Windows Shortcuts

Press “Windows logo + R” and enter this Commands:


Quote:
compmgmt.msc – Computer management
devmgmt.msc – Device manager
diskmgmt.msc – Disk management
dfrg.msc – Disk defrag
eventvwr.msc – Event viewer
fsmgmt.msc – Shared folders
gpedit.msc – Group policies
lusrmgr.msc – Local users and groups
perfmon.msc – Performance monitor
rsop.msc – Resultant set of policies
secpol.msc – Local security settings
services.msc – Various Services
msconfig – System Configuration Utility
regedit – Registry Editor
msinfo32 _ System Information
sysedit _ System Edit
win.ini _ windows loading information(also system.ini)
winver _ Shows current version of windows
mailto: _ Opens default email client
command _ Opens command prompt

Run Commands to access the control panel:

Quote:

Add/Remove Programs control appwiz.cpl
Date/Time Properties control timedate.cpl
Display Properties control desk.cpl
FindFast control findfast.cpl
Fonts Folder control fonts
Internet Properties control inetcpl.cpl
Keyboard Properties control main.cpl keyboard
Mouse Properties control main.cpl
Multimedia Properties control mmsys.cpl
Network Properties control netcpl.cpl
Password Properties control password.cpl
Printers Folder control printers
Sound Properties control mmsys.cpl sounds
System Properties control sysdm.cpl

Command Prompt:

Quote:

ANSI.SYS Defines functions that change display graphics, control cursor movement, and reassign keys.
APPEND Causes MS-DOS to look in other directories when editing a file or running a command.
ARP Displays, adds, and removes arp information from network devices.
ASSIGN Assign a drive letter to an alternate letter.
ASSOC View the file associations.
AT Schedule a time to execute commands or programs.
ATMADM Lists connections and addresses seen by Windows ATM call manager.
ATTRIB Display and change file attributes.
BATCH Recovery console command that executes a series of commands in a file.
BOOTCFG Recovery console command that allows a user to view, modify, and rebuild the boot.ini
BREAK Enable / disable CTRL + C feature.
CACLS View and modify file ACL’s.
CALL Calls a batch file from another batch file.
CD Changes directories.
CHCP Supplement the International keyboard and character set information.
CHDIR Changes directories.
CHKDSK Check the hard disk drive running FAT for errors.
CHKNTFS Check the hard disk drive running NTFS for errors.
CHOICE Specify a listing of multiple options within a batch file.
CLS Clears the screen.
CMD Opens the command interpreter.
COLOR Easily change the foreground and background color of the MS-DOS window.
COMP Compares files.
COMPACT Compresses and uncompress files.
CONTROL Open control panel icons from the MS-DOS prompt.
CONVERT Convert FAT to NTFS.
COPY Copy one or more files to an alternate location.
CTTY Change the computers input/output devices.
DATE View or change the systems date.
DEBUG Debug utility to create assembly programs to modify hardware settings.
DEFRAG Re-arrange the hard disk drive to help with loading programs.
DEL Deletes one or more files.
DELETE Recovery console command that deletes a file.
DELTREE Deletes one or more files and/or directories.
DIR List the contents of one or more directory.
DISABLE Recovery console command that disables Windows system services or drivers.
DISKCOMP Compare a disk with another disk.
DISKCOPY Copy the contents of one disk and place them on another disk.
DOSKEY Command to view and execute commands that have been run in the past.
DOSSHELL A GUI to help with early MS-DOS users.
DRIVPARM Enables overwrite of original device drivers.
ECHO Displays messages and enables and disables echo.
EDIT View and edit files.
EDLIN View and edit files.
EMM386 Load extended Memory Manager.
ENABLE Recovery console command to enable a disable service or driver.
ENDLOCAL Stops the localization of the environment changes enabled by the setlocal command.
ERASE Erase files from computer.
EXIT Exit from the command interpreter.
EXPAND Expand a M*cros*ft Windows file back to it’s original format.
EXTRACT Extract files from the M*cros*ft Windows cabinets.
FASTHELP Displays a listing of MS-DOS commands and information about them.
FC Compare files.
FDISK Utility used to create partitions on the hard disk drive.
FIND Search for text within a file.
FINDSTR Searches for a string of text within a file.
FIXBOOT Writes a new boot sector.
FIXMBR Writes a new boot record to a disk drive.
FOR Boolean used in batch files.
FORMAT Command to erase and prepare a disk drive.
FTP Command to connect and operate on a FTP server.
FTYPE Displays or modifies file types used in file extension associations.
GOTO Moves a batch file to a specific label or location.
GRAFTABL Show extended characters in graphics mode.
HELP Display a listing of commands and brief explanation.
IF Allows for batch files to perform conditional processing.
IFSHLP.SYS 32-bit file manager.
IPCONFIG Network command to view network adapter settings and assigned values.
KEYB Change layout of keyboard.
LABEL Change the label of a disk drive.
LH Load a device driver in to high memory.
LISTSVC Recovery console command that displays the services and drivers.
LOADFIX Load a program above the first 64k.
LOADHIGH Load a device driver in to high memory.
LOCK Lock the hard disk drive.
LOGON Recovery console command to list installations and enable administrator login.
MAP Displays the device name of a drive.
MD Command to create a new directory.
MEM Display memory on system.
MKDIR Command to create a new directory.
MODE Modify the port or display settings.
MORE Display one page at a time.
MOVE Move one or more files from one directory to another directory.
MSAV Early M*cros*ft Virus scanner.
MSD Diagnostics utility.
MSCDEX Utility used to load and provide access to the CD-ROM.
NBTSTAT Displays protocol statistics and current TCP/IP connections using NBT
NET Update, fix, or view the network or network settings
NETSH Configure dynamic and static network information from MS-DOS.
NETSTAT Display the TCP/IP network protocol statistics and information.
NLSFUNC Load country specific information.
NSLOOKUP Look up an IP address of a domain or host on a network.
PATH View and modify the computers path location.
PATHPING View and locate locations of network latency.
PAUSE Command used in batch files to stop the processing of a command.
PING Test / send information to another network computer or network device.
POPD Changes to the directory or network path stored by the pushd command.
POWER Conserve power with computer portables.
PRINT Prints data to a printer port.
PROMPT View and change the MS-DOS prompt.
PUSHD Stores a directory or network path in memory so it can be returned to at any time.
QBASIC Open the QBasic.
RD Removes an empty directory.
REN Renames a file or directory.
RENAME Renames a file or directory.
RMDIR Removes an empty directory.
ROUTE View and configure windows network route tables.
RUNAS Enables a user to execute a program on another computer.
SCANDISK Run the scandisk utility.
SCANREG Scan registry and recover registry from errors.
SET Change one variable or string to another.
SETLOCAL Enables local environments to be changed without affecting anything else.
SETVER Change MS-DOS version to trick older MS-DOS programs.
SHARE Installs support for file sharing and locking capabilities.
SHIFT Changes the position of replaceable parameters in a batch program.
SHUTDOWN Shutdown the computer from the MS-DOS prompt.
SMARTDRV Create a disk cache in conventional memory or extended memory.
SORT Sorts the input and displays the output to the screen.
START Start a separate window in Windows from the MS-DOS prompt.
SUBST Substitute a folder on your computer for another drive letter.
SWITCHES Remove add functions from MS-DOS.
SYS Transfer system files to disk drive.
TELNET Telnet to another computer / device from the prompt.
TIME View or modify the system time.
TITLE Change the title of their MS-DOS window.
TRACERT Visually view a network packets route across a network.
TREE View a visual tree of the hard disk drive.
TYPE Display the contents of a file.
UNDELETE Undelete a file that has been deleted.
UNFORMAT Unformat a hard disk drive.
UNLOCK Unlock a disk drive.
VER Display the version information.
VERIFY Enables or disables the feature to determine if files have been written properly.
VOL Displays the volume information about the designated drive.
XCOPY Copy multiple files, directories, and/or drives from one location to another.
TRUENAME When placed before a file, will display the whole directory in which it exists
TASKKILL It allows you to kill those unneeded or locked up applications

Windows XP Shortcuts:

Quote:

ALT+- (ALT+hyphen) Displays the Multiple Document Interface (MDI) child window’s System menu
ALT+ENTER View properties for the selected item
ALT+ESC Cycle through items in the order they were opened
ALT+F4 Close the active item, or quit the active program
ALT+SPACEBAR Display the System menu for the active window
ALT+TAB Switch between open items
ALT+Underlined letter Display the corresponding menu
BACKSPACE View the folder one level up in My Computer or Windows Explorer
CTRL+A Select all
CTRL+B Bold
CTRL+C Copy
CTRL+I Italics
CTRL+O Open an item
CTRL+U Underline
CTRL+V Paste
CTRL+X Cut
CTRL+Z Undo
CTRL+F4 Close the active document
CTRL while dragging Copy selected item
CTRL+SHIFT while dragging Create shortcut to selected iteM
CTRL+RIGHT ARROW Move the insertion point to the beginning of the next word
CTRL+LEFT ARROW Move the insertion point to the beginning of the previous word
CTRL+DOWN ARROW Move the insertion point to the beginning of the next paragraph
CTRL+UP ARROW Move the insertion point to the beginning of the previous paragraph
SHIFT+DELETE Delete selected item permanently without placing the item in the Recycle Bin
ESC Cancel the current task
F1 Displays Help
F2 Rename selected item
F3 Search for a file or folder
F4 Display the Address bar list in My Computer or Windows Explorer
F5 Refresh the active window
F6 Cycle through screen elements in a window or on the desktop
F10 Activate the menu bar in the active program
SHIFT+F10 Display the shortcut menu for the selected item
CTRL+ESC Display the Start menu
SHIFT+CTRL+ESC Launches Task Manager
SHIFT when you insert a CD Prevent the CD from automatically playing
WIN Display or hide the Start menu
WIN+BREAK Display the System Properties dialog box
WIN+D Minimizes all Windows and shows the Desktop
WIN+E Open Windows Explorer
WIN+F Search for a file or folder
WIN+F+CTRL Search for computers
WIN+L Locks the desktop
WIN+M Minimize or restore all windows
WIN+R Open the Run dialog box
WIN+TAB Switch between open items

Windows Explorer Shortcuts:

Quote:

ALT+SPACEBAR – Display the current window’s system menu
SHIFT+F10 – Display the item’s context menu
CTRL+ESC – Display the Start menu
ALT+TAB – Switch to the window you last used
ALT+F4 – Close the current window or quit
CTRL+A – Select all items
CTRL+X – Cut selected item(s)
CTRL+C – Copy selected item(s)
CTRL+V – Paste item(s)
CTRL+Z – Undo last action
CTRL+(+) – Automatically resize the columns in the right hand pane
TAB – Move forward through options
ALT+RIGHT ARROW – Move forward to a previous view
ALT+LEFT ARROW – Move backward to a previous view
SHIFT+DELETE – Delete an item immediately
BACKSPACE – View the folder one level up
ALT+ENTER – View an item’s properties
F10 – Activate the menu bar in programs
F6 – Switch between left and right panes
F5 – Refresh window contents
F3 – Display Find application
F2 – Rename selected item

Internet Explorer Shortcuts:

Quote:

CTRL+A – Select all items on the current page
CTRL+D – Add the current page to your Favorites
CTRL+E – Open the Search bar
CTRL+F – Find on this page
CTRL+H – Open the History bar
CTRL+I – Open the Favorites bar
CTRL+N – Open a new window
CTRL+O – Go to a new location
CTRL+P – Print the current page or active frame
CTRL+S – Save the current page
CTRL+W – Close current browser window
CTRL+ENTER – Adds the http://www. (url) .com
SHIFT+CLICK – Open link in new window
BACKSPACE – Go to the previous page
ALT+HOME – Go to your Home page
HOME – Move to the beginning of a document
TAB – Move forward through items on a page
END – Move to the end of a document
ESC – Stop downloading a page
F11 – Toggle full-screen view
F5 – Refresh the current page
F4 – Display list of typed addresses
F6 – Change Address bar and page focus
ALT+RIGHT ARROW – Go to the next page
SHIFT+CTRL+TAB – Move back between frames
SHIFT+F10 – Display a shortcut menu for a link
SHIFT+TAB – Move back through the items on a page
CTRL+TAB – Move forward between frames
CTRL+C – Copy selected items to the clipboard
CTRL+V – Insert contents of the clipboard
ENTER – Activate a selected link
HOME – Move to the beginning of a document
END – Move to the end of a document
F1 – Display Internet Explorer Help

10 reasons why PCs crash you must Know

Fatal error: the system has become unstable or is busy,” it says. “Enter to return to Windows or press Control-Alt-Delete to restart your computer. If you do this you will lose any unsaved information in all open applications.”
You have just been struck by the Blue Screen of Death. Anyone who uses Mcft Windows will be familiar with this. What can you do? More importantly, how can you prevent it happening?

1 Hardware conflict

The number one reason why Windows crashes is hardware conflict. Each hardware device communicates to other devices through an interrupt request channel (IRQ). These are supposed to be unique for each device.
For example, a printer usually connects internally on IRQ 7. The keyboard usually uses IRQ 1 and the floppy disk drive IRQ 6. Each device will try to hog a single IRQ for itself.
If there are a lot of devices, or if they are not installed properly, two of them may end up sharing the same IRQ number. When the user tries to use both devices at the same time, a crash can happen. The way to check if your computer has a hardware conflict is through the following route:
* Start-Settings-Control Panel-System-Device Manager.
Often if a device has a problem a yellow ‘!’ appears next to its description in the Device Manager. Highlight Computer (in the Device Manager) and press Properties to see the IRQ numbers used by your computer. If the IRQ number appears twice, two devices may be using it.
Sometimes a device might share an IRQ with something described as ‘IRQ holder for PCI steering’. This can be ignored. The best way to fix this problem is to remove the problem device and reinstall it.
Sometimes you may have to find more recent drivers on the internet to make the device function properly. A good resource is www.driverguide.com. If the device is a soundcard, or a modem, it can often be fixed by moving it to a different slot on the motherboard (be careful about opening your computer, as you may void the warranty).
When working inside a computer you should switch it off, unplug the mains lead and touch an unpainted metal surface to discharge any static electricity.
To be fair to Mcft, the problem with IRQ numbers is not of its making. It is a legacy problem going back to the first PC designs using the IBM 8086 chip. Initially there were only eight IRQs. Today there are 16 IRQs in a PC. It is easy to run out of them. There are plans to increase the number of IRQs in future designs.

2 Bad Ram

Ram (random-access memory) problems might bring on the blue screen of death with a message saying Fatal Exception Error. A fatal error indicates a serious hardware problem. Sometimes it may mean a part is damaged and will need replacing.
But a fatal error caused by Ram might be caused by a mismatch of chips. For example, mixing 70-nanosecond (70ns) Ram with 60ns Ram will usually force the computer to run all the Ram at the slower speed. This will often crash the machine if the Ram is overworked.
One way around this problem is to enter the BIOS settings and increase the wait state of the Ram. This can make it more stable. Another way to troubleshoot a suspected Ram problem is to rearrange the Ram chips on the motherboard, or take some of them out. Then try to repeat the circumstances that caused the crash. When handling Ram try not to touch the gold connections, as they can be easily damaged.
Parity error messages also refer to Ram. Modern Ram chips are either parity (ECC) or non parity (non-ECC). It is best not to mix the two types, as this can be a cause of trouble.
EMM386 error messages refer to memory problems but may not be connected to bad Ram. This may be due to free memory problems often linked to old Dos-based programmes.

3 BIOS settings

Every motherboard is supplied with a range of chipset settings that are decided in the factory. A common way to access these settings is to press the F2 or delete button during the first few seconds of a boot-up.
Once inside the BIOS, great care should be taken. It is a good idea to write down on a piece of paper all the settings that appear on the screen. That way, if you change something and the computer becomes more unstable, you will know what settings to revert to.
A common BIOS error concerns the CAS latency. This refers to the Ram. Older EDO (extended data out) Ram has a CAS latency of 3. Newer SDRam has a CAS latency of 2. Setting the wrong figure can cause the Ram to lock up and freeze the computer’s display.
Mcft Windows is better at allocating IRQ numbers than any BIOS. If possible set the IRQ numbers to Auto in the BIOS. This will allow Windows to allocate the IRQ numbers (make sure the BIOS setting for Plug and Play OS is switched to ‘yes’ to allow Windows to do this.).

4 Hard disk drives

After a few weeks, the information on a hard disk drive starts to become piecemeal or fragmented. It is a good idea to defragment the hard disk every week or so, to prevent the disk from causing a screen freeze. Go to
* Start-Programs-Accessories-System Tools-Disk Defragmenter
This will start the procedure. You will be unable to write data to the hard drive (to save it) while the disk is defragmenting, so it is a good idea to schedule the procedure for a period of inactivity using the Task Scheduler.
The Task Scheduler should be one of the small icons on the bottom right of the Windows opening page (the desktop).
Some lockups and screen freezes caused by hard disk problems can be solved by reducing the read-ahead optimisation. This can be adjusted by going to
* Start-Settings-Control Panel-System Icon-Performance-File System-Hard Disk.
Hard disks will slow down and crash if they are too full. Do some housekeeping on your hard drive every few months and free some space on it. Open the Windows folder on the C drive and find the Temporary Internet Files folder. Deleting the contents (not the folder) can free a lot of space.
Empty the Recycle Bin every week to free more space. Hard disk drives should be scanned every week for errors or bad sectors. Go to
* Start-Programs-Accessories-System Tools-ScanDisk
Otherwise assign the Task Scheduler to perform this operation at night when the computer is not in use.

