use notepad, then save with the name "Repair.inf" (use the Save As Type option to be All Files to avoid an error occurred)
8. Repair.inf run with the right-click and select install
9. For cleaning the virus W32/Conficker.DV optimally and prevent re-infection, you should use anti-virus and update the virus is able to detect and properly patch your computer with http://www.microsoft.com/technet/ security/Bulletin/MS08-067.mspx to prevent re-infection
Source : Komputek,610 Edition
Login username in Active Directory (AD) Windows locked repeatedly. So even if already locked (lock) and opened by the administrator, but it is locked again. Computers get an error Generic Host Process. Computers can not access certain websites such as www.microsoft.com, www.symantec.com, www.norman.com, www.clamav.com, www.grisoft.com, and www.avast.com www.eset.com with the message "Address not Found" but if these sites accessible from the IP address can be accessed. And other sites does not mean that there is interference.
Update anti-virus definitions disrupted because access to anti-virus sites on the block. Many applications do not function properly. In particular applications that utilize the network and use port 1024 to port 10000.
Please be careful, because you have been infected with the virus that are handed around the world. You need not be ashamed because your computer is not only the infected, but also the computer department of defense even though France and the UK were infected by this virus.
If you experience one or more of the symptoms below:
Login username in Active Directory (AD) Windows locked repeatedly. So even if already locked (lock) and opened by the administrator, but it is locked again. Computers get an error Generic Host Process. Computers can not access certain websites such as www.microsoft.com, www.symantec.com, www.norman.com, www.clamav.com, www.grisoft.com, and www.avast.com www.eset.com with the message "Address not Found" but if these sites accessible from the IP address can be accessed. And other sites does not mean that there is interference.
Update anti-virus definitions disrupted because access to anti-virus sites on the block. Many applications do not function properly. In particular applications that utilize the network and use port 1024 to port 10000.
Please be careful, because you have been infected with the virus that are handed around the world. You need not be ashamed because your computer is not only the infected, but also the computer department of defense even though France and the UK were infected by this virus.
If you are curious about who actually makes this virus, we do not have accurate data. But if viewed from a few sites that have forums and anti-virus is the first time information about this virus infection, it can be said that the virus came from China or Russia.
Norman Security Suit detect new virus variants as W32/Conficker.DV, while other anti-virus to detect as Win32.Kido.CG(Kaspersky),32.Downadup.B(Symantec),W32.Downadup.AL(F-Secure), W32.Conficker.B (Microsoft), W32.Conficker.A(CA,Sophos and McAfee), Worm_Downadup.AD(Trend Micro) and W32/Conficker.C (Panda).
The File Virus
Virus Conficker.DV have the file compressed via UPX. Virus file size 126kb. Viruses that enter the file is an image (gif, jpeg, bmp, png). While the file is generally an active form of "dll" (dynamic link library).
Dll files and this is the active file is in svhost.exe (Windows Server Service) to make back the spread of the virus. The virus will also copy the file "[% random name%].tmp" folder in the% WINDOWS% \ system32 (eg 01.tmp or 06.tmp). After using the file, then delete the virus file.
Symptoms / Virus Effect
If W32/Conficker.DV already infected, the virus will cause symptoms / effects below :
- If the previous variants off the service "Workstation, Server and Windows Firewall / Internet Connection Sharing (ICS)", then this time the virus tries to disable some services and disabled, namely: wscsvc: Security Center, wuauserv: Automatic Updates, Bits: Background Intellegent Transfer Service, ERSvc: Error Reporting Service, WerSvc; Windows Error Reporting Service (Vista, Server 2008), WinDefend: Windows Defender (Vista, Server 2008)
- The virus tries to make changes in the system Windows Vista / Server 2008 using the command: "netsh interface tcp set global autotuning = disabled"
With this command, the windows auto tuning will be disabled. Windows Auto Tuning is one of the features of Windows Vista and Server 2008 which is very useful to improve the performance when trying to access the network.
