|
Post by StRiDeR on Jan 20, 2004 21:50:38 GMT 8
Khas utk turtlebeach....
kau leh buat macam2 lau window kau XP.... sesetengah tips nie....lebih baik jgn buat lau kau x expert ngan sub2 function window XP....selamat mencuba ;D
Tweaks for Windows XP Formatted and edited by PCWriter
Please read the Warning:
Use them at your own risk. Also note that most of these tips will require you to be logged on with Administrative rights. Editing the registry can cause serious problems. If you don't know what your doing then don't do it. Thus,none of these tips are supported in any way.
Disable IDE Port Scanning on empty ports and save bootup time.
1. Go to System Properties by right-clicking on My Computer, or via the Control Panel. 2. Select the Hardware tab. 3. Look at the Device Manager section and click on the Device Manager button. 4. This brings up the Device Manager screen. Open up the IDE ATA/ATAPI controllers device branch. Then you will see a list of all the IDE controllers and channels in your system. 5. Now, select any one of the IDE channels, right click and choose Properties. Or just double click on the IDE channel. 6. Select the Advanced Settings tab to get the screen below. As you can see below, the second port (Device 1) on the Primary IDE Channel does not have any IDE device attached to it. Thus, the Device Type is labeled as Auto Detection. In contrast, the first port has a device attached. That's why the Device Type is grayed out.
6. To disable IDE device scanning for the second port, click on Auto Detection and you will see two choices on the list. Select None. 7. Click OK and reboot.
Windows 2000 will now refrain from scanning that IDE port at start up and should load a little faster
Speed Up Browsing
(This was for WIN 2000 but it works in XP too).
Here's a great tip to speed up your browsing of Windows 2000 machines. Its actually a fix to a bug that by default of a normal Windows 2000 setup that scans shared files for Scheduled Tasks.
You can experience a delay as long as 30 seconds when you try to view shared files across a network from a Windows 2000 PC. Win2K is using the extra time to search the remote computer. Note that although the fix is originally intended for only those PCs that are affected, Windows 2000 users will experience that actual browsing speed of both the Internet & Windows Explorer improving significantly after applying it since it doesnt search for the Scheduled Tasks anymore. Here's how :
WARNING: Don't perform this Registry tweak if you use scheduled tasks!
Open up the Registry and go to :
HKEY_LOCAL_MACHINE/Software/Microsoft/Windows/Current Version/Explorer/RemoteComputer/NameSpace
Under that branch, select the key :
{D6277990-4C6A-11CF-8D87-00AA0060F5BF}
and delete it.
Auto Logon XP
(Real easy and straight forward)
1. Click on Start - then click on Run - and type control userpasswords2 2. Click OK 3. On the Users tab, clear the "Users must enter a user name and password to use this computer" check box. 4. A dialog will appear that asks you what user name and password should be used to logon automatically. Your all set.
|
|
|
Post by turtle on Jan 20, 2004 22:36:36 GMT 8
thx. ntok info tue.. aku slalu ade prob bila tuka drives, sampai kene reset cmos. ehe. toce2
yg nie aku xmo lah... ari tue aku tweak sampai jahanam win. dah le lupa nak wat reg backup HAncussss~~
yg nie xbley pon ALert je manjang.. ehe.. kau dah buat ker bende nie// ajorla akue
|
|
|
Post by enigma on Jan 21, 2004 10:01:45 GMT 8
leh la try pasni..aku guna xp...
|
|
|
Post by atokENSEM on Jan 23, 2004 3:54:14 GMT 8
atok pun nak try la..sbb atok pun guna xp!
|
|
|
Post by StRiDeR on Jan 25, 2004 21:58:09 GMT 8
Auto Logon XP
(Real easy and straight forward)
1. Click on Start - then click on Run - and type control userpasswords2 2. Click OK 3. On the Users tab, clear the "Users must enter a user name and password to use this computer" check box. 4. A dialog will appear that asks you what user name and password should be used to logon automatically. Your all set.