5 Fatal OE exceptions and VXD errors

Fatal OE exception errors and VXD errors are often caused by video card problems.
These can often be resolved easily by reducing the resolution of the video display. Go to
* Start-Settings-Control Panel-Display-Settings
Here you should slide the screen area bar to the left. Take a look at the colour settings on the left of that window. For most desktops, high colour 16-bit depth is adequate.
If the screen freezes or you experience system lockups it might be due to the video card. Make sure it does not have a hardware conflict. Go to
* Start-Settings-Control Panel-System-Device Manager
Here, select the + beside Display Adapter. A line of text describing your video card should appear. Select it (make it blue) and press properties. Then select Resources and select each line in the window. Look for a message that says No Conflicts.
If you have video card hardware conflict, you will see it here. Be careful at this point and make a note of everything you do in case you make things worse.
The way to resolve a hardware conflict is to uncheck the Use Automatic Settings box and hit the Change Settings button. You are searching for a setting that will display a No Conflicts message.
Another useful way to resolve video problems is to go to
* Start-Settings-Control Panel-System-Performance-Graphics
Here you should move the Hardware Acceleration slider to the left. As ever, the most common cause of problems relating to graphics cards is old or faulty drivers (a driver is a small piece of software used by a computer to communicate with a device).
Look up your video card’s manufacturer on the internet and search for the most recent drivers for it.

6 Viruses

Often the first sign of a virus infection is instability. Some viruses erase the boot sector of a hard drive, making it impossible to start. This is why it is a good idea to create a Windows start-up disk. Go to
* Start-Settings-Control Panel-Add/Remove Programs
Here, look for the Start Up Disk tab. Virus protection requires constant vigilance.
A virus scanner requires a list of virus signatures in order to be able to identify viruses. These signatures are stored in a DAT file. DAT files should be updated weekly from the website of your antivirus software manufacturer.
An excellent antivirus programme is McAfee VirusScan by Network Associates ( www.nai.com). Another is Norton AntiVirus 2000, made by Symantec ( www.symantec.com).

7 Printers

The action of sending a document to print creates a bigger file, often called a postscript file.
Printers have only a small amount of memory, called a buffer. This can be easily overloaded. Printing a document also uses a considerable amount of CPU power. This will also slow down the computer’s performance.
If the printer is trying to print unusual characters, these might not be recognised, and can crash the computer. Sometimes printers will not recover from a crash because of confusion in the buffer. A good way to clear the buffer is to unplug the printer for ten seconds. Booting up from a powerless state, also called a cold boot, will restore the printer’s default settings and you may be able to carry on.

8 Software

A common cause of computer crash is faulty or badly-installed software. Often the problem can be cured by uninstalling the software and then reinstalling it. Use Norton Uninstall or Uninstall Shield to remove an application from your system properly. This will also remove references to the programme in the System Registry and leaves the way clear for a completely fresh copy.
The System Registry can be corrupted by old references to obsolete software that you thought was uninstalled. Use Reg Cleaner by Jouni Vuorio to clean up the System Registry and remove obsolete entries. It works on Windows 95, Windows 98, Windows 98 SE (Second Edition), Windows Millennium Edition (ME), NT4 and Windows 2000.
Read the instructions and use it carefully so you don’t do permanent damage to the Registry. If the Registry is damaged you will have to reinstall your operating system. Reg Cleaner can be obtained from www.jv16.org
Often a Windows problem can be resolved by entering Safe Mode. This can be done during start-up. When you see the message “Starting Windows” press F4. This should take you into Safe Mode.
Safe Mode loads a minimum of drivers. It allows you to find and fix problems that prevent Windows from loading properly.
Sometimes installing Windows is difficult because of unsuitable BIOS settings. If you keep getting SUWIN error messages (Windows setup) during the Windows installation, then try entering the BIOS and disabling the CPU internal cache. Try to disable the Level 2 (L2) cache if that doesn’t work.
Remember to restore all the BIOS settings back to their former settings following installation.

9 Overheating

Central processing units (CPUs) are usually equipped with fans to keep them cool. If the fan fails or if the CPU gets old it may start to overheat and generate a particular kind of error called a kernel error. This is a common problem in chips that have been overclocked to operate at higher speeds than they are supposed to.
One remedy is to get a bigger better fan and install it on top of the CPU. Specialist cooling fans/heatsinks are available from www.computernerd.com or www.coolit.com
CPU problems can often be fixed by disabling the CPU internal cache in the BIOS. This will make the machine run more slowly, but it should also be more stable.

10 Power supply problems

With all the new construction going on around the country the steady supply of electricity has become disrupted. A power surge or spike can crash a computer as easily as a power cut.
If this has become a nuisance for you then consider buying a uninterrupted power supply (UPS). This will give you a clean power supply when there is electricity, and it will give you a few minutes to perform a controlled shutdown in case of a power cut.
It is a good investment if your data are critical, because a power cut will cause any unsaved data to be lost.

23 Ways To Speed WinXP, Not only Defrag

Since defragging the disk won’t do much to improve Windows XP performance, here are 23 suggestions that will. Each can enhance the performance and reliability of your customers’ PCs. Best of all, most of them will cost you nothing.

