Saturday, June 30, 2012

インターネットへの基本的なガイド



インターネットは、世界中のネットワークの数千人から成っているコンピュータネットワークです。誰もがインターネットに接続されている正確にどのように多くのコンピュータを知らない。それは、これらの数百万ドル、しかし、確かである。

誰もがインターネットを担当していません。そこにこのネットワークの技術的側面を開発し、その上にアプリケーションを作成するための基準を設定する組織がある、しかし、統治体はコントロールではありません。インターネット·バックボーンを通じて、インターネットのトラフィックフローは、民間企業によって所有されています。

Thursday, June 28, 2012

Choosing An Internet Merchant Account, nice info on Internet Merchant Account..

I hope this insight wii provide a good use for those who want to do business on the web..

Wednesday, June 27, 2012

選擇一個好的域名,雅......好名字是很重要的!



另一個成功的網絡經驗的好尖.. injoy吧!

良いドメイン名を選択する、屋...良い名前は重要です!



成功したWebエクスペリエンスのためのもう一つの良いヒントは...それをinjoy!

Choisir un bon nom de domaine, ya .. bon nom est important!



Un autre bon conseil pour l'expérience web réussie .. il injoy!

Choosing A Good Domain Name, ya..good name is important!

Another good tip for successful web experience..injoy it!


 

WinXPのをスピードアップする23の方法、デフラグだけでなく、



ディスクをデフラグすると、Windows XPのパフォーマンスを向上させるために多くを行うことはありませんので、ここになります23の提案である。それぞれが顧客のPCのパフォーマンスと信頼性を向上させることができます。すべてのベスト、それらのほとんどはあなたに何の費用がかかりません。

Tuesday, June 26, 2012

23 如何加快 winxp 的,不只是碎片整理



由於碎片整理的磁盤不會做,以提高Windows XP的性能,這裡是23的建議,將。每個人都可以提高客戶的電腦的性能和可靠性。最好的是,他們大多會花你一分錢。

Monday, June 25, 2012

23 façons d'accélérer WinXP, non seulement Defrag



Depuis défragmenter le disque ne fera pas beaucoup pour améliorer les performances de Windows XP, voici 23 suggestions qui. Chacun peut améliorer la performance et la fiabilité des PC de vos clients. Le meilleur de tous, la plupart d'entre eux ne vous coûtera rien.

Sunday, June 24, 2012

20 Grands Secrets Google





http://www.pcmag.com/article2/0, 4149,1306756,00. asp
excl.gif Aucun Liens Actifs, lisez les règles - Modifier par Ninja excl.gif

20大Google.com秘密





http://www.pcmag.com/article2/0 ASP,4149,130​​6756,00。
excl.gif沒有主動鏈接,閱讀“規則” - “編輯”忍者excl.gif

Saturday, June 23, 2012

20グレートGoogleの秘密





http://www.pcmag.com/article2/0、4149,130​​6756,00。ASP

excl.gifないアクティブリンクは、ルールをお読みください - 忍者excl.gifによる編集


Friday, June 22, 2012

CFDXEKUSTFAQ

CFDXEKUSTFAQ

在Windows XP中的基本和動態磁盤轉換為



Windows XP Professional支持兩種磁盤存儲:基本和動態。基本磁盤存儲使用面向分區的磁盤。基本磁盤包含基本卷(主分區,擴展分區和邏輯驅動器)。

動態磁盤存儲使用面向卷的磁盤,包括基本磁盤的特點,如能夠創建跨越多個磁盤(跨區卷和帶區卷)的卷。

16X DVD +-RW DL DVD 刻錄機比較指南



來源:守則http://www.extrememhz.com/dlcomp-p1.shtml

雙層DVD刻錄機推出以來,一直的興趣相當絕大多數是為什麼我們繼續為您帶來這些廣受歡迎的驅動器的評論。期待現在已經變成降權的痴迷,它已成為在任何現有的或新的系統的重要組成部分的建設,由於價格下降和媒體的炒作持續。廠家是相當清楚的魅力,是他們為什麼每個被釋放他們自己的產品,至少在一個面積最多的評論中所使用的測試方法中脫穎而出。這導致了一些混亂,這是最適合個人需求的驅動。今天,我們比較四個16X雙層驅動器和突出的長處和短處,為了給你一個更好的主意,其中的驅動器是最適合你。

Thursday, June 21, 2012

16x DVD +-RW DL DVD Writer Guide de comparaison



Source:
CODE
http://www.extrememhz.com/dlcomp-p1.shtml


Depuis l'introduction de doubles graveurs de DVD couche, l'intérêt a été assez impressionnant et c'est pourquoi nous continuons à vous apporter des critiques de ces disques très populaires. L'anticipation est maintenant transformée en obsession droit vers le bas et il est devenu un élément clé de tout système actuel ou de nouvelles constructions, grâce à la baisse des prix et du maintien de battage médiatique. Les fabricants sont tout à fait conscient de la fascination et c'est pourquoi ils ont chacun été la libération de leurs propres produits qui se distinguent dans au moins un domaine de la méthodologie de test utilisé dans la plupart des critiques. Cela a conduit à une certaine confusion quant à ce qui est entraînement le mieux adapté pour les besoins des individus. Aujourd'hui, nous comparons quatre disques double couche 16x et mettre en évidence à la fois les points forts et faibles afin de vous donner une meilleure idée de ce qui entraînement le mieux adapté pour vous.