yg benda nie...leh buat....tapi x salah aku...kena satu user jerk...lau x...mampus komp kau....x leh masuk windows...aku dah try, tapi time tue aku ader dua user....terus x leh masuk windows...hang jer...sebab tue aku bagi warning...lau dah master pasal windows nie...baru lah boleh buat benda2 cam nie....nasib baik aku dah buat backup....selamat aku... ;D
|
|
|
Post by enigma on Jan 26, 2004 10:55:10 GMT 8
Auto Logon XP (Real easy and straight forward) 1. Click on Start - then click on Run - and type control userpasswords2 2. Click OK 3. On the Users tab, clear the "Users must enter a user name and password to use this computer" check box. 4. A dialog will appear that asks you what user name and password should be used to logon automatically. Your all set. yg benda nie...leh buat....tapi x salah aku...kena satu user jerk...lau x...mampus komp kau....x leh masuk windows...aku dah try, tapi time tue aku ader dua user....terus x leh masuk windows...hang jer...sebab tue aku bagi warning...lau dah master pasal windows nie...baru lah boleh buat benda2 cam nie....nasib baik aku dah buat backup....selamat aku... ;D ha..nasib baik aku x buat ari tu...sbb bila aku baca balik apa ygko tulis kat atas tu..dia kata utk satu user jer...so aku pon x jadi nk buat ...sbb ada 3 acount user yg guna pc aku tu.....walaupun sumenye famili aku gak....
|
|
|
Post by atokENSEM on Jan 27, 2004 2:37:57 GMT 8
atok nak try..tp mls!
|
|
|
Post by enigma on Jan 27, 2004 10:33:07 GMT 8
atok nak try..tp mls! ala tok..try lah..pastu bg tau kitorang ape yg jadik...
|
|
|
Post by StRiDeR on Jan 27, 2004 19:29:10 GMT 8
useful tips
10 simple ways to stop hackers
By Candice Neethling
Hackers are always on the prowl for weaknesses in your systems, but there are ways to beef up security so you don’t become the next easy target.
Hackers are finding new systems vulnerabilities and developing new means of attack all the time. What methods do they favour and how secure is your network? This article identifies some common vulnerabilities and offers 10 useful and easy-to-apply tips on how to make your network more secure.
1. Perform discover-and-scan tests
The purpose of these tests is to highlight all entry points from the internet to the internal network. Make sure you know all entry points into your network rather than assume where these points are.
Most large organisations, organisations that have merged or been taken over, and organisations that have in any way gained systems from sources not under their direct control cannot confidently say they are aware of all entry points to their network.
A firewall is merely a door to the network; there may be many holes and entry points that an organisation is unaware of. These supposedly ‘unknown’ points are targets for hackers, as they normally have the weakest security controls in place.
The first step in securing these weak entry points is to identify them. This is not an easy task and requires skilled attack-and-penetration experts to perform the discovery successfully.
2. Perform attack-and-penetration tests
The aim of these tests is to quickly highlight vulnerable points and aspects of the network: ones that are accessible from both an external and internal user’s perspective. By assessing the extent to which you are able to thwart attacks from external sources through the tests, you are able to patch and correct the holes that could allow intruders to hack into your network.
As surveys have consistently shown, hacking is as great a concern from an internal user’s perspective as from an external unknown source. Thus, these penetration tests should be performed from the inside (internal user) as well as from an external (unknown) perspective for the true vulnerabilities to be detected.
3. Launch user-awareness campaigns
Users should be made aware of the pitfalls of security and how to minimise these risks by applying good security practices in day-to-day operations.
Social-engineering tests are an effective means of determining the current levels of user awareness. Such tests are also a good way to highlight to users the potential pitfalls resulting from a lack of awareness and application of security in everyday operations.
User awareness is that element of security that is often ignored and it can lead to the most vulnerability. All the security technologies in the world cannot protect against a user giving away company secrets or security information, such as passwords, of critical systems.
4. Configure firewalls appropriately and have them reviewed independently
An incorrectly configured firewall is an open door for any intruder. It is imperative to allow only the traffic that is critical to the business through the firewall. Even ports 443 (SSL) and 80 (http) sometimes present more risk than the business warrants.
An open port is an open door. As a start, close all ports and then open only those that are more critical than the risk they present. Each firewall – and, indeed, each organisation – is different, requiring different firewall rule-set configurations. However, there are general guidelines that can be applied, namely: never open all ports to any source or destination and make sure the stealth rule is in the correct place in the rule set.
A firewall is not merely a router; it has logging and monitoring capabilities that are often more important than the routing functions. Traffic to a valid destination through a valid port is often an attack that can be detected only through analysing the composition and nature of the traffic itself.
By performing penetration tests, organisations are able to determine the vulnerabilities that a certain firewall configuration presents. Also, by performing independent assessments of the rule sets, their vulnerabilities can be determined.
5. Implement strong password policies
Most organisations still make use of usernames and passwords as their primary, if not their only, authentication mechanism. Unfortunately, as surveys and analyses have revealed, passwords are a weak form of authentication. So-called “strong” passwords (not easily guessable) tend to be written down or forgotten, while passwords that can be remembered, and hence not written down, tend to be “weak” (easily guessable). This is the situation most organisations find themselves in.