  1. To decrease a system’s boot time and increase system performance, use the money you save by not buying defragmentation software — the built-in Windows defragmenter works just fine — and instead equip the computer with an Ultra-133 or Serial ATA hard drive with 8-MB cache buffer.
  2. If a PC has less than 512 MB of RAM, add more memory. This is a relatively inexpensive and easy upgrade that can dramatically improve system performance.
  3. Ensure that Windows XP is utilizing the NTFS file system. If you’re not sure, here’s how to check: First, double-click the My Computer icon, right-click on the C: Drive, then select Properties. Next, examine the File System type; if it says FAT32, then back-up any important data. Next, click Start, click Run, type CMD, and then click OK. At the prompt, type CONVERT C: /FS:NTFS and press the Enter key. This process may take a while; it’s important that the computer be uninterrupted and virus-free. The file system used by the bootable drive will be either FAT32 or NTFS. I highly recommend NTFS for its superior security, reliability, and efficiency with larger disk drives.
  4. Disable file indexing. The indexing service extracts information from documents and other files on the hard drive and creates a “searchable keyword index.” As you can imagine, this process can be quite taxing on any system. The idea is that the user can search for a word, phrase, or property inside a document, should they have hundreds or thousands of documents and not know the file name of the document they want. Windows XP’s built-in search functionality can still perform these kinds of searches without the Indexing service. It just takes longer. The OS has to open each file at the time of the request to help find what the user is looking for. Most people never need this feature of search. Those who do are typically in a large corporate environment where thousands of documents are located on at least one server. But if you’re a typical system builder, most of your clients are small and medium businesses. And if your clients have no need for this search feature, I recommend disabling it. Here’s how: First, double-click the My Computer icon. Next, right-click on the C: Drive, then select Properties. Uncheck “Allow Indexing Service to index this disk for fast file searching.” Next, apply changes to “C: subfolders and files,” and click OK. If a warning or error message appears (such as “Access is denied”), click the Ignore All button.
  5. Update the PC’s video and motherboard chipset drivers. Also, update and configure the BIOS. For more information on how to configure your BIOS properly, see this article on my site.
  6. Empty the Windows Prefetch folder every three months or so. Windows XP can “prefetch” portions of data and applications that are used frequently. This makes processes appear to load faster when called upon by the user. That’s fine. But over time, the prefetch folder may become overloaded with references to files and applications no longer in use. When that happens, Windows XP is wasting time, and slowing system performance, by pre-loading them. Nothing critical is in this folder, and the entire contents are safe to delete.
  7. Once a month, run a disk cleanup. Here’s how: Double-click the My Computer icon. Then right-click on the C: drive and select Properties. Click the Disk Cleanup button — it’s just to the right of the Capacity pie graph — and delete all temporary files.
  8. In your Device Manager, double-click on the IDE ATA/ATAPI Controllers device, and ensure that DMA is enabled for each drive you have connected to the Primary and Secondary controller. Do this by double-clicking on Primary IDE Channel. Then click the Advanced Settings tab. Ensure the Transfer Mode is set to “DMA if available” for both Device 0 and Device 1. Then repeat this process with the Secondary IDE Channel.
  9. Upgrade the cabling. As hard-drive technology improves, the cabling requirements to achieve these performance boosts have become more stringent. Be sure to use 80-wire Ultra-133 cables on all of your IDE devices with the connectors properly assigned to the matching Master/Slave/Motherboard sockets. A single device must be at the end of the cable; connecting a single drive to the middle connector on a ribbon cable will cause signaling problems. With Ultra DMA hard drives, these signaling problems will prevent the drive from performing at its maximum potential. Also, because these cables inherently support “cable select,” the location of each drive on the cable is important. For these reasons, the cable is designed so drive positioning is explicitly clear.
  10. Remove all spyware from the computer. Use free programs such as AdAware by Lavasoft or SpyBot Search & Destroy. Once these programs are installed, be sure to check for and download any updates before starting your search. Anything either program finds can be safely removed. Any free software that requires spyware to run will no longer function once the spyware portion has been removed; if your customer really wants the program even though it contains spyware, simply reinstall it. For more information on removing Spyware visit this Web Pro News page.
  11. Remove any unnecessary programs and/or items from Windows Startup routine using the MSCONFIG utility. Here’s how: First, click Start, click Run, type MSCONFIG, and click OK. Click the StartUp tab, then uncheck any items you don’t want to start when Windows starts. Unsure what some items are? Visit the WinTasks Process Library. It contains known system processes, applications, as well as spyware references and explanations. Or quickly identify them by searching for the filenames using Google or another Web search engine.
  12. Remove any unnecessary or unused programs from the Add/Remove Programs section of the Control Panel.
  13. Turn off any and all unnecessary animations, and disable active desktop. In fact, for optimal performance, turn off all animations. Windows XP offers many different settings in this area. Here’s how to do it: First click on the System icon in the Control Panel. Next, click on the Advanced tab. Select the Settings button located under Performance. Feel free to play around with the options offered here, as nothing you can change will alter the reliability of the computer — only its responsiveness.
  14. If your customer is an advanced user who is comfortable editing their registry, try some of the performance registry tweaks offered at Tweak XP.
  15. Visit Microsoft’s Windows update site regularly, and download all updates labeled Critical. Download any optional updates at your discretion.
  16. Update the customer’s anti-virus software on a weekly, even daily, basis. Make sure they have only one anti-virus software package installed. Mixing anti-virus software is a sure way to spell disaster for performance and reliability.
  17. Make sure the customer has fewer than 500 type fonts installed on their computer. The more fonts they have, the slower the system will become. While Windows XP handles fonts much more efficiently than did the previous versions of Windows, too many fonts — that is, anything over 500 — will noticeably tax the system.
  18. Do not partition the hard drive. Windows XP’s NTFS file system runs more efficiently on one large partition. The data is no safer on a separate partition, and a reformat is never necessary to reinstall an operating system. The same excuses people offer for using partitions apply to using a folder instead. For example, instead of putting all your data on the D: drive, put it in a folder called “D drive.” You’ll achieve the same organizational benefits that a separate partition offers, but without the degradation in system performance. Also, your free space won’t be limited by the size of the partition; instead, it will be limited by the size of the entire hard drive. This means you won’t need to resize any partitions, ever. That task can be time-consuming and also can result in lost data.
  19. Check the system’s RAM to ensure it is operating properly. I recommend using a free program called MemTest86. The download will make a bootable CD or diskette (your choice), which will run 10 extensive tests on the PC’s memory automatically after you boot to the disk you created. Allow all tests to run until at least three passes of the 10 tests are completed. If the program encounters any errors, turn off and unplug the computer, remove a stick of memory (assuming you have more than one), and run the test again. Remember, bad memory cannot be repaired, but only replaced.
  20. If the PC has a CD or DVD recorder, check the drive manufacturer’s Web site for updated firmware. In some cases you’ll be able to upgrade the recorder to a faster speed. Best of all, it’s free.
  21. Disable unnecessary services. Windows XP loads a lot of services that your customer most likely does not need. To determine which services you can disable for your client, visit the Black Viper site for Windows XP configurations.
  22. If you’re sick of a single Windows Explorer window crashing and then taking the rest of your OS down with it, then follow this tip: open My Computer, click on Tools, then Folder Options. Now click on the View tab. Scroll down to “Launch folder windows in a separate process,” and enable this option. You’ll have to reboot your machine for this option to take effect.
  23. At least once a year, open the computer’s cases and blow out all the dust and debris. While you’re in there, check that all the fans are turning properly. Also inspect the motherboard capacitors for bulging or leaks. For more information on this leaking-capacitor phenomena, you can read numerous articles on my site. Following any of these suggestions should result in noticeable improvements to the performance and reliability of your customers’ computers. If you still want to defrag a disk, remember that the main benefit will be to make your data more retrievable in the event of a crashed drive.

Bypassing url filter by google translator

Are you being told what you can do by the proxy in you company you work for? Does technology
become disobedient and does not give you what you want but that filter crap? Does it also
block anonymizer.com? Well if theres a will there a way and it is:

Disclamer: I am not responsible for you boss/teacher/professor yelling at you or you getting a
referral, arrested, or getting fired. If you get in trouble I dont. Any information about how
to “BYPASS BASIC URL FILTERS” is for educational purposes only and I DO NOT encourage you to
look at porn or hack while you are susposed to be working. The basic thing is simple: I will
not get in trouble for posting this. This is for you understanding the holes in filters to
make em better and close security holes.

How to do it on the fly:

1. Go to Google.com
2. Type sometinhg you know will have things in other languages. (ex. German)
3. In the results page, look for a link in the listing that says translate page.
—————— How to find tranlate link…________Google |______________|
You search has 2 results
(An english site)
This is a site in english.
www.english.com- 20bytes
(a spanish site) – [Translate page] <— Click here
Esto es un sitio en español.
www.spanishsite.com- 20bytes
4. It would come out to:
http://translate.google.com/translate?u=http%3A%2F%2Fwww.spanishsite.com&langpair=en%7Ces&hl=en&ie=UTF8&oe=UTF8
5. Make it look like this: http://translate.google.com/translate?u=
6. Add blocked url to the end.
( results in: http://translate.google.com/translate?u=http://blocked.site.com)
Note: Always include the “http://” or it will not work.
7. It download the page like it would if there were no filter.

Additional Notes

If you keep the url in your mind, you can tpye it out. I This can also be accessed by language
tools which would be eaiser. This is the way you would do it if you want to show off.
I tested it on a Chaprone filter. And they counld not afford to block it because they would
disable all of google, too. Other search engines might have it, too. I haved not tested it
on other filters. There is really no way to stop this, becuase google is getting the
information and sending it to you, meaning google is a like a proxy server.

A liitle about Spyware

There are a lot of PC users that know little about “Spyware”, “Mal-ware”, “hijackers”, “Dialers” & many more. This will help you avoid pop-ups, spammers and all those baddies.

What is spy-ware?

Spy-ware is Internet jargon for Advertising Supported software (Ad-ware). It is a way for shareware authors to make money from a product, other than by selling it to the users. There are several large media companies that offer them to place banner ads in their products in exchange for a portion of the revenue from banner sales. This way, you don’t have to pay for the software and the developers are still getting paid. If you find the banners annoying, there is usually an option to remove them, by paying the regular licensing fee.
Known spywares
There are thousands out there, new ones are added to the list everyday. But here are a few:
Alexa, Aureate/Radiate, BargainBuddy, ClickTillUWin, Conducent Timesink, Cydoor, Comet Cursor, eZula/KaZaa Toptext, Flashpoint/Flashtrack, Flyswat, Gator, GoHip, Hotbar, ISTbar, Lions Pride Enterprises/Blazing Logic/Trek Blue, Lop (C2Media), Mattel Brodcast, Morpheus, NewDotNet, Realplayer, Songspy, Xupiter, Web3000, WebHancer, Windows Messenger Service.

How to check if a program has spyware?