10 Améliorations de la sécurité rapides et gratuit



Le magazine PC.

Avant de dépenser un centime sur la sécurité, il ya des précautions que vous pouvez prendre qui vous protège contre les menaces les plus courantes.

Tuesday, June 19, 2012

10高速かつ無料のセキュリティ強化



PCの雑誌。

あなたがセキュリティにダイムを費やす前に、あなたが最も一般的な脅威からあなたを保護することを取ることができる多くの注意があります。

10快速和免费的安全性增强



PC杂志。

在你花一毛钱安全,有许多可以采取的预防措施,防止最常见的威胁,你。

Monday, June 18, 2012

你一定要知道为什么电脑死机的10个理由



致命的错误:系统变得不稳定或忙碌,“它说。”输入返回到Windows或按控制-Alt-Delete来重新启动您的计算机。如果你这样做,你将失去所有打开的应用程序中的任何未保存的信息。“

你刚才被击中死亡的蓝色屏幕。任何人使用MCFT的Windows将使用这个熟悉的。你能做些什么呢?更重要的是,你怎么能阻止它发生呢?

Sunday, June 17, 2012

Change The Default Location For Installing Apps Part 2.



As the size of hard drives increase, more people are using partitions to separate and store groups of files.

PCがUをクラッシュさせる10の理由を知っている必要があります



致命的なエラー:システムが不安定になったり、ビジー状態であるた、 "それは言います。"コンピュータを再起動するようにControl-Alt-DeleteでWindowsまたは記者に戻ります。これを行う場合には、開いているすべてのアプリケーションで保存されていない情報は失われます。 "

あなたはただ死のブルースクリーンに打たれています。 Mcft Windowsを使用して誰もがこれに精通しています。あなたは何を行うことができますか?さらに重要なのは、どのようにそれが起こって防ぐことができますか?

8人可以使用相同的MSN拨号帐户



它很容易真的。要拨号,整个家庭只有一个法案?

步骤一。购买20美元一个月订阅到MSN无限拨号接入。这将包括MSN 9的CD,您将需要。随着安装的软件,填补了新用户的辅助帐户插槽。确保你挑选@ MSN,如果它给你的选择,Hotmail电子邮件地址将无法正常工作......

说的第二个帐户是拨号连接johnsmith@msn.com类型

用户名:MSN/ johnsmith
密码:*******(任何)

连接到您的本地MSN电话号码,你给二级帐户的其他人将能够做同样的,当您连接。其甜美的交易考虑每个人的互联网接入支付约2块钱一个月,特别是如果你不能得到宽带。如果你想卖掉的人,你实际上可以赚钱这样......但我不建议。

我使用的是一个MSN的高科技,这是一个鲜为人知的秘密甚至大多数员工。

你这样做之后,你不需要任何软件。我会建议保持微观别人帐目。一个简单的事实,如果他们不投在削减它们赶走HEHEHE

我现在宽带所以我不关心,如果我告诉你我的小秘密。谁都知道这个吗?

Saturday, June 16, 2012

8 personnes peuvent utiliser le même compte Msn Dial Up



son vraiment facile. veulent avoir une famille entière sur dial-up avec une seule facture?

la première étape. l'achat de 20 dollar par mois d'abonnement à MSN un accès illimité dial up. Cela comprendra une MSN 9 cd dont vous aurez besoin. Avec le logiciel installé, remplir vos slots compte secondaire avec de nouveaux utilisateurs. Assurez-vous que vous chercher @ msn si elle vous donne le choix, adresses e-mail hotmail ne fonctionne pas ..

Friday, June 15, 2012

How To: Change Your Ip In Less Then 1 Minute



1. Click on "Start" in the bottom left hand corner of screen
2. Click on "Run"
3. Type in "command" and hit ok
 

Change The Default Location For Installing Apps

 As the size of hardrives increase, more people are using partitions to seperate and store groups of files.

Change Text on XP Start Button

Step 1 - Modify Explorer.exe File

In order to make the changes, the file explorer.exe located at C:\Windows needs to be edited. Since explorer.exe is a binary file it requires a special editor. For purposes of this article I have used Resource Hacker. Resource HackerTM is a freeware utility to view, modify, rename, add, delete and extract resources in 32bit Windows executables and resource files (*.res). It incorporates an internal resource script compiler and decompiler and works on Microsoft Windows 95/98/ME, Windows NT, Windows 2000 and Windows XP operating systems.

get this from h**p://delphi.icm.edu.pl/ftp/tools/ResHack.zip

The first step is to make a backup copy of the file explorer.exe located at C:\Windows\explorer. Place it in a folder somewhere on your hard drive where it will be safe. Start Resource Hacker and open explorer.exe located at C:\Windows\explorer.exe.

The category we are going to be using is "String Table". Expand it by clicking the plus sign then navigate down to and expand string 37 followed by highlighting 1033. If you are using the Classic Layout rather than the XP Layout, use number 38. The right hand pane will display the stringtable. We’re going to modify item 578, currently showing the word “start” just as it displays on the current Start button.

There is no magic here. Just double click on the word “start” so that it’s highlighted, making sure the quotation marks are not part of the highlight. They need to remain in place, surrounding the new text that you’ll type. Go ahead and type your new entry. In my case I used Click Me!

