Search This Blog

Wednesday, January 13, 2010

Secure DRIVE IN NETWORK

Usual steps taken to secure such data systems is to install the software security software such as firewalls, data encryption, or by closing all the data that was sharing. After installing the security devices, many users who feel secure, but security is really superficial.
Do not believe it? Try your local drive access from another PC connected in the same network. Way, enter the command \ \ ipyourkomputers \ c $ dikolom address exploler windows. After using the easy access the admin can, all the data on your C drive will open. This treatment also applies to other drives drives. Even by entering the following command \ \ ipyourkomputers \ admin $, windows system folder will open.
By securing the entire data and system on your computer, then do the following steps:
1. Click start menu> control panel> system and maintenance> administrative tools> computers management
2. After the computer management window opens, masukanlah to computer management (local) \ system tools \ shared folders \ shares.
3. On the right side of the window you will see the shared folder called C $, D $, E $ and so on in accordance with the drive you have. Listed ADMIN $ shared folder that provides access to the windows system folder.
4. To secure them, right-click each shared folder and click the stop button sharing.
5. Close the computer management and look at the changes. Guaranteed no more outsiders who infiltrate freely into your local drive.

Sunday, January 10, 2010

SEE sophistication PORTABLE SPEAKER: JAMO i200

Simple and practical is the most visible image of the product that is more specialized speakers for this ipod multimedia devices. Not too many things seem strange or unique. But certainly, good design and very elegant to be the main characteristic.
The design also forms a primary key of these portable speakers, because the sound reproduction capabilities enough to make you feel comfortable. More clearly again, he manifold ported speakers, which for the port is positioned on the side. Moreover, this port on the tuning very well. Evidenced by only using a midrange driver and tweeter per channel, its bass can still be felt. Then to further enhance the bass booms, is also given the freedom with a special connector is provided for the subwoofer.
In the installation process ipod unit, or a line input connector as well. Both are on the docking station in the middle. Speaker units for placement, but can be placed on the table, there is also mounting for support or installation stand on the wall.
One major advantage is that the wireless remote control which forms a tiny remote and unique. All settings can be done in this unit directly. If you want to do it manually, the speaker unit also provided control controller. Although only limited to the on / off, volume and play / stop.
For his own abilities, he just gives good thing overall. Very good level of reproduction for all the frequency range listed in the specifications.

Monday, January 4, 2010

Known LAST GOOD CONFIGURATION

This is one of the windows startup option. This option will use the system settings the last time windows to work properly. Without us realizing it, when we turn off the computer, then windows will collect data system setting data. And if the windows had to shutdown properly, the critical system settings will be stored in the registry. When there was a problem with the startup process, windows will call these savings data, if we use the Last Known Good option configuration.
Once again, use this facility if we can not start windows, but the last time we managed to use it. If the strangeness or damage still occurred after we make improvements to the selection process Last known good configuration, time to put another rescue facility, known as system restore.
Options last known good configuration will not interfere with our personal data of data. Will only have an effect on the system settings only. So there is no reason to fear it. Okay?
So that we can access the last known good option configuration, press the F8 key before windows logo appears. Then gerakkanlah cursor with the arrow keys to select last known good configuration. To run it, press enter. Data conversion process will be automatic and we wait the results. If successful we go into the windows operating system, with the same conditions as last time we use it.