So what can be done? Two-factor authentication seems to be the solution, where an additional authentication mechanism is used, such as a physical thing (take, for example, your ATM card, which requires both the card and the personal identification number for you to be authenticated).
Other two-factor authentication mechanisms include storing biometric details on a smartcard, but two-factor authentication is costly as well as time-consuming to implement. So a temporary measure of strong password policies is important. These policies should require a balance between strong and easily remembered passwords. Leading practice is to have passwords of seven characters (the most secure length for a Windows NT password, yet still relatively easy to remember).
Also, leading practice indicates that these passwords be changed every 60 days so as to reach a balance between changing passwords too frequently – thereby changing them in a repetitive or predictable manner (for example, by adding a digit to the end of a password) – and having a password remain the same – thereby increasing the chances of it being known to unauthorised persons. The password should also be made up of both alpha and numeric characters to increase the number of possible password combinations.
|
|
|
Post by StRiDeR on Jan 27, 2004 19:29:39 GMT 8
6. Remove all comments in website source code Comments often contain insight into the design of the application and, hence, its shortcomings, as well as insight into the design of the database, network and systems supporting the application. Comments in code often contain usernames and sometimes passwords as well. By removing all comments, the thoughts on and details of the code itself are removed and safe from attackers. Even comments in code that are seemingly inaccessible to external users should be removed. There are many exploits and techniques available that enable an attacker to view the source code of nearly all web applications. 7. Remove all default Most default, test and example pages have some vulnerability associated with them. These test and example pages can lead to a complete compromise of the web server and, indeed, the entire network. Common exploits allow an attacker, through the use of test or example pages, to extract the password files in clear text from the server, thereby circumventing all security controls in place. Other common exploits include buffer-overflows, allowing the attacker to issue commands against the server as a privileged user – again, circumventing all security controls in place. Even if the specific test or example pages have no known vulnerabilities associated with them (which is unlikely), it gives insight into the design of the system and, hence, insight into the vulnerabilities associated with the specific design. 8. Disable all unnecessary services from all devices The only service that is not vulnerable to exploits is one that is disabled and removed from the system. Some services, however, present greater vulnerabilities and threats than others. The question you need to ask yourself is: “Do you need the service more than the risk and impact of it being exploited?” By performing a search of readily available online vulnerability databases, such as on www.esecurityonline.com, organisations can determine the number of vulnerabilities certain services present, as well as their effects. This way, you are able to assess whether the services are worth the risks of being exploited. 9. test and example pages Hackers are finding new vulnerabilities and developing exploits, viruses and Trojans daily. To keep up with these hackers, it is imperative that intrusion detection systems and anti-virus software are updated regularly, and preferably on a daily basis. As most analysts are always claiming, “detection systems are only as good as the last update.” 10. Ensure physical access to the organisation and its systems is secure Why spend a fortune installing a state-of-the-art burglar alarm system if you leave your front door open, or your valuables on the street? By the same token, why spend a fortune on technical security when access to the organisation and its systems is not secured? First, if physical security in an organisation is lacking, intruders could simply gain whatever information they were after by simply walking into the office building and taking it. If the objective was to interrupt operations and cause havoc, an intruder could simply switch off the critical servers. If the aim was to gain access to the systems, the intruder’s task is made extremely easy by having physical access to the systems. Often administrators of critical systems remain “logged in” to systems throughout the day, which allows intruders to gain whatever access they desire. Whatever the objective of an intruder, his task is made that much easier through lax physical security measures. It is thus important, as with technical security, to test these physical security mechanisms regularly, as the smallest loophole can lead to a full compromise. Often, combining physical-access tests with social-engineering tests reveals the most useful information. Candice Neethling presents Ernst & Young’s eXtreme Hacking and ‘Train the trainer’ courses. (no follow-up links) original article: www.prognosisx.com/cgi-bin/cgi-script/csNews/csNews.cgi?database=JanT%2edb&command=viewone&id=60&op=r
|
|
|
Post by atokENSEM on Jan 28, 2004 18:52:26 GMT 8
ala tok..try lah..pastu bg tau kitorang ape yg jadik... tak jadi try...mls..
|
|
|
Post by enigma on Jan 29, 2004 11:45:25 GMT 8
tak jadi try...mls.. kalo dah rajin nanti tyr lah yer...
|
|
|
Post by StRiDeR on Jan 29, 2004 22:07:58 GMT 8
Tweaks for Windows XP Formatted and edited by PCWriter
Please read the Warning:
Use them at your own risk. Also note that most of these tips will require you to be logged on with Administrative rights. Editing the registry can cause serious problems. If you don't know what your doing then don't do it. Thus,none of these tips are supported in any way.
