Congratulations!

[Valid Atom 1.0] This is a valid Atom 1.0 feed.

Recommendations

This feed is valid, but interoperability with the widest range of feed readers could be improved by implementing the following recommendations.

Source: http://noteandnetbookinfo.blogspot.com/feeds/posts/default

  1. <?xml version='1.0' encoding='UTF-8'?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><feed xmlns='http://www.w3.org/2005/Atom' xmlns:openSearch='http://a9.com/-/spec/opensearchrss/1.0/' xmlns:blogger='http://schemas.google.com/blogger/2008' xmlns:georss='http://www.georss.org/georss' xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr='http://purl.org/syndication/thread/1.0'><id>tag:blogger.com,1999:blog-292187291299044311</id><updated>2024-02-07T22:24:26.949-08:00</updated><category term="for detail klik here"/><category term="info"/><category term="hacker&#39;s"/><category term="security"/><category term="news"/><category term="note and net"/><category term="solutions"/><category term="tips note/netbook"/><category term="win"/><category term="virus"/><category term="Online criminals"/><category term="intel"/><title type='text'>note and netbook info</title><subtitle type='html'></subtitle><link rel='http://schemas.google.com/g/2005#feed' type='application/atom+xml' href='http://noteandnetbookinfo.blogspot.com/feeds/posts/default'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/292187291299044311/posts/default'/><link rel='alternate' type='text/html' href='http://noteandnetbookinfo.blogspot.com/'/><link rel='hub' href='http://pubsubhubbub.appspot.com/'/><link rel='next' type='application/atom+xml' href='http://www.blogger.com/feeds/292187291299044311/posts/default?start-index=26&amp;max-results=25'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><generator version='7.00' uri='http://www.blogger.com'>Blogger</generator><openSearch:totalResults>70</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><entry><id>tag:blogger.com,1999:blog-292187291299044311.post-1507559969810721647</id><published>2010-03-17T15:25:00.000-07:00</published><updated>2010-03-17T15:29:23.823-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="info"/><title type='text'>NetBackup Feature.</title><content type='html'>&lt;span style=&quot;font-family: verdana;font-size:85%;&quot; &gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;NetBackup Feature Deduplikasi Rely 7. &lt;/span&gt;&lt;br /&gt;Symantec, as one of the world-class security company, today announced NetBackup 7. These applications are claimed to protect, preserve, and restore the information.&lt;br /&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgjFbw5KztlHoipXqZNR3NQmD4EfGtRrHzo4WHQAjqXyPeym1xwtBMzf-SoiMvfEqHp6tp1gU5yNBQv-WNOnHSHSs36jHmlolcTkYhNkHnMVHbAMPqBizOSsE94-e0Z5B8YX3O7wdBBqqgM/s1600-h/untitled.bmp&quot;&gt;&lt;img style=&quot;margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 389px; height: 104px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgjFbw5KztlHoipXqZNR3NQmD4EfGtRrHzo4WHQAjqXyPeym1xwtBMzf-SoiMvfEqHp6tp1gU5yNBQv-WNOnHSHSs36jHmlolcTkYhNkHnMVHbAMPqBizOSsE94-e0Z5B8YX3O7wdBBqqgM/s400/untitled.bmp&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5449733297066764754&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;Symantec has also included features on deduplikasi this application. Symantec promises integration deduplikasi anywhere, either in the client devices, media servers, and third-party hardware devices.&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;font-family: verdana;font-size:85%;&quot; class=&quot;fullpost&quot; &gt;&lt;br /&gt;With NetBackup 7, Symantec brings deduplikasi strategies anywhere. This strategy can help the company claimed to reduce storage consumption. By integrating deduplikasi closer to the source of data on client devices, increase the NetBackup backup speed and efficiency in branch offices, data centers and virtual environments, and reduce network traffic by 90%. Deduplikasi that integrated with the client to make additional hardware and special configurations are not needed because customers only need to upgrade to the latest version to realize savings in storage.&lt;br /&gt;&lt;br /&gt;NetBackup simplifies data protection of virtual servers with a standard backup Hyper-V and VMware. Featured is claimed to increase the speed of backups via deduplikasi virtual environments and small-scale backup technology at block level, and presenting a single file recovery capabilities efficiently.&lt;br /&gt;&lt;br /&gt;In 2010 State Of The Data Center survey, company / organization called granular recovery of virtual image as the biggest challenge in the virtual machine data protection. Symantec includes these features to bring recovery from backup files in the small-scale block level for lingungan VMware vSphere and easy recovery for individual files or folders from the backup image on a virtual machine on Hyper-V.&lt;br /&gt;&lt;br /&gt;To help customers centrally manage their data protection environment and presents a single view of backup and recovery operations to them, 7 introduces NetBackup reporting and management console, called integrated OpsCenter. This new console to standardize monitoring and reporting of backup and archive information for the main products Symantec, including NetBackup, NetBackup PureDisk, Backup Exec and Enterprise Vault.&lt;br /&gt;&lt;br /&gt;Symantec NetBackup 7 available globally on February 1, 2010 at a price of U.S. $ 4,995 USD for an Enterprise Server license and five client.&lt;br /&gt;&lt;/span&gt;</content><link rel='replies' type='application/atom+xml' href='http://noteandnetbookinfo.blogspot.com/feeds/1507559969810721647/comments/default' title='Posting Komentar'/><link rel='replies' type='text/html' href='http://noteandnetbookinfo.blogspot.com/2010/03/netbackup-feature.html#comment-form' title='0 Komentar'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/292187291299044311/posts/default/1507559969810721647'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/292187291299044311/posts/default/1507559969810721647'/><link rel='alternate' type='text/html' href='http://noteandnetbookinfo.blogspot.com/2010/03/netbackup-feature.html' title='NetBackup Feature.'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgjFbw5KztlHoipXqZNR3NQmD4EfGtRrHzo4WHQAjqXyPeym1xwtBMzf-SoiMvfEqHp6tp1gU5yNBQv-WNOnHSHSs36jHmlolcTkYhNkHnMVHbAMPqBizOSsE94-e0Z5B8YX3O7wdBBqqgM/s72-c/untitled.bmp" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-292187291299044311.post-4343422929211446114</id><published>2010-03-10T05:45:00.000-08:00</published><updated>2010-03-10T05:53:15.937-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="news"/><title type='text'>delaying production</title><content type='html'>&lt;span style=&quot;;font-family:verdana;font-size:85%;&quot;  &gt;Lenovo and Samsung delaying production of the first ion-powered netbooks.&lt;br /&gt;&lt;br /&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgEBIJsM8SMiNyQ0fAAnmtEFIfI3yxOF_w2xgm71zbvwqbuLOIc474KgDZm9G5IdlRY9GEZkPytg2Vuub4TJDXhyVM73mh2ZcCbBAS0gNGPXV8GZZ0JekAhPB-gMw4jhx3xvxvPP88cFsKn/s1600-h/2.jpg&quot;&gt;&lt;img style=&quot;margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 340px; height: 172px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgEBIJsM8SMiNyQ0fAAnmtEFIfI3yxOF_w2xgm71zbvwqbuLOIc474KgDZm9G5IdlRY9GEZkPytg2Vuub4TJDXhyVM73mh2ZcCbBAS0gNGPXV8GZZ0JekAhPB-gMw4jhx3xvxvPP88cFsKn/s400/2.jpg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5447001582213901218&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;Launched from a number of technology news website, Lenovo will certainly delay the launch of a new Netbook, the IdeaPad S12 has many anticipated. Nvidia-powered netbook tough Ion planned to wait for Windows 7 was launched officially released to the market that is estimated to fall around the month of October. Lenovo plans to make the S12 as the first Netbook that is supported by the latest technology, Nvidia Ion, and the greatness Windows 7 will further add to the flavor of this Netbook.&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;;font-family:verdana;font-size:85%;&quot; class=&quot;fullpost&quot;  &gt;&lt;br /&gt;But if Lenovo plans to make the S12 as a first ion-powered Netbook will run smoothly with his decision to wait until Windows 7 is released? Because the company also confirmed the neighbors will do the same plan, one of Samsung&#39;s rival Lenovo also plans to launch ion-based N510 at the same time with the S12. Samsung also revealed that his side will provide only N510 with the latest operating systems, namely Windows 7.&lt;br /&gt;&lt;br /&gt;Both companies seemed to force the consumer Netbook who want to buy a new Netbook to wait two &quot;new model&quot; was released on the market, consumers chapters will think twice to buy a Netbook with Vista operating system, because later on when Windows 7 is released they should be upgrade process is inconvenient for some people. It&#39;s easier to buy a laptop with the desired operating system already installed in it.&lt;br /&gt;&lt;/span&gt;</content><link rel='replies' type='application/atom+xml' href='http://noteandnetbookinfo.blogspot.com/feeds/4343422929211446114/comments/default' title='Posting Komentar'/><link rel='replies' type='text/html' href='http://noteandnetbookinfo.blogspot.com/2010/03/delaying-production.html#comment-form' title='0 Komentar'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/292187291299044311/posts/default/4343422929211446114'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/292187291299044311/posts/default/4343422929211446114'/><link rel='alternate' type='text/html' href='http://noteandnetbookinfo.blogspot.com/2010/03/delaying-production.html' title='delaying production'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgEBIJsM8SMiNyQ0fAAnmtEFIfI3yxOF_w2xgm71zbvwqbuLOIc474KgDZm9G5IdlRY9GEZkPytg2Vuub4TJDXhyVM73mh2ZcCbBAS0gNGPXV8GZZ0JekAhPB-gMw4jhx3xvxvPP88cFsKn/s72-c/2.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-292187291299044311.post-8701092133779905468</id><published>2010-03-10T05:33:00.000-08:00</published><updated>2010-03-13T15:38:16.392-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="news"/><title type='text'>Nickelodeon Netbook from Dell.</title><content type='html'>&lt;span style=&quot;font-family: verdana;font-family:verdana;font-size:85%;&quot;  &gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjxBOQwsHtOx8VTvxpqfg7BjVkNVniRUEgRpOIP4Urd1xyvsTIJAR0pYLtkuiJlz4vbhieKQVJ1_xhFxyUwxlKnQVJX2sRks8f-Q8Vr0HTo0bExobBXmVS_gN4Oan0T3A0Ktwz3pzBdtB6F/s1600-h/2.jpg&quot;&gt;&lt;img style=&quot;margin: 0pt 10px 10px 0pt; float: left; cursor: pointer; width: 129px; height: 112px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjxBOQwsHtOx8VTvxpqfg7BjVkNVniRUEgRpOIP4Urd1xyvsTIJAR0pYLtkuiJlz4vbhieKQVJ1_xhFxyUwxlKnQVJX2sRks8f-Q8Vr0HTo0bExobBXmVS_gN4Oan0T3A0Ktwz3pzBdtB6F/s400/2.jpg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5446998299093837042&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;If the number of computer companies have seen little new Netbook published lately, it seems mistaken assumption. Netbook that in recent years continued to rule the market seems as though the computer would not release its dominance.