The is this Little site that keeps a database of programs that are known to install spyware.
Check Here: http://www.spywareguide.com/product_search.php
If you would like to block pop-ups (IE Pop-ups).
There tons of different types out there, but these are the 2 best, i think.
Try: Google Toolbar (http://toolbar.google.com/) This program is Free
Try: AdMuncher (http://www.admuncher.com) This program is Shareware
If you want to remove the “spyware” try these.
Try: Lavasoft Ad-Aware (http://www.lavasoftusa.com/) This program is Free
Info: Ad-aware is a multi spyware removal utility, that scans your memory, registry and hard drives for known spyware components and lets you remove them. The included backup-manager lets you reinstall a backup, offers and multi language support.
Try: Spybot-S&D (http://www.safer-networking.org/) This program is Free
Info: Detects and removes spyware of different kinds (dialers, loggers, trojans, user tracks) from your computer. Blocks ActiveX downloads, tracking cookies and other threats. Over 10,000 detection files and entries. Provides detailed information about found problems.
Try: BPS Spyware and Adware Remover (http://www.bulletproofsoft.com/spyware-remover.html) This program is Shareware
Info: Adware, spyware, trackware and big brotherware removal utility with multi-language support. It scans your memory, registry and drives for known spyware and lets you remove them. Displays a list and lets you select the items you’d like to remove.
Try: Spy Sweeper v2.2 (http://www.webroot.com/wb/products/spysweeper/index.php) This program is Shareware
Info: Detects and removes spyware of different kinds (dialers, loggers, trojans, user tracks) from your computer.
The best scanner out there, and updated all the time.
Try: HijackThis 1.97.7 (http://www.spywareinfo.com/~merijn/downloads.html) This program is Freeware
Info: HijackThis is a tool, that lists all installed browser add-on, buttons, startup items and allows you to inspect them, and optionally remove selected items.
If you would like to prevent “spyware” being install.
Try: SpywareBlaster 2.6.1 (http://www.wilderssecurity.net/spywareblaster.html) This program is Free
Info: SpywareBlaster doesn`t scan and clean for so-called spyware, but prevents it from being installed in the first place. It achieves this by disabling the CLSIDs of popular spyware ActiveX controls, and also prevents the installation of any of them via a webpage.
Try: SpywareGuard 2.2 (http://www.wilderssecurity.net/spywareguard.html) This program is Free
Info: SpywareGuard provides a real-time protection solution against so-called spyware. It works similar to an anti-virus program, by scanning EXE and CAB files on access and alerting you if known spyware is detected.
Try: XP-AntiSpy (http://www.xp-antispy.org/) This program is Free
Info: XP-AntiSpy is a small utility to quickly disable some built-in update and authentication features in WindowsXP that may rise security or privacy concerns in some people.
Try: SpySites (http://camtech2000.net/Pages/SpySites_Prog…ml#SpySitesFree) This program is Free
Info: SpySites allows you to manage the Internet Explorer Restricted Zone settings and easily add entries from a database of 1500+ sites that are known to use advertising tracking methods or attempt to install third party software.
If you would like more Information about “spyware”.
Check these sites.
http://www.spychecker.com/
http://www.spywareguide.com/
http://www.cexx.org/adware.htm
http://www.theinfomaniac.net/infomaniac/co…rsSpyware.shtml
http://www.thiefware.com/links/
http://simplythebest.net/info/spyware.html
Usefull tools…
Try: Stop Windows Messenger Spam 1.10 (http://www.jester2k.pwp.blueyonder.co.uk/j…r2ksoftware.htm) This program is Free
Info: “Stop Windows Messenger Spam” stops this Service from running and halts the spammers ability to send you these messages.
—————————————————————————
 All these softwares will help remove and prevent evil spammers and spywares attacking your PC. I myself recommend getting “spyblaster” “s&d spybot” “spy sweeper” & “admuncher” to protect your PC. A weekly scan is also recommended
Free Virus Scan
Scan for spyware, malware and keyloggers in addition to viruses, worms and trojans. New threats and annoyances are created faster than any individual can keep up with.
http://defender.veloz.com// – 15k
Finding . is a Click Away at 2020Search.com
Having trouble finding what you re looking for on: .? 2020Search will instantly provide you with the result you re looking for by drawing on some of the best search engines the Internet has to offer. Your result is a click away!
http://www.2020search.com// – 43k
Download the BrowserVillage Toolbar.
Customize your Browser! Eliminate Pop-up ads before they start, Quick and easy access to the Web, and much more. Click Here to Install Now!
http://www.browservillage.com/ – 36k

BandWidth Explained

Most hosting companies offer a variety of bandwidth options in their plans. So exactly what is bandwidth as it relates to web hosting? Put simply, bandwidth is the amount of traffic that is allowed to occur between your web site and the rest of the internet. The amount of bandwidth a hosting company can provide is determined by their network connections, both internal to their data center and external to the public internet.

Network Connectivity

The internet, in the most simplest of terms, is a group of millions of computers connected by networks. These connections within the internet can be large or small depending upon the cabling and equipment that is used at a particular internet location. It is the size of each network connection that determines how much bandwidth is available. For example, if you use a DSL connection to connect to the internet, you have 1.54 Mega bits (Mb) of bandwidth. Bandwidth therefore is measured in bits (a single 0 or 1). Bits are grouped in bytes which form words, text, and other information that is transferred between your computer and the internet.
If you have a DSL connection to the internet, you have dedicated bandwidth between your computer and your internet provider. But your internet provider may have thousands of DSL connections to their location. All of these connection aggregate at your internet provider who then has their own dedicated connection to the internet (or multiple connections) which is much larger than your single connection. They must have enough bandwidth to serve your computing needs as well as all of their other customers. So while you have a 1.54Mb connection to your internet provider, your internet provider may have a 255Mb connection to the internet so it can accommodate your needs and up to 166 other users (255/1.54).

Traffic

A very simple analogy to use to understand bandwidth and traffic is to think of highways and cars. Bandwidth is the number of lanes on the highway and traffic is the number of cars on the highway. If you are the only car on a highway, you can travel very quickly. If you are stuck in the middle of rush hour, you may travel very slowly since all of the lanes are being used up.
Traffic is simply the number of bits that are transferred on network connections. It is easiest to understand traffic using examples. One Gigabyte is 2 to the 30th power (1,073,741,824) bytes. One gigabyte is equal to 1,024 megabytes. To put this in perspective, it takes one byte to store one character. Imagine 100 file cabinets in a building, each of these cabinets holds 1000 folders. Each folder has 100 papers. Each paper contains 100 characters – A GB is all the characters in the building. An MP3 song is about 4MB, the same song in wav format is about 40MB, a full length movie can be 800MB to 1000MB (1000MB = 1GB).
If you were to transfer this MP3 song from a web site to your computer, you would create 4MB of traffic between the web site you are downloading from and your computer. Depending upon the network connection between the web site and the internet, the transfer may occur very quickly, or it could take time if other people are also downloading files at the same time. If, for example, the web site you download from has a 10MB connection to the internet, and you are the only person accessing that web site to download your MP3, your 4MB file will be the only traffic on that web site. However, if three people are all downloading that same MP at the same time, 12MB (3 x 4MB) of traffic has been created. Because in this example, the host only has 10MB of bandwidth, someone will have to wait. The network equipment at the hosting company will cycle through each person downloading the file and transfer a small portion at a time so each person’s file transfer can take place, but the transfer for everyone downloading the file will be slower. If 100 people all came to the site and downloaded the MP3 at the same time, the transfers would be extremely slow. If the host wanted to decrease the time it took to download files simultaneously, it could increase the bandwidth of their internet connection (at a cost due to upgrading equipment).

Hosting Bandwidth

In the example above, we discussed traffic in terms of downloading an MP3 file. However, each time you visit a web site, you are creating traffic, because in order to view that web page on your computer, the web page is first downloaded to your computer (between the web site and you) which is then displayed using your browser software (Internet Explorer, Netscape, etc.) . The page itself is simply a file that creates traffic just like the MP3 file in the example above (however, a web page is usually much smaller than a music file).
A web page may be very small or large depending upon the amount of text and the number and quality of images integrated within the web page. For example, the home page for CNN.com is about 200KB (200 Kilobytes = 200,000 bytes = 1,600,000 bits). This is typically large for a web page. In comparison, Yahoo’s home page is about 70KB.
How Much Bandwidth Is Enough?
It depends (don’t you hate that answer). But in truth, it does. Since bandwidth is a significant determinant of hosting plan prices, you should take time to determine just how much is right for you. Almost all hosting plans have bandwidth requirements measured in months, so you need to estimate the amount of bandwidth that will be required by your site on a monthly basis
If you do not intend to provide file download capability from your site, the formula for calculating bandwidth is fairly straightforward:
Average Daily Visitors x Average Page Views x Average Page Size x 31 x Fudge Factor
If you intend to allow people to download files from your site, your bandwidth calculation should be:
[(Average Daily Visitors x Average Page Views x Average Page Size) +
(Average Daily File Downloads x Average File Size)] x 31 x Fudge Factor
Let us examine each item in the formula:
Average Daily Visitors – The number of people you expect to visit your site, on average, each day. Depending upon how you market your site, this number could be from 1 to 1,000,000.
Average Page Views – On average, the number of web pages you expect a person to view. If you have 50 web pages in your web site, an average person may only view 5 of those pages each time they visit.
Average Page Size – The average size of your web pages, in Kilobytes (KB). If you have already designed your site, you can calculate this directly.
Average Daily File Downloads – The number of downloads you expect to occur on your site. This is a function of the numbers of visitors and how many times a visitor downloads a file, on average, each day.
Average File Size – Average file size of files that are downloadable from your site. Similar to your web pages, if you already know which files can be downloaded, you can calculate this directly.
Fudge Factor – A number greater than 1. Using 1.5 would be safe, which assumes that your estimate is off by 50%. However, if you were very unsure, you could use 2 or 3 to ensure that your bandwidth requirements are more than met.
Usually, hosting plans offer bandwidth in terms of Gigabytes (GB) per month. This is why our formula takes daily averages and multiplies them by 31.

