|
Post by enigma on Feb 16, 2004 16:03:46 GMT 8
PANDUAN MEMBELI KOMPUTER
Sebelum membeli komputer anda perlu "menyiasat" ciri-ciri yang diperlukan: RAM (random-access memory), kelajuan pemproses, keupayaan grafik, ruang cakera keras dan sebagainya. Sebagai permulaan, lihat beberapa maklumat berikut.
Pilih kedai yang khusus, kedai barangan elektronik, rangkaian jualan, pembina komputer tempatan, tempahan melalui pos atau pengusaha internet, berdasarkan perkakasan dan khidmat yang anda perlukan.
Beli hanya apabila anda benar-benar perlu. Tidak kira berapa lama anda menunggu untuk mendapatkan tawaran harga yang terbaik, dengan ciri-ciri yang sama, harganya akan susut dalam jangkamasa enam bulan.
Buat keputusan ciri-ciri yang anda perlukan berdasarkan apa yang akan anda buat dengan komputer itu nanti. Sebagai contoh, jika anda merancang menggunakannya untuk mereka grafik, bunyi dan video, anda memerlukan lebih banyak RAM. Jika anda memerlukannya untuk membuat banyak kerja-kerja yang "computational" (contohnya; mencari melalui pangkalan data yang besar atau menonton video), anda akan memerlukan pemproses yang berkuasa hebat.
Buat keputusan jenis komputer yang anda perlukan, samada anda memerlukan komputer riba (laptop), yang boleh dibawa ke mana-mana, atau komputer meja.
Pilih jenama komputer berdasarkan kualiti, harga dan khidmat bantuan teknikal yang ditawarkan.
Berdasarkan keperluan yang anda suka dan tetapkan, anggarkan konfigurasi utama yang anda perlukan, termasuklah pemproses (AMD atau Intel Celeron atau Intel Pentium III/IV), kelajuan (900Mhz atau 1.0 GHz atau lebih), jumlah RAM (64MB atau 128MB atau lebih) dan saiz pemacu keras (10 GB atau lebih), dan monitor (15" atau 17" - CRT atau panel rata) .
Tentukan pemacu tambahan yang anda perlukan: pemacu CD-ROM, DVD-ROM, perakam CD-RW, Zip dan sebagainya.
Pilih persisian dan perkakasan tambahan seperti modem, kad bunyi (sound card), kad video (video card) dan pembesar suara.
Pastikan berapa banyak slot kad dalaman (internal card slots) tambahan dan ruang pemacu cakera yang anda perlukan bagi memberi lebih ruang untuk perluasan atau peningkatan keupayaan komputer anda pada masa akan datang.
Tetapkan apakah perisian pra-pasang (pre-installed) yang anda mahu atau perlukan. Sekurang-kurangnya dapatkan sistem pengoperasian, seperti Windows, program anti-virus, dan program pemprosesan kata (word processing), spreadsheets dan pangkalan data.
Pilih jangkamasa jaminan atau khidmat yang diliputi berdasarkan keperluan anda.
PERHATIAN!
Sentiasa mengambil tahu tentang perkembangan terkini teknologi dengan membaca ulasan tentang produk-produk terbaru yang berada di pasaran di dalam majalah-majalah atau melalui internet. Dapatkan maklumat tentang apakah perkakasan dan perisian yang termasuk dalam model yang anda inginkan dan jadikannya sebagai asas untuk membandingkan harga. Tanya "apa yang kurang?", jika harganya lebih rendah.
Fahamilah bahawa RAM adalah tempat sementara di mana komputer anda menyimpan data-data untuk diproses. Walaupun lebih banyak RAM lebih baik, anda tidak perlu RAM yang banyak jika anda menghadkan penggunaan komputer hanya untuk membuat tugasan yang mudah (pemprosesan kata, memeriksa baki).
Permainan komputer memerlukan banyak RAM; grafik dan bunyi memerlukan lebih lagi.