&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;font-family: verdana;font-family:verdana;font-size:85%;&quot; class=&quot;fullpost&quot;  &gt;Recently, the giant computer company Dell has agreed to cooperate with one of the TV programs children Nickelodeon to produce a new netbooks will show, Nickelodeon Edition Inspiron Mini Netbook. Yes, exactly, these netbooks are deliberately being targeted to the user Netbook children. Because of the fact that over time, enthusiastic children to participate can enjoy greater Netbook.&lt;br /&gt;&lt;br /&gt;Total designed really for the kids, Nickelodeon&#39;s Inspiron Mini Netbook Edition is filled with impressions of education and entertainment typical Nickelodeon. Dell also did not forget to include the parent monitoring system which includes therein. That is to say this Netbook is safe for children and able to support the learning for them.&lt;br /&gt;&lt;br /&gt;&quot;Moms insisted that we deliver on three things when it comes to a computer for their children, First, help provide a safe computing experience. Second, provide superior educational content as well as a world-class entertainment experience. Third, partners with trusted brands. The Dell Inspiron Mini Nickelodeon Edition passes with flying colors on all counts. &quot;As noted Michael Tatelman, Vice President of Dell Global Consumer Sales and Marketing which describes the greatness that Dell&#39;s latest Netbook.&lt;br /&gt;&lt;br /&gt;Your child can choose colors like green Slime Nickelodeon basic colors, or can also choose the color theme or iCarly SpongeBob SquarePants. Overall it looks really describe the world of Nickelodeon in a Netbook.&lt;br /&gt;&lt;br /&gt;Nickelodeon show talk was their response when asked about this Netbook&lt;br /&gt;&quot;With the Dell Inspiron Mini Nickelodeon Edition, we want to provide today&#39;s tech-savvy kids with a creative, fun tool to help kids excel while learning and entertaining themselves on the computer. Simultaneously, we want to give parents Ensure features to help their kids are safe online. &quot;They firmly rejected if the product is synchronized with the toys,&quot; this really is not a toy. This is the real deal &quot;they said.&lt;br /&gt;&lt;br /&gt;With a 10.1 inch screen specifications, this lightweight Netbook removed from the previous series is Dell&#39;s Inspiron Mini Netbook 10V, with Wi-Fi, Nicelodeon themed interface, direct access to the Nickelodeon website, and some other interesting educational applications, these netbooks could certainly be very useful for your child.&lt;br /&gt;&lt;br /&gt;But unfortunately there is no official price for this funny Netbook, the information I can, Netbook is marketed in the United States from October, and also of course can be booked directly through Dell&#39;s online store.&lt;br /&gt;&lt;/span&gt;</content><link rel='replies' type='application/atom+xml' href='http://noteandnetbookinfo.blogspot.com/feeds/8701092133779905468/comments/default' title='Posting Komentar'/><link rel='replies' type='text/html' href='http://noteandnetbookinfo.blogspot.com/2010/03/nickelodeon-netbook-from-dell.html#comment-form' title='0 Komentar'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/292187291299044311/posts/default/8701092133779905468'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/292187291299044311/posts/default/8701092133779905468'/><link rel='alternate' type='text/html' href='http://noteandnetbookinfo.blogspot.com/2010/03/nickelodeon-netbook-from-dell.html' title='Nickelodeon Netbook from Dell.'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjxBOQwsHtOx8VTvxpqfg7BjVkNVniRUEgRpOIP4Urd1xyvsTIJAR0pYLtkuiJlz4vbhieKQVJ1_xhFxyUwxlKnQVJX2sRks8f-Q8Vr0HTo0bExobBXmVS_gN4Oan0T3A0Ktwz3pzBdtB6F/s72-c/2.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-292187291299044311.post-1722766769903429486</id><published>2010-03-10T05:28:00.000-08:00</published><updated>2010-03-13T15:41:12.166-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="news"/><title type='text'>When is a netbook for free?</title><content type='html'>&lt;span style=&quot;font-family: verdana;font-family:verdana;font-size:85%;&quot;  &gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEji27XDUpXvjPXJOKNB7tsnaow_fpmxZJcaNGeuoJOPoR1xqOcUD31GXGpicE-zzyNq3H3M0UGU8Rij_Wt_ZpiwHtXqVulDBrHh-ku1cycH-bqnbWrRbZPqYygkNGKjFx670JaNPk55mY85/s1600-h/2.jpg&quot;&gt;&lt;img style=&quot;margin: 0pt 0pt 10px 10px; float: right; cursor: pointer; width: 132px; height: 93px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEji27XDUpXvjPXJOKNB7tsnaow_fpmxZJcaNGeuoJOPoR1xqOcUD31GXGpicE-zzyNq3H3M0UGU8Rij_Wt_ZpiwHtXqVulDBrHh-ku1cycH-bqnbWrRbZPqYygkNGKjFx670JaNPk55mY85/s400/2.jpg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5446997231247663746&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;Certainly we never crossed dipikiran question, although it is not possible. But there is a director of the institute Linux Foundation, Jim Zemlin is suggested and strongly supports the existence of free Netbook program.&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;font-family: verdana;font-family:verdana;font-size:85%;&quot; class=&quot;fullpost&quot;  &gt;What the article, Jim Zemlin argued that digratiskan or not any real fixed telecommunications companies will make a profit, or at least give a big discount on the Linux-based Netbook.&lt;br /&gt;&lt;br /&gt;Because basically, if minded telecommunications companies to provide to the consumer Netbook free or give discounts on large contracts with a clause that must be fulfilled by the consumer, it is not impossible that the telecommunications company&#39;s customers can reap a lot of customers. Even more than the cost of service subscription and purchase of applications made by customers.&lt;br /&gt;&lt;br /&gt;Still too heavy? Telecommunications companies may also have reduced production costs Netbook with Linux operating system is free compared to using Windows XP. That consumers are happy with a very low price and even free and telecommunications companies also satisfied with the increase in customers who can bring benefits to the company folded.&lt;br /&gt;&lt;br /&gt;For instance in the United States also has many telecommunications companies that provide large discounts smartphone devices and even eliminate certain contract customers must be met. And this fact also can be done to Netbook devices.&lt;br /&gt;&lt;/span&gt;</content><link rel='replies' type='application/atom+xml' href='http://noteandnetbookinfo.blogspot.com/feeds/1722766769903429486/comments/default' title='Posting Komentar'/><link rel='replies' type='text/html' href='http://noteandnetbookinfo.blogspot.com/2010/03/when-is-netbook-for-free.html#comment-form' title='0 Komentar'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/292187291299044311/posts/default/1722766769903429486'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/292187291299044311/posts/default/1722766769903429486'/><link rel='alternate' type='text/html' href='http://noteandnetbookinfo.blogspot.com/2010/03/when-is-netbook-for-free.html' title='When is a netbook for free?'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEji27XDUpXvjPXJOKNB7tsnaow_fpmxZJcaNGeuoJOPoR1xqOcUD31GXGpicE-zzyNq3H3M0UGU8Rij_Wt_ZpiwHtXqVulDBrHh-ku1cycH-bqnbWrRbZPqYygkNGKjFx670JaNPk55mY85/s72-c/2.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-292187291299044311.post-7719004803341989780</id><published>2010-03-10T05:19:00.000-08:00</published><updated>2010-03-13T15:49:01.921-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="news"/><title type='text'>Samsung Netbook.</title><content type='html'>&lt;span style=&quot;;font-family:verdana;font-size:85%;&quot;  &gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiEeToM39MGPxKwns-Wf_FAmmVblPCDEWhfNZ-mP6r9FLbfsULx7ZtdXzPgRV40yVUc-0WNfNxaxu7JUMDyu7qB9PUAW1MB7ISNl4JuuBvqcovyg6mND8SlUHY7jY-iEY-zGWuw3980t-j1/s1600-h/1.jpg&quot;&gt;&lt;span style=&quot;&quot;&gt;&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;&quot;&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg8ISDznVFPovdaZD1658yJYEQduhhta7c81SXbxbu1gCDTIionhG2rPkatsPtMfxEW3asgVm0xd6_FrGIKRqeLKVP2iG1zehZX1Xo2SQtSIYVEfEzQ1ph0XAe6e8MVRtcUaTxzL3DBU68_/s1600-h/2.jpg&quot;&gt;&lt;img style=&quot;margin: 0pt 10px 10px 0pt; float: left; cursor: pointer; width: 108px; height: 101px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg8ISDznVFPovdaZD1658yJYEQduhhta7c81SXbxbu1gCDTIionhG2rPkatsPtMfxEW3asgVm0xd6_FrGIKRqeLKVP2iG1zehZX1Xo2SQtSIYVEfEzQ1ph0XAe6e8MVRtcUaTxzL3DBU68_/s400/2.jpg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5446995864149989186&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;;font-family:verdana;font-size:85%;&quot;  &gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Samsung Netbook with Nvidia graphics cards. &lt;/span&gt;&lt;br /&gt;Samsung provides a little surprise for consumers, after quite a long absence in the Netbook market, is now carrying the Samsung Netbook comes with Nvidia&#39;s performance in it. And certainly these netbooks will be missed drugs for most fans of Sony Ericsson.&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;;font-family:verdana;font-size:85%;&quot; class=&quot;fullpost&quot;  &gt;Netbook which will soon be in circulation was N510, dynamic Netbook with 11.6-inch screen wrapped in a glossy black design look elegant. Although Samsung is not too strong name in the Netbook market, but the seriousness of Samsung to pamper the consumer Netbook can be seen from the side of the N510. N510 scheduled to leave with Intel Atom N280 processor 1.66GHz and 1GB of RAM to go with Nvidia 9400M ION G2Force inherent in this device. While on the other bench is 160GB HDD storagenya system, is perfectly adequate for the device Netbook class.&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;;font-family:verdana;font-size:85%;&quot; class=&quot;fullpost&quot;  &gt;On deck multimedia N510 Samsung also escorted by sejumkah features like Wi-Fi, webcam, card reader and 3-in-1. So you can upload any photo or through any media, anywhere. Not only that, so that users can continue to enjoy the features of this N510, Samsung directly paired 6-cell battery on the back, so do not need to keep charge for this Netbook.&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;;font-family:verdana;font-size:85%;&quot;  &gt;&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;;font-family:verdana;font-size:85%;&quot; class=&quot;fullpost&quot;  &gt;Meanwhile, to support compatibility, N510 will be provided with OS Windows XP Home Edition. Feeling behind the times? Do not be afraid, the Samsung sure if Windows 7 is completely released, guaranteed N510 can still run it.&lt;br /&gt;&lt;/span&gt;</content><link rel='replies' type='application/atom+xml' href='http://noteandnetbookinfo.blogspot.com/feeds/7719004803341989780/comments/default' title='Posting Komentar'/><link rel='replies' type='text/html' href='http://noteandnetbookinfo.blogspot.com/2010/03/samsung-netbook.html#comment-form' title='0 Komentar'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/292187291299044311/posts/default/7719004803341989780'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/292187291299044311/posts/default/7719004803341989780'/><link rel='alternate' type='text/html' href='http://noteandnetbookinfo.blogspot.com/2010/03/samsung-netbook.html' title='Samsung Netbook.'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg8ISDznVFPovdaZD1658yJYEQduhhta7c81SXbxbu1gCDTIionhG2rPkatsPtMfxEW3asgVm0xd6_FrGIKRqeLKVP2iG1zehZX1Xo2SQtSIYVEfEzQ1ph0XAe6e8MVRtcUaTxzL3DBU68_/s72-c/2.