Create a bootable floppy disk
1. Place a blank disk in the floppy disk drive. 2. Click Start, and then click My Computer. Or My Computer Icon on desktop. 3. Right-click the floppy disk drive, and then click Format on the shortcut menu. 4. Click Create an MS-DOS startup disk, and then click Start. 5. Now you're on your way to a bootable startup disk.
Change Web Page Font Size on the Fly.
If your mouse contains a wheel for scrolling, you can change the font size on the fly when viewing a Web page. To do so:
1. Press and hold the Ctrl key. 2. Scroll down (or towards yourself) to enlarge the font size. Scroll up (or away from yourself) to reduce the font size.
You might find it useful to reduce font size when printing a Web page, so that you can fit more content on the page.
NIC Buffer tweaks you may wish to try
Win2k & XP only
Larger RWIN
For use with Larger RWIN
InitialLargerBufferCount- 50 InitialMediumBufferCount- 100 InitalSmallBufferCount-150 LargerBufferSize-40960 MediumBufferSize-7215 PriorityBoost-2 SmallBufferCount- 1024
Small RWIN
For use with small RWIN's
InitialLargerBufferCount- 100 InitialMediumBufferCount- 500 InitalSmallBufferCount-800 LargerBufferSize-40960 MaxFast Tranmit-2 MediumBufferSize-7215 PriorityBoost-2 SmallBufferCount- 1024
|
|
|
Post by StRiDeR on Feb 7, 2004 13:24:49 GMT 8
.::tips menambah kelajuan komputer::. ============================ korang semua boleh try bende nie... pasti hasilnya memuaskan hati korang..strider nak kongsi bersama korang so kiter sesama dapat faedahnya! Drivers dan WindowsUpdate Anda perlulah mendownload drivers terbaru bagi hardware anda dan update apa-apa software/drivers yang terbaru daripada Microsoft. Contohnya seperti windows Update yang terdapat pada semua version windows. Windows Update ini akan membuat detection secara online untuk memberitahu anda driver yang perlu diupdate. Sistem komputer anda yang up-to-date dapat meningkatkan prestasi komputer anda bekerja kerana mempunyai drivers yang baru(kurang mempunyai bugs dan mengurangkan lagging). Untuk mengakses WindowsUpdate, pergi ke windowsupdate.microsoft.com/ dan apabila anda mengalami masalah untuk mencari driver , pergi ke www.windrivers.com. Sistem.ini ConservativeSwapfileUsage=1 Setting ini mempunyai banyak kegunaan, bergantung kepada versi windows yang anda gunakan. String ini baru diperkenalkan ketika Windows 98 dikeluarkan, jadi kepada pengguna Windows 95, konfigurasi ini dapat membantu sama sekali. Tetapi jika anda menggunakan Win98 atau 98SE, setting ini akan memaksa komputer anda untuk menggunakan swap file dengan cara yang "konservatif" atau dengan kata lain, setting ini akan mengarahkan windows untuk tidak menggunakan swapfile hingga semua RAM terpakai. Setelah RAM digunakan pada tahap maksimum, Sistem akan memindahkan data yang paling jarang dipakai ke swap file. (Bila OS anda Windows ME, setting ini akan menambah kecepatan cukup besar jika RAM anda lebih dari 128 MB). Setting ini dimasukkan dlm bahagian [386Enh] -->DMABufferSize Setting ini akan mengarahkan komputer untuk mensetkan buffer di Sistem memory untuk DMA. Jika anda menggunakan hardware yang menggunakan DMA, amat disarankan anda mensetnya menjadi 64 kb (Jadinya DMABufferSize=64). Setting ini dimasukkan dlm bahagian [386Enh] -->LocalLoadHigh Setting ini akan menyuruh operating Sistem anda untuk mengload local drivernya ke Upper memory secara automatik untuk memasukkannya ke conventional Memory. Masukkan Tag LocalLoadHigh=1 dlm bahagian [386Enh] -->MinFileCache dan MaxFileCache Setting ini, yang selalu dipakai dengan menggunakan program2 seperti Cacheman, Menentukan ruang untuk vcache, atau bahagian dari memory utama yang menyimpan binary codes untuk digunakan oleh processor komputer. Windows sering kali meningkatkan ruang cache ini jauh daripada yg diperlukan. Jadi lebih baik jika kita mengsetnya sendiri. Ukuran setting ini dalam Kb, dan biasanya setting terbaik paling minima adalah 10% dari RAM (MinFileCache) dan maksimum adalah 25% dari RAM (MaxFileCache) Setting yang terbaik untuk Sistem anda