You’ll notice that after the new text string has been entered the Compile Script button that was grayed out is now active. I won’t get into what’s involved in compiling a script, but suffice it to say it’s going to make this exercise worthwhile. Click Compile Script and then save the altered file using the Save As command on the File Menu. Do not use the Save command – Make sure to use the Save As command and choose a name for the file. Save the newly named file to C:\Windows.


Step 2 – Modify the Registry

!!!make a backup of your registry before making changes!!!

Now that the modified explorer.exe has been created it’s necessary to modify the registry so the file will be recognized when the user logs on to the system. If you don’t know how to access the registry I’m not sure this article is for you, but just in case it’s a temporary memory lapse, go to Start (soon to be something else) Run and type regedit in the Open field. Navigate to:

HKEY_LOCAL_MACHINE\ SOFTWARE\ Microsoft\ Windows NT\ CurrentVersion\ Winlogon

In the right pane, double click the "Shell" entry to open the Edit String dialog box. In Value data: line, enter the name that was used to save the modified explorer.exe file. Click OK.

Close Registry Editor and either log off the system and log back in, or reboot the entire system if that’s your preference. If all went as planned you should see your new Start button with the revised text.[/b]

Change Music In The Malibu And The Pole Position, GTA Vice Modders

 TOOLS YOU WILL NEED (ADOBE AUDITION)

in your Grand Theft Auto Vice City / Audio folder you will see a bunch of mp3's

 

Thursday, June 14, 2012

Caught A Virus?



If you've let your guard down--or even if you haven't--it can be hard to tell if your PC is infected. Here's what to do if you suspect the worst.


Heard this one before? You must run antivirus software and keep it up to date or else your PC will get infected, you'll lose all your data, and you'll incur the wrath of every e-mail buddy you unknowingly infect because of your carelessness.

How To Fix Cant See Secure Sites



Fix the problem with seeing them secrue sites (banks or online stores) i found this very usefull to me at my work (isp backbone support lol, at the time i was regular support  )

Wednesday, June 13, 2012

cannot use my password to get back into Windows XP

Because of the security features built into Windows XP, it is virtually impossible to get back into the system without the password.
You have several options to try and get around this problem.
 

Calculating Offsets

 Introduction

This tutorial is more of a tip than a tutorial. It just explains how to calculate offsets for jumps and calls within the program you are patching.

Burning BIN/CUE Images with Nero Burning Rom



BIN/CUE image format is quite common on the Internet. It might seem that finding an appropriate software for burning these images is quite hard. Luckily, it's not. In addition to Golden Hawk CDRWin, the original software for BIN/CUE format, you can also use Nero Burning Rom to burn the images. 

Please make sure that you have the latest version of Nero, which now is 5.5.10.0 
 

Burn a BIN without a CUE using NERO


You've downloaded a *.BIN file, but there was no *.CUE file associated and you still want to burn the *.BIN file using Nero

Beep Code Manual (On Board Speacker) Part 2.

After repeated requests for beep codes i have decided to post them here maybe they could be pinned

Tuesday, June 12, 2012

Burn .bin file Without A .cue file

 To burn a bin file, you will need an appropriate cue file.

You do exactly the same as for iso files, but when you click on “burn image,” you don’t browse to the bin itself, but instead to the cue file, and you open that one.
When the writer starts to burn, it will automatically search for the bin file and start burning it. In fact, the cue file tells the burning program where it can find the bin file that is attached to it. It is VERY IMPORTANT that you use the right cue file when you burn a bin. i.e both cue and bin files that are attached to each other must be located in the same folder, and every bin file has it’s own cue file.
 

Configuring your Bulletproof FTP Server Tutorial

 
I am not sure where I found this tutorial, It’s been a while…It might even have been here... ..So if it is one of yours, my hat goes off to you once again....

After reading the excellent tutorial on "Creating an FTP" that Norway posted…

(I would suggest reading and following his tutorial first, then following up with this one)
 

Bulk Editing Of .xxx to .zip or .mp3

lets us say you have just download a new album or game  but all the files are .xxx and you need them to be  zip's, rar's, mp3's etc.....
then do the following
 

Monday, June 11, 2012

Border And Text Effects In Psp8, For use with PSP8

Do you want to jazz up your graphics? Want to add a bit of pazazz to your art? Well, this guide features some knowledge, border effects, and even directions to make your own swirlie brushes!

Now, open PSP and get ready to learn! Let's start off with the basics.

Boot Winxp Fast Tutorial



Follow the following steps

Boot Block Recovery For Free



You don't need to pay a measly sum of dollars just to recover from a boot block mode. Here it is folks:

AWARD Bootblock recovery:

That shorting trick should work if the boot block code is not corrupted, and it should not be if /sb switch is used when flashing the bios (instead of /wb switch).
 

Sunday, June 10, 2012

Bit Torrent Tutorials



The first things you need to know about using Bit Torrent:

Tutorial BIOS Update Procedure



All latest Motherboards today, 486/ Pentium / Pentium Pro etc.,ensure that upgrades are easily obtained by incorporating the system BIOS in a FLASH Memory component. With FLASH BIOS, there is no need to replace an EPROM component. Once downloaded, the upgrade utility fits on a floppy disc allowing the user to save, verify and update the system BIOS. A hard drive or a network drive can also be used to run the newer upgrade utilities. However, memory managers can not be installed while upgrading.

Most pre-Pentium motherboards do not have a Flash BIOS. The following instructions therefore do not apply to these boards. If your motherboard does not have a Flash BIOS (EEPROM) you will need to use an EPROM programmer to re-program the BIOS chip. See your dealer for more information about this.