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-292187291299044311.post-2813843431482010834</id><published>2010-03-05T15:49:00.000-08:00</published><updated>2010-03-13T15:45:39.796-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="note and net"/><title type='text'>Acer Aspire 5738PG Touch.</title><content type='html'>&lt;span style=&quot;font-family: verdana;font-family:verdana;font-size:85%;&quot;  &gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhYfUosQ76M3G4aH8A9zQUpTD7Tb1ZsjnSdnXimu6ha_kfPZIhESTu-l2FIhRPNtwK8O1e7kshfMghHfy_hzmO5j0WBe9WZZKvI_CdXOX3dQZmKAR3ZwctxRnW7AtHsdqBbrakW-cys9YUU/s1600-h/1.jpg&quot;&gt;&lt;img style=&quot;margin: 0pt 0pt 10px 10px; float: right; cursor: pointer; width: 142px; height: 113px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhYfUosQ76M3G4aH8A9zQUpTD7Tb1ZsjnSdnXimu6ha_kfPZIhESTu-l2FIhRPNtwK8O1e7kshfMghHfy_hzmO5j0WBe9WZZKvI_CdXOX3dQZmKAR3ZwctxRnW7AtHsdqBbrakW-cys9YUU/s400/1.jpg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5445302141492569938&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;Late and post-launch of Windows 7, touch screen-based products flooding the market. Understandably, one of the flagship features of Windows 7 was better support for the touch screen. But that does not mean talkative if Acer released the Aspire 5738PG Touch, 15.6-inch notebook that supports the touch screen.&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;font-family: verdana;font-family:verdana;font-size:85%;&quot; class=&quot;fullpost&quot;  &gt;According to Acer, this notebook has been prepared well before Windows 7 is released. This is evidenced by the existence of a special interface called TouchPortal, so that this notebook does not rely on the touch screen features in Windows 7 alone.&lt;br /&gt;&lt;br /&gt;TouchPortal itself is a unique interface. To open it, you just pulled scraps of paper shaped area on the desktop. When that is done, open family room-shaped interface. Here is the menu icon is represented by a variety of unique and creative. For example the media player is represented by a display of CDs, image viewer shaped patch size, and the Internet Explorer logo-shaped frame with IE. If you want to play a song, you simply pull the CD-shaped icon to the main screen and will be posted a collection of songs contained in the notebook. Really creative.&lt;br /&gt;&lt;br /&gt;But frankly, we were not too eager to try notebook sail touch. The reason is, we have tried a few notebooks and sail touch screen is often frustrated with the lack of precision and responsiveness. However, this notebook was able to captivate us. Touch-screen Aspire 5738PG able to provide good responsiveness, especially since support for multi-touch. Problem precision is still a problem because we have to press several times to select the Close button. But the majority of the finger movement is detected by the screen so the touch screen experience that feels good; best of all notebook touch sailing we&#39;ve ever tried.&lt;br /&gt;&lt;br /&gt;Outside the touch screen capabilities, Acer Aspire notebook is also true 5738PG with reliable energy. Using an Intel Core 2 Duo P8700 (2.53 GHz) assisted DDR2-800MHz memory is 4GB, this notebook&#39;s performance was very rushed. In addition, this notebook uses the ATI Mobility Radeon HD4570 with 512MB memory, which allows this notebook to play games today. Test results also show that (see table). Battery endurance was not too long, but reasonable for large-powered notebook like the Aspire 5738PG this.&lt;br /&gt;&lt;br /&gt;In terms of facilities, this notebook performed quite complete because of the presence HDMI, fingerprint scanner, card reader, 8X DVD Writer, gigabit ethernet, camera, and 4 USB ports. If something is missing is the absence of external SATA ports.&lt;br /&gt;&lt;/span&gt;</content><link rel='replies' type='application/atom+xml' href='http://noteandnetbookinfo.blogspot.com/feeds/2813843431482010834/comments/default' title='Posting Komentar'/><link rel='replies' type='text/html' href='http://noteandnetbookinfo.blogspot.com/2010/03/acer-aspire-5738pg-touch_05.html#comment-form' title='0 Komentar'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/292187291299044311/posts/default/2813843431482010834'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/292187291299044311/posts/default/2813843431482010834'/><link rel='alternate' type='text/html' href='http://noteandnetbookinfo.blogspot.com/2010/03/acer-aspire-5738pg-touch_05.html' title='Acer Aspire 5738PG Touch.'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhYfUosQ76M3G4aH8A9zQUpTD7Tb1ZsjnSdnXimu6ha_kfPZIhESTu-l2FIhRPNtwK8O1e7kshfMghHfy_hzmO5j0WBe9WZZKvI_CdXOX3dQZmKAR3ZwctxRnW7AtHsdqBbrakW-cys9YUU/s72-c/1.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-292187291299044311.post-3626873821476321102</id><published>2010-03-03T00:41:00.000-08:00</published><updated>2010-03-03T01:21:54.538-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="info"/><title type='text'>Google&#39;s Tambal Buzz.</title><content type='html'>&lt;span style=&quot;font-family: verdana;font-size:85%;&quot; &gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiM3_iEgCV9GhX869-KUaUSRJU9UiwPFrosbttJAqJQeiUYGB7txUBr17ZM2zO8SWeKYFOL6mSjeqowiifFnlUZZOKY3BkiCwLUfSFbkLzYt9c0ymNXL41NH9eq4C36M5ZIsSvyYFeZlK0E/s1600-h/1.jpg&quot;&gt;&lt;img style=&quot;margin: 0pt 10px 10px 0pt; float: left; cursor: pointer; width: 127px; height: 75px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiM3_iEgCV9GhX869-KUaUSRJU9UiwPFrosbttJAqJQeiUYGB7txUBr17ZM2zO8SWeKYFOL6mSjeqowiifFnlUZZOKY3BkiCwLUfSFbkLzYt9c0ymNXL41NH9eq4C36M5ZIsSvyYFeZlK0E/s400/1.jpg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5444335246339537666&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;Google has patched the hole in the Google Buzz on Tuesday (16 / 2), several hours after the SecTheory reported that the security hole. &quot;We did not find that the gap was already used,&quot; explained a press release sent by Google to the journalists.&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;font-family: verdana;font-size:85%;&quot; class=&quot;fullpost&quot; &gt;&lt;br /&gt;Security hole that is allowing criminals to enter the code made to the Google website. Criminals can also take over the account person and do anything with that account. They also can fool Google users to provide login information to the phishing techniques.&lt;br /&gt;&lt;br /&gt;Google said it will continue to develop Google Buzz security. &quot;We realize the importance of security of our users,&quot; explains Google in a press release.&lt;br /&gt;&lt;/span&gt;</content><link rel='replies' type='application/atom+xml' href='http://noteandnetbookinfo.blogspot.com/feeds/3626873821476321102/comments/default' title='Posting Komentar'/><link rel='replies' type='text/html' href='http://noteandnetbookinfo.blogspot.com/2010/03/googles-tambal-buzz.html#comment-form' title='0 Komentar'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/292187291299044311/posts/default/3626873821476321102'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/292187291299044311/posts/default/3626873821476321102'/><link rel='alternate' type='text/html' href='http://noteandnetbookinfo.blogspot.com/2010/03/googles-tambal-buzz.html' title='Google&#39;s Tambal Buzz.'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiM3_iEgCV9GhX869-KUaUSRJU9UiwPFrosbttJAqJQeiUYGB7txUBr17ZM2zO8SWeKYFOL6mSjeqowiifFnlUZZOKY3BkiCwLUfSFbkLzYt9c0ymNXL41NH9eq4C36M5ZIsSvyYFeZlK0E/s72-c/1.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-292187291299044311.post-312186912901876669</id><published>2010-03-03T00:36:00.000-08:00</published><updated>2010-03-13T15:47:40.404-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="info"/><title type='text'>Microsoft.</title><content type='html'>&lt;span style=&quot;;font-family:verdana;font-size:85%;&quot;  &gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjDh6u7et0Pc8qSXfPgGLjPxpSdvp45Q94qdKHdJA7emSK7-f0ffw-dg8FGns2Y-DI3CGgoSrBangLdLVgd6uTl3hJy0hha4kYVjYHdeG7FWvZRoyzYut8sIFllBqqSBdURmInfZVgYUkAs/s1600-h/1.jpg&quot;&gt;&lt;img style=&quot;margin: 0pt 10px 10px 0pt; float: left; cursor: pointer; width: 96px; height: 93px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjDh6u7et0Pc8qSXfPgGLjPxpSdvp45Q94qdKHdJA7emSK7-f0ffw-dg8FGns2Y-DI3CGgoSrBangLdLVgd6uTl3hJy0hha4kYVjYHdeG7FWvZRoyzYut8sIFllBqqSBdURmInfZVgYUkAs/s400/1.jpg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5444324657598861730&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;In the brand&#39;s popularity, Microsoft Salip Google.&lt;/span&gt;&lt;br /&gt;Microsoft finally managed to overtake Google in the survey about the popularity of the brand in the UK Superbrands. The annual survey included 500 business brands in the UK and terpuncak put Microsoft on top rival, Google. Google is there at the top in 2009, fell from his pedestal to the fifth position.&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;;font-family:verdana;font-size:85%;&quot; class=&quot;fullpost&quot;  &gt;10 great position in the survey revealed three technology companies. This amount is one less than in 2009. Nokia and Sony have been evicted by the Blackberry, which jumawa in third position.&lt;br /&gt;&lt;br /&gt;Technology companies usually get a good position in this survey, mainly because of the nature of the stop-shop product. You are more likely to use Microsoft or Google&#39;s products than Virgin Atlantic, which in the survey was in position between the Blackberry and Google.&lt;br /&gt;&lt;br /&gt;The survey itself is trying to find out what brands are strongly embedded in certain communities and measure the effectiveness of marketing departmene respectively. But it is surprising to see Apple have also entered into the major leagues. But since that was consulted business people, maybe they were not captivated by the brand.&lt;br /&gt;&lt;/span&gt;</content><link rel='replies' type='application/atom+xml' href='http://noteandnetbookinfo.blogspot.com/feeds/312186912901876669/comments/default' title='Posting Komentar'/><link rel='replies' type='text/html' href='http://noteandnetbookinfo.blogspot.com/2010/03/microsoft.html#comment-form' title='0 Komentar'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/292187291299044311/posts/default/312186912901876669'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/292187291299044311/posts/default/312186912901876669'/><link rel='alternate' type='text/html' href='http://noteandnetbookinfo.blogspot.com/2010/03/microsoft.html' title='Microsoft.'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjDh6u7et0Pc8qSXfPgGLjPxpSdvp45Q94qdKHdJA7emSK7-f0ffw-dg8FGns2Y-DI3CGgoSrBangLdLVgd6uTl3hJy0hha4kYVjYHdeG7FWvZRoyzYut8sIFllBqqSBdURmInfZVgYUkAs/s72-c/1.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-292187291299044311.post-8234909084018630272</id><published>2010-02-28T00:23:00.000-08:00</published><updated>2010-02-28T00:25:50.582-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="win"/><title type='text'>Windows 7 Could Without Internet Explorer.</title><content type='html'>&lt;span style=&quot;font-family: verdana;font-size:85%;&quot; &gt;Windows 7 will include a new feature that will allow users to turn off Internet Explorer and innate programs such as Microsoft Windows Media Player.&lt;br /&gt;&lt;br /&gt;Apparently microsoft does not want to get a case that happened some time ago and accused by producers monopolize the software market by providing software All in One facility in operating systems.