Pemproses masa kini biasanya cukup laju untuk semua, melainkan aplikasi yang memerlukan lebih kuasa, seperti streaming video.
|
|
|
Post by atokENSEM on Feb 16, 2004 18:30:44 GMT 8
atok nak tambah skit..
-jgn bli terburu2..tgk2 dulu kedai lain..mane tau harga lg murah ke!
|
|
|
Post by StRiDeR on Feb 16, 2004 20:38:11 GMT 8
Statement from Microsoft Regarding Illegal Posting of Windows Source Code
REDMOND, Wash., -- On Thursday, February 12, Microsoft became aware that portions of the Microsoft Windows 2000 and Windows NT 4.0 source code were illegally made available on the Internet. Subsequent investigation has shown this was not the result of any breach of Microsoft’s corporate network or internal security, nor is it related to Microsoft’s Shared Source Initiative or its Government Security Program, which enable our customers, partners and governments to legally access Microsoft source code.
Microsoft is working closely with the U.S. Federal Bureau of Investigation on this matter. Microsoft source code is both copyrighted and protected as a trade secret. As such, it is illegal to post it, make it available to others, download it or use it. Microsoft will take all appropriate legal actions to protect its intellectual property. Questions about the investigation should be referred to the FBI.
Microsoft reaffirms its support for both the Shared Source Initiative and the Government Security Program.
At this time there is no known impact on customers. We continue to be committed to protecting our customers and their networks, and we will take any appropriate steps to ensure that we meet this commitment.
|
|
|
Post by enigma on Feb 16, 2004 22:03:01 GMT 8
atok nak tambah skit.. -jgn bli terburu2..tgk2 dulu kedai lain..mane tau harga lg murah ke! thats rite... nanti kalau tergopoh gapah... tersilap beli kang kiter yg rugi....
|
|
|
Post by atokENSEM on Feb 17, 2004 0:47:30 GMT 8
thats rite... nanti kalau tergopoh gapah... tersilap beli kang kiter yg rugi.... tulah kite berhati..dlm segala segi hal sekalipun..
|
|
|
Post by StRiDeR on Feb 19, 2004 22:52:21 GMT 8
WARNING!!!!!Microsoft Internet Explorer Integer Overflow in Processing Bitmap Files Lets Remote Users Execute Arbitrary Code SecurityTracker Alert ID: 1009067 CVE Reference: GENERIC-MAP-NOMATCH (Links to External Site) Updated: Feb 16 2004 Original Entry Date: Feb 15 2004 Impact: Execution of arbitrary code via network, User access via network Exploit Included: Yes Version(s): 5 (6 is reportedly not vulnerable) Description: A vulnerability was reported in Microsoft Internet Explorer (IE) version 5. A remote user can execute arbitrary code on the target system. It is reported that a remote user can create a specially crafted bitmap file that, when loaded by IE, will trigger an integer overflow and execute arbitrary code. The author states that this flaw was found by reviewing the recently leaked Microsoft Windows source code. The flaw reportedly resides in 'win2k/private/inet/mshtml/src/site/download/imgbmp.cxx'. The report indicates that IE 5 is affected but that IE 6 is not affected. A demonstration exploit is provided in the Source Message [it is Base64 encoded]. Impact: A remote user can cause arbitrary code to be executed on the target user's computer when the target user's browser loads a specially crafted bitmap file. The code will run with the privileges of the target user. Solution: No solution was available at the time of this entry. Vendor URL: www.microsoft.com/technet/security/ (Links to External Site) Cause: Boundary error Underlying OS: Windows (Any) Reported By: <gta-at-hush.com> Message History: None.