Please read the following instructions in full before starting a Flash BIOS upgrade:
A. Create a Bootable Floppy (in DOS)

•With a non-formatted disk, type the following:

format a:/s

•If using a formatted disk, type:

sys a:

This procedure will ensure a clean boot when you are flashing the new BIOS.

B. Download the BIOS file

•Download the correct BIOS file by clicking on the file name of the BIOS file you wish to download.

•Save the BIOS file and the Flash Utility file in the boot disk you have created. Unzip the BIOS file and the flash utility file. If you don't have an "unzip" utility, download the WinZip for Windows 95 shareware/ evaluation copy for that one time use from _www.winzip.com or _www.pkware.com. Most CD ROMs found in computer magazines, have a shareware version of WinZip on them.

•You should have extracted two files:

Flash BIOS utility eg: flash7265.exe (for example)

BIOS eg: 6152J900.bin (example)

Use the latest flash utility available unless otherwise specified (either on the BIOS update page or in the archive file). This information is usually provided.

C. Upgrade the System BIOS

During boot up, write down the old BIOS version because you will need to use it for the BIOS backup file name.

Place the bootable floppy disk containing the BIOS file and the Flash Utility in drive a, and reboot the system in MS-DOS, preferably Version 6.22

•At the A:> prompt, type the corresponding Flash BIOS utility and the BIOS file with its extension.

For example:

flash625 615j900.bin

•From the Flash Memory Writer menu, select "Y" to "Do you want to save BIOS?" if you want to save (back up) your current BIOS (strongly recommended), then type the name of your current BIOS and its extension after FILE NAME TO SAVE: eg: a:\613J900.bin

Alternatively select "N" if you don't want to save your current BIOS. Beware, though, that you won't be able to recover from a possible failure.

•Select "Y" to "Are you sure to program?"

•Wait until it displays "Message: Power Off or Reset the system"

Once the BIOS has been successfully loaded, remove the floppy disk and reboot the system. If you write to BIOS but cannot complete the procedure, do not switch off, because the computer will not be able to boo, and you will not be given another chance to flash. In this case leave your system on until you resolve the problem (flashing BIOS with old file is a possible solution, provided you've made a backup before)

Make sure the new BIOS version has been loaded properly by taking note of the BIOS identifier as the system is rebooting.

For AMI BIOS
Once the BIOS has been successfully loaded, remove the floppy disk and reboot the system holding the "END" key prior to power on until you enter CMOS setup. If you do not do this the first time booting up after upgrading the BIOS, the system will hang.

BIOS Update Tips
note:
1.Make sure never to turn off or reset your computer during the flash process. This will corrupt the BIOS data. We also recommend that you make a copy of your current BIOS on the bootable floppy so you can reflash it if you need to. (This option is not available when flashing an AMI BIOS).

2. If you have problems installing your new BIOS please check the following:

Have you done a clean boot?
In other words, did you follow the above procedure for making a bootable floppy? This ensures that when booting from "A" there are no device drivers on the diskette. Failing to do a clean boot is the most common cause for getting a "Memory Insufficient" error message when attempting to flash a BIOS.

If you have not used a bootable floppy, insure a clean boot either by

a) pressing F5 during bootup

b) by removing all device drivers on the CONFIG.SYS including the HIMEM.SYS. Do this by using the EDIT command.

Have you booted up under DOS?
Booting in Windows is another common cause for getting a "Memory Insufficient" error message when attempting to flash a BIOS. Make sure to boot up to DOS with a minimum set of drivers. Important: Booting in DOS does not mean selecting "Restart computer in MS-DOS Mode" from Windows98/95 shutdown menu or going to Prompt mode in WindowsNT, but rather following the above procedure (format a: /s and rebooting from a:\).

Have you entered the full file name of the flash utility and the BIOS plus its extension?
Do not forget that often you will need to add a drive letter (a:\) before flashing the BIOS. Example: when asked for file name of new BIOS file which is on your floppy disk, in case you're working from c:\ your will need to type a:\615j900.bin, rather than 615j900.bin only.

BIN & .CUE simple tutorial.



There always seems to be the question "what do I do with a .bin and .cue file" in these forums so I figured I would write a quick and simple tutorial. Please feel free to add more. 

So you have downloaded two files, one with a .bin extension and one with a .cue extension. "What do I do with these?" you ask. There are a number of options. 

BURN TO CD 

You will need either NERO, CDRWIN or FIREBURNER to burn the file. 

To burn with NERO: 
Start NERO, choose FILE, choose BURN IMAGE, locate the .cue file you have and double click it. A dialog box will come up, for anything other than music make sure you choose DISC-AT-ONCE (DAO). You can also turn off the simulation burn if you so choose. 
Then burn away. 

To burn with CDRWin: 
Start CDRWin, choose the button on the top left, choose LOAD CUESHEET, press START RECORDING. 

To burn with Fireburner: 
Start Fireburner, click on the button on the bottom left corner "VISUAL CUE BURNER/BINCHUNKER", press the right mouse button and choose LOAD TRACKS FROM .CUE and choose the correct .CUE file, press the right mouse button again and chooseselect "Burn/Test Burn", choose DISK AT ONCE (DAO), disable TEST BURN and MULTISESSION, press OK. 