&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;font-family: verdana;font-size:85%;&quot; class=&quot;fullpost&quot; &gt;&lt;br /&gt;This new design will allow users to remove Internet Explorer and other programs that are not needed from the desktop.&lt;br /&gt;&lt;/span&gt;</content><link rel='replies' type='application/atom+xml' href='http://noteandnetbookinfo.blogspot.com/feeds/8234909084018630272/comments/default' title='Posting Komentar'/><link rel='replies' type='text/html' href='http://noteandnetbookinfo.blogspot.com/2010/02/windows-7-could-without-internet.html#comment-form' title='2 Komentar'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/292187291299044311/posts/default/8234909084018630272'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/292187291299044311/posts/default/8234909084018630272'/><link rel='alternate' type='text/html' href='http://noteandnetbookinfo.blogspot.com/2010/02/windows-7-could-without-internet.html' title='Windows 7 Could Without Internet Explorer.'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>2</thr:total></entry><entry><id>tag:blogger.com,1999:blog-292187291299044311.post-2994918554226487967</id><published>2010-02-28T00:20:00.000-08:00</published><updated>2010-02-28T00:23:29.066-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="win"/><title type='text'>Enabling Themes Hidden Windows 7.</title><content type='html'>&lt;span style=&quot;font-family: verdana;font-size:85%;&quot; &gt;By default, Windows 7 has 7 themes that we can use to enhance your desktop display, which consists of 1 with 1 wallpaper themes, and 6 others with multiple themes that can change wallpaper automatically in a certain time. This feature can help reduce the saturation when we use computers.&lt;br /&gt;&lt;br /&gt;It turned out that apart from the 7 themes provided by Windows 7, there are a few more themes that have been hidden by the operating system is microsoft output. I do not know what the motivation is to encourage the manufacturer to hide these additional themes.&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;font-family: verdana;font-size:85%;&quot; class=&quot;fullpost&quot; &gt;&lt;br /&gt;To activate this hidden theme, we can use applications such assistance programs tweaks for Windows 7. But there are the traditional way without any additional programs to enable.&lt;br /&gt;&lt;br /&gt;Here&#39;s..&lt;br /&gt;&lt;br /&gt;  1. Open Windows Explorer. For convenience, use the keyboard shortcut by pressing Windows Logo + E&lt;br /&gt;  2. Once Windows Explorer opens, click the Organize button (on the right of the Windows Explorer window), and select Folder and search options. It will appear Folder Options window.&lt;br /&gt;  3. Click the View tab, and then see the Advanced Settings column. In this column, select the phrase &quot;Show hidden files, folders, or drives&quot; and remove the check mark on the phrase &quot;Hide protected operating system files (Recommended)&quot; and press OK.&lt;br /&gt;  4. Back to Windows Explorer and open the folder Windows \ Globalization \ MCT, in this folder there are 5 folders of MCT-AU, CA, GB, U.S., ZA.&lt;br /&gt;  5. Open MCT-AU folder and open the theme folder. Click 2x on the AU files, then automatically, the theme will change. Do well on all the other folders CA, GB, U.S., ZA. If successful, there will be an additional 5 new theme.&lt;br /&gt;  6. To see the theme installed, right-click on the desktop and select Properties.&lt;br /&gt;&lt;/span&gt;</content><link rel='replies' type='application/atom+xml' href='http://noteandnetbookinfo.blogspot.com/feeds/2994918554226487967/comments/default' title='Posting Komentar'/><link rel='replies' type='text/html' href='http://noteandnetbookinfo.blogspot.com/2010/02/enabling-themes-hidden-windows-7.html#comment-form' title='0 Komentar'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/292187291299044311/posts/default/2994918554226487967'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/292187291299044311/posts/default/2994918554226487967'/><link rel='alternate' type='text/html' href='http://noteandnetbookinfo.blogspot.com/2010/02/enabling-themes-hidden-windows-7.html' title='Enabling Themes Hidden Windows 7.'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-292187291299044311.post-1244312834237407643</id><published>2010-02-28T00:16:00.000-08:00</published><updated>2010-02-28T00:20:19.171-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="win"/><title type='text'>Optimizing Windows 7 on netbooks.</title><content type='html'>&lt;span style=&quot;font-family: verdana;font-size:85%;&quot; &gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh1edKbtmK6l59V0H9XdhuGPmqEvOs44iy8woHpio1cuvZRR4QzApnHd_z8Bm-umFMuJ7JzUO1gcaEd-hI46ws7DmNgt6URg-jeKeEg1YFl8YzK51MAnBsc7-T6a-2rZwyz-Ui112nylTLI/s1600-h/images.jpg&quot;&gt;&lt;img style=&quot;margin: 0pt 10px 10px 0pt; float: left; cursor: pointer; width: 123px; height: 123px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh1edKbtmK6l59V0H9XdhuGPmqEvOs44iy8woHpio1cuvZRR4QzApnHd_z8Bm-umFMuJ7JzUO1gcaEd-hI46ws7DmNgt6URg-jeKeEg1YFl8YzK51MAnBsc7-T6a-2rZwyz-Ui112nylTLI/s400/images.jpg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5443206019313885794&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;Windows 7 is far less than Windows Vista. But in reality, this operating system still feels heavy run on netbooks. Therefore, I will give some tips for optimizing Windows 7 on netbooks are taken from various sources on the Internet and are summarized again to be more easily understood.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Use the classic theme&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;One of the more value that is owned Windows 7 is a nice graphical display. But this feature is quite annoying when used on a computer / laptop with the quality of graphics hardware is minimal.&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;font-family: verdana;font-size:85%;&quot; class=&quot;fullpost&quot; &gt;&lt;br /&gt;This will cause the rendering process is longer that the effect is to make the computer / laptop to be very slow because the processor work more aimed at graphics rendering process. This feature should the set / reset settings, and turn off windows aero feature if any. The way right click on the desktop and select personalize, then select windows windows 7 basic or classic.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Re setting the visual effects&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;It also must be set back because the effect is the same as the use of themes. Do I click Start&gt; Right click on the &quot;Computer&quot;&gt; Properties&gt; Advanced System Settings&gt; Performance&gt; Settings&gt; Select the button that writing &quot;Adjust for best performance&quot;&gt; Ok. This will turn off the visual effects features in Windows 7 which functions to accelerate system&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Shrink Taskbar / Start Menu&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;Reply in terms of aesthetics, it is very nice feature, but in terms of performance / performance in the netbook, this is one of the inhibiting factors of speed. To turn off this feature make right click on the Taskbar&gt; Properties&gt; select Use Small Icons&gt; In Taskbar Button select the option &quot;Combine when the taskbar is full&quot;&gt; Apply&gt; Ok&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Discard the features of Windows 7 that never / rarely used&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;For tips on this one is not berkatian directly with the performance of Windows 7. But it should be turned off just because it can save your hard disk. Click Start&gt; Control Panel&gt; Programs&gt; Turn Windows features on or off. Do not turn off the feature-related services, such as Microsoft. Net Framework, because it is required by the system.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;3rd Party Software&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;In addition to the steps above, can also be used tweaking software for Windows 7.&lt;br /&gt;&lt;br /&gt;There are many other ways that can be used to improve the performance of Windows 7. But the steps listed above is to optimize Windows 7 on netbooks foremost (although these steps can also be used to non-netbook).&lt;br /&gt;&lt;/span&gt;</content><link rel='replies' type='application/atom+xml' href='http://noteandnetbookinfo.blogspot.com/feeds/1244312834237407643/comments/default' title='Posting Komentar'/><link rel='replies' type='text/html' href='http://noteandnetbookinfo.blogspot.com/2010/02/optimizing-windows-7-on-netbooks.html#comment-form' title='0 Komentar'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/292187291299044311/posts/default/1244312834237407643'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/292187291299044311/posts/default/1244312834237407643'/><link rel='alternate' type='text/html' href='http://noteandnetbookinfo.blogspot.com/2010/02/optimizing-windows-7-on-netbooks.html' title='Optimizing Windows 7 on netbooks.'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh1edKbtmK6l59V0H9XdhuGPmqEvOs44iy8woHpio1cuvZRR4QzApnHd_z8Bm-umFMuJ7JzUO1gcaEd-hI46ws7DmNgt6URg-jeKeEg1YFl8YzK51MAnBsc7-T6a-2rZwyz-Ui112nylTLI/s72-c/images.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-292187291299044311.post-7445384237030505698</id><published>2010-02-27T07:30:00.000-08:00</published><updated>2010-02-27T07:33:47.860-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="hacker&#39;s"/><title type='text'>User Reconnaissance threats Facebook, Twitter, and iPhone.</title><content type='html'>&lt;span style=&quot;font-family: verdana;font-size:85%;&quot; &gt;In the year 2010, the security threat for users of social networking sites like Facebook and Twitter estimated more frenzied. Menyingkapi this, security vendor McAfee also voice. &quot;In 2009 we saw an increase in attacks on web sites that take advantage of lack of suspicion of web users,&quot; explained one of his spokesmen.&lt;br /&gt;&lt;br /&gt;&quot;The number of Facebook users who reach 350 million to make us believe that the year 2010 will carry a security case that the trend is increasing,&quot; the spokesman said. &quot;Writer malware likes and pleased to join the social networking sites, even the activities to its hot spots will continue in the year 2010,&quot; he explained.&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;font-family: verdana;font-size:85%;&quot; class=&quot;fullpost&quot; &gt;&lt;br /&gt;Restrictions on Twitter system which only 140 make the user rely penyingkat service URL, like bit.ly, tinyurl.com, or pendek.in (Indonesia version). This step is then used by the attacker as a ruse for the user.&lt;br /&gt;&lt;br /&gt;&quot;This trick will play a more dominant role in 2010. With this trick, they can direct users to a malicious link that is disguised (abbreviated pemendek use the URL),&quot; according to a report written by Dmitri Alperovitch, Toralv Dirro, Paula Greve , Rahul Kashyap, David Marcus, Sam Masiello, Franois Paget, and Craig Schmugar of McAfee Labs.&lt;br /&gt;&lt;br /&gt;The success of Apple&#39;s iPhone is also a part of diversity trigger the application. The latest facts, Facebook already offers more than 350,000 active and Apple applications App Store recently reached 100,000 target. As a result, many users blindly distribute the application. Extensive land also facilitate identity theft. User expectations will increase 2.0 Web services also triggered many false services that are hidden is set to steal the data.