|
|
|
Post by atokENSEM on Feb 20, 2004 0:17:57 GMT 8
WARNING!!!!!Microsoft Internet Explorer Integer Overflow in Processing Bitmap Files Lets Remote Users Execute Arbitrary Code SecurityTracker Alert ID: 1009067 CVE Reference: GENERIC-MAP-NOMATCH (Links to External Site) Updated: Feb 16 2004 Original Entry Date: Feb 15 2004 Impact: Execution of arbitrary code via network, User access via network Exploit Included: Yes Version(s): 5 (6 is reportedly not vulnerable) Description: A vulnerability was reported in Microsoft Internet Explorer (IE) version 5. A remote user can execute arbitrary code on the target system. It is reported that a remote user can create a specially crafted bitmap file that, when loaded by IE, will trigger an integer overflow and execute arbitrary code. The author states that this flaw was found by reviewing the recently leaked Microsoft Windows source code. The flaw reportedly resides in 'win2k/private/inet/mshtml/src/site/download/imgbmp.cxx'. The report indicates that IE 5 is affected but that IE 6 is not affected. A demonstration exploit is provided in the Source Message [it is Base64 encoded]. Impact: A remote user can cause arbitrary code to be executed on the target user's computer when the target user's browser loads a specially crafted bitmap file. The code will run with the privileges of the target user. Solution: No solution was available at the time of this entry. Vendor URL: www.microsoft.com/technet/security/ (Links to External Site) Cause: Boundary error Underlying OS: Windows (Any) Reported By: <gta-at-hush.com> Message History: None. tengkiu...tengkiu... ni ade kesilapan..harga comp yg atok ckp ari tu bkn bwh rm1000..tp bwh rm1500..mase tahun 2005 nanti.. sori tersilap..
|
|
|
Post by StRiDeR on Feb 20, 2004 22:01:38 GMT 8
tengkiu...tengkiu... ni ade kesilapan..harga comp yg atok ckp ari tu bkn bwh rm1000..tp bwh rm1500..mase tahun 2005 nanti.. sori tersilap.. haa..nie baru logik skit...masa atok cakap bawah RM1000 tue, pelik lah jugak...naper sampai harga dia leh turun cam tue...x pe, tok...biasa lah tue...kadang2 kita buat silap...kita nie x terlepas dari membuat kesilapan...
|
|
|
Post by atokENSEM on Feb 20, 2004 22:56:26 GMT 8
haa..nie baru logik skit...masa atok cakap bawah RM1000 tue, pelik lah jugak...naper sampai harga dia leh turun cam tue...x pe, tok...biasa lah tue...kadang2 kita buat silap...kita nie x terlepas dari membuat kesilapan... atok bkn sengaja..bile atok tanya kat member atok..betul ke bwh seribu die kata bknla..bwh rm1500 la..so..sori ye?
|
|
|
Post by StRiDeR on Feb 22, 2004 16:17:27 GMT 8
atok bkn sengaja..bile atok tanya kat member atok..betul ke bwh seribu die kata bknla..bwh rm1500 la..so..sori ye? x pe...it's o.k... emm, lau nak check komp. korang kena virus MyDoom ke x?....gi url nie... www.microsoft.com/security/antivirus/mydoom.asp
|
|
|
Post by atokENSEM on Feb 23, 2004 2:18:14 GMT 8
Membuat Screen Saver dari Slide
Ada banyak aplikasi pihak ketiga yang mampu mengkonversi slide Anda menjadi screen saver. Namun bila Anda menginginkan solusi cepat dan tidak memerlukan animasi atau transisi macam-macam, Anda bisa membuat screen saver dari slide atau keseluruhan presentasi dengan mengggunakan PowerPoint dan Windows XP. Pertama-tama, simpan slide atau presentasi Anda dalam bentuk file .bmp. Buka presentasi PowerPoint. Jika Anda ingin menyimpan slide tertentu, pilihlah di normal view. Pada menu File, klik Save As. Pilih salah satu folder kosong atau buat folder kosong baru untuk tempat menyimpan presentasi atau slide. Catatan: bila Anda menggunakan folder My Pictures di My Documents, pastikan folder itu memang kosong. Di kotak Save as type, klik Device Independent Bitmap, kemudian klik Save. Anda bisa menyimpan nama asli file presentasi atau membuat nama baru. Klik Every Slide atau Current Slide Only, lalu klik OK. (Di PowerPoint 2000, klik Yes untuk mengekspor setiap slide.) Presentasi atau slide Anda tersimpan ke folder yang Anda pilih. Setelah menutup presentasi PowerPoint, gunakan Windows XP untuk membuka presentasi atau slide sebagai screen saver. Perhatikan, animasi yang Anda buat di presentasi asli tidak akan dimainkan ketika Anda membuat screen saver. Tutup presentasi. Selanjutnya, mari kita buat screen saver. (Anda harus menjalankan Windows XP untuk melakukan prosedur ini.) Klik Start*Control Panel, kemudian klik Display, atau klik