- The virus tries to download and execute files (bmp, gif, jpeg, png), which was then signed in the temporary internet
- The virus will check for internet connection and download files to adjust the date after January 1, 2009
- The virus will create a firewall rule on the gateway to create a local network from outside attack and get connected address external IP address of infected through a variety of ports (1024 to 10000)
- The virus will create a service with the following characteristics, in order to run automatically at start-up windows
Virus Cleaning :
1. Disconnect the computer that will be cleared from the network or the Internet
2. Turn off system restore (Windows XP or Vista)
3. Turn off the virus is active in the services. Use the removal tool from Norman to clean the virus is active
4. Remove bogus svchost.exe service added virus in the registry. You can search manually in the system registry
5. Delete Task Schedule is created by the virus ( c:\Windows\Task)
6. Remove the registry string is created by the virus. To make it easier you can use a registry script below :
[Version]
Signature="$Chicago$"
Provider=Vaksincom Oyee
[DefaultInstall]
AddReg=UnhookRegKey
DelReg=del
[UnhookRegKey]
HKCU, Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced, Hidden, 0x00000001,1
HKCU, Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced, SuperHidden, 0x00000001,1
HKLM, SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Folder\Hidden\SHOWALL, CheckedValue, 0x00000001x1
HKLM, SYSTEM\CurrentControlSet\Services\BITS, Start, 0x00000002,2
HKLM, SYSTEM\CurrentControlSet\Services\ERSvc, Start, 0x00000002,2
HKLM, SYSTEM\CurrentControlSet\Services\wscsvc, Start, 0x00000002,2
HKLM, SYSTEM\CurrentControlSet\Services\wuauserv, Start, 0x00000002,2
[del]
HKCU, Software\Microsoft\Windows\CurrentVersion\Applets, dl
HKCU, Software\Microsoft\Windows\CurrentVersion\Applets, ds
HKLM, Software\Microsoft\Windows\CurrentVersion\Applets, dl
HKLM, Software\Microsoft\Windows\CurrentVersion\Applets, ds
HKLM, SYSTEM\CurrentControlSet\Services\Tcpip\Parameters, TcpNumConnections
7. Use notepad, then save with the name "Repair.inf" (use the Save As Type option to be All Files to avoid an error occurred)
8. Repair.inf run with the right-click and select install
9. For cleaning the virus W32/Conficker.DV optimally and prevent re-infection, you should use anti-virus and update the virus is able to detect and properly patch your computer with http://www.microsoft.com/technet/ security/Bulletin/MS08-067.mspx to prevent re-infection
Source : Komputek,610 Edition
Labels:
Tips dan Trik
Wednesday, February 18, 2009
Clean Duplicate System Files
Windows XP requires a library file dll extention to be able to operate. To prevent the loss of the library, windows requesting save a copy of the file to a folder in a special c:\windows\system2\dllcache.
Folder c:\windows\system32\dllcache this is rarely used. He will only be accessed when there is a dll file is missing or corrupt. When the dll file, which sought not found, the windows will ask for the windows installer CD is inserted into the CD-ROM. From the installer CD's, dll file that will be new.
If windows xp can request the required dll files from the installer CD, then what's the point to make a copy in hard disk? especially with the space used by backup dll file is quite large, can reach hundreds of megabytes. So you better remove it and use the space used by backup dll file for other purposes.
Follow the steps below to delete the backup dll files :
1. Click [Start] -> [All Program] -> [Accessories] -> [Windows Explorer]
2. At the address bar type c:\windows\system32\dllcache
3. Right Click at Folder, Click [Properties], and than uncheck the check option [Read Only]
4. Finally, delete all files that exist in the dllcache folder
Folder c:\windows\system32\dllcache this is rarely used. He will only be accessed when there is a dll file is missing or corrupt. When the dll file, which sought not found, the windows will ask for the windows installer CD is inserted into the CD-ROM. From the installer CD's, dll file that will be new.