&lt;br /&gt;&lt;/span&gt;</content><link rel='replies' type='application/atom+xml' href='http://noteandnetbookinfo.blogspot.com/feeds/7445384237030505698/comments/default' title='Posting Komentar'/><link rel='replies' type='text/html' href='http://noteandnetbookinfo.blogspot.com/2010/02/user-reconnaissance-threats-facebook.html#comment-form' title='0 Komentar'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/292187291299044311/posts/default/7445384237030505698'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/292187291299044311/posts/default/7445384237030505698'/><link rel='alternate' type='text/html' href='http://noteandnetbookinfo.blogspot.com/2010/02/user-reconnaissance-threats-facebook.html' title='User Reconnaissance threats Facebook, Twitter, and iPhone.'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-292187291299044311.post-5023061391683943014</id><published>2010-02-27T07:28:00.000-08:00</published><updated>2010-02-27T07:30:08.415-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="hacker&#39;s"/><title type='text'>GSM Encryption hackers breaking.</title><content type='html'>&lt;span style=&quot;font-family: verdana;font-size:85%;&quot; &gt;A German security expert claims to have cracked the encryption algorithm Global System for Mobile communication (GSM). This incident led to mobile phone calls made vulnerable tersadap. Karsten Nohl, the security expert, says that the government can listen to a conversation using equipment costing several thousand dollars only. Nohl and his team have put together the equipment during the last six months.&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;font-family: verdana;font-size:85%;&quot; class=&quot;fullpost&quot; &gt;&lt;br /&gt;Intercepting calls an act illegal in many countries, including the United States, and in this case Nohl inadvertently released pembobolnya device. However, Nohl said, &quot;when you are working with BitTorrent and the standard GNU build process, guaranteed you&#39;ll be able to do everything.&quot;&lt;br /&gt;&lt;br /&gt;Current GSM standard has become the most extensive mobile, covering 3.5 million from 4.3 million wireless connections throughout the world. Encryption works with random channel jumping in 80 different channels. This process is done using a set of open source software.&lt;br /&gt;&lt;br /&gt;Well, you get worried conversation hack? not all vulnerable to the GSM encryption breaker, really. The new GSM alliances, A5 / 3 is used for 3G networks are fairly secure.&lt;br /&gt;&lt;/span&gt;</content><link rel='replies' type='application/atom+xml' href='http://noteandnetbookinfo.blogspot.com/feeds/5023061391683943014/comments/default' title='Posting Komentar'/><link rel='replies' type='text/html' href='http://noteandnetbookinfo.blogspot.com/2010/02/gsm-encryption-hackers-breaking.html#comment-form' title='0 Komentar'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/292187291299044311/posts/default/5023061391683943014'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/292187291299044311/posts/default/5023061391683943014'/><link rel='alternate' type='text/html' href='http://noteandnetbookinfo.blogspot.com/2010/02/gsm-encryption-hackers-breaking.html' title='GSM Encryption hackers breaking.'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-292187291299044311.post-4867499364140317948</id><published>2010-02-27T07:27:00.000-08:00</published><updated>2010-02-27T07:28:29.450-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="hacker&#39;s"/><title type='text'>Chrome the OS to be easy prey Hacker.</title><content type='html'>&lt;span style=&quot;font-family: verdana;font-size:85%;&quot; &gt;Chrome, Google&#39;s debut brand-new OS will likely be a target of hackers in this 2010 year. The strongest argument is that Chrome is still considered a newcomer to the realm of cyberspace. &quot;The attack by hackers Chrome definitely occur before its official launch,&quot; said Sam Masiello (Director Mc Afee threat management).&lt;br /&gt;&lt;br /&gt;Google has announced the presence of Chrome in July, which was released as open source in November last year. Another reason to target Chrome hacker OS is a connection with Hypertext Markup Language (HTML) 5 who have not reached a final revision.&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;font-family: verdana;font-size:85%;&quot; class=&quot;fullpost&quot; &gt;&lt;br /&gt;Embedding HTML into the OS 5 Chrome will support offline web applications. Conventionally these services can help the user when not connected to the internet. &quot;When we&#39;ve entered the realm of cyberspace, where many Internet applications, so users cybercriminal can attack at any time, no matter whether it is offline or online,&quot; said Masiello. This was supported also by eXtensile Messaging and Presence Protocol (XMPP) that provide control applications for the Web application. &quot;The effect is also possible decentralized command and control of a botnet, so the take-down of an ISP or hosting company will be zero impact,&quot; Masiello added.&lt;br /&gt;&lt;br /&gt;Since Chrome appearance, this product has provoked a lot of security researchers, it is not directly participate emergence cybercriminal fishing. The same thing is happening in Windows Vista and Windows 7, they were attacked before entering the final design.&lt;br /&gt;&lt;/span&gt;</content><link rel='replies' type='application/atom+xml' href='http://noteandnetbookinfo.blogspot.com/feeds/4867499364140317948/comments/default' title='Posting Komentar'/><link rel='replies' type='text/html' href='http://noteandnetbookinfo.blogspot.com/2010/02/chrome-os-to-be-easy-prey-hacker.html#comment-form' title='0 Komentar'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/292187291299044311/posts/default/4867499364140317948'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/292187291299044311/posts/default/4867499364140317948'/><link rel='alternate' type='text/html' href='http://noteandnetbookinfo.blogspot.com/2010/02/chrome-os-to-be-easy-prey-hacker.html' title='Chrome the OS to be easy prey Hacker.'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-292187291299044311.post-8552102263981161564</id><published>2010-02-27T07:21:00.000-08:00</published><updated>2010-02-27T07:26:38.643-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="hacker&#39;s"/><title type='text'>India rumor says Hacker Target So.</title><content type='html'>&lt;span style=&quot;font-family: verdana;font-size:85%;&quot; &gt;Following the invasion of China on Google and some U.S. companies, government offices in India are also suspected to be targets of attack. Government offices in India are also suspected to be the target of attacks by hackers from China. According to a report quoted from PCWorld.&lt;br /&gt;&lt;br /&gt;MK Narayanan, as the Indian national security adviser, said that the attack occurred on December 15 and coincided with several U.S. companies are also dihack. Meanwhile, Google also suffered a hacker attack in mid-December, an attack thought to have come from China. As a result, many countries intellectual assets lost due to theft.&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;font-family: verdana;font-size:85%;&quot; class=&quot;fullpost&quot; &gt;&lt;br /&gt;Nayaranan explain again, that the attacks in India conducted via email with a PDF attachment that contains a virus &quot;Trojan&quot;. &quot;It opens the way for a hacker to access your computer remotely, and download or delete files,&quot; said Narayanan.&lt;br /&gt;&lt;br /&gt;Pulled back slightly, India and China had engaged in war in 1962, the relationship eventually deteriorated and both for one year. India now also has put China operations of technology companies like Huawei Technology. The Indian government had been openly expressed concern related to the use of telecommunications equipment from China vendor, especially in border areas.&lt;br /&gt;&lt;/span&gt;</content><link rel='replies' type='application/atom+xml' href='http://noteandnetbookinfo.blogspot.com/feeds/8552102263981161564/comments/default' title='Posting Komentar'/><link rel='replies' type='text/html' href='http://noteandnetbookinfo.blogspot.com/2010/02/india-rumor-says-hacker-target-so.html#comment-form' title='0 Komentar'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/292187291299044311/posts/default/8552102263981161564'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/292187291299044311/posts/default/8552102263981161564'/><link rel='alternate' type='text/html' href='http://noteandnetbookinfo.blogspot.com/2010/02/india-rumor-says-hacker-target-so.html' title='India rumor says Hacker Target So.'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-292187291299044311.post-8669256708021183009</id><published>2010-02-27T07:18:00.000-08:00</published><updated>2010-02-27T07:21:19.641-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="solutions"/><title type='text'>AVI Beta 3: Save Bandwidth with Workstation Update.</title><content type='html'>&lt;span style=&quot;font-family: verdana;font-size:85%;&quot; &gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;AVI&#39;s new facility allows PC clients to update from local server. Innovative breakthroughs to save bandwidth.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;The global financial crisis is happening now will inevitably affect our country as well. Like it or not, we must be clever-clever trick this fact, one of which is to save money by minimizing the budget and expenditure. Which we had often turned a lot of lights, start by cutting. If you previously used on a motorcycle just to go to a neighbor&#39;s house, start by walking. Savings can we do to the use of bandwidth, we know much less bandwidth in Indonesia is still very expensive.&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;font-family: verdana;font-size:85%;&quot; class=&quot;fullpost&quot; &gt;&lt;br /&gt;In the current situation we try to give a new breakthrough in AVI and is the first technology was applied by the local anti-virus today. AVI is now able to update through a local server (workstation update) so that each computer on the network connected to the local server can perform the update without the need to connect directly to the internet. This will make use of bandwidth can be minimized, especially in a network that has a lot of client computers such as in cafes and offices.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Concept Work Workstation Update&lt;/span&gt;&lt;br /&gt;How it works is quite simple update workstations. In a network must have 1 computer that acts as a server and must be connected to the Internet. When there are new updates, then this is the server that will download and save them. After that the server will provide notification to all connected clients to update immediately, then each client will perform the update by downloading the data available on the server.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Comparison&lt;/span&gt;&lt;br /&gt;How much bandwidth can be saved by using this method? Let us quantified. Such as in an office, there are 30 client computers connected to the Internet and installed each AVI. If every day to update AVI 100KB file size, if all these computers to update via internet the need (30x100KB) 3000KB. That&#39;s just one day. If multiplied by one month, then the required bandwidth of about 107MB. Compare with workstations using update. Because only 100KB of bandwidth needed per day, then in one month only takes 2.5 MB. That way we have to save bandwidth up to 105MB per month!