.CUE ERRORS 
The most common error you will get with a .cue file is when it points to an incorrect path. This is easily fixed. Find the .bin file, copy the exact title including the .bin extension. Now find the .cue file, open the .cue file using notepad. It should look similar to this: 

FILE "name of file.bin" BINARY 
TRACK 01 MODE2/2352 
INDEX 01 00:00:00 
TRACK 02 MODE2/2352 
INDEX 00 00:04:00 
INDEX 01 00:06:00 

Delete everything in the quotes, in this case we would 
delete name of file.bin. Now place the title you copied 
in between the quotes. Save the changes and close out. 
Thats it, your .cue file should work now. 

OTHER WAYS TO USE .BIN & .CUE FILES 

VCDGear: 
This program will allow you to extract MPEG streams from CD images, convert VCD files to MPEG, correct MPEG errors, and more. 

Daemon Tools: 
This program creates a virtual drive on your PC which will allow you to "mount" the .cue file and use whatever is in the .bin file without having to burn it to a cd. 

ISOBuster: 
This program will allow you to "bust" open the .bin file and extract the files within the .bin. 
_________________

Big Brother and Ndisuio.sys A new Internet phenomenon?


Ndisuio.sys, a very mysterious system file is present in Windows XP and is a driver for wireless things such as wi-fi and bluetooth. However, there have been many issues with this file downloading immense amounts of data and perhaps causing activity that is "big brother"ish.
 

涉及一個PSX墊連接到電腦,警告焊接..



如果你是冒險的感覺......

如果你有一個遊戲機和個人電腦,沒有電腦,或者只是那些在市場上有墊似乎過於昂貴,或任何你不喜歡,你在這裡有一個很好的選擇。它連接到您的PC保護其所有功能感謝優秀司機DirectPad您的PlayStation墊(人)。

Saturday, June 9, 2012

Beep Code Manual (On Board Speacker)

Beep Code Manual, Better Than Gold Techies, American Megatrends Int. & Phoenix

(I'm IT, I use these codes to trouble shoot hardware issues at my job. Enjoy) cold.gif

All About BandWidth

This is well written explanation about bandwidth, very useful info.



BandWidth Explained

Most hosting companies offer a variety of bandwidth options in their plans. So exactly what is bandwidth as it relates to web hosting? Put simply, bandwidth is the amount of traffic that is allowed to occur between your web site and the rest of the internet. The amount of bandwidth a hosting company can provide is determined by their network connections, both internal to their data center and external to the public internet.


Network Connectivity

The internet, in the most simplest of terms, is a group of millions of computers connected by networks. These connections within the internet can be large or small depending upon the cabling and equipment that is used at a particular internet location. It is the size of each network connection that determines how much bandwidth is available. For example, if you use a DSL connection to connect to the internet, you have 1.54 Mega bits (Mb) of bandwidth. Bandwidth therefore is measured in bits (a single 0 or 1). Bits are grouped in bytes which form words, text, and other information that is transferred between your computer and the internet.

If you have a DSL connection to the internet, you have dedicated bandwidth between your computer and your internet provider. But your internet provider may have thousands of DSL connections to their location. All of these connection aggregate at your internet provider who then has their own dedicated connection to the internet (or multiple connections) which is much larger than your single connection. They must have enough bandwidth to serve your computing needs as well as all of their other customers. So while you have a 1.54Mb connection to your internet provider, your internet provider may have a 255Mb connection to the internet so it can accommodate your needs and up to 166 other users (255/1.54).


Traffic

A very simple analogy to use to understand bandwidth and traffic is to think of highways and cars. Bandwidth is the number of lanes on the highway and traffic is the number of cars on the highway. If you are the only car on a highway, you can travel very quickly. If you are stuck in the middle of rush hour, you may travel very slowly since all of the lanes are being used up.

Traffic is simply the number of bits that are transferred on network connections. It is easiest to understand traffic using examples. One Gigabyte is 2 to the 30th power (1,073,741,824) bytes. One gigabyte is equal to 1,024 megabytes. To put this in perspective, it takes one byte to store one character. Imagine 100 file cabinets in a building, each of these cabinets holds 1000 folders. Each folder has 100 papers. Each paper contains 100 characters - A GB is all the characters in the building. An MP3 song is about 4MB, the same song in wav format is about 40MB, a full length movie can be 800MB to 1000MB (1000MB = 1GB).

If you were to transfer this MP3 song from a web site to your computer, you would create 4MB of traffic between the web site you are downloading from and your computer. Depending upon the network connection between the web site and the internet, the transfer may occur very quickly, or it could take time if other people are also downloading files at the same time. If, for example, the web site you download from has a 10MB connection to the internet, and you are the only person accessing that web site to download your MP3, your 4MB file will be the only traffic on that web site. However, if three people are all downloading that same MP at the same time, 12MB (3 x 4MB) of traffic has been created. Because in this example, the host only has 10MB of bandwidth, someone will have to wait. The network equipment at the hosting company will cycle through each person downloading the file and transfer a small portion at a time so each person's file transfer can take place, but the transfer for everyone downloading the file will be slower. If 100 people all came to the site and downloaded the MP3 at the same time, the transfers would be extremely slow. If the host wanted to decrease the time it took to download files simultaneously, it could increase the bandwidth of their internet connection (at a cost due to upgrading equipment).


Hosting Bandwidth

In the example above, we discussed traffic in terms of downloading an MP3 file. However, each time you visit a web site, you are creating traffic, because in order to view that web page on your computer, the web page is first downloaded to your computer (between the web site and you) which is then displayed using your browser software (Internet Explorer, Netscape, etc.) . The page itself is simply a file that creates traffic just like the MP3 file in the example above (however, a web page is usually much smaller than a music file).