If windows xp can request the required dll files from the installer CD, then what's the point to make a copy in hard disk? especially with the space used by backup dll file is quite large, can reach hundreds of megabytes. So you better remove it and use the space used by backup dll file for other purposes.
Follow the steps below to delete the backup dll files :
1. Click [Start] -> [All Program] -> [Accessories] -> [Windows Explorer]
2. At the address bar type c:\windows\system32\dllcache
3. Right Click at Folder, Click [Properties], and than uncheck the check option [Read Only]
4. Finally, delete all files that exist in the dllcache folder
Labels:
Tips dan Trik
Tuesday, February 17, 2009
Peek in the Chat Messenger
By default, Yahoo Messenger has a feature to record and display the chat that was conducted. If activated, the entire conversation is saved in an archive on the hard disk to be read again later.
Archives that are stored in the form of text files that can be accessed only if already logged into Yahoo Messenger. Archive, which can be viewed only records belonging to the account used to login to Yahoo Messenger.
While use the MSN and Yahoo Message Archiver Viewer, all the records that belong to the account used to login to Yahoo Messenger in one PC can be viewed without the need to login to Yahoo Messenger.
Indeed seem like detective yah? that's right. This software is made for parents who want to supervise the activities their children chat virtual world.
It's Easy usage only. The most important feature of recording in the archives in the Yahoo Messenger and MSN have been activated. By default, MSN and Yahoo Message Archive Viewer features enable recording archives, in both the MSN and Yahoo Messenger.
Install the software in your PC. And when has done, run and wait until the main window MSN and Yahoo Message Archive Viewer appears. Panel in the left side appeared a list of your Yahoo Messenger and MSN who have used the PC.
Click one of the account. As in Windows Explorer, under the name of the account appears the name or Yahoo ID MSN owned the people invited to chat. Click on a name, and chat between them appear.
The top right panel displays the date, account name, and people invited to chat. Click a date, and note down the right side panel. There on the day of the chat show, complete with day and date.
Note that this application should not be used to violate the privacy rights of others well, especially for the sin.
Archives that are stored in the form of text files that can be accessed only if already logged into Yahoo Messenger. Archive, which can be viewed only records belonging to the account used to login to Yahoo Messenger.
While use the MSN and Yahoo Message Archiver Viewer, all the records that belong to the account used to login to Yahoo Messenger in one PC can be viewed without the need to login to Yahoo Messenger.
Indeed seem like detective yah? that's right. This software is made for parents who want to supervise the activities their children chat virtual world.
It's Easy usage only. The most important feature of recording in the archives in the Yahoo Messenger and MSN have been activated. By default, MSN and Yahoo Message Archive Viewer features enable recording archives, in both the MSN and Yahoo Messenger.
Install the software in your PC. And when has done, run and wait until the main window MSN and Yahoo Message Archive Viewer appears. Panel in the left side appeared a list of your Yahoo Messenger and MSN who have used the PC.
Click one of the account. As in Windows Explorer, under the name of the account appears the name or Yahoo ID MSN owned the people invited to chat. Click on a name, and chat between them appear.
The top right panel displays the date, account name, and people invited to chat. Click a date, and note down the right side panel. There on the day of the chat show, complete with day and date.
Note that this application should not be used to violate the privacy rights of others well, especially for the sin.
Labels:
Tips dan Trik
Thursday, February 12, 2009
Getting Cash While Blogging
Did you know that make and have a blog not only for the creativity and inspiration only, but can also generate money. Besides the interesting article, we can also add links to the file can be downloaded in our blog.
One of the web server that provides free service to upload the file is ziddu. By becoming a member ziddu, we can save the files to our own server and put the link on our blog.
Indeed, the money given ziddu up the downloaded files is not much, but do not forget that the server service is free and without limit. Ziddu not limit how many files that you upload, it's benefits. Because you can upload as many as you want. The more interesting the file into your collection, the more people will download it also, and also the more money you will get.