&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Implementation&lt;/span&gt;&lt;br /&gt;In order to use this feature updates the workstation there are several steps you should do:&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;1. Install the update server workstation AVI&lt;/span&gt;&lt;br /&gt;AVI workstation update serverâ € &quot;to make it easier selanjutnnya we call Auserv sajaâ €&quot; is a form of application programs which will be run on the local server. Auserv built using Java that can run on various operating systems like Windows, Linux, and Macintosh. With the requirement should have been installed JRE (Java Runtime Environment). The first step before running Auserv is make sure your operating system already installed JRE. Open the console (on Windows can be a way the Start Menu&gt; Run and type cmd) in the console window type: java-version Press enter, if the text appears approximately as follows: java version &quot;1.6.0_07&quot; Java (TM) SE Runtime Environment (build 1.6.0_07-b06) Java HotSpot (TM) Client VM (build 10.0-b23, mixed mode, sharing) That means JRE already installed, but if it does not appear like the above means you need to install first. To install it manually you must first download the JRE paketan you can get from http://www.java.com/en/download/manual.jsp or you can get the JRE at InfoKomputer DVD this month.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;2. Running Auserv&lt;/span&gt;&lt;br /&gt;Avi_workstation_update_server.zip to extract the files wherever you want. We recommend to put extracted files on storage media that still has a large free space, because it would save each Auserv update information into the storage media. After that you can simply run it. If you use the Windows operating system, Auserv can directly run by double clicking on the file auserv.jar, or it could be a way to run through the console, by typing the command: java-jar auserv.jar The Linux operating system, if you want to Auserv walked behind the screen (background) add the sign &amp;amp; at the end of the command, for example: java-jar auserv.jar &amp;amp;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;3. Configuration&lt;/span&gt;&lt;br /&gt;After you successfully run Auserv will display a new window, click Settings. In the Settings window fill in the Server with update.ansav.com, after that try to check the connection by clicking Test Connection button. Next on the Port fill port number you want to use, the default value is 2194. In the Clear log in with the maximum line content to be written in the log window, the default value is 3000. At the Save the log to be your past, but if you activate it every event which is written in the log will be saved as a file. In the Password content with a unique password (default is admin). This password is required only if you want to turn off the remote Auserv process use telnet (on the operation of the remote Auserv may be discussed on another occasion). Last on the MAX Clients, content with what number limits the maximum number of connections that will be accepted at one time (default 30). Click Save to save the changes you&#39;ve made. Then click the Enable button to start the service.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Settings on the Client Side&lt;/span&gt;&lt;br /&gt;After configuring the server is finished, now turn on the client side. Run AVI latest version (currently v2.0.9 BETA or 3), select the Settings tab (Settings in the Indonesian language), then select configuration on the Update. Then in the Update settings there are two options that update methods directly via the main Update servers and workstations via the Update; select Update via workstations. Further Update on the workstation settings, contents server address with the host name or IP address of the server where Auserv been installed, be sure to fill all parts of the same port with the port number you have configured the Auserv. Last click Check server configuration to determine whether we have made is correct, if they succeed it will display the server information, like the following:&lt;br /&gt;&lt;br /&gt;Server information: AVI 0.0.1 update server workstation running on: Linux 2.6.24-16-generic i686&lt;br /&gt;&lt;br /&gt;Examples of such information obtained from the server with the Ubuntu Linux operating system. At this point means that everything has been a success.&lt;br /&gt;&lt;/span&gt;</content><link rel='replies' type='application/atom+xml' href='http://noteandnetbookinfo.blogspot.com/feeds/8669256708021183009/comments/default' title='Posting Komentar'/><link rel='replies' type='text/html' href='http://noteandnetbookinfo.blogspot.com/2010/02/avi-beta-3-save-bandwidth-with.html#comment-form' title='0 Komentar'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/292187291299044311/posts/default/8669256708021183009'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/292187291299044311/posts/default/8669256708021183009'/><link rel='alternate' type='text/html' href='http://noteandnetbookinfo.blogspot.com/2010/02/avi-beta-3-save-bandwidth-with.html' title='AVI Beta 3: Save Bandwidth with Workstation Update.'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-292187291299044311.post-5961228169930718543</id><published>2010-02-27T07:12:00.000-08:00</published><updated>2010-02-27T07:18:35.904-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="virus"/><title type='text'>Tens of Thousand AVI Attack Tree. .</title><content type='html'>&lt;span style=&quot;font-family: verdana;font-size:85%;&quot; &gt;One of the advantages is the add-AVI (plugin). Thanks to this facility, capacity can be improved AVI easily. One of the latest add-on is owned AVI Clamsav. This is the add-ons that integrate the database into a database Clamav AVI.&lt;br /&gt;&lt;br /&gt;That way, AVI now can ward off tens of thousands of types of attacks, both locally and internationally. One who makes a good antivirus in detecting computer viruses is the definition of the threat they have. The more definition, the better antivirus in a variety of threats facing trying to enter into the computer.&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;font-family: verdana;font-size:85%;&quot; class=&quot;fullpost&quot; &gt;&lt;br /&gt;AVI is one of the local antivirus that has a number of threats that limited definition. So far, the database contains AVI more local viruses. This limitation is because the number of new viruses AVI users reported only ranges from Indonesia alone. This is why many people consider the local anti-virus only works to overcome local virus alone.&lt;br /&gt;&lt;br /&gt;And vice versa, only a potent antiviral out beyond just tackle the virus. Based on these facts, many people who eventually install two antivirus at once: one local antivirus, antivirus one out.&lt;br /&gt;&lt;br /&gt;But the AVI has a smart solution for solving this problem. AVI now have add-on (plugin) that integrates new AVI with Clamav antivirus engines. What is Clamav? Clamav antivirus which is developed by the developers of the open source community GPL (General Public License). You can get more information about Clamav on his official website. Current definition of a recognizable threat Clamav approximately 49 thousand threats mostly dominated by foreign viruses. Now, by combining the original database and Clamav AVI, AVI is now able to recognize approximately 50 thousand threats!&lt;br /&gt;&lt;/span&gt;</content><link rel='replies' type='application/atom+xml' href='http://noteandnetbookinfo.blogspot.com/feeds/5961228169930718543/comments/default' title='Posting Komentar'/><link rel='replies' type='text/html' href='http://noteandnetbookinfo.blogspot.com/2010/02/tens-of-thousand-avi-attack-tree.html#comment-form' title='0 Komentar'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/292187291299044311/posts/default/5961228169930718543'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/292187291299044311/posts/default/5961228169930718543'/><link rel='alternate' type='text/html' href='http://noteandnetbookinfo.blogspot.com/2010/02/tens-of-thousand-avi-attack-tree.html' title='Tens of Thousand AVI Attack Tree. .'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-292187291299044311.post-8786106508558883444</id><published>2010-02-27T07:11:00.000-08:00</published><updated>2010-02-27T07:17:17.884-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="hacker&#39;s"/><title type='text'>IPhone Hacker Waiting Time.</title><content type='html'>&lt;span style=&quot;font-family: verdana;font-size:85%;&quot; &gt;According to surveys conducted by ESET-vendor anti-malware software from Slovakia, many owners of the iPhone-Apple smartphone debut-which is not so concerned about the security of smart phones.&lt;br /&gt;&lt;br /&gt;&quot;We do not see any serious protection among iPhone users,&quot; explained James Abrams (Director of Technical Education at ESET) to CIO.com when Maxworld Expo event held in San Francisco.&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;font-family: verdana;font-size:85%;&quot; class=&quot;fullpost&quot; &gt;&lt;br /&gt;Opinion was not merely made without proof. ESET&#39;s because surveys the owner of the 1000 smartphone, with 35 percent are iPhone users, 32 percent of BlackBerry users, and the rest is the latest smartphone user mix. The result, smartphone owners do not care about security issues very seriously. In fact, as many as 55 percent of the iPhone and BlackBerry users never lock their smartphones.&lt;br /&gt;&lt;br /&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEibVoBzPxRjtq4R7543_WjKewjyRowkDzyJ6ZIooMUudkwRO_kXZItO0Yo-3500sWoAOSNCZx1hnoZLxhXsRCxGco9OesauhaHxWugybZftjkj3tgHlzJUoelTGFGSDeCJlH_fhgb60dP_m/s1600-h/images.jpg&quot;&gt;&lt;img style=&quot;margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 400px; height: 276px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEibVoBzPxRjtq4R7543_WjKewjyRowkDzyJ6ZIooMUudkwRO_kXZItO0Yo-3500sWoAOSNCZx1hnoZLxhXsRCxGco9OesauhaHxWugybZftjkj3tgHlzJUoelTGFGSDeCJlH_fhgb60dP_m/s400/images.jpg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5442942252403038610&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;Although they look cool for smartphone security affairs, 40 percent of them said that concerned with the existence of malware attacks in mobile devices. From the survey also found only one of four people who actually use anti-virus software. Actually, the iPhone user can be immersed in the anti-virus to her smartphone. Unfortunately, Apple does not allow this because it has provided its own spyware that has been sold through the App Store.&lt;br /&gt;&lt;br /&gt;Another survey results ESET is one of four smartphone users make purchases online application. One of the three users access banking sites or applications. Abrams explains, one of the main attraction to tempt hackers smartphone is a feature that combined with social networking account and email. Not far from there, online Banking activity is also able to attract hackers to act further. If you have this, hackers stay a matter of time, right?