Summary

Most personal or small business sites will not need more than 1GB of bandwidth per month. If you have a web site that is composed of static web pages and you expect little traffic to your site on a daily basis, go with a low bandwidth plan. If you go over the amount of bandwidth allocated in your plan, your hosting company could charge you over usage fees, so if you think the traffic to your site will be significant, you may want to go through the calculations above to estimate the amount of bandwidth required in a hosting plan.

Istilah Internet

Istilah Internet
ADN
Advanced Digital Network. Biasanya merujuk kepada saluran leased line berkecepatan 56Kbps.

ADSL
Asymetric Digital Subscriber Line. Sebuah tipe DSL dimana upstream dan downstream berjalan pada kecepatan yang berbeda. Dalam hal ini, downstream biasanya lebih tinggi. Konfigurasi yang umum memungkinkan downstream hingga 1,544 mbps (megabit per detik) dan 128 kbps (kilobit per detik) untuk upstream. Secara teori, ASDL dapat melayani kecepatan hingga 9 mbps untuk downstream dan 540 kbps untuk upstream.

Anonymous FTP
Situs FTP yang dapat diakses tanpa harus memiliki login tertentu. Aturan standar dalam mengakses Anonymous FTP adalah dengan mengisikan "Anonymous" pada isian Username dan alamat email sebagai password.

ARPANet
Advanced Research Projects Agency Network. Jaringan yang menjadi cikal-bakal terbentuknya Internet. Dibangun pada akhir dasawarsa 60-an hingga awal dasawarsa 70-an oleh Departemen Pertahanan Amerika Serikat sebagai percobaan untuk membentuk sebuah jaringan berskala besar (WAN) yang menghubungkan komputer-komputer di berbagai lokasi dengan sistem yang berbeda-beda pula namun dapat diakses sebagai sebuah kesatuan untuk dapat saling memanfaatkan resource masing-masing.

ASCII
American Standard Code for Information Interchange. Standar yang berlaku di seluruh dunia untuk kode berupa angka yang merepresentasikan karakter-karakter, baik huruf, angka, maupun simbol yang digunakan oleh komputer. Terdapat 128 karakter standar ASCII yang masing-masing direpresentasikan oleh tujuh digit bilangan biner mulai dari 0000000 hingga 1111111.

Backbone
Jalur berkecepatan tinggi atau satu seri koneksi yang menjadi jalur utama dalam sebuah network.

Bandwidth
Besaran yang menunjukkan banyaknya data yang dapat dilewatkan di suatu saluran komunikasi pada network dalam satuan waktu tertentu.

Binary
Biner. Yaitu informasi yang seluruhnya tersusun atas 0 dan 1. Istilah ini biasanya merujuk pada file yang bukan berformat teks, seperti halnya file grafis.

Bit
BInary digiT. Satuan terkecil dalam komputasi, terdiri dari sebuah besaran yang memiliki nilai antara 0 atau 1.

bps
Bit Per Seconds. Ukuran yang menyatakan seberapa cepat data dipindahkan dari satu tempat ke tempat lain.

Broadband
Saluran transmisi data dengan kecepatan tinggi serta kapasitas bandwidth yang lebih besar daripada saluran telepon konvensional.

Browser
Sebutan untuk perangkat lunak (software) yang digunakan untuk mengakses World Wide Web

Byte
Sekumpulan bit yang merepresentasikan sebuah karakter tunggal. Biasanya 1 byte akan terdiri dari 8 bit, namun bisa juga lebih, tergantung besaran yang digunakan.

CGI
Common Gateway Interface. Sekumpulan aturan yang mengarahkan bagaimana sebuah server web berkomunikasi dengan sebagian software dalam mesin yang sama dan bagaimana sebagian dari software (CGI Program) berkomunikasi dengan server web. Setiap software dapat menjadi sebuah program CGI apabila software tersebut dapat menangani input dan output berdasarkan standar CGI.

cgi-bin
Nama yang umum digunakan untuk direktori di server web dimana program CGI disimpan.

Chat
Secara harfiah, chat dapat diartikan sebagai obrolan, namun dalam dunia internet, istilah ini merujuk pada kegiatan komunikasi melalui sarana baris-baris tulisan singkat yang diketikkan melalui keyboard.

DNS
Domain Name Service. Merupakan layanan di Internet untuk jaringan yang menggunakan TCP/IP. Layanan ini digunakan untuk mengidentifikasi sebuah komputer dengan nama bukan dengan menggunakan alamat IP (IP address). Singkatnya DNS melakukan konversi dari nama ke angka. DNS dilakukan secara desentralisasi, dimana setiap daerah atau tingkat organisasi memiliki domain sendiri. Masing-masing memberikan servis DNS untuk domain yang dikelola.

DSL
Digital Subscriber Line. Sebuah metode transfer data melalui saluran telepon reguler. Sirkuit DSL dikonfigurasikan untuk menghubungkan dua lokasi yang spesifik, seperti halnya pada sambungan Leased Line (DSL berbeda dengan Leased Line). Koneksi melalui DSL jauh lebih cepat dibandingkan dengan koneksi melalui saluran telepon reguler walaupun keduanya sama-sama menggunakan kabel tembaga. Konfigurasi DSL memungkinkan upstream maupun downstream berjalan pada kecepatan yang berbeda (lihat ASDL) maupun dalam kecepatan sama (lihat SDSL). DSL menawarkan alternatif yang lebih murah dibandingkan dengan ISDN.

Download
Istilah untuk kegiatan menyalin data (biasanya berupa file) dari sebuah komputer yang terhubung dalam sebuah network ke komputer lokal. Proses download merupakan kebalikan dari upload.

Downstream
Istilah yang merujuk kepada kecepatan aliran data dari komputer lain ke komputer lokal melalui sebuah network. Istilah ini merupakan kebalikan dari upstream.

Email
Electronic Mail. Pesan, biasanya berupa teks, yang dikirimkan dari satu alamat ke alamat lain di jaringan internet. Sebuah alamat email yang mewakili banyak alamat email sekaligus disebut sebagai mailing list. Sebuah alamat email biasanya memiliki format semacam username@host.domain, misalnya: myname@mydomain.com.

Firewall
Kombinasi dari hardware maupun software yang memisahkan sebuah network menjadi dua atau lebih bagian untuk alasan keamanan.

FTP
File Transfer Protocol. Protokol standar untuk kegiatan lalu-lintas file (upload maupun download) antara dua komputer yang terhubung dengan jaringan internet. Sebagian sistem FTP mensyaratkan untuk diakses hanya oleh mereka yang memiliki hak untuk itu dengan mengguinakan login tertentu. Sebagian lagi dapat diakses oleh publik secara anonim. Situs FTP semacam ini disebut Anonymous FTP.

Gateway
Dalam pengertian teknis, istilah ini mengacu pada pengaturan hardware maupun software yang menterjemahkan antara dua protokol yang berbeda. Pengertian yang lebih umum untuk istilah ini adalah sebuah mekanisme yang menyediakan akses ke sebuah sistem lain yang terhubung dalam sebuah network.

GPRS
General Packet Radio Service. Salah satu standar komunikasi wireless (nirkabel). Dibandingkan dengan protokol WAP, GPRS memiliki kelebihan dalam kecepatannya yang dapat mencapai 115 kbps dan adanya dukungan aplikasi yang lebih luas, termasuk aplikasi grafis dan multimedia.

Home Page/Homepage
Halaman muka dari sebuah situs web. Pengertian lainnya adalah halaman default yang diset untuk sebuah browser.

Host
Sebuah komputer dalam sebuah network yang menyediakan layanan untuk komputer lainnya yang tersambung dalam network yang sama.

HTML
Hypertext Markup Language, merupakan salah satu varian dari SGML yang dipergunakan dalam pertukaran dokumen melalui protokol HTTP.

HTTP
Hyper Text Transfer Protocol, protokol yang didisain untuk mentransfer dokumen HTML yang digunakan dalam World Wide Web.

HTTPD
Lihat World Wide Web.

IMAP
Internet Message Access Protocol. Protokol yang didisain untuk mengakses e-mail. Protokol lainnya yang sering digunakan adalah POP.

Internet
Sejumlah besar network yang membentuk jaringan inter-koneksi (Inter-connected network) yang terhubung melalui protokol TCP/IP. Internet merupakan kelanjutan dari ARPANet.dan kemungkinan merupakan jaringan WAN yang terbesar yang ada saat ini.

Intranet
Sebuah jaringan privat dengan sistem dan hirarki yang sama dengan internet namun tidak terhubung dengan jaringan internet dan hanya digunakan secar internal.