Appearance and Themes, lalu klik Display. Di tab Screen Saver, klik My Pictures Slideshow, dan di kotak Wait, setel lama waktu yang ingin Anda lewatkan sebelum screen saver muncul. Pada Screen saver, klik Settings. Di How often should pictures change?, setel slider pada interval antar gambar seperti yang Anda inginkan, atau, bila Anda membuat screen saver slide tunggal, gerakkan slider ke Less (three minutes) untuk menghindari kedipan peralihan layar selama transisi. Pada Use pictures in this folder, arahkan ke folder tempat Anda menyimpan presentasi atau slide tadi. Jika Anda menyimpan slide, hilangkan centang Use transition effects between pictures dan Allow scrolling through pictures with the keyboard. Klik OK. Perlu diingat bahwa efek transisi screen saver di opsi screen saver ini pradesain, dan tidak mencakup transisi yang Anda atur ketika Anda membuat presentasi tersebut. Untuk melihat pertunjukan screen saver baru tersebut, di tab Screen Saver, klik Preview. p/s: ni atok taip spesel utk anda..
|
|
|
Post by StRiDeR on Feb 26, 2004 22:31:22 GMT 8
Microsoft Packs New Security Tools Into XP Beta By Jim Wagner
Corrected: Intent on stopping the spread of Internet viruses, Microsoft (Quote, Chart) has begun beta-testing a security-monitoring feature for its Windows XP Service Pack 2 (SP2) that will be included in the final product in mid-2004.
The tool, which checks for third-party anti-virus and firewall software and lets users know whether it is enabled or not, is among the operating system enhancements the Redmond, Wash., company is developing as part of its Security Center initiative to rebuff viruses, worms, trojans and crackers (define).
Microsoft will also provide free online training and documentation, to include application program interfaces (define), to help developers make the most of SP2's security features, Chairman Bill Gates said at this week's RSA Security conference in San Francisco. It's the first time the company has offered training materials with a Windows service pack release.
Tony Goodhew, a Microsoft product manager, said that with the many vulnerability issues in the computing world, the company needed to make security its first priority. The Trustworthy Computing initiative and SP2 are results of that push.
The code changes that went with security enhancements, however, were sweeping, prompting officials to create a developer's forum so applications created for the OS were compatible with applications by independent software vendors (ISVs).
"We realized that as we were making these changes, we were going to impact a lot of ISVs so we've been doing extensive work testing the top applications that people use," he told internetnews.com. "We have an application compatibility group that is running tests against the top 400 to 700 applications to see how they work with SP2."
Goodhew said feedback has been positive. The site, with its online training and extensive documentation, has made it easier to develop applications that are compatible with Windows XP without going back and debugging after the application is released.
"Developers themselves are taking security more seriously in their applications," he said.
Microsoft has been criticized for the security flaws that have allowed trojans to propagate from computers that run its Windows operating systems. In many cases, the company patched the holes, but not all users downloaded or updated their systems.
The virus scanner and firewall software monitors are Microsoft's answer to the vexing problem of limiting the damage of a break-in. With SP2, a pop-up screen will show users what security options are enabled, and allow them to modify those settings.
Goodhew said the new forum is a place where developers can come together to talk about an issue that's come to the forefront in recent times - security. He points out that many of the biggest Internet worms of recent times -- MyDoom, Blaster and NIMDA -- were caused by users who didn't update their systems to block the viruses. In the case of NIMDA, he said, a patch was out 331 days before the attacks began.
"I do personally believe that Windows gets unfairly caught up in some of the social engineering aspects of these worms and viruses," he said. "Users need to think about some of the things they are doing and whether that's the safe thing to do. Users are becoming more sophisticated."