&lt;br /&gt;&lt;/span&gt;</content><link rel='replies' type='application/atom+xml' href='http://noteandnetbookinfo.blogspot.com/feeds/8786106508558883444/comments/default' title='Posting Komentar'/><link rel='replies' type='text/html' href='http://noteandnetbookinfo.blogspot.com/2010/02/iphone-hacker-waiting-time.html#comment-form' title='0 Komentar'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/292187291299044311/posts/default/8786106508558883444'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/292187291299044311/posts/default/8786106508558883444'/><link rel='alternate' type='text/html' href='http://noteandnetbookinfo.blogspot.com/2010/02/iphone-hacker-waiting-time.html' title='IPhone Hacker Waiting Time.'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEibVoBzPxRjtq4R7543_WjKewjyRowkDzyJ6ZIooMUudkwRO_kXZItO0Yo-3500sWoAOSNCZx1hnoZLxhXsRCxGco9OesauhaHxWugybZftjkj3tgHlzJUoelTGFGSDeCJlH_fhgb60dP_m/s72-c/images.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-292187291299044311.post-3111107112983149858</id><published>2010-02-27T07:07:00.000-08:00</published><updated>2010-02-27T07:08:25.852-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="security"/><title type='text'>Symantec Presents Mobile Solutions.</title><content type='html'>&lt;span style=&quot;font-family: verdana;font-size:85%;&quot; &gt;Security service provider, Symantec, now presents the security strategy and management of mobile services which includes three products. Entirely organized to assist the organization to secure and manage data stored in the software that increasingly crowded.&lt;br /&gt;&lt;br /&gt;Third Symantec products include: Symantec Endpoint Protection Mobile Edition 6.0, Symantec Network Access Control 6.0 Mobile Edition, and Symantec Mobile Management 7.0.&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;font-family: verdana;font-size:85%;&quot; class=&quot;fullpost&quot; &gt;&lt;br /&gt;Symantec&#39;s strategy is focused on the integration of security solutions and management of mobile services to help customers minimize downtime. While the next time the user actually increase productivity, improve response time and provide protection and management throughout the life cycle of mobile devices.&lt;br /&gt;&lt;br /&gt;Sean Ryan (Reseacrh Analyst, Mobile Enterprise Software, IDC) said that currently the following mobile devices increase the number of users significantly. The amount is also accompanied by changing the target to a larger one. For illegal software, it may be dangerous, including the threat of worms, viruses, and spyware.&lt;br /&gt;&lt;br /&gt;Security and management solutions are designed based Symantec Symantec Management Platform. This solution will undoubtedly memberika integrated management capabilities for enterprise-class desktops, laptops, servers, and mobile devices.&lt;br /&gt;&lt;/span&gt;</content><link rel='replies' type='application/atom+xml' href='http://noteandnetbookinfo.blogspot.com/feeds/3111107112983149858/comments/default' title='Posting Komentar'/><link rel='replies' type='text/html' href='http://noteandnetbookinfo.blogspot.com/2010/02/symantec-presents-mobile-solutions.html#comment-form' title='0 Komentar'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/292187291299044311/posts/default/3111107112983149858'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/292187291299044311/posts/default/3111107112983149858'/><link rel='alternate' type='text/html' href='http://noteandnetbookinfo.blogspot.com/2010/02/symantec-presents-mobile-solutions.html' title='Symantec Presents Mobile Solutions.'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-292187291299044311.post-3477257375424517463</id><published>2010-02-27T07:04:00.000-08:00</published><updated>2010-02-27T07:06:47.618-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="info"/><title type='text'>Microsoft, Adobe, and Oracle Security Update Released.</title><content type='html'>&lt;span style=&quot;;font-family:verdana;font-size:85%;&quot;  &gt;&quot;One of Microsoft&#39;s security vulnerabilities are going to affect everything, from Windows 2000 to Windows 7, but that in critical categories only for Windows 2000,&quot; beber Ben Greenbaum (Senior Research Manager, Symantec Security Response). &quot;From the XP SP2 and later products, Microsoft has memerkuat heap memory with a memory heap protection strategy. This makes the security vulnerabilities are less of a problem for systems of more recent,&quot; continued Ben.&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;;font-family:verdana;font-size:85%;&quot; class=&quot;fullpost&quot;  &gt;&lt;br /&gt;Meanwhile, Adobe is also scheduled to release a security update. One of the expected update will patch a security vulnerability critical zero-day and affecting the Acrobat Reader (first identified on December 14).&lt;br /&gt;&lt;br /&gt;&quot;We see this security vulnerability actively exploited by attackers. At the end of December this attack looks businesses rose sharply and then declined, but we continue to see attacks limited to such exploitation. It is possible that the kinds of exploitation that is more reliable under development,&quot; Greenbaum explained.&lt;br /&gt;&lt;br /&gt;Following, Oracle also scheduled to release an advisory that will overcome the 24-hour security vulnerabilities as well as part of their security updates. Although this is a moon shining for Microsoft, but because Adobe overcome several security holes, at least one of critical events are also able to improve Oracle&#39;s 24 security vulnerabilities, many IT managers have to keep working hard.&lt;br /&gt;&lt;br /&gt;Some problems of vulnerability in Symantec eventually spur to encourage users to patch their systems to address this security vulnerability. In addition, companies are encouraged to consider implementing a patch management solution automatically to help overcome these risks. More information, please visit the following Symantec blog.&lt;br /&gt;&lt;/span&gt;</content><link rel='replies' type='application/atom+xml' href='http://noteandnetbookinfo.blogspot.com/feeds/3477257375424517463/comments/default' title='Posting Komentar'/><link rel='replies' type='text/html' href='http://noteandnetbookinfo.blogspot.com/2010/02/microsoft-adobe-and-oracle-security.html#comment-form' title='0 Komentar'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/292187291299044311/posts/default/3477257375424517463'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/292187291299044311/posts/default/3477257375424517463'/><link rel='alternate' type='text/html' href='http://noteandnetbookinfo.blogspot.com/2010/02/microsoft-adobe-and-oracle-security.html' title='Microsoft, Adobe, and Oracle Security Update Released.'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-292187291299044311.post-5847171397784373901</id><published>2010-02-27T07:02:00.000-08:00</published><updated>2010-02-27T07:04:14.435-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="solutions"/><title type='text'>Problem Solution Disk, Hard Disk Health Watch.</title><content type='html'>&lt;span style=&quot;font-family: verdana;font-size:85%;&quot; &gt;In all PATA and SATA hard drives on the market today, is already embedded features SMART (Self-Monitoring Analysis and Reporting Technology) that specifically detects the hard disk&#39;s health.&lt;br /&gt;&lt;br /&gt;In the SMART parameters were about 30 hard drives health, ranging from temperature, spin-out time, to seek error rate. From this data could be inferred if the hard disk on your PC is still healthy, or already ill.&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;font-family: verdana;font-size:85%;&quot; class=&quot;fullpost&quot; &gt;&lt;br /&gt;To read this SMART data, we need specialized applications such as HD Tunes. The main functions of this application is measuring the speed of disk, but can be to read the SMART information, too. HD 15 Tunes will read SMART parameters, with 3 types of results, the current, worst, and the threshold. The definition of each outcome is:&lt;br /&gt;&lt;br /&gt;· Â Â Â Â Â Â Â Â Current: current state of your hard disk&lt;br /&gt;&lt;br /&gt;· Â Â Â Â Â Â Â Â Worst: the smallest number ever found in the previous generation hard drives&lt;br /&gt;&lt;br /&gt;· Â Â Â Â Â Â Â Â Threshold: the limits below which shows the damaged hard drive&lt;br /&gt;&lt;br /&gt;· Â Â Â Â Â Â Â Â data: raw data from sensors or counter&lt;br /&gt;&lt;br /&gt;Â Tip: Visit this site to find out the definition of each parameter.&lt;br /&gt;&lt;/span&gt;</content><link rel='replies' type='application/atom+xml' href='http://noteandnetbookinfo.blogspot.com/feeds/5847171397784373901/comments/default' title='Posting Komentar'/><link rel='replies' type='text/html' href='http://noteandnetbookinfo.blogspot.com/2010/02/problem-solution-disk-hard-disk-health.html#comment-form' title='0 Komentar'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/292187291299044311/posts/default/5847171397784373901'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/292187291299044311/posts/default/5847171397784373901'/><link rel='alternate' type='text/html' href='http://noteandnetbookinfo.blogspot.com/2010/02/problem-solution-disk-hard-disk-health.html' title='Problem Solution Disk, Hard Disk Health Watch.'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-292187291299044311.post-3195871806326168283</id><published>2010-02-27T07:00:00.000-08:00</published><updated>2010-02-27T07:02:06.956-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="info"/><title type='text'>Remind Symantec, Beware Scam World Cup!.</title><content type='html'>&lt;span style=&quot;font-family: verdana;font-size:85%;&quot; &gt;The tournament&#39;s most prestigious soccer, World Cup (World Cup) in 2010, precisely on June 11 next will be held.&lt;br /&gt;&lt;br /&gt;With the presence of the World Cup, the 3.1 million tickets will be sold. In addition, there will be more than 400 million people worldwide who watch every game on television. Many fans who use the Internet to find tickets, accommodation, and flights. However, be careful. The problem cyber criminals such as spammers or scammers are scheming to attack Internet users to manipulate the World Cup.&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;font-family: verdana;font-size:85%;&quot; class=&quot;fullpost&quot; &gt;&lt;br /&gt;Internet security service provider, Symantec also reveal the possibilities that can happen. Through www.2010netthreat.com site, Symantec provides the data, comments, security tips and useful links for football fans looking for news on the internet, tickets, and information about the tournament.&lt;br /&gt;&lt;br /&gt;Paul Wood (senior analyst at Symantec Hosted Services), said that the biggest football tournament this world would attract more than 1 billion fans, including cyber criminals. &quot;According to history, sports events such as large-scale, this will lead to an increase in the number of cyber threats,&quot; explained Wood.&lt;br /&gt;&lt;br /&gt;&quot;Phishing attacks increased 66% during the Olympic Games in Beijing in 2008. Facts about put two undersea communication cables in the South African coast last July also exacerbate the threat level. History shows that evil activity increased in a country following the availability of new bandwidth, &quot;added Wood through a written statement.