A web page may be very small or large depending upon the amount of text and the number and quality of images integrated within the web page. For example, the home page for CNN.com is about 200KB (200 Kilobytes = 200,000 bytes = 1,600,000 bits). This is typically large for a web page. In comparison, Yahoo's home page is about 70KB.


How Much Bandwidth Is Enough?

It depends (don't you hate that answer). But in truth, it does. Since bandwidth is a significant determinant of hosting plan prices, you should take time to determine just how much is right for you. Almost all hosting plans have bandwidth requirements measured in months, so you need to estimate the amount of bandwidth that will be required by your site on a monthly basis

If you do not intend to provide file download capability from your site, the formula for calculating bandwidth is fairly straightforward:

Average Daily Visitors x Average Page Views x Average Page Size x 31 x Fudge Factor

If you intend to allow people to download files from your site, your bandwidth calculation should be:

[(Average Daily Visitors x Average Page Views x Average Page Size) +
(Average Daily File Downloads x Average File Size)] x 31 x Fudge Factor

Let us examine each item in the formula:

Average Daily Visitors - The number of people you expect to visit your site, on average, each day. Depending upon how you market your site, this number could be from 1 to 1,000,000.

Average Page Views - On average, the number of web pages you expect a person to view. If you have 50 web pages in your web site, an average person may only view 5 of those pages each time they visit.

Average Page Size - The average size of your web pages, in Kilobytes (KB). If you have already designed your site, you can calculate this directly.

Average Daily File Downloads - The number of downloads you expect to occur on your site. This is a function of the numbers of visitors and how many times a visitor downloads a file, on average, each day.

Average File Size - Average file size of files that are downloadable from your site. Similar to your web pages, if you already know which files can be downloaded, you can calculate this directly.

Fudge Factor - A number greater than 1. Using 1.5 would be safe, which assumes that your estimate is off by 50%. However, if you were very unsure, you could use 2 or 3 to ensure that your bandwidth requirements are more than met.

Usually, hosting plans offer bandwidth in terms of Gigabytes (GB) per month. This is why our formula takes daily averages and multiplies them by 31.


Summary

Most personal or small business sites will not need more than 1GB of bandwidth per month. If you have a web site that is composed of static web pages and you expect little traffic to your site on a daily basis, go with a low bandwidth plan. If you go over the amount of bandwidth allocated in your plan, your hosting company could charge you over usage fees, so if you think the traffic to your site will be significant, you may want to go through the calculations above to estimate the amount of bandwidth required in a hosting plan.

Backtracking EMAIL Messages



Tracking email back to its source: Twisted Evil
cause i hate spammers... Evil or Very Mad

Ask most people how they determine who sent them an email message and the response is almost universally, "By the From line." Unfortunately this symptomatic of the current confusion among internet users as to where particular messages come from and who is spreading spam and viruses. The "From" header is little more than a courtesy to the person receiving the message. People spreading spam and viruses are rarely courteous. In short, if there is any question about where a particular email message came from the safe bet is to assume the "From" header is forged.
 

Friday, June 8, 2012

B.A. regedit

ok,any of you that do websites and like to open .html and similar files in notepad to edit scrpits, this is THE coolest windows registry edit ever
you can download the zip file with the .reg in it (run it and it automatically adds itself to your registry) or do it manually

A Web Standards Checklist, How to make a proper website



A web standards checklist

The term web standards can mean different things to different people. For some, it is 'table-free sites', for others it is 'using valid code'. However, web standards are much broader than that. A site built to web standards should adhere to standards (HTML, XHTML, XML, CSS, XSLT, DOM, MathML, SVG etc) and pursue best practices (valid code, accessible code, semantically correct code, user-friendly URLs etc).
 

A very small tut for RealMedia

You may find this helpful if you donwload hundreds of short episodes in rm format like me and tired of double-click to open next files.
 

Thursday, June 7, 2012

Auto End Tasks to Enable a Proper Shutdown



This reg file automatically ends tasks and timeouts that prevent programs from shutting down and clears the Paging File on Exit.
 

anti leech hacking tutorial

I was just asking to know if there is some audiance before
here is my methode

Anonymity of Proxy



The exchange of information in Internet is made by the "client - server" model. A client sends a request (what files he needs) and a server sends a reply (required files). For close cooperation (full understanding) between a client and a server the client sends additional information about itself: a version and a name of an operating system, configuration of a browser (including its name and version) etc. This information can be necessary for the server in order to know which web-page should be given (open) to the client. 

Wednesday, June 6, 2012

Anonymity


I can see you hiding in the shadows over there and so can the logs of all the web sites, FTP servers and other nooks and crannies you visit on the web. The sort of information gathered by these logs and which is available to the webmasters of the sites you visit include the address of the previous site you visited, your IP address, your computer's ID name, your physical location and the name of your ISP along with less personal details such as the operating system you're using and your screen resolution. If someone was snooping through your dustbin to gather information on consumer trends or tracking your every move to see where it is you go everyday you wouldn't be too chuffed would you. Well the web is no different, it's still an invasion of privacy and a threat to security and you don't have to put up with it.
 

All mIRC Commands

 All mIRC Commands
 

Tuesday, June 5, 2012

ALL About Spyware

There are a lot of PC users that know little about "Spyware", "Mal-ware", "hijackers", "Dialers" & many more. This will help you avoid pop-ups, spammers and all those baddies.