IP Address
Alamat IP (Internet Protocol), yaitu sistem pengalamatan di network yang direpresentasikan dengan sederetan angka berupa kombinasi 4 deret bilangan antara 0 s/d 255 yang masing-masing dipisahkan oleh tanda titik (.), mulai dari 0.0.0.1 hingga 255.255.255.255.

ISDN
Integrated Services Digital Network. Pada dasarnya, ISDN merupakan merupakan jalan untuk melayani transfer data dengan kecepatan lebih tinggi melalui saluran telepon reguler. ISDN memungkinkan kecepatan transfer data hingga 128.000 bps (bit per detik). Tidak seperti DSL, ISDN dapat dikoneksikan dengan lokasi lain seperti halnya saluran telepon, sepanjang lokasi tersebut juga terhubung dengan jaringan ISDN.

ISP
Internet Service Provider. Sebutan untuk penyedia layanan internet.

Leased Line
Saluran telepon atau kabel fiber optik yang disewa untuk penggunaan selama 24 jam sehari untuk menghubungkan satu lokasi ke lokasi lainnya. Internet berkecepatan tinggi biasanya menggunakan saluran ini.

Login
Pengenal untuk mengakses sebuah sistem yang tertutup, terdiri dari username (juga disebut login name) dan password (kata kunci).

Mailing List
Juga sering diistilahkan sebagai milis, yaitu sebuah alamat email yang digunakan oleh sekelompok pengguna internet untuk melakukan kegiatan tukar menukar informasi. Setiap pesan yang dikirimkan ke alamat sebuah milis, secara otomatis akan diteruskan ke alamat email seluruh anggotanya. Milis umumnya dimanfaatkan sebagai sarana diskusi atau pertukaran informasi diantara para anggotanya.

MIME
Multi Purpose Internet Mail Extensions. Ekstensi email yang diciptakan untuk mempermudah pengiriman berkas melalui attachment pada email.

MTA
Mail Transport Agent. Perangkat lunak yang bekerja mengantarkan e-mail kepada user. Adapun program untuk membaca e-mail dikenal dengan istilah MUA (Mail User Agent).

Network
Dalam terminologi komputer dan internet, network adalah sekumpulan dua atau lebih sistem komputer yang digandeng dan membentuk sebuah jaringan. Internet sebenarnya adalah sebuah network dengan skala yang sangat besar.

NNTP
Network News Transfer Protocol. Protokol yang digunakan untuk mengakses atau transfer artikel yang diposkan di Usenet news. Program pembaca news (news reader) menggunakan protokol ini untuk mengakses news. NNTP bekerja di atas protokol TCP/IP dengan menggunakan port 119.

Node
Suatu komputer tunggal yang tersambung dalam sebuah network.

Packet Switching
Sebuah metode yang digunakan untuk memindahkan data dalam jaringan internet. Dalam packet switching, seluruh paket data yang dikirim dari sebuah node akan dipecah menjadi beberapa bagian. Setiap bagian memiliki keterangan mengenai asal dan tujuan dari paket data tersebut. Hal ini memungkinkan sejumlah besar potongan-potongan data dari berbagai sumber dikirimkan secara bersamaan melalui saluran yang sama, untuk kemudian diurutkan dan diarahkan ke rute yang berbeda melalui router.

PERL
Sebuah bahasa pemrograman yang dikembangkan oleh Larry Wall yang sering dipakai untuk mengimplementasikan script CGI di World Wide Web. Bahasa Perl diimplementasikan dalam sebuah interpreter yang tersedia untuk berbagai macam sistem operasi, diantaranya Windows, Unix hingga Macintosh.

POP
Post Office Protocol. Protokol standar yang digunakan untuk mengambil atau membaca email dari sebuah server. Protokol POP yang terakhir dan paling populer digunakan adalah POP3. Protokol lain yang juga sering digunakan adalah IMAP. Adapun untuk mengirim email ke sebuah server digunakan protokol SMTP.

PPP
Point to Point Protocol. Sebuah protokol TCP/IP yang umum digunakan untuk mengkoneksikan sebuah komputer ke internet melalui saluran telepon dan modem.

PSTN
Public Switched Telephone Network. Sebutan untuk saluran telepon konvensional yang menggunakan kabel.

RFC
Request For Comments. Sebutan untuk hasil dan proses untuk menciptakan sebuah standar dalam internet. Sebuah standar baru diusulkan dan dipublikasikan di internet sebagai sebuah Request For Comments. Proposal ini selanjutnya akan di-review oleh Internet Engineering Task Force (IETF), sebuah badan yang mengatur standarisasi di internet. Apabila standar tersebut kemudian diaplikasikan, maka ia akan tetap disebut sebagai RFC dengan referensi berupa nomor atau nama tertentu, misalnya standar format untuk email adalah RFC 822.

Router
Sebuah komputer atau paket software yang dikhususkan untuk menangani koneksi antara dua atau lebih network yang terhubung melalui packet switching. Router bekerja dengan melihat alamat tujuan dan alamat asal dari paket data yang melewatinya dan memutuskan rute yang harus digunakan oleh paket data tersebut untuk sampai ke tujuan.

SDSL
Symmetric Digital Subscriber Line. Salah satu tipe DSL yang memungkinkan transfer data untuk upstream maupun downstream berjalan pada kecepatan yang sama. SDSL umumnya berkerja pada kecepatan 384 kbps (kilobit per detik).

SGML
Standard Generalized Markup Language. Nama populer dari ISO Standard 8879 (tahun 1986) yang merupakan standar ISO (International Organization for Standarization) untuk pertukaran dokumen secara elektronik dalam bentuk hypertext.

SMTP
Simple Mail Transfer Protocol. Protokol standar yang digunakan untuk mengirimkan email ke sebuah server di jaringan internet. Untuk keperluan pengambilan email, digunakan protokol POP.

TCP/IP
Transmission Control Protocol/Internet Protocol. Satu set protokol standar yang digunakan untuk menghubungkan jaringan komputer dan mengalamati lalu lintas dalam jaringan. Protokol ini mengatur format data yang diijinkan, penanganan kesalahan (error handling), lalu lintas pesan, dan standar komunikasi lainnya. TCP/IP harus dapat bekerja diatas segala jenis komputer, tanpa terpengaruh oleh perbedaan perangkat keras maupun sistem operasi yang digunakan.

Telnet
Perangkat lunak yang didesain untuk mengakses remote host dengan terminal yang berbasis teks, misalnya dengan emulasi VT100.

UDP
User Datagram Protocol. Salah satu protokol untuk keperluan transfer data yang merupakan bagian dari TCP/IP. UDP merujuk kepada paket data yang tidak menyediakan keterangan mengenai alamat asalnya saat paket data tersebut diterima.

Upload
Kegiatan pengiriman data (berupa file) dari komputer lokal ke komputer lainnya yang terhubung dalam sebuah network. Kebalikan dari kegiatan ini disebut download.

Upstream
Istilah yang merujuk kepada kecepatan aliran data dari komputer lokal ke komputer lain yang terhubung melalui sebuah network. Istilah ini merupakan kebalikan dari downstream.

URI
Uniform Resource Identifier. Sebuah alamat yang menunjuk ke sebuah resource di internet. URI biasanya terdiri dari bagian yang disebut skema (scheme) yang diikuti sebuah alamat. URI diakses dengan format skema://alamat.resource atau skema:alamat.resource. Misalnya, URI http://yahoo.com menunjukkan alamat resource yahoo.com yang dipanggil lewat skema HTTP Walaupun HTTP adalah skema yang sering digunakan, namun masih tersedia skema-skema lain, misalnya telnet, FTP, News, dan sebagainya.

URL
Uniform Resource Locator. Istilah ini pada dasarnya sama dengan URI, tetapi istilah URI lebih banyak digunakan untuk menggantikan URL dalam spesifikasi teknis.

Usenet
Usenet news, atau dikenal juga dengan nama "Net news", atau "news" saja, merupakan sebuah buletin board yang sangat besar dan tersebar di seluruh dunia yang dapat digunakan untuk bertukar artikel. Siapa saja dapat mengakses Usenet news ini dengan program-program tertentu, yang biasanya disebut newsreader. Akses ke server news dapat dilakukan dengan menggunakan protokol NNTP atau dengan membaca langsung ke direktori spool untuk news yaitu direktori dimana artikel berada (cara terakhir ini sudah jarang dilakukan).

UUENCODE
Unix to Unix Encoding. Sebuah metode untuk mengkonfersikan file dalam format Biner ke ASCII agar dapat dikirimkan melalui email.

VOIP
Voice over IP. VoIP adalah suatu mekanisme untuk melakukan pembicaraan telepon (voice) dengan menumpangkan data dari pembicaraan melalui Internet atau Intranet (yang menggunakan teknologi IP).