Corrects earlier version which incorrectly stated SP2 would include a built-in virus scanner. The offering actually includes a pop-up monitor that checks the settings of third-party anti-virus and firewall applications, and allows users to modify them if necessary
|
|
|
Post by atokENSEM on Feb 28, 2004 1:18:15 GMT 8
atok ingat nak beli palm top..tp tak tau jenis ape yg elok..jenis ape yg ok ye?
|
|
|
Post by StRiDeR on Feb 29, 2004 14:26:39 GMT 8
WARNING!!!!
Microsoft Security Bulletin MS04-007
ASN.1 Vulnerability Could Allow Code Execution (828028) Version Number: 1.0
Summary Who should read this document: Customers who are using Microsoft® Windows®
Impact of vulnerability: Remote Code Execution
Maximum Severity Rating: Critical
Recommendation: Systems administrators should apply the update immediately.
Security Update Replacement: None
Caveats: Windows NT 4.0 (Workstation, Server, and Terminal Server Edition) does not install the affected file by default. This file is installed as part of the MS03-041 Windows NT 4.0 security update and other possible non-security-related hotfixes. If the Windows NT 4.0 security update for MS03-041 is not installed, this may not be a required update. To verify if the affected file is installed, search for the file named Msasn1.dll. If this file is present, this security update is required. Windows Update, Software Update Services, and the Microsoft Security Baseline Analyzer will also correctly detect if this update is required.
Tested Software and Security Update Download Locations:
Affected Software:
Microsoft Windows NT® Workstation 4.0 Service Pack 6a Microsoft Windows NT Server 4.0 Service Pack 6a
Microsoft Windows NT Server 4.0 Terminal Server Edition Service Pack 6
Microsoft Windows 2000 Service Pack 2, Microsoft
Windows 2000 Service Pack 3, Microsoft Windows 2000 Service Pack 4
Microsoft Windows XP, Microsoft Windows XP Service Pack 1
Microsoft Windows XP 64-Bit Edition, Microsoft Windows XP 64-Bit Edition Service Pack 1
Microsoft Windows XP 64-Bit Edition Version 2003,
Microsoft Windows XP 64-Bit Edition Version 2003 Service Pack 1
Microsoft Windows Server™ 2003
Microsoft Windows Server 2003 64-Bit Edition
|
|
|
Post by StRiDeR on Mar 6, 2004 1:16:45 GMT 8
Perbandingan antara perisian antivirus ============================
*The test was made on 02-12 October 2003, using Windows 2000 SP4 on a CELERON 1100 Mhz, 384MB SDRAM.
*All programs tested had the latest versions, upgrades and updates and they were tested using their full scanning capabilities e.g. heuristics, full scan etc.
*The 58306 virus samples were chosen using VS2000 according to Kaspersky, F-Prot, RAV, Nod32, Dr.Web and McAfee antivirus programs. Each virus sample was unique by virus name, meaning that AT LEAST 1 antivirus program detected it as a new virus. ALL virus samples were unpacked and the only samples that were kept were the ones that were packed using external-dos-packers (that means not winzip, winrar, winace etc).
*The virus samples had the correct file extension using a special program (Renexts) and were unique, according to checksum32 filesize.
*All "fake" virus samples were removed, as well as "garbage" files.
*The program PER was not tested because there was no english demo version available.
*The programs BOClean , VET and Freedom were not tested because there was no demo version available.
*The program InVircible did not include a "typical" scanner-function and could not be tested.
*The programs MR2S and VirusNet are no longer supported.
*The program V-Catch checks only mail accounts and could not be tested.
*The programs AVK and MKS_VIR did not have an english demo version available. Because of this, both antivirus companies provided us with an EXCLUSIVE beta english version, for their use in this test. For this, we would like to express our gratitude. The following file types were used.
ANS, ASM, BAT, ÂÉÍ, CHM, CLA, CLS, COM, CSC, DAT, DOC, ELF, EXE, HLP, HTM, INI, JS, MDB, MSG, PHP, PIF, PL, PPT, REG, SCR, SH, SHS, SMM, SYS, TD0, TPU, VBS, WBT, XLS, XML.