What is spy-ware?
Spy-ware is Internet jargon for Advertising Supported software (Ad-ware). It is a way for shareware authors to make money from a product, other than by selling it to the users. There are several large media companies that offer them to place banner ads in their products in exchange for a portion of the revenue from banner sales. This way, you don't have to pay for the software and the developers are still getting paid. If you find the banners annoying, there is usually an option to remove them, by paying the regular licensing fee.
 

All About Movie Tags (what Is A Dvdrip, Cam Etc.)

Original Sources
 

Monday, June 4, 2012

All about ftp must read

 Setting Up A Ftp:

Well, since many of us have always wondered this, here it is. Long and drawn out. Also, before attempting this, realize one thing; You will have to give up your time, effort, bandwidth, and security to have a quality ftp server.

That being said, here it goes. First of all, find out if your IP (Internet Protocol) is static (not changing) or dynamic (changes everytime you log on). To do this, first consider the fact if you have a dial up modem. If you do, chances are about 999 999 out of 1 000 000 that your IP is dynamic. To make it static, just go to a place like h*tp://www.myftp.org/ to register for a static ip address.
 

Accessing The Entire Internet On Your 3 Phone, U8110, E616 etc

If you have a phone thats with the provider 3 theres a simple trick to allow you to access the entire internet on its browser without having to go through 3 services and only what they want to allow you access to view.

Simply do the following.
 

A Basic Guide to the Internet

The Internet is a computer network made up of thousands of networks worldwide. No one knows exactly how many computers are connected to the Internet. It is certain, however, that these number in the millions.
 

Sunday, June 3, 2012

匿名性



私は、あなたがあそこの影に隠れて見ることができますので、あなたがウェブ上のすべてのウェブサイト、FTPサーバーと他の隅や割れ目のログができます。これらのログが収集する情報の種類、どのあなたが訪問した以前のサイトのアドレスが含まれて訪問したサイトのウェブマスターに利用可能で、IPアドレス、コンピュータのID名は、物理的な場所と一緒にISPの名前以下の個人的な使用しているオペレーティングシステムなどの詳細と画面の解像度。誰かが消費者の動向に関する情報を収集するために、ごみ箱経由で詮索したり、それがどこにあるか見るためにすべての動きを追跡されている場合はあなたが毎日行くにはあまりにもあなたでしょう喜んでされることはありません。よくウェブは違いはありません、それはまだプライバシーとセキュリティへの脅威の侵入だとあなたはそれを我慢する必要はありません。

FTPについてのすべての



ftpをアップ設定:

さて、私たちの多くはこれを常に疑問に思っているので、ここにある。ロングと引き出された。また、これを試みる前に、一つのことを実現する、あなたの時間、労力、帯域幅、および高品質のFTPサーバを使用しているように、セキュリティを放棄する必要があります。
そうは言っても、ここに行く。あなたのIP(インターネットプロトコル)は、(変更が毎回ログオンする)静的(変化しない)または動的の場合、まず第一に、見つける。あなたがモデムダイヤルアップを使用している場合これを行うには、まず事実を考慮してください。あなたがしなければ、チャンスはあなたのIPが動的であること1 000 000のうち999程度である。それは静的にするには、単にH * tpは:/ /静的IPアドレスに登録するwww.myftp.org/~~Vような場所に移動します。

互聯網的基本指南



互聯網是一個由世界各地成千上萬的網絡計算機網絡。沒有人知道到底有多少台計算機連接到互聯網。然而,可以肯定的是,這些數以百萬計。

沒有一個是負責互聯網。有開發這一網絡的技術方面的機構設置上創建應用程序的標準,但沒有身體控制。互聯網骨幹網,通過它的網絡流量,是由私營公司擁有。

Un guide de base de l'Internet



L'Internet est un réseau informatique constitué de milliers de réseaux à travers le monde. Personne ne sait exactement combien d'ordinateurs sont connectés à l'Internet. Il est certain, toutefois, que ces nombres dans les millions.

Personne n'est en charge de l'Internet. Il ya des organisations qui développent des aspects techniques de ce réseau et établir des normes pour la création d'applications à ce sujet, mais aucun organe directeur est sous contrôle. La dorsale Internet, à travers lequel les flux de trafic Internet, est détenue par des sociétés privées.

16倍速DVD +-RW DL DVDライター比較ガイド



ソース:CODEhttp://www.extrememhz.com/dlcomp-p1.shtml

片面2層DVDライターの導入以来、関心は非常に圧倒的され、私達はこれらの人気の高いドライブのレビューをもたらし続ける理由でもあります。期待は右下の強迫観念になってきましたが、ビルド、現在または新しいシステムの主要コンポーネントで、価格低下と継続的なメディアの誇大宣伝のおかげでとなっています。メーカーが魅力の非常に認識しており、彼らはそれぞれほとんどのレビューで使用されているテスト方法の少なくとも1つの領域に優れた自社製品をリリースしている理由です。これは最高の個人のニーズに適しているドライブへのようないくつかの混乱につながっている。今日、私たちはあなたのドライブが最高のあなたに適しているのより良いアイデアを与えるために、4倍速二層ドライブを比較し、長所と短所の両方を強調表示します。

10 raisons pour lesquelles accident PC U Know doit



Fatal error: le système est devenu instable ou est occupé, "dit-il." Entrée pour revenir à Windows ou appuyez sur Ctrl-Alt-Suppr pour redémarrer votre ordinateur. Si vous faites cela, vous perdrez toutes les informations non enregistrées dans toutes les applications ouvertes. "

Vous venez d'être frappé par le Blue Screen of Death. Toute personne qui utilise MCFT Windows sera familier avec ce. Que pouvez-vous faire? Plus important encore, comment pouvez-vous empêcher que cela se?