It's so interesting, you can also do this by following the link.
Happy blogging.
One of the web server that provides free service to upload the file is ziddu. By becoming a member ziddu, we can save the files to our own server and put the link on our blog.
Indeed, the money given ziddu up the downloaded files is not much, but do not forget that the server service is free and without limit. Ziddu not limit how many files that you upload, it's benefits. Because you can upload as many as you want. The more interesting the file into your collection, the more people will download it also, and also the more money you will get.
It's so interesting, you can also do this by following the link.
Happy blogging.
Monday, February 2, 2009
Greatest Love Song MP3
LOVING & GIVING Album
1. You - by BASIL VALDEZ
2. Amayadori - by MAYUMI ITSUWA
3. Because of You - by KEITH MARTIN
4. Sorry seem to be the hardest word
5. Reality - by RICHARD SANDERSON
6. I'd still say yes - by KLYMAZZ
7. Can't take my eyes for you - by DENISE VAN OUTEN
8. You make me feel brand new - by REGINA
9. Almost Paradise - by MIKE RENO
10. Whip Appeal - by BABYFACE
11. When will I see you again - by THREE DEGRES
12. Word - by FR DAVID
13. Your Eyes - by COOK DA BOOK
14. Forever - KENNY L
15. Promise me - BEVERLY CRAVEN
Download full album click here
1. You - by BASIL VALDEZ
2. Amayadori - by MAYUMI ITSUWA
3. Because of You - by KEITH MARTIN
4. Sorry seem to be the hardest word
5. Reality - by RICHARD SANDERSON
6. I'd still say yes - by KLYMAZZ
7. Can't take my eyes for you - by DENISE VAN OUTEN
8. You make me feel brand new - by REGINA
9. Almost Paradise - by MIKE RENO
10. Whip Appeal - by BABYFACE
11. When will I see you again - by THREE DEGRES
12. Word - by FR DAVID
13. Your Eyes - by COOK DA BOOK
14. Forever - KENNY L
15. Promise me - BEVERLY CRAVEN
Download full album click here
Labels:
MP3 Song
Fonts Collection
I have several types of collection letters. Fair to add a collection of letters windows default standard. You can download it on the link below:
- Fonts Collection A~B
- Fonts Collection C~E
- Fonts Collection F~H
- Fonts Collection I~Q
- Fonts Collection R~Z
- Fonts Arabic Collection
- Fonts Collection A~B
- Fonts Collection C~E
- Fonts Collection F~H
- Fonts Collection I~Q
- Fonts Collection R~Z
- Fonts Arabic Collection
Labels:
Grafik
Internal Modem Motorola SM56 Driver
Several days ago, I do to improve the CPU with the re-install windows. And when completed, is one of the hardware that does not work because it has not been equipped with driver.
Hardware is the internal modem motorola sm56. I try to find the modem driver with internet browsing. There are some drivers that I downloaded from some website, and after I try to install, all drivers will not have a match.
I continue to try to find the modem driver until I finally get the original CD and the modem driver to work normally.
If you have the same difficulty, this driver may be able to help. And you can download it here.
Thank you.
Hardware is the internal modem motorola sm56. I try to find the modem driver with internet browsing. There are some drivers that I downloaded from some website, and after I try to install, all drivers will not have a match.
I continue to try to find the modem driver until I finally get the original CD and the modem driver to work normally.
If you have the same difficulty, this driver may be able to help. And you can download it here.
Thank you.
Labels:
Masukan
Friday, January 23, 2009
Wednesday, January 21, 2009
Women Celebrity Wallpapers (part.1)
I have many collection of celebrity wallpaper and I've got all from softarchive.net, here they are :
For more download click under here :
Jennifer Lamiraqui
Jennifer Hawkins
For more download click under here :
Jennifer Lamiraqui
Jennifer Hawkins
Labels:
Wallpaper
Subscribe to:
Posts (Atom)