bergantung bagaimana cara anda menggunakannya, jadi keterangan yang diberikan tidak dapat terlalu detail. Untuk mengira jumlah yang diperlukan untuk vcache, darabkan jumlah MB yang anda hendak guna dengan 1024 (ditukarkan dulu menjadi kb). Misalnya 16 Mb menjadi 16384 kb, jadi anda harus memasukkan MinFileCache=16384 jika anda mahukan setting yang minimum untuk vcache sebesar 16 MB atau MaxFileCache=16384 jika anda mahukan setting maksimum untuk vcache sebesar 16 MB -->Chunksize Setting ini menentukan saiz ruang bahagian2 (chunks) yang disetkan untuk setiap program yang tersedia di vcache. Sebuah program biasanya memiliki lebih dari 1 chunk, tetapi tidak dapat dibahagi secara rata ke dalam ruang chunk. Sebahagian RAM akan menjadi sia2. Jika ukuran chunk disetkan lebih kecil, RAM di vcache yang terlebih tidak akan Terlalu banyak, tetapi dengan ukuran chunk yang lebih besar dapat meningkatkan kecepatan akses ke vcache. Namun seberapa besar ukuran chunk, itu semua tergantung bagaimana cara anda menggunakan Sistem, dan seberapa banyak RAM yang anda sisakan. Jumlah yang biasa digunakan untuk setting ini adalah 128, 256, dan 512 KB Masukkan setting ini di bahagian [vcache] -->Mendefragmentasikan Hard Drive Amat menghairankan kerana selalu kerja kecil seperti mendefragmentasikan hard drive diabaikan oleh pengguna untuk mengoptimalkan komputernya. Padahal seharusnya hal inilah yang pertama dititikberatkan. Mengdefragmentasikan hard drive adalah untuk menyusun semua bahagian2 yang berterabur dari sebuah program secara teratur dalam hard drive, agar mudah diakses lebih cepat. Jika anda menggunakan defrag windows standard(yang terdapat pada windows), setting paling optimal yang dihasilkannya adalah untuk mendefrag hard file2 dan konsolidation free space, juga menscan error (supaya tidak memasukkan data ke sector hard drive yg rosak). Tetapi jika anda menggunakan defragmenter komersial(perisian defragment yang lain), anda harus mensetnya agar swapfile berada di dalam lingkungan luar drive, dan menempatkan lebih banyak Sistem file yang sering digunakan lebih dekat di lingkungan luar drive pula. Supaya dengan cara ini, data2 yang lebih jarang digunakan menjadi lebih dekat dengan pusat drive (tempat dimana transferation data paling lambat kerana kecepatan rotation disc). Mendefragmentasikan hard drive mengambil masa berjam2 jadi anda ambillah masa melakukan kerja-kerja yang lain semasa menunggu defagmentation selesai. Contol Panel -> Sistem -> Performance -> File Sistem Dibawah Removable Disk, enable-kan Write-behind caching, dan dibawah Troubleshooting disable-kan Sistem Restore, kerana proses ini menyebabkan penggunaan hard disk anda dalam operasi untuk memback-up file2. Proses ini melambatkan performance komputer anda secara keseluruhan Jadi disarankan untuk disablekan camaner?susah ke?xpe,try dulu baru tau!
|
|
|
Post by StRiDeR on Feb 9, 2004 21:16:28 GMT 8
35 kesalahan membina laman web =========================
-Masa muat turun yang terlalu panjang -susun atur yang tidak menarik -Kesalahan ejaan -tiada cara hubungi webmaster -isi yang tidak bersesuaian dengan rekabentuk -navigasi yang tidak teratur -broken links -poor browser compatibility -grafik besar (lambat download) -terlalu banyak grafik -terlalu panjang scrolling/scrolling 2arah -terlalu banyak grafik beranimasi (.gif) -animated bullets -terlalu banyak pembahagi grafik atau garisan -latar belakang yang sibuk -terlalu banyak banner -penggunaan frame yang tidak bersesuaian -saiz font yg besar -pop up mesej -terlalu banyak menggunakan javascript -penggunaan table yg tidak betul -pengurusan laman yang tidam teratur -latarbelakang yang berbeza bagi mukasurat yang berlainan. -background muzik yg membosankan -mengelirukan pengunjung -terlalu banyak iklan -penggunaan splash page yg teruk -terlalu banyak teks berlainan warna -teks sukar dibaca -"Dalam Pembinaan" -scrolling teks di status bar -large scrolling text across the page..cm marquee -efek mouse over yang beruk!! eh..eh..teruk!!
so korang banding2 kan la ngan web korang..ermmm
|
|