The virus samples were divided into these categories, according to the type of the virus :
File = BeOS, FreeBSD, Linux, Palm, OS2, Unix, BinaryImage, BAS viruses. MS-DOS = MS-DOS and HLL*. viruses. Windows = Win.*.* viruses. Macro = Macro and Formula viruses. Malware = DoS, Constructors, Exploit, Flooders, Hoax, Jokes, Nukers, Sniffers, Spoofers, Virus Construction Tools, Virus Tools, Corrupted, Droppers, Intended, PolyEngines. Script = BAT, Corel, HTML, Java, Scripts, VBS, WBS, Worms, PHP, Perl viruses. Trojans-Backdoors = Trojan and Backdoor viruses. Rank
The test was sponsored by PC Utilities magazine, in the issue December 2003 of which you may read the detailed results of the test.
1. F-Secure version 5.41 - 99.63%
2. Kaspersky version 4.5.0.49 - 99.35%
3. AVK version 12.0.4 - 98.67%
4. McAfee version 7.03.6000 - 97.24%
5. RAV version 8.6.105 - 94.26%
6. F-Prot version 3.14a - 93.40%
7. Norton version 2004 Professional - 92.35%
8. Titan version 2003 - 90.41%
9. BullGuard version 3.5 - 88.34%
10. BitDefender version 7.1.110 - 88.28%
11. Norton Corporate version 8.00.9374 - 88.27%
12. Dr. Web version 4.30a - 87.33%
13. PC-Cillin 2003 version 10.03.1072 - 86.94%
14. Sophos Sweep version 3.73 - 86.55%
15. Avast version 4.1.268 - 86.37%
16. Panda Titanium version 2.05.05 - 84.95%
17. Panda Platinum version 7.05.04 - 84.39%
18. eScan 2003 Virus Control version 2.5.181.5 - 84.12%
19. MKS_VIR version 2004 Beta - 83.49%
20. AntiVir version 6.21.09.20 - 77.74%
21. Vexira version 2.09.00.01 - 76.98%
22. Nod32 version 1.526 - 75.76%
23. Norman version 5.60.13 - 71.75%
24. Solo version 2.5 Build 2.6.3 - 68.21%
25. Fire version 2.7 - 67.99%
26. AVG version 7.0.175 - 65.68%
27. E-Trust version 6.1.7.0 - 62.16%
28. VirusBUSTER II version 5.3.2 - 59.28%
29. Ikarus version 5.13 - 59.11%
30. VirusBuster version 10.00.88928 - 56.79%
31. UNA version 1.80 - 56.50%
32. Protector Plus version 7.2.E03 - 50.17%
33. XRampAV Professional version 4.0 - 48.90%
34. ViRobotExpert version 4.0 - 48.60%
35. V3Pro 2002 Deluxe version SP2 - 43.75%
36. VirScan Plus version 12.883 - 40.28%
37. Digital Patrol version 4.10.07 - 39.16%
38. Rising AV version 2003 - 36.19%
39. RHBVS version 4.05.562 - 35.24%
40. Quick Heal version 6.10 - 32.88%
41. Wave version 2.0 - 22.59%
42. TDS version 3.2.0 - 14.07%
43. PC Door Guard version 3.0.0.6 - 12.10%
44. PestPatrol version 4.2.0.53 - 11.79%
45. AntiTrojan Shield version 1.0.0.16 - 11.15%
46. Anti Trokan version 5.5.421 - 7.57%
47. Tauscan version 1.6.1024 - 4.82%
48. Trojan Remover version 6.0.9 - 4.66%
49. The Cleaner version 3.5.3527 - 4.44%
50. Trojan Hunter version 3.6.741 - 3.87%
51. Hacker Eliminator (former LockDown Millenium) version 1.2 - 3.66%
52. IP Armor version 5.42.0922 - 2.54%
53. Anti-Hacker & Trojan Expert 2003 version 1.6 - 0%
|
|