&lt;br /&gt;&lt;br /&gt;Therefore, users should be careful. The attack is called a 419 scam, spam, and phishing will disguise and woo Internet users through special offers related to the event. To avoid easy. &quot;The rule is, if one looks very unlikely to be true, it probably is a scam,&quot; beber Gordon Love (Africa Regional Director, Symantec).&lt;br /&gt;&lt;br /&gt;These cyber criminals with some even picking up orek users&#39; personal information, the following bank account number, and credit card number for the user&#39;s money drain. Sites that urge vigilance against any scam or spam is rampant.&lt;br /&gt;&lt;br /&gt;Not wits, cyber criminals and then poison the user by displaying their fake web site on the first level of search results. &quot;Users often assume that sites that appear first are legitimate sites / original, and perhaps to click these sites without first checking the source,&quot; added Love. So, beware!&lt;br /&gt;&lt;/span&gt;</content><link rel='replies' type='application/atom+xml' href='http://noteandnetbookinfo.blogspot.com/feeds/3195871806326168283/comments/default' title='Posting Komentar'/><link rel='replies' type='text/html' href='http://noteandnetbookinfo.blogspot.com/2010/02/remind-symantec-beware-scam-world-cup.html#comment-form' title='0 Komentar'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/292187291299044311/posts/default/3195871806326168283'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/292187291299044311/posts/default/3195871806326168283'/><link rel='alternate' type='text/html' href='http://noteandnetbookinfo.blogspot.com/2010/02/remind-symantec-beware-scam-world-cup.html' title='Remind Symantec, Beware Scam World Cup!.'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-292187291299044311.post-7088466483568480181</id><published>2010-02-27T06:57:00.000-08:00</published><updated>2010-02-27T07:00:03.159-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="solutions"/><title type='text'>Problem Solution Disk, Windows Severe Damage.</title><content type='html'>&lt;span style=&quot;font-family: verdana;font-size:85%;&quot; &gt;Cases around the hard drive more often than Windows on the hard disk is badly damaged so that we can not enter into it. In such cases, the only solution is to reinstall Windows. The problem, often in the hard disk or partition containing Windows is still there are many important files that must be saved. Then, how it?&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;font-family: verdana;font-size:85%;&quot; class=&quot;fullpost&quot; &gt;&lt;br /&gt;Use a bootable applications, and can explore (browse) a file on disk is problematic. Again, you can use the Disk Rescue 9.0 Express which we discuss in the first part of this serial article. Very easy to use, you simply follow the wizard (the wizard) from the menu File Transfer Wizard. Unfortunately, this free version can not move these files to CD / DVD. So, you must copy the files to a flash or external hard drive.&lt;br /&gt;&lt;br /&gt;Rescue Disk Express but can only work from the CD. If you prefer the process of the flash, use a portable Linux operating system that can boot from flash (live-USB). Almost all Linux distributions have a portable version, but it should be noted that the mounting process (introduction of hard disk contents) often must be done manually. Therefore, we recommend using Puppy Linux distributions because these distributions do the automatic mounting. Size Puppy Linux also only 100MB, so the fit on the flash is small size.&lt;br /&gt;&lt;br /&gt;Application Express 9.0 Rescue Disk can be free Donwload &lt;a href=&quot;http://www.paragon-software.com/registration/rke.html&quot;&gt;here&lt;/a&gt; (46MB), while Puppy Linux you can get &lt;a href=&quot;http://www.puppylinux.org/downloads&quot;&gt;here&lt;/a&gt; (100MB).&lt;br /&gt;&lt;/span&gt;</content><link rel='replies' type='application/atom+xml' href='http://noteandnetbookinfo.blogspot.com/feeds/7088466483568480181/comments/default' title='Posting Komentar'/><link rel='replies' type='text/html' href='http://noteandnetbookinfo.blogspot.com/2010/02/problem-solution-disk-windows-severe.html#comment-form' title='0 Komentar'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/292187291299044311/posts/default/7088466483568480181'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/292187291299044311/posts/default/7088466483568480181'/><link rel='alternate' type='text/html' href='http://noteandnetbookinfo.blogspot.com/2010/02/problem-solution-disk-windows-severe.html' title='Problem Solution Disk, Windows Severe Damage.'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-292187291299044311.post-2980904615134514817</id><published>2010-02-27T06:55:00.000-08:00</published><updated>2010-02-27T06:56:58.838-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="info"/><title type='text'>Micron &amp; Nanya Recommend 42-nanometer DRAM.</title><content type='html'>&lt;span style=&quot;font-family: verdana;font-size:85%;&quot; &gt;A DDR3 memory, 2 gigabit (Gb) DRAMs using 42-nanometer (nm) successfully developed by Micron Technology, Inc.. and Nanya Technology Corporation. This copper-based technologies will undoubtedly be useful in applications of high-performance computing, including servers, notebooks, and desktops.&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;font-family: verdana;font-size:85%;&quot; class=&quot;fullpost&quot; &gt;&lt;br /&gt;The advantages of 42nm technology is also making 1.35-volt power into the power that is widely used standards compared with 1.5 volts on the previous generation memory. Please note, reduction of power consumption is very important for the server, because the cost of power and cooling infrastructure comparable to the cost of their own server equipment. with a power of 1.35 volts, then the savings can reach up to 30%.&lt;br /&gt;&lt;br /&gt;The case when the memory on the server increased. Power consumption in memory would be increased as well. Expected to reach up to 21 watts per module and 1866 to reach the memory performance of megabits per second. Thanks to the small print and the memory density of 2GB of DDR3-42nm devices, capable of producing modules up to 16Gb capacity.&lt;br /&gt;&lt;br /&gt;&quot;With the movement towards the 42nm and 3Xnm process that has worked well in the facilities of our R &amp;amp; D in Boise, Micron expertise in copper and metalisasi special cell capacitor technology makes us remain a leader in the design of DRAM process,&quot; said Robert Feurle (DRAM Marketing Vice President ).&lt;br /&gt;&lt;br /&gt;Micron reason to use copper, among others, is that the material cost of copper, compared with other techniques such as aluminum metalisasi. These samples are scheduled to begin in the second quarter of calendar 2010, while the implementation of planned production will begin in the second half of this year.&lt;br /&gt;&lt;/span&gt;</content><link rel='replies' type='application/atom+xml' href='http://noteandnetbookinfo.blogspot.com/feeds/2980904615134514817/comments/default' title='Posting Komentar'/><link rel='replies' type='text/html' href='http://noteandnetbookinfo.blogspot.com/2010/02/micron-nanya-recommend-42-nanometer.html#comment-form' title='0 Komentar'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/292187291299044311/posts/default/2980904615134514817'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/292187291299044311/posts/default/2980904615134514817'/><link rel='alternate' type='text/html' href='http://noteandnetbookinfo.blogspot.com/2010/02/micron-nanya-recommend-42-nanometer.html' title='Micron &amp; Nanya Recommend 42-nanometer DRAM.'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-292187291299044311.post-7544293696638149027</id><published>2010-02-27T06:52:00.001-08:00</published><updated>2010-02-27T07:10:16.202-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="info"/><title type='text'>Cyber criminals Like Best Online Content.</title><content type='html'>&lt;span style=&quot;font-family: verdana;font-size:85%;&quot; &gt;There was sugar ants. Thus roughly appropriate maxim to describe the development of the current cyber crime that led to the users of social networking and other online content users. Data from Nielsen Online shows that the activity of social networking today is the fourth highest of all the activities a person does when connecting to the internet.&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;font-family: verdana;font-size:85%;&quot; class=&quot;fullpost&quot; &gt;&lt;br /&gt;Related to this trend, Sophos released a report that summarized the year security Security Threat in 2010, where over 100 existing web sites, 50 of whom have a high security risk. Most crime in those sites directed at social networking, phishing and malware. Interestingly, 61 percent of respondents are involved in the research Sophos think that Facebook is a social network with the greatest security risk because most visited by Internet users.&lt;br /&gt;&lt;br /&gt;The same thing also revealed Microsoft&#39;s latest Security Intelligence Report stating that the current online attacks aimed at the 2 main targets, namely: user (person) and the user&#39;s computer (equipment). &quot;User target PC uses such as phishing social engineering, while the threat of more PCs from malware,&quot; said Jacqueline Peterson, Microsoft Asia Pacific Regional Security &amp;amp; Privacy Lead. Jacqueline also said that, from 100 percent of the threats that currently 49 percent are threatened with the high category or very dangerous (High Severity). &quot;And worse, most of Berkategori very dangerous threat is the gap which was easily accessible,&quot; he added.&lt;br /&gt;&lt;br /&gt;Responding to this, Lukman Susetio, Windows Client Product Manager Microsoft Indonesia, suggest to Internet users to be more careful and use a browser that can prevent and counteract phishing activity Malware. &quot;The browser is good and secure an absolute necessity today. Internet Explorer 8 for example, it provides various security features as surf, like InPrivate feature and SmartScreen to help avoid phishing attacks by crackers, &quot;&lt;br /&gt;&lt;/span&gt;</content><link rel='replies' type='application/atom+xml' href='http://noteandnetbookinfo.blogspot.com/feeds/7544293696638149027/comments/default' title='Posting Komentar'/><link rel='replies' type='text/html' href='http://noteandnetbookinfo.blogspot.com/2010/02/cyber-criminals-like-best-online.html#comment-form' title='0 Komentar'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/292187291299044311/posts/default/7544293696638149027'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/292187291299044311/posts/default/7544293696638149027'/><link rel='alternate' type='text/html' href='http://noteandnetbookinfo.blogspot.com/2010/02/cyber-criminals-like-best-online.html' title='Cyber criminals Like Best Online Content.'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry></feed>

If you would like to create a banner that links to this page (i.e. this validation result), do the following:

  1. Download the "valid Atom 1.0" banner.

  2. Upload the image to your own server. (This step is important. Please do not link directly to the image on this server.)

  3. Add this HTML to your page (change the image src attribute if necessary):

If you would like to create a text link instead, here is the URL you can use:

http://www.feedvalidator.org/check.cgi?url=http%3A//noteandnetbookinfo.blogspot.com/feeds/posts/default

Copyright © 2002-9 Sam Ruby, Mark Pilgrim, Joseph Walton, and Phil Ringnalda