8人がアカウントをダイヤルアップと同じMSNを使用できる



它很容易真的。要拨号,整个家庭只有一个法案?

步骤一。购买20美元一个月订阅到MSN无限拨号接入。这将包括MSN 9的CD,您将需要。随着安装的软件,填补了新用户的辅助帐户插槽。确保你挑选@ MSN,如果它给你的选择,Hotmail电子邮件地址将无法正常工作......

说的第二个帐户是拨号连接johnsmith@msn.com类型

用户名:MSN/ johnsmith
密码:*******(任何)

连接到您的本地MSN电话号码,你给二级帐户的其他人将能够做同样的,当您连接。其甜美的交易考虑每个人的互联网接入支付约2块钱一个月,特别是如果你不能得到宽带。如果你想卖掉的人,你实际上可以赚钱这样......但我不建议。

我使用的是一个MSN的高科技,这是一个鲜为人知的秘密甚至大多数员工。

你这样做之后,你不需要任何软件。我会建议保持微观别人帐目。一个简单的事实,如果他们不投在削减它们赶走HEHEHE

我现在宽带所以我不关心,如果我告诉你我的小秘密。谁都知道这个吗?

23 Ways To Speed WinXP, Not only Defrag

Since defragging the disk won't do much to improve Windows XP performance, here are 23 suggestions that will. Each can enhance the performance and reliability of your customers' PCs. Best of all, most of them will cost you nothing.

20 Great Google Secrets


Google is clearly the best general-purpose search engine on the Web


But most people don't use it to its best advantage. Do you just plug in a keyword or two and hope for the best? That may be the quickest way to search, but with more than 3 billion pages in Google's index, it's still a struggle to pare results to a manageable number.

But Google is an remarkably powerful tool that can ease and enhance your Internet exploration. Google's search options go beyond simple keywords, the Web, and even its own programmers. Let's look at some of Google's lesser-known options.
 

16x Dvd+-rw Dl Dvd Writer Comparison Guide

Since the introduction of double layer DVD writers, the interest has been quite overwhelming and is why we keep bringing you reviews of these highly popular drives. The anticipation has now turned into down right obsession and it has become a key component in any current or new system build, thanks to the declining prices and continued media hype. Manufacturers are quite aware of the fascination and is why they have each been releasing their own products which excel in at least one area of the testing methodology used in most reviews. This has led to some confusion as to which drive is best suited for the individuals needs. Today, we compare four 16x double layer drives and highlight both the strong and weak points in order to give you a better idea of which drive is best suited for you.

Saturday, June 2, 2012

Check For Dos, Check to see if you are infected.

When you first turn on you computer (BEFORE DIALING INTO YOUR ISP),
open a MS-DOS Prompt window (start/programs MS-DOS Prompt).
Then type netstat -arn and press the Enter key.
Your screen should display the following (without the dotted lines
which I added for clarification).
 

Broken Ie, How to fix it

So one of your friends, not you of course, has managed to nuke Internet Explorer and they are unsure how they did it. You;ve eliminated the possibility of viruses and adware, so this just leaves you and a broken IE. Before you begin to even consider running a repair install of the OS, let.s try to do a repair on IE instead.
 

Best Keyboard Shortcuts (On Windows)

Getting used to using your keyboard exclusively and leaving your mouse behind will make you much more efficient at performing any task on any Windows system. I use the following keyboard shortcuts every day:
 

Fast and Free Security Enhancements

10 Fast and Free Security Enhancements 
PC magazine.

Before you spend a dime on security, there are many precautions you can take that will protect you against the most common threats.
 

10 reasons why PCs crash

10 reasons why PCs crash U must Know

Fatal error: the system has become unstable or is busy," it says. "Enter to return to Windows or press Control-Alt-Delete to restart your computer. If you do this you will lose any unsaved information in all open applications."

You have just been struck by the Blue Screen of Death. Anyone who uses Mcft Windows will be familiar with this. What can you do? More importantly, how can you prevent it happening?

Multiple User At Msn Dial Up Account

8 People Can Use The Same Msn Dial Up Account

its easy really. want to have an entire family on dial-up with just one bill?

step one. purchase 20 dollar a month subscription to MSN unlimited access dial up. This will include an MSN 9 cd which you will need. With the software installed, fill up your secondary account slots with new users. Make sure you pick @msn if it gives you the choice, hotmail email addresses will not work..
 

Friday, June 1, 2012

Becoming an Uebercracker



        A Guide to Internet Security: Becoming an Uebercracker
        and Becoming an UeberAdmin to stop Uebercrackers.


Author: Christopher Klaus <cklaus@shadow.net>
Date: December 5th, 1993.
Version: 1.1

  This is a paper will be broken into two parts, one showing 15 easy steps
to becoming a uebercracker and the next part showing how to become a
ueberadmin and how to stop a uebercracker.  A uebercracker is a term phrased
by Dan Farmer to refer to some elite (cr/h)acker that is practically
impossible to keep out of the networks. 

Here's the steps to becoming a uebercracker.