VPN
Virtual Private Network. Istilah ini merujuk pada sebuah network yang sebagian diantaranya terhubung dengan jaringan internet, namun lalu lintas data yang melalui internet dari network ini telah mengalami proses enkripsi (pengacakan). Hal ini membuat network ini secara virtual "tertutup" (private).

WAP
Wireless Application Protocol. Standar protokol untuk aplikasi wireless (seperti yang digunakan pada ponsel). WAP merupakan hasil kerjasama antar industri untuk membuat sebuah standar yang terbuka (open standard). WAP berbasis pada standar Internet, dan beberapa protokol yang sudah dioptimasi untuk lingkungan wireless. WAP bekerja dalam modus teks dengan kecepatan sekitar 9,6 kbps. Belakangan juga dikembangkan protokol GPRS yang memiliki beberapa kelebihan dibandingkan WAP.

Webmail
Fasilitas pengiriman, penerimaan, maupun pembacaan email melalui sarana web.

Wi-Fi
Wireless Fidelity. Standar industri untuk transmisi data secara nirkabel (wireless) yang dikembangkan menurut standar spesifikasi IEEE 802.11.

WWW
World Wide Web atau "web" saja, yakni sebuah sistem dimana informasi dalam bentuk teks, gambar, suara, dan lain-lain dipresentasikan dalam bentuk hypertext dan dapat diakses oleh perangkat lunak yang disebut browser. Informasi di web pada umumnya ditulis dalam format HTML. Informasi lainnya disajikan dalam bentuk grafis (dalam format GIF, JPG, PNG), suara (dalam format AU, WAV), dan objek multimedia lainnya (seperti MIDI, Shockwave, Quicktime Movie, 3D World). WWW dijalankan dalam server yang disebut HTTPD.

20 Ciri Pria Sedang Berbohong

Bohong biasanya menjadi penyebab potensial kisruhnya hubungan. Demi menjaga keharmonisan hubungan terkadang banyak pasangan yang melakukan kebohongan, dari yang kelasnya kecil (white lies) hingga besar. Namun, namanya saja kebohongan, sekecil apapun, tetap saja merupakan kebohongan dan bisa menjadi duri dalam daging atau bom waktu dalam sebuah hubungan. Lantas bagaimana Anda tahun cowok Anda sedang berbohong atau tidak? Pasalnya, tidak semua pasangan mau mengakui kobohongan. Kalau dipaksa, pasti akhirnya perang dingin. Menurut Barbara Pease, penulis ‘Why Men Lie and Woman Cry’, perempuan berbohong demi menjaga sebuah hubungan, kalau pria berbohong  dengan alasan mencegah adu argumentasi. Sebenarnya Anda tidak perlu repot-repot memaksa dia. Asal ’detector’ Anda berfungsi dengan baik, mudah saja membaca sinyal kebohongan dia. Apa saja? Simak 20 ciri cowok sedang berbohong, menurut Jane Hargrave, pakar bahasa tubuh, pengarang buku ‘Freeway of Love’, berikut ini:

1. Saat bicara, dia tidak pernah berani melakukan kontak mata langsung. Matanya mengarah ke mana-mana, entah ke jalan, ke rambut Anda dan sebagainya. Seperti kata orang, mata adalah jendela hati. Jadi, sebenarnya dia tahu apapun yang ada di hati dan pikirannya, pasti bisa terbaca oleh Anda.


2. Sikapnya tidak tenang. Kalau pada posisi duduk, dia sering menggeser-geserkan pantatnya. Seperti pikirannya sulit sekali berkonsentrasi. Bila Anda bertanya tentang kegelisahannya, dia pasti berdalih dan menjawab “enggak ada apa-apa, saya baik-baik saja kok.”


3. Terlihat Nervous. Untuk menormalkan suasana hati, terkadang mereka menggaruk-garuk kepala yang tidak gatal, memencet-mencet hidung, memegang mulut, wajah dan belakang telinganya.



4. Menarik Kuping Sendiri. Gerakan menarik kupingnya sendiri itu sebenaranya dilakukan tanpa sadar untuk menutupi kebohongannya saat berciuman.


5. Melengkungkan Alis. Sering menangkap alis si dia melengkung? Itu isyarat bahwa telah terjadi kontradiksi dalam batinnya, antara berani dan takut. Alis melengkung menandakan dia sedang menyembunyikan sesuatu dan dia tidak punya niat mengungkapkan kebenarannya, sampai Anda punya bukti kuat yang membuatnya dengan terpaksa berkata jujur.


6. Sering Menurunkan Dagu. Menyimpan kebohongan itu sebenarnya tidak menyenangkan. Tersiksa. Namun, terkadang dia tak kuasa untuk mengatakannya kepada Anda. Jadi, sebelum mulai bercerita, biasanya dia mengawali dengan menelan ludah dan menurunkan dagu untuk mengatasi perutnya yang mendadak terasa mual.


7. Saat Anda bertanya, dia pura-pura terlihat bingung sambil mengangkat bahunya. Padahal dia sedang berpikir “kok dia tahu sih, darimana ya dia tahu soal itu?”


8. Sibuk Menggeser-geserkan kaki. Saat duduk berhadapn dengannya, perhatikan apakah dia sering menggeserkan posisi kaki yang satu ke yang lain? Kalau ya, itu pertanda dia sedang gelisah menghadapi gempuran pertanyaan Anda. Dalam hati i berharap bisa kabur secepat mungkin biar terbebas dari kebohongan yang menyesakkan. Atau kalau bisa menghilang, ia ingin segera lenyap dari hadapan Anda.


9. Merokok Tanpa Irama. Bila selama ini Anda melihat dia merokok dengan santai, tapi kali ini dia merokok tanpa irama, asal hisap, cenderung terburu-buru dan dalam jumlah yang lebih besar dari biasanya. Itu tanda dia sedang menutup sesuatu dari Anda.


10. Sok Sibuk. Biasanya dia akan memusatkan perhatian pada obrolan kalian dan memberi jawaban jawaban lugas. Tapi kali ini, ada saja yang dikerjakannya, entah itu sibuk mengutak atik telepon genggamnya, membaca surat kabar, menggonta-ganti channel televisi dan sebagainya.


11. Ada jeda antara ucapan dan ekspresinya. Misal, Anda memberi dia hadiah. Saat menerimanya, dia tidak langsung menjawab “Bagus. I love it. Thanks ya!”. Tapi, ada jeda sekian detik, sebelum akhirnya tersenyum dan mengucap statement tersebut.


12. Antara Ekspresi dan Statement yang diucapkan tidak sinkron. Misal, dia bilang “I Love you” tapi dengan ekspresi relatif lempeng. Tidak ada binar-binar cinta yang tulus di matanya.


13. Ekspresinya Nanggung. Umumnya, saat seseorang menunjukkan emosinya (bahagia, terkejut, sedih dan sebagainya) seluruh permukaan wajahnya bereaksi. Umpanya, ketika seseorang tersenyum natural, semua bagian wajahnya ikut tersenyum, pipinya bergerak, mata dan dahinya terdorong ke bawah.


14. Jawaban yang dilontarkan terhadap pertanyaan Anda cenderung defensive. Biasanya saat seseorang terdesak, maka yang bisa dilakukan adalah bertahan.


15. Secara tidak sadar, dia kerap memindah-mindahkan letak benda-benda (kopi, buku, ponsel dan sebagainya) yang berada di antara Anda dan dia.


16. Dia cenderung meniru kata-kata Anda untuk menjawab pertanyaan yang dilontarkan. Misal, saat Anda mengatakan, Apakah kamu jalan dengan perempuan lain? Dia spontan menjawab, “Enggak, saya enggak jalan dengan perempuan lain.”


17. Dia jadi lebih cerewet, menambah-nambahkan detil-detil yang tidak penting pada kata-katanya untuk meyakinkan Anda. Biasanya dia tidak nyaman dengan kesunyian. Maka itu, dia menjadi enggak enak hati kalau tiba-tiba Anda berubah menjadi pendengar pasif. Lebih banyak diam daripada bicara.


18. Saat Anda mulai gencar bertanya, dia buru-buru mengganti obyek pembicaraan, sehingga membuat obrolan kalian beralih. Kalau dia jujur, malah sebaliknya, dia selalu menuntaskan setiap pembicaraan dan menunjukkan sikap tidak suka bila Anda mengubah obyek pembicaraan.


19. Dia melontarkan joke-joke yang enggak lucu atau stok lawakan usang, untuk menghidari pertanyaan-pertanyaan yang menyudutkan Anda.


20. Saat sedang berkencan, ponselnya sering dimatikan. Ini untuk menghindari dia ketahuan menerima telepon atau SMS/BBM dari perempuan lain.


Sumber : http://iniopiniku.com/2012/07/20-ciri-pria-sedang-berbohong/